100 research outputs found

    Difficulties with Recollapsing models in Closed Isotropic Loop Quantum Cosmology

    Full text link
    The use of techniques from loop quantum gravity for cosmological models may solve some difficult problems in quantum cosmology. The solutions under a number of circumstances have been well studied. We will analyse the behaviour of solutions in the closed model, focusing on the behaviour of a universe containing a massless scalar field. The asymptotic behaviour of the solutions is examined, and is used to determine requirements of the initial conditions.Comment: 10 pages, accepted to Phys. Rev.

    The Fulling-Davies-Unruh Effect is Mandatory: The Proton's Testimony

    Full text link
    We discuss the decay of accelerated protons and illustrate how the Fulling-Davies-Unruh effect is indeed mandatory to maintain the consistency of standard Quantum Field Theory. The confidence level of the Fulling-Davies-Unruh effect must be the same as that of Quantum Field Theory itself.Comment: Awarded "honorable mention" by Gravity Research Foundation in the 2002 Essay competitio

    Interaction of Hawking radiation with static sources outside a Schwarzschild black hole

    Get PDF
    We show that the response rate of (i) a static source interacting with Hawking radiation of massless scalar field in Schwarzschild spacetime (with the Unruh vacuum) and that of (ii) a uniformly accelerated source with the same proper acceleration in Minkowski spacetime (with the Minkowski vacuum) are equal. We show that this equality will not hold if the Unruh vacuum is replaced by the Hartle-Hawking vacuum. It is verified that the source responds to the Hawking radiation near the horizon as if it were at rest in a thermal bath in Minkowski spacetime with the same temperature. It is also verified that the response rate in the Hartle-Hawking vacuum approaches that in Minkowski spacetime with the same temperature far away from the black hole. Finally, we compare our results with others in the literature.Comment: 18 pages (REVTEX

    Decay of accelerated protons and the existence of the Fulling-Davies-Unruh effect

    Get PDF
    We investigate the weak decay of uniformly {\em accelerated protons} in the context of {\em standard} Quantum Field Theory. Because the mean {\em proper} lifetime of a particle is a scalar, the same value for this observable must be obtained in the inertial and coaccelerated frames. We are only able to achieve this equality by considering the Fulling-Davies-Unruh effect. This reflects the fact that the Fulling-Davies-Unruh effect is mandatory for the consistency of Quantum Field Theory. There is no question about its existence provided one accepts the validity of standard Quantum Field Theory in flat spacetime.Comment: 4 pages (revtex), 1 figure, to appear in Phys. Rev. Let

    Weak decay of uniformly accelerated protons and related processes

    Full text link
    We investigate the weak interaction emission of spin-1/2 fermions from accelerated currents. As particular applications, we analyze the decay of uniformly accelerated protons and neutrons, and the neutrino-antineutrino emission from uniformly accelerated electrons. The possible relevance of our results to astrophysics is also discussed.Comment: 16 pages (REVTEX), 6 figures, to appear in Physical Review

    Simulation of Many-Body Fermi Systems on a Universal Quantum Computer

    Full text link
    We provide fast algorithms for simulating many body Fermi systems on a universal quantum computer. Both first and second quantized descriptions are considered, and the relative computational complexities are determined in each case. In order to accommodate fermions using a first quantized Hamiltonian, an efficient quantum algorithm for anti-symmetrization is given. Finally, a simulation of the Hubbard model is discussed in detail.Comment: Submitted 11/7/96 to Phys. Rev. Lett. 10 pages, 0 figure

    Decoherence Bounds on Quantum Computation with Trapped Ions

    Full text link
    Using simple physical arguments we investigate the capabilities of a quantum computer based on cold trapped ions. From the limitations imposed on such a device by spontaneous decay, laser phase coherence, ion heating and other sources of error, we derive a bound between the number of laser interactions and the number of ions that may be used. The largest number which may be factored using a variety of species of ion is determined.Comment: 5 pages in RevTex, 2 figures, the paper is also avalaible at http://qso.lanl.gov/qc

    Multi-Target Attacks on the Picnic Signature Scheme and Related Protocols

    Get PDF
    Picnic is a signature scheme that was presented at ACM CCS 2017 by Chase et al. and submitted to NIST\u27s post-quantum standardization project. Among all submissions to NIST\u27s project, Picnic is one of the most innovative, making use of recent progress in construction of practically efficient zero-knowledge (ZK) protocols for general circuits. In this paper, we devise multi-target attacks on Picnic and its underlying ZK protocol, ZKB++. Given access to SS signatures, produced by a single or by several users, our attack can (information theoretically) recover the κ\kappa-bit signing key of a user in complexity of about 2κ−7/S2^{\kappa - 7}/S. This is faster than Picnic\u27s claimed 2κ2^{\kappa} security against classical (non-quantum) attacks by a factor of 27⋅S2^7 \cdot S (as each signature contains about 272^7 attack targets). Whereas in most multi-target attacks, the attacker can easily sort and match the available targets, this is not the case in our attack on Picnic, as different bits of information are available for each target. Consequently, it is challenging to reach the information theoretic complexity in a computational model, and we had to perform cryptanalytic optimizations by carefully analyzing ZKB++ and its underlying circuit. Our best attack for κ=128\kappa = 128 has time complexity of T=277T = 2^{77} for S=264S = 2^{64}. Alternatively, we can reach the information theoretic complexity of T=264T = 2^{64} for S=257S = 2^{57}, given that all signatures are produced with the same signing key. Our attack exploits a weakness in the way that the Picnic signing algorithm uses a pseudo-random generator. The weakness is fixed in the recent Picnic 2.0 version. In addition to our attack on Picnic, we show that a recently proposed improvement of the ZKB++ protocol (due to Katz, Kolesnikov and Wang) is vulnerable to a similar multi-target attack

    From Davydov solitons to decoherence-free subspaces: self-consistent propagation of coherent-product states

    Get PDF
    The self-consistent propagation of generalized D1D_{1} [coherent-product] states and of a class of gaussian density matrix generalizations is examined, at both zero and finite-temperature, for arbitrary interactions between the localized lattice (electronic or vibronic) excitations and the phonon modes. It is shown that in all legitimate cases, the evolution of D1D_{1} states reduces to the disentangled evolution of the component D2D_{2} states. The self-consistency conditions for the latter amount to conditions for decoherence-free propagation, which complement the D2D_{2} Davydov soliton equations in such a way as to lift the nonlinearity of the evolution for the on-site degrees of freedom. Although it cannot support Davydov solitons, the coherent-product ansatz does provide a wide class of exact density-matrix solutions for the joint evolution of the lattice and phonon bath in compatible systems. Included are solutions for initial states given as a product of a [largely arbitrary] lattice state and a thermal equilibrium state of the phonons. It is also shown that external pumping can produce self-consistent Frohlich-like effects. A few sample cases of coherent, albeit not solitonic, propagation are briefly discussed.Comment: revtex3, latex2e; 22 pages, no figs.; to appear in Phys.Rev.E (Nov.2001
    • …
    corecore