5,402 research outputs found
From Quantum Cheating to Quantum Security
For thousands of years, code-makers and code-breakers have been competing for
supremacy. Their arsenals may soon include a powerful new weapon: quantum
mechanics. We give an overview of quantum cryptology as of November 2000.Comment: 14 pages, 4 figures. Originally appeared in Physics Today:
. This article may be
downloaded for personal use only. Any other use requires prior permission of
both the author and the American Institute of Physic
Recommended from our members
Ontogenetic shifts in perceptions of safety along structural complexity gradients in a territorial damselfish.
Age and body size can influence predation risk and hence habitat use. Many species undergo ontogenetic shifts in habitat use as individuals grow larger and have different age-specific predation pressures. On coral reefs, a number of fish species are more tolerant of threats in structurally complex habitats that contain more refuges than in less structurally complex habitats. However, we do not know how risk perception varies with age, and whether age interacts with habitat complexity. Adults and juveniles, because of their size, may face different risks in structurally simple versus complex habitats. We used flight initiation distance as a metric to analyze perceptions of risk in a species of damselfish Stegastes nigricans. All else being equal, fish fleeing at greater distances are inferred to perceive higher risk. We targeted juvenile and adult damselfish to assess whether there are ontogenetic shifts in perceptions of safety in relation to structural complexity, inferred based on percent coral cover and rugosity. We found that adult damselfish tolerated closer approach in more complex habitats as measured by percent coral cover, but not rugosity, whereas juvenile fish always allowed closer approach than adult fish regardless of complexity. This ontogenetic shift in habitat use may result from juvenile fish taking bigger risks to maximize growth, whereas older animals, who are closer to their maximum body size, can afford to take fewer risks and protect their assets
Security of quantum key distribution with imperfect devices
We prove the security of the Bennett-Brassard (BB84) quantum key distribution
protocol in the case where the source and detector are under the limited
control of an adversary. Our proof applies when both the source and the
detector have small basis-dependent flaws, as is typical in practical
implementations of the protocol. We derive a general lower bound on the
asymptotic key generation rate for weakly basis-dependent eavesdropping
attacks, and also estimate the rate in some special cases: sources that emit
weak coherent states with random phases, detectors with basis-dependent
efficiency, and misaligned sources and detectors.Comment: 22 pages. (v3): Minor changes. (v2): Extensively revised and
expanded. New results include a security proof for generic small flaws in the
source and the detecto
A quantum analog of Huffman coding
We analyze a generalization of Huffman coding to the quantum case. In
particular, we notice various difficulties in using instantaneous codes for
quantum communication. Nevertheless, for the storage of quantum information, we
have succeeded in constructing a Huffman-coding inspired quantum scheme. The
number of computational steps in the encoding and decoding processes of N
quantum signals can be made to be of polylogarithmic depth by a massively
parallel implementation of a quantum gate array. This is to be compared with
the O (N^3) computational steps required in the sequential implementation by
Cleve and DiVincenzo of the well-known quantum noiseless block coding scheme of
Schumacher. We also show that O(N^2(log N)^a) computational steps are needed
for the communication of quantum information using another Huffman-coding
inspired scheme where the sender must disentangle her encoding device before
the receiver can perform any measurements on his signals.Comment: Revised version, 7 pages, two-column, RevTex. Presented at 1998 IEEE
International Symposium on Information Theor
Streamwise forced oscillations of circular and square cylinders
The modification of a cylinder wake by streamwise oscillation of the cylinder at the vortex shedding frequency of the unperturbed cylinder is reported. Recent numerical simulations [J. S. Leontini, D. Lo Jacono, and M. C. Thompson, âA numerical study of an inline oscillating cylinder in a free stream,â J. Fluid Mech. 688, 551â568 (2011)] showed that this forcing results in the primary frequency decreasing proportionally to the square of the forcing amplitude, before locking to a subharmonic at higher amplitudes. The experimental results presented here show that this behavior continues at higher Reynolds numbers, although the flow is three-dimensional. In addition, it is shown that this behavior persists when the body is a square cross section, and when the frequency of forcing is detuned from the unperturbed cylinder shedding frequency. The similarity of the results across Reynolds number, geometry, and frequency suggests that the physical mechanism is applicable to periodic forcing of the classic von Ka Ìrma Ìn vortex street, regardless of the details of the body which forms the street
- âŠ