18 research outputs found

    Instantonic approach to triple well potential

    Get PDF
    By using a usual instanton method we obtain the energy splitting due to quantum tunneling through the triple well barrier. It is shown that the term related to the midpoint of the energy splitting in propagator is quite different from that of double well case, in that it is proportional to the algebraic average of the frequencies of the left and central wells.Comment: Revtex, 11 pages, Included one eps figur

    Attack of Many Eavesdroppers via Optimal Strategy in Quantum Cryptography

    Full text link
    We examine a situation that nn eavesdroppers attack the Bennett-Brassard cryptographic protocol via their own optimal and symmetric strategies. Information gain and mutual information with sender for each eavesdropper are explicitly derived. The receiver's error rate for the case of arbitrary nn eavesdroppers can be derived using a recursive relation. Although first eavesdropper can get mutual information without disturbance arising due to other eavesdroppers, subsequent eavesdropping generally increases the receiver's error rate. Other eavesdroppers cannot gain information on the input signal sufficiently. As a result, the information each eavesdropper gains becomes less than optimal one.Comment: 17 pages, 8 figure
    corecore