18 research outputs found
Instantonic approach to triple well potential
By using a usual instanton method we obtain the energy splitting due to
quantum tunneling through the triple well barrier. It is shown that the term
related to the midpoint of the energy splitting in propagator is quite
different from that of double well case, in that it is proportional to the
algebraic average of the frequencies of the left and central wells.Comment: Revtex, 11 pages, Included one eps figur
Attack of Many Eavesdroppers via Optimal Strategy in Quantum Cryptography
We examine a situation that eavesdroppers attack the Bennett-Brassard
cryptographic protocol via their own optimal and symmetric strategies.
Information gain and mutual information with sender for each eavesdropper are
explicitly derived. The receiver's error rate for the case of arbitrary
eavesdroppers can be derived using a recursive relation. Although first
eavesdropper can get mutual information without disturbance arising due to
other eavesdroppers, subsequent eavesdropping generally increases the
receiver's error rate. Other eavesdroppers cannot gain information on the input
signal sufficiently. As a result, the information each eavesdropper gains
becomes less than optimal one.Comment: 17 pages, 8 figure