940 research outputs found
Particle production and dissipative cosmic field
Large amplitude oscillation of cosmic field that may occur right after inflation and in the decay process of weakly interacting fields gives rise to violent particle production via the parametric resonance. In the large amplitude limit the problem of back reaction against the field oscillation is solved and the energy spectrum of created particles is determined in a semi-classical approximation. For large enough coupling or large enough amplitude the resulting energy spectrum is broadly distributed, implying larger production of high energy particles than what a simple estimate of the reheating temperature due to the Born formula would suggest
On the Use of Key Assignment Schemes in Authentication Protocols
Key Assignment Schemes (KASs) have been extensively studied in the context of
cryptographically-enforced access control, where derived keys are used to
decrypt protected resources. In this paper, we explore the use of KASs in
entity authentication protocols, where we use derived keys to encrypt
challenges. This novel use of KASs permits the efficient authentication of an
entity in accordance with an authentication policy by associating entities with
security labels representing specific services. Cryptographic keys are
associated with each security label and demonstrating knowledge of an
appropriate key is used as the basis for authentication. Thus, by controlling
the distribution of such keys, restrictions may be efficiently placed upon the
circumstances under which an entity may be authenticated and the services to
which they may gain access.
In this work, we explore how both standardized protocols and novel
constructions may be developed to authenticate entities as members of a group
associated to a particular security label, whilst protecting the long-term
secrets in the system. We also see that such constructions may allow for
authentication whilst preserving anonymity, and that by including a trusted
third party we can achieve the authentication of individual identities and
authentication based on timestamps without the need for synchronized clocks
Systematic study of autocorrelation time in pure SU(3) lattice gauge theory
Results of our autocorrelation measurement performed on Fujitsu AP1000 are
reported. We analyze (i) typical autocorrelation time, (ii) optimal mixing
ratio between overrelaxation and pseudo-heatbath and (iii) critical behavior of
autocorrelation time around cross-over region with high statistic in wide range
of for pure SU(3) lattice gauge theory on , and
lattices. For the mixing ratio K, small value (3-7) looks optimal in the
confined region, and reduces the integrated autocorrelation time by a factor
2-4 compared to the pseudo-heatbath. On the other hand in the deconfined phase,
correlation times are short, and overrelaxation does not seem to matter For a
fixed value of K(=9 in this paper), the dynamical exponent of overrelaxation is
consistent with 2 Autocorrelation measurement of the topological charge on
lattice at = 6.0 is also briefly mentioned.Comment: 3 pages of A4 format including 7-figure
Autocorrelation in Updating Pure SU(3) Lattice Gauge Theory by the use of Overrelaxed Algorithms
We measure the sweep-to-sweep autocorrelations of blocked loops below and
above the deconfinement transition for SU(3) on a lattice using
20000-140000 Monte-Carlo updating sweeps. A divergence of the autocorrelation
time toward the critical is seen at high blocking levels. The peak is
near = 6.33 where we observe 440 210 for the autocorrelation time
of Wilson loop on blocked lattice. The mixing of 7 Brown-Woch
overrelaxation steps followed by one pseudo-heat-bath step appears optimal to
reduce the autocorrelation time below the critical . Above the critical
, however, no clear difference between these two algorithms can be seen
and the system decorrelates rather fast.Comment: 4 pages of A4 format including 6-figure
- …