5,577 research outputs found
No Superluminal Signaling Implies Unconditionally Secure Bit Commitment
Bit commitment (BC) is an important cryptographic primitive for an agent to
convince a mutually mistrustful party that she has already made a binding
choice of 0 or 1 but only to reveal her choice at a later time. Ideally, a BC
protocol should be simple, reliable, easy to implement using existing
technologies, and most importantly unconditionally secure in the sense that its
security is based on an information-theoretic proof rather than computational
complexity assumption or the existence of a trustworthy arbitrator. Here we
report such a provably secure scheme involving only one-way classical
communications whose unconditional security is based on no superluminal
signaling (NSS). Our scheme is inspired by the earlier works by Kent, who
proposed two impractical relativistic protocols whose unconditional securities
are yet to be established as well as several provably unconditionally secure
protocols which rely on both quantum mechanics and NSS. Our scheme is
conceptually simple and shows for the first time that quantum communication is
not needed to achieve unconditional security for BC. Moreover, with purely
classical communications, our scheme is practical and easy to implement with
existing telecom technologies. This completes the cycle of study of
unconditionally secure bit commitment based on known physical laws.Comment: This paper has been withdrawn by the authors due to a crucial
oversight on an earlier work by A. Ken
Turbulent Pair Diffusion
Kinematic Simulations of turbulent pair diffusion in planar turbulence with a
-5/3 energy spectrum reproduce the results of the laboratory measurements of
Jullien Phys. Rev. Lett. 82, 2872 (1999), in particular the stretched
exponential form of the PDF of pair separations and their correlation
functions. The root mean square separation is found to be strongly dependent on
initial conditions for very long stretches of times. This dependence is
consistent with the topological picture of turbulent pair diffusion where pairs
initially close enough travel together for long stretches of time and separate
violently when they meet straining regions around hyperbolic points. A new
argument based on the divergence of accelerations is given to support this
picture
Investigations of afterpulsing and detection efficiency recovery in superconducting nanowire single-photon detectors
We report on the observation of a non-uniform dark count rate in
Superconducting Nanowire Single Photon Detectors (SNSPDs), specifically
focusing on an afterpulsing effect present when the SNSPD is operated at a high
bias current regime. The afterpulsing exists for real detection events
(triggered by input photons) as well as for dark counts (no laser input). In
our standard set-up, the afterpulsing is most likely to occur at around 180 ns
following a detection event, for both real counts and dark counts. We
characterize the afterpulsing behavior and speculate that it is not due to the
SNSPD itself but rather the amplifiers used to boost the electrical output
signal from the SNSPD. We show that the afterpulsing indeed disappears when we
use a different amplifier with a better low frequency response. We also examine
the short-lived enhancement of detection efficiency during the recovery of the
SNSPD due to temporary perturbation of the bias and grounding conditions
Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"
This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98,
231104 (2011); arXiv:1106.2675v1 [quant-ph]].Comment: 2 page
Quantum key distribution with delayed privacy amplification and its application to security proof of a two-way deterministic protocol
Privacy amplification (PA) is an essential post-processing step in quantum
key distribution (QKD) for removing any information an eavesdropper may have on
the final secret key. In this paper, we consider delaying PA of the final key
after its use in one-time pad encryption and prove its security. We prove that
the security and the key generation rate are not affected by delaying PA.
Delaying PA has two applications: it serves as a tool for significantly
simplifying the security proof of QKD with a two-way quantum channel, and also
it is useful in QKD networks with trusted relays. To illustrate the power of
the delayed PA idea, we use it to prove the security of a qubit-based two-way
deterministic QKD protocol which uses four states and four encoding operations.Comment: 11 pages, 3 figure
Richardson's pair diffusion and the stagnation point structure of turbulence
DNS and laboratory experiments show that the spatial distribution of
straining stagnation points in homogeneous isotropic 3D turbulence has a
fractal structure with dimension D_s = 2. In Kinematic Simulations the time
exponent gamma in Richardson's law and the fractal dimension D_s are related by
gamma = 6/D_s. The Richardson constant is found to be an increasing function of
the number of straining stagnation points in agreement with pair duffusion
occuring in bursts when pairs meet such points in the flow.Comment: 4 pages; Submitted to Phys. Rev. Let
Secure gated detection scheme for quantum cryptography
Several attacks have been proposed on quantum key distribution systems with
gated single-photon detectors. The attacks involve triggering the detectors
outside the center of the detector gate, and/or using bright illumination to
exploit classical photodiode mode of the detectors. Hence a secure detection
scheme requires two features: The detection events must take place in the
middle of the gate, and the detector must be single-photon sensitive. Here we
present a technique called bit-mapped gating, which is an elegant way to force
the detections in the middle of the detector gate by coupling detection time
and quantum bit error rate. We also discuss how to guarantee single-photon
sensitivity by directly measuring detector parameters. Bit-mapped gating also
provides a simple way to measure the detector blinding parameter in security
proofs for quantum key distribution systems with detector efficiency mismatch,
which up until now has remained a theoretical, unmeasurable quantity. Thus if
single-photon sensitivity can be guaranteed within the gates, a detection
scheme with bit-mapped gating satisfies the assumptions of the current security
proofs.Comment: 7 pages, 3 figure
A physical modeling approach for identification of source regions of primary and secondary air pollutants
International audienceThis paper describes a simple but practical methodology to identify the contribution of primary and secondary air pollutants from the local/regional emission sources to Hong Kong, a highly urbanized city with complex terrain and coastlines. The meteorological model MM5 coupled with a three-dimensional, mutli-particle trajectory model is used to identify salient aspects of regional air pollutant transport characteristics during some typical meteorological conditions over the Pearl River Delta (PRD) region. Several weighting factors are determined for calculating the air mass/pollutant trajectory and are used to evaluate the local and regional contribution of primary pollutants over the PRD to Hong Kong pollution. The relationships between emission inventories, physical paths and chemical transformation rates of the pollutants, and observational measurements are formulated. The local and regional contributions of secondary pollutants are obtained by this conceptual module under different weather scenarios. Our results demonstrate that major pollution sources over Hong Kong come from regional transport. In calm-weather situations, 78% of the respirable suspended particulates (RSP) totals in Hong Kong are contributed by regional transport, and 49% are contributed by the power plants within the PRD. In normal-day situations, 71% of the RSP are contributed by regional transport, and 45% are contributed by the power plants
- …