26,817 research outputs found
Unconditionally Secure Bit Commitment
We describe a new classical bit commitment protocol based on cryptographic
constraints imposed by special relativity. The protocol is unconditionally
secure against classical or quantum attacks. It evades the no-go results of
Mayers, Lo and Chau by requiring from Alice a sequence of communications,
including a post-revelation verification, each of which is guaranteed to be
independent of its predecessor.Comment: Typos corrected. Reference details added. To appear in Phys. Rev.
Let
Secure two-party quantum evaluation of unitaries against specious adversaries
We describe how any two-party quantum computation, specified by a unitary
which simultaneously acts on the registers of both parties, can be privately
implemented against a quantum version of classical semi-honest adversaries that
we call specious. Our construction requires two ideal functionalities to
garantee privacy: a private SWAP between registers held by the two parties and
a classical private AND-box equivalent to oblivious transfer. If the unitary to
be evaluated is in the Clifford group then only one call to SWAP is required
for privacy. On the other hand, any unitary not in the Clifford requires one
call to an AND-box per R-gate in the circuit. Since SWAP is itself in the
Clifford group, this functionality is universal for the private evaluation of
any unitary in that group. SWAP can be built from a classical bit commitment
scheme or an AND-box but an AND-box cannot be constructed from SWAP. It follows
that unitaries in the Clifford group are to some extent the easy ones. We also
show that SWAP cannot be implemented privately in the bare model
Spectrophotovoltaic orbital power generation
A system with 1000 : 1 concentration ratio is defined, using a cassegrain telescope as the first stage concentration (270 x) and compound parabolic concentrators (CPC) for the second stage concentration of 4.7 x for each spectral band. Using reported state of the art (S.O.A.) solar cells device parameters and considering structural losses due to optics and beamsplitters, the efficiencies of one to four cell systems were calculated with efficiencies varying from approximately 22% to 30%. Taking into account cost of the optics, beamsplitter, radiator, and the cost of developing new cells the most cost effective system is the GaAs/Si system
Template-based Gravitational-Wave Echoes Search Using Bayesian Model Selection
The ringdown of the gravitational-wave signal from a merger of two black
holes has been suggested as a probe of the structure of the remnant compact
object, which may be more exotic than a black hole. It has been pointed out
that there will be a train of echoes in the late-time ringdown stage for
different types of exotic compact objects. In this paper, we present a
template-based search methodology using Bayesian statistics to search for
echoes of gravitational waves. Evidence for the presence or absence of echoes
in gravitational-wave events can be established by performing Bayesian model
selection. The Occam factor in Bayesian model selection will automatically
penalize the more complicated model that echoes are present in
gravitational-wave strain data because of its higher degree of freedom to fit
the data. We find that the search methodology was able to identify
gravitational-wave echoes with Abedi et al.'s echoes waveform model about 82.3%
of the time in simulated Gaussian noise in the Advanced LIGO and Virgo network
and about 61.1% of the time in real noise in the first observing run of
Advanced LIGO with significance. Analyses using this method are
performed on the data of Advanced LIGO's first observing run, and we find no
statistical significant evidence for the detection of gravitational-wave
echoes. In particular, we find combined evidence of the three events
in Advanced LIGO's first observing run. The analysis technique developed in
this paper is independent of the waveform model used, and can be used with
different parametrized echoes waveform models to provide more realistic
evidence of the existence of echoes from exotic compact objects.Comment: 16 pages, 6 figure
Drag Reduction by Bubble Oscillations
Drag reduction in stationary turbulent flows by bubbles is sensitive to the
dynamics of bubble oscillations. Without this dynamical effect the bubbles only
renormalize the fluid density and viscosity, an effect that by itself can only
lead to a small percentage of drag reduction. We show in this paper that the
dynamics of bubbles and their effect on the compressibility of the mixture can
lead to a much higher drag reduction.Comment: 7 pages, 1 figure, submitted to Phys. Rev.
Alternative schemes for measurement-device-independent quantum key distribution
Practical schemes for measurement-device-independent quantum key distribution
using phase and path or time encoding are presented. In addition to immunity to
existing loopholes in detection systems, our setup employs simple encoding and
decoding modules without relying on polarization maintenance or optical
switches. Moreover, by employing a modified sifting technique to handle the
dead-time limitations in single-photon detectors, our scheme can be run with
only two single-photon detectors. With a phase-postselection technique, a
decoy-state variant of our scheme is also proposed, whose key generation rate
scales linearly with the channel transmittance.Comment: 30 pages, 5 figure
Numerical studies of identification in nonlinear distributed parameter systems
An abstract approximation framework and convergence theory for the identification of first and second order nonlinear distributed parameter systems developed previously by the authors and reported on in detail elsewhere are summarized and discussed. The theory is based upon results for systems whose dynamics can be described by monotone operators in Hilbert space and an abstract approximation theorem for the resulting nonlinear evolution system. The application of the theory together with numerical evidence demonstrating the feasibility of the general approach are discussed in the context of the identification of a first order quasi-linear parabolic model for one dimensional heat conduction/mass transport and the identification of a nonlinear dissipation mechanism (i.e., damping) in a second order one dimensional wave equation. Computational and implementational considerations, in particular, with regard to supercomputing, are addressed
On the communication cost of entanglement transformations
We study the amount of communication needed for two parties to transform some
given joint pure state into another one, either exactly or with some fidelity.
Specifically, we present a method to lower bound this communication cost even
when the amount of entanglement does not increase. Moreover, the bound applies
even if the initial state is supplemented with unlimited entanglement in the
form of EPR pairs, and the communication is allowed to be quantum mechanical.
We then apply the method to the determination of the communication cost of
asymptotic entanglement concentration and dilution. While concentration is
known to require no communication whatsoever, the best known protocol for
dilution, discovered by Lo and Popescu [Phys. Rev. Lett. 83(7):1459--1462,
1999], requires a number of bits to be exchanged which is of the order of the
square root of the number of EPR pairs. Here we prove a matching lower bound of
the same asymptotic order, demonstrating the optimality of the Lo-Popescu
protocol up to a constant factor and establishing the existence of a
fundamental asymmetry between the concentration and dilution tasks.
We also discuss states for which the minimal communication cost is
proportional to their entanglement, such as the states recently introduced in
the context of ``embezzling entanglement'' [W. van Dam and P. Hayden,
quant-ph/0201041].Comment: 9 pages, 1 figure. Added a reference and some further explanations.
In v3 some arguments are given in more detai
ILLICON Analysis of Ellingsrud Test Fill
The 50-m diameter test fill at Ellingsrud, Norway was constructed by NGI to determine preconsolidation pressure of a soft clay, mobilized under field conditions. The height of the fill was increased in four increments during 1972 to 1978. Settlement observations as well as pore water pressure measurements over a period of eleven years are used to evaluate predictions made by the ILLICON computer program. ILLICON analysis requires vertical profiles of compressibility and permeability parameters. The computed surface settlements are within 2 cm of the measured values during the first three loading stages. After the fourth loading, there is a larger range in the measured settlements, however, the computed values lie within the measured range. The computed pore water pressures are also in reasonable agreement with the observations. However, compressibility and permeability data for major depth intervals of the 24m soil profile are not available. Therefore, in spite of good agreement between prediction and field observation one cannot be completely certain whether the input parameters in fact represent the true condition of the soil
- …