26,817 research outputs found

    Unconditionally Secure Bit Commitment

    Get PDF
    We describe a new classical bit commitment protocol based on cryptographic constraints imposed by special relativity. The protocol is unconditionally secure against classical or quantum attacks. It evades the no-go results of Mayers, Lo and Chau by requiring from Alice a sequence of communications, including a post-revelation verification, each of which is guaranteed to be independent of its predecessor.Comment: Typos corrected. Reference details added. To appear in Phys. Rev. Let

    Secure two-party quantum evaluation of unitaries against specious adversaries

    Full text link
    We describe how any two-party quantum computation, specified by a unitary which simultaneously acts on the registers of both parties, can be privately implemented against a quantum version of classical semi-honest adversaries that we call specious. Our construction requires two ideal functionalities to garantee privacy: a private SWAP between registers held by the two parties and a classical private AND-box equivalent to oblivious transfer. If the unitary to be evaluated is in the Clifford group then only one call to SWAP is required for privacy. On the other hand, any unitary not in the Clifford requires one call to an AND-box per R-gate in the circuit. Since SWAP is itself in the Clifford group, this functionality is universal for the private evaluation of any unitary in that group. SWAP can be built from a classical bit commitment scheme or an AND-box but an AND-box cannot be constructed from SWAP. It follows that unitaries in the Clifford group are to some extent the easy ones. We also show that SWAP cannot be implemented privately in the bare model

    Spectrophotovoltaic orbital power generation

    Get PDF
    A system with 1000 : 1 concentration ratio is defined, using a cassegrain telescope as the first stage concentration (270 x) and compound parabolic concentrators (CPC) for the second stage concentration of 4.7 x for each spectral band. Using reported state of the art (S.O.A.) solar cells device parameters and considering structural losses due to optics and beamsplitters, the efficiencies of one to four cell systems were calculated with efficiencies varying from approximately 22% to 30%. Taking into account cost of the optics, beamsplitter, radiator, and the cost of developing new cells the most cost effective system is the GaAs/Si system

    Template-based Gravitational-Wave Echoes Search Using Bayesian Model Selection

    Get PDF
    The ringdown of the gravitational-wave signal from a merger of two black holes has been suggested as a probe of the structure of the remnant compact object, which may be more exotic than a black hole. It has been pointed out that there will be a train of echoes in the late-time ringdown stage for different types of exotic compact objects. In this paper, we present a template-based search methodology using Bayesian statistics to search for echoes of gravitational waves. Evidence for the presence or absence of echoes in gravitational-wave events can be established by performing Bayesian model selection. The Occam factor in Bayesian model selection will automatically penalize the more complicated model that echoes are present in gravitational-wave strain data because of its higher degree of freedom to fit the data. We find that the search methodology was able to identify gravitational-wave echoes with Abedi et al.'s echoes waveform model about 82.3% of the time in simulated Gaussian noise in the Advanced LIGO and Virgo network and about 61.1% of the time in real noise in the first observing run of Advanced LIGO with 5σ\geq 5\sigma significance. Analyses using this method are performed on the data of Advanced LIGO's first observing run, and we find no statistical significant evidence for the detection of gravitational-wave echoes. In particular, we find <1σ<1\sigma combined evidence of the three events in Advanced LIGO's first observing run. The analysis technique developed in this paper is independent of the waveform model used, and can be used with different parametrized echoes waveform models to provide more realistic evidence of the existence of echoes from exotic compact objects.Comment: 16 pages, 6 figure

    Drag Reduction by Bubble Oscillations

    Full text link
    Drag reduction in stationary turbulent flows by bubbles is sensitive to the dynamics of bubble oscillations. Without this dynamical effect the bubbles only renormalize the fluid density and viscosity, an effect that by itself can only lead to a small percentage of drag reduction. We show in this paper that the dynamics of bubbles and their effect on the compressibility of the mixture can lead to a much higher drag reduction.Comment: 7 pages, 1 figure, submitted to Phys. Rev.

    Alternative schemes for measurement-device-independent quantum key distribution

    Full text link
    Practical schemes for measurement-device-independent quantum key distribution using phase and path or time encoding are presented. In addition to immunity to existing loopholes in detection systems, our setup employs simple encoding and decoding modules without relying on polarization maintenance or optical switches. Moreover, by employing a modified sifting technique to handle the dead-time limitations in single-photon detectors, our scheme can be run with only two single-photon detectors. With a phase-postselection technique, a decoy-state variant of our scheme is also proposed, whose key generation rate scales linearly with the channel transmittance.Comment: 30 pages, 5 figure

    Numerical studies of identification in nonlinear distributed parameter systems

    Get PDF
    An abstract approximation framework and convergence theory for the identification of first and second order nonlinear distributed parameter systems developed previously by the authors and reported on in detail elsewhere are summarized and discussed. The theory is based upon results for systems whose dynamics can be described by monotone operators in Hilbert space and an abstract approximation theorem for the resulting nonlinear evolution system. The application of the theory together with numerical evidence demonstrating the feasibility of the general approach are discussed in the context of the identification of a first order quasi-linear parabolic model for one dimensional heat conduction/mass transport and the identification of a nonlinear dissipation mechanism (i.e., damping) in a second order one dimensional wave equation. Computational and implementational considerations, in particular, with regard to supercomputing, are addressed

    On the communication cost of entanglement transformations

    Get PDF
    We study the amount of communication needed for two parties to transform some given joint pure state into another one, either exactly or with some fidelity. Specifically, we present a method to lower bound this communication cost even when the amount of entanglement does not increase. Moreover, the bound applies even if the initial state is supplemented with unlimited entanglement in the form of EPR pairs, and the communication is allowed to be quantum mechanical. We then apply the method to the determination of the communication cost of asymptotic entanglement concentration and dilution. While concentration is known to require no communication whatsoever, the best known protocol for dilution, discovered by Lo and Popescu [Phys. Rev. Lett. 83(7):1459--1462, 1999], requires a number of bits to be exchanged which is of the order of the square root of the number of EPR pairs. Here we prove a matching lower bound of the same asymptotic order, demonstrating the optimality of the Lo-Popescu protocol up to a constant factor and establishing the existence of a fundamental asymmetry between the concentration and dilution tasks. We also discuss states for which the minimal communication cost is proportional to their entanglement, such as the states recently introduced in the context of ``embezzling entanglement'' [W. van Dam and P. Hayden, quant-ph/0201041].Comment: 9 pages, 1 figure. Added a reference and some further explanations. In v3 some arguments are given in more detai

    ILLICON Analysis of Ellingsrud Test Fill

    Get PDF
    The 50-m diameter test fill at Ellingsrud, Norway was constructed by NGI to determine preconsolidation pressure of a soft clay, mobilized under field conditions. The height of the fill was increased in four increments during 1972 to 1978. Settlement observations as well as pore water pressure measurements over a period of eleven years are used to evaluate predictions made by the ILLICON computer program. ILLICON analysis requires vertical profiles of compressibility and permeability parameters. The computed surface settlements are within 2 cm of the measured values during the first three loading stages. After the fourth loading, there is a larger range in the measured settlements, however, the computed values lie within the measured range. The computed pore water pressures are also in reasonable agreement with the observations. However, compressibility and permeability data for major depth intervals of the 24m soil profile are not available. Therefore, in spite of good agreement between prediction and field observation one cannot be completely certain whether the input parameters in fact represent the true condition of the soil
    corecore