571 research outputs found

    Surficial Geology of the Bennett (Iowa) 7.5\u27\u27 Quadrangle,

    Get PDF
    https://ir.uiowa.edu/igs_ofm/1045/thumbnail.jp

    Composability in quantum cryptography

    Full text link
    In this article, we review several aspects of composability in the context of quantum cryptography. The first part is devoted to key distribution. We discuss the security criteria that a quantum key distribution protocol must fulfill to allow its safe use within a larger security application (e.g., for secure message transmission). To illustrate the practical use of composability, we show how to generate a continuous key stream by sequentially composing rounds of a quantum key distribution protocol. In a second part, we take a more general point of view, which is necessary for the study of cryptographic situations involving, for example, mutually distrustful parties. We explain the universal composability framework and state the composition theorem which guarantees that secure protocols can securely be composed to larger applicationsComment: 18 pages, 2 figure

    Surficial Geologic Materials of the McCausland 7.5\u27\u27 Quadrangle Scott County, Iowa

    Get PDF
    https://ir.uiowa.edu/igs_ofm/1035/thumbnail.jp

    Surficial geologic materials of the Dixon 7.5\u27\u27 Quadrangle, Scott County, Iowa

    Get PDF
    https://ir.uiowa.edu/igs_ofm/1040/thumbnail.jp

    Tight Finite-Key Analysis for Quantum Cryptography

    Get PDF
    Despite enormous progress both in theoretical and experimental quantum cryptography, the security of most current implementations of quantum key distribution is still not established rigorously. One of the main problems is that the security of the final key is highly dependent on the number, M, of signals exchanged between the legitimate parties. While, in any practical implementation, M is limited by the available resources, existing security proofs are often only valid asymptotically for unrealistically large values of M. Here, we demonstrate that this gap between theory and practice can be overcome using a recently developed proof technique based on the uncertainty relation for smooth entropies. Specifically, we consider a family of Bennett-Brassard 1984 quantum key distribution protocols and show that security against general attacks can be guaranteed already for moderate values of M.Comment: 11 pages, 2 figure

    Impact Ionization in ZnS

    Full text link
    The impact ionization rate and its orientation dependence in k space is calculated for ZnS. The numerical results indicate a strong correlation to the band structure. The use of a q-dependent screening function for the Coulomb interaction between conduction and valence electrons is found to be essential. A simple fit formula is presented for easy calculation of the energy dependent transition rate.Comment: 9 pages LaTeX file, 3 EPS-figures (use psfig.sty), accepted for publication in PRB as brief Report (LaTeX source replaces raw-postscript file
    • …
    corecore