23,677 research outputs found

    Two monotonic functions involving gamma function and volume of unit ball

    Full text link
    In present paper, we prove the monotonicity of two functions involving the gamma function Γ(x)\Gamma(x) and relating to the nn-dimensional volume of the unit ball Bn\mathbb{B}^n in Rn\mathbb{R}^n.Comment: 7 page

    On the Application of Gluon to Heavy Quarkonium Fragmentation Functions

    Get PDF
    We analyze the uncertainties induced by different definitions of the momentum fraction zz in the application of gluon to heavy quarkonium fragmentation function. We numerically calculate the initial gJ/ψg \to J / \psi fragmentation functions by using the non-covariant definitions of zz with finite gluon momentum and find that these fragmentation functions have strong dependence on the gluon momentum k\vec{k}. As k| \vec{k} | \to \infty, these fragmentation functions approach to the fragmentation function in the light-cone definition. Our numerical results show that large uncertainties remains while the non-covariant definitions of zz are employed in the application of the fragmentation functions. We present for the first time the polarized gluon to J/ψJ/\psi fragmentation functions, which are fitted by the scheme exploited in this work.Comment: 11 pages, 7 figures;added reference for sec.

    Valley dependent many-body effects in 2D semiconductors

    Full text link
    We calculate the valley degeneracy (gvg_v) dependence of the many-body renormalization of quasiparticle properties in multivalley 2D semiconductor structures due to the Coulomb interaction between the carriers. Quite unexpectedly, the gvg_v dependence of many-body effects is nontrivial and non-generic, and depends qualitatively on the specific Fermi liquid property under consideration. While the interacting 2D compressibility manifests monotonically increasing many-body renormalization with increasing gvg_v, the 2D spin susceptibility exhibits an interesting non-monotonic gvg_v dependence with the susceptibility increasing (decreasing) with gvg_v for smaller (larger) values of gvg_v with the renormalization effect peaking around gv12g_v\sim 1-2. Our theoretical results provide a clear conceptual understanding of recent valley-dependent 2D susceptibility measurements in AlAs quantum wells.Comment: 5 pages, 3 figure

    Phase-Remapping Attack in Practical Quantum Key Distribution Systems

    Full text link
    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the "plug & play" system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.Comment: 13 pages, 8 figure

    Experimental demonstration of phase-remapping attack in a practical quantum key distribution system

    Full text link
    Unconditional security proofs of various quantum key distribution (QKD) protocols are built on idealized assumptions. One key assumption is: the sender (Alice) can prepare the required quantum states without errors. However, such an assumption may be violated in a practical QKD system. In this paper, we experimentally demonstrate a technically feasible "intercept-and-resend" attack that exploits such a security loophole in a commercial "plug & play" QKD system. The resulting quantum bit error rate is 19.7%, which is below the proven secure bound of 20.0% for the BB84 protocol. The attack we utilize is the phase-remapping attack (C.-H. F. Fung, et al., Phys. Rev. A, 75, 32314, 2007) proposed by our group.Comment: 16 pages, 6 figure

    Uniqueness of nontrivially complete monotonicity for a class of functions involving polygamma functions

    Full text link
    For m,nNm,n\in\mathbb{N}, let fm,n(x)=[ψ(m)(x)]2+ψ(n)(x)f_{m,n}(x)=\bigr[\psi^{(m)}(x)\bigl]^2+\psi^{(n)}(x) on (0,)(0,\infty). In the present paper, we prove using two methods that, among all fm,n(x)f_{m,n}(x) for m,nNm,n\in\mathbb{N}, only f1,2(x)f_{1,2}(x) is nontrivially completely monotonic on (0,)(0,\infty). Accurately, the functions f1,2(x)f_{1,2}(x) and fm,2n1(x)f_{m,2n-1}(x) are completely monotonic on (0,)(0,\infty), but the functions fm,2n(x)f_{m,2n}(x) for (m,n)(1,1)(m,n)\ne(1,1) are not monotonic and does not keep the same sign on (0,)(0,\infty).Comment: 9 page

    Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"

    Full text link
    This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98, 231104 (2011); arXiv:1106.2675v1 [quant-ph]].Comment: 2 page

    Monotonicity and logarithmic convexity relating to the volume of the unit ball

    Full text link
    Let Ωn\Omega_n stand for the volume of the unit ball in Rn\mathbb{R}^n for nNn\in\mathbb{N}. In the present paper, we prove that the sequence Ωn1/(nlnn)\Omega_{n}^{1/(n\ln n)} is logarithmically convex and that the sequence Ωn1/(nlnn)Ωn+11/[(n+1)ln(n+1)]\frac{\Omega_{n}^{1/(n\ln n)}}{\Omega_{n+1}^{1/[(n+1)\ln(n+1)]}} is strictly decreasing for n2n\ge2. In addition, some monotonic and concave properties of several functions relating to Ωn\Omega_{n} are extended and generalized.Comment: 12 page
    corecore