1,080 research outputs found

    09311 Abstracts Collection -- Classical and Quantum Information Assurance Foundations and Practice

    Get PDF
    From 26 July 2009 to 31 July 2009, the Dagstuhl Seminar 09311 ``Classical and Quantum Information Assurance Foundations and Practice\u27\u27 was held in Schloss Dagstuhl~--~Leibniz Center for Informatics. The workshop was intended to explore the latest developments and discuss the open issues in the theory and practice of classical and quantum information assurance. A further goal of the workshop was to bring together practitioners from both the classical and the quantum information assurance communities. To date, with a few exceptions, these two communities seem to have existed largely separately and in a state of mutual ignorance. It is clear however that there is great potential for synergy and cross-fertilization between and this we sought to stimulate and facilitate

    Intrinsic time gravity and the Lichnerowicz-York equation

    Full text link
    We investigate the effect on the Hamiltonian structure of general relativity of choosing an intrinsic time to fix the time slicing. 3-covariance with momentum constraint is maintained, but the Hamiltonian constraint is replaced by a dynamical equation for the trace of the momentum. This reveals a very simple structure with a local reduced Hamiltonian. The theory is easily generalised; in particular, the square of the Cotton-York tensor density can be added as an extra part of the potential while at the same time maintaining the classic 2 + 2 degrees of freedom. Initial data construction is simple in the extended theory; we get a generalised Lichnerowicz-York equation with nice existence and uniqueness properties. Adding standard matter fields is quite straightforward.Comment: 4 page

    Large collective Lamb shift of two distant superconducting artificial atoms

    Get PDF
    Virtual photons can mediate interaction between atoms, resulting in an energy shift known as a collective Lamb shift. Observing the collective Lamb shift is challenging, since it can be obscured by radiative decay and direct atom-atom interactions. Here, we place two superconducting qubits in a transmission line terminated by a mirror, which suppresses decay. We measure a collective Lamb shift reaching 0.8% of the qubit transition frequency and exceeding the transition linewidth. We also show that the qubits can interact via the transmission line even if one of them does not decay into it.Comment: 7+5 pages, 4+2 figure

    Upper bounds for the secure key rate of decoy state quantum key distribution

    Full text link
    The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security analysis of these schemes, however, leaves open the possibility that the development of better proof techniques, or better classical post-processing methods, might further improve their performance in realistic scenarios. In this paper, we derive upper bounds on the secure key rate for decoy state QKD. These bounds are based basically only on the classical correlations established by the legitimate users during the quantum communication phase of the protocol. The only assumption about the possible post-processing methods is that double click events are randomly assigned to single click events. Further we consider only secure key rates based on the uncalibrated device scenario which assigns imperfections such as detection inefficiency to the eavesdropper. Our analysis relies on two preconditions for secure two-way and one-way QKD: The legitimate users need to prove that there exists no separable state (in the case of two-way QKD), or that there exists no quantum state having a symmetric extension (one-way QKD), that is compatible with the available measurements results. Both criteria have been previously applied to evaluate single-photon implementations of QKD. Here we use them to investigate a realistic source of weak coherent pulses. The resulting upper bounds can be formulated as a convex optimization problem known as a semidefinite program which can be efficiently solved. For the standard four-state QKD protocol, they are quite close to known lower bounds, thus showing that there are clear limits to the further improvement of classical post-processing techniques in decoy state QKD.Comment: 10 pages, 3 figure

    Security proof of a three-state quantum key distribution protocol without rotational symmetry

    Get PDF
    Standard security proofs of quantum key distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states, |0_z> and |1_z>, can contribute to key generation and the third state, |+>=(|0_z>+|1_z>)/\sqrt{2}, is for channel estimation. This protocol has been proposed and implemented experimentally in some frequency-based QKD systems where the three states can be prepared easily. Thus, by founding on the security of this three-state protocol, we prove that these QKD schemes are, in fact, unconditionally secure against any attacks allowed by quantum mechanics. The main task in our proof is to upper bound the phase error rate of the qubits given the bit error rates observed. Unconditional security can then be proved not only for the ideal case of a single-photon source and perfect detectors, but also for the realistic case of a phase-randomized weak coherent light source and imperfect threshold detectors. Our result on the phase error rate upper bound is independent of the loss in the channel. Also, we compare the three-state protocol with the BB84 protocol. For the single-photon source case, our result proves that the BB84 protocol strictly tolerates a higher quantum bit error rate than the three-state protocol; while for the coherent-source case, the BB84 protocol achieves a higher key generation rate and secure distance than the three-state protocol when a decoy-state method is used.Comment: 10 pages, 3 figures, 2 column

    Ultimate quantum limit for amplification: A single atom in front of a mirror

    Get PDF
    We investigate three types of amplification processes for light fields coupling to an atom near the end of a one-dimensional (1D) semi-infinite waveguide. We consider two setups where a drive creates population inversion in the bare or dressed basis of a three-level atom and one setup where the amplification is due to higher-order processes in a driven two-level atom. In all cases, the end of the waveguide acts as a mirror for the light. We find that this enhances the amplification in two ways compared to the same setups in an open waveguide. Firstly, the mirror forces all output from the atom to travel in one direction instead of being split up into two output channels. Secondly, interference due to the mirror enables tuning of the ratio of relaxation rates for different transitions in the atom to increase population inversion. We quantify the enhancement in amplification due to these factors and show that it can be demonstrated for standard parameters in experiments with superconducting quantum circuits

    LinkHub: a Semantic Web system that facilitates cross-database queries and information retrieval in proteomics

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>A key abstraction in representing proteomics knowledge is the notion of unique identifiers for individual entities (e.g. proteins) and the massive graph of relationships among them. These relationships are sometimes simple (e.g. synonyms) but are often more complex (e.g. one-to-many relationships in protein family membership).</p> <p>Results</p> <p>We have built a software system called LinkHub using Semantic Web RDF that manages the graph of identifier relationships and allows exploration with a variety of interfaces. For efficiency, we also provide relational-database access and translation between the relational and RDF versions. LinkHub is practically useful in creating small, local hubs on common topics and then connecting these to major portals in a federated architecture; we have used LinkHub to establish such a relationship between UniProt and the North East Structural Genomics Consortium. LinkHub also facilitates queries and access to information and documents related to identifiers spread across multiple databases, acting as "connecting glue" between different identifier spaces. We demonstrate this with example queries discovering "interologs" of yeast protein interactions in the worm and exploring the relationship between gene essentiality and pseudogene content. We also show how "protein family based" retrieval of documents can be achieved. LinkHub is available at hub.gersteinlab.org and hub.nesg.org with supplement, database models and full-source code.</p> <p>Conclusion</p> <p>LinkHub leverages Semantic Web standards-based integrated data to provide novel information retrieval to identifier-related documents through relational graph queries, simplifies and manages connections to major hubs such as UniProt, and provides useful interactive and query interfaces for exploring the integrated data.</p

    Dynamical Fine Tuning in Brane Inflation

    Full text link
    We investigate a novel mechanism of dynamical tuning of a flat potential in the open string landscape within the context of warped brane-antibrane inflation in type IIB string theory. Because of competing effects between interactions with the moduli stabilizing D7-branes in the warped throat and anti-D3-branes at the tip, a stack of branes gives rise to a local minimum of the potential, holding the branes high up in the throat. As branes successively tunnel out of the local minimum to the bottom of the throat the potential barrier becomes lower and is eventually replaced by a flat inflection point, around which the remaining branes easily inflate. This dynamical flattening of the inflaton potential reduces the need to fine tune the potential by hand, and also leads to successful inflation for a larger range of inflaton initial conditions, due to trapping in the local minimum.Comment: 23 pages, 9 figures. v2: Updated D3-dependence in potential, small changes to numerical result
    • …
    corecore