137 research outputs found

    Continuous variable quantum cryptography

    Get PDF
    We propose a quantum cryptographic scheme in which small phase and amplitude modulations of CW light beams carry the key information. The presence of EPR type correlations provides the quantum protection.Comment: 8 pages, 3 figure

    Thermal noise limitations to force measurements with torsion pendulums: Applications to the measurement of the Casimir force and its thermal correction

    Full text link
    A general analysis of thermal noise in torsion pendulums is presented. The specific case where the torsion angle is kept fixed by electronic feedback is analyzed. This analysis is applied to a recent experiment that employed a torsion pendulum to measure the Casimir force. The ultimate limit to the distance at which the Casimir force can be measured to high accuracy is discussed, and in particular the prospects for measuring the thermal correction are elaborated upon.Comment: one figure, five pages, to be submitted to Phys Rev

    Casimir Force on a Micrometer Sphere in a Dip: Proposal of an Experiment

    Full text link
    The attractive Casimir force acting on a micrometer-sphere suspended in a spherical dip, close to the wall, is discussed. This setup is in principle directly accessible to experiment. The sphere and the substrate are assumed to be made of the same perfectly conducting material.Comment: 11 pages, 1 figure; to appear in J. Phys. A: Math. Ge

    Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation

    Full text link
    In this paper, we develop a quantum key distribution protocol based on the Greenberger-Horne-Zeilinger states (GHZs). The particles are exchanged among the users in blocks through two steps. In this protocol, for three-particle GHZs three keys can be simultaneously generated. The advantage of this is that the users can select the most suitable key for communication. The protocol can be generalized to NN users to provide NN keys. The protocol has two levels for checking the eavesdroppers. Moreover, we discuss the security of the protocol against different attacks.Comment: 10 Page, no figures. Comments are most welcom

    A conditional-phase switch at the single-photon level

    Full text link
    We present an experimental realization of a two-photon conditional-phase switch, related to the ``cc-Ď•\phi '' gate of quantum computation. This gate relies on quantum interference between photon pairs, generating entanglement between two optical modes through the process of spontaneous parametric down-conversion (SPDC). The interference effect serves to enhance the effective nonlinearity by many orders of magnitude, so it is significant at the quantum (single-photon) level. By adjusting the relative optical phase between the classical pump for SPDC and the pair of input modes, one can impress a large phase shift on one beam which depends on the presence or absence of a single photon in a control mode.Comment: 8 pages, 4 figure

    Quantum Cryptography

    Get PDF
    Quantum cryptography could well be the first application of quantum mechanics at the individual quanta level. The very fast progress in both theory and experiments over the recent years are reviewed, with emphasis on open questions and technological issues.Comment: 55 pages, 32 figures; to appear in Reviews of Modern Physic

    Remote Data Retrieval for Bioinformatics Applications: An Agent Migration Approach

    Get PDF
    Some of the approaches have been developed to retrieve data automatically from one or multiple remote biological data sources. However, most of them require researchers to remain online and wait for returned results. The latter not only requires highly available network connection, but also may cause the network overload. Moreover, so far none of the existing approaches has been designed to address the following problems when retrieving the remote data in a mobile network environment: (1) the resources of mobile devices are limited; (2) network connection is relatively of low quality; and (3) mobile users are not always online. To address the aforementioned problems, we integrate an agent migration approach with a multi-agent system to overcome the high latency or limited bandwidth problem by moving their computations to the required resources or services. More importantly, the approach is fit for the mobile computing environments. Presented in this paper are also the system architecture, the migration strategy, as well as the security authentication of agent migration. As a demonstration, the remote data retrieval from GenBank was used to illustrate the feasibility of the proposed approach
    • …
    corecore