137 research outputs found
Continuous variable quantum cryptography
We propose a quantum cryptographic scheme in which small phase and amplitude
modulations of CW light beams carry the key information. The presence of EPR
type correlations provides the quantum protection.Comment: 8 pages, 3 figure
Thermal noise limitations to force measurements with torsion pendulums: Applications to the measurement of the Casimir force and its thermal correction
A general analysis of thermal noise in torsion pendulums is presented. The
specific case where the torsion angle is kept fixed by electronic feedback is
analyzed. This analysis is applied to a recent experiment that employed a
torsion pendulum to measure the Casimir force. The ultimate limit to the
distance at which the Casimir force can be measured to high accuracy is
discussed, and in particular the prospects for measuring the thermal correction
are elaborated upon.Comment: one figure, five pages, to be submitted to Phys Rev
Casimir Force on a Micrometer Sphere in a Dip: Proposal of an Experiment
The attractive Casimir force acting on a micrometer-sphere suspended in a
spherical dip, close to the wall, is discussed. This setup is in principle
directly accessible to experiment. The sphere and the substrate are assumed to
be made of the same perfectly conducting material.Comment: 11 pages, 1 figure; to appear in J. Phys. A: Math. Ge
Quantum key distribution in terms of the Greenberger-Horne-Zeilinger state: multi-key generation
In this paper, we develop a quantum key distribution protocol based on the
Greenberger-Horne-Zeilinger states (GHZs). The particles are exchanged among
the users in blocks through two steps. In this protocol, for three-particle
GHZs three keys can be simultaneously generated. The advantage of this is that
the users can select the most suitable key for communication. The protocol can
be generalized to users to provide keys. The protocol has two levels
for checking the eavesdroppers. Moreover, we discuss the security of the
protocol against different attacks.Comment: 10 Page, no figures. Comments are most welcom
A conditional-phase switch at the single-photon level
We present an experimental realization of a two-photon conditional-phase
switch, related to the ``-'' gate of quantum computation. This gate
relies on quantum interference between photon pairs, generating entanglement
between two optical modes through the process of spontaneous parametric
down-conversion (SPDC). The interference effect serves to enhance the effective
nonlinearity by many orders of magnitude, so it is significant at the quantum
(single-photon) level. By adjusting the relative optical phase between the
classical pump for SPDC and the pair of input modes, one can impress a large
phase shift on one beam which depends on the presence or absence of a single
photon in a control mode.Comment: 8 pages, 4 figure
Quantum Cryptography
Quantum cryptography could well be the first application of quantum mechanics
at the individual quanta level. The very fast progress in both theory and
experiments over the recent years are reviewed, with emphasis on open questions
and technological issues.Comment: 55 pages, 32 figures; to appear in Reviews of Modern Physic
Remote Data Retrieval for Bioinformatics Applications: An Agent Migration Approach
Some of the approaches have been developed to retrieve data automatically from one or multiple remote biological data sources. However, most of them require researchers to remain online and wait for returned results. The latter not only requires highly available network connection, but also may cause the network overload. Moreover, so far none of the existing approaches has been designed to address the following problems when retrieving the remote data in a mobile network environment: (1) the resources of mobile devices are limited; (2) network connection is relatively of low quality; and (3) mobile users are not always online. To address the aforementioned problems, we integrate an agent migration approach with a multi-agent system to overcome the high latency or limited bandwidth problem by moving their computations to the required resources or services. More importantly, the approach is fit for the mobile computing environments. Presented in this paper are also the system architecture, the migration strategy, as well as the security authentication of agent migration. As a demonstration, the remote data retrieval from GenBank was used to illustrate the feasibility of the proposed approach
- …