1,671 research outputs found

    Unconditionally secure key distillation from multi-photons

    Full text link
    In this paper, we prove that the unconditionally secure key can be surprisingly extracted from {\it multi}-photon emission part in the photon polarization-based QKD. One example is shown by explicitly proving that one can indeed generate an unconditionally secure key from Alice's two-photon emission part in ``Quantum cryptography protocols robust against photon number splitting attacks for weak laser pulses implementations'' proposed by V. Scarani {\it et al.,} in Phys. Rev. Lett. {\bf 92}, 057901 (2004), which is called SARG04. This protocol uses the same four states as in BB84 and differs only in the classical post-processing protocol. It is, thus, interesting to see how the classical post-processing of quantum key distribution might qualitatively change its security. We also show that one can generate an unconditionally secure key from the single to the four-photon part in a generalized SARG04 that uses six states. Finally, we also compare the bit error rate threshold of these protocols with the one in BB84 and the original six-state protocol assuming a depolarizing channel.Comment: The title has changed again. We considerably improved our presentation, and furthermore we proposed & analyzed a security of a modified SARG04 protocol, which uses six state

    I=2 Two-Pion Wave Function and Scattering Phase Shift

    Get PDF
    We calculate a two-pion wave function for the I=2 SS-wave two-pion system with a finite scattering momentum and estimate the interaction range between two pions, which allows us to examine the validity of a necessary condition for the finite size formula presented by Rummukainen and Gottlieb. We work in the quenched approximation employing the plaquette gauge action for gluons and the improved Wilson action for quarks at 1/a=1.63GeV1/a=1.63 {\rm GeV} on 323×12032^3\times 120 lattice. The quark masses are chosen to give mπ=0.420m_\pi = 0.420, 0.488 and 0.587GeV0.587 {\rm GeV}. We find that the energy dependence of the interaction range is small and the necessary condition is satisfied for our range of the quark mass and the scattering momentum, k≤0.16GeVk \le 0.16 {\rm GeV}. We also find that the scattering phase shift can be obtained with a smaller statistical error from the two-pion wave function than from the two-pion time correlator.Comment: 23 pages, 7 figures, added a reference (Phys.Rev.D73:054503,2006) in v

    Quantum circuit for security proof of quantum key distribution without encryption of error syndrome and noisy processing

    Full text link
    One of the simplest security proofs of quantum key distribution is based on the so-called complementarity scenario, which involves the complementarity control of an actual protocol and a virtual protocol [M. Koashi, e-print arXiv:0704.3661 (2007)]. The existing virtual protocol has a limitation in classical postprocessing, i.e., the syndrome for the error-correction step has to be encrypted. In this paper, we remove this limitation by constructing a quantum circuit for the virtual protocol. Moreover, our circuit with a shield system gives an intuitive proof of why adding noise to the sifted key increases the bit error rate threshold in the general case in which one of the parties does not possess a qubit. Thus, our circuit bridges the simple proof and the use of wider classes of classical postprocessing.Comment: 8 pages, 2 figures. Typo correcte

    On the performance of two protocols: SARG04 and BB84

    Full text link
    We compare the performance of BB84 and SARG04, the later of which was proposed by V. Scarani et al., in Phys. Rev. Lett. 92, 057901 (2004). Specifically, in this paper, we investigate SARG04 with two-way classical communications and SARG04 with decoy states. In the first part of the paper, we show that SARG04 with two-way communications can tolerate a higher bit error rate (19.4% for a one-photon source and 6.56% for a two-photon source) than SARG04 with one-way communications (10.95% for a one-photon source and 2.71% for a two-photon source). Also, the upper bounds on the bit error rate for SARG04 with two-way communications are computed in a closed form by considering an individual attack based on a general measurement. In the second part of the paper, we propose employing the idea of decoy states in SARG04 to obtain unconditional security even when realistic devices are used. We compare the performance of SARG04 with decoy states and BB84 with decoy states. We find that the optimal mean-photon number for SARG04 is higher than that of BB84 when the bit error rate is small. Also, we observe that SARG04 does not achieve a longer secure distance and a higher key generation rate than BB84, assuming a typical experimental parameter set.Comment: 48 pages, 10 figures, 1 column, changed Figs. 7 and

    Shape of Deconstruction

    Full text link
    We construct a six-dimensional Maxwell theory using a latticized extra space, the continuum limit of which is a shifted torus recently discussed by Dienes. This toy model exhibits the correspondence between continuum theory and discrete theory, and give a geometrical insight to theory-space model building.Comment: 10 pages, 2 figures, RevTeX4. a citation adde

    Addendum to "Classical and Quantum Evolutions of the de Sitter and the anti-de Sitter Universes in 2+1 dimensions"

    Full text link
    The previous discussion \cite{ezawa} on reducing the phase space of the first order Einstein gravity in 2+1 dimensions is reconsidered. We construct a \lq\lq correct" physical phase space in the case of positive cosmological constant, taking into account the geometrical feature of SO(3,1) connections. A parametrization which unifies the two sectors of the physical phase space is also given.Comment: Latex 8 pages (Crucial and essential changes have been made.

    Expedite requests in Raytheon's North Texas supply chain

    Get PDF
    Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; in conjunction with the Leaders for Manufacturing Program at MIT, 2006.Includes bibliographical references (p. 69-70).In December 2004, a manager at Raytheon Company articulated in the form of an LFM (Leaders for Manufacturing) internship proposal his belief that someone should do something about the amounts of time and money that Raytheon's North Texas plants spent handling expedite requests-requests that someone provide goods or services more quickly than normal. This thesis attempts to summarize the thoughts, learnings, initiatives, and outcomes associated with the ensuing effort. In particular, a large section of the paper is devoted to a case study of the most involved initiative: the devising and implementing of a new dispatching method in one small but central operation in an organization with a long history of processing things first in, first out. While for the project team the compelling factor was achieving a specific dollar impact, the reader of this paper will probably be more interested in the methodology than in Raytheon's ROI. Research for this thesis was conducted during a six-month internship with Raytheon Company's Space and Airborne Systems Supply Chain Management group in McKinney, TX, and Dallas, TX. The internship was affiliated with the Massachusetts Institute of Technology's Leaders for Manufacturing (LFM) Program.by Scott K. Hiroshige.S.M.M.B.A
    • …
    corecore