1,671 research outputs found
Unconditionally secure key distillation from multi-photons
In this paper, we prove that the unconditionally secure key can be
surprisingly extracted from {\it multi}-photon emission part in the photon
polarization-based QKD. One example is shown by explicitly proving that one can
indeed generate an unconditionally secure key from Alice's two-photon emission
part in ``Quantum cryptography protocols robust against photon number splitting
attacks for weak laser pulses implementations'' proposed by V. Scarani {\it et
al.,} in Phys. Rev. Lett. {\bf 92}, 057901 (2004), which is called SARG04. This
protocol uses the same four states as in BB84 and differs only in the classical
post-processing protocol. It is, thus, interesting to see how the classical
post-processing of quantum key distribution might qualitatively change its
security. We also show that one can generate an unconditionally secure key from
the single to the four-photon part in a generalized SARG04 that uses six
states. Finally, we also compare the bit error rate threshold of these
protocols with the one in BB84 and the original six-state protocol assuming a
depolarizing channel.Comment: The title has changed again. We considerably improved our
presentation, and furthermore we proposed & analyzed a security of a modified
SARG04 protocol, which uses six state
I=2 Two-Pion Wave Function and Scattering Phase Shift
We calculate a two-pion wave function for the I=2 -wave two-pion system
with a finite scattering momentum and estimate the interaction range between
two pions, which allows us to examine the validity of a necessary condition for
the finite size formula presented by Rummukainen and Gottlieb. We work in the
quenched approximation employing the plaquette gauge action for gluons and the
improved Wilson action for quarks at on
lattice. The quark masses are chosen to give , 0.488 and . We find that the energy dependence of the interaction range is
small and the necessary condition is satisfied for our range of the quark mass
and the scattering momentum, . We also find that the
scattering phase shift can be obtained with a smaller statistical error from
the two-pion wave function than from the two-pion time correlator.Comment: 23 pages, 7 figures, added a reference (Phys.Rev.D73:054503,2006) in
v
Quantum circuit for security proof of quantum key distribution without encryption of error syndrome and noisy processing
One of the simplest security proofs of quantum key distribution is based on
the so-called complementarity scenario, which involves the complementarity
control of an actual protocol and a virtual protocol [M. Koashi, e-print
arXiv:0704.3661 (2007)]. The existing virtual protocol has a limitation in
classical postprocessing, i.e., the syndrome for the error-correction step has
to be encrypted. In this paper, we remove this limitation by constructing a
quantum circuit for the virtual protocol. Moreover, our circuit with a shield
system gives an intuitive proof of why adding noise to the sifted key increases
the bit error rate threshold in the general case in which one of the parties
does not possess a qubit. Thus, our circuit bridges the simple proof and the
use of wider classes of classical postprocessing.Comment: 8 pages, 2 figures. Typo correcte
On the performance of two protocols: SARG04 and BB84
We compare the performance of BB84 and SARG04, the later of which was
proposed by V. Scarani et al., in Phys. Rev. Lett. 92, 057901 (2004).
Specifically, in this paper, we investigate SARG04 with two-way classical
communications and SARG04 with decoy states. In the first part of the paper, we
show that SARG04 with two-way communications can tolerate a higher bit error
rate (19.4% for a one-photon source and 6.56% for a two-photon source) than
SARG04 with one-way communications (10.95% for a one-photon source and 2.71%
for a two-photon source). Also, the upper bounds on the bit error rate for
SARG04 with two-way communications are computed in a closed form by considering
an individual attack based on a general measurement. In the second part of the
paper, we propose employing the idea of decoy states in SARG04 to obtain
unconditional security even when realistic devices are used. We compare the
performance of SARG04 with decoy states and BB84 with decoy states. We find
that the optimal mean-photon number for SARG04 is higher than that of BB84 when
the bit error rate is small. Also, we observe that SARG04 does not achieve a
longer secure distance and a higher key generation rate than BB84, assuming a
typical experimental parameter set.Comment: 48 pages, 10 figures, 1 column, changed Figs. 7 and
Shape of Deconstruction
We construct a six-dimensional Maxwell theory using a latticized extra space,
the continuum limit of which is a shifted torus recently discussed by Dienes.
This toy model exhibits the correspondence between continuum theory and
discrete theory, and give a geometrical insight to theory-space model building.Comment: 10 pages, 2 figures, RevTeX4. a citation adde
Addendum to "Classical and Quantum Evolutions of the de Sitter and the anti-de Sitter Universes in 2+1 dimensions"
The previous discussion \cite{ezawa} on reducing the phase space of the first
order Einstein gravity in 2+1 dimensions is reconsidered. We construct a \lq\lq
correct" physical phase space in the case of positive cosmological constant,
taking into account the geometrical feature of SO(3,1) connections. A
parametrization which unifies the two sectors of the physical phase space is
also given.Comment: Latex 8 pages (Crucial and essential changes have been made.
Expedite requests in Raytheon's North Texas supply chain
Thesis (M.B.A.)--Massachusetts Institute of Technology, Sloan School of Management; and, (S.M.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science; in conjunction with the Leaders for Manufacturing Program at MIT, 2006.Includes bibliographical references (p. 69-70).In December 2004, a manager at Raytheon Company articulated in the form of an LFM (Leaders for Manufacturing) internship proposal his belief that someone should do something about the amounts of time and money that Raytheon's North Texas plants spent handling expedite requests-requests that someone provide goods or services more quickly than normal. This thesis attempts to summarize the thoughts, learnings, initiatives, and outcomes associated with the ensuing effort. In particular, a large section of the paper is devoted to a case study of the most involved initiative: the devising and implementing of a new dispatching method in one small but central operation in an organization with a long history of processing things first in, first out. While for the project team the compelling factor was achieving a specific dollar impact, the reader of this paper will probably be more interested in the methodology than in Raytheon's ROI. Research for this thesis was conducted during a six-month internship with Raytheon Company's Space and Airborne Systems Supply Chain Management group in McKinney, TX, and Dallas, TX. The internship was affiliated with the Massachusetts Institute of Technology's Leaders for Manufacturing (LFM) Program.by Scott K. Hiroshige.S.M.M.B.A
- …