14,729 research outputs found

    A proposal for founding mistrustful quantum cryptography on coin tossing

    Full text link
    A significant branch of classical cryptography deals with the problems which arise when mistrustful parties need to generate, process or exchange information. As Kilian showed a while ago, mistrustful classical cryptography can be founded on a single protocol, oblivious transfer, from which general secure multi-party computations can be built. The scope of mistrustful quantum cryptography is limited by no-go theorems, which rule out, inter alia, unconditionally secure quantum protocols for oblivious transfer or general secure two-party computations. These theorems apply even to protocols which take relativistic signalling constraints into account. The best that can be hoped for, in general, are quantum protocols computationally secure against quantum attack. I describe here a method for building a classically certified bit commitment, and hence every other mistrustful cryptographic task, from a secure coin tossing protocol. No security proof is attempted, but I sketch reasons why these protocols might resist quantum computational attack.Comment: Title altered in deference to Physical Review's fear of question marks. Published version; references update

    Introduction to Library Trends 28 (1) Summer 1979: The Economics of Academic Libraries

    Get PDF
    published or submitted for publicatio

    Coin Tossing is Strictly Weaker Than Bit Commitment

    Full text link
    We define cryptographic assumptions applicable to two mistrustful parties who each control two or more separate secure sites between which special relativity guarantees a time lapse in communication. We show that, under these assumptions, unconditionally secure coin tossing can be carried out by exchanges of classical information. We show also, following Mayers, Lo and Chau, that unconditionally secure bit commitment cannot be carried out by finitely many exchanges of classical or quantum information. Finally we show that, under standard cryptographic assumptions, coin tossing is strictly weaker than bit commitment. That is, no secure classical or quantum bit commitment protocol can be built from a finite number of invocations of a secure coin tossing black box together with finitely many additional information exchanges.Comment: Final version; to appear in Phys. Rev. Let

    Atmospheric Backscatter Model Development for CO Sub 2 Wavelengths

    Get PDF
    The results of investigations into the problems of modeling atmospheric backscatter from aerosols, in the lowest 20 km of the atmosphere, at CO2 wavelengths are presented, along with a summary of the relevant aerosol characteristics and their variability, and a discussion of the measurement techniques and errors involved. The different methods of calculating the aerosol backscattering function, both from measured aerosol characteristics and from optical measurements made at other wavelengths, are discussed in detail, and limits are placed on the accuracy of these methods. The effects of changing atmospheric humidity and temperature on the backscatter are analyzed and related to the actual atmosphere. Finally, the results of modeling CO2 backscatter in the atmosphere are presented and the variation with height and geographic location discussed, and limits placed on the magnitude of the backscattering function. Conclusions regarding modeling techniques and modeled atmospheric backscatter values are presented in tabular form

    Haversian and Endosteal Bone Formation Rates in Rib Biopsies of 50 Patients with Senile and Postmenopausal Osteoporosis

    Get PDF
    Eleventh rib biopsies of 50 patients with senile and postmenopausal osteoporosis, studied by means of tetracycline bone labeling, revealed significant and similar although modest decreases In bone formation on the cortical-endosteal and haversian surfaces of the biopsies

    Social Support and the Perception of Geographical Slant.

    Get PDF
    The visual perception of geographical slant is influenced by physiological resources, such as physical fitness, age, and being physically refreshed. In two studies we tested whether a psychosocial resource, social support, can also affect the visual perception of slants. Participants accompanied by a friend estimated a hill to be less steep when compared to participants who were alone (Study 1). Similarly, participants who thought of a supportive friend during an imagery task saw a hill as less steep than participants who either thought of a neutral person or a disliked person (Study 2). In both studies, the effects of social relationships on visual perception appear to be mediated by relationship quality (i.e., relationship duration, interpersonal closeness, warmth). Artifacts such as mood, social desirability, and social facilitation did not account for these effects. This research demonstrates that an interpersonal phenomenon, social support, can influence visual perception

    A Fast and Efficient Algorithm for Slater Determinant Updates in Quantum Monte Carlo Simulations

    Full text link
    We present an efficient low-rank updating algorithm for updating the trial wavefunctions used in Quantum Monte Carlo (QMC) simulations. The algorithm is based on low-rank updating of the Slater determinants. In particular, the computational complexity of the algorithm is O(kN) during the k-th step compared with traditional algorithms that require O(N^2) computations, where N is the system size. For single determinant trial wavefunctions the new algorithm is faster than the traditional O(N^2) Sherman-Morrison algorithm for up to O(N) updates. For multideterminant configuration-interaction type trial wavefunctions of M+1 determinants, the new algorithm is significantly more efficient, saving both O(MN^2) work and O(MN^2) storage. The algorithm enables more accurate and significantly more efficient QMC calculations using configuration interaction type wavefunctions

    Surgical Techniques for Arthrodesis of Two to Four Adjacent Spinal Vertebrae Throughout the Entire Spinal Column

    Get PDF
    Surgical techniques for cervical, thoracic and lumbar spinal fusions have been described. So far, 51 such fusions have been performed with satisfactory results

    Editorial: ‘To err is human, it takes a computer to really foul things up!’*

    Get PDF
    corecore