15,723 research outputs found
Beating the PNS attack in practical quantum cryptography
In practical quantum key distribution, weak coherent state is often used and
the channel transmittance can be very small therefore the protocol could be
totally insecure under the photon-number-splitting attack. We propose an
efficient method to verify the upper bound of the fraction of counts caused by
multi-photon pluses transmitted from Alice to Bob, given whatever type of Eve's
action. The protocol simply uses two coherent states for the signal pulses and
vacuum for decoy pulse. Our verified upper bound is sufficiently tight for QKD
with very lossy channel, in both asymptotic case and non-asymptotic case. The
coherent states with mean photon number from 0.2 to 0.5 can be used in
practical quantum cryptography. We show that so far our protocol is the
decoy-state protocol that really works for currently existing set-ups.Comment: So far this is the unique decoy-state protocol which really works
efficiently in practice. Prior art results are commented in both main context
and the Appendi
A decoy-state protocol for quantum cryptography with 4 intensities of coherent states
In order to beat any type of photon-number-splitting attack, we propose a
protocol for quantum key distributoin (QKD) using 4 different intensities of
pulses. They are vacuum and coherent states with mean photon number
and . is around 0.55 and this class of pulses are used as the
main signal states. The other two classes of coherent states () are
also used signal states but their counting rates should be studied jointly with
the vacuum. We have shown that, given the typical set-up in practice, the key
rate from the main signal pulses is quite close to the theoretically allowed
maximal rate in the case given the small overall transmittance of
Secure and efficient decoy-state quantum key distribution with inexact pulse intensities
We present a general theorem for the efficient verification of the lower
bound of single-photon transmittance. We show how to do decoy-state quantum key
distribution efficiently with large random errors in the intensity control. In
our protocol, the linear terms of fluctuation disappear and only the quadratic
terms take effect. We then show the unconditional security of decoy-state
method with whatever error pattern in intensities of decoy pulses and signal
pulses provided that the intensity of each decoy pulse is less than and
the intensity of each signal pulse is larger than
Linear scaling calculation of band edge states and doped semiconductors
Linear scaling methods provide total energy, but no energy levels and
canonical wavefuctions. From the density matrix computed through the density
matrix purification methods, we propose an order-N (O(N)) method for
calculating both the energies and wavefuctions of band edge states, which are
important for optical properties and chemical reactions. In addition, we also
develop an O(N) algorithm to deal with doped semiconductors based on the O(N)
method for band edge states calculation. We illustrate the O(N) behavior of the
new method by applying it to boron nitride (BN) nanotubes and BN nanotubes with
an adsorbed hydrogen atom. The band gap of various BN nanotubes are
investigated systematicly and the acceptor levels of BN nanotubes with an
isolated adsorbed H atom are computed. Our methods are simple, robust, and
especially suited for the application in self-consistent field electronic
structure theory
String order and hidden topological symmetry in the SO(2n+1) symmetric matrix product states
We have introduced a class of exactly soluble Hamiltonian with either
SO(2n+1) or SU(2) symmetry, whose ground states are the SO(2n+1) symmetric
matrix product states. The hidden topological order in these states can be
fully identified and characterized by a set of nonlocal string order
parameters. The Hamiltonian possesses a hidden
topological symmetry. The breaking of this hidden symmetry leads to
degenerate ground states with disentangled edge states in an open chain system.
Such matrix product states can be regarded as cluster states, applicable to
measurement-based quantum computation.Comment: 5 pages, 1 figur
Black hole thermodynamics and modified GUP consistent with doubly special relativity
We study the black hole thermodynamics and obtain the correction terms for
temperature, entropy, and heat capacity of the Schwarzschild black hole,
resulting from the commutation relations in the framework of {\it Modified
Generalized Uncertainty Principle} suggested by {\it Doubly Special
Relativity}.Comment: 13 pages, 6 figures, minor revision, references adde
Wilson-like real-space renormalization group and low-energy effective spectrum of the XXZ chain in the critical regime
We present a novel real-space renormalization group(RG) for the
one-dimensional XXZ model in the critical regime, reconsidering the role of the
cut-off parameter in Wilson's RG for the Kondo impurity problem. We then
demonstrate the RG calculation for the XXZ chain with the free boundary.
Comparing the hierarchical structure of the obtained low-energy spectrum with
the Bethe ansatz result, we find that the proper scaling dimension is
reproduced as a fixed point of the RG transformation.Comment: 4 pages, 6 figures, typos corrected, final versio
Difference of optical conductivity between one- and two-dimensional doped nickelates
We study the optical conductivity in doped nickelates, and find the dramatic
difference of the spectrum in the gap (\alt4 eV) between one- (1D)
and two-dimensional (2D) nickelates. The difference is shown to be caused by
the dependence of hopping integral on dimensionality. The theoretical results
explain consistently the experimental data in 1D and
2D nickelates, YCaBaNiO and LaSrNiO,
respectively. The relation between the spectrum in the X-ray aborption
experiments and the optical conductivity in LaSrNiO is
discussed.Comment: RevTeX, 4 pages, 4 figure
- …