2,648 research outputs found

    Applications of single-qubit rotations in quantum public-key cryptography

    Full text link
    We discuss cryptographic applications of single-qubit rotations from the perspective of trapdoor one-way functions and public-key encryption. In particular, we present an asymmetric cryptosystem whose security relies on fundamental principles of quantum physics. A quantum public key is used for the encryption of messages while decryption is possible by means of a classical private key only. The trapdoor one-way function underlying the proposed cryptosystem maps integer numbers to quantum states of a qubit and its inversion can be infeasible by virtue of the Holevo's theorem.Comment: to appear in Phys. Rev.

    Transnational, Social, and Neighborhood Ties and Smoking Among Latino Immigrants: Does Gender Matter?

    Get PDF
    Objectives. We examined whether transnational ties, social ties, and neighborhood ties were independently associated with current smoking status among Latino immigrants. We also tested interactions to determine whether these associations were moderated by gender. Methods. We conducted a series of weighted logistic regression analyses (i.e., economic remittances, number of return visits, friend support, family support, and neighborhood cohesion) using the Latino immigrant subsample (n = 1629) of the National Latino and Asian American Study in 2002 and 2003. Results. The number of past-year return visits to the country-of-origin was positively associated with current smoker status. Gender moderated the association between economic remittances, friend support, and smoking. Remittance behavior had a protective association with smoking, and this association was particularly pronounced for Latino immigrant women. Friendship support lowered the odds of smoking among men, but not women. Conclusions. Our results underscore the growing importance of transnational networks for understanding Latino immigrant health and the gendered patterns of the associations between social ties, transnational ties, and health risk behaviors

    Multi-level, cross-sectional study of workplace social capital and smoking among Japanese employees

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>Social capital is hypothesized to be relevant to health promotion, and the association between community social capital and cigarette smoking has been examined. Individual-level social capital has been found to be associated with smoking cessation, but evidence remains sparse on the contextual effect of social capital and smoking. Further, evidence remains sparse on the association between smoking and social capital in the workplace, where people are spending an increasing portion of their daily lives. We examined the association between workplace social capital and smoking status among Japanese private sector employees.</p> <p>Methods</p> <p>We employed a two-stage stratified random sampling procedure. Of the total of 1,800 subjects in 60 companies, 1,171 (men/women; 834/337) employees (65.1%) were identified from 46 companies in Okayama in 2007. Workplace social capital was assessed in two dimensions; trust and reciprocity. Company-level social capital was based on inquiring about employee perceptions of trust and reciprocity among co-workers, and then aggregating their responses in order to calculate the proportion of workers reporting mistrust and lack of reciprocity. Multilevel logistic regression analysis was conducted using Markov Chain Monte Carlo methods to explore whether individual- and company-level social capital was associated with smoking. Odds ratios (ORs) and 95% credible intervals (CIs) for current smoking were obtained.</p> <p>Results</p> <p>Overall, 33.3% of the subjects smoked currently. There was no relationship between individual-level mistrust of others and smoking status. By contrast, one-standard deviation change in company-level mistrust was associated with higher odds of smoking (OR: 1.25, 95% CI: 1.06-1.46) even after controlling for individual-level mistrust, sex, age, occupation, educational attainment, alcohol use, physical activity, body mass index, and chronic diseases. No clear associations were found between lack of reciprocity and smoking both at the individual- and company-level.</p> <p>Conclusions</p> <p>Company-level mistrust is associated with higher likelihood of smoking among Japanese employees, while individual perceptions of mistrust were not associated. The link between lack of reciprocity and smoking was not supported either at the individual- or company-level. Further studies are warranted to examine the possible link between company-level trust and smoking cessation in the Japanese workplace.</p

    Modeling high-energy light curves of the PSR B1259-63/LS 2883 binary based on 3-D SPH simulations

    Full text link
    Temporal changes of X-ray to very-high-energy gamma-ray emissions from the pulsar-Be star binary PSR B1259-63/LS 2883 are studied based on 3-D SPH simulations of pulsar wind interaction with Be-disk and wind. We focus on the periastron passage of the binary and calculate the variation of the synchrotron and inverse-Compton emissions using the simulated shock geometry and pressure distribution of the pulsar wind. The characteristic double-peaked X-ray light curve from observations is reproduced by our simulation under a dense Be disk condition (base density ~10^{-9} g cm^{-3}). We interpret the pre- and post-periastron peaks as being due to a significant increase in the conversion efficiency from pulsar spin down power to the shock-accelerated particle energy at orbital phases when the pulsar crosses the disk before periastron passage, and when the pulsar wind creates a cavity in the disk gas after periastron passage, respectively. On the contrary, in the model TeV light curve, which also shows a double peak feature, the first peak appears around the periastron phase. The possible effects of cooling processes on the TeV light curve are briefly discussed.Comment: 32 pages, 6 figues. Accepted for publication in Ap

    Quantum non-malleability and authentication

    Get PDF
    In encryption, non-malleability is a highly desirable property: it ensures that adversaries cannot manipulate the plaintext by acting on the ciphertext. Ambainis, Bouda and Winter gave a definition of non-malleability for the encryption of quantum data. In this work, we show that this definition is too weak, as it allows adversaries to "inject" plaintexts of their choice into the ciphertext. We give a new definition of quantum non-malleability which resolves this problem. Our definition is expressed in terms of entropic quantities, considers stronger adversaries, and does not assume secrecy. Rather, we prove that quantum non-malleability implies secrecy; this is in stark contrast to the classical setting, where the two properties are completely independent. For unitary schemes, our notion of non-malleability is equivalent to encryption with a two-design (and hence also to the definition of Ambainis et al.). Our techniques also yield new results regarding the closely-related task of quantum authentication. We show that "total authentication" (a notion recently proposed by Garg, Yuen and Zhandry) can be satisfied with two-designs, a significant improvement over the eight-design construction of Garg et al. We also show that, under a mild adaptation of the rejection procedure, both total authentication and our notion of non-malleability yield quantum authentication as defined by Dupuis, Nielsen and Salvail.Comment: 20+13 pages, one figure. v2: published version plus extra material. v3: references added and update

    TeV Flux modulation in PSR B1259-63/LS 2883

    Full text link
    PSR B1259-63/LS 2883 is a binary system where a 48 ms pulsar orbits a massive Be star with a highly eccentric orbit (e=0.87) with a period of 3.4 years. The system exhibits variable, non-thermal radiation visible from radio to very high energies (VHE) around periastron passage. This radiation is thought to originate from particles accelerated in the shock region between the pulsar wind (PW) and stellar outflows. The consistency of the H.E.S.S. data with the inverse Compton (IC) scenario is studied in the context of dominant orbital phase dependent adiabatic losses. The dependence of the observed TeV flux with the separation distance is analyzed. Model calculations based on IC scattering of shock accelerated PW electrons and UV photons are performed. Different non-radiative cooling profiles are suggested for the primary particle population to account for the variable TeV flux. The TeV fluxes obtained with H.E.S.S. in the years 2004 and 2007 seem to be only dependent on the binary separation. The presented results hint at a peculiar non-radiative cooling profile around periastron dominating the VHE emission in PSR B1259-63. The location of the stellar disc derived from this non-radiative cooling profile is in good agreement with that inferred from radio observations.Comment: 6 pages, 5 figures, accepted for publication in A&A on 03/09/201

    Computational Indistinguishability between Quantum States and Its Cryptographic Application

    Full text link
    We introduce a computational problem of distinguishing between two specific quantum states as a new cryptographic problem to design a quantum cryptographic scheme that is "secure" against any polynomial-time quantum adversary. Our problem, QSCDff, is to distinguish between two types of random coset states with a hidden permutation over the symmetric group of finite degree. This naturally generalizes the commonly-used distinction problem between two probability distributions in computational cryptography. As our major contribution, we show that QSCDff has three properties of cryptographic interest: (i) QSCDff has a trapdoor; (ii) the average-case hardness of QSCDff coincides with its worst-case hardness; and (iii) QSCDff is computationally at least as hard as the graph automorphism problem in the worst case. These cryptographic properties enable us to construct a quantum public-key cryptosystem, which is likely to withstand any chosen plaintext attack of a polynomial-time quantum adversary. We further discuss a generalization of QSCDff, called QSCDcyc, and introduce a multi-bit encryption scheme that relies on similar cryptographic properties of QSCDcyc.Comment: 24 pages, 2 figures. We improved presentation, and added more detail proofs and follow-up of recent wor
    • …
    corecore