1,855 research outputs found

    Experimental quantum key distribution over highly noisy channels

    Full text link
    Error filtration is a method for encoding the quantum state of a single particle into a higher dimensional Hilbert space in such a way that it becomes less sensitive to phase noise. We experimentally demonstrate this method by distributing a secret key over an optical fiber whose noise level otherwise precludes secure quantum key distribution. By filtering out the phase noise, a bit error rate of 15.3% +/- 0.1%, which is beyond the security limit, can be reduced to 10.6% +/- 0.1%, thereby guaranteeing the cryptographic security.Comment: 4 pages, 2 figure

    Bremsstrahlung analysis through the microwave cutoff and afterglow performances

    Get PDF
    Bremsstralung spectra with a very good energy resolution have been obtained for various time slabs of a few ms throughout the microwave cutoff. In a recent work (1) we had noticed+ and explained why the enhancement of the extracted high charge currents by the afterglow effect is more pronounced when the X-ray emission in the heating stage is more intense. In the present communication, we give some additional information deduced from our spectra. We indicate estimates of the temperature parameter and of the density of the hot electron population at various times. For this purpose the method presented in ref.(3) was adapted to argon. We also determine the maximum energy reached by the electrons in the steady state; the spare results seem to follow the scaling law indicated in Geller's book (4)

    Provably Secure Experimental Quantum Bit-String Generation

    Full text link
    Coin tossing is a cryptographic task in which two parties who do not trust each other aim to generate a common random bit. Using classical communication this is impossible, but non trivial coin tossing is possible using quantum communication. Here we consider the case when the parties do not want to toss a single coin, but many. This is called bit string generation. We report the experimental generation of strings of coins which are provably more random than achievable using classical communication. The experiment is based on the ``plug and play'' scheme developed for quantum cryptography, and therefore well suited for long distance quantum communication.Comment: 4 pages, 3 figures. Submitted to Phys. Rev. Lett. A complete security analysis for the experiment is given in quant-ph/040812

    Extremal quantum cloning machines

    Full text link
    We investigate the problem of cloning a set of states that is invariant under the action of an irreducible group representation. We then characterize the cloners that are "extremal" in the convex set of group covariant cloning machines, among which one can restrict the search for optimal cloners. For a set of states that is invariant under the discrete Weyl-Heisenberg group, we show that all extremal cloners can be unitarily realized using the so-called "double-Bell states", whence providing a general proof of the popular ansatz used in the literature for finding optimal cloners in a variety of settings. Our result can also be generalized to continuous-variable optimal cloning in infinite dimensions, where the covariance group is the customary Weyl-Heisenberg group of displacements.Comment: revised version accepted for publicatio

    The Swift-UVOT ultraviolet and visible grism calibration

    Get PDF
    We present the calibration of the Swift UVOT grisms, of which there are two, providing low-resolution field spectroscopy in the ultraviolet and optical bands respectively. The UV grism covers the range 1700-5000 Angstrom with a spectral resolution of 75 at 2600 Angstrom for source magnitudes of u=10-16 mag, while the visible grism covers the range 2850-6600 Angstrom with a spectral resolution of 100 at 4000 Angstrom for source magnitudes of b=12-17 mag. This calibration extends over all detector positions, for all modes used during operations. The wavelength accuracy (1-sigma) is 9 Angstrom in the UV grism clocked mode, 17 Angstrom in the UV grism nominal mode and 22 Angstrom in the visible grism. The range below 2740 Angstrom in the UV grism and 5200 Angstrom in the visible grism never suffers from overlapping by higher spectral orders. The flux calibration of the grisms includes a correction we developed for coincidence loss in the detector. The error in the coincidence loss correction is less than 20%. The position of the spectrum on the detector only affects the effective area (sensitivity) by a few percent in the nominal modes, but varies substantially in the clocked modes. The error in the effective area is from 9% in the UV grism clocked mode to 15% in the visible grism clocked mode .Comment: 27 pages, 31 figures; MNRAS accepted 23 February 201

    Soil weathering rates in 21 catchments of the Canadian Shield

    Get PDF
    Soil mineral weathering represents an essential source of nutrient base cation (Ca, Mg and K) for forest growth in addition to provide a buffering power against precipitation acidity for soils and surface waters. Weathering rates of base cations were obtained for 21 catchments located within the temperate and the boreal forest of the Canadian Shield with the geochemical model PROFILE. Weathering rates ranged from 0.58 to 4.46 kmol<sub>c</sub> ha<sup>−1</sup> yr<sup>−1</sup> and their spatial variation within the studied area was mostly in agreement with spatial variations in soil mineralogy. Weathering rates of Ca and Mg were significantly correlated (<i>r</i> = 0.80 and 0.64) with their respective lake concentrations. Weathering rates of K and Na did not correlate with lake concentrations of K and Na. The modeled weathering rates for each catchment were also compared with estimations of net catchment exportations. The result show that modeled weathering rates of Ca were not significantly different than the net catchment exportations while modeled weathering rates of Mg were higher by 51%. Larger differences were observed for K and Na weathering rates that were significantly different than net catchment exportations being 6.9 and 2.2 times higher than net exportations, respectively. The results for K were expected given its high reactivity with biotic compartments and suggest that most of the K produced by weathering reactions was retained within soil catchments and/or above ground biomass. This explanation does not apply to Na, however, which is a conservative element in forest ecosystems because of the insignificant needs of Na for soil microorganisms and above ground vegetations. It raises concern about the liability of the PROFILE model to provide reliable values of Na weathering rates. Overall, we concluded that the PROFILE model is powerful enough to reproduce spatial geographical gradients in weathering rates for relatively large areas as well as adequately predict absolute weathering rates values for the sum of base cations, Ca and Mg

    Thermal phase diagrams of columnar liquid crystals

    Full text link
    In order to understand the possible sequence of transitions from the disordered columnar phase to the helical phase in hexa(hexylthio)triphenylene (HHTT), we study a three-dimensional planar model with octupolar interactions inscribed on a triangular lattice of columns. We obtain thermal phase diagrams using a mean-field approximation and Monte Carlo simulations. These two approaches give similar results, namely, in the quasi one-dimensional regime, as the temperature is lowered, the columns order with a linear polarization, whereas helical phases develop at lower temperatures. The helicity patterns of the helical phases are determined by the exact nature of the frustration in the system, itself related to the octupolar nature of the molecules.Comment: 12 pages, 9 figures, ReVTe

    GRB 081203A: Swift UVOT captures the earliest ultraviolet spectrum of a gamma-ray burst

    Get PDF
    We present the earliest ultraviolet (UV) spectrum of a gamma-ray burst (GRB) as observed with the Swift Ultra-Violet/Optical Telescope (UVOT). The GRB 081203A spectrum was observed for 50 s with the UV-grism starting 251 s after the Swift-Burst-Alert-Telescope (BAT) trigger. During this time, the GRB was ≈13.4 mag (u filter) and was still rising to its peak optical brightness. In the UV-grism spectrum, we find a damped Lyα line, LyÎČ and the Lyman continuum break at a redshift z= 2.05 ± 0.01. A model fit to the Lyman absorption implies a gas column density of log NH i= 22.0 ± 0.1 cm−2, which is typical of GRB host galaxies with damped Lyα absorbers. This observation of GRB 081203A demonstrates that for brighter GRBs (v≈ 14 mag) with moderate redshift (0.5 < z < 3.5) the UVOT is able to provide redshifts, and probe for damped Lyα absorbers within 4–6 min from the time of the Swift-BAT trigger

    Symmetries in Quantum Key Distribution and the Connection between Optimal Attacks and Optimal Cloning

    Full text link
    We investigate the connection between the optimal collective eavesdropping attack and the optimal cloning attack where the eavesdropper employs an optimal cloner to attack the quantum key distribution (QKD) protocol. The analysis is done in the context of the security proof in [Devetak and Winter, Proc. of the Roy. Soc. of London Series A, 461, 207 (2005); Kraus, Gisin and Renner, Phys. Rev. Lett. 95, 080501 (2005)] for discrete variable protocols in d-dimensional Hilbert spaces. We consider a scenario in which the protocols and cloners are equipped with symmetries. These symmetries are used to define a quantum cloning scenario. We find that, in general, it does not hold that the optimal attack is an optimal cloner. However, there are classes of protocols, where we can identify an optimal attack by an optimal cloner. We analyze protocols with 2, d and d+1 mutually unbiased bases where d is a prime, and show that for the protocols with 2 and d+1 MUBs the optimal attack is an optimal cloner, but for the protocols with d MUBs, it is not. Finally, we give criteria to identify protocols which have different signal states, but the same optimal attack. Using these criteria, we present qubit protocols which have the same optimal attack as the BB84 protocol or the 6-state protocol
    • 

    corecore