865 research outputs found

    Dynamical CPA approach to an itinerant fermionic spin glass model

    Full text link
    We study a fermionic version of the Sherrington-Kirkpatrick model including nearest-neighbor hopping on a \infty-dimensional simple cubic lattices. The problem is reduced to one of free fermions moving in a dynamical effective random medium. By means of a CPA method we derive a set of self-consistency equations for the spin glass order parameter and for the Fourier components of the local spin susceptibility. In order to solve these equations numerically we employ an approximation scheme which restricts the dynamics to a feasible number of the leading Fourier components. From a sequence of systematically improved dynamical approximations we estimate the location of the quantum critical point.Comment: 9 pages, 6 figures, revised versio

    Dynamical solutions of a quantum Heisenberg spin glass model

    Full text link
    We consider quantum-dynamical phenomena in the SU(2)\mathrm{SU}(2), S=1/2S=1/2 infinite-range quantum Heisenberg spin glass. For a fermionic generalization of the model we formulate generic dynamical self-consistency equations. Using the Popov-Fedotov trick to eliminate contributions of the non-magnetic fermionic states we study in particular the isotropic model variant on the spin space. Two complementary approximation schemes are applied: one restricts the quantum spin dynamics to a manageable number of Matsubara frequencies while the other employs an expansion in terms of the dynamical local spin susceptibility. We accurately determine the critical temperature TcT_c of the spin glass to paramagnet transition. We find that the dynamical correlations cause an increase of TcT_c by 2% compared to the result obtained in the spin-static approximation. The specific heat C(T)C(T) exhibits a pronounced cusp at TcT_c. Contradictory to other reports we do not observe a maximum in the C(T)C(T)-curve above TcT_c.Comment: 8 pages, 7 figure

    The effectiveness of quantum operations for eavesdropping on sealed messages

    Full text link
    A quantum protocol is described which enables a user to send sealed messages and that allows for the detection of active eavesdroppers. We examine a class of eavesdropping strategies, those that make use of quantum operations, and we determine the information gain versus disturbance caused by these strategies. We demonstrate this tradeoff with an example and we compare this protocol to quantum key distribution, quantum direct communication, and quantum seal protocols.Comment: 10 pages, 2 figures. Third Feynman Festival, 25 -- 29 August 2006, University of Maryland, College Park, Maryland, U.S.

    Quantum Key Distribution between N partners: optimal eavesdropping and Bell's inequalities

    Get PDF
    Quantum secret-sharing protocols involving N partners (NQSS) are key distribution protocols in which Alice encodes her key into N1N-1 qubits, in such a way that all the other partners must cooperate in order to retrieve the key. On these protocols, several eavesdropping scenarios are possible: some partners may want to reconstruct the key without the help of the other ones, and consequently collaborate with an Eve that eavesdrops on the other partners' channels. For each of these scenarios, we give the optimal individual attack that the Eve can perform. In case of such an optimal attack, the authorized partners have a higher information on the key than the unauthorized ones if and only if they can violate a Bell's inequality.Comment: 14 pages, 1 figur

    Finite key analysis for symmetric attacks in quantum key distribution

    Get PDF
    We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e. below the order of 10^4, the finite key rate differs significantly from the asymptotic value for n approaching infinity. However, for larger n, a good approximation of the asymptotic value is found. We also study secret key rates for protocols using higher-dimensional quantum systems.Comment: 9 pages, 5 figure

    Mutually unbiased binary observable sets on N qubits

    Full text link
    The Pauli operators (tensor products of Pauli matrices) provide a complete basis of operators on the Hilbert space of N qubits. We prove that the set of 4^N-1 Pauli operators may be partitioned into 2^N+1 distinct subsets, each consisting of 2^N-1 internally commuting observables. Furthermore, each such partitioning defines a unique choice of 2^N+1 mutually unbiased basis sets in the N-qubit Hilbert space. Examples for 2 and 3 qubit systems are discussed with emphasis on the nature and amount of entanglement that occurs within these basis sets.Comment: 5 pages, 5 figures. Replacement - expanded introduction and conclusions; added reference

    Quantum Cryptography using larger alphabets

    Get PDF
    Like all of quantum information theory, quantum cryptography is traditionally based on two level quantum systems. In this letter, a new protocol for quantum key distribution based on higher dimensional systems is presented. An experimental realization using an interferometric setup is also proposed. Analyzing this protocol from the practical side, one finds an increased key creation rate while keeping the initial laser pulse rate constant. Analyzing it for the case of intercept/resend eavesdropping strategy, an increased error rate is found compared to two dimensional systems, hence an advantage for the legitimate users to detect an eavesdropper.Comment: 12 pages, 2 (eps) figure

    Assessments of Composite and Discrete Sampling Approaches for Water Quality Monitoring

    Get PDF
    peer-reviewedAchieving an operational compromise between spatial coverage and temporal resolution in national scale river water quality monitoring is a major challenge for regulatory authorities, particularly where chemical concentrations are hydrologically dependent. The efficacy of flow-weighted composite sampling (FWCS) approaches for total phosphorus (TP) sampling (n = 26–52 analysed samples per year), previously applied in monitoring programmes in Norway, Sweden and Denmark, and which account for low to high flow discharges, was assessed by repeated simulated sampling on high resolution TP data. These data were collected in three research catchments in Ireland over the period 2010–13 covering a base-flow index range of 0.38 to 0.69. Comparisons of load estimates were also made with discrete (set time interval) daily and sub-daily sampling approaches (n = 365 to >1200 analysed samples per year). For all years and all sites a proxy of the Norwegian sampling approach, which is based on re-forecasting discharge for each 2-week deployment, proved most stable (median TP load estimates of 87–98%). Danish and Swedish approaches, using long-term flow records to set a flow constant, were only slightly less effective (median load estimates of 64–102% and 80–96%, respectively). Though TP load estimates over repeated iterations were more accurate using the discrete approaches, particularly the 24/7 approach (one sample every 7 h in a 24 bottle sampler - median % load estimates of 93–100%), composite load estimates were more stable, due to the integration of multiple small samples (n = 100–588) over a deployment

    Laser Additive Manufacturing of Gas Permeable Structures

    Get PDF
    Laser additive manufacturing offers a variety of new design possibilities. In mold making laser additive manufactured inserts with conformal cooling channels are already state of the art. Pneumatic ejectors for injection molds are a new application for laser additive manufacturing. The pneumatic ejectors require a durable gas permeable material. This material is produced by placing the scan vectors for the laser additive manufacturing process in a defined pattern. Trials with different plastics proofed the function and reliability of the pneumatic ejector concept in the injection molding cycle
    corecore