461 research outputs found

    Representation of multiple cropping systems in land use data sets

    Get PDF

    Unforgeable Quantum Encryption

    Get PDF
    We study the problem of encrypting and authenticating quantum data in the presence of adversaries making adaptive chosen plaintext and chosen ciphertext queries. Classically, security games use string copying and comparison to detect adversarial cheating in such scenarios. Quantumly, this approach would violate no-cloning. We develop new techniques to overcome this problem: we use entanglement to detect cheating, and rely on recent results for characterizing quantum encryption schemes. We give definitions for (i.) ciphertext unforgeability , (ii.) indistinguishability under adaptive chosen-ciphertext attack, and (iii.) authenticated encryption. The restriction of each definition to the classical setting is at least as strong as the corresponding classical notion: (i) implies INT-CTXT, (ii) implies IND-CCA2, and (iii) implies AE. All of our new notions also imply QIND-CPA privacy. Combining one-time authentication and classical pseudorandomness, we construct schemes for each of these new quantum security notions, and provide several separation examples. Along the way, we also give a new definition of one-time quantum authentication which, unlike all previous approaches, authenticates ciphertexts rather than plaintexts.Comment: 22+2 pages, 1 figure. v3: error in the definition of QIND-CCA2 fixed, some proofs related to QIND-CCA2 clarifie

    Cross‐scale intercomparison of climate change impacts simulated by regional and global hydrological models in eleven large river basins

    Get PDF
    Ideally, the results from models operating at different scales should agree in trend direction and magnitude of impacts under climate change. However, this implies that the sensitivity to climate variability and climate change is comparable for impact models designed for either scale. In this study, we compare hydrological changes simulated by 9 global and 9 regional hydrological models (HM) for 11 large river basins in all continents under reference and scenario conditions. The foci are on model validation runs, sensitivity of annual discharge to climate variability in the reference period, and sensitivity of the long-term average monthly seasonal dynamics to climate change. One major result is that the global models, mostly not calibrated against observations, often show a considerable bias in mean monthly discharge, whereas regional models show a better reproduction of reference conditions. However, the sensitivity of the two HM ensembles to climate variability is in general similar. The simulated climate change impacts in terms of long-term average monthly dynamics evaluated for HM ensemble medians and spreads show that the medians are to a certain extent comparable in some cases, but have distinct differences in other cases, and the spreads related to global models are mostly notably larger. Summarizing, this implies that global HMs are useful tools when looking at large-scale impacts of climate change and variability. Whenever impacts for a specific river basin or region are of interest, e.g. for complex water management applications, the regional-scale models calibrated and validated against observed discharge should be used

    Composable and Finite Computational Security of Quantum Message Transmission

    Full text link
    Recent research in quantum cryptography has led to the development of schemes that encrypt and authenticate quantum messages with computational security. The security definitions used so far in the literature are asymptotic, game-based, and not known to be composable. We show how to define finite, composable, computational security for secure quantum message transmission. The new definitions do not involve any games or oracles, they are directly operational: a scheme is secure if it transforms an insecure channel and a shared key into an ideal secure channel from Alice to Bob, i.e., one which only allows Eve to block messages and learn their size, but not change them or read them. By modifying the ideal channel to provide Eve with more or less capabilities, one gets an array of different security notions. By design these transformations are composable, resulting in composable security. Crucially, the new definitions are finite. Security does not rely on the asymptotic hardness of a computational problem. Instead, one proves a finite reduction: if an adversary can distinguish the constructed (real) channel from the ideal one (for some fixed security parameters), then she can solve a finite instance of some computational problem. Such a finite statement is needed to make security claims about concrete implementations. We then prove that (slightly modified versions of) protocols proposed in the literature satisfy these composable definitions. And finally, we study the relations between some game-based definitions and our composable ones. In particular, we look at notions of quantum authenticated encryption and QCCA2, and show that they suffer from the same issues as their classical counterparts: they exclude certain protocols which are arguably secure.Comment: 43+11 pages, 18 figures, v2: minor changes, extended version of the published pape

    Dynamics of systems with isotropic competing interactions in an external field: a Langevin approach

    Full text link
    We study the Langevin dynamics of a ferromagnetic Ginzburg-Landau Hamiltonian with a competing long-range repulsive term in the presence of an external magnetic field. The model is analytically solved within the self consistent Hartree approximation for two different initial conditions: disordered or zero field cooled (ZFC), and fully magnetized or field cooled (FC). To test the predictions of the approximation we develop a suitable numerical scheme to ensure the isotropic nature of the interactions. Both the analytical approach and the numerical simulations of two-dimensional finite systems confirm a simple aging scenario at zero temperature and zero field. At zero temperature a critical field hch_c is found below which the initial conditions are relevant for the long time dynamics of the system. For h<hch < h_c a logarithmic growth of modulated domains is found in the numerical simulations but this behavior is not captured by the analytical approach which predicts a t1/2t^1/2 growth law at T=0T = 0

    Multimodel projections and uncertainties of irrigation water demand under climate change

    No full text
    Crop irrigation is responsible for 70% of humanity's water demand. Since the late 1990s, the expansion of irrigated areas has been tapering off, and this trend is expected to continue in the future. Future irrigation water demand (IWD) is, however, subject to large uncertainties due to anticipated climate change. Here, we use a set of seven global hydrological models (GHMs) to quantify the impact of projected global climate change on IWD on currently irrigated areas by the end of this century, and to assess the resulting uncertainties arising from both the GHMs and climate projections. The resulting ensemble projections generally show an increasing trend in future IWD, but the increase varies substantially depending on the degree of global warming and associated regional precipitation changes. Under the highest greenhouse gas emission scenario (RCP8.5), IWD will considerably increase during the summer in the Northern Hemisphere (>20% by 2100), and the present peak IWD is projected to shift one month or more over regions where ≥80% of the global irrigated areas exist and 4 billion people currently live. Uncertainties arising from GHMs and global climate models (GCMs) are large, with GHM uncertainty dominating throughout the century and with GCM uncertainty substantially increasing from the midcentury, indicating the choice of GHM outweighing by far the uncertainty arising from the choice of GCM and associated emission scenario. Key Points: IWD will considerably increase during the summer in the Northern Hemisphere Peak demand is projected to shift over 80% of the present irrigated areas Global hydrological models dominate the uncertainty in projected IWD. © 2013. American Geophysical Union. All Rights Reserved

    Human impact parameterizations in global hydrological models improves estimates of monthly discharges and hydrological extremes: a multi-model validation study

    Get PDF
    Human activities have a profound influence on river discharge, hydrological extremes, and water-related hazards. In this study, we compare the results of five state-of-the-art global hydrological models (GHMs) with observations to examine the role of human impact parameterizations (HIP) in the simulation of the mean, high, and low flows. The analysis is performed for 471 gauging stations across the globe and for the period 1971-2010. We find that the inclusion of HIP improves the performance of GHMs, both in managed and near-natural catchments. For near-natural catchments, the improvement in performance results from improvements in incoming discharges from upstream managed catchments. This finding is robust across GHMs, although the level of improvement and reasons for improvement vary greatly by GHM. The inclusion of HIP leads to a significant decrease in the bias of long-term mean monthly discharge in 36-73% of the studied catchments, and an improvement in modelled hydrological variability in 31-74% of the studied catchments. Including HIP in the GHMs also leads to an improvement in the simulation of hydrological extremes, compared to when HIP is excluded. Whilst the inclusion of HIP leads to decreases in simulated high-flows, it can lead to either increases or decreases in low-flows. This is due to the relative importance of the timing of return flows and reservoir operations and their associated uncertainties. Even with the inclusion of HIP, we find that model performance still not optimal. This highlights the need for further research linking the human management and hydrological domains, especially in those areas with a dominant human impact. The large variation in performance between GHMs, regions, and performance indicators, calls for a careful selection of GHMs, model components, and evaluation metrics in future model applications

    Groundwater depletion embedded in international food trade

    Get PDF
    Recent hydrological modelling1 and Earth observations2,3 have located and quantified alarming rates of groundwater depletion worldwide. This depletion is primarily due to water withdrawals for irrigation1,2,4, but its connection with the main driver of irrigation, global food consumption, has not yet been explored. Here we show that approximately eleven per cent of non-renewable groundwater use for irrigation is embedded in international food trade, of which two-thirds are exported by Pakistan, the USA and India alone. Our quantification of groundwater depletion embedded in the world’s food trade is based on a combination of global, cropspecific estimates of non-renewable groundwater abstraction and international food trade data. A vast majority of the world’s population lives in countries sourcing nearly all their staple crop imports from partners who deplete groundwater to produce these crops, highlighting risks for global food and water security. Some countries, such as the USA, Mexico, Iran and China, are particularly exposed to these risks because they both produce and import food irrigated from rapidly depleting aquifers. Our results could help to improve the sustainability of global food production and groundwater resource management by identifying priority regions and agricultural products at risk as well as the end consumers of these products
    corecore