2,411 research outputs found

    Unconditional Security of Three State Quantum Key Distribution Protocols

    Full text link
    Quantum key distribution (QKD) protocols are cryptographic techniques with security based only on the laws of quantum mechanics. Two prominent QKD schemes are the BB84 and B92 protocols that use four and two quantum states, respectively. In 2000, Phoenix et al. proposed a new family of three state protocols that offers advantages over the previous schemes. Until now, an error rate threshold for security of the symmetric trine spherical code QKD protocol has only been shown for the trivial intercept/resend eavesdropping strategy. In this paper, we prove the unconditional security of the trine spherical code QKD protocol, demonstrating its security up to a bit error rate of 9.81%. We also discuss on how this proof applies to a version of the trine spherical code QKD protocol where the error rate is evaluated from the number of inconclusive events.Comment: 4 pages, published versio

    Internal structure of Skyrme black hole

    Get PDF
    We consider the internal structure of the Skyrme black hole under a static and spherically symmetric ansatz. $@u8(Be concentrate on solutions with the node number one and with the "winding" number zero, where there exist two solutions for each horizon radius; one solution is stable and the other is unstable against linear perturbation. We find that a generic solution exhibits an oscillating behavior near the sigularity, as similar to a solution in the Einstein-Yang-Mills (EYM) system, independently to stability of the solution. Comparing it with that in the EYM system, this oscillation becomes mild because of the mass term of the Skyrme field. We also find Schwarzschild-like exceptional solutions where no oscillating behavior is seen. Contrary to the EYM system where there is one such solution branch if the node number is fixed, there are two branches corresponding to the stable and the unstable ones.Comment: 5 pages, 4 figures, some contents adde

    Quantum circuit for security proof of quantum key distribution without encryption of error syndrome and noisy processing

    Full text link
    One of the simplest security proofs of quantum key distribution is based on the so-called complementarity scenario, which involves the complementarity control of an actual protocol and a virtual protocol [M. Koashi, e-print arXiv:0704.3661 (2007)]. The existing virtual protocol has a limitation in classical postprocessing, i.e., the syndrome for the error-correction step has to be encrypted. In this paper, we remove this limitation by constructing a quantum circuit for the virtual protocol. Moreover, our circuit with a shield system gives an intuitive proof of why adding noise to the sifted key increases the bit error rate threshold in the general case in which one of the parties does not possess a qubit. Thus, our circuit bridges the simple proof and the use of wider classes of classical postprocessing.Comment: 8 pages, 2 figures. Typo correcte

    Black String Perturbations in RS1 Model

    Full text link
    We present a general formalism for black string perturbations in Randall-Sundrum 1 model (RS1). First, we derive the master equation for the electric part of the Weyl tensor EΌΜE_{\mu\nu}. Solving the master equation using the gradient expansion method, we give the effective Teukolsky equation on the brane at low energy. It is useful to estimate gravitational waves emitted by perturbed rotating black strings. We also argue the effect of the Gregory-Laflamme instability on the brane using our formalism.Comment: 14 pages, Based on a talk presented at ACRGR4, the 4th Australasian Conference on General Relativity and Gravitation, Monash University, Melbourne, January 2004. To appear in the proceedings, in General Relativity and Gravitatio

    Black hole entropy for the general area spectrum

    Full text link
    We consider the possibility that the horizon area is expressed by the general area spectrum in loop quantum gravity and calculate the black hole entropy by counting the degrees of freedom in spin-network states related to its area. Although the general area spectrum has a complex expression, we succeeded in obtaining the result that the black hole entropy is proportional to its area as in previous works where the simplified area formula has been used. This gives new values for the Barbero-Immirzi parameter (Îł=0.5802...or0.7847...\gamma =0.5802... \mathrm{or} 0.7847...) which are larger than that of previous works.Comment: 5 page

    Radionic Non-uniform Black Strings

    Get PDF
    Non-uniform black strings in the two-brane system are investigated using the effective action approach. It is shown that the radion acts as a non-trivial hair of the black strings. From the brane point of view, the black string appears as the deformed dilatonic black hole which becomes dilatonic black hole in the single brane limit and reduces to the Reissner-Nordstr\"om black hole in the close limit of two-branes. The stability of solutions is demonstrated using the catastrophe theory. From the bulk point of view, the black strings are proved to be non-uniform. Nevertheless, the zeroth law of black hole thermodynamics still holds.Comment: 9 pages, 6 figure

    Particle velocity in noncommutative space-time

    Full text link
    We investigate a particle velocity in the Îș\kappa-Minkowski space-time, which is one of the realization of a noncommutative space-time. We emphasize that arrival time analyses by high-energy Îł\gamma-rays or neutrinos, which have been considered as powerful tools to restrict the violation of Lorentz invariance, are not effective to detect space-time noncommutativity. In contrast with these examples, we point out a possibility that {\it low-energy massive particles} play an important role to detect it.Comment: 16 pages, corrected some mistake
    • 

    corecore