2,411 research outputs found
Unconditional Security of Three State Quantum Key Distribution Protocols
Quantum key distribution (QKD) protocols are cryptographic techniques with
security based only on the laws of quantum mechanics. Two prominent QKD schemes
are the BB84 and B92 protocols that use four and two quantum states,
respectively. In 2000, Phoenix et al. proposed a new family of three state
protocols that offers advantages over the previous schemes. Until now, an error
rate threshold for security of the symmetric trine spherical code QKD protocol
has only been shown for the trivial intercept/resend eavesdropping strategy. In
this paper, we prove the unconditional security of the trine spherical code QKD
protocol, demonstrating its security up to a bit error rate of 9.81%. We also
discuss on how this proof applies to a version of the trine spherical code QKD
protocol where the error rate is evaluated from the number of inconclusive
events.Comment: 4 pages, published versio
Internal structure of Skyrme black hole
We consider the internal structure of the Skyrme black hole under a static
and spherically symmetric ansatz. $@u8(Be concentrate on solutions with the
node number one and with the "winding" number zero, where there exist two
solutions for each horizon radius; one solution is stable and the other is
unstable against linear perturbation. We find that a generic solution exhibits
an oscillating behavior near the sigularity, as similar to a solution in the
Einstein-Yang-Mills (EYM) system, independently to stability of the solution.
Comparing it with that in the EYM system, this oscillation becomes mild because
of the mass term of the Skyrme field. We also find Schwarzschild-like
exceptional solutions where no oscillating behavior is seen. Contrary to the
EYM system where there is one such solution branch if the node number is fixed,
there are two branches corresponding to the stable and the unstable ones.Comment: 5 pages, 4 figures, some contents adde
Quantum circuit for security proof of quantum key distribution without encryption of error syndrome and noisy processing
One of the simplest security proofs of quantum key distribution is based on
the so-called complementarity scenario, which involves the complementarity
control of an actual protocol and a virtual protocol [M. Koashi, e-print
arXiv:0704.3661 (2007)]. The existing virtual protocol has a limitation in
classical postprocessing, i.e., the syndrome for the error-correction step has
to be encrypted. In this paper, we remove this limitation by constructing a
quantum circuit for the virtual protocol. Moreover, our circuit with a shield
system gives an intuitive proof of why adding noise to the sifted key increases
the bit error rate threshold in the general case in which one of the parties
does not possess a qubit. Thus, our circuit bridges the simple proof and the
use of wider classes of classical postprocessing.Comment: 8 pages, 2 figures. Typo correcte
Black String Perturbations in RS1 Model
We present a general formalism for black string perturbations in
Randall-Sundrum 1 model (RS1). First, we derive the master equation for the
electric part of the Weyl tensor . Solving the master equation
using the gradient expansion method, we give the effective Teukolsky equation
on the brane at low energy. It is useful to estimate gravitational waves
emitted by perturbed rotating black strings. We also argue the effect of the
Gregory-Laflamme instability on the brane using our formalism.Comment: 14 pages, Based on a talk presented at ACRGR4, the 4th Australasian
Conference on General Relativity and Gravitation, Monash University,
Melbourne, January 2004. To appear in the proceedings, in General Relativity
and Gravitatio
Black hole entropy for the general area spectrum
We consider the possibility that the horizon area is expressed by the general
area spectrum in loop quantum gravity and calculate the black hole entropy by
counting the degrees of freedom in spin-network states related to its area.
Although the general area spectrum has a complex expression, we succeeded in
obtaining the result that the black hole entropy is proportional to its area as
in previous works where the simplified area formula has been used. This gives
new values for the Barbero-Immirzi parameter () which are larger than that of previous works.Comment: 5 page
Radionic Non-uniform Black Strings
Non-uniform black strings in the two-brane system are investigated using the
effective action approach. It is shown that the radion acts as a non-trivial
hair of the black strings. From the brane point of view, the black string
appears as the deformed dilatonic black hole which becomes dilatonic black hole
in the single brane limit and reduces to the Reissner-Nordstr\"om black hole in
the close limit of two-branes. The stability of solutions is demonstrated using
the catastrophe theory. From the bulk point of view, the black strings are
proved to be non-uniform. Nevertheless, the zeroth law of black hole
thermodynamics still holds.Comment: 9 pages, 6 figure
Particle velocity in noncommutative space-time
We investigate a particle velocity in the -Minkowski space-time,
which is one of the realization of a noncommutative space-time. We emphasize
that arrival time analyses by high-energy -rays or neutrinos, which
have been considered as powerful tools to restrict the violation of Lorentz
invariance, are not effective to detect space-time noncommutativity. In
contrast with these examples, we point out a possibility that {\it low-energy
massive particles} play an important role to detect it.Comment: 16 pages, corrected some mistake
- âŠ