667 research outputs found
Private states, quantum data hiding and the swapping of perfect secrecy
We derive a formal connection between quantum data hiding and quantum
privacy, confirming the intuition behind the construction of bound entangled
states from which secret bits can be extracted. We present three main results.
First, we show how to simplify the class of private states and related states
via reversible local operation and one-way communication. Second, we obtain a
bound on the one-way distillable entanglement of private states in terms of
restricted relative entropy measures, which is tight in many cases and shows
that protocols for one-way distillation of key out of states with low
distillable entanglement lead to the distillation of data hiding states. Third,
we consider the problem of extending the distance of quantum key distribution
with help of intermediate stations. In analogy to the quantum repeater, this
paradigm has been called the quantum key repeater. We show that when extending
private states with one-way communication, the resulting rate is bounded by the
one-way distillable entanglement. In order to swap perfect secrecy it is thus
essentially optimal to use entanglement swapping.Comment: v3 published version, some details of the main proofs have been moved
to the appendix, 21 pages. v2 claims changed from LOCC to one-way LOCC in the
process of correcting a mistake found in v1 (in proof of Lemma 3). v1: 15
pages, 9 figure
First CO(17-16) emission line detected in a z > 6 quasar
We report the serendipitous detection of the CO(17-16) emission line toward
the quasar SDSSJ114816.64+525150.3 (J1148) at redshift z = 6.4 obtained with
the Plateau de Bure Interferometer. The CO(17-16) line is possibly contaminated
by OH+ emission, that may account for ~ 35 - 60% of the total flux observed.
Photo-Dissociation and X-ray Dominated Regions (PDRs and XDRs) models show that
PDRs alone cannot reproduce the high luminosity of the CO(17-16) line relative
to low-J CO transitions and that XDRs are required. By adopting a composite
PDR+XDR model we derive molecular cloud and radiation field properties in the
nuclear region of J1148. Our results show that highly excited CO lines
represent a sensitive and possibly unique tool to infer the presence of X-ray
faint or obscured supermassive black hole progenitors in high-z galaxies.Comment: 6 pages, 4 figures, accepted for publication in MNRAS Lette
Applicazione dei laser scanner terrestri in campo agro-forestale e ambientale
Le tecniche di laser scanning terrestre suscitano un interesse sempre più crescente sia in campo ambientale sia in campo agro-forestale in quanto consentono un’acquisizione rapida e affidabile di nuvole di punti 3D in grado di rappresentare tridimensionalmente gli oggetti rilevati. In un lasso di tempo relativamente breve, tali tecniche hanno aperto la strada ad un ampio spettro di applicazioni in pieno campo. Al di là della misura interattiva di nuvole georeferenziate di punti, le tecniche per il rilevamento automatizzato di oggetti, la determinazione delle loro caratteristiche geometriche e l’analisi della risposta del segnale laser rappresentano temi di ricerca prioritari. L’elevata qualità delle nuvole di punti 3D generate dai sistemi di laser scanning insieme alla possibilità di automatizzare le successive post-elaborazioni dei dati hanno esteso il potenziale applicativo dei laser scanner terrestri anche ai settori ambientali e agro-forestali. Questo contributo illustra innanzitutto lo stato dell’arte dei sistemi laser scanner terrestri dal punto di vista tecnologico e discute le diverse soluzioni tecnologiche e i diversi parametri di sistema in relazione alle possibili applicazioni in campo ambientale e forestale. Nella seconda parte saranno invece presentati alcuni casi di studio esplicativi delle potenzialità e delle limitazioni operative della tecnica di laser scanning terrestre in campo ambientale e agro-forestale.
Terrestrial laser scanning techniques find rapidly growing interest in both environmental and agro-forestry fields as efficient tools for fast and reliable 3D point data acquisition and 3D representation of the object viewed by the scanners. They have opened a wide range of application fields within a rather short period of time. Beyond interactive measurement in 3D point clouds, techniques for the automatic detection of objects, the determination of geometric parameters, and the analysis of the reflectance signal form high priority research issues. The high quality of 3D point clouds generated by laser scanners and the data process automation potential make terrestrial laser scanning also an interesting tool for environmental and agro-forestry applications. The paper will first review current laser scanner systems from a technological point of view and discuss different scanner technologies and system parameters regarding their suitability for environmental and agro-forestry applications. In the second part of the paper, results of case studies on potentials and limitations of terrestrial laser scanners in environmental and agro-forestry fields will be presented
GHG emissions inventory at urban scale: the Sassari case study
Within current initiatives dedicated to provide information on the status of greenhouse gases emissions, the town of Sassari represents a pilot site for estimating the net exchange of carbon dioxide (emissions and sinks) at municipal level in Sardinia (Italy). A spatial and temporal high resolution greenhouse gas emissions inventory for the urban area of Sassari is currently under construction in line with European and international standard protocols to establish a baseline for tracking emission trends. This paper presents the preliminary results of the development of a simplified local emissions inventory where estimates of the atmospheric emissions are collected and cataloged by type of greenhouse gases, productive activity and emissive source on annual basis
Deterministic Identification Over Multiple-Access Channels
Deterministic identification over K-input multiple-access channels with
average input cost constraints is considered. The capacity region for
deterministic identification is determined for an average-error criterion,
where arbitrarily large codes are achievable. For a maximal-error criterion,
upper and lower bounds on the capacity region are derived. The bounds coincide
if all average partial point-to-point channels are injective under the input
constraint, i.e. all inputs at one terminal are mapped to distinct output
distributions, if averaged over the inputs at all other terminals. The
achievability is proved by treating the MAC as an arbitrarily varying channel
with average state constraints. For injective average channels, the capacity
region is a hyperrectangle. The modulo-2 and modulo-3 binary adder MAC are
presented as examples of channels which are injective under suitable input
constraints. The binary multiplier MAC is presented as an example of a
non-injective channel, where the achievable identification rate region still
includes the Shannon capacity region.Comment: ISIT 2023 versio
Comparison of Quantum PUF models
Physical unclonable functions (PUFs) are hardware structures in a physical
system (e.g. semiconductor, crystals etc.) that are used to enable unique
identification of the semiconductor or to secure keys for cryptographic
processes. A PUF thus generates a noisy secret reproducible at runtime. This
secret can either be used to authenticate the chip, or it is available as a
cryptographic key after removing the noise. Latest advancements in the field of
quantum hardware, in some cases claiming to achieve quantum supremacy, highly
target the fragility of current RSA type classical cryptosystems. As a
solution, one would like to develop Quantum PUFs to mitigate such problem.
There are several approaches for this technology. In our work we compare these
different approaches and introduce the requirements for QTOKSim, a quantum
token based authentication simulator testing its performance on a multi-factor
authentication protocol
Information-Theoretically Secret Reed-Muller Identification with Affine Designs
We consider the problem of information-theoretic secrecy in identification
schemes rather than transmission schemes. In identification, large identities
are encoded into small challenges sent with the sole goal of allowing at the
receiver reliable verification of whether the challenge could have been
generated by a (possibly different) identity of his choice. One of the reasons
to consider identification is that it trades decoding for an exponentially
larger rate, however this may come with such encoding complexity and latency
that it can render this advantage unusable. Identification still bears one
unique advantage over transmission in that practical implementation of
information-theoretic secrecy becomes possible, even considering that the
information-theoretic secrecy definition needed in identification is that of
semantic secrecy. Here, we implement a family of encryption schemes, recently
shown to achieve semantic-secrecy capacity, and apply it to a recently-studied
family of identification codes, confirming that, indeed, adding secrecy to
identification comes at essentially no cost. While this is still within the
one-way communication scenario, it is a necessary step into implementing
semantic secrecy with two-way communication, where the information-theoretic
assumptions are more realistic.Comment: 6 pages, 3 figures, accepted at European Wireless 202
- …