2,823 research outputs found

    Unconditional Security of Three State Quantum Key Distribution Protocols

    Full text link
    Quantum key distribution (QKD) protocols are cryptographic techniques with security based only on the laws of quantum mechanics. Two prominent QKD schemes are the BB84 and B92 protocols that use four and two quantum states, respectively. In 2000, Phoenix et al. proposed a new family of three state protocols that offers advantages over the previous schemes. Until now, an error rate threshold for security of the symmetric trine spherical code QKD protocol has only been shown for the trivial intercept/resend eavesdropping strategy. In this paper, we prove the unconditional security of the trine spherical code QKD protocol, demonstrating its security up to a bit error rate of 9.81%. We also discuss on how this proof applies to a version of the trine spherical code QKD protocol where the error rate is evaluated from the number of inconclusive events.Comment: 4 pages, published versio

    Internal structure of Skyrme black hole

    Get PDF
    We consider the internal structure of the Skyrme black hole under a static and spherically symmetric ansatz. $@u8(Be concentrate on solutions with the node number one and with the "winding" number zero, where there exist two solutions for each horizon radius; one solution is stable and the other is unstable against linear perturbation. We find that a generic solution exhibits an oscillating behavior near the sigularity, as similar to a solution in the Einstein-Yang-Mills (EYM) system, independently to stability of the solution. Comparing it with that in the EYM system, this oscillation becomes mild because of the mass term of the Skyrme field. We also find Schwarzschild-like exceptional solutions where no oscillating behavior is seen. Contrary to the EYM system where there is one such solution branch if the node number is fixed, there are two branches corresponding to the stable and the unstable ones.Comment: 5 pages, 4 figures, some contents adde

    Quantum circuit for security proof of quantum key distribution without encryption of error syndrome and noisy processing

    Full text link
    One of the simplest security proofs of quantum key distribution is based on the so-called complementarity scenario, which involves the complementarity control of an actual protocol and a virtual protocol [M. Koashi, e-print arXiv:0704.3661 (2007)]. The existing virtual protocol has a limitation in classical postprocessing, i.e., the syndrome for the error-correction step has to be encrypted. In this paper, we remove this limitation by constructing a quantum circuit for the virtual protocol. Moreover, our circuit with a shield system gives an intuitive proof of why adding noise to the sifted key increases the bit error rate threshold in the general case in which one of the parties does not possess a qubit. Thus, our circuit bridges the simple proof and the use of wider classes of classical postprocessing.Comment: 8 pages, 2 figures. Typo correcte

    Quantified Derandomization of Linear Threshold Circuits

    Full text link
    One of the prominent current challenges in complexity theory is the attempt to prove lower bounds for TC0TC^0, the class of constant-depth, polynomial-size circuits with majority gates. Relying on the results of Williams (2013), an appealing approach to prove such lower bounds is to construct a non-trivial derandomization algorithm for TC0TC^0. In this work we take a first step towards the latter goal, by proving the first positive results regarding the derandomization of TC0TC^0 circuits of depth d>2d>2. Our first main result is a quantified derandomization algorithm for TC0TC^0 circuits with a super-linear number of wires. Specifically, we construct an algorithm that gets as input a TC0TC^0 circuit CC over nn input bits with depth dd and n1+exp⁥(−d)n^{1+\exp(-d)} wires, runs in almost-polynomial-time, and distinguishes between the case that CC rejects at most 2n1−1/5d2^{n^{1-1/5d}} inputs and the case that CC accepts at most 2n1−1/5d2^{n^{1-1/5d}} inputs. In fact, our algorithm works even when the circuit CC is a linear threshold circuit, rather than just a TC0TC^0 circuit (i.e., CC is a circuit with linear threshold gates, which are stronger than majority gates). Our second main result is that even a modest improvement of our quantified derandomization algorithm would yield a non-trivial algorithm for standard derandomization of all of TC0TC^0, and would consequently imply that NEXP⊆̞TC0NEXP\not\subseteq TC^0. Specifically, if there exists a quantified derandomization algorithm that gets as input a TC0TC^0 circuit with depth dd and n1+O(1/d)n^{1+O(1/d)} wires (rather than n1+exp⁥(−d)n^{1+\exp(-d)} wires), runs in time at most 2nexp⁥(−d)2^{n^{\exp(-d)}}, and distinguishes between the case that CC rejects at most 2n1−1/5d2^{n^{1-1/5d}} inputs and the case that CC accepts at most 2n1−1/5d2^{n^{1-1/5d}} inputs, then there exists an algorithm with running time 2n1−Ω(1)2^{n^{1-\Omega(1)}} for standard derandomization of TC0TC^0.Comment: Changes in this revision: An additional result (a PRG for quantified derandomization of depth-2 LTF circuits); rewrite of some of the exposition; minor correction

    Universality of Highly Damped Quasinormal Modes for Single Horizon Black Holes

    Full text link
    It has been suggested that the highly damped quasinormal modes of black holes provide information about the microscopic quantum gravitational states underlying black hole entropy. This interpretation requires the form of the highly damped quasinormal mode frequency to be universally of the form: ℏωR=ln⁥(l)kTBH\hbar\omega_R = \ln(l)kT_{BH}, where ll is an integer, and TBHT_{BH} is the black hole temperature. We summarize the results of an analysis of the highly damped quasinormal modes for a large class of single horizon, asymptotically flat black holes.Comment: 9 pages, 1 figure, submitted to the proceedings of Theory CANADA 1, which will be published in a special edition of the Canadian Journal of Physic

    Black String Perturbations in RS1 Model

    Full text link
    We present a general formalism for black string perturbations in Randall-Sundrum 1 model (RS1). First, we derive the master equation for the electric part of the Weyl tensor EΌΜE_{\mu\nu}. Solving the master equation using the gradient expansion method, we give the effective Teukolsky equation on the brane at low energy. It is useful to estimate gravitational waves emitted by perturbed rotating black strings. We also argue the effect of the Gregory-Laflamme instability on the brane using our formalism.Comment: 14 pages, Based on a talk presented at ACRGR4, the 4th Australasian Conference on General Relativity and Gravitation, Monash University, Melbourne, January 2004. To appear in the proceedings, in General Relativity and Gravitatio

    Black hole entropy for the general area spectrum

    Full text link
    We consider the possibility that the horizon area is expressed by the general area spectrum in loop quantum gravity and calculate the black hole entropy by counting the degrees of freedom in spin-network states related to its area. Although the general area spectrum has a complex expression, we succeeded in obtaining the result that the black hole entropy is proportional to its area as in previous works where the simplified area formula has been used. This gives new values for the Barbero-Immirzi parameter (Îł=0.5802...or0.7847...\gamma =0.5802... \mathrm{or} 0.7847...) which are larger than that of previous works.Comment: 5 page

    Radionic Non-uniform Black Strings

    Get PDF
    Non-uniform black strings in the two-brane system are investigated using the effective action approach. It is shown that the radion acts as a non-trivial hair of the black strings. From the brane point of view, the black string appears as the deformed dilatonic black hole which becomes dilatonic black hole in the single brane limit and reduces to the Reissner-Nordstr\"om black hole in the close limit of two-branes. The stability of solutions is demonstrated using the catastrophe theory. From the bulk point of view, the black strings are proved to be non-uniform. Nevertheless, the zeroth law of black hole thermodynamics still holds.Comment: 9 pages, 6 figure

    Renormalization and black hole entropy in Loop Quantum Gravity

    Full text link
    Microscopic state counting for a black hole in Loop Quantum Gravity yields a result proportional to horizon area, and inversely proportional to Newton's constant and the Immirzi parameter. It is argued here that before this result can be compared to the Bekenstein-Hawking entropy of a macroscopic black hole, the scale dependence of both Newton's constant and the area must be accounted for. The two entropies could then agree for any value of the Immirzi parameter, if a certain renormalization property holds.Comment: 8 pages; v2: references added, typos corrected, version to appear in CQ

    Particle velocity in noncommutative space-time

    Full text link
    We investigate a particle velocity in the Îș\kappa-Minkowski space-time, which is one of the realization of a noncommutative space-time. We emphasize that arrival time analyses by high-energy Îł\gamma-rays or neutrinos, which have been considered as powerful tools to restrict the violation of Lorentz invariance, are not effective to detect space-time noncommutativity. In contrast with these examples, we point out a possibility that {\it low-energy massive particles} play an important role to detect it.Comment: 16 pages, corrected some mistake
    • 

    corecore