2,437 research outputs found

    Unconditional Security of Three State Quantum Key Distribution Protocols

    Full text link
    Quantum key distribution (QKD) protocols are cryptographic techniques with security based only on the laws of quantum mechanics. Two prominent QKD schemes are the BB84 and B92 protocols that use four and two quantum states, respectively. In 2000, Phoenix et al. proposed a new family of three state protocols that offers advantages over the previous schemes. Until now, an error rate threshold for security of the symmetric trine spherical code QKD protocol has only been shown for the trivial intercept/resend eavesdropping strategy. In this paper, we prove the unconditional security of the trine spherical code QKD protocol, demonstrating its security up to a bit error rate of 9.81%. We also discuss on how this proof applies to a version of the trine spherical code QKD protocol where the error rate is evaluated from the number of inconclusive events.Comment: 4 pages, published versio

    Quantum circuit for security proof of quantum key distribution without encryption of error syndrome and noisy processing

    Full text link
    One of the simplest security proofs of quantum key distribution is based on the so-called complementarity scenario, which involves the complementarity control of an actual protocol and a virtual protocol [M. Koashi, e-print arXiv:0704.3661 (2007)]. The existing virtual protocol has a limitation in classical postprocessing, i.e., the syndrome for the error-correction step has to be encrypted. In this paper, we remove this limitation by constructing a quantum circuit for the virtual protocol. Moreover, our circuit with a shield system gives an intuitive proof of why adding noise to the sifted key increases the bit error rate threshold in the general case in which one of the parties does not possess a qubit. Thus, our circuit bridges the simple proof and the use of wider classes of classical postprocessing.Comment: 8 pages, 2 figures. Typo correcte

    Black String Perturbations in RS1 Model

    Full text link
    We present a general formalism for black string perturbations in Randall-Sundrum 1 model (RS1). First, we derive the master equation for the electric part of the Weyl tensor EμνE_{\mu\nu}. Solving the master equation using the gradient expansion method, we give the effective Teukolsky equation on the brane at low energy. It is useful to estimate gravitational waves emitted by perturbed rotating black strings. We also argue the effect of the Gregory-Laflamme instability on the brane using our formalism.Comment: 14 pages, Based on a talk presented at ACRGR4, the 4th Australasian Conference on General Relativity and Gravitation, Monash University, Melbourne, January 2004. To appear in the proceedings, in General Relativity and Gravitatio

    Black hole entropy for the general area spectrum

    Full text link
    We consider the possibility that the horizon area is expressed by the general area spectrum in loop quantum gravity and calculate the black hole entropy by counting the degrees of freedom in spin-network states related to its area. Although the general area spectrum has a complex expression, we succeeded in obtaining the result that the black hole entropy is proportional to its area as in previous works where the simplified area formula has been used. This gives new values for the Barbero-Immirzi parameter (γ=0.5802...or0.7847...\gamma =0.5802... \mathrm{or} 0.7847...) which are larger than that of previous works.Comment: 5 page

    Radionic Non-uniform Black Strings

    Get PDF
    Non-uniform black strings in the two-brane system are investigated using the effective action approach. It is shown that the radion acts as a non-trivial hair of the black strings. From the brane point of view, the black string appears as the deformed dilatonic black hole which becomes dilatonic black hole in the single brane limit and reduces to the Reissner-Nordstr\"om black hole in the close limit of two-branes. The stability of solutions is demonstrated using the catastrophe theory. From the bulk point of view, the black strings are proved to be non-uniform. Nevertheless, the zeroth law of black hole thermodynamics still holds.Comment: 9 pages, 6 figure

    Renormalization and black hole entropy in Loop Quantum Gravity

    Full text link
    Microscopic state counting for a black hole in Loop Quantum Gravity yields a result proportional to horizon area, and inversely proportional to Newton's constant and the Immirzi parameter. It is argued here that before this result can be compared to the Bekenstein-Hawking entropy of a macroscopic black hole, the scale dependence of both Newton's constant and the area must be accounted for. The two entropies could then agree for any value of the Immirzi parameter, if a certain renormalization property holds.Comment: 8 pages; v2: references added, typos corrected, version to appear in CQ

    Particle velocity in noncommutative space-time

    Full text link
    We investigate a particle velocity in the κ\kappa-Minkowski space-time, which is one of the realization of a noncommutative space-time. We emphasize that arrival time analyses by high-energy γ\gamma-rays or neutrinos, which have been considered as powerful tools to restrict the violation of Lorentz invariance, are not effective to detect space-time noncommutativity. In contrast with these examples, we point out a possibility that {\it low-energy massive particles} play an important role to detect it.Comment: 16 pages, corrected some mistake
    corecore