13,731 research outputs found

    Scalable solid-state quantum computation in decoherence-free subspaces with trapped ions

    Get PDF
    We propose a decoherence-free subspaces (DFS) scheme to realize scalable quantum computation with trapped ions. The spin-dependent Coulomb interaction is exploited, and the universal set of unconventional geometric quantum gates is achieved in encoded subspaces that are immune from decoherence by collective dephasing. The scalability of the scheme for the ion array system is demonstrated, either by an adiabatic way of switching on and off the interactions, or by a fast gate scheme with comprehensive DFS encoding and noise decoupling techniques.Comment: 4 pages, 1 figur

    Three-intensity decoy state method for device independent quantum key distribution with basis dependent errors

    Full text link
    We study the measurement device independent quantum key distribution (MDIQKD) in practice with limited resource, when there are only 3 different states in implementing the decoy-state method and when there are basis dependent coding errors. We present general formulas for the decoy-state method for two-pulse sources with 3 different states, which can be applied to the recently proposed MDIQKD with imperfect single-photon source such as the coherent states or the heralded states from the parametric down conversion. We point out that the existing result for secure QKD with source coding errors does not always hold. We find that very accurate source coding is not necessary. In particular, we loosen the precision of existing result by several magnitude orders for secure QKD.Comment: Published version with Eq.(17) corrected. We emphasize that our major result (Eq.16) for the decoy-state part can be applied to generate a key rate very close to the ideal case of using infinite different coherent states, as was numerically demonstrated in Ref.[21]. Published in PRA, 2013, Ja

    Regularizing Face Verification Nets For Pain Intensity Regression

    Full text link
    Limited labeled data are available for the research of estimating facial expression intensities. For instance, the ability to train deep networks for automated pain assessment is limited by small datasets with labels of patient-reported pain intensities. Fortunately, fine-tuning from a data-extensive pre-trained domain, such as face verification, can alleviate this problem. In this paper, we propose a network that fine-tunes a state-of-the-art face verification network using a regularized regression loss and additional data with expression labels. In this way, the expression intensity regression task can benefit from the rich feature representations trained on a huge amount of data for face verification. The proposed regularized deep regressor is applied to estimate the pain expression intensity and verified on the widely-used UNBC-McMaster Shoulder-Pain dataset, achieving the state-of-the-art performance. A weighted evaluation metric is also proposed to address the imbalance issue of different pain intensities.Comment: 5 pages, 3 figure; Camera-ready version to appear at IEEE ICIP 201

    Proofs of two conjectures on ternary weakly regular bent functions

    Full text link
    We study ternary monomial functions of the form f(x)=\Tr_n(ax^d), where x\in \Ff_{3^n} and \Tr_n: \Ff_{3^n}\to \Ff_3 is the absolute trace function. Using a lemma of Hou \cite{hou}, Stickelberger's theorem on Gauss sums, and certain ternary weight inequalities, we show that certain ternary monomial functions arising from \cite{hk1} are weakly regular bent, settling a conjecture of Helleseth and Kholosha \cite{hk1}. We also prove that the Coulter-Matthews bent functions are weakly regular.Comment: 20 page

    Simple protocol for secure decoy-state quantum key distribution with a loosely controlled source

    Full text link
    The method of decoy-state quantum key distribution (QKD) requests different intensities of light pulses. Existing theory has assumed exact control of intensities. Here we propose a simple protocol which is secure and efficient even there are errors in intensity control. In our protocol, decoy pulses and signal pulses are generated from the same father pulses with a two-value attenuation. Given the upper bound of fluctuation of the father pulses, our protocol is secure provided that the two-value attenuation is done exactly. We propose to use unbalanced beam-splitters for a stable attenuation. Given that the intensity error is bounded by ±5\pm5%, with the same key rate, our method can achieve a secure distance only 1 km shorter than that of an ideal protocol with exactly controlled source

    Practical decoy state method in quantum key distribution with heralded single photon source

    Get PDF
    We propose a practical decoy state method with heralded single photon source for quantum key distribution (QKD). In the protocol, 3 intensities are used and one can estimate the fraction of single-photon counts. The final key rate over transmission distance is simulated under various parameter sets. Due to the lower dark count than that of a coherent state, it is shown that a 3-intensity decoy-state QKD with a heralded source can work for a longer distance than that of a coherent state.Comment: 10 pages, 4 Postscript figure

    A decoy-state protocol for quantum cryptography with 4 intensities of coherent states

    Full text link
    In order to beat any type of photon-number-splitting attack, we propose a protocol for quantum key distributoin (QKD) using 4 different intensities of pulses. They are vacuum and coherent states with mean photon number μ,μ′\mu,\mu' and μs\mu_s. μs\mu_s is around 0.55 and this class of pulses are used as the main signal states. The other two classes of coherent states (μ,μ′\mu,\mu') are also used signal states but their counting rates should be studied jointly with the vacuum. We have shown that, given the typical set-up in practice, the key rate from the main signal pulses is quite close to the theoretically allowed maximal rate in the case given the small overall transmittance of 10−410^{-4}
    • …
    corecore