5,092 research outputs found

    No Superluminal Signaling Implies Unconditionally Secure Bit Commitment

    Full text link
    Bit commitment (BC) is an important cryptographic primitive for an agent to convince a mutually mistrustful party that she has already made a binding choice of 0 or 1 but only to reveal her choice at a later time. Ideally, a BC protocol should be simple, reliable, easy to implement using existing technologies, and most importantly unconditionally secure in the sense that its security is based on an information-theoretic proof rather than computational complexity assumption or the existence of a trustworthy arbitrator. Here we report such a provably secure scheme involving only one-way classical communications whose unconditional security is based on no superluminal signaling (NSS). Our scheme is inspired by the earlier works by Kent, who proposed two impractical relativistic protocols whose unconditional securities are yet to be established as well as several provably unconditionally secure protocols which rely on both quantum mechanics and NSS. Our scheme is conceptually simple and shows for the first time that quantum communication is not needed to achieve unconditional security for BC. Moreover, with purely classical communications, our scheme is practical and easy to implement with existing telecom technologies. This completes the cycle of study of unconditionally secure bit commitment based on known physical laws.Comment: This paper has been withdrawn by the authors due to a crucial oversight on an earlier work by A. Ken

    Turbulent Pair Diffusion

    Full text link
    Kinematic Simulations of turbulent pair diffusion in planar turbulence with a -5/3 energy spectrum reproduce the results of the laboratory measurements of Jullien Phys. Rev. Lett. 82, 2872 (1999), in particular the stretched exponential form of the PDF of pair separations and their correlation functions. The root mean square separation is found to be strongly dependent on initial conditions for very long stretches of times. This dependence is consistent with the topological picture of turbulent pair diffusion where pairs initially close enough travel together for long stretches of time and separate violently when they meet straining regions around hyperbolic points. A new argument based on the divergence of accelerations is given to support this picture

    Investigations of afterpulsing and detection efficiency recovery in superconducting nanowire single-photon detectors

    Full text link
    We report on the observation of a non-uniform dark count rate in Superconducting Nanowire Single Photon Detectors (SNSPDs), specifically focusing on an afterpulsing effect present when the SNSPD is operated at a high bias current regime. The afterpulsing exists for real detection events (triggered by input photons) as well as for dark counts (no laser input). In our standard set-up, the afterpulsing is most likely to occur at around 180 ns following a detection event, for both real counts and dark counts. We characterize the afterpulsing behavior and speculate that it is not due to the SNSPD itself but rather the amplifiers used to boost the electrical output signal from the SNSPD. We show that the afterpulsing indeed disappears when we use a different amplifier with a better low frequency response. We also examine the short-lived enhancement of detection efficiency during the recovery of the SNSPD due to temporary perturbation of the bias and grounding conditions

    Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"

    Full text link
    This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98, 231104 (2011); arXiv:1106.2675v1 [quant-ph]].Comment: 2 page

    Quantum key distribution with delayed privacy amplification and its application to security proof of a two-way deterministic protocol

    Get PDF
    Privacy amplification (PA) is an essential post-processing step in quantum key distribution (QKD) for removing any information an eavesdropper may have on the final secret key. In this paper, we consider delaying PA of the final key after its use in one-time pad encryption and prove its security. We prove that the security and the key generation rate are not affected by delaying PA. Delaying PA has two applications: it serves as a tool for significantly simplifying the security proof of QKD with a two-way quantum channel, and also it is useful in QKD networks with trusted relays. To illustrate the power of the delayed PA idea, we use it to prove the security of a qubit-based two-way deterministic QKD protocol which uses four states and four encoding operations.Comment: 11 pages, 3 figure

    Richardson's pair diffusion and the stagnation point structure of turbulence

    Get PDF
    DNS and laboratory experiments show that the spatial distribution of straining stagnation points in homogeneous isotropic 3D turbulence has a fractal structure with dimension D_s = 2. In Kinematic Simulations the time exponent gamma in Richardson's law and the fractal dimension D_s are related by gamma = 6/D_s. The Richardson constant is found to be an increasing function of the number of straining stagnation points in agreement with pair duffusion occuring in bursts when pairs meet such points in the flow.Comment: 4 pages; Submitted to Phys. Rev. Let

    Secure gated detection scheme for quantum cryptography

    Full text link
    Several attacks have been proposed on quantum key distribution systems with gated single-photon detectors. The attacks involve triggering the detectors outside the center of the detector gate, and/or using bright illumination to exploit classical photodiode mode of the detectors. Hence a secure detection scheme requires two features: The detection events must take place in the middle of the gate, and the detector must be single-photon sensitive. Here we present a technique called bit-mapped gating, which is an elegant way to force the detections in the middle of the detector gate by coupling detection time and quantum bit error rate. We also discuss how to guarantee single-photon sensitivity by directly measuring detector parameters. Bit-mapped gating also provides a simple way to measure the detector blinding parameter in security proofs for quantum key distribution systems with detector efficiency mismatch, which up until now has remained a theoretical, unmeasurable quantity. Thus if single-photon sensitivity can be guaranteed within the gates, a detection scheme with bit-mapped gating satisfies the assumptions of the current security proofs.Comment: 7 pages, 3 figure

    A physical modeling approach for identification of source regions of primary and secondary air pollutants

    No full text
    International audienceThis paper describes a simple but practical methodology to identify the contribution of primary and secondary air pollutants from the local/regional emission sources to Hong Kong, a highly urbanized city with complex terrain and coastlines. The meteorological model MM5 coupled with a three-dimensional, mutli-particle trajectory model is used to identify salient aspects of regional air pollutant transport characteristics during some typical meteorological conditions over the Pearl River Delta (PRD) region. Several weighting factors are determined for calculating the air mass/pollutant trajectory and are used to evaluate the local and regional contribution of primary pollutants over the PRD to Hong Kong pollution. The relationships between emission inventories, physical paths and chemical transformation rates of the pollutants, and observational measurements are formulated. The local and regional contributions of secondary pollutants are obtained by this conceptual module under different weather scenarios. Our results demonstrate that major pollution sources over Hong Kong come from regional transport. In calm-weather situations, 78% of the respirable suspended particulates (RSP) totals in Hong Kong are contributed by regional transport, and 49% are contributed by the power plants within the PRD. In normal-day situations, 71% of the RSP are contributed by regional transport, and 45% are contributed by the power plants
    • …
    corecore