8,179 research outputs found

    No Superluminal Signaling Implies Unconditionally Secure Bit Commitment

    Full text link
    Bit commitment (BC) is an important cryptographic primitive for an agent to convince a mutually mistrustful party that she has already made a binding choice of 0 or 1 but only to reveal her choice at a later time. Ideally, a BC protocol should be simple, reliable, easy to implement using existing technologies, and most importantly unconditionally secure in the sense that its security is based on an information-theoretic proof rather than computational complexity assumption or the existence of a trustworthy arbitrator. Here we report such a provably secure scheme involving only one-way classical communications whose unconditional security is based on no superluminal signaling (NSS). Our scheme is inspired by the earlier works by Kent, who proposed two impractical relativistic protocols whose unconditional securities are yet to be established as well as several provably unconditionally secure protocols which rely on both quantum mechanics and NSS. Our scheme is conceptually simple and shows for the first time that quantum communication is not needed to achieve unconditional security for BC. Moreover, with purely classical communications, our scheme is practical and easy to implement with existing telecom technologies. This completes the cycle of study of unconditionally secure bit commitment based on known physical laws.Comment: This paper has been withdrawn by the authors due to a crucial oversight on an earlier work by A. Ken

    Vortex simulation of the pressure field of a jet

    Get PDF
    Fluctuations of the pressure field of a jet are simulated numerically by a flow model consisting of axisymmetric vortex rings with viscous cores submerged in an inviscid uniform stream. Vortex shedding time intervals, randomly created to imitate the time-history characteristics of the pressure signals of a jet, are generated based on a probability distribution of the intervals between successive pressure peaks obtained from experiments. It is found that, up to five diameters downstream of the jet exit, the characteristics of the pressure fluctuations and the most probable time intervals between experimental and numerical results show good qualitative agreements. The role played by the axisymmetric vortex model in pressure field as well as extensions of the model is also discussed

    Investigations of afterpulsing and detection efficiency recovery in superconducting nanowire single-photon detectors

    Full text link
    We report on the observation of a non-uniform dark count rate in Superconducting Nanowire Single Photon Detectors (SNSPDs), specifically focusing on an afterpulsing effect present when the SNSPD is operated at a high bias current regime. The afterpulsing exists for real detection events (triggered by input photons) as well as for dark counts (no laser input). In our standard set-up, the afterpulsing is most likely to occur at around 180 ns following a detection event, for both real counts and dark counts. We characterize the afterpulsing behavior and speculate that it is not due to the SNSPD itself but rather the amplifiers used to boost the electrical output signal from the SNSPD. We show that the afterpulsing indeed disappears when we use a different amplifier with a better low frequency response. We also examine the short-lived enhancement of detection efficiency during the recovery of the SNSPD due to temporary perturbation of the bias and grounding conditions

    Citation of non-English peer review publications – some Chinese examples

    Get PDF
    Articles published in English language journals with citations of non-English peer reviewed materials are not very common today. However, as epidemiologists are becoming more aware of data and information being readily available and accessible in the non-English literature, the question of whether non-English materials can be cited in English language journals and if so, how should they be cited, has become an increasingly important issue. Bringing together personal insights from the author's familiarity with both the English and Chinese language epidemiological literature and results from a survey on the use of citations of non-English peer reviewed materials across a sample of epidemiology and public health journals, this commentary discusses the different ways authors cite non-English articles in different English language journals and the different methods used by journals to handle non-Latin scripts (e.g. transliteration). This commentary will be useful to both epidemiologists and editors alike

    Turbulent Pair Diffusion

    Full text link
    Kinematic Simulations of turbulent pair diffusion in planar turbulence with a -5/3 energy spectrum reproduce the results of the laboratory measurements of Jullien Phys. Rev. Lett. 82, 2872 (1999), in particular the stretched exponential form of the PDF of pair separations and their correlation functions. The root mean square separation is found to be strongly dependent on initial conditions for very long stretches of times. This dependence is consistent with the topological picture of turbulent pair diffusion where pairs initially close enough travel together for long stretches of time and separate violently when they meet straining regions around hyperbolic points. A new argument based on the divergence of accelerations is given to support this picture

    Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"

    Full text link
    This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98, 231104 (2011); arXiv:1106.2675v1 [quant-ph]].Comment: 2 page

    Quantum key distribution with delayed privacy amplification and its application to security proof of a two-way deterministic protocol

    Get PDF
    Privacy amplification (PA) is an essential post-processing step in quantum key distribution (QKD) for removing any information an eavesdropper may have on the final secret key. In this paper, we consider delaying PA of the final key after its use in one-time pad encryption and prove its security. We prove that the security and the key generation rate are not affected by delaying PA. Delaying PA has two applications: it serves as a tool for significantly simplifying the security proof of QKD with a two-way quantum channel, and also it is useful in QKD networks with trusted relays. To illustrate the power of the delayed PA idea, we use it to prove the security of a qubit-based two-way deterministic QKD protocol which uses four states and four encoding operations.Comment: 11 pages, 3 figure

    Cyclin F Is Degraded during G2-M by Mechanisms Fundamentally Different from Other Cyclins

    Get PDF
    Cyclin F, a cyclin that can form SCF complexes and bind to cyclin B, oscillates in the cell cycle with a pattern similar to cyclin A and cyclin B. Ectopic expression of cyclin F arrests the cell cycle in G2/M. How the level of cyclin F is regulated during the cell cycle is completely obscure. Here we show that, similar to cyclin A, cyclin F is degraded when the spindle assembly checkpoint is activated and accumulates when the DNA damage checkpoint is activated. Cyclin F is a very unstable protein throughout much of the cell cycle. Unlike other cyclins, degradation of cyclin F is independent of ubiquitination and proteasome-mediated pathways. Interestingly, proteolysis of cyclin F is likely to involve metalloproteases. Rapid destruction of cyclin F does not require the N-terminal F-box motif but requires the COOH-terminal PEST sequences. The PEST region alone is sufficient to interfere with the degradation of cyclin F and confer instability when fused to cyclin A. These data show that although cyclin F is degraded at similar time as the mitotic cyclins, the underlying mechanisms are entirely distinct
    • …
    corecore