4,962 research outputs found

    From Quantum Cheating to Quantum Security

    Get PDF
    For thousands of years, code-makers and code-breakers have been competing for supremacy. Their arsenals may soon include a powerful new weapon: quantum mechanics. We give an overview of quantum cryptology as of November 2000.Comment: 14 pages, 4 figures. Originally appeared in Physics Today: . This article may be downloaded for personal use only. Any other use requires prior permission of both the author and the American Institute of Physic

    Security of quantum key distribution with imperfect devices

    Full text link
    We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. Our proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. We derive a general lower bound on the asymptotic key generation rate for weakly basis-dependent eavesdropping attacks, and also estimate the rate in some special cases: sources that emit weak coherent states with random phases, detectors with basis-dependent efficiency, and misaligned sources and detectors.Comment: 22 pages. (v3): Minor changes. (v2): Extensively revised and expanded. New results include a security proof for generic small flaws in the source and the detecto

    A quantum analog of Huffman coding

    Get PDF
    We analyze a generalization of Huffman coding to the quantum case. In particular, we notice various difficulties in using instantaneous codes for quantum communication. Nevertheless, for the storage of quantum information, we have succeeded in constructing a Huffman-coding inspired quantum scheme. The number of computational steps in the encoding and decoding processes of N quantum signals can be made to be of polylogarithmic depth by a massively parallel implementation of a quantum gate array. This is to be compared with the O (N^3) computational steps required in the sequential implementation by Cleve and DiVincenzo of the well-known quantum noiseless block coding scheme of Schumacher. We also show that O(N^2(log N)^a) computational steps are needed for the communication of quantum information using another Huffman-coding inspired scheme where the sender must disentangle her encoding device before the receiver can perform any measurements on his signals.Comment: Revised version, 7 pages, two-column, RevTex. Presented at 1998 IEEE International Symposium on Information Theor

    Streamwise forced oscillations of circular and square cylinders

    Get PDF
    The modification of a cylinder wake by streamwise oscillation of the cylinder at the vortex shedding frequency of the unperturbed cylinder is reported. Recent numerical simulations [J. S. Leontini, D. Lo Jacono, and M. C. Thompson, “A numerical study of an inline oscillating cylinder in a free stream,” J. Fluid Mech. 688, 551–568 (2011)] showed that this forcing results in the primary frequency decreasing proportionally to the square of the forcing amplitude, before locking to a subharmonic at higher amplitudes. The experimental results presented here show that this behavior continues at higher Reynolds numbers, although the flow is three-dimensional. In addition, it is shown that this behavior persists when the body is a square cross section, and when the frequency of forcing is detuned from the unperturbed cylinder shedding frequency. The similarity of the results across Reynolds number, geometry, and frequency suggests that the physical mechanism is applicable to periodic forcing of the classic von Ka ́rma ́n vortex street, regardless of the details of the body which forms the street

    House Prices, Airport Location Proximity, and Air Traffic Volume: Plus some Covid-19 Effects

    Get PDF
    • 

    corecore