3,944 research outputs found

    Robust Unconditionally Secure Quantum Key Distribution with Two Nonorthogonal and Uninformative States

    Full text link
    We introduce a novel form of decoy-state technique to make the single-photon Bennett 1992 protocol robust against losses and noise of a communication channel. Two uninformative states are prepared by the transmitter in order to prevent the unambiguous state discrimination attack and improve the phase-error rate estimation. The presented method does not require strong reference pulses, additional electronics or extra detectors for its implementation.Comment: 7 pages, 2 figure

    Towards a spin foam model description of black hole entropy

    Full text link
    We propose a way to describe the origin of black hole entropy in the spin foam models of quantum gravity. This stimulates a new way to study the relation of spin foam models and loop quantum gravity.Comment: 5 pages, 1 figur

    Unconditional Security of Three State Quantum Key Distribution Protocols

    Full text link
    Quantum key distribution (QKD) protocols are cryptographic techniques with security based only on the laws of quantum mechanics. Two prominent QKD schemes are the BB84 and B92 protocols that use four and two quantum states, respectively. In 2000, Phoenix et al. proposed a new family of three state protocols that offers advantages over the previous schemes. Until now, an error rate threshold for security of the symmetric trine spherical code QKD protocol has only been shown for the trivial intercept/resend eavesdropping strategy. In this paper, we prove the unconditional security of the trine spherical code QKD protocol, demonstrating its security up to a bit error rate of 9.81%. We also discuss on how this proof applies to a version of the trine spherical code QKD protocol where the error rate is evaluated from the number of inconclusive events.Comment: 4 pages, published versio

    Unconditionally Secure Key Distribution Based on Two Nonorthogonal States

    Full text link
    We prove the unconditional security of the Bennett 1992 protocol, by using a reduction to an entanglement distillation protocol initiated by a local filtering process. The bit errors and the phase errors are correlated after the filtering, and we can bound the amount of phase errors from the observed bit errors by an estimation method involving nonorthogonal measurements. The angle between the two states shows a trade-off between accuracy of the estimation and robustness to noises.Comment: 5 pages, 1 figur

    Quantum circuit for security proof of quantum key distribution without encryption of error syndrome and noisy processing

    Full text link
    One of the simplest security proofs of quantum key distribution is based on the so-called complementarity scenario, which involves the complementarity control of an actual protocol and a virtual protocol [M. Koashi, e-print arXiv:0704.3661 (2007)]. The existing virtual protocol has a limitation in classical postprocessing, i.e., the syndrome for the error-correction step has to be encrypted. In this paper, we remove this limitation by constructing a quantum circuit for the virtual protocol. Moreover, our circuit with a shield system gives an intuitive proof of why adding noise to the sifted key increases the bit error rate threshold in the general case in which one of the parties does not possess a qubit. Thus, our circuit bridges the simple proof and the use of wider classes of classical postprocessing.Comment: 8 pages, 2 figures. Typo correcte

    Unconditional Security of Single-Photon Differential Phase Shift Quantum Key Distribution

    Full text link
    In this Letter, we prove the unconditional security of single-photon differential phase shift quantum key distribution (DPS-QKD) protocol, based on the conversion to an equivalent entanglement-based protocol. We estimate the upper bound of the phase error rate from the bit error rate, and show that DPS-QKD can generate unconditionally secure key when the bit error rate is not greater than 4.12%. This proof is the first step to the unconditional security proof of coherent state DPS-QKD.Comment: 5 pages, 2 figures; shorten the length, improve clarity, and correct typos; accepted for publication in Physical Review Letter

    Unconditional security of the Bennett 1992 quantum key-distribution scheme with strong reference pulse

    Full text link
    We prove the unconditional security of the original Bennett 1992 protocol with strong reference pulse. We show that we may place a projection onto suitably defined qubit spaces before the receiver, which makes the analysis as simple as qubit-based protocols. Unlike the single-photon-based qubits, the qubits identified in this scheme are almost surely detected by the receiver even after a lossy channel. This leads to the key generation rate that is proportional to the channel transmission rate for proper choices of experimental parameters.Comment: More detailed presentation and a bit modified security proo

    Generic features of Einstein-Aether black holes

    Full text link
    We reconsider spherically symmetric black hole solutions in Einstein-Aether theory with the condition that this theory has identical PPN parameters as those for general relativity, which is the main difference from the previous research. In contrast with previous study, we allow superluminal propagation of a spin-0 Aether-gravity wave mode. As a result, we obtain black holes having a spin-0 "horizon" inside an event horizon. We allow a singularity at a spin-0 "horizon" since it is concealed by the event horizon. If we allow such a configuration, the kinetic term of the Aether field can be large enough for black holes to be significantly different from Schwarzschild black holes with respect to ADM mass, innermost stable circular orbit, Hawking temperature, and so on. We also discuss whether or not the above features can be seen in more generic vector-tensor theories.Comment: 9 pages, 9 figures, basic equations and their analytic arguments are adde

    Deciding Full Branching Time Logic by Program Transformation

    Get PDF
    We present a method based on logic program transformation, for verifying Computation Tree Logic (CTL*) properties of finite state reactive systems. The finite state systems and the CTL* properties we want to verify, are encoded as logic programs on infinite lists. Our verification method consists of two steps. In the first step we transform the logic program that encodes the given system and the given property, into a monadic ω -program, that is, a stratified program defining nullary or unary predicates on infinite lists. This transformation is performed by applying unfold/fold rules that preserve the perfect model of the initial program. In the second step we verify the property of interest by using a proof method for monadic ω-program
    • …
    corecore