3,362 research outputs found

    Beyond single-photon localization at the edge of a Photonic Band Gap

    Get PDF
    We study spontaneous emission in an atomic ladder system, with both transitions coupled near-resonantly to the edge of a photonic band gap continuum. The problem is solved through a recently developed technique and leads to the formation of a ``two-photon+atom'' bound state with fractional population trapping in both upper states. In the long-time limit, the atom can be found excited in a superposition of the upper states and a ``direct'' two-photon process coexists with the stepwise one. The sensitivity of the effect to the particular form of the density of states is also explored.Comment: to appear in Physical Review

    Non-Markovian Decay of a Three Level Cascade Atom in a Structured Reservoir

    Get PDF
    We present a formalism that enables the study of the non-Markovian dynamics of a three-level ladder system in a single structured reservoir. The three-level system is strongly coupled to a bath of reservoir modes and two quantum excitations of the reservoir are expected. We show that the dynamics only depends on reservoir structure functions, which are products of the mode density with the coupling constant squared. This result may enable pseudomode theory to treat multiple excitations of a structured reservoir. The treatment uses Laplace transforms and an elimination of variables to obtain a formal solution. This can be evaluated numerically (with the help of a numerical inverse Laplace transform) and an example is given. We also compare this result with the case where the two transitions are coupled to two separate structured reservoirs (where the example case is also analytically solvable)

    New approach to 3D electrostatic calculations for micro-pattern detectors

    Get PDF
    We demonstrate practically approximation-free electrostatic calculations of micromesh detectors that can be extended to any other type of micropattern detectors. Using newly developed Boundary Element Method called Robin Hood Method we can easily handle objects with huge number of boundary elements (hundreds of thousands) without any compromise in numerical accuracy. In this paper we show how such calculations can be applied to Micromegas detectors by comparing electron transparencies and gains for four different types of meshes. We demonstrate inclusion of dielectric material by calculating the electric field around different types of dielectric spacers

    Decision and function problems based on boson sampling

    Get PDF
    Boson sampling is a mathematical problem that is strongly believed to be intractable for classical computers, whereas passive linear interferometers can produce samples efficiently. So far, the problem remains a computational curiosity, and the possible usefulness of boson-sampling devices is mainly limited to the proof of quantum supremacy. The purpose of this work is to investigate whether boson sampling can be used as a resource of decision and function problems that are computationally hard, and may thus have cryptographic applications. After the definition of a rather general theoretical framework for the design of such problems, we discuss their solution by means of a brute-force numerical approach, as well as by means of non-boson samplers. Moreover, we estimate the sample sizes required for their solution by passive linear interferometers, and it is shown that they are independent of the size of the Hilbert space.Comment: Close to the version published in PR

    Homeless population

    Get PDF
    The aim was to derive and analyze a model for numbers of homeless and non-homeless people in a borough, in particular to see how these figures might be affected by different policies regarding housing various categories of people. Most attention was focused on steady populations although the stability of these and possible timescales of dynamic problems were also discussed. The main outcome of this brief study is the identification of the key role played by the constant k_1 - the constant which fixes the speed at which the homeless are rehoused in permanent council property. Reducing this constant, i.e. making the system "fairer" with less priority to accommodating homeless families, appears to have little effect on the sizes of other categories on the waiting list but there is a marked increase in the number of households in temporary accommodation. The model, indicated by the size of its longest time-scale, should be modified to allow for births etc. It could be varied by allowing people to remove themselves from the register or by allowing the rates at which registered and unregistered people become homeless to differ, but these modifications are unlikely to substantially change the main result. The inclusion of movement from the homeless to the general population would have the effect of limiting the numbers in temporary accommodation. However, it is thought this effect is very small so a great reduction in k_1 would be needed for this flow to become significant

    Security bound of two-bases quantum key-distribution protocols using qudits

    Full text link
    We investigate the security bounds of quantum cryptographic protocols using dd-level systems. In particular, we focus on schemes that use two mutually unbiased bases, thus extending the BB84 quantum key distribution scheme to higher dimensions. Under the assumption of general coherent attacks, we derive an analytic expression for the ultimate upper security bound of such quantum cryptography schemes. This bound is well below the predictions of optimal cloning machines. The possibility of extraction of a secret key beyond entanglement distillation is discussed. In the case of qutrits we argue that any eavesdropping strategy is equivalent to a symmetric one. For higher dimensions such an equivalence is generally no longer valid.Comment: 12 pages, 2 figures, to appear in Phys. Rev.

    Sequential superradiant scattering from atomic Bose-Einstein condensates

    Full text link
    We theoretically discuss several aspects of sequential superradiant scattering from atomic Bose-Einstein condensates. Our treatment is based on the semiclassical description of the process in terms of the Maxwell-Schroedinger equations for the coupled matter-wave and optical fields. First, we investigate sequential scattering in the weak-pulse regime and work out the essential mechanisms responsible for bringing about the characteristic fan-shaped side-mode distribution patterns. Second, we discuss the transition between the Kapitza-Dirac and Bragg regimes of sequential scattering in the strong-pulse regime. Finally, we consider the situation where superradiance is initiated by coherently populating an atomic side mode through Bragg diffraction, as in studies of matter-wave amplification, and describe the effect on the sequential scattering process.Comment: 9 pages, 4 figures. Submitted to Proceedings of LPHYS'06 worksho

    Computational Indistinguishability between Quantum States and Its Cryptographic Application

    Full text link
    We introduce a computational problem of distinguishing between two specific quantum states as a new cryptographic problem to design a quantum cryptographic scheme that is "secure" against any polynomial-time quantum adversary. Our problem, QSCDff, is to distinguish between two types of random coset states with a hidden permutation over the symmetric group of finite degree. This naturally generalizes the commonly-used distinction problem between two probability distributions in computational cryptography. As our major contribution, we show that QSCDff has three properties of cryptographic interest: (i) QSCDff has a trapdoor; (ii) the average-case hardness of QSCDff coincides with its worst-case hardness; and (iii) QSCDff is computationally at least as hard as the graph automorphism problem in the worst case. These cryptographic properties enable us to construct a quantum public-key cryptosystem, which is likely to withstand any chosen plaintext attack of a polynomial-time quantum adversary. We further discuss a generalization of QSCDff, called QSCDcyc, and introduce a multi-bit encryption scheme that relies on similar cryptographic properties of QSCDcyc.Comment: 24 pages, 2 figures. We improved presentation, and added more detail proofs and follow-up of recent wor
    • …
    corecore