23,841 research outputs found
Two monotonic functions involving gamma function and volume of unit ball
In present paper, we prove the monotonicity of two functions involving the
gamma function and relating to the -dimensional volume of the
unit ball in .Comment: 7 page
On the Application of Gluon to Heavy Quarkonium Fragmentation Functions
We analyze the uncertainties induced by different definitions of the momentum
fraction in the application of gluon to heavy quarkonium fragmentation
function. We numerically calculate the initial fragmentation
functions by using the non-covariant definitions of with finite gluon
momentum and find that these fragmentation functions have strong dependence on
the gluon momentum . As , these fragmentation
functions approach to the fragmentation function in the light-cone definition.
Our numerical results show that large uncertainties remains while the
non-covariant definitions of are employed in the application of the
fragmentation functions. We present for the first time the polarized gluon to
fragmentation functions, which are fitted by the scheme exploited in
this work.Comment: 11 pages, 7 figures;added reference for sec.
Valley dependent many-body effects in 2D semiconductors
We calculate the valley degeneracy () dependence of the many-body
renormalization of quasiparticle properties in multivalley 2D semiconductor
structures due to the Coulomb interaction between the carriers. Quite
unexpectedly, the dependence of many-body effects is nontrivial and
non-generic, and depends qualitatively on the specific Fermi liquid property
under consideration. While the interacting 2D compressibility manifests
monotonically increasing many-body renormalization with increasing , the
2D spin susceptibility exhibits an interesting non-monotonic dependence
with the susceptibility increasing (decreasing) with for smaller (larger)
values of with the renormalization effect peaking around .
Our theoretical results provide a clear conceptual understanding of recent
valley-dependent 2D susceptibility measurements in AlAs quantum wells.Comment: 5 pages, 3 figure
Phase-Remapping Attack in Practical Quantum Key Distribution Systems
Quantum key distribution (QKD) can be used to generate secret keys between
two distant parties. Even though QKD has been proven unconditionally secure
against eavesdroppers with unlimited computation power, practical
implementations of QKD may contain loopholes that may lead to the generated
secret keys being compromised. In this paper, we propose a phase-remapping
attack targeting two practical bidirectional QKD systems (the "plug & play"
system and the Sagnac system). We showed that if the users of the systems are
unaware of our attack, the final key shared between them can be compromised in
some situations. Specifically, we showed that, in the case of the
Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when
the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders
the final key insecure, whereas the same range of QBER values has been proved
secure if the two users are unaware of our attack; also, we demonstrated three
situations with realistic devices where positive key rates are obtained without
the consideration of Trojan horse attacks but in fact no key can be distilled.
We remark that our attack is feasible with only current technology. Therefore,
it is very important to be aware of our attack in order to ensure absolute
security. In finding our attack, we minimize the QBER over individual
measurements described by a general POVM, which has some similarity with the
standard quantum state discrimination problem.Comment: 13 pages, 8 figure
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
Unconditional security proofs of various quantum key distribution (QKD)
protocols are built on idealized assumptions. One key assumption is: the sender
(Alice) can prepare the required quantum states without errors. However, such
an assumption may be violated in a practical QKD system. In this paper, we
experimentally demonstrate a technically feasible "intercept-and-resend" attack
that exploits such a security loophole in a commercial "plug & play" QKD
system. The resulting quantum bit error rate is 19.7%, which is below the
proven secure bound of 20.0% for the BB84 protocol. The attack we utilize is
the phase-remapping attack (C.-H. F. Fung, et al., Phys. Rev. A, 75, 32314,
2007) proposed by our group.Comment: 16 pages, 6 figure
Uniqueness of nontrivially complete monotonicity for a class of functions involving polygamma functions
For , let
on . In the
present paper, we prove using two methods that, among all for
, only is nontrivially completely monotonic on
. Accurately, the functions and are
completely monotonic on , but the functions for
are not monotonic and does not keep the same sign on
.Comment: 9 page
Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"
This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98,
231104 (2011); arXiv:1106.2675v1 [quant-ph]].Comment: 2 page
Monotonicity and logarithmic convexity relating to the volume of the unit ball
Let stand for the volume of the unit ball in for
. In the present paper, we prove that the sequence
is logarithmically convex and that the sequence
is strictly
decreasing for . In addition, some monotonic and concave properties of
several functions relating to are extended and generalized.Comment: 12 page
- …