557,637 research outputs found

    Analysis of the trusted-device scenario in continuous-variable quantum key distribution

    Full text link
    The assumption that detection and/or state-preparation devices used for continuous-variable quantum key distribution (CV-QKD) are beyond influence of potential eavesdroppers leads to a significant performance enhancement in terms of achievable key rate and transmission distance. We provide a detailed and comprehensible derivation of the Holevo bound in this so-called trusted-device scenario. Modelling an entangling-cloner attack and using some basic algebraic matrix transformations, we show that the computation of the Holevo bound can be reduced to the solution of a quadratic equation. As an advantage of our derivation, the mathematical complexity of our solution does not increase with the number of trusted-noise sources. Finally, we provide a numerical evaluation of our results, illustrating the counter-intuitive fact that an appropriate amount of trusted receiver loss and noise can even be beneficial for the key rate.Comment: 14 pages, 6 figure

    Open-closed duality and Double Scaling

    Get PDF
    Nonperturbative terms in the free energy of Chern-Simons gauge theory play a key role in its duality to the closed topological string. We show that these terms are reproduced by performing a double scaling limit near the point where the perturbation expansion diverges. This leads to a derivation of closed string theory from this large-N gauge theory along the lines of noncritical string theories. We comment on the possible relevance of this observation to the derivation of superpotentials of asymptotically free gauge theories and its relation to infrared renormalons.Comment: 10 pages, LaTe

    Efficient non-malleable codes and key derivation for poly-size tampering circuits

    Get PDF
    Non-malleable codes, defined by Dziembowski, Pietrzak, and Wichs (ICS '10), provide roughly the following guarantee: if a codeword c encoding some message x is tampered to c' = f(c) such that c' ≠ c , then the tampered message x' contained in c' reveals no information about x. The non-malleable codes have applications to immunizing cryptosystems against tampering attacks and related-key attacks. One cannot have an efficient non-malleable code that protects against all efficient tampering functions f. However, in this paper we show 'the next best thing': for any polynomial bound s given a-priori, there is an efficient non-malleable code that protects against all tampering functions f computable by a circuit of size s. More generally, for any family of tampering functions F of size F ≤ 2s , there is an efficient non-malleable code that protects against all f in F . The rate of our codes, defined as the ratio of message to codeword size, approaches 1. Our results are information-theoretic and our main proof technique relies on a careful probabilistic method argument using limited independence. As a result, we get an efficiently samplable family of efficient codes, such that a random member of the family is non-malleable with overwhelming probability. Alternatively, we can view the result as providing an efficient non-malleable code in the 'common reference string' model. We also introduce a new notion of non-malleable key derivation, which uses randomness x to derive a secret key y = h(x) in such a way that, even if x is tampered to a different value x' = f(x) , the derived key y' = h(x') does not reveal any information about y. Our results for non-malleable key derivation are analogous to those for non-malleable codes. As a useful tool in our analysis, we rely on the notion of 'leakage-resilient storage' of Davì, Dziembowski, and Venturi (SCN '10), and, as a result of independent interest, we also significantly improve on the parameters of such schemes

    Gauge theory of Finance?

    Full text link
    Some problems with the recent stimulating proposal of a ``Gauge Theory of Finance'' by Ilinski and collaborators are outlined. First, the derivation of the log-normal distribution is shown equivalent both in information and mathematical content to the simpler and well-known derivation, dating back from Bachelier and Samuelson. Similarly, the re-derivation of Black-Scholes equation is shown equivalent to the standard one because the limit of no uncertainty is equivalent to the standard risk-free replication argument. Both re-derivations of the log-normality and Black-Scholes result do not provide a test of the theory because it is degenerate in the limits where these results apply. Third, the choice of the exponential form a la Boltzmann, of the weight of a given market configuration, is a key postulate that requires justification. In addition, the ``Gauge Theory of Finance'' seems to lead to ``virtual'' arbitrage opportunities for pure Markov random walk market when there should be none. These remarks are offered in the hope to improve the formulation of the ``Gauge Theory of Finance'' into a coherent and useful framework.Comment: 4 page
    corecore