10,973 research outputs found
No Superluminal Signaling Implies Unconditionally Secure Bit Commitment
Bit commitment (BC) is an important cryptographic primitive for an agent to
convince a mutually mistrustful party that she has already made a binding
choice of 0 or 1 but only to reveal her choice at a later time. Ideally, a BC
protocol should be simple, reliable, easy to implement using existing
technologies, and most importantly unconditionally secure in the sense that its
security is based on an information-theoretic proof rather than computational
complexity assumption or the existence of a trustworthy arbitrator. Here we
report such a provably secure scheme involving only one-way classical
communications whose unconditional security is based on no superluminal
signaling (NSS). Our scheme is inspired by the earlier works by Kent, who
proposed two impractical relativistic protocols whose unconditional securities
are yet to be established as well as several provably unconditionally secure
protocols which rely on both quantum mechanics and NSS. Our scheme is
conceptually simple and shows for the first time that quantum communication is
not needed to achieve unconditional security for BC. Moreover, with purely
classical communications, our scheme is practical and easy to implement with
existing telecom technologies. This completes the cycle of study of
unconditionally secure bit commitment based on known physical laws.Comment: This paper has been withdrawn by the authors due to a crucial
oversight on an earlier work by A. Ken
Vortex simulation of the pressure field of a jet
Fluctuations of the pressure field of a jet are simulated numerically by a flow model consisting of axisymmetric vortex rings with viscous cores submerged in an inviscid uniform stream. Vortex shedding time intervals, randomly created to imitate the time-history characteristics of the pressure signals of a jet, are generated based on a probability distribution of the intervals between successive pressure peaks obtained from experiments. It is found that, up to five diameters downstream of the jet exit, the characteristics of the pressure fluctuations and the most probable time intervals between experimental and numerical results show good qualitative agreements. The role played by the axisymmetric vortex model in pressure field as well as extensions of the model is also discussed
Turbulent Pair Diffusion
Kinematic Simulations of turbulent pair diffusion in planar turbulence with a
-5/3 energy spectrum reproduce the results of the laboratory measurements of
Jullien Phys. Rev. Lett. 82, 2872 (1999), in particular the stretched
exponential form of the PDF of pair separations and their correlation
functions. The root mean square separation is found to be strongly dependent on
initial conditions for very long stretches of times. This dependence is
consistent with the topological picture of turbulent pair diffusion where pairs
initially close enough travel together for long stretches of time and separate
violently when they meet straining regions around hyperbolic points. A new
argument based on the divergence of accelerations is given to support this
picture
Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"
This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98,
231104 (2011); arXiv:1106.2675v1 [quant-ph]].Comment: 2 page
Secure gated detection scheme for quantum cryptography
Several attacks have been proposed on quantum key distribution systems with
gated single-photon detectors. The attacks involve triggering the detectors
outside the center of the detector gate, and/or using bright illumination to
exploit classical photodiode mode of the detectors. Hence a secure detection
scheme requires two features: The detection events must take place in the
middle of the gate, and the detector must be single-photon sensitive. Here we
present a technique called bit-mapped gating, which is an elegant way to force
the detections in the middle of the detector gate by coupling detection time
and quantum bit error rate. We also discuss how to guarantee single-photon
sensitivity by directly measuring detector parameters. Bit-mapped gating also
provides a simple way to measure the detector blinding parameter in security
proofs for quantum key distribution systems with detector efficiency mismatch,
which up until now has remained a theoretical, unmeasurable quantity. Thus if
single-photon sensitivity can be guaranteed within the gates, a detection
scheme with bit-mapped gating satisfies the assumptions of the current security
proofs.Comment: 7 pages, 3 figure
Efficiency of feedback process in cavity quantum electrodynamics
Utilizing the continuous frequency mode quantization scheme, we study from
first principle the efficiency of a feedback scheme that can generate maximally
entangled states of two atoms in an optical cavity through their interactions
with a single input photon. The spectral function of the photon emitted from
the cavity, which will be used as the input of the next round in the feedback
process, is obtained analytically. We find that the spectral function of the
photon is modified in each round and deviates from the original one. The
efficiency of the feedback scheme consequently deteriorates gradually after
several rounds of operation.Comment: 11 pages, 5 figures, accepted for publication in Journal of Physics
Investigations of afterpulsing and detection efficiency recovery in superconducting nanowire single-photon detectors
We report on the observation of a non-uniform dark count rate in
Superconducting Nanowire Single Photon Detectors (SNSPDs), specifically
focusing on an afterpulsing effect present when the SNSPD is operated at a high
bias current regime. The afterpulsing exists for real detection events
(triggered by input photons) as well as for dark counts (no laser input). In
our standard set-up, the afterpulsing is most likely to occur at around 180 ns
following a detection event, for both real counts and dark counts. We
characterize the afterpulsing behavior and speculate that it is not due to the
SNSPD itself but rather the amplifiers used to boost the electrical output
signal from the SNSPD. We show that the afterpulsing indeed disappears when we
use a different amplifier with a better low frequency response. We also examine
the short-lived enhancement of detection efficiency during the recovery of the
SNSPD due to temporary perturbation of the bias and grounding conditions
Quantum key distribution with delayed privacy amplification and its application to security proof of a two-way deterministic protocol
Privacy amplification (PA) is an essential post-processing step in quantum
key distribution (QKD) for removing any information an eavesdropper may have on
the final secret key. In this paper, we consider delaying PA of the final key
after its use in one-time pad encryption and prove its security. We prove that
the security and the key generation rate are not affected by delaying PA.
Delaying PA has two applications: it serves as a tool for significantly
simplifying the security proof of QKD with a two-way quantum channel, and also
it is useful in QKD networks with trusted relays. To illustrate the power of
the delayed PA idea, we use it to prove the security of a qubit-based two-way
deterministic QKD protocol which uses four states and four encoding operations.Comment: 11 pages, 3 figure
- …
