90,712 research outputs found

    Improving the security of secure direct communication based on secret transmitting order of particles

    Get PDF
    We analyzed the security of the secure direct communication protocol based on secret transmitting order of particles recently proposed by Zhu, Xia, Fan, and Zhang [Phys. Rev. A 73, 022338 (2006)], and found that this scheme is insecure if an eavesdropper, say Eve, wants to steal the secret message with Trojan horse attack strategies. The vital loophole in this scheme is that the two authorized users check the security of their quantum channel only once. Eve can insert another spy photon, an invisible photon or a delay one in each photon which the sender Alice sends to the receiver Bob, and capture the spy photon when it returns from Bob to Alice. After the authorized users check the security, Eve can obtain the secret message according to the information about the transmitting order published by Bob. Finally, we present a possible improvement of this protocol.Comment: 4 pages, no figur

    X(1835): A Natural Candidate of η\eta^\prime's Second Radial Excitation

    Full text link
    Recently BES collaboration observed one interesting resonance X(1835). We point out that its mass, total width, production rate and decay pattern favor its assignment as the second radial excitation of η\eta^\prime meson very naturally

    Bose-Einstein condensates in RF-dressed adiabatic potentials

    Full text link
    Bose-Einstein condensates of 87^{87}Rb atoms are transferred into radio-frequency (RF) induced adiabatic potentials and the properties of the corresponding dressed states are explored. We report on measurements of the spin composition of dressed condensates. We also show that adiabatic potentials can be used to trap atom gases in novel geometries, including suspending a cigar-shaped cloud above a curved sheet of atoms

    Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol

    Full text link
    The participant attack is the most serious threat for quantum secret-sharing protocols. We present a method to analyze the security of quantum secret-sharing protocols against this kind of attack taking the scheme of Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59 1829 (1999)] as an example. By distinguishing between two mixed states, we derive the necessary and sufficient conditions under which a dishonest participant can attain all the information without introducing any error, which shows that the HBB protocol is insecure against dishonest participants. It is easy to verify that the attack scheme of Karlsson, Koashi, and Imoto [Phys. Rev. A 59, 162 (1999)] is a special example of our results. To demonstrate our results further, we construct an explicit attack scheme according to the necessary and sufficient conditions. Our work completes the security analysis of the HBB protocol, and the method presented may be useful for the analysis of other similar protocols.Comment: Revtex, 7 pages, 3 figures; Introduction modifie

    Filtering for uncertain 2-D discrete systems with state delays

    Get PDF
    This is the post print version of the article. The official published version can be obtained from the link below - Copyright 2007 Elsevier Ltd.This paper is concerned with the problem of robust H∞ filtering for two-dimensional (2-D) discrete systems with time-delays in states. The 2-D systems under consideration are described in terms of the well-known Fornasini–Marchesini local state-space (FMLSS) models with time-delays. Our attention is focused on the design of a full-order filter such that the filtering error system is guaranteed to be asymptotically stable with a prescribed H∞ disturbance attenuation performance. Sufficient conditions for the existence of desired filters are established by using a linear matrix inequality (LMI) approach, and the corresponding filter design problem is then cast into a convex optimization problem that can be efficiently solved by resorting to some standard numerical software. Furthermore, the obtained results are extended to more general cases where the system matrices contain either polytopic or norm-bounded parameter uncertainties. A simulation example is provided to illustrate the effectiveness of the proposed design method.This work was partially supported by the National Natural Science Foundation of China (60504008), Program for New Century Excellent Talents in University of China and the Postdoctoral Science Foundation of China (20060390231)

    Water-soluble SOA from Alkene ozonolysis: composition and droplet activation kinetics inferences from analysis of CCN activity

    Get PDF
    Cloud formation characteristics of the water-soluble organic fraction (WSOC) of secondary organic aerosol (SOA) formed from the ozonolysis of alkene hydrocarbons (terpinolene, 1-methlycycloheptene and cycloheptene) are studied. Based on size-resolved measurements of CCN activity (of the pure and salted WSOC samples) we estimate the average molar volume and surface tension depression associated with the WSOC using Köhler Theory Analysis (KTA). Consistent with known speciation, the results suggest that the WSOC are composed of low molecular weight species, with an effective molar mass below 200 g mol^(−1). The water-soluble carbon is also surface-active, depressing surface tension 10–15% from that of pure water (at CCN-relevant concentrations). The inherent hygroscopicity parameter, κ, of the WSOC ranges between 0.17 and 0.25; if surface tension depression and molar volume effects are considered in κ, a remarkably constant "apparent" hygroscopicity ~0.3 emerges for all samples considered. This implies that the volume fraction of soluble material in the parent aerosol is the key composition parameter required for prediction of the SOA hygroscopicity, as shifts in molar volume across samples are compensated by changes in surface tension. Finally, using "threshold droplet growth analysis", the water-soluble organics in all samples considered do not affect CCN activation kinetics

    Hadronization Approach for a Quark-Gluon Plasma Formed in Relativistic Heavy Ion Collisions

    Full text link
    A transport model is developed to describe hadron emission from a strongly coupled quark-gluon plasma formed in relativistic heavy ion collisions. The quark-gluon plasma is controlled by ideal hydrodynamics, and the hadron motion is characterized by a transport equation with loss and gain terms. The two sets of equations are coupled to each other, and the hadronization hypersurface is determined by both the hydrodynamic evolution and the hadron emission. The model is applied to calculate the transverse momentum distributions of mesons and baryons, and most of the results agree well with the experimental data at RHIC.Comment: 16 pages, 24 figures. Version accepted by PR
    corecore