708 research outputs found

    Composability in quantum cryptography

    Full text link
    In this article, we review several aspects of composability in the context of quantum cryptography. The first part is devoted to key distribution. We discuss the security criteria that a quantum key distribution protocol must fulfill to allow its safe use within a larger security application (e.g., for secure message transmission). To illustrate the practical use of composability, we show how to generate a continuous key stream by sequentially composing rounds of a quantum key distribution protocol. In a second part, we take a more general point of view, which is necessary for the study of cryptographic situations involving, for example, mutually distrustful parties. We explain the universal composability framework and state the composition theorem which guarantees that secure protocols can securely be composed to larger applicationsComment: 18 pages, 2 figure

    Impact Ionization in ZnS

    Full text link
    The impact ionization rate and its orientation dependence in k space is calculated for ZnS. The numerical results indicate a strong correlation to the band structure. The use of a q-dependent screening function for the Coulomb interaction between conduction and valence electrons is found to be essential. A simple fit formula is presented for easy calculation of the energy dependent transition rate.Comment: 9 pages LaTeX file, 3 EPS-figures (use psfig.sty), accepted for publication in PRB as brief Report (LaTeX source replaces raw-postscript file

    The impact of neogene grassland expansion and aridification on the isotopic composition of continental precipitation

    Get PDF
    The late Cenozoic was a time of global cooling, increased aridity, and expansion of grasslands. In the last two decades numerous records of oxygen isotopes have been collected to assess plant ecological changes, understand terrestrial paleoclimate, and to determine the surface history of mountain belts. The δ¹⁸(O) values of these records, in general, increase from the mid-Miocene to the Recent. We suggest that these records record an increase in aridity and expansion of grasslands in midlatitude continental regions. We use a nondimensional isotopic vapor transport model coupled with a soil water isotope model to evaluate the role of vapor recycling and transpiration by different plant functional types. This analysis shows that increased vapor recycling associated with grassland expansion along with biomechanistic changes in transpiration by grasses themselves conspires to lower the horizontal gradient in the δ¹⁸(O) of atmospheric vapor as an air mass moves into continental interiors. The resulting signal at a given inland site is an increase in δ¹⁸(O) of precipitation with the expansion of grasslands and increasing aridity, matching the general observed trend in terrestrial Cenozoic δ¹⁸(O) records. There are limits to the isotopic effect that are induced by vapor recycling, which we refer to here as a “hydrostat.” In the modern climate, this hydrostatic limit occurs at approximately the boundary between forest and grassland ecosystems

    Soft systems methodology: a context within a 50-year retrospective of OR/MS

    Get PDF
    Soft systems methodology (SSM) has been used in the practice of operations research and management science OR/MS) since the early 1970s. In the 1990s, it emerged as a viable academic discipline. Unfortunately, its proponents consider SSM and traditional systems thinking to be mutually exclusive. Despite the differences claimed by SSM proponents between the two, they have been complementary. An extensive sampling of the OR/MS literature over its entire lifetime demonstrates the richness with which the non-SSM literature has been addressing the very same issues as does SSM

    Tight Finite-Key Analysis for Quantum Cryptography

    Get PDF
    Despite enormous progress both in theoretical and experimental quantum cryptography, the security of most current implementations of quantum key distribution is still not established rigorously. One of the main problems is that the security of the final key is highly dependent on the number, M, of signals exchanged between the legitimate parties. While, in any practical implementation, M is limited by the available resources, existing security proofs are often only valid asymptotically for unrealistically large values of M. Here, we demonstrate that this gap between theory and practice can be overcome using a recently developed proof technique based on the uncertainty relation for smooth entropies. Specifically, we consider a family of Bennett-Brassard 1984 quantum key distribution protocols and show that security against general attacks can be guaranteed already for moderate values of M.Comment: 11 pages, 2 figure

    Modal beam splitter:Determination of the transversal components of an electromagnetic light field

    Get PDF
    The transversal profile of beams can always be defined as a superposition of orthogonal fields, such as optical eigenmodes. Here, we describe a generic method to separate the individual components in a laser beam and map each mode onto its designated detector with low crosstalk. We demonstrate this with the decomposition into Laguerre-Gaussian beams and introduce a distribution over the integer numbers corresponding to the discrete orbital and radial momentum components of the light field. The method is based on determining an eigenmask filter transforming the incident optical eigenmodes to position eigenmodes enabling the detection of the state of the light field using single detectors while minimizing cross talk with respect to the set of filter masks considered.UK Engineering and Physical Sciences Research Council [EP/J01771X/1]This item from the UA Faculty Publications collection is made available by the University of Arizona with support from the University of Arizona Libraries. If you have questions, please contact us at [email protected]

    Microscopic theory of vertical-transport phenomena in semiconductor heterostructures: Interplay between two- and three-dimensional hot-carrier relaxation

    Get PDF
    A theoretical analysis of vertical-transport phenomena in semiconductor heterostructures is presented. In particular, the scattering coupling between two- and three-dimensional states in multiple quantum wells is investigated. To this purpose, a fully three-dimensional approach for the description of both localized and extended states in the heterostructure is proposed. Starting from such three-dimensional states, obtained from a self-consistent Schrödinger-Poisson calculation, a Monte Carlo solution of the corresponding Boltzmann transport equation is performed. In contrast to various phenomenological transport models, the present simulation scheme allows a kinetic description, i.e., based on microscopic scattering rates, of vertical transport across a generic heterostructure. Our results provide a rigorous description of hot-carrier relaxation between extended and localized states. This simulation scheme has been applied to finite multiple quantum wells with different geometries and doping profiles. A detailed analysis of the electron current as a function of temperature in quasiequilibrium conditions shows good agreement with experimental results. Moreover, in non-equilibrium conditions (i.e., hot-carrier regime) the scattering coupling between three- and two-dimensional states is found to play a significant role in modifying the carrier mobility as well as the fraction of conducting electrons
    corecore