431 |
The Physical Underpinning of Security Proofs for Quantum Key DistributionBoileau, Jean Christian 25 September 2007 (has links)
The dawn of quantum technology unveils a plethora of new possibilities and challenges in the world of information technology, one of which is the quest for secure information transmission. A breakthrough in classical algorithm or the development of a quantum computer could threaten the security of messages encoded using public key cryptosystems based on one-way function such as RSA. Quantum key distribution (QKD) offers an unconditionally secure alternative to such schemes, even in the advent of a quantum computer, as it does not rely on mathematical or technological assumptions, but rather on the universality of the laws of quantum mechanics.
Physical concepts associated with quantum mechanics, like the uncertainty principle or entanglement, paved the way to the first successful security proof for QKD. Ever since, further development in security proofs for QKD has been remarkable. But the connection between entanglement distillation and the uncertainty principle has remained hidden under a pile of mathematical burden. Our main goal is to dig the physics out of the new advances in security proofs for QKD. By introducing an alternative definition of private state, which elaborates the ideas of Mayers and Koashi, we explain how the security of all QKD protocols follows from an entropic uncertainty principle. We show explicitly how privacy amplification protocol can be reduced to a private state distillation protocol constructed from our observations about the uncertainty principle. We also derive a generic security proof for one-way permutation-invariant QKD protocols. Considering collective attack, we achieve the same secret key generation rate as the Devetak-Winter's bound. Generalizing an observation from Kraus, Branciard and Renner, we have provided an improved version of the secret key generation rates by considering a different symmetrization. In certain situations, we argue that Azuma's inequality can simplify the security proof considerably, and we explain the implication, on the security level, of reducing a QKD protocol to an entanglement or a more general private state distillation protocol.
In a different direction, we introduce a QKD protocol with multiple-photon encoding that can be implemented without a shared reference frame. We prove the unconditional security of this protocol, and discuss some features of the efficiency of multiple-photon QKD schemes in general.
|
432 |
Quantum Random Access Codes with Shared RandomnessOzols, Maris 05 1900 (has links)
We consider a communication method, where the sender encodes n classical bits into 1 qubit and sends it to the receiver who performs a certain measurement depending on which of the initial bits must be recovered. This procedure is called (n,1,p) quantum random access code (QRAC) where p > 1/2 is its success probability. It is known that (2,1,0.85) and (3,1,0.79) QRACs (with no classical counterparts) exist and that (4,1,p) QRAC with p > 1/2 is not possible.
We extend this model with shared randomness (SR) that is accessible to both parties. Then (n,1,p) QRAC with SR and p > 1/2 exists for any n > 0. We give an upper bound on its success probability (the known (2,1,0.85) and (3,1,0.79) QRACs match this upper bound). We discuss some particular constructions for several small values of n.
We also study the classical counterpart of this model where n bits are encoded into 1 bit instead of 1 qubit and SR is used. We give an optimal construction for such codes and find their success probability exactly---it is less than in the quantum case.
Interactive 3D quantum random access codes are available on-line at
http://home.lanet.lv/~sd20008/racs
|
433 |
Beyond Libertarianism: Interpretations of Mill's Harm Principle and the Economic Implications ThereinTowery, Matthew A 16 November 2012 (has links)
The thesis will examine the harm principle, as originally described by John Stuart Mill. In doing so, it will defend that, though unintended, the harm principle may justify several principles of distributive justice. To augment this analysis, the paper will examine several secondary authors’ interpretations of the harm principle, including potential critiques of the thesis itself.
|
434 |
Computer Support Simplifying Uncertainty Estimation using Patient SamplesNorheim, Stein January 2008 (has links)
In this work, a practical approach to assessing bias and uncertainty using patient samples in a clinical laboratory is presented. The scheme is essentially a splitsample setup where one instrument is appointed to being the “master” instrument which other instruments are compared to. The software presented automatically collects test results from a Laboratory Information System in production and couples together the results of pairwise measurements. Partitioning of measurement results by user-defined criteria and how this can facilitate isolation of variation sources are also discussed. The logic and essential data model are described and the surrounding workflows outlined. The described software and workflow are currently in considerable practical use in several Swedish large-scale distributed laboratory organizations. With the appropriate IT-support, split-sample testing can be a powerful complement to external quality assurance.
|
435 |
Breakup Process of Plane Liquid Sheets and Prediction of Initial Droplet Size and Velocity Distributions in SpraysSushanta, Mitra January 2001 (has links)
Spray models are increasingly becoming the principal tools in the design and development of gas turbine combustors. Spray modeling requires a knowledge of the liquid atomization process, and the sizes and velocities of subsequently formed droplets as initial conditions. In order to have a better understanding of the liquid atomization process,the breakup characteristics of plane liquid sheets in co-flowing gas streams are investigated by means of linear and nonlinear hydrodynamic instability analyses. The liquid sheet breakup process is studied for initial sinuous and varicose modes of disturbance. It is observed that the sheet breakup occurs at half-wavelength intervals for an initial sinuous disturbance and at full-wavelength intervals for an initial varicose disturbance. It is also found that under certain operating conditions, the breakup process is dictated by the initial varicose disturbance compare to its sinuous counterpart. Further, the breakup process is studied for the combined mode and it is found that the sheet breakup occurs at half- or full-wavelength intervals depending on the proportion of the individual sinuous and varicose disturbances. In general, the breakup length decreases with the increase in the Weber number, gas-to-liquid velocity and density ratios. A predictive model of the initial droplet size and velocity distributions for the subsequently formed spray is also formulated here. The present model incorporates the deterministic aspect of spray formation by calculating the breakup length and the mass-mean diameter and the stochastic aspect by statistical means through the maximum entropy principle based on Bayesian entropy. The two sub-models are coupled together by the various source terms signifying the liquid-gas interaction and a prior distribution based on instability analysis, which provides information regarding the unstable wave elements on the two liquid-gas interfaces. Experimental investigation of the breakup characteristics of the liquid sheet is performed by a high speed CCD camera and the measurement of the initial droplet size and distributions is conducted by phase-Doppler interferometry. Good agreement of the theoretical breakup length with the experiment is obtained for a planar, an annular and a gas turbine nozzle. The predicted initial droplet size and velocity distributions show reasonably satisfactory agreement with experimental data for all the three types of nozzles. Hence this spray model can be utilized to predict the initial droplet size and velocity distributions in sprays, which can then be implemented as a front-end subroutine to the existing computer codes.
|
436 |
Automating Radiotherapy: Parameterizations of Sensor Time Delay Compensators and the Separation PrincipleKwok, Wilfred January 2006 (has links)
Motivated by recent research to automate radiotherapy, this thesis looks into feedback control problems where the feedback sensor imposes considerable time delay. The use of an asymptotic estimator is considered as a method to compensate for the time delay. Properties and parameterizations of asymptotic estimators are analyzed. It is shown that if such a delay compensation scheme is adopted, a separation principle holds, which allows for independent design of the feedback controller and the time delay compensator. The radiotherapy problem is used as a case study to show how asymptotic estimators may be designed, exploiting the separation principle. Lastly, the thesis considers multivariable versions of asymptotic estimators.
|
437 |
Contributions to the Study of the Validity of Huygens' Principle for the Non-self-adjoint Scalar Wave Equation on Petrov Type D SpacetimesChu, Kenneth January 2000 (has links)
This thesis makes contributions to the solution of Hadamard's problem through an examination of the question of the validity of Huygens'principle for the non-self-adjoint scalar wave equation on a Petrov type D spacetime. The problem is split into five further sub-cases based on the alignment of the Maxwell and Weyl principal spinors of the underlying spacetime. Two of these sub-cases are considered, one of which is proved to be incompatible with Huygens' principle, while for the other, it is shown that Huygens' principle implies that the two principal null congruences of the Weyl tensor are geodesic and shear-free. Furthermore, an unpublished result of McLenaghan regarding symmetric spacetimes of Petrov type D is independently verified. This result suggests the possible existence of counter-examples of the Carminati-McLenaghan conjecture.
|
438 |
The Tracing of a Contaminant (Tritium) from Candu Sources: Lake OntarioKing, Karen June January 1997 (has links)
In any research program we begin with a hypothesis and when our expected results do not concur with the observed results we must try and understand the dynamics behind the changed process. In this study we were trying to understand the flux between regional groundwater systems, surface waters and sedimentation processes in order to predict the fate of contaminants entering one of the larger bodies of water in the world- Lake Ontario. This lake has increased levels of tritium due to anthropogenic inputs. Our first approach to the problem was to look at tritium fluxes within the system . Hydrological balances were constructed and a series of sediment cores were taken longitudinally and laterally across the lake. The second approach was to quantify the sediment accumulation rate (SAR) within the depositional basins and zones of erosion in order to improve the linkage between erosion control (sedimentation) and the water quality program. In the last chapter the movement of tritium, by molecular diffusion, through the clayey-silts of Lake Ontario is quantified in terms of an effective diffusion coefficient. In these sediments effective diffusion equals molecular diffusion. In a laboratory experiment four cores of lake sediment were spiked with tritium . The resulting concentration gradient changes in the sediment porewaters after six weeks could be modeled by an analytical one- dimensional diffusive transport equation. Results calculated the average lab diffusion coefficient to be 2. 7 x 10 - 5cm 2. sec -1 which is twice that determined by Wang et al, 1952 but still reasonable. Short cores (50 cm) from lake Ontario had observed tritium concentrations with depth that reflected a variable diffusive profile. The increases and decreases in tritium with depth could be correlated between cores. Monthly tritium emission data was obtained and correlations between peaks in the tritium profile and emissions were observed. Monthly variations in release emissions corresponded to approximately a one centimeter slice of core. An average calculated diffusion coefficient of theses cores was 1. 0 x 10 -5 cm 2. sec -1 which compares to Wang's coefficient of 1. 39 x 10 -5 cm 2. sec -1. This implies that tritium is moving through the sediment column at a rate equal to diffusion. The results were obtained for smoothed values. It was not possible to model the perturbations of the data with a one dimensional model. The dynamics of the system imply that tritium could be used as a biomonitor for reactor emissions, mixing time and current direction scenarios and that a better understanding of this process could be gained by future coring studies and a new hypothesis.
|
439 |
The Physical Underpinning of Security Proofs for Quantum Key DistributionBoileau, Jean Christian 25 September 2007 (has links)
The dawn of quantum technology unveils a plethora of new possibilities and challenges in the world of information technology, one of which is the quest for secure information transmission. A breakthrough in classical algorithm or the development of a quantum computer could threaten the security of messages encoded using public key cryptosystems based on one-way function such as RSA. Quantum key distribution (QKD) offers an unconditionally secure alternative to such schemes, even in the advent of a quantum computer, as it does not rely on mathematical or technological assumptions, but rather on the universality of the laws of quantum mechanics.
Physical concepts associated with quantum mechanics, like the uncertainty principle or entanglement, paved the way to the first successful security proof for QKD. Ever since, further development in security proofs for QKD has been remarkable. But the connection between entanglement distillation and the uncertainty principle has remained hidden under a pile of mathematical burden. Our main goal is to dig the physics out of the new advances in security proofs for QKD. By introducing an alternative definition of private state, which elaborates the ideas of Mayers and Koashi, we explain how the security of all QKD protocols follows from an entropic uncertainty principle. We show explicitly how privacy amplification protocol can be reduced to a private state distillation protocol constructed from our observations about the uncertainty principle. We also derive a generic security proof for one-way permutation-invariant QKD protocols. Considering collective attack, we achieve the same secret key generation rate as the Devetak-Winter's bound. Generalizing an observation from Kraus, Branciard and Renner, we have provided an improved version of the secret key generation rates by considering a different symmetrization. In certain situations, we argue that Azuma's inequality can simplify the security proof considerably, and we explain the implication, on the security level, of reducing a QKD protocol to an entanglement or a more general private state distillation protocol.
In a different direction, we introduce a QKD protocol with multiple-photon encoding that can be implemented without a shared reference frame. We prove the unconditional security of this protocol, and discuss some features of the efficiency of multiple-photon QKD schemes in general.
|
440 |
Quantum Random Access Codes with Shared RandomnessOzols, Maris 05 1900 (has links)
We consider a communication method, where the sender encodes n classical bits into 1 qubit and sends it to the receiver who performs a certain measurement depending on which of the initial bits must be recovered. This procedure is called (n,1,p) quantum random access code (QRAC) where p > 1/2 is its success probability. It is known that (2,1,0.85) and (3,1,0.79) QRACs (with no classical counterparts) exist and that (4,1,p) QRAC with p > 1/2 is not possible.
We extend this model with shared randomness (SR) that is accessible to both parties. Then (n,1,p) QRAC with SR and p > 1/2 exists for any n > 0. We give an upper bound on its success probability (the known (2,1,0.85) and (3,1,0.79) QRACs match this upper bound). We discuss some particular constructions for several small values of n.
We also study the classical counterpart of this model where n bits are encoded into 1 bit instead of 1 qubit and SR is used. We give an optimal construction for such codes and find their success probability exactly---it is less than in the quantum case.
Interactive 3D quantum random access codes are available on-line at
http://home.lanet.lv/~sd20008/racs
|
Page generated in 0.0604 seconds