We propose a wide class of distillation schemes for multi-partite entangled states that are CSS-states. Our proposal provides not only superior efficiency, but also new insights on the connection between CSS-states an...
详细信息
ISBN:
(纸本)0780391500
We propose a wide class of distillation schemes for multi-partite entangled states that are CSS-states. Our proposal provides not only superior efficiency, but also new insights on the connection between CSS-states and bipartite graph states. We then consider the applications of our distillation schemes for two cryptographic tasks - namely, (a) conference key agreement and (b) quantum sharing of classical secrets. In particular, we construct "prepare-and-measure" protocols. Also we study the yield of those protocols and the threshold value of the fidelity above which the protocols can function securely. Surprisingly, our protocols function securely even when the initial state does not violate the standard Bell-inequalities for GHZ states. Experimental realization involving only bipartite entanglement is also suggested
In this paper, new types of recursive least square (RLS) algorithms, without using the initial information of a parameter or a state to be estimated, are proposed. The proposed RLS algorithm is first obtained for a ge...
详细信息
In this paper, new types of recursive least square (RLS) algorithms, without using the initial information of a parameter or a state to be estimated, are proposed. The proposed RLS algorithm is first obtained for a generic linear model and is then extended to a state estimator for a stochastic state-space model. Compared with the existing algorithms, the proposed RLS algorithms are simpler and more numerically stable. It is shown, by simulation studies, that the proposed RLS algorithms have better numerical stability for digital computation than existing algorithms.
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only tw...
详细信息
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state protocol based on only two decoy states and one signal state. We perform optimization on the choice of intensities of the two decoy states and the signal state. Our result shows that a decoy state protocol with only two types of decoy states—the vacuum and a weak decoy state—asymptotically approaches the theoretical limit of the most general type of decoy state protocol (with an infinite number of decoy states). We also present a one-decoy-state protocol. Moreover, we provide estimations on the effects of statistical fluctuations and suggest that, even for long-distance (larger than 100 km) QKD, our two-decoy-state protocol can be implemented with only a few hours of experimental data. In conclusion, decoy state quantum key distribution is highly practical.
We derive lower limits on the inefficiency and classical communication costs of dilution between two-term bipartite pure states that are partially entangled. We first calculate explicit relations between the allowable...
详细信息
We derive lower limits on the inefficiency and classical communication costs of dilution between two-term bipartite pure states that are partially entangled. We first calculate explicit relations between the allowable error and classical communication costs of entanglement dilution using a previously described protocol, then consider a two-stage dilution from singlets with this protocol followed by some unknown protocol for conversion between partially entangled states. Applying overall lower bounds on classical communication and inefficiency to this two-stage protocol, we derive bounds for the unknown protocol. In addition we derive analogous (but looser) bounds for general pure states.
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distributio...
详细信息
There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most of those experiments secure by using essentially the same hardware. Our method is to use decoy states to detect eavesdropping attacks. As a consequence, we have the best of both worlds—enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing even some of the best experimental performances reported in the literature.
This paper proposes a reconfigurable control system design methodology using the sliding-mode control. The advantage of the proposed sliding-mode reconfigurable control methodology is that it is more robust than the s...
详细信息
This paper proposes a reconfigurable control system design methodology using the sliding-mode control. The advantage of the proposed sliding-mode reconfigurable control methodology is that it is more robust than the simple static reconfigurable feedback. An approach is suggested to redesign the sliding surface for the after-fault variable structure controller using the genetic algorithms. So, the new sliding-mode controller is capable of preserving much of the dynamics of the original unfailed system. Simulation results are provided to show the effectiveness of the proposed method.
This paper proposes a reconfigurable controller design method for multivariable systems, which is capable of dealing with order-change problems that may occur in an after-fault system. A new method is proposed to reco...
详细信息
This paper proposes a reconfigurable controller design method for multivariable systems, which is capable of dealing with order-change problems that may occur in an after-fault system. A new method is proposed to recover the nominal closed-loop performance after a fault occurrence in the system. This approach uses the eigenstructure assignment. Unlike the previously developed approaches, the new method can be implemented in the case when the fault leads to order change of the after-fault model. Also, it can be used to solve the problems in which the set of after-fault open-loop and closed-loop eigenvalues have common elements, especially when the system becomes uncontrollable or unobservable due to the fault. The method guarantees the stability of the reconfigured closed-loop system in the presence of output feedback. Finally, simulation results are provided to show the effectiveness of the proposed method for an aircraft model.
This paper presents additional functions of the newly developed matrix operation type protection relay in power transmission lines. The paper presents the basic principle of fault location, the function of integrated ...
详细信息
In this paper, we propose a high-gain scaling based controller to achieve global state-feedback stabilization of a general class of nonlinear systems which are allowed to contain uncertain functions of all the states ...
详细信息
In this paper, we propose a high-gain scaling based controller to achieve global state-feedback stabilization of a general class of nonlinear systems which are allowed to contain uncertain functions of all the states and the control input as long as polynomial bounds on ratios of some uncertain system terms are available. The design is based on a high-gain scaling involving appropriate powers of a high-gain scaling parameter which is a dynamic signal driven by the state. The designed controller has a very simple structure being essentially a dynamic extension and a linear feedback with state-dependent dynamic gains. The obtained results are applicable to both lower triangular (strict-feedback) and upper triangular (feedforward) structures and also to systems without any triangular structure as long as a set of inequalities involving powers of the polynomial bounds on the ratios of the uncertain system terms and scaling orders is solvable. The stability analysis is based on our recent results on uniform solvability of coupled state-dependent Lyapunov equations.
In this paper, we propose a novel path-planning and obstacle avoidance algorithm GODZILA for navigation in unknown environments. No prior knowledge of the environment is required. The path-planning algorithm follows a...
详细信息
In this paper, we propose a novel path-planning and obstacle avoidance algorithm GODZILA for navigation in unknown environments. No prior knowledge of the environment is required. The path-planning algorithm follows a purely local approach using only the current range sensor measurements at each sampling instant and requiring only a small number of stored variables in memory. No map of the environment is built during navigation. This minimizes the memory and computational requirements for implementation of the algorithm, a feature that is especially attractive for small autonomous vehicles. The algorithm utilizes three components: an optimization algorithm, a local straight-line path planner to visible targets, and random navigation. It is proved, for navigation in any finite-dimensional space, that the path-planning algorithm converges in finite time with probability 1. The performance of the algorithm is demonstrated through simulations for path-planning in two-dimensional and three-dimensional spaces. It is seen that a relatively small number of range sensor measurements is sufficient even in complex unknown environments.
暂无评论