Quantum Private Comparison via Cavity QED

Size: px
Start display at page:

Download "Quantum Private Comparison via Cavity QED"

Transcription

1 Commun. Theor. Phys. 67 (2017) Vol. 67, No. 2, February 1, 2017 Quantum Prvate Comparson va Cavty QED Tan-Yu Ye ( 叶天语 ) College of Informaton and Electronc Engneerng, Zhejang Gongshang Unversty, Hangzhou , Chna (Receved August 18, 2016; revsed manuscrpt receved October 9, 2016) Abstract The frst quantum prvate comparson (QPC) protocol va cavty quantum electrodynamcs (QED) s proposed n ths paper by makng full use of the evoluton law of atom va cavty QED, where the thrd party (TP) s allowed to msbehave on hs own but cannot conspre wth ether of the two users. The proposed protocol adopts two-atom product states rather than entangled states as the ntal quantum resource, and only needs sngle-atom measurements for two users. Both the untary operatons and the quantum entanglement swappng operaton are not necessary for the proposed protocol. The proposed protocol can compare the equalty of one bt from each user n each round comparson wth one two-atom product state. The proposed protocol can resst both the outsde attack and the partcpant attack. Partcularly, t can prevent TP from knowng two users secrets. Furthermore, the qubt effcency of the proposed protocol s as hgh as 50%. PACS numbers: Dd, Hk, Pp DOI: / /67/2/147 Key words: quantum prvate comparson (QPC), thrd party (TP), cavty quantum electrodynamcs (QED), product state, partcpant attack 1 Introducton In the past two decades, quantum nformaton processng had greatly aroused the nterest of researchers throughout the world and ganed consderable developments. Quantum cryptography, whch was frst proposed by Bennett and Brassard [1] n 1984, s the development outcome of quantum nformaton processng n the realm of cryptography. It can attan uncondtonal securty on the bass of quantum mechancs prncples such as the Hesenberg uncertanty prncple, the quantum no-clonng theorem and so on, and has greatly attracted the attentons of many researchers. Up to now, t has establshed many branches, such as quantum key dstrbuton (QKD), [1 10] quantum secret sharng (QSS), [11 15] quantum secure drect communcaton (QSDC), [16 24] quantum dalogue (QD), [25 31] quantum teleportaton (QT) [32 37] etc. Quantum prvate comparson (QPC), whch was frst suggested by Yang et al. [38] n 2009, s another nterestng branch of quantum cryptography. It ams to compare the equalty of secrets from dfferent users wthout leakng them out on the bass of quantum mechancs prncples. As ponted out by Lo [39] that t s mpossble to securely evaluate the equalty functon n a two-party scenaro, QPC always requres some addtonal assumptons such as a thrd party (TP), etc. In recent years, QPC has been greatly developed so that dfferent quantum states and dfferent quantum technologes have been utlzed to construct dfferent knds of QPC protocols. There are QPC protocols wth sngle partcles, [40 43] Bell states, [38,42,44 52] GHZ states, [53 56] W states, [52,57 58] cluster states, [59 60] χ-type entangled states. [61 63] There are QPC protocols requrng the untary operatons [38,40,43,45,53 54,57,59 60,62] and QPC protocols requrng the quantum entanglement swappng operaton. [44,50 52,55,61] At present, the physcal systems for realzng quantum nformaton processng manly nclude cavty quantum electrodynamcs (QED), on trap, nuclear magnetc resonance, quantum dot, superconductng system wth Josephson effect, etc. [64] Many works, such as entanglement detecton, [65] Bell-state analyss, [66 67] entanglement concentraton, [68 71] entanglement purfcaton, [72] entanglement generaton [71,73 74] and quantum repeater, [75] have been realzed va these physcal systems. Cavty QED can guarantee a hgh level of coherence so that t s an deal canddate for the experment of quantum nformaton processng. [64] Cavty QED has become one of the most promsng physcal systems due to ts unque contrbuton. Based on the above analyss, followng some deas n the protocol of Ref. [46], we put forward the frst QPC protocol va cavty QED by makng full use of the evoluton law of atom va cavty QED. Dfferent from the standard sem-honest TP frst proposed by Chen et al., [53] n our protocol, TP s assumed to be a more practcal thrd party. That s, TP s allowed to msbehave on hs own but cannot conspre wth ether of the two users. Smlar to the protocol of Ref. [41], our protocol adopts product states rather than entangled states as the ntal quantum resource. Unlke the protocols of Refs. [38,40,43,45,53 54,57,59-60,62], our protocol does not need the untary operatons. Unlke the protocols of Refs. [44,50 52,55,61], our protocol does not need the quantum entanglement swappng operaton. Supported by the Natonal Natural Scence Foundaton of Chna under Grant No E-mal: happyyty@alyun.com c 2017 Chnese Physcal Socety and IOP Publshng Ltd

2 148 Communcatons n Theoretcal Physcs Vol. 67 The rest of ths paper s organzed as follows. Secton 2 ntroduces the model of cavty QED. Secton 3 llustrates the QPC protocol va cavty QED. Secton 4 analyzes ts correctness, securty and qubt effcency. Secton 5 dscusses ts comparson wth some prevous QPC protocols. Secton 6 gves the concluson. 2 Model of Cavty QED Drven by a classcal feld, two dentcal two-level atoms can smultaneously nteract wth a sngle-mode cavty. The nteracton Hamltonan between the sngle-mode cavty and the atoms under the rotatng-wave approxmaton can be depcted as [73 74,76 77] 2 H = ω 0 S Z + ω a a a + [g(a S j + as j ) j=1 + Ω(S j e wt + S j e wt )] (1) Here, S Z = (1/2) 2 j=1 ( e j e j g j g j ), S j = g j e j and S j = e j g j, where g j and e j are the ground and excted states of the j-th atom, respectvely. g s the atomcavty couplng strength. a and a are the annhlaton and creaton operators for the cavty mode, respectvely. ω 0, ω a, ω, and Ω are the atomc transton frequency, the cavty frequency, the classcal feld frequency and the Rab frequency, respectvely. t s the nteracton tme. Gven that ω = ω 0, the evoluton operator of the system n the nteracton pcture can be expressed as [73 74,76 77] U(t) = e H0t e Het, (2) where H 0 = Ω 2 j=1 (S j + S j ), and H e s the effectve Hamltonan. Consderng the large detunng case δ g (δ s the detunng between ω 0 and ω a ) and the strong drvng regme Ω δ, g, there s no energy exchange between the atomc system and the cavty. As a result, the effects of cavty decay and thermal feld are erased. Consequently, the effectve nteracton Hamltonan H e n the nteracton pcture can be descrbed as [73 74,76 77] [ 2 H e = (λ/2) ( e j e j + g j g j ) + 2 j=1,j=1, j (S S j + S S j + H.C.) ] where λ = g 2 /2δ. When two atoms are sent nto the above cavty smultaneously, drven by a classcal feld, they nteract wth t. If the nteracton tme and the Rab frequency are made to satsfy λt = π/4 and Ωt = π, two atoms wll have the followng evoluton: 2 gg jk 2 e π/4 ( gg jk ee jk ), (4) 2 ge jk 2 e π/4 ( ge jk eg jk ), (5) 2 eg jk 2 e π/4 ( eg jk ge jk ), (6) 2 ee jk 2 e π/4 ( ee jk gg jk ). (7) (3) 3 QPC Protocol va Cavty QED Two users, Alce and Bob, want to know whether ther secrets are equal or not under the help of TP, who s allowed to msbehave on hs own but cannot conspre wth ether of them. Assume that X and Y are Alce and Bob s secrets, respectvely, where X = L 1 j=0 x j2 j, Y = L 1 j=0 y j2 j, x j, y j {0, 1}. Alce and Bob share two common key sequences K A and K B ndvdual wth length L through the QKD protocols [1 10] beforehand. Here, KA, K B {0, 1}, where KA s the -th bt of K A, KB s the -th bt of K B, and = 1, 2,..., L. The QPC protocol va cavty QED s constructed as follows: Step 1 Alce (Bob) dvdes the bnary representaton of X(Y ) nto L groups G 1 A, G2 A,..., GL A (G1 B, G2 B,..., GL B ), where each group contans one bnary bt. Step 2 TP prepares a quantum state sequence composed of L product states, each of whch s randomly n one of the four states { gg, ge, eg, ee }. Ths quantum state sequence s denoted as S = [SaS 1 b 1, S2 asb 2,..., SL a Sb L ]. Here, the subscrpts a, b represent two atoms n one product state, whle the superscrpts 1, 2,..., L denote the orders of product states n S. Step 3 TP sends SaS b ( = 1, 2,..., L) nto the snglemode cavty descrbed above. Drven by a classcal feld, the two atoms Sa and Sb smultaneously nteract wth the sngle-mode cavty. TP chooses the Rab frequency and the nteracton tme to satsfy Ωt = π and λt = π/4. As a result, SaS b wll undergo the evoluton as shown n formulas (4) (7). Obvously, Sa and Sb become entangled together after the evoluton. After they fly out the snglemode cavty, TP pcks up Sa and Sb to form sequences S a and S b, respectvely. That s, S a = [Sa, 1 Sa, 2..., Sa L ] and S b = [Sb 1, S2 b,..., SL b ]. For securty check, TP prepares two sets of sample sngle atoms D a and D b randomly n one of the four states { g, e, +, }. Here, ± = (1/ 2)( g ± e ). Note that { g, e } s denoted as Z bass whle { +, } s denoted as X bass. Then, TP randomly nserts D a (D b ) nto S a (S b ) to form a new sequence S a(s b ). Fnally, TP sends S a(s b ) to Alce (Bob). After confrmng that Alce (Bob) has receved S a(s b ), TP tells Alce (Bob) the postons and the preparaton bass of sample sngle atoms from D a (D b ). Then, Alce (Bob) measures the sample sngle atoms n S a(s b ) wth the bass TP told and tells TP her (hs) measurement results. By comparng the ntal states of sample sngle atoms n S a(s b ) wth Alce s (Bob s) measurement results, TP can judge whether the quantum channel s secure or not durng the transmsson of S a(s b ). If the error rate s unreasonably hgh, the communcaton s stopped; otherwse, Alce (Bob) drops out the sample sngle atoms n

3 No. 2 Communcatons n Theoretcal Physcs 149 S a(s b ) to recover S a(s b ), and goes to the next step. Fg. 1 The flow chart of the proposed QPC protocol,takng SaS b for example. (a) TP prepares quantum product state SaS b as the quantum carrer. Here, the sold ellpse denotes a partcpant, whle the sold rectangle denotes the quantum state preparaton operaton; (b) TP sends atom Sa(S b) nto cavty QED for evoluton, and transmts t to Alce (Bob) after t fles out cavty QED. Here, the sold crcle denotes cavty QED, whle the sold lne wth an arrow denotes the quantum state transmsson operaton; (c) Alce (Bob) measures atom Sa(S b) wth Z bass, computes RA(R B) and sends RA(R B) to TP. Here, the dotted rectangle, the dotted crcle and the dotted lne wth an arrow denote the quantum measurement operaton wth Z bass, the classcal computaton operaton and the classcal nformaton transmsson operaton, respectvely; (d) TP computes R, and sends R to Alce and Bob; (e) Alce and Bob compute R. Step 4 For the -th ( from 1 to L) round comparson, Alce (Bob) measures atom Sa(S b ) wth Z bass. The measurement result of Sa(S b ) s coded wth one classcal bt whch s represented by MA (M B ). Concretely speakng, f the measurement result of Sa(S b ) s g, M A (M B ) wll be 0; otherwse, f the measurement result of Sa(S b ) s e, MA (M B ) wll be 1. Then, Alce (Bob) computes RA = G A M A K A (R B = G B M B K B ). Here, s the module 2 operaton. Fnally, Alce (Bob) tells TP RA (R B ) publcly. Step 5 TP transforms SaS b prepared n Step 2 nto one classcal bt MT accordng to ts ntal state. Concretely speakng, f the ntal state of SaS b s gg or ee, M T wll be 0; otherwse, f the ntal state of SaS b s ge or eg, MT wll be 1. That s, M T represents the party of Sa and Sb prepared by TP. Then, TP computes R = RA R B M T, and tells R to Alce and Bob publcly. Step 6 After recevng R, both Alce and Bob compute R = R KA K B. They termnate the protocol and conclude that X Y as long as they fnd out that R 0; otherwse, they set = + 1 and repeat the protocol from step 4. If they fnd out that R = 0 for all n the end, they wll conclude that X = Y. Now t concludes the descrpton of our protocol. For clarty, we further gve out the flow chart of our protocol n Fg. 1, takng SaS b for example. It should be emphaszed that n ths knd of dsspatve system, the effects of cavty decay and thermal feld are of great concerns. In order to erase the effects of cavty decay and thermal feld, we need to use the large detunng case and the strong drvng regme. That s, δ should be chosen to satsfy δ g and Ω should be chosen to satsfy Ω δ, g. In ths way, there s no energy exchange between the atomc system and the cavty. In addton, n order to make our protocol work well, formulas (4) (7) should be establshed frst. Therefore, both of λt = π/4 and Ωt = π should be also satsfed. 4 Analyss In ths secton, we analyze our protocol on three aspects ncludng the correctness of ts output, the securty and the qubt effcency. 4.1 Correctness In our protocol, under the help of TP, Alce and Bob compare the equalty of G A and G B n the -th round comparson by usng the evoluton law of SaS b va cavty QED. Here, G A s the -th bt of Alce s secret X, G B s the -th bt of Bob s secret Y, and SaS b s the -th product state n S prepared by TP. For convenence, we use IS to denote the ntal state of SaS b prepared by TP. Accordngly, MT s the one-bt classcal code of IS. Accordng to the descrpton of our protocol, t s apparent that MA s the one-bt classcal code of the Z bass measurement result of Sa after evoluton n cavty QED, and MB s the one-bt classcal code of the Z bass measurement result of Sb, after evoluton n cavty QED. Moreover, t follows that RA = G A M A K A, R B = G B M B K B, R = RA R B M T and R = R KA K B, where K A s the -th bt of K A, and KB s the -th bt of K B. The relatonshps of these essental varables n our protocol are further shown n Table 1. Accordng to formulas (4) (7) or Table 1, t s easy to get that MA M B M T = 0. Consequently, we obtan R = R K A K B = (R A R B M T ) K A K B

4 150 Communcatons n Theoretcal Physcs Vol. 67 = ((G A M A K A) (G B M B K B) M T ) K A K B = (G A G B) (M A M B M T ) = G A G B. (8) Accordng to formula (8), f R = 0, we wll get that G A = G B ; otherwse, we wll get that G A G B. It can be concluded now that the correctness of the output of our protocol s valdated. Table 1 The relatonshps of essental varables n the proposed QPC protocol (G A s the -th bt of Alce s secret X, and G B s the -th bt of Bob s secret Y ; IS denotes the ntal state of SaS b prepared by TP, and MT s the one-bt classcal code of IS ; SaS b after evoluton s the state of IS after evoluton n cavty QED; MA s the one-bt classcal code of the Z bass measurement result of Sa after evoluton n cavty QED, and MB s the one-bt classcal code of the Z bass measurement result of Sb after evoluton n cavty QED; KA s the -th bt of K A, and KB s the -th bt of K B; RA = G A MA K A, RB = G B MB KB, R = RA RB MT and R = R KA KB.) G A G B IS M T S as b (after evoluton) M A M B K A, K B R A R B R R 0 0 gg 0 gg 0 0 0, , , , ee 1 1 0, , , , ge 1 ge 0 1 0, , , , eg 1 0 0, , , , eg 1 ge 0 1 0, , , , eg 1 0 0, , , , ee 0 gg 0 0 0, , , , ee 1 1 0, , , , gg 0 gg 0 0 0, , , , ee 1 1 0, , , , ge 1 ge 0 1 0, ,

5 No. 2 Communcatons n Theoretcal Physcs 151 Table 1 (contnued) 1, , eg 1 0 0, , , , eg 1 ge 0 1 0, , , , eg 1 0 0, , , , ee 0 gg 0 0 0, , , , ee 1 1 0, , , , gg 0 gg 0 0 0, , , , ee 1 1 0, , , , ge 1 ge 0 1 0, , , , eg 1 0 0, , , , eg 1 ge 0 1 0, , , , eg 1 0 0, , , , ee 0 gg 0 0 0, , , , ee 1 1 0, , , , gg 0 gg 0 0 0, ,

6 152 Communcatons n Theoretcal Physcs Vol. 67 Table 1 (contnued) 1, , ee 1 1 0, , , , ge 1 ge 0 1 0, , , , eg 1 0 0, , , , eg 1 ge 0 1 0, , , , eg 1 0 0, , , , ee 0 gg 0 0 0, , , , ee 1 1 0, , , , Note that smlar to the QPC protocol of Ref. [46], our protocol utlzes the party of two atoms to accomplsh the equalty comparson of prvate secrets. Concretely speakng, n the -th round comparson, G A s encrypted wth MA and K A to derve R A, and G B s encrypted wth M B and KB to derve R B. Here, M A, K A, M B and K B play the role of one-tme-pad key. After dong the calculatons of R = RA R B M T and R = R KA K B, we get the XOR value of G A and G B, as shown n formula (8). As a result, the equalty comparson result of G A and G B can be easly obtaned. It s obvous that formula (8) reles deeply on the XOR relaton of MA, M B and M T,.e., MA M B M T = 0. Actually, M A M B essentally mples the party of two atoms Sa and Sb after evoluton va cavty QED, whle MT represents the party of S a and Sb before evoluton va cavty QED. Accordng to formulas (4) (7), the party of Sa and Sb keeps unchanged durng the evoluton va cavty QED so that MA M B M T = 0 s easly establshed, whch guarantees the correctness of the equalty comparson result of G A and G B. It can be concluded now that the party of two atoms Sa and Sb s utlzed to accomplsh the equalty comparson of G A and G B. Apparently, n the whole equalty comparson process of G A and G B, our protocol employs nether the untary operatons nor the quantum entanglement swappng operaton. 4.2 Securty The securty towards both the outsde attack and the partcpant attack s dscussed n ths secton. () Outsde Attack We analyze the outsde attack accordng to each step of our protocol. As for steps 1, 2, and 6, an outsde eavesdropper has no chance to launch an attack, snce there s not any quantum transmsson or classcal transmsson n these steps. As for step 3, there are quantum transmssons as TP sends S a(s b ) to Alce (Bob). An outsde eavesdropper may try to obtan the two users secrets by performng the ntercept-resend attack, the measure-resend attack, the entangle-measure attack, etc. Fortunately, the sample sngle atoms randomly n one of the four states { g, e, +, } are used to detect the outsde attack. Ths securty check method s equvalent to the decoy pho-

7 No. 2 Communcatons n Theoretcal Physcs 153 ton technology, [78 79] whch has been valdated n detal n Refs. [28 29]. Note that the decoy photon technology can be regarded as a varant of the BB84 securty check method, [1] whch has also been valdated n Ref. [80]. Therefore, the attacks from an outsde eavesdropper are nvald n ths step. As for step 4, Alce (Bob) tells TP RA (R B ), publcly. Apparently, G A (G B ) s encrypted wth K A (K B ) n ths step. However, an outsde eavesdropper has no knowledge about KA (K B ). In ths case, she stll has no access to G A (G B ), even though she hears R A (R B ) from Alce (Bob). As for step 5, TP tells R to Alce and Bob publcly. It can be derved that R = R A R B M T = (G A M A K A) (G B M B K B) M T = (G A K A) (G B K B). (9) Even though she hears R from TP, an outsde eavesdropper stll cannot extract anythng useful about G A or G B n ths step, as she has no access to K A and K B. It can be concluded now that our protocol has a hgh level of securty towards the outsde attack. () Partcpant Attack Partcpant attack s a knd of attack from a dshonest partcpant. As suggested by Gao et al., [81] partcpant attack s generally more powerful than outsde attack so that t should be pad more attenton to. Two cases of partcpant attack ncludng the attack from a dshonest user and the attack from TP are analyzed here. Case 1 The attack from a dshonest user In our protocol, Alce role s smlar to Bob s. Wthout loss of generalty, Alce s assumed to be the dshonest user who wants to obtan the secret of the other user. In step 3, Alce may want to ntercept S b TP sends to Bob. However, as she has no knowledge about the postons and the preparaton bass of sample sngle atoms from D b, she wll nevtably leave her trace and be caught as an outsde attacker f she launches ths attack. In step 4, Alce may hear RB from Bob. S a and Sb become entangled together after the evoluton va cavty QED n step 3. Snce Alce does not know the ntal product state of SaS b prepared by TP n step 2, she has no knowledge about the entangled state composed by Sa and Sb after the evoluton. Accordng to formulas (4) (7), she cannot correctly deduce MB from M A. The only thng she can do s to randomly guess the true value of MB. Because G B s encrypted wth M B, she cannot know G B at all. In step 5, Alce hears R from TP. Accordng to formula (8), she can obtan G B by computng G R A. However, our protocol has to be termnated as long as Alce and Bob fnd out that R 0 for certan. Therefore, Alce can know all the G B where R = 0 has been derved and only obtan at most 1 bt of the G B where 0 R has been derved. Case 2 The attack from TP In our protocol, TP s allowed to try hs best to obtan the secrets from two users wthout consprng wth ether of Alce and Bob. In step 4, Alce (Bob) tells TP RA (R B ) publcly. Snce TP has no access to KA (K B ) he stll cannot extract G A (G B ) from R A (R B ). In step 6, both Alce and Bob do not tell TP R. However, once the protocol s termnated by Alce and Bob n the mddle, TP naturally knows that X Y. Ths case happens wth the probablty of 1 (1/2) L 1. Or f the protocol s not termnated by Alce and Bob untl G L A and G L B are compared, TP has to randomly guess the comparson result between X and Y. Ths case happens wth the probablty of (1/2) L 1. It can be concluded that TP knows the exact comparson result between X and Y (.e. X Y ) wth the probablty of 1 (1/2) L Qubt Effcency The qubt effcency η e here s defned as η e = n c /n q, where n c and n q are the number of compared classcal bts and the number of consumed qubts n each round comparson, respectvely. [14 15] In our protocol, one twoatom product state can be used to compare one classcal bt from each user. Therefore, the qubt effcency of our protocol s 50%. 5 Dscusson We dscuss the comparson between our protocol and some prevous QPC protocols [38,41,46,52 53,58,60] n ths secton. The comparson result s summarzed n Table 2. Here, the symbol n s the comparson tmes on the condton that Alce and Bob s secrets are dentcal. From Table 2, we can conclude that the advantage of our protocol les n havng the followng features smultaneously: () It employs two-partcle product states as the ntal quantum resource, whch are much easer to prepare than entangled states; () It only needs to perform sngle-atom measurements, whch are easer to accomplsh than Bell state measurements; () It does not requre the untary operatons or the quantum entanglement swappng operaton; (v) It can be automatcally halted once Alce and Bob dscover the nequalty of ther secrets n the mddle, whch means that not all the secrets are necessary to be compared when ther secrets are not dentcal; (v) It has a hgh qubt effcency equal to 50%. It should be emphaszed that our protocol needs the use of QKD method to guarantee the securty, just as

8 154 Communcatons n Theoretcal Physcs Vol. 67 analyzed n Subsec Lkewse, the QPC protocol of Ref. [38] uses the hash functon to guarantee the securty. In fact, the QPC protocol n Ref. [53] s not secure, snce Alce and Bob can perform the ntercept-resend attack to obtan each other s secret wthout beng dscovered, just as ponted out by Ref. [54]. The QPC protocol n Ref. [46] s also not secure when TP s a more practcal thrd party who tres hs best to extract useful nformaton about two users secrets wth actve attacks, just as ponted out by Refs. [47 49]. When TP s a more practcal thrd party than the one assumed, the QPC protocols n Refs. [53,60] have the smlar securty loophole nduced by TP to that n Ref. [46] ndcated above. Actually, n ths case, the QKD method can be utlzed to guarantee the securty of the QPC protocols n Refs. [46,53,60]. In addton, dfferent from the QPC protocols n Refs. [38,41,46,52 53,58,60], our protocol s realzed va cavty QED, thus t can make full use of the evoluton law of atom va cavty QED. Actually, our protocol s the frst QPC protocol va cavty QED. Table 2 Comparson between our protocol and some prevous QPC protocols. Ref. [38] Ref. [41] Ref. [46] Ref. [52] Ref. [53] Ref. [58] Ref. [60] Our protocol Intal Bell Two-partcle Bell entangled Four-partcle GHZ Three-partcle Four-partcle Two-atom quantum entangled product states W entangled entangled W entangled cluster product resource states state states and states states entangled state Bell entangled states states Quantum Bell state Sngle- Sngle- Bell state Sngle- Sngle- Sngle- Snglepartcle partcle partcle partcle partcle atom measure- measure- measure- measure- measure- measure- measure- measure- measurement ments ments ments ments ments ements ments ments (except that for securty check) Use of QKD No (Use of Yes No Yes No Yes No Yes method Hash functon nstead) Use of Yes No No No Yes No Yes No untary operatons Use of No No No Yes No No No No entanglement swappng TP s No Yes Yes Yes Yes Yes (wth the Yes Yes (wth the knowledge probablty of probablty of about the 1 (1/2) L 1 ) 1 (1/2) L 1 ) comparson result Bt number L 1 1 L 1 1 L 1 compared each round Comparson 1 L L 1 L L 1 L tmes n Qubt eff- 25% 50% 50% 33% 33% 33% 25% 50% cency η e 6 Concluson In ths paper, by makng full use of the evoluton law of atom va cavty QED, we propose the frst QPC protocol va cavty QED. Here, TP s allowed to msbehave on hs own but cannot conspre wth ether of the two users. Our protocol adopts two-atom product states rather than entangled states as the ntal quantum resource, and only needs sngle-atom measurements for two users. It needs nether the untary operatons nor the quantum entanglement swappng operaton. It can compare the equalty of one bt from each user n each round comparson wth one two-atom product state. It can resst both the outsde attack and the partcpant attack. Partcularly, t can pre-

9 No. 2 Communcatons n Theoretcal Physcs 155 vent TP from knowng two users secrets. Moreover, ts qubt effcency s as hgh as 50%. Acknowledgements The author would lke to thank the anonymous revewers for ther valuable comments that help enhancng the qualty of ths paper. Complance wth ethcal standards Conflct of nterest: The authors declare that they have no conflct of nterest. References [1] C.H. Bennett and G. Brassard, Proc. IEEE Int. Conf. Computers, Systems and Sgnal Processng, IEEE Press, Bangalore (1984) [2] A.K. Ekert, Phys. Rev. Lett. 67 (1991) 661. [3] C.H. Bennett, G. Brassard, and N.D. Mermn, Phys. Rev. Lett. 68 (1992) 557. [4] A. Cabello, Phys. Rev. Lett. 85 (2000) [5] F.G. Deng and G.L. Long, Phys. Rev. A 68 (2003) [6] F.G. Deng and G.L. Long, Phys. Rev. A 70 (2004) [7] X.L. Su, Chn. Sc. Bull. 59 (2014) [8] C.M. Zhang, X.T. Song, P. Treevryanupab, et al., Chn. Sc. Bull. 59 (2014) [9] D.X. Quan, C.H. Zhu, S.Q. Lu, and C.X. Pe, Chn. Phys. B 24 (2015) [10] C.M. Zhang, M. L, Z.Q. Yn, et al., Sc. Chna-Phys. Mech. Astron. 58 (2015) [11] M. Hllery, V. Buzek, and A. Berthaume, Phys. Rev. A 59 (1999) [12] A. Karlsson, M. Koash, and N. Imoto, Phys. Rev. A 59 (1999) 162. [13] L. Xao, G.L. Long, F.G. Deng, and J.W. Pan, Phys. Rev. A 69 (2004) [14] J. Ln and T. Hwang, Opt. Commun. 284 (2011) [15] J.H. Chen, K.C. Lee, and T. Hwang, Int. J. Mod. Phys. C 20 (1999) [16] G.L. Long and X.S. Lu, Phys. Rev. A 65 (2002) [17] K. Bostrom and T. Felbnger, Phys. Rev. Lett. 89 (2002) [18] F.G. Deng, G.L. Long, and X.S. Lu, Phys. Rev. A 68 (2003) [19] F.G. Deng and G.L. Long, Phys. Rev. A 69 (2004) [20] C. Wang, F.G. Deng, Y.S. L, et al., Phys. Rev. A 71 (2005) [21] C. Wang, F.G. Deng, and G.L. Long, Opt. Commun. 253 (2005) 15; C. Wang, F.G. Deng, and G.L. Long, Opt. Commun. 262 (2006) 134. [22] Y. Chang, S.B. Zhang, L.L. Yan, and G.H. Han, Chn. Phys. B 24 (2015) [23] X.F. Zou and D.W. Qu, Sc. Chna-Phys. Mech. Astron. 57 (2014) [24] Y. Chang, C.X. Xu, S.B. Zhang, et al., Chn. Sc. Bull. 59 (2014) [25] Z.J. Zhang and Z.X. Man, (2004). [26] Z.J. Zhang and Z.X. Man, (2004). [27] B.A. Nguyen, Phys. Lett. A 328 (2004) 6. [28] Y. Chen, Z.X. Man, and Y.J. Xa, Chn. Phys. Lett. 24 (2007) 19. [29] T.Y. Ye and L.Z. Jang, Chn. Phys. Lett. 30 (2013) [30] C. Zheng and G.F. Long, Sc. Chna-Phys. Mech. Astron. 57 (2014) [31] T.Y. Ye, Sc. Chna-Phys. Mech. Astron. 58 (2015) [32] C.H. Bennett, G. Brassard, C. Crepeau, et al., Phys. Rev. Lett. 70 (1993) [33] V.N. Gorbachev, A.I. Trublko, and A.A. Rodchkna, Phys. Lett. A 314 (2003) 267. [34] Z.J. Zhang and X.M. Zhong, Phys. Lett. A 341 (2005) 55. [35] J. Dong and J.F. Teng, Eur. Phys. J. D 49 (2008) 129. [36] X.B. Chen, G. Xu, Y.X. Yang, and Q.Y. Wen, Opt. Commun. 283 (2010) [37] J. Heo, C.H. Hong, J.I. Lm, and H.J. Yang, Chn. Phys. B 24 (2015) [38] Y.G. Yang and Q.Y. Wen, J. Phys. A: Math. Theor. 42 (2009) ; Y.G. Yang and Q.Y. Wen, J. Phys. A: Math. Theor. 43 (2010) [39] H.K. Lo, Phys. Rev. A 56 (1997) [40] Y.G. Yang, W.F. Gao, and Q.Y. Wen, Phys. Scr. 80 (2009) [41] Y.G. Yang, J. Xa, X. Ja, L. Sh, and H. Zhang, Int. J. Quantum Inf. 10 (2012) [42] X.B. Chen, Y. Su, X.X. Nu, and Y.X. Yang, Quantum Inf. Process. 13 (2014) 101. [43] B. Lu, F. Gao, H.Y. Ja, et al., Quantum Inf. Process. 12 (2013) 887. [44] W. Lu, Y.B. Wang, and W. Cu, Commun. Theor. Phys. 57 (2012) 583. [45] W. Z, F.Z. Guo, Y. Luo, et al., Int. J. Theor. Phys. 52 (2013) [46] H.Y. Tseng, J. Ln, and T. Hwang, Quantum Inf. Process. 11 (2012) 373. [47] C. Wang, G. Xu, and Y.X. Yang, Int. J. Quantum Inf. 11 (2013) [48] Y.G. Yang, J. Xa, X. Ja, and H. Zhang, Quantum Inf. Process. 12 (2013) 877. [49] W.W. Zhang and K.J. Zhang, Quantum Inf. Process. 12 (2013) [50] J. Ln, C.W. Yang, and T. Hwang, Quantum Inf. Process. 13 (2014) 239. [51] B. Zhang, X.T. Lu, J. Wang, and C.J. Tang, Quantum Inf. Process. 14 (2015) 4593.

10 156 Communcatons n Theoretcal Physcs Vol. 67 [52] J. L, H.F. Zhou, L. Ja, and T.T. Zhang, Int. J. Theor. Phys. 53 (2014) [53] X.B. Chen, G. Xu, X.X. Nu, et al., Opt. Commun. 283 (2010) [54] J. Ln, H.Y. Tseng, and T. Hwang, Opt. Commun. 284 (2011) [55] W. Lu and Y.B. Wang, Int. J. Theor. Phys. 51 (2012) [56] Y.J. Chang, C.W. Tsa, and T. Hwang, Quantum Inf. Process. 12 (2013) [57] W. Lu, Y.B. Wang, and Z.T. Jang, Opt. Commun. 284 (2011) [58] W.W. Zhang, D. L, and Y.B. L, Int. J. Theor. Phys. 53 (2014) [59] G.A. Xu, X.B. Chen, Z.H. We, et al., Int. J. Quantum Inf. 10 (2012) [60] Z.W. Sun and D.Y. Long, Int. J. Theor. Phys. 52 (2013) 212. [61] W. Lu, Y.B. Wang, Z.T. Jang, and Y.Z. Cao, Int. J. Theor. Phys. 51 (2012) 69. [62] W. Lu, Y.B. Wang, Z.T. Jang, et al., Int. J. Theor. Phys. 51 (2012) [63] S. Ln, G.D. Guo, and X.F. Lu, Int. J. Theor. Phys. 52 (2013) [64] J. Shu, Quantum State Preparaton and Quantum Informaton Processng n Cavty QED, Unversty of Scence and Technology of Chna, Hefe (2007) 19. [65] L. Zhou and Y.B. Sheng, Phys. Rev. A 90 (2014) [66] L. Zhou and Y.B. Sheng, Phys. Rev. A 92 (2015) [67] T.J. Wang and C. Wang, Sc. Rep. 6 (2016) [68] Y.B. Sheng, L. Zhou, L. Wang, and S.M. Zhao, Quantum Inf. Process. 12 (2013) [69] Y.B. Sheng, J. Lu, S.Y. Zhao, and L. Zhou, Chn. Sc. Bull. 58 (2013) [70] C. Cao, H. Dng, Y. L, et al., Quantum Inf. Process. 14 (2015) [71] C. Cao, T.J. Wang, R. Zhang, and C. Wang, Laser Phys. Lett. 12 (2015) [72] Y.B. Sheng, S.Y. Zhao, J. Lu, and L. Zhou, Quantum Inf. Process. 13 (2014) 881. [73] S.B. Zheng and G.C. Guo, Phys. Rev. Lett. 85 (2000) [74] S.B. Zheng, Phys. Rev. A 68 (2003) [75] T. L and F.G. Deng, Sc. Rep. 5 (2015) [76] C.J. Shan, J.B. Lu, T. Chen, et al., Int. J. Theor. Phys. 49 (2010) 334. [77] C.J. Shan, J.B. Lu, W.W. Cheng, et al., Mod. Phys. Lett. B 23 (2009) [78] C.Y. L, H.Y. Zhou, Y. Wang, and F.G. Deng, Chn. Phys. Lett. 22 (2005) [79] C.Y. L, X.H. L, F.G. Deng, et al., Chn. Phys. Lett. 23 (2006) [80] P.W. Shor and J. Preskll, Phys. Rev. Lett. 85 (2000) 441. [81] F. Gao, S.J. Qn, Q.Y. Wen, and F.C. Zhu, Quantum Inf. Comput. 7 (2007) 329.

The Order Relation and Trace Inequalities for. Hermitian Operators

The Order Relation and Trace Inequalities for. Hermitian Operators Internatonal Mathematcal Forum, Vol 3, 08, no, 507-57 HIKARI Ltd, wwwm-hkarcom https://doorg/0988/mf088055 The Order Relaton and Trace Inequaltes for Hermtan Operators Y Huang School of Informaton Scence

More information

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State

Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State Commun. Theor. Phys. 55 (2011) 984 988 Vol. 55, No. 6, June 15, 2011 Two-Step Efficient Deterministic Secure Quantum Communication Using Three-Qubit W State YUAN Hao ( ), 1, ZHOU Jun ( ), 1,2 ZHANG Gang

More information

Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States

Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States Commun. Theor. Phys. 63 (015) 431 438 Vol. 63, No. 4, April 1, 015 Fault-Tolerant Quantum Dialogue Without Information Leakage Based on Entanglement Swapping between Two Logical Bell States YE Tian-Yu

More information

Efficient many-party controlled teleportation of multi-qubit quantum information via entanglement

Efficient many-party controlled teleportation of multi-qubit quantum information via entanglement Effcent many-party controlled teleportaton of mult-qut quantum nformaton va entanglement Chu-Png Yang, Shh-I Chu, Syuan Han Physcal Revew A, 24 Presentng: Vctora Tchoudakov Motvaton Teleportaton va the

More information

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards

Comments on a secure dynamic ID-based remote user authentication scheme for multiserver environment using smart cards Comments on a secure dynamc ID-based remote user authentcaton scheme for multserver envronment usng smart cards Debao He chool of Mathematcs tatstcs Wuhan nversty Wuhan People s Republc of Chna Emal: hedebao@63com

More information

Dynamics of a Superconducting Qubit Coupled to an LC Resonator

Dynamics of a Superconducting Qubit Coupled to an LC Resonator Dynamcs of a Superconductng Qubt Coupled to an LC Resonator Y Yang Abstract: We nvestgate the dynamcs of a current-based Josephson juncton quantum bt or qubt coupled to an LC resonator. The Hamltonan of

More information

Quantum Secure Direct Communication with Authentication Expansion Using Single Photons

Quantum Secure Direct Communication with Authentication Expansion Using Single Photons Commun. Theor. Phys. (Beijing, China) 54 (2010) pp. 829 834 c Chinese Physical Society and IOP Publishing Ltd Vol. 54, No. 5, November 15, 2010 Quantum Secure Direct Communication with Authentication Expansion

More information

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol

Cryptanalysis of pairing-free certificateless authenticated key agreement protocol Cryptanalyss of parng-free certfcateless authentcated key agreement protocol Zhan Zhu Chna Shp Development Desgn Center CSDDC Wuhan Chna Emal: zhuzhan0@gmal.com bstract: Recently He et al. [D. He J. Chen

More information

Power law and dimension of the maximum value for belief distribution with the max Deng entropy

Power law and dimension of the maximum value for belief distribution with the max Deng entropy Power law and dmenson of the maxmum value for belef dstrbuton wth the max Deng entropy Bngy Kang a, a College of Informaton Engneerng, Northwest A&F Unversty, Yanglng, Shaanx, 712100, Chna. Abstract Deng

More information

High-Order Hamilton s Principle and the Hamilton s Principle of High-Order Lagrangian Function

High-Order Hamilton s Principle and the Hamilton s Principle of High-Order Lagrangian Function Commun. Theor. Phys. Bejng, Chna 49 008 pp. 97 30 c Chnese Physcal Socety Vol. 49, No., February 15, 008 Hgh-Orer Hamlton s Prncple an the Hamlton s Prncple of Hgh-Orer Lagrangan Functon ZHAO Hong-Xa an

More information

Comment on An arbitrated quantum signature scheme. with fast signing and verifying

Comment on An arbitrated quantum signature scheme. with fast signing and verifying Comment on n arbtrated quantum sgnature scheme wth fast sgnng and verfyng Y-Png Luo and Tzonelh Hwang * Department of Computer cence and Informaton Engneerng, Natonal Cheng ung Unversty, No, Unversty Rd,

More information

Uniqueness of Weak Solutions to the 3D Ginzburg- Landau Model for Superconductivity

Uniqueness of Weak Solutions to the 3D Ginzburg- Landau Model for Superconductivity Int. Journal of Math. Analyss, Vol. 6, 212, no. 22, 195-114 Unqueness of Weak Solutons to the 3D Gnzburg- Landau Model for Superconductvty Jshan Fan Department of Appled Mathematcs Nanjng Forestry Unversty

More information

arxiv:quant-ph/ Jul 2002

arxiv:quant-ph/ Jul 2002 Lnear optcs mplementaton of general two-photon proectve measurement Andrze Grudka* and Anton Wóck** Faculty of Physcs, Adam Mckewcz Unversty, arxv:quant-ph/ 9 Jul PXOWRZVNDR]QDRODQG Abstract We wll present

More information

Exercises of Chapter 2

Exercises of Chapter 2 Exercses of Chapter Chuang-Cheh Ln Department of Computer Scence and Informaton Engneerng, Natonal Chung Cheng Unversty, Mng-Hsung, Chay 61, Tawan. Exercse.6. Suppose that we ndependently roll two standard

More information

Bidirectional quantum teleportation and secure direct communication via entanglement swapping

Bidirectional quantum teleportation and secure direct communication via entanglement swapping Bidirectional quantum teleportation and secure direct communication via entanglement swapping Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International

More information

Solution 1 for USTC class Physics of Quantum Information

Solution 1 for USTC class Physics of Quantum Information Soluton 1 for 017 018 USTC class Physcs of Quantum Informaton Shua Zhao, Xn-Yu Xu and Ka Chen Natonal Laboratory for Physcal Scences at Mcroscale and Department of Modern Physcs, Unversty of Scence and

More information

Quantum secure circuit evaluation

Quantum secure circuit evaluation Scence n Chna Ser. F Informaton Scences 2004 Vol.47 No.6 717 727 717 Quantum secure crcut evaluaton CHEN Huanhuan, LI Bn & ZHUANG Zhenquan Department of Electronc Scence and Technology, Unversty of Scence

More information

Solution 1 for USTC class Physics of Quantum Information

Solution 1 for USTC class Physics of Quantum Information Soluton 1 for 018 019 USTC class Physcs of Quantum Informaton Shua Zhao, Xn-Yu Xu and Ka Chen Natonal Laboratory for Physcal Scences at Mcroscale and Department of Modern Physcs, Unversty of Scence and

More information

A New Evolutionary Computation Based Approach for Learning Bayesian Network

A New Evolutionary Computation Based Approach for Learning Bayesian Network Avalable onlne at www.scencedrect.com Proceda Engneerng 15 (2011) 4026 4030 Advanced n Control Engneerng and Informaton Scence A New Evolutonary Computaton Based Approach for Learnng Bayesan Network Yungang

More information

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS Avalable onlne at http://sck.org J. Math. Comput. Sc. 3 (3), No., 6-3 ISSN: 97-537 COMPARISON OF SOME RELIABILITY CHARACTERISTICS BETWEEN REDUNDANT SYSTEMS REQUIRING SUPPORTING UNITS FOR THEIR OPERATIONS

More information

Errors in Nobel Prize for Physics (7) Improper Schrodinger Equation and Dirac Equation

Errors in Nobel Prize for Physics (7) Improper Schrodinger Equation and Dirac Equation Errors n Nobel Prze for Physcs (7) Improper Schrodnger Equaton and Drac Equaton u Yuhua (CNOOC Research Insttute, E-mal:fuyh945@sna.com) Abstract: One of the reasons for 933 Nobel Prze for physcs s for

More information

On the correction of the h-index for career length

On the correction of the h-index for career length 1 On the correcton of the h-ndex for career length by L. Egghe Unverstet Hasselt (UHasselt), Campus Depenbeek, Agoralaan, B-3590 Depenbeek, Belgum 1 and Unverstet Antwerpen (UA), IBW, Stadscampus, Venusstraat

More information

Supplemental document

Supplemental document Electronc Supplementary Materal (ESI) for Physcal Chemstry Chemcal Physcs. Ths journal s the Owner Socetes 01 Supplemental document Behnam Nkoobakht School of Chemstry, The Unversty of Sydney, Sydney,

More information

Lecture 5 Decoding Binary BCH Codes

Lecture 5 Decoding Binary BCH Codes Lecture 5 Decodng Bnary BCH Codes In ths class, we wll ntroduce dfferent methods for decodng BCH codes 51 Decodng the [15, 7, 5] 2 -BCH Code Consder the [15, 7, 5] 2 -code C we ntroduced n the last lecture

More information

A Hybrid Variational Iteration Method for Blasius Equation

A Hybrid Variational Iteration Method for Blasius Equation Avalable at http://pvamu.edu/aam Appl. Appl. Math. ISSN: 1932-9466 Vol. 10, Issue 1 (June 2015), pp. 223-229 Applcatons and Appled Mathematcs: An Internatonal Journal (AAM) A Hybrd Varatonal Iteraton Method

More information

Efficient controlled quantum secure direct communication based on GHZ-like states

Efficient controlled quantum secure direct communication based on GHZ-like states Efficient controlled quantum secure direct communication based on GHZ-like states Shima Hassanpour a, and Monireh Houshmand b a MS Student, Department of Electrical Engineering, Imam Reza International

More information

The optimal delay of the second test is therefore approximately 210 hours earlier than =2.

The optimal delay of the second test is therefore approximately 210 hours earlier than =2. THE IEC 61508 FORMULAS 223 The optmal delay of the second test s therefore approxmately 210 hours earler than =2. 8.4 The IEC 61508 Formulas IEC 61508-6 provdes approxmaton formulas for the PF for smple

More information

a b a In case b 0, a being divisible by b is the same as to say that

a b a In case b 0, a being divisible by b is the same as to say that Secton 6.2 Dvsblty among the ntegers An nteger a ε s dvsble by b ε f there s an nteger c ε such that a = bc. Note that s dvsble by any nteger b, snce = b. On the other hand, a s dvsble by only f a = :

More information

Canonical transformations

Canonical transformations Canoncal transformatons November 23, 2014 Recall that we have defned a symplectc transformaton to be any lnear transformaton M A B leavng the symplectc form nvarant, Ω AB M A CM B DΩ CD Coordnate transformatons,

More information

Circular Semi-Quantum Secret Sharing Using Single Particles

Circular Semi-Quantum Secret Sharing Using Single Particles Commun. Theor. Phys. 70 (018) 661 671 Vol. 70 No. 6 December 1 018 Circular Semi-Quantum Secret Sharing Using Single Particles Chong-Qiang Ye ( 叶崇强 ) and Tian-Yu Ye ( 叶天语 ) College of Information & Electronic

More information

Module 9. Lecture 6. Duality in Assignment Problems

Module 9. Lecture 6. Duality in Assignment Problems Module 9 1 Lecture 6 Dualty n Assgnment Problems In ths lecture we attempt to answer few other mportant questons posed n earler lecture for (AP) and see how some of them can be explaned through the concept

More information

C/CS/Phy191 Problem Set 3 Solutions Out: Oct 1, 2008., where ( 00. ), so the overall state of the system is ) ( ( ( ( 00 ± 11 ), Φ ± = 1

C/CS/Phy191 Problem Set 3 Solutions Out: Oct 1, 2008., where ( 00. ), so the overall state of the system is ) ( ( ( ( 00 ± 11 ), Φ ± = 1 C/CS/Phy9 Problem Set 3 Solutons Out: Oct, 8 Suppose you have two qubts n some arbtrary entangled state ψ You apply the teleportaton protocol to each of the qubts separately What s the resultng state obtaned

More information

A how to guide to second quantization method.

A how to guide to second quantization method. Phys. 67 (Graduate Quantum Mechancs Sprng 2009 Prof. Pu K. Lam. Verson 3 (4/3/2009 A how to gude to second quantzaton method. -> Second quantzaton s a mathematcal notaton desgned to handle dentcal partcle

More information

An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States

An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States Commun. Theor. Phys. 65 (2016) 705 710 Vol. 65, No. 6, June 1, 2016 An Improved Quantum Information Hiding Protocol Based on Entanglement Swapping of χ-type Quantum States Shu-Jiang Xu (Å ), 1, Xiu-Bo

More information

Snce h( q^; q) = hq ~ and h( p^ ; p) = hp, one can wrte ~ h hq hp = hq ~hp ~ (7) the uncertanty relaton for an arbtrary state. The states that mnmze t

Snce h( q^; q) = hq ~ and h( p^ ; p) = hp, one can wrte ~ h hq hp = hq ~hp ~ (7) the uncertanty relaton for an arbtrary state. The states that mnmze t 8.5: Many-body phenomena n condensed matter and atomc physcs Last moded: September, 003 Lecture. Squeezed States In ths lecture we shall contnue the dscusson of coherent states, focusng on ther propertes

More information

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem

Speeding up Computation of Scalar Multiplication in Elliptic Curve Cryptosystem H.K. Pathak et. al. / (IJCSE) Internatonal Journal on Computer Scence and Engneerng Speedng up Computaton of Scalar Multplcaton n Ellptc Curve Cryptosystem H. K. Pathak Manju Sangh S.o.S n Computer scence

More information

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4)

Econ107 Applied Econometrics Topic 3: Classical Model (Studenmund, Chapter 4) I. Classcal Assumptons Econ7 Appled Econometrcs Topc 3: Classcal Model (Studenmund, Chapter 4) We have defned OLS and studed some algebrac propertes of OLS. In ths topc we wll study statstcal propertes

More information

A Note on Bound for Jensen-Shannon Divergence by Jeffreys

A Note on Bound for Jensen-Shannon Divergence by Jeffreys OPEN ACCESS Conference Proceedngs Paper Entropy www.scforum.net/conference/ecea- A Note on Bound for Jensen-Shannon Dvergence by Jeffreys Takuya Yamano, * Department of Mathematcs and Physcs, Faculty of

More information

Susceptibility and Inverted Hysteresis Loop of Prussian Blue Analogs with Orthorhombic Structure

Susceptibility and Inverted Hysteresis Loop of Prussian Blue Analogs with Orthorhombic Structure Commun. Theor. Phys. 58 (202) 772 776 Vol. 58, No. 5, November 5, 202 Susceptblty and Inverted Hysteress Loop of Prussan Blue Analogs wth Orthorhombc Structure GUO An-Bang (ÁËǑ) and JIANG We ( å) School

More information

763622S ADVANCED QUANTUM MECHANICS Solution Set 1 Spring c n a n. c n 2 = 1.

763622S ADVANCED QUANTUM MECHANICS Solution Set 1 Spring c n a n. c n 2 = 1. 7636S ADVANCED QUANTUM MECHANICS Soluton Set 1 Sprng 013 1 Warm-up Show that the egenvalues of a Hermtan operator  are real and that the egenkets correspondng to dfferent egenvalues are orthogonal (b)

More information

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system

Transfer Functions. Convenient representation of a linear, dynamic model. A transfer function (TF) relates one input and one output: ( ) system Transfer Functons Convenent representaton of a lnear, dynamc model. A transfer functon (TF) relates one nput and one output: x t X s y t system Y s The followng termnology s used: x y nput output forcng

More information

arxiv:quant-ph/ v1 10 Apr 2006

arxiv:quant-ph/ v1 10 Apr 2006 Fake-signal-and-cheating attack on quantum secret sharing Fu-Guo Deng, 1,,3 Xi-Han Li, 1, Pan Chen, 4 Chun-Yan Li, 1, and Hong-Yu Zhou 1,,3 1 The Key Laboratory of Beam Technology and Material Modification

More information

The Quadratic Trigonometric Bézier Curve with Single Shape Parameter

The Quadratic Trigonometric Bézier Curve with Single Shape Parameter J. Basc. Appl. Sc. Res., (3541-546, 01 01, TextRoad Publcaton ISSN 090-4304 Journal of Basc and Appled Scentfc Research www.textroad.com The Quadratc Trgonometrc Bézer Curve wth Sngle Shape Parameter Uzma

More information

The lower and upper bounds on Perron root of nonnegative irreducible matrices

The lower and upper bounds on Perron root of nonnegative irreducible matrices Journal of Computatonal Appled Mathematcs 217 (2008) 259 267 wwwelsevercom/locate/cam The lower upper bounds on Perron root of nonnegatve rreducble matrces Guang-Xn Huang a,, Feng Yn b,keguo a a College

More information

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification

2E Pattern Recognition Solutions to Introduction to Pattern Recognition, Chapter 2: Bayesian pattern classification E395 - Pattern Recognton Solutons to Introducton to Pattern Recognton, Chapter : Bayesan pattern classfcaton Preface Ths document s a soluton manual for selected exercses from Introducton to Pattern Recognton

More information

One-sided finite-difference approximations suitable for use with Richardson extrapolation

One-sided finite-difference approximations suitable for use with Richardson extrapolation Journal of Computatonal Physcs 219 (2006) 13 20 Short note One-sded fnte-dfference approxmatons sutable for use wth Rchardson extrapolaton Kumar Rahul, S.N. Bhattacharyya * Department of Mechancal Engneerng,

More information

arxiv: v2 [quant-ph] 9 Nov 2011

arxiv: v2 [quant-ph] 9 Nov 2011 Intercept-resend attacks on Semiquantum secret sharing and the Improvements arxiv:1106.4908v2 [quant-ph] 9 Nov 2011 Jason Lin, Chun-Wei Yang, Chia-Wei Tsai, and Tzonelih Hwang Abstract Recently, Li et

More information

Foundations of Arithmetic

Foundations of Arithmetic Foundatons of Arthmetc Notaton We shall denote the sum and product of numbers n the usual notaton as a 2 + a 2 + a 3 + + a = a, a 1 a 2 a 3 a = a The notaton a b means a dvdes b,.e. ac = b where c s an

More information

This model contains two bonds per unit cell (one along the x-direction and the other along y). So we can rewrite the Hamiltonian as:

This model contains two bonds per unit cell (one along the x-direction and the other along y). So we can rewrite the Hamiltonian as: 1 Problem set #1 1.1. A one-band model on a square lattce Fg. 1 Consder a square lattce wth only nearest-neghbor hoppngs (as shown n the fgure above): H t, j a a j (1.1) where,j stands for nearest neghbors

More information

arxiv:quant-ph/ v2 2 Jan 2007

arxiv:quant-ph/ v2 2 Jan 2007 Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1

More information

Numerical Heat and Mass Transfer

Numerical Heat and Mass Transfer Master degree n Mechancal Engneerng Numercal Heat and Mass Transfer 06-Fnte-Dfference Method (One-dmensonal, steady state heat conducton) Fausto Arpno f.arpno@uncas.t Introducton Why we use models and

More information

Non-interacting Spin-1/2 Particles in Non-commuting External Magnetic Fields

Non-interacting Spin-1/2 Particles in Non-commuting External Magnetic Fields EJTP 6, No. 0 009) 43 56 Electronc Journal of Theoretcal Physcs Non-nteractng Spn-1/ Partcles n Non-commutng External Magnetc Felds Kunle Adegoke Physcs Department, Obafem Awolowo Unversty, Ile-Ife, Ngera

More information

ON MECHANICS WITH VARIABLE NONCOMMUTATIVITY

ON MECHANICS WITH VARIABLE NONCOMMUTATIVITY ON MECHANICS WITH VARIABLE NONCOMMUTATIVITY CIPRIAN ACATRINEI Natonal Insttute of Nuclear Physcs and Engneerng P.O. Box MG-6, 07725-Bucharest, Romana E-mal: acatrne@theory.npne.ro. Receved March 6, 2008

More information

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL

The Synchronous 8th-Order Differential Attack on 12 Rounds of the Block Cipher HyRAL The Synchronous 8th-Order Dfferental Attack on 12 Rounds of the Block Cpher HyRAL Yasutaka Igarash, Sej Fukushma, and Tomohro Hachno Kagoshma Unversty, Kagoshma, Japan Emal: {garash, fukushma, hachno}@eee.kagoshma-u.ac.jp

More information

Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State

Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure Entangled State Commun. Theor. Phys. (Beijing, China) 49 (2008) pp. 1468 1472 c Chinese Physical Society Vol. 49, No. 6, June 15, 2008 Multiparty Quantum Secret Sharing via Introducing Auxiliary Particles Using a Pure

More information

Valuated Binary Tree: A New Approach in Study of Integers

Valuated Binary Tree: A New Approach in Study of Integers Internatonal Journal of Scentfc Innovatve Mathematcal Research (IJSIMR) Volume 4, Issue 3, March 6, PP 63-67 ISS 347-37X (Prnt) & ISS 347-34 (Onlne) wwwarcournalsorg Valuated Bnary Tree: A ew Approach

More information

SUPPLEMENTARY INFORMATION

SUPPLEMENTARY INFORMATION do: 0.08/nature09 I. Resonant absorpton of XUV pulses n Kr + usng the reduced densty matrx approach The quantum beats nvestgated n ths paper are the result of nterference between two exctaton paths of

More information

A QUANTUM SECURE DIRECT COMMUNICATION PROTOCOL for SENDING A QUANTUM STATE and ITS SECURITY ANALYSIS

A QUANTUM SECURE DIRECT COMMUNICATION PROTOCOL for SENDING A QUANTUM STATE and ITS SECURITY ANALYSIS 6th WSEAS Internatonal Conference on Informaton Securty and Prvacy, Tenerfe, Span, December 14-16, 27 91 A QUANTUM SECURE DIRECT COMMUNICATION PROTOCOL for SENDING A QUANTUM STATE and ITS SECURITY ANALYSIS

More information

Single-Qubit Operation Sharing with Bell and W Product States

Single-Qubit Operation Sharing with Bell and W Product States Commun. Theor. Phys. 60 (013) 165 170 Vol. 60, No., August 15, 013 Single-Qubit Operation Sharing with Bell and W Product States JI Qi-Bin ( É), 1 LIU Yi-Min ( ), LIU Xian-Song ( Ø), 1 YIN Xiao-Feng (

More information

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS

A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS Journal of Mathematcal Scences: Advances and Applcatons Volume 25, 2014, Pages 1-12 A CHARACTERIZATION OF ADDITIVE DERIVATIONS ON VON NEUMANN ALGEBRAS JIA JI, WEN ZHANG and XIAOFEI QI Department of Mathematcs

More information

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 )

Yong Joon Ryang. 1. Introduction Consider the multicommodity transportation problem with convex quadratic cost function. 1 2 (x x0 ) T Q(x x 0 ) Kangweon-Kyungk Math. Jour. 4 1996), No. 1, pp. 7 16 AN ITERATIVE ROW-ACTION METHOD FOR MULTICOMMODITY TRANSPORTATION PROBLEMS Yong Joon Ryang Abstract. The optmzaton problems wth quadratc constrants often

More information

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree

Amusing Properties of Odd Numbers Derived From Valuated Binary Tree IOSR Journal of Mathematcs (IOSR-JM) e-iss: 78-578, p-iss: 19-765X. Volume 1, Issue 6 Ver. V (ov. - Dec.016), PP 5-57 www.osrjournals.org Amusng Propertes of Odd umbers Derved From Valuated Bnary Tree

More information

Amplification and Relaxation of Electron Spin Polarization in Semiconductor Devices

Amplification and Relaxation of Electron Spin Polarization in Semiconductor Devices Amplfcaton and Relaxaton of Electron Spn Polarzaton n Semconductor Devces Yury V. Pershn and Vladmr Prvman Center for Quantum Devce Technology, Clarkson Unversty, Potsdam, New York 13699-570, USA Spn Relaxaton

More information

Introduction to Algorithms

Introduction to Algorithms Introducton to Algorthms 6.046J/8.40J Lecture 7 Prof. Potr Indyk Data Structures Role of data structures: Encapsulate data Support certan operatons (e.g., INSERT, DELETE, SEARCH) Our focus: effcency of

More information

EPR Paradox and the Physical Meaning of an Experiment in Quantum Mechanics. Vesselin C. Noninski

EPR Paradox and the Physical Meaning of an Experiment in Quantum Mechanics. Vesselin C. Noninski EPR Paradox and the Physcal Meanng of an Experment n Quantum Mechancs Vesseln C Nonnsk vesselnnonnsk@verzonnet Abstract It s shown that there s one purely determnstc outcome when measurement s made on

More information

Density matrix. c α (t)φ α (q)

Density matrix. c α (t)φ α (q) Densty matrx Note: ths s supplementary materal. I strongly recommend that you read t for your own nterest. I beleve t wll help wth understandng the quantum ensembles, but t s not necessary to know t n

More information

arxiv:quant-ph/ v1 30 Oct 2006

arxiv:quant-ph/ v1 30 Oct 2006 Probablstc clonng wth supplementary nformaton contaned n the quantum states of two auxlary systems arxv:quant-ph/061045v1 30 Oct 006 Lvjun L, Daowen Qu Department of Computer Scence, Zhongshan Unversty,

More information

System in Weibull Distribution

System in Weibull Distribution Internatonal Matheatcal Foru 4 9 no. 9 94-95 Relablty Equvalence Factors of a Seres-Parallel Syste n Webull Dstrbuton M. A. El-Dacese Matheatcs Departent Faculty of Scence Tanta Unversty Tanta Egypt eldacese@yahoo.co

More information

Quantum secret sharing based on quantum error-correcting codes

Quantum secret sharing based on quantum error-correcting codes Quantum secret sharing based on quantum error-correcting codes Zhang Zu-Rong( ), Liu Wei-Tao( ), and Li Cheng-Zu( ) Department of Physics, School of Science, National University of Defense Technology,

More information

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k.

Case A. P k = Ni ( 2L i k 1 ) + (# big cells) 10d 2 P k. THE CELLULAR METHOD In ths lecture, we ntroduce the cellular method as an approach to ncdence geometry theorems lke the Szemeréd-Trotter theorem. The method was ntroduced n the paper Combnatoral complexty

More information

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 15 Scribe: Jieming Mao April 1, 2013

COS 511: Theoretical Machine Learning. Lecturer: Rob Schapire Lecture # 15 Scribe: Jieming Mao April 1, 2013 COS 511: heoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 15 Scrbe: Jemng Mao Aprl 1, 013 1 Bref revew 1.1 Learnng wth expert advce Last tme, we started to talk about learnng wth expert advce.

More information

Chapter - 2. Distribution System Power Flow Analysis

Chapter - 2. Distribution System Power Flow Analysis Chapter - 2 Dstrbuton System Power Flow Analyss CHAPTER - 2 Radal Dstrbuton System Load Flow 2.1 Introducton Load flow s an mportant tool [66] for analyzng electrcal power system network performance. Load

More information

Introduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law:

Introduction to Vapor/Liquid Equilibrium, part 2. Raoult s Law: CE304, Sprng 2004 Lecture 4 Introducton to Vapor/Lqud Equlbrum, part 2 Raoult s Law: The smplest model that allows us do VLE calculatons s obtaned when we assume that the vapor phase s an deal gas, and

More information

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition

A Novel Feistel Cipher Involving a Bunch of Keys supplemented with Modular Arithmetic Addition (IJACSA) Internatonal Journal of Advanced Computer Scence Applcatons, A Novel Festel Cpher Involvng a Bunch of Keys supplemented wth Modular Arthmetc Addton Dr. V.U.K Sastry Dean R&D, Department of Computer

More information

Quantum Particle Motion in Physical Space

Quantum Particle Motion in Physical Space Adv. Studes Theor. Phys., Vol. 8, 014, no. 1, 7-34 HIKARI Ltd, www.-hkar.co http://dx.do.org/10.1988/astp.014.311136 Quantu Partcle Moton n Physcal Space A. Yu. Saarn Dept. of Physcs, Saara State Techncal

More information

ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION

ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EQUATION Advanced Mathematcal Models & Applcatons Vol.3, No.3, 2018, pp.215-222 ON A DETERMINATION OF THE INITIAL FUNCTIONS FROM THE OBSERVED VALUES OF THE BOUNDARY FUNCTIONS FOR THE SECOND-ORDER HYPERBOLIC EUATION

More information

CHAPTER 14 GENERAL PERTURBATION THEORY

CHAPTER 14 GENERAL PERTURBATION THEORY CHAPTER 4 GENERAL PERTURBATION THEORY 4 Introducton A partcle n orbt around a pont mass or a sphercally symmetrc mass dstrbuton s movng n a gravtatonal potental of the form GM / r In ths potental t moves

More information

Lecture Notes on Linear Regression

Lecture Notes on Linear Regression Lecture Notes on Lnear Regresson Feng L fl@sdueducn Shandong Unversty, Chna Lnear Regresson Problem In regresson problem, we am at predct a contnuous target value gven an nput feature vector We assume

More information

This column is a continuation of our previous column

This column is a continuation of our previous column Comparson of Goodness of Ft Statstcs for Lnear Regresson, Part II The authors contnue ther dscusson of the correlaton coeffcent n developng a calbraton for quanttatve analyss. Jerome Workman Jr. and Howard

More information

arxiv:quant-ph/ Feb 2000

arxiv:quant-ph/ Feb 2000 Entanglement measures and the Hlbert-Schmdt dstance Masanao Ozawa School of Informatcs and Scences, Nagoya Unversty, Chkusa-ku, Nagoya 464-86, Japan Abstract arxv:quant-ph/236 3 Feb 2 In order to construct

More information

High resolution entropy stable scheme for shallow water equations

High resolution entropy stable scheme for shallow water equations Internatonal Symposum on Computers & Informatcs (ISCI 05) Hgh resoluton entropy stable scheme for shallow water equatons Xaohan Cheng,a, Yufeng Ne,b, Department of Appled Mathematcs, Northwestern Polytechncal

More information

12. The Hamilton-Jacobi Equation Michael Fowler

12. The Hamilton-Jacobi Equation Michael Fowler 1. The Hamlton-Jacob Equaton Mchael Fowler Back to Confguraton Space We ve establshed that the acton, regarded as a functon of ts coordnate endponts and tme, satsfes ( ) ( ) S q, t / t+ H qpt,, = 0, and

More information

Uncertainty and auto-correlation in. Measurement

Uncertainty and auto-correlation in. Measurement Uncertanty and auto-correlaton n arxv:1707.03276v2 [physcs.data-an] 30 Dec 2017 Measurement Markus Schebl Federal Offce of Metrology and Surveyng (BEV), 1160 Venna, Austra E-mal: markus.schebl@bev.gv.at

More information

The Study of Teaching-learning-based Optimization Algorithm

The Study of Teaching-learning-based Optimization Algorithm Advanced Scence and Technology Letters Vol. (AST 06), pp.05- http://dx.do.org/0.57/astl.06. The Study of Teachng-learnng-based Optmzaton Algorthm u Sun, Yan fu, Lele Kong, Haolang Q,, Helongang Insttute

More information

A Fast Computer Aided Design Method for Filters

A Fast Computer Aided Design Method for Filters 2017 Asa-Pacfc Engneerng and Technology Conference (APETC 2017) ISBN: 978-1-60595-443-1 A Fast Computer Aded Desgn Method for Flters Gang L ABSTRACT *Ths paper presents a fast computer aded desgn method

More information

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros

On the Interval Zoro Symmetric Single-step Procedure for Simultaneous Finding of Polynomial Zeros Appled Mathematcal Scences, Vol. 5, 2011, no. 75, 3693-3706 On the Interval Zoro Symmetrc Sngle-step Procedure for Smultaneous Fndng of Polynomal Zeros S. F. M. Rusl, M. Mons, M. A. Hassan and W. J. Leong

More information

Wavelet chaotic neural networks and their application to continuous function optimization

Wavelet chaotic neural networks and their application to continuous function optimization Vol., No.3, 04-09 (009) do:0.436/ns.009.307 Natural Scence Wavelet chaotc neural networks and ther applcaton to contnuous functon optmzaton Ja-Ha Zhang, Yao-Qun Xu College of Electrcal and Automatc Engneerng,

More information

Grover s Algorithm + Quantum Zeno Effect + Vaidman

Grover s Algorithm + Quantum Zeno Effect + Vaidman Grover s Algorthm + Quantum Zeno Effect + Vadman CS 294-2 Bomb 10/12/04 Fall 2004 Lecture 11 Grover s algorthm Recall that Grover s algorthm for searchng over a space of sze wors as follows: consder the

More information

Ph 219a/CS 219a. Exercises Due: Wednesday 23 October 2013

Ph 219a/CS 219a. Exercises Due: Wednesday 23 October 2013 1 Ph 219a/CS 219a Exercses Due: Wednesday 23 October 2013 1.1 How far apart are two quantum states? Consder two quantum states descrbed by densty operators ρ and ρ n an N-dmensonal Hlbert space, and consder

More information

Structure and Drive Paul A. Jensen Copyright July 20, 2003

Structure and Drive Paul A. Jensen Copyright July 20, 2003 Structure and Drve Paul A. Jensen Copyrght July 20, 2003 A system s made up of several operatons wth flow passng between them. The structure of the system descrbes the flow paths from nputs to outputs.

More information

Online Appendix. t=1 (p t w)q t. Then the first order condition shows that

Online Appendix. t=1 (p t w)q t. Then the first order condition shows that Artcle forthcomng to ; manuscrpt no (Please, provde the manuscrpt number!) 1 Onlne Appendx Appendx E: Proofs Proof of Proposton 1 Frst we derve the equlbrum when the manufacturer does not vertcally ntegrate

More information

CS286r Assign One. Answer Key

CS286r Assign One. Answer Key CS286r Assgn One Answer Key 1 Game theory 1.1 1.1.1 Let off-equlbrum strateges also be that people contnue to play n Nash equlbrum. Devatng from any Nash equlbrum s a weakly domnated strategy. That s,

More information

The non-negativity of probabilities and the collapse of state

The non-negativity of probabilities and the collapse of state The non-negatvty of probabltes and the collapse of state Slobodan Prvanovć Insttute of Physcs, P.O. Box 57, 11080 Belgrade, Serba Abstract The dynamcal equaton, beng the combnaton of Schrödnger and Louvlle

More information

The Feynman path integral

The Feynman path integral The Feynman path ntegral Aprl 3, 205 Hesenberg and Schrödnger pctures The Schrödnger wave functon places the tme dependence of a physcal system n the state, ψ, t, where the state s a vector n Hlbert space

More information

Markov Chain Monte Carlo Lecture 6

Markov Chain Monte Carlo Lecture 6 where (x 1,..., x N ) X N, N s called the populaton sze, f(x) f (x) for at least one {1, 2,..., N}, and those dfferent from f(x) are called the tral dstrbutons n terms of mportance samplng. Dfferent ways

More information

Finding Primitive Roots Pseudo-Deterministically

Finding Primitive Roots Pseudo-Deterministically Electronc Colloquum on Computatonal Complexty, Report No 207 (205) Fndng Prmtve Roots Pseudo-Determnstcally Ofer Grossman December 22, 205 Abstract Pseudo-determnstc algorthms are randomzed search algorthms

More information

NUMERICAL DIFFERENTIATION

NUMERICAL DIFFERENTIATION NUMERICAL DIFFERENTIATION 1 Introducton Dfferentaton s a method to compute the rate at whch a dependent output y changes wth respect to the change n the ndependent nput x. Ths rate of change s called the

More information

ECEN 5005 Crystals, Nanocrystals and Device Applications Class 19 Group Theory For Crystals

ECEN 5005 Crystals, Nanocrystals and Device Applications Class 19 Group Theory For Crystals ECEN 5005 Crystals, Nanocrystals and Devce Applcatons Class 9 Group Theory For Crystals Dee Dagram Radatve Transton Probablty Wgner-Ecart Theorem Selecton Rule Dee Dagram Expermentally determned energy

More information

Physics 5153 Classical Mechanics. Principle of Virtual Work-1

Physics 5153 Classical Mechanics. Principle of Virtual Work-1 P. Guterrez 1 Introducton Physcs 5153 Classcal Mechancs Prncple of Vrtual Work The frst varatonal prncple we encounter n mechancs s the prncple of vrtual work. It establshes the equlbrum condton of a mechancal

More information

Lecture 4: Universal Hash Functions/Streaming Cont d

Lecture 4: Universal Hash Functions/Streaming Cont d CSE 5: Desgn and Analyss of Algorthms I Sprng 06 Lecture 4: Unversal Hash Functons/Streamng Cont d Lecturer: Shayan Oves Gharan Aprl 6th Scrbe: Jacob Schreber Dsclamer: These notes have not been subjected

More information