952 resultados para Symmetric cipher
Resumo:
We present a comprehensive study of two of the most experimentally relevant extensions of Kitaev's spinless model of a one-dimensional p-wave superconductor: those involving (i) longer-range hopping and superconductivity and (ii) inhomogeneous potentials. We commence with a pedagogical review of the spinless model and, as a means of characterizing topological phases exhibited by the systems studied here, we introduce bulk topological invariants as well as those derived from an explicit consideration of boundary modes. In time-reversal symmetric systems, we find that the longer range hopping leads to topological phases characterized by multiple Majorana modes. In particular, we investigate a spin model that respects a duality and maps to a fermionic model with multiple Majorana modes; we highlight the connection between these topological phases and the broken symmetry phases in the original spin model. In the presence of time-reversal symmetry breaking terms, we show that the topological phase diagram is characterized by an extended gapless regime. For the case of inhomogeneous potentials, we explore phase diagrams of periodic, quasiperiodic, and disordered systems. We present a detailed mapping between normal state localization properties of such systems and the topological phases of the corresponding superconducting systems. This powerful tool allows us to leverage the analyses of Hofstadter's butterfly and the vast literature on Anderson localization to the question of Majorana modes in superconducting quasiperiodic and disordered systems, respectively. We briefly touch upon the synergistic effects that can be expected in cases where long-range hopping and disorder are both present.
Resumo:
We say a family of geometric objects C has (l;k)-property if every subfamily C0C of cardinality at most lisk- piercable. In this paper we investigate the existence of g(k;d)such that if any family of objects C in Rd has the (g(k;d);k)-property, then C is k-piercable. Danzer and Gr̈ unbaum showed that g(k;d)is infinite for fami-lies of boxes and translates of centrally symmetric convex hexagons. In this paper we show that any family of pseudo-lines(lines) with (k2+k+ 1;k)-property is k-piercable and extend this result to certain families of objects with discrete intersections. This is the first positive result for arbitrary k for a general family of objects. We also pose a relaxed ver-sion of the above question and show that any family of boxes in Rd with (k2d;k)-property is 2dk- piercable.
Resumo:
Waters, in 2009, introduced an important technique, called dual system encryption, to construct identity-based encryption (IBE) and related schemes. The resulting IBE scheme was described in the setting of symmetric pairing. A key feature of the construction is the presence of random tags in the ciphertext and decryption key. Later work by Lewko and Waters removed the tags and proceeding through composite-order pairings led to a more efficient dual system IBE scheme using asymmetric pairings whose security is based on non-standard but static assumptions. In this work, we have systematically simplified Waters 2009 IBE scheme in the setting of asymmetric pairing. The simplifications retain tags used in the original description. This leads to several variants, the first one of which is based on standard assumptions and in comparison to Waters’ original scheme reduces ciphertexts and keys by two elements each. Going through several stages of simplifications, we finally obtain a simple scheme whose security can be based on two standard assumptions and a natural and minimal extension of the decision Diffie-Hellman problem for asymmetric pairing groups. The scheme itself is also minimal in the sense that apart from the tags, both encryption and key generation use exactly one randomiser each. This final scheme is more efficient than both the previous dual system IBE scheme in the asymmetric setting due to Lewko and Waters and the more recent dual system IBE scheme due to Lewko. We extend the IBE scheme to hierarchical IBE (HIBE) and broadcast encryption (BE) schemes. Both primitives are secure in their respective full models and have better efficiencies compared to previously known schemes offering the same level and type of security.
Resumo:
We show how Majorana end modes can be generated in a one-dimensional system by varying some of the parameters in the Hamiltonian periodically in time. The specific model we consider is a chain containing spinless electrons with a nearest-neighbor hopping amplitude, a p-wave superconducting term, and a chemical potential; this is equivalent to a spin-1/2 chain with anisotropic XY couplings between nearest neighbors and a magnetic field applied in the (z) over cap direction. We show that varying the chemical potential (or magnetic field) periodically in time can produce Majorana modes at the ends of a long chain. We discuss two kinds of periodic driving, periodic delta-function kicks, and a simple harmonic variation with time. We discuss some distinctive features of the end modes such as the inverse participation ratio of their wave functions and their Floquet eigenvalues which are always equal to +/- 1 for time-reversal-symmetric systems. For the case of periodic delta-function kicks, we use the effective Hamiltonian of a system with periodic boundary conditions to define two topological invariants. The first invariant is a well-known winding number, while the second invariant has not appeared in the literature before. The second invariant is more powerful in that it always correctly predicts the numbers of end modes with Floquet eigenvalues equal to + 1 and -1, while the first invariant does not. We find that the number of end modes can become very large as the driving frequency decreases. We show that periodic delta-function kicks in the hopping and superconducting terms can also produce end modes. Finally, we study the effect of electron-phonon interactions (which are relevant at finite temperatures) and a random noise in the chemical potential on the Majorana modes.
Resumo:
For transmission over the two-user Gaussian Multiple Access Channel with fading and finite constellation at the inputs, we propose a scheme which uses only quantized knowledge of fade state at users with the feedback overhead being nominal. One of the users rotates its constellation without varying the transmit power to adapt to the existing channel conditions, in order to meet certain pre-determined minimum Euclidean distance requirement in the equivalent constellation at the destination. The optimal modulation scheme has been described for the case when both the users use symmetric M-PSK constellations at the input, where M = 2λ, λ being a positive integer. The strategy has been illustrated by considering examples where both the users use QPSK signal set at the input. It is shown that the proposed scheme has considerable better error performance compared to the conventional non-adaptive scheme, at the cost of a feedback overhead of just [log2 (M2/8 - M/4 + 2)] + 1 bits, for the M-PSK case.
Resumo:
Visualizing symmetric patterns in the data often helps the domain scientists make important observations and gain insights about the underlying experiment. Detecting symmetry in scalar fields is a nascent area of research and existing methods that detect symmetry are either not robust in the presence of noise or computationally costly. We propose a data structure called the augmented extremum graph and use it to design a novel symmetry detection method based on robust estimation of distances. The augmented extremum graph captures both topological and geometric information of the scalar field and enables robust and computationally efficient detection of symmetry. We apply the proposed method to detect symmetries in cryo-electron microscopy datasets and the experiments demonstrate that the algorithm is capable of detecting symmetry even in the presence of significant noise. We describe novel applications that use the detected symmetry to enhance visualization of scalar field data and facilitate their exploration.
Resumo:
The effects of the initial height on the temporal persistence probability of steady-state height fluctuations in up-down symmetric linear models of surface growth are investigated. We study the (1 + 1)-dimensional Family model and the (1 + 1)-and (2 + 1)-dimensional larger curvature (LC) model. Both the Family and LC models have up-down symmetry, so the positive and negative persistence probabilities in the steady state, averaged over all values of the initial height h(0), are equal to each other. However, these two probabilities are not equal if one considers a fixed nonzero value of h(0). Plots of the positive persistence probability for negative initial height versus time exhibit power-law behavior if the magnitude of the initial height is larger than the interface width at saturation. By symmetry, the negative persistence probability for positive initial height also exhibits the same behavior. The persistence exponent that describes this power-law decay decreases as the magnitude of the initial height is increased. The dependence of the persistence probability on the initial height, the system size, and the discrete sampling time is found to exhibit scaling behavior.
Resumo:
In this paper, we propose a novel authentication protocol for MANETs requiring stronger security. The protocol works on a two-tier network architecture with client nodes and authentication server nodes, and supports dynamic membership. We use an external membership granting server (MGS) to provide stronger security with dynamic membership. However, the external MGS in our protocol is semi-online instead of being online, i.e., the MGS cannot initiate a connection with a network node but any network node can communicate with the MGS whenever required. To ensure efficiency, the protocol uses symmetric key cryptography to implement the authentication service. However, to achieve storage scalability, the protocol uses a pseudo random function (PRF) to bind the secret key of a client to its identity using the secret key of its server. In addition, the protocol possesses an efficient server revocation mechanism along with an efficient server re-assignment mechanism, which makes the protocol robust against server node compromise.
Resumo:
Electric-field induced nonlinear actuation behavior is demonstrated in a bulk nanotube (CNT) structure under ambient conditions. Completely recoverable and non-degradable actuation over several cycles of electric-field is measured in these structures. A symmetric and polarity independent displacement corresponding up to an axial strain of 14% is measured upon application of a low strength electric field of 4.2 kV/m in the axial direction. However, a much lower strain of similar to 1% is measured in the radial (or, transverse) direction. Furthermore, the electric field induced actuation increases by more than a factor of 2 upon impregnating the CNT cellular structure with copper oxide nano-particles. An electrostriction mechanism, based on the electric-field induced polarization of CNT strands, is proposed to account for the reported actuation behavior. (C) 2013 Elsevier Ltd. All rights reserved.
Resumo:
An in situ approach involving a simple mix and shake method for testing the enantiopurity of primary, secondary and tertiary chiral amines and their derivatives, chiral amino alcohols, by H-1-NMR spectroscopy is developed. The protocol involves the in situ formation of chiral ammonium borate salt from a mixture of C-2 symmetric chiral BINOL, trialkoxyborane and chiral amines. The proposed concept was demonstrated convincingly on a large number of chiral and pro-chiral amines and amino alcohols, and also aids the precise measurement of enantiomeric excess. The protocol can be completed in a couple of minutes directly in the NMR sample tube, without the need for any physical separation.
Resumo:
The mixed alkali metal effect is a long-standing problem in glasses. Electron paramagnetic resonance (EPR) is used by several researchers to study the mixed alkali metal effect, but a detailed analysis of the nearest neighbor environment of the glass former using spin-Hamiltonian parameters was elusive. In this study we have prepared a series of vanadate glasses having general formula (mol %) 40 V2O5-30BaF(2)-(30 - x)LiF-xRbF with x = 5, 10, 15, 20, 25, and 30. Spin-Hamiltonian parameters of V4+ ions were extracted by simulating and fitting to the experimental spectra using EasySpin. From the analysis of these parameters it is observed that the replacement of lithium ions by rubidium ions follows a ``preferential substitution model''. Using this proposed model, we were able to account for the observed variation in the ratio of the g parameter, which goes through a maximum. This reflects an asymmetric to symmetric changeover of. the alkali metal ion environment around the vanadium site. Further, this model also accounts for the variation in oxidation state of vanadium ion, which was confirmed from the variation in signal intensity of EPR spectra.
Resumo:
A series expansion for Heckman-Opdam hypergeometric functions phi(lambda) is obtained for all lambda is an element of alpha(C)*. As a consequence, estimates for phi(lambda) away from the walls of a Weyl chamber are established. We also characterize the bounded hypergeometric functions and thus prove an analogue of the celebrated theorem of Helgason and Johnson on the bounded spherical functions on a Riemannian symmetric space of the noncompact type. The L-P-theory for the hypergeometric Fourier transform is developed for 0 < p < 2. In particular, an inversion formula is proved when 1 <= p < 2. (C) 2013 Elsevier Inc. All rights reserved.
Resumo:
Accurately characterizing the time-varying interference caused to the primary users is essential in ensuring a successful deployment of cognitive radios (CR). We show that the aggregate interference at the primary receiver (PU-Rx) from multiple, randomly located cognitive users (CUs) is well modeled as a shifted lognormal random process, which is more accurate than the lognormal and the Gaussian process models considered in the literature, even for a relatively dense deployment of CUs. It also compares favorably with the asymptotically exact stable and symmetric truncated stable distribution models, except at high CU densities. Our model accounts for the effect of imperfect spectrum sensing, which depends on path-loss, shadowing, and small-scale fading of the link from the primary transmitter to the CU; the interweave and underlay modes or CR operation, which determine the transmit powers of the CUs; and time-correlated shadowing and fading of the links from the CUs to the PU-Rx. It leads to expressions for the probability distribution function, level crossing rate, and average exceedance duration. The impact of cooperative spectrum sensing is also characterized. We validate the model by applying it to redesign the primary exclusive zone to account for the time-varying nature of interference.
Resumo:
The formation of a complete solid solution between acetylacetonate (acac) complexes of chromium and gallium, (Cr1-x,Ga-x)(acac)(3) for 0.1
Resumo:
Microorganisms exhibit varied regulatory strategies such as direct regulation, symmetric anticipatory regulation, asymmetric anticipatory regulation, etc. Current mathematical modeling frameworks for the growth of microorganisms either do not incorporate regulation or assume that the microorganisms utilize the direct regulation strategy. In the present study, we extend the cybernetic modeling framework to account for asymmetric anticipatory regulation strategy. The extended model accurately captures various experimental observations. We use the developed model to explore the fitness advantage provided by the asymmetric anticipatory regulation strategy and observe that the optimal extent of asymmetric regulation depends on the selective pressure that the microorganisms experience. We also explore the importance of timing the response in anticipatory regulation and find that there is an optimal time, dependent on the extent of asymmetric regulation, at which microorganisms should respond anticipatorily to maximize their fitness. We then discuss the advantages offered by the cybernetic modeling framework over other modeling frameworks in modeling the asymmetric anticipatory regulation strategy. (C) 2013 Published by Elsevier Inc.