Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Adrian Kent is active.

Publication


Featured researches published by Adrian Kent.


Communications in Mathematical Physics | 1986

Unitary representations of the Virasoro and super-Virasoro algebras

P. Goddard; Adrian Kent; David I. Olive

It is shown that a method previously given for constructing representations of the Virasoro algebra out of representations of affine Kac-Moody algebras yields the full discrete series of highest weight irreducible representations of the Virasoro algebra. The corresponding method for the super-Virasoro algebras (i.e. the Neveu-Schwarz and Ramond algebras) is described in detail and shown to yield the full discrete series of irreducible highest weight representations.


Physics Letters B | 1985

Virasoro algebras and coset space models

P. Goodard; Adrian Kent; David I. Olive

Abstract A previous construction of unitary representations of the Virasoro algebra is extended and interpreted physically in terms of a coset space quark model. The quaternionic projective spaces HPn−1 yield the complete range of possible values for the central charge when it is less than unity, namely 1 − 6/(n + 1)(n + 2). The supersymmetric extension is also found.


Journal of Physics A | 2011

Private randomness expansion with untrusted devices

Roger Colbeck; Adrian Kent

Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices—even ones created by an adversarial agent—while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.


Physical Review Letters | 1999

UNCONDITIONALLY SECURE BIT COMMITMENT

Adrian Kent

We describe a new classical bit commitment protocol based on cryptographic constraints imposed by special relativity. The protocol is unconditionally secure against classical or quantum attacks. It evades the no-go results of Mayers, Lo and Chau by requiring from Alice a sequence of communications, including a post-revelation verification, each of which is guaranteed to be independent of its predecessor.


International Journal of Modern Physics A | 1990

AGAINST MANY WORLDS INTERPRETATIONS

Adrian Kent

This is a critical review of the literature on many-worlds interpretations, MWI, with arguments drawn partly from earlier critiques by Bell and Stein. The essential postulates involved in various MWI are extracted, and their consistency with the evident physical world is examined. Arguments are presented against MWI proposed by Everett, Graham and DeWitt. The relevance of frequency operators to MWI is examined; it is argued that frequency operator theorems of Hartle and Farhi-Goldstone-Gutmann do not in themselves provide a probability interpretation for quantum mechanics, and thus neither support existing MWI nor would be useful in constructing new MWI. Comments are made on papers by Geroch and Deutsch that advocate MWI. It is concluded that no plausible set of axioms exists for an MWI that describes known physics.


Physical Review Letters | 2006

Maximally nonlocal and monogamous quantum correlations.

Jonathan Barrett; Adrian Kent; Stefano Pironio

We introduce a version of the chained Bell inequality for an arbitrary number of measurement outcomes and use it to give a simple proof that the maximally entangled state of two d-dimensional quantum systems has no local component. That is, if we write its quantum correlations as a mixture of local correlations and general (not necessarily quantum) correlations, the coefficient of the local correlations must be zero. This suggests an experimental program to obtain as good an upper bound as possible on the fraction of local states and provides a lower bound on the amount of classical communication needed to simulate a maximally entangled state in dxd dimensions. We also prove that the quantum correlations violating the inequality are monogamous among nonsignaling correlations and, hence, can be used for quantum key distribution secure against postquantum (but nonsignaling) eavesdroppers.


Physical Review Letters | 2004

Cheat Sensitive Quantum Bit Commitment

Lucien Hardy; Adrian Kent

We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating. We describe an unconditionally secure cheat sensitive nonrelativistic bit commitment protocol which uses quantum information to implement a task which is classically impossible; we also describe a simple relativistic protocol.


Physical Review Letters | 1997

Consistent Sets Yield Contrary Inferences in Quantum Theory

Adrian Kent

In the consistent histories formulation of quantum theory, the probabilistic predictions and retrodictions made from observed data depend on the choice of a consistent set. We show that this freedom allows the formalism to retrodict contrary propositions which correspond to orthogonal commuting projections and which each have probability one. We also show that the formalism makes contrary probability one predictions when applied to Gell-Mann and Hartle{close_quote}s generalized time-neutral quantum mechanics. {copyright} {ital 1997} {ital The American Physical Society}


Physical Review Letters | 2013

Memory attacks on device-independent quantum cryptography.

Jonathan Barrett; Roger Colbeck; Adrian Kent

Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage, or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defenses include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defenses as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party).


Classical and Quantum Gravity | 2012

Fundamental quantum optics experiments conceivable with satellites : reaching relativistic distances and velocities

David Rideout; Thomas Jennewein; Tommaso F. Demarie; Brendon L. Higgins; Achim Kempf; Adrian Kent; Raymond Laflamme; Xian Ma; Robert B. Mann; Eduardo Martin-Martinez; Nicolas C. Menicucci; J. W. Moffat; Christoph Simon; Rafael D. Sorkin; Lee Smolin; Daniel R. Terno

Physical theories are developed to describe phenomena in particular regimes, and generally are valid only within a limited range of scales. For example, general relativity provides an effective description of the Universe at large length scales, and has been tested from the cosmic scale down to distances as small as 10 m (Dimopoulos 2007 Phys. Rev. Lett. 98 111102; 2008 Phys. Rev. D 78 042003). In contrast, quantum theory provides an effective description of physics at small length scales. Direct tests of quantum theory have been performed at the smallest probeable scales at the Large Hadron Collider, ~10−20 m, up to that of hundreds of kilometres (Ursin et al 2007 Nature Phys. 3 481–6). Yet, such tests fall short of the scales required to investigate potentially significant physics that arises at the intersection of quantum and relativistic regimes. We propose to push direct tests of quantum theory to larger and larger length scales, approaching that of the radius of curvature of spacetime, where we begin to probe the interaction between gravity and quantum phenomena. In particular, we review a wide variety of potential tests of fundamental physics that are conceivable with artificial satellites in Earth orbit and elsewhere in the solar system, and attempt to sketch the magnitudes of potentially observable effects. The tests have the potential to determine the applicability of quantum theory at larger length scales, eliminate various alternative physical theories, and place bounds on phenomenological models motivated by ideas about spacetime microstructure from quantum gravity. From a more pragmatic perspective, as quantum communication technologies such as quantum key distribution advance into space towards large distances, some of the fundamental physical effects discussed here may need to be taken into account to make such schemes viable.

Collaboration


Dive into the Adrian Kent's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Emily Adlam

University of Cambridge

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Fay Dowker

Imperial College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jonathan Barrett

Université libre de Bruxelles

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge