Adrian Kent
University of Cambridge
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Adrian Kent.
Communications in Mathematical Physics | 1986
P. Goddard; Adrian Kent; David I. Olive
It is shown that a method previously given for constructing representations of the Virasoro algebra out of representations of affine Kac-Moody algebras yields the full discrete series of highest weight irreducible representations of the Virasoro algebra. The corresponding method for the super-Virasoro algebras (i.e. the Neveu-Schwarz and Ramond algebras) is described in detail and shown to yield the full discrete series of irreducible highest weight representations.
Physics Letters B | 1985
P. Goodard; Adrian Kent; David I. Olive
Abstract A previous construction of unitary representations of the Virasoro algebra is extended and interpreted physically in terms of a coset space quark model. The quaternionic projective spaces HPn−1 yield the complete range of possible values for the central charge when it is less than unity, namely 1 − 6/(n + 1)(n + 2). The supersymmetric extension is also found.
Journal of Physics A | 2011
Roger Colbeck; Adrian Kent
Randomness is an important resource for many applications, from gambling to secure communication. However, guaranteeing that the output from a candidate random source could not have been predicted by an outside party is a challenging task, and many supposedly random sources used today provide no such guarantee. Quantum solutions to this problem exist, for example a device which internally sends a photon through a beamsplitter and observes on which side it emerges, but, presently, such solutions require the user to trust the internal workings of the device. Here, we seek to go beyond this limitation by asking whether randomness can be generated using untrusted devices—even ones created by an adversarial agent—while providing a guarantee that no outside party (including the agent) can predict it. Since this is easily seen to be impossible unless the user has an initially private random string, the task we investigate here is private randomness expansion. We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private random string and produce as output a longer private random string. We point out that private randomness expansion protocols are generally vulnerable to attacks that can render the initial string partially insecure, even though that string is used only inside a secure laboratory; our protocol is designed to remove this previously unconsidered vulnerability by privacy amplification. We also discuss extensions of our protocol designed to generate an arbitrarily long random string from a finite initially private random string. The security of these protocols against the most general attacks is left as an open question.
Physical Review Letters | 1999
Adrian Kent
We describe a new classical bit commitment protocol based on cryptographic constraints imposed by special relativity. The protocol is unconditionally secure against classical or quantum attacks. It evades the no-go results of Mayers, Lo and Chau by requiring from Alice a sequence of communications, including a post-revelation verification, each of which is guaranteed to be independent of its predecessor.
International Journal of Modern Physics A | 1990
Adrian Kent
This is a critical review of the literature on many-worlds interpretations, MWI, with arguments drawn partly from earlier critiques by Bell and Stein. The essential postulates involved in various MWI are extracted, and their consistency with the evident physical world is examined. Arguments are presented against MWI proposed by Everett, Graham and DeWitt. The relevance of frequency operators to MWI is examined; it is argued that frequency operator theorems of Hartle and Farhi-Goldstone-Gutmann do not in themselves provide a probability interpretation for quantum mechanics, and thus neither support existing MWI nor would be useful in constructing new MWI. Comments are made on papers by Geroch and Deutsch that advocate MWI. It is concluded that no plausible set of axioms exists for an MWI that describes known physics.
Physical Review Letters | 2006
Jonathan Barrett; Adrian Kent; Stefano Pironio
We introduce a version of the chained Bell inequality for an arbitrary number of measurement outcomes and use it to give a simple proof that the maximally entangled state of two d-dimensional quantum systems has no local component. That is, if we write its quantum correlations as a mixture of local correlations and general (not necessarily quantum) correlations, the coefficient of the local correlations must be zero. This suggests an experimental program to obtain as good an upper bound as possible on the fraction of local states and provides a lower bound on the amount of classical communication needed to simulate a maximally entangled state in dxd dimensions. We also prove that the quantum correlations violating the inequality are monogamous among nonsignaling correlations and, hence, can be used for quantum key distribution secure against postquantum (but nonsignaling) eavesdroppers.
Physical Review Letters | 2004
Lucien Hardy; Adrian Kent
We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating. We describe an unconditionally secure cheat sensitive nonrelativistic bit commitment protocol which uses quantum information to implement a task which is classically impossible; we also describe a simple relativistic protocol.
Physical Review Letters | 1997
Adrian Kent
In the consistent histories formulation of quantum theory, the probabilistic predictions and retrodictions made from observed data depend on the choice of a consistent set. We show that this freedom allows the formalism to retrodict contrary propositions which correspond to orthogonal commuting projections and which each have probability one. We also show that the formalism makes contrary probability one predictions when applied to Gell-Mann and Hartle{close_quote}s generalized time-neutral quantum mechanics. {copyright} {ital 1997} {ital The American Physical Society}
Physical Review Letters | 2013
Jonathan Barrett; Roger Colbeck; Adrian Kent
Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage, or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defenses include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defenses as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each other (and no other party).
Classical and Quantum Gravity | 2012
David Rideout; Thomas Jennewein; Tommaso F. Demarie; Brendon L. Higgins; Achim Kempf; Adrian Kent; Raymond Laflamme; Xian Ma; Robert B. Mann; Eduardo Martin-Martinez; Nicolas C. Menicucci; J. W. Moffat; Christoph Simon; Rafael D. Sorkin; Lee Smolin; Daniel R. Terno
Physical theories are developed to describe phenomena in particular regimes, and generally are valid only within a limited range of scales. For example, general relativity provides an effective description of the Universe at large length scales, and has been tested from the cosmic scale down to distances as small as 10 m (Dimopoulos 2007 Phys. Rev. Lett. 98 111102; 2008 Phys. Rev. D 78 042003). In contrast, quantum theory provides an effective description of physics at small length scales. Direct tests of quantum theory have been performed at the smallest probeable scales at the Large Hadron Collider, ~10−20 m, up to that of hundreds of kilometres (Ursin et al 2007 Nature Phys. 3 481–6). Yet, such tests fall short of the scales required to investigate potentially significant physics that arises at the intersection of quantum and relativistic regimes. We propose to push direct tests of quantum theory to larger and larger length scales, approaching that of the radius of curvature of spacetime, where we begin to probe the interaction between gravity and quantum phenomena. In particular, we review a wide variety of potential tests of fundamental physics that are conceivable with artificial satellites in Earth orbit and elsewhere in the solar system, and attempt to sketch the magnitudes of potentially observable effects. The tests have the potential to determine the applicability of quantum theory at larger length scales, eliminate various alternative physical theories, and place bounds on phenomenological models motivated by ideas about spacetime microstructure from quantum gravity. From a more pragmatic perspective, as quantum communication technologies such as quantum key distribution advance into space towards large distances, some of the fundamental physical effects discussed here may need to be taken into account to make such schemes viable.