-
Star-planet interaction and its impact on the stellar rotation
Authors:
Thiago M. Santiago,
Sarah G. A. Barbosa,
Francisco J. Cavalcante,
Daniel B. de Freitas
Abstract:
The stellar rotation has an essential role in modifying the structure of the star and, therefore, the way these different interplays arise. On the other hand, changes in orbits impact the star's rotation and its evolution. The evolution of the star's rotation accounts for the angular momentum exchange with the planet and follows the effects of the internal transport of angular momentum and metalli…
▽ More
The stellar rotation has an essential role in modifying the structure of the star and, therefore, the way these different interplays arise. On the other hand, changes in orbits impact the star's rotation and its evolution. The evolution of the star's rotation accounts for the angular momentum exchange with the planet and follows the effects of the internal transport of angular momentum and metallicity. Several models in the literature have aimed to find a theoretical way to study these interactions between the planet's orbital evolution and the star's rotation. Our work is a promising attempt to investigate these interactions from a model based on a new statistical approach. To this end, we propose a ``tidal interaction index'' that carries all the parameters of the star-planet system that can affect the transport of angular momentum and, consequently, the evolution of stellar rotation. This index is similar to the ``magnetic braking index'' whose most successful value equals 3, which expresses the seminal Skumunich law. Our model is computed for masses of the host star less than the Kraft limit for three orbital-rotation period regimes and the semi-major axis less than 1 AU. We consider planets with masses between 0.4M$_{\oplus}$ and 20M$_{\rm J}$ with orbital periods between 0.3 and 225 days. We show that the tidal index $q$ segregated by stellar mass without wind magnetic braking during the main-sequence phase is strongly anti-correlated with planetary mass. Finally, we conclude that in cases where planets retain less than 84\% of the total angular momentum within the system, the magnetic braking mechanism proves to be more effective than tidal interactions, irrespective of whether the planets' angular momentum surpasses that of the host star.
△ Less
Submitted 10 April, 2024;
originally announced April 2024.
-
Multifractal charactarization as a function of timescale in the light curves with planetary signal observed by the kepler mission
Authors:
F. J. S. Lima Filho,
V. M. B. Ferreira,
P. C. F. da Silva Filho,
F. O. da Silva Gomes,
B. W. de Freitas Alves,
S. G. A. Barbosa,
T. de Melo Santiago,
D. B. de Freitas
Abstract:
Astrophysical data, in the domains of time, involve a wide range of stellar variability phenomena, among them the magnetic activity of the order of a few hours until the signature of an extra-solar planet which can cover a scale of time of a few days until tens of years. Numerous instruments are being developed to detect Earth-sized exoplanets. Exoplanets with this dimension challenge scientific i…
▽ More
Astrophysical data, in the domains of time, involve a wide range of stellar variability phenomena, among them the magnetic activity of the order of a few hours until the signature of an extra-solar planet which can cover a scale of time of a few days until tens of years. Numerous instruments are being developed to detect Earth-sized exoplanets. Exoplanets with this dimension challenge scientific instrumentation and the field of research in the data processing. In this context, our study offers a powerful framework to explain dynamical properties as a function of timescale in light curves with the planetary signal. For that, we selected the stellar target Kepler-30 to test our methods and procedures. In this sense, we investigate the multifractal behavior of the Kepler-30 system composed of a sun-like star with a rotation period of ~16 days and three planets with masses between 2 Earth and 2.5 Jupiter masses. Furthermore, this system has an orbital period varying from 29 to 143 days and orbits almost coplanar. This system is highly interesting because starspots dynamics are strongly affected by the passing of a planet in front of the star. We used about 1600 days of high-precision photometry collected by the Kepler mission to investigate the quasi-periodic variation caused by the rotation of the star and the effect of spot evolution as a function of timescale. We applied indexes extract from multifractal analysis to model the flux rotational modulation induced by active regions. Our results that stellar flux variations in Kepler-30 star caused by rotational modulation can be replicated in detail with just four recent-known multifractal indexes. These indexes will greatly simplify spot modelling of current TESS and future PLATO data.
△ Less
Submitted 9 September, 2022;
originally announced September 2022.
-
A wireless secure key distribution system with no couriers: a One-Time-Pad Revival
Authors:
Geraldo A Barbosa
Abstract:
Among the problems to guarantee secrecy for in-transit information, the difficulties involved in renewing cryptographic keys in a secure way using couriers, the perfect secrecy encryption method known as One-Time-Pad (OTP) became almost obsolete. Pure quantum key distribution (QKD) ideally offers security for key distribution and could revive OTP. However, special networks that may need optical fi…
▽ More
Among the problems to guarantee secrecy for in-transit information, the difficulties involved in renewing cryptographic keys in a secure way using couriers, the perfect secrecy encryption method known as One-Time-Pad (OTP) became almost obsolete. Pure quantum key distribution (QKD) ideally offers security for key distribution and could revive OTP. However, special networks that may need optical fibers, satellite, relay stations, expensive detection equipment compared with telecom technology and the slow protocol offer powerful obstacles for widespread use of QKD. Classical encryption methods flood the secure communication landscape. Many of them rely its security on historical difficulties such as factoring of large numbers -- their alleged security sometimes are presented as the difficulty to brake encryption by brute force. The possibility for a mathematical breakthrough that could make factoring trivial are poorly discussed. This work proposes a solution to bring perfect secrecy to in-transit communication and without the above problems. It shows the key distribution scheme (nicknamed KeyBITS Platform) based on classical signals carrying information but that carry with them recordings of quantum noise. Legitimate users start with a shared information of the coding bases used that gives them an information advantage that allows easy signal recovery. The recorded noise protects the legitimate users and block the attacker's access. This shared information is refreshed at the end of each batch of keys sent providing the secret shared information for the next round. With encryption keys distilled from securely transmitted signals at each round OTP can be revived and at fast speeds.
△ Less
Submitted 31 May, 2020; v1 submitted 16 January, 2019;
originally announced January 2019.
-
Quantum key distribution by phase flip** of coherent states of light
Authors:
G. A. Barbosa,
J. van de Graaf,
P. Mateus,
N. Paunković
Abstract:
In this paper we present quantum key distribution protocol that, instead of single qubits, uses mesoscopic coherent states of light $|α\rangle$ to encode bit values of a randomly generated key. Given the reference value $α\in\mathbb C$, and a string of phase rotations each randomly taken from a set of $2M$ equidistant phases, Alice prepares a quantum state given by a product of coherent states of…
▽ More
In this paper we present quantum key distribution protocol that, instead of single qubits, uses mesoscopic coherent states of light $|α\rangle$ to encode bit values of a randomly generated key. Given the reference value $α\in\mathbb C$, and a string of phase rotations each randomly taken from a set of $2M$ equidistant phases, Alice prepares a quantum state given by a product of coherent states of light, such that a complex phase of each pulse is rotated by the corresponding phase rotation. The encoding of $i$-th bit of the key $r=r_1 \dots r_\ell$ is done by further performing phase rotation $r_i π$ (with $r_i = 0,1$) on the $i$-th coherent state pulse. In order to protect the protocol against the man-in-the-middle attack, we introduce a verification procedure, and analyse the protocol's security using the Holevo bound. We also analyse the possibility of beam splitting-like and of collective attacks, showing the impossibility of the former and, in the case of our protocol, the inadequacy of the latter. While we cannot prove full perfect security against the most general attacks allowed by the laws of quantum mechanics, our protocol achieves faster quantum key distribution, over larger distances and with lower costs, than the single-photon counterparts, maintaining at least practical security against the current and the near future technologies.
△ Less
Submitted 3 May, 2017; v1 submitted 22 September, 2016;
originally announced September 2016.
-
A wireless physically secure key distribution system
Authors:
Geraldo A. Barbosa
Abstract:
A secure key distribution protocol protected by light's noise was introduced in 2003 [Phys. Rev. A 68, 052307 (2003)]. That protocol utilized the shot noise of light present in the optical channel (eg., an optical fiber) to restrict information leaks to an adversary. An initial shared information between the legitimate users allowed them to extract more information from the channel than the one ob…
▽ More
A secure key distribution protocol protected by light's noise was introduced in 2003 [Phys. Rev. A 68, 052307 (2003)]. That protocol utilized the shot noise of light present in the optical channel (eg., an optical fiber) to restrict information leaks to an adversary. An initial shared information between the legitimate users allowed them to extract more information from the channel than the one obtained by the adversary. That original paper recognized the need for a privacy amplification step but no specific protocol was presented. More recently that original idea was improved with a specific privacy amplification protocol [ar** the use of an optical communication channel. This work merges main ideas of the protection given by the light's noise in a protocol applied to wireless channels. The use of a wireless channels together with recorded physical noise was introduced from 2005 to 2007 (see eg, arXiv:quant-ph/0510011 v2 16 Nov 2005 and arXiv:0705.2243v2 [quant-ph] 17 May 2007). This work improves those embrionary ideas of wireless channels secured by recorded optical noise. The need for specific optical channels is eliminated with the wireless variation and opens up the possibility to apply the technique to mobile devices. This work introduces this new scheme and calculates the associated security level.
△ Less
Submitted 25 July, 2016; v1 submitted 1 January, 2016;
originally announced January 2016.
-
Untappable key distribution system: a one-time-pad booster
Authors:
Geraldo A. Barbosa,
Jeroen van de Graaf
Abstract:
One-time-pad (OTP) encryption simply cannot be cracked, even by a quantum computer. The need of sharing in a secure way supplies of symmetric random keys turned the method almost obsolete as a standing-alone method for fast and large volume telecommunication. Basically, this secure sharing of keys and their renewal, once exhausted, had to be done through couriers, in a slow and costly process. Thi…
▽ More
One-time-pad (OTP) encryption simply cannot be cracked, even by a quantum computer. The need of sharing in a secure way supplies of symmetric random keys turned the method almost obsolete as a standing-alone method for fast and large volume telecommunication. Basically, this secure sharing of keys and their renewal, once exhausted, had to be done through couriers, in a slow and costly process. This paper presents a solution for this problem providing a fast and unlimited renewal of secure keys: An untappable key distribution system is presented and detailed. This fast key distribution system utilizes two layers of confidentially protection: 1) Physical noise intrinsic to the optical channel that turn the coded signals into stealth signals and 2) Privacy amplification using a bit pool of refreshed entropy run after run, to eliminate any residual information.
The resulting level of security is rigorously calculated and demonstrates that the level of information an eavesdropper could obtain is completely negligible. The random bit sequences, fast and securely distributed, can be used to encrypt text, data or voice.
△ Less
Submitted 8 July, 2015; v1 submitted 5 June, 2014;
originally announced June 2014.
-
Can humans see beyond intensity images?
Authors:
Geraldo A. Barbosa
Abstract:
The human's visual system detect intensity images. Quite interesting, detector systems have shown the existence of different kind of images. Among them, images obtained by two detectors (detector array or spatially scanning detector) capturing signals within short window times may reveal a "hidden" image not contained in either isolated detector: Information on this image depend on the two detecto…
▽ More
The human's visual system detect intensity images. Quite interesting, detector systems have shown the existence of different kind of images. Among them, images obtained by two detectors (detector array or spatially scanning detector) capturing signals within short window times may reveal a "hidden" image not contained in either isolated detector: Information on this image depend on the two detectors simultaneously. In general, they are called "high-order" images because they may depend on more than two electric fields. Intensity images depend on the square of magnitude of the light's electric field. Can the human visual sensory system perceive high-order images as well? This paper proposes a way to test this idea. A positive answer could give new insights on the "visual-conscience" machinery, opening a new sensory channel for humans. Applications could be devised, e.g., head position sensing, privacy in communications at visual ranges and many others.
△ Less
Submitted 24 February, 2012;
originally announced February 2012.
-
Transverse coincidence-structures in spontaneous parametric down-conversion with orbital angular momentum: Theory
Authors:
Geraldo A. Barbosa
Abstract:
Coincidence-structures in the transverse plane of Type-II spontaneous parametric down-conversion carrying orbital angular momentum are obtained. Azimuthal symmetry breaking around the pump beam direction reveals itself on these quantum images. Analytical expressions for the amplitude probability of the down conversion process are shown including the nonlinear polarizability components.
Coincidence-structures in the transverse plane of Type-II spontaneous parametric down-conversion carrying orbital angular momentum are obtained. Azimuthal symmetry breaking around the pump beam direction reveals itself on these quantum images. Analytical expressions for the amplitude probability of the down conversion process are shown including the nonlinear polarizability components.
△ Less
Submitted 6 June, 2007;
originally announced June 2007.
-
Secure sharing of random bits over the Internet
Authors:
Geraldo A. Barbosa
Abstract:
Although one-time pad encrypted files can be sent through Internet channels, the need for renewing shared secret keys have made this method unpractical. This work presents a scheme to turn practical the fast sharing of random keys over arbitrary Internet channels. Starting with a shared secret key sequence of length K_0 the users end up with a secure new sequence K >> K_0. Using these sequences…
▽ More
Although one-time pad encrypted files can be sent through Internet channels, the need for renewing shared secret keys have made this method unpractical. This work presents a scheme to turn practical the fast sharing of random keys over arbitrary Internet channels. Starting with a shared secret key sequence of length K_0 the users end up with a secure new sequence K >> K_0. Using these sequences for posteriori message encryption the legitimate users have absolute security control without the need for third parties. Additionally, the security level does not depend on the unproven difficulty of factoring numbers in primes. In the proposed scheme a fast optical random source generates random bits and noise for key renewals. The transmitted signals are recorded signals that carries both the random binary signals to be exchanged and physical noise that cannot be eliminated by the attacker. These signals allow amplification over the Internet network without degrading security. The proposed system is also secure against a-posteriori known-plaintext attack on the key. Information-theoretic analysis is presented and bounds for secure operation are quantitatively determined.
△ Less
Submitted 17 May, 2007; v1 submitted 15 May, 2007;
originally announced May 2007.
-
One-time pad booster for Internet
Authors:
Geraldo A. Barbosa
Abstract:
One-time pad encrypted files can be sent through Internet channels using current Internet protocols. However, the need for renewing shared secret keys make this method unpractical. This work shows how users can use a fast physical random generator based on fluctuations of a light field and the Internet channel to directly boost key renewals. The transmitted signals are deterministic but carries…
▽ More
One-time pad encrypted files can be sent through Internet channels using current Internet protocols. However, the need for renewing shared secret keys make this method unpractical. This work shows how users can use a fast physical random generator based on fluctuations of a light field and the Internet channel to directly boost key renewals. The transmitted signals are deterministic but carries imprinted noise that cannot be eliminated by the attacker. Thus, a one-time pad for Internet can be made practical. Security is achieved without third parties and not relying on the difficulty of factoring numbers in primes. An informational fragility to be avoided is discussed. Information-theoretic analysis is presented and bounds for secure operation are determined.
△ Less
Submitted 11 April, 2007;
originally announced April 2007.
-
Is orbital angular momentum always conserved in spontaneous parametric down-conversion?
Authors:
Sheng Feng,
Chao-Hsiang Chen,
Geraldo A. Barbosa,
Prem Kumar
Abstract:
In the non-linear optical process of type-II spontaneous parametric down-conversion, we present on an experiment showing that the two-photon detection amplitude of the down-converted beams does not generally reproduce the transverse profile of the pump beam that carries non-zero orbital angular momentum. We explain this observation by that orbital angular momentum is not conserved in the type-II…
▽ More
In the non-linear optical process of type-II spontaneous parametric down-conversion, we present on an experiment showing that the two-photon detection amplitude of the down-converted beams does not generally reproduce the transverse profile of the pump beam that carries non-zero orbital angular momentum. We explain this observation by that orbital angular momentum is not conserved in the type-II non-linear process due to the broken rotational symmetry of the Hamiltonian.
△ Less
Submitted 20 April, 2007; v1 submitted 22 March, 2007;
originally announced March 2007.
-
The conservation of orbital angular momentum and the two-photon detection amplitude in spontaneous parametric down-conversion
Authors:
Sheng Feng,
Chao-Hsiang Chen,
Geraldo A. Barbosa,
Prem Kumar
Abstract:
We study the two-photon detection amplitude of the down-converted beams in spontaneous parametric down-conversion when the physical variable of orbital angular momentum is involved, taking into account both conservation and non-conservation of angular momentum. Agreeing with experimental observations, our theoretical calculation shows that spatial structure of the two-photon detection amplitude…
▽ More
We study the two-photon detection amplitude of the down-converted beams in spontaneous parametric down-conversion when the physical variable of orbital angular momentum is involved, taking into account both conservation and non-conservation of angular momentum. Agreeing with experimental observations, our theoretical calculation shows that spatial structure of the two-photon detection amplitude of the down-converted beams carries important information about conservation or non-conservation of orbital angular momentum in spontaneous parametric down-conversion.
△ Less
Submitted 21 March, 2007; v1 submitted 20 March, 2007;
originally announced March 2007.
-
Fundamentals for immediate implementation of a quantum secured Internet
Authors:
Geraldo A. Barbosa
Abstract:
This work shows how a secure Internet for users A and B can be implemented through a fast key distribution system that uses physical noise to encrypt information transmitted in deterministic form. Starting from a shared secret random sequence between them, long sequences of fresh random bits can be shared in a secure way and not involving a third party. The shared decrypted random bits -encrypte…
▽ More
This work shows how a secure Internet for users A and B can be implemented through a fast key distribution system that uses physical noise to encrypt information transmitted in deterministic form. Starting from a shared secret random sequence between them, long sequences of fresh random bits can be shared in a secure way and not involving a third party. The shared decrypted random bits -encrypted by noise at the source- are subsequently utilized for one-time-pad data encryption. The physical generated protection is not susceptible to advances in computation or mathematics. In particular, it does not depend on the difficulty of factoring numbers in primes. Also, there is no use of Linear Feed Back Shift Registers. The attacker has free access to the communication channels and may acquire arbitrary number of copies of the transmitted signal without lowering the security level. No intrusion detection method is needed.
△ Less
Submitted 16 August, 2006; v1 submitted 14 July, 2006;
originally announced July 2006.
-
Noise Secured Internet
Authors:
Geraldo A. Barbosa
Abstract:
This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the…
▽ More
This work shows how a secure Internet can be implemented through a fast key distribution system that uses physical noise to protect the transmitted information. Starting from a shared random sequence $K_0$ between two (or more) users, longsequences $R$ of random bits can be shared. The signals sent over the Internet are deterministic but have a built-in Nature-made uncertainty that protects the shared sequences. After privacy amplification the shared $R$ random bits --encrypted by noise-- are subsequently utilized in one-time-pad data ciphering.
△ Less
Submitted 28 February, 2006; v1 submitted 2 October, 2005;
originally announced October 2005.
-
Large Quantum imaging of nonlocal spatial correlations induced by orbital angular momentum
Authors:
Adam R. Altman,
Kahraman G. Köprülü,
Eric Corndorf,
Prem Kumar,
Geraldo A. Barbosa
Abstract:
Through scanned coincidence counting, we probe the quantum image produced by parametric down conversion with a pump beam carrying orbital angular momentum. Nonlocal spatial correlations are manifested through splitting of the coincidence spot into two.
Through scanned coincidence counting, we probe the quantum image produced by parametric down conversion with a pump beam carrying orbital angular momentum. Nonlocal spatial correlations are manifested through splitting of the coincidence spot into two.
△ Less
Submitted 26 September, 2004;
originally announced September 2004.
-
Fast and secure key distribution using mesoscopic coherent states of light
Authors:
Geraldo A. Barbosa
Abstract:
This work shows how two parties A and B can securely share sequences of random bits at optical speeds. A and B possess true-random physical sources and exchange random bits by using a random sequence received to cipher the following one to be sent. A starting shared secret key is used and the method can be described as an unlimited one-time-pad extender. It is demonstrated that the minimum proba…
▽ More
This work shows how two parties A and B can securely share sequences of random bits at optical speeds. A and B possess true-random physical sources and exchange random bits by using a random sequence received to cipher the following one to be sent. A starting shared secret key is used and the method can be described as an unlimited one-time-pad extender. It is demonstrated that the minimum probability of error in signal determination by the eavesdropper can be set arbitrarily close to the pure guessing level. Being based on the $M$-ry encryption protocol this method also allows for optical amplification without security degradation, offering practical advantages over the BB84 protocol for key distribution.
△ Less
Submitted 27 April, 2004; v1 submitted 5 December, 2002;
originally announced December 2002.
-
Secure communication using mesoscopic coherent states
Authors:
Geraldo A. Barbosa,
Eric Corndorf,
Prem Kumar,
Horace P. Yuen
Abstract:
We demonstrate theoretically and experimentally that secure communication using intermediate-energy (mesoscopic) coherent states is possible. Our scheme is different from previous quantum cryptographic schemes in that a short secret key is explicitly used and in which quantum noise hides both the bit and the key. This encryption scheme can be optically amplified. New avenues are open to secure c…
▽ More
We demonstrate theoretically and experimentally that secure communication using intermediate-energy (mesoscopic) coherent states is possible. Our scheme is different from previous quantum cryptographic schemes in that a short secret key is explicitly used and in which quantum noise hides both the bit and the key. This encryption scheme can be optically amplified. New avenues are open to secure communications at high speeds in fiber-optic or free-space channels.
△ Less
Submitted 21 April, 2003; v1 submitted 3 December, 2002;
originally announced December 2002.
-
Secure communication using coherent states
Authors:
Geraldo A. Barbosa,
Eric Corndorf,
Prem Kumar,
Horace P. Yuen,
G. Mauro D'Ariano,
Matteo G. A. Paris,
Paolo Perinotti
Abstract:
We demonstrate that secure communication using coherent states is possible. The optimal eavesdrop** strategy for an M-ry ciphering scheme shows that the minimum probability of error in a measurement for bit determination can be made arbitrarily close to the pure guessing value P_e=1/2. This ciphering scheme can be optically amplified without degrading the security level. New avenues are open t…
▽ More
We demonstrate that secure communication using coherent states is possible. The optimal eavesdrop** strategy for an M-ry ciphering scheme shows that the minimum probability of error in a measurement for bit determination can be made arbitrarily close to the pure guessing value P_e=1/2. This ciphering scheme can be optically amplified without degrading the security level. New avenues are open to secure communications at high speeds in fiber-optic or free-space channels.
△ Less
Submitted 28 July, 2003; v1 submitted 11 October, 2002;
originally announced October 2002.
-
Fiber-Optic Sources of Quantum Entanglement
Authors:
P. Kumar,
X. Li,
M. Fiorentino,
P. L. Voss,
J. E. Shar**,
G. A. Barbosa
Abstract:
We present a fiber-based source of polarization-entangled photon pairs that is well suited for quantum communication applications in the 1.5$μ$m band of standard telecommunication fiber. Quantum-correlated signal and idler photon pairs are produced when a nonlinear-fiber Sagnac interferometer is pumped in the anomalous-dispersion region of the fiber. Recently, we have demonstrated nonclassical p…
▽ More
We present a fiber-based source of polarization-entangled photon pairs that is well suited for quantum communication applications in the 1.5$μ$m band of standard telecommunication fiber. Quantum-correlated signal and idler photon pairs are produced when a nonlinear-fiber Sagnac interferometer is pumped in the anomalous-dispersion region of the fiber. Recently, we have demonstrated nonclassical properties of such photon pairs by using Geiger-mode InGaAs/InP avalanche photodiodes. Polarization entanglement in the photon pairs can be created by pum** the Sagnac interferometer with two orthogonally polarized pulses. In this case the parametrically scattered signal-idler photons yield biphoton interference with $>$90% visibility in coincidence detection, while no interference is observed in direct detection of either the signal or the idler photons.
△ Less
Submitted 20 September, 2002;
originally announced September 2002.