Numerical calculations near spatial infinity

Anil Zenginoglu
DOI: https://doi.org/10.1088/1742-6596/66/1/012027
2006-11-28
Abstract:After describing in short some problems and methods regarding the smoothness of null infinity for isolated systems, I present numerical calculations in which both spatial and null infinity can be studied. The reduced conformal field equations based on the conformal Gauss gauge allow us in spherical symmetry to calculate numerically the entire Schwarzschild-Kruskal spacetime in a smooth way including spacelike, null and timelike infinity and the domain close to the singularity.
General Relativity and Quantum Cosmology
What problem does this paper attempt to address?
This paper attempts to solve the efficiency and security problems in quantum key distribution (QKD). Specifically, in traditional QKD schemes, basis reconciliation is required, which leads to non - determinism and further reduces the efficiency of key generation. In addition, although the existing deterministic QKD schemes based on the photon "ping - pong" technique have improved efficiency, these schemes usually require complex control modes, increasing the communication complexity and the difficulty of experimental implementation. To this end, the author proposes a continuous - variable "ping - pong" scheme using Gaussian - modulated squeezed states. The main features of this scheme are as follows: 1. **Deterministic key generation**: This scheme does not require basis reconciliation during the key exchange process, thus achieving deterministic key generation, and the efficiency is twice as high as that of the standard continuous - variable QKD scheme. 2. **Simplified experimental implementation**: Different from the previous discrete - variable "ping - pong" schemes, this scheme does not require a separate control mode, thereby simplifying the experimental implementation. 3. **High channel capacity**: The channel capacity of this scheme is higher than that of the existing discrete - variable "ping - pong" schemes. 4. **Security analysis**: The security of the scheme was analyzed by Shannon information theory, especially for the beam - splitter attack strategy. The analysis shows that in a lossy channel, when the transmission efficiency is greater than 0.728, this scheme can ensure security. In summary, this paper aims to solve the problems of low efficiency and complex experimental implementation in existing QKD schemes by proposing a new continuous - variable "ping - pong" scheme and ensure its security in practical applications.