Author pages are created from data sourced from our academic publisher partnerships and public sources.
Unitary representations of the Virasoro and super-Virasoro algebras
It is shown that a method previously given for constructing representations of the Virasoro algebra out of representations of affine Kac-Moody algebras yields the full discrete series of highest… Expand
Virasoro algebras and coset space models
Abstract A previous construction of unitary representations of the Virasoro algebra is extended and interpreted physically in terms of a coset space quark model. The quaternionic projective spaces… Expand
Many worlds? : Everett, quantum theory, and reality
Many Worlds: an Introduction 1. WHY MANY WORLDS? 1. Decoherence and Ontology 2. Quasiclassical Realms 3. Macroscopic Superpositions, Decoherent Histories, and the Emergence of Hydrodynamical… Expand
No signaling and quantum key distribution.
We propose a quantum key distribution protocol that is provably secure against general attacks by a postquantum eavesdropper limited only by the impossibility of superluminal signaling. Expand
Private randomness expansion with untrusted devices
We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private string and produce as output a longer private random string. Expand
On the consistent histories approach to quantum mechanics
We review the consistent histories formulations of quantum mechanics developed by Griffiths, Omnès, and Gell-Mann and Hartle, and describe the classification of consistent sets. We illustrate some… Expand
Determinant Formulae and Unitarity for the N=2 Superconformal Algebras in Two-Dimensions or Exact Results on String Compactification
Determinant formulae are presented for the periodic, antiperiodic and twisted N = 2 superconformal algebras in two dimensions, and a classification is derived of the unitary highest weight… Expand
Memory attacks on device-independent quantum cryptography.
We identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Expand
Cheat sensitive quantum bit commitment.
We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating. Expand
One world versus many: the inadequacy of Everettian accounts of evolution, probability, and scientific confirmation
- A. Kent
- Physics, Mathematics
- 5 May 2009
There is a compelling intellectual case for exploring whether purely unitary quantum theory defines a sensible and scientifically adequate theory, as Everett originally proposed. Many different and… Expand