• Publications
  • Influence
Unitary representations of the Virasoro and super-Virasoro algebras
It is shown that a method previously given for constructing representations of the Virasoro algebra out of representations of affine Kac-Moody algebras yields the full discrete series of highestExpand
  • 775
  • 22
Virasoro algebras and coset space models
Abstract A previous construction of unitary representations of the Virasoro algebra is extended and interpreted physically in terms of a coset space quark model. The quaternionic projective spacesExpand
  • 648
  • 20
Many worlds? : Everett, quantum theory, and reality
Many Worlds: an Introduction 1. WHY MANY WORLDS? 1. Decoherence and Ontology 2. Quasiclassical Realms 3. Macroscopic Superpositions, Decoherent Histories, and the Emergence of HydrodynamicalExpand
  • 229
  • 14
No signaling and quantum key distribution.
TLDR
We propose a quantum key distribution protocol that is provably secure against general attacks by a postquantum eavesdropper limited only by the impossibility of superluminal signaling. Expand
  • 590
  • 12
  • PDF
Private randomness expansion with untrusted devices
TLDR
We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private string and produce as output a longer private random string. Expand
  • 225
  • 8
  • PDF
On the consistent histories approach to quantum mechanics
We review the consistent histories formulations of quantum mechanics developed by Griffiths, Omnès, and Gell-Mann and Hartle, and describe the classification of consistent sets. We illustrate someExpand
  • 204
  • 7
  • PDF
Determinant Formulae and Unitarity for the N=2 Superconformal Algebras in Two-Dimensions or Exact Results on String Compactification
Determinant formulae are presented for the periodic, antiperiodic and twisted N = 2 superconformal algebras in two dimensions, and a classification is derived of the unitary highest weightExpand
  • 342
  • 7
  • PDF
Memory attacks on device-independent quantum cryptography.
TLDR
We identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Expand
  • 94
  • 6
  • PDF
Cheat sensitive quantum bit commitment.
  • L. Hardy, A. Kent
  • Computer Science, Medicine
  • Physical review letters
  • 9 November 1999
TLDR
We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating. Expand
  • 71
  • 5
  • PDF
One world versus many: the inadequacy of Everettian accounts of evolution, probability, and scientific confirmation
  • A. Kent
  • Physics, Mathematics
  • 5 May 2009
There is a compelling intellectual case for exploring whether purely unitary quantum theory defines a sensible and scientifically adequate theory, as Everett originally proposed. Many different andExpand
  • 87
  • 5
  • PDF