• Publications
  • Influence
Unitary representations of the Virasoro and super-Virasoro algebras
It is shown that a method previously given for constructing representations of the Virasoro algebra out of representations of affine Kac-Moody algebras yields the full discrete series of highestExpand
  • 775
  • 22
Virasoro algebras and coset space models
Abstract A previous construction of unitary representations of the Virasoro algebra is extended and interpreted physically in terms of a coset space quark model. The quaternionic projective spacesExpand
  • 648
  • 20
Many worlds? : Everett, quantum theory, and reality
Many Worlds: an Introduction 1. WHY MANY WORLDS? 1. Decoherence and Ontology 2. Quasiclassical Realms 3. Macroscopic Superpositions, Decoherent Histories, and the Emergence of HydrodynamicalExpand
  • 229
  • 14
No signaling and quantum key distribution.
We propose a quantum key distribution protocol that is provably secure against general attacks by a postquantum eavesdropper limited only by the impossibility of superluminal signaling. Expand
  • 590
  • 12
  • PDF
Private randomness expansion with untrusted devices
We introduce a protocol for private randomness expansion with untrusted devices which is designed to take as input an initially private string and produce as output a longer private random string. Expand
  • 225
  • 8
  • PDF
On the consistent histories approach to quantum mechanics
We review the consistent histories formulations of quantum mechanics developed by Griffiths, Omnès, and Gell-Mann and Hartle, and describe the classification of consistent sets. We illustrate someExpand
  • 204
  • 7
  • PDF
Determinant Formulae and Unitarity for the N=2 Superconformal Algebras in Two-Dimensions or Exact Results on String Compactification
Determinant formulae are presented for the periodic, antiperiodic and twisted N = 2 superconformal algebras in two dimensions, and a classification is derived of the unitary highest weightExpand
  • 342
  • 7
  • PDF
Memory attacks on device-independent quantum cryptography.
We identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Expand
  • 94
  • 6
  • PDF
Cheat sensitive quantum bit commitment.
  • L. Hardy, A. Kent
  • Computer Science, Medicine
  • Physical review letters
  • 9 November 1999
We define cheat sensitive cryptographic protocols between mistrustful parties as protocols which guarantee that, if either cheats, the other has some nonzero probability of detecting the cheating. Expand
  • 71
  • 5
  • PDF
One world versus many: the inadequacy of Everettian accounts of evolution, probability, and scientific confirmation
  • A. Kent
  • Physics, Mathematics
  • 5 May 2009
There is a compelling intellectual case for exploring whether purely unitary quantum theory defines a sensible and scientifically adequate theory, as Everett originally proposed. Many different andExpand
  • 87
  • 5
  • PDF