Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry

Total Page:16

File Type:pdf, Size:1020Kb

Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry The MIT Faculty has made this article openly available. Please share how this access benefits you. Your story matters. Citation Zhang, Zheshen, Jacob Mower, Dirk Englund, Franco N. C. Wong, and Jeffrey H. Shapiro. “Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry.” Physical Review Letters 112, no. 12 (March 2014). © 2014 American Physical Society As Published http://dx.doi.org/10.1103/PhysRevLett.112.120506 Publisher American Physical Society Version Final published version Citable link http://hdl.handle.net/1721.1/89019 Terms of Use Article is made available in accordance with the publisher's policy and may be subject to US copyright law. Please refer to the publisher's site for terms of use. week ending PRL 112, 120506 (2014) PHYSICAL REVIEW LETTERS 28 MARCH 2014 Unconditional Security of Time-Energy Entanglement Quantum Key Distribution Using Dual-Basis Interferometry Zheshen Zhang,* Jacob Mower, Dirk Englund, Franco N. C. Wong, and Jeffrey H. Shapiro Research Laboratory of Electronics, Massachusetts Institute of Technology, 77 Massachusetts Avenue, Cambridge, Massachusetts 02139, USA (Received 4 November 2013; published 26 March 2014) High-dimensional quantum key distribution (HDQKD) offers the possibility of high secure-key rate with high photon-information efficiency. We consider HDQKD based on the time-energy entanglement produced by spontaneous parametric down-conversion and show that it is secure against collective attacks. Its security rests upon visibility data—obtained from Franson and conjugate-Franson interferometers—that probe photon-pair frequency correlations and arrival-time correlations. From these measurements, an upper bound can be established on the eavesdropper’s Holevo information by translating the Gaussian-state security analysis for continuous-variable quantum key distribution so that it applies to our protocol. We show that visibility data from just the Franson interferometer provides a weaker, but nonetheless useful, secure-key rate lower bound. To handle multiple-pair emissions, we incorporate the decoy-state approach into our protocol. Our results show that over a 200-km transmission distance in optical fiber, time-energy entanglement HDQKD could permit a 700-bit=sec secure-key rate and a photon information efficiency of 2 secure-key bits per photon coincidence in the key-generation phase using receivers with a 15% system efficiency. DOI: 10.1103/PhysRevLett.112.120506 PACS numbers: 03.67.Dd, 03.67.Hk, 42.50.Dv Quantum key distribution (QKD) [1] promises uncondi- [16,17] uses the quadrature-component covariance matrix tionally secure communication by enabling one-time to derive a lower bound on the SKR in the presence of a pad transmission between remote parties, Alice and Bob. collective attack. We take an analogous approach—using Continuous-variable QKD (CVQKD) [2,3] and discrete- the time-frequency covariance matrix (TFCM)—for our variable QKD (DVQKD) [4,5] utilize infinite-dimensional time-energy entanglement HDQKD protocol. and finite-dimensional Hilbert spaces, respectively. The TFCM for our protocol can be obtained using the CVQKD exploits the wave nature of light to encode dispersive-optics scheme from [18], although dense wave- multiple bits into each transmission, but it has been limited length-division multiplexing (DWDM) may be required to to 80 km in optical fiber [3,6,7] because the eavesdropper do so [19]. An experimentally simpler technique—utilizing (Eve) can obtain partial information from a beam-splitting a Franson interferometer—has been conjectured [13,14] to attack. The predominant DVQKD protocol is Bennett- be sufficient for security verification. Its robustness against Brassard 1984 (BB84), which uses a two-dimensional some specific attacks has been discussed [14,20],but Hilbert space. The decoy-state BB84 protocol [8,9] has security against collective attacks has not been proven demonstrated nonzero secure-key rates (SKRs) over and [20] suggests that such a proof may be impossible. 144 km in free space [10] and 107 km in optical fiber This Letter proves that time-energy entanglement [11], but its photon information efficiency (PIE) cannot HDQKD can be made secure against Eve’s collective exceed 1 key bit per sifted photon. attack when a Franson interferometer is used for security High-dimensional QKD (HDQKD) using single photons verification in conjunction with a dispersion-based [12] can utilize the best features of the continuous and frequency-difference measurement. Our proof relates the discrete worlds, with the Hilbert space of single-photon Franson interferometer’s fringe visibility to the TFCM’s arrival times providing an appealing candidate for frequency elements that, together with the frequency- its implementation. The time-energy entanglement of difference measurement, establishes an upper bound on photon pairs produced by spontaneous parametric down- Eve’s Holevo information. We introduce another nonlocal conversion (SPDC) has been employed in HDQKD experi- interferometer—the conjugate-Franson interferometer— ments [13,14], although these works lacked rigorous and link its fringe visibility to the TFCM’s arrival-time security proofs. Security proofs for time-energy entangled elements [21]. Employing both interferometers increases HDQKD have been attempted by discretizing the continu- the SKR. ous Hilbert space to permit use of DVQKD security Our fringe visibility results presume that the entangle- analyses [12,15], but the validity of the discretization ment source emits at most one photon pair in a measurement approach has not been proven. CVQKD security analysis frame, which need not be the case for SPDC. Thus, we 0031-9007=14=112(12)=120506(5) 120506-1 © 2014 American Physical Society week ending PRL 112, 120506 (2014) PHYSICAL REVIEW LETTERS 28 MARCH 2014 incorporate decoy-state operation [8,9] to handle multiple- they obey the canonical commutation relations, † pair emissions. We show that time-energy entanglement ½Eˆ ðtÞ; Eˆ ðuÞ ¼ δ δðt − uÞ, for J;K ¼ S; I. Their fre- J K JK ˆ ˆ HDQKD could permit a 700 bit=sec SKR over a 200-km quency-domain counterparts, ASðωÞ and AIðωÞ, annihilate transmission distance in optical fiber. We also show that a signal and idler photons at detunings ω and −ω, respec- PIE of 2 secure-key bits per photon coincidence can be tively. Our interest, however, is in the arrival-time and achieved in the key-generation phase using receivers with angular-frequency operators, a 15% system efficiency. Before beginning our security Z analysis, we provide a brief explanation of our protocol. † tˆ ¼ dttEˆ ðtÞEˆ ðtÞ; (3a) Suppose Alice has a repetitively pumped, frequency- J J J degenerate SPDC source that, within a time frame of duration Z ¼ 3 ω of Tf sec, which is centered at time tm mTf, emits a ωˆ ¼ d ω ˆ †ðωÞ ˆ ðωÞ (3b) single photon pair in the state [22] J 2π AJ AJ ; Z Z 2 2 2 2 ¼ −ðtþ−t Þ =4σ −t−=4σ −iω tþ for J S; I when only one photon pair is emitted by the jψ i ∝ dt dt e m coh cor P jt i jt i m SI S I S S I I source. Restricting these time and frequency operators to (1) the single-pair Hilbert space implies that they measure the arrival times and frequency detunings of the signal and for some integer m. In this expression, ωP is the pump idler photons. It also leads to the commutation relation j i j i ½ωˆ ˆ ¼ ϵ δ ϵ ¼ −ϵ ¼ 1 frequency; tS S ( tI I) represents a single photon of the J; tK i J JK [26], where S I , making these signal (idler) at time tS (tI); tþ ≡ ðtS þ tIÞ=2; t− ≡ tS − tI; operators conjugate observables analogous to the quad- σ ¼ ptheffiffiffiffiffiffiffiffiffiffiffiffiffiffi root-mean-square coherence time coh Tf= rature components employed in CVQKD and justifying our 8 lnð2Þ ∼ nsec is set by the pump pulse’s duration; translating CVQKD’s covariance-based security analysis σ ¼ pandffiffiffiffiffiffiffiffiffiffiffiffiffiffi the root-mean square correlation time cor [16,17] to our protocol. 2 ð2Þ 2π ∼ ln = BPM psec is set by the reciprocal of the To exploit the connection to CVQKD, we define an Oˆ ¼½ˆ ˆ T full-width at half-maximum (FWHM) phase-matching observable vector tS ωˆ S tI ωˆ I . For a single- ˆ ˆ bandwidth, BPM, in Hz. Now suppose that, despite propa- pair state, the mean value of O is m ¼hOi, and the TFCM † gation losses and detector inefficiencies, Alice and Bob is Γ ¼hðΔOˆ ΔOˆ þ H:c:Þi=2, where ΔOˆ ≡ Oˆ − m and detect the signal and idler, respectively, from the preceding H.c. denotes Hermitian conjugate. The characteristic func- ˆ photon pair and record the associated arrival times [23,24]. tion associated with the single-pair state is χðζÞ¼heiζT Oi. After many such frames, they use public communication to Given the covariance matrix Γ, the Gaussian state with reconcile their arrival-time data, resulting in their sharing χðζÞ¼eiζT m−ζT Γζ=2 yields an m-independent upper bound nR random bits per postselected frame, i.e., frames used on Eve’s Holevo information [16,17,27] when the SPDC for key generation in which Alice and Bob both made source emits a single-pair state. ’ detections. How many of those bits are secure against Eve s A direct, complete measurement of the TFCM is quite collective attack? Before turning to the security analysis, challenging, so we resort to indirect measurements— we pause for a brief note about Eq. (1). This expression using a Franson interferometer and a conjugate-Franson is an oft-used approximation for the postselected biphoton interferometer—that provide useful partial information. state produced by an SPDC source (see, e.g., [14]). A Franson interferometer [28], shown in the top panel of Moreover, entanglement engineering can be employed to Fig.
Recommended publications
  • Structures in the Mind: Chap18
    © 2015 Massachusetts Institute of Technology All rights reserved. No part of this book may be reproduced in any form by any electronic or mechanical means (including photocopying, recording, or informa- tion storage and retrieval) without permission in writing from the publisher. MIT Press books may be purchased at special quantity discounts for business or sales promotional use. For information, please email [email protected]. edu. This book was set in Times by Toppan Best-set Premedia Limited. Printed and bound in the United States of America. Library of Congress Cataloging-in-Publication Data Structures in the mind : essays on language, music, and cognition in honor of Ray Jackendoff / edited by Ida Toivonen, Piroska Csúri, and Emile van der Zee. pages cm Includes bibliographical references and index. ISBN 978-0-262-02942-1 (hardcover : alk. paper) 1. Psycholinguistics. 2. Cognitive science. 3. Neurolinguistics. 4. Cognition. I. Jackendoff, Ray, 1945- honoree. II. Toivonen, Ida. III. Csúri, Piroska. IV. Zee, Emile van der. P37.S846 2015 401 ′ .9–dc23 2015009287 10 9 8 7 6 5 4 3 2 1 18 The Friar’s Fringe of Consciousness Daniel Dennett Ray Jackendoff’s Consciousness and the Computational Mind (1987) was decades ahead of its time, even for his friends. Nick Humphrey, Marcel Kinsbourne, and I formed with Ray a group of four disparate thinkers about consciousness back around 1986, and, usually meeting at Ray’s house, we did our best to understand each other and help each other clarify the various difficult ideas we were trying to pin down. Ray’s book was one of our first topics, and while it definitely advanced our thinking on various lines, I now have to admit that we didn’t see the importance of much that was expressed therein.
    [Show full text]
  • The VLTI's Astronomical Multi-Beam Combiner
    Telescopes and Instrumentation DOI: 10.18727/0722-6691/5106 The Life and Times of AMBER: The VLTI’s Astronomical Multi-BEam combineR Willem-Jan de Wit1 instruments are scientifically inaugurated called the closure phase. The absolute Markus Wittkowski1 via their “first fringes”, which is the inter- phase of incoming light waves is scram- Frederik Rantakyrö 2 ferometric equivalent of “first light”. By bled by atmospheric turbulence, resulting Markus Schöller 1 the early 2000s, the integration of ESO’s in distortion over a pupil and global Antoine Mérand 1 interferometer into the VLT architecture phase shifts between the apertures in the Romain G. Petrov 3 was on track. array (called the piston). The degree and Gerd Weigelt 4 frequency of the scrambling increases Fabien Malbet 5 The first Paranal interference fringes were towards shorter wavelengths. As a result, Fabrizio Massi 6 produced by the VLT INterferometer the coherence time of the incoming Stefan Kraus7 Commissioning Instrument (VINCI) and wave ranges from a few milliseconds to Keiichi Ohnaka 8 MID-infrared Interferometric instrument (at best) some tens of milliseconds in the Florentin Millour 3 (MIDI), instruments that combined the optical regime. There is no way to beat Stéphane Lagarde 3 light from two telescopes. VINCI’s pur- the turbulence and recover the phase Xavier Haubois1 pose was to commission the interferome- without additional aids. When combining Pierre Bourget 1 ter’s infrastructure. MIDI, on the other three telescopes arranged in a closed Isabelle Percheron1 hand, was the first scientific instrument in triangle one can retrieve a new observa- Jean-Philippe Berger 5 operation using the VLTI in conjunction ble by adding the phases.
    [Show full text]
  • The Dream Narrative As a Mode of Female Discourse in Epic Poetry
    Transactions of the American Philological Association 140 (2010) 195–238 Incohat Ismene: The Dream Narrative as a Mode of Female Discourse in Epic Poetry* emma scioli University of Kansas summary: This article examines Ismene’s nightmare in book 8 of Statius’s Thebaid by contextualizing it within the epic’s narrative, comparing it with the dream narrations of other female characters in epic poetry, and aligning it with other typically female modes of subjective expression in epic, such as weaving, teichoscopy, and lamentation. My analysis shows that by exposing the diffi- culties inherent in retelling a dream, Statius demonstrates sympathy with the female perspective on the horrific war that constitutes the central action of his poem and foreshadows the subsequent inadequacy of words in reaction to such horror. i. introduction: ismene begins ismene, daughter of oedipus, is a character who has virtually no presence in the narrative of Statius’s Thebaid either before or after the small section devoted to the retelling of her dream and its aftermath (8.607–54); for this reason, the intricacy and allusiveness of this passage are all the more striking. In this scene, Ismene recounts to her sister Antigone a dream she has had, in which her wedding to her fiancé Atys is violently interrupted by a fire. After questioning the dream’s origin, Ismene discounts its meaning as incongruous with her understanding of her own waking reality and resumes * Shorter versions of this paper were delivered at the University of Rome, Tor Vergata, in 2004 and the 2005 APA meeting in Boston. I would like to thank audience members at both venues for useful feedback.
    [Show full text]
  • Fringe Season 1 Transcripts
    PROLOGUE Flight 627 - A Contagious Event (Glatterflug Airlines Flight 627 is enroute from Hamburg, Germany to Boston, Massachusetts) ANNOUNCEMENT: ... ist eingeschaltet. Befestigen sie bitte ihre Sicherheitsgürtel. ANNOUNCEMENT: The Captain has turned on the fasten seat-belts sign. Please make sure your seatbelts are securely fastened. GERMAN WOMAN: Ich möchte sehen wie der Film weitergeht. (I would like to see the film continue) MAN FROM DENVER: I don't speak German. I'm from Denver. GERMAN WOMAN: Dies ist mein erster Flug. (this is my first flight) MAN FROM DENVER: I'm from Denver. ANNOUNCEMENT: Wir durchfliegen jetzt starke Turbulenzen. Nehmen sie bitte ihre Plätze ein. (we are flying through strong turbulence. please return to your seats) INDIAN MAN: Hey, friend. It's just an electrical storm. MORGAN STEIG: I understand. INDIAN MAN: Here. Gum? MORGAN STEIG: No, thank you. FLIGHT ATTENDANT: Mein Herr, sie müssen sich hinsetzen! (sir, you must sit down) Beruhigen sie sich! (calm down!) Beruhigen sie sich! (calm down!) Entschuldigen sie bitte! Gehen sie zu ihrem Sitz zurück! [please, go back to your seat!] FLIGHT ATTENDANT: (on phone) Kapitän! Wir haben eine Notsituation! (Captain, we have a difficult situation!) PILOT: ... gibt eine Not-... (... if necessary...) Sprechen sie mit mir! (talk to me) Was zum Teufel passiert! (what the hell is going on?) Beruhigen ... (...calm down...) Warum antworten sie mir nicht! (why don't you answer me?) Reden sie mit mir! (talk to me) ACT I Turnpike Motel - A Romantic Interlude OLIVIA: Oh my god! JOHN: What? OLIVIA: This bed is loud. JOHN: You think? OLIVIA: We can't keep doing this.
    [Show full text]
  • Dressing in American Telefantasy
    Volume 5, Issue 2 September 2012 Stripping the Body in Contemporary Popular Media: the value of (un)dressing in American Telefantasy MANJREE KHAJANCHI, Independent Researcher ABSTRACT Research perspectives on identity and the relationship between dress and body have been frequently studied in recent years (Eicher and Roach-Higgins, 1992; Roach-Higgins and Eicher, 1992; Entwistle, 2003; Svendsen, 2006). This paper will make use of specific and detailed examples from the television programmes Once Upon a Time (2011- ), Falling Skies (2011- ), Fringe (2008- ) and Game of Thrones (2011- ) to discover the importance of dressing and accessorizing characters to create humanistic identities in Science Fiction and Fantastical universes. These shows are prime case studies of how the literal dressing and undressing of the body, as well as the aesthetic creation of television worlds (using dress as metaphor), influence perceptions of personhood within popular media programming. These four shows will be used to examine three themes in this paper: (1) dress and identity, (2) body and world transformations, and (3) (non-)humanness. The methodological framework of this article draws upon existing academic literature on dress and society, combined with textual analysis of the aforementioned Telefantasy shows, focussing primarily on the three themes previously mentioned. This article reveals the role transformations of the body and/or the world play in American Telefantasy, and also investigates how human and near-human characters and settings are fashioned. This will invariably raise questions about what it means to be human, what constitutes belonging to society, and the connection that dress has to both of these concepts. KEYWORDS Aesthetics, Body, Dress, Falling Skies, Fringe, Game of Thrones, Identity, Once Upon a Time, Telefantasy.
    [Show full text]
  • PLANNING for the FRINGE AREA of BRISTOL, VIRGINIA Paul
    PLANNING FOR THE FRINGE AREA OF BRISTOL, VIRGINIA Paul Sunmers Dulaney B.S. in Architecture University of Virginia, 1935 A thesis submitted in partial fulfillment of the requirements for the degree of Master in City Planning. Massachusetts Institute of Technology. May 1949 Submitted by 'I Approved by VI, Cambridge, Massachusetts May 20, 1949 Professor Frederick J. Adams Department of City and Regional Planning Massachusetts Institute of Technology Cambridge, Massachusetts Dear Professor Adams: In partial fulfillment of the requirements for the degree of Master in City Planning, I submit this thesis entitled "Planning for the Fringe Area of Bristol, Virginia." &espectfully, Paul S. Dulk ey 305581 ACKNOWLEDGEMENT I wish to express my appreciation to the entire faculty of the Department of City Planning for their guidance during my stay at M. I. T. In the course of the field work for this thesis helpful advice and useful information was given the author by the following. persons: Dr. Faye Gibson, Washington County Planning Commission Mr. David Goodman, Town Manager, Abington, Virginia Mr. James Gorsline, Washington County Agent Mr. Aelred J. Gray, Tennessee Valley Authority Mr. C. B. Kearfott, Bristol Virginia Planning Commission Mr. Robert- Morrison, City Manager, Bristol, Virginia Mr. Ronald Scott, Tennessee State Planning Commission Mr. Frank Spaulding, City Engineer, Bristol, Virginia Mr. Donald Stant, Bristol, Virginia P. S. D. TALE 010 CONT11S I INTROJCT ION page 1 II THE PROBLEMS 3 III THE SURVEY -- FIRST STAGE 13 The Region and the
    [Show full text]
  • Staging the Fringe Before Shakespeare: Hans Sachs and the Ancient Novel
    STAGING THE FRINGE BEFORE SHAKESPEARE: HANS SACHS AND THE ANCIENT NOVEL Niklas Holzberg It is well known that the plot of the Historia Apollonii regis Tyri, or more precisely a later version of this, was adapted for the stage by Shakespeare in the form of a comedy: Pericles, Prince of Tyre, writ- ten between 1606 and 1608. A few years previously in another of his comedies, Troilus and Cressida, he had also availed himself of cer- tain motifs derived ultimately from two ancient texts which, like the Historia, are classed as fringe novels: the Troy stories of Ps.-Dares and Ps.-Dictys. But Shakespeare was not the first to dramatise an- cient novels. A good fifty years earlier the Nürnberg cobbler and Meistersinger Hans Sachs (1494-1576) had turned the plots of three ancient prose narratives into his own brand of drama: a tragedy on the fall of Troy dating from 28th April 1554,1 a tragedy on the life of Alexander the Great (27th September 1558),2 and a comedy on Aesop (23rd November 1560).3 Sachs read the three fringe novels used – Ps.-Dictys’ Troy Story, Ps.-Callisthenes’ Alexander Romance, and the anonymous Aesop Romance – in the German translations by, re- spectively, Marcus Tatius Alpinus,4 Johannes Hartlieb,5 and Heinrich Steinhöwel.6 The incarnation of Hans Sachs created by Richard Wagner in his opera Die Meistersinger von Nürnberg is famous the world over, but even amongst students and teachers of German literature the histori- cal Sachs is no more than a name to all except the specialists.
    [Show full text]
  • TV Finales and the Meaning of Endings Casey J. Mccormick
    TV Finales and the Meaning of Endings Casey J. McCormick Department of English McGill University, Montréal A thesis submitted to McGill University in partial fulfillment of the requirements of the degree of Doctor of Philosophy © Casey J. McCormick Table of Contents Abstract ………………………………………………………………………….…………. iii Résumé …………………………………………………………………..………..………… v Acknowledgements ………………………………………………………….……...…. vii Chapter One: Introducing Finales ………………………………………….……... 1 Chapter Two: Anticipating Closure in the Planned Finale ……….……… 36 Chapter Three: Binge-Viewing and Netflix Poetics …………………….….. 72 Chapter Four: Resisting Finality through Active Fandom ……………... 116 Chapter Five: Many Worlds, Many Endings ……………………….………… 152 Epilogue: The Dying Leader and the Harbinger of Death ……...………. 195 Bibliography ……………………………………………………………………………... 199 Primary Media Sources ………………………………………………………………. 211 iii Abstract What do we want to feel when we reach the end of a television series? Whether we spend years of our lives tuning in every week, or a few days bingeing through a storyworld, TV finales act as sites of negotiation between the forces of media production and consumption. By tracing a history of finales from the first Golden Age of American television to our contemporary era of complex TV, my project provides the first book- length study of TV finales as a distinct category of narrative media. This dissertation uses finales to understand how tensions between the emotional and economic imperatives of participatory culture complicate our experiences of television. The opening chapter contextualizes TV finales in relation to existing ideas about narrative closure, examines historically significant finales, and describes the ways that TV endings create meaning in popular culture. Chapter two looks at how narrative anticipation motivates audiences to engage communally in paratextual spaces and share processes of closure.
    [Show full text]
  • Assessing the Timing and Magnitude of Precipitation-Induced Seepage Into Tunnels Bored Through Fractured Rock
    ! ! ! ! ! ! ! ! ! ! ! ASSESSING THE TIMING AND MAGNITUDE OF PRECIPITATION-INDUCED SEEPAGE INTO TUNNELS BORED THROUGH FRACTURED ROCK by Michael George Sweetenham A thesis submitted to the Faculty and the Board of Trustees of the Colorado School of Mines in partial fulfillment of the requirements for the degree of Master of Science (Hydrology). Golden, Colorado Date Signed: Michael G. Sweetenham Signed: Dr. Reed M. Maxwell Thesis Advisor Signed: Dr. Paul M. Santi Thesis Advisor Golden, Colorado Date Signed: Dr. David A. Benson Professor and Head ! Hydrologic Science and Engineering ! ! ! Signed: Dr. John D. Humphrey Professor and Head Geology and Geological Engineering! ii ABSTRACT Seepage into tunnels bored through fractured rock is a common occurrence that can cause significant problems for the construction process, tunnel longevity, and the regional hydrogeology. Predictions of seepage using analytical solutions are often inaccurate due to the inherent assumptions and volumetric averaging of fractures. A conceptual model is first developed for this research by using the factors shown by previous studies to have control on net infiltration and seepage. An integrated hydrologic model, ParFlow is then used to investigate the control exhibited by these factors that include: climatic forcing; vegetation; soil type and depth; bedrock type; fracture spacing; and tunnel depth on the timing and magnitude of seepage into tunnels. A fracture continuum is generated for bedrock using FRACK, which maps discrete fracture networks to a finite difference grid with heterogeneous, anisotropic permeability fields. Simulations are run using hourly meteorological forcing over a two-year period. Surface and subsurface properties are varied individually to investigate the change in seepage response.
    [Show full text]
  • The Dynamic Annihilation of a Rational Competitive Fringe by a Low-Cost Dominant Firm
    ~~ OOQARE ! j " :~ ~ ~ DEPAR1NENT OF AGRlCULTIJRAL AND RESOURCE ECONOi'-IIC~ ~: ./ ~; ,-,,- DIVISION OF AGRlCULTIJRE A.\JD ~TURAL RESOURCES '~', ":..~ .,.•.. ~VERSIrr OF C..\LIFOR\JIA;'~L~ . ::' ~ :.;:;;: ------+-+-------------------------------------- ,';. ::~ :~ i t-.~' :~:" :~~ THE DYNAMIC ANNIHILATION OF A RATIONAL CO~WETITIVE FRINGE i:~ j~ -:::::: BY A LOW-COST DOHlNANT FIRU ;..:" I~ ~~. by :-:; @ ~? Peter Berek and Jeffrey M. Perloff ill;~: GIANNINI FOUNDATION Of' AGRICUL.TURAL ECONOMICS i LIBRARY I JAN 27 1989 I I::~ I \~\ ::; t :~: ~\ ::; ..:. :.: ~~~ .', ~:----_H------------------------------ _ I~ Ca 1i Comia Agricul tural E.xperiment Station .:. Gi~umini FOlmJation of Agricultural Economics December 1987 I ?" ;: ..~ ,', The Dynamic Annihilation of a Rational Competitive Fringe by a Low-Cost Dominant Firm PETER BERCK AND JEFFREY M. PERLOFF University of California t Berkeley ;:' ABSTRACT A low-cost dominant firm will drive all competitive fringe firms out of the market if all firms have rational expectations; however t the dominant firm will not predate (price below marginal cost). Since a dominant firm will not drive out fringe firms if they have myopic expectations t it may be in the dominant firm's best interests to inform the fringe. The effects of ~overn- mental intervention on the optimal path and welfare are presented. ',' :'~ 'lame and address of author to whom communications should be sent: Peter Berek, Department of Agricultural and Resource Economics University of California, Berkeley, California t 94720 The Dynamic Annihilation of a Rational Competitive Fringe by a Low-Cost Dominant Firm* 1. Introduction A low-cost dominant firm with no capacity constraint that can precommit to a price path is in an excellent position to drive constant average cost fringe firms from the market.
    [Show full text]
  • Dagon Overlord
    DAGON OVERLORD “It is the very embodiment of a predator; a soulless, remorseless beast which carries with it the weight of uncounted alien minds all hungry for our flesh.” –Brother Talsharn, Dark Angels 5th Company From the edge of the galactic rim, the first tendrils of Hive Fleet I : Dagon have coiled around the edge of the Jericho Reach, choking The Alien Threat the life from worlds and feeding on the Imperium itself. Among this new hive fleet, ancient and now all too familiar horrors have arisen, creatures spawned and unleashed in dozens of other sectors and across countless other battlefields. Alongside the familiar, however, come new and disturbing Tyranid variations, proving once again that as soon as the Imperium believes it understands the Tyranid, the Tyranid changes and adapts once more. For the Jericho Reach, the force of the Tyranid assault was like a mighty hammer blow, catching the Achilus Crusade off balance and forcing Imperial Commanders to scramble to face this new and encroaching threat before too much ground was lost and too many worlds had fallen. Meeting the swarms head-on, millions died in those first desperate years of Dagon’s arrival, and many planets could not be saved, disappearing forever under a tide of chitin and claws. It was also during this dark time that Hive Fleet Dagon took on its own identity among the dozens of other major hive fleet incursions from the Eastern Fringe. Commanders and soldiers alike came to know the signs and character of the swarm, the nature of its beasts and the unique hunger it seemed to possess for the Jericho Reach, as if it had a taste for that sector specifically and the worlds that lay within it.
    [Show full text]
  • Grey Matters
    Grey Matters The Magazine of Grey College Association February 2012 ABOVE: Linda Johnson drew this image of Grey College in 1979, since then not much has changed other that the regimental growth of the trees, but with the first phase of the Jubilee Development Project due to be completed during 2012 the structural appearance of the Hollingside building will be significantly altered for the first time in 52 years. A Letter from the New Association President Dear Association Members, Welcome to this edition of Grey Matters. It’s all change at Grey at the moment, the election of myself as Association President possibly the most insignificant of them all. We have a new Master, Professor Tom Allen, we have the first phase of the Jubilee Development Project nearing completion and the JCR has now become a registered charity in order to secure a continued level of autonomy from the University centre. You’ll ABOVE: Thomas Cliff, Association President find articles on each of these developments in the following pages. Facebook and Linked-in communities. In the College we have continued to support the For those of you who don’t know me I want to three common rooms with a range of start by introducing myself. My name is activities including: sponsored formals, Thomas Cliff and I graduated from Grey in extended the number of travel bursaries, 2001 with a Chemistry Degree, since then I’ve continued delivery of the careers day for had a successful career as a Management graduating students and we’ve continued to Consultant working in London and the North develop and expand our Business Angels East, where I am now based.
    [Show full text]