2017
DOI: 10.1103/physrevd.95.055006
|View full text |Cite
|
Sign up to set email alerts
|

Detecting the LμLτ gauge boson at Belle II

Abstract: We discuss the feasibility of detecting the gauge boson of the U (1) L µ −L τ symmetry, which possesses a mass in the range between MeV and GeV, at the Belle-II experiment. The kinetic mixing between the new gauge boson Z and photon is forbidden at the tree level and is radiatively induced. The leptonic force mediated by such a light boson is motivated by the discrepancy in muon anomalous magnetic moment and also the gap in the energy spectrum of cosmic neutrino. Defining the process e + e − → γZ → γνν (missin… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

1
90
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 101 publications
(91 citation statements)
references
References 106 publications
1
90
0
Order By: Relevance
“…For other recent studies on gauged U(1) L μ −L τ models, see Refs. [23][24][25][26][27][28][29][30][31][32][33][34][35].…”
Section: Introductionmentioning
confidence: 99%
“…For other recent studies on gauged U(1) L μ −L τ models, see Refs. [23][24][25][26][27][28][29][30][31][32][33][34][35].…”
Section: Introductionmentioning
confidence: 99%
“…where the current measurement is ∆a µ = a exp µ − a SM µ = (28.7 ± 8.0) × 10 −10 [37], the Z ′ contribution is given as [29]:…”
Section: Numerical Analysis and Discussionmentioning
confidence: 99%
“…Influence on e + e − → γZ ′ Next, we examine the influence of vector-like leptons on the e + e − → γZ ′ process, which arises from the kinetic mixing [29]. The Feynman diagram for the loop-induced kinetic mixing is sketched in Fig.…”
Section: B Z ′ and Rare τ Decaysmentioning
confidence: 99%
See 1 more Smart Citation
“…Both of these marginal operators have been studied autonomously at electron colliders in the hidden photon context [5][6][7][8][9][10][11][12][13][14][15][16][17] and the hidden scalar context [18][19][20][21][22][23]. Some works study both operators in tandem [24][25][26] or adopt an effective operator approach [27].…”
Section: Introductionmentioning
confidence: 99%