673 research outputs found
Apply current exponential de Finetti theorem to realistic quantum key distribution
In the realistic quantum key distribution (QKD), Alice and Bob respectively
get a quantum state from an unknown channel, whose dimension may be unknown.
However, while discussing the security, sometime we need to know exact
dimension, since current exponential de Finetti theorem, crucial to the
information-theoretical security proof, is deeply related with the dimension
and can only be applied to finite dimensional case. Here we address this
problem in detail. We show that if POVM elements corresponding to Alice and
Bob's measured results can be well described in a finite dimensional subspace
with sufficiently small error, then dimensions of Alice and Bob's states can be
almost regarded as finite. Since the security is well defined by the smooth
entropy, which is continuous with the density matrix, the small error of state
actually means small change of security. Then the security of
unknown-dimensional system can be solved. Finally we prove that for heterodyne
detection continuous variable QKD and differential phase shift QKD, the
collective attack is optimal under the infinite key size case.Comment: 11 pages, 2 figures, detailed version, applications adde
Security proof of differential phase shift quantum key distribution in the noiseless case
Differential phase shift quantum key distribution systems have a high
potential for achieving high speed key generation. However, its unconditional
security proof is still missing, even though it has been proposed for many
years. Here, we prove its security against collective attacks with a weak
coherent light source in the noiseless case (i.e. no bit error). The only
assumptions are that quantum theory is correct, the devices are perfect and
trusted and the key size is infinite. Our proof works on threshold detectors.
We compute the lower bound of the secret key generation rate using the
information-theoretical security proof method. Our final result shows that the
lower bound of the secret key generation rate per pulse is linearly
proportional to the channel transmission probability if Bob's detection counts
obey the binomial distribution.Comment: Published version, 13 pages, 4 figures, minor changes, references
added, acknowledgement adde
MiR-497 decreases cisplatin resistance in ovarian cancer cells by targeting mTOR/P70S6K1.
The mechanism of cisplatin resistance in ovarian cancer is not clearly understood. In the present investigation, we found that the expression levels of miR-497 were reduced in chemotherapy-resistant ovarian cancer cells and tumor tissues due to hypermethylation of miR-497 promoter. Low miR-497 expression levels were associated with chemo-resistant phonotype of ovarian cancer. By analyzing the expression levels of miR-497, mTOR and p70S6K1 in a clinical gene-expression array dataset, we found that mTOR and p70S6K1, two proteins correlated to chemotherapy-resistance in multiple types of human cancers, were inversely correlated with miR-497 levels in ovarian cancer tissues. By using an orthotopic ovarian tumor model and a Tet-On inducible miR-497 expression system, our results demonstrated that overexpression of miR-497 sensitizes the resistant ovarian tumor to cisplatin treatment. Therefore, we suggest that miR-497 might be used as a therapeutic supplement to increase ovarian cancer treatment response to cisplatin
Contents lists available at ScienceDirect Forest Ecology and Management
journal homepage: www.elsevier.com/locate/foreco A comparative analysis of forest cover and catchment water yield relationship
- …
