831 research outputs found

    The spinorial energy functional: solutions of the gradient flow on Berger spheres

    Full text link
    We study the negative gradient flow of the spinorial energy functional (introduced by Ammann, Wei{\ss}, and Witt) on 3-dimensional Berger spheres. For a certain class of spinors we show that the Berger spheres collapse to a 2-dimensional sphere. Moreover, for special cases, we prove that the volume-normalized standard 3-sphere together with a Killing spinor is a stable critical point of the volume-normalized version of the flow. Our results also include an example of a critical point of the volume-normalized flow on the 3-sphere, which is not a Killing spinor.Comment: Minor typo corrected, added a sentence in the abstrac

    On the equivalence of Clauser-Horne and Eberhard inequality based tests

    Full text link
    Recently, the results of the first experimental test for entangled photons closing the detection loophole (also referred to as the fair sampling loophole) were published (Vienna, 2013). From the theoretical viewpoint the main distinguishing feature of this long-aspired experiment was that the Eberhard inequality was used. Almost simultaneously another experiment closing this loophole was performed (Urbana-Champaign, 2013) and it was based on the Clauser-Horne inequality (for probabilities). The aim of this note is to analyze the mathematical and experimental equivalence of tests based on the Eberhard inequality and various forms on the Clauser-Horne inequality. The structure of the mathematical equivalence is nontrivial. In particular, it is necessary to distinguish between algebraic and statistical equivalence. Although the tests based on these inequalities are algebraically equivalent, they need not be equivalent statistically, i.e., theoretically the level of statistical significance can drop under transition from one test to another (at least for finite samples). Nevertheless, the data collected in the Vienna-test implies not only a statistically significant violation of the Eberhard inequality, but also of the Clauser-Horne inequality (in the ratio-rate form): for both a violation >60σ.>60\sigma.Comment: a few misprints were correcte

    After-gate attack on a quantum cryptosystem

    Full text link
    We present a method to control the detection events in quantum key distribution systems that use gated single-photon detectors. We employ bright pulses as faked states, timed to arrive at the avalanche photodiodes outside the activation time. The attack can remain unnoticed, since the faked states do not increase the error rate per se. This allows for an intercept-resend attack, where an eavesdropper transfers her detection events to the legitimate receiver without causing any errors. As a side effect, afterpulses, originating from accumulated charge carriers in the detectors, increase the error rate. We have experimentally tested detectors of the system id3110 (Clavis2) from ID Quantique. We identify the parameter regime in which the attack is feasible despite the side effect. Furthermore, we outline how simple modifications in the implementation can make the device immune to this attack.Comment: 14 pages, 8 figure

    Bell violation with entangled photons, free of the fair-sampling assumption

    Full text link
    The violation of a Bell inequality is an experimental observation that forces one to abandon a local realistic worldview, namely, one in which physical properties are (probabilistically) defined prior to and independent of measurement and no physical influence can propagate faster than the speed of light. All such experimental violations require additional assumptions depending on their specific construction making them vulnerable to so-called "loopholes." Here, we use photons and high-efficiency superconducting detectors to violate a Bell inequality closing the fair-sampling loophole, i.e. without assuming that the sample of measured photons accurately represents the entire ensemble. Additionally, we demonstrate that our setup can realize one-sided device-independent quantum key distribution on both sides. This represents a significant advance relevant to both fundamental tests and promising quantum applications

    Peripheral, but not central, CB1 antagonism provides food intake-independent metabolic benefits in diet-induced obese rats.

    Get PDF
    OBJECTIVE Blockade of the CB1 receptor is one of the promising strategies for the treatment of obesity. Although antagonists suppress food intake and reduce body weight, the role of central versus peripheral CB1 activation on weight loss and related metabolic parameters remains to be elucidated. We therefore specifically assessed and compared the respective potential relevance of central nervous system (CNS) versus peripheral CB1 receptors in the regulation of energy homeostasis and lipid and glucose metabolism in diet-induced obese (DIO) rats. RESEARCH DESIGN AND METHODS Both lean and DIO rats were used for our experiments. The expression of key enzymes involved in lipid metabolism was measured by real-time PCR, and euglycemic-hyperinsulinemic clamps were used for insulin sensitivity and glucose metabolism studies. RESULTS Specific CNS-CB1 blockade decreased body weight and food intake but, independent of those effects, had no beneficial influence on peripheral lipid and glucose metabolism. Peripheral treatment with CB1 antagonist (Rimonabant) also reduced food intake and body weight but, in addition, independently triggered lipid mobilization pathways in white adipose tissue and cellular glucose uptake. Insulin sensitivity and skeletal muscle glucose uptake were enhanced, while hepatic glucose production was decreased during peripheral infusion of the CB1 antagonist. However, these effects depended on the antagonist-elicited reduction of food intake. CONCLUSIONS Several relevant metabolic processes appear to independently benefit from peripheral blockade of CB1, while CNS-CB1 blockade alone predominantly affects food intake and body weight

    Hacking commercial quantum cryptography systems by tailored bright illumination

    Full text link
    The peculiar properties of quantum mechanics allow two remote parties to communicate a private, secret key, which is protected from eavesdropping by the laws of physics. So-called quantum key distribution (QKD) implementations always rely on detectors to measure the relevant quantum property of single photons. Here we demonstrate experimentally that the detectors in two commercially available QKD systems can be fully remote-controlled using specially tailored bright illumination. This makes it possible to tracelessly acquire the full secret key; we propose an eavesdropping apparatus built of off-the-shelf components. The loophole is likely to be present in most QKD systems using avalanche photodiodes to detect single photons. We believe that our findings are crucial for strengthening the security of practical QKD, by identifying and patching technological deficiencies.Comment: Revised version, rewritten for clarity. 5 pages, 5 figures. To download the Supplementary information (which is in open access), go to the journal web site at http://dx.doi.org/10.1038/nphoton.2010.21

    Thermal blinding of gated detectors in quantum cryptography

    Full text link
    It has previously been shown that the gated detectors of two commercially available quantum key distribution (QKD) systems are blindable and controllable by an eavesdropper using continuous-wave illumination and short bright trigger pulses, manipulating voltages in the circuit [L. Lydersen et al., Nat. Photonics DOI:10.1038/nphoton.2010.214]. This allows for an attack eavesdropping the full raw and secret key without increasing the quantum bit error rate (QBER). Here we show how thermal effects in detectors under bright illumination can lead to the same outcome. We demonstrate that the detectors in a commercial QKD system Clavis2 can be blinded by heating the avalanche photo diodes (APDs) using bright illumination, so-called thermal blinding. Further, the detectors can be triggered using short bright pulses once they are blind. For systems with pauses between packet transmission such as the plug-and-play systems, thermal inertia enables Eve to apply the bright blinding illumination before eavesdropping, making her more difficult to catch.Comment: 10 pages, 12 figure

    Quantum teleportation using active feed-forward between two Canary Islands

    Full text link
    Quantum teleportation [1] is a quintessential prerequisite of many quantum information processing protocols [2-4]. By using quantum teleportation, one can circumvent the no-cloning theorem [5] and faithfully transfer unknown quantum states to a party whose location is even unknown over arbitrary distances. Ever since the first experimental demonstrations of quantum teleportation of independent qubits [6] and of squeezed states [7], researchers have progressively extended the communication distance in teleportation, usually without active feed-forward of the classical Bell-state measurement result which is an essential ingredient in future applications such as communication between quantum computers. Here we report the first long-distance quantum teleportation experiment with active feed-forward in real time. The experiment employed two optical links, quantum and classical, over 143 km free space between the two Canary Islands of La Palma and Tenerife. To achieve this, the experiment had to employ novel techniques such as a frequency-uncorrelated polarization-entangled photon pair source, ultra-low-noise single-photon detectors, and entanglement-assisted clock synchronization. The average teleported state fidelity was well beyond the classical limit of 2/3. Furthermore, we confirmed the quality of the quantum teleportation procedure (without feed-forward) by complete quantum process tomography. Our experiment confirms the maturity and applicability of the involved technologies in real-world scenarios, and is a milestone towards future satellite-based quantum teleportation
    corecore