831 research outputs found
The spinorial energy functional: solutions of the gradient flow on Berger spheres
We study the negative gradient flow of the spinorial energy functional
(introduced by Ammann, Wei{\ss}, and Witt) on 3-dimensional Berger spheres. For
a certain class of spinors we show that the Berger spheres collapse to a
2-dimensional sphere. Moreover, for special cases, we prove that the
volume-normalized standard 3-sphere together with a Killing spinor is a stable
critical point of the volume-normalized version of the flow. Our results also
include an example of a critical point of the volume-normalized flow on the
3-sphere, which is not a Killing spinor.Comment: Minor typo corrected, added a sentence in the abstrac
On the equivalence of Clauser-Horne and Eberhard inequality based tests
Recently, the results of the first experimental test for entangled photons
closing the detection loophole (also referred to as the fair sampling loophole)
were published (Vienna, 2013). From the theoretical viewpoint the main
distinguishing feature of this long-aspired experiment was that the Eberhard
inequality was used. Almost simultaneously another experiment closing this
loophole was performed (Urbana-Champaign, 2013) and it was based on the
Clauser-Horne inequality (for probabilities). The aim of this note is to
analyze the mathematical and experimental equivalence of tests based on the
Eberhard inequality and various forms on the Clauser-Horne inequality. The
structure of the mathematical equivalence is nontrivial. In particular, it is
necessary to distinguish between algebraic and statistical equivalence.
Although the tests based on these inequalities are algebraically equivalent,
they need not be equivalent statistically, i.e., theoretically the level of
statistical significance can drop under transition from one test to another (at
least for finite samples). Nevertheless, the data collected in the Vienna-test
implies not only a statistically significant violation of the Eberhard
inequality, but also of the Clauser-Horne inequality (in the ratio-rate form):
for both a violation Comment: a few misprints were correcte
After-gate attack on a quantum cryptosystem
We present a method to control the detection events in quantum key
distribution systems that use gated single-photon detectors. We employ bright
pulses as faked states, timed to arrive at the avalanche photodiodes outside
the activation time. The attack can remain unnoticed, since the faked states do
not increase the error rate per se. This allows for an intercept-resend attack,
where an eavesdropper transfers her detection events to the legitimate receiver
without causing any errors. As a side effect, afterpulses, originating from
accumulated charge carriers in the detectors, increase the error rate. We have
experimentally tested detectors of the system id3110 (Clavis2) from ID
Quantique. We identify the parameter regime in which the attack is feasible
despite the side effect. Furthermore, we outline how simple modifications in
the implementation can make the device immune to this attack.Comment: 14 pages, 8 figure
Bell violation with entangled photons, free of the fair-sampling assumption
The violation of a Bell inequality is an experimental observation that forces
one to abandon a local realistic worldview, namely, one in which physical
properties are (probabilistically) defined prior to and independent of
measurement and no physical influence can propagate faster than the speed of
light. All such experimental violations require additional assumptions
depending on their specific construction making them vulnerable to so-called
"loopholes." Here, we use photons and high-efficiency superconducting detectors
to violate a Bell inequality closing the fair-sampling loophole, i.e. without
assuming that the sample of measured photons accurately represents the entire
ensemble. Additionally, we demonstrate that our setup can realize one-sided
device-independent quantum key distribution on both sides. This represents a
significant advance relevant to both fundamental tests and promising quantum
applications
Peripheral, but not central, CB1 antagonism provides food intake-independent metabolic benefits in diet-induced obese rats.
OBJECTIVE
Blockade of the CB1 receptor is one of the promising strategies for the treatment of obesity. Although antagonists suppress food intake and reduce body weight, the role of central versus peripheral CB1 activation on weight loss and related metabolic parameters remains to be elucidated. We therefore specifically assessed and compared the respective potential relevance of central nervous system (CNS) versus peripheral CB1 receptors in the regulation of energy homeostasis and lipid and glucose metabolism in diet-induced obese (DIO) rats.
RESEARCH DESIGN AND METHODS
Both lean and DIO rats were used for our experiments. The expression of key enzymes involved in lipid metabolism was measured by real-time PCR, and euglycemic-hyperinsulinemic clamps were used for insulin sensitivity and glucose metabolism studies.
RESULTS
Specific CNS-CB1 blockade decreased body weight and food intake but, independent of those effects, had no beneficial influence on peripheral lipid and glucose metabolism. Peripheral treatment with CB1 antagonist (Rimonabant) also reduced food intake and body weight but, in addition, independently triggered lipid mobilization pathways in white adipose tissue and cellular glucose uptake. Insulin sensitivity and skeletal muscle glucose uptake were enhanced, while hepatic glucose production was decreased during peripheral infusion of the CB1 antagonist. However, these effects depended on the antagonist-elicited reduction of food intake.
CONCLUSIONS
Several relevant metabolic processes appear to independently benefit from peripheral blockade of CB1, while CNS-CB1 blockade alone predominantly affects food intake and body weight
Hacking commercial quantum cryptography systems by tailored bright illumination
The peculiar properties of quantum mechanics allow two remote parties to
communicate a private, secret key, which is protected from eavesdropping by the
laws of physics. So-called quantum key distribution (QKD) implementations
always rely on detectors to measure the relevant quantum property of single
photons. Here we demonstrate experimentally that the detectors in two
commercially available QKD systems can be fully remote-controlled using
specially tailored bright illumination. This makes it possible to tracelessly
acquire the full secret key; we propose an eavesdropping apparatus built of
off-the-shelf components. The loophole is likely to be present in most QKD
systems using avalanche photodiodes to detect single photons. We believe that
our findings are crucial for strengthening the security of practical QKD, by
identifying and patching technological deficiencies.Comment: Revised version, rewritten for clarity. 5 pages, 5 figures. To
download the Supplementary information (which is in open access), go to the
journal web site at http://dx.doi.org/10.1038/nphoton.2010.21
Thermal blinding of gated detectors in quantum cryptography
It has previously been shown that the gated detectors of two commercially
available quantum key distribution (QKD) systems are blindable and controllable
by an eavesdropper using continuous-wave illumination and short bright trigger
pulses, manipulating voltages in the circuit [L. Lydersen et al., Nat.
Photonics DOI:10.1038/nphoton.2010.214]. This allows for an attack
eavesdropping the full raw and secret key without increasing the quantum bit
error rate (QBER). Here we show how thermal effects in detectors under bright
illumination can lead to the same outcome. We demonstrate that the detectors in
a commercial QKD system Clavis2 can be blinded by heating the avalanche photo
diodes (APDs) using bright illumination, so-called thermal blinding. Further,
the detectors can be triggered using short bright pulses once they are blind.
For systems with pauses between packet transmission such as the plug-and-play
systems, thermal inertia enables Eve to apply the bright blinding illumination
before eavesdropping, making her more difficult to catch.Comment: 10 pages, 12 figure
Quantum teleportation using active feed-forward between two Canary Islands
Quantum teleportation [1] is a quintessential prerequisite of many quantum
information processing protocols [2-4]. By using quantum teleportation, one can
circumvent the no-cloning theorem [5] and faithfully transfer unknown quantum
states to a party whose location is even unknown over arbitrary distances. Ever
since the first experimental demonstrations of quantum teleportation of
independent qubits [6] and of squeezed states [7], researchers have
progressively extended the communication distance in teleportation, usually
without active feed-forward of the classical Bell-state measurement result
which is an essential ingredient in future applications such as communication
between quantum computers. Here we report the first long-distance quantum
teleportation experiment with active feed-forward in real time. The experiment
employed two optical links, quantum and classical, over 143 km free space
between the two Canary Islands of La Palma and Tenerife. To achieve this, the
experiment had to employ novel techniques such as a frequency-uncorrelated
polarization-entangled photon pair source, ultra-low-noise single-photon
detectors, and entanglement-assisted clock synchronization. The average
teleported state fidelity was well beyond the classical limit of 2/3.
Furthermore, we confirmed the quality of the quantum teleportation procedure
(without feed-forward) by complete quantum process tomography. Our experiment
confirms the maturity and applicability of the involved technologies in
real-world scenarios, and is a milestone towards future satellite-based quantum
teleportation
- …
