2,372 research outputs found

    Unconditional security of coherent-state quantum key distribution with strong phase-reference pulse

    Full text link
    We prove the unconditional security of a quantum key distribution protocol in which bit values are encoded in the phase of a weak coherent-state pulse relative to a strong reference pulse. In contrast to implementations in which a weak pulse is used as a substitute for a single-photon source, the achievable key rate is found to decrease only linearly with the transmission of the channel.Comment: 4 pages, 3 figure

    Unifying autocatalytic and zeroth order branching models for growing actin networks

    Full text link
    The directed polymerization of actin networks is an essential element of many biological processes, including cell migration. Different theoretical models considering the interplay between the underlying processes of polymerization, capping and branching have resulted in conflicting predictions. One of the main reasons for this discrepancy is the assumption of a branching reaction that is either first order (autocatalytic) or zeroth order in the number of existing filaments. Here we introduce a unifying framework from which the two established scenarios emerge as limiting cases for low and high filament number. A smooth transition between the two cases is found at intermediate conditions. We also derive a threshold for the capping rate, above which autocatalytic growth is predicted at sufficiently low filament number. Below the threshold, zeroth order characteristics are predicted to dominate the dynamics of the network for all accessible filament numbers. Together, this allows cells to grow stable actin networks over a large range of different conditions.Comment: revtex, 5 pages, 4 figure

    Unconditional Security of the Bennett 1992 quantum key-distribution over lossy and noisy channel

    Full text link
    We show that the security proof of the Bennett 1992 protocol over loss-free channel in (K. Tamaki, M. Koashi, and N. Imoto, Phys. Rev. Lett. 90, 167904 (2003)) can be adapted to accommodate loss. We assumed that Bob's detectors discriminate between single photon states on one hand and vacuum state or multi-photon states on the other hand.Comment: 5 pages, 2 figures. We have presented this topic at QIPC 2003 as a poster sessio

    Unconditionally Secure Key Distribution Based on Two Nonorthogonal States

    Full text link
    We prove the unconditional security of the Bennett 1992 protocol, by using a reduction to an entanglement distillation protocol initiated by a local filtering process. The bit errors and the phase errors are correlated after the filtering, and we can bound the amount of phase errors from the observed bit errors by an estimation method involving nonorthogonal measurements. The angle between the two states shows a trade-off between accuracy of the estimation and robustness to noises.Comment: 5 pages, 1 figur

    FK 506: Pharmacology and molecular action

    Get PDF

    Robust Unconditionally Secure Quantum Key Distribution with Two Nonorthogonal and Uninformative States

    Full text link
    We introduce a novel form of decoy-state technique to make the single-photon Bennett 1992 protocol robust against losses and noise of a communication channel. Two uninformative states are prepared by the transmitter in order to prevent the unambiguous state discrimination attack and improve the phase-error rate estimation. The presented method does not require strong reference pulses, additional electronics or extra detectors for its implementation.Comment: 7 pages, 2 figure

    Mechanosensing in myosin filament solves a 60 years old conflict in skeletal muscle modeling between high power output and slow rise in tension

    Get PDF
    Almost 60 years ago Andrew Huxley with his seminal paper \cite{Huxley1957} laid the foundation of modern muscle modeling, linking chemical events to mechanical performance. He described mechanics and energetics of muscle contraction through the cyclical attachment and detachment of myosin motors to the actin filament with ad hoc assumptions on the dependence of the rate constants on the strain of the myosin motors. That relatively simple hypothesis is still present in recent models, even though with several modifications to adapt the model to the different experimental constraints which became subsequently available. However, already in that paper, one controversial aspect of the model became clear. Relatively high attachment and detachment rates of myosin to the actin filament were needed to simulate the high power output at intermediate velocity of contraction. However, these rates were incompatible with the relatively slow rise in tension after activation, despite the rise should be generated by the same rate functions. This discrepancy has not been fully solved till today, despite several hypotheses have been forwarded to reconcile the two aspects. Here, using a conventional muscle model, we show that the recently revealed mechanosensing mechanism of recruitment of myosin motors \cite{Linarietal2015} can solve this long standing problem without any further ad-hoc hypotheses

    The limits of filopodium stability

    Full text link
    Filopodia are long, finger-like membrane tubes supported by cytoskeletal filaments. Their shape is determined by the stiffness of the actin filament bundles found inside them and by the interplay between the surface tension and bending rigidity of the membrane. Although one might expect the Euler buckling instability to limit the length of filopodia, we show through simple energetic considerations that this is in general not the case. By further analyzing the statics of filaments inside membrane tubes, and through computer simulations that capture membrane and filament fluctuations, we show under which conditions filopodia of arbitrary lengths are stable. We discuss several in vitro experiments where this kind of stability has already been observed. Furthermore, we predict that the filaments in long, stable filopodia adopt a helical shape
    corecore