1,643 research outputs found

    Robust Quantum Communication Using A Polarization-Entangled Photon Pair

    Get PDF
    Noise and imperfection of realistic devices are major obstacles for implementing quantum cryptography. In particular birefringence in optical fibers leads to decoherence of qubits encoded in polarization of photon. We show how to overcome this problem by doing single qubit quantum communication without a shared spatial reference frame and precise timing. Quantum information will be encoded in pair of photons using ``tag'' operations which corresponds to the time delay of one of the polarization modes. This method is robust against the phase instability of the interferometers despite the use of time-bins. Moreover synchronized clocks are not required in the ideal situation no photon loss case as they are only necessary to label the different encoded qubits.Comment: 4 pages, 2 figure

    Unconditional Security of Three State Quantum Key Distribution Protocols

    Full text link
    Quantum key distribution (QKD) protocols are cryptographic techniques with security based only on the laws of quantum mechanics. Two prominent QKD schemes are the BB84 and B92 protocols that use four and two quantum states, respectively. In 2000, Phoenix et al. proposed a new family of three state protocols that offers advantages over the previous schemes. Until now, an error rate threshold for security of the symmetric trine spherical code QKD protocol has only been shown for the trivial intercept/resend eavesdropping strategy. In this paper, we prove the unconditional security of the trine spherical code QKD protocol, demonstrating its security up to a bit error rate of 9.81%. We also discuss on how this proof applies to a version of the trine spherical code QKD protocol where the error rate is evaluated from the number of inconclusive events.Comment: 4 pages, published versio

    Новий навчальний посібник “Україна в міжнародних організаціях”

    Get PDF
    Рецензія на посібник: Макар Ю. І. Україна в міжнародних організаціях : навч. посібник / Ю. І. Макар, Б. П. Гдичинський, В. Ю. Макар, С. Д. Попик, Н. Ю. Ротар ; за ред. Ю. І. Макара. – Чернівці : Прут, 2009. – 880 с

    Sexual and marital trajectories and HIV infection among ever-married women in rural Malawi.

    Get PDF
    OBJECTIVE: To explore how sexual and marital trajectories are associated with HIV infection among ever-married women in rural Malawi. METHODS: Retrospective survey data and HIV biomarker data for 926 ever-married women interviewed in the Malawi Diffusion and Ideational Change Project were used. The associations between HIV infection and four key life course transitions considered individually (age at sexual debut, premarital sexual activity, entry into marriage and marital disruption by divorce or death) were examined. These transitions were then sequenced to construct trajectories that represent the variety of patterns in the data. The association between different trajectories and HIV prevalence was examined, controlling for potentially confounding factors such as age and region. RESULTS: Although each life course transition taken in isolation may be associated with HIV infection, their combined effect appeared to be conditional on the sequence in which they occurred. Although early sexual debut, not marrying one's first sexual partner and having a disrupted marriage each increased the likelihood of HIV infection, their risk was not additive. Women who both delayed sexual debut and did not marry their first partner are, once married, more likely to experience marital disruption and to be HIV-positive. Women who marry their first partner but who have sex at a young age, however, are also at considerable risk. CONCLUSIONS: These findings identify the potential of a life course perspective for understanding why some women become infected with HIV and others do not, as well as the differentials in HIV prevalence that originate from the sequence of sexual and marital transitions in one's life. The analysis suggests, however, the need for further data collection to permit a better examination of the mechanisms that account for variations in life course trajectories and thus in lifetime probabilities of HIV infection

    Higher Security Thresholds for Quantum Key Distribution by Improved Analysis of Dark Counts

    Full text link
    We discuss the potential of quantum key distribution (QKD) for long distance communication by proposing a new analysis of the errors caused by dark counts. We give sufficient conditions for a considerable improvement of the key generation rates and the security thresholds of well-known QKD protocols such as Bennett-Brassard 1984, Phoenix-Barnett-Chefles 2000, and the six-state protocol. This analysis is applicable to other QKD protocols like Bennett 1992. We examine two scenarios: a sender using a perfect single-photon source and a sender using a Poissonian source.Comment: 6 pages, 2 figures, v2: We obtained better results by using reverse reconciliation as suggested by Nicolas Gisi

    Four-strand hamstring tendon autograft for ACL reconstruction in patients aged 50years or older

    Get PDF
    SummaryIntroductionReconstruction of the anterior cruciate ligament using a four-strand hamstring tendon autograft in symptomatic patients aged 50years or older is an accepted treatment option.HypotesisFour-strand hamstring tendon autograft although not universally utilized in patients who are at least 50years old is an efficient procedure to control knee instability.Material and methodsIn this retrospective, we analyzed the clinical outcomes of 18patients treated from September 1998 to September 2003. Criteria for inclusion were the following: age above 50years at surgery, chronic anterior laxity associated or not with meniscal damage; one or more episodes of knee instability and no prior ligament surgery on the involved knee. A same operative technique (arthroscopic single-bundle four-strand hamstring reconstruction, blind femoral tunnel, through anteromedial portals), a same fixation type (absorbable interference screws in femur and tibia) and a same rehabilitation protocol were used for all these knees. The IKDC 93scores were determined pre- and postoperatively combined with anteroposterior and lateral views, single leg stance, 30° flexion stance, and passive Lachman test (Telos) postoperatively.ResultsAt mean 30month-follow-up (range 12–59months), there were no graft failure and no loss of extension for any of these knees. Three patients complained of hypoesthesia in the medial saphenous nerve territory and one patient experienced posterior knee pain. All patients graded their knee as normal or nearly normal, all were satisfied or very satisfied with their operation. None of the patients reported instability. The Lachman-Trillat test was noted “firm end point” in 14knees and “delayed firm end point” in four. The pivot-shift test was negative in 16knees and mild positive in two. The mean residual differential laxity was 3.1mm (0 to +6mm) for the passive Lachman test. At last follow-up, the overall IKDC score was 7A, 7B, 3C, and 1 D. Patients with preserved meniscus (nine patients) reported a lesser degree of pain and a better residual laxity control compared with patients who had undergone a meniscectomy.ConclusionAge over 50years is not a contraindication to select a hamstring tendon autograft for ACL reconstruction. This surgery can restore knee stability but does not modify the pain pattern in patients, who had a medial meniscectomy prior to the ACL reconstruction.Level of evidence: level IV, therapeutic study

    Robust polarization-based quantum key distribution over collective-noise channel

    Full text link
    We present two polarization-based protocols for quantum key distribution. The protocols encode key bits in noiseless subspaces or subsystems, and so can function over a quantum channel subjected to an arbitrary degree of collective noise, as occurs, for instance, due to rotation of polarizations in an optical fiber. These protocols can be implemented using only entangled photon-pair sources, single-photon rotations, and single-photon detectors. Thus, our proposals offer practical and realistic alternatives to existing schemes for quantum key distribution over optical fibers without resorting to interferometry or two-way quantum communication, thereby circumventing, respectively, the need for high precision timing and the threat of Trojan horse attacks.Comment: Minor changes, added reference

    Experimental Implementation of Discrete Time Quantum Random Walk on an NMR Quantum Information Processor

    Full text link
    We present an experimental implementation of the coined discrete time quantum walk on a square using a three qubit liquid state nuclear magnetic resonance (NMR) quantum information processor (QIP). Contrary to its classical counterpart, we observe complete interference after certain steps and a periodicity in the evolution. Complete state tomography has been performed for each of the eight steps making a full period. The results have extremely high fidelity with the expected states and show clearly the effects of quantum interference in the walk. We also show and discuss the importance of choosing a molecule with a natural Hamiltonian well suited to NMR QIP by implementing the same algorithm on a second molecule. Finally, we show experimentally that decoherence after each step makes the statistics of the quantum walk tend to that of the classical random walk.Comment: revtex4, 8 pages, 6 figures, submitted to PR

    Experimental Quantum Communication without a Shared Reference Frame

    Get PDF
    We present an experimental realization of a robust quantum communication scheme [Phys. Rev. Lett. 93, 220501 (2004)] using pairs of photons entangled in polarization and time. Our method overcomes errors due to collective rotation of the polarization modes (e.g., birefringence in optical fiber or misalignment), is insensitive to the phase's fluctuation of the interferometer, and does not require any shared reference frame including time reference, except the need to label different photons. The practical robustness of the scheme is further shown by implementing a variation of the Bennett-Brassard 1984 quantum key distribution protocol over 1 km optical fiber.Comment: 4 pages, 4 figure
    corecore