1,643 research outputs found
Robust Quantum Communication Using A Polarization-Entangled Photon Pair
Noise and imperfection of realistic devices are major obstacles for
implementing quantum cryptography. In particular birefringence in optical
fibers leads to decoherence of qubits encoded in polarization of photon. We
show how to overcome this problem by doing single qubit quantum communication
without a shared spatial reference frame and precise timing. Quantum
information will be encoded in pair of photons using ``tag'' operations which
corresponds to the time delay of one of the polarization modes. This method is
robust against the phase instability of the interferometers despite the use of
time-bins. Moreover synchronized clocks are not required in the ideal situation
no photon loss case as they are only necessary to label the different encoded
qubits.Comment: 4 pages, 2 figure
Unconditional Security of Three State Quantum Key Distribution Protocols
Quantum key distribution (QKD) protocols are cryptographic techniques with
security based only on the laws of quantum mechanics. Two prominent QKD schemes
are the BB84 and B92 protocols that use four and two quantum states,
respectively. In 2000, Phoenix et al. proposed a new family of three state
protocols that offers advantages over the previous schemes. Until now, an error
rate threshold for security of the symmetric trine spherical code QKD protocol
has only been shown for the trivial intercept/resend eavesdropping strategy. In
this paper, we prove the unconditional security of the trine spherical code QKD
protocol, demonstrating its security up to a bit error rate of 9.81%. We also
discuss on how this proof applies to a version of the trine spherical code QKD
protocol where the error rate is evaluated from the number of inconclusive
events.Comment: 4 pages, published versio
Новий навчальний посібник “Україна в міжнародних організаціях”
Рецензія на посібник: Макар Ю. І. Україна в міжнародних організаціях : навч. посібник /
Ю. І. Макар, Б. П. Гдичинський, В. Ю. Макар, С. Д. Попик, Н. Ю. Ротар ; за ред. Ю. І. Макара. – Чернівці : Прут, 2009. – 880 с
Sexual and marital trajectories and HIV infection among ever-married women in rural Malawi.
OBJECTIVE: To explore how sexual and marital trajectories are associated with HIV infection among ever-married women in rural Malawi. METHODS: Retrospective survey data and HIV biomarker data for 926 ever-married women interviewed in the Malawi Diffusion and Ideational Change Project were used. The associations between HIV infection and four key life course transitions considered individually (age at sexual debut, premarital sexual activity, entry into marriage and marital disruption by divorce or death) were examined. These transitions were then sequenced to construct trajectories that represent the variety of patterns in the data. The association between different trajectories and HIV prevalence was examined, controlling for potentially confounding factors such as age and region. RESULTS: Although each life course transition taken in isolation may be associated with HIV infection, their combined effect appeared to be conditional on the sequence in which they occurred. Although early sexual debut, not marrying one's first sexual partner and having a disrupted marriage each increased the likelihood of HIV infection, their risk was not additive. Women who both delayed sexual debut and did not marry their first partner are, once married, more likely to experience marital disruption and to be HIV-positive. Women who marry their first partner but who have sex at a young age, however, are also at considerable risk. CONCLUSIONS: These findings identify the potential of a life course perspective for understanding why some women become infected with HIV and others do not, as well as the differentials in HIV prevalence that originate from the sequence of sexual and marital transitions in one's life. The analysis suggests, however, the need for further data collection to permit a better examination of the mechanisms that account for variations in life course trajectories and thus in lifetime probabilities of HIV infection
Higher Security Thresholds for Quantum Key Distribution by Improved Analysis of Dark Counts
We discuss the potential of quantum key distribution (QKD) for long distance
communication by proposing a new analysis of the errors caused by dark counts.
We give sufficient conditions for a considerable improvement of the key
generation rates and the security thresholds of well-known QKD protocols such
as Bennett-Brassard 1984, Phoenix-Barnett-Chefles 2000, and the six-state
protocol. This analysis is applicable to other QKD protocols like Bennett 1992.
We examine two scenarios: a sender using a perfect single-photon source and a
sender using a Poissonian source.Comment: 6 pages, 2 figures, v2: We obtained better results by using reverse
reconciliation as suggested by Nicolas Gisi
Four-strand hamstring tendon autograft for ACL reconstruction in patients aged 50years or older
SummaryIntroductionReconstruction of the anterior cruciate ligament using a four-strand hamstring tendon autograft in symptomatic patients aged 50years or older is an accepted treatment option.HypotesisFour-strand hamstring tendon autograft although not universally utilized in patients who are at least 50years old is an efficient procedure to control knee instability.Material and methodsIn this retrospective, we analyzed the clinical outcomes of 18patients treated from September 1998 to September 2003. Criteria for inclusion were the following: age above 50years at surgery, chronic anterior laxity associated or not with meniscal damage; one or more episodes of knee instability and no prior ligament surgery on the involved knee. A same operative technique (arthroscopic single-bundle four-strand hamstring reconstruction, blind femoral tunnel, through anteromedial portals), a same fixation type (absorbable interference screws in femur and tibia) and a same rehabilitation protocol were used for all these knees. The IKDC 93scores were determined pre- and postoperatively combined with anteroposterior and lateral views, single leg stance, 30° flexion stance, and passive Lachman test (Telos) postoperatively.ResultsAt mean 30month-follow-up (range 12–59months), there were no graft failure and no loss of extension for any of these knees. Three patients complained of hypoesthesia in the medial saphenous nerve territory and one patient experienced posterior knee pain. All patients graded their knee as normal or nearly normal, all were satisfied or very satisfied with their operation. None of the patients reported instability. The Lachman-Trillat test was noted “firm end point” in 14knees and “delayed firm end point” in four. The pivot-shift test was negative in 16knees and mild positive in two. The mean residual differential laxity was 3.1mm (0 to +6mm) for the passive Lachman test. At last follow-up, the overall IKDC score was 7A, 7B, 3C, and 1 D. Patients with preserved meniscus (nine patients) reported a lesser degree of pain and a better residual laxity control compared with patients who had undergone a meniscectomy.ConclusionAge over 50years is not a contraindication to select a hamstring tendon autograft for ACL reconstruction. This surgery can restore knee stability but does not modify the pain pattern in patients, who had a medial meniscectomy prior to the ACL reconstruction.Level of evidence: level IV, therapeutic study
Robust polarization-based quantum key distribution over collective-noise channel
We present two polarization-based protocols for quantum key distribution. The
protocols encode key bits in noiseless subspaces or subsystems, and so can
function over a quantum channel subjected to an arbitrary degree of collective
noise, as occurs, for instance, due to rotation of polarizations in an optical
fiber. These protocols can be implemented using only entangled photon-pair
sources, single-photon rotations, and single-photon detectors. Thus, our
proposals offer practical and realistic alternatives to existing schemes for
quantum key distribution over optical fibers without resorting to
interferometry or two-way quantum communication, thereby circumventing,
respectively, the need for high precision timing and the threat of Trojan horse
attacks.Comment: Minor changes, added reference
Experimental Implementation of Discrete Time Quantum Random Walk on an NMR Quantum Information Processor
We present an experimental implementation of the coined discrete time quantum
walk on a square using a three qubit liquid state nuclear magnetic resonance
(NMR) quantum information processor (QIP). Contrary to its classical
counterpart, we observe complete interference after certain steps and a
periodicity in the evolution. Complete state tomography has been performed for
each of the eight steps making a full period. The results have extremely high
fidelity with the expected states and show clearly the effects of quantum
interference in the walk. We also show and discuss the importance of choosing a
molecule with a natural Hamiltonian well suited to NMR QIP by implementing the
same algorithm on a second molecule. Finally, we show experimentally that
decoherence after each step makes the statistics of the quantum walk tend to
that of the classical random walk.Comment: revtex4, 8 pages, 6 figures, submitted to PR
Experimental Quantum Communication without a Shared Reference Frame
We present an experimental realization of a robust quantum communication
scheme [Phys. Rev. Lett. 93, 220501 (2004)] using pairs of photons entangled in
polarization and time. Our method overcomes errors due to collective rotation
of the polarization modes (e.g., birefringence in optical fiber or
misalignment), is insensitive to the phase's fluctuation of the interferometer,
and does not require any shared reference frame including time reference,
except the need to label different photons. The practical robustness of the
scheme is further shown by implementing a variation of the Bennett-Brassard
1984 quantum key distribution protocol over 1 km optical fiber.Comment: 4 pages, 4 figure
- …