7 research outputs found
Quantum Tasks in Minkowski Space
The fundamental properties of quantum information and its applications to
computing and cryptography have been greatly illuminated by considering
information-theoretic tasks that are provably possible or impossible within
non-relativistic quantum mechanics. I describe here a general framework for
defining tasks within (special) relativistic quantum theory and illustrate it
with examples from relativistic quantum cryptography and relativistic
distributed quantum computation. The framework gives a unified description of
all tasks previously considered and also defines a large class of new questions
about the properties of quantum information in relation to Minkowski causality.
It offers a way of exploring interesting new fundamental tasks and
applications, and also highlights the scope for a more systematic understanding
of the fundamental information-theoretic properties of relativistic quantum
theory
Memory Attacks on Device-Independent Quantum Cryptography
Device-independent quantum cryptographic schemes aim to guarantee security to
users based only on the output statistics of any components used, and without
the need to verify their internal functionality. Since this would protect users
against untrustworthy or incompetent manufacturers, sabotage or device
degradation, this idea has excited much interest, and many device-independent
schemes have been proposed. Here we identify a critical weakness of
device-independent protocols that rely on public communication between secure
laboratories. Untrusted devices may record their inputs and outputs and reveal
information about them via publicly discussed outputs during later runs.
Reusing devices thus compromises the security of a protocol and risks leaking
secret data. Possible defences include securely destroying or isolating used
devices. However, these are costly and often impractical. We propose other more
practical partial defences as well as a new protocol structure for
device-independent quantum key distribution that aims to achieve composable
security in the case of two parties using a small number of devices to
repeatedly share keys with each another (and no other party).Comment: 6+4 pages. Title updated to match published version. Expanded
discussion of countermeasures. We wish to underline (in particular, for the
benefit of any readers unfamiliar with the field) that our attacks apply to
quantum cryptography in the scenario where the quantum devices used are
completely untrusted, and not in the usual scenario in which the device
manufacturers are truste
Unconditionally secure device−independent quantum key distribution with only two devices
Device-independent quantum key distribution is the task of using
uncharacterized quantum devices to establish a shared key between two users. If
a protocol is secure regardless of the device behaviour, it can be used to
generate a shared key even if the supplier of the devices is malicious. To
date, all device-independent quantum key distribution protocols that are known
to be secure require separate isolated devices for each entangled pair, which
is a significant practical limitation. We introduce a protocol that requires
Alice and Bob to have only one device each. Although inefficient, our protocol
is unconditionally secure against an adversarial supplier limited only by
locally enforced signalling constraints.Comment: 11 pages, minor change
Weak Coin Flipping in a Device-Independent Setting
A protocol is said to be device-independent when the level of its performance can be inferred without making any assumptions regarding the inner workings of the apparatus used to implement it. In this paper we introduce a device-independent weak coin flipping protocol based on a single GHZ test. Interestingly, the protocol calls for the exchange of (quantum) systems between participants; a feature which is not trivial to incorporate in a device-independent setting where a system's behavior may depend on the time, location, and its history. Alice's and Bob's maximal cheating probabilities are given by ≈ 0.974 and cos2 (π/ 8) ≈ 0.854. © 2014 Springer-Verlag Berlin Heidelberg.info:eu-repo/semantics/publishe
Thigh-length compression stockings and DVT after stroke
Controversy exists as to whether neoadjuvant chemotherapy improves survival in patients with invasive bladder cancer, despite randomised controlled trials of more than 3000 patients. We undertook a systematic review and meta-analysis to assess the effect of such treatment on survival in patients with this disease
Azithromycin in patients admitted to hospital with COVID-19 (RECOVERY): a randomised, controlled, open-label, platform trial
Background Azithromycin has been proposed as a treatment for COVID-19 on the basis of its immunomodulatory actions. We aimed to evaluate the safety and efficacy of azithromycin in patients admitted to hospital with COVID-19. Methods In this randomised, controlled, open-label, adaptive platform trial (Randomised Evaluation of COVID-19 Therapy [RECOVERY]), several possible treatments were compared with usual care in patients admitted to hospital with COVID-19 in the UK. The trial is underway at 176 hospitals in the UK. Eligible and consenting patients were randomly allocated to either usual standard of care alone or usual standard of care plus azithromycin 500 mg once per day by mouth or intravenously for 10 days or until discharge (or allocation to one of the other RECOVERY treatment groups). Patients were assigned via web-based simple (unstratified) randomisation with allocation concealment and were twice as likely to be randomly assigned to usual care than to any of the active treatment groups. Participants and local study staff were not masked to the allocated treatment, but all others involved in the trial were masked to the outcome data during the trial. The primary outcome was 28-day all-cause mortality, assessed in the intention-to-treat population. The trial is registered with ISRCTN, 50189673, and ClinicalTrials.gov, NCT04381936. Findings Between April 7 and Nov 27, 2020, of 16 442 patients enrolled in the RECOVERY trial, 9433 (57%) were eligible and 7763 were included in the assessment of azithromycin. The mean age of these study participants was 65·3 years (SD 15·7) and approximately a third were women (2944 [38%] of 7763). 2582 patients were randomly allocated to receive azithromycin and 5181 patients were randomly allocated to usual care alone. Overall, 561 (22%) patients allocated to azithromycin and 1162 (22%) patients allocated to usual care died within 28 days (rate ratio 0·97, 95% CI 0·87–1·07; p=0·50). No significant difference was seen in duration of hospital stay (median 10 days [IQR 5 to >28] vs 11 days [5 to >28]) or the proportion of patients discharged from hospital alive within 28 days (rate ratio 1·04, 95% CI 0·98–1·10; p=0·19). Among those not on invasive mechanical ventilation at baseline, no significant difference was seen in the proportion meeting the composite endpoint of invasive mechanical ventilation or death (risk ratio 0·95, 95% CI 0·87–1·03; p=0·24). Interpretation In patients admitted to hospital with COVID-19, azithromycin did not improve survival or other prespecified clinical outcomes. Azithromycin use in patients admitted to hospital with COVID-19 should be restricted to patients in whom there is a clear antimicrobial indication. Funding UK Research and Innovation (Medical Research Council) and National Institute of Health Research