7 research outputs found

    Quantum Tasks in Minkowski Space

    Full text link
    The fundamental properties of quantum information and its applications to computing and cryptography have been greatly illuminated by considering information-theoretic tasks that are provably possible or impossible within non-relativistic quantum mechanics. I describe here a general framework for defining tasks within (special) relativistic quantum theory and illustrate it with examples from relativistic quantum cryptography and relativistic distributed quantum computation. The framework gives a unified description of all tasks previously considered and also defines a large class of new questions about the properties of quantum information in relation to Minkowski causality. It offers a way of exploring interesting new fundamental tasks and applications, and also highlights the scope for a more systematic understanding of the fundamental information-theoretic properties of relativistic quantum theory

    Memory Attacks on Device-Independent Quantum Cryptography

    No full text
    Device-independent quantum cryptographic schemes aim to guarantee security to users based only on the output statistics of any components used, and without the need to verify their internal functionality. Since this would protect users against untrustworthy or incompetent manufacturers, sabotage or device degradation, this idea has excited much interest, and many device-independent schemes have been proposed. Here we identify a critical weakness of device-independent protocols that rely on public communication between secure laboratories. Untrusted devices may record their inputs and outputs and reveal information about them via publicly discussed outputs during later runs. Reusing devices thus compromises the security of a protocol and risks leaking secret data. Possible defences include securely destroying or isolating used devices. However, these are costly and often impractical. We propose other more practical partial defences as well as a new protocol structure for device-independent quantum key distribution that aims to achieve composable security in the case of two parties using a small number of devices to repeatedly share keys with each another (and no other party).Comment: 6+4 pages. Title updated to match published version. Expanded discussion of countermeasures. We wish to underline (in particular, for the benefit of any readers unfamiliar with the field) that our attacks apply to quantum cryptography in the scenario where the quantum devices used are completely untrusted, and not in the usual scenario in which the device manufacturers are truste

    Unconditionally secure device−independent quantum key distribution with only two devices

    No full text
    Device-independent quantum key distribution is the task of using uncharacterized quantum devices to establish a shared key between two users. If a protocol is secure regardless of the device behaviour, it can be used to generate a shared key even if the supplier of the devices is malicious. To date, all device-independent quantum key distribution protocols that are known to be secure require separate isolated devices for each entangled pair, which is a significant practical limitation. We introduce a protocol that requires Alice and Bob to have only one device each. Although inefficient, our protocol is unconditionally secure against an adversarial supplier limited only by locally enforced signalling constraints.Comment: 11 pages, minor change

    Weak Coin Flipping in a Device-Independent Setting

    No full text
    A protocol is said to be device-independent when the level of its performance can be inferred without making any assumptions regarding the inner workings of the apparatus used to implement it. In this paper we introduce a device-independent weak coin flipping protocol based on a single GHZ test. Interestingly, the protocol calls for the exchange of (quantum) systems between participants; a feature which is not trivial to incorporate in a device-independent setting where a system's behavior may depend on the time, location, and its history. Alice's and Bob's maximal cheating probabilities are given by ≈ 0.974 and cos2 (π/ 8) ≈ 0.854. © 2014 Springer-Verlag Berlin Heidelberg.info:eu-repo/semantics/publishe

    Thigh-length compression stockings and DVT after stroke

    Get PDF
    Controversy exists as to whether neoadjuvant chemotherapy improves survival in patients with invasive bladder cancer, despite randomised controlled trials of more than 3000 patients. We undertook a systematic review and meta-analysis to assess the effect of such treatment on survival in patients with this disease

    Azithromycin in patients admitted to hospital with COVID-19 (RECOVERY): a randomised, controlled, open-label, platform trial

    Get PDF
    Background Azithromycin has been proposed as a treatment for COVID-19 on the basis of its immunomodulatory actions. We aimed to evaluate the safety and efficacy of azithromycin in patients admitted to hospital with COVID-19. Methods In this randomised, controlled, open-label, adaptive platform trial (Randomised Evaluation of COVID-19 Therapy [RECOVERY]), several possible treatments were compared with usual care in patients admitted to hospital with COVID-19 in the UK. The trial is underway at 176 hospitals in the UK. Eligible and consenting patients were randomly allocated to either usual standard of care alone or usual standard of care plus azithromycin 500 mg once per day by mouth or intravenously for 10 days or until discharge (or allocation to one of the other RECOVERY treatment groups). Patients were assigned via web-based simple (unstratified) randomisation with allocation concealment and were twice as likely to be randomly assigned to usual care than to any of the active treatment groups. Participants and local study staff were not masked to the allocated treatment, but all others involved in the trial were masked to the outcome data during the trial. The primary outcome was 28-day all-cause mortality, assessed in the intention-to-treat population. The trial is registered with ISRCTN, 50189673, and ClinicalTrials.gov, NCT04381936. Findings Between April 7 and Nov 27, 2020, of 16 442 patients enrolled in the RECOVERY trial, 9433 (57%) were eligible and 7763 were included in the assessment of azithromycin. The mean age of these study participants was 65·3 years (SD 15·7) and approximately a third were women (2944 [38%] of 7763). 2582 patients were randomly allocated to receive azithromycin and 5181 patients were randomly allocated to usual care alone. Overall, 561 (22%) patients allocated to azithromycin and 1162 (22%) patients allocated to usual care died within 28 days (rate ratio 0·97, 95% CI 0·87–1·07; p=0·50). No significant difference was seen in duration of hospital stay (median 10 days [IQR 5 to >28] vs 11 days [5 to >28]) or the proportion of patients discharged from hospital alive within 28 days (rate ratio 1·04, 95% CI 0·98–1·10; p=0·19). Among those not on invasive mechanical ventilation at baseline, no significant difference was seen in the proportion meeting the composite endpoint of invasive mechanical ventilation or death (risk ratio 0·95, 95% CI 0·87–1·03; p=0·24). Interpretation In patients admitted to hospital with COVID-19, azithromycin did not improve survival or other prespecified clinical outcomes. Azithromycin use in patients admitted to hospital with COVID-19 should be restricted to patients in whom there is a clear antimicrobial indication. Funding UK Research and Innovation (Medical Research Council) and National Institute of Health Research
    corecore