165 research outputs found
Symptom-severity-related brain connectivity alterations in functional movement disorders
Background Functional movement disorders, a common cause of neurological disabilities, can occur with heterogeneous motor manifestations including functional weakness. However, the underlying mechanisms related to brain function and connectivity are unknown. Objective To identify brain connectivity alterations related to functional weakness we assessed network centrality changes in a group of patients with heterogeneous motor manifestations using task-free functional MRI in combination with different network centrality approaches. Methods Task-free functional MRI was performed in 48 patients with heterogeneous motor manifestations including 28 patients showing functional weakness and 65 age- and sex-matched healthy controls. Functional connectivity differences were assessed using different network centrality approaches, i.e. global correlation, eigenvector centrality, and intrinsic connectivity. Motor symptom severity was assessed using The Simplified Functional Movement Disorders Rating Scale and correlated with network centrality. Results Comparing patients with and without functional weakness showed significant network centrality differences in the left temporoparietal junction and precuneus. Patients with functional weakness showed increased centrality in the same anatomical regions when comparing functional weakness with healthy controls. Moreover, in the same regions, patients with functional weakness showed a positive correlation between motor symptom severity and network centrality. This correlation was shown to be specific to functional weakness with an interaction analysis, confirming a significant difference between patients with and without functional weakness. Conclusions We identified the temporoparietal junction and precuneus as key regions involved in brain connectivity alterations related to functional weakness. We propose that both regions may be promising targets for phenotype-specific non-invasive brain stimulation
Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way post-processing
We derive a bound for the security of QKD with finite resources under one-way
post-processing, based on a definition of security that is composable and has
an operational meaning. While our proof relies on the assumption of collective
attacks, unconditional security follows immediately for standard protocols like
Bennett-Brassard 1984 and six-states. For single-qubit implementations of such
protocols, we find that the secret key rate becomes positive when at least
N\sim 10^5 signals are exchanged and processed. For any other discrete-variable
protocol, unconditional security can be obtained using the exponential de
Finetti theorem, but the additional overhead leads to very pessimistic
estimates
Abnormal activity in the precuneus during time perception in Parkinson’s disease: An fMRI study
Background Parkinson's disease (PD) patients are deficient in time estimation. This deficit improves after dopamine (DA) treatment and it has been associated with decreased internal timekeeper speed, disruption of executive function and memory retrieval dysfunction. Methodology/Findings The aim of the present study was to explore the neurophysiologic correlates of this deficit. We performed functional magnetic resonance imaging on twelve PD patients while they were performing a time reproduction task (TRT). The TRT consisted of an encoding phase (during which visual stimuli of durations from 5s to 16.6s, varied at 8 levels were presented) and a reproduction phase (during which interval durations were reproduced by a button pressing). Patients were scanned twice, once while on their DA medication (ON condition) and once after medication withdrawal (OFF condition). Differences in Blood-Oxygenation-Level-Dependent (BOLD) signal in ON and OFF conditions were evaluated. The time course of activation in the brain areas with different BOLD signal was plotted. There were no significant differences in the behavioral results, but a trend toward overestimation of intervals ≤11.9s and underestimation of intervals ≥14.1s in the OFF condition (p<0.088). During the reproduction phase, higher activation in the precuneus was found in the ON condition (p<0.05 corrected). Time course was plotted separately for long (≥14.1s) and short (≤11.9s) intervals. Results showed that there was a significant difference only in long intervals, when activity gradually decreased in the OFF, but remained stable in the ON condition. This difference in precuneus activation was not found during random button presses in a control task. Conclusions/Significance Our results show that differences in precuneus activation during retrieval of a remembered duration may underlie some aspects of time perception deficit in PD patients. We suggest that DA medication may allow compensatory activation in the precuneus, which results in a more accurate retrieval of remembered interval duration
Quantum identification system
A secure quantum identification system combining a classical identification
procedure and quantum key distribution is proposed. Each identification
sequence is always used just once and new sequences are ``refuelled'' from a
shared provably secret key transferred through the quantum channel. Two
identification protocols are devised. The first protocol can be applied when
legitimate users have an unjammable public channel at their disposal. The
deception probability is derived for the case of a noisy quantum channel. The
second protocol employs unconditionally secure authentication of information
sent over the public channel, and thus it can be applied even in the case when
an adversary is allowed to modify public communications. An experimental
realization of a quantum identification system is described.Comment: RevTeX, 4 postscript figures, 9 pages, submitted to Physical Review
Detector decoy quantum key distribution
Photon number resolving detectors can enhance the performance of many
practical quantum cryptographic setups. In this paper, we employ a simple
method to estimate the statistics provided by such a photon number resolving
detector using only a threshold detector together with a variable attenuator.
This idea is similar in spirit to that of the decoy state technique, and is
specially suited for those scenarios where only a few parameters of the photon
number statistics of the incoming signals have to be estimated. As an
illustration of the potential applicability of the method in quantum
communication protocols, we use it to prove security of an entanglement based
quantum key distribution scheme with an untrusted source without the need of a
squash model and by solely using this extra idea. In this sense, this detector
decoy method can be seen as a different conceptual approach to adapt a single
photon security proof to its physical, full optical implementation. We show
that in this scenario the legitimate users can now even discard the double
click events from the raw key data without compromising the security of the
scheme, and we present simulations on the performance of the BB84 and the
6-state quantum key distribution protocols.Comment: 27 pages, 7 figure
Controlling passively-quenched single photon detectors by bright light
Single photon detectors based on passively-quenched avalanche photodiodes can
be temporarily blinded by relatively bright light, of intensity less than a
nanowatt. I describe a bright-light regime suitable for attacking a quantum key
distribution system containing such detectors. In this regime, all single
photon detectors in the receiver Bob are uniformly blinded by continuous
illumination coming from the eavesdropper Eve. When Eve needs a certain
detector in Bob to produce a click, she modifies polarization (or other
parameter used to encode quantum states) of the light she sends to Bob such
that the target detector stops receiving light while the other detector(s)
continue to be illuminated. The target detector regains single photon
sensitivity and, when Eve modifies the polarization again, produces a single
click. Thus, Eve has full control of Bob and can do a successful
intercept-resend attack. To check the feasibility of the attack, 3 different
models of passively-quenched detectors have been tested. In the experiment, I
have simulated the intensity diagrams the detectors would receive in a real
quantum key distribution system under attack. Control parameters and side
effects are considered. It appears that the attack could be practically
possible.Comment: Experimental results from a third detector model added. Minor
corrections and edits made. 11 pages, 10 figure
Device-independent quantum key distribution secure against collective attacks
Device-independent quantum key distribution (DIQKD) represents a relaxation
of the security assumptions made in usual quantum key distribution (QKD). As in
usual QKD, the security of DIQKD follows from the laws of quantum physics, but
contrary to usual QKD, it does not rely on any assumptions about the internal
working of the quantum devices used in the protocol. We present here in detail
the security proof for a DIQKD protocol introduced in [Phys. Rev. Lett. 98,
230501 (2008)]. This proof exploits the full structure of quantum theory (as
opposed to other proofs that exploit the no-signalling principle only), but
only holds again collective attacks, where the eavesdropper is assumed to act
on the quantum systems of the honest parties independently and identically at
each round of the protocol (although she can act coherently on her systems at
any time). The security of any DIQKD protocol necessarily relies on the
violation of a Bell inequality. We discuss the issue of loopholes in Bell
experiments in this context.Comment: 25 pages, 3 figure
Feasibility of free space quantum key distribution with coherent polarization states
We demonstrate for the first time the feasibility of free space quantum key
distribution with continuous variables under real atmospheric conditions. More
specifically, we transmit coherent polarization states over a 100m free space
channel on the roof of our institute's building. In our scheme, signal and
local oscillator are combined in a single spatial mode which auto-compensates
atmospheric fluctuations and results in an excellent interference. Furthermore,
the local oscillator acts as spatial and spectral filter thus allowing
unrestrained daylight operation.Comment: 12 pages, 8 figures, extensions in sections 2, 3.1, 3.2 and 4. This
is an author-created, un-copyedited version of an article accepted for
publication in New Journal of Physics (Special Issue on Quantum Cryptography:
Theory and Practice). IOP Publishing Ltd is not responsible for any errors or
omissions in this version of the manuscript or any version derived from i
Security against individual attacks for realistic quantum key distribution
I prove the security of quantum key distribution against individual attacks
for realistic signals sources, including weak coherent pulses and
downconversion sources. The proof applies to the BB84 protocol with the
standard detection scheme (no strong reference pulse). I obtain a formula for
the secure bit rate per time slot of an experimental setup which can be used to
optimize the performance of existing schemes for the considered scenario.Comment: 10 pages, 4 figure
- …