6,681 research outputs found
Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"
This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98,
231104 (2011); arXiv:1106.2675v1 [quant-ph]].Comment: 2 page
Phase-Remapping Attack in Practical Quantum Key Distribution Systems
Quantum key distribution (QKD) can be used to generate secret keys between
two distant parties. Even though QKD has been proven unconditionally secure
against eavesdroppers with unlimited computation power, practical
implementations of QKD may contain loopholes that may lead to the generated
secret keys being compromised. In this paper, we propose a phase-remapping
attack targeting two practical bidirectional QKD systems (the "plug & play"
system and the Sagnac system). We showed that if the users of the systems are
unaware of our attack, the final key shared between them can be compromised in
some situations. Specifically, we showed that, in the case of the
Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when
the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders
the final key insecure, whereas the same range of QBER values has been proved
secure if the two users are unaware of our attack; also, we demonstrated three
situations with realistic devices where positive key rates are obtained without
the consideration of Trojan horse attacks but in fact no key can be distilled.
We remark that our attack is feasible with only current technology. Therefore,
it is very important to be aware of our attack in order to ensure absolute
security. In finding our attack, we minimize the QBER over individual
measurements described by a general POVM, which has some similarity with the
standard quantum state discrimination problem.Comment: 13 pages, 8 figure
Three years clinical experience with intestinal transplantation
BACKGROUND: After the successful evolution of hepatic transplantation during the last decade, small bowel and multivisceral transplantation remains the sole elusive achievement for the next era of transplant surgeons. Until recently, and for the last thirty years, the results of the sporadic attempts of intestinal transplantation worldwide were discouraging because of unsatisfactory graft and patient survival. The experimental and clinical demonstration of the superior therapeutic efficacy of FK 506, a new immunosuppressive drug, ushered in the current era of small bowel and multivisceral transplantation with initial promising results. STUDY DESIGN: Forty-three consecutive patients with short bowel syndrome, intestinal insufficiency, or malignant tumors with or without associated liver disease, were given intestinal (n=15), hepatic and intestinal (n=21), or multivisceral allografts that contained four or more organs (n=7). Treatment was with FK 506 based immunosuppression. The ascending and right transverse colon were included with the small intestine in 13 of the 43 grafts, almost evenly distributed between the three groups. RESULTS: After six to 39 months, 30 of the 43 patients are alive, 29 bearing grafts. The most rapid convalescence and resumption of diet, as well as the highest three month patient survival (100 percent) and graft survival (88 percent) were with the isolated intestinal procedure. However, this advantage was slowly eroded during the first two postoperative years, in part because the isolated intestine was more prone to rejection. By the end of this time, the best survival rate (86 percent) was with the multivisceral procedure. With all three operations, most of the patients were able to resume diet and discontinue parenteral alimentation, and in the best instances, the quality of life approached normal. However, the surveillance and intensity of care required for these patients for the first year, and in most instances thereafter, was very high, being far more than required for patients having transplants of the liver, kidney or heart. CONCLUSIONS: Although intestinal transplantation has gone through the feasibility phase, strategies will be required to increase its practicality. One possibility is to combine intestinal transplantation with contemporaneous autologous bone marrow transplantation
Secure gated detection scheme for quantum cryptography
Several attacks have been proposed on quantum key distribution systems with
gated single-photon detectors. The attacks involve triggering the detectors
outside the center of the detector gate, and/or using bright illumination to
exploit classical photodiode mode of the detectors. Hence a secure detection
scheme requires two features: The detection events must take place in the
middle of the gate, and the detector must be single-photon sensitive. Here we
present a technique called bit-mapped gating, which is an elegant way to force
the detections in the middle of the detector gate by coupling detection time
and quantum bit error rate. We also discuss how to guarantee single-photon
sensitivity by directly measuring detector parameters. Bit-mapped gating also
provides a simple way to measure the detector blinding parameter in security
proofs for quantum key distribution systems with detector efficiency mismatch,
which up until now has remained a theoretical, unmeasurable quantity. Thus if
single-photon sensitivity can be guaranteed within the gates, a detection
scheme with bit-mapped gating satisfies the assumptions of the current security
proofs.Comment: 7 pages, 3 figure
Parkinsonism and dystonia: Clinical spectrum and diagnostic clues
The links between the two archetypical basal ganglia disorders, dystonia and parkinsonism, are manifold and stem from clinical observations, imaging studies, animal models and genetics. The combination of both, i.e. the syndrome of dystonia-parkinsonism, is not uncommonly seen in movement disorders clinics and has a myriad of different underlying aetiologies, upon which treatment and prognosis depend. Based on a comprehensive literature review, we delineate the clinical spectrum of disorders presenting with dystonia-parkinsonism. The clinical approach depends primarily on the age at onset, associated neurological or systemic symptoms and neuroimaging. The tempo of disease progression, and the response to L-dopa are further important clues to tailor diagnostic approaches that may encompass dopamine transporter imaging, CSF analysis and, last but not least, genetic testing. Later in life, sporadic neurodegenerative conditions are the most frequent cause, but the younger the patient, the more likely the cause is unravelled by the recent advances of molecular genetics that are focus of this review. Here, knowledge of the associated phenotypic spectrum is key to guide genetic testing and interpretation of test results. This article is part of the Special Issue "Parkinsonism across the spectrum of movement disorders and beyond" edited by Joseph Jankovic, Daniel D. Truong and Matteo Bologna
Abdominal multivisceral transplantation
Under FK506-based immunosuppression, 13 abdominal multivisceral transplantations were performed in 6 children and 7 adults. Of the 13 recipients, 7 (53.8%) are alive and well with functioning grafts after 9 to 31 months. Six recipients died: Three from PTLD, one from rejection, one from sepsis, and one from respiratory failure. In addition to rejection, postoperative complications occurring in more than isolated cases included PTLD (n=6), abdominal abscess formation (n=5), pancreatitis (n=3), and ampullary dysfunction (n=2). In addition, infection by enteric microorganisms was common during the early postoperative period. Currently, all 7 survivors are on an oral diet and have normal liver function. Two recipients (one insulin-dependent) require antidiabetes treatment, in one case following distal pancreatectomy and in the other after two episodes of pancreatic rejection. Thus, abdominal multivisceral transplantation is a difficult but feasible operation that demands complex and prolonged posttransplantation management. It is not yet ready for application and awaits a better strategy of immune modulation. © 1995 by Williams & Wilkins
Lateral migration of a 2D vesicle in unbounded Poiseuille flow
The migration of a suspended vesicle in an unbounded Poiseuille flow is
investigated numerically in the low Reynolds number limit. We consider the
situation without viscosity contrast between the interior of the vesicle and
the exterior. Using the boundary integral method we solve the corresponding
hydrodynamic flow equations and track explicitly the vesicle dynamics in two
dimensions. We find that the interplay between the nonlinear character of the
Poiseuille flow and the vesicle deformation causes a cross-streamline migration
of vesicles towards the center of the Poiseuille flow. This is in a marked
contrast with a result [L.G. Leal, Ann. Rev. Fluid Mech. 12,
435(1980)]according to which the droplet moves away from the center (provided
there is no viscosity contrast between the internal and the external fluids).
The migration velocity is found to increase with the local capillary number
(defined by the time scale of the vesicle relaxation towards its equilibrium
shape times the local shear rate), but reaches a plateau above a certain value
of the capillary number. This plateau value increases with the curvature of the
parabolic flow profile. We present scaling laws for the migration velocity.Comment: 11 pages with 4 figure
Implementation of two-party protocols in the noisy-storage model
The noisy-storage model allows the implementation of secure two-party
protocols under the sole assumption that no large-scale reliable quantum
storage is available to the cheating party. No quantum storage is thereby
required for the honest parties. Examples of such protocols include bit
commitment, oblivious transfer and secure identification. Here, we provide a
guideline for the practical implementation of such protocols. In particular, we
analyze security in a practical setting where the honest parties themselves are
unable to perform perfect operations and need to deal with practical problems
such as errors during transmission and detector inefficiencies. We provide
explicit security parameters for two different experimental setups using weak
coherent, and parametric down conversion sources. In addition, we analyze a
modification of the protocols based on decoy states.Comment: 41 pages, 33 figures, this is a companion paper to arXiv:0906.1030
considering practical aspects, v2: published version, title changed in
accordance with PRA guideline
Rejection of human intestinal allografts: Alone or in combination with the liver
The current results of the present series demonstrate that intestinal allografts are more vulnerable to rejection and continue to be at a significantly higher risk long after transplantation compared with isolated liver allograft recipients. Unexpectedly, a combined liver allograft does not protect small bowel from rejection. The necessarily continuous heavy immunosuppression for these unique recipients is potentially self-defeating. This is clearly demonstrated by their high susceptibility to early and late infectious complications after transplantation as reported in this issue. With the minimal graft-versus-host disease threat in this clinical trial, our revised protocol for future intestinal transplantation is to maximize the passenger leukocyte traffic with supplementary bone marrow from the same intestinal donor in an attempt to augment the development of systemic chimerism and the gradual induction of donor-specific nonreactivity
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
Unconditional security proofs of various quantum key distribution (QKD)
protocols are built on idealized assumptions. One key assumption is: the sender
(Alice) can prepare the required quantum states without errors. However, such
an assumption may be violated in a practical QKD system. In this paper, we
experimentally demonstrate a technically feasible "intercept-and-resend" attack
that exploits such a security loophole in a commercial "plug & play" QKD
system. The resulting quantum bit error rate is 19.7%, which is below the
proven secure bound of 20.0% for the BB84 protocol. The attack we utilize is
the phase-remapping attack (C.-H. F. Fung, et al., Phys. Rev. A, 75, 32314,
2007) proposed by our group.Comment: 16 pages, 6 figure
- …