6,681 research outputs found

    Comment on "Resilience of gated avalanche photodiodes against bright illumination attacks in quantum cryptography"

    Full text link
    This is a comment on the publication by Yuan et al. [Appl. Phys. Lett. 98, 231104 (2011); arXiv:1106.2675v1 [quant-ph]].Comment: 2 page

    Phase-Remapping Attack in Practical Quantum Key Distribution Systems

    Full text link
    Quantum key distribution (QKD) can be used to generate secret keys between two distant parties. Even though QKD has been proven unconditionally secure against eavesdroppers with unlimited computation power, practical implementations of QKD may contain loopholes that may lead to the generated secret keys being compromised. In this paper, we propose a phase-remapping attack targeting two practical bidirectional QKD systems (the "plug & play" system and the Sagnac system). We showed that if the users of the systems are unaware of our attack, the final key shared between them can be compromised in some situations. Specifically, we showed that, in the case of the Bennett-Brassard 1984 (BB84) protocol with ideal single-photon sources, when the quantum bit error rate (QBER) is between 14.6% and 20%, our attack renders the final key insecure, whereas the same range of QBER values has been proved secure if the two users are unaware of our attack; also, we demonstrated three situations with realistic devices where positive key rates are obtained without the consideration of Trojan horse attacks but in fact no key can be distilled. We remark that our attack is feasible with only current technology. Therefore, it is very important to be aware of our attack in order to ensure absolute security. In finding our attack, we minimize the QBER over individual measurements described by a general POVM, which has some similarity with the standard quantum state discrimination problem.Comment: 13 pages, 8 figure

    Three years clinical experience with intestinal transplantation

    Get PDF
    BACKGROUND: After the successful evolution of hepatic transplantation during the last decade, small bowel and multivisceral transplantation remains the sole elusive achievement for the next era of transplant surgeons. Until recently, and for the last thirty years, the results of the sporadic attempts of intestinal transplantation worldwide were discouraging because of unsatisfactory graft and patient survival. The experimental and clinical demonstration of the superior therapeutic efficacy of FK 506, a new immunosuppressive drug, ushered in the current era of small bowel and multivisceral transplantation with initial promising results. STUDY DESIGN: Forty-three consecutive patients with short bowel syndrome, intestinal insufficiency, or malignant tumors with or without associated liver disease, were given intestinal (n=15), hepatic and intestinal (n=21), or multivisceral allografts that contained four or more organs (n=7). Treatment was with FK 506 based immunosuppression. The ascending and right transverse colon were included with the small intestine in 13 of the 43 grafts, almost evenly distributed between the three groups. RESULTS: After six to 39 months, 30 of the 43 patients are alive, 29 bearing grafts. The most rapid convalescence and resumption of diet, as well as the highest three month patient survival (100 percent) and graft survival (88 percent) were with the isolated intestinal procedure. However, this advantage was slowly eroded during the first two postoperative years, in part because the isolated intestine was more prone to rejection. By the end of this time, the best survival rate (86 percent) was with the multivisceral procedure. With all three operations, most of the patients were able to resume diet and discontinue parenteral alimentation, and in the best instances, the quality of life approached normal. However, the surveillance and intensity of care required for these patients for the first year, and in most instances thereafter, was very high, being far more than required for patients having transplants of the liver, kidney or heart. CONCLUSIONS: Although intestinal transplantation has gone through the feasibility phase, strategies will be required to increase its practicality. One possibility is to combine intestinal transplantation with contemporaneous autologous bone marrow transplantation

    Secure gated detection scheme for quantum cryptography

    Full text link
    Several attacks have been proposed on quantum key distribution systems with gated single-photon detectors. The attacks involve triggering the detectors outside the center of the detector gate, and/or using bright illumination to exploit classical photodiode mode of the detectors. Hence a secure detection scheme requires two features: The detection events must take place in the middle of the gate, and the detector must be single-photon sensitive. Here we present a technique called bit-mapped gating, which is an elegant way to force the detections in the middle of the detector gate by coupling detection time and quantum bit error rate. We also discuss how to guarantee single-photon sensitivity by directly measuring detector parameters. Bit-mapped gating also provides a simple way to measure the detector blinding parameter in security proofs for quantum key distribution systems with detector efficiency mismatch, which up until now has remained a theoretical, unmeasurable quantity. Thus if single-photon sensitivity can be guaranteed within the gates, a detection scheme with bit-mapped gating satisfies the assumptions of the current security proofs.Comment: 7 pages, 3 figure

    Parkinsonism and dystonia: Clinical spectrum and diagnostic clues

    Get PDF
    The links between the two archetypical basal ganglia disorders, dystonia and parkinsonism, are manifold and stem from clinical observations, imaging studies, animal models and genetics. The combination of both, i.e. the syndrome of dystonia-parkinsonism, is not uncommonly seen in movement disorders clinics and has a myriad of different underlying aetiologies, upon which treatment and prognosis depend. Based on a comprehensive literature review, we delineate the clinical spectrum of disorders presenting with dystonia-parkinsonism. The clinical approach depends primarily on the age at onset, associated neurological or systemic symptoms and neuroimaging. The tempo of disease progression, and the response to L-dopa are further important clues to tailor diagnostic approaches that may encompass dopamine transporter imaging, CSF analysis and, last but not least, genetic testing. Later in life, sporadic neurodegenerative conditions are the most frequent cause, but the younger the patient, the more likely the cause is unravelled by the recent advances of molecular genetics that are focus of this review. Here, knowledge of the associated phenotypic spectrum is key to guide genetic testing and interpretation of test results. This article is part of the Special Issue "Parkinsonism across the spectrum of movement disorders and beyond" edited by Joseph Jankovic, Daniel D. Truong and Matteo Bologna

    Abdominal multivisceral transplantation

    Get PDF
    Under FK506-based immunosuppression, 13 abdominal multivisceral transplantations were performed in 6 children and 7 adults. Of the 13 recipients, 7 (53.8%) are alive and well with functioning grafts after 9 to 31 months. Six recipients died: Three from PTLD, one from rejection, one from sepsis, and one from respiratory failure. In addition to rejection, postoperative complications occurring in more than isolated cases included PTLD (n=6), abdominal abscess formation (n=5), pancreatitis (n=3), and ampullary dysfunction (n=2). In addition, infection by enteric microorganisms was common during the early postoperative period. Currently, all 7 survivors are on an oral diet and have normal liver function. Two recipients (one insulin-dependent) require antidiabetes treatment, in one case following distal pancreatectomy and in the other after two episodes of pancreatic rejection. Thus, abdominal multivisceral transplantation is a difficult but feasible operation that demands complex and prolonged posttransplantation management. It is not yet ready for application and awaits a better strategy of immune modulation. © 1995 by Williams & Wilkins

    Lateral migration of a 2D vesicle in unbounded Poiseuille flow

    Get PDF
    The migration of a suspended vesicle in an unbounded Poiseuille flow is investigated numerically in the low Reynolds number limit. We consider the situation without viscosity contrast between the interior of the vesicle and the exterior. Using the boundary integral method we solve the corresponding hydrodynamic flow equations and track explicitly the vesicle dynamics in two dimensions. We find that the interplay between the nonlinear character of the Poiseuille flow and the vesicle deformation causes a cross-streamline migration of vesicles towards the center of the Poiseuille flow. This is in a marked contrast with a result [L.G. Leal, Ann. Rev. Fluid Mech. 12, 435(1980)]according to which the droplet moves away from the center (provided there is no viscosity contrast between the internal and the external fluids). The migration velocity is found to increase with the local capillary number (defined by the time scale of the vesicle relaxation towards its equilibrium shape times the local shear rate), but reaches a plateau above a certain value of the capillary number. This plateau value increases with the curvature of the parabolic flow profile. We present scaling laws for the migration velocity.Comment: 11 pages with 4 figure

    Implementation of two-party protocols in the noisy-storage model

    Get PDF
    The noisy-storage model allows the implementation of secure two-party protocols under the sole assumption that no large-scale reliable quantum storage is available to the cheating party. No quantum storage is thereby required for the honest parties. Examples of such protocols include bit commitment, oblivious transfer and secure identification. Here, we provide a guideline for the practical implementation of such protocols. In particular, we analyze security in a practical setting where the honest parties themselves are unable to perform perfect operations and need to deal with practical problems such as errors during transmission and detector inefficiencies. We provide explicit security parameters for two different experimental setups using weak coherent, and parametric down conversion sources. In addition, we analyze a modification of the protocols based on decoy states.Comment: 41 pages, 33 figures, this is a companion paper to arXiv:0906.1030 considering practical aspects, v2: published version, title changed in accordance with PRA guideline

    Rejection of human intestinal allografts: Alone or in combination with the liver

    Get PDF
    The current results of the present series demonstrate that intestinal allografts are more vulnerable to rejection and continue to be at a significantly higher risk long after transplantation compared with isolated liver allograft recipients. Unexpectedly, a combined liver allograft does not protect small bowel from rejection. The necessarily continuous heavy immunosuppression for these unique recipients is potentially self-defeating. This is clearly demonstrated by their high susceptibility to early and late infectious complications after transplantation as reported in this issue. With the minimal graft-versus-host disease threat in this clinical trial, our revised protocol for future intestinal transplantation is to maximize the passenger leukocyte traffic with supplementary bone marrow from the same intestinal donor in an attempt to augment the development of systemic chimerism and the gradual induction of donor-specific nonreactivity

    Experimental demonstration of phase-remapping attack in a practical quantum key distribution system

    Full text link
    Unconditional security proofs of various quantum key distribution (QKD) protocols are built on idealized assumptions. One key assumption is: the sender (Alice) can prepare the required quantum states without errors. However, such an assumption may be violated in a practical QKD system. In this paper, we experimentally demonstrate a technically feasible "intercept-and-resend" attack that exploits such a security loophole in a commercial "plug & play" QKD system. The resulting quantum bit error rate is 19.7%, which is below the proven secure bound of 20.0% for the BB84 protocol. The attack we utilize is the phase-remapping attack (C.-H. F. Fung, et al., Phys. Rev. A, 75, 32314, 2007) proposed by our group.Comment: 16 pages, 6 figure
    corecore