4,371 research outputs found

    Optimal ratio between phase basis and bit basis in QKD

    Full text link
    In the original BB84 protocol, the bit basis and the phase basis are used with equal probability. Lo et al (J. of Cryptology, 18, 133-165 (2005)) proposed to modify the ratio between the two bases by increasing the final key generation rate. However, the optimum ratio has not been derived. In this letter, in order to examine this problem, the ratio between the two bases is optimized for exponential constraints given Eve's information distinguishability and the final error probability

    Unconditionally Secure Bit Commitment

    Get PDF
    We describe a new classical bit commitment protocol based on cryptographic constraints imposed by special relativity. The protocol is unconditionally secure against classical or quantum attacks. It evades the no-go results of Mayers, Lo and Chau by requiring from Alice a sequence of communications, including a post-revelation verification, each of which is guaranteed to be independent of its predecessor.Comment: Typos corrected. Reference details added. To appear in Phys. Rev. Let

    The quantum one-time pad in the presence of an eavesdropper

    Get PDF
    A classical one-time pad allows two parties to send private messages over a public classical channel -- an eavesdropper who intercepts the communication learns nothing about the message. A quantum one-time pad is a shared quantum state which allows two parties to send private messages or private quantum states over a public quantum channel. If the eavesdropper intercepts the quantum communication she learns nothing about the message. In the classical case, a one-time pad can be created using shared and partially private correlations. Here we consider the quantum case in the presence of an eavesdropper, and find the single letter formula for the rate at which the two parties can send messages using a quantum one-time pad

    Multivariate Hierarchical Modelling of Household Air Pollution

    Get PDF
    This is the author accepted manuscript. The final version is available from the Statistical Modelling Society via the link in this recordExposure to household air pollution has been attributed to an estimated 3.8 million deaths per year. A major contributor to this exposure is the reliance on various polluting fuels for cooking by almost half of all households in low and middle-income countries. We present a multivariate hierarchical model for surveys of the proportion of people relying on each fuel type, for the period 1990-2017, addressing several challenges with modelling the data including incomplete surveys and sampling bias.Natural Environment Research Council (NERC)World Health Organizatio

    Imaging interactions between the immune and cardiovascular systems in vivo by multiphoton microscopy

    Get PDF
    Several recent studies in immunology have used multiphoton laser-scanning microscopy to visualise the induction of an immune response in real time in vivo. These experiments are illuminating the cellular and molecular interactions involved in the induction, maintenance and regulation of immune responses. Similar approaches are being applied in cardiovascular research where there is an increasing body of evidence to support a significant role for the adaptive immune system in vascular disease. As such, we have begun to dissect the role of T lymphocytes in atherosclerosis in real time in vivo. Here, we provide step-by-step guides to the various stages involved in visualising the migration of T cells within a lymph node and their infiltration into inflamed tissues such as atherosclerotic arteries. These methods provide an insight into the mechanisms involved in the activation and function of immune cells in vivo

    Matroids and Quantum Secret Sharing Schemes

    Full text link
    A secret sharing scheme is a cryptographic protocol to distribute a secret state in an encoded form among a group of players such that only authorized subsets of the players can reconstruct the secret. Classically, efficient secret sharing schemes have been shown to be induced by matroids. Furthermore, access structures of such schemes can be characterized by an excluded minor relation. No such relations are known for quantum secret sharing schemes. In this paper we take the first steps toward a matroidal characterization of quantum secret sharing schemes. In addition to providing a new perspective on quantum secret sharing schemes, this characterization has important benefits. While previous work has shown how to construct quantum secret sharing schemes for general access structures, these schemes are not claimed to be efficient. In this context the present results prove to be useful; they enable us to construct efficient quantum secret sharing schemes for many general access structures. More precisely, we show that an identically self-dual matroid that is representable over a finite field induces a pure state quantum secret sharing scheme with information rate one

    Porous Media Matric Potential and Water Content Measurements During Parabolic Flight

    Get PDF
    Control of water and air in the root zone of plants remains a challenge in the microgravity environment of space. Due to limited flight opportunities, research aimed at resolving microgravity porous media fluid dynamics must often be conducted on Earth. The NASA KC-135 reduced gravity flight program offers an opportunity for Earth-based researchers to study physical processes in a variable gravity environment. The objectives of this study were to obtain measurements of water content and matric potential during the parabolic profile flown by the KC-135 aircraft. The flight profile provided 20–25 s of microgravity at the top of the parabola, while pulling 1.8 g at the bottom. The soil moisture sensors (Temperature and Moisture Acquisition System: Orbital Technologies, Madison, WI) used a heat-pulse method to indirectly estimate water content from heat dissipation. Tensiometers were constructed using a stainless steel porous cup with a pressure transducer and were used to measure the matric potential of the medium. The two types of sensors were placed at different depths in a substrate compartment filled with 1–2 mm Turface (calcined clay). The ability of the heat-pulse sensors to monitor overall changes in water content in the substrate compartment decreased with water content. Differences in measured water content data recorded at 0, 1, and 1.8 g were not significant. Tensiometer readings tracked pressure differences due to the hydrostatic force changes with variable gravity. The readings may have been affected by changes in cabin air pressure that occurred during each parabola. Tensiometer porous membrane conductivity (function of pore size) and fluid volume both influence response time. Porous media sample height and water content influence time-to-equilibrium, where shorter samples and higher water content achieve faster equilibrium. Further testing is needed to develop these sensors for space flight applications

    CoRoT 101186644: A transiting low-mass dense M-dwarf on an eccentric 20.7-day period orbit around a late F-star

    Get PDF
    We present the study of the CoRoT transiting planet candidate 101186644, also named LRc01_E1_4780. Analysis of the CoRoT lightcurve and the HARPS spectroscopic follow-up observations of this faint (m_V = 16) candidate revealed an eclipsing binary composed of a late F-type primary (T_eff = 6090 +/- 200 K) and a low-mass, dense late M-dwarf secondary on an eccentric (e = 0.4) orbit with a period of ~20.7 days. The M-dwarf has a mass of 0.096 +/- 0.011 M_Sun, and a radius of 0.104 +0.026/-0.006 R_Sun, which possibly makes it the smallest and densest late M-dwarf reported so far. Unlike the claim that theoretical models predict radii that are 5%-15% smaller than measured for low-mass stars, this one seems to have a radius that is consistent and might even be below the radius predicted by theoretical models.Comment: Accepted for publication in Astronomy & Astrophysics, 8 pages, 10 figure

    Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems

    Full text link
    Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the experimental testing of Bell inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD.Comment: 5 pages, 3 figures. Substantially revised versio

    One-way quantum key distribution: Simple upper bound on the secret key rate

    Full text link
    We present a simple method to obtain an upper bound on the achievable secret key rate in quantum key distribution (QKD) protocols that use only unidirectional classical communication during the public-discussion phase. This method is based on a necessary precondition for one-way secret key distillation; the legitimate users need to prove that there exists no quantum state having a symmetric extension that is compatible with the available measurements results. The main advantage of the obtained upper bound is that it can be formulated as a semidefinite program, which can be efficiently solved. We illustrate our results by analysing two well-known qubit-based QKD protocols: the four-state protocol and the six-state protocol. Recent results by Renner et al., Phys. Rev. A 72, 012332 (2005), also show that the given precondition is only necessary but not sufficient for unidirectional secret key distillation.Comment: 11 pages, 1 figur
    • …
    corecore