4,371 research outputs found
Optimal ratio between phase basis and bit basis in QKD
In the original BB84 protocol, the bit basis and the phase basis are used
with equal probability. Lo et al (J. of Cryptology, 18, 133-165 (2005))
proposed to modify the ratio between the two bases by increasing the final key
generation rate. However, the optimum ratio has not been derived. In this
letter, in order to examine this problem, the ratio between the two bases is
optimized for exponential constraints given Eve's information
distinguishability and the final error probability
Unconditionally Secure Bit Commitment
We describe a new classical bit commitment protocol based on cryptographic
constraints imposed by special relativity. The protocol is unconditionally
secure against classical or quantum attacks. It evades the no-go results of
Mayers, Lo and Chau by requiring from Alice a sequence of communications,
including a post-revelation verification, each of which is guaranteed to be
independent of its predecessor.Comment: Typos corrected. Reference details added. To appear in Phys. Rev.
Let
The quantum one-time pad in the presence of an eavesdropper
A classical one-time pad allows two parties to send private messages over a
public classical channel -- an eavesdropper who intercepts the communication
learns nothing about the message. A quantum one-time pad is a shared quantum
state which allows two parties to send private messages or private quantum
states over a public quantum channel. If the eavesdropper intercepts the
quantum communication she learns nothing about the message. In the classical
case, a one-time pad can be created using shared and partially private
correlations. Here we consider the quantum case in the presence of an
eavesdropper, and find the single letter formula for the rate at which the two
parties can send messages using a quantum one-time pad
Multivariate Hierarchical Modelling of Household Air Pollution
This is the author accepted manuscript. The final version is available from the Statistical Modelling Society via the link in this recordExposure to household air pollution has been attributed to an estimated 3.8 million deaths per year. A major contributor to this exposure is the reliance on various polluting fuels for cooking by almost half of all households in low and middle-income countries. We present a multivariate hierarchical model for surveys of the proportion of people relying on each fuel type, for the period 1990-2017, addressing several challenges with modelling the data including incomplete surveys and sampling bias.Natural Environment Research Council (NERC)World Health Organizatio
Imaging interactions between the immune and cardiovascular systems in vivo by multiphoton microscopy
Several recent studies in immunology have used multiphoton laser-scanning microscopy to visualise the induction of an immune response in real time in vivo. These experiments are illuminating the cellular and molecular interactions involved in the induction, maintenance and regulation of immune responses. Similar approaches are being applied in cardiovascular research where there is an increasing body of
evidence to support a significant role for the adaptive immune system in vascular disease. As such, we have begun to dissect the role of T lymphocytes in atherosclerosis in real time in vivo. Here, we provide step-by-step guides to the various stages involved in visualising the migration of T cells within a lymph node and their infiltration into inflamed tissues such as atherosclerotic arteries. These methods provide an insight into the mechanisms involved in the activation and function of immune cells in vivo
Matroids and Quantum Secret Sharing Schemes
A secret sharing scheme is a cryptographic protocol to distribute a secret
state in an encoded form among a group of players such that only authorized
subsets of the players can reconstruct the secret. Classically, efficient
secret sharing schemes have been shown to be induced by matroids. Furthermore,
access structures of such schemes can be characterized by an excluded minor
relation. No such relations are known for quantum secret sharing schemes. In
this paper we take the first steps toward a matroidal characterization of
quantum secret sharing schemes. In addition to providing a new perspective on
quantum secret sharing schemes, this characterization has important benefits.
While previous work has shown how to construct quantum secret sharing schemes
for general access structures, these schemes are not claimed to be efficient.
In this context the present results prove to be useful; they enable us to
construct efficient quantum secret sharing schemes for many general access
structures. More precisely, we show that an identically self-dual matroid that
is representable over a finite field induces a pure state quantum secret
sharing scheme with information rate one
Porous Media Matric Potential and Water Content Measurements During Parabolic Flight
Control of water and air in the root zone of plants remains a challenge in the microgravity environment of space. Due to limited flight opportunities, research aimed at resolving microgravity porous media fluid dynamics must often be conducted on Earth. The NASA KC-135 reduced gravity flight program offers an opportunity for Earth-based researchers to study physical processes in a variable gravity environment. The objectives of this study were to obtain measurements of water content and matric potential during the parabolic profile flown by the KC-135 aircraft. The flight profile provided 20–25 s of microgravity at the top of the parabola, while pulling 1.8 g at the bottom. The soil moisture sensors (Temperature and Moisture Acquisition System: Orbital Technologies, Madison, WI) used a heat-pulse method to indirectly estimate water content from heat dissipation. Tensiometers were constructed using a stainless steel porous cup with a pressure transducer and were used to measure the matric potential of the medium. The two types of sensors were placed at different depths in a substrate compartment filled with 1–2 mm Turface (calcined clay). The ability of the heat-pulse sensors to monitor overall changes in water content in the substrate compartment decreased with water content. Differences in measured water content data recorded at 0, 1, and 1.8 g were not significant. Tensiometer readings tracked pressure differences due to the hydrostatic force changes with variable gravity. The readings may have been affected by changes in cabin air pressure that occurred during each parabola. Tensiometer porous membrane conductivity (function of pore size) and fluid volume both influence response time. Porous media sample height and water content influence time-to-equilibrium, where shorter samples and higher water content achieve faster equilibrium. Further testing is needed to develop these sensors for space flight applications
CoRoT 101186644: A transiting low-mass dense M-dwarf on an eccentric 20.7-day period orbit around a late F-star
We present the study of the CoRoT transiting planet candidate 101186644, also
named LRc01_E1_4780. Analysis of the CoRoT lightcurve and the HARPS
spectroscopic follow-up observations of this faint (m_V = 16) candidate
revealed an eclipsing binary composed of a late F-type primary (T_eff = 6090
+/- 200 K) and a low-mass, dense late M-dwarf secondary on an eccentric (e =
0.4) orbit with a period of ~20.7 days. The M-dwarf has a mass of 0.096 +/-
0.011 M_Sun, and a radius of 0.104 +0.026/-0.006 R_Sun, which possibly makes it
the smallest and densest late M-dwarf reported so far. Unlike the claim that
theoretical models predict radii that are 5%-15% smaller than measured for
low-mass stars, this one seems to have a radius that is consistent and might
even be below the radius predicted by theoretical models.Comment: Accepted for publication in Astronomy & Astrophysics, 8 pages, 10
figure
Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems
Quantum key distribution (QKD) systems can send signals over more than 100 km
standard optical fiber and are widely believed to be secure. Here, we show
experimentally for the first time a technologically feasible attack, namely the
time-shift attack, against a commercial QKD system. Our result shows that,
contrary to popular belief, an eavesdropper, Eve, has a non-negligible
probability (~4%) to break the security of the system. Eve's success is due to
the well-known detection efficiency loophole in the experimental testing of
Bell inequalities. Therefore, the detection efficiency loophole plays a key
role not only in fundamental physics, but also in technological applications
such as QKD.Comment: 5 pages, 3 figures. Substantially revised versio
One-way quantum key distribution: Simple upper bound on the secret key rate
We present a simple method to obtain an upper bound on the achievable secret
key rate in quantum key distribution (QKD) protocols that use only
unidirectional classical communication during the public-discussion phase. This
method is based on a necessary precondition for one-way secret key
distillation; the legitimate users need to prove that there exists no quantum
state having a symmetric extension that is compatible with the available
measurements results. The main advantage of the obtained upper bound is that it
can be formulated as a semidefinite program, which can be efficiently solved.
We illustrate our results by analysing two well-known qubit-based QKD
protocols: the four-state protocol and the six-state protocol. Recent results
by Renner et al., Phys. Rev. A 72, 012332 (2005), also show that the given
precondition is only necessary but not sufficient for unidirectional secret key
distillation.Comment: 11 pages, 1 figur
- …