2,681 research outputs found

    Solar neutrino interactions: Using charged currents at SNO to tell neutral currents at Super-Kamiokande

    Get PDF
    In the presence of flavor oscillations, muon and tau neutrinos can contribute to the Super-Kamiokande (SK) solar neutrino signal through the neutral current process \nu_{\mu,\tau} e^{-}\to \nu_{\mu,\tau} e^{-}. We show how to separate the \nu_e and \nu_{\mu,\tau} event rates in SK in a model independent way, by using the rate of the charged current process \nu_e d \to p p e^{-} from the Sudbury Neutrino Observatory (SNO) experiment, with an appropriate choice of the SK and SNO energy thresholds. Under the additional hypothesis of no oscillations into sterile states, we also show how to determine the absolute ^{8}B neutrino flux from the same data set, independently of the \nu_e survival probability.Comment: 14 pages (RevTeX), incl. 3 figures (epsf), submitted to Phys. ReV.

    Security proof of a three-state quantum key distribution protocol without rotational symmetry

    Get PDF
    Standard security proofs of quantum key distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states, |0_z> and |1_z>, can contribute to key generation and the third state, |+>=(|0_z>+|1_z>)/\sqrt{2}, is for channel estimation. This protocol has been proposed and implemented experimentally in some frequency-based QKD systems where the three states can be prepared easily. Thus, by founding on the security of this three-state protocol, we prove that these QKD schemes are, in fact, unconditionally secure against any attacks allowed by quantum mechanics. The main task in our proof is to upper bound the phase error rate of the qubits given the bit error rates observed. Unconditional security can then be proved not only for the ideal case of a single-photon source and perfect detectors, but also for the realistic case of a phase-randomized weak coherent light source and imperfect threshold detectors. Our result on the phase error rate upper bound is independent of the loss in the channel. Also, we compare the three-state protocol with the BB84 protocol. For the single-photon source case, our result proves that the BB84 protocol strictly tolerates a higher quantum bit error rate than the three-state protocol; while for the coherent-source case, the BB84 protocol achieves a higher key generation rate and secure distance than the three-state protocol when a decoy-state method is used.Comment: 10 pages, 3 figures, 2 column

    Upper bounds for the secure key rate of decoy state quantum key distribution

    Full text link
    The use of decoy states in quantum key distribution (QKD) has provided a method for substantially increasing the secret key rate and distance that can be covered by QKD protocols with practical signals. The security analysis of these schemes, however, leaves open the possibility that the development of better proof techniques, or better classical post-processing methods, might further improve their performance in realistic scenarios. In this paper, we derive upper bounds on the secure key rate for decoy state QKD. These bounds are based basically only on the classical correlations established by the legitimate users during the quantum communication phase of the protocol. The only assumption about the possible post-processing methods is that double click events are randomly assigned to single click events. Further we consider only secure key rates based on the uncalibrated device scenario which assigns imperfections such as detection inefficiency to the eavesdropper. Our analysis relies on two preconditions for secure two-way and one-way QKD: The legitimate users need to prove that there exists no separable state (in the case of two-way QKD), or that there exists no quantum state having a symmetric extension (one-way QKD), that is compatible with the available measurements results. Both criteria have been previously applied to evaluate single-photon implementations of QKD. Here we use them to investigate a realistic source of weak coherent pulses. The resulting upper bounds can be formulated as a convex optimization problem known as a semidefinite program which can be efficiently solved. For the standard four-state QKD protocol, they are quite close to known lower bounds, thus showing that there are clear limits to the further improvement of classical post-processing techniques in decoy state QKD.Comment: 10 pages, 3 figure

    Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems

    Full text link
    Quantum key distribution (QKD) systems can send signals over more than 100 km standard optical fiber and are widely believed to be secure. Here, we show experimentally for the first time a technologically feasible attack, namely the time-shift attack, against a commercial QKD system. Our result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability (~4%) to break the security of the system. Eve's success is due to the well-known detection efficiency loophole in the experimental testing of Bell inequalities. Therefore, the detection efficiency loophole plays a key role not only in fundamental physics, but also in technological applications such as QKD.Comment: 5 pages, 3 figures. Substantially revised versio

    Heterozygosity at Gm Loci Associated with Humoral Immunity to Osteosarcoma

    Get PDF
    Familial clustering of osteosarcoma suggests the involvement of genetic factors (1, 2), and the demonstration of a high incidence of osteosarcoma-specific antibodies (3, 4), as well as tumor-specific cell-mediated immunity (5) in patients and their relatives, indicates the involvement of immunological factors in the pathogenesis of this disease. Certain Gm allotypes (genetic markers of IgG) have been shown to be associated with a high relative risk of some forms of cancer. For instance, in Caucasians an unusual Gm haplotype--Gm 1,3;5,13,14--has been found to be associated with neuroblastoma (6), and an increased frequency of Gm (2) has been reported in patients with malignant melanoma (7, 8). A recent report has shown an association of the Gm 1,2; 13,15,16,21 phenotype with lung cancer and primary hepatoma in the Japanese (9). To our knowledge, however, the possible role of Gm allotypes in predisposition to osteosarcoma has not been examined. Immune responsiveness to a variety of antigens in both experimental animals and humans has been shown to be controlled either by major histocompatibility complex (MHC)-linked immune response (Ir) genes or by allotype-linked Ir genes (10-13). In some instances an interactive effect of these two unlinked genetic systems has been observed (12). It is possible that MHC-linked or allotype-linked Ir genes may also influence humoral immunity to tumor antigens. In this report we present evidence for complementary Ir genes controlling immune responses to osteosarcoma-associated antigens (OSAA)

    Higgs particle detection using jets

    Full text link
    We study the possibility of detecting the Higgs boson in the intermediate mass range via its two jet channel. We consider only Higgs bosons produced in association with a ttˉt \bar{t} pair. Both tt and tˉ\bar{t} are required to decay semileptonically to reduce the QCD background. The signal is compared with the main background, ttˉ+2t \bar{t} + 2 jets, after appropriate cuts. A sizable signal above background is seen in our simulation at the parton level. Use of the ttˉZt\bar{t}Z channel with Z Z decaying to l+ll^+ l^- is suggested for eliminating theoretical uncertainties in determining the ttˉHt \bar{t}H signal.Comment: 10 pages, Fig.1 a,b,c,d(surve on request), plain tex, PVAM-HEP-93-
    corecore