1,244 research outputs found

    Monensin and brefeldin A differentially affect the phosphorylation and sulfation of secretory proteins.

    Get PDF
    Chromogranin B and secretogranin II, two members of the granin family, are known to be post-translationally modified by the addition of O-linked carbohydrates to serine and/or threonine, phosphate to serine and threonine, and sulfate to carbohydrate and tyrosine residues. In the present study, chromogranin B and secretogranin II were used as model proteins to investigate in which subcompartment of the Golgi complex secretory proteins become phosphorylated. Monensin, a drug known to block the transport from the medial to the trans cisternae of the Golgi stack, inhibited the phosphorylation of the granins, indicating that this modification occurred distal to the medial Golgi. Monensin also blocked the addition of galactose to O-linked carbohydrates and the sulfation of the granins, confirming previous data that these modifications take place in the trans Golgi. To distinguish, within the trans Golgi, between the trans cisternae of the Golgi stack and the trans Golgi network, we made use of the previous observation that brefeldin A results in the redistribution to the endoplasmic reticulum of membrane-bound enzymes of the trans cisternae of the Golgi stack, but not of the trans Golgi network. Brefeldin A treatment abolished granin sulfation but resulted in the accumulation of phosphorylated and galactosylated granins. Differential effects of brefeldin A on membranes of the Golgi stack versus the trans Golgi network were also observed by immunofluorescence analysis of marker proteins specific for either compartment. Our results suggest that the phosphorylation of secretory proteins, like their galactosylation, largely occurs in the trans cisternae of the Golgi stack, whereas the sulfation of secretory proteins on both carbohydrate and tyrosine residues takes place selectively in the trans Golgi network

    Estimates for practical quantum cryptography

    Get PDF
    In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is complete as far as the use of single photons as signal states is concerned. Emphasis is given to the practicability of the resulting protocol. For each run of the quantum key distribution the security statement gives the probability of a successful key generation and the probability for an eavesdropper's knowledge, measured as change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio

    Oscillator model for dissipative QED in an inhomogeneous dielectric

    Full text link
    The Ullersma model for the damped harmonic oscillator is coupled to the quantised electromagnetic field. All material parameters and interaction strengths are allowed to depend on position. The ensuing Hamiltonian is expressed in terms of canonical fields, and diagonalised by performing a normal-mode expansion. The commutation relations of the diagonalising operators are in agreement with the canonical commutation relations. For the proof we replace all sums of normal modes by complex integrals with the help of the residue theorem. The same technique helps us to explicitly calculate the quantum evolution of all canonical and electromagnetic fields. We identify the dielectric constant and the Green function of the wave equation for the electric field. Both functions are meromorphic in the complex frequency plane. The solution of the extended Ullersma model is in keeping with well-known phenomenological rules for setting up quantum electrodynamics in an absorptive and spatially inhomogeneous dielectric. To establish this fundamental justification, we subject the reservoir of independent harmonic oscillators to a continuum limit. The resonant frequencies of the reservoir are smeared out over the real axis. Consequently, the poles of both the dielectric constant and the Green function unite to form a branch cut. Performing an analytic continuation beyond this branch cut, we find that the long-time behaviour of the quantised electric field is completely determined by the sources of the reservoir. Through a Riemann-Lebesgue argument we demonstrate that the field itself tends to zero, whereas its quantum fluctuations stay alive. We argue that the last feature may have important consequences for application of entanglement and related processes in quantum devices.Comment: 24 pages, 1 figur

    Experimental Demonstration of Optimal Unambiguous State Discrimination

    Get PDF
    We present the first full demonstration of unambiguous state discrimination between non-orthogonal quantum states. Using a novel free space interferometer we have realised the optimum quantum measurement scheme for two non-orthogonal states of light, known as the Ivanovic-Dieks-Peres (IDP) measurement. We have for the first time gained access to all three possible outcomes of this measurement. All aspects of this generalised measurement scheme, including its superiority over a standard von Neumann measurement, have been demonstrated within 1.5% of the IDP predictions

    Tyrosine sulfation is a trans-Golgi-specific protein modification.

    Full text link

    Security against eavesdropping in quantum cryptography

    Get PDF
    In this article we deal with the security of the BB84 quantum cryptography protocol over noisy channels using generalized privacy amplification. For this we estimate the fraction of bits needed to be discarded during the privacy amplification step. This estimate is given for two scenarios, both of which assume the eavesdropper to access each of the signals independently and take error correction into account. One scenario does not allow a delay of the eavesdropper's measurement of a measurement probe until he receives additional classical information. In this scenario we achieve a sharp bound. The other scenario allows a measurement delay, so that the general attack of an eavesdropper on individual signals is covered. This bound is not sharp but allows a practical implementation of the protocol.Comment: 11 pages including 3 figures, contains new results not contained in my Phys. Rev. A pape

    ``Plug and play'' systems for quantum cryptography

    Get PDF
    We present a time-multiplexed interferometer based on Faraday mirrors, and apply it to quantum key distribution. The interfering pulses follow exactly the same spatial path, ensuring very high stability and self balancing. Use of Faraday mirrors compensates automatically any birefringence effects and polarization dependent losses in the transmitting fiber. First experimental results show a fringe visibility of 0.9984 for a 23km-long interferometer, based on installed telecom fibers.Comment: LaTex, 6 pages, with 2 Postscript figures, Submitted to Applied Physics Letter
    corecore