1,996 research outputs found

    Unambiguous state discrimination in quantum cryptography with weak coherent states

    Full text link
    The use of linearly independent signal states in realistic implementations of quantum key distribution (QKD) enables an eavesdropper to perform unambiguous state discrimination. We explore quantitatively the limits for secure QKD imposed by this fact taking into account that the receiver can monitor to some extend the photon number statistics of the signals even with todays standard detection schemes. We compare our attack to the beamsplitting attack and show that security against beamsplitting attack does not necessarily imply security against the attack considered here.Comment: 10 pages, 6 figures, updated version with added discussion of beamsplitting attac

    Periodic and Quasi-Periodic Compensation Strategies of Extreme Outages caused by Polarization Mode Dispersion and Amplifier Noise

    Full text link
    Effect of birefringent disorder on the Bit Error Rate (BER) in an optical fiber telecommunication system subject to amplifier noise may lead to extreme outages, related to anomalously large values of BER. We analyze the Probability Distribution Function (PDF) of BER for various strategies of Polarization Mode Dispersion (PMD) compensation. A compensation method is proposed that is capable of more efficient extreme outages suppression, which leads to substantial improvement of the fiber system performance.Comment: 3 pages, 1 figure, Submitted to IEEE Photonics Letter

    Estimates for practical quantum cryptography

    Get PDF
    In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is complete as far as the use of single photons as signal states is concerned. Emphasis is given to the practicability of the resulting protocol. For each run of the quantum key distribution the security statement gives the probability of a successful key generation and the probability for an eavesdropper's knowledge, measured as change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio

    Security of quantum cryptography using balanced homodyne detection

    Full text link
    In this paper we investigate the security of a quantum cryptographic scheme which utilizes balanced homodyne detection and weak coherent pulse (WCP). The performance of the system is mainly characterized by the intensity of the WCP and postselected threshold. Two of the simplest intercept/resend eavesdropping attacks are analyzed. The secure key gain for a given loss is also discussed in terms of the pulse intensity and threshold.Comment: RevTeX4, 8pages, 7 figure

    Security against eavesdropping in quantum cryptography

    Get PDF
    In this article we deal with the security of the BB84 quantum cryptography protocol over noisy channels using generalized privacy amplification. For this we estimate the fraction of bits needed to be discarded during the privacy amplification step. This estimate is given for two scenarios, both of which assume the eavesdropper to access each of the signals independently and take error correction into account. One scenario does not allow a delay of the eavesdropper's measurement of a measurement probe until he receives additional classical information. In this scenario we achieve a sharp bound. The other scenario allows a measurement delay, so that the general attack of an eavesdropper on individual signals is covered. This bound is not sharp but allows a practical implementation of the protocol.Comment: 11 pages including 3 figures, contains new results not contained in my Phys. Rev. A pape

    Coherent pulse implementations of quantum cryptography protocols resistant to photon number splitting attacks

    Get PDF
    A new class of quantum cryptography (QC) protocols that are robust against the most general photon number splitting attacks in a weak coherent pulse implementation has been recently proposed. In this article we give a quite exhaustive analysis of several eavesdropping attacks on these schemes. The eavesdropper (Eve) is supposed to have unlimited technological power while the honest parties (Alice and Bob) use present day technology, in particular an attenuated laser as an approximation of a single-photon source. They exploit the nonorthogonality of quantum states for decreasing the information accessible to Eve in the multi-photon pulses accidentally produced by the imperfect source. An implementation of some of these protocols using present day technology allow for a secure key distribution up to distances of \sim 150 km. We also show that strong-pulse implementations, where a strong pulse is included as a reference, allow for key distribution robust against photon number splitting attacks.Comment: 16 pages, 11 figure

    Alternative approach to electromagnetic field quantization in nonlinear and inhomogeneous media

    Full text link
    A simple approach is proposed for the quantization of the electromagnetic field in nonlinear and inhomogeneous media. Given the dielectric function and nonlinear susceptibilities, the Hamiltonian of the electromagnetic field is determined completely by this quantization method. From Heisenberg's equations we derive Maxwell's equations for the field operators. When the nonlinearity goes to zero, this quantization method returns to the generalized canonical quantization procedure for linear inhomogeneous media [Phys. Rev. A, 43, 467, 1991]. The explicit Hamiltonians for the second-order and third-order nonlinear quasi-steady-state processes are obtained based on this quantization procedure.Comment: Corrections in references and introductio

    Unambiguous State Discrimination of Coherent States with Linear Optics: Application to Quantum Cryptography

    Get PDF
    We discuss several methods for unambiguous state discrimination of N symmetric coherent states using linear optics and photodetectors. One type of measurements is shown to be optimal in the limit of small photon numbers for any N. For the special case of N=4 this measurement can be fruitfully used by the receiving end (Bob) in an implementation of the BB84 quantum key distribution protocol using faint laser pulses. In particular, if Bob detects only a single photon the procedure is equivalent to the standard measurement that he would have to perform in a single-photon implementation of BB84, if he detects two photons Bob will unambiguously know the bit sent to him in 50% of the cases without having to exchange basis information, and if three photons are detected, Bob will know unambiguously which quantum state was sent.Comment: 5 RevTeX pages, 2 eps figure

    A dose-dependent plasma signature of the safety and immunogenicity of the rVSV-Ebola vaccine in Europe and Africa.

    Get PDF
    The 2014-2015 Ebola epidemic affected several African countries, claiming more than 11,000 lives and leaving thousands with ongoing sequelae. Safe and effective vaccines could prevent or limit future outbreaks. The recombinant vesicular stomatitis virus-vectored Zaire Ebola (rVSV-ZEBOV) vaccine has shown marked immunogenicity and efficacy in humans but is reactogenic at higher doses. To understand its effects, we examined plasma samples from 115 healthy volunteers from Geneva who received low-dose (LD) or high-dose (HD) vaccine or placebo. Fifteen plasma chemokines/cytokines were assessed at baseline and on days 1, 2 to 3, and 7 after injection. Significant increases in monocyte-mediated MCP-1/CCL2, MIP-1β/CCL4, IL-6, TNF-α, IL-1Ra, and IL-10 occurred on day 1. A signature explaining 68% of cytokine/chemokine vaccine-response variability was identified. Its score was higher in HD versus LD vaccinees and was associated positively with vaccine viremia and negatively with cytopenia. It was higher in vaccinees with injection-site pain, fever, myalgia, chills, and headache; higher scores reflected increasing severity. In contrast, HD vaccinees who subsequently developed arthritis had lower day 1 scores than other HD vaccinees. Vaccine dose did not influence the signature despite its influence on specific outcomes. The Geneva-derived signature associated strongly (ρ = 0.97) with that of a cohort of 75 vaccinees from a parallel trial in Lambaréné, Gabon. Its score in Geneva HD vaccinees with subsequent arthritis was significantly lower than that in Lambaréné HD vaccinees, none of whom experienced arthritis. This signature, which reveals monocytes' critical role in rVSV-ZEBOV immunogenicity and safety across doses and continents, should prove useful in assessments of other vaccines

    miRNAs are essential for survival and differentiation of newborn neurons but not for expansion of neural progenitors during early neurogenesis in the mouse embryonic neocortex

    Get PDF
    Neurogenesis during the development of the mammalian cerebral cortex involves a switch of neural stem and progenitor cells from proliferation to differentiation. To explore the possible role of microRNAs (miRNAs) in this process, we conditionally ablated Dicer in the developing mouse neocortex using Emx1-Cre, which is specifically expressed in the dorsal telencephalon as early as embryonic day (E) 9.5. Dicer ablation in neuroepithelial cells, which are the primary neural stem and progenitor cells, and in the neurons derived from them, was evident from E10.5 onwards, as ascertained by the depletion of the normally abundant miRNAs miR-9 and miR-124. Dicer ablation resulted in massive hypotrophy of the postnatal cortex and death of the mice shortly after weaning. Analysis of the cytoarchitecture of the Dicer-ablated cortex revealed a marked reduction in radial thickness starting at E13.5, and defective cortical layering postnatally. Whereas the former was due to neuronal apoptosis starting at E12.5, which was the earliest detectable phenotype, the latter reflected dramatic impairment of neuronal differentiation. Remarkably, the primary target cells of Dicer ablation, the neuroepithelial cells, and the neurogenic progenitors derived from them, were unaffected by miRNA depletion with regard to cell cycle progression, cell division, differentiation and viability during the early stage of neurogenesis, and only underwent apoptosis starting at E14.5. Our results support the emerging concept that progenitors are less dependent on miRNAs than their differentiated progeny, and raise interesting perspectives as to the expansion of somatic stem cells
    corecore