367 research outputs found

    Practical quantum cryptography for secure free-space communications

    Get PDF
    Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation over a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.Comment: 12 pages, 4 figure

    Risk Factors for End Stage Renal Disease in Non-WT1-Syndromic Wilms Tumor

    Get PDF
    PURPOSE: We assessed risk factors for end stage renal disease in patients with Wilms tumor without known WT1 related syndromes. We hypothesized that patients with characteristics suggestive of a WT1 etiology (early onset, stromal predominant histology, intralobar nephrogenic rests) would have a higher risk of end stage renal disease due to chronic renal failure. We predicted a high risk of end stage renal disease due to progressive bilateral Wilms tumor in patients with metachronous bilateral disease. MATERIALS AND METHODS: End stage renal disease was ascertained in 100 of 7,950 nonsyndromic patients enrolled in a National Wilms Tumor Study during 1969 to 2002. Risk factors were evaluated with cumulative incidence curves and proportional hazard regressions. RESULTS: The cumulative incidence of end stage renal disease due to chronic renal failure 20 years after Wilms tumor diagnosis was 0.7%. For end stage renal disease due to progressive bilateral Wilms tumor the incidence was 4.0% at 3 years after diagnosis in patients with synchronous bilateral Wilms tumor and 19.3% in those with metachronous bilateral Wilms tumor. For end stage renal disease due to chronic renal failure stromal predominant histology had a HR of 6.4 relative to mixed (95% CI 3.4, 11.9; p<0.001), intralobar rests had a HR of 5.9 relative to no rests (95% CI 2.0, 17.3; p=0.001), and Wilms tumor diagnosis at less than 24 months had a HR of 1.7 relative to 24 to 48 months and 2.8 relative to greater than 48 months (p=0.003 for trend). CONCLUSIONS: Metachronous bilateral Wilms tumor is associated with high rates of end stage renal disease due to surgery for progressive Wilms tumor. Characteristics associated with a WT1 etiology markedly increased the risk of end stage renal disease due to chronic renal failure despite the low risk in non-WT1 syndromic cases overall

    The Reproducibility of Lists of Differentially Expressed Genes in Microarray Studies

    Get PDF
    Reproducibility is a fundamental requirement in scientific experiments and clinical contexts. Recent publications raise concerns about the reliability of microarray technology because of the apparent lack of agreement between lists of differentially expressed genes (DEGs). In this study we demonstrate that (1) such discordance may stem from ranking and selecting DEGs solely by statistical significance (P) derived from widely used simple t-tests; (2) when fold change (FC) is used as the ranking criterion, the lists become much more reproducible, especially when fewer genes are selected; and (3) the instability of short DEG lists based on P cutoffs is an expected mathematical consequence of the high variability of the t-values. We recommend the use of FC ranking plus a non-stringent P cutoff as a baseline practice in order to generate more reproducible DEG lists. The FC criterion enhances reproducibility while the P criterion balances sensitivity and specificity

    Secure communications using quantum cryptography

    Get PDF
    The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal single-photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. In our optical fiber experiment we have performed quantum key distribution over 24-km of underground optical fiber using single-photon interference states, demonstrating that secure, real-time key generation over {open_quotes}open{close_quotes} multi-km node-to-node optical fiber communications links is possible. We have also constructed a quantum key distribution system for free-space, line-of-sight transmission using single-photon polarization states, which is currently undergoing laboratory testing. 7 figs
    • …
    corecore