216 research outputs found
Quantum Key Distribution using Multilevel Encoding: Security Analysis
We present security proofs for a protocol for Quantum Key Distribution (QKD)
based on encoding in finite high-dimensional Hilbert spaces. This protocol is
an extension of Bennett's and Brassard's basic protocol from two bases, two
state encoding to a multi bases, multi state encoding. We analyze the mutual
information between the legitimate parties and the eavesdropper, and the error
rate, as function of the dimension of the Hilbert space, while considering
optimal incoherent and coherent eavesdropping attacks. We obtain the upper
limit for the legitimate party error rate to ensure unconditional security when
the eavesdropper uses incoherent and coherent eavesdropping strategies. We have
also consider realistic noise caused by detector's noise.Comment: 8 pages, 3 figures, REVTe
Geometric Quantum Computation
We describe in detail a general strategy for implementing a conditional
geometric phase between two spins. Combined with single-spin operations, this
simple operation is a universal gate for quantum computation, in that any
unitary transformation can be implemented with arbitrary precision using only
single-spin operations and conditional phase shifts. Thus quantum geometrical
phases can form the basis of any quantum computation. Moreover, as the induced
conditional phase depends only on the geometry of the paths executed by the
spins it is resilient to certain types of errors and offers the potential of a
naturally fault-tolerant way of performing quantum computation.Comment: 15 pages, LaTeX, uses cite, eepic, epsfig, graphicx and amsfonts.
Accepted by J. Mod. Op
Gastric Inflammatory Fibroid Polyp Treated by Endoscopic Submucosal Dissection
The endoscopic examination of a 64-year-old male patient revealed a gastric submucosal tumor in the anterior wall of the gastric antrum. The lesion increased in diameter to 25 mm and was resected completely with endoscopic submucosal dissection (ESD). Histological examination of the submucosal tumor gave a diagnosis of an inflammatory fibroid polyp (IFP). It is suggested that ESD may be an effective and safe therapy for gastric submucosal tumors
General theory for decoy-state quantum key distribution with arbitrary number of intensities
We develop a general theory for quantum key distribution (QKD) in both the
forward error correction and the reverse error correction cases when the QKD
system is equipped with phase-randomized coherent light with arbitrary number
of decoy intensities. For this purpose, generalizing Wang's expansion, we
derive a convex expansion of the phase-randomized coherent state. We also
numerically check that the asymptotic key generation rates are almost saturated
when the number of decoy intensities is three.Comment: This manuscript has been revised extensivel
Chemotherapeutic Treatment of Priapism in Metastatic Rectal Cancer
A 65-year-old man was admitted with penile tenderness and dysuria due to priapism. Enhanced computed tomography revealed metastatic tumors in the liver, lung, sacrum and lymph nodes. Advanced rectal cancer, detected by colonoscopy as a primary tumor, was treated with chemotherapy (FOLFOX4). Although the rectal cancer showed no change, five months of chemotherapy improveid the priapism, suggesting that chemotherapy can improve rare symptoms of rectal cancer
Tight Finite-Key Analysis for Quantum Cryptography
Despite enormous progress both in theoretical and experimental quantum
cryptography, the security of most current implementations of quantum key
distribution is still not established rigorously. One of the main problems is
that the security of the final key is highly dependent on the number, M, of
signals exchanged between the legitimate parties. While, in any practical
implementation, M is limited by the available resources, existing security
proofs are often only valid asymptotically for unrealistically large values of
M. Here, we demonstrate that this gap between theory and practice can be
overcome using a recently developed proof technique based on the uncertainty
relation for smooth entropies. Specifically, we consider a family of
Bennett-Brassard 1984 quantum key distribution protocols and show that security
against general attacks can be guaranteed already for moderate values of M.Comment: 11 pages, 2 figure
A Two-Step Quantum Direct Communication Protocol Using Einstein-Podolsky-Rosen Pair Block
A protocol for quantum secure direct communication using blocks of EPR pairs
is proposed. A set of ordered EPR pairs is used as a data block for sending
secret message directly. The ordered EPR set is divided into two particle
sequences, a checking sequence and a message-coding sequence. After
transmitting the checking sequence, the two parties of communication check
eavesdropping by measuring a fraction of particles randomly chosen, with random
choice of two sets of measuring bases. After insuring the security of the
quantum channel, the sender, Alice encodes the secret message directly on the
message-coding sequence and send them to Bob. By combining the checking and
message-coding sequences together, Bob is able to read out the encoded messages
directly. The scheme is secure because an eavesdropper cannot get both
sequences simultaneously. We also discuss issues in a noisy channel.Comment: 8 pages and 2 figures. To appear in Phys Rev
- …