216 research outputs found

    Quantum Key Distribution using Multilevel Encoding: Security Analysis

    Get PDF
    We present security proofs for a protocol for Quantum Key Distribution (QKD) based on encoding in finite high-dimensional Hilbert spaces. This protocol is an extension of Bennett's and Brassard's basic protocol from two bases, two state encoding to a multi bases, multi state encoding. We analyze the mutual information between the legitimate parties and the eavesdropper, and the error rate, as function of the dimension of the Hilbert space, while considering optimal incoherent and coherent eavesdropping attacks. We obtain the upper limit for the legitimate party error rate to ensure unconditional security when the eavesdropper uses incoherent and coherent eavesdropping strategies. We have also consider realistic noise caused by detector's noise.Comment: 8 pages, 3 figures, REVTe

    Geometric Quantum Computation

    Get PDF
    We describe in detail a general strategy for implementing a conditional geometric phase between two spins. Combined with single-spin operations, this simple operation is a universal gate for quantum computation, in that any unitary transformation can be implemented with arbitrary precision using only single-spin operations and conditional phase shifts. Thus quantum geometrical phases can form the basis of any quantum computation. Moreover, as the induced conditional phase depends only on the geometry of the paths executed by the spins it is resilient to certain types of errors and offers the potential of a naturally fault-tolerant way of performing quantum computation.Comment: 15 pages, LaTeX, uses cite, eepic, epsfig, graphicx and amsfonts. Accepted by J. Mod. Op

    Gastric Inflammatory Fibroid Polyp Treated by Endoscopic Submucosal Dissection

    Get PDF
    The endoscopic examination of a 64-year-old male patient revealed a gastric submucosal tumor in the anterior wall of the gastric antrum. The lesion increased in diameter to 25 mm and was resected completely with endoscopic submucosal dissection (ESD). Histological examination of the submucosal tumor gave a diagnosis of an inflammatory fibroid polyp (IFP). It is suggested that ESD may be an effective and safe therapy for gastric submucosal tumors

    General theory for decoy-state quantum key distribution with arbitrary number of intensities

    Full text link
    We develop a general theory for quantum key distribution (QKD) in both the forward error correction and the reverse error correction cases when the QKD system is equipped with phase-randomized coherent light with arbitrary number of decoy intensities. For this purpose, generalizing Wang's expansion, we derive a convex expansion of the phase-randomized coherent state. We also numerically check that the asymptotic key generation rates are almost saturated when the number of decoy intensities is three.Comment: This manuscript has been revised extensivel

    Chemotherapeutic Treatment of Priapism in Metastatic Rectal Cancer

    Get PDF
    A 65-year-old man was admitted with penile tenderness and dysuria due to priapism. Enhanced computed tomography revealed metastatic tumors in the liver, lung, sacrum and lymph nodes. Advanced rectal cancer, detected by colonoscopy as a primary tumor, was treated with chemotherapy (FOLFOX4). Although the rectal cancer showed no change, five months of chemotherapy improveid the priapism, suggesting that chemotherapy can improve rare symptoms of rectal cancer

    Tight Finite-Key Analysis for Quantum Cryptography

    Get PDF
    Despite enormous progress both in theoretical and experimental quantum cryptography, the security of most current implementations of quantum key distribution is still not established rigorously. One of the main problems is that the security of the final key is highly dependent on the number, M, of signals exchanged between the legitimate parties. While, in any practical implementation, M is limited by the available resources, existing security proofs are often only valid asymptotically for unrealistically large values of M. Here, we demonstrate that this gap between theory and practice can be overcome using a recently developed proof technique based on the uncertainty relation for smooth entropies. Specifically, we consider a family of Bennett-Brassard 1984 quantum key distribution protocols and show that security against general attacks can be guaranteed already for moderate values of M.Comment: 11 pages, 2 figure

    A Two-Step Quantum Direct Communication Protocol Using Einstein-Podolsky-Rosen Pair Block

    Full text link
    A protocol for quantum secure direct communication using blocks of EPR pairs is proposed. A set of ordered NN EPR pairs is used as a data block for sending secret message directly. The ordered NN EPR set is divided into two particle sequences, a checking sequence and a message-coding sequence. After transmitting the checking sequence, the two parties of communication check eavesdropping by measuring a fraction of particles randomly chosen, with random choice of two sets of measuring bases. After insuring the security of the quantum channel, the sender, Alice encodes the secret message directly on the message-coding sequence and send them to Bob. By combining the checking and message-coding sequences together, Bob is able to read out the encoded messages directly. The scheme is secure because an eavesdropper cannot get both sequences simultaneously. We also discuss issues in a noisy channel.Comment: 8 pages and 2 figures. To appear in Phys Rev
    corecore