400 research outputs found

    Attacks on quantum key distribution protocols that employ non-ITS authentication

    Full text link
    We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced it was shown to prevent straightforward Man-In-The-Middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols we describe every single action taken by the adversary. For all protocols the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD-postprocessing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.Comment: 34 page

    Estimates for practical quantum cryptography

    Get PDF
    In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is complete as far as the use of single photons as signal states is concerned. Emphasis is given to the practicability of the resulting protocol. For each run of the quantum key distribution the security statement gives the probability of a successful key generation and the probability for an eavesdropper's knowledge, measured as change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio

    Quantum Nonlocality without Entanglement

    Get PDF
    We exhibit an orthogonal set of product states of two three-state particles that nevertheless cannot be reliably distinguished by a pair of separated observers ignorant of which of the states has been presented to them, even if the observers are allowed any sequence of local operations and classical communication between the separate observers. It is proved that there is a finite gap between the mutual information obtainable by a joint measurement on these states and a measurement in which only local actions are permitted. This result implies the existence of separable superoperators that cannot be implemented locally. A set of states are found involving three two-state particles which also appear to be nonmeasurable locally. These and other multipartite states are classified according to the entropy and entanglement costs of preparing and measuring them by local operations.Comment: 27 pages, Latex, 6 ps figures. To be submitted to Phys. Rev. A. Version 2: 30 pages, many small revisions and extensions, author added. Version 3: Proof in Appendix D corrected, many small changes; final version for Phys. Rev. A Version 4: Report of Popescu conjecture modifie

    IPCP: Immersive Parallel Coordinates Plots for Engineering Design Processes

    Get PDF
    Computational engineering design methods and tools are common practice in modern industry. Such approaches are integral in enabling designers to efficiently explore larger and more complex design spaces. However, at the same time, computational engineering design methods tend to dramatically increase the number of candidate solutions that decision-makers must interpret in order to make appropriate choices within a set of solutions. Since all candidate solutions can be represented in digital form together with their assessment criteria, evaluated according to some sort of simulation model, a natural way to explore and understand the complexities of the design problem is to visualize their multidimensional nature. The task now involves the discovery of patterns and trends within the multidimensional design space. In this work, we aim to enhance the design decision-making process by embedding visual analytics into an immersive virtual reality environment. To this end, we present a system called IPCP: immersive parallel coordinates plots. IPCP combines the well-established parallel coordinates visualization technique for high-dimensional data with immersive virtual reality. We propose this approach in order to exploit and discover efficient means to use new technology within a conventional decision-making process. The aim is to provide benefits by enhancing visualizations of 3D geometry and other physical quantities with scientific information. We present the design of this system, which allows the representation and exploration of multidimensional scientific datasets. A qualitative evaluation with two surrogate expert users, knowledgeable in multidimensional data analysis, demonstrate that the system can be used successfully to detect both known and previously unknown patterns in a real-world test dataset, producing an early indicative validation of its suitability for decision support in engineering design processes.Cambridge European and Trinity Hall; Engineering and Physical Sciences Research Council (EPSRC-1788814

    Daylight quantum key distribution over 1.6 km

    Get PDF
    Quantum key distribution (QKD) has been demonstrated over a point-to-point 1.6\sim1.6-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.Comment: 4 pages, 2 figures, 1 table. Submitted to PRL on 14 January 2000 for publication consideratio

    Data visualization in yield component analysis: an expert study

    Get PDF
    Even though data visualization is a common analytical tool in numerous disciplines, it has rarely been used in agricultural sciences, particularly in agronomy. In this paper, we discuss a study on employing data visualization to analyze a multiplicative model. This model is often used by agronomists, for example in the so-called yield component analysis. The multiplicative model in agronomy is normally analyzed by statistical or related methods. In practice, unfortunately, usefulness of these methods is limited since they help to answer only a few questions, not allowing for a complex view of the phenomena studied. We believe that data visualization could be used for such complex analysis and presentation of the multiplicative model. To that end, we conducted an expert survey. It showed that visualization methods could indeed be useful for analysis and presentation of the multiplicative model

    The effects of an 8-week mindful eating intervention on anticipatory reward responses in striatum and midbrain

    Get PDF
    IntroductionAccumulating evidence suggests that increased neural responses during the anticipation of high-calorie food play an important role in the tendency to overeat. A promising method for counteracting enhanced food anticipation in overeating might be mindfulness-based interventions (MBIs). However, the neural mechanisms by which MBIs can affect food reward anticipation are unclear. In this randomized, actively controlled study, the primary objective was to investigate the effect of an 8-week mindful eating intervention on reward anticipation. We hypothesized that mindful eating would decrease striatal reward anticipation responses. Additionally, responses in the midbrain—from which the reward pathways originate—were explored.MethodsUsing functional magnetic resonance imaging (fMRI), we tested 58 healthy participants with a wide body mass index range (BMI: 19–35 kg/m2), motivated to change their eating behavior. During scanning they performed an incentive delay task, measuring neural reward anticipation responses to caloric and monetary cues before and after 8 weeks of mindful eating or educational cooking (active control).ResultsCompared with the educational cooking intervention, mindful eating affected neural reward anticipation responses, with reduced caloric relative to monetary reward responses. This effect was, however, not seen in the striatum, but only in the midbrain. The secondary objective was to assess temporary and long-lasting (1 year follow-up) intervention effects on self-reported eating behavior and anthropometric measures [BMI, waist circumference, waist-to-hip-ratio (WHR)]. We did not observe effects of the mindful eating intervention on eating behavior. Instead, the control intervention showed temporary beneficial effects on BMI, waist circumference, and diet quality, but not on WHR or self-reported eating behavior, as well as long-lasting increases in knowledge about healthy eating.DiscussionThese results suggest that an 8-week mindful eating intervention may have decreased the relative salience of food cues by affecting midbrain but not striatal reward responses, without necessarily affecting regular eating behavior. However, these exploratory results should be verified in confirmatory research.The primary and secondary objectives of the study were registered in the Dutch Trial Register (NTR): NL4923 (NTR5025)

    Tailoring Adjuvant Endocrine Therapy for Postmenopausal Breast Cancer: A CYP2D6 Multiple-Genotype-Based Modeling Analysis and Validation

    Get PDF
    Purpose: Previous studies have suggested that postmenopausal women with breast cancer who present with wild-type CYP2D6 may actually have similar or superior recurrence-free survival outcomes when given tamoxifen in place of aromatase inhibitors (AIs). The present study established a CYP2D6 multiple-genotype-based model to determine the optimal endocrine therapy for patients harboring wild-type CYP2D6. Methods: We created a Markov model to determine whether tamoxifen or AIs maximized 5-year disease-free survival (DFS) for extensive metabolizer (EM) patients using annual hazard ratio (HR) data from the BIG 1-98 trial. We then replicated the model by evaluating 9-year event-free survival (EFS) using HR data from the ATAC trial. In addition, we employed two-way sensitivity analyses to explore the impact of HR of decreased-metabolizer (DM) and its frequency on survival by studying a range of estimates. Results: The 5-year DFS of tamoxifen-treated EM patients was 83.3%, which is similar to that of genotypically unselected patients who received an AI (83.7%). In the validation study, we further demonstrated that the 9-year EFS of tamoxifentreated EM patients was 81.4%, which is higher than that of genotypically unselected patients receiving tamoxifen (78.4%) and similar to that of patients receiving an AI (83.2%). Two-way sensitivity analyses demonstrated the robustness of the results
    corecore