35,087 research outputs found

    A proposal for founding mistrustful quantum cryptography on coin tossing

    Full text link
    A significant branch of classical cryptography deals with the problems which arise when mistrustful parties need to generate, process or exchange information. As Kilian showed a while ago, mistrustful classical cryptography can be founded on a single protocol, oblivious transfer, from which general secure multi-party computations can be built. The scope of mistrustful quantum cryptography is limited by no-go theorems, which rule out, inter alia, unconditionally secure quantum protocols for oblivious transfer or general secure two-party computations. These theorems apply even to protocols which take relativistic signalling constraints into account. The best that can be hoped for, in general, are quantum protocols computationally secure against quantum attack. I describe here a method for building a classically certified bit commitment, and hence every other mistrustful cryptographic task, from a secure coin tossing protocol. No security proof is attempted, but I sketch reasons why these protocols might resist quantum computational attack.Comment: Title altered in deference to Physical Review's fear of question marks. Published version; references update

    p-topological and p-regular: dual notions in convergence theory

    Full text link
    The natural duality between "topological" and "regular," both considered as convergence space properties, extends naturally to p-regular convergence spaces, resulting in the new concept of a p-topological convergence space. Taking advantage of this duality, the behavior of p-topological and p-regular convergence spaces is explored, with particular emphasis on the former, since they have not been previously studied. Their study leads to the new notion of a neighborhood operator for filters, which in turn leads to an especially simple characterization of a topology in terms of convergence criteria. Applications include the topological and regularity series of a convergence space.Comment: 12 pages in Acrobat 3.0 PDF forma

    Bond–slip Behavior of Fiber-reinforced Polymer/concrete Interface in Single Shear Pull-out and Beam Tests

    Get PDF
    It has been assumed that the fiber-reinforced polymer/concrete interface is subjected to in-plane shear condition when intermediate crack debonding failure occurs. Therefore, the single shear pull-out test results are often used to predict the intermediate crack debonding failure in beams. In this study, the behavior of fiber-reinforced polymer-strengthened concrete beams and single shear pull-out specimens were studied experimentally and numerically. The bond–slip behavior of the fiber-reinforced polymer/concrete interface was obtained by single shear pull-out and beam tests. In all beam specimens, a concrete wedge located at the edge of the notch detached with the fiber-reinforced polymer debonding failure. This phenomenon shows that the initiation of debonding is due to a diagonal crack formation close to the major flexural/shear crack inside the concrete. The diagonal crack formation is due to a local moment at the tip of the notch. This causes the different stress state and slip of the fiber-reinforced polymer/concrete interface of beam specimens from that of the pull-out specimens. It is found that the bond–slip relation obtained from the pull-out test does not represent the bond–slip relation of the fiber-reinforced polymer/concrete interface in the fiber-reinforced polymer-strengthened concrete beams, and it cannot be directly used for predicting the load capacity of the fiber-reinforced polymer-strengthened concrete beams

    Attrition in Information Dissemination Relationships with Industry

    Get PDF
    Factors affecting continued technical information service subscription to the NASA regional dissemination cente

    Efficient quantum key distribution secure against no-signalling eavesdroppers

    Get PDF
    By carrying out measurements on entangled states, two parties can generate a secret key which is secure not only against an eavesdropper bound by the laws of quantum mechanics, but also against a hypothetical "post-quantum" eavesdroppers limited by the no-signalling principle only. We introduce a family of quantum key distribution protocols of this type, which are more efficient than previous ones, both in terms of key rate and noise resistance. Interestingly, the best protocols involve large number of measurements. We show that in the absence of noise, these protocols can yield one secret bit per entanglement bit, implying that the key rates in the no-signalling post-quantum scenario are comparable to the key rates in usual quantum key distribution.Comment: 11 pages, 2 color figures. v2: minor modifications, added references, added note on the relation to quant-ph/060604

    Development and validation of 'AutoRIF': Software for the automated analysis of radiation-induced foci

    Get PDF
    Copyright @ 2012 McVean et al; licensee BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.This article has been made available through the Brunel Open Access Publishing Fund.Background: The quantification of radiation-induced foci (RIF) to investigate the induction and subsequent repair of DNA double strands breaks is now commonplace. Over the last decade systems specific for the automatic quantification of RIF have been developed for this purpose, however to ask more mechanistic questions on the spatio-temporal aspects of RIF, an automated RIF analysis platform that also quantifies RIF size/volume and relative three-dimensional (3D) distribution of RIF within individual nuclei, is required. Results: A java-based image analysis system has been developed (AutoRIF) that quantifies the number, size/volume and relative nuclear locations of RIF within 3D nuclear volumes. Our approach identifies nuclei using the dynamic Otsu threshold and RIF by enhanced Laplacian filtering and maximum entropy thresholding steps and, has an application ‘batch optimisation’ process to ensure reproducible quantification of RIF. AutoRIF was validated by comparing output against manual quantification of the same 2D and 3D image stacks with results showing excellent concordance over a whole range of sample time points (and therefore range of total RIF/nucleus) after low-LET radiation exposure. Conclusions: This high-throughput automated RIF analysis system generates data with greater depth of information and reproducibility than that which can be achieved manually and may contribute toward the standardisation of RIF analysis. In particular, AutoRIF is a powerful tool for studying spatio-temporal relationships of RIF using a range of DNA damage response markers and can be run independently of other software, enabling most personal computers to perform image analysis. Future considerations for AutoRIF will likely include more complex algorithms that enable multiplex analysis for increasing combinations of cellular markers.This article is made available through the Brunel Open Access Publishing Fund
    corecore