187 research outputs found
Receptor-phosphoinositidase C coupling Multiple G-proteins?
AbstractRecent evidence has suggested that receptor-mediated phosphoinositide turnover, like that of the adenylate cyclase cAMP pathway, is regulated by guanine nucleotides. It is likely that one or more guanine nucleotide-binding proteins (G-proteins) couple calcium-mobilizing receptors to the activation of phosphoinositidase C. Recent studies utilizing various bacterial toxins have strongly suggested the presence of multiple G-proteins in the regulation of receptor-phosphoinositidase C coupling in a variety of cell types
Quantum coin tossing and bit-string generation in the presence of noise
We discuss the security implications of noise for quantum coin tossing
protocols. We find that if quantum error correction can be used, so that noise
levels can be made arbitrarily small, then reasonable security conditions for
coin tossing can be framed so that results from the noiseless case will
continue to hold. If, however, error correction is not available (as is the
case with present day technology), and significant noise is present, then
tossing a single coin becomes problematic. In this case, we are led to consider
random n-bit string generation in the presence of noise, rather than
single-shot coin tossing. We introduce precise security criteria for n-bit
string generation and describe an explicit protocol that could be implemented
with present day technology. In general, a cheater can exploit noise in order
to bias coins to their advantage. We derive explicit upper bounds on the
average bias achievable by a cheater for given noise levels.Comment: REVTeX. 6 pages, no figures. Early versions contained errors in
statements of security conditions, although results were correct. v4: PRA
versio
Quantum Gambling Using Three Nonorthogonal States
We provide a quantum gambling protocol using three (symmetric) nonorthogonal
states. The bias of the proposed protocol is less than that of previous ones,
making it more practical. We show that the proposed scheme is secure against
non-entanglement attacks. The security of the proposed scheme against
entanglement attacks is shown heuristically.Comment: no essential correction, 4 pages, RevTe
Shor-Preskill Type Security-Proofs for Concatenated Bennett-Brassard 1984 Quantum Key Distribution Protocol
We discuss long code problems in the Bennett-Brassard 1984 (BB84) quantum key
distribution protocol and describe how they can be overcome by concatenation of
the protocol. Observing that concatenated modified Lo-Chau protocol finally
reduces to the concatenated BB84 protocol, we give the unconditional security
of the concatenated BB84 protocol.Comment: 4 pages, RevTe
The Case for Quantum Key Distribution
Quantum key distribution (QKD) promises secure key agreement by using quantum
mechanical systems. We argue that QKD will be an important part of future
cryptographic infrastructures. It can provide long-term confidentiality for
encrypted information without reliance on computational assumptions. Although
QKD still requires authentication to prevent man-in-the-middle attacks, it can
make use of either information-theoretically secure symmetric key
authentication or computationally secure public key authentication: even when
using public key authentication, we argue that QKD still offers stronger
security than classical key agreement.Comment: 12 pages, 1 figure; to appear in proceedings of QuantumComm 2009
Workshop on Quantum and Classical Information Security; version 2 minor
content revision
Recommended from our members
Incompressible SPH method based on Rankine source solution for violent water wave simulation
With wide applications, the smoothed particle hydrodynamics method (abbreviated as SPH) has become an important numerical tool for solving complex flows, in particular those with a rapidly moving free surface. For such problems, the incompressible Smoothed Particle Hydrodynamics (ISPH) has been shown to yield better and more stable pressure time histories than the traditional SPH by many papers in literature. However, the existing ISPH method directly approximates the second order derivatives of the functions to be solved by using the Poisson equation. The order of accuracy of the method becomes low, especially when particles are distributed in a disorderly manner, which generally happens for modelling violent water waves. This paper introduces a new formulation using the Rankine source solution. In the new approach to the ISPH, the Poisson equation is first transformed into another form that does not include any derivative of the functions to be solved, and as a result, does not need to numerically approximate derivatives. The advantage of the new approach without need of numerical approximation of derivatives is obvious, potentially leading to a more robust numerical method. The newly formulated method is tested by simulating various water waves, and its convergent behaviours are numerically studied in this paper. Its results are compared with experimental data in some cases and reasonably good agreement is achieved. More importantly, numerical results clearly show that the newly developed method does need less number of particles and so less computational costs to achieve the similar level of accuracy, or to produce more accurate results with the same number of particles compared with the traditional SPH and existing ISPH when it is applied to modelling water waves
The Yuan-Tseh Lee Array for Microwave Background Anisotropy
The Yuan-Tseh Lee Array for Microwave Background Anisotropy (AMiBA) is the
first interferometer dedicated to studying the cosmic microwave background
(CMB) radiation at 3mm wavelength. The choice of 3mm was made to minimize the
contributions from foreground synchrotron radiation and Galactic dust emission.
The initial configuration of seven 0.6m telescopes mounted on a 6-m hexapod
platform was dedicated in October 2006 on Mauna Loa, Hawaii. Scientific
operations began with the detection of a number of clusters of galaxies via the
thermal Sunyaev-Zel'dovich effect. We compare our data with Subaru weak lensing
data in order to study the structure of dark matter. We also compare our data
with X-ray data in order to derive the Hubble constant.Comment: accepted for publication in ApJ (13 pages, 7 figures); a version with
high resolution figures available at
http://www.asiaa.sinica.edu.tw/~keiichi/upfiles/AMiBA7/pho_highreso.pd
Surgical treatment of patients with acute cholecystitis: Tokyo Guidelines
Cholecystectomy has been widely performed in the treatment of acute cholecystitis, and laparoscopic cholecystectomy has been increasingly adopted as the method of surgery over the past 15 years. Despite the success of laparoscopic cholecystectomy as an elective treatment for symptomatic gallstones, acute cholecystitis was initially considered a contraindication for laparoscopic cholecystectomy. The reasons for it being considered a contraindication were the technical difficulty of performing it in acute cholecystitis and the development of complications, including bile duct injury, bowel injury, and hepatic injury. However, laparoscopic cholecystectomy is now accepted as being safe for acute cholecystitis, when surgeons who are expert at the laparoscopic technique perform it. Laparoscopic cholecystectomy has been found to be superior to open cholecystectomy as a treatment for acute cholecystitis because of a lower incidence of complications, shorter length of postoperative hospital stay, quicker recuperation, and earlier return to work. However, laparoscopic cholecystectomy for acute cholecystitis has not become routine, because the timing and approach to the surgical management in patients with acute cholecystitis is still a matter of controversy. These Guidelines describe the timing of and the optimal surgical treatment of acute cholecystitis in a question-and-answer format
- …