87 research outputs found

    Implementable Quantum Bit-String Commitment Protocol

    Full text link
    Quantum bit-string commitment[A.Kent, Phys.Rev.Lett., 90, 237901 (2003)] or QBSC is a variant of bit commitment (BC). In this paper, we propose a new QBSC protocol that can be implemented using currently available technology, and prove its security under the same security criteria as discussed by Kent. QBSC is a generalization of BC, but has slightly weaker requirements, and our proposed protocol is not intended to break the no-go theorem of quantum BC.Comment: To appear in Phys. Rev. A., 9 pages, 2 figure

    Concise and Tight Security Analysis of the Bennett-Brassard 1984 Protocol with Finite Key Lengths

    Full text link
    We present a tight security analysis of the Bennett-Brassard 1984 protocol taking into account the finite size effect of key distillation, and achieving unconditional security. We begin by presenting a concise analysis utilizing the normal approximation of the hypergeometric function. Then next we show that a similarly tight bound can also be obtained by a rigorous argument without relying on any approximation. In particular, for the convenience of experimentalists who wish to evaluate the security of their QKD systems, we also give explicit procedures of our key distillation, and also show how to calculate the secret key rate and the security parameter from a given set of experimental parameters. Besides the exact values of key rates and security parameters, we also present how to obtain their rough estimates using the normal approximation.Comment: 40 pages, 4 figures, revised arguments on security, and detailed explanaions on how to use theoretical result

    Decomposition of meron configuration of SU(2) gauge field

    Full text link
    For the meron configuration of the SU(2) gauge field in the four dimensional Minkowskii spacetime, the decomposition into an isovector field \bn, isoscalar fields ρ\rho and σ\sigma, and a U(1) gauge field CμC_{\mu} is attained by solving the consistency condition for \bn. The resulting \bn turns out to possess two singular points, behave like a monopole-antimonopole pair and reduce to the conventional hedgehog in a special case. The CμC_{\mu} field also possesses singular points, while ρ\rho and σ\sigma are regular everywhere.Comment: 18 pages, 5 figures, Sec.4 rewritten. 5 refs. adde

    Instantons and Monopoles in General Abelian Gauges

    Get PDF
    A relation between the total instanton number and the quantum-numbers of magnetic monopoles that arise in general Abelian gauges in SU(2) Yang-Mills theory is established. The instanton number is expressed as the sum of the `twists' of all monopoles, where the twist is related to a generalized Hopf invariant. The origin of a stronger relation between instantons and monopoles in the Polyakov gauge is discussed.Comment: 28 pages, 8 figures; comments added to put work into proper contex

    Detector decoy quantum key distribution

    Full text link
    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is specially suited for those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement based quantum key distribution scheme with an untrusted source without the need of a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single photon security proof to its physical, full optical implementation. We show that in this scenario the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.Comment: 27 pages, 7 figure

    Rotational Surfaces in L3\mathbb{L}^3 and Solutions in the Nonlinear Sigma Model

    Full text link
    The Gauss map of non-degenerate surfaces in the three-dimensional Minkowski space are viewed as dynamical fields of the two-dimensional O(2,1) Nonlinear Sigma Model. In this setting, the moduli space of solutions with rotational symmetry is completely determined. Essentially, the solutions are warped products of orbits of the 1-dimensional groups of isometries and elastic curves in either a de Sitter plane, a hyperbolic plane or an anti de Sitter plane. The main tools are the equivalence of the two-dimensional O(2,1) Nonlinear Sigma Model and the Willmore problem, and the description of the surfaces with rotational symmetry. A complete classification of such surfaces is obtained in this paper. Indeed, a huge new family of Lorentzian rotational surfaces with a space-like axis is presented. The description of this new class of surfaces is based on a technique of surgery and a gluing process, which is illustrated by an algorithm.Comment: PACS: 11.10.Lm; 11.10.Ef; 11.15.-q; 11.30.-j; 02.30.-f; 02.40.-k. 45 pages, 11 figure

    Experimental measurement-device-independent quantum digital signatures

    Get PDF
    The development of quantum networks will be paramount towards practical and secure telecommunications. These networks will need to sign and distribute information between many parties with information-Theoretic security, requiring both quantum digital signatures (QDS) and quantum key distribution (QKD). Here, we introduce and experimentally realise a quantum network architecture, where the nodes are fully connected using a minimum amount of physical links. The central node of the network can act either as a totally untrusted relay, connecting the end users via the recently introduced measurement-device-independent (MDI)-QKD, or as a trusted recipient directly communicating with the end users via QKD. Using this network, we perform a proof-of-principle demonstration of QDS mediated by MDI-QKD. For that, we devised an efficient protocol to distil multiple signatures from the same block of data, thus reducing the statistical fluctuations in the sample and greatly enhancing the final QDS rate in the finite-size scenario

    Polymorphisms in the ADRB2 gene and Graves disease: a case-control study and a meta-analysis of available evidence

    Get PDF
    <p>Abstract</p> <p>Background</p> <p>The beta-2-Adrenergic receptor (<it>ADRB2</it>) gene on chromosome 5q33.1 is an important immunoregulatory factor. We and others have previously implicated chromosomal region 5q31-33 for contribution to the genetic susceptibility to Graves disease (GD) in East-Asian populations. Two recent studies showed associations between the single nucleotide polymorphism (SNP) rs1042714 in the <it>ADRB2 </it>gene and GD. In this study, we aimed to fully investigate whether the <it>ADRB2 </it>gene conferred susceptibility to GD in Chinese population, and to perform a meta-analysis of association between <it>ADRB2 </it>and GD.</p> <p>Methods</p> <p>Approximately 1 kb upstream the transcription start site and the entire coding regions of the <it>ADRB2 </it>gene were resequenced in 48 Han Chinese individuals to determine the linkage disequilibrium (LD) patterns. Tag SNPs were selected and genotyped in a case-control collection of 1,118 South Han Chinese subjects, which included 428 GD patients and 690 control subjects. A meta-analysis was performed with the data obtained in the present samples and those available from prior studies.</p> <p>Results</p> <p>Fifteen SNPs in the <it>ADRB2 </it>gene were identified by resequencing and one SNP was novel. Ten tag SNPs were investigated further to assess association of <it>ADRB2 </it>in the case-control collection. Neither individual tag SNP nor haplotypes showed association with GD in Han Chinese population (P > 0.05). Our meta-analysis of the <it>ADRB2 </it>SNP rs1042714 measured heterogeneity between the ethnic groups (I<sup>2 </sup>= 53.1%) and no association to GD was observed in the overall three studies with a random effects model (OR = 1.13, 95% CI, 0.95 to 1.36; P = 0.18). However, significant association was found from the combined data of Caucasian population with a fixed effects model (OR = 1.18, 95% CI, 1.06 to 1.32; P = 0.002; I<sup>2 </sup>= 5.9%).</p> <p>Conclusion</p> <p>Our study indicated that the <it>ADRB2 </it>gene did not exert a substantial influence on GD susceptibility in Han Chinese population, but contributed to a detectable GD risk in Caucasian population. This inconsistency resulted largely from between-ethnicity heterogeneity.</p
    corecore