87 research outputs found
Implementable Quantum Bit-String Commitment Protocol
Quantum bit-string commitment[A.Kent, Phys.Rev.Lett., 90, 237901 (2003)] or
QBSC is a variant of bit commitment (BC). In this paper, we propose a new QBSC
protocol that can be implemented using currently available technology, and
prove its security under the same security criteria as discussed by Kent. QBSC
is a generalization of BC, but has slightly weaker requirements, and our
proposed protocol is not intended to break the no-go theorem of quantum BC.Comment: To appear in Phys. Rev. A., 9 pages, 2 figure
Concise and Tight Security Analysis of the Bennett-Brassard 1984 Protocol with Finite Key Lengths
We present a tight security analysis of the Bennett-Brassard 1984 protocol
taking into account the finite size effect of key distillation, and achieving
unconditional security. We begin by presenting a concise analysis utilizing the
normal approximation of the hypergeometric function. Then next we show that a
similarly tight bound can also be obtained by a rigorous argument without
relying on any approximation. In particular, for the convenience of
experimentalists who wish to evaluate the security of their QKD systems, we
also give explicit procedures of our key distillation, and also show how to
calculate the secret key rate and the security parameter from a given set of
experimental parameters. Besides the exact values of key rates and security
parameters, we also present how to obtain their rough estimates using the
normal approximation.Comment: 40 pages, 4 figures, revised arguments on security, and detailed
explanaions on how to use theoretical result
Decomposition of meron configuration of SU(2) gauge field
For the meron configuration of the SU(2) gauge field in the four dimensional
Minkowskii spacetime, the decomposition into an isovector field \bn,
isoscalar fields and , and a U(1) gauge field is
attained by solving the consistency condition for \bn. The resulting \bn
turns out to possess two singular points, behave like a monopole-antimonopole
pair and reduce to the conventional hedgehog in a special case. The
field also possesses singular points, while and are regular
everywhere.Comment: 18 pages, 5 figures, Sec.4 rewritten. 5 refs. adde
Instantons and Monopoles in General Abelian Gauges
A relation between the total instanton number and the quantum-numbers of
magnetic monopoles that arise in general Abelian gauges in SU(2) Yang-Mills
theory is established. The instanton number is expressed as the sum of the
`twists' of all monopoles, where the twist is related to a generalized Hopf
invariant. The origin of a stronger relation between instantons and monopoles
in the Polyakov gauge is discussed.Comment: 28 pages, 8 figures; comments added to put work into proper contex
Detector decoy quantum key distribution
Photon number resolving detectors can enhance the performance of many
practical quantum cryptographic setups. In this paper, we employ a simple
method to estimate the statistics provided by such a photon number resolving
detector using only a threshold detector together with a variable attenuator.
This idea is similar in spirit to that of the decoy state technique, and is
specially suited for those scenarios where only a few parameters of the photon
number statistics of the incoming signals have to be estimated. As an
illustration of the potential applicability of the method in quantum
communication protocols, we use it to prove security of an entanglement based
quantum key distribution scheme with an untrusted source without the need of a
squash model and by solely using this extra idea. In this sense, this detector
decoy method can be seen as a different conceptual approach to adapt a single
photon security proof to its physical, full optical implementation. We show
that in this scenario the legitimate users can now even discard the double
click events from the raw key data without compromising the security of the
scheme, and we present simulations on the performance of the BB84 and the
6-state quantum key distribution protocols.Comment: 27 pages, 7 figure
Field test of quantum key distribution in the Tokyo QKD Network
A novel secure communication network with quantum key distribution in a
metropolitan area is reported. Different QKD schemes are integrated to
demonstrate secure TV conferencing over a distance of 45km, stable long-term
operation, and application to secure mobile phones.Comment: 21 pages, 19 figure
Rotational Surfaces in and Solutions in the Nonlinear Sigma Model
The Gauss map of non-degenerate surfaces in the three-dimensional Minkowski
space are viewed as dynamical fields of the two-dimensional O(2,1) Nonlinear
Sigma Model. In this setting, the moduli space of solutions with rotational
symmetry is completely determined. Essentially, the solutions are warped
products of orbits of the 1-dimensional groups of isometries and elastic curves
in either a de Sitter plane, a hyperbolic plane or an anti de Sitter plane. The
main tools are the equivalence of the two-dimensional O(2,1) Nonlinear Sigma
Model and the Willmore problem, and the description of the surfaces with
rotational symmetry. A complete classification of such surfaces is obtained in
this paper. Indeed, a huge new family of Lorentzian rotational surfaces with a
space-like axis is presented. The description of this new class of surfaces is
based on a technique of surgery and a gluing process, which is illustrated by
an algorithm.Comment: PACS: 11.10.Lm; 11.10.Ef; 11.15.-q; 11.30.-j; 02.30.-f; 02.40.-k. 45
pages, 11 figure
Experimental measurement-device-independent quantum digital signatures
The development of quantum networks will be paramount towards practical and secure telecommunications. These networks will need to sign and distribute information between many parties with information-Theoretic security, requiring both quantum digital signatures (QDS) and quantum key distribution (QKD). Here, we introduce and experimentally realise a quantum network architecture, where the nodes are fully connected using a minimum amount of physical links. The central node of the network can act either as a totally untrusted relay, connecting the end users via the recently introduced measurement-device-independent (MDI)-QKD, or as a trusted recipient directly communicating with the end users via QKD. Using this network, we perform a proof-of-principle demonstration of QDS mediated by MDI-QKD. For that, we devised an efficient protocol to distil multiple signatures from the same block of data, thus reducing the statistical fluctuations in the sample and greatly enhancing the final QDS rate in the finite-size scenario
Polymorphisms in the ADRB2 gene and Graves disease: a case-control study and a meta-analysis of available evidence
<p>Abstract</p> <p>Background</p> <p>The beta-2-Adrenergic receptor (<it>ADRB2</it>) gene on chromosome 5q33.1 is an important immunoregulatory factor. We and others have previously implicated chromosomal region 5q31-33 for contribution to the genetic susceptibility to Graves disease (GD) in East-Asian populations. Two recent studies showed associations between the single nucleotide polymorphism (SNP) rs1042714 in the <it>ADRB2 </it>gene and GD. In this study, we aimed to fully investigate whether the <it>ADRB2 </it>gene conferred susceptibility to GD in Chinese population, and to perform a meta-analysis of association between <it>ADRB2 </it>and GD.</p> <p>Methods</p> <p>Approximately 1 kb upstream the transcription start site and the entire coding regions of the <it>ADRB2 </it>gene were resequenced in 48 Han Chinese individuals to determine the linkage disequilibrium (LD) patterns. Tag SNPs were selected and genotyped in a case-control collection of 1,118 South Han Chinese subjects, which included 428 GD patients and 690 control subjects. A meta-analysis was performed with the data obtained in the present samples and those available from prior studies.</p> <p>Results</p> <p>Fifteen SNPs in the <it>ADRB2 </it>gene were identified by resequencing and one SNP was novel. Ten tag SNPs were investigated further to assess association of <it>ADRB2 </it>in the case-control collection. Neither individual tag SNP nor haplotypes showed association with GD in Han Chinese population (P > 0.05). Our meta-analysis of the <it>ADRB2 </it>SNP rs1042714 measured heterogeneity between the ethnic groups (I<sup>2 </sup>= 53.1%) and no association to GD was observed in the overall three studies with a random effects model (OR = 1.13, 95% CI, 0.95 to 1.36; P = 0.18). However, significant association was found from the combined data of Caucasian population with a fixed effects model (OR = 1.18, 95% CI, 1.06 to 1.32; P = 0.002; I<sup>2 </sup>= 5.9%).</p> <p>Conclusion</p> <p>Our study indicated that the <it>ADRB2 </it>gene did not exert a substantial influence on GD susceptibility in Han Chinese population, but contributed to a detectable GD risk in Caucasian population. This inconsistency resulted largely from between-ethnicity heterogeneity.</p
- …