366 research outputs found
Quasidegeneracy of Majorana Neutrinos and the Origin of Large Leptonic Mixing
We propose that the observed large leptonic mixing may just reflect a
quasidegeneracy of three Majorana neutrinos. The limit of exact degeneracy of
Majorana neutrinos is not trivial, as leptonic mixing and even CP violation may
occur. We conjecture that the smallness of , when compared to the
other elements of , may just reflect the fact that, in the limit of
exact mass degeneracy, the leptonic mixing matrix necessarily has a vanishing
element. We show that the lifting of the mass degeneracy can lead to the
measured value of while at the same time accommodating the observed
solar and atmospheric mixing angles. In the scenario we consider for the
breaking of the mass degeneracy there is only one CP violating phase, already
present in the limit of exact degeneracy, which upon the lifting of the
degeneracy generates both Majorana and Dirac-type CP violation in the leptonic
sector. We analyse some of the correlations among physical observables and
point out that in most of the cases considered, the implied strength of
leptonic Dirac-type CP violation is large enough to be detected in the next
round of experiments.Comment: 16 pages, 4 figures. Matches published version, references added,
improved discussion, results unchange
Security of the Bennett 1992 quantum-key distribution against individual attack over a realistic channel
The security of two-state quantum key distribution against individual attack
is estimated when the channel has losses and noises. We assume that Alice and
Bob use two nonorthogonal single-photon polarization states. To make our
analysis simple, we propose a modified B92 protocol in which Alice and Bob make
use of inconclusive results and Bob performs a kind of symmetrization of
received states. Using this protocol, Alice and Bob can estimate Eve's
information gain as a function of a few parameters which reflect the
imperfections of devices or Eve's disturbance. In some parameter regions, Eve's
maximum information gain shows counter-intuitive behavior, namely, it decreases
as the amount of disturbances increases. For a small noise rate Eve can extract
perfect information in the case where the angle between Alice's two states is
small or large, while she cannot extract perfect information for intermediate
angles. We also estimate the secret key gain which is the net growth of the
secret key per one pulse. We show the region where the modified B92 protocol
over a realistic channel is secure against individual attack.Comment: 16 pages, 15 figure
Attacks on quantum key distribution protocols that employ non-ITS authentication
We demonstrate how adversaries with unbounded computing resources can break
Quantum Key Distribution (QKD) protocols which employ a particular message
authentication code suggested previously. This authentication code, featuring
low key consumption, is not Information-Theoretically Secure (ITS) since for
each message the eavesdropper has intercepted she is able to send a different
message from a set of messages that she can calculate by finding collisions of
a cryptographic hash function. However, when this authentication code was
introduced it was shown to prevent straightforward Man-In-The-Middle (MITM)
attacks against QKD protocols.
In this paper, we prove that the set of messages that collide with any given
message under this authentication code contains with high probability a message
that has small Hamming distance to any other given message. Based on this fact
we present extended MITM attacks against different versions of BB84 QKD
protocols using the addressed authentication code; for three protocols we
describe every single action taken by the adversary. For all protocols the
adversary can obtain complete knowledge of the key, and for most protocols her
success probability in doing so approaches unity.
Since the attacks work against all authentication methods which allow to
calculate colliding messages, the underlying building blocks of the presented
attacks expose the potential pitfalls arising as a consequence of non-ITS
authentication in QKD-postprocessing. We propose countermeasures, increasing
the eavesdroppers demand for computational power, and also prove necessary and
sufficient conditions for upgrading the discussed authentication code to the
ITS level.Comment: 34 page
Estimates for practical quantum cryptography
In this article I present a protocol for quantum cryptography which is secure
against attacks on individual signals. It is based on the Bennett-Brassard
protocol of 1984 (BB84). The security proof is complete as far as the use of
single photons as signal states is concerned. Emphasis is given to the
practicability of the resulting protocol. For each run of the quantum key
distribution the security statement gives the probability of a successful key
generation and the probability for an eavesdropper's knowledge, measured as
change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio
Differences associated with age, transfer status, and insurance coverage in end-of-life hospital care for children
BACKGROUND: More than 40% of childhood mortality occurs while children are hospitalized. End-of-life health care utilization patterns for children have not been well characterized at the national level. OBJECTIVE: To describe patterns of length of stay, total charges, and principal diagnoses for children who die while admitted to a hospital, versus those who survive to discharge. METHODS: We conducted a cross-sectional analysis of 3 years spanning a decade of the Nationwide Inpatient Sample (NIS), a nationally representative dataset of hospital discharges, to analyze sociodemographic characteristics and patterns of hospital resource use associated with in-hospital mortality. RESULTS: Inpatient mortality rate was significantly higher for non-newborn infants (<1 year old) than for all other age groups, and the overall number of deaths was greatest for newborns. Patients transferred between hospitals had significantly greater mortality rate, compared with patients admitted not on transfer. Insured children had lower mortality rates compared to uninsured, and decedents had significantly longer length of stay and higher charges compared with survivors. Uninsured decedents did not have longer lengths of stay than survivors, and hospital charges were significantly lower for uninsured children compared with insured children. CONCLUSION: As hospital staff strive to meet the needs of ill children and their families, they must be cognizant of the high burden of mortality among the youngest children and those transferred between hospitals, and the potential for less resource use and higher mortality risk for children without insurance, because these patients may require expanded services not readily available in most hospital settings. Journal of Hospital Medicine 2008;3:376–383. © 2008 Society of Hospital Medicine.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/61213/1/360_ftp.pd
Quantum Nonlocality without Entanglement
We exhibit an orthogonal set of product states of two three-state particles
that nevertheless cannot be reliably distinguished by a pair of separated
observers ignorant of which of the states has been presented to them, even if
the observers are allowed any sequence of local operations and classical
communication between the separate observers. It is proved that there is a
finite gap between the mutual information obtainable by a joint measurement on
these states and a measurement in which only local actions are permitted. This
result implies the existence of separable superoperators that cannot be
implemented locally. A set of states are found involving three two-state
particles which also appear to be nonmeasurable locally. These and other
multipartite states are classified according to the entropy and entanglement
costs of preparing and measuring them by local operations.Comment: 27 pages, Latex, 6 ps figures. To be submitted to Phys. Rev. A.
Version 2: 30 pages, many small revisions and extensions, author added.
Version 3: Proof in Appendix D corrected, many small changes; final version
for Phys. Rev. A Version 4: Report of Popescu conjecture modifie
Author correction : a global database for metacommunity ecology, integrating species, traits, environment and space
Correction to: Scientific Data https://doi.org/10.1038/s41597-019-0344-7, published online 08 January 202
Author correction : a global database for metacommunity ecology, integrating species, traits, environment and space
Correction to: Scientific Data https://doi.org/10.1038/s41597-019-0344-7, published online 08 January 202
Daylight quantum key distribution over 1.6 km
Quantum key distribution (QKD) has been demonstrated over a point-to-point
-km atmospheric optical path in full daylight. This record
transmission distance brings QKD a step closer to surface-to-satellite and
other long-distance applications.Comment: 4 pages, 2 figures, 1 table. Submitted to PRL on 14 January 2000 for
publication consideratio
- …