366 research outputs found

    Quasidegeneracy of Majorana Neutrinos and the Origin of Large Leptonic Mixing

    Full text link
    We propose that the observed large leptonic mixing may just reflect a quasidegeneracy of three Majorana neutrinos. The limit of exact degeneracy of Majorana neutrinos is not trivial, as leptonic mixing and even CP violation may occur. We conjecture that the smallness of U13|U_{13}|, when compared to the other elements of UPMNSU_{PMNS}, may just reflect the fact that, in the limit of exact mass degeneracy, the leptonic mixing matrix necessarily has a vanishing element. We show that the lifting of the mass degeneracy can lead to the measured value of U13|U_{13}| while at the same time accommodating the observed solar and atmospheric mixing angles. In the scenario we consider for the breaking of the mass degeneracy there is only one CP violating phase, already present in the limit of exact degeneracy, which upon the lifting of the degeneracy generates both Majorana and Dirac-type CP violation in the leptonic sector. We analyse some of the correlations among physical observables and point out that in most of the cases considered, the implied strength of leptonic Dirac-type CP violation is large enough to be detected in the next round of experiments.Comment: 16 pages, 4 figures. Matches published version, references added, improved discussion, results unchange

    Security of the Bennett 1992 quantum-key distribution against individual attack over a realistic channel

    Full text link
    The security of two-state quantum key distribution against individual attack is estimated when the channel has losses and noises. We assume that Alice and Bob use two nonorthogonal single-photon polarization states. To make our analysis simple, we propose a modified B92 protocol in which Alice and Bob make use of inconclusive results and Bob performs a kind of symmetrization of received states. Using this protocol, Alice and Bob can estimate Eve's information gain as a function of a few parameters which reflect the imperfections of devices or Eve's disturbance. In some parameter regions, Eve's maximum information gain shows counter-intuitive behavior, namely, it decreases as the amount of disturbances increases. For a small noise rate Eve can extract perfect information in the case where the angle between Alice's two states is small or large, while she cannot extract perfect information for intermediate angles. We also estimate the secret key gain which is the net growth of the secret key per one pulse. We show the region where the modified B92 protocol over a realistic channel is secure against individual attack.Comment: 16 pages, 15 figure

    Attacks on quantum key distribution protocols that employ non-ITS authentication

    Full text link
    We demonstrate how adversaries with unbounded computing resources can break Quantum Key Distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not Information-Theoretically Secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced it was shown to prevent straightforward Man-In-The-Middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols we describe every single action taken by the adversary. For all protocols the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD-postprocessing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.Comment: 34 page

    Estimates for practical quantum cryptography

    Get PDF
    In this article I present a protocol for quantum cryptography which is secure against attacks on individual signals. It is based on the Bennett-Brassard protocol of 1984 (BB84). The security proof is complete as far as the use of single photons as signal states is concerned. Emphasis is given to the practicability of the resulting protocol. For each run of the quantum key distribution the security statement gives the probability of a successful key generation and the probability for an eavesdropper's knowledge, measured as change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio

    Differences associated with age, transfer status, and insurance coverage in end-of-life hospital care for children

    Full text link
    BACKGROUND: More than 40% of childhood mortality occurs while children are hospitalized. End-of-life health care utilization patterns for children have not been well characterized at the national level. OBJECTIVE: To describe patterns of length of stay, total charges, and principal diagnoses for children who die while admitted to a hospital, versus those who survive to discharge. METHODS: We conducted a cross-sectional analysis of 3 years spanning a decade of the Nationwide Inpatient Sample (NIS), a nationally representative dataset of hospital discharges, to analyze sociodemographic characteristics and patterns of hospital resource use associated with in-hospital mortality. RESULTS: Inpatient mortality rate was significantly higher for non-newborn infants (<1 year old) than for all other age groups, and the overall number of deaths was greatest for newborns. Patients transferred between hospitals had significantly greater mortality rate, compared with patients admitted not on transfer. Insured children had lower mortality rates compared to uninsured, and decedents had significantly longer length of stay and higher charges compared with survivors. Uninsured decedents did not have longer lengths of stay than survivors, and hospital charges were significantly lower for uninsured children compared with insured children. CONCLUSION: As hospital staff strive to meet the needs of ill children and their families, they must be cognizant of the high burden of mortality among the youngest children and those transferred between hospitals, and the potential for less resource use and higher mortality risk for children without insurance, because these patients may require expanded services not readily available in most hospital settings. Journal of Hospital Medicine 2008;3:376–383. © 2008 Society of Hospital Medicine.Peer Reviewedhttp://deepblue.lib.umich.edu/bitstream/2027.42/61213/1/360_ftp.pd

    Quantum Nonlocality without Entanglement

    Get PDF
    We exhibit an orthogonal set of product states of two three-state particles that nevertheless cannot be reliably distinguished by a pair of separated observers ignorant of which of the states has been presented to them, even if the observers are allowed any sequence of local operations and classical communication between the separate observers. It is proved that there is a finite gap between the mutual information obtainable by a joint measurement on these states and a measurement in which only local actions are permitted. This result implies the existence of separable superoperators that cannot be implemented locally. A set of states are found involving three two-state particles which also appear to be nonmeasurable locally. These and other multipartite states are classified according to the entropy and entanglement costs of preparing and measuring them by local operations.Comment: 27 pages, Latex, 6 ps figures. To be submitted to Phys. Rev. A. Version 2: 30 pages, many small revisions and extensions, author added. Version 3: Proof in Appendix D corrected, many small changes; final version for Phys. Rev. A Version 4: Report of Popescu conjecture modifie

    Daylight quantum key distribution over 1.6 km

    Get PDF
    Quantum key distribution (QKD) has been demonstrated over a point-to-point 1.6\sim1.6-km atmospheric optical path in full daylight. This record transmission distance brings QKD a step closer to surface-to-satellite and other long-distance applications.Comment: 4 pages, 2 figures, 1 table. Submitted to PRL on 14 January 2000 for publication consideratio
    corecore