8,022 research outputs found
Heavy-duty staple remover operated by hand
To remove staples from thick reports, a rooter, bending hook and post are incorporated into a heavy duty hand tool. This makes possible one-step extraction of long staples
Duality of privacy amplification against quantum adversaries and data compression with quantum side information
We show that the tasks of privacy amplification against quantum adversaries
and data compression with quantum side information are dual in the sense that
the ability to perform one implies the ability to perform the other. These are
two of the most important primitives in classical information theory, and are
shown to be connected by complementarity and the uncertainty principle in the
quantum setting. Applications include a new uncertainty principle formulated in
terms of smooth min- and max-entropies, as well as new conditions for
approximate quantum error correction.Comment: v2: Includes a derivation of an entropic uncertainty principle for
smooth min- and max-entropies. Discussion of the
Holevo-Schumacher-Westmoreland theorem remove
Rapid detection of bacteria in foods and biological fluids
Simple and inexpensive apparatus, called "redox monitoring cell," rapidly detects presence of bacteria. Bacteria is detected by measuring drop in oxygen content in test solution. Apparatus consists of vial with two specially designed electrodes connected to sensitive voltmeter
An information-theoretic security proof for QKD protocols
We present a new technique for proving the security of quantum key
distribution (QKD) protocols. It is based on direct information-theoretic
arguments and thus also applies if no equivalent entanglement purification
scheme can be found. Using this technique, we investigate a general class of
QKD protocols with one-way classical post-processing. We show that, in order to
analyze the full security of these protocols, it suffices to consider
collective attacks. Indeed, we give new lower and upper bounds on the
secret-key rate which only involve entropies of two-qubit density operators and
which are thus easy to compute. As an illustration of our results, we analyze
the BB84, the six-state, and the B92 protocol with one-way error correction and
privacy amplification. Surprisingly, the performance of these protocols is
increased if one of the parties adds noise to the measurement data before the
error correction. In particular, this additional noise makes the protocols more
robust against noise in the quantum channel.Comment: 18 pages, 3 figure
Non-secret correlations can be used to distribute secrecy
A counter-intuitive result in entanglement theory was shown in [PRL 91 037902
(2003)], namely that entanglement can be distributed by sending a separable
state through a quantum channel. In this work, following an analogy between the
entanglement and secret key distillation scenarios, we derive its classical
analog: secrecy can be distributed by sending non-secret correlations through a
private channel. This strengthens the close relation between entanglement and
secrecy.Comment: 4 page
Quantum Key Distribution Using Quantum Faraday Rotators
We propose a new quantum key distribution (QKD) protocol based on the fully
quantum mechanical states of the Faraday rotators. The protocol is
unconditionally secure against collective attacks for multi-photon source up to
two photons on a noisy environment. It is also robust against impersonation
attacks. The protocol may be implemented experimentally with the current
spintronics technology on semiconductors.Comment: 7 pages, 7 EPS figure
Device independent quantum key distribution secure against coherent attacks with memoryless measurement devices
Device independent quantum key distribution aims to provide a higher degree
of security than traditional QKD schemes by reducing the number of assumptions
that need to be made about the physical devices used. The previous proof of
security by Pironio et al. applies only to collective attacks where the state
is identical and independent and the measurement devices operate identically
for each trial in the protocol. We extend this result to a more general class
of attacks where the state is arbitrary and the measurement devices have no
memory. We accomplish this by a reduction of arbitrary adversary strategies to
qubit strategies and a proof of security for qubit strategies based on the
previous proof by Pironio et al. and techniques adapted from Renner.Comment: 13 pages. Expanded main proofs with more detail, miscellaneous edits
for clarit
Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way post-processing
We derive a bound for the security of QKD with finite resources under one-way
post-processing, based on a definition of security that is composable and has
an operational meaning. While our proof relies on the assumption of collective
attacks, unconditional security follows immediately for standard protocols like
Bennett-Brassard 1984 and six-states. For single-qubit implementations of such
protocols, we find that the secret key rate becomes positive when at least
N\sim 10^5 signals are exchanged and processed. For any other discrete-variable
protocol, unconditional security can be obtained using the exponential de
Finetti theorem, but the additional overhead leads to very pessimistic
estimates
- …
