342 research outputs found

    Post-selection technique for quantum channels with applications to quantum cryptography

    Get PDF
    We propose a general method for studying properties of quantum channels acting on an n-partite system, whose action is invariant under permutations of the subsystems. Our main result is that, in order to prove that a certain property holds for any arbitrary input, it is sufficient to consider the special case where the input is a particular de Finetti-type state, i.e., a state which consists of n identical and independent copies of an (unknown) state on a single subsystem. A similar statement holds for more general channels which are covariant with respect to the action of an arbitrary finite or locally compact group. Our technique can be applied to the analysis of information-theoretic problems. For example, in quantum cryptography, we get a simple proof for the fact that security of a discrete-variable quantum key distribution protocol against collective attacks implies security of the protocol against the most general attacks. The resulting security bounds are tighter than previously known bounds obtained by proofs relying on the exponential de Finetti theorem [Renner, Nature Physics 3,645(2007)].Comment: 3.5 page

    A Generic Security Proof for Quantum Key Distribution

    Full text link
    Quantum key distribution allows two parties, traditionally known as Alice and Bob, to establish a secure random cryptographic key if, firstly, they have access to a quantum communication channel, and secondly, they can exchange classical public messages which can be monitored but not altered by an eavesdropper, Eve. Quantum key distribution provides perfect security because, unlike its classical counterpart, it relies on the laws of physics rather than on ensuring that successful eavesdropping would require excessive computational effort. However, security proofs of quantum key distribution are not trivial and are usually restricted in their applicability to specific protocols. In contrast, we present a general and conceptually simple proof which can be applied to a number of different protocols. It relies on the fact that a cryptographic procedure called privacy amplification is equally secure when an adversary's memory for data storage is quantum rather than classical.Comment: Analysis of B92 protocol adde

    Regulatory Aspects Of Manufacturing And Control Of Genetically Modified Cells

    Get PDF
    Therapies based on genetically modified cells hold great promise for the treatment of various diseases with often limited treatment options. Last year, Strimvelis, consisting of CD34+ hematopoietic stem cells equipped with the correct version of the ADA gene for the treatment of the severe combined immunodeficiency condition ADA-SCID, has received marketing authorization in the European Union. Convincing clinical success has also been observed with recombinant chimeric antigen receptor expressing T-cells used to treat patients suffering from B-cell malignancies. In respect to manufacturing and quality control, however, genetically modified cells are considered to be most complex medicinal products. Not only cell procurement, cultivation and genetic modification of the cells and their release testing needs particular consideration, also the vector used to deliver the modifying genetic sequence requires suitable design and proper manufacturing. In this presentation, these fundamental steps in cell therapy manufacturing will be discussed from a regulatory perspective. Challenges regarding process consistency and manufacturing process comparability, as well as GMP expectations will be highlighted. Furthermore, a brief overview of the European regulatory landscape for cell therapies and novel developments in their regulation will be given

    Angular Momentum Decomposition for an Electron

    Full text link
    We calculate the orbital angular momentum of the `quark' in the scalar diquark model as well as that of the electron in QED (to order α\alpha). We compare the orbital angular momentum obtained from the Jaffe-Manohar decomposition to that obtained from the Ji relation and estimate the importance of the vector potential in the definition of orbital angular momentum

    Unifying classical and quantum key distillation

    Get PDF
    Assume that two distant parties, Alice and Bob, as well as an adversary, Eve, have access to (quantum) systems prepared jointly according to a tripartite state. In addition, Alice and Bob can use local operations and authenticated public classical communication. Their goal is to establish a key which is unknown to Eve. We initiate the study of this scenario as a unification of two standard scenarios: (i) key distillation (agreement) from classical correlations and (ii) key distillation from pure tripartite quantum states. Firstly, we obtain generalisations of fundamental results related to scenarios (i) and (ii), including upper bounds on the key rate. Moreover, based on an embedding of classical distributions into quantum states, we are able to find new connections between protocols and quantities in the standard scenarios (i) and (ii). Secondly, we study specific properties of key distillation protocols. In particular, we show that every protocol that makes use of pre-shared key can be transformed into an equally efficient protocol which needs no pre-shared key. This result is of practical significance as it applies to quantum key distribution (QKD) protocols, but it also implies that the key rate cannot be locked with information on Eve's side. Finally, we exhibit an arbitrarily large separation between the key rate in the standard setting where Eve is equipped with quantum memory and the key rate in a setting where Eve is only given classical memory. This shows that assumptions on the nature of Eve's memory are important in order to determine the correct security threshold in QKD.Comment: full versio

    The Quantum Reverse Shannon Theorem Based on One-Shot Information Theory

    Get PDF
    The Quantum Reverse Shannon Theorem states that any quantum channel can be simulated by an unlimited amount of shared entanglement and an amount of classical communication equal to the channel's entanglement assisted classical capacity. In this paper, we provide a new proof of this theorem, which has previously been proved by Bennett, Devetak, Harrow, Shor, and Winter. Our proof has a clear structure being based on two recent information-theoretic results: one-shot Quantum State Merging and the Post-Selection Technique for quantum channel

    Custom Flow in Molecular Dynamics

    Get PDF
    Driving an inertial many-body system out of equilibrium generates complex dynamics due to memory effects and the intricate relationships between the external driving force, internal forces, and transport effects. Understanding the underlying physics is challenging and often requires carrying out case-by-case analysis. To systematically study the interplay between all types of forces that contribute to the dynamics, a method to generate prescribed flow patterns could be of great help. We develop a custom flow method to numerically construct the external force field required to obtain the desired time evolution of an inertial many-body system, as prescribed by its one-body current and density profiles. We validate the custom flow method in a Newtonian system of purely repulsive particles by creating a slow motion dynamics of an out-of-equilibrium process and by prescribing the full time evolution between two distinct equilibrium states. The method can also be used with thermostat algorithms to control the temperature

    A comparison of third-generation semi-invasive arterial waveform analysis with thermodilution in patients undergoing coronary surgery

    Get PDF
    Uncalibrated semi-invasive continous monitoring of cardiac index (CI) has recently gained increasing interest. The aim of the present study was to compare the accuracy of CI determination based on arterial waveform analysis with transpulmonary thermodilution. Fifty patients scheduled for elective coronary surgery were studied after induction of anaesthesia and before and after cardiopulmonary bypass (CPB), respectively. Each patient was monitored with a central venous line, the PiCCO system, and the FloTrac/Vigileo-system. Measurements included CI derived by transpulmonary thermodilution and uncalibrated semi-invasive pulse contour analysis. Percentage changes of CI were calculated. There was a moderate, but significant correlation between pulse contour CI and thermodilution CI both before (r(2) = 0.72, P < 0.0001) and after (r(2) = 0.62, P < 0.0001) CPB, with a percentage error of 31% and 25%, respectively. Changes in pulse contour CI showed a significant correlation with changes in thermodilution CI both before (r(2) = 0.52, P < 0.0001) and after (r(2) = 0.67, P < 0.0001) CPB. Our findings demonstrated that uncalibrated semi-invasive monitoring system was able to reliably measure CI compared with transpulmonary thermodilution in patients undergoing elective coronary surgery. Furthermore, the semi-invasive monitoring device was able to track haemodynamic changes and trends
    corecore