652 research outputs found
Directed quantum communication
We raise the question whether there is a way to characterize the quantum
information transport properties of a medium or material. For this analysis the
special features of quantum information have to be taken into account. We find
that quantum communication over an isotropic medium, as opposed to classical
information transfer, requires the transmitter to direct the signal towards the
receiver. Furthermore, for large classes of media there is a threshold, in the
sense that `sufficiently much' of the signal has to be collected. Therefore,
the medium's capacity for quantum communication can be characterized in terms
of how the size of the transmitter and receiver has to scale with the
transmission distance to maintain quantum information transmission. To
demonstrate the applicability of this concept, an n-dimensional spin lattice is
considered, yielding a sufficient scaling of d^(n/3) with the distance d
Quantum Cryptography Based Solely on Bell's Theorem
Information-theoretic key agreement is impossible to achieve from scratch and
must be based on some - ultimately physical - premise. In 2005, Barrett, Hardy,
and Kent showed that unconditional security can be obtained in principle based
on the impossibility of faster-than-light signaling; however, their protocol is
inefficient and cannot tolerate any noise. While their key-distribution scheme
uses quantum entanglement, its security only relies on the impossibility of
superluminal signaling, rather than the correctness and completeness of quantum
theory. In particular, the resulting security is device independent. Here we
introduce a new protocol which is efficient in terms of both classical and
quantum communication, and that can tolerate noise in the quantum channel. We
prove that it offers device-independent security under the sole assumption that
certain non-signaling conditions are satisfied. Our main insight is that the
XOR of a number of bits that are partially secret according to the
non-signaling conditions turns out to be highly secret. Note that similar
statements have been well-known in classical contexts. Earlier results had
indicated that amplification of such non-signaling-based privacy is impossible
to achieve if the non-signaling condition only holds between events on Alice's
and Bob's sides. Here, we show that the situation changes completely if such a
separation is given within each of the laboratories.Comment: 32 pages, v2: changed introduction, added reference
The impossibility of non-signaling privacy amplification
Barrett, Hardy, and Kent have shown in 2005 that protocols for quantum key
agreement exist the security of which can be proven under the assumption that
quantum or relativity theory is correct. More precisely, this is based on the
non-local behavior of certain quantum systems, combined with the non-signaling
postulate from relativity. An advantage is that the resulting security is
independent of what (quantum) systems the legitimate parties' devices operate
on: they do not have to be trusted. Unfortunately, the protocol proposed by
Barrett et al. cannot tolerate any errors caused by noise in the quantum
channel. Furthermore, even in the error-free case it is inefficient: its
communication complexity is Theta(1/epsilon) when forcing the attacker's
information below epsilon, even if only a single key bit is generated.
Potentially, the problem can be solved by privacy amplification of relativistic
- or non-signaling - secrecy. We show, however, that such privacy amplification
is impossible with respect to the most important form of non-local behavior,
and application of arbitrary hash functions.Comment: 24 pages, 2 figure
Impossibility of Growing Quantum Bit Commitments
Quantum key distribution (QKD) is often, more correctly, called key growing.
Given a short key as a seed, QKD enables two parties, connected by an insecure
quantum channel, to generate a secret key of arbitrary length. Conversely, no
key agreement is possible without access to an initial key. Here, we consider
another fundamental cryptographic task, commitments. While, similar to key
agreement, commitments cannot be realized from scratch, we ask whether they may
be grown. That is, given the ability to commit to a fixed number of bits, is
there a way to augment this to commitments to strings of arbitrary length?
Using recently developed information-theoretic techniques, we answer this
question to the negative.Comment: 10 pages, minor change
Treatment of renal stones by extracorporeal shockwave lithotripsy - An update
Aim: Despite the extensive experience with minimal invasive stone therapy, there are still different views on the ideal management of renal stones. Materials and Methods: Analysis of the literature includes more than 14,000 patients. We have compared these data with long-term results of two major stone centers in Germany. The results have been compared concerning the anatomical kidney situation, stone size, stone localization and observation time. Results: According to the importance of residual fragments following extracorporeal shock wave lithotripsy (ESWL), we have to distinguish between clinically insignificant residual fragments and clinically significant residual fragments (CIRF). 24 months following ESWL stone passage occurs as a continous process, and if there are no clinical symptoms, any endoscopic procedure should be considered as overtreatment. According to these results, stone-free rates of patients increase in longer follow-up periods. Newer ESWL technology has increased the percentage of CIRF. Conclusion: We consider ESWL in most patients with renal calculi as first-line treatment, except in patients with renal calculi bigger than 30 mm in diameter. Copyright (C) 2001 S. Karger AG, Basel
The temporal build-up of hummingbird/plant mutualisms in North America and temperate South America
Background
The 361 species of hummingbirds that occur from Alaska to Patagonia pollinate ~7,000 plant species with flowers morphologically adapted to them. To better understand this asymmetric diversity build-up, this study analyzes the origin of hummingbird/plant mutualisms in North America and temperate South America, based on new compilations of the 184 hummingbird-adapted species in North America, the 56 in temperate South America, and complete species-level phylogenies for the relevant hummingbirds in both regions, namely five in temperate South America and eight in North America. Because both floras are relatively well sampled phylogenetically, crown or stem ages of many representative clades could be inferred. The hummingbird chronogram was calibrated once with fossils, once with substitutions rates, while plant chronograms were taken from the literature or in 13 cases newly generated.
Results
The 184 North American hummingbird-adapted species belong to ca. 70 lineages for 19 of which (comprising 54 species) we inferred divergence times. The 56 temperate South American hummingbird-adapted species belong to ca. 35 lineages, for 17 of which (comprising 25 species) we inferred divergence times. The oldest hummingbirds and hummingbird-adapted plant lineages in the South American assemblage date to 16–17 my, those in the North American assemblage to 6–7 my. Few hummingbird-pollinated clades in either system have >4 species.
Conclusions
The asymmetric diversity build-up between hummingbirds and the plants dependent on them appears to arise not from rapid speciation within hummingbird-pollinated clades, but instead from a gradual and continuing process in which independent plant species switch from insect to bird pollination. Diversification within hummingbird-pollinated clades in the temperate regions of the Americas appears mainly due to habitat specialization and allopatric speciation, not bird pollination per se. Interaction tanglegrams, even if incomplete, indicate a lack of tight coevolution as perhaps expected for temperate-region mutualisms involving nectar-feeding vertebrates
The temporal build-up of hummingbird/plant mutualisms in North America and temperate South America
Background
The 361 species of hummingbirds that occur from Alaska to Patagonia pollinate ~7,000 plant species with flowers morphologically adapted to them. To better understand this asymmetric diversity build-up, this study analyzes the origin of hummingbird/plant mutualisms in North America and temperate South America, based on new compilations of the 184 hummingbird-adapted species in North America, the 56 in temperate South America, and complete species-level phylogenies for the relevant hummingbirds in both regions, namely five in temperate South America and eight in North America. Because both floras are relatively well sampled phylogenetically, crown or stem ages of many representative clades could be inferred. The hummingbird chronogram was calibrated once with fossils, once with substitutions rates, while plant chronograms were taken from the literature or in 13 cases newly generated.
Results
The 184 North American hummingbird-adapted species belong to ca. 70 lineages for 19 of which (comprising 54 species) we inferred divergence times. The 56 temperate South American hummingbird-adapted species belong to ca. 35 lineages, for 17 of which (comprising 25 species) we inferred divergence times. The oldest hummingbirds and hummingbird-adapted plant lineages in the South American assemblage date to 16–17 my, those in the North American assemblage to 6–7 my. Few hummingbird-pollinated clades in either system have >4 species.
Conclusions
The asymmetric diversity build-up between hummingbirds and the plants dependent on them appears to arise not from rapid speciation within hummingbird-pollinated clades, but instead from a gradual and continuing process in which independent plant species switch from insect to bird pollination. Diversification within hummingbird-pollinated clades in the temperate regions of the Americas appears mainly due to habitat specialization and allopatric speciation, not bird pollination per se. Interaction tanglegrams, even if incomplete, indicate a lack of tight coevolution as perhaps expected for temperate-region mutualisms involving nectar-feeding vertebrates
Secure deployment of business process services via public networks
Modern Business Process Management Systems enable customers to model processes and to design user interfaces without charging expensive IT specialists. To enable them to integrate such a system with their public web applications in the same manner, the upcoming security issues need to be discussed. This thesis provides a collection of identified attack patterns which are related to this scenario. These patterns are enriched with appropriate prevention recommendations. Additional, an abstract analysis method is described to identify a web application firewall configuration to secure the scenario. This analysis method gets exemplary used to identify a web application firewall configuration for a scenario with IBM Business Process Manager v.8.5.0.1 Standard
- …