652 research outputs found

    Directed quantum communication

    Full text link
    We raise the question whether there is a way to characterize the quantum information transport properties of a medium or material. For this analysis the special features of quantum information have to be taken into account. We find that quantum communication over an isotropic medium, as opposed to classical information transfer, requires the transmitter to direct the signal towards the receiver. Furthermore, for large classes of media there is a threshold, in the sense that `sufficiently much' of the signal has to be collected. Therefore, the medium's capacity for quantum communication can be characterized in terms of how the size of the transmitter and receiver has to scale with the transmission distance to maintain quantum information transmission. To demonstrate the applicability of this concept, an n-dimensional spin lattice is considered, yielding a sufficient scaling of d^(n/3) with the distance d

    Quantum Cryptography Based Solely on Bell's Theorem

    Full text link
    Information-theoretic key agreement is impossible to achieve from scratch and must be based on some - ultimately physical - premise. In 2005, Barrett, Hardy, and Kent showed that unconditional security can be obtained in principle based on the impossibility of faster-than-light signaling; however, their protocol is inefficient and cannot tolerate any noise. While their key-distribution scheme uses quantum entanglement, its security only relies on the impossibility of superluminal signaling, rather than the correctness and completeness of quantum theory. In particular, the resulting security is device independent. Here we introduce a new protocol which is efficient in terms of both classical and quantum communication, and that can tolerate noise in the quantum channel. We prove that it offers device-independent security under the sole assumption that certain non-signaling conditions are satisfied. Our main insight is that the XOR of a number of bits that are partially secret according to the non-signaling conditions turns out to be highly secret. Note that similar statements have been well-known in classical contexts. Earlier results had indicated that amplification of such non-signaling-based privacy is impossible to achieve if the non-signaling condition only holds between events on Alice's and Bob's sides. Here, we show that the situation changes completely if such a separation is given within each of the laboratories.Comment: 32 pages, v2: changed introduction, added reference

    The impossibility of non-signaling privacy amplification

    Full text link
    Barrett, Hardy, and Kent have shown in 2005 that protocols for quantum key agreement exist the security of which can be proven under the assumption that quantum or relativity theory is correct. More precisely, this is based on the non-local behavior of certain quantum systems, combined with the non-signaling postulate from relativity. An advantage is that the resulting security is independent of what (quantum) systems the legitimate parties' devices operate on: they do not have to be trusted. Unfortunately, the protocol proposed by Barrett et al. cannot tolerate any errors caused by noise in the quantum channel. Furthermore, even in the error-free case it is inefficient: its communication complexity is Theta(1/epsilon) when forcing the attacker's information below epsilon, even if only a single key bit is generated. Potentially, the problem can be solved by privacy amplification of relativistic - or non-signaling - secrecy. We show, however, that such privacy amplification is impossible with respect to the most important form of non-local behavior, and application of arbitrary hash functions.Comment: 24 pages, 2 figure

    Impossibility of Growing Quantum Bit Commitments

    Full text link
    Quantum key distribution (QKD) is often, more correctly, called key growing. Given a short key as a seed, QKD enables two parties, connected by an insecure quantum channel, to generate a secret key of arbitrary length. Conversely, no key agreement is possible without access to an initial key. Here, we consider another fundamental cryptographic task, commitments. While, similar to key agreement, commitments cannot be realized from scratch, we ask whether they may be grown. That is, given the ability to commit to a fixed number of bits, is there a way to augment this to commitments to strings of arbitrary length? Using recently developed information-theoretic techniques, we answer this question to the negative.Comment: 10 pages, minor change

    Treatment of renal stones by extracorporeal shockwave lithotripsy - An update

    Get PDF
    Aim: Despite the extensive experience with minimal invasive stone therapy, there are still different views on the ideal management of renal stones. Materials and Methods: Analysis of the literature includes more than 14,000 patients. We have compared these data with long-term results of two major stone centers in Germany. The results have been compared concerning the anatomical kidney situation, stone size, stone localization and observation time. Results: According to the importance of residual fragments following extracorporeal shock wave lithotripsy (ESWL), we have to distinguish between clinically insignificant residual fragments and clinically significant residual fragments (CIRF). 24 months following ESWL stone passage occurs as a continous process, and if there are no clinical symptoms, any endoscopic procedure should be considered as overtreatment. According to these results, stone-free rates of patients increase in longer follow-up periods. Newer ESWL technology has increased the percentage of CIRF. Conclusion: We consider ESWL in most patients with renal calculi as first-line treatment, except in patients with renal calculi bigger than 30 mm in diameter. Copyright (C) 2001 S. Karger AG, Basel

    The temporal build-up of hummingbird/plant mutualisms in North America and temperate South America

    Get PDF
    Background The 361 species of hummingbirds that occur from Alaska to Patagonia pollinate ~7,000 plant species with flowers morphologically adapted to them. To better understand this asymmetric diversity build-up, this study analyzes the origin of hummingbird/plant mutualisms in North America and temperate South America, based on new compilations of the 184 hummingbird-adapted species in North America, the 56 in temperate South America, and complete species-level phylogenies for the relevant hummingbirds in both regions, namely five in temperate South America and eight in North America. Because both floras are relatively well sampled phylogenetically, crown or stem ages of many representative clades could be inferred. The hummingbird chronogram was calibrated once with fossils, once with substitutions rates, while plant chronograms were taken from the literature or in 13 cases newly generated. Results The 184 North American hummingbird-adapted species belong to ca. 70 lineages for 19 of which (comprising 54 species) we inferred divergence times. The 56 temperate South American hummingbird-adapted species belong to ca. 35 lineages, for 17 of which (comprising 25 species) we inferred divergence times. The oldest hummingbirds and hummingbird-adapted plant lineages in the South American assemblage date to 16–17 my, those in the North American assemblage to 6–7 my. Few hummingbird-pollinated clades in either system have >4 species. Conclusions The asymmetric diversity build-up between hummingbirds and the plants dependent on them appears to arise not from rapid speciation within hummingbird-pollinated clades, but instead from a gradual and continuing process in which independent plant species switch from insect to bird pollination. Diversification within hummingbird-pollinated clades in the temperate regions of the Americas appears mainly due to habitat specialization and allopatric speciation, not bird pollination per se. Interaction tanglegrams, even if incomplete, indicate a lack of tight coevolution as perhaps expected for temperate-region mutualisms involving nectar-feeding vertebrates

    The temporal build-up of hummingbird/plant mutualisms in North America and temperate South America

    Get PDF
    Background The 361 species of hummingbirds that occur from Alaska to Patagonia pollinate ~7,000 plant species with flowers morphologically adapted to them. To better understand this asymmetric diversity build-up, this study analyzes the origin of hummingbird/plant mutualisms in North America and temperate South America, based on new compilations of the 184 hummingbird-adapted species in North America, the 56 in temperate South America, and complete species-level phylogenies for the relevant hummingbirds in both regions, namely five in temperate South America and eight in North America. Because both floras are relatively well sampled phylogenetically, crown or stem ages of many representative clades could be inferred. The hummingbird chronogram was calibrated once with fossils, once with substitutions rates, while plant chronograms were taken from the literature or in 13 cases newly generated. Results The 184 North American hummingbird-adapted species belong to ca. 70 lineages for 19 of which (comprising 54 species) we inferred divergence times. The 56 temperate South American hummingbird-adapted species belong to ca. 35 lineages, for 17 of which (comprising 25 species) we inferred divergence times. The oldest hummingbirds and hummingbird-adapted plant lineages in the South American assemblage date to 16–17 my, those in the North American assemblage to 6–7 my. Few hummingbird-pollinated clades in either system have >4 species. Conclusions The asymmetric diversity build-up between hummingbirds and the plants dependent on them appears to arise not from rapid speciation within hummingbird-pollinated clades, but instead from a gradual and continuing process in which independent plant species switch from insect to bird pollination. Diversification within hummingbird-pollinated clades in the temperate regions of the Americas appears mainly due to habitat specialization and allopatric speciation, not bird pollination per se. Interaction tanglegrams, even if incomplete, indicate a lack of tight coevolution as perhaps expected for temperate-region mutualisms involving nectar-feeding vertebrates

    Secure deployment of business process services via public networks

    Get PDF
    Modern Business Process Management Systems enable customers to model processes and to design user interfaces without charging expensive IT specialists. To enable them to integrate such a system with their public web applications in the same manner, the upcoming security issues need to be discussed. This thesis provides a collection of identified attack patterns which are related to this scenario. These patterns are enriched with appropriate prevention recommendations. Additional, an abstract analysis method is described to identify a web application firewall configuration to secure the scenario. This analysis method gets exemplary used to identify a web application firewall configuration for a scenario with IBM Business Process Manager v.8.5.0.1 Standard
    • …
    corecore