48 research outputs found

    The Quantum Reverse Shannon Theorem based on One-Shot Information Theory

    Full text link
    The Quantum Reverse Shannon Theorem states that any quantum channel can be simulated by an unlimited amount of shared entanglement and an amount of classical communication equal to the channel's entanglement assisted classical capacity. In this paper, we provide a new proof of this theorem, which has previously been proved by Bennett, Devetak, Harrow, Shor, and Winter. Our proof has a clear structure being based on two recent information-theoretic results: one-shot Quantum State Merging and the Post-Selection Technique for quantum channels.Comment: 30 pages, 4 figures, published versio

    Two Antagonistic MALT1 Auto-Cleavage Mechanisms Reveal a Role for TRAF6 to Unleash MALT1 Activation.

    Get PDF
    The paracaspase MALT1 has arginine-directed proteolytic activity triggered by engagement of immune receptors. Recruitment of MALT1 into activation complexes is required for MALT1 proteolytic function. Here, co-expression of MALT1 in HEK293 cells, either with activated CARD11 and BCL10 or with TRAF6, was used to explore the mechanism of MALT1 activation at the molecular level. This work identified a prominent self-cleavage site of MALT1 isoform A (MALT1A) at R781 (R770 in MALT1B) and revealed that TRAF6 can activate MALT1 independently of the CBM. Intramolecular cleavage at R781/R770 removes a C-terminal TRAF6-binding site in both MALT1 isoforms, leaving MALT1B devoid of the two key interaction sites with TRAF6. A previously identified auto-proteolysis site of MALT1 at R149 leads to deletion of the death-domain, thereby abolishing interaction with BCL10. By using MALT1 isoforms and cleaved fragments thereof, as well as TRAF6 WT and mutant forms, this work shows that TRAF6 induces N-terminal auto-proteolytic cleavage of MALT1 at R149 and accelerates MALT1 protein turnover. The MALT1 fragment generated by N-terminal self-cleavage at R149 was labile and displayed enhanced signaling properties that required an intact K644 residue, previously shown to be a site for mono-ubiquitination of MALT1. Conversely, C-terminal self-cleavage at R781/R770 hampered the ability for self-cleavage at R149 and stabilized MALT1 by hindering interaction with TRAF6. C-terminal self-cleavage had limited impact on MALT1A but severely reduced MALT1B proteolytic and signaling functions. It also abrogated NF-κB activation by N-terminally cleaved MALT1A. Altogether, this study provides further insights into mechanisms that regulate the scaffolding and activation cycle of MALT1. It also emphasizes the reduced functional capacity of MALT1B as compared to MALT1A

    Improving the Security of Quantum Protocols via Commit-and-Open

    Full text link
    We consider two-party quantum protocols starting with a transmission of some random BB84 qubits followed by classical messages. We show a general "compiler" improving the security of such protocols: if the original protocol is secure against an "almost honest" adversary, then the compiled protocol is secure against an arbitrary computationally bounded (quantum) adversary. The compilation preserves the number of qubits sent and the number of rounds up to a constant factor. The compiler also preserves security in the bounded-quantum-storage model (BQSM), so if the original protocol was BQSM-secure, the compiled protocol can only be broken by an adversary who has large quantum memory and large computing power. This is in contrast to known BQSM-secure protocols, where security breaks down completely if the adversary has larger quantum memory than expected. We show how our technique can be applied to quantum identification and oblivious transfer protocols.Comment: 21 pages; editorial change (reorganizing of several subsections in new section 5 about "extensions and generalizations"); added clarifications about efficient simulation; minor improvement

    Localization by disorder in the infrared conductivity of (Y,Pr)Ba2Cu3O7 films

    Full text link
    The ab-plane reflectivity of (Y{1-x}Prx)Ba2Cu3O7 thin films was measured in the 30-30000 cm-1 range for samples with x = 0 (Tc = 90 K), x = 0.4 (Tc = 35 K) and x = 0.5 (Tc = 19 K) as a function of temperature in the normal state. The effective charge density obtained from the integrated spectral weight decreases with increasing x. The variation is consistent with the higher dc resistivity for x = 0.4, but is one order of magnitude smaller than what would be expected for x = 0.5. In the latter sample, the conductivity is dominated at all temperatures by a large localization peak. Its magnitude increases as the temperature decreases. We relate this peak to the dc resistivity enhancement. A simple localization-by-disorder model accounts for the optical conductivity of the x = 0.5 sample.Comment: 7 pages with (4) figures include

    Faithful Squashed Entanglement

    Get PDF
    Squashed entanglement is a measure for the entanglement of bipartite quantum states. In this paper we present a lower bound for squashed entanglement in terms of a distance to the set of separable states. This implies that squashed entanglement is faithful, that is, strictly positive if and only if the state is entangled. We derive the bound on squashed entanglement from a bound on quantum conditional mutual information, which is used to define squashed entanglement and corresponds to the amount by which strong subadditivity of von Neumann entropy fails to be saturated. Our result therefore sheds light on the structure of states that almost satisfy strong subadditivity with equality. The proof is based on two recent results from quantum information theory: the operational interpretation of the quantum mutual information as the optimal rate for state redistribution and the interpretation of the regularised relative entropy of entanglement as an error exponent in hypothesis testing. The distance to the set of separable states is measured by the one-way LOCC norm, an operationally-motivated norm giving the optimal probability of distinguishing two bipartite quantum states, each shared by two parties, using any protocol formed by local quantum operations and one-directional classical communication between the parties. A similar result for the Frobenius or Euclidean norm follows immediately. The result has two applications in complexity theory. The first is a quasipolynomial-time algorithm solving the weak membership problem for the set of separable states in one-way LOCC or Euclidean norm. The second concerns quantum Merlin-Arthur games. Here we show that multiple provers are not more powerful than a single prover when the verifier is restricted to one-way LOCC operations thereby providing a new characterisation of the complexity class QMA.Comment: 24 pages, 1 figure, 1 table. Due to an error in the published version, claims have been weakened from the LOCC norm to the one-way LOCC nor

    Single-shot security for one-time memories in the isolated qubits model

    Get PDF
    One-time memories (OTM's) are simple, tamper-resistant cryptographic devices, which can be used to implement sophisticated functionalities such as one-time programs. Can one construct OTM's whose security follows from some physical principle? This is not possible in a fully-classical world, or in a fully-quantum world, but there is evidence that OTM's can be built using "isolated qubits" -- qubits that cannot be entangled, but can be accessed using adaptive sequences of single-qubit measurements. Here we present new constructions for OTM's using isolated qubits, which improve on previous work in several respects: they achieve a stronger "single-shot" security guarantee, which is stated in terms of the (smoothed) min-entropy; they are proven secure against adversaries who can perform arbitrary local operations and classical communication (LOCC); and they are efficiently implementable. These results use Wiesner's idea of conjugate coding, combined with error-correcting codes that approach the capacity of the q-ary symmetric channel, and a high-order entropic uncertainty relation, which was originally developed for cryptography in the bounded quantum storage model.Comment: v2: to appear in CRYPTO 2014. 21 pages, 3 figure

    Colossal dielectric constants in transition-metal oxides

    Get PDF
    Many transition-metal oxides show very large ("colossal") magnitudes of the dielectric constant and thus have immense potential for applications in modern microelectronics and for the development of new capacitance-based energy-storage devices. In the present work, we thoroughly discuss the mechanisms that can lead to colossal values of the dielectric constant, especially emphasising effects generated by external and internal interfaces, including electronic phase separation. In addition, we provide a detailed overview and discussion of the dielectric properties of CaCu3Ti4O12 and related systems, which is today's most investigated material with colossal dielectric constant. Also a variety of further transition-metal oxides with large dielectric constants are treated in detail, among them the system La2-xSrxNiO4 where electronic phase separation may play a role in the generation of a colossal dielectric constant.Comment: 31 pages, 18 figures, submitted to Eur. Phys. J. for publication in the Special Topics volume "Cooperative Phenomena in Solids: Metal-Insulator Transitions and Ordering of Microscopic Degrees of Freedom

    FGF receptor genes and breast cancer susceptibility: results from the Breast Cancer Association Consortium

    Get PDF
    Background:Breast cancer is one of the most common malignancies in women. Genome-wide association studies have identified FGFR2 as a breast cancer susceptibility gene. Common variation in other fibroblast growth factor (FGF) receptors might also modify risk. We tested this hypothesis by studying genotyped single-nucleotide polymorphisms (SNPs) and imputed SNPs in FGFR1, FGFR3, FGFR4 and FGFRL1 in the Breast Cancer Association Consortium. Methods:Data were combined from 49 studies, including 53 835 cases and 50 156 controls, of which 89 050 (46 450 cases and 42 600 controls) were of European ancestry, 12 893 (6269 cases and 6624 controls) of Asian and 2048 (1116 cases and 932 controls) of African ancestry. Associations with risk of breast cancer, overall and by disease sub-type, were assessed using unconditional logistic regression. Results:Little evidence of association with breast cancer risk was observed for SNPs in the FGF receptor genes. The strongest evidence in European women was for rs743682 in FGFR3; the estimated per-allele odds ratio was 1.05 (95 confidence interval=1.02-1.09, P=0.0020), which is substantially lower than that observed for SNPs in FGFR2. Conclusion:Our results suggest that common variants in the other FGF receptors are not associated with risk of breast cancer to the degree observed for FGFR2. © 2014 Cancer Research UK

    Simple and tight bounds for information reconciliation and privacy amplification

    No full text
    Abstract. Shannon entropy is a useful and important measure in information processing, for instance, data compression or randomness extraction, under the assumption—which can typically safely be made in communication theory—that a certain random experiment is independently repeated many times. In cryptography, however, where a system’s working has to be proven with respect to a malicious adversary, this assumption usually translates to a restriction on the latter’s knowledge or behavior and is generally not satisfied. An example is quantum key agreement, where the adversary can attack each particle sent through the quantum channel differently or even carry out coherent attacks, combining a number of particles together. In information-theoretic key agreement, the central functionalities of information reconciliation and privacy amplification have, therefore, been extensively studied in the scenario of general distributions: Partial solutions have been given, but the obtained bounds are arbitrarily far from tight, and a full analysis appeare
    corecore