578 research outputs found

    Economical (k,m)-threshold controlled quantum teleportation

    Full text link
    We study a (k,m)-threshold controlling scheme for controlled quantum teleportation. A standard polynomial coding over GF(p) with prime p > m-1 needs to distribute a d-dimensional qudit with d >= p to each controller for this purpose. We propose a scheme using m qubits (two-dimensional qudits) for the controllers' portion, following a discussion on the benefit of a quantum control in comparison to a classical control of a quantum teleportation.Comment: 11 pages, 2 figures, v2: minor revision, discussions improved, an equation corrected in procedure (A) of section 4.3, v3: major revision, protocols extended, citations added, v4: minor grammatical revision, v5: minor revision, discussions extende

    Interpretations of Presburger Arithmetic in Itself

    Full text link
    Presburger arithmetic PrA is the true theory of natural numbers with addition. We study interpretations of PrA in itself. We prove that all one-dimensional self-interpretations are definably isomorphic to the identity self-interpretation. In order to prove the results we show that all linear orders that are interpretable in (N,+) are scattered orders with the finite Hausdorff rank and that the ranks are bounded in terms of the dimension of the respective interpretations. From our result about self-interpretations of PrA it follows that PrA isn't one-dimensionally interpretable in any of its finite subtheories. We note that the latter was conjectured by A. Visser.Comment: Published in proceedings of LFCS 201

    Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement

    Full text link
    We present a way for symmetric multiparty-controlled teleportation of an arbitrary two-particle entangled state based on Bell-basis measurements by using two Greenberger-Horne-Zeilinger states, i.e., a sender transmits an arbitrary two-particle entangled state to a distant receiver, an arbitrary one of the n+1n+1 agents via the control of the others in a network. It will be shown that the outcomes in the cases that nn is odd or it is even are different in principle as the receiver has to perform a controlled-not operation on his particles for reconstructing the original arbitrary entangled state in addition to some local unitary operations in the former. Also we discuss the applications of this controlled teleporation for quantum secret sharing of classical and quantum information. As all the instances can be used to carry useful information, its efficiency for qubits approaches the maximal value.Comment: 9 pages, 3 figures; the revised version published in Physical Review A 72, 022338 (2005). The detail for setting up a GHZ-state quantum channel is adde

    Unconditional security of entanglement-based continuous-variable quantum secret sharing

    Get PDF
    The need for secrecy and security is essential in communication. Secret sharing is a conventional protocol to distribute a secret message to a group of parties, who cannot access it individually but need to cooperate in order to decode it. While several variants of this protocol have been investigated, including realizations using quantum systems, the security of quantum secret sharing schemes still remains unproven almost two decades after their original conception. Here we establish an unconditional security proof for entanglement-based continuous-variable quantum secret sharing schemes, in the limit of asymptotic keys and for an arbitrary number of players. We tackle the problem by resorting to the recently developed one-sided device-independent approach to quantum key distribution. We demonstrate theoretically the feasibility of our scheme, which can be implemented by Gaussian states and homodyne measurements, with no need for ideal single-photon sources or quantum memories. Our results contribute to validating quantum secret sharing as a viable primitive for quantum technologies

    Sediment management for Horseshoe Lake and its watershed, Alexander County, Illinois

    Get PDF
    Illinois Department of Conservation Contract No. 1-5-39782published or submitted for publicationis peer reviewedOpe

    Three-party qutrit-state sharing

    Full text link
    A three-party scheme for securely sharing an arbitrary unknown single-qutrit state is presented. Using a general Greenberger-Horne-Zeilinger (GHZ) state as the quantum channel among the three parties, the quantum information (i.e., the qutrit state) from the sender can be split in such a way that the information can be recovered if and only if both receivers collaborate. Moreover, the generation of the scheme to multi-party case is also sketched.Comment: 7 page

    Circular quantum secret sharing

    Full text link
    A circular quantum secret sharing protocol is proposed, which is useful and efficient when one of the parties of secret sharing is remote to the others who are in adjacent, especially the parties are more than three. We describe the process of this protocol and discuss its security when the quantum information carrying is polarized single photons running circularly. It will be shown that entanglement is not necessary for quantum secret sharing. Moreover, the theoretic efficiency is improved to approach 100% as almost all the instances can be used for generating the private key, and each photon can carry one bit of information without quantum storage. It is straightforwardly to utilize this topological structure to complete quantum secret sharing with multi-level two-particle entanglement in high capacity securely.Comment: 7 pages, 2 figure

    Increasing Engagement in Advance Care Planning Using a Behaviour Change Model: Study Protocol for the STAMP Randomised Controlled Trials

    Get PDF
    Introduction Advance care planning (ACP) is a key component of high-quality end-of-life care but is underused. Interventions based on models of behaviour change may fill an important gap in available programmes to increase ACP engagement. Such interventions are designed for broad outreach and flexibility in delivery. The purpose of the Sharing and Talking about My Preferences study is to examine the efficacy of three behaviour change approaches to increasing ACP engagement through two related randomised controlled trials being conducted in different settings (Veterans Affairs (VA) medical centre and community). Methods and analysis Eligible participants are 55 years or older. Participants in the community are being recruited in person in primary care and specialty outpatient practices and senior living sites, and participants in the VA are recruited by telephone. In the community, randomisation is at the level of the practice or site, with all persons at a given practice/ site receiving either computer-tailored feedback with a behaviour stage-matched brochure (computer-tailored intervention (CTI)) or usual care. At the VA, randomisation is at the level of the participant and is stratified by the number of ACP behaviours completed at baseline. Participants are randomised to one of four groups: CTI, motivational interviewing, motivational enhancement therapy or usual care. The primary outcome is completion of four key ACP behaviours: identification of a surrogate decision maker, communication about goals, completing advance directives and ensuring documents are in the medical record. Analysis will be conducted using mixed effects models, taking into account the clustered randomisation for the community study. Ethics and randomisation The studies have been approved by the appropriate Institutional Review Boards and are being overseen by a Safety Monitoring Committee. The results of these studies will be disseminated to academic audiences and leadership in in the community and VA sites. Trial registration numbers NCT03137459 and NCT03103828

    Illinois Basin - Decatur Project: Soil Carbon Dioxide Flux Monitoring

    Get PDF
    U.S. Department of Energy, National Energy Technology Laboratory, Regional Carbon Sequestraion Partnership Program Contract Number DE-FC26-05NT42588Ope

    Microbial Associations With Microscopic Colitis

    Get PDF
    INTRODUCTION: Microscopic colitis is a relatively common cause of chronic diarrhea and may be linked to luminal factors. Given the essential role of the microbiome in human gut health, analysis of microbiome changes associated with microscopic colitis could provide insights into the development of the disease. METHODS: We enrolled patients who underwent colonoscopy for diarrhea. An experienced pathologist classified patients as having microscopic colitis (n = 52) or controls (n = 153). Research biopsies were taken from the ascending (ASC) and descending (DES) colon, and the microbiome was characterized with Illumina sequencing. We analyzed the associations between microscopic colitis and microbiome with a series of increasingly complex models adjusted for a range of demographic and health factors. RESULTS: We found that alpha diversity was significantly lower in cases with microscopic colitis compared with that in controls in the DES colon microbiome. In the DES colon, a series of models that adjusted for an increasing number of covariates found taxa significantly associated with microscopic colitis, including Proteobacteria that was enriched in cases and Collinsella that was enriched in controls. While the alpha diversity and taxa were not significantly associated with microscopic colitis in the ASC colon microbiome, the inference P values based on ASC and DES microbiomes were highly correlated. DISCUSSION: Our study demonstrates an altered microbiome in cases with microscopic colitis compared with that in controls. Because both the cases and controls experienced diarrhea, we have identified candidate taxa that could be mechanistically responsible for the development of microscopic colitis independent of changes to the microbial community caused by diarrhea
    • …
    corecore