1,251 research outputs found
Monensin and brefeldin A differentially affect the phosphorylation and sulfation of secretory proteins.
Chromogranin B and secretogranin II, two members of the granin family, are known to be post-translationally modified by the addition of O-linked carbohydrates to serine and/or threonine, phosphate to serine and threonine, and sulfate to carbohydrate and tyrosine residues. In the present study, chromogranin B and secretogranin II were used as model proteins to investigate in which subcompartment of the Golgi complex secretory proteins become phosphorylated. Monensin, a drug known to block the transport from the medial to the trans cisternae of the Golgi stack, inhibited the phosphorylation of the granins, indicating that this modification occurred distal to the medial Golgi. Monensin also blocked the addition of galactose to O-linked carbohydrates and the sulfation of the granins, confirming previous data that these modifications take place in the trans Golgi. To distinguish, within the trans Golgi, between the trans cisternae of the Golgi stack and the trans Golgi network, we made use of the previous observation that brefeldin A results in the redistribution to the endoplasmic reticulum of membrane-bound enzymes of the trans cisternae of the Golgi stack, but not of the trans Golgi network. Brefeldin A treatment abolished granin sulfation but resulted in the accumulation of phosphorylated and galactosylated granins. Differential effects of brefeldin A on membranes of the Golgi stack versus the trans Golgi network were also observed by immunofluorescence analysis of marker proteins specific for either compartment. Our results suggest that the phosphorylation of secretory proteins, like their galactosylation, largely occurs in the trans cisternae of the Golgi stack, whereas the sulfation of secretory proteins on both carbohydrate and tyrosine residues takes place selectively in the trans Golgi network
Estimates for practical quantum cryptography
In this article I present a protocol for quantum cryptography which is secure
against attacks on individual signals. It is based on the Bennett-Brassard
protocol of 1984 (BB84). The security proof is complete as far as the use of
single photons as signal states is concerned. Emphasis is given to the
practicability of the resulting protocol. For each run of the quantum key
distribution the security statement gives the probability of a successful key
generation and the probability for an eavesdropper's knowledge, measured as
change in Shannon entropy, to be below a specified maximal value.Comment: Authentication scheme corrected. Other improvements of presentatio
Oscillator model for dissipative QED in an inhomogeneous dielectric
The Ullersma model for the damped harmonic oscillator is coupled to the
quantised electromagnetic field. All material parameters and interaction
strengths are allowed to depend on position. The ensuing Hamiltonian is
expressed in terms of canonical fields, and diagonalised by performing a
normal-mode expansion. The commutation relations of the diagonalising operators
are in agreement with the canonical commutation relations. For the proof we
replace all sums of normal modes by complex integrals with the help of the
residue theorem. The same technique helps us to explicitly calculate the
quantum evolution of all canonical and electromagnetic fields. We identify the
dielectric constant and the Green function of the wave equation for the
electric field. Both functions are meromorphic in the complex frequency plane.
The solution of the extended Ullersma model is in keeping with well-known
phenomenological rules for setting up quantum electrodynamics in an absorptive
and spatially inhomogeneous dielectric. To establish this fundamental
justification, we subject the reservoir of independent harmonic oscillators to
a continuum limit. The resonant frequencies of the reservoir are smeared out
over the real axis. Consequently, the poles of both the dielectric constant and
the Green function unite to form a branch cut. Performing an analytic
continuation beyond this branch cut, we find that the long-time behaviour of
the quantised electric field is completely determined by the sources of the
reservoir. Through a Riemann-Lebesgue argument we demonstrate that the field
itself tends to zero, whereas its quantum fluctuations stay alive. We argue
that the last feature may have important consequences for application of
entanglement and related processes in quantum devices.Comment: 24 pages, 1 figur
Experimental Demonstration of Optimal Unambiguous State Discrimination
We present the first full demonstration of unambiguous state discrimination
between non-orthogonal quantum states. Using a novel free space interferometer
we have realised the optimum quantum measurement scheme for two non-orthogonal
states of light, known as the Ivanovic-Dieks-Peres (IDP) measurement. We have
for the first time gained access to all three possible outcomes of this
measurement. All aspects of this generalised measurement scheme, including its
superiority over a standard von Neumann measurement, have been demonstrated
within 1.5% of the IDP predictions
Security against eavesdropping in quantum cryptography
In this article we deal with the security of the BB84 quantum cryptography
protocol over noisy channels using generalized privacy amplification. For this
we estimate the fraction of bits needed to be discarded during the privacy
amplification step. This estimate is given for two scenarios, both of which
assume the eavesdropper to access each of the signals independently and take
error correction into account. One scenario does not allow a delay of the
eavesdropper's measurement of a measurement probe until he receives additional
classical information. In this scenario we achieve a sharp bound. The other
scenario allows a measurement delay, so that the general attack of an
eavesdropper on individual signals is covered. This bound is not sharp but
allows a practical implementation of the protocol.Comment: 11 pages including 3 figures, contains new results not contained in
my Phys. Rev. A pape
``Plug and play'' systems for quantum cryptography
We present a time-multiplexed interferometer based on Faraday mirrors, and
apply it to quantum key distribution. The interfering pulses follow exactly the
same spatial path, ensuring very high stability and self balancing. Use of
Faraday mirrors compensates automatically any birefringence effects and
polarization dependent losses in the transmitting fiber. First experimental
results show a fringe visibility of 0.9984 for a 23km-long interferometer,
based on installed telecom fibers.Comment: LaTex, 6 pages, with 2 Postscript figures, Submitted to Applied
Physics Letter
- …