1,944 research outputs found

    Titan cell production in Cryptococcus neoformans reshapes the cell wall and capsule composition during infection

    Get PDF
    This work was supported by the National Institutes of Health (R01AI080275 and R21AI22352), the NIH Fogarty International Center (R25TW009345), the University of Minnesota Center for Translational Science Institute (UL1TR000114), Wellcome Trust (086827, 075470, 097377, 101873 & 200208) and MRC Centre for Medical Mycology (N006364/1). The funders had no role in study design, data collection and interpretation, or the decision to submit the work for publication.Peer reviewedPublisher PD

    Thopeutica petertaylori, a new tiger beetle species (Coleoptera: Cicindelidae) from Mindanao, Philippines

    Get PDF
    Thopeutica (Thopeutica) petertaylori Medina, Cabras and Wiesner (Coleoptera: Cicindelidae), new species, is described from the Cagan river, New Bataan, Mindanao. It is characterized by the metallic ground colour of the elytra, prominent middle tooth in the labrum, and bottle-shaped aedeagus with apical hook

    Coin Tossing is Strictly Weaker Than Bit Commitment

    Full text link
    We define cryptographic assumptions applicable to two mistrustful parties who each control two or more separate secure sites between which special relativity guarantees a time lapse in communication. We show that, under these assumptions, unconditionally secure coin tossing can be carried out by exchanges of classical information. We show also, following Mayers, Lo and Chau, that unconditionally secure bit commitment cannot be carried out by finitely many exchanges of classical or quantum information. Finally we show that, under standard cryptographic assumptions, coin tossing is strictly weaker than bit commitment. That is, no secure classical or quantum bit commitment protocol can be built from a finite number of invocations of a secure coin tossing black box together with finitely many additional information exchanges.Comment: Final version; to appear in Phys. Rev. Let

    Thopeutica petertaylori, a new tiger beetle species (Coleoptera: Cicindelidae) from Mindanao, Philippines

    Get PDF
    Thopeutica (Thopeutica) petertaylori Medina, Cabras and Wiesner (Coleoptera: Cicindelidae), new species, is described from the Cagan river, New Bataan, Mindanao. It is characterized by the metallic ground colour of the elytra, prominent middle tooth in the labrum, and bottle-shaped aedeagus with apical hook

    qBitcoin: A Peer-to-Peer Quantum Cash System

    Full text link
    A decentralized online quantum cash system, called qBitcoin, is given. We design the system which has great benefits of quantization in the following sense. Firstly, quantum teleportation technology is used for coin transaction, which prevents from the owner of the coin keeping the original coin data even after sending the coin to another. This was a main problem in a classical circuit and a blockchain was introduced to solve this issue. In qBitcoin, the double-spending problem never happens and its security is guaranteed theoretically by virtue of quantum information theory. Making a block is time consuming and the system of qBitcoin is based on a quantum chain, instead of blocks. Therefore a payment can be completed much faster than Bitcoin. Moreover we employ quantum digital signature so that it naturally inherits properties of peer-to-peer (P2P) cash system as originally proposed in Bitcoin.Comment: 11 pages, 2 figure

    Practical Quantum Bit Commitment Protocol

    Full text link
    A quantum protocol for bit commitment the security of which is based on technological limitations on nondemolition measurements and long-term quantum memory is presented.Comment: Quantum Inf. Process. (2011

    How to share a quantum secret

    Full text link
    We investigate the concept of quantum secret sharing. In a ((k,n)) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the secret, but any set of k-1 or fewer shares contains absolutely no information about the secret. We show that the only constraint on the existence of threshold schemes comes from the quantum "no-cloning theorem", which requires that n < 2k, and, in all such cases, we give an efficient construction of a ((k,n)) threshold scheme. We also explore similarities and differences between quantum secret sharing schemes and quantum error-correcting codes. One remarkable difference is that, while most existing quantum codes encode pure states as pure states, quantum secret sharing schemes must use mixed states in some cases. For example, if k <= n < 2k-1 then any ((k,n)) threshold scheme must distribute information that is globally in a mixed state.Comment: 5 pages, REVTeX, submitted to PR

    An arbitrated quantum signature scheme

    Get PDF
    The general principle for a quantum signature scheme is proposed and investigated based on ideas from classical signature schemes and quantum cryptography. The suggested algorithm is implemented by a symmetrical quantum key cryptosystem and Greenberger-Horne-Zeilinger (GHZ) triplet states and relies on the availability of an arbitrator. We can guarantee the unconditional security of the algorithm, mostly due to the correlation of the GHZ triplet states and the use of quantum one-time pads.Comment: 10 pages, no figures. Phys. Rev. A 65, (In press
    corecore