1,940 research outputs found
Quantum private queries
We propose a cheat sensitive quantum protocol to perform a private search on
a classical database which is efficient in terms of communication complexity.
It allows a user to retrieve an item from the server in possession of the
database without revealing which item she retrieved: if the server tries to
obtain information on the query, the person querying the database can find it
out. Furthermore our protocol ensures perfect data privacy of the database,
i.e. the information that the user can retrieve in a single queries is bounded
and does not depend on the size of the database. With respect to the known
(quantum and classical) strategies for private information retrieval, our
protocol displays an exponential reduction both in communication complexity and
in running-time computational complexity.Comment: 4 pages, 1 figur
Mechanism of peptide-induced mast cell degranulation: translocation and patch clamp studies.
Substance P and other polycationic peptides are thought to stimulate mast cell degranulation via direct activation of G proteins. We investigated the ability of extracellularly applied substance P to translocate into mast cells and the ability of intracellularly applied substance P to stimulate degranulation. In addition, we studied by reverse transcription--PCR whether substance P-specific receptors are present in the mast cell membrane. To study translocation, a biologically active and enzymatically stable fluorescent analogue of substance P was synthesized. A rapid, substance P receptor- and energy-independent uptake of this peptide into pertussis toxin-treated and -untreated mast cells was demonstrated using confocal laser scanning microscopy. The peptide was shown to localize preferentially on or inside the mast cell granules using electron microscopic autoradiography with 125I-labeled all-D substance P and 3H-labeled substance P. Cell membrane capacitance measurements using the patch-clamp technique demonstrated that intracellularly applied substance P induced calcium transients and activated mast cell exocytosis with a time delay that depended on peptide concentration (delay of 100-500 s at concentrations of substance P from 50 to 5 microM). Degranulation in response to intracellularly applied substance P was inhibited by GDPbetaS and pertussis toxin, suggesting that substance P acts via G protein activation. These results support the recently proposed model of a receptor-independent mechanism of peptide-induced mast cell degranulation, which assumes a direct interaction of peptides with G protein alpha subunits subsequent to their translocation across the plasma membrane
Many Roads to Synchrony: Natural Time Scales and Their Algorithms
We consider two important time scales---the Markov and cryptic orders---that
monitor how an observer synchronizes to a finitary stochastic process. We show
how to compute these orders exactly and that they are most efficiently
calculated from the epsilon-machine, a process's minimal unifilar model.
Surprisingly, though the Markov order is a basic concept from stochastic
process theory, it is not a probabilistic property of a process. Rather, it is
a topological property and, moreover, it is not computable from any
finite-state model other than the epsilon-machine. Via an exhaustive survey, we
close by demonstrating that infinite Markov and infinite cryptic orders are a
dominant feature in the space of finite-memory processes. We draw out the roles
played in statistical mechanical spin systems by these two complementary length
scales.Comment: 17 pages, 16 figures:
http://cse.ucdavis.edu/~cmg/compmech/pubs/kro.htm. Santa Fe Institute Working
Paper 10-11-02
Quantum Cryptography without Switching
We propose a new coherent state quantum key distribution protocol that
eliminates the need to randomly switch between measurement bases. This protocol
provides significantly higher secret key rates with increased bandwidths than
previous schemes that only make single quadrature measurements. It also offers
the further advantage of simplicity compared to all previous protocols which,
to date, have relied on switching.Comment: 4 pages, 4 figures, Submitte
Pulsar Searches with the SKA
The Square Kilometre Array will be an amazing instrument for pulsar
astronomy. While the full SKA will be sensitive enough to detect all pulsars in
the Galaxy visible from Earth, already with SKA1, pulsar searches will discover
enough pulsars to increase the currently known population by a factor of four,
no doubt including a range of amazing unknown sources. Real time processing is
needed to deal with the 60 PB of pulsar search data collected per day, using a
signal processing pipeline required to perform more than 10 POps. Here we
present the suggested design of the pulsar search engine for the SKA and
discuss challenges and solutions to the pulsar search venture.Comment: 4 pages, 1 figure. To be published in Proceedings of IAU Symposium
337: Pulsar Astrophysics - The Next 50 Year
How to share a quantum secret
We investigate the concept of quantum secret sharing. In a ((k,n)) threshold
scheme, a secret quantum state is divided into n shares such that any k of
those shares can be used to reconstruct the secret, but any set of k-1 or fewer
shares contains absolutely no information about the secret. We show that the
only constraint on the existence of threshold schemes comes from the quantum
"no-cloning theorem", which requires that n < 2k, and, in all such cases, we
give an efficient construction of a ((k,n)) threshold scheme. We also explore
similarities and differences between quantum secret sharing schemes and quantum
error-correcting codes. One remarkable difference is that, while most existing
quantum codes encode pure states as pure states, quantum secret sharing schemes
must use mixed states in some cases. For example, if k <= n < 2k-1 then any
((k,n)) threshold scheme must distribute information that is globally in a
mixed state.Comment: 5 pages, REVTeX, submitted to PR
Unambiguous state discrimination in quantum cryptography with weak coherent states
The use of linearly independent signal states in realistic implementations of
quantum key distribution (QKD) enables an eavesdropper to perform unambiguous
state discrimination. We explore quantitatively the limits for secure QKD
imposed by this fact taking into account that the receiver can monitor to some
extend the photon number statistics of the signals even with todays standard
detection schemes. We compare our attack to the beamsplitting attack and show
that security against beamsplitting attack does not necessarily imply security
against the attack considered here.Comment: 10 pages, 6 figures, updated version with added discussion of
beamsplitting attac
Mesoscopic superpositions of vibronic collective states of N trapped ions
We propose a scalable procedure to generate entangled superpositions of
motional coherent states and electronic states in N trapped ions. Beyond their
fundamental importance, these states may be of interest for quantum information
processing and may be used in experimental studies of decoherence.Comment: Final version, as published in Physical Review Letters. See also
further developments and applications in quant-ph/020207
Induced hyperlipaemia and immune challenge in locusts
Injections of immunogens, such as β-1,3-glucan or lipopolysaccharide (LPS), bring about a marked hyperlipaemia with associated changes in lipophorins and apolipophorin-III in the haemolymph of Locusta migratoria. These changes are similar to those observed after injection of adipokinetic hormone (AKH). The possibility that endogenous AKH is released as part of the response to these immunogens is investigated using passive immunisation against AKH-I, and measurement of AKH-I titre in the haemolymph after injection of immunogens. The data presented show that, despite the similarity of the changes brought about by the presence of immunogens in the haemolymph to those brought about by AKH, there is no release of endogenous AKH after injection of laminarin or LPS. A direct effect of the immunogens on release of neutral lipids by the fat body cannot be demonstrated in vitro, and the mechanism by which hyperlipaemia is induced during immune challenge remains uncertain
- …