1,940 research outputs found

    Quantum private queries

    Full text link
    We propose a cheat sensitive quantum protocol to perform a private search on a classical database which is efficient in terms of communication complexity. It allows a user to retrieve an item from the server in possession of the database without revealing which item she retrieved: if the server tries to obtain information on the query, the person querying the database can find it out. Furthermore our protocol ensures perfect data privacy of the database, i.e. the information that the user can retrieve in a single queries is bounded and does not depend on the size of the database. With respect to the known (quantum and classical) strategies for private information retrieval, our protocol displays an exponential reduction both in communication complexity and in running-time computational complexity.Comment: 4 pages, 1 figur

    Mechanism of peptide-induced mast cell degranulation: translocation and patch clamp studies.

    Get PDF
    Substance P and other polycationic peptides are thought to stimulate mast cell degranulation via direct activation of G proteins. We investigated the ability of extracellularly applied substance P to translocate into mast cells and the ability of intracellularly applied substance P to stimulate degranulation. In addition, we studied by reverse transcription--PCR whether substance P-specific receptors are present in the mast cell membrane. To study translocation, a biologically active and enzymatically stable fluorescent analogue of substance P was synthesized. A rapid, substance P receptor- and energy-independent uptake of this peptide into pertussis toxin-treated and -untreated mast cells was demonstrated using confocal laser scanning microscopy. The peptide was shown to localize preferentially on or inside the mast cell granules using electron microscopic autoradiography with 125I-labeled all-D substance P and 3H-labeled substance P. Cell membrane capacitance measurements using the patch-clamp technique demonstrated that intracellularly applied substance P induced calcium transients and activated mast cell exocytosis with a time delay that depended on peptide concentration (delay of 100-500 s at concentrations of substance P from 50 to 5 microM). Degranulation in response to intracellularly applied substance P was inhibited by GDPbetaS and pertussis toxin, suggesting that substance P acts via G protein activation. These results support the recently proposed model of a receptor-independent mechanism of peptide-induced mast cell degranulation, which assumes a direct interaction of peptides with G protein alpha subunits subsequent to their translocation across the plasma membrane

    Many Roads to Synchrony: Natural Time Scales and Their Algorithms

    Full text link
    We consider two important time scales---the Markov and cryptic orders---that monitor how an observer synchronizes to a finitary stochastic process. We show how to compute these orders exactly and that they are most efficiently calculated from the epsilon-machine, a process's minimal unifilar model. Surprisingly, though the Markov order is a basic concept from stochastic process theory, it is not a probabilistic property of a process. Rather, it is a topological property and, moreover, it is not computable from any finite-state model other than the epsilon-machine. Via an exhaustive survey, we close by demonstrating that infinite Markov and infinite cryptic orders are a dominant feature in the space of finite-memory processes. We draw out the roles played in statistical mechanical spin systems by these two complementary length scales.Comment: 17 pages, 16 figures: http://cse.ucdavis.edu/~cmg/compmech/pubs/kro.htm. Santa Fe Institute Working Paper 10-11-02

    Quantum Cryptography without Switching

    Get PDF
    We propose a new coherent state quantum key distribution protocol that eliminates the need to randomly switch between measurement bases. This protocol provides significantly higher secret key rates with increased bandwidths than previous schemes that only make single quadrature measurements. It also offers the further advantage of simplicity compared to all previous protocols which, to date, have relied on switching.Comment: 4 pages, 4 figures, Submitte

    Pulsar Searches with the SKA

    Get PDF
    The Square Kilometre Array will be an amazing instrument for pulsar astronomy. While the full SKA will be sensitive enough to detect all pulsars in the Galaxy visible from Earth, already with SKA1, pulsar searches will discover enough pulsars to increase the currently known population by a factor of four, no doubt including a range of amazing unknown sources. Real time processing is needed to deal with the 60 PB of pulsar search data collected per day, using a signal processing pipeline required to perform more than 10 POps. Here we present the suggested design of the pulsar search engine for the SKA and discuss challenges and solutions to the pulsar search venture.Comment: 4 pages, 1 figure. To be published in Proceedings of IAU Symposium 337: Pulsar Astrophysics - The Next 50 Year

    How to share a quantum secret

    Full text link
    We investigate the concept of quantum secret sharing. In a ((k,n)) threshold scheme, a secret quantum state is divided into n shares such that any k of those shares can be used to reconstruct the secret, but any set of k-1 or fewer shares contains absolutely no information about the secret. We show that the only constraint on the existence of threshold schemes comes from the quantum "no-cloning theorem", which requires that n < 2k, and, in all such cases, we give an efficient construction of a ((k,n)) threshold scheme. We also explore similarities and differences between quantum secret sharing schemes and quantum error-correcting codes. One remarkable difference is that, while most existing quantum codes encode pure states as pure states, quantum secret sharing schemes must use mixed states in some cases. For example, if k <= n < 2k-1 then any ((k,n)) threshold scheme must distribute information that is globally in a mixed state.Comment: 5 pages, REVTeX, submitted to PR

    Unambiguous state discrimination in quantum cryptography with weak coherent states

    Full text link
    The use of linearly independent signal states in realistic implementations of quantum key distribution (QKD) enables an eavesdropper to perform unambiguous state discrimination. We explore quantitatively the limits for secure QKD imposed by this fact taking into account that the receiver can monitor to some extend the photon number statistics of the signals even with todays standard detection schemes. We compare our attack to the beamsplitting attack and show that security against beamsplitting attack does not necessarily imply security against the attack considered here.Comment: 10 pages, 6 figures, updated version with added discussion of beamsplitting attac

    Mesoscopic superpositions of vibronic collective states of N trapped ions

    Get PDF
    We propose a scalable procedure to generate entangled superpositions of motional coherent states and electronic states in N trapped ions. Beyond their fundamental importance, these states may be of interest for quantum information processing and may be used in experimental studies of decoherence.Comment: Final version, as published in Physical Review Letters. See also further developments and applications in quant-ph/020207

    Induced hyperlipaemia and immune challenge in locusts

    Get PDF
    Injections of immunogens, such as β-1,3-glucan or lipopolysaccharide (LPS), bring about a marked hyperlipaemia with associated changes in lipophorins and apolipophorin-III in the haemolymph of Locusta migratoria. These changes are similar to those observed after injection of adipokinetic hormone (AKH). The possibility that endogenous AKH is released as part of the response to these immunogens is investigated using passive immunisation against AKH-I, and measurement of AKH-I titre in the haemolymph after injection of immunogens. The data presented show that, despite the similarity of the changes brought about by the presence of immunogens in the haemolymph to those brought about by AKH, there is no release of endogenous AKH after injection of laminarin or LPS. A direct effect of the immunogens on release of neutral lipids by the fat body cannot be demonstrated in vitro, and the mechanism by which hyperlipaemia is induced during immune challenge remains uncertain
    • …
    corecore