3,548 research outputs found

    Zero-error communication over networks

    Full text link
    Zero-Error communication investigates communication without any error. By defining channels without probabilities, results from Elias can be used to completely characterize which channel can simulate which other channels. We introduce the ambiguity of a channel, which completely characterizes the possibility in principle of a channel to simulate any other channel. In the second part we will look at networks of players connected by channels, while some players may be corrupted. We will show how the ambiguity of a virtual channel connecting two arbitrary players can be calculated. This means that we can exactly specify what kind of zero-error communication is possible between two players in any network of players connected by channels.Comment: 10 pages, full version of the paper presented at the 2004 IEEE International Symposium on Information Theor

    On the Efficiency of Classical and Quantum Secure Function Evaluation

    Full text link
    We provide bounds on the efficiency of secure one-sided output two-party computation of arbitrary finite functions from trusted distributed randomness in the statistical case. From these results we derive bounds on the efficiency of protocols that use different variants of OT as a black-box. When applied to implementations of OT, these bounds generalize most known results to the statistical case. Our results hold in particular for transformations between a finite number of primitives and for any error. In the second part we study the efficiency of quantum protocols implementing OT. While most classical lower bounds for perfectly secure reductions of OT to distributed randomness still hold in the quantum setting, we present a statistically secure protocol that violates these bounds by an arbitrarily large factor. We then prove a weaker lower bound that does hold in the statistical quantum setting and implies that even quantum protocols cannot extend OT. Finally, we present two lower bounds for reductions of OT to commitments and a protocol based on string commitments that is optimal with respect to both of these bounds

    Composable Security in the Bounded-Quantum-Storage Model

    Full text link
    We present a simplified framework for proving sequential composability in the quantum setting. In particular, we give a new, simulation-based, definition for security in the bounded-quantum-storage model, and show that this definition allows for sequential composition of protocols. Damgard et al. (FOCS '05, CRYPTO '07) showed how to securely implement bit commitment and oblivious transfer in the bounded-quantum-storage model, where the adversary is only allowed to store a limited number of qubits. However, their security definitions did only apply to the standalone setting, and it was not clear if their protocols could be composed. Indeed, we first give a simple attack that shows that these protocols are not composable without a small refinement of the model. Finally, we prove the security of their randomized oblivious transfer protocol in our refined model. Secure implementations of oblivious transfer and bit commitment then follow easily by a (classical) reduction to randomized oblivious transfer.Comment: 21 page

    The single-serving channel capacity

    Full text link
    In this paper we provide the answer to the following question: Given a noisy channel and epsilon>0, how many bits can be transmitted with an error of at most epsilon by a single use of the channel?Comment: 4 pages, late

    Unconditional security from noisy quantum storage

    Full text link
    We consider the implementation of two-party cryptographic primitives based on the sole assumption that no large-scale reliable quantum storage is available to the cheating party. We construct novel protocols for oblivious transfer and bit commitment, and prove that realistic noise levels provide security even against the most general attack. Such unconditional results were previously only known in the so-called bounded-storage model which is a special case of our setting. Our protocols can be implemented with present-day hardware used for quantum key distribution. In particular, no quantum storage is required for the honest parties.Comment: 25 pages (IEEE two column), 13 figures, v4: published version (to appear in IEEE Transactions on Information Theory), including bit wise min-entropy sampling. however, for experimental purposes block sampling can be much more convenient, please see v3 arxiv version if needed. See arXiv:0911.2302 for a companion paper addressing aspects of a practical implementation using block samplin

    Oblivious transfer and quantum channels

    Full text link
    We show that oblivious transfer can be seen as the classical analogue to a quantum channel in the same sense as non-local boxes are for maximally entangled qubits.Comment: Invited Paper at the 2006 IEEE Information Theory Workshop (ITW 2006

    Effekte des Dehnens auf die Muskelfunktion und die Verletzungsprophylaxe

    Get PDF

    Minimally invasive surgery when treating endometriosis has a positive effect on health and on quality of work life of affected women

    Get PDF
    STUDY QUESTION What is the effect of the minimally invasive surgical treatment of endometriosis on health and on quality of work life (e.g. working performance) of affected women? SUMMARY ANSWER Absence from work, performance loss and the general negative impact of endometriosis on the job are reduced significantly by the laparoscopic surgery. WHAT IS KNOWN ALREADY The benefits of surgery overall and of the laparoscopic method in particular for treating endometriosis have been described before. However, previous studies focus on medical benchmarks without including the patient's perspective in a quantitative manner. STUDY DESIGN, SIZE, DURATION A retrospective questionnaire-based survey covering 211 women with endometriosis and a history of specific laparoscopic surgery in a Swiss university hospital, tertiary care center. Data were returned anonymously and were collected from the beginning of 2012 until March 2013. PARTICIPANTS/MATERIALS, SETTING, METHODS Women diagnosed with endometriosis and with at least one specific laparoscopic surgery in the past were enrolled in the study. The study investigated the effect of the minimally invasive surgery on health and on quality of work life of affected women. Questions used were obtained from the World Endometriosis Research Foundation (WERF) Global Study on Women's Health (GSWH) instrument. The questionnaire was shortened and adapted for the purpose of the present study. MAIN RESULTS AND THE ROLE OF CHANCE Of the 587 women invited to participate in the study, 232 (232/587 = 40%) returned the questionnaires. Twenty-one questionnaires were excluded due to incomplete data and 211 sets (211/587 = 36%) were included in the study. Our data show that 62% (n = 130) of the study population declared endometriosis as influencing the job during the period prior to surgery, compared with 28% after surgery (P < 0.001). The mean (maximal) absence from work due to endometriosis was reduced from 2.0 (4.9) to 0.5 (1.4) hours per week (P < 0.001). The mean (maximal) loss in working performance after the surgery averaged out at 5.7% (12.6%) compared with 17.5% (30.5%) before this treatment (P < 0.001). LIMITATIONS, REASONS FOR CAUTION The mediocre response rate of the study weakens the representativeness of the investigated population. Considering the anonymous setting a non-responder investigation was not performed. A bias due to selection, information and negativity effects within a retrospective survey cannot be excluded, although study-sensitive questions were provided in multiple ways. The absence of a control group (sham group; e.g. patients undergoing specific diagnostic laparoscopy without treatment) is a further limitation of the study. WIDER IMPLICATIONS OF THE FINDINGS Our study shows that indicated minimally invasive surgery has a clear positive effect on the wellbeing and working performance of women suffering from moderate to severe endometriosis. Furthermore, national net savings in indirect costs with the present number of surgeries is estimated to be €10.7 million per year. In an idealized setting (i.e. without any diagnosis delay) this figure could be more than doubled. STUDY FUNDING/COMPETING INTEREST(S) The study was performed on behalf of the University Hospital of Bern (Inselspital) as one of the leading Swiss tertiary care centers. The authors do not declare any competing interest
    corecore