3,548 research outputs found
Zero-error communication over networks
Zero-Error communication investigates communication without any error. By
defining channels without probabilities, results from Elias can be used to
completely characterize which channel can simulate which other channels. We
introduce the ambiguity of a channel, which completely characterizes the
possibility in principle of a channel to simulate any other channel. In the
second part we will look at networks of players connected by channels, while
some players may be corrupted. We will show how the ambiguity of a virtual
channel connecting two arbitrary players can be calculated. This means that we
can exactly specify what kind of zero-error communication is possible between
two players in any network of players connected by channels.Comment: 10 pages, full version of the paper presented at the 2004 IEEE
International Symposium on Information Theor
On the Efficiency of Classical and Quantum Secure Function Evaluation
We provide bounds on the efficiency of secure one-sided output two-party
computation of arbitrary finite functions from trusted distributed randomness
in the statistical case. From these results we derive bounds on the efficiency
of protocols that use different variants of OT as a black-box. When applied to
implementations of OT, these bounds generalize most known results to the
statistical case. Our results hold in particular for transformations between a
finite number of primitives and for any error. In the second part we study the
efficiency of quantum protocols implementing OT. While most classical lower
bounds for perfectly secure reductions of OT to distributed randomness still
hold in the quantum setting, we present a statistically secure protocol that
violates these bounds by an arbitrarily large factor. We then prove a weaker
lower bound that does hold in the statistical quantum setting and implies that
even quantum protocols cannot extend OT. Finally, we present two lower bounds
for reductions of OT to commitments and a protocol based on string commitments
that is optimal with respect to both of these bounds
Composable Security in the Bounded-Quantum-Storage Model
We present a simplified framework for proving sequential composability in the
quantum setting. In particular, we give a new, simulation-based, definition for
security in the bounded-quantum-storage model, and show that this definition
allows for sequential composition of protocols. Damgard et al. (FOCS '05,
CRYPTO '07) showed how to securely implement bit commitment and oblivious
transfer in the bounded-quantum-storage model, where the adversary is only
allowed to store a limited number of qubits. However, their security
definitions did only apply to the standalone setting, and it was not clear if
their protocols could be composed. Indeed, we first give a simple attack that
shows that these protocols are not composable without a small refinement of the
model. Finally, we prove the security of their randomized oblivious transfer
protocol in our refined model. Secure implementations of oblivious transfer and
bit commitment then follow easily by a (classical) reduction to randomized
oblivious transfer.Comment: 21 page
The single-serving channel capacity
In this paper we provide the answer to the following question: Given a noisy
channel and epsilon>0, how many bits can be transmitted with an error of at
most epsilon by a single use of the channel?Comment: 4 pages, late
Unconditional security from noisy quantum storage
We consider the implementation of two-party cryptographic primitives based on
the sole assumption that no large-scale reliable quantum storage is available
to the cheating party. We construct novel protocols for oblivious transfer and
bit commitment, and prove that realistic noise levels provide security even
against the most general attack. Such unconditional results were previously
only known in the so-called bounded-storage model which is a special case of
our setting. Our protocols can be implemented with present-day hardware used
for quantum key distribution. In particular, no quantum storage is required for
the honest parties.Comment: 25 pages (IEEE two column), 13 figures, v4: published version (to
appear in IEEE Transactions on Information Theory), including bit wise
min-entropy sampling. however, for experimental purposes block sampling can
be much more convenient, please see v3 arxiv version if needed. See
arXiv:0911.2302 for a companion paper addressing aspects of a practical
implementation using block samplin
Oblivious transfer and quantum channels
We show that oblivious transfer can be seen as the classical analogue to a
quantum channel in the same sense as non-local boxes are for maximally
entangled qubits.Comment: Invited Paper at the 2006 IEEE Information Theory Workshop (ITW 2006
Minimally invasive surgery when treating endometriosis has a positive effect on health and on quality of work life of affected women
STUDY QUESTION What is the effect of the minimally invasive surgical treatment of endometriosis on health and on quality of work life (e.g. working performance) of affected women? SUMMARY ANSWER Absence from work, performance loss and the general negative impact of endometriosis on the job are reduced significantly by the laparoscopic surgery. WHAT IS KNOWN ALREADY The benefits of surgery overall and of the laparoscopic method in particular for treating endometriosis have been described before. However, previous studies focus on medical benchmarks without including the patient's perspective in a quantitative manner. STUDY DESIGN, SIZE, DURATION A retrospective questionnaire-based survey covering 211 women with endometriosis and a history of specific laparoscopic surgery in a Swiss university hospital, tertiary care center. Data were returned anonymously and were collected from the beginning of 2012 until March 2013. PARTICIPANTS/MATERIALS, SETTING, METHODS Women diagnosed with endometriosis and with at least one specific laparoscopic surgery in the past were enrolled in the study. The study investigated the effect of the minimally invasive surgery on health and on quality of work life of affected women. Questions used were obtained from the World Endometriosis Research Foundation (WERF) Global Study on Women's Health (GSWH) instrument. The questionnaire was shortened and adapted for the purpose of the present study. MAIN RESULTS AND THE ROLE OF CHANCE Of the 587 women invited to participate in the study, 232 (232/587 = 40%) returned the questionnaires. Twenty-one questionnaires were excluded due to incomplete data and 211 sets (211/587 = 36%) were included in the study. Our data show that 62% (n = 130) of the study population declared endometriosis as influencing the job during the period prior to surgery, compared with 28% after surgery (P < 0.001). The mean (maximal) absence from work due to endometriosis was reduced from 2.0 (4.9) to 0.5 (1.4) hours per week (P < 0.001). The mean (maximal) loss in working performance after the surgery averaged out at 5.7% (12.6%) compared with 17.5% (30.5%) before this treatment (P < 0.001). LIMITATIONS, REASONS FOR CAUTION The mediocre response rate of the study weakens the representativeness of the investigated population. Considering the anonymous setting a non-responder investigation was not performed. A bias due to selection, information and negativity effects within a retrospective survey cannot be excluded, although study-sensitive questions were provided in multiple ways. The absence of a control group (sham group; e.g. patients undergoing specific diagnostic laparoscopy without treatment) is a further limitation of the study. WIDER IMPLICATIONS OF THE FINDINGS Our study shows that indicated minimally invasive surgery has a clear positive effect on the wellbeing and working performance of women suffering from moderate to severe endometriosis. Furthermore, national net savings in indirect costs with the present number of surgeries is estimated to be €10.7 million per year. In an idealized setting (i.e. without any diagnosis delay) this figure could be more than doubled. STUDY FUNDING/COMPETING INTEREST(S) The study was performed on behalf of the University Hospital of Bern (Inselspital) as one of the leading Swiss tertiary care centers. The authors do not declare any competing interest
- …
