97 research outputs found

    Decoy State Quantum Key Distribution

    Full text link
    There has been much interest in quantum key distribution. Experimentally, quantum key distribution over 150 km of commercial Telecom fibers has been successfully performed. The crucial issue in quantum key distribution is its security. Unfortunately, all recent experiments are, in principle, insecure due to real-life imperfections. Here, we propose a method that can for the first time make most of those experiments secure by using essentially the same hardware. Our method is to use decoy states to detect eavesdropping attacks. As a consequence, we have the best of both worlds--enjoying unconditional security guaranteed by the fundamental laws of physics and yet dramatically surpassing even some of the best experimental performances reported in the literature.Comment: Slightly shortened version. Accepted for publication in PR

    Hybrid Radio-map for Noise Tolerant Wireless Indoor Localization

    Full text link
    In wireless networks, radio-map based locating techniques are commonly used to cope the complex fading feature of radio signal, in which a radio-map is built by calibrating received signal strength (RSS) signatures at training locations in the offline phase. However, in severe hostile environments, such as in ship cabins where severe shadowing, blocking and multi-path fading effects are posed by ubiquitous metallic architecture, even radio-map cannot capture the dynamics of RSS. In this paper, we introduced multiple feature radio-map location method for severely noisy environments. We proposed to add low variance signature into radio map. Since the low variance signatures are generally expensive to obtain, we focus on the scenario when the low variance signatures are sparse. We studied efficient construction of multi-feature radio-map in offline phase, and proposed feasible region narrowing down and particle based algorithm for online tracking. Simulation results show the remarkably performance improvement in terms of positioning accuracy and robustness against RSS noises than the traditional radio-map method.Comment: 6 pages, 11th IEEE International Conference on Networking, Sensing and Control, April 7-9, 2014, Miami, FL, US

    Fundamental Limitation on the Detectability of Entanglement

    Full text link
    Entanglement detection is essential in quantum information science and quantum many-body physics. It has been proved that entanglement exists almost surely for a random quantum state, while the realizations of effective entanglement criteria usually consume exponential resources, and efficient criteria often perform poorly without prior knowledge. This fact implies a fundamental limitation might exist in the detectability of entanglement. In this work, we formalize this limitation as a fundamental trade-off between the efficiency and effectiveness of entanglement criteria via a systematic method to theoretically evaluate the detection capability of entanglement criteria. For a system coupled to an environment, we prove that any entanglement criterion needs exponentially many observables to detect the entanglement effectively when restricted to single-copy operations. Otherwise, the detection capability of the criterion will decay double-exponentially. Furthermore, if multi-copy joint measurements are allowed, the effectiveness of entanglement detection can be exponentially improved, which implies a quantum advantage in entanglement detection problems.Comment: 16 pages, 7 figure

    Source attack of decoy-state quantum key distribution using phase information

    Get PDF
    Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security loopholes due to imperfect devices. In fact, practical attacks have successfully been demonstrated. Fortunately, most of them only exploit detection-side loopholes which are now closed by the recent idea of measurement-device-independent QKD. On the other hand, little attention is paid to the source which may still leave QKD systems insecure. In this work, we propose and demonstrate an attack that exploits a source-side loophole existing in qubit-based QKD systems using a weak coherent state source and decoy states. Specifically, by implementing a linear-optics unambiguous-state-discrimination measurement, we show that the security of a system without phase randomization --- which is a step assumed in conventional security analyses but sometimes neglected in practice --- can be compromised. We conclude that implementing phase randomization is essential to the security of decoy-state QKD systems under current security analyses.Comment: 12 pages, 5 figure

    Measurement-device-independent quantum key distribution with uncharacterized qubit sources

    Get PDF
    Measurement-device-independent quantum key distribution (MDIQKD) is proposed to be secure against any possible detection attacks. The security of the original proposal relies on the assumption that the legitimate users can fully characterize the encoding systems including sources. Here, we propose a MDIQKD protocol where we allow uncharacterized encoding systems as long as qubit sources are used. A security proof of the MDIQKD protocol is presented that does not need the knowledge of the encoding states. Simulation results show that the scheme is practical

    Mismatched-basis statistics enable quantum key distribution with uncharacterized qubit sources

    Get PDF
    In the postprocessing of quantum key distribution, the raw key bits from the mismatched-basis measurements, where two parties use different bases, are normally discarded. Here, we propose a postprocessing method that exploits measurement statistics from mismatched-basis cases, and prove that incorporating these statistics enables uncharacterized qubit sources to be used in the measurement-device-independent quantum key distribution protocol and the Bennett-Brassard 1984 protocol, a case which is otherwise impossible.Comment: Part of this article contains a significant improvement over arXiv:1309.381

    Strategy insight: Mechanical properties of biomaterials’ influence on hydrogel-mesenchymal stromal cell combination for osteoarthritis therapy

    Get PDF
    Osteoarthritis (OA) is a kind of degenerative joint disease usually found in older adults and those who have received meniscal surgery, bringing great suffering to a number of patients worldwide. One of the major pathological features of OA is retrograde changes in the articular cartilage. Mesenchymal stromal cells (MSCs) can differentiate into chondrocytes and promote cartilage regeneration, thus having great potential for the treatment of osteoarthritis. However, improving the therapeutic effect of MSCs in the joint cavity is still an open problem. Hydrogel made of different biomaterials has been recognized as an ideal carrier for MSCs in recent years. This review focuses on the influence of the mechanical properties of hydrogels on the efficacy of MSCs in OA treatment and compares artificial materials with articular cartilage, hoping to provide a reference for further development of modified hydrogels to improve the therapeutic effect of MSCs
    • …
    corecore