97 research outputs found
Decoy State Quantum Key Distribution
There has been much interest in quantum key distribution. Experimentally,
quantum key distribution over 150 km of commercial Telecom fibers has been
successfully performed. The crucial issue in quantum key distribution is its
security. Unfortunately, all recent experiments are, in principle, insecure due
to real-life imperfections. Here, we propose a method that can for the first
time make most of those experiments secure by using essentially the same
hardware. Our method is to use decoy states to detect eavesdropping attacks. As
a consequence, we have the best of both worlds--enjoying unconditional security
guaranteed by the fundamental laws of physics and yet dramatically surpassing
even some of the best experimental performances reported in the literature.Comment: Slightly shortened version. Accepted for publication in PR
Hybrid Radio-map for Noise Tolerant Wireless Indoor Localization
In wireless networks, radio-map based locating techniques are commonly used
to cope the complex fading feature of radio signal, in which a radio-map is
built by calibrating received signal strength (RSS) signatures at training
locations in the offline phase. However, in severe hostile environments, such
as in ship cabins where severe shadowing, blocking and multi-path fading
effects are posed by ubiquitous metallic architecture, even radio-map cannot
capture the dynamics of RSS. In this paper, we introduced multiple feature
radio-map location method for severely noisy environments. We proposed to add
low variance signature into radio map. Since the low variance signatures are
generally expensive to obtain, we focus on the scenario when the low variance
signatures are sparse. We studied efficient construction of multi-feature
radio-map in offline phase, and proposed feasible region narrowing down and
particle based algorithm for online tracking. Simulation results show the
remarkably performance improvement in terms of positioning accuracy and
robustness against RSS noises than the traditional radio-map method.Comment: 6 pages, 11th IEEE International Conference on Networking, Sensing
and Control, April 7-9, 2014, Miami, FL, US
Fundamental Limitation on the Detectability of Entanglement
Entanglement detection is essential in quantum information science and
quantum many-body physics. It has been proved that entanglement exists almost
surely for a random quantum state, while the realizations of effective
entanglement criteria usually consume exponential resources, and efficient
criteria often perform poorly without prior knowledge. This fact implies a
fundamental limitation might exist in the detectability of entanglement. In
this work, we formalize this limitation as a fundamental trade-off between the
efficiency and effectiveness of entanglement criteria via a systematic method
to theoretically evaluate the detection capability of entanglement criteria.
For a system coupled to an environment, we prove that any entanglement
criterion needs exponentially many observables to detect the entanglement
effectively when restricted to single-copy operations. Otherwise, the detection
capability of the criterion will decay double-exponentially. Furthermore, if
multi-copy joint measurements are allowed, the effectiveness of entanglement
detection can be exponentially improved, which implies a quantum advantage in
entanglement detection problems.Comment: 16 pages, 7 figure
Source attack of decoy-state quantum key distribution using phase information
Quantum key distribution (QKD) utilizes the laws of quantum mechanics to
achieve information-theoretically secure key generation. This field is now
approaching the stage of commercialization, but many practical QKD systems
still suffer from security loopholes due to imperfect devices. In fact,
practical attacks have successfully been demonstrated. Fortunately, most of
them only exploit detection-side loopholes which are now closed by the recent
idea of measurement-device-independent QKD. On the other hand, little attention
is paid to the source which may still leave QKD systems insecure. In this work,
we propose and demonstrate an attack that exploits a source-side loophole
existing in qubit-based QKD systems using a weak coherent state source and
decoy states. Specifically, by implementing a linear-optics
unambiguous-state-discrimination measurement, we show that the security of a
system without phase randomization --- which is a step assumed in conventional
security analyses but sometimes neglected in practice --- can be compromised.
We conclude that implementing phase randomization is essential to the security
of decoy-state QKD systems under current security analyses.Comment: 12 pages, 5 figure
Measurement-device-independent quantum key distribution with uncharacterized qubit sources
Measurement-device-independent quantum key distribution (MDIQKD) is proposed
to be secure against any possible detection attacks. The security of the
original proposal relies on the assumption that the legitimate users can fully
characterize the encoding systems including sources. Here, we propose a MDIQKD
protocol where we allow uncharacterized encoding systems as long as qubit
sources are used. A security proof of the MDIQKD protocol is presented that
does not need the knowledge of the encoding states. Simulation results show
that the scheme is practical
Mismatched-basis statistics enable quantum key distribution with uncharacterized qubit sources
In the postprocessing of quantum key distribution, the raw key bits from the
mismatched-basis measurements, where two parties use different bases, are
normally discarded. Here, we propose a postprocessing method that exploits
measurement statistics from mismatched-basis cases, and prove that
incorporating these statistics enables uncharacterized qubit sources to be used
in the measurement-device-independent quantum key distribution protocol and the
Bennett-Brassard 1984 protocol, a case which is otherwise impossible.Comment: Part of this article contains a significant improvement over
arXiv:1309.381
Strategy insight: Mechanical properties of biomaterials’ influence on hydrogel-mesenchymal stromal cell combination for osteoarthritis therapy
Osteoarthritis (OA) is a kind of degenerative joint disease usually found in older adults and those who have received meniscal surgery, bringing great suffering to a number of patients worldwide. One of the major pathological features of OA is retrograde changes in the articular cartilage. Mesenchymal stromal cells (MSCs) can differentiate into chondrocytes and promote cartilage regeneration, thus having great potential for the treatment of osteoarthritis. However, improving the therapeutic effect of MSCs in the joint cavity is still an open problem. Hydrogel made of different biomaterials has been recognized as an ideal carrier for MSCs in recent years. This review focuses on the influence of the mechanical properties of hydrogels on the efficacy of MSCs in OA treatment and compares artificial materials with articular cartilage, hoping to provide a reference for further development of modified hydrogels to improve the therapeutic effect of MSCs
- …