57 research outputs found

    Using quantum key distribution for cryptographic purposes: a survey

    Full text link
    The appealing feature of quantum key distribution (QKD), from a cryptographic viewpoint, is the ability to prove the information-theoretic security (ITS) of the established keys. As a key establishment primitive, QKD however does not provide a standalone security service in its own: the secret keys established by QKD are in general then used by a subsequent cryptographic applications for which the requirements, the context of use and the security properties can vary. It is therefore important, in the perspective of integrating QKD in security infrastructures, to analyze how QKD can be combined with other cryptographic primitives. The purpose of this survey article, which is mostly centered on European research results, is to contribute to such an analysis. We first review and compare the properties of the existing key establishment techniques, QKD being one of them. We then study more specifically two generic scenarios related to the practical use of QKD in cryptographic infrastructures: 1) using QKD as a key renewal technique for a symmetric cipher over a point-to-point link; 2) using QKD in a network containing many users with the objective of offering any-to-any key establishment service. We discuss the constraints as well as the potential interest of using QKD in these contexts. We finally give an overview of challenges relative to the development of QKD technology that also constitute potential avenues for cryptographic research.Comment: Revised version of the SECOQC White Paper. Published in the special issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-8

    The fatal trajectory of pulmonary COVID-19 is driven by lobular ischemia and fibrotic remodelling

    Get PDF
    BACKGROUND: COVID-19 is characterized by a heterogeneous clinical presentation, ranging from mild symptoms to severe courses of disease. 9-20% of hospitalized patients with severe lung disease die from COVID-19 and a substantial number of survivors develop long-COVID. Our objective was to provide comprehensive insights into the pathophysiology of severe COVID-19 and to identify liquid biomarkers for disease severity and therapy response. METHODS: We studied a total of 85 lungs (n = 31 COVID autopsy samples; n = 7 influenza A autopsy samples; n = 18 interstitial lung disease explants; n = 24 healthy controls) using the highest resolution Synchrotron radiation-based hierarchical phase-contrast tomography, scanning electron microscopy of microvascular corrosion casts, immunohistochemistry, matrix-assisted laser desorption ionization mass spectrometry imaging, and analysis of mRNA expression and biological pathways. Plasma samples from all disease groups were used for liquid biomarker determination using ELISA. The anatomic/molecular data were analyzed as a function of patients' hospitalization time. FINDINGS: The observed patchy/mosaic appearance of COVID-19 in conventional lung imaging resulted from microvascular occlusion and secondary lobular ischemia. The length of hospitalization was associated with increased intussusceptive angiogenesis. This was associated with enhanced angiogenic, and fibrotic gene expression demonstrated by molecular profiling and metabolomic analysis. Increased plasma fibrosis markers correlated with their pulmonary tissue transcript levels and predicted disease severity. Plasma analysis confirmed distinct fibrosis biomarkers (TSP2, GDF15, IGFBP7, Pro-C3) that predicted the fatal trajectory in COVID-19. INTERPRETATION: Pulmonary severe COVID-19 is a consequence of secondary lobular microischemia and fibrotic remodelling, resulting in a distinctive form of fibrotic interstitial lung disease that contributes to long-COVID. FUNDING: This project was made possible by a number of funders. The full list can be found within the Declaration of interests / Acknowledgements section at the end of the manuscript

    Google in a Quantum Network

    Get PDF
    We introduce the characterization of a class of quantum PageRank algorithms in a scenario in which some kind of quantum network is realizable out of the current classical internet web, but no quantum computer is yet available. This class represents a quantization of the PageRank protocol currently employed to list web pages according to their importance. We have found an instance of this class of quantum protocols that outperforms its classical counterpart and may break the classical hierarchy of web pages depending on the topology of the web.Comment: RevTeX 4 file, color figure

    The ter Mutation in the Rat Dnd1 Gene Initiates Gonadal Teratomas and Infertility in Both Genders

    Get PDF
    A spontaneous mutation leading to the formation of congenital ovarian and testicular tumors was detected in the WKY/Ztm rat strain. The histological evaluation revealed derivatives from all three germ layers, thereby identifying these tumors as teratomas. Teratocarcinogenesis was accompanied by infertility and the underlying mutation was termed ter. Linkage analysis of 58 (WKY-ter×SPRD-Cu3) F2 rats associated the ter mutation with RNO18 (LOD = 3.25). Sequencing of candidate genes detected a point mutation in exon 4 of the dead-end homolog 1 gene (Dnd1), which introduces a premature stop codon assumed to cause a truncation of the Dnd1 protein. Genotyping of the recessive ter mutation revealed a complete penetrance of teratocarcinogenesis and infertility in homozygous ter rats of both genders. Morphologically non-tumorous testes of homozygous ter males were reduced in both size and weight. This testicular malformation was linked to a lack of spermatogenesis using immunohistochemical and histological staining. Our WKY-Dnd1ter/Ztm rat is a novel animal model to investigate gonadal teratocarcinogenesis and the molecular mechanisms involved in germ cell development of both genders

    Roots and (re)sources of value (in)definiteness versus contextuality. A contribution to the Pitowsky Volume in memory of Itamar Pitowsky (1950--2010)

    Full text link
    In Itamar Pitowsky's reading of the Gleason and the Kochen-Specker theorems, in particular, his Logical Indeterminacy Principle, the emphasis is on the value indefiniteness of observables which are not within the preparation context. This is in stark contrast to the prevalent term {\em contextuality} used by many researchers in informal, heuristic yet omni-realistic and potentially misleading ways. This paper discusses both concepts and argues in favor of value indefiniteness in all but a continuum of contexts intertwining in the vector representing a single pure (prepared) state. Even more restrictively, and inspired by operationalism but not justified by Pitowsky's Logical Indeterminacy Principle or similar, one could identify with a "quantum state" a single quantum context -- aka the respective maximal observable, or, in terms of its spectral decomposition, the associated orthonormal basis - from the continuum of intertwining context, as per the associated maximal observable actually or implicitly measured.Comment: 11 pages, revised and polished, discussion on joint probabilities of observables in different contexts adde

    Quantum key distribution with hacking countermeasures and long term field trial

    Get PDF
    Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered
    corecore