57 research outputs found
Using quantum key distribution for cryptographic purposes: a survey
The appealing feature of quantum key distribution (QKD), from a cryptographic
viewpoint, is the ability to prove the information-theoretic security (ITS) of
the established keys. As a key establishment primitive, QKD however does not
provide a standalone security service in its own: the secret keys established
by QKD are in general then used by a subsequent cryptographic applications for
which the requirements, the context of use and the security properties can
vary. It is therefore important, in the perspective of integrating QKD in
security infrastructures, to analyze how QKD can be combined with other
cryptographic primitives. The purpose of this survey article, which is mostly
centered on European research results, is to contribute to such an analysis. We
first review and compare the properties of the existing key establishment
techniques, QKD being one of them. We then study more specifically two generic
scenarios related to the practical use of QKD in cryptographic infrastructures:
1) using QKD as a key renewal technique for a symmetric cipher over a
point-to-point link; 2) using QKD in a network containing many users with the
objective of offering any-to-any key establishment service. We discuss the
constraints as well as the potential interest of using QKD in these contexts.
We finally give an overview of challenges relative to the development of QKD
technology that also constitute potential avenues for cryptographic research.Comment: Revised version of the SECOQC White Paper. Published in the special
issue on QKD of TCS, Theoretical Computer Science (2014), pp. 62-8
Field test of quantum key distribution in the Tokyo QKD Network
A novel secure communication network with quantum key distribution in a
metropolitan area is reported. Different QKD schemes are integrated to
demonstrate secure TV conferencing over a distance of 45km, stable long-term
operation, and application to secure mobile phones.Comment: 21 pages, 19 figure
The fatal trajectory of pulmonary COVID-19 is driven by lobular ischemia and fibrotic remodelling
BACKGROUND: COVID-19 is characterized by a heterogeneous clinical presentation, ranging from mild symptoms to severe courses of disease. 9-20% of hospitalized patients with severe lung disease die from COVID-19 and a substantial number of survivors develop long-COVID. Our objective was to provide comprehensive insights into the pathophysiology of severe COVID-19 and to identify liquid biomarkers for disease severity and therapy response. METHODS: We studied a total of 85 lungs (n = 31 COVID autopsy samples; n = 7 influenza A autopsy samples; n = 18 interstitial lung disease explants; n = 24 healthy controls) using the highest resolution Synchrotron radiation-based hierarchical phase-contrast tomography, scanning electron microscopy of microvascular corrosion casts, immunohistochemistry, matrix-assisted laser desorption ionization mass spectrometry imaging, and analysis of mRNA expression and biological pathways. Plasma samples from all disease groups were used for liquid biomarker determination using ELISA. The anatomic/molecular data were analyzed as a function of patients' hospitalization time. FINDINGS: The observed patchy/mosaic appearance of COVID-19 in conventional lung imaging resulted from microvascular occlusion and secondary lobular ischemia. The length of hospitalization was associated with increased intussusceptive angiogenesis. This was associated with enhanced angiogenic, and fibrotic gene expression demonstrated by molecular profiling and metabolomic analysis. Increased plasma fibrosis markers correlated with their pulmonary tissue transcript levels and predicted disease severity. Plasma analysis confirmed distinct fibrosis biomarkers (TSP2, GDF15, IGFBP7, Pro-C3) that predicted the fatal trajectory in COVID-19. INTERPRETATION: Pulmonary severe COVID-19 is a consequence of secondary lobular microischemia and fibrotic remodelling, resulting in a distinctive form of fibrotic interstitial lung disease that contributes to long-COVID. FUNDING: This project was made possible by a number of funders. The full list can be found within the Declaration of interests / Acknowledgements section at the end of the manuscript
Google in a Quantum Network
We introduce the characterization of a class of quantum PageRank algorithms
in a scenario in which some kind of quantum network is realizable out of the
current classical internet web, but no quantum computer is yet available. This
class represents a quantization of the PageRank protocol currently employed to
list web pages according to their importance. We have found an instance of this
class of quantum protocols that outperforms its classical counterpart and may
break the classical hierarchy of web pages depending on the topology of the
web.Comment: RevTeX 4 file, color figure
The ter Mutation in the Rat Dnd1 Gene Initiates Gonadal Teratomas and Infertility in Both Genders
A spontaneous mutation leading to the formation of congenital ovarian and testicular tumors was detected in the WKY/Ztm rat strain. The histological evaluation revealed derivatives from all three germ layers, thereby identifying these tumors as teratomas. Teratocarcinogenesis was accompanied by infertility and the underlying mutation was termed ter. Linkage analysis of 58 (WKY-ter×SPRD-Cu3) F2 rats associated the ter mutation with RNO18 (LOD = 3.25). Sequencing of candidate genes detected a point mutation in exon 4 of the dead-end homolog 1 gene (Dnd1), which introduces a premature stop codon assumed to cause a truncation of the Dnd1 protein. Genotyping of the recessive ter mutation revealed a complete penetrance of teratocarcinogenesis and infertility in homozygous ter rats of both genders. Morphologically non-tumorous testes of homozygous ter males were reduced in both size and weight. This testicular malformation was linked to a lack of spermatogenesis using immunohistochemical and histological staining. Our WKY-Dnd1ter/Ztm rat is a novel animal model to investigate gonadal teratocarcinogenesis and the molecular mechanisms involved in germ cell development of both genders
Improved application technique of albumin-glutaraldehyde glue for repair of superficial lung defects
Roots and (re)sources of value (in)definiteness versus contextuality. A contribution to the Pitowsky Volume in memory of Itamar Pitowsky (1950--2010)
In Itamar Pitowsky's reading of the Gleason and the Kochen-Specker theorems,
in particular, his Logical Indeterminacy Principle, the emphasis is on the
value indefiniteness of observables which are not within the preparation
context. This is in stark contrast to the prevalent term {\em contextuality}
used by many researchers in informal, heuristic yet omni-realistic and
potentially misleading ways. This paper discusses both concepts and argues in
favor of value indefiniteness in all but a continuum of contexts intertwining
in the vector representing a single pure (prepared) state. Even more
restrictively, and inspired by operationalism but not justified by Pitowsky's
Logical Indeterminacy Principle or similar, one could identify with a "quantum
state" a single quantum context -- aka the respective maximal observable, or,
in terms of its spectral decomposition, the associated orthonormal basis - from
the continuum of intertwining context, as per the associated maximal observable
actually or implicitly measured.Comment: 11 pages, revised and polished, discussion on joint probabilities of
observables in different contexts adde
Quantum key distribution with hacking countermeasures and long term field trial
Quantum key distribution's (QKD's) central and unique claim is information theoretic security. However there is an increasing understanding that the security of a QKD system relies not only on theoretical security proofs, but also on how closely the physical system matches the theoretical models and prevents attacks due to discrepancies. These side channel or hacking attacks exploit physical devices which do not necessarily behave precisely as the theory expects. As such there is a need for QKD systems to be demonstrated to provide security both in the theoretical and physical implementation. We report here a QKD system designed with this goal in mind, providing a more resilient target against possible hacking attacks including Trojan horse, detector blinding, phase randomisation and photon number splitting attacks. The QKD system was installed into a 45 km link of a metropolitan telecom network for a 2.5 month period, during which time the system operated continuously and distributed 1.33 Tbits of secure key data with a stable secure key rate over 200 kbit/s. In addition security is demonstrated against coherent attacks that are more general than the collective class of attacks usually considered
- …