141 research outputs found

    Symptom-severity-related brain connectivity alterations in functional movement disorders

    Get PDF
    Background Functional movement disorders, a common cause of neurological disabilities, can occur with heterogeneous motor manifestations including functional weakness. However, the underlying mechanisms related to brain function and connectivity are unknown. Objective To identify brain connectivity alterations related to functional weakness we assessed network centrality changes in a group of patients with heterogeneous motor manifestations using task-free functional MRI in combination with different network centrality approaches. Methods Task-free functional MRI was performed in 48 patients with heterogeneous motor manifestations including 28 patients showing functional weakness and 65 age- and sex-matched healthy controls. Functional connectivity differences were assessed using different network centrality approaches, i.e. global correlation, eigenvector centrality, and intrinsic connectivity. Motor symptom severity was assessed using The Simplified Functional Movement Disorders Rating Scale and correlated with network centrality. Results Comparing patients with and without functional weakness showed significant network centrality differences in the left temporoparietal junction and precuneus. Patients with functional weakness showed increased centrality in the same anatomical regions when comparing functional weakness with healthy controls. Moreover, in the same regions, patients with functional weakness showed a positive correlation between motor symptom severity and network centrality. This correlation was shown to be specific to functional weakness with an interaction analysis, confirming a significant difference between patients with and without functional weakness. Conclusions We identified the temporoparietal junction and precuneus as key regions involved in brain connectivity alterations related to functional weakness. We propose that both regions may be promising targets for phenotype-specific non-invasive brain stimulation

    Quantum cryptography with finite resources: unconditional security bound for discrete-variable protocols with one-way post-processing

    Full text link
    We derive a bound for the security of QKD with finite resources under one-way post-processing, based on a definition of security that is composable and has an operational meaning. While our proof relies on the assumption of collective attacks, unconditional security follows immediately for standard protocols like Bennett-Brassard 1984 and six-states. For single-qubit implementations of such protocols, we find that the secret key rate becomes positive when at least N\sim 10^5 signals are exchanged and processed. For any other discrete-variable protocol, unconditional security can be obtained using the exponential de Finetti theorem, but the additional overhead leads to very pessimistic estimates

    Abnormal activity in the precuneus during time perception in Parkinson’s disease: An fMRI study

    Get PDF
    Background Parkinson's disease (PD) patients are deficient in time estimation. This deficit improves after dopamine (DA) treatment and it has been associated with decreased internal timekeeper speed, disruption of executive function and memory retrieval dysfunction. Methodology/Findings The aim of the present study was to explore the neurophysiologic correlates of this deficit. We performed functional magnetic resonance imaging on twelve PD patients while they were performing a time reproduction task (TRT). The TRT consisted of an encoding phase (during which visual stimuli of durations from 5s to 16.6s, varied at 8 levels were presented) and a reproduction phase (during which interval durations were reproduced by a button pressing). Patients were scanned twice, once while on their DA medication (ON condition) and once after medication withdrawal (OFF condition). Differences in Blood-Oxygenation-Level-Dependent (BOLD) signal in ON and OFF conditions were evaluated. The time course of activation in the brain areas with different BOLD signal was plotted. There were no significant differences in the behavioral results, but a trend toward overestimation of intervals ≤11.9s and underestimation of intervals ≥14.1s in the OFF condition (p<0.088). During the reproduction phase, higher activation in the precuneus was found in the ON condition (p<0.05 corrected). Time course was plotted separately for long (≥14.1s) and short (≤11.9s) intervals. Results showed that there was a significant difference only in long intervals, when activity gradually decreased in the OFF, but remained stable in the ON condition. This difference in precuneus activation was not found during random button presses in a control task. Conclusions/Significance Our results show that differences in precuneus activation during retrieval of a remembered duration may underlie some aspects of time perception deficit in PD patients. We suggest that DA medication may allow compensatory activation in the precuneus, which results in a more accurate retrieval of remembered interval duration

    Detector decoy quantum key distribution

    Full text link
    Photon number resolving detectors can enhance the performance of many practical quantum cryptographic setups. In this paper, we employ a simple method to estimate the statistics provided by such a photon number resolving detector using only a threshold detector together with a variable attenuator. This idea is similar in spirit to that of the decoy state technique, and is specially suited for those scenarios where only a few parameters of the photon number statistics of the incoming signals have to be estimated. As an illustration of the potential applicability of the method in quantum communication protocols, we use it to prove security of an entanglement based quantum key distribution scheme with an untrusted source without the need of a squash model and by solely using this extra idea. In this sense, this detector decoy method can be seen as a different conceptual approach to adapt a single photon security proof to its physical, full optical implementation. We show that in this scenario the legitimate users can now even discard the double click events from the raw key data without compromising the security of the scheme, and we present simulations on the performance of the BB84 and the 6-state quantum key distribution protocols.Comment: 27 pages, 7 figure

    Controlling passively-quenched single photon detectors by bright light

    Full text link
    Single photon detectors based on passively-quenched avalanche photodiodes can be temporarily blinded by relatively bright light, of intensity less than a nanowatt. I describe a bright-light regime suitable for attacking a quantum key distribution system containing such detectors. In this regime, all single photon detectors in the receiver Bob are uniformly blinded by continuous illumination coming from the eavesdropper Eve. When Eve needs a certain detector in Bob to produce a click, she modifies polarization (or other parameter used to encode quantum states) of the light she sends to Bob such that the target detector stops receiving light while the other detector(s) continue to be illuminated. The target detector regains single photon sensitivity and, when Eve modifies the polarization again, produces a single click. Thus, Eve has full control of Bob and can do a successful intercept-resend attack. To check the feasibility of the attack, 3 different models of passively-quenched detectors have been tested. In the experiment, I have simulated the intensity diagrams the detectors would receive in a real quantum key distribution system under attack. Control parameters and side effects are considered. It appears that the attack could be practically possible.Comment: Experimental results from a third detector model added. Minor corrections and edits made. 11 pages, 10 figure

    Device-independent quantum key distribution secure against collective attacks

    Full text link
    Device-independent quantum key distribution (DIQKD) represents a relaxation of the security assumptions made in usual quantum key distribution (QKD). As in usual QKD, the security of DIQKD follows from the laws of quantum physics, but contrary to usual QKD, it does not rely on any assumptions about the internal working of the quantum devices used in the protocol. We present here in detail the security proof for a DIQKD protocol introduced in [Phys. Rev. Lett. 98, 230501 (2008)]. This proof exploits the full structure of quantum theory (as opposed to other proofs that exploit the no-signalling principle only), but only holds again collective attacks, where the eavesdropper is assumed to act on the quantum systems of the honest parties independently and identically at each round of the protocol (although she can act coherently on her systems at any time). The security of any DIQKD protocol necessarily relies on the violation of a Bell inequality. We discuss the issue of loopholes in Bell experiments in this context.Comment: 25 pages, 3 figure

    Feasibility of free space quantum key distribution with coherent polarization states

    Full text link
    We demonstrate for the first time the feasibility of free space quantum key distribution with continuous variables under real atmospheric conditions. More specifically, we transmit coherent polarization states over a 100m free space channel on the roof of our institute's building. In our scheme, signal and local oscillator are combined in a single spatial mode which auto-compensates atmospheric fluctuations and results in an excellent interference. Furthermore, the local oscillator acts as spatial and spectral filter thus allowing unrestrained daylight operation.Comment: 12 pages, 8 figures, extensions in sections 2, 3.1, 3.2 and 4. This is an author-created, un-copyedited version of an article accepted for publication in New Journal of Physics (Special Issue on Quantum Cryptography: Theory and Practice). IOP Publishing Ltd is not responsible for any errors or omissions in this version of the manuscript or any version derived from i

    Security against individual attacks for realistic quantum key distribution

    Get PDF
    I prove the security of quantum key distribution against individual attacks for realistic signals sources, including weak coherent pulses and downconversion sources. The proof applies to the BB84 protocol with the standard detection scheme (no strong reference pulse). I obtain a formula for the secure bit rate per time slot of an experimental setup which can be used to optimize the performance of existing schemes for the considered scenario.Comment: 10 pages, 4 figure
    corecore