Simple proof of security of the BB84 quantum key distribution protocol
Shor; Preskill
2000-07-10
We prove that the 1984 protocol of Bennett and Brassard (BB84) for quantum key distribution is secure. We first give a key distribution protocol based on entanglement purification, which can be proven secure using methods from Lo and Chau's proof of security for a similar protocol. We then show that the security of this protocol implies the security of BB84. The entanglement purification based protocol uses Calderbank-Shor-Steane codes, and properties of these codes are used to remove the use of quantum computation from the Lo-Chau protocol.
Randomness determines practical security of BB84 quantum key distribution.
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-11-10
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
Randomness determines practical security of BB84 quantum key distribution
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-01-01
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system. PMID:26552359
Randomness determines practical security of BB84 quantum key distribution
NASA Astrophysics Data System (ADS)
Li, Hong-Wei; Yin, Zhen-Qiang; Wang, Shuang; Qian, Yong-Jun; Chen, Wei; Guo, Guang-Can; Han, Zheng-Fu
2015-11-01
Unconditional security of the BB84 quantum key distribution protocol has been proved by exploiting the fundamental laws of quantum mechanics, but the practical quantum key distribution system maybe hacked by considering the imperfect state preparation and measurement respectively. Until now, different attacking schemes have been proposed by utilizing imperfect devices, but the general security analysis model against all of the practical attacking schemes has not been proposed. Here, we demonstrate that the general practical attacking schemes can be divided into the Trojan horse attack, strong randomness attack and weak randomness attack respectively. We prove security of BB84 protocol under randomness attacking models, and these results can be applied to guarantee the security of the practical quantum key distribution system.
2005-10-01
late the difficulty of some basic 1-bit and n-bit quantum and classical operations in an simple unconstrained scenario. KEY WORDS: Time evolution... quantum circuit and design are presented for an optimized entangling probe attacking the BB84 Protocol of quantum key distribution (QKD) and yielding...unambiguous, at least some of the time. It follows that the BB84 (Bennett-Brassard 1984) proto- col of quantum key distribution has a vulnerability similar to
Key rate for calibration robust entanglement based BB84 quantum key distribution protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Gittsovich, O.; Moroder, T.
2014-12-04
We apply the approach of verifying entanglement, which is based on the sole knowledge of the dimension of the underlying physical system to the entanglement based version of the BB84 quantum key distribution protocol. We show that the familiar one-way key rate formula holds already if one assumes the assumption that one of the parties is measuring a qubit and no further assumptions about the measurement are needed.
Federal Plan for Cyber Security and Information Assurance Research and Development
2006-04-01
Security Systems 103 varieties of the BB84 scheme have been developed, and other forms of quantum key distribution have been proposed. Rapid progress has led... key . Capability Gaps Existing quantum cryptographic protocols may also have weaknesses. Although BB84 is generally regarded as secure , researchers...complement agency-specific prioritization and R&D planning efforts in cyber security and information assurance. The Plan also describes the key Federal
Quantum-key-distribution protocol with pseudorandom bases
NASA Astrophysics Data System (ADS)
Trushechkin, A. S.; Tregubov, P. A.; Kiktenko, E. O.; Kurochkin, Y. V.; Fedorov, A. K.
2018-01-01
Quantum key distribution (QKD) offers a way for establishing information-theoretical secure communications. An important part of QKD technology is a high-quality random number generator for the quantum-state preparation and for post-processing procedures. In this work, we consider a class of prepare-and-measure QKD protocols, utilizing additional pseudorandomness in the preparation of quantum states. We study one of such protocols and analyze its security against the intercept-resend attack. We demonstrate that, for single-photon sources, the considered protocol gives better secret key rates than the BB84 and the asymmetric BB84 protocols. However, the protocol strongly requires single-photon sources.
Security of subcarrier wave quantum key distribution against the collective beam-splitting attack.
Miroshnichenko, G P; Kozubov, A V; Gaidash, A A; Gleim, A V; Horoshko, D B
2018-04-30
We consider a subcarrier wave quantum key distribution (QKD) system, where quantum encoding is carried out at weak sidebands generated around a coherent optical beam as a result of electro-optical phase modulation. We study security of two protocols, B92 and BB84, against one of the most powerful attacks for this class of systems, the collective beam-splitting attack. Our analysis includes the case of high modulation index, where the sidebands are essentially multimode. We demonstrate numerically and experimentally that a subcarrier wave QKD system with realistic parameters is capable of distributing cryptographic keys over large distances in presence of collective attacks. We also show that BB84 protocol modification with discrimination of only one state in each basis performs not worse than the original BB84 protocol in this class of QKD systems, thus significantly simplifying the development of cryptographic networks using the considered QKD technique.
Prefixed-threshold real-time selection method in free-space quantum key distribution
NASA Astrophysics Data System (ADS)
Wang, Wenyuan; Xu, Feihu; Lo, Hoi-Kwong
2018-03-01
Free-space quantum key distribution allows two parties to share a random key with unconditional security, between ground stations, between mobile platforms, and even in satellite-ground quantum communications. Atmospheric turbulence causes fluctuations in transmittance, which further affect the quantum bit error rate and the secure key rate. Previous postselection methods to combat atmospheric turbulence require a threshold value determined after all quantum transmission. In contrast, here we propose a method where we predetermine the optimal threshold value even before quantum transmission. Therefore, the receiver can discard useless data immediately, thus greatly reducing data storage requirements and computing resources. Furthermore, our method can be applied to a variety of protocols, including, for example, not only single-photon BB84 but also asymptotic and finite-size decoy-state BB84, which can greatly increase its practicality.
Defense frontier analysis of quantum cryptographic systems.
Slutsky, B; Rao, R; Sun, P C; Tancevski, L; Fainman, S
1998-05-10
When a quantum cryptographic system operates in the presence of background noise, security of the key can be recovered by a procedure called key distillation. A key-distillation scheme effective against so-called individual (bitwise-independent) eavesdropping attacks involves sacrifice of some of the data through privacy amplification. We derive the amount of data sacrifice sufficient to defend against individual eavesdropping attacks in both BB84 and B92 protocols and show in what sense the communication becomes secure as a result. We also compare the secrecy capacity of various quantum cryptosystems, taking into account data sacrifice during key distillation, and conclude that the BB84 protocol may offer better performance characteristics than the B92.
Cai, Hong; Long, Christopher M.; DeRose, Christopher T.; ...
2017-01-01
We demonstrate a silicon photonic transceiver circuit for high-speed discrete variable quantum key distribution that employs a common structure for transmit and receive functions. The device is intended for use in polarization-based quantum cryptographic protocols, such as BB84. Our characterization indicates that the circuit can generate the four BB84 states (TE/TM/45°/135° linear polarizations) with >30 dB polarization extinction ratios and gigabit per second modulation speed, and is capable of decoding any polarization bases differing by 90° with high extinction ratios.
Cai, Hong; Long, Christopher M; DeRose, Christopher T; Boynton, Nicholas; Urayama, Junji; Camacho, Ryan; Pomerene, Andrew; Starbuck, Andrew L; Trotter, Douglas C; Davids, Paul S; Lentine, Anthony L
2017-05-29
We demonstrate a silicon photonic transceiver circuit for high-speed discrete variable quantum key distribution that employs a common structure for transmit and receive functions. The device is intended for use in polarization-based quantum cryptographic protocols, such as BB84. Our characterization indicates that the circuit can generate the four BB84 states (TE/TM/45°/135° linear polarizations) with >30 dB polarization extinction ratios and gigabit per second modulation speed, and is capable of decoding any polarization bases differing by 90° with high extinction ratios.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Cai, Hong; Long, Christopher M.; DeRose, Christopher T.
We demonstrate a silicon photonic transceiver circuit for high-speed discrete variable quantum key distribution that employs a common structure for transmit and receive functions. The device is intended for use in polarization-based quantum cryptographic protocols, such as BB84. Our characterization indicates that the circuit can generate the four BB84 states (TE/TM/45°/135° linear polarizations) with >30 dB polarization extinction ratios and gigabit per second modulation speed, and is capable of decoding any polarization bases differing by 90° with high extinction ratios.
Scarani, Valerio; Acín, Antonio; Ribordy, Grégoire; Gisin, Nicolas
2004-02-06
We introduce a new class of quantum key distribution protocols, tailored to be robust against photon number splitting (PNS) attacks. We study one of these protocols, which differs from the original protocol by Bennett and Brassard (BB84) only in the classical sifting procedure. This protocol is provably better than BB84 against PNS attacks at zero error.
Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)
2014-07-25
link in a free- space channel through a marine environment (such as loss, noise and turbulence) and (2) parametrically calculating the secret key rate...width. Parametric calculations of the expected secret key rate As can be seen in Figure 6, the secret key rate of the BB84 protocol in the presence...Figure 9 shows the effect of various detriments on the secret -kay rate, for laser-decoy BB84. Figure 9: Effects of detriments on secret-key rate
Measurement-device-independent quantum key distribution for Scarani-Acin-Ribordy-Gisin 04 protocol
Mizutani, Akihiro; Tamaki, Kiyoshi; Ikuta, Rikizo; Yamamoto, Takashi; Imoto, Nobuyuki
2014-01-01
The measurement-device-independent quantum key distribution (MDI QKD) was proposed to make BB84 completely free from any side-channel in detectors. Like in prepare & measure QKD, the use of other protocols in MDI setting would be advantageous in some practical situations. In this paper, we consider SARG04 protocol in MDI setting. The prepare & measure SARG04 is proven to be able to generate a key up to two-photon emission events. In MDI setting we show that the key generation is possible from the event with single or two-photon emission by a party and single-photon emission by the other party, but the two-photon emission event by both parties cannot contribute to the key generation. On the contrary to prepare & measure SARG04 protocol where the experimental setup is exactly the same as BB84, the measurement setup for SARG04 in MDI setting cannot be the same as that for BB84 since the measurement setup for BB84 in MDI setting induces too many bit errors. To overcome this problem, we propose two alternative experimental setups, and we simulate the resulting key rate. Our study highlights the requirements that MDI QKD poses on us regarding with the implementation of a variety of QKD protocols. PMID:24913431
A Weak Value Based QKD Protocol Robust Against Detector Attacks
NASA Astrophysics Data System (ADS)
Troupe, James
2015-03-01
We propose a variation of the BB84 quantum key distribution protocol that utilizes the properties of weak values to insure the validity of the quantum bit error rate estimates used to detect an eavesdropper. The protocol is shown theoretically to be secure against recently demonstrated attacks utilizing detector blinding and control and should also be robust against all detector based hacking. Importantly, the new protocol promises to achieve this additional security without negatively impacting the secure key generation rate as compared to that originally promised by the standard BB84 scheme. Implementation of the weak measurements needed by the protocol should be very feasible using standard quantum optical techniques.
Short Review on Quantum Key Distribution Protocols.
Giampouris, Dimitris
2017-01-01
Cryptographic protocols and mechanisms are widely investigated under the notion of quantum computing. Quantum cryptography offers particular advantages over classical ones, whereas in some cases established protocols have to be revisited in order to maintain their functionality. The purpose of this paper is to provide the basic definitions and review the most important theoretical advancements concerning the BB84 and E91 protocols. It also aims to offer a summary on some key developments on the field of quantum key distribution, closely related with the two aforementioned protocols. The main goal of this study is to provide the necessary background information along with a thorough review on the theoretical aspects of QKD, concentrating on specific protocols. The BB84 and E91 protocols have been chosen because most other protocols are similar to these, a fact that makes them important for the general understanding of how the QKD mechanism functions.
Security of Y-00 and Similar Quantum Cryptographic Protocols
2004-11-16
security of Y-00 type protocols is clarified. Key words: Quantum cryptography PACS: 03.67.Dd Anew approach to quantum cryptog- raphy called KCQ, ( keyed ...classical- noise key generation [2] or the well known BB84 quantum protocol [3]. A special case called αη (or Y-00 in Japan) has been experimentally in... quantum noise for typical op- erating parameters. It weakens both the data and key security , possibly information-theoretically and cer- tainly
Improvement of One Quantum Encryption Scheme
NASA Astrophysics Data System (ADS)
Cao, Zhengjun; Liu, Lihua
2012-01-01
Zhou et al. proposed a quantum encryption scheme based on quantum computation in 2006 [N. Zhou et al., Physica A362 (2006) 305]. Each qubit of the ciphertext is constrained to two pairs of conjugate states. So, its implementation is feasible with the existing technology. But it is inefficient since it entails six key bits to encrypt one message bit, and the resulting ciphertext for one message bit consists of three qubits. In addition, its security cannot be directly reduced to the well-known BB84 protocol. In this paper, we improve it using the technique developed in BB84 protocol. The new scheme entails only two key bits to encrypt one message bit. The resulting ciphertext is just composed of two qubits. It saves about a half cost without the loss of security. Moreover, the new scheme is probabilistic instead of deterministic.
Quantum cryptography with entangled photons
Jennewein; Simon; Weihs; Weinfurter; Zeilinger
2000-05-15
By realizing a quantum cryptography system based on polarization entangled photon pairs we establish highly secure keys, because a single photon source is approximated and the inherent randomness of quantum measurements is exploited. We implement a novel key distribution scheme using Wigner's inequality to test the security of the quantum channel, and, alternatively, realize a variant of the BB84 protocol. Our system has two completely independent users separated by 360 m, and generates raw keys at rates of 400-800 bits/s with bit error rates around 3%.
Quantum cryptography: individual eavesdropping with the knowledge of the error-correcting protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Horoshko, D B
2007-12-31
The quantum key distribution protocol BB84 combined with the repetition protocol for error correction is analysed from the point of view of its security against individual eavesdropping relying on quantum memory. It is shown that the mere knowledge of the error-correcting protocol changes the optimal attack and provides the eavesdropper with additional information on the distributed key. (fifth seminar in memory of d.n. klyshko)
Gleim, A V; Egorov, V I; Nazarov, Yu V; Smirnov, S V; Chistyakov, V V; Bannik, O I; Anisimov, A A; Kynev, S M; Ivanova, A E; Collins, R J; Kozlov, S A; Buller, G S
2016-02-08
A quantum key distribution system based on the subcarrier wave modulation method has been demonstrated which employs the BB84 protocol with a strong reference to generate secure bits at a rate of 16.5 kbit/s with an error of 0.5% over an optical channel of 10 dB loss, and 18 bits/s with an error of 0.75% over 25 dB of channel loss. To the best of our knowledge, these results represent the highest channel loss reported for secure quantum key distribution using the subcarrier wave approach. A passive unidirectional scheme has been used to compensate for the polarization dependence of the phase modulators in the receiver module, which resulted in a high visibility of 98.8%. The system is thus fully insensitive to polarization fluctuations and robust to environmental changes, making the approach promising for use in optical telecommunication networks. Further improvements in secure key rate and transmission distance can be achieved by implementing the decoy states protocol or by optimizing the mean photon number used in line with experimental parameters.
Subcarrier Wave Quantum Key Distribution in Telecommunication Network with Bitrate 800 kbit/s
NASA Astrophysics Data System (ADS)
Gleim, A. V.; Nazarov, Yu. V.; Egorov, V. I.; Smirnov, S. V.; Bannik, O. I.; Chistyakov, V. V.; Kynev, S. M.; Anisimov, A. A.; Kozlov, S. A.; Vasiliev, V. N.
2015-09-01
In the course of work on creating the first quantum communication network in Russia we demonstrated quantum key distribution in metropolitan optical network infrastructure. A single-pass subcarrier wave quantum cryptography scheme was used in the experiments. BB84 protocol with strong reference was chosen for performing key distribution. The registered sifted key rate in an optical cable with 1.5 dB loss was 800 Kbit/s. Signal visibility exceeded 98%, and quantum bit error rate value was 1%. The achieved result is a record for this type of systems.
Security proof of a three-state quantum-key-distribution protocol without rotational symmetry
DOE Office of Scientific and Technical Information (OSTI.GOV)
Fung, C.-H.F.; Lo, H.-K.
2006-10-15
Standard security proofs of quantum-key-distribution (QKD) protocols often rely on symmetry arguments. In this paper, we prove the security of a three-state protocol that does not possess rotational symmetry. The three-state QKD protocol we consider involves three qubit states, where the first two states |0{sub z}> and |1{sub z}> can contribute to key generation, and the third state |+>=(|0{sub z}>+|1{sub z}>)/{radical}(2) is for channel estimation. This protocol has been proposed and implemented experimentally in some frequency-based QKD systems where the three states can be prepared easily. Thus, by founding on the security of this three-state protocol, we prove that thesemore » QKD schemes are, in fact, unconditionally secure against any attacks allowed by quantum mechanics. The main task in our proof is to upper bound the phase error rate of the qubits given the bit error rates observed. Unconditional security can then be proved not only for the ideal case of a single-photon source and perfect detectors, but also for the realistic case of a phase-randomized weak coherent light source and imperfect threshold detectors. Our result in the phase error rate upper bound is independent of the loss in the channel. Also, we compare the three-state protocol with the Bennett-Brassard 1984 (BB84) protocol. For the single-photon source case, our result proves that the BB84 protocol strictly tolerates a higher quantum bit error rate than the three-state protocol, while for the coherent-source case, the BB84 protocol achieves a higher key generation rate and secure distance than the three-state protocol when a decoy-state method is used.« less
Implementing Diffie-Hellman key exchange using quantum EPR pairs
NASA Astrophysics Data System (ADS)
Mandal, Sayonnha; Parakh, Abhishek
2015-05-01
This paper implements the concepts of perfect forward secrecy and the Diffie-Hellman key exchange using EPR pairs to establish and share a secret key between two non-authenticated parties and transfer messages between them without the risk of compromise. Current implementations of quantum cryptography are based on the BB84 protocol, which is susceptible to siphoning attacks on the multiple photons emitted by practical laser sources. This makes BB84-based quantum cryptography protocol unsuitable for network computing environments. Diffie-Hellman does not require the two parties to be mutually authenticated to each other, yet it can provide a basis for a number of authenticated protocols, most notably the concept of perfect forward secrecy. The work proposed in this paper provides a new direction in utilizing quantum EPR pairs in quantum key exchange. Although, classical cryptography boasts of efficient and robust protocols like the Diffie-Hellman key exchange, in the current times, with the advent of quantum computing they are very much vulnerable to eavesdropping and cryptanalytic attacks. Using quantum cryptographic principles, however, these classical encryption algorithms show more promise and a more robust and secure structure for applications. The unique properties of quantum EPR pairs also, on the other hand, go a long way in removing attacks like eavesdropping by their inherent nature of one particle of the pair losing its state if a measurement occurs on the other. The concept of perfect forward secrecy is revisited in this paper to attribute tighter security to the proposed protocol.
Quantum key distribution over an installed multimode optical fiber local area network.
Namekata, Naoto; Mori, Shigehiko; Inoue, Shuichiro
2005-12-12
We have investigated the possibility of a multimode fiber link for a quantum channel. Transmission of light in an extremely underfilled mode distribution promises a single-mode-like behavior in the multimode fiber. To demonstrate the performance of the fiber link we performed quantum key distribution, on the basis of the BB84 four-state protocol, over 550 m of an installed multimode optical fiber local area network, and the quantum-bit-error rate of 1.09 percent was achieved.
Compact transmission system using single-sideband modulation of light for quantum cryptography.
Duraffourg, L; Merolla, J M; Goedgebuer, J P; Mazurenko, Y; Rhodes, W T
2001-09-15
We report a new transmission that can be used for quantum key distribution. The system uses single-sideband-modulated light in an implementation of the BB84 quantum cryptography protocol. The system is formed by two integrated unbalanced Mach-Zehnder interferometers and is based on interference between phase-modulated sidebands in the spectral domain. Experiments show that high interference visibility can be obtained.
Some conservative estimates in quantum cryptography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Molotkov, S. N.
2006-08-15
Relationship is established between the security of the BB84 quantum key distribution protocol and the forward and converse coding theorems for quantum communication channels. The upper bound Q{sub c} {approx} 11% on the bit error rate compatible with secure key distribution is determined by solving the transcendental equation H(Q{sub c})=C-bar({rho})/2, where {rho} is the density matrix of the input ensemble, C-bar({rho}) is the classical capacity of a noiseless quantum channel, and H(Q) is the capacity of a classical binary symmetric channel with error rate Q.
Tanaka, Akihiro; Fujiwara, Mikio; Nam, Sae W; Nambu, Yoshihiro; Takahashi, Seigo; Maeda, Wakako; Yoshino, Ken-ichiro; Miki, Shigehito; Baek, Burm; Wang, Zhen; Tajima, Akio; Sasaki, Masahide; Tomita, Akihisa
2008-07-21
We demonstrated ultra fast BB84 quantum key distribution (QKD) transmission at 625 MHz clock rate through a 97 km field-installed fiber using practical clock synchronization based on wavelength-division multiplexing (WDM). We succeeded in over-one-hour stable key generation at a high sifted key rate of 2.4 kbps and a low quantum bit error rate (QBER) of 2.9%. The asymptotic secure key rate was estimated to be 0.78- 0.82 kbps from the transmission data with the decoy method of average photon numbers 0, 0.15, and 0.4 photons/pulse.
Multiparty Quantum Key Agreement Based on Quantum Search Algorithm
Cao, Hao; Ma, Wenping
2017-01-01
Quantum key agreement is an important topic that the shared key must be negotiated equally by all participants, and any nontrivial subset of participants cannot fully determine the shared key. To date, the embed modes of subkey in all the previously proposed quantum key agreement protocols are based on either BB84 or entangled states. The research of the quantum key agreement protocol based on quantum search algorithms is still blank. In this paper, on the basis of investigating the properties of quantum search algorithms, we propose the first quantum key agreement protocol whose embed mode of subkey is based on a quantum search algorithm known as Grover’s algorithm. A novel example of protocols with 5 – party is presented. The efficiency analysis shows that our protocol is prior to existing MQKA protocols. Furthermore it is secure against both external attack and internal attacks. PMID:28332610
NASA Astrophysics Data System (ADS)
Kawakami, Shun; Sasaki, Toshihiko; Koashi, Masato
2017-07-01
An essential step in quantum key distribution is the estimation of parameters related to the leaked amount of information, which is usually done by sampling of the communication data. When the data size is finite, the final key rate depends on how the estimation process handles statistical fluctuations. Many of the present security analyses are based on the method with simple random sampling, where hypergeometric distribution or its known bounds are used for the estimation. Here we propose a concise method based on Bernoulli sampling, which is related to binomial distribution. Our method is suitable for the Bennett-Brassard 1984 (BB84) protocol with weak coherent pulses [C. H. Bennett and G. Brassard, Proceedings of the IEEE Conference on Computers, Systems and Signal Processing (IEEE, New York, 1984), Vol. 175], reducing the number of estimated parameters to achieve a higher key generation rate compared to the method with simple random sampling. We also apply the method to prove the security of the differential-quadrature-phase-shift (DQPS) protocol in the finite-key regime. The result indicates that the advantage of the DQPS protocol over the phase-encoding BB84 protocol in terms of the key rate, which was previously confirmed in the asymptotic regime, persists in the finite-key regime.
NASA Astrophysics Data System (ADS)
Sun, Shi-Hai; Liang, Lin-Mei
2012-08-01
Phase randomization is a very important assumption in the BB84 quantum key distribution (QKD) system with weak coherent source; otherwise, eavesdropper may spy the final key. In this Letter, a stable and monitored active phase randomization scheme for the one-way and two-way QKD system is proposed and demonstrated in experiments. Furthermore, our scheme gives an easy way for Alice to monitor the degree of randomization in experiments. Therefore, we expect our scheme to become a standard part in future QKD systems due to its secure significance and feasibility.
Practical issues in quantum-key-distribution postprocessing
NASA Astrophysics Data System (ADS)
Fung, Chi-Hang Fred; Ma, Xiongfeng; Chau, H. F.
2010-01-01
Quantum key distribution (QKD) is a secure key generation method between two distant parties by wisely exploiting properties of quantum mechanics. In QKD, experimental measurement outcomes on quantum states are transformed by the two parties to a secret key. This transformation is composed of many logical steps (as guided by security proofs), which together will ultimately determine the length of the final secret key and its security. We detail the procedure for performing such classical postprocessing taking into account practical concerns (including the finite-size effect and authentication and encryption for classical communications). This procedure is directly applicable to realistic QKD experiments and thus serves as a recipe that specifies what postprocessing operations are needed and what the security level is for certain lengths of the keys. Our result is applicable to the BB84 protocol with a single or entangled photon source.
Security of BB84 with weak randomness and imperfect qubit encoding
NASA Astrophysics Data System (ADS)
Zhao, Liang-Yuan; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Fang, Xi; Han, Zheng-Fu; Huang, Wei
2018-03-01
The main threats for the well-known Bennett-Brassard 1984 (BB84) practical quantum key distribution (QKD) systems are that its encoding is inaccurate and measurement device may be vulnerable to particular attacks. Thus, a general physical model or security proof to tackle these loopholes simultaneously and quantitatively is highly desired. Here we give a framework on the security of BB84 when imperfect qubit encoding and vulnerability of measurement device are both considered. In our analysis, the potential attacks to measurement device are generalized by the recently proposed weak randomness model which assumes the input random numbers are partially biased depending on a hidden variable planted by an eavesdropper. And the inevitable encoding inaccuracy is also introduced here. From a fundamental view, our work reveals the potential information leakage due to encoding inaccuracy and weak randomness input. For applications, our result can be viewed as a useful tool to quantitatively evaluate the security of a practical QKD system.
Gariano, John; Neifeld, Mark; Djordjevic, Ivan
2017-01-20
Here, we present the engineering trade studies of a free-space optical communication system operating over a 30 km maritime channel for the months of January and July. The system under study follows the BB84 protocol with the following assumptions: a weak coherent source is used, Eve is performing the intercept resend attack and photon number splitting attack, prior knowledge of Eve's location is known, and Eve is allowed to know a small percentage of the final key. In this system, we examine the effect of changing several parameters in the following areas: the implementation of the BB84 protocol over the public channel, the technology in the receiver, and our assumptions about Eve. For each parameter, we examine how different values impact the secure key rate for a constant brightness. Additionally, we will optimize the brightness of the source for each parameter to study the improvement in the secure key rate.
Extended analysis of the Trojan-horse attack in quantum key distribution
NASA Astrophysics Data System (ADS)
Vinay, Scott E.; Kok, Pieter
2018-04-01
The discrete-variable quantum key distribution protocols based on the 1984 protocol of Bennett and Brassard (BB84) are known to be secure against an eavesdropper, Eve, intercepting the flying qubits and performing any quantum operation on them. However, these protocols may still be vulnerable to side-channel attacks. We investigate the Trojan-horse side-channel attack where Eve sends her own state into Alice's apparatus and measures the reflected state to estimate the key. We prove that the separable coherent state is optimal for Eve among the class of multimode Gaussian attack states, even in the presence of thermal noise. We then provide a bound on the secret key rate in the case where Eve may use any separable state.
Ko, Heasin; Choi, Byung-Seok; Choe, Joong-Seon; Kim, Kap-Joong; Kim, Jong-Hoi; Youn, Chun Ju
2017-08-21
Most polarization-based BB84 quantum key distribution (QKD) systems utilize multiple lasers to generate one of four polarization quantum states randomly. However, random bit generation with multiple lasers can potentially open critical side channels that significantly endangers the security of QKD systems. In this paper, we show unnoticed side channels of temporal disparity and intensity fluctuation, which possibly exist in the operation of multiple semiconductor laser diodes. Experimental results show that the side channels can enormously degrade security performance of QKD systems. An important system issue for the improvement of quantum bit error rate (QBER) related with laser driving condition is further addressed with experimental results.
On the optimality of individual entangling-probe attacks against BB84 quantum key distribution
NASA Astrophysics Data System (ADS)
Herbauts, I. M.; Bettelli, S.; Hã¼bel, H.; Peev, M.
2008-02-01
Some MIT researchers [Phys. Rev. A 75, 042327 (2007)] have recently claimed that their implementation of the Slutsky-Brandt attack [Phys. Rev. A 57, 2383 (1998); Phys. Rev. A 71, 042312 (2005)] to the BB84 quantum-key-distribution (QKD) protocol puts the security of this protocol “to the test” by simulating “the most powerful individual-photon attack” [Phys. Rev. A 73, 012315 (2006)]. A related unfortunate news feature by a scientific journal [G. Brumfiel, Quantum cryptography is hacked, News @ Nature (april 2007); Nature 447, 372 (2007)] has spurred some concern in the QKD community and among the general public by misinterpreting the implications of this work. The present article proves the existence of a stronger individual attack on QKD protocols with encrypted error correction, for which tight bounds are shown, and clarifies why the claims of the news feature incorrectly suggest a contradiction with the established “old-style” theory of BB84 individual attacks. The full implementation of a quantum cryptographic protocol includes a reconciliation and a privacy-amplification stage, whose choice alters in general both the maximum extractable secret and the optimal eavesdropping attack. The authors of [Phys. Rev. A 75, 042327 (2007)] are concerned only with the error-free part of the so-called sifted string, and do not consider faulty bits, which, in the version of their protocol, are discarded. When using the provably superior reconciliation approach of encrypted error correction (instead of error discard), the Slutsky-Brandt attack is no more optimal and does not “threaten” the security bound derived by Lütkenhaus [Phys. Rev. A 59, 3301 (1999)]. It is shown that the method of Slutsky and collaborators [Phys. Rev. A 57, 2383 (1998)] can be adapted to reconciliation with error correction, and that the optimal entangling probe can be explicitly found. Moreover, this attack fills Lütkenhaus bound, proving that it is tight (a fact which was not previously known).
Quantum cryptographic system with reduced data loss
Lo, H.K.; Chau, H.F.
1998-03-24
A secure method for distributing a random cryptographic key with reduced data loss is disclosed. Traditional quantum key distribution systems employ similar probabilities for the different communication modes and thus reject at least half of the transmitted data. The invention substantially reduces the amount of discarded data (those that are encoded and decoded in different communication modes e.g. using different operators) in quantum key distribution without compromising security by using significantly different probabilities for the different communication modes. Data is separated into various sets according to the actual operators used in the encoding and decoding process and the error rate for each set is determined individually. The invention increases the key distribution rate of the BB84 key distribution scheme proposed by Bennett and Brassard in 1984. Using the invention, the key distribution rate increases with the number of quantum signals transmitted and can be doubled asymptotically. 23 figs.
Quantum cryptographic system with reduced data loss
Lo, Hoi-Kwong; Chau, Hoi Fung
1998-01-01
A secure method for distributing a random cryptographic key with reduced data loss. Traditional quantum key distribution systems employ similar probabilities for the different communication modes and thus reject at least half of the transmitted data. The invention substantially reduces the amount of discarded data (those that are encoded and decoded in different communication modes e.g. using different operators) in quantum key distribution without compromising security by using significantly different probabilities for the different communication modes. Data is separated into various sets according to the actual operators used in the encoding and decoding process and the error rate for each set is determined individually. The invention increases the key distribution rate of the BB84 key distribution scheme proposed by Bennett and Brassard in 1984. Using the invention, the key distribution rate increases with the number of quantum signals transmitted and can be doubled asymptotically.
Polarization-basis tracking scheme for quantum key distribution using revealed sifted key bits.
Ding, Yu-Yang; Chen, Wei; Chen, Hua; Wang, Chao; Li, Ya-Ping; Wang, Shuang; Yin, Zhen-Qiang; Guo, Guang-Can; Han, Zheng-Fu
2017-03-15
The calibration of the polarization basis between the transmitter and receiver is an important task in quantum key distribution. A continuously working polarization-basis tracking scheme (PBTS) will effectively promote the efficiency of the system and reduce the potential security risk when switching between the transmission and calibration modes. Here, we proposed a single-photon level continuously working PBTS using only sifted key bits revealed during an error correction procedure, without introducing additional reference light or interrupting the transmission of quantum signals. We applied the scheme to a polarization-encoding BB84 QKD system in a 50 km fiber channel, and obtained an average quantum bit error rate (QBER) of 2.32% and a standard derivation of 0.87% during 24 h of continuous operation. The stable and relatively low QBER validates the effectiveness of the scheme.
A monogamy-of-entanglement game with applications to device-independent quantum cryptography
NASA Astrophysics Data System (ADS)
Tomamichel, Marco; Fehr, Serge; Kaniewski, Jędrzej; Wehner, Stephanie
2013-10-01
We consider a game in which two separate laboratories collaborate to prepare a quantum system and are then asked to guess the outcome of a measurement performed by a third party in a random basis on that system. Intuitively, by the uncertainty principle and the monogamy of entanglement, the probability that both players simultaneously succeed in guessing the outcome correctly is bounded. We are interested in the question of how the success probability scales when many such games are performed in parallel. We show that any strategy that maximizes the probability to win every game individually is also optimal for the parallel repetition of the game. Our result implies that the optimal guessing probability can be achieved without the use of entanglement. We explore several applications of this result. Firstly, we show that it implies security for standard BB84 quantum key distribution when the receiving party uses fully untrusted measurement devices, i.e. we show that BB84 is one-sided device independent. Secondly, we show how our result can be used to prove security of a one-round position-verification scheme. Finally, we generalize a well-known uncertainty relation for the guessing probability to quantum side information.
Quantum key distribution for composite dimensional finite systems
NASA Astrophysics Data System (ADS)
Shalaby, Mohamed; Kamal, Yasser
2017-06-01
The application of quantum mechanics contributes to the field of cryptography with very important advantage as it offers a mechanism for detecting the eavesdropper. The pioneering work of quantum key distribution uses mutually unbiased bases (MUBs) to prepare and measure qubits (or qudits). Weak mutually unbiased bases (WMUBs) have weaker properties than MUBs properties, however, unlike MUBs, a complete set of WMUBs can be constructed for systems with composite dimensions. In this paper, we study the use of weak mutually unbiased bases (WMUBs) in quantum key distribution for composite dimensional finite systems. We prove that the security analysis of using a complete set of WMUBs to prepare and measure the quantum states in the generalized BB84 protocol, gives better results than using the maximum number of MUBs that can be constructed, when they are analyzed against the intercept and resend attack.
Quantum key distribution session with 16-dimensional photonic states.
Etcheverry, S; Cañas, G; Gómez, E S; Nogueira, W A T; Saavedra, C; Xavier, G B; Lima, G
2013-01-01
The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.
Quantum key distribution session with 16-dimensional photonic states
NASA Astrophysics Data System (ADS)
Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.
2013-07-01
The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD.
Quantum key distribution session with 16-dimensional photonic states
Etcheverry, S.; Cañas, G.; Gómez, E. S.; Nogueira, W. A. T.; Saavedra, C.; Xavier, G. B.; Lima, G.
2013-01-01
The secure transfer of information is an important problem in modern telecommunications. Quantum key distribution (QKD) provides a solution to this problem by using individual quantum systems to generate correlated bits between remote parties, that can be used to extract a secret key. QKD with D-dimensional quantum channels provides security advantages that grow with increasing D. However, the vast majority of QKD implementations has been restricted to two dimensions. Here we demonstrate the feasibility of using higher dimensions for real-world quantum cryptography by performing, for the first time, a fully automated QKD session based on the BB84 protocol with 16-dimensional quantum states. Information is encoded in the single-photon transverse momentum and the required states are dynamically generated with programmable spatial light modulators. Our setup paves the way for future developments in the field of experimental high-dimensional QKD. PMID:23897033
Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Molotkov, S. N.
2008-07-15
In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper's capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determinedmore » for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency ({eta} {approx} 20%) and dark count probability (p{sub dark} {approx} 10{sup -7})« less
Cryptographic robustness of practical quantum cryptography: BB84 key distribution protocol
NASA Astrophysics Data System (ADS)
Molotkov, S. N.
2008-07-01
In real fiber-optic quantum cryptography systems, the avalanche photodiodes are not perfect, the source of quantum states is not a single-photon one, and the communication channel is lossy. For these reasons, key distribution is impossible under certain conditions for the system parameters. A simple analysis is performed to find relations between the parameters of real cryptography systems and the length of the quantum channel that guarantee secure quantum key distribution when the eavesdropper’s capabilities are limited only by fundamental laws of quantum mechanics while the devices employed by the legitimate users are based on current technologies. Critical values are determined for the rate of secure real-time key generation that can be reached under the current technology level. Calculations show that the upper bound on channel length can be as high as 300 km for imperfect photodetectors (avalanche photodiodes) with present-day quantum efficiency (η ≈ 20%) and dark count probability ( p dark ˜ 10-7).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Molotkov, S. N., E-mail: sergei.molotkov@gmail.com
2012-12-15
Any key-generation session contains a finite number of quantum-state messages, and it is there-fore important to understand the fundamental restrictions imposed on the minimal length of a string required to obtain a secret key with a specified length. The entropy uncertainty relations for smooth min and max entropies considerably simplify and shorten the proof of security. A proof of security of quantum key distribution with phase-temporal encryption is presented. This protocol provides the maximum critical error compared to other protocols up to which secure key distribution is guaranteed. In addition, unlike other basic protocols (of the BB84 type), which aremore » vulnerable with respect to an attack by 'blinding' of avalanche photodetectors, this protocol is stable with respect to such an attack and guarantees key security.« less
Quantum Secure Group Communication.
Li, Zheng-Hong; Zubairy, M Suhail; Al-Amri, M
2018-03-01
We propose a quantum secure group communication protocol for the purpose of sharing the same message among multiple authorized users. Our protocol can remove the need for key management that is needed for the quantum network built on quantum key distribution. Comparing with the secure quantum network based on BB84, we show our protocol is more efficient and securer. Particularly, in the security analysis, we introduce a new way of attack, i.e., the counterfactual quantum attack, which can steal information by "invisible" photons. This invisible photon can reveal a single-photon detector in the photon path without triggering the detector. Moreover, the photon can identify phase operations applied to itself, thereby stealing information. To defeat this counterfactual quantum attack, we propose a quantum multi-user authorization system. It allows us to precisely control the communication time so that the attack can not be completed in time.
Reduced randomness in quantum cryptography with sequences of qubits encoded in the same basis
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lamoureux, L.-P.; Cerf, N. J.; Bechmann-Pasquinucci, H.
2006-03-15
We consider the cloning of sequences of qubits prepared in the states used in the BB84 or six-state quantum cryptography protocol, and show that the single-qubit fidelity is unaffected even if entire sequences of qubits are prepared in the same basis. This result is only valid provided that the sequences are much shorter than the total key. It is of great importance for practical quantum cryptosystems because it reduces the need for high-speed random number generation without impairing on the security against finite-size cloning attacks.
Quantum key distribution with prepare-and-measure Bell test
Tan, Yong-gang
2016-01-01
The prepare-and-measure quantum key distribution (QKD) has the merits of fast speed, high key generation rate, and easy implementation. However, the detector side channel attacks greatly undermine the security of the key bits. The eavesdropper, Eve, exploits the flaws of the detectors to obtain illegal information without violating quantum principles. It means that she can intervene in the communication without being detected. A prepare-and-measure Bell test protocol will be proposed. By randomly carrying out Bell test at the side of the information receiver, Bob, Eve’s illegal information gain within the detector side channel attack can be well bounded. This protocol does not require any improvement on the detectors used in available prepare-and-measure QKD. Though we only illustrate its application in the BB84 protocol, it is applicable for any prepare-and-measure QKD. PMID:27733771
Feasibility of satellite quantum key distribution
NASA Astrophysics Data System (ADS)
Bonato, C.; Tomaello, A.; Da Deppo, V.; Naletto, G.; Villoresi, P.
2009-04-01
In this paper, we present a novel analysis of the feasibility of quantum key distribution between a LEO satellite and a ground station. First of all, we study signal propagation through a turbulent atmosphere for uplinks and downlinks, discussing the contribution of beam spreading and beam wandering. Then we introduce a model for the background noise of the channel during night-time and day-time, calculating the signal-to-noise ratio for different configurations. We also discuss the expected error-rate due to imperfect polarization compensation in the channel. Finally, we calculate the expected key generation rate of a secure key for different configurations (uplink, downlink) and for different protocols (BB84 with and without decoy states, entanglement-based Ekert91 protocol).
Secure detection in quantum key distribution by real-time calibration of receiver
NASA Astrophysics Data System (ADS)
Marøy, Øystein; Makarov, Vadim; Skaar, Johannes
2017-12-01
The single-photon detectionefficiency of the detector unit is crucial for the security of common quantum key distribution protocols like Bennett-Brassard 1984 (BB84). A low value for the efficiency indicates a possible eavesdropping attack that exploits the photon receiver’s imperfections. We present a method for estimating the detection efficiency, and calculate the corresponding secure key generation rate. The estimation is done by testing gated detectors using a randomly activated photon source inside the receiver unit. This estimate gives a secure rate for any detector with non-unity single-photon detection efficiency, both inherit or due to blinding. By adding extra optical components to the receiver, we make sure that the key is extracted from photon states for which our estimate is valid. The result is a quantum key distribution scheme that is secure against any attack that exploits detector imperfections.
Security of two quantum cryptography protocols using the same four qubit states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Branciard, Cyril; Ecole Nationale Superieure des Telecommunications, 46, rue Barrault, 75013 Paris; Gisin, Nicolas
2005-09-15
The first quantum cryptography protocol, proposed by Bennett and Brassard in 1984 (BB84), has been widely studied in recent years. This protocol uses four states (more precisely, two complementary bases) for the encoding of the classical bit. Recently, it has been noticed that by using the same four states, but a different encoding of information, one can define a protocol which is more robust in practical implementations, specifically when attenuated laser pulses are used instead of single-photon sources [V. Scarani et al., Phys. Rev. Lett. 92, 057901 (2004), referred to as the SARG04 protocol]. We present a detailed study ofmore » SARG04 in two different regimes. In the first part, we consider an implementation with a single-photon source: we derive bounds on the error rate Q for security against all possible attacks by the eavesdropper. The lower and the upper bound obtained for SARG04 (Q < or approx. 10.95% and Q > or approx. 14.9%, respectively) are close to those obtained for BB84 (Q < or approx. 12.4% and Q > or approx. 14.6%, respectively). In the second part, we consider a realistic source consisting of an attenuated laser and improve on previous analysis by allowing Alice to optimize the mean number of photons as a function of the distance. The SARG04 protocol is found to perform better than BB84, both in secret-key rate and in maximal achievable distance, for a wide class of Eve's attacks.« less
NASA Astrophysics Data System (ADS)
Ko, Heasin; Lim, Kyongchun; Oh, Junsang; Rhee, June-Koo Kevin
2016-10-01
Quantum channel loopholes due to imperfect implementations of practical devices expose quantum key distribution (QKD) systems to potential eavesdropping attacks. Even though QKD systems are implemented with optical devices that are highly selective on spectral characteristics, information theory-based analysis about a pertinent attack strategy built with a reasonable framework exploiting it has never been clarified. This paper proposes a new type of trojan horse attack called hidden pulse attack that can be applied in a plug-and-play QKD system, using general and optimal attack strategies that can extract quantum information from phase-disturbed quantum states of eavesdropper's hidden pulses. It exploits spectral characteristics of a photodiode used in a plug-and-play QKD system in order to probe modulation states of photon qubits. We analyze the security performance of the decoy-state BB84 QKD system under the optimal hidden pulse attack model that shows enormous performance degradation in terms of both secret key rate and transmission distance.
Towards a Quantum Memory assisted MDI-QKD node
NASA Astrophysics Data System (ADS)
Namazi, Mehdi; Vallone, Giuseppe; Jordaan, Bertus; Goham, Connor; Shahrokhshahi, Reihaneh; Villoresi, Paolo; Figueroa, Eden
2017-04-01
The creation of large quantum network that permits the communication of quantum states and the secure distribution of cryptographic keys requires multiple operational quantum memories. In this work we present our progress towards building a prototypical quantum network that performs the memory-assisted measurement device independent QKD protocol. Currently our network combines the quantum part of the BB84 protocol with room-temperature quantum memory operation, while still maintaining relevant quantum bit error rates for single-photon level operation. We will also discuss our efforts to use a network of two room temperature quantum memories, receiving, storing and transforming randomly polarized photons in order to realize Bell state measurements. The work was supported by the US-Navy Office of Naval Research, Grant Number N00141410801, the National Science Foundation, Grant Number PHY-1404398 and the Simons Foundation, Grant Number SBF241180.
NASA Astrophysics Data System (ADS)
Klimov, A. N.; Kulik, S. P.; Molotkov, S. N.; Potapova, T. A.
2017-03-01
In the paper by Gleim et al (2016 Opt. Express 24 2619), it was declared that the system of quantum cryptography, exploiting quantum key distribution (QKD) protocol BB84 with the additional reference state and encoding in a sub-carrier, is able to distribute secret keys at a distance of 210 km. The following shows that a simple attack realized with a beam splitter results in a loss of privacy of the keys over substantially smaller distances. It turns out that the actual length of the secret key transmission for the QKD system encoding in the sub-carrier frequency is ten times less than that declared in Gleim et al (2016 Opt. Express 24 2619). Therefore it is impossible to safely use the keys when distributed at a larger length of the communication channel than shown below. The maximum communication distance does not exceed 22 km, even in the most optimistic scenario.
NASA Astrophysics Data System (ADS)
Hughes, Richard
2004-05-01
Quantum key distribution (QKD) uses single-photon communications to generate the shared, secret random number sequences that are used to encrypt and decrypt secret communications. The unconditional security of QKD is based on the interplay between fundamental principles of quantum physics and information theory. An adversary can neither successfully tap the transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). QKD could be particularly attractive for free-space optical communications, both ground-based and for satellites. I will describe a QKD experiment performed over multi-kilometer line-of-sight paths, which serves as a model for a satellite-to-ground key distribution system. The system uses single-photon polarization states, without active polarization switching, and for the first time implements the complete BB84 QKD protocol including, reconciliation, privacy amplification and the all-important authentication stage. It is capable of continuous operation throughout the day and night, achieving the self-sustaining production of error-free, shared, secret bits. I will also report on the results of satellite-to-ground QKD modeling.
Room-Temperature Quantum Cloning Machine with Full Coherent Phase Control in Nanodiamond
Chang, Yan-Chun; Liu, Gang-Qin; Liu, Dong-Qi; Fan, Heng; Pan, Xin-Yu
2013-01-01
In contrast to the classical world, an unknown quantum state cannot be cloned ideally, as stated by the no-cloning theorem. However, it is expected that approximate or probabilistic quantum cloning will be necessary for different applications, and thus various quantum cloning machines have been designed. Phase quantum cloning is of particular interest because it can be used to attack the Bennett-Brassard 1984 (BB84) states used in quantum key distribution for secure communications. Here, we report the first room-temperature implementation of quantum phase cloning with a controllable phase in a solid-state system: the nitrogen-vacancy centre of a nanodiamond. The phase cloner works well for all qubits located on the equator of the Bloch sphere. The phase is controlled and can be measured with high accuracy, and the experimental results are consistent with theoretical expectations. This experiment provides a basis for phase-controllable quantum information devices. PMID:23511233
Phase-Reference-Free Experiment of Measurement-Device-Independent Quantum Key Distribution
NASA Astrophysics Data System (ADS)
Wang, Chao; Song, Xiao-Tian; Yin, Zhen-Qiang; Wang, Shuang; Chen, Wei; Zhang, Chun-Mei; Guo, Guang-Can; Han, Zheng-Fu
2015-10-01
Measurement-device-independent quantum key distribution (MDI QKD) is a substantial step toward practical information-theoretic security for key sharing between remote legitimate users (Alice and Bob). As with other standard device-dependent quantum key distribution protocols, such as BB84, MDI QKD assumes that the reference frames have been shared between Alice and Bob. In practice, a nontrivial alignment procedure is often necessary, which requires system resources and may significantly reduce the secure key generation rate. Here, we propose a phase-coding reference-frame-independent MDI QKD scheme that requires no phase alignment between the interferometers of two distant legitimate parties. As a demonstration, a proof-of-principle experiment using Faraday-Michelson interferometers is presented. The experimental system worked at 1 MHz, and an average secure key rate of 8.309 bps was obtained at a fiber length of 20 km between Alice and Bob. The system can maintain a positive key generation rate without phase compensation under normal conditions. The results exhibit the feasibility of our system for use in mature MDI QKD devices and its value for network scenarios.
Integrated quantum key distribution sender unit for daily-life implementations
NASA Astrophysics Data System (ADS)
Mélen, Gwenaelle; Vogl, Tobias; Rau, Markus; Corrielli, Giacomo; Crespi, Andrea; Osellame, Roberto; Weinfurter, Harald
2016-03-01
Unlike currently implemented encryption schemes, Quantum Key Distribution provides a secure way of generating and distributing a key among two parties. Although a multitude of research platforms has been developed, the integration of QKD units within classical communication systems remains a tremendous challenge. The recently achieved maturity of integrated photonic technologies could be exploited to create miniature QKD add-ons that could extend the primary function of various existing systems such as mobile devices or optical stations. In this work we report on an integrated optics module enabling secure short-distance communication for, e.g., quantum access schemes. Using BB84-like protocols, Alice's mobile low-cost device can exchange secure key and information everywhere within a trusted node network. The new optics platform (35×20×8mm) compatible with current smartphone's technology generates NIR faint polarised laser pulses with 100MHz repetition rate. Fully automated beam tracking and live basis-alignment on Bob's side ensure user-friendly operation with a quantum link efficiency as high as 50% stable over a few seconds.
Mao, Chen-Chen; Zhou, Xing-Yu; Zhu, Jian-Rong; Zhang, Chun-Hui; Zhang, Chun-Mei; Wang, Qin
2018-05-14
Recently Zhang et al [ Phys. Rev. A95, 012333 (2017)] developed a new approach to estimate the failure probability for the decoy-state BB84 QKD system when taking finite-size key effect into account, which offers security comparable to Chernoff bound, while results in an improved key rate and transmission distance. Based on Zhang et al's work, now we extend this approach to the case of the measurement-device-independent quantum key distribution (MDI-QKD), and for the first time implement it onto the four-intensity decoy-state MDI-QKD system. Moreover, through utilizing joint constraints and collective error-estimation techniques, we can obviously increase the performance of practical MDI-QKD systems compared with either three- or four-intensity decoy-state MDI-QKD using Chernoff bound analysis, and achieve much higher level security compared with those applying Gaussian approximation analysis.
Security of quantum key distribution with multiphoton components
Yin, Hua-Lei; Fu, Yao; Mao, Yingqiu; Chen, Zeng-Bing
2016-01-01
Most qubit-based quantum key distribution (QKD) protocols extract the secure key merely from single-photon component of the attenuated lasers. However, with the Scarani-Acin-Ribordy-Gisin 2004 (SARG04) QKD protocol, the unconditionally secure key can be extracted from the two-photon component by modifying the classical post-processing procedure in the BB84 protocol. Employing the merits of SARG04 QKD protocol and six-state preparation, one can extract secure key from the components of single photon up to four photons. In this paper, we provide the exact relations between the secure key rate and the bit error rate in a six-state SARG04 protocol with single-photon, two-photon, three-photon, and four-photon sources. By restricting the mutual information between the phase error and bit error, we obtain a higher secure bit error rate threshold of the multiphoton components than previous works. Besides, we compare the performances of the six-state SARG04 with other prepare-and-measure QKD protocols using decoy states. PMID:27383014
NASA Astrophysics Data System (ADS)
Bellac, Michel Le
2014-11-01
The first practical application of quantum physics examined in this book is quantum cryptography. Quantum cryptography is a relatively recent invention (it dates back from the mid 1980s) but I chose it because it allows me to illustrate the fundamental principles with a minimum number of intermediate steps. I shall begin with a short summary of classical cryptography, reviewing briefly the two systems which are currently used today: the secret key system and the public key system. Quantum cryptography is not a new method for dissimulating the meaning of a message, but it allows one to be certain that no spy has accessed it. There exist many quantum cryptography protocols and various experimental devices have been proposed for implementing them. The simplest device is based on polarization, a concept which will be introduced first in the case of of light polarization, and then in that of photon polarization. The use of photon polarization gives the simplest implementation of the protocol proposed in 1984 by Bennett and Brassard, which is known by the acronym formed with their initials, the BB84 protocol.
NASA Astrophysics Data System (ADS)
Malik, Mehul
Over the past three decades, quantum mechanics has allowed the development of technologies that provide unconditionally secure communication. In parallel, the quantum nature of the transverse electromagnetic field has spawned the field of quantum imaging that encompasses technologies such as quantum lithography, quantum ghost imaging, and high-dimensional quantum key distribution (QKD). The emergence of such quantum technologies also highlights the need for the development of accurate and efficient methods of measuring and characterizing the elusive quantum state itself. In this thesis, I present new technologies that use the quantum properties of light for security. The first of these is a technique that extends the principles behind QKD to the field of imaging and optical ranging. By applying the polarization-based BB84 protocol to individual photons in an active imaging system, we obtained images that were secure against any intercept-resend jamming attacks. The second technology presented in this thesis is based on an extension of quantum ghost imaging, a technique that uses position-momentum entangled photons to create an image of an object without directly gaining any spatial information from it. We used a holographic filtering technique to build a quantum ghost image identification system that uses a few pairs of photons to identify an object from a set of known objects. The third technology addressed in this thesis is a high-dimensional QKD system that uses orbital-angular-momentum (OAM) modes of light for encoding. Moving to a high-dimensional state space in QKD allows one to impress more information on each photon, as well as introduce higher levels of security. I discuss the development of two OAM-QKD protocols based on the BB84 and Ekert protocols of QKD. In addition, I present a study characterizing the effects of turbulence on a communication system using OAM modes for encoding. The fourth and final technology presented in this thesis is a relatively new technique called direct measurement that uses sequential weak and strong measurements to characterize a quantum state. I use this technique to characterize the quantum state of a photon with a dimensionality of d = 27, and visualize its rotation in the natural basis of OAM.
Decoy-state quantum key distribution with more than three types of photon intensity pulses
NASA Astrophysics Data System (ADS)
Chau, H. F.
2018-04-01
The decoy-state method closes source security loopholes in quantum key distribution (QKD) using a laser source. In this method, accurate estimates of the detection rates of vacuum and single-photon events plus the error rate of single-photon events are needed to give a good enough lower bound of the secret key rate. Nonetheless, the current estimation method for these detection and error rates, which uses three types of photon intensities, is accurate up to about 1 % relative error. Here I report an experimentally feasible way that greatly improves these estimates and hence increases the one-way key rate of the BB84 QKD protocol with unbiased bases selection by at least 20% on average in realistic settings. The major tricks are the use of more than three types of photon intensities plus the fact that estimating bounds of the above detection and error rates is numerically stable, although these bounds are related to the inversion of a high condition number matrix.
Quantum key distribution with an unknown and untrusted source
NASA Astrophysics Data System (ADS)
Zhao, Yi; Qi, Bing; Lo, Hoi-Kwong
2009-03-01
The security of a standard bi-directional ``plug & play'' quantum key distribution (QKD) system has been an open question for a long time. This is mainly because its source is equivalently controlled by an eavesdropper, which means the source is unknown and untrusted. Qualitative discussion on this subject has been made previously. In this paper, we present the first quantitative security analysis on a general class of QKD protocols whose sources are unknown and untrusted. The securities of standard BB84 protocol, weak+vacuum decoy state protocol, and one-decoy decoy state protocol, with unknown and untrusted sources are rigorously proved. We derive rigorous lower bounds to the secure key generation rates of the above three protocols. Our numerical simulation results show that QKD with an untrusted source gives a key generation rate that is close to that with a trusted source. Our work is published in [1]. [4pt] [1] Y. Zhao, B. Qi, and H.-K. Lo, Phys. Rev. A, 77:052327 (2008).
Chip-based quantum key distribution
NASA Astrophysics Data System (ADS)
Sibson, P.; Erven, C.; Godfrey, M.; Miki, S.; Yamashita, T.; Fujiwara, M.; Sasaki, M.; Terai, H.; Tanner, M. G.; Natarajan, C. M.; Hadfield, R. H.; O'Brien, J. L.; Thompson, M. G.
2017-02-01
Improvement in secure transmission of information is an urgent need for governments, corporations and individuals. Quantum key distribution (QKD) promises security based on the laws of physics and has rapidly grown from proof-of-concept to robust demonstrations and deployment of commercial systems. Despite these advances, QKD has not been widely adopted, and large-scale deployment will likely require chip-based devices for improved performance, miniaturization and enhanced functionality. Here we report low error rate, GHz clocked QKD operation of an indium phosphide transmitter chip and a silicon oxynitride receiver chip--monolithically integrated devices using components and manufacturing processes from the telecommunications industry. We use the reconfigurability of these devices to demonstrate three prominent QKD protocols--BB84, Coherent One Way and Differential Phase Shift--with performance comparable to state-of-the-art. These devices, when combined with integrated single photon detectors, pave the way for successfully integrating QKD into future telecommunications networks.
Chip-based quantum key distribution
Sibson, P.; Erven, C.; Godfrey, M.; Miki, S.; Yamashita, T.; Fujiwara, M.; Sasaki, M.; Terai, H.; Tanner, M. G.; Natarajan, C. M.; Hadfield, R. H.; O'Brien, J. L.; Thompson, M. G.
2017-01-01
Improvement in secure transmission of information is an urgent need for governments, corporations and individuals. Quantum key distribution (QKD) promises security based on the laws of physics and has rapidly grown from proof-of-concept to robust demonstrations and deployment of commercial systems. Despite these advances, QKD has not been widely adopted, and large-scale deployment will likely require chip-based devices for improved performance, miniaturization and enhanced functionality. Here we report low error rate, GHz clocked QKD operation of an indium phosphide transmitter chip and a silicon oxynitride receiver chip—monolithically integrated devices using components and manufacturing processes from the telecommunications industry. We use the reconfigurability of these devices to demonstrate three prominent QKD protocols—BB84, Coherent One Way and Differential Phase Shift—with performance comparable to state-of-the-art. These devices, when combined with integrated single photon detectors, pave the way for successfully integrating QKD into future telecommunications networks. PMID:28181489
NASA Astrophysics Data System (ADS)
Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin
2014-12-01
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary.
Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin
2014-01-01
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each ai contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary. PMID:25518810
On the security of semi-device-independent QKD protocols
NASA Astrophysics Data System (ADS)
Chaturvedi, Anubhav; Ray, Maharshi; Veynar, Ryszard; Pawłowski, Marcin
2018-06-01
While fully device-independent security in (BB84-like) prepare-and-measure quantum key distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi-device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used except for an upper bound on the dimension of the communicated system. Studying security under such minimal assumptions is especially relevant in the context of the recent quantum hacking attacks wherein the eavesdroppers can not only construct the devices used by the communicating parties but are also able to remotely alter their behavior. In this work, we study the security of a SDIQKD protocol based on the prepare-and-measure quantum implementation of a well-known cryptographic primitive, the random access code (RAC). We consider imperfect detectors and establish the critical values of the security parameters (the observed success probability of the RAC and the detection efficiency) required for guaranteeing security against eavesdroppers with and without quantum memory. Furthermore, we suggest a minimal characterization of the preparation device in order to lower the requirements for establishing a secure key.
Trustworthiness of detectors in quantum key distribution with untrusted detectors
Qi, Bing
2015-02-25
Measurement-device-independent quantum key distribution (MDI-QKD) protocol has been demonstrated as a viable solution to detector side-channel attacks. One of the main advantages of MDI-QKD is that the security can be proved without making any assumptions about how the measurement device works. The price to pay is the relatively low secure key rate comparing with conventional quantum key distribution (QKD), such as the decoy-state BB84 protocol. Recently a new QKD protocol, aiming at bridging the strong security of MDI-QKD with the high e ciency of conventional QKD, has been proposed. In this protocol, the legitimate receiver employs a trusted linear opticsmore » network to encode information on photons received from an insecure quantum channel, and then performs a Bell state measurement (BSM) using untrusted detectors. One crucial assumption made in most of these studies is that the untrusted BSM located inside the receiver's laboratory cannot send any unwanted information to the outside. Here in this paper, we show that if the BSM is completely untrusted, a simple scheme would allow the BSM to send information to the outside. Combined with Trojan horse attacks, this scheme could allow Eve to gain information of the quantum key without being detected. Ultimately, to prevent the above attack, either countermeasures to Trojan horse attacks or some trustworthiness to the "untrusted" BSM device is required.« less
Fast optical source for quantum key distribution based on semiconductor optical amplifiers.
Jofre, M; Gardelein, A; Anzolin, G; Amaya, W; Capmany, J; Ursin, R; Peñate, L; Lopez, D; San Juan, J L; Carrasco, J A; Garcia, F; Torcal-Milla, F J; Sanchez-Brea, L M; Bernabeu, E; Perdigues, J M; Jennewein, T; Torres, J P; Mitchell, M W; Pruneri, V
2011-02-28
A novel integrated optical source capable of emitting faint pulses with different polarization states and with different intensity levels at 100 MHz has been developed. The source relies on a single laser diode followed by four semiconductor optical amplifiers and thin film polarizers, connected through a fiber network. The use of a single laser ensures high level of indistinguishability in time and spectrum of the pulses for the four different polarizations and three different levels of intensity. The applicability of the source is demonstrated in the lab through a free space quantum key distribution experiment which makes use of the decoy state BB84 protocol. We achieved a lower bound secure key rate of the order of 3.64 Mbps and a quantum bit error ratio as low as 1.14×10⁻² while the lower bound secure key rate became 187 bps for an equivalent attenuation of 35 dB. To our knowledge, this is the fastest polarization encoded QKD system which has been reported so far. The performance, reduced size, low power consumption and the fact that the components used can be space qualified make the source particularly suitable for secure satellite communication.
Experimental Eavesdropping Based on Optimal Quantum Cloning
NASA Astrophysics Data System (ADS)
Bartkiewicz, Karol; Lemr, Karel; Černoch, Antonín; Soubusta, Jan; Miranowicz, Adam
2013-04-01
The security of quantum cryptography is guaranteed by the no-cloning theorem, which implies that an eavesdropper copying transmitted qubits in unknown states causes their disturbance. Nevertheless, in real cryptographic systems some level of disturbance has to be allowed to cover, e.g., transmission losses. An eavesdropper can attack such systems by replacing a noisy channel by a better one and by performing approximate cloning of transmitted qubits which disturb them but below the noise level assumed by legitimate users. We experimentally demonstrate such symmetric individual eavesdropping on the quantum key distribution protocols of Bennett and Brassard (BB84) and the trine-state spherical code of Renes (R04) with two-level probes prepared using a recently developed photonic multifunctional quantum cloner [Lemr et al., Phys. Rev. A 85, 050307(R) (2012)PLRAAN1050-2947]. We demonstrated that our optimal cloning device with high-success rate makes the eavesdropping possible by hiding it in usual transmission losses. We believe that this experiment can stimulate the quest for other operational applications of quantum cloning.
High-dimensional quantum cloning and applications to quantum hacking
Bouchard, Frédéric; Fickler, Robert; Boyd, Robert W.; Karimi, Ebrahim
2017-01-01
Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited, a quantum state may be copied with maximal accuracy via various optimal cloning schemes. Optimal quantum cloning, which lies at the border of the physical limit imposed by the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally realized for low-dimensional photonic states. However, an increase in the dimensionality of quantum systems is greatly beneficial to quantum computation and communication protocols. Nonetheless, no experimental demonstration of optimal cloning machines has hitherto been shown for high-dimensional quantum systems. We perform optimal cloning of high-dimensional photonic states by means of the symmetrization method. We show the universality of our technique by conducting cloning of numerous arbitrary input states and fully characterize our cloning machine by performing quantum state tomography on cloned photons. In addition, a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol is experimentally demonstrated to reveal the robustness of high-dimensional states in quantum cryptography. PMID:28168219
High-dimensional quantum cloning and applications to quantum hacking.
Bouchard, Frédéric; Fickler, Robert; Boyd, Robert W; Karimi, Ebrahim
2017-02-01
Attempts at cloning a quantum system result in the introduction of imperfections in the state of the copies. This is a consequence of the no-cloning theorem, which is a fundamental law of quantum physics and the backbone of security for quantum communications. Although perfect copies are prohibited, a quantum state may be copied with maximal accuracy via various optimal cloning schemes. Optimal quantum cloning, which lies at the border of the physical limit imposed by the no-signaling theorem and the Heisenberg uncertainty principle, has been experimentally realized for low-dimensional photonic states. However, an increase in the dimensionality of quantum systems is greatly beneficial to quantum computation and communication protocols. Nonetheless, no experimental demonstration of optimal cloning machines has hitherto been shown for high-dimensional quantum systems. We perform optimal cloning of high-dimensional photonic states by means of the symmetrization method. We show the universality of our technique by conducting cloning of numerous arbitrary input states and fully characterize our cloning machine by performing quantum state tomography on cloned photons. In addition, a cloning attack on a Bennett and Brassard (BB84) quantum key distribution protocol is experimentally demonstrated to reveal the robustness of high-dimensional states in quantum cryptography.
Wei, Chun-Yan; Gao, Fei; Wen, Qiao-Yan; Wang, Tian-Yin
2014-12-18
Until now, the only kind of practical quantum private query (QPQ), quantum-key-distribution (QKD)-based QPQ, focuses on the retrieval of a single bit. In fact, meaningful message is generally composed of multiple adjacent bits (i.e., a multi-bit block). To obtain a message a1a2···al from database, the user Alice has to query l times to get each ai. In this condition, the server Bob could gain Alice's privacy once he obtains the address she queried in any of the l queries, since each a(i) contributes to the message Alice retrieves. Apparently, the longer the retrieved message is, the worse the user privacy becomes. To solve this problem, via an unbalanced-state technique and based on a variant of multi-level BB84 protocol, we present a protocol for QPQ of blocks, which allows the user to retrieve a multi-bit block from database in one query. Our protocol is somewhat like the high-dimension version of the first QKD-based QPQ protocol proposed by Jacobi et al., but some nontrivial modifications are necessary.
Free-Space Quantum Key Distribution using Polarization Entangled Photons
NASA Astrophysics Data System (ADS)
Kurtsiefer, Christian
2007-06-01
We report on a complete experimental implementation of a quantum key distribution protocol through a free space link using polarization-entangled photon pairs from a compact parametric down-conversion source [1]. Based on a BB84-equivalent protocol, we generated without interruption over 10 hours a secret key free-space optical link distance of 1.5 km with a rate up to 950 bits per second after error correction and privacy amplification. Our system is based on two time stamp units and relies on no specific hardware channel for coincidence identification besides an IP link. For that, initial clock synchronization with an accuracy of better than 2 ns is achieved, based on a conventional NTP protocol and a tiered cross correlation of time tags on both sides. Time tags are used to servo a local clock, allowing a streamed measurement on correctly identified photon pairs. Contrary to the majority of quantum key distribution systems, this approach does not require a trusted large-bandwidth random number generator, but integrates that into the physical key generation process. We discuss our current progress of implementing a key distribution via an atmospherical link during daylight conditions, and possible attack scenarios on a physical timing information side channel to a entanglement-based key distribution system. [1] I. Marcikic, A. Lamas-Linares, C. Kurtsiefer, Appl. Phys. Lett. 89, 101122 (2006).
QKD using polarization encoding with active measurement basis selection
NASA Astrophysics Data System (ADS)
Duplinskiy, A.; Ustimchik, V.; Kanapin, A.; Kurochkin, Y.
2017-11-01
We report a proof-of-principle quantum key distribution experiment using a one-way optical scheme with polarization encoding implementing the BB84 protocol. LiNbO3 phase modulators are used for generating polarization states for Alice and active basis selection for Bob. This allows the former to use a single laser source, while the latter needs only two single-photon detectors. The presented optical scheme is simple and consists of standard fiber components. Calibration algorithm for three polarization controllers used in the scheme has been developed. The experiment was carried with 10 MHz repetition frequency laser pulses over a distance of 50 km of standard telecom optical fiber.
Attacks exploiting deviation of mean photon number in quantum key distribution and coin tossing
NASA Astrophysics Data System (ADS)
Sajeed, Shihan; Radchenko, Igor; Kaiser, Sarah; Bourgoin, Jean-Philippe; Pappa, Anna; Monat, Laurent; Legré, Matthieu; Makarov, Vadim
2015-03-01
The security of quantum communication using a weak coherent source requires an accurate knowledge of the source's mean photon number. Finite calibration precision or an active manipulation by an attacker may cause the actual emitted photon number to deviate from the known value. We model effects of this deviation on the security of three quantum communication protocols: the Bennett-Brassard 1984 (BB84) quantum key distribution (QKD) protocol without decoy states, Scarani-Acín-Ribordy-Gisin 2004 (SARG04) QKD protocol, and a coin-tossing protocol. For QKD we model both a strong attack using technology possible in principle and a realistic attack bounded by today's technology. To maintain the mean photon number in two-way systems, such as plug-and-play and relativistic quantum cryptography schemes, bright pulse energy incoming from the communication channel must be monitored. Implementation of a monitoring detector has largely been ignored so far, except for ID Quantique's commercial QKD system Clavis2. We scrutinize this implementation for security problems and show that designing a hack-proof pulse-energy-measuring detector is far from trivial. Indeed, the first implementation has three serious flaws confirmed experimentally, each of which may be exploited in a cleverly constructed Trojan-horse attack. We discuss requirements for a loophole-free implementation of the monitoring detector.
Security of six-state quantum key distribution protocol with threshold detectors
Kato, Go; Tamaki, Kiyoshi
2016-01-01
The security of quantum key distribution (QKD) is established by a security proof, and the security proof puts some assumptions on the devices consisting of a QKD system. Among such assumptions, security proofs of the six-state protocol assume the use of photon number resolving (PNR) detector, and as a result the bit error rate threshold for secure key generation for the six-state protocol is higher than that for the BB84 protocol. Unfortunately, however, this type of detector is demanding in terms of technological level compared to the standard threshold detector, and removing the necessity of such a detector enhances the feasibility of the implementation of the six-state protocol. Here, we develop the security proof for the six-state protocol and show that we can use the threshold detector for the six-state protocol. Importantly, the bit error rate threshold for the key generation for the six-state protocol (12.611%) remains almost the same as the one (12.619%) that is derived from the existing security proofs assuming the use of PNR detectors. This clearly demonstrates feasibility of the six-state protocol with practical devices. PMID:27443610
A universal setup for active control of a single-photon detector
NASA Astrophysics Data System (ADS)
Liu, Qin; Lamas-Linares, Antía; Kurtsiefer, Christian; Skaar, Johannes; Makarov, Vadim; Gerhardt, Ilja
2014-01-01
The influence of bright light on a single-photon detector has been described in a number of recent publications. The impact on quantum key distribution (QKD) is important, and several hacking experiments have been tailored to fully control single-photon detectors. Special attention has been given to avoid introducing further errors into a QKD system. We describe the design and technical details of an apparatus which allows to attack a quantum-cryptographic connection. This device is capable of controlling free-space and fiber-based systems and of minimizing unwanted clicks in the system. With different control diagrams, we are able to achieve a different level of control. The control was initially targeted to the systems using BB84 protocol, with polarization encoding and basis switching using beamsplitters, but could be extended to other types of systems. We further outline how to characterize the quality of active control of single-photon detectors.
A universal setup for active control of a single-photon detector
DOE Office of Scientific and Technical Information (OSTI.GOV)
Liu, Qin; Skaar, Johannes; Lamas-Linares, Antía
2014-01-15
The influence of bright light on a single-photon detector has been described in a number of recent publications. The impact on quantum key distribution (QKD) is important, and several hacking experiments have been tailored to fully control single-photon detectors. Special attention has been given to avoid introducing further errors into a QKD system. We describe the design and technical details of an apparatus which allows to attack a quantum-cryptographic connection. This device is capable of controlling free-space and fiber-based systems and of minimizing unwanted clicks in the system. With different control diagrams, we are able to achieve a different levelmore » of control. The control was initially targeted to the systems using BB84 protocol, with polarization encoding and basis switching using beamsplitters, but could be extended to other types of systems. We further outline how to characterize the quality of active control of single-photon detectors.« less
Quantum cryptography using coherent states: Randomized encryption and key generation
NASA Astrophysics Data System (ADS)
Corndorf, Eric
With the advent of the global optical-telecommunications infrastructure, an increasing number of individuals, companies, and agencies communicate information with one another over public networks or physically-insecure private networks. While the majority of the traffic flowing through these networks requires little or no assurance of secrecy, the same cannot be said for certain communications between banks, between government agencies, within the military, and between corporations. In these arenas, the need to specify some level of secrecy in communications is a high priority. While the current approaches to securing sensitive information (namely the public-key-cryptography infrastructure and deterministic private-key ciphers like AES and 3DES) seem to be cryptographically strong based on empirical evidence, there exist no mathematical proofs of secrecy for any widely deployed cryptosystem. As an example, the ubiquitous public-key cryptosystems infer all of their secrecy from the assumption that factoring of the product of two large primes is necessarily time consuming---something which has not, and perhaps cannot, be proven. Since the 1980s, the possibility of using quantum-mechanical features of light as a physical mechanism for satisfying particular cryptographic objectives has been explored. This research has been fueled by the hopes that cryptosystems based on quantum systems may provide provable levels of secrecy which are at least as valid as quantum mechanics itself. Unfortunately, the most widely considered quantum-cryptographic protocols (BB84 and the Ekert protocol) have serious implementation problems. Specifically, they require quantum-mechanical states which are not readily available, and they rely on unproven relations between intrusion-level detection and the information available to an attacker. As a result, the secrecy level provided by these experimental implementations is entirely unspecified. In an effort to provably satisfy the cryptographic objectives of key generation and direct data-encryption, a new quantum cryptographic principle is demonstrated wherein keyed coherent-state signal sets are employed. Taking advantage of the fundamental and irreducible quantum-measurement noise of coherent states, these schemes do not require the users to measure the influence of an attacker. Experimental key-generation and data encryption schemes based on these techniques, which are compatible with today's WDM fiber-optic telecommunications infrastructure, are implemented and analyzed.
Topics in quantum cryptography, quantum error correction, and channel simulation
NASA Astrophysics Data System (ADS)
Luo, Zhicheng
In this thesis, we mainly investigate four different topics: efficiently implementable codes for quantum key expansion [51], quantum error-correcting codes based on privacy amplification [48], private classical capacity of quantum channels [44], and classical channel simulation with quantum side information [49, 50]. For the first topic, we propose an efficiently implementable quantum key expansion protocol, capable of increasing the size of a pre-shared secret key by a constant factor. Previously, the Shor-Preskill proof [64] of the security of the Bennett-Brassard 1984 (BB84) [6] quantum key distribution protocol relied on the theoretical existence of good classical error-correcting codes with the "dual-containing" property. But the explicit and efficiently decodable construction of such codes is unknown. We show that we can lift the dual-containing constraint by employing the non-dual-containing codes with excellent performance and efficient decoding algorithms. For the second topic, we propose a construction of Calderbank-Shor-Steane (CSS) [19, 68] quantum error-correcting codes, which are originally based on pairs of mutually dual-containing classical codes, by combining a classical code with a two-universal hash function. We show, using the results of Renner and Koenig [57], that the communication rates of such codes approach the hashing bound on tensor powers of Pauli channels in the limit of large block-length. For the third topic, we prove a regularized formula for the secret key assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak on entanglement assisted quantum communication capacity. This formula provides a new family protocol, the private father protocol, under the resource inequality framework that includes the private classical communication without the assisted secret keys as a child protocol. For the fourth topic, we study and solve the problem of classical channel simulation with quantum side information at the receiver. Our main theorem has two important corollaries: rate-distortion theory with quantum side information and common randomness distillation. Simple proofs of achievability of classical multi-terminal source coding problems can be made via a unified approach using the channel simulation theorem as building blocks. The fully quantum generalization of the problem is also conjectured with outer and inner bounds on the achievable rate pairs.
Secure satellite communication using multi-photon tolerant quantum communication protocol
NASA Astrophysics Data System (ADS)
Darunkar, Bhagyashri; Punekar, Nikhil; Verma, Pramode K.
2015-09-01
This paper proposes and analyzes the potential of a multi-photon tolerant quantum communication protocol to secure satellite communication. For securing satellite communication, quantum cryptography is the only known unconditionally secure method. A number of recent experiments have shown feasibility of satellite-aided global quantum key distribution (QKD) using different methods such as: Use of entangled photon pairs, decoy state methods, and entanglement swapping. The use of single photon in these methods restricts the distance and speed over which quantum cryptography can be applied. Contemporary quantum cryptography protocols like the BB84 and its variants suffer from the limitation of reaching the distances of only Low Earth Orbit (LEO) at the data rates of few kilobits per second. This makes it impossible to develop a general satellite-based secure global communication network using the existing protocols. The method proposed in this paper allows secure communication at the heights of the Medium Earth Orbit (MEO) and Geosynchronous Earth Orbit (GEO) satellites. The benefits of the proposed method are two-fold: First it enables the realization of a secure global communication network based on satellites and second it provides unconditional security for satellite networks at GEO heights. The multi-photon approach discussed in this paper ameliorates the distance and speed issues associated with quantum cryptography through the use of contemporary laser communication (lasercom) devices. This approach can be seen as a step ahead towards global quantum communication.
Semi-counterfactual cryptography
NASA Astrophysics Data System (ADS)
Akshata Shenoy, H.; Srikanth, R.; Srinivas, T.
2013-09-01
In counterfactual quantum key distribution (QKD), two remote parties can securely share random polarization-encoded bits through the blocking rather than the transmission of particles. We propose a semi-counterfactual QKD, i.e., one where the secret bit is shared, and also encoded, based on the blocking or non-blocking of a particle. The scheme is thus semi-counterfactual and not based on polarization encoding. As with other counterfactual schemes and the Goldenberg-Vaidman protocol, but unlike BB84, the encoding states are orthogonal and security arises ultimately from single-particle non-locality. Unlike any of them, however, the secret bit generated is maximally indeterminate until the joint action of Alice and Bob. We prove the general security of the protocol, and study the most general photon-number-preserving incoherent attack in detail.
NASA Astrophysics Data System (ADS)
Brown, Justin; Woolf, David; Hensley, Joel
2016-05-01
Quantum key distribution can provide secure optical data links using the established BB84 protocol, though solar backgrounds severely limit the performance through free space. Several approaches to reduce the solar background include time-gating the photon signal, limiting the field of view through geometrical design of the optical system, and spectral rejection using interference filters. Despite optimization of these parameters, the solar background continues to dominate under daytime atmospheric conditions. We demonstrate an improved spectral filter by replacing the interference filter (Δν ~ 50 GHz) with an atomic line filter (Δν ~ 1 GHz) based on optical rotation of linearly polarized light through a warm Rb vapor. By controlling the magnetic field and the optical depth of the vapor, a spectrally narrow region can be transmitted between crossed polarizers. We find that the transmission is more complex than a single peak and evaluate peak transmission as well as a ratio of peak transmission to average transmission of the local spectrum. We compare filters containing a natural abundance of Rb with those containing isotopically pure 87 Rb and 85 Rb. A filter providing > 95 % transmission and Δν ~ 1.1 GHz is achieved.
Incompleteness and limit of security theory of quantum key distribution
NASA Astrophysics Data System (ADS)
Hirota, Osamu; Murakami, Dan; Kato, Kentaro; Futami, Fumio
2012-10-01
It is claimed in the many papers that a trace distance: d guarantees the universal composition security in quantum key distribution (QKD) like BB84 protocol. In this introduction paper, at first, it is explicitly explained what is the main misconception in the claim of the unconditional security for QKD theory. In general terms, the cause of the misunderstanding on the security claim is the Lemma in the paper of Renner. It suggests that the generation of the perfect random key is assured by the probability (1-d), and its failure probability is d. Thus, it concludes that the generated key provides the perfect random key sequence when the protocol is success. So the QKD provides perfect secrecy to the one time pad. This is the reason for the composition claim. However, the quantity of the trace distance (or variational distance) is not the probability for such an event. If d is not small enough, always the generated key sequence is not uniform. Now one needs the reconstruction of the evaluation of the trace distance if one wants to use it. One should first go back to the indistinguishability theory in the computational complexity based, and to clarify the meaning of the value of the variational distance. In addition, the same analysis for the information theoretic case is necessary. The recent serial papers by H.P.Yuen have given the answer on such questions. In this paper, we show more concise description of Yuen's theory, and clarify that the upper bound theories for the trace distance by Tomamichel et al and Hayashi et al are constructed by the wrong reasoning of Renner and it is unsuitable as the security analysis. Finally, we introduce a new macroscopic quantum communication to replace Q-bit QKD.
Expeditious reconciliation for practical quantum key distribution
NASA Astrophysics Data System (ADS)
Nakassis, Anastase; Bienfang, Joshua C.; Williams, Carl J.
2004-08-01
The paper proposes algorithmic and environmental modifications to the extant reconciliation algorithms within the BB84 protocol so as to speed up reconciliation and privacy amplification. These algorithms have been known to be a performance bottleneck 1 and can process data at rates that are six times slower than the quantum channel they serve2. As improvements in single-photon sources and detectors are expected to improve the quantum channel throughput by two or three orders of magnitude, it becomes imperative to improve the performance of the classical software. We developed a Cascade-like algorithm that relies on a symmetric formulation of the problem, error estimation through the segmentation process, outright elimination of segments with many errors, Forward Error Correction, recognition of the distinct data subpopulations that emerge as the algorithm runs, ability to operate on massive amounts of data (of the order of 1 Mbit), and a few other minor improvements. The data from the experimental algorithm we developed show that by operating on massive arrays of data we can improve software performance by better than three orders of magnitude while retaining nearly as many bits (typically more than 90%) as the algorithms that were designed for optimal bit retention.
Simple and high-speed polarization-based QKD
NASA Astrophysics Data System (ADS)
Grünenfelder, Fadri; Boaron, Alberto; Rusca, Davide; Martin, Anthony; Zbinden, Hugo
2018-01-01
We present a simplified BB84 protocol with only three quantum states and one decoy-state level. We implement this scheme using the polarization degree of freedom at telecom wavelength. Only one pulsed laser is used in order to reduce possible side-channel attacks. The repetition rate of 625 MHz and the achieved secret bit rate of 23 bps over 200 km of standard fiber are the actual state of the art.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Niederberger, Armand; Scarani, Valerio; Gisin, Nicolas
2005-04-01
In practical quantum cryptography, the source sometimes produces multiphoton pulses, thus enabling the eavesdropper Eve to perform the powerful photon-number-splitting (PNS) attack. Recently, it was shown by Curty and Luetkenhaus [Phys. Rev. A 69, 042321 (2004)] that the PNS attack is not always the optimal attack when two photons are present: if errors are present in the correlations Alice-Bob and if Eve cannot modify Bob's detection efficiency, Eve gains a larger amount of information using another attack based on a 2{yields}3 cloning machine. In this work, we extend this analysis to all distances Alice-Bob. We identify a new incoherent 2{yields}3more » cloning attack which performs better than those described before. Using it, we confirm that, in the presence of errors, Eve's better strategy uses 2{yields}3 cloning attacks instead of the PNS. However, this improvement is very small for the implementations of the Bennett-Brassard 1984 (BB84) protocol. Thus, the existence of these new attacks is conceptually interesting but basically does not change the value of the security parameters of BB84. The main results are valid both for Poissonian and sub-Poissonian sources.« less
Can the use of the Leggett-Garg inequality enhance security of the BB84 protocol?
NASA Astrophysics Data System (ADS)
Shenoy H., Akshata; Aravinda, S.; Srikanth, R.; Home, Dipankar
2017-08-01
Prima facie, there are good reasons to answer in the negative the question posed in the title: the Bennett-Brassard 1984 (BB84) protocol is provably secure subject to the assumption of trusted devices, while the Leggett-Garg-type inequality (LGI) does not seem to be readily adaptable to the device independent (DI) or semi-DI scenario. Nevertheless, interestingly, here we identify a specific device attack, which has been shown to render the standard BB84 protocol completely insecure, but against which our formulated LGI-assisted BB84 protocol (based on an appropriate form of LGI) is secure.
Attacks on quantum key distribution protocols that employ non-ITS authentication
NASA Astrophysics Data System (ADS)
Pacher, C.; Abidin, A.; Lorünser, T.; Peev, M.; Ursin, R.; Zeilinger, A.; Larsson, J.-Å.
2016-01-01
We demonstrate how adversaries with large computing resources can break quantum key distribution (QKD) protocols which employ a particular message authentication code suggested previously. This authentication code, featuring low key consumption, is not information-theoretically secure (ITS) since for each message the eavesdropper has intercepted she is able to send a different message from a set of messages that she can calculate by finding collisions of a cryptographic hash function. However, when this authentication code was introduced, it was shown to prevent straightforward man-in-the-middle (MITM) attacks against QKD protocols. In this paper, we prove that the set of messages that collide with any given message under this authentication code contains with high probability a message that has small Hamming distance to any other given message. Based on this fact, we present extended MITM attacks against different versions of BB84 QKD protocols using the addressed authentication code; for three protocols, we describe every single action taken by the adversary. For all protocols, the adversary can obtain complete knowledge of the key, and for most protocols her success probability in doing so approaches unity. Since the attacks work against all authentication methods which allow to calculate colliding messages, the underlying building blocks of the presented attacks expose the potential pitfalls arising as a consequence of non-ITS authentication in QKD post-processing. We propose countermeasures, increasing the eavesdroppers demand for computational power, and also prove necessary and sufficient conditions for upgrading the discussed authentication code to the ITS level.
Fair and optimistic quantum contract signing
NASA Astrophysics Data System (ADS)
Paunković, N.; Bouda, J.; Mateus, P.
2011-12-01
We present a fair and optimistic quantum-contract-signing protocol between two clients that requires no communication with the third trusted party during the exchange phase. We discuss its fairness and show that it is possible to design such a protocol for which the probability of a dishonest client to cheat becomes negligible and scales as N-1/2, where N is the number of messages exchanged between the clients. Our protocol is not based on the exchange of signed messages: Its fairness is based on the laws of quantum mechanics. Thus, it is abuse free, and the clients do not have to generate new keys for each message during the exchange phase. We discuss a real-life scenario when measurement errors and qubit-state corruption due to noisy channels and imperfect quantum memories occur and argue that for a real, good-enough measurement apparatus, transmission channels, and quantum memories, our protocol would still be fair. Apart from stable quantum memories, the other segments of our protocol could be implemented by today's technology, as they require in essence the same type of apparatus as the one needed for the Bennett-Brassard 1984 (BB84) cryptographic protocol. Finally, we briefly discuss two alternative versions of the protocol, one that uses only two states [based on the Bennett 1992 (B92) protocol] and the other that uses entangled pairs, and show that it is possible to generalize our protocol to an arbitrary number of clients.
Loss-tolerant quantum secure positioning with weak laser sources
NASA Astrophysics Data System (ADS)
Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George; Chitambar, Eric; Evans, Philip G.; Qi, Bing
2016-09-01
Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. Recently, it has been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit. Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. In this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.
Free-Space Quantum Communication with a Portable Quantum Memory
NASA Astrophysics Data System (ADS)
Namazi, Mehdi; Vallone, Giuseppe; Jordaan, Bertus; Goham, Connor; Shahrokhshahi, Reihaneh; Villoresi, Paolo; Figueroa, Eden
2017-12-01
The realization of an elementary quantum network that is intrinsically secure and operates over long distances requires the interconnection of several quantum modules performing different tasks. In this work, we report the realization of a communication network functioning in a quantum regime, consisting of four different quantum modules: (i) a random polarization qubit generator, (ii) a free-space quantum-communication channel, (iii) an ultralow-noise portable quantum memory, and (iv) a qubit decoder, in a functional elementary quantum network possessing all capabilities needed for quantum-information distribution protocols. We create weak coherent pulses at the single-photon level encoding polarization states |H ⟩ , |V ⟩, |D ⟩, and |A ⟩ in a randomized sequence. The random qubits are sent over a free-space link and coupled into a dual-rail room-temperature quantum memory and after storage and retrieval are analyzed in a four-detector polarization analysis akin to the requirements of the BB84 protocol. We also show ultralow noise and fully portable operation, paving the way towards memory-assisted all-environment free-space quantum cryptographic networks.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George
Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. It has recently been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here in this paper, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit.more » Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. Lastly, in this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.« less
Loss-tolerant quantum secure positioning with weak laser sources
Lim, Charles Ci Wen; Xu, Feihu; Siopsis, George; ...
2016-09-14
Quantum position verification (QPV) is the art of verifying the geographical location of an untrusted party. It has recently been shown that the widely studied Bennett & Brassard 1984 (BB84) QPV protocol is insecure after the 3 dB loss point assuming local operations and classical communication (LOCC) adversaries. Here in this paper, we propose a time-reversed entanglement swapping QPV protocol (based on measurement-device-independent quantum cryptography) that is highly robust against quantum channel loss. First, assuming ideal qubit sources, we show that the protocol is secure against LOCC adversaries for any quantum channel loss, thereby overcoming the 3 dB loss limit.more » Then, we analyze the security of the protocol in a more practical setting involving weak laser sources and linear optics. Lastly, in this setting, we find that the security only degrades by an additive constant and the protocol is able to verify positions up to 47 dB channel loss.« less
PPLN-waveguide-based polarization entangled QKD simulator
NASA Astrophysics Data System (ADS)
Gariano, John; Djordjevic, Ivan B.
2017-08-01
We have developed a comprehensive simulator to study the polarization entangled quantum key distribution (QKD) system, which takes various imperfections into account. We assume that a type-II SPDC source using a PPLN-based nonlinear optical waveguide is used to generate entangled photon pairs and implements the BB84 protocol, using two mutually unbiased basis with two orthogonal polarizations in each basis. The entangled photon pairs are then simulated to be transmitted to both parties; Alice and Bob, through the optical channel, imperfect optical elements and onto the imperfect detector. It is assumed that Eve has no control over the detectors, and can only gain information from the public channel and the intercept resend attack. The secure key rate (SKR) is calculated using an upper bound and by using actual code rates of LDPC codes implementable in FPGA hardware. After the verification of the simulation results, such as the pair generation rate and the number of error due to multiple pairs, for the ideal scenario, available in the literature, we then introduce various imperfections. Then, the results are compared to previously reported experimental results where a BBO nonlinear crystal is used, and the improvements in SKRs are determined for when a PPLN-waveguide is used instead.
On the transferability of electron density in binary vanadium borides VB, V3B4 and VB2.
Terlan, Bürgehan; Akselrud, Lev; Baranov, Alexey I; Borrmann, Horst; Grin, Yuri
2015-12-01
Binary vanadium borides are suitable model systems for a systematic analysis of the transferability concept in intermetallic compounds due to chemical intergrowth in their crystal structures. In order to underline this structural relationship, topological properties of the electron density in VB, V3B4 and VB2 reconstructed from high-resolution single-crystal X-ray diffraction data as well as derived from quantum chemical calculations, are analysed in terms of Bader's Quantum Theory of Atoms in Molecules [Bader (1990). Atoms in Molecules: A Quantum Theory, 1st ed. Oxford: Clarendon Press]. The compounds VB, V3B4 and VB2 are characterized by a charge transfer from the metal to boron together with two predominant atomic interactions, the shared covalent B-B interactions and the polar covalent B-M interactions. The resembling features of the crystal structures are well reflected by the respective B-B interatomic distances as well as by ρ(r) values at the B-B bond critical points. The latter decrease with an increase in the corresponding interatomic distances. The B-B bonds show transferable electron density properties at bond critical points depending on the respective bond distances.
Enhancing QKD security with weak measurements
NASA Astrophysics Data System (ADS)
Farinholt, Jacob M.; Troupe, James E.
2016-10-01
Publisher's Note: This paper, originally published on 10/24/2016, was replaced with a corrected/revised version on 11/8/2016. If you downloaded the original PDF but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance. In the late 1980s, Aharonov and colleagues developed the notion of a weak measurement of a quantum observable that does not appreciably disturb the system.1, 2 The measurement results are conditioned on both the pre-selected and post-selected state of the quantum system. While any one measurement reveals very little information, by making the same measurement on a large ensemble of identically prepared pre- and post-selected (PPS) states and averaging the results, one may obtain what is known as the weak value of the observable with respect to that PPS ensemble. Recently, weak measurements have been proposed as a method of assessing the security of QKD in the well-known BB84 protocol.3 This weak value augmented QKD protocol (WV-QKD) works by additionally requiring the receiver, Bob, to make a weak measurement of a particular observable prior to his strong measurement. For the subset of measurement results in which Alice and Bob's measurement bases do not agree, the weak measurement results can be used to detect any attempt by an eavesdropper, Eve, to correlate her measurement results with Bob's. Furthermore, the well-known detector blinding attacks, which are known to perfectly correlate Eve's results with Bob's without being caught by conventional BB84 implementations, actually make the eavesdropper more visible in the new WV-QKD protocol. In this paper, we will introduce the WV-QKD protocol and discuss its generalization to the 6-state single qubit protocol. We will discuss the types of weak measurements that are optimal for this protocol, and compare the predicted performance of the 6- and 4-state WV-QKD protocols.
Quantum correlations of lights in macroscopic environments
NASA Astrophysics Data System (ADS)
Sua, Yong Meng
This dissertation presents a detailed study in exploring quantum correlations of lights in macroscopic environments. We have explored quantum correlations of single photons, weak coherent states, and polarization-correlated/polarization-entangled photons in macroscopic environments. These included macroscopic mirrors, macroscopic photon number, spatially separated observers, noisy photons source and propagation medium with loss or disturbances. We proposed a measurement scheme for observing quantum correlations and entanglement in the spatial properties of two macroscopic mirrors using single photons spatial compass state. We explored the phase space distribution features of spatial compass states, such as chessboard pattern by using the Wigner function. The displacement and tilt correlations of the two mirrors were manifested through the propensities of the compass states. This technique can be used to extract Einstein-Podolsky-Rosen correlations (EPR) of the two mirrors. We then formulated the discrete-like property of the propensity P b(m,n), which can be used to explore environmental perturbed quantum jumps of the EPR correlations in phase space. With single photons spatial compass state, the variances in position and momentum are much smaller than standard quantum limit when using a Gaussian TEM 00 beam. We observed intrinsic quantum correlations of weak coherent states between two parties through balanced homodyne detection. Our scheme can be used as a supplement to decoy-state BB84 protocol and differential phase-shift QKD protocol. We prepared four types of bipartite correlations +/- cos2(theta1 +/- theta 2) that shared between two parties. We also demonstrated bits correlations between two parties separated by 10 km optical fiber. The bits information will be protected by the large quantum phase fluctuation of weak coherent states, adding another physical layer of security to these protocols for quantum key distribution. Using 10 m of highly nonlinear fiber (HNLF) at 77 K, we observed coincidence to accidental-coincidence ratio of 130+/-5 for correlated photon-pair and Two-Photon Interference visibility >98% entangled photon-pair. We also verified the non-local behavior of polarization-entangled photon pair by violating Clauser-Horne-Shimony-Holt Bell's inequality by more than 12 standard deviations. With the HNLF at 300 K (77 K), photon-pair production rate about factor 3(2) higher than a 300 m dispersion-shifted fiber is observed. Then, we studied quantum correlation and interference of photon-pairs; with one photon of the photon-pair experiencing multiple scattering in a random medium. We observed that depolarization noise photon in multiple scattering degrading the purity of photon-pair, and the existence of Raman noise photon in a photon-pair source will contribute to the depolarization affect. We found that quantum correlation of polarization-entangled photon-pair is better preserved than polarization-correlated photon-pair as one photon of the photon-pair scattered through a random medium. Our findings showed that high purity polarization-entangled photon-pair is better candidate for long distance quantum key distribution.
Comparison of Classical and Quantum Mechanical Uncertainties.
ERIC Educational Resources Information Center
Peslak, John, Jr.
1979-01-01
Comparisons are made for the particle-in-a-box, the harmonic oscillator, and the one-electron atom. A classical uncertainty principle is derived and compared with its quantum-mechanical counterpart. The results are discussed in terms of the statistical interpretation of the uncertainty principle. (Author/BB)
NASA Astrophysics Data System (ADS)
Seshadreesan, Kaushik P.; Takeoka, Masahiro; Sasaki, Masahide
2016-04-01
Device-independent quantum key distribution (DIQKD) guarantees unconditional security of a secret key without making assumptions about the internal workings of the devices used for distribution. It does so using the loophole-free violation of a Bell's inequality. The primary challenge in realizing DIQKD in practice is the detection loophole problem that is inherent to photonic tests of Bell' s inequalities over lossy channels. We revisit the proposal of Curty and Moroder [Phys. Rev. A 84, 010304(R) (2011), 10.1103/PhysRevA.84.010304] to use a linear optics-based entanglement-swapping relay (ESR) to counter this problem. We consider realistic models for the entanglement sources and photodetectors: more precisely, (a) polarization-entangled states based on pulsed spontaneous parametric down-conversion sources with infinitely higher-order multiphoton components and multimode spectral structure, and (b) on-off photodetectors with nonunit efficiencies and nonzero dark-count probabilities. We show that the ESR-based scheme is robust against the above imperfections and enables positive key rates at distances much larger than what is possible otherwise.
Min-entropy uncertainty relation for finite-size cryptography
NASA Astrophysics Data System (ADS)
Ng, Nelly Huei Ying; Berta, Mario; Wehner, Stephanie
2012-10-01
Apart from their foundational significance, entropic uncertainty relations play a central role in proving the security of quantum cryptographic protocols. Of particular interest are therefore relations in terms of the smooth min-entropy for Bennett-Brassard 1984 (BB84) and six-state encodings. The smooth min-entropy Hminɛ(X/B) quantifies the negative logarithm of the probability for an attacker B to guess X, except with a small failure probability ɛ. Previously, strong uncertainty relations were obtained which are valid in the limit of large block lengths. Here, we prove an alternative uncertainty relation in terms of the smooth min-entropy that is only marginally less strong but has the crucial property that it can be applied to rather small block lengths. This paves the way for a practical implementation of many cryptographic protocols. As part of our proof we show tight uncertainty relations for a family of Rényi entropies that may be of independent interest.
Lack of association between vitamin D receptor genotypes and osteoporosis in Koreans
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lim, Sung Kil; Park, Young Suk; Park, Jae Min
To evaluate whether common allelic variants in the gene encoding the vitamin D receptor (VDR) were useful in predicting differences in bone mineral density (BMD) and bone turnover rate in Koreans, we analyzed the restriction pattern of the polymerase chain reaction product of the VDR gene with the Bsm1 enzyme and serum osteocalcin in patients with osteoporosis. The prevalence of the BB genotype in the controls was extremely low when compared with that in other reports: the BB, Bb, and bb genotypes accounted for 1.4%, 12.9%, and 85.7%, respectively. Only 2.8% of those patients with osteoporosis had the BB genotype.more » In contrast, 12.5% had the Bb genotype, and 84.7% had the bb genotype. The prevalence of the BB genotype in patients with severe osteoporosis was also extremely low: the BB, Bb and bb genotypes accounted for 0%, 12.4%, and 87.6%, respectively. Compared with the mean serum osteocalcin level of the pre- and post-menopausal controls, the levels in patients with severe osteoporosis was higher, and this was statistically significant. As expected, a negative correlation was observed between the serum osteocalcin levels and the age-matched Z scores for spinal BMD. However, no correlation was found in the femoral neck BMD. These results suggest that restriction fragment length polymorphism analysis of the VDR gene with a Bsm1 restriction enzyme in Koreans is not helpful for early detection of patients at risk of developing osteoporosis. This is true even in patients with a high rate of bone turnover. Our data suggest extreme ethnic differences in the pattern of prevalence of the VDR allele. 19 refs., 5 figs., 2 tabs.« less
Observation of the decay B-->J/psietaK and search for X(3872)-->J/psieta.
Aubert, B; Barate, R; Boutigny, D; Couderc, F; Gaillard, J M; Hicheur, A; Karyotakis, Y; Lees, J P; Tisserand, V; Zghiche, A; Palano, A; Pompili, A; Chen, J C; Qi, N D; Rong, G; Wang, P; Zhu, Y S; Eigen, G; Ofte, I; Stugu, B; Abrams, G S; Borgland, A W; Breon, A B; Brown, D N; Button-Shafer, J; Cahn, R N; Charles, E; Day, C T; Gill, M S; Gritsan, A V; Groysman, Y; Jacobsen, R G; Kadel, R W; Kadyk, J; Kerth, L T; Kolomensky, Yu G; Kukartsev, G; LeClerc, C; Levi, M E; Lynch, G; Mir, L M; Oddone, P J; Orimoto, T J; Pripstein, M; Roe, N A; Ronan, M T; Shelkov, V G; Telnov, A V; Wenzel, W A; Ford, K; Harrison, T J; Hawkes, C M; Morgan, S E; Watson, A T; Watson, N K; Fritsch, M; Goetzen, K; Held, T; Koch, H; Lewandowski, B; Pelizaeus, M; Steinke, M; Boyd, J T; Chevalier, N; Cottingham, W N; Kelly, M P; Latham, T E; Wilson, F F; Abe, K; Cuhadar-Donszelmann, T; Hearty, C; Mattison, T S; McKenna, J A; Thiessen, D; Kyberd, P; Teodorescu, L; Blinov, V E; Bukin, A D; Druzhinin, V P; Golubev, V B; Ivanchenko, V N; Kravchenko, E A; Onuchin, A P; Serednyakov, S I; Skovpen, Yu I; Solodov, E P; Yushkov, A N; Best, D; Bruinsma, M; Chao, M; Eschrich, I; Kirkby, D; Lankford, A J; Mandelkern, M; Mommsen, R K; Roethel, W; Stoker, D P; Buchanan, C; Hartfiel, B L; Gary, J W; Shen, B C; Wang, K; del Re, D; Hadavand, H K; Hill, E J; MacFarlane, D B; Paar, H P; Rahatlou, Sh; Sharma, V; Berryhill, J W; Campagnari, C; Dahmes, B; Levy, S L; Long, O; Lu, A; Mazur, M A; Richman, J D; Verkerke, W; Beck, T W; Eisner, A M; Heusch, C A; Lockman, W S; Schalk, T; Schmitz, R E; Schumm, B A; Seiden, A; Spradlin, P; Williams, D C; Wilson, M G; Albert, J; Chen, E; Dubois-Felsmann, G P; Dvoretskii, A; Hitlin, D G; Narsky, I; Piatenko, T; Porter, F C; Ryd, A; Samuel, A; Yang, S; Jayatilleke, S; Mancinelli, G; Meadows, B T; Sokoloff, M D; Abe, T; Blanc, F; Bloom, P; Chen, S; Clark, P J; Ford, W T; Nauenberg, U; Olivas, A; Rankin, P; Smith, J G; van Hoek, W C; Zhang, L; Harton, J L; Hu, T; Soffer, A; Toki, W H; Wilson, R J; Zeng, Q; Altenburg, D; Brandt, T; Brose, J; Colberg, T; Dickopp, M; Feltresi, E; Hauke, A; Lacker, H M; Maly, E; Müller-Pfefferkorn, R; Nogowski, R; Otto, S; Schubert, J; Schubert, K R; Schwierz, R; Spaan, B; Bernard, D; Bonneaud, G R; Brochard, F; Grenier, P; Thiebaux, Ch; Vasileiadis, G; Verderi, M; Bard, D J; Khan, A; Lavin, D; Muheim, F; Playfer, S; Andreotti, M; Azzolini, V; Bettoni, D; Bozzi, C; Calabrese, R; Cibinetto, G; Luppi, E; Negrini, M; Sarti, A; Treadwell, E; Baldini-Ferroli, R; Calcaterra, A; de Sangro, R; Finocchiaro, G; Patteri, P; Piccolo, M; Zallo, A; Buzzo, A; Capra, R; Contri, R; Crosetti, G; Lo Vetere, M; Macri, M; Monge, M R; Passaggio, S; Patrignani, C; Robutti, E; Santroni, A; Tosi, S; Bailey, S; Brandenburg, G; Morii, M; Won, E; Dubitzky, R S; Langenegger, U; Bhimji, W; Bowerman, D A; Dauncey, P D; Egede, U; Gaillard, J R; Morton, G W; Nash, J A; Taylor, G P; Grenier, G J; Lee, S J; Mallik, U; Cochran, J; Crawley, H B; Lamsa, J; Meyer, W T; Prell, S; Rosenberg, E I; Yi, J; Davier, M; Grosdidier, G; Höcker, A; Laplace, S; Le Diberder, F; Lepeltier, V; Lutz, A M; Petersen, T C; Plaszczynski, S; Schune, M H; Tantot, L; Wormser, G; Cheng, C H; Lange, D J; Simani, M C; Wright, D M; Bevan, A J; Coleman, J P; Fry, J R; Gabathuler, E; Gamet, R; Kay, M; Parry, R J; Payne, D J; Sloane, R J; Touramanis, C; Back, J J; Harrison, P F; Mohanty, G B; Brown, C L; Cowan, G; Flack, R L; Flaecher, H U; George, S; Green, M G; Kurup, A; Marker, C E; McMahon, T R; Ricciardi, S; Salvatore, F; Vaitsas, G; Winter, M A; Brown, D; Davis, C L; Allison, J; Barlow, N R; Barlow, R J; Hart, P A; Hodgkinson, M C; Lafferty, G D; Lyon, A J; Williams, J C; Farbin, A; Hulsbergen, W D; Jawahery, A; Kovalskyi, D; Lae, C K; Lillard, V; Roberts, D A; Blaylock, G; Dallapiccola, C; Flood, K T; Hertzbach, S S; Kofler, R; Koptchev, V B; Moore, T B; Saremi, S; Staengle, H; Willocq, S; Cowan, R; Sciolla, G; Taylor, F; Yamamoto, R K; Mangeol, D J J; Patel, P M; Robertson, S H; Lazzaro, A; Palombo, F; Bauer, J M; Cremaldi, L; Eschenburg, V; Godang, R; Kroeger, R; Reidy, J; Sanders, D A; Summers, D J; Zhao, H W; Brunet, S; Côté, D; Taras, P; Nicholson, H; Cartaro, C; Cavallo, N; Fabozzi, F; Gatto, C; Lista, L; Monorchio, D; Paolucci, P; Piccolo, D; Sciacca, C; Baak, M; Raven, G; Wilden, L; Jessop, C P; LoSecco, J M; Gabriel, T A; Allmendinger, T; Brau, B; Gan, K K; Honscheid, K; Hufnagel, D; Kagan, H; Kass, R; Pulliam, T; Ter-Antonyan, R; Wong, Q K; Brau, J; Frey, R; Igonkina, O; Potter, C T; Sinev, N B; Strom, D; Torrence, E; Colecchia, F; Dorigo, A; Galeazzi, F; Margoni, M; Morandin, M; Posocco, M; Rotondo, M; Simonetto, F; Stroili, R; Tiozzo, G; Voci, C; Benayoun, M; Briand, H; Chauveau, J; David, P; de la Vaissière, Ch; Del Buono, L; Hamon, O; John, M J J; Leruste, Ph; Ocariz, J; Pivk, M; Roos, L; T'Jampens, S; Therin, G; Manfredi, P F; Re, V; Behera, P K; Gladney, L; Guo, Q H; Panetta, J; Anulli, F; Biasini, M; Peruzzi, I M; Pioppi, M; Angelini, C; Batignani, G; Bettarini, S; Bondioli, M; Bucci, F; Calderini, G; Carpinelli, M; Del Gamba, V; Forti, F; Giorgi, M A; Lusiani, A; Marchiori, G; Martinez-Vidal, F; Morganti, M; Neri, N; Paoloni, E; Rama, M; Rizzo, G; Sandrelli, F; Walsh, J; Haire, M; Judd, D; Paick, K; Wagoner, D E; Danielson, N; Elmer, P; Lu, C; Miftakov, V; Olsen, J; Smith, A J S; Varnes, E W; Bellini, F; Cavoto, G; Faccini, R; Ferrarotto, F; Ferroni, F; Gaspero, M; Li Gioi, L; Mazzoni, M A; Morganti, S; Pierini, M; Piredda, G; Tehrani, F Safai; Voena, C; Christ, S; Wagner, G; Waldi, R; Adye, T; De Groot, N; Franek, B; Geddes, N I; Gopal, G P; Olaiya, E O; Xella, S M; Aleksan, R; Emery, S; Gaidot, A; Ganzhur, S F; Giraud, P F; Hamel de Monchenault, G; Kozanecki, W; Langer, M; Legendre, M; London, G W; Mayer, B; Schott, G; Vasseur, G; Yèche, Ch; Zito, M; Purohit, M V; Weidemann, A W; Yumiceva, F X; Aston, D; Bartoldus, R; Berger, N; Boyarski, A M; Buchmueller, O L; Convery, M R; Cristinziani, M; De Nardo, G; Dong, D; Dorfan, J; Dujmic, D; Dunwoodie, W; Elsen, E E; Field, R C; Glanzman, T; Gowdy, S J; Hadig, T; Halyo, V; Hryn'ova, T; Innes, W R; Kelsey, M H; Kim, P; Kocian, M L; Leith, D W G S; Libby, J; Luitz, S; Luth, V; Lynch, H L; Marsiske, H; Messner, R; Muller, D R; O'Grady, C P; Ozcan, V E; Perazzo, A; Perl, M; Petrak, S; Ratcliff, B N; Roodman, A; Salnikov, A A; Schindler, R H; Schwiening, J; Simi, G; Snyder, A; Soha, A; Stelzer, J; Su, D; Sullivan, M K; Va'vra, J; Wagner, S R; Weaver, M; Weinstein, A J R; Wisniewski, W J; Wittgen, M; Wright, D H; Young, C C; Burchat, P R; Edwards, A J; Meyer, T I; Petersen, B A; Roat, C; Ahmed, S; Alam, M S; Ernst, J A; Saeed, M A; Saleem, M; Wappler, F R; Bugg, W; Krishnamurthy, M; Spanier, S M; Eckmann, R; Kim, H; Ritchie, J L; Satpathy, A; Schwitters, R F; Izen, J M; Kitayama, I; Lou, X C; Ye, S; Bianchi, F; Bona, M; Gallo, F; Gamba, D; Borean, C; Bosisio, L; Cossutti, F; Della Ricca, G; Dittongo, S; Grancagnolo, S; Lanceri, L; Poropat, P; Vitale, L; Vuagnin, G; Panvini, R S; Banerjee, Sw; Brown, C M; Fortin, D; Jackson, P D; Kowalewski, R; Roney, J M; Band, H R; Dasu, S; Datta, M; Eichenbaum, A M; Hollar, J J; Johnson, J R; Kutter, P E; Li, H; Liu, R; Di Lodovico, F; Mihalyi, A; Mohapatra, A K; Pan, Y; Prepost, R; Sekula, S J; Tan, P; von Wimmersperg-Toeller, J H; Wu, J; Wu, S L; Yu, Z; Neal, H
2004-07-23
We report the observation of the B meson decay B+/- -->J/psietaK+/- and evidence for the decay B0-->J/psietaK0S, using 90 x 10(6) BB; events collected at the Upsilon(4S) resonance with the BABAR detector at the SLAC PEP-II e+e- asymmetric-energy storage ring. We obtain branching fractions of B(B+/- -->J/psietaK+/-) = [10.8 +/- 2.3(stat) +/- 2.4(syst)] x 10(-5) and B(B0-->J/psietaK0S) = [8.4 +/- 2.6(stat) +/- 2.7(syst)] x 10(-5). We search for the new narrow mass state, the X(3872), recently reported by the Belle Collaboration, in the decay B+/- -->X(3872)K+/-,X(3872)-->J/psieta and determine an upper limit of B[B +/- -->X(3872)K+/- -->J/psietaK+/-] < 7.7 x 10(-6) at 90% confidence level. Copyright 2004 The American Physical Society
Electromagnetic Showers at High Energy
ERIC Educational Resources Information Center
Loos, J. S.; Dawson, S. L.
1978-01-01
Some of the properties of electromagnetic showers observed in an experimental study are illustrated. Experimental data and results from quantum electrodynamics are discussed. Data and theory are compared using computer simulation. (BB)
Cholankeril, George; Yoo, Eric R; Perumpail, Ryan B; Liu, Andy; Sandhu, Jeevin S; Nair, Satheesh; Hu, Menghan; Ahmed, Aijaz
2017-09-26
We aim to study the impact of the baby boomer (BB) generation, a birth-specific cohort (born 1945-1965) on hepatocellular carcinoma (HCC)-related liver transplantation (LT) in patients with chronic hepatitis C virus (HCV), alcoholic liver disease (ALD), and non-alcoholic steatohepatitis (NASH). We performed a retrospective analysis using the United Network for Organ Sharing (UNOS)/Organ Procurement Transplant Network (OPTN) database from 2003 to 2014 to compare HCC-related liver transplant surgery trends between two cohorts-the BB and non-BB-with a secondary diagnosis of HCV, ALD, or NASH. From 2003-2014, there were a total of 8313 liver transplant recipients for the indication of HCC secondary to HCV, ALD, or NASH. Of the total, 6658 (80.1%) HCC-related liver transplant recipients were BB. The number of liver transplant surgeries for the indication of HCC increased significantly in NASH (+1327%), HCV (+382%), and ALD (+286%) during the study period. The proportion of BB who underwent LT for HCC was the highest in HCV (84.7%), followed by NASH (70.3%) and ALD (64.7%). The recommendations for birth-cohort specific HCV screening stemmed from a greater understanding of the high prevalence of chronic HCV and HCV-related HCC within BB. The rising number of HCC-related LT among BB with ALD and NASH suggests the need for increased awareness and improved preventative screening/surveillance measures within NASH and ALD cohorts as well.
Abi Khalil, Charbel; AlHabib, Khalid F; Singh, Rajvir; Asaad, Nidal; Alfaleh, Hussam; Alsheikh-Ali, Alawi A; Sulaiman, Kadhim; Alshamiri, Mostafa; Alshaer, Fayez; AlMahmeed, Wael; Al Suwaidi, Jassim
2017-12-20
The prognostic impact of β-blockers (BB) in acute coronary syndrome (ACS) patients without heart failure (HF) or left ventricular dysfunction is controversial, especially in the postreperfusion era. We sought to determine whether a BB therapy before admission for ACS has a favorable in-hospital outcome in patients without HF, and whether they also reduce 12-month mortality if still prescribed on discharge. The GULF-RACE 2 (Gulf Registry of Acute Coronary Events-2) is a prospective multicenter study of ACS in 6 Middle Eastern countries. We studied in-hospital cardiovascular events in patients hospitalized for ACS without HF in relation to BB on admission, and 1-year mortality in relation to BB on discharge. Among the 7903 participants, 7407 did not have HF, of whom 5937 (80.15%) patients were on BB. Patients on BB tended to be older and have more comorbidities. However, they had a lower risk of in-hospital mortality, mitral regurgitation, HF, cardiogenic shock, and ventricular tachycardia/ventricular fibrillation. Furthermore, 4208 patients were discharged alive and had an ejection fraction ≥40%. Among those, 84.1% had a BB prescription. At 12 months, they also had a reduced risk of mortality as compared with the non-BB group. Even after correcting for confounding factors in 2 different models, in-hospital and 12-month mortality risk was still lower in the BB group. In this cohort of ACS, BB therapy before admission for ACS is associated with decreased in-hospital mortality and major cardiovascular events, and 1-year mortality in patients without HF or left ventricular dysfunction if still prescribed on discharge. © 2017 The Authors. Published on behalf of the American Heart Association, Inc., by Wiley.
Magnetic Field Effects on In-Medium ϒ Dissociation
NASA Astrophysics Data System (ADS)
Hoelck, Johannes; Nendzig, Felix; Wolschin, Georg
2017-12-01
The electromagnetic fields during relativistic heavy ion collisions are calculated using a simple model which characterises the emerging quark-gluon medium by its conductivity only. An estimate of the average magnetic field strength experienced by the bb¯ mesons produced in the collision is made. In a sufficiently strong magnetic field, the individual spins of bb¯ mesons can align with the field leading to quantum mixing of the singlet and triplet spin configurations. The extent of this intermixture, however, is found to be negligible at field strengths occurring in heavy ion collisions at LHC energies.
On-Orbit Operation and Performance of MODIS Blackbody
NASA Technical Reports Server (NTRS)
Xiong, X.; Chang, T.; Barnes, W.
2009-01-01
MODIS collects data in 36 spectral bands, including 20 reflective solar bands (RSB) and 16 thermal emissive bands (TES). The TEB on-orbit calibration is performed on a scan-by-scan basis using a quadratic algorithm that relates the detector response with the calibration radiance from the sensor on-board blackbody (BB). The calibration radiance is accurately determined each scan from the BB temperature measured using a set of 12 thermistors. The BB thermistors were calibrated pre-launch with traceability to the NIST temperature standard. Unlike many heritage sensors, the MODIS BB can be operated at a constant temperature or with the temperature continuously varying between instrument ambient (about 270K) and 315K. In this paper, we provide an overview of both Terra and Aqua MODIS on-board BB operations, functions, and on-orbit performance. We also examine the impact of key calibration parameters, such as BB emissivity and temperature (stability and gradient) determined from its thermistors, on the TEB calibration and Level I (LIB) data product uncertainty.
A Cryptographic SoC for Robust Protection of Secret Keys in IPTV DRM Systems
NASA Astrophysics Data System (ADS)
Lee, Sanghan; Yang, Hae-Yong; Yeom, Yongjin; Park, Jongsik
The security level of an internet protocol television (IPTV) digital right management (DRM) system ultimately relies on protection of secret keys. Well known devices for the key protection include smartcards and battery backup SRAMs (BB-SRAMs); however, these devices could be vulnerable to various physical attacks. In this paper, we propose a secure and cost-effective design of a cryptographic system on chip (SoC) that integrates the BB-SRAM with a cell-based design technique. The proposed SoC provides robust safeguard against the physical attacks, and satisfies high-speed and low-price requirements of IPTV set-top boxes. Our implementation results show that the maximum encryption rate of the SoC is 633Mb/s. In order to verify the data retention capabilities, we made a prototype chip using 0.18µm standard cell technology. The experimental results show that the integrated BB-SRAM can reliably retain data with a 1.4µA leakage current.
Almeida-Reis, Rafael; Theodoro-Junior, Osmar A; Oliveira, Bruno T M; Oliva, Leandro V; Toledo-Arruda, Alessandra C; Bonturi, Camila R; Brito, Marlon V; Lopes, Fernanda D T Q S; Prado, Carla M; Florencio, Ariana C; Martins, Mílton A; Owen, Caroline A; Leick, Edna A; Oliva, Maria L V; Tibério, Iolanda F L C
2017-01-01
Background. Proteinases play a key role in emphysema. Bauhinia bauhinioides cruzipain inhibitor (BbCI) is a serine-cysteine proteinase inhibitor. We evaluated BbCI treatment in elastase-induced pulmonary alterations. Methods. C57BL / 6 mice received intratracheal elastase (ELA group) or saline (SAL group). One group of mice was treated with BbCI (days 1, 15, and 21 after elastase instillation, ELABC group). Controls received saline and BbCI (SALBC group). After 28 days, we evaluated respiratory mechanics, exhaled nitric oxide, and bronchoalveolar lavage fluid. In lung tissue we measured airspace enlargement, quantified neutrophils, TNF α -, MMP-9-, MMP-12-, TIMP-1-, iNOS-, and eNOS-positive cells, 8-iso-PGF2 α , collagen, and elastic fibers in alveolar septa and airways. MUC-5-positive cells were quantified only in airways. Results. BbCI reduced elastase-induced changes in pulmonary mechanics, airspace enlargement and elastase-induced increases in total cells, and neutrophils in BALF. BbCI reduced macrophages and neutrophils positive cells in alveolar septa and neutrophils and TNF α -positive cells in airways. BbCI attenuated elastic and collagen fibers, MMP-9- and MMP-12-positive cells, and isoprostane and iNOS-positive cells in alveolar septa and airways. BbCI reduced MUC5ac-positive cells in airways. Conclusions. BbCI improved lung mechanics and reduced lung inflammation and airspace enlargement and increased oxidative stress levels induced by elastase. BbCI may have therapeutic potential in chronic obstructive pulmonary disease.
Theodoro-Junior, Osmar A.; Oliveira, Bruno T. M.; Oliva, Leandro V.; Toledo-Arruda, Alessandra C.; Bonturi, Camila R.; Brito, Marlon V.; Prado, Carla M.; Florencio, Ariana C.; Martins, Mílton A.; Owen, Caroline A.; Oliva, Maria L. V.
2017-01-01
Background. Proteinases play a key role in emphysema. Bauhinia bauhinioides cruzipain inhibitor (BbCI) is a serine-cysteine proteinase inhibitor. We evaluated BbCI treatment in elastase-induced pulmonary alterations. Methods. C57BL/6 mice received intratracheal elastase (ELA group) or saline (SAL group). One group of mice was treated with BbCI (days 1, 15, and 21 after elastase instillation, ELABC group). Controls received saline and BbCI (SALBC group). After 28 days, we evaluated respiratory mechanics, exhaled nitric oxide, and bronchoalveolar lavage fluid. In lung tissue we measured airspace enlargement, quantified neutrophils, TNFα-, MMP-9-, MMP-12-, TIMP-1-, iNOS-, and eNOS-positive cells, 8-iso-PGF2α, collagen, and elastic fibers in alveolar septa and airways. MUC-5-positive cells were quantified only in airways. Results. BbCI reduced elastase-induced changes in pulmonary mechanics, airspace enlargement and elastase-induced increases in total cells, and neutrophils in BALF. BbCI reduced macrophages and neutrophils positive cells in alveolar septa and neutrophils and TNFα-positive cells in airways. BbCI attenuated elastic and collagen fibers, MMP-9- and MMP-12-positive cells, and isoprostane and iNOS-positive cells in alveolar septa and airways. BbCI reduced MUC5ac-positive cells in airways. Conclusions. BbCI improved lung mechanics and reduced lung inflammation and airspace enlargement and increased oxidative stress levels induced by elastase. BbCI may have therapeutic potential in chronic obstructive pulmonary disease. PMID:28466019
Zhang, Zhihong; Guo, Chuanpan; Zhang, Shuai; He, Linghao; Wang, Minghua; Peng, Donglai; Tian, Junfeng; Fang, Shaoming
2017-03-15
We synthesized two kinds of carbon-based nanocomposites of silver nanoclusters (AgNCs). An aptamer for targeted platelet-derived growth factor-BB (PDGF-BB) detection was used as the organic phase to produce AgNCs@Apt, three dimensional reduced graphene oxide@AgNCs@Aptamer (3D-rGO@AgNCs@Apt), and graphene quantum dots@AgNCs@Aptamer (GQD@AgNCs@Apt) nanocomposites. The formation mechanism of the developed nanocomposites was described by detailed characterizations of their chemical and crystal structures. Subsequently, the as-synthesized nanoclusters containing aptamer strands were applied as the sensitive layers to fabricate a novel electrochemical aptasensor for the detection of PDGF-BB, which may be directly used to determine the target protein. Electrochemical impedance spectra showed that the developed 3D-rGO@AgNCs@Apt-based biosensor exhibited the highest sensitivity for PDGF-BB detection among three kinds of fabricated aptasensors, with an extremely low detection limit of 0.82pgmL -1 . In addition, the 3D-rGO@AgNCs@Apt-based biosensor showed high selectivity, stability, and applicability for the detection of PDGF-BB. This finding indicated that the AgNC-based nanocomposites prepared by a one-step method could be used as an electrochemical biosensor for various detection procedures in the biomedical field. Copyright © 2016 Elsevier B.V. All rights reserved.
Wang, Dong; Wang, Qingjie; Yan, Gaoliang; Qiao, Yong; Tang, Chengchun
2015-05-01
Abnormal vascular smooth muscle cell proliferation and migration are key factors in many cardiovascular diseases. Here, we investigated the effects of phloretin on platelet-derived growth factor homodimer (PDGF-BB)-induced rat aortic smooth muscle cell (RASMC) proliferation, migration, and neointimal formation after carotid injury. Phloretin significantly inhibited the PDGF-BB-stimulated RASMC proliferation in a concentration-dependent manner (10-100 μM). Also, PDGF-BB-stimulated RASMC migration was inhibited by phloretin at 50 μM. Pretreating RASMC with phloretin dose-dependently inhibited PDGF-BB-induced Akt and p38 mitogen-activated protein kinases activation. Furthermore, phloretin increased p27 and decreased cyclin-dependent kinase 2, CDK4 expression, and p-Rb activation in PDGF-BB-stimulated RASMC in a concentration-dependent manner (10-50 μM). PDGF-BB-induced cell adhesion molecules and matrix metalloproteinase-9 expression were blocked by phloretin at 50 μM. Preincubation with phloretin dose-dependently reduced the intracellular reactive oxygen species production. In vivo study showed that phloretin (20 mg/kg) significantly reduced neointimal formation 14 days after carotid injury in rats. Thus, phloretin may have potential as a treatment against atherosclerosis and restenosis after vascular injury.
Cholankeril, George; Perumpail, Ryan B.; Liu, Andy; Sandhu, Jeevin S.; Nair, Satheesh; Hu, Menghan; Ahmed, Aijaz
2017-01-01
We aim to study the impact of the baby boomer (BB) generation, a birth-specific cohort (born 1945–1965) on hepatocellular carcinoma (HCC)-related liver transplantation (LT) in patients with chronic hepatitis C virus (HCV), alcoholic liver disease (ALD), and non-alcoholic steatohepatitis (NASH). We performed a retrospective analysis using the United Network for Organ Sharing (UNOS)/Organ Procurement Transplant Network (OPTN) database from 2003 to 2014 to compare HCC-related liver transplant surgery trends between two cohorts—the BB and non-BB—with a secondary diagnosis of HCV, ALD, or NASH. From 2003–2014, there were a total of 8313 liver transplant recipients for the indication of HCC secondary to HCV, ALD, or NASH. Of the total, 6658 (80.1%) HCC-related liver transplant recipients were BB. The number of liver transplant surgeries for the indication of HCC increased significantly in NASH (+1327%), HCV (+382%), and ALD (+286%) during the study period. The proportion of BB who underwent LT for HCC was the highest in HCV (84.7%), followed by NASH (70.3%) and ALD (64.7%). The recommendations for birth-cohort specific HCV screening stemmed from a greater understanding of the high prevalence of chronic HCV and HCV-related HCC within BB. The rising number of HCC-related LT among BB with ALD and NASH suggests the need for increased awareness and improved preventative screening/surveillance measures within NASH and ALD cohorts as well. PMID:28954412
Daniels, Timothy R; Younger, Alastair S E; Penner, Murray J; Wing, Kevin J; Le, Ian L D; Russell, Iain S; Lalonde, Karl-André; Evangelista, Peter T; Quiton, Jovelyn D; Glazebrook, Mark; DiGiovanni, Christopher W
2015-07-01
Ankle and hindfoot arthrodesis is often supplemented with autograft to promote bony union. Autograft harvest can lead to increased perioperative morbidity. Purified recombinant human platelet-derived growth factor BB homodimer (rhPDGF-BB) has stimulated bone formation in mandibular defects and hindfoot fusion. This randomized controlled trial evaluated the efficacy and safety of rhPDGF-BB combined with an injectable, osteoconductive beta-tricalcium phosphate (β-TCP)-collagen matrix versus autograft in ankle and hindfoot fusions. Seventy-five patients requiring ankle or hindfoot fusion were randomized 5:1 for rhPDGF-BB/β-TCP-collagen (treatment, n = 63) or autograft (control, n = 12). Prospective analysis included 142 autograft control subjects from another clinical trial with identical study protocols. Standardized operative and postoperative protocols were used. Patients underwent standard internal fixation augmented with autograft or 0.3 mg/mL rhPDGF-BB/β-TCP-collagen. Radiologic, clinical, and quality-of-life outcomes were assessed over 52 weeks. Primary outcome was joint fusion (50% or more osseous bridging on computed tomography) at 24 weeks. Secondary outcomes included radiographs, clinical healing status, visual analog scale pain score, American Orthopaedic Foot & Ankle Society Ankle-Hindfoot Scale score, Foot Function Index score, and Short Form-12 score. Noninferiority P values were calculated. Complete fusion of all involved joints at 24 weeks as indicated by computed tomography was achieved in 53 of 63 (84%) rhPDGF-BB/β-TCP-collagen-treated patients and 100 of 154 (65%) autograft-treated patients (P < .001). Mean time to fusion was 14.3 ± 8.9 weeks for rhPDGF-BB/β-TCP-collagen patients versus 19.7 ± 11.5 weeks for autograft patients (P < .01). Clinical success at 52 weeks was achieved in 57 of 63 (91%) rhPDGF-BB/β-TCP-collagen patients and 120 of 154 (78%) autograft patients (P < .001). Safety-related outcomes were equivalent. Autograft controls had 2 bone graft harvest infections. Application of rhPDGF-BB/β-TCP-collagen was a safe, effective alternative to autograft for ankle and hindfoot fusions, eliminating the pain and morbidity associated with autograft harvesting. Level I, prospective randomized study. © The Author(s) 2015.
NASA Astrophysics Data System (ADS)
Lee, Chung-Te; Chuang, Ming-Tung; Lin, Neng-Huei; Wang, Jia-Lin; Sheu, Guey-Rong; Chang, Shuenn-Chin; Wang, Sheng-Hsiang; Huang, Hill; Chen, Horng-Wen; Liu, Yuan-Liang; Weng, Guo-Hau; Lai, Hsin-Yo; Hsu, Shao-Peng
2011-10-01
Biomass burning (BB) in Southeast Asia (Indochina and southern China) occurs frequently in March and April every year. The burning plume is ordinarily transported eastward by the prevailing westerly, further affecting downstream air quality in East Asia. In this study, atmospheric aerosols were collected at the downstream Lulin Atmospheric Background Station (LABS, 2862 m a.s.l., central Taiwan) from April 2003 to April 2009. Results show that monthly means of PM2.5 were highest during the BB period, especially in March. The PM2.5 mean for BB activity was 17.5 μg m-3, while the daily PM2.5 mean can sometimes be above 40 μg m-3. The background PM2.5 level in free troposphere of the West Pacific was at 3.7 ± 1.8 μg m-3. This mean is roughly the same regardless of the air masses moving from China, Pacific Ocean, and South China Sea toward LABS. In addition, the highest PM2.5 level occurred in 2004, making it the most active year of BB for the whole observation period. Greater amounts of nitrate and potassium ions were observed in the PM2.5 collected during the BB period compared to the non-BB (NBB) period. Linear regression analysis on PM2.5 water-soluble ions shows a moderate correlation (R2 = 0.59) between non-sea-salt potassium and nitrate ions during the BB period. Furthermore, for all trajectory source origins, ammonium ion had the best correlation (R2 = 0.84) with non-sea-salt sulfate when the air masses were influenced by anthropogenic sources during the NBB period. The enhancement ratios of nitrate ion during the BB period could reach 6.7 and 9.7 relative to air masses from the BB source region and from the pristine area during the NBB period, respectively. During the study period, ammonia gas was found to be insufficient to neutralize sulfuric and nitric gases. Therefore, most aerosols were more acidic than basic. Our long-term observation of atmospheric aerosols with inter-annual variability is valuable in providing data for verifying BB source inventory and model performance in East Asia.
NASA Astrophysics Data System (ADS)
Lütkenhaus, N.; Shields, A. J.
2009-04-01
Quantum cryptography, and especially quantum key distribution (QKD), is steadily progressing to become a viable tool for cryptographic services. In recent years we have witnessed a dramatic increase in the secure bit rate of QKD, as well as its extension to ever longer fibre- and air-based links and the emergence of metro-scale trusted networks. In the foreseeable future even global-scale communications may be possible using quantum repeaters or Earth-satellite links. A handful of start-ups and some bigger companies are already active in the field. The launch of an initiative to form industrial standards for QKD, under the auspices of the European Telecommunication Standards Institute, described in the paper by Laenger and Lenhart in this Focus Issue, can be taken as a sign of the growing commercial interest. Recent progress has seen an increase in the secure bit rate of QKD links, by orders of magnitude, to over 1 Mb s-1. This has resulted mainly from an improvement in the detection technology. Here changes in the way conventional semiconductor detectors are gated, as well as the development of novel devices based on non-linear processes and superconducting materials, are leading the way. Additional challenges for QKD at GHz clock rates include the design of high speed electronics, remote synchronization and high rate random number generation. Substantial effort is being devoted to increasing the range of individual links, which is limited by attenuation and other losses in optical fibres and air links. An important advance in the past few years has been the introduction of protocols with the same scaling as an ideal single-photon set-up. The good news is that these schemes use standard optical devices, such as weak laser pulses. Thanks to these new protocols and improvements in the detection technology, the range of a single fibre link can exceed a few hundred km. Outstanding issues include proving the unconditional security of some of the schemes. Much of the work done to date relates to point-to-point links. Another recent advance has been the development of trusted networks for QKD. This is important for further increasing the range of the technology, and for overcoming denial-of-service attacks on an individual link. It is interesting to see that the optimization of QKD devices differs for point-to-point and network applications. Network operation is essential for widespread adoption of the technology, as it can dramatically reduce the deployment costs and allow connection flexibility. Also important is the multiplexing of the quantum signals with conventional network traffic. For the future, quantum repeaters should be developed for longer range links. On the theoretical side, different approaches to security proofs have recently started to converge, offering several paradigms of the same basic idea. Our improved theoretical understanding places more stringent demands on the QKD devices. We are aware by now that finite size effects in key generation arise not only from parameter estimation. It will not be possible to generate a key from just a few hundred received signals. It is a stimulating challenge for the theory of security proofs to develop lean proof strategies that work with finite signal block sizes. As QKD advances to a real-world cryptographic solution, side channel attacks must be carefully analysed. Theoretical security proofs for QKD schemes are so far based on physical models of these devices. It is in the nature of models that any real implementation will deviate from this model, creating a potential weakness for an eavesdropper to exploit. There are two solutions to this problem: the traditional path of refining the models to reduce the deviations, or the radically different approach of device-independent security proofs, in which none or only a few well controlled assumptions about the devices are made. Clearly, it is desirable to find security proofs that require only minimal or fairly general model descriptions and are based on observable tests during the run of QKD sessions. It is now 25 years since the first proposal for QKD was published and 20 since the first experimental realization. The intervening years have brought several technological and theoretical advances, which have driven new insights into the application of quantum theory to the wider field of information technology. We are looking forward to the new twists and turns this field will take in the next 25 years! Focus on Quantum Cryptography: Theory and Practice Contents Security of continuous-variable quantum key distribution: towards a de Finetti theorem for rotation symmetry in phase space A Leverrier, E Karpov, P Grangier and N J Cerf Optical networking for quantum key distribution and quantum communications T E Chapuran, P Toliver, N A Peters, J Jackel, M S Goodman, R J Runser, S R McNown, N Dallmann, R J Hughes, K P McCabe, J E Nordholt, C G Peterson, K T Tyagi, L Mercer and H Dardy Proof-of-concept of real-world quantum key distribution with quantum frames I Lucio-Martinez, P Chan, X Mo, S Hosier and W Tittel Composability in quantum cryptography Jörn Müller-Quade and Renato Renner Distributed authentication for randomly compromised networks Travis R Beals, Kevin P Hynes and Barry C Sanders Feasibility of 300 km quantum key distribution with entangled states Thomas Scheidl, Rupert Ursin, Alessandro Fedrizzi, Sven Ramelow, Xiao-Song Ma, Thomas Herbst, Robert Prevedel, Lothar Ratschbacher, Johannes Kofler, Thomas Jennewein and Anton Zeilinger Decoy-state quantum key distribution with both source errors and statistical fluctuations Xiang-Bin Wang, Lin Yang, Cheng-Zhi Peng and Jian-Wei Pan High rate, long-distance quantum key distribution over 250 km of ultra low loss fibres D Stucki, N Walenta, F Vannel, R T Thew, N Gisin, H Zbinden, S Gray, C R Towery and S Ten Topological optimization of quantum key distribution networks R Alléaume, F Roueff, E Diamanti and N Lütkenhaus The SECOQC quantum key distribution network in Vienna M Peev, C Pacher, R Alléaume, C Barreiro, J Bouda, W Boxleitner, T Debuisschert, E Diamanti, M Dianati, J F Dynes, S Fasel, S Fossier, M Fürst, J-D Gautier, O Gay, N Gisin, P Grangier, A Happe, Y Hasani, M Hentschel, H Hübel, G Humer, T Länger, M Legré, R Lieger, J Lodewyck, T Lorünser, N Lütkenhaus, A Marhold, T Matyus, O Maurhart, L Monat, S Nauerth, J-B Page, A Poppe, E Querasser, G Ribordy, S Robyr, L Salvail, A W Sharpe, A J Shields, D Stucki, M Suda, C Tamas, T Themel, R T Thew, Y Thoma, A Treiber, P Trinkler, R Tualle-Brouri, F Vannel, N Walenta, H Weier, H Weinfurter, I Wimberger, Z L Yuan, H Zbinden and A Zeilinger Stable quantum key distribution with active polarization control based on time-division multiplexing J Chen, G Wu, L Xu, X Gu, E Wu and H Zeng Controlling passively quenched single photon detectors by bright light Vadim Makarov Information leakage via side channels in freespace BB84 quantum cryptography Sebastian Nauerth, Martin Fürst, Tobias Schmitt-Manderbach, Henning Weier and Harald Weinfurter Standardization of quantum key distribution and the ETSI standardization initiative ISG-QKD Thomas Länger and Gaby Lenhart Entangled quantum key distribution with a biased basis choice Chris Erven, Xiongfeng Ma, Raymond Laflamme and Gregor Weihs Finite-key analysis for practical implementations of quantum key distribution Raymond Y Q Cai and Valerio Scarani Field test of a continuous-variable quantum key distribution prototype S Fossier, E Diamanti, T Debuisschert, A Villing, R Tualle-Brouri and P Grangier Physics and application of photon number resolving detectors based on superconducting parallel nanowires F Marsili, D Bitauld, A Gaggero, S Jahanmirinejad, R Leoni, F Mattioli and A Fiore Device-independent quantum key distribution secure against collective attacks Stefano Pironio, Antonio Acín, Nicolas Brunner, Nicolas Gisin, Serge Massar and Valerio Scarani 1310 nm differential-phase-shift QKD system using superconducting single-photon detectors Lijun Ma, S Nam, Hai Xu, B Baek, Tiejun Chang, O Slattery, A Mink and Xiao Tang Practical gigahertz quantum key distribution based on avalanche photodiodes Z L Yuan, A R Dixon, J F Dynes, A W Sharpe and A J Shields Simple security proof of quantum key distribution based on complementarity M Koashi Feasibility of satellite quantum key distribution C Bonato, A Tomaello, V Da Deppo, G Naletto and P Villoresi Programmable instrumentation and gigahertz signaling for single-photon quantum communication systems Alan Mink, Joshua C Bienfang, Robert Carpenter, Lijun Ma, Barry Hershman, Alessandro Restelli and Xiao Tang Experimental polarization encoded quantum key distribution over optical fibres with real-time continuous birefringence compensation G B Xavier, N Walenta, G Vilela de Faria, G P Temporão, N Gisin, H Zbinden and J P von der Weid Feasibility of free space quantum key distribution with coherent polarization states D Elser, T Bartley, B Heim, Ch Wittmann, D Sych and G Leuchs A fully automated entanglement-based quantum cryptography system for telecom fiber networks Alexander Treiber, Andreas Poppe, Michael Hentschel, Daniele Ferrini, Thomas Lorünser, Edwin Querasser, Thomas Matyus, Hannes Hübel and Anton Zeilinger Dense wavelength multiplexing of 1550 nm QKD with strong classical channels in reconfigurable networking environments N A Peters, P Toliver, T E Chapuran, R J Runser, S R McNown, C G Peterson, D Rosenberg, N Dallmann, R J Hughes, K P McCabe, J E Nordholt and K T Tyagi Clock synchronization by remote detection of correlated photon pairs Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer Megabits secure key rate quantum key distribution Q Zhang, H Takesue, T Honjo, K Wen, T Hirohata, M Suyama, Y Takiguchi, H Kamada, Y Tokura, O Tadanaga, Y Nishida, M Asobe and Y Yamamoto Practical long-distance quantum key distribution system using decoy levels D Rosenberg, C G Peterson, J W Harrington, P R Rice, N Dallmann, K T Tyagi, K P McCabe, S Nam, B Baek, R H Hadfield, R J Hughes and J E Nordholt Detector decoy quantum key distribution Tobias Moroder, Marcos Curty and Norbert Lütkenhaus Daylight operation of a free space, entanglement-based quantum key distribution system Matthew P Peloso, Ilja Gerhardt, Caleb Ho, Antía Lamas-Linares and Christian Kurtsiefer Observation of 1.5 μm band entanglement using single photon detectors based on sinusoidally gated InGaAs/InP avalanche photodiodes Benjamin Miquel and Hiroki Takesue
NASA Astrophysics Data System (ADS)
Schaibley, J. R.; Burgers, A. P.; McCracken, G. A.; Duan, L.-M.; Berman, P. R.; Steel, D. G.; Bracker, A. S.; Gammon, D.; Sham, L. J.
2013-04-01
The electron spin state of a singly charged semiconductor quantum dot has been shown to form a suitable single qubit for quantum computing architectures with fast gate times. A key challenge in realizing a useful quantum dot quantum computing architecture lies in demonstrating the ability to scale the system to many qubits. In this Letter, we report an all optical experimental demonstration of quantum entanglement between a single electron spin confined to a single charged semiconductor quantum dot and the polarization state of a photon spontaneously emitted from the quantum dot’s excited state. We obtain a lower bound on the fidelity of entanglement of 0.59±0.04, which is 84% of the maximum achievable given the timing resolution of available single photon detectors. In future applications, such as measurement-based spin-spin entanglement which does not require sub-nanosecond timing resolution, we estimate that this system would enable near ideal performance. The inferred (usable) entanglement generation rate is 3×103s-1. This spin-photon entanglement is the first step to a scalable quantum dot quantum computing architecture relying on photon (flying) qubits to mediate entanglement between distant nodes of a quantum dot network.
Schaibley, J R; Burgers, A P; McCracken, G A; Duan, L-M; Berman, P R; Steel, D G; Bracker, A S; Gammon, D; Sham, L J
2013-04-19
The electron spin state of a singly charged semiconductor quantum dot has been shown to form a suitable single qubit for quantum computing architectures with fast gate times. A key challenge in realizing a useful quantum dot quantum computing architecture lies in demonstrating the ability to scale the system to many qubits. In this Letter, we report an all optical experimental demonstration of quantum entanglement between a single electron spin confined to a single charged semiconductor quantum dot and the polarization state of a photon spontaneously emitted from the quantum dot's excited state. We obtain a lower bound on the fidelity of entanglement of 0.59±0.04, which is 84% of the maximum achievable given the timing resolution of available single photon detectors. In future applications, such as measurement-based spin-spin entanglement which does not require sub-nanosecond timing resolution, we estimate that this system would enable near ideal performance. The inferred (usable) entanglement generation rate is 3×10(3) s(-1). This spin-photon entanglement is the first step to a scalable quantum dot quantum computing architecture relying on photon (flying) qubits to mediate entanglement between distant nodes of a quantum dot network.
NASA Technical Reports Server (NTRS)
Chen, Wei-Ting; Kahn, Ralph A.; Nelson, David; Yau, Kevin; Seinfeld, John H.
2008-01-01
The treatment of biomass burning (BB) carbonaceous particles in the Multiangle Imaging SpectroRadiometer (MISR) Standard Aerosol Retrieval Algorithm is assessed, and algorithm refinements are suggested, based on a theoretical sensitivity analysis and comparisons with near-coincident AERONET measurements at representative BB sites. Over the natural ranges of BB aerosol microphysical and optical properties observed in past field campaigns, patterns of retrieved Aerosol Optical Depth (AOD), particle size, and single scattering albedo (SSA) are evaluated. On the basis of the theoretical analysis, assuming total column AOD of 0.2, over a dark, uniform surface, MISR can distinguish two to three groups in each of size and SSA, except when the assumed atmospheric particles are significantly absorbing (mid-visible SSA approx.0.84), or of medium sizes (mean radius approx.0.13 pin); sensitivity to absorbing, medium-large size particles increases considerably when the assumed column AOD is raised to 0.5. MISR Research Aerosol Retrievals confirm the theoretical results, based on coincident AERONET inversions under BB-dominated conditions. When BB is externally mixed with dust in the atmosphere, dust optical model and surface reflection uncertainties, along with spatial variability, contribute to differences between the Research Retrievals and AERONET. These results suggest specific refinements to the MISR Standard Aerosol Algorithm complement of component particles and mixtures. They also highlight the importance for satellite aerosol retrievals of surface reflectance characterization, with accuracies that can be difficult to achieve with coupled surface-aerosol algorithms in some higher AOD situations.
Saik, Jennifer E.; Gould, Daniel J.; Watkins, Emily M.; Dickinson, Mary E.; West, Jennifer L.
2011-01-01
The field of tissue engineering is severely limited by a lack of microvascularization in tissue engineered constructs. Biomimetic poly(ethylene glycol) hydrogels containing covalently immobilized platelet-derived growth factor BB (PDGF-BB) were developed to promote angiogenesis. Poly(ethylene glycol) hydrogels resist protein absorption and subsequent non-specific cell adhesion, thus providing a “blank slate”, which can be modified through the incorporation of cell adhesive ligands and growth factors. PDGF-BB is a key angiogenic protein able to support neovessel stabilization by inducing functional anastomoses and recruiting pericytes. Due to the widespread effects of PDGF in the body and a half-life of only 30 min in circulating blood, immobilization of PDGF-BB may be necessary. In this work bioactive, covalently immobilized PDGF-BB was shown to induce tubulogenesis on two-dimensional modified surfaces, migration in three-dimensional (3D) degradable hydrogels and angiogenesis in a mouse cornea micro-pocket angiogenesis assay. Covalently immobilized PDGF-BB was also used in combination with covalently immobilized fibroblast growth factor-2, which led to significantly increased endothelial cell migration in 3D degradable hydrogels compared with the presentation of each factor alone. When a co-culture of endothelial cells and mouse pericyte precursor 10T1/2 cells was seeded onto modified surfaces tubule formation was independent of surface modifications with covalently immobilized growth factors. Furthermore, the combination of soluble PDGF-BB and immobilized PDGF-BB induced a more robust vascular response compared with soluble PDGF-BB alone when implanted into an in vivo mouse cornea micropocket angiogenesis assay. Based on these results, we believe bioactive hydrogels can be tailored to improve the formation of functional microvasculature for tissue engineering. PMID:20801242
Castelli, Letizia; Stocchi, Luca; Patrignani, Maurizio; Sellitto, Giovanni; Giuliani, Manuela; Prosperini, Luca
2015-12-15
This study was aimed at investigating whether postural sway measures derived from a standard force platform were similar to those generated by a custom-written software ("We-Measure") acquiring and processing data from a commercial Nintendo balance board (BB). For this purpose, 90 patients with multiple sclerosis (MS) and 50 healthy controls (HC) were tested in a single-day session with a reference standard force platform and a BB-based system. Despite its acceptable between-device agreement (tested by visual evaluation of Bland-Altman plot), the low-cost BB-based system tended to overestimate postural sway when compared to the reference standard force platform in both MS and HC groups (on average +30% and +54%, respectively). Between-device reliability was just adequate (MS: 66%, HC: 47%), while test-retest reliability was excellent (MS: 84%, HC: 88%). Concurrent validity evaluation showed similar performance between the reference standard force platform and the BB-based system in discriminating fallers and non-fallers among patients with MS. All these findings may encourage the use of this balance board-based new device in longitudinal study, rather than in cross-sectional design, thus providing a potential useful tool for multicenter settings. Copyright © 2015 Elsevier B.V. All rights reserved.
Genes involved in Beauveria bassiana infection to Galleria mellonella.
Chen, Anhui; Wang, Yulong; Shao, Ying; Zhou, Qiumei; Chen, Shanglong; Wu, Yonghua; Chen, Hongwei; Liu, Enqi
2018-05-01
The ascomycete fungus Beauveria bassiana is a natural pathogen of hundreds of insect species and is commercially produced as an environmentally friendly mycoinsecticide. Many genes involved in fungal insecticide infection have been identified but few have been further explored. In this study, we constructed three transcriptomes of B. bassiana at 24, 48 and 72 h post infection of insect pests (BbI) or control (BbC). There were 3148, 3613 and 4922 genes differentially expressed at 24, 48 and 72 h post BbI/BbC infection, respectively. A large number of genes and pathways involved in infection were identified. To further analyze those genes, expression patterns across different infection stages (0, 12, 24, 36, 48, 60, 72 and 84 h) were studied using quantitative RT-PCR. This analysis showed that the infection-related genes could be divided into four patterns: highly expressed throughout the whole infection process (thioredoxin 1); highly expressed during early stages of infection but lowly expressed after the insect death (adhesin protein Mad1); lowly expressed during early infection but highly expressed after insect death (cation transporter, OpS13); or lowly expressed across the entire infection process (catalase protein). The data provide novel insights into the insect-pathogen interaction and help to uncover the molecular mechanisms involved in fungal infection of insect pests.
Cordes, Frank S; Kraiczy, Peter; Roversi, Pietro; Simon, Markus M; Brade, Volker; Jahraus, Oliver; Wallis, Russell; Goodstadt, Leo; Ponting, Chris P; Skerka, Christine; Zipfel, Peter F; Wallich, Reinhard; Lea, Susan M
2006-05-01
Borrelia burgdorferi, a spirochaete transmitted to human hosts during feeding of infected Ixodes ticks, is the causative agent of Lyme disease, the most frequent vector-borne disease in Eurasia and North America. Sporadically Lyme disease develops into a chronic, multisystemic disorder. Serum-resistant B. burgdorferi strains bind complement factor H (FH) and FH-like protein 1 (FHL-1) on the spirochaete surface. This binding is dependent on the expression of proteins termed complement-regulator acquiring surface proteins (CRASPs). The atomic structure of BbCRASP-1, the key FHL-1/FH-binding protein of B. burgdorferi, has recently been determined. Our analysis indicates that its protein topology apparently evolved to provide a high affinity interaction site for FH/FHL-1 and leads to an atomic-level hypothesis for the functioning of BbCRASP-1. This work demonstrates that pathogens interact with complement regulators in ways that are distinct from the mechanisms used by the host and are thus obvious targets for drug design.
Lin, Junfang; Lee, Zhongping; Ondrusek, Michael; Liu, Xiaohan
2018-01-22
Absorption (a) and backscattering (bb) coefficients play a key role in determining the light field; they also serve as the link between remote sensing and concentrations of optically active water constituents. Here we present an updated scheme to derive hyperspectral a and bb with hyperspectral remote-sensing reflectance (Rrs) and diffuse attenuation coefficient (Kd) as the inputs. Results show that the system works very well from clear open oceans to highly turbid inland waters, with an overall difference less than 25% between these retrievals and those from instrument measurements. This updated scheme advocates the measurement and generation of hyperspectral a and bb from hyperspectral Rrs and Kd, as an independent data source for cross-evaluation of in situ measurements of a and bb and for the development and/or evaluation of remote sensing algorithms for such optical properties.
Matias, Natalia Silva; Padilha, Marina; Bedani, Raquel; Saad, Susana Marta Isay
2016-10-03
The viability and resistance to simulated gastrointestinal (GI) conditions of Lactobacillus acidophilus La-5 and Bifidobacterium animalis Bb-12 in synbiotic ice creams, in which milk was replaced by soy extract and/or whey protein isolate (WPI) with inulin, were investigated. The ice creams were showed to be satisfactory vehicles for La-5 and Bb-12 (populations around 7.5logCFU/g), even after the whole storage period (84days/-18°C). In all formulations, the propidium monoazide qPCR (PMA-qPCR) analysis demonstrated that probiotics could resist the in vitro GI assay, with significant survival levels, achieving survival rates exceeding 50%. Additionally, scanning electron microscopy images evidenced cells with morphological differences, suggesting physiological changes in response to the induced stress during the in vitro assay. Although all formulations provided resistance to the probiotic strains under GI stress, the variation found in probiotic survival suggests that GI tolerance is indeed affected by the choice of the food matrix. Copyright © 2016 Elsevier B.V. All rights reserved.
Albillos, Agustín; Zamora, Javier; Martínez, Javier; Arroyo, David; Ahmad, Irfan; De-la-Peña, Joaquin; Garcia-Pagán, Juan-Carlos; Lo, Gin-Ho; Sarin, Shiv; Sharma, Barjesh; Abraldes, Juan G; Bosch, Jaime; Garcia-Tsao, Guadalupe
2017-10-01
Endoscopic variceal ligation plus beta-blockers (EVL+BB) is currently recommended for variceal rebleeding prophylaxis, a recommendation that extends to all patients with cirrhosis with previous variceal bleeding irrespective of prognostic stage. Individualizing patient care is relevant, and in published studies on variceal rebleeding prophylaxis, there is a lack of information regarding response to therapy by prognostic stage. This study aimed at comparing EVL plus BB with monotherapy (EVL or BB) on all-source rebleeding and mortality in patients with cirrhosis and previous variceal bleeding stratified by cirrhosis severity (Child A versus B/C) by means of individual time-to-event patient data meta-analysis from randomized controlled trials. The study used individual data on 389 patients from three trials comparing EVL plus BB versus BB and 416 patients from four trials comparing EVL plus BB versus EVL. Compared with BB alone, EVL plus BB reduced overall rebleeding in Child A (incidence rate ratio 0.40; 95% confidence interval, 0.18-0.89; P = 0.025) but not in Child B/C, without differences in mortality. The effect of EVL on rebleeding was different according to Child (P for interaction <0.001). Conversely, compared with EVL, EVL plus BB reduced rebleeding in both Child A and B/C, with a significant reduction in mortality in Child B/C (incidence rate ratio 0.46; 95% confidence interval, 0.25-0.85; P = 0.013). Outcomes of therapies to prevent variceal rebleeding differ depending on cirrhosis severity: in patients with preserved liver function (Child A), combination therapy is recommended because it is more effective in preventing rebleeding, without modifying survival, while in patients with advanced liver failure (Child B/C), EVL alone carries an increased risk of rebleeding and death compared with combination therapy, underlining that BB is the key element of combination therapy. (Hepatology 2017;66:1219-1231). © 2017 by the American Association for the Study of Liver Diseases.
Identification of intestinal ion transport defects in microvillus inclusion disease.
Kravtsov, Dmitri V; Ahsan, Md Kaimul; Kumari, Vandana; van Ijzendoorn, Sven C D; Reyes-Mugica, Miguel; Kumar, Anoop; Gujral, Tarunmeet; Dudeja, Pradeep K; Ameen, Nadia A
2016-07-01
Loss of function mutations in the actin motor myosin Vb (Myo5b) lead to microvillus inclusion disease (MVID) and death in newborns and children. MVID results in secretory diarrhea, brush border (BB) defects, villus atrophy, and microvillus inclusions (MVIs) in enterocytes. How loss of Myo5b results in increased stool loss of chloride (Cl(-)) and sodium (Na(+)) is unknown. The present study used Myo5b loss-of-function human MVID intestine, polarized intestinal cell models of secretory crypt (T84) and villus resembling (CaCo2BBe, C2BBe) enterocytes lacking Myo5b in conjunction with immunofluorescence confocal stimulated emission depletion (gSTED) imaging, immunohistochemical staining, transmission electron microscopy, shRNA silencing, immunoblots, and electrophysiological approaches to examine the distribution, expression, and function of the major BB ion transporters NHE3 (Na(+)), CFTR (Cl(-)), and SLC26A3 (DRA) (Cl(-)/HCO3 (-)) that control intestinal fluid transport. We hypothesized that enterocyte maturation defects lead villus atrophy with immature secretory cryptlike enterocytes in the MVID epithelium. We investigated the role of Myo5b in enterocyte maturation. NHE3 and DRA localization and function were markedly reduced on the BB membrane of human MVID enterocytes and Myo5bKD C2BBe cells, while CFTR localization was preserved. Forskolin-stimulated CFTR ion transport in Myo5bKD T84 cells resembled that of control. Loss of Myo5b led to YAP1 nuclear retention, retarded enterocyte maturation, and a cryptlike phenotype. We conclude that preservation of functional CFTR in immature enterocytes, reduced functional expression of NHE3, and DRA contribute to Cl(-) and Na(+) stool loss in MVID diarrhea.
Identification of intestinal ion transport defects in microvillus inclusion disease
Kravtsov, Dmitri V.; Ahsan, Md Kaimul; Kumari, Vandana; van Ijzendoorn, Sven C. D.; Reyes-Mugica, Miguel; Kumar, Anoop; Gujral, Tarunmeet; Dudeja, Pradeep K.
2016-01-01
Loss of function mutations in the actin motor myosin Vb (Myo5b) lead to microvillus inclusion disease (MVID) and death in newborns and children. MVID results in secretory diarrhea, brush border (BB) defects, villus atrophy, and microvillus inclusions (MVIs) in enterocytes. How loss of Myo5b results in increased stool loss of chloride (Cl−) and sodium (Na+) is unknown. The present study used Myo5b loss-of-function human MVID intestine, polarized intestinal cell models of secretory crypt (T84) and villus resembling (CaCo2BBe, C2BBe) enterocytes lacking Myo5b in conjunction with immunofluorescence confocal stimulated emission depletion (gSTED) imaging, immunohistochemical staining, transmission electron microscopy, shRNA silencing, immunoblots, and electrophysiological approaches to examine the distribution, expression, and function of the major BB ion transporters NHE3 (Na+), CFTR (Cl−), and SLC26A3 (DRA) (Cl−/HCO3−) that control intestinal fluid transport. We hypothesized that enterocyte maturation defects lead villus atrophy with immature secretory cryptlike enterocytes in the MVID epithelium. We investigated the role of Myo5b in enterocyte maturation. NHE3 and DRA localization and function were markedly reduced on the BB membrane of human MVID enterocytes and Myo5bKD C2BBe cells, while CFTR localization was preserved. Forskolin-stimulated CFTR ion transport in Myo5bKD T84 cells resembled that of control. Loss of Myo5b led to YAP1 nuclear retention, retarded enterocyte maturation, and a cryptlike phenotype. We conclude that preservation of functional CFTR in immature enterocytes, reduced functional expression of NHE3, and DRA contribute to Cl− and Na+ stool loss in MVID diarrhea. PMID:27229121
Jeon, Wonbae; Choi, Yunsoo; Souri, Amir Hossein; Roy, Anirban; Diao, Lijun; Pan, Shuai; Lee, Hwa Woon; Lee, Soon-Hwan
2018-02-01
This study investigates a significant biomass burning (BB) event occurred in Colorado of the United States in 2012 using the Community Multi-scale Air Quality (CMAQ) model. The simulation reasonably reproduced the significantly high upper tropospheric O 3 concentrations (up to 145ppb) caused by BB emissions. We find the BB-induced O 3 was primarily affected by chemical reactions and dispersion during its transport. In the early period of transport, high NO x and VOCs emissions caused O 3 production due to reactions with the peroxide and hydroxyl radicals, HO 2 and OH. Here, NO x played a key role in O 3 formation in the BB plume. The results indicated that HO 2 in the BB plume primarily came from formaldehyde (HCHO+hv=2HO 2 +CO), a secondary alkoxy radical (ROR=HO 2 ). CO played an important role in the production of recycled HO 2 (OH+CO=HO 2 ) because of its abundance in the BB plume. The chemically produced HO 2 was largely converted to OH by the reactions with NO (HO 2 +NO=OH+NO 2 ) from BB emissions. This is in contrast to the surface, where HO 2 and OH are strongly affected by VOC and HONO, respectively. In the late stages of transport, the O 3 concentration was primarily controlled by dispersion. It stayed longer in the upper troposphere compared to the surface due to sustained depletion of NO x . Sensitivity analysis results support that O 3 in the BB plume is significantly more sensitive to NO x than VOCs. Copyright © 2017 Elsevier B.V. All rights reserved.
Geer, Mitchell J; van Geffen, Johanna P; Gopalasingam, Piraveen; Vögtle, Timo; Smith, Christopher W; Heising, Silke; Kuijpers, Marijke J E; Tullemans, Bibian M E; Jarvis, Gavin E; Eble, Johannes A; Jeeves, Mark; Overduin, Michael; Heemskerk, Johan W M; Mazharian, Alexandra; Senis, Yotis A
2018-06-11
The immunoreceptor tyrosine-based inhibitory motif (ITIM)-containing receptor G6b-B has emerged as a key regulator of platelet homeostasis. However, it remains unclear how it mediates its effects. Tyrosine phosphorylation of the ITIM and immunoreceptor tyrosine-based switch motif (ITSM) within the cytoplasmic tail of G6b-B provides a docking site for SH2 domain-containing protein-tyrosine phosphatases Shp1 and Shp2, which are also critical regulators of platelet production and function. In this study, we investigate the physiological consequences of uncoupling G6b-B from Shp1 and Shp2. To address this, we generated a transgenic mouse model expressing a mutant form of G6b-B in which tyrosine (Y) residues 212 and 238 within the ITIM and ITSM were mutated to phenylalanine (F), respectively. Mice homozygous for the mutation (G6b-B diY/F) were macrothrombocytopenic, due to a reduction in platelet production, had large clusters of megakaryocytes and myelofibrosis at sites of hematopoiesis, similar to that observed in G6b knockout (G6b KO) mice. Platelets from G6b-B diY/F mice were hypo-responsive to collagen, due to a significant reduction in expression of the immunoreceptor tyrosine-based activation motif (ITAM)-containing collagen receptor complex GPVI-FcR γ-chain, and thrombin, that could be partially rescued by co-stimulating the platelets with ADP. In contrast, platelets from G6b-B diY/F, G6b KO and megakaryocyte-specific Shp2 KO mice were hyper-responsive to antibody-mediated cross-linking of the hemi-ITAM-containing podoplanin receptor CLEC-2, suggesting that G6b-B inhibits CLEC-2-mediated platelet activation through Shp2. Findings from this study demonstrate that G6b-B must engage with Shp1 and Shp2 in order to mediate its regulatory effects on platelet homeostasis. Copyright © 2018 American Society of Hematology.
Resonance energy transfer between the active sites of creatine kinase from rabbit brain.
Grossman, S H
1990-09-03
Resonance energy transfer was measured between the active site domains of the brain isozyme of creatine kinase (CK-BB). The reactive thiol near the active sites, one on each subunit of the dimeric protein, was derivatized using 5-[2-[iodoacetyl)amino)ethyl]aminonaphthalene-1-sulfonic acid (AED), 2-[4'-iodoacetamidoanilino]naphthalene-6-sulfonic acid (AANS) and 5-iodoacetamidofluorescein (AF). Suitable donor/acceptor protein conjugated hybrids were prepared by controlled kinetics producing CK-BB-AED/AF and CK-BB-AANS/AF. Transfer efficiencies, measured from the quenching of the donor lifetime and steady-state sensitized acceptor emission, ranged from 0.10 to 0.17. From determination of the donor/acceptor overlap integrals, donor quantum yields and attempts to delimit the orientation factor using steady-state and phase-resolved anisotropy measurements, it was found that a suitable estimate of the range between the active sites was between 45 and 57 A. This range is similar to that reported previously for the muscle isozyme of creatine kinase (Grossman, S.H. (1989) Biochemistry 28, 4894-4902) but is a significantly greater distance than detected for the hybrid, myocardial specific isozyme (Grossman, S.H. (1983) Biochemistry 22, 5369-5375).
Hughes, Richard John; Thrasher, James Thomas; Nordholt, Jane Elizabeth
2016-11-29
Innovations for quantum key management harness quantum communications to form a cryptography system within a public key infrastructure framework. In example implementations, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a Merkle signature scheme (using Winternitz one-time digital signatures or other one-time digital signatures, and Merkle hash trees) to constitute a cryptography system. More generally, the quantum key management innovations combine quantum key distribution and a quantum identification protocol with a hash-based signature scheme. This provides a secure way to identify, authenticate, verify, and exchange secret cryptographic keys. Features of the quantum key management innovations further include secure enrollment of users with a registration authority, as well as credential checking and revocation with a certificate authority, where the registration authority and/or certificate authority can be part of the same system as a trusted authority for quantum key distribution.
Annihilation rates of 3D2(2--) and 3D3(3--) heavy quarkonia
NASA Astrophysics Data System (ADS)
Wang, Tianhong; Fu, Hui-Feng; Jiang, Yue; Li, Qiang; Wang, Guo-Li
2017-03-01
We calculate the annihilation decay rates of the 3D 2(2--) and 3D 3(3--) charmonia and bottomonia by using the instantaneous Bethe-Salpeter (BS) method. The wave functions of states with quantum numbers JPC = 2-- and 3-- are constructed. By solving the corresponding instantaneous BS equations, we obtain the mass spectra and wave functions of the quarkonia. The annihilation amplitude is written within Mandelstam formalism and the relativistic corrections are taken into account properly. This is important, especially for high excited states, since their relativistic corrections are large. The results for the 3g channel are as follows: Γ13D2(cc¯)→ggg = 9.24 keV, Γ13D3(cc¯)→ggg = 25.0 keV, Γ13D2(bb¯)→ggg = 1.87 keV and Γ13D3(bb¯)→ggg = 0.815 keV.
Quantum correlations in a family of bipartite separable qubit states
NASA Astrophysics Data System (ADS)
Xie, Chuanmei; Liu, Yimin; Chen, Jianlan; Zhang, Zhanjun
2017-03-01
Quantum correlations (QCs) in some separable states have been proposed as a key resource for certain quantum communication tasks and quantum computational models without entanglement. In this paper, a family of nine-parameter separable states, obtained from arbitrary mixture of two sets of bi-qubit product pure states, is considered. QCs in these separable states are studied analytically or numerically using four QC quantifiers, i.e., measurement-induced disturbance (Luo in Phys Rev A77:022301, 2008), ameliorated MID (Girolami et al. in J Phys A Math Theor 44:352002, 2011),quantum dissonance (DN) (Modi et al. in Phys Rev Lett 104:080501, 2010), and new quantum dissonance (Rulli in Phys Rev A 84:042109, 2011), respectively. First, an inherent symmetry in the concerned separable states is revealed, that is, any nine-parameter separable states concerned in this paper can be transformed to a three-parameter kernel state via some certain local unitary operation. Then, four different QC expressions are concretely derived with the four QC quantifiers. Furthermore, some comparative studies of the QCs are presented, discussed and analyzed, and some distinct features about them are exposed. We find that, in the framework of all the four QC quantifiers, the more mixed the original two pure product states, the bigger QCs the separable states own. Our results reveal some intrinsic features of QCs in separable systems in quantum information.
Yin, Xin; Wang, Huadong; Guo, Jidong; Zhang, Liang; Zhang, Yupeng; Li, Li; Hou, Shuxun
2018-01-01
Abstract Background: AIS is the most common spinal deformity disease, yet its etiology remains uncertain. Significant associations have been found between AIS risk and vitamin D receptor (VDR) gene polymorphisms; however, some of these results are controversial. The aim of this study was to determine whether VDR BsmI rs1544410 and ApaI rs7975232 polymorphisms are correlated with AIS. Methods: Databases, including PubMed, EMBASE, Web of Science, the Cochrane Library, the Chinese Biomedical Literature Database, and the Wanfang Database, were systematically searched, and eligible case–control studies that explored the association of VDR (BsmI and ApaI) and the susceptibility to AIS were selected. The pooled odds ratio (OR) with 95% confidence interval (95% CI) was calculated to assess the associations, and subgroup meta-analyses were performed according to the ethnicity of the study population. Results: A total of 5 studies with 717 cases and 554 controls fulfilled the inclusion criteria after assessment by 2 reviewers. Generally, significant correlations were found between the BsmI polymorphism and AIS risk in overall populations and in Asian populations (overall population: B vs b: OR = 2.12, 95% CI = 1.21–3.75, P = .009; BB vs bb: OR = 3.38, 95% CI = 1.08–10.57, P = .036; Bb vs bb: OR = 2.50, 95% CI = 1.29–4.82, P = .006; BB/Bb vs bb: OR = 2.71, 95% CI = 1.31–5.63, P = .007; Asian population: B vs b: OR = 2.42, 95% CI = 1.27–4.61, P = .007; BB vs bb: OR = 4.09, 95% CI = 1.03–16.22, P = .045; Bb vs bb: OR = 2.94, 95% CI = 1.42–6.10, P = .004; BB/Bb vs bb: OR = 3.23, 95% CI = 1.42–7.35, P = .005). There was no significant association observed in Caucasian populations (all P > .05). With regard to the ApaI polymorphism, we found that it significantly decreased the risk of AIS (Aa vs AA: OR = 0.43, 95% CI = 0.24–0.77, P = .004; Aa/aa vs AA: OR = 0.52, 95% CI = 0.30–0.91, P = .023); however, we could not draw a definitive conclusion for Caucasian populations, as no studies have been conducted in this group to determine the role of the VDR ApaI polymorphism in AIS etiology and development. Conclusion: VDR BsmI was significantly associated with AIS susceptibility in the overall and Asian populations, while the VDR ApaI polymorphism only played a key role in AIS etiology and development in Asian populations. PMID:29480871
Borghi, Elena; Casella, Luigi
2010-02-21
In this study copper(ii) complexes with the tridentate nitrogen ligand bis[2-(1-methylbenzimidazol-2-yl)ethyl]amine (2-BB) are considered as model compounds for the Cu-tris(imidazole) array found in several copper proteins. 2-BB chelates copper(ii) forming two six-membered rings and the complexes contain methanol, nitrite, azide and water as ancillary ligands; both the coordination numbers and stereochemistries differ in these complexes. Their key structural features were investigated by using full multiple-scattering theoretical analysis of the copper K-edge X-ray absorption spectrum with the MXAN code. We showed that using cluster sizes large enough to include all atoms of the ligand, the analysis of the XANES region can give both a structural model of the metal centre and map the structure of the 2-BB complexes. Complex [Cu(2-BB)(N(3))](+) provided a critical test through the comparison of the XANES simulation results with crystallographic data, thus permitting the extension of the method to the complex [Cu(2-BB)(H(2)O)(n)](+) (n = 1 or 2), for which crystallographic data are not available but is expected to bear a five-coordinated Cu(3N)(2O) core (n = 2). The structural data of [Cu(2-BB)(MeOH)(ClO(4))](+) and [Cu(2-BB)(NO(2))](+), both with a Cu(3N)(2O) core but with a different stereochemistry, were used as the starting parameters for two independent simulations of the XANES region of the [Cu(2-BB)(H(2)O)(2)](+) cation. The two structural models generated by simulation converge towards a structure for the aqua-cation with a lower coordination number. New calculations, where four-coordinated Cu(3N)(O) cores were considered as the starting structures, validated that the structure of the aqua-complex in the powder state has a copper(ii) centre with a four-coordinated Cu(3N)(O) core and a molecular formula [Cu(2-BB)(H(2)O)](ClO(4)).(H(2)O). A water solvation molecule, presumed to be disordered from the simulations with the two Cu(3N)(2O) cores, is present. The successful treatment of this Cu-2-BB complex system allows the extension of the method to other biomimetic compounds when a structural characterization is lacking.
Neuroprotective effect of sevoflurane in general anaesthesia.
Ramos Ramos, Victoria; Mesa Suárez, Pablo; Santotoribio, José Diego; González García, María Ángela; Muñoz Hoyos, Antonio
2017-02-23
The aim of this study was to evaluate the brain damage caused by inhaled sevoflurane, by determining the concentration of serum S100B protein before and after the exposure to this drug as the only anaesthetic agent. Paediatric patients undergoing general anaesthesia for the conduct of a nuclear magnetic resonance were included in the study. A venous blood sample was taken from each patient before (basal sample) and after (post-exposure sample) administering the general anaesthesia. The concentration of serum S100B protein was determined in the basal (S100Bb) and post-exposure sample (S100Bp). A total of 72 patients were included in the study, with a mean patient age of 2 to 13 years (median=6), 28 males and 44 females. S100Bp values (median=66.5ng/L) were significantly lower (P=.0059) than those of S100Bb (median=84.0ng/L). The median of the difference between S100Bp and S100Bb was -11.0ng/L. Inhaled sevoflurane at low doses causes a decrease of serum S100B protein levels, hence, this drug could have a neuroprotective effect in the central nervous system. Copyright © 2016 Elsevier España, S.L.U. All rights reserved.
Limitations on quantum key repeaters.
Bäuml, Stefan; Christandl, Matthias; Horodecki, Karol; Winter, Andreas
2015-04-23
A major application of quantum communication is the distribution of entangled particles for use in quantum key distribution. Owing to noise in the communication line, quantum key distribution is, in practice, limited to a distance of a few hundred kilometres, and can only be extended to longer distances by use of a quantum repeater, a device that performs entanglement distillation and quantum teleportation. The existence of noisy entangled states that are undistillable but nevertheless useful for quantum key distribution raises the question of the feasibility of a quantum key repeater, which would work beyond the limits of entanglement distillation, hence possibly tolerating higher noise levels than existing protocols. Here we exhibit fundamental limits on such a device in the form of bounds on the rate at which it may extract secure key. As a consequence, we give examples of states suitable for quantum key distribution but unsuitable for the most general quantum key repeater protocol.
Space division multiplexing chip-to-chip quantum key distribution.
Bacco, Davide; Ding, Yunhong; Dalgaard, Kjeld; Rottwitt, Karsten; Oxenløwe, Leif Katsuo
2017-09-29
Quantum cryptography is set to become a key technology for future secure communications. However, to get maximum benefit in communication networks, transmission links will need to be shared among several quantum keys for several independent users. Such links will enable switching in quantum network nodes of the quantum keys to their respective destinations. In this paper we present an experimental demonstration of a photonic integrated silicon chip quantum key distribution protocols based on space division multiplexing (SDM), through multicore fiber technology. Parallel and independent quantum keys are obtained, which are useful in crypto-systems and future quantum network.
Kumari, Tripti; Issar, Upasana; Kakkar, Rita
2014-01-01
Peptide deformylase (PDF) has emerged as an important antibacterial drug target. Considerable effort is being directed toward developing peptidic and non-peptidic inhibitors for this metalloprotein. In this work, the known peptidic inhibitor BB-3497 and its various ionization and tautomeric states are evaluated for their inhibition efficiency against PDF using a molecular mechanics (MM) approach as well as a mixed quantum mechanics/molecular mechanics (QM/MM) approach, with an aim to understand the interactions in the binding site. The evaluated Gibbs energies of binding with the mixed QM/MM approach are shown to have the best predictive power. The experimental pose is found to have the most negative Gibbs energy of binding, and also the smallest strain energy. A quantum mechanical evaluation of the active site reveals the requirement of strong chelation by the ligand with the metal ion. The investigated ligand chelates the metal ion through the two oxygens of its reverse hydroxamate moiety, particularly the N-O(-) oxygen, forming strong covalent bonds with the metal ion, which is penta-coordinated. In the uninhibited state, the metal ion is tetrahedrally coordinated, and hence chelation with the inhibitor is associated with an increase of the metal ion coordination. Thus, the strong binding of the ligand at the binding site is accounted for.
Relativistic quantum cryptography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Molotkov, S. N., E-mail: molotkov@issp.ac.ru
2011-03-15
A new protocol of quantum key distribution is proposed to transmit keys through free space. Along with quantum-mechanical restrictions on the discernibility of nonorthogonal quantum states, the protocol uses additional restrictions imposed by special relativity theory. Unlike all existing quantum key distribution protocols, this protocol ensures key secrecy for a not strictly one-photon source of quantum states and an arbitrary length of a quantum communication channel.
Public-key quantum digital signature scheme with one-time pad private-key
NASA Astrophysics Data System (ADS)
Chen, Feng-Lin; Liu, Wan-Fang; Chen, Su-Gen; Wang, Zhi-Hua
2018-01-01
A quantum digital signature scheme is firstly proposed based on public-key quantum cryptosystem. In the scheme, the verification public-key is derived from the signer's identity information (such as e-mail) on the foundation of identity-based encryption, and the signature private-key is generated by one-time pad (OTP) protocol. The public-key and private-key pair belongs to classical bits, but the signature cipher belongs to quantum qubits. After the signer announces the public-key and generates the final quantum signature, each verifier can verify publicly whether the signature is valid or not with the public-key and quantum digital digest. Analysis results show that the proposed scheme satisfies non-repudiation and unforgeability. Information-theoretic security of the scheme is ensured by quantum indistinguishability mechanics and OTP protocol. Based on the public-key cryptosystem, the proposed scheme is easier to be realized compared with other quantum signature schemes under current technical conditions.
Elkouby, Yaniv M.; Jamieson-Lucy, Allison; Mullins, Mary C.
2016-01-01
The source of symmetry breaking in vertebrate oocytes is unknown. Animal—vegetal oocyte polarity is established by the Balbiani body (Bb), a conserved structure found in all animals examined that contains an aggregate of specific mRNAs, proteins, and organelles. The Bb specifies the oocyte vegetal pole, which is key to forming the embryonic body axes as well as the germline in most vertebrates. How Bb formation is regulated and how its asymmetric position is established are unknown. Using quantitative image analysis, we trace oocyte symmetry breaking in zebrafish to a nuclear asymmetry at the onset of meiosis called the chromosomal bouquet. The bouquet is a universal feature of meiosis where all telomeres cluster to one pole on the nuclear envelope, facilitating chromosomal pairing and meiotic recombination. We show that Bb precursor components first localize with the centrosome to the cytoplasm adjacent to the telomere cluster of the bouquet. They then aggregate around the centrosome in a specialized nuclear cleft that we identified, assembling the early Bb. We show that the bouquet nuclear events and the cytoplasmic Bb precursor localization are mechanistically coordinated by microtubules. Thus the animal—vegetal axis of the oocyte is aligned to the nuclear axis of the bouquet. We further show that the symmetry breaking events lay upstream to the only known regulator of Bb formation, the Bucky ball protein. Our findings link two universal features of oogenesis, the Bb and the chromosomal bouquet, to oocyte polarization. We propose that a meiotic—vegetal center couples meiosis and oocyte patterning. Our findings reveal a novel mode of cellular polarization in meiotic cells whereby cellular and nuclear polarity are aligned. We further reveal that in zygotene nests, intercellular cytoplasmic bridges remain between oocytes and that the position of the cytoplasmic bridge coincides with the location of the centrosome meiotic—vegetal organizing center. These results suggest that centrosome positioning is set by the last mitotic oogonial division plane. Thus, oocytes are polarized in two steps: first, mitotic divisions preset the centrosome with no obvious polarization yet, then the meiotic—vegetal center forms at zygotene bouquet stages, when symmetry is, in effect, broken. PMID:26741740
Hernandez-Chacon, Jessica Ann; Li, Yufeng; Wu, Richard C; Bernatchez, Chantale; Wang, Yijun; Weber, Jeffrey S; Hwu, Patrick; Radvanyi, Laszlo G
2011-04-01
Adoptive T-cell therapy (ACT) using expanded tumor-infiltrating lymphocytes (TIL) with high-dose interleukin-2 is a promising form of immunotherapy for stage IV melanoma having clinical response rates of 50% or more. One of the major problems preventing further success of this therapy is that the current protocols used to highly expand TIL for infusion drive CD8(+) T cells to differentiate into effector cells losing key costimulatory molecules such as CD28 and CD27. This has been associated with a lack of persistence in vivo for reasons not entirely clear. In this study, we demonstrate that while human melanoma CD8(+) TIL lost CD27 and CD28 expression during the rapid expansion for ACT, they gained expression of the alternative costimulatory molecule CD137/4-1BB, and to a lesser extent CD134/OX40. Postrapid expansion protocol (REP) TIL were found to be highly sensitive to activation-induced cell death when reactivated through the T-cell receptor with low levels of OKT3 antibody. However, coligation of 4-1BB using 2 different agonistic anti-4-1BB antibodies potently prevented activation-induced cell death of post-REP CD8(+) TIL, including those specific for melanoma antigen recognized by T cells, and facilitated even further cell expansion. This was correlated with increased levels of bcl-2 and bcl-xL together with decreased bim expression. 4-1BB costimulated post-REP TIL also expressed increased levels of the cytolytic granule proteins and exhibited enhanced cytotoxic T-cell activity against melanoma cells. Lastly, post-REP CD8(+) TIL were protected from cell death by anti-4-1BB ligation when exposed to human leukocyte antigen-matched melanoma cells. Our results indicate that 4-1BB costimulation may significantly improve TIL survival during melanoma ACT and boost antitumor cytolytic activity.
Hernandez-Chacon, Jessica Ann; Li, Yufeng; Wu, Richard C.; Bernatchez, Chantale; Wang, Yijun; Weber, Jeffrey; Hwu, Patrick; Radvanyi, Laszlo
2011-01-01
Adoptive T-cell therapy (ACT) using expanded tumor-infiltrating lymphocytes (TIL) with high-dose IL-2 is a promising form of immunotherapy for Stage IV melanoma having clinical response rates of 50% or more. One of the major problems preventing further success of this therapy is that the current protocols used to highly expand TIL for infusion drive CD8+ T cells to differentiate into effector cells losing key co-stimulatory molecules such as CD28 and CD27. This has been associated with a lack of persistence in vivo for reasons not entirely clear. In this study, we demonstrate that while human melanoma CD8+ TIL lost CD27 and CD28 expression during the rapid expansion for ACT, they gained expression of the alternative co-stimulatory molecule CD137/4-1BB, and to a lesser extent CD134/OX40. Post-REP TIL were found to be highly sensitive to activation-induced cell death (AICD) when re-activated through the TCR with low levels of OKT3 antibody. However, co-ligation of 4-1BB using two different agonistic anti-4-1BB antibodies potently prevented AICD of post-REP CD8+ TIL, including those specific for MART-1, and facilitated even further cell expansion. This was correlated with increased levels of bcl-2 and bcl-xL together with decreased bim expression. 4-1BB-co-stimulated post-REP TIL also expressed increased levels of the cytolytic granule proteins and exhibited enhanced CTL activity against melanoma cells. Lastly, post-REP CD8+ TIL were protected from cell death by anti-4-1BB ligation when exposed to HLA-matched melanoma cells. Our results indicate that 4-1BB co-stimulation may significantly improve TIL survival during melanoma ACT and boost anti-tumor cytolytic activity. PMID:21389874
Extinction cross section measurements for a single optically trapped particle
NASA Astrophysics Data System (ADS)
Cotterell, Michael I.; Preston, Thomas C.; Mason, Bernard J.; Orr-Ewing, Andrew J.; Reid, Jonathan P.
2015-08-01
Bessel beam (BB) optical traps have become widely used to confine single and multiple aerosol particles across a broad range of sizes, from a few microns to < 200 nm in radius. The radiation pressure force exerted by the core of a single, zeroth-order BB incident on a particle can be balanced by a counter-propagating gas flow, allowing a single particle to be trapped indefinitely. The pseudo non-diffracting nature of BBs enables particles to be confined over macroscopic distances along the BB core propagation length; the position of the particle along this length can be finely controlled by variation of the BB laser power. This latter property is exploited to optimize the particle position at the center of the TEM00 mode of a high finesse optical cavity, allowing cavity ring-down spectroscopy (CRDS) to be performed on single aerosol particles and their optical extinction cross section, σext, measured. Further, the variation in the light from the illuminating BB elastically scattered by the particle is recorded as a function of scattering angle. Such intensity distributions are fitted to Lorenz-Mie theory to determine the particle radius. The trends in σext with particle radius are modelled using cavity standing wave Mie simulations and a particle's varying refractive index with changing relative humidity is determined. We demonstrate σext measurements on individual sub-micrometer aerosol particles and determine the lowest limit in particle size that can be probed by this technique. The BB-CRDS method will play a key role in reducing the uncertainty associated with atmospheric aerosol radiative forcing, which remains among the largest uncertainties in climate modelling.
Human neonatal rotavirus vaccine (RV3-BB) targets rotavirus from birth
Thobari, Jarir At; Satria, Cahya Dewi; Handley, Amanda; Watts, Emma; Cowley, Daniel; Nirwati, Hera; Ackland, James; Standish, Jane; Justice, Frances; Byars, Gabrielle; Lee, Katherine J.; Barnes, Graeme L.; Bachtiar, Novilia S.; Icanervilia, Ajeng Viska; Boniface, Karen; Bogdanovic-Sakran, Nada; Pavlic, Daniel; Bishop, Ruth F.; Kirkwood, Carl D.; Buttery, Jim P.; Soenarto, Yati
2018-01-01
Background A birth dose strategy using a neonatal rotavirus vaccine to target early prevention of rotavirus disease may address remaining barriers to global vaccine implementation. Methods We conducted a randomized, placebo-controlled trial in Indonesia to evaluate the efficacy of an oral human neonatal rotavirus vaccine (RV3-BB) to prevent rotavirus gastroenteritis. Healthy newborns received three doses of RV3-BB administered in a neonatal schedule at 0-5 days, 8 and 14 weeks or infant schedule at 8, 14 and 18 weeks, or placebo. Laboratory-confirmed rotavirus gastroenteritis was graded using a modified Vesikari score. The primary analysis was efficacy against severe rotavirus gastroenteritis from two weeks after all doses to 18 months in the combined vaccine group (neonatal and infant schedule) compared with placebo. Results Vaccine efficacy against severe rotavirus gastroenteritis to 18 months was 63% in the combined vaccine group (95% CI 34, 80; p<0.001), 75% in the neonatal vaccine group (95% confidence interval [CI] 44, 91; p<0.001) and 51% in the infant vaccine group (95% CI 7, 76; p=0.03) in the per protocol analysis, with similar results in the intention-to-treat analysis. Vaccine efficacy to 12 months was 94% in the neonatal vaccine group (95%CI 56, 99; p=0.006). Vaccine take occurred in 78/83 (94%) in the neonatal vaccine group and 83/84 (99%) in the infant vaccine group. The vaccine was well tolerated, with similar incidence of adverse events in vaccine and placebo recipients. Conclusion RV3-BB was efficacious, immunogenic and well-tolerated when administered in a neonatal or infant schedule in Indonesia. PMID:29466164
Westendorp, Willeke F; Vermeij, Jan-Dirk; Brouwer, Matthijs C; Roos, Y B W E M; Nederkoorn, Paul J; van de Beek, Diederik
2016-01-01
Stroke-associated infections occur frequently and are associated with unfavorable outcome. Previous cohort studies suggest a protective effect of beta-blockers (BBs) against infections. A sympathetic drive may increase immune suppression and infections. This study is aimed at investigating the association between BB treatment at baseline and post-stroke infection in the Preventive Antibiotics in Stroke Study (PASS), a prospective clinical trial. We performed an exploratory analysis in PASS, 2,538 patients with acute phase of stroke (24 h after onset) were randomized to ceftriaxone (intravenous, 2 g per day for 4 days) in addition to stroke unit care, or standard stroke unit care without preventive antibiotic treatment. All clinical data, including use of BBs, was prospectively collected. Infection was diagnosed by the treating physician, and independently by an expert panel blinded for all other data. Multivariable analysis was performed to investigate the relation between BB treatment and infection rate. Infection, as defined by the physician, occurred in 348 of 2,538 patients (14%). Multivariable analysis showed that the use of BBs at baseline was associated with the development of infection during clinical course (adjusted OR (aOR) 1.61, 95% CI 1.19-2.18; p < 0.01). BB use at baseline was also associated with the development of pneumonia (aOR 1.56, 95% CI 1.05-2.30; p = 0.03). Baseline BB use was not associated with mortality (aOR 1.14, 95% CI 0.84-1.53; p = 0.41) or unfavorable outcome at 3 months (aOR 1.10, 95% CI 0.89-1.35; p = 0.39). Patients treated with BBs prior to stroke have a higher rate of infection and pneumonia. © 2016 S. Karger AG, Basel.
Quantum exhaustive key search with simplified-DES as a case study.
Almazrooie, Mishal; Samsudin, Azman; Abdullah, Rosni; Mutter, Kussay N
2016-01-01
To evaluate the security of a symmetric cryptosystem against any quantum attack, the symmetric algorithm must be first implemented on a quantum platform. In this study, a quantum implementation of a classical block cipher is presented. A quantum circuit for a classical block cipher of a polynomial size of quantum gates is proposed. The entire work has been tested on a quantum mechanics simulator called libquantum. First, the functionality of the proposed quantum cipher is verified and the experimental results are compared with those of the original classical version. Then, quantum attacks are conducted by using Grover's algorithm to recover the secret key. The proposed quantum cipher is used as a black box for the quantum search. The quantum oracle is then queried over the produced ciphertext to mark the quantum state, which consists of plaintext and key qubits. The experimental results show that for a key of n-bit size and key space of N such that [Formula: see text], the key can be recovered in [Formula: see text] computational steps.
Quantum cryptography and applications in the optical fiber network
NASA Astrophysics Data System (ADS)
Luo, Yuhui
2005-09-01
Quantum cryptography, as part of quantum information and communications, can provide absolute security for information transmission because it is established on the fundamental laws of quantum theory, such as the principle of uncertainty, No-cloning theorem and quantum entanglement. In this thesis research, a novel scheme to implement quantum key distribution based on multiphoton entanglement with a new protocol is proposed. Its advantages are: a larger information capacity can be obtained with a longer transmission distance and the detection of multiple photons is easier than that of a single photon. The security and attacks pertaining to such a system are also studied. Next, a quantum key distribution over wavelength division multiplexed (WDM) optical fiber networks is realized. Quantum key distribution in networks is a long-standing problem for practical applications. Here we combine quantum cryptography and WDM to solve this problem because WDM technology is universally deployed in the current and next generation fiber networks. The ultimate target is to deploy quantum key distribution over commercial networks. The problems arising from the networks are also studied in this part. Then quantum key distribution in multi-access networks using wavelength routing technology is investigated in this research. For the first time, quantum cryptography for multiple individually targeted users has been successfully implemented in sharp contrast to that using the indiscriminating broadcasting structure. It overcomes the shortcoming that every user in the network can acquire the quantum key signals intended to be exchanged between only two users. Furthermore, a more efficient scheme of quantum key distribution is adopted, hence resulting in a higher key rate. Lastly, a quantum random number generator based on quantum optics has been experimentally demonstrated. This device is a key component for quantum key distribution as it can create truly random numbers, which is an essential requirement to perform quantum key distribution. This new generator is composed of a single optical fiber coupler with fiber pigtails, which can be easily used in optical fiber communications.
Multimodal Broadband Vibrational Sum Frequency Generation (MM-BB-V-SFG) Spectrometer and Microscope.
Lee, Christopher M; Kafle, Kabindra; Huang, Shixin; Kim, Seong H
2016-01-14
A broadband sum frequency generation (BB-SFG) spectrometer with multimodal (MM) capabilities was constructed, which could be routinely reconfigured for tabletop experiments in reflection, transmission, and total internal reflection (TIR) geometries, as well as microscopic imaging. The system was constructed using a Ti:sapphire amplifier (800 nm, pulse width = 85 fs, repetition rate = 2 kHz), an optical parameter amplification (OPA) system for production of broadband IR pulses tunable between 1000 and 4000 cm(-1), and two Fabry-Pérot etalons arranged in series for production of narrowband 800 nm pulses. The key feature allowing the MM operation was the nearly collinear alignment of the visible (fixed, 800 nm) and infrared (tunable, 1000-4000 cm(-1)) pulses which were spatially separated. Physical insights discussed in this paper include the comparison of spectral bandwidth produced with 40 and 85 fs pump beams, the improvement of spectral resolution using etalons, the SFG probe volume in bulk analysis, the normalization of SFG signals, the stitching of multiple spectral segments, and the operation in different modes for air/liquid and adsorbate/solid interfaces, bulk samples, as well as spectral imaging combined with principle component analysis (PCA). The SFG spectral features obtained with the MM-BB-SFG system were compared with those obtained with picosecond-scanning-SFG system and high-resolution BB-SFG system (HR-BB-SFG) for dimethyl sulfoxide, α-pinene, and various samples containing cellulose (purified commercial products, Cladophora cell wall, cotton and flax fibers, and onion epidermis cell wall).
Distinguishability of quantum states and shannon complexity in quantum cryptography
NASA Astrophysics Data System (ADS)
Arbekov, I. M.; Molotkov, S. N.
2017-07-01
The proof of the security of quantum key distribution is a rather complex problem. Security is defined in terms different from the requirements imposed on keys in classical cryptography. In quantum cryptography, the security of keys is expressed in terms of the closeness of the quantum state of an eavesdropper after key distribution to an ideal quantum state that is uncorrelated to the key of legitimate users. A metric of closeness between two quantum states is given by the trace metric. In classical cryptography, the security of keys is understood in terms of, say, the complexity of key search in the presence of side information. In quantum cryptography, side information for the eavesdropper is given by the whole volume of information on keys obtained from both quantum and classical channels. The fact that the mathematical apparatuses used in the proof of key security in classical and quantum cryptography are essentially different leads to misunderstanding and emotional discussions [1]. Therefore, one should be able to answer the question of how different cryptographic robustness criteria are related to each other. In the present study, it is shown that there is a direct relationship between the security criterion in quantum cryptography, which is based on the trace distance determining the distinguishability of quantum states, and the criterion in classical cryptography, which uses guesswork on the determination of a key in the presence of side information.
Semiquantum key distribution with secure delegated quantum computation
Li, Qin; Chan, Wai Hong; Zhang, Shengyu
2016-01-01
Semiquantum key distribution allows a quantum party to share a random key with a “classical” party who only can prepare and measure qubits in the computational basis or reorder some qubits when he has access to a quantum channel. In this work, we present a protocol where a secret key can be established between a quantum user and an almost classical user who only needs the quantum ability to access quantum channels, by securely delegating quantum computation to a quantum server. We show the proposed protocol is robust even when the delegated quantum server is a powerful adversary, and is experimentally feasible with current technology. As one party of our protocol is the most quantum-resource efficient, it can be more practical and significantly widen the applicability scope of quantum key distribution. PMID:26813384
Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States
NASA Astrophysics Data System (ADS)
Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua
2018-03-01
A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.
Novel Multi-Party Quantum Key Agreement Protocol with G-Like States and Bell States
NASA Astrophysics Data System (ADS)
Min, Shi-Qi; Chen, Hua-Ying; Gong, Li-Hua
2018-06-01
A significant aspect of quantum cryptography is quantum key agreement (QKA), which ensures the security of key agreement protocols by quantum information theory. The fairness of an absolute security multi-party quantum key agreement (MQKA) protocol demands that all participants can affect the protocol result equally so as to establish a shared key and that nobody can determine the shared key by himself/herself. We found that it is difficult for the existing multi-party quantum key agreement protocol to withstand the collusion attacks. Put differently, it is possible for several cooperated and untruthful participants to determine the final key without being detected. To address this issue, based on the entanglement swapping between G-like state and Bell states, a new multi-party quantum key agreement protocol is put forward. The proposed protocol makes full use of EPR pairs as quantum resources, and adopts Bell measurement and unitary operation to share a secret key. Besides, the proposed protocol is fair, secure and efficient without involving a third party quantum center. It demonstrates that the protocol is capable of protecting users' privacy and meeting the requirement of fairness. Moreover, it is feasible to carry out the protocol with existing technologies.
Security of a single-state semi-quantum key distribution protocol
NASA Astrophysics Data System (ADS)
Zhang, Wei; Qiu, Daowen; Mateus, Paulo
2018-06-01
Semi-quantum key distribution protocols are allowed to set up a secure secret key between two users. Compared with their full quantum counterparts, one of the two users is restricted to perform some "classical" or "semi-quantum" operations, which potentially makes them easily realizable by using less quantum resource. However, the semi-quantum key distribution protocols mainly rely on a two-way quantum channel. The eavesdropper has two opportunities to intercept the quantum states transmitted in the quantum communication stage. It may allow the eavesdropper to get more information and make the security analysis more complicated. In the past ten years, many semi-quantum key distribution protocols have been proposed and proved to be robust. However, there are few works concerning their unconditional security. It is doubted that how secure the semi-quantum ones are and how much noise they can tolerate to establish a secure secret key. In this paper, we prove the unconditional security of a single-state semi-quantum key distribution protocol proposed by Zou et al. (Phys Rev A 79:052312, 2009). We present a complete proof from information theory aspect by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we figure out an error threshold value such that for all error rates that are less than this threshold value, the secure secret key can be established between the legitimate users definitely. Otherwise, the users should abort the protocol. We make an illustration of the protocol under the circumstance that the reverse quantum channel is a depolarizing one with parameter q. Additionally, we compare the error threshold value with some full quantum protocols and several existing semi-quantum ones whose unconditional security proofs have been provided recently.
Performance of device-independent quantum key distribution
NASA Astrophysics Data System (ADS)
Cao, Zhu; Zhao, Qi; Ma, Xiongfeng
2016-07-01
Quantum key distribution provides information-theoretically-secure communication. In practice, device imperfections may jeopardise the system security. Device-independent quantum key distribution solves this problem by providing secure keys even when the quantum devices are untrusted and uncharacterized. Following a recent security proof of the device-independent quantum key distribution, we improve the key rate by tightening the parameter choice in the security proof. In practice where the system is lossy, we further improve the key rate by taking into account the loss position information. From our numerical simulation, our method can outperform existing results. Meanwhile, we outline clear experimental requirements for implementing device-independent quantum key distribution. The maximal tolerable error rate is 1.6%, the minimal required transmittance is 97.3%, and the minimal required visibility is 96.8 % .
Changes to Quantum Cryptography
NASA Astrophysics Data System (ADS)
Sakai, Yasuyuki; Tanaka, Hidema
Quantum cryptography has become a subject of widespread interest. In particular, quantum key distribution, which provides a secure key agreement by using quantum systems, is believed to be the most important application of quantum cryptography. Quantum key distribution has the potential to achieve the “unconditionally” secure infrastructure. We also have many cryptographic tools that are based on “modern cryptography” at the present time. They are being used in an effort to guarantee secure communication over open networks such as the Internet. Unfortunately, their ultimate efficacy is in doubt. Quantum key distribution systems are believed to be close to practical and commercial use. In this paper, we discuss what we should do to apply quantum cryptography to our communications. We also discuss how quantum key distribution can be combined with or used to replace cryptographic tools based on modern cryptography.
Quantum key distribution without the wavefunction
NASA Astrophysics Data System (ADS)
Niestegge, Gerd
A well-known feature of quantum mechanics is the secure exchange of secret bit strings which can then be used as keys to encrypt messages transmitted over any classical communication channel. It is demonstrated that this quantum key distribution allows a much more general and abstract access than commonly thought. The results include some generalizations of the Hilbert space version of quantum key distribution, but are based upon a general nonclassical extension of conditional probability. A special state-independent conditional probability is identified as origin of the superior security of quantum key distribution; this is a purely algebraic property of the quantum logic and represents the transition probability between the outcomes of two consecutive quantum measurements.
China Report Economic Affairs Energy: Status and Development 38.
1985-04-29
Measures To Convert From Oil to Coal Showing Results (Li Renjun; NENG YUAN [JOURNAL OF ENERGY] No 6, 25 Dec 84).... • ••• 61 Briefs 67 New Hebei...Coal Mine ’" Liaoning Local Colliery Growth ’ OIL AND GAS More Onshore Oil and Gas Reserves Verified CXINHUA, 12 Apr 85)......... •. • • bb New...Well Gushes Oil in South China Sea CXINHUA, 12 Apr 85) • • • ■ * • • by Daqing Fields Produce 52.3 Million Tons in 1984 _ CMa Zhiping; CHINA
Novel single photon sources for new generation of quantum communications
2017-06-13
be used as building blocks for quantum cryptography and quantum key distribution There were numerous important achievements for the projects in the...single photon sources that will be used as build- ing blocks for quantum cryptography and quantum key distribution There were numerous im- portant...and enable absolutely secured information transfer between distant nodes – key prerequisite for quantum cryptography . Experiment: the experimental
Direct Printing of Organic Electronics at the Nanometer Scale
2006-02-01
patterning as seen in Figure 3. Also, a flat film OVJP grown Alq3 NPD OLED was shown to be competitive with VTE with quantum efficiencies of 0.84%. 0 0...a tris(8-hydroxyquinoline)- aluminum ( Alq3 ) electron transport and emitting layer. The OLEDs exhibited an external 8 quantum efficiency of (0.84...parameter analyzer and a Newport Model 2932-C dual-channel power meter. An OLED having the layer structure: ITO/60nm NPD/60nm Alq3 /LiF:Al was deposited
Security Standards and Best Practice Considerations for Quantum Key Distribution (QKD)
2012-03-01
SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD) THESIS...protection in the United States. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY DISTRIBUTION (QKD...FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT/GSE/ENV/12-M05 SECURITY STANDARDS AND BEST PRACTICE CONSIDERATIONS FOR QUANTUM KEY
2012-03-01
EMPIRICAL ANALYSIS OF OPTICAL ATTENUATOR PERFORMANCE IN QUANTUM KEY DISTRIBUTION SYSTEMS USING A...DISTRIBUTION IS UNLIMITED AFIT/GCS/ENG/12-01 EMPIRICAL ANALYSIS OF OPTICAL ATTENUATOR PERFORMANCE IN QUANTUM KEY DISTRIBUTION SYSTEMS USING ...challenging as the complexity of actual implementation specifics are considered. Two components common to most quantum key distribution
Ying, Sheng-Hua; Liu, Jing; Chu, Xin-Ling; Xie, Xue-Qin; Feng, Ming-Guang
2016-01-01
Autophagy-related proteins play significantly different roles in eukaryotes. In the entomopathogenic fungus Beauveria bassiana, autophagy is associated with fungal growth and development. BbATG1 (a serine/threonine protein kinase) and BbATG8 (a ubiquitin-like protein) have similar roles in autophagy, but different roles in other processes. Disruption mutants of BbATG1 and BbATG8 had impaired conidial germination under starvation stress. The mutant ΔBbATG8 exhibited enhanced sensitivity to oxidative stress, while a ΔBbATG1 mutant did not. BbATG1 and BbATG8 showed different roles in spore differentiation. The blastospore yield was reduced by 70% and 92% in ΔBbATG1 and ΔBbATG8 mutants, respectively, and the double mutant had a reduction of 95%. Conidial yield was reduced by approximately 90% and 50% in ΔBbATG1 and ΔBbATG8 mutants, respectively. A double mutant had a reduction similar to ΔBbATG1. Additionally, both BbATG1 and BbATG8 affected the levels of conidial protein BbCP15p required for conidiation. The virulence of each autophagy-deficient mutant was considerably weakened as indicated in topical and intrahemocoel injection assays, and showed a greater reduction in topical infection. However, BbATG1 and BbATG8 had different effects on fungal virulence. Our data indicate that these autophagy-related proteins have different functions in fungal stress response, asexual development and virulence. PMID:27197558
Experimental teleportation of a quantum controlled-NOT gate.
Huang, Yun-Feng; Ren, Xi-Feng; Zhang, Yong-Sheng; Duan, Lu-Ming; Guo, Guang-Can
2004-12-10
Teleportation of quantum gates is a critical step for the implementation of quantum networking and teleportation-based models of quantum computation. We report an experimental demonstration of teleportation of the prototypical quantum controlled-NOT (CNOT) gate. Assisted with linear optical manipulations, photon entanglement produced from parametric down-conversion, and postselection from the coincidence measurements, we teleport the quantum CNOT gate from acting on local qubits to acting on remote qubits. The quality of the quantum gate teleportation is characterized through the method of quantum process tomography, with an average fidelity of 0.84 demonstrated for the teleported gate.
Effect of adding a virtual community (bulletin board) to smokefree.gov: randomized controlled trial.
Stoddard, Jacqueline L; Augustson, Erik M; Moser, Richard P
2008-12-19
Demand for online information and help exceeds most other forms of self-help. Web-assisted tobacco interventions (WATIs) offer a potentially low-cost way to reach millions of smokers who wish to quit smoking and to test various forms of online assistance for use/utilization and user satisfaction. Our primary aim was to determine the utilization of and satisfaction with 2 versions of a smoking cessation website (smokefree.gov), one of which included an asynchronous bulletin board (BB condition). A secondary goal was to measure changes in smoking behavior 3 months after enrollment in the study. All participants were adult federal employees or contractors to the federal government who responded to an email and indicated a willingness to quit smoking in 30 days. We randomly assigned participants to either the BB condition or the publicly available version--usual care (UC)--and then assessed the number of minutes of website use and satisfaction with each condition as well as changes in smoking behavior. Among the 1375 participants, 684 were randomized to the BB intervention, and 691 to the control UC condition. A total of 39.7% returned a follow-up questionnaire after 3 months, with similar rates across the two groups (UC: n=279, 40.3%; BB: n=267, 39.0%). Among those respondents assigned to the BB condition, only 81 participants (11.8%) elected to view the bulletin board or post a message, limiting our ability to analyze the impact of bulletin board use on cessation. Satisfaction with the website was high and did not differ significantly between conditions (UC: 90.2%, BB: 84.9%, P= .08). Utilization, or minutes spent on the website, was significantly longer for the BB than the UC condition (18.0 vs 11.1, P = .01) and was nearly double for those who remained in the study (21.2) than for those lost to follow-up (9.6, P< .001). Similar differences were observed between those who made a serious quit attempt versus those who did not (22.4 vs 10.4, P= .02) and between those with a quit date on or a few days prior to the enrollment date versus those with a later quit date (29.4 vs 12.5, P = .001). There were no statistically significant differences in quit rates between the BB and UC group, both in intent-to-treat analysis (ITT) and in analyzing the adherence subgroup (respondents) only. Combined across the UC and BB groups, 7-day abstinence was 6.8% with ITT and 17.6% using only participants in the follow-up (adherence). For participants who attempted to quit within a few days of study entry (vs 30 days), quit rates were 29.6% (ITT) and 44.4% (adherence). Quit rates for participants were similar to other WATIs, with the most favorable outcomes demonstrated by smokers ready to quit at the time of enrolling in the trial and smokers using pharmacotherapy. Utilization of the asynchronous bulletin board was lower than expected, and did not have an impact on outcomes (quit rates). Given the demand for credible online resources for smoking cessation, future studies should continue to evaluate use of and satisfaction with Web features and to clarify results in terms of time since last cigarette as well as use of pharmacotherapy.
NASA Astrophysics Data System (ADS)
Stone, M.; Weiss, M.; Goodale, C. L.
2010-12-01
Soil microbes produce extracellular enzymes that degrade a variety of carbon-rich polymers contained within soil organic matter (SOM). These enzymes are key regulators of the terrestrial carbon cycle. However, basic information about the kinetics of extracellular enzymes and key environmental variables that regulate their catalytic ability is lacking. This study aims to clarify the mechanisms by which microbial carbon-degrading enzymes drive different responses to nitrogen (N) fertilization in soil decomposition at two sites with long-term N fertilization experiments, the Bear Brook (BB) forest in Maine and Fernow Forest (FF) in West Virginia. We examined a suite of cellulolytic and lignolytic enzymes that break down common SOM constituents. We hypothesized that enzymes derived from the site with a higher mean annual temperature (FF) would be more heat-tolerant, and retain their catalytic efficiency (Km) as temperature rises, relative to enzymes from the colder environment (BB). We further hypothesized that cellulolytic enzyme activity would be unaffected by N, while oxidative enzyme activity would be suppressed in N-fertilized soils. To test these hypotheses and examine the interactive effects of temperature and N, we measured enzyme activity in unfertilized and N-fertilized soils under a range of laboratory temperature manipulations. Preliminary results show a significant decrease in cellulolytic enzyme efficiency with temperature at the colder site (BB), as well as a significant increase in efficiency due to N-fertilization for two cellulolytic enzymes. Oxidative enzyme activity shows a marginally significant reduction due to N-fertilization at BB. These results suggest that soil warming may produce a negative feedback on carbon turnover in certain climates, while N-fertilization may alter the relative decomposition rates of different soil organic matter constituents. FF activity will be analyzed in a similar manner and the two sites will be compared in order to fully assess our hypotheses.
Quantum dense key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Degiovanni, I.P.; Ruo Berchera, I.; Castelletto, S.
2004-03-01
This paper proposes a protocol for quantum dense key distribution. This protocol embeds the benefits of a quantum dense coding and a quantum key distribution and is able to generate shared secret keys four times more efficiently than the Bennet-Brassard 1984 protocol. We hereinafter prove the security of this scheme against individual eavesdropping attacks, and we present preliminary experimental results, showing its feasibility.
Han, Joo-Hui; Kim, Yohan; Jung, Sang-Hyuk; Lee, Jung-Jin; Park, Hyun-Soo; Song, Gyu-Yong; Cuong, Nguyen Manh; Kim, Young Ho
2015-01-01
The increased potential for vascular smooth muscle cell (VSMC) growth is a key abnormality in the development of atherosclerosis and post-angioplasty restenosis. Abnormally high activity of platelet-derived growth factor (PDGF) is believed to play a central role in the etiology of these pathophysiological situations. Here, we investigated the anti-proliferative effects and possible mechanism(s) of murrayafoline A, a carbazole alkaloid isolated from Glycosmis stenocarpa Guillamin (Rutaceae), on PDGF-BB-stimulated VSMCs. Murrayafoline A inhibited the PDGF-BB-stimulated proliferation of VSMCs in a concentration-dependent manner, as measured using a non-radioactive colorimetric WST-1 assay and direct cell counting. Furthermore, murrayafoline A suppressed the PDGF-BB-stimulated progression through G0/G1 to S phase of the cell cycle, as measured by [3H]-thymidine incorporation assay and cell cycle progression analysis. This anti-proliferative action of murrayafoline A, arresting cell cycle progression at G0/G1 phase in PDGF-BB-stimulated VSMCs, was mediated via down-regulation of the expression of cyclin D1, cyclin E, cyclin-dependent kinase (CDK)2, CDK4, and proliferating cell nuclear antigen (PCNA), and the phosphorylation of retinoblastoma protein (pRb). These results indicate that murrayafoline A may be useful in preventing the progression of vascular complications such as restenosis after percutaneous transluminal coronary angioplasty and atherosclerosis. PMID:26330754
DOE Office of Scientific and Technical Information (OSTI.GOV)
Youn, Sungwoo
2009-06-01
We search for the semi-inclusive processmore » $$B^0_s\\rightarrow D_s^{(*)}D_s^{(*)}$$ using 2.8 fb$$^{-1}$$ of $$p \\bar{p}$$ collisions at $$\\sqrt{s} = 1.96$$ TeV recorded by the D0 detector operating at the Fermilab Tevatron Collider. Under certain theoretical assumptions, these double-charm final states saturate CP-even eigenstates in the $$B_s^0$$ decays, allowing the lifetime difference of the $$B_s^0$$ system to be related to the branching ratio. We observe $$26.6\\pm 8.4$$ signal events with a significance above background of 3.2 standard deviations. The branching ratio is measured as $${\\cal B}(B^0_s\\rightarrow D_s^{(*)}D_s^{(*)}) = 0.035\\pm0.010\\text{(stat)}\\pm0.011\\text{(syst)}$$ and, in the Standard Model, the width difference is derived as $$\\Delta \\Gamma_s^{\\rm CP}/\\Gamma_s = 0.072\\pm0.021\\text{(stat)}\\pm0.022\\text{(syst)}$$.« less
Mutually orthogonal Latin squares from the inner products of vectors in mutually unbiased bases
NASA Astrophysics Data System (ADS)
Hall, Joanne L.; Rao, Asha
2010-04-01
Mutually unbiased bases (MUBs) are important in quantum information theory. While constructions of complete sets of d + 1 MUBs in {\\bb C}^d are known when d is a prime power, it is unknown if such complete sets exist in non-prime power dimensions. It has been conjectured that complete sets of MUBs only exist in {\\bb C}^d if a maximal set of mutually orthogonal Latin squares (MOLS) of side length d also exists. There are several constructions (Roy and Scott 2007 J. Math. Phys. 48 072110; Paterek, Dakić and Brukner 2009 Phys. Rev. A 79 012109) of complete sets of MUBs from specific types of MOLS, which use Galois fields to construct the vectors of the MUBs. In this paper, two known constructions of MUBs (Alltop 1980 IEEE Trans. Inf. Theory 26 350-354 Wootters and Fields 1989 Ann. Phys. 191 363-381), both of which use polynomials over a Galois field, are used to construct complete sets of MOLS in the odd prime case. The MOLS come from the inner products of pairs of vectors in the MUBs.
The acute effects of bodyweight suspension exercise on muscle activation and muscular fatigue.
Cayot, Trent E; Lauver, Jakob D; Scheuermann, Barry W
2017-07-01
This investigation examined effects of two exercise modes (barbell, BB; bodyweight suspension, BWS) on muscle activation, resistance load, and fatigue. During session one, nine resistance-trained males completed an elbow flexion one-repetition maximum (1RM). During sessions two and three, subjects completed standing biceps curls to fatigue at 70% 1RM utilizing a randomized exercise mode. Surface electromyography (sEMG) recorded muscle activation of the biceps brachii, triceps brachii, anterior deltoid, posterior deltoid, rectus abdominis, and erector spinae. BWS resistance load was measured using a force transducer. Standing maximal voluntary isometric contractions of the elbow flexors recorded at 90° were used to determine the isometric force decrement and rate of fatigue (ROF) during exercise. sEMG and resistance load data were divided into 25% contraction duration bins throughout the concentric phase. BWS resulted in a 67.7 ± 7.4% decline in resistance load throughout the concentric phase (p ≤ 0.05). As a result, BB elicited higher mean resistance loads (31.4 ± 4.0 kg) and biceps brachii sEMG (84.7 ± 27.8% maximal voluntary isometric contractions, MVIC) compared with BWS (20.4 ± 3.4 kg, 63.4 ± 21.6% MVIC). No difference in rectus abdominis or erector spinae sEMG was detected between exercise modes. Isometric force decrement was greater during BWS (-21.7 ± 7.0 kg) compared with BB (-14.9 ± 4.7 kg); however, BB (-3.0 ± 0.8 kg/set) resulted in a steeper decline in ROF compared with BWS (-1.7 ± 0.6 kg/set). The variable resistance loading and greater isometric force decrement observed suggest that select BWS exercises may resemble variable resistance exercise more than previously considered.
Ang, Hui Ting; Lim, Ka Keat; Kwan, Yu Heng; Tan, Pui San; Yap, Kai Zhen; Banu, Zafirah; Tan, Chuen Seng; Fong, Warren; Thumboo, Julian; Ostbye, Truls; Low, Lian Leng
2018-06-23
Falls in individuals aged ≥ 60 years may result in injury, hospitalisation or death. The role of anti-hypertensive medications in falls among older adults is unclear. The objective of this study was to assess the association of six anti-hypertensive medication classes, namely α-blockers (AB), angiotensin converting enzyme inhibitors (ACEi), angiotensin receptor blockers (ARB), β-blockers (BB), calcium channel blockers (CCB) and diuretics, with the risk of falls, injurious falls or recurrent falls in individuals aged ≥ 60 years compared with non-users. We performed systematic searches in PubMed, EMBASE and CINAHL and included cohort, case-control and cross-sectional studies that investigated the associations between the use of anti-hypertensive medication classes and the risk of falls, injurious falls or recurrent falls in older adults (≥ 60 years) reported in English. We assessed study quality using the Newcastle-Ottawa Scale (NOS). Unadjusted and adjusted odds ratios (ORs) were pooled using random effects model. We performed meta-analyses for each anti-hypertensive medication class and each fall outcome. We also performed sensitivity analyses by pooling studies of high quality and subgroup analyses among studies with an average age of ≥ 80 years. Seventy-eight articles (where 74, 34, 27, 18, 13 and 11 of them examined diuretics, BB, CCB, ACEi, AB and ARB, respectively) met our inclusion and exclusion criteria; we pooled estimates from 60 articles. ACEi [OR 0.85, 95% confidence interval (CI) 0.81-0.89], BB (OR 0.84, 95% CI 0.76-0.93) and CCB (OR 0.81, 95% CI 0.74-0.90) use were associated with a lower risk of injurious falls than in non-users. Results in sensitivity and subgroup analyses were largely consistent. The use of ACEi, BB or CCB among older adults may be associated with a lower risk of injurious falls than non-use.
NASA Astrophysics Data System (ADS)
Li, Fang-Yi; Yin, Zhen-Qiang; Li, Hong-Wei; Chen, Wei; Wang, Shuang; Wen, Hao; Zhao, Yi-Bo; Han, Zheng-Fu
2014-07-01
Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdropper's information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
Better Bones Buddies: An Osteoporosis Prevention Program
ERIC Educational Resources Information Center
Schrader, Susan L.; Blue, Rebecca; Horner, Arlene
2005-01-01
Although osteoporosis typically surfaces in later life, peak bone mass attained before age 20 is a key factor in its prevention. However, most American children's diets lack sufficient calcium during the critical growth periods of preadolescence and adolescence to achieve peak bone mass. "Better Bones (BB) Buddies" is an educational…
NASA Astrophysics Data System (ADS)
Kanada-En'yo, Yoshiko
2014-10-01
We analyze the α-cluster wave functions in cluster states of ^8Be and ^{20}Ne by comparing the exact relative wave function obtained by the generator coordinate method (GCM) with various types of trial functions. For the trial functions, we adopt the fixed range shifted Gaussian of the Brink-Bloch (BB) wave function, the spherical Gaussian with the adjustable range parameter of the spherical Tohsaki-Horiuchi-Schuck-Röpke (sTHSR), the deformed Gaussian of the deformed THSR (dTHSR), and a function with the Yukawa tail (YT). The quality of the description of the exact wave function with a trial function is judged by the squared overlap between the trial function and the GCM wave function. A better result is obtained with the sTHSR wave function than the BB wave function, and further improvement can be made with the dTHSR wave function because these wave functions can describe the outer tail better. The YT wave function gives almost an equal quality to or even better quality than the dTHSR wave function, indicating that the outer tail of α-cluster states is characterized by the Yukawa-like tail rather than the Gaussian tail. In weakly bound α-cluster states with small α separation energy and the low centrifugal and Coulomb barriers, the outer tail part is the slowly damping function described well by the quantum penetration through the effective barrier. This outer tail characterizes the almost zero-energy free α gas behavior, i.e., the delocalization of the cluster.
Quantum key distribution network for multiple applications
NASA Astrophysics Data System (ADS)
Tajima, A.; Kondoh, T.; Ochi, T.; Fujiwara, M.; Yoshino, K.; Iizuka, H.; Sakamoto, T.; Tomita, A.; Shimamura, E.; Asami, S.; Sasaki, M.
2017-09-01
The fundamental architecture and functions of secure key management in a quantum key distribution (QKD) network with enhanced universal interfaces for smooth key sharing between arbitrary two nodes and enabling multiple secure communication applications are proposed. The proposed architecture consists of three layers: a quantum layer, key management layer and key supply layer. We explain the functions of each layer, the key formats in each layer and the key lifecycle for enabling a practical QKD network. A quantum key distribution-advanced encryption standard (QKD-AES) hybrid system and an encrypted smartphone system were developed as secure communication applications on our QKD network. The validity and usefulness of these systems were demonstrated on the Tokyo QKD Network testbed.
Recent progress of quantum communication in China (Conference Presentation)
NASA Astrophysics Data System (ADS)
Zhang, Qiang
2016-04-01
Quantum communication, based on the quantum physics, can provide information theoretical security. Building a global quantum network is one ultimate goal for the research of quantum information. Here, this talk will review the progress for quantum communication in China, including quantum key distribution over metropolitan area with untrustful relay, field test of quantum entanglement swapping over metropolitan network, the 2000 km quantum key distribution main trunk line, and satellite based quantum communication.
Towards secure quantum key distribution protocol for wireless LANs: a hybrid approach
NASA Astrophysics Data System (ADS)
Naik, R. Lalu; Reddy, P. Chenna
2015-12-01
The primary goals of security such as authentication, confidentiality, integrity and non-repudiation in communication networks can be achieved with secure key distribution. Quantum mechanisms are highly secure means of distributing secret keys as they are unconditionally secure. Quantum key distribution protocols can effectively prevent various attacks in the quantum channel, while classical cryptography is efficient in authentication and verification of secret keys. By combining both quantum cryptography and classical cryptography, security of communications over networks can be leveraged. Hwang, Lee and Li exploited the merits of both cryptographic paradigms for provably secure communications to prevent replay, man-in-the-middle, and passive attacks. In this paper, we propose a new scheme with the combination of quantum cryptography and classical cryptography for 802.11i wireless LANs. Since quantum cryptography is premature in wireless networks, our work is a significant step forward toward securing communications in wireless networks. Our scheme is known as hybrid quantum key distribution protocol. Our analytical results revealed that the proposed scheme is provably secure for wireless networks.
Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F; Schnabel, Roman
2015-10-30
Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein-Podolsky-Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components.
Gehring, Tobias; Händchen, Vitus; Duhme, Jörg; Furrer, Fabian; Franz, Torsten; Pacher, Christoph; Werner, Reinhard F.; Schnabel, Roman
2015-01-01
Secret communication over public channels is one of the central pillars of a modern information society. Using quantum key distribution this is achieved without relying on the hardness of mathematical problems, which might be compromised by improved algorithms or by future quantum computers. State-of-the-art quantum key distribution requires composable security against coherent attacks for a finite number of distributed quantum states as well as robustness against implementation side channels. Here we present an implementation of continuous-variable quantum key distribution satisfying these requirements. Our implementation is based on the distribution of continuous-variable Einstein–Podolsky–Rosen entangled light. It is one-sided device independent, which means the security of the generated key is independent of any memoryfree attacks on the remote detector. Since continuous-variable encoding is compatible with conventional optical communication technology, our work is a step towards practical implementations of quantum key distribution with state-of-the-art security based solely on telecom components. PMID:26514280
Quantum key distribution with an entangled light emitting diode
DOE Office of Scientific and Technical Information (OSTI.GOV)
Dzurnak, B.; Stevenson, R. M.; Nilsson, J.
Measurements performed on entangled photon pairs shared between two parties can allow unique quantum cryptographic keys to be formed, creating secure links between users. An advantage of using such entangled photon links is that they can be adapted to propagate entanglement to end users of quantum networks with only untrusted nodes. However, demonstrations of quantum key distribution with entangled photons have so far relied on sources optically excited with lasers. Here, we realize a quantum cryptography system based on an electrically driven entangled-light-emitting diode. Measurement bases are passively chosen and we show formation of an error-free quantum key. Our measurementsmore » also simultaneously reveal Bell's parameter for the detected light, which exceeds the threshold for quantum entanglement.« less
Quantum key distribution with an entangled light emitting diode
NASA Astrophysics Data System (ADS)
Dzurnak, B.; Stevenson, R. M.; Nilsson, J.; Dynes, J. F.; Yuan, Z. L.; Skiba-Szymanska, J.; Farrer, I.; Ritchie, D. A.; Shields, A. J.
2015-12-01
Measurements performed on entangled photon pairs shared between two parties can allow unique quantum cryptographic keys to be formed, creating secure links between users. An advantage of using such entangled photon links is that they can be adapted to propagate entanglement to end users of quantum networks with only untrusted nodes. However, demonstrations of quantum key distribution with entangled photons have so far relied on sources optically excited with lasers. Here, we realize a quantum cryptography system based on an electrically driven entangled-light-emitting diode. Measurement bases are passively chosen and we show formation of an error-free quantum key. Our measurements also simultaneously reveal Bell's parameter for the detected light, which exceeds the threshold for quantum entanglement.
Quantum critical scaling in beta-YbAlB4 and theoretical implications
NASA Astrophysics Data System (ADS)
Nevidomskyy, Andriy
2012-02-01
Emergent phenomena in quantum materials are subject of intense experimental and theoretical research at present. A wonderful example thereof are the sister phases of YbAlB4 - a newly discovered heavy fermion material [1]. While one phase (α-YbAlB4) is a heavy Fermi liquid, its sibling β-YbAlB4 is quantum critical, supporting an unconventional superconductivity with a tiny transition temperature of ˜80 mK. Latest experiments [2] uncover the quantum critical T/B-scaling in β-YbAlB4 and prove that superconductivity emerges from a strange metal governed by an extremely fragile quantum criticality, which apparently occurs at zero field, without any external tuning. Here, we will present a theoretical perspective on the quantum critical scaling in β-YbAlB4 and will show that the critical exponents can be derived from the nodal structure of the hybridization matrix between Yb f-band and the conduction electrons. It follows that the free energy at low temperatures can be written in a scaling form F[(kBT)^2 + (gμBB)^2]^3/4, which predicts the divergent Sommerfeld coefficient γ and quasi-particle effective mass as B->0: γ˜m^*/m B-1/2. This is indeed observed in the experiment [1,2], which places a tiny upper bound on the critical magnetic field Bc<0.2 mT. We will discuss theoritical implications of this fragile intrinsic quantum criticality in β-YbAlB4 and discuss the possibility of a quantum critical phase, rather than a quantum critical point, in this material. [1] S. Nakatsuji et al., Nature Physics 4, 603 (2008). [2] Y. Matsumoto, S. Nakatsuji, K. Kuga, Y. Karaki, Y. Shimura, T. Sakakibara, A. H. Nevidomskyy, and P. Coleman, Science 331, 316 (2011).
Practical scheme to share a secret key through a quantum channel with a 27.6% bit error rate
NASA Astrophysics Data System (ADS)
Chau, H. F.
2002-12-01
A secret key shared through quantum key distribution between two cooperative players is secure against any eavesdropping attack allowed by the laws of physics. Yet, such a key can be established only when the quantum channel error rate due to eavesdropping or imperfect apparatus is low. Here, a practical quantum key distribution scheme by making use of an adaptive privacy amplification procedure with two-way classical communication is reported. Then, it is proven that the scheme generates a secret key whenever the bit error rate of the quantum channel is less than 0.5-0.1(5)≈27.6%, thereby making it the most error resistant scheme known to date.
NASA Astrophysics Data System (ADS)
De Simone, F.; Hedgecock, I. M.; Cinnirella, S.; Carbone, F.; Sprovieri, F.; Pirrone, N.
2017-12-01
The burning of vegetation is an environmental process that impacts the chemical composition of troposphere on a global scale, and has significant consequences on atmospheric pollution and climate. ENSO influences the alternating patterns of drier and wetter periods in almost all continents, therefore causing a rise in, and varying the timing of, fire activity in numerous regions and ecosystems (Le Page et al). A large amount of legacy Hg is currently buffered in different environmental compartments, including soil and vegetation, due to past and current anthropogenic processes and activities. Biomass Burning (BB) is a major source of atmospheric Hg, and a main driver in recycling this legacy Hg which is eventually re-deposited over land and oceans. Hg from BB is emitted mainly as Hg(0)(g), but a large fraction (up to 30% and more) is released as Hg bound to particulate matter, Hg(p), which is more likely to be deposited close to the fire activity (De Simone et al). Thus, speciation is one of the most important factors in determining the redistribution of Hg, and of the subsequent geographical distribution of its atmospheric deposition. Although the drivers controlling speciation remain uncertain, there is evidence that it depends on burn characteristics and fuel moisture content, which depends on the climatological characteristics of the regions where BB occurs (Obrist et al). The areas where atmospheric Hg is deposited depends ultimately on atmospheric transport, transformation and precipitation patterns, hence the fate of Hg emitted from BB is determined by a complex series of interacting processes and mechanisms, which begin with the release of Hg and continue until deposition. Many of these processes are influenced by ENSO. This modeling study analyses the deposition of Hg from BB using different satellite imagery based products, spanning a number of years, characterized by different ENSO regimes, to evaluate how it impacts BB, the speciation of emitted Hg, and ultimately the fate of Hg. The aim is to identify the key mechanism(s) involved in determining the final receptors of Hg recycled by BB changing climate. Le Page et al., https://doi.org/10.5194/acp-8-1911-2008, 2008 De Simone et al., https://doi.org/10.5194/acp-17-1881-2017, 2017 Obrist et al., https://doi.org/10.1021/es071279n
2014-09-18
and full/scale experimental verifications towards ground/ satellite quantum key distribution0 Oat Qhotonics 4235>9+7,=5;9!អ \\58^ Zin K. Dao Z. Miu T...Conceptual Modeling of a Quantum Key Distribution Simulation Framework Using the Discrete Event System Specification DISSERTATION Jeffrey D. Morris... QUANTUM KEY DISTRIBUTION SIMULATION FRAMEWORK USING THE DISCRETE EVENT SYSTEM SPECIFICATION DISSERTATION Presented to the Faculty Department of Systems
DOE Office of Scientific and Technical Information (OSTI.GOV)
Molotkov, S. N., E-mail: sergei.molotkov@gmail.com
2012-05-15
The fundamental quantum mechanics prohibitions on the measurability of quantum states allow secure key distribution between spatially remote users to be performed. Experimental and commercial implementations of quantum cryptography systems, however, use components that exist at the current technology level, in particular, one-photon avalanche photodetectors. These detectors are subject to the blinding effect. It was shown that all the known basic quantum key distribution protocols and systems based on them are vulnerable to attacks with blinding of photodetectors. In such attacks, an eavesdropper knows all the key transferred, does not produce errors at the reception side, and remains undetected. Threemore » protocols of quantum key distribution stable toward such attacks are suggested. The security of keys and detection of eavesdropping attempts are guaranteed by the internal structure of protocols themselves rather than additional technical improvements.« less
Continuous variable quantum key distribution with modulated entangled states.
Madsen, Lars S; Usenko, Vladyslav C; Lassen, Mikael; Filip, Radim; Andersen, Ulrik L
2012-01-01
Quantum key distribution enables two remote parties to grow a shared key, which they can use for unconditionally secure communication over a certain distance. The maximal distance depends on the loss and the excess noise of the connecting quantum channel. Several quantum key distribution schemes based on coherent states and continuous variable measurements are resilient to high loss in the channel, but are strongly affected by small amounts of channel excess noise. Here we propose and experimentally address a continuous variable quantum key distribution protocol that uses modulated fragile entangled states of light to greatly enhance the robustness to channel noise. We experimentally demonstrate that the resulting quantum key distribution protocol can tolerate more noise than the benchmark set by the ideal continuous variable coherent state protocol. Our scheme represents a very promising avenue for extending the distance for which secure communication is possible.
Counterfactual quantum cryptography.
Noh, Tae-Gon
2009-12-04
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel. In this Letter, we show that the task of a secret key distribution can be accomplished even though a particle carrying secret information is not in fact transmitted through the quantum channel. The proposed protocols can be implemented with current technologies and provide practical security advantages by eliminating the possibility that an eavesdropper can directly access the entire quantum system of each signal particle.
NASA Astrophysics Data System (ADS)
Yan, Xing-Yu; Gong, Li-Hua; Chen, Hua-Ying; Zhou, Nan-Run
2018-05-01
A theoretical quantum key distribution scheme based on random hybrid quantum channel with EPR pairs and GHZ states is devised. In this scheme, EPR pairs and tripartite GHZ states are exploited to set up random hybrid quantum channel. Only one photon in each entangled state is necessary to run forth and back in the channel. The security of the quantum key distribution scheme is guaranteed by more than one round of eavesdropping check procedures. It is of high capacity since one particle could carry more than two bits of information via quantum dense coding.
Counterfactual Quantum Cryptography
NASA Astrophysics Data System (ADS)
Noh, Tae-Gon
2009-12-01
Quantum cryptography allows one to distribute a secret key between two remote parties using the fundamental principles of quantum mechanics. The well-known established paradigm for the quantum key distribution relies on the actual transmission of signal particle through a quantum channel. In this Letter, we show that the task of a secret key distribution can be accomplished even though a particle carrying secret information is not in fact transmitted through the quantum channel. The proposed protocols can be implemented with current technologies and provide practical security advantages by eliminating the possibility that an eavesdropper can directly access the entire quantum system of each signal particle.
Quantum Public Key Cryptosystem Based on Bell States
NASA Astrophysics Data System (ADS)
Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan
2017-11-01
Classical public key cryptosystems ( P K C), such as R S A, E I G a m a l, E C C, are no longer secure in quantum algorithms, and quantum cryptography has become a novel research topic. In this paper we present a quantum asymmetrical cryptosystem i.e. quantum public key cryptosystem ( Q P K C) based on the Bell states. In particular, in the proposed QPKC the public key are given by the first n particles of Bell states and generalized Pauli operations. The corresponding secret key are the last n particles of Bell states and the inverse of generalized Pauli operations. The proposed QPKC encrypts the message using a public key and decrypts the ciphertext using a private key. By H o l e v o ' s theorem, we proved the security of the secret key and messages during the QPKC.
NASA Astrophysics Data System (ADS)
Nelson, Timothy Knight
We describe measurements of the branching ratios
Secure Communication via Key Generation with Quantum Measurement Advantage in the Telecom Band
2013-10-30
II: Summary of Project In this basic research program we proposed to investigate the use of keyed communication in quantum noise as a key generation...implement quantum limited detection in our running-code OCDMA experiment to demonstrate (a) quantum measurement advantage creation between two users, (b...neither is adequate against known-plaintext attacks. This is a serious security problem facing the whole field of quantum cryptography in regard to both
Bettoni, Serena; Bresin, Elena; Remuzzi, Giuseppe; Noris, Marina; Donadelli, Roberta
2016-01-01
The activated fragment of C3 (C3b) and factor B form the C3 proconvertase (C3bB), which is cleaved by factor D to C3 convertase (C3bBb). Older studies (Conrad, D. H., Carlo, J. R., and Ruddy, S. (1978) J. Exp. Med. 147, 1792–1805; Pangburn, M. K., and Müller-Eberhard, H. J. (1978) Proc. Natl. Acad. Sci. U.S.A. 75, 2416–2420; Kazatchkine, M. D., Fearon, D. T., and Austen, K. F. (1979) J. Immunol. 122, 75–81) indicated that the complement alternative pathway regulator factor H (FH) competes with factor B for C3b binding; however, the capability of FH to prevent C3bB assembly has not been formally investigated. Moreover, in the few published studies FH did not favor C3bB dissociation. Whether FH may affect C3bBb formation from C3bB is unknown. We set up user-friendly assays based on combined microplate/Western blotting techniques that specifically detect either C3bB or C3bBb, with the aim of investigating the effect of FH on C3bB assembly and decay and C3bBb formation and decay. We document that FH does not affect C3bB assembly, indicating that FH does not efficiently compete with factor B for C3b binding. We also found that FH does not dissociate C3bB. FH showed a strong C3bBb decay-accelerating activity, as reported previously, and also exerted an apparent inhibitory effect on C3bBb formation. The latter effect was not fully attributable to a rapid FH-mediated dissociation of C3bBb complexes, because blocking decay with properdin and C3 nephritic factor did not restore C3bBb formation. FH almost completely prevented release of the smaller cleavage subunit of FB (Ba), without modifying the amount of C3bB complexes, suggesting that FH inhibits the conversion of C3bB to C3bBb. Thus, the inhibitory effect of FH on C3bBb formation is likely the sum of inhibition of C3bB conversion to C3bBb and of C3bBb decay acceleration. Further studies are required to confirm these findings in physiological cell-based settings. PMID:26903516
Performance of Nursing Awassi Ewes Fed Different Levels of Bread By-product
Obeidat, B. S.; Haddad, S. G.; Titi, H. H.; Abu Ishmais, M. A.; Telfah, B. T.
2012-01-01
Objective of this experiment was to evaluate the effect of partial substitution of barley grain with bread by-product (BB) on performance of Awassi ewes and their lambs. Forty Awassi ewes rearing single lambs were randomly allotted into four experimental diets containing various levels of BB. The experimental diets contained 0 (BB0), 10 (BB10), 15 (BB15), and 20% (BB20) of BB on dietary dry matter (DM). The study lasted for eight weeks, in which the first week was used as an adaptation period and seven weeks of data collection. Ewes and their lambs were penned individually where they were fed their lactating diets ad libitum. Ewes and lambs body weights were measured at the beginning and at the end of the experiment. However, milk production and composition were evaluated biweekly. Feeding BB had no effect (p>0.05) on dry matter (DM), organic matter (OM), and crude protein (CP) intakes. However, neutral detergent fiber (NDF) intake was the lowest (p<0.05) for the BB20 and BB15 diets followed to BB10 diet (i.e., 640, 677, 772 g/d, respectively) while the highest NDF intake was for the BB0 diet (i.e., 825 g/d). Similarly, NDF intake decreased linearly (p<0.001) as the BB content increased. Acid detergent fiber (ADF) intake was highest (p<0.05) for the BB0 and BB10 diets (425 and 416 g/d, respectively) followed by the BB15 and BB20 diets (359 and 342 g/d, respectively). Moreover, a linear (p<0.001), quadratic (p = 0.04), and cubic (p = 0.04) effects were observed in ADF intake among diets. Nutrient digestibility was similar among different diets. Bread by-product had no effect (p>0.05) on ewes body weight change and on lamb performance (i.e., weaning body weight and average daily gain). Similarly, no differences (p>0.05) were observed either in milk production or composition by the BB substitution. Inclusion of BB reduced feed cost by 9, 14, and 18% for the BB10, BB15, and BB20 diets, respectively. No differences were observed in milk efficiency (DM intake: milk production; p>0.05) among diets. However, cost of milk production ($US/kg milk) was the lowest (p<0.05) in the diet containing BB20. Results of the present study indicate that feeding bread by-product up to 20% of the diet DM had no effect on performance of Awassi ewes and their lambs and reduced feed cost. PMID:25049672
Effect of volatile oil from Blumea Balsamifera (L.) DC. leaves on wound healing in mice.
Pang, Yuxin; Wang, Dan; Hu, Xuan; Wang, Hui; Fu, Wanjin; Fan, Zuowang; Chen, Xiaolu; Yu, Fulai
2014-12-01
To assess the effectiveness of violate oil from Blumea Balsamifera (L.) DC. leaves (BB oil) on wound healing in mice. Undiluted BB oil and its diluted solutions with olive oil to 1/5 and 1/10 to yield BB oil1/5 and BB oil1/10 were applied to the wounded skin before wound healing conditions were assessed by healing rate, histopathology, and contents of collagen, hydroxyproline, and Neuropeptide Substance P (SP). All above results were compared with the efficacies of the control, pure olive oil, basic fibroblast growth factor (BFGF), and cream of Jing Wan Hong (JWH). BB oil1/5 and BB oil1/10 improved wound contraction and closure. Histopathology study further confirmed a desirable histological organization of wound tissues. BB oil1/5 and BB oil1/10 reduced the number of inflammatory cells, increased wound-healing rates, and significantly increased the hydroxyproline content. Both BB oil1/5 and BB oil1/10 improved formation of collagen, and reduced the frequency of fibroblasts. Moreover, BB oil1/5 and BB oil1/10 markedly promoted SP expression. However, undiluted BB oil may induce skin thickening and hardening, inhibite collagen synthesis and delay complete skin wound healing. The BB oil1/5 and BB oil1/10 promoted capillary regeneration, blood circulation, collagen deposition, granular tissue formation, epithelial deposition, and wound contraction. The mechanism underlying the action might be related to induction of SP secretion, and the proliferation and differentiation of mesenchymal cells.
Prospects of discovering stable double-heavy tetraquarks at a Tera-Z factory
NASA Astrophysics Data System (ADS)
Ali, Ahmed; Parkhomenko, Alexander Ya.; Qin, Qin; Wang, Wei
2018-07-01
Motivated by a number of theoretical considerations, predicting the deeply bound double-heavy tetraquarks T[ u bar d bar ]{ bb }, T[ u bar s bar ]{ bb } and T[ d bar s bar ]{ bb }, we explore the potential of their discovery at Tera-Z factories. Using the process Z → b b bar b b bar , we calculate, employing the Monte Carlo generators MadGraph5_aMC@NLO and Pythia6, the phase space configuration in which the bb pair is likely to fragment as a diquark. In a jet-cone, defined by an invariant mass interval mbb < M T[ q bar qbar‧ ]
Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)
2015-05-27
Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing Report Documentation Page Form ApprovedOMB No. 0704-0188 Public...2016 4. TITLE AND SUBTITLE Seaworthy Quantum Key Distribution Design and Validation (SEAKEY) 5a. CONTRACT NUMBER 5b. GRANT NUMBER 5c. PROGRAM
NASA Astrophysics Data System (ADS)
Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min
2016-01-01
Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.
Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min
2016-01-01
Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information. PMID:26823196
Yang, Yu-Guang; Xu, Peng; Yang, Rui; Zhou, Yi-Hua; Shi, Wei-Min
2016-01-29
Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate the capability of quantum Hash function, which can be constructed by subtly modifying quantum walks, a famous quantum computation model. It is found that quantum Hash function can act as a hash function for the privacy amplification process of quantum key distribution systems with higher security. As a byproduct, quantum Hash function can also be used for pseudo-random number generation due to its inherent chaotic dynamics. Further we discuss the application of quantum Hash function to image encryption and propose a novel image encryption algorithm. Numerical simulations and performance comparisons show that quantum Hash function is eligible for privacy amplification in quantum key distribution, pseudo-random number generation and image encryption in terms of various hash tests and randomness tests. It extends the scope of application of quantum computation and quantum information.
Multi-party Semi-quantum Key Agreement with Delegating Quantum Computation
NASA Astrophysics Data System (ADS)
Liu, Wen-Jie; Chen, Zhen-Yu; Ji, Sai; Wang, Hai-Bin; Zhang, Jun
2017-10-01
A multi-party semi-quantum key agreement (SQKA) protocol based on delegating quantum computation (DQC) model is proposed by taking Bell states as quantum resources. In the proposed protocol, the participants only need the ability of accessing quantum channel and preparing single photons {|0〉, |1〉, |+〉, |-〉}, while the complicated quantum operations, such as the unitary operations and Bell measurement, will be delegated to the remote quantum center. Compared with previous quantum key agreement protocols, this client-server model is more feasible in the early days of the emergence of quantum computers. In order to prevent the attacks from outside eavesdroppers, inner participants and quantum center, two single photon sequences are randomly inserted into Bell states: the first sequence is used to perform the quantum channel detection, while the second is applied to disorder the positions of message qubits, which guarantees the security of the protocol.
Multimode entanglement assisted QKD through a free-space maritime channel
NASA Astrophysics Data System (ADS)
Gariano, John; Djordjevic, Ivan B.
2017-10-01
When using quantum key distribution (QKD), one of the trade-offs for security is that the generation rate of a secret key is typically very low. Recent works have shown that using a weak coherent source allows for higher secret key generation rates compared to an entangled photon source, when a channel with low loss is considered. In most cases, the system that is being studied is over a fiber-optic communication channel. Here a theoretical QKD system using the BB92 protocol and entangled photons over a free-space maritime channel with multiple spatial modes is presented. The entangled photons are generated from a spontaneous parametric down conversion (SPDC) source of type II. To employ multiple spatial modes, the transmit apparatus will contain multiple SPDC sources, all driven by the pump lasers assumed to have the same intensity. The receive apparatuses will contain avalanche photo diodes (APD), modeled based on the NuCrypt CPDS-1000 detector, and located at the focal point of the receive aperture lens. The transmitter is assumed to be located at Alice and Bob will be located 30 km away, implying no channel crosstalk will be introduced in the measurements at Alice's side due to turbulence. To help mitigate the effects of atmospheric turbulence, adaptive optics will be considered at the transmitter and the receiver. An eavesdropper, Eve, is located 15 km from Alice and has no control over the devices at Alice or Bob. Eve is performing the intercept resend attack and listening to the communication over the public channel. Additionally, it is assumed that Eve can correct any aberrations caused by the atmospheric turbulence to determine which source the photon was transmitted from. One, four and nine spatial modes are considered with and without applying adaptive optics and compared to one another.
Mobasheri, Ali; Buhrmann, Constanze; Aldinger, Constance; Rad, Jafar Soleimani; Shakibaei, Mehdi
2011-01-01
Objective Interleukin-1β (IL-1β) is a pro-inflammatory cytokine that plays a key role in the pathogenesis of osteoarthritis (OA). Growth factors (GFs) capable of antagonizing the catabolic actions of cytokines may have therapeutic potential in the treatment of OA. Herein, we investigated the potential synergistic effects of insulin-like growth factor (IGF-1) and platelet-derived growth factor (PDGF-bb) on different mechanisms participating in IL-1β-induced activation of nuclear transcription factor-κB (NF-κB) and apoptosis in chondrocytes. Methods Primary chondrocytes were treated with IL-1β to induce dedifferentiation and co-treated with either IGF-1 or/and PDGF-bb and evaluated by immunoblotting and electron microscopy. Results Pretreatment of chondrocytes with IGF-1 or/and PDGF-bb suppressed IL-1β-induced NF-κB activation via inhibition of IκB-α kinase. Inhibition of IκB-α kinase by GFs led to the suppression of IκB-α phosphorylation and degradation, p65 nuclear translocation and NF-κB-regulated gene products involved in inflammation and cartilage degradation (COX-2, MMPs) and apoptosis (caspase-3). GFs or BMS-345541 (specific inhibitor of the IKK) reversed the IL-1β-induced down-regulation of collagen type II, cartilage specific proteoglycans, β1-integrin, Shc, activated MAPKinase, Sox-9 and up-regulation of active caspase-3. Furthermore, the inhibitory effects of IGF-1 or/and PDGF-bb on IL-1β-induced NF-κB activation were sensitive to inhibitors of Src (PP1), PI-3K (wortmannin) and Akt (SH-5), suggesting that the pathway consisting of non-receptor tyrosine kinase (Src), phosphatidylinositol 3-kinase and protein kinase B must be involved in IL-1β signaling. Conclusion The results presented suggest that IGF-1 and PDGF-bb are potent inhibitors of IL-1β-mediated activation of NF-κB and apoptosis in chondrocytes, may be mediated in part through suppression of Src/PI-3K/AKT pathway, which may contribute to their anti-inflammatory effects. PMID:22194879
Phenomenology of Heavy Quarkonia and Quantum Chromodynamics
NASA Astrophysics Data System (ADS)
Schmitz, Stefan Josef Anton
Heavy quarkonia, the cc, b(')b, and soon to be discovered t(')t families of states, are studied in the framework of potential theory. The earlier proposed, flavor independent "Riverside"-potential is fit to masses of cc and b(')b states and their electronic widths are calculated. An unusual feature of the potential is the use of a parameter b which controls the small r or "asymptotic freedom" behavior and which can be related to the QCD scale parameter (LAMDA)(,MS). This param- eter b is virtually undetermined by the cc and b(')b spectra, merely excluding the range b < 4 or (LAMDA)(,MS) < 120MeV and slightly favoring (LAMDA)(,MS) (DBLTURN) 250MeV. It is shown how even minimal information on the t(')t states will restrict the (LAMDA)(,MS) value to a range of the order of 50MeV. A recent Lattice Gauge potential shows a remarkable closeness to the phenomenological approach. In view of the approximations involved, the difference between the two potentials is small. This difference is investigated in terms of the strong coupling constant (alpha) which can be extracted from both potentials. In the main r regime the Lattice Gauge (alpha) is markedly smaller than the phenomenological one. It is shown that the absence of intermediate, virtual quark loops in the Lattice Gauge calculation, i.e. the so-called quenched approximation, accounts for at least some and possibly most of that difference. Overall, the phenomenology of heavy quarkonia as studied in this work is in no conflict with QCD.
Unconditional security of quantum key distribution over arbitrarily long distances
Lo; Chau
1999-03-26
Quantum key distribution is widely thought to offer unconditional security in communication between two users. Unfortunately, a widely accepted proof of its security in the presence of source, device, and channel noises has been missing. This long-standing problem is solved here by showing that, given fault-tolerant quantum computers, quantum key distribution over an arbitrarily long distance of a realistic noisy channel can be made unconditionally secure. The proof is reduced from a noisy quantum scheme to a noiseless quantum scheme and then from a noiseless quantum scheme to a noiseless classical scheme, which can then be tackled by classical probability theory.
Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States
NASA Astrophysics Data System (ADS)
Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan
2018-02-01
Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem (Q P K C) based on the Bell states. By H o l e v o's theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack (C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.
Bit-Oriented Quantum Public-Key Cryptosystem Based on Bell States
NASA Astrophysics Data System (ADS)
Wu, WanQing; Cai, QingYu; Zhang, HuanGuo; Liang, XiaoYan
2018-06-01
Quantum public key encryption system provides information confidentiality using quantum mechanics. This paper presents a quantum public key cryptosystem ( Q P K C) based on the Bell states. By H o l e v o' s theorem, the presented scheme provides the security of the secret key using one-wayness during the QPKC. While the QPKC scheme is information theoretic security under chosen plaintext attack ( C P A). Finally some important features of presented QPKC scheme can be compared with other QPKC scheme.
Quantum network with trusted and untrusted relays
NASA Astrophysics Data System (ADS)
Ma, Xiongfeng; Annabestani, Razieh; Fung, Chi-Hang Fred; Lo, Hoi-Kwong; Lütkenhaus, Norbert; PitkäNen, David; Razavi, Mohsen
2012-02-01
Quantum key distribution offers two distant users to establish a random secure key by exploiting properties of quantum mechanics, whose security has proven in theory. In practice, many lab and field demonstrations have been performed in the last 20 years. Nowadays, quantum network with quantum key distribution systems are tested around the world, such as in China, Europe, Japan and US. In this talk, I will give a brief introduction of recent development for quantum network. For the untrusted relay part, I will introduce the measurement-device-independent quantum key distribution scheme and a quantum relay with linear optics. The security of such scheme is proven without assumptions on the detection devices, where most of quantum hacking strategies are launched. This scheme can be realized with current technology. For the trusted relay part, I will introduce so-called delayed privacy amplification, with which no error correction and privacy amplification is necessarily to be performed between users and the relay. In this way, classical communications and computational power requirement on the relay site will be reduced.
Practical Quantum Cryptography for Secure Free-Space Communications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Buttler, W.T.; Hughes, R.J.; Kwiat, P.G.
1999-02-01
Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation overmore » a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.« less
FREE-SPACE QUANTUM CRYPTOGRAPHY IN DAYLIGHT
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, R.J.; Buttler, W.T.
2000-01-01
Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics and information-theoretically secure post-processing methods. An adversary can neither successfully tap the quantum transmissions, nor evade detection, owing to Heisenberg's uncertainty principle. In this paper we describe the theory of quantum cryptography, and the most recent results from our experimental free-space system with which we have demonstrated for the first time the feasibility of quantum key generation overmore » a point-to-point outdoor atmospheric path in daylight. We achieved a transmission distance of 0.5 km, which was limited only by the length of the test range. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on orbit. We present a feasibility analysis of surface-to-satellite quantum key generation.« less
Authenticated multi-user quantum key distribution with single particles
NASA Astrophysics Data System (ADS)
Lin, Song; Wang, Hui; Guo, Gong-De; Ye, Guo-Hua; Du, Hong-Zhen; Liu, Xiao-Fen
2016-03-01
Quantum key distribution (QKD) has been growing rapidly in recent years and becomes one of the hottest issues in quantum information science. During the implementation of QKD on a network, identity authentication has been one main problem. In this paper, an efficient authenticated multi-user quantum key distribution (MQKD) protocol with single particles is proposed. In this protocol, any two users on a quantum network can perform mutual authentication and share a secure session key with the assistance of a semi-honest center. Meanwhile, the particles, which are used as quantum information carriers, are not required to be stored, therefore the proposed protocol is feasible with current technology. Finally, security analysis shows that this protocol is secure in theory.
Quantum cryptography over underground optical fibers
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, R.J.; Luther, G.G.; Morgan, G.L.
1996-05-01
Quantum cryptography is an emerging technology in which two parties may simultaneously generated shared, secret cryptographic key material using the transmission of quantum states of light whose security is based on the inviolability of the laws of quantum mechanics. An adversary can neither successfully tap the key transmissions, nor evade detection, owing to Heisenberg`s uncertainty principle. In this paper the authors describe the theory of quantum cryptography, and the most recent results from their experimental system with which they are generating key material over 14-km of underground optical fiber. These results show that optical-fiber based quantum cryptography could allow secure,more » real-time key generation over ``open`` multi-km node-to-node optical fiber communications links between secure ``islands.``« less
Trojan horse attacks on counterfactual quantum key distribution
NASA Astrophysics Data System (ADS)
Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Sun, Shihai; Du, Yungang; Wu, Lingan
2016-04-01
There has been much interest in ;counterfactual quantum cryptography; (T.-G. Noh, 2009 [10]). It seems that the counterfactual quantum key distribution protocol without any photon carrier through the quantum channel provides practical security advantages. However, we show that it is easy to break counterfactual quantum key distribution systems in practical situations. We introduce the two types of Trojan horse attacks that are available for the two-way protocol and become possible for practical counterfactual systems with our eavesdropping schemes.
Device-independent quantum key distribution
NASA Astrophysics Data System (ADS)
Hänggi, Esther
2010-12-01
In this thesis, we study two approaches to achieve device-independent quantum key distribution: in the first approach, the adversary can distribute any system to the honest parties that cannot be used to communicate between the three of them, i.e., it must be non-signalling. In the second approach, we limit the adversary to strategies which can be implemented using quantum physics. For both approaches, we show how device-independent quantum key distribution can be achieved when imposing an additional condition. In the non-signalling case this additional requirement is that communication is impossible between all pairwise subsystems of the honest parties, while, in the quantum case, we demand that measurements on different subsystems must commute. We give a generic security proof for device-independent quantum key distribution in these cases and apply it to an existing quantum key distribution protocol, thus proving its security even in this setting. We also show that, without any additional such restriction there always exists a successful joint attack by a non-signalling adversary.
SeaQuaKE: Sea-Optimized Quantum Key Exchange
2014-08-01
which is led by Applied Communications Sciences under the ONR Free Space Optical Quantum Key Distribution Special Notice (13-SN-0004 under ONRBAA13...aerosol model scenarios. 15. SUBJECT TERMS Quantum communications, free - space optical communications 16. SECURITY CLASSIFICATION OF: 17...SeaQuaKE) project, which is led by Applied Communications Sciences under the ONR Free Space Optical Quantum Key Distribution Special Notice (13-SN
NASA Astrophysics Data System (ADS)
Bartkiewicz, Karol; Černoch, Antonín; Lemr, Karel; Miranowicz, Adam; Nori, Franco
2016-06-01
Temporal steering, which is a temporal analog of Einstein-Podolsky-Rosen steering, refers to temporal quantum correlations between the initial and final state of a quantum system. Our analysis of temporal steering inequalities in relation to the average quantum bit error rates reveals the interplay between temporal steering and quantum cloning, which guarantees the security of quantum key distribution based on mutually unbiased bases against individual attacks. The key distributions analyzed here include the Bennett-Brassard 1984 protocol and the six-state 1998 protocol by Bruss. Moreover, we define a temporal steerable weight, which enables us to identify a kind of monogamy of temporal correlation that is essential to quantum cryptography and useful for analyzing various scenarios of quantum causality.
Cho, John S; Fang, Terry C; Reynolds, Taylor L; Sofia, Daniel J; Hamann, Stefan; Burkly, Linda C
2016-01-01
Systemic sclerosis (SSc) is a chronic autoimmune disorder that can result in extensive tissue damage in the skin and, in advanced cases, internal organs. Vasculopathy, aberrant immune activation, and tissue fibrosis are three hallmarks of the disease that have been identified, with vasculopathy and aberrant immunity being amongst the earliest events. However, a mechanistic link between these processes has not been established. Here, we have identified a novel role of platelet derived growth factor-BB (PDGF-BB)/PDGFRβ activation in combination with dermal injury induced by bleomycin as a driver of early, aberrant expression of interferon stimulatory genes (ISGs) and inflammatory monocyte infiltration. Activation of PDGFRβ in combination with bleomycin-induced dermal injury resulted in increased dermal thickness, vascular density, monocyte/macrophage infiltration, and exacerbation of tissue injury. Many of these features were dependent on IFNAR-signaling, and an increase in the number of interferon-beta (IFN-β) producing monocytes cells was found in the skin lesions. Taken together, these results identify a novel link between PDGFRβ activation, and Type I IFN-driven vascular maintenance and monocyte/macrophage cell recruitment, and provide a potential explanation linking key features of SSc that were previously thought to be unrelated.
NASA Astrophysics Data System (ADS)
Huang, Xu; Xu, Meng-Qi; Zhang, Wei; Ma, Sai; Guo, Weisheng; Wang, Yabin; Zhang, Yan; Gou, Tiantian; Chen, Yundai; Liang, Xing-Jie; Cao, Feng
2017-05-01
The proliferation of vascular smooth muscle cells (VSMCs) is one of the key events during the progress of atherosclerosis. The activated liver X receptor (LXR) signalling pathway is demonstrated to inhibit platelet-derived growth factor BB (PDGF-BB)-induced VSMC proliferation. Notably, following PDGF-BB stimulation, the expression of intercellular adhesion molecule-1 (ICAM-1) by VSMCs increases significantly. In this study, anti-ICAM-1 antibody-conjugated liposomes were fabricated for targeted delivery of a water-insoluble LXR agonist (T0901317) to inhibit VSMC proliferation. The liposomes were prepared by filming-rehydration method with uniform size distribution and considerable drug entrapment efficiency. The targeting effect of the anti-ICAM-T0901317 liposomes was evaluated by confocal laser scanning microscope (CLSM) and flow cytometry. Anti-ICAM-T0901317 liposomes showed significantly higher inhibition effect of VSMC proliferation than free T0901317 by CCk8 proliferation assays and BrdU staining. Western blot assay further confirmed that anti-ICAM-T0901317 liposomes inhibited retinoblastoma (Rb) phosphorylation and MCM6 expression. In conclusion, this study identified anti-ICAM-T0901317 liposomes as a promising nanotherapeutic approach to overcome VSMC proliferation during atherosclerosis progression.
Lee, Jongman; Yoo, James J.; Atala, Anthony; Lee, Sang Jin
2013-01-01
Heparin-conjugated electrospun poly(ε-caprolactone) (PCL)/gelatin scaffolds were developed to provide controlled release of platelet-derived growth factor-BB (PDGF-BB) and allow prolonged bioactivity of this molecule. A mixture of PCL and gelatin was electrospun into three different morphologies. Next, heparin molecules were conjugated to the reactive surface of the scaffolds. This heparin-conjugated scaffold allowed the immobilization of PDGF-BB via electrostatic interaction. In vitro PDGF-BB release profiles indicated that passive physical adsorption of PDGF-BB to non-heparinized scaffolds resulted in an initial burst release of PDGF-BB within 5 days, which then leveled off. However, electrostatic interaction between PDGF-BB and the heparin-conjugated scaffolds gave rise to a sustained release of PDGF-BB over the course of 20 days without an initial burst. Moreover, PDGF-BB that was strongly bound to the heparin-conjugated scaffolds enhanced smooth muscle cell (SMC) proliferation. In addition, scaffolds composed of 3.0 µm diameter fibers that were immobilized with PDGF-BB accelerated SMC infiltration into the scaffold when compared to scaffolds composed of smaller diameter fibers or scaffolds that did not release PDGF-BB. We concluded that the combination of the large pore structure in the scaffolds and the heparin-mediated delivery of PDGF-BB provided the most effective cellular interactions through synergistic physical and chemical cues. PMID:22770570
Deterministic MDI QKD with two secret bits per shared entangled pair
NASA Astrophysics Data System (ADS)
Zebboudj, Sofia; Omar, Mawloud
2018-03-01
Although quantum key distribution schemes have been proven theoretically secure, they are based on assumptions about the devices that are not yet satisfied with today's technology. The measurement-device-independent scheme has been proposed to shorten the gap between theory and practice by removing all detector side-channel attacks. On the other hand, two-way quantum key distribution schemes have been proposed to raise the secret key generation rate. In this paper, we propose a new quantum key distribution scheme able to achieve a relatively high secret key generation rate based on two-way quantum key distribution that also inherits the robustness of the measurement-device-independent scheme against detector side-channel attacks.
4-1BB regulates NKG2D costimulation in human cord blood CD8+ T cells.
Kim, Young-June; Han, Myung-Kwan; Broxmeyer, Hal E
2008-02-01
Ligation of NKG2D, a potent costimulatory receptor, can be either beneficial or detrimental to CD8(+) cytotoxic T cell (CTL) responses. Factors for these diverse NKG2D effects remain elusive. In this study, we demonstrate that 4-1BB, another costimulatory receptor, is an essential regulator of NKG2D in CD8(+) T cells. Costimulation of NKG2D caused down-modulation of NKG2D, but induced 4-1BB expression on the cell surface, even in the presence of TGF-beta1, which inhibits 4-1BB expression. Resulting NKG2D(-)4-1BB(+) cells were activated but still in an immature state with low cytotoxic activity. However, subsequent 4-1BB costimulation induced cytotoxic activity and restored down-modulated NKG2D. The cytotoxic activity and NKG2D expression induced by 4-1BB on NKG2D(+)4-1BB(+) cells were refractory to TGF-beta1 down-modulation. Such 4-1BB effects were enhanced by IL-12. In contrast, in the presence of IL-4, 4-1BB effects were abolished because IL-4 down-modulated NKG2D and 4-1BB expression in cooperation with TGF-beta1, generating another CD8(+) T-cell type lacking both NKG2D and 4-1BB. These NKG2D(-)4-1BB(-) cells were inert and unable to gain cytotoxic activity. Our results suggest that 4-1BB plays a critical role in protecting NKG2D from TGF-beta1-mediated down-modulation. Co-expression of NKG2D and 4-1BB may represent an important biomarker for defining competency of tumor infiltrating CD8(+) T cells.
Multi-party semi-quantum key distribution-convertible multi-party semi-quantum secret sharing
NASA Astrophysics Data System (ADS)
Yu, Kun-Fei; Gu, Jun; Hwang, Tzonelih; Gope, Prosanta
2017-08-01
This paper proposes a multi-party semi-quantum secret sharing (MSQSS) protocol which allows a quantum party (manager) to share a secret among several classical parties (agents) based on GHZ-like states. By utilizing the special properties of GHZ-like states, the proposed scheme can easily detect outside eavesdropping attacks and has the highest qubit efficiency among the existing MSQSS protocols. Then, we illustrate an efficient way to convert the proposed MSQSS protocol into a multi-party semi-quantum key distribution (MSQKD) protocol. The proposed approach is even useful to convert all the existing measure-resend type of semi-quantum secret sharing protocols into semi-quantum key distribution protocols.
Long-distance continuous-variable quantum key distribution by controlling excess noise
NASA Astrophysics Data System (ADS)
Huang, Duan; Huang, Peng; Lin, Dakai; Zeng, Guihua
2016-01-01
Quantum cryptography founded on the laws of physics could revolutionize the way in which communication information is protected. Significant progresses in long-distance quantum key distribution based on discrete variables have led to the secure quantum communication in real-world conditions being available. However, the alternative approach implemented with continuous variables has not yet reached the secure distance beyond 100 km. Here, we overcome the previous range limitation by controlling system excess noise and report such a long distance continuous-variable quantum key distribution experiment. Our result paves the road to the large-scale secure quantum communication with continuous variables and serves as a stepping stone in the quest for quantum network.
Long-distance continuous-variable quantum key distribution by controlling excess noise.
Huang, Duan; Huang, Peng; Lin, Dakai; Zeng, Guihua
2016-01-13
Quantum cryptography founded on the laws of physics could revolutionize the way in which communication information is protected. Significant progresses in long-distance quantum key distribution based on discrete variables have led to the secure quantum communication in real-world conditions being available. However, the alternative approach implemented with continuous variables has not yet reached the secure distance beyond 100 km. Here, we overcome the previous range limitation by controlling system excess noise and report such a long distance continuous-variable quantum key distribution experiment. Our result paves the road to the large-scale secure quantum communication with continuous variables and serves as a stepping stone in the quest for quantum network.
Long-distance continuous-variable quantum key distribution by controlling excess noise
Huang, Duan; Huang, Peng; Lin, Dakai; Zeng, Guihua
2016-01-01
Quantum cryptography founded on the laws of physics could revolutionize the way in which communication information is protected. Significant progresses in long-distance quantum key distribution based on discrete variables have led to the secure quantum communication in real-world conditions being available. However, the alternative approach implemented with continuous variables has not yet reached the secure distance beyond 100 km. Here, we overcome the previous range limitation by controlling system excess noise and report such a long distance continuous-variable quantum key distribution experiment. Our result paves the road to the large-scale secure quantum communication with continuous variables and serves as a stepping stone in the quest for quantum network. PMID:26758727
A Secure Key Distribution System of Quantum Cryptography Based on the Coherent State
NASA Technical Reports Server (NTRS)
Guo, Guang-Can; Zhang, Xiao-Yu
1996-01-01
The cryptographic communication has a lot of important applications, particularly in the magnificent prospects of private communication. As one knows, the security of cryptographic channel depends crucially on the secrecy of the key. The Vernam cipher is the only cipher system which has guaranteed security. In that system the key must be as long as the message and most be used only once. Quantum cryptography is a method whereby key secrecy can be guaranteed by a physical law. So it is impossible, even in principle, to eavesdrop on such channels. Quantum cryptography has been developed in recent years. Up to now, many schemes of quantum cryptography have been proposed. Now one of the main problems in this field is how to increase transmission distance. In order to use quantum nature of light, up to now proposed schemes all use very dim light pulses. The average photon number is about 0.1. Because of the loss of the optical fiber, it is difficult for the quantum cryptography based on one photon level or on dim light to realize quantum key-distribution over long distance. A quantum key distribution based on coherent state is introduced in this paper. Here we discuss the feasibility and security of this scheme.
Tang, Lanhua; Xia, Zhuying; Luo, Zhongwei; Long, Haitao; Zhu, Yong; Zhao, Shushan
2017-08-01
Objective This study aimed to investigate the association between low plasma Platelet-derived growth factor-BB (PDGF-BB) levels and oestradiol in Postmenopausal osteoporosis (PMOP). Methods This prospective study measured plasma PDGF-BB and oestradiol levels in outpatients who were admitted to our hospital. Participants were screened and then allocated to three groups: normal young women, postmenopausal control, and PMOP. Additionally, Sprague-Dawley rats underwent either sham surgery or bilateral ovariectomy (OVX), and were divided into the following groups: sham, OVX, OVX + oestradiol, and OVX + PDGF-BB. Plasma oestradiol and PDGF-BB levels were measured using commercially available ELISA kits. Results A total of 121 participants, including 69 normal young women, 28 patients with primary PMOP, and 24 age-matched postmenopausal women were enrolled. Plasma oestradiol and PDGF-BB levels were lower in postmenopausal women, especially in PMOP ( P < 0.01). Pearson correlations analysis showed that PDGF-BB levels were positively correlated with oestradiol levels and inversely correlated with age ( P < 0.01). The OVX rat model showed that oestradiol replacement increased plasma PDGF-BB levels, while PDGF-BB systematic treatment had no effect on plasma oestradiol levels. Conclusions Plasma PDGF-BB levels are maintained by oestrogen in normal young women and play a major role in PMOP.
One Step Quantum Key Distribution Based on EPR Entanglement.
Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao
2016-06-30
A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper's attack would introduce at least an error rate of 46.875%. Compared with the "Ping-pong" protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step.
Secure communications using quantum cryptography
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.
1997-08-01
The secure distribution of the secret random bit sequences known as {open_quotes}key{close_quotes} material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is an emerging technology for secure key distribution with single-photon transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). We have developed experimental quantum cryptography systems based on the transmission of non-orthogonal single-photon states to generate shared key material over multi-kilometer optical fiber paths and over line-of-sight links. In both cases, key material is built up using the transmission of a single-photon per bit ofmore » an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. In our optical fiber experiment we have performed quantum key distribution over 24-km of underground optical fiber using single-photon interference states, demonstrating that secure, real-time key generation over {open_quotes}open{close_quotes} multi-km node-to-node optical fiber communications links is possible. We have also constructed a quantum key distribution system for free-space, line-of-sight transmission using single-photon polarization states, which is currently undergoing laboratory testing. 7 figs.« less
Overcoming the rate-distance limit of quantum key distribution without quantum repeaters.
Lucamarini, M; Yuan, Z L; Dynes, J F; Shields, A J
2018-05-01
Quantum key distribution (QKD) 1,2 allows two distant parties to share encryption keys with security based on physical laws. Experimentally, QKD has been implemented via optical means, achieving key rates of 1.26 megabits per second over 50 kilometres of standard optical fibre 3 and of 1.16 bits per hour over 404 kilometres of ultralow-loss fibre in a measurement-device-independent configuration 4 . Increasing the bit rate and range of QKD is a formidable, but important, challenge. A related target, which is currently considered to be unfeasible without quantum repeaters 5-7 , is overcoming the fundamental rate-distance limit of QKD 8 . This limit defines the maximum possible secret key rate that two parties can distil at a given distance using QKD and is quantified by the secret-key capacity of the quantum channel 9 that connects the parties. Here we introduce an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station. Fields imparted with the same random phase are 'twins' and can be used to distil a quantum key. The key rate of this twin-field QKD exhibits the same dependence on distance as does a quantum repeater, scaling with the square-root of the channel transmittance, irrespective of who (malicious or otherwise) is in control of the measuring station. However, unlike schemes that involve quantum repeaters, ours is feasible with current technology and presents manageable levels of noise even on 550 kilometres of standard optical fibre. This scheme is a promising step towards overcoming the rate-distance limit of QKD and greatly extending the range of secure quantum communications.
NASA Astrophysics Data System (ADS)
Yang, Can; Ma, Cheng; Hu, Linxi; He, Guangqiang
2018-06-01
We present a hierarchical modulation coherent communication protocol, which simultaneously achieves classical optical communication and continuous-variable quantum key distribution. Our hierarchical modulation scheme consists of a quadrature phase-shifting keying modulation for classical communication and a four-state discrete modulation for continuous-variable quantum key distribution. The simulation results based on practical parameters show that it is feasible to transmit both quantum information and classical information on a single carrier. We obtained a secure key rate of 10^{-3} bits/pulse to 10^{-1} bits/pulse within 40 kilometers, and in the meantime the maximum bit error rate for classical information is about 10^{-7}. Because continuous-variable quantum key distribution protocol is compatible with standard telecommunication technology, we think our hierarchical modulation scheme can be used to upgrade the digital communication systems to extend system function in the future.
Exotic Phenomena in Quantum limit in nodal-line semimetal ZrSiS
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hu, Jin; Liu, Jinyu; Mao, Zhiqiang
2017-03-01
In quantum limit, all carriers condense to the lowest Landau level, leading to possible exotic quantum phenomena such as Lifshitz transition and density waves. Usually, quantum limit is not easily achieved due to relatively large Fermi surface in metals. Fortunately, the nodal-line semimetal ZrSiS possesses a very small Fermi pocket with a characteristic quantum oscillation frequency of 8.4T, which represents the 2D Dirac states protected by non-symmorphic symmetry. The quantum limit of such Dirac bands can be reached in moderate magnetic field ~25T, indicating that ZrSiS could be a nice platform to explore the novel quantum phenomena of Dirac fermionsmore » in quantum limit.« less
DOE Office of Scientific and Technical Information (OSTI.GOV)
Lu Hua; Department of Mathematics and Physics, Hubei University of Technology, Wuhan 430068; Fung, Chi-Hang Fred
2011-10-15
In a deterministic quantum key distribution (DQKD) protocol with a two-way quantum channel, Bob sends a qubit to Alice who then encodes a key bit onto the qubit and sends it back to Bob. After measuring the returned qubit, Bob can obtain Alice's key bit immediately, without basis reconciliation. Since an eavesdropper may attack the qubits traveling on either the Bob-Alice channel or the Alice-Bob channel, the security analysis of DQKD protocol with a two-way quantum channel is complicated and its unconditional security has been controversial. This paper presents a security proof of a single-photon four-state DQKD protocol against generalmore » attacks.« less
Performance Analysis and Optimization of the Winnow Secret Key Reconciliation Protocol
2011-06-01
use in a quantum key system can be defined in two ways : The number of messages passed between Alice and Bob The...classical and quantum environment. Post- quantum cryptography , which is generally used to describe classical quantum -resilient protocols, includes...composed of a one- way quantum channel and a two - way classical channel. Owing to the physics of the channel, the quantum channel is subject to
Developmental GPR mine detection technology known as Balanced Bridge
NASA Astrophysics Data System (ADS)
Sherbondy, Kelly D.; Lang, David A.
1995-06-01
The Balanced Bridge (BB) detection concept was developed just after the end of WWII. It has been researched for many years since then but it has never truly overcome the following inherent problems: sensitivity to antenna height and tilt variations, detectability of flush mines, sensitivity to soil moisture content, high false alarms, and most importantly, the inability to detect small anti-personnel (AP) mines. Even with all of these shortcomings, the BB sensor technology is still one of the most promising electrmagnetic mine detection systems. This paper will address a new BB detector and its preliminary field performance compared to earlier BB research. The new BB detector has superior capabilities compared to earlier BB efforts involving single frequency or single octave excitation because the new BB operates over a multi-octave bandwidth. The new BB detector also incorporates audio and visual presentations of digitally processed signals where earlier versions only had an audible announcement derived from a simple thresholding algorithm. New BB designs addressing previous BB deficiencies will also be discussed. Design changes include using a broadband printed circuit board antenna, RF transmit and receive components, and a digital signal processor. This new BB detector will be tested at an Advanced Technology Demonstration (ATD) evaluation in FY95. The ATD exit criteria will be discussed and compared to recent field testing of the new BB detector. Preliminary results with the new BB system have demonstrated encouraging results which will be incorporated in this paper.
Fundamental finite key limits for one-way information reconciliation in quantum key distribution
NASA Astrophysics Data System (ADS)
Tomamichel, Marco; Martinez-Mateo, Jesus; Pacher, Christoph; Elkouss, David
2017-11-01
The security of quantum key distribution protocols is guaranteed by the laws of quantum mechanics. However, a precise analysis of the security properties requires tools from both classical cryptography and information theory. Here, we employ recent results in non-asymptotic classical information theory to show that one-way information reconciliation imposes fundamental limitations on the amount of secret key that can be extracted in the finite key regime. In particular, we find that an often used approximation for the information leakage during information reconciliation is not generally valid. We propose an improved approximation that takes into account finite key effects and numerically test it against codes for two probability distributions, that we call binary-binary and binary-Gaussian, that typically appear in quantum key distribution protocols.
Finite key analysis for symmetric attacks in quantum key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Meyer, Tim; Kampermann, Hermann; Kleinmann, Matthias
2006-10-15
We introduce a constructive method to calculate the achievable secret key rate for a generic class of quantum key distribution protocols, when only a finite number n of signals is given. Our approach is applicable to all scenarios in which the quantum state shared by Alice and Bob is known. In particular, we consider the six state protocol with symmetric eavesdropping attacks, and show that for a small number of signals, i.e., below n{approx}10{sup 4}, the finite key rate differs significantly from the asymptotic value for n{yields}{infinity}. However, for larger n, a good approximation of the asymptotic value is found.more » We also study secret key rates for protocols using higher-dimensional quantum systems.« less
NASA Astrophysics Data System (ADS)
Diamanti, Eleni; Takesue, Hiroki; Langrock, Carsten; Fejer, M. M.; Yamamoto, Yoshihisa
2006-12-01
We present a quantum key distribution experiment in which keys that were secure against all individual eavesdropping attacks allowed by quantum mechanics were distributed over 100 km of optical fiber. We implemented the differential phase shift quantum key distribution protocol and used low timing jitter 1.55 µm single-photon detectors based on frequency up-conversion in periodically poled lithium niobate waveguides and silicon avalanche photodiodes. Based on the security analysis of the protocol against general individual attacks, we generated secure keys at a practical rate of 166 bit/s over 100 km of fiber. The use of the low jitter detectors also increased the sifted key generation rate to 2 Mbit/s over 10 km of fiber.
AlTaan, S L; Mohammed, I; Said, D G; Dua, H S
2018-01-01
PurposeTo measure the pressure and volume of air required to create a big bubble (BB) in simulated deep anterior lamellar keratoplasty (DALK) in donor eyes and ascertain the bursting pressure of the BB.Patients and methodsTwenty-two human sclera-corneal discs were used. Air was injected into the corneal stroma to create a BB and the pressure measured by means of a pressure converter attached to the system via a side port. A special clamp was designed to prevent air leak from the periphery of the discs. The pressure at which air emerged in the corneal tissue; the bursting pressure measured after advancing the needle into the bubble cavity and injecting more air; the volume of air required to create a BB and the volume of the BB were ascertained.ResultsType-1 BB were achieved in 19 and type-2 BB in 3 eyes. The maximum pressure reached to create a BB was 96.25+/- 21.61 kpa; the mean type-1 intrabubble pressure was 10.16 +/- 3.65 kpa. The mean bursting pressure of a type-1 BB was 66.65 +/- 18.65 kpa, while that of a type-2 BB was 14.77 +/- 2.44 kpa. The volume of air required to create a type-1 BB was 0.54 ml and the volume of a type-1 BB was consistently 0.1 ml.ConclusionsDua's layer baring DALK can withstand high intraoperative pressures compared to Descemet's membrane baring DALK. The study suggests that it could be safe to undertake procedures such as DALK-triple with a type-1 BB but not with a type-2 BB.
Device-independent secret-key-rate analysis for quantum repeaters
NASA Astrophysics Data System (ADS)
Holz, Timo; Kampermann, Hermann; Bruß, Dagmar
2018-01-01
The device-independent approach to quantum key distribution (QKD) aims to establish a secret key between two or more parties with untrusted devices, potentially under full control of a quantum adversary. The performance of a QKD protocol can be quantified by the secret key rate, which can be lower bounded via the violation of an appropriate Bell inequality in a setup with untrusted devices. We study secret key rates in the device-independent scenario for different quantum repeater setups and compare them to their device-dependent analogon. The quantum repeater setups under consideration are the original protocol by Briegel et al. [Phys. Rev. Lett. 81, 5932 (1998), 10.1103/PhysRevLett.81.5932] and the hybrid quantum repeater protocol by van Loock et al. [Phys. Rev. Lett. 96, 240501 (2006), 10.1103/PhysRevLett.96.240501]. For a given repeater scheme and a given QKD protocol, the secret key rate depends on a variety of parameters, such as the gate quality or the detector efficiency. We systematically analyze the impact of these parameters and suggest optimized strategies.
In-band-pumped Ho:KLu(WO4)2 microchip laser with 84% slope efficiency.
Loiko, Pavel; Serres, Josep Maria; Mateos, Xavier; Yumashev, Konstantin; Kuleshov, Nikolai; Petrov, Valentin; Griebner, Uwe; Aguiló, Magdalena; Díaz, Francesc
2015-02-01
We report on a continuous-wave Ho:KLu(WO4)2 (KLuW) microchip laser with a record slope efficiency of 84%, the highest value among the holmium inband-pumped lasers, delivering 201 mW output power at 2105 nm. The Ho laser operating at room temperature on the (5)I8→(5)I7 transition is in-band-pumped by a diode-pumped Tm:KLuW microchip laser at 1946 nm. Ho:KLuW laser operation at 2061 and 2079 nm is also demonstrated with a maximum slope efficiency of 79%. The microchip laser generates an almost diffraction-limited output beam with a Gaussian profile and a M2<1.1. The laser performance of the Ng-cut Ho:KLuW crystal is very similar for pump light polarizations ‖Nm and Np. The positive thermal lens plays a key role in the laser mode stabilization and proper mode-matching. The latter, together with the low quantum defect under in-band-pumping (∼0.08), is responsible for the extraordinary high slope efficiency.
Zhu, Yuyan; Bickford, Paula C.; Sanberg, Paul; Giunta, Brian
2008-01-01
Abstract Alzheimer's Disease (AD) is the most common age-related dementia, with a current prevalence in excess of five million individuals in the United States. The aggregation of amyloid-beta (Aβ) into fibrillar amyloid plaques is a key pathological event in the development of the disease. Microglial proinflammatory activation is widely known to cause neuronal and synaptic damage that correlates with cognitive impairment in AD. However, current pharmacological attempts at reducing neuroinflammation mediated via microglial activation have been largely negative in terms of slowing AD progression. Previously, we have shown that microglia express proinflammatory cytokines and a reduced capacity to phagocytose Aβ in the context of CD40, Aβ peptides and/or lipopolysaccharide (LPS) stimulation, a phenomenon that can be opposed by attenuation of p44/42 mitogen-activated protein kinase (MAPK) signaling. Other groups have found that blueberry (BB) extract both inhibits phosphorylation of this MAPK module and also improves cognitive deficits in AD model mice. Given these considerations and the lack of reduced Aβ quantities in behaviorally improved BB-fed mice, we wished to determine whether BB supplementation would alter the microglial proinflammatory activation state in response to Aβ. We found that BB significantly enhances microglial clearance of Aβ, inhibits aggregation of Aβ1–42, and suppresses microglial activation, all via suppression of the p44/42 MAPK module. Thus, these data may explain the previously observed behavioral recovery in PSAPP mice and suggest a means by which dietary supplementation could mitigate an undesirable microglial response toward fibrillar Aβ. PMID:18789000
NASA Astrophysics Data System (ADS)
Sukkabot, Worasak; Pinsook, Udomsilp
2017-01-01
Using the atomistic tight-binding theory (TB) and a configuration interaction description (CI), we numerically compute the excitonic splitting of CdX(X = Se, S and Te)/ZnS core/shell nanocrystals with the objective to explain how types of the core materials and growth shell thickness can provide the detailed manipulation of the dark-dark (DD), dark-bright (DB) and bright-bright (BB) excitonic splitting, beneficial for the active application of quantum information. To analyze the splitting of the excitonic states, the optical band gaps, ground-state wave function overlaps and atomistic electron-hole interactions tend to be numerically demonstrated. Based on the atomistic computations, the single-particle and excitonic gaps are mainly reduced with the increasing ZnS shell thickness owing to the quantum confinement. In the range of the higher to lower energies, the order of the single-particle gaps is CdSe/ZnS, CdS/ZnS and CdTe/ZnS core/shell nanocrystals, while one of the excitonic gaps is CdS/ZnS, CdSe/ZnS and CdTe/ZnS core/shell nanocrystals because of the atomistic electron-hole interaction. The strongest electron-hole interactions are mainly observed in CdSe/ZnS core/shell nanocrystals. In addition, the computational results underline that the energies of the dark-dark (DD), dark-bright (DB) and bright-bright (BB) excitonic splitting are generally reduced with the increasing ZnS growth shell thickness as described by the trend of the electron-hole exchange interaction. The high-to-low splitting of the excitonic states is demonstrated in CdSe/ZnS, CdTe/ZnS and CdS/ZnS core/shell nanocrystals because of the fashion in the electron-hole exchange interaction and overlaps of the electron-hole wave functions. As the resulting calculations, it is expected that CdS/ZnS core/shell nanocrystals are the best candidates to be the source of entangled photons. Finally, the comprehensive information on the excitonic splitting can enable the use of suitable core/shell nanocrystals for the entangled photons in the application of quantum information.
Continuous QKD and high speed data encryption
NASA Astrophysics Data System (ADS)
Zbinden, Hugo; Walenta, Nino; Guinnard, Olivier; Houlmann, Raphael; Wen, Charles Lim Ci; Korzh, Boris; Lunghi, Tommaso; Gisin, Nicolas; Burg, Andreas; Constantin, Jeremy; Legré, Matthieu; Trinkler, Patrick; Caselunghe, Dario; Kulesza, Natalia; Trolliet, Gregory; Vannel, Fabien; Junod, Pascal; Auberson, Olivier; Graf, Yoan; Curchod, Gilles; Habegger, Gilles; Messerli, Etienne; Portmann, Christopher; Henzen, Luca; Keller, Christoph; Pendl, Christian; Mühlberghuber, Michael; Roth, Christoph; Felber, Norbert; Gürkaynak, Frank; Schöni, Daniel; Muheim, Beat
2013-10-01
We present the results of a Swiss project dedicated to the development of high speed quantum key distribution and data encryption. The QKD engine features fully automated key exchange, hardware key distillation based on finite key security analysis, efficient authentication and wavelength division multiplexing of the quantum and the classical channel and one-time pas encryption. The encryption device allows authenticated symmetric key encryption (e.g AES) at rates of up to 100 Gb/s. A new quantum key can uploaded up to 1000 times second from the QKD engine.
1972-01-21
42 42.6 c.zo2 42.0 42. 7 42.7 A 28 43.6 42.1 42.8 4,. 42.9 4.9 2: +oo & ,,Z _A,* . -a, .. AJ.3 - , I6. &q. td .II IF ;+ S6 i 45- 7’ 4 + + 1 -fi-k.A 65...DB’W’B’,D Blb Wet BbD P-....9/69 . 8 8/ 87 6 _. 1_ 1 1 84/ 1 ’__ -1 3 ._ , 4 80/ 79 , . .8 1.1 20 2o 787/ 77!____ 4 3__7 7- .2 .8 .l, .e 1 . 43 72/ 1 2
Counterfactual quantum key distribution with high efficiency
NASA Astrophysics Data System (ADS)
Sun, Ying; Wen, Qiao-Yan
2010-11-01
In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.
Counterfactual quantum key distribution with high efficiency
DOE Office of Scientific and Technical Information (OSTI.GOV)
Sun Ying; Beijing Electronic Science and Technology Institute, Beijing 100070; Wen Qiaoyan
2010-11-15
In a counterfactual quantum key distribution scheme, a secret key can be generated merely by transmitting the split vacuum pulses of single particles. We improve the efficiency of the first quantum key distribution scheme based on the counterfactual phenomenon. This scheme not only achieves the same security level as the original one but also has higher efficiency. We also analyze how to achieve the optimal efficiency under various conditions.
Quantum Cryptography for Secure Communications to Low-Earth Orbit Satellites
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.
1999-06-03
This is the final report of a three-year, Laboratory Directed Research and Development (LDRD) project at Los Alamos National Laboratory (LANL). Quantum cryptography is an emerging technology in which two parties may simultaneously generate shared, secret cryptographic key material using the transmission of quantum states of light. The security of these transmissions is based on the inviolability of the laws of quantum mechanics. An adversary can neither successfully tap the quantum transmissions, nor evade detection. Key material is built up using the transmission of a single-photon per bit. We have developed an experimental quantum cryptography system based on the transmissionmore » of non-orthogonal single-photon polarization states to generate shared key material over line-of-sight optical links. Our results provide strong evidence that cryptographic key material could be generated on demand between a ground station and a satellite (or between two satellites), allowing a satellite to be securely re-keyed on in orbit.« less
Experimental quantum cryptography with qutrits
NASA Astrophysics Data System (ADS)
Gröblacher, Simon; Jennewein, Thomas; Vaziri, Alipasha; Weihs, Gregor; Zeilinger, Anton
2006-05-01
We produce two identical keys using, for the first time, entangled trinary quantum systems (qutrits) for quantum key distribution. The advantage of qutrits over the normally used binary quantum systems is an increased coding density and a higher security margin. The qutrits are encoded into the orbital angular momentum of photons, namely Laguerre Gaussian modes with azimuthal index l + 1, 0 and -1, respectively. The orbital angular momentum is controlled with phase holograms. In an Ekert-type protocol the violation of a three-dimensional Bell inequality verifies the security of the generated keys. A key is obtained with a qutrit error rate of approximately 10%.
One Step Quantum Key Distribution Based on EPR Entanglement
Li, Jian; Li, Na; Li, Lei-Lei; Wang, Tao
2016-01-01
A novel quantum key distribution protocol is presented, based on entanglement and dense coding and allowing asymptotically secure key distribution. Considering the storage time limit of quantum bits, a grouping quantum key distribution protocol is proposed, which overcomes the vulnerability of first protocol and improves the maneuverability. Moreover, a security analysis is given and a simple type of eavesdropper’s attack would introduce at least an error rate of 46.875%. Compared with the “Ping-pong” protocol involving two steps, the proposed protocol does not need to store the qubit and only involves one step. PMID:27357865
Experimental demonstration of subcarrier multiplexed quantum key distribution system.
Mora, José; Ruiz-Alba, Antonio; Amaya, Waldimar; Martínez, Alfonso; García-Muñoz, Víctor; Calvo, David; Capmany, José
2012-06-01
We provide, to our knowledge, the first experimental demonstration of the feasibility of sending several parallel keys by exploiting the technique of subcarrier multiplexing (SCM) widely employed in microwave photonics. This approach brings several advantages such as high spectral efficiency compatible with the actual secure key rates, the sharing of the optical fainted pulse by all the quantum multiplexed channels reducing the system complexity, and the possibility of upgrading with wavelength division multiplexing in a two-tier scheme, to increase the number of parallel keys. Two independent quantum SCM channels featuring a sifted key rate of 10 Kb/s/channel over a link with quantum bit error rate <2% is reported.
AM-37 and ST-36 Are Small Molecule Bombesin Receptor Antagonists
Moody, Terry W.; Tashakkori, Nicole; Mantey, Samuel A.; Moreno, Paola; Ramos-Alvarez, Irene; Leopoldo, Marcello; Jensen, Robert T.
2017-01-01
While peptide antagonists for the gastrin-releasing peptide receptor (BB2R), neuromedin B receptor (BB1R), and bombesin (BB) receptor subtype-3 (BRS-3) exist, there is a need to develop non-peptide small molecule inhibitors for all three BBR. The BB agonist (BA)1 binds with high affinity to the BB1R, BB2R, and BRS-3. In this communication, small molecule BBR antagonists were evaluated using human lung cancer cells. AM-37 and ST-36 inhibited binding to human BB1R, BB2R, and BRS-3 with similar affinity (Ki = 1.4–10.8 µM). AM-13 and AM-14 were approximately an order of magnitude less potent than AM-37 and ST-36. The ability of BA1 to elevate cytosolic Ca2+ in human lung cancer cells transfected with BB1R, BB2R, and BRS-3 was antagonized by AM-37 and ST-36. BA1 increased tyrosine phosphorylation of the EGFR and ERK in lung cancer cells, which was blocked by AM-37 and ST-36. AM-37 and ST-36 reduced the growth of lung cancer cells that have BBR. The results indicate that AM-37 and ST-36 function as small molecule BB receptor antagonists. PMID:28785244
AM-37 and ST-36 Are Small Molecule Bombesin Receptor Antagonists.
Moody, Terry W; Tashakkori, Nicole; Mantey, Samuel A; Moreno, Paola; Ramos-Alvarez, Irene; Leopoldo, Marcello; Jensen, Robert T
2017-01-01
While peptide antagonists for the gastrin-releasing peptide receptor (BB 2 R), neuromedin B receptor (BB 1 R), and bombesin (BB) receptor subtype-3 (BRS-3) exist, there is a need to develop non-peptide small molecule inhibitors for all three BBR. The BB agonist (BA)1 binds with high affinity to the BB 1 R, BB 2 R, and BRS-3. In this communication, small molecule BBR antagonists were evaluated using human lung cancer cells. AM-37 and ST-36 inhibited binding to human BB 1 R, BB 2 R, and BRS-3 with similar affinity ( K i = 1.4-10.8 µM). AM-13 and AM-14 were approximately an order of magnitude less potent than AM-37 and ST-36. The ability of BA1 to elevate cytosolic Ca 2+ in human lung cancer cells transfected with BB 1 R, BB 2 R, and BRS-3 was antagonized by AM-37 and ST-36. BA1 increased tyrosine phosphorylation of the EGFR and ERK in lung cancer cells, which was blocked by AM-37 and ST-36. AM-37 and ST-36 reduced the growth of lung cancer cells that have BBR. The results indicate that AM-37 and ST-36 function as small molecule BB receptor antagonists.
Development of Vector Parabolic Equation Technique for Propagation in Urban and Tunnel Environments
2010-09-01
relativistic quantum mechanics J. Phys. A: Math. Gen. 16 1869–84 [8] Nottale L 1995 Scale relativity, fractal space- time and quantum mechanics Quantum...proportional to the “ time ” elapsed. By performing various approximations to the transfer function, several approximate absorbing boundary condi- tions...The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing
Secure multi-party communication with quantum key distribution managed by trusted authority
Nordholt, Jane Elizabeth; Hughes, Richard John; Peterson, Charles Glen
2013-07-09
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.
Secure multi-party communication with quantum key distribution managed by trusted authority
Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen
2015-01-06
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD are extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.
Sowińska-Przepiera, Elżbieta; Andrysiak-Mamos, Elżbieta; Syrenicz, Justyna; Jarząbek-Bielecka, Grażyna; Friebe, Zbigniew; Syrenicz, Anhelli
2011-01-01
We investigated whether the vitamin D3 receptor gene (VDR) polymorphism can modulate therapeutic response of functional hypothalamic amenorrhea (FHA) patients to the oestroprogestagen (EP) treatment. The study included 84 FHA girls and 50 controls. FHA patients underwent a four-year sequential EP therapy with 17-β oestradiol (2 mg from the 2(nd) to 25(th) day of the menstrual cycle) and didrogesterone (10 mg from the 16(th) to the 25(th) day). Their hormonal parameters were monitored along with bone turnover marker levels and bone mineral density (BMD). Additionally, the VDR gene BsmI polymorphism was determined. Hormonal therapy was reflected by a substantial improvement of BMD. However, the values of BMD observed after four years of treatment in FHA patients were still significantly lower than baseline bone mineral density determined in the control group (1.007 ± 0.100 vs. 1.141 ± 0.093 g/cm(2), respectively; p < 0.001). No significant effects of the VDR genotype were observed on the dynamics of BMD during consecutive years of hormonal treatment and mean bone mineral density determined after completing the therapy (1.006 ± 0.101 vs. 1.013 ± 0.114 vs. 1.006 ± 0.094 g/cm(2) for BB, bb and Bb genotypes, respectively; p = 0.973). This study did not confirm that VDR polymorphism can modulate therapeutic outcome of FHA girls subjected to the hormonal treatment. Nonetheless, this study confirmed the effectiveness of EP therapy in the simultaneous treatment of menstrual disorders and the normalisation of bone mineral density in FHA patients.
Flocculation of high purity wheat straw soda lignin.
Piazza, G J; Lora, J H; Garcia, R A
2014-01-01
In industrial process, acidification causes non-sulfonated lignin insolubility. The flocculants poly(diallyldimethylammonium chloride) (pDADMAC) and bovine blood (BB) also caused lignin insolubility while cationic polyacrylamide, chitosan, and soy protein PF 974 were ineffective. Turbidity determined optimal flocculant, but turbidity magnitude with BB was greater than expected. pDADMAC caused negative lignin Zeta potential to became positive, but BB-lignin Zeta potential was always negative. Insoluble lignin did not gravity sediment, and flocculant-lignin mixtures were centrifuged. Pellet and supernatant dry mass and corrected spectroscopic results were in good agreement for optimal pDADMAC and BB. Spectroscopy showed 87-92% loss of supernatant lignin. Nitrogen analysis showed BB concentrated in the pellet until the pellet became saturated with BB. Subtracting ash and BB mass from pellet and supernatant mass confirmed optimal BB. Low levels of alum caused increased lignin flocculation at lower levels of pDADMAC and BB, but alum did not affect optimal flocculant. Published by Elsevier Ltd.
Seaworthy Quantum Key Distribution Design and Validation (SEAKEY)
2016-03-10
Contractor Address: 10 Moulton Street, Cambridge, MA 02138 Title of the Project: Seaworthy Quantum Key Distribution Design and Validation (SEAKEY...Technologies Kathryn Carson Program Manager Quantum Information Processing 2 | P a g e Approved for public release; distribution is...we have continued work calculating the key rates achievable parametrically with receiver performance. In addition, we describe the initial designs
Bao, Li; Chen, Mingzhi; Lei, Yong; Zhou, Zemin; Shen, Huiping; Le, Feng
2017-04-01
Vitamin D and the vitamin D receptor (VDR) are important in the metabolic processes that affect bone mineral density (BMD). However, the effect of VDR BsmI polymorphism on BMD in pediatric patients is still unclear. Eligible studies were identified from the following electronic databases: PubMed, Embase, the Cochrane Library, and the Chinese CNKI and Wanfang databases before October 1, 2016. Data were extracted from the eligible studies, and associations between VDR BsmI polymorphism and BMD in pediatric patients were estimated with weighted mean differences (WMDs) and 95% confidence intervals (CIs). Subgroup analysis of ethnicity and sensitivity analyses were used to identify sources of heterogeneity. A significant difference was observed between VDR BsmI polymorphism and pediatric BMD levels of the lumbar spine (LS) in the corecessive model (bb vs BB + Bb: WMD = -0.23, 95% CI [-0.35, -0.11], P < 0.01). No significant relationship was found in the dominant, recessive, or codominant models for LS BMD (BB vs Bb: WMD = -0.56, 95% CI [-1.58, 0.46], P = 0.29; BB vs bb: WMD = -0.54, 95% CI [-1.49, 0.41], P = 0.27; and BB vs Bb + bb: WMD = -0.45, 95% CI [-1.71, 0.26], P = 0.22). In addition, we found no remarkable association between the BsmI polymorphism and BMD levels of the femoral neck (FN) in children (BB vs Bb: WMD = -1.08, 95% CI [-3.13, 0.96], P = 0.30; BB vs bb: WMD = 0.98, 95% CI [-0.89, 2.85], P = 0.31; BB vs Bb + bb: WMD = -0.061, 95% CI [-0.30, 0.17], P = 0.61; and bb vs BB + Bb: WMD = 0.82, 95% CI [-0.59, 2.32], P = 0.25). Our meta-analysis found that the VDR BsmI genetic polymorphism was correlated with LS BMD level in pediatric patients: compared with those with the B allele, children with the bb genotype were less likely to have lower BMD levels. No significant difference was identified in the pediatric FN BMD levels.
Provably secure and high-rate quantum key distribution with time-bin qudits
Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; ...
2017-11-24
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less
Provably secure and high-rate quantum key distribution with time-bin qudits
Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J.
2017-01-01
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system. PMID:29202028
Provably secure and high-rate quantum key distribution with time-bin qudits.
Islam, Nurul T; Lim, Charles Ci Wen; Cahall, Clinton; Kim, Jungsang; Gauthier, Daniel J
2017-11-01
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. We use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. The security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.
Provably secure and high-rate quantum key distribution with time-bin qudits
DOE Office of Scientific and Technical Information (OSTI.GOV)
Islam, Nurul T.; Lim, Charles Ci Wen; Cahall, Clinton
The security of conventional cryptography systems is threatened in the forthcoming era of quantum computers. Quantum key distribution (QKD) features fundamentally proven security and offers a promising option for quantum-proof cryptography solution. Although prototype QKD systems over optical fiber have been demonstrated over the years, the key generation rates remain several orders of magnitude lower than current classical communication systems. In an effort toward a commercially viable QKD system with improved key generation rates, we developed a discrete-variable QKD system based on time-bin quantum photonic states that can generate provably secure cryptographic keys at megabit-per-second rates over metropolitan distances. Wemore » use high-dimensional quantum states that transmit more than one secret bit per received photon, alleviating detector saturation effects in the superconducting nanowire single-photon detectors used in our system that feature very high detection efficiency (of more than 70%) and low timing jitter (of less than 40 ps). Our system is constructed using commercial off-the-shelf components, and the adopted protocol can be readily extended to free-space quantum channels. In conclusion, the security analysis adopted to distill the keys ensures that the demonstrated protocol is robust against coherent attacks, finite-size effects, and a broad class of experimental imperfections identified in our system.« less
Information security: from classical to quantum
NASA Astrophysics Data System (ADS)
Barnett, Stephen M.; Brougham, Thomas
2012-09-01
Quantum cryptography was designed to provide a new approach to the problem of distributing keys for private-key cryptography. The principal idea is that security can be ensured by exploiting the laws of quantum physics and, in particular, by the fact that any attempt to measure a quantum state will change it uncontrollably. This change can be detected by the legitimate users of the communication channel and so reveal to them the presence of an eavesdropper. In this paper I explain (briefly) how quantum key distribution works and some of the progress that has been made towards making this a viable technology. With the principles of quantum communication and quantum key distribution firmly established, it is perhaps time to consider how efficient it can be made. It is interesting to ask, in particular, how many bits of information might reasonably be encoded securely on each photon. The use of photons entangled in their time of arrival might make it possible to achieve data rates in excess of 10 bits per photon.
Quantum cryptography as a retrodiction problem.
Werner, A H; Franz, T; Werner, R F
2009-11-27
We propose a quantum key distribution protocol based on a quantum retrodiction protocol, known as the Mean King problem. The protocol uses a two way quantum channel. We show security against coherent attacks in a transmission-error free scenario, even if Eve is allowed to attack both transmissions. This establishes a connection between retrodiction and key distribution.
Maintenance-free operation of WDM quantum key distribution system through a field fiber over 30 days
NASA Astrophysics Data System (ADS)
Yoshino, Ken-ichiro; Ochi, Takao; Fujiwara, Mikio; Sasaki, Masahide; Tajima, Akio
2013-12-01
Maintenance-free wavelength-division-multiplexing quantum key distribution for 30 days was achieved through a 22-km field fiber. Using polarization-independent interferometers and stabilization techniques, we attained a quantum bit error rate as low as 1.70% and a key rate as high as 229.8 kbps, making the record of total secure key of 595.6 Gbits accumulated over an uninterrupted operation period.
Multiparty Quantum Secret Sharing of Key Using Practical Faint Laser Pulses
NASA Astrophysics Data System (ADS)
Zhang, Zhan-Jun; Man, Zhong-Xiao
2005-07-01
Based on a bidirectional quantum key distribution protocol [Phys. Rev. A 70 (2004) 012311], we propose a (m-1,m-1)-threshold scheme of m (m >= 3)-party quantum secret sharing of key by using practical faint laser pulses. In our scheme, if all the m-1 sharers collaborate, they can obtain the joint secret key from the message sender. Our scheme is more feasible according to the present-day technology.
Tomographic quantum cryptography: equivalence of quantum and classical key distillation.
Bruss, Dagmar; Christandl, Matthias; Ekert, Artur; Englert, Berthold-Georg; Kaszlikowski, Dagomir; Macchiavello, Chiara
2003-08-29
The security of a cryptographic key that is generated by communication through a noisy quantum channel relies on the ability to distill a shorter secure key sequence from a longer insecure one. For an important class of protocols, which exploit tomographically complete measurements on entangled pairs of any dimension, we show that the noise threshold for classical advantage distillation is identical with the threshold for quantum entanglement distillation. As a consequence, the two distillation procedures are equivalent: neither offers a security advantage over the other.
Experimental demonstration of counterfactual quantum key distribution
NASA Astrophysics Data System (ADS)
Ren, M.; Wu, G.; Wu, E.; Zeng, H.
2011-04-01
Counterfactual quantum key distribution provides natural advantage against the eavesdropping on the actual signal particles. It can prevent the photon-number-splitting attack when a weak coherent light source is used for the practical implementation. We experimentally realized the counterfactual quantum key distribution in an unbalanced Mach-Zehnder interferometer of 12.5-km-long quantum channel with a high-fringe visibility of 97.4%. According to the security analysis, the system was robust against the photon-number-splitting attack. The article is published in the original.
Channel analysis for single photon underwater free space quantum key distribution.
Shi, Peng; Zhao, Shi-Cheng; Gu, Yong-Jian; Li, Wen-Dong
2015-03-01
We investigate the optical absorption and scattering properties of underwater media pertinent to our underwater free space quantum key distribution (QKD) channel model. With the vector radiative transfer theory and Monte Carlo method, we obtain the attenuation of photons, the fidelity of the scattered photons, the quantum bit error rate, and the sifted key generation rate of underwater quantum communication. It can be observed from our simulations that the most secure single photon underwater free space QKD is feasible in the clearest ocean water.
Experimental quantum data locking
NASA Astrophysics Data System (ADS)
Liu, Yang; Cao, Zhu; Wu, Cheng; Fukuda, Daiji; You, Lixing; Zhong, Jiaqiang; Numata, Takayuki; Chen, Sijing; Zhang, Weijun; Shi, Sheng-Cai; Lu, Chao-Yang; Wang, Zhen; Ma, Xiongfeng; Fan, Jingyun; Zhang, Qiang; Pan, Jian-Wei
2016-08-01
Classical correlation can be locked via quantum means: quantum data locking. With a short secret key, one can lock an exponentially large amount of information in order to make it inaccessible to unauthorized users without the key. Quantum data locking presents a resource-efficient alternative to one-time pad encryption which requires a key no shorter than the message. We report experimental demonstrations of a quantum data locking scheme originally proposed by D. P. DiVincenzo et al. [Phys. Rev. Lett. 92, 067902 (2004), 10.1103/PhysRevLett.92.067902] and a loss-tolerant scheme developed by O. Fawzi et al. [J. ACM 60, 44 (2013), 10.1145/2518131]. We observe that the unlocked amount of information is larger than the key size in both experiments, exhibiting strong violation of the incremental proportionality property of classical information theory. As an application example, we show the successful transmission of a photo over a lossy channel with quantum data (un)locking and error correction.
Lynch, AM; Murphy, JR; Gibbs, RS; Levine, RJ; Giclas, PC; Salmon, JE; Holers, VM
2016-01-01
Objective To determine the interrelationships during early pregnancy of complement-activation fragments Bb, C3a and sC5b-9, and angiogenesis-related factors placental growth factor (PiGF), soluble fms-like tyrosine kinase-1 (sFlt-1) and soluble endoglin (sEng), and their associations with pre-eclampsia. Design Prospective cohort study. Setting Denver complement study (June 2005–June 2008). Population A total of 668 pregnant women with singleton gestations, recruited between 10 and 15 weeks of gestation. Methods Using univariable and multivariable logistic regression analysis, concentrations of complement-activation fragments and angiogenesis-related factors were compared between 10 and 15 weeks of gestation in women who subsequently did or did not develop pre-eclampsia. Interrelationships between these variables were tested using the non-parametric Spearman rank correlation coefficient. Main outcome measure Pre-eclampsia. The association of complement-activation fragments and angiogenesis-related factors with obesity was also examined. Results The mean (±SD) levels of complement Bb in early pregnancy among women who did and did not develop pre-eclampsia were 0.84 (±0.26) µg/ml and 0.69 (±0.2) µg/ml, respectively (P = 0.001). Concentrations of PiGF were significantly (P = 0.01) lower (31 ± 12 pg/ml) in early pregnancy in the pre-eclamptic group of women, as compared with the normotensive group (39 ± 32 pg/ml). The adjusted odds ratio (AOR) of Bb and PiGF were 2.1 (CI = 1.4–3.1, P < 0.0003) and 0.2 (CI = 0.07–0.7, P = 0.01), respectively. There was no significant difference in the levels of C3a, sC5b-9, sFlt-1 and sEng in early pregnancy among women who developed pre-eclampsia, compared with women who remained normotensive during pregnancy. Higher levels of Bb (P = 0.0001) and C3a (P = 0.03), and lower levels of sFlt-1 (P = 0.0002) and sEng (P = 0.0001) were found among women with obesity, compared with non-obese controls. No meaningful relationships were found between the complement-activation fragments and the angiogenesis-related factors. Conclusions In this cohort during early pregnancy, increased concentrations of complement-activation factor Bb and lower concentrations of PiGF were associated with the development of pre-eclampsia later in pregnancy. PMID:20074261
Fundamental rate-loss tradeoff for optical quantum key distribution.
Takeoka, Masahiro; Guha, Saikat; Wilde, Mark M
2014-10-24
Since 1984, various optical quantum key distribution (QKD) protocols have been proposed and examined. In all of them, the rate of secret key generation decays exponentially with distance. A natural and fundamental question is then whether there are yet-to-be discovered optical QKD protocols (without quantum repeaters) that could circumvent this rate-distance tradeoff. This paper provides a major step towards answering this question. Here we show that the secret key agreement capacity of a lossy and noisy optical channel assisted by unlimited two-way public classical communication is limited by an upper bound that is solely a function of the channel loss, regardless of how much optical power the protocol may use. Our result has major implications for understanding the secret key agreement capacity of optical channels-a long-standing open problem in optical quantum information theory-and strongly suggests a real need for quantum repeaters to perform QKD at high rates over long distances.
Precision blackbody sources for radiometric standards.
Sapritsky, V I; Khlevnoy, B B; Khromchenko, V B; Lisiansky, B E; Mekhontsev, S N; Melenevsky, U A; Morozova, S P; Prokhorov, A V; Samoilov, L N; Shapoval, V I; Sudarev, K A; Zelener, M F
1997-08-01
The precision blackbody sources developed at the All-Russian Institute for Optical and Physical Measurements (Moscow, Russia) and their characteristics are analyzed. The precision high-temperature graphite blackbody BB22p, large-area high-temperature pyrolytic graphite blackbody BB3200pg, middle-temperature graphite blackbody BB2000, low-temperature blackbody BB300, and gallium fixed-point blackbody BB29gl and their characteristics are described.
Rieg, Annette D; Suleiman, Said; Anker, Carolin; Verjans, Eva; Rossaint, Rolf; Uhlig, Stefan; Martin, Christian
2018-06-19
Platelet-derived growth factor (PDGF)-BB and its receptor PDGFR are highly expressed in pulmonary hypertension (PH) and mediate proliferation. Recently, we showed that PDGF-BB contracts pulmonary veins (PVs) and that this contraction is prevented by inhibition of PDGFR-β (imatinib/SU6668). Here, we studied PDGF-BB-induced contraction and downstream-signalling in isolated perfused lungs (IPL) and precision-cut lung slices (PCLS) of guinea pigs (GPs). In IPLs, PDGF-BB was perfused after or without pre-treatment with imatinib (perfused/nebulised), the effects on the pulmonary arterial pressure (P PA ), the left atrial pressure (P LA ) and the capillary pressure (P cap ) were studied and the precapillary (R pre ) and postcapillary resistance (R post ) were calculated. Perfusate samples were analysed (ELISA) to detect the PDGF-BB-induced release of prostaglandin metabolites (TXA 2 /PGI 2 ). In PCLS, the contractile effect of PDGF-BB was evaluated in pulmonary arteries (PAs) and PVs. In PVs, PDGF-BB-induced contraction was studied after inhibition of PDGFR-α/β, L-Type Ca 2+ -channels, ROCK/PKC, prostaglandin receptors, MAP2K, p38-MAPK, PI3K-α/γ, AKT/PKB, actin polymerisation, adenyl cyclase and NO. Changes of the vascular tone were measured by videomicroscopy. In PVs, intracellular cAMP was measured by ELISA. In IPLs, PDGF-BB increased P PA , P cap and R post . In contrast, PDGF-BB had no effect if lungs were pre-treated with imatinib (perfused/nebulised). In PCLS, PDGF-BB significantly contracted PVs/PAs which was blocked by the PDGFR-β antagonist SU6668. In PVs, inhibition of actin polymerisation and inhibition of L-Type Ca 2+ -channels reduced PDGF-BB-induced contraction, whereas inhibition of ROCK/PKC had no effect. Blocking of EP 1/3 - and TP-receptors or inhibition of MAP2K-, p38-MAPK-, PI3K-α/γ- and AKT/PKB-signalling prevented PDGF-BB-induced contraction, whereas inhibition of EP 4 only slightly reduced it. Accordingly, PDGF-BB increased TXA 2 in the perfusate, whereas PGI 2 was increased in all groups after 120 min and inhibition of IP-receptors did not enhance PDGF-BB-induced contraction. Moreover, PDGF-BB increased cAMP in PVs and inhibition of adenyl cyclase enhanced PDGF-BB-induced contraction, whereas inhibition of NO-formation only slightly increased it. PDGF-BB/PDGFR regulates the pulmonary vascular tone by the generation of prostaglandins, the increase of calcium, the activation of MAPK- or PI3K/AKT/mTOR signalling and actin remodelling. More insights in PDGF-BB downstream-signalling may contribute to develop new therapeutics for PH.
Topological Quantum Information Processing Mediated Via Hybrid Topogical Insulator Structures
2014-03-28
formation, manipulation, entanglement and detection of Majorana fermions in diamond-topological insulator - superconductor heterojunctions. Furthermore...between Superconductors and Topological Insulators Recent advances have revealed a new type of information processing, topological quantum...Topological Insulator - Superconductor Heterostructures," Physical Review B 84, 144507 (2011). 7 Hsiang-Hsuan Hung, Pouyan Ghaemi, Taylor L
Research on Quantum Algorithms at the Institute for Quantum Information and Matter
2016-05-29
local quantum computation with applications to position-based cryptography , New Journal of Physics, (09 2011): 0. doi: 10.1088/1367-2630/13/9/093036... cryptography , such as the ability to turn private-key encryption into public-key encryption. While ad hoc obfuscators exist, theoretical progress has mainly...to device-independent quantum cryptography , to quantifying entanglement, and to the classification of quantum phases of matter. Exact synthesis
Lehar, Craig; Jayappa, Huchappa; Erskine, Jason; Brown, Alicia; Sweeney, Diane; Wassmoen, Terri
2008-01-01
Three groups of healthy dogs with low antibody titers to Bordetella bronchiseptica (Bb), canine parainfluenza virus (CPI), and canine adenovirus type 2 (CAV-2) were used in this study. One group was vaccinated with a single dose of monovalent attenuated Bb vaccine and one group with a trivalent vaccine containing attenuated Bb, CPI, and CAV-2; dogs were vaccinated intranasally with a single dose of the respective vaccines. The third group served as unvaccinated controls. All vaccinated dogs subsequently developed serum antibody titers to Bb that persisted for at least 1 year. Following Bb challenge 1 year after vaccination, all vaccinated dogs, regardless of group, showed significantly fewer clinical signs and shed significantly fewer challenge organisms than unvaccinated controls. These results demonstrate that intranasal administration of a single dose of monovalent attenuated Bb vaccine or trivalent vaccine containing attenuated Bb, CPI, and CAV-2 provides 1 year of protection against Bb.
Secure multi-party communication with quantum key distribution managed by trusted authority
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, Richard John; Nordholt, Jane Elizabeth; Peterson, Charles Glen
Techniques and tools for implementing protocols for secure multi-party communication after quantum key distribution ("QKD") are described herein. In example implementations, a trusted authority facilitates secure communication between multiple user devices. The trusted authority distributes different quantum keys by QKD under trust relationships with different users. The trusted authority determines combination keys using the quantum keys and makes the combination keys available for distribution (e.g., for non-secret distribution over a public channel). The combination keys facilitate secure communication between two user devices even in the absence of QKD between the two user devices. With the protocols, benefits of QKD aremore » extended to multi-party communication scenarios. In addition, the protocols can retain benefit of QKD even when a trusted authority is offline or a large group seeks to establish secure communication within the group.« less
Optimized decoy state QKD for underwater free space communication
NASA Astrophysics Data System (ADS)
Lopes, Minal; Sarwade, Nisha
Quantum cryptography (QC) is envisioned as a solution for global key distribution through fiber optic, free space and underwater optical communication due to its unconditional security. In view of this, this paper investigates underwater free space quantum key distribution (QKD) model for enhanced transmission distance, secret key rates and security. It is reported that secure underwater free space QKD is feasible in the clearest ocean water with the sifted key rates up to 207kbps. This paper extends this work by testing performance of optimized decoy state QKD protocol with underwater free space communication model. The attenuation of photons, quantum bit error rate and the sifted key generation rate of underwater quantum communication is obtained with vector radiative transfer theory and Monte Carlo method. It is observed from the simulations that optimized decoy state QKD evidently enhances the underwater secret key transmission distance as well as secret key rates.
Experimental quantum key distribution with finite-key security analysis for noisy channels.
Bacco, Davide; Canale, Matteo; Laurenti, Nicola; Vallone, Giuseppe; Villoresi, Paolo
2013-01-01
In quantum key distribution implementations, each session is typically chosen long enough so that the secret key rate approaches its asymptotic limit. However, this choice may be constrained by the physical scenario, as in the perspective use with satellites, where the passage of one terminal over the other is restricted to a few minutes. Here we demonstrate experimentally the extraction of secure keys leveraging an optimal design of the prepare-and-measure scheme, according to recent finite-key theoretical tight bounds. The experiment is performed in different channel conditions, and assuming two distinct attack models: individual attacks or general quantum attacks. The request on the number of exchanged qubits is then obtained as a function of the key size and of the ambient quantum bit error rate. The results indicate that viable conditions for effective symmetric, and even one-time-pad, cryptography are achievable.
Finite-key analysis for measurement-device-independent quantum key distribution.
Curty, Marcos; Xu, Feihu; Cui, Wei; Lim, Charles Ci Wen; Tamaki, Kiyoshi; Lo, Hoi-Kwong
2014-04-29
Quantum key distribution promises unconditionally secure communications. However, as practical devices tend to deviate from their specifications, the security of some practical systems is no longer valid. In particular, an adversary can exploit imperfect detectors to learn a large part of the secret key, even though the security proof claims otherwise. Recently, a practical approach--measurement-device-independent quantum key distribution--has been proposed to solve this problem. However, so far its security has only been fully proven under the assumption that the legitimate users of the system have unlimited resources. Here we fill this gap and provide a rigorous security proof against general attacks in the finite-key regime. This is obtained by applying large deviation theory, specifically the Chernoff bound, to perform parameter estimation. For the first time we demonstrate the feasibility of long-distance implementations of measurement-device-independent quantum key distribution within a reasonable time frame of signal transmission.
On the complexity of search for keys in quantum cryptography
NASA Astrophysics Data System (ADS)
Molotkov, S. N.
2016-03-01
The trace distance is used as a security criterion in proofs of security of keys in quantum cryptography. Some authors doubted that this criterion can be reduced to criteria used in classical cryptography. The following question has been answered in this work. Let a quantum cryptography system provide an ɛ-secure key such that ½‖ρ XE - ρ U ⊗ ρ E ‖1 < ɛ, which will be repeatedly used in classical encryption algorithms. To what extent does the ɛ-secure key reduce the number of search steps (guesswork) as compared to the use of ideal keys? A direct relation has been demonstrated between the complexity of the complete consideration of keys, which is one of the main security criteria in classical systems, and the trace distance used in quantum cryptography. Bounds for the minimum and maximum numbers of search steps for the determination of the actual key have been presented.
NASA Astrophysics Data System (ADS)
de Oliveira, G. L.; Ramos, R. V.
2018-03-01
In this work, it is presented an optical scheme for quantum key distribution employing two synchronized optoelectronic oscillators (OEO) working in the chaotic regime. The produced key depends on the chaotic dynamic, and the synchronization between Alice's and Bob's OEOs uses quantum states. An attack on the synchronization signals will disturb the synchronization of the chaotic systems increasing the error rate in the final key.
Counterfactual attack on counterfactual quantum key distribution
NASA Astrophysics Data System (ADS)
Zhang, Sheng; Wnang, Jian; Tang, Chao Jing
2012-05-01
It is interesting that counterfactual quantum cryptography protocols allow two remotely separated parties to share a secret key without transmitting any signal particles. Generally, these protocols, expected to provide security advantages, base their security on a translated no-cloning theorem. Therefore, they potentially exhibit unconditional security in theory. In this letter, we propose a new Trojan horse attack, by which an eavesdropper Eve can gain full information about the key without being noticed, to real implementations of a counterfactual quantum cryptography system. Most importantly, the presented attack is available even if the system has negligible imperfections. Therefore, it shows that the present realization of counterfactual quantum key distribution is vulnerable.
Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin
2015-10-14
Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Benaduce, Ana Paula; Brenneman, Randall; Schrand, Brett
Purpose: To report a novel strategy using oligonucleotide aptamers to 4-1BB as an alternate method for costimulation, and show that combinatorial therapy with radiation improves the therapeutic ratio over equivalent monoclonal antibodies. Methods and Materials: Subcutaneous 4T1 (mouse mammary carcinoma) tumors were established (approximately 100 mm{sup 3}), and a radiation therapy (RT) dose/fractionation schedule that optimally synergizes with 4-1BB monoclonal antibody (mAb) was identified. Comparable tumor control and animal survival was observed when either 4-1BB antibody or aptamer were combined with RT using models of breast cancer and melanoma (4T1 and B16-F10). Off-target CD8{sup +} T-cell toxicity was evaluated by quantification ofmore » CD8{sup +} T cells in livers and spleens of treated animals. Results: When combined with 4-1BB mAb, significant differences in tumor control were observed by varying RT dose and fractionation schedules. Optimal synergy between RT and 4-1BB mAb was observed at 5 Gy × 6. Testing 4-1BB mAb and aptamer independently using the optimal RT (5 Gy × 6 for 4T1/Balb/c and 12 Gy × 1 for B16/C57BL6J mouse models) revealed equivalent tumor control using 4-1BB aptamer and 4-1BB mAb. 4-1BB mAb, but not 4-1BB aptamer-treated animals, exhibited increased lymphocytic liver infiltrates and increased splenic and liver CD8{sup +} T cells. Conclusions: Radiation therapy synergizes with 4-1BB mAb, and this effect is dependent on RT dose and fractionation. Tumor control by 4-1BB aptamer is equivalent to 4-1BB mAb when combined with optimal RT dose, without eliciting off-target liver and spleen CD8{sup +} expansion. 4-1BB aptamer-based costimulation affords a comparable and less toxic strategy to augment RT-mediated tumor control.« less
Robust quantum data locking from phase modulation
NASA Astrophysics Data System (ADS)
Lupo, Cosmo; Wilde, Mark M.; Lloyd, Seth
2014-08-01
Quantum data locking is a uniquely quantum phenomenon that allows a relatively short key of constant size to (un)lock an arbitrarily long message encoded in a quantum state, in such a way that an eavesdropper who measures the state but does not know the key has essentially no information about the message. The application of quantum data locking in cryptography would allow one to overcome the limitations of the one-time pad encryption, which requires the key to have the same length as the message. However, it is known that the strength of quantum data locking is also its Achilles heel, as the leakage of a few bits of the key or the message may in principle allow the eavesdropper to unlock a disproportionate amount of information. In this paper we show that there exist quantum data locking schemes that can be made robust against information leakage by increasing the length of the key by a proportionate amount. This implies that a constant size key can still lock an arbitrarily long message as long as a fraction of it remains secret to the eavesdropper. Moreover, we greatly simplify the structure of the protocol by proving that phase modulation suffices to generate strong locking schemes, paving the way to optical experimental realizations. Also, we show that successful data locking protocols can be constructed using random code words, which very well could be helpful in discovering random codes for data locking over noisy quantum channels.
Two-party quantum key agreement protocols under collective noise channel
NASA Astrophysics Data System (ADS)
Gao, Hao; Chen, Xiao-Guang; Qian, Song-Rong
2018-06-01
Recently, quantum communication has become a very popular research field. The quantum key agreement (QKA) plays an important role in the field of quantum communication, based on its unconditional security in terms of theory. Among all kinds of QKA protocols, QKA protocols resisting collective noise are widely being studied. In this paper, we propose improved two-party QKA protocols resisting collective noise and present a feasible plan for information reconciliation. Our protocols' qubit efficiency has achieved 26.67%, which is the best among all the two-party QKA protocols against collective noise, thus showing that our protocol can improve the transmission efficiency of quantum key agreement.
MODIS on-orbit thermal emissive bands lifetime performance
NASA Astrophysics Data System (ADS)
Madhavan, Sriharsha; Wu, Aisheng; Chen, Na; Xiong, Xiaoxiong
2016-05-01
MODerate resolution Imaging Spectroradiometer (MODIS), a leading heritage sensor in the fleet of Earth Observing System for the National Aeronautics and Space Administration (NASA) is in space orbit on two spacecrafts. They are the Terra (T) and Aqua (A) platforms. Both instruments have successfully continued to operate beyond the 6 year design life time, with the T-MODIS currently functional beyond 15 years and the A-MODIS operating beyond 13 years respectively. The MODIS sensor characteristics include a spectral coverage from 0.41 μm - 14.4 μm, of which wavelengths ranging from 3.7 μm - 14. 4 μm cover the thermal infrared region also referred to as the Thermal Emissive Bands (TEBs). The TEBs is calibrated using a v-grooved BlackBody (BB) whose temperature measurements are traceable to the National Institute of Standards and Technology temperature scales. The TEBs calibration based on the onboard BB is extremely important for its high radiometric fidelity. In this paper, we provide a complete characterization of the lifetime instrument performance of both MODIS instruments in terms of the sensor gain, the Noise Equivalent difference Temperature, key instrument telemetry such as the BB lifetime trends, the instrument temperature trends, the Cold Focal Plane telemetry and finally, the total assessed calibration uncertainty of the TEBs.
Penetrating BB shot head wound in an asymptomatic 9-year-old girl: the ultimate teaching moment.
Johnson, N A
1997-01-01
Air rifle BB injuries represent a common type of childhood accident. The purpose of this case report is to encourage all providers of pediatric care to include nonpowder firearm safety education with standard well-child anticipatory guidance. A case report is described and experience with similar injuries is discussed from cases found in a literature review using the key words "air rifle," "patient education," "pediatric," "ballistics," and "trauma." A 9-year-old girl came to the emergency department after having been accidentally shot in the head by her 7-year-old brother with a toy air rifle. The BB shot entered through the left cheek and traversed up into the soft tissue above the mandible, just medial to the internal carotid artery, and posterior to the facial nerve. Other than local pain, she was entirely asymptomatic. The cheek was repaired without complication. Conservative therapy was recommended. She and her family were given anticipatory guidance, and her course thereafter was uneventful. Firearm education is not a standard part of every well-child encounter. Injuries by all types of firearms are increasing at epidemic rates. Questioning about the accessibility of both powder- and non-powder-based weapons (ie, air rifle) and providing routine safety education should become the standard of care at all well-child encounters.
MODIS On-Orbit Thermal Emissive Bands Lifetime Performance
NASA Technical Reports Server (NTRS)
Madhavan, Sriharsha; Xiong, Xiaoxiong
2016-01-01
MODerate resolution Imaging Spectroradiometer (MODIS), a leading heritage sensor in the fleet of Earth Observing System for the National Aeronautics and Space Administration (NASA) is in space orbit on two spacecrafts. They are the Terra (T) and Aqua (A) platforms. Both instruments have successfully continued to operate beyond the 6 year design life time, with the T-MODIS currently functional beyond 15 years and the A-MODIS operating beyond 13 years respectively. The MODIS sensor characteristics include a spectral coverage from 0.41 micron 14.4 micron, of which wavelengths ranging from 3.7 micron 14. 4 micron cover the thermal infrared region also referred to as the Thermal Emissive Bands (TEBs). The TEBs is calibrated using a v-grooved BlackBody (BB) whose temperature measurements are traceable to the National Institute of Standards and Technology temperature scales. The TEBs calibration based on the onboard BB is extremely important for its high radiometric fidelity. In this paper, we provide a complete characterization of the lifetime instrument performance of both MODIS instruments in terms of the sensor gain, the Noise Equivalent difference Temperature, key instrument telemetry such as the BB lifetime trends, the instrument temperature trends, the Cold Focal Plane telemetry and finally, the total assessed calibration uncertainty of the TEBs.
NASA Astrophysics Data System (ADS)
Shukla, Chitra; Thapliyal, Kishore; Pathak, Anirban
2017-12-01
Semi-quantum protocols that allow some of the users to remain classical are proposed for a large class of problems associated with secure communication and secure multiparty computation. Specifically, first-time semi-quantum protocols are proposed for key agreement, controlled deterministic secure communication and dialogue, and it is shown that the semi-quantum protocols for controlled deterministic secure communication and dialogue can be reduced to semi-quantum protocols for e-commerce and private comparison (socialist millionaire problem), respectively. Complementing with the earlier proposed semi-quantum schemes for key distribution, secret sharing and deterministic secure communication, set of schemes proposed here and subsequent discussions have established that almost every secure communication and computation tasks that can be performed using fully quantum protocols can also be performed in semi-quantum manner. Some of the proposed schemes are completely orthogonal-state-based, and thus, fundamentally different from the existing semi-quantum schemes that are conjugate coding-based. Security, efficiency and applicability of the proposed schemes have been discussed with appropriate importance.
An Analysis of Error Reconciliation Protocols for use in Quantum Key Distribution
2012-02-01
offers another alternative for exchanging a symmetric key without compromising security. Quantum cryptography is the use of quantum mechanics to... quantum money), and, more significantly for our purposes here, a method for the transmission of two or three messages in such a way that reading...well as two channels. A quantum channel is used to communicate qubits (photons), and it is assumed that only active eavesdropping may take place on
Hafsteinsdóttir, Thóra B; Kappelle, Jaap; Grypdonck, Maria H F; Algra, Ale
2007-10-01
To measure the effects of Bobath-based (BB) therapy on depression, shoulder pain and health-related quality of life (HRQoL) of patients during one year after stroke. In a prospective, non-randomized design, the use of BB therapy was compared with a more task-oriented therapy and no BB therapy. A total of 324 patients in 12 hospitals. Patients in the intervention group received BB therapy, whereas patients in the control group received no BB therapy and a more task-oriented therapy. HRQoL was measured using the SF-36; depression was measured with the Center of Epidemiological Studies Depression Scale and shoulder pain was measured with the Visual Analogue Scale at discharge, 6 and 12 months. Linear and logistic regression analyses were performed. No effects of BB therapy on HRQoL or shoulder pain were found. After one year fewer patients were depressed in the BB group (30%) than in the non-BB group (43%); the adjusted odds ratio was 0.6 (95% confidence interval 0.3-1.0). BB therapy did not have any effect on HRQoL or shoulder pain in stroke patients. Healthcare professionals should reconsider the use of BB therapy in the care of stroke patients.
Quantum cryptography for secure free-space communications
DOE Office of Scientific and Technical Information (OSTI.GOV)
Hughes, R.J.; Buttler, W.T.; Kwiat, P.G.
1999-03-01
The secure distribution of the secret random bit sequences known as key material, is an essential precursor to their use for the encryption and decryption of confidential communications. Quantum cryptography is a new technique for secure key distribution with single-photon transmissions: Heisenberg`s uncertainty principle ensures that an adversary can neither successfully tap the key transmissions, nor evade detection (eavesdropping raises the key error rate above a threshold value). The authors have developed experimental quantum cryptography systems based on the transmission of non-orthogonal photon polarization states to generate shared key material over line-of-sight optical links. Key material is built up usingmore » the transmission of a single-photon per bit of an initial secret random sequence. A quantum-mechanically random subset of this sequence is identified, becoming the key material after a data reconciliation stage with the sender. The authors have developed and tested a free-space quantum key distribution (QKD) system over an outdoor optical path of {approximately}1 km at Los Alamos National Laboratory under nighttime conditions. Results show that free-space QKD can provide secure real-time key distribution between parties who have a need to communicate secretly. Finally, they examine the feasibility of surface to satellite QKD.« less
Direct and reverse secret-key capacities of a quantum channel.
Pirandola, Stefano; García-Patrón, Raul; Braunstein, Samuel L; Lloyd, Seth
2009-02-06
We define the direct and reverse secret-key capacities of a memoryless quantum channel as the optimal rates that entanglement-based quantum-key-distribution protocols can reach by using a single forward classical communication (direct reconciliation) or a single feedback classical communication (reverse reconciliation). In particular, the reverse secret-key capacity can be positive for antidegradable channels, where no forward strategy is known to be secure. This property is explicitly shown in the continuous variable framework by considering arbitrary one-mode Gaussian channels.
Trotta, Daniel Rizzo; Gorny, Clayton; Zielak, João César; Gonzaga, Carla Castiglia; Giovanini, Allan Fernando; Deliberador, Tatiana Miranda
2014-09-01
The objective of this study was to evaluate the bone repair of critical size defects treated with mussel powder with or without additional bovine bone. Critical size defects of 5 mm were realized in the calvaria of 70 rats, which were randomly divided in 5 groups - Control (C), Autogenous Bone (AB), Mussel Powder (MP), Mussel Powder and Bovine Bone (MP-BB) and Bovine Bone (BB). Histological and histomorphometric analysis were performed 30 and 90 days after the surgical procedures (ANOVA e Tukey p < 0.05). After 30 days, the measures of remaining particles were: 28.36% (MP-BB), 26.63% (BB) and 8.64% (MP) with a statistically significant difference between BB and MP. The percentage of osseous matrix after 30 days was, AB (55.17%), 23.31% (BB), 11.66% (MP) and 10.71% (MP-BB) with statistically significant differences among all groups. After 90 days the figures were 25.05% (BB), 21.53% (MP-BB) and 1.97% (MP) with statistically significant differences between MP-BB and MP. Percentages of new bone formation after 90 days were 89.47% (AB), 35.70% (BB), 26.48% (MP-BB) and 7.37% (MP) with statistically significant differences between AB and the other groups. Within the limits of this study, we conclude that mussel powder, with or without additional bovine bone, did not induce new bone formation and did not repair critical size defects in rat calvaria. Copyright © 2013 European Association for Cranio-Maxillo-Facial Surgery. Published by Elsevier Ltd. All rights reserved.
AlTaan, S L; Termote, K; Elalfy, M S; Hogan, E; Werkmeister, R; Schmetterer, L; Holland, S; Dua, H S
2016-01-01
Purpose To define optical coherence tomography (OCT) characteristics of type-1, type-2, and mixed big bubbles (BB) seen in deep anterior lamellar keratoplasty. Methods Human sclero-corneal discs were obtained from UK (30) and Canada (16) eye banks. Air was injected into corneal stroma until a BB formed. UK samples were fixed in formalin before scanning with Fourier-domain (FD-OCT). One pair of each type of BB was scanned fresh. All BB obtained from Canada were scanned fresh with time-domain (TD-OCT). For each OCT machine used, type-1 BB from which Descemets membrane (DM) was partially peeled, were also scanned. The morphological characteristics of the scans were studied. Results FD-OCT of the posterior wall of type-1 (Dua's layer (DL) with DM) and type-2 BB (DM alone) both revealed a double-contour hyper-reflective curvilinear image with a hypo-reflective zone in between. The anterior line of type-2 BB was thinner than that seen with type-1 BB. In mixed BB, FD-OCT showed two separate curvilinear images. The anterior image was a single hyper-reflective line (DL), whereas the posterior image, representing the posterior wall of type-2 BB (DM) was made of two hyper-reflective lines with a dark space in between. TD-OCT images were similar with less defined component lines, but the entire extent of the BB could be visualised. Conclusion On OCT examination the DM and DL present distinct features, which can help identify type-1, type-2, and mixed BB. These characteristics will help corneal surgeons interpret intraoperative OCT during lamellar corneal surgery. PMID:27472215
Piran, Mehrdad; Vakilian, Saeid; Piran, Mehran; Mohammadi-Sangcheshmeh, Abdollah; Hosseinzadeh, Simzar; Ardeshirylajimi, Abdolreza
2018-01-23
Migration of fibroblasts into wound area is a critical phenomenon in wound healing process. We used an appropriate system to fabricate an electrospun bioactive scaffold with controlled release of PDGF-BB in order to induce migration of primary skin fibroblast cells. First of all, protein-loaded chitosan nanoparticles based on ionic gelation interaction between chitosan and sodium tripolyphosphate were prepared. Then polycaprolactone electrospun fibers containing chitosan nanoparticles or PDGF-BB-loaded chitosan nanoparticles were prepared. Cellular attachment and morphology of cells seeded on scaffolds with or without PDGF-BB were evaluated by using a fluorescence microscope and scanning electron microscopy. Cells were well-oriented 72 h after seeding on the scaffolds containing PDGF-BB. The mean aspect ratio of populations on scaffold containing PDGF-BB-loaded chitosan nanoparticles was significantly greater than those on the scaffold containing chitosan nanoparticles but no PDGF-BB. Furthermore, the Arp2 gene, which is involved in cell protrusion formation, showed about three times more expression at mRNA level, in cells seeding on PDGF-BB-containing scaffold compared to cells seeding on scaffold containing only chitosan nanoparticles, using Real Time PCR test. Finally, under agarose migration assay results demonstrated that cells' chemotaxic behavior was more toward scaffold containing PDGF-BB compared to the PDGF-BB alone or FBS group. In addition, in terms of distance, the cell mass could grow faster, in response to scaffold containing PDGF-BB compared to FBS or PDGF-BB alone; however, the number of migrating cells might be the same or significantly higher in the latter groups.
Validation of Improved Broadband Shortwave and Longwave Fluxes Derived From GOES
NASA Technical Reports Server (NTRS)
Khaiyer, Mandana M.; Nordeen, Michele L.; Palikonda, Rabindra; Yi, Yuhong; Minnis, Patrick; Doelling, David R.
2009-01-01
Broadband (BB) shortwave (SW) and longwave (LW) fluxes at TOA (Top of Atmosphere) are crucial parameters in the study of climate and can be monitored over large portions of the Earth's surface using satellites. The VISST (Visible Infrared Solar Split-Window Technique) satellite retrieval algorithm facilitates derivation of these parameters from the Geostationery Operational Environmental Satellites (GOES). However, only narrowband (NB) fluxes are available from GOES, so this derivation requires use of narrowband-to-broadband (NB-BB) conversion coefficients. The accuracy of these coefficients affects the validity of the derived broadband (BB) fluxes. Most recently, NB-BB fits were re-derived using the NB fluxes from VISST/GOES data with BB fluxes observed by the CERES (Clouds and the Earth's Radiant Energy Budget) instrument aboard Terra, a sun-synchronous polar-orbiting satellite that crosses the equator at 10:30 LT. Subsequent comparison with ARM's (Atmospheric Radiation Measurement) BBHRP (Broadband Heating Rate Profile) BB fluxes revealed that while the derived broadband fluxes agreed well with CERES near the Terra overpass times, the accuracy of both LW and SW fluxes decreased farther away from the overpass times. Terra's orbit hampers the ability of the NB-BB fits to capture diurnal variability. To account for this in the LW, seasonal NB-BB fits are derived separately for day and night. Information from hourly SW BB fluxes from the Meteosat-8 Geostationary Earth Radiation Budget (GERB) is employed to include samples over the complete solar zenith angle (SZA) range sampled by Terra. The BB fluxes derived from these improved NB-BB fits are compared to BB fluxes computed with a radiative transfer model.
Platelet-Derived Growth Factor-BB Lessens Light-Induced Rod Photoreceptor Damage in Mice.
Takahashi, Kei; Shimazawa, Masamitsu; Izawa, Hiroshi; Inoue, Yuki; Kuse, Yoshiki; Hara, Hideaki
2017-12-01
Platelet-derived growth factor (PDGF)-BB is known to have neuroprotective effects against various neurodegenerative disorders. The purpose of this study was to determine whether PDGF-BB can be neuroprotective against light-induced photoreceptor damage in mice. Mice were exposed to 8000-lux luminance for 3 hours to induce phototoxicity. Two hours before light exposure, the experimental mice were injected with PDGF-BB intravitreally, and the control mice were injected with phosphate-buffered saline. The light-exposed PDGF-BB-injected mice and saline-injected mice were evaluated electroretinographically and histologically. The site and expression levels of PDGFR-β and PDGF-BB were determined by immunostaining and Western blotting, respectively. The effect of PDGF-BB on light-induced cone and rod photoreceptor damage was also evaluated in vitro in 661W cells, a murine cone photoreceptor cell line, and in primary retinal cell cultures. An intravitreal injection of PDGF-BB significantly reduced the decrease in the amplitudes of the electroretinograms (ERGs) and the thinning of the outer nuclear layer (ONL) induced by the light exposure. It also reduced the number of TUNEL-positive cells in the ONL. PDGFR-β was expressed in the rod outer segments (OSs) but not the cone OSs. The levels of PDGF-BB and PDGFR-β were decreased after light irradiation. In addition, PDGF-BB had protective effects against light-induced damage to cells of rod photoreceptors but had no effect on the 661W cells in vitro. These findings indicate that PDGF-BB reduces the degree of light-induced retinal damage by activating PDGFR-β in rod photoreceptors. These findings suggest that PDGF-BB could play a role in the prevention of degeneration in eyes susceptible to phototoxicity.
Quantum-locked key distribution at nearly the classical capacity rate.
Lupo, Cosmo; Lloyd, Seth
2014-10-17
Quantum data locking is a protocol that allows for a small secret key to (un)lock an exponentially larger amount of information, hence yielding the strongest violation of the classical one-time pad encryption in the quantum setting. This violation mirrors a large gap existing between two security criteria for quantum cryptography quantified by two entropic quantities: the Holevo information and the accessible information. We show that the latter becomes a sensible security criterion if an upper bound on the coherence time of the eavesdropper's quantum memory is known. Under this condition, we introduce a protocol for secret key generation through a memoryless qudit channel. For channels with enough symmetry, such as the d-dimensional erasure and depolarizing channels, this protocol allows secret key generation at an asymptotic rate as high as the classical capacity minus one bit.
Quantum secret sharing with identity authentication based on Bell states
NASA Astrophysics Data System (ADS)
Abulkasim, Hussein; Hamad, Safwat; Khalifa, Amal; El Bahnasy, Khalid
Quantum secret sharing techniques allow two parties or more to securely share a key, while the same number of parties or less can efficiently deduce the secret key. In this paper, we propose an authenticated quantum secret sharing protocol, where a quantum dialogue protocol is adopted to authenticate the identity of the parties. The participants simultaneously authenticate the identity of each other based on parts of a prior shared key. Moreover, the whole prior shared key can be reused for deducing the secret data. Although the proposed scheme does not significantly improve the efficiency performance, it is more secure compared to some existing quantum secret sharing scheme due to the identity authentication process. In addition, the proposed scheme can stand against participant attack, man-in-the-middle attack, impersonation attack, Trojan-horse attack as well as information leaks.
Glacial-Interglacial Changes in the Position of the Intertropical Convergence Zone
NASA Astrophysics Data System (ADS)
Reimi Sipala, M. A.; Marcantonio, F.
2016-12-01
The Intertropical Convergence Zone (ITCZ) is a key component of tropical hydroclimate. It is associated with a zonally heterogeneous tropical precipitation maximum which affects the lives of billions. The Central Equatorial Pacific, near the Line Islands, is an ideal location to study ITCZ migration in response to global temperature fluctuations. Our study uses dust records recovered from five locations in the CEP. We address changes in dust provenance, and the response of the paleo-ITCZ to glacial-interglacial transitions around the penultimate termination (150 to 110 ka). Pb and Nd isotope ratios can be used as dust provenance tools, and lead to accurate reconstructions of paleo-ITCZ position, which are decoupled from rainfall intensity and dust flux. Five cores, along a meridional transect at approximately 160° W, give us access to unprecedented high spatial resolution records with core samples at: 0.48° N (ML1208-17PC), 1.27° N (ML1208-20BB), 2.97° N (ML1208-28BB), 4.68° N (ML1208-31BB), and 7.04° N (ML1208-31BB). Our preliminary data suggests that at the location of the equatorial core (17PC) dust is predominantly sourced from South America (average ɛNd = -4.4), but during Heinrich Stadial 11 ( 136-129 ka) there is a rapid isotopic excursion (-3 ɛNd units). This suggests an abrupt change in dust provenance to the CEP potentially associated with an increased influence of northern hemisphere dust. We will present Pb isotope data to further constrain this finding, and discuss the implications of the results for models of abrupt climate change.
Novel EUV mask black border and its impact on wafer imaging
NASA Astrophysics Data System (ADS)
Kodera, Yutaka; Fukugami, Norihito; Komizo, Toru; Watanabe, Genta; Ito, Shin; Yoshida, Itaru; Maruyama, Shingo; Kotani, Jun; Konishi, Toshio; Haraguchi, Takashi
2016-03-01
EUV lithography is the most promising technology for semiconductor device manufacturing of the 10nm node and beyond. The EUV mask is a key element in the lithographic scanner optical path. The image border is a pattern free dark area around the die on the photomask serving as transition area between the parts of the mask that is shielded from the exposure light by the Reticle Masking (REMA) blades and the die. When printing a die at dense spacing on an EUV scanner, the EUV light reflection from the image border overlaps edges of neighboring dies, affecting CD and contrast in this area. To reduce this effect an etched multilayer type black border was developed, and it was demonstrated that CD impact at the edge of a die is strongly reduced with this type of the black border (BB). However, wafer printing result still showed some CD change influenced by the black border reflection. It was proven that the CD shift was caused by DUV Out of Band (OOB) light which is emitted from EUV light source. New types of a multilayer etched BB were evaluated and showed a good potential for DUV light suppression. In this study, a novel black border called Hybrid Black Border has been developed which allows to eliminate EUV and DUV OOB light reflection. Direct measurements of OOB light from HBB and Normal BB are performed on NXE:3300B ASML EUV scanner; it is shown that HBB OOB reflection is 3x lower than that of Normal BB. Finally, we state that HBB is a promising technology allowing for CD control at die edges.
Kim, Tack-Joong; Lee, Ju-Hyun; Lee, Jung-Jin; Yu, Ji-Yeon; Hwang, Bang-Yeon; Ye, Sang-Kyu; Shujuan, Li; Gao, Li; Pyo, Myoung-Yun; Yun, Yeo-Pyo
2008-11-01
The proliferation of vascular smooth muscle cells (VSMCs) induced by injury to the intima of arteries is an important etiologic factor in vascular proliferative disorders such as atherosclerosis and restenosis. Uncaria rhynchophylla is traditional Chinese herb that has been applied to the treatment of convulsive disorders, such as epilepsy, in China. In the present study, we examined whether corynoxeine exerts inhibitory effects on platelet-derived growth factor (PDGF)-BB-induced rat aortic VSMC proliferation and the possible mechanism of such effects. Pre-treatment of VSMCs with corynoxeine (5-50 microM) for 24 h resulted in significant decreases in cell number without any cytotoxicity; the inhibition percentages were 25.0+/-12.5, 63.0+/-27.5 and 88.0+/-12.5% at 5, 20 and 50 microM, respectively. Also, corynoxeine significantly inhibited the 50 ng/ml PDGF-BB-induced DNA synthesis of VSMCs in a concentration-dependent manner without any cytotoxicity; the inhibitions were 32.8+/-11.0, 51.8+/-8.0 and 76.9+/-7.4% at concentrations of 5, 20 and 50 microM, respectively. Pre-incubation of VSMCs with corynoxeine significantly inhibited PDGF-BB-induced extracellular signal-regulated kinase 1/2 (ERK1/2) activation, whereas corynoxeine had no effects on mitogen-activated protein kinase (MAPK/ERK)-activating kinase 1 and 2 (MEK1/2), Akt, or phospholipase C (PLC)gamma1 activation or on PDGF receptor beta (PDGF-Rbeta) phosphorylation. These results suggest that corynoxeine is a potent ERK1/2 inhibitor of key PDGF-BB-induced VSMC proliferation and may be useful in the prevention and treatment of vascular diseases and restenosis after angioplasty.
Titos, G; Del Águila, A; Cazorla, A; Lyamani, H; Casquero-Vera, J A; Colombi, C; Cuccia, E; Gianelle, V; Močnik, G; Alastuey, A; Olmo, F J; Alados-Arboledas, L
2017-02-01
Biomass burning (BB) is a significant source of atmospheric particles in many parts of the world. Whereas many studies have demonstrated the importance of BB emissions in central and northern Europe, especially in rural areas, its impact in urban air quality of southern European countries has been sparsely investigated. In this study, highly time resolved multi-wavelength absorption coefficients together with levoglucosan (BB tracer) mass concentrations were combined to apportion carbonaceous aerosol sources. The Aethalometer model takes advantage of the different spectral behavior of BB and fossil fuel (FF) combustion aerosols. The model was found to be more sensitive to the assumed value of the aerosol Ångström exponent (AAE) for FF (AAE ff ) than to the AAE for BB (AAE bb ). As result of various sensitivity tests the model was optimized with AAE ff =1.1 and AAE bb =2. The Aethalometer model and levoglucosan tracer estimates were in good agreement. The Aethalometer model was further applied to data from three sites in Granada urban area to evaluate the spatial variation of CM ff and CM bb (carbonaceous matter from FF or BB origin, respectively) concentrations within the city. The results showed that CM bb was lower in the city centre while it has an unexpected profound impact on the CM levels measured in the suburbs (about 40%). Analysis of BB tracers with respect to wind speed suggested that BB was dominated by sources outside the city, to the west in a rural area. Distinguishing whether it corresponds to agricultural waste burning or with biomass burning for domestic heating was not possible. This study also shows that although traffic restrictions measures contribute to reduce carbonaceous concentrations, the extent of the reduction is very local. Other sources such as BB, which can contribute to CM as much as traffic emissions, should be targeted to reduce air pollution. Copyright © 2016 Elsevier B.V. All rights reserved.
An improved scheme on decoy-state method for measurement-device-independent quantum key distribution
Wang, Dong; Li, Mo; Guo, Guang-Can; Wang, Qin
2015-01-01
Quantum key distribution involving decoy-states is a significant application of quantum information. By using three-intensity decoy-states of single-photon-added coherent sources, we propose a practically realizable scheme on quantum key distribution which approaches very closely the ideal asymptotic case of an infinite number of decoy-states. We make a comparative study between this scheme and two other existing ones, i.e., two-intensity decoy-states with single-photon-added coherent sources, and three-intensity decoy-states with weak coherent sources. Through numerical analysis, we demonstrate the advantages of our scheme in secure transmission distance and the final key generation rate. PMID:26463580
Ellis, John A.; Gow, Sheryl P.; Lee, Lindsey B.; Lacoste, Stacey; Ball, Eileen C.
2017-01-01
In order to determine the comparative efficacy of injectable and intranasal vaccines to stimulate Bordetella bronchiseptica (Bb)-reactive anamnestic antibodies, a trial was conducted using 144 adult household dogs of various breeds and ages, which had been previously administered intranasal Bb vaccine approximately 12 months before enrollment. Dogs were randomized into 2 groups and blood, nasal swabs, and pharyngeal swabs were collected prior to the administration of single component Bb vaccines intranasally or parenterally. Ten to 14 days later all dogs were resampled to measure changes in systemic and local antibody to Bb. There were no differences in the changes in Bb-reactive serum IgG and nasal IgA between the groups, whereas intranasally vaccinated dogs had significantly higher Bb-reactive serum IgA. These data indicate that both of the current generation of intranasal (modified-live) and injectable (acellular) Bb vaccines can stimulate anamnestic local and systemic antibody responses in previously vaccinated, Bb-seropositive adult household dogs. PMID:28761185
A quantum proxy group signature scheme based on an entangled five-qubit state
NASA Astrophysics Data System (ADS)
Wang, Meiling; Ma, Wenping; Wang, Lili; Yin, Xunru
2015-09-01
A quantum proxy group signature (QPGS) scheme based on controlled teleportation is presented, by using the entangled five-qubit quantum state functions as quantum channel. The scheme uses the physical characteristics of quantum mechanics to implement delegation, signature and verification. The security of the scheme is guaranteed by the entanglement correlations of the entangled five-qubit state, the secret keys based on the quantum key distribution (QKD) and the one-time pad algorithm, all of which have been proven to be unconditionally secure and the signature anonymity.
Efficient multiparty quantum key agreement with collective detection.
Huang, Wei; Su, Qi; Liu, Bin; He, Yuan-Hang; Fan, Fan; Xu, Bing-Jie
2017-11-10
As a burgeoning branch of quantum cryptography, quantum key agreement is a kind of key establishing processes where the security and fairness of the established common key should be guaranteed simultaneously. However, the difficulty on designing a qualified quantum key agreement protocol increases significantly with the increase of the number of the involved participants. Thus far, only few of the existing multiparty quantum key agreement (MQKA) protocols can really achieve security and fairness. Nevertheless, these qualified MQKA protocols are either too inefficient or too impractical. In this paper, an MQKA protocol is proposed with single photons in travelling mode. Since only one eavesdropping detection is needed in the proposed protocol, the qubit efficiency and measurement efficiency of it are higher than those of the existing ones in theory. Compared with the protocols which make use of the entangled states or multi-particle measurements, the proposed protocol is more feasible with the current technologies. Security and fairness analysis shows that the proposed protocol is not only immune to the attacks from external eavesdroppers, but also free from the attacks from internal betrayers.
Quantum key distribution using gaussian-modulated coherent states
NASA Astrophysics Data System (ADS)
Grosshans, Frédéric; Van Assche, Gilles; Wenger, Jérôme; Brouri, Rosa; Cerf, Nicolas J.; Grangier, Philippe
2003-01-01
Quantum continuous variables are being explored as an alternative means to implement quantum key distribution, which is usually based on single photon counting. The former approach is potentially advantageous because it should enable higher key distribution rates. Here we propose and experimentally demonstrate a quantum key distribution protocol based on the transmission of gaussian-modulated coherent states (consisting of laser pulses containing a few hundred photons) and shot-noise-limited homodyne detection; squeezed or entangled beams are not required. Complete secret key extraction is achieved using a reverse reconciliation technique followed by privacy amplification. The reverse reconciliation technique is in principle secure for any value of the line transmission, against gaussian individual attacks based on entanglement and quantum memories. Our table-top experiment yields a net key transmission rate of about 1.7 megabits per second for a loss-free line, and 75 kilobits per second for a line with losses of 3.1dB. We anticipate that the scheme should remain effective for lines with higher losses, particularly because the present limitations are essentially technical, so that significant margin for improvement is available on both the hardware and software.
Fundamental rate-loss trade-off for the quantum internet
NASA Astrophysics Data System (ADS)
Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong
2016-11-01
The quantum internet holds promise for achieving quantum communication--such as quantum teleportation and quantum key distribution (QKD)--freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka-Guha-Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result--putting a practical but general limitation on the quantum internet--enables us to grasp the potential of the future quantum internet.
Fundamental rate-loss trade-off for the quantum internet
Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong
2016-01-01
The quantum internet holds promise for achieving quantum communication—such as quantum teleportation and quantum key distribution (QKD)—freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka–Guha–Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result—putting a practical but general limitation on the quantum internet—enables us to grasp the potential of the future quantum internet. PMID:27886172
Fundamental rate-loss trade-off for the quantum internet.
Azuma, Koji; Mizutani, Akihiro; Lo, Hoi-Kwong
2016-11-25
The quantum internet holds promise for achieving quantum communication-such as quantum teleportation and quantum key distribution (QKD)-freely between any clients all over the globe, as well as for the simulation of the evolution of quantum many-body systems. The most primitive function of the quantum internet is to provide quantum entanglement or a secret key to two points efficiently, by using intermediate nodes connected by optical channels with each other. Here we derive a fundamental rate-loss trade-off for a quantum internet protocol, by generalizing the Takeoka-Guha-Wilde bound to be applicable to any network topology. This trade-off has essentially no scaling gap with the quantum communication efficiencies of protocols known to be indispensable to long-distance quantum communication, such as intercity QKD and quantum repeaters. Our result-putting a practical but general limitation on the quantum internet-enables us to grasp the potential of the future quantum internet.
Influence of calcareous soil on Cry3Bb1 expression and efficacy in the field.
Wangila, David S; Valencia J, Arnubio; Wang, Haichuan; Siegfried, Blair D; Meinke, Lance J
2017-06-01
Greater than expected injury by western corn rootworm (WCR) (Diabrotica virgifera virgifera LeConte) to Cry3Bb1 expressing maize hybrids (Zea mays L.) has been reported in southwestern Nebraska. Affected areas of some fields are often associated with high pH calcareous soils where maize growth is poor and iron chlorosis is common. As part of a comprehensive study to understand potential causes of unexpected injury, experiments were conducted during 2013 and 2014 to ascertain whether the calcareous soil conditions and associated poor maize growth negatively affect the expression of Cry3Bb1. Quantitative determination of Cry3Bb1 protein expression levels in root tissues was carried out on plants at V5-V6 growth stage using the enzyme-linked immunosorbent assay. Cry3Bb1 and non-Bt near isoline maize hybrids were artificially infested with Cry3Bb1-susceptible WCR eggs to measure survival and efficacy of Cry3Bb1 maize in calcareous and non-calcareous soils. Results showed that there was not a significant difference in expression of Cry3Bb1 protein between plants from calcareous and non-calcareous soils (18.9-21.2 µg/g fresh weight). Western corn rootworm survival was about sevenfold greater from the non-Bt isoline than Cry3Bb1 maize indicating that Cry3Bb1 performed as expected when infested with a Cry3Bb1 susceptible rootworm population. When survival from calcareous and non-calcareous soils was compared, no significant differences were observed in each soil. A significant positive correlation between soil pH and expression of Cry3Bb1 protein in roots was detected from samples collected in 2014 but not in 2013. No such correlation was found between soil pH and survival of WCR. Results suggest that Cry3Bb1 expression levels were sufficient to provide adequate root protection against WCR regardless of soil environment, indicating that lowered Cry3Bb1 expression is not a contributing factor to the greater than expected WCR injury observed in some southwestern Nebraska maize fields.
Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy.
Christandl, Matthias; Ferrara, Roberto
2017-12-01
An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005)PRLTAO0031-900710.1103/PhysRevLett.94.200501]. The construction of those states was based on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable entanglement of certain private states. Third, we consider the problem of extending the distance of quantum key distribution with help of intermediate stations, a setting called the quantum key repeater. We show that for protocols that first distill private states, it is essentially optimal to use the standard quantum repeater protocol based on entanglement distillation and entanglement swapping.
An Efficient and Secure Arbitrary N-Party Quantum Key Agreement Protocol Using Bell States
NASA Astrophysics Data System (ADS)
Liu, Wen-Jie; Xu, Yong; Yang, Ching-Nung; Gao, Pei-Pei; Yu, Wen-Bin
2018-01-01
Two quantum key agreement protocols using Bell states and Bell measurement were recently proposed by Shukla et al. (Quantum Inf. Process. 13(11), 2391-2405, 2014). However, Zhu et al. pointed out that there are some security flaws and proposed an improved version (Quantum Inf. Process. 14(11), 4245-4254, 2015). In this study, we will show Zhu et al.'s improvement still exists some security problems, and its efficiency is not high enough. For solving these problems, we utilize four Pauli operations { I, Z, X, Y} to encode two bits instead of the original two operations { I, X} to encode one bit, and then propose an efficient and secure arbitrary N-party quantum key agreement protocol. In the protocol, the channel checking with decoy single photons is introduced to avoid the eavesdropper's flip attack, and a post-measurement mechanism is used to prevent against the collusion attack. The security analysis shows the present protocol can guarantee the correctness, security, privacy and fairness of quantum key agreement.
Private States, Quantum Data Hiding, and the Swapping of Perfect Secrecy
NASA Astrophysics Data System (ADS)
Christandl, Matthias; Ferrara, Roberto
2017-12-01
An important contribution to the understanding of quantum key distribution has been the discovery of entangled states from which secret bits, but no maximally entangled states, can be extracted [Horodecki et al., Phys. Rev. Lett. 94, 200501 (2005), 10.1103/PhysRevLett.94.200501]. The construction of those states was based on an intuition that the quantum mechanical phenomena of data hiding and privacy might be related. In this Letter we firmly connect these two phenomena and highlight three aspects of this result. First, we simplify the definition of the secret key rate. Second, we give a formula for the one-way distillable entanglement of certain private states. Third, we consider the problem of extending the distance of quantum key distribution with help of intermediate stations, a setting called the quantum key repeater. We show that for protocols that first distill private states, it is essentially optimal to use the standard quantum repeater protocol based on entanglement distillation and entanglement swapping.
Determining the Complexity of the Quantum Adiabatic Algorithm using Quantum Monte Carlo Simulations
2012-12-18
of this printing. List the papers, including journal references, in the following categories: Received Paper 12/06/2012 4.00 Itay Hen, A. Young...PhysRevLett.104.020502 12/06/2012 3.00 A. P. Young, Itay Hen. Exponential complexity of the quantum adiabatic algorithm for certain satisfiability problems...Physical Review E, (12 2011): 0. doi: 10.1103/PhysRevE.84.061152 12/06/2012 5.00 Edward Farhi, David Gosset, Itay Hen, A. Sandvik, Peter Shor, A
Symmetric Blind Information Reconciliation for Quantum Key Distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Kiktenko, Evgeniy O.; Trushechkin, Anton S.; Lim, Charles Ci Wen
Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration ofmore » results of unsuccessful belief-propagation decodings.« less
Symmetric Blind Information Reconciliation for Quantum Key Distribution
Kiktenko, Evgeniy O.; Trushechkin, Anton S.; Lim, Charles Ci Wen; ...
2017-10-27
Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. Finally, the proposed technique is based on introducing symmetry in operations of parties, and the consideration ofmore » results of unsuccessful belief-propagation decodings.« less
Symmetric Blind Information Reconciliation for Quantum Key Distribution
NASA Astrophysics Data System (ADS)
Kiktenko, E. O.; Trushechkin, A. S.; Lim, C. C. W.; Kurochkin, Y. V.; Fedorov, A. K.
2017-10-01
Quantum key distribution (QKD) is a quantum-proof key-exchange scheme which is fast approaching the communication industry. An essential component in QKD is the information reconciliation step, which is used for correcting the quantum-channel noise errors. The recently suggested blind-reconciliation technique, based on low-density parity-check codes, offers remarkable prospectives for efficient information reconciliation without an a priori quantum bit error rate estimation. We suggest an improvement of the blind-information-reconciliation protocol promoting a significant increase in the efficiency of the procedure and reducing its interactivity. The proposed technique is based on introducing symmetry in operations of parties, and the consideration of results of unsuccessful belief-propagation decodings.
Management of BB shot wounds to the heart.
Thompson, E C; Block, E F; Mancini, M C
1996-01-01
The aim of this study was to review our experience with BB shot injuries to the heart. This is a retrospective chart review. Three patients were found to have BB injuries to the heart. All patients were stable upon presentation. Echocardiography localized the BB pellets to the muscular septum. All patients were treated with nonoperative therapy. There was not mortality. One patient developed an interventricular conduction delay that resolved before discharge. Nonoperative management of stable patients who present with BB wounds to the heart is safe and effective if the BB is intramuscular. An echocardiogram should be used to localize the pellets and evaluate the pericardium.
Secret-key-assisted private classical communication capacity over quantum channels
NASA Astrophysics Data System (ADS)
Hsieh, Min-Hsiu; Luo, Zhicheng; Brun, Todd
2008-10-01
We prove a regularized formula for the secret-key-assisted capacity region of a quantum channel for transmitting private classical information. This result parallels the work of Devetak (e-print arXiv:quant-ph/0512015) on entanglement-assisted quantum communication capacity . This formula provides a family protocol, the private father protocol, under the resource inequality framework that includes private classical communication without secret-key assistance as a child protocol.
Alatyrtsev, V V; Iakunin, Iu A; Burkova, A S; Podkopaev, V N; Afonina, L G
1989-01-01
A study was made of the content of creatine kinase-BB (CK-BB) and lactate in cerebrospinal fluid (CSF) of 202 neonates and infants with perinatal CNS injuries. The relationship was found between the rise of the CK-BB content and the gravity of perinatal CNS injuries. The highest content of CK-BB in CSF was marked in neonates with cerebral disorders complicated by infectious and inflammatory diseases (pneumonia, sepsis). Within the first 5 days of life, the children of this group demonstrated the relationship between the content of CK-BB and lactate of CSF. The measurement of the content of CK-BB in CSF should be used for early diagnosis, assessment of the gravity and course of perinatal CNS injuries in neonates and in infants.
Fully device-independent quantum key distribution.
Vazirani, Umesh; Vidick, Thomas
2014-10-03
Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.
Fully Device-Independent Quantum Key Distribution
NASA Astrophysics Data System (ADS)
Vazirani, Umesh; Vidick, Thomas
2014-10-01
Quantum cryptography promises levels of security that are impossible to replicate in a classical world. Can this security be guaranteed even when the quantum devices on which the protocol relies are untrusted? This central question dates back to the early 1990s when the challenge of achieving device-independent quantum key distribution was first formulated. We answer this challenge by rigorously proving the device-independent security of a slight variant of Ekert's original entanglement-based protocol against the most general (coherent) attacks. The resulting protocol is robust: While assuming only that the devices can be modeled by the laws of quantum mechanics and are spatially isolated from each other and from any adversary's laboratory, it achieves a linear key rate and tolerates a constant noise rate in the devices. In particular, the devices may have quantum memory and share arbitrary quantum correlations with the eavesdropper. The proof of security is based on a new quantitative understanding of the monogamous nature of quantum correlations in the context of a multiparty protocol.
Kim, Jiyoung; Park, Hyesung; Han, Jae-Gu; Oh, Junsang; Choi, Hyung-Kyoon; Kim, Seong Hwan; Sung, Gi-Ho
2015-11-01
Phenylalanine ammonia lyase (PAL, E.C. 4.3.1.5) catalyses the deamination of L -phenylalanine to trans-cinnamic acid and ammonia, facilitating a critical step in the phenylpropanoid pathway that produces a variety of secondary metabolites. In this study, we isolated BbPAL gene in the entomopathogenic fungus Beauveria bassiana. According to multiple sequence alignment, homology modelling and in vitro PAL activity, we demonstrated that BbPAL acts as a typical PAL enzyme in B. bassiana. BbPAL interacted with calmodulin (CaM) in vitro and in vivo, indicating that BbPAL is a novel CaM-binding protein. The functional role of CaM in BbPAL action was to negatively regulate the BbPAL activity in B. bassiana. High-performance liquid chromatography analysis revealed that L -phenylalanine was reduced and trans-cinnamic acid was increased in response to the CaM inhibitor W-7. Dark conditions suppressed BbPAL activity in B. bassiana, compared with light. In addition, heat and cold stresses inhibited BbPAL activity in B. bassiana. Interestingly, these negative effects of BbPAL activity by dark, heat and cold conditions were recovered by W-7 treatment, suggesting that the inhibitory mechanism is mediated through stimulation of CaM activity. Therefore, this work suggests that BbPAL plays a role in the phenylpropanoid pathway mediated by environmental stimuli via the CaM signalling pathway. © 2015 Society for Applied Microbiology and John Wiley & Sons Ltd.
Comparison of MODIS and VIIRS On-board Blackbody Performance
NASA Technical Reports Server (NTRS)
Xiong, Jack; Butler, Jim; Wu, Aisheng; Chiang, Vincent; McIntire, Jeff; Oudari, Hassan
2012-01-01
MODIS has 16 thermal emissive bands (TEBs), covering wavelengths from 3.7 to 14.4 microns. MODIS TEBs are calibrated on-orbit by a v-grooved blackbody (BB) on a scan-by-scan basis. The BB temperatures are measured by a set of 12 thennistors. As expected, the BB temperature uncertainty and stability have direct impact on the quality of TEB calibration and, therefore, the quality of the science products derived from TEB observations. Since launch, Terra and Aqua MODIS have successfully operated for more than 12 and 10 years, respectively. Their on-board BB performance has been satisfactory in meeting the TEB calibration requirements. The first VIIRS, launched on-board the Suomi NPP spacecraft on October 28, 2011, has successfully completed its initial Intensive Calibration and Validation (ICV) phase. VIIRS has 7 thermal emissive bands (TEBs), covering wavelengths from 3.7 to 12.4 microns. Designed with strong MODIS heritage, VIIRS uses a similar BB for its TEB calibration. Like MODIS, VIIRS BB is nominally controlled at a pre-determined temperature (set point). Periodically, a BB Warm-Up and Cool-Down (WUCD) operation is performed, during which the BB temperatures vary from instrument ambient (temperature) to 315K. This paper examines NPP VIIRS BB on-orbit performance. It focuses on its BB temperature scan-to-scan variations at nominally controlled temperature as well as during its WUCD operation and their impact on TEB calibration uncertainty. Comparisons of VIIRS (NPP) and MODIS (Terra and Aqua) BB on-orbit performance and lessons learned for future improvements are also presented in this paper.
SeaQuaKE: Sea-optimized Quantum Key Exchange
2014-06-01
is led by Applied Communications Sciences under the ONR Free Space Optical Quantum Key Distribution Special Notice (13-SN-0004 under ONRBAA13-001...In addition, we discuss our initial progress towards the free - space quantum channel model and planning for the experimental validation effort. 15...SUBJECT TERMS Quantum communications, free - space optical communications 16. SECURITY CLASSIFICATION OF: 17. LIMITATION OF ABSTRACT Same as
Satellite-Relayed Intercontinental Quantum Network.
Liao, Sheng-Kai; Cai, Wen-Qi; Handsteiner, Johannes; Liu, Bo; Yin, Juan; Zhang, Liang; Rauch, Dominik; Fink, Matthias; Ren, Ji-Gang; Liu, Wei-Yue; Li, Yang; Shen, Qi; Cao, Yuan; Li, Feng-Zhi; Wang, Jian-Feng; Huang, Yong-Mei; Deng, Lei; Xi, Tao; Ma, Lu; Hu, Tai; Li, Li; Liu, Nai-Le; Koidl, Franz; Wang, Peiyuan; Chen, Yu-Ao; Wang, Xiang-Bin; Steindorfer, Michael; Kirchner, Georg; Lu, Chao-Yang; Shu, Rong; Ursin, Rupert; Scheidl, Thomas; Peng, Cheng-Zhi; Wang, Jian-Yu; Zeilinger, Anton; Pan, Jian-Wei
2018-01-19
We perform decoy-state quantum key distribution between a low-Earth-orbit satellite and multiple ground stations located in Xinglong, Nanshan, and Graz, which establish satellite-to-ground secure keys with ∼kHz rate per passage of the satellite Micius over a ground station. The satellite thus establishes a secure key between itself and, say, Xinglong, and another key between itself and, say, Graz. Then, upon request from the ground command, Micius acts as a trusted relay. It performs bitwise exclusive or operations between the two keys and relays the result to one of the ground stations. That way, a secret key is created between China and Europe at locations separated by 7600 km on Earth. These keys are then used for intercontinental quantum-secured communication. This was, on the one hand, the transmission of images in a one-time pad configuration from China to Austria as well as from Austria to China. Also, a video conference was performed between the Austrian Academy of Sciences and the Chinese Academy of Sciences, which also included a 280 km optical ground connection between Xinglong and Beijing. Our work clearly confirms the Micius satellite as a robust platform for quantum key distribution with different ground stations on Earth, and points towards an efficient solution for an ultralong-distance global quantum network.
Satellite-Relayed Intercontinental Quantum Network
NASA Astrophysics Data System (ADS)
Liao, Sheng-Kai; Cai, Wen-Qi; Handsteiner, Johannes; Liu, Bo; Yin, Juan; Zhang, Liang; Rauch, Dominik; Fink, Matthias; Ren, Ji-Gang; Liu, Wei-Yue; Li, Yang; Shen, Qi; Cao, Yuan; Li, Feng-Zhi; Wang, Jian-Feng; Huang, Yong-Mei; Deng, Lei; Xi, Tao; Ma, Lu; Hu, Tai; Li, Li; Liu, Nai-Le; Koidl, Franz; Wang, Peiyuan; Chen, Yu-Ao; Wang, Xiang-Bin; Steindorfer, Michael; Kirchner, Georg; Lu, Chao-Yang; Shu, Rong; Ursin, Rupert; Scheidl, Thomas; Peng, Cheng-Zhi; Wang, Jian-Yu; Zeilinger, Anton; Pan, Jian-Wei
2018-01-01
We perform decoy-state quantum key distribution between a low-Earth-orbit satellite and multiple ground stations located in Xinglong, Nanshan, and Graz, which establish satellite-to-ground secure keys with ˜kHz rate per passage of the satellite Micius over a ground station. The satellite thus establishes a secure key between itself and, say, Xinglong, and another key between itself and, say, Graz. Then, upon request from the ground command, Micius acts as a trusted relay. It performs bitwise exclusive or operations between the two keys and relays the result to one of the ground stations. That way, a secret key is created between China and Europe at locations separated by 7600 km on Earth. These keys are then used for intercontinental quantum-secured communication. This was, on the one hand, the transmission of images in a one-time pad configuration from China to Austria as well as from Austria to China. Also, a video conference was performed between the Austrian Academy of Sciences and the Chinese Academy of Sciences, which also included a 280 km optical ground connection between Xinglong and Beijing. Our work clearly confirms the Micius satellite as a robust platform for quantum key distribution with different ground stations on Earth, and points towards an efficient solution for an ultralong-distance global quantum network.
H{sub 2}—AgCl: A spectroscopic study of a dihydrogen complex
DOE Office of Scientific and Technical Information (OSTI.GOV)
Grubbs, G. S.; Obenchain, Daniel A.; Pickett, Herbert M.
2014-09-21
H{sub 2}—AgCl has been observed on a Fourier transform microwave spectrometer equipped with laser ablation source and determined to be a dihydrogen complex. Transitions up to J = 3–2 have been measured and analyzed for four isotopologues of the complex containing ortho and para H{sub 2}. The ortho and para spin states have been included in one fit, a deviation from the typical H{sub 2} complex. Rotational constants B and C, centrifugal distortion constants Δ{sub J} and Δ{sub JK}, nuclear electric quadrupole coupling constants χ{sub aa}, χ{sub bb}, and χ{sub cc} for {sup 35}Cl and {sup 37}Cl have been fitmore » for both spin states while nuclear spin-nuclear spin constants D{sub aa}, D{sub bb}, and D{sub cc}, and nuclear spin-rotation constant C{sub aa} have been reported for the ortho spin state. Quantum chemical calculations predict a strong bonding interaction and the strength of the complex has been related to reported χ{sub aa} and Δ{sub J} values amongst a host of comparable species, including the AgCl monomer itself. Bond lengths have been determined for Ag—Cl, Ag—H{sub 2} center-of-mass, and H—H and are reported.« less
NASA Astrophysics Data System (ADS)
Liang, Lin-Mei; Sun, Shi-Hai; Jiang, Mu-Sheng; Li, Chun-Yan
2014-10-01
In general, quantum key distribution (QKD) has been proved unconditionally secure for perfect devices due to quantum uncertainty principle, quantum noncloning theorem and quantum nondividing principle which means that a quantum cannot be divided further. However, the practical optical and electrical devices used in the system are imperfect, which can be exploited by the eavesdropper to partially or totally spy the secret key between the legitimate parties. In this article, we first briefly review the recent work on quantum hacking on some experimental QKD systems with respect to imperfect devices carried out internationally, then we will present our recent hacking works in details, including passive faraday mirror attack, partially random phase attack, wavelength-selected photon-number-splitting attack, frequency shift attack, and single-photon-detector attack. Those quantum attack reminds people to improve the security existed in practical QKD systems due to imperfect devices by simply adding countermeasure or adopting a totally different protocol such as measurement-device independent protocol to avoid quantum hacking on the imperfection of measurement devices [Lo, et al., Phys. Rev. Lett., 2012, 108: 130503].
Quantum key distribution using basis encoding of Gaussian-modulated coherent states
NASA Astrophysics Data System (ADS)
Huang, Peng; Huang, Jingzheng; Zhang, Zheshen; Zeng, Guihua
2018-04-01
The continuous-variable quantum key distribution (CVQKD) has been demonstrated to be available in practical secure quantum cryptography. However, its performance is restricted strongly by the channel excess noise and the reconciliation efficiency. In this paper, we present a quantum key distribution (QKD) protocol by encoding the secret keys on the random choices of two measurement bases: the conjugate quadratures X and P . The employed encoding method can dramatically weaken the effects of channel excess noise and reconciliation efficiency on the performance of the QKD protocol. Subsequently, the proposed scheme exhibits the capability to tolerate much higher excess noise and enables us to reach a much longer secure transmission distance even at lower reconciliation efficiency. The proposal can work alternatively to strengthen significantly the performance of the known Gaussian-modulated CVQKD protocol and serve as a multiplier for practical secure quantum cryptography with continuous variables.
High-rate measurement-device-independent quantum cryptography
NASA Astrophysics Data System (ADS)
Pirandola, Stefano; Ottaviani, Carlo; Spedalieri, Gaetana; Weedbrook, Christian; Braunstein, Samuel L.; Lloyd, Seth; Gehring, Tobias; Jacobsen, Christian S.; Andersen, Ulrik L.
2015-06-01
Quantum cryptography achieves a formidable task—the remote distribution of secret keys by exploiting the fundamental laws of physics. Quantum cryptography is now headed towards solving the practical problem of constructing scalable and secure quantum networks. A significant step in this direction has been the introduction of measurement-device independence, where the secret key between two parties is established by the measurement of an untrusted relay. Unfortunately, although qubit-implemented protocols can reach long distances, their key rates are typically very low, unsuitable for the demands of a metropolitan network. Here we show, theoretically and experimentally, that a solution can come from the use of continuous-variable systems. We design a coherent-state network protocol able to achieve remarkably high key rates at metropolitan distances, in fact three orders of magnitude higher than those currently achieved. Our protocol could be employed to build high-rate quantum networks where devices securely connect to nearby access points or proxy servers.
Continuous high speed coherent one-way quantum key distribution.
Stucki, Damien; Barreiro, Claudio; Fasel, Sylvain; Gautier, Jean-Daniel; Gay, Olivier; Gisin, Nicolas; Thew, Rob; Thoma, Yann; Trinkler, Patrick; Vannel, Fabien; Zbinden, Hugo
2009-08-03
Quantum key distribution (QKD) is the first commercial quantum technology operating at the level of single quanta and is a leading light for quantum-enabled photonic technologies. However, controlling these quantum optical systems in real world environments presents significant challenges. For the first time, we have brought together three key concepts for future QKD systems: a simple high-speed protocol; high performance detection; and integration both, at the component level and for standard fibre network connectivity. The QKD system is capable of continuous and autonomous operation, generating secret keys in real time. Laboratory and field tests were performed and comparisons made with robust InGaAs avalanche photodiodes and superconducting detectors. We report the first real world implementation of a fully functional QKD system over a 43 dB-loss (150 km) transmission line in the Swisscom fibre optic network where we obtained average real-time distribution rates over 3 hours of 2.5 bps.
NASA Astrophysics Data System (ADS)
Iwakoshi, Takehisa; Hirota, Osamu
2014-10-01
This study will test an interpretation in quantum key distribution (QKD) that trace distance between the distributed quantum state and the ideal mixed state is a maximum failure probability of the protocol. Around 2004, this interpretation was proposed and standardized to satisfy both of the key uniformity in the context of universal composability and operational meaning of the failure probability of the key extraction. However, this proposal has not been verified concretely yet for many years while H. P. Yuen and O. Hirota have thrown doubt on this interpretation since 2009. To ascertain this interpretation, a physical random number generator was employed to evaluate key uniformity in QKD. In this way, we calculated statistical distance which correspond to trace distance in quantum theory after a quantum measurement is done, then we compared it with the failure probability whether universal composability was obtained. As a result, the degree of statistical distance of the probability distribution of the physical random numbers and the ideal uniformity was very large. It is also explained why trace distance is not suitable to guarantee the security in QKD from the view point of quantum binary decision theory.
Security of Distributed-Phase-Reference Quantum Key Distribution
NASA Astrophysics Data System (ADS)
Moroder, Tobias; Curty, Marcos; Lim, Charles Ci Wen; Thinh, Le Phuc; Zbinden, Hugo; Gisin, Nicolas
2012-12-01
Distributed-phase-reference quantum key distribution stands out for its easy implementation with present day technology. For many years, a full security proof of these schemes in a realistic setting has been elusive. We solve this long-standing problem and present a generic method to prove the security of such protocols against general attacks. To illustrate our result, we provide lower bounds on the key generation rate of a variant of the coherent-one-way quantum key distribution protocol. In contrast to standard predictions, it appears to scale quadratically with the system transmittance.
Experimental realization of equiangular three-state quantum key distribution
Schiavon, Matteo; Vallone, Giuseppe; Villoresi, Paolo
2016-01-01
Quantum key distribution using three states in equiangular configuration combines a security threshold comparable with the one of the Bennett-Brassard 1984 protocol and a quantum bit error rate (QBER) estimation that does not need to reveal part of the key. We implement an entanglement-based version of the Renes 2004 protocol, using only passive optic elements in a linear scheme for the positive-operator valued measure (POVM), generating an asymptotic secure key rate of more than 10 kbit/s, with a mean QBER of 1.6%. We then demonstrate its security in the case of finite key and evaluate the key rate for both collective and general attacks. PMID:27465643
Higgs boson production with heavy quarks at hadron colliders
NASA Astrophysics Data System (ADS)
Jackson, Christopher B.
2005-11-01
One of the remaining puzzles in particle physics is the origin of electroweak symmetry breaking. In the Standard Model (SM), a single doublet of complex scalar fields is responsible for breaking the SU(2) L x U(1)Y gauge symmetry thus giving mass to the electroweak gauge bosons via the Higgs mechanism and to the fermions via Yukawa couplings. The remnant of the process is a vet to he discovered scalar particle, the Higgs boson (h). However, current and future experiments at hadron colliders hold great promise. Of particular interest at hadron colliders is the production of a Higgs boson in association with a pair of heavy quarks, pp¯(pp) → QQ¯h, where Q can be either a top or a bottom quark. Indeed, the production of a Higgs boson with a pair of top quarks provides a very distinctive signal in hadronic collisions where background processes are formidable, and it will be instrumental in the discovery of a Higgs boson below about 130 GeV at the LHC. On the other hand, the production of a Higgs boson with bottom quarks can be strongly enhanced in models of new physics beyond the SM, e.g. supersymmetric models. If this is the case, bb¯h production will play a crucial role at the Tevatron where it could provide the first signal of new physics. Given the prominent role that Higgs production with heavy quarks can play at hadron colliders, it becomes imperative to have precise theoretical predictions for total and differential cross sections. In this dissertation, we outline and present detailed results for the next-to-leading order (NLO) calculation of the Quantum Chromodynamic (QCD) corrections to QQ¯h production at both the Tevatron and the LHC. This calculation involves several difficult issues due to the three massive particles in the final state, a situation which is at the frontier of radiative correction calculations in quantum field theory. We detail the novel techniques developed to deal with these challenges. The calculation of pp¯(pp) → bb¯h at NLO in QCD involves several subtle issues not encountered in the case of pp¯(pp) → tt¯h. Recently, two different calculational schemes have been applied to the calculation of higher-order QCD corrections to bb¯h production. Here we compare these two seemingly different schemes and show that they produce compatible results for the total and differential cross sections in the cases of Higgs production with zero tagged b jets and one tagged b jet.
Theory of single-photon detectors employing smart strategies of detection
NASA Astrophysics Data System (ADS)
Silva, João Batista Rosa; Ramos, Rubens Viana
2005-11-01
Single-photon detectors have become more important with the advent of set-ups for optical communication using single-photon pulses, mainly quantum key distribution. The performance of quantum key distribution systems depends strongly on the performance of single-photon detectors. In this paper, aiming to overcome the afterpulsing that limits strongly the maximal transmission rate of quantum key distribution systems, three smart strategies for single-photon detection are discussed using analytical and numerical procedures. The three strategies are: hold-off time conditioned to avalanche presence, termed the Norwegian strategy, using one avalanche photodiode, using two raffled avalanche photodiodes and using two switched avalanche photodiodes. Finally we give examples using these strategies in a quantum key distribution set-up.
Metropolitan Quantum Key Distribution with Silicon Photonics
DOE Office of Scientific and Technical Information (OSTI.GOV)
Bunandar, Darius; Lentine, Anthony; Lee, Catherine
Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalablemore » resource for future formation of metropolitan quantum-secure communications networks.« less
Metropolitan Quantum Key Distribution with Silicon Photonics
Bunandar, Darius; Lentine, Anthony; Lee, Catherine; ...
2018-04-06
Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalablemore » resource for future formation of metropolitan quantum-secure communications networks.« less
Eavesdropping on counterfactual quantum key distribution with finite resources
NASA Astrophysics Data System (ADS)
Liu, Xingtong; Zhang, Bo; Wang, Jian; Tang, Chaojing; Zhao, Jingjing; Zhang, Sheng
2014-08-01
A striking scheme called "counterfactual quantum cryptography" gives a conceptually new approach to accomplish the task of key distribution. It allows two legitimate parties to share a secret even though a particle carrying secret information is not, in fact, transmitted through the quantum channel. Since an eavesdropper cannot directly access the entire quantum system of each signal particle, the protocol seems to provide practical security advantages. However, here we propose an eavesdropping method which works on the scheme in a finite key scenario. We show that, for practical systems only generating a finite number of keys, the eavesdropping can obtain all of the secret information without being detected. We also present a improved protocol as a countermeasure against this attack.
Metropolitan Quantum Key Distribution with Silicon Photonics
NASA Astrophysics Data System (ADS)
Bunandar, Darius; Lentine, Anthony; Lee, Catherine; Cai, Hong; Long, Christopher M.; Boynton, Nicholas; Martinez, Nicholas; DeRose, Christopher; Chen, Changchen; Grein, Matthew; Trotter, Douglas; Starbuck, Andrew; Pomerene, Andrew; Hamilton, Scott; Wong, Franco N. C.; Camacho, Ryan; Davids, Paul; Urayama, Junji; Englund, Dirk
2018-04-01
Photonic integrated circuits provide a compact and stable platform for quantum photonics. Here we demonstrate a silicon photonics quantum key distribution (QKD) encoder in the first high-speed polarization-based QKD field tests. The systems reach composable secret key rates of 1.039 Mbps in a local test (on a 103.6-m fiber with a total emulated loss of 9.2 dB) and 157 kbps in an intercity metropolitan test (on a 43-km fiber with 16.4 dB loss). Our results represent the highest secret key generation rate for polarization-based QKD experiments at a standard telecom wavelength and demonstrate photonic integrated circuits as a promising, scalable resource for future formation of metropolitan quantum-secure communications networks.
Specificity of EIA immunoassay for complement factor Bb testing.
Pavlov, Igor Y; De Forest, Nikol; Delgado, Julio C
2011-01-01
During the alternative complement pathway activation, factor B is cleaved in two fragments, Ba and Bb. Concentration of those fragments is about 2 logs lower than of factor B present in the blood, which makes fragment detection challenging because of potential cross-reactivity. Lack of information on Bb assay cross-reactivity stimulated the authors to investigate this issue. We ran 109 healthy donor EDTA plasmas and 80 sera samples with both factor B immunodiffusion (The Binding Site) and Quidel Bb EIA assays. During the study it was shown that physiological concentrations of gently purified factor B demonstrated approximately 0.15% cross-reactivity in the Quidel Bb EIA assay. We also observed that Bb concentration in serum is higher than in plasma due to complement activation during clot formation which let us use sera as samples representing complement activated state. Our study demonstrated that despite the potential 0.15% cross-reactivity between endogenous factor B and cleaved Bb molecule, measuring plasma concentrations of factor Bb is adequate to evaluate the activation of the alternative complement pathway.
Upconversion-based receivers for quantum hacking-resistant quantum key distribution
NASA Astrophysics Data System (ADS)
Jain, Nitin; Kanter, Gregory S.
2016-07-01
We propose a novel upconversion (sum frequency generation)-based quantum-optical system design that can be employed as a receiver (Bob) in practical quantum key distribution systems. The pump governing the upconversion process is produced and utilized inside the physical receiver, making its access or control unrealistic for an external adversary (Eve). This pump facilitates several properties which permit Bob to define and control the modes that can participate in the quantum measurement. Furthermore, by manipulating and monitoring the characteristics of the pump pulses, Bob can detect a wide range of quantum hacking attacks launched by Eve.
Quantum key distribution protocol based on contextuality monogamy
NASA Astrophysics Data System (ADS)
Singh, Jaskaran; Bharti, Kishor; Arvind
2017-06-01
The security of quantum key distribution (QKD) protocols hinges upon features of physical systems that are uniquely quantum in nature. We explore the role of quantumness, as qualified by quantum contextuality, in a QKD scheme. A QKD protocol based on the Klyachko-Can-Binicioğlu-Shumovsky (KCBS) contextuality scenario using a three-level quantum system is presented. We explicitly show the unconditional security of the protocol by a generalized contextuality monogamy relationship based on the no-disturbance principle. This protocol provides a new framework for QKD which has conceptual and practical advantages over other protocols.
A Bilobalide-Producing Endophytic Fungus, Pestalotiopsis uvicola from Medicinal Plant Ginkgo biloba.
Qian, Yi-Xin; Kang, Ji-Chuan; Luo, Yi-Kai; Zhao, Jun-Jie; He, Jun; Geng, Kun
2016-08-01
For screening bilobalide (BB)-producing endophytic fungi from medicinal plant Ginkgo biloba, a total of 57 fungal isolates were isolated from the internal stem, root, leaf, and bark of the plant G. biloba. Fermentation processes using BB-producing fungi other than G. biloba may become a novel way to produce BB, which is a terpene trilactones exhibiting neuroprotective effects. In this study, a BB-producing endophytic fungal strain GZUYX13 was isolated from the leaves of G. biloba grown in the campus of Guizhou University, Guiyang city, Guizhou province, China. The strain produced BB when grown in potato dextrose liquid medium. The amount of BB produced by this endophytic fungus was quantified to be 106 μg/L via high-performance liquid chromatography (HPLC), substantially lower than that produced by the host tissue. The fungal BB which was analyzed by thin layer chromatography (TLC) and HPLC was proven to be identical to authentic BB. The strain GZUYX13 was identified as Pestalotiopsis uvicola via morphology and ITS rDNA phylogeny. To the best of our knowledge, this is the first report concerning the isolation and identification of endophytic BB-producing Pestalotiopsis spp. from the host plant, which further proved that endophytic fungi have the potential to produce bioactive compounds.
First measurement of the charge asymmetry in beauty-quark pair production.
Aaij, R; Adeva, B; Adinolfi, M; Affolder, A; Ajaltouni, Z; Akar, S; Albrecht, J; Alessio, F; Alexander, M; Ali, S; Alkhazov, G; Alvarez Cartelle, P; Alves, A A; Amato, S; Amerio, S; Amhis, Y; An, L; Anderlini, L; Anderson, J; Andreassen, R; Andreotti, M; Andrews, J E; Appleby, R B; Aquines Gutierrez, O; Archilli, F; Artamonov, A; Artuso, M; Aslanides, E; Auriemma, G; Baalouch, M; Bachmann, S; Back, J J; Badalov, A; Balagura, V; Baldini, W; Barlow, R J; Barschel, C; Barsuk, S; Barter, W; Batozskaya, V; Battista, V; Bay, A; Beaucourt, L; Beddow, J; Bedeschi, F; Bediaga, I; Belogurov, S; Belous, K; Belyaev, I; Ben-Haim, E; Bencivenni, G; Benson, S; Benton, J; Berezhnoy, A; Bernet, R; Bettler, M-O; van Beuzekom, M; Bien, A; Bifani, S; Bird, T; Bizzeti, A; Bjørnstad, P M; Blake, T; Blanc, F; Blouw, J; Blusk, S; Bocci, V; Bondar, A; Bondar, N; Bonivento, W; Borghi, S; Borgia, A; Borsato, M; Bowcock, T J V; Bowen, E; Bozzi, C; Brambach, T; van den Brand, J; Bressieux, J; Brett, D; Britsch, M; Britton, T; Brodzicka, J; Brook, N H; Brown, H; Bursche, A; Busetto, G; Buytaert, J; Cadeddu, S; Calabrese, R; Calvi, M; Calvo Gomez, M; Camboni, A; Campana, P; Campora Perez, D; Carbone, A; Carboni, G; Cardinale, R; Cardini, A; Carranza-Mejia, H; Carson, L; Carvalho Akiba, K; Casse, G; Cassina, L; Castillo Garcia, L; Cattaneo, M; Cauet, Ch; Cenci, R; Charles, M; Charpentier, Ph; Chen, S; Cheung, S-F; Chiapolini, N; Chrzaszcz, M; Ciba, K; Cid Vidal, X; Ciezarek, G; Clarke, P E L; Clemencic, M; Cliff, H V; Closier, J; Coco, V; Cogan, J; Cogneras, E; Collins, P; Comerma-Montells, A; Contu, A; Cook, A; Coombes, M; Coquereau, S; Corti, G; Corvo, M; Counts, I; Couturier, B; Cowan, G A; Craik, D C; Cruz Torres, M; Cunliffe, S; Currie, R; D'Ambrosio, C; Dalseno, J; David, P; David, P N Y; Davis, A; De Bruyn, K; De Capua, S; De Cian, M; De Miranda, J M; De Paula, L; De Silva, W; De Simone, P; Decamp, D; Deckenhoff, M; Del Buono, L; Déléage, N; Derkach, D; Deschamps, O; Dettori, F; Di Canto, A; Dijkstra, H; Donleavy, S; Dordei, F; Dorigo, M; Dosil Suárez, A; Dossett, D; Dovbnya, A; Dreimanis, K; Dujany, G; Dupertuis, F; Durante, P; Dzhelyadin, R; Dziurda, A; Dzyuba, A; Easo, S; Egede, U; Egorychev, V; Eidelman, S; Eisenhardt, S; Eitschberger, U; Ekelhof, R; Eklund, L; El Rifai, I; Elsasser, Ch; Ely, S; Esen, S; Evans, H-M; Evans, T; Falabella, A; Färber, C; Farinelli, C; Farley, N; Farry, S; Fay, Rf; Ferguson, D; Fernandez Albor, V; Ferreira Rodrigues, F; Ferro-Luzzi, M; Filippov, S; Fiore, M; Fiorini, M; Firlej, M; Fitzpatrick, C; Fiutowski, T; Fontana, M; Fontanelli, F; Forty, R; Francisco, O; Frank, M; Frei, C; Frosini, M; Fu, J; Furfaro, E; Gallas Torreira, A; Galli, D; Gallorini, S; Gambetta, S; Gandelman, M; Gandini, P; Gao, Y; García Pardiñas, J; Garofoli, J; Garra Tico, J; Garrido, L; Gaspar, C; Gauld, R; Gavardi, L; Gavrilov, G; Gersabeck, E; Gersabeck, M; Gershon, T; Ghez, Ph; Gianelle, A; Giani', S; Gibson, V; Giubega, L; Gligorov, V V; Göbel, C; Golubkov, D; Golutvin, A; Gomes, A; Gordon, H; Gotti, C; Grabalosa Gándara, M; Graciani Diaz, R; Granado Cardoso, L A; Graugés, E; Graziani, G; Grecu, A; Greening, E; Gregson, S; Griffith, P; Grillo, L; Grünberg, O; Gui, B; Gushchin, E; Guz, Yu; Gys, T; Hadjivasiliou, C; Haefeli, G; Haen, C; Haines, S C; Hall, S; Hamilton, B; Hampson, T; Han, X; Hansmann-Menzemer, S; Harnew, N; Harnew, S T; Harrison, J; He, J; Head, T; Heijne, V; Hennessy, K; Henrard, P; Henry, L; Hernando Morata, J A; van Herwijnen, E; Heß, M; Hicheur, A; Hill, D; Hoballah, M; Hombach, C; Hulsbergen, W; Hunt, P; Hussain, N; Hutchcroft, D; Hynds, D; Idzik, M; Ilten, P; Jacobsson, R; Jaeger, A; Jalocha, J; Jans, E; Jaton, P; Jawahery, A; Jing, F; John, M; Johnson, D; Jones, C R; Joram, C; Jost, B; Jurik, N; Kaballo, M; Kandybei, S; Kanso, W; Karacson, M; Karbach, T M; Karodia, S; Kelsey, M; Kenyon, I R; Ketel, T; Khanji, B; Khurewathanakul, C; Klaver, S; Klimaszewski, K; Kochebina, O; Kolpin, M; Komarov, I; Koopman, R F; Koppenburg, P; Korolev, M; Kozlinskiy, A; Kravchuk, L; Kreplin, K; Kreps, M; Krocker, G; Krokovny, P; Kruse, F; Kucewicz, W; Kucharczyk, M; Kudryavtsev, V; Kurek, K; Kvaratskheliya, T; La Thi, V N; Lacarrere, D; Lafferty, G; Lai, A; Lambert, D; Lambert, R W; Lanciotti, E; Lanfranchi, G; Langenbruch, C; Langhans, B; Latham, T; Lazzeroni, C; Le Gac, R; van Leerdam, J; Lees, J-P; Lefèvre, R; Leflat, A; Lefrançois, J; Leo, S; Leroy, O; Lesiak, T; Leverington, B; Li, Y; Liles, M; Lindner, R; Linn, C; Lionetto, F; Liu, B; Liu, G; Lohn, S; Longstaff, I; Lopes, J H; Lopez-March, N; Lowdon, P; Lu, H; Lucchesi, D; Luo, H; Lupato, A; Luppi, E; Lupton, O; Machefert, F; Machikhiliyan, I V; Maciuc, F; Maev, O; Malde, S; Manca, G; Mancinelli, G; Maratas, J; Marchand, J F; Marconi, U; Marin Benito, C; Marino, P; Märki, R; Marks, J; Martellotti, G; Martens, A; Martín Sánchez, A; Martinelli, M; Martinez Santos, D; Martinez Vidal, F; Martins Tostes, D; Massafferri, A; Matev, R; Mathe, Z; Matteuzzi, C; Mazurov, A; McCann, M; McCarthy, J; McNab, A; McNulty, R; McSkelly, B; Meadows, B; Meier, F; Meissner, M; Merk, M; Milanes, D A; Minard, M-N; Moggi, N; Molina Rodriguez, J; Monteil, S; Morandin, M; Morawski, P; Mordà, A; Morello, M J; Moron, J; Morris, A-B; Mountain, R; Muheim, F; Müller, K; Muresan, R; Mussini, M; Muster, B; Naik, P; Nakada, T; Nandakumar, R; Nasteva, I; Needham, M; Neri, N; Neubert, S; Neufeld, N; Neuner, M; Nguyen, A D; Nguyen, T D; Nguyen-Mau, C; Nicol, M; Niess, V; Niet, R; Nikitin, N; Nikodem, T; Novoselov, A; O'Hanlon, D P; Oblakowska-Mucha, A; Obraztsov, V; Oggero, S; Ogilvy, S; Okhrimenko, O; Oldeman, R; Onderwater, G; Orlandea, M; Otalora Goicochea, J M; Owen, P; Oyanguren, A; Pal, B K; Palano, A; Palombo, F; Palutan, M; Panman, J; Papanestis, A; Pappagallo, M; Parkes, C; Parkinson, C J; Passaleva, G; Patel, G D; Patel, M; Patrignani, C; Pazos Alvarez, A; Pearce, A; Pellegrino, A; Pepe Altarelli, M; Perazzini, S; Perez Trigo, E; Perret, P; Perrin-Terrin, M; Pescatore, L; Pesen, E; Petridis, K; Petrolini, A; Picatoste Olloqui, E; Pietrzyk, B; Pilař, T; Pinci, D; Pistone, A; Playfer, S; Plo Casasus, M; Polci, F; Poluektov, A; Polycarpo, E; Popov, A; Popov, D; Popovici, B; Potterat, C; Price, E; Prisciandaro, J; Pritchard, A; Prouve, C; Pugatch, V; Puig Navarro, A; Punzi, G; Qian, W; Rachwal, B; Rademacker, J H; Rakotomiaramanana, B; Rama, M; Rangel, M S; Raniuk, I; Rauschmayr, N; Raven, G; Reichert, S; Reid, M M; Dos Reis, A C; Ricciardi, S; Richards, S; Rihl, M; Rinnert, K; Rives Molina, V; Roa Romero, D A; Robbe, P; Rodrigues, A B; Rodrigues, E; Rodriguez Perez, P; Roiser, S; Romanovsky, V; Romero Vidal, A; Rotondo, M; Rouvinet, J; Ruf, T; Ruffini, F; Ruiz, H; Ruiz Valls, P; Sabatino, G; Saborido Silva, J J; Sagidova, N; Sail, P; Saitta, B; Salustino Guimaraes, V; Sanchez Mayordomo, C; Sanmartin Sedes, B; Santacesaria, R; Santamarina Rios, C; Santovetti, E; Sapunov, M; Sarti, A; Satriano, C; Satta, A; Saunders, D M; Savrie, M; Savrina, D; Schiller, M; Schindler, H; Schlupp, M; Schmelling, M; Schmidt, B; Schneider, O; Schopper, A; Schune, M-H; Schwemmer, R; Sciascia, B; Sciubba, A; Seco, M; Semennikov, A; Sepp, I; Serra, N; Serrano, J; Sestini, L; Seyfert, P; Shapkin, M; Shapoval, I; Shcheglov, Y; Shears, T; Shekhtman, L; Shevchenko, V; Shires, A; Silva Coutinho, R; Simi, G; Sirendi, M; Skidmore, N; Skwarnicki, T; Smith, N A; Smith, E; Smith, E; Smith, J; Smith, M; Snoek, H; Sokoloff, M D; Soler, F J P; Soomro, F; Souza, D; Souza De Paula, B; Spaan, B; Sparkes, A; Spradlin, P; Stagni, F; Stahl, M; Stahl, S; Steinkamp, O; Stenyakin, O; Stevenson, S; Stoica, S; Stone, S; Storaci, B; Stracka, S; Straticiuc, M; Straumann, U; Stroili, R; Subbiah, V K; Sun, L; Sutcliffe, W; Swientek, K; Swientek, S; Syropoulos, V; Szczekowski, M; Szczypka, P; Szilard, D; Szumlak, T; T'Jampens, S; Teklishyn, M; Tellarini, G; Teubert, F; Thomas, C; Thomas, E; van Tilburg, J; Tisserand, V; Tobin, M; Tolk, S; Tomassetti, L; Topp-Joergensen, S; Torr, N; Tournefier, E; Tourneur, S; Tran, M T; Tresch, M; Tsaregorodtsev, A; Tsopelas, P; Tuning, N; Ubeda Garcia, M; Ukleja, A; Ustyuzhanin, A; Uwer, U; Vagnoni, V; Valenti, G; Vallier, A; Vazquez Gomez, R; Vazquez Regueiro, P; Vázquez Sierra, C; Vecchi, S; Velthuis, J J; Veltri, M; Veneziano, G; Vesterinen, M; Viaud, B; Vieira, D; Vieites Diaz, M; Vilasis-Cardona, X; Vollhardt, A; Volyanskyy, D; Voong, D; Vorobyev, A; Vorobyev, V; Voß, C; Voss, H; de Vries, J A; Waldi, R; Wallace, C; Wallace, R; Walsh, J; Wandernoth, S; Wang, J; Ward, D R; Watson, N K; Websdale, D; Whitehead, M; Wicht, J; Wiedner, D; Wilkinson, G; Williams, M P; Williams, M; Wilson, F F; Wimberley, J; Wishahi, J; Wislicki, W; Witek, M; Wormser, G; Wotton, S A; Wright, S; Wu, S; Wyllie, K; Xie, Y; Xing, Z; Xu, Z; Yang, Z; Yuan, X; Yushchenko, O; Zangoli, M; Zavertyaev, M; Zhang, L; Zhang, W C; Zhang, Y; Zhelezov, A; Zhokhov, A; Zhong, L; Zvyagin, A
2014-08-22
The difference in the angular distributions between beauty quarks and antiquarks, referred to as the charge asymmetry, is measured for the first time in bb pair production at a hadron collider. The data used correspond to an integrated luminosity of 1.0 fb(-1) collected at 7 TeV center-of-mass energy in proton-proton collisions with the LHCb detector. The measurement is performed in three regions of the invariant mass of the bb system. The results obtained are A(C)(bb))(40
Analysis of EEG activity in response to binaural beats with different frequencies.
Gao, Xiang; Cao, Hongbao; Ming, Dong; Qi, Hongzhi; Wang, Xuemin; Wang, Xiaolu; Chen, Runge; Zhou, Peng
2014-12-01
When two coherent sounds with nearly similar frequencies are presented to each ear respectively with stereo headphones, the brain integrates the two signals and produces a sensation of a third sound called binaural beat (BB). Although earlier studies showed that BB could influence behavior and cognition, common agreement on the mechanism of BB has not been reached yet. In this work, we employed Relative Power (RP), Phase Locking Value (PLV) and Cross-Mutual Information (CMI) to track EEG changes during BB stimulations. EEG signals were acquired from 13 healthy subjects. Five-minute BBs with four different frequencies were tested: delta band (1 Hz), theta band (5 Hz), alpha band (10 Hz) and beta band (20 Hz). We observed RP increase in theta and alpha bands and decrease in beta band during delta and alpha BB stimulations. RP decreased in beta band during theta BB, while RP decreased in theta band during beta BB. However, no clear brainwave entrainment effect was identified. Connectivity changes were detected following the variation of RP during BB stimulations. Our observation supports the hypothesis that BBs could affect functional brain connectivity, suggesting that the mechanism of BB-brain interaction is worth further study. Copyright © 2014. Published by Elsevier B.V.
Quantum communication and information processing
NASA Astrophysics Data System (ADS)
Beals, Travis Roland
Quantum computers enable dramatically more efficient algorithms for solving certain classes of computational problems, but, in doing so, they create new problems. In particular, Shor's Algorithm allows for efficient cryptanalysis of many public-key cryptosystems. As public key cryptography is a critical component of present-day electronic commerce, it is crucial that a working, secure replacement be found. Quantum key distribution (QKD), first developed by C.H. Bennett and G. Brassard, offers a partial solution, but many challenges remain, both in terms of hardware limitations and in designing cryptographic protocols for a viable large-scale quantum communication infrastructure. In Part I, I investigate optical lattice-based approaches to quantum information processing. I look at details of a proposal for an optical lattice-based quantum computer, which could potentially be used for both quantum communications and for more sophisticated quantum information processing. In Part III, I propose a method for converting and storing photonic quantum bits in the internal state of periodically-spaced neutral atoms by generating and manipulating a photonic band gap and associated defect states. In Part II, I present a cryptographic protocol which allows for the extension of present-day QKD networks over much longer distances without the development of new hardware. I also present a second, related protocol which effectively solves the authentication problem faced by a large QKD network, thus making QKD a viable, information-theoretic secure replacement for public key cryptosystems.
Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min
2016-08-19
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security.
Platelet-Derived Growth Factor BB Influences Muscle Regeneration in Duchenne Muscle Dystrophy.
Piñol-Jurado, Patricia; Gallardo, Eduard; de Luna, Noemi; Suárez-Calvet, Xavier; Sánchez-Riera, Carles; Fernández-Simón, Esther; Gomis, Clara; Illa, Isabel; Díaz-Manera, Jordi
2017-08-01
Duchenne muscular dystrophy (DMD) is characterized by a progressive loss of muscle fibers, and their substitution by fibrotic and adipose tissue. Many factors contribute to this process, but the molecular pathways related to regeneration and degeneration of muscle are not completely known. Platelet-derived growth factor (PDGF)-BB belongs to a family of growth factors that regulate proliferation, migration, and differentiation of mesenchymal cells. The role of PDGF-BB in muscle regeneration in humans has not been studied. We analyzed the expression of PDGF-BB in muscle biopsy samples from controls and patients with DMD. We performed in vitro experiments to understand the effects of PDGF-BB on myoblasts involved in the pathophysiology of muscular dystrophies and confirmed our results in vivo by treating the mdx murine model of DMD with repeated i.m. injections of PDGF-BB. We observed that regenerating and necrotic muscle fibers in muscle biopsy samples from DMD patients expressed PDGF-BB. In vitro, PDGF-BB attracted myoblasts and activated their proliferation. Analysis of muscles from the animals treated with PDGF-BB showed an increased population of satellite cells and an increase in the number of regenerative fibers, with a reduction in inflammatory infiltrates, compared with those in vehicle-treated mice. Based on our results, PDGF-BB may play a protective role in muscular dystrophies by enhancing muscle regeneration through activation of satellite cell proliferation and migration. Copyright © 2017 American Society for Investigative Pathology. Published by Elsevier Inc. All rights reserved.
Qi, Honglan; Teesdale, Justin J; Pupillo, Rachel C; Rosenthal, Joel; Bard, Allen J
2013-09-11
Two new 2,2'-bipyridine (bpy) derivatives containing ancillary BODIPY chromophores attached at the 5- and 5'-positions (BB3) or 6- and 6'-positions (BB4) were prepared and characterized. In this work, the basic photophysics, electrochemistry, and electrogenerated chemiluminescence (ECL) of BB3 and BB4 are compared with those previously reported for a related bpy-BODIPY derivative (BB2) (J. Phys. Chem. C 2011, 115, 17993-18001). Cyclic voltammetry revealed that BB3 and BB4 display reversible 2e(-) oxidation and reduction waves, which consist of two closely spaced (50-70 mV) 1e(-) events. This redox behavior is consistent with the frontier molecular orbitals calculated for BB3 and BB4 and indicates that the 2,2'-bipyridine spacer of each bpy-BODIPY homologue does not facilitate efficient electronic communication between the tethered indacene units. In the presence of a coreactant such as tri-n-propylamine (TPA) or benzoyl peroxide (BPO), BB3 and BB4 exhibit strong ECL and produce spectra that are very similar to their corresponding photoluminescence profiles. The ECL signal obtained under annihilation conditions, however, is significantly different and is characterized by two distinct bands. One of these bands is centered at ∼570 nm and is attributed to emission via an S- or T-route. The second band occurs at longer wavelengths and is centered around ∼740 nm. The shape and concentration dependence of this long-wavelength ECL signal is not indicative of emission from an excimer or aggregate, but rather it suggests that a new emissive species is formed from the bpy-BODIPY luminophores during the annihilation process.
Safety and tolerability of intracerebroventricular PDGF-BB in Parkinson’s disease patients
Paul, Gesine; Zachrisson, Olof; Varrone, Andrea; Almqvist, Per; Jerling, Markus; Lind, Göran; Rehncrona, Stig; Linderoth, Bengt; Bjartmarz, Hjalmar; Shafer, Lisa L.; Coffey, Robert; Svensson, Mikael; Mercer, Katarina Jansson; Forsberg, Anton; Halldin, Christer; Svenningsson, Per; Widner, Håkan; Frisén, Jonas; Pålhagen, Sven; Haegerstrand, Anders
2015-01-01
BACKGROUND. Recombinant human PDGF-BB (rhPDGF-BB) reduces Parkinsonian symptoms and increases dopamine transporter (DAT) binding in several animal models of Parkinson’s disease (PD). Effects of rhPDGF-BB are the result of proliferation of ventricular wall progenitor cells and reversed by blocking mitosis. Based on these restorative effects, we assessed the safety and tolerability of intracerebroventricular (i.c.v.) rhPDGF-BB administration in individuals with PD. METHODS. We conducted a double-blind, randomized, placebo-controlled phase I/IIa study at two clinical centers in Sweden. Twelve patients with moderate PD received rhPDGF-BB via an implanted drug infusion pump and an investigational i.c.v. catheter. Patients were assigned to a dose cohort (0.2, 1.5, or 5 μg rhPDGF-BB per day) and then randomized to active treatment or placebo (3:1) for a 12-day treatment period. The primary objective was to assess safety and tolerability of i.c.v.-delivered rhPDGF-BB. Secondary outcome assessments included several clinical rating scales and changes in DAT binding. The follow-up period was 85 days. RESULTS. All patients completed the study. There were no unresolved adverse events. Serious adverse events occurred in three patients; however, these were unrelated to rhPDGF-BB administration. Secondary outcome parameters did not show dose-dependent changes in clinical rating scales, but there was a positive effect on DAT binding in the right putamen. CONCLUSION. At all doses tested, i.c.v. administration of rhPDGF-BB was well tolerated. Results support further clinical development of rhPDGF-BB for patients with PD. TRIAL REGISTRATION. Clinical Trials.gov NCT00866502. FUNDING. Newron Sweden AB (former NeuroNova AB) and Swedish Governmental Agency for Innovation Systems (VINNOVA). PMID:25689258
Safety and tolerability of intracerebroventricular PDGF-BB in Parkinson's disease patients.
Paul, Gesine; Zachrisson, Olof; Varrone, Andrea; Almqvist, Per; Jerling, Markus; Lind, Göran; Rehncrona, Stig; Linderoth, Bengt; Bjartmarz, Hjalmar; Shafer, Lisa L; Coffey, Robert; Svensson, Mikael; Mercer, Katarina Jansson; Forsberg, Anton; Halldin, Christer; Svenningsson, Per; Widner, Håkan; Frisén, Jonas; Pålhagen, Sven; Haegerstrand, Anders
2015-03-02
BACKGROUND. Recombinant human PDGF-BB (rhPDGF-BB) reduces Parkinsonian symptoms and increases dopamine transporter (DAT) binding in several animal models of Parkinson's disease (PD). Effects of rhPDGF-BB are the result of proliferation of ventricular wall progenitor cells and reversed by blocking mitosis. Based on these restorative effects, we assessed the safety and tolerability of intracerebroventricular (i.c.v.) rhPDGF-BB administration in individuals with PD. METHODS. We conducted a double-blind, randomized, placebo-controlled phase I/IIa study at two clinical centers in Sweden. Twelve patients with moderate PD received rhPDGF-BB via an implanted drug infusion pump and an investigational i.c.v. catheter. Patients were assigned to a dose cohort (0.2, 1.5, or 5 μg rhPDGF-BB per day) and then randomized to active treatment or placebo (3:1) for a 12-day treatment period. The primary objective was to assess safety and tolerability of i.c.v.-delivered rhPDGF-BB. Secondary outcome assessments included several clinical rating scales and changes in DAT binding. The follow-up period was 85 days. RESULTS. All patients completed the study. There were no unresolved adverse events. Serious adverse events occurred in three patients; however, these were unrelated to rhPDGF-BB administration. Secondary outcome parameters did not show dose-dependent changes in clinical rating scales, but there was a positive effect on DAT binding in the right putamen. CONCLUSION. At all doses tested, i.c.v. administration of rhPDGF-BB was well tolerated. Results support further clinical development of rhPDGF-BB for patients with PD. TRIAL REGISTRATION. Clinical Trials.gov NCT00866502. FUNDING. Newron Sweden AB (former NeuroNova AB) and Swedish Governmental Agency for Innovation Systems (VINNOVA).
Chiu, Hsin-Hui; Wu, Mei-Hwan; Wang, Jou-Kou; Lu, Chun-Wei; Chiu, Shuenn-Nan; Chen, Chun-An; Lin, Ming-Tai; Hu, Fu-Chang
2013-03-01
To assess the tolerability and efficacy of the investigational use of the angiotensin II receptor blocker losartan added to β-blockade (BB) to prevent progressive aortic root dilation in patients with Marfan syndrome (MFS). Between May 1, 2007, and September 31, 2011, 28 patients with MFS (11 males [39%]; mean ± SD age, 13.1±6.3 years) with recognized aortic root dilation (z score >2.0) and receiving BB (atenolol or propranolol) treatment were enrolled. They were randomized to receive BB (BB: 13 patients) or β-blockade and losartan (BB-L: 15 patients) for 35 months. In the BB-L group, aortic root dilation was reduced with treatment, and the annual dilation rate of the aortic root was significantly lower than that of the BB group (0.10 mm/yr vs 0.89 mm/yr; P=.02). The absolute aortic diameters at the sinus of Valsalva, annulus, and sinotubular junction showed similar trends, with a reduced rate of dilation in the BB-L group (P=.02, P=.03, and P=.03, respectively). Five patients (33%) treated with BB-L were noted to have a reduced aortic root diameter. However, the differences between the groups regarding changes in aortic stiffness and cross-sectional compliance were not statistically significant. This randomized, open-label, active controlled trial mostly based on a pediatric population demonstrated for the first time that losartan add-on BB therapy is safe and provides more effective protection to slow the progression of aortic root dilation than does BB treatment alone in patients with MFS. clinicaltrials.gov Identifier: NCT00651235. Copyright © 2013 Mayo Foundation for Medical Education and Research. Published by Elsevier Inc. All rights reserved.
Bagheri, Salman; Yousefi, Mehdi; Safaie Qamsari, Elmira; Riazi-Rad, Farhad; Abolhassani, Mohsen; Younesi, Vahid; Dorostkar, Ruhollah; Movassaghpour, Ali Akbar; Sharifzadeh, Zahra
2017-03-01
The 4-1BB is a surface glycoprotein that pertains to the tumor necrosis factor-receptor family. There is compelling evidence suggesting important roles for 4-1BB in the immune response, including cell activation and proliferation and also cytokine induction. Because of encouraging results of different agonistic monoclonal antibodies against 4-1BB in the treatment of cancer, infectious, and autoimmune diseases, 4-1BB has been suggested as an attractive target for immunotherapy. In this study, single chain variable fragment phage display libraries, Tomlinson I+J, were screened against specific synthetic oligopeptides (peptides I and II) designed from 4-1BB extracellular domain. Five rounds of panning led to selection of four 4-1BB specific single chain variable fragments (PI.12, PI.42, PII.16, and PII.29) which showed specific reaction to relevant peptides in phage enzyme-linked immunosorbent assay. The selected clones were successfully expressed in Escherichia coli Rosetta-gami 2, and their expression was confirmed by western blot analysis. Enzyme-linked immunosorbent assay experiments indicated that these antibodies were able to specifically recognize 4-1BB without any cross-reactivity with other antigens. Flow cytometry analysis demonstrated an acceptable specific binding of the single chain variable fragments to 4-1BB expressed on CCRF-CEM cells, while no binding was observed with an irrelevant antibody. Anti-4-1BB single chain variable fragments enhanced surface CD69 expression and interleukin-2 production in stimulated CCRF-CEM cells which confirmed the agonistic effect of the selected single chain variable fragments. The data from this study have provided a rationale for further experiments involving the biological functions of anti-4-1BB single chain variable fragments in future studies.
Qi, Honglan; Teesdale, Justin J.; Pupillo, Rachel C.
2014-01-01
Two new 2,2’-bipyridine (bpy) derivatives containing ancillary BODIPY chromophores attached at the 5- and 5’-positions (BB3) or 6- and 6’-positions (BB4) were prepared and characterized. In this work, the basic photophysics, electrochemistry and electrogenerated chemiluminescence (ECL) of BB3 and BB4 are compared with those previously reported for a related bpy-BODIPY derivative (BB2) (J. Phys. Chem. C 2011, 115, 17993–18001). Cyclic voltammetry revealed that BB3 and BB4 display reversible 2e− oxidation and reduction waves, which consist of two closely spaced (50 – 70 mV) 1e− events. This redox behavior is consistent with the frontier molecular orbitals calculated for BB3 and BB4 and indicates that the 2,2’-bipyridine spacer of each bpy- BODIPY homologue does not facilitate efficient electronic communication between the tethered indacene units. In the presence of a coreactant such as tri-n-propylamine (TPA) or benzoyl peroxide (BPO), BB3 and BB4 exhibit strong ECL and produce spectra that are very similar to their corresponding photoluminescence profiles. The ECL signal obtained under annihilation conditions, however, is significantly different and is characterized by two distinct bands. One of these bands is centered at ~570 nm and is attributed to emission via an S- or T-route. The second band, occurs at longer wavelengths and is centered around ~740 nm. The shape and concentration dependence of this long-wavelength ECL signal is not indicative of emission from an excimer or aggregate, but rather is suggests that a new emissive species is formed from the bpy-BODIPY luminophores during the annihilation process. PMID:23980850
Rotavirus shedding following administration of RV3-BB human neonatal rotavirus vaccine.
Cowley, Daniel; Boniface, Karen; Bogdanovic-Sakran, Nada; Kirkwood, Carl D; Bines, Julie E
2017-08-03
The RV3-BB human neonatal rotavirus vaccine aims to provide protection from severe rotavirus disease from birth. A phase IIa safety and immunogenicity trial was undertaken in Dunedin, New Zealand between January 2012 and April 2014. Healthy, full-term (≥ 36 weeks gestation) babies, who were 0-5 d old were randomly assigned (1:1:1) to receive 3 doses of oral RV3-BB vaccine with the first dose given at 0-5 d after birth (neonatal schedule), or the first dose given at about 8 weeks after birth (infant schedule), or to receive placebo (placebo schedule). Vaccine take (serum immune response or stool shedding of vaccine virus after any dose) was detected after 3 doses of RV3-BB vaccine in >90% of participants when the first dose was administered in the neonatal and infant schedules. The aim of the current study was to characterize RV3-BB shedding and virus replication following administration of RV3-BB in a neonatal and infant vaccination schedule. Shedding was defined as detection of rotavirus by VP6 reverse transcription polymerase chain reaction (RT-PCR) in stool on days 3-7 after administration of RV3-BB. Shedding of rotavirus was highest following vaccination at 8 weeks of age in both neonatal and infant schedules (19/30 and 17/27, respectively). Rotavirus was detected in stool on days 3-7, after at least one dose of RV3-BB, in 70% (21/30) of neonate, 78% (21/27) of infant and 3% (1/32) placebo participants. In participants who shed RV3-BB, rotavirus was detectable in stool on day 1 following RV3-BB administration and remained positive until day 4-5 after administration. The distinct pattern of RV3-BB stool viral load demonstrated using a NSP3 quantitative qRT-PCR in participants who shed RV3-BB, suggests that detection of RV3-BB at day 3-7 was the result of replication rather than passage through the gastrointestinal tract.
Brown, W C; Zhao, S; Woods, V M; Tripp, C A; Tetzlaff, C L; Heussler, V T; Dobbelaere, D A; Rice-Ficht, A C
1993-01-01
Previous studies have demonstrated the serologic and T-cell immunogenicity for cattle of a recombinant form of the apical complex-associated 77-kDa merozite protein of Babesia bovis, designated Bb-1. The present study characterizes the immunogenic epitopes of the Bb-1 protein. A series of recombinant truncated fusion proteins spanning the majority of the Bb-1 protein were expressed in Escherichia coli, and their reactivities with bovine peripheral blood mononuclear cells and T-cell clones derived from B. bovis-immune cattle and with rabbit antibodies were determined. Lymphocytes from two immune cattle were preferentially stimulated by the N-terminal half of the Bb-1 protein (amino acids 23 to 266, termed Bb-1A), localizing the T-cell epitopes to the Bb-1A portion of the molecule. CD4+ T-cell clones derived by stimulation with the intact Bb-1 fusion protein were used to identify two T-cell epitopes in the Bb-1A protein, consisting of amino acids SVVLLSAFSGN VWANEAEVSQVVK and FSDVDKTKSTEKT (residues 23 to 46 and 82 to 94). In contrast, rabbit antiserum raised against the intact fusion protein reacted only with the C-terminal half of the protein (amino acids 267 to 499, termed Bb-1B), which contained 28 tandem repeats of the tetrapeptide PAEK or PAET. Biological assays and Northern (RNA) blot analyses for cytokines revealed that following activation with concanavalin A, T-cell clones reactive against the two Bb-1A epitopes produced interleukin-2, gamma interferon, and tumor necrosis factors beta and alpha, but not interleukin-4, suggesting that the Bb-1 antigen preferentially stimulates the Th1 subset of CD4+ T cells in cattle. The studies described here report for the first time the characterization, by cytokine production, of the Th1 subset of bovine T cells and show that, as in mice, protozoal antigens can induce Th1 cells in ruminants. This first demonstration of B. bovis-encoded Th1 cell epitopes provides a rationale for incorporation of all or part of the Bb-1 protein into a recombinant vaccine. Images PMID:7678098
Parameter regimes for a single sequential quantum repeater
NASA Astrophysics Data System (ADS)
Rozpędek, F.; Goodenough, K.; Ribeiro, J.; Kalb, N.; Caprara Vivoli, V.; Reiserer, A.; Hanson, R.; Wehner, S.; Elkouss, D.
2018-07-01
Quantum key distribution allows for the generation of a secret key between distant parties connected by a quantum channel such as optical fibre or free space. Unfortunately, the rate of generation of a secret key by direct transmission is fundamentally limited by the distance. This limit can be overcome by the implementation of so-called quantum repeaters. Here, we assess the performance of a specific but very natural setup called a single sequential repeater for quantum key distribution. We offer a fine-grained assessment of the repeater by introducing a series of benchmarks. The benchmarks, which should be surpassed to claim a working repeater, are based on finite-energy considerations, thermal noise and the losses in the setup. In order to boost the performance of the studied repeaters we introduce two methods. The first one corresponds to the concept of a cut-off, which reduces the effect of decoherence during the storage of a quantum state by introducing a maximum storage time. Secondly, we supplement the standard classical post-processing with an advantage distillation procedure. Using these methods, we find realistic parameters for which it is possible to achieve rates greater than each of the benchmarks, guiding the way towards implementing quantum repeaters.
Multi-user quantum key distribution with entangled photons from an AlGaAs chip
NASA Astrophysics Data System (ADS)
Autebert, C.; Trapateau, J.; Orieux, A.; Lemaître, A.; Gomez-Carbonell, C.; Diamanti, E.; Zaquine, I.; Ducci, S.
2016-12-01
In view of real-world applications of quantum information technologies, the combination of miniature quantum resources with existing fibre networks is a crucial issue. Among such resources, on-chip entangled photon sources play a central role for applications spanning quantum communications, computing and metrology. Here, we use a semiconductor source of entangled photons operating at room temperature in conjunction with standard telecom components to demonstrate multi-user quantum key distribution, a core protocol for securing communications in quantum networks. The source consists of an AlGaAs chip-emitting polarisation entangled photon pairs over a large bandwidth in the main telecom band around 1550 nm without the use of any off-chip compensation or interferometric scheme; the photon pairs are directly launched into a dense wavelength division multiplexer (DWDM) and secret keys are distributed between several pairs of users communicating through different channels. We achieve a visibility measured after the DWDM of 87% and show long-distance key distribution using a 50-km standard telecom fibre link between two network users. These results illustrate a promising route to practical, resource-efficient implementations adapted to quantum network infrastructures.
Escobar-Aguirre, Matias; Zhang, Hong; Jamieson-Lucy, Allison; Mullins, Mary C
2017-09-01
Animal-vegetal (AV) polarity of most vertebrate eggs is established during early oogenesis through the formation and disassembly of the Balbiani Body (Bb). The Bb is a structure conserved from insects to humans that appears as a large granule, similar to a mRNP granule composed of mRNA and proteins, that in addition contains mitochondria, ER and Golgi. The components of the Bb, which have amyloid-like properties, include germ cell and axis determinants of the embryo that are anchored to the vegetal cortex upon Bb disassembly. Our lab discovered in zebrafish the only gene known to function in Bb disassembly, microtubule-actin crosslinking factor 1a (macf1a). Macf1 is a conserved, giant multi-domain cytoskeletal linker protein that can interact with microtubules (MTs), actin filaments (AF), and intermediate filaments (IF). In macf1a mutant oocytes the Bb fails to dissociate, the nucleus is acentric, and AV polarity of the oocyte and egg fails to form. The cytoskeleton-dependent mechanism by which Macf1a regulates Bb mRNP granule dissociation was unknown. We found that disruption of AFs phenocopies the macf1a mutant phenotype, while MT disruption does not. We determined that cytokeratins (CK), a type of IF, are enriched in the Bb. We found that Macf1a localizes to the Bb, indicating a direct function in regulating its dissociation. We thus tested if Macf1a functions via its actin binding domain (ABD) and plectin repeat domain (PRD) to integrate cortical actin and Bb CK, respectively, to mediate Bb dissociation at the oocyte cortex. We developed a CRISPR/Cas9 approach to delete the exons encoding these domains from the macf1a endogenous locus, while maintaining the open reading frame. Our analysis shows that Macf1a functions via its ABD to mediate Bb granule dissociation and nuclear positioning, while the PRD is dispensable. We propose that Macf1a does not function via its canonical mechanism of linking two cytoskeletal systems together in dissociating the Bb. Instead our results suggest that Macf1a functions by linking one cytoskeletal system, cortical actin, to another structure, the Bb, where Macf1a is localized. Through this novel linking process, it dissociates the Bb at the oocyte cortex, thus specifying the AV axis of the oocyte and future egg. To our knowledge, this is also the first study to use genome editing to unravel the module-dependent function of a cytoskeletal linker.
Zhang, Hong; Jamieson-Lucy, Allison
2017-01-01
Animal-vegetal (AV) polarity of most vertebrate eggs is established during early oogenesis through the formation and disassembly of the Balbiani Body (Bb). The Bb is a structure conserved from insects to humans that appears as a large granule, similar to a mRNP granule composed of mRNA and proteins, that in addition contains mitochondria, ER and Golgi. The components of the Bb, which have amyloid-like properties, include germ cell and axis determinants of the embryo that are anchored to the vegetal cortex upon Bb disassembly. Our lab discovered in zebrafish the only gene known to function in Bb disassembly, microtubule-actin crosslinking factor 1a (macf1a). Macf1 is a conserved, giant multi-domain cytoskeletal linker protein that can interact with microtubules (MTs), actin filaments (AF), and intermediate filaments (IF). In macf1a mutant oocytes the Bb fails to dissociate, the nucleus is acentric, and AV polarity of the oocyte and egg fails to form. The cytoskeleton-dependent mechanism by which Macf1a regulates Bb mRNP granule dissociation was unknown. We found that disruption of AFs phenocopies the macf1a mutant phenotype, while MT disruption does not. We determined that cytokeratins (CK), a type of IF, are enriched in the Bb. We found that Macf1a localizes to the Bb, indicating a direct function in regulating its dissociation. We thus tested if Macf1a functions via its actin binding domain (ABD) and plectin repeat domain (PRD) to integrate cortical actin and Bb CK, respectively, to mediate Bb dissociation at the oocyte cortex. We developed a CRISPR/Cas9 approach to delete the exons encoding these domains from the macf1a endogenous locus, while maintaining the open reading frame. Our analysis shows that Macf1a functions via its ABD to mediate Bb granule dissociation and nuclear positioning, while the PRD is dispensable. We propose that Macf1a does not function via its canonical mechanism of linking two cytoskeletal systems together in dissociating the Bb. Instead our results suggest that Macf1a functions by linking one cytoskeletal system, cortical actin, to another structure, the Bb, where Macf1a is localized. Through this novel linking process, it dissociates the Bb at the oocyte cortex, thus specifying the AV axis of the oocyte and future egg. To our knowledge, this is also the first study to use genome editing to unravel the module-dependent function of a cytoskeletal linker. PMID:28880872
Practical quantum key distribution protocol without monitoring signal disturbance.
Sasaki, Toshihiko; Yamamoto, Yoshihisa; Koashi, Masato
2014-05-22
Quantum cryptography exploits the fundamental laws of quantum mechanics to provide a secure way to exchange private information. Such an exchange requires a common random bit sequence, called a key, to be shared secretly between the sender and the receiver. The basic idea behind quantum key distribution (QKD) has widely been understood as the property that any attempt to distinguish encoded quantum states causes a disturbance in the signal. As a result, implementation of a QKD protocol involves an estimation of the experimental parameters influenced by the eavesdropper's intervention, which is achieved by randomly sampling the signal. If the estimation of many parameters with high precision is required, the portion of the signal that is sacrificed increases, thus decreasing the efficiency of the protocol. Here we propose a QKD protocol based on an entirely different principle. The sender encodes a bit sequence onto non-orthogonal quantum states and the receiver randomly dictates how a single bit should be calculated from the sequence. The eavesdropper, who is unable to learn the whole of the sequence, cannot guess the bit value correctly. An achievable rate of secure key distribution is calculated by considering complementary choices between quantum measurements of two conjugate observables. We found that a practical implementation using a laser pulse train achieves a key rate comparable to a decoy-state QKD protocol, an often-used technique for lasers. It also has a better tolerance of bit errors and of finite-sized-key effects. We anticipate that this finding will give new insight into how the probabilistic nature of quantum mechanics can be related to secure communication, and will facilitate the simple and efficient use of conventional lasers for QKD.
Jets and Metastability in Quantum Mechanics and Quantum Field Theory
NASA Astrophysics Data System (ADS)
Farhi, David
I give a high level overview of the state of particle physics in the introduction, accessible without any background in the field. I discuss improvements of theoretical and statistical methods used for collider physics. These include telescoping jets, a statistical method which was claimed to allow jet searches to increase their sensitivity by considering several interpretations of each event. We find that indeed multiple interpretations extend the power of searches, for both simple counting experiments and powerful multivariate fitting experiments, at least for h → bb¯ at the LHC. Then I propose a method for automation of background calculations using SCET by appropriating the technology of Monte Carlo generators such as MadGraph. In the third chapter I change gears and discuss the future of the universe. It has long been known that our pocket of the standard model is unstable; there is a lower-energy configuration in a remote part of the configuration space, to which our universe will, eventually, decay. While the timescales involved are on the order of 10400 years (depending on how exactly one counts) and thus of no immediate worry, I discuss the shortcomings of the standard methods and propose a more physically motivated derivation for the decay rate. I then make various observations about the structure of decays in quantum field theory.
Optimal attacks on qubit-based Quantum Key Recycling
NASA Astrophysics Data System (ADS)
Leermakers, Daan; Škorić, Boris
2018-03-01
Quantum Key Recycling (QKR) is a quantum cryptographic primitive that allows one to reuse keys in an unconditionally secure way. By removing the need to repeatedly generate new keys, it improves communication efficiency. Škorić and de Vries recently proposed a QKR scheme based on 8-state encoding (four bases). It does not require quantum computers for encryption/decryption but only single-qubit operations. We provide a missing ingredient in the security analysis of this scheme in the case of noisy channels: accurate upper bounds on the required amount of privacy amplification. We determine optimal attacks against the message and against the key, for 8-state encoding as well as 4-state and 6-state conjugate coding. We provide results in terms of min-entropy loss as well as accessible (Shannon) information. We show that the Shannon entropy analysis for 8-state encoding reduces to the analysis of quantum key distribution, whereas 4-state and 6-state suffer from additional leaks that make them less effective. From the optimal attacks we compute the required amount of privacy amplification and hence the achievable communication rate (useful information per qubit) of qubit-based QKR. Overall, 8-state encoding yields the highest communication rates.
Fast and simple high-capacity quantum cryptography with error detection
Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Zhang, Jun; Pan, Lei; Li, Shudong; Orgun, Mehmet A.
2017-01-01
Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth. PMID:28406240
Fast and simple high-capacity quantum cryptography with error detection.
Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Zhang, Jun; Pan, Lei; Li, Shudong; Orgun, Mehmet A
2017-04-13
Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth.
Fast and simple high-capacity quantum cryptography with error detection
NASA Astrophysics Data System (ADS)
Lai, Hong; Luo, Ming-Xing; Pieprzyk, Josef; Zhang, Jun; Pan, Lei; Li, Shudong; Orgun, Mehmet A.
2017-04-01
Quantum cryptography is commonly used to generate fresh secure keys with quantum signal transmission for instant use between two parties. However, research shows that the relatively low key generation rate hinders its practical use where a symmetric cryptography component consumes the shared key. That is, the security of the symmetric cryptography demands frequent rate of key updates, which leads to a higher consumption of the internal one-time-pad communication bandwidth, since it requires the length of the key to be as long as that of the secret. In order to alleviate these issues, we develop a matrix algorithm for fast and simple high-capacity quantum cryptography. Our scheme can achieve secure private communication with fresh keys generated from Fibonacci- and Lucas- valued orbital angular momentum (OAM) states for the seed to construct recursive Fibonacci and Lucas matrices. Moreover, the proposed matrix algorithm for quantum cryptography can ultimately be simplified to matrix multiplication, which is implemented and optimized in modern computers. Most importantly, considerably information capacity can be improved effectively and efficiently by the recursive property of Fibonacci and Lucas matrices, thereby avoiding the restriction of physical conditions, such as the communication bandwidth.
NASA Astrophysics Data System (ADS)
Tysowski, Piotr K.; Ling, Xinhua; Lütkenhaus, Norbert; Mosca, Michele
2018-04-01
Quantum key distribution (QKD) is a means of generating keys between a pair of computing hosts that is theoretically secure against cryptanalysis, even by a quantum computer. Although there is much active research into improving the QKD technology itself, there is still significant work to be done to apply engineering methodology and determine how it can be practically built to scale within an enterprise IT environment. Significant challenges exist in building a practical key management service (KMS) for use in a metropolitan network. QKD is generally a point-to-point technique only and is subject to steep performance constraints. The integration of QKD into enterprise-level computing has been researched, to enable quantum-safe communication. A novel method for constructing a KMS is presented that allows arbitrary computing hosts on one site to establish multiple secure communication sessions with the hosts of another site. A key exchange protocol is proposed where symmetric private keys are granted to hosts while satisfying the scalability needs of an enterprise population of users. The KMS operates within a layered architectural style that is able to interoperate with various underlying QKD implementations. Variable levels of security for the host population are enforced through a policy engine. A network layer provides key generation across a network of nodes connected by quantum links. Scheduling and routing functionality allows quantum key material to be relayed across trusted nodes. Optimizations are performed to match the real-time host demand for key material with the capacity afforded by the infrastructure. The result is a flexible and scalable architecture that is suitable for enterprise use and independent of any specific QKD technology.
1976-04-01
juniper (Juniperus chinensis, var. pfitzeriana), globe juniper (Juni]erus virginiana , var. globosa), dwarf Japanese yew (Taxus cuspidata, var. nana) and...excessively, compacted after planting. Heavy pruning of the tree’s upper branches is recommended at this point, to reduce the load put on root functioning...8217 5@9 BB 500.00 Shrubs-2 Juniperus chinensis 4 BB 42.00 Juniperus virginiana 31- BB 48.70 Taxus cuspidata 31 BB 38.40 *Cotoneaster apiculata 5’ BB
Energy-constrained two-way assisted private and quantum capacities of quantum channels
NASA Astrophysics Data System (ADS)
Davis, Noah; Shirokov, Maksim E.; Wilde, Mark M.
2018-06-01
With the rapid growth of quantum technologies, knowing the fundamental characteristics of quantum systems and protocols is essential for their effective implementation. A particular communication setting that has received increased focus is related to quantum key distribution and distributed quantum computation. In this setting, a quantum channel connects a sender to a receiver, and their goal is to distill either a secret key or entanglement, along with the help of arbitrary local operations and classical communication (LOCC). In this work, we establish a general theory of energy-constrained, LOCC-assisted private and quantum capacities of quantum channels, which are the maximum rates at which an LOCC-assisted quantum channel can reliably establish a secret key or entanglement, respectively, subject to an energy constraint on the channel input states. We prove that the energy-constrained squashed entanglement of a channel is an upper bound on these capacities. We also explicitly prove that a thermal state maximizes a relaxation of the squashed entanglement of all phase-insensitive, single-mode input bosonic Gaussian channels, generalizing results from prior work. After doing so, we prove that a variation of the method introduced by Goodenough et al. [New J. Phys. 18, 063005 (2016), 10.1088/1367-2630/18/6/063005] leads to improved upper bounds on the energy-constrained secret-key-agreement capacity of a bosonic thermal channel. We then consider a multipartite setting and prove that two known multipartite generalizations of the squashed entanglement are in fact equal. We finally show that the energy-constrained, multipartite squashed entanglement plays a role in bounding the energy-constrained LOCC-assisted private and quantum capacity regions of quantum broadcast channels.
Progress on Ultra-Dense Quantum Communication Using Integrated Photonic Architecture
2013-01-01
entanglement based quantum key distribution . . . . . . . . . . . . . . . . . . . . . . . . . 2 2.2 Extended dispersive-optics QKD (DO-QKD) protocol...2 2.3 Analysis of non-local correlations of entangled photon pairs for arbitrary dis- persion...Section 3). 2 Protocol Development 2.1 Achieving multiple secure bits per coincidence in time-energy entanglement based quantum key distribution High
Satellite-to-ground quantum key distribution.
Liao, Sheng-Kai; Cai, Wen-Qi; Liu, Wei-Yue; Zhang, Liang; Li, Yang; Ren, Ji-Gang; Yin, Juan; Shen, Qi; Cao, Yuan; Li, Zheng-Ping; Li, Feng-Zhi; Chen, Xia-Wei; Sun, Li-Hua; Jia, Jian-Jun; Wu, Jin-Cai; Jiang, Xiao-Jun; Wang, Jian-Feng; Huang, Yong-Mei; Wang, Qiang; Zhou, Yi-Lin; Deng, Lei; Xi, Tao; Ma, Lu; Hu, Tai; Zhang, Qiang; Chen, Yu-Ao; Liu, Nai-Le; Wang, Xiang-Bin; Zhu, Zhen-Cai; Lu, Chao-Yang; Shu, Rong; Peng, Cheng-Zhi; Wang, Jian-Yu; Pan, Jian-Wei
2017-09-07
Quantum key distribution (QKD) uses individual light quanta in quantum superposition states to guarantee unconditional communication security between distant parties. However, the distance over which QKD is achievable has been limited to a few hundred kilometres, owing to the channel loss that occurs when using optical fibres or terrestrial free space that exponentially reduces the photon transmission rate. Satellite-based QKD has the potential to help to establish a global-scale quantum network, owing to the negligible photon loss and decoherence experienced in empty space. Here we report the development and launch of a low-Earth-orbit satellite for implementing decoy-state QKD-a form of QKD that uses weak coherent pulses at high channel loss and is secure because photon-number-splitting eavesdropping can be detected. We achieve a kilohertz key rate from the satellite to the ground over a distance of up to 1,200 kilometres. This key rate is around 20 orders of magnitudes greater than that expected using an optical fibre of the same length. The establishment of a reliable and efficient space-to-ground link for quantum-state transmission paves the way to global-scale quantum networks.
Quantum-noise randomized data encryption for wavelength-division-multiplexed fiber-optic networks
DOE Office of Scientific and Technical Information (OSTI.GOV)
Corndorf, Eric; Liang Chuang; Kanter, Gregory S.
2005-06-15
We demonstrate high-rate randomized data-encryption through optical fibers using the inherent quantum-measurement noise of coherent states of light. Specifically, we demonstrate 650 Mbit/s data encryption through a 10 Gbit/s data-bearing, in-line amplified 200-km-long line. In our protocol, legitimate users (who share a short secret key) communicate using an M-ry signal set while an attacker (who does not share the secret key) is forced to contend with the fundamental and irreducible quantum-measurement noise of coherent states. Implementations of our protocol using both polarization-encoded signal sets as well as polarization-insensitive phase-keyed signal sets are experimentally and theoretically evaluated. Different from the performancemore » criteria for the cryptographic objective of key generation (quantum key-generation), one possible set of performance criteria for the cryptographic objective of data encryption is established and carefully considered.« less
Preservation of a lower bound of quantum secret key rate in the presence of decoherence
NASA Astrophysics Data System (ADS)
Datta, Shounak; Goswami, Suchetana; Pramanik, Tanumoy; Majumdar, A. S.
2017-03-01
It is well known that the interaction of quantum systems with the environment reduces the inherent quantum correlations. Under special circumstances the effect of decoherence can be reversed, for example, the interaction modelled by an amplitude damping channel can boost the teleportation fidelity from the classical to the quantum region for a bipartite quantum state. Here, we first show that this phenomenon fails to preserve the quantum secret key rate derived under individual attack. We further show that the technique of weak measurement can be used to slow down the process of decoherence, thereby helping to preserve the quantum secret key rate when one or both systems are interacting with the environment via an amplitude damping channel. Most interestingly, in certain cases weak measurement with post-selection where one considers both success and failure of the technique is shown to be more useful than without it when both systems interact with the environment.
Nedovic, Bojan; Posteraro, Brunella; Leoncini, Emanuele; Amore, Rosarita; Sanguinetti, Maurizio; Boccia, Stefania
2014-01-01
Mannose-binding lectin (MBL) plays a key role in the human innate immune response. It has been shown that polymorphisms in the MBL2 gene, particularly at codon 54 (variant allele B; wild-type allele designated as A), impact upon host susceptibility to Candida infection. This systematic review and meta-analysis were performed to assess the association between MBL2 codon 54 genotype and vulvovaginal candidiasis (VVC) or recurrent VVC (RVVC). Studies were searched in MEDLINE, SCOPUS, and ISI Web of Science until April 2013. Five studies including 704 women (386 cases and 318 controls) were part of the meta-analysis, and pooled ORs were calculated using the random effects model. For subjects with RVVC, ORs of AB versus AA and of BB versus AA were 4.84 (95% CI 2.10–11.15; P for heterogeneity = 0.013; I 2 = 68.6%) and 12.68 (95% CI 3.74–42.92; P for heterogeneity = 0.932, I 2 = 0.0%), respectively. For subjects with VVC, OR of AB versus AA was 2.57 (95% CI 1.29–5.12; P for heterogeneity = 0.897; I 2 = 0.0%). This analysis indicates that heterozygosity for the MBL2 allele B increases significantly the risk for both diseases, suggesting that MBL may influence the women's innate immunity in response to Candida. PMID:25143944
EnviroAtlas Tree Cover Configuration and Connectivity, Water Background Web Service
This EnviroAtlas web service supports research and online mapping activities related to EnviroAtlas (https://www.epa.gov/enviroatlas). The 1-meter resolution tree cover configuration and connectivity map categorizes tree cover into structural elements (e.g. core, edge, connector, etc.). Source imagery varies by community. For specific information about methods and accuracy of each community's tree cover configuration and connectivity classification, consult their individual metadata records: Austin, TX (https://edg.epa.gov/metadata/catalog/search/resource/details.page?uuid=%7B29D2B039-905C-4825-B0B4-9315122D6A9F%7D); Cleveland, OH (https://edg.epa.gov/metadata/catalog/search/resource/details.page?uuid=%7B03cd54e1-4328-402e-ba75-e198ea9fbdc7%7D); Des Moines, IA (https://edg.epa.gov/metadata/catalog/search/resource/details.page?uuid=%7B350A83E6-10A2-4D5D-97E6-F7F368D268BB%7D); Durham, NC (https://edg.epa.gov/metadata/catalog/search/resource/details.page?uuid=%7BC337BA5F-8275-4BA8-9647-F63C443F317D%7D); Fresno, CA (https://edg.epa.gov/metadata/catalog/search/resource/details.page?uuid=%7B84B98749-9C1C-4679-AE24-9B9C0998EBA5%7D); Green Bay, WI (https://edg.epa.gov/metadata/catalog/search/resource/details.page?uuid=%7B69E48A44-3D30-4E84-A764-38FBDCCAC3D0%7D); Memphis, TN (https://edg.epa.gov/metadata/catalog/search/resource/details.page?uuid=%7BB7313ADA-04F7-4D80-ABBA-77E753AAD002%7D); Milwaukee, WI (https://edg.epa.gov/metadata/catalog/search/resource/details.page?u
Device-independent security of quantum cryptography against collective attacks.
Acín, Antonio; Brunner, Nicolas; Gisin, Nicolas; Massar, Serge; Pironio, Stefano; Scarani, Valerio
2007-06-08
We present the optimal collective attack on a quantum key distribution protocol in the "device-independent" security scenario, where no assumptions are made about the way the quantum key distribution devices work or on what quantum system they operate. Our main result is a tight bound on the Holevo information between one of the authorized parties and the eavesdropper, as a function of the amount of violation of a Bell-type inequality.
An Introduction to Quantum Communications Networks; Or, how shall we communicate in the quantum era?
NASA Astrophysics Data System (ADS)
Razavi, Mohsen
2018-05-01
This book fills a gap between experts and non-experts in the field by providing readers with the basic tools to understand the latest developments in quantum communications and its future directions. With the fast pace of developments in quantum technologies, it is more necessary than ever to make the new generation of students in science/engineering familiar with the key ideas behind such disruptive systems. This book describes key applications for quantum networks; local, metropolitan, and global networks; and the industrial outlook for the field.
Robust shot-noise measurement for continuous-variable quantum key distribution
NASA Astrophysics Data System (ADS)
Kunz-Jacques, Sébastien; Jouguet, Paul
2015-02-01
We study a practical method to measure the shot noise in real time in continuous-variable quantum key distribution systems. The amount of secret key that can be extracted from the raw statistics depends strongly on this quantity since it affects in particular the computation of the excess noise (i.e., noise in excess of the shot noise) added by an eavesdropper on the quantum channel. Some powerful quantum hacking attacks relying on faking the estimated value of the shot noise to hide an intercept and resend strategy were proposed. Here, we provide experimental evidence that our method can defeat the saturation attack and the wavelength attack.
Gaussian-modulated coherent-state measurement-device-independent quantum key distribution
NASA Astrophysics Data System (ADS)
Ma, Xiang-Chun; Sun, Shi-Hai; Jiang, Mu-Sheng; Gui, Ming; Liang, Lin-Mei
2014-04-01
Measurement-device-independent quantum key distribution (MDI-QKD), leaving the detection procedure to the third partner and thus being immune to all detector side-channel attacks, is very promising for the construction of high-security quantum information networks. We propose a scheme to implement MDI-QKD, but with continuous variables instead of discrete ones, i.e., with the source of Gaussian-modulated coherent states, based on the principle of continuous-variable entanglement swapping. This protocol not only can be implemented with current telecom components but also has high key rates compared to its discrete counterpart; thus it will be highly compatible with quantum networks.
Practical challenges in quantum key distribution
Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing; ...
2016-11-08
Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.
Practical challenges in quantum key distribution
DOE Office of Scientific and Technical Information (OSTI.GOV)
Diamanti, Eleni; Lo, Hoi -Kwong; Qi, Bing
Here, quantum key distribution (QKD) promises unconditional security in data communication and is currently being deployed in commercial applications. Nonetheless, before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security. Here, we survey those key challenges and the approaches that are currently being taken to address them.
Human Neonatal Rotavirus Vaccine (RV3-BB) to Target Rotavirus from Birth.
Bines, Julie E; At Thobari, Jarir; Satria, Cahya Dewi; Handley, Amanda; Watts, Emma; Cowley, Daniel; Nirwati, Hera; Ackland, James; Standish, Jane; Justice, Frances; Byars, Gabrielle; Lee, Katherine J; Barnes, Graeme L; Bachtiar, Novilia S; Viska Icanervilia, Ajeng; Boniface, Karen; Bogdanovic-Sakran, Nada; Pavlic, Daniel; Bishop, Ruth F; Kirkwood, Carl D; Buttery, Jim P; Soenarto, Yati
2018-02-22
A strategy of administering a neonatal rotavirus vaccine at birth to target early prevention of rotavirus gastroenteritis may address some of the barriers to global implementation of a rotavirus vaccine. We conducted a randomized, double-blind, placebo-controlled trial in Indonesia to evaluate the efficacy of an oral human neonatal rotavirus vaccine (RV3-BB) in preventing rotavirus gastroenteritis. Healthy newborns received three doses of RV3-BB, administered according to a neonatal schedule (0 to 5 days, 8 weeks, and 14 weeks of age) or an infant schedule (8 weeks, 14 weeks, and 18 weeks of age), or placebo. The primary analysis was conducted in the per-protocol population, which included only participants who received all four doses of vaccine or placebo within the visit windows, with secondary analyses performed in the intention-to-treat population, which included all participants who underwent randomization. Among the 1513 participants in the per-protocol population, severe rotavirus gastroenteritis occurred up to the age of 18 months in 5.6% of the participants in the placebo group (28 of 504 babies), in 1.4% in the neonatal-schedule vaccine group (7 of 498), and in 2.7% in the infant-schedule vaccine group (14 of 511). This resulted in a vaccine efficacy of 75% (95% confidence interval [CI], 44 to 91) in the neonatal-schedule group (P<0.001), 51% (95% CI, 7 to 76) in the infant-schedule group (P=0.03), and 63% (95% CI, 34 to 80) in the neonatal-schedule and infant-schedule groups combined (combined vaccine group) (P<0.001). Similar results were observed in the intention-to-treat analysis (1649 participants); the vaccine efficacy was 68% (95% CI, 35 to 86) in the neonatal-schedule group (P=0.001), 52% (95% CI, 11 to 76) in the infant-schedule group (P=0.02), and 60% (95% CI, 31 to 76) in the combined vaccine group (P<0.001). Vaccine response, as evidenced by serum immune response or shedding of RV3-BB in the stool, occurred in 78 of 83 participants (94%) in the neonatal-schedule group and in 83 of 84 participants (99%) in the infant-schedule group. The incidence of adverse events was similar across the groups. No episodes of intussusception occurred within the 21-day risk period after administration of any dose of vaccine or placebo, and one episode of intussusception occurred 114 days after the third dose of vaccine in the infant-schedule group. RV3-BB was efficacious in preventing severe rotavirus gastroenteritis when administered according to a neonatal or an infant schedule in Indonesia. (Funded by the Bill and Melinda Gates Foundation and others; Australian New Zealand Clinical Trials Registry number, ACTRN12612001282875 .).
Present and future free-space quantum key distribution
NASA Astrophysics Data System (ADS)
Nordholt, Jane E.; Hughes, Richard J.; Morgan, George L.; Peterson, C. Glen; Wipf, Christopher C.
2002-04-01
Free-space quantum key distribution (QKD), more popularly know as quantum cryptography, uses single-photon free-space optical communications to distribute the secret keys required for secure communications. At Los Alamos National Laboratory we have demonstrated a fully automated system that is capable of operations at any time of day over a horizontal range of several kilometers. This has proven the technology is capable of operation from a spacecraft to the ground, opening up the possibility of QKD between any group of users anywhere on Earth. This system, the prototyping of a new system for use on a spacecraft, and the techniques required for world-wide quantum key distribution will be described. The operational parameters and performance of a system designed to operate between low earth orbit (LEO) and the ground will also be discussed.
Two-party quantum key agreement with five-particle entangled states
NASA Astrophysics Data System (ADS)
He, Ye-Feng; Ma, Wen-Ping
A two-party quantum key agreement protocol is proposed with five-particle entangled states and the delayed measurement technique. According to the measurement correlation property of five-particle entangled states, two participants can deduce the measurement results of each other’s initial quantum states. As a result, two parties can extract the secret keys of each other by using the publicly announced value or by performing the delayed measurement, respectively. Thus, a shared key is fairly established. Since each particle is transmitted only once in quantum channel, the protocol is congenitally free from the Trojan horse attacks. It is shown that the protocol not only is secure against both participant and outsider attacks but also has no information leakage problem. Moreover, it has high qubit efficiency.
DOE Office of Scientific and Technical Information (OSTI.GOV)
Li, Hong-Wei; Zhengzhou Information Science and Technology Institute, Zhengzhou, 450004; Wang, Shuang
2011-12-15
It is well known that the unconditional security of quantum-key distribution (QKD) can be guaranteed by quantum mechanics. However, practical QKD systems have some imperfections, which can be controlled by the eavesdropper to attack the secret key. With current experimental technology, a realistic beam splitter, made by fused biconical technology, has a wavelength-dependent property. Based on this fatal security loophole, we propose a wavelength-dependent attacking protocol, which can be applied to all practical QKD systems with passive state modulation. Moreover, we experimentally attack a practical polarization encoding QKD system to obtain all the secret key information at the cost ofmore » only increasing the quantum bit error rate from 1.3 to 1.4%.« less
Robust multiparty quantum secret key sharing over two collective-noise channels
NASA Astrophysics Data System (ADS)
Zhang, Zhan-jun
2006-02-01
Based on a polarization-based quantum key distribution protocol over a collective-noise channel [Phys. Rev. Lett. 92 (2004) 017901], a robust (n,n)-threshold scheme of multiparty quantum secret sharing of key over two collective-noise channels (i.e., the collective dephasing channel and the collective rotating channel) is proposed. In this scheme the sharer entirety can establish a joint key with the message sender only if all the sharers collaborate together. Since Bell singlets are enough for use and only single-photon polarization needs to be identified, this scheme is feasible according to the present-day technique.
Bexborn, Fredrik; Andersson, Per Ola; Chen, Hui; Nilsson, Bo; Ekdahl, Kristina N
2008-04-01
The molecular interactions between the components of the C3 convertase of the alternative pathway (AP) of complement and its regulators, in both surface-bound and fluid-phase form, are still incompletely understood. The fact that the AP convertase is labile makes studies difficult to perform. According to the so called tick-over theory, hydrolyzed C3, called C3(H(2)O), forms the initial convertase in fluid phase together with factor B. In the present study, we have applied western blot analysis and ELISA together with fluorescence resonance energy transfer (FRET) to study the formation of the fluid-phase AP convertases C3(H(2)O)Bb and C3bBb and their regulation by factor H and factor I at specific time points and, with FRET, in real time. In our hands, factor B showed a higher affinity for C3(H(2)O) than for C3b, although in both cases it was readily activated to Bb. However, the convertase activity of C3bBb was approximately twice that of C3(H(2)O)Bb, as monitored by the generation of C3a. But in contrast, the C3(H(2)O)Bb convertase was more resistant to inactivation by factor H and factor I than was the C3bBb convertase. Under conditions that totally inactivated C3bBb, C3(H(2)O)Bb still retained approximately 25% of its initial activity.
Bexborn, Fredrik; Andersson, Per Ola; Chen, Hui; Nilsson, Bo; Ekdahl, Kristina N.
2009-01-01
The molecular interactions between the components of the C3 convertase of the alternative pathway (AP) of complement and its regulators, in both surface-bound and fluid-phase form, are still incompletely understood. The fact that the AP convertase is labile makes studies difficult to perform. According to the so called tick-over theory, hydrolyzed C3, called C3(H2O), forms the initial convertase in fluid phase together with factor B. In the present study, we have applied western blot analysis and ELISA together with fluorescence resonance energy transfer (FRET) to study the formation of the fluid-phase AP convertases C3(H2O)Bb and C3bBb and their regulation by factor H and factor I at specific time points and, with FRET, in real time. In our hands, factor B showed a higher affinity for C3(H2O) than for C3b, although in both cases it was readily activated to Bb. However, the convertase activity of C3bBb was approximately twice that of C3(H2O)Bb, as monitored by the generation of C3a. But in contrast, the C3(H2O)Bb convertase was more resistant to inactivation by factor H and factor I than was the C3bBb convertase. Under conditions that totally inactivated C3bBb, C3(H2O)Bb still retained approximately 25% of its initial activity. PMID:18096230
Yadav, Ishwar Chandra; Linthoingambi Devi, Ningombam; Li, Jun; Syed, Jabir Hussain; Zhang, Gan; Watanabe, Hirozumi
2017-08-01
Although, many biomass burning (BB) emissions products (particulate matter and trace gases) are believed to be trans-boundary pollutants that originates from India and China (the two most populous countries in Asia), the information about BB emission and related contents is limited for Indo-China Peninsula (ICP) region. This motivated us to review this region pertaining to BB emission. The main objective of the review is to document the current status of BB emission in ICP region. In order to highlight the impact of BB on regional air quality and global climate change, the role of BB emission in ICP region is also discussed. Based on the available literature and modeling simulations studies, it is evidenced that ICP is one of the hotspot regional source for aerosols in terms of BB emissions. In addition, regional emissions through BB have significant implications for regional air quality especially in the neighboring countries such as China, Taiwan and India. Our assessment highlight that there is still a general lack of reliable data and research studies addressing BB related issues in context of environmental and human health. There is therefore a critical need to improve the current knowledge base, which should build upon the research experience and further research into these issues is considered vital to help inform future policies/control strategies. Copyright © 2017 Elsevier Ltd. All rights reserved.
Xie, Mingjie; Hays, Michael D; Holder, Amara L
2017-08-04
Light-absorbing organic carbon (OC), also termed brown carbon (BrC), from laboratory-based biomass burning (BB) has been studied intensively to understand the contribution of BB to radiative forcing. However, relatively few measurements have been conducted on field-based BB and even fewer measurements have examined BrC from anthropogenic combustion sources like motor vehicle emissions. In this work, the light absorption of methanol-extractable OC from prescribed and laboratory BB and gasoline vehicle emissions was examined using spectrophotometry. The light absorption of methanol extracts showed a strong wavelength dependence for both BB and gasoline vehicle emissions. The mass absorption coefficients at 365 nm (MAC 365 , m 2 g -1 C) - used as a measurement proxy for BrC - were significantly correlated (p < 0.05) to the elemental carbon (EC)/OC ratios when examined by each BB fuel type. No significant correlation was observed when pooling fuels, indicating that both burn conditions and fuel types may impact BB BrC characteristics. The average MAC 365 of gasoline vehicle emission samples is 0.62 ± 0.76 m 2 g -1 C, which is similar in magnitude to the BB samples (1.27 ± 0.76 m 2 g -1 C). These results suggest that in addition to BB, gasoline vehicle emissions may also be an important BrC source in urban areas.
Federal Register 2010, 2011, 2012, 2013, 2014
2013-02-28
... SMALL BUSINESS ADMINISTRATION [License No. 04/04-0311] BB&T Capital Partners Mezzanine Fund II, L... Interest Notice is hereby given that BB&T Capital Partners Mezzanine Fund II, L.P., 101 N. Cherry Street... Interest of the Small Business Administration (``SBA'') Rules and Regulations (13 CFR 107.730). BB&T...
Aubert, B; Bona, M; Karyotakis, Y; Lees, J P; Poireau, V; Prudent, X; Tisserand, V; Zghiche, A; Garra Tico, J; Grauges, E; Lopez, L; Palano, A; Pappagallo, M; Eigen, G; Stugu, B; Sun, L; Abrams, G S; Battaglia, M; Brown, D N; Button-Shafer, J; Cahn, R N; Jacobsen, R G; Kadyk, J A; Kerth, L T; Kolomensky, Yu G; Kukartsev, G; Lynch, G; Osipenkov, I L; Ronan, M T; Tackmann, K; Tanabe, T; Wenzel, W A; del Amo Sanchez, P; Hawkes, C M; Soni, N; Watson, A T; Koch, H; Schroeder, T; Walker, D; Asgeirsson, D J; Cuhadar-Donszelmann, T; Fulsom, B G; Hearty, C; Mattison, T S; McKenna, J A; Barrett, M; Khan, A; Saleem, M; Teodorescu, L; Blinov, V E; Bukin, A D; Buzykaev, A R; Druzhinin, V P; Golubev, V B; Onuchin, A P; Serednyakov, S I; Skovpen, Yu I; Solodov, E P; Todyshev, K Yu; Bondioli, M; Curry, S; Eschrich, I; Kirkby, D; Lankford, A J; Lund, P; Mandelkern, M; Martin, E C; Stoker, D P; Abachi, S; Buchanan, C; Gary, J W; Liu, F; Long, O; Shen, B C; Vitug, G M; Yasin, Z; Zhang, L; Paar, H P; Rahatlou, S; Sharma, V; Campagnari, C; Hong, T M; Kovalskyi, D; Richman, J D; Beck, T W; Eisner, A M; Flacco, C J; Heusch, C A; Kroseberg, J; Lockman, W S; Schalk, T; Schumm, B A; Seiden, A; Wilson, M G; Winstrom, L O; Chen, E; Cheng, C H; Doll, D A; Echenard, B; Fang, F; Hitlin, D G; Narsky, I; Piatenko, T; Porter, F C; Andreassen, R; Mancinelli, G; Meadows, B T; Mishra, K; Sokoloff, M D; Blanc, F; Bloom, P C; Ford, W T; Hirschauer, J F; Kreisel, A; Nagel, M; Nauenberg, U; Olivas, A; Smith, J G; Ulmer, K A; Wagner, S R; Ayad, R; Gabareen, A M; Soffer, A; Toki, W H; Wilson, R J; Altenburg, D D; Feltresi, E; Hauke, A; Jasper, H; Karbach, M; Merkel, J; Petzold, A; Spaan, B; Wacker, K; Klose, V; Kobel, M J; Lacker, H M; Mader, W F; Nogowski, R; Schubert, J; Schubert, K R; Schwierz, R; Sundermann, J E; Volk, A; Bernard, D; Bonneaud, G R; Latour, E; Thiebaux, Ch; Verderi, M; Clark, P J; Gradl, W; Playfer, S; Robertson, A I; Watson, J E; Andreotti, M; Bettoni, D; Bozzi, C; Calabrese, R; Cecchi, A; Cibinetto, G; Franchini, P; Luppi, E; Negrini, M; Petrella, A; Piemontese, L; Prencipe, E; Santoro, V; Anulli, F; Baldini-Ferroli, R; Calcaterra, A; de Sangro, R; Finocchiaro, G; Pacetti, S; Patteri, P; Peruzzi, I M; Piccolo, M; Rama, M; Zallo, A; Buzzo, A; Contri, R; Lo Vetere, M; Macri, M M; Monge, M R; Passaggio, S; Patrignani, C; Robutti, E; Santroni, A; Tosi, S; Chaisanguanthum, K S; Morii, M; Dubitzky, R S; Marks, J; Schenk, S; Uwer, U; Bard, D J; Dauncey, P D; Nash, J A; Panduro Vazquez, W; Tibbetts, M; Behera, P K; Chai, X; Charles, M J; Mallik, U; Cochran, J; Crawley, H B; Dong, L; Eyges, V; Meyer, W T; Prell, S; Rosenberg, E I; Rubin, A E; Gao, Y Y; Gritsan, A V; Guo, Z J; Lae, C K; Denig, A G; Fritsch, M; Schott, G; Arnaud, N; Béquilleux, J; D'Orazio, A; Davier, M; Firmino da Costa, J; Grosdidier, G; Höcker, A; Lepeltier, V; Le Diberder, F; Lutz, A M; Pruvot, S; Roudeau, P; Schune, M H; Serrano, J; Sordini, V; Stocchi, A; Wang, W F; Wormser, G; Lange, D J; Wright, D M; Bingham, I; Burke, J P; Chavez, C A; Fry, J R; Gabathuler, E; Gamet, R; Hutchcroft, D E; Payne, D J; Touramanis, C; Bevan, A J; George, K A; Di Lodovico, F; Sacco, R; Sigamani, M; Cowan, G; Flaecher, H U; Hopkins, D A; Paramesvaran, S; Salvatore, F; Wren, A C; Brown, D N; Davis, C L; Alwyn, K E; Barlow, N R; Barlow, R J; Chia, Y M; Edgar, C L; Lafferty, G D; West, T J; Yi, J I; Anderson, J; Chen, C; Jawahery, A; Roberts, D A; Simi, G; Tuggle, J M; Dallapiccola, C; Hertzbach, S S; Li, X; Salvati, E; Saremi, S; Cowan, R; Dujmic, D; Fisher, P H; Koeneke, K; Sciolla, G; Spitznagel, M; Taylor, F; Yamamoto, R K; Zhao, M; McLachlin, S E; Patel, P M; Robertson, S H; Lazzaro, A; Lombardo, V; Palombo, F; Bauer, J M; Cremaldi, L; Eschenburg, V; Godang, R; Kroeger, R; Sanders, D A; Summers, D J; Zhao, H W; Brunet, S; Côté, D; Simard, M; Taras, P; Viaud, F B; Nicholson, H; De Nardo, G; Lista, L; Monorchio, D; Sciacca, C; Baak, M A; Raven, G; Snoek, H L; Jessop, C P; Knoepfel, K J; LoSecco, J M; Benelli, G; Corwin, L A; Honscheid, K; Kagan, H; Kass, R; Morris, J P; Rahimi, A M; Regensburger, J J; Sekula, S J; Wong, Q K; Blount, N L; Brau, J; Frey, R; Igonkina, O; Kolb, J A; Lu, M; Rahmat, R; Sinev, N B; Strom, D; Strube, J; Torrence, E; Castelli, G; Gagliardi, N; Gaz, A; Margoni, M; Morandin, M; Posocco, M; Rotondo, M; Simonetto, F; Stroili, R; Voci, C; Ben-Haim, E; Briand, H; Calderini, G; Chauveau, J; David, P; Del Buono, L; Hamon, O; Leruste, Ph; Malclès, J; Ocariz, J; Perez, A; Prendki, J; Gladney, L; Biasini, M; Covarelli, R; Manoni, E; Angelini, C; Batignani, G; Bettarini, S; Carpinelli, M; Cervelli, A; Forti, F; Giorgi, M A; Lusiani, A; Marchiori, G; Morganti, M; Mazur, M A; Neri, N; Paoloni, E; Rizzo, G; Walsh, J J; Biesiada, J; Lau, Y P; Lopes Pegna, D; Lu, C; Olsen, J; Smith, A J S; Telnov, A V; Baracchini, E; Cavoto, G; del Re, D; Di Marco, E; Faccini, R; Ferrarotto, F; Ferroni, F; Gaspero, M; Jackson, P D; Mazzoni, M A; Morganti, S; Piredda, G; Polci, F; Renga, F; Voena, C; Ebert, M; Hartmann, T; Schröder, H; Waldi, R; Adye, T; Franek, B; Olaiya, E O; Roethel, W; Wilson, F F; Emery, S; Escalier, M; Gaidot, A; Ganzhur, S F; Hamel de Monchenault, G; Kozanecki, W; Vasseur, G; Yèche, Ch; Zito, M; Chen, X R; Liu, H; Park, W; Purohit, M V; White, R M; Wilson, J R; Allen, M T; Aston, D; Bartoldus, R; Bechtle, P; Benitez, J F; Cenci, R; Coleman, J P; Convery, M R; Dingfelder, J C; Dorfan, J; Dubois-Felsmann, G P; Dunwoodie, W; Field, R C; Glanzman, T; Gowdy, S J; Graham, M T; Grenier, P; Hast, C; Innes, W R; Kaminski, J; Kelsey, M H; Kim, H; Kim, P; Kocian, M L; Leith, D W G S; Li, S; Lindquist, B; Luitz, S; Luth, V; Lynch, H L; MacFarlane, D B; Marsiske, H; Messner, R; Muller, D R; Neal, H; Nelson, S; O'Grady, C P; Ofte, I; Perazzo, A; Perl, M; Ratcliff, B N; Roodman, A; Salnikov, A A; Schindler, R H; Schwiening, J; Snyder, A; Su, D; Sullivan, M K; Suzuki, K; Swain, S K; Thompson, J M; Va'vra, J; Wagner, A P; Weaver, M; Wisniewski, W J; Wittgen, M; Wright, D H; Wulsin, H W; Yarritu, A K; Yi, K; Young, C C; Ziegler, V; Burchat, P R; Edwards, A J; Majewski, S A; Miyashita, T S; Petersen, B A; Wilden, L; Ahmed, S; Alam, M S; Bula, R; Ernst, J A; Pan, B; Saeed, M A; Zain, S B; Spanier, S M; Wogsland, B J; Eckmann, R; Ritchie, J L; Ruland, A M; Schilling, C J; Schwitters, R F; Izen, J M; Lou, X C; Ye, S; Bianchi, F; Gamba, D; Pelliccioni, M; Bomben, M; Bosisio, L; Cartaro, C; Cossutti, F; Della Ricca, G; Lanceri, L; Vitale, L; Azzolini, V; Lopez-March, N; Martinez-Vidal, F; Milanes, D A; Oyanguren, A; Albert, J; Banerjee, Sw; Bhuyan, B; Hamano, K; Kowalewski, R; Nugent, I M; Roney, J M; Sobie, R J; Gershon, T J; Harrison, P F; Ilic, J; Latham, T E; Mohanty, G B; Band, H R; Chen, X; Dasu, S; Flood, K T; Hollar, J J; Kutter, P E; Pan, Y; Pierini, M; Prepost, R; Vuosalo, C O; Wu, S L
2008-04-18
We report a measurement of the branching fractions for _B-->D(*)(pi)l- _nu(l) decays based on 341.1 fb(-1) of data collected at the Upsilon(4S) resonance with the BABAR detector at the SLAC PEP-II e+ e- storage rings. Events are tagged by fully reconstructing one of the B mesons in a hadronic decay mode. We obtain B(B- -->D(0)l-_nu(l)=(2.33+/-0.09(stat)+/-0.09(syst)%, B(B- -->D(*0)l-_nu(l)=(5.83+/-0.15(stat) +/-0.30(syst) %, B(_B(0)-->D+l-_nu(l)=(2.21+/-0.11(stat) +/-0.12(syst)%, B(_B(0)-->D(*)l-_nu(l)=(5.49+/-0.16(stat)+/-0.25(syst)%, B(B- -->D+pi-l-_nu(l)=(0.42+/-0.06(stat)+/-0.03(syst)%, B(B- -->D(*)+pi-l-_nu(l)=(0.59+/-0.05(stat)+/-0.04(syst)%, B(_B(0)-->D(0)pi+l-_nu(l)=(0.43+/-0.08(stat)+/-0.03(syst)%, and B(_B(0)-->D(*0)pi+l-_nu(l)=(0.48+/-0.08(stat)+/-0.04(syst)%.
Liang, Junfei; Wei, Ran; He, Shuai; Liu, Yikan; Guo, Lin; Li, Lidong
2013-03-21
Oncoprotein platelet derived growth factor-BB (PDGF-BB) is one of the most critical growth factors that regulates tumor growth and division. In this work, a highly sensitive and selective fluorescence resonance energy transfer (FRET) aptasensor for PDGF-BB detection based on the assembly of dye-labeled aptamer and graphene oxide (GO) is developed for the first time. Due to the non-covalent assembly between aptamer and GO, fluorescence quenching of the dye takes place because of FRET. In the presence of PDGF-BB, the binding between aptamer and PDGF-BB will disturb the interaction between aptamer and GO, and release the dye-labeled aptamer from the GO surface, resulting in restoration of the fluorophore fluorescence. Because of the high fluorescence quenching efficiency, unique structure, and electronic properties of GO, the GO aptasensor exhibits extraordinarily high sensitivity. We also demonstrate that two highly related molecular variants of PDGF (AA, AB) can be distinguished from PDGF-BB, which indicates the aptasensor has excellent selectivity. Such an aptasensor opens a rapid, selective and sensitive route for the detection of PDGF-BB and provides a promising strategy for other cancer-related proteins detections.
Li, Jian; Yang, Yu-Guang; Chen, Xiu-Bo; Zhou, Yi-Hua; Shi, Wei-Min
2016-01-01
A novel quantum private database query protocol is proposed, based on passive round-robin differential phase-shift quantum key distribution. Compared with previous quantum private database query protocols, the present protocol has the following unique merits: (i) the user Alice can obtain one and only one key bit so that both the efficiency and security of the present protocol can be ensured, and (ii) it does not require to change the length difference of the two arms in a Mach-Zehnder interferometer and just chooses two pulses passively to interfere with so that it is much simpler and more practical. The present protocol is also proved to be secure in terms of the user security and database security. PMID:27539654
Coherent attacking continuous-variable quantum key distribution with entanglement in the middle
NASA Astrophysics Data System (ADS)
Zhang, Zhaoyuan; Shi, Ronghua; Zeng, Guihua; Guo, Ying
2018-06-01
We suggest an approach on the coherent attack of continuous-variable quantum key distribution (CVQKD) with an untrusted entangled source in the middle. The coherent attack strategy can be performed on the double links of quantum system, enabling the eavesdropper to steal more information from the proposed scheme using the entanglement correlation. Numeric simulation results show the improved performance of the attacked CVQKD system in terms of the derived secret key rate with the controllable parameters maximizing the stolen information.
Study of the Quantum Channel between Earth and Space for Satellite Quantum Communications
NASA Astrophysics Data System (ADS)
Bonato, Cristian; Tomaello, Andrea; da Deppo, Vania; Naletto, Giapiero; Villoresi, Paolo
In this work there are studied the conditions for the effective quantum communications between a terminal on Earth and the other onboard of an orbiter. The quantum key distribution between a LEO satellite and a ground station is studied in particular. The effect of the propagation over long distances as well as the background during day or night is modeled, compared and discussed in the context of key generation and exchange.
Photon nonlinear mixing in subcarrier multiplexed quantum key distribution systems.
Capmany, José
2009-04-13
We provide, for the first time to our knowledge, an analysis of the influence of nonlinear photon mixing on the end to end quantum bit error rate (QBER) performance of subcarrier multiplexed quantum key distribution systems. The results show that negligible impact is to be expected for modulation indexes in the range of 2%.
Moar, William; Khajuria, Chitvan; Pleau, Michael; Ilagan, Oliver; Chen, Mao; Jiang, Changjian; Price, Paula; McNulty, Brian; Clark, Thomas; Head, Graham
2017-01-01
There is a continuing need to express new insect control compounds in transgenic maize against western corn rootworm, Diabrotica virgifera virgifera (LeConte) (WCR). In this study three experiments were conducted to determine cross-resistance between the new insecticidal DvSnf7 dsRNA, and Bacillus thuringiensis (Bt) Cry3Bb1; used to control WCR since 2003, with field-evolved resistance being reported. Laboratory susceptible and Cry3Bb1-resistant WCR were evaluated against DvSnf7 dsRNA in larval diet-incorporation bioassays. Additionally, the susceptibility of seven field and one field-derived WCR populations to DvSnf7 (and Cry3Bb1) was assessed in larval diet-overlay bioassays. Finally, beetle emergence of laboratory susceptible and Cry3Bb1-resistant WCR was evaluated with maize plants in the greenhouse expressing Cry3Bb1, Cry34Ab1/Cry35Ab1, or DvSnf7 dsRNA singly, or in combination. The Cry3Bb1-resistant colony had slight but significantly (2.7-fold; P<0.05) decreased susceptibility to DvSnf7 compared to the susceptible colony, but when repeated using a field-derived WCR population selected for reduced Cry3Bb1 susceptibility, there was no significant difference (P<0.05) in DvSnf7 susceptibility compared to that same susceptible population. Additionally, this 2.7-fold difference in susceptibility falls within the range of DvSnf7 susceptibility among the seven field populations tested. Additionally, there was no correlation between susceptibility to DvSnf7 and Cry3Bb1 for all populations evaluated. In greenhouse studies, there were no significant differences (P<0.05) between beetle emergence of susceptible and Cry3Bb1-resistant colonies on DvSnf7 and Cry34Ab1/Cry35Ab1, and between DvSnf7 and MON 87411 (DvSnf7 + Cry3Bb1) for the Cry3Bb1-resistant colony. These results demonstrate no cross-resistance between DvSnf7 and Cry3Bb1 against WCR. Therefore, pyramiding DvSnf7 with Bt proteins such as Cry3Bb1 and Cry34Ab1/Cry35Ab1 will provide a valuable IRM tool against WCR that will increase the durability of these Bt proteins. These results also illustrate the importance of using appropriate bioassay methods when characterizing field-evolved resistant WCR populations.
Khajuria, Chitvan; Pleau, Michael; Ilagan, Oliver; Chen, Mao; Jiang, Changjian; Price, Paula; McNulty, Brian; Clark, Thomas; Head, Graham
2017-01-01
Background and Methodology There is a continuing need to express new insect control compounds in transgenic maize against western corn rootworm, Diabrotica virgifera virgifera (LeConte) (WCR). In this study three experiments were conducted to determine cross-resistance between the new insecticidal DvSnf7 dsRNA, and Bacillus thuringiensis (Bt) Cry3Bb1; used to control WCR since 2003, with field-evolved resistance being reported. Laboratory susceptible and Cry3Bb1-resistant WCR were evaluated against DvSnf7 dsRNA in larval diet-incorporation bioassays. Additionally, the susceptibility of seven field and one field-derived WCR populations to DvSnf7 (and Cry3Bb1) was assessed in larval diet-overlay bioassays. Finally, beetle emergence of laboratory susceptible and Cry3Bb1-resistant WCR was evaluated with maize plants in the greenhouse expressing Cry3Bb1, Cry34Ab1/Cry35Ab1, or DvSnf7 dsRNA singly, or in combination. Principal Findings and Conclusions The Cry3Bb1-resistant colony had slight but significantly (2.7-fold; P<0.05) decreased susceptibility to DvSnf7 compared to the susceptible colony, but when repeated using a field-derived WCR population selected for reduced Cry3Bb1 susceptibility, there was no significant difference (P<0.05) in DvSnf7 susceptibility compared to that same susceptible population. Additionally, this 2.7-fold difference in susceptibility falls within the range of DvSnf7 susceptibility among the seven field populations tested. Additionally, there was no correlation between susceptibility to DvSnf7 and Cry3Bb1 for all populations evaluated. In greenhouse studies, there were no significant differences (P<0.05) between beetle emergence of susceptible and Cry3Bb1-resistant colonies on DvSnf7 and Cry34Ab1/Cry35Ab1, and between DvSnf7 and MON 87411 (DvSnf7 + Cry3Bb1) for the Cry3Bb1-resistant colony. These results demonstrate no cross-resistance between DvSnf7 and Cry3Bb1 against WCR. Therefore, pyramiding DvSnf7 with Bt proteins such as Cry3Bb1 and Cry34Ab1/Cry35Ab1 will provide a valuable IRM tool against WCR that will increase the durability of these Bt proteins. These results also illustrate the importance of using appropriate bioassay methods when characterizing field-evolved resistant WCR populations. PMID:28060922
Syndecan-4 enhances PDGF-BB activity in diabetic wound healing.
Das, Subhamoy; Majid, Marjan; Baker, Aaron B
2016-09-15
Non-healing ulcers are a common consequence of long-term diabetes and severe peripheral vascular disease. These non-healing wounds are a major source of morbidity in patients with diabetes and place a heavy financial burden on the healthcare system. Growth factor therapies are an attractive strategy for enhancing wound closure in non-healing wounds but have only achieved mixed results in clinical trials. Platelet derived growth factor-BB (PDGF-BB) is the only currently approved growth factor therapy for non-healing wounds. However, PDGF-BB therapy is not effective in many patients and requires high doses that increase the potential for side effects. In this work, we demonstrate that syndecan-4 delivered in a proteoliposomal formulation enhances PDGF-BB activity in diabetic wound healing. In particular, syndecan-4 proteoliposomes enhance the migration of keratinocytes derived from patients with diabetes. In addition, syndecan-4 proteoliposomes sensitize keratinocytes to PDGF-BB stimulation, enhancing the intracellular signaling response to PDGF-BB. We further demonstrated that co-therapy with syndecan-4 proteoliposomes enhanced wound closure in diabetic, hyperlipidemic ob/ob mice. Wounds treated with both syndecan-4 proteoliposomes and PDGF-BB had increased re-epithelization and angiogenesis in comparison to wounds treated with PDGF-BB alone. Moreover, the wounds treated with syndecan-4 proteoliposomes and PDGF-BB also had increased M2 macrophages and reduced M1 macrophages, suggesting syndecan-4 delivery induces immunomodulation within the healing wounds. Together our findings support that syndecan-4 proteoliposomes markedly improve PDGF-BB efficacy for wound healing and may be useful in enhancing treatments for non-healing wounds. Non-healing wounds are major healthcare issue for patients with diabetes and peripheral vascular disease. Growth factor therapies have potential for healing chronic wounds but have not been effective for many patients. PDGF-BB is currently the only approved growth factor for enhancing wound healing. However, it has not seen widespread adoption due to limited efficacy and high cost. In this work, we have developed an enhancing agent that improves the activity of PDGF-BB in promoting wound healing in animals with diabetes. This co-therapy may be useful in improving the efficacy of PDGFBB and enhance its safety through lowering the dose of growth factor needed to improve wound healing. Copyright © 2016 Acta Materialia Inc. Published by Elsevier Ltd. All rights reserved.
NASA Astrophysics Data System (ADS)
Emigh, Paul Jeffrey
This dissertation describes research on student understanding of quantum mechanics across multiple levels of instruction. The primary focus has been to identify patterns in student reasoning related to key concepts in quantum mechanics. The specific topics include quantum measurements, time dependence, vector spaces, and angular momentum. The research has spanned a variety of different quantum courses intended for introductory physics students, upper-division physics majors, and graduate students in physics. The results of this research have been used to develop a set of curriculum, Tutorials in Physics: Quantum Mechanics, for addressing the most persistent student difficulties. We document both the development of this curriculum and how it has impacted and improved student understanding of quantum mechanics.
Imahashi, Nobuhiko; Nishida, Tetsuya; Goto, Tatsunori; Terakura, Seitaro; Watanabe, Keisuke; Hanajiri, Ryo; Sakemura, Reona; Imai, Misa; Kiyoi, Hitoshi; Naoe, Tomoki; Murata, Makoto
2015-01-01
Although recent studies of virus-specific T-cell (VST) therapy for viral infections after allogeneic hematopoietic stem cell transplantation have shown promising results, simple and less time-intensive and labor-intensive methods are required to generate VSTs for the wider application of VST therapy. We investigated the efficacy of anti-CD28 and anti-4-1BB antibodies, which can provide T cells with costimulatory signals similar in strength to those of antigen-presenting cells, in generating VSTs. When peripheral blood mononuclear cells were stimulated with viral peptides together with isotype control, anti-CD28, or anti-4-1BB antibodies, anti-4-1BB antibodies yielded the highest numbers of VSTs, which were on an average 7.9 times higher than those generated with isotype control antibody. The combination of anti-CD28 and anti-4-1BB antibodies did not result in increased numbers of VSTs compared with anti-4-1BB antibody alone. Importantly, the positive effect of anti-4-1BB antibody was observed regardless of the epitopes of the VSTs. In contrast, the capacity of dendritic cells (DCs) to generate VSTs differed considerably depending on the epitopes of the VSTs. Furthermore, the numbers of VSTs generated with DCs were at most similar to those generated with the anti-4-1BB antibody. Generation of VSTs with anti-4-1BB antibody did not result in excessive differentiation or deteriorated function of the generated VSTs compared with those generated with control antibody or DCs. In conclusion, VSTs can be generated rapidly and efficiently by simply stimulating peripheral blood mononuclear cells with viral peptide and anti-4-1BB antibody without using antigen-presenting cells. We propose using anti-4-1BB antibody as a novel strategy to generate VSTs for adoptive therapy.
Quantum key distribution in a multi-user network at gigahertz clock rates
NASA Astrophysics Data System (ADS)
Fernandez, Veronica; Gordon, Karen J.; Collins, Robert J.; Townsend, Paul D.; Cova, Sergio D.; Rech, Ivan; Buller, Gerald S.
2005-07-01
In recent years quantum information research has lead to the discovery of a number of remarkable new paradigms for information processing and communication. These developments include quantum cryptography schemes that offer unconditionally secure information transport guaranteed by quantum-mechanical laws. Such potentially disruptive security technologies could be of high strategic and economic value in the future. Two major issues confronting researchers in this field are the transmission range (typically <100km) and the key exchange rate, which can be as low as a few bits per second at long optical fiber distances. This paper describes further research of an approach to significantly enhance the key exchange rate in an optical fiber system at distances in the range of 1-20km. We will present results on a number of application scenarios, including point-to-point links and multi-user networks. Quantum key distribution systems have been developed, which use standard telecommunications optical fiber, and which are capable of operating at clock rates of up to 2GHz. They implement a polarization-encoded version of the B92 protocol and employ vertical-cavity surface-emitting lasers with emission wavelengths of 850 nm as weak coherent light sources, as well as silicon single-photon avalanche diodes as the single photon detectors. The point-to-point quantum key distribution system exhibited a quantum bit error rate of 1.4%, and an estimated net bit rate greater than 100,000 bits-1 for a 4.2 km transmission range.
Security of quantum key distribution with iterative sifting
NASA Astrophysics Data System (ADS)
Tamaki, Kiyoshi; Lo, Hoi-Kwong; Mizutani, Akihiro; Kato, Go; Lim, Charles Ci Wen; Azuma, Koji; Curty, Marcos
2018-01-01
Several quantum key distribution (QKD) protocols employ iterative sifting. After each quantum transmission round, Alice and Bob disclose part of their setting information (including their basis choices) for the detected signals. This quantum phase then ends when the basis dependent termination conditions are met, i.e., the numbers of detected signals per basis exceed certain pre-agreed threshold values. Recently, however, Pfister et al (2016 New J. Phys. 18 053001) showed that the basis dependent termination condition makes QKD insecure, especially in the finite key regime, and they suggested to disclose all the setting information after finishing the quantum phase. However, this protocol has two main drawbacks: it requires that Alice possesses a large memory, and she also needs to have some a priori knowledge about the transmission rate of the quantum channel. Here we solve these two problems by introducing a basis-independent termination condition to the iterative sifting in the finite key regime. The use of this condition, in combination with Azuma’s inequality, provides a precise estimation on the amount of privacy amplification that needs to be applied, thus leading to the security of QKD protocols, including the loss-tolerant protocol (Tamaki et al 2014 Phys. Rev. A 90 052314), with iterative sifting. Our analysis indicates that to announce the basis information after each quantum transmission round does not compromise the key generation rate of the loss-tolerant protocol. Our result allows the implementation of wider classes of classical post-processing techniques in QKD with quantified security.
Wolf, Jacek; Drozdowski, Jacek; Czechowicz, Krzysztof; Winklewski, Paweł J; Jassem, Ewa; Kara, Tomas; Somers, Virend K; Narkiewicz, Krzysztof
2016-01-01
Beta1-receptor antagonists (BBs) are commonly administered in the treatment of cardiovascular disease (CVD). The reported benefits of BB use in CVD patients with concomitant obstructive sleep apnea (OSA) may be limited by their impact on apnea-induced bradycardias. Therefore the aim of the study was to test the influence of BBs on periapneic heart rate (HR) fluctuations in hypertensive patients with newly-detected and untreated OSA. We studied 88 hypertensive patients (56 on BBs and 32 BB naive) with newly-diagnosed moderate-to-severe OSA who were free of major pulmonary comorbidities and did not require antiarrhythmic therapy. ECGs recorded during sleep were investigated for heart rate (HR) responses to apneas allowing to compare extreme HR accelerations and decelerations between the groups. Average sleep-time HR was comparable in BB-naive (BB-) and BB-treated (BB+) patients. Direct comparisons showed that HR decelerations were also similar in the two subgroups (53.8±9.6 vs. 54.4±7.8 bpm; P=0.78, for BB- and BB+, respectively) however, BBs blunted the OSA-induced HR accelerations (82.3±12.2 vs. 74.3±10.0; P=0.003). After adjusting for baseline HR and magnitude of desaturations, HR decelerations were more evident in BB-naive group whereas tachycardic responses remained blunted in the BB+ group. The incidence of ectopies and conduction abnormalities were comparable across two groups. Beta-blockers do not potentiate apnea-induced HR decelerations, attenuate apnea-induced increases in heart rate and do not influence incidence of ectopies and conduction abnormalities in patients with hypertension and moderate-to-severe, untreated OSA. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.
Zhang, Jian; Lazarenko, Oxana P.; Kang, Jie; Blackburn, Michael L.; Ronis, Martin J. J.; Badger, Thomas M.; Chen, Jin-Ran
2013-01-01
Previous studies have demonstrated that weanling rats fed AIN-93G semi-purified diets supplemented with 10% whole blueberry (BB) powder for two weeks beginning on postnatal day 21 (PND21) significantly increased bone formation at PND35. However, the minimal level of dietary BB needed to produce these effects is, as yet, unknown. The current study examined the effects of three different levels of BB diet supplementation (1, 3, and 5%) for 35 days beginning on PND25 on bone quality, and osteoclastic bone resorption in female rats. Peripheral quantitative CT scan (pQCT) of tibia, demonstrated that bone mineral density (BMD) and content (BMC) were dose-dependently increased in BB-fed rats compared to controls (P<0.05). Significantly increased bone mass after feeding 5% BB extracts was also observed in a TEN (total enteral nutrition) rat model in which daily caloric and food intake was precisely controlled. Expression of RANKL (receptor activator of nuclear factor-κB ligand) a protein essential for osteoclast formation was dose-dependently decreased in the femur of BB animals. In addition, expression of PPARγ (peroxisome proliferator-activated receptor γ) which regulates bone marrow adipogenesis was suppressed in BB diet rats compared to non-BB diet controls. Finally, a set of in vitro cell cultures revealed that the inhibitory effect of BB diet rat serum on RANKL expression was more profound in mesenchymal stromal cells compared to its effect on mature osteoblasts, pre-adipocytes and osteocytes. These results suggest that inhibition of bone resorption may contribute to increased bone mass during early development after BB consumption. PMID:23936431
Merenstein, Daniel J; Tan, Tina P; Molokin, Aleksey; Smith, Keisha Herbin; Roberts, Robert F; Shara, Nawar M; Mete, Mihriye; Sanders, Mary Ellen; Solano-Aguilar, Gloria
2015-01-01
Probiotics are live microorganisms that, when administered in sufficient doses, provide health benefits on the host. The United States Food and Drug Administration (FDA) requires phase I safety studies for probiotics when the intended use of the product is as a drug. The purpose of the study was to determine the safety of Bifidobacterium animalis subsp lactis (B. lactis) strain BB-12 (BB-12)-supplemented yogurt when consumed by a generally healthy group of adults who were prescribed a 10-day course of antibiotics for a respiratory infection. Secondary aims were to assess the ability of BB-12 to affect the expression of whole blood immune markers associated with cell activation and inflammatory response. A phase I, double-blinded, randomized controlled study was conducted in compliance with FDA guidelines for an Investigational New Drug (IND). Forty participants were randomly assigned to consume 4 ounces of either BB-12 -supplemented yogurt or non-supplemented control yogurt daily for 10 d. The primary outcome was to assess safety and tolerability, assessed by the number of reported adverse events. A total of 165 non-serious adverse events were reported, with no differences between the control and BB-12 groups. When compared to the control group, B lactis fecal levels were modestly higher in the BB-12-supplemented group. In a small subset of patients, changes in whole blood expression of genes associated with regulation and activation of immune cells were detected in the BB-12-supplemented group. BB-12-supplemented yogurt is safe and well tolerated when consumed by healthy adults concurrently taking antibiotics. This study will form the basis for future randomized clinical trials investigating the potential immunomodulatory effects of BB-12-supplemented yogurt in a variety of disease states.
China demonstrates intercontinental quantum key distribution
NASA Astrophysics Data System (ADS)
Johnston, Hamish
2017-11-01
A quantum cryptography key has been shared between Beijing and Vienna using a satellite - allowing the presidents of the Chinese Academy of Sciences and Austrian Academy of Sciences to communicate via a secure video link.
Upper bounds on secret-key agreement over lossy thermal bosonic channels
NASA Astrophysics Data System (ADS)
Kaur, Eneet; Wilde, Mark M.
2017-12-01
Upper bounds on the secret-key-agreement capacity of a quantum channel serve as a way to assess the performance of practical quantum-key-distribution protocols conducted over that channel. In particular, if a protocol employs a quantum repeater, achieving secret-key rates exceeding these upper bounds is evidence of having a working quantum repeater. In this paper, we extend a recent advance [Liuzzo-Scorpo et al., Phys. Rev. Lett. 119, 120503 (2017), 10.1103/PhysRevLett.119.120503] in the theory of the teleportation simulation of single-mode phase-insensitive Gaussian channels such that it now applies to the relative entropy of entanglement measure. As a consequence of this extension, we find tighter upper bounds on the nonasymptotic secret-key-agreement capacity of the lossy thermal bosonic channel than were previously known. The lossy thermal bosonic channel serves as a more realistic model of communication than the pure-loss bosonic channel, because it can model the effects of eavesdropper tampering and imperfect detectors. An implication of our result is that the previously known upper bounds on the secret-key-agreement capacity of the thermal channel are too pessimistic for the practical finite-size regime in which the channel is used a finite number of times, and so it should now be somewhat easier to witness a working quantum repeater when using secret-key-agreement capacity upper bounds as a benchmark.
Modeling a space-based quantum link that includes an adaptive optics system
NASA Astrophysics Data System (ADS)
Duchane, Alexander W.; Hodson, Douglas D.; Mailloux, Logan O.
2017-10-01
Quantum Key Distribution uses optical pulses to generate shared random bit strings between two locations. If a high percentage of the optical pulses are comprised of single photons, then the statistical nature of light and information theory can be used to generate secure shared random bit strings which can then be converted to keys for encryption systems. When these keys are incorporated along with symmetric encryption techniques such as a one-time pad, then this method of key generation and encryption is resistant to future advances in quantum computing which will significantly degrade the effectiveness of current asymmetric key sharing techniques. This research first reviews the transition of Quantum Key Distribution free-space experiments from the laboratory environment to field experiments, and finally, ongoing space experiments. Next, a propagation model for an optical pulse from low-earth orbit to ground and the effects of turbulence on the transmitted optical pulse is described. An Adaptive Optics system is modeled to correct for the aberrations caused by the atmosphere. The long-term point spread function of the completed low-earth orbit to ground optical system is explored in the results section. Finally, the impact of this optical system and its point spread function on an overall quantum key distribution system as well as the future work necessary to show this impact is described.
Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack
NASA Astrophysics Data System (ADS)
Ma, Hong-Xin; Bao, Wan-Su; Li, Hong-Wei; Chou, Chun
2016-08-01
We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. Project supported by the National Basic Research Program of China (Grant No. 2013CB338002) and the National Natural Science Foundation of China (Grant Nos. 11304397 and 61505261).
Global biomass burning - Atmospheric, climatic, and biospheric implications
NASA Technical Reports Server (NTRS)
Levine, Joel S.
1990-01-01
Topics discussed at the March 1990 American Geophysical Union's Conference on biomass burning which was attended by more than 175 participants representing 19 countries are presented. Conference highlights include discussion of remote sensing data concerning biomass burning (BB), gaseous and particle emissions resulting from BB in the tropics, BB in temperate and boreal ecosystems, the historic and prehistoric perspectives on BB, BB and global budgets for carbon, nitrogen, and oxygen, and the BB and the greenhouse effect. Global estimates of annual amounts of biomass burning and of the resulting release of carbon to the atmosphere and the mean gaseous emission ratios for fires in wetlands, chaparral, and boreal ecosystems are given. An overview is presented of some conference discussions including global burning from 1850-1980, the global impact of biomass burning, the great Chinese/Soviet fire of 1987, and burning and biogenic emissions.
Measurement-device-independent entanglement-based quantum key distribution
NASA Astrophysics Data System (ADS)
Yang, Xiuqing; Wei, Kejin; Ma, Haiqiang; Sun, Shihai; Liu, Hongwei; Yin, Zhenqiang; Li, Zuohan; Lian, Shibin; Du, Yungang; Wu, Lingan
2016-05-01
We present a quantum key distribution protocol in a model in which the legitimate users gather statistics as in the measurement-device-independent entanglement witness to certify the sources and the measurement devices. We show that the task of measurement-device-independent quantum communication can be accomplished based on monogamy of entanglement, and it is fairly loss tolerate including source and detector flaws. We derive a tight bound for collective attacks on the Holevo information between the authorized parties and the eavesdropper. Then with this bound, the final secret key rate with the source flaws can be obtained. The results show that long-distance quantum cryptography over 144 km can be made secure using only standard threshold detectors.
An Investigation of Hierachical Protein Recruitment to the Inhibitory Platelet Receptor, G6B-b
Coxon, Carmen H.; Sadler, Amanda J.; Huo, Jiandong; Campbell, R. Duncan
2012-01-01
Platelet activation is regulated by both positive and negative signals. G6B-b is an inhibitory platelet receptor with an immunoreceptor tyrosine-based inhibitory motif (ITIM) and an immunoreceptor tyrosine-based switch motif (ITSM). The molecular basis of inhibition by G6B-b is currently unknown but thought to involve the SH2 domain-containing tyrosine phosphatase SHP-1. Here we show that G6B-b also associates with SHP-2, as well as SHP-1, in human platelets. Using a number of biochemical approaches, we found these interactions to be direct and that the tandem SH2 domains of SHP-2 demonstrated a binding affinity for G6B-b 100-fold higher than that of SHP-1. It was also observed that while SHP-1 has an absolute requirement for phosphorylation at both motifs to bind, SHP-2 can associate with G6B-b when only one motif is phosphorylated, with the N-terminal SH2 domain and the ITIM being most important for the interaction. A number of other previously unreported SH2 domain-containing proteins, including Syk and PLCγ2, also demonstrated specificity for G6B-b phosphomotifs and may serve to explain the observation that G6B-b remains inhibitory in the absence of both SHP-1 and SHP-2. In addition, the presence of dual phosphorylated G6B-b in washed human platelets can reduce the EC50 for both CRP and collagen. PMID:23185356
Chu, Xin-Ling; Dong, Wei-Xia; Ding, Jin-Li; Feng, Ming-Guang; Ying, Sheng-Hua
2018-02-01
Oxidation tolerance is an important determinant to predict the virulence and biocontrol potential of Beauveria bassiana, a well-known entomopathogenic fungus. As a transcriptional coactivator, multiprotein bridging factor 1 mediates the activity of transcription factor in diverse physiological processes, and its homolog in B. bassiana (BbMBF1) contributes to fungal oxidation tolerance. In this study, the BbMBF1-interactomes under oxidative stress and normal growth condition were deciphered by mass spectrometry integrated with the immunoprecipitation. BbMBF1p factor has a broad interaction with proteins that are involved in various cellular processes, and this interaction is dynamically regulated by oxidative stress. Importantly, a B. bassiana homolog of yeast AP-1-like transcription factor (BbAP-1) was specifically associated with the BbMBF1-interactome under oxidation and significantly contributed to fungal oxidation tolerance. In addition, qPCR analysis revealed that several antioxidant genes are jointly controlled by BbAP-1 and BbMBF1. Conclusively, it is proposed that BbMBF1p protein mediates BbAP-1p factor to transcribe the downstream antioxidant genes in B. bassiana under oxidative stress. This study demonstrates for the first time a proteomic view of the MBF1-interactome in fungi, and presents an initial framework to probe the transcriptional mechanism involved in fungal response to oxidation, which will provide a new strategy to improve the biocontrol efficacy of B. bassiana.
Yin, Juntao; Hou, Yantao; Yin, Yuyun; Song, Xiaoyong
2017-01-01
Diabetes mellitus is an incurable metabolic disorder that seriously threatens human health. At present, there is no effective medication available to defeat it. This work intended to develop selenium-coated nanostructured lipid carriers (SeNLCs) for enhancing the oral bioavailability and the curative effect of berberine, an antidiabetic phytomedicine. Berberine-loaded SeNLCs (BB-SeNLCs) were prepared by hot-melt dispersion/homogenization procedure followed by in situ reduction. BB-SeNLCs were characterized by particle size, morphology, entrapment efficiency (EE) and in vitro release. Pharmacokinetics of berberine solution, berberine-loaded NLCs (BB-NLCs) and BB-SeNLCs were studied in Sprague Dawley rats administered by oral gavage. The prepared BB-SeNLCs were around 160 nm in particle size with an EE of 90%. In addition, BB-SeNLCs exhibited a better sustained release of berberine compared to the plain NLCs. After oral administration, BB-SeNLCs greatly enhanced the oral bioavailability of berberine, which was approximately 6.63 times as much as that of berberine solution. The hypoglycemic effect of BB-SeNLCs was also significantly superior to that of BB-NLCs and berberine solution. It turned out that sustained drug release and good intestinal absorption, plus the synergy of selenium, were basically responsible for enhanced oral bioavailability and hypoglycemic effect. Our findings show that SeNLCs are promising nanocarriers for oral delivery of berberine to strengthen the antidiabetic action.
Yin, Juntao; Hou, Yantao; Yin, Yuyun; Song, Xiaoyong
2017-01-01
Diabetes mellitus is an incurable metabolic disorder that seriously threatens human health. At present, there is no effective medication available to defeat it. This work intended to develop selenium-coated nanostructured lipid carriers (SeNLCs) for enhancing the oral bioavailability and the curative effect of berberine, an antidiabetic phytomedicine. Berberine-loaded SeNLCs (BB-SeNLCs) were prepared by hot-melt dispersion/homogenization procedure followed by in situ reduction. BB-SeNLCs were characterized by particle size, morphology, entrapment efficiency (EE) and in vitro release. Pharmacokinetics of berberine solution, berberine-loaded NLCs (BB-NLCs) and BB-SeNLCs were studied in Sprague Dawley rats administered by oral gavage. The prepared BB-SeNLCs were around 160 nm in particle size with an EE of 90%. In addition, BB-SeNLCs exhibited a better sustained release of berberine compared to the plain NLCs. After oral administration, BB-SeNLCs greatly enhanced the oral bioavailability of berberine, which was approximately 6.63 times as much as that of berberine solution. The hypoglycemic effect of BB-SeNLCs was also significantly superior to that of BB-NLCs and berberine solution. It turned out that sustained drug release and good intestinal absorption, plus the synergy of selenium, were basically responsible for enhanced oral bioavailability and hypoglycemic effect. Our findings show that SeNLCs are promising nanocarriers for oral delivery of berberine to strengthen the antidiabetic action. PMID:29263662
Andrade, Sheila Siqueira; Smaili, Soraya Soubhi; Monteforte, Priscila Totarelli; Miranda, Antônio; Kouyoumdjian, Maria; Sampaio, Misako Uemura; Lopes, Guiomar Silva; Oliva, Maria Luiza V
2012-09-01
BbKI is a kallikrein inhibitor with a reactive site sequence similar to that of kinins, the vasoactive peptides inserted in kininogen moieties. This structural similarity probably contributes to the strong interaction with plasma kallikrein, the enzyme that releases, from high-molecular weight kininogen (HMWK), the proinflammatory peptide bradykinin, which acts on B(2) receptors (B(2)R). BbKI was examined on smooth muscle contraction and Ca(2+) mobilization, in which the kallikrein-kinin system is involved. Contrary to expectations, BbKI (1.8 μm) increased [Ca(2+)](c) and contraction, as observed with BK (2.0 μm). Not blocked by B(1) receptors (B(1)R), the BbKI agonistic effect was blocked by the B(2)R antagonist, HOE-140 (6 μm), and the involvement of B(2)R was confirmed in B(2)R-knockout mice intestine. The same tissue response was obtained using a synthetic peptide derived from the BbKI reactive site structure, more resistant than BK to angiotensin I-converting enzyme (ACE) hydrolysis. Depending on the concentration, BbKI has a dual effect. At a low concentration, BbKI acts as a potent kallikrein inhibitor; however, due to the similarity to BK, in high concentrations, BbKI greatly increases Ca(2+) release from internal storages, as a consequence of its interaction with B(2)R. Therefore, the antagonistic and agonistic effects of BbKI may be considered in conditions of B(2)R involvement.
High-speed continuous-variable quantum key distribution without sending a local oscillator.
Huang, Duan; Huang, Peng; Lin, Dakai; Wang, Chao; Zeng, Guihua
2015-08-15
We report a 100-MHz continuous-variable quantum key distribution (CV-QKD) experiment over a 25-km fiber channel without sending a local oscillator (LO). We use a "locally" generated LO and implement with a 1-GHz shot-noise-limited homodyne detector to achieve high-speed quantum measurement, and we propose a secure phase compensation scheme to maintain a low level of excess noise. These make high-bit-rate CV-QKD significantly simpler for larger transmission distances compared with previous schemes in which both LO and quantum signals are transmitted through the insecure quantum channel.
NASA Astrophysics Data System (ADS)
Feng, Lei-hao; Hu, Qi-wei; Lei, Li; Fang, Lei-ming; Qi, Lei; Zhang, Lei-lei; Pu, Mei-fang; Kou, Zi-li; Peng, Fang; Chen, Xi-ping; Xia, Yuan-hua; Kojima, Yohei; Ohfuji, Hiroaki; He, Duan-wei; Chen, Bo; Irifune, Tetsuo
2018-02-01
Not Available Project supported by the Research Foundation of Key Laboratory of Neutron Physics (Grant No. 2015BB03), the National Natural Science Foundation of China (Grant Nos. 11774247), the Science Foundation for Excellent Youth Scholars of Sichuan University (Grant No. 2015SCU04A04), and the Joint Usage/Research Center PRIUS (Ehime University, Japan) and Chinese Academy of Sciences (Grant No. 2017-BEPC-PT-000568).
Recall Performance for Content-Addressable Memory Using Adiabatic Quantum Optimization
DOE Office of Scientific and Technical Information (OSTI.GOV)
Imam, Neena; Humble, Travis S.; McCaskey, Alex
A content-addressable memory (CAM) stores key-value associations such that the key is recalled by providing its associated value. While CAM recall is traditionally performed using recurrent neural network models, we show how to solve this problem using adiabatic quantum optimization. Our approach maps the recurrent neural network to a commercially available quantum processing unit by taking advantage of the common underlying Ising spin model. We then assess the accuracy of the quantum processor to store key-value associations by quantifying recall performance against an ensemble of problem sets. We observe that different learning rules from the neural network community influence recallmore » accuracy but performance appears to be limited by potential noise in the processor. The strong connection established between quantum processors and neural network problems supports the growing intersection of these two ideas.« less
Plug-and-play measurement-device-independent quantum key distribution
NASA Astrophysics Data System (ADS)
Choi, Yujun; Kwon, Osung; Woo, Minki; Oh, Kyunghwan; Han, Sang-Wook; Kim, Yong-Su; Moon, Sung
2016-03-01
Quantum key distribution (QKD) guarantees unconditional communication security based on the laws of quantum physics. However, practical QKD suffers from a number of quantum hackings due to the device imperfections. From the security standpoint, measurement-device-independent quantum key distribution (MDI-QKD) is in the limelight since it eliminates all the possible loopholes in detection. Due to active control units for mode matching between the photons from remote parties, however, the implementation of MDI-QKD is highly impractical. In this paper, we propose a method to resolve the mode matching problem while minimizing the use of active control units. By introducing the plug-and-play (P&P) concept into MDI-QKD, the indistinguishability in spectral and polarization modes between photons can naturally be guaranteed. We show the feasibility of P&P MDI-QKD with a proof-of-principle experiment.
Balmer, Brian C; Ylitalo, Gina M; McGeorge, Lauren E; Baugh, Keri A; Boyd, Daryle; Mullin, Keith D; Rosel, Patricia E; Sinclair, Carrie; Wells, Randall S; Zolman, Eric S; Schwacke, Lori H
2015-09-15
A number of studies were initiated in response to the Deepwater Horizon (DWH) oil spill to understand potential injuries to bottlenose dolphins (Tursiops truncatus) that inhabit the northern Gulf of Mexico (NGoM) estuarine waters. As part of these studies, remote biopsy skin and blubber samples were collected from dolphins at six field sites that received varying degrees of oiling: Barataria Bay (BB), Chandeleur Sound West (CSW), Chandeleur Sound East (CSE), Mississippi Sound South (MSS), Mississippi Sound North (MSN), and St. Joseph Bay (SJ). Blubber samples from 108 male dolphins were analyzed for persistent organic pollutant (POP) concentrations, as high levels of POPs have been previously reported in other southeastern U.S. dolphins and the potential contribution of these compounds to adverse health effects in NGoM dolphins must be considered. Dolphin blubber levels of summed POPs (ΣPOPs) did not differ significantly across sites (F-test, P=0.9119) [μg/g lipid; geometric mean and 95% CI]; CSW [65.9 (51.4-84.6)], SJ [74.1 (53.0-104)], MSN [74.3 (58.7-93.9)], BB [75.3 (56.4-101)], CSE [80.5 (57.8-112)], and MSS [82.5 (65.9-103)]. Overall, POP concentrations were in the lower half of the range compared to previously reported concentrations from other southeastern U.S. sites. Increased dolphin mortalities have been ongoing in the NGoM and have been suggested to be linked with the DWH oil spill. In addition, lung disease, impaired adrenal function, and serum biochemical abnormalities have been reported in dolphins from BB, an area that was heavily oiled. The results of this study suggest that POPs are likely not a primary contributor to the poor health conditions and increased mortality observed in some populations of NGoM dolphins following the DWH oil spill. Copyright © 2015 Elsevier B.V. All rights reserved.
Multi-party Quantum Key Agreement without Entanglement
NASA Astrophysics Data System (ADS)
Cai, Bin-Bin; Guo, Gong-De; Lin, Song
2017-04-01
A new efficient quantum key agreement protocol without entanglement is proposed. In this protocol, each user encodes his secret key into the traveling particles by performing one of four rotation operations that one cannot perfectly distinguish. In the end, all users can simultaneously obtain the final shared key. The security of the presented protocol against some common attacks is discussed. It is shown that this protocol can effectively protect the privacy of each user and satisfy the requirement of fairness in theory. Moreover, the quantum carriers and the encoding operations used in the protocol can be achieved in realistic physical devices. Therefore, the presented protocol is feasible with current technology.
High-efficiency reconciliation for continuous variable quantum key distribution
NASA Astrophysics Data System (ADS)
Bai, Zengliang; Yang, Shenshen; Li, Yongmin
2017-04-01
Quantum key distribution (QKD) is the most mature application of quantum information technology. Information reconciliation is a crucial step in QKD and significantly affects the final secret key rates shared between two legitimate parties. We analyze and compare various construction methods of low-density parity-check (LDPC) codes and design high-performance irregular LDPC codes with a block length of 106. Starting from these good codes and exploiting the slice reconciliation technique based on multilevel coding and multistage decoding, we realize high-efficiency Gaussian key reconciliation with efficiency higher than 95% for signal-to-noise ratios above 1. Our demonstrated method can be readily applied in continuous variable QKD.
Code of Federal Regulations, 2010 CFR
2010-07-01
... 40 Protection of Environment 23 2010-07-01 2010-07-01 false Bacillus thuringiensis Cry3Bb1 protein... Cry3Bb1 protein in corn; exemption from the requirement of a tolerance. Residues of Bacillus thuringiensis Cry3Bb1 protein in corn are exempt from the requirement of a tolerance when used as plant-incorporated...
Code of Federal Regulations, 2011 CFR
2011-07-01
... 40 Protection of Environment 24 2011-07-01 2011-07-01 false Bacillus thuringiensis Cry3Bb1 protein... Cry3Bb1 protein in corn; exemption from the requirement of a tolerance. Residues of Bacillus thuringiensis Cry3Bb1 protein in corn are exempt from the requirement of a tolerance when used as plant-incorporated...
Aviation System Safety Risk Management Tool Analysis. Volume 2: Appendices
1993-10-01
Part Number FY AMC Case Number BATERY BB433AA 81 E 810421201 E’ BATTERY BB433AA 81 E 810421181 [’ BATTERY BB433AA 81 E 810514141 [’ BATIERY BB433AA 81...830520061 [- BAT=ERY NOT REC 83 E 830514071 -l BATTERY NOT REC 82 E 811102131 El BATERY NOT REC 82 E 820715191 " BATTERY NOT REC 82 E 820902051 "- BATERY NOT
Code of Federal Regulations, 2014 CFR
2014-07-01
... 40 Protection of Environment 24 2014-07-01 2014-07-01 false Bacillus thuringiensis Cry3Bb1 protein... Cry3Bb1 protein in corn; exemption from the requirement of a tolerance. Residues of Bacillus thuringiensis Cry3Bb1 protein in corn are exempt from the requirement of a tolerance when used as plant-incorporated...
Code of Federal Regulations, 2013 CFR
2013-07-01
... 40 Protection of Environment 25 2013-07-01 2013-07-01 false Bacillus thuringiensis Cry3Bb1 protein... Cry3Bb1 protein in corn; exemption from the requirement of a tolerance. Residues of Bacillus thuringiensis Cry3Bb1 protein in corn are exempt from the requirement of a tolerance when used as plant-incorporated...
Code of Federal Regulations, 2012 CFR
2012-07-01
... 40 Protection of Environment 25 2012-07-01 2012-07-01 false Bacillus thuringiensis Cry3Bb1 protein... Cry3Bb1 protein in corn; exemption from the requirement of a tolerance. Residues of Bacillus thuringiensis Cry3Bb1 protein in corn are exempt from the requirement of a tolerance when used as plant-incorporated...
Kao, Tzu-Cheg; Deuster, Patricia A; Burnett, Daniel; Stephens, Mark
2012-05-01
To identify health-related behaviors associated with potentially harmful dietary supplements (DS) - body building (BB), weight loss (WL) and performance enhancing (PE), explore common reasons and sources of information for DS use. Based on the 2005 Survey of 16,146 U.S. military personnel, BB users were dichotomized as yes (regular use - taking any supplement of BB at least once a week in past 12 months) or no; similarly defined for WL and PE. Weighted logistic regression models are used. BB, WL and PE were used by 19.4%, 17.0%, and 8.0% of participants, respectively. Significantly more users were overweight or obese: BMI ≥25 (vs. BMI<25); heavy drinkers (vs. abstainers); and users of taking steroids in their lifetime (vs. not). Most common reasons of BB, WL, and PE users wanted to increase muscle mass, lose weight, and improve physical performance (BB: 45.8%, WL: 54.8%, PE: 38.5%). Fewer than 30% discussed dietary supplements use with their healthcare providers. The leading source of dietary supplements information (BB: 27.8%, WL: 23.6%, PE: 30.0%) was magazines. The dietary supplements: BB, WL and PE were used by significant proportions of service members, and associated with risk-taking behaviors that may affect overall military readiness and public health. Published by Elsevier Inc.
Search for Stellar Streams Based on Data from the RAVE5 and Gaia TGAS Catalogues
NASA Astrophysics Data System (ADS)
Bajkova, A. T.; Bobylev, V. V.
2018-03-01
We have analyzed the space velocities of stars with the proper motions and trigonometric parallaxes from the Gaia TGAS catalogue in combination with the line-of-sight velocities from the RAVE5 catalogue. In the V, √ {{U^2} + 2{V^2}} velocity plane we have identified three clumps, BB17-1, BB17-2, and BB17-3, in the region of large velocities ( V<-150 km s-1). The stars of the BB17-1 and BB17-2 clumps are associated with the kinematic groups VelHel-6 and VelHel-7 detected previously by Helmi et al. We give the greatest attention to the BB17-3 clump. The latter is shown to be most closely linked with the debris of the globular cluster ω Cen. In the BB17-3 clump we have identified 28 stars with a low velocity dispersion with respect to the center of their distribution. All these stars have very close individual age estimates: log t ≈ 10. The distribution of metallicity indices in this sample is typical for the stars of the globular cluster ω Cen. In our opinion, the BB17-3 clump can be described as a homogeneous stream in the debris of the cluster ω Cen.
NASA Astrophysics Data System (ADS)
Hu, L.; Montzka, S. A.; Godwin, D.; Andrews, A. E.; Thoning, K. W.; Miller, B. R.; Sweeney, C.; Miller, J. B.; Lehman, S.; Siso, C.; Mondeel, D. J.; Hall, B. D.; Nance, J. D.; Tans, P. P.; Elkins, J. W.
2016-12-01
Biomass burning (BB) plumes can significantly impact stratocumulus clouds (Sc), the dominant cloud type by global area, by altering their microphysical properties. The California (CA) coast is home to one of the three major semi-permanent stratocumulus (Sc) cloud decks in the world and BB emissions are of growing concern in the western United States, owing to both a warmer climate and fire-control strategies over recent decades. The thickness and vertical position of BB plumes, especially relative to clouds, is critical to understand how the aerosol will affect the thermodynamic structure of the atmosphere, cloud properties, and radiative forcing. This study reports on the characterization of the vertical, spatial, and temporal nature of BB aerosol over coastal CA, based on airborne data collected in the months of July and August for 2013 and 2016. Results from over 100 soundings indicate that multiple BB plume layers exist above clouds, with the thickness of BB plumes and their vertical position relative to cloud top varying significantly as a function of distance from coastline. Comparison of soundings at a given location at two different times of day reveals significant variation in BB characteristics. Intercomparisons for BB plume characteristics are explored between the field data, NAAPS, and CALIPSO.
NASA Astrophysics Data System (ADS)
Hossein Mardi, A.; MacDonald, A. B.; Dadashazar, H.; Crosbie, E.; WANG, Z.; Lynch, P.; Campbell, J. R.; Jonsson, H.; Sorooshian, A.
2017-12-01
Biomass burning (BB) plumes can significantly impact stratocumulus clouds (Sc), the dominant cloud type by global area, by altering their microphysical properties. The California (CA) coast is home to one of the three major semi-permanent stratocumulus (Sc) cloud decks in the world and BB emissions are of growing concern in the western United States, owing to both a warmer climate and fire-control strategies over recent decades. The thickness and vertical position of BB plumes, especially relative to clouds, is critical to understand how the aerosol will affect the thermodynamic structure of the atmosphere, cloud properties, and radiative forcing. This study reports on the characterization of the vertical, spatial, and temporal nature of BB aerosol over coastal CA, based on airborne data collected in the months of July and August for 2013 and 2016. Results from over 100 soundings indicate that multiple BB plume layers exist above clouds, with the thickness of BB plumes and their vertical position relative to cloud top varying significantly as a function of distance from coastline. Comparison of soundings at a given location at two different times of day reveals significant variation in BB characteristics. Intercomparisons for BB plume characteristics are explored between the field data, NAAPS, and CALIPSO.
Statistical molecular design of building blocks for combinatorial chemistry.
Linusson, A; Gottfries, J; Lindgren, F; Wold, S
2000-04-06
The reduction of the size of a combinatorial library can be made in two ways, either base the selection on the building blocks (BB's) or base it on the full set of virtually constructed products. In this paper we have investigated the effects of applying statistical designs to BB sets compared to selections based on the final products. The two sets of BB's and the virtually constructed library were described by structural parameters, and the correlation between the two characterizations was investigated. Three different selection approaches were used both for the BB sets and for the products. In the first two the selection algorithms were applied directly to the data sets (D-optimal design and space-filling design), while for the third a cluster analysis preceded the selection (cluster-based design). The selections were compared using visual inspection, the Tanimoto coefficient, the Euclidean distance, the condition number, and the determinant of the resulting data matrix. No difference in efficiency was found between selections made in the BB space and in the product space. However, it is of critical importance to investigate the BB space carefully and to select an appropriate number of BB's to result in an adequate diversity. An example from the pharmaceutical industry is then presented, where selection via BB's was made using a cluster-based design.
Quantum computing on encrypted data
NASA Astrophysics Data System (ADS)
Fisher, K. A. G.; Broadbent, A.; Shalm, L. K.; Yan, Z.; Lavoie, J.; Prevedel, R.; Jennewein, T.; Resch, K. J.
2014-01-01
The ability to perform computations on encrypted data is a powerful tool for protecting privacy. Recently, protocols to achieve this on classical computing systems have been found. Here, we present an efficient solution to the quantum analogue of this problem that enables arbitrary quantum computations to be carried out on encrypted quantum data. We prove that an untrusted server can implement a universal set of quantum gates on encrypted quantum bits (qubits) without learning any information about the inputs, while the client, knowing the decryption key, can easily decrypt the results of the computation. We experimentally demonstrate, using single photons and linear optics, the encryption and decryption scheme on a set of gates sufficient for arbitrary quantum computations. As our protocol requires few extra resources compared with other schemes it can be easily incorporated into the design of future quantum servers. These results will play a key role in enabling the development of secure distributed quantum systems.
Quantum computing on encrypted data.
Fisher, K A G; Broadbent, A; Shalm, L K; Yan, Z; Lavoie, J; Prevedel, R; Jennewein, T; Resch, K J
2014-01-01
The ability to perform computations on encrypted data is a powerful tool for protecting privacy. Recently, protocols to achieve this on classical computing systems have been found. Here, we present an efficient solution to the quantum analogue of this problem that enables arbitrary quantum computations to be carried out on encrypted quantum data. We prove that an untrusted server can implement a universal set of quantum gates on encrypted quantum bits (qubits) without learning any information about the inputs, while the client, knowing the decryption key, can easily decrypt the results of the computation. We experimentally demonstrate, using single photons and linear optics, the encryption and decryption scheme on a set of gates sufficient for arbitrary quantum computations. As our protocol requires few extra resources compared with other schemes it can be easily incorporated into the design of future quantum servers. These results will play a key role in enabling the development of secure distributed quantum systems.
Fundamental limits of repeaterless quantum communications
Pirandola, Stefano; Laurenza, Riccardo; Ottaviani, Carlo; Banchi, Leonardo
2017-01-01
Quantum communications promises reliable transmission of quantum information, efficient distribution of entanglement and generation of completely secure keys. For all these tasks, we need to determine the optimal point-to-point rates that are achievable by two remote parties at the ends of a quantum channel, without restrictions on their local operations and classical communication, which can be unlimited and two-way. These two-way assisted capacities represent the ultimate rates that are reachable without quantum repeaters. Here, by constructing an upper bound based on the relative entropy of entanglement and devising a dimension-independent technique dubbed ‘teleportation stretching', we establish these capacities for many fundamental channels, namely bosonic lossy channels, quantum-limited amplifiers, dephasing and erasure channels in arbitrary dimension. In particular, we exactly determine the fundamental rate-loss tradeoff affecting any protocol of quantum key distribution. Our findings set the limits of point-to-point quantum communications and provide precise and general benchmarks for quantum repeaters. PMID:28443624
Fundamental limits of repeaterless quantum communications.
Pirandola, Stefano; Laurenza, Riccardo; Ottaviani, Carlo; Banchi, Leonardo
2017-04-26
Quantum communications promises reliable transmission of quantum information, efficient distribution of entanglement and generation of completely secure keys. For all these tasks, we need to determine the optimal point-to-point rates that are achievable by two remote parties at the ends of a quantum channel, without restrictions on their local operations and classical communication, which can be unlimited and two-way. These two-way assisted capacities represent the ultimate rates that are reachable without quantum repeaters. Here, by constructing an upper bound based on the relative entropy of entanglement and devising a dimension-independent technique dubbed 'teleportation stretching', we establish these capacities for many fundamental channels, namely bosonic lossy channels, quantum-limited amplifiers, dephasing and erasure channels in arbitrary dimension. In particular, we exactly determine the fundamental rate-loss tradeoff affecting any protocol of quantum key distribution. Our findings set the limits of point-to-point quantum communications and provide precise and general benchmarks for quantum repeaters.
Quantum displacement receiver for M-ary phase-shift-keyed coherent states
DOE Office of Scientific and Technical Information (OSTI.GOV)
Izumi, Shuro; Takeoka, Masahiro; Fujiwara, Mikio
2014-12-04
We propose quantum receivers for 3- and 4-ary phase-shift-keyed (PSK) coherent state signals to overcome the standard quantum limit (SQL). Our receiver, consisting of a displacement operation and on-off detectors with or without feedforward, provides an error probability performance beyond the SQL. We show feedforward operations can tolerate the requirement for the detector specifications.
Monogamy relations of quantum entanglement for partially coherently superposed states
NASA Astrophysics Data System (ADS)
Shi, Xian
2017-12-01
Not Available Project partially supported by the National Key Research and Development Program of China (Grant No. 2016YFB1000902), the National Natural Science Foundation of China (Grant Nos. 61232015, 61472412, and 61621003), the Beijing Science and Technology Project (2016), Tsinghua-Tencent-AMSS-Joint Project (2016), and the Key Laboratory of Mathematics Mechanization Project: Quantum Computing and Quantum Information Processing.
Aggregating quantum repeaters for the quantum internet
NASA Astrophysics Data System (ADS)
Azuma, Koji; Kato, Go
2017-09-01
The quantum internet holds promise for accomplishing quantum teleportation and unconditionally secure communication freely between arbitrary clients all over the globe, as well as the simulation of quantum many-body systems. For such a quantum internet protocol, a general fundamental upper bound on the obtainable entanglement or secret key has been derived [K. Azuma, A. Mizutani, and H.-K. Lo, Nat. Commun. 7, 13523 (2016), 10.1038/ncomms13523]. Here we consider its converse problem. In particular, we present a universal protocol constructible from any given quantum network, which is based on running quantum repeater schemes in parallel over the network. For arbitrary lossy optical channel networks, our protocol has no scaling gap with the upper bound, even based on existing quantum repeater schemes. In an asymptotic limit, our protocol works as an optimal entanglement or secret-key distribution over any quantum network composed of practical channels such as erasure channels, dephasing channels, bosonic quantum amplifier channels, and lossy optical channels.
Toki, S; Agatsuma, T; Ochiai, K; Saitoh, Y; Ando, K; Nakanishi, S; Lokker, N A; Giese, N A; Matsuda, Y
2001-05-01
RP-1776, a novel cyclic peptide, was isolated from the culture broth of Streptomyces sp. KY11784. RP-1776 selectively inhibited the binding of PDGF BB to the extracellular domain of the PDGF beta-receptor with an IC50 value of 11 +/- 6 microM. Detailed binding experiments suggested that RP-1776 directly interacts with PDGF BB. RP-1776 inhibited the phosphorylation of the PDGF beta-receptor induced by PDGF BB. These results suggested that RP-1776 antagonizes the signaling of PDGF BB probably through the inhibition of PDGF BB binding to the PDGF beta-receptor.
Linear optical quantum computing in a single spatial mode.
Humphreys, Peter C; Metcalf, Benjamin J; Spring, Justin B; Moore, Merritt; Jin, Xian-Min; Barbieri, Marco; Kolthammer, W Steven; Walmsley, Ian A
2013-10-11
We present a scheme for linear optical quantum computing using time-bin-encoded qubits in a single spatial mode. We show methods for single-qubit operations and heralded controlled-phase (cphase) gates, providing a sufficient set of operations for universal quantum computing with the Knill-Laflamme-Milburn [Nature (London) 409, 46 (2001)] scheme. Our protocol is suited to currently available photonic devices and ideally allows arbitrary numbers of qubits to be encoded in the same spatial mode, demonstrating the potential for time-frequency modes to dramatically increase the quantum information capacity of fixed spatial resources. As a test of our scheme, we demonstrate the first entirely single spatial mode implementation of a two-qubit quantum gate and show its operation with an average fidelity of 0.84±0.07.
Adaptive accelerated ReaxFF reactive dynamics with validation from simulating hydrogen combustion.
Cheng, Tao; Jaramillo-Botero, Andrés; Goddard, William A; Sun, Huai
2014-07-02
We develop here the methodology for dramatically accelerating the ReaxFF reactive force field based reactive molecular dynamics (RMD) simulations through use of the bond boost concept (BB), which we validate here for describing hydrogen combustion. The bond order, undercoordination, and overcoordination concepts of ReaxFF ensure that the BB correctly adapts to the instantaneous configurations in the reactive system to automatically identify the reactions appropriate to receive the bond boost. We refer to this as adaptive Accelerated ReaxFF Reactive Dynamics or aARRDyn. To validate the aARRDyn methodology, we determined the detailed sequence of reactions for hydrogen combustion with and without the BB. We validate that the kinetics and reaction mechanisms (that is the detailed sequences of reactive intermediates and their subsequent transformation to others) for H2 oxidation obtained from aARRDyn agrees well with the brute force reactive molecular dynamics (BF-RMD) at 2498 K. Using aARRDyn, we then extend our simulations to the whole range of combustion temperatures from ignition (798 K) to flame temperature (2998K), and demonstrate that, over this full temperature range, the reaction rates predicted by aARRDyn agree well with the BF-RMD values, extrapolated to lower temperatures. For the aARRDyn simulation at 798 K we find that the time period for half the H2 to form H2O product is ∼538 s, whereas the computational cost was just 1289 ps, a speed increase of ∼0.42 trillion (10(12)) over BF-RMD. In carrying out these RMD simulations we found that the ReaxFF-COH2008 version of the ReaxFF force field was not accurate for such intermediates as H3O. Consequently we reoptimized the fit to a quantum mechanics (QM) level, leading to the ReaxFF-OH2014 force field that was used in the simulations.
Quantum information is physical
NASA Astrophysics Data System (ADS)
DiVincenzo, D. P.; Loss, D.
1998-03-01
We discuss a few current developments in the use of quantum mechanically coherent systems for information processing. In each of these developments, Rolf Landauer has played a crucial role in nudging us, and other workers in the field, into asking the right questions, some of which we have been lucky enough to answer. A general overview of the key ideas of quantum error correction is given. We discuss how quantum entanglement is the key to protecting quantum states from decoherence in a manner which, in a theoretical sense, is as effective as the protection of digital data from bit noise. We also discuss five general criteria which must be satisfied to implement a quantum computer in the laboratory, and we illustrate the application of these criteria by discussing our ideas for creating a quantum computer out of the spin states of coupled quantum dots.
Simple 2.5 GHz time-bin quantum key distribution
NASA Astrophysics Data System (ADS)
Boaron, Alberto; Korzh, Boris; Houlmann, Raphael; Boso, Gianluca; Rusca, Davide; Gray, Stuart; Li, Ming-Jun; Nolan, Daniel; Martin, Anthony; Zbinden, Hugo
2018-04-01
We present a 2.5 GHz quantum key distribution setup with the emphasis on a simple experimental realization. It features a three-state time-bin protocol based on a pulsed diode laser and a single intensity modulator. Implementing an efficient one-decoy scheme and finite-key analysis, we achieve record breaking secret key rates of 1.5 kbps over 200 km of standard optical fibers.
Reply to 'Comment on 'Quantum dense key distribution''
DOE Office of Scientific and Technical Information (OSTI.GOV)
Degiovanni, I.P.; Berchera, I. Ruo; Castelletto, S.
2005-01-01
In this Reply we propose a modified security proof of the quantum dense key distribution protocol, detecting also the eavesdropping attack proposed by Wojcik in his Comment [Wojcik, Phys. Rev. A 71, 016301 (2005)].
2007-07-01
End-to-End Security with Photonic Switching...............................28 8.4 Year 3 – Adding a Link that implements Entanglement -Based QKD... entangled photon pairs at 1550nm. • Built a highspeed (~10 MHz) physical random number generator, and integrated it into Bob. This design provides an...each kind of photonic setup in the Quantum Network, i.e., over time it will grow to include descriptions of the weak-coherent link, the entangled
NASA Astrophysics Data System (ADS)
Jiang, Cong; Yu, Zong-Wen; Wang, Xiang-Bin
2018-04-01
We present an analysis for measurement-device-independent quantum key distribution with correlated source-light-intensity errors. Numerical results show that the results here can greatly improve the key rate especially with large intensity fluctuations and channel attenuation compared with prior results if the intensity fluctuations of different sources are correlated.
Leverrier, Anthony; Grangier, Philippe
2009-05-08
We present a continuous-variable quantum key distribution protocol combining a discrete modulation and reverse reconciliation. This protocol is proven unconditionally secure and allows the distribution of secret keys over long distances, thanks to a reverse reconciliation scheme efficient at very low signal-to-noise ratio.
Security of a semi-quantum protocol where reflections contribute to the secret key
NASA Astrophysics Data System (ADS)
Krawec, Walter O.
2016-05-01
In this paper, we provide a proof of unconditional security for a semi-quantum key distribution protocol introduced in a previous work. This particular protocol demonstrated the possibility of using X basis states to contribute to the raw key of the two users (as opposed to using only direct measurement results) even though a semi-quantum participant cannot directly manipulate such states. In this work, we provide a complete proof of security by deriving a lower bound of the protocol's key rate in the asymptotic scenario. Using this bound, we are able to find an error threshold value such that for all error rates less than this threshold, it is guaranteed that A and B may distill a secure secret key; for error rates larger than this threshold, A and B should abort. We demonstrate that this error threshold compares favorably to several fully quantum protocols. We also comment on some interesting observations about the behavior of this protocol under certain noise scenarios.
Chen, RuiKe; Bao, WanSu; Zhou, Chun; Li, Hongwei; Wang, Yang; Bao, HaiZe
2016-03-21
In recent years, a large quantity of work have been done to narrow the gap between theory and practice in quantum key distribution (QKD). However, most of them are focus on two-party protocols. Very recently, Yao Fu et al proposed a measurement-device-independent quantum cryptographic conferencing (MDI-QCC) protocol and proved its security in the limit of infinitely long keys. As a step towards practical application for MDI-QCC, we design a biased decoy-state measurement-device-independent quantum cryptographic conferencing protocol and analyze the performance of the protocol in both the finite-key and infinite-key regime. From numerical simulations, we show that our decoy-state analysis is tighter than Yao Fu et al. That is, we can achieve the nonzero asymptotic secret key rate in long distance with approximate to 200km and we also demonstrate that with a finite size of data (say 1011 to 1013 signals) it is possible to perform secure MDI-QCC over reasonable distances.
NASA Astrophysics Data System (ADS)
Guo, Ying; Xie, Cailang; Liao, Qin; Zhao, Wei; Zeng, Guihua; Huang, Duan
2017-08-01
The survival of Gaussian quantum states in a turbulent atmospheric channel is of crucial importance in free-space continuous-variable (CV) quantum key distribution (QKD), in which the transmission coefficient will fluctuate in time, thus resulting in non-Gaussian quantum states. Different from quantum hacking of the imperfections of practical devices, here we propose a different type of attack by exploiting the security loopholes that occur in a real lossy channel. Under a turbulent atmospheric environment, the Gaussian states are inevitably afflicted by decoherence, which would cause a degradation of the transmitted entanglement. Therefore, an eavesdropper can perform an intercept-resend attack by applying an entanglement-distillation operation on the transmitted non-Gaussian mixed states, which allows the eavesdropper to bias the estimation of the parameters and renders the final keys shared between the legitimate parties insecure. Our proposal highlights the practical CV QKD vulnerabilities with free-space quantum channels, including the satellite-to-earth links, ground-to-ground links, and a link from moving objects to ground stations.
Analysis of counterfactual quantum key distribution using error-correcting theory
NASA Astrophysics Data System (ADS)
Li, Yan-Bing
2014-10-01
Counterfactual quantum key distribution is an interesting direction in quantum cryptography and has been realized by some researchers. However, it has been pointed that its insecure in information theory when it is used over a high lossy channel. In this paper, we retry its security from a error-correcting theory point of view. The analysis indicates that the security flaw comes from the reason that the error rate in the users' raw key pair is as high as that under the Eve's attack when the loss rate exceeds 50 %.
Security of coherent-state quantum cryptography in the presence of Gaussian noise
DOE Office of Scientific and Technical Information (OSTI.GOV)
Heid, Matthias; Luetkenhaus, Norbert
2007-08-15
We investigate the security against collective attacks of a continuous variable quantum key distribution scheme in the asymptotic key limit for a realistic setting. The quantum channel connecting the two honest parties is assumed to be lossy and imposes Gaussian noise on the observed quadrature distributions. Secret key rates are given for direct and reverse reconciliation schemes including post-selection in the collective attack scenario. The effect of a nonideal error correction and two-way communication in the classical post-processing step is also taken into account.
Code of Federal Regulations, 2010 CFR
2010-07-01
... additional requirements. 63.7(f) Alternative Test Method Yes. 63.7(g) Data Analysis Yes. 63.7(h) Waiver of....8(g)(1) Data Reduction Yes. 63.8(g)(2) No Subpart BB does not require COMS or CEMS. 63.8(g)(3... Data Reports No Subpart BB does not require COMS. 63.10(f) Recordkeeping/Reporting Waiver Yes. 63.11(a...
Numerical approach for unstructured quantum key distribution
Coles, Patrick J.; Metodiev, Eric M.; Lütkenhaus, Norbert
2016-01-01
Quantum key distribution (QKD) allows for communication with security guaranteed by quantum theory. The main theoretical problem in QKD is to calculate the secret key rate for a given protocol. Analytical formulas are known for protocols with symmetries, since symmetry simplifies the analysis. However, experimental imperfections break symmetries, hence the effect of imperfections on key rates is difficult to estimate. Furthermore, it is an interesting question whether (intentionally) asymmetric protocols could outperform symmetric ones. Here we develop a robust numerical approach for calculating the key rate for arbitrary discrete-variable QKD protocols. Ultimately this will allow researchers to study ‘unstructured' protocols, that is, those that lack symmetry. Our approach relies on transforming the key rate calculation to the dual optimization problem, which markedly reduces the number of parameters and hence the calculation time. We illustrate our method by investigating some unstructured protocols for which the key rate was previously unknown. PMID:27198739
Yu, Geun-Hye; Cho, Sung-Yong; Bae, Min-Suk; Park, Seung-Shik
2014-07-01
4 h integrated PM2.5 samples were collected from an urban site of Gwangju, Korea, for five days and analyzed for organic carbon and elemental carbon (OC and EC), total water-soluble OC (WSOC), hydrophilic and hydrophobic WSOC fractions (WSOCHPI and WSOCHPO), oxalate, and inorganic ionic species (sodium (Na(+)), ammonium (NH4(+)), potassium (K(+)), calcium (Ca(2+)), magnesium (Mg(2+)), chloride (Cl(-)), nitrate (NO3(-)), and sulfate (SO4(2-))) to investigate the possible sources of water-soluble organic aerosols. Two types of sampling periods were classified according to the regression relationship between black carbon (BC) concentrations measured at wavelengths of 370 nm (BC370nm) and 880 nm (BC880nm) using an aethalometer; the first period was traffic emission influence ("non-biomass burning (BB) period") and the second was biomass burning influence ("BB period"). The slope of the regression equation (BC370nm/BC880nm) was 0.95 for the non-BB period and 1.29 for the BB period. However, no noticeable difference in the WSOC/OC ratio, which can be used to infer the extent of secondary organic aerosol (SOA) formation, was found between the non-BB (0.61, range = 0.43-0.75) and BB (0.61, range = 0.52-0.68) periods, due to significant contribution of primary BB emissions to the WSOC. The concentrations of OC, WSOC and K(+), which were used as the BB emission markers, were 15.7 μg C m(-3) (11.5-24.3), 9.4 μg C m(-3) (7.0-12.7), and 1.2 μg m(-3) (0.6-2.7), respectively, during the BB period, and these results were approximately 1.7, 1.7, and 3.9 times higher than those during the non-BB period. During the non-BB period, good correlations among WSOC, SO4(2-) and oxalate, and poor correlations among WSOC, EC, and K(+) suggest that SOA is probably an important source of WSOC (and WSOCHPI) concentration. For the WSOC fractions, better correlations among WSOCHPI, oxalate (R(2) = 0.52), and SO4(2-) (R(2) = 0.57) were found than among WSOCHPO, oxalate (R(2) = 0.23), and SO4(2-) (R(2) = 0.20), suggesting that a significant proportion of the WSOCHPI fraction of OC could be produced through processes (gas-phase and heterogeneous oxidations) such as SOA formation. However, during the BB period, the BB emission source accounted for the high correlations between total WSOC (and WSOC fractions) and other relevant atmospheric parameters (EC, Na(+), Cl(-), K(+), and oxalate), with higher correlations in WSOCHPI than in WSOCHPO. These results suggest a significant contribution of BB emissions to WSOC.
D'Antona, Giuseppe; Lanfranconi, Francesca; Pellegrino, Maria Antonietta; Brocca, Lorenza; Adami, Raffaella; Rossi, Rosetta; Moro, Giorgio; Miotti, Danilo; Canepari, Monica; Bottinelli, Roberto
2006-01-01
Needle biopsy samples were taken from vastus lateralis muscle (VL) of five male body builders (BB, age 27.4 ± 0.93 years; mean ±s.e.m.), who had being performing hypertrophic heavy resistance exercise (HHRE) for at least 2 years, and from five male active, but untrained control subjects (CTRL, age 29.9 ± 2.01 years). The following determinations were performed: anatomical cross-sectional area and volume of the quadriceps and VL muscles in vivo by magnetic resonance imaging (MRI); myosin heavy chain isoform (MHC) distribution of the whole biopsy samples by SDS-PAGE; cross-sectional area (CSA), force (Po), specific force (Po/CSA) and maximum shortening velocity (Vo) of a large population (n= 524) of single skinned muscle fibres classified on the basis of MHC isoform composition by SDS-PAGE; actin sliding velocity (Vf) on pure myosin isoforms by in vitro motility assays. In BB a preferential hypertrophy of fast and especially type 2X fibres was observed. The very large hypertrophy of VL in vivo could not be fully accounted for by single muscle fibre hypertrophy. CSA of VL in vivo was, in fact, 54% larger in BB than in CTRL, whereas mean fibre area was only 14% larger in BB than in CTRL. MHC isoform distribution was shifted towards 2X fibres in BB. Po/CSA was significantly lower in type 1 fibres from BB than in type 1 fibres from CTRL whereas both type 2A and type 2X fibres were significantly stronger in BB than in CTRL. Vo of type 1 fibres and Vf of myosin 1 were significantly lower in BB than in CTRL, whereas no difference was observed among fast fibres and myosin 2A. The findings indicate that skeletal muscle of BB was markedly adapted to HHRE through extreme hypertrophy, a shift towards the stronger and more powerful fibre types and an increase in specific force of muscle fibres. Such adaptations could not be fully accounted for by well known mechanisms of muscle plasticity, i.e. by the hypertrophy of single muscle fibre (quantitative mechanism) and by a regulation of contractile properties of muscle fibres based on MHC isoform content (qualitative mechanism). Two BB subjects took anabolic steroids and three BB subjects did not. The former BB differed from the latter BB mostly for the size of their muscles and muscle fibres. PMID:16339176
Padel, Thomas; Özen, Ilknur; Boix, Jordi; Barbariga, Marco; Gaceb, Abderahim; Roth, Michaela; Paul, Gesine
2016-10-01
Parkinson's disease (PD) is a neurodegenerative disease where the degeneration of the nigrostriatal pathway leads to specific motor deficits. There is an unmet medical need for regenerative treatments that stop or reverse disease progression. Several growth factors have been investigated in clinical trials to restore the dopaminergic nigrostriatal pathway damaged in PD. Platelet-derived growth factor-BB (PDGF-BB), a molecule that recruits pericytes to stabilize microvessels, was recently investigated in a phase-1 clinical trial, showing a dose-dependent increase in dopamine transporter binding in the putamen of PD patients. Interestingly, evidence is accumulating that PD is paralleled by microvascular changes, however, whether PDGF-BB modifies pericytes in PD is not known. Using a pericyte reporter mouse strain, we investigate the functional and restorative effect of PDGF-BB in a partial 6-hydroxydopamine medial forebrain bundle lesion mouse model of PD, and whether this restorative effect is accompanied by changes in pericyte features. We demonstrate that a 2-week treatment with PDGF-BB leads to behavioural recovery using several behavioural tests, and partially restores the nigrostriatal pathway. Interestingly, we find that pericytes are activated in the striatum of PD lesioned mice and that these changes are reversed by PDGF-BB treatment. The modulation of brain pericytes may contribute to the PDGF-BB-induced neurorestorative effects, PDGF-BB allowing for vascular stabilization in PD. Pericytes might be a new cell target of interest for future regenerative therapies. Copyright © 2016 The Authors. Published by Elsevier Inc. All rights reserved.
Malin, David H; Lee, David R; Goyarzu, Pilar; Chang, Yu-Hsuan; Ennis, Lalanya J; Beckett, Elizabeth; Shukitt-Hale, Barbara; Joseph, James A
2011-03-01
Previously, 4 mo of a blueberry-enriched (BB) antioxidant diet prevented impaired object recognition memory in aging rats. Experiment 1 determined whether 1- and 2-mo BB diets would have a similar effect and whether the benefits would disappear promptly after terminating the diets. Experiment 2 determined whether a 1-mo BB diet could subsequently reverse existing object memory impairment in aging rats. In experiment 1, Fischer-344 rats were maintained on an appropriate control diet or on 1 or 2 mo of the BB diet before testing object memory at 19 mo postnatally. In experiment 2, rats were tested for object recognition memory at 19 mo and again at 20 mo after 1 mo of maintenance on a 2% BB or control diet. In experiment 1, the control group performed no better than chance, whereas the 1- and 2-mo BB diet groups performed similarly and significantly better than controls. The 2-mo BB-diet group, but not the 1-mo group, maintained its performance over a subsequent month on a standard laboratory diet. In experiment 2, the 19-mo-old rats performed near chance. At 20 mo of age, the rats subsequently maintained on the BB diet significantly increased their object memory scores, whereas the control diet group exhibited a non-significant decline. The change in object memory scores differed significantly between the two diet groups. These results suggest that a considerable degree of age-related object memory decline can be prevented and reversed by brief maintenance on BB diets. Copyright © 2011 Elsevier Inc. All rights reserved.
Vinay, Dass S; Lee, Seung J; Kim, Chang H; Oh, Ho Sik; Kwon, Byoung S
2012-01-01
4-1BB (CD137) is an important T cell activating molecule. Here we report that it also promotes development of a distinct B cell subpopulation co-expressing PDCA-1. 4-1BB is expressed constitutively, and its expression is increased when PDCA-1(+) B cells are activated. We found that despite a high level of surface expression of 4-1BB on PDCA-1(+) B cells, treatment of these cells with agonistic anti-4-1BB mAb stimulated the expression of only a few activation markers (B7-2, MHC II, PD-L2), cytokines (IL-12p40/p70), and chemokines (MCP-1, RANTES), as well as sTNFR1, and the immunosuppressive enzyme, IDO. Although the PDCA-1(+) B cells stimulated by anti-4-1BB expressed MHC II at high levels and took up antigens efficiently, Ig class switching was inhibited when they were pulsed with T-independent (TI) or T-dependent (TD) Ags and adoptively transferred into syngeneic recipients. Furthermore, when anti-4-1BB-treated PDCA-1(+) B cells were pulsed with OVA peptide and combined with Vα2(+)CD4(+) T cells, Ag-specific cell division was inhibited both in vitro and in vivo. Our findings suggest that the 4-1BB signal transforms PDCA-1(+) B cells into propagators of negative immune regulation, and establish an important role for 4-1BB in PDCA-1(+) B cell development and function.
Adaptive real time selection for quantum key distribution in lossy and turbulent free-space channels
NASA Astrophysics Data System (ADS)
Vallone, Giuseppe; Marangon, Davide G.; Canale, Matteo; Savorgnan, Ilaria; Bacco, Davide; Barbieri, Mauro; Calimani, Simon; Barbieri, Cesare; Laurenti, Nicola; Villoresi, Paolo
2015-04-01
The unconditional security in the creation of cryptographic keys obtained by quantum key distribution (QKD) protocols will induce a quantum leap in free-space communication privacy in the same way that we are beginning to realize secure optical fiber connections. However, free-space channels, in particular those with long links and the presence of atmospheric turbulence, are affected by losses, fluctuating transmissivity, and background light that impair the conditions for secure QKD. Here we introduce a method to contrast the atmospheric turbulence in QKD experiments. Our adaptive real time selection (ARTS) technique at the receiver is based on the selection of the intervals with higher channel transmissivity. We demonstrate, using data from the Canary Island 143-km free-space link, that conditions with unacceptable average quantum bit error rate which would prevent the generation of a secure key can be used once parsed according to the instantaneous scintillation using the ARTS technique.
Faked state attacks on realistic round robin DPS quantum key distribution systems and countermeasure
NASA Astrophysics Data System (ADS)
Iwakoshi, T.
2015-05-01
In May 2014, a new quantum key distribution protocol named "Round Robin Differential-Phase-Shift Quantum Key Distribution (RR DPS QKD)" was proposed. It has a special feature that the key consumption via privacy amplification is a small constant because RR DPS QKD guarantees its security by information causality, not by information-disturbance trade-off. Therefore, the authors claimed that RR DPS QKD systems does not need to monitor the disturbance by an attacker in the quantum channel. However, this study shows that a modified Faked-State Attack (or so-called bright illumination attack) can hack a RR DPS QKD system almost perfectly if it is implemented with realistic detectors even information-causality guarantees the security of RR DPS QKD protocol. Therefore, this study also proposes a possible Measurement-Device-Independent RR DPS QKD system to avoid the modified Faked-State Attack.
Practical private database queries based on a quantum-key-distribution protocol
DOE Office of Scientific and Technical Information (OSTI.GOV)
Jakobi, Markus; Humboldt-Universitaet zu Berlin, D-10117 Berlin; Simon, Christoph
2011-02-15
Private queries allow a user, Alice, to learn an element of a database held by a provider, Bob, without revealing which element she is interested in, while limiting her information about the other elements. We propose to implement private queries based on a quantum-key-distribution protocol, with changes only in the classical postprocessing of the key. This approach makes our scheme both easy to implement and loss tolerant. While unconditionally secure private queries are known to be impossible, we argue that an interesting degree of security can be achieved by relying on fundamental physical principles instead of unverifiable security assumptions inmore » order to protect both the user and the database. We think that the scope exists for such practical private queries to become another remarkable application of quantum information in the footsteps of quantum key distribution.« less
NASA Astrophysics Data System (ADS)
Jiang, Xue-Qin; Huang, Peng; Huang, Duan; Lin, Dakai; Zeng, Guihua
2017-02-01
Achieving information theoretic security with practical complexity is of great interest to continuous-variable quantum key distribution in the postprocessing procedure. In this paper, we propose a reconciliation scheme based on the punctured low-density parity-check (LDPC) codes. Compared to the well-known multidimensional reconciliation scheme, the present scheme has lower time complexity. Especially when the chosen punctured LDPC code achieves the Shannon capacity, the proposed reconciliation scheme can remove the information that has been leaked to an eavesdropper in the quantum transmission phase. Therefore, there is no information leaked to the eavesdropper after the reconciliation stage. This indicates that the privacy amplification algorithm of the postprocessing procedure is no more needed after the reconciliation process. These features lead to a higher secret key rate, optimal performance, and availability for the involved quantum key distribution scheme.
Quantum Cryptography Based on the Deutsch-Jozsa Algorithm
NASA Astrophysics Data System (ADS)
Nagata, Koji; Nakamura, Tadao; Farouk, Ahmed
2017-09-01
Recently, secure quantum key distribution based on Deutsch's algorithm using the Bell state is reported (Nagata and Nakamura, Int. J. Theor. Phys. doi: 10.1007/s10773-017-3352-4, 2017). Our aim is of extending the result to a multipartite system. In this paper, we propose a highly speedy key distribution protocol. We present sequre quantum key distribution based on a special Deutsch-Jozsa algorithm using Greenberger-Horne-Zeilinger states. Bob has promised to use a function f which is of one of two kinds; either the value of f( x) is constant for all values of x, or else the value of f( x) is balanced, that is, equal to 1 for exactly half of the possible x, and 0 for the other half. Here, we introduce an additional condition to the function when it is balanced. Our quantum key distribution overcomes a classical counterpart by a factor O(2 N ).
Yin, H-L; Cao, W-F; Fu, Y; Tang, Y-L; Liu, Y; Chen, T-Y; Chen, Z-B
2014-09-15
Measurement-device-independent quantum key distribution (MDI-QKD) with decoy-state method is believed to be securely applied to defeat various hacking attacks in practical quantum key distribution systems. Recently, the coherent-state superpositions (CSS) have emerged as an alternative to single-photon qubits for quantum information processing and metrology. Here, in this Letter, CSS are exploited as the source in MDI-QKD. We present an analytical method that gives two tight formulas to estimate the lower bound of yield and the upper bound of bit error rate. We exploit the standard statistical analysis and Chernoff bound to perform the parameter estimation. Chernoff bound can provide good bounds in the long-distance MDI-QKD. Our results show that with CSS, both the security transmission distance and secure key rate are significantly improved compared with those of the weak coherent states in the finite-data case.
Quantum Watermarking Scheme Based on INEQR
NASA Astrophysics Data System (ADS)
Zhou, Ri-Gui; Zhou, Yang; Zhu, Changming; Wei, Lai; Zhang, Xiafen; Ian, Hou
2018-04-01
Quantum watermarking technology protects copyright by embedding invisible quantum signal in quantum multimedia data. In this paper, a watermarking scheme based on INEQR was presented. Firstly, the watermark image is extended to achieve the requirement of embedding carrier image. Secondly, the swap and XOR operation is used on the processed pixels. Since there is only one bit per pixel, XOR operation can achieve the effect of simple encryption. Thirdly, both the watermark image extraction and embedding operations are described, where the key image, swap operation and LSB algorithm are used. When the embedding is made, the binary image key is changed. It means that the watermark has been embedded. Of course, if the watermark image is extracted, the key's state need detected. When key's state is |1>, this extraction operation is carried out. Finally, for validation of the proposed scheme, both the Signal-to-noise ratio (PSNR) and the security of the scheme are analyzed.
Quantum key distribution without detector vulnerabilities using optically seeded lasers
NASA Astrophysics Data System (ADS)
Comandar, L. C.; Lucamarini, M.; Fröhlich, B.; Dynes, J. F.; Sharpe, A. W.; Tam, S. W.-B.; Yuan, Z. L.; Penty, R. V.; Shields, A. J.
2016-05-01
Security in quantum cryptography is continuously challenged by inventive attacks targeting the real components of a cryptographic set-up, and duly restored by new countermeasures to foil them. Owing to their high sensitivity and complex design, detectors are the most frequently attacked components. It was recently shown that two-photon interference from independent light sources can be used to remove any vulnerability from detectors. This new form of detection-safe quantum key distribution (QKD), termed measurement-device-independent (MDI), has been experimentally demonstrated but with modest key rates. Here, we introduce a new pulsed laser seeding technique to obtain high-visibility interference from gain-switched lasers and thereby perform MDI-QKD with unprecedented key rates in excess of 1 megabit per second in the finite-size regime. This represents a two to six orders of magnitude improvement over existing implementations and supports the new scheme as a practical resource for secure quantum communications.
Entanglement witnessing and quantum cryptography with nonideal ferromagnetic detectors
NASA Astrophysics Data System (ADS)
Kłobus, Waldemar; Grudka, Andrzej; Baumgartner, Andreas; Tomaszewski, Damian; Schönenberger, Christian; Martinek, Jan
2014-03-01
We investigate theoretically the use of nonideal ferromagnetic contacts as a means to detect quantum entanglement of electron spins in transport experiments. We use a designated entanglement witness and find a minimal spin polarization of η >1/√3 ≈58% required to demonstrate spin entanglement. This is significantly less stringent than the ubiquitous tests of Bell's inequality with η >1/√24 >≈84%. In addition, we discuss the impact of decoherence and noise on entanglement detection and apply the presented framework to a simple quantum cryptography protocol. Our results are directly applicable to a large variety of experiments.
Performance analysis of quantum access network using code division multiple access model
NASA Astrophysics Data System (ADS)
Hu, Linxi; Yang, Can; He, Guangqiang
2017-06-01
Not Available Project supported by the National Natural Science Foundation of China (Grant Nos. 61475099 and 61102053), the Program of State Key Laboratory of Quantum Optics and Quantum Optics Devices (Grant No. KF201405), the Open Fund of IPOC (BUPT) (Grant No. IPOC2015B004), and the Program of State Key Laboratory of Information Security (Grant No. 2016-MS-05).
DOE Office of Scientific and Technical Information (OSTI.GOV)
Castelletto, S.; Degiovanni, I.P.; Rastello, M.L.
2003-02-01
Quantum-cryptography key distribution (QCKD) experiments have been recently reported using polarization-entangled photons. However, in any practical realization, quantum systems suffer from either unwanted or induced interactions with the environment and the quantum measurement system, showing up as quantum and, ultimately, statistical noise. In this paper, we investigate how an ideal polarization entanglement in spontaneous parametric down-conversion (SPDC) suffers quantum noise in its practical implementation as a secure quantum system, yielding errors in the transmitted bit sequence. Since all SPDC-based QCKD schemes rely on the measurement of coincidence to assert the bit transmission between the two parties, we bundle up themore » overall quantum and statistical noise in an exhaustive model to calculate the accidental coincidences. This model predicts the quantum-bit error rate and the sifted key and allows comparisons between different security criteria of the hitherto proposed QCKD protocols, resulting in an objective assessment of performances and advantages of different systems.« less
Immediato, Davide; Figueredo, Luciana Aguiar; Iatta, Roberta; Camarda, Antonio; de Luna, Rafaela Lira Nogueira; Giangaspero, Annunziata; Brandão-Filho, Sinval Pinto; Otranto, Domenico; Cafarchia, Claudia
2016-10-15
Essential oils (EOs) and entomopathogenic fungi such as Beauveria bassiana (Bb) strains have the potential to be used as alternative insecticides and acaricides for controlling ectoparasites as Dermanyssus gallinae. These compounds have some limitations in their use: the acaricidal effect of EOs is rapid, but short-lived, whilst that of Bb is delayed, but long-lived. To evaluate the effect of both compounds combined against D. gallinae, the non-toxic dose of Eucalyptus globulus, Eucalyptus citriodora, Thymus vulgaris and Eugenia caryophyllata essential oils were firstly calculated for "native" strains of Bb. Subsequently, the effects of the combination of selected EOs with Bb against nymph and adult poultry red mites (PRMs) was assessed. EO concentrations ranging from 0.0015 to 8% v/v (i.e., nine double dilutions) were used to evaluate their effect on germination, sporulation and vegetative growth rates of native strains of Bb. A total of 1440 mites (720 nymphs and 720 adults) were divided into three-treated group (TGs) and one control group (CG). In TGs, mites were exposed to Bb in combination with the selected EO (TG1), EO alone (TG2) or Bb (TG3) alone. In the CG, mites were exposed to 0.1% tween 80 plus EO solvent (CG). E. globulus and E. citriodora were toxic for Bb in concentrations higher than 0.2% and 0.003% respectively, whilst E. caryophyllata and T. vulgaris were toxic at all concentrations tested against Bb. Based on the results of the toxicity assays against Bb, E. globulus was chosen to be tested as acaricide resulting non-toxic for Bb at concentration lower than 0.4%. Increased mortality of D. gallinae adults was recorded in TG1 than those in other TGs from 4days post-infection (T+4DPI). A 100% mortality of D. gallinae was recorded in adults at T+9DPI and at T+10DPI in nymphs in TG1 and later than T+11DPI in the other TGs. Used in combination with E. globulus, Bb displayed an earlier acaricidal effect towards both haematophagous D. gallinae stages. The combination of B. bassiana and E. globulus at 0.2% might be used for controlling arthropods of medical and veterinary importance as D. gallinae. Copyright © 2016 Elsevier B.V. All rights reserved.