In principle, quantum key distribution (QKD) offers unconditional security based on the laws of physics. In practice, flaws in the state preparation undermine the security of QKD systems, as standard theoretical approaches to deal with state preparation flaws are not loss-tolerant. An eavesdropper can enhance and exploit such imperfections through quantum channel loss, thus dramatically lowering the key generation rate. Crucially, the security analyses of most existing QKD experiments are rather unrealistic as they typically neglect this effect. Here, we propose a novel and general approach that makes QKD loss-tolerant to state preparation flaws. Importantly, it suggests that the state preparation process in QKD can be significantly less precise than initially thought. Our method can widely apply to other quantum cryptographic protocols.PACS numbers: 03.67.Dd, 03.67.-a Introduction.-Quantum key distribution (QKD) [1] allows two distant parties, Alice and Bob, to distribute a secret key, which is essential to achieve provable secure communications [2]. The field of QKD has progressed very rapidly over the last years, and it now offers practical systems that can operate in realistic environments [3,4].Crucially, QKD provides unconditional security based on the laws of physics, i.e., despite the computational power of the eavesdropper, Eve. Indeed, the security of QKD has been promptly demonstrated for different scenarios [5][6][7][8][9][10][11][12]. Importantly, Gottesman, Lo, Lütkenhaus and Preskill [13] (henceforth referred to as GLLP) proved the security of QKD when Alice's and Bob's devices are flawed, as is the case in practical implementations. Unfortunately, however, GLLP has a severe limitation, namely, it is not loss-tolerant; it assumes the worst case scenario where Eve can enhance flaws in the state preparation by exploiting channel loss. As a result, the key generation rate and achievable distance of QKD are dramatically reduced [14]. Notice that most existing QKD experiments simply ignore state preparation imperfections in their key rate formula, which renders their results unrealistic and not really secure.In this Letter, we show that GLLP's worst case assumption is far too conservative, i.e., in sharp contrast to GLLP, we present a security proof for QKD that is loss-tolerant. Indeed, for the case of modulation errors, an important flaw in real-life QKD systems, we show that Eve cannot exploit channel loss to enhance such imperfections. The intuition here is rather simple: in this type of state preparation flaws the signals sent out by Alice are still qubits, i.e., there is no side-channel for Eve to exploit
The quantum internet holds promise for performing quantum communication, such as quantum teleportation and quantum key distribution, freely between any parties all over the globe. For such a quantum internet protocol, a general fundamental upper bound on the performance has been derived [K. Azuma, A. Mizutani, and H.-K. Lo, arXiv:1601.02933]. Here we consider its converse problem. In particular, we present a protocol constructible from any given quantum network, which is based on running quantum repeater schemes in parallel over the network. The performance of this protocol and the upper bound restrict the quantum capacity and the private capacity over the network from both sides. The optimality of the protocol is related to fundamental problems such as additivity questions for quantum channels and questions on the existence of a gap between quantum and private capacities.PACS numbers: 03.67. Hk, 03.67.Dd, 03.65.Ud, In the Internet, if a client communicates with a far distant client, the data travel across multiple networks. At present, the nodes and the communication channels in the networks are composed of physical devices governed by the laws of classical information theory, and the data flow obeys the celebrated max-flow min-cut theorem in graph theory. However, in the future, such classical nodes and channels should be replaced with quantum ones, whose network follows the rules of quantum information theory, rather than classical one. This network, called quantum internet, could accomplish tasks that are intractable in the realm of classical information processing, and it serves opportunities and challenges across a range of intellectual and technical frontiers, including quantum communication, computation, metrology, and simulation [1]. So far, the main interest in the quantum internet has been its realization [2][3][4][5][6][7][8][9][10][11][12][13][14][15][16]. But, it must be one of the most fundamental trials from a theoretical perspective to grasp the full potential of the quantum internet. Along this line, recently, a general fundamental upper bound on the performance was derived [17] for its use for supplying two clients with entanglement or a secret key. Interestingly, this upper bound is estimable and applied to any private-key or entanglement distillation scheme that works over any network topology composed of arbitrary quantum channels by using arbitrary local operations and unlimited classical communication (LOCC). With this, for the case of linear lossy optical channel networks, it has been shown [17] that existing intercity quantum key distribution (QKD) protocols [18][19][20] and quantum repeater schemes [7,8,12,14,15] have no scaling gap with the fundamental upper bound. Moreover, in the case of a multipath network composed of a wide range of stretchable quantum channels (including lossy optical channels), it has been proven [21] to be optimal to choose a single path between two clients for running quantum repeater scheme, in order to minimize the number of times paths between them are used...
In theory, quantum key distribution (QKD) offers information-theoretic security. In practice, however, it does not due to the discrepancies between the assumptions used in the security proofs and the behavior of the real apparatuses. Recent years have witnessed a tremendous effort to fill the gap, but the treatment of correlations among pulses has remained a major elusive problem. Here, we close this gap by introducing a simple yet general method to prove the security of QKD with arbitrarily long-range pulse correlations. Our method is compatible with those security proofs that accommodate all the other typical device imperfections, thus paving the way toward achieving implementation security in QKD with arbitrary flawed devices. Moreover, we introduce a new framework for security proofs, which we call the reference technique. This framework includes existing security proofs as special cases, and it can be widely applied to a number of QKD protocols.
Selective neuronal death in the CA1 sector of the hippocampus [delayed neuronal death (DND)] develops several days after transient global cerebral ischemia in rodents. Because NGF plays a potential role in neuronal survival, it was decided to study its effect in DND. We report here that intraventricular injection of NGF either before or after 5 min forebrain ischemia in the Mongolian gerbil significantly reduced the occurrence of DND. The tissue content of NGF in the hippocampus was decreased 2 d after ischemia and recovered to the preischemic level by 1 week. By the Golgi staining technique, changes first began in the dendrites of affected neurons as early as 3 hr. Such changes could be ameliorated by NGF treatment. Although previous knowledge of NGF is limited to the survival of cholinergic neurons in the CNS, it is assumed that other mechanisms must be operating in the hippocampus, for example, postsynaptic modification at dendrites or aberrant expression of NGF receptors possibly at the initial excitation period by glutamate. Furthermore, because previous work has shown that inhibition of protein synthesis reduces the occurrence of DND, a program leading to cell death might also be operating via de novo synthesis of certain protein(s), collectively termed “killer protein,” because of a lack of NGF.
BackgroundWith the introduction of long-term care insurance (LTCI) in Japan, more home care services are available for the community-dwelling elderly. To deliver effective home care services, it is important to know the effects of service use. In this study, as the first step to determine this, we sought to describe different home service use in the sustained/improved group and deteriorated group in their care needs levels, and to report the relationship between the use of home care services and changes in care needs levels.MethodsThe participants included 624 of a total of 1,474 users of LTCI services in one city in Japan. Home care service users were stratified into a 'lower care needs level subgroup' and a 'higher care needs level subgroup' based on the baseline care needs level. Simple statistical comparison and multiple logistic regression analyses in which the change in care needs level was set as a dependent variable were performed. Gender, age, and baseline care needs level were designated as control variables. Home based services were treated as independent variables. In this study, home care services consisted of home help, home bathing services, a visiting nurse, home rehabilitation, nursing home daycare, health daycare, loan of medical devices, respite stay in a nursing home, respite stay in a health care facility, respite stay in a sanatorium-type medical care facility, and medical management by a physician.ResultsIn the lower care needs level subgroup, age (OR = 1.04, CI, 1.01-1.08), use of respite stay in a nursing home (OR = 2.55; CI, 1.43-4.56), and the number of types of long-term care services (OR = 1.33; CI, 1.02-1.74) used during an 11 month period were significantly related to a deterioration of the user's care needs level. In the higher care needs level subgroup, use of medical management by a physician (OR = 6.99; CI, 1.42-41.25) was significantly related to a deterioration of the user's care needs level. There were no home based services significantly related to sustaining or improving the user's care needs level.ConclusionThere were different home service use in two groups (the sustained/improved group and the deteriorated group). Respite stay in a nursing home service use and more types of service use were related to experiencing a deterioration of care needs level in lower care needs level community-dwelling elderly persons in Japan. Further, medical management by a physician service was related to experiencing a deterioration of care needs level in higher care needs level community-dwelling elderly persons.
We provide a versatile upper bound on the number of maximally entangled qubits, or private bits, shared by two parties via a generic adaptive communication protocol over a quantum network when the use of classical communication is not restricted. Although our result follows the idea of Azuma et al (2016 Nat. Commun. 7 13523) of splitting the network into two parts, our approach relaxes their strong restriction, consisting of the use of a single entanglement measure in the quantification of the maximum amount of entanglement generated by the channels. In particular, in our bound the measure can be chosen on a channel-by-channel basis, in order to make it as tight as possible. This enables us to apply the relative entropy of entanglement, which often gives a state-of-the-art upper bound, on every Choi-simulable channel in the network, even when the other channels do not satisfy this property. We also develop tools to compute, or bound, the max-relative entropy of entanglement for channels that are invariant under phase rotations. In particular, we present an analytical formula for the max-relative entropy of entanglement of the qubit amplitude damping channel. IntroductionWhenever two parties, say Alice and Bob, want to communicate by using a quantum channel, its noise unavoidably limits their communication efficiency [1]. In the limit of many channel uses, their asymptotic optimal performance can be quantified by the channel capacity, which represents the supremum of the number of qubits/bits that can be faithfully transmitted per channel use. Obtaining an exact expression for this quantity is typically far from trivial. Indeed, in addition to the difficulty of studying the asymptotic behaviour of the channel, the value of the capacity also depends on the task Alice and Bob want to perform, as well as on the free resources available to them [1]. Two representative tasks, which will be considered in our paper, involve the generation and distribution of a string of shared private bits (pbits) [2,3] or of maximally entangled states (ebits) [4]. These are known to be fundamental resources for more complex protocols, such as secure classsical communication [5,6], quantum teleportation [7], and quantum state merging [8]. An example of free resource involves the possibility of exchanging classical information over a public classical channel, such as a telephone line or over the internet. Depending on the restrictions on this, the capacity is said to be assisted by zero, forward, backward, or two-way classical communication [1]. In this paper we will focus on the last option, that is, no restriction will be imposed on the use of classical communication.Although the capacity of a quantum channel is by definition an abstract and theoretical quantity, it is also practically useful in that it can be compared with the performance of known transmission schemes. This comparison could then give an indication on the extent of improvements that could be expected in the future. From this perspective, similar conclusions could be obt...
Despite the enormous theoretical and experimental progress made so far in quantum key distribution (QKD), the security of most existing QKD implementations is not rigorously established yet. A critical obstacle is that almost all existing security proofs make ideal assumptions on the QKD devices. Problematically, such assumptions are hard to satisfy in the experiments, and therefore it is not obvious how to apply such security proofs to practical QKD systems. Fortunately, any imperfections and security-loopholes in the measurement devices can be perfectly closed by measurement-device-independent QKD (MDI-QKD), and thus we only need to consider how to secure the source devices. Among imperfections in the source devices, correlations between the sending pulses are one of the principal problems. In this paper, we consider a setting-choice-independent correlation (SCIC) framework in which the sending pulses can present arbitrary correlations but they are independent of the previous setting choices such as the bit, the basis and the intensity settings. Within the framework of SCIC, we consider the dominant fluctuations of the sending states, such as the relative phases and the intensities, and provide a self-contained information theoretic security proof for the loss-tolerant QKD protocol in the finite-key regime. We demonstrate the feasibility of secure quantum communication within a reasonable number of pulses sent, and thus we are convinced that our work constitutes a crucial step toward guaranteeing implementation security of QKD.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
334 Leonard St
Brooklyn, NY 11211
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.