We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases. We perform the security analysis first reducing the general eavesdropping to a two-mode coherent Gaussian attack, and then showing that the superadditivity is achieved by exploiting the random on/off switching of the two-way quantum communication. This allows the parties to choose the appropriate communication instances to prepare the key, accordingly to the tomography of the quantum channel. The random opening and closing of the circuit represents, in fact, an additional degree of freedom allowing the parties to convert, a posteriori, the two-mode correlations of the eavesdropping into noise. The eavesdropper is assumed to have no access to the on/off switching and, indeed, cannot adapt her attack. We explicitly prove that this mechanism enhances the security performance, no matter if the eavesdropper performs collective or coherent attacks.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC4772010 | PMC |
http://dx.doi.org/10.1038/srep22225 | DOI Listing |
Background: Case-control studies indicate an association between lower serum 25-hydroxyvitamin D [25(OH)D] levels and psoriasis. Data from larger population-based cohorts including mild cases are sparse.
Objectives: To investigate the association between 25(OH)D and psoriasis in a large population-based cohort, and assess possible effect modification by overweight.
BMC Med
December 2017
ORS PACA, Observatoire régional de la santé Provence-Alpes-Côte d'Azur, Marseille, France.
Background: The literature offers competing estimates of disease costs, with each study having its own data and methods. In 2007, the Dutch Center for Public Health Forecasting of the National Institute for Public Health and the Environment provided guidelines that can be used to set up cost-of-illness (COI) studies, emphasising that most COI analyses have trouble accounting for comorbidity in their cost estimations. When a patient has more than one chronic condition, the conditions may interact such that the patient's healthcare costs are greater than the sum of the costs for the individual diseases.
View Article and Find Full Text PDFSci Rep
March 2016
Department of Computer Science &York Centre for Quantum Technologies, University of York, YO10 5GH, UK.
We consider two-way continuous-variable quantum key distribution, studying its security against general eavesdropping strategies. Assuming the asymptotic limit of many signals exchanged, we prove that two-way Gaussian protocols are immune to coherent attacks. More precisely we show the general superadditivity of the two-way security thresholds, which are proven to be higher than the corresponding one-way counterparts in all cases.
View Article and Find Full Text PDFBehav Brain Res
July 2005
Department of Biostatistics and Research Epidemiology, Henry Ford Health Sciences Center, One Ford Place 3E, Detroit, MI 48202, USA.
Background: Acute ischemic stroke is a complex disease. Treatment success may require combining different therapeutic approaches. An obvious treatment combination in acute ischemic stroke is a thrombolytic therapy, adjuvant with a neuroprotective agent to have better stroke recovery.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!