34,755 research outputs found
Quantum secret sharing between multiparty and multiparty with four states
An protocol of quantum secret sharing between multiparty and multiparty with
four states is presented. We show that this protocol can make the Trojan horse
attack with a multi-photon signal, the fake-signal attack with EPR pairs, the
attack with single photons, and the attack with invisible photons to be
nullification. In addition, we also give the upper bounds of the average
success probabilities for dishonest agent eavesdropping encryption using the
fake-signal attack with any two-particle entangled states.Comment: 7 page
Quantum broadcast communication
Broadcast encryption allows the sender to securely distribute his/her secret
to a dynamically changing group of users over a broadcast channel. In this
paper, we just consider a simple broadcast communication task in quantum
scenario, which the central party broadcasts his secret to multi-receiver via
quantum channel. We present three quantum broadcast communication schemes. The
first scheme utilizes entanglement swapping and Greenberger-Horne-Zeilinger
state to realize a task that the central party broadcasts his secret to a group
of receivers who share a group key with him. In the second scheme, based on
dense coding, the central party broadcasts the secret to multi-receiver who
share each of their authentication key with him. The third scheme is a quantum
broadcast communication scheme with quantum encryption, which the central party
can broadcast the secret to any subset of the legal receivers
A Simultaneous Quantum Secure Direct Communication Scheme between the Central Party and Other M Parties
We propose a simultaneous quantum secure direct communication scheme between
one party and other three parties via four-particle GHZ states and swapping
quantum entanglement. In the scheme, three spatially separated senders, Alice,
Bob and Charlie, transmit their secret messages to a remote receiver Diana by
performing a series local operations on their respective particles according to
the quadripartite stipulation. From Alice, Bob, Charlie and Diana's Bell
measurement results, Diana can infer the secret messages. If a perfect quantum
channel is used, the secret messages are faithfully transmitted from Alice, Bob
and Charlie to Diana via initially shared pairs of four-particle GHZ states
without revealing any information to a potential eavesdropper. As there is no
transmission of the qubits carrying the secret message in the public channel,
it is completely secure for the direct secret communication. This scheme can be
considered as a network of communication parties where each party wants to
communicate secretly with a central party or server.Comment: 4 pages, no figur
Keeping you in the loop: enabling web-based things management in the internet of things
Internet of Things (IoT) is an emerging paradigm where physical objects are connected and communicated over the Web. Its capability in assimilating the virtual world and the physical one offers many exciting opportunities. However, how to realize a smooth, seamless integration of the two worlds remains an interesting and challenging topic. In this paper, we showcase an IoT prototype system that enables seamless integration of the virtual and the physical worlds and efficient management of things of interest (TOIs), where services and resources offered by things can be easily monitored, visualized, and aggregated for value-added services by users. This paper presents the motivation, system design, implementation, and demonstration scenario of the system.Lina Yao, Quan Z. Sheng, Anne H.H. Ngu and Byron Ga
Consistency of shared reference frames should be reexamined
In a recent Letter [G. Chiribella et al., Phys. Rev. Lett. 98, 120501
(2007)], four protocols were proposed to secretly transmit a reference frame.
Here We point out that in these protocols an eavesdropper can change the
transmitted reference frame without being detected, which means the consistency
of the shared reference frames should be reexamined. The way to check the above
consistency is discussed. It is shown that this problem is quite different from
that in previous protocols of quantum cryptography.Comment: 3 pages, 1 figure, comments are welcom
Probabilistic teleportation of unknown two-particle state via POVM
We propose a scheme for probabilistic teleportation of unknown two-particle
state with partly entangled four-particle state via POVM. In this scheme the
teleportation of unknown two-particle state can be realized with certain
probability by performing two Bell state measurements, a proper POVM and a
unitary transformation.Comment: 5 pages, no figur
Theoretical study of dislocation nucleation from simple surface defects in semiconductors
Large-scale atomistic calculations, using empirical potentials for modeling
semiconductors, have been performed on a stressed system with linear surface
defects like steps. Although the elastic limits of systems with surface defects
remain close to the theoretical strength, the results show that these defects
weaken the atomic structure, initializing plastic deformations, in particular
dislocations. The character of the dislocation nucleated can be predicted
considering both the resolved shear stress related to the applied stress
orientation and the Peierls stress. At low temperature, only glide events in
the shuffle set planes are observed. Then they progressively disappear and are
replaced by amorphization/melting zones at a temperature higher than 900 K
Revisiting loss-specific training of filter-based MRFs for image restoration
It is now well known that Markov random fields (MRFs) are particularly
effective for modeling image priors in low-level vision. Recent years have seen
the emergence of two main approaches for learning the parameters in MRFs: (1)
probabilistic learning using sampling-based algorithms and (2) loss-specific
training based on MAP estimate. After investigating existing training
approaches, it turns out that the performance of the loss-specific training has
been significantly underestimated in existing work. In this paper, we revisit
this approach and use techniques from bi-level optimization to solve it. We
show that we can get a substantial gain in the final performance by solving the
lower-level problem in the bi-level framework with high accuracy using our
newly proposed algorithm. As a result, our trained model is on par with highly
specialized image denoising algorithms and clearly outperforms
probabilistically trained MRF models. Our findings suggest that for the
loss-specific training scheme, solving the lower-level problem with higher
accuracy is beneficial. Our trained model comes along with the additional
advantage, that inference is extremely efficient. Our GPU-based implementation
takes less than 1s to produce state-of-the-art performance.Comment: 10 pages, 2 figures, appear at 35th German Conference, GCPR 2013,
Saarbr\"ucken, Germany, September 3-6, 2013. Proceeding
Dominant Physicochemical Properties of SF6/N2 Thermal Plasmas with a Two-temperature Chemical Kinetic Model
It's increasingly clear that the existence of thermodynamic equilibrium is an exception rather than the role in SF6/N2 thermal plasmas. We intended to investigate the dominant physicochemical properties of SF6/N2 thermal plasmas at 4 atm from 12000 K to 1000 K with considering the thermal non-equilibrium. A two-temperature chemical kinetic model containing all the available reactions is developed. The temperature difference between the electron and the heavy species is defined as a function of the electron number density. The molar fractions of species are compared to the equilibrium composition predicted by Gibbs free energy minimization. By analyzing the main reactions in the generation and loss of a dominant species, the chemistry set is simplified and characterized by a few species and reactions. Then, the dominant physicochemical properties are captured and the computing time of complicated chemical kinetic model is dramatically shortened at the same time
- …