34,755 research outputs found

    Quantum secret sharing between multiparty and multiparty with four states

    Full text link
    An protocol of quantum secret sharing between multiparty and multiparty with four states is presented. We show that this protocol can make the Trojan horse attack with a multi-photon signal, the fake-signal attack with EPR pairs, the attack with single photons, and the attack with invisible photons to be nullification. In addition, we also give the upper bounds of the average success probabilities for dishonest agent eavesdropping encryption using the fake-signal attack with any two-particle entangled states.Comment: 7 page

    Quantum broadcast communication

    Get PDF
    Broadcast encryption allows the sender to securely distribute his/her secret to a dynamically changing group of users over a broadcast channel. In this paper, we just consider a simple broadcast communication task in quantum scenario, which the central party broadcasts his secret to multi-receiver via quantum channel. We present three quantum broadcast communication schemes. The first scheme utilizes entanglement swapping and Greenberger-Horne-Zeilinger state to realize a task that the central party broadcasts his secret to a group of receivers who share a group key with him. In the second scheme, based on dense coding, the central party broadcasts the secret to multi-receiver who share each of their authentication key with him. The third scheme is a quantum broadcast communication scheme with quantum encryption, which the central party can broadcast the secret to any subset of the legal receivers

    A Simultaneous Quantum Secure Direct Communication Scheme between the Central Party and Other M Parties

    Full text link
    We propose a simultaneous quantum secure direct communication scheme between one party and other three parties via four-particle GHZ states and swapping quantum entanglement. In the scheme, three spatially separated senders, Alice, Bob and Charlie, transmit their secret messages to a remote receiver Diana by performing a series local operations on their respective particles according to the quadripartite stipulation. From Alice, Bob, Charlie and Diana's Bell measurement results, Diana can infer the secret messages. If a perfect quantum channel is used, the secret messages are faithfully transmitted from Alice, Bob and Charlie to Diana via initially shared pairs of four-particle GHZ states without revealing any information to a potential eavesdropper. As there is no transmission of the qubits carrying the secret message in the public channel, it is completely secure for the direct secret communication. This scheme can be considered as a network of communication parties where each party wants to communicate secretly with a central party or server.Comment: 4 pages, no figur

    Keeping you in the loop: enabling web-based things management in the internet of things

    Get PDF
    Internet of Things (IoT) is an emerging paradigm where physical objects are connected and communicated over the Web. Its capability in assimilating the virtual world and the physical one offers many exciting opportunities. However, how to realize a smooth, seamless integration of the two worlds remains an interesting and challenging topic. In this paper, we showcase an IoT prototype system that enables seamless integration of the virtual and the physical worlds and efficient management of things of interest (TOIs), where services and resources offered by things can be easily monitored, visualized, and aggregated for value-added services by users. This paper presents the motivation, system design, implementation, and demonstration scenario of the system.Lina Yao, Quan Z. Sheng, Anne H.H. Ngu and Byron Ga

    Consistency of shared reference frames should be reexamined

    Full text link
    In a recent Letter [G. Chiribella et al., Phys. Rev. Lett. 98, 120501 (2007)], four protocols were proposed to secretly transmit a reference frame. Here We point out that in these protocols an eavesdropper can change the transmitted reference frame without being detected, which means the consistency of the shared reference frames should be reexamined. The way to check the above consistency is discussed. It is shown that this problem is quite different from that in previous protocols of quantum cryptography.Comment: 3 pages, 1 figure, comments are welcom

    Probabilistic teleportation of unknown two-particle state via POVM

    Full text link
    We propose a scheme for probabilistic teleportation of unknown two-particle state with partly entangled four-particle state via POVM. In this scheme the teleportation of unknown two-particle state can be realized with certain probability by performing two Bell state measurements, a proper POVM and a unitary transformation.Comment: 5 pages, no figur

    Theoretical study of dislocation nucleation from simple surface defects in semiconductors

    Full text link
    Large-scale atomistic calculations, using empirical potentials for modeling semiconductors, have been performed on a stressed system with linear surface defects like steps. Although the elastic limits of systems with surface defects remain close to the theoretical strength, the results show that these defects weaken the atomic structure, initializing plastic deformations, in particular dislocations. The character of the dislocation nucleated can be predicted considering both the resolved shear stress related to the applied stress orientation and the Peierls stress. At low temperature, only glide events in the shuffle set planes are observed. Then they progressively disappear and are replaced by amorphization/melting zones at a temperature higher than 900 K

    Functional status of fracture victims four years after the 2008 Wenchuan earthquake

    Full text link

    Revisiting loss-specific training of filter-based MRFs for image restoration

    Full text link
    It is now well known that Markov random fields (MRFs) are particularly effective for modeling image priors in low-level vision. Recent years have seen the emergence of two main approaches for learning the parameters in MRFs: (1) probabilistic learning using sampling-based algorithms and (2) loss-specific training based on MAP estimate. After investigating existing training approaches, it turns out that the performance of the loss-specific training has been significantly underestimated in existing work. In this paper, we revisit this approach and use techniques from bi-level optimization to solve it. We show that we can get a substantial gain in the final performance by solving the lower-level problem in the bi-level framework with high accuracy using our newly proposed algorithm. As a result, our trained model is on par with highly specialized image denoising algorithms and clearly outperforms probabilistically trained MRF models. Our findings suggest that for the loss-specific training scheme, solving the lower-level problem with higher accuracy is beneficial. Our trained model comes along with the additional advantage, that inference is extremely efficient. Our GPU-based implementation takes less than 1s to produce state-of-the-art performance.Comment: 10 pages, 2 figures, appear at 35th German Conference, GCPR 2013, Saarbr\"ucken, Germany, September 3-6, 2013. Proceeding

    Dominant Physicochemical Properties of SF6/N2 Thermal Plasmas with a Two-temperature Chemical Kinetic Model

    Get PDF
    It's increasingly clear that the existence of thermodynamic equilibrium is an exception rather than the role in SF6/N2 thermal plasmas. We intended to investigate the dominant physicochemical properties of SF6/N2 thermal plasmas at 4  atm from 12000 K to 1000 K with considering the thermal non-equilibrium. A two-temperature chemical kinetic model containing all the available reactions is developed. The temperature difference between the electron and the heavy species is defined as a function of the electron number density. The molar fractions of species are compared to the equilibrium composition predicted by Gibbs free energy minimization. By analyzing the main reactions in the generation and loss of a dominant species, the chemistry set is simplified and characterized by a few species and reactions. Then, the dominant physicochemical properties are captured and the computing time of complicated chemical kinetic model is dramatically shortened at the same time
    corecore