2,549 research outputs found

    Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols

    Full text link
    Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, and point out that they are susceptible to a simple and effective attack, i.e. the dense-coding attack. It is shown that the eavesdropper Eve can totally obtain the session key by sending entangled qubits as the fake signal to Alice and performing collective measurements after Alice's encoding. The attack process is just like a dense-coding communication between Eve and Alice, where a special measurement basis is employed. Furthermore, this attack does not introduce any errors to the transmitted information and consequently will not be discovered by Alice and Bob. The attack strategy is described in detail and a proof for its correctness is given. At last, the root of this insecurity and a possible way to improve these protocols are discussed.Comment: 6 pages, 3 figure

    Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol

    Full text link
    The participant attack is the most serious threat for quantum secret-sharing protocols. We present a method to analyze the security of quantum secret-sharing protocols against this kind of attack taking the scheme of Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59 1829 (1999)] as an example. By distinguishing between two mixed states, we derive the necessary and sufficient conditions under which a dishonest participant can attain all the information without introducing any error, which shows that the HBB protocol is insecure against dishonest participants. It is easy to verify that the attack scheme of Karlsson, Koashi, and Imoto [Phys. Rev. A 59, 162 (1999)] is a special example of our results. To demonstrate our results further, we construct an explicit attack scheme according to the necessary and sufficient conditions. Our work completes the security analysis of the HBB protocol, and the method presented may be useful for the analysis of other similar protocols.Comment: Revtex, 7 pages, 3 figures; Introduction modifie

    Remaining useful life prediction of the ball screw system based on weighted Mahalanobis distance and an exponential model

    Get PDF
    The ball screw system is one of the crucial components of machine tools and predicting its remaining useful life (RUL) can enhance the reliability and safety of the entire machine tool and reduce maintenance costs. Although quite a few techniques have been developed for the fault diagnosis of the ball screw system, forecasting the RUL of the ball screw system is a remaining challenge. To make up for this deficiency, we present a model-based method to predict the RUL of the ball screw system, which consists of two parts: health indicator (HI) construction and RUL prediction. First, we develop a novel HI, weighted Mahalanobis distance (WDMD). Unlike the Mahalanobis distance (MD), which is constructed by fusing original features directly, the WDMD is formed with some selected features only, and the features are weighted before integration. Second, an exponential model is developed to describe the degradation path of the ball screw system. Then, the particle filtering algorithm is employed to combine the WDMD and the degradation model for state estimation and RUL prediction. The proposed approach is verified by a dataset obtained from an experimental system designed for accelerated life tests of the ball screw system. The results show that the WDMD has a more apparent deterioration trend than the MD and the proposed exponential model performs better than both the linear model and the nonlinear model in RUL prediction

    Poly[[tetra­aqua­di-μ4-oxalato-μ2-oxalato-dineo­dymium(III)] dihydrate]

    Get PDF
    The title compound, {[Nd2(C2O4)3(H2O)4]·2H2O}n, was synthesized hydro­thermally in the presence of bis­(carb­oxy­ethyl­germanium) sesquioxide. It is isostructural with the corresponding Pr compound [Yang et al. (2009). Acta Cryst. E65, m1152–m1153]. The Nd3+ cation is nine-coordinated and its coordination polyhedron can be described as a distorted tricapped trigonal prism. Two Nd3+ ions are connected by two O atoms from two oxalate ions to give a dinuclear Nd2 unit. The unit is further linked to four others via four oxalate ions yielding a layerparallel to (0-11). The linkages between the layers by neighbouring oxalate anions lead to a three-dimensional framework with channels along the c axis. The coordinating and free water mol­ecules are located in the channels and make contact with each other and the host framework by weak O—H⋯O hydrogen bonds

    Fake one-time pad cannot be used to improve the efficiency of quantum communication

    Full text link
    Two misuses of one-time pad in improving the efficiency of quantum communication are pointed out. One happens when using some message bits to encrypt others, the other exists because the key bits are not truly random. Both of them result in the decrease of security. Therefore, one-time pad should be used carefully in designing quantum communication protocols.Comment: 6 pages, no figure
    • …
    corecore