2,549 research outputs found
Dense-Coding Attack on Three-Party Quantum Key Distribution Protocols
Cryptanalysis is an important branch in the study of cryptography, including
both the classical cryptography and the quantum one. In this paper we analyze
the security of two three-party quantum key distribution protocols (QKDPs)
proposed recently, and point out that they are susceptible to a simple and
effective attack, i.e. the dense-coding attack. It is shown that the
eavesdropper Eve can totally obtain the session key by sending entangled qubits
as the fake signal to Alice and performing collective measurements after
Alice's encoding. The attack process is just like a dense-coding communication
between Eve and Alice, where a special measurement basis is employed.
Furthermore, this attack does not introduce any errors to the transmitted
information and consequently will not be discovered by Alice and Bob. The
attack strategy is described in detail and a proof for its correctness is
given. At last, the root of this insecurity and a possible way to improve these
protocols are discussed.Comment: 6 pages, 3 figure
Cryptanalysis of the Hillery-Buzek-Berthiaume quantum secret-sharing protocol
The participant attack is the most serious threat for quantum secret-sharing
protocols. We present a method to analyze the security of quantum
secret-sharing protocols against this kind of attack taking the scheme of
Hillery, Buzek, and Berthiaume (HBB) [Phys. Rev. A 59 1829 (1999)] as an
example. By distinguishing between two mixed states, we derive the necessary
and sufficient conditions under which a dishonest participant can attain all
the information without introducing any error, which shows that the HBB
protocol is insecure against dishonest participants. It is easy to verify that
the attack scheme of Karlsson, Koashi, and Imoto [Phys. Rev. A 59, 162 (1999)]
is a special example of our results. To demonstrate our results further, we
construct an explicit attack scheme according to the necessary and sufficient
conditions. Our work completes the security analysis of the HBB protocol, and
the method presented may be useful for the analysis of other similar protocols.Comment: Revtex, 7 pages, 3 figures; Introduction modifie
Remaining useful life prediction of the ball screw system based on weighted Mahalanobis distance and an exponential model
The ball screw system is one of the crucial components of machine tools and predicting its remaining useful life (RUL) can enhance the reliability and safety of the entire machine tool and reduce maintenance costs. Although quite a few techniques have been developed for the fault diagnosis of the ball screw system, forecasting the RUL of the ball screw system is a remaining challenge. To make up for this deficiency, we present a model-based method to predict the RUL of the ball screw system, which consists of two parts: health indicator (HI) construction and RUL prediction. First, we develop a novel HI, weighted Mahalanobis distance (WDMD). Unlike the Mahalanobis distance (MD), which is constructed by fusing original features directly, the WDMD is formed with some selected features only, and the features are weighted before integration. Second, an exponential model is developed to describe the degradation path of the ball screw system. Then, the particle filtering algorithm is employed to combine the WDMD and the degradation model for state estimation and RUL prediction. The proposed approach is verified by a dataset obtained from an experimental system designed for accelerated life tests of the ball screw system. The results show that the WDMD has a more apparent deterioration trend than the MD and the proposed exponential model performs better than both the linear model and the nonlinear model in RUL prediction
Poly[[tetraÂaquaÂdi-μ4-oxalato-μ2-oxalato-dineoÂdymium(III)] dihydrate]
The title compound, {[Nd2(C2O4)3(H2O)4]·2H2O}n, was synthesized hydroÂthermally in the presence of bisÂ(carbÂoxyÂethylÂgermanium) sesquioxide. It is isostructural with the corresponding Pr compound [Yang et al. (2009). Acta Cryst. E65, m1152–m1153]. The Nd3+ cation is nine-coordinated and its coordination polyhedron can be described as a distorted tricapped trigonal prism. Two Nd3+ ions are connected by two O atoms from two oxalate ions to give a dinuclear Nd2 unit. The unit is further linked to four others via four oxalate ions yielding a layerparallel to (0-11). The linkages between the layers by neighbouring oxalate anions lead to a three-dimensional framework with channels along the c axis. The coordinating and free water molÂecules are located in the channels and make contact with each other and the host framework by weak O—H⋯O hydrogen bonds
Fake one-time pad cannot be used to improve the efficiency of quantum communication
Two misuses of one-time pad in improving the efficiency of quantum
communication are pointed out. One happens when using some message bits to
encrypt others, the other exists because the key bits are not truly random.
Both of them result in the decrease of security. Therefore, one-time pad should
be used carefully in designing quantum communication protocols.Comment: 6 pages, no figure
- …