92 research outputs found

    Bis[4,5-dimethyl-2-(2-pyrid­yl)-1H-imidazole-κ2 N 2,N 3](1H-imidazole-κN 3)copper(II) bis­(perchlorate)

    Get PDF
    In the title complex, [Cu(C3H4N2)(C10H11N3)2](ClO4)2, the CuII cation has a distorted trigonal-bipyramidal geometry defined by a CuN2N′2N′′ donor set. The imidazole ligand is disordered over two orientations of equal occupancy. Two of the perchlorate ion sites are located on a twofold rotation axis, and one of is disordered over two sites of equal occupancy. In the crystal structure there is a two-dimensional infinite network of hydrogen-bonded mol­ecules parallel to the ab plane

    Optimizing Bootstrapping and Evaluating Large FHE Gates in the LWE-based GSW-FHE

    Get PDF
    Fully homomorphic encryption (FHE) allows us to perform computations directly over encrypted data and can be widely used in some highly regulated industries. Gentry\u27s bootstrapping procedure is used to refresh noisy ciphertexts and is the only way to achieve the goal of FHE up to now. In this paper, we optimize the LWE-based GSW-type bootstrapping procedure. Our optimization decreases the lattice approximation factor for the underlying worst-case lattice assumption from O~(N2.5)\tilde{O}(N^{2.5}) to O~(N2)\tilde{O}(N^{2}), and is time-efficient by a O(λ)O(\lambda) factor. Our scheme can also achieve the best factor in prior works on bootstrapping of standard lattice-based FHE by taking a larger lattice dimension, which makes our scheme as secure as the standard lattice-based PKE. Furthermore, in this work we present a technique to perform more operations per bootstrapping in the LWE-based FHE scheme. Although there have been studies to evaluate large FHE gates using schemes over ideal lattices, (i.e. using FHEW or TFHE), we are the first to study how to perform complex functions homomorphically over standard lattices

    Broadband squeezed light field by magnetostriction in an opto-magnomechanical

    Full text link
    We present a novel mechanism for generating a wide bandwidth squeezed optical output field in an opto-magnomechanical system. In this system, the magnon (mechanical) mode in the yttrium-iron-garnet crystal is coupled to the microwave field (optical field) through magnetic dipole (radiation pressure) interaction. The magnetostrictive force induced by the yttrium-iron-garnet crystal causes a mechanical displacement and creates a quadrature squeezed magnon mode. Eventually, this quadrature squeezed mechanical mode is transferred to the output optical field through state-swap interaction. Our results demonstrate the optimal parameter range for obtaining a stable squeezed optical output field with a wide bandwidth. Moreover, the squeezed light field exhibits strong robustness to environmental temperature. The new scheme we propose has potential applications in quantum precision measurements, quantum wireless networks, quantum radar, etc

    Macroscopic entanglement between ferrimagnetic magnons and atoms via crossed optical cavity

    Full text link
    We consider a two-dimensional opto-magnomechanical (OMM) system including two optical cavity modes, a magnon mode, a phonon mode, and a collection of two-level atoms. In this study, we demonstrate the methodology for generating stationary entanglement between two-level atoms and magnons, which are implemented using two optical cavities inside the setup. Additionally, we investigate the efficiency of transforming entanglement from atom-phonon entanglement to atom-magnon entanglement. The magnons are stimulated by both a bias magnetic field and a microwave magnetic field, and they interact with phonons through the mechanism of magnetostrictive interaction. This interaction generates magnomechanical displacement, which couples to an optical cavity via radiation pressure. We demonstrate that by carefully selecting the frequency detuning of an optical cavity, it is possible to achieve an increase in bipartite entanglements. Furthermore, this improvement is found to be resistant to changes in temperature. The entanglement between atoms and magnons plays a crucial role in the construction of hybrid quantum networks. Our modeling approach exhibits potential applications in the field of magneto-optical trap systems as well.Comment: arXiv admin note: text overlap with arXiv:1903.00221 by other author

    FigStep: Jailbreaking Large Vision-language Models via Typographic Visual Prompts

    Full text link
    Ensuring the safety of artificial intelligence-generated content (AIGC) is a longstanding topic in the artificial intelligence (AI) community, and the safety concerns associated with Large Language Models (LLMs) have been widely investigated. Recently, large vision-language models (VLMs) represent an unprecedented revolution, as they are built upon LLMs but can incorporate additional modalities (e.g., images). However, the safety of VLMs lacks systematic evaluation, and there may be an overconfidence in the safety guarantees provided by their underlying LLMs. In this paper, to demonstrate that introducing additional modality modules leads to unforeseen AI safety issues, we propose FigStep, a straightforward yet effective jailbreaking algorithm against VLMs. Instead of feeding textual harmful instructions directly, FigStep converts the harmful content into images through typography to bypass the safety alignment within the textual module of the VLMs, inducing VLMs to output unsafe responses that violate common AI safety policies. In our evaluation, we manually review 46,500 model responses generated by 3 families of the promising open-source VLMs, i.e., LLaVA, MiniGPT4, and CogVLM (a total of 6 VLMs). The experimental results show that FigStep can achieve an average attack success rate of 82.50% on 500 harmful queries in 10 topics. Moreover, we demonstrate that the methodology of FigStep can even jailbreak GPT-4V, which already leverages an OCR detector to filter harmful queries. Above all, our work reveals that VLMs are vulnerable to jailbreaking attacks, which highlights the necessity of novel safety alignments between visual and textual modalities.Comment: Technical Repor

    Multi-channel quantum noise suppression and phase-sensitive modulation in a hybrid optical resonant cavity system

    Full text link
    Quantum noise suppression and phase-sensitive modulation of continuously variable in vacuum and squeezed fields in a hybrid resonant cavity system are investigated theoretically. Multiple dark windows similar to electromagnetic induction transparency (EIT) are observed in quantum noise fluctuation curve. The effects of pumping light on both suppression of quantum noise and control the widths of dark windows are carefully analyzed, and the saturation point of pumping light for nonlinear crystal conversion is obtained. We find that the noise suppression effect is strongly sensitive to the pumping light power. The degree of noise suppression can be up to 13.9 dB when the pumping light power is 6.5 Beta_th. Moreover, a phase-sensitive modulation scheme is demonstrated, which well fills the gap that multi-channel quantum noise suppression is difficult to realize at the quadrature amplitude of squeezed field. Our result is meaningful for various applications in precise measurement physics, quantum information processing and quantum communications of system-on-a-chip

    SCloud: Public Key Encryption and Key Encapsulation Mechanism Based on Learning with Errors

    Get PDF
    We propose a new family of public key encryption (PKE) and key encapsulation mechanism (KEM) schemes based on the plain learning with errors (LWE) problem. Two new design techniques are adopted in the proposed scheme named SCloud: the sampling method and the error-reconciliation mechanism. The new sampling method is obtained by studying the property of the convolution of central binomial distribution and bounded uniform distribution which can achieve higher efficiency and more flexibility w.r.t the parameter choice. Besides, it is shown to be more secure against the dual attack due to its advantage in distinguish property. The new error-reconciliation mechanism is constructed by combining the binary linear codes and Gray codes. It can reduce the size of parameters, and then improve the encryption/decryption efficiency as well as communication efficiency, by making full use of the encryption space. Based on these two techniques, SCloud can provide various sets of parameters for refined security level

    Association between napping and type 2 diabetes mellitus

    Get PDF
    As the incidence of type 2 diabetes mellitus (T2DM) is increasing rapidly and its consequences are severe, effective intervention and prevention, including sleep-related interventions, are urgently needed. As a component of sleep architecture, naps, alone or in combination with nocturnal sleep, may influence the onset and progression of T2DM. Overall, napping is associated with an increased risk of T2DM in women, especially in postmenopausal White women. Our study showed that napping >30 minutes (min) increased the risk of T2DM by 8-21%. In addition, non-optimal nighttime sleep increases T2DM risk, and this effect combines with the effect of napping. For nondiabetic patients, napping >30 min could increase the risks of high HbA1c levels and impaired fasting glucose (IFG), which would increase the risk of developing T2DM later on. For diabetic patients, prolonged napping may further impair glycemic control and increase the risk of developing diabetic complications (e.g., diabetic nephropathy) in the distant future. The following three mechanisms are suggested as interpretations for the association between napping and T2DM. First, napping >30 min increases the levels of important inflammatory factors, including interleukin 6 and C-reactive protein, elevating the risks of inflammation, associated adiposity and T2DM. Second, the interaction between postmenopausal hormonal changes and napping further increases insulin resistance. Third, prolonged napping may also affect melatonin secretion by interfering with nighttime sleep, leading to circadian rhythm disruption and further increasing the risk of T2DM. This review summarizes the existing evidence on the effect of napping on T2DM and provides detailed information for future T2DM intervention and prevention strategies that address napping
    corecore