115 research outputs found
Homomorphisms between fuzzy information systems revisited
Recently, Wang et al. discussed the properties of fuzzy information systems
under homomorphisms in the paper [C. Wang, D. Chen, L. Zhu, Homomorphisms
between fuzzy information systems, Applied Mathematics Letters 22 (2009)
1045-1050], where homomorphisms are based upon the concepts of consistent
functions and fuzzy relation mappings. In this paper, we classify consistent
functions as predecessor-consistent and successor-consistent, and then proceed
to present more properties of consistent functions. In addition, we improve
some characterizations of fuzzy relation mappings provided by Wang et al.Comment: 10 page
Comment on "Quantum key distribution for d-level systems with generalized Bell states" [Phys. Rev. A 65, 052331 (2002)]
In the paper [Phys. Rev. A 65, 052331(2002)], an entanglement-based quantum
key distribution protocol for d-level systems was proposed. However, in this
Comment, it is shown that this protocol is insecure for a special attack
strategy.Comment: 4 pages, 4 figure
Comment on "Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers" [Phys. Rev. A 67, 044302 (2003)]
In a recent paper [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67,
044302 (2003)], a quantum secret sharing protocol based on reusable GHZ states
was proposed. However, in this Comment, it is shown that this protocol is
insecure if Eve employs a special strategy to attack.Comment: 2 pages, no figure
- …