110 research outputs found

    Homomorphisms between fuzzy information systems revisited

    Full text link
    Recently, Wang et al. discussed the properties of fuzzy information systems under homomorphisms in the paper [C. Wang, D. Chen, L. Zhu, Homomorphisms between fuzzy information systems, Applied Mathematics Letters 22 (2009) 1045-1050], where homomorphisms are based upon the concepts of consistent functions and fuzzy relation mappings. In this paper, we classify consistent functions as predecessor-consistent and successor-consistent, and then proceed to present more properties of consistent functions. In addition, we improve some characterizations of fuzzy relation mappings provided by Wang et al.Comment: 10 page

    Comment on "Quantum key distribution for d-level systems with generalized Bell states" [Phys. Rev. A 65, 052331 (2002)]

    Full text link
    In the paper [Phys. Rev. A 65, 052331(2002)], an entanglement-based quantum key distribution protocol for d-level systems was proposed. However, in this Comment, it is shown that this protocol is insecure for a special attack strategy.Comment: 4 pages, 4 figure

    Comment on "Quantum secret sharing based on reusable Greenberger-Horne-Zeilinger states as secure carriers" [Phys. Rev. A 67, 044302 (2003)]

    Full text link
    In a recent paper [S. Bagherinezhad and V. Karimipour, Phys. Rev. A 67, 044302 (2003)], a quantum secret sharing protocol based on reusable GHZ states was proposed. However, in this Comment, it is shown that this protocol is insecure if Eve employs a special strategy to attack.Comment: 2 pages, no figure
    • …
    corecore