As one of essential multimedia in quantum networks, the copyright protection of quantum audio has gradually be- come an important issue in the domain of quantum information hiding in the decades. In this paper, an imp...As one of essential multimedia in quantum networks, the copyright protection of quantum audio has gradually be- come an important issue in the domain of quantum information hiding in the decades. In this paper, an improved quantum watermarking algorithm based on quantum audio by using least significant qubit (LSQb) modification is proposed. Com- pared with the previous achievements, it can effectively improve the robustness and security of watermark for copyright protection of quantum audio. In the new algorithm, the least significant bites and the peripheral least significant bits of the amplitudes are modified in terms of their logical consistency and correlation to enhance watermark robustness of resisting various illegal attacks. Furthermore, the new algorithm can avoid the weak robustness defect of many previous algorithms that directly embedded the watermark into the least significant bits. In order to implement the new algorithm, some spe- cific quantum circuits are designed to obtain better applicability and scalability for embedding and extracting watermark. Finally, the simulation results including the values of audio waveforms and signal to noise ratios (SNR) prove that the new algorithm has good transparency, robustness, and security.展开更多
Two schemes are proposed to realize the controlled remote preparation of an arbitrary four-qubit cluster-type state via a partially entangled channel. We construct ingenious measurement bases at the sender’s and the ...Two schemes are proposed to realize the controlled remote preparation of an arbitrary four-qubit cluster-type state via a partially entangled channel. We construct ingenious measurement bases at the sender’s and the controller’s locations, which play a decisive role in the proposed schemes. The success probabilities can reach 50% and 100%, respectively. Compared with the previous proposals, the success probabilities are independent of the coefficients of the entangled channel.展开更多
Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol c...Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol cannot resist some internal bidders' attacks, such as the Twiee-CNOT attack, the collusion attack. A malicious bidder can launch the Twice-CNOT attack to obtain the other's bid, or the dishonest auctioneer may collude with one bidder and help him/her win the action by changing his/her bid. For preventing against these attacks, a simple solution by using the QKD-based message encryption and a post-confirmation mechanism by adopting the hash function are proposed.展开更多
Two deterministic schemes using the χ state as the entangled channel are put forward to realize the remote preparation of arbitrary two-and three-qubit states. To design the schemes, we construct sets of ingenious me...Two deterministic schemes using the χ state as the entangled channel are put forward to realize the remote preparation of arbitrary two-and three-qubit states. To design the schemes, we construct sets of ingenious measurement bases, which have no restrictions on the coefficients of the prepared state. At variance with the existing schemes via the χ state, the success probabilities of the proposed schemes are greatly improved.展开更多
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61373131,61303039,61232016,and 61501247)Sichuan Youth Science and Technique Foundation,China(Grant No.2017JQ0048)+1 种基金NUIST Research Foundation for Talented Scholars of China(Grant No.2015r014)PAPD and CICAEET Funds of China
文摘As one of essential multimedia in quantum networks, the copyright protection of quantum audio has gradually be- come an important issue in the domain of quantum information hiding in the decades. In this paper, an improved quantum watermarking algorithm based on quantum audio by using least significant qubit (LSQb) modification is proposed. Com- pared with the previous achievements, it can effectively improve the robustness and security of watermark for copyright protection of quantum audio. In the new algorithm, the least significant bites and the peripheral least significant bits of the amplitudes are modified in terms of their logical consistency and correlation to enhance watermark robustness of resisting various illegal attacks. Furthermore, the new algorithm can avoid the weak robustness defect of many previous algorithms that directly embedded the watermark into the least significant bits. In order to implement the new algorithm, some spe- cific quantum circuits are designed to obtain better applicability and scalability for embedding and extracting watermark. Finally, the simulation results including the values of audio waveforms and signal to noise ratios (SNR) prove that the new algorithm has good transparency, robustness, and security.
基金supported by the National Natural Science Foundation of China(Grant Nos.61201253,61373131,61572246,and 61502147)PAPDCICAEET funds
文摘Two schemes are proposed to realize the controlled remote preparation of an arbitrary four-qubit cluster-type state via a partially entangled channel. We construct ingenious measurement bases at the sender’s and the controller’s locations, which play a decisive role in the proposed schemes. The success probabilities can reach 50% and 100%, respectively. Compared with the previous proposals, the success probabilities are independent of the coefficients of the entangled channel.
基金Supported by the National Natural Science Foundation of China under Grant Nos.61103235,61170321,and 61373131the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)+1 种基金the Natural Science Foundation of Jiangsu Province,China(BK2010570)State Key Laboratory of Software Engineering,Wuhan University(SKLSE2012-09-41)
文摘Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol cannot resist some internal bidders' attacks, such as the Twiee-CNOT attack, the collusion attack. A malicious bidder can launch the Twice-CNOT attack to obtain the other's bid, or the dishonest auctioneer may collude with one bidder and help him/her win the action by changing his/her bid. For preventing against these attacks, a simple solution by using the QKD-based message encryption and a post-confirmation mechanism by adopting the hash function are proposed.
基金Supported by the National Natural Science Foundation of China under Grant Nos.61201253,61373131,61572246Priority Academic Program Development of Jiangsu Higher Education InstitutionsCollaborative Innovation Center of Atmospheric Environment and Equipment Technology
文摘Two deterministic schemes using the χ state as the entangled channel are put forward to realize the remote preparation of arbitrary two-and three-qubit states. To design the schemes, we construct sets of ingenious measurement bases, which have no restrictions on the coefficients of the prepared state. At variance with the existing schemes via the χ state, the success probabilities of the proposed schemes are greatly improved.