A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit tw...A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer.展开更多
A multiparty simultaneous quantum identity authentication protocol based on Creenberger-Horne-Zeilinger (GHZ) states is proposed. The multi-user can be authenticated by a trusted third party (TTP) simultaneously. ...A multiparty simultaneous quantum identity authentication protocol based on Creenberger-Horne-Zeilinger (GHZ) states is proposed. The multi-user can be authenticated by a trusted third party (TTP) simultaneously. Compared with the scheme proposed recently (Wang et al 2006 Chin. Phys. Lett. 23(9) 2360), the proposed scheme has the advantages of consuming fewer quantum and classical resources and lessening the difficulty and intensity of necessary operations.展开更多
We study the optical field's quadrature excitation state Xm 10), where X = (a + at)/x/2 is the quadrature operator. We find it is ascribed to the Hermite-polynomial excitation state. For the first time, we determ...We study the optical field's quadrature excitation state Xm 10), where X = (a + at)/x/2 is the quadrature operator. We find it is ascribed to the Hermite-polynomial excitation state. For the first time, we determine this state's normalization constant which turns out to be a Laguerre polynomial. This is due to the integration method within the ordered product of operators (IWOP). The normalization for the two-mode quadrature excitation state is also completed by virtue of the entangled state representation.展开更多
By virtue of the entangled state representation we concisely derive some new operator identities with regard to the two-variable Hermite polynomial (TVHP). By them and the technique of integration within an ordered ...By virtue of the entangled state representation we concisely derive some new operator identities with regard to the two-variable Hermite polynomial (TVHP). By them and the technique of integration within an ordered product (IWOP) of operators we further derive new generating function formulas of the TVHP. They are useful in quantum optical theoretical calculations. It is seen from this work that by combining the IWOP technique and quantum mechanical representations one can derive some new integration formulas even without really performing the integration.展开更多
The article is devoted to the struggle for identity which has been intensified in the Russian social media in 2014 both on interpretation of the historical past and on the up-to-date situation, especially, Crimea even...The article is devoted to the struggle for identity which has been intensified in the Russian social media in 2014 both on interpretation of the historical past and on the up-to-date situation, especially, Crimea events. Authors suppose that as a result social media become a means of manipulation more than independent space with rizhoma nature. In 2011-2012 social media were the space of struggle between authority and political opposition. Today space of social media is looking polarized regarding polarization of society in respect of political order and Putin political course.展开更多
目的评估单核苷酸多态性(single nucleotide polymorphism,SNP)分型结合状态一致性(identity by state,IBS)分析策略进行全同胞鉴定的效能。方法收集一个四代家系共35个成员的血样,采用Precision ID Identity Panel对90个常染色体SNP进...目的评估单核苷酸多态性(single nucleotide polymorphism,SNP)分型结合状态一致性(identity by state,IBS)分析策略进行全同胞鉴定的效能。方法收集一个四代家系共35个成员的血样,采用Precision ID Identity Panel对90个常染色体SNP进行分型。统计并比较全同胞与其他亲缘关系IBS评分分布的差异,分别采用Fisher判别函数法和阈值法进行各种亲缘关系判定。结果基于家系和前期研究,分别获得全同胞、祖孙、叔侄(姨甥)、第一代堂表亲关系共44、30、111、71对以及无关个体1000对,平均IBS评分分别为148、130、132、124、120。除祖孙与叔侄(姨甥)关系外,其余关系之间的IBS评分差异均有统计学意义(P<0.05)。基于IBS评分建立的Fisher判别函数对于全同胞、祖孙、叔侄(姨甥)、第一代堂表亲关系的错判率分别为1.3%、22.3%、17.0%、38.7%。基于10000对模拟样本的IBS评分分布,推荐使用t_1=128、t_2=141作为全同胞判定的IBS阈值(错判率≤0.05%)。结论 Precision ID Identity Panel包含的90个SNP遗传标记可满足全同胞关系的鉴定要求,基于IBS评分的阈值法的错判率更低,使用更加灵活。展开更多
目的推导通过STR等位基因频率计算无关个体对间状态一致性(identity by state,IBS)评分概率分布的计算公式。方法比较两名无关个体间某一STR基因座的基因型可以得到三种相互排斥的组合:(1)有2个相同的等位基因,此时令a_2=1(否则a_2=0);...目的推导通过STR等位基因频率计算无关个体对间状态一致性(identity by state,IBS)评分概率分布的计算公式。方法比较两名无关个体间某一STR基因座的基因型可以得到三种相互排斥的组合:(1)有2个相同的等位基因,此时令a_2=1(否则a_2=0);(2)有1个相同的等位基因,此时令a_1=1(否则a_1=0);(3)有0个相同的等位基因,此时令a_0=1(否则a_0=0);则该无关个体对在这1个STR基因座的IBS评分可采用ibs=2a_2+a_1计算。推导通过STR等位基因频率分别计算a_2=1、a_1=1和a_0=1的概率(p_2、p_1和p0)和的通用表达式,继而当该无关个体对得到n个相互独立的STR基因座分型结果时,可通过p_(2l)和P_(1l)计算该多重分型系统IBS评分的二项分布参数(l=1,2,…,n)。结果从p_2、p_1和p_0的基本概念出发,以f_i表示STR基因座第i个等位基因的频率(i=1,2,…,m),则p_2的通用计算公式为p_2=2(sum(f_i^2) from i=1 to m)~2-sum(f_i^4) from i=1 to m;p_1的通用计算公式为P_1=4sum(f_i^2) from i=1 to m-4sum(f_i^3) from i=1 to m+4sum(f_i^4) from i=1 to m;p_0的通用计算公式为p_0=1-4sum(f_i^2) from i=1 to m+2(sum(f_i^2) from i=1 to m)~2+4sum(f_i^3) from i=1 to m-3sum(f_i^4) from i=1 to m,p_2、p_1、p_0的和为1。IBS评分符合二项分布:IBS~B(2n,π)。其中总体率π的通用计算公式为π=1/n sum(p_(2l)) from l=1 to m+1/2n sum(p_(1l)) from l=1 to m。结论生物学全同胞鉴定中的原假设为两名被鉴定人系无关个体,对任意IBS评分所对应的原假设概率均可通过本文所推导的公式进行直接计算,计算结果是进行证据解释的基础。展开更多
目的推导基于常染色体复等位基因遗传标记人群数据计算各种亲缘关系个体间累积状态一致性(combined identity by state,CIBS)评分的概率分布公式。方法基于ITO法原理,推导两个体于不同亲缘关系情形下,在单一位点出现不同状态一致性(iden...目的推导基于常染色体复等位基因遗传标记人群数据计算各种亲缘关系个体间累积状态一致性(combined identity by state,CIBS)评分的概率分布公式。方法基于ITO法原理,推导两个体于不同亲缘关系情形下,在单一位点出现不同状态一致性(identity by state,IBS)评分的可能性;基于多项分布理论,推导应用特定数量遗传标记进行亲缘关系鉴定时,不同亲缘关系下两个体间CIBS评分的概率分布公式,并对上述公式与基于二项分布的CIBS评分概率分布公式进行对比。结果具有特定关系(relationship,标记为RS)的个体对在指定常染色体遗传标记x上出现IBS=2、1和0的概率(即p2(RSx)、p1(RSx)和p0(RSx)),可基于该遗传标记上等位基因频率数据和具有对应RS的两个体间存在0个、1个和2个血缘一致性(identity by descent,IBD)等位基因的可能性(即φ0、φ1和φ2)推导得来。对于包含多个独立遗传标记的分型系统,可基于多项分布理论,用所有遗传标记上这3个概率的平均值(即p2(RS)、p1(RS)和p0(RS))推算得到除亲子关系外特定关系个体对的CIBS评分分布规律。结论CIBS评分概率分布公式的计算可以推广到所有亲缘关系,并在个案解读、系统效能评价等方面有较大应用价值。在多数情况下,基于二项分布的CIBS评分概率分布公式结果与本研究推导公式相近,故两种方法的选择对实际工作的影响不大。展开更多
In this paper,we study normalized solutions of the Chern-Simons-Schrödinger system with general nonlinearity and a potential in H^(1)(ℝ^(2)).When the nonlinearity satisfies some general 3-superlinear conditions,w...In this paper,we study normalized solutions of the Chern-Simons-Schrödinger system with general nonlinearity and a potential in H^(1)(ℝ^(2)).When the nonlinearity satisfies some general 3-superlinear conditions,we obtain the existence of ground state normalized solutions by using the minimax procedure proposed by Jeanjean in[L.Jeanjean,Existence of solutions with prescribed norm for semilinear elliptic equations,Nonlinear Anal.(1997)].展开更多
In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the ...In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the sim-plified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption(IBE) with Anonymous Key Issuing(AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow.展开更多
基金Project supported by the National Natural Science Foundation of China (Grant Nos 60572071 and 60873101)Natural Science Foundation of Jiangsu Province (Grant Nos BM2006504, BK2007104 and BK2008209)College Natural Science Foundation of Jiangsu Province (Grant No 06KJB520137)
文摘A novel efficient deterministic secure quantum communication scheme based on four-qubit cluster states and single-photon identity authentication is proposed. In this scheme, the two authenticated users can transmit two bits of classical information per cluster state, and its efficiency of the quantum communication is 1/3, which is approximately 1.67 times that of the previous protocol presented by Wang et al [Chin. Phys. Lett. 23 (2006) 2658]. Security analysis shows the present scheme is secure against intercept-resend attack and the impersonator's attack. Furthermore, it is more economic with present-day techniques and easily processed by a one-way quantum computer.
基金supported by the National High-Tech Research,Development Plan of China (Grant Nos 2006AA01Z440,2009AA012441 and 2009AA012437)National Basic Research Program of China (973 Program) (Grant No 2007CB311100)+5 种基金the National Natural Science Foundation of China (Grant Nos 60873191 and 60821001)the Scientific Research Common Program of Beijing Municipal Commission of Education (Grant No KM200810005004)Beijing Natural Science Foundation (Grant No 1093015)the Open Research Fund of National Mobile Communications Research Laboratory,Southeast Universitythe ISN Open FoundationScience and Technology Program of Beijing (Grant No Z07000100720706)
文摘A multiparty simultaneous quantum identity authentication protocol based on Creenberger-Horne-Zeilinger (GHZ) states is proposed. The multi-user can be authenticated by a trusted third party (TTP) simultaneously. Compared with the scheme proposed recently (Wang et al 2006 Chin. Phys. Lett. 23(9) 2360), the proposed scheme has the advantages of consuming fewer quantum and classical resources and lessening the difficulty and intensity of necessary operations.
基金supported by the National Natural Science Foundation of China(Grant Nos.11175113 and 11275123)
文摘We study the optical field's quadrature excitation state Xm 10), where X = (a + at)/x/2 is the quadrature operator. We find it is ascribed to the Hermite-polynomial excitation state. For the first time, we determine this state's normalization constant which turns out to be a Laguerre polynomial. This is due to the integration method within the ordered product of operators (IWOP). The normalization for the two-mode quadrature excitation state is also completed by virtue of the entangled state representation.
基金supported by the National Natural Science Foundation of China (Grant No. 11174114)the Natural Science Foundation of the Jiangsu Higher Education Institutions of China (Grant No. 12KJD140001)the Research Foundation of Changzhou Institute of Technology of China (Grant No. YN1106)
文摘By virtue of the entangled state representation we concisely derive some new operator identities with regard to the two-variable Hermite polynomial (TVHP). By them and the technique of integration within an ordered product (IWOP) of operators we further derive new generating function formulas of the TVHP. They are useful in quantum optical theoretical calculations. It is seen from this work that by combining the IWOP technique and quantum mechanical representations one can derive some new integration formulas even without really performing the integration.
文摘The article is devoted to the struggle for identity which has been intensified in the Russian social media in 2014 both on interpretation of the historical past and on the up-to-date situation, especially, Crimea events. Authors suppose that as a result social media become a means of manipulation more than independent space with rizhoma nature. In 2011-2012 social media were the space of struggle between authority and political opposition. Today space of social media is looking polarized regarding polarization of society in respect of political order and Putin political course.
文摘目的评估单核苷酸多态性(single nucleotide polymorphism,SNP)分型结合状态一致性(identity by state,IBS)分析策略进行全同胞鉴定的效能。方法收集一个四代家系共35个成员的血样,采用Precision ID Identity Panel对90个常染色体SNP进行分型。统计并比较全同胞与其他亲缘关系IBS评分分布的差异,分别采用Fisher判别函数法和阈值法进行各种亲缘关系判定。结果基于家系和前期研究,分别获得全同胞、祖孙、叔侄(姨甥)、第一代堂表亲关系共44、30、111、71对以及无关个体1000对,平均IBS评分分别为148、130、132、124、120。除祖孙与叔侄(姨甥)关系外,其余关系之间的IBS评分差异均有统计学意义(P<0.05)。基于IBS评分建立的Fisher判别函数对于全同胞、祖孙、叔侄(姨甥)、第一代堂表亲关系的错判率分别为1.3%、22.3%、17.0%、38.7%。基于10000对模拟样本的IBS评分分布,推荐使用t_1=128、t_2=141作为全同胞判定的IBS阈值(错判率≤0.05%)。结论 Precision ID Identity Panel包含的90个SNP遗传标记可满足全同胞关系的鉴定要求,基于IBS评分的阈值法的错判率更低,使用更加灵活。
文摘目的推导通过STR等位基因频率计算无关个体对间状态一致性(identity by state,IBS)评分概率分布的计算公式。方法比较两名无关个体间某一STR基因座的基因型可以得到三种相互排斥的组合:(1)有2个相同的等位基因,此时令a_2=1(否则a_2=0);(2)有1个相同的等位基因,此时令a_1=1(否则a_1=0);(3)有0个相同的等位基因,此时令a_0=1(否则a_0=0);则该无关个体对在这1个STR基因座的IBS评分可采用ibs=2a_2+a_1计算。推导通过STR等位基因频率分别计算a_2=1、a_1=1和a_0=1的概率(p_2、p_1和p0)和的通用表达式,继而当该无关个体对得到n个相互独立的STR基因座分型结果时,可通过p_(2l)和P_(1l)计算该多重分型系统IBS评分的二项分布参数(l=1,2,…,n)。结果从p_2、p_1和p_0的基本概念出发,以f_i表示STR基因座第i个等位基因的频率(i=1,2,…,m),则p_2的通用计算公式为p_2=2(sum(f_i^2) from i=1 to m)~2-sum(f_i^4) from i=1 to m;p_1的通用计算公式为P_1=4sum(f_i^2) from i=1 to m-4sum(f_i^3) from i=1 to m+4sum(f_i^4) from i=1 to m;p_0的通用计算公式为p_0=1-4sum(f_i^2) from i=1 to m+2(sum(f_i^2) from i=1 to m)~2+4sum(f_i^3) from i=1 to m-3sum(f_i^4) from i=1 to m,p_2、p_1、p_0的和为1。IBS评分符合二项分布:IBS~B(2n,π)。其中总体率π的通用计算公式为π=1/n sum(p_(2l)) from l=1 to m+1/2n sum(p_(1l)) from l=1 to m。结论生物学全同胞鉴定中的原假设为两名被鉴定人系无关个体,对任意IBS评分所对应的原假设概率均可通过本文所推导的公式进行直接计算,计算结果是进行证据解释的基础。
文摘目的推导基于常染色体复等位基因遗传标记人群数据计算各种亲缘关系个体间累积状态一致性(combined identity by state,CIBS)评分的概率分布公式。方法基于ITO法原理,推导两个体于不同亲缘关系情形下,在单一位点出现不同状态一致性(identity by state,IBS)评分的可能性;基于多项分布理论,推导应用特定数量遗传标记进行亲缘关系鉴定时,不同亲缘关系下两个体间CIBS评分的概率分布公式,并对上述公式与基于二项分布的CIBS评分概率分布公式进行对比。结果具有特定关系(relationship,标记为RS)的个体对在指定常染色体遗传标记x上出现IBS=2、1和0的概率(即p2(RSx)、p1(RSx)和p0(RSx)),可基于该遗传标记上等位基因频率数据和具有对应RS的两个体间存在0个、1个和2个血缘一致性(identity by descent,IBD)等位基因的可能性(即φ0、φ1和φ2)推导得来。对于包含多个独立遗传标记的分型系统,可基于多项分布理论,用所有遗传标记上这3个概率的平均值(即p2(RS)、p1(RS)和p0(RS))推算得到除亲子关系外特定关系个体对的CIBS评分分布规律。结论CIBS评分概率分布公式的计算可以推广到所有亲缘关系,并在个案解读、系统效能评价等方面有较大应用价值。在多数情况下,基于二项分布的CIBS评分概率分布公式结果与本研究推导公式相近,故两种方法的选择对实际工作的影响不大。
基金Supported by the National Natural Science Foundation of China (11971393).
文摘In this paper,we study normalized solutions of the Chern-Simons-Schrödinger system with general nonlinearity and a potential in H^(1)(ℝ^(2)).When the nonlinearity satisfies some general 3-superlinear conditions,we obtain the existence of ground state normalized solutions by using the minimax procedure proposed by Jeanjean in[L.Jeanjean,Existence of solutions with prescribed norm for semilinear elliptic equations,Nonlinear Anal.(1997)].
文摘In ACM'CCS 2009,Camenisch,et al.proposed the Oblivious Transfer with Access Control(AC-OT) in which each item is associated with an attribute set and can only be available,on request,to the users who have all the attributes in the associated set.Namely,AC-OT achieves access control policy for conjunction of attributes.Essentially,the functionality of AC-OT is equivalent to the sim-plified version that we call AC-OT-SV:for each item,one attribute is associated with it,and it is requested that only the users who possess the associated attribute can obtain the item by queries.On one hand,AC-OT-SV is a special case of AC-OT when there is just one associated attribute with each item.On the other hand,any AC-OT can be realized by an AC-OT-SV.In this paper,we first present a concrete AC-OT-SV protocol which is proved to be secure in the model defined by Camenisch,et al..Then from the protocol,interestingly,a concrete Identity-Based Encryption(IBE) with Anonymous Key Issuing(AKI) is given which is just a direct application to AC-OT-SV.By comparison,we show that the AKI protocol we present is more efficient in communications than that proposed by Chow.