期刊文献+
共找到49,263篇文章
< 1 2 250 >
每页显示 20 50 100
Scheme for Teleportation of Unknown Entangled Atomic States via Cavity Decay 被引量:1
1
作者 ZHANG Li-Hua XUE Zheng-Yuan +1 位作者 YANG Ming CAO Zhuo-Liang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2006年第4X期610-612,共3页
We present a physical scheme to teleport an unknown atomic entangled state via cavity decay. In the teleportation process, four-particle Greenberger-Horne-Zeilinger (GHZ) state is used as quantum channel, and two un... We present a physical scheme to teleport an unknown atomic entangled state via cavity decay. In the teleportation process, four-particle Greenberger-Horne-Zeilinger (GHZ) state is used as quantum channel, and two unknown entangled atoms and two of four atoms in the four-particle GHZ state are trapped in four leaky cavities, respectively. Based on the joint detection of the photons leak out from the four cavities, we can teleport an unknown entangled state to two other remote atoms with certain probability and high fidelity. 展开更多
关键词 TELEPORTATION atomic entangled state cavity decay
下载PDF
Scheme for Controlled Dense Coding via Cavity Decay 被引量:1
2
作者 YANG Rong-Can LI Hong-Cai LIN Xiu HUANG Zhi-Ping School of Physics and OptoElectronic Technology,Fujian Normal University,Fuzhou 35007,China 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第7期48-52,共5页
A scheme for controlled dense coding via cavity decay is proposed.In the scheme,two degenerate groundstates of six-level atoms are used as the storage qubits and the leaky photons act as flying qubits.The system isrob... A scheme for controlled dense coding via cavity decay is proposed.In the scheme,two degenerate groundstates of six-level atoms are used as the storage qubits and the leaky photons act as flying qubits.The system isrobust against atomic spontaneous emissions and decoherence of cavity field.And the successful probability is nearly1 with quantum nondemolition parity detectors and photon detectors.The scheme may be realized based on currenttechnologies. 展开更多
关键词 controlled dense coding cavity decay quantum nondemolition parity detectors
下载PDF
INTERFACE BEHAVIOR AND DECAY RATES OF COMPRESSIBLE NAVIER-STOKES SYSTEM WITH DENSITY-DEPENDENT VISCOSITY AND A VACUUM 被引量:1
3
作者 郭真华 张学耀 《Acta Mathematica Scientia》 SCIE CSCD 2024年第1期247-274,共28页
In this paper,we study the one-dimensional motion of viscous gas near a vacuum,with the gas connecting to a vacuum state with a jump in density.The interface behavior,the pointwise decay rates of the density function ... In this paper,we study the one-dimensional motion of viscous gas near a vacuum,with the gas connecting to a vacuum state with a jump in density.The interface behavior,the pointwise decay rates of the density function and the expanding rates of the interface are obtained with the viscosity coefficientμ(ρ)=ρ^(α)for any 0<α<1;this includes the timeweighted boundedness from below and above.The smoothness of the solution is discussed.Moreover,we construct a class of self-similar classical solutions which exhibit some interesting properties,such as optimal estimates.The present paper extends the results in[Luo T,Xin Z P,Yang T.SIAM J Math Anal,2000,31(6):1175-1191]to the jump boundary conditions case with density-dependent viscosity. 展开更多
关键词 decay rates INTERFACE Navier-Stokes equations VACUUM
下载PDF
Construction of a Computational Scheme for the Fuzzy HIV/AIDS Epidemic Model with a Nonlinear Saturated Incidence Rate 被引量:1
4
作者 Muhammad Shoaib Arif Kamaleldin Abodayeh Yasir Nawaz 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第2期1405-1425,共21页
This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemi... This work aimed to construct an epidemic model with fuzzy parameters.Since the classical epidemic model doesnot elaborate on the successful interaction of susceptible and infective people,the constructed fuzzy epidemicmodel discusses the more detailed versions of the interactions between infective and susceptible people.Thenext-generation matrix approach is employed to find the reproduction number of a deterministic model.Thesensitivity analysis and local stability analysis of the systemare also provided.For solving the fuzzy epidemic model,a numerical scheme is constructed which consists of three time levels.The numerical scheme has an advantage overthe existing forward Euler scheme for determining the conditions of getting the positive solution.The establishedscheme also has an advantage over existing non-standard finite difference methods in terms of order of accuracy.The stability of the scheme for the considered fuzzy model is also provided.From the plotted results,it can beobserved that susceptible people decay by rising interaction parameters. 展开更多
关键词 Epidemic model fuzzy rate parameters next generation matrix local stability proposed numerical scheme
下载PDF
On the Use of Monotonicity-Preserving Interpolatory Techniques in Multilevel Schemes for Balance Laws
5
作者 Antonio Baeza Rosa Donat Anna Martinez-Gavara 《Communications on Applied Mathematics and Computation》 EI 2024年第2期1319-1341,共23页
Cost-effective multilevel techniques for homogeneous hyperbolic conservation laws are very successful in reducing the computational cost associated to high resolution shock capturing numerical schemes.Because they do ... Cost-effective multilevel techniques for homogeneous hyperbolic conservation laws are very successful in reducing the computational cost associated to high resolution shock capturing numerical schemes.Because they do not involve any special data structure,and do not induce savings in memory requirements,they are easily implemented on existing codes and are recommended for 1D and 2D simulations when intensive testing is required.The multilevel technique can also be applied to balance laws,but in this case,numerical errors may be induced by the technique.We present a series of numerical tests that point out that the use of monotonicity-preserving interpolatory techniques eliminates the numerical errors observed when using the usual 4-point centered Lagrange interpolation,and leads to a more robust multilevel code for balance laws,while maintaining the efficiency rates observed forhyperbolic conservation laws. 展开更多
关键词 Hyperbolic balance laws Well-balanced schemes Multilevel schemes Harten's multiresolution
下载PDF
Generalized Quantum Measurement in Spin-Correlated Hyperon-Antihyperon Decays
6
作者 Sihao Wu Chen Qian +1 位作者 Yang-Guang Yang Qun Wang 《Chinese Physics Letters》 SCIE EI CAS CSCD 2024年第11期1-11,共11页
The rapid developments of quantum information science(QIS)have opened up new avenues for exploring fundamental physics.Quantum nonlocality,a key aspect for distinguishing quantum information from classical one,has und... The rapid developments of quantum information science(QIS)have opened up new avenues for exploring fundamental physics.Quantum nonlocality,a key aspect for distinguishing quantum information from classical one,has undergone extensive examinations in particles’decays through the violation of Bell-type inequalities.Despite these advancements,a comprehensive framework based on quantum information theory for particle interaction is still lacking.Trying to close this gap,we introduce a generalized quantum measurement description for decay processes of spin-1/2 hyperons.We validate this approach by aligning it with established theoretical calculations and apply it to the joint decay of ΛΛ pairs.We employ quantum simulation to observe the violation of Clauser–Horne–Shimony–Holt inequalities in η_(c)/χ_(c0)→ΛΛˉprocesses.Our generalized measurement description is adaptable and can be extended to a variety of high energy processes,including decays of vector mesons,J/ψ,ψ(2S)→ΛΛ,in the Beijing Spectrometer Ⅲ(BESⅢ)experiment at the Beijing Electron Positron Collider(BEPC).The methodology developed in this study can be applied to quantum correlation and information processing in fundamental interactions. 展开更多
关键词 quantum BESⅢ decay
下载PDF
An Arbitrarily High Order and Asymptotic Preserving Kinetic Scheme in Compressible Fluid Dynamic
7
作者 Remi Abgrall Fatemeh Nassajian Mojarrad 《Communications on Applied Mathematics and Computation》 EI 2024年第2期963-991,共29页
We present a class of arbitrarily high order fully explicit kinetic numerical methods in compressible fluid dynamics,both in time and space,which include the relaxation schemes by Jin and Xin.These methods can use the... We present a class of arbitrarily high order fully explicit kinetic numerical methods in compressible fluid dynamics,both in time and space,which include the relaxation schemes by Jin and Xin.These methods can use the CFL number larger or equal to unity on regular Cartesian meshes for the multi-dimensional case.These kinetic models depend on a small parameter that can be seen as a"Knudsen"number.The method is asymptotic preserving in this Knudsen number.Also,the computational costs of the method are of the same order of a fully explicit scheme.This work is the extension of Abgrall et al.(2022)[3]to multidimensional systems.We have assessed our method on several problems for two-dimensional scalar problems and Euler equations and the scheme has proven to be robust and to achieve the theoretically predicted high order of accuracy on smooth solutions. 展开更多
关键词 Kinetic scheme Compressible fluid dynamics High order methods Explicit schemes Asymptotic preserving Defect correction method
下载PDF
S-scheme heterojunction with ultrafast interfacial electron transfer for artificial photosynthesis
8
作者 Sihang Mao Rongan He Shaoqing Song 《Chinese Journal of Catalysis》 SCIE CAS CSCD 2024年第9期1-3,共3页
The rapid development of the global economy has led to the over-exploitation and burning of fossil fuels,causing a severe energy crisis and continuous CO_(2) emissions.Although solar energy is a clean and renewable re... The rapid development of the global economy has led to the over-exploitation and burning of fossil fuels,causing a severe energy crisis and continuous CO_(2) emissions.Although solar energy is a clean and renewable resource,it faces significant diurnal and seasonal variations and is difficult to store[1-4].Converting solar energy into storable chemical energy through photocatalysis is an effective way to address both energy scarcity and environmental issues.Photocatalytic CO_(2) reduction,with the development of high-efficiency photocatalysts as the key,offers a clean and environmentally friendly method to convert CO_(2) into valuable hydrocarbon fuels,providing a viable solution to the global energy crisis and climate change[5,6]. 展开更多
关键词 CONVERT STORE scheme
下载PDF
Orbit Weighting Scheme in the Context of Vector Space Information Retrieval
9
作者 Ahmad Ababneh Yousef Sanjalawe +2 位作者 Salam Fraihat Salam Al-E’mari Hamzah Alqudah 《Computers, Materials & Continua》 SCIE EI 2024年第7期1347-1379,共33页
This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schem... This study introduces the Orbit Weighting Scheme(OWS),a novel approach aimed at enhancing the precision and efficiency of Vector Space information retrieval(IR)models,which have traditionally relied on weighting schemes like tf-idf and BM25.These conventional methods often struggle with accurately capturing document relevance,leading to inefficiencies in both retrieval performance and index size management.OWS proposes a dynamic weighting mechanism that evaluates the significance of terms based on their orbital position within the vector space,emphasizing term relationships and distribution patterns overlooked by existing models.Our research focuses on evaluating OWS’s impact on model accuracy using Information Retrieval metrics like Recall,Precision,InterpolatedAverage Precision(IAP),andMeanAverage Precision(MAP).Additionally,we assessOWS’s effectiveness in reducing the inverted index size,crucial for model efficiency.We compare OWS-based retrieval models against others using different schemes,including tf-idf variations and BM25Delta.Results reveal OWS’s superiority,achieving a 54%Recall and 81%MAP,and a notable 38%reduction in the inverted index size.This highlights OWS’s potential in optimizing retrieval processes and underscores the need for further research in this underrepresented area to fully leverage OWS’s capabilities in information retrieval methodologies. 展开更多
关键词 Information retrieval orbit weighting scheme semantic text analysis Tf-Idf weighting scheme vector space model
下载PDF
MINIMIZERS OF L^(2)-SUBCRITICAL VARIATIONAL PROBLEMS WITH SPATIALLY DECAYING NONLINEARITIES IN BOUNDED DOMAINS
10
作者 陈彬 高永帅 +1 位作者 郭玉劲 吴越 《Acta Mathematica Scientia》 SCIE CSCD 2024年第3期984-996,共13页
This paper is concerned with the minimizers of L^(2)-subcritical constraint variar tional problems with spatially decaying nonlinearities in a bounded domain Ω of R~N(N≥1).We prove that the problem admits minimizers... This paper is concerned with the minimizers of L^(2)-subcritical constraint variar tional problems with spatially decaying nonlinearities in a bounded domain Ω of R~N(N≥1).We prove that the problem admits minimizers for any M> 0.Moreover,the limiting behavior of minimizers as M→∞ is also analyzed rigorously. 展开更多
关键词 decaying nonlinearity L~2-subcritical MINIMIZERS bounded domains mass concentration
下载PDF
Decoding the fruit microbiome:A climate smart strategy to manage postharvest decays
11
作者 Manori Kuruppu Kong Lih Ling +3 位作者 Phebe Ding Khairulmazmi Ahmad Asgar Ali Yasmeen Siddiqui 《Horticultural Plant Journal》 SCIE CAS CSCD 2024年第5期1061-1072,共12页
There is an urgent necessity to shift our diets toward those rich in fruits and vegetables and at reduce postharvest losses of perishables.Approximately 20%-50%of fruits and vegetables are lost due to poor postharvest... There is an urgent necessity to shift our diets toward those rich in fruits and vegetables and at reduce postharvest losses of perishables.Approximately 20%-50%of fruits and vegetables are lost due to poor postharvest handling and pathogen infections in developing countries while it was estimated as 5%-35%in developed countries. Fresh fruits have evolved with a plethora of microorganisms having important roles in maintaining fruit health. However, little information is available on the dynamics, structure, and functional capacities of underpinning fruit microbiomes. The present review discussed environmental conditions favoring fruit-harbored antagonists and their different modes of action for suppressing postharvest pathogens in fruits. It also provides information on omics technologies such as next-generation sequencing (NGS),metaproteomics, metatranscriptomic, and metabolomics studies to characterize fruit microbiomes. With the advent of NGS and meta-omics technologies, microbiome research could bring remarkable development and understanding in succeeding biological treatments. In addition, they may provide us with a fundamental understanding of microclimate requirements for fruit microbiome establishment and microbiome shifts during post-harvest storage, which would be advantageous in developing composite biocontrol treatments for post-harvest decay management. 展开更多
关键词 Biological control Food loss Fruit microbiome Meta-omics MICROCLIMATE Postharvest decay
下载PDF
αDecay in extreme laser fields within a deformed Gamow-like model
12
作者 Qiong Xiao Jun-Hao Cheng +3 位作者 Yang-Yang Xu You-Tian Zou Jun-Gang Deng Tong-Pu Yu 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第2期131-144,共14页
In this study, the effect of extreme laser fields on the α decay process of ground-state even–even nuclei was investigated.Using the deformed Gamow-like model, we found that state-of-the-art lasers can cause a sligh... In this study, the effect of extreme laser fields on the α decay process of ground-state even–even nuclei was investigated.Using the deformed Gamow-like model, we found that state-of-the-art lasers can cause a slight change in the α decay penetration probability of most nuclei. In addition, we studied the correlation between the rate of change of the α decay penetration probability and angle between the directions of the laser electric field and α particle emission for different nuclei. Based on this correlation, the average effect of extreme laser fields on the half-life of many nuclei with arbitrary α particle emission angles was calculated. The calculations show that the laser suppression and promotion effects on the α decay penetration probability of the nuclei population with completely random α particle-emission directions are not completely canceled.The remainder led to a change in the average penetration probability of the nuclei. Furthermore, the possibility of achieving a higher average rate of change by altering the spatial shape of the laser is explored. We conclude that circularly polarized lasers may be helpful in future experiments to achieve a more significant average rate of change of the α decay half-life of the nuclei population. 展开更多
关键词 αdecay Deformed Gamow-like model HALF-LIVES Extreme laser field Penetration probability
下载PDF
Deployment Dynamic Modeling and Driving Schemes for a Ring-Truss Deployable Antenna
13
作者 Baiyan He Lijun Jia +3 位作者 Kangkang Li Rui Nie Yesen Fan Guobiao Wang 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2024年第4期163-182,共20页
Mesh reflector antennas are widely used in space tasks owing to their light weight,high surface accuracy,and large folding ratio.They are stowed during launch and then fully deployed in orbit to form a mesh reflector ... Mesh reflector antennas are widely used in space tasks owing to their light weight,high surface accuracy,and large folding ratio.They are stowed during launch and then fully deployed in orbit to form a mesh reflector that transmits signals.Smooth deployment is essential for duty services;therefore,accurate and efficient dynamic modeling and analysis of the deployment process are essential.One major challenge is depicting time-varying resistance of the cable network and capturing the cable-truss coupling behavior during the deployment process.This paper proposes a general dynamic analysis methodology for cable-truss coupling.Considering the topological diversity and geometric nonlinearity,the cable network's equilibrium equation is derived,and an explicit expression of the time-varying tension of the boundary cables,which provides the main resistance in truss deployment,is obtained.The deployment dynamic model is established,which considers the coupling effect between the soft cables and deployable truss.The effects of the antenna's driving modes and parameters on the dynamic deployment performance were investigated.A scaled prototype was manufactured,and the deployment experiment was conducted to verify the accuracy of the proposed modeling method.The proposed methodology is suitable for general cable antennas with arbitrary topologies and parameters,providing theoretical guidance for the dynamic performance evaluation of antenna driving schemes. 展开更多
关键词 Cable antenna Deployment dynamics Performance evaluation Driving scheme Deployable structure
下载PDF
Improvement and security analysis of multi-ring discrete modulation continuous variable quantum secret sharing scheme
14
作者 姜欢窈 聂敏 +3 位作者 杨光 孙爱晶 张美玲 裴昌幸 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期189-197,共9页
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos... In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value. 展开更多
关键词 discrete modulation continuous variable quantum secret sharing scheme
下载PDF
A Non-Parametric Scheme for Identifying Data Characteristic Based on Curve Similarity Matching
15
作者 Quanbo Ge Yang Cheng +3 位作者 Hong Li Ziyi Ye Yi Zhu Gang Yao 《IEEE/CAA Journal of Automatica Sinica》 SCIE EI CSCD 2024年第6期1424-1437,共14页
For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the... For accurately identifying the distribution charac-teristic of Gaussian-like noises in unmanned aerial vehicle(UAV)state estimation,this paper proposes a non-parametric scheme based on curve similarity matching.In the framework of the pro-posed scheme,a Parzen window(kernel density estimation,KDE)method on sliding window technology is applied for roughly esti-mating the sample probability density,a precise data probability density function(PDF)model is constructed with the least square method on K-fold cross validation,and the testing result based on evaluation method is obtained based on some data characteristic analyses of curve shape,abruptness and symmetry.Some com-parison simulations with classical methods and UAV flight exper-iment shows that the proposed scheme has higher recognition accuracy than classical methods for some kinds of Gaussian-like data,which provides better reference for the design of Kalman filter(KF)in complex water environment. 展开更多
关键词 Curve similarity matching Gaussian-like noise non-parametric scheme parzen window.
下载PDF
A Neural-network-based Alternative Scheme to Include Nonhydrostatic Processes in an Atmospheric Dynamical Core
16
作者 Yang XIA Bin WANG +13 位作者 Lijuan LI Li LIU Jianghao LI Li DONG Shiming XU Yiyuan LI Wenwen XIA Wenyu HUANG Juanjuan LIU Yong WANG Hongbo LIU Ye PU Yujun HE Kun XIA 《Advances in Atmospheric Sciences》 SCIE CAS CSCD 2024年第6期1083-1099,I0002,I0003,共19页
Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostat... Here,a nonhydrostatic alternative scheme(NAS)is proposed for the grey zone where the nonhydrostatic impact on the atmosphere is evident but not large enough to justify the necessity to include an implicit nonhydrostatic solver in an atmospheric dynamical core.The NAS is designed to replace this solver,which can be incorporated into any hydrostatic models so that existing well-developed hydrostatic models can effectively serve for a longer time.Recent advances in machine learning(ML)provide a potential tool for capturing the main complicated nonlinear-nonhydrostatic relationship.In this study,an ML approach called a neural network(NN)was adopted to select leading input features and develop the NAS.The NNs were trained and evaluated with 12-day simulation results of dry baroclinic-wave tests by the Weather Research and Forecasting(WRF)model.The forward time difference of the nonhydrostatic tendency was used as the target variable,and the five selected features were the nonhydrostatic tendency at the last time step,and four hydrostatic variables at the current step including geopotential height,pressure in two different forms,and potential temperature,respectively.Finally,a practical NAS was developed with these features and trained layer by layer at a 20-km horizontal resolution,which can accurately reproduce the temporal variation and vertical distribution of the nonhydrostatic tendency.Corrected by the NN-based NAS,the improved hydrostatic solver at different horizontal resolutions can run stably for at least one month and effectively reduce most of the nonhydrostatic errors in terms of system bias,anomaly root-mean-square error,and the error of the wave spatial pattern,which proves the feasibility and superiority of this scheme. 展开更多
关键词 neural network nonhydrostatic alternative scheme atmospheric model dynamical core
下载PDF
Structure and 2p decay mechanism of^(18)Mg
17
作者 Long Zhou De-Qing Fang +1 位作者 Si-Min Wang Hui Hua 《Nuclear Science and Techniques》 SCIE EI CAS CSCD 2024年第6期145-154,共10页
The recently discovered,extremely proton-rich nuclide 18 Mg exhibits ground-state decay via two sequential two-proton(2p)emissions through the intermediate nucleus,16Ne.This study investigates the structure and the in... The recently discovered,extremely proton-rich nuclide 18 Mg exhibits ground-state decay via two sequential two-proton(2p)emissions through the intermediate nucleus,16Ne.This study investigates the structure and the initial 2p decay mechanism of^(18)Mgby examining the density and correlations of the valence protons using a three-body Gamow coupled-channel method.The results show that the ground state of^(18)Mgis significantly influenced by the continuum,resulting in a significant s-wave component.However,based on the current framework,this does not lead to a significant deviation in mirror symmetry in either the structure or spectroscopy of the 18Mg-18C pair.Additionally,the time evolution analysis of the^(18)Mgground state suggests a simultaneous 2p emission during the first step of decay.The observed nucleon-nucleon correlations align with those of the light-mass 2p emitters,indicating a consistent decay behavior within this nuclear region. 展开更多
关键词 Structure of^(18)Mg Two-proton decay Proton-proton correlation
下载PDF
Verifiable quantum secret sharing scheme based on orthogonal product states
18
作者 白晨明 刘璐 张素娟 《Chinese Physics B》 SCIE EI CAS CSCD 2024年第7期178-187,共10页
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc... In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol. 展开更多
关键词 quantum secret sharing quantum product state threshold scheme unitary operations
下载PDF
Quantum-Resistant Multi-Feature Attribute-Based Proxy Re-Encryption Scheme for Cloud Services
19
作者 Jinqiu Hou Changgen Peng +1 位作者 Weijie Tan Hongfa Ding 《Computer Modeling in Engineering & Sciences》 SCIE EI 2024年第1期917-938,共22页
Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been ... Cloud-based services have powerful storage functions and can provide accurate computation.However,the question of how to guarantee cloud-based services access control and achieve data sharing security has always been a research highlight.Although the attribute-based proxy re-encryption(ABPRE)schemes based on number theory can solve this problem,it is still difficult to resist quantum attacks and have limited expression capabilities.To address these issues,we present a novel linear secret sharing schemes(LSSS)matrix-based ABPRE scheme with the fine-grained policy on the lattice in the research.Additionally,to detect the activities of illegal proxies,homomorphic signature(HS)technology is introduced to realize the verifiability of re-encryption.Moreover,the non-interactivity,unidirectionality,proxy transparency,multi-use,and anti-quantum attack characteristics of our system are all advantageous.Besides,it can efficiently prevent the loss of processing power brought on by repetitive authorisation and can enable precise and safe data sharing in the cloud.Furthermore,under the standard model,the proposed learning with errors(LWE)-based scheme was proven to be IND-sCPA secure. 展开更多
关键词 LATTICE learning with errors attribute-based proxy re-encryption linear secret sharing schemes
下载PDF
A Practical Regular LDPC Coded Scheme for Physical-Layer Information Security
20
作者 Du Junyi 《China Communications》 SCIE CSCD 2024年第5期190-201,共12页
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L... In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes. 展开更多
关键词 extrinsic information transfer function physical layer scheme secure open channel security gap
下载PDF
上一页 1 2 250 下一页 到第
使用帮助 返回顶部