Based on the principle of information theory, a novel scheme of unequal-interval frequency-hopping (FH) systems was proposed. For cases of spectrum overlapping systems and non-overlapping systems, the implementation m...Based on the principle of information theory, a novel scheme of unequal-interval frequency-hopping (FH) systems was proposed. For cases of spectrum overlapping systems and non-overlapping systems, the implementation methods were presented and the security performances were discussed theoretically. Firstly, the definitions of absolute and relative key amounts of FH systems, equal-interval and unequal-interval FH systems were given. Then, the absolute key amount and relative key amount were analyzed for equal-interval and unequal-interval FH systems. The results indicated that the absolute key amount had become the key point in improving the security and secrecy of FH systems, especially in today's epoch of highly developed computer science and IC design technology. Theoretical analysis and practical examples showed that the absolute key amount of unequal-interval FH systems was generally over two orders larger than that of equal-interval ones when spectrum overlapping was allowable. Therefore, there was great superiority in enhancing the security and secrecy for the scheme mentioned.展开更多
A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicato...A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicators may communicate after they test the security of the quantum channel. The security of the protocol is ensured by quantum entanglement and quantum no-cloning theorem. The receiver can obtain the secret message determinately if the quantum channel is secure.展开更多
A theoretical scheme for multiparty multi-particle state sharing is proposed. After she introduces auxiliary particles and Einstein-Podolsky-Rosen (EPIC) pairs, the sender (Alice) performs Hadamard (14) gate ope...A theoretical scheme for multiparty multi-particle state sharing is proposed. After she introduces auxiliary particles and Einstein-Podolsky-Rosen (EPIC) pairs, the sender (Alice) performs Hadamard (14) gate operations and Controlled-NOT (CNOT) gate operations on them. Subsequently, the sender leaves one particle sequence and distributes the rest particles to the other participants. And then, the sender makes Bell-state measurements on her particles and publishes the measurement outcomes via the classical channel to realize the quantum state sharing among the others. Only the simple operations are used to realize quantum state sharing. The sender may increase or decrease the number of the participants by changing the number of the auxiliary particles.展开更多
The sender shares six-particle maximally entangled states as quantum channel with the receiver. If the quantum channel is secure, the sender performs projective measurements and tells the measurement outcome to the re...The sender shares six-particle maximally entangled states as quantum channel with the receiver. If the quantum channel is secure, the sender performs projective measurements and tells the measurement outcome to the receiver. The receiver performs the unitary transformations and makes projective measurements on his particles to obtain the secret information. Using teleportation, the transmission of three-qubit secret information can be completed in each quantum channel展开更多
To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put...To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.展开更多
In stratified survey sampling, sometimes we have complete auxiliary information. One of the fundamental questions is how to effectively use the complete auxiliary information at the estimation stage. In this paper, we...In stratified survey sampling, sometimes we have complete auxiliary information. One of the fundamental questions is how to effectively use the complete auxiliary information at the estimation stage. In this paper, we extend the model-calibration method to obtain estimators of the finite population mean by using complete auxiliary information from stratified sampling survey data. We show that the resulting estimators effectively use auxiliary information at the estimation stage and possess a number of attractive features such as asymptotically design-unbiased irrespective of the working model and approximately model-unbiased under the model. When a linear working-model is used, the resulting estimators reduce to the usual calibration estimator(or GREG).展开更多
A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encode...A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Fhrthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation.展开更多
Dufuya wetland gardens and Insukamini irrigation scheme in Lower Gweru communal areas of Gweru district are two examples of how rural communities can be self-reliant if they are capacitated. This study sought to compa...Dufuya wetland gardens and Insukamini irrigation scheme in Lower Gweru communal areas of Gweru district are two examples of how rural communities can be self-reliant if they are capacitated. This study sought to compare crop diversity between these two vegetable producing schemes. The location of the two areas and the selected plots were determined using the GPS (global positioning system) hand receiver. Maps of the quadrants were produced in a GIS (geographic information system) on a computer. Simpson's index D = sum (pi2) was used to measure crop diversity while the Shannon-Weiner index (/4) was used to measure crop evenness. Results show that although both schemes are viable, Dufuya Gardens have higher crop diversity than Insukamini irrigation scheme. The study recommends that AGRITEX officers at Insukamini must advise farmers to diversify their crops in order for their produce to be more competitive on the market and also to cushion farmers against the effects of natural hazards. Given the success of the two schemes, the government must seriously consider sustainable utilization of the many small-scale dams and wetlands lying idle across the country for crop production in order to empower poor rural communities as well as alleviate poverty.展开更多
We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our ...We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our scheme simple and safe.The operations which are needed to recover secret message,are only exclusive-or addition and complement operation.Moreover it is shown that this scheme is secure against eavesdropping.Also this scheme provides the best quantum bit efficiency compared with some famous quantum secret sharing schemes.展开更多
In this work, we perform a series of phonon counting measurement with different methods in a 3-mode optomechanical system, and we compare the difference of the entanglement after measurement. In this article we focus ...In this work, we perform a series of phonon counting measurement with different methods in a 3-mode optomechanical system, and we compare the difference of the entanglement after measurement. In this article we focus on the three eases: prefect measurement, imperfect measurement and on-off measurement. We find that whatever measurement you take, the entanglement will increase. The size of entanglement enhancement is the largest in the perfect measurement, second in the imperfect measurement, and it is not obvious in the on-off measurement. We are sure that the more precise measurement information, the larger entanglement concentration.展开更多
Since web services intended for the same application environment tend to be functionally homogeneous, researchers have turned to their non-functional aspects in order to constructively compare web services and choose ...Since web services intended for the same application environment tend to be functionally homogeneous, researchers have turned to their non-functional aspects in order to constructively compare web services and choose an appropriate one. In general, quality of service is very important to users. Many schemes that consider quality assessment have been proposed for web service selection. With the increasing number of qualityrelated attributes, an effective quality assessment method needs satisfactory scalability. Schemes based on the analytic hierarchy process(AHP) meet this requirement. However, prevalent methods in this vein overlook the fact that the traditional AHP needs a complete judgment matrix. In practice, all the information needed to construct a judgment matrix is often unavailable for a variety of reasons, due to which certain judgments cannot be made. In this paper, for an incomplete judgment matrix, we propose an improved AHP approach to consistency verification and the subsequent ordering. Our method can deal with situations where information is insufficient,and inherits all the merits of the traditional AHP approach. A case study establishes the effectiveness of our proposed method.展开更多
文摘Based on the principle of information theory, a novel scheme of unequal-interval frequency-hopping (FH) systems was proposed. For cases of spectrum overlapping systems and non-overlapping systems, the implementation methods were presented and the security performances were discussed theoretically. Firstly, the definitions of absolute and relative key amounts of FH systems, equal-interval and unequal-interval FH systems were given. Then, the absolute key amount and relative key amount were analyzed for equal-interval and unequal-interval FH systems. The results indicated that the absolute key amount had become the key point in improving the security and secrecy of FH systems, especially in today's epoch of highly developed computer science and IC design technology. Theoretical analysis and practical examples showed that the absolute key amount of unequal-interval FH systems was generally over two orders larger than that of equal-interval ones when spectrum overlapping was allowable. Therefore, there was great superiority in enhancing the security and secrecy for the scheme mentioned.
基金National Natural Science Foundation of China under Grant Nos.10647101 and 10704011
文摘A theoretical scheme of quantum secure direct communication using teleportation is proposed. In the scheme, the sender needs to prepare a class of three-particle W states to use as quantum channel. The two communicators may communicate after they test the security of the quantum channel. The security of the protocol is ensured by quantum entanglement and quantum no-cloning theorem. The receiver can obtain the secret message determinately if the quantum channel is secure.
基金The project supported by National Natural Science Foundation of China under Grant Nos.10647101 and 10704011
文摘A theoretical scheme for multiparty multi-particle state sharing is proposed. After she introduces auxiliary particles and Einstein-Podolsky-Rosen (EPIC) pairs, the sender (Alice) performs Hadamard (14) gate operations and Controlled-NOT (CNOT) gate operations on them. Subsequently, the sender leaves one particle sequence and distributes the rest particles to the other participants. And then, the sender makes Bell-state measurements on her particles and publishes the measurement outcomes via the classical channel to realize the quantum state sharing among the others. Only the simple operations are used to realize quantum state sharing. The sender may increase or decrease the number of the participants by changing the number of the auxiliary particles.
基金supported by the National Natural Science Foundation of China under Grant No.10704011the Research Programs of the Educational Office of Liaoning Province under Grant No.2008006
文摘The sender shares six-particle maximally entangled states as quantum channel with the receiver. If the quantum channel is secure, the sender performs projective measurements and tells the measurement outcome to the receiver. The receiver performs the unitary transformations and makes projective measurements on his particles to obtain the secret information. Using teleportation, the transmission of three-qubit secret information can be completed in each quantum channel
基金Supported by the National Natural Science Foundation of China(No.60872041,61072066)Fundamental Research Funds for the Central Universities(JYI0000903001,JYI0000901034)
文摘To resolve the problem of quantitative analysis in hybrid cloud,a quantitative analysis method,which is based on the security entropy,is proposed.Firstly,according to the information theory,the security entropy is put forward to calculate the uncertainty of the system' s determinations on the irregular access behaviors.Secondly,based on the security entropy,security theorems of hybrid cloud are defined.Finally,typical access control models are analyzed by the method,the method's practicability is validated,and security and applicability of these models are compared.Simulation results prove that the proposed method is suitable for the security quantitative analysis of the access control model and evaluation to access control capability in hybrid cloud.
基金Supported by the National Natural Science Foundation of China(10571093)
文摘In stratified survey sampling, sometimes we have complete auxiliary information. One of the fundamental questions is how to effectively use the complete auxiliary information at the estimation stage. In this paper, we extend the model-calibration method to obtain estimators of the finite population mean by using complete auxiliary information from stratified sampling survey data. We show that the resulting estimators effectively use auxiliary information at the estimation stage and possess a number of attractive features such as asymptotically design-unbiased irrespective of the working model and approximately model-unbiased under the model. When a linear working-model is used, the resulting estimators reduce to the usual calibration estimator(or GREG).
基金supported in part by National Natural Science Foundation of China under Grant Nos.60573127,60773012,and 60873082Natural Science Foundation of Hunan Province under Grant Nos.07JJ3128 and 2008RS4016+1 种基金Scientific Research Fund of Hunan Provincial Education Department under Grant No.08B011Postdoctoral Science Foundation of China under Grant Nos.20070420184 and 200801341
文摘A (n, n)-threshold scheme of multiparty quantum secret sharing of classical or quantum message is proposed based on the discrete quantum Fourier transform. In our proposed scheme, the secret message, which is encoded by using the forward quantum Fourier transform and decoded by using the reverse, is split and shared in such a way that it can be reconstructed among them only if all the participants work in concert. Fhrthermore, we also discuss how this protocol must be carefully designed for correcting errors and checking eavesdropping or a dishonest participant. Security analysis shows that our scheme is secure. Also, this scheme has an advantage that it is completely compatible with quantum computation and easier to realize in the distributed quantum secure computation.
文摘Dufuya wetland gardens and Insukamini irrigation scheme in Lower Gweru communal areas of Gweru district are two examples of how rural communities can be self-reliant if they are capacitated. This study sought to compare crop diversity between these two vegetable producing schemes. The location of the two areas and the selected plots were determined using the GPS (global positioning system) hand receiver. Maps of the quadrants were produced in a GIS (geographic information system) on a computer. Simpson's index D = sum (pi2) was used to measure crop diversity while the Shannon-Weiner index (/4) was used to measure crop evenness. Results show that although both schemes are viable, Dufuya Gardens have higher crop diversity than Insukamini irrigation scheme. The study recommends that AGRITEX officers at Insukamini must advise farmers to diversify their crops in order for their produce to be more competitive on the market and also to cushion farmers against the effects of natural hazards. Given the success of the two schemes, the government must seriously consider sustainable utilization of the many small-scale dams and wetlands lying idle across the country for crop production in order to empower poor rural communities as well as alleviate poverty.
文摘We proposed a novel and efficient multiparty quantum secret sharing scheme using entangled state which in that the number of parties can be arbitrary large.The state which we used,has special properties that make our scheme simple and safe.The operations which are needed to recover secret message,are only exclusive-or addition and complement operation.Moreover it is shown that this scheme is secure against eavesdropping.Also this scheme provides the best quantum bit efficiency compared with some famous quantum secret sharing schemes.
文摘In this work, we perform a series of phonon counting measurement with different methods in a 3-mode optomechanical system, and we compare the difference of the entanglement after measurement. In this article we focus on the three eases: prefect measurement, imperfect measurement and on-off measurement. We find that whatever measurement you take, the entanglement will increase. The size of entanglement enhancement is the largest in the perfect measurement, second in the imperfect measurement, and it is not obvious in the on-off measurement. We are sure that the more precise measurement information, the larger entanglement concentration.
基金supported by Key Program of the NSFC-Guangdong Union Foundation(Grant No.U1135002)Major National S&T Program(Grant No.2011ZX03005-002)+5 种基金National Natural Science Foundation of China(Grant Nos.6087204161072066)Fundamental Research Funds for the Central Universities(Grant Nos.JY10000903001JY10000901034K5051203010)GAD Pre-Research Foundation(Grant No.9140A15040210HK61)
文摘Since web services intended for the same application environment tend to be functionally homogeneous, researchers have turned to their non-functional aspects in order to constructively compare web services and choose an appropriate one. In general, quality of service is very important to users. Many schemes that consider quality assessment have been proposed for web service selection. With the increasing number of qualityrelated attributes, an effective quality assessment method needs satisfactory scalability. Schemes based on the analytic hierarchy process(AHP) meet this requirement. However, prevalent methods in this vein overlook the fact that the traditional AHP needs a complete judgment matrix. In practice, all the information needed to construct a judgment matrix is often unavailable for a variety of reasons, due to which certain judgments cannot be made. In this paper, for an incomplete judgment matrix, we propose an improved AHP approach to consistency verification and the subsequent ordering. Our method can deal with situations where information is insufficient,and inherits all the merits of the traditional AHP approach. A case study establishes the effectiveness of our proposed method.