In this paper, we analyze two signcryption schemes on elliptic curves proposed by Zheng Yu-liang and Hideki Imai. We point out a serious problem with the schemes that the elliptic curve based signcryption schemes lose...In this paper, we analyze two signcryption schemes on elliptic curves proposed by Zheng Yu-liang and Hideki Imai. We point out a serious problem with the schemes that the elliptic curve based signcryption schemes lose confidentiality to gain non-repudiation. We also propose two improvement versions that not only overcome the security leak inherent in the schemes but also provide public verifiability or forward security. Our improvement versions require smaller computing cost than that required by signature-then-encryption methods.展开更多
Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satis...Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satisfied. This paper presented new verifiably encrypted signatures from bilinear pairings. The proposed signatures share the properties of simplicity and efficiency with existing verifiably encrypted signature schemes. To support the proposed scheme, it also exhibited security proofs that do not use random oracle assumption. For existential unforgeability, there exist tight security reductions from the proposed verifiably encrypted signature scheme to a strong but reasonable computational assumption.展开更多
The influence of decoherence on interference between two trapped Bose-Einstein condensates with arbitraryinitial states is studied. Analytic expressions of the intensity and visibility of the interference pattern are ...The influence of decoherence on interference between two trapped Bose-Einstein condensates with arbitraryinitial states is studied. Analytic expressions of the intensity and visibility of the interference pattern are found. It isshown that the decoherence weakens the interference intensity and decreases the visibility of the interference pattern.展开更多
Identity-based proxy signature enables an entity to delegate its signing rights to another entity in identity-based cryptosystem settings. However, few existing scheme has been proved secure in a formalized model, or ...Identity-based proxy signature enables an entity to delegate its signing rights to another entity in identity-based cryptosystem settings. However, few existing scheme has been proved secure in a formalized model, or acquired optimized performance. To achieve the goals of both proven security and high efficiency, this paper proposed an efficient identity-based proxy signature scheme. The scheme is constructed from bilinear pairing and proved secure in the random oracle model, using the oracle replay attack technique introduced by Pointehval and Stern. The analysis shows that the scheme needs less computation costs and has a shorter signature than the other schemes.展开更多
Ising spin system has been shown to provide a new class of error-correction code and can be used to construct public-key cryptosystems by making use of statistical mechanics. The relation between Ising spin systems an...Ising spin system has been shown to provide a new class of error-correction code and can be used to construct public-key cryptosystems by making use of statistical mechanics. The relation between Ising spin systems and private-key cryptosystems are investigated. Two private-key systems are based on two predetermined randomly constructed sparse matrices and rely on exploiting physical properties of the Mackay-Neal (MN) low-density parity-check (LDPC) error-correcting codes are proposed. One is error correcting private-key system, which is powerful to combat ciphertext errors in communications and computer systems. The other is a private-key system with authentication.展开更多
Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest private key generator (PKG) can forge the signature of any user, meanwhile, the user can deny the signature actually si...Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest private key generator (PKG) can forge the signature of any user, meanwhile, the user can deny the signature actually signed by him/herself. To avoid the keyescrow problem, an ID-based signature scheme was presented without trusted PKG. The exact proof of security was presented to demonstrate that our scheme is secure against existential forgery on adaptively chosen message and ID attacks assuming the complexity of computational Diffie-Hellman (CDH) problem. Compared with other signature schemes, the proposed scheme is more efficient.展开更多
By virtue of the invariant eigen-operator method we search for the invariant eigen-operators for someHamiltonians describing nonlinear processes in particle physics.In this way the energy-gap of the Hamiltonians can b...By virtue of the invariant eigen-operator method we search for the invariant eigen-operators for someHamiltonians describing nonlinear processes in particle physics.In this way the energy-gap of the Hamiltonians can benaturally obtained.The characteristic polynomial theory has been fully employed in our derivation.展开更多
The generalized Virial theorem for mixed state, derived from the generalized Hellmann Feynman theorem, only applies to Hamiltonians in which potential of coordinates is separate from momentum energy term. In this pape...The generalized Virial theorem for mixed state, derived from the generalized Hellmann Feynman theorem, only applies to Hamiltonians in which potential of coordinates is separate from momentum energy term. In this paper we discuss Virial theorem for mixed state for some Hamiltonians with coordinate-momentum couplings in order to know their contributions to internal energy.展开更多
The critical behaviors of a mixed spin-1/2 and spin-sB Ising system with a transverse crystal field are studiedby use of the effective-field theory with correlations. The effect of the transverse crystal field on tran...The critical behaviors of a mixed spin-1/2 and spin-sB Ising system with a transverse crystal field are studiedby use of the effective-field theory with correlations. The effect of the transverse crystal field on transition temperaturesis investigated numerically for the honeycomb (z = 3) and square (z = 4) lattices. The results show that there is notricritical point for the system.展开更多
With the help of technique of integration within an ordered product of operators we can fully display the partial trace method to deduce some new density operators of light field. The general form of single-mode densi...With the help of technique of integration within an ordered product of operators we can fully display the partial trace method to deduce some new density operators of light field. The general form of single-mode density operator is derived in this way from a normalized two-mode generalized squeezed pure state density operator.展开更多
The paper describes the concept of plaintext encryption by using the Unicode characters. In the case of elliptic curve cryptography, there is not specified rule or algorithm to specify the letters of Tifinagh as well ...The paper describes the concept of plaintext encryption by using the Unicode characters. In the case of elliptic curve cryptography, there is not specified rule or algorithm to specify the letters of Tifinagh as well as special characters. So, the paper gives the transformation of characters Tifinagh into points on elliptic curve by using the corresponding characters Latin. The obtained correspondence has been applied in Menezes-Vanstone cryptosystem based on elliptic curve. Therefore, the paper explains in detail its implementation in Maple 12.展开更多
The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functio...The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functionalities such as open password entry with active boxes, combined encryption methods and agent that can be incorporated into an open database system. It designed and implemented an algorithm that would not allow users to have free access into open database system. A user entering his password only needs to carefully study the sequence of codes and active boxes that describe his password and then enter these codes in place of his active boxes. The approach does not require the input code to be hidden from anyone or converted to place holder characters for security reasons. Integrating this scheme into an open database system is viable in practice in term of easy use and will improve security level of information.展开更多
On the assumption that a Cooper pair acts as a Bose particle and based on the newly established <η|representation, which is the common eigenvector of two particles' relative position and total momentum, we int...On the assumption that a Cooper pair acts as a Bose particle and based on the newly established <η|representation, which is the common eigenvector of two particles' relative position and total momentum, we introduce a mesoscopic Josephson junction Hamiltonian constituted by two-mode Bose phase operator and number-difference operator. The number-difference-phase uncertainty relation can then be set up, which implies the existence of Josephson current.展开更多
The relation between microtubules architecture in the cytoskeletal structure inside the dendrites and soma and the emergence of neuron function and firing action potential crosses the tiny line between physics and bio...The relation between microtubules architecture in the cytoskeletal structure inside the dendrites and soma and the emergence of neuron function and firing action potential crosses the tiny line between physics and biology. As decoherence is a fundamental mechanism in some biological process such as photosynthesis and others examples, the gravitational quantum approach may contribute to elucidate if neuron function really emerges from quantum coherence in neuronal microtubules. The Einstein equation correlates the stress-energy tensor Tμv to a specific divergence-free combination Ricci tensor Rμv and the metric. In the semiclassical formulation, we have Gμv = Rμv -1/2gμvR=8πG/C^4〈ψ|μvψ〉 which describes the quantum field in curved space-time geometry. But for a more precise equation in relation to the stress-energy tensor, we know that in a non-zero temperature, the wave-function is not enough to describe the physical reality. A more precise equation demands a formulation in the density-matrix form but for now there is no Diosi-Penrose model with density-matrix formulation. Such a density-matrix description can be viewed as a probability mixture of different wave-functions. Using some algebra and rules related to the mathematical manipulation of the density-matrix applied to operators, such the stress energy tensor, we found the von Neumann-Einstein equation for the general relativity equation in the density matrix operator form, Gμv = 8πG/C^4Tr[pTμv]. Thus density-matrix operator--instead of just a wave function of pure states--applied to the stress-energy tensor gives the curvature of space time, given by Einstein tensor, Gμv. The quantum fluctuation in the gravitational space-time field might feed back to decohere the quantum density-matrix. As long as decoherence can be viewed as the loss of information from a system to the environment, the density-matrix p is also related to that process and considering the measurement problem, density-matrix /garter is a more complete description of the possible outcome of the measurement. It is possible that some characteristics of the special microtubulin-associated proteins (MAP) that capes the dendritic-somatic microtubulins which could induces longer-lived nuclear spin states prevented from de-polymerization and suitable for long term information encode and memory. Understand the mechanism by which the hyper-phosphorylation in type tau-MAP displacements from microtubulins results in neurofibrillary tangles and cognitive dysfunctions in Alzheimer's disease.展开更多
In the paper, taking the atomic EPR entanglement of quantum teleportation of atomic state in thermal environment damping-density operator approach, and the average fidelities are channel state |φ = (1/√2)(|00)...In the paper, taking the atomic EPR entanglement of quantum teleportation of atomic state in thermal environment damping-density operator approach, and the average fidelities are channel state |φ = (1/√2)(|00) + |11〉) is more robust than |φ| they are subject to the dissipative environments. states as quantum channel, we investigate the fidelity and vacuum reservoir by means of quantum theory of calculated, the results show that the atomic quantum = (1/√2)(|01〉 + |10〉) in teleportation process when they are subject to the dissipative environments.展开更多
The performances of selection cooperation are investigated over asymmetric fading channels where the source-relay and the relay-destination channels experience Nakagami-m and Rayleigh fading,respectively.Decode-and-fo...The performances of selection cooperation are investigated over asymmetric fading channels where the source-relay and the relay-destination channels experience Nakagami-m and Rayleigh fading,respectively.Decode-and-forward(DF)protocol is adopted and the Nth best relay is selected from M available relays.Probability density function(PDF)for the instantaneous signal-to-noise ratio(SNR)at the destination is derived first.Then,it is used to derive the exact expressions for outage probability and average symbol error rate(SER).The results hold for arbitrary M or N.Finally,simulations are carried out to verify the correctness of our theoretical analysis and results show that M and N almost have the same effect on the performance of outage probability and SER.展开更多
We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks.Furthermore, we propose an improved scheme that remedies the weakness of the...We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks.Furthermore, we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-Zhang scheme.The improved scheme has shorter ciphertext size than the Zhang-Yang-Zhu-Zhang scheme.We then prove that the improved scheme satisfies confidentiality, unforgeability, anonymity and authenticatability.展开更多
文摘In this paper, we analyze two signcryption schemes on elliptic curves proposed by Zheng Yu-liang and Hideki Imai. We point out a serious problem with the schemes that the elliptic curve based signcryption schemes lose confidentiality to gain non-repudiation. We also propose two improvement versions that not only overcome the security leak inherent in the schemes but also provide public verifiability or forward security. Our improvement versions require smaller computing cost than that required by signature-then-encryption methods.
文摘Verifiably encrypted signatures are employed when a signer wants to sign a message for a verifier but does not want the verifier to possess his signature on the message until some certain requirements of his are satisfied. This paper presented new verifiably encrypted signatures from bilinear pairings. The proposed signatures share the properties of simplicity and efficiency with existing verifiably encrypted signature schemes. To support the proposed scheme, it also exhibited security proofs that do not use random oracle assumption. For existential unforgeability, there exist tight security reductions from the proposed verifiably encrypted signature scheme to a strong but reasonable computational assumption.
文摘The influence of decoherence on interference between two trapped Bose-Einstein condensates with arbitraryinitial states is studied. Analytic expressions of the intensity and visibility of the interference pattern are found. It isshown that the decoherence weakens the interference intensity and decreases the visibility of the interference pattern.
基金National Natural Science Foundation of Chi-na for Distinguished Young Scholars (No.60225007)National Research Fund for theDoctoral Program of Higher Education ofChina (No.20020248024)Grant-in-Aid forScientific Research(C) (No.14540100)
文摘Identity-based proxy signature enables an entity to delegate its signing rights to another entity in identity-based cryptosystem settings. However, few existing scheme has been proved secure in a formalized model, or acquired optimized performance. To achieve the goals of both proven security and high efficiency, this paper proposed an efficient identity-based proxy signature scheme. The scheme is constructed from bilinear pairing and proved secure in the random oracle model, using the oracle replay attack technique introduced by Pointehval and Stern. The analysis shows that the scheme needs less computation costs and has a shorter signature than the other schemes.
文摘Ising spin system has been shown to provide a new class of error-correction code and can be used to construct public-key cryptosystems by making use of statistical mechanics. The relation between Ising spin systems and private-key cryptosystems are investigated. Two private-key systems are based on two predetermined randomly constructed sparse matrices and rely on exploiting physical properties of the Mackay-Neal (MN) low-density parity-check (LDPC) error-correcting codes are proposed. One is error correcting private-key system, which is powerful to combat ciphertext errors in communications and computer systems. The other is a private-key system with authentication.
文摘Key escrow is an inherent disadvantage for traditional ID-based cryptosystem, i.e., the dishonest private key generator (PKG) can forge the signature of any user, meanwhile, the user can deny the signature actually signed by him/herself. To avoid the keyescrow problem, an ID-based signature scheme was presented without trusted PKG. The exact proof of security was presented to demonstrate that our scheme is secure against existential forgery on adaptively chosen message and ID attacks assuming the complexity of computational Diffie-Hellman (CDH) problem. Compared with other signature schemes, the proposed scheme is more efficient.
基金National Natural Science Foundation of China under grant No.10775097the President Foundation of the Chinese Academy of Sciences
文摘By virtue of the invariant eigen-operator method we search for the invariant eigen-operators for someHamiltonians describing nonlinear processes in particle physics.In this way the energy-gap of the Hamiltonians can benaturally obtained.The characteristic polynomial theory has been fully employed in our derivation.
文摘The generalized Virial theorem for mixed state, derived from the generalized Hellmann Feynman theorem, only applies to Hamiltonians in which potential of coordinates is separate from momentum energy term. In this paper we discuss Virial theorem for mixed state for some Hamiltonians with coordinate-momentum couplings in order to know their contributions to internal energy.
基金The project supported by Science Foundation of the Ministry of Education of China under Grant No.99026
文摘The critical behaviors of a mixed spin-1/2 and spin-sB Ising system with a transverse crystal field are studiedby use of the effective-field theory with correlations. The effect of the transverse crystal field on transition temperaturesis investigated numerically for the honeycomb (z = 3) and square (z = 4) lattices. The results show that there is notricritical point for the system.
基金Supported by the President Foundation of Chinese Academy of Science and National Natural Science Foundation of China under Grant Nos.10775097 and 10874174
文摘With the help of technique of integration within an ordered product of operators we can fully display the partial trace method to deduce some new density operators of light field. The general form of single-mode density operator is derived in this way from a normalized two-mode generalized squeezed pure state density operator.
文摘The paper describes the concept of plaintext encryption by using the Unicode characters. In the case of elliptic curve cryptography, there is not specified rule or algorithm to specify the letters of Tifinagh as well as special characters. So, the paper gives the transformation of characters Tifinagh into points on elliptic curve by using the corresponding characters Latin. The obtained correspondence has been applied in Menezes-Vanstone cryptosystem based on elliptic curve. Therefore, the paper explains in detail its implementation in Maple 12.
文摘The purpose of this paper is to design and implement a secure open database system for organizations that are increasingly opened up their information for easy access by different users. The work proposed some functionalities such as open password entry with active boxes, combined encryption methods and agent that can be incorporated into an open database system. It designed and implemented an algorithm that would not allow users to have free access into open database system. A user entering his password only needs to carefully study the sequence of codes and active boxes that describe his password and then enter these codes in place of his active boxes. The approach does not require the input code to be hidden from anyone or converted to place holder characters for security reasons. Integrating this scheme into an open database system is viable in practice in term of easy use and will improve security level of information.
文摘On the assumption that a Cooper pair acts as a Bose particle and based on the newly established <η|representation, which is the common eigenvector of two particles' relative position and total momentum, we introduce a mesoscopic Josephson junction Hamiltonian constituted by two-mode Bose phase operator and number-difference operator. The number-difference-phase uncertainty relation can then be set up, which implies the existence of Josephson current.
文摘The relation between microtubules architecture in the cytoskeletal structure inside the dendrites and soma and the emergence of neuron function and firing action potential crosses the tiny line between physics and biology. As decoherence is a fundamental mechanism in some biological process such as photosynthesis and others examples, the gravitational quantum approach may contribute to elucidate if neuron function really emerges from quantum coherence in neuronal microtubules. The Einstein equation correlates the stress-energy tensor Tμv to a specific divergence-free combination Ricci tensor Rμv and the metric. In the semiclassical formulation, we have Gμv = Rμv -1/2gμvR=8πG/C^4〈ψ|μvψ〉 which describes the quantum field in curved space-time geometry. But for a more precise equation in relation to the stress-energy tensor, we know that in a non-zero temperature, the wave-function is not enough to describe the physical reality. A more precise equation demands a formulation in the density-matrix form but for now there is no Diosi-Penrose model with density-matrix formulation. Such a density-matrix description can be viewed as a probability mixture of different wave-functions. Using some algebra and rules related to the mathematical manipulation of the density-matrix applied to operators, such the stress energy tensor, we found the von Neumann-Einstein equation for the general relativity equation in the density matrix operator form, Gμv = 8πG/C^4Tr[pTμv]. Thus density-matrix operator--instead of just a wave function of pure states--applied to the stress-energy tensor gives the curvature of space time, given by Einstein tensor, Gμv. The quantum fluctuation in the gravitational space-time field might feed back to decohere the quantum density-matrix. As long as decoherence can be viewed as the loss of information from a system to the environment, the density-matrix p is also related to that process and considering the measurement problem, density-matrix /garter is a more complete description of the possible outcome of the measurement. It is possible that some characteristics of the special microtubulin-associated proteins (MAP) that capes the dendritic-somatic microtubulins which could induces longer-lived nuclear spin states prevented from de-polymerization and suitable for long term information encode and memory. Understand the mechanism by which the hyper-phosphorylation in type tau-MAP displacements from microtubulins results in neurofibrillary tangles and cognitive dysfunctions in Alzheimer's disease.
基金Supported by the Natural Science Foundation of Hunan Province of China under Grant No.10JJ3088Funds of Hunan Education Bureau under Grant No.10C0616the Key Research Foundation of the Education Bureau of Hunan Province under Grant Nos.10A026 and 08A015
文摘In the paper, taking the atomic EPR entanglement of quantum teleportation of atomic state in thermal environment damping-density operator approach, and the average fidelities are channel state |φ = (1/√2)(|00) + |11〉) is more robust than |φ| they are subject to the dissipative environments. states as quantum channel, we investigate the fidelity and vacuum reservoir by means of quantum theory of calculated, the results show that the atomic quantum = (1/√2)(|01〉 + |10〉) in teleportation process when they are subject to the dissipative environments.
基金Supported by the National Natural Science Foundation of China(No.6087024)the Cultivation Fund of the Key Scientific and Technical Innovation Project(No.708059)+2 种基金Open Found of State Key Laboratory of Integrated Services Networks(No.ISN12-10)Open Research Fund of National Mobile Communications Research Laboratory(No.2012D10)the Natural Science Foundation of Shandong Province(No.ZR2011FM027)
文摘The performances of selection cooperation are investigated over asymmetric fading channels where the source-relay and the relay-destination channels experience Nakagami-m and Rayleigh fading,respectively.Decode-and-forward(DF)protocol is adopted and the Nth best relay is selected from M available relays.Probability density function(PDF)for the instantaneous signal-to-noise ratio(SNR)at the destination is derived first.Then,it is used to derive the exact expressions for outage probability and average symbol error rate(SER).The results hold for arbitrary M or N.Finally,simulations are carried out to verify the correctness of our theoretical analysis and results show that M and N almost have the same effect on the performance of outage probability and SER.
基金the National Natural Science Foundation of China (No. 60673075)the National High Technology Research and Development Program (863) of China (No. 2006AA01Z428)the State Key Laboratoryof Information Security,and the Youth Science and Technology Foundation of UESTC
文摘We show that the Zhang-Yang-Zhu-Zhang identity-based authenticatable ring signcryption scheme is not secure against chosen plaintext attacks.Furthermore, we propose an improved scheme that remedies the weakness of the Zhang-Yang-Zhu-Zhang scheme.The improved scheme has shorter ciphertext size than the Zhang-Yang-Zhu-Zhang scheme.We then prove that the improved scheme satisfies confidentiality, unforgeability, anonymity and authenticatability.