I present a new protocol for three-party quantum secure direct communication (QSDC) with a set of ordered M Einstein-Podolsky-Rosen (EPR) pairs. In the scheme, by performing two unitary operations and Bell state m...I present a new protocol for three-party quantum secure direct communication (QSDC) with a set of ordered M Einstein-Podolsky-Rosen (EPR) pairs. In the scheme, by performing two unitary operations and Bell state measurements, it is shown that the three legitimate parties can exchange their respective secret message simultaneously. Then I modify it for an experimentally feasible and secure quantum sealed-bid auction (QSBD) protocol. Furthermore, I also analyze th^ecurity of the protocol, and the scheme is proven to be secure against the intercept-and-resend attack, the disturbancb attack and the entangled-and-measure attack.展开更多
This essay examines an American 19th-century sculpture, Howard Roberts' Hypatia, both historically and aesthetically (see Figures 1 and 2). Problems of interpretation are found at both levels because of limited doc...This essay examines an American 19th-century sculpture, Howard Roberts' Hypatia, both historically and aesthetically (see Figures 1 and 2). Problems of interpretation are found at both levels because of limited documentation. However, a speculative analysis adapting Plotinus' notions on the "delight of the intellect" and of "seeing" assist in considering beauty in the carved form, even if the subject is grave. What prompted this commission and who commissioned this work are questions to be considered.展开更多
The stability of imperfect columns has been studied by many researchers. Often the ends of a column are not necessarily fixed or pin-ended for practical structures. Therefore, rotationally restrained columns having an...The stability of imperfect columns has been studied by many researchers. Often the ends of a column are not necessarily fixed or pin-ended for practical structures. Therefore, rotationally restrained columns having an initial imperfection in an asymmetric mode have been studied in this paper. An elastic formula using the large deflection theory was given, and the shooting method was used to obtain the equilibrium paths and critical loads. Then the relationship between the end rotation and rotational restraints has been studied and discussed followed by a detailed discussion on the influence of imperfection on the column behaviour.展开更多
Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol c...Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol cannot resist some internal bidders' attacks, such as the Twiee-CNOT attack, the collusion attack. A malicious bidder can launch the Twice-CNOT attack to obtain the other's bid, or the dishonest auctioneer may collude with one bidder and help him/her win the action by changing his/her bid. For preventing against these attacks, a simple solution by using the QKD-based message encryption and a post-confirmation mechanism by adopting the hash function are proposed.展开更多
基金Supported by the 211 Project of Anhui University under Grant No.2009QN028B
文摘I present a new protocol for three-party quantum secure direct communication (QSDC) with a set of ordered M Einstein-Podolsky-Rosen (EPR) pairs. In the scheme, by performing two unitary operations and Bell state measurements, it is shown that the three legitimate parties can exchange their respective secret message simultaneously. Then I modify it for an experimentally feasible and secure quantum sealed-bid auction (QSBD) protocol. Furthermore, I also analyze th^ecurity of the protocol, and the scheme is proven to be secure against the intercept-and-resend attack, the disturbancb attack and the entangled-and-measure attack.
文摘This essay examines an American 19th-century sculpture, Howard Roberts' Hypatia, both historically and aesthetically (see Figures 1 and 2). Problems of interpretation are found at both levels because of limited documentation. However, a speculative analysis adapting Plotinus' notions on the "delight of the intellect" and of "seeing" assist in considering beauty in the carved form, even if the subject is grave. What prompted this commission and who commissioned this work are questions to be considered.
基金supported by the National Natural Science Foundation of China (Grant No. 50478075)Jiangsu "Six Top Talent" Program of China(Grant No. 07-F-008)Scientific Research Foundation of Graduate School of Southeast University (Grant No. YBJJ0817)
文摘The stability of imperfect columns has been studied by many researchers. Often the ends of a column are not necessarily fixed or pin-ended for practical structures. Therefore, rotationally restrained columns having an initial imperfection in an asymmetric mode have been studied in this paper. An elastic formula using the large deflection theory was given, and the shooting method was used to obtain the equilibrium paths and critical loads. Then the relationship between the end rotation and rotational restraints has been studied and discussed followed by a detailed discussion on the influence of imperfection on the column behaviour.
基金Supported by the National Natural Science Foundation of China under Grant Nos.61103235,61170321,and 61373131the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)+1 种基金the Natural Science Foundation of Jiangsu Province,China(BK2010570)State Key Laboratory of Software Engineering,Wuhan University(SKLSE2012-09-41)
文摘Recently, an experimentally feasible three-party quantum sealed-bid auction protocol based on EPR pairs [Z.Y. Wang, Commun. Theor. Phys. 54 (2010) 997] was proposed. However, this study points out Wang's protocol cannot resist some internal bidders' attacks, such as the Twiee-CNOT attack, the collusion attack. A malicious bidder can launch the Twice-CNOT attack to obtain the other's bid, or the dishonest auctioneer may collude with one bidder and help him/her win the action by changing his/her bid. For preventing against these attacks, a simple solution by using the QKD-based message encryption and a post-confirmation mechanism by adopting the hash function are proposed.