The security of the multiparty quantum secret sharing protocol proposed by Gao [G.Gao,Commun.Theor.Phys.52 (2009) 421] is analyzed.It is shown that this protocol is vulnerable since the agents' imperfectencryption...The security of the multiparty quantum secret sharing protocol proposed by Gao [G.Gao,Commun.Theor.Phys.52 (2009) 421] is analyzed.It is shown that this protocol is vulnerable since the agents' imperfectencryption scheme can be attacked by a powerful participant.We introduce a attack strategy called participant forciblemanipulation and analyze the information leakage in this protocol under this attack.At last,we give an improved versionof the original protocol.The improved protocol is robust and has the same efficiency as the original one.展开更多
Implement the innovation of the "apprenticeship" training method in the teachers, explore the effective ways of cultivating the young teachers and the transferred teachers, determine the guidance teachers and the tr...Implement the innovation of the "apprenticeship" training method in the teachers, explore the effective ways of cultivating the young teachers and the transferred teachers, determine the guidance teachers and the training objects through the combination of rec- ommendation and self-recommendation, sign the mentoring agreement, establish the scientific and effective assessment and incentive mechanisms, to promote the healthy growth of the groups of teachers and the orderly cohesion the replacement of the old and new teachers.展开更多
基金Supported by National Natural Science Foundation of China under Grant Nos.60873191,60903152,60821001Specialized Research Fund for the Doctoral Program of High Education under Grant Nos.200800131016 and 20090005110010+2 种基金Beijing Nova Program under Grant No.2008B51Key Project of Chinese Ministry of Education under Grant No.109014Beijing Natural Science Foundation under Grant Nos.4072020 and 4102055
文摘The security of the multiparty quantum secret sharing protocol proposed by Gao [G.Gao,Commun.Theor.Phys.52 (2009) 421] is analyzed.It is shown that this protocol is vulnerable since the agents' imperfectencryption scheme can be attacked by a powerful participant.We introduce a attack strategy called participant forciblemanipulation and analyze the information leakage in this protocol under this attack.At last,we give an improved versionof the original protocol.The improved protocol is robust and has the same efficiency as the original one.
文摘Implement the innovation of the "apprenticeship" training method in the teachers, explore the effective ways of cultivating the young teachers and the transferred teachers, determine the guidance teachers and the training objects through the combination of rec- ommendation and self-recommendation, sign the mentoring agreement, establish the scientific and effective assessment and incentive mechanisms, to promote the healthy growth of the groups of teachers and the orderly cohesion the replacement of the old and new teachers.