The one-time pad(OTP)is an applicationlayer encryption technique to achieve the informationtheoretic security,and the physical-layer secret key generation(SKG)technique is a promising candidate to provide the random k...The one-time pad(OTP)is an applicationlayer encryption technique to achieve the informationtheoretic security,and the physical-layer secret key generation(SKG)technique is a promising candidate to provide the random keys for OTP.In this paper,we propose a joint SKG and OTP encryption scheme with the aid of a reconfigurable intelligent surface(RIS)to boost secret key rate.To maximize the efficiency of secure communication,we divide the process of secure transmission into two stages:SKG and then encrypted packet transmission.Meanwhile,we design an optimal algorithm for allocating time slots for SKG to maximize SKG efficiency without security risk.Furthermore,we design a key updating protocol based on our SKG scheme for OTP encryption.Simulation results verify that our scheme can generate keys securely and efficiently,and significantly improve the secure communication performance in an intelligent IoT system.展开更多
We present two robust quantum secure direct communication (QSDC) schemes with a quantum one-time pad over a collective-noise channel. Each logical qubit is made up of two physical qubits and it is invariant over a col...We present two robust quantum secure direct communication (QSDC) schemes with a quantum one-time pad over a collective-noise channel. Each logical qubit is made up of two physical qubits and it is invariant over a collective-noise channel. The two photons in each logical qubit can be produced with a practically entangled source, i.e., a parametric down-conversion source with a beta barium borate crystal and a pump pulse of ultraviolet light. The information is encoded on each logical qubit with two logical unitary operations, which will not destroy the antinoise feather of the quantum systems. The receiver Bob can read out the sender's message directly with two single-photon measurements on each logical qubit, instead of Bell-state measurements, which will make these protocols more convenient in a practical application. With current technology, our two robust QSDC schemes are feasible and may be optimal ones.展开更多
In this work,a novel one-time-programmable memory unit based on a Schottky-type p-GaN diode is proposed.During the programming process,the junction switches from a high-resistance state to a low-resistance state throu...In this work,a novel one-time-programmable memory unit based on a Schottky-type p-GaN diode is proposed.During the programming process,the junction switches from a high-resistance state to a low-resistance state through Schottky junction breakdown,and the state is permanently preserved.The memory unit features a current ratio of more than 10^(3),a read voltage window of 6 V,a programming time of less than 10^(−4)s,a stability of more than 108 read cycles,and a lifetime of far more than 10 years.Besides,the fabrication of the device is fully compatible with commercial Si-based GaN process platforms,which is of great significance for the realization of low-cost read-only memory in all-GaN integration.展开更多
Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Auth...Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Authentication is implemented by using previously shared identity string.State/j i is used as the carrier.One photon of/j i is sent to Bob;and Bob obtains a random key by measuring photons with bases dominated by ID.The bases information is secret to others except Alice and Bob.Both the eavesdropping detection based on three-particle W state and the secret ID ensure the security of the protocol.Unitary operations are not used.展开更多
Objective:To observe the effectiveness and safety of one-time endodontics in the treatment of chronic apical periodontitis with sinus tract in pediatric deciduous teeth.Methods:109 cases of children with chronic apica...Objective:To observe the effectiveness and safety of one-time endodontics in the treatment of chronic apical periodontitis with sinus tract in pediatric deciduous teeth.Methods:109 cases of children with chronic apical periodontitis with sinus tract in the deciduous teeth treated in our hospital from January 2022 to December 2023 were selected and grouped by the randomized numerical table method,with 54 cases in the experimental group and 55 cases in the control group.The experimental group was treated with one-time endodontics and the control group was treated with conventional endodontics.Results:After the treatment,the total effective rate of treatment was higher in the experimental group than in the control group(P<0.05);the incidence of adverse events was lower in the experimental group than in the control group(P<0.05);the satisfaction of the children's family members was higher in the experimental group than in the control group(P<0.05);the pain duration was lower in the experimental group than in the control group(P<0.05).Conclusion:In the experimental group,children with chronic apical periodontitis with sinus tract of the deciduous teeth were given one-time endodontic treatment,and the results of its implementation were relatively good.展开更多
A controlled quantum secure direct communication and authentication protocol is proposed with a quantum one-time pad based on five-particle cluster state.Photon 4 in each five-particle cluster state is sent to the con...A controlled quantum secure direct communication and authentication protocol is proposed with a quantum one-time pad based on five-particle cluster state.Photon 4 in each five-particle cluster state is sent to the controller as permission.Unitary operation I(U)on photon4 according to identity-string of the receiver is used to forbid the controller to deduce secret message.The classical XOR operation serving as a one-time-pad is used to forbid external eavesdroppers to eavesdrop.Eavesdropping detection and identity authentication are implemented by previously shared reusable base identity-strings.In one transmission,one qubit of each five-particle cluster state is used as controller’s permission,and two qubits are used to transmit two classical bit information.展开更多
Cotton producers have substantially reduced their inputs(labor,nutrients,and management)mainly by adopting a shortseason cropping management that is characterized by late sowing,high density,and reduced fertilization ...Cotton producers have substantially reduced their inputs(labor,nutrients,and management)mainly by adopting a shortseason cropping management that is characterized by late sowing,high density,and reduced fertilization with one-time application at the first bloom stage without lint yield reduction.However,it has been hypothesized that one-time fertilization at an earlier growth stage could be a more effective and economic management practice.A two-year field experiment was conducted by applying five fertilizer one-time fertilization at 0(FT1),5(FT2),10(FT3),15(FT4),and 20(FT5)days after the first flower appeared in the field and one three-split fertilizer application taken as the conventional control(FT6),making six treatments altogether.Cotton growth period,biomass accumulation,yield,and its formation were quantified.The results showed that the one-time fertilization did not affect the cotton growth progress as compared to FT6,however,the total crop cycles for FT3–FT5 were 3 days shorter.FT1 produced the highest cotton lint yield(1396 kg ha–1),which was similar to the FT6 but higher than the other treatments,and could be attributed to more bolls per unit area and higher lint percentage.Cotton yield was positively correlated with cotton plant biomass accumulated.FT1 had both the highest average(VT)(193.7 kg ha–1 d–1)and the highest maximum(VM)(220.9 kg ha–1 d–1)rates during the fast biomass accumulation period.These results suggest that one-time fertilizer application at the first flower stage might be an adjustment that is more effective than at first bloom,and allowed for easier decision making for application date due to non counting of plants with flowers is needed.展开更多
To solve the critical problems of lithium rich cathode materials, e.g., structure instability and short cycle life, we have successfully prepared a ZrO2-coated and Zr-doping xLi2MnO3·(1–x)LiMO2 hollow architectu...To solve the critical problems of lithium rich cathode materials, e.g., structure instability and short cycle life, we have successfully prepared a ZrO2-coated and Zr-doping xLi2MnO3·(1–x)LiMO2 hollow architecture via one-time sintering process. The modified structural materials as lithium-ion cathodes present good structural stability and superior cycle performance in LIBs. The discharge capacity of the ZrO2-coated and Zr-doped hollow pristine is 220 mAh g-1 at the 20th cycle at 0.2 C(discharge capacity loss, 2.7%)and 150 m Ah g-1 at the 100 th cycle at 1 C(discharge capacity loss, 17.7%), respectively. However, hollow pristine electrode only delivers 203 m Ah g-1 at the 20 th cycle at 0.2 C and 124 mAh g-1 at the 100 th cycle at 1 C, respectively, and the corresponding to capacity retention is 92.2% and 72.8%, respectively.Diffusion coefficients of modified hollow pristine electrode are much higher than that of hollow pristine electrode after 100 cycles(approach to 1.4 times). In addition, we simulate the adsorption reaction of HF on the surface of ZrO2-coated layer by the first-principles theory. The calculations prove that the adsorption energy of HF on the surface of ZrO2-coated layer is about-1.699 e V, and the ZrO2-coated layer could protect the hollow spherical xLi2MnO3·(1–x)LiMO2 from erosion by HF. Our results would be applicable for systematic amelioration of high-performance lithium rich material for anode with the respect of practical application.展开更多
We ayptanalyze Kim et. al's one-time proxy signature scheme used in mobileagents, and then a successful forgery is introduced It is showed that a dishonest customer cansuccessfully forge a valid one-time proxy sig...We ayptanalyze Kim et. al's one-time proxy signature scheme used in mobileagents, and then a successful forgery is introduced It is showed that a dishonest customer cansuccessfully forge a valid one-time proxy signature by impersonating the stiver Furthermore, he canrequest the server with responsibility for the forged bidding information.展开更多
A 32 kbit OTP(one-time programmable)memory for MCUs(micro-controller units)used in remote controllers was designed.This OTP memory is used for program and data storage.It is required to apply 5.5V to BL(bit-line)and 1...A 32 kbit OTP(one-time programmable)memory for MCUs(micro-controller units)used in remote controllers was designed.This OTP memory is used for program and data storage.It is required to apply 5.5V to BL(bit-line)and 11V to WL(word-line)for a OTP cell of 0.35μm ETOX(EEPROM tunnel oxide)type by MagnaChip.We use 5V transistors on column data paths to reduce the area of column data paths since they require small areas.In addition,we secure device reliability by using HV(high-voltage)transistors in the WL driver.Furthermore,we change from a static logic to a dynamic logic used for the WL driver in the core circuit.Also,we optimize the WD(write data)switch circuit.Thus,we can implement them with a small-area design.In addition,we implement the address predecoder with a small-area logic circuit.The area of the designed 32 kbit OTP with 5V and HV devices is 674.725μm×258.75μm(=0.1745mm2)and is 56.3% smaller than that using 3.3V devices.展开更多
基金supported by National key research and development program of China, Joint research of IoT security system and key technologies based on quantum key (2020YFE0200600)
文摘The one-time pad(OTP)is an applicationlayer encryption technique to achieve the informationtheoretic security,and the physical-layer secret key generation(SKG)technique is a promising candidate to provide the random keys for OTP.In this paper,we propose a joint SKG and OTP encryption scheme with the aid of a reconfigurable intelligent surface(RIS)to boost secret key rate.To maximize the efficiency of secure communication,we divide the process of secure transmission into two stages:SKG and then encrypted packet transmission.Meanwhile,we design an optimal algorithm for allocating time slots for SKG to maximize SKG efficiency without security risk.Furthermore,we design a key updating protocol based on our SKG scheme for OTP encryption.Simulation results verify that our scheme can generate keys securely and efficiently,and significantly improve the secure communication performance in an intelligent IoT system.
基金supported by the Natural Science Foundation of Jiangsu Provincial Universities (Grant No. 10KJB180004)the National Natural Science Foundation of China (Grant No. 10847147)
文摘We present two robust quantum secure direct communication (QSDC) schemes with a quantum one-time pad over a collective-noise channel. Each logical qubit is made up of two physical qubits and it is invariant over a collective-noise channel. The two photons in each logical qubit can be produced with a practically entangled source, i.e., a parametric down-conversion source with a beta barium borate crystal and a pump pulse of ultraviolet light. The information is encoded on each logical qubit with two logical unitary operations, which will not destroy the antinoise feather of the quantum systems. The receiver Bob can read out the sender's message directly with two single-photon measurements on each logical qubit, instead of Bell-state measurements, which will make these protocols more convenient in a practical application. With current technology, our two robust QSDC schemes are feasible and may be optimal ones.
基金supported in part by the National Key Research and Development Program of China under Grant 2022YFB3604400in part by the Youth Innovation Promotion Association of Chinese Academy Sciences (CAS)+4 种基金in part by the CAS-Croucher Funding Scheme under Grant CAS22801in part by National Natural Science Foundation of China under Grant 62334012, Grant 62074161, Grant 62004213, Grant U20A20208, and Grant 62304252in part by the Beijing Municipal Science and Technology Commission project under Grant Z201100008420009 and Grant Z211100007921018in part by the University of CASin part by the IMECAS-HKUST-Joint Laboratory of Microelectronics
文摘In this work,a novel one-time-programmable memory unit based on a Schottky-type p-GaN diode is proposed.During the programming process,the junction switches from a high-resistance state to a low-resistance state through Schottky junction breakdown,and the state is permanently preserved.The memory unit features a current ratio of more than 10^(3),a read voltage window of 6 V,a programming time of less than 10^(−4)s,a stability of more than 108 read cycles,and a lifetime of far more than 10 years.Besides,the fabrication of the device is fully compatible with commercial Si-based GaN process platforms,which is of great significance for the realization of low-cost read-only memory in all-GaN integration.
基金supported by Science and Technology Support Project of Sichuan Province of China (2013GZX0137)Fund for Young Persons Project of Sichuan Province of China (12ZB017)+2 种基金the National Natural Science Foundation of China (61100205)Project of the Fundamental Research Funds for the Central Universities of China (2013RC0307)the Cryptography Basic Development of the National ‘12th Five-Year-Plan’ of China on Cryptographic Theory (MMJJ201301004)
文摘Three-particle W states are used as decoy photons,and the eavesdropping detection rate reaches63%.The positions of decoy photons in information sequence are encoded with identity string ID of the legitimate users.Authentication is implemented by using previously shared identity string.State/j i is used as the carrier.One photon of/j i is sent to Bob;and Bob obtains a random key by measuring photons with bases dominated by ID.The bases information is secret to others except Alice and Bob.Both the eavesdropping detection based on three-particle W state and the secret ID ensure the security of the protocol.Unitary operations are not used.
文摘Objective:To observe the effectiveness and safety of one-time endodontics in the treatment of chronic apical periodontitis with sinus tract in pediatric deciduous teeth.Methods:109 cases of children with chronic apical periodontitis with sinus tract in the deciduous teeth treated in our hospital from January 2022 to December 2023 were selected and grouped by the randomized numerical table method,with 54 cases in the experimental group and 55 cases in the control group.The experimental group was treated with one-time endodontics and the control group was treated with conventional endodontics.Results:After the treatment,the total effective rate of treatment was higher in the experimental group than in the control group(P<0.05);the incidence of adverse events was lower in the experimental group than in the control group(P<0.05);the satisfaction of the children's family members was higher in the experimental group than in the control group(P<0.05);the pain duration was lower in the experimental group than in the control group(P<0.05).Conclusion:In the experimental group,children with chronic apical periodontitis with sinus tract of the deciduous teeth were given one-time endodontic treatment,and the results of its implementation were relatively good.
基金supported by the National Natural Science Foundation of China (61370203)the Science & Technology Pillar Program of Sichuan Province of China (2013GZX0137)the Youth Fund Project of Sichuan Province of China (12ZB017)
文摘A controlled quantum secure direct communication and authentication protocol is proposed with a quantum one-time pad based on five-particle cluster state.Photon 4 in each five-particle cluster state is sent to the controller as permission.Unitary operation I(U)on photon4 according to identity-string of the receiver is used to forbid the controller to deduce secret message.The classical XOR operation serving as a one-time-pad is used to forbid external eavesdroppers to eavesdrop.Eavesdropping detection and identity authentication are implemented by previously shared reusable base identity-strings.In one transmission,one qubit of each five-particle cluster state is used as controller’s permission,and two qubits are used to transmit two classical bit information.
基金supported by the National Natural Science Foundation of China (31271665)the Pairing Program of Key Laboratory of Oasis Ecology Agriculture, Xinjiang Production and Construction Group with Eminent Scholars in Elite Universities, China (201601)
文摘Cotton producers have substantially reduced their inputs(labor,nutrients,and management)mainly by adopting a shortseason cropping management that is characterized by late sowing,high density,and reduced fertilization with one-time application at the first bloom stage without lint yield reduction.However,it has been hypothesized that one-time fertilization at an earlier growth stage could be a more effective and economic management practice.A two-year field experiment was conducted by applying five fertilizer one-time fertilization at 0(FT1),5(FT2),10(FT3),15(FT4),and 20(FT5)days after the first flower appeared in the field and one three-split fertilizer application taken as the conventional control(FT6),making six treatments altogether.Cotton growth period,biomass accumulation,yield,and its formation were quantified.The results showed that the one-time fertilization did not affect the cotton growth progress as compared to FT6,however,the total crop cycles for FT3–FT5 were 3 days shorter.FT1 produced the highest cotton lint yield(1396 kg ha–1),which was similar to the FT6 but higher than the other treatments,and could be attributed to more bolls per unit area and higher lint percentage.Cotton yield was positively correlated with cotton plant biomass accumulated.FT1 had both the highest average(VT)(193.7 kg ha–1 d–1)and the highest maximum(VM)(220.9 kg ha–1 d–1)rates during the fast biomass accumulation period.These results suggest that one-time fertilizer application at the first flower stage might be an adjustment that is more effective than at first bloom,and allowed for easier decision making for application date due to non counting of plants with flowers is needed.
基金the financial support by the Natural Science Foundation of Guangdong Province(2019A1515012111)the National Natural Science Foundation of China(51804199 and 51604081)+2 种基金the Science and Technology Innovation Commission of Shenzhen(JCYJ20190808173815205 and 20180123)the Shenzhen Science and Technology Program(KQTD20180412181422399)“Chenguang Program”supported by Shanghai Education Development Foundation and Shanghai Municipal Education Commission(16CG40)。
文摘To solve the critical problems of lithium rich cathode materials, e.g., structure instability and short cycle life, we have successfully prepared a ZrO2-coated and Zr-doping xLi2MnO3·(1–x)LiMO2 hollow architecture via one-time sintering process. The modified structural materials as lithium-ion cathodes present good structural stability and superior cycle performance in LIBs. The discharge capacity of the ZrO2-coated and Zr-doped hollow pristine is 220 mAh g-1 at the 20th cycle at 0.2 C(discharge capacity loss, 2.7%)and 150 m Ah g-1 at the 100 th cycle at 1 C(discharge capacity loss, 17.7%), respectively. However, hollow pristine electrode only delivers 203 m Ah g-1 at the 20 th cycle at 0.2 C and 124 mAh g-1 at the 100 th cycle at 1 C, respectively, and the corresponding to capacity retention is 92.2% and 72.8%, respectively.Diffusion coefficients of modified hollow pristine electrode are much higher than that of hollow pristine electrode after 100 cycles(approach to 1.4 times). In addition, we simulate the adsorption reaction of HF on the surface of ZrO2-coated layer by the first-principles theory. The calculations prove that the adsorption energy of HF on the surface of ZrO2-coated layer is about-1.699 e V, and the ZrO2-coated layer could protect the hollow spherical xLi2MnO3·(1–x)LiMO2 from erosion by HF. Our results would be applicable for systematic amelioration of high-performance lithium rich material for anode with the respect of practical application.
文摘We ayptanalyze Kim et. al's one-time proxy signature scheme used in mobileagents, and then a successful forgery is introduced It is showed that a dishonest customer cansuccessfully forge a valid one-time proxy signature by impersonating the stiver Furthermore, he canrequest the server with responsibility for the forged bidding information.
基金Project supported by the Second Stage of Brain Korea 21 Projects,Korea
文摘A 32 kbit OTP(one-time programmable)memory for MCUs(micro-controller units)used in remote controllers was designed.This OTP memory is used for program and data storage.It is required to apply 5.5V to BL(bit-line)and 11V to WL(word-line)for a OTP cell of 0.35μm ETOX(EEPROM tunnel oxide)type by MagnaChip.We use 5V transistors on column data paths to reduce the area of column data paths since they require small areas.In addition,we secure device reliability by using HV(high-voltage)transistors in the WL driver.Furthermore,we change from a static logic to a dynamic logic used for the WL driver in the core circuit.Also,we optimize the WD(write data)switch circuit.Thus,we can implement them with a small-area design.In addition,we implement the address predecoder with a small-area logic circuit.The area of the designed 32 kbit OTP with 5V and HV devices is 674.725μm×258.75μm(=0.1745mm2)and is 56.3% smaller than that using 3.3V devices.