Fifty years after the conclusion of Vatican II, debate still continues regarding the Council, its legacy and interpretation. The now-canonised Pope John XXIII surprised many by his sudden decision to summon Vatican II...Fifty years after the conclusion of Vatican II, debate still continues regarding the Council, its legacy and interpretation. The now-canonised Pope John XXIII surprised many by his sudden decision to summon Vatican II in 1959 soon after his election; it was not anticipated that a "transitional" pope would haake such an audacious and daring decision that would have such major historical implications for the Catholic Church. However, John XXIII's "surprise" decision came after decades of research, scholarship, and reflection on the Council of Trent especially the pastoral reforms instituted by St Charles Borromeo. Angelo Roncalli's study of Borromeo's apostolic visitation to the diocese of Bergamo in 1575 was decisive in shaping the historical framework that guided his ideas, his language, and style of leadership.展开更多
Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communicati...Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communication process.The purpose of the former is to authenticate Trent and users to each other,and let the two legitimate users(Alice and Bob)safely share the Bell states.While the latter aims to make direct communication to transmit a secret message between Alice and Bob.In order to prevent from Eve's eavesdropping as well as to authenticate each other simultaneously,a decoy photon checking technique is applied.Compared with other analogous protocols,the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient;i.e.,the total efficiency is almost 100%.Security analysis shows that the proposed scheme is secure against the eavesdropping attacks,the impersonation attacks,and some special Trent's attacks,including the attacks by using different initial states.展开更多
文摘Fifty years after the conclusion of Vatican II, debate still continues regarding the Council, its legacy and interpretation. The now-canonised Pope John XXIII surprised many by his sudden decision to summon Vatican II in 1959 soon after his election; it was not anticipated that a "transitional" pope would haake such an audacious and daring decision that would have such major historical implications for the Catholic Church. However, John XXIII's "surprise" decision came after decades of research, scholarship, and reflection on the Council of Trent especially the pastoral reforms instituted by St Charles Borromeo. Angelo Roncalli's study of Borromeo's apostolic visitation to the diocese of Bergamo in 1575 was decisive in shaping the historical framework that guided his ideas, his language, and style of leadership.
基金The National Natural Science Foundation of China(No.60873101)the Natural Science Foundation of Jiangsu Province(No.BK2008209)the Research Foundation of Nanjing University of Information Science and Technology(No.20080298)
文摘Based on mutual authentication and dense coding,a novel revised efficient quantum direct communication scheme is proposed.It is composed of two phases:the quantum state distribution process and the direct communication process.The purpose of the former is to authenticate Trent and users to each other,and let the two legitimate users(Alice and Bob)safely share the Bell states.While the latter aims to make direct communication to transmit a secret message between Alice and Bob.In order to prevent from Eve's eavesdropping as well as to authenticate each other simultaneously,a decoy photon checking technique is applied.Compared with other analogous protocols,the quantum state distribution process is more simple and feasible and the proposed scheme is more efficient;i.e.,the total efficiency is almost 100%.Security analysis shows that the proposed scheme is secure against the eavesdropping attacks,the impersonation attacks,and some special Trent's attacks,including the attacks by using different initial states.