A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by build...A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by building up a hidden channel within the original quantum secure direct communication (QSDC) scheme. Based on the original QSDC, secret messages are transmitted by integrating the dense coding and the entanglement swapping of the GHZ states. The capacity of the super quantum channel achieves six bits per round covert communication, much higher than the previous quantum steganography protocols. Its imperceptibility is good, since the information and the secret messages can be regarded to be random or pseudo-random. Moreover, its security is proved to be reliable.展开更多
We investigate the strain in various Ge-on-insulator (GeOI) micro-structures induced by three phase-change maferials (PCMs) (Ge2Sb2Te5, Sb2Te3, GeTe) deposited. The PCMs could change the phase from amorphous sta...We investigate the strain in various Ge-on-insulator (GeOI) micro-structures induced by three phase-change maferials (PCMs) (Ge2Sb2Te5, Sb2Te3, GeTe) deposited. The PCMs could change the phase from amorphous state to polycrystalline state with a low temperature thermal annealing, resulting in an intrinsic contraction in the PCM films. Raman spectroscopy analysis is performed to compare the strain induced in the GeOI micro- structures by various PCMs. By comparison, Sb2 Tea could induce the largest amount of tensile strain in the GeOI micro-structures after the low temperature annealing. Based on the strain calculated from the Raman peak shifts, finite element numerical simulation is performed to calculate the strain-induced electron mobility enhancement for Ge n-MOSFETs with PCM liner stressors. With the adoption of Sb2 Te3 liner stressor, 22% electron mobility enhancement at Xinv=1×10^13cm^-2 could be achieved, suggesting that PCM especially Sb2 Te3 liner stressor is a promising technique for the performance enhancement of Ge MOSFETs.展开更多
The vehement explosion in two-dimensional (2D) materials has led to one exciting new discoveries after another for the past 15 years. This circumstance resembles a famous movie “The Gold Rush”(1925) expressed the tr...The vehement explosion in two-dimensional (2D) materials has led to one exciting new discoveries after another for the past 15 years. This circumstance resembles a famous movie “The Gold Rush”(1925) expressed the true story about the stream of American people as crowded as the hurricane to join the gold racing in the 19th century. Similarly, the family of 2D materials has gained tremendous interest from broad scientific community in various fields, from fundamental chemistry and physics to materials and device engineering. This special issue includes both tutorial reviews and original research articles, providing general overviews of the recent progresses and bringing about the newest discoveries in this rapidly evolving field.展开更多
According to the resonance transition between propagating surface plasmon and localized surface plasmon, we demonstrate a design of beam splitter that can split terahertz wave beams in a relatively broad frequency ran...According to the resonance transition between propagating surface plasmon and localized surface plasmon, we demonstrate a design of beam splitter that can split terahertz wave beams in a relatively broad frequency range. The transmission properties of the beam splitter are analyzed utilizing the finite element method. The resonance transition between two kinds of plasmons can be explained by a model of coherent electron cloud displacement.展开更多
Ge complementary tunneling field-effect transistors(TFETs) are fabricated with the NiGe metal source/drain(S/D) structure. The dopant segregation method is employed to form the NiGe/Ge tunneling junctions of suffi...Ge complementary tunneling field-effect transistors(TFETs) are fabricated with the NiGe metal source/drain(S/D) structure. The dopant segregation method is employed to form the NiGe/Ge tunneling junctions of sufficiently high Schottky barrier heights. As a result, the Ge p-and n-TFETs exhibit decent electrical properties of large ON-state current and steep sub-threshold slope(S factor). Especially, I_d of 0.2 μA/μm is revealed at V_g-V_(th) = V_d = ±0.5 V for Ge pTFETs,with the S factor of 28 mV/dec at 7 K.展开更多
A large payload quantum steganography protocol based on cavity quantum electrodynamics (QED) is presented in this paper, which effectively uses the evolutionary law of atoms in cavity QED. The protocol builds up a h...A large payload quantum steganography protocol based on cavity quantum electrodynamics (QED) is presented in this paper, which effectively uses the evolutionary law of atoms in cavity QED. The protocol builds up a hidden channel to transmit secret messages using entanglement swapping between one GHZ state and one Bell state in cavity QED together with the Hadamard operation. The quantum steganography protocol is insensitive to cavity decay and the thermal field. The capacity, imperceptibility and security against eavesdropping are analyzed in detail in the protocol. It turns out that the protocol not only has good imperceptibility but also possesses good security against eavesdropping. In addition, its capacity for a hidden channel achieves five bits, larger than most of the previous quantum steganography protocols.展开更多
We use the couple dipole method to investigate the scanning near-field optical microscopy metallic tip-nanoparticle near-field interaction. Dependences of the local field intensity inside the nanoparticle on the nanos...We use the couple dipole method to investigate the scanning near-field optical microscopy metallic tip-nanoparticle near-field interaction. Dependences of the local field intensity inside the nanoparticle on the nanosized tip shape,the tip open angle and the illumination angle are revealed. In combination with the previous results, we establish a complete model to understand the tip-nanoparticle near-field coupling mechanism.展开更多
In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective nois...In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective noise,i.e.,collective-dephasing noise and collective-rotation noise,where each logical qubit is composed of two physical qubits and free from noise.In each of the two proposed protocols,the secret messages are encoded on the initial logical qubits via two composite unitary operations.Moreover,the single-photon measurements rather than the Bell-state measurements or the more complicated measurements are needed for decoding,making the two proposed protocols easier to implement.The initial state of each logical qubit is privately shared between the two authenticated users through the direct transmission of its auxiliary counterpart.Consequently,the information leakage problem is avoided in the two proposed protocols.Moreover,the detailed security analysis also shows that Eve’s several famous active attacks can be effectively overcome,such as the Trojan horse attack,the intercept-resend attack,the measure-resend attack,the entangle-measure attack and the correlation-elicitation(CE)attack.展开更多
A measuring method of the echo reduction of passive materials by using the time reversal(TR) technique is presented. To measure the echo reduction of a sample with this approach, the received signals are firstly foc...A measuring method of the echo reduction of passive materials by using the time reversal(TR) technique is presented. To measure the echo reduction of a sample with this approach, the received signals are firstly focused according to the TR theory. Then, the sample is removed and the TR processing is again employed to realize the focus of the received signal.Finally, the echo reduction of the sample is evaluated with these focusing signals. Besides, to calibrate the measured echo reduction via the TR technique, a standard sample is employed to measure a constant coefficient that only depends on the measurement environment. An aluminum plate sample and a steel plate sample with the same size of 1.1 mxl.O m x0.005 m axe tested in a wave guide tank. The experimental results show that the calibrated values are well consistent with theoretical results under the free field at the measured frequency range of0.5-20 kHz. The relative errors of all the measured values are less than 10% and the values of the expanded uncertainty are less than 1.5 dB. The TR processing focuses the energy in spatial domain and temporal domain, so it can be used to measure the echo reduction of passive materials in the environments with reflections induced by boundaries and low frequency sources.展开更多
Quantum private comparison(QPC) aims to accomplish the equality comparison of the secrets from different users without disclosing their genuine contents by using the principles of quantum mechanics. In this paper, we ...Quantum private comparison(QPC) aims to accomplish the equality comparison of the secrets from different users without disclosing their genuine contents by using the principles of quantum mechanics. In this paper, we summarize eight modes of quantum state preparation and transmission existing in current QPC protocols first. Then, by using the mode of scattered preparation and one-way convergent transmission, we construct a new multi-user quantum private comparison(MQPC) protocol with two-particle maximally entangled states, which can accomplish arbitrary pair's comparison of equality amongK users within one execution. Analysis turns out that its output correctness and its security against both the outside attack and the participant attack are guaranteed. The proposed MQPC protocol can be implemented with current technologies. It can be concluded that the mode of scattered preparation and one-way convergent transmission of quantum states is beneficial to designing the MQPC protocol which can accomplish arbitrary pair's comparison of equality among K users within one execution.展开更多
At present, the anti-noise property and the information leakage resistant property are two great concerns for quantum dialogue(QD). In this paper, two anti-noise QD protocols without information leakage are presented ...At present, the anti-noise property and the information leakage resistant property are two great concerns for quantum dialogue(QD). In this paper, two anti-noise QD protocols without information leakage are presented by using the entanglement swapping technology for two logical Bell states. One works well over a collective-dephasing noise channel, while the other takes effect over a collective-rotation noise channel. The negative influence of noise is erased by using logical Bell states as the traveling quantum states. The problem of information leakage is avoided by swapping entanglement between two logical Bell states. In addition, only Bell state measurements are used for decoding, rather than four-qubit joint measurements.展开更多
Electromagnetic vortices, which describe the orbital angular momentum(OAM) carrying waves with a helical phase front, have recently attracted much interest in a radio frequency domain due to their potential applicatio...Electromagnetic vortices, which describe the orbital angular momentum(OAM) carrying waves with a helical phase front, have recently attracted much interest in a radio frequency domain due to their potential applications in many diverse areas. In an OAM-based scenario, the antenna for OAM mode multiplexing/demultiplexing plays an essential role in controlling the overall system performance. In this paper, we demonstrated theoretically and experimentally an easily realized OAM antenna based on the traveling-wave circular loop structure for efficiently multiplexing/demultiplexing multiple OAM modes; in addition, its general propagation characteristics including the polarization, divergence, and radiation pattern are mathematically analyzed. Schemes for antenna size reduction and various radiation pattern manipulations have also been discussed to realize a more flexible and compact system.展开更多
How to solve the information leakage problem has become the research focus of quantum dialogue. In this paper, in order to overcome the information leakage problem in quantum dialogue, a novel approach for sharing the...How to solve the information leakage problem has become the research focus of quantum dialogue. In this paper, in order to overcome the information leakage problem in quantum dialogue, a novel approach for sharing the initial quantum state privately between communicators, i.e., quantum encryption sharing, is proposed by utilizing the idea of quantum encryption. The proposed protocol uses EPR pairs as the private quantum key to encrypt and decrypt the traveling photons, which can be repeatedly used after rotation. Due to quantum encryption sharing, the public announcement on the state of the initial quantum state is omitted, thus the information leakage problem is overcome.The information-theoretical efficiency of the proposed protocol is nearly 100%, much higher than previous information leakage resistant quantum dialogue protocols. Moreover, the proposed protocol only needs single-photon measurements and nearly uses single photons as quantum resource so that it is convenient to implement in practice.展开更多
Semi-quantum secret sharing(SQSS) is an important branch of semi-quantum cryptography, and differs from quantum secret sharing(QSS) in that not all parties are required to possess quantum capabilities. All previous SQ...Semi-quantum secret sharing(SQSS) is an important branch of semi-quantum cryptography, and differs from quantum secret sharing(QSS) in that not all parties are required to possess quantum capabilities. All previous SQSS protocols have three common features:(i) they adopt product states or entangled states as initial quantum resource;(ii)the particles prepared by quantum party are transmitted in a tree-type way; and(iii) they require the classical parties to possess the measurement capability. In this paper, two circular SQSS protocols with single particles are suggested,where the first one requires the classical parties to possess the measurement capability while the second one does not have this requirement. Compared with the previous SQSS protocols, the proposed SQSS protocols have some distinct features:(i) they adopt single particles rather than product states or entangled states as initial quantum resource;(ii)the particles prepared by quantum party are transmitted in a circular way; and(iii) the second protocol releases the classical parties from the measurement capability. The proposed SQSS protocols are robust against some famous attacks from an eavesdropper, such as the measure-resend attack, the intercept-resend attack and the entangle-measure attack,and are feasible with present quantum technologies in reality.展开更多
In this paper,two fault tolerant channel-encrypting quantum dialogue(QD)protocols against collective noise are presented.One is against collective-dephasing noise,while the other is against collective-rotation noise.T...In this paper,two fault tolerant channel-encrypting quantum dialogue(QD)protocols against collective noise are presented.One is against collective-dephasing noise,while the other is against collective-rotation noise.The decoherent-free states,each of which is composed of two physical qubits,act as traveling states combating collective noise.Einstein-Podolsky-Rosen pairs,which play the role of private quantum key,are securely shared between two participants over a collective-noise channel in advance.Through encryption and decryption with private quantum key,the initial state of each traveling two-photon logical qubit is privately shared between two participants.Due to quantum encryption sharing of the initial state of each traveling logical qubit,the issue of information leakage is overcome.The private quantum key can be repeatedly used after rotation as long as the rotation angle is properly chosen,making quantum resource economized.As a result,their information-theoretical efficiency is nearly up to 66.7%.The proposed QD protocols only need single-photon measurements rather than two-photon joint measurements for quantum measurements.Security analysis shows that an eavesdropper cannot obtain anything useful about secret messages during the dialogue process without being discovered.Furthermore,the proposed QD protocols can be implemented with current techniques in experiment.展开更多
Accurately representing the quantity and characteristics of users' interest in certain topics is an important problem facing topic evolution researchers, particularly as it applies to modem online environments. Searc...Accurately representing the quantity and characteristics of users' interest in certain topics is an important problem facing topic evolution researchers, particularly as it applies to modem online environments. Search engines can provide information retrieval for a specified topic from archived data, but fail to reflect changes in interest toward the topic over time in a structured way. This paper reviews notable research on topic evolution based on the probabilistic topic model from multiple aspects over the past decade. First, we introduce notations, terminology, and the basic topic model explored in the survey, then we summarize three categories of topic evolution based on the probabilistic topic model: the discrete time topic evolution model, the continuous time topic evolution model, and the online topic evolution model. Next, we describe applications of the topic evolution model and attempt to summarize model generalization performance evaluation and topic evolution evaluation methods, as well as providing comparative experimental results for different models. To conclude the review, we pose some open questions and discuss possible future research directions.展开更多
Researchers across the globe have been increasingly interested in the manner in which important research topics evolve over time within the corpus of scientific literature. In a dataset of scientific articles, each do...Researchers across the globe have been increasingly interested in the manner in which important research topics evolve over time within the corpus of scientific literature. In a dataset of scientific articles, each document can be considered to comprise both the words of the document itself and its citations of other documents. In this paper, we propose a citationcontent-latent Dirichlet allocation(LDA) topic discovery method that accounts for both document citation relations and the content of the document itself via a probabilistic generative model. The citation-content-LDA topic model exploits a two-level topic model that includes the citation information for ‘father' topics and text information for sub-topics. The model parameters are estimated by a collapsed Gibbs sampling algorithm. We also propose a topic evolution algorithm that runs in two steps: topic segmentation and topic dependency relation calculation. We have tested the proposed citation-content-LDA model and topic evolution algorithm on two online datasets, IEEE Transactions on Pattern Analysis and Machine Intelligence(PAMI) and IEEE Computer Society(CS), to demonstrate that our algorithm effectively discovers important topics and reflects the topic evolution of important research themes. According to our evaluation metrics, citation-content-LDA outperforms both content-LDA and citation-LDA.展开更多
Compared with complementary metal–oxide semiconductor(CMOS), the resonant tunneling device(RTD) has better performances; it is the most promising candidate for next-generation integrated circuit devices. The universa...Compared with complementary metal–oxide semiconductor(CMOS), the resonant tunneling device(RTD) has better performances; it is the most promising candidate for next-generation integrated circuit devices. The universal logic gate is an important unit circuit because of its powerful logic function, but there are few function synthesis algorithms that can implement an n-variable logical function by RTD-based universal logic gates. In this paper, we propose a new concept, i.e., the truth value matrix. With it a novel disjunctive decomposition algorithm can be used to decompose an arbitrary n-variable logical function into three-variable subset functions. On this basis, a novel function synthesis algorithm is proposed, which can implement arbitrary n-variable logical functions by RTD-based universal threshold logic gates(UTLGs), RTD-based three-variable XOR gates(XOR3s), and RTD-based three-variable universal logic gate(ULG3s). When this proposed function synthesis algorithm is used to implement an n-variable logical function, if the function is a directly disjunctive decomposition one, the circuit structure will be very simple, and if the function is a non-directly disjunctive decomposition one, the circuit structure will be simpler than when using only UTLGs or ULG3s. The proposed function synthesis algorithm is straightforward to program, and with this algorithm it is convenient to implement an arbitrary n-variable logical function by RTD-based universal logic gates.展开更多
Graphene is an ideal 2D material system bridging electronic and photonic devices. It also breaks the fundamental speed and size limits by electronics and photonics, respectively. Graphene offers multiple functions of ...Graphene is an ideal 2D material system bridging electronic and photonic devices. It also breaks the fundamental speed and size limits by electronics and photonics, respectively. Graphene offers multiple functions of signal transmission, emission, modulation, and detection in a broad band, high speed, compact size, and low loss. Here, we have a brief view of graphene based functional devices at microwave, terahertz, and optical frequencies. Their fundamental physics and computational models were discussed as well.展开更多
基金Project supported by the National Natural Science Foundation of China (Grant No. 60972071)the Natural Science Foundation of Zhejiang Province, China(Grant Nos. Y6100421 and LQ12F02012)
文摘A quantum steganography protocol with a large payload is proposed based on the dense coding and the entanglement swapping of the Greenberger-Horne-Zeilinger (GHZ) states. Its super quantum channel is formed by building up a hidden channel within the original quantum secure direct communication (QSDC) scheme. Based on the original QSDC, secret messages are transmitted by integrating the dense coding and the entanglement swapping of the GHZ states. The capacity of the super quantum channel achieves six bits per round covert communication, much higher than the previous quantum steganography protocols. Its imperceptibility is good, since the information and the secret messages can be regarded to be random or pseudo-random. Moreover, its security is proved to be reliable.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61376097,61504120U1609213,the Zhejiang Provincial Natural Science Foundation of China under Grant No LR14F040001the Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No 20130091110025
文摘We investigate the strain in various Ge-on-insulator (GeOI) micro-structures induced by three phase-change maferials (PCMs) (Ge2Sb2Te5, Sb2Te3, GeTe) deposited. The PCMs could change the phase from amorphous state to polycrystalline state with a low temperature thermal annealing, resulting in an intrinsic contraction in the PCM films. Raman spectroscopy analysis is performed to compare the strain induced in the GeOI micro- structures by various PCMs. By comparison, Sb2 Tea could induce the largest amount of tensile strain in the GeOI micro-structures after the low temperature annealing. Based on the strain calculated from the Raman peak shifts, finite element numerical simulation is performed to calculate the strain-induced electron mobility enhancement for Ge n-MOSFETs with PCM liner stressors. With the adoption of Sb2 Te3 liner stressor, 22% electron mobility enhancement at Xinv=1×10^13cm^-2 could be achieved, suggesting that PCM especially Sb2 Te3 liner stressor is a promising technique for the performance enhancement of Ge MOSFETs.
文摘The vehement explosion in two-dimensional (2D) materials has led to one exciting new discoveries after another for the past 15 years. This circumstance resembles a famous movie “The Gold Rush”(1925) expressed the true story about the stream of American people as crowded as the hurricane to join the gold racing in the 19th century. Similarly, the family of 2D materials has gained tremendous interest from broad scientific community in various fields, from fundamental chemistry and physics to materials and device engineering. This special issue includes both tutorial reviews and original research articles, providing general overviews of the recent progresses and bringing about the newest discoveries in this rapidly evolving field.
文摘According to the resonance transition between propagating surface plasmon and localized surface plasmon, we demonstrate a design of beam splitter that can split terahertz wave beams in a relatively broad frequency range. The transmission properties of the beam splitter are analyzed utilizing the finite element method. The resonance transition between two kinds of plasmons can be explained by a model of coherent electron cloud displacement.
基金Supported by the National Natural Science Foundation of China under Grant No 61504120the Zhejiang Provincial Natural Science Foundation of China under Grant No LR18F040001the Fundamental Research Funds for the Central Universities
文摘Ge complementary tunneling field-effect transistors(TFETs) are fabricated with the NiGe metal source/drain(S/D) structure. The dopant segregation method is employed to form the NiGe/Ge tunneling junctions of sufficiently high Schottky barrier heights. As a result, the Ge p-and n-TFETs exhibit decent electrical properties of large ON-state current and steep sub-threshold slope(S factor). Especially, I_d of 0.2 μA/μm is revealed at V_g-V_(th) = V_d = ±0.5 V for Ge pTFETs,with the S factor of 28 mV/dec at 7 K.
基金Project supported by the National Natural Science Foundation of China (Grant No. 60972071)the Natural Science Foundation of Zhejiang Province, China(Grant Nos. LQ12F02012 and Y6100421)
文摘A large payload quantum steganography protocol based on cavity quantum electrodynamics (QED) is presented in this paper, which effectively uses the evolutionary law of atoms in cavity QED. The protocol builds up a hidden channel to transmit secret messages using entanglement swapping between one GHZ state and one Bell state in cavity QED together with the Hadamard operation. The quantum steganography protocol is insensitive to cavity decay and the thermal field. The capacity, imperceptibility and security against eavesdropping are analyzed in detail in the protocol. It turns out that the protocol not only has good imperceptibility but also possesses good security against eavesdropping. In addition, its capacity for a hidden channel achieves five bits, larger than most of the previous quantum steganography protocols.
基金Supported by the Start-Up Grant of Zhejiang University of Technology,the Zhejiang Provincial Key Laboratory of Information Processing,Communication and Networking,the Zhejiang University,and the National Natural Science Foundation of China under Grant No 61605171
文摘We use the couple dipole method to investigate the scanning near-field optical microscopy metallic tip-nanoparticle near-field interaction. Dependences of the local field intensity inside the nanoparticle on the nanosized tip shape,the tip open angle and the illumination angle are revealed. In combination with the previous results, we establish a complete model to understand the tip-nanoparticle near-field coupling mechanism.
基金supported by the National Natural Science Foundation of China(Grant No.11375152 and 61402407)the Natural Science Foundation of Zhejiang Province(Grant No.LQ12F02012)
文摘In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective noise,i.e.,collective-dephasing noise and collective-rotation noise,where each logical qubit is composed of two physical qubits and free from noise.In each of the two proposed protocols,the secret messages are encoded on the initial logical qubits via two composite unitary operations.Moreover,the single-photon measurements rather than the Bell-state measurements or the more complicated measurements are needed for decoding,making the two proposed protocols easier to implement.The initial state of each logical qubit is privately shared between the two authenticated users through the direct transmission of its auxiliary counterpart.Consequently,the information leakage problem is avoided in the two proposed protocols.Moreover,the detailed security analysis also shows that Eve’s several famous active attacks can be effectively overcome,such as the Trojan horse attack,the intercept-resend attack,the measure-resend attack,the entangle-measure attack and the correlation-elicitation(CE)attack.
文摘A measuring method of the echo reduction of passive materials by using the time reversal(TR) technique is presented. To measure the echo reduction of a sample with this approach, the received signals are firstly focused according to the TR theory. Then, the sample is removed and the TR processing is again employed to realize the focus of the received signal.Finally, the echo reduction of the sample is evaluated with these focusing signals. Besides, to calibrate the measured echo reduction via the TR technique, a standard sample is employed to measure a constant coefficient that only depends on the measurement environment. An aluminum plate sample and a steel plate sample with the same size of 1.1 mxl.O m x0.005 m axe tested in a wave guide tank. The experimental results show that the calibrated values are well consistent with theoretical results under the free field at the measured frequency range of0.5-20 kHz. The relative errors of all the measured values are less than 10% and the values of the expanded uncertainty are less than 1.5 dB. The TR processing focuses the energy in spatial domain and temporal domain, so it can be used to measure the echo reduction of passive materials in the environments with reflections induced by boundaries and low frequency sources.
基金supported by the National Natural Science Foundation of China(Grant Nos.61402407,and 11375152)
文摘Quantum private comparison(QPC) aims to accomplish the equality comparison of the secrets from different users without disclosing their genuine contents by using the principles of quantum mechanics. In this paper, we summarize eight modes of quantum state preparation and transmission existing in current QPC protocols first. Then, by using the mode of scattered preparation and one-way convergent transmission, we construct a new multi-user quantum private comparison(MQPC) protocol with two-particle maximally entangled states, which can accomplish arbitrary pair's comparison of equality amongK users within one execution. Analysis turns out that its output correctness and its security against both the outside attack and the participant attack are guaranteed. The proposed MQPC protocol can be implemented with current technologies. It can be concluded that the mode of scattered preparation and one-way convergent transmission of quantum states is beneficial to designing the MQPC protocol which can accomplish arbitrary pair's comparison of equality among K users within one execution.
基金Supported by the National Natural Science Foundation of China under Grant Nos.61402407 and 11375152
文摘At present, the anti-noise property and the information leakage resistant property are two great concerns for quantum dialogue(QD). In this paper, two anti-noise QD protocols without information leakage are presented by using the entanglement swapping technology for two logical Bell states. One works well over a collective-dephasing noise channel, while the other takes effect over a collective-rotation noise channel. The negative influence of noise is erased by using logical Bell states as the traveling quantum states. The problem of information leakage is avoided by swapping entanglement between two logical Bell states. In addition, only Bell state measurements are used for decoding, rather than four-qubit joint measurements.
基金National Natural Science Foundation of China(NSFC)(61371030,61571391)National Basic Research Program of China(973 program)(2014CB340005)
文摘Electromagnetic vortices, which describe the orbital angular momentum(OAM) carrying waves with a helical phase front, have recently attracted much interest in a radio frequency domain due to their potential applications in many diverse areas. In an OAM-based scenario, the antenna for OAM mode multiplexing/demultiplexing plays an essential role in controlling the overall system performance. In this paper, we demonstrated theoretically and experimentally an easily realized OAM antenna based on the traveling-wave circular loop structure for efficiently multiplexing/demultiplexing multiple OAM modes; in addition, its general propagation characteristics including the polarization, divergence, and radiation pattern are mathematically analyzed. Schemes for antenna size reduction and various radiation pattern manipulations have also been discussed to realize a more flexible and compact system.
基金Supported by the National Natural Science Foundation of China under Grant Nos.11375152 and 61402407the Natural Science Foundation of Zhejiang Province under Grant No.LQ12F02012
文摘How to solve the information leakage problem has become the research focus of quantum dialogue. In this paper, in order to overcome the information leakage problem in quantum dialogue, a novel approach for sharing the initial quantum state privately between communicators, i.e., quantum encryption sharing, is proposed by utilizing the idea of quantum encryption. The proposed protocol uses EPR pairs as the private quantum key to encrypt and decrypt the traveling photons, which can be repeatedly used after rotation. Due to quantum encryption sharing, the public announcement on the state of the initial quantum state is omitted, thus the information leakage problem is overcome.The information-theoretical efficiency of the proposed protocol is nearly 100%, much higher than previous information leakage resistant quantum dialogue protocols. Moreover, the proposed protocol only needs single-photon measurements and nearly uses single photons as quantum resource so that it is convenient to implement in practice.
基金Supported by the National Nature Science Foundation of China under Grant No.61871347the Natural Science Foundation of Zhejiang Province under Grant No.LY18F020007
文摘Semi-quantum secret sharing(SQSS) is an important branch of semi-quantum cryptography, and differs from quantum secret sharing(QSS) in that not all parties are required to possess quantum capabilities. All previous SQSS protocols have three common features:(i) they adopt product states or entangled states as initial quantum resource;(ii)the particles prepared by quantum party are transmitted in a tree-type way; and(iii) they require the classical parties to possess the measurement capability. In this paper, two circular SQSS protocols with single particles are suggested,where the first one requires the classical parties to possess the measurement capability while the second one does not have this requirement. Compared with the previous SQSS protocols, the proposed SQSS protocols have some distinct features:(i) they adopt single particles rather than product states or entangled states as initial quantum resource;(ii)the particles prepared by quantum party are transmitted in a circular way; and(iii) the second protocol releases the classical parties from the measurement capability. The proposed SQSS protocols are robust against some famous attacks from an eavesdropper, such as the measure-resend attack, the intercept-resend attack and the entangle-measure attack,and are feasible with present quantum technologies in reality.
基金supported by the National Natural Science Foundation of China(Grant Nos.61402407 and 11375152)
文摘In this paper,two fault tolerant channel-encrypting quantum dialogue(QD)protocols against collective noise are presented.One is against collective-dephasing noise,while the other is against collective-rotation noise.The decoherent-free states,each of which is composed of two physical qubits,act as traveling states combating collective noise.Einstein-Podolsky-Rosen pairs,which play the role of private quantum key,are securely shared between two participants over a collective-noise channel in advance.Through encryption and decryption with private quantum key,the initial state of each traveling two-photon logical qubit is privately shared between two participants.Due to quantum encryption sharing of the initial state of each traveling logical qubit,the issue of information leakage is overcome.The private quantum key can be repeatedly used after rotation as long as the rotation angle is properly chosen,making quantum resource economized.As a result,their information-theoretical efficiency is nearly up to 66.7%.The proposed QD protocols only need single-photon measurements rather than two-photon joint measurements for quantum measurements.Security analysis shows that an eavesdropper cannot obtain anything useful about secret messages during the dialogue process without being discovered.Furthermore,the proposed QD protocols can be implemented with current techniques in experiment.
基金Acknowledgements The authors would like to thank the anonymous reviewers for their constructive comments and suggestions, which significantly contributed to improving the manuscript. This work was supported by the National Key Basic Research Project of China (973 Program) (2012CB316400), the National Natural Science Foundation of China (Grant Nos. 61471321, 61202400, 31300539, and 31570629), the Zhejiang Provincial Natural Science Foundation of China (LY15C140005, LY16F010004), Science and Technology Department of Zhejiang Province Public Welfare Project (2016C31G2010057, 2015C31004), Fundamental Research Funds for the Central Universities (172210261) and the Zhejiang Provincial Key Laboratory of Forestry Intelligent Monitoring and Information Technology Research.
文摘Accurately representing the quantity and characteristics of users' interest in certain topics is an important problem facing topic evolution researchers, particularly as it applies to modem online environments. Search engines can provide information retrieval for a specified topic from archived data, but fail to reflect changes in interest toward the topic over time in a structured way. This paper reviews notable research on topic evolution based on the probabilistic topic model from multiple aspects over the past decade. First, we introduce notations, terminology, and the basic topic model explored in the survey, then we summarize three categories of topic evolution based on the probabilistic topic model: the discrete time topic evolution model, the continuous time topic evolution model, and the online topic evolution model. Next, we describe applications of the topic evolution model and attempt to summarize model generalization performance evaluation and topic evolution evaluation methods, as well as providing comparative experimental results for different models. To conclude the review, we pose some open questions and discuss possible future research directions.
基金supported by the National Basic Research Program(973)of China(No.2012CB316400)
文摘Researchers across the globe have been increasingly interested in the manner in which important research topics evolve over time within the corpus of scientific literature. In a dataset of scientific articles, each document can be considered to comprise both the words of the document itself and its citations of other documents. In this paper, we propose a citationcontent-latent Dirichlet allocation(LDA) topic discovery method that accounts for both document citation relations and the content of the document itself via a probabilistic generative model. The citation-content-LDA topic model exploits a two-level topic model that includes the citation information for ‘father' topics and text information for sub-topics. The model parameters are estimated by a collapsed Gibbs sampling algorithm. We also propose a topic evolution algorithm that runs in two steps: topic segmentation and topic dependency relation calculation. We have tested the proposed citation-content-LDA model and topic evolution algorithm on two online datasets, IEEE Transactions on Pattern Analysis and Machine Intelligence(PAMI) and IEEE Computer Society(CS), to demonstrate that our algorithm effectively discovers important topics and reflects the topic evolution of important research themes. According to our evaluation metrics, citation-content-LDA outperforms both content-LDA and citation-LDA.
基金supported by the Zhejiang Provincial Natural Science Foundation,China(No.LY15F010011)the National Natural Science Foundation of China(Nos.61771179,61471314,and 61271124)
文摘Compared with complementary metal–oxide semiconductor(CMOS), the resonant tunneling device(RTD) has better performances; it is the most promising candidate for next-generation integrated circuit devices. The universal logic gate is an important unit circuit because of its powerful logic function, but there are few function synthesis algorithms that can implement an n-variable logical function by RTD-based universal logic gates. In this paper, we propose a new concept, i.e., the truth value matrix. With it a novel disjunctive decomposition algorithm can be used to decompose an arbitrary n-variable logical function into three-variable subset functions. On this basis, a novel function synthesis algorithm is proposed, which can implement arbitrary n-variable logical functions by RTD-based universal threshold logic gates(UTLGs), RTD-based three-variable XOR gates(XOR3s), and RTD-based three-variable universal logic gate(ULG3s). When this proposed function synthesis algorithm is used to implement an n-variable logical function, if the function is a directly disjunctive decomposition one, the circuit structure will be very simple, and if the function is a non-directly disjunctive decomposition one, the circuit structure will be simpler than when using only UTLGs or ULG3s. The proposed function synthesis algorithm is straightforward to program, and with this algorithm it is convenient to implement an arbitrary n-variable logical function by RTD-based universal logic gates.
文摘Graphene is an ideal 2D material system bridging electronic and photonic devices. It also breaks the fundamental speed and size limits by electronics and photonics, respectively. Graphene offers multiple functions of signal transmission, emission, modulation, and detection in a broad band, high speed, compact size, and low loss. Here, we have a brief view of graphene based functional devices at microwave, terahertz, and optical frequencies. Their fundamental physics and computational models were discussed as well.
基金supported by the National Natural Science Foundation of China(Nos.61271124 and 61471314)the Zhejiang Provincial Natural Science Foundation of China(Nos.LY13F010001 and LY15F010011)