Project supported by the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province,China(Grant No.SKLACSS-202108);the Open Research Fund of Key Laboratory of Cryptography of Zhejiang Province,China(Grant No.ZCL21006);the National Natural Science Foundation of China(Grant Nos.U1636106,92046001,61671087,61962009,and 61170272);the BUPT Excellent Ph.D.Students Foundation(Grant No.CX2020310);Natural Science Foundation of Beijing Municipality,China(Grant No.4182006);the Fundamental Research Funds for the Central Universities,China(Grant No.2019XD-A02).
Very recently,Lee et al.proposed a secure quantum teleportation protocol to transfer shared quantum secret between multiple parties in a network[Phys.Rev.Lett.124060501(2020)].This quantum network is encoded with a ma...
Project supported by the Fundamental Research Funds for the Central Universities, China (Grant No. 2019XD-A02);the National Natural Science Foundation of China (Grant Nos. U1636106, 61671087, 61170272, and 92046001);Natural Science Foundation of Beijing Municipality, China (Grant No. 4182006);Technological Special Project of Guizhou Province, China (Grant No. 20183001);the Foundation of Guizhou Provincial Key Laboratory of Public Big Data (Grant Nos. 2018BDKFJJ016 and 2018BDKFJJ018)。
Partial least squares(PLS) regression is an important linear regression method that efficiently addresses the multiple correlation problem by combining principal component analysis and multiple regression. In this pap...
Project supported by NSFC(Grant Nos.61671087,61272514,61170272,61003287,61571335,61628209);the Fok Ying Tong Education Foundation(Grant No.131067);the National Key R&D Program of China under Grant 2017YFB0802300;the Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(2018BDKFJJ016);Hubei Science Foundation(2016CFA030,2017AAA125)。
In this paper,we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme,which was found insecure under two kinds of attacks,fake entangled particles attack a...
Rational participants want to maximize their benefits.The protocol with rational participants will be more realistic than the protocol with honest,semi-honest and dishonest participants.We research the rational non-hi...
supported by National Natural Science Foundation of China (Grant Nos. 61671087, 61272514, 61170272, 61003287, 61373131);the Fok Ying Tong Education Foundation (Grant No. 131067);the Major Science and Technology Support Program of Guizhou Province (Grant No. 20183001)
Quantum network coding with the assistance of auxiliary resources can achieve perfect transmission of the quantum state. This paper suggests a novel perfect network coding scheme to efficiently solve the quantum k-pai...
supported by National Natural Science Foundation of China(Grant Nos.61671087,61272514,61170272);National Development Foundation for Cryptological Research(Grant No.MMJJ201401012);Fok Ying Tung Education Foundation(Grant No.131067);Natural Science Foundation of Inner Mongolia(Grant No.2017MS0602);University Scientific Research Project of Inner Mongolia(Grant No.NJZY17164);Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant No.2017BDKFJJ007)
A novel rational protocol to share two arbitrary qubits among multiple parties is investigated in this paper. First, the protocol is presented, which is learned from Li et al.'s protocol. Second, the utility,security...
Supported by the National Natural Science Foundation of China(61170271,61170272,61272310,61373131,61573316);Zhejiang Provincial Natural Science Foundation of China(LY15F020032,LQ12 F02016,LQ15E050006)
In order to estimate maximum steganographic capacity of discrete cosine transform(DCT) domain in JPEG image, this paper presents a method based on the maximize capacity under undetectable model(MCUU). We analyze t...
supported by the National Natural Science Foundation of China(Grant Nos.61303199,61272514,61170272,61121061,and 61411146001);the Shandong Provincial Natural Science Foundation of China(Grant Nos.ZR2013FM025,ZR2013FQ001,and ZR2014FM003);the Shandong Provincial Outstanding Research Award Fund for Young Scientists of China(Grant Nos.BS2013DX010 and BS2014DX007);the Program for New Century Excellent Talents in Universities,China(Grant No.NCET-13-0681);the National Development Foundation for Cryptological Research,China(Grant No.MMJJ201401012);the Fok Ying Tong Education Foundation,China(Grant No.131067);the Shandong Academy of Sciences Youth Fund Project,China(Grant No.2013QN007)
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an...