14,703 research outputs found

    Multiparty quantum secret sharing with pure entangled states and decoy photons

    Full text link
    We present a scheme for multiparty quantum secret sharing of a private key with pure entangled states and decoy photons. The boss, say Alice uses the decoy photons, which are randomly in one of the four nonorthogonal single-photon states, to prevent a potentially dishonest agent from eavesdropping freely. This scheme requires the parties of communication to have neither an ideal single-photon quantum source nor a maximally entangled one, which makes this scheme more convenient than others in a practical application. Moreover, it has the advantage of having high intrinsic efficiency for qubits and exchanging less classical information in principle.Comment: 5 pages, no figure

    Static/Dynamic Filtering for Mesh Geometry

    Get PDF
    The joint bilateral filter, which enables feature-preserving signal smoothing according to the structural information from a guidance, has been applied for various tasks in geometry processing. Existing methods either rely on a static guidance that may be inconsistent with the input and lead to unsatisfactory results, or a dynamic guidance that is automatically updated but sensitive to noises and outliers. Inspired by recent advances in image filtering, we propose a new geometry filtering technique called static/dynamic filter, which utilizes both static and dynamic guidances to achieve state-of-the-art results. The proposed filter is based on a nonlinear optimization that enforces smoothness of the signal while preserving variations that correspond to features of certain scales. We develop an efficient iterative solver for the problem, which unifies existing filters that are based on static or dynamic guidances. The filter can be applied to mesh face normals followed by vertex position update, to achieve scale-aware and feature-preserving filtering of mesh geometry. It also works well for other types of signals defined on mesh surfaces, such as texture colors. Extensive experimental results demonstrate the effectiveness of the proposed filter for various geometry processing applications such as mesh denoising, geometry feature enhancement, and texture color filtering

    Improving the security of multiparty quantum secret splitting and quantum state sharing

    Get PDF
    A protocol for multiparty quantum secret splitting (MQSS) with an ordered NN Einstein-Podolsky-Rosen (EPR) pairs and Bell state measurements is recently proposed by Deng {\rm et al.} [Phys. Lett. A 354(2006)190]. We analyzed the security of the protocol and found that this protocol is secure for any other eavesdropper except for the agent Bob who adopts intercept-and-resend attack. Bob can obtain all the information of Alice's alone without being found. We also propose an improved version of the MQSS protocol.Comment: To appear in Phys. Lett.

    Molecular Lines of 13 Galactic Infrared Bubble Regions

    Full text link
    We investigated the physical properties of molecular clouds and star formation processes around infrared bubbles which are essentially expanding HII regions. We performed observations of 13 galactic infrared bubble fields containing 18 bubbles. Five molecular lines, 12CO (J=1-0), 13CO (J=1-0), C18O(J=1-0), HCN (J=1-0), and HCO+ (J=1-0), were observed, and several publicly available surveys, GLIMPSE, MIPSGAL, ATLASGAL, BGPS, VGPS, MAGPIS, and NVSS, were used for comparison. We find that these bubbles are generally connected with molecular clouds, most of which are giant. Several bubble regions display velocity gradients and broad shifted profiles, which could be due to the expansion of bubbles. The masses of molecular clouds within bubbles range from 100 to 19,000 solar mass, and their dynamic ages are about 0.3-3.7 Myr, which takes into account the internal turbulence pressure of surrounding molecular clouds. Clumps are found in the vicinity of all 18 bubbles, and molecular clouds near four of these bubbles with larger angular sizes show shell-like morphologies, indicating that either collect-and-collapse or radiation-driven implosion processes may have occurred. Due to the contamination of adjacent molecular clouds, only six bubble regions are appropriate to search for outflows, and we find that four of them have outflow activities. Three bubbles display ultra-compact HII regions at their borders, and one of them is probably responsible for its outflow. In total, only six bubbles show star formation activities in the vicinity, and we suggest that star formation processes might have been triggered.Comment: 55 Pages, 32 figures. Accepted for publication in A

    Improving the security of multiparty quantum secret sharing against Trojan horse attack

    Full text link
    We analyzed the security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang, Li and Man [Phys. Rev. A \textbf{71}, 044301 (2005)] and found that this protocol is secure for any other eavesdropper except for the agent Bob who prepares the quantum signals as he can attack the quantum communication with a Trojan horse. That is, Bob replaces the single-photon signal with a multi-photon one and the other agent Charlie cannot find this cheating as she does not measure the photons before they runs back from the boss Alice, which reveals that this MQSS protocol is not secure for Bob. Finally, we present a possible improvement of the MQSS protocol security with two single-photon measurements and six unitary operations.Comment: 4 pages, 2 figures; The revised version of the paper published in Phys. Rev. A 72, 044302 (2005). A bug is modified and an addendum is adde

    Efficient high-capacity quantum secret sharing with two-photon entanglement

    Full text link
    An efficient high-capacity quantum secret sharing scheme is proposed following some ideas in quantum dense coding with two-photon entanglement. The message sender, Alice prepares and measures the two-photon entangled states, and the two agents, Bob and Charlie code their information on their photons with four local unitary operations, which makes this scheme more convenient for the agents than others. This scheme has a high intrinsic efficiency for qubits and a high capacity.Comment: 5 pages, no figures. A inappreciable error is correcte
    corecore