6,594 research outputs found

    Threshold quantum cryptograph based on Grover's algorithm

    Get PDF
    Grover's operator in the two-qubit case can transform a basis into its conjugated basis. A permutation operator can transform a state in the two conjugated bases into its orthogonal state. These properties are included in a threshold quantum protocol. The proposed threshold quantum protocol is secure based the proof that the legitimate participators can only eavesdrop 2 bits of 3 bits operation information on one two-qubit with error probability 3/8. We propose a scheme to detect the Trojan horse attack without destroying the legal qubit.Comment: 7 pages, 1 figure

    Fake one-time pad cannot be used to improve the efficiency of quantum communication

    Full text link
    Two misuses of one-time pad in improving the efficiency of quantum communication are pointed out. One happens when using some message bits to encrypt others, the other exists because the key bits are not truly random. Both of them result in the decrease of security. Therefore, one-time pad should be used carefully in designing quantum communication protocols.Comment: 6 pages, no figure

    Extending Counter-Streaming Motion from an Active Region Filament to Sunspot Light Bridge

    Full text link
    We analyze the high-resolution observations from the 1.6m telescope at Big Bear Solar Observatory that cover an active region filament. Counter-streaming motions are clearly observed in the filament. The northern end of the counter-streaming motions extends to a light bridge, forming a spectacular circulation pattern around a sunspot, with clockwise motion in the blue wing and counterclockwise motion in the red wing as observed in Halpha off-bands. The apparent speed of the flow is around 10 to 60 km/s in the filament, decreasing to 5 to 20 km/s in the light bridge. The most intriguing results are the magnetic structure and the counter-streaming motions in the light bridge. Similar to those in the filament, magnetic fields show a dominant transverse component in the light bridge. However, the filament is located between opposite magnetic polarities, while the light bridge is between strong fields of the same polarity. We analyze the power of oscillations with the image sequences of constructed Dopplergrams, and find that the filament's counter-streaming motion is due to physical mass motion along fibrils, while the light bridge's counter-streaming motion is due to oscillation in the direction along the line-of-sight. The oscillation power peaks around 4 minutes. However, the section of the light bridge next to the filament also contains a component of the extension of the filament in combination with the oscillation, indicating that some strands of the filament are extended to and rooted in that part of the light bridge.Comment: 5 Figures, ApJ Letter, Accepte

    PTHGRN: unraveling post-translational hierarchical gene regulatory networks using PPI, ChIP-seq and gene expression data

    Get PDF
    Interactions among transcriptional factors (TFs), cofactors and other proteins or enzymes can affect transcriptional regulatory capabilities of eukaryotic organisms. Post-translational modifications (PTMs) cooperate with TFs and epigenetic alterations to constitute a hierarchical complexity in transcriptional gene regulation. While clearly implicated in biological processes, our understanding of these complex regulatory mechanisms is still limited and incomplete. Various online software have been proposed for uncovering transcriptional and epigenetic regulatory networks, however, there is a lack of effective web-based software capable of constructing underlying interactive organizations between post-translational and transcriptional regulatory components. Here, we present an open web server, post-translational hierarchical gene regulatory network (PTHGRN) to unravel relationships among PTMs, TFs, epigenetic modifications and gene expression. PTHGRN utilizes a graphical Gaussian model with partial least squares regression-based methodology, and is able to integrate protein-protein interactions, ChIP-seq and gene expression data and to capture essential regulation features behind high-throughput data. The server provides an integrative platform for users to analyze ready-to-use public high-throughput Omics resources or upload their own data for systems biology study. Users can choose various parameters in the method, build network topologies of interests and dissect their associations with biological functions. Application of the software to stem cell and breast cancer demonstrates that it is an effective tool for understanding regulatory mechanisms in biological complex systems. PTHGRN web server is publically available at web site http://www.byanbioinfo.org/pthgrn.published_or_final_versio

    A simulation study on the measurement of D0-D0bar mixing parameter y at BES-III

    Full text link
    We established a method on measuring the \dzdzb mixing parameter yy for BESIII experiment at the BEPCII e+ee^+e^- collider. In this method, the doubly tagged ψ(3770)D0D0\psi(3770) \to D^0 \overline{D^0} events, with one DD decays to CP-eigenstates and the other DD decays semileptonically, are used to reconstruct the signals. Since this analysis requires good e/πe/\pi separation, a likelihood approach, which combines the dE/dxdE/dx, time of flight and the electromagnetic shower detectors information, is used for particle identification. We estimate the sensitivity of the measurement of yy to be 0.007 based on a 20fb120fb^{-1} fully simulated MC sample.Comment: 6 pages, 7 figure

    Quantum algebra in the mixed light pseudoscalar meson states

    Full text link
    In this paper, we investigate the entanglement degrees of pseudoscalar meson states via quantum algebra Y(su(3)). By making use of transition effect of generators J of Y(su(3)), we construct various transition operators in terms of J of Y(su(3)), and act them on eta-pion-eta mixing meson state. The entanglement degrees of both the initial state and final state are calculated with the help of entropy theory. The diagrams of entanglement degrees are presented. Our result shows that a state with desired entanglement degree can be achieved by acting proper chosen transition operator on an initial state. This sheds new light on the connect among quantum information, particle physics and Yangian algebra.Comment: 9 pages, 3 figure

    Resisting Backdoor Attacks in Federated Learning via Bidirectional Elections and Individual Perspective

    Full text link
    Existing approaches defend against backdoor attacks in federated learning (FL) mainly through a) mitigating the impact of infected models, or b) excluding infected models. The former negatively impacts model accuracy, while the latter usually relies on globally clear boundaries between benign and infected model updates. However, model updates are easy to be mixed and scattered throughout in reality due to the diverse distributions of local data. This work focuses on excluding infected models in FL. Unlike previous perspectives from a global view, we propose Snowball, a novel anti-backdoor FL framework through bidirectional elections from an individual perspective inspired by one principle deduced by us and two principles in FL and deep learning. It is characterized by a) bottom-up election, where each candidate model update votes to several peer ones such that a few model updates are elected as selectees for aggregation; and b) top-down election, where selectees progressively enlarge themselves through picking up from the candidates. We compare Snowball with state-of-the-art defenses to backdoor attacks in FL on five real-world datasets, demonstrating its superior resistance to backdoor attacks and slight impact on the accuracy of the global model
    corecore