Blockchain technology has become a research hotspot in recent years with the prominent characteristics as public,distributed and decentration.And blockchain-enabled internet of things(BIoT)has a tendency to make a rev...Blockchain technology has become a research hotspot in recent years with the prominent characteristics as public,distributed and decentration.And blockchain-enabled internet of things(BIoT)has a tendency to make a revolutionary change for the internet of things(IoT)which requires distributed trustless consensus.However,the scalability and security issues become particularly important with the dramatically increasing number of IoT devices.Especially,with the development of quantum computing,many extant cryptographic algorithms applied in blockchain or BIoT systems are vulnerable to the quantum attacks.In this paper,an anti-quantum proxy blind signature scheme based on the lattice cryptography has been proposed,which can provide user anonymity and untraceability in the distributed applications of BIoT.Then,the security proof of the proposed scheme can derive that it is secure in random oracle model,and the efficiency analysis can indicate it is efficient than other similar literatures.展开更多
With the rapid development of cloud computing technology,cloud services have now become a new business model for information services.The cloud server provides the IT resources required by customers in a selfservice m...With the rapid development of cloud computing technology,cloud services have now become a new business model for information services.The cloud server provides the IT resources required by customers in a selfservice manner through the network,realizing business expansion and rapid innovation.However,due to the insufficient protection of data privacy,the problem of data privacy leakage in cloud storage is threatening cloud computing.To address the problem,we propose BC-PECK,a data protection scheme based on blockchain and public key searchable encryption.Firstly,all the data is protected by the encryption algorithm.The privacy data is encrypted and stored in a cloud server,while the ciphertext index is established by a public key searchable encryption scheme and stored on the blockchain.Secondly,based on the characteristics of trusted execution of smart contract technology,a control mechanism for data accessing and sharing is given.Data transaction is automatically recorded on the blockchain,which is fairer under the premise of ensuring the privacy and security of the data sharing process.Finally,we analyzed the security and fairness of the current scheme.Through the comparison with similar schemes,we have shown the advantages of the proposed scheme.展开更多
In this paper,we propose an asymmetric controlled bidirectional transmission protocol.In the protocol,by using the thirteen-qubit entangled state as the quantum channel,Alice can realize the transmission of a two-qubi...In this paper,we propose an asymmetric controlled bidirectional transmission protocol.In the protocol,by using the thirteen-qubit entangled state as the quantum channel,Alice can realize the transmission of a two-qubit equatorial state for Bob and Bob can transmit a four-qubit equatorial state for Alice under the control of Charlie.Firstly,we give the construction of the quantum channel,which can be done by performing several H and CNOT operations.Secondly,through implementing the appropriate measurements and the corresponding recovery operations,the desired states can be transmitted simultaneously,securely and deterministically.Finally,we analyze the performance of the protocol,including the efficiency,the necessary operations and the classical communication costs.And then,we describe some comparisons with other protocols.Since our protocol does not require auxiliary particles and additional operations,the classic communication costs less while achieving the multi-particle bidirectional transmission,so the overall performance of the protocol is better.展开更多
Quantum network coding is used to solve the congestion problem in quantum communication,which will promote the transmission efficiency of quantum information and the total throughput of quantum network.We propose a no...Quantum network coding is used to solve the congestion problem in quantum communication,which will promote the transmission efficiency of quantum information and the total throughput of quantum network.We propose a novel controlled quantum network coding without information loss.The effective transmission of quantum states on the butterfly network requires the consent form a third-party controller Charlie.Firstly,two pairs of threeparticle non-maximum entangled states are pre-shared between senders and controller.By adding auxiliary particles and local operations,the senders can predict whether a certain quantum state can be successfully transmitted within the butterfly network based on the Z-{10>,|1>}basis.Secondly,when trans-mission fails upon prediction,the quantum state will not be lost,and it will sill be held by the sender.Subsequently,the controller Charlie re-prepares another three-particle non-maximum entangled state to start a new round.When the predicted transmission is successful,the quantum state can be transmitted successfully within the butterfly network.If the receiver wants to receive the effective quantum state,the quantum measurements from Charlie are needed.Thirdly,when the transmission fails,Charlie does not need to integrate the X-{1+>,1->}basis to measure its own particles,by which quantum resources are saved.Charlie not only controls the effective transmission of quantum states,but also the usage of classical and quantum channels.Finally,the implementation of the quantum circuits,as well as a flow chart and safety analysis of our scheme,is proposed.展开更多
Recently, the community analysis has seen enormous research advancements in the field of social networks. A large amount of the current studies put forward different models and algorithms about most influential people...Recently, the community analysis has seen enormous research advancements in the field of social networks. A large amount of the current studies put forward different models and algorithms about most influential people. However, there is little work to shed light on how to rank communities while considering their levels that are determined by the quality of their published contents. In this paper, we propose solution for measuring the influence of communities and ranking them by considering joint weight composed of internal and external influence of communities. To address this issue, we design a novel algorithm called Com Rank: a modification of Page Rank, which considers the joint weight in order to identify impact of each community and ranking them. We use real-world data trace in citation network and perform extensive experiments to evaluate our proposed algorithm. The comparative results depict significant improvements by our algorithm in community ranking due to the inclusion of proposed weighting feature.展开更多
We propos e a cos t-effective multi-carrier generation technique which minimizes the passive optical access network(PON) costs. In this study replacement of laser array with multi-carrier source at optical line termin...We propos e a cos t-effective multi-carrier generation technique which minimizes the passive optical access network(PON) costs. In this study replacement of laser array with multi-carrier source at optical line terminal(OLT) side in PON is addressed. With 25-GHz frequency spacing, the generated optical multi-carriers exhibit good tone to noise ratio(TNR) i. e. above 20 d B, and least amplitude difference i. e. 1.5d B. At the OLT, multi-carriers signal based multiplexed differential phase shift keying(DPSK) data from all the channels each having 10 Gbps for downlink is transmitted through 25 km single mode fiber. While the transmitted information is retrieved at optical network unit(ONU), part of the downlink signal is re-modulated using intensity modulated(IM) on-off keying(OOK) for upstream transmission at 10-Gbps. Simulation results are in good agreement with the theoretical analysis, showing error free transmission in downlink and uplink with 10 Gbps symmetric data rate at each channel. The receivedpower, both for uplink and downlink transmission, is adequate for all channels at BER of 10-9 with minimum power penalties. Power budget is calculated for different splitting ratios showing excellent system margins for any unseen losses. The proposed setup provides a cost-effective way minimizing transmission losses, and providing greater system's margin in PON architecture.展开更多
Cricket databases contain rich and useful information to examine and forecasting patterns and trends.This paper predicts Star Cricketers(SCs)from batting and bowling domains by employing supervised machine learning mo...Cricket databases contain rich and useful information to examine and forecasting patterns and trends.This paper predicts Star Cricketers(SCs)from batting and bowling domains by employing supervised machine learning models.With this aim,each player’s performance evolution is retrieved by using effective features that incorporate the standard performance measures of each player and their peers.Prediction is performed by applying Bayesianrule,function and decision-tree-based models.Experimental evaluations are performed to validate the applicability of the proposed approach.In particular,the impact of the individual features on the prediction of SCs are analyzed.Moreover,the category and model-wise feature evaluations are also conducted.A cross-validation mechanism is applied to validate the performance of our proposed approach which further confirms that the incorporated features are statistically significant.Finally,leading SCs are extracted based on their performance evolution scores and their standings are cross-checked with those provided by the International Cricket Council.展开更多
To ensure the security during the communication,we often adopt different ways to encrypt the messages to resist various attacks.However,with the computing power improving,the existing encryption and authentication sch...To ensure the security during the communication,we often adopt different ways to encrypt the messages to resist various attacks.However,with the computing power improving,the existing encryption and authentication schemes are being faced with big challenges.We take the message authentication as an example into a careful consideration.Then,we proposed a new message authentication scheme with the Advanced Encryption Standard as the encryption function and the new quantum Hash function as the authentication function.Firstly,the Advanced Encryption Standard algorithm is used to encrypt the result of the initial message cascading the corresponding Hash values,which ensures that the initial message can resist eavesdropping attack.Secondly,utilizing the new quantum Hash function with quantum walks can be much more secure than traditional classical Hash functions with keeping the common properties,such as one-wayness,resisting different collisions and easy implementation.Based on these two points,the message authentication scheme can be much more secure than previous ones.Finally,it is a new way to design the message authentication scheme,which provides a new thought for other researchers in the future.Our works will contribute to the study on the new encryption and authentication functions and the combination of quantum computing with traditional cryptology in the future.展开更多
As an innovative theory and technology,quantum network coding has become the research hotspot in quantum network communications.In this paper,a quantum remote state preparation scheme based on quantum network coding i...As an innovative theory and technology,quantum network coding has become the research hotspot in quantum network communications.In this paper,a quantum remote state preparation scheme based on quantum network coding is proposed.Comparing with the general quantum remote state preparation schemes,our proposed scheme brings an arbitrary unknown quantum state finally prepared remotely through the quantum network,by designing the appropriate encoding and decoding steps for quantum network coding.What is worth mentioning,from the network model,this scheme is built on the quantum k-pair network which is the expansion of the typical bottleneck network—butterfly network.Accordingly,it can be treated as an efficient quantum network preparation scheme due to the characteristics of network coding,and it also makes the proposed scheme more applicable to the large-scale quantum networks.In addition,the fact of an arbitrary unknown quantum state remotely prepared means that the senders do not need to know the desired quantum state.Thus,the security of the proposed scheme is higher.Moreover,this scheme can always achieve the success probability of 1 and 1-max flow of value k.Thus,the communication efficiency of the proposed scheme is higher.Therefore,the proposed scheme turns out to be practicable,secure and efficient,which helps to effectively enrich the theory of quantum remote state preparation.展开更多
A big step forward to improve power system monitoring and performance, continued load growth without a corresponding increase in transmission resources has resulted in reduced operational margins for many power system...A big step forward to improve power system monitoring and performance, continued load growth without a corresponding increase in transmission resources has resulted in reduced operational margins for many power systems worldwide and has led to operation of power systems closer to their stability limits and to power exchange in new patterns. These issues, as well as the on-going worldwide trend towards deregulation of the entire industry on the one hand and the increased need for accurate and better network monitoring on the other hand, force power utilities exposed to this pressure to demand new solutions for wide area monitoring, protection and control. Wide-area monitoring, protection, and control require communicating the specific-node information to a remote station but all information should be time synchronized so that to neutralize the time difference between information. It gives a complete simultaneous snap shot of the power system. The conventional system is not able to satisfy the time-synchronized requirement of power system. Phasor Measurement Unit (PMU) is enabler of time-synchronized measurement, it communicate the synchronized local information to remote station.展开更多
Blockchain has a profound impact on all areas of society by virtue of its immutability,decentralization and other characteristics.However,blockchain faces the problem of data privacy leakage during the application pro...Blockchain has a profound impact on all areas of society by virtue of its immutability,decentralization and other characteristics.However,blockchain faces the problem of data privacy leakage during the application process,and the rapid development of quantum computing also brings the threat of quantum attack to blockchain.In this paper,we propose a lattice-based certificateless fully homomorphic encryption(LCFHE)algorithm based on approximate eigenvector firstly.And we use the lattice-based delegate algorithm and preimage sampling algorithm to extract part of the private key based on certificateless scheme,which is composed of the private key together with the secret value selected by the user,thus effectively avoiding the problems of certificate management and key escrow.Secondly,we propose a post-quantum blockchain transaction privacy protection scheme based on LCFHE algorithm,which uses the ciphertext calculation characteristic of homomorphic encryption to encrypt the account balance and transaction amount,effectively protecting the transaction privacy of users and having the ability to resist quantum attacks.Finally,we analyze the correctness and security of LCFHE algorithm,and the security of the algorithm reduces to the hardness of learning with errors(LWE)hypothesis.展开更多
Verifiable computation (VC) paradigm has got the captivation that in real term is highlighted by the concept of third party computation. In more explicate terms, VC allows resource constrained clients/organizations ...Verifiable computation (VC) paradigm has got the captivation that in real term is highlighted by the concept of third party computation. In more explicate terms, VC allows resource constrained clients/organizations to securely outsource expensive computations to untrusted service providers, while acquiring the publicly or privately verifiable results. Many mainstream solutions have been proposed to address the diverse problems within the VC domain. Some of them imposed assumptions over performed computations, while the others took advantage of interactivity /non-interactivity, zero knowledge proofs, and arguments. Further proposals utilized the powers of probabilistic checkable or computationally sound proofs. In this survey, we present a chronological study and classify the VC proposals based on their adopted domains. First, we provide a broader overview of the theoretical advancements while critically analyzing them. Subsequently, we present a comprehensive view of their utilization in the state of the art VC approaches. Moreover, a brief overview of recent proof based VC systems is also presented that lifted up the VC domain to the verge of practicality. We use the presented study and reviewed resuits to identify the similarities and alterations, modifications, and hybridization of different approaches, while comparing their advantages and reporting their overheads. Finally, we discuss implementation of such VC based systems, their applications, and the likely future directions.展开更多
文摘Blockchain technology has become a research hotspot in recent years with the prominent characteristics as public,distributed and decentration.And blockchain-enabled internet of things(BIoT)has a tendency to make a revolutionary change for the internet of things(IoT)which requires distributed trustless consensus.However,the scalability and security issues become particularly important with the dramatically increasing number of IoT devices.Especially,with the development of quantum computing,many extant cryptographic algorithms applied in blockchain or BIoT systems are vulnerable to the quantum attacks.In this paper,an anti-quantum proxy blind signature scheme based on the lattice cryptography has been proposed,which can provide user anonymity and untraceability in the distributed applications of BIoT.Then,the security proof of the proposed scheme can derive that it is secure in random oracle model,and the efficiency analysis can indicate it is efficient than other similar literatures.
基金This work is supported by the NSFC(Grant Nos.92046001,61671087,61962009)the Fundamental Research Funds for the Central Universities(Grant No.2019XDA02)+7 种基金the Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant Nos.2018BDKFJJ018,2019BDKFJJ010,2019BDKFJJ014)the High-quality and Cutting-edge Disciplines Construction Project for Universities in Beijing(Internet Information,Communication University of China),the Open Research Project of the State Key Laboratory of Media Convergence and Communication,Communication University of China,China(Grant No.SKLMCC2020KF006)Inner Mongolia Major science and technology projects(2019ZD025)Baotou Kundulun District Science and technology plan project(YF2020013)Inner Mongolia discipline inspection and supervision big data laboratory open project fund(IMDBD2020020)the Natural Science Foundation of Inner Mongolia(2021MS0602)Huawei Technologies Co.Ltd(No.YBN2020085019)the Scientific Research Foundation of North China University of Technology。
文摘With the rapid development of cloud computing technology,cloud services have now become a new business model for information services.The cloud server provides the IT resources required by customers in a selfservice manner through the network,realizing business expansion and rapid innovation.However,due to the insufficient protection of data privacy,the problem of data privacy leakage in cloud storage is threatening cloud computing.To address the problem,we propose BC-PECK,a data protection scheme based on blockchain and public key searchable encryption.Firstly,all the data is protected by the encryption algorithm.The privacy data is encrypted and stored in a cloud server,while the ciphertext index is established by a public key searchable encryption scheme and stored on the blockchain.Secondly,based on the characteristics of trusted execution of smart contract technology,a control mechanism for data accessing and sharing is given.Data transaction is automatically recorded on the blockchain,which is fairer under the premise of ensuring the privacy and security of the data sharing process.Finally,we analyzed the security and fairness of the current scheme.Through the comparison with similar schemes,we have shown the advantages of the proposed scheme.
基金Project supported by NSFC(Grant Nos.U1836205,61702040)the Major Scientific and Technological Special Project of Guizhou Province(Grant No.20183001)+2 种基金the Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant No.2018BDKFJJ016)the Foundation of State Key Laboratory of Public Big Data(Grant No.2018BDKFJJ018)Beijing Natural Science Foundation(Grant No.4174089).
文摘In this paper,we propose an asymmetric controlled bidirectional transmission protocol.In the protocol,by using the thirteen-qubit entangled state as the quantum channel,Alice can realize the transmission of a two-qubit equatorial state for Bob and Bob can transmit a four-qubit equatorial state for Alice under the control of Charlie.Firstly,we give the construction of the quantum channel,which can be done by performing several H and CNOT operations.Secondly,through implementing the appropriate measurements and the corresponding recovery operations,the desired states can be transmitted simultaneously,securely and deterministically.Finally,we analyze the performance of the protocol,including the efficiency,the necessary operations and the classical communication costs.And then,we describe some comparisons with other protocols.Since our protocol does not require auxiliary particles and additional operations,the classic communication costs less while achieving the multi-particle bidirectional transmission,so the overall performance of the protocol is better.
基金This work is supported by NSFC(Grant Nos.92046001,61571024,61671087,61962009,61971021)the Aeronautical Science Foundation of China(2018ZC51016)+4 种基金the Fundamental Research Funds for the Central Universities(Grant No.2019XD-A02)the Open Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant Nos.2018BDKFJJ018,2019BDKFJJ010,2019BDKFJJ014)the Open Research Project of the State Key Laboratory of Media Convergence and Communication,Communication University of China,China(Grant No.SKLMCC2020KF006)Huawei Technologies Co.Ltd(Grant No.YBN2020085019)the Scientific Research Foundation of North China University of Technology.
文摘Quantum network coding is used to solve the congestion problem in quantum communication,which will promote the transmission efficiency of quantum information and the total throughput of quantum network.We propose a novel controlled quantum network coding without information loss.The effective transmission of quantum states on the butterfly network requires the consent form a third-party controller Charlie.Firstly,two pairs of threeparticle non-maximum entangled states are pre-shared between senders and controller.By adding auxiliary particles and local operations,the senders can predict whether a certain quantum state can be successfully transmitted within the butterfly network based on the Z-{10>,|1>}basis.Secondly,when trans-mission fails upon prediction,the quantum state will not be lost,and it will sill be held by the sender.Subsequently,the controller Charlie re-prepares another three-particle non-maximum entangled state to start a new round.When the predicted transmission is successful,the quantum state can be transmitted successfully within the butterfly network.If the receiver wants to receive the effective quantum state,the quantum measurements from Charlie are needed.Thirdly,when the transmission fails,Charlie does not need to integrate the X-{1+>,1->}basis to measure its own particles,by which quantum resources are saved.Charlie not only controls the effective transmission of quantum states,but also the usage of classical and quantum channels.Finally,the implementation of the quantum circuits,as well as a flow chart and safety analysis of our scheme,is proposed.
基金supported in part by the following funding agencies of China:National Natural Science Foundation under Grant 61170274, 61602050 and U1534201
文摘Recently, the community analysis has seen enormous research advancements in the field of social networks. A large amount of the current studies put forward different models and algorithms about most influential people. However, there is little work to shed light on how to rank communities while considering their levels that are determined by the quality of their published contents. In this paper, we propose solution for measuring the influence of communities and ranking them by considering joint weight composed of internal and external influence of communities. To address this issue, we design a novel algorithm called Com Rank: a modification of Page Rank, which considers the joint weight in order to identify impact of each community and ranking them. We use real-world data trace in citation network and perform extensive experiments to evaluate our proposed algorithm. The comparative results depict significant improvements by our algorithm in community ranking due to the inclusion of proposed weighting feature.
基金National High Technology 863 Program of China(No.2013AA013403,2013AA013301/02,2015AA015501/02)National NSFC(No.61425022/61307086/61475024/61275158/61201151/61275074/61205066)+4 种基金NITC(No.2012DFG12110)Beijing Nova Program(No.Z141101001814048)Beijing Excellent Ph.D.Thesis Guidance Foundation(No.20121001302)are gratefully acknowledgedsupported by the Universities Ph.D.Special Research Funds(No.20120005110003/20120005120007)fund of State Key Laboratory of IPOC(BUPT)
文摘We propos e a cos t-effective multi-carrier generation technique which minimizes the passive optical access network(PON) costs. In this study replacement of laser array with multi-carrier source at optical line terminal(OLT) side in PON is addressed. With 25-GHz frequency spacing, the generated optical multi-carriers exhibit good tone to noise ratio(TNR) i. e. above 20 d B, and least amplitude difference i. e. 1.5d B. At the OLT, multi-carriers signal based multiplexed differential phase shift keying(DPSK) data from all the channels each having 10 Gbps for downlink is transmitted through 25 km single mode fiber. While the transmitted information is retrieved at optical network unit(ONU), part of the downlink signal is re-modulated using intensity modulated(IM) on-off keying(OOK) for upstream transmission at 10-Gbps. Simulation results are in good agreement with the theoretical analysis, showing error free transmission in downlink and uplink with 10 Gbps symmetric data rate at each channel. The receivedpower, both for uplink and downlink transmission, is adequate for all channels at BER of 10-9 with minimum power penalties. Power budget is calculated for different splitting ratios showing excellent system margins for any unseen losses. The proposed setup provides a cost-effective way minimizing transmission losses, and providing greater system's margin in PON architecture.
基金This work is financially supported by Universiti Tunku Abdul Rahman,Kampar,Perak,MalaysiaThe authors also acknowledge Taif university for financial support for this research through the Taif University researchers supporting project(TURSP-2020/231),Taif University,Saudi Arabia.
文摘Cricket databases contain rich and useful information to examine and forecasting patterns and trends.This paper predicts Star Cricketers(SCs)from batting and bowling domains by employing supervised machine learning models.With this aim,each player’s performance evolution is retrieved by using effective features that incorporate the standard performance measures of each player and their peers.Prediction is performed by applying Bayesianrule,function and decision-tree-based models.Experimental evaluations are performed to validate the applicability of the proposed approach.In particular,the impact of the individual features on the prediction of SCs are analyzed.Moreover,the category and model-wise feature evaluations are also conducted.A cross-validation mechanism is applied to validate the performance of our proposed approach which further confirms that the incorporated features are statistically significant.Finally,leading SCs are extracted based on their performance evolution scores and their standings are cross-checked with those provided by the International Cricket Council.
基金Project supported by NSFC(Grant Nos.U1836205,61702040)the Major Scientific and Technological Special Project of Guizhou Province(Grant No.20183001)+2 种基金the Foundation of Guizhou Provincial Key Laboratory of Public Big Data(Grant No.2018BDKFJJ016)the Foundation of State Key Laboratory of Public Big Data(Grant No.2018BDKFJJ018)Beijing Natural Science Foundation(Grant No.4174089).
文摘To ensure the security during the communication,we often adopt different ways to encrypt the messages to resist various attacks.However,with the computing power improving,the existing encryption and authentication schemes are being faced with big challenges.We take the message authentication as an example into a careful consideration.Then,we proposed a new message authentication scheme with the Advanced Encryption Standard as the encryption function and the new quantum Hash function as the authentication function.Firstly,the Advanced Encryption Standard algorithm is used to encrypt the result of the initial message cascading the corresponding Hash values,which ensures that the initial message can resist eavesdropping attack.Secondly,utilizing the new quantum Hash function with quantum walks can be much more secure than traditional classical Hash functions with keeping the common properties,such as one-wayness,resisting different collisions and easy implementation.Based on these two points,the message authentication scheme can be much more secure than previous ones.Finally,it is a new way to design the message authentication scheme,which provides a new thought for other researchers in the future.Our works will contribute to the study on the new encryption and authentication functions and the combination of quantum computing with traditional cryptology in the future.
基金This work is supported by the National Natural Science Foundation of China(Grant Nos.61370188,62176273,61962009)the Scientific Research Common Program of Beijing Municipal Commission of Education(KM202010015009,KM202110015004)+4 种基金Initial Funding for the Doctoral Program of BIGC(27170121001/009)the Open Foundation of State key Laboratory of Networking and Switching Technology(Beijing University of Posts and Telecommunications)(SKLNST-2021-1-16)the Open Fund of Advanced Cryptography and System Security Key Laboratory of Sichuan Province(Grant No.SKLACSS-202101)the Fundamental Research Funds for Beijing Municipal Commission of Education,Beijing Urban Governance Research Base of North China University of Technologythe Natural Science Foundation of Inner Mongolia(2021MS06006).
文摘As an innovative theory and technology,quantum network coding has become the research hotspot in quantum network communications.In this paper,a quantum remote state preparation scheme based on quantum network coding is proposed.Comparing with the general quantum remote state preparation schemes,our proposed scheme brings an arbitrary unknown quantum state finally prepared remotely through the quantum network,by designing the appropriate encoding and decoding steps for quantum network coding.What is worth mentioning,from the network model,this scheme is built on the quantum k-pair network which is the expansion of the typical bottleneck network—butterfly network.Accordingly,it can be treated as an efficient quantum network preparation scheme due to the characteristics of network coding,and it also makes the proposed scheme more applicable to the large-scale quantum networks.In addition,the fact of an arbitrary unknown quantum state remotely prepared means that the senders do not need to know the desired quantum state.Thus,the security of the proposed scheme is higher.Moreover,this scheme can always achieve the success probability of 1 and 1-max flow of value k.Thus,the communication efficiency of the proposed scheme is higher.Therefore,the proposed scheme turns out to be practicable,secure and efficient,which helps to effectively enrich the theory of quantum remote state preparation.
文摘A big step forward to improve power system monitoring and performance, continued load growth without a corresponding increase in transmission resources has resulted in reduced operational margins for many power systems worldwide and has led to operation of power systems closer to their stability limits and to power exchange in new patterns. These issues, as well as the on-going worldwide trend towards deregulation of the entire industry on the one hand and the increased need for accurate and better network monitoring on the other hand, force power utilities exposed to this pressure to demand new solutions for wide area monitoring, protection and control. Wide-area monitoring, protection, and control require communicating the specific-node information to a remote station but all information should be time synchronized so that to neutralize the time difference between information. It gives a complete simultaneous snap shot of the power system. The conventional system is not able to satisfy the time-synchronized requirement of power system. Phasor Measurement Unit (PMU) is enabler of time-synchronized measurement, it communicate the synchronized local information to remote station.
基金supported by NSFC(Grant Nos.92046001,61671087,61962009,61971021)the Fundamental Research Funds for Beijing Municipal Commission of Education,the Scientific Research Launch Funds of North China University of Technology,and Beijing Urban Governance Research Base of North China University of Technology.
文摘Blockchain has a profound impact on all areas of society by virtue of its immutability,decentralization and other characteristics.However,blockchain faces the problem of data privacy leakage during the application process,and the rapid development of quantum computing also brings the threat of quantum attack to blockchain.In this paper,we propose a lattice-based certificateless fully homomorphic encryption(LCFHE)algorithm based on approximate eigenvector firstly.And we use the lattice-based delegate algorithm and preimage sampling algorithm to extract part of the private key based on certificateless scheme,which is composed of the private key together with the secret value selected by the user,thus effectively avoiding the problems of certificate management and key escrow.Secondly,we propose a post-quantum blockchain transaction privacy protection scheme based on LCFHE algorithm,which uses the ciphertext calculation characteristic of homomorphic encryption to encrypt the account balance and transaction amount,effectively protecting the transaction privacy of users and having the ability to resist quantum attacks.Finally,we analyze the correctness and security of LCFHE algorithm,and the security of the algorithm reduces to the hardness of learning with errors(LWE)hypothesis.
文摘Verifiable computation (VC) paradigm has got the captivation that in real term is highlighted by the concept of third party computation. In more explicate terms, VC allows resource constrained clients/organizations to securely outsource expensive computations to untrusted service providers, while acquiring the publicly or privately verifiable results. Many mainstream solutions have been proposed to address the diverse problems within the VC domain. Some of them imposed assumptions over performed computations, while the others took advantage of interactivity /non-interactivity, zero knowledge proofs, and arguments. Further proposals utilized the powers of probabilistic checkable or computationally sound proofs. In this survey, we present a chronological study and classify the VC proposals based on their adopted domains. First, we provide a broader overview of the theoretical advancements while critically analyzing them. Subsequently, we present a comprehensive view of their utilization in the state of the art VC approaches. Moreover, a brief overview of recent proof based VC systems is also presented that lifted up the VC domain to the verge of practicality. We use the presented study and reviewed resuits to identify the similarities and alterations, modifications, and hybridization of different approaches, while comparing their advantages and reporting their overheads. Finally, we discuss implementation of such VC based systems, their applications, and the likely future directions.