This paper discovers the secret codes of the scale distribution from Planck scale to the Sun-scale by using Planck length derived from three fundamental physics constants, i.e., gravitation constant G, light speed c a...This paper discovers the secret codes of the scale distribution from Planck scale to the Sun-scale by using Planck length derived from three fundamental physics constants, i.e., gravitation constant G, light speed c and Plank constant, and starting from the global consideration of treating the whole universe as a well unified entity in all scales. According to this symmetric scale distribution law of different scale regions: (a) we naturally give a possibility overcoming the difficulty of the desert effect between the grand unification scale and electroweak unification scale relevant to quarks and leptons, and it is really surprising to discover that the scales of quarks & electrons, protons & neutrons and atoms again all sequentially locate at the predicted points of the scale space;(b) we closely uncover the scale of the cells, which is the basic unit constructing the human bodies;(c) even the average height of human being is naturally deduced;(d) further, it is very surprising that the scales of the celestial bodies tightly related to us human beings, including the earth and the sun, also exactly fall at the predicted points in scale space in order. Therefore, all these scales with 105n cm order (n = 0, 1, 2, …, 9) above just give a proof of very key anthropic principle for whole mankind (which just makes the anthropic principle be reduced as anthropic theorem), i.e., matter stratums (a) and (b) are inorganic and organic bases of constructing human being respectively;matter stratum (c) is just human being;matter stratums (d) are the living environments of human being. Namely, everything is for or relevant to the existence of human being. Consequently, the experimentally checked scale ladder of well-known matter levels just coincides with the scale ladder predicted by the deduced distribution law. From Planck scale to the Sun scale, people may systematically build up the exact scientific theories corresponding ten matter stratums, may set up the different sciences among the different cross stratums, further, can systematically understand all the different sciences and their relations in the deepest way up to now.展开更多
In this paper, we propose a novel space efficient secret sharing scheme on the basis of minimal linear codes, which satisfies the definition of a computationally efficient secret sharing scheme. In the scheme, we part...In this paper, we propose a novel space efficient secret sharing scheme on the basis of minimal linear codes, which satisfies the definition of a computationally efficient secret sharing scheme. In the scheme, we partition the underlying minimal linear code into disjoint classes, establishing a one-to-one correspondence between the minimal authorized subsets of participants and the representative codewords of all different classes. Each participant, with only one short share transmitted through a public channel, can share a large secret. Therefore, the proposed scheme can distribute a large secret in practical applications such as secure information dispersal in sensor networks and secure multiparty computation.展开更多
Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states. This paper presents how to use a [2k- 1, 1, k] quantum error-correcting code (QECC) to im...Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states. This paper presents how to use a [2k- 1, 1, k] quantum error-correcting code (QECC) to implement a quantum (k, 2k-1) threshold scheme. It also takes advantage of classical enhancement of the [2k-1, 1, k] QECC to establish a QSS scheme which can share classical information and quantum information simultaneously. Because information is encoded into QECC, these schemes can prevent intercept-resend attacks and be implemented on some noisy channels.展开更多
A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify h...A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify his own share from dealer's distribution and ensure each participant to receive valid share.Another does not have a trusted center,here,each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme.展开更多
This paper presents a scheme for high-capacity three-party quantum secret sharing with quantum superdense coding, following some ideas in the work by Liuet al (2002 Phys. Rev. A 65 022304) and the quantum secret sha...This paper presents a scheme for high-capacity three-party quantum secret sharing with quantum superdense coding, following some ideas in the work by Liuet al (2002 Phys. Rev. A 65 022304) and the quantum secret sharing scheme by Deng et al (2008 Phys. Lett. A 372 1957). Instead of using two sets of nonorthogonal states, the boss Alice needs only to prepare a sequence of Einstei^Podolsky-l^osen pairs in d-dimension. The two agents Bob and Charlie encode their information with dense coding unitary operations, and security is checked by inserting decoy photons. The scheme has a high capacity and intrinsic efficiency as each pair can carry 21bd bits of information, and almost all the pairs can be used for carrying useful information.展开更多
文摘This paper discovers the secret codes of the scale distribution from Planck scale to the Sun-scale by using Planck length derived from three fundamental physics constants, i.e., gravitation constant G, light speed c and Plank constant, and starting from the global consideration of treating the whole universe as a well unified entity in all scales. According to this symmetric scale distribution law of different scale regions: (a) we naturally give a possibility overcoming the difficulty of the desert effect between the grand unification scale and electroweak unification scale relevant to quarks and leptons, and it is really surprising to discover that the scales of quarks & electrons, protons & neutrons and atoms again all sequentially locate at the predicted points of the scale space;(b) we closely uncover the scale of the cells, which is the basic unit constructing the human bodies;(c) even the average height of human being is naturally deduced;(d) further, it is very surprising that the scales of the celestial bodies tightly related to us human beings, including the earth and the sun, also exactly fall at the predicted points in scale space in order. Therefore, all these scales with 105n cm order (n = 0, 1, 2, …, 9) above just give a proof of very key anthropic principle for whole mankind (which just makes the anthropic principle be reduced as anthropic theorem), i.e., matter stratums (a) and (b) are inorganic and organic bases of constructing human being respectively;matter stratum (c) is just human being;matter stratums (d) are the living environments of human being. Namely, everything is for or relevant to the existence of human being. Consequently, the experimentally checked scale ladder of well-known matter levels just coincides with the scale ladder predicted by the deduced distribution law. From Planck scale to the Sun scale, people may systematically build up the exact scientific theories corresponding ten matter stratums, may set up the different sciences among the different cross stratums, further, can systematically understand all the different sciences and their relations in the deepest way up to now.
基金Supported by the National Natural Science Foundation of China (11271237)
文摘In this paper, we propose a novel space efficient secret sharing scheme on the basis of minimal linear codes, which satisfies the definition of a computationally efficient secret sharing scheme. In the scheme, we partition the underlying minimal linear code into disjoint classes, establishing a one-to-one correspondence between the minimal authorized subsets of participants and the representative codewords of all different classes. Each participant, with only one short share transmitted through a public channel, can share a large secret. Therefore, the proposed scheme can distribute a large secret in practical applications such as secure information dispersal in sensor networks and secure multiparty computation.
基金Project supported by the National Natural Science Foundation of China (Grant No. 61072071)
文摘Quantum secret sharing(QSS) is a procedure of sharing classical information or quantum information by using quantum states. This paper presents how to use a [2k- 1, 1, k] quantum error-correcting code (QECC) to implement a quantum (k, 2k-1) threshold scheme. It also takes advantage of classical enhancement of the [2k-1, 1, k] QECC to establish a QSS scheme which can share classical information and quantum information simultaneously. Because information is encoded into QECC, these schemes can prevent intercept-resend attacks and be implemented on some noisy channels.
文摘A secret sharing system can be damaged when the dealer cheating occurs.In this paper,two kinds of secret sharing schemes based on linear code are proposed.One is a verifiable scheme which each participant can verify his own share from dealer's distribution and ensure each participant to receive valid share.Another does not have a trusted center,here,each participant plays a dual-role as the dealer and shadow(or share) provider in the whole scheme.
基金Project supported by the National Natural Science Foundation (NSF) of China (Grant No 10847147)the NSF of Jiangsu Province, China (Grant No BK2008437)+1 种基金Jiangsu Provincial Universities (Grant No 07KJB510066)the Science Foundation of NUIST, China
文摘This paper presents a scheme for high-capacity three-party quantum secret sharing with quantum superdense coding, following some ideas in the work by Liuet al (2002 Phys. Rev. A 65 022304) and the quantum secret sharing scheme by Deng et al (2008 Phys. Lett. A 372 1957). Instead of using two sets of nonorthogonal states, the boss Alice needs only to prepare a sequence of Einstei^Podolsky-l^osen pairs in d-dimension. The two agents Bob and Charlie encode their information with dense coding unitary operations, and security is checked by inserting decoy photons. The scheme has a high capacity and intrinsic efficiency as each pair can carry 21bd bits of information, and almost all the pairs can be used for carrying useful information.