期刊文献+
共找到4篇文章
< 1 >
每页显示 20 50 100
Optimal Asymmetric Quantum Codes from the Euclidean Sums of Linear Codes
1
作者 XU Peng LIU Xiusheng 《Wuhan University Journal of Natural Sciences》 CAS CSCD 2024年第1期45-50,共6页
In this paper,we first give the definition of the Euclidean sums of linear codes,and prove that the Euclidean sums of linear codes are Euclidean dual-containing.Then we construct two new classes of optimal asymmetric ... In this paper,we first give the definition of the Euclidean sums of linear codes,and prove that the Euclidean sums of linear codes are Euclidean dual-containing.Then we construct two new classes of optimal asymmetric quantum error-correcting codes based on Euclidean sums of the Reed-Solomon codes,and two new classes of optimal asymmetric quantum error-correcting codes based on Euclidean sums of linear codes generated by Vandermonde matrices over finite fields.Moreover,these optimal asymmetric quantum errorcorrecting codes constructed in this paper are different from the ones in the literature. 展开更多
关键词 Euclidean sums of linear codes optimal asymmetric quantum errorcorrecting codes vandermonde matrices Reed-Solomon codes
原文传递
Scheme to Implement Optimal Asymmetric Economical Phase-Covariant Quantum Cloning in Cavity QED
2
作者 ZHANG Wen-Hai DAI Jie-Lin YE Liu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2008年第6期1473-1476,共4页
We propose an experimentally feasible scheme to implement the optimal asymmetric economical 1→2 phase-covariant quantum cloning in two dimensions based on the cavity QED technique. The protocol is very simple and onl... We propose an experimentally feasible scheme to implement the optimal asymmetric economical 1→2 phase-covariant quantum cloning in two dimensions based on the cavity QED technique. The protocol is very simple and only two atoms are required. Our scheme is insensitive to the cavity field states and cavity decay. During the processes, the cavity is only virtually excited and it thus greatly prolongs the efficient decoherent time. Therefore, it may be realized in experiment. 展开更多
关键词 optimal asymmetric economical phase-covariant cloning cavity QED
在线阅读 下载PDF
A new topology optimization method of an asymmetric phononic crystal for enhancing bandgap distributions
3
作者 Liming GUO Chiye YANG +3 位作者 Jing LIU Hengtai NI Guang PAN Baowei SONG 《Science China(Technological Sciences)》 2025年第10期493-494,共2页
To address the challenges for vibration suppression in the precision sensors of underwater vehicles,phononic crystals have attracted significant attention due to the superior capabilities in elastic wave manipulation ... To address the challenges for vibration suppression in the precision sensors of underwater vehicles,phononic crystals have attracted significant attention due to the superior capabilities in elastic wave manipulation and vibration suppression.Unlike conventional damping materials,the phononic crystals can effectively suppress the wave propagation in the specific frequency ranges due to the unique periodic microstructures. 展开更多
关键词 A new topology optimization method of an asymmetric phononic crystal for enhancing bandgap distributions
原文传递
Instantiate Random Oracles in OAEP with Pseudorandom Functions
4
作者 JIA Xiaoying LI Hongda LI Bao 《Wuhan University Journal of Natural Sciences》 CAS 2008年第6期651-656,共6页
This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substituti... This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substitution of random oracles is also proposed. The partial and full instantiations of random oracles in optimal asymmetric encryption padding (OAEP) implemented by pseudorandom functions are described and the resulted schemes are proven to be indistinguishable secure against adaptive chosen ciphertext attack (IND-CCA2) secure. Using this method, one can transform a practical public key encryption scheme secure in the random oracle model into a standard-model secure scheme. The security of the scheme is based on computational assumptions, which is weaker than decisional assumptions used in Cramer- Shoup like schemes. 展开更多
关键词 random oracle(RO) model INSTANTIATION optimal asymmetric encryption padding(OAEP) indistinguishable securitity against adaptive chosen ciphertext attack (IND-CCA2)
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部