In this paper,we first give the definition of the Euclidean sums of linear codes,and prove that the Euclidean sums of linear codes are Euclidean dual-containing.Then we construct two new classes of optimal asymmetric ...In this paper,we first give the definition of the Euclidean sums of linear codes,and prove that the Euclidean sums of linear codes are Euclidean dual-containing.Then we construct two new classes of optimal asymmetric quantum error-correcting codes based on Euclidean sums of the Reed-Solomon codes,and two new classes of optimal asymmetric quantum error-correcting codes based on Euclidean sums of linear codes generated by Vandermonde matrices over finite fields.Moreover,these optimal asymmetric quantum errorcorrecting codes constructed in this paper are different from the ones in the literature.展开更多
We propose an experimentally feasible scheme to implement the optimal asymmetric economical 1→2 phase-covariant quantum cloning in two dimensions based on the cavity QED technique. The protocol is very simple and onl...We propose an experimentally feasible scheme to implement the optimal asymmetric economical 1→2 phase-covariant quantum cloning in two dimensions based on the cavity QED technique. The protocol is very simple and only two atoms are required. Our scheme is insensitive to the cavity field states and cavity decay. During the processes, the cavity is only virtually excited and it thus greatly prolongs the efficient decoherent time. Therefore, it may be realized in experiment.展开更多
To address the challenges for vibration suppression in the precision sensors of underwater vehicles,phononic crystals have attracted significant attention due to the superior capabilities in elastic wave manipulation ...To address the challenges for vibration suppression in the precision sensors of underwater vehicles,phononic crystals have attracted significant attention due to the superior capabilities in elastic wave manipulation and vibration suppression.Unlike conventional damping materials,the phononic crystals can effectively suppress the wave propagation in the specific frequency ranges due to the unique periodic microstructures.展开更多
This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substituti...This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substitution of random oracles is also proposed. The partial and full instantiations of random oracles in optimal asymmetric encryption padding (OAEP) implemented by pseudorandom functions are described and the resulted schemes are proven to be indistinguishable secure against adaptive chosen ciphertext attack (IND-CCA2) secure. Using this method, one can transform a practical public key encryption scheme secure in the random oracle model into a standard-model secure scheme. The security of the scheme is based on computational assumptions, which is weaker than decisional assumptions used in Cramer- Shoup like schemes.展开更多
基金Supported by the Scientific Research Foundation of Hubei Provincial Education Department of China(Q20174503)the National Science Foundation of Hubei Polytechnic University of China(12xjz14A and 17xjz03A)。
文摘In this paper,we first give the definition of the Euclidean sums of linear codes,and prove that the Euclidean sums of linear codes are Euclidean dual-containing.Then we construct two new classes of optimal asymmetric quantum error-correcting codes based on Euclidean sums of the Reed-Solomon codes,and two new classes of optimal asymmetric quantum error-correcting codes based on Euclidean sums of linear codes generated by Vandermonde matrices over finite fields.Moreover,these optimal asymmetric quantum errorcorrecting codes constructed in this paper are different from the ones in the literature.
基金National Natural Science Foundation of China under Grant No.10674001the Program of the Education Department of Anhui Province under Grant No.KJ2007A002
文摘We propose an experimentally feasible scheme to implement the optimal asymmetric economical 1→2 phase-covariant quantum cloning in two dimensions based on the cavity QED technique. The protocol is very simple and only two atoms are required. Our scheme is insensitive to the cavity field states and cavity decay. During the processes, the cavity is only virtually excited and it thus greatly prolongs the efficient decoherent time. Therefore, it may be realized in experiment.
基金supported by the National Key Research and Development Programme of China(Grant No.2023YFB3406302)the National Natural Science Foundation of China(Grant No.52175120)Key Research,Development Plan of Shaanxi(Grant No.2024GH-ZDXM-29)。
文摘To address the challenges for vibration suppression in the precision sensors of underwater vehicles,phononic crystals have attracted significant attention due to the superior capabilities in elastic wave manipulation and vibration suppression.Unlike conventional damping materials,the phononic crystals can effectively suppress the wave propagation in the specific frequency ranges due to the unique periodic microstructures.
基金Supported by the National Basic Research Program of China (973 Program) (2007CB311201)the National High-Technology Research and Development Program of China (863 Program) (2006AA01Z427)the National Natural Science Foundation of China (60673073)
文摘This paper focuses on the instantiation of random oracles in public key encryption schemes. A misunderstanding in the former instantiations is pointed out and analyzed. A method of using this primitive as a substitution of random oracles is also proposed. The partial and full instantiations of random oracles in optimal asymmetric encryption padding (OAEP) implemented by pseudorandom functions are described and the resulted schemes are proven to be indistinguishable secure against adaptive chosen ciphertext attack (IND-CCA2) secure. Using this method, one can transform a practical public key encryption scheme secure in the random oracle model into a standard-model secure scheme. The security of the scheme is based on computational assumptions, which is weaker than decisional assumptions used in Cramer- Shoup like schemes.