期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Security of a practical semi-device-independent quantum key distribution protocol against collective attacks 被引量:1
1
作者 汪洋 鲍皖苏 +2 位作者 李宏伟 周淳 李源 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第8期256-260,共5页
Similar to device-independent quantum key distribution (DI-QKD), semi-device-independent quantum key distribu- tion (SDI-QKD) provides secure key distribution without any assumptions about the internal workings of... Similar to device-independent quantum key distribution (DI-QKD), semi-device-independent quantum key distribu- tion (SDI-QKD) provides secure key distribution without any assumptions about the internal workings of the QKD devices. The only assumption is that the dimension of the Hilbert space is bounded. But SDI-QKD can be implemented in a one- way prepare-and-measure configuration without entanglement compared with DI-QKD. We propose a practical SDI-QKD protocol with four preparation states and three measurement bases by considering the maximal violation of dimension witnesses and specific processes of a QKD protocol. Moreover, we prove the security of the SDI-QKD protocol against collective attacks based on the min-entropy and dimension witnesses. We also show a comparison of the secret key rate between the SDI-QKD protocol and the standard QKD. 展开更多
关键词 quantum key distribution semi-device-independent collective attacks secret key rate
原文传递
MarkNeRF:Watermarking for Neural Radiance Field
2
作者 Lifeng Chen Jia Liu +2 位作者 Wenquan Sun Weina Dong Xiaozhong Pan 《Computers, Materials & Continua》 SCIE EI 2024年第7期1235-1250,共16页
This paper presents a novel watermarking scheme designed to address the copyright protection challenges encountered with Neural radiation field(NeRF)models.We employ an embedding network to integrate the watermark int... This paper presents a novel watermarking scheme designed to address the copyright protection challenges encountered with Neural radiation field(NeRF)models.We employ an embedding network to integrate the watermark into the images within the training set.Then,theNeRFmodel is utilized for 3Dmodeling.For copyright verification,a secret image is generated by inputting a confidential viewpoint into NeRF.On this basis,design an extraction network to extract embedded watermark images fromconfidential viewpoints.In the event of suspicion regarding the unauthorized usage of NeRF in a black-box scenario,the verifier can extract the watermark from the confidential viewpoint to authenticate the model’s copyright.The experimental results demonstrate not only the production of visually appealing watermarks but also robust resistance against various types of noise attacks,thereby substantiating the effectiveness of our approach in safeguarding NeRF. 展开更多
关键词 Neural radiation field 3D watermark ROBUSTNESS black box
在线阅读 下载PDF
上一页 1 下一页 到第
使用帮助 返回顶部