A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present....
详细信息
A threshold quantum secret sharing (TQSS) scheme between multi-party and multi-party was proposed using a sequence of single photons,which is useful and efficient when the parties of communication are not all present. We described the process of this TQSS scheme and discussed its security. It was shown that entan-glement is not necessary for quantum secret sharing. Moreover,the theoretic effi-ciency was improved to approach 100% as almost all the instances can be used for generating the private key,and each photon can carry one bit of information. This protocol is feasible with the present-day technique.
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signatu...
详细信息
In most situations, the signer is generally a single person. However, when the message is written on behalf of an organization, a valid message may require the approval or consent of several persons. Threshold signature is a solution to this problem. Generally speaking, as an authority which can be trusted by all members does not exist, a threshold signature scheme without a trusted party appears more attractive. Following some ideas of the classical Shamir’s threshold signature scheme, a quantum threshold group signature one is proposed. In the proposed scheme, only t or more of n persons in the group can generate the group signature and any t-1 or fewer ones cannot do that. In the verification phase, any t or more of n signature receivers can verify the message and any t-1 or fewer receivers cannot verify the validity of the signature.
The electronic states of manganese and lanthanide elements in SrGa 2 S 4 are calculated by the relativistic discrete variational Xα method using a FORTRAN program of DVSCATR in order to investigate the mechanism allo...
详细信息
We consider a data set in which each example is an n-dimensional Boolean vector labeled as true or false. A pattern is a co-occurrence of a particular value combination of a given subset of the variables. If a pattern...
详细信息
Distance learning is a learning style that can overcome the limitation of time and space. Because of the distance, teachers can not handle the student's learning situation, and they do not know whether the student...
详细信息
Distance learning is a learning style that can overcome the limitation of time and space. Because of the distance, teachers can not handle the student's learning situation, and they do not know whether the student is attentive, drowsy or absent. If teachers can know the student's affective state, they can overcome the difficult. The research applies the image recognition technologies to capture the face images of students when they are learning and analyzes their face features to evaluate the student's affective state by Fuzzy Integral. Finally, teachers can monitor the student's behavior by the detection results on the system interface.
In the field of image restoration of unnecessary regions, a method based on optical flow has been proposed. This method can accurately restore unnecessary regions in case of changing of edge direction or of plural edg...
详细信息
In the field of image restoration of unnecessary regions, a method based on optical flow has been proposed. This method can accurately restore unnecessary regions in case of changing of edge direction or of plural edges in unnecessary regions. However, when continuity of intensity between a pixel in unnecessary regions and its neighboring pixels is not satisfied, the method can not accurately restore unnecessary regions. In this paper, to solve the problem, we propose a method based on similarity between a local region and a neighboring region of a lost in unnecessary regions.
This paper presents an approach to synthesis of stylistically and syntactically controlled generator of the microprocessor test programs. The dependence of test length of the confidence level and the probabilities rep...
详细信息
This paper presents an approach to synthesis of stylistically and syntactically controlled generator of the microprocessor test programs. The dependence of test length of the confidence level and the probabilities repartition of coverage metric is stated. The procedure of synthesis of a test program generator is developed, represented by a stochastic grammar for a known microprocessor. The performed test experiments clearly demonstrate the advantages of the proposed syntactic approach in comparison with other competitive methods of generation stimuli for verification of microprocessors.
Teaching engineering and technology subjects involves conveying understanding of abstract information structures and processes such as complex telecommunications protocols, complex mathematical concepts, and data stru...
详细信息
Teaching engineering and technology subjects involves conveying understanding of abstract information structures and processes such as complex telecommunications protocols, complex mathematical concepts, and data structures. These are multidimensional and can be difficult to grasp quickly. Supported by a Hewlett-Packard (HP) technology for Teaching grant, the School of Engineering and technology at National University has embarked on a project to enable students to grasp these complex concepts more quickly and easily, using continuous dialog among students and instructors as the structures are first introduced and then examined from multiple perspectives through real-time interaction among students, small groups, and instructors. HP Wireless Tablet PCs are used to discuss and experiment with diagrams and processes in realtime. This allows combining lectures and problem-solving sessions into a single class session. Our hypothesis is that: 1) an in-depth learning of theory is accomplished, and 2) student engagement is enhanced. Presentation of theory by the instructor is integrated with application while the theory is still in the student's short-term memory. Students no longer have to wait for a separate session such as a recitation session to apply the concepts. This approach often takes less time. In addition to accelerating the learning process, expert instructors find this approach more rewarding as students grasp new concepts more quickly. Analysis of data captured from both students and instructors are presented to support our hypotheses, and our results are compared with similar research carried out by other universities. In addition, the level of interaction enabled by the use of HP Tablets in on-line classes is discussed. The best teaching tools available in existing on-line teaching platforms are compared with the additional tools available in on-site courses when every student has a wireless Tablet PC and specific recommendations are made to on-line teachi
Home appliance networks now have the capability of integrating different features of independent appliances to provide value-added services. Concurrent execution of these services, however, can cause unexpected proble...
详细信息
ISBN:
(纸本)9780769532636
Home appliance networks now have the capability of integrating different features of independent appliances to provide value-added services. Concurrent execution of these services, however, can cause unexpected problems, even when each service is independently correct. This paper addresses the issue of detecting such interactions between services. We propose an approach that consists of two steps. In the first step, a model is developed to capture the behavior of the services and the interactions between them and users. In the second step, the model is automatically analyzed to see if possible interactions exist. This automatic analysis can be effectively performed with model checking techniques. The usefulness of the proposed approach is demonstrated through a case study, where several interactions were successfully detected.
Todaypsilas informationtechnology supports varieties of e-commerce, in particular on-demand services such as news, message, seminar and presentation speech to message, and 3D Video GIS. Each service can have value-ad...
详细信息
Todaypsilas informationtechnology supports varieties of e-commerce, in particular on-demand services such as news, message, seminar and presentation speech to message, and 3D Video GIS. Each service can have value-added by embedding other hidden-service within the main service, hence promoting value-added to the service. The value-added services are accomplished by using the technique of Multiple Keys and Messages Embedding (MKME), which hidden-contents can be retrieved only by applying the correct corresponding decryption keys This paper presents the design and algorithm for multiple keys and messages embedding on 3D Video GIS, based on Steganography concept. The quality of the resulting product was also investigated. The main data used is geospatial video, which is primarily used by the elderly and disables people so that they can feel the surroundings on their desktop while sitting at home.
暂无评论