In this paper, we present schemes on implementing the single-photon-added coherent source in quantum key distributions. We apply this source in either the standard BB84 protocol or the recently proposed measurement-de...
详细信息
In this paper, we present schemes on implementing the single-photon-added coherent source in quantum key distributions. We apply this source in either the standard BB84 protocol or the recently proposed measurement-device-independent quantum key distribution, comparing their performance with the cases of using other existing sources, e.g., the weak coherent source or the heralded single-photon source, and giving out corresponding numerical simulations. Our simulation results show that in both protocols the single-photon-added coherent source can greatly exceed all other existing sources. Moreover, even when taking statistical fluctuation into account, a high key generation rate can still be achieved at long distance by applying this source.
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-...
详细信息
Recently, privacy concerns become an increasingly critical issue. Secure multi-party computation plays an important role in privacy-preserving. Secure multi-party computational geometry is a new field of secure multi-party computation. In this paper, we devote to investigating the solutions to some secure geometric problems in a cooperative environment. The problem is collaboratively computing the Euclid-distance between two private vectors without disclosing the private input to each other. A general privacy-preserving Euclid-distance protocol is firstly presented as a building block and is proved to be secure and efficient in the comparison with the previous methods. And we proposed a new protocol for the application in wirelesssensornetworks (WSNs), based on the novel Euclid-distance protocol and Density-Based Clustering Protocol (DBCP), so that the nodes from two sides can compute cooperatively to divide them into clusters without disclosing their location information to the opposite side.
We present an efficient entanglement concentration protocol (ECP) for mobile electrons with charge detection. This protocol is quite different from other ECPs for one can obtain a maximally entangled pair from a pai...
详细信息
We present an efficient entanglement concentration protocol (ECP) for mobile electrons with charge detection. This protocol is quite different from other ECPs for one can obtain a maximally entangled pair from a pair of less-entangled state and a single mobile electron with a certain probability. With the help of charge detection, it can be repeated to reach a higher success probability. It also does not need to know the coefficient of the original less-entangled states. All these advantages may make this protocol useful in current distributed quantum information processing.
The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual co...
详细信息
The Wyner-Ziv distributed video coding scheme is characterized for its intraframe encoder and interframe decoder which can also approach the efficiency of an interframe encoder-decoder system. In Wyner-Ziv residual coding of video, the residual of a frame with respect to a reference frame is Wyner-Ziv encoded, which can reduces the input entropy and leads to a higher coding efficiency than directly encoding the original frame. In this paper, we propose a new approach of residual coding combined with Region Of Interest (ROI) extraction. Experimental results show that, the proposed scheme achieves better rate-distortion performance compared to conventional Wyner-Ziv coding scheme.
A new object tracking scheme for multi-camera surveillance with non-overlapping views is proposed in this paper. Brightness transfer function (BTF) is used to establish relative appearance correspondence between diffe...
详细信息
In the Long Term Evolution(LTE)downlink multicast scheduling,Base Station(BS)usually allocates transmit power equally among all Resource Blocks(RBs),it may cause the waste of transmit *** avoid it,this paper put forwa...
详细信息
In the Long Term Evolution(LTE)downlink multicast scheduling,Base Station(BS)usually allocates transmit power equally among all Resource Blocks(RBs),it may cause the waste of transmit *** avoid it,this paper put forward a new algorithm for LTE multicast downlink scheduling called the Energy-saving based Inter-group Proportional Fair(EIPF).The basic idea of EIPF is to calculate an appropriate transmitting power for each group according to its data rate respectively,and then follow the inter-group proportional fair principle to allocate RBs among multicast *** results of EIPF simulation show that the proposed algorithm not only can reduce the transmit power of BS effectively but also improve the utilization rate of energy.
With the continuous development of the converged network, the types of equipment increase and each has different device identification. The existing SNMPv3 program by using enginelD to identify equipment's legal s...
详细信息
The problem of recovering sparse and low-rank matrices from a given matrix captures many applications. However, this recovery problem is NP-hard and thus not tractable in general. Recently, it has been shown that this...
详细信息
A secure communication mechanism is necessary in the applications of wireless Multimedia sensornetworks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, give...
详细信息
A secure communication mechanism is necessary in the applications of wireless Multimedia sensornetworks (WMSNs), which is more vulnerable to security attacks due to the presence of multimedia data. Additionally, given the limited technological resources (in term of energy, computation, bandwidth, and storage) of sensor nodes, security and privacy policies have to be combined with energy-aware algorithms and distributed processing of multimedia contents in WMSNs. To solve these problems in this paper, an energy efficient distributed steganography scheme, which combines steganography technique with the concept of distributed computing, is proposed for secure communication in WMSNs. The simulation results show that the proposed method can achieve considerable energy efficiency while assuring the communication security simultaneously.
For effective and efficient detection of moving objects from complex surveillance scenarios, a novel integrated object detection scheme based on clustering and Bayesian theory is proposed in this paper. The algorithm ...
详细信息
暂无评论