作者:
Lvzhou LiInstitute of Computer Science Theory
School of Data and Computer Science Sun Yat-sen University Guangzhou 510006 China and Ministry of Education Key Laboratory of Machine Intelligence and Advanced Computing (Sun Yat-sen University) Guangzhou China
Local distinguishability of bipartite unitary operations has recently received much attention. A nontrivial and interesting question concerning this subject is whether there is a sequential scheme for locally discrimi...
详细信息
Local distinguishability of bipartite unitary operations has recently received much attention. A nontrivial and interesting question concerning this subject is whether there is a sequential scheme for locally discriminating between two bipartite unitary operations, because a sequential scheme usually represents the most economic strategy for discrimination. An affirmative answer to this question was given in the literature, however with two limitations: (i) the unitary operations to be discriminated were limited to act on d⊗d, i.e., a two-qudit system, and (ii) the inverses of the unitary operations were assumed to be accessible, although this assumption may be unrealizable in experiment. In this paper, we improve the result by removing the two limitations. Specifically, we show that any two bipartite unitary operations acting on dA⊗dB can be locally discriminated by a sequential scheme, without using the inverses of the unitary operations. Therefore, this paper enhances the applicability and feasibility of the sequential scheme for locally discriminating unitary operations.
Considering the correlated SNPs sequences, the associated study between the SNPs and diseases may lead to more privacy breaches for high-order SNPs linkage disequilibrium, because of sensitive information related to S...
详细信息
Considering the correlated SNPs sequences, the associated study between the SNPs and diseases may lead to more privacy breaches for high-order SNPs linkage disequilibrium, because of sensitive information related to SNPs including individual identity, phenotype and kinship. The existing privacy preserving methods have not been applicable to privacy preserving of SNPs, since those methods without considering correlation of the genome sequences, without effectively computation and with leading to utility disaster. To this end, we proposed the genomic privacy preserving framework for high-order SNPs linkage disequilibrium on correlated sequences. Firstly, we constructed a matrix model for diploid genotype of SNPs, while computing high-order SNPs linkage disequilibrium and the number of correlated sequences, then achieved diploid genotype indistinguishable based on the definition of differential privacy using matrix addition, finally, we got diploid genotype permutation using module operation. So we got the matrix differential privacy framework, which guaranteed the privacy of individual sensitive information for high-order SNPs linkage disequilibrium on correlated sequences, while kept the tradeoff of genome data utility. Therefore, combining matrix model of SNPs and modulo operation, our framework built on the definition of differential privacy has a guidance role for designing privacy preserving approach under high-order SNPs linkage disequilibrium on correlated sequences, while facilitates to share genome data to GWAS. Furthermore, our framework can generalize to privacy preserving of other genome data applications.
Crowdsourcing has become an effective tool to utilize human intelligence to perform tasks that are challenging for machines. In the integrated crowdsourcing systems, the requesters are non- monopolistic and may show p...
详细信息
ISBN:
(纸本)9781509066001
Crowdsourcing has become an effective tool to utilize human intelligence to perform tasks that are challenging for machines. In the integrated crowdsourcing systems, the requesters are non- monopolistic and may show preferences over the workers. We are the first to design the incentive mechanisms, which consider the issue of stimulating the biased requesters in the competing crowdsourcing market. In this paper, we explore truthful task assignment mechanisms to maximize the total value of accomplished tasks for this new scenario. We present three models of crowdsourcing, which take the preferences of the requesters and the workload constraints of the workers into consideration. We design a task assignment mechanism, which follows the matching approach to solve the Valuation Maximizing Assignment (VMA) problem for each of the three models. Through both rigorous theoretical analyses and extensive simulations, we demonstrate that the proposed assignment mechanisms achieve computational efficiency, workload feasibility, preference (universal) truthfulness and constant approximation.
Scan design is a widely used design-for-testability (DFT) technique that improves the controllability and observability of integrated circuits (ICs) resulting in the facilitation of the testing. However, it can also b...
详细信息
ISBN:
(纸本)9789881404732
Scan design is a widely used design-for-testability (DFT) technique that improves the controllability and observability of integrated circuits (ICs) resulting in the facilitation of the testing. However, it can also be used to access secret information of crypto chips, and thus threaten dramatically the security of the cipher keys. In this paper, we propose a secure scan DFT architecture to thwart scan-based side-channel attacks. This architecture provides the scan chain reset mechanism, and thus can prevent these attacks based on mode switching. Meanwhile, the secret key is isolated from scan chains of an advanced encryption standard (AES) design in the test mode. Therefore, it can also halt the test-mode-only scan attacks. The proposed secure scan DFT technique ensures the security without compromising the testability of original chip. Most important of all, the secure scan test is implemented with extremely low hardware overhead.
In order to provide guidance for the development of high performance millimeter-wave complementary metal oxide semiconductor (MMW-CMOS) integrated circuits (IC), this paper provides a survey of key technologies on MMW...
In order to provide guidance for the development of high performance millimeter-wave complementary metal oxide semiconductor (MMW-CMOS) integrated circuits (IC), this paper provides a survey of key technologies on MMW-CMOS IC. Technical background of MMW wireless communications is described. Then the recent development of the critical technologies of the MMW-CMOS IC are introduced in detail and compared. A summarization is given, and the development prospects on MMW-CMOS IC are also discussed.
This treatise proposes a new algorithm of encrypting images by combining Sine map with generalized Arnold transformation. The algorithm adds a shift transformation link to the common permutation-diffusion structure. F...
详细信息
This treatise proposes a new algorithm of encrypting images by combining Sine map with generalized Arnold transformation. The algorithm adds a shift transformation link to the common permutation-diffusion structure. Firstly,the plain-image is permutated in pixel positions by using the generalized Arnold transformation. Secondly,the permutated image is diffused by using the Sine map. Then,the diffused image is performed through the shifting process,which can avoid multiple encryption and shorten the encryption time. The results of analysis and experimental tests for the proposed algorithm have been given in detail,which showed that our new algorithm is highly secure. In conclusion,it has great application potential in Internet-based image secure communication.
In this paper,we present an improved method based on Zippel's algorithm for multivariate polynomial interpolation,and a testing point technique is proposed to verify the recovered *** with Zippel's algorithm,t...
详细信息
In this paper,we present an improved method based on Zippel's algorithm for multivariate polynomial interpolation,and a testing point technique is proposed to verify the recovered *** with Zippel's algorithm,the new method not only returns an exact target polynomial but takes less computation time as *** experiments show the effectiveness of the improved method.
Based on the method of averaging, in this paper we investigate the continuation of harmonic motions for a weakly forced autoparametric vibrating system which models the dynamics of a forced pendulum positioned on a ve...
Based on the method of averaging, in this paper we investigate the continuation of harmonic motions for a weakly forced autoparametric vibrating system which models the dynamics of a forced pendulum positioned on a vertically excited mass. The result shows that when the very weakly force is imposed on the pendulum, a state of dynamic balance (a harmonic motion) is preserving.
In this paper, we present an improved method based on Zippel's algorithm for multivariate polynomial interpolation, and a testing point technique is proposed to verify the recovered polynomial. Compared with Zippe...
详细信息
In this paper, we present an improved method based on Zippel's algorithm for multivariate polynomial interpolation, and a testing point technique is proposed to verify the recovered polynomial. Compared with Zippel's algorithm, the new method not only returns an exact target polynomial but takes less computation time as well. The experiments show the effectiveness of the improved method.
暂无评论