In order to address the issue of gold mixing caused by the Kelvin-Helmholtz instability(KHI)in the double-cone ignition(DCI)scheme,we investigate the growth rate of the KHI at the bi-interface of the DCI scheme after ...In order to address the issue of gold mixing caused by the Kelvin-Helmholtz instability(KHI)in the double-cone ignition(DCI)scheme,we investigate the growth rate of the KHI at the bi-interface of the DCI scheme after applying a coating.This is done by solving the hydrodynamic equations for an ideal incompressible fluid using linear theory.Ultimately,it is discovered that applying a coating with a thickness slightly above h=0.5(λ+10μm)and a density somewhat lower than that of the target layer can effectively reduce the growth rate of interfacial KHI.This work provides theoretical references for studying the bi-interface KHI in the DCI scheme.展开更多
In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propos...In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.展开更多
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc...In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.展开更多
In this paper,we propose a second-order moving-water equilibria preserving nonstaggered central scheme to solve the Ripa model via flux globalization.To maintain the moving-water steady states,we use the discrete sour...In this paper,we propose a second-order moving-water equilibria preserving nonstaggered central scheme to solve the Ripa model via flux globalization.To maintain the moving-water steady states,we use the discrete source terms proposed by Britton et al.(J Sci Comput,2020,82(2):Art 30)by incorporating the expression of the source terms as a whole into the flux gradient,which directly avoids the discrete complexity of the source terms in order to maintain the well-balanced properties of the scheme.In addition,since the nonstaggered central scheme requires re-projecting the updated values of the nonstaggered cells onto the staggered cells,we modify the calculation of the global variables by constructing ghost cells and alternating the values of the global variables with the water depths obtained from the solution through the nonlinear relationship between the global flux and the water depth.In order to maintain the second-order accuracy of the scheme on the time scale,we incorporate a new Runge-Kutta type time discretization in the evolution of the numerical solution for the nonstaggered cells.Meanwhile,we introduce the"draining"time step technique to ensure that the water depth is positive and that it satisfies mass conservation.Numerical experiments verify that the scheme is well-balanced,positivity-preserving and robust.展开更多
In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured L...In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.展开更多
This paper studies the strong convergence of the quantum lattice Boltzmann(QLB)scheme for the nonlinear Dirac equations for Gross-Neveu model in 1+1 dimensions.The initial data for the scheme are assumed to be converg...This paper studies the strong convergence of the quantum lattice Boltzmann(QLB)scheme for the nonlinear Dirac equations for Gross-Neveu model in 1+1 dimensions.The initial data for the scheme are assumed to be convergent in L^(2).Then for any T≥0 the corresponding solutions for the quantum lattice Boltzmann scheme are shown to be convergent in C([0,T];L^(2)(R^(1)))to the strong solution to the nonlinear Dirac equations as the mesh sizes converge to zero.In the proof,at first a Glimm type functional is introduced to establish the stability estimates for the difference between two solutions for the corresponding quantum lattice Boltzmann scheme,which leads to the compactness of the set of the solutions for the quantum lattice Boltzmann scheme.Finally the limit of any convergent subsequence of the solutions for the quantum lattice Boltzmann scheme is shown to coincide with the strong solution to a Cauchy problem for the nonlinear Dirac equations.展开更多
Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message i...Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.展开更多
A model for fast electron-driven high-density plasma is proposed to describe the effect of injected fast electrons on the temperature and inner pressure of the plasma in the fast heating process of the double-cone ign...A model for fast electron-driven high-density plasma is proposed to describe the effect of injected fast electrons on the temperature and inner pressure of the plasma in the fast heating process of the double-cone ignition(DCI)scheme.Due to the collision of the two low-density plasmas,the density and volume of the high-density plasma vary.Therefore,the ignition temperature and energy requirement of the high-density plasma vary at different moments,and the required energy for hot electrons to heat the plasma also changes.In practical experiments,the energy input of hot electrons needs to be considered.To reduce the energy input of hot electrons,the optimal moment and the shortest time for injecting hot electrons with minimum energy are analyzed.In this paper,it is proposed to inject hot electrons for a short time to heat the high-density plasma to a relatively high temperature.Then,the alpha particles with the high heating rate and PdV work heat the plasma to the ignition temperature,further reducing the energy required to inject hot electrons.The study of the injection time of fast electrons can reduce the energy requirement of fast electrons for the high-density plasma and increase the probability of successful ignition of the high-density plasma.展开更多
A new selected mapping(SLM)scheme based on constellation rotation is proposed to reduce the peak-to-average power ratio(PAPR)of orthogonal frequency division multiplexing(OFDM)signals.Its core idea is to generate abun...A new selected mapping(SLM)scheme based on constellation rotation is proposed to reduce the peak-to-average power ratio(PAPR)of orthogonal frequency division multiplexing(OFDM)signals.Its core idea is to generate abundant candidate signals by rotating different sub-signals of the original frequency signal with different angles.This new signal generation method can simplify the calculation process of candidate time signals into the linear addition of some intermediate signals,which are generated by the inverse fast Fourier transform(IFFT)operation of the original frequency signal.This feature can effectively reduce the computational complexity of candidate signal generation process.And compared to the traditional SLM scheme,the number of complex multiplication and complex addition of new scheme can separately be decreased by about 99.99% and 91.7% with some specific parameters.Moreover,with the help of the constellation detection mechanism at the receiver,there is no need to carry any side information at the transmitter.The simulation results show that,with the same channel transmission performance,the PAPR reduction performance of new scheme can approach or even exceed the upper bound of the traditional SLM scheme,which uses all the vectors in Hadamard matrix as the phase sequences.展开更多
基金Project supported by the Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDA 25051000)。
文摘In order to address the issue of gold mixing caused by the Kelvin-Helmholtz instability(KHI)in the double-cone ignition(DCI)scheme,we investigate the growth rate of the KHI at the bi-interface of the DCI scheme after applying a coating.This is done by solving the hydrodynamic equations for an ideal incompressible fluid using linear theory.Ultimately,it is discovered that applying a coating with a thickness slightly above h=0.5(λ+10μm)and a density somewhat lower than that of the target layer can effectively reduce the growth rate of interfacial KHI.This work provides theoretical references for studying the bi-interface KHI in the DCI scheme.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61971348 and 61201194)。
文摘In order to avoid the complexity of Gaussian modulation and the problem that the traditional point-to-point communication DM-CVQKD protocol cannot meet the demand for multi-user key sharing at the same time, we propose a multi-ring discrete modulation continuous variable quantum key sharing scheme(MR-DM-CVQSS). In this paper, we primarily compare single-ring and multi-ring M-symbol amplitude and phase-shift keying modulations. We analyze their asymptotic key rates against collective attacks and consider the security key rates under finite-size effects. Leveraging the characteristics of discrete modulation, we improve the quantum secret sharing scheme. Non-dealer participants only require simple phase shifters to complete quantum secret sharing. We also provide the general design of the MR-DM-CVQSS protocol.We conduct a comprehensive analysis of the improved protocol's performance, confirming that the enhancement through multi-ring M-PSK allows for longer-distance quantum key distribution. Additionally, it reduces the deployment complexity of the system, thereby increasing the practical value.
基金supported by the National Natural Science Foundation of China(Grant No.12301590)the Natural Science Foundation of Hebei Province(Grant No.A2022210002)。
文摘In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.
基金supported by the National Natural Science Foundation of China(51879194)。
文摘In this paper,we propose a second-order moving-water equilibria preserving nonstaggered central scheme to solve the Ripa model via flux globalization.To maintain the moving-water steady states,we use the discrete source terms proposed by Britton et al.(J Sci Comput,2020,82(2):Art 30)by incorporating the expression of the source terms as a whole into the flux gradient,which directly avoids the discrete complexity of the source terms in order to maintain the well-balanced properties of the scheme.In addition,since the nonstaggered central scheme requires re-projecting the updated values of the nonstaggered cells onto the staggered cells,we modify the calculation of the global variables by constructing ghost cells and alternating the values of the global variables with the water depths obtained from the solution through the nonlinear relationship between the global flux and the water depth.In order to maintain the second-order accuracy of the scheme on the time scale,we incorporate a new Runge-Kutta type time discretization in the evolution of the numerical solution for the nonstaggered cells.Meanwhile,we introduce the"draining"time step technique to ensure that the water depth is positive and that it satisfies mass conservation.Numerical experiments verify that the scheme is well-balanced,positivity-preserving and robust.
文摘In this paper,we aim to design a practical low complexity low-density parity-check(LDPC)coded scheme to build a secure open channel and protect information from eavesdropping.To this end,we first propose a punctured LDPC coded scheme,where the information bits in a codeword are punctured and only the parity check bits are transmitted to the receiver.We further propose a notion of check node type distribution and derive multi-edge type extrinsic information transfer functions to estimate the security performance,instead of the well-known weak metric bit error rate.We optimize the check node type distribution in terms of the signal-to-noise ratio(SNR)gap and modify the progressive edge growth algorithm to design finite-length codes.Numerical results show that our proposed scheme can achieve a lower computational complexity and a smaller security gap,compared to the existing scrambling and puncturing schemes.
基金partially supported by the NSFC(11421061,12271507)the Natural Science Foundation of Shanghai(15ZR1403900)。
文摘This paper studies the strong convergence of the quantum lattice Boltzmann(QLB)scheme for the nonlinear Dirac equations for Gross-Neveu model in 1+1 dimensions.The initial data for the scheme are assumed to be convergent in L^(2).Then for any T≥0 the corresponding solutions for the quantum lattice Boltzmann scheme are shown to be convergent in C([0,T];L^(2)(R^(1)))to the strong solution to the nonlinear Dirac equations as the mesh sizes converge to zero.In the proof,at first a Glimm type functional is introduced to establish the stability estimates for the difference between two solutions for the corresponding quantum lattice Boltzmann scheme,which leads to the compactness of the set of the solutions for the quantum lattice Boltzmann scheme.Finally the limit of any convergent subsequence of the solutions for the quantum lattice Boltzmann scheme is shown to coincide with the strong solution to a Cauchy problem for the nonlinear Dirac equations.
基金supported by RUSA PHASE 2.0,Alagappa University,Karaikudi,India。
文摘Cryptography is deemed to be the optimum strategy to secure the data privacy in which the data is encoded ahead of time before sharing it.Visual Secret Sharing(VSS)is an encryption method in which the secret message is split into at least two trivial images called’shares’to cover it.However,such message are always targeted by hackers or dishonest members who attempt to decrypt the message.This can be avoided by not uncovering the secret message without the universal share when it is presented and is typically taken care of,by the trusted party.Hence,in this paper,an optimal and secure double-layered secret image sharing scheme is proposed.The proposed share creation process contains two layers such as threshold-based secret sharing in the first layer and universal share based secret sharing in the second layer.In first layer,Genetic Algorithm(GA)is applied to find the optimal threshold value based on the randomness of the created shares.Then,in the second layer,a novel design of universal share-based secret share creation method is proposed.Finally,Opposition Whale Optimization Algorithm(OWOA)-based optimal key was generated for rectange block cipher to secure each share.This helped in producing high quality reconstruction images.The researcher achieved average experimental outcomes in terms of PSNR and MSE values equal to 55.154225 and 0.79365625 respectively.The average PSNRwas less(49.134475)and average MSE was high(1)in case of existing methods.
基金Project supported by the Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDA_(2)5051000)the National Key R&D Program of China(Grant No.2023YFA1608400)+1 种基金the National Natural Science Foundation of China(Grant No.12005008)the Natural Science Foundation of Top Talent of SZTU(Grant No.GDRC202209).
文摘A model for fast electron-driven high-density plasma is proposed to describe the effect of injected fast electrons on the temperature and inner pressure of the plasma in the fast heating process of the double-cone ignition(DCI)scheme.Due to the collision of the two low-density plasmas,the density and volume of the high-density plasma vary.Therefore,the ignition temperature and energy requirement of the high-density plasma vary at different moments,and the required energy for hot electrons to heat the plasma also changes.In practical experiments,the energy input of hot electrons needs to be considered.To reduce the energy input of hot electrons,the optimal moment and the shortest time for injecting hot electrons with minimum energy are analyzed.In this paper,it is proposed to inject hot electrons for a short time to heat the high-density plasma to a relatively high temperature.Then,the alpha particles with the high heating rate and PdV work heat the plasma to the ignition temperature,further reducing the energy required to inject hot electrons.The study of the injection time of fast electrons can reduce the energy requirement of fast electrons for the high-density plasma and increase the probability of successful ignition of the high-density plasma.
文摘A new selected mapping(SLM)scheme based on constellation rotation is proposed to reduce the peak-to-average power ratio(PAPR)of orthogonal frequency division multiplexing(OFDM)signals.Its core idea is to generate abundant candidate signals by rotating different sub-signals of the original frequency signal with different angles.This new signal generation method can simplify the calculation process of candidate time signals into the linear addition of some intermediate signals,which are generated by the inverse fast Fourier transform(IFFT)operation of the original frequency signal.This feature can effectively reduce the computational complexity of candidate signal generation process.And compared to the traditional SLM scheme,the number of complex multiplication and complex addition of new scheme can separately be decreased by about 99.99% and 91.7% with some specific parameters.Moreover,with the help of the constellation detection mechanism at the receiver,there is no need to carry any side information at the transmitter.The simulation results show that,with the same channel transmission performance,the PAPR reduction performance of new scheme can approach or even exceed the upper bound of the traditional SLM scheme,which uses all the vectors in Hadamard matrix as the phase sequences.