分析研究了量子遗传算法(Quantum Genetic A lgorithm-QGA)的原理及其优势,将有指导的群体灾变及多宇宙并行演化策略引入量子遗传算法,改善其收敛性。以理想二阶系统为参考模型,实际系统响应曲线与参考模型响应曲线误差积分为目标函数,...分析研究了量子遗传算法(Quantum Genetic A lgorithm-QGA)的原理及其优势,将有指导的群体灾变及多宇宙并行演化策略引入量子遗传算法,改善其收敛性。以理想二阶系统为参考模型,实际系统响应曲线与参考模型响应曲线误差积分为目标函数,使用量子遗传算法进行发动机PID控制器参数优化并进行了数字仿真。仿真结果表明,量子遗传算法具有较好的全局收敛能力,应用于PID控制器控制参数优化后,控制器的控制效果良好,其在发动机控制系统中有较高的应用价值。展开更多
The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant qua...The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc.展开更多
The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes ...The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes has developed rapidly and been extended to protect quantum information over asymmetric quantum channels, in which phase-shift and qubit-flip errors occur with different probabilities. In this paper, we generalize the construction of symmetric quantum codes via graphs (or matrices) to the asymmetric case, converting the construction of asymmetric quantum codes to finding matrices with some special properties. We also propose some asymmetric quantum Maximal Distance Separable (MDS) codes as examples constructed in this way.展开更多
Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certai...Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certain mathematical problems on non-commutative algebraic structures until now. In this background, Majid Khan et al.proposed two novel public-key encryption schemes based on large abelian subgroup of general linear group over a residue ring. In this paper we show that the two schemes are not secure. We present that they are vulnerable to a structural attack and that, it only requires polynomial time complexity to retrieve the message from associated public keys respectively. Then we conduct a detailed analysis on attack methods and show corresponding algorithmic description and efficiency analysis respectively. After that, we propose an improvement assisted to enhance Majid Khan's scheme. In addition, we discuss possible lines of future work.展开更多
The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing....The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols.展开更多
Quantum communications helps us to enhance the security and efficiency of communications and to deepen our understanding of quantum physics. Its rapid development in recent years has attracted the interest of research...Quantum communications helps us to enhance the security and efficiency of communications and to deepen our understanding of quantum physics. Its rapid development in recent years has attracted the interest of researchers from diverse fields such as physics, mathematics, and computer science. We review the background and current state of quantum communications technology, with an emphasis on quantum key distribution, quantum random number generation, and a relatively hot topic: device independent protocols.展开更多
The C--C bond dissociation energy (BDE) is a very important data in research of hydrocarbon cracking reactions, because it reflects the difficulty level of chemical reactions. But it is very difficult to obtain the ...The C--C bond dissociation energy (BDE) is a very important data in research of hydrocarbon cracking reactions, because it reflects the difficulty level of chemical reactions. But it is very difficult to obtain the C--C bond dissociation energy (BDE) by experiments, so using quantum chemistry calculation such as density functional theory (DFT) to study the C--C bond dissociation energy is a very useful means. The impact of acceptor substituents and donor substituents on the C--C bond length distribution was studied.展开更多
In order to reduce the hazard of coal spontaneous combustion,the cross-linking reaction between O-containing functional groups of coal should be inhibited.So the inhibitory effect of an ionic liquid(IL) on the cross-l...In order to reduce the hazard of coal spontaneous combustion,the cross-linking reaction between O-containing functional groups of coal should be inhibited.So the inhibitory effect of an ionic liquid(IL) on the cross-linking reaction was studied.The O-containing functional groups change the weight loss and H_2O,CO_2,CO yields of bituminous coal before and after[H0Emim][BF_4]and[Amim]Cl pre-treatment and were detected by Fourier Transform Infrared spectroscopy(FT1R) and Thermo Gravimetric(TC) analysis.The results show that | AmimjCI has a weaker ability to inhibit the cross-linking reaction of bituminous coal compared to[HOEmim][BF_4].Besides,based on Quantum Chemistry calculation,it was found that the different inhibiting effects of |H0Emim][BF_4]and[Amim]Cl are greatly related to their anions and the H linked with C2 atom on the imidazole ring.The H-donor ability of coal will be enhanced by[HOEmim][BF_4]leading to a weaker cross-linking reaction of coal.展开更多
The structure and energy of the carbonium ions formed upon protonation of butane were studied by the DFT methods. Four stable structures are identified for the protonated form of n-butane, the energy increases in the ...The structure and energy of the carbonium ions formed upon protonation of butane were studied by the DFT methods. Four stable structures are identified for the protonated form of n-butane, the energy increases in the following order: C2HC3〈C1HC2〈C2HH〈C1HH, and the stability decreases in the following order C2HC3〉C1HC2〉C2HH〉C1HH. The stability of the penta-coordinated carbonium ions may be explained by the electron distribution in the three-center-two-electron bonds. The delocalization of the penta-coordinated carbonium ion CHC with three-center-two-electron bonds on positive charges was stronger than that of the penta-coordinated earbonium ion CHH with three-center-two-electron bonds and its stability was higher than that of the penta-coordinated carbonium ion CHH with three-center-two-electron bonds.展开更多
文摘分析研究了量子遗传算法(Quantum Genetic A lgorithm-QGA)的原理及其优势,将有指导的群体灾变及多宇宙并行演化策略引入量子遗传算法,改善其收敛性。以理想二阶系统为参考模型,实际系统响应曲线与参考模型响应曲线误差积分为目标函数,使用量子遗传算法进行发动机PID控制器参数优化并进行了数字仿真。仿真结果表明,量子遗传算法具有较好的全局收敛能力,应用于PID控制器控制参数优化后,控制器的控制效果良好,其在发动机控制系统中有较高的应用价值。
基金the National Natural Science Foundation of China,the State Key Program of National Natural Science of China,the Major Research Plan of the National Natural Science Foundation of China,Major State Basic Research Development Program of China (973 Program),the Hubei Natural Science Foundation of China
文摘The emergence of quantum computer will threaten the security of existing public-key cryptosystems, including the Diffie Hellman key exchange protocol, encryption scheme and etc, and it makes the study of resistant quantum cryptography very urgent. This motivate us to design a new key exchange protocol and eneryption scheme in this paper. Firstly, some acknowledged mathematical problems was introduced, such as ergodic matrix problem and tensor decomposition problem, the two problems have been proved to NPC hard. From the computational complexity prospective, NPC problems have been considered that there is no polynomial-time quantum algorithm to solve them. From the algebraic structures prospective, non-commutative cryptography has been considered to resist quantum. The matrix and tensor operator we adopted also satisfied with this non-commutative algebraic structures, so they can be used as candidate problems for resisting quantum from perspective of computational complexity theory and algebraic structures. Secondly, a new problem was constructed based on the introduced problems in this paper, then a key exchange protocol and a public key encryption scheme were proposed based on it. Finally the security analysis, efficiency, recommended parameters, performance evaluation and etc. were also been given. The two schemes has the following characteristics, provable security,security bits can be scalable, to achieve high efficiency, quantum resistance, and etc.
基金supported by the National High Technology Research and Development Program of China under Grant No. 2011AA010803
文摘The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes has developed rapidly and been extended to protect quantum information over asymmetric quantum channels, in which phase-shift and qubit-flip errors occur with different probabilities. In this paper, we generalize the construction of symmetric quantum codes via graphs (or matrices) to the asymmetric case, converting the construction of asymmetric quantum codes to finding matrices with some special properties. We also propose some asymmetric quantum Maximal Distance Separable (MDS) codes as examples constructed in this way.
基金supported in part by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386)the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004)+2 种基金the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008)Major State Basic Research Development Program of China(973 Program)(No.2014CB340600)the Hubei Natural Science Foundation of China(Grant Nos.2011CDB453,2014CFB440)
文摘Advances in quantum computers threaten to break public key cryptosystems such as RSA, ECC, and EIGamal on the hardness of factoring or taking a discrete logarithm, while no quantum algorithms are found to solve certain mathematical problems on non-commutative algebraic structures until now. In this background, Majid Khan et al.proposed two novel public-key encryption schemes based on large abelian subgroup of general linear group over a residue ring. In this paper we show that the two schemes are not secure. We present that they are vulnerable to a structural attack and that, it only requires polynomial time complexity to retrieve the message from associated public keys respectively. Then we conduct a detailed analysis on attack methods and show corresponding algorithmic description and efficiency analysis respectively. After that, we propose an improvement assisted to enhance Majid Khan's scheme. In addition, we discuss possible lines of future work.
基金supported by the National Natural Science Foundation of China(Grant Nos.61303212,61170080,61202386)the State Key Program of National Natural Science of China(Grant Nos.61332019,U1135004)+2 种基金the Major Research Plan of the National Natural Science Foundation of China(Grant No.91018008)Major State Basic Research Development Program of China(973 Program)(No.2014CB340600)the Hubei Natural Science Foundation of China(Grant No.2011CDB453,2014CFB440)
文摘The hardness of tensor decomposition problem has many achievements, but limited applications in cryptography, and the tensor decomposition problem has been considered to have the potential to resist quantum computing. In this paper, we firstly proposed a new variant of tensor decomposition problem, then two one-way functions are proposed based on the hard problem. Secondly we propose a key exchange protocol based on the one-way functions, then the security analysis, efficiency, recommended parameters and etc. are also given. The analyses show that our scheme has the following characteristics: easy to implement in software and hardware, security can be reduced to hard problems, and it has the potential to resist quantum computing.Besides the new key exchange can be as an alternative comparing with other classical key protocols.
基金supported by the National Basic Research Program of China under Grants No. 2011CBA00200 No. 2011CB921200+2 种基金National Natural Science Foundation of China under Grants No. 60921091 No. 61101137 No. 61201239
文摘Quantum communications helps us to enhance the security and efficiency of communications and to deepen our understanding of quantum physics. Its rapid development in recent years has attracted the interest of researchers from diverse fields such as physics, mathematics, and computer science. We review the background and current state of quantum communications technology, with an emphasis on quantum key distribution, quantum random number generation, and a relatively hot topic: device independent protocols.
文摘The C--C bond dissociation energy (BDE) is a very important data in research of hydrocarbon cracking reactions, because it reflects the difficulty level of chemical reactions. But it is very difficult to obtain the C--C bond dissociation energy (BDE) by experiments, so using quantum chemistry calculation such as density functional theory (DFT) to study the C--C bond dissociation energy is a very useful means. The impact of acceptor substituents and donor substituents on the C--C bond length distribution was studied.
基金the support from the National Natural Science Foundation of China(Nos.51304073and 51304071)the Educational Commission of Henan Province(Nos.13A440324 and 12B440004)+1 种基金the Open Projects of State Key Laboratory of Coal Resources and Safe Mining,China University of Mining and Technology(No.12KF02)Henan Polytechnic University(Nos.B2012-068 and B2012-085)
文摘In order to reduce the hazard of coal spontaneous combustion,the cross-linking reaction between O-containing functional groups of coal should be inhibited.So the inhibitory effect of an ionic liquid(IL) on the cross-linking reaction was studied.The O-containing functional groups change the weight loss and H_2O,CO_2,CO yields of bituminous coal before and after[H0Emim][BF_4]and[Amim]Cl pre-treatment and were detected by Fourier Transform Infrared spectroscopy(FT1R) and Thermo Gravimetric(TC) analysis.The results show that | AmimjCI has a weaker ability to inhibit the cross-linking reaction of bituminous coal compared to[HOEmim][BF_4].Besides,based on Quantum Chemistry calculation,it was found that the different inhibiting effects of |H0Emim][BF_4]and[Amim]Cl are greatly related to their anions and the H linked with C2 atom on the imidazole ring.The H-donor ability of coal will be enhanced by[HOEmim][BF_4]leading to a weaker cross-linking reaction of coal.
文摘The structure and energy of the carbonium ions formed upon protonation of butane were studied by the DFT methods. Four stable structures are identified for the protonated form of n-butane, the energy increases in the following order: C2HC3〈C1HC2〈C2HH〈C1HH, and the stability decreases in the following order C2HC3〉C1HC2〉C2HH〉C1HH. The stability of the penta-coordinated carbonium ions may be explained by the electron distribution in the three-center-two-electron bonds. The delocalization of the penta-coordinated carbonium ion CHC with three-center-two-electron bonds on positive charges was stronger than that of the penta-coordinated earbonium ion CHH with three-center-two-electron bonds and its stability was higher than that of the penta-coordinated carbonium ion CHH with three-center-two-electron bonds.