scholarly journals Can you sign a quantum state?

Quantum ◽  
2021 ◽  
Vol 5 ◽  
pp. 603
Author(s):  
Gorjan Alagic ◽  
Tommaso Gagliardoni ◽  
Christian Majenz

Cryptography with quantum states exhibits a number of surprising and counterintuitive features. In a 2002 work, Barnum et al. argue that these features imply that digital signatures for quantum states are impossible (Barnum et al., FOCS 2002). In this work, we ask: can all forms of signing quantum data, even in a possibly weak sense, be completely ruled out? We give two results which shed significant light on this basic question.First, we prove an impossibility result for digital signatures for quantum data, which extends the result of Barnum et al. Specifically, we show that no nontrivial combination of correctness and security requirements can be fulfilled, beyond what is achievable simply by measuring the quantum message and then signing the outcome. In other words, only classical signature schemes exist.We then show a positive result: a quantum state can be signed with the same security guarantees as classically, provided that it is also encrypted with the public key of the intended recipient. Following classical nomenclature, we call this notion quantum signcryption. Classically, signcryption is only interesting if it provides superior performance to encypt-then-sign. Quantumly, it is far more interesting: it is the only signing method available. We develop "as-strong-as-classical" security definitions for quantum signcryption and give secure constructions based on post-quantum public-key primitives. Along the way, we show that a natural hybrid method of combining classical and quantum schemes can be used to "upgrade" a secure classical scheme to the fully-quantum setting, in a wide range of cryptographic settings including signcryption, authenticated encryption, and CCA security.

2021 ◽  
Vol 111 (3) ◽  
Author(s):  
Maurice A. de Gosson

AbstractWe show that every Gaussian mixed quantum state can be disentangled by conjugation with a passive symplectic transformation, that is a metaplectic operator associated with a symplectic rotation. The main tools we use are the Werner–Wolf condition on covariance matrices and the symplectic covariance of Weyl quantization. Our result therefore complements a recent study by Lami, Serafini, and Adesso.


Author(s):  
Jiu-Peng Chen ◽  
Hong-Jun San ◽  
Xing Wu ◽  
Bin-Zhou Xiong

Quadruped bionic robot has a strong adaptability to the environment, compared with wheeled and tracked robots, it has superior motion performance, and has a wide range of application prospects in rescue and disaster relief, ground mine clearance, mountain transportation, so it has become a research hotspot all over the world. Leg structure is an important embodiment of the superior performance of quadruped robot, and it is also the key and difficult point of design. This article proposes a novel quadruped robot with waist structure, which can complete a variety of gait forms. Based on the theory of linkage mechanism, a novel leg structure is designed with anti-parallelogram mechanism, which improves the strength and stiffness of the robot. Using D-H description method, the kinematics analysis of this quadruped robot single leg is carried out. On this basis, in order to ensure the foot contact with the ground and achieve zero impact, polynomial programming is used to plan the foot trajectory of swing phase and support phase. Based on the static stability margin, the optimal static gait of the quadruped robot is planned. A co-simulation study has been carried out to investigate further the validity and effectiveness of the quadruped robot on gait. The simulation results clearly show the robot can walk steadily and its input and output meet the expected requirements. The solid prototype platform is built, and the trajectory planning experiment of single leg is carried out, and the foot trajectory of single leg is obtained by using laser tracker. The gait planning algorithm is applied to the whole robot, and the results show that the robot can walk according to the scheduled gait, which proves the effectiveness of the proposed algorithm.


2019 ◽  
Vol 2019 ◽  
pp. 1-21 ◽  
Author(s):  
Naeem Ratyal ◽  
Imtiaz Ahmad Taj ◽  
Muhammad Sajid ◽  
Anzar Mahmood ◽  
Sohail Razzaq ◽  
...  

Face recognition aims to establish the identity of a person based on facial characteristics and is a challenging problem due to complex nature of the facial manifold. A wide range of face recognition applications are based on classification techniques and a class label is assigned to the test image that belongs to the unknown class. In this paper, a pose invariant deeply learned multiview 3D face recognition approach is proposed and aims to address two problems: face alignment and face recognition through identification and verification setups. The proposed alignment algorithm is capable of handling frontal as well as profile face images. It employs a nose tip heuristic based pose learning approach to estimate acquisition pose of the face followed by coarse to fine nose tip alignment using L2 norm minimization. The whole face is then aligned through transformation using knowledge learned from nose tip alignment. Inspired by the intrinsic facial symmetry of the Left Half Face (LHF) and Right Half Face (RHF), Deeply learned (d) Multi-View Average Half Face (d-MVAHF) features are employed for face identification using deep convolutional neural network (dCNN). For face verification d-MVAHF-Support Vector Machine (d-MVAHF-SVM) approach is employed. The performance of the proposed methodology is demonstrated through extensive experiments performed on four databases: GavabDB, Bosphorus, UMB-DB, and FRGC v2.0. The results show that the proposed approach yields superior performance as compared to existing state-of-the-art methods.


2014 ◽  
Vol 12 (01) ◽  
pp. 1450004 ◽  
Author(s):  
K. O. Yashodamma ◽  
P. J. Geetha ◽  
Sudha

The effect of filtering operation with respect to purification and concentration of entanglement in quantum states are discussed in this paper. It is shown, through examples, that the local action of the filtering operator on a part of the composite quantum state allows for purification of the remaining part of the state. The redistribution of entanglement in the subsystems of a noise affected state is shown to be due to the action of local filtering on the non-decohering part of the system. The varying effects of the filtering parameter, on the entanglement transfer between the subsystems, depending on the choice of the initial quantum state is illustrated.


Author(s):  
Dongqi Jiang ◽  
Shanquan Liu ◽  
Tao Chen ◽  
Gang Bi

<p>Reinforced concrete – steel plate composite shear walls (RCSPSW) have attracted great interests in the construction of tall buildings. From the perspective of life-cycle maintenance, the failure mode recognition is critical in determining the post-earthquake recovery strategies. This paper presents a comprehensive study on a wide range of existing experimental tests and develops a unique library of 17 parameters that affects RCSPSW’s failure modes. A total of 127 specimens are compiled and three types of failure modes are considered: flexure, shear and flexure-shear failure modes. Various machine learning (ML) techniques such as decision trees, random forests (RF), <i>K</i>-nearest neighbours and artificial neural network (ANN) are adopted to identify the failure mode of RCSPSW. RF and ANN algorithm show superior performance as compared to other ML approaches. In Particular, ANN model with one hidden layer and 10 neurons is sufficient for failure mode recognition of RCSPSW.</p>


2011 ◽  
Vol 09 (06) ◽  
pp. 1437-1448
Author(s):  
YI-BAO LI ◽  
KUI HOU ◽  
SHOU-HUA SHI

We propose two kinds of schemes for multiparty remote state preparation (MRSP) of the multiparticle d-dimensional equatorial quantum states by using partial entangled state as the quantum channel. Unlike more remote state preparation scheme which only one sender knows the original state to be remotely prepared, the quantum state is shared by two-party or multiparty in this scheme. We show that if and only if all the senders agree to collaborate with each other, the receiver can recover the original state with certain probability. It is found that the total success probability of MRSP is only by means of the smaller coefficients of the quantum channel and the dimension d.


2018 ◽  
Vol 151 ◽  
pp. 04009
Author(s):  
Hongyu Wang ◽  
Xun Zhao ◽  
Hui Bai ◽  
Cunyue Lu ◽  
Baomin Zhang ◽  
...  

This paper presents the design of a symmetrical quad-rotor biplane tail-sitter VTOL UAV (Vertical Take-off and Landing Unmanned Aerial Vehicle) which is composed of four rotors and two symmetrically mounted fixed wings. This aircraft achieves high accuracy in the attitude control and smooth flight mode transition with four rotors rather than the conventional VTOL UAVs using control surfaces. The proposal of angled rotor mounting is adopted to address the issue of insufficient yaw control authority. The layout of symmetrically mounted fixed wings makes the aircraft have capability of rapid bidirectional flight mode transition to improve maneuverability. To validate the performance of the aircraft, simulation and flight experiments are both implemented. These results show that the aircraft has a rapid yaw response under condition of the stable attitude control. In comparative experiment, it is shown that the aircraft is more flexible than other similar configuration of aircrafts. This symmetrical quad-rotor biplane tail-sitter VTOL UAV will have a wide range of potential applications in the military and civilian areas due to its superior performance..


2021 ◽  
Vol 20 (2) ◽  
pp. 123-139
Author(s):  
Katarzyna Jadach

The key issue of this article is inclusive education in connection with the formal and legal aspects of students’ safety when they are staying in educational institutions. In the first part, author describes the basic assumptions of the social model of education and it’s international conditions, also referring to solutions that have been recently implemented in the Polish education system. The second part indicates the problems that may be met by educational institutions and teachers trying to achieve a state of full inclusion. They relate to the school’s caring function in terms of security guarantees. The diversity of student population, especially wide range of educational needs may make it impossible for teachers to develop specific approach to individual pupil. It’s caused by formal items, largely determined by the financial situation of particular local government units.


2021 ◽  
Vol 7 ◽  
pp. e571
Author(s):  
Nurdan Ayse Saran ◽  
Murat Saran ◽  
Fatih Nar

In the last decade, deep learning has been applied in a wide range of problems with tremendous success. This success mainly comes from large data availability, increased computational power, and theoretical improvements in the training phase. As the dataset grows, the real world is better represented, making it possible to develop a model that can generalize. However, creating a labeled dataset is expensive, time-consuming, and sometimes not likely in some domains if not challenging. Therefore, researchers proposed data augmentation methods to increase dataset size and variety by creating variations of the existing data. For image data, variations can be obtained by applying color or spatial transformations, only one or a combination. Such color transformations perform some linear or nonlinear operations in the entire image or in the patches to create variations of the original image. The current color-based augmentation methods are usually based on image processing methods that apply color transformations such as equalizing, solarizing, and posterizing. Nevertheless, these color-based data augmentation methods do not guarantee to create plausible variations of the image. This paper proposes a novel distribution-preserving data augmentation method that creates plausible image variations by shifting pixel colors to another point in the image color distribution. We achieved this by defining a regularized density decreasing direction to create paths from the original pixels’ color to the distribution tails. The proposed method provides superior performance compared to existing data augmentation methods which is shown using a transfer learning scenario on the UC Merced Land-use, Intel Image Classification, and Oxford-IIIT Pet datasets for classification and segmentation tasks.


Sign in / Sign up

Export Citation Format

Share Document