Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security att...Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but also a different information disturbance theorem, which denotes a trade-off relationship between information gain for an eavesdropper and error rate, from the related works for an attack model.展开更多
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eave sdr...In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eave sdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all information, the detection rate of the original "Ping-pong" protocol is 50%; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.展开更多
In mobile IPv6 networks, the ping-pong type of movement brings about frequent handovers and thus increases signaling burden. This letter proposes a fast seamless handover scheme where the access router keeps the mobil...In mobile IPv6 networks, the ping-pong type of movement brings about frequent handovers and thus increases signaling burden. This letter proposes a fast seamless handover scheme where the access router keeps the mobile node's old reservation till the offline Count Down Timer (CDT) expires in order to reduce handover signaling and delay while the mobile node returns in a very short period of time. Based upon a pois son mobility model, an simple expression for CDT optimization is given out for the scheme to achieve the best cost performance of resource reservation.展开更多
A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the co...A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the corresponding compensation approach is introduced. Finally, the proposed algorithm is validated through computer simulation in TDD CDMA uplink transmission. The result shows that the ping-pong effects are almost avoided completely in the presence of the compensation scheme, and system performance is greatly improved.展开更多
We describe a new tracking and predicting scheme applied to a lab-made ping pong robot. The robot has a monocular vision system comprised of a camera and a light. We propose an optimized strategy to calibrate the ligh...We describe a new tracking and predicting scheme applied to a lab-made ping pong robot. The robot has a monocular vision system comprised of a camera and a light. We propose an optimized strategy to calibrate the light center using the least square method. An ellipse fitting method is used to precisely locate the center of ball and shadow on the captured image. After the triangulation of the ball position in the world coordinates, a tracking algorithm based on a Kalman filter outputs an accurate estimation of the flight states including the ball position and velocity. Furthermore, a neural network model is constructed and trained to predict the following flight path. Experimental results show that this scheme can achieve a good predicting precision and success rate of striking an incoming ball. The robot can achieve a success rate of about 80% to return a flight ball of 5 m/s to the opposite court.展开更多
In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostr m and Felbinger [Bostr m K, et al. Phys Rev L...In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostr m and Felbinger [Bostr m K, et al. Phys Rev Lett, 2002, 89: 187902]. But the protocol was proved very vulnerable, and can be attacked by an eavesdropper. An improved "Ping-pong" protocol is presented to overcome the problem. The GHZ state particles are used to detect eavesdroppers, and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol. During the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information which an eavesdropper can obtain and the interference introduced. If the eavesdropper gets the full information, the detection rate of the original "Ping-pong" protocol is 50%; the detection rate of the second protocol which used two particles of EPR pair as detection particles is also 50%; and the detection rate of the presented protocol is 75%. In the end, the security of the proposed protocol is discussed. The analysis results show that the improved "Ping-pong" protocol in this paper is more secure than the other two.展开更多
高速列车在越区切换过程中,由于路径损耗和地形等因素的影响,参考信号接收功率(reference signal receiving power,RSRP)会发生上下波动,采用基于A3事件的传统越区切换判决方法,会导致发生乒乓切换和切换成功率下降。文中提出基于改进灰...高速列车在越区切换过程中,由于路径损耗和地形等因素的影响,参考信号接收功率(reference signal receiving power,RSRP)会发生上下波动,采用基于A3事件的传统越区切换判决方法,会导致发生乒乓切换和切换成功率下降。文中提出基于改进灰色-马尔可夫模型的切换算法,改进灰色-马尔可夫模型对参考信号接收功率进行处理和预测,结合预承载方法,利用处理结果作为切换判决依据执行切换过程。仿真结果表明,采用改进切换算法,使列车接收到的源小区和目标小区RSRP值的波动情况得到明显改善,乒乓切换概率更低,切换成功率得以有效提高。展开更多
文摘Computational based cryptography might not guarantee long term security if computational algorithms, computers, and so on are made remarkable progress. Therefore, quantum cryptography with unconditionally security attracts attention. In this paper, we consider security of a two-way quantum key distribution protocol, so called Ping-Pong protocol. As a result, we introduce not only robustness but also a different information disturbance theorem, which denotes a trade-off relationship between information gain for an eavesdropper and error rate, from the related works for an attack model.
基金Project supported by the National Natural Science Foundation of China (Grant No 10604008) and the Beijing Education Committee (Grant No XK100270454).
基金Acknowledgements The project was supported by the Specialized Research Found for the Doctoral Program of Higher Education of China under Grant No. 20060013007 the National Natural Science Foundation of Beijing under Caant No. 4092029 and the National Natural Science Foundation of China under Grant No. 61100205, No. 60873001.
文摘In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eave sdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all information, the detection rate of the original "Ping-pong" protocol is 50%; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.
基金Supported by the National Natural Science Foundation of China (No.60202005).
文摘In mobile IPv6 networks, the ping-pong type of movement brings about frequent handovers and thus increases signaling burden. This letter proposes a fast seamless handover scheme where the access router keeps the mobile node's old reservation till the offline Count Down Timer (CDT) expires in order to reduce handover signaling and delay while the mobile node returns in a very short period of time. Based upon a pois son mobility model, an simple expression for CDT optimization is given out for the scheme to achieve the best cost performance of resource reservation.
文摘A kind of turbo joint detection scheme based on parallel interference cancellation (PIC) is studied; then, the eigenvalues of iteration matrix is deeply analyzed for studying the ping-pong effects in PIC JD and the corresponding compensation approach is introduced. Finally, the proposed algorithm is validated through computer simulation in TDD CDMA uplink transmission. The result shows that the ping-pong effects are almost avoided completely in the presence of the compensation scheme, and system performance is greatly improved.
基金Project supported by the National High-Tech Research and Development Program (863) of China (No. 2008AA042602)the Fundamental Research Funds for the Central Universities of China (No. KYJD09035)
文摘We describe a new tracking and predicting scheme applied to a lab-made ping pong robot. The robot has a monocular vision system comprised of a camera and a light. We propose an optimized strategy to calibrate the light center using the least square method. An ellipse fitting method is used to precisely locate the center of ball and shadow on the captured image. After the triangulation of the ball position in the world coordinates, a tracking algorithm based on a Kalman filter outputs an accurate estimation of the flight states including the ball position and velocity. Furthermore, a neural network model is constructed and trained to predict the following flight path. Experimental results show that this scheme can achieve a good predicting precision and success rate of striking an incoming ball. The robot can achieve a success rate of about 80% to return a flight ball of 5 m/s to the opposite court.
基金supported by the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20060013007)the Natural Science Foundation of Beijing (Grant No. 4092029)the National Natural Science Foundation of China (Grant No. 60873001)
文摘In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostr m and Felbinger [Bostr m K, et al. Phys Rev Lett, 2002, 89: 187902]. But the protocol was proved very vulnerable, and can be attacked by an eavesdropper. An improved "Ping-pong" protocol is presented to overcome the problem. The GHZ state particles are used to detect eavesdroppers, and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol. During the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information which an eavesdropper can obtain and the interference introduced. If the eavesdropper gets the full information, the detection rate of the original "Ping-pong" protocol is 50%; the detection rate of the second protocol which used two particles of EPR pair as detection particles is also 50%; and the detection rate of the presented protocol is 75%. In the end, the security of the proposed protocol is discussed. The analysis results show that the improved "Ping-pong" protocol in this paper is more secure than the other two.
文摘高速列车在越区切换过程中,由于路径损耗和地形等因素的影响,参考信号接收功率(reference signal receiving power,RSRP)会发生上下波动,采用基于A3事件的传统越区切换判决方法,会导致发生乒乓切换和切换成功率下降。文中提出基于改进灰色-马尔可夫模型的切换算法,改进灰色-马尔可夫模型对参考信号接收功率进行处理和预测,结合预承载方法,利用处理结果作为切换判决依据执行切换过程。仿真结果表明,采用改进切换算法,使列车接收到的源小区和目标小区RSRP值的波动情况得到明显改善,乒乓切换概率更低,切换成功率得以有效提高。