68 resultados para Multiplicative linear secret sharing schemes
em University of Queensland eSpace - Australia
Resumo:
We extend our earlier work on ways in which defining sets of combinatorial designs can be used to create secret sharing schemes. We give an algorithm for classifying defining sets or designs according to their security properties and summarise the results of this algorithm for many small designs. Finally, we discuss briefly how defining sets can be applied to variations of the basic secret sharing scheme.
Resumo:
It is shown that in some cases it is possible to reconstruct a block design D uniquely from incomplete knowledge of a minimal defining set for D. This surprising result has implications for the use of minimal defining sets in secret sharing schemes.
Resumo:
Loss networks have long been used to model various types of telecommunication network, including circuit-switched networks. Such networks often use admission controls, such as trunk reservation, to optimize revenue or stabilize the behaviour of the network. Unfortunately, an exact analysis of such networks is not usually possible, and reduced-load approximations such as the Erlang Fixed Point (EFP) approximation have been widely used. The performance of these approximations is typically very good for networks without controls, under several regimes. There is evidence, however, that in networks with controls, these approximations will in general perform less well. We propose an extension to the EFP approximation that gives marked improvement for a simple ring-shaped network with trunk reservation. It is based on the idea of considering pairs of links together, thus making greater allowance for dependencies between neighbouring links than does the EFP approximation, which only considers links in isolation.
Resumo:
Quantum-state sharing is a protocol where perfect reconstruction of quantum states is achieved with incomplete or partial information in a multipartite quantum network. Quantum-state sharing allows for secure communication in a quantum network where partial information is lost or acquired by malicious parties. This protocol utilizes entanglement for the secret-state distribution and a class of quantum disentangling protocols for the state reconstruction. We demonstrate a quantum-state sharing protocol in which a tripartite entangled state is used to encode and distribute a secret state to three players. Any two of these players can collaborate to reconstruct the secret state, while individual players obtain no information. We investigate a number of quantum disentangling processes and experimentally demonstrate quantum-state reconstruction using two of these protocols. We experimentally measure a fidelity, averaged over all reconstruction permutations, of F=0.73 +/- 0.02. A result achievable only by using quantum resources.
Resumo:
In this paper, numerical simulations are used in an attempt to find optimal Source profiles for high frequency radiofrequency (RF) volume coils. Biologically loaded, shielded/unshielded circular and elliptical birdcage coils operating at 170 MHz, 300 MHz and 470 MHz are modelled using the FDTD method for both 2D and 3D cases. Taking advantage of the fact that some aspects of the electromagnetic system are linear, two approaches have been proposed for the determination of the drives for individual elements in the RF resonator. The first method is an iterative optimization technique with a kernel for the evaluation of RF fields inside an imaging plane of a human head model using pre-characterized sensitivity profiles of the individual rungs of a resonator; the second method is a regularization-based technique. In the second approach, a sensitivity matrix is explicitly constructed and a regularization procedure is employed to solve the ill-posed problem. Test simulations show that both methods can improve the B-1-field homogeneity in both focused and non-focused scenarios. While the regularization-based method is more efficient, the first optimization method is more flexible as it can take into account other issues such as controlling SAR or reshaping the resonator structures. It is hoped that these schemes and their extensions will be useful for the determination of multi-element RF drives in a variety of applications.
Resumo:
One of the most significant challenges facing the development of linear optics quantum computing (LOQC) is mode mismatch, whereby photon distinguishability is introduced within circuits, undermining quantum interference effects. We examine the effects of mode mismatch on the parity (or fusion) gate, the fundamental building block in several recent LOQC schemes. We derive simple error models for the effects of mode mismatch on its operation, and relate these error models to current fault-tolerant-threshold estimates.
Resumo:
Quantum computers promise to increase greatly the efficiency of solving problems such as factoring large integers, combinatorial optimization and quantum physics simulation. One of the greatest challenges now is to implement the basic quantum-computational elements in a physical system and to demonstrate that they can be reliably and scalably controlled. One of the earliest proposals for quantum computation is based on implementing a quantum bit with two optical modes containing one photon. The proposal is appealing because of the ease with which photon interference can be observed. Until now, it suffered from the requirement for non-linear couplings between optical modes containing few photons. Here we show that efficient quantum computation is possible using only beam splitters, phase shifters, single photon sources and photo-detectors. Our methods exploit feedback from photo-detectors and are robust against errors from photon loss and detector inefficiency. The basic elements are accessible to experimental investigation with current technology.
Resumo:
The effectiveness of overt tobacco advertising and sponsorship bans is well established. The industry has responded to these bans by implementing “buzz” or “viral” marketing techniques, such as nightclub and dance party promotions. This paper analyses possible tobacco industry content on the burgeoning consumer generated media website, YouTube. Tobacco control efforts need to embrace this new medium in order to counter pro-smoking messages and maximize media advocacy opportunities.
Resumo:
Four adducts of triphenylphosphine oxide with aromatic carboxylic acids have been synthesized and tested for second-order non-linear optical properties. These were with N-methylpyrrole-2-carboxylic acid (I), indole-2-carboxylic acid (2), 3-dimethylaminobenzoic acid (3), and thiophen-2-carboxylic acid (4). Compound (1) produced clear, colourless crystals (space group P2(1)2(1)2(1) With a 9.892(1), b 14.033(1), c 15.305(1) Angstrom, Z 4) which allowed the structure to be determined by X-ray diffraction.
Resumo:
The linearity of daily linear harvest index (HI) increase can provide a simple means to predict grain growth and yield in field crops. However, the stability of the rate of increase across genotypes and environments is uncertain. Data from three field experiments were collated to investigate the phase of linear HI increase of sunflower (Helianthus annuus L,) across environments by changing genotypes, sowing time, N level, and solar irradiation level. Linear increase in HI was similar among different genotypes, N levels, and radiation treatments (mean 0.0125 d(-1)). but significant differences occurred between sowings, The linear increase in HI was not stable at very low temperatures (down to 9 degrees C) during grain filling, due to possible limitations to biomass accumulation and translocation (mean 0.0091 d(-1)). Using the linear increase in HI to predict grain yield requires predictions of the duration from anthesis to the onset of linear HI increase (lag phase) and the cessation of linear RT increase. These studies showed that the lag phase differed, and the linear HI increase ceased when 91% of the anthesis to physiological maturity period had been completed.