- Quantum Information and Cryptography
- Quantum Computing Algorithms and Architecture
- Quantum Mechanics and Applications
- Quantum optics and atomic interactions
- Chaos-based Image/Signal Encryption
- Quantum-Dot Cellular Automata
- Advanced Steganography and Watermarking Techniques
- Cryptography and Data Security
- ZnO doping and properties
- Gas Sensing Nanomaterials and Sensors
- Advanced Image and Video Retrieval Techniques
- Cloud Data Security Solutions
- Neural Networks and Reservoir Computing
- Privacy-Preserving Technologies in Data
- Nanowire Synthesis and Applications
- Quantum and electron transport phenomena
- Cryptographic Implementations and Security
- Cellular Automata and Applications
- Mechanical and Optical Resonators
- Sparse and Compressive Sensing Techniques
- Diamond and Carbon-based Materials Research
- Cloud Computing and Resource Management
- Transition Metal Oxide Nanomaterials
- Image Retrieval and Classification Techniques
- Ga2O3 and related materials
Beijing University of Technology
2016-2025
Shandong University of Science and Technology
2024
Beijing Computing Center
2022
Chinese Academy of Sciences
2007-2020
Institute of Information Engineering
2014-2020
State Key Laboratory of Cryptology
2019-2020
Kunming Medical University
2020
Chinese Academy of Medical Sciences & Peking Union Medical College
2018
Institute of Biophysics
2017
Sun Yat-sen University
2005-2014
Following some ideas of the quantum secret sharing (QSS) protocol (2008, Phys. Lett. A 372, 1957), we propose an efficient private comparison (QPC) for comparing information equality with help a third party (TP). The can ensure fairness, efficiency and security. is fair, which means that one knows sound result if only other result. TP calculating. However, cannot learn any about players' respective inputs even collude player. secure two players, is, their will not leak except final...
Quantum computation has achieved a tremendous success during the last decades. In this paper, we investigate potential application of famous quantum model, i.e., walks (QW) in image encryption. It is found that QW can serve as an excellent key generator thanks to its inherent nonlinear chaotic dynamic behavior. Furthermore, construct novel QW-based encryption algorithm. Simulations and performance comparisons show proposal secure enough for outperforms prior works. also opens door towards...
Abstract Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate capability of Hash function, which can be constructed by subtly modifying walks, famous model. It is found that function act as hash for privacy amplification process key distribution systems with higher security. As byproduct, also used pseudo-random number generation due to its inherent chaotic dynamics. Further discuss application image encryption propose...
Abstract Oblivious transfer (OT) protocol is an essential building block for secure multiparty computation. The transmission of quantum messages conductive in executing complex computation tasks and even distributed tasks. However, as important form OT protocol, existing all‐or‐nothing protocols only work the classical thus limiting application scenarios. To tackle this issue, a counterfactual proposed messages. Compared with messages, has three advantages: i) it achieved without any...
We propose a two-party quantum private comparison protocol using single photons, in which two distrustful parties can compare whether their secrets are equal with the help of third party (TP). Any information about values respective will not be leaked out even compromised TP. Security is also discussed.
Abstract Clinical and experimental evidence indicates that macrophages could promote solid-tumor progression metastasis. However, the mechanisms underlying this process remain unclear. Here we show yes-associated protein 1 (YAP1), a transcriptional regulator controls tissue growth regeneration, has an important role in tumor necrosis factor α (TNF α)-induced breast cancer migration. Mechanistically, macrophage conditioned medium (CM) or TNFα triggers IκB kinases (IKKs)-mediated YAP...
Abstract An efficient cryptography scheme is proposed based on continuous-variable quantum neural network (CV-QNN), in which a specified CV-QNN model introduced for designing the algorithm. It indicates an approach to design cryptosystem contains processes of key generation, encryption and decryption. Security analysis demonstrates that our security. Several simulation experiments are performed Strawberry Fields platform processing classical data “Quantum Cryptography” with describe...
Quantum Anonymous Private Information Retrieval (QAPIR) allows a user to retrieve an item from database anonymously thus achieving better privacy. Recently, Khan <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">et al</i> . proposed the first QAPIR protocol [IEEE Trans. Commun. 70(6), 4026-4037 (2022)] which is only known protocol. However, symbol coincidence error occurs when main ingredients are combined form this Furthermore, it requires...
Quantum network coding is expected to enable multiple quantum data packets be fused before the transmission via bottleneck channel in order improve efficiency and total throughput of networks. Although several schemes have been constructed, they are unable meet practical application requirements due fact that lack a complete security solution. To tackle this issue, secure scheme constructed. Compared with existing methods, proposed more most importantly it can provide against both...
A quasi-secure quantum dialogue protocol using single photons was proposed. Different from the previous entanglement-based protocols, present uses batches of which run back and forth between two parties. round for each photon makes parties obtain a classical bit information. So efficiency information transmission can be increased. The scheme is practical well within present-day technology.
Abstract In this paper, we investigate the potential application of quantum computation for constructing pseudo-random number generators (PRNGs) and further construct a novel PRNG based on random walks (QRWs), famous model. The merely relies equations used in QRWs thus generation algorithm is simple speed fast. proposed subjected to statistical tests such as NIST successfully passed test. Compared with representative chaotic maps (QCM), present QRWs-based has some advantages better...