Pub Date : 1900-01-01DOI: 10.32604/jqc.2021.016775
Hongmeng Ma, Yi Man, Xiao Xing, Zihan Zhuo, Mo Chen
{"title":"IOTA-Based Data Encryption Storage and Retrieval Method","authors":"Hongmeng Ma, Yi Man, Xiao Xing, Zihan Zhuo, Mo Chen","doi":"10.32604/jqc.2021.016775","DOIUrl":"https://doi.org/10.32604/jqc.2021.016775","url":null,"abstract":"","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"1118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130182625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.32604/jqc.2021.019675
Jerrel Gianni, Zhiguo Qu
In this paper, we propose a new protocol designed for quantum private comparison (QPC). This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party (TP) to achieve the objective. This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom (DOF), which could have 64 combinations. The TP can decide which combination to use based on the shared key information provided from a quantum key distribution (QKD) protocol. By doing so, the security of the protocol can be improved further. Decoy photon technology is also used as another means of security and checks if the transmission in the quantum channel is secure or not before sending the quantum carrier. The proposed protocol is proved to be able to fend off various kinds of eavesdropping attacks. In addition, the new QPC protocol also can compare secret inputs securely and efficiently.
{"title":"New Quantum Private Comparison Using Hyperentangled GHZ State","authors":"Jerrel Gianni, Zhiguo Qu","doi":"10.32604/jqc.2021.019675","DOIUrl":"https://doi.org/10.32604/jqc.2021.019675","url":null,"abstract":"In this paper, we propose a new protocol designed for quantum private comparison (QPC). This new protocol utilizes the hyperentanglement as the quantum resource and introduces a semi-honest third party (TP) to achieve the objective. This protocol’s quantum carrier is a hyperentangled three-photon GHZ state in 2 degrees of freedom (DOF), which could have 64 combinations. The TP can decide which combination to use based on the shared key information provided from a quantum key distribution (QKD) protocol. By doing so, the security of the protocol can be improved further. Decoy photon technology is also used as another means of security and checks if the transmission in the quantum channel is secure or not before sending the quantum carrier. The proposed protocol is proved to be able to fend off various kinds of eavesdropping attacks. In addition, the new QPC protocol also can compare secret inputs securely and efficiently.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131335418","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.32604/jqc.2022.034059
Arindam Banerjee, Aniruddha Ghosh, M. Das
{"title":"Design of a Novel Signed Binary Subtractor Using Quantum Gates","authors":"Arindam Banerjee, Aniruddha Ghosh, M. Das","doi":"10.32604/jqc.2022.034059","DOIUrl":"https://doi.org/10.32604/jqc.2022.034059","url":null,"abstract":"","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"92 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121598947","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.32604/jqc.2022.026975
Wen Zhang, Wei Fang, Xu Jia, Victor S. Sheng
{"title":"Research on Rainfall Estimation Based on Improved Kalman Filter Algorithm","authors":"Wen Zhang, Wei Fang, Xu Jia, Victor S. Sheng","doi":"10.32604/jqc.2022.026975","DOIUrl":"https://doi.org/10.32604/jqc.2022.026975","url":null,"abstract":"","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117146130","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.32604/jqc.2021.019864
Pratik Roy, Saptarshi Sahoo, Amit Kumar Mandal, Indranil Basu
Quantum Key Distribution seems very promising as it offers unconditional security, that’s why it is being implemented by the tech giants of the networking industry and government. Having quantum phenomenon as a backbone, QKD protocols become indecipherable. Here we have focused on the complexities of quantum key distribution and how this technology has contributed to secure key communication. This article gives an updated overview of this technology and can serve as a guide to get familiar with the current trends of quantum cryptography.
{"title":"Quantum Cryptography–A Theoretical Overview","authors":"Pratik Roy, Saptarshi Sahoo, Amit Kumar Mandal, Indranil Basu","doi":"10.32604/jqc.2021.019864","DOIUrl":"https://doi.org/10.32604/jqc.2021.019864","url":null,"abstract":"Quantum Key Distribution seems very promising as it offers unconditional security, that’s why it is being implemented by the tech giants of the networking industry and government. Having quantum phenomenon as a backbone, QKD protocols become indecipherable. Here we have focused on the complexities of quantum key distribution and how this technology has contributed to secure key communication. This article gives an updated overview of this technology and can serve as a guide to get familiar with the current trends of quantum cryptography.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"60 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"114994791","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
There are two difficult in the existing image restoration methods. One is that the method is difficult to repair the image with a large damaged, the other is the result of image completion is not good and the speed is slow. With the development and application of deep learning, the image repair algorithm based on generative adversarial networks can repair images by simulating the distribution of data. In the process of image completion, the first step is trained the generator to simulate data distribution and generate samples. Then a large number of falsified images are quickly generated using the generative adversarial network and search for the code of the closest damaged image. Finally, the generator generates missing content by using this code. On this basis, this paper combines the semantic loss function and the perceptual loss function. Experimental result show that the method successfully predicts the information of large areas missing in the image, and realizes the photorealism, producing clearer and more consistent results than previous methods.
{"title":"Incomplete Image Completion through GAN","authors":"Biying Deng, Desheng Zheng, Zhifeng Liu, Yanling Lai, Zhihong Zhang","doi":"10.32604/jqc.2021.017250","DOIUrl":"https://doi.org/10.32604/jqc.2021.017250","url":null,"abstract":"There are two difficult in the existing image restoration methods. One is that the method is difficult to repair the image with a large damaged, the other is the result of image completion is not good and the speed is slow. With the development and application of deep learning, the image repair algorithm based on generative adversarial networks can repair images by simulating the distribution of data. In the process of image completion, the first step is trained the generator to simulate data distribution and generate samples. Then a large number of falsified images are quickly generated using the generative adversarial network and search for the code of the closest damaged image. Finally, the generator generates missing content by using this code. On this basis, this paper combines the semantic loss function and the perceptual loss function. Experimental result show that the method successfully predicts the information of large areas missing in the image, and realizes the photorealism, producing clearer and more consistent results than previous methods.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"120949121","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yajie Sun, Yanqing Yuan, Qi Wang, S. Ji, Lihua Wang, Shaoen Wu, Jie Chen, Qin Zhang
{"title":"Impact Damage Identification for Composite Material Based on Transmissibility Function and OS-ELM Algorithm","authors":"Yajie Sun, Yanqing Yuan, Qi Wang, S. Ji, Lihua Wang, Shaoen Wu, Jie Chen, Qin Zhang","doi":"10.32604/jqc.2019.05788","DOIUrl":"https://doi.org/10.32604/jqc.2019.05788","url":null,"abstract":"","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124393009","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.32604/jqc.2021.025373
Taifeng Pan
The rapid development of Internet of Things (IoT) technology has brought great convenience to people’s life. However, the security protection capability of IoT is weak and vulnerable. Therefore, more protection needs to be done for the security of IoT. The paper proposes an intrusion detection method for IoT based on multi GBDT feature reduction and hierarchical traffic detection model. Firstly, GBDT is used to filter the features of IoT traffic data sets BoT-IoT and UNSW-NB15 to reduce the traffic feature dimension. At the same time, in order to improve the reliability of feature filtering, this paper constructs multiple GBDT models to filter the features of multiple sub data sets, and comprehensively evaluates the filtered features to find out the best alternative features. Then, two neural networks are trained with the two data sets after dimensionality reduction, and the traffic will be detected with the trained neural network. In order to improve the efficiency of traffic detection, this paper proposes a hierarchical traffic detection model, which can reduce the computational cost and time cost of detection process. Experiments show that the multi GBDT dimensionality reduction method can obtain better features than the traditional PCA dimensionality reduction method. Besides, the use of dual data sets improves the comprehensiveness of the IoT intrusion detection system, which can detect more types of attacks, and the hierarchical traffic model improves the detection efficiency of the system.
{"title":"Intrusion Detection Method of Internet of Things Based on Multi GBDT Feature Dimensionality Reduction and Hierarchical Traffic Detection","authors":"Taifeng Pan","doi":"10.32604/jqc.2021.025373","DOIUrl":"https://doi.org/10.32604/jqc.2021.025373","url":null,"abstract":"The rapid development of Internet of Things (IoT) technology has brought great convenience to people’s life. However, the security protection capability of IoT is weak and vulnerable. Therefore, more protection needs to be done for the security of IoT. The paper proposes an intrusion detection method for IoT based on multi GBDT feature reduction and hierarchical traffic detection model. Firstly, GBDT is used to filter the features of IoT traffic data sets BoT-IoT and UNSW-NB15 to reduce the traffic feature dimension. At the same time, in order to improve the reliability of feature filtering, this paper constructs multiple GBDT models to filter the features of multiple sub data sets, and comprehensively evaluates the filtered features to find out the best alternative features. Then, two neural networks are trained with the two data sets after dimensionality reduction, and the traffic will be detected with the trained neural network. In order to improve the efficiency of traffic detection, this paper proposes a hierarchical traffic detection model, which can reduce the computational cost and time cost of detection process. Experiments show that the multi GBDT dimensionality reduction method can obtain better features than the traditional PCA dimensionality reduction method. Besides, the use of dual data sets improves the comprehensiveness of the IoT intrusion detection system, which can detect more types of attacks, and the hierarchical traffic model improves the detection efficiency of the system.","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134195047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 1900-01-01DOI: 10.32604/jqc.2022.027560
Yuning Jia, Yu Gong, Yifei Wei
{"title":"Research on Service Function Chain Orchestrating Algorithm Based on SDN and NFV","authors":"Yuning Jia, Yu Gong, Yifei Wei","doi":"10.32604/jqc.2022.027560","DOIUrl":"https://doi.org/10.32604/jqc.2022.027560","url":null,"abstract":"","PeriodicalId":284655,"journal":{"name":"Journal of Quantum Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"1900-01-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129272729","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}