Identity-Based Provable Data Possession with Designated Verifier from Lattices for Cloud Computing [PDF]
Provable data possession (PDP) is a technique that enables the verification of data integrity in cloud storage without the need to download the data. PDP schemes are generally categorized into public and private verification.
Mengdi Zhao, Huiyan Chen
doaj +2 more sources
Towards quantum advantage via topological data analysis [PDF]
Even after decades of quantum computing development, examples of generally useful quantum algorithms with exponential speedups over classical counterparts are scarce.
Casper Gyurik, Chris Cade, Vedran Dunjko
doaj +1 more source
Quantum query complexity of symmetric oracle problems [PDF]
We study the query complexity of quantum learning problems in which the oracles form a group $G$ of unitary matrices. In the simplest case, one wishes to identify the oracle, and we find a description of the optimal success probability of a $t$-query ...
Daniel Copeland, Jamie Pommersheim
doaj +1 more source
Development of an improved method for forming pseudorandom numbers based on redunte M-ary codes
The development of information technologies in cyberspace is associated with the development of security services in the components of security: cybersecurity, information security and information security.
Р.В. Корольов +4 more
doaj +1 more source
Low-Resolution Precoding for Multi-Antenna Downlink Channels and OFDM
Downlink precoding is considered for multi-path multi-input single-output channels where the base station uses orthogonal frequency-division multiplexing and low-resolution signaling.
Andrei Stefan Nedelcu +2 more
doaj +1 more source
Tight bound for estimating expectation values from a system of linear equations
The system of linear equations problem (SLEP) is specified by a complex invertible matrix A, the condition number κ of A, a vector b, a Hermitian matrix M, and an accuracy ε, and the task is to estimate x^{†}Mx, where x is the solution vector to the ...
Abhijeet Alase +4 more
doaj +1 more source
Conceptual Review on Number Theoretic Transform and Comprehensive Review on Its Implementations
The Number Theoretic Transform (NTT) is a powerful mathematical tool that has become increasingly important in developing Post Quantum Cryptography (PQC) and Homomorphic Encryption (HE).
Ardianto Satriawan +5 more
doaj +1 more source
Multi-user multi-objective computation offloading for medical image diagnosis [PDF]
Computation offloading has effectively solved the problem of terminal devices computing resources limitation in hospitals by shifting the medical image diagnosis task to the edge servers for execution.
Qi Liu +4 more
doaj +2 more sources
Accelerated non-negative tensor completion via integer programming
The problem of tensor completion has applications in healthcare, computer vision, and other domains. However, past approaches to tensor completion have faced a tension in that they either have polynomial-time computation but require exponentially more ...
Wenhao Pan +3 more
doaj +1 more source
Detecting overlapping communities in complex networks using non-cooperative games
Detecting communities in complex networks is of paramount importance, and its wide range of real-life applications in various areas has caused a lot of attention to be paid to it, and many efforts have been made to have efficient and accurate algorithms ...
Farhad Ferdowsi +1 more
doaj +1 more source

