Results 31 to 40 of about 1,107,668 (334)

Fault-tolerant quantum computation against biased noise [PDF]

open access: yes, 2008
We formulate a scheme for fault-tolerant quantum computation that works effectively against highly biased noise, where dephasing is far stronger than all other types of noise.
Aliferis, Panos, Preskill, John
core   +1 more source

Unidirectional Variable Threshold Proxy Re-signature Scheme with Provable Security [PDF]

open access: yesJisuanji gongcheng, 2016
In most existing threshold proxy re-signature schemes,threshold value is essentially immutable.However,depending on the significance of re-signature message,the value should be changed dynamically in many practical applications.Based on proxy re ...
XU Haifeng,HONG Xuan
doaj   +1 more source

All-optical differential current detection technique for unit protection applications [PDF]

open access: yes, 2013
In this paper we demonstrate a novel, all-optical differential current protection scheme. By monitoring the optical power reflected from two matched hybrid fiber Bragg grating current sensors and using a simple optoelectronic threshold detector, an ...
Fusiek, Grzegorz   +3 more
core   +1 more source

A Linear Algebraic Threshold Essential Secret Image Sharing Scheme

open access: yesMathematics, 2022
A secret sharing scheme allocates to each participant a share of a secret in such a way that authorized subsets of participants can reconstruct the secret, while shares of unauthorized subsets of participants provide no useful information about the ...
Mohammad Ghebleh   +2 more
doaj   +1 more source

Multilevel Threshold Secret and Function Sharing based on the Chinese Remainder Theorem [PDF]

open access: yes, 2016
A recent work of Harn and Fuyou presents the first multilevel (disjunctive) threshold secret sharing scheme based on the Chinese Remainder Theorem. In this work, we first show that the proposed method is not secure and also fails to work with a certain ...
Ersoy, Oguzhan   +4 more
core   +1 more source

Linear optical quantum computation with imperfect entangled photon-pair sources and inefficient non-photon-number-resolving detectors

open access: yes, 2010
We propose a scheme for efficient cluster state quantum computation by using imperfect polarization-entangled photon-pair sources, linear optical elements and inefficient non-photon-number-resolving detectors.
D. Bouwmeester   +6 more
core   +1 more source

Crosstalk between the ribosome quality control‐associated E3 ubiquitin ligases LTN1 and RNF10

open access: yesFEBS Letters, EarlyView.
Loss of the E3 ligase LTN1, the ubiquitin‐like modifier UFM1, or the deubiquitinating enzyme UFSP2 disrupts endoplasmic reticulum–ribosome quality control (ER‐RQC), a pathway that removes stalled ribosomes and faulty proteins. This disruption may trigger a compensatory response to ER‐RQC defects, including increased expression of the E3 ligase RNF10 ...
Yuxi Huang   +8 more
wiley   +1 more source

Threshold quantum cryptograph based on Grover's algorithm [PDF]

open access: yes, 2006
Grover's operator in the two-qubit case can transform a basis into its conjugated basis. A permutation operator can transform a state in the two conjugated bases into its orthogonal state.
Cai   +20 more
core   +2 more sources

Interplay between circadian and other transcription factors—Implications for cycling transcriptome reprogramming

open access: yesFEBS Letters, EarlyView.
This perspective highlights emerging insights into how the circadian transcription factor CLOCK:BMAL1 regulates chromatin architecture, cooperates with other transcription factors, and coordinates enhancer dynamics. We propose an updated framework for how circadian transcription factors operate within dynamic and multifactorial chromatin landscapes ...
Xinyu Y. Nie, Jerome S. Menet
wiley   +1 more source

(t, n) threshold secret sharing scheme without SDC

open access: yesTongxin xuebao, 2006
By means of the intractability of ellipse curve discrete logarithm problem(ECDLP),a(t,n) secret sharing threshold scheme based on ellipse curve cryptography was proposed.Generally speaking,there are two kinds of threshold schemes: a threshold scheme with
ZHOU Fu-cai   +3 more
doaj   +2 more sources

Home - About - Disclaimer - Privacy