scispace - formally typeset
Search or ask a question

Showing papers by "Nanrun Zhou published in 2014"


Journal ArticleDOI
TL;DR: A new image compression–encryption hybrid algorithm is proposed to realize compression and encryption simultaneously, where the key is easily distributed, stored or memorized.
Abstract: The existing ways to encrypt images based on compressive sensing usually treat the whole measurement matrix as the key, which renders the key too large to distribute and memorize or store. To solve this problem, a new image compression–encryption hybrid algorithm is proposed to realize compression and encryption simultaneously, where the key is easily distributed, stored or memorized. The input image is divided into 4 blocks to compress and encrypt, then the pixels of the two adjacent blocks are exchanged randomly by random matrices. The measurement matrices in compressive sensing are constructed by utilizing the circulant matrices and controlling the original row vectors of the circulant matrices with logistic map. And the random matrices used in random pixel exchanging are bound with the measurement matrices. Simulation results verify the effectiveness, security of the proposed algorithm and the acceptable compression performance.

282 citations


Journal ArticleDOI
01 Sep 2014-Optik
TL;DR: A new hybrid image compression–encryption algorithm based on compressive sensing is proposed, which can accomplish image encryption and compression simultaneously and can resist various attacks.

104 citations


Journal ArticleDOI
TL;DR: The CVQDKD scheme shows that the scheme can securely and effectively transfer pre-determined keys under ideal conditions and can resist both the entanglement and beam splitter attacks under a relatively high channel transmission efficiency.
Abstract: The distribution of deterministic keys is of significance in personal communications, but the existing continuous variable quantum key distribution protocols can only generate random keys. By exploiting the entanglement properties of two-mode squeezed states, a continuous variable quantum deterministic key distribution (CVQDKD) scheme is presented for handing over the pre-determined key to the intended receiver. The security of the CVQDKD scheme is analyzed in detail from the perspective of information theory. It shows that the scheme can securely and effectively transfer pre-determined keys under ideal conditions. The proposed scheme can resist both the entanglement and beam splitter attacks under a relatively high channel transmission efficiency.

67 citations


Journal ArticleDOI
01 Aug 2014-Optik
TL;DR: An image encryption algorithm to secure three color images simultaneously by combining scrambling with the reality-preserving fractional discrete cosine transform (RPFrDCT) is proposed and the cipher image is a single color image instead of three color ones, and is convenient for display, storage and transmission due to the reality property of RPFrD CT.

25 citations


Journal ArticleDOI
TL;DR: It is shown that only three classical bits are required for the two proposed RSP schemes when Bob and Alice introduce an auxiliary particle, respectively, and the proposed schemes are secure after the quantum channel authentication.
Abstract: By exploiting the entanglement correlation in quantum mechanics, two three-party remote state preparation (RSP) schemes are proposed. One is three-party remote preparation of a single-particle quantum state, and the other is three-party remote preparation of a two-particle entangled state. In the proposed schemes, the sender Alice knows the quantum states to be prepared, while the receivers Bob and Charlie do not know the quantum states; Alice performs measurement and unitary operations on her own particles with two three-particle GHZ states as the quantum channel. According to Alice's measurement results, Bob and Charlie measure their own particles on the corresponding quantum measurement bases and perform unitary operations on the corresponding particles to reconstruct the quantum states, respectively. Compared with multiparty joint remote preparation and two-party RSP of a quantum state, the proposed schemes realize quantum multicast communication successfully, which enables Bob and Charlie to obtain the prepared quantum states simultaneously in the case of just knowing Alice's measurement results, while Bob and Charlie do not know each other's prepared quantum states. It is shown that only three classical bits are required for the two proposed RSP schemes when Bob and Alice introduce an auxiliary particle, respectively, and the proposed schemes are secure after the quantum channel authentication.

24 citations


Journal ArticleDOI
TL;DR: A secure quantum dialogue protocol based on single-photonss that not only overcomes information leakage but also possesses an acceptable efficiency is proposed.
Abstract: Combining the idea of ping-pong protocol with Controlled-NOT operation, we propose a secure quantum dialogue protocol based on single-photonss. Bob obtains the information of the encrypted quantum state by performing Controlled-NOT operation on the auxiliary particle and the encrypted single-photonss. Unlike the previous quantum dialogue protocols based on single-photonss, the proposed protocol not only overcomes information leakage but also possesses an acceptable efficiency.

24 citations


Journal ArticleDOI
TL;DR: Two cooperative communication protocols, two-way and one-way half-duplex relayings, are investigated and then compared in the amplify-and-forward (AF) mode, with a fair total power constraint no matter how unreliable the relay is proved to be a better choice under high SNR.
Abstract: Two cooperative communication protocols, two-way and one-way half-duplex relayings, are investigated and then compared in the amplify-and-forward (AF) mode. The relay is assumed to play the roles of eavesdropper and relay (i.e., an untrusted relay). With a fair power constraint at each node, the secrecy rate of the one-way relaying protocol is proved to be zero strictly. For the two-way relaying protocol, the signal-to-noise ratio (SNR) threshold is derived, above which the secrecy rate is non-zero. Defining a parameter, namely mistrust level, and non-zero secrecy rate can be achieved for the one-way relaying protocol in certain range of the mistrust level at high SNR. With a fair total power constraint, no matter how unreliable the relay is, the two-way AF half-duplex relaying protocol is proved to be a better choice under high SNR.

13 citations


Journal ArticleDOI
TL;DR: By utilizing the delocalized correlation of entangled states in quantum information theory, a novel method on acknowledgments of quantum information among three-party is presented, and then two threeparty quantum network communication protocols based on quantum teleportation are presented, namely, threeparty stop-wait quantum protocol and threeparty selective automatic repeat quantum communication protocol as mentioned in this paper.
Abstract: By utilizing the delocalized correlation of entangled states in quantum information theory, a novel method on acknowledgments of quantum information among three-party is presented, and then two three-party quantum network communication protocols based on quantum teleportation are presented, namely, three-party stop-wait quantum communication protocol and three-party selective automatic repeat quantum communication protocol. In the two proposed protocols, the data frames composed of qubits are teleported via three-party quantum teleportation, the two receivers simultaneously receive quantum frames from the sender, and then return quantum acknowledgment frames or quantum negative acknowledgment frames via quantum entanglement channels. The sender simultaneously receives and deals with quantum acknowledgment frames and quantum negative acknowledgment frames from the two receivers, thus the processing delay on returning quantum frames is reduced. And due to the transience of transferring quantum information, the returning of quantum acknowledgment frames and quantum negative acknowledgment frames are completed instantaneously, the proposed protocols reduce the transmission delay and improve the communication efficiency. During the whole course of communications, the classical channels are only used to transmit the measurement message, so the burdens of classical channels are reduced.

4 citations