
Dong-Huan Jiang- Shandong University of Science and Technology
Dong-Huan Jiang
- Shandong University of Science and Technology
About
54
Publications
2,394
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
590
Citations
Current institution
Publications
Publications (54)
Quantum dialogue (QD) is a two-way quantum secure direct communication. Traditional QD protocols rely on transmitting photons through a quantum channel, which can introduce vulnerabilities. This paper presents a counterfactual controlled QD protocol based on entanglement swapping. By employing counterfactual quantum entanglement generation, the pro...
We propose a novel quantum voting protocol that utilizes superdense coding of four-particle entangled states. The protocol is simultaneously legitimate, anonymous, blind, verifiable and irreducible. In order to prevent malicious tampering of the public content, we introduce the distributed proof of work (PoW) consensus algorithm in blockchain as a...
The lottery business is a form of gambling activity operated by authority agencies. Due to the substantial economic interests, its security and fairness become the core elements of industry development. To maintain the trust of participants and ensure fair competition, blockchain technology has been widely applied in the lottery field due to the ch...
Oblivious transfer (OT) protocol is an essential building block for secure multiparty computation. The transmission of quantum messages is conductive in executing complex secure multiparty quantum computation tasks and even distributed quantum computation tasks. However, as an important form of OT protocol, existing all‐or‐nothing OT protocols only...
The structures of nonlocal sets of orthogonal product states are of great significance to understanding the essence of quantum nonlocality. Recently, Zhen et al. [Phys. Rev. A 106:062432, 2022] propose general constructions of nonlocal sets with smaller size in multipartite systems. In this paper, we first give a novel method to construct a nonloca...
This paper presents a quantum image secret sharing scheme based on designated multi‐verifier signature. First, k$k$ share images are generated by a 2D hyperchaotic system incorporating sinusoidal mapping, Henon mapping, and Cubic mapping using the cascade modulation method. Quantum Arnold scrambling and diffusion are performed on the secret image....
Quantum Private Queries (QPQ) is aimed to protect both user privacy and database security while executing database queries. In recent years, although many QPQ protocols based on Quantum Key Distribution (QKD) have been proposed, in most protocols, users’ measurement devices may suffer from detector-side-channel attacks initiated by dishonest databa...
This paper presents a quantum image encryption algorithm based on a novel 3D chaotic system and the quantum Rubik’s cube principle. Initially, we propose a new 3D chaotic system for generating chaotic key sequences and chaotic images. Subsequently, we introduce the quantum Rubik’s cube principle, which serves as a fundamental component of our encry...
Quantum network coding (QNC) aims at alleviating quantum communication congestion in quantum networks. Although several QNC protocols have been presented, they cannot meet the practical requirements that part of source nodes intend to transmit their quantum states with same or different qubit numbers via the bottleneck network simultaneously. Here,...
In this paper, a (t, n) threshold quantum image secret sharing scheme based on combination theory is proposed. Here, the threshold t is a constant number that should satisfy the condition t≤n\documentclass[12pt]{minimal} \usepackage{amsmath} \usepackage{wasysym} \usepackage{amsfonts} \usepackage{amssymb} \usepackage{amsbsy} \usepackage{mathrsfs} \u...
In the development of quantum image steganography, the visual effect of the image has always been the focus of scholars’ research. Based on the classical Gray code algorithm and the least significant bit (LSB) algorithm, a novel quantum image steganography algorithm is proposed in this paper. Firstly, the Arnold scrambling method is used to scrambl...
Considering the influence of collective-dephasing (C-D) noise and collective-rotation (C-R) noise, by utilizing controlled-NOT operation, controlled-Z operation and other unitary operations, we proposed the fault-tolerant quantum protocols to realize the quantum anonymous communication against C-D noise and C-R noise, respectively. Correctness anal...
An (r,n) threshold secret sharing scheme for quantum images based on the least significant bit (LSB) theory is proposed in this paper. First of all, we embed the quantum secret image into four different quantum carrier images by using LSB theory to form four embedded images, which has no visual difference from the original carrier images. Then, we...
Image self-recovery watermarking is to embed the main content of an image into the image itself, which provides the image with the ability to recover tampered information. In this paper, image self-recovery watermarking is introduced into quantum watermarking, and a novel tamper localization and self-recovery watermarking scheme for quantum images...
Many achievements have been made since quantum nonlocality without entanglement was found. A natural question is how many orthogonal product states (OPSs) are needed at least to form a nonlocal set in a given quantum system. In this paper, we achieve some interesting results about nonlocal sets with the less amount of OPSs. Firstly, we construct ne...
Quantum image steganography has attracted considerable attention in recent years. The majority of existing algorithms do not simultaneously have excellent imperceptibility, high embedding capacity, and good security. Therefore, a novel quantum color image steganography scheme is researched based on turtle shell and least significant bit (LSB) repla...
In this paper, we propose a two-party quantum private comparison (QPC) protocol using orthogonal product states. This protocol introduces a semi-honest third party who will faithfully execute the protocol and will not conspire with any of the participants. Every participant encodes the hash value of her (his) secret data into a quantum sequence of...
A novel index distribution protocol based on single-particle state is proposed in this paper. Compared with the existing index distribution scheme, this protocol is not limited by the dimension of the quantum system. Based on the proposed index distribution protocol, we also propose a new quantum anonymous ranking protocol. This protocol can comple...
In this paper, we present a quantum group signature (QGS) scheme based on orthogonal product states (OPSs) that cannot be perfectly distinguished by local operations and classical communication. Our scheme has all the properties of QGS, including unforgeability, undeniability, traceability, verifiability and anonymity. These properties can guarante...
BB84-state is the non-orthogonal single-photon state which has the advantage of easy implementation compared with the quantum multi-photon entanglement states. In this paper, based on BB84-state, by introducing a trusted third-party voting center, a quantum voting scheme is proposed. In this scheme, by performing corresponding unitary operation on...
Nonlocal sets of orthogonal product states (OPSs) are widely used in quantum protocols owing to their good property. In [Phys. Rev. A 101, 062329 (2020)], the authors constructed some unextendible product bases in \({\mathbb {C}}^{m} \otimes {\mathbb {C}}^{n}\) quantum system for \(n\ge m\ge 3\). We find that a subset of their unextendible product...
Based on the single-particle states, we propose a novel quantum voting protocol which can select multiple winners from candidates. In this protocol, the voting intentions of voters can be expressed through unitary operation, the voter’s ID information is contained in the ballot, and each ballot is encrypted. In addition, legitimate vote can neither...
Recently, much attention have been paid to the constructions of nonlocal multipartite orthogonal product states. Among the existing results, some are relatively complex in structure while others have many constraint conditions. In this paper, we first give a simple method to construct a nonlocal set of orthogonal product states in ⊗j=1nCd, where d,...
We propose a quantum voting scheme with Greenberger-Horne-Zeilinger (GHZ) states. In this scheme, quantum sequences that are formed by different particles of different GHZ states are sent to other participants respectively. Because of the correlation of different particles in a GHZ state, different participants perform a same measurement on each pa...
We propose an electronic payment (E-payment) protocol with a trusted third-party. Quantum key distribution protocol, single-particle unitary operation, one-time pad and orthogonal product states (OPSs) which are locally indistinguishable, are used to ensure the protocol’s security. In our protocol, the information that needs to be transmitted is en...
With further research, the theory of local discrimination of orthogonal product states (OPSs) becomes more and more perfect. In this paper, we present a quantum proxy signature (QPS) scheme based on a set of OPSs that cannot be exactly discriminated by local operations and classical communation (LOCC). Our scheme possesses all the properties of QPS...
Nonlocal sets of orthogonal product states (OPSs) are widely used in quantum protocols owing to their good property. Thus a lot of attention are paid to how to construct a nonlocal set of orthogonal product states though it is a difficult problem. In this paper, we propose a novel general method to construct a nonlocal set of orthogonal product sta...
Recently, much attention have been paid to the constructions of nonlocal multipartite orthogonal product states. Among the existing results, some are relatively complex in structure while others have many constraint conditions. In this paper, we firstly give a simple method to construct a nonlocal set of orthogonal product states in $\otimes_{j=1}^...
We propose a quantum voting scheme based on locally indistinguishable orthogonal product states. In this scheme, voting information is encoded as a sequence of orthogonal product states. Different particles of a same orthogonal product state are transmitted separately, which can ensure the security of the message since these orthogonal product stat...
In many cases, more than one person are needed to sign a message. In this paper, we propose a quantum multi-signature protocol based on orthogonal product states which cannot be perfectly distinguished by local operations and classical communication. In the protocol, the message is encoded as a quantum sequence of orthogonal product states. Differe...
Based on four-qubit cluster states, we present a new multi-party quantum key agreement (QKA) protocol. The proposed protocol makes full use of four-qubit cluster states as quantum resources and performs the X operation to generate a shared key. In addition, our multi-party QKA protocol ensures each participant to contribute equally to the final key...
The collective noises, which include the collective-dephasing noise and the collective-rotation noise, are the topical noises in quantum key agreement (QKA). How to eliminate the influence of the collective noises on quantum communication is a problem to be solved urgently. In this paper, based on logical quantum states, by using controlled-Z, cont...
Liu et al. [Quantum Inf. Process. 12, 1797–1805 (2013)] proposed a multi-party quantum key agreement (QKA) protocol based on single particles. Their protocol can resist outsider and participant attacks. However, its qubit efficiency is low. Min et al. [Int. J. Theor. Phys. 57, 1811–1822 (2018)] put forward a multi-party QKA protocol by using G-Like...
Digital signature plays an important role in cryptography. Many quantum digital signature (QDS) schemes have been proposed up to now since the security of classic digital signature (CDS) schemes becomes more and more vulnerable with the development of quantum computing algorithms. Most of the existing quantum signature schemes are based on probabil...
Based on locally indistinguishable orthogonal product states, we propose a novel multiparty quantum key agreement (QKA) protocol. In this protocol, the private key information of each party is encoded as some orthogonal product states that cannot be perfectly distinguished by local operations and classical communications. To ensure the security of...
In this paper, we propose a new variational model for image restoration by incorporating a nonlocal TV regularizer and a nonlocal Laplacian regularizer on the image. The two regularizing terms make use of nonlocal comparisons between pairs of patches in the image. The new model can be seen as a nonlocal version of the CEP- L2 model. Subsequently, a...
Active contour model (ACM) which has been extensively studied recently is one of the most successful methods in image segmentation. The present paper advances an improved hybrid model based on Region Scalable Fitting Model by combining global convex segmentation method with edge detector operator. The proposed model not only inherits the ability of...
To improve image resolution, a new model for image zooming with the split bregman method is presented in this paper. The zoomed image is found by minimizing the variational functional which use the Besov norm and TV norm to measure the regularity of the image. Subsequently, the split bregman algorithm for image zooming model is given and images are...
To obtain higher resolution images, a new model for image zooming based on total generalized variation is proposed. Original low-resolution image is regarded as sub-space projection of zoomed image to its own space, and the final zoomed image is obtained by application of second order total generalized variation regularization. By analyzing the pro...
A new algorithm for image zooming based on cartoon and texture decomposition is presented in this paper. The basic idea is to first decompose the image into cartoon and texture, and then zoom each part separately with different image zooming algorithms. Finally, the zoomed images will be synthesized into one image. The zoomed parts of the image are...
To improve the image resolution, a new algorithm for image zooming combining variation and wavelet transform is proposed. The zoomed image is found by minimizing the variational functional in the wavelet domain which uses the Besov norm to measure the regularity of the image. Because the high-frequency subband of the wavelet transform keeps most de...
An algorithm to decompose an image into two components u and v is constructed. The first component u belongs to B11(L1) and it contains geometric information while the second part v is in the dual space B∞-1 (L∞), which contains signals with oscillatory patterns of zero mean, such as texture and noise. The decomposition by minimizing a variational...
The relation of variational image decomposition and wavelet soft threshold was discovered recently by Daubechies and Teschke. A major issue is that thresholded coefficients entail oversmoothing of edges, coefficients set to zero yield Gibbs oscillations in the vicinity of edges, while coefficients remain corrupted generate artifacts. To overcome th...
According to the different diffusion demand of image in tangential and normal direction, the different diffusion parameter is set. In the tangential direction, the diffusion should be large enough to remove noise efficiently, so the diffusion parameter is 1. In the normal direction, the diffusion demand is different in the interior and edge of an i...
An anisotropic diffusion equation based on the morphological operator is proposed to make up for the defeat of the generalized PM diffusion not to preserve edge details. Its diffusion coefficient is dependent not only on the gradient of the image, but also on the second derivatives estimated on the image after being applied to the morphological clo...
This paper presents an equivalent formation via wavelet threshold of the diffusion equation defined by Lin-shi operator. Based on the equivalent formation, there are some revisions made for the diffusion coefficient by replacing the Gaussian filtered image with the translational-invariant nonlinear wavelet thresholded image when do estimation of al...