Mingxing Luo

  • Citations Per Year
Learn More
1 Information Security Center, State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, P. O. Box 145, Beijing 100876, China 2Key Laboratory of Network and Information Attack and Defence Technology of MOE, Beijing University of Posts and Telecommunications, P. O. Box 145, Beijing 100876, China(More)
Motivated by some previous joint remote preparation schemes, we first propose some quantum circuits and photon circuits that two senders jointly prepare an arbitrary one-qubit state to a remote receiver via GHZ state. Then, by constructing KAK decomposition of some transformation in SO(4), one quantum circuit is constructed for jointly preparing an(More)
Our concern, in the paper, is to construct information-theoretic secure network coding in the presence of eavesdroppers. Based on the generalized attack model and all-or-nothing transformation, the security of network coding in the generalized combination network can be characterized by the network capacity and the min-cut bound of wiretapping set from the(More)
Supersymmetric models with extended group structure beyond the standard model are revisited in the framework of general gauge mediation. Sum rules for sfermion masses are shown to depend genuinely on the group structure, which can serve as important probes for specific models. The left-right model and models with extra U(1) are worked out for illustrations.(More)
In this paper, we present a practical algorithm to construct the convolutional multicast network coding over any finite directed cyclic network. The dual line graph of a directed cyclic graph is considered as a system. By regarding the global encoding kernels in the original graph as the corresponding inputs or outputs of some subsystem and the local(More)