Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zheng Shihui is active.

Publication


Featured researches published by Zheng Shihui.


Chinese Physics B | 2014

Joint remote preparation of an arbitrary five-qubit Brown state via non-maximally entangled channels

Chang Li-Wei; Zheng Shihui; Gu Li-ze; Xiao Da; Yang Yi-xian

We firstly present a novel scheme for deterministic joint remote state preparation of an arbitrary five-qubit Brown state using four Greenberg—Horme—Zeilinger (GHZ) entangled states as the quantum channel. The success probability of this scheme is up to 1, which is superior to the existing ones. Moreover, the scheme is extended to the generalized case where three-qubit and four-qubit non-maximally entangled states are taken as the quantum channel. We simultaneously employ two common methods to reconstruct the desired state. By comparing these two methods, we draw a conclusion that the first is superior to the second-optimal positive operator-valued measure only taking into account the number of auxiliary particles and the success probability.


The Journal of China Universities of Posts and Telecommunications | 2015

Trusted GPSR protocol without reputation faking in VANET

Xiao Ya; Zheng Shihui; Sun Bin

Abstract In vehicular ad hoc network (VANET), misbehaviors of internal nodes, such as discarding packets, may lead to a rapid decline in packet delivery ratio. To solve this problem, an improvement of greedy perimeter stateless routing (GPSR) protocol is presented. In the new protocol, trustworthiness is considered in the route selection process. The trustworthiness is measured by an objective trust model based on the subjective trust model DyTrust. And the reputation value which reflects the trustworthiness of each node is calculated and broadcasted by the intersection nodes. Specially, besides resisting the packet-discarding behavior of selfish nodes, this protocol also includes a location detection process to resist the location-faking behavior of malicious nodes. As a result, the selfish nodes and the malicious nodes can be excluded from the network. In addition, compared with improved GPSR protocol, the presented one is able to resist one kind of reputation-faking attack and has better performance in simulation.


Archive | 2013

Trust management system based trusted reconstructing method of OSPF routing protocol

Sun Bin; Gu Lize; Zheng Shihui; Yang Yu; Chen Bo; Guo Lingling; Li Daofeng; Niu Xin-xin


Archive | 2014

Vehicle-mounted network routing method and device

Zheng Shihui; Gu Lize; Yang Yu; Sun Bin; Xiao Da; Zhang Hao


International Journal of Advancements in Computing Technology | 2012

A Bilateral Secure Threshold Signature Scheme with Distinguished Signing Authorities

Gu Li-ze; Wang Feng; Zhou Yousheng; Zheng Shihui


Ruanjian Xuebao | 2016

実際のクラウド環境に向けたデータ証明型証明システム【JST・京大機械翻訳】

Xiao Da; Yang Luyin; Sun Bin; Zheng Shihui


Ruanjian Xuebao | 2016

Provable Data Possession System for Realistic Cloud Storage Environments

Xiao Da; Yang Luyin; Sun Bin; Zheng Shihui


Archive | 2015

Cloud platform speed measurement data judging method based on hierarchical clustering

Liu Xinran; Zhu Chunge; Wang Yong; Zhang Hong; Zhou Runlin; Sun Bin; Li Yan; Li Zhengmin; Huang Daochao; Shen Shijun; Zheng Shihui; Guo Shangzan


Archive | 2014

Cubic residue-based identity signature system

Wang Zhi-wei; Wang Licheng; Zheng Shihui; Yang Yi-xian; Zhang Zhihui


Archive | 2013

Double bounce restoration-based BGP (Border Gateway Protocol) modification method

Sun Bin; Gu Lize; Zheng Shihui; Yang Yu; Zhao Chen; Li Daofeng; Yang Yi-xian

Collaboration


Dive into the Zheng Shihui's collaboration.

Top Co-Authors

Avatar

Sun Bin

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Xiao Da

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yang Yi-xian

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Yang Yu

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Gu Li-ze

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Chang Li-Wei

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Chen Bo

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Niu Xin-xin

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge