With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware ...With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware and software system based on a two-factor authentication protocol,aiming to improve the security and reliability of authentication.This paper first analyzes the current status and technical principles of USB Key-related research domestically and internationally and designs a two-factor authentication protocol that combines impact/response authentication and static password authentication.The system consists of a host computer and a USB Key device.The host computer interacts with the USB Key through a graphical user interface.The Secure Hash Algorithm 1(SHA-1)and MySQL database are used to implement the authentication function.Experimental results show that the designed two-factor authentication protocol can effectively prevent replay attacks and information tampering,and improve the security of authentication.If the corresponding USB Key is not inserted,the system will prompt that the device is not found.Once the USB Key is inserted,user identity is confirmed through two-factor verification,which includes impact/response authentication and static password authentication.展开更多
The key technology of semi-continuous conveyor system decides the successful using of this system. The key technology includes optimal initial building depth of this system,the crusher moving step and the layout of co...The key technology of semi-continuous conveyor system decides the successful using of this system. The key technology includes optimal initial building depth of this system,the crusher moving step and the layout of conveyor system are studied, and their calculating models are built up.展开更多
A low-power environmental monitoring system based on WSN technology is proposed to effectively monitor the environmental status and ensure the healthy growth of greenhouse crops in the greenhouse. The system performs ...A low-power environmental monitoring system based on WSN technology is proposed to effectively monitor the environmental status and ensure the healthy growth of greenhouse crops in the greenhouse. The system performs dynamic mon- itoring on the environmental data of temperature, humidity, illumination, soil tempera- ture and humidity of the greenhouse, and it reduces the energy consumption by us- ing solar energy and lithium battery as the power supply mode and dynamic power management algorithm combined with improved routing protocol. Stable and reliable, the system could effectively monitor the key environmental factors in the green- house, making it of certain promotion value.展开更多
1 Introduction Traditional industrial systems,where physical systems,i.e.,robots and machines,replaced manual labor mostly,are often known as human-physical system(HPS)[1].Cyber system,a major outcome of the digitaliz...1 Introduction Traditional industrial systems,where physical systems,i.e.,robots and machines,replaced manual labor mostly,are often known as human-physical system(HPS)[1].Cyber system,a major outcome of the digitalization revolution,is increasingly adopted in HPS and continuously evolving with the development of advanced manufacturing technologies,leading to the human-cyber-physical system(HCPS)[2].展开更多
A novel secret key generation(SKG)method based on two-way randomness is proposed for TDD-SISO system.The legitimate transceivers mutually transmit their own random signal via reciprocal wireless channel,then the multi...A novel secret key generation(SKG)method based on two-way randomness is proposed for TDD-SISO system.The legitimate transceivers mutually transmit their own random signal via reciprocal wireless channel,then the multiplication of transmitted and received signal is used as common randomness to generate secret keys.In quasi-static channel,the theoretical SKG rates(SKGRs)of the three SKG methods,namely wireless channel based,one-way randomness and two-way randomness,are derived and compared.Further,two practical SKG schemes based on twoway randomness,Scheme-1bit and Scheme-3bit,are completely designed and simulated.Generally,Scheme-1bit applies to low signal to noise ratio(SNR)scenarios and achieves 0.13~0.86bit/T_s SKGR and 10^(-2)~10^(-5) level secret key outage probability(SKOP),while Scheme-3bit fits high SNR situation and obtains 0.93~1.35bit/T_s SKGR and 10^(-3)~10^(-4) level SKOP.At last,the national institute of standards and technology(NIST)test is conducted to evaluate the secret key randomness(SKRD)and the test results show that both of the proposed schemes have passed the test.展开更多
A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical i...A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical information can be encoded on one four-state particle and the transmitted particles can be fully used.展开更多
Development of the medium and low voltage DC distribution system is of great significance to a regional transmission of electric energy,increasing a penetration rate of new energy,and enhancing a safety of the operati...Development of the medium and low voltage DC distribution system is of great significance to a regional transmission of electric energy,increasing a penetration rate of new energy,and enhancing a safety of the operation of the AC/DC interconnected grid.This paper first summarizes the medium and low voltage DC distribution system schemes and plans put forward by many countries,and then elaborate status of under-construction medium and low voltage DC distribution system project cases in China.Based on these project cases,this paper analyzes key issues involved in the medium and low voltage DC distribution system topologies,equipment,operation control technologies and DC fault protections,in order to provide theoretical and technical reference for future medium and low voltage DC distribution system-related projects.Finally,this paper combines a current China research status to summarize and give a prediction about the future research direction of medium and low voltage DC distribution system,which can provide reference for the research of medium and low voltage DC distribution system.展开更多
Casting blast can greatly reduce the stripping cost and improve the production capacity of opencast coal mines. Key technologies including high bench blasting, inclined hole, millisecond blasting, pre-splitting blasti...Casting blast can greatly reduce the stripping cost and improve the production capacity of opencast coal mines. Key technologies including high bench blasting, inclined hole, millisecond blasting, pre-splitting blasting and casting blast parameters determination which have influence on the effect of casting blast have been researched with the combination of the ballistic theory and experience in mines. The integrated digital processing system of casting blast was developed in order to simplify the design process of casting blast, improve working efficiency and veracity of design result and comprehensively adopt the software programming method and the theory of casting blast. This system has achieved five functions, namely, the 3D visualization graphics management, the intelligent management of geological information, the intelligent design of casting blast, the analysis and prediction of the blasting effect and the automatic output of the design results. Long-term application in opencast coal mines has shown that research results can not only reduce the specific explosive consumption and improve the blasting effect, but also have high value of popularization and application.展开更多
Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highl...Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highly depends on the security level of vehicular communication systems (VCS). Security applications in VCS are fulfilled through secured group broadcast. Therefore, secure key management schemes are considered as a critical research topic for network security. In this paper, we propose a framework for providing secure key management within heterogeneous network. The seeurity managers (SMs) play a key role in the framework by retrieving the vehicle departnre infi^rmation, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel Group Key Management (GKM) scheme basing on leaving probability (LP) of vehicles to depart current VCS region. Vehicle's LP factor is introduced into GKM scheme to achieve a more effieient rekeying scheme and less rekeying costs. The second component of the framework using the blockchain concept to simplify the distributed key management in heterogeneous VCS domains. Extensive simulations and analysis are provided to show the effectiveness and effieiency of the proposed framework: Our GKM results demonstrate that probability-based BR reduees rekeying eost compared to the benchmark scheme, while the blockchain deereases the time eost of key transmission over heterogeneous net-works.展开更多
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat...This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow).展开更多
In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating ...In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating coherent pulses must be locked. In this paper, an autobias control system based on a lock-in-amplifier for the EOM is introduced. Its drift information extracting theory and control method are analyzed comprehensively. The long term drift of the extinction ratio of the coherent pulses is measured by a single photon detector, which indicates that the autobias control system is effective for stabilizing the bias point of the EOM.展开更多
Reference-frame-independent measurement-device-independent QKD(RFI-MDI-QKD), immune to both the slow unknown drift of reference frames and detector side channel attacks, can generate information-theoretic secure keys....Reference-frame-independent measurement-device-independent QKD(RFI-MDI-QKD), immune to both the slow unknown drift of reference frames and detector side channel attacks, can generate information-theoretic secure keys. Despite its natural resistance to the slow drift of reference frames, the performance of practical RFI-MDI-QKD systems descends with the increasing drift of reference frames. In this paper, we demonstrate the worst relative rotation of reference frames for practical RFI-MDI-QKD systems, and investigate their performance against the worst-case scenario,both of which are unclear to date. Simulation results show that, practical RFI-MDI-QKD systems can achieve quite good performance even against the worst-case scenario, which clearly demonstrates that it is possible to implement practical MDI-QKD systems with freely drifting reference frames.展开更多
In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by...In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate(QBER) introduced by Eve, by which Eve can acquire information without the countermeasure.展开更多
In today’s fourth industrial revolution,various blockchain technologies are being actively researched.A blockchain is a peer-to-peer data-sharing structure lacking central control.If a user wishes to access stored da...In today’s fourth industrial revolution,various blockchain technologies are being actively researched.A blockchain is a peer-to-peer data-sharing structure lacking central control.If a user wishes to access stored data,she/he must employ a private key to prove ownership of the data and create a transaction.If the private key is lost,blockchain data cannot be accessed.To solve such a problem,public blockchain users can recover the key using a wallet program.However,key recovery in a permissioned blockchain(PBC)has been but little studied.The PBC server is Honest-but-Curious(HBC),and should not be able to learn anything of the user;the server should simply recover and store the key.The server must also be resistant to malicious attacks.Therefore,key recovery in a PBC must satisfy various security requirements.Here,we present a password-protected secret sharing(PPSS)key recovery system,protected by a secure password from a malicious key storage server of a PBC.We describe existing key recovery schemes and our PPSS scheme.展开更多
An integrated monitoring system for running parameters of key mining equipmenton the basis of condition monitoring technology and modern communication networktechnology was developed.The system consists of a client co...An integrated monitoring system for running parameters of key mining equipmenton the basis of condition monitoring technology and modern communication networktechnology was developed.The system consists of a client computer with functions ofsignal acquisition and processing, and a host computer in the central control room.Thesignal acquisition module of the client computer can collect the running parameters fromvarious monitoring terminals in real-time.The DSP high-speed data processing system ofthe main control module can quickly achieve the numerical calculation for the collectedsignal.The signal modulation and signal demodulation are completed by the frequencyshift keying circuit and phase-locked loop frequency circuit, respectively.Finally, the signalis sent to the host computer for logic estimation and diagnostic analysis using the networkcommunication technology, which is helpful for technicians and managers to control therunning state of equipment.展开更多
The microwave photonic technology-based Ultra-Wideband (UWB) Radio over Fiber (RoF) system is an important solution to the future low-cost and high-performance ultra-wideband wireless access network.Much research work...The microwave photonic technology-based Ultra-Wideband (UWB) Radio over Fiber (RoF) system is an important solution to the future low-cost and high-performance ultra-wideband wireless access network.Much research work has been done in this field with abundant results.This article introduces the RoF system that is based on the all-optical vector modulation technology to further enhance signal’s spectrum efficiency;the full-duplex RoF system that is based on the millimeter wave Phase-Shift Keying (PSK) modulation to greatly simplify base station structure and fiber layout;and the RoF system that is based on multi-service mixed transmission to carry the service with both wired signal and several wireless signals.The article also presents an RoF-based high-definition video transmission platform.展开更多
Aiming at the characteristics of multi-stage and(extremely)small samples of the identification problem of key effectiveness indexes of weapon equipment system-of-systems(WESoS),a Bayesian intelligent identification an...Aiming at the characteristics of multi-stage and(extremely)small samples of the identification problem of key effectiveness indexes of weapon equipment system-of-systems(WESoS),a Bayesian intelligent identification and inference model for system effectiveness assessment indexes based on dynamic grey incidence is proposed.The method uses multi-layer Bayesian techniques,makes full use of historical statistics and empirical information,and determines the Bayesian estima-tion of the incidence degree of indexes,which effectively solves the difficulties of small sample size of effectiveness indexes and difficulty in obtaining incidence rules between indexes.Sec-ondly,The method quantifies the incidence relationship between evaluation indexes and combat effectiveness based on Bayesian posterior grey incidence,and then identifies key system effec-tiveness evaluation indexes.Finally,the proposed method is applied to a case of screening key effectiveness indexes of a missile defensive system,and the analysis results show that the proposed method can fuse multi-moment information and extract multi-stage key indexes,and has good data extraction capability in the case of small samples.展开更多
The idempotent semirings Rmax and Rmin play a crucial role in several areas of mathematics and their applications such as discrete mathematics, algebraic geometry, computer science, computer languages, linguistic prob...The idempotent semirings Rmax and Rmin play a crucial role in several areas of mathematics and their applications such as discrete mathematics, algebraic geometry, computer science, computer languages, linguistic problems, optimization theory, discrete event systems, fuzzy logics. In this paper we consider the expansion of the semirings Rmax and Rmin with residuals and describe how to use these expended semirings in public key cryptography.展开更多
Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in ...Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in quantum computing technology,the security of conventional key-based SSL/TLS protocols faces vulnerabilities.In this paper,we propose a scheme by integrating the quantum key into the SSL/TLS framework.Furthermore,the application of post-quantum algorithms is used to enhance and complement the existing encryption suites.Experimental results show that the proposed SSL/TLS communication system based on quantum keys exhibits high performance in latency and throughput.Moreover,the proposed system showcases good resilience against quantum attacks.展开更多
基金funded by the College-level Characteristic Teaching Material Project(Project No.20220119Z0221)The College Teaching Incubation Project(Project No.20220120Z0220)+3 种基金The Ministry of Education Industry-University Cooperation Collaborative Education Project(Project No.20220163H0211)The Central Universities Basic Scientific Research Fund(Project No.3282024009,20230051Z0114,and 20230050Z0114)The Beijing Higher Education“Undergraduate Teaching Reform and Innovation Project”(Project No.20220121Z0208 and 202110018002)The College Discipline Construction Project(Project No.20230007Z0452 and 20230010Z0452)。
文摘With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware and software system based on a two-factor authentication protocol,aiming to improve the security and reliability of authentication.This paper first analyzes the current status and technical principles of USB Key-related research domestically and internationally and designs a two-factor authentication protocol that combines impact/response authentication and static password authentication.The system consists of a host computer and a USB Key device.The host computer interacts with the USB Key through a graphical user interface.The Secure Hash Algorithm 1(SHA-1)and MySQL database are used to implement the authentication function.Experimental results show that the designed two-factor authentication protocol can effectively prevent replay attacks and information tampering,and improve the security of authentication.If the corresponding USB Key is not inserted,the system will prompt that the device is not found.Once the USB Key is inserted,user identity is confirmed through two-factor verification,which includes impact/response authentication and static password authentication.
文摘The key technology of semi-continuous conveyor system decides the successful using of this system. The key technology includes optimal initial building depth of this system,the crusher moving step and the layout of conveyor system are studied, and their calculating models are built up.
基金Supported by the Fund for Independent Innovation of Agricultural Sciences in Jiangsu Province(CX(14)2108&CX(13)5066)~~
文摘A low-power environmental monitoring system based on WSN technology is proposed to effectively monitor the environmental status and ensure the healthy growth of greenhouse crops in the greenhouse. The system performs dynamic mon- itoring on the environmental data of temperature, humidity, illumination, soil tempera- ture and humidity of the greenhouse, and it reduces the energy consumption by us- ing solar energy and lithium battery as the power supply mode and dynamic power management algorithm combined with improved routing protocol. Stable and reliable, the system could effectively monitor the key environmental factors in the green- house, making it of certain promotion value.
基金Supported by National Natural Science Foundation of China(Grant Nos.51975513,51890884)Zhejiang Provincial Natural Science Foundation of China(Grant No.LR20E050003)Major Research Plan of Ningbo Innovation 2025(Grant No.2020Z022)。
文摘1 Introduction Traditional industrial systems,where physical systems,i.e.,robots and machines,replaced manual labor mostly,are often known as human-physical system(HPS)[1].Cyber system,a major outcome of the digitalization revolution,is increasingly adopted in HPS and continuously evolving with the development of advanced manufacturing technologies,leading to the human-cyber-physical system(HCPS)[2].
基金supported by National Natural Science Foundation of China(61521003,61501516,61471396,61401510)Postdoctoral Science Foundation of China(2016M592990)
文摘A novel secret key generation(SKG)method based on two-way randomness is proposed for TDD-SISO system.The legitimate transceivers mutually transmit their own random signal via reciprocal wireless channel,then the multiplication of transmitted and received signal is used as common randomness to generate secret keys.In quasi-static channel,the theoretical SKG rates(SKGRs)of the three SKG methods,namely wireless channel based,one-way randomness and two-way randomness,are derived and compared.Further,two practical SKG schemes based on twoway randomness,Scheme-1bit and Scheme-3bit,are completely designed and simulated.Generally,Scheme-1bit applies to low signal to noise ratio(SNR)scenarios and achieves 0.13~0.86bit/T_s SKGR and 10^(-2)~10^(-5) level secret key outage probability(SKOP),while Scheme-3bit fits high SNR situation and obtains 0.93~1.35bit/T_s SKGR and 10^(-3)~10^(-4) level SKOP.At last,the national institute of standards and technology(NIST)test is conducted to evaluate the secret key randomness(SKRD)and the test results show that both of the proposed schemes have passed the test.
基金The project supported by the National Fundamental Research Program under Grant No. 2006CB0L0106, National Natural Science Foundation of China under Grant Nos. 60433050, 10325521, and 10447106, and the SRFDP Program of Education Ministry of China and Beijing Education Committee under Grant No. XK100270454
文摘A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical information can be encoded on one four-state particle and the transmitted particles can be fully used.
基金supported by the National Key Rese arch and Development Program of China(2018YFB0904100)Science and Technology Project of State Grid(SGHB0000KXJS1800685)
文摘Development of the medium and low voltage DC distribution system is of great significance to a regional transmission of electric energy,increasing a penetration rate of new energy,and enhancing a safety of the operation of the AC/DC interconnected grid.This paper first summarizes the medium and low voltage DC distribution system schemes and plans put forward by many countries,and then elaborate status of under-construction medium and low voltage DC distribution system project cases in China.Based on these project cases,this paper analyzes key issues involved in the medium and low voltage DC distribution system topologies,equipment,operation control technologies and DC fault protections,in order to provide theoretical and technical reference for future medium and low voltage DC distribution system-related projects.Finally,this paper combines a current China research status to summarize and give a prediction about the future research direction of medium and low voltage DC distribution system,which can provide reference for the research of medium and low voltage DC distribution system.
基金Project supported by the Fundamental Research Funds for the Central Universities,China
文摘Casting blast can greatly reduce the stripping cost and improve the production capacity of opencast coal mines. Key technologies including high bench blasting, inclined hole, millisecond blasting, pre-splitting blasting and casting blast parameters determination which have influence on the effect of casting blast have been researched with the combination of the ballistic theory and experience in mines. The integrated digital processing system of casting blast was developed in order to simplify the design process of casting blast, improve working efficiency and veracity of design result and comprehensively adopt the software programming method and the theory of casting blast. This system has achieved five functions, namely, the 3D visualization graphics management, the intelligent management of geological information, the intelligent design of casting blast, the analysis and prediction of the blasting effect and the automatic output of the design results. Long-term application in opencast coal mines has shown that research results can not only reduce the specific explosive consumption and improve the blasting effect, but also have high value of popularization and application.
文摘Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highly depends on the security level of vehicular communication systems (VCS). Security applications in VCS are fulfilled through secured group broadcast. Therefore, secure key management schemes are considered as a critical research topic for network security. In this paper, we propose a framework for providing secure key management within heterogeneous network. The seeurity managers (SMs) play a key role in the framework by retrieving the vehicle departnre infi^rmation, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel Group Key Management (GKM) scheme basing on leaving probability (LP) of vehicles to depart current VCS region. Vehicle's LP factor is introduced into GKM scheme to achieve a more effieient rekeying scheme and less rekeying costs. The second component of the framework using the blockchain concept to simplify the distributed key management in heterogeneous VCS domains. Extensive simulations and analysis are provided to show the effectiveness and effieiency of the proposed framework: Our GKM results demonstrate that probability-based BR reduees rekeying eost compared to the benchmark scheme, while the blockchain deereases the time eost of key transmission over heterogeneous net-works.
文摘This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow).
基金Project supported by the National Natural Science Foundation of China(Grant No.61108039)the Major Research Plan of the National Natural Science Foundation of China(Grant No.91121023)the Scientific Research Foundation of Graduate School of South China Normal University(Grant No.2012kyjj224)
文摘In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating coherent pulses must be locked. In this paper, an autobias control system based on a lock-in-amplifier for the EOM is introduced. Its drift information extracting theory and control method are analyzed comprehensively. The long term drift of the extinction ratio of the coherent pulses is measured by a single photon detector, which indicates that the autobias control system is effective for stabilizing the bias point of the EOM.
基金Supported by the National Key Research and Development Program of China under Grant Nos.2018YFA0306400 and 2017YFA0304100the National Natural Science Foundation of China under Grant Nos.61475197,61590932,11774180,and 61705110+3 种基金the Natural Science Foundation of the Jiangsu Higher Education Institutions under Grant Nos.15KJA120002 and 17KJB140016the Natural Science Foundation of Jiangsu Province under Grant No.BK20170902the Outstanding Youth Project of Jiangsu under Grant No.BK20150039the Postgraduate Research&Practice Innovation Program of Jiangsu Province under Grant No.KYCX18 0906
文摘Reference-frame-independent measurement-device-independent QKD(RFI-MDI-QKD), immune to both the slow unknown drift of reference frames and detector side channel attacks, can generate information-theoretic secure keys. Despite its natural resistance to the slow drift of reference frames, the performance of practical RFI-MDI-QKD systems descends with the increasing drift of reference frames. In this paper, we demonstrate the worst relative rotation of reference frames for practical RFI-MDI-QKD systems, and investigate their performance against the worst-case scenario,both of which are unclear to date. Simulation results show that, practical RFI-MDI-QKD systems can achieve quite good performance even against the worst-case scenario, which clearly demonstrates that it is possible to implement practical MDI-QKD systems with freely drifting reference frames.
基金Project supported by the National Basic Research Program of China(Grant Nos.2011CBA00200 and 2011CB921200)the National Natural Science Foundation of China(Grant Nos.61475148,61201239,61205118,and 11304397)the China Postdoctoral Science Foundation(Grant No.2013M540514)
文摘In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate(QBER) introduced by Eve, by which Eve can acquire information without the countermeasure.
基金This research was supported by the MSIT(Ministry of Science and ICT),Korea,under the ITRC(Information Technology Research Center)support program(IITP-2020-2015-0-00403)supervised by the IITP(Institute for Information&communications Technology Planning&Evaluation)This research was supported by the Soonchunhyang University Research Fund.
文摘In today’s fourth industrial revolution,various blockchain technologies are being actively researched.A blockchain is a peer-to-peer data-sharing structure lacking central control.If a user wishes to access stored data,she/he must employ a private key to prove ownership of the data and create a transaction.If the private key is lost,blockchain data cannot be accessed.To solve such a problem,public blockchain users can recover the key using a wallet program.However,key recovery in a permissioned blockchain(PBC)has been but little studied.The PBC server is Honest-but-Curious(HBC),and should not be able to learn anything of the user;the server should simply recover and store the key.The server must also be resistant to malicious attacks.Therefore,key recovery in a PBC must satisfy various security requirements.Here,we present a password-protected secret sharing(PPSS)key recovery system,protected by a secure password from a malicious key storage server of a PBC.We describe existing key recovery schemes and our PPSS scheme.
基金Supported by the National Hi-tech Research and Development Program of China(2007AA04Z415)the Hunan Province and Xiangtan City Natural Science Joint Foundation(09JJ8005)the Torch Program Project of Hunan Province(2008SH044)
文摘An integrated monitoring system for running parameters of key mining equipmenton the basis of condition monitoring technology and modern communication networktechnology was developed.The system consists of a client computer with functions ofsignal acquisition and processing, and a host computer in the central control room.Thesignal acquisition module of the client computer can collect the running parameters fromvarious monitoring terminals in real-time.The DSP high-speed data processing system ofthe main control module can quickly achieve the numerical calculation for the collectedsignal.The signal modulation and signal demodulation are completed by the frequencyshift keying circuit and phase-locked loop frequency circuit, respectively.Finally, the signalis sent to the host computer for logic estimation and diagnostic analysis using the networkcommunication technology, which is helpful for technicians and managers to control therunning state of equipment.
基金supported by the National High Technology Research and Development Program("863" Program)under Grant No.2007AA01Z264 and 2006AA01Z256the National Natural Science Foundation under Grant No.60736002 and 60702006
文摘The microwave photonic technology-based Ultra-Wideband (UWB) Radio over Fiber (RoF) system is an important solution to the future low-cost and high-performance ultra-wideband wireless access network.Much research work has been done in this field with abundant results.This article introduces the RoF system that is based on the all-optical vector modulation technology to further enhance signal’s spectrum efficiency;the full-duplex RoF system that is based on the millimeter wave Phase-Shift Keying (PSK) modulation to greatly simplify base station structure and fiber layout;and the RoF system that is based on multi-service mixed transmission to carry the service with both wired signal and several wireless signals.The article also presents an RoF-based high-definition video transmission platform.
基金supported by the National Natural Science Foundation of China(72271124,72071111).
文摘Aiming at the characteristics of multi-stage and(extremely)small samples of the identification problem of key effectiveness indexes of weapon equipment system-of-systems(WESoS),a Bayesian intelligent identification and inference model for system effectiveness assessment indexes based on dynamic grey incidence is proposed.The method uses multi-layer Bayesian techniques,makes full use of historical statistics and empirical information,and determines the Bayesian estima-tion of the incidence degree of indexes,which effectively solves the difficulties of small sample size of effectiveness indexes and difficulty in obtaining incidence rules between indexes.Sec-ondly,The method quantifies the incidence relationship between evaluation indexes and combat effectiveness based on Bayesian posterior grey incidence,and then identifies key system effec-tiveness evaluation indexes.Finally,the proposed method is applied to a case of screening key effectiveness indexes of a missile defensive system,and the analysis results show that the proposed method can fuse multi-moment information and extract multi-stage key indexes,and has good data extraction capability in the case of small samples.
文摘The idempotent semirings Rmax and Rmin play a crucial role in several areas of mathematics and their applications such as discrete mathematics, algebraic geometry, computer science, computer languages, linguistic problems, optimization theory, discrete event systems, fuzzy logics. In this paper we consider the expansion of the semirings Rmax and Rmin with residuals and describe how to use these expended semirings in public key cryptography.
基金supported by ZTE IndustryUniversityInstitute Cooperation Funds under Grant No.HCCN20221029003.
文摘Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in quantum computing technology,the security of conventional key-based SSL/TLS protocols faces vulnerabilities.In this paper,we propose a scheme by integrating the quantum key into the SSL/TLS framework.Furthermore,the application of post-quantum algorithms is used to enhance and complement the existing encryption suites.Experimental results show that the proposed SSL/TLS communication system based on quantum keys exhibits high performance in latency and throughput.Moreover,the proposed system showcases good resilience against quantum attacks.