期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
Space Division and WGAN-GP Based Fast Generation Method of Practical Dynamic Security Region Boundary
1
作者 Yanli Liu Ruipeng Jia 《Engineering》 2025年第8期75-85,共11页
Fast and accurate transient stability analysis is crucial to power system operation.With high penetration level of wind power resources,practical dynamic security region(PDSR)with hyper plane expression has outstandin... Fast and accurate transient stability analysis is crucial to power system operation.With high penetration level of wind power resources,practical dynamic security region(PDSR)with hyper plane expression has outstanding advantages in situational awareness and series of optimization problems.The precondition of obtaining accurate PDSR boundary is to locate sufficient points around the boundary(critical points).Therefore,this paper proposes a space division and Wasserstein generative adversarial network with gra-dient penalty(WGAN-GP)based fast generation method of PDSR boundary.First,the typical differential topological characterizations of dynamic security region(DSR)provide strong theoretical foundation that the interior of DSR is hole-free and the boundaries of DSR are tight and knot-free.Then,the space division method is proposed to calculate critical operation area where the PDSR boundary is located,tremen-dously compressing the search space to locate critical points and improving the confidence level of boundary fitting result.Furthermore,the WGAN-GP model is utilized to fast obtain large number of criti-cal points based on learning the data distribution of the small training set aforementioned.Finally,the PDSR boundary with hyperplanes is fitted by the least square method.The case study is tested on the Institute of Electrical and Electronics Engineers(IEEE)39-bus system and the results verify the accuracy and efficiency of the proposed method. 展开更多
关键词 practical dynamic security region boundary WGAN-GP Space division Critical points Data-model hybrid driven
在线阅读 下载PDF
A world-record achievement in the 100-kilometer practical quantum secure direct communication rate
2
作者 Jia-Wei Ying Yu-Bo Sheng +1 位作者 Lan Zhou Leong-Chuan Kwek 《Frontiers of physics》 2025年第3期187-189,共3页
Recently,Long et al.[1]at the Beijing Academy of Quantum Information Sciences,in collaboration with the partners,proposed the theory of oneway quantum secure direct communication(QSDC)and successfully developed a prac... Recently,Long et al.[1]at the Beijing Academy of Quantum Information Sciences,in collaboration with the partners,proposed the theory of oneway quantum secure direct communication(QSDC)and successfully developed a practical system.This achievement set a world record for long-distance stable transmission,demonstrating a rate of 2.38 kbps at a distance of 104.8 km over 168 hours. 展开更多
关键词 stable transmission hours world record practical quantum secure direct communication RATE qsdc long distance transmission kilometers
原文传递
Quantum key distribution system against the probabilistic faint after-gate attack
3
作者 Meng Ye Jian-Hui Li +3 位作者 Yong Wang Peng Gao Xin-Xin Lu Yong-Jun Qian 《Communications in Theoretical Physics》 SCIE CAS CSCD 2020年第11期43-47,共5页
In practical quantum key distribution(QKD)systems,a single photon-detector(SPD)is one of the most vulnerable components.Faint after-gate attack is a universal attack against the detector.However,the original faint aft... In practical quantum key distribution(QKD)systems,a single photon-detector(SPD)is one of the most vulnerable components.Faint after-gate attack is a universal attack against the detector.However,the original faint after-gate attack can be discovered by monitoring the photocurrent.This paper presents a probabilistic generalization of the attack,which we refer to as probabilistic faint after-gate attack,by introducing probability control modules.Previous countermeasures for photocurrent monitoring may fail in detecting the eavesdropper under some specific probabilities.To mitigate this threat,we provide a method to determine the detectable boundary in the limitation of precision of photocurrent monitoring,and investigate the security of QKD systems under such boundaries using the weak randomness model. 展开更多
关键词 quantum key distribution practical security single photon-detector weak randomness model
原文传递
Generic security analysis framework for quantum secure direct communication 被引量:10
4
作者 Zhang-Dong Ye Dong Pan +3 位作者 Zhen Sun Chun-Guang Du Liu-Guo Yin Gui-Lu Long 《Frontiers of physics》 SCIE CSCD 2021年第2期23-31,共9页
Quantum secure direct communication provides a direct means of conveying secret information via quantum states among legitimate users.The past two decades have witnessed its great strides both theoretically and experi... Quantum secure direct communication provides a direct means of conveying secret information via quantum states among legitimate users.The past two decades have witnessed its great strides both theoretically and experimentally.However,the security analysis of it still stays in its infant.Some practical problems in this field to be solved urgently,such as detector efficiency mismatch,side-channel effect and source imperfection,are propelling the birth of a more impeccable solution.In this paper,we establish a new framework of the security analysis driven by numerics where all the practical problems may be taken into account naturally.We apply this framework to several variations of the DL04 protocol considering real-world experimental conditions.Also,we propose two optimizing methods to process the numerical part of the framework so as to meet different requirements in practice.With these properties considered,we predict the robust framework would open up a broad avenue of the development in the field. 展开更多
关键词 quantum secure direct communication(QSDC) practical security analysis secrecy capacity optimization detectory efficiency mismatch convex optimization
原文传递
Innovations in quantum light sources advance entanglement-based QKD networks
5
作者 Wei Zhang 《Science China(Physics,Mechanics & Astronomy)》 2025年第6期209-210,共2页
Quantum key distribution(QKD)guarantees informationtheoretic security through the fundamental principles of quantum mechanics.As its matures,QKD networks have achieved long-distance deployment,showing significant adva... Quantum key distribution(QKD)guarantees informationtheoretic security through the fundamental principles of quantum mechanics.As its matures,QKD networks have achieved long-distance deployment,showing significant advancements in practical quantum-security communication infrastructure[1].When transitioning to large scale quantum communication networks with complicated topologies,conventional paradigms,which are based on point-to-point QKD links connected by trusted nodes,face technical challenges on achieving scalability and optimizing resource allocation.Quantum entanglements are important resources for quantum networks. 展开更多
关键词 quantum key distribution entanglement based qkd networks informationtheoretic security quantum light sources quantum key distribution qkd guarantees long distance deployment quantum communication networks practical quantum security communication
原文传递
Experimental measurement-device-independent type quantum key distribution with flawed and correlated sources 被引量:3
6
作者 Jie Gu Xiao-Yu Cao +4 位作者 Yao Fu Zong-Wu He Ze-Jie Yin Hua-Lei Yin Zeng-Bing Chen 《Science Bulletin》 SCIE EI CAS CSCD 2022年第21期2167-2175,共9页
The security of quantum key distribution(QKD)is severely threatened by discrepancies between realistic devices and theoretical assumptions.Recently,a significant framework called the reference technique was proposed t... The security of quantum key distribution(QKD)is severely threatened by discrepancies between realistic devices and theoretical assumptions.Recently,a significant framework called the reference technique was proposed to provide security against arbitrary source flaws under current technology such as state preparation flaws,side channels caused by mode dependencies,the Trojan horse attacks and pulse correlations.Here,we adopt the reference technique to prove security of an efficient four-phase measurement-device-independent QKD using laser pulses against potential source imperfections.We present a characterization of source flaws and connect them to experiments,together with a finite-key analysis against coherent attacks.In addition,we demonstrate the feasibility of our protocol through a proof-of-principle experimental implementation and achieve a secure key rate of 253 bps with a 20 d B channel loss.Compared with previous QKD protocols with imperfect devices,our study considerably improves both the secure key rate and the transmission distance,and shows application potential in the practical deployment of secure QKD with device imperfections. 展开更多
关键词 Measurement-device-independent Quantum key distribution Reference technique Source flaw characterization practical security
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部