期刊文献+
共找到2,472篇文章
< 1 2 124 >
每页显示 20 50 100
Design and Implementation of USB Key System Based on Dual-Factor Identity Authentication Protocol
1
作者 Jianxin Wang Zifan Xu +2 位作者 Xiangze Chang Chaoen Xiao Lei Zhang 《Journal of Electronic Research and Application》 2024年第5期161-167,共7页
With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware ... With the increasing demand for information security,traditional single-factor authentication technology can no longer meet security requirements.To this end,this paper proposes a Universal Serial Bus(USB)Key hardware and software system based on a two-factor authentication protocol,aiming to improve the security and reliability of authentication.This paper first analyzes the current status and technical principles of USB Key-related research domestically and internationally and designs a two-factor authentication protocol that combines impact/response authentication and static password authentication.The system consists of a host computer and a USB Key device.The host computer interacts with the USB Key through a graphical user interface.The Secure Hash Algorithm 1(SHA-1)and MySQL database are used to implement the authentication function.Experimental results show that the designed two-factor authentication protocol can effectively prevent replay attacks and information tampering,and improve the security of authentication.If the corresponding USB Key is not inserted,the system will prompt that the device is not found.Once the USB Key is inserted,user identity is confirmed through two-factor verification,which includes impact/response authentication and static password authentication. 展开更多
关键词 Information security USB key Impact/response authentication Static password authentication
在线阅读 下载PDF
Heterogeneous User Authentication and Key Establishment Protocol for Client-Server Environment
2
作者 Huihui Zhu Fei Tang +1 位作者 Chunhua Jin Ping Wang 《Computers, Materials & Continua》 2026年第4期648-666,共19页
The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement proto... The ubiquitous adoption of mobile devices as essential platforms for sensitive data transmission has heightened the demand for secure client-server communication.Although various authentication and key agreement protocols have been developed,current approaches are constrained by homogeneous cryptosystem frameworks,namely public key infrastructure(PKI),identity-based cryptography(IBC),or certificateless cryptography(CLC),each presenting limitations in client-server architectures.Specifically,PKI incurs certificate management overhead,IBC introduces key escrow risks,and CLC encounters cross-system interoperability challenges.To overcome these shortcomings,this study introduces a heterogeneous signcryption-based authentication and key agreement protocol that synergistically integrates IBC for client operations(eliminating PKI’s certificate dependency)with CLC for server implementation(mitigating IBC’s key escrow issue while preserving efficiency).Rigorous security analysis under the mBR(modified Bellare-Rogaway)model confirms the protocol’s resistance to adaptive chosen-ciphertext attacks.Quantitative comparisons demonstrate that the proposed protocol achieves 10.08%–71.34%lower communication overhead than existing schemes across multiple security levels(80-,112-,and 128-bit)compared to existing protocols. 展开更多
关键词 User authentication key establishment CLIENT-SERVER HETEROGENEOUS SECURITY
在线阅读 下载PDF
An Anonymous Authentication and Key Exchange Protocol for UAVs in Flying Ad-Hoc Networks
3
作者 Yanan Liu Suhao Wang +4 位作者 Lei Cao Pengfei Wang Zheng Zhang Shuo Qiu Ruchan Dong 《Computers, Materials & Continua》 2026年第3期1262-1286,共25页
Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic to... Unmanned Aerial Vehicles(UAVs)in Flying Ad-Hoc Networks(FANETs)are widely used in both civilian and military fields,but they face severe security,trust,and privacy vulnerabilities due to their high mobility,dynamic topology,and open wireless channels.Existing security protocols for Mobile Ad-Hoc Networks(MANETs)cannot be directly applied to FANETs,as FANETs require lightweight,high real-time performance,and strong anonymity.The current FANETs security protocol cannot simultaneously meet the requirements of strong anonymity,high security,and low overhead in high dynamic and resource-constrained scenarios.To address these challenges,this paper proposes an Anonymous Authentication and Key Exchange Protocol(AAKE-OWA)for UAVs in FANETs based on OneWay Accumulators(OWA).During the UAV registration phase,the Key Management Center(KMC)generates an identity ticket for each UAV using OWA and transmits it securely to the UAV’s on-board tamper-proof module.In the key exchange phase,UAVs generate temporary authentication tickets with random numbers and compute the same session key leveraging the quasi-commutativity of OWA.For mutual anonymous authentication,UAVs encrypt random numbers with the session key and verify identities by comparing computed values with authentication values.Formal analysis using the Scyther tool confirms that the protocol resists identity spoofing,man-in-the-middle,and replay attacks.Through Burrows Abadi Needham(BAN)logic proof,it achieves mutual anonymity,prevents simulation and physical capture attacks,and ensures secure connectivity of 1.Experimental comparisons with existing protocols prove that the AAKE-OWA protocol has lower computational overhead,communication overhead,and storage overhead,making it more suitable for resource-constrained FANET scenarios.Performance comparison experiments show that,compared with other schemes,this scheme only requires 8 one-way accumulator operations and 4 symmetric encryption/decryption operations,with a total computational overhead as low as 2.3504 ms,a communication overhead of merely 1216 bits,and a storage overhead of 768 bits.We have achieved a reduction in computational costs from 6.3%to 90.3%,communication costs from 5.0%to 69.1%,and overall storage costs from 33%to 68%compared to existing solutions.It can meet the performance requirements of lightweight,real-time,and anonymity for unmanned aerial vehicles(UAVs)networks. 展开更多
关键词 AUTHENTICATION key exchange one-way accumulator flying ad-hoc networks SECURITY
在线阅读 下载PDF
Key Techniques for High-yield and High-efficiency Cultivation of‘Zhouhua 5’Peanut under Film Mulching
4
作者 Chaoyang JIA Yake LEI +3 位作者 Jianhang ZHANG Shijie ZHAN Chenwei DENG Jingbin CUI 《Agricultural Biotechnology》 2026年第1期13-15,25,共4页
With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall e... With the expansion of peanut planting area year by year,film mulching cultivation has become increasingly important in peanut production due to its unique advantages in enhancing both yield per unit area and overall economic benefits.Based on the varietal characteristics of‘Zhouhua 5’and addressing practical issues in peanut production,this paper summarized key techniques for high-yield and high-efficiency film mulching cultivation of this variety.These techniques cover all critical stages,including land preparation and fertilization,seed preparation,sowing methods,field management,and timely harvesting,providing technical guidance for varietal promotion and peanut production. 展开更多
关键词 PEANUT Zhouhua 5 Film mulching key technique
在线阅读 下载PDF
Slope rockbolting using key block theory:Force transfer and artificial intelligence-assisted multi-objective optimisation
5
作者 Jessica Ka Yi Chiu Charlie Chunlin Li +1 位作者 Ole Jakob Mengshoel Vidar Kveldsvik 《Journal of Rock Mechanics and Geotechnical Engineering》 2026年第1期73-91,共19页
This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material u... This paper presents a novel artificial intelligence(AI)-assisted two-stage method for optimising rock slope stability by integrating advanced 3D modelling with rock support design,aiming at minimising risks,material usage,and costs.In the first stage,an extended key block analysis identifies key blocks and key block groups,accounting for progressive failure and force interactions.The second stage uses AI algorithms to optimise rockbolting design,balancing stability,cost,and material use.The most efficient algorithms include the multi-objective tree-structured Parzen estimator(MOTPE)and non-dominated sorting genetic algorithms(NSGA-II and NSGA-III).Applied to the Larvik rock slope,the optimised solution uses 18 pre-tensioned cablebolts,providing 13.2 MN of active force and achieving a factor of safety of 1.31 while reducing the average anchorage length by approximately 16%compared to traditional design.The AI-assisted approach also reduces computation time by over 90%compared to Quasi-Monte Carlo(QMC)methods,demonstrating its efficiency for small-scale civil engineering projects and large-scale mining operations.The developed tool is practical,compatible with Building Information Modelling(BIM),and ready for engineering implementation,supporting sustainable and cost-effective rock slope stabilisation.While the method is largely automated,professional judgement remains crucial for verifying ground conditions and selecting the final solution.Future work will focus on integrating data uncertainties,addressing complex block deformation mechanisms,refining optimisation objectives,and improving the performance of multi-objective optimisation for slope rockboling applications to further enhance the method's versatility. 展开更多
关键词 Rock anchoring Slope stability 3D modelling key block Parametric design Bio-inspired artificial intelligence(AI)
在线阅读 下载PDF
Multilevel Military Image Encryption Based on Tri-Independent Keying Approach
6
作者 Shereen S.Jumaa Mohsin H.Challoob Amjad J.Humaidi 《Computers, Materials & Continua》 2026年第4期1548-1564,共17页
Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military... Military image encryption plays a vital role in ensuring the secure transmission of sensitive visual information from unauthorized access.This paper proposes a new Tri-independent keying method for encrypting military images.The proposed encryption method is based on multilevel security stages of pixel-level scrambling,bitlevel manipulation,and block-level shuffling operations.For having a vast key space,the input password is hashed by the Secure Hash Algorithm 256-bit(SHA-256)for generating independently deterministic keys used in the multilevel stages.A piecewise pixel-level scrambling function is introduced to perform a dual flipping process controlled with an adaptive key for obscuring the spatial relationships between the adjacent pixels.Adynamicmasking scheme is presented for conducting a bit-level manipulation based on distinct keys that change over image regions,providing completely different encryption results on identical regions.To handle the global correlation between large-scale patterns,a chaotic index-map system is employed for shuffling image regions randomly across the image domain based on a logistic map seeded with a private key.Experimental results on a dataset of military images show the effectiveness of the proposed encryption method in producing excellent quantitative and qualitative results.The proposed method obtains uniform histogram distributions,high entropy values around the ideal(≈8 bits),Number of Pixel Change Rate(NPCR)values above 99.5%,and low Peak Signal-to-Noise Ratio(PSNR)over all encrypted images.This validates the robustness of the proposed method against cryptanalytic attacks,verifying its ability to serve as a practical basis for secure image transmission in defense systems. 展开更多
关键词 Military image encryption pixel-level scrambling bit-level manipulation block-level shuffling password hashing dynamic encryption key spatial pixel correlation chaotic system
在线阅读 下载PDF
KPA-ViT:Key Part-Level Attention Vision Transformer for Foreign Body Classification on Coal Conveyor Belt
7
作者 Haoxuanye Ji Zhiliang Chen +3 位作者 Pengfei Jiang Ziyue Wang Ting Yu Wei Zhang 《Computers, Materials & Continua》 2026年第3期656-671,共16页
Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spa... Foreign body classification on coal conveyor belts is a critical component of intelligent coal mining systems.Previous approaches have primarily utilized convolutional neural networks(CNNs)to effectively integrate spatial and semantic information.However,the performance of CNN-based methods remains limited in classification accuracy,primarily due to insufficient exploration of local image characteristics.Unlike CNNs,Vision Transformer(ViT)captures discriminative features by modeling relationships between local image patches.However,such methods typically require a large number of training samples to perform effectively.In the context of foreign body classification on coal conveyor belts,the limited availability of training samples hinders the full exploitation of Vision Transformer’s(ViT)capabilities.To address this issue,we propose an efficient approach,termed Key Part-level Attention Vision Transformer(KPA-ViT),which incorporates key local information into the transformer architecture to enrich the training information.It comprises three main components:a key-point detection module,a key local mining module,and an attention module.To extract key local regions,a key-point detection strategy is first employed to identify the positions of key points.Subsequently,the key local mining module extracts the relevant local features based on these detected points.Finally,an attention module composed of self-attention and cross-attention blocks is introduced to integrate global and key part-level information,thereby enhancing the model’s ability to learn discriminative features.Compared to recent transformer-based frameworks—such as ViT,Swin-Transformer,and EfficientViT—the proposed KPA-ViT achieves performance improvements of 9.3%,6.6%,and 2.8%,respectively,on the CUMT-BelT dataset,demonstrating its effectiveness. 展开更多
关键词 Foreign body classification global and part-level key information coal conveyor belt vision transformer(ViT) self and cross attention
在线阅读 下载PDF
KEY TECHNOLOGY OF SEMI-CONTINOUS CONVEYOR SYSTEM IN DEEP SURFACE MINE
8
作者 苏靖 刘胜富 任天贵 《International Journal of Minerals,Metallurgy and Materials》 SCIE EI CAS CSCD 1996年第2期102+99-102,共5页
The key technology of semi-continuous conveyor system decides the successful using of this system. The key technology includes optimal initial building depth of this system,the crusher moving step and the layout of co... The key technology of semi-continuous conveyor system decides the successful using of this system. The key technology includes optimal initial building depth of this system,the crusher moving step and the layout of conveyor system are studied, and their calculating models are built up. 展开更多
关键词 surface mine semi-continous conveyor system key technology
在线阅读 下载PDF
Key Environmental Factors Monitoring System of Low-power Greenhouse Based on WSN Technology
9
作者 柳军 陶建平 吕晓兰 《Agricultural Science & Technology》 CAS 2016年第2期449-452,共4页
A low-power environmental monitoring system based on WSN technology is proposed to effectively monitor the environmental status and ensure the healthy growth of greenhouse crops in the greenhouse. The system performs ... A low-power environmental monitoring system based on WSN technology is proposed to effectively monitor the environmental status and ensure the healthy growth of greenhouse crops in the greenhouse. The system performs dynamic mon- itoring on the environmental data of temperature, humidity, illumination, soil tempera- ture and humidity of the greenhouse, and it reduces the energy consumption by us- ing solar energy and lithium battery as the power supply mode and dynamic power management algorithm combined with improved routing protocol. Stable and reliable, the system could effectively monitor the key environmental factors in the green- house, making it of certain promotion value. 展开更多
关键词 Environmental monitoring GREENHOUSE Wireless sensor network WSN technology key factor
在线阅读 下载PDF
Human Digital Twin(HDT)Driven Human-Cyber-Physical Systems:Key Technologies and Applications 被引量:12
10
作者 Baicun Wang Huiying Zhou +2 位作者 Geng Yang Xingyu Li Huayong Yang 《Chinese Journal of Mechanical Engineering》 SCIE EI CAS CSCD 2022年第1期1-6,共6页
1 Introduction Traditional industrial systems,where physical systems,i.e.,robots and machines,replaced manual labor mostly,are often known as human-physical system(HPS)[1].Cyber system,a major outcome of the digitaliz... 1 Introduction Traditional industrial systems,where physical systems,i.e.,robots and machines,replaced manual labor mostly,are often known as human-physical system(HPS)[1].Cyber system,a major outcome of the digitalization revolution,is increasingly adopted in HPS and continuously evolving with the development of advanced manufacturing technologies,leading to the human-cyber-physical system(HCPS)[2]. 展开更多
关键词 system mostly key
在线阅读 下载PDF
Secret Key Generation Based on Two-Way Randomness for TDD-SISO System 被引量:11
11
作者 Shengjun Zhang Liang Jin +1 位作者 Yangming Lou Zhou Zhong 《China Communications》 SCIE CSCD 2018年第7期202-216,共15页
A novel secret key generation(SKG)method based on two-way randomness is proposed for TDD-SISO system.The legitimate transceivers mutually transmit their own random signal via reciprocal wireless channel,then the multi... A novel secret key generation(SKG)method based on two-way randomness is proposed for TDD-SISO system.The legitimate transceivers mutually transmit their own random signal via reciprocal wireless channel,then the multiplication of transmitted and received signal is used as common randomness to generate secret keys.In quasi-static channel,the theoretical SKG rates(SKGRs)of the three SKG methods,namely wireless channel based,one-way randomness and two-way randomness,are derived and compared.Further,two practical SKG schemes based on twoway randomness,Scheme-1bit and Scheme-3bit,are completely designed and simulated.Generally,Scheme-1bit applies to low signal to noise ratio(SNR)scenarios and achieves 0.13~0.86bit/T_s SKGR and 10^(-2)~10^(-5) level secret key outage probability(SKOP),while Scheme-3bit fits high SNR situation and obtains 0.93~1.35bit/T_s SKGR and 10^(-3)~10^(-4) level SKOP.At last,the national institute of standards and technology(NIST)test is conducted to evaluate the secret key randomness(SKRD)and the test results show that both of the proposed schemes have passed the test. 展开更多
关键词 secret key generation physical layer security information reconciliation information theory
在线阅读 下载PDF
Measuring-Basis Encrypted Quantum Key Distribution with Four-State Systems 被引量:3
12
作者 CHEN Pan LI Yan-Song +1 位作者 DENG Fu-Guo LONG Gui-Lu 《Communications in Theoretical Physics》 SCIE CAS CSCD 2007年第1期49-52,共4页
A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical i... A measuring-basis encrypted quantum key distribution scheme is proposed by using twelve nonorthogohal states in a four-state system and the measuring-basis encryption technique. In this scheme, two bits of classical information can be encoded on one four-state particle and the transmitted particles can be fully used. 展开更多
关键词 quantum key distribution measuring-basis encryption four-state system
在线阅读 下载PDF
Key technologies for medium and low voltage DC distribution system 被引量:6
13
作者 Yiwen Fan Yongning Chi +4 位作者 Yan Li Zhibing Wang Hongzhi Liu Wei Liu Xiangyu Li 《Global Energy Interconnection》 CAS CSCD 2021年第1期91-103,共13页
Development of the medium and low voltage DC distribution system is of great significance to a regional transmission of electric energy,increasing a penetration rate of new energy,and enhancing a safety of the operati... Development of the medium and low voltage DC distribution system is of great significance to a regional transmission of electric energy,increasing a penetration rate of new energy,and enhancing a safety of the operation of the AC/DC interconnected grid.This paper first summarizes the medium and low voltage DC distribution system schemes and plans put forward by many countries,and then elaborate status of under-construction medium and low voltage DC distribution system project cases in China.Based on these project cases,this paper analyzes key issues involved in the medium and low voltage DC distribution system topologies,equipment,operation control technologies and DC fault protections,in order to provide theoretical and technical reference for future medium and low voltage DC distribution system-related projects.Finally,this paper combines a current China research status to summarize and give a prediction about the future research direction of medium and low voltage DC distribution system,which can provide reference for the research of medium and low voltage DC distribution system. 展开更多
关键词 Medium and low voltage DC distribution system system topology key equipment DC fault protection Operation control technology
在线阅读 下载PDF
Analysis of key technologies and development of integrated digital processing system for cast blasting design 被引量:3
14
作者 丁小华 李克民 +1 位作者 肖双双 狐为民 《Journal of Central South University》 SCIE EI CAS CSCD 2015年第3期1037-1044,共8页
Casting blast can greatly reduce the stripping cost and improve the production capacity of opencast coal mines. Key technologies including high bench blasting, inclined hole, millisecond blasting, pre-splitting blasti... Casting blast can greatly reduce the stripping cost and improve the production capacity of opencast coal mines. Key technologies including high bench blasting, inclined hole, millisecond blasting, pre-splitting blasting and casting blast parameters determination which have influence on the effect of casting blast have been researched with the combination of the ballistic theory and experience in mines. The integrated digital processing system of casting blast was developed in order to simplify the design process of casting blast, improve working efficiency and veracity of design result and comprehensively adopt the software programming method and the theory of casting blast. This system has achieved five functions, namely, the 3D visualization graphics management, the intelligent management of geological information, the intelligent design of casting blast, the analysis and prediction of the blasting effect and the automatic output of the design results. Long-term application in opencast coal mines has shown that research results can not only reduce the specific explosive consumption and improve the blasting effect, but also have high value of popularization and application. 展开更多
关键词 opencast coal mine cast blasting key technology digital processing system
在线阅读 下载PDF
A Secure Key Management Scheme for Heterogeneous Secure Vehicular Communication Systems 被引量:4
15
作者 LEI Ao Chibueze Ogah +2 位作者 Philip Asuquo Haitham Cruickshank SUN Zhili 《ZTE Communications》 2016年第B06期21-31,共11页
Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highl... Intelligent transportation system (ITS) is proposed as the most effective way to improve road safety and traffic efficiency. However, the future of ITS for large scale transportation infrastructures deployment highly depends on the security level of vehicular communication systems (VCS). Security applications in VCS are fulfilled through secured group broadcast. Therefore, secure key management schemes are considered as a critical research topic for network security. In this paper, we propose a framework for providing secure key management within heterogeneous network. The seeurity managers (SMs) play a key role in the framework by retrieving the vehicle departnre infi^rmation, encapsulating block to transport keys and then executing rekeying to vehicles within the same security domain. The first part of this framework is a novel Group Key Management (GKM) scheme basing on leaving probability (LP) of vehicles to depart current VCS region. Vehicle's LP factor is introduced into GKM scheme to achieve a more effieient rekeying scheme and less rekeying costs. The second component of the framework using the blockchain concept to simplify the distributed key management in heterogeneous VCS domains. Extensive simulations and analysis are provided to show the effectiveness and effieiency of the proposed framework: Our GKM results demonstrate that probability-based BR reduees rekeying eost compared to the benchmark scheme, while the blockchain deereases the time eost of key transmission over heterogeneous net-works. 展开更多
关键词 leaving probability bloekchain group key management HETEROGENEOUS vehicular communication systems (VCS)
在线阅读 下载PDF
Key Management Using Certificate-Based Cryptosystem in Ad Hoc Networks 被引量:2
16
作者 李发根 高军涛 +1 位作者 刘双根 胡予濮 《Journal of Shanghai Jiaotong university(Science)》 EI 2006年第2期152-157,共6页
This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relat... This paper proposed a distributed key management approach by using the recently developed concepts of certificate-based cryptosystem and threshold secret sharing schemes. Without any assumption of prefixed trust relationship between nodes, the ad hoc network works in a self-organizing way to provide the key generation and key management services using threshold secret sharing schemes, which effectively solves the problem of single point of failure. The proposed approach combines the best aspects of identity-based key management approaches (implicit certification) and traditional public key infrastructure approaches (no key escrow). 展开更多
关键词 ad hoc network network security key management certificate-based cryptosystem
在线阅读 下载PDF
An autobias control system for the electro optic modulator used in a quantum key distribution system 被引量:1
17
作者 陈文芬 魏正军 +6 位作者 郭莉 侯丽燕 王赓 王金东 张智明 郭建平 刘颂豪 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第8期261-268,共8页
In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating ... In a quantum key distribution system, it is crucial to keep the extinction ratio of the coherent pulses stable. This means that the direct current bias point of the electro-optic modulator (EOM) used for generating coherent pulses must be locked. In this paper, an autobias control system based on a lock-in-amplifier for the EOM is introduced. Its drift information extracting theory and control method are analyzed comprehensively. The long term drift of the extinction ratio of the coherent pulses is measured by a single photon detector, which indicates that the autobias control system is effective for stabilizing the bias point of the EOM. 展开更多
关键词 quantum key distribution electro-optic modulator autobias control lock-in-amplifier
原文传递
Practical Reference-Frame-Independent Measurement-Device-Independent Quantum Key Distribution Systems Against the Worst Relative Rotation of Reference Frames 被引量:1
18
作者 Chun-Mei Zhang Jian-Rong Zhu Qin Wang 《Communications in Theoretical Physics》 SCIE CAS CSCD 2018年第10期379-383,共5页
Reference-frame-independent measurement-device-independent QKD(RFI-MDI-QKD), immune to both the slow unknown drift of reference frames and detector side channel attacks, can generate information-theoretic secure keys.... Reference-frame-independent measurement-device-independent QKD(RFI-MDI-QKD), immune to both the slow unknown drift of reference frames and detector side channel attacks, can generate information-theoretic secure keys. Despite its natural resistance to the slow drift of reference frames, the performance of practical RFI-MDI-QKD systems descends with the increasing drift of reference frames. In this paper, we demonstrate the worst relative rotation of reference frames for practical RFI-MDI-QKD systems, and investigate their performance against the worst-case scenario,both of which are unclear to date. Simulation results show that, practical RFI-MDI-QKD systems can achieve quite good performance even against the worst-case scenario, which clearly demonstrates that it is possible to implement practical MDI-QKD systems with freely drifting reference frames. 展开更多
关键词 reference-frame-independent measurement-device-independent quantum key distribution relative rotation
原文传递
Countermeasure against probabilistic blinding attack in practical quantum key distribution systems 被引量:1
19
作者 钱泳君 李宏伟 +5 位作者 何德勇 银振强 张春梅 陈巍 王双 韩正甫 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第9期111-115,共5页
In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by... In a practical quantum key distribution(QKD) system, imperfect equipment, especially the single-photon detector,can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate(QBER) introduced by Eve, by which Eve can acquire information without the countermeasure. 展开更多
关键词 countermeasure bound single-photon detector probabilistic blinding attack quantum key distribution
原文传递
A Key Recovery System Based on Password-Protected Secret Sharing in a Permissioned Blockchain 被引量:1
20
作者 Gyeong-Jin Ra Chang-Hyun Roh Im-Yeong Lee 《Computers, Materials & Continua》 SCIE EI 2020年第10期153-170,共18页
In today’s fourth industrial revolution,various blockchain technologies are being actively researched.A blockchain is a peer-to-peer data-sharing structure lacking central control.If a user wishes to access stored da... In today’s fourth industrial revolution,various blockchain technologies are being actively researched.A blockchain is a peer-to-peer data-sharing structure lacking central control.If a user wishes to access stored data,she/he must employ a private key to prove ownership of the data and create a transaction.If the private key is lost,blockchain data cannot be accessed.To solve such a problem,public blockchain users can recover the key using a wallet program.However,key recovery in a permissioned blockchain(PBC)has been but little studied.The PBC server is Honest-but-Curious(HBC),and should not be able to learn anything of the user;the server should simply recover and store the key.The server must also be resistant to malicious attacks.Therefore,key recovery in a PBC must satisfy various security requirements.Here,we present a password-protected secret sharing(PPSS)key recovery system,protected by a secure password from a malicious key storage server of a PBC.We describe existing key recovery schemes and our PPSS scheme. 展开更多
关键词 Password-protected secret sharing key recovery blockchain wallet security
在线阅读 下载PDF
上一页 1 2 124 下一页 到第
使用帮助 返回顶部