Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,sca...Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,scalability,energy efficiency and the potential for extensive integration.We have achieved BB84 phase encoding and decoding,time-bin phase QKD,and the coherent one-way(COW)protocol on a planar lightwave circuit(PLC)platform.At the optimal temperature,our chip successfully prepared quantum states,performed decoding and calculated the secure key rate of the time-bin phasedecoding QKD to be 80.46 kbps over a 20 km transmission with a quantum bit error rate(QBER)of 4.23%.The secure key rate of the COW protocol was 18.18 kbps,with a phase error rate of 3.627%and a time error rate of 0.377%.The uniqueness of this technology lies in its combination of high integration and protocol flexibility,providing an innovative solution for the development of future quantum communication networks.展开更多
The quantum key distribution (QKD) allows two parties to share a secret key by typically making use of a one-way quantum channel. Howevery the two-way QKD has its own unique advantages, which means the two-way QKD h...The quantum key distribution (QKD) allows two parties to share a secret key by typically making use of a one-way quantum channel. Howevery the two-way QKD has its own unique advantages, which means the two-way QKD has become a focus recently. To improve the practieM performance of the two-way QKD, we present a security analysis of a two-way QKD protocol based on the decoy method with heralded single-photon sources (HSPSs). We make use of two approaches to calculate the yield and the quantum bit error rate of single-photon and two-photon pulses. Then we present the secret key generation rate based on the GLLP formula. The numerical simulation shows that the protocol with HSPSs has an advantage in the secure distance compared with weak coherent state sources. In addition, we present the final secret key by considering the statistical fluctuation of the yield generation rate of the LM05 protocol with finite resources and the error rate.展开更多
Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable (CV) quantum key distribution (QKD) based Mr-to-water channel. The effects of...Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable (CV) quantum key distribution (QKD) based Mr-to-water channel. The effects of the absorp- tion and scattering on the transmittance of underwater quantum channel and the maximum secure transmission distance are studied. Considering the roughness of the sea surface, we simulate the performance bounds of CV QKD with different wind speeds using the Monte Carlo method. The results show that even if the secret key rate gradually reduces as the wind speed increases, the maximum transmission distance will not be affected obviously. Compared to the works regarding short-distance underwater optical communication, our research represents a significant step towards establishing secure communication between air platform and submarine vehicle.展开更多
Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to imp...Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to improve the coverage and capacity of public mobile network, to enable communication services, to provide Internet access and to enable mobile computing from everywhere, has drawn widespread attention for its good prospects in application. Construction of security system for wireless heterogeneous networks and development of new security models, key security techniques and approaches are critical and mandatory in heterogeneous networks development. Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.展开更多
Semi-device-independent quantum key distribution (SDI-QKD) has been proposed by applying the quantum dimension correlation, and the security relies on the violation of quantum dimension witness inequalities. We prov...Semi-device-independent quantum key distribution (SDI-QKD) has been proposed by applying the quantum dimension correlation, and the security relies on the violation of quantum dimension witness inequalities. We prove the security of the SDI-QKD protocol under the depolarization channel by considering the quantum dimension witness inequalities and minimum entropy and the specific process of the QKD protocol, combining with a four- quantum-state preparation and three measurement bases. We also provide the relationship between the dimension witness value, the error rate and the security key rate by the numerical simulation.展开更多
Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product processing.IIoT suffers from various challenges,and security is one of the key challenge among those challe...Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product processing.IIoT suffers from various challenges,and security is one of the key challenge among those challenges.Authentication and access control are two notable challenges for any IIoT based industrial deployment.Any IoT based Industry 4.0 enterprise designs networks between hundreds of tiny devices such as sensors,actuators,fog devices and gateways.Thus,articulating a secure authentication protocol between sensing devices or a sensing device and user devices is an essential step in IoT security.In this paper,first,we present cryptanalysis for the certificate-based scheme proposed for a similar environment by Das et al.and prove that their scheme is vulnerable to various traditional attacks such as device anonymity,MITM,and DoS.We then put forward an interdevice authentication scheme using an ECC(Elliptic Curve Cryptography)that is highly secure and lightweight compared to other existing schemes for a similar environment.Furthermore,we set forth a formal security analysis using the random oracle-based ROR model and informal security analysis over the Doleve-Yao channel.In this paper,we present comparison of the proposed scheme with existing schemes based on communication cost,computation cost and security index to prove that the proposed EBAKE-SE is highly efficient,reliable,and trustworthy compared to other existing schemes for an inter-device authentication.At long last,we present an implementation for the proposed EBAKE-SE using MQTT protocol.展开更多
We present a three-party reference frame independent quantum key distribution protocol which can be implemented without any alignment of reference frames between the sender and the receiver.The protocol exploits entan...We present a three-party reference frame independent quantum key distribution protocol which can be implemented without any alignment of reference frames between the sender and the receiver.The protocol exploits entangled states to establish a secret key among three communicating parties.We derive the asymptotic key rate for the proposed protocol against collective attacks and perform a finite-size key security analysis against general attacks in the presence of statistical fluctuations.We investigate the impact of reference frame misalignment on the stability of our protocol,and we obtain a transmission distance of 180 km,200 km,and 230 km for rotation of reference framesβ=π/6,β=π/8 andβ=0,respectively.Remarkably,our results demonstrate that our proposed protocol is not heavily affected by an increase in misalignment of reference frames as the achievable transmission distances are still comparable to the case where there is no misalignment in reference frames(whenβ=0).We also simulate the performance of our protocol for a fixed number of signals.Our results demonstrate that the protocol can achieve an effective key generation rate over a transmission distance of about 120 km with realistic 107 finite data signals and approximately achieve 195 km with 109 signals.Moreover,our proposed protocol is robust against noise in the quantum channel and achieves a threshold error rate of 22.7%.展开更多
The goal of quantum key distribution(QKD) is to generate secret key shared between two distant players,Alice and Bob. We present the connection between sampling rate and erroneous judgment probability when estimating ...The goal of quantum key distribution(QKD) is to generate secret key shared between two distant players,Alice and Bob. We present the connection between sampling rate and erroneous judgment probability when estimating error rate with random sampling method, and propose a method to compute optimal sampling rate, which can maximize final secure key generation rate. These results can be applied to choose the optimal sampling rate and improve the performance of QKD system with finite resources.展开更多
The secure key rate of quantum key distribution(QKD)is greatly reduced because of the untrusted devices.In this paper,to raise the secure key rate of QKD,a device-independent quantum key distribution(DIQKD)protocol is...The secure key rate of quantum key distribution(QKD)is greatly reduced because of the untrusted devices.In this paper,to raise the secure key rate of QKD,a device-independent quantum key distribution(DIQKD)protocol is proposed based on hyper-entangled states and Bell inequalities.The security of the protocol is analyzed against the individual attack by an adversary only limited by the no-signaling condition.Based on the formalization of Clauser-Horne Shimony-Holt(CHSH)violation measurement on local correlation,the probability of a secure secret bit is obtained,which is produced by a pair of hyper-entangled particles.By analyzing the secure secret bit,it is proven that,when both the polarization mode and the path mode contains entangled-states,the DIQKD protocol gets a better secure key rate than common Bell states.展开更多
We investigate the effect of collective-rotation noise on the security of the six-state quantum key distribution. We study the case where the eavesdropper, Eve, performs an intercept-resend attack on the quantum commu...We investigate the effect of collective-rotation noise on the security of the six-state quantum key distribution. We study the case where the eavesdropper, Eve, performs an intercept-resend attack on the quantum communication between Alice, the sender, and Bob, the receiver. We first derive the collective-rotation noise model for the six-state protocol and then parameterize the mutual information between Alice and Eve. We then derive quantum bit error rate for three interceptresend attack scenarios. We observe that the six-state protocol is robust against intercept-resend attacks on collective rotation noise channels when the rotation angle is kept within certain bounds.展开更多
As one of the main application directions of quantum technology,underwater quantum communication is of great research significance.In order to study the influence of marine planktonic algal particles on the communicat...As one of the main application directions of quantum technology,underwater quantum communication is of great research significance.In order to study the influence of marine planktonic algal particles on the communication performance of underwater quantum links,based on the extinction characteristics of marine planktonic algal particles,the influence of changes in the chlorophyll concentration and particle number density of planktonic algal particles on the attenuation of underwater links is explored respectively,the influence of marine planktonic algal particles on the fidelity of underwater quantum links,the generation rate of the security key,and the utilization rate of the channel is analyzed,and simulation experiments are carried out.The results show that with the increase in chlorophyll concentration and particle density of aquatic planktonic algal particles,quantum communication channel link attenuation shows a gradually increasing trend.In addition,the security key generation rate,channel fidelity and utilization rate are gradually decreasing.Therefore,the performance of underwater quantum communication channel will be interfered by marine planktonic algal particles,and it is necessary to adjust the relevant parameter values in the quantum communication system according to different marine planktonic algal particle number density and chlorophyll concentration to improve the performance of quantum communication.展开更多
Establishing secure data communication necessitates secure key exchange over a public channel.Quantum key distribution(QKD),which leverages the principles of quantum physics,can achieve this with information-theoretic...Establishing secure data communication necessitates secure key exchange over a public channel.Quantum key distribution(QKD),which leverages the principles of quantum physics,can achieve this with information-theoretic security.The discrete modulated(DM)continuous variable(CV)QKD protocol,in particular,is a suitable candidate for large-scale deployment of quantum-safe communication due to its simplicity and compatibility with standard high-speed telecommunication technology.Here,we present the first experimental demonstration of a four-state DM CVQKD system,successfully generating composable finite-size keys,secure against collective attacks over a 20 km fiber channel with 2.3×10^(9) coherent quantum states,achieving a positive composable key rate of 11.04×10^(-3) bits/symbol.This accomplishment is enabled by using an advanced security proof,meticulously selecting its parameters,and the fast,stable operation of the system.Our results mark a significant step toward the large-scale deployment of practical,high-performance,cost-effective,and highly secure quantum key distribution networks using standard telecommunication components.展开更多
A significant method in the way the MCU EM78P447A manipulates the RF readerIC MF RC530's functions used in RF IC card application is presented.In this paper,RF reader ICMF RC530's SPI compatible interface is i...A significant method in the way the MCU EM78P447A manipulates the RF readerIC MF RC530's functions used in RF IC card application is presented.In this paper,RF reader ICMF RC530's SPI compatible interface is introduced.The kernel technologies including SPI connection,software design,register initiation,request-response between the reader 1C and the MCU,authentication and the proper format of the key are explained.Adopting the serial peripheralinterface is the innovation in the paper.TheSPI communication mode proves feasible and precise.Furthermore,in the way we avoid the abuse of parallel interface.展开更多
Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is em...Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires.展开更多
Recently, He et al. (Computers and Mathematics with Applications, 2012) proposed an efficient pairing-free certificateless authenticated key agreement (CL-AKA) protocol and claimed their protocol was provably secu...Recently, He et al. (Computers and Mathematics with Applications, 2012) proposed an efficient pairing-free certificateless authenticated key agreement (CL-AKA) protocol and claimed their protocol was provably secure in the extended Canetti-Krawczyk (eCK) model. By giving concrete attacks, we indicate that their protocol is not secure in the eCK model. We propose an improved protocol and show our improvement is secure in the eCK model under the gap DiffieHellman (GDH) assumption. Furthermore, the proposed protocol is very efficient.展开更多
Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services t...Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services to end-users.However,in fog computing(FC),attackers can behave as real fog nodes or end-users to provide malicious services in the network.The attacker acts as an impersonator to impersonate other legitimate users.Therefore,in this work,we present a detection technique to secure the FC environment.First,we model a physical layer key generation based on wireless channel characteristics.To generate the secret keys between the legitimate users and avoid impersonators,we then consider a Double Sarsa technique to identify the impersonators at the receiver end.We compare our proposed Double Sarsa technique with the other two methods to validate our work,i.e.,Sarsa and Q-learning.The simulation results demonstrate that the method based on Double Sarsa outperforms Sarsa and Q-learning approaches in terms of false alarm rate(FAR),miss detection rate(MDR),and average error rate(AER).展开更多
McCullagh-Barreto key agreement protocol and its variant achieve perfect forward security and key generation center (KGC) forward security, but provide no resistance to key compromise impersonation attack (KCI att...McCullagh-Barreto key agreement protocol and its variant achieve perfect forward security and key generation center (KGC) forward security, but provide no resistance to key compromise impersonation attack (KCI attack). In this paper, we give a formal treatment of key compromise impersonation (KCI) attack and define the security notion against it. Then an variant of McCullagh-Barreto protocol is presented with only one more Hash operation. The improved protocol preserves perfect forward security and KGC forward security, and furthermore is proved to be secure against KCI attack under k-Gap-BCAA1 assumption.展开更多
Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the...Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the WSN in the remote and hostile environments for the transmission of the sensitive information, the sensor nodes are more prone to the false data injection attacks. To overcome these existing issues and enhance the network security, this paper proposes a Secure Area based Clustering approach for data aggregation using Traffic Analysis (SAC-TA) in WSN. Here, the sensor network is clustered into small clusters, such that each cluster has a CH to manage and gather the information from the normal sensor nodes. The CH is selected based on the predefined time slot, cluster center, and highest residual energy. The gathered data are validated based on the traffic analysis and One-time Key Generation procedures to identify the malicious nodes on the route. It helps to provide a secure data gathering process with improved energy efficiency. The performance of the proposed approach is compared with the existing Secure Data Aggregation Technique (SDAT). The proposed SAC-TA yields lower average energy consumption rate, lower end-to-end delay, higher average residual energy, higher data aggregation accuracy and false data detection rate than the existing technique.展开更多
Chaotic dynamics generated by vertical-cavity surface-emitting lasers(VCSELs)has stimulated a variety of applications in secure communication,random key distribution,and chaotic radar for its desirable characteristics...Chaotic dynamics generated by vertical-cavity surface-emitting lasers(VCSELs)has stimulated a variety of applications in secure communication,random key distribution,and chaotic radar for its desirable characteristics.The application of machine learning has made great progress in the prediction of chaotic dynamics.However,the performance is constrained by the training datasets,tedious hyper-parameter optimization,and processing speed.Herein,we propose a heterogeneous forecasting scheme for chaotic dynamics in VCSELs with knowledge-based photonic reservoir computing.An additional imperfect physical model of a VCSEL is introduced into photonic reservoir computing to mitigate the deficiency of the purely data-based approach,which yields improved processing speed,increased accuracy,simplified parameter optimization,and reduced training data size.It is demonstrated that the performance of our proposed scheme is robust to the deficiency of the physical model.Moreover,we elucidate that the performance of knowledge-based photonic reservoir computing will fluctuate with the complexity of chaotic dynamics.Finally,the generality of our results is validated experimentally in parameter spaces of feedback strength and injection strength of reservoir computing.The proposed approach suggests new insights into the prediction of chaotic dynamics of semiconductor lasers.展开更多
With the widespread application of quantum communication technology,there is an urgent need to enhance unconditionally secure key rates and capacity.Measurement-device-independent quantum key distribution(MDI-QKD),pro...With the widespread application of quantum communication technology,there is an urgent need to enhance unconditionally secure key rates and capacity.Measurement-device-independent quantum key distribution(MDI-QKD),proven to be immune to detection-side channel attacks,is a secure and reliable quantum communication scheme.The core of this scheme is Hong–Ou–Mandle(HOM)interference,a quantum optical phenomenon with no classical analog,where identical photons meeting on a symmetric beam splitter(BS)undergo interference and bunching.Any differences in the degrees of freedom(frequency,arrival time,spectrum,polarization,and the average number of photons per pulse)between the photons will deteriorate the interference visibility.Here,we demonstrate 16-channel weak coherent pulses(WCPs)of HOM interference with all channels’interference visibility over 46%based on two independent frequency-post-aligned soliton microcombs(SMCs).In our experiment,full locking and frequency alignment of the comb teeth between the two SMCs were achieved through pump frequency stabilization,SMC repetition rate locking,and fine tuning of the repetition rate.This demonstrates the feasibility of using independently generated SMCs as multi-wavelength sources for quantum communication.Meanwhile,SMC can achieve hundreds of frequency-stable comb teeth by locking only two parameters,which further reduces the complexity of frequency locking and the need for finding sufficient suitable frequency references compared to independent laser arrays.展开更多
基金supported by the Innovation Program for Quantum Science and Technology(Grant No.2021ZD0300701)the National Key Research and Development Program of China(Grant No.2018YFA0306403)the Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDB43000000).
文摘Quantum key distribution(QKD)is a method for secure communication that utilizes quantum mechanics principles to distribute cryptographic keys between parties.Integrated photonics offer benefits such as compactness,scalability,energy efficiency and the potential for extensive integration.We have achieved BB84 phase encoding and decoding,time-bin phase QKD,and the coherent one-way(COW)protocol on a planar lightwave circuit(PLC)platform.At the optimal temperature,our chip successfully prepared quantum states,performed decoding and calculated the secure key rate of the time-bin phasedecoding QKD to be 80.46 kbps over a 20 km transmission with a quantum bit error rate(QBER)of 4.23%.The secure key rate of the COW protocol was 18.18 kbps,with a phase error rate of 3.627%and a time error rate of 0.377%.The uniqueness of this technology lies in its combination of high integration and protocol flexibility,providing an innovative solution for the development of future quantum communication networks.
基金Supported by the National Basic Research Program of China under Grant No 2013CB338002the National Natural Science Foundation of China under Grant Nos 11304397 and 61505261
文摘The quantum key distribution (QKD) allows two parties to share a secret key by typically making use of a one-way quantum channel. Howevery the two-way QKD has its own unique advantages, which means the two-way QKD has become a focus recently. To improve the practieM performance of the two-way QKD, we present a security analysis of a two-way QKD protocol based on the decoy method with heralded single-photon sources (HSPSs). We make use of two approaches to calculate the yield and the quantum bit error rate of single-photon and two-photon pulses. Then we present the secret key generation rate based on the GLLP formula. The numerical simulation shows that the protocol with HSPSs has an advantage in the secure distance compared with weak coherent state sources. In addition, we present the final secret key by considering the statistical fluctuation of the yield generation rate of the LM05 protocol with finite resources and the error rate.
基金Supported by the National Natural Science Foundation of China under Grant No 61572529
文摘Considering the ocean water's optical attenuation and the roughness of the sea surface, we analyze the security of continuous-variable (CV) quantum key distribution (QKD) based Mr-to-water channel. The effects of the absorp- tion and scattering on the transmittance of underwater quantum channel and the maximum secure transmission distance are studied. Considering the roughness of the sea surface, we simulate the performance bounds of CV QKD with different wind speeds using the Monte Carlo method. The results show that even if the secret key rate gradually reduces as the wind speed increases, the maximum transmission distance will not be affected obviously. Compared to the works regarding short-distance underwater optical communication, our research represents a significant step towards establishing secure communication between air platform and submarine vehicle.
基金the Jiangsu Natural Science Foundation under Grant No.BK2007236Jiangsu Six-Categories Top Talent Fundunder Grand No.SJ207001
文摘Convergence and collaboration of heterogeneous networks in the next generation public mobile networks will be a subject of universal significance. Convergence of heterogeneous networks, as an effective approach to improve the coverage and capacity of public mobile network, to enable communication services, to provide Internet access and to enable mobile computing from everywhere, has drawn widespread attention for its good prospects in application. Construction of security system for wireless heterogeneous networks and development of new security models, key security techniques and approaches are critical and mandatory in heterogeneous networks development. Key technology of wireless heterogeneous networks security covers security routing protocol, access authentication, intrusion detection system, cooperative communication between nodes, etc.
基金Supported by the National Basic Research Program of China under Grant No 2013CB338002the National Natural Science Foundation of China under Grant Nos 11304397 and 61505261
文摘Semi-device-independent quantum key distribution (SDI-QKD) has been proposed by applying the quantum dimension correlation, and the security relies on the violation of quantum dimension witness inequalities. We prove the security of the SDI-QKD protocol under the depolarization channel by considering the quantum dimension witness inequalities and minimum entropy and the specific process of the QKD protocol, combining with a four- quantum-state preparation and three measurement bases. We also provide the relationship between the dimension witness value, the error rate and the security key rate by the numerical simulation.
基金supported by the Researchers Supporting Project(No.RSP-2021/395)King Saud University,Riyadh,Saudi Arabia.
文摘Industrial IoT(IIoT)aims to enhance services provided by various industries,such as manufacturing and product processing.IIoT suffers from various challenges,and security is one of the key challenge among those challenges.Authentication and access control are two notable challenges for any IIoT based industrial deployment.Any IoT based Industry 4.0 enterprise designs networks between hundreds of tiny devices such as sensors,actuators,fog devices and gateways.Thus,articulating a secure authentication protocol between sensing devices or a sensing device and user devices is an essential step in IoT security.In this paper,first,we present cryptanalysis for the certificate-based scheme proposed for a similar environment by Das et al.and prove that their scheme is vulnerable to various traditional attacks such as device anonymity,MITM,and DoS.We then put forward an interdevice authentication scheme using an ECC(Elliptic Curve Cryptography)that is highly secure and lightweight compared to other existing schemes for a similar environment.Furthermore,we set forth a formal security analysis using the random oracle-based ROR model and informal security analysis over the Doleve-Yao channel.In this paper,we present comparison of the proposed scheme with existing schemes based on communication cost,computation cost and security index to prove that the proposed EBAKE-SE is highly efficient,reliable,and trustworthy compared to other existing schemes for an inter-device authentication.At long last,we present an implementation for the proposed EBAKE-SE using MQTT protocol.
基金Project supported by the Botswana International University of Science and Technology Research Initiation(Grant Nos.R00015 and S00100)。
文摘We present a three-party reference frame independent quantum key distribution protocol which can be implemented without any alignment of reference frames between the sender and the receiver.The protocol exploits entangled states to establish a secret key among three communicating parties.We derive the asymptotic key rate for the proposed protocol against collective attacks and perform a finite-size key security analysis against general attacks in the presence of statistical fluctuations.We investigate the impact of reference frame misalignment on the stability of our protocol,and we obtain a transmission distance of 180 km,200 km,and 230 km for rotation of reference framesβ=π/6,β=π/8 andβ=0,respectively.Remarkably,our results demonstrate that our proposed protocol is not heavily affected by an increase in misalignment of reference frames as the achievable transmission distances are still comparable to the case where there is no misalignment in reference frames(whenβ=0).We also simulate the performance of our protocol for a fixed number of signals.Our results demonstrate that the protocol can achieve an effective key generation rate over a transmission distance of about 120 km with realistic 107 finite data signals and approximately achieve 195 km with 109 signals.Moreover,our proposed protocol is robust against noise in the quantum channel and achieves a threshold error rate of 22.7%.
基金Supported by the National Natural Science Foundation of China under Grant Nos.U1304613 and 11204379
文摘The goal of quantum key distribution(QKD) is to generate secret key shared between two distant players,Alice and Bob. We present the connection between sampling rate and erroneous judgment probability when estimating error rate with random sampling method, and propose a method to compute optimal sampling rate, which can maximize final secure key generation rate. These results can be applied to choose the optimal sampling rate and improve the performance of QKD system with finite resources.
基金This work is supported by NSFC(Grant Nos.61572086,61402058)the Application Foundation Project of Sichuan Province of China(Grant No.2017JY0168)+3 种基金the National Key Research and Development Program(No.2017YFB0802302)Sichuan innovation team of quantum security communication(No.17TD0009)Sichuan academic and technical leaders training funding support projects(No.2016120080102643)the Fund for Middle and Young Academic Leaders of CUIT(Grant No.J201511).
文摘The secure key rate of quantum key distribution(QKD)is greatly reduced because of the untrusted devices.In this paper,to raise the secure key rate of QKD,a device-independent quantum key distribution(DIQKD)protocol is proposed based on hyper-entangled states and Bell inequalities.The security of the protocol is analyzed against the individual attack by an adversary only limited by the no-signaling condition.Based on the formalization of Clauser-Horne Shimony-Holt(CHSH)violation measurement on local correlation,the probability of a secure secret bit is obtained,which is produced by a pair of hyper-entangled particles.By analyzing the secure secret bit,it is proven that,when both the polarization mode and the path mode contains entangled-states,the DIQKD protocol gets a better secure key rate than common Bell states.
基金Project supported by the South African Research Chair Initiative of the Department of Science and Technology and National Research Foundation
文摘We investigate the effect of collective-rotation noise on the security of the six-state quantum key distribution. We study the case where the eavesdropper, Eve, performs an intercept-resend attack on the quantum communication between Alice, the sender, and Bob, the receiver. We first derive the collective-rotation noise model for the six-state protocol and then parameterize the mutual information between Alice and Eve. We then derive quantum bit error rate for three interceptresend attack scenarios. We observe that the six-state protocol is robust against intercept-resend attacks on collective rotation noise channels when the rotation angle is kept within certain bounds.
基金funded by Youth Fund of the National Natural Science Foundation of China,grant number 11504176,61601230.
文摘As one of the main application directions of quantum technology,underwater quantum communication is of great research significance.In order to study the influence of marine planktonic algal particles on the communication performance of underwater quantum links,based on the extinction characteristics of marine planktonic algal particles,the influence of changes in the chlorophyll concentration and particle number density of planktonic algal particles on the attenuation of underwater links is explored respectively,the influence of marine planktonic algal particles on the fidelity of underwater quantum links,the generation rate of the security key,and the utilization rate of the channel is analyzed,and simulation experiments are carried out.The results show that with the increase in chlorophyll concentration and particle density of aquatic planktonic algal particles,quantum communication channel link attenuation shows a gradually increasing trend.In addition,the security key generation rate,channel fidelity and utilization rate are gradually decreasing.Therefore,the performance of underwater quantum communication channel will be interfered by marine planktonic algal particles,and it is necessary to adjust the relevant parameter values in the quantum communication system according to different marine planktonic algal particle number density and chlorophyll concentration to improve the performance of quantum communication.
基金funded within the QuantERA II Programme(project CVSTAR)that has received funding from the European Union’s Horizon 2020 research and innovation program under Grant Agreement No 101017733Innovation Fund Denmark(IFD)under Grant Agreement No 731473+5 种基金the Austrian Research Promotion Agency(FFG),project number FO999891361from the European Union’s Digital Europe programme under Grant Agreement No 101091659(QCI.DK)from the European Union’s Horizon Europe research and innovation programme under the project“Quantum Security Networks Partnership”(QSNP,grant agreement no.101114043)A.A.E.H.,U.L.A.and T.G.acknowledge support from Innovation Fund Denmark(CryptQ,0175-00018A)the Danish National Research Foundation,Center for Macroscopic Quantum States(bigQ,DNRF142)A.A.E.H.,R.Z.and T.G.acknowledge funding from the Carlsberg Foundation,project CF21-0466.
文摘Establishing secure data communication necessitates secure key exchange over a public channel.Quantum key distribution(QKD),which leverages the principles of quantum physics,can achieve this with information-theoretic security.The discrete modulated(DM)continuous variable(CV)QKD protocol,in particular,is a suitable candidate for large-scale deployment of quantum-safe communication due to its simplicity and compatibility with standard high-speed telecommunication technology.Here,we present the first experimental demonstration of a four-state DM CVQKD system,successfully generating composable finite-size keys,secure against collective attacks over a 20 km fiber channel with 2.3×10^(9) coherent quantum states,achieving a positive composable key rate of 11.04×10^(-3) bits/symbol.This accomplishment is enabled by using an advanced security proof,meticulously selecting its parameters,and the fast,stable operation of the system.Our results mark a significant step toward the large-scale deployment of practical,high-performance,cost-effective,and highly secure quantum key distribution networks using standard telecommunication components.
基金Sopported by the National Natural Science Foun-dation of China(50099620)the National High Tichnology Devel-opment 863 Program of Chuna(2001AA132050-03)
文摘A significant method in the way the MCU EM78P447A manipulates the RF readerIC MF RC530's functions used in RF IC card application is presented.In this paper,RF reader ICMF RC530's SPI compatible interface is introduced.The kernel technologies including SPI connection,software design,register initiation,request-response between the reader 1C and the MCU,authentication and the proper format of the key are explained.Adopting the serial peripheralinterface is the innovation in the paper.TheSPI communication mode proves feasible and precise.Furthermore,in the way we avoid the abuse of parallel interface.
文摘Two fast and robust digital watermarking schemes for compressed music format and MIDI format are put forward, which are suitable for on-line distribution through the Internet. For compressed music, the watermark is embedded in partially uncompressed domain and the embedding scheme is closely related to music content. For MIDI, the watermark is embedded in virtual notes that are generated and randomly hide among the MIDI notes. This paper also presents a method for controlling usage and protecting against copying of digital music contents and their associated players. The digital music contents and their players installed in one computer cannot be used if they are copied to another computer. Even in the same computer, the duplicated digital music contents are not usable. The usage associated to the music content will restrict the running time and times. Also the music can be played and it will be automatically updated after each playing. The digital music cannot be accessible if its permitted usage expires.
文摘Recently, He et al. (Computers and Mathematics with Applications, 2012) proposed an efficient pairing-free certificateless authenticated key agreement (CL-AKA) protocol and claimed their protocol was provably secure in the extended Canetti-Krawczyk (eCK) model. By giving concrete attacks, we indicate that their protocol is not secure in the eCK model. We propose an improved protocol and show our improvement is secure in the eCK model under the gap DiffieHellman (GDH) assumption. Furthermore, the proposed protocol is very efficient.
基金supported by Natural Science Foundation of China(61801008)The China National Key R&D Program(No.2018YFB0803600)+1 种基金Scientific Research Common Program of Beijing Municipal Commission of Education(No.KM201910005025)Chinese Postdoctoral Science Foundation(No.2020M670074).
文摘Fog computing paradigm extends computing,communication,storage,and network resources to the network’s edge.As the fog layer is located between cloud and end-users,it can provide more convenience and timely services to end-users.However,in fog computing(FC),attackers can behave as real fog nodes or end-users to provide malicious services in the network.The attacker acts as an impersonator to impersonate other legitimate users.Therefore,in this work,we present a detection technique to secure the FC environment.First,we model a physical layer key generation based on wireless channel characteristics.To generate the secret keys between the legitimate users and avoid impersonators,we then consider a Double Sarsa technique to identify the impersonators at the receiver end.We compare our proposed Double Sarsa technique with the other two methods to validate our work,i.e.,Sarsa and Q-learning.The simulation results demonstrate that the method based on Double Sarsa outperforms Sarsa and Q-learning approaches in terms of false alarm rate(FAR),miss detection rate(MDR),and average error rate(AER).
基金supported by the National Natural Science Foundation of China(60773003,60603010)the Natural Science Foundation of Shaanxi Province(2006F19)
文摘McCullagh-Barreto key agreement protocol and its variant achieve perfect forward security and key generation center (KGC) forward security, but provide no resistance to key compromise impersonation attack (KCI attack). In this paper, we give a formal treatment of key compromise impersonation (KCI) attack and define the security notion against it. Then an variant of McCullagh-Barreto protocol is presented with only one more Hash operation. The improved protocol preserves perfect forward security and KGC forward security, and furthermore is proved to be secure against KCI attack under k-Gap-BCAA1 assumption.
文摘Clustering is the most significant task characterized in Wireless Sensor Networks (WSN) by data aggregation through each Cluster Head (CH). This leads to the reduction in the traffic cost. Due to the deployment of the WSN in the remote and hostile environments for the transmission of the sensitive information, the sensor nodes are more prone to the false data injection attacks. To overcome these existing issues and enhance the network security, this paper proposes a Secure Area based Clustering approach for data aggregation using Traffic Analysis (SAC-TA) in WSN. Here, the sensor network is clustered into small clusters, such that each cluster has a CH to manage and gather the information from the normal sensor nodes. The CH is selected based on the predefined time slot, cluster center, and highest residual energy. The gathered data are validated based on the traffic analysis and One-time Key Generation procedures to identify the malicious nodes on the route. It helps to provide a secure data gathering process with improved energy efficiency. The performance of the proposed approach is compared with the existing Secure Data Aggregation Technique (SDAT). The proposed SAC-TA yields lower average energy consumption rate, lower end-to-end delay, higher average residual energy, higher data aggregation accuracy and false data detection rate than the existing technique.
基金National Key Research and Development Program of China(2021YFB2801900)National Natural Science Foundation of China(U22A2089,62104203,62375228,62431024)+1 种基金Sichuan Science Fund for Distinguished Young Scholars(2023NSFSC1969)Fundamental Research Funds for the Central Universities(2682022CX024,2682023CG003)。
文摘Chaotic dynamics generated by vertical-cavity surface-emitting lasers(VCSELs)has stimulated a variety of applications in secure communication,random key distribution,and chaotic radar for its desirable characteristics.The application of machine learning has made great progress in the prediction of chaotic dynamics.However,the performance is constrained by the training datasets,tedious hyper-parameter optimization,and processing speed.Herein,we propose a heterogeneous forecasting scheme for chaotic dynamics in VCSELs with knowledge-based photonic reservoir computing.An additional imperfect physical model of a VCSEL is introduced into photonic reservoir computing to mitigate the deficiency of the purely data-based approach,which yields improved processing speed,increased accuracy,simplified parameter optimization,and reduced training data size.It is demonstrated that the performance of our proposed scheme is robust to the deficiency of the physical model.Moreover,we elucidate that the performance of knowledge-based photonic reservoir computing will fluctuate with the complexity of chaotic dynamics.Finally,the generality of our results is validated experimentally in parameter spaces of feedback strength and injection strength of reservoir computing.The proposed approach suggests new insights into the prediction of chaotic dynamics of semiconductor lasers.
基金Innovation Program for Quantum Science and Technology(2021ZD0300701,2021ZD0301500)CAS Project for Young Scientists in Basic Research(YSBR-069)+1 种基金National Natural Science Foundation of China(62075238,62205036)National Key Research and Development Program of China(2021YFB2800603)。
文摘With the widespread application of quantum communication technology,there is an urgent need to enhance unconditionally secure key rates and capacity.Measurement-device-independent quantum key distribution(MDI-QKD),proven to be immune to detection-side channel attacks,is a secure and reliable quantum communication scheme.The core of this scheme is Hong–Ou–Mandle(HOM)interference,a quantum optical phenomenon with no classical analog,where identical photons meeting on a symmetric beam splitter(BS)undergo interference and bunching.Any differences in the degrees of freedom(frequency,arrival time,spectrum,polarization,and the average number of photons per pulse)between the photons will deteriorate the interference visibility.Here,we demonstrate 16-channel weak coherent pulses(WCPs)of HOM interference with all channels’interference visibility over 46%based on two independent frequency-post-aligned soliton microcombs(SMCs).In our experiment,full locking and frequency alignment of the comb teeth between the two SMCs were achieved through pump frequency stabilization,SMC repetition rate locking,and fine tuning of the repetition rate.This demonstrates the feasibility of using independently generated SMCs as multi-wavelength sources for quantum communication.Meanwhile,SMC can achieve hundreds of frequency-stable comb teeth by locking only two parameters,which further reduces the complexity of frequency locking and the need for finding sufficient suitable frequency references compared to independent laser arrays.