期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Quantum-Secure OTN Framework Integrating QKD-PQC Technologies
1
作者 Wenliang Zhang Jiao Zhao +6 位作者 Bao Tang Wei Huang Binbin Xu Miao Li Linfeng Wang Bo Liu Gongchong Zhong 《Journal of Electronic Research and Application》 2025年第5期261-268,共8页
The Optical Transport Network(OTN)is a protocol for sending network messaging over optical fiber networks.Intelligent optical networks provide an ideal solution for high-bandwidth services.Currently,data encryption sc... The Optical Transport Network(OTN)is a protocol for sending network messaging over optical fiber networks.Intelligent optical networks provide an ideal solution for high-bandwidth services.Currently,data encryption schemes for OTN typically rely on mathematical problems such as elliptic curve cryptography or discrete logarithms,which are vulnerable to attacks by quantum computers.This paper investigates a quantum-secure OTN Framework that integrates Quantum Key Distribution(QKD)and Post-Quantum Cryptography(PQC)technologies,enabling OTN leased lines to resist quantum attacks.This framework can provide users with highly secure quantum-encrypted OTN leased lines services. 展开更多
关键词 OTN leased lines QKD Quantum key Quantum Security Service Platform
在线阅读 下载PDF
Practical decoy-state quantum secure direct communication 被引量:3
2
作者 Xin Liu Zijian Li +6 位作者 Di Luo Chunfeng Huang Di Ma Minming Geng Junwei Wang Zhenrong Zhang Kejin Wei 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2021年第12期68-75,共8页
Quantum secure direct communication(QSDC) has been demonstrated in both fiber-based and free-space channels using attenuated lasers. Decoy-state QSDC by exploiting four decoy states has been proposed to address the pr... Quantum secure direct communication(QSDC) has been demonstrated in both fiber-based and free-space channels using attenuated lasers. Decoy-state QSDC by exploiting four decoy states has been proposed to address the problem of photon-numbersplitting attacks caused by the use of attenuated lasers. In this study, we present an analysis of the practical aspects of decoy-state QSDC. First, we design a two-decoy-state protocol that only requires two decoy states, thereby significantly reducing experimental complexity. Second, we successfully perform full parameter optimization for a real-life QSDC system by introducing a genetic algorithm. Our simulation results show that the two-decoy-state protocol could be the best choice for developing a practical QSDC system. Furthermore, full optimization is crucial for a high-performance QSDC system. Our work serves as a major step toward the further development of practical decoy-state QSDC systems. 展开更多
关键词 quantum secure direct communication decoy-state method full parameter optimization
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部