期刊文献+
共找到1,099篇文章
< 1 2 55 >
每页显示 20 50 100
Parameters Optimization of Decoy-State Phase-Matching Quantum Key Distribution Based on the Nature-Inspired Algorithms
1
作者 Chang Liu Yue Li +4 位作者 Haoyang Wang Kaiyi Shi Duo Ma Yujia Zhang Haiqiang Ma 《Chinese Physics Letters》 2025年第1期23-27,共5页
Phase-matching quantum-key distribution(PM-QKD)has achieved significant results in various practical applications.However,real-time communication requires dynamic adjustment and optimization of key parameters during c... Phase-matching quantum-key distribution(PM-QKD)has achieved significant results in various practical applications.However,real-time communication requires dynamic adjustment and optimization of key parameters during communication.In this letter,we predict the PM-QKD parameters using nature-inspired algorithms(NIAs).The results are obtained from an exhaustive traversal algorithm(ETA),which serves as a benchmark.We mainly study the parameter optimization effects of the two NIAs:ant colony optimization(ACO)and the genetic algorithm(GA).The configuration of the inherent parameters of these algorithms in the decoy-state PM-QKD is also discussed.The simulation results indicate that the parameters obtained by the ACO exhibit superior convergence and stability,whereas the GA results are relatively scattered.Nevertheless,more than 97%of the key rates predicted by both algorithms are highly consistent with the optimal key rate.Moreover,the relative error of the key rates remained below 10%.Furthermore,NIAs maintain power consumption below 8 W and require three orders of magnitude less computing time than ETA. 展开更多
关键词 OPTIMIZATION SCATTERED LETTER
原文传递
A novel quantum information hiding protocol based on entanglement swapping of high-level Bell states 被引量:2
2
作者 徐淑奖 陈秀波 +2 位作者 王连海 钮心忻 杨义先 《Chinese Physics B》 SCIE EI CAS CSCD 2015年第5期231-238,共8页
Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, an... Using entanglement swapping of high-level Bell states, we first derive a covert layer between the secret message and the possible output results of the entanglement swapping between any two generalized Bell states, and then propose a novel high-efficiency quantum information hiding protocol based on the covert layer. In the proposed scheme, a covert channel can be built up under the cover of a high-level quantum secure direct communication (QSDC) channel for securely transmitting secret messages without consuming any auxiliary quantum state or any extra communication resource. It is shown that this protocol not only has a high embedding efficiency but also achieves a good imperceptibility as well as a high security. 展开更多
关键词 quantum information hiding quantum covert'channel entanglement swapping high-level Bell states
原文传递
Performance analysis of quantum key distribution using polarized coherent-states in free-space channel 被引量:1
3
作者 郑增特 陈子扬 +2 位作者 黄露雨 王翔宇 喻松 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第3期111-119,共9页
In free space channel,continuous-variable quantum key distribution(CV-QKD)using polarized coherent-states can not only make the signal state more stable and less susceptible to interference based on the polarization n... In free space channel,continuous-variable quantum key distribution(CV-QKD)using polarized coherent-states can not only make the signal state more stable and less susceptible to interference based on the polarization non-sensitive of the free-space channel,but also reduce the noise introduced by phase interference.However,arbitrary continuous modulation can not be carried out in the past polarization coding,resulting in that the signal state can not obtain arbitrary continuous value in Poincare space,and the security analysis of CV-QKD using polarized coherent-states in free space is not complete.Here we propose a new modulation method to extend the modulation range of signal states with an optical-fiber-based polarization controller.In particular,in terms of the main influence factors in the free-space channel,we utilize the beam extinction and elliptical model when considering the transmittance and adopt the formulation of secret key rate.In addition,the performance of the proposed scheme under foggy weather is also taken into consideration to reveal the influence of severe weather.Numerical simulation shows that the proposed scheme is seriously affected by attenuation under foggy weather.The protocol fails when visibility is less than 1 km.At the same time,the wavelength can affect the performance of the proposed scheme.Specifically,under foggy weather,the longer the wavelength,the smaller the attenuation coefficient,and the better the transmission performance.Our proposed scheme can expand the modulation range of signal state,and supplement the security research of the scheme in the free-space channel,thus can provide theoretical support for subsequent experiments. 展开更多
关键词 polarized coherent-states free-space channel performance analysis
原文传递
A Fully Symmetrical Quantum Key Distribution System Capable of Preparing and Measuring Quantum States
4
作者 Tianqi Dou Jipeng Wang +7 位作者 Zhenhua Li Wenxiu Qu Shunyu Yang Zhongqi Sun Fen Zhou Yanxin Han Yuqing Huang Haiqiang Ma 《Chinese Physics Letters》 SCIE CAS CSCD 2020年第11期1-5,共5页
We propose a fully symmetrical QKD system that enables quantum states to be prepared and measured simultaneously without compromising system performance.Over a 25.6 km fiber channel,we demonstrate point-to-point QKD o... We propose a fully symmetrical QKD system that enables quantum states to be prepared and measured simultaneously without compromising system performance.Over a 25.6 km fiber channel,we demonstrate point-to-point QKD operations with asymmetric Mach–Zehnder interferometer modules.Two interference visibilities of above99%indicate that the proposed system has excellent stability.Consequently,the scheme not only improves the feasibility of distributing secret keys,but also enables QKD closer to more practical applications. 展开更多
关键词 stability. system enable
原文传递
Geometric positioning integrating optical satellite stereo imagery and a global database of ICESat-2 laser control points:A framework and key technologies 被引量:3
5
作者 Mi Wang Yu Wei Yingdong Pi 《Geo-Spatial Information Science》 SCIE EI CSCD 2023年第2期206-217,共12页
Block Adjustment(BA)is one of the essential techniques for producing high-precision geospatial 3D data products with optical stereo satellite imagery.For block adjustment with few ground-control points or without grou... Block Adjustment(BA)is one of the essential techniques for producing high-precision geospatial 3D data products with optical stereo satellite imagery.For block adjustment with few ground-control points or without ground control,the vertical error of the model is the decisive factor that constrains the accuracy of 3D data products.The elevation data obtained by spaceborne laser altimeter have the advantages of short update periods,high positioning precision,and low acquisition cost,providing sufficient data support for improving the elevation accuracy of stereo models through the combined BA.This paper proposes a geometric positioning model based on the integration of Optical Satellite Stereo Imagery(OSSI)and spaceborne laser altimeter data.Firstly,we elaborate the principle and necessity of this work through a literature review of existing methods.Then,the framework of our geo-positioning models.Secondly,four key technologies of the proposed model are expounded in order,including the acquisition and management of global Laser Control Points,the association of LCPs and OSSI,the block adjustment model combining LCPs with OSSI,and the accuracy estimation and quality control of the combined BA.Next,the combined BA experiment using Ziyuan-3(ZY-3)OSSI and ICESat-2 laser data was carried out at the testing site in Shandong Province,China.Experimental results prove that our method can automatically select LCPs with high accuracy.The elevation deviation of the combined BA eventually achieved the Mean Error(ME)of 0.06 m and the Root Mean Square Error(RMSE)of 1.18 m,much lower than the ME of 13.20 m and the RMSE of 3.88 m before the block adjustment.A further research direction will be how to perform more adequate accuracy analysis and quality control using massive laser points as checkpoints. 展开更多
关键词 Spaceborne laser altimeter ICESat-2 optical stereo imagery ZY-3 combined block adjustment block adjustment without ground control geometric positioning stereo mapping
原文传递
Leaf pigment retrieval using the PROSAIL model: Influence of uncertainty in prior canopy-structure information 被引量:4
6
作者 Jia Sun Lunche Wang +5 位作者 Shuo Shi Zhenhai Li Jian Yang Wei Gong Shaoqiang Wang Torbern Tagesson 《The Crop Journal》 SCIE CSCD 2022年第5期1251-1263,共13页
Leaf pigments are critical indicators of plant photosynthesis,stress,and physiological conditions.Inversion of radiative transfer models(RTMs)is a promising method for robustly retrieving leaf biochem-ical traits from... Leaf pigments are critical indicators of plant photosynthesis,stress,and physiological conditions.Inversion of radiative transfer models(RTMs)is a promising method for robustly retrieving leaf biochem-ical traits from canopy observations,and adding prior information has been effective in alleviating the“ill-posed”problem,a major challenge in model inversion.Canopy structure parameters,such as leaf area index(LAI)and average leaf inclination angle(ALA),can serve as prior information for leaf pigment retrie-val.Using canopy spectra simulated from the PROSAIL model,we estimated the effects of uncertainty in LAI and ALA used as prior information for lookup table-based inversions of leaf chlorophyll(C _(ab))and car-otenoid(C_(ar)).The retrieval accuracies of the two pigments were increased by use of the priors of LAI(RMSE of C_(ab) from 7.67 to 6.32μg cm^(-2),C_(ar) from 2.41 to 2.28μg cm^(-2))and ALA(RMSE of C_(ab) from 7.67 to 5.72μg cm^(-2),C_(ar) from 2.41 to 2.23μg cm^(-2)).However,this improvement deteriorated with an increase of additive and multiplicative uncertainties,and when 40% and 20% noise was added to LAI and ALA respectively,these priors ceased to increase retrieval accuracy.Validation using an experimental winter wheat dataset also showed that compared with C_(ar),the estimation accuracy of C_(ab) increased more or deteriorated less with uncertainty in prior canopy structure.This study demonstrates possible limita-tions of using prior information in RTM inversions for retrieval of leaf biochemistry,when large uncer-tainties are present. 展开更多
关键词 Leaf pigment PROSAIL model Canopy structure Chlorophyll content Leaf area index Leaf angle distribution
在线阅读 下载PDF
Land Degradation Due to Salinization in Arid and Semi-arid Regions with the Aid of Geo-information Techniques 被引量:3
7
作者 MushtakT. Jabbar CHEN Xiaoling 《Geo-Spatial Information Science》 2008年第2期112-120,共9页
This study applied a computerized parametric methodology to monitor, map, and quantify land degradation by salinization risk detection techniques at a 1:250 000 mapping scale using geo-information technology. The nor... This study applied a computerized parametric methodology to monitor, map, and quantify land degradation by salinization risk detection techniques at a 1:250 000 mapping scale using geo-information technology. The northern part of the Shaanxi province in China was taken as a case. Multi-temporal remotely sensed materials of both Landsat TM and thematic maps (ETM+) were used as the bases to provide comprehensive views of surface conditions such as vegetation cover and salinization detection. With ERDAS ver. 9.1 software, the Normalized Differential Salinity Index (NDSl) and Salinity Index (S.I.) were computed and then evaluated for land degradation by salinization. Arc/Info ver. 9.2 software was used along with field observation data (GPS) for analysis. Using spatial analysis methods, results showed that 19 973.1 km^2 (72%) of land had no risk of land degradation by salinization, 3 684.7 km^2 (13%) had slight land degradation by salinization risk, 2 797.9 km^2 (10%) had moderate land degradation by salinization risk, and 1 218.9 km^2 (4%) of the total land area was at a high risk of land degradation by salinization. The study area, in general, is exposed to a high risk of soil salinization. 展开更多
关键词 geo-information techniques land degradation soil salinization indices
在线阅读 下载PDF
Efficient remote preparation of arbitrary twoand three-qubit states via the χ state 被引量:2
8
作者 马松雅 罗明星 《Chinese Physics B》 SCIE EI CAS CSCD 2014年第9期100-106,共7页
The application of χ state are investigated in remote state preparation (RSP). By constructing useful measurement bases with the aid of Hurwitz matrix equation, we propose several RSP schemes of arbitrary two- and ... The application of χ state are investigated in remote state preparation (RSP). By constructing useful measurement bases with the aid of Hurwitz matrix equation, we propose several RSP schemes of arbitrary two- and three-qubit states via the χ state as the entangled resource. It is shown that the original state can be successfully prepared with the probability 100% and 50% for real coefficients and complex coefficients, respectively. For the latter case, the special ensembles with unit success probability are discussed by the permutation group. It is worth mentioning that the novel measurement bases have no restrictions on the coefficients of the prepared state, which means that the proposed schemes are more applicable. 展开更多
关键词 χ state remote state preparation Hurwitz matrix equation measurement basis permutation group
原文传递
Deterministic Joint Remote Preparation of an Arbitrary Two-Qubit State Using the Cluster State 被引量:1
9
作者 王明明 陈秀波 杨义先 《Communications in Theoretical Physics》 SCIE CAS CSCD 2013年第5期568-572,共5页
Recently, deterministic joint remote state preparation (JRSP) schemes have been proposed to achieve 100% success probability. In this paper, we propose a new version of deterministic JRSP scheme of an arbitrary two-qu... Recently, deterministic joint remote state preparation (JRSP) schemes have been proposed to achieve 100% success probability. In this paper, we propose a new version of deterministic JRSP scheme of an arbitrary two-qubit state by using the six-qubit cluster state as shared quantum resource. Compared with previous schemes, our scheme has high efficiency since less quantum resource is required, some additional unitary operations and measurements are unnecessary. We point out that the existing two types of deterministic JRSP schemes based on GHZ states and EPR pairs are equivalent. 展开更多
关键词 joint remote state preparation cluster state unit success probability
原文传递
Novel Understanding of Electron States Architecture and Its Dimensionality in Semiconductors 被引量:3
10
作者 Xiaomin Ren 《Optics and Photonics Journal》 2013年第2期322-330,共9页
Some important insights into the electron-states-architecture (ESA) and its dimensionality (from 3 to 0) in a semiconductor (or generally crystalline) material are obtained. The self-consistency of the set of density ... Some important insights into the electron-states-architecture (ESA) and its dimensionality (from 3 to 0) in a semiconductor (or generally crystalline) material are obtained. The self-consistency of the set of density of states (DOS) expressions with different dimensionalities is remediated through the clarification and rearrangement of the wave-function boundary conditions for working out the eigenvalues in the wave vector space. The actually too roughly observed and theoretically unpredicted critical points for the dimensionality transitions referring to the integer ones are revealed upon an unusual assumption of the intrinsic energy-level dispersion (ELD). The ELD based quantitative physical model had been established on an immediate instinct at the very beginning and has been properly modified afterwards. The uncertainty regarding the relationship between the de Broglie wavelength of electrons and the dimensionality transitions, seeming somewhat mysterious before, is consequentially eliminated. The effect of the material dimensions on the ELD width is also predicted and has been included in the model. The continuous evolution of the ESA dimensionality is convincingly and comprehensively interpreted and thus the area of the fractional ESA dimensionalities is opened. Another new assumption of the spatial extension shrinkage (SES) closely related to the ELD has also been made and thus the understanding of the behavior of an electron or, in a general sense, a particle has become more comprehensive. This work would manifest itself a new basis for further development of nanoheterostructures (or low dimensional heterostructures including the quantum wells, quantum wires, quantum dots and especially the hetero-dimensional structures). Expected should also be the possible inventions of some novel electronic and optoelectronic devices. More basically, it leads to a new quantum mechanical picture, the essential modifications of Schr&ouml;dinger equation and Newtonian equation that give rise to a full cosmic-scope picture, and a super-low-speed relativity assumption. 展开更多
关键词 Energy-level Dispersion Spatial Extension Shrinkage Electron-states-architecture Density of States Di-mensionality Quantum Wells Wires and Dots Schr?dinger Equation Newtonian Equation RELATIVITY
暂未订购
An efficient quantum key distribution protocol with orthogonal product states 被引量:1
11
作者 杨宇光 温巧燕 《Chinese Physics B》 SCIE EI CAS CSCD 2007年第8期2215-2218,共4页
An efficient quantum key distribution (QKD) protocol with orthogonal product states in the 3 3 Hilbert space is presented. The sender, Alice, disorders the orthogonal product state sequence and sends it to Bob. Aft... An efficient quantum key distribution (QKD) protocol with orthogonal product states in the 3 3 Hilbert space is presented. The sender, Alice, disorders the orthogonal product state sequence and sends it to Bob. After Alice has published the matching information of the particle sequence, Bob recovers the correct correspondences and makes an orthogonal measurement on the orthogonal product states to obtain the information sent by Alice. Finally, security analysis is also made. 展开更多
关键词 quantum key distribution orthogonal product state orthogonal basis measurement
原文传递
Performance of phase-matching quantum key distribution based on wavelength division multiplexing technology 被引量:1
12
作者 马海强 韩雁鑫 +1 位作者 窦天琦 李鹏云 《Chinese Physics B》 SCIE EI CAS CSCD 2023年第2期103-107,共5页
Quantum key distribution(QKD) generates information-theoretical secure keys between two parties based on the physical laws of quantum mechanics. The phase-matching(PM) QKD protocol allows the key rate to break the qua... Quantum key distribution(QKD) generates information-theoretical secure keys between two parties based on the physical laws of quantum mechanics. The phase-matching(PM) QKD protocol allows the key rate to break the quantum channel secret key capacity limit without quantum repeaters, and the security of the protocol is demonstrated by using equivalent entanglement. In this paper, the wavelength division multiplexing(WDM) technique is applied to the PM-QKD protocol considering the effect of crosstalk noise on the secret key rate. The performance of PM-QKD protocol based on WDM with the influence of adjacent classical channels and Raman scattering is analyzed by numerical simulations to maximize the total secret key rate of the QKD, providing a reference for future implementations of QKD based on WDM techniques. 展开更多
关键词 quantum key distribution wavelength division multiplexing secret key rate
原文传递
Threshold Multiparty Controlled Teleportation of Arbitrary m-Qubit Quantum Information 被引量:1
13
作者 YANG Yu-Guang WEN Qiao-Yan 《Communications in Theoretical Physics》 SCIE CAS CSCD 2009年第10期593-596,共4页
We present a (t, .n) threshold multiparty controlled quantum teleportation protocol of an arbitrary m-qubit quantum state between two remote parties. The unknown m-qubit quantum state can be recovered by the receive... We present a (t, .n) threshold multiparty controlled quantum teleportation protocol of an arbitrary m-qubit quantum state between two remote parties. The unknown m-qubit quantum state can be recovered by the receiver under control of a subset of the n controllers if the number of the subset is larger than or equal to a threshold, say, t, but not for any t - 1 or fewer controllers. Our scheme seems to be more practical and more flexible than other existing protocols. The quantum resource required is just m Einstein-Podolsky-Rosen (EPR) pairs plus some single photons. The techniques required are only Bell state measurement, single-qubit unitary operation and yon Neumann measurement. So our scheme is also feasible with present-day technique. 展开更多
关键词 controlled teleportation threshold controlled teleportation ENTANGLEMENT
在线阅读 下载PDF
Analysis of Faraday Mirror in Auto-Compensating Quantum Key Distribution 被引量:1
14
作者 韦克金 马海强 +4 位作者 李瑞雪 朱武 刘宏伟 张勇 焦荣珍 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期9-13,共5页
The 'plug & play' quantum key distribution system is the most stable and the earliest commercial system in the quantum communication field. Jones matrix and Jones calculus are widely used in the analysis of this sy... The 'plug & play' quantum key distribution system is the most stable and the earliest commercial system in the quantum communication field. Jones matrix and Jones calculus are widely used in the analysis of this system and the improved version, which is called the auto-compensating quantum key distribution system. Unfortunately, existing analysis has two drawbacks: only the auto-compensating process is analyzed and existing systems do not fully consider laser phase affected by a Faraday mirror (FM). In this work, we present a detailed analysis of the output of light pulse transmitting in a plug & play quantum key distribution system that contains only an FM, by Jones calculus. A similar analysis is made to a home-made auto-compensating system which contains two FMs to compensate for environmental effects. More importantly, we show that theoretical and experimental results are different in the plug & play interferometric setup due to the fact that a conventional Jones matrix of FM neglected an additional phase π on alternative polarization direction. To resolve the above problem, we give a new Jones matrix of an FM according to the coordinate rotation. This new Jones matrix not only resolves the above contradiction in the plug & play interferometric setup, but also is suitable for the previous analyses about auto-compensating quantum key distribution. 展开更多
原文传递
Optimization of regenerator based on semiconductor optical amplifier for degraded differential phase shift keying signal
15
作者 马永欣 席丽霞 +1 位作者 陈光 张晓光 《Chinese Physics B》 SCIE EI CAS CSCD 2012年第6期318-323,共6页
Real time phase regeneration is necessary for degraded phase modulation format optical communication systems. A regenerator based on the discrimitive gain effect of a semiconductor optical amplifier was proposed in re... Real time phase regeneration is necessary for degraded phase modulation format optical communication systems. A regenerator based on the discrimitive gain effect of a semiconductor optical amplifier was proposed in recent years. In this paper, for this type of regenerator, its optimal working condition is found by solving the dynamic equations which describe the variance of the optical field and carrier density in the semiconductor optical amplifier by the finite difference method. The results show that the optimal improvement of signal Q factor can reach more than 2.2 dB. 展开更多
关键词 REGENERATOR semiconductor optical amplifier Q factor improvement phase noise
原文传递
Steganalysis and improvement of a quantum steganography protocol via a GHZ_4 state
16
作者 徐淑奖 陈秀波 +1 位作者 钮心忻 杨义先 《Chinese Physics B》 SCIE EI CAS CSCD 2013年第6期199-202,共4页
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography... Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency. 展开更多
关键词 quantum steganography GHZ4 entangled state quantum cryptography quantum communication
原文传递
Reference-frame-independent quantum key distribution of wavelength division multiplexing with multiple quantum channels
17
作者 Zhongqi Sun Yanxin Han +5 位作者 Tianqi Dou Jipeng Wang Zhenhua Li Fen Zhou Yuqing Huang Haiqiang Ma 《Chinese Physics B》 SCIE EI CAS CSCD 2021年第11期202-206,共5页
Reference-frame-independent quantum key distribution(RFI-QKD)can allow a quantum key distribution system to obtain the ideal key rate and transmission distance without reference system calibration,which has attracted ... Reference-frame-independent quantum key distribution(RFI-QKD)can allow a quantum key distribution system to obtain the ideal key rate and transmission distance without reference system calibration,which has attracted much attention.Here,we propose an RFI-QKD protocol based on wavelength division multiplexing(WDM)considering finite-key analysis and crosstalk.The finite-key bound for RFI-QKD with decoy states is derived under the crosstalk of WDM.The resulting secret key rate of RFI-QKD,which is more rigorous,is obtained.Simulation results reveal that the secret key rate of RFI-QKD based on WDM is affected by the multiplexing channel number,as well as crosstalk between adjacent channels. 展开更多
关键词 quantum key distribution wavelength division multiplexing secret key rate
原文传递
Feasibility of Double-Click Attack on a Passive Detection Quantum Key Distribution System
18
作者 ZHANG Peng LI Chao 《Chinese Physics Letters》 SCIE CAS CSCD 2011年第7期27-30,共4页
An eavesdropper(Eve)can exploit all the imperfections of a practical quantum key distribution(QKD)system to obtain some information about the secret key,no matter whether these imperfections are from the physical laye... An eavesdropper(Eve)can exploit all the imperfections of a practical quantum key distribution(QKD)system to obtain some information about the secret key,no matter whether these imperfections are from the physical layer or from the post-processing layer.We propose a possible attack on a passive detection QKD system based on the imperfection from the software layer.The analysis shows that Eve can obtain all the information about the key without being discovered. 展开更多
关键词 LAYER system QUANTUM
原文传递
Quaternion Approach to Solve Coupled Nonlinear Schrdinger Equation and Crosstalk of Quarter-Phase-Shift-Key Signals in Polarization Multiplexing Systems
19
作者 刘岚岚 吴重庆 +2 位作者 尚超 王健 高凯强 《Chinese Physics Letters》 SCIE CAS CSCD 2015年第8期78-82,共5页
The quaternion approach to solve the coupled nonlinear Schrodinger equations (CNSEs) in fibers is proposed, converting the CNSEs to a single variable equation by using a conception of eigen-quaternion of coupled qua... The quaternion approach to solve the coupled nonlinear Schrodinger equations (CNSEs) in fibers is proposed, converting the CNSEs to a single variable equation by using a conception of eigen-quaternion of coupled quater- nion. The crosstalk of quarter-phase-shift-key signals caused by fiber nonlinearity in polarization multiplexing systems with 100 Cbps bit-rate is investigated and simulated. The results demonstrate that the crosstalk is like a rotated ghosting of input constellation. For the 50 km conventional fiber link, when the total power is less than 4roW, the crosstalk effect can be neglected; when the power is larger than 20roW, the crosstalk is very obvious. In addition, the crosstalk can not be detected according to the output eye diagram and state of polarization in Poincare sphere in the trunk fiber, making it difficult for the monitoring of optical trunk link. 展开更多
关键词 In dinger Equation and Crosstalk of Quarter-Phase-Shift-Key Signals in Polarization Multiplexing Systems Quaternion Approach to Solve Coupled Nonlinear Schr
原文传递
Cryptanalysis of Key Exchange Protocol Based on Tensor Ergodic Problem
20
作者 Chunsheng Gu Youyu Gu +2 位作者 Peizhong Shi Chunpeng Ge Zhenjun Jing 《China Communications》 SCIE CSCD 2018年第10期172-181,共10页
Recently, Mao, Zhang, Wu et al. constructed two key exchange(KE) protocols based on tensor ergodic problem(TEP). Although they conjectured that these constructions can potentially resist quantum computing attack, they... Recently, Mao, Zhang, Wu et al. constructed two key exchange(KE) protocols based on tensor ergodic problem(TEP). Although they conjectured that these constructions can potentially resist quantum computing attack, they did not provide a rigorous security proof for their KE protocols. In this paper, applying the properties of ergodic matrix, we first present a polynomial time algorithm to solve the TEP problem using O(n^6) arithmetic operations in the finite field, where n is the security parameter. Then, applying this polynomial time algorithm, we generate a common shared key for two TEP-based KE constructions, respectively. In addition, we also provide a polynomial time algorithm with O(n^6) arithmetic operations that directly recovers the plaintext from a ciphertext for the KE-based encryption scheme. Thus, the TEP-based KE protocols and their corresponding encryption schemes are insecure. 展开更多
关键词 key exchange KE-based encryption tensor decomposition ergodic matrix
在线阅读 下载PDF
上一页 1 2 55 下一页 到第
使用帮助 返回顶部