共查询到20条相似文献,搜索用时 406 毫秒
1.
谢海鹏钱雨琦付炜王信别朝红 《中国电机工程学报》2023,(12):4485-4507
量子信息学在信息获取、传输和处理等方面具有独特优势,在保障新型电力系统信息安全和纾解算力困境等方面潜力巨大。从量子通信和量子计算2个方面,总结了电力系统应用背景下的量子信息学研究现状,并对未来可能的研究方向进行了展望。首先,介绍了量子信息学的基本概念和原理。然后,针对量子通信,分析了典型量子通信技术在新型电力系统中的适用性,并从远距离信息传输、多主体通信、统一标准化和专用研发平台4个方面了梳理电力系统中量子通信的研究现状;针对量子计算,从线性代数运算、优化问题求解、机器学习和参数估计等方面阐述归纳了量子算法的基本原理及其在电力系统中的研究现状。最后,面向新型电力系统中量子信息学的应用前景进行了展望,并提出了电力系统中量子信息学的发展建议。 相似文献
2.
量子密钥技术提升电力系统二次防护安全性研究 总被引:1,自引:0,他引:1
为增强电力二次系统抵御高性能计算攻击的能力,提出一种采用量子密钥对电力通信数据进行实时加解密处理的方法。首先,从技术成熟度和实用化角度,分析论证了量子密钥技术与电力二次防护系统结合的可行性;然后,提出一种量子密钥分配(quantum key distribution,QKD)系统与电力纵向加密认证装置的具体结合方式,并设计实现了用于QKD与纵向加密设备的信息交互和密钥管理方法;最后,探讨了在电力系统组建广域电力量子数据网络的实现方案和组网思路,无需调整现有网络结构,便可以实现规模化的应用部署。 相似文献
3.
信息资源共享,在计算机网络系统内,可能造成信息失密的部位是用户终端,系统控制中心及传输信道.因此,数据信息的保密,数据的完整性是计算机网络中极待解决的问题.COMSEC密码装置的研究,主要是研究计算机网络中用户存取通道上的数据加密处理技术,作者认为对传输信道的最大攻击是“劫抄”,对付非法存取的唯一有效对策是数据信息的密码化,即信息加密是围绕计算机系统的处理的信息本身实施信息保护.因此,COMSEC 密码装置为计算机网络内的存贮和传送信息提供了最本质的保密方式,适用于需要保密的任何领域. 相似文献
4.
5.
为解决网络上层出不穷的病毒、木马和漏洞等问题,通过量子信道传输客户端发出和接收的数据,数据在传输过程中经过量子进行身份认证,确认用户的真实性,避免他人假冒。若认证合格则传输到下一阶段,大大提升用户信息的安全性。量子通信过程使用专门的量子信道来传输信息,使信息不受外界的干扰,防止他人窃听。试验结果表明,通过量子通信技术,提高了通信网络的安全性能。 相似文献
6.
7.
8.
随着网络攻击手段的增强,信息泄露、篡改伪造、旁路控制等风险加剧,攻击者能够通过终端迂回攻击主站,造成更大范围的安全威胁。量子加密与传统密码体制相比,具有更高级别的安全性。提出一种适用于电力通信接入网的量子加密系统,设计了各类实用化量子通信设备;提出业务终端与量子密钥移动存储设备之间的密钥读取模式、业务终端设备与量子密钥移动存储设备之间的接口协议,以及适用于配用电业务终端的密钥管理方法。将量子通信技术应用到电力系统中,在保证电网安全、稳定、高效运行方面,发挥至关重要的作用。 相似文献
9.
10.
11.
介绍了在信息安全中起到重要作用的加密技术及其算法,比较了对称密码加密系统与公钥密码加密系统各自的优缺点,并探讨了改进的几种方法及其应用。密钥分配是保证安全性的关键。应从密钥的简单性、成本的低廉性,管理的简易性,算法的复杂性、保密的安全性及计算的快速性等方面综合考虑加密系统技术的改进。 相似文献
12.
介绍了椭圆曲线密码体制(ECC)和TSL协议的主要子协议Handshake的工作过程,提出了在TLS协议中应用椭圆曲线密码体制的签名、认证、数字信封的实现方案,该认证方案不依赖可信第三方,防止了骗取消息的可能。 相似文献
13.
14.
变电站自动化信息交换安全认证体系 总被引:3,自引:12,他引:3
分析了基于IEC61850体系的变电站自动化信息交换体系结构,基于数字证书和代理多重签名体制,提出一种实用与发展并重的变电站自动化信息交换安全认证体系。在变电站智能电子设备(IED)或变电站通信控制器中集成密码计算模块,采用普通的或代理的数字签名模式,实现信息交换过程中控制中心与变电站IED身份和信息完整性的认证。该安全认证体系符合IEC61850标准体系,密码计算采用国家密码管理委员会办公室指定的密码技术。 相似文献
15.
改进量子遗传算法在PID参数整定中应用 总被引:3,自引:0,他引:3
参数整定是PID控制器设计的关键,针对PID控制器参数整定问题,提出一种基于改进量子遗传算法的参数整定方法.该算法在基本量子遗传算法的基础上引入了量子交叉、量子变异和群体灾变操作.基于改进量子遗传算法的PID参数整定方法将PID控制器参数整定转化为参数优化问题,通过改进量子遗传算法的进化计算实现参数整定.与其他参数整定优化算法的仿真结果比较表明,该方法能获取更好的控制品质.仿真结果验证了该方法的可行性. 相似文献
16.
Masaya Yoshikawa Toshiya Asai Mitsuru Shiozaki Takeshi Fujino 《Electrical Engineering in Japan》2014,186(2):40-51
Recently, side‐channel attacks have become a serious problem. These attacks estimate the secret keys of cryptography circuits embedded in hardware. In particular, the most threatening side‐channel attacks are differential power analysis and correlation power analysis, which use the correlation between information processing and power consumption, which are related to secret keys in cryptography circuits. Therefore, new measures are required to prevent confidential information in cryptography circuits from being leaked to side‐channel information, such as power consumption. When designing preventive measures, resistance to side‐channel attacks, for instance tamper resistance, must be evaluated. This study proposes a new simulation method by which tamper resistance can be verified in the algorithm and architecture design phases. Experimental results show the validity of the proposed simulation method. © 2013 Wiley Periodicals, Inc. Electr Eng Jpn, 186(2): 40–51, 2014; Published online in Wiley Online Library ( wileyonlinelibrary.com ). DOI 10.1002/eej.22342 相似文献
17.
Cong Shuang Zheng Yisong Ji Beichen Dai Yi 《Frontiers of Electrical and Electronic Engineering in China》2007,2(2):132-138
The development of the theory on quantum systems control in the last 20 years is reviewed in detail. The research on the controllability
of quantum systems is first introduced, then the study on the quantum open-loop control methods often used for controlling
simple quantum systems is analyzed briefly. The learning control method and the feedback control method are mainly discussed
for they are two important methods in quantum systems control and their advantages and disadvantages are presented. According
to the trends in quantum systems control development, the paper predicts the future trends of its development and applications.
A complete design procedure necessary for the quantum control system is presented. Finally, several vital problems hindering
the advancement of quantum control are pointed out.
Translated from Chinese Journal of Quantum Electronics, 2003, 20(1): 1–9 [译自:: 量子电子学报] 相似文献
18.
A. Asenov J.R. Watling A.R. Brown D.K. Ferry 《Journal of Computational Electronics》2002,1(4):503-513
As MOSFETs are scaled to sub 100 nm dimensions, quantum mechanical confinement in the direction normal to the silicon dioxide interface and tunnelling (through the gate oxide, band-to-band and from source-to-drain) start to strongly affect their characteristics. Recently it has been demonstrated that first order quantum corrections can be successfully introduced in self-consistent drift diffusion-type models using Quantum Potentials. In this paper we describe the introduction of such quantum corrections within a full 3D drift diffusion simulation framework. We compare the two most popular quantum potential techniques: density gradient and the effective potential approaches, in terms of their justification, accuracy and computational efficiency. The usefulness of their 3D implementation is demonstrated with examples of statistical simulations of intrinsic fluctuation effects in decanano MOSFETs introduced by discrete random dopants. We also discuss the capability of the density gradient formalism to handle direct source-to-drain tunnelling in sub 10 nm double-gate MOSFETS, illustrated in comparison with Non-Equilibrium Green's Functions simulations. 相似文献
19.
量子力学和计算机理论,这两个看起来互不相关的领域,其结合却产生了一门富于成效的学科:量子计算机。介绍了量子计算机的基本概念和历史背景,分析了相对于经典计算机的优越性、构造和实验方案,以及实现量子计算的困难及其克服途径,展望了量子计算机的发展前景。 相似文献
20.
Because of the rapid development of quantum computation and of quantum technologies in general, computer scientists and electrical engineers will have to learn quantum mechanics (QM) in the near future. Although the teaching methods of QM are well established in both undergraduate and graduate physics courses, an effective method for teaching QM to computer scientists and electrical engineers is still lacking. This paper tries to fill this gap and suggests a new teaching method based on quantum cryptography. The goal of this paper is to show that computer scientists and electrical engineers can properly understand quantum theory without studying a degree in physics. 相似文献