首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 44 毫秒
1.
Quantum secure direct communication (QSDC) can transmit secret messages directly from one user to another without first establishing a shared secret key, which is different from quantum key distribution. In this paper, we propose a novel quantum secure direct communication protocol based on signal photons and Bell states. Before the execution of the proposed protocol, two participants Alice and Bob exchange their corresponding identity IDA and IDB through quantum key distribution and keep them secret, respectively. Then the message sender, Alice, encodes each secret message bit into two single photons (| 01〉or|10〉) or a Bell state , and composes an ordered secret message sequence. To insure the security of communication, Alice also prepares the decoy photons and inserts them into secret message sequence on the basis of the values of IDA and IDB. By the secret identity IDA and IDB, both sides of the communication can check eavesdropping and identify each other. The proposed protocol not only completes secure direct communication, but also realizes the mutual authentication. The security analysis of the proposed protocol is presented in the paper. The analysis results show that this protocol is secure against some common attacks, and no secret message leaks even if the messages are broken. Compared with the two-way QSDC protocols, the presented protocol is a one-way quantum communication protocol which has the immunity to Trojan horse attack. Furthermore, our proposed protocol can be realized without quantum memory.  相似文献   

2.
从红外假目标的实际应用需求出发,开展了相变材料(PCM)用于假目标红外示假的理论和试验研究.首先通过建立厚金属板及相变材料复合板的一维热物理模型,优化设计相变材料性能参数并进行性能预测;在此基础上,进行了相变材料在红外假目标中应用的初步试验,结果表明示假效果优良,研究结果可为由环境温度驱动的红外假目标研制提供技术基础.  相似文献   

3.
声诱饵仿真系统中的关键技术   总被引:1,自引:0,他引:1       下载免费PDF全文
水面舰/潜艇对抗鱼雷的整个过程中,使用声诱饵对鱼雷进行软杀伤是一个重要的环节。为了在实验室条件下对声诱饵的性能进行一定程度的评估,作者建立了一个声诱饵仿真系统。文章就其中的一些关键技术从系统的角度进行了讨论。  相似文献   

4.
Poon TC  Kim T  Doh K 《Applied optics》2003,42(32):6496-6503
We propose a method for secure wireless transmission of encrypted information. By use of an encryption key, an image or document is optically encrypted by optical heterodyne scanning and hence encryption is performed on the fly. We call this technique optical scanning cryptography. The output of the heterodyne encrypted signal is at radio frequency and can be directly sent through an antenna to a secure site for digital storage to be prepared for decryption. In the secure site, an identical optical scanning system to that used for encryption is used, together with a decryption key, to generate an electrical signal. The electrical signal is then processed and sent to a computer to be used for decryption. Utilizing the stored information received from the encryption stage and the electrical information from the secure site, a digital decryption unit performs a decryption algorithm. If the encryption key and the decryption key are matched, the decryption unit will decrypt the image or document faithfully. The overall cryptosystem can perform the incoherent optical processing counterpart of the well-known coherent double-random phase-encoding technique. We present computer simulations of the idea.  相似文献   

5.
Abstract

Quantum cryptography has been shown to be an effective technology for the secure distribution of keys on point-to-point optical links. We show how the existing techniques can be extended to allow multi-user secure key distribution on optical networks. We demonstrate that using network configurations typical of those found in passive optical network architectures any of the current quantum key distribution protocols can be adapted to implement secure key distribution from any user to any other user. An important feature of these adapted protocols is that the broadcaster, or service provider on the network, does not have to be trusted by the two users who wish to establish a key.  相似文献   

6.
Details of an electro-optic, hybrid current-sensing instrument, and its application to high-voltage power line current measurement, are presented. The current is first detected via a Rogowski coil, followed by conversion of the detected current into a frequency-modulated optical pulse signal in the high-voltage area. Subsequently, the optical pulse signal is transmitted to the ground through an optical fiber cable. Finally, the measured current is recovered from the optical pulse signal by a ground-located signal-processing module. Compared with conventional current transformers, widely used for high-voltage line current measurement, this instrument provides a significant reduction in size, weight, and cost, together with features of convenient installation, secure operation, and high accuracy. Furthermore, it can be configured to be compatible with conventional secondary meters widely used in today's power plants and substations. In 1996, a prototype of this instrument was demonstrated online at a power substation and has shown good accuracy, stability, and safety for more than two years  相似文献   

7.
Quantum key agreement is a promising key establishing protocol that can play a significant role in securing 5G/6G communication networks. Recently, Liu et al. (Quantum Information Processing 18(8):1-10, 2019) proposed a multi-party quantum key agreement protocol based on four-qubit cluster states was proposed. The aim of their protocol is to agree on a shared secret key among multiple remote participants. Liu et al. employed four-qubit cluster states to be the quantum resources and the X operation to securely share a secret key. In addition, Liu et al.'s protocol guarantees that each participant makes an equal contribution to the final key. The authors also claimed that the proposed protocol is secure against participant attack and dishonest participants cannot generate the final shared key alone. However, we show here that Liu et al. protocol is insecure against a collusive attack, where dishonest participants can retrieve the private inputs of a trustworthy participant without being caught. Additionally, the corresponding modifications are presented to address these security flaws in Liu et al.'s protocol.  相似文献   

8.
为了研究线阵声诱饵对抗具有尺度识别能力鱼雷的性能,以分裂波束和方位走向法为例,分析了鱼雷对尺度目标回波的识别方法,以此为基础探讨了线阵声诱饵在对抗具有尺度识别能力鱼雷时的若干技术问题,通过仿真验证了线阵声诱饵对抗尺度识别能力鱼雷的有效性。本文证明了线阵式的声诱饵可以有效模拟舰船目标的尺度特征,在对抗有尺度识别能力的鱼雷时是很有意义的发展方向。本文所给出的仿真方法,除了建立线阵诱饵在诱骗有尺度识别功能鱼雷的仿真模型外,还可以作为物理模型应用在诱饵工作程序中,提供各阵元的延迟时间等声学参数。  相似文献   

9.
Smart Grid is a power grid that improves flexibility, reliability, and efficiency through smart meters. Due to extensive data exchange over the Internet, the smart grid faces many security challenges that have led to data loss, data compromise, and high power consumption. Moreover, the lack of hardware protection and physical attacks reduce the overall performance of the smart grid network. We proposed the BLIDSE model (Blockchain-based secure quantum key distribution and Intrusion Detection System in Edge Enables Smart Grid Network) to address these issues. The proposed model includes five phases: The first phase is blockchain-based secure user authentication, where all smart meters are first registered in the blockchain, and then the blockchain generates a secret key. The blockchain verifies the user ID and the secret key during authentication matches the one authorized to access the network. The secret key is shared during transmission through secure quantum key distribution (SQKD). The second phase is the lightweight data encryption, for which we use a lightweight symmetric encryption algorithm, named Camellia. The third phase is the multi-constraint-based edge selection; the data are transmitted to the control center through the edge server, which is also authenticated by blockchain to enhance the security during the data transmission. We proposed a perfect matching algorithm for selecting the optimal edge. The fourth phase is a dual intrusion detection system which acts as a firewall used to drop irrelevant packets, and data packets are classified into normal, physical errors and attacks, which is done by Double Deep Q Network (DDQN). The last phase is optimal user privacy management. In this phase, smart meter updates and revocations are done, for which we proposed Forensic based Investigation Optimization (FBI), which improves the security of the smart grid network. The simulation is performed using network simulator NS3.26, which evaluates the performance in terms of computational complexity, accuracy, false detection, and false alarm rate. The proposed BLIDSE model effectively mitigates cyber-attacks, thereby contributing to improved security in the network.  相似文献   

10.
The or-exclusive function (xor) is one of the most important logical functions, and can be used in several protocols and algorithms, as encryption and error correction. This paper discusses several ways to implement the xor function, in a secure way using quantum communication, between users of a network. It is shown how to implement it using bipartite, tripartite and four-partite maximally entangled states, as well using an optical interferometer and strongly attenuated coherent states. Some protocols for secure communication using the xor, as quantum key distribution, are also proposed.  相似文献   

11.
水声对抗系统中声诱饵仿真研究   总被引:6,自引:0,他引:6       下载免费PDF全文
孙仲阜 《声学技术》2003,22(2):113-116
声诱饵作为一种软对抗的水中兵器,其性能和使用方法对最终的对抗效果有着重要的影响。文章对声诱饵进行了声学性能和使用方法的仿真研究,并结合具体的仿真系统给出了一些仿真结论,对型号的研制和武器的使用具有一定的参考价值。  相似文献   

12.
The commercialization of the fifth-generation (5G) wireless network has begun. Massive devices are being integrated into 5G-enabled wireless sensor networks (5G WSNs) to deliver a variety of valuable services to network users. However, there are rising fears that 5G WSNs will expose sensitive user data to new security vulnerabilities. For secure end-to-end communication, key agreement and user authentication have been proposed. However, when billions of massive devices are networked to collect and analyze complex user data, more stringent security approaches are required. Data integrity, non-repudiation, and authentication necessitate special-purpose subtree-based signature mechanisms that are pretty difficult to create in practice. To address this issue, this work provides an efficient, provably secure, lightweight subtree-based online/offline signature procedure (SBOOSP) and its aggregation (Agg-SBOOSP) for massive devices in 5G WSNs using conformable chaotic maps. The SBOOSP enables multi-time offline storage access while reducing processing time. As a result, the signer can utilize the pre-stored offline information in polynomial time. This feature distinguishes our presented SBOOSP from previous online/offline-signing procedures that only allow for one signature. Furthermore, the new procedure supports a secret key during the pre-registration process, but no secret key is necessary during the offline stage. The suggested SBOOSP is secure in the logic of unforgeability on the chosen message attack in the random oracle. Additionally, SBOOSP and Agg-SBOOSP had the lowest computing costs compared to other contending schemes. Overall, the suggested SBOOSP outperforms several preliminary security schemes in terms of performance and computational overhead.  相似文献   

13.
本文提出了真,假目标红外图像相似性定量的计算方法.该方法应用小波变换将真、假目标的红外图像分解为不用层次的子图像;利用Harris角点检测算子提取不用层次子图像的特征点,构成特征点集;并利用改进的Hausdorff距离计算出特征点集之间的Hausdorff距离.该距离越小说明真、假目标的红外图像越相似,也就说明假目标的红外示假效果越好.实验结果证明该算法能客观准确的计算出真、假目标红外图像的相似度,计算过程快速.  相似文献   

14.
This study describes the experience of building a highly autonomous, secure, container tracking device using commercial, off-the-shelf, hardware to optimise and secure global trade lanes. We describe the motivation for the project and the hardware and software architectures. Our approach to power conservation is discussed, including a key decision algorithm to detect the loading of a container onto an ocean-going vessel. The paper concludes with findings and insights from various field-tests.  相似文献   

15.
相变材料应用于红外热成像假目标的探讨   总被引:1,自引:0,他引:1  
吴晓森  刘长利  张学骜  吴文健 《材料工程》2006,(Z1):264-267,270
红外热成像假目标因其独特的军事价值,受到了各国军队的广泛重视.分析了坦克红外热成像假目标的特殊要求,初步研究了相变材料应用于热成像假目标的技术途径,并验证了其可行性.  相似文献   

16.
宋君才 《声学技术》2020,39(4):430-433
随着水声电子对抗技术的不断发展,对于声诱饵系统边收边发技术的需求日益增强。实现边收边发技术的难点之一在于如何增大声诱饵系统发射端与接收端的隔离度。由于高分子吸声材料对声能的吸收作用,可以考虑采用在声诱饵接收端敷设吸声材料的方式,对声诱饵系统的隔离度进行改善。利用有限元计算软件对简化的声诱饵模型的隔离度进行数值仿真计算,分析声诱饵模型接收端敷设不同厚度的吸声材料时,对声诱饵系统隔离度的影响。计算结果表明,在声诱饵接收端敷设吸声材料时,可以增大声诱饵系统发射端与接收端的隔离度;当吸声材料达到一定厚度以后,对声诱饵系统隔离度的影响几乎不变。  相似文献   

17.
A secure optical storage based on a configuration of a joint transform correlator by use of a photorefractive material is presented. A key code designed through the use of an optimized algorithm so that its Fourier transform has a uniform amplitude distribution and a uniformly random phase distribution is introduced. Original two-dimensional data and the key code are placed side-by-side at the input plane. Both of them are stored in a photorefractive material as a joint power spectrum. The retrieval of the original data can be achieved with the same key code. We can record multiple two-dimensional data in the same crystal by angular multiplexing and/or key code multiplexing.  相似文献   

18.
In order to deploy a secure WLAN mesh network, authentication of both users and APs is needed, and a secure authentication mechanism should be employed. However, some additional configurations of trusted third party agencies are still needed on-site to deploy a secure authentication system. This paper proposes a new block chain-based authentication protocol for WLAN mesh security access, to reduce the deployment costs and resolve the issues of requiring key delivery and central server during IEEE 802.11X authentication. This method takes the user’s authentication request as a transaction, considers all the authentication records in the mesh network as the public ledger and realizes the effective monitoring of the malicious attack. Finally, this paper analyzes the security of the protocol in detail, and proves that the new method can solve the dependence of the authentication node on PKI and CA.  相似文献   

19.
In this paper, a phase-encoded measurement device independent quantum key distribution (MDI-QKD) protocol without a shared reference frame is presented, which can generate secure keys between two parties while the quantum channel or interferometer introduces an unknown and slowly time-varying phase. The corresponding secret key rate and single photons bit error rate is analysed, respectively, with single photons source (SPS) and weak coherent source (WCS), taking finite-key analysis into account. The numerical simulations show that the modified phase-encoded MDI-QKD protocol has apparent superiority both in maximal secure transmission distance and key generation rate while possessing the improved robustness and practical security in the high-speed case. Moreover, the rejection of the frame-calibrating part will intrinsically reduce the consumption of resources as well as the potential security flaws of practical MDI-QKD systems.  相似文献   

20.
现代"智能"鱼雷的一种对抗手段是发射诱骗编码寻的信号,因此需要相应发展"智能"的对抗器材。边发、边收声诱饵在发射应答信号时,不关闭接收机,从而可以不受诱骗编码的欺骗,在发射强干扰的同时测量鱼雷寻的信号的频率,来控制发射频率自动跟踪鱼雷寻的频率的变化,增强声诱饵的对抗能力。对于悬浮式声诱饵,边发、边收的关键技术是抗发射声串漏、界面反射声及混响的干扰。讨论了悬浮式矢量边发、边收声诱饵的组成和信号处理方法,利用矢量传感器的零点指向性抑制强干扰,可以使诱饵发射时也能探测微弱的寻的信号,并能测量鱼雷寻的信号的频率。  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号