检索规则说明:AND代表“并且”;OR代表“或者”;NOT代表“不包含”;(注意必须大写,运算符两边需空一格)
检 索 范 例 :范例一: (K=图书馆学 OR K=情报学) AND A=范并思 范例二:J=计算机应用与软件 AND (U=C++ OR U=Basic) NOT M=Visual
作 者:Jiaxin XU Xiao MA Jingyang LIU Chunhui ZHANG Hongwei LI Xingyu ZHOU Qin WANG
机构地区:[1]Institute of Quantum Information and Technology,Nanjing University of Posts and Telecommunications,Nanjing 210003,China [2]Telecommunication and Networks,National Engineering Research Center,Nanjing University of Posts and Telecommunications,Nanjing 210023,China [3]Henan Key Laboratory of Quantum Information and Cryptography,Strategic Support Force Information Engineering University,Zhengzhou 450001,China
出 处:《Science China(Information Sciences)》2024年第10期355-368,共14页中国科学(信息科学)(英文版)
基 金:supported by Industrial Prospect and Key Core Technology Projects of Jiangsu Provincial Key R&D Program(Grant No.BE2022071);National Natural Science Foundation of China(Grant Nos.12074194,12104240,62101285);Innovation Program for Quantum Science and Technology(Grant No.2021ZD0300701);Natural Science Foundation of Jiangsu Province(Grant Nos.BK20192001,BK20210582);Natural Science Foundation of the Jiangsu Higher Education Institutions(Grant No.21KJB140014);Postgraduate Research&Practice Innovation Program of Jiangsu Province(Grant No.KYCX23_1030)。
摘 要:The realistic security of quantum key distribution(QKD)systems is currently a hot research topic in the field of quantum communications.There are always defects in practical devices,and eavesdroppers can make use of the security risk points of various devices to obtain key information.To date,current types of security analysis tend to analyze each security risk point individually,thereby posing great challenges for the overall security evaluation of QKD systems.In this paper,for the first time,we employ machine learning algorithms to identify the defects of different devices and certain attacks in real time,with an accuracy of 98%.It provides a novel solution for the practical security evaluation of QKD systems,thereby addressing the bottleneck problem of multiple risk points being difficult to address simultaneously in QKD systems,thus paving the way for the future large-scale application of quantum communication networks.
关 键 词:quantum key distribution device imperfections eavasdropping attacks real-time detection machine learning algorithms
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在载入数据...
正在链接到云南高校图书馆文献保障联盟下载...
云南高校图书馆联盟文献共享服务平台 版权所有©
您的IP:216.73.216.195