期刊文献+
共找到7篇文章
< 1 >
每页显示 20 50 100
“密骗”、“觅骗”、“蔑骗”、“篾客”考
1
作者 贺卫国 《河池学院学报》 2015年第3期34-36,42,共4页
"密骗"、"觅骗"、"蔑骗"与"篾客"四词均指清客、门客、跟班之类帮闲凑趣之人,上述四词《汉语大词典》皆失收,部分学者对"密骗"、"觅骗"诠释不确。
关键词 密骗 篾客 篾片 音近义通
下载PDF
《欢喜冤家》词语拾零 被引量:2
2
作者 化振红 《古籍整理研究学刊》 CSSCI 2008年第1期57-58,共2页
对《欢喜冤家》中未见于各种大型工具书和断代词典的若干词语进行解释。
关键词 《欢喜冤家》 酷炭 密骗
下载PDF
Fluctuation Analysis of Decoy State QKD with Finite Data-Set Size 被引量:1
3
作者 唐少杰 焦荣珍 《Communications in Theoretical Physics》 SCIE CAS CSCD 2010年第9期443-446,共4页
Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will ca... Decoy state method quantum key distribution (QKD) is one of the promising practical solutions for BB84QKD with coherent light pulses.The number of data-set size in practical QKD protocol is always finite,which will causestatistical fluctuations.In this paper,we apply absolutely statistical fluctuation to amend the yield and error rate of thequantum state.The relationship between exchanged number of quantum signals and key generation rate is analyzed inour simulation,which offers a useful reference for experiment. 展开更多
关键词 quantum key distribution finite data-set size statistical fluctuation
下载PDF
Constructions of Cheating Immune Secret Sharing Functions 被引量:1
4
作者 卓泽朋 Zhang Weiguo Xiao Guozhen 《High Technology Letters》 EI CAS 2011年第1期102-105,共4页
Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanc... Based on the relationship between cheating immune secret sharing and cryptographic criteria of Boolean functions, to design a cheating immune secret sharing scheme, a 1-resilient function satisfying the strict avalanche criterion (SAC) is needed. In this paper, a technique on constructing a cheating immune secret sharing function is studied. By using Maiorana-McFarland construction technique, two new methods to construct cheating immune secret sharing functions are proposed. 展开更多
关键词 secret sharing Boolean function correlation immune strict avalanche criterion SAC) resilient function
下载PDF
Practical decoy-state quantum key distribution method considering dark count rate fluctuation 被引量:1
5
作者 周媛媛 江华 王瑛剑 《Optoelectronics Letters》 EI 2012年第5期384-388,共5页
Considering fluctuant dark count rate in practical quantum key distribution(QKD) system,a new decoy-state method with one vacuum state and one weak decoy state is presented based on a heralded single photon source(HSP... Considering fluctuant dark count rate in practical quantum key distribution(QKD) system,a new decoy-state method with one vacuum state and one weak decoy state is presented based on a heralded single photon source(HSPS).The method assumes that the dark count rate of each pulse is random and independent.The lower bound of the count rate and the upper bound of the error rate of a single photon state are estimated.The method is applied to the decoy-state QKD system with and without the fluctuation of dark count rate.Because the estimation of the upper bound of a single photon state's error rate is stricter,the method can obtain better performance than the existing methods under the same condition of implementation. 展开更多
关键词 Magnetic materials Optoelectronic devices
原文传递
SARG04 decoy-state quantum key distribution based on an unstable source 被引量:2
6
作者 周媛媛 周学军 《Optoelectronics Letters》 EI 2011年第5期389-393,共5页
A three-state protocol for the SARG04 decoy-state quantum key distribution(QKD)based on an unstable source is presented. The lower bound to the secure key generation rate is derived without using the basic hypothesis ... A three-state protocol for the SARG04 decoy-state quantum key distribution(QKD)based on an unstable source is presented. The lower bound to the secure key generation rate is derived without using the basic hypothesis of the original decoy-state idea.The three-state SARG04 decoy-state protocol with an unstable parametric down-conversion source is considered in the simulation.The simulation results show that the protocol in this paper with an unstable source gives a key generation rate that is close to that with a stable source,and only slight advantage appears by using a stable source when the transmission distance is long.So the SARG04 decoy-state protocol with an unstable source still can obtain the unconditional security with a slightly shortened final key. 展开更多
关键词 Network security Quantum chemistry Quantum theory
原文传递
Decoy-state measurement-device-independent quantum key distribution with mismatched-basis statistics 被引量:1
7
作者 ZHANG ChunMei LI Mo +3 位作者 YIN ZhenQiang LI HongWei CHEN Wei HAN ZhengFu 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2015年第9期1-4,共4页
Measurement-device-independent quantum key distribution(MDI-QKD) is aimed at removing all detector side channel attacks,while its security relies on the assumption that the encoding systems including sources are fully... Measurement-device-independent quantum key distribution(MDI-QKD) is aimed at removing all detector side channel attacks,while its security relies on the assumption that the encoding systems including sources are fully characterized by the two legitimate parties. By exploiting the mismatched-basis statistics in the security analysis, MDI-QKD even with uncharacterized qubits can generate secret keys. In this paper, considering the finite size effect, we study the decoy-state MDI-QKD protocol with mismatchedbasis events statistics by performing full parameter optimization, and the simulation result shows that this scheme is very practical. 展开更多
关键词 decoy-state method MDI-QKD full parameter optimization mismatched-basis statistics
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部