A new structure of bit-parallel Polynomial Basis(PB)multiplier is proposed,which isbased on a fast modular reduction method.The method was recommended by the National Instituteof Standards and Technology(NIST).It take...A new structure of bit-parallel Polynomial Basis(PB)multiplier is proposed,which isbased on a fast modular reduction method.The method was recommended by the National Instituteof Standards and Technology(NIST).It takes advantage of the characteristics of irreducible polyno-mial,i.e.,the degree of the second item of irreducible polynomial is far less than the degree of thepolynomial in the finite fields GF(2m).Deductions are made for a class of finite field in which trino-mials are chosen as irreducible polynomials.Let the trinomial bex m +x k+1,where 1 ≤k≤?m/2?.??The proposed structure has shorter critical path than the best known one up to date,whilethe space requirement keeps the same.The structure is practical,especially in real time crypto-graphic applications.展开更多
Permeability is a vital property of rock mass, which is highly affected by tectonic stress and human engineering activities. A comprehensive monitoring of pore pressure and flow rate distributions inside the rock mass...Permeability is a vital property of rock mass, which is highly affected by tectonic stress and human engineering activities. A comprehensive monitoring of pore pressure and flow rate distributions inside the rock mass is very important to elucidate the permeability evolution mechanisms, which is difficult to realize in laboratory, but easy to be achieved in numerical simulations. Therefore, the particle flow code (PFC), a discrete element method, is used to simulate permeability behaviors of rock materials in this study. Owe to the limitation of the existed solid-fluid coupling algorithm in PFC, an improved flow-coupling algorithm is presented to better reflect the preferential flow in rock fractures. The comparative analysis is conducted between original and improved algorithm when simulating rock permeability evolution during triaxial compression, showing that the improved algorithm can better describe the experimental phenomenon. Furthermore, the evolution of pore pressure and flow rate distribution during the flow process are analyzed by using the improved algorithm. It is concluded that during the steady flow process in the fractured specimen, the pore pressure and flow rate both prefer transmitting through the fractures rather than rock matrix. Based on the results, fractures are divided into the following three types: I) fractures link to both the inlet and outlet, II) fractures only link to the inlet, and III) fractures only link to the outlet. The type I fracture is always the preferential propagating path for both the pore pressure and flow rate. For type II fractures, the pore pressure increases and then becomes steady. However, the flow rate increases first and begins to decrease after the flow reaches the stop end of the fracture and finally vanishes. There is no obvious pore pressure or flow rate concentration within type III fractures.展开更多
We study the properties of the three-mode Einstein-Podolsky-Rose (EPR) eigenstate and its application in quantum dense coding. Our result shows that the three-mode EPR eigenstate provides a convenient way to realize q...We study the properties of the three-mode Einstein-Podolsky-Rose (EPR) eigenstate and its application in quantum dense coding. Our result shows that the three-mode EPR eigenstate provides a convenient way to realize quantum dense coding when the quantum channel is a three-mode squeezed state.展开更多
Evolutionary algorithm is applied for distillation separation sequence optimization synthesis problems with combination explosion. The binary tree data structure is used to describe the distillation separation sequenc...Evolutionary algorithm is applied for distillation separation sequence optimization synthesis problems with combination explosion. The binary tree data structure is used to describe the distillation separation sequence, and it is directly applied as the coding method. Genetic operators, which ensure to prohibit illegal filial generations completely, are designed by using the method of graph theory. The crossover operator based on a single parent or two parents is designed successfully. The example shows that the average ratio of search space from evolutionary algorithm with two-parent genetic operation is lower, whereas the rate of successful minimizations from evolutionary algorithm with single parent genetic operation is higher.展开更多
We present a global optimization method, called the real-code genetic algorithm (RGA), to the ground state energies. The proposed method does not require partial derivatives with respect to each variational parameter ...We present a global optimization method, called the real-code genetic algorithm (RGA), to the ground state energies. The proposed method does not require partial derivatives with respect to each variational parameter or solving an eigenequation, so the present method overcomes the major difficulties of the variational method. RGAs also do not require coding and encoding procedures, so the computation time and complexity are reduced. The ground state energies of hydrogenic donors in GaAs-(Ga,Al)As quantum dots have been calculated for a range of the radius of the quantum dot radii of practical interest. They are compared with those obtained by the variational method. The results obtained demonstrate the proposed method is simple, accurate, and easy implement.展开更多
Considering that the hardware implementation of the normalized minimum sum(NMS)decoding algorithm for low-density parity-check(LDPC)code is difficult due to the uncertainty of scale factor,an NMS decoding algorithm wi...Considering that the hardware implementation of the normalized minimum sum(NMS)decoding algorithm for low-density parity-check(LDPC)code is difficult due to the uncertainty of scale factor,an NMS decoding algorithm with variable scale factor is proposed for the near-earth space LDPC codes(8177,7154)in the consultative committee for space data systems(CCSDS)standard.The shift characteristics of field programmable gate array(FPGA)is used to optimize the quantization data of check nodes,and finally the function of LDPC decoder is realized.The simulation and experimental results show that the designed FPGA-based LDPC decoder adopts the scaling factor in the NMS decoding algorithm to improve the decoding performance,simplify the hardware structure,accelerate the convergence speed and improve the error correction ability.展开更多
A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum comp...A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers.展开更多
Image subbands can be obtained by using filterbank. Traditional compression method uses direct entropy coding for each subband. After studying the energy distribution in image subbands, we proposed a vector quantizati...Image subbands can be obtained by using filterbank. Traditional compression method uses direct entropy coding for each subband. After studying the energy distribution in image subbands, we proposed a vector quantization (VQ) coding algorithm to image subband. In the algorithm, vector quantizers were adaptively designed for high-frequency bands in an image. In particular, the edges of the image were examined and fewer bits were assigned to high-energy regions. The experimental result showed that the algorithm had higher SNR and higher compression ratio than possible by traditional subband coding, JPEG and JPEG 2000.展开更多
We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryp...We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack.展开更多
The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes ...The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes has developed rapidly and been extended to protect quantum information over asymmetric quantum channels, in which phase-shift and qubit-flip errors occur with different probabilities. In this paper, we generalize the construction of symmetric quantum codes via graphs (or matrices) to the asymmetric case, converting the construction of asymmetric quantum codes to finding matrices with some special properties. We also propose some asymmetric quantum Maximal Distance Separable (MDS) codes as examples constructed in this way.展开更多
This paper presents the neutron energy spectrum in the central position of a neutron flux trap assembled in the core center of the research nuclear reactor IPEN/MB-01, obtained by an unfolding method. To this end, we ...This paper presents the neutron energy spectrum in the central position of a neutron flux trap assembled in the core center of the research nuclear reactor IPEN/MB-01, obtained by an unfolding method. To this end, we have used several different types of activation foils (Au, Sc, Ti, Ni, and plates) which have been irradiated in the central position of the reactor core (setting number 203) at a reactor power level (64.57±2.91 watts). The activation foils were counted by solid-state detector HPGe (high pure germanium detector) (gamma spectrometry). The experimental data of nuclear reaction rates (saturated activity per target nucleus) and a neutron spectrum estimated by a reactor physics computer code are the main input data to get the most suitable neutron spectrum in the irradiation position obtained through SANDBP (spectrum analysis neutron detection code-version Budapest University) code: a neutron spectra unfolding code that uses an iterative adjustment method. the integral neutron flux, (2.41 ± 0.01) × 10^9 n·cm^-2·s^-1 for the thermal The adjustment resulted in (3.85 ± 0.14) × 10^9 n·cm^-2·s^-1 for neutron flux, (1.09 ±0.02) × 10^9n·cm^-2·s^-1 for intermediate neutron flux and (3.41 ± 0.02) × 10^8 n·cm^-2·s^-1 for the fast neutrons flux. These results can be used to verify and validate the nuclear reactor codes and its associated nuclear data libraries, besides, show how much effective it can be that the use of a neutron flux trap in the nuclear reactor core to increase the thermal neutron flux without increase the operation reactor power level. The thermal neutral flux increased 4.04 ± 0.21 times compared with the standard configuration of the reactor core.展开更多
The decoding algorithms of two-dimensional Vernier anodes are deduced theoretically.The precision of decoding and uniqueness of encoding are proved.The influencing factors of detection sensitivity and spatial resoluti...The decoding algorithms of two-dimensional Vernier anodes are deduced theoretically.The precision of decoding and uniqueness of encoding are proved.The influencing factors of detection sensitivity and spatial resolution are discussed.The single photon imaging system is constructed,and the two-dimensional Vernier collector is fabricated.The image of the ultra-weak emission source is reconstructed.The spatial resolution of the system is about 100μm.展开更多
An effective method for eddy current calculation has been developed for EAST’s new divertor by using ANSYS.A 3D model of a double null divertor for the EAST device was built to evaluate eddy currents and electromagne...An effective method for eddy current calculation has been developed for EAST’s new divertor by using ANSYS.A 3D model of a double null divertor for the EAST device was built to evaluate eddy currents and electromagnetic(EM)forces on these components.The main input to the model is the plasma current and poloidal field coil currents,which are loaded into the model using experimental data measured from the EAST discharges.These currents generate magnetic fields that match those producing an EAST discharge,and the time variation of these fields produces the eddy currents in the divertors,along with from the resulting EM forces.In addition,the first 10 time steps were discussed for the eddy current generation and changing trend.It indicates that a static analysis before a transient mode start can solve the eddy current origination in the initial time steps.With this method,the EM transient response of EAST’s new divertor can be predicted based on ANSYS simulations.Furthermore,the method is also an effective approach to estimate the EM results for the in-vessel components of a fusion reactor during a disruption.展开更多
Quantum error correction plays an important role in fault-tolerant quantum information processing.It is usually difficult to experimentally realize quantum error correction,as it requires multiple qubits and quantum g...Quantum error correction plays an important role in fault-tolerant quantum information processing.It is usually difficult to experimentally realize quantum error correction,as it requires multiple qubits and quantum gates with high fidelity.Here we propose a simple quantum error-correcting code for the detected amplitude damping channel.The code requires only two qubits.We implement the encoding,the channel,and the recovery on an optical platform,the IBM Q System,and a nuclear magnetic resonance system.For all of these systems,the error correction advantage appears when the damping rate exceeds some threshold.We compare the features of these quantum information processing systems used and demonstrate the advantage of quantum error correction on current quantum computing platforms.展开更多
Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important rol...Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.展开更多
基金the Hi-Tech Research and DevelopmentProgram of China(863)(No.2003AA1Z1060).
文摘A new structure of bit-parallel Polynomial Basis(PB)multiplier is proposed,which isbased on a fast modular reduction method.The method was recommended by the National Instituteof Standards and Technology(NIST).It takes advantage of the characteristics of irreducible polyno-mial,i.e.,the degree of the second item of irreducible polynomial is far less than the degree of thepolynomial in the finite fields GF(2m).Deductions are made for a class of finite field in which trino-mials are chosen as irreducible polynomials.Let the trinomial bex m +x k+1,where 1 ≤k≤?m/2?.??The proposed structure has shorter critical path than the best known one up to date,whilethe space requirement keeps the same.The structure is practical,especially in real time crypto-graphic applications.
基金Project(BK20150005) supported by the Natural Science Foundation of Jiangsu Province for Distinguished Young Scholars, China Project(2015XKZD05) supported by the Fundamental Research Funds for the Central Universities, China
文摘Permeability is a vital property of rock mass, which is highly affected by tectonic stress and human engineering activities. A comprehensive monitoring of pore pressure and flow rate distributions inside the rock mass is very important to elucidate the permeability evolution mechanisms, which is difficult to realize in laboratory, but easy to be achieved in numerical simulations. Therefore, the particle flow code (PFC), a discrete element method, is used to simulate permeability behaviors of rock materials in this study. Owe to the limitation of the existed solid-fluid coupling algorithm in PFC, an improved flow-coupling algorithm is presented to better reflect the preferential flow in rock fractures. The comparative analysis is conducted between original and improved algorithm when simulating rock permeability evolution during triaxial compression, showing that the improved algorithm can better describe the experimental phenomenon. Furthermore, the evolution of pore pressure and flow rate distribution during the flow process are analyzed by using the improved algorithm. It is concluded that during the steady flow process in the fractured specimen, the pore pressure and flow rate both prefer transmitting through the fractures rather than rock matrix. Based on the results, fractures are divided into the following three types: I) fractures link to both the inlet and outlet, II) fractures only link to the inlet, and III) fractures only link to the outlet. The type I fracture is always the preferential propagating path for both the pore pressure and flow rate. For type II fractures, the pore pressure increases and then becomes steady. However, the flow rate increases first and begins to decrease after the flow reaches the stop end of the fracture and finally vanishes. There is no obvious pore pressure or flow rate concentration within type III fractures.
文摘We study the properties of the three-mode Einstein-Podolsky-Rose (EPR) eigenstate and its application in quantum dense coding. Our result shows that the three-mode EPR eigenstate provides a convenient way to realize quantum dense coding when the quantum channel is a three-mode squeezed state.
文摘Evolutionary algorithm is applied for distillation separation sequence optimization synthesis problems with combination explosion. The binary tree data structure is used to describe the distillation separation sequence, and it is directly applied as the coding method. Genetic operators, which ensure to prohibit illegal filial generations completely, are designed by using the method of graph theory. The crossover operator based on a single parent or two parents is designed successfully. The example shows that the average ratio of search space from evolutionary algorithm with two-parent genetic operation is lower, whereas the rate of successful minimizations from evolutionary algorithm with single parent genetic operation is higher.
文摘We present a global optimization method, called the real-code genetic algorithm (RGA), to the ground state energies. The proposed method does not require partial derivatives with respect to each variational parameter or solving an eigenequation, so the present method overcomes the major difficulties of the variational method. RGAs also do not require coding and encoding procedures, so the computation time and complexity are reduced. The ground state energies of hydrogenic donors in GaAs-(Ga,Al)As quantum dots have been calculated for a range of the radius of the quantum dot radii of practical interest. They are compared with those obtained by the variational method. The results obtained demonstrate the proposed method is simple, accurate, and easy implement.
文摘Considering that the hardware implementation of the normalized minimum sum(NMS)decoding algorithm for low-density parity-check(LDPC)code is difficult due to the uncertainty of scale factor,an NMS decoding algorithm with variable scale factor is proposed for the near-earth space LDPC codes(8177,7154)in the consultative committee for space data systems(CCSDS)standard.The shift characteristics of field programmable gate array(FPGA)is used to optimize the quantization data of check nodes,and finally the function of LDPC decoder is realized.The simulation and experimental results show that the designed FPGA-based LDPC decoder adopts the scaling factor in the NMS decoding algorithm to improve the decoding performance,simplify the hardware structure,accelerate the convergence speed and improve the error correction ability.
基金Project(61379057)supported by the National Natural Science Foundation of ChinaProject supported by the Construct Program of the Key Discipline in Hunan University of Arts and Science,China+1 种基金Project(2012BS01)supported by Science Technology Research and Development Projects of Changde,ChinaProject supported by Science and the MEST2012-002521,NRF,Korea
文摘A quantum group signature(QGS) scheme is proposed on the basis of an improved quantum chaotic encryption algorithm using the quantum one-time pad with a chaotic operation string. It involves a small-scale quantum computation network in three phases, i.e. initializing phase, signing phase and verifying phase. In the scheme, a member of the group signs the message on behalf of the group while the receiver verifies the signature's validity with the aid of the trusty group manager who plays a crucial role when a possible dispute arises. Analysis result shows that the signature can neither be forged nor disavowed by any malicious attackers.
文摘Image subbands can be obtained by using filterbank. Traditional compression method uses direct entropy coding for each subband. After studying the energy distribution in image subbands, we proposed a vector quantization (VQ) coding algorithm to image subband. In the algorithm, vector quantizers were adaptively designed for high-frequency bands in an image. In particular, the edges of the image were examined and fewer bits were assigned to high-energy regions. The experimental result showed that the algorithm had higher SNR and higher compression ratio than possible by traditional subband coding, JPEG and JPEG 2000.
基金supported by the National Natural Science Foundation of China under Grant No. 61173157Strategy Pilot Project of Chinese Academy of Sciences under Grant No. XD06010702IIE's Cryptography Research Project
文摘We present a quantum probabilistic encryption algorithm for a private-key encryption scheme based on conjugate coding of the qubit string. A probabilistic encryption algorithm is generally adopted in public-key encryption protocols. Here we consider the way it increases the unicity distance of both classical and quantum private-key encryption schemes. The security of quantum probabilistic privatekey encryption schemes against two kinds of attacks is analyzed. By using the no-signalling postulate, we show that the scheme can resist attack to the key. The scheme's security against plaintext attack is also investigated by considering the information-theoretic indistinguishability of the encryption scheme. Finally, we make a conjecture regarding Breidbart's attack.
基金supported by the National High Technology Research and Development Program of China under Grant No. 2011AA010803
文摘The theory of quantum error correcting codes is a primary tool for fighting decoherence and other quantum noise in quantum communication and quantum computation. Recently, the theory of quantum error correcting codes has developed rapidly and been extended to protect quantum information over asymmetric quantum channels, in which phase-shift and qubit-flip errors occur with different probabilities. In this paper, we generalize the construction of symmetric quantum codes via graphs (or matrices) to the asymmetric case, converting the construction of asymmetric quantum codes to finding matrices with some special properties. We also propose some asymmetric quantum Maximal Distance Separable (MDS) codes as examples constructed in this way.
文摘This paper presents the neutron energy spectrum in the central position of a neutron flux trap assembled in the core center of the research nuclear reactor IPEN/MB-01, obtained by an unfolding method. To this end, we have used several different types of activation foils (Au, Sc, Ti, Ni, and plates) which have been irradiated in the central position of the reactor core (setting number 203) at a reactor power level (64.57±2.91 watts). The activation foils were counted by solid-state detector HPGe (high pure germanium detector) (gamma spectrometry). The experimental data of nuclear reaction rates (saturated activity per target nucleus) and a neutron spectrum estimated by a reactor physics computer code are the main input data to get the most suitable neutron spectrum in the irradiation position obtained through SANDBP (spectrum analysis neutron detection code-version Budapest University) code: a neutron spectra unfolding code that uses an iterative adjustment method. the integral neutron flux, (2.41 ± 0.01) × 10^9 n·cm^-2·s^-1 for the thermal The adjustment resulted in (3.85 ± 0.14) × 10^9 n·cm^-2·s^-1 for neutron flux, (1.09 ±0.02) × 10^9n·cm^-2·s^-1 for intermediate neutron flux and (3.41 ± 0.02) × 10^8 n·cm^-2·s^-1 for the fast neutrons flux. These results can be used to verify and validate the nuclear reactor codes and its associated nuclear data libraries, besides, show how much effective it can be that the use of a neutron flux trap in the nuclear reactor core to increase the thermal neutron flux without increase the operation reactor power level. The thermal neutral flux increased 4.04 ± 0.21 times compared with the standard configuration of the reactor core.
基金supported by the National Natural Science Foundation of China (Grant No. 10878005/A03)
文摘The decoding algorithms of two-dimensional Vernier anodes are deduced theoretically.The precision of decoding and uniqueness of encoding are proved.The influencing factors of detection sensitivity and spatial resolution are discussed.The single photon imaging system is constructed,and the two-dimensional Vernier collector is fabricated.The image of the ultra-weak emission source is reconstructed.The spatial resolution of the system is about 100μm.
基金supported by the National Basic Research Program of China("973"Program)(Grant No.2013GB10200)
文摘An effective method for eddy current calculation has been developed for EAST’s new divertor by using ANSYS.A 3D model of a double null divertor for the EAST device was built to evaluate eddy currents and electromagnetic(EM)forces on these components.The main input to the model is the plasma current and poloidal field coil currents,which are loaded into the model using experimental data measured from the EAST discharges.These currents generate magnetic fields that match those producing an EAST discharge,and the time variation of these fields produces the eddy currents in the divertors,along with from the resulting EM forces.In addition,the first 10 time steps were discussed for the eddy current generation and changing trend.It indicates that a static analysis before a transient mode start can solve the eddy current origination in the initial time steps.With this method,the EM transient response of EAST’s new divertor can be predicted based on ANSYS simulations.Furthermore,the method is also an effective approach to estimate the EM results for the in-vessel components of a fusion reactor during a disruption.
基金supported by the National Natural Science Foundation for the Youth of China (11804410)partial support by the Foundation for Polish Science (IRAP project, ICTQT, contract No. 2018/MAB/5, cofinanced by EU within the Smart Growth Operational Programme)+5 种基金supported by the National Natural Science Foundation of China (11574291, 11774334)supported by the National Natural Science Foundation of China (11975117, 11875159, 11905099, and U1801661)Guangdong Basic and Applied Basic Research Foundation (2019A1515011383)Guangdong Provincial Key Laboratory (2019B121203002)supported by National Natural Science Foundation of China (61771278)Beijing Institute of Technology Research Fund Program for Young Scholars
文摘Quantum error correction plays an important role in fault-tolerant quantum information processing.It is usually difficult to experimentally realize quantum error correction,as it requires multiple qubits and quantum gates with high fidelity.Here we propose a simple quantum error-correcting code for the detected amplitude damping channel.The code requires only two qubits.We implement the encoding,the channel,and the recovery on an optical platform,the IBM Q System,and a nuclear magnetic resonance system.For all of these systems,the error correction advantage appears when the damping rate exceeds some threshold.We compare the features of these quantum information processing systems used and demonstrate the advantage of quantum error correction on current quantum computing platforms.
基金Supported by National Natural Science Foundation of China under Grant Nos.61472446,U1204602National High Technology Research and Development Program of China under Grant No.2011AA010803the Open Project Program of the State Key Laboratory of Mathematical Engineering and Advanced Computing under Grant No.2013A14
文摘Passive Faraday-mirror(PFM) attack is based on imperfect Faraday mirrors in practical quantum cryptography systems and a set of three-dimensional Positive Operator-Valued Measure(POVM) operators plays an important role in this attack.In this paper,we propose a simple scheme to implement the POVM in PFM attack on an FaradayMichelson quantum cryptography system.Since the POVM can not be implemented directly with previous methods,in this scheme it needs to expand the states sent by Alice and the POVM operators in the attack into four-dimensional Hilbert space first,without changing the attacking effect by calculation.Based on the methods proposed by Ahnert and Payne,the linear-optical setup for implementing the POVM operators is derived.At last,the complete setup for realizing the PFM attack is presented with all parameters.Furthermore,our scheme can also be applied to realize PFM attack on a plug-and-play system by changing the parameters in the setup.