The principle of ptychography is applied in known plain text attack on the double random phase encoding (DRPE) system. We find that with several pairs of plain texts and cipher texts, the model of attack on DRPE can...The principle of ptychography is applied in known plain text attack on the double random phase encoding (DRPE) system. We find that with several pairs of plain texts and cipher texts, the model of attack on DRPE can be converted to the model of ptyehographical imaging. Owing to the inherent merits of the ptyehographical imaging, the DRPE system can be breached totally in a fast and nearly perfect way, which is unavailable for currently existing attack methods. Further, since the decryption keys can be seen as an object to be imaged from the perspective of imaging, the ptychographical technique may be a kind of new direction to further analysis of the security of other encryption systems based on double random keys.展开更多
As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respo...As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.展开更多
The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) at...The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) attack and BS (beam splitting) attack. The result indicates that the PNS attack and BS attack will not limit the transmission distance as long as we select an appropriate mean photon number. Also, the maximum mean photon number under BS attack in practical DPS-QKD system and the set of practical assumptions about Eve's capabilities are presented.展开更多
Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phas...Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol.展开更多
目的:观察四物牵正散联合针刺治疗风寒袭络型急性期周围性面瘫的临床疗效。方法:将86例风寒袭络型急性期周围性面瘫患者按照随机数字表法分为对照组和试验组,每组各43例。对照组给予四物牵正散治疗,试验组在对照组治疗的基础上联合针刺...目的:观察四物牵正散联合针刺治疗风寒袭络型急性期周围性面瘫的临床疗效。方法:将86例风寒袭络型急性期周围性面瘫患者按照随机数字表法分为对照组和试验组,每组各43例。对照组给予四物牵正散治疗,试验组在对照组治疗的基础上联合针刺疗法。比较两组患者的临床疗效、不良反应发生率及治疗前后面神经功能评分、面部残疾指数躯体功能(facial disability index physical function, FDIP)评分、面部残疾指数社会功能(facial disability index social function, FDIS)评分、中医证候积分、FaCE量表评分、免疫功能水平(CD3^(+)、CD4^(+)、CD8^(+)、CD4^(+)/CD8^(+))变化情况。结果:对照组有效率为81.39%,试验组有效率为93.02%,两组患者有效率比较,差异具有统计学意义(P<0.05)。两组患者治疗后面神经功能评分、FDIP评分、FDIS评分高于本组治疗前,中医证候积分较低于本组治疗前,且治疗后组间比较,差异具有统计学意义(P<0.05)。两组患者治疗后FaCE量表各项评分高于本组治疗前,且治疗后试验组高于对照组,差异具有统计学意义(P<0.05)。两组患者治疗后CD3^(+)、CD4^(+)及CD4^(+)/CD8^(+)高于治疗前,CD8^(+)低于本组治疗前,且治疗后组间比较,差异具有统计学意义(P<0.05)。试验组不良反应发生率低于对照组,差异具有统计学意义(P<0.05)。结论:四物牵正散联合针刺治疗风寒袭络型急性期周围性面瘫患者,能够调节患者免疫功能,改善临床症状,且不良反应较低。展开更多
基金Supported by the National Natural Science Foundation of China under Grant Nos 61575197 and 61307018the K.C.Wong Education Foundation,the President Fund of University of Chinese Academy of Sciencesthe Fusion Funds of Research and Education of Chinese Academy of Sciences
文摘The principle of ptychography is applied in known plain text attack on the double random phase encoding (DRPE) system. We find that with several pairs of plain texts and cipher texts, the model of attack on DRPE can be converted to the model of ptyehographical imaging. Owing to the inherent merits of the ptyehographical imaging, the DRPE system can be breached totally in a fast and nearly perfect way, which is unavailable for currently existing attack methods. Further, since the decryption keys can be seen as an object to be imaged from the perspective of imaging, the ptychographical technique may be a kind of new direction to further analysis of the security of other encryption systems based on double random keys.
文摘As cyber threats keep changing and business environments adapt, a comprehensive approach to disaster recovery involves more than just defensive measures. This research delves deep into the strategies required to respond to threats and anticipate and mitigate them proactively. Beginning with understanding the critical need for a layered defense and the intricacies of the attacker’s journey, the research offers insights into specialized defense techniques, emphasizing the importance of timely and strategic responses during incidents. Risk management is brought to the forefront, underscoring businesses’ need to adopt mature risk assessment practices and understand the potential risk impact areas. Additionally, the value of threat intelligence is explored, shedding light on the importance of active engagement within sharing communities and the vigilant observation of adversary motivations. “Beyond Defense: Proactive Approaches to Disaster Recovery and Threat Intelligence in Modern Enterprises” is a comprehensive guide for organizations aiming to fortify their cybersecurity posture, marrying best practices in proactive and reactive measures in the ever-challenging digital realm.
文摘The influence of multi-photon pulses on practical differcBtial-phase-shift quantum key distribution (DPS-Qt(D) is analysed. We have estimated the information which Eve obtained by PNS (photon-number splitting) attack and BS (beam splitting) attack. The result indicates that the PNS attack and BS attack will not limit the transmission distance as long as we select an appropriate mean photon number. Also, the maximum mean photon number under BS attack in practical DPS-QKD system and the set of practical assumptions about Eve's capabilities are presented.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61505261 and 11304397)the National Basic Research Program of China(Grant No.2013CB338002)
文摘Recently,a round-robin differential phase-shift(RRDPS) protocol was proposed[Nature 509,475(2014)],in which the amount of leakage is bounded without monitoring the signal disturbance.Introducing states of the phase-encoded Bennett-Brassard 1984 protocol(PE-BB84) to the RRDPS,this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift(RRDQPS) quantum key distribution.Regarding a train of many pulses as a single packet,the sender modulates the phase of each pulse by one of {0,π/2,π,3π/2},then the receiver measures each packet with a Mach-Zehnder interferometer having a phase basis of 0 or π/2.The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84,so it has great compatibility with the current quantum system.Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack.Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol.
文摘目的:观察四物牵正散联合针刺治疗风寒袭络型急性期周围性面瘫的临床疗效。方法:将86例风寒袭络型急性期周围性面瘫患者按照随机数字表法分为对照组和试验组,每组各43例。对照组给予四物牵正散治疗,试验组在对照组治疗的基础上联合针刺疗法。比较两组患者的临床疗效、不良反应发生率及治疗前后面神经功能评分、面部残疾指数躯体功能(facial disability index physical function, FDIP)评分、面部残疾指数社会功能(facial disability index social function, FDIS)评分、中医证候积分、FaCE量表评分、免疫功能水平(CD3^(+)、CD4^(+)、CD8^(+)、CD4^(+)/CD8^(+))变化情况。结果:对照组有效率为81.39%,试验组有效率为93.02%,两组患者有效率比较,差异具有统计学意义(P<0.05)。两组患者治疗后面神经功能评分、FDIP评分、FDIS评分高于本组治疗前,中医证候积分较低于本组治疗前,且治疗后组间比较,差异具有统计学意义(P<0.05)。两组患者治疗后FaCE量表各项评分高于本组治疗前,且治疗后试验组高于对照组,差异具有统计学意义(P<0.05)。两组患者治疗后CD3^(+)、CD4^(+)及CD4^(+)/CD8^(+)高于治疗前,CD8^(+)低于本组治疗前,且治疗后组间比较,差异具有统计学意义(P<0.05)。试验组不良反应发生率低于对照组,差异具有统计学意义(P<0.05)。结论:四物牵正散联合针刺治疗风寒袭络型急性期周围性面瘫患者,能够调节患者免疫功能,改善临床症状,且不良反应较低。