The existing decoy-state quantum key distribution(QKD)beating photon-number-splitting(PNS)attack provides a more accurate method to estimate the secure key rate,while it still considers that only single-photon pulses ...The existing decoy-state quantum key distribution(QKD)beating photon-number-splitting(PNS)attack provides a more accurate method to estimate the secure key rate,while it still considers that only single-photon pulses can generate secure keys in any case.However,multiphoton pulses can also generate secure keys if we can detect the possibility of PNS attack in the channel.The ultimate goal of this line of research is to confirm the absence of all types of PNS attacks.In particular,the PNS attack mentioned and detected in this paper is only the weaker version of PNS attack which significantly changes the observed values of the legitimate users.In this paper,under the null hypothesis of no weaker version of PNS attack,we first determine whether there is an attack or not by retrieving the missing information of the existing decoy-state protocols,extract a Cauchy distribution statistic,and further provide a detection method and the type I error probability.If the result is judged to be an attack,we can use the existing decoy-state method and the GLLP formula to estimate the secure key rate.Otherwise,the pulses with the same basis received including both single-photon pulses and multiphoton pulses,can be used to generate the keys and we give the secure key rate in this case.Finally,the associated experiments we performed(i.e.,the significance level is 5%)show the correctness of our method.展开更多
This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are dis...This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are discussed, along with quantum vulnerabilities in public key infrastructure and symmetric cryptographic algorithms. Other relevant non-encryption-specific areas within cybersecurity are similarly raised. The evolution and expansion of cyberwarfare as well as new developments in cyber defense beyond post-quantum cryptography and quantum key distribution are subsequently explored, with an emphasis on public and private sector awareness and vigilance in maintaining strong security posture.展开更多
Recently, Kyriakoussis and Vamvakari [1] have established a q-analogue of the Stirling type for q-constant which have lead them to the proof of the pointwise convergence of the q-binomial distribution to a Stieltjes-W...Recently, Kyriakoussis and Vamvakari [1] have established a q-analogue of the Stirling type for q-constant which have lead them to the proof of the pointwise convergence of the q-binomial distribution to a Stieltjes-Wigert continuous distribution. In the present article, assuming a sequence q(n) of n with q(n)→1 as n→∞, the study of the affect of this assumption to the q(n)-analogue of the Stirling type and to the asymptotic behaviour of the q(n)-Binomial distribution is presented. Specifically, a q(n) analogue of the Stirling type is provided which leads to the proof of deformed Gaussian limiting behaviour for the q(n)-Binomial distribution. Further, figures using the program MAPLE are presented, indicating the accuracy of the established distribution convergence even for moderate values of n.展开更多
文摘The existing decoy-state quantum key distribution(QKD)beating photon-number-splitting(PNS)attack provides a more accurate method to estimate the secure key rate,while it still considers that only single-photon pulses can generate secure keys in any case.However,multiphoton pulses can also generate secure keys if we can detect the possibility of PNS attack in the channel.The ultimate goal of this line of research is to confirm the absence of all types of PNS attacks.In particular,the PNS attack mentioned and detected in this paper is only the weaker version of PNS attack which significantly changes the observed values of the legitimate users.In this paper,under the null hypothesis of no weaker version of PNS attack,we first determine whether there is an attack or not by retrieving the missing information of the existing decoy-state protocols,extract a Cauchy distribution statistic,and further provide a detection method and the type I error probability.If the result is judged to be an attack,we can use the existing decoy-state method and the GLLP formula to estimate the secure key rate.Otherwise,the pulses with the same basis received including both single-photon pulses and multiphoton pulses,can be used to generate the keys and we give the secure key rate in this case.Finally,the associated experiments we performed(i.e.,the significance level is 5%)show the correctness of our method.
文摘This research paper analyzes the urgent topic of quantum cybersecurity and the current federal quantum-cyber landscape. Quantum-safe implementations within existing and future Internet of Things infrastructure are discussed, along with quantum vulnerabilities in public key infrastructure and symmetric cryptographic algorithms. Other relevant non-encryption-specific areas within cybersecurity are similarly raised. The evolution and expansion of cyberwarfare as well as new developments in cyber defense beyond post-quantum cryptography and quantum key distribution are subsequently explored, with an emphasis on public and private sector awareness and vigilance in maintaining strong security posture.
文摘Recently, Kyriakoussis and Vamvakari [1] have established a q-analogue of the Stirling type for q-constant which have lead them to the proof of the pointwise convergence of the q-binomial distribution to a Stieltjes-Wigert continuous distribution. In the present article, assuming a sequence q(n) of n with q(n)→1 as n→∞, the study of the affect of this assumption to the q(n)-analogue of the Stirling type and to the asymptotic behaviour of the q(n)-Binomial distribution is presented. Specifically, a q(n) analogue of the Stirling type is provided which leads to the proof of deformed Gaussian limiting behaviour for the q(n)-Binomial distribution. Further, figures using the program MAPLE are presented, indicating the accuracy of the established distribution convergence even for moderate values of n.