期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Design and simulation of the ATP system considering the advanced targeting angle in quantum positioning system 被引量:1
1
作者 CONG Shuang ZHANG Xiang DUAN Shiqi 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2022年第5期1227-1236,共10页
A compensation implementation scheme of the advanced targeting process based on the fine tracking system is proposed in this paper.Based on the working process of the quantum positioning system(QPS)and its acquisition... A compensation implementation scheme of the advanced targeting process based on the fine tracking system is proposed in this paper.Based on the working process of the quantum positioning system(QPS)and its acquisition,tracking and pointing(ATP)system,the advanced targeting subsystem of the ATP system is designed.Based on six orbital parameters of the quantum satellite Mozi,the advanced targeting azimuth angle and pitch angle are transformed into the dynamic tracking center of the fine tracking system in the ATP system.The deviation of the advanced targeting process is analyzed.In the Simulink,the simulation experiment of the ATP system considering the deviation compensation of the advanced targeting is carried out,and the results are analyzed. 展开更多
关键词 quantum positioning system(QPS) ACQUISITION tracking and pointing(ATP) advanced targeting
下载PDF
Quantum position verification in bounded-attack-frequencymodel
2
作者 Fei Gao Bin Liu QiaoYan Wen 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2016年第11期17-27,共11页
In 2011, Buhrman et al. proved that it is impossible to design an unconditionally secure quantum position verification(QPV)protocol if the adversaries are allowed to previously share unlimited entanglements. Afterward... In 2011, Buhrman et al. proved that it is impossible to design an unconditionally secure quantum position verification(QPV)protocol if the adversaries are allowed to previously share unlimited entanglements. Afterwards, people started to design secure QPV protocols in practical settings, e.g. the bounded-storage model, where the adversaries' pre-shared entangled resources are supposed to be limited. Here we focus on another practical factor that it is very difficult for the adversaries to perform attack operations with unlimitedly high frequency. Concretely, we present a new kind of QPV protocols, called non-simultaneous QPV.And we prove the security of a specific non-simultaneous QPV protocol with the assumption that the frequency of the adversaries' attack operations is bounded, but no assumptions on their pre-shared entanglements or quantum storage. Actually, in our nonsimultaneous protocol, the information whether there comes a signal at present time is also a piece of command. It renders the adversaries "blind", that is, they have to execute attack operations with unlimitedly high frequency no matter whether a signal arrives, which implies the non-simultaneous QPV is also secure in the bounded-storage model. 展开更多
关键词 quantum cryptography position-based cryptography quantum position verification
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部