Computer Aided Design and Computer Graphics is a cross-disciplinary high-tech research area. The State Key Laboratory of CAD&CG at Zhejiang University was funded by the National Seventh Five-Year-Plan of China. It be...Computer Aided Design and Computer Graphics is a cross-disciplinary high-tech research area. The State Key Laboratory of CAD&CG at Zhejiang University was funded by the National Seventh Five-Year-Plan of China. It began its construction in 1989 and was approved to open to public by the State Education Commission in 1990.展开更多
A new State Key Laboratory named Environmental Aquatic Chemistry is establishing in the Research Center for Eco-Environmental Sciences, Chinese Academy of Sciences. It asso-ciates with other three Iaboratories in univ...A new State Key Laboratory named Environmental Aquatic Chemistry is establishing in the Research Center for Eco-Environmental Sciences, Chinese Academy of Sciences. It asso-ciates with other three Iaboratories in universities to make up an Joint State Key Laboratory of Environmental Simulation and Pollution Control. They are supported by Chinese Government with the loan from World Bank for about 2.5 million US dollars and the same amount of RMB.展开更多
The State Key Laboratory of Numerical Modelling for Atmospheric Science and Geophysical Fluid Dynamics (LASG) was established in 1985. It was considered an Excellent Opening Laboratory in the national assessment organ...The State Key Laboratory of Numerical Modelling for Atmospheric Science and Geophysical Fluid Dynamics (LASG) was established in 1985. It was considered an Excellent Opening Laboratory in the national assessment organized by the former State Science and Technology Committee (now the Ministry of Science and Technology) in 1988. Because of this, LASG was upgraded to a State Key Laboratory in 1989. It won the honor of "Excellent展开更多
The State Key Laboratory of Numerical Modeling for Atmospheric Science and Geophysical Fluid Dynamics (LASG) was set up as early as in 1985. It has been appraised as an Excellent State Key Lab in each of the three nat...The State Key Laboratory of Numerical Modeling for Atmospheric Science and Geophysical Fluid Dynamics (LASG) was set up as early as in 1985. It has been appraised as an Excellent State Key Lab in each of the three national assessments organized by State Economic Planning Commission, National Natural Science Foundation (NSFC) and the Ministry of Science and Technology (MOST) in 1991, 1996 and 2000, respectively.展开更多
Recently, State Key Laboratory of Desert and Oasis Ecology of Xinjiang Institute of Ecology and Geography (XIEG), Chinese Academy of Sciences, was approved by Ministry of Science and Technology of the People's Repu...Recently, State Key Laboratory of Desert and Oasis Ecology of Xinjiang Institute of Ecology and Geography (XIEG), Chinese Academy of Sciences, was approved by Ministry of Science and Technology of the People's Republic of China to be founded.展开更多
To adapt to the rapid development of high-temperature superconductor research, the State Commission of Development & Planning (SCDP) approved in 1987 of establishing a national laboratory for superconductivity at ...To adapt to the rapid development of high-temperature superconductor research, the State Commission of Development & Planning (SCDP) approved in 1987 of establishing a national laboratory for superconductivity at the Institute of Physics, under the Chinese Academy of Sciences (CAS). The preparations were started in 1988 and by April of 1991展开更多
The Pattem Recognition Laboratory, set up byin 1984 and ratified as a state key lab in 1987, isattached to the CAS Institute of Automation (IA). The Laboraory’s founding director was Profes-sor Ma Songde, now the dir...The Pattem Recognition Laboratory, set up byin 1984 and ratified as a state key lab in 1987, isattached to the CAS Institute of Automation (IA). The Laboraory’s founding director was Profes-sor Ma Songde, now the director of the Institute ofAntomation. Its current director is Professor TanTieniu.展开更多
The State Key Laboratory of Transient OpticsTechnology is attached to the Xi’an Institute ofOptics and Precision Mechanics of the CAS. The Laboratory is devoted to study of the theory and technology of transient opti...The State Key Laboratory of Transient OpticsTechnology is attached to the Xi’an Institute ofOptics and Precision Mechanics of the CAS. The Laboratory is devoted to study of the theory and technology of transient optics. Its research fields include concepts and technologies of ultrashort pulse generation, amplification, compression and measurement, ultrafast processes of interaction between light and matter, development, and application of measurement equipment of transient optics for scientific research and production. At present, its research activities are the following:展开更多
The State Key Laboratory Loess and QuaternaryGeology, Institute of Earth Environment, the ChineseAcademy of Sciences (CAS), was established in No-vember 1995. Its predecessor, CAS Xi’an-based Labo-ratory of Loess &am...The State Key Laboratory Loess and QuaternaryGeology, Institute of Earth Environment, the ChineseAcademy of Sciences (CAS), was established in No-vember 1995. Its predecessor, CAS Xi’an-based Labo-ratory of Loess & Quaternary Geology, inauguratedin October 1984 in line with the suggestion of CASmembers Liu Dongsheng & Li Zhensheng. In March1987, the section was ratified to open to the outsideworld and honored as an outstanding laboratory forfour times in succeeding years.展开更多
In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protoc...In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol,the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie's successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover,the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence(AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source.展开更多
An efficient two-step quantum key distribution (QKD) protocol with orthogonal product states in the (×)(n ≥3) Hilbert space is presented. In this protocol, the particles in the orthogonal product states fo...An efficient two-step quantum key distribution (QKD) protocol with orthogonal product states in the (×)(n ≥3) Hilbert space is presented. In this protocol, the particles in the orthogonal product states form two particle sequences. The sender, Alice, first sends one sequence to the receiver, Bob. After Bob receives the first particle sequence, Alice and Bob check eavesdropping by measuring a fraction of particles randomly chosen. After ensuring the security of the quantum channel, Alice sends the other particle sequence to Bob. By making an orthogonal measurement on the two particle sequences, Bob can obtain the information of the orthogonal product states sent by Alice. This protocol has many distinct features such as great capacity, high efficiency in that it uses all orthogonal product states in distributing the key except those chosen for checking eavesdroppers.展开更多
A new theoretical quantum key distribution scheme based on entanglement swapping is proposed, where four-qubit symmetric W state functions as quantum channel. It is shown that two legitimate users can secretly share a...A new theoretical quantum key distribution scheme based on entanglement swapping is proposed, where four-qubit symmetric W state functions as quantum channel. It is shown that two legitimate users can secretly share a series of key bits by using Bell-state measurements and classical communication.展开更多
Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal deco...Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal decoy state protocol with a heralded single photon source (HSPS) for QKD is presented. The protocol is based on 4 states with different intensities. i.e. one signal state and three decoy states. The signal state is for generating keys; the decoy states are for detecting the eavesdropping and estimating the fraction of single-photon and two-photon pulses. We have discussed three cases of this protocol, i.e. the general case, the optimal case and the special case. Moreover, the final key rate over transmission distance is simulated. For the low dark count of the HSPS and the utilization of the two-photon pulses, our protocol has a higher key rate and a longer transmission distance than any other decoy state protocol.展开更多
Concrete has traditionally been regarded as a durable material requiring little or no maintenance. However, over the past several decades, a number of durability related problems have emerged and stimulated research i...Concrete has traditionally been regarded as a durable material requiring little or no maintenance. However, over the past several decades, a number of durability related problems have emerged and stimulated research into the factors relating to concrete durability globally. The challenge now facing practicing engineers is how to design and build structures that not only satisfy the specified structural requirements, but also achieve the performance levels required from a durability standpoint. Research works on concrete structural durability have been widely reported in the literature over the last several decades. In this paper, reviews of four stages of research work on durability, i e, environments, materials, components, and structures, were presented. Afterwards, the key scientific issues in this field were also pointed out.展开更多
A deterministic quantum key distribution scheme using two non-orthogonal entangled states is proposed. In the proposed scheme, communicators share key information by exchanging one travelling photon with two random an...A deterministic quantum key distribution scheme using two non-orthogonal entangled states is proposed. In the proposed scheme, communicators share key information by exchanging one travelling photon with two random and secret polarization angles. The security of the distributed key is guaranteed by three checking phases in three-way channel and the communicators' secret polarization angles.展开更多
A new efficient two-party semi-quantum key agreement protocol is proposed with high-dimensional single-particle states.Different from the previous semi-quantum key agreement protocols based on the two-level quantum sy...A new efficient two-party semi-quantum key agreement protocol is proposed with high-dimensional single-particle states.Different from the previous semi-quantum key agreement protocols based on the two-level quantum system,the propounded protocol makes use of the advantage of the high-dimensional quantum system,which possesses higher efficiency and better robustness against eavesdropping.Besides,the protocol allows the classical participant to encode the secret key with qudit shifting operations without involving any quantum measurement abilities.The designed semi-quantum key agreement protocol could resist both participant attacks and outsider attacks.Meanwhile,the conjoint analysis of security and efficiency provides an appropriate choice for reference on the dimension of single-particle states and the number of decoy states.展开更多
We investigate the decoy state quantum key distribution via the atmosphere channels. We consider the efficient decoy state method with one-signal state and two-decoy states. Our results show that the decoy state metho...We investigate the decoy state quantum key distribution via the atmosphere channels. We consider the efficient decoy state method with one-signal state and two-decoy states. Our results show that the decoy state method works even in the channels with fluctuating transmittance. Nevertheless, the key generation rate will be dra-matically decreased by atmosphere turbulence, which sheds more light on the characterization of atmosphere turbulence in realistic free-space based quantum key distributions.展开更多
A continuous variable ping-pong scheme, which is utilized to generate deterministic private key, is proposed. The proposed scheme is implemented physically by using Ganssian-modulated squeezed states. The deterministi...A continuous variable ping-pong scheme, which is utilized to generate deterministic private key, is proposed. The proposed scheme is implemented physically by using Ganssian-modulated squeezed states. The deterministic char- acteristic, i.e., no basis reconciliation between two parties, leads a nearly two-time efficiency comparing to the standard quantum key distribution schemes. Especially, the separate control mode does not need in the proposed scheme so that it is simpler and more available than previous ping-pong schemes. The attacker may be detected easily through the fidelity of the transmitted signal, and may not be successful in the beam splitter attack strategy.展开更多
We construct a circuit based on PBS and CNOT gates, which can be used to determine whether the input pulse is empty or not according to the detection result of the auxiliary state, while the input state will not be ch...We construct a circuit based on PBS and CNOT gates, which can be used to determine whether the input pulse is empty or not according to the detection result of the auxiliary state, while the input state will not be changed. The circuit can be treated as a pre-detection device. Equipping the pre-detection device in the front of the receiver of the quantum key distribution (QKD) can reduce the influence of the dark count of the detector, hence increasing the secure communication distance significantly. Simulation results show that the secure communication distance can reach 516 km and 479 km for QKD with perfect single photon source and decoy-state QKD with weak coherent photon source, respectively.展开更多
文摘Computer Aided Design and Computer Graphics is a cross-disciplinary high-tech research area. The State Key Laboratory of CAD&CG at Zhejiang University was funded by the National Seventh Five-Year-Plan of China. It began its construction in 1989 and was approved to open to public by the State Education Commission in 1990.
文摘A new State Key Laboratory named Environmental Aquatic Chemistry is establishing in the Research Center for Eco-Environmental Sciences, Chinese Academy of Sciences. It asso-ciates with other three Iaboratories in universities to make up an Joint State Key Laboratory of Environmental Simulation and Pollution Control. They are supported by Chinese Government with the loan from World Bank for about 2.5 million US dollars and the same amount of RMB.
文摘The State Key Laboratory of Numerical Modelling for Atmospheric Science and Geophysical Fluid Dynamics (LASG) was established in 1985. It was considered an Excellent Opening Laboratory in the national assessment organized by the former State Science and Technology Committee (now the Ministry of Science and Technology) in 1988. Because of this, LASG was upgraded to a State Key Laboratory in 1989. It won the honor of "Excellent
文摘The State Key Laboratory of Numerical Modeling for Atmospheric Science and Geophysical Fluid Dynamics (LASG) was set up as early as in 1985. It has been appraised as an Excellent State Key Lab in each of the three national assessments organized by State Economic Planning Commission, National Natural Science Foundation (NSFC) and the Ministry of Science and Technology (MOST) in 1991, 1996 and 2000, respectively.
文摘Recently, State Key Laboratory of Desert and Oasis Ecology of Xinjiang Institute of Ecology and Geography (XIEG), Chinese Academy of Sciences, was approved by Ministry of Science and Technology of the People's Republic of China to be founded.
文摘To adapt to the rapid development of high-temperature superconductor research, the State Commission of Development & Planning (SCDP) approved in 1987 of establishing a national laboratory for superconductivity at the Institute of Physics, under the Chinese Academy of Sciences (CAS). The preparations were started in 1988 and by April of 1991
文摘The Pattem Recognition Laboratory, set up byin 1984 and ratified as a state key lab in 1987, isattached to the CAS Institute of Automation (IA). The Laboraory’s founding director was Profes-sor Ma Songde, now the director of the Institute ofAntomation. Its current director is Professor TanTieniu.
文摘The State Key Laboratory of Transient OpticsTechnology is attached to the Xi’an Institute ofOptics and Precision Mechanics of the CAS. The Laboratory is devoted to study of the theory and technology of transient optics. Its research fields include concepts and technologies of ultrashort pulse generation, amplification, compression and measurement, ultrafast processes of interaction between light and matter, development, and application of measurement equipment of transient optics for scientific research and production. At present, its research activities are the following:
文摘The State Key Laboratory Loess and QuaternaryGeology, Institute of Earth Environment, the ChineseAcademy of Sciences (CAS), was established in No-vember 1995. Its predecessor, CAS Xi’an-based Labo-ratory of Loess & Quaternary Geology, inauguratedin October 1984 in line with the suggestion of CASmembers Liu Dongsheng & Li Zhensheng. In March1987, the section was ratified to open to the outsideworld and honored as an outstanding laboratory forfour times in succeeding years.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61271238 and 61475075)the Specialized Research Fund for the Doctoral Program of Higher Education of China(Grant No.20123223110003)+7 种基金the Natural Science Research Foundation for Universities of Jiangsu Province of China(Grant No.11KJA510002)the Open Research Fund of Key Laboratory of Broadband Wireless Communication and Sensor Network TechnologyMinistry of EducationChina(Grant No.NYKL2015011)the Innovation Program of Graduate Education of Jiangsu ProvinceChina(Grant No.KYLX0810)partially supported by Qinglan Project of Jiangsu ProvinceChina
文摘In this paper, we propose a measurement-device-independent quantum-key-distribution(MDI-QKD) protocol using orbital angular momentum(OAM) in free space links, named the OAM-MDI-QKD protocol. In the proposed protocol,the OAM states of photons, instead of polarization states, are used as the information carriers to avoid the reference frame alignment, the decoy-state is adopted to overcome the security loophole caused by the weak coherent pulse source, and the high efficient OAM-sorter is adopted as the measurement tool for Charlie to obtain the output OAM state. Here, Charlie may be an untrusted third party. The results show that the authorized users, Alice and Bob, could distill a secret key with Charlie's successful measurements, and the key generation performance is slightly better than that of the polarization-based MDI-QKD protocol in the two-dimensional OAM cases. Simultaneously, Alice and Bob can reduce the number of flipping the bits in the secure key distillation. It is indicated that a higher key generation rate performance could be obtained by a high dimensional OAM-MDI-QKD protocol because of the unlimited degree of freedom on OAM states. Moreover,the results show that the key generation rate and the transmission distance will decrease as the growth of the strength of atmospheric turbulence(AT) and the link attenuation. In addition, the decoy states used in the proposed protocol can get a considerable good performance without the need for an ideal source.
基金Project supported by the National Natural Science Foundation of China (Grant No 60373059), the Doctoral Programs Foundation of the Ministry of Education of China (Grant No 20040013007), and the Major Research plan of the National Natural Science Foundation of China (Grant No 90604023).
文摘An efficient two-step quantum key distribution (QKD) protocol with orthogonal product states in the (×)(n ≥3) Hilbert space is presented. In this protocol, the particles in the orthogonal product states form two particle sequences. The sender, Alice, first sends one sequence to the receiver, Bob. After Bob receives the first particle sequence, Alice and Bob check eavesdropping by measuring a fraction of particles randomly chosen. After ensuring the security of the quantum channel, Alice sends the other particle sequence to Bob. By making an orthogonal measurement on the two particle sequences, Bob can obtain the information of the orthogonal product states sent by Alice. This protocol has many distinct features such as great capacity, high efficiency in that it uses all orthogonal product states in distributing the key except those chosen for checking eavesdroppers.
基金The project supported by National Natural Science Foundation of China under Grant No. 60472017
文摘A new theoretical quantum key distribution scheme based on entanglement swapping is proposed, where four-qubit symmetric W state functions as quantum channel. It is shown that two legitimate users can secretly share a series of key bits by using Bell-state measurements and classical communication.
基金Project supported by the National Natural Science Foundation of China (Grant No 60578055)the State Key Development Program for Basic Research of China (Grant No 2007CB307001)
文摘Recently the performance of the quantum key distribution (QKD) is substantially improved by the decoy state method and the non-orthogonal encoding protocol, separately. In this paper, a practical non-orthogonal decoy state protocol with a heralded single photon source (HSPS) for QKD is presented. The protocol is based on 4 states with different intensities. i.e. one signal state and three decoy states. The signal state is for generating keys; the decoy states are for detecting the eavesdropping and estimating the fraction of single-photon and two-photon pulses. We have discussed three cases of this protocol, i.e. the general case, the optimal case and the special case. Moreover, the final key rate over transmission distance is simulated. For the low dark count of the HSPS and the utilization of the two-photon pulses, our protocol has a higher key rate and a longer transmission distance than any other decoy state protocol.
基金Funded by the National Natural Science Foundation of China (No.50538070)
文摘Concrete has traditionally been regarded as a durable material requiring little or no maintenance. However, over the past several decades, a number of durability related problems have emerged and stimulated research into the factors relating to concrete durability globally. The challenge now facing practicing engineers is how to design and build structures that not only satisfy the specified structural requirements, but also achieve the performance levels required from a durability standpoint. Research works on concrete structural durability have been widely reported in the literature over the last several decades. In this paper, reviews of four stages of research work on durability, i e, environments, materials, components, and structures, were presented. Afterwards, the key scientific issues in this field were also pointed out.
基金The project supported by National Natural Science Foundation of China under Grant Nos. 60472018 and 10547125
文摘A deterministic quantum key distribution scheme using two non-orthogonal entangled states is proposed. In the proposed scheme, communicators share key information by exchanging one travelling photon with two random and secret polarization angles. The security of the distributed key is guaranteed by three checking phases in three-way channel and the communicators' secret polarization angles.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.61871205 and 61561033)the Major Academic Discipline and Technical Leader of Jiangxi Province,China(Grant No.20162BCB22011).
文摘A new efficient two-party semi-quantum key agreement protocol is proposed with high-dimensional single-particle states.Different from the previous semi-quantum key agreement protocols based on the two-level quantum system,the propounded protocol makes use of the advantage of the high-dimensional quantum system,which possesses higher efficiency and better robustness against eavesdropping.Besides,the protocol allows the classical participant to encode the secret key with qudit shifting operations without involving any quantum measurement abilities.The designed semi-quantum key agreement protocol could resist both participant attacks and outsider attacks.Meanwhile,the conjoint analysis of security and efficiency provides an appropriate choice for reference on the dimension of single-particle states and the number of decoy states.
基金Supported by the National Natural Science Foundation of China under Grant Nos 11574400,U1304613,11204197,11204379 and 11074244the National Basic Research Program of China under Grant No 2011CBA00200the Doctor Foundation of the Ministry of Education of China under Grant No 20113402110059
文摘We investigate the decoy state quantum key distribution via the atmosphere channels. We consider the efficient decoy state method with one-signal state and two-decoy states. Our results show that the decoy state method works even in the channels with fluctuating transmittance. Nevertheless, the key generation rate will be dra-matically decreased by atmosphere turbulence, which sheds more light on the characterization of atmosphere turbulence in realistic free-space based quantum key distributions.
基金Supported by the National Natural Science Foundation of China under Grant Nos.61102053,61170228,60970109,and 60801051 Shanghai Jiaotong University Participate in Research Projects under Grant Nos.T030PRP18001 and T030PRP19035
文摘A continuous variable ping-pong scheme, which is utilized to generate deterministic private key, is proposed. The proposed scheme is implemented physically by using Ganssian-modulated squeezed states. The deterministic char- acteristic, i.e., no basis reconciliation between two parties, leads a nearly two-time efficiency comparing to the standard quantum key distribution schemes. Especially, the separate control mode does not need in the proposed scheme so that it is simpler and more available than previous ping-pong schemes. The attacker may be detected easily through the fidelity of the transmitted signal, and may not be successful in the beam splitter attack strategy.
基金supported by the National Natural Science Foundation of China(Grant No.61372076)the Programme of Introducing Talents of Discipline to Universities,China(Grant No.B08038)the Fundamental Research Funds for the Central Universities,China(Grant No.K5051201021)
文摘We construct a circuit based on PBS and CNOT gates, which can be used to determine whether the input pulse is empty or not according to the detection result of the auxiliary state, while the input state will not be changed. The circuit can be treated as a pre-detection device. Equipping the pre-detection device in the front of the receiver of the quantum key distribution (QKD) can reduce the influence of the dark count of the detector, hence increasing the secure communication distance significantly. Simulation results show that the secure communication distance can reach 516 km and 479 km for QKD with perfect single photon source and decoy-state QKD with weak coherent photon source, respectively.