Atlantic Meridional Overturning Circulation(AMOC)plays a central role in long-term climate variations through its heat and freshwater transports,which can collapse under a rapid increase of greenhouse gas forcing in c...Atlantic Meridional Overturning Circulation(AMOC)plays a central role in long-term climate variations through its heat and freshwater transports,which can collapse under a rapid increase of greenhouse gas forcing in climate models.Previous studies have suggested that the deviation of model parameters is one of the major factors in inducing inaccurate AMOC simulations.In this work,with a low-resolution earth system model,the authors try to explore whether a reasonable adjustment of the key model parameter can help to re-establish the AMOC after its collapse.Through a new optimization strategy,the extra freshwater flux(FWF)parameter is determined to be the dominant one affecting the AMOC’s variability.The traditional ensemble optimal interpolation(EnOI)data assimilation and new machine learning methods are adopted to optimize the FWF parameter in an abrupt 4×CO_(2) forcing experiment to improve the adaptability of model parameters and accelerate the recovery of AMOC.The results show that,under an abrupt 4×CO_(2) forcing in millennial simulations,the AMOC will first collapse and then re-establish by the default FWF parameter slowly.However,during the parameter adjustment process,the saltier and colder sea water over the North Atlantic region are the dominant factors in usefully improving the adaptability of the FWF parameter and accelerating the recovery of AMOC,according to their physical relationship with FWF on the interdecadal timescale.展开更多
Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation env...Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others.展开更多
The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance...The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks.展开更多
Maize stalk lignin and cellulose contents are linked to lodging resistance,disease resistance,feed quality and ethanol conversion efficiency.After the six-leaf stage of maize(V6),these constituents are biosynthesized ...Maize stalk lignin and cellulose contents are linked to lodging resistance,disease resistance,feed quality and ethanol conversion efficiency.After the six-leaf stage of maize(V6),these constituents are biosynthesized and accumulated under the control of related enzymes and genes.However,the key enzymes,critical MYB transcription factors,and their dynamic alterations pattern under natural field circumstances are still unknown.Hence,we selected five cultivars with significant differences in lignocellulose content and lodging resistance as testing materials,performed field experiments for two years,and investigated the dynamics of lignin and cellulose content,related enzyme concentrations,and gene expression levels in the 3^(rd) and 5^(th) internodes above the ground after V6.The results showed that lignin and cellulose content increased after V6,stabilizing during the silking stage.This study identified COMT(caffeic acid 3-Omethyltransferase),TAL(tyrosine ammonia-lyase)and PAL(phenylalanine ammonia-lyase)as the key enzymes of lignin biosynthesis,while ZmCOMT,ZmCesA10 and ZmCesA8 were identified as essential genes.ZmMYB8,ZmMYB31 and ZmMYB39 were involved in regulating the expression of genes related to lignin synthesis,with ZmMYB31 potentially acting as a key negative regulator,while ZmMYB39 and ZmMYB8 acting as positive regulators.The study also found that around 14 d after V6 was a critical stage for regulating lignocellulose synthesis in the 3^(rd) to 5^(th) basal internode.This provides a theoretical foundation for developing regulatory techniques and breeding new cultivars to enhance lodging and disease resistance as well as the utility of maize stalks.展开更多
The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In...The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.展开更多
Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devi...Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources.展开更多
Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes...Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.展开更多
As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is be...As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.展开更多
In principle,the asynchronous measurement-device-independent quantum key distribution(AMDI-QKD)can surpass the key rate capacity without phase tracking and phase locking.However,practical imperfections in sources or d...In principle,the asynchronous measurement-device-independent quantum key distribution(AMDI-QKD)can surpass the key rate capacity without phase tracking and phase locking.However,practical imperfections in sources or detections would dramatically depress its performance.Here,we present an improved model on AMDI-QKD to reduce the influence of these imperfections,including intensity fluctuation,the afterpulse effect,and the dead time of detectors.Furthermore,we carry out corresponding numerical simulations.Simulation results show that,by implementing our present work,it can have more than 100 km longer secure transmission distance and one order of magnitude enhancement in the key generation rate after 320 km compared with the standard method.Moreover,our model can still break the Pirandola–Laurenza–Ottaviani–Banchi(PLOB)bound even under realistic experimental conditions.展开更多
With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In t...With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.展开更多
Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only grou...Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation.展开更多
Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,ther...Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase.展开更多
Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.T...Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.The purpose aimed to reveal the potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa in this paper.The dynamic changes of endogenous proteases activity,free amino acids,and volatiles during dry-cured pork coppa processing were characterized.The results showed that 5 kinds of free amino acids,Glu,Lys,Val,Ala,and Leu,were identified as significant contributors to taste.Meanwhile,key volatiles,such as hexanal,nonanal,octanal,benzaldehyde,3-methyl butanoic acid,2-methyl propanoic acid,and ethyl octanoate,greatly contributed to the flavor characteristics of dry-cured pork coppa.Further partial correlation analysis was performed to better elucidate the relationship among parameters.The results revealed that close relationship between endogenous proteases and key substances.RAP not only significantly affected the accumulation of key active-amino acids,but also affected the accumulation of ethyl octanoate,2,3-pentanedione,and 2,3-octanedione by regulating the accumulation of octanoic acid and Leu.In addition,cathepsin B and D,DPP II,DPP IV and RAP notably affected accumulation of hexanal.展开更多
Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting sin...Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting single-photon detectors.Here,we propose a concise,robust defense strategy for protecting single-photon detectors in QKD systems against blinding attacks.Our strategy uses a dual approach:detecting the bias current of the avalanche photodiode(APD)to defend against con-tinuous-wave blinding attacks,and monitoring the avalanche amplitude to protect against pulsed blinding attacks.By integrat-ing these two branches,the proposed solution effectively identifies and mitigates a wide range of bright light injection attempts,significantly enhancing the resilience of QKD systems against various bright-light blinding attacks.This method forti-fies the safeguards of quantum communications and offers a crucial contribution to the field of quantum information security.展开更多
Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in ...Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in quantum computing technology,the security of conventional key-based SSL/TLS protocols faces vulnerabilities.In this paper,we propose a scheme by integrating the quantum key into the SSL/TLS framework.Furthermore,the application of post-quantum algorithms is used to enhance and complement the existing encryption suites.Experimental results show that the proposed SSL/TLS communication system based on quantum keys exhibits high performance in latency and throughput.Moreover,the proposed system showcases good resilience against quantum attacks.展开更多
State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The la...State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researchesand Comprehensive Utilization.展开更多
National Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The...National Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researches and Comprehensive Utilization.The key laboratory takes Baotou Research Institute of Rare Earths as the main research body,cooperating with scientific and technological strength from Lanzhou University and Changsha Research Institute of Mining and Metallurgy.展开更多
Aiming at the characteristics of multi-stage and(extremely)small samples of the identification problem of key effectiveness indexes of weapon equipment system-of-systems(WESoS),a Bayesian intelligent identification an...Aiming at the characteristics of multi-stage and(extremely)small samples of the identification problem of key effectiveness indexes of weapon equipment system-of-systems(WESoS),a Bayesian intelligent identification and inference model for system effectiveness assessment indexes based on dynamic grey incidence is proposed.The method uses multi-layer Bayesian techniques,makes full use of historical statistics and empirical information,and determines the Bayesian estima-tion of the incidence degree of indexes,which effectively solves the difficulties of small sample size of effectiveness indexes and difficulty in obtaining incidence rules between indexes.Sec-ondly,The method quantifies the incidence relationship between evaluation indexes and combat effectiveness based on Bayesian posterior grey incidence,and then identifies key system effec-tiveness evaluation indexes.Finally,the proposed method is applied to a case of screening key effectiveness indexes of a missile defensive system,and the analysis results show that the proposed method can fuse multi-moment information and extract multi-stage key indexes,and has good data extraction capability in the case of small samples.展开更多
In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has beco...In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has become a major concern for businesses and end-users. One solution to ensure data security is encryption, where keys are central. There is therefore a need to find robusts key generation implementation that is effective, inexpensive and non-invasive for protecting and preventing data counterfeiting. In this paper, we use the theory of electromagnetic wave propagation to generate encryption keys.展开更多
基金supported by the National Key R&D Program of China [grant number 2023YFF0805202]the National Natural Science Foun-dation of China [grant number 42175045]the Strategic Priority Research Program of the Chinese Academy of Sciences [grant number XDB42000000]。
文摘Atlantic Meridional Overturning Circulation(AMOC)plays a central role in long-term climate variations through its heat and freshwater transports,which can collapse under a rapid increase of greenhouse gas forcing in climate models.Previous studies have suggested that the deviation of model parameters is one of the major factors in inducing inaccurate AMOC simulations.In this work,with a low-resolution earth system model,the authors try to explore whether a reasonable adjustment of the key model parameter can help to re-establish the AMOC after its collapse.Through a new optimization strategy,the extra freshwater flux(FWF)parameter is determined to be the dominant one affecting the AMOC’s variability.The traditional ensemble optimal interpolation(EnOI)data assimilation and new machine learning methods are adopted to optimize the FWF parameter in an abrupt 4×CO_(2) forcing experiment to improve the adaptability of model parameters and accelerate the recovery of AMOC.The results show that,under an abrupt 4×CO_(2) forcing in millennial simulations,the AMOC will first collapse and then re-establish by the default FWF parameter slowly.However,during the parameter adjustment process,the saltier and colder sea water over the North Atlantic region are the dominant factors in usefully improving the adaptability of the FWF parameter and accelerating the recovery of AMOC,according to their physical relationship with FWF on the interdecadal timescale.
基金Project supported by the Natural Science Foundation of Jilin Province of China(Grant No.20210101417JC).
文摘Quantum key distribution(QKD)is a technology that can resist the threat of quantum computers to existing conventional cryptographic protocols.However,due to the stringent requirements of the quantum key generation environment,the generated quantum keys are considered valuable,and the slow key generation rate conflicts with the high-speed data transmission in traditional optical networks.In this paper,for the QKD network with a trusted relay,which is mainly based on point-to-point quantum keys and has complex changes in network resources,we aim to allocate resources reasonably for data packet distribution.Firstly,we formulate a linear programming constraint model for the key resource allocation(KRA)problem based on the time-slot scheduling.Secondly,we propose a new scheduling scheme based on the graded key security requirements(GKSR)and a new micro-log key storage algorithm for effective storage and management of key resources.Finally,we propose a key resource consumption(KRC)routing optimization algorithm to properly allocate time slots,routes,and key resources.Simulation results show that the proposed scheme significantly improves the key distribution success rate and key resource utilization rate,among others.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China (Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation (Grant No.2021M691536)the Natural Science Foundation of Henan Province,China (Grant Nos.202300410534 and 202300410532)the Fund of the Anhui Initiative in Quantum Information Technologies。
文摘The reference-frame-independent(RFI)quantum key distribution(QKD)is suitable for satellite-based links by removing the active alignment on the reference frames.However,how the beam wandering influences the performance of RFI-QKD remains a pending issue in satellite-to-ground links.In this paper,based on the mathematical model for characterizing beam wandering,we present the security analysis for satellite-to-ground RFI-QKD and analytically derive formulas for calculating the secret key rate with beam wandering.Our simulation results show that the performance of RFI-QKD is better than the Bennett–Brassard 1984(BB84)QKD with beam wandering in asymptotic case.Furthermore,the degree of influences of beam wandering is specifically presented for satellite-to-ground RFI-QKD when statistical fluctuations are taken into account.Our work can provide theoretical support for the realization of RFI-QKD using satellite-to-ground links and have implications for the construction of large-scale satellite-based quantum networks.
基金supported by the National Key Research and Development Program for Grain High yield Science and Technology Innovation Project of China (2016YFD0300307,2016YFD0300209,2017YFD0301704,2018YFD0301206).
文摘Maize stalk lignin and cellulose contents are linked to lodging resistance,disease resistance,feed quality and ethanol conversion efficiency.After the six-leaf stage of maize(V6),these constituents are biosynthesized and accumulated under the control of related enzymes and genes.However,the key enzymes,critical MYB transcription factors,and their dynamic alterations pattern under natural field circumstances are still unknown.Hence,we selected five cultivars with significant differences in lignocellulose content and lodging resistance as testing materials,performed field experiments for two years,and investigated the dynamics of lignin and cellulose content,related enzyme concentrations,and gene expression levels in the 3^(rd) and 5^(th) internodes above the ground after V6.The results showed that lignin and cellulose content increased after V6,stabilizing during the silking stage.This study identified COMT(caffeic acid 3-Omethyltransferase),TAL(tyrosine ammonia-lyase)and PAL(phenylalanine ammonia-lyase)as the key enzymes of lignin biosynthesis,while ZmCOMT,ZmCesA10 and ZmCesA8 were identified as essential genes.ZmMYB8,ZmMYB31 and ZmMYB39 were involved in regulating the expression of genes related to lignin synthesis,with ZmMYB31 potentially acting as a key negative regulator,while ZmMYB39 and ZmMYB8 acting as positive regulators.The study also found that around 14 d after V6 was a critical stage for regulating lignocellulose synthesis in the 3^(rd) to 5^(th) basal internode.This provides a theoretical foundation for developing regulatory techniques and breeding new cultivars to enhance lodging and disease resistance as well as the utility of maize stalks.
基金supported by the National Natural Science Foundation of China(Grant Nos.61505261,62101597,61605248,and 61675235)the National Key Research and Development Program of China(Grant No.2020YFA0309702)+2 种基金the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan Province(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies.
文摘The data post-processing scheme based on two-way classical communication(TWCC)can improve the tolerable bit error rate and extend the maximal transmission distance when used in a quantum key distribution(QKD)system.In this study,we apply the TWCC method to improve the performance of reference-frame-independent quantum key distribution(RFI-QKD),and analyze the influence of the TWCC method on the performance of decoy-state RFI-QKD in both asymptotic and non-asymptotic cases.Our numerical simulation results show that the TWCC method is able to extend the maximal transmission distance from 175 km to 198 km and improve the tolerable bit error rate from 10.48%to 16.75%.At the same time,the performance of RFI-QKD in terms of the secret key rate and maximum transmission distance are still greatly improved when statistical fluctuations are considered.We conclude that RFI-QKD with the TWCC method is of practical interest.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.12074194,12104240,and 62101285)the Industrial Prospect and Key Core Technology Projects of Jiangsu Provincial Key Research and Development Program(Grant No.BE2022071)the Natural Science Foundation of Jiangsu Province,China(Grant Nos.BK20192001 and BK20210582).
文摘Encoding system plays a significant role in quantum key distribution(QKD).However,the security and performance of QKD systems can be compromised by encoding misalignment due to the inevitable defects in realistic devices.To alleviate the influence of misalignments,a method exploiting statistics from mismatched basis is proposed to enable uncharacterized sources to generate secure keys in QKD.In this work,we propose a scheme on four-intensity decoy-state quantum key distribution with uncharacterized heralded single-photon sources.It only requires the source states are prepared in a two-dimensional Hilbert space,and can thus reduce the complexity of practical realizations.Moreover,we carry out corresponding numerical simulations and demonstrate that our present four-intensity decoy-state scheme can achieve a much higher key rate compared than a three-intensity decoy-state method,and meantime it can obtain a longer transmission distance compared than the one using weak coherent sources.
基金the State’s Key Project of Research and Development Plan under Grant 2022YFB2701400in part by the National Natural Science Foundation of China under Grants 62272124 and 62361010+4 种基金in part by the Science and Technology Planning Project of Guizhou Province under Grant[2020]5017in part by the Research Project of Guizhou University for Talent Introduction underGrant[2020]61in part by theCultivation Project of Guizhou University under Grant[2019]56in part by the Open Fund of Key Laboratory of Advanced Manufacturing Technology,Ministry of Education under Grant GZUAMT2021KF[01]the Science and Technology Program of Guizhou Province(No.[2023]371).
文摘Traditional blockchain key management schemes store private keys in the same location,which can easily lead to security issues such as a single point of failure.Therefore,decentralized threshold key management schemes have become a research focus for blockchain private key protection.The security of private keys for blockchain user wallet is highly related to user identity authentication and digital asset security.The threshold blockchain private key management schemes based on verifiable secret sharing have made some progress,but these schemes do not consider participants’self-interested behavior,and require trusted nodes to keep private key fragments,resulting in a narrow application scope and low deployment efficiency,which cannot meet the needs of personal wallet private key escrow and recovery in public blockchains.We design a private key management scheme based on rational secret sharing that considers the self-interest of participants in secret sharing protocols,and constrains the behavior of rational participants through reasonable mechanism design,making it more suitable in distributed scenarios such as the public blockchain.The proposed scheme achieves the escrow and recovery of personal wallet private keys without the participation of trusted nodes,and simulate its implementation on smart contracts.Compared to other existing threshold wallet solutions and keymanagement schemes based on password-protected secret sharing(PPSS),the proposed scheme has a wide range of applications,verifiable private key recovery,low communication overhead,higher computational efficiency when users perform one-time multi-key escrow,no need for trusted nodes,and personal rational constraints and anti-collusion attack capabilities.
基金Scientific Research Project of Liaoning Province Education Department,Code:LJKQZ20222457&LJKMZ20220781Liaoning Province Nature Fund Project,Code:No.2022-MS-291.
文摘As industrialization and informatization becomemore deeply intertwined,industrial control networks have entered an era of intelligence.The connection between industrial control networks and the external internet is becoming increasingly close,which leads to frequent security accidents.This paper proposes a model for the industrial control network.It includes a malware containment strategy that integrates intrusion detection,quarantine,and monitoring.Basedonthismodel,the role of keynodes in the spreadofmalware is studied,a comparisonexperiment is conducted to validate the impact of the containment strategy.In addition,the dynamic behavior of the model is analyzed,the basic reproduction number is computed,and the disease-free and endemic equilibrium of the model is also obtained by the basic reproduction number.Moreover,through simulation experiments,the effectiveness of the containment strategy is validated,the influence of the relevant parameters is analyzed,and the containment strategy is optimized.In otherwords,selective immunity to key nodes can effectively suppress the spread ofmalware andmaintain the stability of industrial control systems.The earlier the immunization of key nodes,the better.Once the time exceeds the threshold,immunizing key nodes is almost ineffective.The analysis provides a better way to contain the malware in the industrial control network.
基金Project supported by Natural Science Foundation of Jiangsu Province(Grant Nos.BE2022071 and BK20192001)the National Natural Science Foundation of China(Grant Nos.12074194,62101285,62471248,and 12104240)Postgraduate Research&Practice Innovation Program of Jiangsu Province(Grant No.KYCX220954).
文摘In principle,the asynchronous measurement-device-independent quantum key distribution(AMDI-QKD)can surpass the key rate capacity without phase tracking and phase locking.However,practical imperfections in sources or detections would dramatically depress its performance.Here,we present an improved model on AMDI-QKD to reduce the influence of these imperfections,including intensity fluctuation,the afterpulse effect,and the dead time of detectors.Furthermore,we carry out corresponding numerical simulations.Simulation results show that,by implementing our present work,it can have more than 100 km longer secure transmission distance and one order of magnitude enhancement in the key generation rate after 320 km compared with the standard method.Moreover,our model can still break the Pirandola–Laurenza–Ottaviani–Banchi(PLOB)bound even under realistic experimental conditions.
基金This work has received funding from National Natural Science Foundation of China(No.42275157).
文摘With the rapid advancement in exploring perceptual interactions and digital twins,metaverse technology has emerged to transcend the constraints of space-time and reality,facilitating remote AI-based collaboration.In this dynamic metasystem environment,frequent information exchanges necessitate robust security measures,with Authentication and Key Agreement(AKA)serving as the primary line of defense to ensure communication security.However,traditional AKA protocols fall short in meeting the low-latency requirements essential for synchronous interactions within the metaverse.To address this challenge and enable nearly latency-free interactions,a novel low-latency AKA protocol based on chaotic maps is proposed.This protocol not only ensures mutual authentication of entities within the metasystem but also generates secure session keys.The security of these session keys is rigorously validated through formal proofs,formal verification,and informal proofs.When confronted with the Dolev-Yao(DY)threat model,the session keys are formally demonstrated to be secure under the Real-or-Random(ROR)model.The proposed protocol is further validated through simulations conducted using VMware workstation compiled in HLPSL language and C language.The simulation results affirm the protocol’s effectiveness in resisting well-known attacks while achieving the desired low latency for optimal metaverse interactions.
基金supported in part by the National Key R&D Program of China(No.2022YFB2902202)in part by the Fundamental Research Funds for the Central Universities(No.2242023K30034)+2 种基金in part by the National Natural Science Foundation of China(No.62171121,U22A2001),in part by the National Natural Science Foundation of China(No.62301144)in part by the National Natural Science Foundation of Jiangsu Province,China(No.BK20211160)in part by the Southeast University Startup Fund(No.4009012301)。
文摘Physical-layer secret key generation(PSKG)provides a lightweight way for group key(GK)sharing between wireless users in large-scale wireless networks.However,most of the existing works in this field consider only group communication.For a commonly dual-task scenario,where both GK and pairwise key(PK)are required,traditional methods are less suitable for direct extension.For the first time,we discover a security issue with traditional methods in dual-task scenarios,which has not previously been recognized.We propose an innovative segment-based key generation method to solve this security issue.We do not directly use PK exclusively to negotiate the GK as traditional methods.Instead,we generate GK and PK separately through segmentation which is the first solution to meet dual-task.We also perform security and rate analysis.It is demonstrated that our method is effective in solving this security issue from an information-theoretic perspective.The rate results of simulation are also consistent with the our rate derivation.
基金supported in part by the national natural science foundation of China (NSFC) under Grant61871193in part by the R&D Program of key science and technology fields in Guangdong province under Grant 2019B090912001in part by the Guangzhou Key Field R&D Program under Grant 202206030005
文摘Secret key generation(SKG)is a promising solution to the problem of wireless communications security.As the first step of SKG,channel probing affects it significantly.Although there have been some probing schemes,there is a lack of research on the optimization of the probing process.This study investigates how to optimize correlated parameters to maximize the SKG rate(SKGR)in the time-division duplex(TDD)mode.First,we build a probing model which includes the effects of transmitting power,the probing period,and the dimension of sample vectors.Based on the model,the analytical expression of the SKGR is given.Next,we formulate an optimization problem for maximizing the SKGR and give an algorithm to solve it.We conclude the SKGR monotonically increases as the transmitting power increases.Relevant mathematical proofs are given in this study.From the simulation results,increasing appropriately the probing period and the dimension of the sample vector could increase the SKGR dramatically compared to a yardstick,which indicates the importance of optimizing the parameters related to the channel probing phase.
基金financially supported by the National Natural Science Foundation of China(32001728,32172248)the Taishan Industrial Experts Program+1 种基金the Guizhou High-level Innovative Talent Training Project(Qianke Cooperation Platform Talent number[2016]5662)Guizhou Science and Technology Innovation Talent Team of Ecological Characteristic Meat Products.(QKHPTRC[2020]5004)。
文摘Dry-cured meat products are considerably popular around the world due to unique flavor.Proteolysis is one of the enzymatic reactions from which flavor substances are derived,which is affected by endogenous proteases.The purpose aimed to reveal the potential relationship between endogenous proteases and key flavor substances in dry-cured pork coppa in this paper.The dynamic changes of endogenous proteases activity,free amino acids,and volatiles during dry-cured pork coppa processing were characterized.The results showed that 5 kinds of free amino acids,Glu,Lys,Val,Ala,and Leu,were identified as significant contributors to taste.Meanwhile,key volatiles,such as hexanal,nonanal,octanal,benzaldehyde,3-methyl butanoic acid,2-methyl propanoic acid,and ethyl octanoate,greatly contributed to the flavor characteristics of dry-cured pork coppa.Further partial correlation analysis was performed to better elucidate the relationship among parameters.The results revealed that close relationship between endogenous proteases and key substances.RAP not only significantly affected the accumulation of key active-amino acids,but also affected the accumulation of ethyl octanoate,2,3-pentanedione,and 2,3-octanedione by regulating the accumulation of octanoic acid and Leu.In addition,cathepsin B and D,DPP II,DPP IV and RAP notably affected accumulation of hexanal.
基金This work was supported by the Major Scientific and Technological Special Project of Anhui Province(202103a13010004)the Major Scientific and Technological Special Project of Hefei City(2021DX007)+1 种基金the Key R&D Plan of Shandong Province(2020CXGC010105)the China Postdoctoral Science Foundation(2021M700315).
文摘Quantum key distribution(QKD),rooted in quantum mechanics,offers information-theoretic security.However,practi-cal systems open security threats due to imperfections,notably bright-light blinding attacks targeting single-photon detectors.Here,we propose a concise,robust defense strategy for protecting single-photon detectors in QKD systems against blinding attacks.Our strategy uses a dual approach:detecting the bias current of the avalanche photodiode(APD)to defend against con-tinuous-wave blinding attacks,and monitoring the avalanche amplitude to protect against pulsed blinding attacks.By integrat-ing these two branches,the proposed solution effectively identifies and mitigates a wide range of bright light injection attempts,significantly enhancing the resilience of QKD systems against various bright-light blinding attacks.This method forti-fies the safeguards of quantum communications and offers a crucial contribution to the field of quantum information security.
基金supported by ZTE IndustryUniversityInstitute Cooperation Funds under Grant No.HCCN20221029003.
文摘Secure Sockets Layer(SSL)and Transport Layer Security(TLS)protocols facilitates a secure framework for identity authentication,data encryption,and message integrity verification.However,with the recent development in quantum computing technology,the security of conventional key-based SSL/TLS protocols faces vulnerabilities.In this paper,we propose a scheme by integrating the quantum key into the SSL/TLS framework.Furthermore,the application of post-quantum algorithms is used to enhance and complement the existing encryption suites.Experimental results show that the proposed SSL/TLS communication system based on quantum keys exhibits high performance in latency and throughput.Moreover,the proposed system showcases good resilience against quantum attacks.
文摘State Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researchesand Comprehensive Utilization.
文摘National Key Laboratory of Baiyun Obo Rare Earth Resource Researches and Comprehensive Utilization was approved by the Ministry of Science and Technology to be one of the national key laboratories in November 2022.The laboratory was reconstructed based on former State Key Laboratory of Baiyun Obo Rare Earth Resources Researches and Comprehensive Utilization.The key laboratory takes Baotou Research Institute of Rare Earths as the main research body,cooperating with scientific and technological strength from Lanzhou University and Changsha Research Institute of Mining and Metallurgy.
基金supported by the National Natural Science Foundation of China(72271124,72071111).
文摘Aiming at the characteristics of multi-stage and(extremely)small samples of the identification problem of key effectiveness indexes of weapon equipment system-of-systems(WESoS),a Bayesian intelligent identification and inference model for system effectiveness assessment indexes based on dynamic grey incidence is proposed.The method uses multi-layer Bayesian techniques,makes full use of historical statistics and empirical information,and determines the Bayesian estima-tion of the incidence degree of indexes,which effectively solves the difficulties of small sample size of effectiveness indexes and difficulty in obtaining incidence rules between indexes.Sec-ondly,The method quantifies the incidence relationship between evaluation indexes and combat effectiveness based on Bayesian posterior grey incidence,and then identifies key system effec-tiveness evaluation indexes.Finally,the proposed method is applied to a case of screening key effectiveness indexes of a missile defensive system,and the analysis results show that the proposed method can fuse multi-moment information and extract multi-stage key indexes,and has good data extraction capability in the case of small samples.
文摘In today’s rapid widespread of digital technologies into all live aspects to enhance efficiency and productivity on the one hand and on the other hand ensure customer engagement, personal data counterfeiting has become a major concern for businesses and end-users. One solution to ensure data security is encryption, where keys are central. There is therefore a need to find robusts key generation implementation that is effective, inexpensive and non-invasive for protecting and preventing data counterfeiting. In this paper, we use the theory of electromagnetic wave propagation to generate encryption keys.