The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
We show that the performance of continuous-variable measurement-device-independent quantum key distribution will decline dramatically when considering detector's imperfections. However, it can be improved by using phase sensitive optical amplifiers.
Nowadays the mobile equipment has become an essential tool of providing access to business resources from the organization's internal network and other services. Hence the security of wireless communication becomes more and more important. This paper demonstrates how to implement a mobile access system based on multi-factor authentication for security mobile communication,at the same time, improving...
This paper proposes a secure data aggregation scheme for clustered wireless sensor networks. In our design, the encrypted sensor readings were transmitted to the cluster head with MAC and the cluster head process the encrypted data aggregation without decryption. For the readings have the same value and come from different nodes, the cluster head remains the node's identifiers in data aggregation...
We propose a new approach of quantum random number generator (QRNG) based on the photon number decision of weak laser pulses, which permits a high generation rate and convenient tuning of bias.
The rapid development of Internet technology brings people not only great convenience but also many potential safety hazards. This paper studied and implemented embedded Linux operating system first and then introduced the network topology and transmission mechanism of system and identity authentication protocol and key exchange protocol of platform, subsequently introduced the data encryption algorithm...
Post-processing is an important part of quantum key distribution (QKD) system. This paper discusses the motivation for designing a multi-thread QKD post processing software, its architecture, communication protocol specification, and synchronization issues. It is shown that efficiency is gained from multi-thread programming. Future work to improve the software is also discussed.
Secret key reconciliation is an important step in the process of quantum key distribution. In the protocols used for reconciliation, Winnow has been proved a fast and efficient one. In this paper, we analyze the efficiency of Winnow in terms of amount of leaked information in details. We give the optimal block size in Winnow theoretically and experimentally for different error rate.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.