排序方式: 共有87条查询结果,搜索用时 156 毫秒
81.
82.
To improve the security of the smart grid, quantum key distribution(QKD) is an excellent choice. The rapid fluctuations on the power aerial optical cable and electromagnetic disturbance in substations are two main challenges for implementation of QKD. Due to insensitivity to birefringence of the channel, the stable phase-coding Faraday–Michelson QKD system is very practical in the smart grid. However, the electromagnetic disturbance in substations on this practical QKD system should be considered. The disturbance might change the rotation angle of the Faraday mirror, and would introduce an additional quantum bit error rate(QBER). We derive the new fringe visibility of the system and the additional QBER from the electromagnetic disturbance. In the worst case, the average additional QBER only increases about 0.17% due to the disturbance, which is relatively small to normal QBER values. We also find the way to degrade the electromagnetic disturbance on the QKD system. 相似文献
83.
84.
85.
Passive decoy state quantum key distribution(PDS-QKD) has advantages in high-speed scenarios.We propose a modified model to simulate the PDS-QKD with a weak coherent light source based on Curty’s theory [Opt.Lett.34 3238(2009)].The modified model can provide better performance in a practical PDS-QKD system.Moreover,we report an experimental demonstration of the PDS-QKD of over 22.0-dB channel loss. 相似文献
86.
以葡萄糖为原料,经乙酰化、选择性脱C1位乙酰基、转化成三氯乙酰亚胺酯、与受体醇偶联和脱保护5步反应合成了11种不同碳链长度的烷基β-D-吡喃葡萄糖苷。 利用核磁共振、偏光显微镜和热失重分析法对其进行结构表征和性能测试。 结果表明,当烷基β-D-吡喃葡萄糖苷疏水烷基链长n为 6~10时,均具有发泡和乳化性能,特别是正壬基β-D-吡喃葡萄糖苷(n=9)具有更加优异的发泡和乳化性能;当烷基β-D-吡喃葡萄糖苷疏水链的长度n≥7时,均具有热致液晶行为,特别是正十二烷基β-D-吡喃葡萄糖苷(n=12)和十四烷基β-D-吡喃葡萄糖苷(n=14)能够形成更加稳定的液晶态。 相似文献
87.
Quantum hacking of two-way continuous-variable quantum key distribution using Trojan-horse attack 下载免费PDF全文
We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulsewidth, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward. 相似文献