A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with ...A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with a set of devices under the control of a third party. The security of the scheme is analysed and confirmed.展开更多
In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 200...In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 2002, 89: 187902]. But the protocol was proved very vulnerable, and can be attacked by an eavesdropper. An improved "Ping-pong" protocol is presented to overcome the problem. The GHZ state particles are used to detect eavesdroppers, and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol. During the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information which an eavesdropper can obtain and the interference introduced. If the eavesdropper gets the full information, the detection rate of the original "Ping-pong" protocol is 50%; the detection rate of the second protocol which used two particles of EPR pair as detection particles is also 50%; and the detection rate of the presented protocol is 75%. In the end, the security of the pro-posed protocol is discussed. The analysis results show that the improved "Ping-pong" protocol in this paper is more secure than the other two.展开更多
We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdroppe...We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol.展开更多
This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying systems.Due to the inherent vulnerability of network-based communication,the measu...This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying systems.Due to the inherent vulnerability of network-based communication,the measurement signals transmitted over a communication network might be intercepted by potential eavesdroppers.To avoid information leakage,by resorting to an artificial-noise-assisted method,we develop a novel encryption-decryption scheme to ensure that the transmitted signal is composed of the raw measurement and an artificial-noise term.A special evaluation index named secrecy capacity is employed to assess the information security of signal transmissions under the developed encryption-decryption scheme.The purpose of the addressed problem is to design an encryptiondecryption scheme and a state estimator such that:1)the desired secrecy capacity is ensured;and 2)the required finite-horizon–l_(2)-l_(∞)performance is achieved.Sufficient conditions are established on the existence of the encryption-decryption mechanism and the finite-horizon state estimator.Finally,simulation results are proposed to show the effectiveness of our proposed encryption-decryption-based state estimation scheme.展开更多
In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But ...In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But the protocol was proved to have many vulnerabilities,and can be attacked by eavesdroppers.To overcome the problem,an improved security detection strategy which inserts the | 0〉,| 1〉,|+〉and |-〉particles into the messages as the decoy particles randomly in the"Ping-pong"protocol is presented.During the security analysis,the method of the entropy theory is introduced,and three detection strategies are compared quantitatively by using the constraint between the information which eavesdroppers can obtain and the interference introduced.Because of the presence of the trap particles |+〉and |-〉,the detection rate will be no less than 25% when Eve attacks the communication.The security analysis result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two,so the detection strategy in the protocol can ensure that the "Ping-pong"protocol is more secure.展开更多
In order to transmit secure messages,a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented.The five-particle cluster state is used to detect eav...In order to transmit secure messages,a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented.The five-particle cluster state is used to detect eavesdroppers,and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol.In the security analysis,the entropy theory method is introduced,and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced.If the eavesdroppers intend to obtain all the information,the detection rate of the original ping-pong protocol is 50%;the second protocol,using two particles of the Einstein-Podolsky-Rosen pair as detection particles,is also 50%;while the presented protocol is 89%.Finally,the security of the proposed protocol is discussed,and the analysis results indicate that the protocol in this paper is more secure than the other two.展开更多
The quantum secure direct communication protocol recently proposed by Cao and Song [Chin. Phys. Left. 23 (2006)290] (i.e., the C-S QSDC protocol) is revisited. A security leak is pointed out. Taking advantage of t...The quantum secure direct communication protocol recently proposed by Cao and Song [Chin. Phys. Left. 23 (2006)290] (i.e., the C-S QSDC protocol) is revisited. A security leak is pointed out. Taking advantage of this leak, an eavesdropper may adopt the intercept-measure-resend strategy to attack the quantum channel such that in the C-S QSDC protocol the secret message can be completely eavesdropped. To fix the leak, the original version of the C-S QSDC protocol is revised. As a consequence, the security is improved and assured at least in the case of an ideal quantum channel.展开更多
Active distribution network(ADN),as a typically cyber-physical system,develops with the evolution of Internet of Things(IoTs),which makes the network vulnerable to cybersecurity threats.In this paper,the eavesdropping...Active distribution network(ADN),as a typically cyber-physical system,develops with the evolution of Internet of Things(IoTs),which makes the network vulnerable to cybersecurity threats.In this paper,the eavesdropping attacks that lead to privacy breaches are addressed for the IoT-enabled ADN.A privacy-preserving energy management system(EMS)is proposed and empowered by secure data exchange protocols based on the homomorphic cryptosystem.During the information transmission among distributed generators and load customers in the EMS,private information including power usage and electricity bidding price can be effectively protected against eavesdropping attacks.The correctness of the final solutions,e.g.,optimal market clearing price and unified power utilization ratio,can be deterministically guaranteed.The simulation results demonstrate the effectiveness and the computational efficiency of the proposed homomorphically encrypted EMS.展开更多
We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers.To address the problem of li...We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers.To address the problem of limited pilot resources,a scheme is proposed to allocate the pilot with the minimum pollution to users based on access point selection and optimize the pilot transmission power to improve the accuracy of channel estimation.Aiming at the secure transmission problem under a colluding eavesdropping environment by multiple passive eavesdroppers,based on the local partial zero-forcing precoding scheme,a transmission power optimization scheme is formulated to maximize the system’s minimum security spectral efficiency.Simulation results show that the proposed scheme can effectively reduce channel estimation error and improve system security.展开更多
In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdro...In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.展开更多
随着无线通信网络在全球范围内蓬勃发展,无线通信网络中的隐私和安全问题引起了广泛的研究。物理层安全技术方案已被证明是解决未来网络安全性能的重要方案,有望满足日益增长的用户安全通信需求。为了防止窃听者窃取保密信息,在合法信...随着无线通信网络在全球范围内蓬勃发展,无线通信网络中的隐私和安全问题引起了广泛的研究。物理层安全技术方案已被证明是解决未来网络安全性能的重要方案,有望满足日益增长的用户安全通信需求。为了防止窃听者窃取保密信息,在合法信道和窃听信道的信道状态信息(Channel State Information,CSI)已知的情况下,文章提出一种抗窃听物理层安全预编码方案。该方案能够有效提升合法信道的信道容量,在合法用户(Bob)和窃听用户(Eve)之间产生容量差以保证信息的安全传输,同时使得合法用户的中断概率远低于窃听用户,从而保证信息传输的可靠性。仿真结果证明了所提方案的有效性。展开更多
基金Supported by the National Natural Science Foundation of China under Grant Nos 10534030 and 10304022.
文摘A controlled bidirectional quantum secret direct communication scheme is proposed by using a Greenberger- Horne-Zeilinger (GHZ) state. In the scheme, two users can exchange their secret messages simultaneously with a set of devices under the control of a third party. The security of the scheme is analysed and confirmed.
基金supported by the Specialized Research Fund for the Doctoral Program of Higher Education of China (Grant No. 20060013007)the Natural Science Foundation of Beijing (Grant No. 4092029)the National Natural Science Foundation of China (Grant No. 60873001)
文摘In order to transmit the secure message, a deterministic secure quantum direct communication protocol which was called "Ping-pong" protocol was proposed by Bostrrm and Felbinger [Bostrom K, et al. Phys Rev Lett, 2002, 89: 187902]. But the protocol was proved very vulnerable, and can be attacked by an eavesdropper. An improved "Ping-pong" protocol is presented to overcome the problem. The GHZ state particles are used to detect eavesdroppers, and the classical XOR operation which serves as a one-time-pad is used to ensure the security of the protocol. During the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information which an eavesdropper can obtain and the interference introduced. If the eavesdropper gets the full information, the detection rate of the original "Ping-pong" protocol is 50%; the detection rate of the second protocol which used two particles of EPR pair as detection particles is also 50%; and the detection rate of the presented protocol is 75%. In the end, the security of the pro-posed protocol is discussed. The analysis results show that the improved "Ping-pong" protocol in this paper is more secure than the other two.
基金Project supported by the National Natural Science Foundation of China (Grant No 10604008) and the Beijing Education Committee (Grant No XK100270454).
文摘We introduce an attack scheme for eavesdropping freely the ping-pong quantum communication protocol proposed by Bostrǒm and Felbinger [Phys. Rev. Left. 89, 187902 (2002)] in a noise channel. The vicious eavesdropper, Eve, intercepts and measures the travel photon transmitted between the sender and the receiver. Then she replaces the quantum signal with a multi-photon signal in the same state, and measures the returned photons with the measuring basis, with which Eve prepares the fake signal except for one photon. This attack increases neither the quantum channel losses nor the error rate in the sampling instances for eavesdropping check. It works for eavesdropping the secret message transmitted with the ping-pong protocol. Finally, we propose a way for improving the security of the ping-pong protocol.
基金This work was supported in part by the National Natural Science Foundation of China(62273087,61933007,62273088,U21A2019,62073180)the Shanghai Pujiang Program of China(22PJ1400400)+3 种基金the Program of Shanghai Academic/Technology Research Leader of China(20XD1420100)the European Union’s Horizon 2020 Research and Innovation Programme(820776)(INTEGRADDE)the Royal Society of UKthe Alexander von Humboldt Foundation of Germany.
文摘This paper is concerned with the problem of finitehorizon energy-to-peak state estimation for a class of networked linear time-varying systems.Due to the inherent vulnerability of network-based communication,the measurement signals transmitted over a communication network might be intercepted by potential eavesdroppers.To avoid information leakage,by resorting to an artificial-noise-assisted method,we develop a novel encryption-decryption scheme to ensure that the transmitted signal is composed of the raw measurement and an artificial-noise term.A special evaluation index named secrecy capacity is employed to assess the information security of signal transmissions under the developed encryption-decryption scheme.The purpose of the addressed problem is to design an encryptiondecryption scheme and a state estimator such that:1)the desired secrecy capacity is ensured;and 2)the required finite-horizon–l_(2)-l_(∞)performance is achieved.Sufficient conditions are established on the existence of the encryption-decryption mechanism and the finite-horizon state estimator.Finally,simulation results are proposed to show the effectiveness of our proposed encryption-decryption-based state estimation scheme.
基金supported by Specialized Research Fund for the Doctoral Program of Higher Education of China under Grant No.20060013007National Natural Science Foundation of Beijing under Grant No.4092029National Natural Science Foundation of China under Grant No.60873001
文摘In order to transmit the secure messages,a deterministic secure quantum direct communication protocol,called the "Ping-pong"protocol was proposed by Bostrm and Felbinger [Phys.Rev.Lett.89,187902(2002) ].But the protocol was proved to have many vulnerabilities,and can be attacked by eavesdroppers.To overcome the problem,an improved security detection strategy which inserts the | 0〉,| 1〉,|+〉and |-〉particles into the messages as the decoy particles randomly in the"Ping-pong"protocol is presented.During the security analysis,the method of the entropy theory is introduced,and three detection strategies are compared quantitatively by using the constraint between the information which eavesdroppers can obtain and the interference introduced.Because of the presence of the trap particles |+〉and |-〉,the detection rate will be no less than 25% when Eve attacks the communication.The security analysis result shows that the efficiency of eavesdropping detection in the presented protocol is higher than the other two,so the detection strategy in the protocol can ensure that the "Ping-pong"protocol is more secure.
基金Supported by National Natural Science Foundation of China (61100205)
文摘In order to transmit secure messages,a quantum secure direct communication protocol based on a five-particle cluster state and classical XOR operation is presented.The five-particle cluster state is used to detect eavesdroppers,and the classical XOR operation serving as a one-time-pad is used to ensure the security of the protocol.In the security analysis,the entropy theory method is introduced,and three detection strategies are compared quantitatively by using the constraint between the information that the eavesdroppers can obtain and the interference introduced.If the eavesdroppers intend to obtain all the information,the detection rate of the original ping-pong protocol is 50%;the second protocol,using two particles of the Einstein-Podolsky-Rosen pair as detection particles,is also 50%;while the presented protocol is 89%.Finally,the security of the proposed protocol is discussed,and the analysis results indicate that the protocol in this paper is more secure than the other two.
基金Supported by the National Natural Science Foundation of China under Grant No 10304022, the Science-Technology Fund of Anhui Province for 0utstanding Youth under Grant No 06042087, the General Fund of the Educational Committee of Anhui Province under Grant No 2006KJ260B, the Key Fund of the Ministry of Education of China under Grant No 206063, the Natural Science Foundation of Hubei Province under Grant No 2006ABA354, and the Foundation of the State Key Laboratory of Magnetic Resonance and Atomic and Molecular Physics of Chinese Academy of Sciences under Grant No T152615.
文摘The quantum secure direct communication protocol recently proposed by Cao and Song [Chin. Phys. Left. 23 (2006)290] (i.e., the C-S QSDC protocol) is revisited. A security leak is pointed out. Taking advantage of this leak, an eavesdropper may adopt the intercept-measure-resend strategy to attack the quantum channel such that in the C-S QSDC protocol the secret message can be completely eavesdropped. To fix the leak, the original version of the C-S QSDC protocol is revised. As a consequence, the security is improved and assured at least in the case of an ideal quantum channel.
基金supported by the National Natural Science Foundation of China(No.52077188)Guangdong Science and Technology Department(No.2019A1515011226)Hong Kong Research Grant Council(No.15219619).
文摘Active distribution network(ADN),as a typically cyber-physical system,develops with the evolution of Internet of Things(IoTs),which makes the network vulnerable to cybersecurity threats.In this paper,the eavesdropping attacks that lead to privacy breaches are addressed for the IoT-enabled ADN.A privacy-preserving energy management system(EMS)is proposed and empowered by secure data exchange protocols based on the homomorphic cryptosystem.During the information transmission among distributed generators and load customers in the EMS,private information including power usage and electricity bidding price can be effectively protected against eavesdropping attacks.The correctness of the final solutions,e.g.,optimal market clearing price and unified power utilization ratio,can be deterministically guaranteed.The simulation results demonstrate the effectiveness and the computational efficiency of the proposed homomorphically encrypted EMS.
基金supported by the National Natural Science Foundation of China(Nos.62071485,61671472,and 62271503)the Natural Science Foundation of Jiangsu Province,China(Nos.20201334 and 20181335)。
文摘We investigate the resource allocation problem of a cell-free massive multiple-input multiple-output system under the condition of colluding eavesdropping by multiple passive eavesdroppers.To address the problem of limited pilot resources,a scheme is proposed to allocate the pilot with the minimum pollution to users based on access point selection and optimize the pilot transmission power to improve the accuracy of channel estimation.Aiming at the secure transmission problem under a colluding eavesdropping environment by multiple passive eavesdroppers,based on the local partial zero-forcing precoding scheme,a transmission power optimization scheme is formulated to maximize the system’s minimum security spectral efficiency.Simulation results show that the proposed scheme can effectively reduce channel estimation error and improve system security.
基金Acknowledgements The project was supported by the Specialized Research Found for the Doctoral Program of Higher Education of China under Grant No. 20060013007 the National Natural Science Foundation of Beijing under Caant No. 4092029 and the National Natural Science Foundation of China under Grant No. 61100205, No. 60873001.
文摘In order to transmit secure messages, a quantum secure direct communication protocol based on extended three-particle GHZ state was presented, in which the extended three-particle GHZ state was used to detect eavesdroppers. In the security analysis, the method of the entropy theory is introduced, and three detection strategies are compared quantitatively by using the constraint between the information eavesdroppers can obtain and the interference introduced. If the eavesdroppers intend to obtain all inforrmtion, the detection rate of the original "Ping-pong" protocol is 50% ; the second protocol used two particles of EPR pair as detection particles is also 50%; while the presented protocol is 58%. At last, the security of the proposed protocol is discussed. The analysis results indicate that the protocol in this paper is more secure than the other two.
文摘随着无线通信网络在全球范围内蓬勃发展,无线通信网络中的隐私和安全问题引起了广泛的研究。物理层安全技术方案已被证明是解决未来网络安全性能的重要方案,有望满足日益增长的用户安全通信需求。为了防止窃听者窃取保密信息,在合法信道和窃听信道的信道状态信息(Channel State Information,CSI)已知的情况下,文章提出一种抗窃听物理层安全预编码方案。该方案能够有效提升合法信道的信道容量,在合法用户(Bob)和窃听用户(Eve)之间产生容量差以保证信息的安全传输,同时使得合法用户的中断概率远低于窃听用户,从而保证信息传输的可靠性。仿真结果证明了所提方案的有效性。