We present two robust quantum secure direct communication (QSDC) schemes with a quantum one-time pad over a collective-noise channel. Each logical qubit is made up of two physical qubits and it is invariant over a col...We present two robust quantum secure direct communication (QSDC) schemes with a quantum one-time pad over a collective-noise channel. Each logical qubit is made up of two physical qubits and it is invariant over a collective-noise channel. The two photons in each logical qubit can be produced with a practically entangled source, i.e., a parametric down-conversion source with a beta barium borate crystal and a pump pulse of ultraviolet light. The information is encoded on each logical qubit with two logical unitary operations, which will not destroy the antinoise feather of the quantum systems. The receiver Bob can read out the sender's message directly with two single-photon measurements on each logical qubit, instead of Bell-state measurements, which will make these protocols more convenient in a practical application. With current technology, our two robust QSDC schemes are feasible and may be optimal ones.展开更多
In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective nois...In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective noise,i.e.,collective-dephasing noise and collective-rotation noise,where each logical qubit is composed of two physical qubits and free from noise.In each of the two proposed protocols,the secret messages are encoded on the initial logical qubits via two composite unitary operations.Moreover,the single-photon measurements rather than the Bell-state measurements or the more complicated measurements are needed for decoding,making the two proposed protocols easier to implement.The initial state of each logical qubit is privately shared between the two authenticated users through the direct transmission of its auxiliary counterpart.Consequently,the information leakage problem is avoided in the two proposed protocols.Moreover,the detailed security analysis also shows that Eve’s several famous active attacks can be effectively overcome,such as the Trojan horse attack,the intercept-resend attack,the measure-resend attack,the entangle-measure attack and the correlation-elicitation(CE)attack.展开更多
An appropriate acquisition configuration in terms of signal quality can optimize the acquisition performance. In view of this, a new approach of acquisition assisted by the control voltage of automatic gain control(AG...An appropriate acquisition configuration in terms of signal quality can optimize the acquisition performance. In view of this, a new approach of acquisition assisted by the control voltage of automatic gain control(AGC) is proposed. This approach judges the signal power according to the AGC control voltage and switches the working modes correspondingly and adaptively. Non-coherent accumulation times and the detection threshold are reconfigured according to the working mode. Theoretical derivation and verification by simulation in typical situations are provided, and the algorithm is shown to be superior in terms of the mean acquisition time, especially in strong signal scenarios compared with the conventional algorithm.展开更多
A direct numerical simulation of a turbulent mixing layer with the Reynolds number 500 and the convective Mach number 0.6 is performed and the results obtained are used to study the turbulent flow field and its genera...A direct numerical simulation of a turbulent mixing layer with the Reynolds number 500 and the convective Mach number 0.6 is performed and the results obtained are used to study the turbulent flow field and its generated noise.In the present simulation,the numerical techniques of absorbing buffer zones,artificial convection velocity and spatial filtering are used to achieve nonreflecting boundary conditions.The self-similarity is used to validate the present numerical simulations.The large-scale coherent structures are plotted together with the acoustic waves,which demonstrates the directivity of acoustic waves.The Lighthill's source and space-time correlations are further investigated.The main contributions to mixing noise are identified in terms of large-scale coherent structures,Lighthill's source and space-time correlations.展开更多
This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen(EPR) pairs, which can withstand collective noises. Two users previously share an identity string ...This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen(EPR) pairs, which can withstand collective noises. Two users previously share an identity string representing their identities. The identity string is encoded as decoherence-free states(termed logical qubits), respectively, over the two collective noisy channels, which are used as decoy photons. By using the decoy photons, both the authentication of two users and the detection of eavesdropping were implemented. The use of logical qubits not only guaranteed the high fidelity of exchanged secret message, but also prevented the eavesdroppers to eavesdrop beneath a mask of noise.展开更多
Security of the quantum secure direct communication protocol (i.e., the C-S QSDC protocol) recently proposed by Cao and Song [Chin. Phys. Lett. 23 (2006) 290] is analyzed in the case of considerable quantum channe...Security of the quantum secure direct communication protocol (i.e., the C-S QSDC protocol) recently proposed by Cao and Song [Chin. Phys. Lett. 23 (2006) 290] is analyzed in the case of considerable quantum channel noise. The eavesdropping scheme is presented, which reveals that the C-S QSDC protocol is not secure if the quantum bit error rate (QBER) caused by quantum channel noise is higher than 4.17%. Our eavesdropping scheme induces about 4.17% QBER for those check qubits. However, such QBER can be hidden in the counterpart induced by the noisy quantum channel if the eavesdropper Eve replaces the original noisy channel by an ideal one. Furthermore, if the QBER induced by quantum channel noise is lower than 4.17%, then in the eavesdropping scheme Eve still can eavesdrop part of the secret messages by safely attacking a fraction of the transmitted qubits. Finally, an improvement on the C-S QSDC protocol is put forward.展开更多
To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, a...To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore.展开更多
In the towed line array sonar system,the tow ship noise is the main factor that affects the sonar performance.Conventional noise cancelling methods assume that the noise is towards the endfire direction of the array.A...In the towed line array sonar system,the tow ship noise is the main factor that affects the sonar performance.Conventional noise cancelling methods assume that the noise is towards the endfire direction of the array.An acoustic experiment employing a towed line array is conducted in the western Pacific Ocean,and a strange bearing-splitting phenomenon of the tow ship noise is observed in the array.The tow ship noise is split into multiple noise signals whose bearings are distributed between 10°and 90°deviating from the endfire direction.The multiple interferences increase the difficulty in recognizing the target for the sonar operator and noise cancellation.Therefore,making the mechanism clear and putting forward the tow ship noise splitting bearing estimation method are imperative.In this paper,the acoustic multi-path structure of the tow ship in deep water is analyzed.Then it is pointed out that the bearing-splitting phenomenon is caused by the main lobe of direct rays and bottom-reflected rays,as well as several side lobes of direct rays.Meanwhile,the indistinguishability between the elevation angle and the bearing angle due to the axial symmetry of a strict horizontal line array causes the bearing to deviate from the endfire direction.Based on the theory above,a method of estimating bearing of the tow ship noise in deep water is proposed.The theoretical analysis results accord with the experimental results,which helps to identify the target and provide correct initial bearing guidance for noise cancelation methods.展开更多
In this paper,a novel quantum steganography protocol based on Brown entangled states is proposed.The new protocol adopts the CNOT operation to achieve the transmission of secret information by the best use of the char...In this paper,a novel quantum steganography protocol based on Brown entangled states is proposed.The new protocol adopts the CNOT operation to achieve the transmission of secret information by the best use of the characteristics of entangled states.Comparing with the previous quantum steganography algorithms,the new protocol focuses on its anti-noise capability for the phase-flip noise,which proved its good security resisting on quantum noise.Furthermore,the covert communication of secret information in the quantum secure direct communication channel would not affect the normal information transmission process due to the new protocol’s good imperceptibility.If the number of Brown states transmitted in carrier protocol is many enough,the imperceptibility of the secret channel can be further enhanced.In aspect of capacity,the new protocol can further expand its capacity by combining with other quantum steganography protocols.Due to that the proposed protocol does not require the participation of the classic channel when it implements the transmission of secret information,any additional information leakage will not be caused for the new algorithm with good security.The detailed theoretical analysis proves that the new protocol can own good performance on imperceptibility,capacity and security.展开更多
基金supported by the Natural Science Foundation of Jiangsu Provincial Universities (Grant No. 10KJB180004)the National Natural Science Foundation of China (Grant No. 10847147)
文摘We present two robust quantum secure direct communication (QSDC) schemes with a quantum one-time pad over a collective-noise channel. Each logical qubit is made up of two physical qubits and it is invariant over a collective-noise channel. The two photons in each logical qubit can be produced with a practically entangled source, i.e., a parametric down-conversion source with a beta barium borate crystal and a pump pulse of ultraviolet light. The information is encoded on each logical qubit with two logical unitary operations, which will not destroy the antinoise feather of the quantum systems. The receiver Bob can read out the sender's message directly with two single-photon measurements on each logical qubit, instead of Bell-state measurements, which will make these protocols more convenient in a practical application. With current technology, our two robust QSDC schemes are feasible and may be optimal ones.
基金supported by the National Natural Science Foundation of China(Grant No.11375152 and 61402407)the Natural Science Foundation of Zhejiang Province(Grant No.LQ12F02012)
文摘In this paper,two information leakage resistant quantum dialogue(QD)protocols over a collective-noise channel are proposed.Decoherence-free subspace(DFS)is used to erase the influence from two kinds of collective noise,i.e.,collective-dephasing noise and collective-rotation noise,where each logical qubit is composed of two physical qubits and free from noise.In each of the two proposed protocols,the secret messages are encoded on the initial logical qubits via two composite unitary operations.Moreover,the single-photon measurements rather than the Bell-state measurements or the more complicated measurements are needed for decoding,making the two proposed protocols easier to implement.The initial state of each logical qubit is privately shared between the two authenticated users through the direct transmission of its auxiliary counterpart.Consequently,the information leakage problem is avoided in the two proposed protocols.Moreover,the detailed security analysis also shows that Eve’s several famous active attacks can be effectively overcome,such as the Trojan horse attack,the intercept-resend attack,the measure-resend attack,the entangle-measure attack and the correlation-elicitation(CE)attack.
基金supported by the National Natural Science Foundation of China(Grant No.61401026)the National High Technology Research and Development Program of China(Grant No.2014AA1070)
文摘An appropriate acquisition configuration in terms of signal quality can optimize the acquisition performance. In view of this, a new approach of acquisition assisted by the control voltage of automatic gain control(AGC) is proposed. This approach judges the signal power according to the AGC control voltage and switches the working modes correspondingly and adaptively. Non-coherent accumulation times and the detection threshold are reconfigured according to the working mode. Theoretical derivation and verification by simulation in typical situations are provided, and the algorithm is shown to be superior in terms of the mean acquisition time, especially in strong signal scenarios compared with the conventional algorithm.
基金supported by the National Natural Science Foundation of China (Grant Nos. 11232011 and 11021262)the National Basic Research Program of China (Grant No. 2013CB834100)(Nonlinear science)
文摘A direct numerical simulation of a turbulent mixing layer with the Reynolds number 500 and the convective Mach number 0.6 is performed and the results obtained are used to study the turbulent flow field and its generated noise.In the present simulation,the numerical techniques of absorbing buffer zones,artificial convection velocity and spatial filtering are used to achieve nonreflecting boundary conditions.The self-similarity is used to validate the present numerical simulations.The large-scale coherent structures are plotted together with the acoustic waves,which demonstrates the directivity of acoustic waves.The Lighthill's source and space-time correlations are further investigated.The main contributions to mixing noise are identified in terms of large-scale coherent structures,Lighthill's source and space-time correlations.
基金supported by the Science and Technology Support Project of Sichuan Province of China(Grant No.2013GZX0137)the Fund for Young Persons Project of Sichuan Province of China(Grant No.12ZB017)+2 种基金the National Natural Science Foundation of China(Grant No.61100205)the Project of the Fundamental Research Funds for the Central Universities of China(Grant No.2013RC0307)the Cryptography Basic Development of the National"Twelfth Five-Year Plan" of China on Cryptographic Theory(Grant No.MMJJ201301004)
文摘This work presents two robust quantum secure communication schemes with authentication based on Einstein-Podolsky-Rosen(EPR) pairs, which can withstand collective noises. Two users previously share an identity string representing their identities. The identity string is encoded as decoherence-free states(termed logical qubits), respectively, over the two collective noisy channels, which are used as decoy photons. By using the decoy photons, both the authentication of two users and the detection of eavesdropping were implemented. The use of logical qubits not only guaranteed the high fidelity of exchanged secret message, but also prevented the eavesdroppers to eavesdrop beneath a mask of noise.
基金The project supported by the Program for New Century Excellent Talents at the University of China under Grant No.NCET-06-0554the National Natural Science Foundation of China under Grant No.60677001+3 种基金the Science Technology Fund of Anhui Province for Outstanding Youth under Grant No.06042087the Key Fund of the Ministry of Education of China under Grant No.206063the Natural Science Foundation of Guangdong Province under Grant Nos.06300345 and 7007806Natural Science Foundation of Hubei Province under Grant No.2006ABA354
文摘Security of the quantum secure direct communication protocol (i.e., the C-S QSDC protocol) recently proposed by Cao and Song [Chin. Phys. Lett. 23 (2006) 290] is analyzed in the case of considerable quantum channel noise. The eavesdropping scheme is presented, which reveals that the C-S QSDC protocol is not secure if the quantum bit error rate (QBER) caused by quantum channel noise is higher than 4.17%. Our eavesdropping scheme induces about 4.17% QBER for those check qubits. However, such QBER can be hidden in the counterpart induced by the noisy quantum channel if the eavesdropper Eve replaces the original noisy channel by an ideal one. Furthermore, if the QBER induced by quantum channel noise is lower than 4.17%, then in the eavesdropping scheme Eve still can eavesdrop part of the secret messages by safely attacking a fraction of the transmitted qubits. Finally, an improvement on the C-S QSDC protocol is put forward.
基金Supported by the National Natural Science Foundation of China under Grant Nos 61472048,61402058,61272511,61472046,61202082 and 61370194the Beijing Natural Science Foundation under Grant No 4152038the China Postdoctoral Science Foundation Funded Project under Grant No 2014M561826
文摘To analyze the security of two-step quantum direct communication protocol (QDCP) by using Einstein-Podolsky Rosen pair proposed by Deng et al. [Phys. Rev. A 68 (2003)042317] in collective-rotation noise channel, an excellent model of noise analysis is proposed. In the security analysis, the method of the entropy theory is introduced, and is compared with QDCP, an error rate point Qo(M : (Q0, 1.0)) is given. In different noise levels, if Eve wants to obtain the same amount of information, the error rate Q is distinguishable. The larger the noise level ~ is, the larger the error rate Q is. When the noise level ~ is lower than 11%, the high error rate is 0.153 without eavesdropping. Lastly, the security of the proposed protocol is discussed. It turns out that the quantum channel will be safe when Q 〈 0.153. Similarly, if error rate Q〉 0.153 = Q0, eavesdropping information I 〉 1, which means that there exist eavesdroppers in the quantum channel, and the quantum channel will not be safe anymore.
基金Project supported by the National Defense Basic Science Research Program,China(Grant No.JCKY2016607C009)the Youth Innovation Promotion Association of the Chinese Academy of Sciences(Grant No.2018025)。
文摘In the towed line array sonar system,the tow ship noise is the main factor that affects the sonar performance.Conventional noise cancelling methods assume that the noise is towards the endfire direction of the array.An acoustic experiment employing a towed line array is conducted in the western Pacific Ocean,and a strange bearing-splitting phenomenon of the tow ship noise is observed in the array.The tow ship noise is split into multiple noise signals whose bearings are distributed between 10°and 90°deviating from the endfire direction.The multiple interferences increase the difficulty in recognizing the target for the sonar operator and noise cancellation.Therefore,making the mechanism clear and putting forward the tow ship noise splitting bearing estimation method are imperative.In this paper,the acoustic multi-path structure of the tow ship in deep water is analyzed.Then it is pointed out that the bearing-splitting phenomenon is caused by the main lobe of direct rays and bottom-reflected rays,as well as several side lobes of direct rays.Meanwhile,the indistinguishability between the elevation angle and the bearing angle due to the axial symmetry of a strict horizontal line array causes the bearing to deviate from the endfire direction.Based on the theory above,a method of estimating bearing of the tow ship noise in deep water is proposed.The theoretical analysis results accord with the experimental results,which helps to identify the target and provide correct initial bearing guidance for noise cancelation methods.
基金This work was supported by the National Natural Science Foundation of China(No.61373131,61303039,61232016,61501247)the Six Talent Peaks Project of Jiangsu Province(Grant No.2015-XXRJ-013)+3 种基金Natural Science Foundation of Jiangsu Province(Grant No.BK20171458)the Natural Science Foundation of the Higher Education Institutions of Jiangsu Province(China under Grant No.16KJB520030)Sichuan Youth Science and Technique Foundation(No.2017JQ0048)NUIST Research Foundation for Talented Scholars(2015r014),PAPD and CICAEET funds.
文摘In this paper,a novel quantum steganography protocol based on Brown entangled states is proposed.The new protocol adopts the CNOT operation to achieve the transmission of secret information by the best use of the characteristics of entangled states.Comparing with the previous quantum steganography algorithms,the new protocol focuses on its anti-noise capability for the phase-flip noise,which proved its good security resisting on quantum noise.Furthermore,the covert communication of secret information in the quantum secure direct communication channel would not affect the normal information transmission process due to the new protocol’s good imperceptibility.If the number of Brown states transmitted in carrier protocol is many enough,the imperceptibility of the secret channel can be further enhanced.In aspect of capacity,the new protocol can further expand its capacity by combining with other quantum steganography protocols.Due to that the proposed protocol does not require the participation of the classic channel when it implements the transmission of secret information,any additional information leakage will not be caused for the new algorithm with good security.The detailed theoretical analysis proves that the new protocol can own good performance on imperceptibility,capacity and security.