- Quantum Information and Cryptography
- Quantum Computing Algorithms and Architecture
- Optical Network Technologies
- Quantum-Dot Cellular Automata
- Quantum optics and atomic interactions
- Quantum Mechanics and Applications
- Advanced Frequency and Time Standards
- Advanced Photonic Communication Systems
- Photonic and Optical Devices
- Privacy-Preserving Technologies in Data
- Chaos-based Image/Signal Encryption
- Network Time Synchronization Technologies
- Advanced Fiber Laser Technologies
- Atomic and Subatomic Physics Research
- Internet Traffic Analysis and Secure E-voting
- Cryptographic Implementations and Security
- Semiconductor Lasers and Optical Devices
- Wireless Signal Modulation Classification
- Network Security and Intrusion Detection
- Cold Atom Physics and Bose-Einstein Condensates
- Cryptography and Data Security
- Blockchain Technology Applications and Security
- Digital Media Forensic Detection
- Privacy, Security, and Data Protection
- Wireless Communication Security Techniques
Southwestern Institute of Physics
2015-2025
Beijing Microelectronics Technology Institute
2024
Wuhan Institute of Physics and Mathematics
2023
Chinese Academy of Sciences
2022-2023
University of Chinese Academy of Sciences
2022-2023
China University of Mining and Technology
2023
National University of Defense Technology
2022
Aerospace Information Research Institute
2022
Hong Kong Baptist University
2022
Southern University of Science and Technology
2022
A high-speed Gaussian-modulated continuous-variable quantum key distribution (CVQKD) with a local oscillator (LLO) is experimentally demonstrated based on pilot-tone-assisted phase compensation. In the proposed scheme, frequency-multiplexing and polarization-multiplexing techniques are used for separate transmission heterodyne detection between signal pilot tone, guaranteeing no crosstalk from strong tone to weak different requirements of low-noise high-saturation limitation tone. Moreover,...
A high-rate continuous-variable quantum key distribution (CV-QKD) system based on high-order discrete modulation is experimentally investigated. With the help of novel scheme, effective digital signal processing (DSP) algorithms and advanced analytical security proof methods, transmission results 5.059 km, 10.314 24.490 50.592 km are achieved for 1 GBaud optimized signals. Correspondingly, asymptotic secret rates (SKRs) 292.185 Mbps, 156.246 50.491 7.495 Mbps Gaussian (DG) 64QAM, 328.297...
Precise and secure time synchronization between two remote sites is necessary in many practical scenarios. Recently, the two-way fiber transfer (TWFTT) system has become an attractive option for high-precision synchronization. However, TWFTT implemented based on symmetric link assumption, such assumption may be maliciously utilized to cause significant asynchronization TWFTT. In this paper, we propose novel controllable asymmetry attack schemes TWFTT, namely, attenuation attack. We...
Abstract Continuous-variable quantum key distribution (CVQKD) has potential advantages of high secret rate, which is very suitable for high-speed metropolitan network application. However, the rates reported CVQKD systems are only a few Mbps over typical transmission distance so far. Here, we address fundamental experimental problems and demonstrate single-carrier four-state with sub-Gbps rate within area. In demonstrated using local oscillator, an ultra-low level excess noise obtained...
We experimentally demonstrated a sub-Mbps key rate Gaussian-modulated coherent-state (GMCS) continuous-variable quantum distribution (CV-QKD) over 100-km transmission distance. To efficiently control the excess noise, signal and pilot tone are co-transmitted in fiber channel based on wideband frequency polarization multiplexing methods. Furthermore, high-accuracy data-assisted time domain equalization algorithm is carefully designed to compensate phase noise variation low signal-to-noise...
Quantum Random Number Generators (QRNGs) have been theoretically proven to be able generate completely unpredictable random sequences, and important applications in many fields. However, the practical implementation of QRNG is always susceptible unwanted classical noise or device imperfections, which inevitably diminishes quality generated bits. It necessary perform post-processing extract true quantum randomness contained raw data by entropy source QRNG. In this work, a novel method for...
We present FPGA-based emulation results of a single QC-LDPC code with 20% redundancy designed for applications in 100 Gb/s optical transmission systems. Error floor-free can be achieved at BER 10−15with Q factor 5.9 dB.
The study of topological states has developed rapidly in electric circuits, which permits flexible fabrications non-Hermitian systems by introducing terms. Here, nonreciprocal coupling terms are realized utilizing a voltage follower module circuits. We report the experimental realization one- and two-dimensional skin interface where induced effects localized at different domains carrying winding numbers. Our circuit system provides readily accessible platform to explore non-Hermitian-induced...
With the development of big data, data sharing has become a hot topic. According to previous research on sharing, there is problem with regard how design an effective incentive mechanism make users willing share data. First, we integrate incentives based reputation and payment introduce "credibility coins" as cryptocurrency for data-sharing transactions, encourage participate honestly in process federated learning. Second, propose dynamic model evolutionary game theory analyze stability...
Nowadays, Industrial Internet of Things (IIoT) technology has made a great progress and the industrial control systems (ICSs) have been used extensively, which brought more serious information security threats to ICS at same time. The authenticated key agreement (AKA) protocol is common method ensure communication security. This work proposes lightweight AKA based on elliptic curve cryptography (ECC) algorithm adapt resource-constrained environment. We only employ hash operation, XOR ECC...
With the development of big data and blockchain, an increasing number scholars have begun to study blockchain for sharing. By studying sharing models that are based on we find almost all them following problems: 1) it is difficult protect privacy integrity users' data, along with ownership; 2) storage burden heavy, lacks a mechanism dealing diverse types inconsistent formats; 3) consensus has low fairness or efficiency. Therefore, propose data-sharing protection model (DS2PM) federated...
Quantum key distribution, which ensures information-theoretically secret generation, is currently advancing through photonic integration to achieve high performance, cost reduction, and compact size, thereby facilitating the large-scale deployment. Continuous-variable quantum distribution an attractive approach for integrations due its compatibility with off-the-shelf optical communication devices. However, chip-based systems have encountered significant limitations primarily related...
In practical continuous-variable quantum key distribution system using local oscillator (LLO CV-QKD), the phase noise related to coherent detection and phase-reference pulse intensity can be locally calibrated at receiver side. Therefore, it regarded as trusted in order obtain a higher secret rate transmission distance. However, security loopholes will opened for eavesdropper launch attacks without appropriate countermeasures. To this end, we propose two attack strategies, where Eve reduce...
Recently, the use of wireless channel state information (CSI) to generate encryption keys in physical layer has gained significant attention from researchers. Unlike classical cryptography, this approach relies on variability channel, reciprocity, and spatial decorrelation ensure security, making it more lightweight providing strong randomness. This article proposes a key generation scheme for LAN MIMO systems based feature fusion autoencoder (FFAEncoder) address issue high disagreement rate...
Two-way fiber-optic time transfer (TWFTT) is a promising precise synchronization technique with subnanosecond stability. However, the asymmetric delay attack severe threat, which can deteriorate performance of TWFTT system. In this article, clock model-based scheme used to defend attack. For scheme, security threshold set according two-state model, and estimated frequency difference excluded from measured detect Systematic detection mitigation for developed in article. Theoretical simulation...
Physical-layer secret key generation (PLKG) is a new research area that has emerged in recent years. It aimed at scenarios where legitimate IoT devices communicate directly, interacting with confidential information for lower overhead and higher security by using wireless channel. When applying it to feature extraction, noise removal not taken into account current deep learning networks. To address these problems, the PLKG scheme based on bidirectional convergence convolutional network...
The round-trip fiber time synchronization system is preferred for high-precision due to its easier implementation compared bidirectional systems. However, link-symmetry assumption renders it susceptible asymmetric delay attacks, posing a serious threat the that current encryption methods cannot effectively prevent. This letter proposes controllable channel attack scheme system. objective assess impact of asymmetry on accuracy by measuring difference between local and remote ends Experimental...
With the rapid development of machine learning and a growing concern for data privacy, federated has become focal point attention. However, attacks on model parameters lack incentive mechanisms hinder effectiveness learning. Therefore, we propose A Privacy Protected Blockchain-based Federated Learning Model (PPBFL) to enhance security encourage active participation nodes in training. Blockchain technology ensures integrity stored InterPlanetary File System (IPFS), providing protection...
Quantum key distribution allows secret generation with information theoretical security. It can be realized photonic integrated circuits to benefit the tiny footprints and large-scale manufacturing capacity. Continuous-variable quantum is suitable for chip-based integration due its compatibility mature optical communication devices. However, signal power control compatible process faces difficulties on stability, which limits system performance causes overestimation of a rate that opens...
A quantum random-number generator (QRNG) can theoretically generate unpredictable random numbers with perfect devices and is an ideal secure source of for cryptography. However, the practical implementations always contain imperfections, which will greatly influence randomness final output even open loopholes to eavesdroppers. Recently, Thewes et al. experimentally demonstrated a continuous-variable eavesdropping attack, based on heterodyne detection, trusted QRNG in Phys. Rev. 100, 052318...