-
1
Phase-Matching Quantum Key Distribution with Discrete Phase Randomization
Published 2021-04-01“…However, the discrete phase randomization opens a loophole to threaten the actual security. In this paper, we first introduce the unambiguous state discrimination (USD) measurement and the photon-number-splitting (PNS) attack against PM-QKD with imperfect phase randomization. …”
Get full text
Article -
2
Practical Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Frequency Side Channels
Published 2021-10-01“…Based on this security loophole, we propose a side-channel attack, named the passive frequency-shift attack, on the imperfect implementation of the sending or not-sending (SNS) TF-QKD protocol. …”
Get full text
Article -
3
Security Analysis of Sending or Not-Sending Twin-Field Quantum Key Distribution with Weak Randomness
Published 2022-09-01“…Furthermore, our simulation results also show that SNS TF-QKD is more robust to the weak randomness loopholes than the BB84 protocol and the measurement-device-independent QKD (MDI-QKD). …”
Get full text
Article -
4
Security analysis of measurement-device-independent quantum conference key agreement with weak randomness
Published 2023-02-01“…Measurement-device-independent QCKA (MDI-QCKA) is an effective QCKA scheme, which closes all detection loopholes and greatly enhances QCKA’s security in practical application. …”
Get full text
Article -
5
Threshold Recognition of Water Turbidity for Clogging Prevention during Groundwater Recharge Using Secondary Effluent from Wastewater Treatment Plant
Published 2023-02-01“…The recharge efficiency during artificial groundwater recharge (AGR) is reduced primarily by clogging that is triggered by suspended particles. However, there are loopholes in the current standards of recharge-water quality for clogging control during AGR, and the threshold values of turbidity to prevent clogging have not been reasonably determined. …”
Get full text
Article