删除或更新信息,请邮件至freekaoyan#163.com(#换成@)

Cascading attack on trusted-relay quantum key distribution networks

本站小编 Free考研考试/2022-01-02

闂傚倸鍊搁崐鎼佸磹閹间礁纾归柣鎴eГ閸ゅ嫰鏌涢幘鑼槮闁搞劍绻冮妵鍕冀椤愵澀绮剁紓浣插亾濠㈣泛顑勭换鍡涙煏閸繃鍣洪柛锝呮贡缁辨帡鎮╅棃娑掓瀰闂佸搫鐬奸崰鏍嵁閹达箑绠涢梻鍫熺⊕椤斿嫰姊绘担鍛婂暈濞e洦妞介敐鐐村緞閹邦儵锕傛煕閺囥劌鐏犳俊顐o耿閺屾盯鈥﹂幋婵囩亐闂佸湱枪閸熸潙顫忓ú顏勫窛濠电姴瀛╅悾鐑芥倵閸忓浜鹃梺褰掓?缁€浣虹不閺嶃劋绻嗛柕鍫濇噺閸f椽鏌¢崨顔惧弨妤犵偞鐗滈埀顒佺⊕宀h法绮诲鈧弻锝夊煛娴h宕崇紓浣介哺閹稿骞忛崨顕呮Ч閹兼番鍊楅悰銉╂⒒娓氣偓濞艰崵绱為崶鈺冪濞达絽澹婇崵鏇炩攽閻樺磭顣查柛瀣閺岋綁骞橀搹顐e闯濡炪伅浣告处閳锋垿鏌涜箛姘汗闁靛牊鎸抽弻锟犲川椤斿墽鐤勯梺璇″櫙缁绘繂鐣烽幒妤佸€风紒顔款潐鐎氳偐绱撻崒娆戭槮妞ゆ垵鐗嗛埢鏃堝即閵忊€斥偓鍧楁煕瑜庨〃鍡涙偂濞嗘挻鐓曢柟瀛樼懃閳ь剚鐗滈埀顒佺啲閹凤拷2婵犵數濮烽弫鍛婃叏閻戣棄鏋侀柟闂寸绾惧鏌i幇顒佹儓闁搞劌鍊块弻娑㈩敃閿濆棛顦ョ紓浣哄У婢瑰棛妲愰幒鏂哄亾閿濆骸浜剧紒鎵佹櫆缁绘稑顔忛鑽ょ泿闁诡垳鍠栧娲礃閸欏鍎撳銈嗗灥濞层劎鍒掑▎鎺旂杸婵炴垶鐟㈤幏娲⒑闂堚晛鐦滈柛妯恒偢瀹曟繄鈧綆鍋佹禍婊堟煏婵炲灝鍔滄い銉e灮閳ь剝顫夊ú婊堝极婵犳艾鏄ラ柍褜鍓氶妵鍕箳閹存繍浠鹃梺鎶芥敱閸ㄥ潡寮诲☉妯锋婵鐗嗘导鎰節濞堝灝娅欑紒鐘冲灴濠€浣糕攽閻樿宸ラ柟鍐插缁傛帗娼忛埞鎯т壕閻熸瑥瀚粈鍐╀繆閻愭壆鐭欑€殿噮鍋婇獮妯肩磼濡桨姹楅柣搴ゎ潐濞叉牕煤閵堝宓佹俊銈呮噺閳锋帒銆掑锝呬壕濠电偘鍖犻崨顔煎簥闂佸壊鍋侀崕杈╁瑜版帗鐓涚€规搩鍠掗崑鎾翠繆閹绘帞澧㈤柟鍙夋倐瀵噣宕煎┑濠冩啺闂備焦瀵х换鍌炈囬鐐村€挎繛宸簼閻撴洟鏌熼弶鍨倎缂併劌銈搁弻娑㈡晲閸曨偄绁┑顔硷龚濞咃綁骞忛悩璇茬伋闁惧浚鍋呴鍕⒒娴h鍋犻柛搴㈢矒瀹曟儼顦抽柡鍡╀邯濮婂宕掑▎鎴濆闁诲海鐟抽崨顔煎簥闂佺ǹ鏈銏犆洪鍕垫綂闂侀潧鐗嗛幊鎰版晬濞戙垺鈷戦柛锔诲幖閸斿銇勯妸銉︻棦闁糕晜鐩獮瀣晜閻e苯骞堟繝鐢靛█濞佳兾涘Δ鍜佹晜闁冲搫鎳忛悡鍐喐濠婂牆绀堟繛鍡樺灩缁€濠傗攽閻樺弶鎼愮紒鐘崇墵濮婃椽宕归鍛壉缂傚倸绉村ú顓㈠蓟瀹ュ浼犻柛鏇ㄥ亗缁ㄨ棄鈹戦悙璺轰汗闁哥姵鐗曢~蹇涙惞鐟欏嫬纾梺闈浨归崕鏌ユ偟閵忋倖鈷戦柣鐔告緲濞堚晠鏌熼崙銈嗗
婵犵數濮烽弫鍛婃叏閻戣棄鏋侀柛娑橈攻閸欏繐霉閸忓吋缍戦柛銊ュ€婚幉鎼佹偋閸繄鐟查梺绋款儏椤︾敻寮婚弴锛勭杸閻庯綆浜栭崑鎾诲即閵忊€斥偓宄扳攽閻樻彃顏柛鐘冲姉閳ь剙绠嶉崕鍗炍涘▎鎾崇煑闊洦绋掗悡蹇涙煕椤愶絿绠ユ俊鎻掔秺閺屽秹鏌ㄧ€n亞浼岄梺鍝勬湰缁嬫垿鍩ユ径濠庢建闁割偅绻€缁憋絿绱撻崒娆戝妽妞ゃ劌妫涢弫顔嘉旀担琛℃敵婵犵數濮村ù鍌炲极閸愵喗鐓ユ繝闈涙婢跺嫰鏌涢幒鎾垛槈妞ゎ亜鍟存俊鍫曞礃閵娧傜棯婵犵妲呴崑鍕疮椤栫偛绠為柕濞炬櫅閻掑灚銇勯幒鎴濐仾闁绘挸绻橀弻娑㈩敃閿濆洨鐣洪梺鎸庣☉缁夊灚绌辨繝鍥舵晝闁靛繒濯导鍐⒑閸濆嫮鐒跨紒鏌ョ畺楠炲棝寮崼顐f櫖濠电姴锕ら幉娑㈡晲婢跺鎷洪梺鍛婄缚閸庤鲸鐗庨梻浣虹帛椤ㄥ牊鎱ㄩ幘顔藉仼闁绘垼妫勯~鍛存煏閸繃鍣芥い鏃€甯掗—鍐Χ閸℃ǚ鎷婚梺鍝勬媼閸嬪﹤鐣烽姀銈呯濞达絽鍘滈幏娲⒑閸涘﹦鈽夐柨鏇樺劤缁牏鈧綆鍋嗙粻鎯归敐鍛毐婵炶绠撳畷鎰板醇閺囩喓鍙嗗┑鐘绘涧濡瑩藟閹捐秮鐟扳堪閸曨厾鐓夐梺鍝勭灱閸犳捇鍩€椤掍胶鈯曞畝锝堟硶缁寮借閻斿棝鎮归崫鍕儓妞ゅ浚鍋嗙槐鎺撴綇閵娿儳顑傞梺閫炲苯澧剧紓宥呮缁傚秶鎹勬担鏇犲枛閸┾偓妞ゆ帒瀚埛鎴犵磼椤栨稒绀冮柡澶婄秺閺屾稓鈧綆鍋呯亸顓熴亜椤忓嫬鏆e┑鈥崇埣瀹曞崬螖閳ь剙岣块幋锔解拺缂佸顑欓崕鎰版煙閻熺増鍠樼€殿喛顕ч濂稿炊閵娿儳褰撮梻浣告惈鐞氼偊宕曢崡鐑嗗殨闁哄绨遍弨浠嬫煥閻斿搫啸闁伙絽鎼湁婵犲﹤鍟伴崺锝団偓娈垮枦椤曆囶敇婵傜ǹ閱囨い鎰剁秵閳ь剙娲缁樻媴閸涘﹤鏆堥梺鍦归…鐑藉箖閻戣棄鐓涘ù锝囧劋濞堟儳顪冮妶鍡欏缂佸鍨块、姘舵焼瀹ュ棗鈧灚绻涢幋鐑嗕痪妞ゅ繐鎳愰々鍙夈亜閺嶃劌鐒归柡鈧禒瀣厽闁归偊鍓欑痪褔鏌嶇紒妯荤闂囧绻濇繝鍌氼伀缂佺姷鍋熼埀顒侇問閸犳鎮¢敓鐘偓浣肝旈崨顓狀槹濡炪倖宸婚崑鎾绘煃瑜滈崜娆撴偉婵傜ǹ钃熼柨婵嗩槸缁犳稒銇勯弮鍥撴慨锝呭濮婅櫣娑甸崨顕呮闂佺ǹ锕ゅḿ鈥愁嚕鐠囨祴妲堥柕蹇曞瑜旈弻娑㈠Ψ椤斿彞铏庨梺闈涚箞閸婃牠藟閸℃鐔嗛悹杞拌閸庢垹绱掗埦鈧崑鎾斥攽閻樺灚鏆╁┑顔芥尦瀹曟劙骞栨担鍛婅緢闂佹寧绻傚Λ搴㈢濠婂牆绠规繛锝庡墮閻掔儤绻涢崼鐔哥闁哄本娲熷畷鎯邦槻妞ゅ浚鍙冮弻娑㈠煛閸愩劋妲愬銈冨灪閿曘垽骞冨▎蹇e晠妞ゆ棁宕靛Λ顖涚節閻㈤潧校妞ゆ梹鐗犲畷褰掓焼瀹ュ懐顔囬梺瑙勫劶濡嫰鎷戦悢鍏肩叆闁绘柨鎼瓭闂佺粯鍔曢敃顏堝蓟瀹ュ棙濮滈柟娈垮枛婵′粙姊虹拠鑼缂佽埖鑹鹃~蹇撁洪鍕獩婵犵數濮寸€氼參宕板☉銏♀拺缂佸顑欓崕鎰版煙閻熺増鎼愭い顐㈢箳缁辨帒螣鐠囧樊鈧捇姊洪崨濠勭細闁稿氦娅曢〃娆忊攽閻樺灚鏆╅柛瀣耿瀹曠娀鎮╃拠鎻掕€块梺褰掑亰娴滄繈鎯堣箛娑欌拻濞达綀娅g敮娑㈡煕閺冣偓椤ㄥ﹤顕i锕€浼犻柕澹倻鐟濋梻浣告惈閸燁偊鎮ф繝鍥ㄥ亗婵炲棙鎸婚悡娆愩亜閺嵮勵棞闁兼椿鍨伴埢鎾诲醇閺囩啿鎷洪悗瑙勬礀濞层劎鏁☉娆愬弿濠电姴鍊荤粔鐑橆殽閻愯尙澧﹀┑鈩冩倐婵¢攱鎯旈敐鍛亖闂佸綊顥撴繛鈧鐐存崌楠炴帒鈹戦崶銊с偘闂傚倸鍊搁崐鐑芥倿閿曞倸绠栭柛顐f礀绾惧湱鎲歌箛鏇炲灊濠电姵鑹剧粻濠氭偣閸ヮ亜钄奸柟鑺ユ礋濮婅櫣绱掑Ο娲绘⒖濠电偛鎷戠紞渚€骞嗙仦瑙f瀻闁规儳顕崢鐢电磽娴e壊鍎忛柣蹇旂箞椤㈡濮€閵堝棛鍘靛銈嗘⒒閺咁偊骞婇崶銊﹀弿濠电姴瀚崝瀣倵閻㈤潧甯堕柍璇查叄楠炲鎮╁Ο鑽ょ煂缂佽鲸鎸婚幏鍛村传閸曟埊缍侀弻锝呂旀担鍦槹濡炪們鍨哄畝鎼佸极閹邦厼绶炴俊顖滅帛濞呭洭姊绘担绋挎毐闁诲繐鐗撳鎻掆堪閸喎鈧潧鈹戦悩宕囶暡闁抽攱鍨归幉鎼佹偋閸繄鐟ㄦ繛瀛樼矆閸楁娊寮诲☉妯滅喖宕崟銊﹀瘱缂傚倷绶¢崰妤呮偡閳轰胶鏆﹂柣鏃傗拡閺佸秵绻涢幋鐐茬瑲閻庢艾銈稿缁樻媴閸涘﹨纭€闁哄浜濈换娑氣偓鐢登归崢鎾煕閳瑰灝鍔滅€垫澘瀚伴獮鍥敇閻樻彃绠伴梻鍌欑婢瑰﹪宕戦幒妤€纾婚柛鏇ㄥ墯濞呯娀鎮楅悽鐢点€婇柛瀣尵閹叉挳宕熼鍌ゆК缂傚倸鍊哥粔鎾晝閵夛妇鈹嶅┑鐘插亞濞兼壆鈧厜鍋撳┑鐘插敪椤忓嫧鏀介柣妯诲墯閸熷繘鏌涢妸銈呭祮濠碘€崇埣楠炴牗鎷呭灞炬啺婵犵數鍋為崹鎯板綔濠碘剝褰冮悧濠囧箞閵娿儙鏃堝焵椤掑嫭鍋嬪┑鐘叉搐閺嬩線鏌涢幘妤€鎳愰敍婵囩箾鏉堝墽鍒伴柟纰卞亝閻楀酣姊哄Ч鍥х労闁搞劍濞婂畷鎴﹀Χ婢跺﹥妲梺閫炲苯澧柕鍥у楠炴帡宕卞鎯ь棜闂傚倷娴囬褏鎹㈤幋锔藉殞濡わ絽鍟犻埀顒婄畵瀹曞綊顢氶崨顔肩紦闂備線鈧偛鑻晶瀛橆殽閻愭彃鏆㈡い锕€婀遍埀顒冾潐濞叉牕鐣烽鍕畳闂備礁鎼ˇ鎵偓绗涘洤绐楁俊顖氱毞閸嬫挾鎲撮崟顒傤槶闁哄浜幗鍫曞冀椤€崇秺閺佹劖寰勭€n偆褰搁梻浣圭湽閸庣儤绂嶉鍕垫綎缂備焦蓱婵潙銆掑鐓庣仭闁轰緡鍨跺铏规喆閸曨兙浠ф繛瀛樼矤娴滄粓锝炶箛鏃傤浄閻庯綆浜為ˇ鏉款渻閵堝棛澧紒瀣笒閳诲秹寮介鐔叉嫼闂佸憡绻傜€氼噣鍩㈡径鎰厱婵☆垰婀遍惌娆撴煙椤旀瑣鍊楅悿鈧┑鐐村灦閻熝囧储闁秵鈷戦柡鍌樺劜濞呭懘鏌涢悤浣哥仯缂侇喖鐗撻崺鈧い鎺嗗亾妞ゎ亜鍟存俊鎯扮疀閺囩偟鐓楅梻浣告惈濡瑧绮╃化鏉戔攽閻樺灚鏆╁┑顔惧厴瀵偊宕ㄦ繝鍐ㄥ伎婵炴潙鍚嬪ḿ娆撳垂閸岀偞鐓曢柨鏃囶嚙楠炴ḿ绱掗埀顒佺節閸屾鏂€闂佺粯锚瀵爼骞栭幇鐗堢厽闁圭儤鍨规禒娑㈡煏閸パ冾伃妤犵偞甯掗濂稿醇濠靛棗鑵愰梻鍌欑劍閸撴岸宕归崡鐏绘椽鎮㈤悡搴ゆ憰闂佸搫娲㈤崹褰掔嵁閵忊€茬箚闁靛牆鍊告禍楣冩⒑閸濆嫭锛旂紓宥勭窔瀵鏁嶉崟顏呭媰闂佸憡鎸嗛崟顐㈢仭濠德板€楁慨鐑藉磻閻愬灚鏆滈柨鐔哄Х瀹撲線鎮楅敐搴℃灍闁稿﹤顭烽弻娑㈠焺閸愬じ绶靛┑鈽嗗€ら崘锝嗘杸闂佹寧绋戠€氼剚绂嶆總鍛婄厱濠电姴鍟版晶閬嶆煛娓氬洤娅嶉柟顔界懇瀹曨偊宕熼鐘茬倞闂傚倷绀佺紞濠囧磻婵犲洤绐楁慨妯垮煐閸庢绻涢崱妤冪畾闁衡偓娴犲鐓熸俊顖氭惈缁狙冾熆鐠哄搫顏柡灞剧〒閳ь剨缍嗛崑鍕叏瀹ュ鐓涚€光偓鐎n剛袦婵犳鍠掗崑鎾绘⒑闂堟稓绠氶柛鎾寸箓琚欓柛鏇ㄥ灡閻撴稑霉閿濆懏鎲稿褝闄勯幈銊︾節閸曨厼绗¢梺鐟板槻閹虫劗鍒掑▎鎾崇閹肩补妾ч崑鎾活敍濮橈絾鏂€闂佺粯锕╅崰鏍倶椤忓牊鐓ラ柡鍥悘鈺呮煟閿濆洤鍘存い銏$☉閳藉顫滈崱妤侇啌闂備浇顕х€涒晝绮欓幒妤佹櫔濠电偛鐡ㄧ划鐘诲垂鐠轰警娼栨繛宸簻瀹告繂鈹戦悩鎻掝伀闁伙絽鐏氱换婵嗏枔閸喚浠存俊鐐茬摠閹倿鐛崱娑樼睄闁割偅绻嶅ḿ濠囨⒑閹稿海鈽夐悗姘煎枦閸婂瓨绻濈喊澶岀?闁稿鍨垮畷鎰板冀椤撶偟顦┑掳鍊曢幊搴g玻濡ゅ懎绠规繛锝庡墮閻忣喗銇勯埡鍌氱祷閾绘牠鏌ㄥ┑鍡樺櫣闁哄棛鍋ら弻锝夊箻鐎靛憡鍒涢梺鍝勬湰閻╊垱淇婇悜鑺ユ櫜闁告侗鍙庨悗鎾⒒娴e湱婀介柛鏂跨Ч瀹曞綊宕稿Δ鈧拑鐔兼煥濠靛棭妲归柛瀣閺屾稑鈻庤箛锝喰ч梺缁樼箖濡啫顫忛搹鍏夊亾閸︻厼校妞ゃ儱顦伴妵鍕晜閻愵剚姣堥梺缁樹緱閸犳牞鐏掗梺鍏肩ゴ閺呮繈藝閳哄懏鈷戠紓浣光棨椤忓嫮鏆︽い鎺戝閺佸棝鏌曡箛濞惧亾閼碱剛鐣鹃梻浣虹帛閸旓附绂嶅⿰鍫濈劦妞ゆ帊鑳舵晶顏堟偂閵堝棛绡€闂傚牊绋掗ˉ鎴︽煛鐎n亞效闁哄矉绻濆畷鍫曞煛娴i攱鍠氱紓鍌氬€搁崐鐟扮暆閹间焦鍋傛い鎰剁畱閻愬﹪鏌曟繛褉鍋撴俊鎻掔墦閹鎮烽悧鍫濇殘缂備浇顕ч崯瀛樹繆閻㈢ǹ绀嬫い鏍ㄦ皑椤旀帒鈹戞幊閸婃劙宕戦幘缁樼厱闁绘洑绀侀悘锔姐亜閵忥紕鎳囬柡浣规崌閺佹捇鏁撻敓锟�20濠电姷鏁告慨鎾儉婢舵劕绾ч幖瀛樻尭娴滅偓淇婇妶鍕妽闁告瑥绻橀弻锝夊箣閿濆棭妫勭紒鐐劤椤兘寮婚敐鍛傜喎鈻庨幆褎顔勭紓鍌欒兌婵挳鎮樺璺何﹂柛鏇ㄥ枤閻も偓闂佸湱鍋撻幆灞轿涢垾鎰佹富闁靛牆楠告禍婵囩箾閸欏缂氶柟骞垮灩閳规垹鈧綆鍋掑Λ鍐ㄢ攽閻愭潙鐏ョ€规洦鍓熷畷婊堝箥椤斿墽锛濇繛杈剧到閹碱偅鐗庨梻浣规偠閸斿苯岣块垾鎰佸殨濠电姵鑹惧洿闂佺硶鍓濋敋鐎殿喖娼″楦裤亹閹烘垳鍠婇梺绋跨箲閿曘垹鐣烽幋锕€绠绘繝銏犲濡啴宕洪埀顒併亜閹烘垵顏╅柣鎾寸箞閺岋繝宕橀妸褍顣哄銈庡亜閹虫﹢寮婚敐鍛傜喖鎮滃鍡橈骏闂備胶顢婂▍鏇㈠箲閸ヮ剙围妞ゅ繐鎳庨閬嶆煛婢跺鐏╂い锔哄姂濮婃椽宕橀崣澶嬪創闂佹寧娲忛崕鐢稿极瀹ュ宸濇い鏍ㄧ矌閿涙繈姊虹粙鎸庢拱闁荤啙鍥佸洭鏁傛慨鎰盎闂佹寧妫侀褔鎮橀敂濮愪簻闁靛繆鈧啿鎽靛銈冨灪閿曘垺鎱ㄩ埀顒勬煟濮椻偓濞佳勬叏閿旀垝绻嗛柣鎰典簻閳ь剚鐗曢蹇旂節濮橆剛锛涢梺瑙勫劤椤曨厾寮ч埀顒勬⒑闁偛鑻晶鎾煛鐏炶姤顥滄い鎾炽偢瀹曘劑顢涢妶鍥ц€块梻鍌氬€烽懗鍓佸垝椤栨凹娼栧┑鐘宠壘閸屻劎鎲搁弬娆惧殨闁告稑锕﹂悷褰掓煃瑜滈崜鐔奉嚕婵犳艾鍗抽柕蹇曞█閸炶泛鈹戦悩鑼粵闁告梹鐗楅弲銉╂⒒閸屾瑨鍏岄弸顏勎旈悩鍙夋喐缂侇喗妫侀妵鎰板箳閹达絾鎲版繝鐢靛仦閸垶宕硅ぐ鎺戠闁规儼濮ら悡蹇撯攽閻愯尙浠㈤柛鏃€纰嶉妵鍕敃閻斿憡鐝氬┑顔硷功閸庛倗鈧數鍘ч埢搴ㄥ箣閻樿櫕顔忕紓鍌氬€搁崐鍝ョ矓閹绢喗鏅濇い蹇撶墢瀹撲線鏌涢幇鈺佸闁哄啫鐗嗙粈鍐煃鏉炴壆鍔嶉柣搴弮濮婄粯鎷呴崨濠傛殘濠电偠顕滅粻鎾崇暦閿濆棙鍎熼柕濞垮劜鏉堝牓姊虹捄銊ユ灁濠殿喚鏁婚崺娑㈠箣閿旂晫鍘卞┑鐘绘涧濡顢旈鍛簻闁靛绠戦悘鎾煛鐏炲墽銆掗柍褜鍓ㄧ紞鍡涘磻閸涱厾鏆﹂悘鐐靛亾閸欏繐鈹戦悩鎻掓殲闁靛洦绻勯埀顒冾潐濞诧箓宕戞繝鍌滄殾闁绘梻鍘ч崹鍌涖亜閹邦剝鐧侀柛銉e妷閹锋椽姊洪崨濠勨槈闁挎洏鍎甸崺娑㈠箛閻楀牏鍘藉┑掳鍊曢崯顐﹀煝閸噥娈介柣鎰絻閺嗭綁鏌℃担瑙勫磳闁诡喒鏅犻幖褰掝敃閿濆洤寤洪梻鍌氬€风粈渚€骞夐垾瓒佹椽鏁冮崒姘鳖槶濠电偛妫欓幐濠氬磻閻旇褰掓偂鎼达絾鎲奸梺鎶芥敱閸ㄥ灝顫忔繝姘唶闁绘梹浜介埀顒佸笧缁辨帡鎮╅崘鎻掓懙闂佸搫鏈惄顖炵嵁濡皷鍋撻棃娑欐喐闁汇倕瀚板铏规嫚閳ヨ櫕鐏€闂侀€炲苯澧柡瀣偢瀵憡鎯旈妸锔惧幍闂備緡鍙忕粻鎴﹀几閵堝棎浜滈柡鍐e亾婵炲弶岣块幑銏犫攽鐎n亶娼婇梺鎸庣箓濡盯濡撮幇顒夋富闁靛牆妫楅悘銉︿繆椤愶絿銆掗柛鎺撳浮瀹曞ジ濡烽妷褍濮︽俊鐐€栫敮鎺斺偓姘煎弮瀹曟劙宕归銈囶啎闂佸壊鍋呯换鍕閵忥紕绠鹃柛娑卞幘鏁堥梺鍝勭焿缁绘繈宕洪埀顒併亜閹烘垵顏╃痪顓涘亾闂備胶绮崹闈浳涘Δ鈧埢鎾活敃閿旇В鎷洪梺鍛婄☉閿曘儲寰勯崟顖涚厱閻庯綆鍋勫ù顔锯偓瑙勬磸閸庢娊鍩€椤掑﹦绉甸柛鐘愁殜閹繝寮撮姀锛勫幐闂佹悶鍎崕杈ㄤ繆閸忕⒈娈介柣鎰懖閹寸偟鈹嶅┑鐘叉搐閻顭跨捄鐚村姛濞寸厧鑻埞鎴︻敊绾攱鏁惧┑锛勫仩濡嫰鎮鹃悜绛嬫晝闁挎洍鍋撶紒鈧€n偁浜滈柟閭﹀枛閺嬪骸霉濠婂嫬鍔ら棁澶愭煟濡儤鈻曢柛搴㈢矌缁辨挸顓奸崱娆忊吂濡炪値鍙€濞夋洟骞戦崟顖涘€绘俊顖滅帛鐎氭娊姊绘担鍛靛湱鎹㈤幋鐘插灊闁规崘顕ч拑鐔哥箾閹存瑥鐒洪柡浣稿暣閺屻劌鈹戦崱姗嗘¥濡炪倧璐熼崝鎴濐潖濞差亜浼犻柛鏇ㄥ墮椤庢盯姊洪崨濠冨暗闁哥姵鐗犻悰顕€宕橀…鎴炲缓闂侀€炲苯澧存鐐插暙閳诲酣骞橀幖顓燁棃婵犵數鍋為崹鍫曘€冮崨姝ゅ顫濇潏鈺冿紳闂佺ǹ鏈悷銊╁礂鐏炶В鏀芥い鏃傚亾閺嗏晠鏌℃笟鍥ф珝闁搞劑绠栭獮鍥ㄦ媴閸︻厾鈻夋繝鐢靛Х閺佸憡鎱ㄩ悽鍛婂殞濡わ絽鍟崐宄扳攽閻樺弶澶勯柣鎾卞劜缁绘繈妫冨☉娆樻!闂侀潻绲挎灙妞ゎ叀娉曢幉鎾礋椤掑偆妲规繝娈垮枛閿曘儱顪冩禒瀣疇闁跨喓濮村洿闂佸憡渚楅崰姘跺焵椤掍礁鍔ら柍瑙勫灴閹瑩骞撻幒鏃堢崜闂備焦鎮堕崝灞结缚閿熺姷宓佸┑鐘蹭迹閺冨牆绀冮柍杞拌兌閿涘繘姊洪懡銈呬沪缂佸鐗撳畷婊冣攽鐎n偄鈧泛銆掑锝呬壕濠殿喖锕ㄥ▍锝呪槈閻㈢ǹ宸濇い鏂垮悑闁款參姊婚崒姘偓鍝モ偓姘煎墰閳ь剚纰嶅姗€鎮鹃悜钘夊嵆闁靛繒濮烽娲⒑閹稿孩顥嗘俊顐㈠閸┾偓妞ゆ帒鍊归弳顒勬煛鐏炶濡奸柍瑙勫灴瀹曞崬鈽夐幍浣镐壕婵°倓绶″▓浠嬫煟閹邦喗顬嬬紓鍌涙皑缁辨帗娼忛妸銉﹁癁闂佽鍠掗弲娑㈡偩閻戣棄鐐婄憸澶愬箯娴煎瓨鈷掑ù锝呮啞閹牆顭跨捄鐑樺枠鐎规洘绮岄埞鎴﹀幢閳轰焦顔傞梻浣告啞濞诧箓宕戦埀顒佷繆閹绘帞澧涚紒缁樼洴瀹曞崬螖娴d警娲跺┑鐐差嚟閵嗗骞忛敓锟�
Jian Wang,, Xing-tong LiuCollege of Electronic Science and Technology, National University of Defense Technology, Changsha, 410073, China

Received:2021-01-12Revised:2021-03-14Accepted:2021-03-16Online:2021-04-29


Abstract
Trusted relays are the main state-of-the-art way to realize quantum key distribution networks. However, it is hard to require that all nodes in the network are fully trusted. In a multipath key-transmission mechanism, the nodes can be weakly trusted because the secret key can be split into many parts and each part is transmitted to the receiver through a different path. However, if the capacity of a node’s quantum key pool is poorly designed, an attacker, Eve may eavesdrop on the communicating parties'secret message by initiating a redirection attack. In this paper, we show that Eve can trigger a cascading collapse effect by collapsing one of the edges in the network and forcing the communication parties to transmit the message through the nodes controlled by Eve. The influence of the traffic transfer ratio and the control parameters of the edge load on the breakdown probability of the edge are analyzed using a simulation. In order to effectively defend against the cascading attack, it is important for the designer to handle the relationship between the traffic and the capacity of the quantum key pool of each node in the network.
Keywords: Quantum key distribution;Quantum key distribution networks;Quantum communications


PDF (0KB)MetadataMetricsRelated articlesExportEndNote|Ris|BibtexFavorite
Cite this article
Jian Wang, Xing-tong Liu. Cascading attack on trusted-relay quantum key distribution networks. Communications in Theoretical Physics, 2021, 73(6): 065105- doi:10.1088/1572-9494/abeedc

1. Introduction

Quantum key distribution (QKD), which provides a way for two legitimate parties to share a secret key [1], has been one of the most remarkable applications of quantum mechanics in quantum information science. Following key distribution, the parties can use a one-time pad to protect the secrecy of their transmitted messages. Point-to-point QKD systems focus on the communication between two endpoints, which is limited by the transmission distance. In order to provide an end-to-end service for QKD users, QKD networks have been developed by many countries and regions. Typical QKD networks include optical switching QKD networks [2-5], entanglement swapping QKD networks [6], measurement-device-independent (MDI) QKD networks [7, 8] and trusted-relay QKD networks [9-11]. QKD networks based on optical switching are easy to realize, but their transmission distance is limited by the losses caused by the optical nodes. QKD networks based on entanglement swapping cannot be practically used so far, because some significant technologies such as quantum memory and non-destructive measurement still need further breakthroughs. MDI-QKD networks are powerful candidates for future QKD networks, because they allow an untrusted third party to make measurements and the relay nodes in the network do not have to be trusted. However, there are currently some limitations in MDI-QKD networks, for example, all users are required to have near-identical distances to the untrusted relay, and the key rate degrades very quickly with an increased level of asymmetry between channels [8]. Compared with entanglement swapping QKD networks and MDI-QKD networks, trusted-relay QKD networks are more practical and natural, given the current state of the art, and have been used as a standard for existing QKD networks.

In 2002, Elliott proposed the idea of using trusted nodes for QKD networks based on the point-to-point QKD system and the hop-by-hop encryption method [9]. In 2008, by unifying the efforts of 41 research and industrial organizations, the Secure Communication based on Quantum Cryptography (SECOQC) network was established in Vienna with a focus on the trusted repeater paradigm [10]. In 2010, Japan built a QKD network in Tokyo by integrating six different QKD systems into a mesh-type network [11]. In 2017, the world’s first wide-area QKD network — the 'Beijing-Shanghai trunk line'opened, which also uses key-trusted repeaters to generate end-to-end keys. In the same year, China launched a low-Earth-orbit quantum satellite in order to establish a global-scale quantum network [12]. In 2021, Chen et al demonstrated an integrated space-to-ground quantum communication network; the large-scale fiber network covers more than 2000 kilometres on the ground using a trusted-relay structure [13]. Because software-defined networking (SDN) decouples the control plane from the data plane and then provides flexibility and programmability together with the centralized management of optical resources, QKD networks enabled by SDN have attracted more and more research attention. A QKD-enabled optical network architecture and some software-defined optical network key-assignment schemes have been proposed in recent years [14-16].

Trusted relays are a feasible method for building large-scale QKD networks. However, trusted-relay QKD networks require each node to be fully trusted. If one of the relay nodes is compromised, the whole network is insecure. In trusted-relay QKD networks, each node constructs a quantum key pool (QKP) to allocate and manage its quantum keys. If the number of nodes in the network is relatively small, the nodes can be well protected and the security of the trusted-relay QKD network can be guaranteed. However, in the case of large-scale networks, it is difficult to ensure that every node is trusted. It is generally agreed that for large-scale QKD networks, each node can only be regarded as weakly trusted, and that a multipath key-transmission mechanism should be used to ensure the security of the network [17-21]. Wen et al proposed a multiple stochastic path scheme to improve the security of partially-trusted relay QKD networks [17]. Yang et al presented a dynamic routing scheme for trusted-relay QKD networks which can dynamically select a set of suitable paths to establish the routing table for key exchange [18]. Ma et al proposed a multiple-path key distribution scheme with labels for QKD networks to avoid loops and public nodes in the routing [19]. Xu et al designed a multipath key-transmission scheme based on link cost and a multipath selection algorithm to improve the security and efficiency of key transmission [21].

In this paper, we show that although the QKD network model can be changed from the trusted-relay model to the weakly trusted-relay model by using the multipath key-transmission mechanism, Eve’s attack may cause a cascading effect if the QKP size of each node in the network is not well designed, which makes many links in the local area of the network unusable. The communication parties may choose another link to transmit their secret message and a node in this link may be controlled by Eve. Eve may access the secret message of the communication parties. In this paper, we use classical complex network theory to describe the construction of a cascading attack model that can be employed against a QKD network. The relationships between the parameters such as the breakdown probability, the traffic transfer ratio and the load limitation are analyzed and a strategy for defending against the cascading attack is proposed.

2. Vulnerability of trusted-relay QKD networks

The basic idea of trusted-relay QKD networks is to divide the whole long-distance quantum communication link into several segments. Each segment is connected by trusted-relay nodes, and each node shares a secret key with its neighboring node; the communication parties, Alice and Bob, can share a common key through the trusted-relay nodes. As illustrated in figure 1, Alice shares k1 with a trusted-relay node R1. R1 shares k2 with R2 and sends $k1\,\bigoplus \,k2$ to R2. R2 obtains k1 by calculating $k2\,\bigoplus \,k1\,\bigoplus \,k2$ and sends $k1\,\bigoplus \,k3$ to Bob. Bob shares k3 with R2 and obtains k1 using $k3\,\bigoplus \,k1\,\bigoplus \,k3$. Thus, Alice shares k1 with Bob through the trusted-relay nodes R1 and R2. It is obvious that R1 and R2 should be fully trusted. If any relay node is captured by Eve, the shared key is not secure.

Figure 1.

New window|Download| PPT slide
Figure 1.The structure of a trusted-relay QKD network.


In the weakly trusted multipath key-transmission scheme, we suppose that a node is not fully trusted and can only be trusted by Alice and Bob with a probability of $1-t$. Thus, Eve can control $\lfloor {Nt}\rfloor $ nodes if there are N nodes in the network. We now suppose that there are l paths between Alice and Bob and that each pair of paths has no intersection. The sender, Alice splits the secret message m into l shares, and sends them to Bob through l paths, respectively. After Bob receives all l parts, he can recover the secret message m. As long as $l\gt \lfloor {Nt}\rfloor $, Eve cannot obtain the secret message shared by Alice and Bob. It can be seen that as the number of available paths increases, the probability of Alice and Bob exchanging a security key also increases. Rass et al showed that Eve may indirectly eavesdrop on the key by initiating a redirection attack [22]. In the redirection attack, Eve continues to consume Alice’s key by pretending to be a legitimate node and continuing to communicate with Alice. When there is no key available in Alice’s QKP, her packets are forwarded through other nodes, and if the node is controlled by Eve, Eve can acquire Alice’s packets through a redirection attack, even though she cannot get Alice’s key directly.

We further show that Eve’s attack may cause a cascading effect if the size of the QKP is not well designed. As illustrated in figure 2, suppose that node 4 is controlled by Eve, and Alice is most likely to communicate with Bob through nodes 1 or 2, according to the principle of shortest path priority. In order to eavesdrop on Alice’s secret message, Eve pretends to communicate with Alice through node 1 and consumes the key pair of Alice and node 1. In this way, if Alice wants to communicate with Bob and there are no key pairs belonging to Alice and node 1 left in her QKP, Alice may send her message through node 4 and Eve has the opportunity to acquire Alice’s secret because node 4 has been captured by Eve. This is an intuitive example of a redirection attack. In the cascading attack, Eve communicates with Alice through node 1 and consumes Alice and node 1's key pairs. If there are no key pairs belonging to Alice and node 1 left, node 1 will contact Alice through node 2 and the key pairs of Alice and node 2 are also consumed. Finally, if there are not enough key pairs belonging to Alice and node 2, Alice can only communicate with Bob through node 4, and Eve then obtains the shared key of Alice and Bob.

Figure 2.

New window|Download| PPT slide
Figure 2.Attack on a trusted-relay QKD network.


In classical networks, cascading collapse often occurs, especially for complex networks, which may cause paralysis of the local network, greatly affecting the efficiency of the network. For QKD networks, the greatest damage caused by a cascading attack is a decrease in network security, because it directly reduces the available paths in the network and the security of the multipath key-transmission mechanism is closely related to the number of paths.

3. A model for a cascading attack on a trusted-relay QKD network

A QKD network is a combination of a quantum network and a classical network. It uses a one-time pad to encrypt data and the length of the ciphertext is the same as that of the plaintext, so the data traffic characteristics of a QKD network are similar to those of classical networks. The theory of classical complex networks can be used to analyze cascading collapse in a QKD network. The Barabái-Albert (BA) model is an algorithm which generates a scale-free network by incorporating growth and preferential attachment. We use the BA model to describe the topology of the QKD network [23].

For any two adjacent nodes, i and j, in the network, ki and kj represent the degrees of nodes i and j, respectively, where degree means the number of connections a node has. Let eij denote the edge of nodes i and j. According to the BA model, the greater the degree of a node, the more nodes are connected to it, and the more important it is to the whole network. It is assumed that the initial load of eij is ${L}_{{ij}}={({k}_{i}{k}_{j})}^{\alpha }$, where $\alpha \gt 0$ is a tunable parameter that controls the size of the edge load [24]. The edge load is related to the degrees of the two nodes connected to it. The greater the degrees of the nodes, the greater the load at the edge, indicating that the flow through the edge is larger. If the edge eij collapses, its initial load is transferred to the adjacent edges and the additional load received by an adjacent edge is proportional to its initial load. We use ${\rm{\Delta }}{L}_{{im}}$ to denote the increased load of edge eim after edge eij crashes,
$\begin{eqnarray}{\rm{\Delta }}{L}_{{im}}=\rho \cdot {L}_{{ij}}\cdot \displaystyle \frac{{L}_{{im}}}{\displaystyle \sum _{a\in {{\rm{\Gamma }}}_{i}}{L}_{{ia}}+\displaystyle \sum _{b\in {{\rm{\Gamma }}}_{j}}{L}_{{jb}}},\end{eqnarray}$
where ${{\rm{\Gamma }}}_{i}$ and ${{\rm{\Gamma }}}_{j}$ represent the sets of neighboring nodes of node i and node j, respectively, and ρ denotes the proportion of traffic transferred. We assume that the capacity Cij of edge eij is proportional to its initial load for ${C}_{{ij}}=\beta {L}_{{ij}}$, where $\beta$ is a tolerance parameter, $\beta \geqslant 1$.

According to the protection mechanism of the SECOQC network against a denial-of-service attack, when the remaining key of the shared QKP is lower than a certain threshold C, the two sides no longer adopt the one-time pad encryption method, but use a hybrid encryption method to slow down the rate of consumption of QKP keys. Finally, when all the keys in the QKP are consumed, the communication between the two parties stops. Based on this mechanism, we set a control parameter $\gamma \leqslant 1$ and let $C=\gamma {C}_{{ij}}$. When the actual load of edge eij is lower than the threshold C, the edge can communicate normally and does not crash. When the actual load of edge eij is higher than the threshold C, the QKD network adopts the hybrid encryption method and the key consumption rate decelerates, but the key may be exhausted at any time. In this case, in order to ensure that more traffic can be encrypted using the one-time pad encryption method, part of the load of edge eij is transferred to other adjacent edges. The breakdown probability $P({e}_{{ij}})$ of edge eij can be written as
$\begin{eqnarray}P({e}_{{ij}})=\left\{\begin{array}{cc}0 & {L}_{{ij}}\lt \gamma {C}_{{ij}}\\ \tfrac{(1-\rho ){L}_{{ij}}-\gamma {C}_{{ij}}}{{C}_{{ij}}-\gamma {C}_{{ij}}} & \gamma {C}_{{ij}}\lt (1-\rho ){L}_{{ij}}\lt {C}_{{ij}}.\\ 1 & (1-\rho ){L}_{{ij}}\gt {C}_{{ij}}\end{array}\right.\end{eqnarray}$
This means that if the load of edge eij, Lij is lower than $\gamma {C}_{{ij}}$, eij does not crash. If Lij is greater than C, eij transfers traffic $\rho * {L}_{{ij}}$ to its adjacent edges. If the remaining traffic passing through eij is greater than Cij, eij crashes with a probability of 1.

In order to observe the effects of the cascading attack, we built a simulation of a BA network where the number of nodes n=3000 and the initial number of edges M0=2. In the simulation, we set $\alpha =1.1$, and chose 50 random nodes to attack each time. We calculated the average breakdown probability, $E(P({e}_{{ij}}))$ of triggering a cascading effect after the attack by setting different values of γ, ρ and $\beta$. Figures 3 and 4 show the relationship between $E(P({e}_{{ij}}))$ and $\beta$ for different values of γ and ρ, respectively. According to the simulation results, it is obvious that the smaller the value of $\beta$, the easier Eve can trigger the cascading collapse effect. Otherwise, the higher the value of $\beta$, the more difficult it is to trigger the cascading collapse effect. In particular, when $\beta$ reaches a certain level, Eve can hardly trigger the cascading collapse effect. It can be seen that the greater the value of γ, the bigger the probability of breakdown of the edge. The simulation results are consistent with the actual situation. If the value of γ is relatively small, the threshold C is small and once the load exceeds the threshold, the traffic is transferred to other edges, meaning that the value of $E(P({e}_{{ij}}))$ is large. As shown in figure 4, the greater the value of ρ, the smaller the value of $E(P({e}_{{ij}}))$. It is obvious that if the traffic transfer ratio is relatively large, the remaining load on eij is small and the breakdown probability of eij is also small.

Figure 3.

New window|Download| PPT slide
Figure 3.Influence of γ on $E(P({e}_{{ij}}))$ in the simulation of a cascading attack on a QKD network.


Figure 4.

New window|Download| PPT slide
Figure 4.Influence of ρ on $E(P({e}_{{ij}}))$ in the simulation of a cascading attack on a QKD network.


4. Defense strategy against cascading attacks on trusted-relay QKD networks

In a cascading attack, Eve aims to trigger the successive collapse of other edges by using the traffic transfer that is triggered when one edge crashes. In order to prevent cascading attacks on trusted-relay QKD networks, it is necessary to arrange the a suitable payload limitation for each edge in the network. When edge eij collapses, we expect that the breakdown probability of the adjacent edge eim is lower than p, that is
$\begin{eqnarray}\displaystyle \frac{(1-\rho )({L}_{{im}}+{\rm{\Delta }}{L}_{{im}})-\gamma {C}_{{im}}}{{C}_{{im}}-\gamma {C}_{{im}}}\lt p.\end{eqnarray}$
By substituting Lim, ${\rm{\Delta }}{L}_{{im}}$, Cim into the above formula, we obtain
$\begin{eqnarray}\displaystyle \frac{(1-\rho )\left[{\left({k}_{i}{k}_{m}\right)}^{\alpha }+\rho {\left({k}_{i}{k}_{j}\right)}^{\alpha }\tfrac{{\left({k}_{i}{k}_{m}\right)}^{\alpha }}{\displaystyle \sum _{a\in {{\rm{\Gamma }}}_{i}}{\left({k}_{i}{k}_{a}\right)}^{\alpha }+\displaystyle \sum _{b\in {{\rm{\Gamma }}}_{j}}{\left({k}_{j}{k}_{b}\right)}^{\alpha }}\right]-\gamma \beta {\left({k}_{i}{k}_{m}\right)}^{\alpha }}{\beta {\left({k}_{i}{k}_{m}\right)}^{\alpha }(1-\gamma )}\lt p,\end{eqnarray}$
which can be written as
$\begin{eqnarray}\beta \gt \displaystyle \frac{\left(1-\rho )[1+\tfrac{\rho {\left({k}_{i}{k}_{j}\right)}^{\alpha }}{\displaystyle \sum _{a\in {{\rm{\Gamma }}}_{i}}{\left({k}_{i}{k}_{a}\right)}^{\alpha }+\displaystyle \sum _{b\in {{\rm{\Gamma }}}_{j}}{\left({k}_{j}{k}_{b}\right)}^{\alpha }}\right]}{p(1-\gamma )+\gamma }.\end{eqnarray}$
Also, ${\sum }_{a\in {{\rm{\Gamma }}}_{i}}{k}_{a}^{\alpha }={\sum }_{k^{\prime} ={k}_{\min }}^{{k}_{\max }}{k}_{i}P(k^{\prime} | {k}_{i})k{{\prime} }^{\alpha }$, where $P(k^{\prime} | {k}_{i})$ is the probability that node i has a neighbor $k^{\prime} $, and ${k}_{\min }$ and ${k}_{\max }$ denote the minimum and maximum degrees in the network, respectively. Because the BA network has no degree-degree correlation, $P(k^{\prime} | {k}_{i})=k^{\prime} P(k^{\prime} )/\langle k\rangle $, where $\langle k\rangle $ denotes the average degree of the network. We then obtain ${\sum }_{a\in {{\rm{\Gamma }}}_{i}}{k}_{a}^{\alpha }={\sum }_{k^{\prime} ={k}_{\min }}^{{k}_{\max }}\tfrac{{k}_{i}\langle {k}_{\alpha +1}\rangle }{\langle k\rangle }$ and ${\sum }_{b\in {{\rm{\Gamma }}}_{j}}{k}_{b}^{\alpha }={\sum }_{k^{\prime} ={k}_{\min }}^{{k}_{\max }}\tfrac{{k}_{j}\langle {k}_{\alpha +1}\rangle }{\langle k\rangle }$. Eq.5 can be rewritten as
$\begin{eqnarray}\beta \gt \displaystyle \frac{(1-\rho )\left[1+\tfrac{\langle k\rangle }{\langle {k}^{\alpha +1}\rangle }\tfrac{\rho }{\tfrac{{k}_{i}}{{k}_{j}^{\alpha }}+\tfrac{{k}_{j}}{{k}_{i}^{\alpha }}}\right]}{p(1-\gamma )+\gamma }.\end{eqnarray}$
In view of $\tfrac{{k}_{i}}{{k}_{j}^{\alpha }}+\tfrac{{k}_{j}}{{k}_{i}^{\alpha }}\geqslant \tfrac{2}{{\left({k}_{i}{k}_{j}\right)}^{\tfrac{\alpha -1}{2}}}$, we can obtain
$\begin{eqnarray}\beta \gt \displaystyle \frac{(1-\rho )\left[1+\tfrac{\langle k\rangle }{\langle {k}^{\alpha +1}\rangle }\tfrac{\rho {\left({k}_{i}{k}_{j}\right)}^{\tfrac{\alpha -1}{2}}}{2}\right]}{p(1-\gamma )+\gamma }.\end{eqnarray}$
As described above, if we want to reduce the breakdown probability, the value of $\beta$ should be increased. Supposing the breakdown probability of eim, p=0, then we have
$\begin{eqnarray}\beta \gt \displaystyle \frac{(1-\rho )}{\gamma }+\displaystyle \frac{(1-\rho )\rho }{2\gamma }\displaystyle \frac{\langle k\rangle {\left({k}_{i}{k}_{j}\right)}^{\tfrac{\alpha -1}{2}}}{\langle {k}^{\alpha +1}\rangle }.\end{eqnarray}$
According to this formula, we can reduce the requirement for $\beta$ by increasing the value of γ. At the same time, we can increase the value of ρ and transfer more payload to other paths. We can then obtain a suitable value for $\beta$ by adjusting the parameters ρ and γ in order to defend against the cascading attack on the QKD network.

5. Conclusion

In this paper, we analyzed the security of the trusted-relay QKD network. It was shown that although the nodes in the network were not necessarily fully trusted in the case of the multipath key-transmission mechanism, the QKD network was vulnerable to a redirection attack. We further showed that Eve’s attack was able to cause a cascade effect and that it was possible for Eve to obtain the communicating parties'secret message by forcing the communication parties to transmit their messages through a node controlled by Eve. We built a model of the cascade attack and used a simulation to analyze the influence of the transfer ratio ρ and the control parameter γ on the breakdown probability. We showed that it was necessary to set the value of $\beta$ appropriately by increasing the values of γ and ρ, and that if the QKP capacity of each node is well designed, the cascading attack can be defeated satisfactorily. Our findings will help to improve the security of trusted-relay QKD networks.

Reference By original order
By published year
By cited within times
By Impact factor

Bennett C H, Brassard G 1984 Proc. of IEEE Int. Conf. on Computers, Systems, and Signal Processing Los Alamitos, CA IEEE 175
[Cited within: 1]

Toliver P et al. 2003 IEEE Photonics Technol. Lett. 15 1669
DOI:10.1109/LPT.2003.818687 [Cited within: 1]

Elliott CarXiv:0412029


Elliott C, Alexander C, David P, Oleksiy P, John S, Henry YarXiv:0503058


Chen T Y et al. 2010 Opt. Express 18 27217
DOI:10.1364/OE.18.027217 [Cited within: 1]

Dür W, Briegel H-J, Cirac J I, Zoller P 1999 Phys. Rev. A 59 169
DOI:10.1103/PhysRevA.59.169 [Cited within: 1]

Tang Y L et al. 2016 Phys. Rev. X 6 011024
[Cited within: 1]

Wang W Y, Xu F H, Lo H K 2019 Phys. Rev. X 9 041012
[Cited within: 2]

Elliott C 2002 New J. Phys. 4 46
DOI:10.1088/1367-2630/4/1/346 [Cited within: 2]

Peev M et al. 2009 New J. Phys. 11 075001
DOI:10.1088/1367-2630/11/7/075001 [Cited within: 1]

Sasaki M et al. 2011 Opt. Express 19 10387
DOI:10.1364/OE.19.010387 [Cited within: 2]

Liao S K et al. 2017 Nature 549 43
DOI:10.1038/nature23655 [Cited within: 1]

Chen Y A et al. 2021 Nature 589 214
[Cited within: 1]

Zhao Y L, Cao Y, Wang W, Wang H, Yu X S, Zhang J, Massimo T, Wu Y, Biswanath M 2018 IEEE Commun. Mag. 56 130
DOI:10.1109/MCOM.2018.1700656 [Cited within: 1]

Cao Y, Zhao Y L, Yu X S, Cheng L J, Li Z Q, Liu G J, Zhang J 2019 Proc. of IEEE Int. Conf. on Optical Fiber Communications Conference and Exhibition San Diego, CA IEEE 1


Cao Y, Zhao Y L, Colman-Meixner C, Yu X S, Zhang J 2017 Opt. Express 25 26453
DOI:10.1364/OE.25.026453 [Cited within: 1]

Wen H, Han Z, Zhao Y, Guo G, Hong P 2009 Sci. China. Inform. Sci 52 18
DOI:10.1007/s11432-009-0001-4 [Cited within: 2]

Yang C, Zhang H Q, Su J H 2017 J. Mod. Opt. 64 2350
DOI:10.1080/09500340.2017.1360956 [Cited within: 1]

Ma C H, Guo Y X, Su J H 2017 Proc. of IEEE Int. Conf. on Advanced Information Technology, Electronic and Automation Control Chongqing, China2513
[Cited within: 1]

Yang C, Zhang H Q, Su J H 2018 China Communications 15 33
DOI:10.1109/CC.2018.8300270

Xu Y B, Chen S J, Li Y P 2020 Journal of University of Electronic Science and Technology of China 49 276
[Cited within: 2]

Rass S, König S 2011 Proc. of IEEE Int. Conf. on Quantum, Nano and Micro Technologies French Riviera IEEE 83
[Cited within: 1]

Barabási A-L, Albert R 1999 Science 286 509
DOI:10.1126/science.286.5439.509 [Cited within: 1]

Wang J W, Rong L L 2009 Physica A 388 1731
DOI:10.1016/j.physa.2009.01.015 [Cited within: 1]

相关话题/Cascading attack trustedrelay