Continuous-variable quantum key distribution (CVQKD) plays an important role in quantum communications, because of its compatible setup for optical implementation with low cost. For this paper, we considered a neural network approach to predicting the secret key rate of CVQKD with discrete modulation (DM) through an underwater channel. A long-short-term-memory-(LSTM)-based neural network (NN) model was employed, in order to demonstrate performance improvement when taking into account the secret key rate. The numerical simulations showed that the lower bound of the secret key rate could be achieved for a finite-size analysis, where the LSTM-based neural network (NN) was much better than that of the backward-propagation-(BP)-based neural network (NN). This approach helped to realize the fast derivation of the secret key rate of CVQKD through an underwater channel, indicating that it can be used for improving performance in practical quantum communications.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC10297271PMC
http://dx.doi.org/10.3390/e25060937DOI Listing

Publication Analysis

Top Keywords

secret key
20
key rate
20
neural network
16
continuous-variable quantum
8
quantum key
8
key distribution
8
quantum communications
8
network approach
8
rate cvqkd
8
underwater channel
8

Similar Publications

T cells mediate pathogenesis of several autoimmune disorders by recognizing self-epitopes presented on Major Histocompatibility Complex (MHC) or Human Leukocyte Antigen (HLA) complex. The majority of autoantigens presented to T cells in various autoimmune disorders are not known, which has impeded autoantigen identification. Recent advances in immunopeptidomics have started to unravel the repertoire of antigenic epitopes presented on MHC.

View Article and Find Full Text PDF

DKiS: Decay weight invertible image steganography with private key.

Neural Netw

January 2025

College of Science, China Agricultural University, Beijing 100083, China. Electronic address:

Image steganography, defined as the practice of concealing information within another image. In this paper, we propose decay weight invertible image steganography with private key (DKiS). This model introduces two major advancements into current invertible image steganography: (1) Decay Weight Mechanism: For the first time, we introduce a decay weight mechanism to regulate the transfer of non-essential or 'garbage' information from the secret to the host pipeline.

View Article and Find Full Text PDF

Crayfish optimization based pixel selection using block scrambling based encryption for secure cloud computing environment.

Sci Rep

January 2025

Department of Instrumentation Engineering, Madras Institute of Technology Campus, Anna University, Chromepet, Chennai 44, India.

Cloud Computing (CC) is a fast emerging field that enables consumers to access network resources on-demand. However, ensuring a high level of security in CC environments remains a significant challenge. Traditional encryption algorithms are often inadequate in protecting confidential data, especially digital images, from complex cyberattacks.

View Article and Find Full Text PDF

Eating "rubbish"? Exploring the herbal secrets of "Laji-He," a traditional herbal rice snack from southern China.

J Ethnobiol Ethnomed

January 2025

Lushan Botanical Garden, Jiangxi Province and Chinese Academy of Sciences, Lushan, 332900, China.

Background: Laji-He is a traditional rice-based snack from the Beibu Gulf region in southern China. In the Beibu Gulf region, "Laji-He" (literally "garbage He") signifies the removal of toxins from the body, making it a truly "green" food. Laji-He holds essential cultural and medicinal value, incorporating various medicinal plants into its preparation.

View Article and Find Full Text PDF

Large-scale quantum networks require dynamic and resource-efficient solutions to reduce system complexity with maintained security and performance to support growing number of users over large distances. Current encoding schemes including time-bin, polarization, and orbital angular momentum, suffer from the lack of reconfigurability and thus scalability issues. Here, we demonstrate the first-time implementation of frequency-bin-encoded entanglement-based quantum key distribution and a reconfigurable distribution of entanglement using frequency-bin encoding.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!