• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Chen Zhiyu, Gao Dequan, Wang Dong, Li Guochun, Wei Xiaojing. Performance Evaluation of Power Quantum Secure Communication System for Energy Internet[J]. Journal of Computer Research and Development, 2017, 54(4): 711-719. DOI: 10.7544/issn1000-1239.2017.20161024
Citation: Chen Zhiyu, Gao Dequan, Wang Dong, Li Guochun, Wei Xiaojing. Performance Evaluation of Power Quantum Secure Communication System for Energy Internet[J]. Journal of Computer Research and Development, 2017, 54(4): 711-719. DOI: 10.7544/issn1000-1239.2017.20161024

Performance Evaluation of Power Quantum Secure Communication System for Energy Internet

More Information
  • Published Date: March 31, 2017
  • With the rapid development of energy Internet, more and more distributed energy systems are accessed. The demand for network and information security of energy information is increasingly urgent. Theoretically, quantum secure communication can achieve unconditional and absolute security in information communication. However, its application in power grid is still in the stage of exploring. This paper focuses on the performance evaluation of power quantum secure communication in the global energy Internet field. Firstly, considering the diversity of the grid business scenario and transmission loss, the system architecture diagram of power quantum secure communication is proposed. Then, through the simulation of the power communication transmission environment and actual business scenario, indicators that quantum channel and data exchange channel of power quantum secure communication system are evaluated in six aspects (e.g. distance loss, pendulum loss and connection loss). Finally, the feasibility and security of quantum secure communication technology in power communication field are verified by simulation experiments, and the development of energy Internet can be effectively assured.
  • Related Articles

    [1]Su Zelin, Zhang Wenfang, Wang Xiaomin. Outsourced Attribute-Based Encryption Scheme with Policy Updating and Verifiable Ciphertext[J]. Journal of Computer Research and Development, 2024, 61(12): 3088-3097. DOI: 10.7544/issn1000-1239.202220133
    [2]Shen Yuan, Song Wei, Zhao Changsheng, Peng Zhiyong. A Cross-Domain Ciphertext Sharing Scheme Supporting Access Behavior Identity Tracing[J]. Journal of Computer Research and Development, 2024, 61(7): 1611-1628. DOI: 10.7544/issn1000-1239.202330618
    [3]Yang Xiaodong, Zhou Hang, Ren Ningning, Yuan Sen, Wang Caifen. Aggregate Signcryption Scheme Supporting Multi-Ciphertext Equality Test for Wireless Body Area Network[J]. Journal of Computer Research and Development, 2023, 60(2): 341-350. DOI: 10.7544/issn1000-1239.202110775
    [4]Du Ruizhong, Li Mingyue, Tian Junfeng. Multi-keyword Ranked Ciphertext Retrieval Scheme Based on Clustering Index[J]. Journal of Computer Research and Development, 2019, 56(3): 555-565. DOI: 10.7544/issn1000-1239.2019.20170830
    [5]Chen Dongdong, Cao Zhenfu, Dong Xiaolei. Online/Offline Ciphertext-Policy Attribute-Based Searchable Encryption[J]. Journal of Computer Research and Development, 2016, 53(10): 2365-2375. DOI: 10.7544/issn1000-1239.2016.20160416
    [6]Zhang Kai, Wei Lifei, Li Xiangxue, Chen Jie, Qian Haifeng. An Efficient and Expressive Attribute-Based Encryption Scheme with Chosen Ciphertext Security[J]. Journal of Computer Research and Development, 2016, 53(10): 2239-2247. DOI: 10.7544/issn1000-1239.2016.20160430
    [7]Xiao Siyu, Ge Aijun, Ma Chuangui. Decentralized Attribute-Based Encryption Scheme with Constant-Size Ciphertexts[J]. Journal of Computer Research and Development, 2016, 53(10): 2207-2215. DOI: 10.7544/issn1000-1239.2016.20160459
    [8]Dong Xiaolei. Advances of Privacy Preservation in Internet of Things[J]. Journal of Computer Research and Development, 2015, 52(10): 2341-2352. DOI: 10.7544/issn1000-1239.2015.20150764
    [9]Zhang Jie, Ge Aijun, Ma Chuangui. Fully Secure Hierarchical Inner Product Encryption with Constant-Size Ciphertexts[J]. Journal of Computer Research and Development, 2015, 52(3): 691-701. DOI: 10.7544/issn1000-1239.2015.20131413
    [10]Zhang Hao, Zhao Lei, Feng Bo, Yu Rongwei, and Liu Weijie. CACDP: A Cryptographic Access Control for Dynamic Policy in Cloud Storage[J]. Journal of Computer Research and Development, 2014, 51(7): 1424-1435.

Catalog

    Article views (1381) PDF downloads (1077) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return