Control Code Multiple Encryption Algorithm on Satellite-to-ground Communication
The transmission security between ground station and satellite is challenging. Some existing multistep algorithms leave lots of loopholes for eavesdropping and attacking in satellite-to-ground communication. For high security, optical communication is a promising solution. In this paper, we propose...
Saved in:
| Published in | Mobile networks and applications Vol. 24; no. 6; pp. 1955 - 1974 |
|---|---|
| Main Authors | , , , , , |
| Format | Journal Article |
| Language | English |
| Published |
New York
Springer US
01.12.2019
Springer Nature B.V |
| Subjects | |
| Online Access | Get full text |
| ISSN | 1383-469X 1572-8153 |
| DOI | 10.1007/s11036-019-01338-z |
Cover
| Abstract | The transmission security between ground station and satellite is challenging. Some existing multistep algorithms leave lots of loopholes for eavesdropping and attacking in satellite-to-ground communication. For high security, optical communication is a promising solution. In this paper, we propose a control code multiple encryption algorithm (CCMEA) for the single-photon-transmission between satellite and ground station. CCMEA can utilize the control code to respectively encrypt three cognitive optimization sections: loop iteration, polarization coding and order rearrangement, and simulation shows that CCMEA can realize one step transmission to decrease loopholes compared with multistep encryption algorithm. In addition, we design a security detection method by combining the decoy photon analysis and the quantum bit error rate (QBER) analysis. The numerical results show that CCMEA can reduce the security threshold by 27
%
compared with multistep encryption algorithm of BB84 scheme. Finally, for satellite-to-ground communication, we construct an analytic QBER model on CCMEA with four factors: quantum channel transmission rate, single-photon acquisition probability, measurement factor and data filtering factor. The result demonstrates the effectiveness of CCMEA on satellite-to-ground communication. |
|---|---|
| AbstractList | The transmission security between ground station and satellite is challenging. Some existing multistep algorithms leave lots of loopholes for eavesdropping and attacking in satellite-to-ground communication. For high security, optical communication is a promising solution. In this paper, we propose a control code multiple encryption algorithm (CCMEA) for the single-photon-transmission between satellite and ground station. CCMEA can utilize the control code to respectively encrypt three cognitive optimization sections: loop iteration, polarization coding and order rearrangement, and simulation shows that CCMEA can realize one step transmission to decrease loopholes compared with multistep encryption algorithm. In addition, we design a security detection method by combining the decoy photon analysis and the quantum bit error rate (QBER) analysis. The numerical results show that CCMEA can reduce the security threshold by 27
%
compared with multistep encryption algorithm of BB84 scheme. Finally, for satellite-to-ground communication, we construct an analytic QBER model on CCMEA with four factors: quantum channel transmission rate, single-photon acquisition probability, measurement factor and data filtering factor. The result demonstrates the effectiveness of CCMEA on satellite-to-ground communication. The transmission security between ground station and satellite is challenging. Some existing multistep algorithms leave lots of loopholes for eavesdropping and attacking in satellite-to-ground communication. For high security, optical communication is a promising solution. In this paper, we propose a control code multiple encryption algorithm (CCMEA) for the single-photon-transmission between satellite and ground station. CCMEA can utilize the control code to respectively encrypt three cognitive optimization sections: loop iteration, polarization coding and order rearrangement, and simulation shows that CCMEA can realize one step transmission to decrease loopholes compared with multistep encryption algorithm. In addition, we design a security detection method by combining the decoy photon analysis and the quantum bit error rate (QBER) analysis. The numerical results show that CCMEA can reduce the security threshold by 27% compared with multistep encryption algorithm of BB84 scheme. Finally, for satellite-to-ground communication, we construct an analytic QBER model on CCMEA with four factors: quantum channel transmission rate, single-photon acquisition probability, measurement factor and data filtering factor. The result demonstrates the effectiveness of CCMEA on satellite-to-ground communication. |
| Author | Jiang, Xu Liu, Jinlong Yin, Zhendong Yang, Zhutian Fu, Yanyuan Wu, Zhilu |
| Author_xml | – sequence: 1 givenname: Jinlong surname: Liu fullname: Liu, Jinlong – sequence: 2 givenname: Zhutian orcidid: 0000-0002-6952-4465 surname: Yang fullname: Yang, Zhutian email: yangzhutian@hit.edu.cn – sequence: 3 givenname: Zhilu surname: Wu fullname: Wu, Zhilu – sequence: 4 givenname: Zhendong surname: Yin fullname: Yin, Zhendong – sequence: 5 givenname: Xu surname: Jiang fullname: Jiang, Xu – sequence: 6 givenname: Yanyuan surname: Fu fullname: Fu, Yanyuan |
| BookMark | eNp9kE9LAzEQxYNUsK1-AU-L9-hkk7TZYyn1D1R6UMFbyGazdUua1Gz20H56064geOhhmBl4v5nHG6GB884gdEvgngBMH1pCgE4wkCIVpQIfLtCQ8GmOBeF0kGYqKGaT4vMKjdp2AwCcCzZEq7l3MXibzX1lstfOxmZnTbZwOux3sfEum9m1D0382mZpeVPRWNtEg6PH6-A7VyVyu-1co9VRfo0ua2Vbc_Pbx-jjcfE-f8bL1dPLfLbEmhIRcVEwwwFMTVitcwFT0EWVPJWMl4IIpaCuKjJhrK60EgoUnTBeC6KVKfOS5nSM7vq7u-C_O9NGufFdcOmlzIEDz3NGk0j0Ih182wZTS93Ek80YVGMlAXlMT_bpyZSePKUnDwnN_6G70GxV2J-HaA-1SezWJvyZOkP9ABothco |
| CitedBy_id | crossref_primary_10_1109_COMST_2024_3408277 crossref_primary_10_1007_s40747_022_00899_z crossref_primary_10_1002_ett_3936 |
| Cites_doi | 10.1103/PhysRevA.97.042335 10.1002/sat.1169 10.1109/TCOMM.2018.2792014 10.1109/TVT.2018.2811942 10.1103/PhysRevA.91.042103 10.1007/s11277-017-4207-2 10.1088/1674-1056/26/3/030302 10.1038/nature00784 10.1007/s11128-018-2013-8 10.1364/OFC.2017.Th2A.55 10.1103/PhysRevA.71.044305 10.1364/OE.25.015299 10.1016/j.physleta.2006.06.054 10.1109/JSAC.2018.2864419 10.1109/3PGCIC.2014.71 10.1103/PhysRevLett.110.170502 10.1007/s10773-017-3507-3 10.1109/JSAC.2018.2824360 10.1038/lsa.2016.144 10.1007/s10773-016-2958-2 10.1109/MWC.2016.1500108WC 10.1016/j.optcom.2009.09.047 10.1109/TWC.2018.2859394 10.1007/s11128-014-0872-1 10.1016/j.adhoc.2016.05.012 10.1038/nature03804 10.1016/j.optcom.2005.04.048 10.1038/s41598-017-08279-1 |
| ContentType | Journal Article |
| Copyright | Springer Science+Business Media, LLC, part of Springer Nature 2019 Mobile Networks and Applications is a copyright of Springer, (2019). All Rights Reserved. |
| Copyright_xml | – notice: Springer Science+Business Media, LLC, part of Springer Nature 2019 – notice: Mobile Networks and Applications is a copyright of Springer, (2019). All Rights Reserved. |
| DBID | AAYXX CITATION 3V. 7SC 7SP 7WY 7WZ 7XB 87Z 8AL 8AO 8FD 8FE 8FG 8FK 8FL ABUWG AFKRA ARAPS AZQEC BENPR BEZIV BGLVJ CCPQU DWQXO FRNLG F~G GNUQQ HCIFZ JQ2 K60 K6~ K7- L.- L7M L~C L~D M0C M0N P5Z P62 PHGZM PHGZT PKEHL PQBIZ PQBZA PQEST PQGLB PQQKQ PQUKI PRINS Q9U |
| DOI | 10.1007/s11036-019-01338-z |
| DatabaseName | CrossRef ProQuest Central (Corporate) Computer and Information Systems Abstracts Electronics & Communications Abstracts ABI/INFORM Collection ABI/INFORM Global (PDF only) ProQuest Central (purchase pre-March 2016) ABI/INFORM Collection Computing Database (Alumni Edition) ProQuest Pharma Collection Technology Research Database ProQuest SciTech Collection ProQuest Technology Collection ProQuest Central (Alumni) (purchase pre-March 2016) ABI/INFORM Collection (Alumni Edition) ProQuest Central (Alumni) ProQuest Central UK/Ireland Advanced Technologies & Computer Science Collection ProQuest Central Essentials Local Electronic Collection Information ProQuest Central Business Premium Collection Technology Collection ProQuest One Community College ProQuest Central Business Premium Collection (Alumni) ABI/INFORM Global (Corporate) ProQuest Central Student SciTech Premium Collection ProQuest Computer Science Collection ProQuest Business Collection (Alumni Edition) ProQuest Business Collection Computer Science Database ABI/INFORM Professional Advanced Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional ABI/INFORM Global (OCUL) Computing Database ProQuest Central Advanced Technologies & Aerospace Database (via ProQuest) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Premium ProQuest One Academic ProQuest One Academic Middle East (New) ProQuest One Business (OCUL) ProQuest One Business (Alumni) ProQuest One Academic Eastern Edition (DO NOT USE) ProQuest One Applied & Life Sciences ProQuest One Academic ProQuest One Academic UKI Edition ProQuest Central China ProQuest Central Basic |
| DatabaseTitle | CrossRef ABI/INFORM Global (Corporate) ProQuest Business Collection (Alumni Edition) ProQuest One Business Computer Science Database ProQuest Central Student Technology Collection Technology Research Database Computer and Information Systems Abstracts – Academic ProQuest One Academic Middle East (New) ProQuest Advanced Technologies & Aerospace Collection ProQuest Central Essentials ProQuest Computer Science Collection Computer and Information Systems Abstracts ProQuest Central (Alumni Edition) SciTech Premium Collection ProQuest One Community College ProQuest Pharma Collection ProQuest Central China ABI/INFORM Complete ProQuest Central ABI/INFORM Professional Advanced ProQuest One Applied & Life Sciences ProQuest Central Korea ProQuest Central (New) Advanced Technologies Database with Aerospace ABI/INFORM Complete (Alumni Edition) Advanced Technologies & Aerospace Collection Business Premium Collection ABI/INFORM Global ProQuest Computing ABI/INFORM Global (Alumni Edition) ProQuest Central Basic ProQuest Computing (Alumni Edition) ProQuest One Academic Eastern Edition Electronics & Communications Abstracts ProQuest Technology Collection ProQuest SciTech Collection ProQuest Business Collection Computer and Information Systems Abstracts Professional Advanced Technologies & Aerospace Database ProQuest One Academic UKI Edition ProQuest One Business (Alumni) ProQuest One Academic ProQuest Central (Alumni) ProQuest One Academic (New) Business Premium Collection (Alumni) |
| DatabaseTitleList | ABI/INFORM Global (Corporate) |
| Database_xml | – sequence: 1 dbid: 8FG name: ProQuest Technology Collection url: https://search.proquest.com/technologycollection1 sourceTypes: Aggregation Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering |
| EISSN | 1572-8153 |
| EndPage | 1974 |
| ExternalDocumentID | 1519017481 10_1007_s11036_019_01338_z |
| GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61571167 funderid: https://doi.org/10.13039/501100001809 – fundername: National Natural Science Foundation of China grantid: 61871157 funderid: https://doi.org/10.13039/501100001809 – fundername: National Natural Science Foundation of China grantid: 61471142 funderid: https://doi.org/10.13039/501100001809 – fundername: National Natural Science Foundation of China grantid: 61601145 funderid: https://doi.org/10.13039/501100001809 |
| GroupedDBID | -59 -5G -BR -EM -Y2 -~C -~X .4S .86 .DC .VR 06D 0R~ 0VY 123 1N0 1SB 2.D 203 28- 29M 29~ 2J2 2JN 2JY 2KG 2LR 2P1 2VQ 2~H 30V 3V. 4.4 406 408 409 40D 40E 5QI 5VS 67Z 6NX 7WY 85S 8AO 8FE 8FG 8FL 8FW 8TC 8UJ 8US 95- 95. 95~ 96X AAAVM AABHQ AACDK AAHNG AAIAL AAJBT AAJKR AANZL AARHV AARTL AASML AATNV AATVU AAUYE AAWCG AAYIU AAYOK AAYQN AAYTO AAYZH ABAKF ABBBX ABBXA ABDZT ABECU ABFTD ABFTV ABHLI ABHQN ABJNI ABJOX ABKCH ABKTR ABMNI ABMQK ABNWP ABQBU ABQSL ABSXP ABTEG ABTHY ABTKH ABTMW ABULA ABUWG ABWNU ABXPI ACAOD ACBXY ACDTI ACGFO ACGFS ACHSB ACHXU ACKNC ACM ACMDZ ACMLO ACOKC ACOMO ACPIV ACREN ACZOJ ADHHG ADHIR ADIMF ADINQ ADKNI ADKPE ADL ADMLS ADRFC ADTPH ADURQ ADYFF ADYOE ADZKW AEBTG AEFIE AEFQL AEGAL AEGNC AEJHL AEJRE AEKMD AEMSY AENEX AEOHA AEPYU AESKC AETLH AEVLU AEXYK AFEXP AFFNX AFGCZ AFKRA AFLOW AFQWF AFWTZ AFYQB AFZKB AGAYW AGDGC AGGDS AGJBK AGMZJ AGQEE AGQMX AGRTI AGWIL AGWZB AGYKE AHAVH AHBYD AHKAY AHSBF AHYZX AIAKS AIGIU AIIXL AILAN AITGF AJBLW AJRNO AJZVZ ALMA_UNASSIGNED_HOLDINGS ALWAN AMKLP AMTXH AMXSW AMYLF AMYQR AOCGG ARAPS ARCEE ARCSS ARMRJ ASPBG AVWKF AXYYD AYJHY AZFZN AZQEC B-. BA0 BBWZM BDATZ BENPR BEZIV BGLVJ BGNMA BPHCQ BSONS CAG CCPQU COF CS3 CSCUP DDRTE DL5 DNIVK DPUIP DWQXO EBLON EBS EDO EIOEI EJD ESBYG FEDTE FERAY FFXSO FIGPU FINBP FNLPD FRNLG FRRFC FSGXE FWDCC GGCAI GGRSB GJIRD GNUQQ GNWQR GQ6 GQ7 GQ8 GROUPED_ABI_INFORM_COMPLETE GROUPED_ABI_INFORM_RESEARCH GXS H13 HCIFZ HF~ HG5 HG6 HGAVV HMJXF HQYDN HRMNR HVGLF HZ~ I-F I07 I09 IHE IJ- IKXTQ ITG ITH ITM IWAJR IXC IXE IZIGR IZQ I~X I~Y I~Z J-C J0Z JBSCW JCJTX JZLTJ K60 K6V K6~ K7- KDC KOV KOW LAK LLZTM M0C M0N M4Y MA- N2Q NB0 NDZJH NPVJJ NQJWS NU0 O9- O93 O9G O9I O9J OAM OVD P19 P2P P62 P9O PF0 PQBIZ PQBZA PQQKQ PROAC PT4 PT5 Q2X QOK QOS R4E R89 R9I RHV RIG RNI RNS ROL RPX RSV RZC RZE RZK S16 S1Z S26 S27 S28 S3B SAP SCLPG SCO SCV SDH SDM SHX SISQX SJN SJYHP SNE SNPRN SNX SOHCF SOJ SPISZ SRMVM SSLCW STPWE SZN T13 T16 TEORI TN5 TSG TSK TSV TUC TUS U2A UG4 UOJIU UTJUX UZXMN VC2 VFIZW W23 W48 W7O WK8 YLTOR Z45 Z7R Z7X Z7Z Z81 Z83 Z88 Z8M Z8R Z8T Z8W Z92 ZMTXR _50 ~A9 ~EX AAPKM AAYXX ABBRH ABDBE ABFSG ABRTQ ACSTC ADHKG AETEA AEZWR AFDZB AFHIU AFOHR AGQPQ AHPBZ AHWEU AIXLP ATHPR AYFIA CITATION PHGZM PHGZT PQGLB PUEGO 7SC 7SP 7XB 8AL 8FD 8FK JQ2 L.- L7M L~C L~D PKEHL PQEST PQUKI PRINS Q9U |
| ID | FETCH-LOGICAL-c318t-994e500ef14fc28070c9d005b45b818aa0fdd1644fdca8a0a3645f81caeb2b323 |
| IEDL.DBID | U2A |
| ISSN | 1383-469X |
| IngestDate | Sat Aug 23 14:26:19 EDT 2025 Wed Oct 01 02:45:39 EDT 2025 Thu Apr 24 22:54:54 EDT 2025 Fri Feb 21 02:33:50 EST 2025 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 6 |
| Keywords | Control code multiple encryption algorithm (CCMEA) Security detection Quantum bit error rate Satellite communication |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-c318t-994e500ef14fc28070c9d005b45b818aa0fdd1644fdca8a0a3645f81caeb2b323 |
| Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
| ORCID | 0000-0002-6952-4465 |
| PQID | 205052243 |
| PQPubID | 26070 |
| PageCount | 20 |
| ParticipantIDs | proquest_journals_205052243 crossref_citationtrail_10_1007_s11036_019_01338_z crossref_primary_10_1007_s11036_019_01338_z springer_journals_10_1007_s11036_019_01338_z |
| ProviderPackageCode | CITATION AAYXX |
| PublicationCentury | 2000 |
| PublicationDate | 20191200 2019-12-00 20191201 |
| PublicationDateYYYYMMDD | 2019-12-01 |
| PublicationDate_xml | – month: 12 year: 2019 text: 20191200 |
| PublicationDecade | 2010 |
| PublicationPlace | New York |
| PublicationPlace_xml | – name: New York |
| PublicationSubtitle | The Journal of SPECIAL ISSUES on Mobility of Systems, Users, Data and Computing |
| PublicationTitle | Mobile networks and applications |
| PublicationTitleAbbrev | Mobile Netw Appl |
| PublicationYear | 2019 |
| Publisher | Springer US Springer Nature B.V |
| Publisher_xml | – name: Springer US – name: Springer Nature B.V |
| References | Howard (CR19) 2015; 91 Hu, Yu, Jing, Xiao, Jia, Qin, Long (CR33) 2016; 5 Zhao, Li, Niu, Ma, Ruan (CR16) 2017; 26 Kielpinski, Monroe, Wineland (CR30) 2002; 417 Zhao, Xie, Chen, Wang (CR6) 2017; 96 Jia, Liu, Yin, Guo, Gu (CR32) 2017; 58 CR17 Patwardhan, Moulick, Panigrahi (CR13) 2016; 55 Jia, Gu, Guo, Xiang, Zhang (CR5) 2016; 23 Cao, Zhao, Yu, Jin, Chen, Tang, Leung (CR8) 2018; 36 Salih, Li, Al-Amri, Zubairy (CR11) 2013; 110 Sajeed, Minshull, Jain, Makarov (CR23) 2017; 7 Cheng, Zhang, Li, Chen, Zhao, Yu, Leung (CR4) 2018; 67 Hong-Xin, Chi, Han, Yan, Wang (CR24) 2018; 5 Liu, Chen, Liu, Liu (CR14) 2009; 40 Birnbaum, Boca, Miller, Boozer, Northup, Kimble (CR31) 2005; 436 Vinay, Kok (CR22) 2018; 97 Deng, Gui, Liu (CR10) 2003; 68 Li, Xu, Yin (CR18) 2018; 17 Cao, Zhao, Liu, Gu (CR26) 2017; 25 CR7 Deng, Li, Li, Zhou, Zhou (CR9) 2006; 359 Zang, Tulin, Song, Jiang, School (CR15) 2017; 40 Behzadi, Ahansaz (CR20) 2017; 56 Yang, Sun, Zhao (CR21) 2015; 14 Deng, Long (CR27) 2004; 69 CR25 Wang, Deng, Li, Liu, Long (CR28) 2005; 71 Chen, Zhao, Ding, Alouini (CR2) 2018; 17 Jia, Liu, Gu, Guo (CR1) 2017; 35 Gao, Qin, Wen, Zhu (CR12) 2010; 283 Wang, Deng, Long (CR29) 2005; 253 Zhao, Cheng, Yu, Tang, Chen, Gui, Sari (CR3) 2018; 66 HW Li (1338_CR18) 2018; 17 F Cheng (1338_CR4) 2018; 67 F Deng (1338_CR27) 2004; 69 YG Yang (1338_CR21) 2015; 14 JY Hu (1338_CR33) 2016; 5 D Kielpinski (1338_CR30) 2002; 417 M Jia (1338_CR5) 2016; 23 F Gao (1338_CR12) 2010; 283 1338_CR7 Y Chen (1338_CR2) 2018; 17 1338_CR25 C Wang (1338_CR28) 2005; 71 M Jia (1338_CR32) 2017; 58 S Patwardhan (1338_CR13) 2016; 55 M Howard (1338_CR19) 2015; 91 J Cao (1338_CR26) 2017; 25 Y Zhao (1338_CR6) 2017; 96 X Zhao (1338_CR16) 2017; 26 LI Hong-Xin (1338_CR24) 2018; 5 M Jia (1338_CR1) 2017; 35 H Salih (1338_CR11) 2013; 110 C Wang (1338_CR29) 2005; 253 Y Cao (1338_CR8) 2018; 36 FG Deng (1338_CR10) 2003; 68 P Zang (1338_CR15) 2017; 40 S Sajeed (1338_CR23) 2017; 7 KM Birnbaum (1338_CR31) 2005; 436 FG Deng (1338_CR9) 2006; 359 1338_CR17 N Zhao (1338_CR3) 2018; 66 N Behzadi (1338_CR20) 2017; 56 WJ Liu (1338_CR14) 2009; 40 SE Vinay (1338_CR22) 2018; 97 |
| References_xml | – volume: 55 start-page: 1 issue: 7 year: 2016 ident: CR13 article-title: Efficient Controlled Quantum Secure Direct Communication Protocols publication-title: Int J Theor Phys – volume: 17 start-page: 6348 issue: 9 year: 2018 ident: CR2 article-title: Multiple UAVs as Relays: Multi-Hop Single Link Versus Multiple Dual-Hop Links publication-title: IEEE Trans Wirel Commun – volume: 110 start-page: 170502 issue: 17 year: 2013 ident: CR11 article-title: Protocol for direct counterfactual quantum communication publication-title: Phys Rev Lett – volume: 40 start-page: 242 issue: 3 year: 2017 ident: CR15 article-title: Controlled Teleportation of 3 Particle GHZ State via 2 EPR Pairs publication-title: Journal of Anhui Normal University – volume: 67 start-page: 6732 issue: 7 year: 2018 ident: CR4 article-title: UAV Trajectory Optimization for Data Offloading at the Edge of Multiple Cells publication-title: IEEE Trans Veh Technol – volume: 23 start-page: 96 issue: 6 year: 2016 ident: CR5 article-title: Broadband Hybrid Satellite-Terrestrial Communication Systems Based on Cognitive Radio toward 5G publication-title: IEEE Wirel Commun – volume: 68 start-page: 113 issue: 4 year: 2003 ident: CR10 article-title: Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block publication-title: Phys Rev A – volume: 91 start-page: 042103 issue: 4 year: 2015 ident: CR19 publication-title: Phys Rev A – volume: 7 start-page: 8403 issue: 1 year: 2017 ident: CR23 article-title: Invisible Trojan-horse attack publication-title: Sci Rep – volume: 66 start-page: 2281 issue: 5 year: 2018 ident: CR3 article-title: Caching UAV Assisted Secure Transmission in Hyper-Dense Networks Based on Interference Alignment publication-title: IEEE Trans Commun – ident: CR25 – volume: 97 start-page: 042335 issue: 4 year: 2018 ident: CR22 article-title: Extended analysis of the Trojan-horse attack in quantum key distribution publication-title: Phys Rev A – volume: 26 start-page: 231 issue: 3 year: 2017 ident: CR16 article-title: Two-step quantum secure direct communication scheme with frequency coding publication-title: Chin Phys B – volume: 69 start-page: 521 issue: 5 year: 2004 ident: CR27 article-title: Secure direct communication with a quantum one-time pad publication-title: Physics – volume: 71 start-page: 44305 issue: 4 year: 2005 ident: CR28 article-title: Quantum secure direct communication with high-dimension quantum superdense coding publication-title: Phys Rev A – volume: 417 start-page: 709 issue: 6890 year: 2002 ident: CR30 article-title: Architecture for a large-scale ion-trap quantum computer publication-title: Nature – volume: 5 start-page: e16144 issue: 9 year: 2016 ident: CR33 article-title: Experimental quantum secure direct communication with single photons publication-title: Light Science & Applications – volume: 253 start-page: 15 issue: 1 year: 2005 ident: CR29 article-title: Multi-step quantum secure direct communication using multi-particle Green-Horne-Zeilinger state publication-title: Opt Commun – volume: 40 start-page: 309 issue: 1 year: 2009 ident: CR14 article-title: Three-dimension single photon quantum secure direct communication based on mutual authentication publication-title: J Cent South Univ – volume: 58 start-page: 231 issue: C year: 2017 ident: CR32 article-title: Joint cooperative spectrum sensing and spectrum opportunity for satellite cluster communication networks publication-title: Ad Hoc Netw – volume: 283 start-page: 192 issue: 1 year: 2010 ident: CR12 article-title: Cryptanalysis of multiparty controlled quantum secure direct communication using Greenberger Horne Zeilinger state publication-title: Opt Commun – volume: 436 start-page: 87 issue: 7047 year: 2005 ident: CR31 article-title: Photon blockade in an optical cavity with one trapped atom publication-title: Nature – volume: 359 start-page: 359 issue: 5 year: 2006 ident: CR9 article-title: Quantum secure direct communication network with Einstein Podolsky Rosen pairs publication-title: Phys Lett A – volume: 17 start-page: 257 issue: 10 year: 2018 ident: CR18 article-title: Quantum Key Distribution in the Presence of the Intercept-Resend with Faked States Attack publication-title: Quantum Inf Process – volume: 36 start-page: 905 issue: 4 year: 2018 ident: CR8 article-title: Optimization or Alignment: Secure Primary Transmission Assisted by Secondary Networks publication-title: IEEE J Sel Areas Commun – ident: CR17 – volume: 96 start-page: 3799 issue: 3 year: 2017 ident: CR6 article-title: Ergodic Channel Capacity Analysis of Downlink in the Hybrid Satellite-Terrestrial Cooperative System publication-title: Wirel Pers Commun – volume: 56 start-page: 3441 issue: 11 year: 2017 ident: CR20 article-title: Effects of Oscillatory Deformations on the Coherent and Incoherent Quantum Transport publication-title: Int J Theor Phys – volume: 25 start-page: 15299 issue: 13 year: 2017 ident: CR26 article-title: Performance analysis of a coherent free space optical communication system based on experiment publication-title: Opt Express – volume: 14 start-page: 681 issue: 2 year: 2015 ident: CR21 article-title: Trojan-horse attacks on quantum key distribution with classical Bob publication-title: Quantum Inf Process – ident: CR7 – volume: 35 start-page: 139 issue: 2 year: 2017 ident: CR1 article-title: Joint cooperative spectrum sensing and channel selection optimization for satellite communication systems based on cognitive radio publication-title: Int J Satell Commun Netw – volume: 5 start-page: 1 issue: 1 year: 2018 ident: CR24 publication-title: Analysis on Photon-number-splitting Attack Against Decoy-state Quantum Key Distribution Schemes. Journal of Cryptologic Research – volume: 97 start-page: 042335 issue: 4 year: 2018 ident: 1338_CR22 publication-title: Phys Rev A doi: 10.1103/PhysRevA.97.042335 – volume: 35 start-page: 139 issue: 2 year: 2017 ident: 1338_CR1 publication-title: Int J Satell Commun Netw doi: 10.1002/sat.1169 – volume: 66 start-page: 2281 issue: 5 year: 2018 ident: 1338_CR3 publication-title: IEEE Trans Commun doi: 10.1109/TCOMM.2018.2792014 – volume: 67 start-page: 6732 issue: 7 year: 2018 ident: 1338_CR4 publication-title: IEEE Trans Veh Technol doi: 10.1109/TVT.2018.2811942 – volume: 91 start-page: 042103 issue: 4 year: 2015 ident: 1338_CR19 publication-title: Phys Rev A doi: 10.1103/PhysRevA.91.042103 – volume: 96 start-page: 3799 issue: 3 year: 2017 ident: 1338_CR6 publication-title: Wirel Pers Commun doi: 10.1007/s11277-017-4207-2 – volume: 26 start-page: 231 issue: 3 year: 2017 ident: 1338_CR16 publication-title: Chin Phys B doi: 10.1088/1674-1056/26/3/030302 – volume: 417 start-page: 709 issue: 6890 year: 2002 ident: 1338_CR30 publication-title: Nature doi: 10.1038/nature00784 – volume: 17 start-page: 257 issue: 10 year: 2018 ident: 1338_CR18 publication-title: Quantum Inf Process doi: 10.1007/s11128-018-2013-8 – ident: 1338_CR25 doi: 10.1364/OFC.2017.Th2A.55 – volume: 71 start-page: 44305 issue: 4 year: 2005 ident: 1338_CR28 publication-title: Phys Rev A doi: 10.1103/PhysRevA.71.044305 – volume: 69 start-page: 521 issue: 5 year: 2004 ident: 1338_CR27 publication-title: Physics – volume: 25 start-page: 15299 issue: 13 year: 2017 ident: 1338_CR26 publication-title: Opt Express doi: 10.1364/OE.25.015299 – volume: 359 start-page: 359 issue: 5 year: 2006 ident: 1338_CR9 publication-title: Phys Lett A doi: 10.1016/j.physleta.2006.06.054 – ident: 1338_CR7 doi: 10.1109/JSAC.2018.2864419 – ident: 1338_CR17 doi: 10.1109/3PGCIC.2014.71 – volume: 68 start-page: 113 issue: 4 year: 2003 ident: 1338_CR10 publication-title: Phys Rev A – volume: 110 start-page: 170502 issue: 17 year: 2013 ident: 1338_CR11 publication-title: Phys Rev Lett doi: 10.1103/PhysRevLett.110.170502 – volume: 56 start-page: 3441 issue: 11 year: 2017 ident: 1338_CR20 publication-title: Int J Theor Phys doi: 10.1007/s10773-017-3507-3 – volume: 36 start-page: 905 issue: 4 year: 2018 ident: 1338_CR8 publication-title: IEEE J Sel Areas Commun doi: 10.1109/JSAC.2018.2824360 – volume: 5 start-page: e16144 issue: 9 year: 2016 ident: 1338_CR33 publication-title: Light Science & Applications doi: 10.1038/lsa.2016.144 – volume: 55 start-page: 1 issue: 7 year: 2016 ident: 1338_CR13 publication-title: Int J Theor Phys doi: 10.1007/s10773-016-2958-2 – volume: 23 start-page: 96 issue: 6 year: 2016 ident: 1338_CR5 publication-title: IEEE Wirel Commun doi: 10.1109/MWC.2016.1500108WC – volume: 283 start-page: 192 issue: 1 year: 2010 ident: 1338_CR12 publication-title: Opt Commun doi: 10.1016/j.optcom.2009.09.047 – volume: 17 start-page: 6348 issue: 9 year: 2018 ident: 1338_CR2 publication-title: IEEE Trans Wirel Commun doi: 10.1109/TWC.2018.2859394 – volume: 40 start-page: 309 issue: 1 year: 2009 ident: 1338_CR14 publication-title: J Cent South Univ – volume: 14 start-page: 681 issue: 2 year: 2015 ident: 1338_CR21 publication-title: Quantum Inf Process doi: 10.1007/s11128-014-0872-1 – volume: 5 start-page: 1 issue: 1 year: 2018 ident: 1338_CR24 publication-title: Analysis on Photon-number-splitting Attack Against Decoy-state Quantum Key Distribution Schemes. Journal of Cryptologic Research – volume: 58 start-page: 231 issue: C year: 2017 ident: 1338_CR32 publication-title: Ad Hoc Netw doi: 10.1016/j.adhoc.2016.05.012 – volume: 40 start-page: 242 issue: 3 year: 2017 ident: 1338_CR15 publication-title: Journal of Anhui Normal University – volume: 436 start-page: 87 issue: 7047 year: 2005 ident: 1338_CR31 publication-title: Nature doi: 10.1038/nature03804 – volume: 253 start-page: 15 issue: 1 year: 2005 ident: 1338_CR29 publication-title: Opt Commun doi: 10.1016/j.optcom.2005.04.048 – volume: 7 start-page: 8403 issue: 1 year: 2017 ident: 1338_CR23 publication-title: Sci Rep doi: 10.1038/s41598-017-08279-1 |
| SSID | ssj0005584 |
| Score | 2.2693565 |
| Snippet | The transmission security between ground station and satellite is challenging. Some existing multistep algorithms leave lots of loopholes for eavesdropping and... |
| SourceID | proquest crossref springer |
| SourceType | Aggregation Database Enrichment Source Index Database Publisher |
| StartPage | 1955 |
| SubjectTerms | Algorithms Bit error rate Communication Communications Engineering Computer Communication Networks Computer simulation Eavesdropping Electrical Engineering Encryption Engineering Error analysis Ground stations IT in Business Iterative methods Networks Optical communication Optimization Photons Protocol Qubits (quantum computing) Routing Security Studies Wireless networks |
| SummonAdditionalLinks | – databaseName: ProQuest Central dbid: BENPR link: http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwfV07T8MwED6VdoEB8RSlgDKwgaXYcdpkQKhUrSqkFgRU6hb5FRhKUkoY6K_HTpyGItEximPJ57PvLnf3fQCXUlsZpg0jEkS5iHoiREGMJVJEYRJrj77D82qLcXs4ofdTf1qDUdkLY8oqyzsxv6hlKsw_ch2kG8o1Qr3b-QcypFEmuVoyaDDLrCBvcoSxLWgQA4xVh8Zdf_z4VNV8-EHBcht4SMeFU9tFU_TSYYPN65qeHhO3oeW6parczz8Z09wQDfZg13qQTrfY8n2oqeQAdn7hCh7CQ68oQHd6qVTOyNYMOv1ELL7zK8Lpzl716rK3d0c_PLMcljNTKEuRafNIpLPWOHIEk0H_pTdEljkBCX1GMxSGVPmuq7SwY2HwblwRSr18Tn2uLTRjbiylDpRoLAULmMtMMjIOsGA60OYe8Y6hnqSJOgEn9GiHEz28HWDKMeZcBJ7yRUwMdj1RTcCllCJhYcUNu8UsqgCRjWQjLdkol2y0bMLV6pt5AaqxcXSrFH5kD9hntFKHJlyX-1G9_X-y042TtWCbGA3Iy1XOoJ4tvtS5djoyfmFV6QeAWtM3 priority: 102 providerName: ProQuest |
| Title | Control Code Multiple Encryption Algorithm on Satellite-to-ground Communication |
| URI | https://link.springer.com/article/10.1007/s11036-019-01338-z https://www.proquest.com/docview/205052243 |
| Volume | 24 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVEBS databaseName: Inspec with Full Text customDbUrl: eissn: 1572-8153 dateEnd: 20241101 omitProxy: false ssIdentifier: ssj0005584 issn: 1383-469X databaseCode: ADMLS dateStart: 20080101 isFulltext: true titleUrlDefault: https://www.ebsco.com/products/research-databases/inspec-full-text providerName: EBSCOhost – providerCode: PRVPQU databaseName: ProQuest Central customDbUrl: http://www.proquest.com/pqcentral?accountid=15518 eissn: 1572-8153 dateEnd: 20241101 omitProxy: true ssIdentifier: ssj0005584 issn: 1383-469X databaseCode: BENPR dateStart: 19990101 isFulltext: true titleUrlDefault: https://www.proquest.com/central providerName: ProQuest – providerCode: PRVPQU databaseName: ProQuest Technology Collection customDbUrl: eissn: 1572-8153 dateEnd: 20241101 omitProxy: true ssIdentifier: ssj0005584 issn: 1383-469X databaseCode: 8FG dateStart: 19990101 isFulltext: true titleUrlDefault: https://search.proquest.com/technologycollection1 providerName: ProQuest – providerCode: PRVAVX databaseName: SpringerLINK - Czech Republic Consortium customDbUrl: eissn: 1572-8153 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0005584 issn: 1383-469X databaseCode: AGYKE dateStart: 19970101 isFulltext: true titleUrlDefault: http://link.springer.com providerName: Springer Nature – providerCode: PRVAVX databaseName: SpringerLink Journals (ICM) customDbUrl: eissn: 1572-8153 dateEnd: 99991231 omitProxy: true ssIdentifier: ssj0005584 issn: 1383-469X databaseCode: U2A dateStart: 19970101 isFulltext: true titleUrlDefault: http://www.springerlink.com/journals/ providerName: Springer Nature |
| link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LT4NAEJ5oe9GD8RlrteHgTTdhF2jhiA1to7EatUk9EXZZ9FDBtHiwv97ZBcQaNfFECMMGvn3MTGbmG4DTGLVMhIqRCCZNYlvCI25CYyKZpCxBi77HdbbFuDua2JdTZ1oWhS2qbPcqJKlP6rrYjSryXFMV3SjHiizXoekoOi9cxRPm14kdjlu0snUtgs7ftCyV-XmMVXVU25jfwqJa2wy2Yas0Ew2_mNcdWJPpLmx-IQ_cg5t-kWVu9LNYGtdlYqARpGL-rs8Bw589Zej7P78YeHMfae7NXJI8I6qWI42NleqQfZgMgof-iJTtEYjAjZgTz7OlY5oSEU2EIrUxhRfj73Pb4aiGo8hM4hi9ITuJReRGZqQijolLRYTeNLeYdQCNNEvlIRieZfc4Q_GuS21OKefCtaQjEqYI6plsAa1QCkXJHa5aWMzCmvVYIRsisqFGNly24OzzndeCOeNP6XYFfljuokXIdJs9_IYWnFfzUT_9fbCj_4m3YYOpJaGTVI6hkc_f5AmaGjnvwLo7GHag6Q8frwK8XgTj27uOXm8ffV7OuQ |
| linkProvider | Springer Nature |
| linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3JTsMwEB0hOAAHxCrK6gOcwFLiOCU5IASlqGwFsUi9BW-BA6SlBCH4N_6NceJQQIIbxyiOFT1PPDPxzHsAaxq9jEDHSBUzHuWBimmU-poaZnyWYkS_JYtqi3a9dc2POmFnCN6rXhhbVlnticVGrbvK_iPHJN1KrjEe7PQeqRWNsoerlYKGcMoKertgGHN9Hcfm9QUzuKftw31c7nXGDppXjRZ1IgNUoTnnNI65CT3P4HulylLDeCrWaJqShxKdmRBeqjXmFDzVSkTCE_bcLo18JTAnlYHlPUAPMMIDHmPuN7LXbJ9fDGpMwqhU1Y0Cinlox3XtlL17vuUC9mwPkc0T6dt3zzgId3-c0BaO72ASJlzESnZLE5uCIZNNw_gXHsMZOGuUBe-k0dWGnLoaRdLMVP-12JLI7v0topnfPRC8uBQFDWhuaN6ltq0k0-Rbo8osXP8LiHMwnHUzMw8kDviWZDi8Hvlc-r6UKgpMqFJmufKZqYFfoZQoR2Nu1TTukwEBs0U2QWSTAtnkrQYbn8_0ShKPP0cvVuAn7oN-Sj7Nrwab1XoM7v4-2cKfk63CaOvq9CQ5OWwfL8IYs9ZQlMoswXDefzbLGPDkcsWZFYGb_7bkD0iAEIw |
| linkToPdf | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV1LS8NAEB6kguhBfGJ97kFPuphskjY5iEi1VqtVUKG3mH1ED5qqjUj9Z_47Z_JoVdCbx5DNEma_zCMz8w3ApkYrE6Fh5EoYi7uOCrgf25obYWwRo0dfl1m1RafWunFPu153DD7KXhgqqyx1YqaodU_RP3IM0mnkmnCd3bioirg8bO4_PXMaIEWJ1nKaRo6Qthm8YfTW3zs5xKPeEqJ5dN1o8WLAAFcI5ZQHgWs8yzL4TrEiWhhLBRphKV1PoiGLIivWGuMJN9Yq8iMropxd7NsqwnhUOsR5gNp_vE4k7tSk3jweVZd4fj5P13c4RqDdol8n79qziQXYou4hihD5-3ebOHJ0f-RmM5PXnIHpwldlBzm4ZmHMJHMw9YXBcB4uGnmpO2v0tGHnRXUiO0rUyyBTRuzg4Q5ll94_Mry4ijIC0NTwtMepoSTR7FuLygLc_IsIF6GS9BKzBCxw3LoUuLzm2660bSmV7xhPxYJY8oWpgl1KKVQFgTnN0XgIR9TLJNkQJRtmkg3fq7A9fOYpp-_4c_VKKfyw-JT74RB4Vdgpz2N09_fNlv_cbAMmEL_h2UmnvQKTgsCQ1cisQiV9eTVr6Omkcj3DFIPb_wbxJ81gDiY |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Control+Code+Multiple+Encryption+Algorithm+on+Satellite-to-ground+Communication&rft.jtitle=Mobile+networks+and+applications&rft.au=Liu%2C+Jinlong&rft.au=Yang%2C+Zhutian&rft.au=Wu%2C+Zhilu&rft.au=Yin%2C+Zhendong&rft.date=2019-12-01&rft.pub=Springer+US&rft.issn=1383-469X&rft.eissn=1572-8153&rft.volume=24&rft.issue=6&rft.spage=1955&rft.epage=1974&rft_id=info:doi/10.1007%2Fs11036-019-01338-z&rft.externalDocID=10_1007_s11036_019_01338_z |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1383-469X&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1383-469X&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1383-469X&client=summon |