Please wait a minute...

Information and Communications Technology and Policy

Information and Communications Technology and Policy
[an error occurred while processing this directive]

Current Issue

    • Progress in quantum secure direct communication
    • LONG Guilu, PAN Dong,
    • Information and Communications Technology and Policy. 2021, 47(7): 1-7. DOI:10.12267/j.issn.2096-5931.2021.07.001
    • Abstract ( 477 )   
    • Quantum secure direct communication (QSDC) is a quantum secure communication technology that can directly transmit confidential information over a quantum channel. It is different from the classical communication that  achieves reliable communication under noisy channels. It can achieve reliable and secure communication under both noisy and eavesdropping channels. Through explaining the principle of quantum direct communication, the main
      development stages in the past 20 years, and the technical difficulties that have been broken through in the process from theory to practicality, the future development and application prospects of quantum direct communication are analyzed and prospected.
    • References | Related Articles | Metrics
    • The development of study on postprocessing of continuous-variable quantum key distribution
    • YANG Shenshen, LU Qing, LU Zhenguo, LI Yongmin
    • Information and Communications Technology and Policy. 2021, 47(7): 8-16. DOI:10.12267/j.issn.2096-5931.2021.07.002
    • Abstract ( 452 )   
    • Continuous-variable quantum key distribution ( CV-QKD) can share information-theoretical secure keys between two parties over an insecure quantum channel. It has wide range of application prospects in the field of information security. The data post-processing unit is an indispensable part of the CV-QKD system. This article first explains the important role of the two sub-processes ( data reconciliation and privacy amplification ) of the postprocessing and its impact on the system; then it introduces the basic principles, main schemes, and related research progress of the two sub-processes, respectively. Finally, the future technical development route of the data postprocessing is discussed.
    • Related Articles | Metrics
    • Quantum information network concept and prospect analysis
    • LAI Junsen, ZHAO Wenyu, ZHANG Haiyi
    • Information and Communications Technology and Policy. 2021, 47(7): 17-22. DOI:10.12267/j.issn.2096-5931.2021.07.003
    • Abstract ( 431 )   
    • In recent years, quantum information technology, represented by quantum computing, quantum communication and quantum measurement, has developed rapidly and become the focus of ICT industry. Through the analysis and discussion of the basic concepts of quantum information network, research project layout, scientific research exploration progress, future development prospects and other issues, it is known that quantum information network can realize quantum information processing systems and nodes such as quantum computers and quantum sensors through the transmission of quantum state information. The interconnection and networking is one of the important directions for the development and integration of quantum information technology in the future.
    • References | Related Articles | Metrics
    • Progress of photonics integrated circuits development for quantum key distribution
    • QIAN Yi, HU Xiao, WANG Lei, XIAO Xi
    • Information and Communications Technology and Policy. 2021, 47(7): 32-38. DOI:10.12267/j.issn.2096-5931.2021.07.005
    • Abstract ( 561 )   
    • The rapid progress of photonic integrated circuit technology has promoted the commercial use of quantum key distribution equipment. It is necessary to study a practical development route for the photonic chip of quantum key distribution. This paper analyzes the academic and industrial research progress of integrated photonic chips for quantum key distribution, focusing on the related research progress on silicon-based optoelectronic platforms and III-V-based optoelectronic platforms. This article also gives a view on the product form after quantum key distribution empowered by the integrated photonic chip.
    • References | Related Articles | Metrics
    • Research on patent layout and development trend of quantum communication technology
    • LIU Dan, HE Li
    • Information and Communications Technology and Policy. 2021, 47(7): 46-52. DOI:10.12267/j.issn.2096-5931.2021.07.007
    • Abstract ( 419 )   
    • Using the DWPI database as the information source, the statistics of the number of patent applications and PCT applications in the field of quantum communication in various countries are given, the annual growth trend of global quantum communication technology patent applications and the distribution of IPC classification numbers are given, and the global distribution of the main applicants for quantum communication technology patents within the scope and the tracking of their key patent applications are tracked. Based on the development status of quantum communication technology patent, the technological evolution trend in the field of quantum communication is discussed and suggestions for patent application and protection are also proposed.
    • References | Related Articles | Metrics
    • Privacy preserving computing: the construction of synchronization rules for data flow and data security
    • ZHAO Jingwu, ZHOU Ruijue
    • Information and Communications Technology and Policy. 2021, 47(7): 53. DOI:10.12267/j.issn.2096-5931.2021.07.008
    • Abstract ( 577 )   
    • Under the policy guidance of promoting the market-oriented configuration of data production factors, privacy preserving computing has effectively met the dual needs of data security and effective use of data in the process of national modern governance by virtue of technical advantages such as remote processing of raw data and quantification of privacy protection levels. At this stage when the technology is not yet mature, how to provide an institutional environment for the reasonable development of the technology has become an urgent legal issue to be resolved. After clarifying the legal attributes of the technology to promote the transformation of data security guarantee obligations and the legal relationship of “service user-service provider-data provider”, it is not difficult to find that the regulatory positioning of this technology should be an aggregation of technical standards and legal rules. This technology is embedded in the current data security legislation system as part of the data collaboration mechanism, classified supervision of technology models, and re-identification of risk prevention.
    • References | Related Articles | Metrics
    • Research on opening public data policy based on text content analysis
    • YANG Jing, ZHAO Yang, ZHANG Chaofeng
    • Information and Communications Technology and Policy. 2021, 47(7): 59. DOI:10.12267/j.issn.2096-5931.2021.07.009
    • Abstract ( 295 )   
    • Since data was officially regarded as a production factor, the issue of opening public data has been becoming more and more important. This paper acquires policy texts of opening public data in multiple places by means of Python programming, then analyzes their publishing time, quantity and geographical distribution characteristics, and uses word frequency statistics and text similarity calculation, to study the overall situation and existing problems so as to provide suggestions and reference for the formulation of relevant policy texts. Firstly, it investigates the definition of public data and builds the expression framework; secondly, it discusses whether public data should be opening to everyone; thirdly, it expands the tool dimensions of government security policy for the subsequent security issue, and explores the
      evolution trend.
    • References | Related Articles | Metrics
    • The legal boundaries of targeting advertising applications for privacy preserving computing
    • LIANG Deng
    • Information and Communications Technology and Policy. 2021, 47(7): 66-75. DOI:10.12267/j.issn.2096-5931.2021.07.010
    • Abstract ( 300 )   
    • Target user visibility is the basis of targeting advertising operation. The user profiles used and formed in the process of finding and tracking target users are not all identifiable data, and depicting user profiles with privacy computing technology is a process of labeling rather than identification. Tagged user profiles firstly require the data to be stealthed. In addition, the depiction of user profiles is not completed by one party subject using local data, and the formation of profiles is the result of multi-party data collaborative processing. There are two kinds of technologies for multi-party collaborative processing based on privacy computing: one is centralized computing mode, and the other is distributed computing mode. Different types and risk levels of personal information processed by different privacy computing technologies have different legitimacy conditions in different scenarios. The task of law is to establish corresponding standards.
    • References | Related Articles | Metrics
    • Analysis and research on MEC industry development
    • XU Muhong, ZHANG Rui
    • Information and Communications Technology and Policy. 2021, 47(7): 76-81. DOI:10.12267/j.issn.2096-5931.2021.07.011
    • Abstract ( 301 )   
    • The MEC technology is under rapid growth due to the promotion of national policy and 5G commercial process. All parties in the industry chain are actively exploring the solutions of 5G + MEC in the vertical industry, and new business forms and operation modes are constantly emerging. This paper aims to investigate the research and progress of MEC by operators, cloud companies, equipment providers and standard organizations. The selected key issues in the deployment of MEC have also been analyzed and discussed.

    • References | Related Articles | Metrics
    • A survey of threshold homomorphic encryption application in privacy preserving computing
    • CHAI Di
    • Information and Communications Technology and Policy. 2021, 47(7): 82-86. DOI:10.12267/j.issn.2096-5931.2021.07.012
    • Abstract ( 533 )   
    • As a solution of secure data cooperation between multi-parties, privacy preserving computing is attracting much attention in recent years. Homomorphic Encryption (HE) is one of the most important technologies in privacy preserving computing. However, most HE algorithms only have one pair of secret key and public key, and the computations between ciphertexts encrypted by different public keys are not supported. Such only-one-secret-key character brings lots of trouble to the HE application in privacy preserving computation. Recently, a threshold HE solution attracts much attention, and it supports more than one secret key. This paper introduces the threshold HE method, then show its application in privacy preserving computation.
    • References | Related Articles | Metrics