Please wait a minute...

Information and Communications Technology and Policy

Information and Communications Technology and Policy
Archive
[an error occurred while processing this directive]

Current Issue

    • Regional comparative study on quantum information industry development
    • LIU Ziwei
    • Information and Communications Technology and Policy. 2025, 51(7): 2-7. DOI:10.12267/j.issn.2096-5931.2025.07.001
    • Abstract ( 429 ) HTML( 164 )   
    • The breakthroughs in quantum information technology are reshaping the pattern of global scientific and technological competition, and its potential subversiveness has surpassed the scope of traditional technology, becoming the strategic focus of the competition of major powers. In recent years, the United States, the European Union, the United Kingdom, Japan and other major economies have incorporated quantum technology into their national strategies. They have seized the industry’s commanding heights through strategic deployment, transnational collaboration, government-enterprise alliances and commercialization. This paper aims to analyze the strategic design and industrial development of the above economies, and provide multi-dimensional insights for the development of China's quantum industry.

    • References | Related Articles | Metrics
    • Research on the application of CXL technology in quantum simulators
    • JIA Yu, ZHANG Zhihong, WANG Shanlong, JIN Xu, HUANG Zhiguo
    • Information and Communications Technology and Policy. 2025, 51(7): 16-23. DOI:10.12267/j.issn.2096-5931.2025.07.003
    • Abstract ( 374 ) HTML( 101 )   
    • With the rapid development of quantum computing technology, quantum computing simulators in the Noisy Intermediate-Scale Quantum(NISQ) era have played a key role in promoting research on quantum algorithms. However, when processing large-scale quantum systems, quantum computing simulators face significant challenges in memory and computational resources. To break through this bottleneck, this study introduces Compute Express Link(CXL) technology to expand the scale of qubit count supported by quantum computing simulators. Through in-depth analysis of key technologies in quantum computing simulators and leveraging the advantages of CXL memory pooling technology, this study designs and implements a CXL memory-pool quantum computing simulator. The experimental results show that the quantum computing simulator based on CXL memory pool can effectively improve the bit scale of quantum simulation computing.

    • Figures/Tables | References | Related Articles | Metrics
    • Application of coherent Ising machine in basic research of life science and drug discovery
    • CHEN Shaobo, LIU Yunfei, GAO Qi, MA Yin, WEN Kai
    • Information and Communications Technology and Policy. 2025, 51(7): 24-32. DOI:10.12267/j.issn.2096-5931.2025.07.004
    • Abstract ( 496 ) HTML( 193 )   
    • In basic life science research and drug discovery, there are a large number of complex computational needs, often facing high-frequency large-scale combinatorial optimization problem solutions and complex distribution sampling. Methods based on classical computational frameworks are difficult to weigh the time and accuracy in these problems, and the computational results are often “a tiny bit out of whack”. Lower quality of the solution and sampling bias ultimately lead to conformational bias and high screening false positives, resulting in high time and cost of drug discovery. Therefore, there is an urgent need for a computational framework that combines screening efficiency and accuracy to get out of this predicament. With the development of physical hardware, a variety of new quantum computational frameworks have been widely validated on different complex computational problems, Among them, the coherent Ising machine (CIM) is one of the fastest developing technical routes. By using the optical parametric oscillatory pulses as the quantum bits, it can search out the spin configuration in the Ising model ground state during operation, and enhance the computational speed and correctness of the problem of solving combinatorial optimization. It has huge advantages over other existing technical routes in terms of bit fully connected characteristics, bit number scale, and long-time continuous solution stability. This paper mainly discusses the underlying principles, technical advantages, main applications in basic life science research and drug discovery of CIM, as well as the limitations of CIM’s current practical applications, and looks forward to the future development.

    • Figures/Tables | References | Related Articles | Metrics
    • Quantum secure communication technology and application for new power system
    • FENG Bao, ZHAO Ziyan, BIAN Yuxiang, LYU Chao, WANG Kaichuang
    • Information and Communications Technology and Policy. 2025, 51(7): 33-42. DOI:10.12267/j.issn.2096-5931.2025.07.005
    • Abstract ( 437 ) HTML( 237 )   
    • With the construction of the new power system, there are extensive interaction between source, grid, load, and storage, frequent interaction of various business data, and the integration of multiple communication methods into a network. The power system will face more network attacks, and the transmission of business data will face greater security risks. The quantum secure communication technology based on quantum mechanics principles, combined with Shannon’s one-time-pad theory, can achieve unconditional security in information theory, providing a feasible solution for improving communication security in power systems. This paper first analyzes the communication security improvement requirements for each link of “acquisition-transmission-storage-use” in the new power system. Then, it summarizes the technical principles, application situation, and domestic and foreign technological progress of quantum key distribution, quantum random numbers, and post quantum cryptography. Finally, it proposes follow-up technical research and application suggestions, aiming to improve the end-to-end security of power grid business data interaction, and help the power system to build information and communication infrastructure with anti-quantum computing capabilities.

    • Figures/Tables | References | Related Articles | Metrics
    • Advances in the global quantum secure communication networks
    • ZHANG Jianxiao, LUO Qiming, WU Chang
    • Information and Communications Technology and Policy. 2025, 51(7): 43-53. DOI:10.12267/j.issn.2096-5931.2025.07.006
    • Abstract ( 583 ) HTML( 248 )   
    • The quantum technology is rapidly developing, with applications nearing maturity and global competition intensifying. It has now reached a pivotal stage of accelerated progress and industrial expansion. Quantum communication networks are infrastructure based on quantum key distribution technology, which can address the information security threats posed by quantum computing. By comparing the strategies and advancements of major economies, including terrestrial quantum networks and quantum satellites, this paper provides recommendations for enhancing capabilities of quantum communication networks.

    • Figures/Tables | References | Related Articles | Metrics
    • Research on the evolution and deployment scheme of quantum encrypted OTN technology
    • SHEN Wenhui, GUAN Tangbing, YANG Nan
    • Information and Communications Technology and Policy. 2025, 51(7): 54-61. DOI:10.12267/j.issn.2096-5931.2025.07.007
    • Abstract ( 440 ) HTML( 147 )   
    • Relying on the Quantum Key Distribution (QKD) network to distribute the keys generated by quantum devices over the network, it ensures the absolute security of key distribution between two locations, providves encryption/decryption keys for optical transport network (OTN) users, and realizes the security and reliability of OTN data transmission. Based on the OTN network and starting from the empowerment of OTN by quantum encryption, this paper describes the architecture, device deployment, scheme design, and implementation process of the OTN and QKD converged network. For the target application customers of the OTN quantum encryption network, this paper proposes a deployment scheme corresponding to the quantum metropolitan area network that matches the OTN network application.

    • Figures/Tables | References | Related Articles | Metrics
    • Research on applications of quantum secure communication and post-quantum cryptography in 5G external government networks
    • WEI Baolin, MI Pengwei, HANG Tao, ZOU Xiao, ZHU Yanping
    • Information and Communications Technology and Policy. 2025, 51(7): 62-69. DOI:10.12267/j.issn.2096-5931.2025.07.008
    • Abstract ( 563 ) HTML( 303 )   
    • In the construction of the external government networks, while the integration of 5G dedicated networks facilitates mobile government operations, it also introduces numerous security challenges. Risks such as unauthorized access, threats to network and device environments, plaintext transmission vulnerabilities, and cross-network attacks significantly hinder the secure and stable operation of government systems. To address these concerns, the 5G dedicated network access solution for the external government networks innovatively incorporates “dual authentication + quantum key” fusion technology, establishing a secure, reliable, efficient, and flexible access framework. This framework not only aligns precisely with the current security demands of government mobile operations, but also accommodates future technological advancements through scalable design. The solution has demonstrated exceptional performance in enhancing security protection, controlling costs, and improving operational efficiency, offering a replicable and scalable secure access solution for data infrastructure development. Furthermore, it plays a demonstration role in promoting innovation in government network security technology and advancing industry standardization.

    • Figures/Tables | References | Related Articles | Metrics
    • Industrialization of quantum sensing: technology breakthroughs and integration of multi-field application scenarios
    • CAI Mingcheng, ZHAO Long, SUN Feng, XU Kebiao
    • Information and Communications Technology and Policy. 2025, 51(7): 70-77. DOI:10.12267/j.issn.2096-5931.2025.07.009
    • Abstract ( 504 ) HTML( 868 )   
    • Quantum sensing technology, as one of the three pillars of quantum information technology, utilizes effects such as quantum superposition and entanglement to achieve ultra-high precision measurement of physical quantities like time and frequency, electromagnetic fields, and gravity. The major economies around the world have accelerated their layout through policy support and capital investment, focusing on core technology research and development and industrial ecosystem construction. Currently, quantum sensing has achieved industrialization breakthroughs in multiple fields such as time-frequency measurement, power grids, new energy, biomedicine, metrology, and deep earth exploration, and is expected to become the direction of quantum technology that achieves large-scale application relatively quickly.

    • References | Related Articles | Metrics
    • Research on key issues of post-quantum cryptography upgrade and migration
    • ZHANG Meng, SHI Haichao, WANG Jing, LAI Junsen
    • Information and Communications Technology and Policy. 2025, 51(7): 78-85. DOI:10.12267/j.issn.2096-5931.2025.07.010
    • Abstract ( 412 ) HTML( 387 )   
    • As the quantum computing technology advances rapidly, the traditional communication network encryption system faces unprecedented challenges. The immense power of quantum computers can easily break widely-used public-key encryption algorithms based on large integer factorization and discrete logarithm problems. To counter this threat, the post-quantum cryptography (PQC) technology has emerged. This article firstly explores strategies and key technologies for introducing PQC into communication networks. It analyzes the architecture and potential vulnerabilities of current security systems in these networks and proposes a phased PQC implementation strategy, including hybrid encryption during the transition. Then, it studies the fusion of PQC algorithms with communication protocols, and explores PQC application scenarios in communication networks. Finally, it offers suggestions for PQC development. This provides theoretical and practical guidance for applying PQC in real-world communication networks.

    • Figures/Tables | References | Related Articles | Metrics
    • Research on post-quantum cryptography SIM chips
    • JIANG Kun, LI Zengju, LIU Meijuan, DAI Junfeng, LIU Yong, XIAO Qing
    • Information and Communications Technology and Policy. 2025, 51(7): 86-91. DOI:10.12267/j.issn.2096-5931.2025.07.011
    • Abstract ( 386 ) HTML( 135 )   
    • Post-quantum cryptography faces two challenges in resource-constrained Subscriber Identity Module (SIM): insufficient computing power/storage for high-complexity operations, and possible key leakage caused by side-channel and fault-injection attacks. This paper proposes a lightweight security architecture, designing an anti-side-channel accelerator with dynamic masking and constant-time number theoretic transform modules, plus a dual-protection mechanism of redundant computing and optical sensor shielding. Secure chip simulations show that the countermeasure can resist first-order side channel analysis and resist against fault injection attack, meeting global system for mobile communications association standards and enabling 5G/6G quantum-secure communication.

    • Figures/Tables | References | Related Articles | Metrics
    • The latest advances and outlooks of post-quantum cryptography
    • ZHANG Feng, ZHUANG Yan, YU Le, SUN Shuo, CUI Handong, MA Yusheng
    • Information and Communications Technology and Policy. 2025, 51(7): 92-96. DOI:10.12267/j.issn.2096-5931.2025.07.012
    • Abstract ( 703 ) HTML( 739 )   
    • With the continuous breakthroughs of quantum computing technology, the security of traditional cryptographic algorithms is facing severe challenges. As a result, post-quantum cryptographic algorithms have emerged as a strategic cornerstone for securing information in the future. In recent years, China has also made some progress in the R&D and the migration plan of post-quantum cryptographic technology, providing a solid guarantee for the information security in the digital economy era. This paper reviews the research on post-quantum cryptographic standards and technologies at home and abroad, and analyzes the technological and application explorations of the migration to post-quantum cryptography in key industries and enterprises.

    • Figures/Tables | References | Related Articles | Metrics