-
Designing zonal-based flexible bus services under stochastic demand
Authors:
Enoch Lee,
Xuekai Cen,
Hong K. Lo,
Ka Fai Ng
Abstract:
In this paper, we develop a zonal-based flexible bus services (ZBFBS) by considering both passenger demands spatial (origin-destination or OD) and volume stochastic variations. Service requests are grouped by zonal OD pairs and number of passengers per request, and aggregated into demand categories which follow certain probability distributions. A two-stage stochastic program is formulated to mini…
▽ More
In this paper, we develop a zonal-based flexible bus services (ZBFBS) by considering both passenger demands spatial (origin-destination or OD) and volume stochastic variations. Service requests are grouped by zonal OD pairs and number of passengers per request, and aggregated into demand categories which follow certain probability distributions. A two-stage stochastic program is formulated to minimize the expected operating cost of ZBFBS, in which the zonal visit sequences of vehicles are determined in Stage-1, whereas in Stage-2, service requests are assigned to either regular routes determined in Stage-1 or ad hoc services that incur additional costs. Demand volume reliability and detour time reliability are introduced to ensure quality of the services and separate the problem into two phases for efficient solutions. In phase-1, given the reliability requirements, we minimize the cost of operating the regular services. In phase-2, we optimize the passenger assignment to vehicles to minimize the expected ad hoc service cost. The reliabilities are then optimized by a gradient-based approach to minimize the sum of the regular service operating cost and expected ad hoc service cost. We conduct numerical studies on vehicle capacity, detour time limit and demand volume to demonstrate the potential of ZBFBS, and apply the model to Chengdu, China, based on real data to illustrate its applicability.
△ Less
Submitted 31 October, 2021; v1 submitted 24 February, 2021;
originally announced February 2021.
-
Toward A Reconfigurable Quantum Network Enabled by a Broadband Entangled Source
Authors:
E. Y. Zhu,
C. Corbari,
A. V. Gladyshev,
P. G. Kazansky,
H. K. Lo,
L. Qian
Abstract:
We present a proof-of-principle experimental demonstration of a reconfigurable entanglement distribution scheme utilizing a poled fiber-based source of broadband polarization-entangled photon pairs and dense wavelength-division multiplexing. A large bandwidth (> 90 nm, centered at 1555 nm) and highly spectrally correlated nature of the entangled source can be exploited to allow for the generation…
▽ More
We present a proof-of-principle experimental demonstration of a reconfigurable entanglement distribution scheme utilizing a poled fiber-based source of broadband polarization-entangled photon pairs and dense wavelength-division multiplexing. A large bandwidth (> 90 nm, centered at 1555 nm) and highly spectrally correlated nature of the entangled source can be exploited to allow for the generation of more than 25 frequency-conjugate entangled pairs when aligned to the standard 200 GHz ITU grid. In this work, three frequency-conjugate entangled pairs are used to demonstrate quantum key distribution, with the wavelength-selective switching done manually. The entangled pairs are delivered over 40 km of actual fiber, and an estimated secure key rate of up to 20 bits/s per bi-party is obtained.
△ Less
Submitted 16 January, 2019; v1 submitted 12 June, 2015;
originally announced June 2015.
-
Insecurity of position-based quantum cryptography protocols against entanglement attacks
Authors:
Hoi Kwan Lau,
Hoi Kwong Lo
Abstract:
Recently, position-based quantum cryptography has been claimed to be unconditionally secure. In contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the…
▽ More
Recently, position-based quantum cryptography has been claimed to be unconditionally secure. In contrary, here we show that the existing proposals for position-based quantum cryptography are, in fact, insecure if entanglement is shared among two adversaries. Specifically, we demonstrate how the adversaries can incorporate ideas of quantum teleportation and quantum secret sharing to compromise the security with certainty. The common flaw to all current protocols is that the Pauli operators always map a codeword to a codeword (up to an irrelevant overall phase). We propose a modified scheme lacking this property in which the same cheating strategy used to undermine the previous protocols can succeed with a rate at most 85%. We conjecture that the modified protocol is unconditionally secure and prove this to be true when the shared quantum resource between the adversaries is a two- or three- level system.
△ Less
Submitted 21 September, 2010; v1 submitted 12 September, 2010;
originally announced September 2010.