Zobrazeno 1 - 10
of 162
pro vyhledávání: '"Fen, Zhuo"'
The violation of a Bell inequality implies the existence of nonlocality, making device-independent randomness certification possible. This paper derives a tight upper bound for the maximal quantum violation of Gisin's elegant Bell inequality (EBI) fo
Externí odkaz:
http://arxiv.org/abs/2412.06345
Most quantum information tasks based on Bell tests relie on the assumption of measurement independence. However, it is difficult to ensure that the assumption of measurement independence is always met in experimental operations, so it is crucial to e
Externí odkaz:
http://arxiv.org/abs/2103.02819
Autor:
Liu, Li, Wang, Yukun, Lavie, Emilien, Ricou, Arno, Wang, Chao, Guo, Fen Zhuo, Lim, Charles Ci Wen
Publikováno v:
Phys. Rev. Applied 12, 024048 (2019)
Quantum key distribution (QKD) based on coherent states is well known for its implementation simplicity, but it suffers from loss-dependent attacks based on optimal unambiguous state discrimination. Crucially, previous research has suggested that coh
Externí odkaz:
http://arxiv.org/abs/1905.02144
Autor:
Shi, Su-Tong, Guo, Fen-Zhuo
In this paper, we consider the decoy-state Measurement-Device-Independent Quantum key distribution (MDI-QKD) with four intensities. The average value of successful events and bit errors among the pulse pair set be used to investigate the successful e
Externí odkaz:
http://arxiv.org/abs/1610.04311
In this paper, we present a semi-loss-tolerant strong quantum coin-flipping (QCF) protocol with the best bias of 0.3536. Our manuscript applies Quantum non-demolition (QND) measurement to quantum coin-flipping protocol. Furthermore, a single photon a
Externí odkaz:
http://arxiv.org/abs/1212.3965
In this paper, we present a quantum strong coin flipping protocol. In this protocol, an EPR pair and a quantum memory storage are made use of, and losses in the quantum communication channel and quantum memory storage are all analyzed. We obtain the
Externí odkaz:
http://arxiv.org/abs/1107.1455
Publikováno v:
Physical Review A 84, 022344 (2011)
As a new model for signing quantum message, arbitrated quantum signature (AQS) has recently received a lot of attention. In this paper we study the cryptanalysis of previous AQS protocols from the aspects of forgery and disavowal. We show that in the
Externí odkaz:
http://arxiv.org/abs/1106.4398
Publikováno v:
IEEE Journal of Quantum Electronics, vol.47, no.5, pp.630-635, 2011
Cryptanalysis is an important branch in the study of cryptography, including both the classical cryptography and the quantum one. In this paper we analyze the security of two three-party quantum key distribution protocols (QKDPs) proposed recently, a
Externí odkaz:
http://arxiv.org/abs/1009.2545
Publikováno v:
Science in China Series G: Physics, Mechanics & Astronomy, Vol.51, No.5, pp.559-566, 2008
From the perspective of information theory and cryptography, we analyze the security of two quantum dialogue protocols and a bidirectional quantum secure direct communication (QSDC) protocol, and point out that the transmitted information would be pa
Externí odkaz:
http://arxiv.org/abs/0801.2420
Publikováno v:
Physical Review A 77, 014302, 2008
In a recent Letter [G. Chiribella et al., Phys. Rev. Lett. 98, 120501 (2007)], four protocols were proposed to secretly transmit a reference frame. Here We point out that in these protocols an eavesdropper can change the transmitted reference frame w
Externí odkaz:
http://arxiv.org/abs/0801.2301