Yu‐Guang Yang

ORCID: 0000-0002-4040-2448
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Information and Cryptography
  • Quantum Computing Algorithms and Architecture
  • Quantum Mechanics and Applications
  • Quantum optics and atomic interactions
  • Chaos-based Image/Signal Encryption
  • Quantum-Dot Cellular Automata
  • Advanced Steganography and Watermarking Techniques
  • Cryptography and Data Security
  • ZnO doping and properties
  • Gas Sensing Nanomaterials and Sensors
  • Advanced Image and Video Retrieval Techniques
  • Cloud Data Security Solutions
  • Neural Networks and Reservoir Computing
  • Privacy-Preserving Technologies in Data
  • Nanowire Synthesis and Applications
  • Quantum and electron transport phenomena
  • Cryptographic Implementations and Security
  • Cellular Automata and Applications
  • Mechanical and Optical Resonators
  • Sparse and Compressive Sensing Techniques
  • Diamond and Carbon-based Materials Research
  • Cloud Computing and Resource Management
  • Transition Metal Oxide Nanomaterials
  • Image Retrieval and Classification Techniques
  • Ga2O3 and related materials

Beijing University of Technology
2016-2025

Shandong University of Science and Technology
2024

Beijing Computing Center
2022

Chinese Academy of Sciences
2007-2020

Institute of Information Engineering
2014-2020

State Key Laboratory of Cryptology
2019-2020

Kunming Medical University
2020

Chinese Academy of Medical Sciences & Peking Union Medical College
2018

Institute of Biophysics
2017

Sun Yat-sen University
2005-2014

Following some ideas of the quantum secret sharing (QSS) protocol (2008, Phys. Lett. A 372, 1957), we propose an efficient private comparison (QPC) for comparing information equality with help a third party (TP). The can ensure fairness, efficiency and security. is fair, which means that one knows sound result if only other result. TP calculating. However, cannot learn any about players' respective inputs even collude player. secure two players, is, their will not leak except final...

10.1088/1751-8113/42/5/055305 article EN Journal of Physics A Mathematical and Theoretical 2009-01-06

Quantum computation has achieved a tremendous success during the last decades. In this paper, we investigate potential application of famous quantum model, i.e., walks (QW) in image encryption. It is found that QW can serve as an excellent key generator thanks to its inherent nonlinear chaotic dynamic behavior. Furthermore, construct novel QW-based encryption algorithm. Simulations and performance comparisons show proposal secure enough for outperforms prior works. also opens door towards...

10.1038/srep07784 article EN cc-by-nc-sa Scientific Reports 2015-01-14

Abstract Quantum information and quantum computation have achieved a huge success during the last years. In this paper, we investigate capability of Hash function, which can be constructed by subtly modifying walks, famous model. It is found that function act as hash for privacy amplification process key distribution systems with higher security. As byproduct, also used pseudo-random number generation due to its inherent chaotic dynamics. Further discuss application image encryption propose...

10.1038/srep19788 article EN cc-by Scientific Reports 2016-01-29

Abstract Oblivious transfer (OT) protocol is an essential building block for secure multiparty computation. The transmission of quantum messages conductive in executing complex computation tasks and even distributed tasks. However, as important form OT protocol, existing all‐or‐nothing protocols only work the classical thus limiting application scenarios. To tackle this issue, a counterfactual proposed messages. Compared with messages, has three advantages: i) it achieved without any...

10.1002/qute.202400454 article EN Advanced Quantum Technologies 2025-01-06

We propose a two-party quantum private comparison protocol using single photons, in which two distrustful parties can compare whether their secrets are equal with the help of third party (TP). Any information about values respective will not be leaked out even compromised TP. Security is also discussed.

10.1088/0031-8949/80/06/065002 article EN Physica Scripta 2009-11-18

Abstract Clinical and experimental evidence indicates that macrophages could promote solid-tumor progression metastasis. However, the mechanisms underlying this process remain unclear. Here we show yes-associated protein 1 (YAP1), a transcriptional regulator controls tissue growth regeneration, has an important role in tumor necrosis factor α (TNF α)-induced breast cancer migration. Mechanistically, macrophage conditioned medium (CM) or TNFα triggers IκB kinases (IKKs)-mediated YAP...

10.1038/oncsis.2017.83 article EN cc-by Oncogenesis 2017-09-25

Abstract An efficient cryptography scheme is proposed based on continuous-variable quantum neural network (CV-QNN), in which a specified CV-QNN model introduced for designing the algorithm. It indicates an approach to design cryptosystem contains processes of key generation, encryption and decryption. Security analysis demonstrates that our security. Several simulation experiments are performed Strawberry Fields platform processing classical data “Quantum Cryptography” with describe...

10.1038/s41598-020-58928-1 article EN cc-by Scientific Reports 2020-02-07

Quantum Anonymous Private Information Retrieval (QAPIR) allows a user to retrieve an item from database anonymously thus achieving better privacy. Recently, Khan <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">et al</i> . proposed the first QAPIR protocol [IEEE Trans. Commun. 70(6), 4026-4037 (2022)] which is only known protocol. However, symbol coincidence error occurs when main ingredients are combined form this Furthermore, it requires...

10.1109/tifs.2023.3288989 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

Quantum network coding is expected to enable multiple quantum data packets be fused before the transmission via bottleneck channel in order improve efficiency and total throughput of networks. Although several schemes have been constructed, they are unable meet practical application requirements due fact that lack a complete security solution. To tackle this issue, secure scheme constructed. Compared with existing methods, proposed more most importantly it can provide against both...

10.1109/tcad.2024.3382827 article EN IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems 2024-03-28

A quasi-secure quantum dialogue protocol using single photons was proposed. Different from the previous entanglement-based protocols, present uses batches of which run back and forth between two parties. round for each photon makes parties obtain a classical bit information. So efficiency information transmission can be increased. The scheme is practical well within present-day technology.

10.1007/s11433-007-0057-3 article EN Science in China. Series G, Physics, mechanics & astronomy/Science in China. Series G, Physics, Mechanics & Astronomy 2007-09-09

10.1007/s11433-010-3210-3 article EN Science China Physics Mechanics and Astronomy 2010-07-01

10.1007/s11128-014-0902-z article EN Quantum Information Processing 2014-12-22

Abstract In this paper, we investigate the potential application of quantum computation for constructing pseudo-random number generators (PRNGs) and further construct a novel PRNG based on random walks (QRWs), famous model. The merely relies equations used in QRWs thus generation algorithm is simple speed fast. proposed subjected to statistical tests such as NIST successfully passed test. Compared with representative chaotic maps (QCM), present QRWs-based has some advantages better...

10.1038/srep20362 article EN cc-by Scientific Reports 2016-02-04
Coming Soon ...