- Quantum Information and Cryptography
- Quantum Computing Algorithms and Architecture
- Quantum Mechanics and Applications
- Quantum optics and atomic interactions
- HER2/EGFR in Cancer Research
- Quantum-Dot Cellular Automata
- Advanced Fluorescence Microscopy Techniques
- Diamond and Carbon-based Materials Research
- Tea Polyphenols and Effects
- Advanced Optical Sensing Technologies
- Tannin, Tannase and Anticancer Activities
- Cancer Treatment and Pharmacology
- Quantum and electron transport phenomena
- Click Chemistry and Applications
- Force Microscopy Techniques and Applications
- Spine and Intervertebral Disc Pathology
- Photonic and Optical Devices
- Cryptographic Implementations and Security
- Breast Cancer Treatment Studies
- Random lasers and scattering media
- Hip disorders and treatments
- Hip and Femur Fractures
- Anesthesia and Pain Management
- Nanofluid Flow and Heat Transfer
- Cell Image Analysis Techniques
University of Science and Technology of China
2017-2025
Beijing Academy of Quantum Information Sciences
2023
State Key Laboratory of Cryptology
2021-2023
Shanghai Sixth People's Hospital
2022
Yunnan Agricultural University
2020-2022
Weifang Medical University
2022
Ningbo University
2019
Quantum key distribution (QKD) networks are promising to serve large numbers of users with information-theoretic secure communication. In QKD networks, the detection-safe protocol, termed measurement-device-independent (MDI) QKD, can naturally enhance realistic security by supporting untrusted measurement nodes. However, environmental disturbances quantum states degrade performance multi-user Here we propose an MDI-QKD networking scheme robustness against disturbance and adaptability access,...
Decoy-state measurement-device-independent quantum key distribution (MDI-QKD) is regarded as one of the most promising protocols since it physically immune to all fatal detection-side attacks. However, loopholes in source side still open channels eavesdroppers. Previous work has indicated that a system insecure if its decoy-state modulation inaccurate, but practical method for Eve exploit inaccurate absent. In this work, we propose hacking and provide detailed theoretical analysis. Using our...
The passive approach to quantum key distribution (QKD) consists of removing all active modulation from the users' devices, a highly desirable countermeasure get rid modulator side channels. Nevertheless, has not been completely removed in QKD systems so far, due both theoretical and practical limitations. In this Letter, we present fully time-bin encoding system report on successful implementation modulator-free link. According latest analysis, our prototype is capable delivering competitive...
A sending-or-not-sending (SNS) protocol is a very promising variant in twin-field quantum key distribution (TFQKD) for its advantages at the regime of long distance and robustness against large optical misalignment. The actively odd-parity pairing (AOPP) method can significantly enhance key-rate performance original SNS TFQKD, which forms AOPP TFQKD protocol. In this paper, we introduce advantage distillation (AD) to further improve communication TFQKD. We also prove composable security...
Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it physically immune to all attacks on the detection side. However, still keeps strict assumptions source side that four BB84-states must be perfectly prepared ensure security. Some protocols release part of in encoding system keep practical security, but performance would dramatically reduced. In this work, we present MDIQKD requires less knowledge combat troublesome modulation errors and...
Abstract Mode-pairing quantum key distribution (MP-QKD) is a potential protocol that not only immune to all possible detector side channel attacks, but also breaks the repeaterless rate-transmittance bound without needing global phase locking. Here we analyze finite-key effect for MP-QKD with rigorous security proof against general attacks. Moreover, propose six-state and its effect. The results show original can break typical finite number of pulses in practice. And our improve secret rate...
Intensity correlations between neighboring pulses open a prevalent yet often overlooked security loophole in decoy-state quantum key distribution (QKD). As solution, we present and experimentally demonstrate an intensity-correlation-tolerant QKD protocol that mitigates the negative effect this phenomenon has on secret rate according to existing analyses. Compared previous approaches, our method significantly enhances robustness against correlations, notably improving both maximum...
Measurement-device-independent quantum key distribution (MDIQKD) can resist all attacks on the detection devices, but there are still some security issues related to source side. One possible solution is use passive protocol eliminate side channels introduced by active modulators at source. Recently, a fully QKD was proposed that could simultaneously achieve encoding and decoy-state modulation using linear optics. In this work, we propose MDIQKD scheme protect system from both of measurement...
Scattering of light by cloud, haze, and fog decreases the transmission efficiency communication channels in quantum key distribution (QKD), reduces system's practical security, thus constrains deployment free-space QKD. Here, we employ wavefront shaping technology to compensate distorted optical signals high-loss scattering fulfill a polarization-encoded BB84 QKD experiment. With this channel compensation technology, achieve typical enhancement about 250 improve secure rate from 0...
Internal fixation with multiple cannulated compression screws is an optional treatment for femoral neck fracture. Recently, fully threaded (FTCCS) have been introduced to fix fresh fractures (FNF). The purpose of this study was investigate the effectiveness FTCCS.Patients FNF fixed by FTCCS from February 1st, 2014 August 31st, 2017 were included in study. They followed at least 12 months postoperatively. Nonunion, osteonecrosis head (ONFH), failure, reoperation, and shortening (FNS) used...
The decoy-state method for the quantum key distribution (QKD) is a great countermeasure against fatal photon number splitting attack. At present, has been widely employed in practical QKD systems. However, patterning effect, namely correlated intensity fluctuations systems, violates important assumption of and seriously threatens protocol security. previous works investigated effect between adjacent pulses proposed countermeasures from degree post selection modulators. In this work, we...
Integrating measurement-device-independent quantum key distribution (MDI QKD) with classical networks guarantees security and economy. Unfortunately, the performance of MDI QKD, suppressed though it is by network asymmetry, further degraded addition integration noise. As a consequence, symmetric systems are always believed to be better for higher rate. However, we reveal counterintuitive fact that asymmetric QKD has in integrated systems. Modeling mechanism effect analyzing noise-suppression...
Quantum key distribution (QKD) stands as a pioneering method for establishing information-theoretically secure communication channels by utilizing the principles of quantum mechanics. In security proof QKD, phase error rate serves critical indicator information leakage and directly influences shared bits between communicating parties, Alice Bob. estimating upper bound rate, randomization subsequent postselection mechanisms serve pivotal roles across numerous QKD protocols. However, nonzero...
Measurement device independent quantum key distribution (MDI QKD) has attracted growing attention for its immunity to attacks at the measurement unit, but unique structure limits secret rate. Utilizing wavelength division multiplexing (WDM) technique and reducing error rates are effective strategies enhancing Reducing often requires active feedback control of wavelengths using precise external references. However, a multiwavelength laser, employing multiple references stabilize each output...
In chip-based quantum key distribution (QKD) systems, the non-ideal state preparation due to imperfect electro-optic phase modulators (EOPM) decreases secret rate and introduces potential vulnerabilities. We propose implement an on-chip transmittance-invariant modulator (TIPM) solve this problem. Simulated experimental results show that TIPM can eliminate correlation between phase, intensity, polarization of states caused by phase-dependent loss. The design tolerate a significant fabrication...
There is no doubt that measurement-device-independent quantum key distribution (MDI-QKD) a crucial protocol immune to all possible detector side channel attacks. In the preparation phase, simulation model usually employed get set of optimized parameters, which utilized for getting higher secure rate in reality. With implementation high-speed QKD, afterpulse effect an intrinsic characteristic single-photon avalanche photodiode longer ignorable, this will lead great deviation compared with...
Multiphoton microscopy (MPM) has been widely used for three-dimensional biological imaging. Here, based on the photon-induced charge state conversion process, we demonstrated a low-power high-resolution MPM with nitrogen vacancy (NV) center in diamond. Continuous wave green and orange lasers were to pump detect two-photon conversion, respectively. The power of laser multiphoton excitation was 40 μW. Both axial lateral resolutions improved approximately 1.5 times compared confocal microscopy....
Objective To establish a management strategy for multi-segment lumbar lateral recess stenosis. Methods A retrospective study was performed in patients whom suspected responsible nerve roots underwent sequential selective root block (SNRB). Based on pain remission rate after blocking, the contribution of compression to symptoms classified as absolutely (≥70%) or relatively (30–70%) non-responsible (<30%). Conservative treatment continued if visual analogue scale (VAS) at 3 days blocking...
Decoy-state method has greatly filled in loopholes from multi-photon pulses the field of quantum key distribution (QKD) and it been employed almost all practical QKD systems recent years. However, security performance decoy-state QKDs are still limited by inaccurate modulations such as random intensity fluctuation correlated fluctuation. In this work, an tomography is proposed a countermeasure against these fluctuations. It ability to tightly bound unknown density matrices photon-number...
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI
Download This Paper Open PDF in Browser Add to My Library Share: Permalink Using these links will ensure access this page indefinitely Copy URL DOI
To date, a comprehensive understanding of the influence Prandtl number ( $Pr$ ) on flow topology in turbulent Rayleigh–Bénard convection (RBC) remains elusive. In this study, we present an experimental investigation into evolution quasi-two-dimensional RBC with $7.0 \leq Pr 244.2$ and $2.03\times 10^{8} Ra 2.81\times 10^{9}$ . Particle image velocimetry (PIV) measurements reveal transitions from multiple-roll state to single-roll increasing $Ra$ , transition is hindered i.e. transitional...