- Quantum Information and Cryptography
- Quantum Mechanics and Applications
- Quantum Computing Algorithms and Architecture
- Mobile Agent-Based Network Management
- Advanced Computational Techniques and Applications
- Wireless Communication Security Techniques
- Chemical Safety and Risk Management
- Antimicrobial Peptides and Activities
- Random lasers and scattering media
- Power Systems and Technologies
- Advanced Computing and Algorithms
- Chemical Synthesis and Analysis
- Optical Network Technologies
- Service-Oriented Architecture and Web Services
- Neural Networks and Reservoir Computing
- Satellite Communication Systems
- Wireless Communication Networks Research
- Quantum and electron transport phenomena
- Educational Robotics and Engineering
- Quantum optics and atomic interactions
- Physical Unclonable Functions (PUFs) and Hardware Security
- Semiconductor Lasers and Optical Devices
Peking University
2015-2019
University of York
2019
Beijing Academy of Quantum Information Sciences
2018
United States Postal Service
2013
The continuous-variable version of quantum key distribution (QKD) offers the advantages (over discrete-variable systems) higher secret rates in metropolitan areas as well use standard telecom components that can operate at room temperature. An important step real-world adoption QKD is deployment field tests over commercial fibers. Here we report two different a system through fiber networks Xi'an and Guangzhou distances 30.02 km (12.48 dB) 49.85 (11.62 dB), respectively. We achieve secure...
Measurement-device-independent quantum key distribution protocol, whose security analysis does not rely on any assumption the detection system, can immune attacking against detectors. We give a first composable for continuous-variable measurement-device-independent using squeezed states general coherent attacks. The is derived based entanglement-based scheme considering finite-size effect. A version of entropic uncertainty relation exploited to lower bound conditional smooth min-entropy by...
Measurement-device-independent quantum key distribution (MDI-QKD) is proposed to close the loopholes of detection part in QKD systems, while it still requires light source be trusted. This assumption not guaranteed practice, leading practical secure issues. In this paper, we propose a monitoring scheme with single-photon detectors for MDI-QKD, which can guarantee security system under untrusted condition both common decoy state method and newly five-intensity method. Moreover, our performs...
Photon number resolving monitoring is a practical light source scheme in QKD systems, which reduces the impacts from untrusted sources effectively. This requires single photon detector, normally working at low temperature to suppress its dark count rate. In this paper, we use room-temperature detector and show that rate irrelevant performance our scheme, can sufficiently relax requirements on detector's conditions as well integration complexity, would be highly demanded for systems....
We consider the noisy thermal amplifier channel, where signal modes are amplified together with environmental modes. focus on secret-key capacity of this which is maximum amount secret bits that two remote parties can generate by means most general adaptive protocol, assisted unlimited and two-way classical communication. For channel only upper lower bounds known, in work we improve bound. a protocol based squeezed states homodyne detections, both direct reverse reconciliation. In...
We propose a scheme of multi-channel quantum random generator based on superluminescent LED (SLED), which can use only one laser source to generate independent bit sequences parallelly. By using dense wavelength division multiplexing (DWDM) module with 100 GHz interval, we produced 10 streams in different channels, every stream's generating speed reaching 2.5 Gbps. All the pass DIEHARD randomness test and NIST-STS test, there is no apparent correlation between two streams. This satisfy...
We propose a light source monitoring scheme to solve the untrusted problem in measurement-device-independent quantum key distribution, and show it performs almost same as initial protocol with trusted source. © 2019 The Author(s)