- Quantum Computing Algorithms and Architecture
- Quantum Information and Cryptography
- Quantum Mechanics and Applications
- Quantum optics and atomic interactions
Beijing University of Technology
2023-2024
Shandong University of Science and Technology
2021-2022
Quantum Anonymous Private Information Retrieval (QAPIR) allows a user to retrieve an item from database anonymously thus achieving better privacy. Recently, Khan <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">et al</i> . proposed the first QAPIR protocol [IEEE Trans. Commun. 70(6), 4026-4037 (2022)] which is only known protocol. However, symbol coincidence error occurs when main ingredients are combined form this Furthermore, it requires...
Quantum network coding is expected to enable multiple quantum data packets be fused before the transmission via bottleneck channel in order improve efficiency and total throughput of networks. Although several schemes have been constructed, they are unable meet practical application requirements due fact that lack a complete security solution. To tackle this issue, secure scheme constructed. Compared with existing methods, proposed more most importantly it can provide against both...
Abstract Quantum network coding (QNC) aims at alleviating quantum communication congestion in networks. Although several QNC protocols have been presented, they cannot meet the practical requirements that part of source nodes intend to transmit their states with same or different qubit numbers via bottleneck simultaneously. Here, study presents a flexible protocol by using multiplexing. First, entangled pairs are generated between adjacent heralded way Then memories and ones corresponding...
Quantum key agreement (QKA) is an important quantum cryptography primitive. In a QKA protocol, two or more untrusted parties can agree on identical in such way that they equally influence the and no subset decide it alone. However, practical QKA, imperfections of participant’s detectors be exploited to compromise security fairness QKA. To remove all detector-side-channel loopholes, measurement-device-independent multi-party protocol proposed. The exploits post-selected GHZ states generate...
<title>Abstract</title> Considering the influence of collective-dephasing (C-D) noise and collective-rotation (C-R) noise, by utilizing controlled-NOT operation, controlled-Z operation other unitary operations, we proposed fault-tolerant quantum protocols to realize anonymous communication against C-D C-R respectively. Correctness analysis shows that encrypted states can not be affected collective noise. Security ensure anonymity sender receiver privacy information.