Wei Huang

ORCID: 0000-0003-0586-090X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Information and Cryptography
  • Quantum Computing Algorithms and Architecture
  • Quantum Mechanics and Applications
  • Quantum optics and atomic interactions
  • Quantum-Dot Cellular Automata
  • Chaos-based Image/Signal Encryption
  • Silicon Carbide Semiconductor Technologies
  • Optical Network Technologies
  • Advanced Authentication Protocols Security
  • Photonic and Optical Devices
  • Cryptographic Implementations and Security
  • Silicon and Solar Cell Technologies
  • User Authentication and Security Systems
  • Error Correcting Code Techniques
  • Thin-Film Transistor Technologies
  • Semiconductor Lasers and Optical Devices
  • Spectroscopy and Laser Applications
  • Coastal and Marine Management
  • Cryptography and Data Security
  • Internet Traffic Analysis and Secure E-voting
  • Integrated Circuits and Semiconductor Failure Analysis
  • Water Quality Monitoring and Analysis
  • Advanced Photonic Communication Systems
  • Fractal and DNA sequence analysis
  • Advanced Measurement and Detection Methods

Southwestern Institute of Physics
2016-2025

Beijing University of Posts and Telecommunications
2010-2024

China Academy of Space Technology
2022-2024

Florida International University
2024

Chongqing University
2021-2024

Wuchang University of Technology
2023

Wuhan University
2023

Chinese Academy of Sciences
2012-2022

North China University of Water Resources and Electric Power
2010-2022

Xi'an Institute of Optics and Precision Mechanics
2022

10.1007/s11128-012-0492-6 article EN Quantum Information Processing 2012-10-04

10.1007/s11433-018-9324-6 article EN Science China Physics Mechanics and Astronomy 2019-01-18

Quantum private query (QPQ) is a kind of quantum protocols to protect both users' privacy in their communication. There an interesting example, that is, Alice wants buy one item from Bob's database, which composed quantity valuable messages. QPQ protocol the communication procedure ensuring can get only Bob, and at same time, Bob cannot know was taken by Alice. Owing its practicability, quantum-key-distribution-based has draw much attention recent years. However, post-processing key such...

10.1109/jstqe.2014.2358192 article EN IEEE Journal of Selected Topics in Quantum Electronics 2014-09-17

A high-speed Gaussian-modulated continuous-variable quantum key distribution (CVQKD) with a local oscillator (LLO) is experimentally demonstrated based on pilot-tone-assisted phase compensation. In the proposed scheme, frequency-multiplexing and polarization-multiplexing techniques are used for separate transmission heterodyne detection between signal pilot tone, guaranteeing no crosstalk from strong tone to weak different requirements of low-noise high-saturation limitation tone. Moreover,...

10.1364/oe.404611 article EN cc-by Optics Express 2020-10-11

Precise and secure time synchronization between two remote sites is necessary in many practical scenarios. Recently, the two-way fiber transfer (TWFTT) system has become an attractive option for high-precision synchronization. However, TWFTT implemented based on symmetric link assumption, such assumption may be maliciously utilized to cause significant asynchronization TWFTT. In this paper, we propose novel controllable asymmetry attack schemes TWFTT, namely, attenuation attack. We...

10.1109/jphot.2021.3121569 article EN cc-by IEEE photonics journal 2021-10-20

Abstract Continuous-variable quantum key distribution (CVQKD) has potential advantages of high secret rate, which is very suitable for high-speed metropolitan network application. However, the rates reported CVQKD systems are only a few Mbps over typical transmission distance so far. Here, we address fundamental experimental problems and demonstrate single-carrier four-state with sub-Gbps rate within area. In demonstrated using local oscillator, an ultra-low level excess noise obtained...

10.1038/s42005-022-00941-z article EN cc-by Communications Physics 2022-06-25

We experimentally demonstrated a sub-Mbps key rate Gaussian-modulated coherent-state (GMCS) continuous-variable quantum distribution (CV-QKD) over 100-km transmission distance. To efficiently control the excess noise, signal and pilot tone are co-transmitted in fiber channel based on wideband frequency polarization multiplexing methods. Furthermore, high-accuracy data-assisted time domain equalization algorithm is carefully designed to compensate phase noise variation low signal-to-noise...

10.1364/ol.485913 article EN Optics Letters 2023-02-28

Quantum Random Number Generators (QRNGs) have been theoretically proven to be able generate completely unpredictable random sequences, and important applications in many fields. However, the practical implementation of QRNG is always susceptible unwanted classical noise or device imperfections, which inevitably diminishes quality generated bits. It necessary perform post-processing extract true quantum randomness contained raw data by entropy source QRNG. In this work, a novel method for...

10.3390/e27010068 article EN cc-by Entropy 2025-01-14

10.1007/s11433-015-5714-3 article EN Science China Physics Mechanics and Astronomy 2015-09-04

We present two novel quantum secure direct communication (QSDC) protocols over different collective-noise channels. Different from the previous QSDC schemes channels, which are all source-encrypting protocols, our based on channel-encryption. In both schemes, authorized users first share a sequence of EPR pairs as their reusable key. Then they use key to encrypt and decrypt secret message carried by decoherence-free states channel. theory, intrinsic efficiencies high since there is no need...

10.1088/1674-1056/21/10/100308 article EN Chinese Physics B 2012-10-01

As a fundamental phenomenon in nature, randomness has wide range of applications the fields science and engineering. Among different types random number generators (RNG), quantum generator (QRNG) is kind promising RNG as it can provide provable true numbers based on inherent processes. Nevertheless, from QRNG be diminished (or even destroyed) if devices (especially entropy source devices) are not perfect or ill-characterized. To eliminate practical security loopholes source,...

10.1088/2058-9565/ab0fd9 article EN Quantum Science and Technology 2019-03-14

In this paper, a novel double-image compression-encryption algorithm is proposed by combining Rossler hyperchaos and compressive sensing. the scheme, sparse matrixes obtained performing two-dimensional discrete wavelet transform on two plain images are first scrambled compressed index confusion Next, linearly quantized, then variable step length Josephus bitwise exclusive-OR operation performed them. The final noise-like cipher image generated hiding half of encrypted into alpha channel...

10.1109/access.2021.3065453 article EN cc-by IEEE Access 2021-01-01

A model is presented for a possible mechanism of screw dislocation (including micropipe) nucleation in silicon carbide. The based on the observation micropipe at sites foreign material inclusions using synchrotron white beam x-ray topography and transmission optical microscopy. It shown that incorporation inclusion into growing crystal can lead to deformation protruding ledge which constitutes overgrowing layer. Accommodation this lattice leads production pairs opposite sign dislocations...

10.1063/1.124512 article EN Applied Physics Letters 1999-08-09

A set of powerful x-ray imaging techniques using white-beam synchrotron radiation have been developed and applied to clearly reveal map micropipes in SiC crystals at a “magnified” level. The experimental results the corresponding simulations demonstrate explicitly that are pure superscrew dislocations (SSDs). Moreover, these provide accurate descriptions detailed structure SSDs, including spatial distribution strain fields, magnitudes Burgers vectors, dislocation senses, surface relaxation effects.

10.1063/1.123069 article EN Applied Physics Letters 1999-01-18

Anonymous ranking is a kind of privacy-preserving whereby each the involved participants can correctly and anonymously get rankings his data. It be utilized to solve many practical problems, such as students' exam scores. We investigate issue how quantum mechanics use in maintaining anonymity multiparty present series anonymous multiparty, multidata protocols. In these protocols, participant correct data nobody else match identity Furthermore, security protocols with respect different kinds...

10.1103/physreva.89.032325 article EN Physical Review A 2014-03-14

Quantum image encryption is an emerging technology for efficiently protecting visual information. A quantum block scheme designed based on Arnold transform (QArT) and lately proposed sine chaotification model (SCM) in this paper. First, order to flexibly manipulate blocks, a representation (QBIR) proposed, which encodes pixel gray values position information of blocks into two entangled qubit sequences. Then, QArT applied scramble the positions blocks. The final ciphertext obtained by XOR...

10.1109/access.2019.2914184 article EN cc-by-nc-nd IEEE Access 2019-01-01

10.1016/j.physa.2023.129427 article EN Physica A Statistical Mechanics and its Applications 2023-12-05
Coming Soon ...