The Experts below are selected from a list of 326718 Experts worldwide ranked by ideXlab platform
Xiang-bin Wang - One of the best experts on this subject based on the ideXlab platform.
-
making the decoy State Measurement device independent quantum key distribution practically useful
Physical Review A, 2016Co-Authors: Xiang-bin Wang, Yiheng ZhouAbstract:The relatively low key rate seems to be the major barrier to its practical use for the decoy-State Measurement-device-independent quantum key distribution (MDI-QKD). We present a four-intensity protocol for the decoy-State MDI-QKD that hugely raises the key rate, especially in the case in which the total data size is not large. Also, calculations show that our method makes it possible for secure private communication with fresh keys generated from MDI-QKD with a delay time of only a few seconds.
-
making the decoy State Measurement device independent quantum key distribution practically useful
Physical Review A, 2016Co-Authors: Yiheng Zhou, Zongwen Yu, Xiang-bin WangAbstract:The relatively low key rate seems to be the major barrier to its practical use for the decoy State Measurement device independent quantum key distribution (MDIQKD). We present a 4-intensity protocol for the decoy-State MDIQKD that hugely raises the key rate, especially in the case the total data size is not large. Also, calculation shows that our method makes it possible for secure private communication with {\em fresh} keys generated from MDIQKD with a delay time of only a few seconds.
-
The decoy-State Measurement-device-independent quantum key distribution with heralded single-photon sources
Research in Optical Sciences, 2014Co-Authors: Qin Wang, Xiang-bin WangAbstract:We study the decoy-State Measurement-device-independent quantum key distribution using heralded single-photon sources, and demonstrate that our new scheme of using heralded single-photon sources can give a better performance comparing with various schemes.
-
efficient implementation of the decoy State Measurement device independent quantum key distribution with heralded single photon sources
Physical Review A, 2013Co-Authors: Qin Wang, Xiang-bin WangAbstract:We study the decoy-State Measurement-device-independent quantum key distribution using heralded single-photon sources. This has the advantage that the observed error rate in X basis is in higher order and not so large. We calculate the key rate and transmission distance for two cases: one using only triggered events, and the other using both triggered and non-triggered events. We compare the key rates of various protocols and find that our new scheme using triggered and non-triggered events can give higher key rate and longer secure distance. Moreover, we also show the different behavior of our scheme when using different heralded single-photon sources, i.e., in poisson or thermal distribution. We demonstrate that the former can generate a relatively higher secure key rate than the latter, and can thus work more efficiently in practical quantum key distributions.
Guang-can Guo - One of the best experts on this subject based on the ideXlab platform.
-
Arbitrary two-particle high-dimensional Bell-State Measurement by auxiliary entanglement
Physical Review A, 2019Co-Authors: Hao Zhang, Chao Zhang, Bi-heng Liu, Yun-feng Huang, Guang-can GuoAbstract:Bell State Measurement (BSM) plays a vital role in quantum information. There are many researches on BSM of qubit Bell State, however, there is no definite solution of how to realize high-dimensional Bell State Measurement (HDBSM). In this paper, We present a scheme for realizing arbitrary high-dimensional two-particle Bell State Measurement by auxiliary entanglement. In our scheme, the maximal entangled States with different degrees of freedom (DOF) are used as auxiliary States, and then the HDBSM can be achieved by implementing Bell Measurement with different degrees of freedom. We present the detailed HDBSM scheme for three and four-dimensional Bell State, and the general formula for arbitrary high-dimensional Bell State. Furthermore, We have designed the experimental scheme for three-dimensional BSM, and given the method of arbitrary dimension. This method can promote the high-dimensional quantum information task.
-
Experimental Realization of Robust Self-Testing of Bell State Measurements.
Physical review letters, 2019Co-Authors: Wen-hao Zhang, Geng Chen, Xing-xiang Peng, Peng Yin, Guang-can GuoAbstract:Bell State Measurements, of which the eigenvectors are in an entangled form, are crucial resources in the construction of quantum networks. Therefore, device-independent certification of a Bell State Measurement has significance in the quantum information process because it satisfies the exact demand on security. In this study, we implement a proof-of-concept experiment to certify a Bell State Measurement device independently in an entanglement swapping process, namely, self-testing. Instead of preparing a tensor product of two singlets with four photons, multiplex encoding in polarization and spatial modes is utilized to produce two pairs of entangled qubits. As a result, we implement a full Bell State Measurement and achieve a high degree of Bell violation on the remaining two qubits, which are required for nontrivial self-testing of a Bell State Measurement. Furthermore, our results combine the correlations before and after the swapping; thus, the quality of the performed Bell State Measurement can be precisely inferred.
-
Reply to ``Comment on `Scheme for teleportation of an unknown atomic State without the Bell-State Measurement' ''
Physical Review A, 2006Co-Authors: Guang-can GuoAbstract:We agree with the criticism in the Comment by Chhajlany et al. that the parlance ``without the Bell-State Measurement'' in our early scheme [Phys. Rev. A 70, 054303 (2004)] is improper. But the inaccurate Statement does not influence the correctness of our whole scheme. Furthermore we do not think that for enhancing the successful probability the unitary transformation of their Comment can be implemented experimentally in cavity QED system.
-
Scheme for teleportation of an unknown atomic State without the Bell-State Measurement
Physical Review A, 2004Co-Authors: Guang-can GuoAbstract:We propose a scheme for teleporting an unknown atomic State in cavity QED. Our scheme does not involve the Bell-State Measurement. During the interaction between atom and cavity, the cavity is only virtually excited and thus the scheme is insensitive to the cavity field States and cavity decay. The idea can also be used in the case of teleporting an unknown atomic entangled State.
Qin Wang - One of the best experts on this subject based on the ideXlab platform.
-
An enhanced proposal on decoy-State Measurement device-independent quantum key distribution
Quantum Information Processing, 2016Co-Authors: Qin Wang, Chun-hui Zhang, Shunlong LuoAbstract:By employing pulses involving three-intensity, we propose a scheme for the Measurement device-independent quantum key distribution with heralded single-photon sources. We make a comparative study of this scheme with the standard three-intensity decoy-State scheme using weak coherent sources or heralded single-photon sources. The advantage of this scheme is illustrated through numerical simulations: It can approach very closely the asymptotic case of using an infinite number of decoy-States and exhibits excellent behavior in both the secure transmission distance and the final key generation rate.
-
The decoy-State Measurement-device-independent quantum key distribution with heralded single-photon sources
Research in Optical Sciences, 2014Co-Authors: Qin Wang, Xiang-bin WangAbstract:We study the decoy-State Measurement-device-independent quantum key distribution using heralded single-photon sources, and demonstrate that our new scheme of using heralded single-photon sources can give a better performance comparing with various schemes.
-
efficient implementation of the decoy State Measurement device independent quantum key distribution with heralded single photon sources
Physical Review A, 2013Co-Authors: Qin Wang, Xiang-bin WangAbstract:We study the decoy-State Measurement-device-independent quantum key distribution using heralded single-photon sources. This has the advantage that the observed error rate in X basis is in higher order and not so large. We calculate the key rate and transmission distance for two cases: one using only triggered events, and the other using both triggered and non-triggered events. We compare the key rates of various protocols and find that our new scheme using triggered and non-triggered events can give higher key rate and longer secure distance. Moreover, we also show the different behavior of our scheme when using different heralded single-photon sources, i.e., in poisson or thermal distribution. We demonstrate that the former can generate a relatively higher secure key rate than the latter, and can thus work more efficiently in practical quantum key distributions.
Sunyanan - One of the best experts on this subject based on the ideXlab platform.
-
Security risks evaluation toolbox for smart grid devices
Computer Communication Review, 2013Co-Authors: Liuyang, Liujiahe, Liuting, Guanxiaohong, SunyananAbstract:Numerous smart devices are deployed in smart grid for State Measurement, decision-making and remote control. The security issues of smart devices attract more and more attention. In our work, the c...
Henk Nijmeijer - One of the best experts on this subject based on the ideXlab platform.
-
On robustness of constrained discrete-time systems to State Measurement errors
Automatica, 2008Co-Authors: B.j.p. Roset, Wpmh Maurice Heemels, Mircea Lazar, Henk NijmeijerAbstract:In this note we show that robustness with respect to additive disturbances implies robustness with respect to State Measurement errors and additive disturbances for a class of discrete-time closed-loop nonlinear systems. The main result is formulated in terms of input-to-State stability and includes the possible presence of input and State constraints. Moreover, the State feedback controllers are allowed to be discontinuous and set-valued and thus the result also applies to model predictive control laws.