Fu-Guo Deng
Beijing Normal University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Fu-Guo Deng.
Physical Review A | 2003
Fu-Guo Deng; Gui Lu Long; Xiao-Shu Liu
A protocol for quantum secure direct communication using blocks of Einstein-Podolsky-Rosen (EPR) pairs is proposed. A set of ordered N EPR pairs is used as a data block for sending secret message directly. The ordered N EPR set is divided into two particle sequences, a checking sequence and a message-coding sequence. After transmitting the checking sequence, the two parties of communication check eavesdropping by measuring a fraction of particles randomly chosen, with random choice of two sets of measuring bases. After insuring the security of the quantum channel, the sender Alice encodes the secret message directly on the message-coding sequence and sends them to Bob. By combining the checking and message-coding sequences together, Bob is able to read out the encoded messages directly. The scheme is secure because an eavesdropper cannot get both sequences simultaneously. We also discuss issues in a noisy channel.
Physical Review A | 2004
Fu-Guo Deng; Gui Lu Long
Quantum secure direct communication is the direct communication of secret messages without first producing a shared secret key. It may be used in some urgent circumstances. Here we propose a quantum secure direct communication protocol using single photons. The protocol uses batches of single photons prepared randomly in one of four different states. These single photons serve as a one-time pad which is used directly to encode the secret messages in one communication process. We also show that it is unconditionally secure. The protocol is feasible with present-day technique.
Physical Review A | 2004
Li Xiao; Gui Lu Long; Fu-Guo Deng; Jian-Wei Pan
In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information.
Physical Review A | 2005
Fu-Guo Deng; Xi-Han Li; Hong-Yu Zhou; Zhan-jun Zhang
We analyzed the security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang, Li, and Man [Phys. Rev. A 71, 044301 (2005)] and found that this protocol is secure for any other eavesdropper except for the agent Bob who prepares the quantum signals as he can attack the quantum communication with a Trojan horse. That is, Bob replaces the single-photon signal with a multiphoton one and the other agent Charlie cannot find this cheating as she does not measure the photons before they run back from the boss Alice, which reveals that this MQSS protocol is not secure for Bob. Finally, we present a possible improvement of the MQSS protocol security with two single-photon measurements and four unitary operations.
Physical Review A | 2005
Fu-Guo Deng; Xi-Han Li; Chun-Yan Li; Ping Zhou; Hong-Yu Zhou
A scheme for multiparty quantum state sharing of an arbitrary two-particle state is presented with Einstein-Podolsky-Rosen pairs. Any one of the N agents has the access to regenerate the original state with two local unitary operations if he collaborates with the other agents, say the controllers. Moreover, each of the controllers is required to take only a product measurement {sigma}{sub x}x{sigma}{sub x} on his two particles, which makes this scheme more convenient for the agents in the applications on a network than others. As all the quantum source can be used to carry the useful information, the intrinsic efficiency of qubits approaches the maximal value. With a new notation for the multipartite entanglement, the sender need only publish two bits of classical information for each measurement, which reduces the information exchanged largely.
Physical Review A | 2008
Xi-Han Li; Fu-Guo Deng; Hong-Yu Zhoul
We present two efficient quantum key distribution schemes over two different collective-noise channels. The accepted hypothesis of collective noise is that photons travel inside a time window small compared to the variation of noise. Noiseless subspaces are made up of two Bell states and the spatial degree of freedom is introduced to form two nonorthogonal bases. Although these protocols resort to entangled states for encoding the key bit, the receiver is only required to perform single-particle product measurements and there is no basis mismatch. Moreover, the detection is passive as the receiver does not switch his measurements between two conjugate measurement bases to get the key.
Optics Communications | 2005
Chuan Wang; Fu-Guo Deng; Gui Lu Long
Abstract A multi-step quantum secure direct communication protocol using blocks of multi-particle maximally entangled state is proposed. In this protocol, the particles in a Green–Horne–Zeilinger state are sent from Alice to Bob in batches in several steps. It has the advantage of high efficiency and high source capacity.
Physical Review A | 2008
Yu-Bo Sheng; Fu-Guo Deng; Hong-Yu Zhou
We present a way for entanglement purification based on two parametric down-conversion (PDC) sources with cross-Kerr nonlinearities. It is comprised of two processes. The first one is a primary entanglement purification protocol for PDC sources with nondestructive quantum nondemolition (QND) detectors by transferring the spatial entanglement of photon pairs to their polarization. In this time, the QND detectors act as the role of controlled-NOT (CNOT) gates. Also they can distinguish the photon number of the spatial modes, which provides a good way for the next process to purify the entanglement of the photon pairs kept more. In the second process for entanglement purification, new QND detectors are designed to act as the role of CNOT gates. This protocol has the advantage of high yield and it requires neither CNOT gates based on linear optical elements nor sophisticated single-photon detectors, which makes it more convenient in practical applications.
Physical Review A | 2008
Yu-Bo Sheng; Fu-Guo Deng; Hong-Yu Zhou
We present a nonlocal entanglement concentration scheme for reconstructing some maximally entangled multipartite states from partially entangled ones by exploiting cross-Kerr nonlinearities to distinguish the parity of two polarization photons. Compared with the entanglement concentration schemes based on two-particle collective unitary evolution, this scheme does not require the parties to know accurately information about the partially entangled states--i.e., their coefficients. Moreover, it does not require the parties to possess sophisticated single-photon detectors, which makes this protocol feasible with present techniques. By iteration of entanglement concentration processes, this scheme has a higher efficiency and yield than those with linear optical elements. All these advantages make this scheme more efficient and more convenient than others in practical applications.
Journal of Physics B | 2006
Xi-Han Li; Ping Zhou; Chun-Yan Li; Hong-Yu Zhou; Fu-Guo Deng
We present a scheme for symmetric multiparty quantum state sharing of an arbitrary m-qubit state with m Greenberger–Horne–Zeilinger states following some ideas from the controlled teleportation (2005 Phys. Rev. A 72 02338). The sender Alice performs m Bell-state measurements on her 2m particles and the controllers need only take some single-photon product measurements on their photons independently, not multipartite entanglement measurements, which makes this scheme more convenient than the latter. Also it does not require the parties to perform a controlled-NOT gate on the photons for reconstructing the unknown m-qubit state and it is an optimal one as its efficiency for qubits approaches 100% in principle.