Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fu-Guo Deng is active.

Publication


Featured researches published by Fu-Guo Deng.


Physical Review A | 2003

Two-step quantum direct communication protocol using the Einstein-Podolsky-Rosen pair block

Fu-Guo Deng; Gui Lu Long; Xiao-Shu Liu

A protocol for quantum secure direct communication using blocks of Einstein-Podolsky-Rosen (EPR) pairs is proposed. A set of ordered N EPR pairs is used as a data block for sending secret message directly. The ordered N EPR set is divided into two particle sequences, a checking sequence and a message-coding sequence. After transmitting the checking sequence, the two parties of communication check eavesdropping by measuring a fraction of particles randomly chosen, with random choice of two sets of measuring bases. After insuring the security of the quantum channel, the sender Alice encodes the secret message directly on the message-coding sequence and sends them to Bob. By combining the checking and message-coding sequences together, Bob is able to read out the encoded messages directly. The scheme is secure because an eavesdropper cannot get both sequences simultaneously. We also discuss issues in a noisy channel.


Physical Review A | 2004

Secure direct communication with a quantum one-time pad

Fu-Guo Deng; Gui Lu Long

Quantum secure direct communication is the direct communication of secret messages without first producing a shared secret key. It may be used in some urgent circumstances. Here we propose a quantum secure direct communication protocol using single photons. The protocol uses batches of single photons prepared randomly in one of four different states. These single photons serve as a one-time pad which is used directly to encode the secret messages in one communication process. We also show that it is unconditionally secure. The protocol is feasible with present-day technique.


Physical Review A | 2004

Efficient multiparty quantum-secret-sharing schemes

Li Xiao; Gui Lu Long; Fu-Guo Deng; Jian-Wei Pan

In this work, we generalize the quantum-secret-sharing scheme of Hillery, Buzek, and Berthiaume [Phys. Rev. A 59, 1829 (1999)] into arbitrary multiparties. Explicit expressions for the shared secret bit is given. It is shown that in the Hillery-Buzek-Berthiaume quantum-secret-sharing scheme the secret information is shared in the parity of binary strings formed by the measured outcomes of the participants. In addition, we have increased the efficiency of the quantum-secret-sharing scheme by generalizing two techniques from quantum key distribution. The favored-measuring-basis quantum-secret-sharing scheme is developed from the Lo-Chau-Ardehali technique [H. K. Lo, H. F. Chau, and M. Ardehali, e-print quant-ph/0011056] where all the participants choose their measuring-basis asymmetrically, and the measuring-basis-encrypted quantum-secret-sharing scheme is developed from the Hwang-Koh-Han technique [W. Y. Hwang, I. G. Koh, and Y. D. Han, Phys. Lett. A 244, 489 (1998)] where all participants choose their measuring basis according to a control key. Both schemes are asymptotically 100% in efficiency, hence nearly all the Greenberger-Horne-Zeilinger states in a quantum-secret-sharing process are used to generate shared secret information.


Physical Review A | 2005

Improving the security of multiparty quantum secret sharing against Trojan horse attack

Fu-Guo Deng; Xi-Han Li; Hong-Yu Zhou; Zhan-jun Zhang

We analyzed the security of the multiparty quantum secret sharing (MQSS) protocol recently proposed by Zhang, Li, and Man [Phys. Rev. A 71, 044301 (2005)] and found that this protocol is secure for any other eavesdropper except for the agent Bob who prepares the quantum signals as he can attack the quantum communication with a Trojan horse. That is, Bob replaces the single-photon signal with a multiphoton one and the other agent Charlie cannot find this cheating as she does not measure the photons before they run back from the boss Alice, which reveals that this MQSS protocol is not secure for Bob. Finally, we present a possible improvement of the MQSS protocol security with two single-photon measurements and four unitary operations.


Physical Review A | 2005

Multiparty quantum state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairs

Fu-Guo Deng; Xi-Han Li; Chun-Yan Li; Ping Zhou; Hong-Yu Zhou

A scheme for multiparty quantum state sharing of an arbitrary two-particle state is presented with Einstein-Podolsky-Rosen pairs. Any one of the N agents has the access to regenerate the original state with two local unitary operations if he collaborates with the other agents, say the controllers. Moreover, each of the controllers is required to take only a product measurement {sigma}{sub x}x{sigma}{sub x} on his two particles, which makes this scheme more convenient for the agents in the applications on a network than others. As all the quantum source can be used to carry the useful information, the intrinsic efficiency of qubits approaches the maximal value. With a new notation for the multipartite entanglement, the sender need only publish two bits of classical information for each measurement, which reduces the information exchanged largely.


Physical Review A | 2008

Efficient quantum key distribution over a collective noise channel

Xi-Han Li; Fu-Guo Deng; Hong-Yu Zhoul

We present two efficient quantum key distribution schemes over two different collective-noise channels. The accepted hypothesis of collective noise is that photons travel inside a time window small compared to the variation of noise. Noiseless subspaces are made up of two Bell states and the spatial degree of freedom is introduced to form two nonorthogonal bases. Although these protocols resort to entangled states for encoding the key bit, the receiver is only required to perform single-particle product measurements and there is no basis mismatch. Moreover, the detection is passive as the receiver does not switch his measurements between two conjugate measurement bases to get the key.


Optics Communications | 2005

Multi-step quantum secure direct communication using multi-particle Green–Horne–Zeilinger state

Chuan Wang; Fu-Guo Deng; Gui Lu Long

Abstract A multi-step quantum secure direct communication protocol using blocks of multi-particle maximally entangled state is proposed. In this protocol, the particles in a Green–Horne–Zeilinger state are sent from Alice to Bob in batches in several steps. It has the advantage of high efficiency and high source capacity.


Physical Review A | 2008

Efficient polarization-entanglement purification based on parametric down-conversion sources with cross-Kerr nonlinearity

Yu-Bo Sheng; Fu-Guo Deng; Hong-Yu Zhou

We present a way for entanglement purification based on two parametric down-conversion (PDC) sources with cross-Kerr nonlinearities. It is comprised of two processes. The first one is a primary entanglement purification protocol for PDC sources with nondestructive quantum nondemolition (QND) detectors by transferring the spatial entanglement of photon pairs to their polarization. In this time, the QND detectors act as the role of controlled-NOT (CNOT) gates. Also they can distinguish the photon number of the spatial modes, which provides a good way for the next process to purify the entanglement of the photon pairs kept more. In the second process for entanglement purification, new QND detectors are designed to act as the role of CNOT gates. This protocol has the advantage of high yield and it requires neither CNOT gates based on linear optical elements nor sophisticated single-photon detectors, which makes it more convenient in practical applications.


Physical Review A | 2008

Nonlocal entanglement concentration scheme for partially entangled multipartite systems with nonlinear optics (7 pages)

Yu-Bo Sheng; Fu-Guo Deng; Hong-Yu Zhou

We present a nonlocal entanglement concentration scheme for reconstructing some maximally entangled multipartite states from partially entangled ones by exploiting cross-Kerr nonlinearities to distinguish the parity of two polarization photons. Compared with the entanglement concentration schemes based on two-particle collective unitary evolution, this scheme does not require the parties to know accurately information about the partially entangled states--i.e., their coefficients. Moreover, it does not require the parties to possess sophisticated single-photon detectors, which makes this protocol feasible with present techniques. By iteration of entanglement concentration processes, this scheme has a higher efficiency and yield than those with linear optical elements. All these advantages make this scheme more efficient and more convenient than others in practical applications.


Journal of Physics B | 2006

Efficient symmetric multiparty quantum state sharing of an arbitrary m-qubit state

Xi-Han Li; Ping Zhou; Chun-Yan Li; Hong-Yu Zhou; Fu-Guo Deng

We present a scheme for symmetric multiparty quantum state sharing of an arbitrary m-qubit state with m Greenberger–Horne–Zeilinger states following some ideas from the controlled teleportation (2005 Phys. Rev. A 72 02338). The sender Alice performs m Bell-state measurements on her 2m particles and the controllers need only take some single-photon product measurements on their photons independently, not multipartite entanglement measurements, which makes this scheme more convenient than the latter. Also it does not require the parties to perform a controlled-NOT gate on the photons for reconstructing the unknown m-qubit state and it is an optimal one as its efficiency for qubits approaches 100% in principle.

Collaboration


Dive into the Fu-Guo Deng's collaboration.

Top Co-Authors

Avatar

Hong-Yu Zhou

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Xi-Han Li

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hai-Rui Wei

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Bao-Cang Ren

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Tao Li

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Ming Hua

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Ming-Jie Tao

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Yu-Bo Sheng

Beijing Normal University

View shared research outputs
Researchain Logo
Decentralizing Knowledge