Guangqiang He
Shanghai Jiao Tong University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Guangqiang He.
International Journal of Quantum Information | 2007
Guihua Zeng; Moon Ho Lee; Ying Guo; Guangqiang He
A true quantum signature algorithm based on continuous-variable entanglement state is proposed. In the suggested algorithm, a key-pair, i.e. private signature key and public verification key, is generated based on a one-way function. By employing the signature key, a message state is encoded into a 2k-particle entangled state and a two-particle entangled state is prepared. The resulting states are exploited as a signature of the message state. The signature can be decoded under the verification key when it needs to be verified. Subsequently, a decoded message state and a two-particle entangled state are obtained. To compare the decoded states and the original states, a quantum circuit for comparing these states is exploited. Making use of measurement results of the quantum circuit one can judge the authenticity of the received signature. According to the security requirement of the signature scheme, the suggested algorithm has been proven to be theoretically secure by using the Shannon information theory.
Physical Review A | 2016
Yadong Wu; Jian Zhou; Xinbao Gong; Ying Guo; Zhi-Ming Zhang; Guangqiang He
A continuous-variable measurement-device-independent multiparty quantum communication protocol is investigated in this paper. Utilizing the distributed continuous-variable Greenberger-Horne-Zeilinger state, this protocol can implement both quantum cryptographic conference and quantum secret sharing. We analyze the security of the protocol against both the entangling cloner attack and the coherent attack. The entangling cloner attack is a practical individual attack, and the coherent attack is the optimal attack Eve can implement. Simulation results show that the coherent attack can greatly reduce the secret key rate. Different kinds of entangled attacks are compared and we finally discuss the optimal coherent attacks.
Quantum Information Processing | 2014
Yadong Wu; Runze Cai; Guangqiang He; Jun Zhang
In this paper, we study several physically feasible quantum secret sharing (QSS) schemes using continuous variable graph state (CVGS). Their implementation protocols are given, and the estimation error formulae are derived. Then, we present a variety of results on the theory of QSS with CVGS. Any
Quantum Information Processing | 2012
Peng Huang; Jun Zhu; Xiao-xiao Qi; Guangqiang He; Guihua Zeng
Journal of Physics B | 2012
Peng Huang; Jun Zhu; Guangqiang He; Guihua Zeng
(k,n)
Quantum Information Processing | 2013
Xiaoqi Xiao; Jun Zhu; Guangqiang He; Guihua Zeng
Quantum Information Processing | 2014
Jiahao Zhang; Guangqiang He
(k,n) threshold protocol of the three specific schemes satisfying
Physica Scripta | 2011
Peng Huang; Guangqiang He; Yuan Lu; Guihua Zeng
Physical Review A | 2015
Guangqiang He; Qiang Lin; Xufei Wu; Rongyu Li; Yutian Wen
\frac{n}{2}<k\le n
Journal of Physics B | 2008
Ding Nie; Guangqiang He; Guihua Zeng