Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Guangqiang He is active.

Publication


Featured researches published by Guangqiang He.


International Journal of Quantum Information | 2007

CONTINUOUS VARIABLE QUANTUM SIGNATURE ALGORITHM

Guihua Zeng; Moon Ho Lee; Ying Guo; Guangqiang He

A true quantum signature algorithm based on continuous-variable entanglement state is proposed. In the suggested algorithm, a key-pair, i.e. private signature key and public verification key, is generated based on a one-way function. By employing the signature key, a message state is encoded into a 2k-particle entangled state and a two-particle entangled state is prepared. The resulting states are exploited as a signature of the message state. The signature can be decoded under the verification key when it needs to be verified. Subsequently, a decoded message state and a two-particle entangled state are obtained. To compare the decoded states and the original states, a quantum circuit for comparing these states is exploited. Making use of measurement results of the quantum circuit one can judge the authenticity of the received signature. According to the security requirement of the signature scheme, the suggested algorithm has been proven to be theoretically secure by using the Shannon information theory.


Physical Review A | 2016

Continuous-variable measurement-device-independent multipartite quantum communication

Yadong Wu; Jian Zhou; Xinbao Gong; Ying Guo; Zhi-Ming Zhang; Guangqiang He

A continuous-variable measurement-device-independent multiparty quantum communication protocol is investigated in this paper. Utilizing the distributed continuous-variable Greenberger-Horne-Zeilinger state, this protocol can implement both quantum cryptographic conference and quantum secret sharing. We analyze the security of the protocol against both the entangling cloner attack and the coherent attack. The entangling cloner attack is a practical individual attack, and the coherent attack is the optimal attack Eve can implement. Simulation results show that the coherent attack can greatly reduce the secret key rate. Different kinds of entangled attacks are compared and we finally discuss the optimal coherent attacks.


Quantum Information Processing | 2014

Quantum secret sharing with continuous variable graph state

Yadong Wu; Runze Cai; Guangqiang He; Jun Zhang

In this paper, we study several physically feasible quantum secret sharing (QSS) schemes using continuous variable graph state (CVGS). Their implementation protocols are given, and the estimation error formulae are derived. Then, we present a variety of results on the theory of QSS with CVGS. Any


Quantum Information Processing | 2012

Different dynamics of classical and quantum correlations under decoherence

Peng Huang; Jun Zhu; Xiao-xiao Qi; Guangqiang He; Guihua Zeng


Journal of Physics B | 2012

Study on the security of discrete-variable quantum key distribution over non-Markovian channels

Peng Huang; Jun Zhu; Guangqiang He; Guihua Zeng

(k,n)


Quantum Information Processing | 2013

A scheme for generating a multi-photon NOON state based on cavity QED

Xiaoqi Xiao; Jun Zhu; Guangqiang He; Guihua Zeng


Quantum Information Processing | 2014

Quantum network dense coding via continuous-variable graph states

Jiahao Zhang; Guangqiang He

(k,n) threshold protocol of the three specific schemes satisfying


Physica Scripta | 2011

Quantum capacity of Pauli channels with memory

Peng Huang; Guangqiang He; Yuan Lu; Guihua Zeng


Physical Review A | 2015

Five-partite entanglement generation in a high- Q microresonator

Guangqiang He; Qiang Lin; Xufei Wu; Rongyu Li; Yutian Wen

\frac{n}{2}<k\le n


Journal of Physics B | 2008

Controlled teleportation of continuous variables

Ding Nie; Guangqiang He; Guihua Zeng

Collaboration


Dive into the Guangqiang He's collaboration.

Top Co-Authors

Avatar

Guihua Zeng

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Peng Huang

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Jun Zhu

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Ying Guo

Central South University

View shared research outputs
Top Co-Authors

Avatar

Jingtao Zhang

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Can Yang

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Chenyang Li

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Ding Nie

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Jian Fang

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Jian Zhou

Central South University

View shared research outputs
Researchain Logo
Decentralizing Knowledge