Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hao Liang is active.

Publication


Featured researches published by Hao Liang.


Physical Review Letters | 2013

Experimental measurement-device-independent quantum key distribution.

Yang Liu; Teng-Yun Chen; Liu-Jun Wang; Hao Liang; Guoliang Shentu; Jian Wang; Ke Cui; H. Yin; Nai-Le Liu; Li Li; Xiongfeng Ma; Jason S. Pelc; M. M. Fejer; Cheng-Zhi Peng; Qiang Zhang; Jian-Wei Pan

Quantum key distribution is proven to offer unconditional security in communication between two remote users with ideal source and detection. Unfortunately, ideal devices never exist in practice and device imperfections have become the targets of various attacks. By developing up-conversion single-photon detectors with high efficiency and low noise, we faithfully demonstrate the measurement-device-independent quantum-key-distribution protocol, which is immune to all hacking strategies on detection. Meanwhile, we employ the decoy-state method to defend attacks on a nonideal source. By assuming a trusted source scenario, our practical system, which generates more than a 25 kbit secure key over a 50xa0km fiber link, serves as a stepping stone in the quest for unconditionally secure communications with realistic devices.


Optics Express | 2010

Decoy-state quantum key distribution with polarized photons over 200 km

Yang Liu; Teng-Yun Chen; Jian Wang; Wen-Qi Cai; Xu Wan; Luo-Kan Chen; Jin-Hong Wang; Shu-Bin Liu; Hao Liang; Lin Yang; Cheng-Zhi Peng; Kai Chen; Zeng-Bing Chen; Jian-Wei Pan

We report an implementation of decoy-state quantum key distribution (QKD) over 200 km optical fiber cable through photon polarization encoding. This is achieved by constructing the whole QKD system operating at 320 MHz repetition rate, and developing high-speed transmitter and receiver modules. A novel and economic way of synchronization method is designed and incorporated into the system, which allows to work at a low frequency of 40kHz and removes the use of highly precise clock. A final key rate of 15 Hz is distributed within the experimental time of 3089 seconds, by using super-conducting single photon detectors. This is longest decoy-state QKD yet demonstrated up to date. It helps to make a significant step towards practical secure communication in long-distance scope.We demonstrate the decoy-state quantum key distribution ov er 200 km with photon polarization through optical fiber, by usi ng superconducting single photon detector with a repetition rate of 320 Mega Hz and a dark count rate of lower than 1 Hz. Since we have used the pola rization coding, the synchronization pulses can be run in a low freque ncy. The final key rate is 14.1 Hz. The experiment lasts for 3089 seconds wit h 43555 total final bits.


Nature Photonics | 2013

Direct and full-scale experimental verifications towards ground-satellite quantum key distribution

Jianyu Wang; Bin Yang; Sheng-Kai Liao; Liang Zhang; Qi Shen; Xiaofang Hu; Jincai Wu; Shiji Yang; Hao Jiang; Yan-Lin Tang; Bo Zhong; Hao Liang; Weiyue Liu; Yihua Hu; Yong-Mei Huang; Bo Qi; Ji-Gang Ren; Ge-Sheng Pan; Juan Yin; Jianjun Jia; Yu-Ao Chen; Kai Chen; Cheng-Zhi Peng; Jian-Wei Pan

Full-scale verifications for establishing quantum cryptography communication via satellites are reported. Three independent experiments using a hot-air balloon are performed: on a rapidly moving platform over a distance of 40 km, on a floating platform over a distance of 20 km, and over 96 km in air with a huge loss.


Physical Review Letters | 2014

Measurement-device-independent quantum key distribution over 200 km.

Yan-Lin Tang; H. Yin; S. J. Chen; Yang Liu; Weijun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Lixing You; Jian-Yu Guan; Dong-xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

Measurement-device-independent quantum key distribution (MDIQKD) protocol is immune to all attacks on detection and guarantees the information-theoretical security even with imperfect single-photon detectors. Recently, several proof-of-principle demonstrations of MDIQKD have been achieved. Those experiments, although novel, are implemented through limited distance with a key rate less than 0.1u2009u2009bit/s. Here, by developing a 75xa0MHz clock rate fully automatic and highly stable system and superconducting nanowire single-photon detectors with detection efficiencies of more than 40%, we extend the secure transmission distance of MDIQKD to 200xa0km and achieve a secure key rate 3 orders of magnitude higher. These results pave the way towards a quantum network with measurement-device-independent security.


Optics Express | 2010

Metropolitan all-pass and inter-city quantum communication network

Teng-Yun Chen; Jian Wang; Hao Liang; Weiyue Liu; Yang Liu; Xiao Jiang; Yuan Wang; Xu Wan; Wen-Qi Cai; Lei Ju; Luo-Kan Chen; Liu-Jun Wang; Yuan Gao (高原); Kai Chen; Cheng-Zhi Peng; Zeng-Bing Chen; Jian-Wei Pan

We have demonstrated a metropolitan all-pass quantum communication network in field fiber for four nodes. Any two nodes of them can be connected in the network to perform quantum key distribution (QKD). An optical switching module is presented that enables arbitrary 2-connectivity among output ports. Integrated QKD terminals are worked out, which can operate either as a transmitter, a receiver, or even both at the same time. Furthermore, an additional link in another city of 60 km fiber (up to 130 km) is seamless integrated into this network based on a trusted relay architecture. On all the links, we have implemented protocol of decoy state scheme. All of necessary electrical hardware, synchronization, feedback control, network software, execution of QKD protocols are made by tailored designing, which allow a completely automatical and stable running. Our system has been put into operation in Hefei in August 2009, and publicly demonstrated during an evaluation conference on quantum network organized by the Chinese Academy of Sciences on August 29, 2009. Real-time voice telephone with one-time pad encoding between any two of the five nodes (four all-pass nodes plus one additional node through relay) is successfully established in the network within 60 km.


conference on lasers and electro optics | 2014

Lower Bound on the Speed of Nonlocal Correlations without Locality and Measurement Choice Loopholes

Juan Yin; Yuan Cao; Hai-Lin Yong; Ji-Gang Ren; Hao Liang; Sheng-Kai Liao; Fei Zhou; C. Liu; Yu-Ping Wu; Ge-Sheng Pan; Li Li; Nai-Le Liu; Cheng-Zhi Peng; Jian-Wei Pan

In the well-known EPR paper, Einstein et al. called the nonlocal correlation in quantum entanglement as ‘spooky action at a distance’. If the spooky action does exist, what is its speed? All previous experiments along this direction have locality and freedom-of-choice loopholes. Here, we strictly closed the loopholes by observing a 12-hour continuous violation of Bell inequality and concluded that the lower bound speed of ‘spooky action’ was four orders of magnitude of the speed of light if the Earth’s speed in any inertial reference frame was less than 10−3 times of the speed of light. [∗] Author to whom correspondence should be addressed; electronic mail: [email protected], [email protected] and [email protected]. 1 ar X iv :1 30 3. 06 14 v2 [ qu an tph ] 1 8 Ju n 20 13 In order to test the speed of ‘spooky action at a distance’[1], Eberhard proposed[2] a 12hour continuous space-like Bell inequality [3, 4] measurement over a long east-west oriented distance. Benefited from the Earth self rotation, the measurement would be ergodic over all possible translation frames and as a result, the bound of the speed would be universal[2, 5] . Salart et al.[5] recently report to have achieved the lower bound of ‘spooky action’ through an experiment using Eberhard’s proposal. In that experiment, time-bin entangled photon pairs were distributed over two sites, both equipped with a Franson-type interferometer[6] to analyze the photon pairs. At one site, the phase of the interferometer was kept stable and the phase of the interferometer at the other site was continuously scanned. An interference fringe of 87.6% was achieved, which was high enough for a violation of the CHSH-Bell inequality. However any bipartite Bell test requires at least two settings at each site because if there was only one setting, one could always achieve the same interference fringe with a product state without any entanglement. Moreover, as pointed out by Kofler et al.[7], even if the phase of the first site had a second setting, the experiment still had locality loophole, because the setting choice on one site could not be space-like separated from either the measurement events at the other site or the entanglement source generation event[8–10]. Due to these loopholes, the experiment could be explained by common causes[7] instead of ‘spook action’. Actually, similar loopholes existed in all previous attempts for the speed measurement of ‘spooky action’[11–13]. Here, we distributed entangled photon pairs over two site that were 16-km apart sites via free space optical link and implemented a space-like Bell test [3, 4] to close the locality loophole. Meanwhile, we utilized fast electro optic modulators (EOMs) to address the freedom-of-choice loophole. As almost all the photonic Bell experiment[10, 14–16], we utilized fair sampling assumption to address the detection loophole[17]. This assumption is justified by J. S. Bell himself’s comments[15, 18], “. . . it is hard for me to believe that quantum mechanics works so nicely for inefficient practical set-ups and is yet going to fail badly when sufficient refinements are made. Of more importance, in my opinion, is the complete absence of the vital time factor in existing experiments. The analyzers are not rotated during the flight of the particles.” Our two sites are east-west oriented sites at the same latitude as Eberhard proposed[2]. Suppose two events occur in the two sites, respectively at positions ~ rA and ~ rB at time tA


Optics Express | 2009

Field test of a practical secure communication network with decoy-state quantum cryptography.

Teng-Yun Chen; Hao Liang; Yang Liu; Wen-Qi Cai; Lei Ju; Weiyue Liu; Jian Wang; Hao Yin; Kai Chen; Zeng-Bing Chen; Cheng-Zhi Peng; Jian-Wei Pan

We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.


IEEE Journal of Selected Topics in Quantum Electronics | 2015

Field Test of Measurement-Device-Independent Quantum Key Distribution

Yan-Lin Tang; H. Yin; S. J. Chen; Yang Liu; Weijun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Lixing You; Jian-Yu Guan; Dong-xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

The main type of obstacles of practical applications of quantum key distribution (QKD) network are various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks, and thus, a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 b/s. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length achieving a 16.9 b/s secure key rate. The result lays the foundation for a global quantum network, which can shield from all the detection-side attacks.


Optics Express | 2013

Entanglement-based quantum key distribution with biased basis choice via free space

Yuan Cao; Hao Liang; Juan Yin; Hai-Lin Yong; Fei Zhou; Yu-Ping Wu; Ji-Gang Ren; Yu-Huai Li; Ge-Sheng Pan; Tao Yang; Xiongfeng Ma; Cheng-Zhi Peng; Jian-Wei Pan

Quantum key distribution (QKD) [1] is a maturing technology that has evolved from an abstract idea to practical systems that are even commercially available. As with every new technology there are still plenty of new developments and the translation from theory to a practical system is difficult. In a security application, the issue of translating theoretical ideas to a working device is even more critical, because any assumption that is made in the theory needs to be verified in the actual implementation. In QKD, we have learned this the hard way, when it was realized that some devices could actually be hacked [2], not because the theory was wrong, but because a practical device is always much more complicated than even the most elaborate security proof. While keeping the security aspect under control, experimenters want to optimize their systems so that they can deliver the highest secure key rate possible under the conditions of a chosen quantum channel.


Review of Scientific Instruments | 2016

Note: Fully integrated 3.2 Gbps quantum random number generator with real-time extraction

Xiaoguang Zhang; You-Qi Nie; Hongyi Zhou; Hao Liang; Xiongfeng Ma; Jun Zhang; Jian-Wei Pan

We present a real-time and fully integrated quantum random number generator (QRNG) by measuring laser phase fluctuations. The QRNG scheme based on laser phase fluctuations is featured for its capability of generating ultra-high-speed random numbers. However, the speed bottleneck of a practical QRNG lies on the limited speed of randomness extraction. To close the gap between the fast randomness generation and the slow post-processing, we propose a pipeline extraction algorithm based on Toeplitz matrix hashing and implement it in a high-speed field-programmable gate array. Further, all the QRNG components are integrated into a module, including a compact and actively stabilized interferometer, high-speed data acquisition, and real-time data post-processing and transmission. The final generation rate of the QRNG module with real-time extraction can reach 3.2 Gbps.

Collaboration


Dive into the Hao Liang's collaboration.

Top Co-Authors

Avatar

Jian-Wei Pan

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Teng-Yun Chen

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Cheng-Zhi Peng

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Jian Wang

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Yang Liu

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

H. Yin

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Qiang Zhang

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Juan Yin

University of Science and Technology of China

View shared research outputs
Researchain Logo
Decentralizing Knowledge