Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Li Chun-Yan is active.

Publication


Featured researches published by Li Chun-Yan.


Physical Review A | 2005

Symmetric multiparty-controlled teleportation of an arbitrary two-particle entanglement

Deng Fu-Guo; Li Chun-Yan; Li Yan-Song

We present a way for symmetric multiparty-controlled teleportation of an arbitrary two-particle entangled state based on Bell-basis measurements by using two Greenberger-Horne-Zeilinger states, i.e., a sender transmits an arbitrary two-particle entangled state to a distant receiver, an arbitrary one of the n+1 agents, via the control of the others in a network. It will be shown that the outcomes in the cases that n is odd or is even are different in principle as the receiver has to perform a controlled-NOT operation on his particles for reconstructing the original arbitrary entangled state in addition to some local unitary operations in the former. Also we discuss the applications of this controlled teleporation for quantum secret sharing of classical and quantum information. As all the instances can be used to carry useful information, its efficiency for qubit approaches the maximal value.


Chinese Physics Letters | 2005

Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations

Li Chun-Yan; Zhou Hong-Yu; Wang Yan; Deng Fu-Guo

We propose a theoretical scheme for secure quantum key distribution network following the ideas in quantum dense coding. In this scheme, the server of the network provides the service for preparing and measuring the Bell states, and the users encode the states with local unitary operations. For preventing the server from eavesdropping, we design a decoy when the particle is transmitted between the users. The scheme has high capacity as one particle carries two bits of information and its efficiency for qubits approaches 100%. Moreover, it is unnecessary for the users to store the quantum states, which makes this scheme more convenient in applications than others.We propose a theoretical scheme for secure quantum key distribution network following the ideas in quantum dense coding. In this scheme, the server of the network provides the service for preparing and measuring the Bell states, and the users encode the states with local unitary operations. For preventing the server from eavesdropping, we design a decoy when the particle is transmitted between the users. The scheme has high capacity as one particle carries two bits of information and its efficiency for qubits approaches 100%. Moreover, it is unnecessary for the users to store the quantum states, which makes this scheme more convenient in applications than others.


Chinese Physics | 2007

Quantum secure direct communication with quantum encryption based on pure entangled states

Li Xi-Han; Li Chun-Yan; Deng Fu-Guo; Zhou Ping; Liang Yu-Jie; Zhou Hong-Yu

This paper presents a scheme for quantum secure direct communication with quantum encryption. The two authorized users use repeatedly a sequence of the pure entangled pairs (quantum key) shared for encrypting and decrypting the secret message carried by the travelling photons directly. For checking eavesdropping, the two parties perform the single-photon measurements on some decoy particles before each round. This scheme has the advantage that the pure entangled quantum signal source is feasible at present and any eavesdropper cannot steal the message.


Chinese Physics Letters | 2006

Efficient Quantum Cryptography Network without Entanglement and Quantum Memory

Li Chun-Yan; Li Xi-Han; Deng Fu-Guo; Zhou Ping; Liang Yu-Jie; Zhou Hong-Yu

Chun-Yan Li, Xi-Han Li, Fu-Guo Deng1,2,3†, Ping Zhou, Yu-Jie Liang, Hong-Yu Zhou 1 The Key Laboratory of Beam Technology and Material Modification of Ministry of Education, Beijing Normal University, Beijing 100875 2 Institute of Low Energy Nuclear Physics, and Department of Material Science and Engineering, Beijing Normal University, Beijing 100875 3 Beijing Radiation Center, Beijing 100875 (Dated: February 1, 2008)An efficient quantum cryptography network protocol is proposed with d-dimensional polarized photons, without resorting to entanglement and quantum memory. A server on the network, say Alice, provides the service for preparing and measuring single photons whose initial state are |0. The users code the information on the single photons with some unitary operations. To prevent the untrustworthy server Alice from eavesdropping the quantum lines, a nonorthogonal-coding technique is used in the process that the quantum signal is transmitted between the users. This protocol does not require the servers and the users to store the quantum states and almost all of the single photons can be used for carrying the information, which makes it more convenient for application than others with present technology. We also discuss the case with a faint laser pulse.


Chinese Physics Letters | 2006

Quantum Secure Direct Communication Network with Two-Step Protocol

Li Xi-Han; Zhou Ping; Liang Yu-Jie; Li Chun-Yan; Zhou Hong-Yu; Deng Fu-Guo

An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein?Podolsky?Rosen (EPR) pair block as the quantum information carrier. The server, say Alice, prepares and measures the EPR pairs in the quantum communication and the users perform the four local unitary operations to encode their message. Anyone of the legitimate users can communicate another one on the network securely. Since almost all of the instances in this scheme are useful and each EPR pair can carry two bits of information, the efficiency for qubits and the source capacity both approach the maximal values.


Chinese Physics Letters | 2006

Efficient Multiparty Quantum Secret Sharing with Greenberger--Horne--Zeilinger States

Deng Fu-Guo; Zhou Ping; Li Xi-Han; Li Chun-Yan; Zhou Hong-Yu

An efficient multiparty quantum secret sharing scheme is proposed with Greenberger–Horne–Zeilinger (GHZ) states following some ideas in quantum dense coding. The agents take the single-photon measurements on the photons received for eavesdropping check and exploit the four local unitary operations I, σz, σx and iσy to code their message. This scheme has the advantage of high capacity as each GHZ state can carry two bits of information. The parties do not need to announce the measuring bases for almost all the photons, which will reduce the classical information exchanged largely. The intrinsic efficiency for qubits and the total efficiency both approach the maximal values.


Chinese Physics Letters | 2006

Multiparty Quantum Secret Report

Deng Fu-Guo; Li Xi-Han; Li Chun-Yan; Zhou Ping; Liang Yu-Jie; Zhou Hong-Yu

A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M+1)-particle Greenberger?Horne?Zeilinger (GHZ) states that only Alice knows which state each (M+1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a ?x operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measuring them with two measuring bases. After confirming the security of the quantum key, they use the remaining GHZ states repeatedly for the next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for the qubits and total efficiency.A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her


Chinese Physics | 2007

Eavesdropping on the `ping-pong' quantum communication protocol freely in a noise channel

Deng Fu-Guo; Li Xi-Han; Li Chun-Yan; Zhou Ping; Zhou Hong-Yu

M


Chinese Physics Letters | 2007

Multiparty Quantum Remote Secret Conference

Li Xi-Han; Li Chun-Yan; Deng Fu-Guo; Zhou Ping; Liang Yu-Jie; Zhou Hong-Yu

agents first share a sequence of (


Chinese Physics | 2007

Economical quantum secure direct communication network with single photons

Deng Fu-Guo; Li Xi-Han; Li Chun-Yan; Zhou Ping; Zhou Hong-Yu

M

Collaboration


Dive into the Li Chun-Yan's collaboration.

Top Co-Authors

Avatar

Deng Fu-Guo

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Zhou Hong-Yu

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Li Xi-Han

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Zhou Ping

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Liang Yu-Jie

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wang Yan

Beijing Normal University

View shared research outputs
Researchain Logo
Decentralizing Knowledge