Li Hong-Wei
University of Science and Technology of China
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Li Hong-Wei.
Chinese Physics B | 2014
Zhao Liangyuan; Li Hong-Wei; Yin Zhen-Qiang; Chen Wei; You Juan; Han Zhengfu
In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations.
Physical Review A | 2014
Li Hong-Wei; Guo Guangcan; Chen Wei; Yin Zhen-Qiang; Wang Shuang; Han Zhengfu
In this paper, we propose a quantum key distribution (QKD) protocol based on only a two-dimensional Hilbert space encoding a quantum system and independent devices between the equipment for state preparation and measurement. Our protocol is inspired by the fully device-independent quantum key distribution (FDI-QKD) protocol and the measurement-device-independent quantum key distribution (MDI-QKD) protocol. Our protocol only requires the state to be prepared in the two dimensional Hilbert space, which weakens the state preparation assumption in the original MDI-QKD protocol. More interestingly, our protocol can overcome the detection loophole problem in the FDI-QKD protocol, which greatly limits the application of FDI-QKD. Hence our protocol can be implemented with practical optical components.
Chinese Physics B | 2014
Wang Yang; Bao Wan-Su; Li Hong-Wei; Zhou Chun; Li Yuan
Similar to device-independent quantum key distribution (DI-QKD), semi-device-independent quantum key distribution (SDI-QKD) provides secure key distribution without any assumptions about the internal workings of the QKD devices. The only assumption is that the dimension of the Hilbert space is bounded. But SDI-QKD can be implemented in a one-way prepare-and-measure configuration without entanglement compared with DI-QKD. We propose a practical SDI-QKD protocol with four preparation states and three measurement bases by considering the maximal violation of dimension witnesses and specific processes of a QKD protocol. Moreover, we prove the security of the SDI-QKD protocol against collective attacks based on the min-entropy and dimension witnesses. We also show a comparison of the secret key rate between the SDI-QKD protocol and the standard QKD.
China Communications | 2013
Huang Jingzheng; Yin Zhen-Qiang; Chen Wei; Wang Shuang; Li Hong-Wei; Guo Guangcan; Han Zhengfu
Quantum communications helps us to enhance the security and efficiency of communications and to deepen our understanding of quantum physics. Its rapid development in recent years has attracted the interest of researchers from diverse fields such as physics, mathematics, and computer science. We review the background and current state of quantum communications technology, with an emphasis on quantum key distribution, quantum random number generation, and a relatively hot topic: device independent protocols.
Chinese Physics Letters | 2014
Li Fang-Yi; Yin Zhen-Qiang; Li Hong-Wei; Chen Wei; Wang Shuang; Wen Hao; Zhao Yibo; Han Zhengfu
Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdroppers information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
Chinese Physics B | 2011
Li Hong-Wei; Yin Zhen-Qiang; Wang Shuang; Bao Wan-Su; Guo Guangcan; Han Zhengfu
Quantum key distribution is the art of sharing secret keys between two distant parties, and has attracted a lot of attention due to its unconditional security. Compared with other quantum key distribution protocols, the differential phase shift quantum key distribution protocol has higher efficiency and simpler apparatus. Unfortunately, the unconditional security of differential phase shift quantum key distribution has not been proved. Utilizing the sharp continuity of the von Neuman entropy and some basic inequalities, we estimate the upper bound for the eavesdropper Eves information. We then prove the lower bound for the security of the differential phase shift quantum key distribution protocol against a one-pulse attack with Devatak—Winters secret key rate formula.
Chinese Physics B | 2015
Qian Yong-Jun; Li Hong-Wei; He Deyong; Yin Zhen-Qiang; Zhang Chun-Mei; Chen Wei; Wang Shuang; Han Zhengfu
In a practical quantum key distribution (QKD) system, imperfect equipment, especially the single-photon detector, can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate (QBER) introduced by Eve, by which Eve can acquire information without the countermeasure.
Chinese Physics B | 2012
Zhang Yang; Wang Shuang; Yin Zhen-Qiang; Chen Wei; Liang Wen-Ye; Li Hong-Wei; Guo Guangcan; Han Zhengfu
Passive decoy state quantum key distribution (PDS-QKD) has advantages in high-speed scenarios. We propose a modified model to simulate the PDS-QKD with a weak coherent light source based on Curtys theory [Opt. Lett. 34 3238 (2009)]. The modified model can provide better performance in a practical PDS-QKD system. Moreover, we report an experimental demonstration of the PDS-QKD of over 22.0-dB channel loss.
Communications in Theoretical Physics | 2015
Liang Wen-Ye; Wen Hao; Yin Zhen-Qiang; Chen Hua; Li Hong-Wei; Chen Wei; Han Zhengfu
At present, there is an increasing awareness of some three-orthogonal-basis quantum key distribution protocols, such as, the reference-frame-independent (RFI) protocol and the six-state protocol. For secure key rate estimations of these protocols, there are two methods: one is the conventional approach, and another is the tomographic approach. However, a comparison between these two methods has not been given yet. In this work, with the general model of rotation channel, we estimate the key rate using conventional and tomographic methods respectively. Results show that conventional estimation approach in RFI protocol is equivalent to tomographic approach only in the case of that one of three orthogonal bases is always aligned. In other cases, tomographic approach performs much better than the respective conventional approaches of the RFI protocol and the six-state protocol. Furthermore, based on the experimental data, we illustrate the deep connections between tomography and conventional RFI approach representations.
Chinese Physics Letters | 2015
Song Xiao-Tian; Li Hong-Wei; Yin Zhen-Qiang; Liang Wen-Ye; Zhang Chun-Mei; Han Yunguang; Chen Wei; Han Zhengfu
How to estimate the randomness of the measurement outcomes generated by a given device is an important issue in quantum information theory. Recently, Brunner et al. [Phys. Rev. Lett. 112 (2014) 140407] proposed a prepare-and-measure quantum random number generation scenario with device-independent assumption, which indicates a method to test the randomness of bit strings according to the generation process rather than the results. Based on this protocol, we implement a quantum random number generator with an intrinsic stable phase-encoded quantum key distribution system. The system has been continuously running for more than 200 h, a stable witness W with the average value of 0.9752 and a standard deviation of 0.0024 are obtained. More than 1 G random bits are generated and the results pass all items of NIST test suite.