Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Li Xi-Han is active.

Publication


Featured researches published by Li Xi-Han.


Frontiers of Physics in China | 2007

Quantum secure direct communication and deterministic secure quantum communication

Long Gui-Lu; Deng Fu-Guo; Li Xi-Han; Wang Chuan; Wen Kai

In this review article, we review the recent development of quantum secure direct communication (QSDC) and deterministic secure quantum communication (DSQC) which both are used to transmit secret message, including the criteria for QSDC, some interesting QSDC protocols, the DSQC protocols and QSDC network, etc. The difference between these two branches of quantum communication is that DSQC requires the two parties exchange at least one bit of classical information for reading out the message in each qubit, and QSDC does not. They are attractive because they are deterministic, in particular, the QSDC protocol is fully quantum mechanical. With sophisticated quantum technology in the future, the QSDC may become more and more popular. For ensuring the safety of QSDC with single photons and quantum information sharing of single qubit in a noisy channel, a quantum privacy amplification protocol has been proposed. It involves very simple CHC operations and reduces the information leakage to a negligible small level. Moreover, with the one-party quantum error correction, a relation has been established between classical linear codes and quantum one-party codes, hence it is convenient to transfer many good classical error correction codes to the quantum world. The one-party quantum error correction codes are especially designed for quantum dense coding and related QSDC protocols based on dense coding.


Chinese Physics | 2007

Quantum secure direct communication with quantum encryption based on pure entangled states

Li Xi-Han; Li Chun-Yan; Deng Fu-Guo; Zhou Ping; Liang Yu-Jie; Zhou Hong-Yu

This paper presents a scheme for quantum secure direct communication with quantum encryption. The two authorized users use repeatedly a sequence of the pure entangled pairs (quantum key) shared for encrypting and decrypting the secret message carried by the travelling photons directly. For checking eavesdropping, the two parties perform the single-photon measurements on some decoy particles before each round. This scheme has the advantage that the pure entangled quantum signal source is feasible at present and any eavesdropper cannot steal the message.


Chinese Physics Letters | 2006

Efficient Quantum Cryptography Network without Entanglement and Quantum Memory

Li Chun-Yan; Li Xi-Han; Deng Fu-Guo; Zhou Ping; Liang Yu-Jie; Zhou Hong-Yu

Chun-Yan Li, Xi-Han Li, Fu-Guo Deng1,2,3†, Ping Zhou, Yu-Jie Liang, Hong-Yu Zhou 1 The Key Laboratory of Beam Technology and Material Modification of Ministry of Education, Beijing Normal University, Beijing 100875 2 Institute of Low Energy Nuclear Physics, and Department of Material Science and Engineering, Beijing Normal University, Beijing 100875 3 Beijing Radiation Center, Beijing 100875 (Dated: February 1, 2008)An efficient quantum cryptography network protocol is proposed with d-dimensional polarized photons, without resorting to entanglement and quantum memory. A server on the network, say Alice, provides the service for preparing and measuring single photons whose initial state are |0. The users code the information on the single photons with some unitary operations. To prevent the untrustworthy server Alice from eavesdropping the quantum lines, a nonorthogonal-coding technique is used in the process that the quantum signal is transmitted between the users. This protocol does not require the servers and the users to store the quantum states and almost all of the single photons can be used for carrying the information, which makes it more convenient for application than others with present technology. We also discuss the case with a faint laser pulse.


Chinese Physics Letters | 2007

Controlled Teleportation of an Arbitrary Multi-Qudit State in a General Form with d-Dimensional Greenberger--Horne--Zeilinger States

Li Xi-Han; Deng Fu-Guo; Zhou Hong-Yu

A general scheme for controlled teleportation of an arbitrary multi-qudit state with d-dimensional Greenberger-Horne-Zeilinger (GHZ) states is proposed. For an arbitrary m-qudit state, the sender Alice performs m generalized Bell-state projective measurements on her 2m qudits and the controllers need only take some single-particle measurements. The receiver Charlie can reconstruct the unknown m-qudit state by performing some single-qudit unitary operations on her particles if she cooperates with all the controllers. As the quantum channel is a sequence of maximally entangled GHZ states, the intrinsic efficiency for qudits in this scheme approaches 100% in principle.A general scheme for controlled teleportation of an arbitrary multi-qudit state with d-dimensional Greenberger–Horne–Zeilinger (GHZ) states is proposed. For an arbitrary m-qudit state, the sender Alice performs m generalized Bell-state projective measurements on her 2m qudits and the controllers need only take some single-particle measurements. The receiver Charlie can reconstruct the unknown m-qudit state by performing some single-qudit unitary operations on her particles if she cooperates with all the controllers. As the quantum channel is a sequence of maximally entangled GHZ states, the intrinsic efficiency for qudits in this scheme approaches 100% in principle.


Chinese Physics Letters | 2006

Quantum Secure Direct Communication Network with Two-Step Protocol

Li Xi-Han; Zhou Ping; Liang Yu-Jie; Li Chun-Yan; Zhou Hong-Yu; Deng Fu-Guo

An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein?Podolsky?Rosen (EPR) pair block as the quantum information carrier. The server, say Alice, prepares and measures the EPR pairs in the quantum communication and the users perform the four local unitary operations to encode their message. Anyone of the legitimate users can communicate another one on the network securely. Since almost all of the instances in this scheme are useful and each EPR pair can carry two bits of information, the efficiency for qubits and the source capacity both approach the maximal values.


Chinese Physics Letters | 2006

Efficient Multiparty Quantum Secret Sharing with Greenberger--Horne--Zeilinger States

Deng Fu-Guo; Zhou Ping; Li Xi-Han; Li Chun-Yan; Zhou Hong-Yu

An efficient multiparty quantum secret sharing scheme is proposed with Greenberger–Horne–Zeilinger (GHZ) states following some ideas in quantum dense coding. The agents take the single-photon measurements on the photons received for eavesdropping check and exploit the four local unitary operations I, σz, σx and iσy to code their message. This scheme has the advantage of high capacity as each GHZ state can carry two bits of information. The parties do not need to announce the measuring bases for almost all the photons, which will reduce the classical information exchanged largely. The intrinsic efficiency for qubits and the total efficiency both approach the maximal values.


Chinese Physics Letters | 2006

Multiparty Quantum Secret Report

Deng Fu-Guo; Li Xi-Han; Li Chun-Yan; Zhou Ping; Liang Yu-Jie; Zhou Hong-Yu

A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M+1)-particle Greenberger?Horne?Zeilinger (GHZ) states that only Alice knows which state each (M+1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a ?x operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measuring them with two measuring bases. After confirming the security of the quantum key, they use the remaining GHZ states repeatedly for the next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for the qubits and total efficiency.A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her


Chinese Physics | 2007

Eavesdropping on the `ping-pong' quantum communication protocol freely in a noise channel

Deng Fu-Guo; Li Xi-Han; Li Chun-Yan; Zhou Ping; Zhou Hong-Yu

M


Chinese Physics Letters | 2007

Efficient Three-Party Quantum Secret Sharing with Single Photons

Zhou Ping; Li Xi-Han; Deng Fu-Guo; Zhou Hong-Yu

agents first share a sequence of (


Chinese Physics Letters | 2007

Multiparty Quantum Remote Secret Conference

Li Xi-Han; Li Chun-Yan; Deng Fu-Guo; Zhou Ping; Liang Yu-Jie; Zhou Hong-Yu

M

Collaboration


Dive into the Li Xi-Han's collaboration.

Top Co-Authors

Avatar

Deng Fu-Guo

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Zhou Hong-Yu

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Zhou Ping

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Li Chun-Yan

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Liang Yu-Jie

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Liu Zu-Hua

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Sheng Yu-Bo

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge