Liang Yu-Jie
Beijing Normal University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Liang Yu-Jie.
Chinese Physics | 2007
Li Xi-Han; Li Chun-Yan; Deng Fu-Guo; Zhou Ping; Liang Yu-Jie; Zhou Hong-Yu
This paper presents a scheme for quantum secure direct communication with quantum encryption. The two authorized users use repeatedly a sequence of the pure entangled pairs (quantum key) shared for encrypting and decrypting the secret message carried by the travelling photons directly. For checking eavesdropping, the two parties perform the single-photon measurements on some decoy particles before each round. This scheme has the advantage that the pure entangled quantum signal source is feasible at present and any eavesdropper cannot steal the message.
Chinese Physics Letters | 2006
Li Chun-Yan; Li Xi-Han; Deng Fu-Guo; Zhou Ping; Liang Yu-Jie; Zhou Hong-Yu
Chun-Yan Li, Xi-Han Li, Fu-Guo Deng1,2,3†, Ping Zhou, Yu-Jie Liang, Hong-Yu Zhou 1 The Key Laboratory of Beam Technology and Material Modification of Ministry of Education, Beijing Normal University, Beijing 100875 2 Institute of Low Energy Nuclear Physics, and Department of Material Science and Engineering, Beijing Normal University, Beijing 100875 3 Beijing Radiation Center, Beijing 100875 (Dated: February 1, 2008)An efficient quantum cryptography network protocol is proposed with d-dimensional polarized photons, without resorting to entanglement and quantum memory. A server on the network, say Alice, provides the service for preparing and measuring single photons whose initial state are |0. The users code the information on the single photons with some unitary operations. To prevent the untrustworthy server Alice from eavesdropping the quantum lines, a nonorthogonal-coding technique is used in the process that the quantum signal is transmitted between the users. This protocol does not require the servers and the users to store the quantum states and almost all of the single photons can be used for carrying the information, which makes it more convenient for application than others with present technology. We also discuss the case with a faint laser pulse.
Chinese Physics Letters | 2006
Li Xi-Han; Zhou Ping; Liang Yu-Jie; Li Chun-Yan; Zhou Hong-Yu; Deng Fu-Guo
An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein?Podolsky?Rosen (EPR) pair block as the quantum information carrier. The server, say Alice, prepares and measures the EPR pairs in the quantum communication and the users perform the four local unitary operations to encode their message. Anyone of the legitimate users can communicate another one on the network securely. Since almost all of the instances in this scheme are useful and each EPR pair can carry two bits of information, the efficiency for qubits and the source capacity both approach the maximal values.
Chinese Physics Letters | 2006
Deng Fu-Guo; Li Xi-Han; Li Chun-Yan; Zhou Ping; Liang Yu-Jie; Zhou Hong-Yu
A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M+1)-particle Greenberger?Horne?Zeilinger (GHZ) states that only Alice knows which state each (M+1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a ?x operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measuring them with two measuring bases. After confirming the security of the quantum key, they use the remaining GHZ states repeatedly for the next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for the qubits and total efficiency.A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her
Chinese Physics Letters | 2007
Li Xi-Han; Li Chun-Yan; Deng Fu-Guo; Zhou Ping; Liang Yu-Jie; Zhou Hong-Yu
M
Chinese Physics Letters | 2009
Liang Yu-Jie; Li Yan-Song; Liu Zu-Hua; Zhou Hong-Yu
agents first share a sequence of (
Chinese Physics Letters | 2005
Liang Yu-Jie; Li Xi-Han; Zhou Hong-Yu; Liu Zu-Hua; Deng Fu-Guo
M
Chinese Physics Letters | 2014
Wang Wenzhong; Liang Yu-Jie; Shi Honglong; Zhang Gu-Ling
+1)-particle Greenberger--Horne--Zeilinger (GHZ) states that only Alice knows which state each (
Chinese Physics Letters | 2006
Liang Yu-Jie; Li Xi-Han; Deng Fu-Guo; Liu Zu-Hua; Zhou Hong-Yu
M
Applied Surface Science | 2017
Dong Guanying; Du Bin; Liu Lei; Zhang Weiwei; Liang Yu-Jie; Shi Honglong; Wang Wenzhong
+1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a