Mu-Sheng Jiang
University of Science and Technology of China
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Mu-Sheng Jiang.
Optics Express | 2016
Ying-Ying Zhang; Wan-Su Bao; Chun Zhou; Hong-Wei Li; Yang Wang; Mu-Sheng Jiang
Recently, a novel protocol named round-robin differential phase-shift (RRDPS) quantum key distribution [Nature 509, 475(2014)] has been proposed. It can estimate information leakage without monitoring bit error rate. In this paper, we study the performance of RRDPS using heralded single photon source (HSPS) without and with decoy-state method, then compare it with the performance of weak coherent pulses (WCPs). From numerical simulation, we can see that HSPS performs better especially for shorter packet and higher bit error rate. Moreover, we propose a general theory of decoy-state method for RRDPS protocol based on only three decoy states and one signal state. Taking WCPs as an example, the three-intensity decoy-state protocol can distribute secret keys over a distance of 128 km when the length of pulses packet is 32, which confirms great practical interest of our method.
Optics Express | 2017
Chun Zhou; Peng Xu; Wan-Su Bao; Yang Wang; Ying-Ying Zhang; Mu-Sheng Jiang; Hong-Wei Li
The device-independent (DI) quantum key distribution (QKD) protocol requires minimal assumptions about the devices and its security relies on the violation of Bell inequalities, making it hard to realize in real world. Semi-device-independent (SDI) QKD protocol confines quantum state within finite dimensional Hilbert space, thus easier for implementation with existing experimental technology. In this paper, we propose a practical SDI prepare-and-measure BB84 protocol. By introducing min entropy for security proof, we obtain a security bound under the practical condition with finite resources. Numerical simulations imply the finite-key effect can not be ignored in the forthcoming SDI QKD experiment.
Optics Express | 2016
Hai-Ze Bao; Wan-Su Bao; Yang Wang; Rui-Ke Chen; Chun Zhou; Mu-Sheng Jiang; Hong-Wei Li
The decoy-state high-dimensional quantum key distribution provides a practical secure way to share more private information with high photon-information efficiency. In this paper, based on detector-decoy method, we propose a detector-decoy high-dimensional quantum key distribution protocol. Employing threshold detectors and a variable attenuator, we can promise the security under Gsussian collective attacks with much simpler operations in practical implementation. By numerical evaluation, we show that without varying the source intensity, our protocol performs much better than one-decoy-state protocol and as well as the two-decoy-state protocol in the infinite-size regime. In the finite-size regime, our protocol can achieve better results. Specially, when the detector efficiency is lower, the advantage of the detector-decoy method becomes more prominent.
Communications in Theoretical Physics | 2017
Yang Wang; Wan-Su Bao; Rui-Ke Chen; Chun Zhou; Mu-Sheng Jiang; Hong-Wei Li
Measurement-device-independent quantum key distribution (MDI-QKD) is immune to detector side channel attacks, which is a crucial security loophole problem in traditional QKD. In order to relax a key assumption that the sources are trusted in MDI-QKD, an MDI-QKD protocol with an untrusted source has been proposed. For the security of MDI-QKD with an untrusted source, imperfections in the practical experiment should also be taken into account. In this paper, we analyze the effects of fluctuations of internal transmittance on the security of a decoy-state MDI-QKD protocol with an untrusted source. Our numerical results show that both the secret key rate and the maximum secure transmission distance decrease when taken fluctuations of internal transmittance into consideration. Especially, they are more sensitive when Charlies mean photon number per pulse is smaller. Our results emphasize that the stability of correlative optical devices is important for practical implementations.
Chinese Physics B | 2017
Chun Zhou; Ying-Ying Zhang; Wan-Su Bao; Hong-Wei Li; Yang Wang; Mu-Sheng Jiang
Recently, a round-robin differential phase-shift (RRDPS) protocol was proposed [Nature 509, 475 (2014)], in which the amount of leakage is bounded without monitoring the signal disturbance. Introducing states of the phase-encoded Bennett–Brassard 1984 protocol (PE-BB84) to the RRDPS, this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift (RRDQPS) quantum key distribution. Regarding a train of many pulses as a single packet, the sender modulates the phase of each pulse by one of {0, π/2, π, 3π/2}, then the receiver measures each packet with a Mach–Zehnder interferometer having a phase basis of 0 or π/2. The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84, so it has great compatibility with the current quantum system. Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack. Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol.
Physics Letters A | 2017
Yang Wang; Wan-Su Bao; Hai-Ze Bao; Chun Zhou; Mu-Sheng Jiang; Hong-Wei Li
Physical Review A | 2016
Yang Wang; Wan-Su Bao; Chun Zhou; Mu-Sheng Jiang; Hong-Wei Li
Chinese Physics Letters | 2017
Jia-Ji Li; Yang Wang; Hong-Wei Li; Peng Peng; Chun Zhou; Mu-Sheng Jiang; Hong-Xin Ma; Lin-Xi Feng; Wan-Su Bao
Chinese Physics B | 2018
Lin-Xi Feng; Mu-Sheng Jiang; Wan-Su Bao; Hong-Wei Li; Chun Zhou; Yang Wang
Chinese Physics Letters | 2017
Rui-Ke Chen; Wan-Su Bao; Hai-Ze Bao; Chun Zhou; Mu-Sheng Jiang; Hong-Wei Li