Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mu-Sheng Jiang is active.

Publication


Featured researches published by Mu-Sheng Jiang.


Optics Express | 2016

Practical round-robin differential phase-shift quantum key distribution.

Ying-Ying Zhang; Wan-Su Bao; Chun Zhou; Hong-Wei Li; Yang Wang; Mu-Sheng Jiang

Recently, a novel protocol named round-robin differential phase-shift (RRDPS) quantum key distribution [Nature 509, 475(2014)] has been proposed. It can estimate information leakage without monitoring bit error rate. In this paper, we study the performance of RRDPS using heralded single photon source (HSPS) without and with decoy-state method, then compare it with the performance of weak coherent pulses (WCPs). From numerical simulation, we can see that HSPS performs better especially for shorter packet and higher bit error rate. Moreover, we propose a general theory of decoy-state method for RRDPS protocol based on only three decoy states and one signal state. Taking WCPs as an example, the three-intensity decoy-state protocol can distribute secret keys over a distance of 128 km when the length of pulses packet is 32, which confirms great practical interest of our method.


Optics Express | 2017

Finite-key bound for semi-device-independent quantum key distribution.

Chun Zhou; Peng Xu; Wan-Su Bao; Yang Wang; Ying-Ying Zhang; Mu-Sheng Jiang; Hong-Wei Li

The device-independent (DI) quantum key distribution (QKD) protocol requires minimal assumptions about the devices and its security relies on the violation of Bell inequalities, making it hard to realize in real world. Semi-device-independent (SDI) QKD protocol confines quantum state within finite dimensional Hilbert space, thus easier for implementation with existing experimental technology. In this paper, we propose a practical SDI prepare-and-measure BB84 protocol. By introducing min entropy for security proof, we obtain a security bound under the practical condition with finite resources. Numerical simulations imply the finite-key effect can not be ignored in the forthcoming SDI QKD experiment.


Optics Express | 2016

Detector-decoy high-dimensional quantum key distribution

Hai-Ze Bao; Wan-Su Bao; Yang Wang; Rui-Ke Chen; Chun Zhou; Mu-Sheng Jiang; Hong-Wei Li

The decoy-state high-dimensional quantum key distribution provides a practical secure way to share more private information with high photon-information efficiency. In this paper, based on detector-decoy method, we propose a detector-decoy high-dimensional quantum key distribution protocol. Employing threshold detectors and a variable attenuator, we can promise the security under Gsussian collective attacks with much simpler operations in practical implementation. By numerical evaluation, we show that without varying the source intensity, our protocol performs much better than one-decoy-state protocol and as well as the two-decoy-state protocol in the infinite-size regime. In the finite-size regime, our protocol can achieve better results. Specially, when the detector efficiency is lower, the advantage of the detector-decoy method becomes more prominent.


Communications in Theoretical Physics | 2017

Fluctuations of Internal Transmittance in Security of Measurement-Device-Independent Quantum Key Distribution with an Untrusted Source*

Yang Wang; Wan-Su Bao; Rui-Ke Chen; Chun Zhou; Mu-Sheng Jiang; Hong-Wei Li

Measurement-device-independent quantum key distribution (MDI-QKD) is immune to detector side channel attacks, which is a crucial security loophole problem in traditional QKD. In order to relax a key assumption that the sources are trusted in MDI-QKD, an MDI-QKD protocol with an untrusted source has been proposed. For the security of MDI-QKD with an untrusted source, imperfections in the practical experiment should also be taken into account. In this paper, we analyze the effects of fluctuations of internal transmittance on the security of a decoy-state MDI-QKD protocol with an untrusted source. Our numerical results show that both the secret key rate and the maximum secure transmission distance decrease when taken fluctuations of internal transmittance into consideration. Especially, they are more sensitive when Charlies mean photon number per pulse is smaller. Our results emphasize that the stability of correlative optical devices is important for practical implementations.


Chinese Physics B | 2017

Round-robin differential quadrature phase-shift quantum key distribution*

Chun Zhou; Ying-Ying Zhang; Wan-Su Bao; Hong-Wei Li; Yang Wang; Mu-Sheng Jiang

Recently, a round-robin differential phase-shift (RRDPS) protocol was proposed [Nature 509, 475 (2014)], in which the amount of leakage is bounded without monitoring the signal disturbance. Introducing states of the phase-encoded Bennett–Brassard 1984 protocol (PE-BB84) to the RRDPS, this paper presents another quantum key distribution protocol called round-robin differential quadrature phase-shift (RRDQPS) quantum key distribution. Regarding a train of many pulses as a single packet, the sender modulates the phase of each pulse by one of {0, π/2, π, 3π/2}, then the receiver measures each packet with a Mach–Zehnder interferometer having a phase basis of 0 or π/2. The RRDQPS protocol can be implemented with essential similar hardware to the PE-BB84, so it has great compatibility with the current quantum system. Here we analyze the security of the RRDQPS protocol against the intercept-resend attack and the beam-splitting attack. Results show that the proposed protocol inherits the advantages arising from the simplicity of the RRDPS protocol and is more robust against these attacks than the original protocol.


Physics Letters A | 2017

High-dimensional quantum key distribution with the entangled single-photon-added coherent state

Yang Wang; Wan-Su Bao; Hai-Ze Bao; Chun Zhou; Mu-Sheng Jiang; Hong-Wei Li


Physical Review A | 2016

Tight finite-key analysis of a practical decoy-state quantum key distribution with unstable sources

Yang Wang; Wan-Su Bao; Chun Zhou; Mu-Sheng Jiang; Hong-Wei Li


Chinese Physics Letters | 2017

Passive Decoy-State Reference-Frame-Independent Quantum Key Distribution with Heralded Single-Photon Source

Jia-Ji Li; Yang Wang; Hong-Wei Li; Peng Peng; Chun Zhou; Mu-Sheng Jiang; Hong-Xin Ma; Lin-Xi Feng; Wan-Su Bao


Chinese Physics B | 2018

Controlling a sine wave gating single-photon detector by exploiting its filtering loophole

Lin-Xi Feng; Mu-Sheng Jiang; Wan-Su Bao; Hong-Wei Li; Chun Zhou; Yang Wang


Chinese Physics Letters | 2017

Asymmetric Decoy State Measurement-Device-Independent Quantum Cryptographic Conferencing

Rui-Ke Chen; Wan-Su Bao; Hai-Ze Bao; Chun Zhou; Mu-Sheng Jiang; Hong-Wei Li

Collaboration


Dive into the Mu-Sheng Jiang's collaboration.

Top Co-Authors

Avatar

Chun Zhou

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Hong-Wei Li

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Wan-Su Bao

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Yang Wang

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Ying-Ying Zhang

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Hai-Ze Bao

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Rui-Ke Chen

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Hong-Xin Ma

University of Science and Technology of China

View shared research outputs
Researchain Logo
Decentralizing Knowledge