Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ronghua Shi is active.

Publication


Featured researches published by Ronghua Shi.


Physica Scripta | 2010

Secure networking quantum key distribution schemes with Greenberger–Horne–Zeilinger states

Ying Guo; Ronghua Shi; Guihua Zeng

A novel approach to quantum cryptography to be called NQKD, networking quantum key distribution, has been developed for secure quantum communication schemes on the basis of the complementary relations of entanglement Greenberger–Horne–Zeilinger (GHZ) triplet states. One scheme distributes the private key among legal participants in a probabilistic manner, while another transmits the deterministic message with some certainty. Some decoy photons are employed for preventing a potential eavesdropper from attacking quantum channels. The present schemes are efficient as there exists an elegant method for key distributions. The security of the proposed schemes is exactly guaranteed by the entanglement of the GHZ quantum system, which is illustrated in security analysis.


Quantum Information Processing | 2013

Probabilistic quantum relay communication in the noisy channel with analogous space-time code

Jinjing Shi; Ronghua Shi; Ying Guo; Xiaoqi Peng; Moon Ho Lee

Motivated by the space-time diversity transmission technique in wireless communications, a novel probabilistic quantum relay communication scheme in the quantum noisy channel is proposed in order to maximize the correct information transmission and the range of quantum communication, in which quantum signal sequences that carrying two-particle entangled states are transmitted from two senders to two relays and then retransmitted to the receiver after space-time encoded by relays. The quantum signal states can be restored via filtering out the channel noise with two-dimensional Bell measurements by the receiver. Analysis and discussions indicate that our scheme can increase and approximately double the range of quantum communication while not to reduce too much quantum signal-to-noise ratio, and meanwhile the security can be guaranteed under strongest collective attacks and LOCC attacks.


Quantum Information Processing | 2018

Coherent attacking continuous-variable quantum key distribution with entanglement in the middle

Zhaoyuan Zhang; Ronghua Shi; Guihua Zeng; Ying Guo

We suggest an approach on the coherent attack of continuous-variable quantum key distribution (CVQKD) with an untrusted entangled source in the middle. The coherent attack strategy can be performed on the double links of quantum system, enabling the eavesdropper to steal more information from the proposed scheme using the entanglement correlation. Numeric simulation results show the improved performance of the attacked CVQKD system in terms of the derived secret key rate with the controllable parameters maximizing the stolen information.


Physica Scripta | 2016

Quantum blind dual-signature scheme without arbitrator

Wei Li; Ronghua Shi; Dazu Huang; Jinjing Shi; Ying Guo

Motivated by the elegant features of a bind signature, we suggest the design of a quantum blind dual-signature scheme with three phases, i.e., initial phase, signing phase and verification phase. Different from conventional schemes, legal messages are signed not only by the blind signatory but also by the sender in the signing phase. It does not rely much on an arbitrator in the verification phase as the previous quantum signature schemes usually do. The security is guaranteed by entanglement in quantum information processing. Security analysis demonstrates that the signature can be neither forged nor disavowed by illegal participants or attacker. It provides a potential application for e-commerce or e-payment systems with the current technology.


Quantum Information Processing | 2015

Continuous-variable quantum key distribution under the local oscillator intensity attack with noiseless linear amplifier

Fangli Yang; Ronghua Shi; Ying Guo; Jinjing Shi; Guihua Zeng

An improved continuous-variable quantum key distribution (CVQKD) protocol is proposed to improve the performance of CVQKD system under the local oscillator intensity attack by using a suitable noiseless linear amplifier (NLA) at the destination. This method can enhance the efficiency of the CVQKD scheme in terms of the maximum transmission distance, no matter whether the direct or reverse reconciliation is used. Simulation results show that there is a considerable increase in the transmission distance for the NLA-based CVQKD by adjusting the values of the parameters.


Chinese Physics B | 2016

Quantum dual signature scheme based on coherent states with entanglement swapping

Jia-Li Liu; Ronghua Shi; Jinjing Shi; Geli Lv; Ying Guo

A novel quantum dual signature scheme, which combines two signed messages expected to be sent to two diverse receivers Bob and Charlie, is designed by applying entanglement swapping with coherent states. The signatory Alice signs two different messages with unitary operations (corresponding to the secret keys) and applies entanglement swapping to generate a quantum dual signature. The dual signature is firstly sent to the verifier Bob who extracts and verifies the signature of one message and transmits the rest of the dual signature to the verifier Charlie who verifies the signature of the other message. The transmission of the dual signature is realized with quantum teleportation of coherent states. The analysis shows that the security of secret keys and the security criteria of the signature protocol can be greatly guaranteed. An extensional multi-party quantum dual signature scheme which considers the case with more than three participants is also proposed in this paper and this scheme can remain secure. The proposed schemes are completely suited for the quantum communication network including multiple participants and can be applied to the e-commerce system which requires a secure payment among the customer, business and bank.


CSS | 2013

Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System

Ronghua Shi; Ye Kang; Zhaoyuan Zhang

An novel quantum secret sharing (QSS) scheme is proposed based on Chinese Remainder Theory (CRT) with hyperchaotic encryption algorithm. The usage of hyperchaotic encryption strengthens the security of the quantum message. In addition, this scheme has high source capacity and convenience due to the utilization of GHZ measurement and high-dimension quantum channel. The analysis shows the presented protocol can resist the attacks from both outside eavesdroppers and inside dishonest participants.


Quantum Information Processing | 2018

Squeezed-state quantum key distribution with a Rindler observer

Jian Zhou; Ronghua Shi; Ying Guo

Lengthening the maximum transmission distance of quantum key distribution plays a vital role in quantum information processing. In this paper, we propose a directional squeezed-state protocol with signals detected by a Rindler observer in the relativistic quantum field framework. We derive an analytical solution to the transmission problem of squeezed states from the inertial sender to the accelerated receiver. The variance of the involved signal mode is closer to optimality than that of the coherent-state-based protocol. Simulation results show that the proposed protocol has better performance than the coherent-state counterpart especially in terms of the maximal transmission distance.


Chinese Physics B | 2016

Anonymous voting for multi-dimensional CV quantum system*

Ronghua Shi; Yi Xiao; Jinjing Shi; Ying Guo; Moon Ho Lee

We investigate the design of anonymous voting protocols, CV-based binary-valued ballot and CV-based multi-valued ballot with continuous variables (CV) in a multi-dimensional quantum cryptosystem to ensure the security of voting procedure and data privacy. The quantum entangled states are employed in the continuous variable quantum system to carry the voting information and assist information transmission, which takes the advantage of the GHZ-like states in terms of improving the utilization of quantum states by decreasing the number of required quantum states. It provides a potential approach to achieve the efficient quantum anonymous voting with high transmission security, especially in large-scale votes.


International Journal of Internet Protocol Technology | 2014

Quantum states sharing in the relay system with teleportation of non-maximally entanglement

Jinjing Shi; Ronghua Shi; Yin Li; Ye Kang; Xiaoqi Peng

A novel scheme for multi-quantum-state sharing is proposed based on the relay system with teleportation in the non-maximally-entangled channel in order to improve the efficiency of secure distribution of quantum states for communications. Multi quantum states are encoded as quantum packets and teleported from the source to the destination with assistance of the relay. It demonstrates that secure multi quantum states sharing can be achieved and meanwhile the range of quantum communication can be increased and approximately doubled. It provides a valuable application prospect in long distance reliable communications and a wide application to quantum networks.

Collaboration


Dive into the Ronghua Shi's collaboration.

Top Co-Authors

Avatar

Jinjing Shi

Central South University

View shared research outputs
Top Co-Authors

Avatar

Ying Guo

Central South University

View shared research outputs
Top Co-Authors

Avatar

Ying Guo

Central South University

View shared research outputs
Top Co-Authors

Avatar

Moon Ho Lee

Chonbuk National University

View shared research outputs
Top Co-Authors

Avatar

Guihua Zeng

Shanghai Jiao Tong University

View shared research outputs
Top Co-Authors

Avatar

Xiaoqi Peng

Hunan First Normal University

View shared research outputs
Top Co-Authors

Avatar

Dazu Huang

Central South University

View shared research outputs
Top Co-Authors

Avatar

Zhaoyuan Zhang

Central South University

View shared research outputs
Top Co-Authors

Avatar

Wei Li

Central South University

View shared research outputs
Top Co-Authors

Avatar

Yin Li

Central South University

View shared research outputs
Researchain Logo
Decentralizing Knowledge