Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Teng-Yun Chen is active.

Publication


Featured researches published by Teng-Yun Chen.


Optics Express | 2010

Decoy-state quantum key distribution with polarized photons over 200 km

Yang Liu; Teng-Yun Chen; Jian Wang; Wen-Qi Cai; Xu Wan; Luo-Kan Chen; Jin-Hong Wang; Shu-Bin Liu; Hao Liang; Lin Yang; Cheng-Zhi Peng; Kai Chen; Zeng-Bing Chen; Jian-Wei Pan

We report an implementation of decoy-state quantum key distribution (QKD) over 200 km optical fiber cable through photon polarization encoding. This is achieved by constructing the whole QKD system operating at 320 MHz repetition rate, and developing high-speed transmitter and receiver modules. A novel and economic way of synchronization method is designed and incorporated into the system, which allows to work at a low frequency of 40kHz and removes the use of highly precise clock. A final key rate of 15 Hz is distributed within the experimental time of 3089 seconds, by using super-conducting single photon detectors. This is longest decoy-state QKD yet demonstrated up to date. It helps to make a significant step towards practical secure communication in long-distance scope.We demonstrate the decoy-state quantum key distribution ov er 200 km with photon polarization through optical fiber, by usi ng superconducting single photon detector with a repetition rate of 320 Mega Hz and a dark count rate of lower than 1 Hz. Since we have used the pola rization coding, the synchronization pulses can be run in a low freque ncy. The final key rate is 14.1 Hz. The experiment lasts for 3089 seconds wit h 43555 total final bits.


Optics Express | 2010

Metropolitan all-pass and inter-city quantum communication network

Teng-Yun Chen; Jian Wang; Hao Liang; Weiyue Liu; Yang Liu; Xiao Jiang; Yuan Wang; Xu Wan; Wen-Qi Cai; Lei Ju; Luo-Kan Chen; Liu-Jun Wang; Yuan Gao (高原); Kai Chen; Cheng-Zhi Peng; Zeng-Bing Chen; Jian-Wei Pan

We have demonstrated a metropolitan all-pass quantum communication network in field fiber for four nodes. Any two nodes of them can be connected in the network to perform quantum key distribution (QKD). An optical switching module is presented that enables arbitrary 2-connectivity among output ports. Integrated QKD terminals are worked out, which can operate either as a transmitter, a receiver, or even both at the same time. Furthermore, an additional link in another city of 60 km fiber (up to 130 km) is seamless integrated into this network based on a trusted relay architecture. On all the links, we have implemented protocol of decoy state scheme. All of necessary electrical hardware, synchronization, feedback control, network software, execution of QKD protocols are made by tailored designing, which allow a completely automatical and stable running. Our system has been put into operation in Hefei in August 2009, and publicly demonstrated during an evaluation conference on quantum network organized by the Chinese Academy of Sciences on August 29, 2009. Real-time voice telephone with one-time pad encoding between any two of the five nodes (four all-pass nodes plus one additional node through relay) is successfully established in the network within 60 km.


Optics Express | 2009

Field test of a practical secure communication network with decoy-state quantum cryptography.

Teng-Yun Chen; Hao Liang; Yang Liu; Wen-Qi Cai; Lei Ju; Weiyue Liu; Jian Wang; Hao Yin; Kai Chen; Zeng-Bing Chen; Cheng-Zhi Peng; Jian-Wei Pan

We present a secure network communication system that operated with decoy-state quantum cryptography in a real-world application scenario. The full key exchange and application protocols were performed in real time among three nodes, in which two adjacent nodes were connected by approximate 20 km of commercial telecom optical fiber. The generated quantum keys were immediately employed and demonstrated for communication applications, including unbreakable real-time voice telephone between any two of the three communication nodes, or a broadcast from one node to the other two nodes by using one-time pad encryption.


Physical Review Letters | 2007

Optical nondestructive controlled-NOT gate without using entangled photons

Xiao-Hui Bao; Teng-Yun Chen; Qiang Zhang; Jian Yang; Han Zhang; Tao Yang; Jian-Wei Pan

We present and experimentally demonstrate a novel optical nondestructive controlled-NOT gate without using entangled ancilla. With much fewer measurements compared with quantum process tomography, we get a good estimation of the gate fidelity. The result shows a great improvement compared with previous experiments. Moreover, we also show that quantum parallelism is achieved in our gate and the performance of the gate can not be reproduced by local operations and classical communications.


Physical Review Letters | 2006

Experimental synchronization of independent entangled photon sources.

Tao Yang; Qiang Zhang; Teng-Yun Chen; Shan Lu; Juan Yin; Jian-Wei Pan; Zhiyi Wei; Jing-Rong Tian; Jie Zhang

We report the generation of independent entangled photon pairs from two synchronized but mutually incoherent laser sources. The quality of synchronization is confirmed by observing a violation of Bells inequality with 3.2 standard deviations in an entanglement swapping experiment. The techniques developed in our experiment are not only important for realistic linear optical quantum-information processing, but also enable new tests of local realism.


Physical Review A | 2013

Source attack of decoy-state quantum key distribution using phase information

Yan-Lin Tang; H. Yin; Xiongfeng Ma; Chi-Hang Fred Fung; Yang Liu; Hai-Lin Yong; Teng-Yun Chen; Cheng-Zhi Peng; Zeng-Bing Chen; Jian-Wei Pan

Quantum key distribution (QKD) utilizes the laws of quantum mechanics to achieve information-theoretically secure key generation. This field is now approaching the stage of commercialization, but many practical QKD systems still suffer from security loopholes due to imperfect devices. In fact, practical attacks have successfully been demonstrated. Fortunately, most of them only exploit detection-side loopholes, which are now closed by the recent idea of measurement-device-independent QKD. On the other hand, little attention is paid to the source, which may still leave QKD systems insecure. In this work, we propose and demonstrate an attack that exploits a source-side loophole existing in qubit-based QKD systems using a weak coherent state source and decoy states. Specifically, by implementing a linear-optics unambiguous state discrimination measurement, we show that the security of a system without phase randomization—which is a step assumed in conventional security analyses but sometimes neglected in practice—can be compromised. We conclude that implementing phase randomization is essential to the security of decoy-state QKD systems under current security analyses.


Physical Review Letters | 2006

Experimental Quantum Communication without a Shared Reference Frame

Teng-Yun Chen; Jun Zhang; J. C. Boileau; Xian-Min Jin; Bin Yang; Qiang Zhang; Tao Yang; Raymond Laflamme; Jian-Wei Pan

We present an experimental realization of a robust quantum communication scheme [Phys. Rev. Lett. 93, 220501 (2004)] using pairs of photons entangled in polarization and time. Our method overcomes errors due to collective rotation of the polarization modes (e.g., birefringence in optical fiber or misalignment), is insensitive to the phases fluctuation of the interferometer, and does not require any shared reference frame including time reference, except the need to label different photons. The practical robustness of the scheme is further shown by implementing a variation of the Bennett-Brassard 1984 quantum key distribution protocol over 1 km optical fiber.


Physical Review X | 2016

Measurement-Device-Independent Quantum Key Distribution over Untrustful Metropolitan Network

Yan-Lin Tang; H. Yin; Qi Zhao; Hui Liu; X.F. Sun; Ming-Qi Huang; Weijun Zhang; S. J. Chen; Lu Zhang; Lixing You; Zhen Wang; Yang Liu; Chao-Yang Lu; Xiao Jiang; Xiongfeng Ma; Qiang Zhang; Teng-Yun Chen; Jian-Wei Pan

Quantum cryptography holds the promise to establish an information-theoretically secure global network. All field tests of metropolitan-scale quantum networks to date are based on trusted relays. The security critically relies on the accountability of the trusted relays, which will break down if the relay is dishonest or compromised. Here, we construct a measurement-device-independent quantum key distribution (MDIQKD) network in a star topology over a 200 square kilometers metropolitan area, which is secure against untrustful relays and against all detection attacks. In the field test, our system continuously runs through one week with a secure key rate ten times larger than previous result. Our results demonstrate that the MDIQKD network, combining the best of both worlds --- security and practicality, constitutes an appealing solution to secure metropolitan communications.


Physical Review Letters | 2014

Experimental unconditionally secure bit commitment

Yang Liu; Yuan Cao; Marcos Curty; Sheng-Kai Liao; Jian Wang; Ke Cui; Yu-Huai Li; Ze-Hong Lin; Qi-Chao Sun; Dong-Dong Li; Hong-fei Zhang; Yong Zhao; Teng-Yun Chen; Cheng-Zhi Peng; Qiang Zhang; Adan Cabello; Jian-Wei Pan

Quantum physics allows for unconditionally secure communication between parties that trust each other. However, when the parties do not trust each other such as in the bit commitment scenario, quantum physics is not enough to guarantee security unless extra assumptions are made. Unconditionally secure bit commitment only becomes feasible when quantum physics is combined with relativistic causality constraints. Here we experimentally implement a quantum bit commitment protocol with relativistic constraints that offers unconditional security. The commitment is made through quantum measurements in two quantum key distribution systems in which the results are transmitted via free-space optical communication to two agents separated with more than 20 km. The security of the protocol relies on the properties of quantum information and relativity theory. In each run of the experiment, a bit is successfully committed with less than 5.68×10(-2) cheating probability. This demonstrates the experimental feasibility of quantum communication with relativistic constraints.


IEEE Journal of Selected Topics in Quantum Electronics | 2015

Field Test of Measurement-Device-Independent Quantum Key Distribution

Yan-Lin Tang; H. Yin; S. J. Chen; Yang Liu; Weijun Zhang; Xiao Jiang; Lu Zhang; Jian Wang; Lixing You; Jian-Yu Guan; Dong-xu Yang; Zhen Wang; Hao Liang; Zhen Zhang; Nan Zhou; Xiongfeng Ma; Teng-Yun Chen; Qiang Zhang; Jian-Wei Pan

The main type of obstacles of practical applications of quantum key distribution (QKD) network are various attacks on detection. Measurement-device-independent QKD (MDIQKD) protocol is immune to all these attacks, and thus, a strong candidate for network security. Recently, several proof-of-principle demonstrations of MDIQKD have been performed. Although novel, those experiments are implemented in the laboratory with secure key rates less than 0.1 b/s. Besides, they need manual calibration frequently to maintain the system performance. These aspects render these demonstrations far from practicability. Thus, justification is extremely crucial for practical deployment into the field environment. Here, by developing an automatic feedback MDIQKD system operated at a high clock rate, we perform a field test via deployed fiber network of 30 km total length achieving a 16.9 b/s secure key rate. The result lays the foundation for a global quantum network, which can shield from all the detection-side attacks.

Collaboration


Dive into the Teng-Yun Chen's collaboration.

Top Co-Authors

Avatar

Jian-Wei Pan

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Cheng-Zhi Peng

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Yang Liu

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Jian Wang

Huazhong University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Qiang Zhang

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

H. Yin

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Hao Liang

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Lixing You

Chinese Academy of Sciences

View shared research outputs
Top Co-Authors

Avatar

Zeng-Bing Chen

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Zhen Wang

Chinese Academy of Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge