Wan-Su Bao
University of Science and Technology of China
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Wan-Su Bao.
Physical Review A | 2014
Yuan Li; Wan-Su Bao; Hong-Wei Li; Chun Zhou; Yang Wang
Passive decoy-state quantum key distribution (QKD) systems, proven to be more desirable than the active ones in some scenarios, also have the problem of device imperfections like intensity fluctuations. In this paper, the formula of key generation rate of the passive decoy-state protocol using the weak coherent pulse (WCP) source with intensity fluctuation is given, and then the influence of intensity fluctuations on the performance of the passive decoy-state protocol is rigorously characterized. From numerical simulations, it can be seen that intensity fluctuations have non-negligible influence on the performance of the passive decoy-state QKD protocol with WCP source. Most importantly, our simulations show that, under the same deviation of intensity fluctuations, the passive decoy-state method performs better than the active one decoy-state method and is close to the active vacuum + weak decoy-state method.
Physical Review A | 2015
Chun Zhou; Wan-Su Bao; Hai-long Zhang; Hong-Wei Li; Yang Wang; Yuan Li; Xiang Wang
So far, most of existed single-shot quantum coin flipping(QCF) protocols failed in a noisy quantum channel. Here, we present a nested-structured framework that makes it possible to achieve partially noise-tolerant QCF, due to that there is a trade-off between the security and the justice correctness. It is showed that noise-tolerant single-shot QCF protocols can be produced by filling the presented framework up with existed or even future protocols. We also proved a lower bound of 0.25, with which a cheating Alice or Bob could bias the outcome.
Physical Review A | 2014
Chun Zhou; Wan-Su Bao; Hong-Wei Li; Yang Wang; Yuan Li; Zhen-Qiang Yin; Wei Chen; Zheng-Fu Han
For quantum key distribution (QKD) using spontaneous parametric-down-conversion sources (SPDCSs), the passive decoy-state protocol has been proved to be efficiently close to the theoretical limit of an infinite decoy-state protocol. In this paper, we apply a tight finite-key analysis for the passive decoy-state QKD using SPDCSs. Combining the security bound based on the uncertainty principle with the passive decoy-state protocol, a concise and stringent formula for calculating the key generation rate for QKD using SPDCSs is presented. The simulation shows that the secure distance under our formula can reach up to 182 km when the number of sifted data is
Chinese Physics B | 2016
Hong-Xin Ma; Wan-Su Bao; Hong-Wei Li; Chun Chou
10^{10}
Optics Express | 2016
Ying-Ying Zhang; Wan-Su Bao; Chun Zhou; Hong-Wei Li; Yang Wang; Mu-Sheng Jiang
. Our results also indicate that, under the same deviation of statistical fluctuation due to finite-size effects, the passive decoy-state QKD with SPDCSs can perform as well as the active decoy-state QKD with a weak coherent source.
Quantum Information Processing | 2017
He-Liang Huang; Wan-Su Bao; Tan Li; Feng-Guang Li; Xiang-Qun Fu; Shuo Zhang; Hai-Long Zhang; Xiang Wang
We present a Trojan-horse attack on the practical two-way continuous-variable quantum key distribution system. Our attack mainly focuses on the imperfection of the practical system that the modulator has a redundancy of modulation pulse-width, which leaves a loophole for the eavesdropper inserting a Trojan-horse pulse. Utilizing the unique characteristics of two-way continuous-variable quantum key distribution that Alice only takes modulation operation on the received mode without any measurement, this attack allows the eavesdropper to render all of the final keys shared between the legitimate parties insecure without being detected. After analyzing the feasibility of the attack, the corresponding countermeasures are put forward.
Optics Express | 2016
Rui-Ke Chen; Wan-Su Bao; Chun Zhou; Hong-Wei Li; Yang Wang; Hai-Ze Bao
Recently, a novel protocol named round-robin differential phase-shift (RRDPS) quantum key distribution [Nature 509, 475(2014)] has been proposed. It can estimate information leakage without monitoring bit error rate. In this paper, we study the performance of RRDPS using heralded single photon source (HSPS) without and with decoy-state method, then compare it with the performance of weak coherent pulses (WCPs). From numerical simulation, we can see that HSPS performs better especially for shorter packet and higher bit error rate. Moreover, we propose a general theory of decoy-state method for RRDPS protocol based on only three decoy states and one signal state. Taking WCPs as an example, the three-intensity decoy-state protocol can distribute secret keys over a distance of 128 km when the length of pulses packet is 32, which confirms great practical interest of our method.
Journal of Physics A | 2016
Hai-Ze Bao; Wan-Su Bao; Yang Wang; Chun Zhou; Rui-Ke Chen
As progress on the development of building quantum computer continues to advance, first-generation practical quantum computers will be available for ordinary users in the cloud style similar to IBM’s QuantumExperience nowadays. Clients can remotely access the quantum servers using some simple devices. In such a situation, it is of prime importance to keep the security of the client’s information. Blind quantum computation protocols enable a client with limited quantum technology to delegate her quantum computation to a quantum server without leaking any privacy. To date, blind quantum computation has been considered only for an individual quantum system. However, practical universal quantum computer is likely to be a hybrid system. Here, we take the first step to construct a framework of blind quantum computation for the hybrid system, which provides a more feasible way for scalable blind quantum computation.
Quantum Information Processing | 2014
Chun Zhou; Wan-Su Bao; Hong-Wei Li; Yang Wang; XiangQun Fu
In recent years, a large quantity of work have been done to narrow the gap between theory and practice in quantum key distribution (QKD). However, most of them are focus on two-party protocols. Very recently, Yao Fu et al proposed a measurement-device-independent quantum cryptographic conferencing (MDI-QCC) protocol and proved its security in the limit of infinitely long keys. As a step towards practical application for MDI-QCC, we design a biased decoy-state measurement-device-independent quantum cryptographic conferencing protocol and analyze the performance of the protocol in both the finite-key and infinite-key regime. From numerical simulations, we show that our decoy-state analysis is tighter than Yao Fu et al. That is, we can achieve the nonzero asymptotic secret key rate in long distance with approximate to 200km and we also demonstrate that with a finite size of data (say 1011 to 1013 signals) it is possible to perform secure MDI-QCC over reasonable distances.
Scientific Reports | 2017
He-Liang Huang; Han-Sen Zhong; Tan Li; Feng-Guang Li; Xiang-Qun Fu; Shuo Zhang; Xiang Wang; Wan-Su Bao
Compared with two-level quantum key distribution (QKD), highdimensional QKD enable two distant parties to share a secret key at a higher rate. We provide a finite-key security analysis for the recently proposed practical highdimensional decoy-state QKD protocol based on time-energy entanglement. We employ two methods to estimate the statistical fluctuation of the postselection probability and give a tighter bound on the secure-key capacity. By numerical evaluation, we show the finite-key effect on the secure-key capacity in different conditions. Moreover, our approach could be used to optimize parameters in practical implementations of highdimensional QKD.