Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Xiang-Chun Ma is active.

Publication


Featured researches published by Xiang-Chun Ma.


Physical Review A | 2013

Local oscillator fluctuation opens a loophole for Eve in practical continuous-variable quantum-key-distribution systems

Xiang-Chun Ma; Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

We consider the security of practical continuous-variable quantum-key-distribution implementation with the local oscillator (LO) fluctuating in time, which opens a loophole for Eve to intercept the secret key. We show that Eve can simulate this fluctuation to hide her Gaussian collective attack by reducing the intensity of the LO. Numerical simulations demonstrate that if Bob does not monitor the LO intensity and does not scale his measurements with the instantaneous intensity values of LO, the secret key rate will be compromised severely.


Physical Review A | 2013

Wavelength attack on practical continuous-variable quantum-key-distribution system with a heterodyne protocol

Xiang-Chun Ma; Shi-Hai Sun; Mu-Sheng Jiang; Lin-Mei Liang

We present the wavelength attack on a practical continuous-variable quantum-key-distribution system with a heterodyne protocol, in which the transmittance of beam splitters at Bobs station is wavelength dependent. Our strategy is proposed independent of but analogous to that of Huang et al. [arXiv:1206.6550v1 [quant-ph]], but in that paper the shot noise of the two beams that Eve sends to Bob, transmitting after the homodyne detector, is unconsidered. However, shot noise is the main contribution to the deviation of Bobs measurements from Eves when implementing the wavelength attack, so it must be considered accurately. In this paper, we first analyze the solutions of the equations specifically that must be satisfied in this attack, which is not considered rigorously by Huang et al. Then we calculate the shot noise of the homodyne detector accurately and conclude that the wavelength attack can be implemented successfully in some parameter regime.


Physical Review A | 2014

Gaussian-modulated coherent-state measurement-device-independent quantum key distribution

Ming Gui; Shi-Hai Sun; Xiang-Chun Ma; Mu-Sheng Jiang; Lin-Mei Liang

Measurement-device-independent quantum key distribution (MDI-QKD), leaving the detection procedure to the third partner and thus being immune to all detector side-channel attacks, is very promising for the construction of high-security quantum information networks. We propose a scheme to implement MDI-QKD, but with continuous variables instead of discrete ones, i.e., with the source of Gaussian-modulated coherent states, based on the principle of continuous-variable entanglement swapping. This protocol not only can be implemented with current telecom components but also has high key rates compared to its discrete counterpart; thus it will be highly compatible with quantum networks.


Physical Review A | 2014

Enhancement of the security of a practical continuous-variable quantum-key-distribution system by manipulating the intensity of the local oscillator

Ming Gui; Shi-Hai Sun; Xiang-Chun Ma; Mu-Sheng Jiang; Lin-Mei Liang; Yan-Li Zhou

In a practical continuous-variable quantum-key distribution (CVQKD), the fluctuations of the local oscillator (LO) not only make the normalization of Bobs measurement outcomes difficult, but also can change the signal-to-noise ratio (SNR) of an imperfect balanced homodyne detector (BHD), which may lead the security of a practical system of CVQKD to be compromised severely. In this paper, we propose that the LO intensity can be manipulated by the legitimate parties, i.e., being tuned and stabilized to a required constant value, to eliminate the impact of LO fluctuations and defeat Eves potential attack on the LO. Moreover, we show that the secret key rate can be increased over a noisy channel, especially the channels of metropolitan QKD networks, by tuning the intensity of LO and thus the SNR of a practical BHD to an optimal value, and we find that, counterintuitively, the requirement on BHD (i.e., high detection efficiency and low electronic noise) can also be reduced in this case. To realize this manipulation, we give a schematic setup which thus can be used to enhance the security of a practical CVQKD system.


Scientific Reports | 2015

Hacking on decoy-state quantum key distribution system with partial phase randomization

Shi-Hai Sun; Mu-Sheng Jiang; Xiang-Chun Ma; Chun-Yan Li; Lin-Mei Liang

Quantum key distribution (QKD) provides means for unconditional secure key transmission between two distant parties. However, in practical implementations, it suffers from quantum hacking due to device imperfections. Here we propose a hybrid measurement attack, with only linear optics, homodyne detection, and single photon detection, to the widely used vacuum + weak decoy state QKD system when the phase of source is partially randomized. Our analysis shows that, in some parameter regimes, the proposed attack would result in an entanglement breaking channel but still be able to trick the legitimate users to believe they have transmitted secure keys. That is, the eavesdropper is able to steal all the key information without discovered by the users. Thus, our proposal reveals that partial phase randomization is not sufficient to guarantee the security of phase-encoding QKD systems with weak coherent states.


Physical Review Letters | 2015

Effect of source tampering in the security of quantum cryptography

Shi-Hai Sun; Feihu Xu; Mu-Sheng Jiang; Xiang-Chun Ma; Hoi-Kwong Lo; Lin-Mei Liang

The security of source has become an increasingly important issue in quantum cryptography. Based on the framework of measurement-device-independent quantum key distribution (MDI-QKD), the source becomes the only region exploitable by a potential eavesdropper (Eve). Phase randomization is a cornerstone assumption in most discrete-variable (DV) quantum communication protocols (e.g., QKD, quantum coin tossing, weak-coherent-state blind quantum computing, and so on), and the violation of such an assumption is thus fatal to the security of those protocols. In this paper, we show a simple quantum hacking strategy, with commercial and homemade pulsed lasers, by Eve that allows her to actively tamper with the source and violate such an assumption, without leaving a trace afterwards. Furthermore, our attack may also be valid for continuous-variable (CV) QKD, which is another main class of QKD protocol, since, excepting the phase random assumption, other parameters (e.g., intensity) could also be changed, which directly determine the security of CV-QKD.


Scientific Reports | 2018

Retraction: Hacking on decoy-state quantum key distribution system with partial phase randomization

Shi-Hai Sun; Mu-Sheng Jiang; Xiang-Chun Ma; Chun-Yan Li; Lin-Mei Liang

Correction to: Scientific Reports 4: Article number: 4759; published online: 23 April 2014; updated: 09 February 2018. The authors of the study request that this Article be retracted. The authors identified an error in the Matlab code used to generate Figure 3 and Figure 4 of the Article. Although the formulas described in the Article are correct, the mistake in the code led to incorrect estimation of the final key rate when Eve is present.


Physical Review A | 2013

Intrinsic imperfection of self-differencing single-photon detectors harms the security of high-speed quantum cryptography systems

Mu-Sheng Jiang; Shi-Hai Sun; Guang-Zhao Tang; Xiang-Chun Ma; Chun-Yan Li; Lin-Mei Liang


Physical Review A | 2014

Measurement-device-independent quantum key distribution with a passive decoy-state method

Yu-Zhu Shan; Shi-Hai Sun; Xiang-Chun Ma; Mu-Sheng Jiang; Yan-Li Zhou; Lin-Mei Liang


Physical Review A | 2015

Reference-frame-independent quantum key distribution with source flaws

Can Wang; Shi-Hai Sun; Xiang-Chun Ma; Guang-Zhao Tang; Lin-Mei Liang

Collaboration


Dive into the Xiang-Chun Ma's collaboration.

Top Co-Authors

Avatar

Lin-Mei Liang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Mu-Sheng Jiang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Shi-Hai Sun

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Chun-Yan Li

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Guang-Zhao Tang

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Yan-Li Zhou

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Yu-Zhu Shan

National University of Defense Technology

View shared research outputs
Top Co-Authors

Avatar

Feihu Xu

Massachusetts Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge