Yijia Zhao
Beijing University of Posts and Telecommunications
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yijia Zhao.
Physical Review A | 2017
Xueying Zhang; Yi-Chen Zhang; Yijia Zhao; Xiangyu Wang; Song Yu; Hong Guo
We study the impact of the finite-size effect on the continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocol, mainly considering the finite-size effect on the parameter estimation procedure. The central-limit theorem and maximum likelihood estimation theorem are used to estimate the parameters. We also analyze the relationship between the number of exchanged signals and the optimal modulation variance in the protocol. It is proved that when Charlies position is close to Bob, the CV-MDI QKD protocol has the farthest transmission distance in the finite-size scenario. Finally, we discuss the impact of finite-size effects related to the practical detection in the CV-MDI QKD protocol. The overall results indicate that the finite-size effect has a great influence on the secret key rate of the CV-MDI QKD protocol and should not be ignored.
Journal of Physics B | 2017
Yi-Chen Zhang; Zhengyu Li; Yijia Zhao; Song Yu; Hong Guo
We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making a double use of the quantum channel and the potential of long-distance secure communication using two-way protocol.
Quantum Information Processing | 2017
Yijia Zhao; Yi-Chen Zhang; Zhengyu Li; Song Yu; Hong Guo
We propose a method to improve the performance of two-way continuous-variable quantum key distribution protocol by virtual photon subtraction. The virtual photon subtraction implemented via non-Gaussian post-selection not only enhances the entanglement of two-mode squeezed vacuum state but also has advantages in simplifying physical operation and promoting efficiency. In two-way protocol, virtual photon subtraction could be applied on two sources independently. Numerical simulations show that the optimal performance of renovated two-way protocol is obtained with photon subtraction only used by Alice. The transmission distance and tolerable excess noise are improved by using the virtual photon subtraction with appropriate parameters. Moreover, the tolerable excess noise maintains a high value with the increase in distance so that the robustness of two-way continuous-variable quantum key distribution system is significantly improved, especially at long transmission distance.
international conference on optoelectronics and microelectronics | 2017
Changjiang Liu; Yijia Zhao; Yi-Chen Zhang; Ziyong Zheng; Song Yu
Clock synchronization is crucial for a practical continuous-variable quantum key distribution system to precisely get the measurement result. Three different synchronization schemes for continuous-variable quantum key distribution system are presented to demonstrate the optimal scheme. The performance of synchronization scheme is evaluated by measuring the excess noise which is the critical parameter for the continuous-variable quantum key distribution system. The experiment results show that distilling the synchronization signal from the local oscillator has the simplest physical implemention and superior effect of synchronization, but a stronger local oscillator is required. Transmitting synchronization signal and quantum signal in the same fiber by wave-length division multiplex is also a fine way to provide stable clock when we take no account of the phsical device and wave-length source.
Quantum Information Science and Technology IV | 2018
Yijia Zhao; Yi-Chen Zhang; Song Yu; Hong Guo; Yundi Huang
The shot-noise unit (SNU) is a crucial factor for the practical security of a continuous-variable quantum key distribution system. In the most widely used experimental scheme, the SNU should be calibrated first and used as a constant during key distribution. Because the measurement result of quadrature is normalized with the calibration SNU but scaled with practical SNU, which could open loopholes for the eavesdropper to intercept the secret key. In this paper, we report a quantum hacking method to control the practical SNU by using the limited compensation rate for polarization drift. Since the polarization of local oscillator pulses is partially measured, the attack is implemented by manipulating the polarization of the local oscillator pulses without measurement when the system is running. The simulation and experiment results indicate that the practical SNU can be manipulated by the eavesdropper. By making the difference between the calibration and the practical SNU, the excess noise estimated by Alice and Bob could always be lower than the practice which is introduced by the eavesdropper and the distributed keys are not secure.Continuous-variable quantum key distribution is proven in theory secure against general attacks, but side channel is still a crucial problem for practical setup, since security proofs do not take into account all possible experimental imperfections. In this paper, we consider a loophole that links to electronics limitation of homodyne detection. By using this loophole, we propose a saturation attack combined with intercept-resend attack on the practical continuous-variable quantum key distribution using Gaussian-modulated coherent state protocol. Under this attack, Eve can launch a full intercept-resend attack and further influence the excess noise estimated by Alice and Bob. We analyse this saturation attack with operating protocol and show that our attack could render secret key without being discovered. We also propose a countermeasure against such saturation attack.
arXiv: Quantum Physics | 2017
Yi-Chen Zhang; Zhengyu Li; Ziyang Chen; Christian Weedbrook; Yijia Zhao; Xiangyu Wang; Chunchao Xu; Xiaoxiong Zhang; Zhenya Wang; Mei Li; Xueying Zhang; Ziyong Zheng; Binjie Chu; Xinyu Gao; Nan Meng; Weiwen Cai; Zheng Wang; Gan Wang; Song Yu; Hong Guo
conference on lasers and electro optics | 2016
Yi-Chen Zhang; Zhengyu Li; Yijia Zhao; Song Yu; Hong Guo
arXiv: Quantum Physics | 2018
Yijia Zhao; Yi-Chen Zhang; Yundi Huang; Song Yu; Hong Guo
Physical Review A | 2018
Yijia Zhao; Yi-Chen Zhang; Bingjie Xu; Song Yu; Hong Guo
Frontiers in Optics / Laser Science | 2018
Yijia Zhao; Yi-Chen Zhang; Yundi Huang; Song Yu; Hong Guo