Yin Zhen-Qiang
University of Science and Technology of China
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yin Zhen-Qiang.
Chinese Physics Letters | 2008
Yin Zhen-Qiang; Han Zhengfu; Chen Wei; Xu Fang-Xing; Wu Qing-Lin; Guo Guangcan
Decoy state quantum key distribution (QKD), being capable of beating PNS attack and being unconditionally secure, has become attractive recently. However, in many QKD systems, disturbances of transmission channel make the quantum bit error rate (QBER) increase, which limits both security distance and key bit rate of real-world decoy state QKD systems. We demonstrate the two-intensity decoy QKD with a one-way Faraday-Michelson phase modulation system, which is free of channel disturbance and keeps an interference fringe visibility (99%) long period, over a 120km single mode optical fibre in telecom (1550 nm) wavelength. This is the longest distance fibre decoy state QKD system based on the two-intensity protocol.Decoy State Quantum Key Distribution (QKD), being capable of beating PNS attack and unconditionally secure, have become an attractive one recently. But, in many QKD systems, disturbances of transmission channel make quantum bit error rate (QBER) increase which limits both security distance and key bit rate of real-life decoy state QKD systems. We demonstrate the two-intensity decoy QKD with one-way Faraday-Michelson phase modulation system, which is free of channel disturbance and keeps interference fringe visibility (99%) long period, near 130KM single mode optical fiber in telecom (1550 nm) wavelength. This is longest distance fiber decoy state QKD system based on two intensity protocol.
Chinese Physics B | 2014
Zhao Liangyuan; Li Hong-Wei; Yin Zhen-Qiang; Chen Wei; You Juan; Han Zhengfu
In the original BB84 quantum key distribution protocol, the states are prepared and measured randomly, which lose the unmatched detection results. To improve the sifting efficiency, biased bases selection BB84 protocol is proposed. Meanwhile, a practical quantum key distribution protocol can only transmit a finite number of signals, resulting in keys of finite length. The previous techniques for finite-key analysis focus mainly on the statistical fluctuations of the error rates and yields of the qubits. However, the prior choice probabilities of the two bases also have fluctuations by taking into account the finite-size effect. In this paper, we discuss the security of biased decoy state BB84 protocol with finite resources by considering all of the statistical fluctuations. The results can be directly used in the experimental realizations.
Physical Review A | 2014
Li Hong-Wei; Guo Guangcan; Chen Wei; Yin Zhen-Qiang; Wang Shuang; Han Zhengfu
In this paper, we propose a quantum key distribution (QKD) protocol based on only a two-dimensional Hilbert space encoding a quantum system and independent devices between the equipment for state preparation and measurement. Our protocol is inspired by the fully device-independent quantum key distribution (FDI-QKD) protocol and the measurement-device-independent quantum key distribution (MDI-QKD) protocol. Our protocol only requires the state to be prepared in the two dimensional Hilbert space, which weakens the state preparation assumption in the original MDI-QKD protocol. More interestingly, our protocol can overcome the detection loophole problem in the FDI-QKD protocol, which greatly limits the application of FDI-QKD. Hence our protocol can be implemented with practical optical components.
China Communications | 2013
Huang Jingzheng; Yin Zhen-Qiang; Chen Wei; Wang Shuang; Li Hong-Wei; Guo Guangcan; Han Zhengfu
Quantum communications helps us to enhance the security and efficiency of communications and to deepen our understanding of quantum physics. Its rapid development in recent years has attracted the interest of researchers from diverse fields such as physics, mathematics, and computer science. We review the background and current state of quantum communications technology, with an emphasis on quantum key distribution, quantum random number generation, and a relatively hot topic: device independent protocols.
Chinese Physics Letters | 2014
Li Fang-Yi; Yin Zhen-Qiang; Li Hong-Wei; Chen Wei; Wang Shuang; Wen Hao; Zhao Yibo; Han Zhengfu
Although some ideal quantum key distribution protocols have been proved to be secure, there have been some demonstrations that practical quantum key distribution implementations were hacked due to some real-life imperfections. Among these attacks, detector side channel attacks may be the most serious. Recently, a measurement device independent quantum key distribution protocol [Phys. Rev. Lett. 108 (2012) 130503] was proposed and all detector side channel attacks are removed in this scheme. Here a new security proof based on quantum information theory is given. The eavesdroppers information of the sifted key bits is bounded. Then with this bound, the final secure key bit rate can be obtained.
Chinese Physics B | 2011
Li Hong-Wei; Yin Zhen-Qiang; Wang Shuang; Bao Wan-Su; Guo Guangcan; Han Zhengfu
Quantum key distribution is the art of sharing secret keys between two distant parties, and has attracted a lot of attention due to its unconditional security. Compared with other quantum key distribution protocols, the differential phase shift quantum key distribution protocol has higher efficiency and simpler apparatus. Unfortunately, the unconditional security of differential phase shift quantum key distribution has not been proved. Utilizing the sharp continuity of the von Neuman entropy and some basic inequalities, we estimate the upper bound for the eavesdropper Eves information. We then prove the lower bound for the security of the differential phase shift quantum key distribution protocol against a one-pulse attack with Devatak—Winters secret key rate formula.
Chinese Physics B | 2015
Li Mo; Treeviriyanupab Patcharapong; Zhang Chun-Mei; Yin Zhen-Qiang; Chen Wei; Han Zhengfu
In a quantum key distribution (QKD) system, the error rate needs to be estimated for determining the joint probability distribution between legitimate parties, and for improving the performance of key reconciliation. We propose an efficient error estimation scheme for QKD, which is called parity comparison method (PCM). In the proposed method, the parity of a group of sifted keys is practically analysed to estimate the quantum bit error rate instead of using the traditional key sampling. From the simulation results, the proposed method evidently improves the accuracy and decreases revealed information in most realistic application situations.
Chinese Physics B | 2015
Qian Yong-Jun; Li Hong-Wei; He Deyong; Yin Zhen-Qiang; Zhang Chun-Mei; Chen Wei; Wang Shuang; Han Zhengfu
In a practical quantum key distribution (QKD) system, imperfect equipment, especially the single-photon detector, can be eavesdropped on by a blinding attack. However, the original blinding attack may be discovered by directly detecting the current. In this paper, we propose a probabilistic blinding attack model, where Eve probabilistically applies a blinding attack without being caught by using only an existing intuitive countermeasure. More precisely, our countermeasure solves the problem of how to define the bound in the limitation of precision of current detection, and then we prove security of the practical system by considering the current parameter. Meanwhile, we discuss the bound of the quantum bit error rate (QBER) introduced by Eve, by which Eve can acquire information without the countermeasure.
Chinese Physics B | 2012
Zhang Yang; Wang Shuang; Yin Zhen-Qiang; Chen Wei; Liang Wen-Ye; Li Hong-Wei; Guo Guangcan; Han Zhengfu
Passive decoy state quantum key distribution (PDS-QKD) has advantages in high-speed scenarios. We propose a modified model to simulate the PDS-QKD with a weak coherent light source based on Curtys theory [Opt. Lett. 34 3238 (2009)]. The modified model can provide better performance in a practical PDS-QKD system. Moreover, we report an experimental demonstration of the PDS-QKD of over 22.0-dB channel loss.
Communications in Theoretical Physics | 2015
Liang Wen-Ye; Wen Hao; Yin Zhen-Qiang; Chen Hua; Li Hong-Wei; Chen Wei; Han Zhengfu
At present, there is an increasing awareness of some three-orthogonal-basis quantum key distribution protocols, such as, the reference-frame-independent (RFI) protocol and the six-state protocol. For secure key rate estimations of these protocols, there are two methods: one is the conventional approach, and another is the tomographic approach. However, a comparison between these two methods has not been given yet. In this work, with the general model of rotation channel, we estimate the key rate using conventional and tomographic methods respectively. Results show that conventional estimation approach in RFI protocol is equivalent to tomographic approach only in the case of that one of three orthogonal bases is always aligned. In other cases, tomographic approach performs much better than the respective conventional approaches of the RFI protocol and the six-state protocol. Furthermore, based on the experimental data, we illustrate the deep connections between tomography and conventional RFI approach representations.