Yun-Guang Han
University of Science and Technology of China
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Yun-Guang Han.
Optics Express | 2014
Shuang Wang; Wei Chen; Zhen-Qiang Yin; Hong-Wei Li; De-Yong He; Yuhu Li; Zheng Zhou; Xiao-Tian Song; Fang-Yi Li; Dong Wang; Hua Chen; Yun-Guang Han; Jing-Zheng Huang; Jun-Fu Guo; Peng-Lei Hao; Mo Li; Chun-Mei Zhang; Dong Liu; Wen-Ye Liang; Chunhua Miao; Ping Wu; Guang-Can Guo; Zheng-Fu Han
A wide area quantum key distribution (QKD) network deployed on communication infrastructures provided by China Mobile Ltd. is demonstrated. Three cities and two metropolitan area QKD networks were linked up to form the Hefei-Chaohu-Wuhu wide area QKD network with over 150 kilometers coverage area, in which Hefei metropolitan area QKD network was a typical full-mesh core network to offer all-to-all interconnections, and Wuhu metropolitan area QKD network was a representative quantum access network with point-to-multipoint configuration. The whole wide area QKD network ran for more than 5000 hours, from 21 December 2011 to 19 July 2012, and part of the network stopped until last December. To adapt to the complex and volatile field environment, the Faraday-Michelson QKD system with several stability measures was adopted when we designed QKD devices. Through standardized design of QKD devices, resolution of symmetry problem of QKD devices, and seamless switching in dynamic QKD network, we realized the effective integration between point-to-point QKD techniques and networking schemes.
Scientific Reports | 2015
Yun-Guang Han; Zhen-Qiang Yin; Hong-Wei Li; Wei Chen; Shuang Wang; Guang-Can Guo; Zheng-Fu Han
The “Ping-Pong” (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.
Scientific Reports | 2016
Hua Chen; Zhi-Yuan Zhou; Alaa Jabbar Jumaah Zangana; Zhen-Qiang Yin; Juan Wu; Yun-Guang Han; Shuang Wang; Hong-Wei Li; De-Yong He; Shelan Khasro Tawfeeq; Bao-Sen Shi; Guang-Can Guo; Wei Chen; Zheng-Fu Han
As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based quantum communications.
Physical Review A | 2014
Chun-Mei Zhang; Mo Li; Hong-Wei Li; Zhen-Qiang Yin; Dong Wang; Jing-Zheng Huang; Yun-Guang Han; Manli Xu; Wei Chen; Shuang Wang; Patcharapong Treeviriyanupab; Guang-Can Guo; Zheng-Fu Han
The measurement-device-independent quantum key distribution (MDI-QKD) protocol is proposed to remove the detector side channel attacks, while its security relies on the assumption that the encoding systems are perfectly characterized. In contrast, the MDI-QKD protocol based on the Clauser-Horne-Shimony-Holt inequality (CHSH-MDI-QKD) weakens this assumption, which only requires the quantum state to be prepared in the two-dimensional Hilbert space and the devices are independent. In experimental realizations, the weak coherent state, which is always used in QKD systems due to the lack of an ideal single photon source, may be prepared in the high-dimensional space. In this paper, we investigate the decoy-state CHSH-MDI-QKD protocol with
Journal of Lightwave Technology | 2016
Fang-Xiang Wang; Wei Chen; Ya-Ping Li; Deyong He; Chao Wang; Yun-Guang Han; Shuang Wang; Zhen-Qiang Yin; Zheng-Fu Han
s(3 \le s \le 5)
Physical Review A | 2016
Yun-Guang Han; Zhen-Qiang Yin; Hong-Wei Li; Wei Chen; Shuang Wang; Guang-Can Guo; Zheng-Fu Han
intensities, including one signal state and
Nature Communications | 2018
Zhen-Qiang Yin; Shuang Wang; Wei Chen; Yun-Guang Han; Rong Wang; Guang-Can Guo; Zheng-Fu Han
s-1
Communications in Theoretical Physics | 2016
Xi Fang; Chao Wang; Yun-Guang Han; Zhen-Qiang Yin; Wei Chen; Zheng-Fu Han
decoy states, and we also consider the finite-size effect on the decoy-state CHSH-MDI-QKD protocol with five intensities. Simulation results show that this scheme is very practical.
Journal of The Optical Society of America B-optical Physics | 2018
Xin-Wei Fei; Zhen-Qiang Yin; Chaohan Cui; Wei Huang; Bing-Jie Xu; Shuang Wang; Wei Chen; Yun-Guang Han; Guang-Can Guo; Zheng-Fu Han
The single-photon avalanche photodiode (SPAD) has been widely used in research on quantum optics. The afterpulsing effect, which is an intrinsic character of SPAD, affects the system performance in most experiments and needs to be carefully handled. For a long time, afterpulsing has been presumed to be determined by the pre-ignition avalanche. We studied the afterpulsing effect of a commercial InGaAs/InP SPAD (The avalanche photodiode model is: Princeton Lightwave PGA-300) and demonstrated that its afterpulsing is non-Markovian, with a memory effect in the avalanching history. Theoretical analysis and experimental results clearly indicate that the embodiment of this memory effect is the afterpulsing probability, which increases as the number of ignition-avalanche pulses increase. This conclusion makes the principle of the afterpulsing effect clearer and is instructive to the manufacturing processes and afterpulsing evaluation of high-count-rate SPADs. It can also be regarded as a fundamental premise to handle the afterpulsing signals in many applications, such as quantum communication and quantum random number generation.
Scientific Reports | 2017
Xin-Wei Fei; Zhen-Qiang Yin; Wei Huang; Bing-Jie Xu; Shuang Wang; Wei Chen; Yun-Guang Han; Guang-Can Guo; Zheng-Fu Han
How to generate genuine quantum randomness from untrusted devices is an important problem in quantum information processing. Inspired by the previous work on self-testing quantum random number generator[Phys. Rev. Lett. 114, 150501], we present a new method to generate quantum randomness from a prepare-and-measure scenario with independent devices. In existing protocols, the quantum randomness only depends on a witness value (e.g., CHSH value ), which is calculated with the observed probabilities. Differently, here all the observed probabilities are directly used to calculate the min-entropy in our method. Through numerical simulation, we find that the minentropy of our proposed scheme is higher than the previous work, when a typical untrusted BB84 setup is used. Consequently, thanks to the proposed method, more genuine quantum random numbers may be obtained than before.