Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Yun-Guang Han is active.

Publication


Featured researches published by Yun-Guang Han.


Optics Express | 2014

Field and long-term demonstration of a wide area quantum key distribution network.

Shuang Wang; Wei Chen; Zhen-Qiang Yin; Hong-Wei Li; De-Yong He; Yuhu Li; Zheng Zhou; Xiao-Tian Song; Fang-Yi Li; Dong Wang; Hua Chen; Yun-Guang Han; Jing-Zheng Huang; Jun-Fu Guo; Peng-Lei Hao; Mo Li; Chun-Mei Zhang; Dong Liu; Wen-Ye Liang; Chunhua Miao; Ping Wu; Guang-Can Guo; Zheng-Fu Han

A wide area quantum key distribution (QKD) network deployed on communication infrastructures provided by China Mobile Ltd. is demonstrated. Three cities and two metropolitan area QKD networks were linked up to form the Hefei-Chaohu-Wuhu wide area QKD network with over 150 kilometers coverage area, in which Hefei metropolitan area QKD network was a typical full-mesh core network to offer all-to-all interconnections, and Wuhu metropolitan area QKD network was a representative quantum access network with point-to-multipoint configuration. The whole wide area QKD network ran for more than 5000 hours, from 21 December 2011 to 19 July 2012, and part of the network stopped until last December. To adapt to the complex and volatile field environment, the Faraday-Michelson QKD system with several stability measures was adopted when we designed QKD devices. Through standardized design of QKD devices, resolution of symmetry problem of QKD devices, and seamless switching in dynamic QKD network, we realized the effective integration between point-to-point QKD techniques and networking schemes.


Scientific Reports | 2015

Security of modified Ping-Pong protocol in noisy and lossy channel

Yun-Guang Han; Zhen-Qiang Yin; Hong-Wei Li; Wei Chen; Shuang Wang; Guang-Can Guo; Zheng-Fu Han

The “Ping-Pong” (PP) protocol is a two-way quantum key protocol based on entanglement. In this protocol, Bob prepares one maximally entangled pair of qubits, and sends one qubit to Alice. Then, Alice performs some necessary operations on this qubit and sends it back to Bob. Although this protocol was proposed in 2002, its security in the noisy and lossy channel has not been proven. In this report, we add a simple and experimentally feasible modification to the original PP protocol, and prove the security of this modified PP protocol against collective attacks when the noisy and lossy channel is taken into account. Simulation results show that our protocol is practical.


Scientific Reports | 2016

Experimental demonstration on the deterministic quantum key distribution based on entangled photons

Hua Chen; Zhi-Yuan Zhou; Alaa Jabbar Jumaah Zangana; Zhen-Qiang Yin; Juan Wu; Yun-Guang Han; Shuang Wang; Hong-Wei Li; De-Yong He; Shelan Khasro Tawfeeq; Bao-Sen Shi; Guang-Can Guo; Wei Chen; Zheng-Fu Han

As an important resource, entanglement light source has been used in developing quantum information technologies, such as quantum key distribution(QKD). There are few experiments implementing entanglement-based deterministic QKD protocols since the security of existing protocols may be compromised in lossy channels. In this work, we report on a loss-tolerant deterministic QKD experiment which follows a modified “Ping-Pong”(PP) protocol. The experiment results demonstrate for the first time that a secure deterministic QKD session can be fulfilled in a channel with an optical loss of 9 dB, based on a telecom-band entangled photon source. This exhibits a conceivable prospect of ultilizing entanglement light source in real-life fiber-based quantum communications.


Physical Review A | 2014

Decoy-state measurement-device-independent quantum key distribution based on the Clauser-Horne-Shimony-Holt inequality

Chun-Mei Zhang; Mo Li; Hong-Wei Li; Zhen-Qiang Yin; Dong Wang; Jing-Zheng Huang; Yun-Guang Han; Manli Xu; Wei Chen; Shuang Wang; Patcharapong Treeviriyanupab; Guang-Can Guo; Zheng-Fu Han

The measurement-device-independent quantum key distribution (MDI-QKD) protocol is proposed to remove the detector side channel attacks, while its security relies on the assumption that the encoding systems are perfectly characterized. In contrast, the MDI-QKD protocol based on the Clauser-Horne-Shimony-Holt inequality (CHSH-MDI-QKD) weakens this assumption, which only requires the quantum state to be prepared in the two-dimensional Hilbert space and the devices are independent. In experimental realizations, the weak coherent state, which is always used in QKD systems due to the lack of an ideal single photon source, may be prepared in the high-dimensional space. In this paper, we investigate the decoy-state CHSH-MDI-QKD protocol with


Journal of Lightwave Technology | 2016

Non-Markovian Property of Afterpulsing Effect in Single-Photon Avalanche Detector

Fang-Xiang Wang; Wei Chen; Ya-Ping Li; Deyong He; Chao Wang; Yun-Guang Han; Shuang Wang; Zhen-Qiang Yin; Zheng-Fu Han

s(3 \le s \le 5)


Physical Review A | 2016

More randomness from a prepare-and-measure scenario with independent devices

Yun-Guang Han; Zhen-Qiang Yin; Hong-Wei Li; Wei Chen; Shuang Wang; Guang-Can Guo; Zheng-Fu Han

intensities, including one signal state and


Nature Communications | 2018

Improved security bound for the round-robin-differential-phase-shift quantum key distribution

Zhen-Qiang Yin; Shuang Wang; Wei Chen; Yun-Guang Han; Rong Wang; Guang-Can Guo; Zheng-Fu Han

s-1


Communications in Theoretical Physics | 2016

Tomographic Approach in Reference-Frame-Independent Measurement-Device-Independent Quantum Key Distribution

Xi Fang; Chao Wang; Yun-Guang Han; Zhen-Qiang Yin; Wei Chen; Zheng-Fu Han

decoy states, and we also consider the finite-size effect on the decoy-state CHSH-MDI-QKD protocol with five intensities. Simulation results show that this scheme is very practical.


Journal of The Optical Society of America B-optical Physics | 2018

Optimality of quantum randomness certification with independent devices

Xin-Wei Fei; Zhen-Qiang Yin; Chaohan Cui; Wei Huang; Bing-Jie Xu; Shuang Wang; Wei Chen; Yun-Guang Han; Guang-Can Guo; Zheng-Fu Han

The single-photon avalanche photodiode (SPAD) has been widely used in research on quantum optics. The afterpulsing effect, which is an intrinsic character of SPAD, affects the system performance in most experiments and needs to be carefully handled. For a long time, afterpulsing has been presumed to be determined by the pre-ignition avalanche. We studied the afterpulsing effect of a commercial InGaAs/InP SPAD (The avalanche photodiode model is: Princeton Lightwave PGA-300) and demonstrated that its afterpulsing is non-Markovian, with a memory effect in the avalanching history. Theoretical analysis and experimental results clearly indicate that the embodiment of this memory effect is the afterpulsing probability, which increases as the number of ignition-avalanche pulses increase. This conclusion makes the principle of the afterpulsing effect clearer and is instructive to the manufacturing processes and afterpulsing evaluation of high-count-rate SPADs. It can also be regarded as a fundamental premise to handle the afterpulsing signals in many applications, such as quantum communication and quantum random number generation.


Scientific Reports | 2017

Tighter bound of quantum randomness certification for independent-devices scenario

Xin-Wei Fei; Zhen-Qiang Yin; Wei Huang; Bing-Jie Xu; Shuang Wang; Wei Chen; Yun-Guang Han; Guang-Can Guo; Zheng-Fu Han

How to generate genuine quantum randomness from untrusted devices is an important problem in quantum information processing. Inspired by the previous work on self-testing quantum random number generator[Phys. Rev. Lett. 114, 150501], we present a new method to generate quantum randomness from a prepare-and-measure scenario with independent devices. In existing protocols, the quantum randomness only depends on a witness value (e.g., CHSH value ), which is calculated with the observed probabilities. Differently, here all the observed probabilities are directly used to calculate the min-entropy in our method. Through numerical simulation, we find that the minentropy of our proposed scheme is higher than the previous work, when a typical untrusted BB84 setup is used. Consequently, thanks to the proposed method, more genuine quantum random numbers may be obtained than before.

Collaboration


Dive into the Yun-Guang Han's collaboration.

Top Co-Authors

Avatar

Wei Chen

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Zhen-Qiang Yin

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Zheng-Fu Han

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Shuang Wang

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Guang-Can Guo

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Hong-Wei Li

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

G.-C. Guo

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Yan-Lei Zhang

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Chao Wang

University of Science and Technology of China

View shared research outputs
Top Co-Authors

Avatar

Chun-Mei Zhang

University of Science and Technology of China

View shared research outputs
Researchain Logo
Decentralizing Knowledge