Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhengyu Li is active.

Publication


Featured researches published by Zhengyu Li.


Physical Review A | 2014

Continuous-variable measurement-device-independent quantum key distribution

Zhengyu Li; Yi-Chen Zhang; Feihu Xu; Xiang Peng; Hong Guo

We show that the performance of continuous-variable measurement-device-independent quantum key distribution will decline dramatically when considering detectors imperfections. However, it can be improved by using phase sensitive optical amplifiers.


Physical Review A | 2014

Continuous-variable measurement-device-independent quantum key distribution using squeezed states

Yi-Chen Zhang; Zhengyu Li; Song Yu; Wanyi Gu; Xiang Peng; Hong Guo

A continuous-variable measurement-device-independent quantum key distribution (CV-MDI QKD) protocol using squeezed states is proposed where the two legitimate partners send Gaussian-modulated squeezed states to an untrusted third party to realize the measurement. Security analysis shows that the protocol can not only defend all detector side channels, but also attain higher secret key rates than the coherent-state-based protocol. We also present a method to improve the squeezed-state CV-MDI QKD protocol by adding proper Gaussian noise to the reconciliation side. It is found that there is an optimal added noise to optimize the performance of the protocol in terms of both key rates and maximal transmission distances. The resulting protocol shows the potential of long-distance secure communication using the CV-MDI QKD protocol.


Physical Review A | 2016

Non-Gaussian postselection and virtual photon subtraction in continuous-variable quantum key distribution

Zhengyu Li; Yi-Chen Zhang; Xiangyu Wang; Bingjie Xu; Xiang Peng; Hong Guo

Photon subtraction can enhance the performance of continuous-variable quantum key distribution (CV QKD). However, the enhancement effect will be reduced by the imperfections of practical devices, especially the limited efficiency of a single-photon detector. In this paper, we propose a non-Gaussian postselection method to emulate the photon substraction used in coherent-state CV QKD protocols. The virtual photon subtraction not only can avoid the complexity and imperfections of a practical photon-subtraction operation, which extends the secure transmission distance as the ideal case does, but also can be adjusted flexibly according to the channel parameters to optimize the performance. Furthermore, our preliminary tests on the information reconciliation suggest that in the low signal-to-noise ratio regime, the performance of reconciliating the postselected non-Gaussian data is better than that of the Gaussian data, which implies the feasibility of implementing this method practically.


Journal of Physics B | 2014

Improvement of two-way continuous-variable quantum key distribution using optical amplifiers

Yi-Chen Zhang; Zhengyu Li; Christian Weedbrook; Song Yu; Wanyi Gu; Xiang Peng; Hong Guo

The imperfections of a receivers detector affect the performance of two-way continuous-variable (CV) quantum key distribution (QKD) protocols and are difficult to adjust in practical situations. We propose a method to improve the performance of two-way CV-QKD by adding a parameter-adjustable optical amplifier at the receiver. A security analysis is derived against a two-mode collective entangling cloner attack. Our simulations show that the proposed method can improve the performance of protocols as long as the inherent noise of the amplifier is lower than a critical value, defined as the tolerable amplifier noise. Furthermore, the optimal performance can approach the scenario where a perfect detector is used.


Optics Express | 2016

5.4 Gbps real time quantum random number generator with simple implementation

Jie Yang; Jinlu Liu; Qi Su; Zhengyu Li; Fan Fan; Bingjie Xu; Hong Guo

We present a random number generation scheme based on measuring the phase fluctuations of a laser with a simple experimental setup. A simple model is established to analyze the randomness and the simulation result based on this model fits well with the experiment data. After the analog to digital sampling and suitable randomness extraction integrated in the field programmable gate array, the final random bits are delivered to a PC, realizing a 5.4 Gbps real time quantum random number generation. The final random bit sequences have passed all the NIST and DIEHARD tests.


Entropy | 2015

Noiseless Linear Amplifiers in Entanglement-Based Continuous-Variable Quantum Key Distribution

Yi-Chen Zhang; Zhengyu Li; Christian Weedbrook; Kevin Marshall; Stefano Pirandola; Song Yu; Hong Guo

We propose a method to improve the performance of two entanglement-based continuous-variable quantum key distribution protocols using noiseless linear amplifiers. The two entanglement-based schemes consist of an entanglement distribution protocol with an untrusted source and an entanglement swapping protocol with an untrusted relay. Simulation results show that the noiseless linear amplifiers can improve the performance of these two protocols, in terms of maximal transmission distances, when we consider small amounts of entanglement, as typical in realistic setups.


Journal of Physics B | 2017

Numerical simulation of the optimal two-mode attacks for two-way continuous-variable quantum cryptography in reverse reconciliation

Yi-Chen Zhang; Zhengyu Li; Yijia Zhao; Song Yu; Hong Guo

We analyze the security of the two-way continuous-variable quantum key distribution protocol in reverse reconciliation against general two-mode attacks, which represent all accessible attacks at fixed channel parameters. Rather than against one specific attack model, the expression of secret key rates of the two-way protocol are derived against all accessible attack models. It is found that there is an optimal two-mode attack to minimize the performance of the protocol in terms of both secret key rates and maximal transmission distances. We identify the optimal two-mode attack, give the specific attack model of the optimal two-mode attack and show the performance of the two-way protocol against the optimal two-mode attack. Even under the optimal two-mode attack, the performances of two-way protocol are still better than the corresponding one-way protocol, which shows the advantage of making a double use of the quantum channel and the potential of long-distance secure communication using two-way protocol.


Quantum Information Processing | 2017

Improvement of two-way continuous-variable quantum key distribution with virtual photon subtraction

Yijia Zhao; Yi-Chen Zhang; Zhengyu Li; Song Yu; Hong Guo

We propose a method to improve the performance of two-way continuous-variable quantum key distribution protocol by virtual photon subtraction. The virtual photon subtraction implemented via non-Gaussian post-selection not only enhances the entanglement of two-mode squeezed vacuum state but also has advantages in simplifying physical operation and promoting efficiency. In two-way protocol, virtual photon subtraction could be applied on two sources independently. Numerical simulations show that the optimal performance of renovated two-way protocol is obtained with photon subtraction only used by Alice. The transmission distance and tolerable excess noise are improved by using the virtual photon subtraction with appropriate parameters. Moreover, the tolerable excess noise maintains a high value with the increase in distance so that the robustness of two-way continuous-variable quantum key distribution system is significantly improved, especially at long transmission distance.


arXiv: Quantum Physics | 2017

Efficient rate-adaptive reconciliation for continuous-variable quantum key distribution

Xiangyu Wang; Yi-Chen Zhang; Song Yu; Bingjie Xu; Zhengyu Li; Hong Guo

Using the tool of concatenated stabilizer coding, we prove that the complexity class QMA remains unchanged even if every witness qubit is disturbed by constant noise. This result may not only be relevant for physical implementations of verifying protocols but also attacking the relationship between the complexity classes QMA, QCMA and BQP, which can be reformulated in this unified framework of a verifying protocol receiving a disturbed witness. While QCMA and BQP are described by fully dephasing and depolarizing channels on the witness qubits, respectively, our result proves QMA to be robust against 27% dephasing and 18% depolarizing noise.By the Gottesman-Knill Theorem, the outcome probabilities of Clifford circuits can be computed efficiently. We present an alternative proof of this result for quopit Clifford circuits (i.e., Clifford circuits on collections of


IEEE Photonics Technology Letters | 2017

117 Gbits/s Quantum Random Number Generation With Simple Structure

Jinlu Liu; Jie Yang; Zhengyu Li; Qi Su; Wei Huang; Bingjie Xu; Hong Guo

p

Collaboration


Dive into the Zhengyu Li's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Yi-Chen Zhang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Song Yu

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Xiangyu Wang

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Yijia Zhao

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Wanyi Gu

Beijing University of Posts and Telecommunications

View shared research outputs
Top Co-Authors

Avatar

Wei Huang

Beijing University of Posts and Telecommunications

View shared research outputs
Researchain Logo
Decentralizing Knowledge