Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Zhou Hong-Yu is active.

Publication


Featured researches published by Zhou Hong-Yu.


Chinese Physics Letters | 2005

Secure Quantum Key Distribution Network with Bell States and Local Unitary Operations

Li Chun-Yan; Zhou Hong-Yu; Wang Yan; Deng Fu-Guo

We propose a theoretical scheme for secure quantum key distribution network following the ideas in quantum dense coding. In this scheme, the server of the network provides the service for preparing and measuring the Bell states, and the users encode the states with local unitary operations. For preventing the server from eavesdropping, we design a decoy when the particle is transmitted between the users. The scheme has high capacity as one particle carries two bits of information and its efficiency for qubits approaches 100%. Moreover, it is unnecessary for the users to store the quantum states, which makes this scheme more convenient in applications than others.We propose a theoretical scheme for secure quantum key distribution network following the ideas in quantum dense coding. In this scheme, the server of the network provides the service for preparing and measuring the Bell states, and the users encode the states with local unitary operations. For preventing the server from eavesdropping, we design a decoy when the particle is transmitted between the users. The scheme has high capacity as one particle carries two bits of information and its efficiency for qubits approaches 100%. Moreover, it is unnecessary for the users to store the quantum states, which makes this scheme more convenient in applications than others.


Chinese Physics | 2007

Quantum secure direct communication with quantum encryption based on pure entangled states

Li Xi-Han; Li Chun-Yan; Deng Fu-Guo; Zhou Ping; Liang Yu-Jie; Zhou Hong-Yu

This paper presents a scheme for quantum secure direct communication with quantum encryption. The two authorized users use repeatedly a sequence of the pure entangled pairs (quantum key) shared for encrypting and decrypting the secret message carried by the travelling photons directly. For checking eavesdropping, the two parties perform the single-photon measurements on some decoy particles before each round. This scheme has the advantage that the pure entangled quantum signal source is feasible at present and any eavesdropper cannot steal the message.


Chinese Physics Letters | 2006

Efficient Quantum Cryptography Network without Entanglement and Quantum Memory

Li Chun-Yan; Li Xi-Han; Deng Fu-Guo; Zhou Ping; Liang Yu-Jie; Zhou Hong-Yu

Chun-Yan Li, Xi-Han Li, Fu-Guo Deng1,2,3†, Ping Zhou, Yu-Jie Liang, Hong-Yu Zhou 1 The Key Laboratory of Beam Technology and Material Modification of Ministry of Education, Beijing Normal University, Beijing 100875 2 Institute of Low Energy Nuclear Physics, and Department of Material Science and Engineering, Beijing Normal University, Beijing 100875 3 Beijing Radiation Center, Beijing 100875 (Dated: February 1, 2008)An efficient quantum cryptography network protocol is proposed with d-dimensional polarized photons, without resorting to entanglement and quantum memory. A server on the network, say Alice, provides the service for preparing and measuring single photons whose initial state are |0. The users code the information on the single photons with some unitary operations. To prevent the untrustworthy server Alice from eavesdropping the quantum lines, a nonorthogonal-coding technique is used in the process that the quantum signal is transmitted between the users. This protocol does not require the servers and the users to store the quantum states and almost all of the single photons can be used for carrying the information, which makes it more convenient for application than others with present technology. We also discuss the case with a faint laser pulse.


Chinese Physics Letters | 2007

Controlled Teleportation of an Arbitrary Multi-Qudit State in a General Form with d-Dimensional Greenberger--Horne--Zeilinger States

Li Xi-Han; Deng Fu-Guo; Zhou Hong-Yu

A general scheme for controlled teleportation of an arbitrary multi-qudit state with d-dimensional Greenberger-Horne-Zeilinger (GHZ) states is proposed. For an arbitrary m-qudit state, the sender Alice performs m generalized Bell-state projective measurements on her 2m qudits and the controllers need only take some single-particle measurements. The receiver Charlie can reconstruct the unknown m-qudit state by performing some single-qudit unitary operations on her particles if she cooperates with all the controllers. As the quantum channel is a sequence of maximally entangled GHZ states, the intrinsic efficiency for qudits in this scheme approaches 100% in principle.A general scheme for controlled teleportation of an arbitrary multi-qudit state with d-dimensional Greenberger–Horne–Zeilinger (GHZ) states is proposed. For an arbitrary m-qudit state, the sender Alice performs m generalized Bell-state projective measurements on her 2m qudits and the controllers need only take some single-particle measurements. The receiver Charlie can reconstruct the unknown m-qudit state by performing some single-qudit unitary operations on her particles if she cooperates with all the controllers. As the quantum channel is a sequence of maximally entangled GHZ states, the intrinsic efficiency for qudits in this scheme approaches 100% in principle.


Chinese Physics Letters | 2006

Quantum Secure Direct Communication Network with Two-Step Protocol

Li Xi-Han; Zhou Ping; Liang Yu-Jie; Li Chun-Yan; Zhou Hong-Yu; Deng Fu-Guo

An efficient quantum secure direct communication network protocol with the two-step scheme is proposed by using the Einstein?Podolsky?Rosen (EPR) pair block as the quantum information carrier. The server, say Alice, prepares and measures the EPR pairs in the quantum communication and the users perform the four local unitary operations to encode their message. Anyone of the legitimate users can communicate another one on the network securely. Since almost all of the instances in this scheme are useful and each EPR pair can carry two bits of information, the efficiency for qubits and the source capacity both approach the maximal values.


Chinese Physics Letters | 2006

Efficient Multiparty Quantum Secret Sharing with Greenberger--Horne--Zeilinger States

Deng Fu-Guo; Zhou Ping; Li Xi-Han; Li Chun-Yan; Zhou Hong-Yu

An efficient multiparty quantum secret sharing scheme is proposed with Greenberger–Horne–Zeilinger (GHZ) states following some ideas in quantum dense coding. The agents take the single-photon measurements on the photons received for eavesdropping check and exploit the four local unitary operations I, σz, σx and iσy to code their message. This scheme has the advantage of high capacity as each GHZ state can carry two bits of information. The parties do not need to announce the measuring bases for almost all the photons, which will reduce the classical information exchanged largely. The intrinsic efficiency for qubits and the total efficiency both approach the maximal values.


Chinese Physics Letters | 2006

Multiparty Quantum Secret Report

Deng Fu-Guo; Li Xi-Han; Li Chun-Yan; Zhou Ping; Liang Yu-Jie; Zhou Hong-Yu

A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her M agents first share a sequence of (M+1)-particle Greenberger?Horne?Zeilinger (GHZ) states that only Alice knows which state each (M+1)-particle quantum system is in. Each agent exploits a controlled-not (CNot) gate to encrypt the travelling particle by using the particle in the GHZ state as the control qubit. The boss Alice decrypts the travelling particle with a CNot gate after performing a ?x operation on her particle in the GHZ state or not. After the GHZ states (the quantum key) are used up, the parties check whether there is a vicious eavesdropper, say Eve, monitoring the quantum line, by picking out some samples from the GHZ states shared and measuring them with two measuring bases. After confirming the security of the quantum key, they use the remaining GHZ states repeatedly for the next round of quantum communication. This scheme has the advantage of high intrinsic efficiency for the qubits and total efficiency.A multiparty quantum secret report scheme is proposed with quantum encryption. The boss Alice and her


Nuclear Instruments & Methods in Physics Research Section B-beam Interactions With Materials and Atoms | 1992

X-ray attenuation coefficients and photoelectric cross sections of Cu and Fe in the range 3 keV to 29 keV☆

Wang Dachun; Ding Xunliang; Wang Xinfu; Yang Hua; Zhou Hong-Yu; Shen Xinyin; Zhu Guanghua

M


Chinese Physics | 2007

Eavesdropping on the `ping-pong' quantum communication protocol freely in a noise channel

Deng Fu-Guo; Li Xi-Han; Li Chun-Yan; Zhou Ping; Zhou Hong-Yu

agents first share a sequence of (


Chinese Physics Letters | 2003

Structure of the Semi-decoupled 1/2[411] Band in Odd Proton Nucleus169Ta

Song Hai; Yang Chun-Xiang; Sun Hui-Bin; Deng Fu-Guo; Wu Xiao-Guang; Lu Jing-Bin; Zhao Guang-Yi; Han Guang-Bing; Peng Chao-Hua; Yin Li-Chang; Wen Shu-Xian; Luo Guangsheng; Yuan Guan-Jun; Liu Yun-Zuo; Zhu Li-Hua; Shao Li-Qin; Zhou Hong-Yu

M

Collaboration


Dive into the Zhou Hong-Yu's collaboration.

Top Co-Authors

Avatar

Deng Fu-Guo

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Li Xi-Han

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Li Chun-Yan

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Zhou Ping

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Liang Yu-Jie

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Liu Zu-Hua

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Zhang Feng-Shou

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Lu Ting

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Cheng Wei

Beijing Normal University

View shared research outputs
Top Co-Authors

Avatar

Yang Chun-Xiang

Beijing Normal University

View shared research outputs
Researchain Logo
Decentralizing Knowledge