• Publications
  • Influence
Measurement-device-independent quantum key distribution.
The results show that long-distance quantum cryptography over say 200 km will remain secure even with seriously flawed detectors, and the key generation rate is many orders of magnitude higher than that based on full device independent QKD.
Practical Decoy State for Quantum Key Distribution
Decoy states have recently been proposed as a useful method for substantially improving the performance of quantum key distribution (QKD). Here, we present a general theory of the decoy state
Experimental quantum key distribution with decoy states.
By making simple modifications to a commercial quantum key distribution system, it is shown that a secure key generation rate of 165 bit/s, which is 1/4 of the theoretical limit, can be obtained over 15 km of a telecommunication fiber.
Time-shift attack in practical quantum cryptosystems
This paper proposes another "time-shift" attack that exploits the efficiency mismatch of two single photon detectors in a quantum key distribution (QKD) system and proves that if Alice and Bob are unaware of the attack, the final key they share is insecure.
Quantum random number generation
Self-testing quantum random number generators (QRNGs) are studied, in which verifiable randomness can be generated without trusting the actual implementation, and an intermediate category is self-testing QRNG, which provides a tradeoff between the trustworthiness on the device and the random number generation speed.
High-speed quantum random number generation by measuring phase noise of a single-mode laser.
A high-speed random number generation scheme based on measuring the quantum phase noise of a single-mode laser operating at a low intensity level near the lasing threshold is presented and the generated random numbers have passed all the DIEHARD tests.
Practical challenges in quantum key distribution
Before QKD can be widely adopted, it faces a number of important challenges such as secret key rate, distance, size, cost and practical security, according to a survey of key challenges.
Experimental demonstration of time-shift attack against practical quantum key distribution systems
This result shows that, contrary to popular belief, an eavesdropper, Eve, has a non-negligible probability $(\ensuremath{\sim}4%)$ to break the security of the system.
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system
Quantum key distribution (QKD) can, in principle, provide unconditional security based on the fundamental laws of physics. Unfortunately, a practical QKD system may contain overlooked imperfections
Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers
In this paper, we present a fully fiber-based one-way quantum-key-distribution (QKD) system implementing the Gaussian-modulated coherent-state (GMCS) protocol. The system employs a double