#### Filter Results:

- Full text PDF available (5)

#### Publication Year

1985

2009

- This year (0)
- Last 5 years (0)
- Last 10 years (3)

#### Publication Type

#### Co-author

#### Journals and Conferences

Learn More

- Fei Gao, Su-Juan Qin, Qiaoyan Wen, Fu-Chen Zhu
- Quantum Information & Computation
- 2007

Su-Juan Qin, Fei Gao, Qiao-Yan Wen, and Fu-Chen Zhu (1. State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing, 100876, China) (2. School of Science, Beijing University of Posts and Telecommunications, Beijing, 100876, China) (3. National Laboratory for Modern Communications, P.O.Box 810,… (More)

Grover’s operator in the two-qubit case can transform a basis into its conjugated basis. A permutation operator can transform a state in the two conjugated bases into its orthogonal state. These properties are included in a threshold quantum protocol. The proposed threshold quantum protocol is secure based the proof that the legitimate participators can… (More)

- Fu-Chen Zhu
- 2005

With the help of a simple quantum key distribution (QKD) scheme, we discuss the relation between BB84-type protocols and two-step-type ones. It is shown that they have the same essence, i.e., information-splitting. More specifically, the similarity between them includes (1) the carrier state is split into two parts which will be sent one by one; (2) the… (More)

- Fei Gao, Su-Juan Qin, Qiaoyan Wen, Fu-Chen Zhu
- CISC
- 2005

- Fei Gao, Qiao-yan Wen, Fu-Chen Zhu
- 2006

The security of quantum exam [Phys. Lett. A 350 (2006) 174] is analyzed and it is found that this protocol is secure for any eavesdropper except for the “students” who take part in the exam. Specifically, any student can steal other examinees’ solutions and then cheat in the exam. Furthermore, a possible improvement of this protocol is presented.

- Fei Gao, Qiao-yan Wen, Fu-Chen Zhu
- 1985

Two misuses of one-time pad in improving the efficiency of quantum communication are pointed out. One happens when using some message bits to encrypt others, the other exists because the key bits are not truly random. Both of them result in the decrease of security. Therefore, one-time pad should be used carefully in designing quantum communication… (More)

- Fei Gao, Fen-Zhuo Guo, Qiao-yan Wen, Fu-Chen Zhu
- 2005 5th International Conference on Information…
- 2005

We show a quantum sharing of classical secret protocol using EPR pairs. Instead of distributing entangled particles to every player and letting them make a measurement in different bases randomly, we employ the entangled particles as a carrier to record the synthetical operations of all players. Even in the case of multi-party secret sharing, two-particle… (More)

- Su-Juan Qin, Fei Gao, Qiaoyan Wen, Fu-Chen Zhu
- Quantum Information & Computation
- 2009

- ‹
- 1
- ›