Skip to main content

Showing 1–26 of 26 results for author: Lu, F

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2505.07804  [pdf, other

    quant-ph cs.CC math-ph

    Quon Classical Simulation: Unifying Clifford, Matchgates and Entanglement

    Authors: Zixuan Feng, Zhengwei Liu, Fan Lu, Ningfeng Wang

    Abstract: We propose a unified classical simulation framework for quantum circuits, termed Quon Classical Simulation (QCS), built upon the diagrammatic formalism of the Quon language. Central to this framework is the introduction of magic holes, a topological feature that captures the global source of computational hardness in simulating quantum systems. Unlike conventional measures, the complexity of QCS i… ▽ More

    Submitted 12 May, 2025; originally announced May 2025.

    Comments: 32 pages, many figures

    MSC Class: 81P45

  2. arXiv:2504.14614  [pdf, other

    quant-ph physics.optics

    Measurement-device-independent quantum key distribution with asymmetric sources

    Authors: Jia-Jv Deng, Feng-Yu Lu, Zhen-Qiu Zhong, Xiao-Hai Zhan, Zhen-Qiang Yin, Shuang Wang, Wei Chen, De-Yong He, Guang-Can Guo, Zheng-Fu Han

    Abstract: Measurement-device-independent quantum key distribution (MDI-QKD), which eliminates all the attacks from the eavesdropper to the measurement party, has been one of the most promising technology for the implementation of end-to-end quantum networks. In practice, the asymmetry of both sources and channels is generally inevitable. Therefore, we propose a theory to analyze the performance when any two… ▽ More

    Submitted 24 April, 2025; v1 submitted 20 April, 2025; originally announced April 2025.

  3. arXiv:2502.05515  [pdf, other

    quant-ph

    Implementing an information-theoretically secure Byzantine agreement with quantum signed message solution

    Authors: Yao Zhou, Feng - Yu Lu, Zhen - Qiang Yin, Shuang Wang, Wei Chen, Guang - Can Guo, Zheng - Fu Han

    Abstract: Byzantine agreement (BA) enables all honest nodes in a decentralized network to reach consensus. In the era of emerging quantum technologies, classical cryptography-based BA protocols face inherent security vulnerabilities. By leveraging the information-theoretic security of keys generated by quantum processing, such as quantum key distribution (QKD), and utilizing the one-time pad (OTP) and one-t… ▽ More

    Submitted 8 February, 2025; originally announced February 2025.

  4. arXiv:2501.13482  [pdf, other

    quant-ph

    Quantum key distribution overcoming practical correlated intensity fluctuations

    Authors: Jia-Xuan Li, Feng-Yu Lu, Ze-Hao Wang, Victor Zapatero, Marcos Curty, Shuang Wang, Zhen-Qiang Yin, Wei Chen, De-Yong He, Guang-Can Guo, Zheng-Fu Han

    Abstract: Intensity correlations between neighboring pulses open a prevalent yet often overlooked security loophole in decoy-state quantum key distribution (QKD). As a solution, we present and experimentally demonstrate an intensity-correlation-tolerant QKD protocol that mitigates the negative effect that this phenomenon has on the secret key rate according to existing security analyses. Compared to previou… ▽ More

    Submitted 23 January, 2025; originally announced January 2025.

  5. arXiv:2409.13383  [pdf, other

    quant-ph

    A Test of Empty Wave via Quantum Memory in a Weak Measurement Scheme

    Authors: Jian-Peng Dou, Feng Lu, Hao Tang, Xiao-Wen Shang, Xian-Min Jin

    Abstract: In quantum mechanics, a long-standing question remains: How does a single photon traverse double slits? One intuitive picture suggests that the photon passes through only one slit, while its wavefunction splits into an ``empty" wave and a ``full" wave. However, the reality of this empty wave is yet to be verified. Here, we present a novel experimental configuration that combines quantum memory and… ▽ More

    Submitted 20 September, 2024; originally announced September 2024.

  6. arXiv:2408.04950  [pdf, other

    quant-ph cond-mat.quant-gas

    Regeneration of Spin Wave in Atomic Vapor

    Authors: Jian-Peng Dou, Feng Lu, Xiao-Wen Shang, Hao Tang, Xian-Min Jin

    Abstract: Conventionally, atomic vapor is perceived as a non-living system governed by the principles of thermodynamics and statistical physics. However, the demarcation line between life and non-life appears to be less distinct than previously thought. In a study of amplifying spin waves, we observe a phenomenon reminiscent of life: The atomic spin wave stored in atomic vapor has a capability of absorbing… ▽ More

    Submitted 9 August, 2024; originally announced August 2024.

  7. arXiv:2309.07576  [pdf, other

    quant-ph

    Fully passive Measurement Device Independent Quantum Key Distribution

    Authors: Xiang Wang, Feng-Yu Lu, Ze-Hao Wang, Zhen-Qiang Yin, Shuang Wang, Wei Chen, De-Yong He, Guang-Can Guo, Zheng-Fu Han

    Abstract: Measurement-device-independent quantum key distribution (MDI-QKD) can resist all attacks on the detection devices, but there are still some security issues related to the source side. One possible solution is to use the passive protocol to eliminate the side channels introduced by active modulators at the source. Recently, a fully passive QKD protocol has been proposed that can simultaneously achi… ▽ More

    Submitted 14 September, 2023; originally announced September 2023.

  8. arXiv:2304.11655  [pdf, other

    quant-ph

    Experimental demonstration of fully passive quantum key distribution

    Authors: Feng-Yu Lu, Ze-Hao Wang, Víctor Zapatero, Jia-Lin Chen, Shuang Wang, Zhen-Qiang Yin, Marcos Curty, De-Yong He, Rong Wang, Wei Chen, Guan-Jie Fan-Yuan, Guang-Can Guo, Zheng-Fu Han

    Abstract: The passive approach to quantum key distribution (QKD) consists of removing all active modulation from the users' devices, a highly desirable countermeasure to get rid of modulator side-channels. Nevertheless, active modulation has not been completely removed in QKD systems so far, due to both theoretical and practical limitations. In this work, we present a fully passive time-bin encoding QKD sys… ▽ More

    Submitted 7 August, 2023; v1 submitted 23 April, 2023; originally announced April 2023.

    Comments: 13 pages, 5 figures

  9. Induced-photorefractive attack against Quantum Key Distribution

    Authors: Peng Ye, Wei Chen, Guo-Wei Zhang, Feng-Yu Lu, Fang-Xiang Wang, Guan-Zhong Huang, Shuang Wang, De-Yong He, Zhen-Qiang Yin, Guang-Can Guo, Zheng-Fu Han

    Abstract: Lithium niobate (LiNbO3, LN) devices play critical roles in quantum information processing. However, for special applications like quantum key distribution (QKD), the characteristics of materials and devices and their impact on practical systems must be intensively inquired. For the first time, we reveal that the photorefractive effect in LN can be utilized as a potential loophole to carry out mal… ▽ More

    Submitted 20 March, 2023; originally announced March 2023.

    Journal ref: Physical Review APPLIED (2023)

  10. arXiv:2302.13481  [pdf, other

    quant-ph

    Tight finite-key analysis for mode-pairing quantum key distribution

    Authors: Ze-Hao Wang, Zhen-Qiang Yin, Shuang Wang, Rong Wang, Feng-Yu Lu, Wei Chen, De-Yong He, Guang-Can Guo, Zheng-Fu Han

    Abstract: Mode-pairing quantum key distribution (MP-QKD) is a potential protocol that is not only immune to all possible detector side channel attacks, but also breaks the repeaterless rate-transmittance bound without needing global phase locking. Here we analyze the finite-key effect for the MP-QKD protocol with rigorous security proof against general attacks. Moreover, we propose a six-state MP-QKD protoc… ▽ More

    Submitted 26 February, 2023; originally announced February 2023.

    Comments: 28 pages, 5 Figures, 4 Tables

  11. arXiv:2109.01294  [pdf, other

    quant-ph cs.CR physics.optics

    Measurement-device-independent quantum key distribution for nonstandalone networks

    Authors: Guan-Jie Fan-Yuan, Feng-Yu Lu, Shuang Wang, Zhen-Qiang Yin, De-Yong He, Zheng Zhou, Jun Teng, Wei Chen, Guang-Can Guo, Zheng-Fu Han

    Abstract: Untrusted node networks initially implemented by measurement-device-independent quantum key distribution (MDI-QKD) protocol are a crucial step on the roadmap of the quantum Internet. Considering extensive QKD implementations of trusted node networks, a workable upgrading tactic of existing networks toward MDI networks needs to be explicit. Here, referring to the nonstandalone (NSA) network of 5G,… ▽ More

    Submitted 6 September, 2021; v1 submitted 2 September, 2021; originally announced September 2021.

    Journal ref: Photon. Res. 9, 1881-1891 (2021)

  12. Unbalanced-basis-misalignment tolerant measurement-device-independent quantum key distribution

    Authors: Feng-Yu Lu, Ze-Hao Wang, Zhen-Qiang Yin, Shuang Wang, Rong Wang, Guan-Jie Fan-Yuan, Xiao-Juan Huang, De-Yong He, Wei Chen, Zheng Zhou, Guang-Can Guo, Zheng-Fu Han

    Abstract: Measurement-device-independent quantum key distribution (MDIQKD) is a revolutionary protocol since it is physically immune to all attacks on the detection side. However, the protocol still keeps the strict assumptions on the source side that the four BB84-states must be perfectly prepared to ensure security. Some protocols release part of the assumptions in the encoding system to keep the practica… ▽ More

    Submitted 3 August, 2022; v1 submitted 26 August, 2021; originally announced August 2021.

    Comments: 22 pages, 9 figures

    Journal ref: Optica 9, 886-893 (2022)

  13. arXiv:2011.08460  [pdf, ps, other

    quant-ph physics.optics

    A universal simulating framework for quantum key distribution systems

    Authors: Guan-Jie Fan-Yuan, Wei Chen, Feng-Yu Lu, Zhen-Qiang Yin, Shuang Wang, Guang-Can Guo, Zheng-Fu Han

    Abstract: Quantum key distribution (QKD) provides a physical-based way to conciliate keys between remote users securely. Simulation is an essential method for designing and optimizing QKD systems. We develop a universal simulation framework based on quantum operator descriptions of photon signals and optical devices. The optical devices can be freely combined and driven by the photon excitation events, whic… ▽ More

    Submitted 17 November, 2020; originally announced November 2020.

  14. Twin-field quantum key distribution with passive-decoy state

    Authors: Jun Teng, Feng-Yu Lu, Zhen-Qiang Yin, Guan-Jie Fan-Yuan, Rong Wang, Shuang Wang, Wei Chen, Wei Huang, Bing-Jie Xu, Guang-Can Guo, Zheng-Fu Han

    Abstract: Twin-Field quantum key distribution (TF-QKD) and its variants, e.g. Phase-Matching QKD, Sending-or-not-sending QKD, and No Phase Post-Selection TFQKD promise high key rates at long distance to beat the rate distance limit without a repeater. The security proof of these protocols are based on decoy-state method, which is usually performed by actively modulating a variable optical attenuator togethe… ▽ More

    Submitted 16 November, 2020; v1 submitted 14 November, 2020; originally announced November 2020.

  15. Finite-key analysis for twin-field quantum key distribution based on generalized operator dominance condition

    Authors: Rui-Qiang Wang, Zhen-Qiang Yin, Feng-Yu Lu, Rong Wang, Shuang Wang, Wei Chen, Wei Huang, Bing-Jie Xu, Guang-Can Guo, Zheng-Fu Han

    Abstract: Quantum key distribution (QKD) can help two distant peers to share secret key bits, whose security is guaranteed by the law of physics. In practice, the secret key rate of a QKD protocol is always lowered with the increasing of channel distance, which severely limits the applications of QKD. Recently, twin-field (TF) QKD has been proposed and intensively studied, since it can beat the rate-distanc… ▽ More

    Submitted 17 July, 2020; originally announced July 2020.

    Journal ref: Opt. Express 28(15), 22594-22605 (2020)

  16. Efficient decoy-states for the reference-frame-independent measurement-device-independent quantum key distribution

    Authors: Feng-Yu Lu, Zhen-Qiang Yin, Guan-Jie Fan-Yuan, Rong Wang, Hang Liu, Shuang Wang, Wei Chen, De-Yong He

    Abstract: Reference-frame-independent measurement-device-independent quantum key distribution (RFI-MDI-QKD) is a novel protocol which eliminates all possible attacks on detector side and necessity of reference-frame alignment in source sides. However, its performance may degrade notably due to statistical fluctuations, since more parameters, e.g. yields and error rates for mismatched-basis events, must be a… ▽ More

    Submitted 4 May, 2020; v1 submitted 10 February, 2020; originally announced February 2020.

    Comments: 8 pages,4 figures

    Journal ref: Phys. Rev. A 101, 052318 (2020)

  17. Optimized protocol for twin-field quantum key distribution

    Authors: Rong Wang, Zhen-Qiang Yin, Feng-Yu Lu, Shuang Wang, Wei Chen, Chun-Mei Zhang, Wei Huang, Bing-Jie Xu, Guang-Can Guo, Zheng-Fu Han

    Abstract: Twin-field quantum key distribution (TF-QKD) and its variant protocols are highly attractive due to the advantage of overcoming the rate-loss limit for secret key rates of point-to-point QKD protocols. For variations of TF-QKD, the key point to ensure security is switching randomly between a code mode and a test mode. Among all TF-QKD protocols, their code modes are very different, e.g. modulating… ▽ More

    Submitted 29 August, 2020; v1 submitted 15 April, 2019; originally announced April 2019.

    Journal ref: Commun Phys 3, 149 (2020)

  18. Beating the fundamental rate-distance limit in a proof-of-principle quantum key distribution system

    Authors: Shuang Wang, De-Yong He, Zhen-Qiang Yin, Feng-Yu Lu, Chao-Han Cui, Wei Chen, Zheng Zhou, Guang-Can Guo, Zheng-Fu Han

    Abstract: With the help of quantum key distribution (QKD), two distant peers are able to share information-theoretically secure key bits. Increasing key rate is ultimately significant for the applications of QKD in lossy channel. However, it has proved that there is a fundamental rate-distance limit, named linear bound, which limits the performance of all existing repeaterless protocols and realizations. Su… ▽ More

    Submitted 18 February, 2019; originally announced February 2019.

    Journal ref: Phys. Rev. X 9, 021046 (2019)

  19. arXiv:1901.04264  [pdf, ps, other

    quant-ph

    Practical issues of twin-field quantum key distribution

    Authors: Feng-Yu Lu, Zhen-Qiang Yin, Rong-Wang, Guan-Jie Fan-Yuan, Shuang Wang, De-Yong He, Wei Chen, 1Wei Huang, Bing-Jie Xu, Guang-Can Guo, Zheng-Fu Han

    Abstract: Twin-Field Quantum Key Distribution(TF-QKD) protocol and its variants, such as Phase-Matching QKD(PM-QKD), sending or not QKD(SNS-QKD) and No Phase Post-Selection TF-QKD(NPP-TFQKD), are very promising for long-distance applications. However, there are still some gaps between theory and practice in these protocols. Concretely, a finite-key size analysis is still missing, and the intensity fluctuati… ▽ More

    Submitted 16 April, 2019; v1 submitted 14 January, 2019; originally announced January 2019.

    Comments: 16 pages, 9 figures

  20. Improving the performance of Twin-Field Quantum Key Distribution

    Authors: Feng-Yu Lu, Zhen-Qiang Yin, Chao-Han Cui, Guan-Jie Fan-Yuan, Rong Wang, Shuang Wang, Wei Chen, De-Yong He, Guang-Can Guo, Zheng-Fu Han

    Abstract: Among the various versions of the twin-field quantum key distribution (TF-QKD) protocol [M.Lucamarini, Z. Yuan, J. Dynes, and A. Shields, Nature (London) 557, 400 (2018)] that can overcome the rate-distance limit, the TF-QKD without phase postselection proposed by Cui et al. [Phys. Rev. Appl. 11, 034053 (2019)] is an elegant TF-QKD that can provide high key rates since the postselection of global… ▽ More

    Submitted 5 September, 2019; v1 submitted 8 January, 2019; originally announced January 2019.

    Comments: 6 pages, 3 figures

    Journal ref: Phys. Rev. A 100, 022306 (2019)

  21. Parameters optimization and real-time calibration of Measurement-Device-Independent Quantum Key Distribution Network based on Back Propagation Artificial Neural Network

    Authors: Feng-Yu Lu, Zhen-Qiang Yin, Chao Wang, Chao-Han Cui, Jun Teng, Shuang Wang, Wei Chen, Wei Huang, Bing-Jie Xu, Guang-Can Guo, Zheng-Fu Han

    Abstract: The parameters choosing (such as probabilities of choosing X-basis or Z-basis, intensity of signal state and decoy state, etc.) and system calibrating will be more challenging when the number of users of a measurement-device-independent quantum key distribution(MDI-QKD) network becomes larger. At present, people usually use optimization algorithms to search the best parameters. This method can fin… ▽ More

    Submitted 20 December, 2018; v1 submitted 20 December, 2018; originally announced December 2018.

    Comments: 7 pages, 8 figures

  22. Twin-field Quantum Key Distribution without Phase Post-Selection

    Authors: Chaohan Cui, Zhen-Qiang Yin, Rong Wang, Feng-Yu Lu, Wei Chen, Shuang Wang, Guang-Can Guo, Zheng-Fu Han

    Abstract: Twin-field quantum key distribution (TF-QKD) protocol and its variants, e.g. phase-matching (PM) QKD and TF-QKD based on sending or not sending, are highly attractive since they are able to overcome the well-known rate-loss limit for QKD protocols without repeater: $R=O(η)$ with $η$ standing for the channel transmittance. However, all these protocols require active phase randomization and post-sel… ▽ More

    Submitted 22 March, 2019; v1 submitted 6 July, 2018; originally announced July 2018.

    Journal ref: Phys. Rev. Applied 11, 034053 (2019)

  23. arXiv:1803.09313  [pdf

    quant-ph

    The visualization of the space probability distribution for a particle moving in a double ring-shaped Coulomb potential

    Authors: Yuan You, Fa-Lin Lu, Dong-Sheng Sun, Chang-Yuan Chen, Shi-Hai Dong

    Abstract: The analytical solutions to a double ring-shaped Coulomb potential (RSCP) are presented. The visualizations of the space probability distribution (SPD) are illustrated for the two-(contour) and three-dimensional (isosurface) cases. The quantum numbers (n, l, m) are mainly relevant for those quasi quantum numbers (n' ,l' ,m' ) via the double RSCP parameter c. The SPDs are of circular ring shape in… ▽ More

    Submitted 25 March, 2018; originally announced March 2018.

    Comments: 26 pages, 5 tables and 3 figures, Advances in High Energy Physics, in press

  24. arXiv:1708.05315  [pdf

    quant-ph

    The visualization of the space probability distribution for a moving particle I: in a single ring-shaped Coulomb potential

    Authors: Yuan You, Fa-Lin Lu, Dong-Sheng Sun, Chang-Yuan Chen, Shi-Hai Dong

    Abstract: We first present the exact solutions of the single ring-shaped Coulomb potential and then realize the visualizations of the space probability distribution for a moving particle within the framework of this potential. We illustrate the two-(contour) and three-dimensional (isosurface) visualizations for those specifically given quantum numbers (n, l, m) essentially related to those so-called quasi q… ▽ More

    Submitted 17 August, 2017; originally announced August 2017.

    Comments: 28 pages, 6 tables, 1 figures

    MSC Class: 83C15 ACM Class: A.m

    Journal ref: Advances in High Energy Physics, 2017

  25. arXiv:quant-ph/0605226  [pdf, ps, other

    quant-ph

    Quantum Error Correction of Time-Correlated Errors

    Authors: Feng Lu, Dan C. Marinescu

    Abstract: The complexity of the error correction circuitry forces us to design quantum error correction codes capable of correcting a single error per error correction cycle. Yet, time-correlated error are common for physical implementations of quantum systems; an error corrected during the previous cycle may reoccur later due to physical processes specific for each physical implementation of the qubits.… ▽ More

    Submitted 6 April, 2007; v1 submitted 26 May, 2006; originally announced May 2006.

    Comments: 14 pages, 3 figures

  26. arXiv:quant-ph/0511028  [pdf, ps, other

    quant-ph

    An R||C_{max} Quantum Scheduling Algorithm

    Authors: Feng Lu, Dan C. Marinescu

    Abstract: Grover's search algorithm can be applied to a wide range of problems; even problems not generally regarded as searching problems, can be reformulated to take advantage of quantum parallelism and entanglement, and lead to algorithms which show a square root speedup over their classical counterparts. In this paper, we discuss a systematic way to formulate such problems and give as an example a q… ▽ More

    Submitted 29 September, 2006; v1 submitted 3 November, 2005; originally announced November 2005.

    Comments: 15 pages