scispace - formally typeset
Search or ask a question
Author

Guihua Zeng

Bio: Guihua Zeng is an academic researcher from Shanghai Jiao Tong University. The author has contributed to research in topics: Quantum key distribution & Quantum cryptography. The author has an hindex of 32, co-authored 215 publications receiving 4281 citations. Previous affiliations of Guihua Zeng include Xidian University & Northwest University (China).


Papers
More filters
Journal ArticleDOI
TL;DR: The general principle for a quantum-signature scheme is proposed and investigated and can guarantee the unconditional security of the algorithm, mostly due to the correlation of the GHZ triplet states and the use of quantum one-time pads.
Abstract: The general principle for a quantum-signature scheme is proposed and investigated based on ideas from classical signature schemes and quantum cryptography. The suggested algorithm is implemented by a symmetrical quantum key cryptosystem and Greenberger-Horne-Zeilinger (GHZ) triplet states and relies on the availability of an arbitrator. We can guarantee the unconditional security of the algorithm, mostly due to the correlation of the GHZ triplet states and the use of quantum one-time pads.

370 citations

Journal ArticleDOI
TL;DR: This work overcome the previous range limitation by controlling system excess noise and reports a long distance continuous-variable quantum key distribution experiment, paving the road to the large-scale secure quantum communication with continuous variables and serves as a stepping stone in the quest for quantum network.
Abstract: Quantum cryptography founded on the laws of physics could revolutionize the way in which communication information is protected. Significant progresses in long-distance quantum key distribution based on discrete variables have led to the secure quantum communication in real-world conditions being available. However, the alternative approach implemented with continuous variables has not yet reached the secure distance beyond 100 km. Here, we overcome the previous range limitation by controlling system excess noise and report such a long distance continuous-variable quantum key distribution experiment. Our result paves the road to the large-scale secure quantum communication with continuous variables and serves as a stepping stone in the quest for quantum network.

323 citations

Journal ArticleDOI
TL;DR: This work designs an automatic SRG algorithm, along with a boundary-oriented parallel pixel labeling technique and an automatic seed selection method, and a seed tracking algorithm is proposed for automatic moving object extraction.

261 citations

Journal ArticleDOI
Duan Huang1, Peng Huang1, Dakai Lin1, Chao Wang1, Guihua Zeng1 
TL;DR: This work uses a "locally" generated LO and implements with a 1-GHz shot-noise-limited homodyne detector to achieve high-speed quantum measurement, and proposes a secure phase compensation scheme to maintain a low level of excess noise.
Abstract: We report a 100-MHz continuous-variable quantum key distribution (CV-QKD) experiment over a 25-km fiber channel without sending a local oscillator (LO). We use a "locally" generated LO and implement with a 1-GHz shot-noise-limited homodyne detector to achieve high-speed quantum measurement, and we propose a secure phase compensation scheme to maintain a low level of excess noise. These make high-bit-rate CV-QKD significantly simpler for larger transmission distances compared with previous schemes in which both LO and quantum signals are transmitted through the insecure quantum channel.

213 citations

Journal ArticleDOI
TL;DR: In this paper, a quantum key agreement protocol for quantum teleportation is presented. But the key bits are determined only by random measurement outcomes and are independent of the states transmitted over the channel.
Abstract: By replacing a classical channel with a quantum one during quantum teleportation, a quantum key agreement protocol is presented. The key bits are determined only by the random measurement outcomes and are independent of the states transmitted over the channel.

191 citations


Cited by
More filters
Christopher M. Bishop1
01 Jan 2006
TL;DR: Probability distributions of linear models for regression and classification are given in this article, along with a discussion of combining models and combining models in the context of machine learning and classification.
Abstract: Probability Distributions.- Linear Models for Regression.- Linear Models for Classification.- Neural Networks.- Kernel Methods.- Sparse Kernel Machines.- Graphical Models.- Mixture Models and EM.- Approximate Inference.- Sampling Methods.- Continuous Latent Variables.- Sequential Data.- Combining Models.

10,141 citations

Journal ArticleDOI
TL;DR: In this article, the time dependence of ρ11, ρ22 and ρ12 under steady-state conditions was analyzed under a light field interaction V = -μ12Ee iωt + c.c.
Abstract: (b) Write out the equations for the time dependence of ρ11, ρ22, ρ12 and ρ21 assuming that a light field interaction V = -μ12Ee iωt + c.c. couples only levels |1> and |2>, and that the excited levels exhibit spontaneous decay. (8 marks) (c) Under steady-state conditions, find the ratio of populations in states |2> and |3>. (3 marks) (d) Find the slowly varying amplitude ̃ ρ 12 of the polarization ρ12 = ̃ ρ 12e iωt . (6 marks) (e) In the limiting case that no decay is possible from intermediate level |3>, what is the ground state population ρ11(∞)? (2 marks) 2. (15 marks total) In a 2-level atom system subjected to a strong field, dressed states are created in the form |D1(n)> = sin θ |1,n> + cos θ |2,n-1> |D2(n)> = cos θ |1,n> sin θ |2,n-1>

1,872 citations

Journal ArticleDOI
TL;DR: An analysis of comparative surveys done in the field of gesture based HCI and an analysis of existing literature related to gesture recognition systems for human computer interaction by categorizing it under different key parameters are provided.
Abstract: As computers become more pervasive in society, facilitating natural human---computer interaction (HCI) will have a positive impact on their use. Hence, there has been growing interest in the development of new approaches and technologies for bridging the human---computer barrier. The ultimate aim is to bring HCI to a regime where interactions with computers will be as natural as an interaction between humans, and to this end, incorporating gestures in HCI is an important research area. Gestures have long been considered as an interaction technique that can potentially deliver more natural, creative and intuitive methods for communicating with our computers. This paper provides an analysis of comparative surveys done in this area. The use of hand gestures as a natural interface serves as a motivating force for research in gesture taxonomies, its representations and recognition techniques, software platforms and frameworks which is discussed briefly in this paper. It focuses on the three main phases of hand gesture recognition i.e. detection, tracking and recognition. Different application which employs hand gestures for efficient interaction has been discussed under core and advanced application domains. This paper also provides an analysis of existing literature related to gesture recognition systems for human computer interaction by categorizing it under different key parameters. It further discusses the advances that are needed to further improvise the present hand gesture recognition systems for future perspective that can be widely used for efficient human computer interaction. The main goal of this survey is to provide researchers in the field of gesture based HCI with a summary of progress achieved to date and to help identify areas where further research is needed.

1,338 citations

Journal ArticleDOI
02 May 2018-Nature
TL;DR: This work introduces an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station, enabling a form of quantum key distribution that can exceed the secret-key capacity without using quantum repeaters and that has security independent of the measuring devices.
Abstract: Quantum key distribution (QKD)1,2 allows two distant parties to share encryption keys with security based on physical laws. Experimentally, QKD has been implemented via optical means, achieving key rates of 1.26 megabits per second over 50 kilometres of standard optical fibre3 and of 1.16 bits per hour over 404 kilometres of ultralow-loss fibre in a measurement-device-independent configuration4. Increasing the bit rate and range of QKD is a formidable, but important, challenge. A related target, which is currently considered to be unfeasible without quantum repeaters5–7, is overcoming the fundamental rate–distance limit of QKD8. This limit defines the maximum possible secret key rate that two parties can distil at a given distance using QKD and is quantified by the secret-key capacity of the quantum channel9 that connects the parties. Here we introduce an alternative scheme for QKD whereby pairs of phase-randomized optical fields are first generated at two distant locations and then combined at a central measuring station. Fields imparted with the same random phase are ‘twins’ and can be used to distil a quantum key. The key rate of this twin-field QKD exhibits the same dependence on distance as does a quantum repeater, scaling with the square-root of the channel transmittance, irrespective of who (malicious or otherwise) is in control of the measuring station. However, unlike schemes that involve quantum repeaters, ours is feasible with current technology and presents manageable levels of noise even on 550 kilometres of standard optical fibre. This scheme is a promising step towards overcoming the rate–distance limit of QKD and greatly extending the range of secure quantum communications. Twin optical fields enable a form of quantum key distribution that can exceed the secret-key capacity without using quantum repeaters and that has security independent of the measuring devices.

787 citations

Journal ArticleDOI
TL;DR: This review begins by reviewing protocols of quantum key distribution based on discrete variable systems, and considers aspects of device independence, satellite challenges, and high rate protocols based on continuous variable systems.
Abstract: Quantum cryptography is arguably the fastest growing area in quantum information science. Novel theoretical protocols are designed on a regular basis, security proofs are constantly improving, and experiments are gradually moving from proof-of-principle lab demonstrations to in-field implementations and technological prototypes. In this paper, we provide both a general introduction and a state-of-the-art description of the recent advances in the field, both theoretical and experimental. We start by reviewing protocols of quantum key distribution based on discrete variable systems. Next we consider aspects of device independence, satellite challenges, and protocols based on continuous-variable systems. We will then discuss the ultimate limits of point-to-point private communications and how quantum repeaters and networks may overcome these restrictions. Finally, we will discuss some aspects of quantum cryptography beyond standard quantum key distribution, including quantum random number generators and quantum digital signatures.

769 citations