ResearcherPage View Count

Geo Map
Region#
AS - Asia2176
NA - North America1667
EU - Europe1213
HKU - The University of Hong Kong490
AF - Africa423
OC - Oceania130
SA - South America19
UND - Undefined45
Total6163
Country#
US - United States1127
CN - China1035
SG - Singapore644
GB - United Kingdom529
CA - Canada528
HKU - The University of Hong Kong490
ZA - South Africa394
FR - France253
HK - Hong Kong181
IE - Ireland172
OTH - Others810
Total6163
City#
Singapore640
The University of Hong Kong490
Johannesburg394
Montreal374
Ashburn339
Beijing173
Dublin171
San Ramon162
Laval146
Sydney116
Others3158
Total6163
Proof of unconditional security of six-state quantum key distribution scheme7
One-Way Functions in Reversible Computations110
Protocol choice and parameter optimization in decoy-state measurement-device-independent quantum key distribution52
Finite-key analysis for measurement-device-independent quantum key distribution10
Quantum key distribution with entangled photon sources7
Security proof of quantum key distribution with detection efficiency mismatch6
Simple security proofs for continuous variable quantum key distribution with intensity fluctuating sources7
Ultrafast quantum random number generation based on quantum phase fluctuations12
A survey on quantum cryptographic protocols and their security6
Quantum key distribution with setting-choice-independently correlated light sources9
Quantum key distribution based on a Sagnac loop interferometer and polarization-insensitive phase modulators3
Efficient experimental quantum fingerprinting with channel multiplexing and simultaneous detection10
Loss-tolerant quantum key distribution with mixed signal states14
Making an empty promise with a quantum computer64
Erratum: Optimal entanglement transformations among N-qubit W-class states (Physical Review A - Atomic, Molecular, and Optical Physics (2010) 82 062314))6
Security of high speed quantum key distribution with finite detector dead time8
Simple security proof of twin-field type quantum key distribution protocol12
Measurement-device-independent QKD over asymmetric channels33
Experimental time-reversed adaptive Bell measurement towards all-photonic quantum repeaters12
Is baryon number violated when electroweak strings intercommute?8
Excess noise control in Gaussian-modulated coherent state quantum key distribution system13
A quantum analog of Huffman coding56
Long distance measurement-device-independent quantum key distribution with entangled photon sources52
Method for decoupling error correction from privacy amplification10
Broadband multipoint sensing with single-arm frequency-shifted interferometry19
Practical measurement device independent quantum key distribution11
High-speed quantum random number generation by measuring phase noise of a single-mode laser11
Quantum Encryption33
Randomly distilling W-class states into general configurations of two-party entanglement11
Practical aspects of measurement-device-independent quantum key distribution8
Decoy state protocols for quantum cryptography with parametric down conversion sources18
Unconditional security of quantum key distribution over arbitrarily long distances252
Efficient quantum key distribution scheme and a proof of its unconditional security666
Foiling covert channels and malicious classical post-processing units in quantum key distribution12
Classical-communication cost in distributed quantum-information processing: a generalization of quantum-communication complexity11
All-photonic quantum repeaters53
Experimental quantum key distribution with active phase randomization18
Interrogation of multiplexed fiber grating sensors using frequency-shifted interferometer16
Complementary in wormhole chromodynamics153
Quantum key distribution based on arbitrarily weak distillable entangled states11
Simple Multiuser Twin-Field Quantum Key Distribution Network11
Performance of two quantum-key-distribution protocols11
Quantum cryptology8
Loss-tolerant quantum cryptography with imperfect sources12
Proof of security of quantum key distribution with two-way classical communications6
Unconditionally secure key distillation from multiphotons7
Exact wave functions for non-Abelian Chern-Simons particles7
Secure quantum communication in the presence of phase- and polarization-dependent loss6
A simple proof of the unconditional security of quantum key distribution6
Experimental study on the Gaussian-modulated coherent-state quantum key distribution over standard telecommunication fibers13
Quantum coding theorem for mixed states7
Discrete-phase-randomized coherent state source and its application in quantum key distribution56
Experimental measurement-device-independent quantum key distribution with imperfect sources9
Bounds on probability of transformations between multipartite pure states7
Passive sources for the Bennett-Brassard 1984 quantum-key-distribution protocol with practical signals9
Aharonov-Bohm order parameters for non-Abelian gauge theories10
Practical challenges in quantum key distribution14
Measurement-device-independent quantum cryptography8
Gaussian-modulated coherent state quantum key distribution experiment over 20km telecommunication fiber9
Time-shift attack in practical quantum cryptosystems33
Classical communication cost of entanglement manipulation: Is entanglement an inter-convertible resource?7
Decoy state quantum key distribution20
Increasing entanglement monotones by separable operations12
Quantum key distribution with an untrusted source19
Security of quantum key distribution using weak coherent states with nonrandom phases26
Discrete rotational symmetry and quantum-key-distribution protocols13
Bridging the gap between theory and practice in quantum cryptography20
Quantum key distribution secure against partly malicious devices56
Measurement-device-independent quantum key distribution14
Decoy state quantum key distribution19
Upper bounds for the secure key rate of the decoy-state quantum key distribution7
Experimental quantum fingerprinting with weak coherent pulses89
Absolute maximal entanglement and quantum secret sharing33
Quantum key distribution with vacua or dim pulses as decoy states7
Experimental quantum key distribution with source flaws11
Quantum key distribution with triggering parametric down-conversion sources7
Security of quantum key distribution38
Random-party entanglement distillation in multiparty states33
Erratum: Randomly distilling W-class states into general configurations of two-party entanglement (Physical Review A (2011) 84 (052301))10
A quantum leap in security10
Quantum hacking: Attacking practical quantum key distribution systems5
How to share a quantum secret5
How to share a quantum secret7
Universal squash model for optical communications using linear optics and threshold detectors64
One-way continuous-variable quantum key distribution over 5km of standard telecom fiber10
Security of quantum bit string commitment depends on the information measure25
Secure quantum key distribution49
Cryptography's quantum barrier8
Unconditionally secure key distillation from multi-photons in a single-photon polarization based quantum key distribution19
Security of quantum key distribution with iterative sifting6
Experimental quantum key distribution with active phase randomization17
Practical decoy state for quantum key distribution10
Decoy-state quantum key distribution with two-way classical postprocessing10
Free-space reconfigurable quantum key distribution network21
Toward a reconfigurable quantum network enabled by a broadband entangled source11
Space QUEST mission proposal: Experimentally testing decoherence due to gravity8
Making an empty promise with a quantum computer186
Security of quantum key distribution with detection efficiency mismatch507
Optimal entanglement transformations among N-qubit W-class states7
Insecurity of quantum secure computations6
Effect of source tampering in the security of quantum cryptography6
Erratum: Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw (Physical Review A - Atomic, Molecular, and Optical Physics (2012) 85 (042307))11
Random bipartite entanglement from W and W-like states29
Insecurity of position-based quantum-cryptography protocols against entanglement attacks53
Topological approach to Alice electrodynamics6
Multi-partite quantum cryptographic protocols with noisy ghz states16
Conference key agreement and quantum sharing of classical secrets with noisy GHZ states22
Scattering from electroweak strings7
Universal squash model for optical communications using linear optics and threshold detectors171
Experimental Demonstration of High-Rate Measurement-Device-Independent Quantum Key Distribution over Asymmetric Channels70
Improve the efficiency of a practical quantum key distribution system5
Sagnac quantum key distribution using novel polarization-insensitive phase modulators based on frequency shift33
Quantum key distribution with an unknown and untrusted source7
How much does it cost to teleport?154
A Quantum Jump in Security5
Sequential attacks against differential-phase-shift quantum key distribution with weak coherent states13
Quantum cryptography with malicious devices24
Error correction and security in quantum cryptography7
Security analysis of an untrusted source for quantum key distribution: Passive approach7
Asymmetric Protocols for Scalable High-Rate Measurement-Device-Independent Quantum Key Distribution Networks23
Prefixed-threshold real-time selection method in free-space quantum key distribution10
Battling with quantum hackers21
Universal squash model for optical communications using linear optics and threshold detectors123
Experimental demonstration of polarization encoding measurement-device-independent quantum key distribution7
Quantum cloning with a broadband optical amplifier59
Primality test via quantum factorization208
Machine learning for optimal parameter prediction in quantum key distribution22
Simulation and implementation of decoy state quantum key distribution over 60km telecom fiber4
Why quantum bit commitment and ideal quantum coin tossing are impossible212
Making an Empty Promise with a Quantum Computer178
Frequency-shifted interferometer and its applications22
Concentrating entanglement by local actions: Beyond mean values10
Two-way quantum communication channels9
High-resolution, large dynamic range fiber length measurement based on a frequency-shifted asymmetric Sagnac interferometer8
Multi-party agile QKD network with a fiber-based entangled source20
Security of quantum key distribution with imperfect devices9
Discrete and continuous variables for measurement-device-independent quantum cryptography6
Experimental implementation of a three-party quantum key distribution protocol10
Proof-of-principle experimental demonstration of twin-field quantum key distribution over optical channels with asymmetric losses45
Dual detectors scheme in practical quantum key distribution systems13
Inefficiency and classical communication bounds for conversion between partially entangled pure bipartite states6
Reflectometry based on a frequency-shifted interferometer using sideband interference7
Entanglement monotones for W-type states10
Polarization insensitive phase modulator for quantum cryptosystems13
Efficient quantum key distribution42
Feasibility of quantum key distribution through a dense wavelength division multiplexing network11
A quantum analog of huffman coding7
Frequency-shifted Mach-Zehnder interferometer for locating multiple weak reflections along a fiber link9
Some attacks on quantum-based cryptographic protocols6
Scalable measurement-device-independent quantum key distribution networks with untrusted relays8
Decoy state quantum key distribution9
A simple proof of the unconditional security of quantum key distribution14
A high-speed quantum random number generator prototype29
Silicon photonic transmitter for polarization-encoded quantum key distribution10
Is quantum bit commitment really possible?128
Quantum cryptography37
Proof-of-principle experimental demonstration of twin-field quantum key distribution over asymmetric channels9
Entropic uncertainty relations and the measurement range problem, with consequences for high-dimensional quantum key distribution8
Fundamental rate-loss trade-off for the quantum internet8
Simple method for asymmetric twin-field quantum key distribution25
Postprocessing for quantum random-number generators: Entropy evaluation and randomness extraction11
Quantum key distribution with dual detectors7
From quantum cheating to quantum security7
Non-Abelian vortices and non-Abelian statistics9
Phase encoding schemes for measurement-device-independent quantum key distribution with basis-dependent flaw229
A tight lower bound on the classical communication cost of entanglement dilution5
Getting something out of nothing6
Concentrating entanglement by local actions - beyond mean values8
Experimental demonstration of phase-remapping attack in a practical quantum key distribution system9
A balanced homodyne detector for high-rate Gaussian-modulated coherent-state quantum key distribution61
Possibility, impossibility, and cheat sensitivity of quantum-bit string commitment7
Investigations of afterpulsing and detection efficiency recovery in superconducting nanowire single-photon detectors10
Implementation of two-party protocols in the noisy-storage model8
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems14
Phase-remapping attack in practical quantum-key-distribution systems13
Security proof of a three-state quantum-key-distribution protocol without rotational symmetry12
Passive preparation of BB84 signal states with coherent light9
Remote Blind State Preparation with Weak Coherent Pulses in the Field19
Classical communication cost of entanglement manipulation: Is entanglement an interconvertible resource?6
A Tight Lower Bound on the Classical Communication Cost of Entanglement Dilution7
Why quantum bit commitment and quantum coin tossing are impossible?105
Proof-of-Principle Experimental Demonstration of Twin-Field Type Quantum Key Distribution18
Experimental quantum key distribution with decoy states11


TotJulAugSepOctNovDecJanFebMarAprMayJun
2016/2017354321613369030121012333634
2017/2018224251012388358735131815
2018/20193973191512942214412517864
2019/2020127012511259877912712114210894108108
2020/20213138265152328272640643824331173743
2021/20227801470186911687833154073120
Ever6163