-
Article
Security of quantum key distribution with virtual mutually unbiased bases
In a perfect quantum key distribution (QKD) protocol, quantum states should be prepared and measured with mutually unbiased bases (MUBs). However, in a practical QKD system, quantum states are generally prepar...
-
Article
Open AccessDuality between operator ordering factor and massless scalar field
In order to investigate the role of quantum effects in the evolution of the universe, one can either use the Wheeler–DeWitt equation (WDWE) that contains an operator ordering factor, or add an item called mass...
-
Article
Estimating security of the quantum key distribution from the guesswork
Quantum key distribution can provide information-theoretic security keys. In practice, the eavesdropper may attack the transmitted quantum state, which makes some information leakage to the generated key. The ...
-
Article
Open AccessImproving the performance of practical decoy-state quantum key distribution with advantage distillation technology
Quantum key distribution (QKD) provides a promising solution for sharing information-theoretic secret keys between two remote legitimate parties. To improve the maximal transmission distance and the maximal er...
-
Article
Open AccessPractical Security of RSA Against NTC-Architecture Quantum Computing Attacks
Quantum algorithms can greatly speed up computation in solving some classical problems, while the computational power of quantum computers should also be restricted by laws of physics. Due to quantum time-ener...
-
Article
Information-holding quantum router of single photons using natural atom
In a quantum network, a quantum router can play a key role that involves exchanging quantum information (quantum states) among different parties. In this paper, we propose a single-photon quantum router by us...
-
Article
Getting something out of nothing in the measurement-device-independent quantum key distribution
Because of the monogamy of entanglement, the measurement-device-independent quantum key distribution is immune to the side-information leaking of the measurement devices. When the correlated measurement outcom...
-
Article
Information Recovery with Hawking Radiation from Dynamical Horizons
Information about the collapsed matter in black holes will be lost with thermal Hawking radiations. Recently, it has been proved that information is conserved in Hawking radiation from stationary black holes w...
-
Article
Transfer of gravitational information through a quantum channel
Gravitational information is incorporated into an atomic state by correlation of the internal and external degrees of freedom of the atom, in the present study of the atomic interferometer. Thus, it is difficu...
-
Article
An interpretation for the entropy of a black hole
We investigate the meaning of the entropy carried away by Hawking radiations from a black hole. We propose that the entropy for a black hole measures the uncertainty of the information about the black hole for...
-
Article
Thermodynamics inducing massive particles’ tunneling and cosmic censorship
By calculating the change of entropy, we prove that the first law of black hole thermodynamics leads to the tunneling probability of massive particles through the horizon, including the tunneling probability o...