Bell nonlocality
Bell's 1964 theorem, which states that the predictions of quantum theory cannot be
accounted for by any local theory, represents one of the most profound developments in the …
accounted for by any local theory, represents one of the most profound developments in the …
Ultracold atomic gases in optical lattices: mimicking condensed matter physics and beyond
We review recent developments in the physics of ultracold atomic and molecular gases in
optical lattices. Such systems are nearly perfect realisations of various kinds of Hubbard …
optical lattices. Such systems are nearly perfect realisations of various kinds of Hubbard …
Multiparty quantum-state sharing of an arbitrary two-particle state with Einstein-Podolsky-Rosen pairs
FG Deng, XH Li, CY Li, P Zhou, HY Zhou - Physical Review A—Atomic …, 2005 - APS
A scheme for multiparty quantum state sharing of an arbitrary two-particle state is presented
with Einstein-Podolsky-Rosen pairs. Any one of the N agents has the access to regenerate …
with Einstein-Podolsky-Rosen pairs. Any one of the N agents has the access to regenerate …
Bidirectional quantum key distribution protocol with practical faint laser pulses
FG Deng, GL Long - Physical Review A—Atomic, Molecular, and Optical …, 2004 - APS
We present a two-way protocol for the quantum key distribution with practical faint laser
pulses. It is secure when the faint laser pulses contain no more than two photons. The key …
pulses. It is secure when the faint laser pulses contain no more than two photons. The key …
Experimental observation of four-photon entangled Dicke state with high fidelity
We present the experimental observation of the symmetric four-photon entangled Dicke
state with two excitations| D 4 (2)⟩. A simple experimental setup allowed quantum state …
state with two excitations| D 4 (2)⟩. A simple experimental setup allowed quantum state …
Experimental demonstration of four-party quantum secret sharing
Secret sharing is a multiparty cryptographic task in which some secret information is split into
several pieces which are distributed among the participants such that only an authorized set …
several pieces which are distributed among the participants such that only an authorized set …
Bidirectional quantum secret sharing and secret splitting with polarized single photons
FG Deng, HY Zhou, GL Long - Physics Letters A, 2005 - Elsevier
In this Letter, we present quantum secret sharing and secret splitting protocols with single
photons running forth and back between the participating parties. The protocol has a high …
photons running forth and back between the participating parties. The protocol has a high …
Cryptanalysis of the Hillery-Bužek-Berthiaume quantum secret-sharing protocol
SJ Qin, F Gao, QY Wen, FC Zhu - Physical Review A—Atomic, Molecular, and …, 2007 - APS
The participant attack is the most serious threat for quantum secret-sharing protocols. We
present a method to analyze the security of quantum secret-sharing protocols against this …
present a method to analyze the security of quantum secret-sharing protocols against this …
Quantum secure direct communication network with Einstein–Podolsky–Rosen pairs
FG Deng, XH Li, CY Li, P Zhou, HY Zhou - Physics Letters A, 2006 - Elsevier
We discuss the four requirements for a real point-to-point quantum secure direct
communication (QSDC) first, and then present two efficient QSDC network schemes with an …
communication (QSDC) first, and then present two efficient QSDC network schemes with an …
Circular quantum secret sharing
FG Deng, HY Zhou, GL Long - Journal of Physics A: Mathematical …, 2006 - iopscience.iop.org
A circular quantum secret sharing protocol is proposed, which is useful and efficient when
one of the parties of secret sharing is remote to the others who are in adjacent, especially …
one of the parties of secret sharing is remote to the others who are in adjacent, especially …