Device-independent quantum secret sharing with noise preprocessing and postselection
Q Zhang, W Zhong, MM Du, ST Shen, XY Li, AL Zhang… - Physical Review A, 2024 - APS
Device-independent (DI) quantum secret sharing (QSS) can relax the security assumptions
about the devices' internal workings and provide QSS the highest level of security in theory …
about the devices' internal workings and provide QSS the highest level of security in theory …
Experimental genuine tripartite nonlocality in a quantum triangle network
Quantum networks are the center of many of the recent advances in quantum science, not
only leading to the discovery of new properties in the foundations of quantum theory but also …
only leading to the discovery of new properties in the foundations of quantum theory but also …
Differential phase shift quantum secret sharing using a twin field
Quantum secret sharing (QSS) is essential for multiparty quantum communication, which is
one of cornerstones in the future quantum internet. However, a linear rate-distance limitation …
one of cornerstones in the future quantum internet. However, a linear rate-distance limitation …
Self-testing with dishonest parties and device-independent entanglement certification in quantum communication networks
We consider the task of device-independent quantum state certification in a network where
some of the nodes may collude and act dishonestly. We introduce the paradigm of self …
some of the nodes may collude and act dishonestly. We introduce the paradigm of self …
Hierarchical certification of nonclassical network correlations
With the increased availability of quantum technological devices, it becomes more important
to have tools to guarantee their correct nonclassical behavior. This is especially important for …
to have tools to guarantee their correct nonclassical behavior. This is especially important for …
Exponentially decreasing critical detection efficiency for any Bell inequality
We address the problem of closing the detection efficiency loophole in Bell experiments,
which is crucial for real-world applications. Every Bell inequality has a critical detection …
which is crucial for real-world applications. Every Bell inequality has a critical detection …
Efficient quantum homomorphic encryption scheme with flexible evaluators and its simulation
Quantum homomorphic encryption (QHE) allows computation on encrypted data by
employing the principles of quantum mechanics. Usually, only one evaluator is chosen to …
employing the principles of quantum mechanics. Usually, only one evaluator is chosen to …
Fully device-independent model on quantum networks
MX Luo - Physical Review Research, 2022 - APS
The Bell inequality can provide a useful witness for device-independent applications with
quantum (or postquantum) eavesdroppers. This feature holds only for single entangled …
quantum (or postquantum) eavesdroppers. This feature holds only for single entangled …
Quantum secret sharing for a class of special hypergraph access structures
CM Bai, S Zhang, L Liu - Quantum Information Processing, 2022 - Springer
In this paper, we study a class of special hypergraph access structures. According to this
structure, we construct a group of orthogonal multipartite entangled states in n-dimensional …
structure, we construct a group of orthogonal multipartite entangled states in n-dimensional …
Controlled quantum teleportation in the presence of an adversary
We present a device-independent analysis of controlled quantum teleportation where the
receiver is not trusted. We show that the notion of genuine tripartite nonlocality allows us to …
receiver is not trusted. We show that the notion of genuine tripartite nonlocality allows us to …