Qing-yu Cai’s research while affiliated with Hainan University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (71)


The information loss problem and Hawking radiation as tunneling
  • Preprint

February 2025

·

3 Reads

Baocheng Zhang

·

Christian Corda

·

Qing-yu Cai

In this paper, we review some methods that tried to solve the information loss problem. In particular, we revisit the solution based on Hawking radiation as tunneling, and provide a detailed statistical interpretation on the black hole entropy in terms of the quantum tunneling probability of Hawking radiation from the black hole. In addition, we show that black hole evaporation is governed by a time-dependent Schrodinger equation that sends pure states into pure states rather than into mixed states (Hawking had originally established that the final result would be mixed states). This is further confirmation of the fact that black hole evaporation is unitary.


Security of quantum key distribution with virtual mutually unbiased bases

June 2024

·

22 Reads

·

14 Citations

Science China Physics Mechanics and Astronomy

·

Chen-Peng Hao

·

Zhi-Jiang Chen

·

[...]

·

Qing-Yu Cai

In a perfect quantum key distribution (QKD) protocol, quantum states should be prepared and measured with mutually unbiased bases (MUBs). However, in a practical QKD system, quantum states are generally prepared and measured with imperfect MUBs using imperfect devices, possibly reducing the secret key rate and transmission distance. To analyze the security of a QKD system with imperfect MUBs, we propose virtual MUBs to characterize the quantum channel against collective attack, and analyze the corresponding secret key rate under imperfect state preparation and measurement conditions. More generally, we apply the advantage distillation method for analyzing the security of QKD with imperfect MUBs, where the error tolerance and transmission distance can be sharply improved. Our analysis method can be applied to benchmark and standardize a practical QKD system, elucidating the security analysis of different QKD protocols with imperfect devices.


Improving the performance of twin-field quantum key distribution with advantage distillation technology
  • Article
  • Full-text available

December 2023

·

56 Reads

·

12 Citations

Quantum

In this work, we apply the advantage distillation method to improve the performance of a practical twin-field quantum key distribution system under collective attack. Compared with the previous analysis result given by Maeda, Sasaki and Koashi [Nature Communication 10, 3140 (2019)], the maximal transmission distance obtained by our analysis method will be increased from 420 km to 470 km. By increasing the loss-independent misalignment error to 12%, the previous analysis method can not overcome the rate-distance bound. However, our analysis method can still overcome the rate-distance bound when the misalignment error is 16%. More surprisingly, we prove that twin-field quantum key distribution can generate positive secure key even if the misalignment error is close to 50%, thus our analysis method can significantly improve the performance of a practical twin-field quantum key distribution system.

Download

Duality between operator ordering factor and massless scalar field

September 2022

·

45 Reads

·

5 Citations

The European Physical Journal C

In order to investigate the role of quantum effects in the evolution of the universe, one can either use the Wheeler–DeWitt equation (WDWE) that contains an operator ordering factor, or add an item called massless scalar field to WDWE. In this paper, we study the relationship between operator ordering factor and massless scalar field, by applying de Broglie–Bohm quantum trajectory approach to WDWE. In theory, the evolution of the universe is determined by action, i.e., the phase part of the wavefunction of the universe. For the case of operator ordering factor and the case of massless scalar field, the functions that determine the phase part of the wavefunction of the universe satisfy the same differential equation, both in the minisuperspace model and in the Kantowski–Sachs model. This shows the equivalence of using operator ordering factor or massless scalar field to study evolution of the universe. Since there is no accelerating solution of WDWE with operator ordering factor for a grownup universe in the minisuperspace model, the equivalence of the operator ordering factor and the massless scalar field rules out the possibility of a massless scalar field as the candidate for dark energy, if the current universe is indeed homogeneous and isotropic.


Estimating security of the quantum key distribution from the guesswork

April 2022

·

45 Reads

·

5 Citations

Quantum Information Processing

Quantum key distribution can provide information-theoretic security keys. In practice, the eavesdropper may attack the transmitted quantum state, which makes some information leakage to the generated key. The security of the final key depends on how difficult it is for the eavesdropper to guess the key. The guessing probability is bounded by the trace distance between the practical generated quantum state and the ideal quantum state and hence can be applied to estimate security of quantum key distribution. With the trace distance εε\varepsilon and the secret key length n, we prove that the guessing probability can reach the upper bound ε+2-nε+2n\varepsilon +2^{-n} in some special cases. We show that different attacking strategies will give different numbers of guesses, sometimes even completely subversive differences, to get the final key. Our results demonstrate that the appropriate security parameter εε\varepsilon should be carefully selected to guarantee the security of the generated key.


Results of the four-state device-dependent quantum key distribution (DD-QKD) protocol with and without advantage distillation
a The relationship between the transmission distance and the secret key rate, the blue line is the secret key rate without advantage distillation (b = 1), while the red line is the secret key rate with the advantage distillation technology (b > 1). b The relationship between the transmission distance and the optimal b values, the advantage distillation technology (b > 1) can improve the secret key rate when the transmission distance is larger than 132 km.
Results of six-state device-dependent quantum key distribution (DD-QKD) protocol with and without advantage distillation
a The relationship between the transmission distance and the secret key rate, the blue line is the secret key rate without advantage distillation (b = 1), while the red line is the secret key rate with the advantage distillation technology (b > 1). b The relationship between the transmission distance and the optimal b values, the advantage distillation technology (b > 1) can improve the secret key rate when the transmission distance is larger than 134 km.
Results of four-state measurement-device-independent quantum key distribution (MDI-QKD) protocol with and without advantage distillation
a The relationship between the transmission distance and the secret key rate, the blue line is the secret key rate without advantage distillation (b = 1), while the red line is the secret key rate with the advantage distillation technology (b > 1). b The relationship between the transmission distance and the optimal b values, the advantage distillation technology (b > 1) can improve the secret key rate when the transmission distance is larger than 185 km.
Results of six-state measurement-device-independent quantum key distribution (MDI-QKD) protocol with and without advantage distillation
a The relationship between the transmission distance and the secret key rate, the blue line is the secret key rate without advantage distillation (b = 1), the red line is the secret key rate with the advantage distillation technology (b > 1), and the green line is the Pirandola- Laurenza-Ottaviani-Banchi (PLOB) bound. b The relationship between the transmission distance and the optimal b values, the advantage distillation technology (b > 1) can improve the secret key rate when the transmission distance is larger than 189 km.
Improving the performance of practical decoy-state quantum key distribution with advantage distillation technology

March 2022

·

155 Reads

·

37 Citations

Quantum key distribution (QKD) provides a promising solution for sharing information-theoretic secret keys between two remote legitimate parties. To improve the maximal transmission distance and the maximal error rate tolerance, we apply the advantage distillation technology to analyze the security of practical decoy-state QKD systems. Based on the practical experimental parameters, the device-dependent QKD protocols and the measurement-device-independent QKD protocols have been respectively analyzed, and our analysis results demonstrate that the advantage distillation technology can significantly improve the performance of various QKD protocols. In the four-state and six-state device-dependent QKD protocols, we prove that the maximal transmission distance can be improved from 142 km to 180 km and from 146 km to 187 km respectively. In the four-state and six-state measurement-device-independent QKD protocols, we prove that the maximal transmission distance can be improved from 195 km to 273 km and from 200 km to 282 km respectively. Advantage distillation technology increases the collection between raw keys in quantum key distribution systems. Combining a decoy state method with advantage distillation technology, the authors demonstrate improved maximal transmission distance and tolerable background error rates.


Twin-field quantum key distribution can tolerate arbitrary loss-independent misalignment error

February 2022

·

20 Reads

·

1 Citation

In this work, we apply two methods to improve performance of a practical twin-field quantum key distribution system. Firstly, to improve the secure key rate, we apply the error rate in X basis, Y basis and Z basis to precisely characterize the quantum channel. Secondly, we apply the advantage distillation method to further improve the secure key rate and the secure key transmission distance. Compared with the previous analysis result given by Maeda, Sasaki and Koashi [Nature Communication 10, 3140 (2019)], the secure key rate obtained by our analysis method will be increased at least 7%. By increasing the loss-independent misalignment error to 12%, the previous analysis method can not overcome the rate-distance bound. However, our analysis method can still overcome the rate-distance bound when the misalignment error is as large as 41%. More surprisingly, we prove that twin-field quantum key distribution can generate positive secure key even if the misalignment error arbitrary close to 50%, thus our analysis method can significantly improve the performance of a practical twin-field quantum key distribution system.


The number of operations and the corresponding time overhead
Practical Security of RSA Against NTC-Architecture Quantum Computing Attacks

August 2021

·

102 Reads

·

11 Citations

International Journal of Theoretical Physics

Quantum algorithms can greatly speed up computation in solving some classical problems, while the computational power of quantum computers should also be restricted by laws of physics. Due to quantum time-energy uncertainty relation, there is a lower limit of the evolution time for a given quantum operation, and therefore the time complexity must be considered when the number of serial quantum operations is particularly large. When the key length is about at the level of KB (encryption and decryption can be completed in a few minutes by using standard programs), it will take at least 50-100 years for NTC (Neighbor-only, Two-qubit gate, Concurrent) architecture ion-trap quantum computers to execute Shor’s algorithm. For NTC architecture superconducting quantum computers with a code distance 27 for error-correcting, when the key length increased to 16 KB, the cracking time will also increase to 100 years that far exceeds the coherence time. This shows the robustness of the updated RSA against practical quantum computing attacks.


FIG. 1: Results of the four-state DD-QKD protocol with and without advantage distillation.
Improving the Performance of Practical Quantum Key Distribution With Advantage Distillation Technology

July 2021

·

53 Reads

To improve the maximal transmission distance and the maximal error rate tolerance, we apply the advantage distillation technology to analyze security of the practical decoy-sate quantum key distribution system. Based on the practical experimental parameters, the device-dependent quantum key distribution protocols and the measurement-device-independent quantum key distribution protocols have been respectively analyzed, and our analysis results demonstrate that the advantage distillation technology can significantly improve the performance of different quantum key distribution protocols. In the four-state and six-state device-dependent quantum key distribution protocols, we prove that the maximal transmission distance can be improved from 142 km to 180 km and from 146 km to 187 km respectively. In the four-state and six-state measurement-device-independent quantum key distribution protocols, we prove that the maximal transmission distance can be improved from 195 km to 273 km and from 200 km to 282 km respectively. More interestingly, the advantage distillation technology does not need to change the hardware devices about the quantum step, thus it can be conveniently to be applied in various practical quantum key distribution systems.



Citations (49)


... For example, research has designed silicon-based polarization decoding chips that do not require external compensators, achieving stable operation under 100 kilometers of fiber [13]; Some scholars have also proposed an access network architecture based on quantum bit synchronization, which significantly reduces the complexity of user devices [14]. At the protocol level, the new interference free QKD protocol breaks through the traditional distance rate limitation [15], the differential phase shift scheme simplifies the multi-user key distribution process [16], and the virtual unbiased basis mechanism enhances the security and transmission performance of the system under imperfect measurement conditions [17]. These studies collectively promote the development of QKD systems towards integration, low cost, and high security. ...

Reference:

Final-XGBoost: a Bayesian-tuned machine learning model for quantum key distribution optimization
Security of quantum key distribution with virtual mutually unbiased bases
  • Citing Article
  • June 2024

Science China Physics Mechanics and Astronomy

... Beside string theory, duality can also manifest in other quantum gravity frameworks, such as, in the canonical formalism. Recently, a minisuperspace model for the FLRW Universe with non-zero curvature was examined in the framework of Wheeler-DeWitt quantization scheme [58]. In this study, it was found that when a massless scalar field is included with a particular choice for operator ordering, there exists a dynamical duality with the case having no scalar field that includes an arbitrary operator ordering parameter having definite relation with the separation constant appearing in the first case. ...

Duality between operator ordering factor and massless scalar field

The European Physical Journal C

... Therefore, quantum cryptography has absolute security in theory. Since the first quantum cryptographic protocol [1] appeared in 1984, many different kinds of quantum cryptographic protocols have been proposed one after another, such as quantum key distribution (QKD) [2][3][4][5] , quantum secret sharing (QSS), [6][7][8][9][10] quantum secure direct communication (QSDC), [11][12][13][14] quantum privacy comparison (QPC), [15][16][17][18] quantum key agreement (QKA), [19][20][21][22][23][24][25][26] etc. ...

Estimating security of the quantum key distribution from the guesswork

Quantum Information Processing

... For Scenario 1, we proposed an improved scheme to enhance the performance of EB-WDM-QKD, which can extend the transmission distance by more than 70 km without introducing additional quantum channel loss. For Scenario 2, which is considered the more challenging scenario, we introduced advantage distillation (AD) [19,20] into the improved scheme to achieve a longer secure transmission distance for EB-WDM-QKD in the high-noise environment. Simulation results indicated that AD can boost the transmission distance of EB-WDM-QKD by over 50 km. ...

Improving the performance of practical decoy-state quantum key distribution with advantage distillation technology

... In fundamental research, quantum speed limits have garnered significant attention in various areas, including open systems [17][18][19][20][21], the quantum-to-classical transition [22,23], and the dynamics of timedependent systems [17,[24][25][26]. In practical applications, these quantum limits have been widely employed in fields such as quantum computing [27,28], and quantum optimal control [29]. Within the realm of quantum sensing, some studies focus on the relationship between quantum speed limits and quantum Fisher information [19,21,[30][31][32][33], while others attempt to derive precision bounds directly from quantum speed limits [34,35]. ...

Practical Security of RSA Against NTC-Architecture Quantum Computing Attacks

International Journal of Theoretical Physics

... Imre [11] highlights the Educational Gap as indicative of the education system's failure to adequately equip Vietnamese students with the necessary quantum computing and data analytics knowledge and skills. This deficiency may lead to a shortage of qualified professionals capable of driving innovation in this field, thereby hindering the implementation and utilization of quantum computing solutions for data analysis tasks [11], [47]. Furthermore, societal and cultural factors play a significant role in accepting and adopting new technologies. ...

Quantum computing and the security of public key cryptography

Fundamental Research

... When c 1 = c 2 , one can obtain Vilenkin's Tunneling wavefunction [7,8], and when c 1 or c 2 equals zero, one get the Hartle-Hawking's no boundary wavefunction. When c 1 = c 2 , Hubble parameters will oscillate with the expansion of the universe, and the oscillation frequencies will increase as the universe growing up, which seems quite unreasonable [23]. In the following, we will set c 1 = c 2 for reasonable solutions. ...

Wheeler-DeWitt equation rejects quantum effects of grown-up universes as a candidate for dark energy

Physics Letters B

... In recent years, weak randomness model have received increasing attention. Subsequently, randomness attack models [13], weak-randomness basis selection model [14], weak basis-choice flaws [15], and weak-randomness model based on various protocols were proposed, e.g., reference frame independent QKD (RFI-QKD) [16], reference frame independent measurement device independent QKD (RFI-MDI-QKD) [17], measurement device independent QKD (MDI-QKD) [18], and sending or not sending twin field QKD (SNS TF-QKD) [19]. Note that continuousvariable QKD (CV-QKD) also has made significant progress in recent years [20][21][22][23], the analysis method may also be applied to analyze security of the practical CV-QKD system with imperfect devices. ...

Security of practical quantum key distribution with weak-randomness basis selection
  • Citing Article
  • August 2020

Physical Review A

... However, it is an important premise for quantum information processing and quantum cryptography [2,3]. Many schemes have been proposed to address this limit, which allows us to copy the original quantum information imperfectly, probabilistic [4][5][6][7][8] or with reduced fidelity by adding an auxiliary system [9][10][11][12][13][14][15]. And various physical systems have been studied to realize quantum cloning, including optical systems [13,[15][16][17][18], atomic systems [6,19], ion systems [20,21], superconducting system [22], and so on. ...

High-fidelity quantum cloning of two nonorthogonal quantum states via weak measurements
  • Citing Article
  • January 2019

Physical review A: General physics