Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Beating the fault-tolerance bound and security loopholes for Byzantine agreement with a quantum solution., , , , , , , and . CoRR, (2022)Experimental quantum e-commerce., , , , , and . CoRR, (2023)Breaking the Rate-Loss Relationship of Quantum Key Distribution with Asynchronous Two-Photon Interference., , , , , , , , , and . CoRR, (2021)Breaking universal limitations on quantum conference key agreement without quantum memory., , , , , , , and . CoRR, (2022)Experimental quantum secret sharing based on phase encoding of coherent states., , , , , , , , and . CoRR, (2023)Breaking Rate-Distance Limitation of Measurement-Device-Independent Quantum Secret Sharing., , , , , , , and . CoRR, (2022)Scalable High-Rate Twin-Field Quantum Key Distribution Networks without Constraint of Probability and Intensity., , , , , , and . CoRR, (2021)Open-Destination Measurement-Device-Independent Quantum Key Distribution Network., , , , , , , , and . Entropy, 22 (10): 1083 (2020)Finite-key Analysis for Quantum Conference Key Agreement with Asymmetric Channels., , , , , , and . CoRR, (2021)Experimental Phase-Matching Quantum Key Distribution without Intensity Modulation., , , , , , , and . CoRR, (2023)