Publications

We list some representative publications here.

2020

  1. Zelin Meng, Hong Lai. Twin-field quantum key distribution based on twisted photon. Physics Letters A 384 (16) (2020) 126322.
  2. Zelin Meng, Hong Lai. Quantum key distribution based on total angular momentum and fountain codes. Laser Physics 30 (1) (2020) 015201.

2019

  1. Hong Lai, Mingxing Luo, Yongjian Xu, Josef Pieprzyk, Lei Pan, Jun Zhang, and Mehmet A. Orgun. Efficient quantum private queries based on quantum key distribution with pulse-position modulation. Laser Physics 29 (5) (2019) 055201.

2018

  1. Hong Lai, Mingxing Luo, Josef Pieprzyk, Jun Zhang, Lei Pan, Mehmet A. Orgun. High-rate and high-capacity measurement-device-independent quantum key distribution with Fibonacci matrix coding in free space. SCIENCE CHINA Information Sciences 61(6): 062501:1-062501:11 (2018).
  2. Hong Lai, Mingxing Luo, Jun Zhang, Josef Pieprzyk, Lei Pan, Mehmet A. Orgun. A large-alphabet three-party quantum key distribution protocol based on orbital and spin angular momenta hybrid entanglement. Quantum Information Processing 17(7): 162 (2018).
  3. Hong Lai, Mingxing Luo, Mehmet A. Orgun, Josef Pieprzyk, Fuyuan Xiao, Cheng Zhan. Tunable multi-party high-capacity quantum key distribution based on m-generalized Fibonacci sequences using golden coding. Quantum Information Processing 17(9): 246 (2018).
  4. Hong Lai, MingXing Luo, Yongjian Xu, Josef Pieprzyk, Jun Zhang, Lei Pan, and Mehmet A. Orgun. Round-robin-differential-phase-shift quantum key distribution based on wavelength division multiplexing. Laser Physics Letters 15, no. 11 (2018): 115201.
  5. Hong Lai, MingXing Luo, Yongjian Xu, Josef Pieprzyk, Jun Zhang, Lei Pan, and Mehmet A. Orgun. A Quantum Secret Sharing Scheme Using Orbital Angular Momentum onto Multiple Spin States Based on Fibonacci Compression. Encoding Commun. Theor. Phys. 70 (2018) 384–390.

Earlier

  1. Hong Lai, MingXing Luo, Cheng Zhan, Josef Pieprzyk, and Mehmet A. Orgun. An improved coding method of quantum key distribution protocol based on Fibonacci-valued OAM entangled states. Physics Letters A, 381(35), 18 September 2017, Pages 2922-2926.
  2. Hong Lai, MingXing Luo, Josef Pieprzyk, Zhi-Guo Qu, Shu-Dong Li and Mehmet A. Orgun. An efficient quantum blind digital signature scheme. SCIENCE CHINA Information Sciences, 2017, 60(8): 082501.
  3. Hong Lai, Mehmet A. Orgun, Josef Pieprzyk, Jing Li, Ming-Xing Luo, Jing-Hua Xiao, and Fu-Yuan Xiao. High-capacity quantum key distribution using Chebyshev-map values corresponding to Lucas numbers coding. Quantum Information Processing 15, no. 11 (2016): 4663-4679. (SCI二区期刊论文).
  4. Hong Lai, Li-Yin Xue, Mehmet A. Orgun, Jing-Hua Xiao, Josef Pieprzyk. A hybrid quantum Key distribution using extended unitary operations and distributed fountain codes. Quantum Information Processing, 2015, 14, 697-713. (SCI二区期刊论文)
  5. Hong Lai , Mehmet A. Orgun, Josef Pieprzyk, Jinghua Xiao, Liyin Xue, Zhongtian Jia. Controllable quantum private queries using an entangled Fibonacci-sequence spiral source. Physics Letters A, 2015, 379, 2561-2568. (SCI 期刊论文)
  6. Hong Lai, Jinghua Xiao, Mehmet A. Orgun, Liyin Xue, Josef Pieprzyk. Quantum direct secret sharing with efficient eavesdropping-check and authentication based on distributed fountain codes. Quantum Information Processing, 2014, 13: 895-907. (SCI二区期刊论文)
  7. Hong Lai, Mehmet A. Orgun, Jinghua Xiao, Josef Pieprzyk, Liyin Xue,Yixian Yang. Provably secure three-party key agreement protocol using Chebyshev maps in the standard mode. Nonlinear Dynamics, 2014, 4, 1427-1439. (SCI一区 期刊论文)
  8. Hong Lai, Mehmet A. Orgun, Jinghua Xiao, Liyin Xue. Fault-tolerant high-capacity quantum key distribution over a collective-noise channel. Quantum Information Processing, 2014, 13:1523-1535. (SCI二区 期刊论文)
  9. Hong Lai, Jinghua Xiao, Lixiang Li, Yixian Yang. Applying semi-group property of enhanced Chebyshev polynomials to anonymous authentication protocol. Mathematical Problems in Engineering, 2012, 2012, 454823. (SCI 期刊论文)
  10. Hong Lai, Jing-Hua Xiao, Li-Xiang Li, Yi-Xian Yang. Recursive hiding of biometrics-based secret sharing scheme using adversary structure. Information Processing Letters, 2012, 112: 683-687. (SCI 期刊论文)
  11. 赖红, 熊海灵, 肖富元. 中外合作办学形势下线性代数的教学实践. 西南师范大学学报(自然科学版)42 (8) 134-140 2017.