Follow
Yi Zhao
Yi Zhao
Verified email at caltech.edu
Title
Cited by
Cited by
Year
Practical decoy state for quantum key distribution
X Ma, B Qi, Y Zhao, HK Lo
Physical Review A 72 (1), 012326, 2005
11392005
Quantum hacking: Experimental demonstration of time-shift attack against practical quantum-key-distribution systems
Y Zhao, CHF Fung, B Qi, C Chen, HK Lo
Physical Review A 78 (4), 042333, 2008
7452008
Quantum Hacking: Experimental demonstration of time-shift attack against practical quantum key distribution systems
Y Zhao, CHF Fung, B Qi, C Chen, HK Lo
arXiv preprint arXiv:0704.3253, 2007
7452007
Experimental quantum key distribution with decoy states
Y Zhao, B Qi, X Ma, HK Lo, L Qian
Physical review letters 96 (7), 70502, 2006
4422006
Quantum key distribution with an unknown and untrusted source
Y Zhao, B Qi, HK Lo
Physical Review A 77 (5), 052327, 2008
1372008
Quantum cryptography
HK Lo, Y Zhao
arXiv preprint arXiv:0803.2507, 2008
902008
Simulation and implementation of decoy state quantum key distribution over 60km telecom fiber
Y Zhao, B Qi, X Ma, HK Lo, L Qian
Information Theory, 2006 IEEE International Symposium on, 2094-2098, 2006
752006
Experimental quantum key distribution with active phase randomization
Y Zhao, B Qi, HK Lo
Applied physics letters 90 (4), 044106-044106-3, 2007
722007
Security analysis of an untrusted source for quantum key distribution: passive approach
Y Zhao, B Qi, HK Lo, L Qian
New Journal of Physics 12 (2), 023024, 2010
522010
Quantum key distribution with dual detectors
B Qi, Y Zhao, X Ma, HK Lo, L Qian
Physical Review A 75 (5), 052304, 2007
422007
METHOD, SYSTEM AND APPARATUS FOR OPTICAL PHASE MODULATION BASED ON FREQUENCY SHIFT
B Qi, L Qian, HK Lo, Y Zhao
US Patent App. 11/565,684, 2006
182006
Suppression of extraneous thermal noise in cavity optomechanics
Y Zhao, DJ Wilson, KK Ni, HJ Kimble
Optics Express 20 (4), 3586-3612, 2012
172012
Experimental Decoy State Quantum Key Distribution Over 15km
Y Zhao, B Qi, X Ma, HK Lo, L Qian
arXiv preprint quant-ph/0503192, 2005
112005
Quantum cryptography in real-life applications: Assumptions and security
Y Zhao
University of Toronto, 2009
82009
Quantum Key Distribution with an Untrusted Source
Y Zhao, B Qi, HK Lo
International Quantum Electronics Conference, 2009
72009
Design of synchronous “plug & play” QKD-WDM-PON for efficient quantum communications
Y Zhao, M Roetteler, L Xu, T Wang
CLEO: Applications and Technology, JThB22, 2011
42011
Quantum hacking: attacking practical quantum key distribution systems
B Qi, CHF Fung, Y Zhao, X Ma, K Tamaki, C Chen, HK Lo
Quantum Communications and Quantum Imaging V 6710, 67100I, 2007
22007
Improve the efficiency of a practical quantum key distribution system
B Qi, Y Zhao, X Ma, HK Lo, L Qian
Proceedings of SPIE, the International Society for Optical Engineering …, 2007
12007
Passive Estimate of an Untrusted Source for Quantum Key Distribution
Y Zhao, B Qi, HK Lo, L Qian
arXiv preprint arXiv:0905.4225, 2009
2009
Quantum hacking: attacking practical quantum key distribution systems [6710-18]
B Qi, C Fung, Y Zhao, X Ma, K Tamaki, C Chen, H Lo
PROCEEDINGS-SPIE THE INTERNATIONAL SOCIETY FOR OPTICAL ENGINEERING 6710, 6710, 2007
2007
The system can't perform the operation now. Try again later.
Articles 1–20