物理首页 
 学院概况 
 师资队伍 
 人才培养 
 科学研究 
 学生工作 
 招贤纳士 
 校友之家 
 标杆院系 
韦克金
2022-08-23 10:37  

     

韦克金


韦克金,男,物理科学与工程技术学院副教授,北京邮电大学&加拿大多伦多大学联合培养博士。自20167月加入广西大学物理科学与工程技术学院以来,依托广西相对论天体物理重点实验室主要从事光纤量子通信、量子真随机数以及量子信息处理等工作。


通讯地址:广西南宁市大学东路100号广西大学物理科学与工程技术学院


E-mailkjwei@gxu.edu.cn

教师信息网链接:http://prof.gxu.edu.cn/teacherDetails/cc7430aa-d31e-4e5a-bb6a-dececca6fb97


获奖及荣誉


主讲课程

本科生:光纤通信、通信原理、量子信息与量子通信导论。

研究生:无线电探测技术

研究方向

1)、实际量子密钥分发系统安全性

2)、新型量子密钥分发系统实验设计

3)、量子通信复杂度

4)、量子密码学理论与实验研究


研究生培养

每年拟招收3-4名硕士研究生,1名博士研究生,欢迎同学联系。


主持科研项目

1)基测量设备无关量子密钥分发协议理论研究,广西大学青年博士科研启动基金项目,2016.11-2018.11

2)测量设备无关量子密钥分发实验研究,广西相对论天体物理重点实验开放课题, 2017.10-2019.9

3)新型量子秘密共享协议与相关实验技术研究,广西自然科学基金青年基金,2017.09-2020.08

4)新型量子秘密共享协议和实验方案研究,国家自然科学基金青年基金,     2018.1-2020.12

5)基于不可信中继的量子密钥分发组网理论和技术,国家自然科学基金重点项目(子课题负责人), 2021.1-2025.12

6)集成芯片化测量设备无关量子密钥分发研究,国家自然科学面上项目, 2022.1-2025.12



论文、专著及专利

*表示通信作者,#表示共同一作

最新论文列表:https://scholar.google.com/citations?user=Fi3LJV8AAAAJ&hl=zh-CN&oi=ao


第一作者或通信作者论文:

1. C. Huang, T. Huang, Q. Lin, and K. Wei*, "Blinding quantum computation using alternative sources," Phys. Rev. A 104, 012614 (2021).

2. D. Ma, X. Liu, C. Huang, H. Chen, H. Lin, and K. Wei*, "Simple quantum key distribution using a stable transmitter-receiver scheme," Opt. Lett. 46, 2152-2155 (2021).

3. K. Wei, W. Li, H. Tan, Y. Li, H. Min, W.-J. Zhang, H. Li, L. You, Z. Wang, X. Jiang, T.-Y. Chen, S.-K. Liao, C.-Z. Peng, F. Xu, and J.-W. Pan, "High-Speed Measurement-Device-Independent Quantum Key Distribution with Integrated Silicon Photonics," Phys. Rev. X 10, 031030 (2020).

4. D. Ma, Y. Wang, and K. Wei*, "Practical source-independent quantum random number generation with detector efficiency mismatch," Quantum Inf. Process. 19, 384 (2020).(通信作者)

5. K. Wei#, N. Tischler#, S.-R. Zhao, Y.-H. Li, J. M. Arrazola, Y. Liu, W. Zhang, H. Li, L. You, Z. Wang, Y.-A. Chen, B. C. Sanders, Q. Zhang, G. J. Pryde, F. Xu, and J.-W. Pan, "Experimental Quantum Switching for Exponentially Superior Quantum Communication Complexity," Phys. Rev. Lett. 122, 120504 (2019).IF=9.2,一区,top期刊)

6. Y.-F. Jiang#, K. Wei#, L. Huang, K. Xu, Q.-C. Sun, Y.-Z. Zhang, W. Zhang, H. Li, L. You, Z. Wang, H.-K. Lo, F. Xu, Q. Zhang, and J.-W. Pan, "Remote Blind State Preparation with Weak Coherent Pulses in the Field," Phys. Rev. Lett. 123, 100503 (2019).IF=9.2,一区,top期刊)

7. K. Wei, W. Zhang, Y.-L. Tang, L. You, and F. Xu, "Implementation security of quantum key distribution due to polarization-dependent efficiency mismatch," Phys. Rev. A 100, 022325 (2019).IF=2.9,二区,top期刊)

8. K. Wei*, X. Yang, C. Zhu, and Z.-Q. Yin, "Quantum secret sharing without monitoring signal disturbance," Quantum Inf. Process. 17, 230 (2018).IF=2.3,二区)

9. X. Yang, K. Wei*, H. Ma, H. Liu, Z. Yin, Z. Cao, and L. Wu, "Detector-device-independent quantum secret sharing with source flaws," Sci. Rep. 8, 5728 (2018).IF=4.5,三区)

10. K. Wei, H. Liu, H. Ma, X. Yang, Y. Zhang, Y. Sun, J. Xiao, and Y. Ji, "Feasible attack on detector-device-independent quantum key distribution," Sci. Rep. 7, 449 (2017).IF=4.5,三区)

11. K. Wei, H. Ma, and X. Yang, "Trustworthiness of devices in a quantum random number generator based on a symmetric beam splitter," Journal of the Optical Society of America B 34, 2185-2189 (2017).IF=1.9,三区,编辑推荐论文)

12. K.-J. Wei, H.-Q. Ma, R.-X. Li, W. Zhu, H.-W. Liu, Y. Zhang, and R.-Z. Jiao, "Analysis of Faraday Mirror in Auto-Compensating Quantum Key Distribution," Chinese. Phys. Lett. 32, 080303 (2015).

13. K. Wei, H. Ma, and J. Yang, "Experimental circular quantum secret sharing over telecom fiber network," Opt. Express 21, 16663-16669 (2013).IF=3.5,二区,编辑推荐论文)

14. K. J. Wei, H. Q. Ma, and L. Wang, "A quantum secret sharing scheme based on two polarization beam splitters," Acta Physica Sinica -Chinese Edition- 62, 104205-104209 (2013).

非第一作者或通信作者论文:


1. W. Li, V. Zapatero, H. Tan, K. Wei, H. Min, W.-Y. Liu, X. Jiang, S.-K. Liao, C.-Z. Peng, M. Curty, F. Xu, and J.-W. Pan, "Experimental Quantum Key Distribution Secure Against Malicious Devices," Phys. Rev.  Appl. 15, 034081 (2021).

2. H. Tan, W. Li, L. Zhang, K. Wei, and F. Xu, "Chip-Based Quantum Key Distribution against Trojan-Horse Attack," Phys. Rev.  Appl. 15, 064038 (2021).

3. Y.-Z. Zhang, K. Wei, and F. Xu, "Implementation security of quantum key distribution due to polarization-dependent efficiency mismatch," Phys. Rev. A 101, 033823 (2020).

4. H. Liu, W. Wang, K. Wei, X.-T. Fang, L. Li, N.-L. Liu, H. Liang, S.-J. Zhang, W. Zhang, H. Li, L. You, Z. Wang, H.-K. Lo, T.-Y. Chen, F. Xu, and J.-W. Pan, "Experimental Demonstration of High-Rate Measurement-Device-Independent Quantum Key Distribution over Asymmetric Channels," Phys. Rev. Lett. 122, 160501 (2019).

5. Q. Li, C. Zhu, S. Ma, K. Wei, and C. Pei, "Reference-frame-independent and measurement-device-independent quantum key distribution using one single source," Int. J. Theor. Phys. 57, 2192-2202 (2018).

6. Z. Tang, K. Wei, O. Bedroya, L. Qian, and H.-K. Lo, "Experimental measurement-device-independent quantum key distribution with imperfect sources," Phys. Rev. A 93, 042308 (2016). IF=2.9,二区,top期刊)

7. F. Xu, K. Wei, S. Sajeed, S. Kaiser, S. Sun, Z. Tang, L. Qian, V. Makarov, and H.-K. Lo, "Experimental quantum key distribution with source flaws," Phys. Rev. A 92, 032305 (2015). IF=2.9,二区,top期刊)

8. X. Yang, K. Wei, H. Ma, S. Sun, H. Liu, Z. Yin, Z. Li, S. Lian, Y. Du, and L. Wu, "Measurement-device-independent entanglement-based quantum key distribution," Phys. Rev. A 93, 052303 (2016). IF=2.9,二区,top期刊)

9. X. Yang, K. Wei, H. Ma, S. Sun, Y. Du, and L. Wu, "Trojan horse attacks on counterfactual quantum key distribution," Phys. Lett. A 380, 1589-1592 (2016). IF=1.6,三区)

10. F. Xu#, J. M. Arrazola#, K. Wei, W. Wang, P. Palacios-Avila, C. Feng, S. Sajeed, N. Lutkenhaus, and H.-K. Lo, "Experimental quantum fingerprinting with weak coherent pulses," Nat. Commun. 6 (2015). IF=12.0,一区)

11. M. Hai-Qiang, K. Wei, Y. Jian-Hui, L. Rui-Xue, and Z. Wu, "A full quantum network scheme," Chinese Physics B 23, 100307 (2014).

12. H.-Q. Ma, K. Wei, and J.-H. Yang, "Experimental single qubit quantum secret sharing in a fiber network configuration," Opt. Lett. 38, 4494-4497 (2013). IF=3.1,二区)






关闭窗口