量子信息理论
2006—2019年发表文章如下:
45.M. H. Wang and Q. Y. Cai*, "High-fidelity quantum cloning of two nonorthogonal quantum states via weak measurements",Phys. Rev. A 99, 7, 012324 (2019).
44.M. H. Wang and Q. Y. Cai*,"Duplicating classical bits with universal quantum cloning machine" Sci. China-Phys. Mech. Astron. 62, 5, 030312 (2019).
43.Ma, Y. H; Cai, Q. Y ; Dong, H, "Non-thermal radiation of black holes off canonical typicality", EPL 122, 30001(2018).
42.Guo, X. K; *Cai, Q.Y, "Hidden messenger from quantum geometry: Towards information conservation in quantum gravity", Mod. Phys. Lett. A 33, 1850103(2018).
41.*Huang, Z. Q; Guo, X. K, "Lieb-Robinson bound at finite temperatures", Phys. Rev. E 97, 062131(2018).
40.Huang . Z. Q, *Cai Q.Y, "The equilibration time scales of the quantum lattice model", Chin. Sci. Bull.63, 3096(2018).
39.D. S. He, Q.Y. Cai, "Correlation and the black hole information loss problem", Chin. Sci. Bull.63, 3089(2018).
38.M. H. Wang, *Q. Y. Cai, "Duplicating classical bits with universal quantum cloning machine", Sci.China. Phys. 62, 030312(2018).
37.D. S. He, *Q.Y. Cai, Gravitational correlation, black hole entropy, and information conservation, Sci. China. Phys.Mech. Astron. 60(4): 040011.(2017).
36.Z. Q. Huang, D. F. Gao and *Q. Y. Cai, Scalar and tensor perturbations in vacuum inflation, Class. Quant. Grav. 34(10): 105013.(2017).
35.*W. Q. Wu, Q.Y. Cai, H.G. Zhang, X.Y. Liang, Quantum Public Key Cryptosystem Based on Bell States, Int. J. Theor. Phys. 56(11): 3431-3440.(2017).
34.Y. G. Tan, Q. Y. Cai*, "Comment on "Device-independent entanglement-based Bennett 1992 protocol"", Phys. Rev. A93(6), 066303 (2016).
33.G. A. Yan, Q. Y. Cai*, A. X. Chen, "Information-holding quantum router of single photons using natural atom", Euro. Phys. J. D 70(4), 93 (2016).
32.Q. Y. Cai, C. P. Sun, L.You, "Information-carrying Hawking radiation and the number of microstate for a black hole", Nucl. Phys. B 905, 327-336(2016).
31.D. S. He, D. F.Gao, and Q. Y. Cai*, "Dynamical interpretation of the wavefunction of the universe", Phys. Lett. B 748, 361-365(2015).
30.D. S. He, and Q. Yu. Cai*, "Inflation of small true vacuum bubble by quantization of Einstein-Hilbert action", Sci.China. Phys. Mech. Astron. 58(7), 079801(2015).
29.H. Dong; Q.Y. Cai; X. F. Liu; *C. P. Sun,One Hair Postulate for Hawking Radiation as Tunneling Process,Commu. Theor. Phys. 61: 289-292, (2014).
28.D. He, D. Gao, *Q.Y. Cai, Spontaneous creation of the universe from nothing, Phys. Rev. D 89: 083510,(2014).
27.B. Zhang, Q. Y. Cai, *M. Zhan, Correlation, entropy, and information transfer in black hole radiation, Chin. Sci. Bull. 59: 1057-1065, (2014).
26.*X. K. Guo, *Q. Y. Cai, Information Recovery with Hawking Radiation from Dynamical Horizons , Int. J. of Theo. Phys. 53: 2980-2987,(2014).
25.H. Lu, C. H. F. Fung, and Q. Y. Cai, "Two-way deterministic quantum key distribution against detector-side-channel attacks', Phys. Rev. A 88 (4), 044302,(2013).
24.B. C. Zhang, Q. Y. Cai, M. S. Zhan, and L.You, "Towards experimentally testing the paradox of black hole information loss", Phys. Rev. D 87 (4), 044006 ,(2013).
23.B. C. Zhang, Q. Y. Cai, M. S. Zhan, and L. You, "Information Conservation is fundamental: Recovering the loss information in Hawking radiation", Int. J. Mod. Phys. D 22 (12), 1341014 , (2013).
22. Zhang. B. C, Cai. Q. Y and Zhan. M. S, Entropy Conservation in the Transition of Schwarzschild-de Sitter Space to de Sitter Space through Tunneling, Chin. Phys. Lett. 29, 020401 (2012).
21. Fung .C. H. F, Ma. X. F, Chau . H. F, and Cai. Q. Y, Quantum key distribution with delayed privacy amplification and its application to the security proof of a two-way deterministic protocol, Phys. Rev. A 85, 032308 (2012).
20. Tan. Y. G and Cai. Q. Y, Passive decoy state quantum key distribution with finite resource. Int. J. Quantum. Inf. 9, 903 (2011).
19. Zhang. B. C, Cai. Q. Y, Zhan. M. S, and You. L, Noncommutative information is revealed from Hawking radiation as tunneling. EPL. 94, 20002 (2011).
18. Zhang. B.C, Cai. Q. Y, Zhan. M. S, and You. L, An interpretation for the entropy of a black hole. Gen. Relativ. Gravitation. 43, 797 (2011).
17. Zhang. BC, Cai. Q. Y, Zhan. M. S, and You. L, Entropy is conserved in Hawking radiation as tunneling: A revisit of the black hole information loss paradox. Ann. Phys. 326, 350 (2011).
16. Zhang. B. C, Cai. Q. Y, and Zhan. M. S, Thermodynamics inducing massive particles' tunneling and cosmic censorship. Eur. Phys. C 68, 561 (2010).
15. Tan. Y. G and Cai. Q. Y, Practical decoy state quantum key distribution with finite resource. Eur. Phys. D 56, 449 (2010).
14. Lai. X. Y, Cai. Q. Y, and Zhan . M. S, Bohmian mechanics to high-order harmonic generation. Chin. Phys. B 19, 020302 (2010).
13. Zhang. B. C, Cai. Q. Y, You. L, and Zhan. M. S, Hidden messenger revealed in Hawking radiation: A resolution to the paradox of black hole information loss. Phys. Lett. B 675, 98 (2009).
12. Tan. Y. G, Lv. H, and Cai. Q.Y, Comment on "Quantum Key Distribution with Classical Bob". Phys. Rev. Lett. 102, 098901 (2009).
11. Zhang. B. C, Cai. Q. Y, and Zhan. M. S, The temperature in Hawking radiation as tunneling. Phys. Lett. B 671, 310 (2009).
10. Lai. X. Y, Cai. Q. Y, and Zhan. M.S, From a quantum to a classical description of intense laser-atom physics with Bohmian trajectories. New J. Phys. 11, 113035 (2009).
9. Lai. X. Y, Cai . Q. Y, and Zhan. M. S, Above-threshold ionization photoelectron spectrum from quantum trajectory. Eur. Phys. D 53, 393 (2009).
8. Lv. H and Cai. Q. Y, Quantum key distribution with classical alice. Int. J. Quantum. Inf. 6, 1195 (2008).
7. Tan . Y. G, Cai. Q. Y, and Shi . T. Y, Indistinguishability of orthogonal time-separated bell states,Chin. Phys. B 17, 3194 (2008).
6. Zhang . B. C, Cai. Q.Y, and Zhan. M. S, Hawking radiation as tunneling derived from black hole thermodynamics through the quantum horizon,Phys. Lett. B 665, 260 (2008).
5. Tan. Y.G and Cai. Q.Y, Classical correlation in quantum dialogue. Int. J. Quantum. Inf, 6, 325 (2008).
4.Tan .Y.G, Cai. Q.Y, and Shi. T.Y, Quantum overloading cryptography using single-photon nonlocality. Chin. Phys. Lett. 24, 2177 (2007).
3.Cai .Q.Y, and Lv. H, Quantum key distribution against Trojan horse attacks. Chin. Phys. Lett. 24, 1154 (2007).
2.Cai. Q.Y, and Tan.Y.G, Photon-number-resolving decoy-state quantum key distribution. Phys. Rev. A 73, 032305 (2006).
1.Cai. Q.Y, Eavesdropping on the two-way quantum communication protocols with invisible photons. Phys. Lett. A 351, 23 (2006).