IET Quantum Communication最新文献

筛选
英文 中文
Entanglement swapping using hyperentangled pairs of two-level neutral atoms 利用超纠缠对的两能级中性原子进行纠缠交换
IF 2.8
IET Quantum Communication Pub Date : 2025-01-11 DOI: 10.1049/qtc2.12121
Syed Sajal Hasan, Syed Muhammad Arslan Anis, Muhammad Imran, Rameez-ul Islam, Saif Al-Kuwari, Tasawar Abbas
{"title":"Entanglement swapping using hyperentangled pairs of two-level neutral atoms","authors":"Syed Sajal Hasan,&nbsp;Syed Muhammad Arslan Anis,&nbsp;Muhammad Imran,&nbsp;Rameez-ul Islam,&nbsp;Saif Al-Kuwari,&nbsp;Tasawar Abbas","doi":"10.1049/qtc2.12121","DOIUrl":"10.1049/qtc2.12121","url":null,"abstract":"<p>Hyperentangled swapping is a quantum communication technique that involves the exchange of hyperentangled states, which are quantum states entangled in multiple degrees of freedom, to enable secure and efficient quantum information transfer. In this paper, we demonstrate schematics for the hyperentanglement swapping between separate pairs of neutral atoms through the mathematical framework of atomic Bragg diffraction, which is efficient and resistant to decoherence, yielding deterministic results with superior overall fidelity. The utilised cavities are in a superposition state and interact with the incoming atoms off-resonantly. Quantum information carried by the cavities is swapped through resonant interactions with two-level auxiliary atoms. We also discuss entanglement swapping under a delayed-choice scenario and provide a schematic generalisation covering multiple-qubit scenarios. Finally, we introduce specific experimental parameters to demonstrate the experimental feasibility of the scheme.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"6 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2025-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12121","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144074604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Review on 6G communication and its architecture, technologies included, challenges, security challenges and requirements, applications, with respect to AI domain 回顾了人工智能领域的6G通信及其架构、技术、挑战、安全挑战和需求、应用
IF 2.8
IET Quantum Communication Pub Date : 2024-12-30 DOI: 10.1049/qtc2.12114
Pranita Bhide, Dhanush Shetty, Suresh Mikkili
{"title":"Review on 6G communication and its architecture, technologies included, challenges, security challenges and requirements, applications, with respect to AI domain","authors":"Pranita Bhide,&nbsp;Dhanush Shetty,&nbsp;Suresh Mikkili","doi":"10.1049/qtc2.12114","DOIUrl":"10.1049/qtc2.12114","url":null,"abstract":"<p>The evolution of wireless communication systems has led to the emergence of the sixth generation (6G) communication architecture, characterised by transformative technologies and novel paradigms that transcend the capabilities of its predecessors. This paper presents an overview of the various aspects of 6G communication architecture, focusing on its technologies, challenges, and applications within the domain of artificial intelligence (AI). The abstract provides an overview of a review on 6G communication, focusing on its architecture, technologies, challenges, security concerns, and requirements within the context of the AI domain. The paper explores the evolving landscape of wireless communication, delving into the anticipated features and capabilities of 6G networks. The architecture emphasises the integration of AI-driven elements, such as intelligent resource allocation and autonomous network management. Various technologies, including terahertz frequencies and integrated satellite networks, are discussed in terms of their potential to reshape connectivity paradigms. However, alongside the promises, a multitude of challenges arise. These encompass spectrum scarcity at terahertz frequencies, energy efficiency concerns, and the need for global standardisation. Addressing security challenges is crucial, considering the expanded attack surface and the integration of AI-powered functionalities. The paper also delineates the stringent requirements that 6G must fulfil, spanning ultra-low latency, high bandwidth, massive device connectivity, and reliable communication. Contextualising these discussions, the review highlights applications within the AI domain that stand to benefit from 6G advancements. These include edge AI, augmented reality, autonomous systems, and IoT-enabled environments. By synergising cutting-edge wireless capabilities with AI-driven intelligence, 6G is poised to revolutionise industries and societal experiences in unprecedented ways.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"6 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12114","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144074767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum blockchain: Trends, technologies, and future directions 量子区块链:趋势、技术和未来方向
IF 2.8
IET Quantum Communication Pub Date : 2024-12-11 DOI: 10.1049/qtc2.12119
Manjula Gandhi S, Chaitrali Mulay, Karthiganesh Durai, G. Murali, Jafar Ali Ibrahim Syed Masood, V. Vijayarajan, Kumar Gautam, N. S. Kalyan Chakravarthy, S. Suresh Kumar, Saurabh Agarwal, Murali S, Vijayasherly V, David Asirvatham, Sarfraz Brohi, Chandru Vignesh C, Anbuchelian S
{"title":"Quantum blockchain: Trends, technologies, and future directions","authors":"Manjula Gandhi S,&nbsp;Chaitrali Mulay,&nbsp;Karthiganesh Durai,&nbsp;G. Murali,&nbsp;Jafar Ali Ibrahim Syed Masood,&nbsp;V. Vijayarajan,&nbsp;Kumar Gautam,&nbsp;N. S. Kalyan Chakravarthy,&nbsp;S. Suresh Kumar,&nbsp;Saurabh Agarwal,&nbsp;Murali S,&nbsp;Vijayasherly V,&nbsp;David Asirvatham,&nbsp;Sarfraz Brohi,&nbsp;Chandru Vignesh C,&nbsp;Anbuchelian S","doi":"10.1049/qtc2.12119","DOIUrl":"10.1049/qtc2.12119","url":null,"abstract":"<p>Blockchain technology is a highly developed database system that shares information within a business web. It stores details in blocks connected chronologically, ensuring information integrity through consensus mechanisms that prevent unauthorised alterations. This decentralised system removes the need for a believable mediator, mitigating vulnerabilities and enhancing transaction security. Blockchain’s application spans the energy, finance, media, entertainment, and retail sectors. However, classical blockchain faces threats from quantum computing advancements, necessitating the development of quantum blockchain technology. Quantum blockchain, leveraging quantum computation and information theory, offers enhanced security and immutability. In this paper, different mathematical foundations, practical implementations and effectiveness of lattice-based cryptography in securing blockchain applications are discussed. Analysis of how the cryptographic techniques can protect blockchain systems against quantum attacks is being done by using mathematical formulations and examples. Quantum computing strengthens blockchain security with advanced encryption and authentication, which is critical for safeguarding diverse sectors from evolving cyber threats. Further study on quantum-resistant design is necessary if blockchain networks are to be robust and intact in the face of future technological developments.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"516-542"},"PeriodicalIF":2.8,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12119","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143252533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Real-time seedless post-processing for quantum random number generators 量子随机数生成器的实时无籽后处理
IF 2.8
IET Quantum Communication Pub Date : 2024-12-11 DOI: 10.1049/qtc2.12118
Qian Li, Hongyi Zhou
{"title":"Real-time seedless post-processing for quantum random number generators","authors":"Qian Li,&nbsp;Hongyi Zhou","doi":"10.1049/qtc2.12118","DOIUrl":"10.1049/qtc2.12118","url":null,"abstract":"<p>Quantum-proof randomness extraction is essential for handling quantum side information possessed by a quantum adversary, which is widely applied in various quantum cryptography tasks. In this study, the authors introduce a real-time two-source quantum randomness extractor against quantum side information. The authors’ extractor is tailored for forward block sources, a novel category of min-entropy sources introduced in this work. These sources retain the flexibility to accommodate a broad range of quantum random number generators. The authors’ online algorithms demonstrate the extraction of a constant fraction of min-entropy from two infinitely long independent forward block sources. Moreover, the authors’ extractor is inherently block-wise parallelisable, presenting a practical and efficient solution for the timely extraction of high-quality randomness. Applying the authors’ extractors to the raw data of one of the most commonly used quantum random number generators, a simulated extraction speed as high as 64 Gbps is achieved.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"650-657"},"PeriodicalIF":2.8,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12118","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143252349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum anonymous one vote veto protocol based on entanglement swapping 基于纠缠交换的量子匿名一票否决协议
IF 2.8
IET Quantum Communication Pub Date : 2024-12-03 DOI: 10.1049/qtc2.12117
Yanmeng Wang, Min Jiang, Yuzhen Wei, Wenhao Zhao
{"title":"Quantum anonymous one vote veto protocol based on entanglement swapping","authors":"Yanmeng Wang,&nbsp;Min Jiang,&nbsp;Yuzhen Wei,&nbsp;Wenhao Zhao","doi":"10.1049/qtc2.12117","DOIUrl":"10.1049/qtc2.12117","url":null,"abstract":"<p>As a special voting method, one-vote veto voting also has a wide range of applications. A veto means that when the voting council puts forward a proposal, it cannot pass unless all the voters agree to it. If there is a no vote, the proposal will be rejected, but no one will know how anyone else votes. In most existing quantum anonymous one-vote veto voting protocols, an absolutely honest third party is generally required to assist the voting. However, it is difficult to find a fully trusted third party in reality. In addition, the existing quantum anonymous one-vote veto protocol does not consider the attack from the insider voters. Therefore, based on the characteristics of entanglement swapping between the Cat state and Bell state, the authors propose a new quantum anonymous one-vote veto protocol, which can not only calculate the voting result quickly and effectively but also demonstrate higher security.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"641-649"},"PeriodicalIF":2.8,"publicationDate":"2024-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12117","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143248326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Enhanced QSVM with elitist non-dominated sorting genetic optimisation algorithm for breast cancer diagnosis 基于精英非支配排序遗传优化算法的增强QSVM乳腺癌诊断
IF 2.8
IET Quantum Communication Pub Date : 2024-10-23 DOI: 10.1049/qtc2.12113
Jose P, Shanmugasundaram Hariharan, Vimaladevi Madhivanan, Sujaudeen N, Murugaperumal Krisnamoorthy, Aswani Kumar Cherukuri
{"title":"Enhanced QSVM with elitist non-dominated sorting genetic optimisation algorithm for breast cancer diagnosis","authors":"Jose P,&nbsp;Shanmugasundaram Hariharan,&nbsp;Vimaladevi Madhivanan,&nbsp;Sujaudeen N,&nbsp;Murugaperumal Krisnamoorthy,&nbsp;Aswani Kumar Cherukuri","doi":"10.1049/qtc2.12113","DOIUrl":"10.1049/qtc2.12113","url":null,"abstract":"<p>Machine learning has emerged as a promising method for predicting breast cancer using quantum computation techniques. Quantum machine learning algorithms, such as quantum support vector machines (QSVMs), are demonstrating superior efficiency and economy in tackling complex problems compared to traditional machine learning methods. When compared with classical support vector machine, the quantum machine produces remarkably accurate results. The suggested quantum SVM model in this study effectively resolved the binary classification problem for diagnosing malignant breast cancer. This work introduces an enhanced approach to breast cancer diagnosis by integrating QSVM with elitist non-dominated sorting genetic optimization (ENSGA), leveraging the strengths of both techniques to achieve more accurate and efficient classification results. ENSGA plays a crucial role in optimising QSVM parameters, ensuring that the model attains the best possible classification accuracy while considering multiple objectives simultaneously. Moreover, the quantum kernel estimation method demonstrated exceptional performance by achieving high accuracy within an impressive execution time of 0.14 in the IBM QSVM simulator. The seamless integration of quantum computation techniques with optimisation strategies such as ENSGA highlights the potential of quantum machine learning in revolutionising the field of healthcare, particularly in the domain of breast cancer diagnosis.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"384-398"},"PeriodicalIF":2.8,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12113","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Advancing quantum communication security: Metamaterial based quantum key distribution with enhanced protocols 推进量子通信安全:基于增强协议的超材料量子密钥分发
IF 2.8
IET Quantum Communication Pub Date : 2024-10-19 DOI: 10.1049/qtc2.12116
Sujit Biswas, Rajat S. Goswami, K. Hemant Kumar Reddy, Sachi Nandan Mohanty, Mohammed Altaf Ahmed
{"title":"Advancing quantum communication security: Metamaterial based quantum key distribution with enhanced protocols","authors":"Sujit Biswas,&nbsp;Rajat S. Goswami,&nbsp;K. Hemant Kumar Reddy,&nbsp;Sachi Nandan Mohanty,&nbsp;Mohammed Altaf Ahmed","doi":"10.1049/qtc2.12116","DOIUrl":"10.1049/qtc2.12116","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <p>Quantum Key Distribution (QKD) is increasingly pivotal in securing communication channels against the looming threats posed by quantum computing. However, existing QKD protocols encounter challenges related to efficiency and transmission capabilities. In response, this research investigates the integration of metamaterials into QKD systems, aiming to fortify security and enhance practicality. In the current landscape of quantum communication, where the vulnerability of classical encryption methods is magnified by rapid advancements in quantum computing, finding innovative solutions is imperative. This study is motivated by the need to strengthen the security and viability of QKD protocols to meet the demands of evolving cryptographic threats. By integrating metamaterials, the authors optimise quantum state control, improve signal-to-noise ratio (SNR), and enable longer transmission distances. Through mathematical modelling and simulations, the authors demonstrate how metamaterials reduce errors and enhance the robustness of QKD systems. Our findings show significant improvements in transmission efficiency and security, making Metamaterial-Based Quantum Key Distribution (MQKD) a promising approach for future quantum communication networks. The study not only advances the understanding of the theoretical foundations, but also presents simulated results illustrating the practical effectiveness of MQKD. The exploration of these innovative techniques contributes to the ongoing efforts to secure quantum communication channels.</p>\u0000 </section>\u0000 </div>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"399-416"},"PeriodicalIF":2.8,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12116","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimising energy consumption in Nano-cryptography: Quantum cellular automata-based multiplexer/demultiplexer design 优化纳米密码学中的能量消耗:基于量子元胞自动机的多路/解路复用器设计
IF 2.8
IET Quantum Communication Pub Date : 2024-10-10 DOI: 10.1049/qtc2.12115
Aswathy N, N. M. Siva Mangai
{"title":"Optimising energy consumption in Nano-cryptography: Quantum cellular automata-based multiplexer/demultiplexer design","authors":"Aswathy N,&nbsp;N. M. Siva Mangai","doi":"10.1049/qtc2.12115","DOIUrl":"10.1049/qtc2.12115","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <p>Future global communications will depend heavily on nano-communication networks, which use ultra-low power nano-circuits to transmit data efficiently at very high rates. An essential part of distributed communication networks is the circuit-switched network, which distributes the input signal among several users. For designing nanoscale digital circuits, Quantum Cellular Automata technology (QCA) emerges as a formidable contender against the established complementary metal-oxide-semiconductor (CMOS) technology for low-power devices. The authors endeavour to achieve an efficient design for multiplexer and demultiplexer switching circuits. The designed multiplexer and demultiplexer have 15 cells with an area of 0.02 μm<sup>2</sup> and a latency of 0.5 clock cycles. The authors assess the energy dissipation and temperature impacts for both multiplexer and demultiplexer circuits. The novel design of switch circuits facilitates the sharing of a single communication link across multiple devices at the nano-scale.</p>\u0000 </section>\u0000 </div>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"632-640"},"PeriodicalIF":2.8,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12115","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143252441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Design and analysis of parallel quantum transfer fractal priority replay with dynamic memory algorithm in quantum reinforcement learning for robotics 机器人量子强化学习中并行量子转移分形优先重放动态记忆算法的设计与分析
IF 2.8
IET Quantum Communication Pub Date : 2024-09-27 DOI: 10.1049/qtc2.12111
R. Palanivel, P. Muthulakshmi
{"title":"Design and analysis of parallel quantum transfer fractal priority replay with dynamic memory algorithm in quantum reinforcement learning for robotics","authors":"R. Palanivel,&nbsp;P. Muthulakshmi","doi":"10.1049/qtc2.12111","DOIUrl":"10.1049/qtc2.12111","url":null,"abstract":"<p>This paper introduces the parallel quantum transfer fractal priority reply with dynamic memory (P-QTFPR-DM) algorithm, an innovative approach that combines quantum computing and reinforcement learning (RL) to enhance decision-making in autonomous vehicles. Leveraging quantum principles such as superposition and entanglement, P-QTFPR-DM optimises <i>Q</i>-value approximation through a custom quantum circuit (UQC), facilitating efficient exploration and exploitation in high-dimensional state-action spaces. This algorithm utilises a quantum neural network (QNN) with 4 qubits to encode and process <i>Q</i>-values. The autonomous vehicle, equipped with GPS for real-time navigation, uses P-QTFPR-DM to reach a predefined destination with coordinates 12.82,514,234,148 latitude and 80.0,451,311,962,242 longitude. Through extensive numerical simulations, P-QTFPR-DM demonstrates a 30% reduction in decision-making time and a 25% improvement in navigation accuracy compared to classical RL methods. The QNN-based approach achieves a 95% success rate in reaching the destination within a 5-m accuracy threshold, whereas traditional RL methods achieve only an 85% success rate. Dynamic memory management in P-QTFPR-DM optimises computational resources, enhancing the vehicle's adaptability to environmental changes. These results highlight the potential of quantum computing to significantly advance autonomous vehicle technology by improving both efficiency and effectiveness in complex navigation tasks. Future research will focus on refining the algorithm and exploring its real-world applications to enhance autonomous vehicle performance.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"360-383"},"PeriodicalIF":2.8,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12111","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
x2DL: A high throughput architecture for binary-ring-learning-with-error-based post quantum cryptography schemes x2DL:一种高吞吐量架构,用于基于二进制环带错误学习的后量子加密方案
IF 2.8
IET Quantum Communication Pub Date : 2024-09-06 DOI: 10.1049/qtc2.12110
Shaik Ahmadunnisa, Sudha Ellison Mathe
{"title":"x2DL: A high throughput architecture for binary-ring-learning-with-error-based post quantum cryptography schemes","authors":"Shaik Ahmadunnisa,&nbsp;Sudha Ellison Mathe","doi":"10.1049/qtc2.12110","DOIUrl":"10.1049/qtc2.12110","url":null,"abstract":"&lt;p&gt;Lattice-based cryptography is one of the most promising cryptographic scheme which lies on the hardness of ring-learning-with-error (RLWE). A new variant of RLWE, known as binary-ring-learning-with-error (BRLWE), has less key size and more efficient hardware implementations compared to RLWE-based schemes. The key arithmetic operation for BRLWE-based encryption scheme is the implementation of arithmetic operation represented by &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;F&lt;/mi&gt;\u0000 &lt;mi&gt;D&lt;/mi&gt;\u0000 &lt;mo&gt;+&lt;/mo&gt;\u0000 &lt;mi&gt;H&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt; $FD+H$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt;, where both &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;F&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt; $F$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; and &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;H&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt; $H$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; are integer polynomials, and &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;D&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt; $D$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; is a binary polynomial. An efficient architecture to perform the arithmetic operation &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;mi&gt;F&lt;/mi&gt;\u0000 &lt;mi&gt;D&lt;/mi&gt;\u0000 &lt;mo&gt;+&lt;/mo&gt;\u0000 &lt;mi&gt;H&lt;/mi&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt; $FD+H$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; over a polynomial ring &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;msup&gt;\u0000 &lt;mi&gt;x&lt;/mi&gt;\u0000 &lt;mi&gt;n&lt;/mi&gt;\u0000 &lt;/msup&gt;\u0000 &lt;mo&gt;+&lt;/mo&gt;\u0000 &lt;mn&gt;1&lt;/mn&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt; ${x}^{n}+1$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt; is proposed. We employ two linear feedback shift register structures comprising &lt;span&gt;&lt;/span&gt;&lt;math&gt;\u0000 &lt;semantics&gt;\u0000 &lt;mrow&gt;\u0000 &lt;msup&gt;\u0000 &lt;mi&gt;x&lt;/mi&gt;\u0000 &lt;mn&gt;2&lt;/mn&gt;\u0000 &lt;/msup&gt;\u0000 &lt;/mrow&gt;\u0000 &lt;annotation&gt; ${x}^{2}$&lt;/annotation&gt;\u0000 &lt;/semantics&gt;&lt;/math&gt;-&lt;i&gt;net&lt;/i&gt; units in our design to reduce the computational time. This reduction in computational time yields to a significant improvement in the other performance metrics such as delay, area-delay product (ADP), power-delay product, throughput and efficiency compared to the existing designs. As per the experimental results, the authors’ proposed design has &lt;span&gt;&lt;/span&gt;&lt;ma","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"349-359"},"PeriodicalIF":2.8,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12110","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143248706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信