Syed Sajal Hasan, Syed Muhammad Arslan Anis, Muhammad Imran, Rameez-ul Islam, Saif Al-Kuwari, Tasawar Abbas
{"title":"Entanglement swapping using hyperentangled pairs of two-level neutral atoms","authors":"Syed Sajal Hasan, Syed Muhammad Arslan Anis, Muhammad Imran, Rameez-ul Islam, Saif Al-Kuwari, Tasawar Abbas","doi":"10.1049/qtc2.12121","DOIUrl":"10.1049/qtc2.12121","url":null,"abstract":"<p>Hyperentangled swapping is a quantum communication technique that involves the exchange of hyperentangled states, which are quantum states entangled in multiple degrees of freedom, to enable secure and efficient quantum information transfer. In this paper, we demonstrate schematics for the hyperentanglement swapping between separate pairs of neutral atoms through the mathematical framework of atomic Bragg diffraction, which is efficient and resistant to decoherence, yielding deterministic results with superior overall fidelity. The utilised cavities are in a superposition state and interact with the incoming atoms off-resonantly. Quantum information carried by the cavities is swapped through resonant interactions with two-level auxiliary atoms. We also discuss entanglement swapping under a delayed-choice scenario and provide a schematic generalisation covering multiple-qubit scenarios. Finally, we introduce specific experimental parameters to demonstrate the experimental feasibility of the scheme.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"6 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2025-01-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12121","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144074604","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Review on 6G communication and its architecture, technologies included, challenges, security challenges and requirements, applications, with respect to AI domain","authors":"Pranita Bhide, Dhanush Shetty, Suresh Mikkili","doi":"10.1049/qtc2.12114","DOIUrl":"10.1049/qtc2.12114","url":null,"abstract":"<p>The evolution of wireless communication systems has led to the emergence of the sixth generation (6G) communication architecture, characterised by transformative technologies and novel paradigms that transcend the capabilities of its predecessors. This paper presents an overview of the various aspects of 6G communication architecture, focusing on its technologies, challenges, and applications within the domain of artificial intelligence (AI). The abstract provides an overview of a review on 6G communication, focusing on its architecture, technologies, challenges, security concerns, and requirements within the context of the AI domain. The paper explores the evolving landscape of wireless communication, delving into the anticipated features and capabilities of 6G networks. The architecture emphasises the integration of AI-driven elements, such as intelligent resource allocation and autonomous network management. Various technologies, including terahertz frequencies and integrated satellite networks, are discussed in terms of their potential to reshape connectivity paradigms. However, alongside the promises, a multitude of challenges arise. These encompass spectrum scarcity at terahertz frequencies, energy efficiency concerns, and the need for global standardisation. Addressing security challenges is crucial, considering the expanded attack surface and the integration of AI-powered functionalities. The paper also delineates the stringent requirements that 6G must fulfil, spanning ultra-low latency, high bandwidth, massive device connectivity, and reliable communication. Contextualising these discussions, the review highlights applications within the AI domain that stand to benefit from 6G advancements. These include edge AI, augmented reality, autonomous systems, and IoT-enabled environments. By synergising cutting-edge wireless capabilities with AI-driven intelligence, 6G is poised to revolutionise industries and societal experiences in unprecedented ways.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"6 1","pages":""},"PeriodicalIF":2.8,"publicationDate":"2024-12-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12114","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"144074767","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Manjula Gandhi S, Chaitrali Mulay, Karthiganesh Durai, G. Murali, Jafar Ali Ibrahim Syed Masood, V. Vijayarajan, Kumar Gautam, N. S. Kalyan Chakravarthy, S. Suresh Kumar, Saurabh Agarwal, Murali S, Vijayasherly V, David Asirvatham, Sarfraz Brohi, Chandru Vignesh C, Anbuchelian S
{"title":"Quantum blockchain: Trends, technologies, and future directions","authors":"Manjula Gandhi S, Chaitrali Mulay, Karthiganesh Durai, G. Murali, Jafar Ali Ibrahim Syed Masood, V. Vijayarajan, Kumar Gautam, N. S. Kalyan Chakravarthy, S. Suresh Kumar, Saurabh Agarwal, Murali S, Vijayasherly V, David Asirvatham, Sarfraz Brohi, Chandru Vignesh C, Anbuchelian S","doi":"10.1049/qtc2.12119","DOIUrl":"10.1049/qtc2.12119","url":null,"abstract":"<p>Blockchain technology is a highly developed database system that shares information within a business web. It stores details in blocks connected chronologically, ensuring information integrity through consensus mechanisms that prevent unauthorised alterations. This decentralised system removes the need for a believable mediator, mitigating vulnerabilities and enhancing transaction security. Blockchain’s application spans the energy, finance, media, entertainment, and retail sectors. However, classical blockchain faces threats from quantum computing advancements, necessitating the development of quantum blockchain technology. Quantum blockchain, leveraging quantum computation and information theory, offers enhanced security and immutability. In this paper, different mathematical foundations, practical implementations and effectiveness of lattice-based cryptography in securing blockchain applications are discussed. Analysis of how the cryptographic techniques can protect blockchain systems against quantum attacks is being done by using mathematical formulations and examples. Quantum computing strengthens blockchain security with advanced encryption and authentication, which is critical for safeguarding diverse sectors from evolving cyber threats. Further study on quantum-resistant design is necessary if blockchain networks are to be robust and intact in the face of future technological developments.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"516-542"},"PeriodicalIF":2.8,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12119","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143252533","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Real-time seedless post-processing for quantum random number generators","authors":"Qian Li, Hongyi Zhou","doi":"10.1049/qtc2.12118","DOIUrl":"10.1049/qtc2.12118","url":null,"abstract":"<p>Quantum-proof randomness extraction is essential for handling quantum side information possessed by a quantum adversary, which is widely applied in various quantum cryptography tasks. In this study, the authors introduce a real-time two-source quantum randomness extractor against quantum side information. The authors’ extractor is tailored for forward block sources, a novel category of min-entropy sources introduced in this work. These sources retain the flexibility to accommodate a broad range of quantum random number generators. The authors’ online algorithms demonstrate the extraction of a constant fraction of min-entropy from two infinitely long independent forward block sources. Moreover, the authors’ extractor is inherently block-wise parallelisable, presenting a practical and efficient solution for the timely extraction of high-quality randomness. Applying the authors’ extractors to the raw data of one of the most commonly used quantum random number generators, a simulated extraction speed as high as 64 Gbps is achieved.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"650-657"},"PeriodicalIF":2.8,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12118","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143252349","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum anonymous one vote veto protocol based on entanglement swapping","authors":"Yanmeng Wang, Min Jiang, Yuzhen Wei, Wenhao Zhao","doi":"10.1049/qtc2.12117","DOIUrl":"10.1049/qtc2.12117","url":null,"abstract":"<p>As a special voting method, one-vote veto voting also has a wide range of applications. A veto means that when the voting council puts forward a proposal, it cannot pass unless all the voters agree to it. If there is a no vote, the proposal will be rejected, but no one will know how anyone else votes. In most existing quantum anonymous one-vote veto voting protocols, an absolutely honest third party is generally required to assist the voting. However, it is difficult to find a fully trusted third party in reality. In addition, the existing quantum anonymous one-vote veto protocol does not consider the attack from the insider voters. Therefore, based on the characteristics of entanglement swapping between the Cat state and Bell state, the authors propose a new quantum anonymous one-vote veto protocol, which can not only calculate the voting result quickly and effectively but also demonstrate higher security.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"641-649"},"PeriodicalIF":2.8,"publicationDate":"2024-12-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12117","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143248326","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Jose P, Shanmugasundaram Hariharan, Vimaladevi Madhivanan, Sujaudeen N, Murugaperumal Krisnamoorthy, Aswani Kumar Cherukuri
{"title":"Enhanced QSVM with elitist non-dominated sorting genetic optimisation algorithm for breast cancer diagnosis","authors":"Jose P, Shanmugasundaram Hariharan, Vimaladevi Madhivanan, Sujaudeen N, Murugaperumal Krisnamoorthy, Aswani Kumar Cherukuri","doi":"10.1049/qtc2.12113","DOIUrl":"10.1049/qtc2.12113","url":null,"abstract":"<p>Machine learning has emerged as a promising method for predicting breast cancer using quantum computation techniques. Quantum machine learning algorithms, such as quantum support vector machines (QSVMs), are demonstrating superior efficiency and economy in tackling complex problems compared to traditional machine learning methods. When compared with classical support vector machine, the quantum machine produces remarkably accurate results. The suggested quantum SVM model in this study effectively resolved the binary classification problem for diagnosing malignant breast cancer. This work introduces an enhanced approach to breast cancer diagnosis by integrating QSVM with elitist non-dominated sorting genetic optimization (ENSGA), leveraging the strengths of both techniques to achieve more accurate and efficient classification results. ENSGA plays a crucial role in optimising QSVM parameters, ensuring that the model attains the best possible classification accuracy while considering multiple objectives simultaneously. Moreover, the quantum kernel estimation method demonstrated exceptional performance by achieving high accuracy within an impressive execution time of 0.14 in the IBM QSVM simulator. The seamless integration of quantum computation techniques with optimisation strategies such as ENSGA highlights the potential of quantum machine learning in revolutionising the field of healthcare, particularly in the domain of breast cancer diagnosis.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"384-398"},"PeriodicalIF":2.8,"publicationDate":"2024-10-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12113","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253108","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Sujit Biswas, Rajat S. Goswami, K. Hemant Kumar Reddy, Sachi Nandan Mohanty, Mohammed Altaf Ahmed
{"title":"Advancing quantum communication security: Metamaterial based quantum key distribution with enhanced protocols","authors":"Sujit Biswas, Rajat S. Goswami, K. Hemant Kumar Reddy, Sachi Nandan Mohanty, Mohammed Altaf Ahmed","doi":"10.1049/qtc2.12116","DOIUrl":"10.1049/qtc2.12116","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <p>Quantum Key Distribution (QKD) is increasingly pivotal in securing communication channels against the looming threats posed by quantum computing. However, existing QKD protocols encounter challenges related to efficiency and transmission capabilities. In response, this research investigates the integration of metamaterials into QKD systems, aiming to fortify security and enhance practicality. In the current landscape of quantum communication, where the vulnerability of classical encryption methods is magnified by rapid advancements in quantum computing, finding innovative solutions is imperative. This study is motivated by the need to strengthen the security and viability of QKD protocols to meet the demands of evolving cryptographic threats. By integrating metamaterials, the authors optimise quantum state control, improve signal-to-noise ratio (SNR), and enable longer transmission distances. Through mathematical modelling and simulations, the authors demonstrate how metamaterials reduce errors and enhance the robustness of QKD systems. Our findings show significant improvements in transmission efficiency and security, making Metamaterial-Based Quantum Key Distribution (MQKD) a promising approach for future quantum communication networks. The study not only advances the understanding of the theoretical foundations, but also presents simulated results illustrating the practical effectiveness of MQKD. The exploration of these innovative techniques contributes to the ongoing efforts to secure quantum communication channels.</p>\u0000 </section>\u0000 </div>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"399-416"},"PeriodicalIF":2.8,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12116","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253006","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Optimising energy consumption in Nano-cryptography: Quantum cellular automata-based multiplexer/demultiplexer design","authors":"Aswathy N, N. M. Siva Mangai","doi":"10.1049/qtc2.12115","DOIUrl":"10.1049/qtc2.12115","url":null,"abstract":"<div>\u0000 \u0000 \u0000 <section>\u0000 \u0000 <p>Future global communications will depend heavily on nano-communication networks, which use ultra-low power nano-circuits to transmit data efficiently at very high rates. An essential part of distributed communication networks is the circuit-switched network, which distributes the input signal among several users. For designing nanoscale digital circuits, Quantum Cellular Automata technology (QCA) emerges as a formidable contender against the established complementary metal-oxide-semiconductor (CMOS) technology for low-power devices. The authors endeavour to achieve an efficient design for multiplexer and demultiplexer switching circuits. The designed multiplexer and demultiplexer have 15 cells with an area of 0.02 μm<sup>2</sup> and a latency of 0.5 clock cycles. The authors assess the energy dissipation and temperature impacts for both multiplexer and demultiplexer circuits. The novel design of switch circuits facilitates the sharing of a single communication link across multiple devices at the nano-scale.</p>\u0000 </section>\u0000 </div>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"632-640"},"PeriodicalIF":2.8,"publicationDate":"2024-10-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12115","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143252441","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Design and analysis of parallel quantum transfer fractal priority replay with dynamic memory algorithm in quantum reinforcement learning for robotics","authors":"R. Palanivel, P. Muthulakshmi","doi":"10.1049/qtc2.12111","DOIUrl":"10.1049/qtc2.12111","url":null,"abstract":"<p>This paper introduces the parallel quantum transfer fractal priority reply with dynamic memory (P-QTFPR-DM) algorithm, an innovative approach that combines quantum computing and reinforcement learning (RL) to enhance decision-making in autonomous vehicles. Leveraging quantum principles such as superposition and entanglement, P-QTFPR-DM optimises <i>Q</i>-value approximation through a custom quantum circuit (UQC), facilitating efficient exploration and exploitation in high-dimensional state-action spaces. This algorithm utilises a quantum neural network (QNN) with 4 qubits to encode and process <i>Q</i>-values. The autonomous vehicle, equipped with GPS for real-time navigation, uses P-QTFPR-DM to reach a predefined destination with coordinates 12.82,514,234,148 latitude and 80.0,451,311,962,242 longitude. Through extensive numerical simulations, P-QTFPR-DM demonstrates a 30% reduction in decision-making time and a 25% improvement in navigation accuracy compared to classical RL methods. The QNN-based approach achieves a 95% success rate in reaching the destination within a 5-m accuracy threshold, whereas traditional RL methods achieve only an 85% success rate. Dynamic memory management in P-QTFPR-DM optimises computational resources, enhancing the vehicle's adaptability to environmental changes. These results highlight the potential of quantum computing to significantly advance autonomous vehicle technology by improving both efficiency and effectiveness in complex navigation tasks. Future research will focus on refining the algorithm and exploring its real-world applications to enhance autonomous vehicle performance.</p>","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"360-383"},"PeriodicalIF":2.8,"publicationDate":"2024-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12111","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143253683","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"x2DL: A high throughput architecture for binary-ring-learning-with-error-based post quantum cryptography schemes","authors":"Shaik Ahmadunnisa, Sudha Ellison Mathe","doi":"10.1049/qtc2.12110","DOIUrl":"10.1049/qtc2.12110","url":null,"abstract":"<p>Lattice-based cryptography is one of the most promising cryptographic scheme which lies on the hardness of ring-learning-with-error (RLWE). A new variant of RLWE, known as binary-ring-learning-with-error (BRLWE), has less key size and more efficient hardware implementations compared to RLWE-based schemes. The key arithmetic operation for BRLWE-based encryption scheme is the implementation of arithmetic operation represented by <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>F</mi>\u0000 <mi>D</mi>\u0000 <mo>+</mo>\u0000 <mi>H</mi>\u0000 </mrow>\u0000 <annotation> $FD+H$</annotation>\u0000 </semantics></math>, where both <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>F</mi>\u0000 </mrow>\u0000 <annotation> $F$</annotation>\u0000 </semantics></math> and <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>H</mi>\u0000 </mrow>\u0000 <annotation> $H$</annotation>\u0000 </semantics></math> are integer polynomials, and <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>D</mi>\u0000 </mrow>\u0000 <annotation> $D$</annotation>\u0000 </semantics></math> is a binary polynomial. An efficient architecture to perform the arithmetic operation <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <mi>F</mi>\u0000 <mi>D</mi>\u0000 <mo>+</mo>\u0000 <mi>H</mi>\u0000 </mrow>\u0000 <annotation> $FD+H$</annotation>\u0000 </semantics></math> over a polynomial ring <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <msup>\u0000 <mi>x</mi>\u0000 <mi>n</mi>\u0000 </msup>\u0000 <mo>+</mo>\u0000 <mn>1</mn>\u0000 </mrow>\u0000 <annotation> ${x}^{n}+1$</annotation>\u0000 </semantics></math> is proposed. We employ two linear feedback shift register structures comprising <span></span><math>\u0000 <semantics>\u0000 <mrow>\u0000 <msup>\u0000 <mi>x</mi>\u0000 <mn>2</mn>\u0000 </msup>\u0000 </mrow>\u0000 <annotation> ${x}^{2}$</annotation>\u0000 </semantics></math>-<i>net</i> units in our design to reduce the computational time. This reduction in computational time yields to a significant improvement in the other performance metrics such as delay, area-delay product (ADP), power-delay product, throughput and efficiency compared to the existing designs. As per the experimental results, the authors’ proposed design has <span></span><ma","PeriodicalId":100651,"journal":{"name":"IET Quantum Communication","volume":"5 4","pages":"349-359"},"PeriodicalIF":2.8,"publicationDate":"2024-09-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/qtc2.12110","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143248706","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}