Quantum Information Processing最新文献

筛选
英文 中文
Universal blind quantum computation with recursive rotation gates 具有递归旋转门的通用盲量子计算
IF 2.2 3区 物理与天体物理
Quantum Information Processing Pub Date : 2026-05-09 DOI: 10.1007/s11128-026-05188-z
Mohit Joshi, Manoj Kumar Mishra, S. Karthikeyan
{"title":"Universal blind quantum computation with recursive rotation gates","authors":"Mohit Joshi,&nbsp;Manoj Kumar Mishra,&nbsp;S. Karthikeyan","doi":"10.1007/s11128-026-05188-z","DOIUrl":"10.1007/s11128-026-05188-z","url":null,"abstract":"<div><p>Blind quantum computation lets a limited-capability client delegate its complex computation to a remote server without revealing its data or computation. Several such protocols have been proposed under varied quantum computing models. However, these protocols either rely on highly entangled resource states (in measurement-based models) or are based on nonparametric resource sets (in circuit-based models). These restrictions hinder the practical applicability of such algorithms in the NISQ era, especially concerning the hybrid quantum-classical infrastructure, which depends on parametric gates. We present a protocol for universal blind quantum computation based on recursive decryption of parametric rotation gates, which does not require a highly entangled state at the server side and substantially reduces the communication rounds required for practical prototyping of secure variational algorithms.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"25 5","pages":""},"PeriodicalIF":2.2,"publicationDate":"2026-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147829897","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An authenticated quantum dialog scheme based on d-dimensional Bell states 基于d维贝尔态的认证量子对话方案
IF 2.2 3区 物理与天体物理
Quantum Information Processing Pub Date : 2026-05-09 DOI: 10.1007/s11128-026-05184-3
Yanan Liu, Zhaowei Han, Zhihui Li, Yuehua Li
{"title":"An authenticated quantum dialog scheme based on d-dimensional Bell states","authors":"Yanan Liu,&nbsp;Zhaowei Han,&nbsp;Zhihui Li,&nbsp;Yuehua Li","doi":"10.1007/s11128-026-05184-3","DOIUrl":"10.1007/s11128-026-05184-3","url":null,"abstract":"<div><p>Quantum secure direct communication is an important research direction in quantum cryptography. However, most schemes only support one-way communication, whereas quantum dialog schemes can enable both parties to synchronously exchange secret information. To this end, this paper proposes an authenticated quantum dialog scheme based on <i>d</i>-dimensional Bell state entanglement swapping. In this scheme, the communicating parties each prepare (n+1) identical <i>d</i>-dimensional Bell states and encode secret information into the Bell states using unitary operations. They then exchange the first and fourth particles of the Bell states and perform Bell basis measurements, ultimately recovering the secret using the relevant properties of <i>d</i>-dimensional Bell state entanglement swapping. On this basis, the application of this scheme in the Vehicular Networks is discussed, and a simple example for the case of dimension <span>(d=4)</span> is provided. Furthermore, the scheme incorporates authentication and verification. Security analysis demonstrates that it can resist both active and passive attacks from adversaries. Finally, comparative verification confirms that the scheme offers advantages in terms of efficiency and resource utilization.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"25 5","pages":""},"PeriodicalIF":2.2,"publicationDate":"2026-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147830077","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Multi-party private comparison protocol for a malicious third party without pre-shared keys 针对没有预共享密钥的恶意第三方的多方私有比较协议
IF 2.2 3区 物理与天体物理
Quantum Information Processing Pub Date : 2026-05-09 DOI: 10.1007/s11128-026-05181-6
Qiuyu Ma, Jiansheng Guo, Li Zhang
{"title":"Multi-party private comparison protocol for a malicious third party without pre-shared keys","authors":"Qiuyu Ma,&nbsp;Jiansheng Guo,&nbsp;Li Zhang","doi":"10.1007/s11128-026-05181-6","DOIUrl":"10.1007/s11128-026-05181-6","url":null,"abstract":"<div><p>Most existing quantum private comparison protocols are designed for the scenario of a semi-honest third party, but in actual situations, the case of a malicious third party also needs to be considered. In this paper, we propose a multi-party quantum private comparison protocol based on <i>d</i>-dimensional GHZ state in the presence of a malicious third party TP. With the help of a malicious third party TP, multiple participants use a portion of GHZ state particles to compare the equality of their secrets and another portion of GHZ state particles to verify the honesty of the malicious TP. Multiple participants encode their secret information into the corresponding particles in turn using unitary operations, thereby achieving the goal of comparing secret equality and verifying the honesty of the malicious TP in a single protocol execution. The malicious TP in the proposed protocol does not know the comparison results and cannot perform malicious actions without being detected. In addition, the proposed protocol in this paper does not require pre-shared keys. Security analysis shows that the proposed protocol can resist the entangle-measure attack, intercept-resend attack, and internal attacks such as third-party TP attacks and participant attacks.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"25 5","pages":""},"PeriodicalIF":2.2,"publicationDate":"2026-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147829898","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
(sigma )-OD MP codes and their applications to AQEC codes (sigma )-OD MP代码及其在AQEC代码中的应用
IF 2.2 3区 物理与天体物理
Quantum Information Processing Pub Date : 2026-05-09 DOI: 10.1007/s11128-026-05190-5
Xiaoyan Zhang
{"title":"(sigma )-OD MP codes and their applications to AQEC codes","authors":"Xiaoyan Zhang","doi":"10.1007/s11128-026-05190-5","DOIUrl":"10.1007/s11128-026-05190-5","url":null,"abstract":"<div><p>In this paper, we provide a new method for constructing asymmetric quantum error-correcting (AQEC) codes. This method is called the <span>(sigma )</span>-optimal defining matrix-product (<span>(sigma )</span>-OD MP) construction. By applying this method, several classes of AQEC codes can be constructed. In addition, our obtained AQEC codes have better parameters than the ones available in the literature.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"25 5","pages":""},"PeriodicalIF":2.2,"publicationDate":"2026-05-09","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147829896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Investigation of macroscopic resonant tunneling mechanism in superconducting flux qubit 超导通量量子比特宏观共振隧穿机制研究
IF 2.2 3区 物理与天体物理
Quantum Information Processing Pub Date : 2026-05-08 DOI: 10.1007/s11128-026-05197-y
Jianxin Shi
{"title":"Investigation of macroscopic resonant tunneling mechanism in superconducting flux qubit","authors":"Jianxin Shi","doi":"10.1007/s11128-026-05197-y","DOIUrl":"10.1007/s11128-026-05197-y","url":null,"abstract":"<div><p>We experimentally investigate macroscopic resonant tunneling (MRT) in a three-junction persistent-current flux qubit subject to a microwave driving field. The device is operated near half-flux quantum, where the double-well potential of the qubit supports two localized persistent-current states that form an effective two-level system. By sweeping the driving frequency at a fixed amplitude and, separately, the driving amplitude at a fixed frequency, we measure the tunneling probability from the ground to the excited energy eigenstate and its dependence on the microwave parameters. The oscillating magnetic field at the qubit loop is calibrated using the known mutual inductances and the attenuation of the experimental wiring, so that the driving amplitude used in the analysis is not a free fitting parameter. We numerically solve the time-dependent Schrödinger equation for the calibrated circuit Hamiltonian and obtain theoretical tunneling probabilities that quantitatively reproduce both the Lorentzian-shaped resonance line and the saturation behavior at large driving amplitudes. From the measured linewidth we extract the qubit dephasing time <span>({T}_{2})</span>​ and find good agreement with the value required to fit the experimental data. Our results provide a consistent picture of MRT in a flux qubit driven by a microwave field and establish a parameter-free comparison between experiment and theory for this macroscopic quantum tunneling process.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"25 5","pages":""},"PeriodicalIF":2.2,"publicationDate":"2026-05-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147830052","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Efficient hybrid post-quantum authentication for quantum key distribution under finite-size effects 有限大小效应下量子密钥分发的高效混合后量子认证
IF 2.2 3区 物理与天体物理
Quantum Information Processing Pub Date : 2026-05-07 DOI: 10.1007/s11128-026-05185-2
Liu-Jun Wang, Zhao-Feng Fu, You-Yang Zhou, Jian-Ming Yin, Qing Chen
{"title":"Efficient hybrid post-quantum authentication for quantum key distribution under finite-size effects","authors":"Liu-Jun Wang,&nbsp;Zhao-Feng Fu,&nbsp;You-Yang Zhou,&nbsp;Jian-Ming Yin,&nbsp;Qing Chen","doi":"10.1007/s11128-026-05185-2","DOIUrl":"10.1007/s11128-026-05185-2","url":null,"abstract":"<div><p>With the rapid development of quantum computers, traditional cryptographic systems face imminent security threats. Quantum Key Distribution (QKD) and Post-Quantum Cryptography (PQC) are two leading solutions for future information security. While QKD offers unconditional security, it faces the “bootstrapping” problem of initial authentication, typically requiring pre-shared symmetric keys which are difficult to distribute in large-scale networks. In this paper, we propose a hybrid authentication framework combining PQC and QKD to eliminate the need for pre-shared keys. A critical innovation of our work is addressing the “Finite-Size Effect” in resource-constrained scenarios—such as satellite-to-ground links or ultra-long-distance fibers—where the raw key rate is extremely low. Standard PQC authentication leaks digest information, necessitating privacy amplification that consumes precious key bits, often rendering key generation impossible in these low-yield regimes. To overcome this, we introduce a “Sign-then-Encrypt” strategy for the first round of QKD. By encrypting the verification digests using PQC, we effectively reduce the authentication leakage to zero, bypassing the need for corresponding privacy amplification. We provide a rigorous quantitative analysis demonstrating that this trade-off remains secure even if PQC is compromised in the future, provided the generated key maintains sufficient residual entropy. Additionally, we propose a second protocol that utilizes self-derived symmetric keys for authentication, significantly reducing computational latency and bandwidth overhead. The proposed protocols ensure the long-term quantum-resistant security of distributed keys while substantially lowering the startup threshold and improving the efficiency of QKD networks.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"25 5","pages":""},"PeriodicalIF":2.2,"publicationDate":"2026-05-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147829342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum simulation of collective neutrino oscillations in dense neutrino environment 密集中微子环境中集体中微子振荡的量子模拟
IF 2.2 3区 物理与天体物理
Quantum Information Processing Pub Date : 2026-05-06 DOI: 10.1007/s11128-026-05151-y
Shvetaank Tripathi, Sandeep Joshi, Garima Rajpoot, Prashant Shukla
{"title":"Quantum simulation of collective neutrino oscillations in dense neutrino environment","authors":"Shvetaank Tripathi,&nbsp;Sandeep Joshi,&nbsp;Garima Rajpoot,&nbsp;Prashant Shukla","doi":"10.1007/s11128-026-05151-y","DOIUrl":"10.1007/s11128-026-05151-y","url":null,"abstract":"<div><p>Inside dense neutrino gases, such as neutron star mergers or core-collapse supernovae, collective neutrino effects cause the transformation of one neutrino flavour into another. Due to strong neutrino self-interactions in these environments, there is prevalence of flavour swapping. Considering these environments to be isotropic and homogeneous, we present a study of collective neutrino oscillations by simulating such a system on a noisy quantum simulator (Qiskit <span>AerSimulator</span>) and a quantum processor (<span>ibm_brisbane</span>). We model the effective Hamiltonian governing neutrino interactions and by applying the Trotter–Suzuki approximation, decompose it into a tractable form suitable for quantum circuit implementation of the time-evolution propagator. Encoding the neutrino state for a system of two and three neutrinos onto qubits, we compute the time evolution of the inversion probability relative to the initial product state. Furthermore, we present quantum circuits to evaluate the concurrence as a measure of entanglement between the neutrinos.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"25 5","pages":""},"PeriodicalIF":2.2,"publicationDate":"2026-05-06","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147829232","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Security framework for quantum distance-bounding 量子距离边界的安全框架
IF 2.2 3区 物理与天体物理
Quantum Information Processing Pub Date : 2026-05-04 DOI: 10.1007/s11128-026-05182-5
Kevin Bogner, Aysajan Abidin, Dave Singelee, Bart Preneel
{"title":"Security framework for quantum distance-bounding","authors":"Kevin Bogner,&nbsp;Aysajan Abidin,&nbsp;Dave Singelee,&nbsp;Bart Preneel","doi":"10.1007/s11128-026-05182-5","DOIUrl":"10.1007/s11128-026-05182-5","url":null,"abstract":"<div><p>Distance-bounding (DB) protocols let a verifier upper-bound a prover’s physical distance by timing rapid challenge-response exchanges. Quantum communication promises simpler DB protocols with stronger security guarantees, yet existing quantum distance-bounding (QDB) proposals are analysed in ad hoc models and, to the best of our knowledge, lack a common game-based treatment of standard fraud attacks. We contribute (i) a reusable security framework for QDB that fixes system and timing assumptions, specifies a quantum-capable adversary model, formalises distance-, mafia-, and terrorist-fraud experiments, and includes a simple i.i.d. depolarizing noise model; and (ii) an application of this framework to a published QDB protocol. For this protocol, we characterise the honest per-round acceptance probability under noise and lift it to the multi-round setting, yielding explicit completeness guarantees as a function of the number of fast rounds, the acceptance threshold, and the noise parameter. For active adversaries, we bound the per-round success probability of distance-fraud attacks and analyse the best known mafia-fraud strategy, deriving corresponding multi-round soundness bounds. We also show that the protocol is inherently insecure against terrorist-fraud in our model. The framework cleanly separates protocol-independent definitions from protocol-specific analysis and can be used to evaluate the existing and future QDB protocols on a common basis.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"25 5","pages":""},"PeriodicalIF":2.2,"publicationDate":"2026-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147829535","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Semi-honest mediated cross-domain quantum key distribution using GHZ-like states 利用类ghz态的半诚实中介跨域量子密钥分发
IF 2.2 3区 物理与天体物理
Quantum Information Processing Pub Date : 2026-05-04 DOI: 10.1007/s11128-026-05173-6
Chaonan Wang, Mengyan Li, Yanlin Zhang, Wei Gao
{"title":"Semi-honest mediated cross-domain quantum key distribution using GHZ-like states","authors":"Chaonan Wang,&nbsp;Mengyan Li,&nbsp;Yanlin Zhang,&nbsp;Wei Gao","doi":"10.1007/s11128-026-05173-6","DOIUrl":"10.1007/s11128-026-05173-6","url":null,"abstract":"<div><p>As quantum communication networks move toward cross-domain deployment, existing mediated quantum key distribution (MQKD) protocols suffer from several drawbacks. They typically impose high quantum ability requirements on users and rely on a single server, resulting in concentrated trust assumptions and limited practicality. To overcome these issues, we propose a cross-domain MQKD protocol using four-particle GHZ-like states and a dual-server architecture. Two independent semi-honest servers from different domains prepare and distribute quantum sequences embedded with decoy states, without publicly announcing their insertion positions and measurement bases, thereby reducing classical communication overhead and enhancing transmission security. Users only perform Bell and single-photon measurements, without requiring unitary operations or state preparation, which reduces hardware complexity and implementation costs. The dual-server structure distributes trust across domains and alleviates the single point of failure in traditional schemes. By exploiting the entanglement properties of GHZ-like states, the protocol establishes deterministic correlations between paired Bell measurements and achieves a qubit efficiency of 30%. Security against external and internal attacks is analyzed, and feasibility is verified via simulations on Qiskit and the IBM Quantum platform. These results indicate that the protocol is practical under current technological conditions.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"25 5","pages":""},"PeriodicalIF":2.2,"publicationDate":"2026-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147829537","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A novel centralised e-payment protocol based on superdense coding 一种基于超密集编码的新型集中电子支付协议
IF 2.2 3区 物理与天体物理
Quantum Information Processing Pub Date : 2026-05-04 DOI: 10.1007/s11128-026-05175-4
Zeynep Çelik, Hüseyin Bodur
{"title":"A novel centralised e-payment protocol based on superdense coding","authors":"Zeynep Çelik,&nbsp;Hüseyin Bodur","doi":"10.1007/s11128-026-05175-4","DOIUrl":"10.1007/s11128-026-05175-4","url":null,"abstract":"<div><p>The security and anonymity of e-payment transactions are paramount. In this study, we propose a centralised e-payment protocol based on superdense coding. By adopting quantum key establishment principles inspired by quantum key distribution (QKD) and combining them with superdense coding-based message transmission, symmetric key encryption, and two-particle entanglement, our quantum e-payment protocol utilises Bell states to reduce the complexity of quantum resources. The protocol is used for both key distribution and secure message transmission between the communicating parties. It is also resilient against quantum attacks and provides operational non-repudiation and immutability. Compared to previously proposed protocols, our protocol offers improved security while maintaining practical feasibility for real-world applications.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"25 5","pages":""},"PeriodicalIF":2.2,"publicationDate":"2026-05-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-026-05175-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"147829536","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信
小红书