首页 > 最新文献

Quantum Information Processing最新文献

英文 中文
Revocation and reconstruction of shared quantum states 共享量子态的撤销与重构
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-10-30 DOI: 10.1007/s11128-025-04951-y
Prakash Mudholkar, Chiranjeevi Vanarasa, Indranil Chakrabarty, Srinathan Kannan

The problem of revocation of quantum states after sharing is interesting, and we ask: Is it possible for a dealer to revoke the state once shared, before the reconstruction process? Additional resources like bell states are used to help the dealer to get back the state [1]. In a three-party scenario, we show an independent way to revoke, if, for any reason, the dealer is not sure about the intention of the/any reconstructor. In general, the classical outcomes of the dealer in sharing phase are needed, to be able to reconstruct the state perfectly. When both the shareholders are dishonesta, and without the dealer’s knowledge, collude to reconstruct, they always have some chance of succeeding. This is addressed by giving more control to the dealer by making him/her to have a quantum share as well. We give a sharing and revocation protocol with a four-qubit entangled resource shared among three parties (two qubits with the dealer and one each with the shareholders). We further consider a class of four-qubit pure entangled states as resource and explicitly find the range of parameters for which the protocol will be successful.

共享后量子态的撤销问题很有趣,我们问:在重建过程之前,经销商是否有可能撤销共享后的状态?像bell状态这样的额外资源被用来帮助发牌者恢复状态[1]。在三方场景中,我们展示了一种独立的撤销方式,如果由于任何原因,经销商不确定/任何重构者的意图。通常,为了能够完美地重构状态,需要交易商在共享阶段的经典结果。当两个股东都不诚实,并且在交易商不知情的情况下串通进行重建时,他们总是有一些成功的机会。这可以通过给予经销商更多的控制权来解决,让他/她也拥有一定的份额。我们给出了一个三方共享的四量子比特纠缠资源的共享和撤销协议(经销商两个量子比特,股东各一个量子比特)。我们进一步考虑一类四量子位纯纠缠态作为资源,并明确地找到协议将成功的参数范围。
{"title":"Revocation and reconstruction of shared quantum states","authors":"Prakash Mudholkar,&nbsp;Chiranjeevi Vanarasa,&nbsp;Indranil Chakrabarty,&nbsp;Srinathan Kannan","doi":"10.1007/s11128-025-04951-y","DOIUrl":"10.1007/s11128-025-04951-y","url":null,"abstract":"<div><p>The problem of revocation of quantum states after sharing is interesting, and we ask: <i>Is it possible for a dealer to revoke the state once shared, before the reconstruction process?</i> Additional resources like bell states are used to help the dealer to get back the state [1]. In a three-party scenario, we show an independent way to revoke, if, for any reason, the dealer is not sure about the intention of the/any reconstructor. In general, the classical outcomes of the dealer in sharing phase are needed, to be able to reconstruct the state perfectly. When both the shareholders are dishonest<sup>a</sup>, and without the dealer’s knowledge, collude to reconstruct, they always have some chance of succeeding. This is addressed by giving more control to the dealer by making him/her to have a quantum share as well. We give a sharing and revocation protocol with a four-qubit entangled resource shared among three parties (two qubits with the dealer and one each with the shareholders). We further consider a class of four-qubit pure entangled states as resource and explicitly find the range of parameters for which the protocol will be successful.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145406351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Methane emissions forecasting using hybrid quantum–classical deep learning models: case study of North Africa 使用混合量子经典深度学习模型预测甲烷排放:北非案例研究
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-10-30 DOI: 10.1007/s11128-025-04979-0
Widad Hassina Belkadi, Yassine Drias, Habiba Drias, Sarah Ferkous, Maroua Khemissi

This study explores climate change by predicting methane emissions in North Africa using classical and quantum deep learning methods. Using data from Sentinel-5P, we developed hybrid quantum–classical models, such as quantum long short-term memory (QLSTM) and quantum-gated recurrent unit networks (QGRUs), along with a novel hybrid architecture combining quantum convolutional neural networks (QCNNs) with LSTM and GRU, namely QCNN-LSTM and QCNN-GRU. The results show that these quantum models, especially the proposed hybrid architectures, outperform classical models by approximately seven percent in root-mean-squared error with fewer training epochs. These findings highlight the potential of quantum methodologies for enhancing environmental monitoring accuracy. Future research will aim to refine model performance, incorporate explainable AI techniques, and expand to forecasting other greenhouse gases, contributing to climate change mitigation efforts.

本研究通过使用经典和量子深度学习方法预测北非的甲烷排放来探索气候变化。利用Sentinel-5P的数据,我们开发了量子-经典混合模型,如量子长短期记忆(QLSTM)和量子门控循环单元网络(qgru),以及将量子卷积神经网络(QCNNs)与LSTM和GRU相结合的新型混合架构,即QCNN-LSTM和QCNN-GRU。结果表明,这些量子模型,特别是所提出的混合架构,在更少的训练周期下,在均方根误差上比经典模型高出约7%。这些发现突出了量子方法在提高环境监测准确性方面的潜力。未来的研究将旨在改进模型性能,纳入可解释的人工智能技术,并扩展到预测其他温室气体,为减缓气候变化的努力做出贡献。
{"title":"Methane emissions forecasting using hybrid quantum–classical deep learning models: case study of North Africa","authors":"Widad Hassina Belkadi,&nbsp;Yassine Drias,&nbsp;Habiba Drias,&nbsp;Sarah Ferkous,&nbsp;Maroua Khemissi","doi":"10.1007/s11128-025-04979-0","DOIUrl":"10.1007/s11128-025-04979-0","url":null,"abstract":"<div><p>This study explores climate change by predicting methane emissions in North Africa using classical and quantum deep learning methods. Using data from Sentinel-5P, we developed hybrid quantum–classical models, such as quantum long short-term memory (QLSTM) and quantum-gated recurrent unit networks (QGRUs), along with a novel hybrid architecture combining quantum convolutional neural networks (QCNNs) with LSTM and GRU, namely QCNN-LSTM and QCNN-GRU. The results show that these quantum models, especially the proposed hybrid architectures, outperform classical models by approximately seven percent in root-mean-squared error with fewer training epochs. These findings highlight the potential of quantum methodologies for enhancing environmental monitoring accuracy. Future research will aim to refine model performance, incorporate explainable AI techniques, and expand to forecasting other greenhouse gases, contributing to climate change mitigation efforts.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-10-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145406433","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A dynamic quantum-resistant code-based public key encryption scheme 一种基于动态抗量子码的公钥加密方案
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-10-29 DOI: 10.1007/s11128-025-04976-3
Pratheeksha Raju, T. Chithralekha, Kalpana Singh, G. Ganeshvani, Muttukrishnan Rajarajan

Code-based post-quantum cryptography is seeing an unprecedented growth due to its significance in addressing the security threats posed by quantum computers toward digital communication, leveraging its strength from the well-known hard problems of coding theory. Code-based cryptosystems are vulnerable to attacks that exploit the inherent structure of the underlying code, compromising security in many cases. Although McEliece cryptosystem with Goppa codes provide substantial resistance, this comes at the cost of huge key sizes, limiting their practicality. The proposed work, dynamic code-based McEliece cryptosystem, introduces the notion of dynamicity to the code-based cryptosystem and intensifies the random nature necessary to overcome the attacks. Unlike the conventional schemes that rely on a fixed underlying code and its generator matrix, our approach dynamically changes the code structure in response to trigger events to create cipher keys. This dynamic code transformation preserves the core efficiency of the cipher while significantly improving security against structural attacks, decoding attacks and side channel analysis. The proposed scheme retains IND-CPA security under standard assumptions while also rendering chosen ciphertext attacks significantly challenging. Our work establishes a new direction for enhancing the security of code-based encryption in practical applications.

基于代码的后量子密码学正在经历前所未有的增长,因为它在解决量子计算机对数字通信构成的安全威胁方面具有重要意义,利用了它在众所周知的编码理论难题中的优势。基于代码的密码系统容易受到利用底层代码固有结构的攻击,在许多情况下会危及安全性。尽管使用Goppa代码的McEliece密码系统提供了很大的阻力,但这是以巨大的密钥大小为代价的,限制了它们的实用性。提出的基于动态代码的McEliece密码系统,将动态的概念引入到基于代码的密码系统中,并加强了克服攻击所必需的随机性。与依赖固定底层代码及其生成器矩阵的传统方案不同,我们的方法动态更改代码结构以响应触发事件以创建密钥。这种动态代码转换保留了密码的核心效率,同时显着提高了对结构攻击,解码攻击和侧信道分析的安全性。所提出的方案在标准假设下保留了IND-CPA的安全性,同时也使所选的密文攻击具有极大的挑战性。我们的工作为在实际应用中提高基于代码的加密的安全性开辟了新的方向。
{"title":"A dynamic quantum-resistant code-based public key encryption scheme","authors":"Pratheeksha Raju,&nbsp;T. Chithralekha,&nbsp;Kalpana Singh,&nbsp;G. Ganeshvani,&nbsp;Muttukrishnan Rajarajan","doi":"10.1007/s11128-025-04976-3","DOIUrl":"10.1007/s11128-025-04976-3","url":null,"abstract":"<div><p>Code-based post-quantum cryptography is seeing an unprecedented growth due to its significance in addressing the security threats posed by quantum computers toward digital communication, leveraging its strength from the well-known hard problems of coding theory. Code-based cryptosystems are vulnerable to attacks that exploit the inherent structure of the underlying code, compromising security in many cases. Although McEliece cryptosystem with Goppa codes provide substantial resistance, this comes at the cost of huge key sizes, limiting their practicality. The proposed work, dynamic code-based McEliece cryptosystem, introduces the notion of dynamicity to the code-based cryptosystem and intensifies the random nature necessary to overcome the attacks. Unlike the conventional schemes that rely on a fixed underlying code and its generator matrix, our approach dynamically changes the code structure in response to trigger events to create cipher keys. This dynamic code transformation preserves the core efficiency of the cipher while significantly improving security against structural attacks, decoding attacks and side channel analysis. The proposed scheme retains IND-CPA security under standard assumptions while also rendering chosen ciphertext attacks significantly challenging. Our work establishes a new direction for enhancing the security of code-based encryption in practical applications.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145406047","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum signature with formal security proof 具有正式安全证明的量子签名
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-10-29 DOI: 10.1007/s11128-025-04972-7
Huijuan Liu, Xiangjun Xin, Yuzhuo Han, Li Gong, Chaoyang Li

In recent years, the quantum signature protocol has been an important research topic due to its security against quantum adversaries. Although lots of quantum signature protocols have been presented, their security lacks the support of security model and formal security proof. Especially, their security against adaptively chosen-message attack cannot be proved. Some quantum signature protocols have exposed various security vulnerabilities due to their design defects and informal security analysis. In this paper, based on the single particles, a quantum signature protocol with formal security proof is proposed. In this protocol, the signatory signs the message by cloning the particles and encrypting their states with key-controlled unitary operations. Compared with other similar signature protocols, the advantages of this protocol are as follows: (1) The security of this protocol against forgery attack can be proved with formal security proof under the security model. Its security strictly depends on the principle of quantum unclonability. (2) The security proof need not use the assumption of random oracle. (3) The protocol need not prepare decoy particles for eavesdropping detection, thus saving quantum sources and simplifying the protocol. (4) In the protocol, it is unnecessary to prepare entangled quantum particles. (5) The qubit efficiency reaches 50%, even if the decoy particles are counted.

近年来,量子签名协议因其对量子对手的安全性而成为一个重要的研究课题。虽然目前已经提出了大量的量子签名协议,但它们的安全性都缺乏安全模型和形式化的安全证明的支持。特别是对自适应选择消息攻击的安全性无法证明。一些量子签名协议由于其设计缺陷和非正式的安全分析,暴露出各种安全漏洞。本文基于单粒子,提出了一种具有形式化安全证明的量子签名协议。在该协议中,签署人通过克隆粒子并使用密钥控制的单一操作加密它们的状态来签署消息。与其他类似的签名协议相比,该协议具有以下优点:(1)在该安全模型下,可以通过形式化的安全证明证明该协议对伪造攻击的安全性。它的安全性严格依赖于量子不可克隆原理。(2)安全性证明不需要使用随机oracle的假设。(3)协议不需要准备窃听检测的诱饵粒子,节省了量子源,简化了协议。(4)协议中不需要制备纠缠态量子粒子。(5)即使算上诱饵粒子,量子比特效率也达到50%。
{"title":"Quantum signature with formal security proof","authors":"Huijuan Liu,&nbsp;Xiangjun Xin,&nbsp;Yuzhuo Han,&nbsp;Li Gong,&nbsp;Chaoyang Li","doi":"10.1007/s11128-025-04972-7","DOIUrl":"10.1007/s11128-025-04972-7","url":null,"abstract":"<div><p>In recent years, the quantum signature protocol has been an important research topic due to its security against quantum adversaries. Although lots of quantum signature protocols have been presented, their security lacks the support of security model and formal security proof. Especially, their security against adaptively chosen-message attack cannot be proved. Some quantum signature protocols have exposed various security vulnerabilities due to their design defects and informal security analysis. In this paper, based on the single particles, a quantum signature protocol with formal security proof is proposed. In this protocol, the signatory signs the message by cloning the particles and encrypting their states with key-controlled unitary operations. Compared with other similar signature protocols, the advantages of this protocol are as follows: (1) The security of this protocol against forgery attack can be proved with formal security proof under the security model. Its security strictly depends on the principle of quantum unclonability. (2) The security proof need not use the assumption of random oracle. (3) The protocol need not prepare decoy particles for eavesdropping detection, thus saving quantum sources and simplifying the protocol. (4) In the protocol, it is unnecessary to prepare entangled quantum particles. (5) The qubit efficiency reaches 50%, even if the decoy particles are counted.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-10-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145406049","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The evolution of quantum battery capacity of GHZ-like states under Markovian channels 马尔可夫通道下类ghz态量子电池容量的演化
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-10-28 DOI: 10.1007/s11128-025-04974-5
Hui Liu, Tinggui Zhang

Quantum battery has enormous potential for development, and quantum battery capacity is an important indicator of quantum battery. In this work, we mainly study the evolution of quantum battery capacity of GHZ state and GHZ-like states under Markovian channels in the tripartite system. We find that under the depolarizing channel and bit-phase flip channel, the battery capacity shows a brief sudden death of the capacity. And we also find that under the dephasing channel, the battery capacity gradually decreases and tends to a constant, that is, the frozen capacity. We show that the battery capacity monotonically decreases for GHZ state under the amplitude damping channel on the first subsystem. And we study the variation of capacity under the Markovian channels n times on the first subsystem using the GHZ state. We can observe that under the amplitude damping and dephasing channels, the battery capacity decreases and tends to a constant, i.e. frozen capacity, and the larger n, the earlier this phenomenon occurs. We also investigate the evolution of capacity under three independent same type Markovian channels. We have also conducted corresponding research on GHZ-like states.

量子电池具有巨大的发展潜力,量子电池容量是量子电池的重要指标。在本研究中,我们主要研究了在马尔可夫信道下,三方系统中GHZ态和类GHZ态量子电池容量的演化。我们发现在去极化通道和位相翻转通道下,电池容量表现出短暂的容量猝死。我们还发现,在减相通道下,电池容量逐渐减小,趋于一个常数,即冻结容量。结果表明,在第一分系统的振幅衰减通道下,电池容量在GHZ状态下单调减小。并利用GHZ态对第一分系统进行了n次马尔可夫信道下的容量变化研究。我们可以观察到,在幅度阻尼和减相通道下,电池容量减小并趋于一个常数,即冻结容量,并且n越大,这种现象发生的越早。我们还研究了三种独立的同类型马尔可夫通道下的容量演化。我们也对类ghz态进行了相应的研究。
{"title":"The evolution of quantum battery capacity of GHZ-like states under Markovian channels","authors":"Hui Liu,&nbsp;Tinggui Zhang","doi":"10.1007/s11128-025-04974-5","DOIUrl":"10.1007/s11128-025-04974-5","url":null,"abstract":"<div><p>Quantum battery has enormous potential for development, and quantum battery capacity is an important indicator of quantum battery. In this work, we mainly study the evolution of quantum battery capacity of GHZ state and GHZ-like states under Markovian channels in the tripartite system. We find that under the depolarizing channel and bit-phase flip channel, the battery capacity shows a brief sudden death of the capacity. And we also find that under the dephasing channel, the battery capacity gradually decreases and tends to a constant, that is, the frozen capacity. We show that the battery capacity monotonically decreases for GHZ state under the amplitude damping channel on the first subsystem. And we study the variation of capacity under the Markovian channels <i>n</i> times on the first subsystem using the GHZ state. We can observe that under the amplitude damping and dephasing channels, the battery capacity decreases and tends to a constant, i.e. frozen capacity, and the larger n, the earlier this phenomenon occurs. We also investigate the evolution of capacity under three independent same type Markovian channels. We have also conducted corresponding research on GHZ-like states.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145405632","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The physical mechanism of optimizing Bell-like states in the context of quantum state teleportation in the presence of amplitude-damping noise environment 振幅阻尼噪声环境下量子态隐形传态优化钟态的物理机制
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-10-28 DOI: 10.1007/s11128-025-04971-8
Hop Nguyen Van

The characteristic quantities and their relationships in the context of quantum teleportation (QT) of an arbitrary qubit state (AQS), where the initial state (IS) of the quantum channel (QC) is a Bell-like state (BLS), have been investigated. The qubits of the QC are independently affected by an amplitude-damping noise environment (ADNE). We have derived analytical expressions for the complementary relationship between the purity measure (PM) of the channel and the entanglement measures (EMs) between each qubit of the channel and the environmental qubit (EQ). Additionally, we have established analytical expressions describing the dependence of the average quantum fidelity (AQF) of the protocol on the channel PM, the channel EM, the bipartite EMs involving channel and EQs, as well as the multipartite entanglement between the channel qubits (CQs) and the EQs. Based on these relationships, we have revealed the physical mechanism underlying the enhancement or non-enhancement of the average fidelity (AF) when the remaining CQ is affected by amplitude-damping noise (ADN). Furthermore, we have analyzed the optimization process of the AF for two protocols in which the IS of the QC is chosen as a BLS.

本文研究了任意量子位态(AQS)量子隐形传态(QT)的特征量及其相互关系,其中量子信道(QC)的初始态(IS)为钟状态(BLS)。量子位元受幅值阻尼噪声环境(ADNE)的独立影响。我们推导了信道纯度度量(PM)和信道中每个量子比特与环境量子比特(EQ)之间的纠缠度量(EMs)之间互补关系的解析表达式。此外,我们建立了描述协议的平均量子保真度(AQF)对信道PM、信道EM、涉及信道和eq的二部EM以及信道量子比特(cq)和eq之间的多部纠缠的依赖的解析表达式。基于这些关系,我们揭示了当剩余CQ受到幅度阻尼噪声(ADN)影响时平均保真度(AF)增强或不增强的物理机制。此外,我们还分析了选择QC的IS作为BLS的两种协议的AF优化过程。
{"title":"The physical mechanism of optimizing Bell-like states in the context of quantum state teleportation in the presence of amplitude-damping noise environment","authors":"Hop Nguyen Van","doi":"10.1007/s11128-025-04971-8","DOIUrl":"10.1007/s11128-025-04971-8","url":null,"abstract":"<div><p>The characteristic quantities and their relationships in the context of quantum teleportation (QT) of an arbitrary qubit state (AQS), where the initial state (IS) of the quantum channel (QC) is a Bell-like state (BLS), have been investigated. The qubits of the QC are independently affected by an amplitude-damping noise environment (ADNE). We have derived analytical expressions for the complementary relationship between the purity measure (PM) of the channel and the entanglement measures (EMs) between each qubit of the channel and the environmental qubit (EQ). Additionally, we have established analytical expressions describing the dependence of the average quantum fidelity (AQF) of the protocol on the channel PM, the channel EM, the bipartite EMs involving channel and EQs, as well as the multipartite entanglement between the channel qubits (CQs) and the EQs. Based on these relationships, we have revealed the physical mechanism underlying the enhancement or non-enhancement of the average fidelity (AF) when the remaining CQ is affected by amplitude-damping noise (ADN). Furthermore, we have analyzed the optimization process of the AF for two protocols in which the IS of the QC is chosen as a BLS.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-10-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145405631","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
The private classical capacity region of classical–quantum broadcasting channel with three receivers 具有三个接收机的经典量子广播信道的私有经典容量区域
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-10-27 DOI: 10.1007/s11128-025-04970-9
Fangyuan Chen, Xiaomin Liu, Zhengjun Xi

This paper investigates the private classical capacity region of classical–quantum broadcast channel with two legitimate receivers and one eavesdropper. We discuss four communication scenarios with respect to the confidential message transmission and the capability of receivers. We introduce auxiliary messages and use the superposition coding and quantum-typical projectors; this will ensure that the auxiliary rate can protect confidential messages from Eve, and the cumulative rate remain legitimate receivers decoding capacity. On the ground, we obtain the capacity regions for four different situations.

研究了具有两个合法接收者和一个窃听者的经典量子广播信道的私有经典容量区域。我们讨论了关于机密信息传输和接收者能力的四种通信场景。引入辅助信息,采用叠加编码和量子典型投影;这将确保辅助速率可以保护机密信息免受Eve的攻击,并且累积速率保持合法的接收器解码容量。在地面上,我们得到了四种不同情况下的能力区域。
{"title":"The private classical capacity region of classical–quantum broadcasting channel with three receivers","authors":"Fangyuan Chen,&nbsp;Xiaomin Liu,&nbsp;Zhengjun Xi","doi":"10.1007/s11128-025-04970-9","DOIUrl":"10.1007/s11128-025-04970-9","url":null,"abstract":"<div><p>This paper investigates the private classical capacity region of classical–quantum broadcast channel with two legitimate receivers and one eavesdropper. We discuss four communication scenarios with respect to the confidential message transmission and the capability of receivers. We introduce auxiliary messages and use the superposition coding and quantum-typical projectors; this will ensure that the auxiliary rate can protect confidential messages from Eve, and the cumulative rate remain legitimate receivers decoding capacity. On the ground, we obtain the capacity regions for four different situations.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145405616","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
AEAQEC codes from l-LCP of codes over finite non-chain rings 从有限非链环上码的l-LCP得到AEAQEC码
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-10-27 DOI: 10.1007/s11128-025-04973-6
Peng Hu, Xiusheng Liu

In this paper, we first study an l-linear complementary pair (abbreviated to l-LCP) of codes over the non-chain ring (R=mathbb {F}_q+umathbb {F}_q+ vmathbb {F}_q+uvmathbb {F}_q) with (u^2=u,v^2=v, uv=vu). Then we provide a method of constructing asymmetric entanglement-assisted quantum error-correcting (abbreviated to AEAQEC) codes from an l-LCP of codes over R by using CSS. To enrich the variety of available AEAQEC codes, some new AEAQEC codes are given in the sense that their parameters are different from all the previous constructions.

本文首先用(u^2=u,v^2=v, uv=vu)研究了非链环(R=mathbb {F}_q+umathbb {F}_q+ vmathbb {F}_q+uvmathbb {F}_q)上码的l-线性互补对(简称l-LCP)。然后,我们提出了一种利用CSS从R上的码的l-LCP中构造非对称纠缠辅助量子纠错码(简称AEAQEC)的方法。为了丰富现有AEAQEC规范的种类,在参数不同于以往结构的意义上,提出了一些新的AEAQEC规范。
{"title":"AEAQEC codes from l-LCP of codes over finite non-chain rings","authors":"Peng Hu,&nbsp;Xiusheng Liu","doi":"10.1007/s11128-025-04973-6","DOIUrl":"10.1007/s11128-025-04973-6","url":null,"abstract":"<div><p>In this paper, we first study an <i>l</i>-linear complementary pair (abbreviated to <i>l</i>-LCP) of codes over the non-chain ring <span>(R=mathbb {F}_q+umathbb {F}_q+ vmathbb {F}_q+uvmathbb {F}_q)</span> with <span>(u^2=u,v^2=v, uv=vu)</span>. Then we provide a method of constructing asymmetric entanglement-assisted quantum error-correcting (abbreviated to AEAQEC) codes from an <i>l</i>-LCP of codes over <i>R</i> by using CSS. To enrich the variety of available AEAQEC codes, some new AEAQEC codes are given in the sense that their parameters are different from all the previous constructions.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-10-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145405615","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Bidirectional quantum teleportation using quantum walks 利用量子行走的双向量子隐形传态
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-10-24 DOI: 10.1007/s11128-025-04965-6
A. S. Abay Krishna, K. K. Naseeda, N. C. Randeep

We present a method for bidirectional teleportation of a single qubit using quantum walks on two independent one-dimensional lattices and two independent cycles with four vertices, employing nearest-neighbor jumps with coin outcomes. In addition, we discuss two different methods for two-qubit teleportation by employing nearest-neighbor jumps and next-nearest-neighbor jumps with a single coin and two coins, respectively. Finally, it is demonstrated that the two-qubit single-jump and the two-jump quantum walk teleportation schemes yield the same results.

我们提出了一种单量子比特的双向隐形传态方法,该方法使用两个独立的一维晶格和两个具有四个顶点的独立循环上的量子行走,采用具有硬币结果的最近邻跳跃。此外,我们还讨论了两种不同的双量子位元隐形传态方法,分别采用单个硬币和两个硬币的最近邻跳跃和次近邻跳跃。最后,证明了双量子比特单跳和双跳量子行走隐形传态方案产生相同的结果。
{"title":"Bidirectional quantum teleportation using quantum walks","authors":"A. S. Abay Krishna,&nbsp;K. K. Naseeda,&nbsp;N. C. Randeep","doi":"10.1007/s11128-025-04965-6","DOIUrl":"10.1007/s11128-025-04965-6","url":null,"abstract":"<div><p>We present a method for bidirectional teleportation of a single qubit using quantum walks on two independent one-dimensional lattices and two independent cycles with four vertices, employing nearest-neighbor jumps with coin outcomes. In addition, we discuss two different methods for two-qubit teleportation by employing nearest-neighbor jumps and next-nearest-neighbor jumps with a single coin and two coins, respectively. Finally, it is demonstrated that the two-qubit single-jump and the two-jump quantum walk teleportation schemes yield the same results.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-10-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145352511","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Three-qubit W state tomography via full and marginal state reconstructions on ibm_osaka 基于ibm_osaka的全态和边缘态重建的三量子位W态层析成像
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-10-22 DOI: 10.1007/s11128-025-04964-7
Talath H., Govindaraja B.P., Divyamani B.G., Akshata Shenoy H., Usha A. R. Devi,  Sudha

We present a three-qubit quantum state tomography scheme requiring a set of 17 measurement settings, significantly reducing the experimental overhead compared to the conventional 63 Pauli measurement settings. Using IBM’s 127-qubit open-access quantum processor ibm_osaka, we prepare the three-qubit W state and employ our tomography scheme to reconstruct it. Additionally, we implement a two-qubit tomography protocol, involving 7 measurement settings, on ibm_osaka to reconstruct two of the two-qubit marginals of the W state. This serves as a proof-of-principle demonstration of the well-known theoretical result that any two of the two-qubit reduced density matrices can uniquely determine most of the whole three-qubit pure states. We show that the fidelity of the W state reconstructed from its two-qubit subsystems is consistently larger than that obtained from the full three-qubit tomography, highlighting the practical advantage of the subsystem-based tomography approach.

我们提出了一种需要17个测量设置的三量子位量子态断层扫描方案,与传统的63个泡利测量设置相比,显着降低了实验开销。利用IBM的127量子位开放存取量子处理器ibm_osaka,我们准备了三量子位W态,并使用我们的断层扫描方案来重建它。此外,我们在ibm_osaka上实现了一个涉及7个测量设置的双量子位断层扫描协议,以重建W态的两个双量子位边缘。这是一个众所周知的理论结果的原理证明,即任意两个两量子位简化密度矩阵可以唯一地确定整个三量子位纯态的大部分。我们表明,从其两个量子位子系统重建的W态的保真度始终大于从完整的三个量子位层析获得的保真度,突出了基于子系统的层析方法的实际优势。
{"title":"Three-qubit W state tomography via full and marginal state reconstructions on ibm_osaka","authors":"Talath H.,&nbsp;Govindaraja B.P.,&nbsp;Divyamani B.G.,&nbsp;Akshata Shenoy H.,&nbsp;Usha A. R. Devi,&nbsp; Sudha","doi":"10.1007/s11128-025-04964-7","DOIUrl":"10.1007/s11128-025-04964-7","url":null,"abstract":"<div><p>We present a three-qubit quantum state tomography scheme requiring a set of 17 measurement settings, significantly reducing the experimental overhead compared to the conventional 63 Pauli measurement settings. Using IBM’s 127-qubit open-access quantum processor <span>ibm</span>_<span>osaka</span>, we prepare the three-qubit W state and employ our tomography scheme to reconstruct it. Additionally, we implement a two-qubit tomography protocol, involving 7 measurement settings, on <span>ibm</span>_<span>osaka</span> to reconstruct <i>two</i> of the two-qubit marginals of the W state. This serves as a <i>proof-of-principle</i> demonstration of the well-known theoretical result that any two of the two-qubit reduced density matrices can uniquely determine most of the whole three-qubit pure states. We show that the fidelity of the W state reconstructed from its two-qubit subsystems is consistently larger than that obtained from the full three-qubit tomography, highlighting the practical advantage of the subsystem-based tomography approach.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145335405","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Quantum Information Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1