Let ({mathbb {F}}_q) be a finite field, where q is an odd prime power. Let (R={mathbb {F}}_q+u{mathbb {F}}_q+v{mathbb {F}}_q+uv{mathbb {F}}_q) with (u^2=u,v^2=v,uv=vu). In this paper, we study the algebraic structure of ((theta , Theta ))-cyclic codes of block length (r, s) over ({mathbb {F}}_qR.) Specifically, we analyze the structure of these codes as left (R[x:Theta ])-submodules of ({mathfrak {R}}_{r,s} = frac{{mathbb {F}}_q[x:theta ]}{langle x^r-1rangle } times frac{R[x:Theta ]}{langle x^s-1rangle }). Our investigation involves determining generator polynomials and minimal generating sets for this family of codes. Further, we discuss the algebraic structure of separable codes. A relationship between the generator polynomials of ((theta , Theta ))-cyclic codes over ({mathbb {F}}_qR) and their duals is established. Moreover, we calculate the generator polynomials of the dual of ((theta , Theta ))-cyclic codes. As an application of our study, we provide a construction of quantum error-correcting codes (QECCs) from ((theta , Theta ))-cyclic codes of block length (r, s) over ({mathbb {F}}_qR). We support our theoretical results with illustrative examples.
{"title":"On ((theta , Theta ))-cyclic codes and their applications in constructing QECCs","authors":"Awadhesh Kumar Shukla, Sachin Pathak, Om Prakash Pandey, Vipul Mishra, Ashish Kumar Upadhyay","doi":"10.1007/s11128-025-04684-y","DOIUrl":"10.1007/s11128-025-04684-y","url":null,"abstract":"<div><p>Let <span>({mathbb {F}}_q)</span> be a finite field, where <i>q</i> is an odd prime power. Let <span>(R={mathbb {F}}_q+u{mathbb {F}}_q+v{mathbb {F}}_q+uv{mathbb {F}}_q)</span> with <span>(u^2=u,v^2=v,uv=vu)</span>. In this paper, we study the algebraic structure of <span>((theta , Theta ))</span>-cyclic codes of block length (<i>r</i>, <i>s</i>) over <span>({mathbb {F}}_qR.)</span> Specifically, we analyze the structure of these codes as left <span>(R[x:Theta ])</span>-submodules of <span>({mathfrak {R}}_{r,s} = frac{{mathbb {F}}_q[x:theta ]}{langle x^r-1rangle } times frac{R[x:Theta ]}{langle x^s-1rangle })</span>. Our investigation involves determining generator polynomials and minimal generating sets for this family of codes. Further, we discuss the algebraic structure of separable codes. A relationship between the generator polynomials of <span>((theta , Theta ))</span>-cyclic codes over <span>({mathbb {F}}_qR)</span> and their duals is established. Moreover, we calculate the generator polynomials of the dual of <span>((theta , Theta ))</span>-cyclic codes. As an application of our study, we provide a construction of quantum error-correcting codes (QECCs) from <span>((theta , Theta ))</span>-cyclic codes of block length (<i>r</i>, <i>s</i>) over <span>({mathbb {F}}_qR)</span>. We support our theoretical results with illustrative examples.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143481142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-25DOI: 10.1007/s11128-025-04688-8
Haojian Li, Xiaojing Yan
Hirche and Tomamichel recently introduced quantum f-divergence as an integral of quantum Hockey stick divergence. In this paper, we study the optimization of quantum f-divergence between the unitary orbits. The proof relies on the well-known Lidskii’s inequality. We also generalize the result to the mixed unitary orbits.
{"title":"Unitary orbit optimization of quantum f-divergence","authors":"Haojian Li, Xiaojing Yan","doi":"10.1007/s11128-025-04688-8","DOIUrl":"10.1007/s11128-025-04688-8","url":null,"abstract":"<div><p>Hirche and Tomamichel recently introduced quantum <i>f</i>-divergence as an integral of quantum Hockey stick divergence. In this paper, we study the optimization of quantum <i>f</i>-divergence between the unitary orbits. The proof relies on the well-known Lidskii’s inequality. We also generalize the result to the mixed unitary orbits.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143481140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-24DOI: 10.1007/s11128-025-04689-7
Jianqiang Li
Given x, y on an unweighted undirected graph G, the goal of the pathfinding problem is to find an x–y path. In this work, we first construct a graph G based on welded trees and define a pathfinding problem in the adjacency list oracle O. Then we provide an efficient quantum algorithm to find an x–y path in the graph G. Finally, we prove that no classical algorithm can find an x–y path in subexponential time with high probability. The pathfinding problem is one of the fundamental graph-related problems. Our findings suggest that quantum algorithms could potentially offer advantages in more types of graphs to solve the pathfinding problem.
{"title":"Exponential speedup of quantum algorithms for the pathfinding problem","authors":"Jianqiang Li","doi":"10.1007/s11128-025-04689-7","DOIUrl":"10.1007/s11128-025-04689-7","url":null,"abstract":"<div><p>Given <i>x</i>, <i>y</i> on an unweighted undirected graph <i>G</i>, the goal of the pathfinding problem is to find an <i>x</i>–<i>y</i> path. In this work, we first construct a graph <i>G</i> based on welded trees and define a pathfinding problem in the adjacency list oracle <i>O</i>. Then we provide an efficient quantum algorithm to find an <i>x</i>–<i>y</i> path in the graph <i>G</i>. Finally, we prove that no classical algorithm can find an <i>x</i>–<i>y</i> path in subexponential time with high probability. The pathfinding problem is one of the fundamental graph-related problems. Our findings suggest that quantum algorithms could potentially offer advantages in more types of graphs to solve the pathfinding problem.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143475166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-24DOI: 10.1007/s11128-025-04679-9
Suchandan Ghosh, Avishek Adhikari
Secret Sharing schemes are very much well-developed in classical cryptography. This paper introduces a novel Secret Sharing scheme that leverages entanglement for secure communication. While our protocol initially focuses on a single reconstructor, it offers the flexibility to dynamically change the reconstructor without compromising the reconstruction security of the shared secret. Traditional Secret Sharing schemes often require secure channels for transmitting secret shares to the reconstructor, which can be costly and complex. In contrast, our proposed protocol eliminates the need for secure channels, significantly reducing implementation overhead. Our proposed scheme introduces a secret reconstruction method for (d ge 2), expanding upon previous works that primarily focused on (d > 2.) Our work provides a unified framework that bridges the gap between the cases (d = 2) and (d > 2.) We carefully analyze the conditions under which each case achieves its highest level of security, utilizing newly developed concepts, termed Perfectly Symmetric, Almost Symmetric, and queryless or Vacuously Symmetric entanglements. By eliminating the need for Quantum Fourier Transform and Inverse Quantum Fourier Transform, which were commonly used in previous schemes, we simplify the proposed protocol and potentially improve its efficiency. We thoroughly analyze the correctness and security of our proposed scheme, ensuring its reliability and resistance to certain quantum attacks. Finally, we propose a detailed comparison with the previous works.
{"title":"Arbitrary (d~(ge 2))-level ((t,n)) threshold quantum secret reconstruction scheme using symmetric entanglements","authors":"Suchandan Ghosh, Avishek Adhikari","doi":"10.1007/s11128-025-04679-9","DOIUrl":"10.1007/s11128-025-04679-9","url":null,"abstract":"<div><p>Secret Sharing schemes are very much well-developed in classical cryptography. This paper introduces a novel Secret Sharing scheme that leverages entanglement for secure communication. While our protocol initially focuses on a single reconstructor, it offers the flexibility to dynamically change the reconstructor without compromising the reconstruction security of the shared secret. Traditional Secret Sharing schemes often require secure channels for transmitting secret shares to the reconstructor, which can be costly and complex. In contrast, our proposed protocol eliminates the need for secure channels, significantly reducing implementation overhead. Our proposed scheme introduces a secret reconstruction method for <span>(d ge 2)</span>, expanding upon previous works that primarily focused on <span>(d > 2.)</span> Our work provides a unified framework that bridges the gap between the cases <span>(d = 2)</span> and <span>(d > 2.)</span> We carefully analyze the conditions under which each case achieves its highest level of security, utilizing newly developed concepts, termed Perfectly Symmetric, Almost Symmetric, and queryless or Vacuously Symmetric entanglements. By eliminating the need for Quantum Fourier Transform and Inverse Quantum Fourier Transform, which were commonly used in previous schemes, we simplify the proposed protocol and potentially improve its efficiency. We thoroughly analyze the correctness and security of our proposed scheme, ensuring its reliability and resistance to certain quantum attacks. Finally, we propose a detailed comparison with the previous works.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143475296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-24DOI: 10.1007/s11128-025-04687-9
Peng Hu, Xiusheng Liu
In this paper, we first study the linear complementary pair (abbreviated to LCP) of codes over finite non-chain rings (R_{u,v,q}={mathbb {F}}_q+u{mathbb {F}}_q+ v{mathbb {F}}_q+uv{mathbb {F}}_q) with (u^2=u,v^2=v). Then we provide a method of constructing entanglement-assisted quantum error-correcting (abbreviated to EAQEC) codes from an LCP of codes of length n over (R_{u,v,q}) using CSS. To enrich the variety of available EAQEC codes, some new EAQEC codes are given in the sense that their parameters are different from all the previous constructions.
{"title":"New EAQEC codes from LCP of codes over finite non-chain rings","authors":"Peng Hu, Xiusheng Liu","doi":"10.1007/s11128-025-04687-9","DOIUrl":"10.1007/s11128-025-04687-9","url":null,"abstract":"<div><p>In this paper, we first study the linear complementary pair (abbreviated to LCP) of codes over finite non-chain rings <span>(R_{u,v,q}={mathbb {F}}_q+u{mathbb {F}}_q+ v{mathbb {F}}_q+uv{mathbb {F}}_q)</span> with <span>(u^2=u,v^2=v)</span>. Then we provide a method of constructing entanglement-assisted quantum error-correcting (abbreviated to EAQEC) codes from an LCP of codes of length <i>n</i> over <span>(R_{u,v,q})</span> using CSS. To enrich the variety of available EAQEC codes, some new EAQEC codes are given in the sense that their parameters are different from all the previous constructions.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143475167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-24DOI: 10.1007/s11128-025-04680-2
Anushree Bhattacharjee, Abhijit Mandal, Sovik Roy
Eylee Jung et.al[1] had conjectured that (P_{max}=frac{1}{2}) is a necessary and sufficient condition for the perfect two-party teleportation, and consequently, the Groverian measure of entanglement for the entanglement resource must be (frac{1}{sqrt{2}}). It is also known that prototype W state is not useful for standard teleportation. Agrawal and Pati[2] have successfully executed perfect (standard) teleportation with non-prototype W state. Aligned with the protocol mentioned in[2], we have considered here Star type tripartite states and have shown that perfect teleportation is suitable with such states. Moreover, we have taken the linear superposition of non-prototype W state and its spin-flipped version and shown that it belongs to Star class. Also, standard teleportation is possible with these states. It is observed that genuine tripartite entanglement is not necessary requirement for a state to be used as a channel for successful standard teleportation. We have also shown that these Star class states are (P_{max}=frac{1}{4}) states and their Groverian entanglement is (frac{sqrt{3}}{2}), thus concluding that Jung conjecture is not a necessary condition.
{"title":"Teleportation of unknown qubit via Star-type tripartite states","authors":"Anushree Bhattacharjee, Abhijit Mandal, Sovik Roy","doi":"10.1007/s11128-025-04680-2","DOIUrl":"10.1007/s11128-025-04680-2","url":null,"abstract":"<div><p>Eylee Jung <i>et.al</i>[1] had conjectured that <span>(P_{max}=frac{1}{2})</span> is a necessary and sufficient condition for the perfect two-party teleportation, and consequently, the Groverian measure of entanglement for the entanglement resource must be <span>(frac{1}{sqrt{2}})</span>. It is also known that prototype <i>W</i> state is not useful for standard teleportation. Agrawal and Pati[2] have successfully executed perfect (standard) teleportation with non-prototype <i>W</i> state. Aligned with the protocol mentioned in[2], we have considered here <i>Star</i> type tripartite states and have shown that perfect teleportation is suitable with such states. Moreover, we have taken the linear superposition of non-prototype <i>W</i> state and its spin-flipped version and shown that it belongs to <i>Star</i> class. Also, standard teleportation is possible with these states. It is observed that genuine tripartite entanglement is not necessary requirement for a state to be used as a channel for successful standard teleportation. We have also shown that these <i>Star</i> class states are <span>(P_{max}=frac{1}{4})</span> states and their Groverian entanglement is <span>(frac{sqrt{3}}{2})</span>, thus concluding that Jung conjecture is not a necessary condition.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143475168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-20DOI: 10.1007/s11128-025-04676-y
Xiaodong Wu, Duan Huang
The transmission rate of traditional underwater discrete modulation continuous variable quantum key distribution (CV-QKD) scheme is limited by Nyquist criterion. Considering the limitation of Nyquist criterion and the large attenuation coefficient of the seawater channel, it is a challenge to enhance the secret key rate of the traditional underwater discrete modulation CV-QKD without relying on physical hardware. To solve this problem, we propose an underwater discrete modulation CV-QKD with faster-than-Nyquist (FTN) scheme; namely, a FTN signal generator is employed to make the discrete modulated signals obtain FTN rate at the sender’s side. Then an equalizer and a decoder are used to restore the sampled symbols to the original information by taking four typical seawater channels into account. The simulation results show that compared to the traditional Nyquist transmission scheme, the proposed protocol can effectively improve the secret key rate and underwater secure distance no matter what type of water is considered. These results indicate that the proposed scheme can break the constraints of Nyquist criterion, thus achieving a more efficient underwater discrete modulation CV-QKD scheme. Furthermore, we also consider the finite-size effect, which provides more practical results than those achieved in the asymptotic limit.
{"title":"Underwater continuous-variable quantum key distribution with faster-than-Nyquist scheme","authors":"Xiaodong Wu, Duan Huang","doi":"10.1007/s11128-025-04676-y","DOIUrl":"10.1007/s11128-025-04676-y","url":null,"abstract":"<div><p>The transmission rate of traditional underwater discrete modulation continuous variable quantum key distribution (CV-QKD) scheme is limited by Nyquist criterion. Considering the limitation of Nyquist criterion and the large attenuation coefficient of the seawater channel, it is a challenge to enhance the secret key rate of the traditional underwater discrete modulation CV-QKD without relying on physical hardware. To solve this problem, we propose an underwater discrete modulation CV-QKD with faster-than-Nyquist (FTN) scheme; namely, a FTN signal generator is employed to make the discrete modulated signals obtain FTN rate at the sender’s side. Then an equalizer and a decoder are used to restore the sampled symbols to the original information by taking four typical seawater channels into account. The simulation results show that compared to the traditional Nyquist transmission scheme, the proposed protocol can effectively improve the secret key rate and underwater secure distance no matter what type of water is considered. These results indicate that the proposed scheme can break the constraints of Nyquist criterion, thus achieving a more efficient underwater discrete modulation CV-QKD scheme. Furthermore, we also consider the finite-size effect, which provides more practical results than those achieved in the asymptotic limit.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 2","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-025-04676-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143446625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-20DOI: 10.1007/s11128-025-04683-z
Rui-Chen Huang, Yu-Guang Yang, Guang-Bao Xu, Dong-Huan Jiang, Yi-Hua Zhou, Wei-Min Shi, Dan Li
Quantum dialogue (QD) is a two-way quantum secure direct communication. Traditional QD protocols rely on transmitting photons through a quantum channel, which can introduce vulnerabilities. This paper presents a counterfactual controlled QD protocol based on entanglement swapping. By employing counterfactual quantum entanglement generation, the protocol facilitates controlled QD without requiring physical particle transfer or prior entanglement between remote participants. This approach significantly enhances the security of QD methods, providing robust resistance against all possible channel-based attacks and ensuring theoretical security.
{"title":"Counterfactual controlled quantum dialogue protocol","authors":"Rui-Chen Huang, Yu-Guang Yang, Guang-Bao Xu, Dong-Huan Jiang, Yi-Hua Zhou, Wei-Min Shi, Dan Li","doi":"10.1007/s11128-025-04683-z","DOIUrl":"10.1007/s11128-025-04683-z","url":null,"abstract":"<div><p>Quantum dialogue (QD) is a two-way quantum secure direct communication. Traditional QD protocols rely on transmitting photons through a quantum channel, which can introduce vulnerabilities. This paper presents a counterfactual controlled QD protocol based on entanglement swapping. By employing counterfactual quantum entanglement generation, the protocol facilitates controlled QD without requiring physical particle transfer or prior entanglement between remote participants. This approach significantly enhances the security of QD methods, providing robust resistance against all possible channel-based attacks and ensuring theoretical security.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 2","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-025-04683-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143446624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-18DOI: 10.1007/s11128-025-04672-2
Jie Zhang, Jie Zhang, Sujuan Qin, Zhengping Jin
Secret sharing has become a important cryptographic primitive and been widely used. And quantum secret sharing is a quantum approach to achieve secret sharing. The (t, n) threshold quantum secret sharing requires only t participants out of n to cooperate to recover the secret, which is more flexible than the (n, n) scheme. However, most (t, n) threshold schemes basically involve quantum entanglement, and the preparation of entangled states as well as entanglement swapping are relatively complex. In this paper, we propose a (t, n) threshold quantum secret sharing scheme with authentication by using the Lagrange interpolation polynomial based on single photons. Unlike other (t, n) threshold schemes, it does not involve entangled states or entanglement swapping. And the distributor authenticate the participants without revealing the full identity key. In addition, secret sharing is based on Lagrange interpolation polynomial implementation, allowing any t participants to recover the secret. Analysis shows that the scheme can resist external eavesdroppers and dishonest participants. Compared with other schemes, this scheme has the following advantages: (1) it is easy to implement; (2) the (t, n) threshold scheme increases the flexibility of the scheme; (3) the identity key can be reused.
{"title":"A (t, n) threshold quantum secret sharing with authentication based on single photons","authors":"Jie Zhang, Jie Zhang, Sujuan Qin, Zhengping Jin","doi":"10.1007/s11128-025-04672-2","DOIUrl":"10.1007/s11128-025-04672-2","url":null,"abstract":"<div><p>Secret sharing has become a important cryptographic primitive and been widely used. And quantum secret sharing is a quantum approach to achieve secret sharing. The (<i>t</i>, <i>n</i>) threshold quantum secret sharing requires only t participants out of n to cooperate to recover the secret, which is more flexible than the (<i>n</i>, <i>n</i>) scheme. However, most (<i>t</i>, <i>n</i>) threshold schemes basically involve quantum entanglement, and the preparation of entangled states as well as entanglement swapping are relatively complex. In this paper, we propose a (<i>t</i>, <i>n</i>) threshold quantum secret sharing scheme with authentication by using the Lagrange interpolation polynomial based on single photons. Unlike other (<i>t</i>, <i>n</i>) threshold schemes, it does not involve entangled states or entanglement swapping. And the distributor authenticate the participants without revealing the full identity key. In addition, secret sharing is based on Lagrange interpolation polynomial implementation, allowing any t participants to recover the secret. Analysis shows that the scheme can resist external eavesdroppers and dishonest participants. Compared with other schemes, this scheme has the following advantages: (1) it is easy to implement; (2) the (<i>t</i>, <i>n</i>) threshold scheme increases the flexibility of the scheme; (3) the identity key can be reused. \u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 2","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143431086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-18DOI: 10.1007/s11128-025-04675-z
Moises Ponce, Rebekah Herrman, Phillip C. Lotshaw, Sarah Powers, George Siopsis, Travis Humble, James Ostrowski
The quantum approximate optimization algorithm (QAOA) has the potential to approximately solve complex combinatorial optimization problems in polynomial time. However, current noisy quantum devices cannot solve large problems due to hardware constraints. In this work, we develop an algorithm that decomposes the QAOA input problem graph into a smaller problem and solves MaxCut using QAOA on the reduced graph. The algorithm requires a subroutine that can be classical or quantum—in this work, we implement the algorithm twice on each graph. One implementation uses the classical solver Gurobi in the subroutine and the other uses QAOA. We solve these reduced problems with QAOA. On average, the reduced problems require only approximately 1/10 of the number of vertices than the original MaxCut instances. Furthermore, the average approximation ratio of the original MaxCut problems is 0.75, while the approximation ratios of the decomposed graphs are on average of 0.96 for both Gurobi and QAOA. With this decomposition, we are able to measure optimal solutions for ten 100-vertex graphs by running single-layer QAOA circuits on the Quantinuum trapped-ion quantum computer H1-1, sampling each circuit only 500 times. This approach is best suited for sparse, particularly k-regular graphs, as k-regular graphs on n vertices can be decomposed into a graph with at most (frac{nk}{k+1}) vertices in polynomial time. Further reductions can be obtained with a potential trade-off in computational time. While this paper applies the decomposition method to the MaxCut problem, it can be applied to more general classes of combinatorial optimization problems.
{"title":"Graph decomposition techniques for solving combinatorial optimization problems with variational quantum algorithms","authors":"Moises Ponce, Rebekah Herrman, Phillip C. Lotshaw, Sarah Powers, George Siopsis, Travis Humble, James Ostrowski","doi":"10.1007/s11128-025-04675-z","DOIUrl":"10.1007/s11128-025-04675-z","url":null,"abstract":"<div><p>The quantum approximate optimization algorithm (QAOA) has the potential to approximately solve complex combinatorial optimization problems in polynomial time. However, current noisy quantum devices cannot solve large problems due to hardware constraints. In this work, we develop an algorithm that decomposes the QAOA input problem graph into a smaller problem and solves MaxCut using QAOA on the reduced graph. The algorithm requires a subroutine that can be classical or quantum—in this work, we implement the algorithm twice on each graph. One implementation uses the classical solver Gurobi in the subroutine and the other uses QAOA. We solve these reduced problems with QAOA. On average, the reduced problems require only approximately 1/10 of the number of vertices than the original MaxCut instances. Furthermore, the average approximation ratio of the original MaxCut problems is 0.75, while the approximation ratios of the decomposed graphs are on average of 0.96 for both Gurobi and QAOA. With this decomposition, we are able to measure optimal solutions for ten 100-vertex graphs by running single-layer QAOA circuits on the Quantinuum trapped-ion quantum computer H1-1, sampling each circuit only 500 times. This approach is best suited for sparse, particularly <i>k</i>-regular graphs, as <i>k</i>-regular graphs on <i>n</i> vertices can be decomposed into a graph with at most <span>(frac{nk}{k+1})</span> vertices in polynomial time. Further reductions can be obtained with a potential trade-off in computational time. While this paper applies the decomposition method to the MaxCut problem, it can be applied to more general classes of combinatorial optimization problems.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 2","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143431057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}