首页 > 最新文献

Quantum Information Processing最新文献

英文 中文
On ((theta , Theta ))-cyclic codes and their applications in constructing QECCs
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-02-25 DOI: 10.1007/s11128-025-04684-y
Awadhesh Kumar Shukla, Sachin Pathak, Om Prakash Pandey, Vipul Mishra, Ashish Kumar Upadhyay

Let ({mathbb {F}}_q) be a finite field, where q is an odd prime power. Let (R={mathbb {F}}_q+u{mathbb {F}}_q+v{mathbb {F}}_q+uv{mathbb {F}}_q) with (u^2=u,v^2=v,uv=vu). In this paper, we study the algebraic structure of ((theta , Theta ))-cyclic codes of block length (rs) over ({mathbb {F}}_qR.) Specifically, we analyze the structure of these codes as left (R[x:Theta ])-submodules of ({mathfrak {R}}_{r,s} = frac{{mathbb {F}}_q[x:theta ]}{langle x^r-1rangle } times frac{R[x:Theta ]}{langle x^s-1rangle }). Our investigation involves determining generator polynomials and minimal generating sets for this family of codes. Further, we discuss the algebraic structure of separable codes. A relationship between the generator polynomials of ((theta , Theta ))-cyclic codes over ({mathbb {F}}_qR) and their duals is established. Moreover, we calculate the generator polynomials of the dual of ((theta , Theta ))-cyclic codes. As an application of our study, we provide a construction of quantum error-correcting codes (QECCs) from ((theta , Theta ))-cyclic codes of block length (rs) over ({mathbb {F}}_qR). We support our theoretical results with illustrative examples.

{"title":"On ((theta , Theta ))-cyclic codes and their applications in constructing QECCs","authors":"Awadhesh Kumar Shukla,&nbsp;Sachin Pathak,&nbsp;Om Prakash Pandey,&nbsp;Vipul Mishra,&nbsp;Ashish Kumar Upadhyay","doi":"10.1007/s11128-025-04684-y","DOIUrl":"10.1007/s11128-025-04684-y","url":null,"abstract":"<div><p>Let <span>({mathbb {F}}_q)</span> be a finite field, where <i>q</i> is an odd prime power. Let <span>(R={mathbb {F}}_q+u{mathbb {F}}_q+v{mathbb {F}}_q+uv{mathbb {F}}_q)</span> with <span>(u^2=u,v^2=v,uv=vu)</span>. In this paper, we study the algebraic structure of <span>((theta , Theta ))</span>-cyclic codes of block length (<i>r</i>, <i>s</i>) over <span>({mathbb {F}}_qR.)</span> Specifically, we analyze the structure of these codes as left <span>(R[x:Theta ])</span>-submodules of <span>({mathfrak {R}}_{r,s} = frac{{mathbb {F}}_q[x:theta ]}{langle x^r-1rangle } times frac{R[x:Theta ]}{langle x^s-1rangle })</span>. Our investigation involves determining generator polynomials and minimal generating sets for this family of codes. Further, we discuss the algebraic structure of separable codes. A relationship between the generator polynomials of <span>((theta , Theta ))</span>-cyclic codes over <span>({mathbb {F}}_qR)</span> and their duals is established. Moreover, we calculate the generator polynomials of the dual of <span>((theta , Theta ))</span>-cyclic codes. As an application of our study, we provide a construction of quantum error-correcting codes (QECCs) from <span>((theta , Theta ))</span>-cyclic codes of block length (<i>r</i>, <i>s</i>) over <span>({mathbb {F}}_qR)</span>. We support our theoretical results with illustrative examples.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143481142","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Unitary orbit optimization of quantum f-divergence
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-02-25 DOI: 10.1007/s11128-025-04688-8
Haojian Li, Xiaojing Yan

Hirche and Tomamichel recently introduced quantum f-divergence as an integral of quantum Hockey stick divergence. In this paper, we study the optimization of quantum f-divergence between the unitary orbits. The proof relies on the well-known Lidskii’s inequality. We also generalize the result to the mixed unitary orbits.

{"title":"Unitary orbit optimization of quantum f-divergence","authors":"Haojian Li,&nbsp;Xiaojing Yan","doi":"10.1007/s11128-025-04688-8","DOIUrl":"10.1007/s11128-025-04688-8","url":null,"abstract":"<div><p>Hirche and Tomamichel recently introduced quantum <i>f</i>-divergence as an integral of quantum Hockey stick divergence. In this paper, we study the optimization of quantum <i>f</i>-divergence between the unitary orbits. The proof relies on the well-known Lidskii’s inequality. We also generalize the result to the mixed unitary orbits.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-25","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143481140","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Exponential speedup of quantum algorithms for the pathfinding problem
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-02-24 DOI: 10.1007/s11128-025-04689-7
Jianqiang Li

Given xy on an unweighted undirected graph G, the goal of the pathfinding problem is to find an xy path. In this work, we first construct a graph G based on welded trees and define a pathfinding problem in the adjacency list oracle O. Then we provide an efficient quantum algorithm to find an xy path in the graph G. Finally, we prove that no classical algorithm can find an xy path in subexponential time with high probability. The pathfinding problem is one of the fundamental graph-related problems. Our findings suggest that quantum algorithms could potentially offer advantages in more types of graphs to solve the pathfinding problem.

{"title":"Exponential speedup of quantum algorithms for the pathfinding problem","authors":"Jianqiang Li","doi":"10.1007/s11128-025-04689-7","DOIUrl":"10.1007/s11128-025-04689-7","url":null,"abstract":"<div><p>Given <i>x</i>, <i>y</i> on an unweighted undirected graph <i>G</i>, the goal of the pathfinding problem is to find an <i>x</i>–<i>y</i> path. In this work, we first construct a graph <i>G</i> based on welded trees and define a pathfinding problem in the adjacency list oracle <i>O</i>. Then we provide an efficient quantum algorithm to find an <i>x</i>–<i>y</i> path in the graph <i>G</i>. Finally, we prove that no classical algorithm can find an <i>x</i>–<i>y</i> path in subexponential time with high probability. The pathfinding problem is one of the fundamental graph-related problems. Our findings suggest that quantum algorithms could potentially offer advantages in more types of graphs to solve the pathfinding problem.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143475166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Arbitrary (d~(ge 2))-level ((t,n)) threshold quantum secret reconstruction scheme using symmetric entanglements
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-02-24 DOI: 10.1007/s11128-025-04679-9
Suchandan Ghosh, Avishek Adhikari

Secret Sharing schemes are very much well-developed in classical cryptography. This paper introduces a novel Secret Sharing scheme that leverages entanglement for secure communication. While our protocol initially focuses on a single reconstructor, it offers the flexibility to dynamically change the reconstructor without compromising the reconstruction security of the shared secret. Traditional Secret Sharing schemes often require secure channels for transmitting secret shares to the reconstructor, which can be costly and complex. In contrast, our proposed protocol eliminates the need for secure channels, significantly reducing implementation overhead. Our proposed scheme introduces a secret reconstruction method for (d ge 2), expanding upon previous works that primarily focused on (d > 2.) Our work provides a unified framework that bridges the gap between the cases (d = 2) and (d > 2.) We carefully analyze the conditions under which each case achieves its highest level of security, utilizing newly developed concepts, termed Perfectly Symmetric, Almost Symmetric, and queryless or Vacuously Symmetric entanglements. By eliminating the need for Quantum Fourier Transform and Inverse Quantum Fourier Transform, which were commonly used in previous schemes, we simplify the proposed protocol and potentially improve its efficiency. We thoroughly analyze the correctness and security of our proposed scheme, ensuring its reliability and resistance to certain quantum attacks. Finally, we propose a detailed comparison with the previous works.

{"title":"Arbitrary (d~(ge 2))-level ((t,n)) threshold quantum secret reconstruction scheme using symmetric entanglements","authors":"Suchandan Ghosh,&nbsp;Avishek Adhikari","doi":"10.1007/s11128-025-04679-9","DOIUrl":"10.1007/s11128-025-04679-9","url":null,"abstract":"<div><p>Secret Sharing schemes are very much well-developed in classical cryptography. This paper introduces a novel Secret Sharing scheme that leverages entanglement for secure communication. While our protocol initially focuses on a single reconstructor, it offers the flexibility to dynamically change the reconstructor without compromising the reconstruction security of the shared secret. Traditional Secret Sharing schemes often require secure channels for transmitting secret shares to the reconstructor, which can be costly and complex. In contrast, our proposed protocol eliminates the need for secure channels, significantly reducing implementation overhead. Our proposed scheme introduces a secret reconstruction method for <span>(d ge 2)</span>, expanding upon previous works that primarily focused on <span>(d &gt; 2.)</span> Our work provides a unified framework that bridges the gap between the cases <span>(d = 2)</span> and <span>(d &gt; 2.)</span> We carefully analyze the conditions under which each case achieves its highest level of security, utilizing newly developed concepts, termed Perfectly Symmetric, Almost Symmetric, and queryless or Vacuously Symmetric entanglements. By eliminating the need for Quantum Fourier Transform and Inverse Quantum Fourier Transform, which were commonly used in previous schemes, we simplify the proposed protocol and potentially improve its efficiency. We thoroughly analyze the correctness and security of our proposed scheme, ensuring its reliability and resistance to certain quantum attacks. Finally, we propose a detailed comparison with the previous works.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143475296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
New EAQEC codes from LCP of codes over finite non-chain rings
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-02-24 DOI: 10.1007/s11128-025-04687-9
Peng Hu, Xiusheng Liu

In this paper, we first study the linear complementary pair (abbreviated to LCP) of codes over finite non-chain rings (R_{u,v,q}={mathbb {F}}_q+u{mathbb {F}}_q+ v{mathbb {F}}_q+uv{mathbb {F}}_q) with (u^2=u,v^2=v). Then we provide a method of constructing entanglement-assisted quantum error-correcting (abbreviated to EAQEC) codes from an LCP of codes of length n over (R_{u,v,q}) using CSS. To enrich the variety of available EAQEC codes, some new EAQEC codes are given in the sense that their parameters are different from all the previous constructions.

本文首先研究了有限非链环(R_{u,v,q}={/mathbb {F}}_q+u{mathbb {F}}_q+ v{mathbb {F}}_q+uv{mathbb {F}}_q) 上编码的线性互补对(简称为 LCP),其中 (u^2=u,v^2=v).然后,我们提供了一种使用 CSS 从长度为 n 的 (R_{u,v,q}) 码的 LCP 中构造纠缠辅助量子纠错码(简称 EAQEC)的方法。为了丰富现有 EAQEC 码的种类,本文给出了一些新的 EAQEC 码,它们的参数与之前的所有构造都不同。
{"title":"New EAQEC codes from LCP of codes over finite non-chain rings","authors":"Peng Hu,&nbsp;Xiusheng Liu","doi":"10.1007/s11128-025-04687-9","DOIUrl":"10.1007/s11128-025-04687-9","url":null,"abstract":"<div><p>In this paper, we first study the linear complementary pair (abbreviated to LCP) of codes over finite non-chain rings <span>(R_{u,v,q}={mathbb {F}}_q+u{mathbb {F}}_q+ v{mathbb {F}}_q+uv{mathbb {F}}_q)</span> with <span>(u^2=u,v^2=v)</span>. Then we provide a method of constructing entanglement-assisted quantum error-correcting (abbreviated to EAQEC) codes from an LCP of codes of length <i>n</i> over <span>(R_{u,v,q})</span> using CSS. To enrich the variety of available EAQEC codes, some new EAQEC codes are given in the sense that their parameters are different from all the previous constructions.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143475167","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Teleportation of unknown qubit via Star-type tripartite states
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-02-24 DOI: 10.1007/s11128-025-04680-2
Anushree Bhattacharjee, Abhijit Mandal, Sovik Roy

Eylee Jung et.al[1] had conjectured that (P_{max}=frac{1}{2}) is a necessary and sufficient condition for the perfect two-party teleportation, and consequently, the Groverian measure of entanglement for the entanglement resource must be (frac{1}{sqrt{2}}). It is also known that prototype W state is not useful for standard teleportation. Agrawal and Pati[2] have successfully executed perfect (standard) teleportation with non-prototype W state. Aligned with the protocol mentioned in[2], we have considered here Star type tripartite states and have shown that perfect teleportation is suitable with such states. Moreover, we have taken the linear superposition of non-prototype W state and its spin-flipped version and shown that it belongs to Star class. Also, standard teleportation is possible with these states. It is observed that genuine tripartite entanglement is not necessary requirement for a state to be used as a channel for successful standard teleportation. We have also shown that these Star class states are (P_{max}=frac{1}{4}) states and their Groverian entanglement is (frac{sqrt{3}}{2}), thus concluding that Jung conjecture is not a necessary condition.

{"title":"Teleportation of unknown qubit via Star-type tripartite states","authors":"Anushree Bhattacharjee,&nbsp;Abhijit Mandal,&nbsp;Sovik Roy","doi":"10.1007/s11128-025-04680-2","DOIUrl":"10.1007/s11128-025-04680-2","url":null,"abstract":"<div><p>Eylee Jung <i>et.al</i>[1] had conjectured that <span>(P_{max}=frac{1}{2})</span> is a necessary and sufficient condition for the perfect two-party teleportation, and consequently, the Groverian measure of entanglement for the entanglement resource must be <span>(frac{1}{sqrt{2}})</span>. It is also known that prototype <i>W</i> state is not useful for standard teleportation. Agrawal and Pati[2] have successfully executed perfect (standard) teleportation with non-prototype <i>W</i> state. Aligned with the protocol mentioned in[2], we have considered here <i>Star</i> type tripartite states and have shown that perfect teleportation is suitable with such states. Moreover, we have taken the linear superposition of non-prototype <i>W</i> state and its spin-flipped version and shown that it belongs to <i>Star</i> class. Also, standard teleportation is possible with these states. It is observed that genuine tripartite entanglement is not necessary requirement for a state to be used as a channel for successful standard teleportation. We have also shown that these <i>Star</i> class states are <span>(P_{max}=frac{1}{4})</span> states and their Groverian entanglement is <span>(frac{sqrt{3}}{2})</span>, thus concluding that Jung conjecture is not a necessary condition.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 3","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143475168","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Underwater continuous-variable quantum key distribution with faster-than-Nyquist scheme
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-02-20 DOI: 10.1007/s11128-025-04676-y
Xiaodong Wu, Duan Huang

The transmission rate of traditional underwater discrete modulation continuous variable quantum key distribution (CV-QKD) scheme is limited by Nyquist criterion. Considering the limitation of Nyquist criterion and the large attenuation coefficient of the seawater channel, it is a challenge to enhance the secret key rate of the traditional underwater discrete modulation CV-QKD without relying on physical hardware. To solve this problem, we propose an underwater discrete modulation CV-QKD with faster-than-Nyquist (FTN) scheme; namely, a FTN signal generator is employed to make the discrete modulated signals obtain FTN rate at the sender’s side. Then an equalizer and a decoder are used to restore the sampled symbols to the original information by taking four typical seawater channels into account. The simulation results show that compared to the traditional Nyquist transmission scheme, the proposed protocol can effectively improve the secret key rate and underwater secure distance no matter what type of water is considered. These results indicate that the proposed scheme can break the constraints of Nyquist criterion, thus achieving a more efficient underwater discrete modulation CV-QKD scheme. Furthermore, we also consider the finite-size effect, which provides more practical results than those achieved in the asymptotic limit.

{"title":"Underwater continuous-variable quantum key distribution with faster-than-Nyquist scheme","authors":"Xiaodong Wu,&nbsp;Duan Huang","doi":"10.1007/s11128-025-04676-y","DOIUrl":"10.1007/s11128-025-04676-y","url":null,"abstract":"<div><p>The transmission rate of traditional underwater discrete modulation continuous variable quantum key distribution (CV-QKD) scheme is limited by Nyquist criterion. Considering the limitation of Nyquist criterion and the large attenuation coefficient of the seawater channel, it is a challenge to enhance the secret key rate of the traditional underwater discrete modulation CV-QKD without relying on physical hardware. To solve this problem, we propose an underwater discrete modulation CV-QKD with faster-than-Nyquist (FTN) scheme; namely, a FTN signal generator is employed to make the discrete modulated signals obtain FTN rate at the sender’s side. Then an equalizer and a decoder are used to restore the sampled symbols to the original information by taking four typical seawater channels into account. The simulation results show that compared to the traditional Nyquist transmission scheme, the proposed protocol can effectively improve the secret key rate and underwater secure distance no matter what type of water is considered. These results indicate that the proposed scheme can break the constraints of Nyquist criterion, thus achieving a more efficient underwater discrete modulation CV-QKD scheme. Furthermore, we also consider the finite-size effect, which provides more practical results than those achieved in the asymptotic limit.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 2","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-025-04676-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143446625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Counterfactual controlled quantum dialogue protocol
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-02-20 DOI: 10.1007/s11128-025-04683-z
Rui-Chen Huang, Yu-Guang Yang, Guang-Bao Xu, Dong-Huan Jiang, Yi-Hua Zhou, Wei-Min Shi, Dan Li

Quantum dialogue (QD) is a two-way quantum secure direct communication. Traditional QD protocols rely on transmitting photons through a quantum channel, which can introduce vulnerabilities. This paper presents a counterfactual controlled QD protocol based on entanglement swapping. By employing counterfactual quantum entanglement generation, the protocol facilitates controlled QD without requiring physical particle transfer or prior entanglement between remote participants. This approach significantly enhances the security of QD methods, providing robust resistance against all possible channel-based attacks and ensuring theoretical security.

{"title":"Counterfactual controlled quantum dialogue protocol","authors":"Rui-Chen Huang,&nbsp;Yu-Guang Yang,&nbsp;Guang-Bao Xu,&nbsp;Dong-Huan Jiang,&nbsp;Yi-Hua Zhou,&nbsp;Wei-Min Shi,&nbsp;Dan Li","doi":"10.1007/s11128-025-04683-z","DOIUrl":"10.1007/s11128-025-04683-z","url":null,"abstract":"<div><p>Quantum dialogue (QD) is a two-way quantum secure direct communication. Traditional QD protocols rely on transmitting photons through a quantum channel, which can introduce vulnerabilities. This paper presents a counterfactual controlled QD protocol based on entanglement swapping. By employing counterfactual quantum entanglement generation, the protocol facilitates controlled QD without requiring physical particle transfer or prior entanglement between remote participants. This approach significantly enhances the security of QD methods, providing robust resistance against all possible channel-based attacks and ensuring theoretical security.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 2","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-025-04683-z.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143446624","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
A (t, n) threshold quantum secret sharing with authentication based on single photons
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-02-18 DOI: 10.1007/s11128-025-04672-2
Jie Zhang, Jie Zhang, Sujuan Qin, Zhengping Jin

Secret sharing has become a important cryptographic primitive and been widely used. And quantum secret sharing is a quantum approach to achieve secret sharing. The (tn) threshold quantum secret sharing requires only t participants out of n to cooperate to recover the secret, which is more flexible than the (nn) scheme. However, most (tn) threshold schemes basically involve quantum entanglement, and the preparation of entangled states as well as entanglement swapping are relatively complex. In this paper, we propose a (tn) threshold quantum secret sharing scheme with authentication by using the Lagrange interpolation polynomial based on single photons. Unlike other (tn) threshold schemes, it does not involve entangled states or entanglement swapping. And the distributor authenticate the participants without revealing the full identity key. In addition, secret sharing is based on Lagrange interpolation polynomial implementation, allowing any t participants to recover the secret. Analysis shows that the scheme can resist external eavesdroppers and dishonest participants. Compared with other schemes, this scheme has the following advantages: (1) it is easy to implement; (2) the (tn) threshold scheme increases the flexibility of the scheme; (3) the identity key can be reused.

{"title":"A (t, n) threshold quantum secret sharing with authentication based on single photons","authors":"Jie Zhang,&nbsp;Jie Zhang,&nbsp;Sujuan Qin,&nbsp;Zhengping Jin","doi":"10.1007/s11128-025-04672-2","DOIUrl":"10.1007/s11128-025-04672-2","url":null,"abstract":"<div><p>Secret sharing has become a important cryptographic primitive and been widely used. And quantum secret sharing is a quantum approach to achieve secret sharing. The (<i>t</i>, <i>n</i>) threshold quantum secret sharing requires only t participants out of n to cooperate to recover the secret, which is more flexible than the (<i>n</i>, <i>n</i>) scheme. However, most (<i>t</i>, <i>n</i>) threshold schemes basically involve quantum entanglement, and the preparation of entangled states as well as entanglement swapping are relatively complex. In this paper, we propose a (<i>t</i>, <i>n</i>) threshold quantum secret sharing scheme with authentication by using the Lagrange interpolation polynomial based on single photons. Unlike other (<i>t</i>, <i>n</i>) threshold schemes, it does not involve entangled states or entanglement swapping. And the distributor authenticate the participants without revealing the full identity key. In addition, secret sharing is based on Lagrange interpolation polynomial implementation, allowing any t participants to recover the secret. Analysis shows that the scheme can resist external eavesdroppers and dishonest participants. Compared with other schemes, this scheme has the following advantages: (1) it is easy to implement; (2) the (<i>t</i>, <i>n</i>) threshold scheme increases the flexibility of the scheme; (3) the identity key can be reused. \u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 2","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143431086","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Graph decomposition techniques for solving combinatorial optimization problems with variational quantum algorithms
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-02-18 DOI: 10.1007/s11128-025-04675-z
Moises Ponce, Rebekah Herrman, Phillip C. Lotshaw, Sarah Powers, George Siopsis, Travis Humble, James Ostrowski

The quantum approximate optimization algorithm (QAOA) has the potential to approximately solve complex combinatorial optimization problems in polynomial time. However, current noisy quantum devices cannot solve large problems due to hardware constraints. In this work, we develop an algorithm that decomposes the QAOA input problem graph into a smaller problem and solves MaxCut using QAOA on the reduced graph. The algorithm requires a subroutine that can be classical or quantum—in this work, we implement the algorithm twice on each graph. One implementation uses the classical solver Gurobi in the subroutine and the other uses QAOA. We solve these reduced problems with QAOA. On average, the reduced problems require only approximately 1/10 of the number of vertices than the original MaxCut instances. Furthermore, the average approximation ratio of the original MaxCut problems is 0.75, while the approximation ratios of the decomposed graphs are on average of 0.96 for both Gurobi and QAOA. With this decomposition, we are able to measure optimal solutions for ten 100-vertex graphs by running single-layer QAOA circuits on the Quantinuum trapped-ion quantum computer H1-1, sampling each circuit only 500 times. This approach is best suited for sparse, particularly k-regular graphs, as k-regular graphs on n vertices can be decomposed into a graph with at most (frac{nk}{k+1}) vertices in polynomial time. Further reductions can be obtained with a potential trade-off in computational time. While this paper applies the decomposition method to the MaxCut problem, it can be applied to more general classes of combinatorial optimization problems.

{"title":"Graph decomposition techniques for solving combinatorial optimization problems with variational quantum algorithms","authors":"Moises Ponce,&nbsp;Rebekah Herrman,&nbsp;Phillip C. Lotshaw,&nbsp;Sarah Powers,&nbsp;George Siopsis,&nbsp;Travis Humble,&nbsp;James Ostrowski","doi":"10.1007/s11128-025-04675-z","DOIUrl":"10.1007/s11128-025-04675-z","url":null,"abstract":"<div><p>The quantum approximate optimization algorithm (QAOA) has the potential to approximately solve complex combinatorial optimization problems in polynomial time. However, current noisy quantum devices cannot solve large problems due to hardware constraints. In this work, we develop an algorithm that decomposes the QAOA input problem graph into a smaller problem and solves MaxCut using QAOA on the reduced graph. The algorithm requires a subroutine that can be classical or quantum—in this work, we implement the algorithm twice on each graph. One implementation uses the classical solver Gurobi in the subroutine and the other uses QAOA. We solve these reduced problems with QAOA. On average, the reduced problems require only approximately 1/10 of the number of vertices than the original MaxCut instances. Furthermore, the average approximation ratio of the original MaxCut problems is 0.75, while the approximation ratios of the decomposed graphs are on average of 0.96 for both Gurobi and QAOA. With this decomposition, we are able to measure optimal solutions for ten 100-vertex graphs by running single-layer QAOA circuits on the Quantinuum trapped-ion quantum computer H1-1, sampling each circuit only 500 times. This approach is best suited for sparse, particularly <i>k</i>-regular graphs, as <i>k</i>-regular graphs on <i>n</i> vertices can be decomposed into a graph with at most <span>(frac{nk}{k+1})</span> vertices in polynomial time. Further reductions can be obtained with a potential trade-off in computational time. While this paper applies the decomposition method to the MaxCut problem, it can be applied to more general classes of combinatorial optimization problems.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 2","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-02-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143431057","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Quantum Information Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1