Pub Date : 2025-11-27DOI: 10.1007/s11128-025-05008-w
Luis Víctor Dieulefait, Jorge Urroz
In this paper, we give a polynomial time algorithm to compute (varphi (N)) for an RSA module N using as input the order modulo N of a randomly chosen integer. This provides a new insight in the very important problem of factoring an RSA module with extra information. In fact, the algorithm is extremely simple and consists only on a computation of a greatest common divisor, two multiplications and a division. The algorithm works with a probability of at least (1-frac{1}{N^{1/2-epsilon }}), where (epsilon ) is any small positive constant.
{"title":"Computing (varphi (N)) for an RSA module with a single quantum query","authors":"Luis Víctor Dieulefait, Jorge Urroz","doi":"10.1007/s11128-025-05008-w","DOIUrl":"10.1007/s11128-025-05008-w","url":null,"abstract":"<div><p>In this paper, we give a polynomial time algorithm to compute <span>(varphi (N))</span> for an RSA module <i>N</i> using as input the order modulo <i>N</i> of a randomly chosen integer. This provides a new insight in the very important problem of factoring an RSA module with extra information. In fact, the algorithm is extremely simple and consists only on a computation of a greatest common divisor, two multiplications and a division. The algorithm works with a probability of at least <span>(1-frac{1}{N^{1/2-epsilon }})</span>, where <span>(epsilon )</span> is any small positive constant.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 12","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-025-05008-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145613096","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-26DOI: 10.1007/s11128-025-05007-x
Meng-Yao Liu, Meng-Yuan Zhao, Bin Yan, Jeng-Shyang Pan, Hong-Mei Yang
Quantum visual secret sharing is a novel and important research direction. It has higher security and practicality. However, current schemes are designed for the sharing and recovery of a single secret image. To address this problem, we propose a novel (2,2) quantum visual multi-secret sharing (QVMSS) scheme. In the sharing phase, a quantum encoding table is designed. The colors of the two secret images are entangled and encoded into four different quantum superposition states, which are then distributed to the participants. All secret images are recovered using quantum OR operation and quantum shift operation in the recovery phase. We conducted experiments on a set of 20 standard halftone images to test the feasibility of our proposed scheme. Our scheme can completely recover all the secrets while improving the efficiency and security compared to traditional schemes.
{"title":"Quantum visual multi-secret sharing scheme using entanglement encoding","authors":"Meng-Yao Liu, Meng-Yuan Zhao, Bin Yan, Jeng-Shyang Pan, Hong-Mei Yang","doi":"10.1007/s11128-025-05007-x","DOIUrl":"10.1007/s11128-025-05007-x","url":null,"abstract":"<div><p>Quantum visual secret sharing is a novel and important research direction. It has higher security and practicality. However, current schemes are designed for the sharing and recovery of a single secret image. To address this problem, we propose a novel (2,2) quantum visual multi-secret sharing (QVMSS) scheme. In the sharing phase, a quantum encoding table is designed. The colors of the two secret images are entangled and encoded into four different quantum superposition states, which are then distributed to the participants. All secret images are recovered using quantum OR operation and quantum shift operation in the recovery phase. We conducted experiments on a set of 20 standard halftone images to test the feasibility of our proposed scheme. Our scheme can completely recover all the secrets while improving the efficiency and security compared to traditional schemes.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 12","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145612671","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-26DOI: 10.1007/s11128-025-05004-0
Hansol Kim, Wonjae Choi, Younghun Kwon
The magic state injection process is a critical component of fault-tolerant quantum computing, and numerous studies have been conducted on this topic. Many existing studies have focused on square-lattice structures, where each qubit connects directly to four other qubits via two-qubit gates. However, hardware that does not follow a lattice structure, such as IBM’s heavy-hexagon structure, is also under development. In these non-lattice structures, many quantum error correction (QEC) codes designed for lattice-based system cannot be directly applied. Adapting these codes often requires incorporating additional qubits, such as flag qubits. This alters the properties of the QEC code and introduces new variables into the magic state injection process. In this study, we implemented and compared the magic state injection process on a heavy-hexagon structure with flag qubits and a lattice structure without flag qubits. Additionally, we considered biased errors in superconducting hardware and investigated the impact of flag qubits under these conditions. Our analysis reveals that the inclusion of flag qubits introduces distinct characteristics into the magic state injection process, which are absent in systems without flag qubits. Based on these findings, we identify several critical considerations for performing magic state injection on heavy-hexagon systems incorporating flag qubits. Furthermore, we propose an optimized approach to maximize the efficacy of this process in such systems.
{"title":"Implementation of magic state injection within heavy-hexagon architectures","authors":"Hansol Kim, Wonjae Choi, Younghun Kwon","doi":"10.1007/s11128-025-05004-0","DOIUrl":"10.1007/s11128-025-05004-0","url":null,"abstract":"<div><p>The magic state injection process is a critical component of fault-tolerant quantum computing, and numerous studies have been conducted on this topic. Many existing studies have focused on square-lattice structures, where each qubit connects directly to four other qubits via two-qubit gates. However, hardware that does not follow a lattice structure, such as IBM’s heavy-hexagon structure, is also under development. In these non-lattice structures, many quantum error correction (QEC) codes designed for lattice-based system cannot be directly applied. Adapting these codes often requires incorporating additional qubits, such as flag qubits. This alters the properties of the QEC code and introduces new variables into the magic state injection process. In this study, we implemented and compared the magic state injection process on a heavy-hexagon structure with flag qubits and a lattice structure without flag qubits. Additionally, we considered biased errors in superconducting hardware and investigated the impact of flag qubits under these conditions. Our analysis reveals that the inclusion of flag qubits introduces distinct characteristics into the magic state injection process, which are absent in systems without flag qubits. Based on these findings, we identify several critical considerations for performing magic state injection on heavy-hexagon systems incorporating flag qubits. Furthermore, we propose an optimized approach to maximize the efficacy of this process in such systems.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 12","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-26","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145612555","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-24DOI: 10.1007/s11128-025-05006-y
Jiayu Gu, Fulin Li, Shixin Zhu
Quantum secret sharing plays an important role in quantum cryptography. When the deception occurs in quantum secret sharing scheme, the dishonest participant may obtain the secret exclusively. To address this, researchers have developed fair quantum secret sharing schemes to ensure the fairness of obtaining the secret among participants. However, we point that existing schemes achieve fairness at the significant cost of both efficiency and practicality. In this work, firstly, we propose a new fairness framework. Using our fairness framework, it is the first time that the scheme achieves fairness independent of the total round number k of reconstruction set in scheme. Compared to existing schemes that require big enough k to ensure fairness, our new method removes the obstacles to reducing rounds of reconstruction and significantly improving the scheme’s efficiency. Furthermore, our fairness framework can be used for all existing fair quantum secret sharing schemes to significantly reduce the rounds of reconstruction and improve the efficiency of the scheme. Secondly, we present an efficient verification mechanism for reconstructed parameters, which reduces computational cost and complexity compared to existing approaches. Lastly, combining fairness framework and efficient verification mechanism, a new and efficient fair quantum secret sharing scheme is proposed. Our scheme achieves fairness in just 2 rounds of reconstruction with less verification cost. Compared with existing fair quantum secret sharing schemes, our scheme has greatly improved the efficiency and enhanced the practicality.
{"title":"A new and efficient fair quantum secret sharing scheme","authors":"Jiayu Gu, Fulin Li, Shixin Zhu","doi":"10.1007/s11128-025-05006-y","DOIUrl":"10.1007/s11128-025-05006-y","url":null,"abstract":"<div><p>Quantum secret sharing plays an important role in quantum cryptography. When the deception occurs in quantum secret sharing scheme, the dishonest participant may obtain the secret exclusively. To address this, researchers have developed fair quantum secret sharing schemes to ensure the fairness of obtaining the secret among participants. However, we point that existing schemes achieve fairness at the significant cost of both efficiency and practicality. In this work, firstly, we propose a new fairness framework. Using our fairness framework, it is the first time that the scheme achieves fairness independent of the total round number <i>k</i> of reconstruction set in scheme. Compared to existing schemes that require big enough <i>k</i> to ensure fairness, our new method removes the obstacles to reducing rounds of reconstruction and significantly improving the scheme’s efficiency. Furthermore, our fairness framework can be used for all existing fair quantum secret sharing schemes to significantly reduce the rounds of reconstruction and improve the efficiency of the scheme. Secondly, we present an efficient verification mechanism for reconstructed parameters, which reduces computational cost and complexity compared to existing approaches. Lastly, combining fairness framework and efficient verification mechanism, a new and efficient fair quantum secret sharing scheme is proposed. Our scheme achieves fairness in just 2 rounds of reconstruction with less verification cost. Compared with existing fair quantum secret sharing schemes, our scheme has greatly improved the efficiency and enhanced the practicality.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 12","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145612292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-24DOI: 10.1007/s11128-025-04995-0
Matthew M. Lin, Bing-Ze Lu
Designing a mixed quantum channel is challenging due to the complexity of the transformations and the probabilistic mixtures of more straightforward channels involved. Fully characterizing a quantum channel generally requires preparing a complete set of input states, such as a basis for the state space, and measuring the corresponding output states. In this work, we begin by investigating a single input–output pair using projected gradient dynamics. This approach applies optimization flows constrained to the Stiefel manifold and the probabilistic simplex to identify the original quantum channel. The convergence of the flow is guaranteed by its relationship to the Zariski topology. We present numerical investigations of models adapted to various scenarios, including those with multiple input–output pairs, highlighting the flexibility and efficiency of our proposed method.
{"title":"Optimizing mixed quantum channels via projected gradient dynamics","authors":"Matthew M. Lin, Bing-Ze Lu","doi":"10.1007/s11128-025-04995-0","DOIUrl":"10.1007/s11128-025-04995-0","url":null,"abstract":"<div><p>Designing a mixed quantum channel is challenging due to the complexity of the transformations and the probabilistic mixtures of more straightforward channels involved. Fully characterizing a quantum channel generally requires preparing a complete set of input states, such as a basis for the state space, and measuring the corresponding output states. In this work, we begin by investigating a single input–output pair using projected gradient dynamics. This approach applies optimization flows constrained to the Stiefel manifold and the probabilistic simplex to identify the original quantum channel. The convergence of the flow is guaranteed by its relationship to the Zariski topology. We present numerical investigations of models adapted to various scenarios, including those with multiple input–output pairs, highlighting the flexibility and efficiency of our proposed method.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 12","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145612293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
We propose a dynamic multi-party quantum key exchange (QKE) protocol based on GHZ states to address the challenges of dynamic participation and security in quantum networks. The protocol employs an election algorithm to select initial leaders and primarily uses four-particle GHZ states, with adaptive switching to three-particle GHZ or Bell states as needed. This adaptive resource allocation integrates the strengths of quantum key agreement (QKA) and quantum key distribution (QKD), enhancing scalability and qubit efficiency. During QKA, initial leaders apply Pauli operations on GHZ states to generate correlated keys, while QKD flexibly adjusts to participant numbers to minimize resource consumption. Hash-based verification ensures resistance to common attacks, removes the need for pre-shared keys, and enables secure, scalable key exchange in dynamic multi-party settings.
{"title":"Adaptive multi-party quantum key exchange in dynamic networks using GHZ states","authors":"Chaonan Wang, Mengyan Li, Binglin Wang, Yanlin Zhang","doi":"10.1007/s11128-025-05003-1","DOIUrl":"10.1007/s11128-025-05003-1","url":null,"abstract":"<div><p>We propose a dynamic multi-party quantum key exchange (QKE) protocol based on GHZ states to address the challenges of dynamic participation and security in quantum networks. The protocol employs an election algorithm to select initial leaders and primarily uses four-particle GHZ states, with adaptive switching to three-particle GHZ or Bell states as needed. This adaptive resource allocation integrates the strengths of quantum key agreement (QKA) and quantum key distribution (QKD), enhancing scalability and qubit efficiency. During QKA, initial leaders apply Pauli operations on GHZ states to generate correlated keys, while QKD flexibly adjusts to participant numbers to minimize resource consumption. Hash-based verification ensures resistance to common attacks, removes the need for pre-shared keys, and enables secure, scalable key exchange in dynamic multi-party settings.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 12","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145612389","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-24DOI: 10.1007/s11128-025-04997-y
Yanying Liang, Sile Tang, Zhehao Yi, Haozhen Situ, Zhu-Jun Zheng
Graph-structured data commonly arise in many real-world applications, and this extends naturally into the quantum setting, where quantum data with inherent graph structures are frequently generated by typical quantum data sources. However, existing state-of-the-art models often lack training and evaluation on deeper quantum neural networks. In this work, we design a hybrid quantum-classical neural network with deep residual learning, termed Res-HQCNN, specifically designed to handle graph-structured quantum data. Building upon this architecture, we systematically explore the interplay between residual block structures and graph information in both training and testing phases. Through extensive experiments, we demonstrate that incorporating graph structure information into the quantum data significantly improves learning efficiency compared to the existing model. Additionally, we conduct comparative experiments to evaluate the effectiveness of residual blocks. Our results show that the residual structure enables deeper Res-HQCNN models to learn graph-structured quantum data more efficiently and accurately.
{"title":"Learnability of a hybrid quantum-classical neural network for graph-structured quantum data","authors":"Yanying Liang, Sile Tang, Zhehao Yi, Haozhen Situ, Zhu-Jun Zheng","doi":"10.1007/s11128-025-04997-y","DOIUrl":"10.1007/s11128-025-04997-y","url":null,"abstract":"<div><p>Graph-structured data commonly arise in many real-world applications, and this extends naturally into the quantum setting, where quantum data with inherent graph structures are frequently generated by typical quantum data sources. However, existing state-of-the-art models often lack training and evaluation on deeper quantum neural networks. In this work, we design a hybrid quantum-classical neural network with deep residual learning, termed Res-HQCNN, specifically designed to handle graph-structured quantum data. Building upon this architecture, we systematically explore the interplay between residual block structures and graph information in both training and testing phases. Through extensive experiments, we demonstrate that incorporating graph structure information into the quantum data significantly improves learning efficiency compared to the existing model. Additionally, we conduct comparative experiments to evaluate the effectiveness of residual blocks. Our results show that the residual structure enables deeper Res-HQCNN models to learn graph-structured quantum data more efficiently and accurately.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 12","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145612294","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-24DOI: 10.1007/s11128-025-04999-w
Farhan Musanna
This manuscript presents a novel quantum image encryption scheme that integrates two independent two-dimensional (2D) Arnold cat maps—one for spatial permutation and one for intensity permutation—with a robust chaotic diffusion process. This unified dual-permutation framework–applying independent permutations to spatial and intensity data–distinguishes itself from prior dual-map approaches and, to our knowledge, has not been previously explored in QIE. The algorithm features dual permutation, where independent cat maps are applied to coordinate and nibble-split pixel data, followed by quantum diffusion implemented through bit-plane cyclic shifts, chaotic key-based modular addition, and intra-qubit XOR operations. Critically, we provide the explicit formulation of the mathematical operators governing these quantum state transformations, addressing a key limitation of prior works. Moreover, since the proposed encryption transformations are formulated in terms of unitary quantum operators, the scheme is scalable, ensuring that our mathematical framework remains valid for future fault-tolerant quantum computers. This approach ensures that both spatial and intensity information are thoroughly scrambled, resulting in cipher images with near-uniform histograms, near-zero correlation coefficients, and extreme key sensitivity. The quantum implementation offers a theoretical exponential speedup in circuit depth compared to classical (O(R cdot N^2)) time complexity counterparts while resisting statistical, differential, and brute-force attacks through chaotic parameterization. Comprehensive experimental validation confirms the cryptographic superiority of our scheme: it achieves information entropy values exceeding 7.999, Number of Pixel Change Rate (NPCR) > 99.6%, and Unified Average Changing Intensity (UACI) (sim )33.46% on standard test images, outperforming recent state-of-the-art algorithms.
本文提出了一种新的量子图像加密方案,该方案集成了两个独立的二维(2D)阿诺德猫映射-一个用于空间排列,一个用于强度排列-具有鲁棒混沌扩散过程。这种统一的双排列框架——将独立排列应用于空间和强度数据——与之前的双图方法区别开来,据我们所知,在QIE中还没有进行过探索。该算法的特点是双置换,其中独立的cat映射应用于坐标和一点点分割像素数据,然后通过位平面循环移位、基于混沌密钥的模块化加法和量子位内异或操作实现量子扩散。关键的是,我们提供了控制这些量子态变换的数学算子的显式公式,解决了先前工作的一个关键限制。此外,由于提出的加密转换是根据单一量子算子制定的,因此该方案是可扩展的,确保我们的数学框架对未来的容错量子计算机仍然有效。这种方法确保空间和强度信息都被彻底打乱,从而产生具有近乎均匀的直方图、接近零的相关系数和极高的密钥灵敏度的密码图像。与经典的(O(R cdot N^2))时间复杂度相比,量子实现在电路深度方面提供了理论上的指数级加速,同时通过混沌参数化抵抗统计、微分和暴力攻击。综合实验验证证实了该方案的密码学优越性:信息熵值超过7.999,像素变化率(NPCR)超过99.6%, and Unified Average Changing Intensity (UACI) (sim )33.46% on standard test images, outperforming recent state-of-the-art algorithms.
{"title":"Quantum inspired image encryption using dual chaotic maps","authors":"Farhan Musanna","doi":"10.1007/s11128-025-04999-w","DOIUrl":"10.1007/s11128-025-04999-w","url":null,"abstract":"<div><p>This manuscript presents a novel quantum image encryption scheme that integrates two independent two-dimensional (2D) Arnold cat maps—one for spatial permutation and one for intensity permutation—with a robust chaotic diffusion process. This unified dual-permutation framework–applying independent permutations to spatial and intensity data–distinguishes itself from prior dual-map approaches and, to our knowledge, has not been previously explored in QIE. The algorithm features dual permutation, where independent cat maps are applied to coordinate and nibble-split pixel data, followed by quantum diffusion implemented through bit-plane cyclic shifts, chaotic key-based modular addition, and intra-qubit XOR operations. Critically, we provide the explicit formulation of the mathematical operators governing these quantum state transformations, addressing a key limitation of prior works. Moreover, since the proposed encryption transformations are formulated in terms of unitary quantum operators, the scheme is scalable, ensuring that our mathematical framework remains valid for future fault-tolerant quantum computers. This approach ensures that both spatial and intensity information are thoroughly scrambled, resulting in cipher images with near-uniform histograms, near-zero correlation coefficients, and extreme key sensitivity. The quantum implementation offers a theoretical exponential speedup in circuit depth compared to classical <span>(O(R cdot N^2))</span> time complexity counterparts while resisting statistical, differential, and brute-force attacks through chaotic parameterization. Comprehensive experimental validation confirms the cryptographic superiority of our scheme: it achieves information entropy values exceeding 7.999, Number of Pixel Change Rate (NPCR) > 99.6%, and Unified Average Changing Intensity (UACI) <span>(sim )</span>33.46% on standard test images, outperforming recent state-of-the-art algorithms.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 12","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145612296","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-21DOI: 10.1007/s11128-025-05002-2
Jinxing Zhao, Yu Guo, Fei He
The k-partite entanglement, which focus on at most how many particles in the global system are entangled but separable from other particles, is complementary to the k-entanglement that reflects how many split subsystems are entangled under partitions of the systems in characterizing multipartite entanglement. Very recently, the theory of the complete k-entanglement measure has been established in [Phys. Rev. A 110, 012405 (2024)]. Here we investigate whether we can define the complete measure of the k-partite entanglement. Consequently, with the same spirit as that of the complete k-entanglement measure, we present the axiomatic postulates that a complete k-partite entanglement measure should require. Furthermore, we present two classes of k-partite entanglement measures and show that one is complete while the other one is unified but not complete except for the case of (k=2).
{"title":"Complete k-partite entanglement measure","authors":"Jinxing Zhao, Yu Guo, Fei He","doi":"10.1007/s11128-025-05002-2","DOIUrl":"10.1007/s11128-025-05002-2","url":null,"abstract":"<div><p>The <i>k</i>-partite entanglement, which focus on at most how many particles in the global system are entangled but separable from other particles, is complementary to the <i>k</i>-entanglement that reflects how many split subsystems are entangled under partitions of the systems in characterizing multipartite entanglement. Very recently, the theory of the complete <i>k</i>-entanglement measure has been established in [Phys. Rev. A 110, 012405 (2024)]. Here we investigate whether we can define the complete measure of the <i>k</i>-partite entanglement. Consequently, with the same spirit as that of the complete <i>k</i>-entanglement measure, we present the axiomatic postulates that a complete <i>k</i>-partite entanglement measure should require. Furthermore, we present two classes of <i>k</i>-partite entanglement measures and show that one is complete while the other one is unified but not complete except for the case of <span>(k=2)</span>.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 12","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145561223","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-21DOI: 10.1007/s11128-025-04962-9
H. F. Habeba, E. M. Khalil, S. Sanad
The analytical solution of the system of three-level atom in (Lambda ) configuration interaction with two modes in the presence of a degenerate parameter amplifier term is presented. We investigate the effects of a degenerate parameter amplifier on the quantum properties of the atomic system. Specifically, we analyze how the presence of the parametric amplifier influences the atomic Fisher information, which quantifies the amount of information that can be extracted about a parameter from measurements on the quantum state. Additionally, we study the quantum coherence, which measures the superposition of states, and the second-order correlation function, which provides insights into the statistical properties of the emitted photons. In our analysis, we assumed that the atom in the upper state and the field in the squeezed-pair coherent state. Our results reveal that the presence of the degenerate parameter amplifier significantly enhances the quantum coherence of the atomic states. Furthermore, we demonstrate that the atomic Fisher information, a crucial quantity for parameter estimation in quantum metrology, is substantially influenced by the amplifier’s parameters. The second-order correlation function, which characterizes the statistical properties of the emitted photons, exhibits notable modifications due to the atom-amplifier interaction. These findings provide new insights into the control and manipulation of quantum states in three-level atomic systems, with potential applications in quantum information processing and metrology.
{"title":"Atomic Fisher information of three-level atom in the presence of degenerate parametric amplifier","authors":"H. F. Habeba, E. M. Khalil, S. Sanad","doi":"10.1007/s11128-025-04962-9","DOIUrl":"10.1007/s11128-025-04962-9","url":null,"abstract":"<div><p>The analytical solution of the system of three-level atom in <span>(Lambda )</span> configuration interaction with two modes in the presence of a degenerate parameter amplifier term is presented. We investigate the effects of a degenerate parameter amplifier on the quantum properties of the atomic system. Specifically, we analyze how the presence of the parametric amplifier influences the atomic Fisher information, which quantifies the amount of information that can be extracted about a parameter from measurements on the quantum state. Additionally, we study the quantum coherence, which measures the superposition of states, and the second-order correlation function, which provides insights into the statistical properties of the emitted photons. In our analysis, we assumed that the atom in the upper state and the field in the squeezed-pair coherent state. Our results reveal that the presence of the degenerate parameter amplifier significantly enhances the quantum coherence of the atomic states. Furthermore, we demonstrate that the atomic Fisher information, a crucial quantity for parameter estimation in quantum metrology, is substantially influenced by the amplifier’s parameters. The second-order correlation function, which characterizes the statistical properties of the emitted photons, exhibits notable modifications due to the atom-amplifier interaction. These findings provide new insights into the control and manipulation of quantum states in three-level atomic systems, with potential applications in quantum information processing and metrology.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 12","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145561712","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}