Centralized and distributed hybrid quantum–classical generalized Benders decomposition (GBD) algorithms are proposed to address unit commitment (UC) problems. In the centralized approach, the quantum GBD transforms the master problem (MP) into a quadratic unconstrained binary optimization form suitable for quantum computing. For distributed systems, the consensus-inspired quantum GBD (CIQGBD) and its partially distributed variant, D-CIQGBD, are proposed based on optimizing the allocation of relaxation variables directly. D-CIQGBD leverages the dual information of the improved sub-problems to construct more rational local cutting planes, which are then used to decompose the MP into local master problems (LMPs). This approach not only enhances the minimum eigenenergy gap of the system Hamiltonian during quantum annealing and improves the computational efficiency, but also reduces the qubit overhead and addresses the partitioning requirements. Extensive experiments under various UC scenarios validate the performance of the abovementioned hybrid algorithms. Compared to the classical solver Gurobi, D-CIQGBD demonstrates a speed advantage in solving the security-constrained UC problem on the IEEE RTS 24-bus system. These results provide new perspectives on leveraging quantum computing for the distributed optimization of power systems.
{"title":"Distributed quantum generalized benders decomposition for unit commitment problems","authors":"Fang Gao, Dejian Huang, Ziwei Zhao, Wei Dai, Mingyu Yang, Qing Gao, Yu Pan","doi":"10.1007/s11128-025-04977-2","DOIUrl":"10.1007/s11128-025-04977-2","url":null,"abstract":"<div><p>Centralized and distributed hybrid quantum–classical generalized Benders decomposition (GBD) algorithms are proposed to address unit commitment (UC) problems. In the centralized approach, the quantum GBD transforms the master problem (MP) into a quadratic unconstrained binary optimization form suitable for quantum computing. For distributed systems, the consensus-inspired quantum GBD (CIQGBD) and its partially distributed variant, D-CIQGBD, are proposed based on optimizing the allocation of relaxation variables directly. D-CIQGBD leverages the dual information of the improved sub-problems to construct more rational local cutting planes, which are then used to decompose the MP into local master problems (LMPs). This approach not only enhances the minimum eigenenergy gap of the system Hamiltonian during quantum annealing and improves the computational efficiency, but also reduces the qubit overhead and addresses the partitioning requirements. Extensive experiments under various UC scenarios validate the performance of the abovementioned hybrid algorithms. Compared to the classical solver Gurobi, D-CIQGBD demonstrates a speed advantage in solving the security-constrained UC problem on the IEEE RTS 24-bus system. These results provide new perspectives on leveraging quantum computing for the distributed optimization of power systems.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 12","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145547089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-20DOI: 10.1007/s11128-025-04958-5
E. G. El-Hadidy, N. Metwally, Abderrahim El Allati, K. El Anouz
In this work, we investigate the possibility of predicting the phenomena of the quantum Mpemba fractionally, where it is assumed that a single qubit, which is initially prepared in three different cases, hottest, hotter and colder states, interacting with its surroundings made up of two qubits via XYZ chain model in the presence of Dzyaloshinskii–Moriya interaction (DM). The trace distance between the equilibrium and time fractional evolution of the system is used to predict the Mpemba phenomena. The impact of the interaction parameters and the fractional orders on the stabilization behavior of the qubit is discussed. It is shown that thermalization case is reached at small fraction order during a short interaction time. However, as one increases the fractional orders, the thermalization is observed at large interaction time. For ferromagnetic case and large strength of DM interaction, the stabilization behavior is predicted at small interaction time, while for anti-ferromagnetic and small values of DM, the stabilization is reached at large interaction time.
{"title":"Quantum Mpemba prediction in three-qubit XYZ spin chains using low fractional orders","authors":"E. G. El-Hadidy, N. Metwally, Abderrahim El Allati, K. El Anouz","doi":"10.1007/s11128-025-04958-5","DOIUrl":"10.1007/s11128-025-04958-5","url":null,"abstract":"<div><p>In this work, we investigate the possibility of predicting the phenomena of the quantum Mpemba fractionally, where it is assumed that a single qubit, which is initially prepared in three different cases, hottest, hotter and colder states, interacting with its surroundings made up of two qubits via <i>XYZ</i> chain model in the presence of Dzyaloshinskii–Moriya interaction (<i>DM</i>). The trace distance between the equilibrium and time fractional evolution of the system is used to predict the Mpemba phenomena. The impact of the interaction parameters and the fractional orders on the stabilization behavior of the qubit is discussed. It is shown that thermalization case is reached at small fraction order during a short interaction time. However, as one increases the fractional orders, the thermalization is observed at large interaction time. For ferromagnetic case and large strength of <i>DM</i> interaction, the stabilization behavior is predicted at small interaction time, while for anti-ferromagnetic and small values of <i>DM</i>, the stabilization is reached at large interaction time.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 12","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-025-04958-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145547088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-19DOI: 10.1007/s11128-025-04996-z
Taisuke Hosaka, Etsuo Segawa
We propose a phenomenon of discrete-time quantum walks on graphs called the pulsation, which is a generalization of a phenomenon in the quantum searches. This phenomenon is discussed on a composite graph formed by two connected graphs (G_{1}) and (G_{2}). The pulsation means that the state periodically transfers between (G_{1}) and (G_{2}) with the initial state of the uniform superposition on (G_1). In this paper, we focus on the case for the Grover walk where (G_{1}) is the Johnson graph and (G_{2}) is a star graph. Also, the composite graph is constructed by identifying an arbitrary vertex of the Johnson graph with the internal vertex of the star graph. In that case, we find the pulsation with (O(sqrt{N^{1+1/k}})) periodicity, where N and k are the number of vertices and the diameter of the Johnson graph, respectively. The proof is based on Kato’s perturbation theory in finite-dimensional vector spaces.
{"title":"Pulsation of quantum walk on Johnson graph","authors":"Taisuke Hosaka, Etsuo Segawa","doi":"10.1007/s11128-025-04996-z","DOIUrl":"10.1007/s11128-025-04996-z","url":null,"abstract":"<div><p>We propose a phenomenon of discrete-time quantum walks on graphs called the pulsation, which is a generalization of a phenomenon in the quantum searches. This phenomenon is discussed on a composite graph formed by two connected graphs <span>(G_{1})</span> and <span>(G_{2})</span>. The pulsation means that the state periodically transfers between <span>(G_{1})</span> and <span>(G_{2})</span> with the initial state of the uniform superposition on <span>(G_1)</span>. In this paper, we focus on the case for the Grover walk where <span>(G_{1})</span> is the Johnson graph and <span>(G_{2})</span> is a star graph. Also, the composite graph is constructed by identifying an arbitrary vertex of the Johnson graph with the internal vertex of the star graph. In that case, we find the pulsation with <span>(O(sqrt{N^{1+1/k}}))</span> periodicity, where <i>N</i> and <i>k</i> are the number of vertices and the diameter of the Johnson graph, respectively. The proof is based on Kato’s perturbation theory in finite-dimensional vector spaces.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145561314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-19DOI: 10.1007/s11128-025-05000-4
Allan R. P. Moreira, Abdelmalek Bouzenada, Opeyemi S. Oyun, Faizuddin Ahmed
In this study, we are testing the Shannon entropy of the Dirac oscillator in the background of a spinning cosmic string space-time and showing the influence of the cosmic string on this information measurement. In this case, by employing the formalism of Shannon information density, we quantify the uncertainty and delocalization of the wave function. Particular emphasis is placed on the influence of space-time rotation and topological defects, which lead to shifts in the oscillator’s energy spectrum and affect its quantum information content. Also, our results show the relation between quantum information theory and curved space-time, giving more explanation into quantum phenomena in the presence of cosmic defect parameters.
{"title":"Testing Shannon entropic measurement of the Dirac oscillator under cosmic string geometry","authors":"Allan R. P. Moreira, Abdelmalek Bouzenada, Opeyemi S. Oyun, Faizuddin Ahmed","doi":"10.1007/s11128-025-05000-4","DOIUrl":"10.1007/s11128-025-05000-4","url":null,"abstract":"<div><p>In this study, we are testing the Shannon entropy of the Dirac oscillator in the background of a spinning cosmic string space-time and showing the influence of the cosmic string on this information measurement. In this case, by employing the formalism of Shannon information density, we quantify the uncertainty and delocalization of the wave function. Particular emphasis is placed on the influence of space-time rotation and topological defects, which lead to shifts in the oscillator’s energy spectrum and affect its quantum information content. Also, our results show the relation between quantum information theory and curved space-time, giving more explanation into quantum phenomena in the presence of cosmic defect parameters.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145561320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-19DOI: 10.1007/s11128-025-04993-2
Raj Alexandru Guţoiu, Andrei Tănăsescu, Pantelimon George Popescu
Many variations of Grover’s algorithm attempt to improve iteration count using a technique known as phase matching, replacing Grover’s phase-flip oracle with an (alpha )-rotation oracle that cannot be simulated using only one Grover oracle call. Previously it was shown that phase matching can always achieve 100% success probability with an iteration count within one step from the Grover algorithm. In this paper, we show that this is actually the optimal iteration count, hence finding the first proof of the minimal number of queries to solve the search problem with a known number of solutions whether we use an (alpha )-rotation or the Grover flip.
Grover算法的许多变体尝试使用一种称为相位匹配的技术来改进迭代计数,用(alpha ) -旋转的oracle代替Grover的相位翻转oracle,这种oracle不能仅使用一个Grover oracle调用来模拟。以前的研究表明,相位匹配总能达到100% success probability with an iteration count within one step from the Grover algorithm. In this paper, we show that this is actually the optimal iteration count, hence finding the first proof of the minimal number of queries to solve the search problem with a known number of solutions whether we use an (alpha )-rotation or the Grover flip.
{"title":"Optimal number of queries for phase-matching quantum search","authors":"Raj Alexandru Guţoiu, Andrei Tănăsescu, Pantelimon George Popescu","doi":"10.1007/s11128-025-04993-2","DOIUrl":"10.1007/s11128-025-04993-2","url":null,"abstract":"<div><p>Many variations of Grover’s algorithm attempt to improve iteration count using a technique known as phase matching, replacing Grover’s phase-flip oracle with an <span>(alpha )</span>-rotation oracle that cannot be simulated using only one Grover oracle call. Previously it was shown that phase matching can always achieve 100% success probability with an iteration count within one step from the Grover algorithm. In this paper, we show that this is actually the optimal iteration count, hence finding the first proof of the minimal number of queries to solve the search problem with a known number of solutions whether we use an <span>(alpha )</span>-rotation or the Grover flip.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145561312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-17DOI: 10.1007/s11128-025-04989-y
Hamid Reza Naeij
{"title":"Correction: Open quantum system approaches to superconducting qubits","authors":"Hamid Reza Naeij","doi":"10.1007/s11128-025-04989-y","DOIUrl":"10.1007/s11128-025-04989-y","url":null,"abstract":"","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-025-04989-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145561037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-17DOI: 10.1007/s11128-025-04980-7
Shyam R. Sihare
For quantum voice security, we offer an integrated functional system that (i) encapsulates threat models for voice biometrics within the quantum world, (ii) integrates PQC (Post-Quantum Cryptographic) foundations with quantum resilient detection, and (iii) provides prescriptive choices for parameters upon deployment with experimentally confirmed metrics. We model attacks as resource bounded CPTP (Completely Positive Trace Preserving) maps and Lindbladian flows, while we model voice recordings as hybrid quantum-classical objects within composite CV (Continuous Variable) and qubit Hilbert spaces. These three high-level categories of quantum threats are framed by such formalism: quantum generative spoofing (measured by TD (Trace Distance) of RQGAN (Relativistic Quantum Generative Adversarial Network)/QGAN (Quantum GAN) synthesis), quantum amplified adversarial perturbations (e.g., Groover accelerated search and entangled operator perturbations within Fock space), and retrospective cryptanalytic compromises (e.g., Shor enabled store now, decrypt later). To defend against such threats, we use a variety of lattice templates supported protection (RLWE (Ring Learning With Errors)/MLWE (Module LWE) with min-entropy and TTC (Time-To-Compromise) constraints met explicitly within choice of parameters), CV-QKD (CV–Quantum Key Distribution) if possible, randomized keyed encodings with gauge equivariant quantum QEC (Error Correcting Codes), and quantum resilient detection approaches (Wigner negativity witnesses, QCNN (Quantum Convolutional Neural Network) classifiers, and QFI (Quantum Fisher Information) detectability tests). Operational measures relating privacy leakage as well as detection sensitivity are the PDR (Purity Displacement Ratio), QSDI (Quantum Signal-to-Distortion Index), and QBFI (Quantum Biometric Fidelity Index). We also obtain security parameter and sample complexity bounds that translate immediately to code distance, encoder, and key size decisions. RLWE template secrecy with decryption failure probabilities experimental results on LibriSpeech, ASVspoof, and synth data confirm (<10^{-6}) under modeled attacks by noise as well as strong detection of quantum synthesised spoofs (deepfake detection (>96%), spoof suppression from 0.89 to 0.12 success) are achievable. Our technique provides insightful, empirical guideline direction toward voice authentication system development that is secure against existing as well as potential quantum threats (Note: abbreviations used over the course of study are tabulated in Appendix I).
{"title":"Decoherence and quantum threats in voice biometric authentication with post-quantum countermeasures","authors":"Shyam R. Sihare","doi":"10.1007/s11128-025-04980-7","DOIUrl":"10.1007/s11128-025-04980-7","url":null,"abstract":"<div><p>For <i>quantum voice security</i>, we offer an integrated functional system that (<i>i</i>) encapsulates threat models for voice biometrics within the quantum world, (<i>ii</i>) integrates PQC (Post-Quantum Cryptographic) foundations with quantum resilient detection, and (<i>iii</i>) provides prescriptive choices for parameters upon deployment with experimentally confirmed metrics. We model attacks as resource bounded CPTP (Completely Positive Trace Preserving) maps and Lindbladian flows, while we model voice recordings as hybrid quantum-classical objects within composite CV (Continuous Variable) and qubit Hilbert spaces. These three high-level categories of quantum threats are framed by such formalism: quantum generative spoofing (measured by TD (Trace Distance) of RQGAN (Relativistic Quantum Generative Adversarial Network)/QGAN (Quantum GAN) synthesis), quantum amplified adversarial perturbations (e.g., Groover accelerated search and entangled operator perturbations within Fock space), and retrospective cryptanalytic compromises (e.g., Shor enabled <span>store now, decrypt later</span>). To defend against such threats, we use a variety of lattice templates supported protection (RLWE (Ring Learning With Errors)/MLWE (Module LWE) with min-entropy and TTC (Time-To-Compromise) constraints met explicitly within choice of parameters), CV-QKD (CV–Quantum Key Distribution) if possible, randomized keyed encodings with gauge equivariant quantum QEC (Error Correcting Codes), and quantum resilient detection approaches (Wigner negativity witnesses, QCNN (Quantum Convolutional Neural Network) classifiers, and QFI (Quantum Fisher Information) detectability tests). Operational measures relating privacy leakage as well as detection sensitivity are the PDR (Purity Displacement Ratio), QSDI (Quantum Signal-to-Distortion Index), and QBFI (Quantum Biometric Fidelity Index). We also obtain security parameter and sample complexity bounds that translate immediately to code distance, encoder, and key size decisions. RLWE template secrecy with decryption failure probabilities experimental results on LibriSpeech, ASVspoof, and synth data confirm <span>(<10^{-6})</span> under modeled attacks by noise as well as strong detection of quantum synthesised spoofs (deepfake detection <span>(>96%)</span>, spoof suppression from 0.89 to 0.12 success) are achievable. Our technique provides insightful, empirical guideline direction toward voice authentication system development that is secure against existing as well as potential quantum threats (<i>Note:</i> abbreviations used over the course of study are tabulated in Appendix I).</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145561036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-14DOI: 10.1007/s11128-025-04991-4
Mehmet Hüseyin Temel, Boris Škorić
We introduce the first quantum authentication scheme for continuous-variable (CV) states. Our scheme is based on trap states, and is an adaptation of a discrete-variable scheme by Broadbent et al. [15], but with more freedom in choosing the number of traps.The CV traps are squeezed states.As the CV variant of quantum one-time pad (QOTP) encryption we introduce gaussian-distributed displacements.We provide a security proof, mostly following the approach of Broadbent and Wainewright [13]. We take into account the inevitable imperfections due to the finite squeezing and the finite width of the gaussian QOTP distribution.As a necessary ingredient for the proof we derive the CV analogue of the Pauli Twirl. Since CV quantum systems fit well with existing optical communication infrastructure, they provide a promising platform for implementing quantum-cryptographic schemes and distributed quantum-computational tasks. This work expands the toolbox for securing CV quantum communication.
{"title":"Authentication of continuous-variable quantum messages","authors":"Mehmet Hüseyin Temel, Boris Škorić","doi":"10.1007/s11128-025-04991-4","DOIUrl":"10.1007/s11128-025-04991-4","url":null,"abstract":"<div><p>We introduce the first quantum authentication scheme for continuous-variable (CV) states. Our scheme is based on trap states, and is an adaptation of a discrete-variable scheme by Broadbent et al. [15], but with more freedom in choosing the number of traps.The CV traps are squeezed states.As the CV variant of quantum one-time pad (QOTP) encryption we introduce gaussian-distributed displacements.We provide a security proof, mostly following the approach of Broadbent and Wainewright [13]. We take into account the inevitable imperfections due to the finite squeezing and the finite width of the gaussian QOTP distribution.As a necessary ingredient for the proof we derive the CV analogue of the Pauli Twirl. Since CV quantum systems fit well with existing optical communication infrastructure, they provide a promising platform for implementing quantum-cryptographic schemes and distributed quantum-computational tasks. This work expands the toolbox for securing CV quantum communication.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-025-04991-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145510956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we propose a counterfactual quantum communication protocol based on the chained quantum Zeno effect, which transfers the photonic part of constructed multipartite entangled states through a pair of entangled electrons. Subsequently, we report on a two-dimensional all-photonic quantum repeater protocol designed to generate multipartite entanglement over long distances between two network users. Finally, we present a counterfactual quantum network that enables two distant parties to communicate multiple messages without any transmission of quantum or classical particles.
{"title":"Counterfactual quantum networks based on multipartite GHZ entangled communication","authors":"Jia Hao, Yu-Guang Yang, Yue-Chao Wang, Guang-Bao Xu, Dong-Huan Jiang, Yi-Hua Zhou, Wei-Min Shi","doi":"10.1007/s11128-025-04988-z","DOIUrl":"10.1007/s11128-025-04988-z","url":null,"abstract":"<div><p>In this paper, we propose a counterfactual quantum communication protocol based on the chained quantum Zeno effect, which transfers the photonic part of constructed multipartite entangled states through a pair of entangled electrons. Subsequently, we report on a two-dimensional all-photonic quantum repeater protocol designed to generate multipartite entanglement over long distances between two network users. Finally, we present a counterfactual quantum network that enables two distant parties to communicate multiple messages without any transmission of quantum or classical particles.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145510428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-12DOI: 10.1007/s11128-025-04969-2
Xuanbing Li, Shuai Li, Jian Li, Li Miao
Quantum key distribution (QKD) enables unconditional secure communication, but its security is fundamentally limited by reliance on classical identity authentication, which introduces vulnerabilities. This work proposes a quantum-fused authentication and QKD protocol incorporating identity verification entirely within the quantum layer. Specifically, we design a bidirectional identity-authenticated QKD protocol using single-photon sequences and unitary transformations, and further generalize it to the multiparty setting by introducing locally indistinguishable orthogonal product states as the encoding platform—a design exemplified with a detailed three-party case. Theoretical analysis and simulation results demonstrate that the protocol achieves reliable quantum authentication, efficient key distribution, and prevents information leakage, fundamentally removing risks associated with classical authentication. Our findings offer a practical and novel framework for strengthening the security of quantum communication systems.
{"title":"An entanglement-free authenticated quantum key distribution protocol","authors":"Xuanbing Li, Shuai Li, Jian Li, Li Miao","doi":"10.1007/s11128-025-04969-2","DOIUrl":"10.1007/s11128-025-04969-2","url":null,"abstract":"<div><p>Quantum key distribution (QKD) enables unconditional secure communication, but its security is fundamentally limited by reliance on classical identity authentication, which introduces vulnerabilities. This work proposes a quantum-fused authentication and QKD protocol incorporating identity verification entirely within the quantum layer. Specifically, we design a bidirectional identity-authenticated QKD protocol using single-photon sequences and unitary transformations, and further generalize it to the multiparty setting by introducing locally indistinguishable orthogonal product states as the encoding platform—a design exemplified with a detailed three-party case. Theoretical analysis and simulation results demonstrate that the protocol achieves reliable quantum authentication, efficient key distribution, and prevents information leakage, fundamentally removing risks associated with classical authentication. Our findings offer a practical and novel framework for strengthening the security of quantum communication systems.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145510332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}