首页 > 最新文献

Quantum Information Processing最新文献

英文 中文
Distributed quantum generalized benders decomposition for unit commitment problems 单位承诺问题的分布式量子广义弯曲分解
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-11-20 DOI: 10.1007/s11128-025-04977-2
Fang Gao, Dejian Huang, Ziwei Zhao, Wei Dai, Mingyu Yang, Qing Gao, Yu Pan

Centralized and distributed hybrid quantum–classical generalized Benders decomposition (GBD) algorithms are proposed to address unit commitment (UC) problems. In the centralized approach, the quantum GBD transforms the master problem (MP) into a quadratic unconstrained binary optimization form suitable for quantum computing. For distributed systems, the consensus-inspired quantum GBD (CIQGBD) and its partially distributed variant, D-CIQGBD, are proposed based on optimizing the allocation of relaxation variables directly. D-CIQGBD leverages the dual information of the improved sub-problems to construct more rational local cutting planes, which are then used to decompose the MP into local master problems (LMPs). This approach not only enhances the minimum eigenenergy gap of the system Hamiltonian during quantum annealing and improves the computational efficiency, but also reduces the qubit overhead and addresses the partitioning requirements. Extensive experiments under various UC scenarios validate the performance of the abovementioned hybrid algorithms. Compared to the classical solver Gurobi, D-CIQGBD demonstrates a speed advantage in solving the security-constrained UC problem on the IEEE RTS 24-bus system. These results provide new perspectives on leveraging quantum computing for the distributed optimization of power systems.

针对单元承诺问题,提出了集中式和分布式混合量子经典广义Benders分解(GBD)算法。在集中方法中,量子GBD将主问题(MP)转化为适合量子计算的二次型无约束二进制优化形式。对于分布式系统,提出了基于松弛变量直接优化分配的共识启发量子GBD (CIQGBD)及其部分分布变体D-CIQGBD。D-CIQGBD利用改进子问题的对偶信息构造更合理的局部切割平面,然后将MP分解为局部主问题(lmp)。该方法不仅增强了量子退火过程中系统哈密顿量的最小特征能隙,提高了计算效率,而且减少了量子比特开销,解决了划分要求。各种UC场景下的大量实验验证了上述混合算法的性能。与经典求解器Gurobi相比,D-CIQGBD在解决IEEE RTS 24总线系统上的安全约束UC问题方面具有速度优势。这些结果为利用量子计算进行电力系统的分布式优化提供了新的视角。
{"title":"Distributed quantum generalized benders decomposition for unit commitment problems","authors":"Fang Gao,&nbsp;Dejian Huang,&nbsp;Ziwei Zhao,&nbsp;Wei Dai,&nbsp;Mingyu Yang,&nbsp;Qing Gao,&nbsp;Yu Pan","doi":"10.1007/s11128-025-04977-2","DOIUrl":"10.1007/s11128-025-04977-2","url":null,"abstract":"<div><p>Centralized and distributed hybrid quantum–classical generalized Benders decomposition (GBD) algorithms are proposed to address unit commitment (UC) problems. In the centralized approach, the quantum GBD transforms the master problem (MP) into a quadratic unconstrained binary optimization form suitable for quantum computing. For distributed systems, the consensus-inspired quantum GBD (CIQGBD) and its partially distributed variant, D-CIQGBD, are proposed based on optimizing the allocation of relaxation variables directly. D-CIQGBD leverages the dual information of the improved sub-problems to construct more rational local cutting planes, which are then used to decompose the MP into local master problems (LMPs). This approach not only enhances the minimum eigenenergy gap of the system Hamiltonian during quantum annealing and improves the computational efficiency, but also reduces the qubit overhead and addresses the partitioning requirements. Extensive experiments under various UC scenarios validate the performance of the abovementioned hybrid algorithms. Compared to the classical solver Gurobi, D-CIQGBD demonstrates a speed advantage in solving the security-constrained UC problem on the IEEE RTS 24-bus system. These results provide new perspectives on leveraging quantum computing for the distributed optimization of power systems.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 12","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145547089","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Quantum Mpemba prediction in three-qubit XYZ spin chains using low fractional orders 使用低分数阶的三量子位XYZ自旋链中的量子Mpemba预测
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-11-20 DOI: 10.1007/s11128-025-04958-5
E. G. El-Hadidy, N. Metwally, Abderrahim El Allati, K. El Anouz

In this work, we investigate the possibility of predicting the phenomena of the quantum Mpemba fractionally, where it is assumed that a single qubit, which is initially prepared in three different cases, hottest, hotter and colder states, interacting with its surroundings made up of two qubits via XYZ chain model in the presence of Dzyaloshinskii–Moriya interaction (DM). The trace distance between the equilibrium and time fractional evolution of the system is used to predict the Mpemba phenomena. The impact of the interaction parameters and the fractional orders on the stabilization behavior of the qubit is discussed. It is shown that thermalization case is reached at small fraction order during a short interaction time. However, as one increases the fractional orders, the thermalization is observed at large interaction time. For ferromagnetic case and large strength of DM interaction, the stabilization behavior is predicted at small interaction time, while for anti-ferromagnetic and small values of DM, the stabilization is reached at large interaction time.

在这项工作中,我们研究了部分预测量子Mpemba现象的可能性,其中假设在Dzyaloshinskii-Moriya相互作用(DM)存在的情况下,单个量子位最初在三种不同的情况下制备,即最热,较热和较冷状态,通过XYZ链模型与由两个量子位组成的环境相互作用。利用系统平衡态与时间分数演化之间的迹距来预测Mpemba现象。讨论了相互作用参数和分数阶对量子比特稳定行为的影响。结果表明,在较短的相互作用时间内,可以在小分数阶上达到热化情况。然而,随着分数阶的增加,在大的相互作用时间内观察到热化。对于铁磁性和DM相互作用强度大的情况,预测了在小相互作用时间下的稳定行为,而对于反铁磁性和DM值小的情况,预测了在大相互作用时间下的稳定行为。
{"title":"Quantum Mpemba prediction in three-qubit XYZ spin chains using low fractional orders","authors":"E. G. El-Hadidy,&nbsp;N. Metwally,&nbsp;Abderrahim El Allati,&nbsp;K. El Anouz","doi":"10.1007/s11128-025-04958-5","DOIUrl":"10.1007/s11128-025-04958-5","url":null,"abstract":"<div><p>In this work, we investigate the possibility of predicting the phenomena of the quantum Mpemba fractionally, where it is assumed that a single qubit, which is initially prepared in three different cases, hottest, hotter and colder states, interacting with its surroundings made up of two qubits via <i>XYZ</i> chain model in the presence of Dzyaloshinskii–Moriya interaction (<i>DM</i>). The trace distance between the equilibrium and time fractional evolution of the system is used to predict the Mpemba phenomena. The impact of the interaction parameters and the fractional orders on the stabilization behavior of the qubit is discussed. It is shown that thermalization case is reached at small fraction order during a short interaction time. However, as one increases the fractional orders, the thermalization is observed at large interaction time. For ferromagnetic case and large strength of <i>DM</i> interaction, the stabilization behavior is predicted at small interaction time, while for anti-ferromagnetic and small values of <i>DM</i>, the stabilization is reached at large interaction time.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 12","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-025-04958-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145547088","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Pulsation of quantum walk on Johnson graph Johnson图上量子行走的脉动
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-11-19 DOI: 10.1007/s11128-025-04996-z
Taisuke Hosaka, Etsuo Segawa

We propose a phenomenon of discrete-time quantum walks on graphs called the pulsation, which is a generalization of a phenomenon in the quantum searches. This phenomenon is discussed on a composite graph formed by two connected graphs (G_{1}) and (G_{2}). The pulsation means that the state periodically transfers between (G_{1}) and (G_{2}) with the initial state of the uniform superposition on (G_1). In this paper, we focus on the case for the Grover walk where (G_{1}) is the Johnson graph and (G_{2}) is a star graph. Also, the composite graph is constructed by identifying an arbitrary vertex of the Johnson graph with the internal vertex of the star graph. In that case, we find the pulsation with (O(sqrt{N^{1+1/k}})) periodicity, where N and k are the number of vertices and the diameter of the Johnson graph, respectively. The proof is based on Kato’s perturbation theory in finite-dimensional vector spaces.

我们提出了一种离散时间量子行走在图上的现象,称为脉动,这是量子搜索现象的推广。在两个连通图(G_{1})和(G_{2})构成的复合图上讨论了这一现象。脉动意味着状态周期性地在(G_{1})和(G_{2})之间转移,初始状态均匀叠加在(G_1)上。在本文中,我们关注格罗弗行走的情况,其中(G_{1})是约翰逊图,(G_{2})是星图。利用星图的内部顶点识别约翰逊图的任意顶点,构造复合图。在这种情况下,我们发现脉动具有(O(sqrt{N^{1+1/k}}))周期性,其中N和k分别是Johnson图的顶点数和直径。这个证明是基于有限维向量空间中的加藤摄动理论。
{"title":"Pulsation of quantum walk on Johnson graph","authors":"Taisuke Hosaka,&nbsp;Etsuo Segawa","doi":"10.1007/s11128-025-04996-z","DOIUrl":"10.1007/s11128-025-04996-z","url":null,"abstract":"<div><p>We propose a phenomenon of discrete-time quantum walks on graphs called the pulsation, which is a generalization of a phenomenon in the quantum searches. This phenomenon is discussed on a composite graph formed by two connected graphs <span>(G_{1})</span> and <span>(G_{2})</span>. The pulsation means that the state periodically transfers between <span>(G_{1})</span> and <span>(G_{2})</span> with the initial state of the uniform superposition on <span>(G_1)</span>. In this paper, we focus on the case for the Grover walk where <span>(G_{1})</span> is the Johnson graph and <span>(G_{2})</span> is a star graph. Also, the composite graph is constructed by identifying an arbitrary vertex of the Johnson graph with the internal vertex of the star graph. In that case, we find the pulsation with <span>(O(sqrt{N^{1+1/k}}))</span> periodicity, where <i>N</i> and <i>k</i> are the number of vertices and the diameter of the Johnson graph, respectively. The proof is based on Kato’s perturbation theory in finite-dimensional vector spaces.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145561314","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Testing Shannon entropic measurement of the Dirac oscillator under cosmic string geometry 在宇宙弦几何下测试狄拉克振子的香农熵测量
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-11-19 DOI: 10.1007/s11128-025-05000-4
Allan R. P. Moreira, Abdelmalek Bouzenada, Opeyemi S. Oyun, Faizuddin Ahmed

In this study, we are testing the Shannon entropy of the Dirac oscillator in the background of a spinning cosmic string space-time and showing the influence of the cosmic string on this information measurement. In this case, by employing the formalism of Shannon information density, we quantify the uncertainty and delocalization of the wave function. Particular emphasis is placed on the influence of space-time rotation and topological defects, which lead to shifts in the oscillator’s energy spectrum and affect its quantum information content. Also, our results show the relation between quantum information theory and curved space-time, giving more explanation into quantum phenomena in the presence of cosmic defect parameters.

在本研究中,我们测试了自旋宇宙弦时空背景下狄拉克振子的香农熵,并展示了宇宙弦对该信息测量的影响。在这种情况下,我们采用香农信息密度的形式,量化了波函数的不确定性和离域。特别强调了时空旋转和拓扑缺陷的影响,它们会导致振荡器的能谱偏移并影响其量子信息含量。此外,我们的研究结果还揭示了量子信息理论与弯曲时空之间的关系,为宇宙缺陷参数存在下的量子现象提供了更多的解释。
{"title":"Testing Shannon entropic measurement of the Dirac oscillator under cosmic string geometry","authors":"Allan R. P. Moreira,&nbsp;Abdelmalek Bouzenada,&nbsp;Opeyemi S. Oyun,&nbsp;Faizuddin Ahmed","doi":"10.1007/s11128-025-05000-4","DOIUrl":"10.1007/s11128-025-05000-4","url":null,"abstract":"<div><p>In this study, we are testing the Shannon entropy of the Dirac oscillator in the background of a spinning cosmic string space-time and showing the influence of the cosmic string on this information measurement. In this case, by employing the formalism of Shannon information density, we quantify the uncertainty and delocalization of the wave function. Particular emphasis is placed on the influence of space-time rotation and topological defects, which lead to shifts in the oscillator’s energy spectrum and affect its quantum information content. Also, our results show the relation between quantum information theory and curved space-time, giving more explanation into quantum phenomena in the presence of cosmic defect parameters.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145561320","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Optimal number of queries for phase-matching quantum search 相位匹配量子搜索的最优查询数
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-11-19 DOI: 10.1007/s11128-025-04993-2
Raj Alexandru Guţoiu, Andrei Tănăsescu, Pantelimon George Popescu

Many variations of Grover’s algorithm attempt to improve iteration count using a technique known as phase matching, replacing Grover’s phase-flip oracle with an (alpha )-rotation oracle that cannot be simulated using only one Grover oracle call. Previously it was shown that phase matching can always achieve 100% success probability with an iteration count within one step from the Grover algorithm. In this paper, we show that this is actually the optimal iteration count, hence finding the first proof of the minimal number of queries to solve the search problem with a known number of solutions whether we use an (alpha )-rotation or the Grover flip.

Grover算法的许多变体尝试使用一种称为相位匹配的技术来改进迭代计数,用(alpha ) -旋转的oracle代替Grover的相位翻转oracle,这种oracle不能仅使用一个Grover oracle调用来模拟。以前的研究表明,相位匹配总能达到100% success probability with an iteration count within one step from the Grover algorithm. In this paper, we show that this is actually the optimal iteration count, hence finding the first proof of the minimal number of queries to solve the search problem with a known number of solutions whether we use an (alpha )-rotation or the Grover flip.
{"title":"Optimal number of queries for phase-matching quantum search","authors":"Raj Alexandru Guţoiu,&nbsp;Andrei Tănăsescu,&nbsp;Pantelimon George Popescu","doi":"10.1007/s11128-025-04993-2","DOIUrl":"10.1007/s11128-025-04993-2","url":null,"abstract":"<div><p>Many variations of Grover’s algorithm attempt to improve iteration count using a technique known as phase matching, replacing Grover’s phase-flip oracle with an <span>(alpha )</span>-rotation oracle that cannot be simulated using only one Grover oracle call. Previously it was shown that phase matching can always achieve 100% success probability with an iteration count within one step from the Grover algorithm. In this paper, we show that this is actually the optimal iteration count, hence finding the first proof of the minimal number of queries to solve the search problem with a known number of solutions whether we use an <span>(alpha )</span>-rotation or the Grover flip.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145561312","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Correction: Open quantum system approaches to superconducting qubits 更正:开放量子系统的超导量子比特方法
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-11-17 DOI: 10.1007/s11128-025-04989-y
Hamid Reza Naeij
{"title":"Correction: Open quantum system approaches to superconducting qubits","authors":"Hamid Reza Naeij","doi":"10.1007/s11128-025-04989-y","DOIUrl":"10.1007/s11128-025-04989-y","url":null,"abstract":"","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-025-04989-y.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145561037","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Decoherence and quantum threats in voice biometric authentication with post-quantum countermeasures 后量子对抗语音生物识别认证中的退相干和量子威胁
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-11-17 DOI: 10.1007/s11128-025-04980-7
Shyam R. Sihare

For quantum voice security, we offer an integrated functional system that (i) encapsulates threat models for voice biometrics within the quantum world, (ii) integrates PQC (Post-Quantum Cryptographic) foundations with quantum resilient detection, and (iii) provides prescriptive choices for parameters upon deployment with experimentally confirmed metrics. We model attacks as resource bounded CPTP (Completely Positive Trace Preserving) maps and Lindbladian flows, while we model voice recordings as hybrid quantum-classical objects within composite CV (Continuous Variable) and qubit Hilbert spaces. These three high-level categories of quantum threats are framed by such formalism: quantum generative spoofing (measured by TD (Trace Distance) of RQGAN (Relativistic Quantum Generative Adversarial Network)/QGAN (Quantum GAN) synthesis), quantum amplified adversarial perturbations (e.g., Groover accelerated search and entangled operator perturbations within Fock space), and retrospective cryptanalytic compromises (e.g., Shor enabled store now, decrypt later). To defend against such threats, we use a variety of lattice templates supported protection (RLWE (Ring Learning With Errors)/MLWE (Module LWE) with min-entropy and TTC (Time-To-Compromise) constraints met explicitly within choice of parameters), CV-QKD (CV–Quantum Key Distribution) if possible, randomized keyed encodings with gauge equivariant quantum QEC (Error Correcting Codes), and quantum resilient detection approaches (Wigner negativity witnesses, QCNN (Quantum Convolutional Neural Network) classifiers, and QFI (Quantum Fisher Information) detectability tests). Operational measures relating privacy leakage as well as detection sensitivity are the PDR (Purity Displacement Ratio), QSDI (Quantum Signal-to-Distortion Index), and QBFI (Quantum Biometric Fidelity Index). We also obtain security parameter and sample complexity bounds that translate immediately to code distance, encoder, and key size decisions. RLWE template secrecy with decryption failure probabilities experimental results on LibriSpeech, ASVspoof, and synth data confirm (<10^{-6}) under modeled attacks by noise as well as strong detection of quantum synthesised spoofs (deepfake detection (>96%), spoof suppression from 0.89 to 0.12 success) are achievable. Our technique provides insightful, empirical guideline direction toward voice authentication system development that is secure against existing as well as potential quantum threats (Note: abbreviations used over the course of study are tabulated in Appendix I).

对于量子语音安全,我们提供了一个集成的功能系统,该系统(i)封装了量子世界中语音生物识别的威胁模型,(ii)将PQC(后量子加密)基础与量子弹性检测集成在一起,以及(iii)在使用实验确认的指标部署时提供参数的规定性选择。我们将攻击建模为资源有界的CPTP(完全正迹保留)映射和Lindbladian流,而将录音建模为复合CV(连续变量)和量子比特希尔伯特空间中的混合量子经典对象。这三个高级类别的量子威胁是由这样的形式构成的:量子生成欺骗(通过RQGAN(相对论量子生成对抗网络)/QGAN(量子GAN)合成的TD(跟踪距离)测量),量子放大的对抗扰动(例如,Groover加速搜索和Fock空间内的纠缠算子扰动),以及回顾性密码分析漏洞(例如,Shor支持现在存储,稍后解密)。为了防御这些威胁,我们使用了各种晶格模板支持的保护(RLWE(带错误的环学习)/MLWE(模块LWE),具有最小熵和TTC(妥协时间)约束,如果可能的话,CV-QKD (cv -量子密钥分发),随机密钥编码与规范等变量子QEC(纠错码),以及量子弹性检测方法(Wigner负性证人,QCNN(量子卷积神经网络)分类器和QFI(量子费雪信息)可检测性测试)。与隐私泄露和检测灵敏度相关的操作措施是PDR(纯度置换比)、QSDI(量子信号失真指数)和QBFI(量子生物识别保真度指数)。我们还获得了安全参数和样本复杂性边界,这些边界可以立即转化为代码距离、编码器和密钥大小的决定。在librisspeech, ASVspoof和synth数据上进行的解密失败概率的RLWE模板保密实验结果证实了(<10^{-6})在噪声建模攻击下以及量子合成欺骗的强检测(deepfake检测(>96%),欺骗抑制从0.89到0.12成功)是可以实现的。我们的技术为语音认证系统开发提供了有见地的、经验的指导方向,该系统可以安全应对现有的和潜在的量子威胁(注意:在研究过程中使用的缩写列在附录I中)。
{"title":"Decoherence and quantum threats in voice biometric authentication with post-quantum countermeasures","authors":"Shyam R. Sihare","doi":"10.1007/s11128-025-04980-7","DOIUrl":"10.1007/s11128-025-04980-7","url":null,"abstract":"<div><p>For <i>quantum voice security</i>, we offer an integrated functional system that (<i>i</i>) encapsulates threat models for voice biometrics within the quantum world, (<i>ii</i>) integrates PQC (Post-Quantum Cryptographic) foundations with quantum resilient detection, and (<i>iii</i>) provides prescriptive choices for parameters upon deployment with experimentally confirmed metrics. We model attacks as resource bounded CPTP (Completely Positive Trace Preserving) maps and Lindbladian flows, while we model voice recordings as hybrid quantum-classical objects within composite CV (Continuous Variable) and qubit Hilbert spaces. These three high-level categories of quantum threats are framed by such formalism: quantum generative spoofing (measured by TD (Trace Distance) of RQGAN (Relativistic Quantum Generative Adversarial Network)/QGAN (Quantum GAN) synthesis), quantum amplified adversarial perturbations (e.g., Groover accelerated search and entangled operator perturbations within Fock space), and retrospective cryptanalytic compromises (e.g., Shor enabled <span>store now, decrypt later</span>). To defend against such threats, we use a variety of lattice templates supported protection (RLWE (Ring Learning With Errors)/MLWE (Module LWE) with min-entropy and TTC (Time-To-Compromise) constraints met explicitly within choice of parameters), CV-QKD (CV–Quantum Key Distribution) if possible, randomized keyed encodings with gauge equivariant quantum QEC (Error Correcting Codes), and quantum resilient detection approaches (Wigner negativity witnesses, QCNN (Quantum Convolutional Neural Network) classifiers, and QFI (Quantum Fisher Information) detectability tests). Operational measures relating privacy leakage as well as detection sensitivity are the PDR (Purity Displacement Ratio), QSDI (Quantum Signal-to-Distortion Index), and QBFI (Quantum Biometric Fidelity Index). We also obtain security parameter and sample complexity bounds that translate immediately to code distance, encoder, and key size decisions. RLWE template secrecy with decryption failure probabilities experimental results on LibriSpeech, ASVspoof, and synth data confirm <span>(&lt;10^{-6})</span> under modeled attacks by noise as well as strong detection of quantum synthesised spoofs (deepfake detection <span>(&gt;96%)</span>, spoof suppression from 0.89 to 0.12 success) are achievable. Our technique provides insightful, empirical guideline direction toward voice authentication system development that is secure against existing as well as potential quantum threats (<i>Note:</i> abbreviations used over the course of study are tabulated in Appendix I).</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145561036","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Authentication of continuous-variable quantum messages 连续变量量子信息的认证
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-11-14 DOI: 10.1007/s11128-025-04991-4
Mehmet Hüseyin Temel, Boris Škorić

We introduce the first quantum authentication scheme for continuous-variable (CV) states. Our scheme is based on trap states, and is an adaptation of a discrete-variable scheme by Broadbent et al. [15], but with more freedom in choosing the number of traps.The CV traps are squeezed states.As the CV variant of quantum one-time pad (QOTP) encryption we introduce gaussian-distributed displacements.We provide a security proof, mostly following the approach of Broadbent and Wainewright [13]. We take into account the inevitable imperfections due to the finite squeezing and the finite width of the gaussian QOTP distribution.As a necessary ingredient for the proof we derive the CV analogue of the Pauli Twirl. Since CV quantum systems fit well with existing optical communication infrastructure, they provide a promising platform for implementing quantum-cryptographic schemes and distributed quantum-computational tasks. This work expands the toolbox for securing CV quantum communication.

介绍了连续变量(CV)状态的第一个量子认证方案。我们的方案基于陷阱状态,是对Broadbent等人的离散变量方案的改编,但在选择陷阱数量方面更自由。CV阱是压缩态。作为量子一次性密码(QOTP)加密的CV变体,我们引入了高斯分布位移。我们提供了一个安全证明,主要遵循Broadbent和Wainewright[13]的方法。我们考虑到由于高斯QOTP分布的有限挤压和有限宽度而不可避免的缺陷。作为证明的必要成分,我们导出了泡利旋转的CV模拟。由于CV量子系统非常适合现有的光通信基础设施,因此它们为实现量子加密方案和分布式量子计算任务提供了一个有前途的平台。这项工作扩展了保护CV量子通信的工具箱。
{"title":"Authentication of continuous-variable quantum messages","authors":"Mehmet Hüseyin Temel,&nbsp;Boris Škorić","doi":"10.1007/s11128-025-04991-4","DOIUrl":"10.1007/s11128-025-04991-4","url":null,"abstract":"<div><p>We introduce the first quantum authentication scheme for continuous-variable (CV) states. Our scheme is based on trap states, and is an adaptation of a discrete-variable scheme by Broadbent et al. [15], but with more freedom in choosing the number of traps.The CV traps are squeezed states.As the CV variant of quantum one-time pad (QOTP) encryption we introduce gaussian-distributed displacements.We provide a security proof, mostly following the approach of Broadbent and Wainewright [13]. We take into account the inevitable imperfections due to the finite squeezing and the finite width of the gaussian QOTP distribution.As a necessary ingredient for the proof we derive the CV analogue of the Pauli Twirl. Since CV quantum systems fit well with existing optical communication infrastructure, they provide a promising platform for implementing quantum-cryptographic schemes and distributed quantum-computational tasks. This work expands the toolbox for securing CV quantum communication.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-025-04991-4.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145510956","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Counterfactual quantum networks based on multipartite GHZ entangled communication 基于多GHZ纠缠通信的反事实量子网络
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-11-13 DOI: 10.1007/s11128-025-04988-z
Jia Hao, Yu-Guang Yang, Yue-Chao Wang, Guang-Bao Xu, Dong-Huan Jiang, Yi-Hua Zhou, Wei-Min Shi

In this paper, we propose a counterfactual quantum communication protocol based on the chained quantum Zeno effect, which transfers the photonic part of constructed multipartite entangled states through a pair of entangled electrons. Subsequently, we report on a two-dimensional all-photonic quantum repeater protocol designed to generate multipartite entanglement over long distances between two network users. Finally, we present a counterfactual quantum network that enables two distant parties to communicate multiple messages without any transmission of quantum or classical particles.

本文提出了一种基于链量子芝诺效应的反事实量子通信协议,该协议通过一对纠缠电子传输构建的多部纠缠态的光子部分。随后,我们报告了一种二维全光子量子中继器协议,该协议旨在在两个网络用户之间产生长距离的多方纠缠。最后,我们提出了一个反事实量子网络,使两个遥远的当事方能够在没有任何量子或经典粒子传输的情况下通信多个信息。
{"title":"Counterfactual quantum networks based on multipartite GHZ entangled communication","authors":"Jia Hao,&nbsp;Yu-Guang Yang,&nbsp;Yue-Chao Wang,&nbsp;Guang-Bao Xu,&nbsp;Dong-Huan Jiang,&nbsp;Yi-Hua Zhou,&nbsp;Wei-Min Shi","doi":"10.1007/s11128-025-04988-z","DOIUrl":"10.1007/s11128-025-04988-z","url":null,"abstract":"<div><p>In this paper, we propose a counterfactual quantum communication protocol based on the chained quantum Zeno effect, which transfers the photonic part of constructed multipartite entangled states through a pair of entangled electrons. Subsequently, we report on a two-dimensional all-photonic quantum repeater protocol designed to generate multipartite entanglement over long distances between two network users. Finally, we present a counterfactual quantum network that enables two distant parties to communicate multiple messages without any transmission of quantum or classical particles.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145510428","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
An entanglement-free authenticated quantum key distribution protocol 一种无纠缠的认证量子密钥分发协议
IF 2.2 3区 物理与天体物理 Q1 PHYSICS, MATHEMATICAL Pub Date : 2025-11-12 DOI: 10.1007/s11128-025-04969-2
Xuanbing Li, Shuai Li, Jian Li, Li Miao

Quantum key distribution (QKD) enables unconditional secure communication, but its security is fundamentally limited by reliance on classical identity authentication, which introduces vulnerabilities. This work proposes a quantum-fused authentication and QKD protocol incorporating identity verification entirely within the quantum layer. Specifically, we design a bidirectional identity-authenticated QKD protocol using single-photon sequences and unitary transformations, and further generalize it to the multiparty setting by introducing locally indistinguishable orthogonal product states as the encoding platform—a design exemplified with a detailed three-party case. Theoretical analysis and simulation results demonstrate that the protocol achieves reliable quantum authentication, efficient key distribution, and prevents information leakage, fundamentally removing risks associated with classical authentication. Our findings offer a practical and novel framework for strengthening the security of quantum communication systems.

量子密钥分发(QKD)实现了无条件的安全通信,但其安全性从根本上受到依赖经典身份认证的限制,从而引入了漏洞。这项工作提出了一种量子融合身份验证和QKD协议,该协议完全在量子层内进行身份验证。具体来说,我们利用单光子序列和酉变换设计了一个双向身份认证的QKD协议,并通过引入局部不可区分的正交积状态作为编码平台,进一步将其推广到多方环境中,并以一个详细的三方案例为例进行了设计。理论分析和仿真结果表明,该协议实现了可靠的量子认证、高效的密钥分发和防止信息泄露,从根本上消除了经典认证相关的风险。我们的发现为加强量子通信系统的安全性提供了一个实用和新颖的框架。
{"title":"An entanglement-free authenticated quantum key distribution protocol","authors":"Xuanbing Li,&nbsp;Shuai Li,&nbsp;Jian Li,&nbsp;Li Miao","doi":"10.1007/s11128-025-04969-2","DOIUrl":"10.1007/s11128-025-04969-2","url":null,"abstract":"<div><p>Quantum key distribution (QKD) enables unconditional secure communication, but its security is fundamentally limited by reliance on classical identity authentication, which introduces vulnerabilities. This work proposes a quantum-fused authentication and QKD protocol incorporating identity verification entirely within the quantum layer. Specifically, we design a bidirectional identity-authenticated QKD protocol using single-photon sequences and unitary transformations, and further generalize it to the multiparty setting by introducing locally indistinguishable orthogonal product states as the encoding platform—a design exemplified with a detailed three-party case. Theoretical analysis and simulation results demonstrate that the protocol achieves reliable quantum authentication, efficient key distribution, and prevents information leakage, fundamentally removing risks associated with classical authentication. Our findings offer a practical and novel framework for strengthening the security of quantum communication systems.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145510332","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
期刊
Quantum Information Processing
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1