Pub Date : 2025-11-10DOI: 10.1007/s11128-025-04987-0
José Garre Rubio
If a local Hamiltonian eigenstate is mapped to another state by local operators commuting with the Hamiltonian terms, the latter is also an eigenstate. This basic observation implies a no-go result for both being a unique ground state and having a degeneracy protected against local perturbations.
{"title":"A simple mechanism for unstable degeneracies in local Hamiltonians","authors":"José Garre Rubio","doi":"10.1007/s11128-025-04987-0","DOIUrl":"10.1007/s11128-025-04987-0","url":null,"abstract":"<div><p>If a local Hamiltonian eigenstate is mapped to another state by local operators commuting with the Hamiltonian terms, the latter is also an eigenstate. This basic observation implies a no-go result for both being a unique ground state and having a degeneracy protected against local perturbations.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-025-04987-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145510623","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-10DOI: 10.1007/s11128-025-04990-5
Hiroshi Ohno
We derive a generalization error bound for quantum neural networks (QNNs) using the framework of dynamical Lie algebras (DLAs). By constructing covering numbers from the DLA structure and applying Rademacher complexity theory, we show that the generalization error bound scales as ( mathcal {O}(sqrt{ dim ( mathfrak {g}) }) ), where ( mathfrak {g} ) denotes the associated Lie algebra. Additionally, we establish an upper bound on the number of trainable parameters required to ensure this generalization property. Numerical experiments using the transverse-field Ising model confirm the validity of our theoretical findings and illustrate the effect of boundary conditions and training strategies on generalization. Our results highlight the importance of algebraic structure in the design and analysis of QNNs.
{"title":"Generalization analysis of quantum neural networks using dynamical Lie algebras","authors":"Hiroshi Ohno","doi":"10.1007/s11128-025-04990-5","DOIUrl":"10.1007/s11128-025-04990-5","url":null,"abstract":"<div><p>We derive a generalization error bound for quantum neural networks (QNNs) using the framework of dynamical Lie algebras (DLAs). By constructing covering numbers from the DLA structure and applying Rademacher complexity theory, we show that the generalization error bound scales as <span>( mathcal {O}(sqrt{ dim ( mathfrak {g}) }) )</span>, where <span>( mathfrak {g} )</span> denotes the associated Lie algebra. Additionally, we establish an upper bound on the number of trainable parameters required to ensure this generalization property. Numerical experiments using the transverse-field Ising model confirm the validity of our theoretical findings and illustrate the effect of boundary conditions and training strategies on generalization. Our results highlight the importance of algebraic structure in the design and analysis of QNNs.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145510440","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-07DOI: 10.1007/s11128-025-04978-1
Junaid ur Rehman
We consider the problem of entanglement routing in heterogeneous quantum networks where each link and node may offer a different entanglement generation quality. We consider that each link offers a base rate and fidelity of entanglement generation. These base values can be altered by performing entanglement purification on each link. Furthermore, we consider that each repeater node offers a different probability of a successful entanglement swapping. With this setting, we design a reinforcement learning-based approach for flexible entanglement routing on future quantum networks. Specifically, we formulate the problem of entanglement routing in the Q-learning framework where the main objective of the agent is to deliver end-to-end entanglement while maximizing a user-specified objective function in the form of a weighted sum of achieve fidelity and rate. We demonstrate the efficacy and flexibility of developed framework by simulating random quantum networks where the random requests in fidelity maximizing, rate maximizing, or balanced mode are generated. We also numerically assess the effects of infrastructure developments and technology enhancements in future quantum networks.
{"title":"Reinforcement learning for flexible entanglement routing","authors":"Junaid ur Rehman","doi":"10.1007/s11128-025-04978-1","DOIUrl":"10.1007/s11128-025-04978-1","url":null,"abstract":"<div><p>We consider the problem of entanglement routing in heterogeneous quantum networks where each link and node may offer a different entanglement generation quality. We consider that each link offers a base rate and fidelity of entanglement generation. These base values can be altered by performing entanglement purification on each link. Furthermore, we consider that each repeater node offers a different probability of a successful entanglement swapping. With this setting, we design a reinforcement learning-based approach for flexible entanglement routing on future quantum networks. Specifically, we formulate the problem of entanglement routing in the Q-learning framework where the main objective of the agent is to deliver end-to-end entanglement while maximizing a user-specified objective function in the form of a weighted sum of achieve fidelity and rate. We demonstrate the efficacy and flexibility of developed framework by simulating random quantum networks where the random requests in fidelity maximizing, rate maximizing, or balanced mode are generated. We also numerically assess the effects of infrastructure developments and technology enhancements in future quantum networks.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145456842","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-07DOI: 10.1007/s11128-025-04985-2
Si-Qi Lin, Xiao-Yu Bi, Sai-Yun Ye, Zhi-Rong Zhong
Information transfer between different nodes, particularly parallel information transfer, is fundamental to the realization of quantum networks. In this paper, we propose a scheme for implementing quantum information parallel transfer that utilizes multimode cat state encoding within a cavity-magnon system. The quantum information parallel transfer module consists of four cavities, each containing a YIG sphere. Our findings indicate that by adjusting the coupling strength and detuning between the magnons and the cavities, the encoded information can be transferred from one pair of cavities to another with high fidelity. The model presented in this study has the potential to serve as a framework for the development of ring networks or one-dimensional cavity chain structures.
{"title":"Quantum information parallel transfer utilizing multimode cat state encoding in a cavity-magnon system","authors":"Si-Qi Lin, Xiao-Yu Bi, Sai-Yun Ye, Zhi-Rong Zhong","doi":"10.1007/s11128-025-04985-2","DOIUrl":"10.1007/s11128-025-04985-2","url":null,"abstract":"<div><p>Information transfer between different nodes, particularly parallel information transfer, is fundamental to the realization of quantum networks. In this paper, we propose a scheme for implementing quantum information parallel transfer that utilizes multimode cat state encoding within a cavity-magnon system. The quantum information parallel transfer module consists of four cavities, each containing a YIG sphere. Our findings indicate that by adjusting the coupling strength and detuning between the magnons and the cavities, the encoded information can be transferred from one pair of cavities to another with high fidelity. The model presented in this study has the potential to serve as a framework for the development of ring networks or one-dimensional cavity chain structures.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-07","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145456837","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-05DOI: 10.1007/s11128-025-04983-4
Linshuai Zhang, Nan Li
In this work, we investigate two measures of imaginarity: the maximum and minimum relative entropies of imaginarity, and provide their corresponding operational interpretations. For the maximum relative entropy of imaginarity, we demonstrate that it not only characterizes the maximum overlap between a given state and the maximally imaginary state through real operations, but also provides a lower bound for the efficiency of imaginarity distillation. For the minimum relative entropy of imaginarity, we show that it is related to the maximum probability of transformation between pure states using real operations, as well as the minimum time required for a unitary evolution to convert a given pure state into a real state. Furthermore, by introducing the concepts of smooth maximum and minimum relative entropies of imaginarity, as well as the one-shot imaginarity cost and one-shot distillable imaginarity, we establish that the smooth maximum relative entropy of imaginarity provides a lower bound for the one-shot imaginarity cost, while the smooth minimum relative entropy of imaginarity offers an upper bound for the one-shot distillable imaginarity. Finally, we prove that any nontrivial imaginarity measure is not additive under the tensor product of quantum states. Based on this, we prove that the regularized maximum and minimum relative entropies of imaginarity, as well as the regularized relative entropy of imaginarity are all equal to zero for any states, which highlights the distinction between the resource theory of imaginarity and those of entanglement and coherence.
{"title":"Maximum and minimum relative entropies of imaginarity","authors":"Linshuai Zhang, Nan Li","doi":"10.1007/s11128-025-04983-4","DOIUrl":"10.1007/s11128-025-04983-4","url":null,"abstract":"<div><p>In this work, we investigate two measures of imaginarity: the maximum and minimum relative entropies of imaginarity, and provide their corresponding operational interpretations. For the maximum relative entropy of imaginarity, we demonstrate that it not only characterizes the maximum overlap between a given state and the maximally imaginary state through real operations, but also provides a lower bound for the efficiency of imaginarity distillation. For the minimum relative entropy of imaginarity, we show that it is related to the maximum probability of transformation between pure states using real operations, as well as the minimum time required for a unitary evolution to convert a given pure state into a real state. Furthermore, by introducing the concepts of smooth maximum and minimum relative entropies of imaginarity, as well as the one-shot imaginarity cost and one-shot distillable imaginarity, we establish that the smooth maximum relative entropy of imaginarity provides a lower bound for the one-shot imaginarity cost, while the smooth minimum relative entropy of imaginarity offers an upper bound for the one-shot distillable imaginarity. Finally, we prove that any nontrivial imaginarity measure is not additive under the tensor product of quantum states. Based on this, we prove that the regularized maximum and minimum relative entropies of imaginarity, as well as the regularized relative entropy of imaginarity are all equal to zero for any states, which highlights the distinction between the resource theory of imaginarity and those of entanglement and coherence.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145456279","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Simon’s algorithm is a well-known quantum algorithm that can achieve exponential acceleration. This paper studies the applications of Simon’s algorithmin analyzing the security of Feistel variants, namely, several well-known cryptographic structures derived from the Feistel structure. Specifically, we study quantum related-key attacks on Feistel variants in the setting that adversaries can only control part of the key difference in quantum superposition. We delve into observing the quantum related-key attacks on the balanced Feistel structure given by Cid et al. and slightly improve the existing method to design periodic functions, ultimately providing a new approach to building periodic functions in single-key settings. Based on these results, we propose a general technique to construct quantum related-key distinguishers exploiting the quantum single-key distinguishers construction technique. As applications of our proposed technique, we demonstrate how to construct new polynomial-time quantum related-key chosen-plaintext distinguishers on several Feistel variants: Feistel-KF, SM4-like, MARS-like, and Type-1/2/3 generalized Feistel-KF structures.
{"title":"Quantum cryptanalysis on Feistel variants in related-key settings","authors":"Xiaoyu Wang, Siwei Chen, Zejun Xiang, Shasha Zhang, Xiangyong Zeng","doi":"10.1007/s11128-025-04975-4","DOIUrl":"10.1007/s11128-025-04975-4","url":null,"abstract":"<div><p>Simon’s algorithm is a well-known quantum algorithm that can achieve exponential acceleration. This paper studies the applications of Simon’s algorithmin analyzing the security of Feistel variants, namely, several well-known cryptographic structures derived from the Feistel structure. Specifically, we study quantum related-key attacks on Feistel variants in the setting that adversaries can only control part of the key difference in quantum superposition. We delve into observing the quantum related-key attacks on the balanced Feistel structure given by Cid et al. and slightly improve the existing method to design periodic functions, ultimately providing a new approach to building periodic functions in single-key settings. Based on these results, we propose a general technique to construct quantum related-key distinguishers exploiting the quantum single-key distinguishers construction technique. As applications of our proposed technique, we demonstrate how to construct new polynomial-time quantum related-key chosen-plaintext distinguishers on several Feistel variants: Feistel-KF, SM4-like, MARS-like, and Type-1/2/3 generalized Feistel-KF structures.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145456413","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-03DOI: 10.1007/s11128-025-04954-9
Jing Li, Weihua Chen, Xianmin Wang
Quantum secret sharing (QSS) harnesses quantum entanglement to securely distribute information among multiple parties, overcoming the vulnerabilities of classical secret sharing schemes, which rely on computational complexity and are susceptible to quantum computing threats. Existing multi-party QSS protocols often exhibit declining efficiency as the number of participants N increases, limiting the scalability. This paper proposes two efficient and verifiable QSS protocols based on a seven-qubit entangled (SQE) state. The first protocol can be extended to multi-party sharing, achieving a sharing efficiency of (3/(2N+2))—a significant improvement over prior schemes. By retaining three particles and distributing the remaining four particles to participants in groups, the protocol enables the reconstruction of three classical secret bits per SQE state, resulting in a particle utilization rate of 75%. Security is ensured through random number generation, local unitary operations, and decoy state technology, which effectively defends against external eavesdropping and internal cheating. Scalable to ((N ge 3)) participants, this protocol reduces the secure multi-party quantum communication cost. The second protocol introduces the random dynamic distribution of particle pairs in three-party secret sharing. Compared to the first protocol, this approach simplifies the verification lists. Moreover, the use of random dynamic particle pair distribution enhances the security of the second protocol.
量子秘密共享(QSS)利用量子纠缠在多方之间安全地分发信息,克服了经典秘密共享方案依赖计算复杂性和易受量子计算威胁的弱点。现有的多方QSS协议通常会随着参与者数量N的增加而出现效率下降的情况,从而限制了可扩展性。本文提出了两种基于七量子比特纠缠态(SQE)的高效且可验证的QSS协议。第一种协议可以扩展到多方共享,实现了(3/(2N+2))的共享效率,比以前的方案有了显著的提高。该协议通过保留3个粒子并将其余4个粒子分组分配给参与者,使每个SQE状态能够重建3个经典秘密比特,从而使粒子利用率达到75%. Security is ensured through random number generation, local unitary operations, and decoy state technology, which effectively defends against external eavesdropping and internal cheating. Scalable to ((N ge 3)) participants, this protocol reduces the secure multi-party quantum communication cost. The second protocol introduces the random dynamic distribution of particle pairs in three-party secret sharing. Compared to the first protocol, this approach simplifies the verification lists. Moreover, the use of random dynamic particle pair distribution enhances the security of the second protocol.
{"title":"An efficient and verifiable quantum secret sharing scheme based on a novel seven-qubit entangled state","authors":"Jing Li, Weihua Chen, Xianmin Wang","doi":"10.1007/s11128-025-04954-9","DOIUrl":"10.1007/s11128-025-04954-9","url":null,"abstract":"<div><p>Quantum secret sharing (QSS) harnesses quantum entanglement to securely distribute information among multiple parties, overcoming the vulnerabilities of classical secret sharing schemes, which rely on computational complexity and are susceptible to quantum computing threats. Existing multi-party QSS protocols often exhibit declining efficiency as the number of participants <i>N</i> increases, limiting the scalability. This paper proposes two efficient and verifiable QSS protocols based on a seven-qubit entangled (SQE) state. The first protocol can be extended to multi-party sharing, achieving a sharing efficiency of <span>(3/(2N+2))</span>—a significant improvement over prior schemes. By retaining three particles and distributing the remaining four particles to participants in groups, the protocol enables the reconstruction of three classical secret bits per SQE state, resulting in a particle utilization rate of 75%. Security is ensured through random number generation, local unitary operations, and decoy state technology, which effectively defends against external eavesdropping and internal cheating. Scalable to <span>((N ge 3))</span> participants, this protocol reduces the secure multi-party quantum communication cost. The second protocol introduces the random dynamic distribution of particle pairs in three-party secret sharing. Compared to the first protocol, this approach simplifies the verification lists. Moreover, the use of random dynamic particle pair distribution enhances the security of the second protocol.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145456102","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In this paper, we consider a special class of ((bar{lambda },theta ,ell ))-monomial codes over finite fields, where we describe the Galois duals of one-generator ((bar{lambda },theta ,ell ))-monomial codes generated by a generator of the form ((g(x), g(x)f_1(x), ldots , g(x)f_{ell -1}(x))). We give necessary and sufficient conditions to obtain the Galois self-orthogonality and Galois LCD properties. Furthermore, we construct certain maximum-distance-separable quantum error-correcting codes (MDS QECCs) using the CSS construction from Euclidean and Hermitian self-orthogonal codes. Similarly, we utilize LCD codes to construct certain maximum-distance-separable entanglement-assisted quantum error-correcting codes (MDS EAQECCs).
{"title":"Galois self-orthogonal and Galois LCD one-generator ((bar{lambda },theta ,ell ))-monomial codes","authors":"Oussama Kabbouch, Lhousain Mouatadid, Mustapha Najmeddine, Nuh Aydin","doi":"10.1007/s11128-025-04967-4","DOIUrl":"10.1007/s11128-025-04967-4","url":null,"abstract":"<div><p>In this paper, we consider a special class of <span>((bar{lambda },theta ,ell ))</span>-monomial codes over finite fields, where we describe the Galois duals of one-generator <span>((bar{lambda },theta ,ell ))</span>-monomial codes generated by a generator of the form <span>((g(x), g(x)f_1(x), ldots , g(x)f_{ell -1}(x)))</span>. We give necessary and sufficient conditions to obtain the Galois self-orthogonality and Galois LCD properties. Furthermore, we construct certain maximum-distance-separable quantum error-correcting codes (MDS QECCs) using the CSS construction from Euclidean and Hermitian self-orthogonal codes. Similarly, we utilize LCD codes to construct certain maximum-distance-separable entanglement-assisted quantum error-correcting codes (MDS EAQECCs).\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145456104","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Quantum robotic systems hold promise for applications in molecular manipulation and high-precision sensing, but their operation is highly vulnerable to environmental noise. This work introduces a large deviation principle (LDP)-based control framework for mitigating stochastic perturbations in coupled master–slave quantum robots. The system Hamiltonian, expressed in terms of position and momentum operators, incorporates control terms alongside Gaussian and Poisson noise, capturing both gradual fluctuations and sudden jumps. By computing the large deviation rate function, we quantify the probability of rare noise-induced deviations and derive an optimal control strategy that minimizes such events in key observables. Simulations across distinct dynamical regimes demonstrate that the controlled trajectories remain close to the desired wave function, with deviations consistent with the theoretical bounds. These results validate the robustness and generality of the approach, providing a practical framework for stabilizing quantum robotic systems in noisy environments with potential applications in precision sensing, molecular chemistry, and quantum computing.
{"title":"Large deviation-based noise mitigation in coupled quantum robotic systems","authors":"Rohit Singla, Rodrigo Verschae, Harish Parthasarathy","doi":"10.1007/s11128-025-04982-5","DOIUrl":"10.1007/s11128-025-04982-5","url":null,"abstract":"<div><p>Quantum robotic systems hold promise for applications in molecular manipulation and high-precision sensing, but their operation is highly vulnerable to environmental noise. This work introduces a large deviation principle (LDP)-based control framework for mitigating stochastic perturbations in coupled master–slave quantum robots. The system Hamiltonian, expressed in terms of position and momentum operators, incorporates control terms alongside Gaussian and Poisson noise, capturing both gradual fluctuations and sudden jumps. By computing the large deviation rate function, we quantify the probability of rare noise-induced deviations and derive an optimal control strategy that minimizes such events in key observables. Simulations across distinct dynamical regimes demonstrate that the controlled trajectories remain close to the desired wave function, with deviations consistent with the theoretical bounds. These results validate the robustness and generality of the approach, providing a practical framework for stabilizing quantum robotic systems in noisy environments with potential applications in precision sensing, molecular chemistry, and quantum computing.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-025-04982-5.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145456103","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-11-03DOI: 10.1007/s11128-025-04968-3
Xinglan Zhang, Xiaojun Rong, Zheng Li
As one of the fundamental quantum circuits widely used today, the quantum modular exponentiation circuit has been applied in various quantum algorithms, including Shor’s algorithm. However, due to the limitations of quantum computers in the noisy intermediate-scale quantum (NISQ) era, excessive circuit depth and high quantum cost can lead to significant noise accumulation, thereby increasing the likelihood of computational errors. Consequently, reducing both circuit depth and quantum cost is essential. To address these issues, this work proposes two modular exponentiation circuits based on the V gate, with further improvements introduced through the use of zero resets. Comparative analysis shows that both proposed circuits achieve reductions in circuit depth and quantum cost within their respective domains, while preserving general applicability. Furthermore, by relaxing the constraint of circuit reversibility, the improved designs achieve an additional two to three fold reduction in circuit depth and quantum cost. Finally, the correctness of the proposed circuits was verified through experimental implementation using the Qiskit package in Python.
{"title":"Construction and optimization of quantum modular exponentiation circuits based on the V gate","authors":"Xinglan Zhang, Xiaojun Rong, Zheng Li","doi":"10.1007/s11128-025-04968-3","DOIUrl":"10.1007/s11128-025-04968-3","url":null,"abstract":"<div><p>As one of the fundamental quantum circuits widely used today, the quantum modular exponentiation circuit has been applied in various quantum algorithms, including Shor’s algorithm. However, due to the limitations of quantum computers in the noisy intermediate-scale quantum (NISQ) era, excessive circuit depth and high quantum cost can lead to significant noise accumulation, thereby increasing the likelihood of computational errors. Consequently, reducing both circuit depth and quantum cost is essential. To address these issues, this work proposes two modular exponentiation circuits based on the V gate, with further improvements introduced through the use of zero resets. Comparative analysis shows that both proposed circuits achieve reductions in circuit depth and quantum cost within their respective domains, while preserving general applicability. Furthermore, by relaxing the constraint of circuit reversibility, the improved designs achieve an additional two to three fold reduction in circuit depth and quantum cost. Finally, the correctness of the proposed circuits was verified through experimental implementation using the Qiskit package in Python.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"24 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2025-11-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"145456105","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}