Ultra-broadband multi-character logic gates integrated by inverse designed logic units
Optics Communications,
Год журнала:
2025,
Номер
unknown, С. 131545 - 131545
Опубликована: Янв. 1, 2025
Язык: Английский
Multi-party semi-quantum private comparison protocol of size relation based on d-dimensional single-particle states
Chinese Journal of Physics,
Год журнала:
2025,
Номер
unknown
Опубликована: Фев. 1, 2025
Efficient (k, n) threshold semi-quantum secret sharing protocol
Frontiers in Physics,
Год журнала:
2025,
Номер
13
Опубликована: Фев. 26, 2025
Most
(
k
,
n
)
threshold
quantum
secret
sharing
protocols
are
fully
quantum.
The
message
receivers
must
be
equipped
with
complex
devices
so
as
to
prepare
various
resources
and
perform
operations,
which
may
affect
the
practice
of
these
protocols.
On
other
hand,
qubit
efficiency
most
is
not
more
than
1/2.
To
simplify
protocol
improve
its
efficiency,
a
new
semi-quantum
properties
proposed.
In
this
protocol,
dealer
prepares
decoy
particles
sends
them
receivers.
insert
carrying
information
along
Z-basis
into
received
particle
sequence
generate
mixed-particle
sequences,
returned
dealer.
measures
sequences
check
for
eavesdropping
establishes
shared
keys
With
keys,
distributes
pieces
among
using
Shamir’s
scheme.
Multiple
messages
can
recovered
by
or
our
k/n
.
For
an
n)
would
100%.
proposed
scheme
based
on
single
without
any
entangled
system.
Therefore,
relatively
easy
prepare.
Receivers
only
simple
qubits.
Its
enhance
implementation.
has
robust
security
against
types
attacks,
including
eavesdropping,
internal,
collusion
attacks.
Furthermore,
it
resist
unitary
attack,
seldom
analyzed
in
Язык: Английский
Constructing resource-efficient quantum circuits for AES
Frontiers in Physics,
Год журнала:
2025,
Номер
13
Опубликована: Апрель 22, 2025
An
efficient
quantum
implementation
of
the
advanced
encryption
standard
(AES)
is
crucial
for
reducing
complexity
implementing
an
exhaustive
key
search
through
Grover’s
algorithm.
In
this
paper,
we
study
how
to
construct
resource-efficient
circuits
AES.
We
consider
product
T-gates
depth
and
width
(TDW)
full
(FDW)
as
optimization
targets.
propose
a
generic
method,
called
controlled
control
qubit
cascade
(CCQC)
technique,
nonlinear
components
with
reduced
TDW
FDW.
Using
this,
circuit
AES
S-box.
Compared
recent
work
presented
at
ASIACRYPT
2023,
our
S-box
achieves
reductions
2.3%
in
45.2%
Additionally,
new
schedule
strategy
reduce
circuit.
Finally,
trade-offs
between
parallel
numbers
are
analyzed.
Язык: Английский
One-to-many image generation model based on parameterized quantum circuits
Digital Signal Processing,
Год журнала:
2025,
Номер
165, С. 105340 - 105340
Опубликована: Май 20, 2025
Язык: Английский
Information leakage resistant quantum dialogue based on Grover’s quantum searching
Laser Physics Letters,
Год журнала:
2025,
Номер
22(5), С. 055203 - 055203
Опубликована: Апрель 24, 2025
Abstract
This
paper
proposes
a
novel
information
leakage
resistant
quantum
dialogue
protocol
based
on
Grover’s
searching.
prevents
the
problem
by
directly
transmitting
auxiliary
two-particle
product
states
from
one
user
to
another
user.
Security
analysis
proves
that
this
is
able
defeat
intercept-resend
attack,
measure-resend
entangle-measure
attack
and
Trojan
horse
an
outside
eavesdropper.
The
qubit
efficiency
of
after
ignoring
eavesdropping
check
processes
as
high
2/3.
only
employs
initial
resource,
needs
single-particle
measurements
does
not
need
implement
entanglement
swapping.
Язык: Английский
Quantum Chosen-Cipher Attack on Camellia
Mathematics,
Год журнала:
2025,
Номер
13(9), С. 1383 - 1383
Опубликована: Апрель 24, 2025
The
Feistel
structure
represents
a
fundamental
architectural
component
within
the
domain
of
symmetric
cryptographic
algorithms,
with
substantial
body
research
conducted
context
classical
computing
environments.
Nevertheless,
into
specific
algorithms
utilizing
is
relatively
scarce
in
quantum
This
paper,
for
first
time,
proposes
five-round
distinguisher
Camellia
under
chosen-ciphertext
attack
(qCCA)
setting,
its
effectiveness
empirically
validated.
Additionally,
by
combining
Grover’s
algorithm
and
Simon’s
algorithm,
we
construct
nine-round
key-recovery
model
against
Camellia.
Through
an
in-depth
analysis
Camellia’s
key
expansion
significantly
reduce
complexity
attack.
proposed
achieves
time
261.5
recovering
correct
bits
requires
531
bits.
Язык: Английский
Controlled quantum authentication confidential communication protocol for smart healthcare
Scientific Reports,
Год журнала:
2025,
Номер
15(1)
Опубликована: Май 24, 2025
In
the
field
of
smart
healthcare,
video
consultation
has
become
a
key
way
to
provide
medical
services
for
remote
patients.
this
process,
it
is
essential
ensure
legal
identity
both
parties
communication
and
protect
patient
privacy
data
from
unlawful
interception
tampering.
Therefore,
controlled
quantum
authentication
confidential
protocol
proposed
by
using
entanglement
exchange
ability
measurement
correlation
Bell
states.
With
assistance
trusted
third
party,
first
achieves
mutual
parties,
so
as
prevent
malicious
users
communicating
pretending
be
specialists
or
The
party
then
further
assists
in
generating
two
implicit
shared
keys,
which
they
use
encrypt
message
its
digest,
ensuring
that
patient's
sensitive
not
intercepted
tampered
with.
addition,
sequences
are
transmitted
only
once
channel,
reducing
loss
noise
effects
caused
multiple
transmissions.
Security
analysis
shows
can
effectively
resist
participant
attacks
outside
attacks.
performance
provides
computation
terms
qubit
efficiency
experimental
simulation
results
protocol.
Язык: Английский