Controlled quantum authentication confidential communication protocol for smart healthcare DOI Creative Commons
Ye-Feng He, Junxuan Fan, Yichi Zhang

и другие.

Scientific Reports, Год журнала: 2025, Номер 15(1)

Опубликована: Май 24, 2025

In the field of smart healthcare, video consultation has become a key way to provide medical services for remote patients. this process, it is essential ensure legal identity both parties communication and protect patient privacy data from unlawful interception tampering. Therefore, controlled quantum authentication confidential protocol proposed by using entanglement exchange ability measurement correlation Bell states. With assistance trusted third party, first achieves mutual parties, so as prevent malicious users communicating pretending be specialists or The party then further assists in generating two implicit shared keys, which they use encrypt message its digest, ensuring that patient's sensitive not intercepted tampered with. addition, sequences are transmitted only once channel, reducing loss noise effects caused multiple transmissions. Security analysis shows can effectively resist participant attacks outside attacks. performance provides computation terms qubit efficiency experimental simulation results protocol.

Язык: Английский

Ultra-broadband multi-character logic gates integrated by inverse designed logic units DOI

Meitong Dong,

Huiqin Wang,

Haoji Yang

и другие.

Optics Communications, Год журнала: 2025, Номер unknown, С. 131545 - 131545

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

2

Multi-party semi-quantum private comparison protocol of size relation based on d-dimensional single-particle states DOI

Li‐Hua Gong,

Yanyan Liu,

Jie‐Hui Huang

и другие.

Chinese Journal of Physics, Год журнала: 2025, Номер unknown

Опубликована: Фев. 1, 2025

Процитировано

2

Efficient (k, n) threshold semi-quantum secret sharing protocol DOI Creative Commons
Jie Cao, Jinchao Xu

Frontiers in Physics, Год журнала: 2025, Номер 13

Опубликована: Фев. 26, 2025

Most ( k , n ) threshold quantum secret sharing protocols are fully quantum. The message receivers must be equipped with complex devices so as to prepare various resources and perform operations, which may affect the practice of these protocols. On other hand, qubit efficiency most is not more than 1/2. To simplify protocol improve its efficiency, a new semi-quantum properties proposed. In this protocol, dealer prepares decoy particles sends them receivers. insert carrying information along Z-basis into received particle sequence generate mixed-particle sequences, returned dealer. measures sequences check for eavesdropping establishes shared keys With keys, distributes pieces among using Shamir’s scheme. Multiple messages can recovered by or our k/n . For an n) would 100%. proposed scheme based on single without any entangled system. Therefore, relatively easy prepare. Receivers only simple qubits. Its enhance implementation. has robust security against types attacks, including eavesdropping, internal, collusion attacks. Furthermore, it resist unitary attack, seldom analyzed in

Язык: Английский

Процитировано

0

Constructing resource-efficient quantum circuits for AES DOI Creative Commons
Liang Jiang, Bin‐Bin Cai, Fei Gao

и другие.

Frontiers in Physics, Год журнала: 2025, Номер 13

Опубликована: Апрель 22, 2025

An efficient quantum implementation of the advanced encryption standard (AES) is crucial for reducing complexity implementing an exhaustive key search through Grover’s algorithm. In this paper, we study how to construct resource-efficient circuits AES. We consider product T-gates depth and width (TDW) full (FDW) as optimization targets. propose a generic method, called controlled control qubit cascade (CCQC) technique, nonlinear components with reduced TDW FDW. Using this, circuit AES S-box. Compared recent work presented at ASIACRYPT 2023, our S-box achieves reductions 2.3% in 45.2% Additionally, new schedule strategy reduce circuit. Finally, trade-offs between parallel numbers are analyzed.

Язык: Английский

Процитировано

0

One-to-many image generation model based on parameterized quantum circuits DOI

Jun-Jie Pei,

Li‐Hua Gong,

Li‐Guo Qin

и другие.

Digital Signal Processing, Год журнала: 2025, Номер 165, С. 105340 - 105340

Опубликована: Май 20, 2025

Язык: Английский

Процитировано

0

Information leakage resistant quantum dialogue based on Grover’s quantum searching DOI

Q. Chen,

Xia Li, Tian-Yu Ye

и другие.

Laser Physics Letters, Год журнала: 2025, Номер 22(5), С. 055203 - 055203

Опубликована: Апрель 24, 2025

Abstract This paper proposes a novel information leakage resistant quantum dialogue protocol based on Grover’s searching. prevents the problem by directly transmitting auxiliary two-particle product states from one user to another user. Security analysis proves that this is able defeat intercept-resend attack, measure-resend entangle-measure attack and Trojan horse an outside eavesdropper. The qubit efficiency of after ignoring eavesdropping check processes as high 2/3. only employs initial resource, needs single-particle measurements does not need implement entanglement swapping.

Язык: Английский

Процитировано

0

Quantum Chosen-Cipher Attack on Camellia DOI Creative Commons
Yanjun Li, Q Wang,

D. T. Huang

и другие.

Mathematics, Год журнала: 2025, Номер 13(9), С. 1383 - 1383

Опубликована: Апрель 24, 2025

The Feistel structure represents a fundamental architectural component within the domain of symmetric cryptographic algorithms, with substantial body research conducted context classical computing environments. Nevertheless, into specific algorithms utilizing is relatively scarce in quantum This paper, for first time, proposes five-round distinguisher Camellia under chosen-ciphertext attack (qCCA) setting, its effectiveness empirically validated. Additionally, by combining Grover’s algorithm and Simon’s algorithm, we construct nine-round key-recovery model against Camellia. Through an in-depth analysis Camellia’s key expansion significantly reduce complexity attack. proposed achieves time 261.5 recovering correct bits requires 531 bits.

Язык: Английский

Процитировано

0

Controlled quantum authentication confidential communication protocol for smart healthcare DOI Creative Commons
Ye-Feng He, Junxuan Fan, Yichi Zhang

и другие.

Scientific Reports, Год журнала: 2025, Номер 15(1)

Опубликована: Май 24, 2025

In the field of smart healthcare, video consultation has become a key way to provide medical services for remote patients. this process, it is essential ensure legal identity both parties communication and protect patient privacy data from unlawful interception tampering. Therefore, controlled quantum authentication confidential protocol proposed by using entanglement exchange ability measurement correlation Bell states. With assistance trusted third party, first achieves mutual parties, so as prevent malicious users communicating pretending be specialists or The party then further assists in generating two implicit shared keys, which they use encrypt message its digest, ensuring that patient's sensitive not intercepted tampered with. addition, sequences are transmitted only once channel, reducing loss noise effects caused multiple transmissions. Security analysis shows can effectively resist participant attacks outside attacks. performance provides computation terms qubit efficiency experimental simulation results protocol.

Язык: Английский

Процитировано

0