A Dynamic Semi-Quantum Private Comparison Protocol for Size Relations DOI
Chong‐Qiang Ye, Xiaoyu Chen, Jian Li

и другие.

Physica Scripta, Год журнала: 2024, Номер 99(12), С. 125114 - 125114

Опубликована: Ноя. 4, 2024

Abstract Semi-quantum private comparison allows multiple ‘classical’ users who have restricted quantum capabilities to compare their data with the assistance of a third party. In this work, we propose novel dynamic semi-quantum protocol using circular transmission mode along d -dimensional single-particle states. The enables size relations among several users, while party can only determine relative sizes without accessing users’ secret information. Security evaluations demonstrate that designed withstands typical external and internal attacks. Compared previous works, offers improvements: first, it supports addition or removal enhancing applicability in practical scenarios; second, eliminates need for pre-shared keys, reducing resource consumption; third, avoids use high-dimensional multi-particle entangled states, thereby feasibility implementation. Therefore, proposed may more potential compared protocols.

Язык: Английский

Ultra-broadband multi-character logic gates integrated by inverse designed logic units DOI

Meitong Dong,

Huiqin Wang,

Haoji Yang

и другие.

Optics Communications, Год журнала: 2025, Номер unknown, С. 131545 - 131545

Опубликована: Янв. 1, 2025

Язык: Английский

Процитировано

2

Multi-party semi-quantum private comparison protocol of size relation based on d-dimensional single-particle states DOI

Li‐Hua Gong,

Yanyan Liu,

Jie‐Hui Huang

и другие.

Chinese Journal of Physics, Год журнала: 2025, Номер unknown

Опубликована: Фев. 1, 2025

Процитировано

2

Multi‐Party Semi‐Quantum Private Comparison Protocol of Size Relation with d‐Level GHZ States DOI Open Access
Nanrun Zhou,

Zhen‐Yong Chen,

Yanyan Liu

и другие.

Advanced Quantum Technologies, Год журнала: 2024, Номер unknown

Опубликована: Дек. 18, 2024

Abstract A new multi‐party semi‐quantum private comparison protocol of size relation is designed based on d ‐level GHZ states. Multiple classical participants could compare their privacies while keeping them secure under an ideal environment. Compared with some similar protocols, the in do not need to prepare and measure quantum Besides, qubit efficiency reaches 33.33%. It demonstrated that output result proposed correct. Finally, security analysis manifests behaves well withstanding intercept‐resend attack, measure‐resend entanglement Trojan horse so on.

Язык: Английский

Процитировано

8

Quantum private comparison for the socialist millionaire problem DOI Creative Commons
Min Hou,

Shi-Yao Sun,

Wei Zhang

и другие.

Frontiers in Physics, Год журнала: 2024, Номер 12

Опубликована: Июнь 19, 2024

The socialist millionaire problem aims to compare the equality of two inputs from users while keeping their undisclosed anyone. Quantum private comparison (QPC), whose security relies on principles quantum mechanics, can solve this and achieve information-theoretic information processing. current QPC protocols mainly utilize bitwise XOR operation implement comparison, leading insufficient security. In paper, we propose a rotation operation-based protocol problem, which utilizes Bell states as resources operations for classical calculations. proposed only easy-to-implement technologies such states, operations, Bell-basis measurements, making it more practical. analysis demonstrates that our meet both correctness requirements. Compared with existing protocols, has improved performance in terms practicability

Язык: Английский

Процитировано

6

New Quantum Private Comparison Using Four-Particle Cluster State DOI Creative Commons
Min Hou, Yue Wu, Shibin Zhang

и другие.

Entropy, Год журнала: 2024, Номер 26(6), С. 512 - 512

Опубликована: Июнь 14, 2024

Quantum private comparison (QPC) enables two users to securely conduct comparisons in a network characterized by mutual distrust while guaranteeing the confidentiality of their inputs. Most previous QPC protocols were primarily used determine equality information between users, which constrained scalability. In this paper, we propose protocol that leverages entanglement correlation particles four-particle cluster state. This can compare groups within one execution, with each group consisting users. A semi-honest third party (TP), who will not deviate from execution or conspire any participant, is involved assisting achieve comparisons. Users encode inputs into specific angles rotational operations performed on received quantum sequence, then sent back TP. Security analysis shows both external attacks and insider threats are ineffective at stealing data. Finally, our some previously proposed protocols.

Язык: Английский

Процитировано

5

State-of-the-art analysis of quantum cryptography: applications and future prospects DOI Creative Commons

Swastik Kumar Sahu,

Kaushik Mazumdar

Frontiers in Physics, Год журнала: 2024, Номер 12

Опубликована: Авг. 6, 2024

Quantum computing provides a revolution in computational competences, leveraging the principles of quantum mechanics to process data fundamentally novel ways. This paper explores profound implications on cryptography, focusing vulnerabilities it introduces classical encryption methods such as RSA and ECC, emergence quantum-resistant algorithms. We review core mechanics, including superposition entanglement, which underpin cryptography. Additionally, we examine algorithms, particularly Key Distribution (QKD) protocols post-quantum cryptographic methods, highlighting their potential secure communications era. analysis emphasizes urgent need for developing robust solutions safeguard sensitive information against imminent threats posed by advancing technologies.

Язык: Английский

Процитировано

4

Transformer-Based Quantum Error Decoding Enhanced by QGANs: Towards Scalable Surface Code Correction Algorithms DOI
Chushun Tian, Zhe-Cheng Fan, Xiaoxuan Guo

и другие.

Research Square (Research Square), Год журнала: 2025, Номер unknown

Опубликована: Апрель 15, 2025

Abstract To address qubits' high environmental sensitivity and reduce the significant error rates in current quantum devices, correction stands as one of most dependable approaches. The topological surface code, renowned for its unique qubit lattice structure, is widely considered a pivotal tool enabling fault-tolerant computation. Through redundancy introduced across multiple qubits, code safeguards information identifies errors via state changes captured by syndrome qubits. However, simultaneous data qubits substantially escalate decoding complexity. Quantum Generative Adversarial Networks (QGANs) have emerged promising deep learning frameworks, effectively harnessing advantages practical tasks such image processing optimization. Consequently, trainer quantum-classical hybrid GANs proposed an auxiliary model to enhance machine learning-based decoders, demonstrating significantly improved training accuracy compared traditional Minimum Weight Perfect Matching (MWPM) algorithm, which achieves 65 \(%\) . Numerical experiments reveal that decoder fidelity threshold P=0.1978, surpassing algorithm's P=0.1024. efficiency, Transformer integrated, incorporating outputs trained QGANs into framework. By leveraging self-attention mechanism, captures long-range dependencies at global scale, high-fidelity over larger dimensions. validation demonstrates 8.5$%$ with success rate exceeding 94$%$, whereas local MWPM only 55$%$ fails support large-scale computation 4$%$ threshold.

Язык: Английский

Процитировано

0

Feasibility analysis study of discrete modulation continuous variable quantum key distribution for spatial channels DOI Open Access
Xin Sun,

Guo Jun-jie,

Yujie Chen

и другие.

Acta Physica Sinica, Год журнала: 2025, Номер 74(9), С. 0 - 0

Опубликована: Янв. 1, 2025

Continuous Variable Quantum Key Distribution (CV-QKD) has emerged as a promising candidate for quantum-secure communication due to its experimentally demonstrated high key rates in fiber-optic channels. However, the feasibility of discrete modulation CV-QKD satellite-to-ground downlinks remains an open question practical challenges such transmission loss, limited windows, and atmospheric turbulence. In this paper, comprehensive framework is proposed evaluate by integrating orbital dynamics channel models, with full analysis impact parameter space on free-space CV-QKD. To achieve this, simulation platform employed, which calculates elevation angle distance based precise thereby providing more assessment rate Simulation results verify practicality satellite-based quantum systems. Furthermore, critical factors affecting performance are identified, optimization strategies proposed, offering theoretical support future implementation

Язык: Английский

Процитировано

0

Efficient (k, n) threshold semi-quantum secret sharing protocol DOI Creative Commons
Jie Cao, Jinchao Xu

Frontiers in Physics, Год журнала: 2025, Номер 13

Опубликована: Фев. 26, 2025

Most ( k , n ) threshold quantum secret sharing protocols are fully quantum. The message receivers must be equipped with complex devices so as to prepare various resources and perform operations, which may affect the practice of these protocols. On other hand, qubit efficiency most is not more than 1/2. To simplify protocol improve its efficiency, a new semi-quantum properties proposed. In this protocol, dealer prepares decoy particles sends them receivers. insert carrying information along Z-basis into received particle sequence generate mixed-particle sequences, returned dealer. measures sequences check for eavesdropping establishes shared keys With keys, distributes pieces among using Shamir’s scheme. Multiple messages can recovered by or our k/n . For an n) would 100%. proposed scheme based on single without any entangled system. Therefore, relatively easy prepare. Receivers only simple qubits. Its enhance implementation. has robust security against types attacks, including eavesdropping, internal, collusion attacks. Furthermore, it resist unitary attack, seldom analyzed in

Язык: Английский

Процитировано

0

Device Independent Quantum Private Queries Based on Quantum Key Distribution DOI Creative Commons
Li Liu, Qiang Du,

Xu Gao

и другие.

Mathematics, Год журнала: 2025, Номер 13(6), С. 951 - 951

Опубликована: Март 13, 2025

Symmetric private information retrieval (SPIR) protocol is proposed for users to retrieve items from a database holder without revealing the address, and meanwhile cannot learn any additional entries of database. Quantum key distribution (QKD)-based quantum queries (QPQs) are most practical protocols SPIR problem. However, existing assume ideal devices. To overcome this drawback, we propose device independent QPQ based on QKD with imperfect sources detectors. By constructing semi-definite programming optimization problem, give CHSH test threshold prove correctness our protocol. We use shift permutation post-processing technique further improve security. compare performance recent full device-independent QPQ. discuss their relative advantages. The simulation results show that improves security, user privacy efficiency. number final bits Alice knows close 1, Bob’s guessing probability below 0.15 in Moreover, scheme can be used entanglement-based remove trust

Язык: Английский

Процитировано

0