Physica Scripta,
Год журнала:
2024,
Номер
99(12), С. 125114 - 125114
Опубликована: Ноя. 4, 2024
Abstract
Semi-quantum
private
comparison
allows
multiple
‘classical’
users
who
have
restricted
quantum
capabilities
to
compare
their
data
with
the
assistance
of
a
third
party.
In
this
work,
we
propose
novel
dynamic
semi-quantum
protocol
using
circular
transmission
mode
along
d
-dimensional
single-particle
states.
The
enables
size
relations
among
several
users,
while
party
can
only
determine
relative
sizes
without
accessing
users’
secret
information.
Security
evaluations
demonstrate
that
designed
withstands
typical
external
and
internal
attacks.
Compared
previous
works,
offers
improvements:
first,
it
supports
addition
or
removal
enhancing
applicability
in
practical
scenarios;
second,
eliminates
need
for
pre-shared
keys,
reducing
resource
consumption;
third,
avoids
use
high-dimensional
multi-particle
entangled
states,
thereby
feasibility
implementation.
Therefore,
proposed
may
more
potential
compared
protocols.
Advanced Quantum Technologies,
Год журнала:
2024,
Номер
unknown
Опубликована: Дек. 18, 2024
Abstract
A
new
multi‐party
semi‐quantum
private
comparison
protocol
of
size
relation
is
designed
based
on
d
‐level
GHZ
states.
Multiple
classical
participants
could
compare
their
privacies
while
keeping
them
secure
under
an
ideal
environment.
Compared
with
some
similar
protocols,
the
in
do
not
need
to
prepare
and
measure
quantum
Besides,
qubit
efficiency
reaches
33.33%.
It
demonstrated
that
output
result
proposed
correct.
Finally,
security
analysis
manifests
behaves
well
withstanding
intercept‐resend
attack,
measure‐resend
entanglement
Trojan
horse
so
on.
The
socialist
millionaire
problem
aims
to
compare
the
equality
of
two
inputs
from
users
while
keeping
their
undisclosed
anyone.
Quantum
private
comparison
(QPC),
whose
security
relies
on
principles
quantum
mechanics,
can
solve
this
and
achieve
information-theoretic
information
processing.
current
QPC
protocols
mainly
utilize
bitwise
XOR
operation
implement
comparison,
leading
insufficient
security.
In
paper,
we
propose
a
rotation
operation-based
protocol
problem,
which
utilizes
Bell
states
as
resources
operations
for
classical
calculations.
proposed
only
easy-to-implement
technologies
such
states,
operations,
Bell-basis
measurements,
making
it
more
practical.
analysis
demonstrates
that
our
meet
both
correctness
requirements.
Compared
with
existing
protocols,
has
improved
performance
in
terms
practicability
Entropy,
Год журнала:
2024,
Номер
26(6), С. 512 - 512
Опубликована: Июнь 14, 2024
Quantum
private
comparison
(QPC)
enables
two
users
to
securely
conduct
comparisons
in
a
network
characterized
by
mutual
distrust
while
guaranteeing
the
confidentiality
of
their
inputs.
Most
previous
QPC
protocols
were
primarily
used
determine
equality
information
between
users,
which
constrained
scalability.
In
this
paper,
we
propose
protocol
that
leverages
entanglement
correlation
particles
four-particle
cluster
state.
This
can
compare
groups
within
one
execution,
with
each
group
consisting
users.
A
semi-honest
third
party
(TP),
who
will
not
deviate
from
execution
or
conspire
any
participant,
is
involved
assisting
achieve
comparisons.
Users
encode
inputs
into
specific
angles
rotational
operations
performed
on
received
quantum
sequence,
then
sent
back
TP.
Security
analysis
shows
both
external
attacks
and
insider
threats
are
ineffective
at
stealing
data.
Finally,
our
some
previously
proposed
protocols.
Quantum
computing
provides
a
revolution
in
computational
competences,
leveraging
the
principles
of
quantum
mechanics
to
process
data
fundamentally
novel
ways.
This
paper
explores
profound
implications
on
cryptography,
focusing
vulnerabilities
it
introduces
classical
encryption
methods
such
as
RSA
and
ECC,
emergence
quantum-resistant
algorithms.
We
review
core
mechanics,
including
superposition
entanglement,
which
underpin
cryptography.
Additionally,
we
examine
algorithms,
particularly
Key
Distribution
(QKD)
protocols
post-quantum
cryptographic
methods,
highlighting
their
potential
secure
communications
era.
analysis
emphasizes
urgent
need
for
developing
robust
solutions
safeguard
sensitive
information
against
imminent
threats
posed
by
advancing
technologies.
Research Square (Research Square),
Год журнала:
2025,
Номер
unknown
Опубликована: Апрель 15, 2025
Abstract
To
address
qubits'
high
environmental
sensitivity
and
reduce
the
significant
error
rates
in
current
quantum
devices,
correction
stands
as
one
of
most
dependable
approaches.
The
topological
surface
code,
renowned
for
its
unique
qubit
lattice
structure,
is
widely
considered
a
pivotal
tool
enabling
fault-tolerant
computation.
Through
redundancy
introduced
across
multiple
qubits,
code
safeguards
information
identifies
errors
via
state
changes
captured
by
syndrome
qubits.
However,
simultaneous
data
qubits
substantially
escalate
decoding
complexity.
Quantum
Generative
Adversarial
Networks
(QGANs)
have
emerged
promising
deep
learning
frameworks,
effectively
harnessing
advantages
practical
tasks
such
image
processing
optimization.
Consequently,
trainer
quantum-classical
hybrid
GANs
proposed
an
auxiliary
model
to
enhance
machine
learning-based
decoders,
demonstrating
significantly
improved
training
accuracy
compared
traditional
Minimum
Weight
Perfect
Matching
(MWPM)
algorithm,
which
achieves
65
\(%\)
.
Numerical
experiments
reveal
that
decoder
fidelity
threshold
P=0.1978,
surpassing
algorithm's
P=0.1024.
efficiency,
Transformer
integrated,
incorporating
outputs
trained
QGANs
into
framework.
By
leveraging
self-attention
mechanism,
captures
long-range
dependencies
at
global
scale,
high-fidelity
over
larger
dimensions.
validation
demonstrates
8.5$%$
with
success
rate
exceeding
94$%$,
whereas
local
MWPM
only
55$%$
fails
support
large-scale
computation
4$%$
threshold.
Acta Physica Sinica,
Год журнала:
2025,
Номер
74(9), С. 0 - 0
Опубликована: Янв. 1, 2025
Continuous
Variable
Quantum
Key
Distribution
(CV-QKD)
has
emerged
as
a
promising
candidate
for
quantum-secure
communication
due
to
its
experimentally
demonstrated
high
key
rates
in
fiber-optic
channels.
However,
the
feasibility
of
discrete
modulation
CV-QKD
satellite-to-ground
downlinks
remains
an
open
question
practical
challenges
such
transmission
loss,
limited
windows,
and
atmospheric
turbulence.
In
this
paper,
comprehensive
framework
is
proposed
evaluate
by
integrating
orbital
dynamics
channel
models,
with
full
analysis
impact
parameter
space
on
free-space
CV-QKD.
To
achieve
this,
simulation
platform
employed,
which
calculates
elevation
angle
distance
based
precise
thereby
providing
more
assessment
rate
Simulation
results
verify
practicality
satellite-based
quantum
systems.
Furthermore,
critical
factors
affecting
performance
are
identified,
optimization
strategies
proposed,
offering
theoretical
support
future
implementation
Most
(
k
,
n
)
threshold
quantum
secret
sharing
protocols
are
fully
quantum.
The
message
receivers
must
be
equipped
with
complex
devices
so
as
to
prepare
various
resources
and
perform
operations,
which
may
affect
the
practice
of
these
protocols.
On
other
hand,
qubit
efficiency
most
is
not
more
than
1/2.
To
simplify
protocol
improve
its
efficiency,
a
new
semi-quantum
properties
proposed.
In
this
protocol,
dealer
prepares
decoy
particles
sends
them
receivers.
insert
carrying
information
along
Z-basis
into
received
particle
sequence
generate
mixed-particle
sequences,
returned
dealer.
measures
sequences
check
for
eavesdropping
establishes
shared
keys
With
keys,
distributes
pieces
among
using
Shamir’s
scheme.
Multiple
messages
can
recovered
by
or
our
k/n
.
For
an
n)
would
100%.
proposed
scheme
based
on
single
without
any
entangled
system.
Therefore,
relatively
easy
prepare.
Receivers
only
simple
qubits.
Its
enhance
implementation.
has
robust
security
against
types
attacks,
including
eavesdropping,
internal,
collusion
attacks.
Furthermore,
it
resist
unitary
attack,
seldom
analyzed
in
Mathematics,
Год журнала:
2025,
Номер
13(6), С. 951 - 951
Опубликована: Март 13, 2025
Symmetric
private
information
retrieval
(SPIR)
protocol
is
proposed
for
users
to
retrieve
items
from
a
database
holder
without
revealing
the
address,
and
meanwhile
cannot
learn
any
additional
entries
of
database.
Quantum
key
distribution
(QKD)-based
quantum
queries
(QPQs)
are
most
practical
protocols
SPIR
problem.
However,
existing
assume
ideal
devices.
To
overcome
this
drawback,
we
propose
device
independent
QPQ
based
on
QKD
with
imperfect
sources
detectors.
By
constructing
semi-definite
programming
optimization
problem,
give
CHSH
test
threshold
prove
correctness
our
protocol.
We
use
shift
permutation
post-processing
technique
further
improve
security.
compare
performance
recent
full
device-independent
QPQ.
discuss
their
relative
advantages.
The
simulation
results
show
that
improves
security,
user
privacy
efficiency.
number
final
bits
Alice
knows
close
1,
Bob’s
guessing
probability
below
0.15
in
Moreover,
scheme
can
be
used
entanglement-based
remove
trust