-
121
Quantum-based wireless sensor networks: A review and open questions
Published 2021-10-01“…Applications of quantum computing are growing at a very fast pace, for example, from quantum computers to quantum algorithms and even to the development of the quantum Internet. …”
Get full text
Article -
122
Dissipative Landau-Zener tunneling in the crossover regime from weak to strong environment coupling
Published 2025-01-01Get full text
Article -
123
5-pass zero-knowledge identity authentication scheme based on matrix completion problem
Published 2021-11-01“…To solve the problem that most identity authentication schemes are vulnerable to quantum-computing attacks and low efficiency, a new 5-pass zero-knowledge identity authentication scheme was designed based on the matrix completion problem (MCP).Since the MCP is NP-complete, the proposed scheme has the potential to avoid quantum-computing attacks.Compared with the existing similar protocols, the proposed scheme reduced the fraud probability from 2/3 to 1/2 by adding a single round of interaction, and had the advantages of easy implementation and small key size.Moreover, based on the proposed zero-knowledge authentication scheme and Fiat-Shamir standard transformation method, a secure and efficient digital signature algorithm against quantum-computing can be obtained.…”
Get full text
Article -
124
Noise Robustness of Quantum Relaxation for Combinatorial Optimization
Published 2024-01-01Get full text
Article -
125
Neutron Interferometry at the National Institute of Standards and Technology
Published 2015-01-01“…This new facility is based on QEC neutron interferometer, thus improving the accessibility of neutron interferometry to the greater scientific community and expanding its applications to quantum computing, gravity, and material research.…”
Get full text
Article -
126
Small-angle scattering interferometry with neutron orbital angular momentum states
Published 2024-12-01Get full text
Article -
127
Testing and Debugging Quantum Circuits
Published 2024-01-01“…This work is a crucial step toward realizing robust quantum computing systems and their applications in various domains.…”
Get full text
Article -
128
Quaternary Neural Belief Propagation Decoding of Quantum LDPC Codes With Overcomplete Check Matrices
Published 2025-01-01“…Quantum low-density parity-check (QLDPC) codes are promising candidates for error correction in quantum computers. One of the major challenges in implementing QLDPC codes in quantum computers is the lack of a universal decoder. …”
Get full text
Article -
129
Measuring Chern–Simons level k by braiding $$SU(2)_k$$ S U ( 2 ) k anyons
Published 2025-01-01“…Abstract Chern–Simons theory in application to the quantum computing is actively developing at the present. …”
Get full text
Article -
130
Survey of code-based digital signatures
Published 2021-08-01“…The rapid development of quantum computing theory and practice brings great uncertainty to the security of cryptography based on hard problems in number theory.Code-based hard problem is recognized as NP-complete problem, the complexity increases exponentially, and there is currently no threat of quantum computing to code-based cryptographic algorithm.Therefore, code-based algorithm can resist the quantum algorithm attack, which is one of the main directions of quantum-resistant cryptography.It is still an open problem to design secure and efficient code-based signatures.For many years, international researchers use classical and new methods to construct code-based signatures, but existing constructions are weak in security or poor in performance.Code-based signatures were comprehensively summarized and analyzed, and future research directions were indicated.…”
Get full text
Article -
131
Proxy re-signature scheme based on isomorphisms of polynomial
Published 2017-02-01“…Most of the existing proxy resignature schemes were based on the hardness of big integer factoring,discrete logarithm,elliptic curve.However,none of them can resist the attack by a quantum computer.Motivated by these concerns,a new proxy resignature scheme was proposed.By employing secret affine transformations and homogeneous polynomials,the proposed scheme could implement the signature transformation with high-efficiency,and meanwhile it was secure against the attack by a quantum computer.The results of analysis showed that the proposed scheme was correct and consistent,and had the unforgeability in the random oracle model.Compared with the existing schemes,the proposed scheme not only inherits the resistance to quantum attack and high efficiency from the multivariate public key cryptosystems,but also has the properties of multi-use,transparent and private proxy.…”
Get full text
Article -
132
Optimizing the Electrical Interface for Large-Scale Color-Center Quantum Processors
Published 2024-01-01“…Quantum processors based on color centers in diamond are promising candidates for future large-scale quantum computers thanks to their flexible optical interface, (relatively) high operating temperature, and high-fidelity operation. …”
Get full text
Article -
133
Low-density parity-check representation of fault-tolerant quantum circuits
Published 2025-01-01“…In fault-tolerant quantum computing, quantum algorithms are implemented through quantum circuits capable of error correction. …”
Get full text
Article -
134
Lattice-based lightweight post quantum access authentication scheme for satellite network
Published 2024-10-01“…Aiming at the problems of quantum computing attacks, high authentication overhead and long interaction time in satellite network access authentication schemes, a lightweight post quantum access authentication scheme based on lattice for a satellite network was proposed. …”
Get full text
Article -
135
Geometric properties of quantum entanglement and machine learning
Published 2023-10-01“…The data was then displayed in a quantum state. A proprietary quantum computing emulator is used (it is in the public domain).Results. …”
Get full text
Article -
136
Post-quantum encryption technology based on BRLWE for internet of things
Published 2022-10-01“…With the development of quantum computers, the classical public key encryption system is not capable enough to guarantee the communication security of internet of things (IoT).Because the mathematical puzzles which post-quantum encryption algorithms are based on cannot yet be broken by quantum computers, these new algorithms have good anti-quantum computing security.In particular, the lattice-based cryptography is expected to become the main technology of the next generation public key cryptosystem.However, post-quantum encryption algorithms have the disadvantages of large amount of computation and high storage space.The communication efficiency of IoT will be affected if post-quantum encryption algorithms are directly applied to the lightweight device under IoT environment.In order to better guarantee the communication security and improve the commutation efficiency of IoT, Sym-BRLWE (symmetrical binary RLWE) encryption scheme was proposed.Sym-BRLWE was improved from the existing post-quantum encryption scheme based on BRLWE (binary ringlearning with errors) problem.Specifically, Sym-BRLWE encryption algorithm met the efficiency requirements of IoT via improving the random number selection on the discrete uniform distribution and the calculation of the polynomial multiplication.Sym-BRLWE encryption algorithm achieved high efficiency and high security via adding encryption security precautions, then it is more suitable for IoT lightweight devices.From the security analysis, the proposed Sym-BRLWE encryption scheme had high security.It could theoretically resist lattice attacks, timing attacks, simple power analysis (SPA) and differential power analysis (DPA).From simulation experiments, which were carried out in a binary computing environment simulating an 8-bit micro-device, the proposed Sym-BRLWE encryption scheme has high efficiency and small key size in encryption and decryption.It could reduce the total encryption time by 30% to 40% when compared with other BRLWE-based encryption schemes with the parameter selection of the 140 bit quantum security level.…”
Get full text
Article -
137
Enhancing IoT security in smart grids with quantum-resistant hybrid encryption
Published 2025-01-01“…The proposed QRHE-IoT mechanism presents a promising solution to these challenges, offering robust security for smart grid communications in the face of emerging threats, including quantum computing.…”
Get full text
Article -
138
Potential quantum advantage for simulation of fluid dynamics
Published 2025-01-01“…In this paper, we suggest that a quantum advantage may exist for simulating fluid dynamics, paving the way for simulating nonlinear multiscale transport phenomena in a wide range of disciplines using quantum computing.…”
Get full text
Article -
139
Comparative study of quantum error correction strategies for the heavy-hexagonal lattice
Published 2025-02-01“…Topological quantum error correction is a milestone in the scaling roadmap of quantum computers, which targets circuits with trillions of gates that would allow running quantum algorithms for real-world problems. …”
Get full text
Article -
140
A Survey of Post-Quantum Cryptography Migration in Vehicles
Published 2025-01-01“…The advent of quantum computers makes asymmetric cryptographic algorithms insecure and vulnerable. …”
Get full text
Article