Experimental photonic quantum memristor

M Spagnolo, J Morris, S Piacentini, M Antesberger… - Nature …, 2022 - nature.com
Memristive devices are a class of physical systems with history-dependent dynamics
characterized by signature hysteresis loops in their input–output relations. In the past few …

A survey of the fusion of traditional data security technology and blockchain

Y Xu, G Xu, Y Liu, Y Liu, M Shen - Expert Systems with Applications, 2024 - Elsevier
Blockchain is a new distributed infrastructure and computing paradigm, which has been
widely used in various fields. For example, utilizing a chain data structure to verify and …

Improved multiparty quantum private comparison based on quantum homomorphic encryption

JW Zhang, G Xu, XB Chen, Y Chang… - Physica A: Statistical …, 2023 - Elsevier
Quantum homomorphic encryption has obvious superiority in privacy protection. In this
paper, we propose an improved multiparty quantum private comparison protocol based on …

Hybrid quantum–classical convolutional neural networks with privacy quantum computing

S Huang, Y Chang, Y Lin, S Zhang - Quantum Science and …, 2023 - iopscience.iop.org
Abstract Machine learning algorithms help us discover knowledge from big data. Data used
for training or prediction often contain private information about users. Discovering …

Experimental Quantum Homomorphic Encryption Using a Quantum Photonic Chip

Y Li, L Cao, W Luo, H Zhang, H Cai, MF Karim, F Gao… - Physical Review Letters, 2024 - APS
A fully homomorphic encryption system enables computation on encrypted data without the
necessity for prior decryption. This facilitates the seamless establishment of a secure …

Demonstrating quantum homomorphic encryption through simulation

S Ganjian, C Paddock… - 2024 IEEE International …, 2024 - ieeexplore.ieee.org
Cloud computing allows clients with limited computational resources to offload computations
to more powerful remote servers. In this paradigm, homomorphic encryption (HE) schemes …

Quantum cryptography beyond key distribution: theory and experiment

M Bozzio, C Crépeau, P Wallden, P Walther - arXiv preprint arXiv …, 2024 - arxiv.org
Due to its fundamental principles, quantum theory holds the promise to enhance the security
of modern cryptography, from message encryption to anonymous communication, digital …

Cross quantum homomorphic encryption based on the butterfly network

X Pan, YT Lei, X Li, X Chen, G Long - Physical Review A, 2024 - APS
Quantum homomorphic encryption hides quantum information from unauthorized
participants while still allowing them to perform calculations on encrypted quantum …

Efficient source-independent quantum conference key agreement

Y Bao, YR Xiao, YC Song, XY Cao, Y Fu, HL Yin… - Optics …, 2024 - opg.optica.org
Quantum conference key agreement (QCKA) enables the unconditional secure distribution
of conference keys among multiple participants. Due to challenges in high-fidelity …

Do qubits dream of entangled sheep? Quantum measurement without classical output

N Lupu-Gladstein, A Brodutch, H Ferretti… - New Journal of …, 2024 - iopscience.iop.org
Quantum mechanics is usually formulated with an implicit assumption that agents who can
observe and interact with the world are external to it and have a classical memory. However …