Decoy-state method for quantum-key-distribution-based quantum private query

B Liu, S Xia, D Xiao, W Huang, B Xu, Y Li - Science China Physics …, 2022 - Springer
The quantum private query (QPQ) is a quantum solution for the symmetrically private
information retrieval problem. We study the security of quantum-key-distribution-based QPQ …

Efficient quantum arithmetic operation circuits for quantum image processing

HS Li, P Fan, H Xia, H Peng, GL Long - Science China Physics, Mechanics …, 2020 - Springer
Efficient quantum circuits for arithmetic operations are vital for quantum algorithms. A fault-
tolerant circuit is required for a robust quantum computing in the presence of noise …

An approach to cryptography based on continuous-variable quantum neural network

J Shi, S Chen, Y Lu, Y Feng, R Shi, Y Yang, J Li - Scientific reports, 2020 - nature.com
An efficient cryptography scheme is proposed based on continuous-variable quantum
neural network (CV-QNN), in which a specified CV-QNN model is introduced for designing …

Survey on quantum information security

H Zhang, Z Ji, H Wang, W Wu - China Communications, 2019 - ieeexplore.ieee.org
The security of classical cryptography based on computational complexity assumptions has
been severely challenged with the rapid development of quantum computers and quantum …

Quantum algorithms for anomaly detection using amplitude estimation

M Guo, H Liu, Y Li, W Li, F Gao, S Qin, Q Wen - Physica A: Statistical …, 2022 - Elsevier
Anomaly detection, as an important branch of machine learning, plays a critical role in fraud
detection, health care, intrusion detection, military surveillance, etc. An anomaly detection …

Efficient semi-quantum private comparison using single photons

PH Lin, T Hwang, CW Tsai - Quantum Information Processing, 2019 - Springer
This paper proposes an efficient semi-quantum private comparison protocol (SQPC) using
single photons, which allows two classical participants to securely compare the equality of …

A Quantum Richardson–Lucy image restoration algorithm based on controlled rotation operation and Hamiltonian evolution

H Ma, Z He, P Xu, Y Dong, X Fan - Quantum Information Processing, 2020 - Springer
The problems of the real-time and high-precision image processing, even the powerful
classical computers and their algorithms, are not satisfactory solution. With the emerging …

New quantum key agreement protocols based on cluster states

YG Yang, BR Li, SY Kang, XB Chen, YH Zhou… - Quantum Information …, 2019 - Springer
A new two-party quantum key agreement (QKA) protocol is proposed based on four-qubit
cluster states. Encoded four-qubit cluster states can be transmitted directly by means of …

Practical quantum anonymous private information retrieval based on quantum key distribution

YG Yang, BX Liu, GB Xu, YH Zhou… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Quantum Anonymous Private Information Retrieval (QAPIR) allows a user to retrieve an item
from a database anonymously thus achieving better user privacy. Recently, Khan et al …

Error tolerance bound in QKD-based quantum private query

CY Wei, XQ Cai, TY Wang, SJ Qin… - IEEE Journal on …, 2020 - ieeexplore.ieee.org
Most existing quantum private query (QPQ) protocols can hardly work in the presence of
noise. The user Alice may obtain a false database item in noisy environments and both …