期刊文献+
共找到6篇文章
< 1 >
每页显示 20 50 100
A quantum federated learning framework for classical clients
1
作者 Yanqi Song Yusen Wu +4 位作者 Shengyao Wu Dandan Li qiaoyan wen Sujuan Qin Fei Gao 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2024年第5期1-10,共10页
Quantum federated learning(QFL)enables collaborative training of a quantum machine learning(QML)model among multiple clients possessing quantum computing capabilities,without the need to share their respective local d... Quantum federated learning(QFL)enables collaborative training of a quantum machine learning(QML)model among multiple clients possessing quantum computing capabilities,without the need to share their respective local data.However,the limited availability of quantum computing resources poses a challenge for each client to acquire quantum computing capabilities.This raises a natural question:Can quantum computing capabilities be deployed on the server instead?In this paper,we propose a QFL framework specifically designed for classical clients,referred to as CC-QFL,in response to this question.In each iteration,the collaborative training of the QML model is assisted by the shadow tomography technique,eliminating the need for quantum computing capabilities of clients.Specifically,the server constructs a classical representation of the QML model and transmits it to the clients.The clients encode their local data onto observables and use this classical representation to calculate local gradients.These local gradients are then utilized to update the parameters of the QML model.We evaluate the effectiveness of our framework through extensive numerical simulations using handwritten digit images from the MNIST dataset.Our framework provides valuable insights into QFL,particularly in scenarios where quantum computing resources are scarce. 展开更多
关键词 CLIENT SERVER QUANTUM
原文传递
Quantum private query: A new kind of practical quantum cryptographic protocol 被引量:8
2
作者 Fei Gao SuJuan Qin +1 位作者 Wei Huang qiaoyan wen 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2019年第7期10-21,共12页
This research aims to review the developments in the field of quantum private query(QPQ), a type of practical quantum cryptographic protocol. The primary protocol, as proposed by Jacobi et al., and the improvements in... This research aims to review the developments in the field of quantum private query(QPQ), a type of practical quantum cryptographic protocol. The primary protocol, as proposed by Jacobi et al., and the improvements in the protocol are introduced.Then, the advancements made in sability, theoretical security, and practical security are summarized. Additionally, we describe two new results concerning QPQ security. We emphasize that a procedure to detect outside adversaries is necessary for QPQ, as well as for other quantum secure computation protocols, and then briefly propose such a strategy. Furthermore, we show that the shift-and-addition or low-shift-and-addition technique can be used to obtain a secure real-world implementation of QPQ, where a weak coherent source is used instead of an ideal single-photon source. 展开更多
关键词 QUANTUM CRYPTOGRAPHY QUANTUM PRIVATE QUERY QUANTUM secure MULTIPARTY computation QUANTUM oblivious KEY transfer QUANTUM KEY distribution
原文传递
A lattice-based signcryption scheme without random oracles 被引量:5
3
作者 Xiuhua LU qiaoyan wen +2 位作者 Zhengping JIN Licheng WANG Chunli YANG 《Frontiers of Computer Science》 SCIE EI CSCD 2014年第4期667-675,共9页
In order to achieve secure signcryption schemes in the quantum era, Li Fagen et al. [Concurrency and Computation: Practice and Experience, 2012, 25(4): 2112-2122] and Wang Fenghe et al. [Applied Mathematics & Inf... In order to achieve secure signcryption schemes in the quantum era, Li Fagen et al. [Concurrency and Computation: Practice and Experience, 2012, 25(4): 2112-2122] and Wang Fenghe et al. [Applied Mathematics & Information Sciences, 2012, 6(1): 23-28] have independently extended the concept of signcryption to lattice-based cryptography. However, their schemes are only secure under the random or- acle model. In this paper, we present a lattice-based signcryp- tion scheme which is secure under the standard model. We prove that our scheme achieves indistinguishability against adaptive chosen-ciphertext attacks (IND-CCA2) under the learning with errors (LWE) assumption and existential unforgeability against adaptive chosen-message attacks (EUF- CMA) under the small integer solution (SIS) assumption. 展开更多
关键词 SIGNCRYPTION standard model lattice-based cryptography learning with errors problem small integer solution problem
原文传递
Novel quantum circuit implementation of Advanced Encryption Standard with low costs 被引量:3
4
作者 ZhenQiang Li BinBin Cai +5 位作者 HongWei Sun HaiLing Liu LinChun Wan SuJuan Qin qiaoyan wen Fei Gao 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2022年第9期11-26,共16页
In this study, we examine how the quantum circuit of the Advanced Encryption Standard(AES) can be optimized from two aspects, i.e., number of qubits and T-depth. To reduce the number of qubits, we present three kinds ... In this study, we examine how the quantum circuit of the Advanced Encryption Standard(AES) can be optimized from two aspects, i.e., number of qubits and T-depth. To reduce the number of qubits, we present three kinds of improved quantum circuits of S-box for different phases in the AES. We found that the number of qubits in the round function can be decreased by introducing the circuit sending |a> to |S(a)>. As a result, compared with the previous quantum circuits where 400/640/768 qubits are required,our circuits of AES-128/-192/-256 only require 270/334/398 qubits. To reduce the T-depth, we propose a new circuit of AES's S-box with a T-depth of 4. Accordingly, the T-depth of our AES-128/-192/-256 quantum circuits become 80/80/84 instead of120/120/126 in a previous study. 展开更多
关键词 AES S-BOX quantum circuit composite field arithmetic
原文传递
Quantum position verification in bounded-attack-frequencymodel
5
作者 Fei Gao Bin Liu qiaoyan wen 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2016年第11期17-27,共11页
In 2011, Buhrman et al. proved that it is impossible to design an unconditionally secure quantum position verification(QPV)protocol if the adversaries are allowed to previously share unlimited entanglements. Afterward... In 2011, Buhrman et al. proved that it is impossible to design an unconditionally secure quantum position verification(QPV)protocol if the adversaries are allowed to previously share unlimited entanglements. Afterwards, people started to design secure QPV protocols in practical settings, e.g. the bounded-storage model, where the adversaries' pre-shared entangled resources are supposed to be limited. Here we focus on another practical factor that it is very difficult for the adversaries to perform attack operations with unlimitedly high frequency. Concretely, we present a new kind of QPV protocols, called non-simultaneous QPV.And we prove the security of a specific non-simultaneous QPV protocol with the assumption that the frequency of the adversaries' attack operations is bounded, but no assumptions on their pre-shared entanglements or quantum storage. Actually, in our nonsimultaneous protocol, the information whether there comes a signal at present time is also a piece of command. It renders the adversaries "blind", that is, they have to execute attack operations with unlimitedly high frequency no matter whether a signal arrives, which implies the non-simultaneous QPV is also secure in the bounded-storage model. 展开更多
关键词 量子存储 攻击 高频模型 验证 位置 有界 存储模型 安全门
原文传递
Local discrimination scheme for some unitary operations
6
作者 TianQing Cao Fei Gao +2 位作者 GuoJing Tian ShuCui Xie qiaoyan wen 《Science China(Physics,Mechanics & Astronomy)》 SCIE EI CAS CSCD 2016年第9期39-45,共7页
It has been shown that for two different multipartite unitary operations U_1 and U_2, when tr(U_1~?U_2) = 0, they can always be perfectly distinguished by local operations and classical communication in the single-run... It has been shown that for two different multipartite unitary operations U_1 and U_2, when tr(U_1~?U_2) = 0, they can always be perfectly distinguished by local operations and classical communication in the single-run scenario. However, how to find the detailed scheme to complete the local discrimination is still a fascinating problem. In this paper, aiming at some U_1 and U_2 acting on the bipartite and tripartite space respectively, especially for U_1~?U_2 locally unitary equivalent to the high dimensional X-type hermitian unitary matrix V with trV = 0, we put forward the explicit local distinguishing schemes in the single-run scenario. 展开更多
关键词 判别 运算 地方特色 TRV 酉等价 酉矩阵 操作 运行
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部