Quantum-Assisted Optimization and Security for Trustworthy AI-Driven Healthcare

Abstract: Digital health increasingly relies on artificial intelligence for clinical decision-making, patient management, and distributed learning, yet two persistent challenges remain: the computational complexity of optimization tasks, such as operating-room scheduling and genomic feature selection, and the need for robust security in federated and Internet-of-Medical-Things (IoMT) systems that are vulnerable to poisoning and spoofing attacks. […]

A Stable Hash Function Based on Parity-Dependent Quantum Walks With Memory (August 2023)

In this article, we develop a generic controlled alternate quantum walk model by combining parity-dependent quantum walks with distinct arbitrary memory lengths and propose a hash function (called QHFM-P) based on this model. The statistical properties of the proposed scheme are stable with respect to the coin parameters of the underlying controlled quantum walks, and […]

Continuous-Variable Quantum Secret Sharing in Fast-Fluctuating Channels

Recently, several continuous-variable quantum secret sharing (CV-QSS) protocols were proposed, while most of them are limited to the fiber channel systems with a relatively stable transmissivity. However, by means of complex channels, the transmissivity fluctuates dramatically in time with a probability distribution, which will lead to a fast-fluctuating attack. Therefore, the security analysis of CV-QSS […]

Approaching Collateral Optimization for NISQ and Quantum-Inspired Computing (May 2023)

Collateral optimization refers to the systematic allocation of financial assets to satisfy obligations or secure transactions while simultaneously minimizing costs and optimizing the usage of available resources. This involves assessing the number of characteristics, such as the cost of funding and quality of the underlying assets to ascertain the optimal collateral quantity to be posted […]

A Stable Hash Function Based on Parity-dependent Quantum Walks with Memory (August 2023)

In this paper, we develop a generic controlled alternate quantum-walk model (called CQWMP) by combining parity-dependent quantum walks with distinct arbitrary memory lengths and propose a hash function (called QHFM-P) based on this model. The statistical properties of the proposed scheme are stable with respect to the coin parameters of the underlying controlled quantum walks; […]

MIMO Terahertz Quantum Key Distribution Under Restricted Eavesdropping

Quantum key distribution (QKD) can provide unconditional security to next-generation communication networks guaranteed by the laws of quantum physics. This article studies the secret key rate (SKR) of a continuous variable QKD (CV-QKD) system using multiple-input multiple-output (MIMO) transmission and operating at terahertz (THz) frequencies. Distinct from previous works, we consider a practical “restricted” eavesdropping […]

Decentralization Using Quantum Blockchain: A Theoretical Analysis

Blockchain technology has been prominent recently due to its applications in cryptocurrency. Numerous decentralized blockchain applications have been possible due to blockchains’ nature of distributed, secured, and peer-to-peer storage. One of its technical pillars is using public-key cryptography and hash functions, which promise a secure, pseudoanonymous, and distributed storage with nonrepudiation. This security is believed […]

Versatile and Concurrent FPGA-Based Architecture for Practical Quantum Communication Systems

This article presents a hardware and software architecture, which can be used in those systems that implement practical quantum key distribution (QKD) and quantum random-number generation (QRNG) schemes. This architecture fully exploits the capability of a System on a Chip (SoC), which comprehends both a field-programmable gate array (FPGA) and a dual-core CPU unit. By […]

Versatile and Concurrent FPGA-Based Architecture for Practical Quantum Communication Systems

This article presents a hardware and software architecture, which can be used in those systems that implement practical quantum key distribution (QKD) and quantum random-number generation (QRNG) schemes. This architecture fully exploits the capability of a System on a Chip (SoC), which comprehends both a field-programmable gate array (FPGA) and a dual-core CPU unit. By […]

Attacking the Quantum Internet

The main service provided by the coming quantum Internet will be creating entanglement between any two quantum nodes. We discuss and classify attacks on quantum repeaters, which will serve roles similar to those of classical Internet routers. We have modeled the components for and structure of quantum repeater network nodes. With this model, we point […]