Quantum Information Processing

Papers
(The TQCC of Quantum Information Processing is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-04-01 to 2024-04-01.)
ArticleCitations
Benchmarking the quantum approximate optimization algorithm81
A scheme for direct detection of qubit–environment entanglement generated during qubit pure dephasing69
On the universality of the quantum approximate optimization algorithm53
Novel quantum image compression and encryption algorithm based on DQWT and 3D hyper-chaotic Henon map51
An efficient quantum image steganography protocol based on improved EMD algorithm43
Novel methods to construct nonlocal sets of orthogonal product states in an arbitrary bipartite high-dimensional system43
Quantum image edge detection using improved Sobel mask based on NEQR40
Balanced k-means clustering on an adiabatic quantum computer36
Semi-quantum private comparison based on Bell states35
Quantum multi-image compression-encryption scheme based on quantum discrete cosine transform and 4D hyper-chaotic Henon map35
On the quantum correlations in two-qubit XYZ spin chains with Dzyaloshinsky–Moriya and Kaplan–Shekhtman–Entin-Wohlman–Aharony interactions34
A novel quantum blockchain scheme base on quantum entanglement and DPoS33
A secure controlled quantum image steganography algorithm33
High-capacity measurement-device-independent quantum secure direct communication32
Implementation of quantum walks on IBM quantum computers31
Classical symmetries and the Quantum Approximate Optimization Algorithm31
Quantum fast Poisson solver: the algorithm and complete and modular circuit design30
Semi-quantum private comparison protocol of size relation with d-dimensional Bell states30
Grover on $$\,SIMON\,$$28
A comparison of various classical optimizers for a variational quantum linear solver27
Image encryption using quantum 3-D Baker map and generalized gray code coupled with fractional Chen’s chaotic system27
Quantum image encryption algorithm based on bit-plane permutation and sine logistic map27
Empirical performance bounds for quantum approximate optimization26
Three-level quantum image encryption based on Arnold transform and logistic map26
Geometric distinguishability measures limit quantum channel estimation and discrimination26
Security analysis and improvement of a quantum multi-signature protocol26
Optimal control of traffic signals using quantum annealing24
Quantum correlations of tripartite entangled states under Gaussian noise24
Quantum K-nearest neighbor classification algorithm based on Hamming distance24
A hybrid classical-quantum approach for multi-class classification24
A novel dynamic quantum secret sharing in high-dimensional quantum system24
An efficient semi-quantum secret sharing protocol of specific bits24
New quantum codes from constacyclic and additive constacyclic codes23
Collective neutrino oscillations on a quantum computer23
Efficient and secure dynamic quantum secret sharing protocol based on bell states23
Unconstrained binary models of the travelling salesman problem variants for quantum optimization22
A privacy-preserving quantum sealed-bid auction protocol with EPR pairs22
Quantum algorithm for the advection–diffusion equation simulated with the lattice Boltzmann method22
Quantum circuit for the fast Fourier transform22
Quantitative wave–particle duality relations from the density matrix properties21
Quantum particle swarm optimization algorithm with the truncated mean stabilization strategy21
Efficient semi-quantum private comparison without using entanglement resource and pre-shared key21
Amplitude estimation via maximum likelihood on noisy quantum computer20
Lower bounds on circuit depth of the quantum approximate optimization algorithm20
The dual-threshold quantum image segmentation algorithm and its simulation20
Tunable optical response in a hybrid quadratic optomechanical system coupled with single semiconductor quantum well20
Digital quantum simulation of non-equilibrium quantum many-body systems20
Continuous variable B92 quantum key distribution protocol using single photon added and subtracted coherent states20
Enhancement of mechanical entanglement in hybrid optomechanical system20
Perfect quantum state transfer on diamond fractal graphs19
Theory of quantum games and quantum economic behavior19
Models in quantum computing: a systematic review19
Arbitrated quantum signature scheme with quantum teleportation by using two three-qubit GHZ states18
Probing tripartite entanglement and coherence dynamics in pure and mixed independent classical environments18
Implementation of efficient quantum search algorithms on NISQ computers18
Mediated semi-quantum secure direct communication18
Continuous-variable measurement-device-independent quantum key distribution via quantum catalysis18
Impact of graph structures for QAOA on MaxCut18
Quantum secure multi-party summation protocol based on blind matrix and quantum Fourier transform18
General quantum secret sharing scheme based on two qudit18
Fidelity of quantum teleportation in correlated quantum channels17
Quantum implementation and resource estimates for Rectangle and Knot17
Controlled asymmetric bidirectional quantum teleportation of two- and three-qubit states17
Quantum public-key designated verifier signature17
A dynamic programming approach for distributing quantum circuits by bipartite graphs17
A multimode quantum image representation and its encryption scheme17
Quantum discord based on linear entropy and thermal negativity of qutrit–qubit mixed spin chain under the influence of external magnetic field17
Enhancing nonlocal advantage of quantum coherence in correlated quantum channels17
Two-party secure semiquantum summation against the collective-dephasing noise17
Information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom17
An uncertainty view on complementarity and a complementarity view on uncertainty16
An efficient quantum identity authentication key agreement protocol without entanglement16
A review of quantum and hybrid quantum/classical blockchain protocols16
Multiparty mediated quantum secret sharing protocol16
Behavior of quantum discord, local quantum uncertainty, and local quantum Fisher information in two-spin-1/2 Heisenberg chain with DM and KSEA interactions16
Qutrit-based semi-quantum key distribution protocol16
Double-direction quantum cyclic controlled remote state preparation of two-qubit states16
Quantum contracts between Schrödinger and a cat16
A practical quantum designated verifier signature scheme for E-voting applications15
Bidirectional teleportation using coherent states15
QIRHSI: novel quantum image representation based on HSI color space model15
Probabilistic nonunitary gate in imaginary time evolution15
Security analysis of measurement-device-independent quantum secure direct communication15
The uncertainty of quantum channels in terms of variance15
Dynamics of a heterogeneous quantum Cournot duopoly with adjusting players and quadratic costs15
Novel two-party quantum private comparison via quantum walks on circle15
High-dimensional measurement-device-independent quantum secure direct communication15
A novel coherence-based quantum steganalysis protocol15
$${\mathbb {F}}_qR$$-linear skew constacyclic codes and their application of constructing quantum codes15
Quantum circuits design for evaluating transcendental functions based on a function-value binary expansion method14
RGB image classification with quantum convolutional ansatz14
Solving Burgers’ equation with quantum computing14
Semi-quantum private comparison protocol with three-particle G-like states14
Quantum algorithms for typical hard problems: a perspective of cryptanalysis14
A quantum voting protocol using single-particle states14
Cluster-state-based quantum secret sharing for users with different abilities14
Emulation of high-performance correlation-based quantum clustering algorithm for two-dimensional data on FPGA14
Bidirectional quantum teleportation using a five-qubit cluster state as a quantum channel14
Efficient quantum multi-hop communication based on Greenberger–Horne–Zeilinger states and Bell states14
A quantum image encryption algorithm based on the Feistel structure14
Entanglement-based quantum key distribution with untrusted third party14
Infinitely repeated quantum games and strategic efficiency13
Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms13
Quantum speedup of Monte Carlo integration with respect to the number of dimensions and its application to finance13
Comprehensive high-speed reconciliation for continuous-variable quantum key distribution13
A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing13
Cheating identifiable (k, n) threshold quantum secret sharing scheme13
Sum uncertainty relations based on metric-adjusted skew information12
Search on vertex-transitive graphs by lackadaisical quantum walk12
Dynamics of quantum correlations under intrinsic decoherence in a Heisenberg spin chain model with Dzyaloshinskii–Moriya interaction12
Quantum k-means algorithm based on trusted server in quantum cloud computing12
Cryptanalysis of limited resource semi-quantum secret sharing12
Hierarchy of quantum correlations under non-Markovian dynamics12
Multi-party quantum summation without a third party based on d-dimensional Bell states12
Dynamical characteristic of entropic uncertainty relation in the long-range Ising model with an arbitrary magnetic field12
Quantum k-means algorithm based on Manhattan distance12
Quantum network coding without loss of information12
Intrinsic decoherence effects on measurement-induced nonlocality12
Ping-pong quantum key distribution with trusted noise: non-Markovian advantage12
An exact qubit allocation approach for NISQ architectures12
Minimizing minor embedding energy: an application in quantum annealing11
Satellite-to-submarine quantum communication based on measurement-device-independent continuous-variable quantum key distribution11
Quantum algorithms for the generalized eigenvalue problem11
Comparison the performance of five-qubit IBM quantum computers in terms of Bell states preparation11
Controlling quantum coherence of a two-component Bose–Einstein condensate via an impurity atom11
Quantum locally linear embedding for nonlinear dimensionality reduction11
Teleportation of atomic external states on the internal degrees of freedom11
New quantum codes from constacyclic codes over a non-chain ring11
Embedding of complete graphs in broken Chimera graphs11
Advanced Alicki–Fannes–Winter method for energy-constrained quantum systems and its use11
Hierarchical remote preparation of an arbitrary two-qubit state with multiparty11
Joint remote preparation of single-photon three-qubit state with hyperentangled state via linear-optical elements11
An efficient semi-quantum private comparison without pre-shared keys11
Quantum Carnot cycle with inner friction11
Information-based approach towards a unified resource theory11
Two particles in measurement-based quantum heat engine without feedback control10
Connectivity matrix model of quantum circuits and its application to distributed quantum circuit optimization10
Quantum Stackelberg–Bertrand duopoly10
QPSO-CD: quantum-behaved particle swarm optimization algorithm with Cauchy distribution10
Enhancing the teleportation of quantum Fisher information by weak measurement and environment-assisted measurement10
Applications of Simon’s algorithm in quantum attacks on Feistel variants10
Nonlocal sets of orthogonal multipartite product states with less members10
General error mitigation for quantum circuits10
Efficient circular controlled quantum teleportation and broadcast schemes in the presence of quantum noises10
Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud10
Garden optimization problems for benchmarking quantum annealers10
Coopetition in quantum prisoner’s dilemma and COVID-1910
A Quantum Richardson–Lucy image restoration algorithm based on controlled rotation operation and Hamiltonian evolution10
Enhancing eavesdropping detection in quantum key distribution using disentropy measure of randomness10
Quantum k-uniform states for heterogeneous systems from irredundant mixed orthogonal arrays10
Efficient and scalable quantum walk algorithms via the quantum Fourier transform10
Classical benchmarking of Gaussian Boson Sampling on the Titan supercomputer10
Quantum multi-proxy blind signature based on cluster state10
Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information10
Non-binary entanglement-assisted stabilizer codes10
Analysis of efficient and secure dynamic quantum secret sharing protocol based on Bell states10
Quantum summation using d-level entanglement swapping10
Single plasmon router with two quantum dots side coupled to two plasmonic waveguides with a junction9
Quantum search for scaled hash function preimages9
Advanced exact synthesis of Clifford+T circuits9
Entanglement concentration service for the quantum Internet9
A cost-effective quantum protocol for secure multi-party multiplication9
Quantum-based anonymity and secure veto9
Cryptanalysis and improvement in semi-quantum private comparison based on Bell states9
Quantum anonymous ranking and selection with verifiability9
Quantum secure multi-party summation based on entanglement swapping9
Entanglement-assisted quantum error-correcting codes from RS codes and BCH codes with extension degree 29
Quantum secret sharing for a class of special hypergraph access structures9
Quantum state tomography with informationally complete POVMs generated in the time domain9
Entanglement dynamics of two coupled spins interacting with an adjustable spin bath: effect of an exponential variable magnetic field9
Optimal shape of STIRAP pulses for large dissipation at the intermediate level9
A novel quantum (t, n) threshold group signature based on d-dimensional quantum system9
Deterministic bidirectional controlled remote preparation without information splitting9
An 8.4 Gbps real-time quantum random number generator based on quantum phase fluctuation9
Quantum Bell states-based anonymous voting with anonymity trace9
On classical capacity of Weyl channels9
Two-qubit state recovery from amplitude damping based on weak measurement9
Improving the performance of decoy-state quantum digital signature with single-photon-added coherent sources8
Evaluation of Grover’s algorithm toward quantum cryptanalysis on ChaCha8
Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states8
An efficient design of reversible ternary full-adder/full-subtractor with low quantum cost8
Enhancement of photon–phonon entanglement transfer in optomechanics8
Plug-and-play sending-or-not-sending twin-field quantum key distribution8
Quantum Fisher information-based detection of genuine tripartite entanglement8
Simple analysis of security of the BB84 quantum key distribution protocol8
Resource analysis of quantum computing with noisy qubits for Shor’s factoring algorithms8
General condition of quantum teleportation by one-dimensional quantum walks8
Quantum walks defined by digraphs and generalized Hermitian adjacency matrices8
True experimental reconstruction of quantum states and processes via convex optimization8
Entanglement and U(D)-spin squeezing in symmetric multi-quDit systems and applications to quantum phase transitions in Lipkin–Meshkov–Glick D-level atom models8
Process tomography of robust dynamical decoupling with superconducting qubits8
An approach to constructing genuinely entangled subspaces of maximal dimension8
Shannon-limit approached information reconciliation for quantum key distribution8
Discrimination of POVMs with rank-one effects8
Deterministic tripartite sharing of an arbitrary single-qubit operation with the five-qubit cluster state in a given entanglement structure8
Quantum randomness protected against detection loophole attacks8
Pair state transfer8
Cryptanalysis and improvement of a (t, n) threshold group signature scheme8
Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security8
Finding broken gates in quantum circuits: exploiting hybrid machine learning8
Linear codes with arbitrary dimensional hull and their applications to EAQECCs8
Controlled quantum dialogue with authentication protocol on a basis of GHZ-like state8
Upperbounds on the probability of finding marked connected components using quantum walks8
Bidirectional teleportation for underwater quantum communications8
Spatial search on Johnson graphs by continuous-time quantum walk8
Preparation of entangled W states with cat-state qubits in circuit QED8
Quantum codes from Hermitian dual-containing constacyclic codes over $${\mathbb {F}}_{q^{2}}+{v}{\mathbb {F}}_{q^{2}}$$8
Coupled two-qubit engine and refrigerator in Heisenberg model8
High success standard quantum teleportation using entangled coherent state and two-level atoms in cavities8
Quantum entanglement in the anisotropic Heisenberg model with multicomponent DM and KSEA interactions8
Characterization of QUBO reformulations for the maximum k-colorable subgraph problem8
Feasible private set intersection in quantum domain8
An index theorem for split-step quantum walks8
Construction of a quantum Carnot heat engine cycle8
Three classes of new EAQEC MDS codes8
0.050134897232056