Quantum Information Processing

Papers
(The TQCC of Quantum Information Processing is 8. The table below lists those papers that are above that threshold based on CrossRef citation counts [max. 250 papers]. The publications cover those that have been published in the past four years, i.e., from 2020-07-01 to 2024-07-01.)
ArticleCitations
A scheme for direct detection of qubit–environment entanglement generated during qubit pure dephasing79
On the universality of the quantum approximate optimization algorithm57
Novel quantum image compression and encryption algorithm based on DQWT and 3D hyper-chaotic Henon map52
Quantum image edge detection using improved Sobel mask based on NEQR46
Novel methods to construct nonlocal sets of orthogonal product states in an arbitrary bipartite high-dimensional system45
An efficient quantum image steganography protocol based on improved EMD algorithm43
Quantum multi-image compression-encryption scheme based on quantum discrete cosine transform and 4D hyper-chaotic Henon map39
Balanced k-means clustering on an adiabatic quantum computer38
Semi-quantum private comparison protocol of size relation with d-dimensional Bell states36
A novel quantum blockchain scheme base on quantum entanglement and DPoS35
Classical symmetries and the Quantum Approximate Optimization Algorithm35
On the quantum correlations in two-qubit XYZ spin chains with Dzyaloshinsky–Moriya and Kaplan–Shekhtman–Entin-Wohlman–Aharony interactions35
High-capacity measurement-device-independent quantum secure direct communication34
Implementation of quantum walks on IBM quantum computers33
A secure controlled quantum image steganography algorithm33
Empirical performance bounds for quantum approximate optimization33
A comparison of various classical optimizers for a variational quantum linear solver32
Quantum K-nearest neighbor classification algorithm based on Hamming distance31
Grover on $$\,SIMON\,$$31
Quantum image encryption algorithm based on bit-plane permutation and sine logistic map30
Geometric distinguishability measures limit quantum channel estimation and discrimination30
An efficient semi-quantum secret sharing protocol of specific bits29
Unconstrained binary models of the travelling salesman problem variants for quantum optimization29
Three-level quantum image encryption based on Arnold transform and logistic map28
New quantum codes from constacyclic and additive constacyclic codes27
The dual-threshold quantum image segmentation algorithm and its simulation26
Optimal control of traffic signals using quantum annealing25
A hybrid classical-quantum approach for multi-class classification25
Quantum algorithm for the advection–diffusion equation simulated with the lattice Boltzmann method25
A novel dynamic quantum secret sharing in high-dimensional quantum system25
Quantum correlations of tripartite entangled states under Gaussian noise25
Collective neutrino oscillations on a quantum computer25
Security analysis and improvement of a quantum multi-signature protocol25
Tunable optical response in a hybrid quadratic optomechanical system coupled with single semiconductor quantum well24
A privacy-preserving quantum sealed-bid auction protocol with EPR pairs23
Quantum particle swarm optimization algorithm with the truncated mean stabilization strategy23
Enhancement of mechanical entanglement in hybrid optomechanical system23
Amplitude estimation via maximum likelihood on noisy quantum computer22
Models in quantum computing: a systematic review22
Continuous variable B92 quantum key distribution protocol using single photon added and subtracted coherent states22
Quantitative wave–particle duality relations from the density matrix properties22
Efficient semi-quantum private comparison without using entanglement resource and pre-shared key22
Quantum circuit for the fast Fourier transform22
Digital quantum simulation of non-equilibrium quantum many-body systems21
Controlled asymmetric bidirectional quantum teleportation of two- and three-qubit states20
General quantum secret sharing scheme based on two qudit20
Lower bounds on circuit depth of the quantum approximate optimization algorithm20
Mediated semi-quantum secure direct communication19
Quantum implementation and resource estimates for Rectangle and Knot19
Bidirectional quantum teleportation using a five-qubit cluster state as a quantum channel19
Theory of quantum games and quantum economic behavior19
Perfect quantum state transfer on diamond fractal graphs19
Continuous-variable measurement-device-independent quantum key distribution via quantum catalysis19
Information leakage resistant quantum dialogue with single photons in both polarization and spatial-mode degrees of freedom19
An efficient quantum identity authentication key agreement protocol without entanglement18
Bidirectional teleportation using coherent states18
Quantum discord based on linear entropy and thermal negativity of qutrit–qubit mixed spin chain under the influence of external magnetic field18
Quantum public-key designated verifier signature18
Quantum secure multi-party summation protocol based on blind matrix and quantum Fourier transform18
Two-party secure semiquantum summation against the collective-dephasing noise18
Qutrit-based semi-quantum key distribution protocol18
An uncertainty view on complementarity and a complementarity view on uncertainty18
Enhancing nonlocal advantage of quantum coherence in correlated quantum channels18
Multiparty mediated quantum secret sharing protocol18
Probing tripartite entanglement and coherence dynamics in pure and mixed independent classical environments18
Security analysis of measurement-device-independent quantum secure direct communication18
Implementation of efficient quantum search algorithms on NISQ computers18
Probabilistic nonunitary gate in imaginary time evolution18
Impact of graph structures for QAOA on MaxCut18
Novel two-party quantum private comparison via quantum walks on circle18
A dynamic programming approach for distributing quantum circuits by bipartite graphs17
Dynamics of a heterogeneous quantum Cournot duopoly with adjusting players and quadratic costs17
Quantum circuits design for evaluating transcendental functions based on a function-value binary expansion method17
A novel coherence-based quantum steganalysis protocol17
A multimode quantum image representation and its encryption scheme17
Solving Burgers’ equation with quantum computing17
Semi-quantum private comparison protocol with three-particle G-like states17
A practical quantum designated verifier signature scheme for E-voting applications16
Behavior of quantum discord, local quantum uncertainty, and local quantum Fisher information in two-spin-1/2 Heisenberg chain with DM and KSEA interactions16
A quantum voting protocol using single-particle states16
The uncertainty of quantum channels in terms of variance16
Quantum contracts between Schrödinger and a cat16
Double-direction quantum cyclic controlled remote state preparation of two-qubit states16
High-dimensional measurement-device-independent quantum secure direct communication16
QIRHSI: novel quantum image representation based on HSI color space model16
Cluster-state-based quantum secret sharing for users with different abilities15
Dynamics of quantum correlations under intrinsic decoherence in a Heisenberg spin chain model with Dzyaloshinskii–Moriya interaction15
Efficient quantum multi-hop communication based on Greenberger–Horne–Zeilinger states and Bell states15
RGB image classification with quantum convolutional ansatz15
A quantum image encryption algorithm based on the Feistel structure15
Teleportation of atomic external states on the internal degrees of freedom14
Entanglement-based quantum key distribution with untrusted third party14
Quantum speedup of Monte Carlo integration with respect to the number of dimensions and its application to finance14
Quantum k-means algorithm based on Manhattan distance14
Satellite-to-submarine quantum communication based on measurement-device-independent continuous-variable quantum key distribution14
Efficient circular controlled quantum teleportation and broadcast schemes in the presence of quantum noises14
Cryptanalysis and improvement in semi-quantum private comparison based on Bell states13
Infinitely repeated quantum games and strategic efficiency13
Multi-party quantum summation without a third party based on d-dimensional Bell states13
Quantum locally linear embedding for nonlinear dimensionality reduction13
Quantum forgery attacks on COPA, AES-COPA and marble authenticated encryption algorithms13
An exact qubit allocation approach for NISQ architectures13
A stronger participant attack on the measurement-device-independent protocol for deterministic quantum secret sharing13
Sum uncertainty relations based on metric-adjusted skew information13
Comprehensive high-speed reconciliation for continuous-variable quantum key distribution13
Cheating identifiable (k, n) threshold quantum secret sharing scheme13
Ping-pong quantum key distribution with trusted noise: non-Markovian advantage13
An efficient semi-quantum private comparison without pre-shared keys13
Quantum network coding without loss of information13
Non-binary entanglement-assisted stabilizer codes13
Hierarchical remote preparation of an arbitrary two-qubit state with multiparty13
Quantum k-means algorithm based on trusted server in quantum cloud computing13
Search on vertex-transitive graphs by lackadaisical quantum walk12
Dynamical characteristic of entropic uncertainty relation in the long-range Ising model with an arbitrary magnetic field12
Information-based approach towards a unified resource theory12
QPSO-CD: quantum-behaved particle swarm optimization algorithm with Cauchy distribution12
Hierarchy of quantum correlations under non-Markovian dynamics12
Garden optimization problems for benchmarking quantum annealers12
Nonlocal sets of orthogonal multipartite product states with less members12
Quantum Carnot cycle with inner friction11
A Quantum Richardson–Lucy image restoration algorithm based on controlled rotation operation and Hamiltonian evolution11
A cost-effective quantum protocol for secure multi-party multiplication11
Intrinsic decoherence effects on measurement-induced nonlocality11
Embedding of complete graphs in broken Chimera graphs11
Deterministic bidirectional controlled remote preparation without information splitting11
Advanced exact synthesis of Clifford+T circuits11
Characterization of QUBO reformulations for the maximum k-colorable subgraph problem11
Quantum secret sharing for a class of special hypergraph access structures11
A novel quantum (t, n) threshold group signature based on d-dimensional quantum system11
Quantum multi-proxy blind signature based on cluster state11
Perfect controlled joint remote state preparation of arbitrary multi-qubit states independent of entanglement degree of the quantum channel11
Coopetition in quantum prisoner’s dilemma and COVID-1911
Quantum public-key signature scheme based on asymmetric quantum encryption with trapdoor information11
Quantum search for scaled hash function preimages11
Quantum algorithms for the generalized eigenvalue problem11
New quantum codes from constacyclic codes over a non-chain ring11
Process tomography of robust dynamical decoupling with superconducting qubits10
Efficient and scalable quantum walk algorithms via the quantum Fourier transform10
Two particles in measurement-based quantum heat engine without feedback control10
Quantum secure multi-party summation based on entanglement swapping10
Feasible private set intersection in quantum domain10
Applications of Simon’s algorithm in quantum attacks on Feistel variants10
Quantum k-uniform states for heterogeneous systems from irredundant mixed orthogonal arrays10
General error mitigation for quantum circuits10
Classical benchmarking of Gaussian Boson Sampling on the Titan supercomputer10
Enhanced cloud security model using QKDP (ECSM-QKDP) for advanced data security over cloud10
Analysis of efficient and secure dynamic quantum secret sharing protocol based on Bell states10
Enhancing eavesdropping detection in quantum key distribution using disentropy measure of randomness10
Entanglement and U(D)-spin squeezing in symmetric multi-quDit systems and applications to quantum phase transitions in Lipkin–Meshkov–Glick D-level atom models10
Two-qubit state recovery from amplitude damping based on weak measurement10
Joint remote preparation of single-photon three-qubit state with hyperentangled state via linear-optical elements10
Connectivity matrix model of quantum circuits and its application to distributed quantum circuit optimization10
Quantum Stackelberg–Bertrand duopoly10
Enhancing the teleportation of quantum Fisher information by weak measurement and environment-assisted measurement10
Quantum summation using d-level entanglement swapping10
Quantum state tomography with informationally complete POVMs generated in the time domain10
An index theorem for split-step quantum walks9
Entanglement dynamics of two coupled spins interacting with an adjustable spin bath: effect of an exponential variable magnetic field9
Spatial search on Johnson graphs by continuous-time quantum walk9
Quantum codes from Hermitian dual-containing constacyclic codes over $${\mathbb {F}}_{q^{2}}+{v}{\mathbb {F}}_{q^{2}}$$9
Pair state transfer9
Entanglement-assisted quantum error-correcting codes from RS codes and BCH codes with extension degree 29
On classical capacity of Weyl channels9
Optimal shape of STIRAP pulses for large dissipation at the intermediate level9
Discrimination of POVMs with rank-one effects9
Cryptanalysis and improvement of a (t, n) threshold group signature scheme9
Resource analysis of quantum computing with noisy qubits for Shor’s factoring algorithms9
An 8.4 Gbps real-time quantum random number generator based on quantum phase fluctuation9
Quantum-based anonymity and secure veto9
Linear codes with arbitrary dimensional hull and their applications to EAQECCs9
Single plasmon router with two quantum dots side coupled to two plasmonic waveguides with a junction9
Deterministic tripartite sharing of an arbitrary single-qubit operation with the five-qubit cluster state in a given entanglement structure9
Learning bounds for quantum circuits in the agnostic setting9
Quantum Bell states-based anonymous voting with anonymity trace9
Bidirectional teleportation for underwater quantum communications8
Construction of a quantum Carnot heat engine cycle8
Three-party semi-quantum protocol for deterministic secure quantum dialogue based on GHZ states8
Coupled two-qubit engine and refrigerator in Heisenberg model8
Extraction of additional information during quantum ghost imaging and its processing8
High success standard quantum teleportation using entangled coherent state and two-level atoms in cavities8
Quantum key distribution with PRF(Hash, Nonce) achieves everlasting security8
Cryptanalysis and improvement of a semi-quantum private comparison protocol based on Bell states8
An improved hybrid quantum optimization algorithm for solving nonlinear equations8
Quantum walks defined by digraphs and generalized Hermitian adjacency matrices8
Three classes of new EAQEC MDS codes8
True experimental reconstruction of quantum states and processes via convex optimization8
Enhanced optomechanically induced transparency via atomic ensemble in optomechanical system8
Shannon-limit approached information reconciliation for quantum key distribution8
Plug-and-play sending-or-not-sending twin-field quantum key distribution8
q-Deformed three-level quantum logic8
Quantum Fisher information-based detection of genuine tripartite entanglement8
Quantum entanglement in the anisotropic Heisenberg model with multicomponent DM and KSEA interactions8
Enhancing entanglement of assistance using weak measurement and quantum measurement reversal in correlated amplitude damping channel8
General condition of quantum teleportation by one-dimensional quantum walks8
Quantum private comparison of size using d-level Bell states with a semi-honest third party8
Evaluation of Grover’s algorithm toward quantum cryptanalysis on ChaCha8
Upperbounds on the probability of finding marked connected components using quantum walks8
Construction of new quantum codes via Hermitian dual-containing matrix-product codes8
A quantum hash function with grouped coarse-grained boson sampling8
Quantum randomness protected against detection loophole attacks8
Cyclic teleportation in noisy channel with nondemolition parity analysis and weak measurement8
Rate-adaptive reconciliation with polar coding for continuous-variable quantum key distribution8
Semi-quantum secure direct communication in the curved spacetime8
Finding broken gates in quantum circuits: exploiting hybrid machine learning8
Controlled quantum dialogue with authentication protocol on a basis of GHZ-like state8
0.069189071655273