2020
DOI: 10.7498/aps.69.20200333
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous communication scheme based on quantum walk on Cayley graph

Abstract: Information security is the cornerstone and lifeblood of national security in the information society, and anonymous quantum communication is one of the important ways to protect information security. Using quantum walk randomness to effectively solve sensitive problems such as leakage of identity information. In this paper, an anonymous communication scheme based on quantum walks on the Cayley graph is proposed. First, both parties in the communication hide their identity information, and the sender Alice ano… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
5

Relationship

2
3

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 41 publications
0
6
0
Order By: Relevance
“…Since the vertices of the [6]-color code are trivalent and each face has X and Z stabilizers, the eigenvalue of the three adjacent stabilizers of the wrong qubit will be − 1. is information can then be used for error correction. It is shown in Figure 4.…”
Section: Neural Network Decoding Methods Of Color Codementioning
confidence: 99%
See 2 more Smart Citations
“…Since the vertices of the [6]-color code are trivalent and each face has X and Z stabilizers, the eigenvalue of the three adjacent stabilizers of the wrong qubit will be − 1. is information can then be used for error correction. It is shown in Figure 4.…”
Section: Neural Network Decoding Methods Of Color Codementioning
confidence: 99%
“…(1 ) color code C projection to surface code S (2 ) While defects e exist do (3 ) from S to get the observation P of e (4 ) greedy strategy selects the action a corresponding to the error e (5 ) perform action a on e (6 ) calculate the value r of performing action a on e (7 ) obtain the observation results O′ after the action a is executed (8 ) save the tuple (P, a, r, O′) (9 ) update deep neural Q network (10 ) end while (11 ) For systems with different Hamming distances, the point where the logical error rate is equal to the physical error rate is called level-1 pseudo-threshold, which is obtained by fitting the pseudo-threshold to the following formula [30]:…”
Section: Logical Error Rate Under Bit-flip Error Differentmentioning
confidence: 99%
See 1 more Smart Citation
“…Quantum computing and quantum information have made tremendous progress over the years, and technologies based on quantum communication and quantum error correction (QEC) are developing rapidly [1][2][3][4]. The robustness of quantum memory to outer noise and noise removal is an extremely significant resource for quantum fault tolerance [5][6][7][8][9].…”
Section: Introductionmentioning
confidence: 99%
“…[9][10][11] Subsequently, correlations as an important source are important to quantum communication and so on. [12][13][14][15] And quantum coherence related to correlations is also regarded as a fundamental resource in quantum information processing. [16][17][18][19] Recently, there are many works offering a set of elaborates that quantum entanglement is the key to reducing the time complexity from O(N) to O( √ N) in the Grover search algorithm.…”
Section: Introductionmentioning
confidence: 99%