Quantum Software Engineering and Potential of Quantum Computing in Software Engineering Research: A Review
Research in software engineering is essential for improving development practices, leading
to reliable and secure software. Leveraging the principles of quantum physics, quantum …
to reliable and secure software. Leveraging the principles of quantum physics, quantum …
A secured quantum two-bit commitment protocol for communication systems
Bit commitment is an essential primitive in quantum cryptography. It is the basic building
block of many cryptographic protocols in which it provides security over distrustful parties …
block of many cryptographic protocols in which it provides security over distrustful parties …
Binary classification quantum neural network model based on optimized grover algorithm
W Zhao, Y Wang, Y Qu, H Ma, S Wang - Entropy, 2022 - mdpi.com
We focus on the problem that the Grover algorithm is not suitable for the completely
unknown proportion of target solutions. Considering whether the existing quantum classifier …
unknown proportion of target solutions. Considering whether the existing quantum classifier …
[PDF][PDF] Towards more reliable fixed phase quantum search algorithm
A Younes - Applied Mathematics & Information …, 2013 - digitalcommons.aaru.edu.jo
Building quantum devices using fixed operators is a must to simplify hardware construction
of a quantum computer. Quantum search engine is not an exception. In this paper, a fixed …
of a quantum computer. Quantum search engine is not an exception. In this paper, a fixed …
Enhanced quantum signature scheme using quantum amplitude amplification operators
Quantum signature is the use of the principles of quantum computing to establish a trusted
communication between two parties. In this paper, a quantum signature scheme using …
communication between two parties. In this paper, a quantum signature scheme using …
A secured half-duplex bidirectional quantum key distribution protocol against collective attacks
Quantum Key Distribution is a secure method that implements cryptographic protocols. The
applications of quantum key distribution technology have an important role: to enhance the …
applications of quantum key distribution technology have an important role: to enhance the …
Design of Quantum Associative Classifier based on Hamming Distance and Grover's Algorithm
L Meng, Z Li, P Li - International Journal of Theoretical Physics, 2024 - Springer
In this paper, we design a quantum associative classifier, which includes pattern storage
and pattern classification. For pattern storage, we present a method to construct quantum …
and pattern classification. For pattern storage, we present a method to construct quantum …
Quantum search for unknown number of target items by hybridizing fixed-point method with trail-and-error method
T Li, S Zhang, XQ Fu, X Wang, Y Wang, J Lin… - Chinese …, 2019 - iopscience.iop.org
For the unsorted database quantum search with the unknown fraction λ of target items, there
are mainly two kinds of methods, ie, fixed-point and trail-and-error.(i) In terms of the fixed …
are mainly two kinds of methods, ie, fixed-point and trail-and-error.(i) In terms of the fixed …
Quantum algorithm for minimum dominating set problem with circuit design
H Zhang, S Wang, X Liu, Y Shen, Y Wang - Chinese Physics B, 2024 - iopscience.iop.org
Using quantum algorithms to solve various problems has attracted widespread attention with
the development of quantum computing. Researchers are particularly interested in using the …
the development of quantum computing. Researchers are particularly interested in using the …
Enhancing the security of quantum communication by hiding the message in a superposition
A Younes - Information Sciences, 2011 - Elsevier
A new method to hide specific quantum states in a superposition will be proposed. The
proposed method is used to hide an encrypted message in a superposition. The process of …
proposed method is used to hide an encrypted message in a superposition. The process of …