<?xml version="1.0" encoding="utf-8"?>
    <rss version="2.0">
      <channel xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <title>Frontiers in Physics | Quantum Engineering and Technology section | New and Recent Articles</title>
        <link>https://www.frontiersin.org/journals/physics/sections/quantum-engineering-and-technology</link>
        <description>RSS Feed for Quantum Engineering and Technology section in the Frontiers in Physics journal | New and Recent Articles</description>
        <language>en-us</language>
        <generator>Frontiers Feed Generator,version:1</generator>
        <pubDate>2026-04-13T14:49:28.713+00:00</pubDate>
        <ttl>60</ttl>
        <item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2026.1772868</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2026.1772868</link>
        <title><![CDATA[Optical perspective on the time-dependent Dirac oscillator]]></title>
        <pubdate>2026-04-13T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Thiago T. Tsutsui</author><author>Alison A. Silva</author><author>Antonio S. M. de Castro</author><author>Fabiano M. Andrade</author>
        <description><![CDATA[The Dirac oscillator is a relativistic quantum system, characterized by its linearity in both position and momentum. Moreover, considering (1+1) and (2+1) dimensions, the system can be mapped onto the Jaynes-Cummings and anti = Jaynes–Cummings models, as illustrated in an exact manner by Bermudez et al., [Phys. Rev. A 76, 041,801(R) (2007)]. Using the optical counterparts of the Dirac oscillator, we analyze an extension of the model that incorporates a time-dependent frequency. We focus on the consequences of these time modulations on the angular momentum observables and spin-orbit entanglement. Noticeable changes in the Zitterbewegung are found. We show that a specific choice of time dependence yields aperiodic evolution of the observables, whereas an alternative choice allows analytical solutions. Our work has potential implications for simulating relativistic phenomena in optical platforms.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2026.1806357</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2026.1806357</link>
        <title><![CDATA[Efficient semi-quantum dialogue protocol using single-photon]]></title>
        <pubdate>2026-03-23T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Jian-Tao Cui</author><author>Jun-Yao Liu</author><author>Xiang-Jun Xin</author><author>Chao-Yang Li</author><author>Fa-Gen Li</author><author>Ling Zhang</author>
        <description><![CDATA[Semi-quantum dialogue (SQD) enables secure bidirectional communication even when one participant has limited quantum capabilities. In order to solve the problems of low efficiency and quantum resource constraints, an efficient SQD protocol using single-photon is proposed. In the SQD, one communicating party needs to have semi-quantum capabilities to complete the dialogue, which could consume lower quantum resource. Moreover, single photons as quantum channels significantly reduces both preparation and operational costs. Finally, decryption can be performed without any classical disclosure, effectively preventing potential information leakage. Security analysis demonstrates resilience against common attacks, including intercept-resend, measure-resend, entanglement-measurement, and Trojan horse attacks, with no information leakage. Compared with existing semi-quantum dialogue protocols, our proposed protocol consumes fewer quantum resources while achieving higher communication efficiency and enhanced security.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1647949</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1647949</link>
        <title><![CDATA[Low-energy dynamics of vibrating kinks]]></title>
        <pubdate>2026-02-17T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>J. Mateos Guilarte</author>
        <description><![CDATA[The low-energy dynamics of kinks and kink–antikink configurations in the Jackiw–Rebbi model are fully described. The strategy is based on the collective coordinates adiabatic approach. The necessary solution of quantum mechanical spectral problems, for both scalar and spinorial wave functions, is revealed as an intermediate step.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2026.1788075</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2026.1788075</link>
        <title><![CDATA[Editorial: Advancing quantum computation: optimizing algorithms and error mitigation in NISQ devices]]></title>
        <pubdate>2026-01-23T00:00:00Z</pubdate>
        <category>Editorial</category>
        <author>Jaewoo Joo</author>
        <description></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1750515</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1750515</link>
        <title><![CDATA[Robust watermarking for diffusion models using error-correcting codes and post-quantum key encapsulation]]></title>
        <pubdate>2026-01-20T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Xianglei Hu</author><author>Beining Zhang</author><author>Mawaheb Al-Dossari</author><author>N. S. Abd El-Gawaad</author><author>Mira Rakhimzhanova</author><author>Ahmad Saeed Khan</author>
        <description><![CDATA[Critical infrastructures increasingly rely on AI-generated content (AIGC) for monitoring, decision support, and autonomous control. This dependence creates new attack surfaces: forged maintenance imagery, manipulated diagnostic scans, or spoofed sensor visualisations can trigger unsafe actions, regulatory violations, or systemic disruption. This paper proposes a post-quantum watermarking framework designed for critical infrastructure security. We embed robust provenance markers directly into the latent space of diffusion models, rather than at the pixel level, and reinforce them using error-correcting codes (ECC) to ensure watermark recoverability even after aggressive distortions such as compression, cropping, noise injection, and filtering. To secure watermark keys in transit and at rest, we integrate Kyber, a lattice-based key encapsulation mechanism standardised for post-quantum cryptography, to protect the watermark stream key against quantum-enabled interception. The resulting scheme (i) preserves visual fidelity, (ii) supports reliable forensic attribution and auditability under hostile conditions, and (iii) remains cryptographically secure in the post-quantum era. Experiments show that the proposed ECC-hardened latent watermarking achieves consistently high extraction accuracy across diverse attacks while maintaining image quality, outperforming state-of-the-art diffusion watermarking baselines. We position this watermarking–encryption pipeline as an enabling mechanism for privacy-aware traceability, zero-trust validation, and quantum-resilient content governance in next-generation critical infrastructure.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1727394</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1727394</link>
        <title><![CDATA[Integrating blockchain with lattice-based cryptography for privacy-preserving and quantum-secure smart grid communications]]></title>
        <pubdate>2026-01-14T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Umair Habib</author><author>Mahwish Bano</author><author>Jawaid Iqbal</author><author>Fahima Hajjej</author><author>Insaf Ullah</author>
        <description><![CDATA[The Smart Grid (SG) is an upgraded electrical system integrated with Information and Communication Technology (ICT) to provide two-way data exchange between power consumers and manufacturers. This innovation facilitates smooth digital connectivity between smart devices like Smart Appliances (SAs), Smart Meters (SMs), and the Service Provider (SP), enabling remote data management to achieve enhanced energy distribution. However, using insecure wireless communications channels poses serious security threats, such as replay, impersonation, man-in-the-middle, and physical capture attacks. Numerous cryptographic algorithms, including RSA, Bilinear Pairing, Data Encryption Standard (DES), and Advanced Encryption Standard (AES), are used in existing studies to address the problem of information breakout. Furthermore, because the parameters and key space are so large, these methods suffer from higher computing costs and communication overhead. To resolve this issue, we have proposed a lattice-based privacy-preserving framework for the SG network that can withstand quantum attacks. Moreover, because quantum computers cannot solve the lattice-based hard problems, the lattice-based signcryption scheme is developed to resist quantum attacks. We have also integrated blockchain technology with the proposed scheme to make the data tamper-resistant and secure against adversary attacks. The proposed protocol is intended to offer data confidentiality, data integrity, and unforgeability. The proposed protocol also withstands several known attacks, such as Man-in-the-Middle (MITM), replay, known session key, insider, and post-quantum attacks. We have simulated our scheme using the AVISPA simulation program, which proves the efficiency and effectiveness of our proposed scheme in meeting the required security properties.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1733926</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1733926</link>
        <title><![CDATA[A quantum partial adiabatic evolution and its application to quantum search problem ]]></title>
        <pubdate>2026-01-08T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Jie Sun</author><author>Hui Zheng</author><author>Songfeng Lu</author>
        <description><![CDATA[This paper presents a framework for quantum partial adiabatic evolution and applies it to re-examine the well-known quantum search problem. We particularly focus on a detailed analysis of the algorithm’s success probability, which serves as a clear criterion for differentiating valid implementations from invalid ones. Specifically, when the time complexity aligns with the optimal quantum computation, the algorithm achieves a substantially high success probability. Conversely, so-called “improved” versions that exceed the quadratic speedup characteristic of quantum computing exhibit a negligibly low success probability with the increase of target elements. These findings underscore the critical importance of selecting the appropriate evolution interval and the correct method for calculating the success probability in studies of quantum partial adiabatic evolution.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1723966</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1723966</link>
        <title><![CDATA[Design and implementation of an authenticated post-quantum session protocol using ML-KEM (Kyber), ML-DSA (Dilithium), and AES-256-GCM]]></title>
        <pubdate>2026-01-08T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Akinlemi Olushola</author><author>S. P. Meenakshi</author>
        <description><![CDATA[IntroductionSession establishment, the process by which two parties authenticate each other and derive a shared secret key, forms the foundation for secure digital communication. Quantum computers threaten this foundation by breaking classical public-key primitives such as RSA and elliptic-curve Diffie–Hellman (ECDH), thereby enabling harvest-now–decrypt-later (HNDL) attacks that endanger long-term confidentiality.MethodsThis paper presents the design, implementation, and evaluation of an authenticated, quantum-resistant session protocol that replaces these vulnerable mechanisms with their post-quantum counterparts. The proposed protocol integrates ML-KEM-1024 (FIPS 203; CRYSTALS, Kyber) for ephemeral key exchange, ML-DSA-65 (FIPS 204; CRYSTALS, Dilithium) for endpoint authentication, and AES-256-GCM for symmetric protection. A transcript-bound HKDF–SHA3-256 key schedule and a 96-bit GCM nonce construction with conservative rekey limits are used to ensure forward secrecy, downgrade resistance, and message integrity. A Python/C prototype (PQClean ML-KEM-1024 with PyCryptodome AES-256-GCM) was benchmarked over 1,000 iterations on commodity hardware.ResultsThe results show that sub-millisecond cryptographic overhead ML-KEM-1024 matches the performance of X25519 while vastly outperforming RSA-3072 in secure session establishment, and symmetric encryption remains cost effective. Nonces are unique 96-bit values, never reused across directions or beyond 2³² records, following NIST SP 800-38D; when nonce-misuse resistance is required, AES-256-GCM-SIV (RFC 8452) is supported as a drop-in alternative. Empirical tests under both local and WAN-emulated (≈40 ms RTT) network conditions confirm that the additional post-quantum cost maintains the handshake cryptographic latency in the 0.50–0.70 ms range.DiscussionThese results demonstrate that fully authenticated, forward-secure, quantum-resistant session negotiation is practical for real-world deployments.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1640681</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1640681</link>
        <title><![CDATA[Measures and operators associated with Parseval distribution frames]]></title>
        <pubdate>2025-10-15T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Camillo Trapani</author><author>Francesco Tschinke</author>
        <description><![CDATA[Continuing the study by Tschinke et al. (2019), we examine further aspects of distribution frames (namely, Gel’fand and Parseval), particularly regarding those that are more relevant for applications in quantum physics. Parseval distribution frames are, in particular, closely related to coherent states. Thus, POV measures, Naimark dilations, and operators defined by Parseval distribution frames are the main subjects of this paper. The main results are Theorems 2.2 and 3.1. Theorem 2.2 gives a sufficient conditions for the existence of such distribution coherent states for positive operator valued measures. Theorem 3.1 establishes conditions under which the distribution coherent states can be identified with the projections of some Gel’fand distribution basis in a larger Hilbert space (in Naimark's sense).]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1568407</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1568407</link>
        <title><![CDATA[The anisotropic quantum Rabi model with diamagnetic term]]></title>
        <pubdate>2025-05-13T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Jorge A. Anaya-Contreras</author><author>Irán Ramos-Prieto</author><author>Arturo Zúñiga-Segundo</author><author>Héctor M. Moya-Cessa</author>
        <description><![CDATA[We employ a squeeze operator transformation approach to solve the anisotropic quantum Rabi model that includes a diamagnetic term. By carefully adjusting the amplitude of the diamagnetic term, we demonstrate that the anisotropic Rabi model with the A2 term can be exactly reduced to either a Jaynes-Cummings or an anti-Jaynes-Cummings model without requiring any approximations.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1468348</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1468348</link>
        <title><![CDATA[Transfer of knowledge through reverse annealing: a preliminary analysis of the benefits and what to share]]></title>
        <pubdate>2025-04-24T00:00:00Z</pubdate>
        <category>Brief Research Report</category>
        <author>Eneko Osaba</author><author>Esther Villar-Rodriguez</author>
        <description><![CDATA[Being immersed in the noisy intermediate-scale quantum (NISQ) era, current quantum annealers present limitations for solving optimization problems efficiently. To mitigate these limitations, D-Wave Systems developed a mechanism called reverse annealing, a specific type of quantum annealing designed to perform local refinement of good states found elsewhere. Despite the research activity around reverse annealing, no study has theorized about the possible benefits related to the transfer of knowledge under this paradigm. This work moves in that direction and is driven by experimentation focused on answering two key research questions: i) is reverse annealing a paradigm that can benefit from knowledge transfer between similar problems? and ii) can we infer the characteristics that an input solution should meet to help increase the probability of success? To properly guide the tests in this paper, the well-known knapsack problem has been chosen for benchmarking purposes, using a total of 34 instances composed of 14 and 16 items.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1544623</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1544623</link>
        <title><![CDATA[Hamiltonian formulations of centroid-based clustering]]></title>
        <pubdate>2025-04-22T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Myeonghwan Seong</author><author>Daniel Kyungdeock Park</author>
        <description><![CDATA[Clustering is a fundamental task in data science that aims to group data based on their similarities. However, defining similarity is often ambiguous, making it challenging to determine the most appropriate objective function for a given dataset. Traditional clustering methods, such as the k-means algorithm and weighted maximum k-cut, focus on specific objectives—typically relying on average or pairwise characteristics of the data—leading to performance that is highly data-dependent. Moreover, incorporating practical constraints into clustering objectives is not straightforward, and these problems are known to be NP-hard. In this study, we formulate the clustering problem as a search for the ground state of a Hamiltonian, providing greater flexibility in defining clustering objectives and incorporating constraints. This approach enables the application of various quantum simulation techniques, including both circuit-based quantum computation and quantum annealing, thereby opening a path toward quantum advantage in solving clustering problems. We propose various Hamiltonians to accommodate different clustering objectives, including the ability to combine multiple objectives and incorporate constraints. We evaluate the clustering performance through numerical simulations and implementations on the D-Wave quantum annealer. The results demonstrate the broad applicability of our approach to a variety of clustering problems on current quantum devices. Furthermore, we find that Hamiltonians designed for specific clustering objectives and constraints impose different requirements for qubit connectivity, indicating that certain clustering tasks are better suited to specific quantum hardware. Our experimental results highlight this by identifying the Hamiltonian that optimally utilizes the physical qubits available in the D-Wave System.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1582819</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1582819</link>
        <title><![CDATA[Constructing resource-efficient quantum circuits for AES]]></title>
        <pubdate>2025-04-22T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Liao-Liang Jiang</author><author>Bin-Bin Cai</author><author>Fei Gao</author><author>Su-Juan Qin</author><author>Zheng-Ping Jin</author><author>Qiao-Yan Wen</author>
        <description><![CDATA[An efficient quantum implementation of the advanced encryption standard (AES) is crucial for reducing the complexity of implementing an exhaustive key search through Grover’s algorithm. In this paper, we study how to construct resource-efficient quantum circuits for AES. We consider the product of T-gates depth and width (TDW) and the product of full depth and width (FDW) as optimization targets. We propose a generic method, called the controlled control qubit cascade (CCQC) technique, to construct quantum circuits for nonlinear components with reduced TDW and FDW. Using this, we construct a quantum circuit for the AES S-box. Compared with recent work presented at ASIACRYPT 2023, our S-box quantum circuit achieves reductions of 2.3% in TDW and 45.2% in FDW. Additionally, we propose a new key schedule strategy to reduce the full depth of the AES quantum circuit. Finally, the trade-offs between T-gates depth and width and the parallel numbers of S-box and TDW are analyzed.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1562928</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1562928</link>
        <title><![CDATA[Topological weak-measurement-induced geometric phases revisited]]></title>
        <pubdate>2025-04-15T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Graciana Puentes</author>
        <description><![CDATA[We present an analytical and numerical study of a class of geometric phase induced by weak measurements. In particular, we analyze the dependence of the geometric phase on the winding (W) of the polar angle (φ), upon a sequence of N weak measurements of increased magnitude (c), resulting in the appearance of a multiplicity of critical measurement-strength parameters where the geometric phase makes a |π| discrete jump. Adding to the novelty of our approach, we not only analyze the weak-measurement-induced geometric phase by a full analytic derivation, valid in the quasi-continuous limit (N→∞), but also we analyze the induced geometric phase numerically, thus enabling us to unravel the finite-N interplay of the geometric phase with the measurement-strength parameter, and its stability to perturbations in the measurements protocol.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1563674</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1563674</link>
        <title><![CDATA[Mutual authentication quantum key agreement protocol with single-particle measurement]]></title>
        <pubdate>2025-03-25T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Hao Yang</author><author>Zepu Yi</author><author>Songfeng Lu</author><author>Mu Wang</author>
        <description><![CDATA[In this paper, a mutual authentication quantum key agreement protocol with single-particle measurement is proposed. The participants can authenticate each other’s identity through their secret identity information and the entanglement property of Bell states. After the authentication phase, the participants can negotiate a private key with equal contribution. We prove that the proposed scheme is unconditional security. In comparison to the previous mutual authentication quantum key agreement protocols, the proposed method utilizes Bell states as the quantum resource states in both the identity authentication and key agreement stages. It requires single-particle measurement without the need for Bell measurements or the involvement of trusted or semi-trusted other participants. Additionally, our proposed scheme demonstrates significant advantages in terms of qubit efficiency.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1580425</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1580425</link>
        <title><![CDATA[Editorial: Advancements and challenges in quantum technologies using low-dimensional systems]]></title>
        <pubdate>2025-03-19T00:00:00Z</pubdate>
        <category>Editorial</category>
        <author>Nanrun Zhou</author><author>Omar Magana-Loaiza</author><author>Clebson Cruz</author>
        <description></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1551209</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1551209</link>
        <title><![CDATA[The role of quantum computing in advancing plasma physics simulations for fusion energy and high-energy]]></title>
        <pubdate>2025-03-05T00:00:00Z</pubdate>
        <category>Review</category>
        <author>Yifei Yang</author>
        <description><![CDATA[Its complexity constrains advancements in fusion energy and high energy applications driven by plasma physics, multiscale phenomena beyond classical computing limits. These transformative solutions, especially in plasma simulations, for which exponential speedup is possible, represent significant promise toward breakthroughs in sustainable energy and extreme state studies. In this review, Quantum Computing (QC) is explored as a means to drive plasma physics simulations forward by providing applications such as fusion energy and high-energy systems. This includes computational methods for simulating turbulence, wave-particle interactions, and Magnetohydrodynamic (MHD) instabilities that have near-quantum efficiency. We show that by integrating QC into plasma research, one can solve large-scale linear equations, compute eigenvalues, and optimize complex systems, performing better than classical methods. This discussion examines the potential of quantum computing for plasma physics, highlighting its current limitations, including hardware constraints and the need for specialized algorithms tailored to model complex plasma phenomena accurately. These challenges notwithstanding, QC has the potential to dramatically change plasma modeling and expedite the development of fusion reactors. QC represents a new approach to engineer away computational bottlenecks, providing unprecedented views of plasma behavior needed for sustainable energy breakthroughs. The results from this work underscore the continued importance of looking outside of plasma physics to realize QC’s full potential in advancing high-energy science.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1529188</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1529188</link>
        <title><![CDATA[Optimizing quantum convolutional neural network architectures for arbitrary data dimension]]></title>
        <pubdate>2025-03-03T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Changwon Lee</author><author>Israel F. Araujo</author><author>Dongha Kim</author><author>Junghan Lee</author><author>Siheon Park</author><author>Ju-Young Ryu</author><author>Daniel K. Park</author>
        <description><![CDATA[Quantum convolutional neural networks (QCNNs) represent a promising approach in quantum machine learning, paving new directions for both quantum and classical data analysis. This approach is particularly attractive due to the absence of the barren plateau problem, a fundamental challenge in training quantum neural networks (QNNs), and its feasibility. However, a limitation arises when applying QCNNs to classical data. The network architecture is most natural when the number of input qubits is a power of two, as this number is reduced by a factor of two in each pooling layer. The number of input qubits determines the dimensions (i.e., the number of features) of the input data that can be processed, restricting the applicability of QCNN algorithms to real-world data. To address this issue, we propose a QCNN architecture capable of handling arbitrary input data dimensions while optimizing the allocation of quantum resources such as ancillary qubits and quantum gates. This optimization is not only important for minimizing computational resources, but also essential in noisy intermediate-scale quantum (NISQ) computing, as the size of the quantum circuits that can be executed reliably is limited. Through numerical simulations, we benchmarked the classification performance of various QCNN architectures across multiple datasets with arbitrary input data dimensions, including MNIST, Landsat satellite, Fashion-MNIST, and Ionosphere. The results validate that the proposed QCNN architecture achieves excellent classification performance while utilizing a minimal resource overhead, providing an optimal solution when reliable quantum computation is constrained by noise and imperfections.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1541888</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1541888</link>
        <title><![CDATA[Quantum coherence and the bell inequality violation: a numerical experiment with the cavity QEDs]]></title>
        <pubdate>2025-02-28T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Suirong He</author><author>Yufen Li</author><author>J. Q. Liang</author><author>L. F. Wei</author>
        <description><![CDATA[Bell inequality violation has been widely tested by using the bipartite entangled pure states and properly encoding the local observables in various experimental platforms, and the detector-, local-, and random loopholes have already been closed. A natural question is, how to deliver the Bell inequality violation by properly encoding the local observables? Here, we show that the Bell inequality violation is directly related to the coherence degree, which is controllable by encoding the different local observables into the entangled state. With the usual space-like correlation detections, we show that the coherence degree can be measured and thus the Bell nonlocality can be tested. The feasibility of the proposal is demonstrated by a numerical experiment typically with the cavity quantum electrodynamic system, in which the coherence degrees of the locally encoded bipartite entangled state can be conveniently measured by the spectral detection of the driven cavity. The present work might provide a feasible approach to verify the Gisin theorem, i.e., Bell inequality can be violated for any bipartite entangled pure state, once the local observables are properly encoded into the entangled state for keeping the desirable coherence.]]></description>
      </item><item>
        <guid isPermaLink="true">https://www.frontiersin.org/articles/10.3389/fphy.2025.1542675</guid>
        <link>https://www.frontiersin.org/articles/10.3389/fphy.2025.1542675</link>
        <title><![CDATA[Efficient (k, n) threshold semi-quantum secret sharing protocol]]></title>
        <pubdate>2025-02-26T00:00:00Z</pubdate>
        <category>Original Research</category>
        <author>Jie Cao</author><author>Jinchao Xu</author>
        <description><![CDATA[Most (k, n) threshold quantum secret sharing protocols are fully quantum. The message receivers must be equipped with complex quantum devices so as to prepare various quantum resources and perform complex quantum operations, which may affect the practice of these protocols. On the other hand, the qubit efficiency of most (k, n) threshold quantum secret sharing protocols is not more than 1/2. To simplify the (k, n) threshold quantum secret sharing protocol and improve its practice and qubit efficiency, a new (k, n) threshold secret sharing protocol with semi-quantum properties is proposed. In this protocol, the dealer prepares decoy particles and sends them to the receivers. The receivers insert particles carrying secret information along with Z-basis decoy particles into the received particle sequence to generate mixed-particle sequences, which are returned to the dealer. The dealer measures the received particle sequences to check for eavesdropping and establishes shared secret keys with the receivers. With the shared secret keys, the dealer distributes the secret pieces among the receivers using Shamir’s secret sharing scheme. Multiple secret messages can be recovered by k or more receivers. The qubit efficiency of our protocol is k/n. For an (n, n) threshold protocol, the qubit efficiency would be 100%. The proposed scheme is based on single particles without using any entangled system. Therefore, its quantum resources are relatively easy to prepare. Receivers must only prepare simple Z-basis qubits. Its semi-quantum properties enhance practice implementation. The proposed protocol has robust security against various types of attacks, including eavesdropping, internal, and collusion attacks. Furthermore, it can resist the unitary attack, which is seldom analyzed in other protocols.]]></description>
      </item>
      </channel>
    </rss>