Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (60)

Search Parameters:
Keywords = IBM quantum computer

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
21 pages, 1271 KB  
Article
Feasibility and Limitations of Generalized Grover Search Algorithm-Based Quantum Asymmetric Cryptography: An Implementation Study on Quantum Hardware
by Tzung-Her Chen and Wei-Hsiang Hung
Electronics 2025, 14(19), 3821; https://doi.org/10.3390/electronics14193821 - 26 Sep 2025
Abstract
The emergence of quantum computing poses significant threats to conventional public-key cryptography, driving the urgent need for quantum-resistant cryptographic solutions. While quantum key distribution addresses secure key exchange, its dependency on symmetric keys and point-to-point limitations present scalability constraints. Quantum Asymmetric Encryption (QAE) [...] Read more.
The emergence of quantum computing poses significant threats to conventional public-key cryptography, driving the urgent need for quantum-resistant cryptographic solutions. While quantum key distribution addresses secure key exchange, its dependency on symmetric keys and point-to-point limitations present scalability constraints. Quantum Asymmetric Encryption (QAE) offers a promising alternative by leveraging quantum mechanical principles for security. This paper presents the first practical implementation of a QAE protocol on IBM Quantum devices, building upon the theoretical framework originally proposed by Yoon et al. We develop a generalized Grover Search Algorithm (GSA) framework that supports non-standard initial quantum states through novel diffusion operator designs, extending its applicability beyond idealized conditions. The complete QAE protocol, including key generation, encryption, and decryption stages, is translated into executable quantum circuits and evaluated on both IBM Quantum simulators and real quantum hardware. Experimental results demonstrate significant scalability challenges, with success probabilities deteriorating considerably for larger systems. The 2-qubit implementation achieves near-perfect accuracy (100% on the simulator, and 93.88% on the hardware), while performance degrades to 78.15% (simulator) and 45.84% (hardware) for 3 qubits, and declines critically to 48.08% (simulator) and 7.63% (hardware) for 4 qubits. This degradation is primarily attributed to noise and decoherence effects in current Noisy Intermediate-Scale Quantum (NISQ) devices, highlighting the limitations of single-iteration GSA approaches. Our findings underscore the critical need for enhanced hardware fidelity and algorithmic optimization to advance the practical viability of quantum cryptographic systems, providing valuable insights for bridging the gap between theoretical quantum cryptography and real-world implementations. Full article
Show Figures

Figure 1

28 pages, 3784 KB  
Article
Dicke State Quantum Search for Solving the Vertex Cover Problem
by Jehn-Ruey Jiang
Mathematics 2025, 13(18), 3005; https://doi.org/10.3390/math13183005 - 17 Sep 2025
Viewed by 198
Abstract
This paper proposes a quantum algorithm, named Dicke state quantum search (DSQS), to set qubits in the Dicke state |Dkn of D states in superposition to locate the target inputs or solutions of specific patterns among 2n unstructured [...] Read more.
This paper proposes a quantum algorithm, named Dicke state quantum search (DSQS), to set qubits in the Dicke state |Dkn of D states in superposition to locate the target inputs or solutions of specific patterns among 2n unstructured input instances, where n is the number of input qubits and D=nk=O(nk) for min(k,nk)n/2. Compared to Grover’s algorithm, a famous quantum search algorithm that calls an oracle and a diffuser O(2n) times, DSQS requires no diffuser and calls an oracle only once. Furthermore, DSQS does not need to know the number of solutions in advance. We prove the correctness of DSQS with unitary transformations, and show that each solution can be found by DSQS with an error probability less than 1/3 through O(nk) repetitions, as long as min(k,nk)n/2. Additionally, this paper proposes a classical algorithm, named DSQS-VCP, to generate quantum circuits based on DSQS for solving the k-vertex cover problem (k-VCP), a well-known NP-complete (NPC) problem. Complexity analysis demonstrates that DSQS-VCP operates in polynomial time and that the quantum circuit generated by DSQS-VCP has a polynomial qubit count, gate count, and circuit depth as long as min(k,nk)n/2. We thus conclude that the k-VCP can be solved by the DSQS-VCP quantum circuit in polynomial time with an error probability less than 1/3 under the condition of min(k,nk)n/2. Since the k-VCP is NP-complete, NP and NPC problems can be polynomially reduced to the k-VCP. If the reduced k-VCP instance satisfies min(k,nk)n/2, then both the instance and the original NP/NPC problem instance to which it corresponds can be solved by the DSQS-VCP quantum circuit in polynomial time with an error probability less than 1/3. All statements of polynomial algorithm execution time in this paper apply only to VCP instances and similar instances of other problems, where min(k,nk)n/2. Thus, they imply neither NP ⊆ BQP nor P = NP. In this restricted regime of min(k,nk)n/2, the Dicke state subspace has a polynomial size of D=nk=O(nk), and our DSQS algorithm samples from it without asymptotic superiority over exhaustive enumeration. Nevertheless, DSQS may be combined with other quantum algorithms to better exploit the strengths of quantum computation in practice. Experimental results using IBM Qiskit packages show that the DSQS-VCP quantum circuit can solve the k-VCP successfully. Full article
(This article belongs to the Section E1: Mathematics and Computer Science)
Show Figures

Figure 1

21 pages, 3968 KB  
Article
Entropy, Fidelity, and Entanglement During Digitized Adiabatic Quantum Computing to Form a Greenberger–Horne–Zeilinger (GHZ) State
by Nathan D. Jansen and Katharine L. C. Hunt
Entropy 2025, 27(9), 891; https://doi.org/10.3390/e27090891 - 23 Aug 2025
Viewed by 1065
Abstract
We analyzed the accuracy of digitized adiabatic quantum computing to form the entangled three-qubit Greenberger–Horne–Zeilinger (GHZ) state on two IBM quantum computers and four quantum simulators by comparison with direct calculations using a Python code (version 3.12). We initialized three-qubit systems in the [...] Read more.
We analyzed the accuracy of digitized adiabatic quantum computing to form the entangled three-qubit Greenberger–Horne–Zeilinger (GHZ) state on two IBM quantum computers and four quantum simulators by comparison with direct calculations using a Python code (version 3.12). We initialized three-qubit systems in the ground state of the Hamiltonian for noninteracting spins in an applied magnetic field in the x direction. We then gradually varied the Hamiltonian to an Ising model form with nearest-neighbor zz spin coupling with an eight-step discretization. The von Neumann entropy provides an indicator of the accuracy of the discretized adiabatic evolution. The von Neumann entropy of the density matrix from the Python code remains very close to zero, while the von Neumann entropy of the density matrices on the quantum computers increases almost linearly with the step number in the process. The GHZ witness operator indicates that the quantum simulators incorporate a GHZ component in part. The states on the two quantum computers acquire partial GHZ character, even though the trace of the product of the GHZ witness operator with the density matrix not only remains positive but also rises monotonically from Step 5 to Step 8. Each of the qubits becomes entangled during the adiabatic evolution in all of the calculations, as shown by the single-qubit reduced density matrices. Full article
(This article belongs to the Special Issue Quantum Probability and Randomness V)
Show Figures

Figure 1

12 pages, 1174 KB  
Article
Quantum Surface Topological Code for Bell State Stabilization in Superconducting Physical Qubit Systems
by Jordi Fabián González-Contreras, Erik Zamora, Jesús Yaljá Montiel-Pérez, Juan Humberto Sossa-Azuela, Elsa Rubio-Espino and Víctor Hugo Ponce-Ponce
Mathematics 2025, 13(13), 2041; https://doi.org/10.3390/math13132041 - 20 Jun 2025
Viewed by 1349
Abstract
Stabilizing quantum states in physical qubits quantum computers has been a widely explored topic in the Noisy Intermediate-Scale Quantum era. However, much of this work has focused on simulation rather than practical implementation. In this study, an experimental advancement in Bell state stabilization [...] Read more.
Stabilizing quantum states in physical qubits quantum computers has been a widely explored topic in the Noisy Intermediate-Scale Quantum era. However, much of this work has focused on simulation rather than practical implementation. In this study, an experimental advancement in Bell state stabilization is presented, which utilizes surface codes for quantum error correction across three quantum computers: ibm_fez, ibm_torino, and ibm_brisbane. Our findings indicate that error correction produces an improvement of approximately 3% in accuracy for 127-qubit systems while demonstrating a more significant enhancement of around 20% for 156-qubit systems in stabilizing the Bell state with fidelity up to 0.6 in all the experiments. This paper outlines the methodology for implementing this strategy in other applications, offering a pathway to improve results (20%) when experimenting with superconducting quantum computers. Full article
(This article belongs to the Special Issue Codes, Designs, Cryptography and Optimization, 3rd Edition)
Show Figures

Figure 1

20 pages, 1300 KB  
Article
QPUF: Quantum Physical Unclonable Functions for Security-by-Design of Industrial Internet-of-Things
by Venkata K. V. V. Bathalapalli, Saraju P. Mohanty, Chenyun Pan and Elias Kougianos
Cryptography 2025, 9(2), 34; https://doi.org/10.3390/cryptography9020034 - 27 May 2025
Viewed by 1927
Abstract
This research investigates the integration of quantum hardware-assisted security into critical applications, including the Industrial Internet-of-Things (IIoT), Smart Grid, and Smart Transportation. The Quantum Physical Unclonable Functions (QPUF) architecture has emerged as a robust security paradigm, harnessing the inherent randomness of quantum hardware [...] Read more.
This research investigates the integration of quantum hardware-assisted security into critical applications, including the Industrial Internet-of-Things (IIoT), Smart Grid, and Smart Transportation. The Quantum Physical Unclonable Functions (QPUF) architecture has emerged as a robust security paradigm, harnessing the inherent randomness of quantum hardware to generate unique and tamper-resistant cryptographic fingerprints. This work explores the potential of Quantum Computing for Security-by-Design (SbD) in the Industrial Internet-of-Things (IIoT), aiming to establish security as a fundamental and inherent feature. SbD in Quantum Computing focuses on ensuring the security and privacy of Quantum computing applications by leveraging the fundamental principles of quantum mechanics, which underpin the quantum computing infrastructure. This research presents a scalable and sustainable security framework for the trusted attestation of smart industrial entities in Quantum Industrial Internet-of-Things (QIoT) applications within Industry 4.0. Central to this approach is the QPUF, which leverages quantum mechanical principles to generate unique, tamper-resistant fingerprints. The proposed QPUF circuit logic has been deployed on IBM quantum systems and simulators for validation. The experimental results demonstrate the enhanced randomness and an intra-hamming distance of approximately 50% on the IBM quantum hardware, along with improved reliability despite varying error rates, coherence, and decoherence times. Furthermore, the circuit achieved 100% reliability on Google’s Cirq simulator and 95% reliability on IBM’s quantum simulator, highlighting the QPUF’s potential in advancing quantum-centric security solutions. Full article
(This article belongs to the Special Issue Emerging Topics in Hardware Security)
Show Figures

Figure 1

30 pages, 1732 KB  
Review
Theory and Applications of Quantum Hashing
by Farid Ablayev, Kamil Khadiev, Alexander Vasiliev and Mansur Ziiatdinov
Quantum Rep. 2025, 7(2), 24; https://doi.org/10.3390/quantum7020024 - 15 May 2025
Viewed by 2796
Abstract
We review recent results on quantum one-way functions, including quantum fingerprinting or quantum hashing (we use these two terms as synonyms even though they have very small difference). This includes the analysis of their properties, different modifications, circuit implementation on an IBM Q [...] Read more.
We review recent results on quantum one-way functions, including quantum fingerprinting or quantum hashing (we use these two terms as synonyms even though they have very small difference). This includes the analysis of their properties, different modifications, circuit implementation on an IBM Q platform, as well as on an experimental quantum setup. We discuss computational aspects of quantum hashing, its cryptographic properties and possible usage in communication protocols and algorithms. Full article
(This article belongs to the Special Issue 100 Years of Quantum Mechanics)
Show Figures

Figure 1

24 pages, 4919 KB  
Article
Quantum Error Mitigation in Optimized Circuits for Particle-Density Correlations in Real-Time Dynamics of the Schwinger Model
by Domenico Pomarico, Mahul Pandey, Riccardo Cioli, Federico Dell’Anna, Saverio Pascazio, Francesco V. Pepe, Paolo Facchi and Elisa Ercolessi
Entropy 2025, 27(4), 427; https://doi.org/10.3390/e27040427 - 14 Apr 2025
Cited by 1 | Viewed by 656
Abstract
Quantum computing gives direct access to the study of the real-time dynamics of quantum many-body systems. In principle, it is possible to directly calculate non-equal-time correlation functions, from which one can detect interesting phenomena, such as the presence of quantum scars or dynamical [...] Read more.
Quantum computing gives direct access to the study of the real-time dynamics of quantum many-body systems. In principle, it is possible to directly calculate non-equal-time correlation functions, from which one can detect interesting phenomena, such as the presence of quantum scars or dynamical quantum phase transitions. In practice, these calculations are strongly affected by noise, due to the complexity of the required quantum circuits. As a testbed for the evaluation of the real-time evolution of observables and correlations, the dynamics of the Zn Schwinger model in a one-dimensional lattice is considered. To control the computational cost, we adopt a quantum–classical strategy that reduces the dimensionality of the system by restricting the dynamics to the Dirac vacuum sector and optimizes the embedding into a qubit model by minimizing the number of three-qubit gates. The time evolution of particle-density operators in a non-equilibrium quench protocol is both simulated in a bare noisy condition and implemented on a physical IBM quantum device. In either case, the convergence towards a maximally mixed state is targeted by means of different error mitigation techniques. The evaluation of the particle-density correlation shows a well-performing post-processing error mitigation for properly chosen coupling regimes. Full article
(This article belongs to the Special Issue Entanglement in Quantum Spin Systems)
Show Figures

Figure 1

32 pages, 13498 KB  
Article
Solving Multidimensional Partial Differential Equations Using Efficient Quantum Circuits
by Manu Chaudhary, Kareem El-Araby, Alvir Nobel, Vinayak Jha, Dylan Kneidel, Ishraq Islam, Manish Singh, Sunday Ogundele, Ben Phillips, Kieran Egan, Sneha Thomas, Devon Bontrager, Serom Kim and Esam El-Araby
Algorithms 2025, 18(3), 176; https://doi.org/10.3390/a18030176 - 20 Mar 2025
Viewed by 1228
Abstract
Quantum computing has the potential to solve certain compute-intensive problems faster than classical computing by leveraging the quantum mechanical properties of superposition and entanglement. This capability can be particularly useful for solving Partial Differential Equations (PDEs), which are challenging to solve even for [...] Read more.
Quantum computing has the potential to solve certain compute-intensive problems faster than classical computing by leveraging the quantum mechanical properties of superposition and entanglement. This capability can be particularly useful for solving Partial Differential Equations (PDEs), which are challenging to solve even for High-Performance Computing (HPC) systems, especially for multidimensional PDEs. This led researchers to investigate the usage of Quantum-Centric High-Performance Computing (QC-HPC) to solve multidimensional PDEs for various applications. However, the current quantum computing-based PDE-solvers, especially those based on Variational Quantum Algorithms (VQAs) suffer from limitations, such as low accuracy, long execution times, and limited scalability. In this work, we propose an innovative algorithm to solve multidimensional PDEs with two variants. The first variant uses Finite Difference Method (FDM), Classical-to-Quantum (C2Q) encoding, and numerical instantiation, whereas the second variant utilizes FDM, C2Q encoding, and Column-by-Column Decomposition (CCD). We evaluated the proposed algorithm using the Poisson equation as a case study and validated it through experiments conducted on noise-free and noisy simulators, as well as hardware emulators and real quantum hardware from IBM. Our results show higher accuracy, improved scalability, and faster execution times in comparison to variational-based PDE-solvers, demonstrating the advantage of our approach for solving multidimensional PDEs. Full article
(This article belongs to the Section Algorithms for Multidisciplinary Applications)
Show Figures

Figure 1

27 pages, 8017 KB  
Article
Quantum Variational vs. Quantum Kernel Machine Learning Models for Partial Discharge Classification in Dielectric Oils
by José Miguel Monzón-Verona, Santiago García-Alonso and Francisco Jorge Santana-Martín
Sensors 2025, 25(4), 1277; https://doi.org/10.3390/s25041277 - 19 Feb 2025
Viewed by 1999
Abstract
In this paper, electrical discharge images are classified using AI with quantum machine learning techniques. These discharges were originated in dielectric mineral oils and were detected by a high-resolution optical sensor. The captured images were processed in a Scikit-image environment to obtain a [...] Read more.
In this paper, electrical discharge images are classified using AI with quantum machine learning techniques. These discharges were originated in dielectric mineral oils and were detected by a high-resolution optical sensor. The captured images were processed in a Scikit-image environment to obtain a reduced number of features or qubits for later training of quantum circuits. Two quantum binary classification models were developed and compared in the Qiskit environment for four discharge binary combinations. The first was a quantum variational model (QVM), and the second was a conventional support vector machine (SVM) with a quantum kernel model (QKM). The execution of these two models was realized on three fault-tolerant physical quantum IBM computers. The novelty of this article lies in its application to a real problem, unlike other studies that focus on simulated or theoretical data sets. In addition, a study is carried out on the impact of the number of qubits in QKM, and it is shown that increasing the number of qubits in this model significantly improves the accuracy in the classification of the four binary combinations studied. In the QVM, with two qubits, an accuracy of 92% was observed in the first discharge combination in the three quantum computers used, with a margin of error of 1% compared to the simulation obtained on classical computers. Full article
Show Figures

Figure 1

13 pages, 1405 KB  
Article
Quantum Private Set Intersection Scheme Based on Bell States
by Min Hou, Yue Wu and Shibin Zhang
Axioms 2025, 14(2), 120; https://doi.org/10.3390/axioms14020120 - 7 Feb 2025
Cited by 2 | Viewed by 817
Abstract
In this paper, we introduce a quantum private set intersection (QPSI) scheme that leverages Bell states as quantum information carriers. Our approach involves encoding private sets into Bell states using unitary operations, enabling the computation of the intersection between two private sets from [...] Read more.
In this paper, we introduce a quantum private set intersection (QPSI) scheme that leverages Bell states as quantum information carriers. Our approach involves encoding private sets into Bell states using unitary operations, enabling the computation of the intersection between two private sets from different users while keeping their individual sets undisclosed to anyone except for the intersection result. In our scheme, a semi-honest third party (TP) distributes the first and second qubits of the Bell states to the two users. Each user encodes their private sets by applying unitary operations on the received qubits according to predefined encoding rules. The modified sequence is encrypted and then sent back to TP, who can compute the set intersection without learning any information about the users’ private inputs. The simulation outcomes on the IBM quantum platform substantiate the viability of our scheme. We analyze the security and privacy aspects of the sets, showing that both external attacks and internal threats do not compromise the security of the private inputs. Furthermore, our scheme exhibits better practicality by utilizing easily implementable Bell states and unitary operations, rather than relying on multiple encoded states for set intersection calculations. Full article
(This article belongs to the Special Issue Recent Advances in Quantum Mechanics and Mathematical Physics)
Show Figures

Figure 1

19 pages, 3849 KB  
Article
Quantum Computation of the Cobb–Douglas Utility Function via the 2D Clairaut Differential Equation
by Isabel Cristina Betancur-Hinestroza, Éver Alberto Velásquez-Sierra, Francisco J. Caro-Lopera and Álvaro Hernán Bedoya-Calle
Quantum Rep. 2025, 7(1), 1; https://doi.org/10.3390/quantum7010001 - 29 Dec 2024
Cited by 1 | Viewed by 1468
Abstract
This paper introduces the integration of the Cobb–Douglas (CD) utility model with quantum computation using the Clairaut-type differential formula. We propose a novel economic–physical model employing envelope theory to establish a link with quantum entanglement, defining emergent probabilities in the optimal utility function [...] Read more.
This paper introduces the integration of the Cobb–Douglas (CD) utility model with quantum computation using the Clairaut-type differential formula. We propose a novel economic–physical model employing envelope theory to establish a link with quantum entanglement, defining emergent probabilities in the optimal utility function for two goods within a given expenditure limit. The study explores the interaction between the CD model and quantum computation, emphasizing system entropy and Clairaut differential equations in understanding utility’s optimal envelopes. Algorithms using the 2D Clairaut equation are introduced for the quantum formulation of the CD function, showcasing representation in quantum circuits for one and two qubits. Our findings, validated through IBM-Q simulations, align with the predictions, demonstrating the robustness of our approach. This methodology articulates the utility–budget relationship through envelope representation, where normalized intercepts signify probabilities. The precision of our results, especially in modeling quantum entanglement, surpasses that of IBM-Q simulations, which require extensive iterations for similar accuracy. Full article
Show Figures

Figure 1

18 pages, 401 KB  
Article
Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks
by Yongli Tang, Menghao Guo, Binyong Li, Kaixin Geng, Jinxia Yu and Baodong Qin
Entropy 2025, 27(1), 7; https://doi.org/10.3390/e27010007 - 26 Dec 2024
Viewed by 1292
Abstract
Currently, most quantum homomorphic encryption (QHE) schemes only allow a single evaluator (server) to accomplish computation tasks on encrypted data shared by the data owner (user). In addition, the quantum computing capability of the evaluator and the scope of quantum computation it can [...] Read more.
Currently, most quantum homomorphic encryption (QHE) schemes only allow a single evaluator (server) to accomplish computation tasks on encrypted data shared by the data owner (user). In addition, the quantum computing capability of the evaluator and the scope of quantum computation it can perform are usually somewhat limited, which significantly reduces the flexibility of the scheme in quantum network environments. In this paper, we propose a novel (t,n)-threshold QHE (TQHE) network scheme based on the Shamir secret sharing protocol, which allows k(tkn) evaluators to collaboratively perform evaluation computation operations on each qubit within the shared encrypted sequence. Moreover, each evaluator, while possessing the ability to perform all single-qubit unitary operations, is able to perform arbitrary single-qubit gate computation task assigned by the data owner. We give a specific (3, 5)-threshold example, illustrating the scheme’s correctness and feasibility, and simulate it on IBM quantum computing cloud platform. Finally, it is shown that the scheme is secure by analyzing encryption/decryption private keys, ciphertext quantum state sequences during transmission, plaintext quantum state sequence, and the result after computations on the plaintext quantum state sequence. Full article
(This article belongs to the Special Issue Nonlocality and Entanglement in Quantum Networks)
Show Figures

Figure 1

20 pages, 495 KB  
Article
Solving the Independent Domination Problem by the Quantum Approximate Optimization Algorithm
by Haoqian Pan and Changhong Lu
Entropy 2024, 26(12), 1057; https://doi.org/10.3390/e26121057 - 5 Dec 2024
Viewed by 1594
Abstract
In the wake of quantum computing advancements and quantum algorithmic progress, quantum algorithms are increasingly being employed to address a myriad of combinatorial optimization problems. Among these, the Independent Domination Problem (IDP), a derivative of the Domination Problem, has practical implications in various [...] Read more.
In the wake of quantum computing advancements and quantum algorithmic progress, quantum algorithms are increasingly being employed to address a myriad of combinatorial optimization problems. Among these, the Independent Domination Problem (IDP), a derivative of the Domination Problem, has practical implications in various real-world scenarios. Despite this, existing classical algorithms for the IDP are plagued by high computational complexity, and quantum algorithms have yet to tackle this challenge. This paper introduces a Quantum Approximate Optimization Algorithm (QAOA)-based approach to address the IDP. Utilizing IBM’s qasm_simulator, we have demonstrated the efficacy of the QAOA in solving the IDP under specific parameter settings, with a computational complexity that surpasses that of classical methods. Our findings offer a novel avenue for the resolution of the IDP. Full article
(This article belongs to the Special Issue Quantum Computing in the NISQ Era)
Show Figures

Figure 1

11 pages, 909 KB  
Article
Efficient Quantum Private Comparison with Unitary Operations
by Min Hou and Yue Wu
Mathematics 2024, 12(22), 3541; https://doi.org/10.3390/math12223541 - 13 Nov 2024
Cited by 10 | Viewed by 964
Abstract
Quantum private comparison (QPC) is a crucial component of quantum multiparty computing (QMPC), allowing parties to compare their private inputs while ensuring that no sensitive information is disclosed. Many existing QPC protocols that utilize Bell states encounter efficiency challenges. In this paper, we [...] Read more.
Quantum private comparison (QPC) is a crucial component of quantum multiparty computing (QMPC), allowing parties to compare their private inputs while ensuring that no sensitive information is disclosed. Many existing QPC protocols that utilize Bell states encounter efficiency challenges. In this paper, we present a novel and efficient QPC protocol that capitalizes on the distinct characteristics of Bell states to enable secure comparisons. Our method transforms private inputs into unitary operations on shared Bell states, which are then returned to a third party to obtain the comparison results. This approach enhances efficiency and decreases the reliance on complex quantum resources. A single Bell state can compare two classical bits, achieving a qubit efficiency of 100%. We illustrate the feasibility of the protocol through a simulation on the IBM Quantum Cloud Platform. The security analysis confirms that our protocol is resistant to both eavesdropping and attacks from participants. Full article
(This article belongs to the Section E4: Mathematical Physics)
Show Figures

Figure 1

19 pages, 2580 KB  
Article
A Hybrid Quantum-Classical Model for Stock Price Prediction Using Quantum-Enhanced Long Short-Term Memory
by Kimleang Kea, Dongmin Kim, Chansreynich Huot, Tae-Kyung Kim and Youngsun Han
Entropy 2024, 26(11), 954; https://doi.org/10.3390/e26110954 - 6 Nov 2024
Cited by 1 | Viewed by 6346
Abstract
The stock markets have become a popular topic within machine learning (ML) communities, with one particular application being stock price prediction. However, accurately predicting the stock market is a challenging task due to the various factors within financial markets. With the introduction of [...] Read more.
The stock markets have become a popular topic within machine learning (ML) communities, with one particular application being stock price prediction. However, accurately predicting the stock market is a challenging task due to the various factors within financial markets. With the introduction of ML, prediction techniques have become more efficient but computationally demanding for classical computers. Given the rise of quantum computing (QC), which holds great promise for being exponentially faster than current classical computers, it is natural to explore ML within the QC domain. In this study, we leverage a hybrid quantum-classical ML approach to predict a company’s stock price. We integrate classical long short-term memory (LSTM) with QC, resulting in a new variant called QLSTM. We initially validate the proposed QLSTM model by leveraging an IBM quantum simulator running on a classical computer, after which we conduct predictions using an IBM real quantum computer. Thereafter, we evaluate the performance of our model using the root mean square error (RMSE) and prediction accuracy. Additionally, we perform a comparative analysis, evaluating the prediction performance of the QLSTM model against several other classical models. Further, we explore the impacts of hyperparameters on the QLSTM model to determine the best configuration. Our experimental results demonstrate that while the classical LSTM model achieved an RMSE of 0.0693 and a prediction accuracy of 0.8815, the QLSTM model exhibited superior performance, achieving values of 0.0602 and 0.9736, respectively. Furthermore, the QLSTM outperformed other classical models in both metrics. Full article
(This article belongs to the Special Issue The Future of Quantum Machine Learning and Quantum AI)
Show Figures

Figure 1

Back to TopTop