Shuquan Ma

ORCID: 0000-0003-1508-1870
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Quantum Information and Cryptography
  • Quantum Computing Algorithms and Architecture
  • Quantum Mechanics and Applications
  • Photonic and Optical Devices
  • Blockchain Technology Applications and Security
  • Cryptography and Data Security
  • Quantum and electron transport phenomena
  • Cloud Data Security Solutions
  • Advanced Optical Imaging Technologies
  • Orbital Angular Momentum in Optics
  • Quantum optics and atomic interactions
  • Random lasers and scattering media

China Electronics Technology Group Corporation
2023-2024

Xidian University
2017-2024

Universal blind quantum computation allows a client who has limited abilities to delegate his or her private an untrusted server. The first universal protocol was proposed by Broadbent, Fitzsimons, and Kashefi. In their work the resource is so-called brickwork state, which can be constructed number of specific single qubits. qubits in theory linearly related size circuit. However, due fixed structure states, actual usually far more than linear size. this we mainly construct three improved...

10.1103/physreva.109.012606 article EN Physical review. A/Physical review, A 2024-01-04

We proposed a method of optimizing random illumination pattern, to solve the problem that data acquisition is excessive when pattern used in computational ghost imaging. By introducing transverse and longitudinal cyclic shift with number moving pixels on original light field more uniform, which can further accelerate convergence reconstructing image quality sampling quantity relationship curve meanwhile reduce system sample rate. In this paper, peak signal noise ratio taken as evaluation...

10.1117/12.3018537 article EN 2024-04-30

In this paper, we propose a distributed secure delegated quantum computation protocol, by which an almost classical client can delegate (dk)-qubit circuit to d servers, where each server is equipped with 2k-qubit register that used process only k qubits of the circuit. None servers learn any information about input and output computation. The requirement for he or she has ability prepare four possible in state (|0⟩+eiθ|1⟩)/2, θ∈{0,π/2,π,3π/2}. pair them share some entangled states...

10.3390/e24060794 article EN cc-by Entropy 2022-06-07

Abstract Quantum computing on encrypted data allows a client who has limited quantum capacity to delegate his or her private computation an untrusted server, while the input and output are by one-time pad only can correctly decrypt them. Generally, is required have ability prepare some single qubits perform basic gates. In this work, we consider further restricted situation where one qubit gate. Specifically, show that as long fixed <?CDATA $\vert {+} \rangle$ ?> phase gate P , then he she...

10.1209/0295-5075/ac4fd2 article EN cc-by EPL (Europhysics Letters) 2022-01-28

In cryptography, an identity authentication protocol can be used to identify the legitimation of users in communication. Usually, it is totally irrelative with key distribution protocol. From this point view, we introduce a novel mutual scheme on basis measurement-device-independent quantum (MDI-QKD) protocol, which utilizes monogamous property Bell states. As result, our proposed achieve and one round. Besides, merge estimation error rate into processing authentication, make MDI-QKD more...

10.1109/cits.2017.8035307 article EN 2017-07-01

Verification in quantum computations is crucial since systems are extremely vulnerable to the environment. However, verifying directly output of a computation difficult we know that efficiently simulating large-scale on classical computer usually thought be impossible. To overcome this difficulty, propose self-testing system for computations, which can used verify if performed correctly by itself. Our basic idea using some extra ancilla qubits test computation. We design two kinds...

10.1088/1674-1056/abe29a article EN Chinese Physics B 2021-02-03
Coming Soon ...