Recognition: unknown
Quantum Vault: Secure Token Authentication Without Classical State Information Benchmarked on IBMQ
Pith reviewed 2026-05-07 04:08 UTC · model grok-4.3
The pith
A quantum vault stores copies of token states to enable authentication without revealing classical information, securing against forgery even on current noisy quantum computers.
A machine-rendered reading of the paper's core claim, the machinery that carries it, and where it could break.
Core claim
We propose storing a quantum copy of each token in a vault at the issuing agent instead of classical side information about the states. Anyone with a quantum channel to the vault can access this copy to authenticate tokens by consuming the pair, preventing forgery even if classical data is stolen. The protocol is tested on three IBMQ processors within a hardware-agnostic framework, achieving false-negative error probabilities lower than 10^{-4} and attack success probabilities lower than 10^{-18} for 200-token bills, while naturally providing unforgeability, traceability, revocability and public verifiability.
What carries the argument
The quantum vault, a stored quantum copy of the token state that any party can access for authentication by consuming the original and copy pair without enabling cloning or information leakage.
If this is right
- Genuine tokens are produced and authenticated with efficiency far higher than the modeled query attack scenario allows.
- For quantum bills of 200 tokens, successful attack probability remains below 10^{-18} even on the worst-performing IBMQ hardware tested.
- Any untrusted party with a quantum channel to the vault can perform authentication without gaining the ability to clone tokens.
- The scheme delivers standard unforgeability, traceability, and revocability as direct consequences of consuming the token pair during verification.
Where Pith is reading between the lines
- The vault approach could allow quantum money schemes to operate with less dependence on classical encryption layers for protecting state information.
- Extending the protocol to networks with multiple independent vaults might enable decentralized verification while preserving the no-cloning security.
- Hardware-agnostic quality parameters identified here could serve as benchmarks for testing similar token protocols on future quantum devices with different noise profiles.
Load-bearing premise
That a quantum copy stored in the vault can be used for authentication by any party with a quantum channel without enabling cloning or information leakage, and that the modeled query attack accurately represents real-world threats on noisy hardware.
What would settle it
An experiment on similar hardware showing an attack success probability above 10^{-18} for 200-token bills or a demonstration that the vault copy can be cloned or measured without consuming the original token pair.
Figures
read the original abstract
Quantum tokens are underlying primitives for quantum money and network proposals, which leverage the no-cloning theorem to realize unforgeable authentication. A relevant but overlooked type of attack to such architectures is a hacker that steals the classical side information of the token states from the issuing agent (e.g. a bank), allowing the forgery of fake tokens without violating no-cloning theorem. Our proposal avoids this threat by removing classical side information about the token states, where instead a copy of the token is stored at the bank, i.e. a quantum vault. This copy can be accessed by anyone to perform authentication, consuming the token pair in the process. Our protocol is benchmarked and quality parameters are identified within a hardware agnostic framework employing three cloud-based IBM quantum (IBMQ) processors, such that the protocol is applicable to arbitrary quantum platforms. By comparing the efficiency with which genuine tokens are produced and authenticated with a possible query attack scenario, we demonstrate the security of the protocol. Where we achieve probabilities lower than $10^{-4}$ for false-negative errors and $10^{-18}$ for successful attacks when considering quantum bills composed of 200 tokens, even in the worst performing hardware. The quantum vault not only symmetrically protects both user and bank with the same quantum principles, but provides a step towards public key authentication, since any untrusted party can have authentication access granted from the bank to the tokens without being able to clone them, assuming they have a quantum channel with the vault. Besides public accessible verifiability, our proposal naturally achieves standard unforgeability, traceability and revocability.
Editorial analysis
A structured set of objections, weighed in public.
Referee Report
Summary. The manuscript proposes a quantum vault protocol for token authentication in which a quantum copy of each token is stored at the issuing bank rather than classical side information. Authentication is performed by granting quantum-channel access to the vault copy, which consumes the token pair. The protocol is benchmarked on three IBMQ processors; the authors claim false-negative error rates below 10^{-4} and successful attack probabilities below 10^{-18} for 200-token bills by comparing genuine-token efficiency against a modeled query-attack scenario. The work argues that the scheme simultaneously achieves unforgeability, traceability, revocability, and public verifiability while remaining hardware-agnostic.
Significance. If the security argument and experimental details can be strengthened, the result would be significant: it supplies an empirical demonstration of a quantum token scheme that eliminates classical side-information leakage while enabling public authentication over quantum channels. The hardware benchmarking on real IBMQ devices and the explicit comparison of genuine versus attack efficiencies are concrete strengths that could inform practical quantum-money and network primitives.
major comments (3)
- [§3 and §4] §3 (Protocol Description) and §4 (Security Argument): The central security claim rests on the assertion that the authentication interaction (swap test or equivalent) leaks no information usable for cloning or adaptive attacks when the vault copy is made available over a quantum channel. No game-based security reduction or analysis of possible information leakage (phase information, ancilla entanglement) is supplied. This is load-bearing for the public-verifiability claim.
- [§5] §5 (Experimental Results): The abstract and results section state concrete bounds (false-negative <10^{-4}, attack success <10^{-18} for 200 tokens) derived from IBMQ runs, yet no circuit diagrams, gate counts, shot numbers, error-mitigation methods, or statistical procedures (confidence intervals, hypothesis testing) are provided. Without these, the reported probabilities cannot be assessed for reproducibility or support of the extrapolated security figures.
- [§4.2] §4.2 (Query-Attack Model): The attack probability p is obtained by comparing genuine-token success rates to a specific query-attack strategy on noisy hardware. The model does not examine noise-aware attacks (entangling ancillas with the incoming vault state, applying calibration-drift unitaries, or exploiting crosstalk). No simulations of such strategies are reported, so the tightness of p^{200} < 10^{-18} remains unverified.
minor comments (3)
- [Abstract] The abstract refers to 'quality parameters' identified in a hardware-agnostic framework but does not list or define them explicitly; a short table or paragraph in §5 would improve clarity.
- [§5] Figures in §5 lack error bars on the reported success probabilities and do not clearly separate genuine-token versus attack-query data series; adding these would aid interpretation.
- [References] The manuscript would benefit from citing foundational quantum-money works (Wiesner 1983) and recent experimental token papers to situate the quantum-vault contribution.
Simulated Author's Rebuttal
We thank the referee for their thorough and constructive review. The comments have helped us clarify the security foundations, expand the experimental reporting, and refine the attack analysis. We have revised the manuscript to incorporate additional details and discussions as outlined below. Our point-by-point responses follow.
read point-by-point responses
-
Referee: [§3 and §4] §3 (Protocol Description) and §4 (Security Argument): The central security claim rests on the assertion that the authentication interaction (swap test or equivalent) leaks no information usable for cloning or adaptive attacks when the vault copy is made available over a quantum channel. No game-based security reduction or analysis of possible information leakage (phase information, ancilla entanglement) is supplied. This is load-bearing for the public-verifiability claim.
Authors: We agree that a formal game-based reduction would strengthen the presentation. Our security argument relies on the no-cloning theorem together with the fact that the swap-test authentication consumes both the user token and the vault copy, leaving no residual quantum state. In the revised manuscript we have expanded §4 with an explicit discussion of information leakage: the swap test projects onto the symmetric subspace and reveals only the overlap probability; any ancillary entanglement attempted by an adversary is destroyed by the measurement, and phase information is not extractable in a form usable for cloning. For public verifiability we emphasize that channel access is granted only for a single, state-consuming interaction. A complete cryptographic-game reduction (e.g., to unforgeability under adaptive quantum queries) lies beyond the scope of this hardware-focused work; we have added a limitations paragraph and pointers to related quantum-money proofs. revision: partial
-
Referee: [§5] §5 (Experimental Results): The abstract and results section state concrete bounds (false-negative <10^{-4}, attack success <10^{-18} for 200 tokens) derived from IBMQ runs, yet no circuit diagrams, gate counts, shot numbers, error-mitigation methods, or statistical procedures (confidence intervals, hypothesis testing) are provided. Without these, the reported probabilities cannot be assessed for reproducibility or support of the extrapolated security figures.
Authors: We thank the referee for highlighting this omission. The revised §5 now contains: (i) explicit circuit diagrams for token preparation (parameterized single-qubit rotations plus CNOT entanglement) and the swap-test implementation; (ii) gate counts (typically 18–32 gates per token pair, device-dependent); (iii) shot counts of 8192 per circuit across repeated calibration cycles on the three IBMQ processors; (iv) error-mitigation details (readout-error matrix inversion and dynamical decoupling); and (v) statistical procedures (Clopper-Pearson binomial confidence intervals and two-sample t-tests confirming separation between genuine and attack distributions). The quoted bounds are conservative worst-case figures taken from the highest-error-rate device. revision: yes
-
Referee: [§4.2] §4.2 (Query-Attack Model): The attack probability p is obtained by comparing genuine-token success rates to a specific query-attack strategy on noisy hardware. The model does not examine noise-aware attacks (entangling ancillas with the incoming vault state, applying calibration-drift unitaries, or exploiting crosstalk). No simulations of such strategies are reported, so the tightness of p^{200} < 10^{-18} remains unverified.
Authors: Our query-attack model in §4.2 compares the observed genuine-token authentication efficiency against an adversary who issues crafted probe states over the quantum channel. In the revision we have added noise-model simulations (using IBMQ calibration data) of ancilla-entanglement attacks; these show that rapid decoherence on present-day hardware prevents any substantial improvement over the modeled p. Calibration drift and crosstalk are addressed by the hardware-agnostic calibration routines already employed; we have inserted a short discussion noting that these effects would require further study in future fault-tolerant regimes. The extrapolated p^{200} < 10^{-18} therefore remains a conservative hardware-derived bound. revision: partial
Circularity Check
No circularity: security bounds from direct hardware measurements and standard extrapolation
full rationale
The paper's security argument rests on experimental comparison of genuine-token success rates versus query-attack success rates measured on IBMQ hardware. The per-token attack probability is read off from these runs and then raised to the 200th power under an independence assumption to reach the 10^{-18} figure. This is ordinary statistical extrapolation from observed error rates, not a reduction of the claimed probabilities to parameters defined by the result itself. The protocol invokes the standard no-cloning theorem as an external premise rather than any self-referential definition, uniqueness theorem, or self-citation chain. No equations or claims in the provided text exhibit the patterns of self-definition, fitted-input-as-prediction, or ansatz smuggling. The derivation chain is therefore self-contained against the hardware benchmarks.
Axiom & Free-Parameter Ledger
free parameters (2)
- number of tokens per bill
- quality parameters for genuine vs attack discrimination
axioms (2)
- standard math No-cloning theorem: unknown quantum states cannot be perfectly copied.
- domain assumption Quantum states can be stored, transmitted, and measured on superconducting qubit hardware with known noise characteristics.
invented entities (1)
-
Quantum vault
no independent evidence
Reference graph
Works this paper leans on
-
[1]
a bank or mint) prepares an arbitrary quantum state|ψ⟩ with Bloch sphere angles(θ, ϕ)known only to itself and classically stores this information about the prepared state
Token Issuing:an issuing agent (e.g. a bank or mint) prepares an arbitrary quantum state|ψ⟩ with Bloch sphere angles(θ, ϕ)known only to itself and classically stores this information about the prepared state
-
[2]
T oken Storage:the issuing agent remotely trans- mits or physically delivers the state|ψ⟩ to the user, who stores it until authentication is required
-
[3]
Quantum Vault: Secure Token Authentication Without Classical State Information Benchmarked on IBMQ
Token Authentication: the user presents their token to the authentication agent (e.g. a vendor, the bank or another user), who measures this state and compares with the initially prepared angles(θ, ϕ). If the measured state is close up to some acceptance range to the prepared state, the token is accepted. Here we use a terminology closer to quantum money ...
work page internal anchor Pith review Pith/arXiv arXiv 2026
-
[4]
Ferrazzini, Quantum, diplomacy, and geopolitics (2026), arXiv:2512.06052 [physics.soc-ph]
A. Ferrazzini, Quantum, diplomacy, and geopolitics (2026), arXiv:2512.06052 [physics.soc-ph]
-
[5]
QuantumCTek Co., China’s national quantum commu- nication backbone network (2017)
L. QuantumCTek Co., China’s national quantum commu- nication backbone network (2017)
2017
-
[6]
Q. C. Inc., Quantum corridor: Gateway to the quantum future (2025)
2025
-
[7]
Initiative, Qunet - quantum networks, https:// qunet-initiative.de/en/homepage/(2025)
Q. Initiative, Qunet - quantum networks, https:// qunet-initiative.de/en/homepage/(2025)
2025
-
[8]
D. T. T. GmbH and Partners, Demoquandt,https://www. forschung-it-sicherheit-kommunikationssysteme. de/projekte/demoquandt(2025)
2025
-
[9]
Gisin and R
N. Gisin and R. Thew, Quantum communication, Nature photonics1, 165 (2007)
2007
-
[10]
J. Yin, Y. Cao, Y.-H. Li, S.-K. Liao, L. Zhang, J.-G. Ren, W.-Q. Cai, W.-Y. Liu, B. Li, H. Dai,et al., Satellite-based entanglement distribution over 1200 kilometers, Science 356, 1140 (2017)
2017
-
[11]
ID Quantique, ID Quantique – Quantum-Safe Security Solutions, https://www.idquantique.com/ (2026), ac- cessed: March 17, 2026
2026
-
[12]
Mind the gaps: The fraught road to quantum advantage
J. Eisert and J. Preskill, Mind the gaps: The fraught road to quantum advantage (2025), arXiv:2510.19928 [quant- ph]
-
[13]
J. L. Park, The concept of transition in quantum mechan- ics, Foundations of Physics1, 23 (1970)
1970
-
[14]
Yamaguchi and A
K. Yamaguchi and A. Kempf, Encrypted qubits can be cloned, Physical Review Letters136, 010801 (2026)
2026
-
[15]
Wiesner, Conjugate coding, ACM Sigact News15, 78 (1983)
S. Wiesner, Conjugate coding, ACM Sigact News15, 78 (1983)
1983
-
[17]
Pastawski, N
F. Pastawski, N. Y. Yao, L. Jiang, M. D. Lukin, and J. I. Cirac, Unforgeable noise-tolerant quantum tokens, PNAS 109, 16079 (2012)
2012
-
[18]
Schiansky, J
P. Schiansky, J. Kalb, E. Sztatecsny, M.-C. Roehsner, T. Guggemos, A. Trenti, M. Bozzio, and P. Walther, Demonstration of quantum-digital payments, nature com- munications14, 3849 (2023). 10
2023
-
[19]
D. Gottesman and I. Chuang, Quantum digital signatures, arXiv preprint quant-ph/0105032 (2001)
-
[20]
Julià Farré, V
P. Julià Farré, V. Galetsky, M. Belhassen, G. Pieplow, K. Nilesh, H. Boche, T. Schröder, J. Nötzel, and C. Deppe, Secure authentication via quantum physical unclonable functions: A review, Advanced Quantum Technologies9, e00648 (2026)
2026
-
[21]
Dutta and A
A. Dutta and A. Pathak, A short review on quantum identity authentication protocols: how would bob know thatheistalkingwithalice? a.dutta, a.pathak,Quantum Information Processing21, 369 (2022)
2022
-
[22]
Tsunaki, B
L. Tsunaki, B. Bauerhenne, M. Xibraku, M. E. Garcia, K. Singer, and B. Naydenov, Ensemble-based quantum token protocol benchmarked on ibm quantum processors, Quantum Science and Technology (2025)
2025
-
[23]
Bauerhenne, L
B. Bauerhenne, L. Tsunaki, J. Thieme, B. Naydenov, and K. Singer, Security analysis of ensemble-based quantum token protocol under advanced attacks, Quantum Science and Technology (2025)
2025
-
[24]
Y. Strocka, M. Belhassen, T. Schröder, and G. Pieplow, Secure quantum token processing with color centers in diamond (2025), arXiv:2503.04985 [quant-ph]
- [25]
-
[26]
D. Gavinsky, D. Gilboa, S. Jain, D. Maslov, and J. R. McClean, Anonymous quantum tokens with classical veri- fication, arXiv preprint arXiv:2510.06212 (2025)
-
[27]
A. Behera and O. Sattath, Almost public quantum coins, arXiv preprint arXiv:2002.12438 (2020)
-
[28]
Radian and O
R. Radian and O. Sattath, Semi-quantum money, inPro- ceedings of the 1st ACM Conference on Advances in Fi- nancial Technologies(2019) pp. 132–146
2019
-
[29]
Jiráková, K
K. Jiráková, K. Bartkiewicz, A. Černoch, and K. Lemr, Experimentally attacking quantum money schemes based on quantum retrieval games, Scientific Reports9, 16318 (2019)
2019
-
[30]
Yuen, Noise-tolerant public-key quantum money from a classical oracle, Quantum9, 1691 (2025)
P. Yuen, Noise-tolerant public-key quantum money from a classical oracle, Quantum9, 1691 (2025)
2025
-
[31]
Shmueli, Public-key quantum money with a classical bank, inProceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing(2022) pp
O. Shmueli, Public-key quantum money with a classical bank, inProceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing(2022) pp. 790–803
2022
-
[32]
Gavinsky, Quantum money with classical verification, in2012 IEEE 27th Conference on Computational Com- plexity(2012) pp
D. Gavinsky, Quantum money with classical verification, in2012 IEEE 27th Conference on Computational Com- plexity(2012) pp. 42–52
2012
-
[33]
Wehner, D
S. Wehner, D. Elkouss, and R. Hanson, Quantum inter- net: A vision for the road ahead, Science362, eaam9288 (2018)
2018
-
[34]
H. J. Kimble, The quantum internet, Nature453, 1023 (2008)
2008
-
[35]
H.Chen, H.Jia, X.Wu, X.Wang,andM.Wang,Quantum token for network authentication, in2021 IEEE Interna- tional Conference on Web Services (ICWS)(IEEE, 2021) pp. 688–692
2021
-
[36]
Molina, T
A. Molina, T. Vidick, and J. Watrous, Optimal counter- feiting attacks and generalizations for wiesner’s quantum money, inConference on Quantum Computation, Com- munication, and Cryptography(Springer, 2012) pp. 45–64
2012
-
[37]
A. Brodutch, D. Nagaj, O. Sattath, and D. Unruh, An adaptive attack on wiesner’s quantum money, arXiv preprint arXiv:1404.1507 (2014)
-
[38]
Bartkiewicz, A
K. Bartkiewicz, A. Černoch, G. Chimczak, K. Lemr, A. Miranowicz, and F. Nori, Experimental quantum forgery of quantum optical money, npj Quantum Infor- mation3, 7 (2017)
2017
-
[39]
A. Lutomirski, S. Aaronson, E. Farhi, D. Gosset, A. Has- sidim, J. Kelner, and P. Shor, Breaking and making quan- tum money: toward a new quantum cryptographic proto- col, arXiv preprint arXiv:0912.3825 (2009)
-
[40]
Aaronson, E
S. Aaronson, E. Farhi, D. Gosset, A. Hassidim, J. Kelner, and A. Lutomirski, Quantum money, Communications of the ACM55, 84 (2012)
2012
-
[41]
Accessed: March 31, 2026
Wikipedia contributors, XZ Utils backdoor, https: //en.wikipedia.org/wiki/XZ_Utils_backdoor (2024), wikipedia, The Free Encyclopedia. Accessed: March 31, 2026
2024
-
[42]
Accessed: March 31, 2026
Chainalysis, 2025 crypto theft reaches $3.4 billion, https://www.chainalysis.com/blog/ crypto-hacking-stolen-funds-2026/ (2025), chainal- ysis 2026 Crypto Crime Report. Accessed: March 31, 2026
2025
-
[43]
Lyngaas, North korean hackers bug software used by thousands of US companies in potential crypto heist at- tempt, CNN Politics (2026), accessed: April 7, 2026
S. Lyngaas, North korean hackers bug software used by thousands of US companies in potential crypto heist at- tempt, CNN Politics (2026), accessed: April 7, 2026
2026
-
[44]
Broadbent, R
A. Broadbent, R. A. Kazmi, and C. Minwalla, A quan- tum vault scheme for digital currency, in2024 IEEE International Conference on Quantum Computing and Engineering (QCE), Vol. 1 (IEEE, 2024) pp. 239–249
2024
-
[45]
A. Javadi-Abhari, M. Treinish, K. Krsulich, C. J. Wood, J. Lishman, J. Gacon, S. Martiel, P. D. Nation, L. S. Bishop, A. W. Cross, B. R. Johnson, and J. M. Gambetta, Quantum computing with qiskit, arXiv2405.08810 (2024)
work page internal anchor Pith review arXiv 2024
-
[46]
Tsunakiet al., Github repository: Quantum vault, https://github.com/lucas-tsunaki/quantum_vault (2026)
L. Tsunakiet al., Github repository: Quantum vault, https://github.com/lucas-tsunaki/quantum_vault (2026)
2026
-
[47]
H. Tang, L. Banchi, T.-Y. Wang, X.-W. Shang, X. Tan, W.-H. Zhou, Z. Feng, A. Pal, H. Li, C.-Q. Hu, M. S. Kim, andX.-M.Jin,Generatinghaar-uniformrandomnessusing stochastic quantum walks on a photonic chip, Phys. Rev. Lett.128, 050503 (2022)
2022
-
[48]
X. Ma, X. Yuan, Z. Cao, B. Qi, and Z. Zhang, Quantum random number generation, npj Quantum Information2, 1 (2016)
2016
-
[49]
Bozzio, A
M. Bozzio, A. Cavaillès, E. Diamanti, A. Kent, and D. Pitalúa-García, Multiphoton and side-channel attacks in mistrustful quantum cryptography, PRX Quantum2, 030338 (2021)
2021
-
[50]
Z. Cai, R. Babbush, S. C. Benjamin, S. Endo, W. J. Hug- gins, Y. Li, J. R. McClean, and T. E. O’Brien, Quantum error mitigation, Rev. Mod. Phys.95, 045005 (2023)
2023
-
[51]
Tsunaki, M
L. Tsunaki, M. Dotan, K. Volkova, and B. Naydenov, Quantum gates via dynamical decoupling of a central qubit on ibmq and15N-vacancy centers in diamond, Phys. Rev. A113, 042627 (2026)
2026
-
[52]
X.-M. Hu, Y. Guo, B.-H. Liu, C.-F. Li, and G.-C. Guo, Progress in quantum teleportation, Nature Reviews Physics5, 339 (2023)
2023
-
[53]
W. Li, H. Sun, Y. Liu, T. Li, and R.-B. Wu, Flying-qubit control: Basics, progress, and outlook, Advanced Devices & Instrumentation5, 0059 (2024)
2024
-
[54]
S. M. Barnett, A. Chefles, and I. Jex, Comparison of two unknown pure quantum states, Physics Letters A307, 189 (2003). 11
2003
-
[55]
Barenco, A
A. Barenco, A. Berthiaume, D. Deutsch, A. Ekert, R. Jozsa, and C. Macchiavello, Stabilization of quan- tum computations by symmetrization, SIAM Journal on Computing26, 1541 (1997)
1997
-
[56]
Buhrman, R
H. Buhrman, R. Cleve, J. Watrous, and R. De Wolf, Quan- tum fingerprinting, Physical review letters87, 167902 (2001)
2001
-
[57]
H. Nishimura, A survey: Swap test and its applications to quantum complexity theory, inAlgorithmic Foundations for Social Advancement: Recent Progress on Theory and Practice(Springer, 2025) pp. 243–261
2025
-
[58]
G. B. Matson, Signal integration and the signal-to-noise ratio in pulsed nmr relaxation measurements, Journal of Magnetic Resonance (1969)25, 477 (1977)
1969
-
[59]
Y. Li, L. Liu, D. Xiao, H. Li, N. Sapermsap, J. Tian, Y. Chen, and D. D.-U. Li,Lifetime determination algo- rithms for time-domain fluorescence lifetime imaging: A review(IntechOpen, 2023)
2023
- [60]
-
[61]
R. J. Tibshirani and B. Efron, An introduction to the bootstrap, Monographs on statistics and applied proba- bility57, 1 (1993)
1993
-
[62]
AbuGhanem, Ibm quantum computers: evolution, performance, and future directions: M
M. AbuGhanem, Ibm quantum computers: evolution, performance, and future directions: M. abughanem, The Journal of Supercomputing81, 687 (2025)
2025
-
[63]
Mendoza Delgado, L
M. Mendoza Delgado, L. Tsunaki, S. Michaelson, J. Thieme, M. K. Kuntumalla, S. Trofimov, J. P. Reith- maier, K. Singer, A. Hoffman, B. Naydenov,et al., Tech- nological steps for realization of diamond-based quantum tokens, inInternational Scientific Conference Manage- ment and Engineering(Springer, 2024) pp. 29–45
2024
-
[64]
M. M. Delgado, L. Tsunaki, S. Michaelson, M. K. Kuntu- malla, J. P. Reithmaier, A. Hoffman, B. Naydenov, and C. Popov, Impact of annealing and nanostructuring on properties of nv centers created by different techniques, Diamond and Related Materials154, 112126 (2025)
2025
- [65]
-
[66]
Ben-David and O
S. Ben-David and O. Sattath, Quantum tokens for digital signatures, Quantum7, 901 (2023)
2023
-
[67]
M. E. Limes, N. Dural, M. Romalis, E. Foley, T. Kornack, A. Nelson, and L. Grisham, Long spin-1/2 noble gas coherence times in mm-sized anodically bonded batch- fabricated 3he-129xe-87rb cells, Applied Physics Letters 126(2025)
2025
-
[68]
Allmendinger, P
F. Allmendinger, P. Blümler, M. Doll, O. Grasdijk, W. Heil, K. Jungmann, S. Karpuk, H.-J. Krause, A. Of- fenhäusser, M. Repetto,et al., Precise measurement of magnetic field gradients from free spin precession signals of 3he and 129xe magnetometers, The European Physical Journal D71, 98 (2017)
2017
-
[69]
C. D. Bruzewicz, J. Chiaverini, R. McConnell, and J. M. Sage, Trapped-ion quantum computing: Progress and challenges, Applied physics reviews6(2019)
2019
-
[70]
Jessen, I
P. Jessen, I. Deutsch, and R. Stock, Quantum informa- tion processing with trapped neutral atoms, Quantum Information Processing3, 91 (2004)
2004
-
[71]
Thiering and A
G. Thiering and A. Gali, Chapter one - color centers in dia- mond for quantum applications, inDiamond for Quantum Applications Part 1, Semiconductors and Semimetals, Vol. 103, edited by C. E. Nebel, I. Aharonovich, N. Mizuochi, and M. Hatano (Elsevier, 2020) pp. 1–36
2020
-
[72]
R. J. D. Tilley, Color centers, inEncyclopedia of Color Science and Technology, edited by R. Luo (Springer New York, New York, NY, 2014) pp. 1–9
2014
-
[73]
Kent, S-money: virtual tokens for a relativistic econ- omy, Proceedings of the Royal Society A475, 20190170 (2019)
A. Kent, S-money: virtual tokens for a relativistic econ- omy, Proceedings of the Royal Society A475, 20190170 (2019)
2019
-
[74]
A. Kent, D. Lowndes, D. Pitalúa-García, and J. Rarity, Practical quantum tokens without quantum memories and experimental tests, npj Quantum Information8, 28 (2022)
2022
-
[75]
M. C. Pena, J.-C. Faugère, and L. Perret, Algebraic crypt- analysis of a quantum money scheme the noise-free case, inIACR International Workshop on Public Key Cryptog- raphy(Springer, 2015) pp. 194–213
2015
-
[76]
Fanizza, M
M. Fanizza, M. Rosati, M. Skotiniotis, J. Calsamiglia, and V. Giovannetti, Beyond the swap test: optimal estimation of quantum state overlap, Physical review letters124, 060503 (2020)
2020
discussion (0)
Sign in with ORCID, Apple, or X to comment. Anyone can read and Pith papers without signing in.