entropy-logo

Journal Browser

Journal Browser

Nonlocality and Entanglement in Quantum Networks

A special issue of Entropy (ISSN 1099-4300). This special issue belongs to the section "Quantum Information".

Deadline for manuscript submissions: 31 July 2025 | Viewed by 1793

Special Issue Editors


E-Mail Website
Guest Editor
School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China
Interests: quantum network; quantum battery; quantum secure models; photonic quantum networks

E-Mail
Guest Editor
School of Information Science and Technology, Southwest Jiaotong University, Chengdu, China
Interests: quantum entanglement; quantum network; quantum battery

Special Issue Information

Dear Colleagues,

With advancements in quantum technology, the significance of quantum networks has become increasingly evident, particularly in leveraging nonlocality and quantum entanglement. Quantum networks not only capitalize on the entanglement of individual qubits, but also emphasize the nonlocal connections among multiple entangled particles, which enable advantages that surpass classical communication, such as secure information transmission and efficient quantum computing.

The standard nonlocality is sharply restricted to the correlation between two quantum particles. In a quantum network, the entanglement of multiple particles allows the transfer of both classical and quantum information beyond classical networks. This kind of entanglement establishes a transformative paradigm for quantum information processing, effectively linking distributed quantum nodes to create a powerful quantum computing infrastructure.

Investigating nonlocality and entanglement within quantum networks is critically important for advancing fields such as quantum computing, quantum communication, and quantum security. This Special Issue seeks to explore how the properties of nonlocality and entanglement can be harnessed along with their related applications to foster the development and implementation of technologies within the realm of quantum networks.

Prof. Dr. Mingxing Luo
Dr. Xue Yang
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Entropy is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • quantum networks
  • quantum entanglement
  • quantum nonlocality
  • quantum network protocols
  • nonlocal game on quantum networks
  • quantum network communication
  • quantum secure applications on quantum networks
  • experimental techniques on quantum networks

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (2 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 1189 KiB  
Article
Ethernet Passive Mutual Authentication Scheme on Quantum Networks
by Jianuo Tian, Panke Qin, Zongqu Zhao and Baodong Qin
Entropy 2025, 27(2), 135; https://doi.org/10.3390/e27020135 - 27 Jan 2025
Viewed by 528
Abstract
In the context of increasing demand for secure and efficient communication networks, addressing the issue of mutual authentication in ethernet passive optical networks (EPONs) has become both valuable and practically significant. This paper proposes a solution based on ideal lattices. The proposed scheme [...] Read more.
In the context of increasing demand for secure and efficient communication networks, addressing the issue of mutual authentication in ethernet passive optical networks (EPONs) has become both valuable and practically significant. This paper proposes a solution based on ideal lattices. The proposed scheme leverages the security of the ring learning with errors (RLWE) problem to establish a robust public-key cryptosystem. By involving ONUs, OLTs, and an SDN controller in the authentication process, it enables mutual authentication through a series of message exchanges facilitated by the SDN controller. Utilizing approximate smooth projection hash functions for secure key exchange and verification, the scheme ensures robust security performance against various attacks, including man-in-the-middle, impersonation, replay, and known key secrecy attacks. Simulation results demonstrate that the proposed solution introduces minimal delay and maintains a high registration success rate compared to traditional authentication methods. Additionally, this paper explores the convergence of quantum network protocols with EPONs, highlighting their potential to achieve unprecedented levels of communication security. Integrating quantum technology with EPON networks, due to the unique security properties of quantum, can also better prevent man-in-the-middle attacks. Secure interception detection techniques based on fundamental quantum properties provide a fundamental security direction for future communication systems, aligning with the growing interest in quantum-resistant cryptographic protocols. Full article
(This article belongs to the Special Issue Nonlocality and Entanglement in Quantum Networks)
Show Figures

Figure 1

18 pages, 401 KiB  
Article
Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks
by Yongli Tang, Menghao Guo, Binyong Li, Kaixin Geng, Jinxia Yu and Baodong Qin
Entropy 2025, 27(1), 7; https://doi.org/10.3390/e27010007 - 26 Dec 2024
Viewed by 850
Abstract
Currently, most quantum homomorphic encryption (QHE) schemes only allow a single evaluator (server) to accomplish computation tasks on encrypted data shared by the data owner (user). In addition, the quantum computing capability of the evaluator and the scope of quantum computation it can [...] Read more.
Currently, most quantum homomorphic encryption (QHE) schemes only allow a single evaluator (server) to accomplish computation tasks on encrypted data shared by the data owner (user). In addition, the quantum computing capability of the evaluator and the scope of quantum computation it can perform are usually somewhat limited, which significantly reduces the flexibility of the scheme in quantum network environments. In this paper, we propose a novel (t,n)-threshold QHE (TQHE) network scheme based on the Shamir secret sharing protocol, which allows k(tkn) evaluators to collaboratively perform evaluation computation operations on each qubit within the shared encrypted sequence. Moreover, each evaluator, while possessing the ability to perform all single-qubit unitary operations, is able to perform arbitrary single-qubit gate computation task assigned by the data owner. We give a specific (3, 5)-threshold example, illustrating the scheme’s correctness and feasibility, and simulate it on IBM quantum computing cloud platform. Finally, it is shown that the scheme is secure by analyzing encryption/decryption private keys, ciphertext quantum state sequences during transmission, plaintext quantum state sequence, and the result after computations on the plaintext quantum state sequence. Full article
(This article belongs to the Special Issue Nonlocality and Entanglement in Quantum Networks)
Show Figures

Figure 1

Back to TopTop