{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,6]],"date-time":"2026-05-06T16:01:05Z","timestamp":1778083265018,"version":"3.51.4"},"reference-count":66,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012226","name":"Beijing Jiaotong University and Beijing University of Technology through the Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","award":["2022JBZY020"],"award-info":[{"award-number":["2022JBZY020"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012166","name":"Beijing Jiaotong University and Beijing University of Technology through the National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2023YFB2703702"],"award-info":[{"award-number":["2023YFB2703702"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans.Inform.Forensic Secur."],"published-print":{"date-parts":[[2025]]},"DOI":"10.1109\/tifs.2025.3583901","type":"journal-article","created":{"date-parts":[[2025,6,27]],"date-time":"2025-06-27T13:44:50Z","timestamp":1751031890000},"page":"6778-6793","source":"Crossref","is-referenced-by-count":1,"title":["Efficient and Secure Multi-Qubit Broadcast-Based Quantum Federated Learning"],"prefix":"10.1109","volume":"20","author":[{"given":"Rui","family":"Zhang","sequence":"first","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2951-688X","authenticated-orcid":false,"given":"Jian","family":"Wang","sequence":"additional","affiliation":[{"name":"Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9269-8079","authenticated-orcid":false,"given":"Nan","family":"Jiang","sequence":"additional","affiliation":[{"name":"College of Computer Science, Beijing University of Technology, Beijing, China"}]},{"given":"Md","family":"Armanuzzaman","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]},{"given":"Ziming","family":"Zhao","sequence":"additional","affiliation":[{"name":"Northeastern University, Boston, MA, USA"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2024.3459037"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MWC.016.2300547"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3377454"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10447341"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3390\/e23040460"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP49357.2023.10094634"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2023.3303401"},{"key":"ref8","first-page":"1","article-title":"Quantum federated learning in healthcare: The shift from development to deployment and from models to data","author":"Kais","year":"2023","journal-title":"Res. Square"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3327365"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10447516"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP48485.2024.10447155"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TIV.2024.3370398"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/MSN53354.2021.00035"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11433-021-1753-3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TITS.2021.3130906"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/comst.2024.3399612"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.134.2200619"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM48099.2022.10001071"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1007\/s42484-022-00091-z"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICNC57223.2023.10074279"},{"key":"ref21","article-title":"Federated learning with quantum secure aggregation","author":"Zhang","year":"2022","journal-title":"arXiv:2207.07444"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/QCE57702.2023.00139"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2023.3280459"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2023.3318083"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.70.1895"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.74.032324"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1088\/0253-6102\/41\/5\/689"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-016-1500-z"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-012-0486-4"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1017\/cbo9780511976667"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/s00605-008-0008-8"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.76.722"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.77.2818"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.106.180404"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/s11467-022-1157-2"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.105.032427"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.105.010404"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.105.150401"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3618260.3649704"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-022-05260-1"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/s10773-020-04381-9"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/j.neunet.2022.03.043"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.113.130503"},{"key":"ref44","article-title":"Decomposition of unitary matrix into quantum gates","author":"Fedoriaka","year":"2025","journal-title":"arXiv:2501.07786"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.92.177902"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.6.013038"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1063\/5.0121778"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1016\/j.physrep.2022.08.003"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/s11082-023-04928-0"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-022-03629-z"},{"key":"ref51","volume-title":"The UCI Machine Learning Repository","author":"Kelly","year":"2023"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.107.062605"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.105.042611"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-019-2428-x"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevA.54.147"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2020.102810"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-023-03896-4"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICICS.2018.00027"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/s11128-009-0106-0"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.compeleceng.2016.06.008"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.22331\/q-2018-06-18-74"},{"key":"ref62","volume-title":"Quantum Circuits for Matrix Multiplication","author":"Sracic","year":"2011"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2023.03.106"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevLett.126.010503"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevResearch.5.033171"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994018"}],"container-title":["IEEE Transactions on Information Forensics and Security"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10206\/10810755\/11053770.pdf?arnumber=11053770","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,11]],"date-time":"2025-07-11T17:43:18Z","timestamp":1752255798000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/11053770\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"references-count":66,"URL":"https:\/\/doi.org\/10.1109\/tifs.2025.3583901","relation":{},"ISSN":["1556-6013","1556-6021"],"issn-type":[{"value":"1556-6013","type":"print"},{"value":"1556-6021","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]}}}