{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,13]],"date-time":"2026-04-13T22:38:04Z","timestamp":1776119884072,"version":"3.50.1"},"reference-count":39,"publisher":"MDPI AG","issue":"20","license":[{"start":{"date-parts":[[2023,10,15]],"date-time":"2023-10-15T00:00:00Z","timestamp":1697328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"National Natural Science Foundation of China","award":["62172060"],"award-info":[{"award-number":["62172060"]}]},{"name":"National Natural Science Foundation of China","award":["2022YFG0316"],"award-info":[{"award-number":["2022YFG0316"]}]},{"name":"National Natural Science Foundation of China","award":["2023ZHCG0004"],"award-info":[{"award-number":["2023ZHCG0004"]}]},{"name":"National Natural Science Foundation of China","award":["2022YFB3304303"],"award-info":[{"award-number":["2022YFB3304303"]}]},{"name":"Sichuan Science and Technology Program","award":["62172060"],"award-info":[{"award-number":["62172060"]}]},{"name":"Sichuan Science and Technology Program","award":["2022YFG0316"],"award-info":[{"award-number":["2022YFG0316"]}]},{"name":"Sichuan Science and Technology Program","award":["2023ZHCG0004"],"award-info":[{"award-number":["2023ZHCG0004"]}]},{"name":"Sichuan Science and Technology Program","award":["2022YFB3304303"],"award-info":[{"award-number":["2022YFB3304303"]}]},{"name":"National Key R&amp;D Plan","award":["62172060"],"award-info":[{"award-number":["62172060"]}]},{"name":"National Key R&amp;D Plan","award":["2022YFG0316"],"award-info":[{"award-number":["2022YFG0316"]}]},{"name":"National Key R&amp;D Plan","award":["2023ZHCG0004"],"award-info":[{"award-number":["2023ZHCG0004"]}]},{"name":"National Key R&amp;D Plan","award":["2022YFB3304303"],"award-info":[{"award-number":["2022YFB3304303"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>With the continuous development of the Internet of Things (IoT) technology, the industry\u2019s awareness of the security of the IoT is also increasing, and the adoption of quantum communication technology can significantly improve the communication security of various devices in the IoT. This paper proposes a scheme of controlled remote quantum state preparation and quantum teleportation based on multiple communication parties, and a nine-qubit entanglement channel is used to achieve secure communication of multiple devices in the IoT. The channel preparation, measurement operation, and unitary operation of the scheme were successfully simulated on the IBM Quantum platform, and the entanglement degree and reliability of the channel were verified through 8192 shots. The scheme\u2019s application in the IoT was analyzed, and the steps and examples of the scheme in the secure communication of multiple devices in the IoT are discussed. By simulating two different attack modes, the effect of the attack on the communication scheme in the IoT was deduced, and the scheme\u2019s high security and anti-interference ability was analyzed. Compared with other schemes from the two aspects of principle and transmission efficiency, it is highlighted that the advantages of the proposed scheme are that it overcomes the single fixed one-way or two-way transmission protocol form of quantum teleportation in the past and can realize quantum communication with multiple devices, ensuring both security and transmission efficiency.<\/jats:p>","DOI":"10.3390\/s23208475","type":"journal-article","created":{"date-parts":[[2023,10,15]],"date-time":"2023-10-15T10:47:32Z","timestamp":1697366852000},"page":"8475","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":11,"title":["A Scheme for Quantum Teleportation and Remote Quantum State Preparation of IoT Multiple Devices"],"prefix":"10.3390","volume":"23","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1424-1532","authenticated-orcid":false,"given":"You","family":"Fu","sequence":"first","affiliation":[{"name":"College of Computer Science and Cyber Security (Oxford Brookes College), Chengdu University of Technology, Chengdu 610059, China"}]},{"given":"Dongfen","family":"Li","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security (Oxford Brookes College), Chengdu University of Technology, Chengdu 610059, China"}]},{"given":"Xiaoyu","family":"Hua","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security (Oxford Brookes College), Chengdu University of Technology, Chengdu 610059, China"}]},{"given":"Yangyang","family":"Jiang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security (Oxford Brookes College), Chengdu University of Technology, Chengdu 610059, China"}]},{"given":"Yonghao","family":"Zhu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security (Oxford Brookes College), Chengdu University of Technology, Chengdu 610059, China"}]},{"given":"Jie","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security (Oxford Brookes College), Chengdu University of Technology, Chengdu 610059, China"}]},{"given":"Xiaolong","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security (Oxford Brookes College), Chengdu University of Technology, Chengdu 610059, China"}]},{"given":"Yuqiao","family":"Tan","sequence":"additional","affiliation":[{"name":"College of Computer Science and Cyber Security (Oxford Brookes College), Chengdu University of Technology, Chengdu 610059, China"}]}],"member":"1968","published-online":{"date-parts":[[2023,10,15]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"100174","DOI":"10.1016\/j.iot.2020.100174","article-title":"A comprehensive survey of prominent cryptographic aspects for securing communication in post-quantum IoT networks","volume":"9","author":"Lohachab","year":"2020","journal-title":"Internet Things"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"2191","DOI":"10.1016\/j.procs.2023.01.195","article-title":"A Survey on Quantum Computing for Internet of Things Security","volume":"218","author":"Chawla","year":"2023","journal-title":"Procedia Comput. Sci."},{"key":"ref_3","doi-asserted-by":"crossref","first-page":"283","DOI":"10.1016\/j.comnet.2018.11.025","article-title":"Current research on Internet of Things (IoT) security: A survey","volume":"148","author":"Hassan","year":"2019","journal-title":"Comput. Netw."},{"key":"ref_4","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1140\/epjqt\/s40507-023-00170-5","article-title":"Quantum identity authentication based on the extension of quantum rotation","volume":"10","author":"Chen","year":"2023","journal-title":"EPJ Quantum Technol."},{"key":"ref_5","doi-asserted-by":"crossref","unstructured":"McLeod, J., Majumdar, R., and Das, S. (2022, January 21\u201323). Challenges and future directions in the implementation of quantum authentication protocols. Proceedings of the International Conference on Computational Science, London, UK.","DOI":"10.1007\/978-3-031-08760-8_14"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/s11128-023-03832-6","article-title":"A novel quantum identity authentication protocol without entanglement and preserving pre-shared key information","volume":"22","author":"Rao","year":"2023","journal-title":"Quantum Inf. Process."},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"129993","DOI":"10.1016\/j.optcom.2023.129993","article-title":"Quantum convolutional neural network based on variational quantum circuits","volume":"550","author":"Gong","year":"2024","journal-title":"Opt. Commun."},{"key":"ref_8","doi-asserted-by":"crossref","first-page":"116891","DOI":"10.1016\/j.image.2022.116891","article-title":"Hybrid quantum\u2013classical generative adversarial networks for image generation via learning discrete distribution","volume":"110","author":"Zhou","year":"2023","journal-title":"Signal Process. Image Commun."},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1007\/s11128-022-03786-1","article-title":"An improved efficient identity-based quantum signature scheme","volume":"22","author":"Huang","year":"2022","journal-title":"Quantum Inf. Process."},{"key":"ref_10","unstructured":"Tang, G., Duong, D.H., Joux, A., Plantard, T., Qiao, Y., and Susilo, W. (June, January 30). Practical post-quantum signature schemes from isomorphism problems of trilinear forms. Proceedings of the Annual International Conference on the Theory and Applications of Cryptographic Techniques, Trondheim, Norway."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"1895","DOI":"10.1103\/PhysRevLett.70.1895","article-title":"Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels","volume":"70","author":"Bennett","year":"1993","journal-title":"Phys. Rev. Lett."},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1402","DOI":"10.1007\/s10773-020-04381-9","article-title":"Quantum controlled teleportation of bell state using seven-qubit entangled state","volume":"59","author":"Chen","year":"2020","journal-title":"Int. J. Theor. Phys."},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1007\/s10946-023-10115-z","article-title":"Efficient Quantum Controlled Teleportation of an Arbitrary Three-Qubit State Using Two GHZ Entangled States and One Bell Entangled State","volume":"44","author":"Kirdi","year":"2023","journal-title":"J. Russ. Laser Res."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"095204","DOI":"10.1088\/1612-202X\/ace0b5","article-title":"Convenient quantum controlled teleportation of two-qubit pure state with seven-qubit entangled state","volume":"20","author":"Ma","year":"2023","journal-title":"Laser Phys. Lett."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"104","DOI":"10.1007\/s11128-019-2218-5","article-title":"Controlled teleportation of an arbitrary two-qubit entanglement in noises environment","volume":"18","author":"Hou","year":"2019","journal-title":"Quantum Inf. Process."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"050301","DOI":"10.1088\/1674-1056\/ac43b0","article-title":"Experimental realization of quantum controlled teleportation of arbitrary two-qubit state via a five-qubit entangled state","volume":"31","author":"Liu","year":"2022","journal-title":"Chin. Phys. B"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"166","DOI":"10.1007\/s10773-019-04306-1","article-title":"Quantum bidirectional teleportation 2\u21942 or 2\u21943 Qubit teleportation protocol via 6-Qubit entangled state","volume":"59","author":"Zhou","year":"2020","journal-title":"Int. J. Theor. Phys."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"44","DOI":"10.1007\/s11128-021-03389-2","article-title":"Bidirectional quantum teleportation using a five-qubit cluster state as a quantum channel","volume":"21","author":"Wang","year":"2022","journal-title":"Quantum Inf. Process."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"095201","DOI":"10.1088\/1612-202X\/ace3be","article-title":"Bidirectional hierarchical quantum teleportation based on an eight-qubit entangled state","volume":"20","author":"Yang","year":"2023","journal-title":"Laser Phys. Lett."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"44269","DOI":"10.1109\/ACCESS.2019.2901960","article-title":"Bidirectional quantum teleportation by using six-qubit cluster state","volume":"7","author":"Zhou","year":"2019","journal-title":"IEEE Access"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"3594","DOI":"10.1007\/s10773-019-04223-3","article-title":"Bidirectional quantum controlled teleportation of three-qubit state by using GHZ states","volume":"58","author":"Zhou","year":"2019","journal-title":"Int. J. Theor. Phys."},{"key":"ref_22","doi-asserted-by":"crossref","unstructured":"Tabatabaei, L.S., and Vakili, B. (2023). Bi-directional quantum teleportation of GHZ-like states. arXiv.","DOI":"10.1142\/S0219749923500351"},{"key":"ref_23","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1007\/s10773-022-04995-1","article-title":"Asymmetric bidirectional controlled quantum teleportation using eight qubit cluster state","volume":"61","author":"Kazemikhah","year":"2022","journal-title":"Int. J. Theor. Phys."},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"3285","DOI":"10.1007\/s10773-017-3495-3","article-title":"Asymmetric bidirectional 3 \u21d4 2 qubit teleportation protocol between Alice and Bob via 9-qubit cluster state","volume":"56","author":"Choudhury","year":"2017","journal-title":"Int. J. Theor. Phys."},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/s10773-023-05289-w","article-title":"Asymmetric Controlled Quantum Teleportation Via Eight-Qubit Entangled State in a Noisy Environment","volume":"62","author":"Kaur","year":"2023","journal-title":"Int. J. Theor. Phys."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"187","DOI":"10.1007\/s10773-019-04310-5","article-title":"Quantum information splitting of arbitrary two-qubit state via a five-qubit cluster state and a bell-state","volume":"59","author":"Yang","year":"2020","journal-title":"Int. J. Theor. Phys."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"220","DOI":"10.1007\/s10773-022-05178-8","article-title":"Quantum Information Splitting of an Arbitrary Five-Qubit State Using Four-Qubit Entangled States","volume":"61","author":"Liu","year":"2022","journal-title":"Int. J. Theor. Phys."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/s10773-022-05208-5","article-title":"Symmetric and asymmetric cyclic quantum teleportation with different controller for each participant","volume":"61","author":"Rahmawati","year":"2022","journal-title":"Int. J. Theor. Phys."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"1541","DOI":"10.1007\/s10773-019-04041-7","article-title":"Controlled cyclic quantum teleportation of an arbitrary two-qubit entangled state by using a ten-qubit entangled state","volume":"58","author":"Li","year":"2019","journal-title":"Int. J. Theor. Phys."},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"3435","DOI":"10.1007\/s10773-021-04825-w","article-title":"Asymmetric cyclic controlled quantum teleportation by using nine-qubit entangled state","volume":"60","author":"Zhou","year":"2021","journal-title":"Int. J. Theor. Phys."},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1007\/s00340-023-08039-2","article-title":"Improving the probabilistic quantum teleportation efficiency of arbitrary superposed coherent state using multipartite even and odd j-spin coherent states as resource","volume":"129","author":"Kirdi","year":"2023","journal-title":"Appl. Phys. B"},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"090303","DOI":"10.1088\/1674-1056\/ac67c0","article-title":"Probabilistic quantum teleportation of shared quantum secret","volume":"31","author":"Li","year":"2022","journal-title":"Chin. Phys. B"},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"11","DOI":"10.1007\/s10773-022-05266-9","article-title":"Probabilistic Quantum Teleportation via 3-Qubit Non-maximally Entangled GHZ State by Repeated Generalized Measurements","volume":"62","author":"Javed","year":"2022","journal-title":"Int. J. Theor. Phys."},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"077902","DOI":"10.1103\/PhysRevLett.87.077902","article-title":"Remote state preparation","volume":"87","author":"Bennett","year":"2001","journal-title":"Phys. Rev. Lett."},{"key":"ref_35","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1007\/s11128-023-03855-z","article-title":"Hierarchical controlled remote preparation of an arbitrary m-qudit state with four-qudit cluster states","volume":"22","author":"Jin","year":"2023","journal-title":"Quantum Inf. Process."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"602","DOI":"10.1007\/s11082-022-03959-3","article-title":"Cyclic controlled remote state preparation protocol initiated by a mentor for qubits","volume":"54","author":"Mandal","year":"2022","journal-title":"Opt. Quantum Electron."},{"key":"ref_37","doi-asserted-by":"crossref","first-page":"244","DOI":"10.1007\/s11128-017-1690-z","article-title":"Controlled bidirectional remote preparation of three-qubit state","volume":"16","author":"Chen","year":"2017","journal-title":"Quantum Inf. Process."},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"2101","DOI":"10.1007\/s10773-017-3353-3","article-title":"Bidirectional teleportation of a two-qubit state by using eight-qubit entangled state as a quantum channel","volume":"56","author":"Houshmand","year":"2017","journal-title":"Int. J. Theor. Phys."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1333","DOI":"10.1007\/s10773-015-2774-0","article-title":"Bidirectional quantum teleportation by using five-qubit cluster state","volume":"55","author":"Sang","year":"2016","journal-title":"Int. J. Theor. Phys."}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/20\/8475\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T21:07:10Z","timestamp":1760130430000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/23\/20\/8475"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,10,15]]},"references-count":39,"journal-issue":{"issue":"20","published-online":{"date-parts":[[2023,10]]}},"alternative-id":["s23208475"],"URL":"https:\/\/doi.org\/10.3390\/s23208475","relation":{},"ISSN":["1424-8220"],"issn-type":[{"value":"1424-8220","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,10,15]]}}}