{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T07:24:25Z","timestamp":1760081065140,"version":"3.44.0"},"reference-count":36,"publisher":"Open Publishing Association","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Electron. Proc. Theor. Comput. Sci.","EPTCS"],"DOI":"10.4204\/eptcs.429.14","type":"journal-article","created":{"date-parts":[[2025,9,22]],"date-time":"2025-09-22T19:20:49Z","timestamp":1758568849000},"page":"249-269","source":"Crossref","is-referenced-by-count":1,"title":["A Coalgebraic Model of Quantum Bisimulation"],"prefix":"10.4204","volume":"429","author":[{"given":"Lorenzo","family":"Ceragioli","sequence":"first","affiliation":[{"name":"IMT School for Advanced Studies, Lucca, Italy"}]},{"given":"Elena","family":"Di Lavore","sequence":"additional","affiliation":[{"name":"University of Pisa, Italy"}]},{"given":"Giuseppe","family":"Lomurno","sequence":"additional","affiliation":[{"name":"University of Pisa, Italy"}]},{"given":"Gabriele","family":"Tedeschi","sequence":"additional","affiliation":[{"name":"University of Pisa, Italy"}]}],"member":"2720","published-online":{"date-parts":[[2025,9,25]]},"reference":[{"key":"abramskyQuantumMonadRelational2017","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.MFCS.2017.35","article-title":"The Quantum Monad on Relational Structures","author":"Abramsky","year":"2017"},{"key":"bartelsHierarchyProbabilisticSystem2004","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.tcs.2004.07.019","article-title":"A Hierarchy of Probabilistic System Types","volume":"327","author":"Bartels","year":"2004","journal-title":"Theoretical Computer Science"},{"key":"bennettQuantumCryptographyPublic2014","doi-asserted-by":"publisher","first-page":"7","DOI":"10.1016\/j.tcs.2014.05.025","article-title":"Quantum Cryptography: Public Key Distribution and Coin Tossing","volume":"560","author":"Bennett","year":"2014","journal-title":"Theoretical Computer Science"},{"volume-title":"Effectful Mealy machines: bisimulation and trace","year":"2024","author":"Bonchi","key":"effectfulstreams"},{"key":"bonchiSemiringUpto","doi-asserted-by":"publisher","first-page":"535","DOI":"10.1007\/978-3-662-54577-5_31","article-title":"Up-To Techniques for Weighted Systems","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"Bonchi","year":"2017"},{"key":"bonchiPowerConvexAlgebras2017","doi-asserted-by":"publisher","DOI":"10.4230\/LIPICS.CONCUR.2017.23","article-title":"The Power of Convex Algebras","volume-title":"28th International Conference on Concurrency Theory ( CONCUR 2017)","author":"Bonchi","year":"2017"},{"key":"caleffiQuantumInternetCommunication2018","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3233188.3233224","article-title":"Quantum Internet: From Communication to Distributed Computing!","volume-title":"Proceedings of the 5th ACM International Conference on Nanoscale Computing and Communication","author":"Caleffi","year":"2018"},{"key":"lics","series-title":"LIPIcs","doi-asserted-by":"publisher","DOI":"10.4230\/LIPICS.CONCUR.2024.16","article-title":"Effect Semantics for Quantum Process Calculi","volume-title":"35th International Conference on Concurrency Theory, CONCUR 2024, September 9-13, 2024, Calgary, Canada","volume":"311","author":"Ceragioli","year":"2024"},{"key":"aplas","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/978-981-97-8943-6_9","article-title":"Quantum Bisimilarity Is a Congruence Under Physically Admissible Schedulers","volume-title":"Programming Languages and Systems - 22nd Asian Symposium, APLAS 2024, Kyoto, Japan, October 22-24, 2024, Proceedings","volume":"15194","author":"Ceragioli","year":"2024"},{"key":"ceragioliQuantumBisimilarityBarbs2024","doi-asserted-by":"publisher","DOI":"10.1145\/3632885","article-title":"Quantum Bisimilarity via Barbs and Contexts: Curbing the Power of Non-deterministic Observers","volume":"8","author":"Ceragioli","year":"2024","journal-title":"Proc. ACM Program. Lang."},{"key":"coeckePicturingQuantumProcesses2017","doi-asserted-by":"publisher","DOI":"10.1017\/9781316219317","volume-title":"Picturing Quantum Processes: A First Course in Quantum Theory and Diagrammatic Reasoning","author":"Coecke","year":"2017"},{"volume-title":"Formal Verification Techniques Using Quantum Process Calculus","year":"2012","author":"Davidson","key":"davidsonFormalVerificationTechniques2012"},{"key":"dengBisimulationsProbabilisticQuantum2018","series-title":"Leibniz International Proceedings in Informatics (LIPIcs )","doi-asserted-by":"publisher","DOI":"10.4230\/LIPIcs.CONCUR.2018.2","article-title":"Bisimulations for Probabilistic and Quantum Processes ( Invited Paper)","volume-title":"29th International Conference on Concurrency Theory ( CONCUR 2018)","volume":"118","author":"Deng","year":"2018"},{"key":"dengOpenBisimulationQuantum2012","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"119","DOI":"10.1007\/978-3-642-33475-7_9","article-title":"Open Bisimulation for Quantum Processes","volume-title":"Theoretical Computer Science","author":"Deng","year":"2012"},{"issue":"2","key":"fengSymbolicBisimulationQuantum2014","doi-asserted-by":"publisher","DOI":"10.1145\/2579818","article-title":"Symbolic Bisimulation for Quantum Processes","volume":"15","author":"Feng","year":"2014","journal-title":"ACM Trans. Comput. Logic"},{"key":"fengAutomaticVerificationQuantum2015a","series-title":"Leibniz International Proceedings in Informatics (LIPIcs )","doi-asserted-by":"publisher","first-page":"441","DOI":"10.4230\/LIPIcs.CONCUR.2015.441","article-title":"Toward Automatic Verification of Quantum Cryptographic Protocols","volume-title":"26th International Conference on Concurrency Theory ( CONCUR 2015)","volume":"42","author":"Feng","year":"2015"},{"issue":"7","key":"gaoQuantumPrivateQuery2019","doi-asserted-by":"publisher","DOI":"10.1007\/s11433-018-9324-6","article-title":"Quantum Private Query: A New Kind of Practical Quantum Cryptographic Protocol","volume":"62","author":"Gao","year":"2019","journal-title":"Sci. China Phys. Mech. Astron."},{"issue":"7","key":"gudderQuantumMarkovChains2008","doi-asserted-by":"publisher","DOI":"10.1063\/1.2953952","article-title":"Quantum Markov Chains","volume":"49","author":"Gudder","year":"2008","journal-title":"Journal of Mathematical Physics"},{"issue":"1","key":"GUMM2001185","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/S1571-0661(04)80908-3","article-title":"Monoid-Labeled Transition Systems","volume":"44","author":"Gumm","year":"2001","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"Hasuo11","doi-asserted-by":"publisher","first-page":"222","DOI":"10.1007\/978-3-642-22944-2_16","article-title":"The Microcosm Principle and Compositionality of GSOS-Based Component Calculi","volume-title":"Algebra and Coalgebra in Computer Science","author":"Hasuo","year":"2011"},{"key":"heinosaariMathematicalLanguageQuantum2011","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139031103","volume-title":"The Mathematical Language of Quantum Theory: From Uncertainty to Entanglement","author":"Heinosaari","year":"2011"},{"key":"hennessyExploringProbabilisticBisimulations2012","doi-asserted-by":"publisher","first-page":"749","DOI":"10.1007\/s00165-012-0242-7","article-title":"Exploring Probabilistic Bisimulations, Part I","volume":"24","author":"Hennessy","year":"2012","journal-title":"Form. Asp. Comput."},{"key":"jacobsConvexityDualityEffects2010","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-15240-5_1","article-title":"Convexity, Duality and Effects","volume-title":"Theoretical Computer Science: 6th IFIP TC 1\/WG 2.2 International Conference, TCS 2010, Held as Part of WCC 2010, Brisbane, Australia, September 20-23, 2010. Proceedings 6","author":"Jacobs","year":"2010"},{"issue":"28","key":"jacobsProbabilitiesDistributionMonads2011","doi-asserted-by":"publisher","first-page":"3323","DOI":"10.1016\/j.tcs.2011.04.005","article-title":"Probabilities, Distribution Monads, and Convex Categories","volume":"412","author":"Jacobs","year":"2011","journal-title":"Theoretical Computer Science"},{"key":"Jacobs2016","series-title":"Cambridge Tracts in Theoretical Computer Science","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781316823187","volume-title":"Introduction to Coalgebra: Towards Mathematics of States and Observation","author":"Jacobs","year":"2016"},{"key":"jacobsFastCoalgebraicBisimilarity2023a","doi-asserted-by":"publisher","DOI":"10.1145\/3571245","article-title":"Fast Coalgebraic Bisimilarity Minimization","volume":"7","author":"Jacobs","year":"2023","journal-title":"Proc. ACM Program. Lang."},{"key":"katsumata2014effect","series-title":"POPL '14","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535846","article-title":"Parametric effect monads and semantics of effect systems","volume-title":"Proceedings of the 41st ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages","author":"Katsumata","year":"2014"},{"key":"kubotaApplicationProcessCalculus2012","article-title":"Application of a Process Calculus to Security Proofs of Quantum Protocols","volume-title":"Proceedings of the International Conference on Foundations of Computer Science (FCS)","author":"Kubota","year":"2012"},{"issue":"3","key":"longQuantumSecureDirect2007","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/s11467-007-0050-3","article-title":"Quantum Secure Direct Communication and Deterministic Secure Quantum Communication","volume":"2","author":"Long","year":"2007","journal-title":"Front. Phys. China"},{"key":"mossCoalgebraicLogic1999","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/S0168-0072(98)00042-6","article-title":"Coalgebraic Logic","volume":"96","author":"Moss","year":"1999","journal-title":"Annals of Pure and Applied Logic"},{"key":"nielsenQuantumComputationQuantum2010","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511976667","volume-title":"Quantum Computation and Quantum Information","author":"Nielsen","year":"2010"},{"key":"nurhadiQuantumKeyDistribution2018","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/ICWT.2018.8527822","article-title":"Quantum Key Distribution (QKD) Protocols: A Survey","volume-title":"2018 4th International Conference on Wireless and Telematics (ICWT)","author":"Nurhadi","year":"2018"},{"key":"ogawaCoalgebraicApproachEquivalences2014","article-title":"Coalgebraic Approach to Equivalences of Quantum Systems","author":"Ogawa","year":"2014","journal-title":"Master's thesis, University of Tokyo"},{"issue":"1","key":"ruttenUniversalCoalgebra2000","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/S0304-3975(00)00056-6","article-title":"Universal Coalgebra: A Theory of Systems","volume":"249","author":"Rutten","year":"2000","journal-title":"Theoretical Computer Science"},{"key":"Sokolova2004","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-540-24611-4_1","volume-title":"Probabilistic Automata: System Types, Parallel Composition and Comparison","author":"Sokolova","year":"2004"},{"key":"zhangFutureQuantumCommunications2022","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/MWC.012.2200295","article-title":"Future Quantum Communications and Networking: A Review and Vision","author":"Zhang","year":"2022","journal-title":"IEEE Wireless Commun."}],"container-title":["Electronic Proceedings in Theoretical Computer Science"],"original-title":[],"language":"en","deposited":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T18:16:43Z","timestamp":1759169803000},"score":1,"resource":{"primary":{"URL":"http:\/\/arxiv.org\/abs\/2509.20933v1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,9,25]]},"references-count":36,"URL":"https:\/\/doi.org\/10.4204\/eptcs.429.14","relation":{},"ISSN":["2075-2180"],"issn-type":[{"type":"electronic","value":"2075-2180"}],"subject":[],"published":{"date-parts":[[2025,9,25]]}}}