VOLUME XX, 2020 15
[23] X. Sun, M. Sopek, Q. Wang, and P. Kulicki, “Towards quantum-
secured permissioned blockchain: signature, consensus, and logic,”
Entropy 21, no. 9, pp. 887, doi: 10.3390/e21090887.
[24] D. Shrier, W. Wu, and A. Pentland, “Blockchain & infrastructure
(identity, data security),” MIT-Conn. Sci., vol. 1, no. 3, pp. 1–19, 2016.
[25] O. Jacobovitz, “Blockchain for identity management,” Ben-Gurion
University, Beer Sheva, 2016, Accessed: Jun. 14. 2022. [Online].
Available:
https://www.cs.bgu.ac.il/~frankel/TechnicalReports/2016/16-02.pdf.
[26] M. Kuperberg, “Blockchain-based identity management: a survey
from the enterprise and ecosystem perspective,” IEEE Trans. Eng.
Manag., vol. 67, no. 4, pp. 1008–1027, Nov. 2020, doi:
10.1109/TEM.2019.2926471.
[27] P. Dunphy and F. A. P. Petitcolas, “A first look at identity
management schemes on the blockchain,” IEEE Secur. Priv., vol. 16,
no. 4, pp. 20–29, July/August 2018, doi: 10.1109/MSP.2018.3111247.
[28] Bitnation, “Enter Pangea, the internet of sovereignty,” Accessed: Jun.
14. 2022. [Online]. Available: https://tse.bitnation.co/.
[29] ConsenSys, “Unlock Web3, build on Ethereum, collaborate
worldwide,” Accessed: Jun. 14. 2022. [Online]. Available:
https://consensys.net/.
[30] OneName, “Welcome to the new Internet for decentralized apps,”
Accessed: Jun. 14. 2022. [Online]. Available: https://onename.com/.
[31] ShoCard, “It's your identity. own it.,” Accessed: Jun. 14. 2022.
[Online]. Available: http://shocard.com/.
[32] Tykn, “Your login box. Powered by the blockchain.,” Accessed: Jun.
14. 2022. [Online]. Available: https://tykn.tech/.
[33] X. Zhu and Y. Badr, “A survey on blockchain-based identity
management systems for the Internet of Things,” IEEE Intern. Conf.
on Internet of Things (iThings) and IEEE Green Comp. and Comm.
(GreenCom) and IEEE Cyber, Phys. and Soc. Comp. (CPSCom) and
IEEE Smart Data (SmartData), Halifax, NS, Canada, 2018, pp. 1568–
1573, doi: 10.1109/Cybermatics_2018.2018.00263.
[34] Z. Gao, L. Xu, G. Turner, B. Patel, N. Diallo, L. Chen, and W. Shi,
“Blockchain-based identity management with mobile device,” in 1st
Workshop on Cryptoc. and Blockc. for Distr. Syst. (CryBlock'18),
Association for Computing Machinery, New York, NY, USA, 2018,
pp. 66–70, doi: 10.1145/3211933.3211945.
[35] G. Iovane, “Computational quantum key distribution (CQKD) on
decentralized ledger and blockchain,” J. Discret. Math. Sci. Cryptogr.,
vol. 24, no. 4, pp. 1021–1042, 2021.
[36] K. Ikeda, “qBitcoin: a peer-to-peer quantum cash system,” in Sci. and
Info. Conf., Springer, Cham, 2018, pp. 763–771.
[37] Y. Gao, X. Chen, G. Xu, K. Yuan, W. Liu, and Y. Yang, “A novel
quantum blockchain scheme base on quantum entanglement and
DPoS,” Quantum Info. Process., vol. 19, no. 12, pp. 1–15, 2020.
[38] L. Gyongyosi and S. Imre, “Decentralized base-graph routing for the
quantum internet,” Phys. Rev. A, vol. 98, no. 2, pp. 022310, 2018.
[39] C. Li, Y. Xu, J. Tang, and W. Liu, “Quantum blockchain: a
decentralized, encrypted and distributed database based on quantum
mechanics,” J. of Quantum Comp., vol. 1, no. 2, pp. 49, 2019.
[40] H. Buhrman, R. Cleve, J. Watrous, and R. Wolf, “Quantum
fingerprinting,” Phys. Rev. Lett., vol. 87, pp. 167902, 2001, doi:
10.1103/PhysRevLett.87.167902.
[41] C. Hong, J. Heo, J. G. Jang, and D. Kwon, “Quantum identity
authentication with single photon,” Quantum Inf. Process., vol. 16, no.
236, 2017, doi: 10.1007/s11128-017-1681-0.
[42] D. Deutsch and R. Jozsa, “Rapid solution of problems by quantum
computation,” Proc. R. Soc. A: Math. Phys. Eng. Sci., vol. 439, no.
1907, 1992, pp. 553–558.
[43] R. Valivarthi et al., “Teleportation systems toward a quantum
Internet,” PRX Quantum, vol. 1, issue 2, pp. 020317, 2020, doi:
10.1103/PRXQuantum.1.020317.
[44] C. H. Bennett, D. P. DiVincenzo, P. W. Shor, J. A. Smolin, B. M.
Terhal, and W. K. Wootters, “Remote state preparation,” Phys. Rev.
Lett., vol. 87, pp. 077902, 2001, doi:
10.1103/PhysRevLett.87.077902.
[45] W. McCutcheon et al., “Experimental verification of multipartite
entanglement in quantum networks,” Nat. Commun., vol. 7, pp. 13251,
2016, doi: 10.1038/ncomms13251.
[46] A. Kawachi and C. Portmann, “On the power of quantum encryption
keys,” Int. Workshop on Post-Quantum Cryptogr., PQCrypto 2008.
Lecture Notes in Computer Science, vol. 5299. Springer, Berlin,
Heidelberg, 2008, doi: 10.1007/978-3-540-88403-3_12.
[47] A. Ambainis, M. Mosca, A. Tapp and R. De Wolf, “Private quantum
channels,” in 41st Annu. Symp. Found. Comput. Sci., Redondo Beach,
CA, USA, 2000, pp. 547-553, doi: 10.1109/SFCS.2000.892142.
[48] M. Liang and L. Yang, “Public-key encryption and authentication of
quantum information,” Sci. China Phys. Mech. Astron., vol. 55, pp.
1618–1629, 2012, doi: 10.1007/s11433-011-4806-y.
[49] L. Yang, M. Liang, B. Li, L. Hu, and D. Feng, “Quantum public-key
cryptosystems based on induced trapdoor one-way transformations,”
2010, arXiv:1012.5249.
[50] C. Sabín, B. Peropadre, M. del Rey, and E. Martín-Martínez,
“Extracting past-future vacuum correlations using Circuit QED,”
Phys. Rev. Lett., vol. 109, pp. 033602, 2012, doi:
10.1103/PhysRevLett.109.033602.
[51] D. Greenberger, M.A. Horne, and A. Zeilinger, “Going beyond bell’s
theorem,” in Bell’s Theorem, Quantum Theory and Concept. of the
Universe., Fundamental Theories of Physics, vol. 37, Springer,
Dordrecht, 1989, doi: 10.1007/978-94-017-0849-4_10.
[52] G. Carvacho, F. Graffitti, V. D’Ambrosio, B.C. Hiesmayr, and F.
Sciarrino, “Experimental investigation on the geometry of GHZ
states,” Sci. Rep., vol. 7, pp. 13265, 2017, doi: 10.1038/s41598-017-
13124-6.
[53] E. Megidish, A. Halevy, T. Shacham, T. Dvir, L. Dovrat, and H. S.
Eisenberg, “Entanglement between photons that have never
coexisted,” Phys. Rev. Lett., vol. 110, pp. 210403, 2013, doi:
10.1103/PhysRevLett.110.210403.
[54] D. E. Bruschi, C. Sabín, A. White, V. Baccetti, D. K. L. Oi, and I.
Fuentes, “Testing the effects of gravity and motion on quantum
entanglement in space-based experiments,” New J. Phys., vol. 16, pp.
053041, 2014, doi: 10.1088/1367-2630/16/5/053041.
[55] S. Banerjee, A. Mukherjee, and P. K. Panigrahi, “Quantum blockchain
using weighted hypergraph states,” Phys. Rev. Research, vol. 2, pp.
013322, 2020, doi: 10.1103/PhysRevResearch.2.013322.
[56] A. J. Bennet and S. Daryanoosh, “Energy-efficient mining on a
quantum-enabled blockchain using light,” ledger, vol. 4, Jul. 2019,
doi: 10.5195/ledger.2019.143.
[57] A. Mostefaoui and M. Raynal, “Leader-based consensus,” Parallel
Process. Lett., vol. 11, no. 1, pp. 95-107, 2001.
[58] K. Pinter, D. Schmelz, R. Lamber, S. Strobl, and T. Grechenig,
“Towards a Multi-party, Blockchain-Based Identity Verification
Solution to Implement Clear Name Laws for Online Media
Platforms,” in Bus. Process Manag.: Blockchain and Central and
Eastern Europe Forum, Lecture Notes in Business Information
Processing, vol. 361, Springer, Cham, 2019, doi: 10.1007/978-3-030-
30429-4_11.
[59] M. Al-Bassam, “SCPKI: a smart contract-based PKI and identity
system,” in ACM Workshop on Blockchain, Cryptoc. and Contracts,
New York, NY, USA, 2017, pp. 35–40, doi:
10.1145/3055518.3055530.
[60] Y. Wang and Y. Zhan, “A theoretical scheme for zero-knowledge
proof quantum identity authentication,” Acta. Physica. Sinica., vol. 58,
no. 11, pp. 7668–7671, 2009, doi: 10.7498/aps.58.7668.
[61] J. A. Cortese and T. M. Braje, “Loading classical data into a quantum
computer,” 2018, arXiv:1803.01958.
[62] A. R. Calderbank and P. W. Shor, “Good quantum error-correcting
codes exist,” Phys. Rev. A, vol. 54, no. 2, pp. 1098–1106, 1996, doi:
10.1103/PhysRevA.54.1098.
[63] S. S. Tannu and M. K. Qureshi, “Not all qubits are created equal: a
case for variability-aware policies for NISQ-Era quantum computers,”
in 24th Int. Conf. on Archi. Supp. for Program. Lang. and Oper. Syst.,
Association for Computing Machinery, New York, NY, USA, 2019,
pp. 987–999, doi: 10.1145/3297858.3304007.
[64] J. Yard, P. Hayden, and I. Devetak, “Quantum broadcast channels,” in
IEEE Trans. Inf. Theory, vol. 57, no. 10, pp. 7147–7162, Oct. 2011,
doi: 10.1109/TIT.2011.2165811.
[65] S. Bäuml and K. Azuma, “Fundamental limitation on quantum
broadcast networks,” Quantum Sci. Technol., vol. 2, pp. 024004, 2017,
doi: 10.1088/2058-9565/aa6d3c.
[66] M. Nowakowski, “Quantum entanglement in time,” AIP Conf. Proc.,
no. 1841, pp. 020007, 2017, doi: 10.1063/1.4982771.
[67] D. Rajan, “Quantum entanglement in time,” 2020, arXiv:2007.05969.
This article has been accepted for publication in IEEE Transactions on Quantum Engineering. This is the author's version which has not been fully edited and
content may change prior to final publication. Citation information: DOI 10.1109/TQE.2022.3207111
This work is licensed under a Creative Commons Attribution 4.0 License. For more information, see https://creativecommons.org/licenses/by/4.0/