Quantum Computing Review A Decade of Research
Quantum Computing Review A Decade of Research
71, 2024
Authorized licensed use limited to: National University Fast. Downloaded on November 22,2024 at 04:26:52 UTC from IEEE Xplore. Restrictions apply.
SOOD AND : QUANTUM COMPUTING REVIEW: A DECADE OF RESEARCH 6663
Authorized licensed use limited to: National University Fast. Downloaded on November 22,2024 at 04:26:52 UTC from IEEE Xplore. Restrictions apply.
6664 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 71, 2024
Authorized licensed use limited to: National University Fast. Downloaded on November 22,2024 at 04:26:52 UTC from IEEE Xplore. Restrictions apply.
SOOD AND : QUANTUM COMPUTING REVIEW: A DECADE OF RESEARCH 6665
TABLE I
OVERALL CLUSTERS SUMMARY OF QC
Authorized licensed use limited to: National University Fast. Downloaded on November 22,2024 at 04:26:52 UTC from IEEE Xplore. Restrictions apply.
6666 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 71, 2024
TABLE III
DOMAINWISE TEMPORAL DISTRIBUTION OF PUBLICATIONS
literature. The cumulative number of papers per publication year each domain is higher from 2018, but there is a remarkable
indicates a steady growth in scientific literature throughout the surge in the publications quantity of the QAS domain from 2018
decade, depicting the revolutionary paradigm of the field. The (168) to 2021 (304). Additionally, the number of publications
analysis presents that there is a steady growth of publications has almost doubled in the period from 2019 (66) to 2020 (128) in
till 2016, but an abrupt increase in publications is observed after the QEAM domain. This analysis presents that QAS and QEAM
2018. The publications are doubled from 2018 (444) to 2020 domains are prevalent among researchers from the last five
(829), indicating that QC-related research has spiked in the last years. The temporal distribution of publications in Fig. 6 shows
five years. Furthermore, a decline in publications is observed positive growth throughout the period in all domains. However,
in 2022 because the data up to June 2022 are included in the a decline in number of publications has been observed in QCo
dataset. (in 2017), QEAM (in 2017), and QCIS (in 2015), respectively.
The overall analysis explores that QEAM has the highest growth
B. Domainwise Temporal Distribution of Publications rate (24.12%), which signifies that the domain is the most active
research domain in QC technology.
A quantitative analysis approach is used to present the basic
structure of research advancements in each domain. A total of
5096 documents are retrieved from the WoS database from 2013 C. Country Collaboration
to 2022. Furthermore, all the collected records are segregated Country collaboration analysis states the quality of literature
according to the QC domains using the WoS subquery. Table III produced and cooperative relationship between countries in a
presents the growth of each domain with total publications (tp) specific field. This study presents the country collaboration
and percentage share (tp%) in every year corresponding to each analysis using the CiteSpace visualization tool over the QC liter-
domain. According to the data from the table, highest number ature. Fig. 7 shows the country collaboration network diagram,
of records are from QAS (1859), followed by QCo (1099) and containing 106 nodes and 908 links, where a node represents
QCIS (871). In contrast, QCC (582) reports a minimum number the number of publications produced in collaboration with other
of publications, followed by QEAM (685). The analysis depicts countries and the link between two countries determines the
that QAS is the most explored domain among researchers, degree of co-operation among them. The larger node size indi-
whereas minimum efforts are imposed in the QCC domain. cates a higher publication count for the specified country, and the
Fig. 6 visualizes the yearwise publications over the QC domains higher number of links depicts close intercountry co-operation.
graphically. It is observed that the percentage share (tp%) in The pink circle around a node presenting the centrality value
Authorized licensed use limited to: National University Fast. Downloaded on November 22,2024 at 04:26:52 UTC from IEEE Xplore. Restrictions apply.
SOOD AND : QUANTUM COMPUTING REVIEW: A DECADE OF RESEARCH 6667
TABLE IV
OVERALL COUNTRY COLLABORATION
Authorized licensed use limited to: National University Fast. Downloaded on November 22,2024 at 04:26:52 UTC from IEEE Xplore. Restrictions apply.
6668 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 71, 2024
TABLE V
TOP FIVE PRODUCTIVE NATIONS IN EACH DOMAIN
TABLE VI
CITATION PATTERNS OF PUBLICATIONS IN EACH DOMAIN
TABLE VII
FIVE MOST INFLUENTIAL JOURNALS IN EACH DOMAIN OF QC
Authorized licensed use limited to: National University Fast. Downloaded on November 22,2024 at 04:26:52 UTC from IEEE Xplore. Restrictions apply.
SOOD AND : QUANTUM COMPUTING REVIEW: A DECADE OF RESEARCH 6669
Authorized licensed use limited to: National University Fast. Downloaded on November 22,2024 at 04:26:52 UTC from IEEE Xplore. Restrictions apply.
6670 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 71, 2024
TABLE VIII
CLUSTER SUMMARY OF THE QC DOMAINS
Authorized licensed use limited to: National University Fast. Downloaded on November 22,2024 at 04:26:52 UTC from IEEE Xplore. Restrictions apply.
SOOD AND : QUANTUM COMPUTING REVIEW: A DECADE OF RESEARCH 6671
Authorized licensed use limited to: National University Fast. Downloaded on November 22,2024 at 04:26:52 UTC from IEEE Xplore. Restrictions apply.
6672 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 71, 2024
Authorized licensed use limited to: National University Fast. Downloaded on November 22,2024 at 04:26:52 UTC from IEEE Xplore. Restrictions apply.
SOOD AND : QUANTUM COMPUTING REVIEW: A DECADE OF RESEARCH 6673
al. [74] introduced a secure and keyless quantum-inspired frame- (quantum analogs of P, BPP, and NP, respectively). Bernstein
work for image watermarking and authentication on quantum and Vazirani [90] show the relationship between conventional
computers, achieving a 25% improvement and offering 7%– and quantum complexity classes as BPP ⊆ BQP ⊆ P, speci-
50.7% increased visibility compared to conventional schemes. fying the quantum Turing machine to be more powerful than
Cao et al. [75] proposed a quantum artificial neural network the classical probabilistic Turing machine. On the contrary,
inspired by a classical artificial neural network that can com- Adleman et al. [91] proved that all three QCC classes are
pute quantum states by providing information via a network to included in PP, hence in PSPACE. Furthermore, Spakowski et
take advantage of quantum computer speed. Nawaj et al. [76] al. [92] proved NQP ⊆ BQP and EQP=NQP using the closure
present the state of the art of beyond 5G enabling technologies properties of classical complexity classes WPP and AWPP. Lago
and propose a novel QC-assisted and QML-based framework et al. [93] describe three complexity classes based on problems
for 6G communication networks. Biamonte et al. [77] discuss decidable in polynomial time i.e., EQP, BQP, and ZQP, and
the significance of QML over conventional machine learning named it implicit computational complexity having machine-
and concerned hardware and software challenges. Carleo and free, mathematical-logic-based characterizations. The authors
Troyer [78] present a reinforcement-learning-based scheme of have shown a perfect correspondence between these classes
a many-body wave function to reduce its computational com- and polytime lambda calculus SQ for quantum computation.
plexity to a tractable form. Rebentrost et al. [79] have proposed Tanaka [94] shows that the computational complexity class of
to implement a support vector machine over the quantum com- quantum gate minimization is NQP-hard and that the problem of
puter, which is exponentially faster than traditional sampling determining whether a given classical description of a quantum
algorithms. Havlicek et al. [80] present two quantum classifier circuit is strictly equivalent to the identity or not is an NQP
algorithms and implement them over an NISQ superconducting complete problem. Nishimura and Ozawa [95] determine a new
processor. complexity class uniform quantum circuit families (QCFs) and
show it to be computationally equivalent to the quantum Turing
D. QCIS machine. The authors also prove that BQP, ZQP, and EQP are
equivalent to corresponding complexity classes of QCFs. Blier
Bos et al. [81] demonstrate lattice-based cryptographic key
and Tapp [96] introduce a new complexity class called PQMA-
exchange architecture immune to quantum computer attacks.
log(2) (Classical polynomial-time quantum Merlin Arthur with
Diamanti et al. [82] discuss practical challenges in QKD,
two unentangled logarithmic-size certificates). Furthermore, the
which include developing high-scale communication devices
authors show that PQMAlog(2) = NP, which signifies the power
and global-scale QKD networks. Additionally, QKD needs secu-
of quantum information and subtlety of entanglement.
rity proof of the attacks allowed by quantum mechanics. Berstein
et al. [83] proposed a scheme for a highly secure postquantum
state-less hash-based digital signature. The signature technique F. Discussion and Future Scope
is developed to offer long-term 2128 security even from hackers
QCo is a new discipline that uses quantum states to transmit
using quantum computers. Bos et al. [84] proposed a Chosen
information over a channel. QCo provides extreme security
cipher text attack secure key encapsulation mechanism that pro-
and measurement accuracy using quantum mechanics principles
vides postquantum security over 128 b. Ahmed et al. [85], [86]
such as no-cloning, quantum measurement, entanglement, and
present a survey on IoT systems’ security and propose a quantum
quantum teleportation. QCo has grown to the point where the
steganography protocol to securely transmit information over
implementation of secure two-party protocols, secure bit com-
the fog cloud IoT, effectively countering popular attacks such
mitment, secure coin tossing, and quantum oblivious transfer
as man-in-the-middle, message, and no-message attacks. Miller
can be done with security from traditional attacks. However,
and Shi [87] introduced a highly secure and robust exponentially
to effectively utilize the unique properties of quantum me-
expanding untrusted-device randomness expansion protocol that
chanics, a significant network-paradigm shift and transdisci-
achieves cryptographic-level security while maintaining noise
plinary efforts are needed. Maintaining compatibility between
tolerance and requiring minimal quantum memory resources.
classical and QCo is still an open research area, where the
Zhang et al. [88] introduced a protocol that is immune to
SDN architecture can provide more flexibility and an excit-
well-known vulnerabilities such as Trojan horse attacks across
ing opportunity. Furthermore, significant research needs to be
lossy and noisy quantum channels and enables three participants
performed on quantum networking protocols, quantum error
to compute the sum of their inputs without the aid of a reliable
correcting codes, highly fragile entangled states, and the chal-
third party. Xu et al. [89] developed a better protocol for quantum
lenges of sharing quantum resources. Recent theoretical and
secure direct communication to thwart disentanglement and fake
experimental results on quantum simulation (digital or analog)
entangled particle attacks.
and quantum algorithms (purely quantum, quantum-inspired,
or hybrid) lead us to believe that we can tackle the broader
E. Quantum Computational Complexity (QCC)
range of hard class problems. Although, the current technolog-
Quantum computational complexity represents the compu- ical limitations—such as deep circuit algorithms and limited
tational power of quantum algorithms over quantum comput- qubit numbers—impose challenges for researchers to avail the
ers. In quantum computational complexity theory, we study benefits of QC. Researchers have recently developed different
the quantum complexity classes, such as EQP, BQP, and NQP subroutines, such as amplitude amplification, quantum phase
Authorized licensed use limited to: National University Fast. Downloaded on November 22,2024 at 04:26:52 UTC from IEEE Xplore. Restrictions apply.
6674 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 71, 2024
estimation, and quantum annealing, to solve complex machine USA emerges as the primary producer of high-quality literature
learning, searching, classification, and optimization problems. in this domain. Moreover, the study emphasizes the need for
However, there are still challenges such as small scale and NISQ Canadian policymakers to initiate national research and devel-
computers leading to the loss of crucial information, encoding opment (R&D) programs focused on enhancing international
input data into quantum states, and measuring the degree of collaboration in the field of QC.
entanglement. QKD in quantum cryptography is one of the In order to answer the third research question, the citation
hottest topics among secure multiparty quantum computation, pattern analysis and prominent journals are identified. The
quantum secure direct communication, and quantum signature. citation pattern analysis determines that QEAM is the most
There is a number of ground-based approaches to securely widely followed domain because it contains the highest number
share key over the quantum network; however, a satellite-based of publications with citations greater than 21. The analysis
QKD technique has emerged rapidly due to the limited distance also reflects the impact of research in the QAS domain with
coverage problem in the former approach. With many challenges a maximum citation count. The citation analysis of journals
such as quantum attacks, imperfections in quantum devices, identifies that IEEE TRANSACTIONS ON INFORMATION THEORY,
cost, distance, secret key rate, and postquantum key exchange, Computer Physics Communications, IEEE TRANSACTIONS ON
quantum cryptography is still in the applied research phase and IMAGE PROCESSING, and Information Sciences are the most
must pass through multiple stages of maturity, certification, prominent journals receiving the maximum citations count in
and standardization before reaching market-ready status. The QC domains. Moreover, the analysis presents that IEEE AC-
implication of quantum complexity theory is to determine the CESS is the most followed journal by researchers in all do-
relationship of QC with the classical complexity classes and mains of QC. The fourth research question on research frontiers
Turing machine to determine its computational power. Although and critical challenges is addressed by performing a thorough
the literature in this field is limited, it is evident that QC can analysis of document cocitation visualizations and systematic
efficiently solve NP-hard class problems. literature review, respectively. The analysis found that teleporta-
tion, quantum error correction, quantum-inspired metaheuristic
algorithms, QML, quantum image processing, image caption-
VII. DISCUSSION ing, blockchain, QKD, postquantum cryptography, privacy and
This novel work portrayed an in-depth scientometric and random number generators, and logic gates are the research
systematic literature review analysis of WoS-indexed publica- frontiers. QC literature analysis unveils that constructing large-
tions related to QC in the computer science discipline over the scale quantum computers and high-quality QCo devices are
2013–2022 time span. A document cocitation cluster network is the key parameters requiring attention for the multifold rise of
generated to address the first query about significant research QC. Moreover, maintaining compatibility between classical and
domains in QC. The analysis identifies five broad research QCo, quantum networking protocols, quantum error correcting
domains of QC: quantum communication; quantum algorithm codes, highly fragile entangled states, developing shallow circuit
and simulation; quantum enhanced analysis methods; quantum algorithms, encoding input data into quantum states, measuring
cryptography and information security; and quantum computa- degree of entanglement, and postquantum key exchange are the
tional complexity. key challenges in QC research.
The second research question on publications’ and global
contribution in each domain is addressed by the yearwise
VIII. CONCLUSION, IMPLICATIONS, AND FUTURE DIRECTIONS
distribution of the publications, geographical distribution, and
country collaboration. The temporal analysis of publication As information scientists, the authors have tracked the ad-
growth shows a sudden spike from 2018, indicating that the vancements and trends of the collective knowledge of a dynamic
QC knowledge domain has acquired researchers’ attention in scientific community using a scientometric review approach.
the last five years. The domainwise publications distribution The key findings of QC research in the past decade indicate that
advocates that maximum research has been done in the QAS the quantum algorithm development in QEAM is a prominent
(1859) domain. The popularity of the QAS domain can be research frontier. Furthermore, publications in the QEAM do-
attributed to its application in practically every field. QEAM main have experienced substantial growth and higher quality. It
acquire the highest growth rate (24.12%), signifying a predomi- presents an intriguing opportunity for scientists and researchers
nant research domain. However, QCC (582) lags in publications, to contemplate future strategies for achieving a multifold rise
thus presenting the scope of research in the field. According and significant advancements in this field. The scholarly litera-
to geographical distribution analysis, Peoples R China, USA, ture analysis underscores the challenges that QC encounters,
India, and Australia are the top literature contributors in all including qubit instability, quantum decoherence, scalability
domains of QC, indicating that most research is concentrated issues, limited gate operations, and high resource requirements,
in relatively developed countries. Additionally, it is observed which necessitate resolution for unlocking its full potential and
that Peoples R China has outperformed then other countries enabling practical applications.
arguably due to its massive expenditure of about 11 billion USD, The five research domains identified in the study enable
made only in a short duration from 2019 to 2021, on QC and scientists to communicate and analyze for future research di-
QCo. Regarding country collaboration analysis, research written rectives. A further detailed examination of each QC domain
on the QC literature in collaboration with other countries is supports appropriate strategic management of innovation for
dominated by Peoples R China, USA, and Australia. Notably, the competitive advantages in the quantum industry. The overall
Authorized licensed use limited to: National University Fast. Downloaded on November 22,2024 at 04:26:52 UTC from IEEE Xplore. Restrictions apply.
SOOD AND : QUANTUM COMPUTING REVIEW: A DECADE OF RESEARCH 6675
analysis provides innovative significance to IT researchers by [20] S. S. Gill et al., “Quantum computing: A taxonomy, systematic review and
presenting a comprehensive overview of QC research to help future directions,” Softw., Pract. Experience, vol. 52, no. 1, pp. 66–114,
2022.
them find key challenges and research frontiers. In addition, the [21] S. K. Sood, K. S. Rawat, and G. Sharma, “3-D printing technologies
proposed study offers an insightful and focused examination to from infancy to recent times: A scientometric review,” IEEE Trans. Eng.
commercialize R&D in QC at a large scale. Manage., to be published, Jan. 5, 2022, doi: 10.1109/TEM.2021.3134128.
[22] Y. S. Lamba, S. K. Sood, K. S. Rawat, M. Chopra, and A. K. Singh,
The presented research can be further extended by incorporat- “Knowledge mapping of 4D printing technologies in computer engi-
ing institution co-occurrence analysis and author coauthorship neering,” Comput. Appl. Eng. Educ., vol. 30, no. 6, pp. 1959–1978,
analysis in the current study. Scholars can leverage other data 2022.
[23] S. Neelam and S. K. Sood, “A scientometric review of global research on
visualization tools and databases to gain valuable insights, un- smart disaster management,” IEEE Trans. Eng. Manage., vol. 68, no. 1,
cover patterns, and make informed decisions for further research pp. 317–329, Feb. 2021.
and exploration within the realm of QC. Also, the research [24] K. S. Rawat and S. K. Sood, “Emerging trends and global scope of Big
Data analytics: A scientometric analysis,” Qual. Quantity, vol. 55, no. 4,
contribution of subdomains can be determined further to extend pp. 1371–1396, 2021.
the breadth and depth of the study. [25] K. Bogusławski, J. Nasur, J. Li, M. Gil, K. Wróbel, and F. Goerlandts,
“A cross-domain scientometric analysis of situational awareness of au-
tonomous vehicles with focus on the maritime domain,” IEEE Access,
vol. 10, pp. 50047–50061, 2022, doi: 10.1109/ACCESS.2022.3174097.
[26] S. K. Sood, K. S. Rawat, and D. Kumar, “Analytical mapping of informa-
REFERENCES tion and communication technology in emerging infectious diseases using
CiteSpace,” Telematics Informat., vol. 69, 2022, Art. no. 101796.
[1] E. R. MacQuarrie, C. Simon, S. Simmons, and E. Maine, “The emerging [27] C. Zheng, J. Yuan, L. Zhu, Y. Zhang, and Q. Shao, “From digital
commercial landscape of quantum computing,” Nature Rev. Phys., vol. 2, to sustainable: A scientometric review of smart city literature between
no. 11, pp. 596–598, 2020. 1990 and 2019,” J. Cleaner Prod., vol. 258, 2020, Art. no. 120689,
[2] F. Arute et al., “Quantum supremacy using a programmable superconduct- doi: 10.1016/j.jclepro.2020.120689.
ing processor,” Nature, vol. 574, no. 7779, pp. 505–510, 2019. [28] S. Neelam and S. K. Sood, “A scientometric review of global research on
[3] C. Palmer, “Quantum computing quickly scores second claim of smart disaster management,” IEEE Trans. Eng. Manage., vol. 68, no. 1,
supremacy,” Engineering, vol. 7, no. 9, pp. 1199–1200, 2021. pp. 317–329, Feb. 2021, doi: 10.1109/TEM.2020.2972288.
[4] H. J. Kimble, “The quantum internet,” Nature, vol. 453, no. 7198, [29] S. K. Sood, K. S. Rawat, and G. Sharma, “Role of enabling technologies
pp. 1023–1030, 2008. in soft tissue engineering: A systematic literature review,” IEEE Eng.
[5] F. Bova, A. Goldfarb, and R. G. Melko, “Commercial applications of Manage. Rev., vol. 50, no. 4, pp. 155–169, Dec. 2022.
quantum computing,” EPJ Quantum Technol., vol. 8, no. 1, pp. 2–15, [30] L. Heilig and S. Voß, “A scientometric analysis of cloud computing
2021. literature,” IEEE Trans. Cloud Comput., vol. 2, no. 3, pp. 266–278,
[6] A. Kumar and S. Garhwal, “State-of-the-art survey of quantum cryptogra- Jul.–Sep. 2014.
phy,” Arch. Comput. Methods Eng., vol. 28, no. 5, pp. 3831–3868, 2021. [31] B. Raza, R. Ahmad, M. H. N. B. M. Nasir, and S. S. M. Fauzi, “Socio-
[7] A. Acín, J. I. Cirac, and M. Lewenstein, “Entanglement percolation in technical congruence as an emerging concept in software development: A
quantum networks,” Nature Phys., vol. 3, no. 4, pp. 256–259, 2007. scientometric analysis and critical literature review,” IEEE Access, vol. 9,
[8] U. Azad, B. K. Behera, E. A. Ahmed, P. K. Panigrahi, and A. Farouk, pp. 129051–129077, 2021.
“Solving vehicle routing problem using quantum approximate optimiza- [32] S. Ozcan and A. Corum, “A scientometric analysis of remanufacturing
tion algorithm,” IEEE Trans. Intell. Transp. Syst., to be published, by mapping scientific, organizational, and national concentration zones,”
doi: 10.1109/TITS.2022.3172241. IEEE Trans. Eng. Manage., vol. 68, no. 4, pp. 1055–1071, Aug. 2021.
[9] Y. Li, R.-G. Zhou, R. Xu, J. Luo, W. Hu, and P. Fan, “Implementing [33] A.-W. Harzing and S. Alakangas, “Google Scholar, Scopus and the Web
graph-theoretic feature selection by quantum approximate optimization of Science: A longitudinal and cross-disciplinary comparison,” Sciento-
algorithm,” IEEE Trans. Neural Netw. Learn. Syst., to be published, metrics, vol. 106, no. 2, pp. 787–804, 2016.
doi: 10.1109/TNNLS.2022.3190042. [34] A. A. Chadegani et al., “A comparison between two main academic
[10] V. Stooß, M. Ulmke, and F. Govaers, “Quantum computing for applications literature collections: Web of Science and Scopus databases,” vol. 9, no. 5,
in data fusion,” IEEE Trans. Aerosp. Electron. Syst., vol. 59, no. 2, 2013, arXiv:1305.0377, doi: 10.5539/ass.v9n5p18.
pp. 2002–2012, Apr. 2022, doi: 10.1109/TAES.2022.3212026. [35] C. Chen and M. Song, “Visualizing a field of research: A methodology
[11] P. Knight and I. Walmsley, “UK national quantum technology programme,” of systematic scientometric reviews,” PLoS One, vol. 14, no. 10, 2019,
Quantum Sci. Technol., vol. 4, no. 4, 2019, Art. no. 040502. Art. no. e0223994.
[12] Y. Yamamoto, M. Sasaki, and H. Takesue, “Quantum information science [36] C. Chen, Z. Hu, S. Liu, and H. Tseng, “Emerging trends in regenerative
and technology in Japan,” Quantum Sci. Technol., vol. 4, no. 2, 2019, medicine: A scientometric analysis in CiteSpace,” Expert Opin. Biol. Ther.,
Art. no. 020502. vol. 12, no. 5, pp. 593–608, 2012.
[13] B. Sussman, P. Corkum, A. Blais, D. Cory, and A. Damascelli, “Quantum [37] M. Jacomy, T. Venturini, S. Heymann, and M. Bastian, “ForceAtlas2,
Canada,” Quantum Sci. Technol., vol. 4, no. 2, 2019, Art. no. 020503. a continuous graph layout algorithm for handy network visualization
[14] Q. Zhang, F. Xu, L. Li, N.-L. Liu, and J.-W. Pan, “Quantum informa- designed for the Gephi software,” PLoS One, vol. 9, no. 6, 2014, Art. no.
tion research in China,” Quantum Sci. Technol., vol. 4, no. 4, 2019, e98679.
Art. no. 040503. [38] N. V. Eck and L. Waltman, “Software survey: VOSviewer, a com-
[15] T. Scheidsteger, R. Haunschild, L. Bornmann, and C. Ettl, “Bibliometric puter program for bibliometric mapping,” Scientometrics, vol. 84, no. 2,
analysis in the field of quantum technology,” Quantum Rep., vol. 3, no. 3, pp. 523–538, 2010.
pp. 549–575, 2021. [39] M. J. Cobo, A. G. López-Herrera, E. Herrera-Viedma, and F. Herrera,
[16] J. Wang, L. Shen, and W. Zhou, “A bibliometric analysis of quantum “SciMAT: A new science mapping analysis software tool,” J. Amer. Soc.
computing literature: Mapping and evidences from Scopus,” Technol. Inf. Sci. Technol., vol. 63, no. 8, pp. 1609–1630, 2012.
Anal. Strategic Manage., vol. 33, no. 11, pp. 1347–1363, 2021. [40] J. D. Johnson, “UCINET: A software tool for network analysis,” Commun.
[17] M. Coccia, S. Roshani, and M. Mosleh, “Evolution of quantum com- Educ., vol. 36, no. 1, pp. 92–94, 1987.
puting: Theoretical and innovation management implications for emerg- [41] C. Chen, “CiteSpace II: Detecting and visualizing emerging trends and
ing quantum industry,” IEEE Trans. Eng. Manage., to be published, transient patterns in scientific literature,” J. Amer. Soc. Inf. Sci. Technol.,
doi: 10.1109/TEM.2022.3175633. vol. 57, no. 3, pp. 359–377, 2006.
[18] S. Dhawan, B. Gupta, and S. Bhusan, “Global publications output in quan- [42] Y. Fang, J. Yin, and B. Wu, “Climate change and tourism: A scientometric
tum computing research: A scientometric assessment during 2007-16,” analysis using CiteSpace,” J. Sustain. Tourism, vol. 26, no. 1, pp. 108–126,
Emerg. Sci. J., vol. 2, no. 4, pp. 228–237, 2018. 2018.
[19] A. Bhasin and M. Tripathi, “Quantum computing at an inflection point: [43] C. Chen, “The CiteSpace manual,” College Comput. Inform., vol. 1, no. 1,
Are we ready for a new paradigm,” IEEE Trans. Eng. Manage., vol. 70, pp. 1–84, 2014.
no. 7, pp. 2546–2557, Jul. 2023.
Authorized licensed use limited to: National University Fast. Downloaded on November 22,2024 at 04:26:52 UTC from IEEE Xplore. Restrictions apply.
6676 IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, VOL. 71, 2024
[44] A. Liberati et al., “The PRISMA statement for reporting systematic reviews [71] H. Nezamabadi-Pour, “A quantum-inspired gravitational search algorithm
and meta-analyses of studies that evaluate health care interventions: Expla- for binary encoded optimization problems,” Eng. Appl. Artif. Intell.,
nation and elaboration,” Ann. Intern. Med., vol. 151, no. 4, pp. W-65–W-94, vol. 40, pp. 62–75, 2015.
2009. [72] F. Yan, A. M. Iliyasu, and S. E. Venegas-Andraca, “A survey of quantum
[45] T. Ma, Y. Liu, and M. Han, “Visualization analysis of organizational image representations,” Quantum Inf. Process., vol. 15, no. 1, pp. 1–35,
resilience research based on CiteSpace from 1990–2022,” IEEE Access, 2016.
vol. 10, pp. 65854–65872, 2022, doi: 10.1109/ACCESS.2022.3184686. [73] V. Dunjko, J. M. Taylor, and H. J. Briegel, “Quantum-enhanced machine
[46] C. Chen and S. Morris, “Visualizing evolving networks: Minimum span- learning,” Phys. Rev. Lett., vol. 117, no. 13, 2016, Art. no. 130501.
ning trees versus pathfinder networks,” in Proc. IEEE Symp. Inf. Visual., [74] A. M. Iliyasu, P. Q. Le, F. Dong, and K. Hirota, “Watermarking and authen-
2003, pp. 67–74, doi: 10.1109/INFVIS.2003.1249010. tication of quantum images based on restricted geometric transformations,”
[47] C. Chen, CiteSpace: A Practical Guide for Mapping Scientific Literature. Inf. Sci., vol. 186, no. 1, pp. 126–149, 2012.
Hauppauge, NY, USA: Nova Sci. Publishers, 2016. [75] H. Cao, F. Cao, and D. Wang, “Quantum artificial neural networks with
[48] B. Korzh et al., “Provably secure and practical quantum key distribution applications,” Inf. Sci., vol. 290, pp. 1–6, 2015.
over 307 km of optical fibre,” Nature Photon., vol. 9, no. 3, pp. 163–168, [76] S. J. Nawaz, S. K. Sharma, S. Wyne, M. N. Patwary, and M. Asaduzzaman,
2015. “Quantum machine learning for 6G communication networks: State-of-
[49] S. Wang et al., “Twin-field quantum key distribution over 830-km fibre,” the-art and vision for the future,” IEEE Access, vol. 7, pp. 46317–46350,
Nature Photon., vol. 16, no. 2, pp. 154–161, 2022. 2019.
[50] A. S. Cacciapuoti, M. Caleffi, F. Tafuri, F. S. Cataliotti, S. Gherar- [77] J. Biamonte, P. Wittek, N. Pancotti, P. Rebentrost, N. Wiebe, and S. Lloyd,
dini, and G. Bianchi, “Quantum internet: Networking challenges in dis- “Quantum machine learning,” Nature, vol. 549, no. 7671, pp. 195–202,
tributed quantum computing,” IEEE Netw., vol. 34, no. 1, pp. 137–143, 2017.
Jan./Feb. 2019. [78] G. Carleo and M. Troyer, “Solving the quantum many-body problem with
[51] N. Hosseinidehaj, Z. Babar, R. Malaney, S. X. Ng, and L. Hanzo, “Satellite- artificial neural networks,” Science, vol. 355, no. 6325, pp. 602–606, 2017.
based continuous-variable quantum communications: State-of-the-art and [79] P. Rebentrost, M. Mohseni, and S. Lloyd, “Quantum support vector ma-
a predictive outlook,” IEEE Commun. Surveys Tuts., vol. 21, no. 1, chine for Big Data classification,” Phys. Rev. Lett., vol. 113, no. 13, 2014,
pp. 881–919, Jan.–Mar. 2019. Art. no. 130503.
[52] A. Aguado et al., “The engineering of software-defined quantum key [80] V. Havlíček et al., “Supervised learning with quantum-enhanced feature
distribution networks,” IEEE Commun. Mag., vol. 57, no. 7, pp. 20–26, spaces,” Nature, vol. 567, no. 7747, pp. 209–212, 2019.
Jul. 2019. [81] J. W. Bos, C. Costello, M. Naehrig, and D. Stebila, “Post-quantum key
[53] H. V. Nguyen et al., “Exit-chart aided quantum code design improves the exchange for the TLS protocol from the ring learning with errors problem,”
normalised throughput of realistic quantum devices,” IEEE Access, vol. 4, in Proc. IEEE Symp. Secur. Privacy, 2015, pp. 553–570.
pp. 10194–10209, 2016, doi: 10.1109/ACCESS.2016.2591910. [82] E. Diamanti, H.-K. Lo, B. Qi, and Z. Yuan, “Practical challenges in
[54] T. Lunghi et al., “Experimental bit commitment based on quantum com- quantum key distribution,” NPJ Quantum Inf., vol. 2, no. 1, pp. 1–12,
munication and special relativity,” Phys. Rev. Lett., vol. 111, no. 18, 2013, 2016.
Art. no. 180504. [83] D. J. Bernstein et al., “Sphincs: Practical stateless hash-based signatures,”
[55] T. Lethen, “Bit commitment as an introduction to quantum cryptography,” in Proc. Annu. Int. Conf. Theory Appl. Cryptographic Techn., 2015,
Eur. J. Phys., vol. 43, no. 5, 2022, Art. no. 055402. pp. 368–397, doi: 10.1007/978-3-662-46800-5_15.
[56] M. Hayashi, “Secure list decoding and its application to bit-string commit- [84] J. Bos et al., “Crystals-kyber: A CCA-secure module-lattice-based
ment,” IEEE Trans. Inf. Theory, vol. 68, no. 6, pp. 3620–3642, Jun. 2022. KEM,” in Proc. IEEE Eur. Symp. Secur. Privacy, 2018, pp. 353–367,
[57] M. Khawasik, W. Elsayed, M. Rashad, and A. Younes, “A secured quantum doi: 10.1109/EuroSP.2018.00032.
two-bit commitment protocol for communication systems,” IEEE Access, [85] T. M. Fernández-Caramés, “From pre-quantum to post-quantum IoT se-
vol. 10, pp. 50218–50226, 2022. curity: A survey on quantum-resistant cryptosystems for the Internet of
[58] L. Li and R.-H. Shi, “A feasible and practically secure quantum bit Things,” IEEE Internet Things J., vol. 7, no. 7, pp. 6457–6480, Jul. 2020.
commitment protocol,” Modern Phys. Lett. A, vol. 36, no. 34, 2021, [86] A. A. Abd El-Latif, B. Abd-El-Atty, M. S. Hossain, S. Elmougy, and A.
Art. no. 2150247. Ghoneim, “Secure quantum steganography protocol for fog cloud Internet
[59] C. Erven, N. Ng, N. Gigov, R. Laflamme, S. Wehner, and G. Weihs, “An of Things,” IEEE Access, vol. 6, pp. 10332–10340, 2018.
experimental implementation of oblivious transfer in the noisy storage [87] C. A. Miller and Y. Shi, “Robust protocols for securely expanding ran-
model,” Nature Commun., vol. 5, no. 1, 2014, Art. no. 3418. domness and distributing keys using untrusted quantum devices,” J. ACM,
[60] C. H. Bennett and G. Brassard, “Quantum cryptography: Public key vol. 63, no. 4, pp. 1–63, 2016.
distribution and coin tossing,” vol. 560, pp. 7–11, 2020, arXiv:2003.06557. [88] C. Zhang, Z.-W. Sun, X. Huang, and D.-Y. Long, “Three-party quantum
[61] P. J. O’Malley et al., “Scalable quantum simulation of molecular energies,” summation without a trusted third party,” Int. J. Quantum Inf., vol. 13,
Phys. Rev. X, vol. 6, no. 3, 2016, Art. no. 031007. no. 2, 2015, Art. no. 1550011.
[62] J. R. McClean, J. Romero, R. Babbush, and A. Aspuru-Guzik, “The theory [89] G. Xu, K. Xiao, Z. Li, X.-X. Niu, and M. Ryan, “Controlled secure
of variational hybrid quantum-classical algorithms,” New J. Phys., vol. 18, direct communication protocol via the three-qubit partially entangled set
no. 2, 2016, Art. no. 023023. of states,” Comput. Mater. Continua, vol. 58, no. 3, pp. 809–827, 2019.
[63] T. Albash and D. A. Lidar, “Adiabatic quantum computation,” Rev. Modern [90] E. Bernstein and U. Vazirani, “Quantum complexity theory,” in Proc. 25th
Phys., vol. 90, no. 1, 2018, Art. no. 015002. Annu. ACM Symp. Theory Comput., 1993, pp. 11–20.
[64] I. M. Georgescu, S. Ashhab, and F. Nori, “Quantum simulation,” Rev. [91] L. M. Adleman, J. Demarrais, and M.-D. A. Huang, “Quantum computabil-
Modern Phys., vol. 86, no. 1, 2014, Art. no. 153. ity,” SIAM J. Comput., vol. 26, no. 5, pp. 1524–1540, 1997.
[65] H. Bernien et al., “Probing many-body dynamics on a 51-atom quantum [92] H. Spakowski, M. Thakur, and R. Tripathi, “Quantum and classical
simulator,” Nature, vol. 551, no. 7682, pp. 579–584, 2017. complexity classes: Separations, collapses, and closure properties,” Inf.
[66] J. Zhang et al., “Observation of a many-body dynamical phase transi- Computation, vol. 200, no. 1, pp. 1–34, 2005.
tion with a 53-qubit quantum simulator,” Nature, vol. 551, no. 7682, [93] U. D. Lago, A. Masini, and M. Zorzi, “Quantum implicit computational
pp. 601–604, 2017. complexity,” Theor. Comput. Sci., vol. 411, no. 2, pp. 377–409, 2010.
[67] J. Preskill, “Quantum computing in the NISQ era and beyond,” Quantum, [94] Y. Tanaka, “Exact non-identity check is NQP-complete,” Int. J. Quantum
vol. 2, 2018, Art. no. 79. Inf., vol. 8, no. 5, pp. 807–819, 2010.
[68] M. R. Singh and S. S. Mahapatra, “A quantum behaved particle swarm [95] H. Nishimura and M. Ozawa, “Perfect computational equivalence between
optimization for flexible job shop scheduling,” Comput. Ind. Eng., vol. 93, quantum turing machines and finitely generated uniform quantum circuit
pp. 36–44, 2016. families,” Quantum Inf. Process., vol. 8, pp. 13–24, 2009.
[69] B. Cao, S. Fan, J. Zhao, P. Yang, K. Muhammad, and M. Tanveer, [96] H. Blier and A. Tapp, “A quantum characterization of np,” Comput.
“Quantum-enhanced multiobjective large-scale optimization via paral- Complexity, vol. 21, pp. 499–510, 2012.
lelism,” Swarm Evol. Computation, vol. 57, 2020, Art. no. 100697.
[70] M. Soleimanpour-Moghadam, H. Nezamabadi-Pour, and M. M. Farsangi,
“A quantum inspired gravitational search algorithm for numerical function
optimization,” Inf. Sci., vol. 267, pp. 83–100, 2014.
Authorized licensed use limited to: National University Fast. Downloaded on November 22,2024 at 04:26:52 UTC from IEEE Xplore. Restrictions apply.