{"id":"https://openalex.org/W4412082796","doi":"https://doi.org/10.1109/host64725.2025.11050014","title":"E-LoQ: Enhanced Locking for Quantum Circuit IP Protection","display_name":"E-LoQ: Enhanced Locking for Quantum Circuit IP Protection","publication_year":2025,"publication_date":"2025-05-05","ids":{"openalex":"https://openalex.org/W4412082796","doi":"https://doi.org/10.1109/host64725.2025.11050014"},"language":"en","primary_location":{"id":"doi:10.1109/host64725.2025.11050014","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host64725.2025.11050014","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5100657640","display_name":"Yuntao Liu","orcid":"https://orcid.org/0000-0003-4033-2133"},"institutions":[{"id":"https://openalex.org/I186143895","display_name":"Lehigh University","ror":"https://ror.org/012afjb06","country_code":"US","type":"education","lineage":["https://openalex.org/I186143895"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Yuntao Liu","raw_affiliation_strings":["Lehigh University,Department of Electrical and Computer Engineering,PA,USA"],"affiliations":[{"raw_affiliation_string":"Lehigh University,Department of Electrical and Computer Engineering,PA,USA","institution_ids":["https://openalex.org/I186143895"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025056208","display_name":"Jan John","orcid":"https://orcid.org/0000-0002-5617-9017"},"institutions":[{"id":"https://openalex.org/I156087764","display_name":"University of California, Merced","ror":"https://ror.org/00d9ah105","country_code":"US","type":"education","lineage":["https://openalex.org/I156087764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Jayden John","raw_affiliation_strings":["University of California,Department of Electrical Engineering,Merced,CA,USA"],"affiliations":[{"raw_affiliation_string":"University of California,Department of Electrical Engineering,Merced,CA,USA","institution_ids":["https://openalex.org/I156087764"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100718840","display_name":"Qian Wang","orcid":"https://orcid.org/0000-0001-5308-1914"},"institutions":[{"id":"https://openalex.org/I156087764","display_name":"University of California, Merced","ror":"https://ror.org/00d9ah105","country_code":"US","type":"education","lineage":["https://openalex.org/I156087764"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Qian Wang","raw_affiliation_strings":["University of California,Department of Electrical Engineering,Merced,CA,USA"],"affiliations":[{"raw_affiliation_string":"University of California,Department of Electrical Engineering,Merced,CA,USA","institution_ids":["https://openalex.org/I156087764"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5100657640"],"corresponding_institution_ids":["https://openalex.org/I186143895"],"apc_list":null,"apc_paid":null,"fwci":3.7141,"has_fulltext":false,"cited_by_count":5,"citation_normalized_percentile":{"value":0.93467488,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":97,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"67","last_page":"77"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T14117","display_name":"Integrated Circuits and Semiconductor Failure Analysis","score":0.9962000250816345,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12122","display_name":"Physical Unclonable Functions (PUFs) and Hardware Security","score":0.9955999851226807,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12495","display_name":"Electrostatic Discharge in Electronics","score":0.9952999949455261,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/quantum","display_name":"Quantum","score":0.4858243465423584},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.4508223533630371},{"id":"https://openalex.org/keywords/optoelectronics","display_name":"Optoelectronics","score":0.39720797538757324},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.32029247283935547},{"id":"https://openalex.org/keywords/physics","display_name":"Physics","score":0.24621036648750305},{"id":"https://openalex.org/keywords/quantum-mechanics","display_name":"Quantum mechanics","score":0.10048708319664001}],"concepts":[{"id":"https://openalex.org/C84114770","wikidata":"https://www.wikidata.org/wiki/Q46344","display_name":"Quantum","level":2,"score":0.4858243465423584},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.4508223533630371},{"id":"https://openalex.org/C49040817","wikidata":"https://www.wikidata.org/wiki/Q193091","display_name":"Optoelectronics","level":1,"score":0.39720797538757324},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.32029247283935547},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.24621036648750305},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.10048708319664001}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/host64725.2025.11050014","is_oa":false,"landing_page_url":"https://doi.org/10.1109/host64725.2025.11050014","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 IEEE International Symposium on Hardware Oriented Security and Trust (HOST)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.7099999785423279,"display_name":"Affordable and clean energy","id":"https://metadata.un.org/sdg/7"}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":29,"referenced_works":["https://openalex.org/W1524250393","https://openalex.org/W2130753923","https://openalex.org/W2615060729","https://openalex.org/W2708742051","https://openalex.org/W2906133437","https://openalex.org/W2937403225","https://openalex.org/W2977663466","https://openalex.org/W2999629616","https://openalex.org/W3013348036","https://openalex.org/W3034847383","https://openalex.org/W3043014779","https://openalex.org/W3047634080","https://openalex.org/W3134094814","https://openalex.org/W3140586337","https://openalex.org/W3163519515","https://openalex.org/W3204024091","https://openalex.org/W4200392948","https://openalex.org/W4285345508","https://openalex.org/W4286640312","https://openalex.org/W4312121011","https://openalex.org/W4361798893","https://openalex.org/W4384037001","https://openalex.org/W4388857017","https://openalex.org/W4396949190","https://openalex.org/W4406261169","https://openalex.org/W6735857713","https://openalex.org/W6851980431","https://openalex.org/W6854088641","https://openalex.org/W6856007152"],"related_works":["https://openalex.org/W4391375266","https://openalex.org/W2899084033","https://openalex.org/W2748952813","https://openalex.org/W2390279801","https://openalex.org/W4391913857","https://openalex.org/W2358668433","https://openalex.org/W4396701345","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W4396696052"],"abstract_inverted_index":{"In":[0,14,73],"recent":[1],"years,":[2],"quantum":[3,15,17,22,30,38,55,60,121,131,178,207],"computing":[4],"has":[5],"started":[6],"to":[7,11,65,83,146],"demonstrate":[8,197],"superior":[9],"efficiency":[10],"classical":[12,74],"computing.":[13],"computing,":[16,75],"circuits":[18,48,132],"that":[19,149,198],"implement":[20],"specific":[21],"algorithms":[23],"are":[24],"usually":[25],"not":[26],"directly":[27],"executable":[28],"on":[29,173],"computer":[31],"hardware.":[32],"Quantum":[33],"circuit":[34,86,122],"compilers":[35,56],"decompose":[36],"high-level":[37],"gates":[39,44],"into":[40,102,141],"the":[41,47,66,103,106,113,166,188,192,202,205],"hardware's":[42],"native":[43],"and":[45,51,92],"optimize":[46],"for":[49,130,153],"accuracy":[50],"performance.":[52],"However,":[53],"untrusted":[54],"risk":[57],"stealing":[58],"original":[59,193,206],"designs":[61,88],"(quantum":[62],"circuits),":[63],"leading":[64],"theft":[67],"of":[68,81,168,176,182,204,214],"sensitive":[69],"intellectual":[70],"property":[71],"(IP).":[72],"logic":[76],"locking":[77,128],"is":[78,109],"a":[79,99,174],"family":[80],"techniques":[82],"secure":[84],"integrated":[85],"(ICs)":[87],"against":[89],"reverse":[90],"engineering":[91],"IP":[93],"piracy.":[94],"This":[95],"technique":[96,129],"involves":[97],"inserting":[98],"keyed":[100],"value":[101],"circuit,":[104,208],"ensuring":[105],"correct":[107,114],"output":[108],"achieved":[110],"only":[111],"with":[112,209],"key.":[115],"To":[116],"address":[117],"similar":[118],"issues":[119],"in":[120],"protection,":[123],"we":[124],"propose":[125],"an":[126,210],"enhanced":[127],"(E-LoQ)":[133],"where":[134],"multiple":[135],"key":[136,143,155],"bits":[137],"can":[138],"be":[139],"condensed":[140],"one":[142,151],"qubit.":[144],"Compared":[145],"previous":[147],"work":[148],"used":[150],"qubit":[152],"each":[154],"bit,":[156],"our":[157,169],"approach":[158],"achieves":[159],"higher":[160],"security":[161],"levels.":[162],"We":[163],"have":[164],"demonstrated":[165],"practicality":[167],"method":[170],"through":[171],"experiments":[172],"set":[175],"benchmark":[177],"circuits.":[179],"The":[180],"effectiveness":[181],"E-LoQ":[183,199],"was":[184],"measured":[185],"by":[186],"assessing":[187],"divergence":[189],"distance":[190],"from":[191],"circuit.":[194],"Our":[195],"results":[196],"effectively":[200],"conceals":[201],"function":[203],"average":[211],"fidelity":[212],"degradation":[213],"less":[215],"than":[216],"1":[217],"%.":[218]},"counts_by_year":[{"year":2025,"cited_by_count":5}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
