{"id":2422,"date":"2026-02-01T18:28:50","date_gmt":"2026-02-01T16:28:50","guid":{"rendered":"https:\/\/www.lbscience.org\/en\/2026\/01\/30\/quantum-secured-artificial-intelligence\/"},"modified":"2026-02-02T18:57:07","modified_gmt":"2026-02-02T16:57:07","slug":"quantum-secured-artificial-intelligence","status":"publish","type":"post","link":"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/","title":{"rendered":"Quantum-Secured AI"},"content":{"rendered":"<p><span style=\"font-weight: 400\">Have you ever asked an AI system such as GPT, Claude, or Gemini a personal question, something you would rather not reveal? Today the server side promises not to misuse your data, but we would like a mathematical guarantee that the information is protected. You are not alone in this problem. Hospitals also want to use advanced models for medical diagnosis, like the ones offered by the Israeli company Aidoc [2], yet regulations restrict sending private information to the cloud [3].<\/span><\/p>\n<p><span style=\"font-weight: 400\">This gap stems from the way most artificial intelligence actually works. The best models are also computationally expensive, so they run on powerful cloud servers. To get an answer, the client sends input to the server, and it is sometimes sensitive input.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In such a scenario there are two secrets. On one side stands the client, a private individual or a hospital that wants an answer without exposing its data. On the other side stands the server that holds the model. It wants to protect its \u201crecipe\u201d: the internal numbers called weights [4]. The weights are what the model \u201clearned\u201d after long training and are highly valuable.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Mathematically, this is a variation of a known problem: secure multiparty computation. We want to compute a function of several private inputs but reveal only the output. Here the function is \u201crun the model on the input,\u201d and the private inputs are both the client\u2019s data and the server\u2019s parameters.<\/span><\/p>\n<p><span style=\"font-weight: 400\">There are cryptographic solutions that allow computation on encrypted data, but their computational cost is usually high, so they are not yet practical. Sometimes they also rely on the assumption that no one can solve a hard mathematical problem in reasonable time [6]. In our paper we wanted something stronger: cybersecurity based on the laws of physics.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Our tool is light [7]\u2014not as an analogy, but as a computing medium. We encode numbers into weak laser pulses that travel through optical fibers, exactly the infrastructure upon which the internet already relies. The encoding uses two properties of a light wave: intensity and phase. Phase is the \u201cposition\u201d of the wave within its cycle. In this way, light carries the information.<\/span><\/p>\n<p><span style=\"font-weight: 400\">In computer science it is convenient to treat information as abstract. In reality, information is always \u201cstored\u201d in the physical state of a system: a voltage level in a transistor, or in our case the intensity and phase of light. In the quantum world one cannot perfectly copy an unknown state. This is the no-cloning principle [1]. This means that an attempt to extract information through measurements changes the signal and thus adds noise. In ordinary electronic systems, these quantum effects are negligible compared with other noise sources, so it is hard to harness them for security. In weak light, however, quantum noise is a significant part of the story and can be used to detect an attempt to \u201cmeasure too much.\u201d<\/span><\/p>\n<p><span style=\"font-weight: 400\">Our innovative tool is a \u201ccoherent linear-algebra engine.\u201d It is designed for the most common operation in AI systems: the weighted sum of numbers. In our model, the client does not send its data to the server; on the contrary, the server sends its weights to the client, who must perform the computation without learning anything about the weights and then prove this to the server. The server transmits the weights to the client encoded in weak light pulses called \u201ccoherent states\u201d [7]. Without measuring the weights\u2019 values, the client routes them through optical components that mix the weights with the desired input in such a way that the result of the computation is concentrated in a single pulse (or \u201cmode\u201d). The client isolates and measures that single mode to obtain the result. All the other modes are sent back to the server as proof that the client did not \u201ctouch\u201d the weights beyond what was necessary. The computing on the client side is enabled by shifting from digital computation to light-based computation. Such optical processing can allow faster computation at a lower energy cost and serve as a practical stepping-stone toward quantum computing. The novelty of the present work lies in the information-security aspect.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Security here is two-sided. The client measures only the light needed for the computation, while the remaining light is returned to the server for security checks. If extra measurements were taken along the way to learn the weights, this shows up as higher noise in the light that returns to the server. The server can measure this noise and thus derive a mathematical bound on how much information could have leaked.<\/span><\/p>\n<p><span style=\"font-weight: 400\">We tested the idea on the MNIST task: Classification of images of handwritten digits [5]. It is a relatively simple task, but it allows a clean measurement of the trade-off between computational accuracy and security. We found that one can achieve accuracy above 95 percent, while simultaneously obtaining a very low quantitative bound on information leakage: Less than a tenth of a bit on average per weight and per input component.<\/span><\/p>\n<p><span style=\"font-weight: 400\">Another advantage is engineering accessibility. Our protocol relies on well-known components from optical communications: lasers, fibers, amplifiers, and detectors, such as homodyne detection, a standard technique in optical communication. It does not require a quantum computer or changes to infrastructure\u2014just smart use of what is already inside communication racks.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The security mechanism is based on the fact that additional measurements leave a footprint that can be detected and quantified. Such a mechanism mainly provides an after-the-fact alert about cheating attempts, but we would like to guarantee in advance that no side can extract more information than allowed. To move toward this goal, in the paper we propose an encoding method that combines deliberate randomness to hide the secret information and methods that limit the accumulation of information leakage when the model is used repeatedly.<\/span><\/p>\n<p><span style=\"font-weight: 400\">The next step is to extend the method to multi-party scenarios such as federated learning, where several organizations train a model together without sharing raw data, and to build a laboratory prototype. Thus, tools from quantum physics connect directly to the classical cryptographic problem: Computing together without relinquishing privacy.<\/span><\/p>\n<hr \/>\n<p><span style=\"font-weight: 400\">The research described in this article was conducted by Kfir Sulimany together with Sri Krishna Vadlamani, Ryan Hamerly, Prahlad Iyengar, and Dirk Englund, focusing on how photonic quantum technology can be combined with deep learning to enable two-sided secure cloud computation. The original paper on which this article is based can be found in [9].<\/span><\/p>\n<p>Hebrew editing: Shir Rosenblum-Man<br \/>\nEnglish editing: Elee Shimshoni<\/p>\n<hr \/>\n<p><b>References:<\/b><\/p>\n<ol>\n<li><a href=\"https:\/\/quantum.cloud.ibm.com\/learning\/en\/courses\/basics-of-quantum-information\/quantum-circuits\/limitations-on-quantum-information\">The no-cloning principle on IBM\u2019s quantum-computing site<\/a><\/li>\n<li><a href=\"https:\/\/www.aidoc.com\">AIDOC<\/a><\/li>\n<li><a href=\"https:\/\/artificialintelligenceact.eu\/article\/78\/\">EU act on AI and confidentiality<\/a><\/li>\n<li><a href=\"https:\/\/www.lbscience.org\/en\/2019\/04\/29\/deep-learning\/\">Deep Learning<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/MNIST_database\">MNIST on Wikipedia<\/a><\/li>\n<li><a href=\"https:\/\/www.lbscience.org\/en\/2018\/08\/01\/the-rsa-encryption-method\/\">The RSA encryption method<\/a><\/li>\n<li><a href=\"https:\/\/davidson.org.il\/read-experience\/en\/maagarmada-en\/physics-light\/\">Light\u2014Davidson Institute<\/a><\/li>\n<li><a href=\"https:\/\/en.wikipedia.org\/wiki\/Coherent_state\">Coherent states<\/a><\/li>\n<li><a href=\"https:\/\/doi.org\/10.1103\/k8wg-qmbh\">The original paper on which this article is based<\/a>, and <a href=\"https:\/\/news.mit.edu\/2024\/new-security-protocol-shields-data-during-cloud-based-computation-0926\">coverage of the work on the MIT News site<\/a><\/li>\n<\/ol>\n","protected":false},"excerpt":{"rendered":"<p>Have you ever asked an AI system such as GPT, Claude, or Gemini a personal question, something you would rather not reveal? Today the server side promises not to misuse your data, but we would like a mathematical guarantee that the information is protected. You are not alone in this problem. Hospitals also want to [&hellip;]<\/p>\n","protected":false},"author":235,"featured_media":2460,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[20,12,7],"tags":[],"class_list":["post-2422","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-computer-science","category-engineering","category-physics"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Quantum-Secured AI - Little, Big Science<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Quantum-Secured AI - Little, Big Science\" \/>\n<meta property=\"og:description\" content=\"Have you ever asked an AI system such as GPT, Claude, or Gemini a personal question, something you would rather not reveal? Today the server side promises not to misuse your data, but we would like a mathematical guarantee that the information is protected. You are not alone in this problem. Hospitals also want to [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/\" \/>\n<meta property=\"og:site_name\" content=\"Little, Big Science\" \/>\n<meta property=\"article:published_time\" content=\"2026-02-01T16:28:50+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2026-02-02T16:57:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.lbscience.org\/en\/wp-content\/uploads\/sites\/3\/2026\/02\/en_meme.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2400\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"\u05db\u05e4\u05d9\u05e8 \u05e1\u05d5\u05dc\u05d9\u05de\u05e0\u05d9\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@KfirSulimany\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"\u05db\u05e4\u05d9\u05e8 \u05e1\u05d5\u05dc\u05d9\u05de\u05e0\u05d9\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/\",\"url\":\"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/\",\"name\":\"Quantum-Secured AI - Little, Big Science\",\"isPartOf\":{\"@id\":\"https:\/\/www.lbscience.org\/en\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.lbscience.org\/en\/wp-content\/uploads\/sites\/3\/2026\/02\/en_meme.jpeg\",\"datePublished\":\"2026-02-01T16:28:50+00:00\",\"dateModified\":\"2026-02-02T16:57:07+00:00\",\"author\":{\"@id\":\"https:\/\/www.lbscience.org\/en\/#\/schema\/person\/a846c8532052635447656fc24e83d248\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/#primaryimage\",\"url\":\"https:\/\/www.lbscience.org\/en\/wp-content\/uploads\/sites\/3\/2026\/02\/en_meme.jpeg\",\"contentUrl\":\"https:\/\/www.lbscience.org\/en\/wp-content\/uploads\/sites\/3\/2026\/02\/en_meme.jpeg\",\"width\":2400,\"height\":1350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.lbscience.org\/en\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Quantum-Secured AI\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.lbscience.org\/en\/#website\",\"url\":\"https:\/\/www.lbscience.org\/en\/\",\"name\":\"Little, Big Science\",\"description\":\"\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.lbscience.org\/en\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.lbscience.org\/en\/#\/schema\/person\/a846c8532052635447656fc24e83d248\",\"name\":\"\u05db\u05e4\u05d9\u05e8 \u05e1\u05d5\u05dc\u05d9\u05de\u05e0\u05d9\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.lbscience.org\/en\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/1653e944c56fd6d5e9db03c6e80d5f6d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/1653e944c56fd6d5e9db03c6e80d5f6d?s=96&d=mm&r=g\",\"caption\":\"\u05db\u05e4\u05d9\u05e8 \u05e1\u05d5\u05dc\u05d9\u05de\u05e0\u05d9\"},\"description\":\"\u05e4\u05d5\u05e1\u05d8\u05be\u05d3\u05d5\u05e7\u05d8\u05d5\u05e8\u05d8 \u05d1\u05beMIT, \u05d5\u05d1\u05e7\u05e8\u05d5\u05d1 \u05d7\u05d1\u05e8 \u05e1\u05d2\u05dc \u05d1\u05e4\u05e7\u05d5\u05dc\u05d8\u05d4 \u05dc\u05d4\u05e0\u05d3\u05e1\u05ea \u05d7\u05e9\u05de\u05dc \u05d5\u05de\u05d7\u05e9\u05d1\u05d9\u05dd \u05e2\u05f4\u05e9 \u05d5\u05d9\u05d8\u05e8\u05d1\u05d9 \u05d1\u05d8\u05db\u05e0\u05d9\u05d5\u05df\",\"sameAs\":[\"https:\/\/x.com\/@KfirSulimany\"],\"url\":\"https:\/\/www.lbscience.org\/en\/author\/guestkfirs\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Quantum-Secured AI - Little, Big Science","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/","og_locale":"en_US","og_type":"article","og_title":"Quantum-Secured AI - Little, Big Science","og_description":"Have you ever asked an AI system such as GPT, Claude, or Gemini a personal question, something you would rather not reveal? Today the server side promises not to misuse your data, but we would like a mathematical guarantee that the information is protected. You are not alone in this problem. Hospitals also want to [&hellip;]","og_url":"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/","og_site_name":"Little, Big Science","article_published_time":"2026-02-01T16:28:50+00:00","article_modified_time":"2026-02-02T16:57:07+00:00","og_image":[{"width":2400,"height":1350,"url":"https:\/\/www.lbscience.org\/en\/wp-content\/uploads\/sites\/3\/2026\/02\/en_meme.jpeg","type":"image\/jpeg"}],"author":"\u05db\u05e4\u05d9\u05e8 \u05e1\u05d5\u05dc\u05d9\u05de\u05e0\u05d9","twitter_card":"summary_large_image","twitter_creator":"@KfirSulimany","twitter_misc":{"Written by":"\u05db\u05e4\u05d9\u05e8 \u05e1\u05d5\u05dc\u05d9\u05de\u05e0\u05d9","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/","url":"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/","name":"Quantum-Secured AI - Little, Big Science","isPartOf":{"@id":"https:\/\/www.lbscience.org\/en\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/#primaryimage"},"image":{"@id":"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/#primaryimage"},"thumbnailUrl":"https:\/\/www.lbscience.org\/en\/wp-content\/uploads\/sites\/3\/2026\/02\/en_meme.jpeg","datePublished":"2026-02-01T16:28:50+00:00","dateModified":"2026-02-02T16:57:07+00:00","author":{"@id":"https:\/\/www.lbscience.org\/en\/#\/schema\/person\/a846c8532052635447656fc24e83d248"},"breadcrumb":{"@id":"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/#primaryimage","url":"https:\/\/www.lbscience.org\/en\/wp-content\/uploads\/sites\/3\/2026\/02\/en_meme.jpeg","contentUrl":"https:\/\/www.lbscience.org\/en\/wp-content\/uploads\/sites\/3\/2026\/02\/en_meme.jpeg","width":2400,"height":1350},{"@type":"BreadcrumbList","@id":"https:\/\/www.lbscience.org\/en\/2026\/02\/01\/quantum-secured-artificial-intelligence\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.lbscience.org\/en\/"},{"@type":"ListItem","position":2,"name":"Quantum-Secured AI"}]},{"@type":"WebSite","@id":"https:\/\/www.lbscience.org\/en\/#website","url":"https:\/\/www.lbscience.org\/en\/","name":"Little, Big Science","description":"","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.lbscience.org\/en\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.lbscience.org\/en\/#\/schema\/person\/a846c8532052635447656fc24e83d248","name":"\u05db\u05e4\u05d9\u05e8 \u05e1\u05d5\u05dc\u05d9\u05de\u05e0\u05d9","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.lbscience.org\/en\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/1653e944c56fd6d5e9db03c6e80d5f6d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/1653e944c56fd6d5e9db03c6e80d5f6d?s=96&d=mm&r=g","caption":"\u05db\u05e4\u05d9\u05e8 \u05e1\u05d5\u05dc\u05d9\u05de\u05e0\u05d9"},"description":"\u05e4\u05d5\u05e1\u05d8\u05be\u05d3\u05d5\u05e7\u05d8\u05d5\u05e8\u05d8 \u05d1\u05beMIT, \u05d5\u05d1\u05e7\u05e8\u05d5\u05d1 \u05d7\u05d1\u05e8 \u05e1\u05d2\u05dc \u05d1\u05e4\u05e7\u05d5\u05dc\u05d8\u05d4 \u05dc\u05d4\u05e0\u05d3\u05e1\u05ea \u05d7\u05e9\u05de\u05dc \u05d5\u05de\u05d7\u05e9\u05d1\u05d9\u05dd \u05e2\u05f4\u05e9 \u05d5\u05d9\u05d8\u05e8\u05d1\u05d9 \u05d1\u05d8\u05db\u05e0\u05d9\u05d5\u05df","sameAs":["https:\/\/x.com\/@KfirSulimany"],"url":"https:\/\/www.lbscience.org\/en\/author\/guestkfirs\/"}]}},"_links":{"self":[{"href":"https:\/\/www.lbscience.org\/en\/wp-json\/wp\/v2\/posts\/2422","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.lbscience.org\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.lbscience.org\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.lbscience.org\/en\/wp-json\/wp\/v2\/users\/235"}],"replies":[{"embeddable":true,"href":"https:\/\/www.lbscience.org\/en\/wp-json\/wp\/v2\/comments?post=2422"}],"version-history":[{"count":12,"href":"https:\/\/www.lbscience.org\/en\/wp-json\/wp\/v2\/posts\/2422\/revisions"}],"predecessor-version":[{"id":2459,"href":"https:\/\/www.lbscience.org\/en\/wp-json\/wp\/v2\/posts\/2422\/revisions\/2459"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.lbscience.org\/en\/wp-json\/wp\/v2\/media\/2460"}],"wp:attachment":[{"href":"https:\/\/www.lbscience.org\/en\/wp-json\/wp\/v2\/media?parent=2422"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.lbscience.org\/en\/wp-json\/wp\/v2\/categories?post=2422"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.lbscience.org\/en\/wp-json\/wp\/v2\/tags?post=2422"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}