14,544 results on '"QUANTUM INFORMATION"'
Search Results
2. Triangular cross-section beam splitters in silicon carbide for quantum information processing
- Author
-
Majety, Sridhar, Saha, Pranta, Kekula, Zbynka, Dhuey, Scott, and Radulaski, Marina
- Subjects
Quantum Physics ,Engineering ,Electronics ,Sensors and Digital Hardware ,Physical Sciences ,Atomic ,Molecular and Optical Physics ,Photonic ,Modeling ,Simulation ,Ion-beam processing ,Nanostructure ,Single-photon source/emitter ,Quantum communications ,Quantum information ,Materials Engineering ,Materials engineering ,Condensed matter physics - Abstract
Triangular cross-section color center photonics in silicon carbide is a leading candidate for scalable implementation of quantum hardware. Within this geometry, we model low-loss beam splitters for applications in key quantum optical operations such as entanglement and single-photon interferometry. We consider triangular cross-section single-mode waveguides for the design of a directional coupler. We optimize parameters for a 50:50 beam splitter. Finally, we test the experimental feasibility of the designs by fabricating triangular waveguides in an ion beam etching process and identify suitable designs for short-term implementation.
- Published
- 2024
3. Key reconciliation protocol for quantum key distribution.
- Author
-
Sharma, Neha, Saxena, Vikas, Chamola, Vinay, and Hassija, Vikas
- Abstract
In quantum cryptography, secret communications are delivered through a quantum channel. One of the most important breakthroughs in quantum cryptography has been the quantum key distribution (QKD). This process enables two distant parties to share secure communications based on physical laws. However, eavesdroppers can still interrupt the communication. To overcome this, we propose a different way to detect the presence of Eve through the polynomial interpolation technique. This technique also allows us for key verification. This approach prevents the receiver as well as the intruder from discovering the sender's fundamental basis. To fully utilize IBM quantum computers' quantum computing capabilities, this paper attempts to show % error against alpha (strength of eavesdropping) and the impact of noise on the success probability of the desired key bits. Furthermore, the success probability under depolarizing noise is explained for different qubit counts. In the enhanced QKD protocol, using polynomial interpolation for reconciliation shows a 50% probability of successful key generation. This is even when the noise is increased to the maximum capacity. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
4. Weak measurements enhancing the quantum information facets of a driven Unruh–DeWitt detector.
- Author
-
Xie, Jia-Ling, Zhu, Cheng-Jie, Tan, Jia, and Hao, Xiang
- Subjects
QUANTUM coherence ,QUANTUM measurement ,HERMITIAN operators ,QUANTUM fluctuations ,UNRUH effect - Abstract
We developed a Hermitian operator representation of the Unruh channel for a driven accelerated detector in the presence of external noise. This representation is then used to provide a generalized analytical approach to a non-inertial evolution subjected to quantum weak measurements. The quantum information facets were then improved by performing weak measurements before and after the quantum channel. The external noise was modeled using a phase damping channel. The prominent oscillations of the quantum information are caused by vacuum fluctuations of the quantum fields coupled to the detector. Steady values are obtained for the quantum coherence and quantum Fisher information using the Unruh effect. Thus, quantum weak measurements can effectively suppress the decoherence induced by the relativistic acceleration. By comparing with cases without weak measurements, we demonstrate that there exist some regions with optimal measurement strengths that enhance the quantum coherence and quantum Fisher information. The effects of conditional improvement on the quantum information facets are still obvious in the presence of external noise. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
5. Refraction of the Two-Photon Multimode Field via a Three-Level Atom.
- Author
-
Harborth, Trever and Rostovtsev, Yuri
- Subjects
- *
QUANTUM communication , *QUANTUM electrodynamics , *QUANTUM optics , *QUANTUM computing , *ELECTROMAGNETIC fields - Abstract
Classically, the refractive index of a medium is due to a response on said medium from an electromagnetic field. It has been shown that a single two-level atom interacting with a single photon undergoes dispersion. The following extends that analyses to a three-level system interacting with two photons. Analysis of the system is completed both numerically for all photonic field modes, and analytically for an adiabatic solution of a single field mode. The findings are not only interesting for understanding additional physical phenomena due to the increased complexity of a three-level, two-photon system, but are also necessary for advancing applications such as quantum communications, quantum computation, and quantum information. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
6. Single-Photon Detectors for Quantum Integrated Photonics.
- Author
-
Dao, Thu Ha, Amanti, Francesco, Andrini, Greta, Armani, Fabrizio, Barbato, Fabrizio, Bellani, Vittorio, Bonaiuto, Vincenzo, Cammarata, Simone, Campostrini, Matteo, Cornia, Samuele, De Matteis, Fabio, Demontis, Valeria, Di Giuseppe, Giovanni, Ditalia Tchernij, Sviatoslav, Donati, Simone, Fontana, Andrea, Forneris, Jacopo, Francini, Roberto, Frontini, Luca, and Gazzadi, Gian Carlo
- Subjects
QUANTUM cryptography ,INFORMATION technology ,QUANTUM computing ,PHOTONS ,DETECTORS - Abstract
Single-photon detectors have gained significant attention recently, driven by advancements in quantum information technology. Applications such as quantum key distribution, quantum cryptography, and quantum computation demand the ability to detect individual quanta of light and distinguish between single-photon states and multi-photon states, particularly when operating within waveguide systems. Although single-photon detector fabrication has been established for some time, integrating detectors with waveguides using new materials with suitable structural and electronic properties, especially at telecommunication wavelengths, creates more compact source-line-detector systems. This review explores the state of the art of single-photon detector research and examines the potential breakthroughs offered by novel low-dimensional materials in this field. [ABSTRACT FROM AUTHOR]
- Published
- 2025
- Full Text
- View/download PDF
7. The Principles of (Partial Locality, Partial Indeterminacy, Partial NonLocality) and (Multi Locality, Multi Indeterminacy, Multi NonLocality).
- Author
-
Smarandache, Florentin
- Subjects
- *
QUANTUM field theory , *BELL'S theorem , *QUANTUM entanglement , *QUANTUM computing , *DARK energy - Abstract
This article introduces new neutrosophic principles aiming to extend and generalize the concepts of locality and nonlocality by addressing scenarios involving indeterminacy, together with partiality and multitude, in physics, mechanics, cosmology, biology, medicine, chemistry, economics, ecology, sociology. Locality refers to interactions or processes confined within a limited region of space or time. But there may be a Total (100%) Locality, or a Partial Locality (less than 100% and greater than 0%). The effects are constrained to the immediate environment. Contrariwise, NonLocality refers to interactions or connections between entities separated by space or time. The changes in one location have instantaneous effects on another. Similarly, there may be a Total (100%) NonLocality, or a Partial NonLocality (less than 100% and greater than 0%). Total (100%) or Partial (less than 100% and greater than 0%) Indeterminacy may arise from hidden variables and from environment. For instance, it may involve nonlocal connections between objects that are only partially entangled or influence each other in limited ways, rather than exhibiting complete freedom. The Principle of Partial Locality, Partial Indeterminacy, and Partial NonLocality implies an interplay of locality, indeterminacy, and nonlocality acting in a dynamic neutrosophic system. A generalization of (Locality, Indeterminacy, NonLocality) is the (MultiLocality, MultiIndeterminacy, MultiNonLocality). Practical examples from different fields are provided. [ABSTRACT FROM AUTHOR]
- Published
- 2024
8. The Quantum Memory Matrix: A Unified Framework for the Black Hole Information Paradox.
- Author
-
Neukart, Florian, Brasher, Reuben, and Marx, Eike
- Subjects
- *
QUANTUM field theory , *QUANTUM gravity , *PHYSICAL cosmology , *GENERAL relativity (Physics) , *QUANTUM mechanics - Abstract
We present the Quantum Memory Matrix (QMM) hypothesis, which addresses the longstanding Black Hole Information Paradox rooted in the apparent conflict between Quantum Mechanics (QM) and General Relativity (GR). This paradox raises the question of how information is preserved during black hole formation and evaporation, given that Hawking radiation appears to result in information loss, challenging unitarity in quantum mechanics. The QMM hypothesis proposes that space–time itself acts as a dynamic quantum information reservoir, with quantum imprints encoding information about quantum states and interactions directly into the fabric of space–time at the Planck scale. By defining a quantized model of space–time and mechanisms for information encoding and retrieval, QMM aims to conserve information in a manner consistent with unitarity during black hole processes. We develop a mathematical framework that includes space–time quantization, definitions of quantum imprints, and interactions that modify quantum state evolution within this structure. Explicit expressions for the interaction Hamiltonians are provided, demonstrating unitarity preservation in the combined system of quantum fields and the QMM. This hypothesis is compared with existing theories, including the holographic principle, black hole complementarity, and loop quantum gravity, noting its distinctions and examining its limitations. Finally, we discuss observable implications of QMM, suggesting pathways for experimental evaluation, such as potential deviations from thermality in Hawking radiation and their effects on gravitational wave signals. The QMM hypothesis aims to provide a pathway towards resolving the Black Hole Information Paradox while contributing to broader discussions in quantum gravity and cosmology. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
9. Consistency of Quantum Computation and the Equivalence Principle.
- Author
-
Nowakowski, Marcin
- Subjects
- *
GRAVITATIONAL fields , *QUANTUM gravity , *QUANTUM information science , *GENERAL relativity (Physics) , *GAUGE invariance - Abstract
The equivalence principle, being one of the building blocks of general relativity, seems to be crucial for analysis of quantum effects in gravity. In this paper we consider the relation between the equivalence principle and the consistency of quantum information processing in gravitational field. We propose an analysis with a looped evolution consisting of steps both in the gravitational field and in the accelerated reference frame. We show that without the equivalence principle the looped quantum evolution cannot be unitary and looses its consistency. For this reasoning the equivalence principle is formulated in terms of the gauge transformations and is analyzed for particles acquiring an appropriate phase associated with the action over the looped path. In consequence, to keep consistency of quantum operations in gravitational field, it is required to keep a quantum variant of the equivalence principle. This proves importance of the quantized version of this fundamental gravitational principle for quantum information processing. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
10. Adaptive-Step Perturb-and-Observe Algorithm for Multidimensional Phase Noise Stabilization in Fiber-Based Multi-Arm Mach–Zehnder Interferometers.
- Author
-
Abarzúa, H., Melo, C., Restrepo, S. E., Vergara, S., Sbarbaro, D., Cañas, G., Lima, G., Saavedra, G., and Cariñe, J.
- Subjects
- *
PHASE noise , *OPTICAL interferometers , *QUANTUM noise , *INTERFEROMETERS , *TELECOMMUNICATION - Abstract
Fiber-optic Mach–Zehnder interferometers are widely used in research areas such as telecommunications, spectroscopy, and quantum information. These optical structures are known to be affected by phase fluctuations that are usually modeled as multiparametric noise. This multidimensional noise must be stabilized or compensated for to enable fiber-optic Mach–Zehnder architectures for practical applications. In this work, we study the effectiveness of a modified Perturb-and-Observe (P&O) algorithm to control multidimensional phase noise in fiber-based multi-arm Mach–Zehnder interferometers. We demonstrate the feasibility of stabilizing multidimensional phase noise by numerical simulations using a simple feedback control scheme and analyze the algorithm's performance for systems up to dimension 8 × 8 . We achieved minimal steady-state errors that guarantee high optical visibility in complex optical systems with N × N matrices (with N = [ 2 , 3 , 4 , 5 , 6 , 7 , 8 ] ). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
11. Resonant analogue configurations in atomic condensates
- Author
-
Muñoz de Nova, Juan Ramón, Fernández Palacios, Pablo, Alcázar Guerrero, Pedro, Zapata, Ivar, and Sols, Fernando
- Subjects
Analog gravity ,Quantum gases ,Andreev processes ,Quantum information ,High-energy colliders ,Time-crystals ,Physics ,QC1-999 - Abstract
As a contribution to a memorial volume, we provide a comprehensive discussion of resonant configurations in analogue gravity, focusing on its implementation in atomic condensates and combining review features with original insights and calculations. In particular, we jointly analyze the analogues of the Andreev and Hawking effects using a microscopic description based on the Bogoliubov approximation. We perform a detailed study of the thermality of the Andreev and Hawking spectra for canonical black-hole solutions, finding that both can be described by a gray-body distribution to a very good approximation. We contemplate several resonant scenarios whose efficiency to enhance anomalous scattering processes is compared to that of non-resonant setups. The presence of quantum signatures in analogue configurations, such as the violation of Cauchy–Schwarz inequalities or entanglement, is analyzed, observing that resonant configurations highly increase the entanglement signal, especially for the Andreev effect. We also discuss how these results have served as inspiration for the rapidly expanding field of quantum information in high-energy colliders. Finally, we study the physics of black-hole lasers as further examples of resonant analogue structures, distinguishing three stages in its time evolution. For short times, we compute the linear and non-linear spectrum for different models. For intermediate times, we generalize the current analysis of the BHL–BCL crossover. For long times, we discuss the emerging concept of spontaneous Floquet state and its potential implications.
- Published
- 2025
- Full Text
- View/download PDF
12. Quantum blockchain: Trends, technologies, and future directions
- Author
-
Manjula Gandhi S, Chaitrali Mulay, Karthiganesh Durai, G. Murali, Jafar Ali Ibrahim Syed Masood, V. Vijayarajan, Kumar Gautam, N. S. Kalyan Chakravarthy, S. Suresh Kumar, Saurabh Agarwal, Murali S, Vijayasherly V, David Asirvatham, Sarfraz Brohi, Chandru Vignesh C, and Anbuchelian S
- Subjects
quantum computing ,quantum gates ,quantum information ,Telecommunication ,TK5101-6720 - Abstract
Abstract Blockchain technology is a highly developed database system that shares information within a business web. It stores details in blocks connected chronologically, ensuring information integrity through consensus mechanisms that prevent unauthorised alterations. This decentralised system removes the need for a believable mediator, mitigating vulnerabilities and enhancing transaction security. Blockchain’s application spans the energy, finance, media, entertainment, and retail sectors. However, classical blockchain faces threats from quantum computing advancements, necessitating the development of quantum blockchain technology. Quantum blockchain, leveraging quantum computation and information theory, offers enhanced security and immutability. In this paper, different mathematical foundations, practical implementations and effectiveness of lattice‐based cryptography in securing blockchain applications are discussed. Analysis of how the cryptographic techniques can protect blockchain systems against quantum attacks is being done by using mathematical formulations and examples. Quantum computing strengthens blockchain security with advanced encryption and authentication, which is critical for safeguarding diverse sectors from evolving cyber threats. Further study on quantum‐resistant design is necessary if blockchain networks are to be robust and intact in the face of future technological developments.
- Published
- 2024
- Full Text
- View/download PDF
13. Long‐range quantum energy teleportation and distribution on a hyperbolic quantum network
- Author
-
Kazuki Ikeda
- Subjects
optical fibre networks ,quantum communication ,quantum computing ,quantum computing techniques ,quantum cryptography ,quantum information ,Telecommunication ,TK5101-6720 - Abstract
Abstract Teleporting energy to remote locations is new challenge for quantum information science and technology. Developing a method for transferring local energy in laboratory systems to remote locations will enable non‐trivial energy flows in quantum networks. From the perspective of quantum information engineering, we propose a method for distributing local energy to a large number of remote nodes using hyperbolic geometry. Hyperbolic networks are suitable for energy allocation in large quantum networks since the number of nodes grows exponentially. To realise long‐range quantum energy teleportation (QET), we propose a hybrid method of quantum state telepotation and QET. By transmitting local quantum information through quantum teleportation and performing conditional operations on that information, QET can theoretically be realized independent of geographical distance. The method we present will provide new insights into new applications of future large‐scale quantum networks and potential applications of quantum physics to information engineering.
- Published
- 2024
- Full Text
- View/download PDF
14. Wireless quantum key distribution at terahertz frequencies: Opportunities and challenges
- Author
-
Neel Kanth Kundu, Matthew R. McKay, and Ranjan K. Mallik
- Subjects
quantum communication ,quantum cryptography ,quantum information ,telecommunication channels ,telecommunication security ,Telecommunication ,TK5101-6720 - Abstract
Abstract Quantum key distribution (QKD) is one of the major applications of quantum information technology. It can provide ultra‐secure key distribution with security guaranteed by the laws of quantum physics. Quantum key distribution is necessary to protect data transmission from quantum computing attacks in future communication networks. The laws of quantum mechanics dictate that as opposed to microwave frequencies, quantum coherence is preserved at room temperatures for terahertz (THz) frequencies. This makes the THz band a promising solution for room‐temperature QKD implementation in future wireless communication networks. The authors present the principles of continuous variable QKD (CV‐QKD) systems and review the latest developments in the design and analysis of CV‐QKD systems operating at microwave and THz frequencies. The authors also discuss how multiple‐input multiple‐output transmission can be incorporated into the quantum communications framework to improve the secret key rates and increase the coverage distances of the THz CV‐QKD system. Furthermore, major hardware challenges that must be surmounted to practically realise THz CV‐QKD systems are highlighted.
- Published
- 2024
- Full Text
- View/download PDF
15. An efficient and secure quantum blind signature‐based electronic cash transaction scheme
- Author
-
Aman Gupta, Gunja Venkat Chandra, Nayana Das, and Goutam Paul
- Subjects
quantum communication ,quantum computing ,quantum computing techniques ,quantum cryptography ,quantum information ,telecommunication security ,Telecommunication ,TK5101-6720 - Abstract
Abstract The authors present a novel token exchange scheme with an example of an electronic cash (eCash) transaction scheme that ensures quantum security, addressing the vulnerabilities of existing models in the face of quantum computing threats. The authors’ comprehensive analysis of various quantum blind signature mechanisms revealed significant shortcomings in their applicability to eCash transactions and their resilience against quantum adversaries. In response, the authors drew inspiration from D. Chaum's original classical eCash scheme and innovated a quantum‐secure transaction framework. The authors detail the developed protocol and rigorously evaluate its security aspects. The protocol's adherence to critical security requirements such as blindness, non‐forgeability, non‐deniability, and prevention of double spending is analysed. Moreover, the scheme against Intercept and Resend, Denial of Service, Man‐in‐the‐Middle, and Entangle‐and‐Measure attacks is rigorously tested. The authors’ findings indicate a robust eCash transaction model capable of withstanding the challenges posed by quantum computing advancements.
- Published
- 2024
- Full Text
- View/download PDF
16. Quantum computing challenges and solutions in software industry—A multivocal literature review
- Author
-
Masaud Salam and Muhammad Ilyas
- Subjects
quantum computing ,quantum information ,Telecommunication ,TK5101-6720 - Abstract
Abstract Quantum computing (QC) hinged upon the bedrock principles of quantum theory and holds promise for reforming a large number of industries. The researcher in this area aims to deliver a comprehensive understanding of the current state of the art and future trajectories of QC. The authors have discovered that most academic studies have concentrated upon dissecting specific aspects of QC. This discernment underscores the exigency of identifying challenges that might impede the seamless integration of QC within the software industry. Moreover, it becomes crucial to ascertain the panoply of solutions/practices required to overcome these barriers. A comprehensive multi‐vocal literature review was performed and culled a total of 49 academic papers for data extraction. A total of 13 challenges encountered by organisations were identified during the adoption of QC. Subsequently, these challenges were examined deeply and determined that five of them are the most critical, these are ‘Lack of quantum specific algorithms, dev and testing methodologies’, ‘Difficult compilation and debugging’, ‘Lack of development tools and technology’, ‘Lack of development guidelines & Quality Assurance Standards’ and ‘Lack of professional expert’, together founding over 30% of occurrences. These challenges from various perspectives were evaluated, including time frame, methodology, geographical region and publication platform. To address these barriers and implement the QC in software industry effectively, a total of 53 practices/solutions. This research aims to share valuable knowledge to simplify and amplify quantum application development.
- Published
- 2024
- Full Text
- View/download PDF
17. Design and analysis of parallel quantum transfer fractal priority replay with dynamic memory algorithm in quantum reinforcement learning for robotics
- Author
-
R. Palanivel and P. Muthulakshmi
- Subjects
quantum computing ,quantum computing techniques ,quantum entanglement ,quantum gates ,quantum information ,Telecommunication ,TK5101-6720 - Abstract
Abstract This paper introduces the parallel quantum transfer fractal priority reply with dynamic memory (P‐QTFPR‐DM) algorithm, an innovative approach that combines quantum computing and reinforcement learning (RL) to enhance decision‐making in autonomous vehicles. Leveraging quantum principles such as superposition and entanglement, P‐QTFPR‐DM optimises Q‐value approximation through a custom quantum circuit (UQC), facilitating efficient exploration and exploitation in high‐dimensional state‐action spaces. This algorithm utilises a quantum neural network (QNN) with 4 qubits to encode and process Q‐values. The autonomous vehicle, equipped with GPS for real‐time navigation, uses P‐QTFPR‐DM to reach a predefined destination with coordinates 12.82,514,234,148 latitude and 80.0,451,311,962,242 longitude. Through extensive numerical simulations, P‐QTFPR‐DM demonstrates a 30% reduction in decision‐making time and a 25% improvement in navigation accuracy compared to classical RL methods. The QNN‐based approach achieves a 95% success rate in reaching the destination within a 5‐m accuracy threshold, whereas traditional RL methods achieve only an 85% success rate. Dynamic memory management in P‐QTFPR‐DM optimises computational resources, enhancing the vehicle's adaptability to environmental changes. These results highlight the potential of quantum computing to significantly advance autonomous vehicle technology by improving both efficiency and effectiveness in complex navigation tasks. Future research will focus on refining the algorithm and exploring its real‐world applications to enhance autonomous vehicle performance.
- Published
- 2024
- Full Text
- View/download PDF
18. Psitrum: An open source simulator for universal quantum computers
- Author
-
Mohammed Alghadeer, Eid Aldawsari, Raja Selvarajan, Khaled Alutaibi, Sabre Kais, and Fahhad H. Alharbi
- Subjects
quantum computing ,quantum information ,quantum noise ,Telecommunication ,TK5101-6720 - Abstract
Abstract Quantum computing is a radical new paradigm for a technology that is capable to revolutionise information processing. Simulators of universal quantum computer are important for understanding the basic principles and operations of the current noisy intermediate‐scale quantum processors, and for building in future fault‐tolerant quantum computers. As next‐generation quantum technologies continue to advance, it is crucial to address the impact on education and training in quantum physics. The emergence of new industries driven by progress in quantum computing and simulation will create a demand for a specialised quantum workforce. In response to these challenges, the authors present Psitrum, an open‐source simulator for universal quantum computers. Psitrum serves as a powerful educational and research tool, enabling a diverse range of stakeholders to understand the fundamental principles and operations of quantum systems. By offering a comprehensive platform for emulating and debugging quantum algorithms through quantum circuits, Psitrum aids in the exploration and analysis of various quantum applications using both MATLAB and MATLAB application programming interface to use the software on other platforms. Psitrum software and source codes are fully available at GitHub.
- Published
- 2024
- Full Text
- View/download PDF
19. Quantum‐inspired Arecanut X‐ray image classification using transfer learning
- Author
-
Praveen M. Naik and Bhawana Rudra
- Subjects
quantum computing ,quantum information ,Telecommunication ,TK5101-6720 - Abstract
Abstract Arecanut X‐ray images accurately represent their internal structure. A comparative analysis of transfer learning‐based classification, employing both a traditional convolutional neural network (CNN) and an advanced quantum convolutional neural network (QCNN) approach is conducted. The investigation explores various transfer learning models with different sizes to identify the most suitable one for achieving enhanced accuracy. The Shufflenet model with a scale factor of 2.0 attains the highest classification accuracy of 97.72% using the QCNN approach, with a model size of 28.40 MB. Out of the 12 transfer learning models tested, 9 exhibit improved classification accuracy when using QCNN models compared to the traditional CNN‐based transfer learning approach. Consequently, the exploration of CNN and QCNN‐based classification reveals that QCNN outperforms traditional CNN models in accuracy within the transfer learning framework. Further experiments with qubits suggest that utilising 4 qubits is optimal for classification operations in this context.
- Published
- 2024
- Full Text
- View/download PDF
20. Quantum calculi and formalisms for system and network security: A bibliographic insights and synoptic review
- Author
-
Adarsh Kumar, Mustapha Hedabou, and Diego Augusto de Jesus Pacheco
- Subjects
cryptography ,quantum computing techniques ,quantum information ,quantum theory ,Telecommunication ,TK5101-6720 - Abstract
Abstract Quantum calculi and formalisms are useful tools for ensuring security and computational capabilities in blockchain and cryptography. They aid in designing and analysing new cryptographic protocols for blockchain, determining the behaviour of quantum operations in blockchain‐based smart contracts, assessing the feasibility and security of quantum algorithms in blockchain applications, and building a quantum‐safe blockchain system. A comprehensive review of the applications of quantum calculi and formalisms in computer security and network security, along with a bibliographic analysis is presented. It is unique in that it combines bibliometric analyses with a technical review of the domain of quantum calculi and formalism. Bibliometric and biographic analysis in the field helps identify research trends, assess the influence of research, determine collaboration patterns, evaluate journals, and examine publication behaviours, among other things. It performs bibliographic and bibliometric analysis using a dataset collected from Scopus and Web of Science through different queries. The obtained results help identify important institutions, authors, organisations, collaboration networks, keywords, and more. The provided open challenges and future vision pave the way for further research in the direction of quantum calculi and formalism applications in computer security and network security.
- Published
- 2024
- Full Text
- View/download PDF
21. Majorisation‐minimisation algorithm for optimal state discrimination in quantum communications
- Author
-
Neel Kanth Kundu, Prabhu Babu, and Petre Stoica
- Subjects
computational complexity ,Hilbert spaces ,matrix algebra ,quantum communication ,quantum information ,quantum optics ,Telecommunication ,TK5101-6720 - Abstract
Abstract Designing optimal measurement operators for quantum state discrimination (QSD) is an important problem in quantum communications and cryptography applications. Prior works have demonstrated that optimal quantum measurement operators can be obtained by solving a convex semidefinite program (SDP). However, solving the SDP can represent a high computational burden for many real‐time quantum communication systems. To address this issue, a majorisation‐minimisation (MM)‐based algorithm, called Quantum Majorisation‐Minimisation (QMM) is proposed for solving the QSD problem. In QMM, the authors reparametrise the original objective, then tightly upper‐bound it at any given iterate, and obtain the next iterate as a closed‐form solution to the upper‐bound minimisation problem. Our numerical simulations demonstrate that the proposed QMM algorithm significantly outperforms the state‐of‐the‐art SDP algorithm in terms of speed, while maintaining comparable performance for solving QSD problems in quantum communication applications.
- Published
- 2024
- Full Text
- View/download PDF
22. Quantum anonymous one vote veto protocol based on entanglement swapping
- Author
-
Yanmeng Wang, Min Jiang, Yuzhen Wei, and Wenhao Zhao
- Subjects
quantum communication ,quantum computing ,quantum cryptography ,quantum information ,Telecommunication ,TK5101-6720 - Abstract
Abstract As a special voting method, one‐vote veto voting also has a wide range of applications. A veto means that when the voting council puts forward a proposal, it cannot pass unless all the voters agree to it. If there is a no vote, the proposal will be rejected, but no one will know how anyone else votes. In most existing quantum anonymous one‐vote veto voting protocols, an absolutely honest third party is generally required to assist the voting. However, it is difficult to find a fully trusted third party in reality. In addition, the existing quantum anonymous one‐vote veto protocol does not consider the attack from the insider voters. Therefore, based on the characteristics of entanglement swapping between the Cat state and Bell state, the authors propose a new quantum anonymous one‐vote veto protocol, which can not only calculate the voting result quickly and effectively but also demonstrate higher security.
- Published
- 2024
- Full Text
- View/download PDF
23. Real‐time seedless post‐processing for quantum random number generators
- Author
-
Qian Li and Hongyi Zhou
- Subjects
quantum cryptography ,quantum information ,Telecommunication ,TK5101-6720 - Abstract
Abstract Quantum‐proof randomness extraction is essential for handling quantum side information possessed by a quantum adversary, which is widely applied in various quantum cryptography tasks. In this study, the authors introduce a real‐time two‐source quantum randomness extractor against quantum side information. The authors’ extractor is tailored for forward block sources, a novel category of min‐entropy sources introduced in this work. These sources retain the flexibility to accommodate a broad range of quantum random number generators. The authors’ online algorithms demonstrate the extraction of a constant fraction of min‐entropy from two infinitely long independent forward block sources. Moreover, the authors’ extractor is inherently block‐wise parallelisable, presenting a practical and efficient solution for the timely extraction of high‐quality randomness. Applying the authors’ extractors to the raw data of one of the most commonly used quantum random number generators, a simulated extraction speed as high as 64 Gbps is achieved.
- Published
- 2024
- Full Text
- View/download PDF
24. Examining the quantum fisher information in the interaction of a dirac system with a squeezed generalized amplitude damping channel
- Author
-
C. Iyen, M. S. Liman, S. J. Emem-Obong, W. A. Yahya, C. A. Onate, and B. J. Falaye
- Subjects
Quantum information ,QFI ,Decoherence ,Metrology ,Open system ,Noisy channel ,Medicine ,Science - Abstract
Abstract The inherent association between real quantum systems and their surrounding environment invariably results in decoherence, leading to the loss of entanglement. This diminution in entanglement coincides with a decline in the fidelity of transmitted information using the entangled quantum resource. This study scrutinizes the impact of the squeezed generalized amplitude damping (SGAD) channel on quantum Fisher information (QFI) parameters. The SGAD channel model, a versatile framework, is also employed to simulate other dissipative channels, including amplitude damping (AD) and generalized amplitude damping (GAD). Kraus operators facilitate the modeling of noisy channels. The results reveal that, within the SGAD channel, the QFI remains impervious to the squeezing variables (r and $$\Phi$$ Φ ). In the GAD channel, $$F\theta _{GAD}$$ F θ GAD undergoes enhancement to a constant value with an upswing in temperature (T), while the $$\phi$$ ϕ parameter in the GAD channel, $$F\phi _{GAD}$$ F ϕ GAD , akin to the SGAD channel, surges around T = 2 before complete loss ensues. Concerning the AD channel, the $$\theta$$ θ component of the QFI initially experiences decoherence with an augmentation in the AD noise parameter ( $$\lambda$$ λ ). Subsequently, it is restored to its initial value with a further escalation in $$\lambda$$ λ . Conversely, the $$\phi$$ ϕ component of the QFI in the AD channel experiences decoherence with an elevation in the AD noise parameter ( $$\lambda$$ λ ).
- Published
- 2024
- Full Text
- View/download PDF
25. An efficient quantum algorithm for ensemble classification using bagging
- Author
-
Antonio Macaluso, Luca Clissa, Stefano Lodi, and Claudio Sartori
- Subjects
quantum computing ,quantum computing techniques ,quantum information ,Telecommunication ,TK5101-6720 - Abstract
Abstract Ensemble methods aggregate predictions from multiple models, typically demonstrating improved accuracy and reduced variance compared to individual classifiers. However, they often come with significant memory usage and computational time requirements. A novel quantum algorithm that leverages quantum superposition, entanglement, and interference to construct an ensemble of classification models using bagging as an aggregation strategy is introduced. Through the generation of numerous quantum trajectories in superposition, the authors achieve B transformations of the training set with only logB operations, allowing an exponential enlargement of the ensemble size while linearly increasing the depth of the corresponding circuit. Moreover, when assessing the algorithm's overall cost, the authors demonstrate that the training of a single weak classifier contributes additively to the overall time complexity, as opposed to the multiplicative impact commonly observed in classical ensemble methods. To illustrate the efficacy of the authors’ approach, experiments on reduced real‐world datasets utilising the IBM qiskit environment to demonstrate the functionality and performance of the proposed algorithm are introduced.
- Published
- 2024
- Full Text
- View/download PDF
26. Advances in artificial intelligence and machine learning for quantum communication applications
- Author
-
Mhlambululi Mafu
- Subjects
learning (artificial intelligence) ,quantum communication ,quantum cryptography ,quantum information ,Telecommunication ,TK5101-6720 - Abstract
Abstract Artificial intelligence (AI) and classical machine learning (ML) techniques have revolutionised numerous fields, including quantum communication. Quantum communication technologies rely heavily on quantum resources, which can be challenging to produce, control, and maintain effectively to ensure optimum performance. ML has recently been applied to quantum communication and networks to mitigate noise‐induced errors and analyse quantum protocols. The authors systematically review state‐of‐the‐art ML applications to advance theoretical and experimental central quantum communication protocols, specifically quantum key distribution, quantum teleportation, quantum secret sharing, and quantum networks. Specifically, the authors survey the progress on how ML and, more broadly, AI techniques have been applied to optimise various components of a quantum communication system. This has resulted in ultra‐secure quantum communication protocols with optimised key generation rates as well as efficient and robust quantum networks. Integrating AI and ML techniques opens intriguing prospects for securing and facilitating efficient and reliable large‐scale communication between multiple parties. Most significantly, large‐scale communication networks have the potential to gradually develop the maturity of a future quantum internet.
- Published
- 2024
- Full Text
- View/download PDF
27. A novel quantum key distribution resistant against large‐pulse attacks
- Author
-
Keaotshepha Karabo, Comfort Sekga, Connor Kissack, Mhlambululi Mafu, and Francesco Petruccione
- Subjects
quantum communication ,quantum cryptography ,quantum information ,Telecommunication ,TK5101-6720 - Abstract
Abstract Quantum key distribution (QKD) offers information‐theoretic security by leveraging the principles of quantum mechanics. This means the security is independent of all future advances in algorithm or computational power. However, due to the non‐availability of single‐photon sources, most traditional QKD protocols are vulnerable to various attacks, such as photon number‐splitting (PNS) attacks. Also, the imperfections in the measuring devices open a loophole for side channels that an eavesdropper may exploit to launch attacks such as large‐pulse attacks. As a result, this compromises the security of transmitted information. To address these challenges, the authors present a QKD protocol that is secure against both large‐pulse attacks and PNS attacks at zero‐error, in which the eavesdropper does not introduce any error, but still, the legitimate users of the system cannot distil a secure key. A notable feature of the proposed protocol is that it promotes greater robustness against both attacks than the Bennett‐Brassard 1984 (BB84) protocol or the Scarani‐Acin‐Ribordy‐Gisin 2004 (SARG04) protocol.
- Published
- 2024
- Full Text
- View/download PDF
28. Device-independent certification of desirable properties with a confidence interval.
- Author
-
Chang, Wan-Guan, Chen, Kai-Chun, Chen, Kai-Siang, Chen, Shin-Liang, and Liang, Yeong-Cherng
- Subjects
QUANTUM entanglement ,QUANTUM states ,HILBERT space ,CONFIDENCE intervals ,TOMOGRAPHY - Abstract
In the development of quantum technologies, a reliable means for characterizing quantum devices, be it a measurement device, a state-preparation device, or a transformation device, is crucial. However, the conventional approach based on, for example, quantum state tomography or process tomography relies on assumptions that are often not necessarily justifiable in a realistic experimental setting. Although the device-independent (DI) approach to this problem bypasses the shortcomings above by making only minimal, justifiable assumptions, most of the theoretical proposals to date only work in the idealized setting where independent and identically distributed (i.i.d.) trials are assumed. Here, we provide a versatile solution for rigorous device-independent certification that does not rely on the i.i.d. assumption. Specifically, we describe how the prediction-based ratio (PBR) protocol and martingale-based protocol developed for hypothesis testing can be applied in the present context to achieve a device-independent certification of desirable properties with confidence interval (CI). To illustrate the versatility of these methods, we demonstrate how we can use them to certify—with finite data—the underlying negativity, Hilbert space dimension, entanglement depth, and fidelity to some target pure state. In particular, we provide examples showing how the amount of certifiable negativity and fidelity scales with the number of trials and how many experimental trials one needs to certify a qutrit state space or the presence of genuine tripartite entanglement. Overall, we have found that the PBR protocol and the martingale-based protocol often offer similar performance, even though the latter does have to presuppose any witness (Bell-like inequality). In contrast, our findings also show that the performance of the martingale-based protocol may be severely affected by one's choice of Bell-like inequality. Intriguingly, a Bell function useful for self-testing does not necessarily give the optimal confidence-gain rate for certifying the fidelity to the corresponding target state. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
29. Examining the quantum fisher information in the interaction of a dirac system with a squeezed generalized amplitude damping channel.
- Author
-
Iyen, C., Liman, M. S., Emem-Obong, S. J., Yahya, W. A., Onate, C. A., and Falaye, B. J.
- Subjects
FISHER information ,DECOHERENCE (Quantum mechanics) ,METROLOGY ,NOISE ,TEMPERATURE - Abstract
The inherent association between real quantum systems and their surrounding environment invariably results in decoherence, leading to the loss of entanglement. This diminution in entanglement coincides with a decline in the fidelity of transmitted information using the entangled quantum resource. This study scrutinizes the impact of the squeezed generalized amplitude damping (SGAD) channel on quantum Fisher information (QFI) parameters. The SGAD channel model, a versatile framework, is also employed to simulate other dissipative channels, including amplitude damping (AD) and generalized amplitude damping (GAD). Kraus operators facilitate the modeling of noisy channels. The results reveal that, within the SGAD channel, the QFI remains impervious to the squeezing variables (r and Φ ). In the GAD channel, F θ GAD undergoes enhancement to a constant value with an upswing in temperature (T), while the ϕ parameter in the GAD channel, F ϕ GAD , akin to the SGAD channel, surges around T = 2 before complete loss ensues. Concerning the AD channel, the θ component of the QFI initially experiences decoherence with an augmentation in the AD noise parameter (λ ). Subsequently, it is restored to its initial value with a further escalation in λ . Conversely, the ϕ component of the QFI in the AD channel experiences decoherence with an elevation in the AD noise parameter (λ ). [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
30. Transforming future technology with quantum-based IoT.
- Author
-
Khan, Habib Ullah, Ali, Nasir, Ali, Farhad, and Nazir, Shah
- Subjects
- *
QUANTUM computing , *QUANTUM cryptography , *DATA transmission systems , *SOCIAL interaction , *SECURITY systems , *QUANTUM computers - Abstract
With the advent of internet-enabled and hybrid technologies, information is becoming increasingly accessible to the general public. Smartphones and other gadgets are used extensively by people to share and promote ideas, in a variety of ways. Human interaction and communication has become more reliable and effective through advanced computing technologies. Quantum computing is an emerging paradigm that will change the lives of individuals and the operations of organizations. Quantum computers solve problems at high speed by operating in a superposition state in which the state can be either zero or one at the same instant. Quantum sensors can be used efficiently in technological research to make accurate measurements and collect data that provide new insights into the behavior of nanomaterials. The use of quantum computing could also speed up the manufacturing process of devices with remarkable properties such as superconductivity, high strength or improved signal performance. Quantum computing has the ability to dramatically speed up the development process of various organizations and increase their efficiency and effectiveness. The security and reliability of data and communication is improved by quantum computing techniques such as key generation and entanglement dispersion. Companies use cryptographic algorithms to protect their data. However, with the advent of quantum computing, cryptographic methods that rely on numerical aspects are no longer sufficient to protect data. Quantum computing is an emerging field that is being applied to various problems that previously could not be solved using conventional methods. Quantum computing plays an important role in the field of information processing, where information is precisely analyzed. Various quantum technologies and algorithms are used to secure company data. This paper provides a systematic review of the literature on the principles of quantum computing. The SLR focuses on achieving four aims "identifying a variety of quantum IoT devices, analyzing their importance in different industries, highlighting the challenges of quantum technology, and presenting various techniques used by researchers to overcome different problems". Quantum cryptography is identified as a key strategy for improving the security of IoT systems and ensuring the security and consistency of information. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
31. Introducing quantum information and computation to a broader audience with MOOCs at OpenHPI.
- Author
-
Hellstern, Gerhard, Hettel, Jörg, and Just, Bettina
- Subjects
MASSIVE open online courses ,QUANTUM statistics ,QUANTUM computing ,COMPUTER science education ,QUANTUM groups - Abstract
Quantum computing is an exciting field with high disruptive potential, but very difficult to access. For this reason, many approaches to teaching quantum computing are being developed worldwide. This always raises questions about the didactic concept, the content actually taught, and how to measure the success of the teaching concept. In 2022 and 2023, the authors taught a total of nine two-week MOOCs (massive open online courses) with different possible learning paths on the Hasso Plattner Institute's OpenHPI platform. The purpose of the platform is to make computer science education available to everyone free of charge. The nine quantum courses form a self-contained curriculum. A total of more than 17,000 course attendances have been taken by about 7400 natural persons, and the number is still rising. This paper presents the course concept and evaluates the anonymized data on the background of the participants, their behaviour in the courses, and their learning success. This paper is the first to analyze such a large dataset of MOOC-based quantum computing education. The summarized results are a heterogeneous personal background of the participants biased towards IT professionals, a majority following the didactic recommendations, and a high success rate, which is strongly correlatated with following the didactic recommendations. The amount of data from such a large group of quantum computing learners provides many avenues for further research in the field of quantum computing education. The analyses show that the MOOCs are a low-threshold concept for getting into quantum computing. It was very well received by the participants. The concept can serve as an entry point and guide for the design of quantum computing courses. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
32. Quantum Truncated Differential and Boomerang Attack.
- Author
-
Xie, Huiqin and Yang, Li
- Subjects
- *
QUANTUM gates , *BLOCK ciphers , *BLOCK designs , *QUBITS , *ALGORITHMS , *CRYPTOGRAPHY - Abstract
In order to design quantum-safe block ciphers, it is crucial to investigate the application of quantum algorithms to cryptographic analysis tools. In this study, we use the Bernstein–Vazirani algorithm to enhance truncated differential cryptanalysis and boomerang cryptanalysis. We first propose a quantum algorithm for finding truncated differentials, then rigorously prove that the output truncated differentials must have high differential probability for the vast majority of keys in the key space. Subsequently, based on this algorithm, we design a quantum algorithm for finding boomerang distinguishers. The quantum circuits of the two proposed quantum algorithms contain only polynomial quantum gates and qubits. Compared with classical tools for searching truncated differentials or boomerang distinguishers, the proposed algorithms can maintain the polynomial complexity while fully considering the impact of S-boxes and key scheduling. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
33. Copying quantum states.
- Author
-
Maassen, Hans and Kümmerer, Burkhard
- Abstract
The no-broadcasting theorem in quantum information says that a set of states on a quantum system admits a common broadcasting (copying) operation if and only if their density matrices belong to a commuting family. We discuss and prove this theorem, as well as the closely related "no-cloning theorem" in the context of quantum probability theory, i.e. in the category of (finite dimensional) C*-algebras with unital completely positive maps. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
34. The Mechanics Underpinning Non-Deterministic Computation in Cortical Neural Networks.
- Author
-
Stoll, Elizabeth A.
- Subjects
ARTIFICIAL neural networks ,UNCERTAINTY (Information theory) ,ELECTRIC noise ,QUANTUM information theory ,PROBABILITY theory - Abstract
Cortical neurons integrate upstream signals and random electrical noise to gate signaling outcomes, leading to statistically random patterns of activity. Yet classically, the neuron is modeled as a binary computational unit, encoding Shannon entropy. Here, the neuronal membrane potential is modeled as a function of inherently probabilistic ion behavior. In this new model, each neuron computes the probability of transitioning from an off-state to an on-state, thereby encoding von Neumann entropy. Component pure states are integrated into a physical quantity of information, and the derivative of this high-dimensional probability distribution yields eigenvalues across the multi-scale quantum system. In accordance with the Hellman–Feynman theorem, the resolution of the system state is paired with a spontaneous shift in charge distribution, so this defined system state instantly becomes the past as a new probability distribution emerges. This mechanistic model produces testable predictions regarding the wavelength of free energy released upon information compression and the temporal relationship of these events to physiological outcomes. Overall, this model demonstrates how cortical neurons might achieve non-deterministic signaling outcomes through a computational process of noisy coincidence detection. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
35. Metasurface‐Empowered Quantum Photonics.
- Author
-
Li, Yangwu, Liu, Wenwei, Li, Zhancheng, Cheng, Hua, and Chen, Shuqi
- Subjects
QUANTUM interference ,QUANTUM measurement ,DEGREES of freedom ,INFORMATION technology security ,PHOTONS - Abstract
In recent decades, quantum information technologies have attracted significant attention and experienced rapid development due to their ultrafast processing speeds and high level of information security. A significant trend in this field of study involves the ongoing pursuit of integrating and miniaturizing quantum devices. Metasurfaces, which are artificially designed planar nanostructure arrays with versatile wavefront shaping capabilities, present a promising platform for the development of integrated photonic quantum devices by effectively controlling quantum light in multiple degrees of freedom. In this review, recent advances in the field of quantum photonics facilitated by metasurfaces, encompassing quantum light sources, manipulation and measurement of quantum states, and the intriguing functionalities of quantum metasurfaces, are summarized. Additionally, potential future directions for the advancement of quantum metasurfaces are discussed. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
36. Weak measurements enhancing the quantum information facets of a driven Unruh–DeWitt detector
- Author
-
Jia-Ling Xie, Cheng-Jie Zhu, Jia Tan, and Xiang Hao
- Subjects
Unruh channel ,quantum information ,weak measurement and measurement reversal ,quantum Fisher information ,quantum coherence ,Physics ,QC1-999 - Abstract
We developed a Hermitian operator representation of the Unruh channel for a driven accelerated detector in the presence of external noise. This representation is then used to provide a generalized analytical approach to a non-inertial evolution subjected to quantum weak measurements. The quantum information facets were then improved by performing weak measurements before and after the quantum channel. The external noise was modeled using a phase damping channel. The prominent oscillations of the quantum information are caused by vacuum fluctuations of the quantum fields coupled to the detector. Steady values are obtained for the quantum coherence and quantum Fisher information using the Unruh effect. Thus, quantum weak measurements can effectively suppress the decoherence induced by the relativistic acceleration. By comparing with cases without weak measurements, we demonstrate that there exist some regions with optimal measurement strengths that enhance the quantum coherence and quantum Fisher information. The effects of conditional improvement on the quantum information facets are still obvious in the presence of external noise.
- Published
- 2025
- Full Text
- View/download PDF
37. Multi‐hop joint remote state preparation of general hybrid entangled multi‐qudit states via distinct Einstein‐Podolsky‐Rosen channels
- Author
-
Zongyi Li, Yuzhen Wei, and Min Jiang
- Subjects
quantum communication ,quantum entanglement ,quantum information ,Telecommunication ,TK5101-6720 - Abstract
Abstract Joint Remote State Preparation provides a useful way to securely transfer the known quantum states to the distant nodes. However, the limitation of resources often leads to the quantum channels constructed by distributed entangled pairs being incompatible with the transmitted states. In order to overcome this problem, a novel Joint Remote State Preparation protocol was proposed for transmitting general multi‐qudit states over quantum networks, providing a promising pathway to utilise the available Einstein‐Podolsky‐Rosen (EPR) channels with different levels. Several scenarios under noisy environments were discussed and some properties of the fidelity when transmitting the multi‐qudit state were demonstrated. It was demonstrated that both the prepared state and the kind of the noises could restrict the number of the participant nodes. Our scheme leverages the existing quantum resources, which addresses the issue of insufficient entanglement resources. This approach is easily adaptable to other quantum network structures, offering a potential solution for constructing a universal quantum network.
- Published
- 2024
- Full Text
- View/download PDF
38. Quantum computing applications for Internet of Things
- Author
-
Mritunjay Shall Peelam, Anjaney Asreet Rout, and Vinay Chamola
- Subjects
quantum computing ,quantum computing techniques ,quantum entanglement ,quantum information ,telecommunication security ,Telecommunication ,TK5101-6720 - Abstract
Abstract The rapidly developing discipline of quantum computing (QC) employs ideas from quantum physics to improve the performance of traditional computers and other devices. Because of the dramatically improved speed at which it processes data, it can be applied to various issues. QC has many potential applications, but three of the most exciting applications are unstructured search, quantum simulation, and network optimisation. Several existing technologies, such as machine learning, may benefit from its increased speed and precision. In this study, the authors will explore how the principles of QC might be applied to the Internet of Things (IoT) to improve its accuracy, speed, and security. Several approaches exist for achieving this goal, such as network optimisation in IoT using QC, faster computation at IoT endpoints, securing IoT using QC, a quantum sensor for IoT, quantum digital marketing, quantum‐secured smart lock etc.
- Published
- 2024
- Full Text
- View/download PDF
39. The Mechanics Underpinning Non-Deterministic Computation in Cortical Neural Networks
- Author
-
Elizabeth A. Stoll
- Subjects
cortical neuron ,neural computation ,thermodynamic computation ,probabilistic coding ,two-state quantum systems ,quantum information ,Mathematics ,QA1-939 - Abstract
Cortical neurons integrate upstream signals and random electrical noise to gate signaling outcomes, leading to statistically random patterns of activity. Yet classically, the neuron is modeled as a binary computational unit, encoding Shannon entropy. Here, the neuronal membrane potential is modeled as a function of inherently probabilistic ion behavior. In this new model, each neuron computes the probability of transitioning from an off-state to an on-state, thereby encoding von Neumann entropy. Component pure states are integrated into a physical quantity of information, and the derivative of this high-dimensional probability distribution yields eigenvalues across the multi-scale quantum system. In accordance with the Hellman–Feynman theorem, the resolution of the system state is paired with a spontaneous shift in charge distribution, so this defined system state instantly becomes the past as a new probability distribution emerges. This mechanistic model produces testable predictions regarding the wavelength of free energy released upon information compression and the temporal relationship of these events to physiological outcomes. Overall, this model demonstrates how cortical neurons might achieve non-deterministic signaling outcomes through a computational process of noisy coincidence detection.
- Published
- 2024
- Full Text
- View/download PDF
40. Quantum Darwinism and objectivity in non-trivial systems and interactions
- Author
-
Ryan, Eoghan, Paternostro, Mauro, Ferraro, Alessandro, and McAllister, John
- Subjects
Quantum information ,open quantum systems ,quantum darwinism ,objectivity - Abstract
An explanation for the quantum-to-classical transition has long been sought after since the haydays of the field. Decoherence theory and open quantum system dynamics have paved the way, showing how a system can become correlated with, and so lose information into the environment. Quantum Darwinism, and its more stringent cousins Strong Quantum Darwinism and Spectrum Broadcast Structures, seek to explain how this information loss is achieved in such a way as to be objective, classical and redundant. However there remains questions as to how the structure of the environment, states and types of interactions can give rise to this redundant encoding. In this thesis, we collect the work of 3 of our papers, exploring these questions. First, we show how information from one environment can spread to another. Then we show how commutativity can play a role in the emergence of objectivity. Lastly, we move beyond a single, pure system to a more realistic bipartite one, with both classical and quantum correlations between the subsystems. We shall show how interactions between only these subsystems can mediate the redundancy of others, and how these can lower bound and upper bound other forms of interactions between said subsystems and the environment.
- Published
- 2023
41. Theory-independent topics towards quantum mechanics : ψ-ontology and nonlocality distillation
- Author
-
Eftaxias, Nikolaos Georgios
- Subjects
quantum physics ,quantum foundations ,Bell inequalities ,wavefunction physical meaning ,Generalised Probabilistic Theories ,quantum information ,non-signalling correlations ,device-independent information-processing ,psi ontology theorems ,nonlocality distillation - Abstract
It is widely accepted that the most emblematic quantity of quantum mechanics, the wavefunction, is the successful tool for making accurate predictions about experimental results. However, the physical meaning of the wavefunction has been a subject of debates since the birth of the theory. A popular dilemma has to do with the question of whether a pure quantum state is an observer-dependent-quantity/a state-of-knowledge, such as probabilities and density operators, or otherwise if it is something (characterised as) real. Reasons why this debate is important include resolutions of the wavefunction collapse mechanism as well as of potential conflicts between quantum mechanics and special relativity. Physicists have had opinions on this dilemma based on intuitions, interpretations or philosophy. But in the recent years, the community of quantum foundations has been equipped with theorems -known as ψ-ontology theorems- that answer this dilemma rigorously. As always, the "advantage" of a theorem is that it comes with a proof and the "disadvantage" that it comes with assumptions. The common ground among all ψ-ontology theorems is that they work within the framework of underlying models. In a previous work R. Colbeck and R. Renner constructed a theorem concluded that a quantum state is not a state-of-knowledge about an underlying physical state. A core assumption behind their proof was that the inputs used for a chained Bell test were uncorrelated with all the variables of the setup that are not caused by them. This free-choice definition of them implies no-conspiracy and parameter-independence (in Bell's theorem terms), and actually, the two latter were the strictly necessary for their proof. At the first part of this thesis we relax these assumptions and we test the robustness of the theorem's conclusion. First, regarding no-conspiracy relaxation, we allow the inputs to be correlated with the underlying variables and through a randomness amplification technique we show that there exist conditions under which the original theorem's conclusion still holds. The situation is different regarding parameter-dependence embedding, since their proof turns out to be unreceptive to it. Under this evidence, we discuss a particular toy underlying model as a counterexample explaining at least why our intended parameter-independence relaxation would be impossible to reach the maximum parameter-dependence strength. Non-signalling correlations play a central role in the next parts of the thesis. The realisation by the community that correlations stronger than any quantum ones, can still be non-signalling, created two -among plenty- broad research programs. Since the non-signalling principle cannot single out quantum correlations, is there any other physical axiom managing so? And, when it comes to performing information-processing tasks, how quantum theory competes with other possible non-signalling theories? Nonlocality distillation, that covers the second part of the thesis, is an absolute "ally" of the earliest aforementioned axiomatization realm. This is because there are correlations that do not violate "at first sight" information-theoretic axioms (such as non-trivial communication complexity, information-causality etc), but they do so after they undergo a distillation process. In a nonlocality distillation situation, we are given a number of nonlocal resources (boxes) characterised by weak nonlocality (according to some measure), and we apply to them operations regarded as free in order to create a final box having stronger nonlocality. However, even in the simplest distillation scenario, that uses two copies of a resource taken from the simplest Bell scenario, there are 82^4 candidate distillation protocols to computationally search over. This fact has been responsible for the extremely slow progress in the whole field. In this work, we initially tackle this chronic obstacle by developing techniques based on Linear Programming and on convex geometry, that significantly speed the search for protocols up. Then, we applied those techniques to construct Serially-Adaptive-Algorithms, algorithms that find out effective ways (in terms of highly amplifying the CHSH measure of nonlocality) to iterate protocols and to combine boxes in a two-by-two manner. After that, we study the almost unexplored so far territory of three-copy CHSH distillation protocols. Overall, four such protocols have been invented in this thesis, that outperform previously known protocols in certain aspects. Three of them are genuine in the sense that they are not reducible to iterations of lower scale (i.e. two-copy) protocols. Our genuine protocols unlock the distillability within sets of quantum correlations as well, that were not known to be distillable before. Every nonlocality distillation scheme developed in this thesis broadens the known set of post-quantum correlations that trivialize communication complexity. Through this prism, each one contributes on ruling out more post-quantum correlations. The third part of the thesis concerns the generalised probabilistic theory involving the full non-signalling state space (termed boxworld). It was known that while the states of boxworld can be richer, "more entangled" than quantum ones, its measurements are much poorer, following a regime of a "trade-off the measurements for the states". In this part we shift the attention towards boxworld measurements, and we are asking, even if they are not as elaborate as quantum ones can be, what is the most interesting set of measurements boxworld gives rise to? To this purpose, we characterise the deterministic effects in a certain boxworld scenario, by a method introduced here as an alternative to vertex-enumeration. We distinguish the couplers, the effects that cannot be expressed as trivial operations connecting inputs and outputs between boxes (the latter are wirings). Finally, having those couplers characterised, we spark-off the research field of finding information-processing tasks that benefit from them and indeed, we show that boxworld state-discrimination and nonlocality-distillation are among such tasks.
- Published
- 2023
42. Analysis of grover’s quantum search algorithm on a classical computer: Identifying opportunities for improvement.
- Author
-
ÇELİK, Necati and BİNGÖL, Özkan
- Subjects
- *
SEARCH algorithms , *QUBITS , *QUANTUM information science , *ALGORITHMS , *PROBABILITY theory - Abstract
In this paper, Grover’s quantum search algorithm is analyzed using a classical computer by calculating the amplitudes and the probabilities of finding a single marked state for n=5, 10, 15, 20, 25, and 27 qubit states. The calculations show that the marked state can be found in O(√N) iterations, where N = 2n is the number of items. The possibility of improving Grover’s search algorithm to find a single item in N search elements is discussed by calculating the amplitudes and hence the probabilities of finding a single marked state for n=5, 10, 15, 20, 25, 30, 35, 40, 45, and 50 qubit states. The calculations showed that the marked state could be found with sufficiently high probability in O(ln(N)) iterations. This is quite a remarkable speed-up that can be achieved to find a single marked element in an unsorted N search element. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
43. Entanglement and Generalized Berry Geometrical Phases in Quantum Gravity.
- Author
-
Cirilo-Lombardo, Diego J. and Sanchez, Norma G.
- Subjects
- *
SYMMETRY (Physics) , *COHERENT states , *GEOMETRIC quantum phases , *QUANTUM theory , *PLANCK scale , *INFLATIONARY universe - Abstract
A new formalism is introduced that makes it possible to elucidate the physical and geometric content of quantum space–time. It is based on the Minimum Group Representation Principle (MGRP). Within this framework, new results for entanglement and geometrical/topological phases are found and implemented in cosmological and black hole space–times. Our main results here are as follows: (i) We find the Berry phases for inflation and for the cosmological perturbations and express them in terms of the observables, such as the spectral scalar and tensor indices, n S and n T , and the tensor-to-scalar ratio r. The Berry phase for de Sitter inflation is imaginary with the sign describing the exponential acceleration. (ii) The pure entangled states in the minimum group (metaplectic) M p (n) representation for quantum de Sitter space–time and black holes are found. (iii) For entanglement, the relation between the Schmidt type representation and the physical states of the M p (n) group is found: This is a new non-diagonal coherent state representation complementary to the known Sudarshan diagonal one. (iv) Mean value generators of M p (2) are related to the adiabatic invariant and topological charge of the space–time, (matrix element of the transition − ∞ < t < ∞ ). (v) The basic even and odd n-sectors of the Hilbert space are intrinsic to the quantum space–time and its discrete levels (in particular, continuum for n → ∞ ), they do not require any extrinsic generation process such as the standard Schrodinger cat states, and are entangled. (vi) The gravity or cosmological domains on one side and another of the Planck scale are entangled. Examples: The quantum primordial trans-Planckian de Sitter vacuum and the classical late de Sitter vacuum today; the central quantum gravity region and the external classical gravity region of black holes. The classical and quantum dual gravity regions of the space–time are entangled. (vii) The general classical-quantum gravity duality is associated with the Metaplectic M p (n) group symmetry which provides the complete full covering of the phase space and of the quantum space–time mapped from it. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
44. Quantum multi-state Swap Test: an algorithm for estimating overlaps of arbitrary number quantum states.
- Author
-
Liu, Wen, Li, Yang-Zhi, Yin, Han-Wen, Wang, Zhi-Rao, and Wu, Jiang
- Subjects
QUANTUM states ,QUANTUM numbers ,QUANTUM information theory ,CLOUD computing ,ALGORITHMS ,QUBITS - Abstract
Estimating the overlap between two states is an important task with several applications in quantum information. However, the typical swap test circuit can only measure a sole pair of quantum states at a time. In this study, a recursive quantum circuit is designed to measure overlaps of n quantum states | ϕ 1 〉 , | ϕ 2 〉 , ... | ϕ n 〉 concurrently with O (k 2 k) controlled-swap(CSWAP) gates and O (k) ancillary qubits, where k = ⌈ log n ⌉ . All pairwise overlaps among input quantum states | 〈 ϕ i | ϕ j 〉 | 2 can be obtained in this circuit. Compared with existing scheme for measuring the overlap of multiple quantum states, the circuit provides higher precision and less consumption of ancillary qubits. In addition, some simulation experiments are performed on IBM quantum cloud platform to verify the superiority of this algorithm. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
45. Learning a quantum channel from its steady-state.
- Author
-
Ilin, Yigal and Arad, Itai
- Subjects
- *
MACHINE learning , *QUANTUM computers , *QUBITS , *QUANTUM theory , *COMPUTER simulation - Abstract
We present a scalable method for learning local quantum channels using local expectation values measured on a single state—their steady state. Our method is inspired by the algorithms for learning local Hamiltonians from their ground states. For it to succeed, the steady state must be non-trivial, and therefore the channel needs to be non-unital. Such non-unital channels are readily implementable on present day quantum computers using mid-circuit measurements or RESET gates. We demonstrate that the full structure of such channels is encoded in their steady states, and can be learned efficiently using only the expectation values of local observables on these states. We emphasize two immediate applications to illustrate our approach: (i) Using engineered dissipative dynamics, we offer a straightforward way to assess the accuracy of a given noise model in a regime where all qubits are actively utilized for a significant duration. (ii) Given a parameterized noise model for the entire system, our method can learn its underlying parameters. We demonstrate both applications using numerical simulations and experimental trials conducted on an IBMQ machine. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
46. A Novel and Efficient Stabilizer Codes Over NonCyclic Hadamard Difference Sets for Quantum System.
- Author
-
Goswami, Shivender, Kumar, Manoj, Mishra, R. K., and Rathor, Akash
- Subjects
- *
DIFFERENCE sets , *PARITY-check matrix , *BINARY operations , *CIRCULANT matrices , *INFORMATION storage & retrieval systems , *HADAMARD codes , *PERMUTATIONS , *CYCLIC codes , *MARKOV spectrum - Abstract
Quantum error correction lies at the heart of building reliable quantum information processing systems. Stabilizer codes, a fundamental class of quantum errorcorrecting codes, play a pivotal role in mitigating the adverse effects of noise and decoherence in quantum systems. This paper introduces a novel construction of quantum stabilizer codes using Hadamard difference sets, an elegant mathematical concept derived from combinatorial design theory. In this paper, the construction of the quantum stabilizer codes over non- cyclic Hadamard difference sets with parameters (4m²,2m²-m, m²-m), where m is a positive integer is discussed. Firstly, the parity check matrices are constructed from the Circulant permutation matrices with the help of Hadamard difference sets and then, the Symplectic inner product condition for Hadamard difference sets over binary operation for parity check matrices are obtained to affirm the commutative condition for Stabilizer operators which is vital for the error detection. For application, we constructed a Hadamard difference sets with parameters (16,6,2) for m = 2 of ordered pair of the group Z2 Z8 × (non-cyclic group) and quantum stabilizer codes are obtained by parity-check matrix. [ABSTRACT FROM AUTHOR]
- Published
- 2024
47. A driven Kerr oscillator with two-fold degeneracies for qubit protection.
- Author
-
Venkatraman, Jayameenakshi, Cortiñas, Rodrigo G., Frattini, Nicholas E., Xu Xiao, and Devoret, Michel H.
- Subjects
- *
QUBITS , *PHASE space , *PSEUDOPOTENTIAL method , *QUANTUM computing - Abstract
We present the experimental finding of multiple simultaneous two-fold degeneracies in the spectrum of a Kerr oscillator subjected to a squeezing drive. This squeezing drive resulting from a three-wave mixing process, in combination with the Kerr interaction, creates an effective static two-well potential in the phase space rotating at half the frequency of the sinusoidal drive generating the squeezing. Remarkably, these degeneracies can be turned on-and-off on demand, as well as their number by simply adjusting the frequency of the squeezing drive. We find that when the detuning Δ between the frequency of the oscillator and the second subharmonic of the drive equals an even multiple of the Kerr coefficient K, Δ/K = 2m, the oscillator displays m+1 exact, parity-protected, spectral degeneracies, insensitive to the drive amplitude. These degeneracies can be explained by the unusual destructive interference of tunnel paths in the classically forbidden region of the double well static effective potential that models our experiment. Exploiting this interference, we measure a peaked enhancement of the incoherent well-switching lifetime, thus creating a protected cat qubit in the ground state manifold of our oscillator. Our results illustrate the relationship between degeneracies and noise protection in a driven quantum system. [ABSTRACT FROM AUTHOR]
- Published
- 2024
- Full Text
- View/download PDF
48. Device-independent certification of desirable properties with a confidence interval
- Author
-
Wan-Guan Chang, Kai-Chun Chen, Kai-Siang Chen, Shin-Liang Chen, and Yeong-Cherng Liang
- Subjects
device-independent ,hypothesis testing ,self-testing ,quantum information ,quantum entanglement ,quantum properties ,Physics ,QC1-999 - Abstract
In the development of quantum technologies, a reliable means for characterizing quantum devices, be it a measurement device, a state-preparation device, or a transformation device, is crucial. However, the conventional approach based on, for example, quantum state tomography or process tomography relies on assumptions that are often not necessarily justifiable in a realistic experimental setting. Although the device-independent (DI) approach to this problem bypasses the shortcomings above by making only minimal, justifiable assumptions, most of the theoretical proposals to date only work in the idealized setting where independent and identically distributed (i.i.d.) trials are assumed. Here, we provide a versatile solution for rigorous device-independent certification that does not rely on the i.i.d. assumption. Specifically, we describe how the prediction-based ratio (PBR) protocol and martingale-based protocol developed for hypothesis testing can be applied in the present context to achieve a device-independent certification of desirable properties with confidence interval (CI). To illustrate the versatility of these methods, we demonstrate how we can use them to certify—with finite data—the underlying negativity, Hilbert space dimension, entanglement depth, and fidelity to some target pure state. In particular, we provide examples showing how the amount of certifiable negativity and fidelity scales with the number of trials and how many experimental trials one needs to certify a qutrit state space or the presence of genuine tripartite entanglement. Overall, we have found that the PBR protocol and the martingale-based protocol often offer similar performance, even though the latter does have to presuppose any witness (Bell-like inequality). In contrast, our findings also show that the performance of the martingale-based protocol may be severely affected by one’s choice of Bell-like inequality. Intriguingly, a Bell function useful for self-testing does not necessarily give the optimal confidence-gain rate for certifying the fidelity to the corresponding target state.
- Published
- 2024
- Full Text
- View/download PDF
49. Optica Quantum
- Subjects
optics ,photonics ,quantum computing ,quantum information ,Optics. Light ,QC350-467 ,Applied optics. Photonics ,TA1501-1820 - Published
- 2024
50. Metasurface‐Empowered Quantum Photonics
- Author
-
Yangwu Li, Wenwei Liu, Zhancheng Li, Hua Cheng, and Shuqi Chen
- Subjects
metasurfaces ,quantum entanglement and interference ,quantum information ,quantum photonics ,Applied optics. Photonics ,TA1501-1820 ,Optics. Light ,QC350-467 - Abstract
In recent decades, quantum information technologies have attracted significant attention and experienced rapid development due to their ultrafast processing speeds and high level of information security. A significant trend in this field of study involves the ongoing pursuit of integrating and miniaturizing quantum devices. Metasurfaces, which are artificially designed planar nanostructure arrays with versatile wavefront shaping capabilities, present a promising platform for the development of integrated photonic quantum devices by effectively controlling quantum light in multiple degrees of freedom. In this review, recent advances in the field of quantum photonics facilitated by metasurfaces, encompassing quantum light sources, manipulation and measurement of quantum states, and the intriguing functionalities of quantum metasurfaces, are summarized. Additionally, potential future directions for the advancement of quantum metasurfaces are discussed.
- Published
- 2024
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.