Showing 201 - 220 results of 243 for search '"Quantum computing"', query time: 0.06s Refine Results
  1. 201

    Nearly optimal quasienergy estimation and eigenstate preparation of time-periodic Hamiltonians by Sambe space formalism by Kaoru Mizuta

    Published 2025-01-01
    “…As the computation of energy eigenvalues and eigenstates of time-independent Hamiltonians is a central problem in both classical and quantum computation, quasienergy and Floquet eigenstates are the important targets. …”
    Get full text
    Article
  2. 202

    Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives by Yevhen Kotukh, Hennadii Khalimov

    Published 2024-06-01
    “…In 1994, Shor showed that these classical complex problems can be easily solved on a large-scale quantum computer.  Quantum-resistant cryptosystems based on lattices and other post-quantum candidates also exploit computationally complex tasks. …”
    Get full text
    Article
  3. 203

    Refraction of the Two-Photon Multimode Field via a Three-Level Atom by Trever Harborth, Yuri Rostovtsev

    Published 2025-01-01
    “…The findings are not only interesting for understanding additional physical phenomena due to the increased complexity of a three-level, two-photon system, but are also necessary for advancing applications such as quantum communications, quantum computation, and quantum information.…”
    Get full text
    Article
  4. 204

    Efficient discrimination between real and complex quantum theories by Josep Batle, Tomasz Białecki, Tomasz Rybotycki, Jakub Tworzydło, Adam Bednorz

    Published 2025-01-01
    “…This large theoretical difference enables us to demonstrate the concomitant experimental violation on IBM quantum computer via a designed quantum network, without resorting to error mitigation, obtaining as a result $15.44$ at more than $100$ standard deviations above the found real bound.…”
    Get full text
    Article
  5. 205

    Multipartite entanglement distribution in a topological photonic network by Juan Zurita, Andrés Agustí Casado, Charles E. Creffield, Gloria Platero

    Published 2025-02-01
    “…In the ongoing effort towards a scalable quantum computer, multiple technologies have been proposed. …”
    Get full text
    Article
  6. 206
  7. 207

    Multiplexed Quantum Communication with Surface and Hypergraph Product Codes by Shin Nishio, Nicholas Connolly, Nicolò Lo Piparo, William John Munro, Thomas Rowan Scruby, Kae Nemoto

    Published 2025-01-01
    “…Connecting multiple processors via quantum interconnect technologies could help overcome scalability issues in single-processor quantum computers. Transmission via these interconnects can be performed more efficiently using quantum multiplexing, where information is encoded in high-dimensional photonic degrees of freedom. …”
    Get full text
    Article
  8. 208

    INNOVATIVE MECHANISMS FOR IMPLEMENTING STATE ECONOMIC POLICY FOR POST-WAR RECONSTRUCTION OF UKRAINE: QUANTUM TRANSFORMATIONS AS A DRIVER OF DEVELOPMENT by Oleksiy Shkuratov, Liudmila Antonova, Roman Dzyuba

    Published 2024-12-01
    “…The second quantum revolution involves the introduction of quantum computers, quantum cryptography and quantum communication, capable of accelerating the development of new materials, optimizing logistics chains and increasing the level of data security. …”
    Get full text
    Article
  9. 209

    Improved lattice‐based mix‐nets for electronic voting by Valeh Farzaliyev, Jan Willemson, Jaan Kristjan Kaasik

    Published 2023-01-01
    “…., ElGamal encryption) that will become vulnerable when a sufficiently powerful quantum computer will be built. Thus, there is a need to develop quantum‐resistant mix‐nets. …”
    Get full text
    Article
  10. 210

    Physical implementability for reversible magic state manipulation by Yu-Ao Chen, Gilad Gour, Xin Wang, Lei Zhang, Chenghong Zhu

    Published 2025-01-01
    “…Abstract Magic states are essential for achieving universal quantum computation, yet the reversibility and efficiency of exact magic state manipulations remain less explored. …”
    Get full text
    Article
  11. 211

    Deterministic Generation of Concatenated Graph Codes from Quantum Emitters by Love A. Pettersson, Anders S. Sørensen, Stefano Paesani

    Published 2025-01-01
    “…We show that these schemes enable fault-tolerant fusion-based quantum computation in practical regimes with high photon loss and standard fusion gates without the need for auxiliary photons.…”
    Get full text
    Article
  12. 212

    Streaming quantum state purification by Andrew M. Childs, Honghao Fu, Debbie Leung, Zhi Li, Maris Ozols, Vedang Vyas

    Published 2025-01-01
    “…This basic task has applications to quantum communication over noisy channels and quantum computation with imperfect devices, but has only been studied previously for the case of qubits. …”
    Get full text
    Article
  13. 213

    Hybrid Tree Tensor Networks for Quantum Simulation by Julian Schuhmacher, Marco Ballarin, Alberto Baiardi, Giuseppe Magnifico, Francesco Tacchino, Simone Montangero, Ivano Tavernelli

    Published 2025-01-01
    “…Hybrid tensor networks (hTNs) offer a promising solution for encoding variational quantum states beyond the capabilities of efficient classical methods or noisy quantum computers alone. However, their practical usefulness and many operational aspects of hTN-based algorithms, like the optimization of hTNs, the generalization of standard contraction rules to an hybrid setting, and the design of application-oriented architectures have not been thoroughly investigated yet. …”
    Get full text
    Article
  14. 214

    Algebraic classification of Hietarinta’s solutions of Yang-Baxter equations: invertible 4 × 4 operators by Somnath Maity, Vivek Kumar Singh, Pramod Padmanabhan, Vladimir Korepin

    Published 2024-12-01
    “…Abstract In order to examine the simulation of integrable quantum systems using quantum computers, it is crucial to first classify Yang-Baxter operators. …”
    Get full text
    Article
  15. 215

    Three-party password authenticated key agreement protocol with user anonymity based on lattice by Caifen WANG, Li CHEN

    Published 2018-02-01
    “…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
    Get full text
    Article
  16. 216

    Observation of multiple steady states with engineered dissipation by Li Li, Tong Liu, Xue-Yi Guo, He Zhang, Silu Zhao, Zheng-An Wang, Zhongcheng Xiang, Xiaohui Song, Yu-Xiang Zhang, Kai Xu, Heng Fan, Dongning Zheng

    Published 2025-01-01
    “…Abstract Simulating the dynamics of open quantum systems is essential in achieving practical quantum computation and understanding novel nonequilibrium behaviors. …”
    Get full text
    Article
  17. 217

    Sparse Blossom: correcting a million errors per core second with minimum-weight matching by Oscar Higgott, Craig Gidney

    Published 2025-01-01
    “…For 0.1% circuit-level depolarising noise, sparse blossom processes syndrome data in both $X$ and $Z$ bases of distance-17 surface code circuits in less than one microsecond per round of syndrome extraction on a single core, which matches the rate at which syndrome data is generated by superconducting quantum computers. Our implementation is open-source, and has been released in version 2 of the PyMatching library.…”
    Get full text
    Article
  18. 218

    Lower bounds for quantum-inspired classical algorithms via communication complexity by Nikhil S. Mande, Changpeng Shao

    Published 2025-01-01
    “…Quantum-inspired classical algorithms provide us with a new way to understand the computational power of quantum computers for practically-relevant problems, especially in machine learning. …”
    Get full text
    Article
  19. 219

    Construction of quantum BCH code based on cyclotomic coset by Lijuan XING, Zhuo LI

    Published 2021-10-01
    “…Quantum-error-correcting code can overcome quantum decoherence efficiently, which is the key technology to realize quantum computers.A series of quantum BCH code was proposed based on classical codes.First, a general way of well-chosen cyclotomic coset was introduced.A sufficient condition was given to calculate the number of elements in cyclotomic coset.Then, a series of quantum BCH (Bose-Chaudhuri-Hocquenghem) code over finite field F<sub>q</sub> was constructed by CSS (Calderbank-Shor-Steane) construction and Steane construction.The results were extended to finite field F<sub>q</sub><sup>2</sup> with Hermitian construction.Compared with the results in literature,the range of introduced cyclotomic coset is more wide, and the new quantum BCH code has higher dimensions and better lower bounds on minimum distances.Furthermore, a family of quantum maximum distance separable (quantum MDS) code over any finite fields is constructed.…”
    Get full text
    Article
  20. 220

    Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems by Caixue Zhou, Lihua Wang, Lingmin Wang

    Published 2022-04-01
    “…With the development of quantum computer technology, quantum attacks-resistant cryptographic schemes are gradually entering people’s horizons. …”
    Get full text
    Article