-
201
Nearly optimal quasienergy estimation and eigenstate preparation of time-periodic Hamiltonians by Sambe space formalism
Published 2025-01-01“…As the computation of energy eigenvalues and eigenstates of time-independent Hamiltonians is a central problem in both classical and quantum computation, quasienergy and Floquet eigenstates are the important targets. …”
Get full text
Article -
202
Advantages of Logarithmic Signatures in the Implementation of Crypto Primitives
Published 2024-06-01“…In 1994, Shor showed that these classical complex problems can be easily solved on a large-scale quantum computer. Quantum-resistant cryptosystems based on lattices and other post-quantum candidates also exploit computationally complex tasks. …”
Get full text
Article -
203
Refraction of the Two-Photon Multimode Field via a Three-Level Atom
Published 2025-01-01“…The findings are not only interesting for understanding additional physical phenomena due to the increased complexity of a three-level, two-photon system, but are also necessary for advancing applications such as quantum communications, quantum computation, and quantum information.…”
Get full text
Article -
204
Efficient discrimination between real and complex quantum theories
Published 2025-01-01“…This large theoretical difference enables us to demonstrate the concomitant experimental violation on IBM quantum computer via a designed quantum network, without resorting to error mitigation, obtaining as a result $15.44$ at more than $100$ standard deviations above the found real bound.…”
Get full text
Article -
205
Multipartite entanglement distribution in a topological photonic network
Published 2025-02-01“…In the ongoing effort towards a scalable quantum computer, multiple technologies have been proposed. …”
Get full text
Article -
206
Single-Photon Detectors for Quantum Integrated Photonics
Published 2024-12-01“…Applications such as quantum key distribution, quantum cryptography, and quantum computation demand the ability to detect individual quanta of light and distinguish between single-photon states and multi-photon states, particularly when operating within waveguide systems. …”
Get full text
Article -
207
Multiplexed Quantum Communication with Surface and Hypergraph Product Codes
Published 2025-01-01“…Connecting multiple processors via quantum interconnect technologies could help overcome scalability issues in single-processor quantum computers. Transmission via these interconnects can be performed more efficiently using quantum multiplexing, where information is encoded in high-dimensional photonic degrees of freedom. …”
Get full text
Article -
208
INNOVATIVE MECHANISMS FOR IMPLEMENTING STATE ECONOMIC POLICY FOR POST-WAR RECONSTRUCTION OF UKRAINE: QUANTUM TRANSFORMATIONS AS A DRIVER OF DEVELOPMENT
Published 2024-12-01“…The second quantum revolution involves the introduction of quantum computers, quantum cryptography and quantum communication, capable of accelerating the development of new materials, optimizing logistics chains and increasing the level of data security. …”
Get full text
Article -
209
Improved lattice‐based mix‐nets for electronic voting
Published 2023-01-01“…., ElGamal encryption) that will become vulnerable when a sufficiently powerful quantum computer will be built. Thus, there is a need to develop quantum‐resistant mix‐nets. …”
Get full text
Article -
210
Physical implementability for reversible magic state manipulation
Published 2025-01-01“…Abstract Magic states are essential for achieving universal quantum computation, yet the reversibility and efficiency of exact magic state manipulations remain less explored. …”
Get full text
Article -
211
Deterministic Generation of Concatenated Graph Codes from Quantum Emitters
Published 2025-01-01“…We show that these schemes enable fault-tolerant fusion-based quantum computation in practical regimes with high photon loss and standard fusion gates without the need for auxiliary photons.…”
Get full text
Article -
212
Streaming quantum state purification
Published 2025-01-01“…This basic task has applications to quantum communication over noisy channels and quantum computation with imperfect devices, but has only been studied previously for the case of qubits. …”
Get full text
Article -
213
Hybrid Tree Tensor Networks for Quantum Simulation
Published 2025-01-01“…Hybrid tensor networks (hTNs) offer a promising solution for encoding variational quantum states beyond the capabilities of efficient classical methods or noisy quantum computers alone. However, their practical usefulness and many operational aspects of hTN-based algorithms, like the optimization of hTNs, the generalization of standard contraction rules to an hybrid setting, and the design of application-oriented architectures have not been thoroughly investigated yet. …”
Get full text
Article -
214
Algebraic classification of Hietarinta’s solutions of Yang-Baxter equations: invertible 4 × 4 operators
Published 2024-12-01“…Abstract In order to examine the simulation of integrable quantum systems using quantum computers, it is crucial to first classify Yang-Baxter operators. …”
Get full text
Article -
215
Three-party password authenticated key agreement protocol with user anonymity based on lattice
Published 2018-02-01“…With the rapid development of quantum theory and the existence of polynomial algorithm in quantum computation based on discrete logarithm problem and large integer decomposition problem,the security of the algorithm was seriously threatened.Therefore,two authentication key agreement protocols were proposed rely on ring-learning-with-error (RLWE) assumption including lattice-based implicit authentication key agreement scheme and lattice-based explicit authentication key agreement scheme and proved its security.The implicit authentication key agreement protocol is less to communicate and faster to authentication,the explicit authentication key agreement protocol is more to secure.At the same time,bidirectional authentication of users and servers can resist unpredictable online dictionary attacks.The new protocol has higher efficiency and shorter key length than other password authentication key agreement protocols.It can resist quantum attacks.Therefore,the protocol is efficient,secure,and suitable for large-scale network communication.…”
Get full text
Article -
216
Observation of multiple steady states with engineered dissipation
Published 2025-01-01“…Abstract Simulating the dynamics of open quantum systems is essential in achieving practical quantum computation and understanding novel nonequilibrium behaviors. …”
Get full text
Article -
217
Sparse Blossom: correcting a million errors per core second with minimum-weight matching
Published 2025-01-01“…For 0.1% circuit-level depolarising noise, sparse blossom processes syndrome data in both $X$ and $Z$ bases of distance-17 surface code circuits in less than one microsecond per round of syndrome extraction on a single core, which matches the rate at which syndrome data is generated by superconducting quantum computers. Our implementation is open-source, and has been released in version 2 of the PyMatching library.…”
Get full text
Article -
218
Lower bounds for quantum-inspired classical algorithms via communication complexity
Published 2025-01-01“…Quantum-inspired classical algorithms provide us with a new way to understand the computational power of quantum computers for practically-relevant problems, especially in machine learning. …”
Get full text
Article -
219
Construction of quantum BCH code based on cyclotomic coset
Published 2021-10-01“…Quantum-error-correcting code can overcome quantum decoherence efficiently, which is the key technology to realize quantum computers.A series of quantum BCH code was proposed based on classical codes.First, a general way of well-chosen cyclotomic coset was introduced.A sufficient condition was given to calculate the number of elements in cyclotomic coset.Then, a series of quantum BCH (Bose-Chaudhuri-Hocquenghem) code over finite field F<sub>q</sub> was constructed by CSS (Calderbank-Shor-Steane) construction and Steane construction.The results were extended to finite field F<sub>q</sub><sup>2</sup> with Hermitian construction.Compared with the results in literature,the range of introduced cyclotomic coset is more wide, and the new quantum BCH code has higher dimensions and better lower bounds on minimum distances.Furthermore, a family of quantum maximum distance separable (quantum MDS) code over any finite fields is constructed.…”
Get full text
Article -
220
Lattice-based provable data possession in the standard model for cloud-based smart grid data management systems
Published 2022-04-01“…With the development of quantum computer technology, quantum attacks-resistant cryptographic schemes are gradually entering people’s horizons. …”
Get full text
Article