J. P. Wang, L. P. Yang, Y. Q. Ji, Y. L. Liu, L. Dong, X. M. Xiu
{"title":"Fast generation of GHZ state by designing the evolution operators with Rydberg superatom","authors":"J. P. Wang, L. P. Yang, Y. Q. Ji, Y. L. Liu, L. Dong, X. M. Xiu","doi":"10.1007/s11128-024-04587-4","DOIUrl":"10.1007/s11128-024-04587-4","url":null,"abstract":"<div><p>In this paper, we propose an efficient scheme to fast generate three-particle Greenberger–Horne–Zeilinger (GHZ) state based on quantum Zeno dynamics and designing the evolution operators with Rydberg superatom. In the present scheme, the quantum information is encoded in the collective states of superatom which contains <i>n</i> individual four-level inverted Y-type Rydberg atoms, and the Rabi frequency can be fitted to a Gaussian function, which favors experimental feasibility. In addition, the influence of various decoherence factors such as atomic spontaneous emission, cavity decay and fiber leakage is also considered. The numerical simulation result shows that the present scheme is robust against decoherence and operational imperfection. At last, we generalize this scheme to the generation of <i>N</i>-particle GHZ state.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"23 11","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-11-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142664421","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Using an (A^*)-based framework for decomposing combinatorial optimization problems to employ NISQ computers","authors":"Simon Garhofer, Oliver Bringmann","doi":"10.1007/s11128-023-04115-w","DOIUrl":"10.1007/s11128-023-04115-w","url":null,"abstract":"<div><p>Combinatorial optimization problems such as the traveling salesperson problem are ubiquitous in practical applications and notoriously difficult to solve optimally. Hence, many current endeavors focus on producing approximate solutions. The use of quantum computers could accelerate the generation of those approximate solutions or yield more exact approximations in comparable time. However, quantum computers are presently very limited in size and fidelity. In this work, we aim to address the issue of limited problem size by developing a scheme that decomposes a combinatorial optimization problem instance into arbitrarily small subinstances that can be solved on a quantum machine. This process utilizes <i>A</i>* as a foundation. Additionally, we present heuristics that reduce the runtime of the algorithm effectively, albeit at the cost of optimality. In experiments, we find that the heavy dependence of our approach on the choice of the heuristics used allows for a modifiable framework that can be adapted case by case instead of a concrete procedure.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"22 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-023-04115-w.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41083645","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Madelaine S. Z. Liddy, Troy Borneman, Peter Sprenger, David Cory
{"title":"Optimal control theory techniques for nitrogen vacancy ensembles in single crystal diamond","authors":"Madelaine S. Z. Liddy, Troy Borneman, Peter Sprenger, David Cory","doi":"10.1007/s11128-023-04106-x","DOIUrl":"10.1007/s11128-023-04106-x","url":null,"abstract":"<div><p>Nitrogen vacancy centre ensembles are excellent candidates for quantum sensors due to their vector magnetometry capabilities, deployability at room temperature and simple optical initialization and readout. This work describes the engineering and characterization methods required to control all four principle axis systems (P.A.S.) of NV ensembles in a single crystal diamond without an applied static magnetic field. Circularly polarized microwaves enable arbitrary simultaneous control with spin-locking experiments and collective control using optimal control theory (OCT) in a (100) diamond. These techniques may be further improved and integrated to realize high-sensitivity NV-based quantum sensing devices using all four P.A.S. systems.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"22 10","pages":""},"PeriodicalIF":2.5,"publicationDate":"2023-09-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-023-04106-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41083644","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Authenticable quantum multi-secret sharing scheme based on monotone span program","authors":"Lele Li, Zhaowei Han, Feiting Guan","doi":"10.1007/s11128-023-04084-0","DOIUrl":"10.1007/s11128-023-04084-0","url":null,"abstract":"<div><p>Quantum multi-secret sharing plays a vital role in secure multi-key management. In this paper, an authenticable quantum multi-secret sharing scheme based on monotone span program is proposed. In our scheme, the distributor/participants run a quantum state digital signature algorithm to identify dishonest participants, strengthening the proposed scheme’s security. During the reconstruction phase, the participants encode their shares onto the generalized Bell states with the generalized Pauli operator to reconstruct multiple secrets. Here, the phase shift operator is utilized to share d-dimensional quantum states. Furthermore, security analysis shows that the proposed scheme can resist the entangle-measure attack, intercept-resend attack, and common internal attacks such as forgery attack, collusion attack, and denial attack.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"22 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43728227","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantifying unknown entanglement by neural networks","authors":"Xiaodie Lin, Zhenyu Chen, Zhaohui Wei","doi":"10.1007/s11128-023-04068-0","DOIUrl":"10.1007/s11128-023-04068-0","url":null,"abstract":"<div><p>Quantum entanglement plays a crucial role in quantum information processing tasks and quantum mechanics; hence, quantifying unknown entanglement is a fundamental task. However, this is also challenging, as entanglement cannot be measured by any observables directly. In this paper, we train neural networks to quantify unknown entanglement, where the input features for neural networks are the outcome statistics data produced by measuring target quantum states with local or even single-qubit Pauli observables, and the training labels are well-chosen quantities. For bipartite quantum states, this quantity is coherent information, which is a lower bound for many popular entanglement measures, like the entanglement of distillation. For multipartite quantum states, we choose this quantity as the geometric measure of entanglement. It turns out that the neural networks we train have very good performance in quantifying unknown quantum entanglement and can beat previous approaches like semi-device-independent protocols for this problem easily in both precision and application range. We also observe an interesting phenomenon that on quantum states with stronger quantum nonlocality, the neural networks tend to have better performance, though we do not provide them any knowledge on quantum nonlocality.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"22 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-023-04068-0.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45940355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Wei Chen, Yanmin Yang, Shao-Ming Fei, Zhu-Jun Zheng, Yan-Ling Wang
{"title":"Multipartite concurrence of W-class states based on sub-partite quantum systems","authors":"Wei Chen, Yanmin Yang, Shao-Ming Fei, Zhu-Jun Zheng, Yan-Ling Wang","doi":"10.1007/s11128-023-04090-2","DOIUrl":"10.1007/s11128-023-04090-2","url":null,"abstract":"<div><p>We study the concurrence for arbitrary <i>N</i>-partite <i>W</i>-class states based on the <span>((N-1))</span>-partite partitions of subsystems by taking account to the structures of <i>W</i>-class states. By using the method of permutation and combination, we give some analytical formulas of concurrence and elegant relations between the <i>N</i>-partite concurrence and the <span>((N-1))</span>-partite concurrence for arbitrary <i>N</i>-partite <i>W</i>-class states. Applying these relations, we present better lower bounds of concurrence for some multipartite mixed states. An example is given to demonstrate that our lower bounds can detect more entanglements.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"22 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-023-04090-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"42440916","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Xiaolong Yang, Dongfen Li, Jie Zhou, Yuqiao Tan, Yundan Zheng, Xiaofang Liu
{"title":"Research on quantum dialogue protocol based on the HHL algorithm","authors":"Xiaolong Yang, Dongfen Li, Jie Zhou, Yuqiao Tan, Yundan Zheng, Xiaofang Liu","doi":"10.1007/s11128-023-04048-4","DOIUrl":"10.1007/s11128-023-04048-4","url":null,"abstract":"<div><p>This paper presents an improved quantum dialogue protocol based on the HHL algorithm. In this protocol, Alice and Bob want to transmit their classical information to each other. Combining the HHL algorithm and quantum linear equation ensures that eavesdroppers cannot steal the data of communicators. In addition, communicators will connect come HHL quantum circuit constructed in this scheme with the swap test circuit to calculate the solution rather than directly measuring the result, which can improve the solution speed. Security analysis shows that this scheme is more secure than other general quantum dialogue schemes, and it can realize information protection in extreme cases, with good security and higher transmission efficiency.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"22 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2023-09-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43437274","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yu-Xiang Xiao, Lan Zhou, Wei Zhong, Ming-Ming Du, Yu-Bo Sheng
{"title":"The hyperentanglement-based quantum secure direct communication protocol with single-photon measurement","authors":"Yu-Xiang Xiao, Lan Zhou, Wei Zhong, Ming-Ming Du, Yu-Bo Sheng","doi":"10.1007/s11128-023-04097-9","DOIUrl":"10.1007/s11128-023-04097-9","url":null,"abstract":"<div><p>Quantum secure direct communication (QSDC) can directly transmit secret messages through quantum channel without keys. The typical entanglement-based QSDC protocol encodes in one degree of freedom and requires the Bell state measurement (BSM). In the paper, we propose a hyperentanglement-based QSDC protocol with the single-photon measurement. Comparing with the BSM, the single-photon measurement is easier to implement and has higher success probability. The adoption of hyperentanglement can increase the capacity of each photon pair, and thus increase the secret message capacity. The message sender can transmit 2 bits of messages with a hyperentangled photon pair in theory. We make the numerical simulations to study the secret message capacity against the collective attack and photon number splitting attack. Our QSDC protocol has potential applications in the future quantum communication field.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"22 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45567673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mirrors–light–atoms entanglement in ring optomechanical cavity","authors":"Oumayma El Bir, Morad El Baz","doi":"10.1007/s11128-023-04082-2","DOIUrl":"10.1007/s11128-023-04082-2","url":null,"abstract":"<div><p>The present paper illustrates the realization of an atom-optomechanical system where an atomic ensemble is confined in a ring optomechanical cavity consisting of a fixed mirror and two movable ones. An analysis of the dynamics and the linearization of the equations allows us to derive the multimode covariance matrix. Under realistic experimental conditions, we numerically simulate the steady-state bipartite and tripartite continuous variable entanglement using the logarithmic negativity and analyze the shared entanglement in the multimode system. The introduction of the atomic medium is responsible for a more expansive plateau of entanglement indicating its robustness against temperature-induced decoherence effects.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"22 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2023-09-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-023-04082-2.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44674646","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Quantum key recovery attacks on tweakable Even–Mansour ciphers","authors":"Ping Zhang, Yiyuan Luo","doi":"10.1007/s11128-023-04098-8","DOIUrl":"10.1007/s11128-023-04098-8","url":null,"abstract":"<div><p>As tweakable block ciphers from public permutations, tweakable Even–Mansour ciphers are widely used in disk sector encryption and data storage encryption. With the rapid improvement of computing power, especially the development of quantum computing technology and quantum computers, the quantum security of tweakable Even–Mansour ciphers should be concerned and studied. This paper focuses on the security of tweakable Even–Mansour ciphers in the quantum setting. For one-round tweakable Even–Mansour cipher, we give its quantum circuit, present a quantum key recovery attack in polynomial time by Simon’s algorithm and show the concrete resource estimation. For two-round tweakable Even–Mansour cipher, we present a better quantum key recovery attack by BHT-meets-Simon algorithm than that by Grover-meets-Simon algorithm from a new perspective of variable tweaks and show the concrete resource estimation. Finally, we generalize to <i>r</i>-round tweakable Even–Mansour cipher and present a quantum key recovery attack by combining Grover’s algorithm and Simon’s algorithm. Our work is of great importance. We use BHT-meets-Simon algorithm to achieve better quantum key recovery attacks than Grover-meets-Simon algorithm for the first time.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"22 9","pages":""},"PeriodicalIF":2.5,"publicationDate":"2023-09-04","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41550993","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}