Amit Devra, Niklas J. Glaser, Dennis Huber, Steffen J. Glaser
{"title":"Wigner state and process tomography on near-term quantum devices","authors":"Amit Devra, Niklas J. Glaser, Dennis Huber, Steffen J. Glaser","doi":"10.1007/s11128-024-04550-3","DOIUrl":"10.1007/s11128-024-04550-3","url":null,"abstract":"<div><p>We present an experimental scanning-based tomography approach for near-term quantum devices. The underlying method has previously been introduced in an ensemble-based NMR setting. Here we provide a tutorial-style explanation along with suitable software tools to guide experimentalists in its adaptation to near-term pure-state quantum devices. The approach is based on a Wigner-type representation of quantum states and operators. These representations provide a rich visualization of quantum operators using shapes assembled from a linear combination of spherical harmonics. These shapes (called droplets in the following) can be experimentally tomographed by measuring the expectation values of rotated axial tensor operators. We present an experimental framework for implementing the scanning-based tomography technique for circuit-based quantum computers and showcase results from IBM quantum experience. We also present a method for estimating the density and process matrices from experimentally tomographed Wigner functions (droplets). This tomography approach can be directly implemented using the Python-based software package <span>DROPStomo</span>.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"23 10","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-10-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-024-04550-3.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142453061","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A threshold changeable dynamic quantum secret sharing scheme with cheating identification","authors":"Fulin Li, Qingao Wu, Changlu Lin, Shixin Zhu","doi":"10.1007/s11128-024-04572-x","DOIUrl":"10.1007/s11128-024-04572-x","url":null,"abstract":"<div><p>Quantum secret sharing holds an important place in quantum cryptography. In this paper, a threshold changeable dynamic quantum secret sharing scheme with cheating identification is firstly proposed based on the Chinese Remainder Theorem. On the premise of not altering the shared secret and the private shares of the original participants, our scheme realizes the dynamic updating of participants and for the first time achieves the changeable threshold in the quantum environment, which greatly improves the flexibility and practicality of the scheme. In addition, we generalize the entanglement swapping equations of Bell states in 2-dimension to <i>d</i>-dimension. During the reconstruction phase, our scheme can timely detect and identify the cheating behaviors based on the randomized components and the entanglement swapping equations of <i>d</i>-dimensional Bell states. Meanwhile, the randomized components ensure privacy protection for shares and avoid the interference of invalid shares when recovering the secret. Security analysis shows that our scheme is resistant to not only a series of typical external attacks but also forgery, collusion, and dishonest revoked participant attacks. Compared with the existing schemes, our scheme is not only more secure and efficient but also has lower computational consumption.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"23 10","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-10-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142452909","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Comment on “quantum identity authentication with single photon”","authors":"Davide Li Calsi, Paul Kohl","doi":"10.1007/s11128-024-04564-x","DOIUrl":"10.1007/s11128-024-04564-x","url":null,"abstract":"<div><p>A few years ago Hong et al. (Quantum Inf Process 16:236, 2017) proposed a quantum identity authentication protocol using single photons and executable on currently available quantum hardware. Zawadzki later published two attacks on this protocol, and suggested a mitigation in the same work. In this comment we point out an additional vulnerability that causes the prover Alice to leak a percentage of her secret key at every authentication attempt. The latter is due to a problematic policy in the generation and management of decoy states. We conclude by showing a simple mitigation that addresses the issue.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"23 10","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-10-19","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-024-04564-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142451020","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Raj Alexandru Guţoiu, Andrei Tănăsescu, Pantelimon George Popescu
{"title":"Simple exact quantum search","authors":"Raj Alexandru Guţoiu, Andrei Tănăsescu, Pantelimon George Popescu","doi":"10.1007/s11128-024-04548-x","DOIUrl":"10.1007/s11128-024-04548-x","url":null,"abstract":"<div><p>While Grover’s search algorithm is asymptotically optimal, it does not always result in a real solution. If the search fails, the algorithm must be ran again from the beginning, conditionally doubling the effective number of oracle calls. Previous research attempted to fix this issue by modifying the oracle or alternating between numerically optimized reflectors. In this paper, we present an optimal initial state and reflector that produce an exact search with Grover’s algorithm at the cost of at most one additional oracle call beyond the optimum, a cost which can be nullified if we know a non-solution. We do this without modifying the oracle, without changing the diffuser at each step and even without any numerical optimization procedure required.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"23 10","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://link.springer.com/content/pdf/10.1007/s11128-024-04548-x.pdf","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142451145","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Laura Gatti, Rafael Sotelo, Juan Orihuela, Diego Gibert, Renzo D’ambrosio, Federico Fuidio
{"title":"QUBO formulation for aircraft load optimization","authors":"Laura Gatti, Rafael Sotelo, Juan Orihuela, Diego Gibert, Renzo D’ambrosio, Federico Fuidio","doi":"10.1007/s11128-024-04569-6","DOIUrl":"10.1007/s11128-024-04569-6","url":null,"abstract":"<div><p>In this article, we tackle the aircraft load optimization problem using classical optimization algorithms and optimization algorithms with QUBO (quadratic unconstrained binary optimization) formulation to run on quantum annealers. The problem is realistic based on plans of a certain aircraft model, the Airbus A330 200F, and can be adapted to other models from other manufacturers. We maximize a characteristic of the combination of containers (unit load device, ULD) to be transported, be it weight, volume, profit, or another, while complying with necessary parameters related to the flight such as the balance of the center of gravity as well as stress in the structure. Finally, examples of the results of different runs on QUBO in the D-Wave simulator are presented.\u0000</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"23 10","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142447292","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Error correction using squeezed Fock states","authors":"S. B. Korolev, E. N. Bashmakova, T. Yu. Golubeva","doi":"10.1007/s11128-024-04549-w","DOIUrl":"10.1007/s11128-024-04549-w","url":null,"abstract":"<div><p>The paper addresses the construction of an error correction code for quantum computations based on squeezed Fock states. It is shown that the use of squeezed Fock states makes it possible to satisfy the Knill-Laflamme (KL) criteria for bosonic error correction codes. It is shown that the first squeezed Fock state corrects both particle loss and dephasing errors better than higher-order states. A comparison of the proposed code with a code based on the squeezed Schrodinger’s cat states is carried out on the basis of the KL cost function. Using this function, we show that the squeezed first Fock state is competitive in protecting information in a channel with particle loss and dephasing.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"23 10","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-10-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142447445","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Yousef Mafi, Ali Kookani, Hossein Aghababa, Masoud Barati, Mohammadreza Kolahdouz
{"title":"Bidirectional quantum controlled teleportation in multi-hop networks: a generalized protocol for the arbitrary n-qubit state through the noisy channel","authors":"Yousef Mafi, Ali Kookani, Hossein Aghababa, Masoud Barati, Mohammadreza Kolahdouz","doi":"10.1007/s11128-024-04561-0","DOIUrl":"10.1007/s11128-024-04561-0","url":null,"abstract":"<div><p>This paper introduces a bidirectional quantum controlled teleportation (BQCT) protocol within a multi-hop communication network, designed to teleport an arbitrary <span>(n)</span>-qubit state through an <span>(m)</span>-hop network framework. Utilizing the IBM Quantum (IBMQ) Experience simulation framework and the Qiskit library, we empirically substantiate the protocol's efficacy. Our findings indicate consistent teleportation across varying hop counts, though the precision of the output state diminishes with an increase in hops. This research further delves into the impact of quantum noise—namely amplitude-damping, phase-damping, bit-flip, and phase-flip—on the protocol's performance. A significant finding is that the detrimental effects of quantum noise escalate with the number of hops, with noise influence showing independence from the input state and causing an exponential decrease in output state fidelity. Thus, our analysis suggests a potential for optimizing real quantum communication systems through a balance between error reduction strategies and the maximum tolerable noise level.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"23 10","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142443305","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Asymmetric bidirectional quantum 2(Leftrightarrow )3 qubit teleportation via seven-qubit entangled state","authors":"Hao Yuan, Guo-Zhu Pan, Gang Zhang","doi":"10.1007/s11128-024-04571-y","DOIUrl":"10.1007/s11128-024-04571-y","url":null,"abstract":"<div><p>An asymmetric bidirectional quantum teleportation scheme was proposed by utilizing a seven-qubit entangled state as quantum channel. The scheme can perfectly achieve the transmission of a three-qubit target entangled state from one legitimate user Alexis to the other legitimate user Billy. Simultaneously, another two-qubit target entangled state can be reversibly conveyed from Billy to Alexis. The implementation of the scheme requires only Bell-state measurements and some simple necessary quantum operations. The impact of phase-damping noise on our scheme is investigated by calculating and discussing its fidelity. Compared with some analogous schemes, the proposed scheme has many significant advantages, such as less quantum and classical resources consumed, higher intrinsic efficiency, lower execution difficulty. Furthermore, it has strong compatibility and experimental feasibility.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"23 10","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142443304","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Enabling CV-MDI-QKD for weakly squeezed states using non-Gaussian operations","authors":"Farsad Ahmad, Jian Li, Aeysha Khalique","doi":"10.1007/s11128-024-04565-w","DOIUrl":"10.1007/s11128-024-04565-w","url":null,"abstract":"<div><p>We propose a new non-Gaussian version of the continuous variables measurement device independent quantum key distribution (CV-MDI-QKD) protocol by utilizing a photon added-then-subtracted (PAS) state. We report that our single- and two-mode PAS-CV-MDI-QKD protocols outperform pure state CV-MDI-QKD protocol when considering weak squeezing and high noise, which is the practical regime. With such resources, CV-MDI-QKD is inaccessible when using a pure TMSV state, while PAS-CV-MDI-QKD can generate a useful key rate in this regime. We also compare PAS-CV-MDI-QKD with a two-mode photon replaced (2PR) state, which was not studied in low squeezing for MDI-QKD before.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"23 10","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142447373","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Dongmei Liu, Jian Li, Xiubo Chen, Chongqiang Ye, Zhuo Wang
{"title":"Quantum private query protocol based on counterfactual quantum key distribution with noiseless attack","authors":"Dongmei Liu, Jian Li, Xiubo Chen, Chongqiang Ye, Zhuo Wang","doi":"10.1007/s11128-024-04539-y","DOIUrl":"10.1007/s11128-024-04539-y","url":null,"abstract":"<div><p>Most of the previous quantum private query protocols are based on the BB84 key distribution type and generally use a method that wastes most quantum resources to complete security detection. In order to save resources, this paper proposes a noiseless counterfactual quantum private query protocol with high efficiency. This protocol improves the counterfactual quantum key distribution protocol proposed by Rao and Srikanth (Phys Rev A 104:022424, 2021. https://doi.org/10.1103/PhysRevA.104.022424). The communicating parties randomly select quantum bits with probability <i>f</i> to perform flipping to complete the quantum private query. The detector at the sending end receives the counterfactual bit, which we use for security detection; the detector at the receiving end is called a non-counterfactual bit, which is combined with random bit flipping to realize key transmission, followed by traditional post-processing and private query. Finally, when <span>(f=0.5)</span>, the response probability (keys rate) of the non-counterfactual detector at the receiving end can reach a minimum value of 0.5.</p></div>","PeriodicalId":746,"journal":{"name":"Quantum Information Processing","volume":"23 10","pages":""},"PeriodicalIF":2.2,"publicationDate":"2024-10-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"142447411","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":3,"RegionCategory":"物理与天体物理","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}