scholarly journals Investigating quantum metrology in noisy channels

2017 ◽  
Vol 7 (1) ◽  
Author(s):  
B. J. Falaye ◽  
A. G. Adepoju ◽  
A. S. Aliyu ◽  
M. M. Melchor ◽  
M. S. Liman ◽  
...  
Author(s):  
Volkan Erol

Quantum Fisher Information (QFI) is a very useful concept for analyzing situations that require phase sensitivity. It become a popular topic especially in Quantum Metrology domain. In this work, we study the changes in quantum Fisher information (QFI) values for one relative arbitrary phased quantum system consisting of a superposition of N Qubits W and GHZ states. In a recent work [7], QFI values of this mentioned system for N qubits were studied. In this work, we extend this problem for the changes of QFI values in some noisy channels for the studied system. We show the changes in QFI depending on noise parameters. We report interesting results for different type of decoherence channels. We show the general case results for this problem.


2020 ◽  
Vol 2020 (4) ◽  
pp. 76-1-76-7
Author(s):  
Swaroop Shankar Prasad ◽  
Ofer Hadar ◽  
Ilia Polian

Image steganography can have legitimate uses, for example, augmenting an image with a watermark for copyright reasons, but can also be utilized for malicious purposes. We investigate the detection of malicious steganography using neural networkbased classification when images are transmitted through a noisy channel. Noise makes detection harder because the classifier must not only detect perturbations in the image but also decide whether they are due to the malicious steganographic modifications or due to natural noise. Our results show that reliable detection is possible even for state-of-the-art steganographic algorithms that insert stego bits not affecting an image’s visual quality. The detection accuracy is high (above 85%) if the payload, or the amount of the steganographic content in an image, exceeds a certain threshold. At the same time, noise critically affects the steganographic information being transmitted, both through desynchronization (destruction of information which bits of the image contain steganographic information) and by flipping these bits themselves. This will force the adversary to use a redundant encoding with a substantial number of error-correction bits for reliable transmission, making detection feasible even for small payloads.


2021 ◽  
Vol 12 (1) ◽  
Author(s):  
Bartosz Regula ◽  
Ryuji Takagi

AbstractQuantum channels underlie the dynamics of quantum systems, but in many practical settings it is the channels themselves that require processing. We establish universal limitations on the processing of both quantum states and channels, expressed in the form of no-go theorems and quantitative bounds for the manipulation of general quantum channel resources under the most general transformation protocols. Focusing on the class of distillation tasks — which can be understood either as the purification of noisy channels into unitary ones, or the extraction of state-based resources from channels — we develop fundamental restrictions on the error incurred in such transformations, and comprehensive lower bounds for the overhead of any distillation protocol. In the asymptotic setting, our results yield broadly applicable bounds for rates of distillation. We demonstrate our results through applications to fault-tolerant quantum computation, where we obtain state-of-the-art lower bounds for the overhead cost of magic state distillation, as well as to quantum communication, where we recover a number of strong converse bounds for quantum channel capacity.


2019 ◽  
Vol 1 (3) ◽  
Author(s):  
Dario Gatto ◽  
Paolo Facchi ◽  
Frank A. Narducci ◽  
Vincenzo Tamma

2021 ◽  
Vol 62 (1) ◽  
pp. 012102
Author(s):  
Le Bin Ho ◽  
Yasushi Kondo
Keyword(s):  

2001 ◽  
Vol 37 (10) ◽  
pp. 662 ◽  
Author(s):  
Wen-Whei Chang ◽  
Heng-Iang Hsu

2014 ◽  
Vol 25 (05) ◽  
pp. 563-584 ◽  
Author(s):  
PARTHA SARATHI MANDAL ◽  
ANIL K. GHOSH

Location verification in wireless sensor networks (WSNs) is quite challenging in the presence of malicious sensor nodes, which are called attackers. These attackers try to break the verification protocol by reporting their incorrect locations during the verification stage. In the literature of WSNs, most of the existing methods of location verification use a set of trusted verifiers, which are vulnerable to attacks by malicious nodes. These existing methods also use some distance estimation techniques, which are not accurate in noisy channels. In this article, we adopt a statistical approach for secure location verification to overcome these limitations. Our proposed method does not rely on any trusted entities and it takes care of the limited precision in distance estimation by using a suitable probability model for the noise. The resulting verification scheme detects and filters out all malicious nodes from the network with a very high probability even when it is in a noisy channel.


2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Johannes Jakob Meyer ◽  
Johannes Borregaard ◽  
Jens Eisert

AbstractWith an ever-expanding ecosystem of noisy and intermediate-scale quantum devices, exploring their possible applications is a rapidly growing field of quantum information science. In this work, we demonstrate that variational quantum algorithms feasible on such devices address a challenge central to the field of quantum metrology: The identification of near-optimal probes and measurement operators for noisy multi-parameter estimation problems. We first introduce a general framework that allows for sequential updates of variational parameters to improve probe states and measurements and is widely applicable to both discrete and continuous-variable settings. We then demonstrate the practical functioning of the approach through numerical simulations, showcasing how tailored probes and measurements improve over standard methods in the noisy regime. Along the way, we prove the validity of a general parameter-shift rule for noisy evolutions, expected to be of general interest in variational quantum algorithms. In our approach, we advocate the mindset of quantum-aided design, exploiting quantum technology to learn close to optimal, experimentally feasible quantum metrology protocols.


Sign in / Sign up

Export Citation Format

Share Document