Quantum Computing and Quantum Communication with Electrons

Author(s):  
Daniel Loss
2021 ◽  
Vol 7 (1) ◽  
Author(s):  
Dong-Gil Im ◽  
Chung-Hyun Lee ◽  
Yosep Kim ◽  
Hyunchul Nha ◽  
M. S. Kim ◽  
...  

AbstractQuantum teleportation exemplifies how the transmission of quantum information starkly differs from that of classical information and serves as a key protocol for quantum communication and quantum computing. While an ideal teleportation protocol requires noiseless quantum channels to share a pure maximally entangled state, the reality is that shared entanglement is often severely degraded due to various decoherence mechanisms. Although the quantum noise induced by the decoherence is indeed a major obstacle to realizing a near-term quantum network or processor with a limited number of qubits, the methodologies considered thus far to address this issue are resource-intensive. Here, we demonstrate a protocol that allows optimal quantum teleportation via noisy quantum channels without additional qubit resources. By analyzing teleportation in the framework of generalized quantum measurement, we optimize the teleportation protocol for noisy quantum channels. In particular, we experimentally demonstrate that our protocol enables to teleport an unknown qubit even via a single copy of an entangled state under strong decoherence that would otherwise preclude any quantum operation. Our work provides a useful methodology for practically coping with decoherence with a limited number of qubits and paves the way for realizing noisy intermediate-scale quantum computing and quantum communication.


2002 ◽  
Vol 2 (1) ◽  
pp. 1-13
Author(s):  
S.J. van Enk ◽  
H.J. Kimble

Control fields in quantum information processing are almost by definition assumed to be classical. In reality, however, when such a field is used to manipulate the quantum state of qubits, the qubits always become slightly entangled with the field. For quantum information processing this is an undesirable property, as it precludes perfect quantum computing and quantum communication. Here we consider the interaction of atomic qubits with laser fields and quantify atom-field entanglement in various cases of interest. We find that the entanglement decreases with the average number of photons \bar{n} in a laser beam as $E\propto\log_2 \bar{n}/\bar{n}$ for $\bar{n}\rightarrow\infty$.


2021 ◽  
Author(s):  
Mario Mastriani

Abstract This study demonstrates entanglement can be exclusively constituted by quantum Fourier transform (QFT) blocks. A bridge between entanglement and QFT will allow incorporating a spectral analysis to the already traditional temporal approach of entanglement, which will result in the development of new more performant, and fault-tolerant protocols to be used in quantum computing as well as quantum communication, with particular emphasis in the future quantum Internet.


2016 ◽  
pp. 61-86
Author(s):  
Vedran Dunjko ◽  
Theodoros Kapourniotis ◽  
Elham Kashefi

We present a family of quantumly-enhanced protocols to achieve unconditionally secure delegated classical computation where the client and the server have both their classical and quantum computing capacity limited. We prove the same task cannot be achieved using only classical protocols. This extends the work of Anders and Browne on the computational power of correlations to a security setting. In doing so we are able to highlight the power of online quantum communication as we prove the same task could not be achieved using pre-shared (offline) quantum correlations.


Queue ◽  
2021 ◽  
Vol 19 (2) ◽  
pp. 65-92
Author(s):  
Atefeh Mashatan ◽  
Douglas Heintzman

There is a new technology on the horizon that will forever change the information security and privacy industry landscape. Quantum computing, together with quantum communication, will have many beneficial applications but will also be capable of breaking many of today's most popular cryptographic techniques that help ensure data protection?in particular, confidentiality and integrity of sensitive information. These techniques are ubiquitously embedded in today's digital fabric and implemented by many industries such as finance, health care, utilities, and the broader information communication technology (ICT) community. It is therefore imperative for ICT executives to prepare for the transition from quantum-vulnerable to quantum-resistant technologies.


Sign in / Sign up

Export Citation Format

Share Document