scholarly journals Coherent modification of entanglement: benefits due to extended Hilbert space

2016 ◽  
Vol 16 (11&12) ◽  
pp. 954-968
Author(s):  
Dmitry Solenov

A quantum computing system is typically represented by a set of non-interacting (local) two-state systems—qubits. Many physical systems can naturally have more accessible states, both local and non-local. We show that the resulting non-local network of states connecting qubits can be efficiently addressed via continuous time quantum random walks, leading to substantial speed-up of multiqubit entanglement manipulations. We discuss a three-qubit Toffoli gate and a system of superconducting qubits as an illustration.

2005 ◽  
Vol 05 (01) ◽  
pp. L73-L83 ◽  
Author(s):  
NORIO INUI ◽  
KOICHIRO KASAHARA ◽  
YOSHINAO KONISHI ◽  
NORIO KONNO

This work deals with both instantaneous uniform mixing property and temporal standard deviation for continuous-time quantum random walks on circles in order to study their fluctuations comparing with discrete-time quantum random walks, and continuous- and discrete-time classical random walks.


2017 ◽  
Vol 17 (5&6) ◽  
pp. 415-455
Author(s):  
Dmitry Solenov

Non-local higher-energy auxiliary states have been successfully used to entangle pairs of qubits in different quantum computing systems. Typically a longer-span non-local state or sequential application of few-qubit entangling gates are needed to produce a non-trivial multiqubit gate. In many cases a single non-local state that span over the entire system is difficult to use due to spectral crowding or impossible to have. At the same time, many multiqubit systems can naturally develop a network of multiple nonlocal higher-energy states that span over few qubits each. We show that continuous time quantum walks can be used to address this problem by involving multiple such states to perform local and entangling operations concurrently on many qubits. This introduces an alternative approach to multiqubit gate compression based on available physical resources. We formulate general requirements for such walks and discuss configurations of non-local auxiliary states that can emerge in quantum computing architectures based on self-assembled quantum dots, defects in diamond, and superconducting qubits, as examples. Specifically, we discuss a scalable multiqubit quantum register constructed as a single chain with nearest-neighbor interactions. We illustrate how quantum walks can be configured to perform single-, two- and three-qubit gates, including Hadamard, Control-NOT, and Toffoli gates. Continuous time quantum walks on graphs involved in these gates are investigated.


2013 ◽  
Vol 10 (7) ◽  
pp. 1653-1661 ◽  
Author(s):  
Kenneth Rudinger ◽  
John King Gamble ◽  
Eric Bach ◽  
Mark Friesen ◽  
Robert Joynt ◽  
...  

2021 ◽  
Vol 11 (12) ◽  
pp. 5458
Author(s):  
Sangjun Kim ◽  
Kyung-Joon Park

A cyber-physical system (CPS) is the integration of a physical system into the real world and control applications in a computing system, interacting through a communications network. Network technology connecting physical systems and computing systems enables the simultaneous control of many physical systems and provides intelligent applications for them. However, enhancing connectivity leads to extended attack vectors in which attackers can trespass on the network and launch cyber-physical attacks, remotely disrupting the CPS. Therefore, extensive studies into cyber-physical security are being conducted in various domains, such as physical, network, and computing systems. Moreover, large-scale and complex CPSs make it difficult to analyze and detect cyber-physical attacks, and thus, machine learning (ML) techniques have recently been adopted for cyber-physical security. In this survey, we provide an extensive review of the threats and ML-based security designs for CPSs. First, we present a CPS structure that classifies the functions of the CPS into three layers: the physical system, the network, and software applications. Then, we discuss the taxonomy of cyber-physical attacks on each layer, and in particular, we analyze attacks based on the dynamics of the physical system. We review existing studies on detecting cyber-physical attacks with various ML techniques from the perspectives of the physical system, the network, and the computing system. Furthermore, we discuss future research directions for ML-based cyber-physical security research in the context of real-time constraints, resiliency, and dataset generation to learn about the possible attacks.


Entropy ◽  
2018 ◽  
Vol 20 (8) ◽  
pp. 586 ◽  
Author(s):  
Xin Wang ◽  
Yi Zhang ◽  
Kai Lu ◽  
Xiaoping Wang ◽  
Kai Liu

The isomorphism problem involves judging whether two graphs are topologically the same and producing structure-preserving isomorphism mapping. It is widely used in various areas. Diverse algorithms have been proposed to solve this problem in polynomial time, with the help of quantum walks. Some of these algorithms, however, fail to find the isomorphism mapping. Moreover, most algorithms have very limited performance on regular graphs which are generally difficult to deal with due to their symmetry. We propose IsoMarking to discover an isomorphism mapping effectively, based on the quantum walk which is sensitive to topological structures. Firstly, IsoMarking marks vertices so that it can reduce the harmful influence of symmetry. Secondly, IsoMarking can ascertain whether the current candidate bijection is consistent with existing bijections and eventually obtains qualified mapping. Thirdly, our experiments on 1585 pairs of graphs demonstrate that our algorithm performs significantly better on both ordinary graphs and regular graphs.


Author(s):  
Mingyou Wu ◽  
Xi Li ◽  
Zhihao Liu ◽  
Hanwu Chen

The continuous-time quantum walk (CTQW) provides a new approach to problems in graph theory. In this paper, the correlation between the CTQW and cliques in graphs is studied, and an approximate algorithm for the maximum clique problem (MCP) based on the CTQW is given. Via both numerical and theoretical analyses, it is found that the maximum clique is related to the transmission characteristics of the CTQW on some special graphs. For general graphs, the correlation is difficult to describe analytically. Therefore, the transmission characteristics of the CTQW are applied as a vertex selection criterion to a classical MCP algorithm and it is compared with the original algorithm. Numerous simulation on general graphs shows that the new algorithm is more efficient. Furthermore, an approximate MCP algorithm based on the CTQW is introduced, which only requires a very small number of searches with a high approximation ratio.


Sign in / Sign up

Export Citation Format

Share Document