quantum operation
Recently Published Documents


TOTAL DOCUMENTS

68
(FIVE YEARS 19)

H-INDEX

13
(FIVE YEARS 1)

2021 ◽  
Vol 21 (13&14) ◽  
pp. 1111-1134
Author(s):  
Tomoyuki Morimae

Randomized encoding is a powerful cryptographic primitive with various applications such as secure multiparty computation, verifiable computation, parallel cryptography, and complexity lower bounds. Intuitively, randomized encoding $\hat{f}$ of a function $f$ is another function such that $f(x)$ can be recovered from $\hat{f}(x)$, and nothing except for $f(x)$ is leaked from $\hat{f}(x)$. Its quantum version, quantum randomized encoding, has been introduced recently [Brakerski and Yuen, arXiv:2006.01085]. Intuitively, quantum randomized encoding $\hat{F}$ of a quantum operation $F$ is another quantum operation such that, for any quantum state $\rho$, $F(\rho)$ can be recovered from $\hat{F}(\rho)$, and nothing except for $F(\rho)$ is leaked from $\hat{F}(\rho)$. In this paper, we show three results. First, we show that if quantum randomized encoding of BB84 state generations is possible with an encoding operation $E$, then a two-round verification of quantum computing is possible with a classical verifier who can additionally do the operation $E$. One of the most important goals in the field of the verification of quantum computing is to construct a verification protocol with a verifier as classical as possible. This result therefore demonstrates a potential application of quantum randomized encoding to the verification of quantum computing: if we can find a good quantum randomized encoding (in terms of the encoding complexity), then we can construct a good verification protocol of quantum computing. Our second result is, however, to show that too good quantum randomized encoding is impossible: if quantum randomized encoding for the generation of even simple states (such as BB84 states) is possible with a classical encoding operation, then the no-cloning is violated. Finally, we consider a natural modification of blind quantum computing protocols in such a way that the server gets the output like quantum randomized encoding. We show that the modified protocol is not secure.


2021 ◽  
Vol 127 (9) ◽  
Author(s):  
W. Cai ◽  
J. Han ◽  
L. Hu ◽  
Y. Ma ◽  
X. Mu ◽  
...  

2021 ◽  
Author(s):  
Minseong Kim

This paper proposes that the measurement problem can be resolved by utilizing a fixed point state and a wormhole. A wormhole additionally connects timelike-separated parts A and B of spacetime. In order to be consistent in usual sense, states on A and B should not change when evolved over the wormhole. This imposes a fixed point state on A and B, when state evolution from B to A via a wormhole and from A to B via usual spacetime are considered together as a single quantum operation. When this type of wormholes does not exist between A and B, state collapse is allowed, revealing one measurement outcome out of a superposition of outcomes. This resolution of the measurement problem upholds linearity of quantum mechanics.


2021 ◽  
Vol 18 (5) ◽  
pp. 055202
Author(s):  
Zhanjun Zhang ◽  
Lei Zhang ◽  
Bin Zhuge ◽  
Biaoliang Ye

2021 ◽  
pp. 2150034
Author(s):  
Zhanjun Zhang

A three-party scheme for sharing an arbitrary single-qubit operation on a distant target qubit is proposed by first utilizing a six-qubit genuinely entangled state presented by [Borras et al., J. Phys. A 40, 13407 (2007)]. The security of the scheme is simply analyzed and ensured. The essential role which the state in the given qubit distribution plays in the QOS task is revealed. The important features including the sharing determinacy and the sharer symmetry are identified. Moreover, the experimental implementation feasibility of the scheme is discussed and confirmed.


2020 ◽  
Vol 50 (12) ◽  
pp. 1921-1933
Author(s):  
Giacomo Mauro D’Ariano

AbstractIt is almost universally believed that in quantum theory the two following statements hold: (1) all transformations are achieved by a unitary interaction followed by a von-Neumann measurement; (2) all mixed states are marginals of pure entangled states. I name this doctrine the dogma of purification ontology. The source of the dogma is the original von Neumann axiomatisation of the theory, which largely relies on the Schrődinger equation as a postulate, which holds in a nonrelativistic context, and whose operator version holds only in free quantum field theory, but no longer in the interacting theory. In the present paper I prove that both ontologies of unitarity and state-purity are unfalsifiable, even in principle, and therefore axiomatically spurious. I propose instead a minimal four-postulate axiomatisation: (1) associate a Hilbert space $${\mathcal {H}}_\text{A}$$ H A to each system$$\text{A}$$ A ; (2) compose two systems by the tensor product rule $${\mathcal {H}}_{\text{A}\text{B}}={\mathcal {H}}_\text{A}\otimes {\mathcal {H}}_\text{B}$$ H AB = H A ⊗ H B ; (3) associate a transformation from system $$\text{A}$$ A to $$\text{B}$$ B to a quantum operation, i.e. to a completely positive trace-non-increasing map between the trace-class operators of $$\text{A}$$ A and $$\text{B}$$ B ; (4) (Born rule) evaluate all joint probabilities through that of a special type of quantum operation: the state preparation. I then conclude that quantum paradoxes—such as the Schroedinger-cat’s, and, most relevantly, the information paradox—are originated only by the dogma of purification ontology, and they are no longer paradoxes of the theory in the minimal formulation. For the same reason, most interpretations of the theory (e.g. many-world, relational, Darwinism, transactional, von Neumann–Wigner, time-symmetric,...) interpret the same dogma, not the strict theory stripped of the spurious postulates.


2020 ◽  
Vol 10 (1) ◽  
Author(s):  
Jhih-Yuan Kao ◽  
Chung-Hsien Chou

Abstract Quantum operations are the fundamental transformations on quantum states. In this work, we study the relation between entangling capacities of operations, geometry of operations, and positive partial transpose (PPT) states, which are an important class of states in quantum information. We show a method to calculate bounds for entangling capacity, the amount of entanglement that can be produced by a quantum operation, in terms of negativity, a measure of entanglement. The bounds of entangling capacity are found to be associated with how non-PPT (PPT preserving) an operation is. A length that quantifies both entangling capacity/entanglement and PPT-ness of an operation or state can be defined, establishing a geometry characterized by PPT-ness. The distance derived from the length bounds the relative entangling capability, endowing the geometry with more physical significance. We also demonstrate the equivalence of PPT-ness and separability for unitary operations.


2020 ◽  
pp. 2150024
Author(s):  
Zhanjun Zhang ◽  
Hang Xing ◽  
Biaoliang Ye ◽  
Chuanmei Xie

A four-party single-qubit operation sharing scheme is put forward by utilizing the Bell and Yeo–Chua product state in an entanglement structure as the composite quantum channel. Four features of the scheme are discussed and confirmed, including its determinacy, symmetry, and security as well as the scheme experimental feasibility. Moreover, some concrete comparisons between our present scheme and a previous scheme [H. Xing et al., Quantum Inf. Process. 13 (2014) 1553] are made from the aspects of quantum and classical resource consumption, necessary operation complexity, and intrinsic efficiency. It is found that our present scheme is more superior than that one. In addition, the essential reason why the employed state in the entanglement structure is applicable for sharing an arbitrary single-qubit operation among four parties is revealed via deep analyses. With respect to the essential reason, the capacity of the product state in quantum operation sharing (QOS) is consequently shown by simple presenting the corresponding schemes with the state in other entanglement structures.


Sign in / Sign up

Export Citation Format

Share Document