quantum protocol
Recently Published Documents


TOTAL DOCUMENTS

68
(FIVE YEARS 35)

H-INDEX

12
(FIVE YEARS 3)

2021 ◽  
Author(s):  
Hanteng Wang ◽  
Hsiu-Chung Yeh ◽  
Alex Kamenev

Abstract We suggest an iterative quantum protocol, allowing to solve optimization problems with a glassy energy landscape. It is based on a periodic cycling around the tricritical point of the many-body localization transition. This ensures that each iteration leads to a non-exponentially small probability to find a lower local energy minimum. The other key ingredient is to tailor the cycle parameters to a currently achieved optimal state (the "reference" state) and to reset them once a deeper minimum is found. We show that, if the position of the tricritical point is known, the algorithm allows to approach the absolute minimum with any given precision in a polynomial time.


2021 ◽  
Vol 11 (1) ◽  
Author(s):  
Kartick Sutradhar ◽  
Hari Om

AbstractThe quantum secret sharing is an essential and fundamental technique for sharing a secret with the all participants in quantum cryptography. It can be used to design many complex protocols such as secure multiparty summation, multiplication, sorting, voting, etc. Recently, Song et al. have discussed a quantum protocol for secret sharing, which has (t, n) threshold approach and modulo d, where t and n denote the threshold number of participants and total number of participants, respectively. Kao et al. point out that the secret in the Song et al.’s protocol cannot be reconstructed without other participants’ information. In this paper, we discuss a protocol that overcomes this problem.


Author(s):  
Davood Dadkhah ◽  
Mariam Zomorodi ◽  
Seyed Ebrahim Hosseini

AbstractIn the present work, a novel approach was proposed to optimize the teleportation cost in Distributed Quantum Circuits (DQCs) by applying a new approach. To overcome the difficulty with keeping a large number of qubits next to each other, DQCs, as a well-known solution, have always been employed. In a distributed quantum system, qubits are transferred from a subsystem to another subsystem by a quantum protocol such as teleportation. First, we proposed a heuristic approach through which we could replace the equivalent circuits in the initial quantum circuit. Then, we used a genetic algorithm to partition the placement of qubits so that the number of teleportations could be optimized for the communications of a DQC. Finally, results showed that the proposed approach could impressively work.


Author(s):  
Dengke Qu ◽  
Orsolya Kalman ◽  
Gaoyan Zhu ◽  
Lei Xiao ◽  
Kunkun Wang ◽  
...  
Keyword(s):  

Entropy ◽  
2021 ◽  
Vol 23 (5) ◽  
pp. 509
Author(s):  
Anton Pljonkin ◽  
Dmitry Petrov ◽  
Lilia Sabantina ◽  
Kamila Dakhkilgova

The article is focused on research of an attack on the quantum key distribution system and proposes a countermeasure method. Particularly noteworthy is that this is not a classic attack on a quantum protocol. We describe an attack on the process of calibration. Results of the research show that quantum key distribution systems have vulnerabilities not only in the protocols, but also in other vital system components. The described type of attack does not affect the cryptographic strength of the received keys and does not point to the vulnerability of the quantum key distribution protocol. We also propose a method for autocompensating optical communication system development, which protects synchronization from unauthorized access. The proposed method is based on the use of sync pulses attenuated to a photon level in the process of detecting a time interval with a signal. The paper presents the results of experimental studies that show the discrepancies between the theoretical and real parameters of the system. The obtained data allow the length of the quantum channel to be calculated with high accuracy.


Sign in / Sign up

Export Citation Format

Share Document