specific quantum
Recently Published Documents


TOTAL DOCUMENTS

66
(FIVE YEARS 24)

H-INDEX

15
(FIVE YEARS 3)

Author(s):  
Wen-Qiang Liu ◽  
Xin-Jie Zhou ◽  
Hai-Rui Wei

Abstract Unitary operation is an essential step for quantum information processing. We first propose an iterative procedure for decomposing a general unitary operation without resorting to controlled-NOT gate and single-qubit rotation library. Based on the results of decomposition, we design two compact architectures to deterministically implement arbitrary two-qubit polarization-spatial and spatial-polarization collective unitary operations, respectively. The involved linear optical elements are reduced from 25 to 20 and 21 to 20, respectively. Moreover, the parameterized quantum computation can be flexibly manipulated by wave plates and phase shifters. As an application, we construct the specific quantum circuits to realize two-dimensional quantum walk and quantum Fourier transformation. Our schemes are simple and feasible with the current technology.


Entropy ◽  
2021 ◽  
Vol 23 (12) ◽  
pp. 1689
Author(s):  
John R. Klauder

A simple example of classical physics may be defined as classical variables, p and q, and quantum physics may be defined as quantum operators, P and Q. The classical world of p&q, as it is currently understood, is truly disconnected from the quantum world, as it is currently understood. The process of quantization, for which there are several procedures, aims to promote a classical issue into a related quantum issue. In order to retain their physical connection, it becomes critical as to how to promote specific classical variables to associated specific quantum variables. This paper, which also serves as a review paper, leads the reader toward specific, but natural, procedures that promise to ensure that the classical and quantum choices are guaranteed a proper physical connection. Moreover, parallel procedures for fields, and even gravity, that connect classical and quantum physical regimes, will be introduced.


2021 ◽  
Author(s):  
Farouk Kecita ◽  
Abdelhafid Bounames ◽  
Mustapha Maamache

Abstract With the aim to solve the time-dependent Schr ̈odinger equation associated to a time-dependent non-Hermitian Hamiltonian, we introduce a unitary transformation that maps the Hamiltonian to a time-independent PT-symmetric one. Consequently, the solution of time-dependent Schrödinger equation becomes easily deduced and the evolution preserves the C(t)PT -inner product, where C(t) is a obtained from the charge conjugation operator C through a time dependent unitary transformation. Moreover, the expectation value of the non-Hermitian Hamiltonian in the C(t)PT normed states is guaranteed to be real. As an illustration, we present a specific quantum system given by a quantum oscillator with time-dependent mass subjected to a driving linear complex time-dependent potential.


Author(s):  
Ricardo Pérez-Castillo ◽  
Luis Jiménez-Navajas ◽  
Mario Piattini

AbstractQuantum computing is now a reality, and its incomparable computational power has led companies to show a great interest in being able to work with quantum software in order to support part of their current and future business operations. However, the quantum computing paradigm differs significantly from its classical counterparts, which has brought about the need to revolutionise how the future software is designed, built, and operated in order to work with quantum computers. Since companies cannot discard all their current (and probably mission-critical) information systems, they must adapt their classical information systems to new specific quantum applications, thus evolving towards hybrid information systems. Unfortunately, there are no specific methods with which to deal with this challenge. We believe that reengineering, and more specifically, software modernisation using model-driven engineering principles, could be useful as regard migrating classical systems and existing quantum programs towards hybrid information systems. This paper, therefore, presents QRev, a reverse engineering tool that analyses quantum programs developed in Q# in order to identify its components and interrelationships, and then generates abstract models that can be used in software modernisation processes. The platform-independent models are generated according to the Knowledge Discovery Metamodel (KDM) standard. QRev is validated in a case study involving five quantum programs in order to demonstrate its effectiveness and scalability. The main implication of the study is that QRev can be used in order to attain KDM models, which can subsequently be employed to restructure or add new quantum functionality at a higher abstraction level, i.e. independently of the specific quantum technology.


2021 ◽  
Vol 1 (1-2) ◽  
Author(s):  
Moritz C. Dechamps ◽  
Markus A. Maier ◽  
Markus Pflitsch ◽  
Michael Duggan

Quantum mechanics (QM) proposes that a quantum system measurement does not register a pre-existing reality but rather establishes reality from the superposition of potential states. Measurement reduces the quantum state according to a probability function, the Born rule, realizing one of the potential states. Consequently, a classical reality is observed. The strict randomness of the measurement outcome is well-documented (and theoretically predicted) and implies a strict indeterminacy in the physical world’s fundamental constituents. Wolfgang Pauli, with Carl Gustav Jung, extended the QM framework to measurement outcomes that are meaningfully related to human observers, providing a psychophysical theory of quantum state reductions. The Pauli-Jung model (PJM) proposes the existence of observer influences on quantum measurement outcomes rooted in the observer’s unconscious mind. The correlations between quantum state reductions and (un)conscious states of observers derived from the PJM and its mathematical reformulation within the model of pragmatic information (MPI) were empirically tested. In all studies, a subliminal priming paradigm was used to induce a biased likelihood for specific quantum measurement outcomes (i.e., a higher probability of positive picture presentations; Studies 1 and 2) or more pronounced oscillations of the evidence than expected by chance for such an effect (Studies 3 and 4). The replicability of these effects was also tested. Although Study 1 found strong initial evidence for such effects, later replications (Studies 2 to 4) showed no deviations from the Born rule. The results thus align with standard QM, arguing against the incompleteness of standard QM in psychophysical settings like those established in the studies. However, although no positive evidence exists for the PJM and the MPI, the data do not entirely falsify the model’s validity.


2021 ◽  
Vol 12 (1) ◽  
Author(s):  
M. Weilenmann ◽  
E. A. Aguilar ◽  
M. Navascués

AbstractA preparation game is a task whereby a player sequentially sends a number of quantum states to a referee, who probes each of them and announces the measurement result. Many experimental tasks in quantum information, such as entanglement quantification or magic state detection, can be cast as preparation games. In this paper, we introduce general methods to design n-round preparation games, with tight bounds on the performance achievable by players with arbitrarily constrained preparation devices. We illustrate our results by devising new adaptive measurement protocols for entanglement detection and quantification. Surprisingly, we find that the standard procedure in entanglement detection, namely, estimating n times the average value of a given entanglement witness, is in general suboptimal for detecting the entanglement of a specific quantum state. On the contrary, there exist n-round experimental scenarios where detecting the entanglement of a known state optimally requires adaptive measurement schemes.


2021 ◽  
Author(s):  
Mircea-Adrian Digulescu

In a prior paper we introduced a new symmetric key encryption scheme called Short Key Random Encryption Machine (SKREM), for which we claimed excellent security guarantees. In this paper we present and briefly discuss how some other cryptographic applications besides plain text encryption can benefit from the same security guarantees. We task ourselves with and succeed in showing how Secure Coin Flipping, Cryptographic Hashing, Zero-Leaked-Knowledge Authentication and Authorization and a Digital Signature scheme which can be employed on a block-chain, can all be achieved using SKREM-like ciphers, benefiting from their security guarantees. We also briefly recap SKREMlike ciphers and the core traits which make them so secure. The realizations of the above applications are novel because they do not involve public key cryptography. Furthermore, the security of SKREMlike ciphers is not based on hardness of some algebraic operations, thus not opening them up to specific quantum computing attacks.


2021 ◽  
Vol 11 (8) ◽  
pp. 3496
Author(s):  
Dmitry A. Kolosov ◽  
Olga E. Glukhova

In this work, using the first-principle density functional theory (DFT) method, we study the properties of a new material based on pillared graphene and the icosahedral clusters of boron B12 as a supercapacitor electrode material. The new composite material demonstrates a high specific quantum capacitance, specific charge density, and a negative value of heat of formation, which indicates its efficiency. It is shown that the density of electronic states increases during the addition of clusters, which predictably leads to an increase in the electrode conductivity. We predict that the use of a composite based on pillared graphene and boron will increase the efficiency of existing supercapacitors.


2021 ◽  
Vol 2 (1) ◽  
pp. 1-33
Author(s):  
Myrto Arapinis ◽  
Nikolaos Lamprou ◽  
Elham Kashefi ◽  
Anna Pappa

Recent advances indicate that quantum computers will soon be reality. Motivated by this ever more realistic threat for existing classical cryptographic protocols, researchers have developed several schemes to resist “quantum attacks.” In particular, for electronic voting (e-voting), several schemes relying on properties of quantum mechanics have been proposed. However, each of these proposals comes with a different and often not well-articulated corruption model, has different objectives, and is accompanied by security claims that are never formalized and are at best justified only against specific attacks. To address this, we propose the first formal security definitions for quantum e-voting protocols. With these at hand, we systematize and evaluate the security of previously proposed quantum e-voting protocols; we examine the claims of these works concerning privacy, correctness, and verifiability, and if they are correctly attributed to the proposed protocols. In all non-trivial cases, we identify specific quantum attacks that violate these properties. We argue that the cause of these failures lies in the absence of formal security models and references to the existing cryptographic literature.


Sign in / Sign up

Export Citation Format

Share Document