2019
DOI: 10.3390/e22010026
|View full text |Cite
|
Sign up to set email alerts
|

Continuous Variables Graph States Shaped as Complex Networks: Optimization and Manipulation

Abstract: Complex networks structures have been extensively used for describing complex natural and technological systems, like the Internet or social networks. More recently, complex network theory has been applied to quantum systems, where complex network topologies may emerge in multiparty quantum states and quantum algorithms have been studied in complex graph structures. In this work, we study multimode Continuous Variables entangled states, named cluster states, where the entanglement structure is arranged in typi… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
4
3

Relationship

2
5

Authors

Journals

citations
Cited by 7 publications
(9 citation statements)
references
References 38 publications
0
9
0
Order By: Relevance
“…The next phase of the research deals with identifying attack points and hardening the network to avoid vulnerability. The attack graph hardening techniques prescribed in the study (Ibrahim et al, 2020), (Sansavini & Parigi, 2020) that makes use of topological analysis gives a new dimension for managing cyber threats at the time of vulnerabilities. Thus, topological analysis for vulnerabilities became the backbone of the study and proposal.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The next phase of the research deals with identifying attack points and hardening the network to avoid vulnerability. The attack graph hardening techniques prescribed in the study (Ibrahim et al, 2020), (Sansavini & Parigi, 2020) that makes use of topological analysis gives a new dimension for managing cyber threats at the time of vulnerabilities. Thus, topological analysis for vulnerabilities became the backbone of the study and proposal.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Here we go beyond such regular structures, motivated by the fact that CV quantum networks in optical setups can be easily reconfigured to arbitrary shapes [23]. We want to indeed replicate in the quantum regime some of the models that mimic real-world complex networks [24,25] in order to test their structural properties under local operations. In the remainder of the Article we refer to the network that describes the pattern A of C Z gates that are applied to create the Gaussian cluster state as the imprinted network.…”
Section: A Clusters: Imprinted Quantum Networkmentioning
confidence: 99%
“…The optical CV networks can be easily reconfigured in arbitrary shape [23]. They thus provide an excellent playground to explore whether mimicking real-world complex network structures [24,25] provides an advantage for quantum information technologies, including quantum simulation and communication [23,26] in a future quantum internet. Moreover, and this is a central point of our work, network theory gives us powerful tools for benchmarking these networks when affected by non-Gaussian operations.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Introduction.-Distributed quantum architecture has been recently proposed for various quantum enhanced applications, e.g., quantum metrology, quantum communication and quantum computation [1][2][3][4]. These quantum enhancements usually require efficiently generating and distributing entanglement between different quantum nodes in a network through connected quantum channels [5].…”
mentioning
confidence: 99%