Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2018
DOI: 10.1007/s11433-017-9181-9
|View full text |Cite|
|
Sign up to set email alerts
|

Efficient universal quantum channel simulation in IBM’s cloud quantum computer

Abstract: The study of quantum channels is the fundamental field and promises wide range of applications, because any physical process can be represented as a quantum channel transforming an initial state into a final state. Inspired by the method performing non-unitary operator by the linear combination of unitary operations, we proposed a quantum algorithm for the simulation of universal single-qubit channel, described by a convex combination of 'quasiextreme' channels corresponding to four Kraus operators, and is sca… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
24
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
9
1

Relationship

0
10

Authors

Journals

citations
Cited by 42 publications
(25 citation statements)
references
References 75 publications
0
24
0
Order By: Relevance
“…When Alice takes an hyper-entangled state measurement on all the decoy photons, obviously only particles with the state | + ps can not be detected. Expand the formula (19) and the probability without eavesdropper is given in (20), as shown at the top of the next page. So the lower bound of the probability that Eve's eavesdropping being detected in TPP is…”
Section: The Tpp Protocol's Security Analysismentioning
confidence: 99%
“…When Alice takes an hyper-entangled state measurement on all the decoy photons, obviously only particles with the state | + ps can not be detected. Expand the formula (19) and the probability without eavesdropper is given in (20), as shown at the top of the next page. So the lower bound of the probability that Eve's eavesdropping being detected in TPP is…”
Section: The Tpp Protocol's Security Analysismentioning
confidence: 99%
“…The actual relevance of an optimized scheme lies in the experimental realization of the scheme. The different kinds of theoretical protocols for quantum communication and computation [32][33][34] have already been verified in the IBM quantum experience. IBM Quantum Experience has been utilized to perform many practical experiments on quantum chips, including quantum simulation, the development of quantum algorithms [35], testing quantum information theory tasks, quantum cryptography, quantum error correction [36], quantum applications [37], and so forth.…”
Section: Introductionmentioning
confidence: 95%
“…There are several techniques for speeding up simulations of certain types of circuits [12][13][14][15][16] or algorithms [17][18][19][20] . High performance computations have been developed for simulations of noisy circuits [21][22][23][24] , as well as lightweight open-source tools such as density-matrix simulators in Qiskit 25 and Cirq 26 . These simulators are based on evolving full density matrices (FDMs), which are prohibitively expensive for large numbers of qubits.…”
Section: Introductionmentioning
confidence: 99%