2017
DOI: 10.1103/physreva.96.062302
|View full text |Cite
|
Sign up to set email alerts
|

Gate-error analysis in simulations of quantum computers with transmon qubits

Abstract: In the model of gate-based quantum computation, the qubits are controlled by a sequence of quantum gates. In superconducting qubit systems, these gates can be implemented by voltage pulses. The success of implementing a particular gate can be expressed by various metrics such as the average gate fidelity, the diamond distance, and the unitarity. We analyze these metrics of gate pulses for a system of two superconducting transmon qubits coupled by a resonator, a system inspired by the architecture of the IBM Qu… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

3
64
1

Year Published

2018
2018
2024
2024

Publication Types

Select...
8
1

Relationship

1
8

Authors

Journals

citations
Cited by 49 publications
(68 citation statements)
references
References 54 publications
3
64
1
Order By: Relevance
“…This is definitely different from the errors caused by the resonators in the considered gate-based model in Ref. [2].…”
Section: B Comparison To the Two-level Systemmentioning
confidence: 64%
See 1 more Smart Citation
“…This is definitely different from the errors caused by the resonators in the considered gate-based model in Ref. [2].…”
Section: B Comparison To the Two-level Systemmentioning
confidence: 64%
“…The set {S k } of variables that minimize Eq. (2) give the solution of the QUBO. Quantum annealing can, at least in principle, find (one of) the ground state(s) of the Ising-spin Hamiltonian Eq.…”
Section: Theoretical Backgroundmentioning
confidence: 99%
“…Compared with quantum process tomography [18,19], RB is resource-efficient, and robust against state preparation and measurement errors. Simple to implement, RB has been used in a large variety of experiments, from benchmarking gate performances [4,8,[20][21][22][23][24][25][26][27][28][29][30][31][32][33][34][35][36][37][38][39] to creative uses like partial tomography and quantum control [40][41][42][43][44][45].…”
Section: Huimentioning
confidence: 99%
“…For remote users, it may undermine the assumption of trusted operations -preparation, memory or measurement -that quantum verification [12] or quantum key distribution protocols [13] rely on to guarantee their security. Leakage has been studied in some detail in specific quantum computing platforms [14][15][16][17][18]. General frameworks have been developed, but rely on certain assumptions.…”
Section: Introductionmentioning
confidence: 99%