ﻻ يوجد ملخص باللغة العربية
The quantum clock synchronization (QCS) is to measure the time difference among the spatially separated clocks with the principle of quantum mechanics. The first QCS algorithm proposed by Chuang and Jozsa is merely based on two parties, which is further extended and generalized to the multiparty situation by Krco and Paul. They present a multiparty QCS protocol based upon W states that utilizes shared prior entanglement and broadcast of classical information to synchronize spatially separated clocks. Shortly afterwards, Ben-Av and Exman came up with an optimized multiparty QCS using Z state. In this work, we firstly report an implementation of Krco and Ben-AV multiparty QCS algorithm using a four-qubit Nuclear Magnetic Resonance (NMR). The experimental results show a great agreement with the theory and also prove Ben-AV multiparty QCS algorithm more accurate than Krco.
Event synchronisation is a ubiquitous task, with applications ranging from 5G technology to industrial automation and smart power grids. The emergence of quantum communication networks will further increase the demands for synchronisation in optical
High-precision nonlocal temporal correlation identification in the entangled photon pairs is critical to measure the time offset between remote independent time scales for many quantum information applications. The first nonlocal correlation identifi
Sensitive signal detection and processing in classical world, especially in quantum regime, require nonreciprocal manipulation. In this paper we show how to achieve nonreciprocal quantum synchronization for two magnon modes in a two-sublattice antife
The two-way quantum clock synchronization has been shown not only providing femtosecond-level synchronization capability but also secure against symmetric delay attacks, thus becomes a prospective method to compare and synchronize distant clocks with
Digital signatures are widely used for providing security of communications. At the same time, the security of currently deployed digital signature protocols is based on unproven computational assumptions. An efficient way to ensure an unconditional