ترغب بنشر مسار تعليمي؟ اضغط هنا

Realization of the Werner-Holevo and Landau-Streater quantum channels for qutrits on quantum computers

276   0   0.0 ( 0 )
 نشر من قبل Aleksey Pakhomchik
 تاريخ النشر 2019
  مجال البحث فيزياء
والبحث باللغة English




اسأل ChatGPT حول البحث

We realize Landau-Streater (LS) and Werner-Holevo (WH) quantum channels for qutrits on the IBM quantum computers. These channels correspond to interaction between the qutrit and its environment that result in the globally unitarily covariant qutrit transformation violating multiplicativity of the maximal $p$-norm. Our realization of LS and WH channels is based on embedding qutrit states into states of two qubits and using single-qubit and two-qubit CNOT gates to implement the specific interaction. We employ the standard quantum gates hence the developed algorithm suits any quantum computer. We run our algorithm on a 5-qubit and a 20-qubit computer as well as on a simulator. We quantify the quality of the implemented channels comparing their action on different input states with theoretical predictions. The overall efficiency is quantified by fidelity between the theoretical and experimental Choi states implemented on the 20-qubit computer.



قيم البحث

اقرأ أيضاً

Werner states have a host of interesting properties, which often serve to illuminate the unusual properties of quantum information. Starting from these states, one may define a family of quantum channels, known as the Holevo-Werner channels, which th emselves afford several unusual properties. In this paper we use the teleportation covariance of these channels to upper bound their two-way assisted quantum and secret-key capacities. This bound may be expressed in terms of relative entropy distances, such as the relative entropy of entanglement, and also in terms of the squashed entanglement. Most interestingly, we show that the relative entropy bounds are strictly sub-additive for a sub-class of the Holevo-Werner channels, so that their regularisation provides a tighter performance. These information-theoretic results are first found for point-to-point communication and then extended to repeater chains and quantum networks, under different types of routing strategies.
We propose and discuss a specific scheme allowing to realize a Quantum Cryptography qutrit protocol. This protocol exploits the polarization properties of single frequency and single spatial mode biphotons.
We employed an electrically-driven polarization controller to implement anisotropic depolarizing quantum channels for the polarization state of single photons. The channels were characterized by means of ancilla-assisted quantum process tomography us ing polarization-entangled photons generated in the process of spontaneous parametric down-conversion. The demonstrated depolarization method offers good repeatability, low cost, and compatibility with fiber-optic setups. It does not perturb the modal structure of single photons, and therefore can be used to verify experimentally protocols for managing decoherence effects based on multiphoton interference.
142 - A. Fahmi , M. Golshani 2008
In a Letter, Cabello proposed a quantum key distribution (QKD) Protocol which attended to Holevo limit. In this comment, we show that Eve could use a simple plan to distinguish among quantum keys, without being detected by Alice and Bob. In following , we show that our approach is not restricted to Cabello Protocol. With attention to our Eavesdropping approach, it seems that Mors arguments for no-cloning principal for orthogonal states is not general enough to avoid eavesdropping.
A general protocol in Quantum Information and Communication relies in the ability of producing, transmitting and reconstructing, in general, qunits. In this letter we show for the first time the experimental implementation of these three basic steps on a pure state in a three dimensional space, by means of the orbital angular momentum of the photons. The reconstruction of the qutrit is performed with tomographic techniques and a Maximum-Likelihood estimation method. In this way we also demonstrate that we can perform any transformation in the three dimensional space.
التعليقات
جاري جلب التعليقات جاري جلب التعليقات
سجل دخول لتتمكن من متابعة معايير البحث التي قمت باختيارها
mircosoft-partner

هل ترغب بارسال اشعارات عن اخر التحديثات في شمرا-اكاديميا