- Oct 17 2017 quant-ph arXiv:1710.05867v1With the current rate of progress in quantum computing technologies, 50-qubit systems will soon become a reality. To assess, refine and advance the design and control of these devices, one needs a means to test and evaluate their fidelity. This in turn requires the capability of computing ideal quantum state amplitudes for devices of such sizes and larger. In this study, we present a new approach for this task that significantly extends the boundaries of what can be classically computed. We demonstrate our method by presenting results obtained from a calculation of the complete set of output amplitudes of a universal random circuit with depth 27 in a 2D lattice of $7 \times 7$ qubits. We further present results obtained by calculating an arbitrarily selected slice of $2^{37}$ amplitudes of a universal random circuit with depth 23 in a 2D lattice of $8 \times 7$ qubits. Such calculations were previously thought to be impossible due to impracticable memory requirements. Using the methods presented in this paper, the above simulations required 4.5 and 3.0 TB of memory, respectively, to store calculations, which is well within the limits of existing classical computers.
- Oct 17 2017 quant-ph arXiv:1710.05892v1It is well known that correlations predicted by quantum mechanics cannot be explained by any classical (local-realistic) theory. The relative strength of quantum and classical correlations is usually studied in the context of Bell inequalities, but this tells us little about the geometry of the quantum set of correlations. In other words, we do not have good intuition about what the quantum set actually looks like. In this paper we study the geometry of the quantum set using standard tools from convex geometry. We find explicit examples of rather counter-intuitive features in the simplest non-trivial Bell scenario (two parties, two inputs and two outputs) and illustrate them using 2-dimensional slice plots. We also show that even more complex features appear in Bell scenarios with more inputs or more parties. Finally, we discuss the limitations that the geometry of the quantum set imposes on the task of self-testing.
- The Born rule assigns a probability to any possible outcome of a quantum measurement, but leaves open the question how these probabilities are to be interpreted and, in particular, how they relate to the outcome observed in an actual experiment. We propose to avoid this question by replacing the Born rule with two non-probabilistic postulates: (i) the projector associated to the observed outcome must have a positive overlap with the state of the measured system; (ii) statements about observed outcomes are robust, that is, remain valid under small perturbations of the state. We show that the two postulates suffice to retrieve the interpretations of the Born rule that are commonly used for analysing experimental data.
- Oct 17 2017 quant-ph arXiv:1710.05365v1Quantum processors promise a paradigm shift in high-performance computing which needs to be assessed by accurate benchmarking measures. In this work, we introduce a new benchmark for variational quantum algorithm (VQA), recently proposed as a heuristic algorithm for small-scale quantum processors. In VQA, a classical optimization algorithm guides the quantum dynamics of the processor to yield the best solution for a given problem. A complete assessment of scalability and competitiveness of VQA should take into account both the quality and the time of dynamics optimization. The method of optimal stopping, employed here, provides such an assessment by explicitly including time as a cost factor. Here we showcase this measure for benchmarking VQA as a solver for some quadratic unconstrained binary optimization. Moreover we show that a better choice for the cost function of the classical routine can significantly improve the performance of the VQA algorithm and even improving it's scaling properties.
- Oct 17 2017 quant-ph arXiv:1710.05487v1Satellite-based QKD offers the potential to share highly secure encryption keys between optical ground stations all over the planet. SpooQySats is a programme for establishing the space worthiness of highly-miniaturised, polarization entangled, photon pair sources using CubeSat nanosatellites. The sources are being developed iteratively with an early version in orbit already and improved versions soon to be launched. Once fully developed, the photon pair sources can be deployed on more advanced satellites that are equipped with optical links. These can allow for very secure uplinks and downlinks and can be used to establish a global space-based quantum key distribution network. This would enable highly secure symmetric encryption keys to be shared between optical ground stations all over the planet.
- One of the most important problems in linear optics quantum computing is to find the origin of its computational complexity. We claim in this work that the majorization of photon distributions is a crucial factor that affects the complexity of linear optics. Our analysis concentrates on the boson sampling problem, an exemplary model of linear optics. Prior to the main discussion, a majorization-dependent quantity that can measure the quantum complexity of identical particle distributions is introduced, which we call the Boltzmann entropy of elementary quantum complexity $S_B^q$. It decreases as the majorization of the photon distribution vector increases. Using the properties of majorization and $S_B^q$, we analyze two quantities that are the criteria for the computational complexity, $\mathcal{T}$ (the runtime of a generalized classical algorithm for calculating the permanent) and $\mathcal{E}$ (the additive error bound for an approximated permanent estimator). The runtime $\mathcal{T}$ becomes shorter as the input and output distribution vectors are more majorized, and the error bound $\mathcal{E}$ decreases as the majorization difference of input and output states increases. In addition, $S_B^q$ turns out to be an underlying quantity of $\mathcal{T}$ and $\mathcal{E}$, which implies that $S_B^q$ is an essential resource of the computational complexity of linear optics. We expect our findings would provide a fresh perspective to answer the fundamental questions of quantum supremacy.
- Oct 17 2017 physics.hist-ph quant-ph arXiv:1710.05229v1Speech on the occasion of accepting the Dagmar and Vaclav Havel Foundation VIZE 97 Prize for 2017. Delivered at Prague Crossroads, October 5, 2017
- Oct 17 2017 quant-ph arXiv:1710.05076v1A semi-quantum key distribution (SQKD) protocol allows a quantum user and a limited "classical" user to establish a shared secret key secure against an all-powerful adversary. In this work, we present a new SQKD protocol where the quantum user is also limited in her measurement capabilities. We describe the protocol, prove its security, and show its noise tolerance is as high as "fully quantum" QKD protocols.
- Oct 17 2017 quant-ph physics.app-ph arXiv:1710.05779v1Information about an unknown quantum state can be encoded in weak values of projectors belonging to a complete eigenbasis. We present a protocol that enables one party -- Bob -- to remotely determine the weak values corresponding to weak measurements performed by another spatially separated party -- Alice. The particular set of weak values contains complete information of the quantum state encoded on Alice's ancilla, which enacts the role of the preselected system state in the aforementioned weak measurement. Consequently, Bob can determine the quantum state from these weak values, which can also be termed as remote state determination or remote state tomography. A combination of non-product bipartite resource state shared between the two parties and classical communication between them is necessary to bring this statistical scheme to fruition. Significantly, the information transfer of a pure quantum state of any known dimensions can be effected even with a resource state of low dimensionality and purity with a single measurement setting at Bob's end.
- Oct 17 2017 quant-ph physics.app-ph arXiv:1710.05643v1Non-classical quantum technologies that rely on manipulation of quantum states and exploitation of quantum superposition and entanglement are approaching a level of maturity sufficient to contemplate commercialization as the basis of practical devices for sensing, communications, navigation and other applications in the relatively near-term. However, realization of such technologies is dependent upon the development of appropriate Quantum Systems Engineering (QSE) approaches. It is clear that whilst traditional systems engineering will support much of the integration need, there are aspects associated with system of interest definition, system modelling, and system verification where substantial advances in the systems engineering approach are required. This paper lays out in detail the challenges associated with Quantum Enabled Systems and Technologies (QEST) and analyses the adequacy of systems engineering processes and tools, as defined by the Systems and Software Engineering lifecycle standard (ISO/IEC/IEEE 15288), to meet these challenges. The conclusions of this paper provide an outline agenda for systems research in order to engineer QEST.
- Oct 17 2017 quant-ph arXiv:1710.05511v1The holy grail of quantum key distribution (QKD) theory is a robust, quantitative method to explore novel protocol ideas and to investigate the effects of device imperfections on the key rate. We argue that numerical methods are superior to analytical ones for this purpose. However, new challenges arise with numerical approaches, including the efficiency (i.e., possibly long computation times) and reliability of the calculation. In this work, we present a reliable, efficient, and tight numerical method for calculating key rates for finite-dimensional QKD protocols. We illustrate our approach by finding higher key rates than those previously reported in the literature for several interesting scenarios (e.g., the Trojan-horse attack and the phase-coherent BB84 protocol). Our method will ultimately improve our ability to automate key rate calculations and, hence, to develop a user-friendly software package that could be used widely by QKD researchers.
- Oct 17 2017 quant-ph arXiv:1710.05367v1We study the behaviour of two different measures of the complexity of multipartite correlation patterns, weaving and neural complexity, for symmetric quantum states. Weaving is the weighted sum of genuine multipartite correlations of any order, where the weights are proportional to the correlation order. The neural complexity, originally introduced to characterize correlation patterns in classical neural networks, is here extended to the quantum scenario. We derive close formulas of the two quantities for GHZ states mixed with white noise
- Oct 17 2017 quant-ph arXiv:1710.05196v1It is well known that Grover's algorithm asymptotically transforms an equal superposition state into an eigenstate (of a given basis). Here, we demonstrate a verification algorithm based on weak measurement which can achieve the same purpose even if the qubit is \textitnot in an equal superposition state. The proposed algorithm highlights the \textitdistinguishability between any arbitrary single qubit superposition state and an eigenstate. We apply this algorithm to propose the scheme of a Quantum Locker, a protocol in which any legitimate party can verify his/her authenticity by using a newly developed Quantum One-Time Password (OTP) and retrieve the necessary message from the locker. We formally explicate the working of Quantum Locker in association with the Quantum OTP, which theoretically offers a much higher security against any adversary, as compared to any classical security device.
- The rules of canonical quantization normally offer good results, but sometimes they fail, e.g., leading to quantum triviality ($=$ free) for certain examples that are classically nontrivial ($\ne$ free). A new procedure, called Enhanced Quantization, relates classical models with their quantum partners differently and leads to satisfactory results for all systems. This paper features enhanced quantization procedures and provides highlights of two examples, a rotationally symmetric model and an ultralocal scalar model, for which canonical quantization fails while enhanced quantization succeeds.
- Oct 17 2017 quant-ph arXiv:1710.05825v1
- Oct 17 2017 quant-ph arXiv:1710.05696v1
- Oct 17 2017 quant-ph arXiv:1710.05577v1
- Oct 17 2017 quant-ph arXiv:1710.05573v1
- Oct 17 2017 quant-ph arXiv:1710.05469v1
- Oct 17 2017 physics.atom-ph quant-ph arXiv:1710.05301v1
- Oct 17 2017 quant-ph cond-mat.supr-con arXiv:1710.05249v1
- Oct 17 2017 quant-ph arXiv:1710.05129v1
- Oct 17 2017 quant-ph arXiv:1710.05122v1
- Oct 17 2017 quant-ph physics.optics arXiv:1710.05099v1
- Oct 17 2017 quant-ph arXiv:1710.05084v1
- Oct 17 2017 quant-ph arXiv:1710.05051v1