Neural networks are becoming ubiquitous in various areas of physics as a successful machine learning(ML)technique for addressing different tasks.Based on ML technique,we propose and experimentally demonstrate an effic...Neural networks are becoming ubiquitous in various areas of physics as a successful machine learning(ML)technique for addressing different tasks.Based on ML technique,we propose and experimentally demonstrate an efficient method for state reconstruction of the widely used Sagnac polarization-entangled photon source.By properly modeling the target states,a multi-output fully connected neural network is well trained using only six of the sixteen measurement bases in standard tomography technique,and hence our method reduces the resource consumption without loss of accuracy.We demonstrate the ability of the neural network to predict state parameters with a high precision by using both simulated and experimental data.Explicitly,the mean absolute error for all the parameters is below 0.05 for the simulated data and a mean fidelity of 0.99 is achieved for experimentally generated states.Our method could be generalized to estimate other kinds of states,as well as other quantum information tasks.展开更多
In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional produc...In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.展开更多
This work shows that despite a lattice mismatch of almost 20%, CdMnTe/CdTe/CdMnTe heterostructures grown directly on Si(111) have surprisingly good optical emission properties. The investigated structures were grown b...This work shows that despite a lattice mismatch of almost 20%, CdMnTe/CdTe/CdMnTe heterostructures grown directly on Si(111) have surprisingly good optical emission properties. The investigated structures were grown by molecular beam epitaxy and characterized by scanning transmission electron microscopy, macro-and micro-photoluminescence. Low temperature macro-photoluminescence experiments indicate three emission bands which depend on the CdTe layer thickness and have different confinement characteristics. Temperature measurements reveal that the lower energy emission band (at 1.48 eV)is associated to defects and bound exciton states, while the main emission at 1.61 eV has a weak 2D character and the higher energy one at 1.71 eV has a well-defined (zero-dimensional, 0D) 0D nature. Micro-photoluminescence measurements show the existence of sharp and strongly circularly polarized (up to 40%) emission lines which can be related to the presence of Mn in the heterostructure. This result opens the possibility of producing photon sources with the typical spin control of the diluted magnetic semiconductors using the low-cost silicon technology.展开更多
In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and ot...In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and other relevant factors in practical situations, this article proposes a non-entangled quantum blind signature scheme based on dense encoding. The information owner utilizes dense encoding and hash functions to blind the information while reducing the use of quantum resources. After receiving particles, the signer encrypts the message using a one-way function and performs a Hadamard gate operation on the selected single photon to generate the signature. Then the verifier performs a Hadamard gate inverse operation on the signature and combines it with the encoding rules to restore the message and complete the verification.Compared with some typical quantum blind signature protocols, this protocol has strong blindness in privacy protection,and higher flexibility in scalability and application. The signer can adjust the signature operation according to the actual situation, which greatly simplifies the complexity of the signature. By simultaneously utilizing the secondary distribution and rearrangement of non-entangled quantum states, a non-entangled quantum state representation of three bits of classical information is achieved, reducing the use of a large amount of quantum resources and lowering implementation costs. This improves both signature verification efficiency and communication efficiency while, at the same time, this scheme meets the requirements of unforgeability, non-repudiation, and prevention of information leakage.展开更多
The REAgSb_(2)(RE = rare earth and Y) family has drawn considerable research interest because the two-dimensional Sb net in their crystal structures hosts topological fermions and hence rich topological properties. We...The REAgSb_(2)(RE = rare earth and Y) family has drawn considerable research interest because the two-dimensional Sb net in their crystal structures hosts topological fermions and hence rich topological properties. We report herein the magnetization and magnetotransport measurements of SmAgSb_(2) single crystal, which unveil very large magnetoresistance and high carrier mobility up to 6.2 × 10^(3)% and 5.58 × 10^(3)cm^(2)·V^(-1)·s^(-1), respectively. The analysis of both Shubnikov–de Haas and de Haas–van Alphen quantum oscillations indicates nontrivial Berry phases in the paramagnetic state while trivial Berry curvature in the antiferromagnetic state, indicating a topological phase transition induced by the antiferromagnetic order. It is also supported by the first-principles calculations. The results not only provide a new interesting topological material but also offer valuable insights into the correlation between magnetism and nontrivial topological states.展开更多
The hierarchy of bulk actions is developed which are associated with Chern-Simons theories. The connection between the bulk and edge arising from the requirement there is a cancelation of an anomaly which arises in th...The hierarchy of bulk actions is developed which are associated with Chern-Simons theories. The connection between the bulk and edge arising from the requirement there is a cancelation of an anomaly which arises in the theory. A duality transformation is studied for the Chern-Simons example. The idea that is used has been employed to describe duality in a scalar theory. The link between the edge theory with the Chern-Simons theory in the bulk then suggests that similar transformations can be implemented in the bulk Chern-Simons theory as well.展开更多
Four intelligent optimization algorithms are compared by searching for control pulses to achieve the preparation of target quantum states for closed and open quantum systems, which include differential evolution(DE), ...Four intelligent optimization algorithms are compared by searching for control pulses to achieve the preparation of target quantum states for closed and open quantum systems, which include differential evolution(DE), particle swarm optimization(PSO), quantum-behaved particle swarm optimization(QPSO), and quantum evolutionary algorithm(QEA).We compare their control performance and point out their differences. By sampling and learning for uncertain quantum systems, the robustness of control pulses found by these four algorithms is also demonstrated and compared. The resulting research shows that the QPSO nearly outperforms the other three algorithms for all the performance criteria considered.This conclusion provides an important reference for solving complex quantum control problems by optimization algorithms and makes the QPSO be a powerful optimization tool.展开更多
A scheme is proposed to investigate the non-classical states generated by a quantum scissors device(QSD) operating on the the cavity mode of an optomechanical system. When the catalytic QSD acts on the cavity mode of ...A scheme is proposed to investigate the non-classical states generated by a quantum scissors device(QSD) operating on the the cavity mode of an optomechanical system. When the catalytic QSD acts on the cavity mode of the optomechanical system, the resulting state contains only the vacuum, single-photon and two-photon states depending upon the coupling parameter of the optomechanical system as well as the transmission coefficients of beam splitters(BSs). Especially, the output state is just a class of multicomponent cat state truncations at time t = 2π by choosing the appropriate value of coupling parameter. We discuss the success probability of such a state and the fidelity between the output state and input state via QSD. Then the linear entropy is used to investigate the entanglement between the two subsystems, finding that QSD operation can enhance their entanglement degree. Furthermore, we also derive the analytical expression of the Wigner function(WF) for the cavity mode via QSD and numerically analyze the WF distribution in phase space at time t =2π. These results show that the high non-classicality of output state can always be achieved by modulating the coupling parameter of the optomechanical system as well as the transmittance of BSs.展开更多
Efficient acquiring information from a quantum state is important for research in fundamental quantum physics and quantum information applications. Instead of using standard quantum state tomography method with recons...Efficient acquiring information from a quantum state is important for research in fundamental quantum physics and quantum information applications. Instead of using standard quantum state tomography method with reconstruction algorithm, weak values were proposed to directly measure density matrix elements of quantum state. Recently, similar to the concept of weak value, modular values were introduced to extend the direct measurement scheme to nonlocal quantum wavefunction. However, this method still involves approximations, which leads to inherent low precision. Here, we propose a new scheme which enables direct measurement for ideal value of the nonlocal density matrix element without taking approximations. Our scheme allows more accurate characterization of nonlocal quantum states, and therefore has greater advantages in practical measurement scenarios.展开更多
Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle...Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle sequence to encode his/her voting content.The voters have multiple ballot items to choose rather than just binary options“yes”or“no”.After counting votes phase,any participant who is interested in voting results can obtain the voting results.To improve the efficiency of the traveling quantum anonymous voting scheme,an optimization method based on grouping strategy is also presented.Compared with the most existing traveling quantum voting schemes,the proposed scheme is more practical because of its privacy,verifiability and non-repeatability.Furthermore,the security analysis shows that the proposed traveling quantum anonymous voting scheme can prevent various attacks and ensure high security.展开更多
Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections...Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.展开更多
Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant...Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant system performance to deteriorate when data size is below 1010.In this work,an improved statistical fluctuation analysis method is applied for the first time to two decoy-states phase-matching quantum key distribution,offering a new insight and potential solutions for improving the key generation rate and the maximum transmission distance while maintaining security.Moreover,we also compare the influence of the proposed improved statistical fluctuation analysis method on system performance with those of the Gaussian approximation and Chernoff-Hoeffding boundary methods on system performance.The simulation results show that the proposed scheme significantly improves the key generation rate and maximum transmission distance in comparison with the Chernoff-Hoeffding approach,and approach the results obtained when the Gaussian approximation is employed.At the same time,the proposed scheme retains the same security level as the Chernoff-Hoeffding method,and is even more secure than the Gaussian approximation.展开更多
Counterdiabatic driving (CD) offers a fast and robust route to manipulate quantum systems, which has widespreadapplications in quantum technologies. However, for higher-dimensional complex systems, the exact CD term i...Counterdiabatic driving (CD) offers a fast and robust route to manipulate quantum systems, which has widespreadapplications in quantum technologies. However, for higher-dimensional complex systems, the exact CD term involving thespectral properties of the system is difficult to calculate and generally takes a complicated form, impeding its experimentalrealization. Recently, many approximate methods have been proposed for designing CD passages in many-body systems. Inthis topical review, we focus on the CD formalism and briefly introduce several experimental constructions and applicationsof approximate CD driving in spin-chain models with nuclear magnetic resonance (NMR) systems.展开更多
We discuss a quantum remote state preparation protocol by which two parties, Alice and Candy, prepare a single-qubit and a two-qubit state, respectively, at the site of the receiver Bob. The single-qubit state is know...We discuss a quantum remote state preparation protocol by which two parties, Alice and Candy, prepare a single-qubit and a two-qubit state, respectively, at the site of the receiver Bob. The single-qubit state is known to Alice while the two-qubit state which is a non-maximally entangled Bell state is known to Candy. The three parties are connected through a single entangled state which acts as a quantum channel. We first describe the protocol in the ideal case when the entangled channel under use is in a pure state. After that, we consider the effect of amplitude damping(AD) noise on the quantum channel and describe the protocol executed through the noisy channel. The decrement of the fidelity is shown to occur with the increment in the noise parameter. This is shown by numerical computation in specific examples of the states to be created. Finally, we show that it is possible to maintain the label of fidelity to some extent and hence to decrease the effect of noise by the application of weak and reversal measurements. We also present a scheme for the generation of the five-qubit entangled resource which we require as a quantum channel. The generation scheme is run on the IBMQ platform.展开更多
Quantum computers promise to solve finite-temperature properties of quantum many-body systems,which is generally challenging for classical computers due to high computational complexities.Here,we report experimental p...Quantum computers promise to solve finite-temperature properties of quantum many-body systems,which is generally challenging for classical computers due to high computational complexities.Here,we report experimental preparations of Gibbs states and excited states of Heisenberg X X and X X Z models by using a 5-qubit programmable superconducting processor.In the experiments,we apply a hybrid quantum–classical algorithm to generate finite temperature states with classical probability models and variational quantum circuits.We reveal that the Hamiltonians can be fully diagonalized with optimized quantum circuits,which enable us to prepare excited states at arbitrary energy density.We demonstrate that the approach has a self-verifying feature and can estimate fundamental thermal observables with a small statistical error.Based on numerical results,we further show that the time complexity of our approach scales polynomially in the number of qubits,revealing its potential in solving large-scale problems.展开更多
The single-shot readout data process is essential for the realization of high-fidelity qubits and fault-tolerant quantum algorithms in semiconductor quantum dots. However, the fidelity and visibility of the readout pr...The single-shot readout data process is essential for the realization of high-fidelity qubits and fault-tolerant quantum algorithms in semiconductor quantum dots. However, the fidelity and visibility of the readout process are sensitive to the choice of the thresholds and limited by the experimental hardware. By demonstrating the linear dependence between the measured spin state probabilities and readout visibilities along with dark counts, we describe an alternative threshold-independent method for the single-shot readout of spin qubits in semiconductor quantum dots. We can obtain the extrapolated spin state probabilities of the prepared probabilities of the excited spin state through the threshold-independent method. We then analyze the corresponding errors of the method, finding that errors of the extrapolated probabilities cannot be neglected with no constraints on the readout time and threshold voltage. Therefore, by limiting the readout time and threshold voltage, we ensure the accuracy of the extrapolated probability. We then prove that the efficiency and robustness of this method are 60 times larger than those of the most commonly used method. Moreover, we discuss the influence of the electron temperature on the effective area with a fixed external magnetic field and provide a preliminary demonstration for a single-shot readout of up to 0.7K/1.5T in the future.展开更多
Extracting more information and saving quantum resources are two main aims for quantum measurements.However,the optimization of strategies for these two objectives varies when discriminating between quantum states |ψ...Extracting more information and saving quantum resources are two main aims for quantum measurements.However,the optimization of strategies for these two objectives varies when discriminating between quantum states |ψ_(0)> and |ψ_(1)> through multiple measurements.In this study,we introduce a novel state discrimination model that reveals the intricate relationship between the average error rate and average copy consumption.By integrating these two crucial metrics and minimizing their weighted sum for any given weight value,our research underscores the infeasibility of simultaneously minimizing these metrics through local measurements with one-way communication.Our findings present a compelling trade-off curve,highlighting the advantages of achieving a balance between error rate and copy consumption in quantum discrimination tasks,offering valuable insights into the optimization of quantum resources while ensuring the accuracy of quantum state discrimination.展开更多
In quantum optics, unitary transformations of arbitrary states are evaluated by using the Taylor series expansion. However, this traditional approach can become cumbersome for the transformations involving non-commuti...In quantum optics, unitary transformations of arbitrary states are evaluated by using the Taylor series expansion. However, this traditional approach can become cumbersome for the transformations involving non-commuting operators. Addressing this issue, a nonstandard unitary transformation technique is highlighted here with new perspective. In a spirit of “quantum” series expansions, the transition probabilities between initial and final states, such as displaced, squeezed and other nonlinearly transformed coherent states are obtained both numerically and analytically. This paper concludes that, although this technique is novel, its implementations for more extended systems are needed.展开更多
Assessment of past-climate simulations of regional climate models(RCMs)is important for understanding the reliability of RCMs when used to project future regional climate.Here,we assess the performance and discuss pos...Assessment of past-climate simulations of regional climate models(RCMs)is important for understanding the reliability of RCMs when used to project future regional climate.Here,we assess the performance and discuss possible causes of biases in a WRF-based RCM with a grid spacing of 50 km,named WRFG,from the North American Regional Climate Change Assessment Program(NARCCAP)in simulating wet season precipitation over the Central United States for a period when observational data are available.The RCM reproduces key features of the precipitation distribution characteristics during late spring to early summer,although it tends to underestimate the magnitude of precipitation.This dry bias is partially due to the model’s lack of skill in simulating nocturnal precipitation related to the lack of eastward propagating convective systems in the simulation.Inaccuracy in reproducing large-scale circulation and environmental conditions is another contributing factor.The too weak simulated pressure gradient between the Rocky Mountains and the Gulf of Mexico results in weaker southerly winds in between,leading to a reduction of warm moist air transport from the Gulf to the Central Great Plains.The simulated low-level horizontal convergence fields are less favorable for upward motion than in the NARR and hence,for the development of moist convection as well.Therefore,a careful examination of an RCM’s deficiencies and the identification of the source of errors are important when using the RCM to project precipitation changes in future climate scenarios.展开更多
基金Project supported by the National Key Research and Development Program of China (Grant No.2019YFA0705000)Leading-edge technology Program of Jiangsu Natural Science Foundation (Grant No.BK20192001)the National Natural Science Foundation of China (Grant No.11974178)。
文摘Neural networks are becoming ubiquitous in various areas of physics as a successful machine learning(ML)technique for addressing different tasks.Based on ML technique,we propose and experimentally demonstrate an efficient method for state reconstruction of the widely used Sagnac polarization-entangled photon source.By properly modeling the target states,a multi-output fully connected neural network is well trained using only six of the sixteen measurement bases in standard tomography technique,and hence our method reduces the resource consumption without loss of accuracy.We demonstrate the ability of the neural network to predict state parameters with a high precision by using both simulated and experimental data.Explicitly,the mean absolute error for all the parameters is below 0.05 for the simulated data and a mean fidelity of 0.99 is achieved for experimentally generated states.Our method could be generalized to estimate other kinds of states,as well as other quantum information tasks.
基金supported by the National Natural Science Foundation of China(Grant No.12301590)the Natural Science Foundation of Hebei Province(Grant No.A2022210002)。
文摘In the domain of quantum cryptography,the implementation of quantum secret sharing stands as a pivotal element.In this paper,we propose a novel verifiable quantum secret sharing protocol using the d-dimensional product state and Lagrange interpolation techniques.This protocol is initiated by the dealer Alice,who initially prepares a quantum product state,selected from a predefined set of orthogonal product states within the C~d■C~d framework.Subsequently,the participants execute unitary operations on this product state to recover the underlying secret.Furthermore,we subject the protocol to a rigorous security analysis,considering both eavesdropping attacks and potential dishonesty from the participants.Finally,we conduct a comparative analysis of our protocol against existing schemes.Our scheme exhibits economies of scale by exclusively employing quantum product states,thereby realizing significant cost-efficiency advantages.In terms of access structure,we adopt a(t, n)-threshold architecture,a strategic choice that augments the protocol's practicality and suitability for diverse applications.Furthermore,our protocol includes a rigorous integrity verification mechanism to ensure the honesty and reliability of the participants throughout the execution of the protocol.
基金the financial support by the Brazilian funding agencies CAPES, CNPq (306201/2022-4)FAPEMIG (APQ-00371-17, APQ-02500-22, APQ-00388-22, and RED00223-23)FAPESP (2021/06803-4)。
文摘This work shows that despite a lattice mismatch of almost 20%, CdMnTe/CdTe/CdMnTe heterostructures grown directly on Si(111) have surprisingly good optical emission properties. The investigated structures were grown by molecular beam epitaxy and characterized by scanning transmission electron microscopy, macro-and micro-photoluminescence. Low temperature macro-photoluminescence experiments indicate three emission bands which depend on the CdTe layer thickness and have different confinement characteristics. Temperature measurements reveal that the lower energy emission band (at 1.48 eV)is associated to defects and bound exciton states, while the main emission at 1.61 eV has a weak 2D character and the higher energy one at 1.71 eV has a well-defined (zero-dimensional, 0D) 0D nature. Micro-photoluminescence measurements show the existence of sharp and strongly circularly polarized (up to 40%) emission lines which can be related to the presence of Mn in the heterostructure. This result opens the possibility of producing photon sources with the typical spin control of the diluted magnetic semiconductors using the low-cost silicon technology.
基金Project supported by the National Natural Science Foundation of China (Grant No. 61762039)。
文摘In some schemes, quantum blind signatures require the use of difficult-to-prepare multiparticle entangled states. By considering the communication overhead, quantum operation complexity, verification efficiency and other relevant factors in practical situations, this article proposes a non-entangled quantum blind signature scheme based on dense encoding. The information owner utilizes dense encoding and hash functions to blind the information while reducing the use of quantum resources. After receiving particles, the signer encrypts the message using a one-way function and performs a Hadamard gate operation on the selected single photon to generate the signature. Then the verifier performs a Hadamard gate inverse operation on the signature and combines it with the encoding rules to restore the message and complete the verification.Compared with some typical quantum blind signature protocols, this protocol has strong blindness in privacy protection,and higher flexibility in scalability and application. The signer can adjust the signature operation according to the actual situation, which greatly simplifies the complexity of the signature. By simultaneously utilizing the secondary distribution and rearrangement of non-entangled quantum states, a non-entangled quantum state representation of three bits of classical information is achieved, reducing the use of a large amount of quantum resources and lowering implementation costs. This improves both signature verification efficiency and communication efficiency while, at the same time, this scheme meets the requirements of unforgeability, non-repudiation, and prevention of information leakage.
基金Project supported by the National Natural Science Foundation of China(Grant Nos.12004405,12334008,and 12374148)the Double First-Class Initiative Fund of Shanghai Tech University+2 种基金the Analytical Instrumentation Center of Shanghai Tech University(Grant No.SPST-AIC10112914)the research fund from the Shanghai Sailing Program(Grant No.23YF1426900)the fund from the National Key R&D Program of China(Grant Nos.2022YFA1402702 and 2021YFA1401600)。
文摘The REAgSb_(2)(RE = rare earth and Y) family has drawn considerable research interest because the two-dimensional Sb net in their crystal structures hosts topological fermions and hence rich topological properties. We report herein the magnetization and magnetotransport measurements of SmAgSb_(2) single crystal, which unveil very large magnetoresistance and high carrier mobility up to 6.2 × 10^(3)% and 5.58 × 10^(3)cm^(2)·V^(-1)·s^(-1), respectively. The analysis of both Shubnikov–de Haas and de Haas–van Alphen quantum oscillations indicates nontrivial Berry phases in the paramagnetic state while trivial Berry curvature in the antiferromagnetic state, indicating a topological phase transition induced by the antiferromagnetic order. It is also supported by the first-principles calculations. The results not only provide a new interesting topological material but also offer valuable insights into the correlation between magnetism and nontrivial topological states.
文摘The hierarchy of bulk actions is developed which are associated with Chern-Simons theories. The connection between the bulk and edge arising from the requirement there is a cancelation of an anomaly which arises in the theory. A duality transformation is studied for the Chern-Simons example. The idea that is used has been employed to describe duality in a scalar theory. The link between the edge theory with the Chern-Simons theory in the bulk then suggests that similar transformations can be implemented in the bulk Chern-Simons theory as well.
基金supported by the National Natural Science Foundation of China (Grant No. 61873251)。
文摘Four intelligent optimization algorithms are compared by searching for control pulses to achieve the preparation of target quantum states for closed and open quantum systems, which include differential evolution(DE), particle swarm optimization(PSO), quantum-behaved particle swarm optimization(QPSO), and quantum evolutionary algorithm(QEA).We compare their control performance and point out their differences. By sampling and learning for uncertain quantum systems, the robustness of control pulses found by these four algorithms is also demonstrated and compared. The resulting research shows that the QPSO nearly outperforms the other three algorithms for all the performance criteria considered.This conclusion provides an important reference for solving complex quantum control problems by optimization algorithms and makes the QPSO be a powerful optimization tool.
基金Project supported by the National Natural Science Foundation of China (Grant No.11704051)the Qinglan Project of the Jiangsu Education Department and the Research Foundation of Six Talents Peaks Project in Jiangsu Province,China (Grant No.XNY-093)。
文摘A scheme is proposed to investigate the non-classical states generated by a quantum scissors device(QSD) operating on the the cavity mode of an optomechanical system. When the catalytic QSD acts on the cavity mode of the optomechanical system, the resulting state contains only the vacuum, single-photon and two-photon states depending upon the coupling parameter of the optomechanical system as well as the transmission coefficients of beam splitters(BSs). Especially, the output state is just a class of multicomponent cat state truncations at time t = 2π by choosing the appropriate value of coupling parameter. We discuss the success probability of such a state and the fidelity between the output state and input state via QSD. Then the linear entropy is used to investigate the entanglement between the two subsystems, finding that QSD operation can enhance their entanglement degree. Furthermore, we also derive the analytical expression of the Wigner function(WF) for the cavity mode via QSD and numerically analyze the WF distribution in phase space at time t =2π. These results show that the high non-classicality of output state can always be achieved by modulating the coupling parameter of the optomechanical system as well as the transmittance of BSs.
基金Project supported by National Key Research and Development Program of China (Grant No. 2019YFA0705000)the National Natural Science Foundation of China (Grant No. 11974178)。
文摘Efficient acquiring information from a quantum state is important for research in fundamental quantum physics and quantum information applications. Instead of using standard quantum state tomography method with reconstruction algorithm, weak values were proposed to directly measure density matrix elements of quantum state. Recently, similar to the concept of weak value, modular values were introduced to extend the direct measurement scheme to nonlocal quantum wavefunction. However, this method still involves approximations, which leads to inherent low precision. Here, we propose a new scheme which enables direct measurement for ideal value of the nonlocal density matrix element without taking approximations. Our scheme allows more accurate characterization of nonlocal quantum states, and therefore has greater advantages in practical measurement scenarios.
基金supported by the Tang Scholar Project of Soochow Universitythe National Natural Science Foundation of China(Grant No.61873162)+1 种基金the Fund from Jiangsu Engineering Research Center of Novel Optical Fiber Technology and Communication NetworkSuzhou Key Laboratory of Advanced Optical Communication Network Technology。
文摘Based on traveling ballot mode,we propose a secure quantum anonymous voting via Greenberger–Horne–Zeilinger(GHZ)states.In this scheme,each legal voter performs unitary operation on corresponding position of particle sequence to encode his/her voting content.The voters have multiple ballot items to choose rather than just binary options“yes”or“no”.After counting votes phase,any participant who is interested in voting results can obtain the voting results.To improve the efficiency of the traveling quantum anonymous voting scheme,an optimization method based on grouping strategy is also presented.Compared with the most existing traveling quantum voting schemes,the proposed scheme is more practical because of its privacy,verifiability and non-repeatability.Furthermore,the security analysis shows that the proposed traveling quantum anonymous voting scheme can prevent various attacks and ensure high security.
基金the National Key Research and Development Program of China(Grant No.2020YFA0309702)NSAF(Grant No.U2130205)+3 种基金the National Natural Science Foundation of China(Grant Nos.62101597,61605248,and 61505261)the China Postdoctoral Science Foundation(Grant No.2021M691536)the Natural Science Foundation of Henan(Grant Nos.202300410534 and 202300410532)the Anhui Initiative in Quantum Information Technologies。
文摘Quantum key distribution provides an unconditional secure key sharing method in theory,but the imperfect factors of practical devices will bring security vulnerabilities.In this paper,we characterize the imperfections of the sender and analyze the possible attack strategies of Eve.Firstly,we present a quantized model for distinguishability of decoy states caused by intensity modulation.Besides,considering that Eve may control the preparation of states through hidden variables,we evaluate the security of preparation in practical quantum key distribution(QKD)scheme based on the weak-randomness model.Finally,we analyze the influence of the distinguishability of decoy state to secure key rate,for Eve may conduct the beam splitting attack and control the channel attenuation of different parts.Through the simulation,it can be seen that the secure key rate is sensitive to the distinguishability of decoy state and weak randomness,especially when Eve can control the channel attenuation.
文摘Phase-matching quantum key distribution is a promising scheme for remote quantum key distribution,breaking through the traditional linear key-rate bound.In practical applications,finite data size can cause significant system performance to deteriorate when data size is below 1010.In this work,an improved statistical fluctuation analysis method is applied for the first time to two decoy-states phase-matching quantum key distribution,offering a new insight and potential solutions for improving the key generation rate and the maximum transmission distance while maintaining security.Moreover,we also compare the influence of the proposed improved statistical fluctuation analysis method on system performance with those of the Gaussian approximation and Chernoff-Hoeffding boundary methods on system performance.The simulation results show that the proposed scheme significantly improves the key generation rate and maximum transmission distance in comparison with the Chernoff-Hoeffding approach,and approach the results obtained when the Gaussian approximation is employed.At the same time,the proposed scheme retains the same security level as the Chernoff-Hoeffding method,and is even more secure than the Gaussian approximation.
基金the Innovation Program for Quantum Science and Technology(Grant No.2021ZD0303205)the National Natural Science Foundation of China(Grant Nos.12104282 and 12305014)+1 种基金the Initiative in Quantum Information Technologies of Anhui Province(Grant No.AHY050000)the Fundamental Research Funds for the Central Universities(Grant Nos.JZ2024HGTB0253 and JZ2023HGTA0172).
文摘Counterdiabatic driving (CD) offers a fast and robust route to manipulate quantum systems, which has widespreadapplications in quantum technologies. However, for higher-dimensional complex systems, the exact CD term involving thespectral properties of the system is difficult to calculate and generally takes a complicated form, impeding its experimentalrealization. Recently, many approximate methods have been proposed for designing CD passages in many-body systems. Inthis topical review, we focus on the CD formalism and briefly introduce several experimental constructions and applicationsof approximate CD driving in spin-chain models with nuclear magnetic resonance (NMR) systems.
基金Project supported by Indian Institute of Engineering Science and Technology, Shibpur, India
文摘We discuss a quantum remote state preparation protocol by which two parties, Alice and Candy, prepare a single-qubit and a two-qubit state, respectively, at the site of the receiver Bob. The single-qubit state is known to Alice while the two-qubit state which is a non-maximally entangled Bell state is known to Candy. The three parties are connected through a single entangled state which acts as a quantum channel. We first describe the protocol in the ideal case when the entangled channel under use is in a pure state. After that, we consider the effect of amplitude damping(AD) noise on the quantum channel and describe the protocol executed through the noisy channel. The decrement of the fidelity is shown to occur with the increment in the noise parameter. This is shown by numerical computation in specific examples of the states to be created. Finally, we show that it is possible to maintain the label of fidelity to some extent and hence to decrease the effect of noise by the application of weak and reversal measurements. We also present a scheme for the generation of the five-qubit entangled resource which we require as a quantum channel. The generation scheme is run on the IBMQ platform.
基金Project supported by the State Key Development Program for Basic Research of China(Grant No.2017YFA0304300)the National Natural Science Foundation of China(Grant Nos.11934018,11747601,and 11975294)+4 种基金Strategic Priority Research Program of Chinese Academy of Sciences(Grant No.XDB28000000)Scientific Instrument Developing Project of Chinese Academy of Sciences(Grant No.YJKYYQ20200041)Beijing Natural Science Foundation(Grant No.Z200009)the Key-Area Research and Development Program of Guangdong Province,China(Grant No.2020B0303030001)Chinese Academy of Sciences(Grant No.QYZDB-SSW-SYS032)。
文摘Quantum computers promise to solve finite-temperature properties of quantum many-body systems,which is generally challenging for classical computers due to high computational complexities.Here,we report experimental preparations of Gibbs states and excited states of Heisenberg X X and X X Z models by using a 5-qubit programmable superconducting processor.In the experiments,we apply a hybrid quantum–classical algorithm to generate finite temperature states with classical probability models and variational quantum circuits.We reveal that the Hamiltonians can be fully diagonalized with optimized quantum circuits,which enable us to prepare excited states at arbitrary energy density.We demonstrate that the approach has a self-verifying feature and can estimate fundamental thermal observables with a small statistical error.Based on numerical results,we further show that the time complexity of our approach scales polynomially in the number of qubits,revealing its potential in solving large-scale problems.
基金Project supported by the National Natural Science Foundation of China (Grant Nos.12074368,92165207,12034018,and 62004185)the Anhui Province Natural Science Foundation (Grant No.2108085J03)the USTC Tang Scholarship。
文摘The single-shot readout data process is essential for the realization of high-fidelity qubits and fault-tolerant quantum algorithms in semiconductor quantum dots. However, the fidelity and visibility of the readout process are sensitive to the choice of the thresholds and limited by the experimental hardware. By demonstrating the linear dependence between the measured spin state probabilities and readout visibilities along with dark counts, we describe an alternative threshold-independent method for the single-shot readout of spin qubits in semiconductor quantum dots. We can obtain the extrapolated spin state probabilities of the prepared probabilities of the excited spin state through the threshold-independent method. We then analyze the corresponding errors of the method, finding that errors of the extrapolated probabilities cannot be neglected with no constraints on the readout time and threshold voltage. Therefore, by limiting the readout time and threshold voltage, we ensure the accuracy of the extrapolated probability. We then prove that the efficiency and robustness of this method are 60 times larger than those of the most commonly used method. Moreover, we discuss the influence of the electron temperature on the effective area with a fixed external magnetic field and provide a preliminary demonstration for a single-shot readout of up to 0.7K/1.5T in the future.
基金supported by the Fundamental Research Funds for the Central Universities(WK2470000035)USTC Research Funds of the Double First-Class Initiative(YD2030002007,YD2030002011)+1 种基金the National Natural Science Foundation of China(62222512,12104439,12134014,and 11974335)the Anhui Provincial Natural Science Foundation(2208085J03).
文摘Extracting more information and saving quantum resources are two main aims for quantum measurements.However,the optimization of strategies for these two objectives varies when discriminating between quantum states |ψ_(0)> and |ψ_(1)> through multiple measurements.In this study,we introduce a novel state discrimination model that reveals the intricate relationship between the average error rate and average copy consumption.By integrating these two crucial metrics and minimizing their weighted sum for any given weight value,our research underscores the infeasibility of simultaneously minimizing these metrics through local measurements with one-way communication.Our findings present a compelling trade-off curve,highlighting the advantages of achieving a balance between error rate and copy consumption in quantum discrimination tasks,offering valuable insights into the optimization of quantum resources while ensuring the accuracy of quantum state discrimination.
文摘In quantum optics, unitary transformations of arbitrary states are evaluated by using the Taylor series expansion. However, this traditional approach can become cumbersome for the transformations involving non-commuting operators. Addressing this issue, a nonstandard unitary transformation technique is highlighted here with new perspective. In a spirit of “quantum” series expansions, the transition probabilities between initial and final states, such as displaced, squeezed and other nonlinearly transformed coherent states are obtained both numerically and analytically. This paper concludes that, although this technique is novel, its implementations for more extended systems are needed.
文摘Assessment of past-climate simulations of regional climate models(RCMs)is important for understanding the reliability of RCMs when used to project future regional climate.Here,we assess the performance and discuss possible causes of biases in a WRF-based RCM with a grid spacing of 50 km,named WRFG,from the North American Regional Climate Change Assessment Program(NARCCAP)in simulating wet season precipitation over the Central United States for a period when observational data are available.The RCM reproduces key features of the precipitation distribution characteristics during late spring to early summer,although it tends to underestimate the magnitude of precipitation.This dry bias is partially due to the model’s lack of skill in simulating nocturnal precipitation related to the lack of eastward propagating convective systems in the simulation.Inaccuracy in reproducing large-scale circulation and environmental conditions is another contributing factor.The too weak simulated pressure gradient between the Rocky Mountains and the Gulf of Mexico results in weaker southerly winds in between,leading to a reduction of warm moist air transport from the Gulf to the Central Great Plains.The simulated low-level horizontal convergence fields are less favorable for upward motion than in the NARR and hence,for the development of moist convection as well.Therefore,a careful examination of an RCM’s deficiencies and the identification of the source of errors are important when using the RCM to project precipitation changes in future climate scenarios.