Quantum advantage from sequential-transformation contextuality
S Mansfield, E Kashefi - Physical review letters, 2018 - APS
We introduce a notion of contextuality for transformations in sequential contexts, distinct from
the Bell-Kochen-Specker and Spekkens notions of contextuality. Within a transformation …
the Bell-Kochen-Specker and Spekkens notions of contextuality. Within a transformation …
Quantum secure multi-party summation protocol based on blind matrix and quantum Fourier transform
Multi-party quantum summation is the premise for implementing other complex multi-party
quantum computing tasks. Here, a hybrid protocol is proposed to simultaneously implement …
quantum computing tasks. Here, a hybrid protocol is proposed to simultaneously implement …
Establishing shared secret keys on quantum line networks: protocol and security
We show the security of multi-user key establishment on a single line of quantum
communication. More precisely, we consider a quantum communication architecture where …
communication. More precisely, we consider a quantum communication architecture where …
Multi-client distributed blind quantum computation with the Qline architecture
Universal blind quantum computing allows users with minimal quantum resources to
delegate a quantum computation to a remote quantum server, while keeping intrinsically …
delegate a quantum computation to a remote quantum server, while keeping intrinsically …
Quantum advantage in information retrieval
Random access codes have provided many examples of quantum advantage in
communication, but concern only one kind of information retrieval task. We introduce a …
communication, but concern only one kind of information retrieval task. We introduce a …
Tsirelson's bound and Landauer's principle in a single-system game
We introduce a simple single-system game inspired by the Clauser-Horne-Shimony-Holt
(CHSH) game. For qubit systems subjected to unitary gates and projective measurements …
(CHSH) game. For qubit systems subjected to unitary gates and projective measurements …
Quantum cryptography beyond key distribution: theory and experiment
Due to its fundamental principles, quantum theory holds the promise to enhance the security
of modern cryptography, from message encryption to anonymous communication, digital …
of modern cryptography, from message encryption to anonymous communication, digital …
Quantum advantage in temporally flat measurement-based quantum computation
Several classes of quantum circuits have been shown to provide a quantum computational
advantage under certain assumptions. The study of ever more restricted classes of quantum …
advantage under certain assumptions. The study of ever more restricted classes of quantum …
Correlations for computation and computation for correlations
B Demirel, W Weng, C Thalacker, M Hoban… - npj Quantum …, 2021 - nature.com
Quantum correlations are central to the foundations of quantum physics and form the basis
of quantum technologies. Here, our goal is to connect quantum correlations and …
of quantum technologies. Here, our goal is to connect quantum correlations and …
Scheme for implementing nonlocal high-fidelity quantum controlled-not gates on quantum-dot-confined electron spins using optical microcavities and photonic …
Quantum information networks can transmit quantum states and perform quantum
operations between different quantum network nodes, which are essential for various …
operations between different quantum network nodes, which are essential for various …