Efficient Universal Quantum Circuits
... circuits exist for the gate families F = {H, T } ∪ {Fn | n ≥ 1} and F 0 = {H, T } ∪ {Fn | n ≥ 1} ∪ {∧n (X) | n ≥ 1}, where H and T are the Hadamard and π/8 gates, respectively, and Fn and ∧n (X) are the (n + 1)-qubit fanout and (n + 1)qubit Toffoli gates, respectively (see Sect. 2). In order to cons ...
... circuits exist for the gate families F = {H, T } ∪ {Fn | n ≥ 1} and F 0 = {H, T } ∪ {Fn | n ≥ 1} ∪ {∧n (X) | n ≥ 1}, where H and T are the Hadamard and π/8 gates, respectively, and Fn and ∧n (X) are the (n + 1)-qubit fanout and (n + 1)qubit Toffoli gates, respectively (see Sect. 2). In order to cons ...
Resource cost results for one-way entanglement
... manipulation by adversarial communication parties, are inherent to all real-life communication settings, this assumption seems rather restrictive. The contribution of this work is to partly drop these conditions. We consider entanglement distillation and quantum state merging in presence of compound ...
... manipulation by adversarial communication parties, are inherent to all real-life communication settings, this assumption seems rather restrictive. The contribution of this work is to partly drop these conditions. We consider entanglement distillation and quantum state merging in presence of compound ...
REDUCED AND EXTENDED WEAK COUPLING LIMIT
... 2.2. “Toy quadratic noises”. The formula for Ẑ or for Ẑ + has one interesting feature: it involves a perturbation that is localized just at τ = 0. One can ask whether one can consider other dilations with more general perturbations localized at τ = 0. In this subsection we will describe such dilat ...
... 2.2. “Toy quadratic noises”. The formula for Ẑ or for Ẑ + has one interesting feature: it involves a perturbation that is localized just at τ = 0. One can ask whether one can consider other dilations with more general perturbations localized at τ = 0. In this subsection we will describe such dilat ...
Strong no-go theorem for Gaussian quantum bit commitment
... because of their associated detection scheme, namely, homodyne detection. This is well illustrated with CV quantum key distribution, which was recently proven unconditionally secure [15] and appears as a credible alternative to singlephoton-based quantum key distribution [16]. Dealing with CV quantu ...
... because of their associated detection scheme, namely, homodyne detection. This is well illustrated with CV quantum key distribution, which was recently proven unconditionally secure [15] and appears as a credible alternative to singlephoton-based quantum key distribution [16]. Dealing with CV quantu ...
An Introduction to Quantum Game Theory
... will instantly affect the state of the other particle, an example of quantum mechanics’ ‘spooky action at a distance’. (We will discuss entanglement later, in the body of this essay, but essentially two particles are entangled if their wave functions cannot be written as tensor products.) This insta ...
... will instantly affect the state of the other particle, an example of quantum mechanics’ ‘spooky action at a distance’. (We will discuss entanglement later, in the body of this essay, but essentially two particles are entangled if their wave functions cannot be written as tensor products.) This insta ...