-
Multiplexed Quantum Communication with Surface and Hypergraph Product Codes
Authors:
Shin Nishio,
Nicholas Connolly,
Nicolò Lo Piparo,
William John Munro,
Thomas Rowan Scruby,
Kae Nemoto
Abstract:
Connecting multiple processors via quantum interconnect technologies could help to overcome issues of scalability in single-processor quantum computers. Transmission via these interconnects can be performed more efficiently using quantum multiplexing, where information is encoded in high-dimensional photonic degrees of freedom. We explore the effects of multiplexing on logical error rates in surfa…
▽ More
Connecting multiple processors via quantum interconnect technologies could help to overcome issues of scalability in single-processor quantum computers. Transmission via these interconnects can be performed more efficiently using quantum multiplexing, where information is encoded in high-dimensional photonic degrees of freedom. We explore the effects of multiplexing on logical error rates in surface codes and hypergraph product codes. We show that, although multiplexing makes loss errors more damaging, assigning qubits to photons in an intelligent manner can minimize these effects, and the ability to encode higher-distance codes in a smaller number of photons can result in overall lower logical error rates. This multiplexing technique can also be adapted to quantum communication and multimode quantum memory with high-dimensional qudit systems.
△ Less
Submitted 13 June, 2024;
originally announced June 2024.
-
Tensor-Networks-based Learning of Probabilistic Cellular Automata Dynamics
Authors:
Heitor P. Casagrande,
Bo Xing,
William J. Munro,
Chu Guo,
Dario Poletti
Abstract:
Algorithms developed to solve many-body quantum problems, like tensor networks, can turn into powerful quantum-inspired tools to tackle problems in the classical domain. In this work, we focus on matrix product operators, a prominent numerical technique to study many-body quantum systems, especially in one dimension. It has been previously shown that such a tool can be used for classification, lea…
▽ More
Algorithms developed to solve many-body quantum problems, like tensor networks, can turn into powerful quantum-inspired tools to tackle problems in the classical domain. In this work, we focus on matrix product operators, a prominent numerical technique to study many-body quantum systems, especially in one dimension. It has been previously shown that such a tool can be used for classification, learning of deterministic sequence-to-sequence processes and of generic quantum processes. We further develop a matrix product operator algorithm to learn probabilistic sequence-to-sequence processes and apply this algorithm to probabilistic cellular automata. This new approach can accurately learn probabilistic cellular automata processes in different conditions, even when the process is a probabilistic mixture of different chaotic rules. In addition, we find that the ability to learn these dynamics is a function of the bit-wise difference between the rules and whether one is much more likely than the other.
△ Less
Submitted 17 April, 2024;
originally announced April 2024.
-
Resource Reduction in Multiplexed High-Dimensional Quantum Reed-Solomon Codes
Authors:
Shin Nishio,
Nicolò Lo Piparo,
Michael Hanks,
William John Munro,
Kae Nemoto
Abstract:
Quantum communication technologies will play an important role in quantum information processing in the near future as we network devices together. However, their implementation is still a challenging task due to both loss and gate errors. Quantum error correction codes are one important technique to address this issue. In particular, the Quantum Reed-Solomon codes are known to be quite efficient…
▽ More
Quantum communication technologies will play an important role in quantum information processing in the near future as we network devices together. However, their implementation is still a challenging task due to both loss and gate errors. Quantum error correction codes are one important technique to address this issue. In particular, the Quantum Reed-Solomon codes are known to be quite efficient for quantum communication tasks. The high degree of physical resources required, however, makes such a code difficult to use in practice. A recent technique called quantum multiplexing has been shown to reduce resources by using multiple degrees of freedom of a photon. In this work, we propose a method to decompose multi-controlled gates using fewer $\rm{CX}$ gates via this quantum multiplexing technique. We show that our method can significantly reduce the required number of $\rm{CX}$ gates needed in the encoding circuits for the quantum Reed-Solomon code. Our approach is also applicable to many other quantum error correction codes and quantum algorithms, including Grovers and quantum walks.
△ Less
Submitted 8 June, 2022;
originally announced June 2022.
-
Resource reduction for distributed quantum information processing using quantum multiplexed photons
Authors:
Nicolo Lo Piparo,
Michael Hanks,
Claude Gravel,
Kae Nemoto,
WIlliam J. Munro
Abstract:
Distributed quantum information processing is based on the transmission of quantum data over lossy channels between quantum processing nodes. These nodes may be separated by a few microns or on planetary scale distances, but transmission losses due to absorption/scattering in the channel are the major source of error for most distributed quantum information tasks. Of course quantum error detection…
▽ More
Distributed quantum information processing is based on the transmission of quantum data over lossy channels between quantum processing nodes. These nodes may be separated by a few microns or on planetary scale distances, but transmission losses due to absorption/scattering in the channel are the major source of error for most distributed quantum information tasks. Of course quantum error detection (QED) /correction (QEC) techniques can be used to mitigate such effects but error detection approaches have severe performance limitations due to the signaling constraints between nodes and so error correction approaches are preferable -assuming one has sufficient high quality local operations. Typically, performance comparisons between loss-mitigating codes assume one encoded qubit per photon. However single photons can carry more than one qubit of information and so our focus in this work is to explore whether loss-based QEC codes utilizing quantum multiplexed photons are viable and advantageous, especially as photon loss results in more than one qubit of information being lost. We show that quantum multiplexing enables significant resource reduction: in terms of the number of single photon sources while at the same time maintaining (or even lowering) the number of two-qubit gates required. Further, our multiplexing approach requires only conventional optical gates already necessary for the implementation of these codes.
△ Less
Submitted 3 November, 2020; v1 submitted 4 July, 2019;
originally announced July 2019.
-
Path Selection for Quantum Repeater Networks
Authors:
Rodney Van Meter,
Takahiko Satoh,
Thaddeus D. Ladd,
William J. Munro,
Kae Nemoto
Abstract:
Quantum networks will support long-distance quantum key distribution (QKD) and distributed quantum computation, and are an active area of both experimental and theoretical research. Here, we present an analysis of topologically complex networks of quantum repeaters composed of heterogeneous links. Quantum networks have fundamental behavioral differences from classical networks; the delicacy of qua…
▽ More
Quantum networks will support long-distance quantum key distribution (QKD) and distributed quantum computation, and are an active area of both experimental and theoretical research. Here, we present an analysis of topologically complex networks of quantum repeaters composed of heterogeneous links. Quantum networks have fundamental behavioral differences from classical networks; the delicacy of quantum states makes a practical path selection algorithm imperative, but classical notions of resource utilization are not directly applicable, rendering known path selection mechanisms inadequate. To adapt Dijkstra's algorithm for quantum repeater networks that generate entangled Bell pairs, we quantify the key differences and define a link cost metric, seconds per Bell pair of a particular fidelity, where a single Bell pair is the resource consumed to perform one quantum teleportation. Simulations that include both the physical interactions and the extensive classical messaging confirm that Dijkstra's algorithm works well in a quantum context. Simulating about three hundred heterogeneous paths, comparing our path cost and the total work along the path gives a coefficient of determination of 0.88 or better.
△ Less
Submitted 25 June, 2012;
originally announced June 2012.
-
Quantum Tagging: Authenticating Location via Quantum Information and Relativistic Signalling Constraints
Authors:
Adrian Kent,
William J. Munro,
Timothy P. Spiller
Abstract:
We define the task of {\it quantum tagging}, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is unbounded. We define simple security models for this task and briefly discuss alternatives.…
▽ More
We define the task of {\it quantum tagging}, that is, authenticating the classical location of a classical tagging device by sending and receiving quantum signals from suitably located distant sites, in an environment controlled by an adversary whose quantum information processing and transmitting power is unbounded. We define simple security models for this task and briefly discuss alternatives.
We illustrate the pitfalls of naive quantum cryptographic reasoning in this context by describing several protocols which at first sight appear unconditionally secure but which, as we show, can in fact be broken by teleportation-based attacks. We also describe some protocols which cannot be broken by these specific attacks, but do not prove they are unconditionally secure.
We review the history of quantum tagging protocols, which we first discussed in 2002 and described in a 2006 patent (for an insecure protocol). The possibility has recently been reconsidered by other authors. All the more recently discussed protocols of which we are aware were either previously considered by us in 2002-3 or are variants of schemes then considered, and all are provably insecure.
△ Less
Submitted 14 July, 2011; v1 submitted 12 August, 2010;
originally announced August 2010.
-
Updating Quantum Cryptography Report ver. 1
Authors:
Donna Dodson,
Mikio Fujiwara,
Philippe Grangier,
Masahito Hayashi,
Kentaro Imafuku,
Ken-ichi Kitayama,
Prem Kumar,
Christian Kurtsiefer,
Gaby Lenhart,
Norbert Luetkenhaus,
Tsutomu Matsumoto,
William J. Munro,
Tsuyoshi Nishioka,
Momtchil Peev,
Masahide Sasaki,
Yutaka Sata,
Atsushi Takada,
Masahiro Takeoka,
Kiyoshi Tamaki,
Hidema Tanaka,
Yasuhiro Tokura,
Akihisa Tomita,
Morio Toyoshima,
Rodney van Meter,
Atsuhiro Yamagishi
, et al. (2 additional authors not shown)
Abstract:
Quantum cryptographic technology (QCT) is expected to be a fundamental technology for realizing long-term information security even against as-yet-unknown future technologies. More advanced security could be achieved using QCT together with contemporary cryptographic technologies. To develop and spread the use of QCT, it is necessary to standardize devices, protocols, and security requirements a…
▽ More
Quantum cryptographic technology (QCT) is expected to be a fundamental technology for realizing long-term information security even against as-yet-unknown future technologies. More advanced security could be achieved using QCT together with contemporary cryptographic technologies. To develop and spread the use of QCT, it is necessary to standardize devices, protocols, and security requirements and thus enable interoperability in a multi-vendor, multi-network, and multi-service environment. This report is a technical summary of QCT and related topics from the viewpoints of 1) consensual establishment of specifications and requirements of QCT for standardization and commercialization and 2) the promotion of research and design to realize New-Generation Quantum Cryptography.
△ Less
Submitted 27 May, 2009;
originally announced May 2009.