Results 111 to 120 of about 7,951,353 (386)
Graph state extraction from two-dimensional cluster states
We propose schemes to extract arbitrary graph states from two-dimensional cluster states by locally manipulating the qubits solely via single-qubit measurements.
Julia Freund +3 more
doaj +1 more source
Exploring Multipartite Steering Effect Using Bell Operators
While Bell operators are exploited in detecting Bell nonlocality and entanglement classification, we demonstrate their usefulness in exploring Einstein−Podolsky−Rosen (EPR) steering, which represents the quantum correlation intermediate ...
Li-Yi Hsu, Shoichi Kawamoto
doaj +1 more source
A Remote Security Computational Ghost Imaging Method Based on Quantum Key Distribution Technology
Computational ghost imaging (CGI) is a method of acquiring object information by measuring light field intensity, which would be used to achieve imaging in a complicated environment.
Jianan Wu +5 more
doaj +1 more source
We calculate the magnetic-field and temperature dependence of all quantum corrections to the ensemble-averaged conductance of a network of quantum dots. We consider the limit that the dimensionless conductance of the network is large, so that the quantum
A. Abrikosov +14 more
core +1 more source
Quantum Game Theory Meets Quantum Networks
Classical game theory is a powerful tool focusing on optimized resource distribution, allocation and sharing in classical wired and wireless networks. As quantum networks are emerging as a means of providing true connectivity between quantum computers, it is imperative and crucial to exploit game theory for addressing challenges like entanglement ...
Dey, Indrakshi +3 more
openaire +3 more sources
This study presents novel anti‐counterfeiting tags with multilevel security features that utilize additional disguise features. They combine luminescent nanosized Ln‐MOFs with conductive polymers to multifunctional mixed‐matrix membranes and powder composites. The materials exhibit visible/NIR emission and matrix‐based conductivity even as black bodies.
Moritz Maxeiner +9 more
wiley +1 more source
Computing on Anonymous Quantum Network
This paper considers distributed computing on an anonymous quantum network, a network in which no party has a unique identifier and quantum communication and computation are available.
Kobayashi, Hirotada +2 more
core +1 more source
A spin group (SG)‐based mechanism is proposed to realize a single pair of Weyl points. PT‐symmetric nodal lines (NLs) persist under T‐breaking, protected by the combination of SG and P symmetry. When considering spin‐orbit coupling, the SG‐protected NL will split into Weyl points, which will also induce anomalous transport phenomena arising from ...
Shifeng Qian +6 more
wiley +1 more source
An entanglement-based quantum network based on symmetric dispersive optics quantum key distribution [PDF]
Quantum key distribution (QKD) is a crucial technology for information security in the future. Developing simple and efficient ways to establish QKD among multiple users are important to extend the applications of QKD in communication networks.
Xu Liu +11 more
semanticscholar +1 more source
Surface Entanglement in Quantum Spin Networks
We study the ground-state entanglement in systems of spins forming the boundary of a quantum spin network in arbitrary geometries and dimensionality.
Giampaolo, S. M. +2 more
core +1 more source

