Fig 1 - uploaded by Sowmitra Das
Content may be subject to copyright.
Schematic Symbols for Quantum Logic Gates (in clockwise order) -Hadamard Gate, Pauli X (Not) Gate, Pauli Y Gate, Pauli Z Gate.

Schematic Symbols for Quantum Logic Gates (in clockwise order) -Hadamard Gate, Pauli X (Not) Gate, Pauli Y Gate, Pauli Z Gate.

Source publication
Preprint
Full-text available
Most quantum communication tasks need to rely on the transmission of quantum signals over long distances. Unfortunately, transmission of such signals is most often limited by losses in the channel, the same issue that affects classical communication. Simple signal amplification provides an elegant solution for the classical world, but this is not p...

Contexts in source publication

Context 1
... we turn to our main proposal, where we implement an improved version of Deutsch's Algorithm. Instead of running the purification algorithm on 2 pairs, we can apply it on Fig. 11. Schematic illustration of a generalised entanglement purification scheme using n imperfect Bell pairs, local operations and classical communication. multiple pairs at the same time. For instance, the 5-qubit variant can purify 5 imperfect pairs with a fidelity of 0.85 into one with a fidelity above 99% in a single round with a success ...
Context 2
... Quantum-Circuit for a 3-qubit variant of the improved Deutsch Algorithm is shown in Fig.10. A schematic for extending the algorithm to multiple qubits is given in Fig. 11. ...
Context 3
... Quantum-Circuit for a 3-qubit variant of the improved Deutsch Algorithm is shown in Fig.10. A schematic for extending the algorithm to multiple qubits is given in Fig. ...
Context 4
... so the correction operation can be performed. Further the message heralds the success or failure of the swapping operation if necessary. This is essentially equivalent to Teleportation protocol, but, the qubit whose state is to be transferred is entangled with another qubit. The quantum circuit for the Entanglement Swapping Protocol is shown in Fig. ...
Context 5
... that we have described the fundamental components needed for quantum repeaters, it is insightful to illustrate how they are combined together (see Fig. 13) and the quantum repeaters perform. Let us consider this in general before moving to specific approaches. Our task begins by the creation of a number of entangled links between adjacent repeater nodes. Once enough links have been generated entanglement purification is performed if necessary (either once or a number of times) to give ...
Context 6
... the entanglement one requires between the Alice and Bob's nodes with the required fidelity. If the purification or entanglement swapping fails at any step, we must start over that part again from round 0. After the entire pipeline of operations is complete, a robust and reliable entangled link will be established between the two parties. Fig. 13. Quantum repeater scheme for generating long-range entanglement. It begins by splitting the network into a number of segments and placing repeater stations at these nodes. Multiple entangled pairs are then generated between adjacent nodes. These links are then purified and entanglement swapping is performed to create a link twice as ...
Context 7
... the reliability of producing Bell-states at two different circuit-nodes of the devices was benchmarked. The ciruit of Fig. 4 was used to do this. But, the qubits were measured in the Bell-basis instead of the computational-basis. The results obtained after executing the circuit 5000 times in the local simulator, and, the IBMQ devices are shown in Fig. 14. For a perfect Bell-state |Φ + , perfect gates and perfect measurement, the output should be 00 with probability 1. Imperfections in any of these operations or due to information leakage will give rise to spurious outputs. As can be seen, the [ibmq_16_melbourne] is the most noisy device with an output fidelity of about 85.4%, while ...
Context 8
... we simulate the effect of channel-length on entanglement distribution. The channel is emulated by repeatedly applying SWAP gate to send qubits from the transmitter to the receiver [30]. This is illustrated in Fig. 15, in which a channel with 3 SWAP operations is shown. The performance of the devices for this Quantum Channel is shown in ...
Context 9
... results of the Entanglement Swapping protocol with one repeater node in the middle is shown in Fig. 18. As can be seen, the swapping protocol establishes much higher fidelity entanglement than would be possible by directly transferring the ...
Context 10
... 3-node Qauntum Repeater integrating all the elements and algorithms discussed until now, is shown in Fig. 20. Even with only 3 nodes, the circuit surpasses the qubit-count to be reliably executed in an IBMQ device. Thus, it was simulated natively on a local device. The simulation results indicating the performance of the architecture is shown in Fig. ...
Context 11
... is much scope to extend this work even further. A promising direction is to come up with robust and condense Error-Correcting Codes, so that, the fidelity may be increased without discarding all the bell-pairs. This will result in higher yield-rates without sacrificing the error-rates. In the current Fig. 16. Simulation Results for Channel-Length on [ibmqx4]. No. of Swap Gates -(a) 1, (b) 2, (c) 3. It is clearly seen that, the fidelity falls below 50% for just 3 SWAP Gates, rendering the Bell-Pair useless. This demonstrates the severe effects of noise and imperfect hardware on Quantum Communication. form, as our experiments demonstrate, ...

Similar publications

Preprint
Full-text available
Entanglement purification is to distill high-quality entangled states from low-quality entangled states. It is a key step in quantum repeaters, determines the efficiency and communication rates of quantum communication protocols, and is hence of central importance in long-distance communications and quantum networks. In this work, we report the fir...
Article
Full-text available
Quantum communication relies on the existence of entanglement between two nodes of a network. However, due to its fragile nature, it is nearly impossible to establish entanglement at large distances through the direct transmission of qubits. Quantum repeaters have been proposed to solve this problem, which split up the network to create small-scale...
Article
Full-text available
Quantum communications are becoming very quickly a reality. There are huge advancement made in the field of quantum internet. Recently, IBM has announced the first commercial quantum computer with 20 qubits. Given all the advancements in the field, in this paper we investigate how quantum technologies can be applied in maritime communications. In t...
Preprint
Full-text available
Quantum secure direct communication (QSDC) can directly transmit secrete messages through quantum channel. Device-independent (DI) QSDC can guarantee the communication security relying only on the observation of the Bell inequality violation, but not on any detailed description or trust of the inner workings of users' devices. In the paper, we prop...
Article
Full-text available
The no-quantum broadcasting theorem which is a weaker version of the nocloning theorem restricts us from broadcasting completely unknown quantum information to multiple users. However, if the sender is aware of the quantum information (state) to be broadcasted, then the above restriction disappears and the task reduces to a multiparty remote state...