首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 93 毫秒
1.
赵娜  刘建设  李铁夫  陈炜 《物理学报》2013,62(1):10301-010301
超导量子比特以其在可控性、低损耗以及可扩展性等方面的优势被认为是最有希望实现量子计算机的固态方式之一.量子比特之间的相干可控耦合是实现大规模的量子计算的必要条件.本文介绍了超导量子比特耦合方式的研究进展,包括利用电容或电感实现量子比特的局域耦合,着重介绍一维传输线谐振腔作为量子总线实现多个量子比特的可控耦合的电路量子电动力学体系,并对最新的三维腔与超导量子比特的耦合结构的研究进展进行了论述.对各种耦合体系的哈密顿量进行了比较详细的分析,并按照局域性和可控性对不同耦合机制进行了分类.  相似文献   

2.
超导量子系统被认为是最可能用于实现大规模量子计算、量子信息、以及量子存储等的物理系统之一.本文在一种特别设计的超导电荷比特的基础上,通过微波腔与超导比特的相互作用,探讨了在此系统中实现几何相单门以及非常规几何相两量子门的途径,并讨论了制备多量子比特最大纠缠态的方法.  相似文献   

3.
赵士平  刘玉玺  郑东宁 《物理学报》2018,67(22):228501-228501
近年来,超导量子计算的研究有了很大的进展.本文首先介绍了nSQUID新型超导量子比特的制备和研究进展,包括器件的平面多层膜制备工艺和量子相干性的研究.这类器件在量子态的传输速度和二维势系统的基础物理问题研究方面有着很大的优越性.其次,国际上新近发展的平面形式的transmon和Xmon超导量子比特具有更长的量子相干时间,在器件的设计和耦合方面也有相当的灵活性.本文介绍了我们和浙江大学与中国科学技术大学等单位合作逐步完善的这种形式的Xmon器件的制备工艺、制备出的多种耦合量子比特芯片,以及参与合作,在国际上首次完成的多达10个超导量子比特的量子态纠缠、线性方程组量子算法的实现和多体局域态等固体物理问题的量子模拟.最后介绍了基于这些超导量子比特器件开展的大量的量子物理、非线性物理和量子光学方面的研究,包括在Autler-Townes劈裂、电磁诱导透明、受激拉曼绝热通道、循环跃迁和关联激光等方面形成的一整套系统和独特的研究成果.  相似文献   

4.
赵虎  李铁夫  刘建设  陈炜 《物理学报》2012,61(15):154214-154214
超导量子计算是目前被认为最有希望实现量子计算机的方案之一. 超导量子比特是超导量子计算的核心部件. 如何尽可能的增加超导量子比特的退相干时间, 大规模的集成超导量子比特已成为超导量子计算研究的主要方向. 超导量子比特作为宏观的人工原子, 有许多量子光学现象都能够在其中观测到. 利用超导量子比特实现电磁感应透明为研究超导量子比特的退相干机理提供了新手段, 为研究非线性光学、光存储、光的超慢速传输等量子光学效应开辟了新思路. 本文介绍了电磁感应透明的理论基础, 总结了目前针对超导量子比特的电磁感应透明研究进展, 对比了一般气体原子与超导量子比特的电磁感应透明区别, 并对超导量子比特实现电磁感应透明的潜在应用进行了总结和展望.  相似文献   

5.
实验上展示了钇铁石榴石(YIG)晶体小球中磁振子与超导量子比特的驱动缀饰态之间的相干强耦合,磁振子的加入使得在超导量子比特中形成了双重缀饰态.实验中一个钇铁石榴石晶体小球与一个超导量子比特同时放置在三维谐振腔中,分别通过磁偶极相互作用和电偶极相互作用与谐振腔中的本征场(TE102模式)耦合,并通过腔模作为媒介实现两者之间的有效相干强耦合.给超导量子比特施加一个共振的微波驱动并改变驱动强度,测得耦合系统能级劈裂随驱动强度的变化,并理论上利用粒子-空穴对与玻色场耦合的模型做了计算.在大部分的驱动强度范围内实验结果都与理论计算结果符合得较好,表明驱动下的比特-磁振子耦合系统可以用来模拟粒子-空穴对称对与玻色场的耦合系统.本文使用的混合量子系统为模拟玻色子与费米子的混合系统提供了一个新途径.  相似文献   

6.
谷歌团队利用超导量子芯片,实现了两种规模的量子纠错表面码,利用辅助比特进行多次测量和初始化操作进行纠错,表明使用更多量子比特表面码的逻辑比特,其性能表现更好,达到了量子纠错规模化的盈亏平衡点,本文简要回顾量子纠错的机制,讨论谷歌量子纠错结果的意义,以及系列量子纠错进展,最后将展望量子计算的发展方向.  相似文献   

7.
《大学物理》2021,40(7)
随着2019年谷歌成功实现了“量子优势”,超导量子计算的研究正引起人们更加广泛的关注.超导量子比特是拥有量子化能级、量子态叠加和量子态纠缠等量子力学特性的宏观器件,目前被广泛应用于量子物理、原子物理、量子光学、量子化学、量子模拟和量子计算等诸多领域中.本文将重点讨论位相、电荷、传输子以及磁通型超导量子比特的基本原理及其器件结构,并讨论器件的制备方法和量子态测量技术,最后对基于超导量子比特开展的物理问题的研究做一简单介绍.  相似文献   

8.
基于超导量子比特网络的Grover搜索算法实现方案(英文)   总被引:1,自引:1,他引:0  
提出一个改进超导电路结构,此结构能实现量子计算所必需的任意两量子比特之间的长程作用,此结构能用目前技术制作.其次,基于此结构提出Grover搜索算法实现的物理方案.由于能实现任意两量子比特之间的控制相位门,所以多比特Grover搜索算法也能实现,从而满足各种量子计算的需要.此方案是一个基于电流控制的超导电荷比特网络结构的Grover搜索算法实现方案.  相似文献   

9.
近年来超导量子计算的研究方兴未艾,随着谷歌宣布首次实现“量子优势”,这一领域的研究受到了人们进一步的广泛关注.超导量子比特是具有量子化能级、量子态叠加和量子态纠缠等典型量子特性的宏观器件,通过电磁脉冲信号控制磁通量、电荷或具有非线性电感和无能量耗散的约瑟夫森结上的位相差,可对量子态进行精确调控,从而实现量子计算和量子信息处理.超导量子比特有着诸多方面的优势,很有希望成为普适量子计算的核心组成部分.以铌或其他硬金属(如钽等)为首层大面积材料制备的超导量子比特及辅助器件(简称铌基器件)拥有其独特的优点以及进一步发展的空间,目前已引起越来越多的兴趣.本文将介绍常见的多种超导量子比特的基本构成和工作原理,进而按照器件加工的一般顺序,从基片选择和预处理、薄膜生长、图形转移、刻蚀和约瑟夫森结的制备等方面详细介绍铌基超导量子比特及其辅助器件的多种制备工艺,为超导量子比特的制备提供一个可借鉴的清晰的工艺过程.最后,介绍若干制备铌基超导量子比特与辅助器件的具体例子,并对器件制备的工艺与方法的优化做展望.  相似文献   

10.
何锐 《物理学报》2012,61(3):30303-030303
量子计算如何在实验上实现一直受到广泛关注. 包括超导Josephson结的小量子器件(如超导量子干涉仪, SQUID)是实现量子计算的一种非常具有发展前景的物理系统. 本文通过对SQUID和介观LC共振器耦合电路系统的Cooper对数-相量子化机制的讨论, 合理地调制参数, 由此导出了该耦合电路在两能级近似下的J-C模型形式, 并提出了一种基于此模型的可实现量子信息传递的方案. 根据此方案可以利用介观LC共振器为数据总线来执行两SQUID间电荷量子比特的传递.  相似文献   

11.
We theoretically propose a feasible scheme to realize holonomic quantum computation with charge-phase qubits placed in a microwave cavity. By appropriately adjusting the controllable parameters, each charge-phase qubit is set as an effective four-level subsystem, based on which a universal set of holonomic quantum gates can be realized. Further analysis shows that our system is robust to the first-order fluctuation of the gate charges, and the intrinsic leakages between energy levels can be ignored.  相似文献   

12.
We propose an experimentally feasible scheme to achieve quantum computation based on nonadiabatic geometric phase shifts, in which a cyclic geometric phase is used to realize a set of universal quantum gates. Physical implementation of this set of gates is designed for Josephson junctions and for NMR systems. Interestingly, we find that the nonadiabatic phase shift may be independent of the operation time under appropriate controllable conditions. A remarkable feature of the present nonadiabatic geometric gates is that there is no intrinsic limitation on the operation time.  相似文献   

13.
The relation between discrete Wigner function and quantum contextuality based on graph theory has been studied, following the work in [Nature 510,351(2014)]. To do this, non‐stabilizer projectors have been introduced to a series of non‐contextuality graphs based on stabilizer projectors for a single qudit with odd prime dimension. It has been found that, for a phase space point defined by Wootters, there exists a given set of states for an odd‐prime qudit where the negative discrete Wigner function on the phase space point means its quantum contextuality under measurements on the graphs designed by a specific method. To implement this method, a subset of non‐stabilizer projectors has been found. In the union of the set of states for all phase space points, there exists a negativity‐to‐violation map between Wigner function and quantum contextuality inequality. The robustness of the equivalence under depolarizing noise has been analyzed and discussed. For demonstration purposes, the graphs with different independence numbers and the corresponding set of states have been established on a single qutrit. Different to the cited work, this method involves only a single qudit, then is experimentally feasible for a qutrit.  相似文献   

14.
The complete orthomodular lattice of closed subspaces of a Hilbert space is considered as the logic describing a quantum physical system, and called a quantum logic. G. Takeuti developed a quantum set theory based on the quantum logic. He showed that the real numbers defined in the quantum set theory represent observables in quantum physics. We formulate the quantum set theory by introducing a strong implication corresponding to the lattice order, and represent the basic concepts of quantum physics such as propositions, symmetries, and states in the quantum set theory.  相似文献   

15.

In this paper, a quantum sealed-bid protocol based on semi-quantum bidders is proposed. The protocol uses Bell states to encrypt message and realizes the process that bidders can directly transmit bidding information to the auction center safely. Its essence is a semi-quantum secure direct communication protocol using Bell states. Unlike most similar protocols, our scheme eliminates the trusted third-party Trent and sets the auction center Charlie as completely honest. Considering that the auction involves human activities, too many quantum servers are not only costly, but also unrealistic. Therefore, we set the bidders as semi-quantum users and implement the Vickrey auction. In addition, the security analysis shows that our scheme has high security and is completely feasible.

  相似文献   

16.
We provide a number of schemes for the splitting up of quantum information among k parties using a N-qubit linear cluster state as a quantum channel, such that the original information can be reconstructed only if all the parties cooperate. Explicit circuits are provided for these schemes, which are based on the concept of measurement based locking and unlocking of quantum information. These are experimentally feasible as they require measurements to be performed only on product basis.  相似文献   

17.
This paper presents a spatial domain quantum watermarking scheme. For a quantum watermarking scheme, a feasible quantum circuit is a key to achieve it. This paper gives a feasible quantum circuit for the presented scheme. In order to give the quantum circuit, a new quantum multi-control rotation gate, which can be achieved with quantum basic gates, is designed. With this quantum circuit, our scheme can arbitrarily control the embedding position of watermark images on carrier images with the aid of auxiliary qubits. Besides reversely acting the given quantum circuit, the paper gives another watermark extracting algorithm based on quantum measurements. Moreover, this paper also gives a new quantum image scrambling method and its quantum circuit. Differ from other quantum watermarking schemes, all given quantum circuits can be implemented with basic quantum gates. Moreover, the scheme is a spatial domain watermarking scheme, and is not based on any transform algorithm on quantum images. Meanwhile, it can make sure the watermark be secure even though the watermark has been found. With the given quantum circuit, this paper implements simulation experiments for the presented scheme. The experimental result shows that the scheme does well in the visual quality and the embedding capacity.  相似文献   

18.
We present a cheating-sensitive quantum protocol for Privacy-Preserving Nearest Neighbor Query based on Oblivious Quantum Key Distribution and Quantum Encryption. Compared with the classical related protocols, our proposed protocol has higher security, because the security of our protocol is based on basic physical principles of quantum mechanics, instead of difficulty assumptions. Especially, our protocol takes single photons as quantum resources and only needs to perform single-photon projective measurement. Therefore, it is feasible to implement this protocol with the present technologies.  相似文献   

19.
We analyze several families of two-dimensional quantum random walks. The feasible region (the region where probabilities do not decay exponentially with time) grows linearly with time, as is the case with one-dimensional QRW. The limiting shape of the feasible region is, however, quite different. The limit region turns out to be an algebraic set, which we characterize as the rational image of a compact algebraic variety. We also compute the probability profile within the limit region, which is essentially a negative power of the Gaussian curvature of the same algebraic variety. Our methods are based on analysis of the space-time generating function, following the methods of Pemantle and Wilson (J. Comb. Theory, Ser. A 97(1):129–161, 2002).  相似文献   

20.
In this paper, we propose a protocol for teleporting the photon polarization-entangled state from a sender to a receiver in terms of optical elements. We show that the quantum teleportation protocol can be successfully realized with a certain probability by using a W state as the quantum channel. This protocol is based on optical elements, which are feasible with existing experimental technology.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号