共查询到20条相似文献,搜索用时 79 毫秒
1.
2.
3.
十余年前,已故物理学家理查德·费曼曾有一个梦想:将量子力学中神秘的,互相矛盾着的状态充作计算工具,则其运算速度将会超过可能制造出的、速度最快的经典计算机。 相似文献
4.
5.
1985年,Deutsch D证明,利用量子叠加态以及纠缠态进行信息处理,有时会比经典计算机更为有效.以相互纠缠的两个量子位为例,我们可以将它的初始态制成有4个输入数据的相干叠加态, 相似文献
6.
指向量子计算的约瑟夫森线路 总被引:1,自引:0,他引:1
在量子信息处理所涵盖的各分支领域中 ,尽管量子密钥分发的实验已经发展到了实际保密通信中可以利用的阶段 ,量子计算的真正实现仍是一个 10— 2 0年的远期目标 .已建成的核磁共振量子计算机 ,仅仅包括 7个量子位 (qubit) ,其体积却比真空管计算机还要大 .在这台计算机上 ,已经完成的“复杂”运算是 ,将合数 15分解为 3和 5两因子的乘积 .然而理论已经证明 :要想对一个十进制 6 0位数进行因子分解 ,用现行最快的电子计算机 (10 13 次 /s)需作 10 3 0 次运算 ,耗时10 17s(约等于宇宙年龄 ) .如若采用量子算法 ,在量子计算机(运算速度同样是 1… 相似文献
7.
量子信息讲座第一讲 量子计算机 总被引:2,自引:0,他引:2
量子力学和计算机理论,这两个看起来互不相关的领域,其结合却产生了一门富于成效的学科:量子计算机.文章介绍了量子计算机的基本概念和历史背景,它相对于经典计算机的优越性,它的构造和实验方案,以及实现量子计算的困难及其克服途径,最后展望了量子计算机的发展前景 相似文献
8.
核磁共振量子计算机与并行量子计算 总被引:1,自引:0,他引:1
在本文,我们首先回顾了量子计算的发展历史,阐述了核磁共振量子计算的原理.在叙述了利用有效纯态方法进行核磁共振量子计算之后,我们阐述了利用混合态进行核磁共振的量子计算的方法.首先是刘维尔量子计算方法,它是由Madi,Brushweiler,Ernst等人1998年提出的,在这一模式中,可以对搜索算法进行加速算法,Brushweilet。提出了一个指数速度的搜索算法.我们在3个比特的量子计算机中实现了这一搜索算法.我们在这一模式中提出了一个只需要一次搜索即可找标记物的直接拿取算法,并且在7个比特的核磁共振的量子计算机中实现了这一直接拿取算法.本文提出了在一个核磁共振量子计算机,或者更一般地一个系统量子计算机中实现多个量子计算机的并行计算.我们着重对量子搜索算法和Shor。的大数分解算法进行了并行实现.在并行量子计算中,一部分量子比特处在纯态,一部分量子比特处在混合态.如果所有的量子比特都处在纯态上,则就是有效纯态量子计算,如果所有的量子比特都处在混合态上,则就是刘维尔量子计算.在这两个极限中间,相当于2个到N/2个量子计算机的并行计算.量子搜索方法可以很有效地进行并行计算,而Shor算法则只能在小的范围内进行并行计算. 相似文献
9.
10.
11.
密度矩阵在量子力学中主要是扩展了态矢量的概念.约化密度矩阵是通过对整个系统中的密度矩阵的某一子系求部分迹得到的.本文首先介绍了约化密度矩阵的定义,然后指出约化密度矩阵在纠缠态的定义、两体系统中量子纠缠的度量、系统与环境耦合造成的退相干的物理机制等量子信息前沿领域方面的应用. 相似文献
12.
Following a recent proposal by Dhar et al (2006
Phys. Rev. Lett. 96 100405), we demonstrate experimentally
the preservation of quantum states in a two-qubit system based on a
super-Zeno effect using liquid-state nuclear magnetic resonance
techniques. Using inverting radiofrequency pulses and delicately
selecting time intervals between two pulses, we suppress the effect
of decoherence of quantum states. We observe that preservation of
the quantum state |11\rg with the super-Zeno effect is three times
more efficient than the ordinary one with the standard Zeno effect. 相似文献
13.
Very recently, Lee et al. proposed a secure quantum teleportation protocol to transfer shared quantum secret between multiple parties in a network[Phys. Rev. Lett. 124 060501 (2020)]. This quantum network is encoded with a maximally entangled GHZ state. In this paper, we consider a partially entangled GHZ state as the entanglement channel, where it can achieve, probabilistically, unity fidelity transfer of the state. Two kinds of strategies are given. One arises when an auxiliary particle is introduced and a general evolution at any receiver's location is then adopted. The other one involves performing a single generalized Bell-state measurement at the location of any sender. This could allow the receivers to recover the transmitted state with a certain probability, in which only the local Pauli operators are performed, instead of introducing an auxiliary particle. In addition, the successful probability is provided, which is determined by the degree of entanglement of the partially multipartite entangled state. Moreover, the proposed protocol is robust against the bit and phase flip noise. 相似文献
14.
15.
提出一种任意两粒子纠缠态1→2普适远程克隆方案. 此方案仅需一个特殊的四粒子纠缠态作为量子信道, 就可使处于空间不同位置的两个接收者分别以5/6的保真度得到任意输入态的近似拷贝, 该保真度远高于已有方案中的保真度. 将方案推广到任意两粒子纠缠态1→N(N>2)普适远程克隆的情况, 可使处于不同地点的N个接收者分别以(2N+1)/(3N)的保真度得到输入态的近似拷贝. 另外, 提出一种以上述单个特殊四粒子纠缠态作为量子信道, 在多目标量子比特受控非门和
关键词:
量子纠缠态
普适远程克隆
保真度 相似文献
16.
Quantum steganography that utilizes the quantum mechanical effect to achieve the purpose of information hiding is a popular topic of quantum information. Recently, E1 Allati et al. proposed a new quantum steganography using the GHZ4 state. Since all of the 8 groups of unitary transformations used in the secret message encoding rule change the GHZ4 state into 6 instead of 8 different quantum states when the global phase is not considered, we point out that a 2-bit instead of a 3-bit secret message can be encoded by one group of the given unitary transformations. To encode a 3-bit secret message by performing a group of unitary transformations on the GHZ4 state, we give another 8 groups of unitary transformations that can change the GHZ4 state into 8 different quantum states. Due to the symmetry of the GHZ4 state, all the possible 16 groups of unitary transformations change the GHZ4 state into 8 different quantum states, so the improved protocol achieves a high efficiency. 相似文献
17.
提出一种量子投票协议, 协议基于非对称量子通道受控量子局域幺正操作隐形传输(quantum operation teleportation, QOT). 由公正机构CA提供的零知识证明的量子身份认证, 保证选民身份认证的匿名性. 计票机构Bob制造高维Greenberger-Horne-Zeilinger 纠缠态建立一个高维量子通信信道. 选民对低维的量子选票进行局域幺正操作的量子投票, 是通过非对称基的测量和监票机构Charlie的辅助测量隐形传输的. Bob在Charlie帮助下可以通过幺正操作结果得到投票结果. 与其他一般的QOT量子投票协议相比, 该协议利用量子信息与传输的量子信道不同维, 使单粒子信息不能被窃取、防止伪造.选举过程由于有Charlie的监督, 使得投票公正和不可抵赖.由于量子局域幺正操作隐形传输的成功概率是1, 使量子投票的可靠性得以保证.
关键词:
量子投票
高维GHZ纠缠态
非对称基测量
量子操作隐形传输 相似文献
18.
We propose a method to implement a quantum computer by solid-state NMR. We can use the J-coupling for the quantum gate in CdTe. Both Cd and Te have two isotopes with spin 1/2, then we can have 4-qubits. The decoherence by dipole interaction may be minimized by preparing the isotope superlattice grown in the order of—111Cd–123Te–113Cd–125Te—in the [111] direction and by applying the magnetic field in the direction of [100], the magic angle of the dipole interaction. The optical pumping technique can be used in CdTe to make the initialization of the qubits. 相似文献
19.
Universal quantum circuit evaluation on encrypted data using probabilistic quantum homomorphic encryption scheme 下载免费PDF全文
《中国物理 B》2021,30(7):70309-070309
Homomorphic encryption has giant advantages in the protection of privacy information. In this paper, we present a new kind of probabilistic quantum homomorphic encryption scheme for the universal quantum circuit evaluation. Firstly,the pre-shared non-maximally entangled states are utilized as auxiliary resources, which lower the requirements of the quantum channel, to correct the errors in non-Clifford gate evaluation. By using the set synthesized by Clifford gates and T gates, it is feasible to perform the arbitrary quantum computation on the encrypted data. Secondly, our scheme is different from the previous scheme described by the quantum homomorphic encryption algorithm. From the perspective of application, a two-party probabilistic quantum homomorphic encryption scheme is proposed. It is clear what the computation and operation that the client and the server need to perform respectively, as well as the permission to access the data. Finally, the security of probabilistic quantum homomorphic encryption scheme is analyzed in detail. It demonstrates that the scheme has favorable security in three aspects, including privacy data, evaluated data and encryption and decryption keys. 相似文献
20.
量子度量学是研究量子测量与统计推断的一门学科,主要利用量子手段来提高参数估计的精度,在量子信息处理与测量中起到关键作用.量子参数估计的一般过程包含四个步骤:探针态的制备、参数化过程、对参数化后的输出态进行测量以及根据测量结果估计待测参数.其中探针态的选取对测量精度起着至关重要的作用.然而在实际的量子探针态的制备过程中,初始探针态会受到环境噪声的影响.目前人们已经研究了W态与Greenberger-Horne-Zeilinger(GHZ)态的量子Fisher信息(QFI)在典型噪声通道下的变化行为.由于W态与GHZ态有着不同的纠缠性质,对于W态与GHZ态的叠加态的QFI动力学研究具有重要的实际意义.故此,本文主要研究典型噪声通道对这两种状态的叠加态的QFI动力学行为的影响,得出了QFI随噪声参数的变化行为.结果表明,叠加态中W态组分可明显对抗相位阻尼噪声对探针态的QFI的影响,而其中的GHZ态组分可明显对抗振幅阻尼噪声的影响,从而为在实际环境中选取高精度的参数估计过程提供参考. 相似文献