Self-protected quantum algorithms based on quantum state tomography
From MaRDI portal
Publication:1009351
DOI10.1007/S11128-008-0090-9zbMATH Open1200.81032arXivquant-ph/0702047OpenAlexW1967578724MaRDI QIDQ1009351FDOQ1009351
Publication date: 31 March 2009
Published in: Quantum Information Processing (Search for Journal in Brave)
Abstract: Only a few classes of quantum algorithms are known which provide a speed-up over classical algorithms. However, these and any new quantum algorithms provide important motivation for the development of quantum computers. In this article new quantum algorithms are given which are based on quantum state tomography. These include an algorithm for the calculation of several quantum mechanical expectation values and an algorithm for the determination of polynomial factors. These quantum algorithms are important in their own right. However, it is remarkable that these quantum algorithms are immune to a large class of errors. We describe these algorithms and provide conditions for immunity.
Full work available at URL: https://arxiv.org/abs/quant-ph/0702047
Cites Work
- Title not available (Why is that?)
- Title not available (Why is that?)
- Title not available (Why is that?)
- Simulation of topological field theories by quantum computers
- Universal Quantum Simulators
- Simulating quantum systems on a quantum computer
- Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer
- The Bloch vector for \(N\)-level systems
- Quantum algorithms revisited
- Why haven't more quantum algorithms been found?
- Theory of Quantum Error Correction for General Noise
- Holonomic quantum computation
- Bell inequalities and the separability criterion
- Pseudo-Random Unitary Operators for Quantum Information Processing
- Geometry of Bloch vectors in two-qubit system
- Progress in quantum algorithms
- Qubits as parafermions
Cited In (3)
Recommendations
- Title not available (Why is that?) π π
- Quantum State Estimation π π
- Computational indistinguishability between quantum states and its cryptographic application π π
- Computational Indistinguishability Between Quantum States and Its Cryptographic Application π π
- Security of a single-state semi-quantum key distribution protocol π π
- On the computational security of quantum algorithms for transformation of information π π
- A method of enciphering quantum states π π
- Self-consistent tomography and measurement-device independent cryptography π π
- Encrypted quantum state tomography with phase estimation for quantum Internet π π
This page was built for publication: Self-protected quantum algorithms based on quantum state tomography
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1009351)