[書籍][B] The quantum internet: The second quantum revolution
PP Rohde - 2021 - books.google.com
Following the emergence of quantum computing, the subsequent quantum revolution will be
that of interconnecting individual quantum computers at the global level. In the same way …
that of interconnecting individual quantum computers at the global level. In the same way …
Quantum computing with multidimensional continuous-variable cluster states in a scalable photonic platform
Quantum computing is a disruptive paradigm widely believed to be capable of solving
classically intractable problems. However, the route toward full-scale quantum computers is …
classically intractable problems. However, the route toward full-scale quantum computers is …
Experimental implementation of secure anonymous protocols on an eight-user quantum key distribution network
Anonymity in networked communication is vital for many privacy-preserving tasks. Secure
key distribution alone is insufficient for high-security communications. Often, knowing who …
key distribution alone is insufficient for high-security communications. Often, knowing who …
Quantum computation and error correction based on continuous variable cluster states
S Hao, X Deng, Y Liu, X Su, C **e, K Peng - Chinese Physics B, 2021 - iopscience.iop.org
Measurement-based quantum computation with continuous variables, which realizes
computation by performing measurement and feedforward of measurement results on a …
computation by performing measurement and feedforward of measurement results on a …
Temporal-mode continuous-variable three-dimensional cluster state for topologically protected measurement-based quantum computation
Measurement-based quantum computation with continuous variables in an optical setup
shows great promise toward implementation of large-scale quantum computation, where the …
shows great promise toward implementation of large-scale quantum computation, where the …
Quantum-based anonymity and secure veto
Q Wang, Y Li, C Yu, R Shi, Z Zhang - Quantum Information Processing, 2021 - Springer
Remarkable theoretical and experimental achievements of quantum technology have
convincingly shown that a flourishing quantum age is coming. The threat of quantum attacks …
convincingly shown that a flourishing quantum age is coming. The threat of quantum attacks …
Efficient Fault-Tolerant Quantum Protocol for Differential Privacy in the Shuffle Model
We present a quantum protocol which securely and implicitly implements a random shuffle
to realize differential privacy in the shuffle model. The shuffle model of differential privacy …
to realize differential privacy in the shuffle model. The shuffle model of differential privacy …
Multipartite continuous-variable optical quantum entanglement: Generation and application
Quantum entanglement is a fundamental resource for various quantum applications and
generation of large-scale entanglement is a key quantum technology. In recent years …
generation of large-scale entanglement is a key quantum technology. In recent years …
A secure quantum protocol for anonymous one-vote veto voting
S Wu, W Sun, Q Wang, R Che, M Hu, Z Ding… - IEEE Access, 2021 - ieeexplore.ieee.org
Voting is one of the most prominent components of democracy. The one-vote veto, which
requires the voting result to be only “yes” or “no”, is a particularly noteworthy type of voting …
requires the voting result to be only “yes” or “no”, is a particularly noteworthy type of voting …
Versatile photonic entanglement synthesizer in the spatial domain
Multimode entanglement is an essential resource for quantum information in continuous-
variable systems. Light-based quantum technologies will arguably not be built upon table …
variable systems. Light-based quantum technologies will arguably not be built upon table …