Advances in quantum cryptography
Quantum cryptography is arguably the fastest growing area in quantum information science.
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
Novel theoretical protocols are designed on a regular basis, security proofs are constantly …
A survey of important issues in quantum computing and communications
Driven by the rapid progress in quantum hardware, recent years have witnessed a furious
race for quantum technologies in both academia and industry. Universal quantum …
race for quantum technologies in both academia and industry. Universal quantum …
Practical challenges in quantum key distribution
Quantum key distribution (QKD) promises unconditional security in data communication and
is currently being deployed in commercial applications. Nonetheless, before QKD can be …
is currently being deployed in commercial applications. Nonetheless, before QKD can be …
Real-and imaginary-time evolution with compressed quantum circuits
The current generation of noisy intermediate-scale quantum computers introduces new
opportunities to study quantum many-body systems. In this paper, we show that quantum …
opportunities to study quantum many-body systems. In this paper, we show that quantum …
Experimental quantum secure network with digital signatures and encryption
Cryptography promises four information security objectives, namely, confidentiality, integrity,
authenticity and non-repudiation, to support trillions of transactions annually in the digital …
authenticity and non-repudiation, to support trillions of transactions annually in the digital …
Experimental quantum e-commerce
E-commerce, a type of trading that occurs at a high frequency on the internet, requires
guaranteeing the integrity, authentication, and nonrepudiation of messages through long …
guaranteeing the integrity, authentication, and nonrepudiation of messages through long …
Security of quantum key distribution with imperfect devices
This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution
protocol in the case where the source and detector are under the limited control of an …
protocol in the case where the source and detector are under the limited control of an …
Out-of-distribution generalization for learning quantum dynamics
Generalization bounds are a critical tool to assess the training data requirements of
Quantum Machine Learning (QML). Recent work has established guarantees for in …
Quantum Machine Learning (QML). Recent work has established guarantees for in …
Learning the quantum algorithm for state overlap
Short-depth algorithms are crucial for reducing computational error on near-term quantum
computers, for which decoherence and gate infidelity remain important issues. Here we …
computers, for which decoherence and gate infidelity remain important issues. Here we …
Quantum technology for military applications
M Krelina - EPJ Quantum Technology, 2021 - epjqt.epj.org
Quantum technology is an emergent and potentially disruptive discipline, with the ability to
affect many human activities. Quantum technologies are dual-use technologies, and as such …
affect many human activities. Quantum technologies are dual-use technologies, and as such …