2019
DOI: 10.1007/s11128-019-2374-7
|View full text |Cite
|
Sign up to set email alerts
|

A new kind of flexible quantum teleportation of an arbitrary multi-qubit state by multi-walker quantum walks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0
2

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 17 publications
(10 citation statements)
references
References 54 publications
0
8
0
2
Order By: Relevance
“…Protocol execution is performed by the operators defined in (22) and (21) as specified in the previous section, although the operators K v are now defined to generate entanglement in the nodes as the walker passes by. Let q vj0 and q vj1 denote the pair of qubits inside node v ∈ p j \ {A, B} that need to be entangled together by walker j.…”
Section: A Multi-path Entanglement Distribution With Bsmsmentioning
confidence: 99%
See 2 more Smart Citations
“…Protocol execution is performed by the operators defined in (22) and (21) as specified in the previous section, although the operators K v are now defined to generate entanglement in the nodes as the walker passes by. Let q vj0 and q vj1 denote the pair of qubits inside node v ∈ p j \ {A, B} that need to be entangled together by walker j.…”
Section: A Multi-path Entanglement Distribution With Bsmsmentioning
confidence: 99%
“…The goal of this article is to propose a control protocol for distributed quantum computing based on discrete time quantum walks [15]. Quantum walks are universal for quantum computing [16]- [18] and have been successfully employed in the quantum network scenario to perform perfect state transfer (PST) between network nodes [19], [20], teleportation [21], [22] and quantum key distribution (QKD) [23]. Previous works describe ways of distributing entanglement be-tween nodes on a quantum network using the coin space of the walker to propel entanglement generation between qubits [20], [21].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Step 1.1. As we know, QKD can realize reliable transfers of classical and quantum states over long distances [43], [44]. The verifier Bob would discover the counterfeiting of the plain text in Step 5.6 if the condition |P 0 = |P 0 is not met in this attack.…”
Section: ) External Attackersmentioning
confidence: 99%
“…Here, we focus on coined QWs. Different classes of coined QWs have been explored in the past decades, such as QWs with many coins [14][15][16][17][18][19][20][21][22][23][24][25][26], multiple walkers [27][28][29][30][31][32][33][34][35][36][37][38][39], and nonhomogeneous coin operators [40][41][42][43][44][45][46][47][48][49][50][51]. Very recently, coined QWs have found several applications ranging from quantum computation [37,52,53] to quantum information [18-26, 36, 38, 39, 48-50, 54].…”
Section: Introductionmentioning
confidence: 99%