2022
DOI: 10.1049/qtc2.12048
|View full text |Cite
|
Sign up to set email alerts
|

Complexity analysis of quantum teleportation via different entangled channels in the presence of noise

Abstract: Quantum communication is an integral part of quantum computing, where teleportation of a quantum state has gained significant attention from researchers. Many teleportation schemes have been introduced in the recent past. In this study, the authors compare the teleportation of a single‐qubit message among different entangled channels such as the two‐qubit Bell channel, three‐qubit GHZ channel, two/three‐qubit cluster states, a highly entangled five‐qubit state (Brown et al.) and the six‐qubit state (Borras et … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(7 citation statements)
references
References 93 publications
0
7
0
Order By: Relevance
“…Table 7 represents the compilation of the three fidelities for all the protocols seen so far. The reason for the performance degradation of the different protocols, from those at the top of the table to those at the bottom of the table, has to do with several factors: In all the experiments carried out so far, we have used a reduced version of all the protocols (including the example in the next subsection), [75,76] i.e., without quantum measurement modules, since the physical IBM Q machines do not support the if-then-else statement, nor the measurement modules in intermediate instances of quantum circuits. [47] For example, the simplified version of the quantum teleportation protocol used in Subsection 3.1 is that of Figure 13 and not that of Figure 5a.…”
Section: Comparatively Discussing the Resultsmentioning
confidence: 99%
See 1 more Smart Citation
“…Table 7 represents the compilation of the three fidelities for all the protocols seen so far. The reason for the performance degradation of the different protocols, from those at the top of the table to those at the bottom of the table, has to do with several factors: In all the experiments carried out so far, we have used a reduced version of all the protocols (including the example in the next subsection), [75,76] i.e., without quantum measurement modules, since the physical IBM Q machines do not support the if-then-else statement, nor the measurement modules in intermediate instances of quantum circuits. [47] For example, the simplified version of the quantum teleportation protocol used in Subsection 3.1 is that of Figure 13 and not that of Figure 5a.…”
Section: Comparatively Discussing the Resultsmentioning
confidence: 99%
“…In all the experiments carried out so far, we have used a reduced version of all the protocols (including the example in the next subsection), [ 75,76 ] i.e., without quantum measurement modules, since the physical IBM Q machines do not support the if‐then‐else statement, nor the measurement modules in intermediate instances of quantum circuits. [ 47 ] For example, the simplified version of the quantum teleportation protocol used in Subsection 3.1 is that of Figure 13 and not that of Figure 5a.…”
Section: Applicationsmentioning
confidence: 99%
“…The security of quantum cryptography relies on the fundamental laws of quantum mechanics instead of the complex mathematical problems involved in classical cryptography. In the prospect of quantum cryptography, many branches have been established, such as quantum key distribution (QKD), [1][2][3] quantum secure direct communication (QSDC), 4,5 quantum private comparison protocol, 6 quantum teleportation, [7][8][9] quantum digital signature, 10,11 quantum image encryption, [12][13][14] and quantum visual secret sharing. 15,16 Similarly, quantum secret sharing (QSS) is one of the crucial research problems in secure communication.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, building universal quantum gates with the least quantum resource overhead (cost) and the minimum external manipulation is crucial in quantum computing. [21,22] Notably, the number of gates used to construct the quantum circuits can be greatly reduced by auxiliary dimensions [23][24][25] or multiple degrees of freedom (DoFs) of photon system. For the former, Ralph et al introduced the qudit concept to build Toffoli gate with a set of two-qubit gates, [26] where the qudit takes advantage of ancillary higher-dimensional spaces.…”
Section: Introductionmentioning
confidence: 99%