Qubit Rate Modulation-Based Time Synchronization Mechanism for Multinode Quantum Networks

The combination of quantum and telecommunication networks enables to revolutionize the way information is used, offering unparalleled capabilities and making it an ideal choice for many critical applications. In this sense, quantum protocols generally have a unique requirement to have strict time synchronization in order to operate, which generally consume quantum resources of part of […]

Security and Fairness in Multiparty Quantum Secret Sharing Protocol

Quantum secret sharing (QSS) is a cryptographic protocol that leverages quantum mechanics to distribute a secret among multiple parties. With respect to the classical counterpart, in QSS, the secret is encoded into quantum states and shared by a dealer such that only an authorized subsets of participants, i.e., the players, can reconstruct it. Several state-of-the-art […]

Reliable Quantum Communications Based on Asymmetry in Distillation and Coding

The reliable provision of entangled qubits is an essential precondition in a variety of schemes for distributed quantum computing. This is challenged by multiple nuisances, such as errors during the transmission over quantum links, but also due to degradation of the entanglement over time due to decoherence. The latter can be seen as a constraint […]

Probing Quantum Telecloning on Superconducting Quantum Processors

Quantum information cannot be perfectly cloned, but approximate copies of quantum information can be generated. Quantum telecloning combines approximate quantum cloning, more typically referred to as quantum cloning, and quantum teleportation. Quantum telecloning allows approximate copies of quantum information to be constructed by separate parties, using the classical results of a Bell measurement made on […]

Rateless Protograph LDPC Codes for Quantum Key Distribution

Information reconciliation (IR) is a key step in quantum key distribution (QKD). In recent years, blind reconciliation based on low-density parity-check (LDPC) codes has replaced Cascade as a standard de facto since it guarantees efficient IR without a priori quantum bit error rate estimation and with limited interactivity between the parties, which is essential in […]

Tools for the Analysis of Quantum Protocols Requiring State Generation Within a Time Window

Quantum protocols commonly require a certain number of quantum resource states to be available simultaneously. An important class of examples is quantum network protocols that require a certain number of entangled pairs. Here, we consider a setting in which a process generates a quantum resource state with some probability p in each time step and […]

Network Anomaly Detection Using Quantum Neural Networks on Noisy Quantum Computers

The escalating threat and impact of network-based attacks necessitate innovative intrusion detection systems. Machine learning has shown promise, with recent strides in quantum machine learning offering new avenues. However, the potential of quantum computing is tempered by challenges in current noisy intermediate-scale quantum era machines. In this article, we explore quantum neural networks (QNNs) for […]

State Preparation on Quantum Computers via Quantum Steering

Quantum computers present a compelling platform for the study of open quantum systems, namely, the nonunitary dynamics of a system. Here, we investigate and report digital simulations of Markovian nonunitary dynamics that converge to a unique steady state. The steady state is programmed as a desired target state, yielding semblance to a quantum state preparation […]

Multiuser Entanglement Distribution in Quantum Networks Using Multipath Routing

Quantum networks facilitate numerous applications including secure communication and distributed quantum computation by performing entanglement distribution. For some multiuser quantum applications, access to a shared multipartite state is required. We consider the problem of designing protocols for distributing such states, at an increased rate. For this, we propose three protocols that leverage multipath routing to […]