节点文献

General description of discriminating quantum operations

  • 推荐 CAJ下载
  • PDF下载
  • 不支持迅雷等下载工具,请取消加速工具后下载。

【作者】 张可佳朱萍高飞郭奋卓秦素娟温巧燕

【Author】 Zhang Ke-Jia a)b) , Zhu Ping b) , Gao Fei a) , Guo Fen-Zhuo b) , Qin Su-Juan a) , and Wen Qiao-Yan a) a) State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications, Beijing 100876, China b) School of Science, Beijing University of Posts and Telecommunications, Beijing 100876, China

【机构】 State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and TelecommunicationsSchool of Science, Beijing University of Posts and Telecommunications

【摘要】 The discrimination of quantum operations plays a key role in quantum information and computation. Unlike discriminating quantum states, it has some special properties which can be carried out in practice. In this paper, we provide a general description of discriminating quantum operations. Concretely speaking, we describe the distinguisha- bility between quantum operations using a measure called operator fidelity. It is shown that, employing the theory of operator fidelity, we can not only verify some previous results to discriminate unitary operations, but also exhibit a more general discrimination condition. We further apply our results to analysing the security of some quantum cryptographic protocols and discuss the realization of our method using well-developed quantum algorithms.

【Abstract】 The discrimination of quantum operations plays a key role in quantum information and computation. Unlike discriminating quantum states, it has some special properties which can be carried out in practice. In this paper, we provide a general description of discriminating quantum operations. Concretely speaking, we describe the distinguisha- bility between quantum operations using a measure called operator fidelity. It is shown that, employing the theory of operator fidelity, we can not only verify some previous results to discriminate unitary operations, but also exhibit a more general discrimination condition. We further apply our results to analysing the security of some quantum cryptographic protocols and discuss the realization of our method using well-developed quantum algorithms.

【基金】 supported by the National Natural Science Foundation of China (Grant Nos. 60873191, 60903152, 61003286, 60821001, and61070251);the Program for New Century Excellent Talents in University (Grant No. NCET-10-0260);the Specialized Research Fund for the Doctoral Program of Higher Education (Grant Nos. 200800131016 and 20090005110010);the Beijing Nova Program (Grant No. 2008B51);the Key Project of the Chinese Ministry of Education (Grant No. 109014);the Beijing Natural Science Foundation (Grant No. 4112040);the Fundamental Research Funds for the Central Universities (GrantNos. BUPT2011YB01 and BUPT2011RC0505)
  • 【文献出处】 Chinese Physics B ,中国物理B , 编辑部邮箱 ,2011年10期
  • 【分类号】O413.1
  • 【被引频次】1
  • 【下载频次】34
节点文献中: