Skip to main content

Showing 1–13 of 13 results for author: Ray, M

Searching in archive quant-ph. Search in all archives.
.
  1. Graph-Theoretic Framework for Self-Testing in Bell Scenarios

    Authors: Kishor Bharti, Maharshi Ray, Zhen-Peng Xu, Masahito Hayashi, Leong-Chuan Kwek, Adán Cabello

    Abstract: Quantum self-testing is the task of certifying quantum states and measurements using the output statistics solely, with minimal assumptions about the underlying quantum system. It is based on the observation that some extremal points in the set of quantum correlations can only be achieved, up to isometries, with specific states and measurements. Here, we present a new approach for quantum self-tes… ▽ More

    Submitted 27 April, 2021; originally announced April 2021.

    Comments: 29 pages

    Journal ref: PRX Quantum 3, 030344- Published 26 September 2022

  2. Quantum-classical algorithms for skewed linear systems with optimized Hadamard test

    Authors: Bujiao Wu, Maharshi Ray, Liming Zhao, Xiaoming Sun, Patrick Rebentrost

    Abstract: The solving of linear systems provides a rich area to investigate the use of nearer-term, noisy, intermediate-scale quantum computers. In this work, we discuss hybrid quantum-classical algorithms for skewed linear systems for over-determined and under-determined cases. Our input model is such that the columns or rows of the matrix defining the linear system are given via quantum circuits of poly-l… ▽ More

    Submitted 28 September, 2020; originally announced September 2020.

    Comments: 28+16 pages, 6 figures

    Journal ref: Phys. Rev. A 103, 042422 (2021)

  3. Graph-theoretic approach to dimension witnessing

    Authors: Maharshi Ray, Naresh Goud Boddu, Kishor Bharti, Leong-Chuan Kwek, Adán Cabello

    Abstract: A fundamental problem in quantum computation and quantum information is finding the minimum quantum dimension needed for a task. For tasks involving state preparation and measurements, this problem can be addressed using only the input-output correlations. This has been applied to Bell, prepare-and-measure, and Kochen-Specker contextuality scenarios. Here, we introduce a novel approach to quantum… ▽ More

    Submitted 13 November, 2020; v1 submitted 21 July, 2020; originally announced July 2020.

    Comments: 20 pages. V2 corrected minor typos and improved presentation

    Journal ref: New J. Phys. 23, 033006 (2021)

  4. Quantum algorithms for hedging and the learning of Ising models

    Authors: Patrick Rebentrost, Yassine Hamoudi, Maharshi Ray, Xin Wang, Siyi Yang, Miklos Santha

    Abstract: A paradigmatic algorithm for online learning is the Hedge algorithm by Freund and Schapire. An allocation into different strategies is chosen for multiple rounds and each round incurs corresponding losses for each strategy. The algorithm obtains a favorable guarantee for the total losses even in an adversarial situation. This work presents quantum algorithms for such online learning in an oracular… ▽ More

    Submitted 30 November, 2020; v1 submitted 14 February, 2020; originally announced February 2020.

    Comments: 16 pages

    Journal ref: Phys. Rev. A 103, 012418 (2021)

  5. arXiv:1911.09448  [pdf, other

    quant-ph cs.DM

    Local certification of programmable quantum devices of arbitrary high dimensionality

    Authors: Kishor Bharti, Maharshi Ray, Antonios Varvitsiotis, Adán Cabello, Leong-Chuan Kwek

    Abstract: The onset of the era of fully-programmable error-corrected quantum computers will be marked by major breakthroughs in all areas of science and engineering. These devices promise to have significant technological and societal impact, notable examples being the analysis of big data through better machine learning algorithms and the design of new materials. Nevertheless, the capacity of quantum compu… ▽ More

    Submitted 21 November, 2019; originally announced November 2019.

    Comments: 10 pages, 4 figures, Comments welcome

  6. Robust self-testing of quantum systems via noncontextuality inequalities

    Authors: Kishor Bharti, Maharshi Ray, Antonios Varvitsiotis, Naqueeb Ahmad Warsi, Adán Cabello, Leong-Chuan Kwek

    Abstract: Characterising unknown quantum states and measurements is a fundamental problem in quantum information processing. In this Letter, we provide a novel scheme to self-test local quantum systems using non-contextuality inequalities. Our work leverages the graph-theoretic framework for contextuality introduced by Cabello, Severini, and Winter, combined with tools from mathematical optimisation that gu… ▽ More

    Submitted 5 June, 2019; v1 submitted 18 December, 2018; originally announced December 2018.

    Comments: Manuscript accepted in Physical Review Letter

    Journal ref: Phys. Rev. Lett. 122, 250403 (2019)

  7. Non-classical Correlations in n-Cycle Setting

    Authors: Kishor Bharti, Maharshi Ray, Leong Chuan Kwek

    Abstract: We explore non-classical correlations in n-cycle setting. In particular, we focus on correlations manifested by Kochen-Specker-Klyachko box (KS box), scenarios involving n-cycle non-contextuality inequalities and Popescu-Rohlrich boxes (PR box). We provide the criteria for optimal classical simulation of a KS box of arbitrary n dimension. The non-contextuality inequalities are analysed for n-cycle… ▽ More

    Submitted 12 December, 2018; originally announced December 2018.

    Comments: 12 pages

    Journal ref: Entropy 2019, 21(2)

  8. arXiv:1809.03671  [pdf, ps, other

    quant-ph cs.CC

    Strategies for quantum races

    Authors: Troy Lee, Maharshi Ray, Miklos Santha

    Abstract: We initiate the study of quantum races, games where two or more quantum computers compete to solve a computational problem. While the problem of dueling algorithms has been studied for classical deterministic algorithms, the quantum case presents additional sources of uncertainty for the players. The foremost among these is that players do not know if they have solved the problem until they measur… ▽ More

    Submitted 27 September, 2018; v1 submitted 10 September, 2018; originally announced September 2018.

    Comments: 50 pages. v2 fixes an error in Lemma 48, which leads to an increase in the collision probability by a factor of the number of players

  9. arXiv:1504.00939  [pdf, other

    quant-ph

    On the Security of Semi Device Independent QKD protocols

    Authors: Anubhav Chaturvedi, Maharshi Ray, Ryszard Veynar, Marcin Pawlowski

    Abstract: While fully device-independent security in (BB84-like) prepare and measure Quantum Key Distribution (QKD) is impossible, it can be guaranteed against individual attacks in a semi device-independent (SDI) scenario, wherein no assumptions are made on the characteristics of the hardware used are made except for an upper bound on the the dimension of the communicated system. Studying security under su… ▽ More

    Submitted 6 May, 2018; v1 submitted 3 April, 2015; originally announced April 2015.

    Journal ref: Quantum Inf Process (2018) 17: 131

  10. arXiv:1408.3133  [pdf, other

    cond-mat.quant-gas physics.atom-ph quant-ph

    Observation of Dirac Monopoles in a Synthetic Magnetic Field

    Authors: M. W. Ray, E. Ruokokoski, S. Kandel, M. Möttönen, D. S. Hall

    Abstract: Magnetic monopoles --- particles that behave as isolated north or south magnetic poles --- have been the subject of speculation since the first detailed observations of magnetism several hundred years ago. Numerous theoretical investigations and hitherto unsuccessful experimental searches have followed Dirac's 1931 development of a theory of monopoles consistent with both quantum mechanics and the… ▽ More

    Submitted 13 August, 2014; originally announced August 2014.

    Comments: 26 pages, 8 figures

    Journal ref: M. W. Ray, E. Ruokokoski, S. Kandel, M. Möttönen, and D. S. Hall, Nature 505, 657 (2014)

  11. Sequential Quantum Secret Sharing in a Noisy Environment aided with Weak Measurements

    Authors: Maharshi Ray, Sourav Chatterjee, Indranil Chakrabarty

    Abstract: In this work we give a $(n,n)$-threshold protocol for sequential secret sharing of quantum information for the first time. By sequential secret sharing we refer to a situation where the dealer is not having all the secrets at the same time, at the beginning of the protocol; however if the dealer wishes to share secrets at subsequent phases she/he can realize it with the help of our protocol. Fir… ▽ More

    Submitted 4 April, 2016; v1 submitted 11 February, 2014; originally announced February 2014.

    Comments: 9 pages, 5 figures, To appear in European Physical Journal D

    Journal ref: Eur. Phys. J. D (2016) 70: 114

  12. Missing data outside the detector range: application to continuous variable entanglement verification and quantum cryptography

    Authors: Megan R. Ray, S. J. van Enk

    Abstract: In continuous-variable quantum information processing detectors are necessarily coarse grained and of finite range. We discuss how especially the latter feature is a bug and may easily lead to overoptimistic estimates of entanglement and of security, when missed data outside the detector range are ignored. We show that entropic separability or security criteria are much superior to variance-based… ▽ More

    Submitted 20 February, 2013; originally announced February 2013.

  13. Verifying entanglement in the Hong-Ou-Mandel dip

    Authors: Megan R. Ray, Steven J. van Enk

    Abstract: The Hong-Ou-Mandel interference dip is caused by an entangled state, a delocalized bi-photon state. We propose a method of detecting this entanglement by utilizing inverse Hong-Ou-Mandel interference, while taking into account vacuum and multi-photon contaminations, phase noise, and other imperfections. The method uses just linear optics and photodetectors, and for single-mode photodetectors we fi… ▽ More

    Submitted 4 January, 2011; originally announced January 2011.

    Comments: 5 pages, 2 figures