Skip to main content

Showing 1–23 of 23 results for author: Zeng, P

Searching in archive quant-ph. Search in all archives.
.
  1. arXiv:2406.04307  [pdf, other

    quant-ph cond-mat.str-el physics.comp-ph

    High-precision and low-depth eigenstate property estimation: theory and resource estimation

    Authors: **zhao Sun, Pei Zeng, Tom Gur, M. S. Kim

    Abstract: Estimating the eigenstate properties of quantum many-body systems is a long-standing, challenging problem for both classical and quantum computing. For the task of eigenstate preparation, quantum signal processing (QSP) has established near-optimal query complexity $O( Δ^{-1} \log(ε^{-1}) )$ by querying the block encoding of the Hamiltonian $H$ where $Δ$ is the energy gap and $ε$ is the target pre… ▽ More

    Submitted 6 June, 2024; originally announced June 2024.

    Comments: 48 pages, 7 figures, and 4 tables

  2. arXiv:2310.20578  [pdf, other

    quant-ph

    Fault-Tolerant Operation of Bosonic Qubits with Discrete-Variable Ancillae

    Authors: Qian Xu, Pei Zeng, Daohong Xu, Liang Jiang

    Abstract: Fault-tolerant quantum computation with bosonic qubits often necessitates the use of noisy discrete-variable ancillae. In this work, we establish a comprehensive and practical fault-tolerance framework for such a hybrid system and synthesize it with fault-tolerant protocols by combining bosonic quantum error correction (QEC) and advanced quantum control techniques. We introduce essential building… ▽ More

    Submitted 31 October, 2023; originally announced October 2023.

    Comments: 23 pages, 10 figures. Comments are welcome

  3. arXiv:2309.03789  [pdf, other

    quant-ph

    Pilot-reference-free continuous-variable quantum key distribution with efficient decoy-state analysis

    Authors: Anran **, Xingjian Zhang, Liang Jiang, Richard V. Penty, Pei Zeng

    Abstract: Continuous-variable quantum key distribution (CV QKD) using optical coherent detectors is practically favorable due to its low implementation cost, flexibility of wavelength division multiplexing, and compatibility with standard coherent communication technologies. However, the security analysis and parameter estimation of CV QKD are complicated due to the infinite-dimensional latent Hilbert space… ▽ More

    Submitted 7 September, 2023; originally announced September 2023.

    Comments: 27 pages, 6 figures, 6 tables. Comments are welcomed

  4. arXiv:2212.04566  [pdf, other

    quant-ph

    Simple and high-precision Hamiltonian simulation by compensating Trotter error with linear combination of unitary operations

    Authors: Pei Zeng, **zhao Sun, Liang Jiang, Qi Zhao

    Abstract: Trotter and linear-combination-of-unitary (LCU) are two popular Hamiltonian simulation methods. We propose Hamiltonian simulation algorithms using LCU to compensate Trotter error, which enjoy both of their advantages. By adding few gates after the Kth-order Trotter, we realize a better time scaling than 2Kth-order Trotter. Our first algorithm exponentially improves the accuracy scaling of the Kth-… ▽ More

    Submitted 8 December, 2022; originally announced December 2022.

    Comments: 74 pages, 15 figures. Comments are welcome

  5. Experimental mode-pairing measurement-device-independent quantum key distribution without global phase-locking

    Authors: Hao-Tao Zhu, Yizhi Huang, Hui Liu, Pei Zeng, Mi Zou, Yunqi Dai, Shibiao Tang, Hao Li, Lixing You, Zhen Wang, Yu-Ao Chen, Xiongfeng Ma, Teng-Yun Chen, Jian-Wei Pan

    Abstract: In the past two decades, quantum key distribution networks based on telecom fibers have been implemented on metropolitan and intercity scales. One of the bottlenecks lies in the exponential decay of the key rate with respect to the transmission distance. Recently proposed schemes mainly focus on achieving longer distances by creating a long-arm single-photon interferometer over two communication p… ▽ More

    Submitted 9 February, 2023; v1 submitted 11 August, 2022; originally announced August 2022.

    Comments: 19 pages, 9 figures, 7 tables

    Journal ref: Phys. Rev. Lett. 130, 030801 (2023)

  6. Scalable fast benchmarking for individual quantum gates with local twirling

    Authors: Yihong Zhang, Wenjun Yu, Pei Zeng, Guoding Liu, Xiongfeng Ma

    Abstract: With the development of controllable quantum systems, fast and practical characterization for multi-qubit gates is essential for building high-fidelity quantum computing devices. The usual way to fulfill this requirement via randomized benchmarking asks for the complicated implementation of numerous multi-qubit twirling gates. How to efficiently and reliably estimate the fidelity of a quantum proc… ▽ More

    Submitted 9 February, 2023; v1 submitted 19 March, 2022; originally announced March 2022.

    Comments: 30 pages, 7 figures

    Journal ref: Photonics Research Vol. 11, Issue 1, pp. 81-99 (2023)

  7. Quantum key distribution surpassing the repeaterless rate-transmittance bound without global phase locking

    Authors: Pei Zeng, Hongyi Zhou, Weijie Wu, Xiongfeng Ma

    Abstract: Quantum key distribution -- the establishment of information-theoretically secure keys based on quantum physics -- is mainly limited by its practical performance, which is characterised by the dependence of the key rate on the channel transmittance $R(η)$. Recently, schemes based on single-photon interference have been proposed to improve the key rate to $R=O(\sqrtη)$ by overcoming the point-to-po… ▽ More

    Submitted 30 January, 2022; v1 submitted 12 January, 2022; originally announced January 2022.

    Comments: 56 pages, 24 figures. Comments are welcome

    Journal ref: Nat Commun 13, 3903 (2022)

  8. arXiv:2111.13855  [pdf, other

    quant-ph

    Quantum Complementarity Approach to Device-Independent Security

    Authors: Xingjian Zhang, Pei Zeng, Tian Ye, Hoi-Kwong Lo, Xiongfeng Ma

    Abstract: Complementarity is an essential feature of quantum mechanics. The preparation of an eigenstate of one observable implies complete randomness in its complementary observable. In quantum cryptography, complementarity allows us to formulate security analyses in terms of phase-error correction. However, in the device-independent regime that offers security without device characterization, the concept… ▽ More

    Submitted 11 October, 2022; v1 submitted 27 November, 2021; originally announced November 2021.

    Comments: 57 pages, 21 figures, 4 tables; In this version, we have (1) added security statements for general device-independent tasks; (2) updated the finite-size analysis with Kato's inequality; (3) presented more numerical simulation results, including a detailed presentation of analysing the reported data from the recent ion-trap DIQKD experiment; (4) fixed a few typos

  9. Bootstrap** Calabi-Yau Quantum Mechanics

    Authors: Bao-ning Du, Min-xin Huang, Pei-xuan Zeng

    Abstract: Recently, a novel bootstrap method for numerical calculations in matrix models and quantum mechanical systems is proposed. We apply the method to certain quantum mechanical systems derived from some well-known local toric Calabi-Yau geometries, where the exact quantization conditions have been conjecturally related to topological string theory. We find that the bootstrap method provides a promisin… ▽ More

    Submitted 16 November, 2021; originally announced November 2021.

    Comments: 21 pages, 21 figures

    Report number: USTC-ICTS/PCFT-21-43

  10. arXiv:2109.15304  [pdf, other

    quant-ph cond-mat.stat-mech cond-mat.str-el

    Universal quantum algorithmic cooling on a quantum computer

    Authors: Pei Zeng, **zhao Sun, Xiao Yuan

    Abstract: Quantum cooling, a deterministic process that drives any state to the lowest eigenstate, has been widely used from studying ground state properties of chemistry and condensed matter quantum physics, to general optimization problems. However, the cooling procedure is generally non-unitary, hence its realization on a quantum computer either requires deep circuits or assumes specific input states wit… ▽ More

    Submitted 2 June, 2022; v1 submitted 30 September, 2021; originally announced September 2021.

    Comments: 35 pages, 7 figures. Comments are welcome

  11. Reference-frame-independent design of phase-matching quantum key distribution

    Authors: Anran **, Pei Zeng, Richard V. Penty, Xiongfeng Ma

    Abstract: The recently proposed phase-matching quantum key distribution offers means to overcome the linear key rate-transmittance bound. Since the key information is encoded onto the phases of coherent states, the misalignment between the two remote reference frames would yield errors and significantly degrade the key generation rate from the ideal case. In this work, we propose a reference-frame-independe… ▽ More

    Submitted 15 September, 2021; originally announced September 2021.

    Comments: 20 pages, 8 figures

    Journal ref: Phys. Rev. Applied 16, 034017 (2021)

  12. Characterizing correlation within multipartite quantum systems via local randomized measurements

    Authors: Zhenhuan Liu, Pei Zeng, You Zhou, Mile Gu

    Abstract: Given a quantum system on many qubits split into a few different parties, how many total correlations are there between these parties? Such a quantity, aimed to measure the deviation of the global quantum state from an uncorrelated state with the same local statistics, plays an important role in understanding multipartite correlations within complex networks of quantum states. Yet, the experimenta… ▽ More

    Submitted 11 February, 2022; v1 submitted 18 August, 2021; originally announced August 2021.

    Comments: 28 pages, 8 figures. Comments are welcome

  13. arXiv:2012.02781  [pdf, ps, other

    quant-ph

    One-shot dynamical resource theory

    Authors: Xiao Yuan, Pei Zeng, Minbo Gao, Qi Zhao

    Abstract: A fundamental problem in resource theory is to study the manipulation of the resource. Focusing on a general dynamical resource theory of quantum channels, here we consider tasks of one-shot resource distillation and dilution with a single copy of the resource. For any target of unitary channel or pure state preparation channel, we establish a universal strategy to determine upper and lower bounds… ▽ More

    Submitted 4 December, 2020; originally announced December 2020.

    Comments: 9 pages, 0 figure. The appendix will be uploaded in a later version

  14. Recent advances on quantum key distribution overcoming the linear secret key capacity bound

    Authors: Yingqiu Mao, Pei Zeng, Teng-Yun Chen

    Abstract: A crucial goal for quantum key distribution (QKD) is to transmit unconditionally secure keys over long distances. Previous studies show that the key rate of point-to-point QKD is limited by a secret key rate capacity bound, and higher key rates would require quantum repeaters. In 2018, the seminal twin-field (TF) QKD protocol was proposed to provide a remarkable solution to overcoming the linear s… ▽ More

    Submitted 25 November, 2020; originally announced November 2020.

    Comments: 10 figures, 1 table, 24 pages

    Journal ref: Adv. Quantum Technol. 2000084 (2020)

  15. Robust shadow estimation

    Authors: Senrui Chen, Wenjun Yu, Pei Zeng, Steven T. Flammia

    Abstract: Efficiently estimating properties of large and strongly coupled quantum systems is a central focus in many-body physics and quantum information theory. While quantum computers promise speedups for many such tasks, near-term devices are prone to noise that will generally reduce the accuracy of such estimates. Here we show how to mitigate errors in the shadow estimation protocol recently proposed by… ▽ More

    Submitted 25 June, 2021; v1 submitted 18 November, 2020; originally announced November 2020.

    Comments: 39 pages, 10 figures. We add numerical experiments with practical gate-dependent noise models to justify the wide application of our robust protocol

    Journal ref: PRX Quantum 2, 030348 (2021)

  16. Phase-Matching Quantum Cryptographic Conferencing

    Authors: Shuai Zhao, Pei Zeng, Wen-Fei Cao, Xin-Yu Xu, Yi-Zheng Zhen, Xiongfeng Ma, Li Li, Nai-Le liu, Kai Chen

    Abstract: Quantum cryptographic conferencing (QCC) holds promise for distributing information-theoretic secure keys among multiple users over long distance. Limited by the fragility of Greenberger-Horne-Zeilinger (GHZ) state, QCC networks based on directly distributing GHZ states at long distance still face big challenge. Another two potential approaches are measurement device independent QCC and conference… ▽ More

    Submitted 28 June, 2020; v1 submitted 23 June, 2020; originally announced June 2020.

    Journal ref: Phys. Rev. Applied 14, 024010 (2020)

  17. Single-copies estimation of entanglement negativity

    Authors: You Zhou, Pei Zeng, Zhenhuan Liu

    Abstract: Entanglement plays a central role in quantum information processing, indicating the non-local correlation of quantum matters. However, few effective ways are known to detect the amount of entanglement of an unknown quantum state. In this work, we propose a scheme to estimate the entanglement negativity of any bi-partition of a composite system. The proposed scheme is based on the random unitary ev… ▽ More

    Submitted 23 April, 2020; originally announced April 2020.

    Comments: 7+32 pages, 8 figures, comments are welcome

    Journal ref: Phys. Rev. Lett. 125, 200502 (2020)

  18. Quantum gate verification and its application in property testing

    Authors: Pei Zeng, You Zhou, Zhenhuan Liu

    Abstract: To guarantee the normal functioning of quantum devices in different scenarios, appropriate benchmarking tool kits are quite significant. Inspired by the recent progress on quantum state verification, here we establish a general framework of verifying a target unitary gate. In both the non-adversarial and adversarial scenarios, we provide efficient methods to evaluate the performance of verificatio… ▽ More

    Submitted 18 January, 2020; v1 submitted 15 November, 2019; originally announced November 2019.

    Comments: 16 pages, 3 figures

    Journal ref: Phys. Rev. Research 2, 023306 (2020)

  19. Symmetry-protected privacy: beating the rate-distance linear bound over a noisy channel

    Authors: Pei Zeng, Weijie Wu, Xiongfeng Ma

    Abstract: There are two main factors limiting the performance of quantum key distribution --- channel transmission loss and noise. Previously, a linear bound was believed to put an upper limit on the rate-transmittance performance. Remarkably, the recently proposed twin-field and phase-matching quantum key distribution schemes have been proven to overcome the linear bound. In practice, due to the intractabl… ▽ More

    Submitted 13 October, 2019; originally announced October 2019.

    Comments: 23 pages, 6 figures

    Journal ref: Phys. Rev. Applied 13, 064013 (2020)

  20. Surpassing the rate-transmittance linear bound of quantum key distribution

    Authors: Xiao-Tian Fang, Pei Zeng, Hui Liu, Mi Zou, Weijie Wu, Yan-Lin Tang, Ying-Jie Sheng, Yao Xiang, Weijun Zhang, Hao Li, Zhen Wang, Lixing You, Ming-Jun Li, Hao Chen, Yu-Ao Chen, Qiang Zhang, Cheng-Zhi Peng, Xiongfeng Ma, Teng-Yun Chen, Jian-Wei Pan

    Abstract: Quantum key distribution (QKD offers a long-term solution to establish information-theoretically secure keys between two distant users. In practice, with a careful characterization of quantum sources and the decoy-state method, measure-device-independent quantum key distribution (MDI-QKD) provides secure key distribution. While short-distance fibre-based QKD has already been available for real-lif… ▽ More

    Submitted 4 August, 2019; originally announced August 2019.

    Comments: 16 pages, 7 figures

    Journal ref: Nature Photonics, vol. 14, p. 422425, (2020)

  21. Randomness quantification of coherent detection

    Authors: Hongyi Zhou, Pei Zeng, Mohsen Razavi, Xiongfeng Ma

    Abstract: Continuous-variable quantum cryptographic systems, including random number generation and key distribution, are often based on coherent detection. The essence of the security analysis lies in the randomness quantification. Previous analyses employ a semi-quantum picture, where the strong local oscillator limit is assumed. Here, we investigate the randomness of homodyne detection in a full quantum… ▽ More

    Submitted 21 July, 2018; originally announced July 2018.

    Comments: 8 pages, 4 figures

    Journal ref: Phys. Rev. A 98, 042321 (2018)

  22. Phase-Matching Quantum Key Distribution

    Authors: Xiongfeng Ma, Pei Zeng, Hongyi Zhou

    Abstract: Quantum key distribution allows remote parties to generate information-theoretic secure keys. The bottleneck throttling its real-life applications lies in the limited communication distance and key generation speed, due to the fact that the information carrier can be easily lost in the channel. For all the current implementations, the key rate is bounded by the channel transmission probability,… ▽ More

    Submitted 23 April, 2019; v1 submitted 14 May, 2018; originally announced May 2018.

    Comments: 27 pages, 10 figures

    Journal ref: Phys. Rev. X 8, 031043 (2018)

  23. arXiv:1801.06582  [pdf, other

    quant-ph physics.optics

    Towards practical high-speed high dimensional quantum key distribution using partial mutual unbiased basis of photon's orbital angular momentum

    Authors: Fumin Wang, Pei Zeng, Xiaoli Wang, Hong Gao, Fuli Li, Pei Zhang

    Abstract: Quantum Key Distribution (QKD) guarantees the security of communication with quantum physics. Most of widely adopted QKD protocols currently encode the key information with binary signal format---qubit, such as the polarization states. Therefore the transmitted information efficiency of the quantum key is intrinsically upper bounded by 1 bit per photon. High dimensional quantum system is a potenti… ▽ More

    Submitted 19 January, 2018; originally announced January 2018.

    Comments: Comments are welcome