با سلام خدمت کاربران در صورتی که با خطای سیستم پرداخت بانکی مواجه شدید از طریق کارت به کارت (6037997535328901 بانک ملی ناصر خنجری ) مقاله خود را دریافت کنید (تا مشکل رفع گردد).
ردیف | عنوان | نوع |
---|---|---|
1 |
Decentralization Using Quantum Blockchain: A Theoretical Analysis
تمرکززدایی با استفاده از بلاک چین کوانتومی: یک تحلیل نظری-2022 Blockchain technology has been prominent recently due to its applications in cryptocurrency. Numerous decentralized blockchain applications have been possible due to blockchains’ nature of
distributed, secured, and peer-to-peer storage. One of its technical pillars is using public-key cryptography
and hash functions, which promise a secure, pseudoanonymous, and distributed storage with nonrepudiation.
This security is believed to be difficult to break with classical computational powers. However, recent
advances in quantum computing have raised the possibility of breaking these algorithms with quantum
computers, thus, threatening the blockchains’ security. Quantum-resistant blockchains are being proposed
as alternatives to resolve this issue. Some propose to replace traditional cryptography with postquantum
cryptography—others base their approaches on quantum computer networks or quantum internets. Nonetheless, a new security infrastructure (e.g., access control/authentication) must be established before any of
these could happen. This article provides a theoretical analysis of the quantum blockchain technologies
that could be used for decentralized identity authentication. We put together a conceptual design for a
quantum blockchain identity framework and give a review of the technical evidence. We investigate its
essential components and feasibility, effectiveness, and limitations. Even though it currently has various
limitations and challenges, we believe a decentralized perspective of quantum applications is noteworthy and
likely.
INDEX TERMS: Blockchains | consensus protocol | decentralized applications | identity management systems | quantum computing | quantum networks. |
مقاله انگلیسی |
2 |
Deep Reinforcement Learning With Quantum-Inspired Experience Replay
یادگیری تقویتی عمیق با تکرار تجربه کوانتومی-2022 In this article, a novel training paradigm inspired
by quantum computation is proposed for deep reinforcement
learning (DRL) with experience replay. In contrast to the traditional experience replay mechanism in DRL, the proposed DRL
with quantum-inspired experience replay (DRL-QER) adaptively
chooses experiences from the replay buffer according to the
complexity and the replayed times of each experience (also
called transition), to achieve a balance between exploration and
exploitation. In DRL-QER, transitions are first formulated in
quantum representations and then the preparation operation
and depreciation operation are performed on the transitions.
In this process, the preparation operation reflects the relationship between the temporal-difference errors (TD-errors) and the
importance of the experiences, while the depreciation operation is
taken into account to ensure the diversity of the transitions. The
experimental results on Atari 2600 games show that DRL-QER
outperforms state-of-the-art algorithms, such as DRL-PER and
DCRL on most of these games with improved training efficiency
and is also applicable to such memory-based DRL approaches
as double network and dueling network.
Index Terms: Deep reinforcement learning (DRL) | quantum computation | quantum-inspired experience replay (QER) | quantum reinforcement learning. |
مقاله انگلیسی |
3 |
Deployment-Ready Quantum Key Distribution Over a Classical Network Infrastructure in Padua
توزیع کلید کوانتومی آماده استقرار بر روی یک زیرساخت شبکه کلاسیک در پادوآ-2022 Current technological progress is driving Quantum
Key Distribution towards a commercial and worldwide scale
expansion. Its capability to deliver secure communication
regardless of the computational power of the attackers will be a
fundamental feature in the next generations of telecommunication
networks. Nevertheless, demonstrations of QKD implementation in a real operating scenario and their coexistence with the
classical telecom infrastructure are of fundamental importance
for reliable exploitation. Here we present a Quantum Key
Distribution application implemented over a classical fiber-based
infrastructure. We exploit a 50 MHz source at 1550 nm, a single 13
km-long fiber cable for both the quantum and the classical channel,
and a simplified receiver scheme with just one single-photon
detector. In this way, we achieve an error rate of approximately
2% and a secret key rate of about 1.7 kbps, thus demonstrating the
feasibility of low-cost and ready-to-use Quantum Key Distribution
systems compatible with standard classical infrastructure.
Index Terms: Classical channel | cryptography | fiber, FPGA | padua | POGNAC | quantum communication | quantum key distribution | qubit4sync | telecommunication. |
مقاله انگلیسی |
4 |
Design of an Integrated Bell-State Analyzer on a Thin-Film Lithium Niobate Platform
طراحی یک آنالایزر حالت زنگ یکپارچه بر روی بستر نازک لیتیوم نیوبات-2022 Trapped ions are excellent candidates for quantum
computing and quantum networks because of their long coherence
times, ability to generate entangled photons as well as high fidelity
single- and two-qubit gates. To scale up trapped ion quantum
computing, we need a Bell-state analyzer on a reconfigurable platform that can herald high fidelity entanglement between ions. In
this work, we design a photonic Bell-state analyzer on a reconfigurable thin-film lithium niobate platform for polarization-encoded
qubits.We optimize the device to achieve high fidelity entanglement
between two trapped ions and find >99% fidelity. Apart from
that, the directional coupler used in our design can achieve any
polarization-independent power splitting ratio which can have a
rich variety of applications in the integrated photonic technology.
The proposed device can scale up trapped ion quantum computing
as well as other optically active spin qubits, such as color centers
in diamond, quantum dots, and rare-earth ions.
Index Terms: Bell-state analyzer | thin-film lithium niobate | scalable quantum computing | trapped ions | entanglement | polarization qubits | polarization-independent directional coupler. |
مقاله انگلیسی |
5 |
Development of an Undergraduate Quantum Engineering Degree
توسعه یک مدرک کارشناسی مهندسی کوانتوم-2022 Quantum computing, communications, sensing, and simulations are radically transformative
technologies, with great potential to impact industries and economies. Worldwide, national governments,
industries, and universities are moving to create a new class of workforce—the Quantum Engineers. Demand
for such engineers is predicted to be in the tens of thousands within a five-year timescale, far exceeding the
rate at which the world’s universities can produce Ph.D. graduates in the discipline. How best to train this
next generation of engineers is currently a matter of debate. Quantum mechanics—long a pillar of traditional
physics undergraduate degrees—must now be merged with traditional engineering offerings. This article
discusses the history, development, and the first year of operation of the world’s first undergraduate degree
in quantum engineering to be grown out of an engineering curriculum. The main purpose of this article is
to inform the wider discussion, now being held by many institutions worldwide, on how best to formally
educate the Quantum Engineer.
INDEX TERMS: Degree | education | engineering | quantum | undergraduate. |
مقاله انگلیسی |
6 |
Direct Quantum Communications in the Presence of Realistic Noisy Entanglement
ارتباطات کوانتومی مستقیم در حضور درهم تنیدگی پر سر و صدا واقعی-2022 To realize the Quantum Internet, quantum
communications require pre-shared entanglement among quantum nodes. However, both the generation and the distribution
of the maximally-entangled quantum states are inherently contaminated by quantum decoherence. Conventionally, the quantum
decoherence is mitigated by performing the consecutive steps of
quantum entanglement distillation followed by quantum teleportation. However, this conventional approach imposes a long delay.
To circumvent this impediment, we propose a novel quantum
communication scheme relying on realistic noisy pre-shared
entanglement, which eliminates the sequential steps imposing
delay in the standard approach. More precisely, our proposed
scheme can be viewed as a direct quantum communication
scheme capable of improving the quantum bit error ratio (QBER)
of the logical qubits despite relying on realistic noisy pre-shared
entanglement. Our performance analysis shows that the proposed
scheme offers competitive QBER, yield, and goodput compared
to the existing state-of-the-art quantum communication schemes,
despite requiring fewer quantum gates.
Index Terms: Quantum communication | quantum entanglement | quantum error-correction | quantum stabilizer codes | Quantum Internet. |
مقاله انگلیسی |
7 |
Discriminating Quantum States in the Presence of a Deutschian CTC: A Simulation Analysis
حالت های کوانتومی متمایز در حضور CTC Deutschian: یک تحلیل شبیه سازی-2022 In an article published in 2009, Brun et al. proved that in the presence of a “Deutschian”
closed timelike curve, one can map K distinct nonorthogonal states (hereafter, input set) to the standard
orthonormal basis of a K-dimensional state space. To implement this result, the authors proposed a quantum
circuit that includes, among SWAP gates, a fixed set of controlled operators (boxes) and an algorithm for
determining the unitary transformations carried out by such boxes. To our knowledge, what is still missing
to complete the picture is an analysis evaluating the performance of the aforementioned circuit from an
engineering perspective. The objective of this article is, therefore, to address this gap through an in-depth
simulation analysis, which exploits the approach proposed by Brun et al. in 2017. This approach relies on
multiple copies of an input state, multiple iterations of the circuit until a fixed point is (almost) reached. The
performance analysis led us to a number of findings. First, the number of iterations is significantly high even
if the number of states to be discriminated against is small, such as 2 or 3. Second, we envision that such
a number may be shortened as there is plenty of room to improve the unitary transformation acting in the
aforementioned controlled boxes. Third, we also revealed a relationship between the number of iterations
required to get close to the fixed point and the Chernoff limit of the input set used: the higher the Chernoff
bound, the smaller the number of iterations. A comparison, although partial, with another quantum circuit
discriminating the nonorthogonal states, proposed by Nareddula et al. in 2018, is carried out and differences
are highlighted.
INDEX TERMS: Benchmarking and performance characterization | classical simulation of quantum systems. |
مقاله انگلیسی |
8 |
DOPIV: Post-Quantum Secure Identity-Based Data Outsourcing with Public Integrity Verification in Cloud Storage
DOPIV: برون سپاری داده مبتنی بر هویت امن پس از کوانتومی با تأیید صحت عمومی در فضای ذخیره سازی ابری-2022 Public verification enables cloud users to employ a third party auditor (TPA) to check the data integrity. However, recent
breakthrough results on quantum computers indicate that applying quantum computers in clouds would be realized. A majority of existing
public verification schemes are based on conventional hardness assumptions, which are vulnerable to adversaries equipped with
quantum computers in the near future. Moreover, new security issues need to be solved when an original data owner is restricted or
cannot access the remote cloud server flexibly. In this paper, we propose an efficient identity-based data outsourcing with public integrity
verification scheme (DOPIV) in cloud storage. DOPIV is designed on lattice-based cryptography, which achieves post-quantum security.
DOPIV enables an original data owner to delegate a proxy to generate the signatures of data and outsource them to the cloud server.
Any TPA can perform data integrity verification efficiently on behalf of the original data owner, without retrieving the entire data set.
Additionally, DOPIV possesses the advantages of being identity-based systems, avoiding complex certificate management procedures.
We provide security proofs of DOPIV in the random oracle model, and conduct a comprehensive performance evaluation to show that
DOPIV is more practical in post-quantum secure cloud storage systems.
Index Terms: Cloud storage | public verification | lattice-based cryptography | identity-based data outsourcing | post-quantum security |
مقاله انگلیسی |
9 |
DQRA: Deep Quantum Routing Agent for Entanglement Routing in Quantum Networks
DQRA: عامل مسیریابی کوانتومی عمیق برای مسیریابی درهم تنیده در شبکه های کوانتومی-2022 Quantum routing plays a key role in the development of the next-generation network system. In
particular, an entangled routing path can be constructed with the help of quantum entanglement and swapping
among particles (e.g., photons) associated with nodes in the network. From another side of computing,
machine learning has achieved numerous breakthrough successes in various application domains, including
networking. Despite its advantages and capabilities, machine learning is not as much utilized in quantum
networking as in other areas. To bridge this gap, in this article, we propose a novel quantum routing model
for quantum networks that employs machine learning architectures to construct the routing path for the
maximum number of demands (source–destination pairs) within a time window. Specifically, we present a
deep reinforcement routing scheme that is called Deep Quantum Routing Agent (DQRA). In short, DQRA
utilizes an empirically designed deep neural network that observes the current network states to accommodate
the network’s demands, which are then connected by a qubit-preserved shortest path algorithm. The training
process of DQRA is guided by a reward function that aims toward maximizing the number of accommodated
requests in each routing window. Our experiment study shows that, on average, DQRA is able to maintain a
rate of successfully routed requests at above 80% in a qubit-limited grid network and approximately 60% in
extreme conditions, i.e., each node can be repeater exactly once in a window. Furthermore, we show that the
model complexity and the computational time of DQRA are polynomial in terms of the sizes of the quantum
networks.
INDEX TERMS: Deep learning | deep reinforcement learning (DRL) | machine learning | next-generation network | quantum network routing | quantum networks. |
مقاله انگلیسی |
10 |
Dual-Frequency Quantum Phase Estimation Mitigates the Spectral Leakage of Quantum Algorithms
تخمین فاز کوانتومی دو فرکانس برای کاهش نشت طیفی الگوریتمهای کوانتومی-2022 Quantum phase estimation is an important component in diverse quantum algorithms. However, it suffers from
spectral leakage, when the reciprocal of the record length is not an
integer multiple of the unknown phase, which incurs an accuracy
degradation. For the existing single-sample estimation scheme,
window-based methods have been proposed for spectral leakage
mitigation. As a further advance, we propose a dual-frequency estimator, which asymptotically approaches the Cramér-Rao bound,
when multiple samples are available. Numerical results show that
the proposed estimator outperforms the existing window-based
methods, when the number of samples is sufficiently high.
Index Terms: Algorithmic error mitigation | dual-frequency estimator | quantum algorithms | quantum phase estimation. |
مقاله انگلیسی |