17,152 Hits in 5.1 sec

Polar Codes in Network Quantum Information Theory

Christoph Hirche, Ciara Morgan, Mark M. Wilde
2016 IEEE Transactions on Information Theory  
In the present work, we apply the polar coding method to network quantum information theory, by making use of recent advances for related classical tasks.  ...  Thus, our work paves the way for developing network quantum information theory further without requiring a quantum simultaneous decoder.  ...  In this work we apply the technique to network quantum information theory and in particular to compound classical-quantum multiple access and interference channels.  ... 
doi:10.1109/tit.2016.2514319 fatcat:3dpxnzzwd5fnbkywqeos457t5u

Branching MERA codes: A natural extension of classical and quantum polar codes

Andrew James Ferris, David Poulin
2014 2014 IEEE International Symposium on Information Theory  
We perform an in-depth study of a particular example that can be thought of as an extension to Arikan's polar code [2]-[4].  ...  We introduce a new class of circuits for constructing efficiently decodable quantum and classical error-correction codes, based on a recently discovered contractible tensor network known as branching multi-scale  ...  DP would like to acknowledge support from NSERC and FQRNT through the network INTRIQ. Computational resources were provided by Compute Canada and Calcul Québec.  ... 
doi:10.1109/isit.2014.6874999 dblp:conf/isit/FerrisP14 fatcat:bvi3ip55rngrfbkpxtlx7cvvoy

Table of contents

2021 IEEE Transactions on Information Theory  
Mayo Mutually Unbiased Equiangular Tight Frames 1656 QUANTUM INFORMATION THEORY M. Mosonyi and T.  ...  Kschischang Information Density in Multi-Layer Resistive Memories 1446 SEQUENCES AND CRYPTOGRAPHY M. Fickus and B. R.  ...  COMMUNICATIONS, COMMUNICATION NETWORKS A. Haghi  ... 
doi:10.1109/tit.2021.3057963 fatcat:5kq77cmhnrhq3l5ltrw26zelde

A Study of Quantum Information and Quantum Computers

2014 Oriental Journal of Chemistry  
a way that can be used to transfer the quantum information from the quantum states such as linear polarization and rounded photon , electron spin or neutron and etc , can be used for making the in penetrable  ...  Though quantum networks are so suitable for making safe information and high speed ABSTRACT In this article we will proceed to check of quantum computers structure i.e.qubits in different states by quantum  ...  physics system in quantum mechanics theory , we can from the filament of qubits that we will point to them: Photon: the linear polarization of photon for example in direction of (?)  ... 
doi:10.13005/ojc/300227 fatcat:6tponsoqijdojoe3hybemyvu2y

A Quantum Key-based Mobile Security Payment Scheme

Zhu Dexin, Li Xiaohui, Wu Jianan, Song Lijun
2019 International Journal of Performability Engineering  
Then, the quantum key was safely obtained and the QR (quick response) code was generated by using the proposed quantum key gateway.  ...  In view of the safety problem of current mobile security payment encryption schemes, this paper proposed a quantum key-based MSP (mobile security payment) scheme.  ...  Generally, the BB84 protocol employs a single photon to transmit information and uses photon polarization states as the information coding object.  ... 
doi:10.23940/ijpe.19.08.p16.21652172 fatcat:nq4n6ii6enc2hpua4qfeg2uqsa

Polar Codes for Classical-Quantum Channels

Mark M. Wilde, Saikat Guha
2013 IEEE Transactions on Information Theory  
First, we leverage several known results from the quantum information literature to demonstrate that the channel polarization effect occurs for channels with classical inputs and quantum outputs.  ...  We also demonstrate that a quantum successive cancellation decoder works well, in the sense that the word error rate decays exponentially with the blocklength of the code.  ...  ACKNOWLEDGMENT We thank David Forney, MIT for suggesting us to try polar codes for the quantum channel. We also thank Emre Telatar, EPFL for an intuitive tutorial on channel polarization at ISIT 2011.  ... 
doi:10.1109/tit.2012.2218792 fatcat:5wfwnyotbrbzzbdxekfm54hepu

Refining Quantum Cryptography

R. Hughes, J. Nordholt
2011 Science  
QKD has provable security based on information theory, and forward secrecy. Quantum key distribution is only used to produce and distribute a key, not to transmit any message data.  ...  encoding information in quantum states, or qubits, as opposed to classical communication's use of bits.  ...  However, from a coding theory point of view information reconciliation is essentially source coding with side information, in consequence any coding scheme that works for this problem can be used for information  ... 
doi:10.1126/science.1208527 pmid:21921186 fatcat:ejl6547pdjbcxjp753me6m4a5u

An improved rate region for the classical-quantum broadcast channel

Christoph Hirche, Ciara Morgan
2015 2015 IEEE International Symposium on Information Theory (ISIT)  
The proof of achievability is based on the recently introduced polar coding scheme and its generalization to quantum network information theory.  ...  We present a new achievable rate region for the two-user binary-input classical-quantum broadcast channel.  ...  This work was supported by the EU grants SIQS and QFTCMPS and by the cluster of excellence EXC 201 Quantum Engineering and Space-Time Research.  ... 
doi:10.1109/isit.2015.7282963 dblp:conf/isit/HircheM15 fatcat:62s6aobpe5buteiveqzn6bc6pu

Quantum Technology: Advances and Trends

Lidong Wang, Cheryl Ann Alexander
2020 American Journal of Engineering and Applied Sciences  
In this study, we present the advances and trends of quantum technology.  ...  Specifically, the advances and trends cover quantum computers and Quantum Processing Units (QPUs), quantum computation and quantum machine learning, quantum network, Quantum Key Distribution (QKD), quantum  ...  An asymptotically secret as well as correctable quantum network code was presented as the quantum extension of classical network codes.  ... 
doi:10.3844/ajeassp.2020.254.264 fatcat:7jxucmol7zg6pd6ivcwozzwzau

Table of Contents

2021 2021 IEEE International Symposium on Information Theory (ISIT)  
QUANTUM INFORMATION THEORY D3-T4-S5.1: FINITE BLOCK LENGTH ANALYSIS ON QUANTUM COHERENCE ........................................... 1326 DISTILLATION AND INCOHERENT RANDOMNESS EXTRACTION Masahito Hayashi  ...  Schaefer, University of Siegen, Germany D3-T1-S7: TOPICS IN NETWORK CODING II D3-T1-S7.1: INTRABLOCK INTERLEAVING FOR BATCHED NETWORK CODING ....................................... 1409 WITH BLOCKWISE  ... 
doi:10.1109/isit45174.2021.9518212 fatcat:vkpbkhd3kzaxtcwe53osdnt6ku

Quantum Information and Entanglement

Shao-Ming Fei, Sergio Albeverio, Adan Cabello, Naihuan Jing, Debashish Goswami
2010 Advances in Mathematical Physics  
roles in quantum information processing such as quantum computation, quantum teleportation, dense coding, quantum error correction, quantum cryptographic schemes, entanglement swapping, and remote states  ...  Rocchi introduces a short survey on recent information theories and reviews some critical notes concerning the conceptualization of information in classical and quantum physics.  ... 
doi:10.1155/2010/657878 fatcat:4a4puc7kvjbgnbles55nncivjq

Quantum cryptography [article]

Dag Roar Hjelme, Lars Lydersen, Vadim Makarov
2011 arXiv   pre-print
This is a chapter on quantum cryptography for the book "A Multidisciplinary Introduction to Information Security" to be published by CRC Press in 2011/2012.  ...  The chapter aims to introduce the topic to undergraduate-level and continuing-education students specializing in information and communication technology.  ...  Further Reading and Web Sites The web site of our Quantum Hacking group presents how industrial implementations of the quantum key distribution system can be broken  ... 
arXiv:1108.1718v1 fatcat:qtmiplhnujcxzcvohi3vims3am

A Survey on Quantum Key Distribution

Laszlo Gyongyosi, Laszlo Bacsardi, Sandor Imre
2019 Infocommunications journal  
Quantum key distribution (QKD) protocols represent an important practical application of quantum information theory.  ...  We review the principles of QKD systems, the implementation basis, and the application of QKD protocols in the standard Internet and the quantum Internet.  ...  quantum teleportation and quantum coding and an entangled network structure.  ... 
doi:10.36244/icj.2019.2.2 fatcat:no7rpoy2uzd2jazrscluzygwei

Belief propagation decoding of quantum channels by passing quantum messages

Joseph M. Renes
2017 2017 IEEE International Symposium on Information Theory (ISIT)  
Thanks also to Narayanan Rengaswamy for pointing out an error in in a previous version of this paper.  ...  This work was supported by the Swiss National Science Foundation (SNSF) via the National Centre of Competence in Research 'QSIT', and by the European Commission via the project 'RAQUEL'.  ...  Indeed, in modern coding theory BP is simply indispensible [2] .  ... 
doi:10.1109/isit.2017.8006824 dblp:conf/isit/Renes17a fatcat:u65twvngiveqjncpwh7kra36xe

Key distribution in PKC through Quantas

Aditya Goel
2010 International Journal on Applications of Graph Theory In wireless Ad Hoc Networks And sensor Networks  
Thus, Quantum Cryptography is a way of descripting any information in the form of quantum particles. There are no classical cryptographic systems which are perfectly secure.  ...  In the view of increasing need of Network and Information Security, we do require methods to overcome the Molecular Computing technologies (A future technology) and other techniques of the various codebrakers  ...  The world' s first computer network protected by quantum cryptography was implemented in October 2008, at a scientific conference in Vienna.  ... 
doi:10.5121/jgraphhoc.2010.2109 fatcat:3b7enxfij5f6ljalce352xgmhi
« Previous Showing results 1 — 15 out of 17,152 results