A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2017; you can also visit the original URL.
The file type is application/pdf
.
Filters
Polar Codes in Network Quantum Information Theory
2016
IEEE Transactions on Information Theory
In the present work, we apply the polar coding method to network quantum information theory, by making use of recent advances for related classical tasks. ...
Thus, our work paves the way for developing network quantum information theory further without requiring a quantum simultaneous decoder. ...
In this work we apply the technique to network quantum information theory and in particular to compound classical-quantum multiple access and interference channels. ...
doi:10.1109/tit.2016.2514319
fatcat:3dpxnzzwd5fnbkywqeos457t5u
Branching MERA codes: A natural extension of classical and quantum polar codes
2014
2014 IEEE International Symposium on Information Theory
We perform an in-depth study of a particular example that can be thought of as an extension to Arikan's polar code [2]-[4]. ...
We introduce a new class of circuits for constructing efficiently decodable quantum and classical error-correction codes, based on a recently discovered contractible tensor network known as branching multi-scale ...
DP would like to acknowledge support from NSERC and FQRNT through the network INTRIQ. Computational resources were provided by Compute Canada and Calcul Québec. ...
doi:10.1109/isit.2014.6874999
dblp:conf/isit/FerrisP14
fatcat:bvi3ip55rngrfbkpxtlx7cvvoy
Table of contents
2021
IEEE Transactions on Information Theory
Mayo Mutually Unbiased Equiangular Tight Frames 1656 QUANTUM INFORMATION THEORY M. Mosonyi and T. ...
Kschischang Information Density in Multi-Layer Resistive Memories 1446 SEQUENCES AND CRYPTOGRAPHY M. Fickus and B. R. ...
COMMUNICATIONS, COMMUNICATION NETWORKS A. Haghi ...
doi:10.1109/tit.2021.3057963
fatcat:5kq77cmhnrhq3l5ltrw26zelde
A Study of Quantum Information and Quantum Computers
2014
Oriental Journal of Chemistry
a way that can be used to transfer the quantum information from the quantum states such as linear polarization and rounded photon , electron spin or neutron and etc , can be used for making the in penetrable ...
Though quantum networks are so suitable for making safe information and high speed ABSTRACT In this article we will proceed to check of quantum computers structure i.e.qubits in different states by quantum ...
physics system in quantum mechanics theory , we can from the filament of qubits that we will point to them:
Photon: the linear polarization of photon for example in direction of (?) ...
doi:10.13005/ojc/300227
fatcat:6tponsoqijdojoe3hybemyvu2y
A Quantum Key-based Mobile Security Payment Scheme
2019
International Journal of Performability Engineering
Then, the quantum key was safely obtained and the QR (quick response) code was generated by using the proposed quantum key gateway. ...
In view of the safety problem of current mobile security payment encryption schemes, this paper proposed a quantum key-based MSP (mobile security payment) scheme. ...
Generally, the BB84 protocol employs a single photon to transmit information and uses photon polarization states as the information coding object. ...
doi:10.23940/ijpe.19.08.p16.21652172
fatcat:nq4n6ii6enc2hpua4qfeg2uqsa
Polar Codes for Classical-Quantum Channels
2013
IEEE Transactions on Information Theory
First, we leverage several known results from the quantum information literature to demonstrate that the channel polarization effect occurs for channels with classical inputs and quantum outputs. ...
We also demonstrate that a quantum successive cancellation decoder works well, in the sense that the word error rate decays exponentially with the blocklength of the code. ...
ACKNOWLEDGMENT We thank David Forney, MIT for suggesting us to try polar codes for the quantum channel. We also thank Emre Telatar, EPFL for an intuitive tutorial on channel polarization at ISIT 2011. ...
doi:10.1109/tit.2012.2218792
fatcat:5wfwnyotbrbzzbdxekfm54hepu
Refining Quantum Cryptography
2011
Science
QKD has provable security based on information theory, and forward secrecy. Quantum key distribution is only used to produce and distribute a key, not to transmit any message data. ...
encoding information in quantum states, or qubits, as opposed to classical communication's use of bits. ...
However, from a coding theory point of view information reconciliation is essentially source coding with side information, in consequence any coding scheme that works for this problem can be used for information ...
doi:10.1126/science.1208527
pmid:21921186
fatcat:ejl6547pdjbcxjp753me6m4a5u
An improved rate region for the classical-quantum broadcast channel
2015
2015 IEEE International Symposium on Information Theory (ISIT)
The proof of achievability is based on the recently introduced polar coding scheme and its generalization to quantum network information theory. ...
We present a new achievable rate region for the two-user binary-input classical-quantum broadcast channel. ...
This work was supported by the EU grants SIQS and QFTCMPS and by the cluster of excellence EXC 201 Quantum Engineering and Space-Time Research. ...
doi:10.1109/isit.2015.7282963
dblp:conf/isit/HircheM15
fatcat:62s6aobpe5buteiveqzn6bc6pu
Quantum Technology: Advances and Trends
2020
American Journal of Engineering and Applied Sciences
In this study, we present the advances and trends of quantum technology. ...
Specifically, the advances and trends cover quantum computers and Quantum Processing Units (QPUs), quantum computation and quantum machine learning, quantum network, Quantum Key Distribution (QKD), quantum ...
An asymptotically secret as well as correctable quantum network code was presented as the quantum extension of classical network codes. ...
doi:10.3844/ajeassp.2020.254.264
fatcat:7jxucmol7zg6pd6ivcwozzwzau
Table of Contents
2021
2021 IEEE International Symposium on Information Theory (ISIT)
QUANTUM INFORMATION THEORY D3-T4-S5.1: FINITE BLOCK LENGTH ANALYSIS ON QUANTUM COHERENCE ........................................... 1326 DISTILLATION AND INCOHERENT RANDOMNESS EXTRACTION Masahito Hayashi ...
Schaefer, University of Siegen, Germany D3-T1-S7: TOPICS IN NETWORK CODING II D3-T1-S7.1: INTRABLOCK INTERLEAVING FOR BATCHED NETWORK CODING ....................................... 1409 WITH BLOCKWISE ...
doi:10.1109/isit45174.2021.9518212
fatcat:vkpbkhd3kzaxtcwe53osdnt6ku
Quantum Information and Entanglement
2010
Advances in Mathematical Physics
roles in quantum information processing such as quantum computation, quantum teleportation, dense coding, quantum error correction, quantum cryptographic schemes, entanglement swapping, and remote states ...
Rocchi introduces a short survey on recent information theories and reviews some critical notes concerning the conceptualization of information in classical and quantum physics. ...
doi:10.1155/2010/657878
fatcat:4a4puc7kvjbgnbles55nncivjq
Quantum cryptography
[article]
2011
arXiv
pre-print
This is a chapter on quantum cryptography for the book "A Multidisciplinary Introduction to Information Security" to be published by CRC Press in 2011/2012. ...
The chapter aims to introduce the topic to undergraduate-level and continuing-education students specializing in information and communication technology. ...
Further Reading and Web Sites The web site http://www.iet.ntnu.no/groups/optics/qcr/ of our Quantum Hacking group presents how industrial implementations of the quantum key distribution system can be broken ...
arXiv:1108.1718v1
fatcat:qtmiplhnujcxzcvohi3vims3am
A Survey on Quantum Key Distribution
2019
Infocommunications journal
Quantum key distribution (QKD) protocols represent an important practical application of quantum information theory. ...
We review the principles of QKD systems, the implementation basis, and the application of QKD protocols in the standard Internet and the quantum Internet. ...
quantum teleportation and quantum coding and an entangled network structure. ...
doi:10.36244/icj.2019.2.2
fatcat:no7rpoy2uzd2jazrscluzygwei
Belief propagation decoding of quantum channels by passing quantum messages
2017
2017 IEEE International Symposium on Information Theory (ISIT)
Thanks also to Narayanan Rengaswamy for pointing out an error in in a previous version of this paper. ...
This work was supported by the Swiss National Science Foundation (SNSF) via the National Centre of Competence in Research 'QSIT', and by the European Commission via the project 'RAQUEL'. ...
Indeed, in modern coding theory BP is simply indispensible [2] . ...
doi:10.1109/isit.2017.8006824
dblp:conf/isit/Renes17a
fatcat:u65twvngiveqjncpwh7kra36xe
Key distribution in PKC through Quantas
2010
International Journal on Applications of Graph Theory In wireless Ad Hoc Networks And sensor Networks
Thus, Quantum Cryptography is a way of descripting any information in the form of quantum particles. There are no classical cryptographic systems which are perfectly secure. ...
In the view of increasing need of Network and Information Security, we do require methods to overcome the Molecular Computing technologies (A future technology) and other techniques of the various codebrakers ...
The world' s first computer network protected by quantum cryptography was implemented in October 2008, at a scientific conference in Vienna. ...
doi:10.5121/jgraphhoc.2010.2109
fatcat:3b7enxfij5f6ljalce352xgmhi
« Previous
Showing results 1 — 15 out of 17,152 results