QIC Abstracts

 Vol.19 No.7&8, June 1, 2019

Research Articles:

Switching and partially switching the hypercube while maintaining perfect state transfer (pp0541-0554)
          
Steve Kirkland, Sarah Plosker, and Xiaohong Zhang
A graph is said to exhibit perfect state transfer (PST) if one of its corresponding Hamiltonian matrices, which are based on the vertex-edge structure of  the graph, gives rise to PST in a quantum information-theoretic context, namely with respect to inter-qubit interactions of a quantum  system. We perform various perturbations to the hypercube graph---a graph that is known to exhibit PST---to create graphs that maintain many of the same properties of the hypercube, including PST as well as the distance for which PST occurs. We show that the sensitivity with respect to readout time errors remains unaffected for the vertices involved in PST. We give motivation for when these perturbations may be physically desirable or even necessary.

Improving quantum spatial search in two dimensions (pp0555-0574)
          
Abhijith J. and Apoorva Patel
The question of whether quantum spatial search in two dimensions can be made optimal has long been an open problem. We report progress towards its resolution by showing that the oracle complexity for target location can be made optimal, by increasing the number of calls to the walk operator that incorporates the graph structure by a logarithmic factor. Our algorithm does not require amplitude amplification. An important ingredient of our algorithm is the implementation of multi-step quantum walks by graph powering, using a coin space of walk-length dependent dimension, which may be of independent interest. Finally, we demonstrate how to implement quantum walks arising from powers of symmetric Markov chains using our methods.

Cohering power and decohering power of Gaussian unitary operations (pp0575-0586)
          
Yangyang Wang, Xiaofei Qi, Jinchuan Hou, and Rufen Ma
Having a suitable measure to quantify the coherence of quantum states, a natural task is to evaluate the power of  quantum channels for creating or destroying the coherence of  input quantum states. In the present paper, by introducing the maximal coherent Gaussian states based on the relative entropy measure of coherence, we propose  the (generalized) cohering power and the (generalized) decohering power of Gaussian unitary operations for continuous-variable systems. Some basic properties are obtained and the cohering power and decohering power of two special kinds of Gaussian unitary operations are calculated.

Eavesdropping on quantum secret sharing protocols based on ring topology (pp0587-0600)
          
Dong Jiang, Yongkai Yang, Qisheng Guang, Chaohui Gao, and Lijun Chen
Quantum secret sharing (QSS) is the process of splitting a secret message into multiple parts such that no subset of parts is sufficient to reconstruct the secret message, but the entire set is. Ever since the first protocol was proposed, QSS has attracted intensive study, and many protocols have been proposed and implemented over recent years. However, we discover that several ring-topology based QSS protocols cannot resist Trojan-horse attacks. In this paper, we first give a modified Trojan-horse attack strategy and show that the eavesdropper can obtain any player's private data and the dealer's secret message without leaving any trace. Then we show that existing defense strategies cannot resist our attack. To defeat such attacks, we design a defense strategy based on quantum memory and evaluate its performance. The evaluation results indicate that the eavesdropper's attack significantly increases the quantum bit error rate and can thus be detected.

A complete characterization of pretty good state transfer on paths (pp0601-0608)
          
Christopher M. van Bommel
We give a complete characterization of pretty good state transfer on paths between any pair of vertices with respect to the quantum walk model determined by the XY-Hamiltonian.  If $n$ is the length of the path, and the vertices are indexed by the positive integers from 1 to $n$, with adjacent vertices having consecutive indices, then the necessary and sufficient conditions for pretty good state transfer between vertices $a$ and $b$ are that (a) $a + b = n + 1$, (b) $n + 1$ has at most one positive odd non-trivial divisor, and (c) if $n = 2^t r - 1$, for $r$ odd and $r \neq 1$, then $a$ is a multiple of $2^{t - 1}$.

Quantum speedup of training radial basis function networks (pp0609-0625)
          
Changpeng Shao
Radial basis function (RBF) network is a simple but useful neural network model that contains wide applications in machine learning. The training of an RBF network reduces to solve a linear system, which is time consuming classically. Based on HHL algorithm, we propose two quantum algorithms to train RBF networks. To apply the HHL algorithm, we choose using the Hamiltonian simulation algorithm proposed in [P. Rebentrost, A. Steffens, I. Marvian and S. Lloyd, Phys. Rev. A 97, 012327, 2018]. However, to use this result, an oracle to query the entries of the matrix of the network should be constructed. We apply the amplitude estimation technique to build this oracle. The final results indicate that if the centers of the RBF network are the training samples, then the quantum computer achieves exponential speedup at the number and the dimension of training samples over the classical computer; if the centers are determined by the $K$-means algorithm, then the quantum computer achieves quadratic speedup at the number of samples and exponential speedup at the dimension of samples.

back to QIC online Front page