Keywords
Affiliated Institutions
Related Publications
Adiabatic quantum computation
Adiabatic quantum computing (AQC) started as an approach to solving optimization problems, and has evolved into an important universal alternative to the standard circuit model ...
Secure quantum key distribution with realistic devices
In principle, quantum key distribution (QKD) offers information-theoretic security based on the laws of physics. In practice, however, the imperfections of realistic devices mig...
The Theory of Quantum Information
This largely self-contained book on the theory of quantum information focuses on precise mathematical formulations and proofs of fundamental facts that form the foundation of th...
Optimal eavesdropping in quantum cryptography. I. Information bound and optimal strategy
We consider the Bennett-Brassard cryptographic scheme, which uses two conjugate quantum bases. An eavesdropper who attempts to obtain information on qubits sent in one of the ba...
High-Fidelity Quantum Logic Gates Using Trapped-Ion Hyperfine Qubits
We demonstrate laser-driven two-qubit and single-qubit logic gates with respective fidelities 99.9(1)% and 99.9934(3)%, significantly above the ≈99% minimum threshold level requ...
Publication Info
- Year
- 2016
- Type
- article
- Volume
- 2
- Issue
- 1
- Citations
- 953
- Access
- Closed
External Links
Social Impact
Social media, news, blog, policy document mentions
Citation Metrics
Cite This
Identifiers
- DOI
- 10.1038/npjqi.2015.23