- Quantum Information and Cryptography
- Quantum Computing Algorithms and Architecture
- Quantum Mechanics and Applications
- Particle Detector Development and Performance
- Cryptography and Data Security
- Spectroscopy and Quantum Chemical Studies
- Quantum-Dot Cellular Automata
- Matrix Theory and Algorithms
- Radiation Detection and Scintillator Technologies
- graph theory and CDMA systems
- Nuclear Physics and Applications
- Neural Networks and Reservoir Computing
- Mathematical Analysis and Transform Methods
- Quantum and electron transport phenomena
- Quantum optics and atomic interactions
- Astrophysics and Cosmic Phenomena
- Algebraic and Geometric Analysis
- Image and Signal Denoising Methods
- CCD and CMOS Imaging Sensors
- Advanced Topics in Algebra
- Cold Atom Physics and Bose-Einstein Condensates
- Mathematical functions and polynomials
- Cryptographic Implementations and Security
- Advanced Optimization Algorithms Research
- Advanced Decision-Making Techniques
Chinese Academy of Sciences
2018-2025
University of Science and Technology of China
2015-2025
National Center for Nanoscience and Technology
2025
Harbin Engineering University
2023
Hangzhou Normal University
2017-2022
Institute of Computing Technology
2020
Hubei Normal University
2020
Henan Normal University
2019
National Institute of Informatics
2015-2017
Singapore University of Technology and Design
2014-2015
Uncertainty relations provide constraints on how well the outcomes of incompatible measurements can be predicted, and as being fundamental to our understanding quantum theory, they have practical applications such for cryptography witnessing entanglement. Here we shed new light entropic form these relations, showing that follow from a few simple properties, including data-processing inequality. We prove without relying exact expression entropy, hence show single technique applies several...
A Holevo measure is used to discuss how much information about a given positive operator valued (POVM) on system $a$ present in another $b$, and this influences the presence or absence of different POVM third $c$. The main goal extend theorems for mutually unbiased bases general arbitrary POVMs, especially generalize ``all-or-nothing'' located tripartite systems case partial information, form quantitative inequalities. Some inequalities can be viewed as entropic uncertainty relations that...
Homomorphic encryption is a form of which allows computation to be carried out on the encrypted data without need for decryption. The success quantum approaches related tasks in delegated setting has raised question whether mechanics may used achieve information-theoretically-secure fully homomorphic encryption. Here we show, via an information localization argument, that deterministic necessarily incurs exponential overhead if perfect security required.
A quasi-discrete Hankel transform (QDHT) is presented as a new and efficient framework for numerical evaluation of the zero-order transform. discrete form Parseval's theorem obtained first time to authors' knowledge, matrix discussed. It shown that S factor, defined products truncated radius, critical building QDHT.
Graph states are generalized from qubits to collections of $n$ qudits arbitrary dimension $D$, and simple graphical methods used construct both additive nonadditive, as well degenerate nondegenerate, quantum-error-correcting codes. Codes distance 2 saturating the quantum Singleton bound for arbitrarily large $D$ constructed using graphs, except when is odd even. Computer searches have produced a number codes with distances 3 4, some previously known new. The concept stabilizer extended...
Synthetic circular RNA (circRNA) holds great promise for biomedical research and therapeutic applications, but impurities introduced during synthesis trigger innate immune responses significantly compromise its efficacy. In this study, key immunogenic byproducts, including double-stranded RNA, 5' triphosphates from uncircularized hydrolyzed fragments, are identified as impairing circRNA functionality via RNA-sensing pathways. To address this, a multi-step purification process is developed...
Private set intersection (PSI) enables parties to compute the of their inputs without leaking any additional information. Recently, there have been significant advances in two-party settings with malicious security, making PSI truly practical even compared naive insecure method. However, efficient solutions more general case (multi-party) are only known for semi-honest setting. How construct a multi-party solution (especially large inputs) setting remains an important open question this...
Any bipartite nonlocal unitary operation can be carried out by teleporting a quantum state from one party to the other, performing gate locally, and back again. This paper investigates unitaries which using less prior entanglement classical communication than are needed for teleportation. Large families of such constructed (projective) representations finite groups. Among tools employed are: diagrammatic approach representing entangled states, theorem on necessary absence information at...
Implementing nonlocal unitary operators is an important and hard question in quantum computing cryptography. We show that any bipartite operator of Schmidt rank three on the $({d}_{A}\ifmmode\times\else\texttimes\fi{}{d}_{B})$-dimensional system locally equivalent to a controlled when ${d}_{A}$ at most three. This can be implemented assisted by maximally entangled state $r=\mathrm{min}{{d}_{A}^{2},{d}_{B}}$. further stochastic-equivalent are indeed equivalent, propose sufficient condition...
Cat-state qubits (qubits encoded with cat states) have recently drawn intensive attention due to their enhanced life times quantum error correction. We here propose a method implement universal controlled-phase gate of two cat-state qubits, via microwave resonators coupled superconducting transmon qutrit. During the operation, qutrit remains in ground state; thus decoherence from is greatly suppressed. This proposal requires only basic operations and neither classical pulse nor measurement...
The underlying mechanisms for one photon phase control are revealed through a master equation approach. Specifically, two identified, operating on the laser time scale and other of system-bath interaction. effect secular non-secular Markovian approximations carefully examined.
To generate a NOON state with large photon number $N$, the of operational steps could be and fidelity will decrease rapidly $N$. Here we propose method to type quantum entangled states, $(|NN00\ensuremath{\rangle}+|00NN\ensuremath{\rangle})/\sqrt{2}$, called ``double NOON'' setup two superconducting flux qutrits five circuit cavities. This scheme operates essentially by employing two-photon process; i.e., photons are simultaneously separately emitted into cavities when each coupler qutrit is...
A system of diagrams is introduced that allows the representation various elements a quantum circuit, including measurements, in form which makes no reference to time (hence ``atemporal''). It can be used relate dynamical properties those entangled states (map-state duality), and suggests useful analogies, such as inverse an ket. Diagrams clarify role channel kets, transition operators, operators (matrices), Kraus rank for noisy channels. Positive (semidefinite) are represented by with...
We experimentally simulate a quantum channel in linear optical setup, which is modeled by two-level system (i.e., qubit) interacting with bosonic bath. Unlike the traditional works, we treat system–bath interaction without applying Born approximation, Markov or rotating-wave approximation (RWA). To best of our knowledge, this first experimental simulation any approximations mentioned above using devices. This non-RWA provides more accurate picture open-system dynamics. It not only reveals...
We show that any unitary operator on the ${d}_{A}\ifmmode\times\else\texttimes\fi{}{d}_{B}$ system $({d}_{A}\ensuremath{\ge}2)$ can be decomposed into product of at most $4{d}_{A}\ensuremath{-}5$ controlled operators. The number reduced to $2{d}_{A}\ensuremath{-}1$ when ${d}_{A}$ is a power two. also prove three unitaries implement bipartite complex permutation operator, and discuss connection an analogous result classical reversible circuits. further $n$-partite space...
It is known that any bipartite unitary operator of Schmidt rank 3 equivalent to a controlled under local unitaries. We propose standard form such operators. Using the we improve upper bound for entanglement cost implement operators operations and classical communications (LOCC), provide corresponding protocol. A part our protocol based on recursive-control which helpful implementing other show permutation can be implemented using LOCC two ebits. give protocols unitaries $r$ showed one uses...
The aim of this study is to design and evaluate a simple free running Analog-Digital Converter (ADC) based on the Field Programmable Gate Array (FPGA) device accomplish energy position readout silicon photomultiplier (SiPM) array for application as PET scanners. This FPGA-ADC carry chain Time-Digital (TDC) implemented Kintex-7 FPGA consists only one off-chip resistor so it has greater advantages in improving system integration reducing cost than commercial chips. In paper, front-end...
We derive the integral representation of a fractional Hankel transform (FRHT) from Fourier transform. Some basic properties FRHT such as Parseval's theorem and its optical implementation are discussed qualitatively.
We prove that every unitary acting on any multipartite system and having operator Schmidt rank equal to 2 can be diagonalized by local unitaries. This then implies such is locally equivalent a controlled with party but one controlling set of unitaries the last party. also bipartite where either chosen as control, at least control two terms, which each implemented using operations classical communication (LOCC) maximally entangled state qubits. These results hold regardless dimensions systems acts.
We show that if a set of four mutually unbiased bases (MUBs) in exists and contains the identity, then any other basis at most two product states same time has Schmidt rank least three. Here both are defined over bipartite space . also investigate connection Sinkhorn normal form unitary matrices to fact there is one vector orthonormal dimension.
Nonlocal unitary operations can create quantum entanglement between distributed particles, and the quantification of created is a hard problem. It corresponds to concepts entangling assisted power when input states are, respectively, product arbitrary pure states. We analytically derive them for Schmidt-rank-two bipartite some complex permutation unitaries. In particular, Schmidt rank three take only one two values: $\log_2 9 - 16/9$ or 3$ ebits. The power, disentangling $2\times d_B$...