Quantum Programming and Circuits Workshop
The workshop aims at bringing together researchers from quantum computing and classical programming languages.
The workshop aims at bringing together researchers from quantum computing and classical programming languages.
Quantum key distribution (QKD) can be implemented in both so-called
entanglement-based (EB) and prepare-and-measure (PM) configurations. There is a certain degree of equivalence between EB and PM schemes from the point of view of security analysis that has been heavily exploited in the literature over the last fifteen years or so, where a given PM protocol is reduced to an equivalent EB protocol (following the BBM92 argument) whose security is then proved.
In 1981, Richard Feynman proposed a device called a “quantum computer” to take advantage of the laws of quantum physics to achieve computational speed-ups over classical methods. Quantum computing promises to revolutionize how we compute.
The topological color code and the toric code are two leading candidates for realizing fault-tolerant quantum computation. In the talk, I will introduce these two models and show their equivalence in d dimensions. I will describe codes with or without boundaries, and explain what insights one gets in the former case by looking at the condensation of anyonic excitations on the boundaries. I will conclude with a recipe of how one can implement fault-tolerantly a logical non-Pauli gate in the toric code in d dimensions.
The quantum capacity of a memoryless channel is often used as a single figure of merit to characterize its ability to transmit quantum information coherently. The capacity determines the maximal rate at which we can code reliably over asymptotically many uses of the channel. We argue that this asymptotic treatment is insufficient to the point of being irrelevant in the quantum setting where decoherence severely limits our ability to manipulate large quantum systems in the encoder and decoder.
Abstract:
In 2001 RuggedCom was a fledging startup. A decade later it was bought by Siemens for nearly half a billion dollars. Mr. Pozzuoli, its founder, will discuss its path to success and the role played in that success by the Canadian experience and the strategies outlined in Geoffrey Moore’s iconic book “Crossing the Chasm”.
Biography:
Quantum technologies are based on the manipulation of individual degrees of freedom of quantum systems with exquisite precision. Achieving this in a real environment requires pushing to the limits the ability to control the dynamics of quantum systems of increasing complexity. Optimal control techniques are known to enable steering the dynamics of few-body systems in order to prepare a desired state or perform a desired unitary transformation.
Is it possible to check a quantum computer's work? A quantum computation leaves behind no transcript, and for problems outside nondeterministic polynomial time (NP), it is not immediately clear whether we can verify that a quantum computation has been one correctly. Interactive proofs and self-testing offer a means of doing so.
Ultracold atoms in optical lattices have enabled to probe strongly interacting many-body phases in new parameter regimes and with powerful new observation techniques.
From the viewpoint of resource theory, we establish the coherence
theory in an operational way. Namely we introduce the two basic concepts
— “coherence distillation” and “coherence cost” in the coherence
transformation processing and show that the evaluations of them are
reduced to single-letter formula: the coherence distillation is given by
the relative entropy of coherence (or in other words, we give the
relative entropy of coherence its operational interpretation) and the