Zobrazeno 1 - 10
of 136
pro vyhledávání: '"Tan, Si Hui"'
Publikováno v:
In Journal of Solid State Chemistry July 2023 323
Publikováno v:
Phys. Rev. Research 2, 013332 (2020)
Future quantum computers are likely to be expensive and affordable outright by few, motivating client/server models for outsourced computation. However, the applications for quantum computing will often involve sensitive data, and the client would li
Externí odkaz:
http://arxiv.org/abs/1902.10972
The engineering challenges involved in building large scale quantum computers, and the associated infrastructure requirements, mean that when such devices become available it is likely that this will be in limited numbers and in limited geographic lo
Externí odkaz:
http://arxiv.org/abs/1811.11929
Publikováno v:
Phys. Rev. A 100, 062309 (2019)
We present a verifiable and blind protocol for assisted universal quantum computing on continuous-variable (CV) platforms. This protocol is highly experimentally-friendly to the client, as it only requires Gaussian-operation capabilities from the lat
Externí odkaz:
http://arxiv.org/abs/1806.09137
Autor:
Tan, Si-Hui, Rohde, Peter P.
Linear optics has seen a resurgence for applications in quantum information processing owing to its miniaturisation on-chip, and increase in production efficiency and quality of single photons. Time-bin encodings have also become feasible owing to ar
Externí odkaz:
http://arxiv.org/abs/1805.11827
Autor:
Zeuner, Jonas, Pitsios, Ioannis, Tan, Si-Hui, Sharma, Aditya N., Fitzsimons, Joseph F., Osellame, Roberto, Walther, Philip
Quantum computers promise not only to outperform classical machines for certain important tasks, but also to preserve privacy of computation. For example, the blind quantum computing protocol enables secure delegated quantum computation, where a clie
Externí odkaz:
http://arxiv.org/abs/1803.10246
Publikováno v:
In Polyhedron 15 May 2022 218
Publikováno v:
Phys. Rev. A 97, 042308 (2018)
We present a scheme for implementing homomorphic encryption on coherent states encoded using phase-shift keys. The encryption operations require only rotations in phase space, which commute with computations in the codespace performed via passive lin
Externí odkaz:
http://arxiv.org/abs/1710.03968
Publikováno v:
Phys. Rev. A 96, 052333 (2017)
A (k,n)-threshold secret-sharing scheme allows for a string to be split into n shares in such a way that any subset of at least k shares suffices to recover the secret string, but such that any subset of at most k-1 shares contains no information abo
Externí odkaz:
http://arxiv.org/abs/1702.03689
Publikováno v:
Phys. Rev. A 95, 022333 (2017)
We cast the problem of illuminating an object in a noisy environment into a communication protocol. A probe is sent into the environment, and the presence or absence of the object constitutes a signal encoded on the probe. The probe is then measured
Externí odkaz:
http://arxiv.org/abs/1611.10020