Pub Date : 2025-02-17DOI: 10.1109/TQE.2025.3542484
Marc Jofre
The combination of quantum and telecommunication networks enables to revolutionize the way information is used, offering unparalleled capabilities and making it an ideal choice for many critical applications. In this sense, quantum protocols generally have a unique requirement to have strict time synchronization in order to operate, which generally consume quantum resources of part of the exchanged qubits. Accordingly, work demonstrates and characterizes a temporal alignment mechanism for quantum networks based on frequency testing, allowing to preserve the quantum state of qubits. The time synchronization correction achieved is within 100 ns working at 5 MHz with temporal and relative frequency offsets commonly acquired in quantum links using conventional hardware clocks with temporal stability in the range of $10^{-8}$ and 200-ns jitter.
{"title":"Qubit Rate Modulation-Based Time Synchronization Mechanism for Multinode Quantum Networks","authors":"Marc Jofre","doi":"10.1109/TQE.2025.3542484","DOIUrl":"https://doi.org/10.1109/TQE.2025.3542484","url":null,"abstract":"The combination of quantum and telecommunication networks enables to revolutionize the way information is used, offering unparalleled capabilities and making it an ideal choice for many critical applications. In this sense, quantum protocols generally have a unique requirement to have strict time synchronization in order to operate, which generally consume quantum resources of part of the exchanged qubits. Accordingly, work demonstrates and characterizes a temporal alignment mechanism for quantum networks based on frequency testing, allowing to preserve the quantum state of qubits. The time synchronization correction achieved is within 100 ns working at 5 MHz with temporal and relative frequency offsets commonly acquired in quantum links using conventional hardware clocks with temporal stability in the range of <inline-formula> <tex-math>$10^{-8}$</tex-math></inline-formula> and 200-ns jitter.","PeriodicalId":100644,"journal":{"name":"IEEE Transactions on Quantum Engineering","volume":"6 ","pages":"1-10"},"PeriodicalIF":0.0,"publicationDate":"2025-02-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10891179","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143611832","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In silicon quantum computers, a single electron is trapped in a microstructure called a quantum dot, and its spin is used as a qubit. For large-scale integration of qubits, we previously proposed an approach of sharing a control gate in the row or column of a 2-D quantum dot array. In our array, the shuttling of electrons is a useful technique to operate the target qubit independently and avoid crosstalk. However, since the shuttling is also conducted using shared control gates, the movement of qubits is complexly constrained. We, therefore, propose a formal model based on state transition systems to describe those constraints and operation procedures on the array. We also present an approach to generate operation procedures under the constraints. Utilizing this approach, we present a concrete method for our 16 × 8 quantum dot array. By implementing the proposed method as a quantum compiler, we confirmed that it is possible to generate operation procedures in a practical amount of time for arbitrary quantum circuits. We also demonstrated that crosstalk can be avoided by shuttling and that the fidelity in that case is higher than when crosstalk is not avoided.
{"title":"Generating Shuttling Procedures for Constrained Silicon Quantum Dot Array","authors":"Naoto Sato;Tomonori Sekiguchi;Takeru Utsugi;Hiroyuki Mizuno","doi":"10.1109/TQE.2025.3542462","DOIUrl":"https://doi.org/10.1109/TQE.2025.3542462","url":null,"abstract":"In silicon quantum computers, a single electron is trapped in a microstructure called a quantum dot, and its spin is used as a qubit. For large-scale integration of qubits, we previously proposed an approach of sharing a control gate in the row or column of a 2-D quantum dot array. In our array, the shuttling of electrons is a useful technique to operate the target qubit independently and avoid crosstalk. However, since the shuttling is also conducted using shared control gates, the movement of qubits is complexly constrained. We, therefore, propose a formal model based on state transition systems to describe those constraints and operation procedures on the array. We also present an approach to generate operation procedures under the constraints. Utilizing this approach, we present a concrete method for our 16 × 8 quantum dot array. By implementing the proposed method as a quantum compiler, we confirmed that it is possible to generate operation procedures in a practical amount of time for arbitrary quantum circuits. We also demonstrated that crosstalk can be avoided by shuttling and that the fidelity in that case is higher than when crosstalk is not avoided.","PeriodicalId":100644,"journal":{"name":"IEEE Transactions on Quantum Engineering","volume":"6 ","pages":"1-38"},"PeriodicalIF":0.0,"publicationDate":"2025-02-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10890998","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143621676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-11DOI: 10.1109/TQE.2025.3541123
Amar Abane;Michael Cubeddu;Van Sy Mai;Abdella Battou
Entanglement routing in near-term quantum networks consists of choosing the optimal sequence of short-range entanglements to combine through swapping operations to establish end-to-end entanglement between two distant nodes. Similar to traditional routing technologies, a quantum routing protocol uses network information to choose the best paths to satisfy a set of end-to-end entanglement requests. However, in addition to network state information, a quantum routing protocol must also take into account the requested entanglement fidelity, the probabilistic nature of swapping operations, and the short lifetime of entangled states. In this work, we formulate a practical entanglement routing problem and analyze and categorize the main approaches to address it, drawing comparisons to, and inspiration from, classical network routing strategies where applicable. We classify and discuss the studied quantum routing schemes into reactive, proactive, and hybrid routing.
{"title":"Entanglement Routing in Quantum Networks: A Comprehensive Survey","authors":"Amar Abane;Michael Cubeddu;Van Sy Mai;Abdella Battou","doi":"10.1109/TQE.2025.3541123","DOIUrl":"https://doi.org/10.1109/TQE.2025.3541123","url":null,"abstract":"Entanglement routing in near-term quantum networks consists of choosing the optimal sequence of short-range entanglements to combine through swapping operations to establish end-to-end entanglement between two distant nodes. Similar to traditional routing technologies, a quantum routing protocol uses network information to choose the best paths to satisfy a set of end-to-end entanglement requests. However, in addition to network state information, a quantum routing protocol must also take into account the requested entanglement fidelity, the probabilistic nature of swapping operations, and the short lifetime of entangled states. In this work, we formulate a practical entanglement routing problem and analyze and categorize the main approaches to address it, drawing comparisons to, and inspiration from, classical network routing strategies where applicable. We classify and discuss the studied quantum routing schemes into reactive, proactive, and hybrid routing.","PeriodicalId":100644,"journal":{"name":"IEEE Transactions on Quantum Engineering","volume":"6 ","pages":"1-39"},"PeriodicalIF":0.0,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10882978","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143570564","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-02-05DOI: 10.1109/TQE.2025.3538934
Mark A. Webster;Dan E. Browne
Quantum error correction and the use of quantum error correction codes are likely to be essential for the realization of practical quantum computing. Because the error models of quantum devices vary widely, quantum codes that are tailored for a particular error model may have much better performance. In this work, we present a novel evolutionary algorithm that searches for an optimal stabilizer code for a given error model, number of physical qubits, and number of encoded qubits. We demonstrate an efficient representation of stabilizer codes as binary strings, which allows for random generation of valid stabilizer codes as well as mutation and crossing of codes. Our algorithm finds stabilizer codes whose distance closely matches the best-known-distance codes of Grassl (2007) for $n leq 20$ physical qubits. We perform a search for optimal distance Calderbank–Steane–Shor codes and compare their distance to the best known codes. Finally, we show that the algorithm can be used to optimize stabilizer codes for biased error models, demonstrating a significant improvement in the undetectable error rate for $[[12,1]]_{2}$ codes versus the best-known-distance code with the same parameters. As part of this work, we also introduce an evolutionary algorithm QDistEvol for finding the distance of quantum error correction codes.
{"title":"Engineering Quantum Error Correction Codes Using Evolutionary Algorithms","authors":"Mark A. Webster;Dan E. Browne","doi":"10.1109/TQE.2025.3538934","DOIUrl":"https://doi.org/10.1109/TQE.2025.3538934","url":null,"abstract":"Quantum error correction and the use of quantum error correction codes are likely to be essential for the realization of practical quantum computing. Because the error models of quantum devices vary widely, quantum codes that are tailored for a particular error model may have much better performance. In this work, we present a novel evolutionary algorithm that searches for an optimal stabilizer code for a given error model, number of physical qubits, and number of encoded qubits. We demonstrate an efficient representation of stabilizer codes as binary strings, which allows for random generation of valid stabilizer codes as well as mutation and crossing of codes. Our algorithm finds stabilizer codes whose distance closely matches the best-known-distance codes of Grassl (2007) for <inline-formula><tex-math>$n leq 20$</tex-math></inline-formula> physical qubits. We perform a search for optimal distance Calderbank–Steane–Shor codes and compare their distance to the best known codes. Finally, we show that the algorithm can be used to optimize stabilizer codes for biased error models, demonstrating a significant improvement in the undetectable error rate for <inline-formula><tex-math>$[[12,1]]_{2}$</tex-math></inline-formula> codes versus the best-known-distance code with the same parameters. As part of this work, we also introduce an evolutionary algorithm QDistEvol for finding the distance of quantum error correction codes.","PeriodicalId":100644,"journal":{"name":"IEEE Transactions on Quantum Engineering","volume":"6 ","pages":"1-14"},"PeriodicalIF":0.0,"publicationDate":"2025-02-05","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10874169","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143564005","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-29DOI: 10.1109/TQE.2025.3535823
Alessio Di Santo;Walter Tiberti;Dajana Cassioli
Quantum secret sharing (QSS) is a cryptographic protocol that leverages quantum mechanics to distribute a secret among multiple parties. With respect to the classical counterpart, in QSS, the secret is encoded into quantum states and shared by a dealer such that only an authorized subsets of participants, i.e., the players, can reconstruct it. Several state-of-the-art studies aim to transpose classical secret sharing into the quantum realm, while maintaining their reliance on traditional network topologies (e.g., star, ring, and fully connected), and require that all the $n$ players calculate the secret. These studies exploit the Greenberger–Horne–Zeilinger state, which is a type of maximally entangled quantum state involving three or more qubits. However, none of these works account for redundancy, enhanced security/privacy features, or authentication mechanisms able to fingerprint players. To address these gaps, in this article, we introduce a new concept of QSS, which leans on a generic distributed quantum network, based on a threshold scheme, where all the players collaborate also to the routing of quantum information among them. The dealer, by exploiting a custom flexible weighting system, takes advantage of a newly defined quantum Dijkstra algorithm to select the most suitable subset of $t$ players, out of the entire set on $n$ players, to involve in the computation. To fingerprint and authenticate users, CRYSTAL-Kyber primitives are adopted, while also protecting each player’s privacy by hiding their identities. We show the effectiveness and performance of the proposed protocol by testing it against the main classical and quantum attacks, thereby improving the state-of-the-art security measures.
{"title":"Security and Fairness in Multiparty Quantum Secret Sharing Protocol","authors":"Alessio Di Santo;Walter Tiberti;Dajana Cassioli","doi":"10.1109/TQE.2025.3535823","DOIUrl":"https://doi.org/10.1109/TQE.2025.3535823","url":null,"abstract":"Quantum secret sharing (QSS) is a cryptographic protocol that leverages quantum mechanics to distribute a secret among multiple parties. With respect to the classical counterpart, in QSS, the secret is encoded into quantum states and shared by a dealer such that only an authorized subsets of participants, i.e., the players, can reconstruct it. Several state-of-the-art studies aim to transpose classical secret sharing into the quantum realm, while maintaining their reliance on traditional network topologies (e.g., star, ring, and fully connected), and require that all the <inline-formula><tex-math>$n$</tex-math></inline-formula> players calculate the secret. These studies exploit the Greenberger–Horne–Zeilinger state, which is a type of maximally entangled quantum state involving three or more qubits. However, none of these works account for redundancy, enhanced security/privacy features, or authentication mechanisms able to fingerprint players. To address these gaps, in this article, we introduce a new concept of QSS, which leans on a generic distributed quantum network, based on a threshold scheme, where all the players collaborate also to the routing of quantum information among them. The dealer, by exploiting a custom flexible weighting system, takes advantage of a newly defined quantum Dijkstra algorithm to select the most suitable subset of <inline-formula><tex-math>$t$</tex-math></inline-formula> players, out of the entire set on <inline-formula><tex-math>$n$</tex-math></inline-formula> players, to involve in the computation. To fingerprint and authenticate users, CRYSTAL-Kyber primitives are adopted, while also protecting each player’s privacy by hiding their identities. We show the effectiveness and performance of the proposed protocol by testing it against the main classical and quantum attacks, thereby improving the state-of-the-art security measures.","PeriodicalId":100644,"journal":{"name":"IEEE Transactions on Quantum Engineering","volume":"6 ","pages":"1-18"},"PeriodicalIF":0.0,"publicationDate":"2025-01-29","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10857623","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143521454","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-28DOI: 10.1109/TQE.2025.3535319
{"title":"2024 Index IEEE Transactions on Quantum Engineering Vol. 5","authors":"","doi":"10.1109/TQE.2025.3535319","DOIUrl":"https://doi.org/10.1109/TQE.2025.3535319","url":null,"abstract":"","PeriodicalId":100644,"journal":{"name":"IEEE Transactions on Quantum Engineering","volume":"5 ","pages":"1-15"},"PeriodicalIF":0.0,"publicationDate":"2025-01-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10856694","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-20DOI: 10.1109/TQE.2025.3532017
Niclas Schillo;Andreas Sturm
The role of differential equations (DEs) in science and engineering is of paramount importance, as they provide the mathematical framework for a multitude of natural phenomena. Since quantum computers promise significant advantages over classical computers, quantum algorithms for the solution of DEs have received a lot of attention. Particularly interesting are algorithms that offer advantages in the current noisy intermediate-scale quantum (NISQ) era, characterized by small and error-prone systems. We consider a framework of variational quantum algorithms, quantum circuit learning (QCL), in conjunction with derivation methods, in particular the parameter shift rule, to solve DEs. As these algorithms were specifically designed for NISQ computers, we analyze their applicability on NISQ devices by implementing QCL on an IBM quantum computer. Our analysis of QCL without the parameter shift rule shows that we can successfully learn different functions with three-qubit circuits. However, the hardware errors accumulate with increasing number of qubits, and thus, only a fraction of the qubits available on the current quantum systems can be effectively used. We further show that it is possible to determine derivatives of the learned functions using the parameter shift rule on the IBM hardware. The parameter shift rule results in higher errors, which limits its execution to low-order derivatives. Despite these limitations, we solve a first-order DE on the IBM quantum computer. We further explore the advantages of using multiple qubits in QCL by learning different functions simultaneously and demonstrate the solution of a coupled DE on a simulator.
{"title":"Variational Quantum Algorithms for Differential Equations on a Noisy Quantum Computer","authors":"Niclas Schillo;Andreas Sturm","doi":"10.1109/TQE.2025.3532017","DOIUrl":"https://doi.org/10.1109/TQE.2025.3532017","url":null,"abstract":"The role of differential equations (DEs) in science and engineering is of paramount importance, as they provide the mathematical framework for a multitude of natural phenomena. Since quantum computers promise significant advantages over classical computers, quantum algorithms for the solution of DEs have received a lot of attention. Particularly interesting are algorithms that offer advantages in the current noisy intermediate-scale quantum (NISQ) era, characterized by small and error-prone systems. We consider a framework of variational quantum algorithms, quantum circuit learning (QCL), in conjunction with derivation methods, in particular the parameter shift rule, to solve DEs. As these algorithms were specifically designed for NISQ computers, we analyze their applicability on NISQ devices by implementing QCL on an IBM quantum computer. Our analysis of QCL without the parameter shift rule shows that we can successfully learn different functions with three-qubit circuits. However, the hardware errors accumulate with increasing number of qubits, and thus, only a fraction of the qubits available on the current quantum systems can be effectively used. We further show that it is possible to determine derivatives of the learned functions using the parameter shift rule on the IBM hardware. The parameter shift rule results in higher errors, which limits its execution to low-order derivatives. Despite these limitations, we solve a first-order DE on the IBM quantum computer. We further explore the advantages of using multiple qubits in QCL by learning different functions simultaneously and demonstrate the solution of a coupled DE on a simulator.","PeriodicalId":100644,"journal":{"name":"IEEE Transactions on Quantum Engineering","volume":"6 ","pages":"1-16"},"PeriodicalIF":0.0,"publicationDate":"2025-01-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10848114","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143455234","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-17DOI: 10.1109/TQE.2025.3530939
Ryutaroh Matsumoto
In some quantum secret sharing schemes, it is known that some shares can be distributed to participants before a secret is given to the dealer. However, it is unclear whether some shares can be distributed before a secret is given in the ramp quantum secret sharing schemes with the highest coding rate. This article proposes procedures to distribute some shares before a secret is given in those schemes. The new procedures enhance the applicability of the secret sharing schemes to wider scenarios as some participants can be unavailable when the dealer obtains the quantum secret. Then, it is proved that our new encoding procedures retain the correspondences between quantum secrets and quantum shares in the original schemes, which ensures that the highest coding rates of the original schemes are also retained.
{"title":"Advance Sharing Procedures for the Ramp Quantum Secret Sharing Schemes With the Highest Coding Rate","authors":"Ryutaroh Matsumoto","doi":"10.1109/TQE.2025.3530939","DOIUrl":"https://doi.org/10.1109/TQE.2025.3530939","url":null,"abstract":"In some quantum secret sharing schemes, it is known that some shares can be distributed to participants before a secret is given to the dealer. However, it is unclear whether some shares can be distributed before a secret is given in the ramp quantum secret sharing schemes with the highest coding rate. This article proposes procedures to distribute some shares before a secret is given in those schemes. The new procedures enhance the applicability of the secret sharing schemes to wider scenarios as some participants can be unavailable when the dealer obtains the quantum secret. Then, it is proved that our new encoding procedures retain the correspondences between quantum secrets and quantum shares in the original schemes, which ensures that the highest coding rates of the original schemes are also retained.","PeriodicalId":100644,"journal":{"name":"IEEE Transactions on Quantum Engineering","volume":"6 ","pages":"1-7"},"PeriodicalIF":0.0,"publicationDate":"2025-01-17","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10844313","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143106173","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-15DOI: 10.1109/TQE.2025.3529868
Chou-Wei Kiang;Jean-Fu Kiang
Nitrogen-vacancy (NV) ensembles are viable magnetometers to be implemented on nanosatellites for monitoring geomagnetic fluctuations, which are credible precursors for predicting earthquakes at short notice. In this work, a Haar wavelet-based quantum sensing method is proposed to reconstruct the time-varying waveform of geomagnetic fluctuations in the very low frequency band. To collect different frequency components of fluctuations waveform at once, we propose a schematic to employ multiple NV ensembles (NVEs), with each controlled by an independent microwave source. Berry sequences are applied on one set of NVEs to extract the scaling coefficients from accumulated geometric phases to reconstruct near-dc components of a waveform. Spin-echo sequences are applied to another set of NVEs to extract the Haar wavelet coefficients from the dynamic phases to reconstruct high-frequency components. The efficacy of the proposed sensing protocol implemented on multiple NVEs is validated by reconstructing a waveform of geomagnetic fluctuations from a DEMETER satellite dataset through simulations. Each NVE is assumed to contain $N = 10^{8}$ uncorrelated NV centers. The application of a Berry sequence to each NVE can achieve the maximum detectable magnetic field of over $460 mu$T, resolving the issues of phase ambiguity and hyperfine-induced detuning if conventional Ramsey sequence were applied. The feasibility of the proposed simulation scenario considering spin-bath noise within an NVE is justified by simulations. The effects of wavelet scales, Rabi frequency in Berry sequence, and number of NV centers in each NVE are analyzed. The proposed NVE quantum sensors operated with the proposed sensing protocol can be installed on nanosatellites to monitor global geomagnetic fluctuations, with sub-$mu$s temporal resolution in the near future.
{"title":"Wavelet-Based Quantum Sensing of Geomagnetic Fluctuations With Multiple NV Ensembles","authors":"Chou-Wei Kiang;Jean-Fu Kiang","doi":"10.1109/TQE.2025.3529868","DOIUrl":"https://doi.org/10.1109/TQE.2025.3529868","url":null,"abstract":"Nitrogen-vacancy (NV) ensembles are viable magnetometers to be implemented on nanosatellites for monitoring geomagnetic fluctuations, which are credible precursors for predicting earthquakes at short notice. In this work, a Haar wavelet-based quantum sensing method is proposed to reconstruct the time-varying waveform of geomagnetic fluctuations in the very low frequency band. To collect different frequency components of fluctuations waveform at once, we propose a schematic to employ multiple NV ensembles (NVEs), with each controlled by an independent microwave source. Berry sequences are applied on one set of NVEs to extract the scaling coefficients from accumulated geometric phases to reconstruct near-dc components of a waveform. Spin-echo sequences are applied to another set of NVEs to extract the Haar wavelet coefficients from the dynamic phases to reconstruct high-frequency components. The efficacy of the proposed sensing protocol implemented on multiple NVEs is validated by reconstructing a waveform of geomagnetic fluctuations from a DEMETER satellite dataset through simulations. Each NVE is assumed to contain <inline-formula><tex-math>$N = 10^{8}$</tex-math></inline-formula> uncorrelated NV centers. The application of a Berry sequence to each NVE can achieve the maximum detectable magnetic field of over <inline-formula><tex-math>$460 mu$</tex-math></inline-formula>T, resolving the issues of phase ambiguity and hyperfine-induced detuning if conventional Ramsey sequence were applied. The feasibility of the proposed simulation scenario considering spin-bath noise within an NVE is justified by simulations. The effects of wavelet scales, Rabi frequency in Berry sequence, and number of NV centers in each NVE are analyzed. The proposed NVE quantum sensors operated with the proposed sensing protocol can be installed on nanosatellites to monitor global geomagnetic fluctuations, with sub-<inline-formula><tex-math>$mu$</tex-math></inline-formula>s temporal resolution in the near future.","PeriodicalId":100644,"journal":{"name":"IEEE Transactions on Quantum Engineering","volume":"6 ","pages":"1-17"},"PeriodicalIF":0.0,"publicationDate":"2025-01-15","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10842356","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143480798","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2025-01-10DOI: 10.1109/TQE.2025.3528238
Kristian S. Jensen;Lorenzo Valentini;René B. Christensen;Marco Chiani;Petar Popovski
In this article, we introduce a generalization of one-way superdense coding to two-way communication protocols for transmitting classical bits by using entangled quantum pairs. The proposed protocol jointly addresses the provision of entangled pairs and superdense coding, introducing an integrated approach for managing entanglement within the communication protocol. To assess the performance of the proposed protocol, we consider its data rate and resource usage, and we analyze this both in an ideal setting with no decoherence and in a more realistic setting where decoherence must be taken into account. In the ideal case, the proposal offers a 50% increase in both data rate and resource usage efficiency compared to conventional protocols. Even when decoherence is taken into consideration, the quantum protocol performs better as long as the decoherence time is not extremely short. Finally, we present the results of implementing the protocol in a computer simulation based on the NetSquid framework. We compare the simulation results with the theoretical values.
{"title":"Quantum Two-Way Protocol Beyond Superdense Coding: Joint Transfer of Data and Entanglement","authors":"Kristian S. Jensen;Lorenzo Valentini;René B. Christensen;Marco Chiani;Petar Popovski","doi":"10.1109/TQE.2025.3528238","DOIUrl":"https://doi.org/10.1109/TQE.2025.3528238","url":null,"abstract":"In this article, we introduce a generalization of one-way superdense coding to two-way communication protocols for transmitting classical bits by using entangled quantum pairs. The proposed protocol jointly addresses the provision of entangled pairs and superdense coding, introducing an integrated approach for managing entanglement within the communication protocol. To assess the performance of the proposed protocol, we consider its data rate and resource usage, and we analyze this both in an ideal setting with no decoherence and in a more realistic setting where decoherence must be taken into account. In the ideal case, the proposal offers a 50% increase in both data rate and resource usage efficiency compared to conventional protocols. Even when decoherence is taken into consideration, the quantum protocol performs better as long as the decoherence time is not extremely short. Finally, we present the results of implementing the protocol in a computer simulation based on the NetSquid framework. We compare the simulation results with the theoretical values.","PeriodicalId":100644,"journal":{"name":"IEEE Transactions on Quantum Engineering","volume":"6 ","pages":"1-8"},"PeriodicalIF":0.0,"publicationDate":"2025-01-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=10836906","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"143184116","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"OA","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}