Efficient Optimization of Cut-offs in Quantum Repeater Chains
暂无分享,去创建一个
[1] Joel Nothman,et al. SciPy 1.0-Fundamental Algorithms for Scientific Computing in Python , 2019, ArXiv.
[2] Ekert,et al. "Event-ready-detectors" Bell experiment via entanglement swapping. , 1993, Physical review letters.
[3] Shor,et al. Simple proof of security of the BB84 quantum key distribution protocol , 2000, Physical review letters.
[5] F. Schmidt,et al. Waiting time in quantum repeaters with probabilistic entanglement swapping , 2017, Physical Review A.
[6] S. Wehner,et al. Quantum internet: A vision for the road ahead , 2018, Science.
[7] Axel Dahlberg,et al. Distributed Routing in a Quantum Internet , 2019, ArXiv.
[8] Reposition time in probabilistic imperfect memories , 2013, 1309.3407.
[9] Deutsch,et al. Quantum Privacy Amplification and the Security of Quantum Cryptography over Noisy Channels. , 1996, Physical review letters.
[10] Norbert Lütkenhaus,et al. Optimal architectures for long distance quantum communication , 2015, Scientific Reports.
[11] Wolfgang Dür,et al. Quantum Repeaters: The Role of Imperfect Local Operations in Quantum Communication , 1998 .
[12] P. C. Humphreys,et al. Entanglement distillation between solid-state quantum network nodes , 2017, Science.
[13] A Kuzmich,et al. Multiplexed memory-insensitive quantum repeaters. , 2007, Physical review letters.
[14] H. J. Kimble,et al. The quantum internet , 2008, Nature.
[15] Hoi-Kwong Lo,et al. Efficient Quantum Key Distribution Scheme and a Proof of Its Unconditional Security , 2004, Journal of Cryptology.
[16] J. Cirac,et al. Quantum repeaters based on entanglement purification , 1998, quant-ph/9808065.
[17] P. Loock,et al. Memory-assisted long-distance phase-matching quantum key distribution , 2019, 1910.03333.
[18] Charles H. Bennett,et al. Purification of noisy entanglement and faithful teleportation via noisy channels. , 1995, Physical review letters.
[19] David Elkouss,et al. Efficient Computation of the Waiting Time and Fidelity in Quantum Repeater Chains , 2019, IEEE Journal on Selected Areas in Communications.
[20] Gilles Brassard,et al. Quantum cryptography: Public key distribution and coin tossing , 2014, Theor. Comput. Sci..
[21] dek,et al. Parameter regimes for a single sequential quantum repeater , 2018 .
[22] Werner,et al. Quantum states with Einstein-Podolsky-Rosen correlations admitting a hidden-variable model. , 1989, Physical review. A, General physics.
[23] Rainer Storn,et al. Differential Evolution – A Simple and Efficient Heuristic for global Optimization over Continuous Spaces , 1997, J. Glob. Optim..
[24] Siddhartha Santra,et al. Quantum repeater architecture with hierarchically optimized memory buffer times , 2018, Quantum Science and Technology.
[25] J. Tukey,et al. An algorithm for the machine calculation of complex Fourier series , 1965 .
[26] W. Munro,et al. Inside Quantum Repeaters , 2015, IEEE Journal of Selected Topics in Quantum Electronics.
[27] S. Wehner,et al. Near-term quantum-repeater experiments with nitrogen-vacancy centers: Overcoming the limitations of direct transmission , 2018, Physical Review A.
[28] Holger Boche,et al. Extending Quantum Links: Modules for Fiber‐ and Memory‐Based Quantum Repeaters , 2019, Advanced Quantum Technologies.