Submitted:
29 May 2024
Posted:
30 May 2024
You are already at the latest version
Abstract
Keywords:
1. Introduction
1.1. Quantum Communication
1.2. Quantum Random Walk
1.3. Weak Measurements
1.4. Contributions of the Paper
- We propose a controlled quantum communication protocol using quantum random walk that can teleport any N-dimensional quantum state.
- The fidelity of the quantum states after quantum tomography for this protocol is high.
- We present a comparative analysis between the protocol under amplitude damping and the performance of the protocol with weak measurement protocol in the presence of amplitude damping noise to showcase the usefulness of the weak measurement.
1.5. Organization
2. Related Works
3. Theory
3.1. Quantum Random Walk
3.2. Theoretical Framework of the Algorithm
- For sending an N-dimensional quantum state with M number of controllers, we need M+2 number of N-dimensional coin space and one N-dimensional position space. Let the general state be :
- The first step is to apply the Hadamard gate on each qubit line of the quantum circuit except the sender state and position state. The operation leads to the state
-
The state can be expressed as
- For sending the general N-dimensional quantum state, the sender applies the CNOT gate on the i-th qubit line of the position space as the i-th qubit line of the coin space of the sender as a controller for all N qubit lines of the sender. This step changes the position space state
- For convenience, we will drop the normalisation coefficient. The receiver and controllers do the same CNOT gate on the i-th qubit line of the position space as the i-th qubit line of the coin space of the member as a controller for all N qubit lines of the sender:
-
The sender then applies the Hadamard gate on each qubit line of the sender. This step produces our resource state, which has the following formNote that we can simplify the protocol by restricting the value of M to 1, creating a basic sender and receiver system without controllers.
- The sender will now perform measurements on the coin space and the position space using a computational basis. Let us call this output M1 and M2. Each of the sets has N number of elements made of 0 and 1. This number corresponds to the state in which the resource state has collapsed. The sender sends this value to the receiver via classical communication. Similarly, all the controllers perform such measurements and send them to the receiver via classical communication. Based on the output, the receiver performs gate operations on his quantum state, thus retracting the original state. We have shown the quantum circuit diagram for single qubit teleportation with different controllers in Figure 1. Similarly, the corresponding quantum circuit for teleportation of two and three qubits is given in Figure 7 and Figure 8 in Appendix.
3.3. Receiver Operation
3.4. Communication between Symmetrical and Asymmetrical Coin space
3.5. Amplitude Damping
3.6. Weak Measurement Based Protection Protocol
-
Step 1: Weak MeasurementIn the initial step, weak measurements are applied to gain partial information about the system. These measurements are characterized by operators and , oriented along the z-axis of the Bloch sphere. The operators and are defined as follows:Here, dictates the measurement’s strength, with three distinct schemes: “no measurement" (NM) when , “projective measurement" (PM) when , and “weak measurement" (WM) when .
-
Step 2: Offsetting OperationsFollowing the measurement, corrective operations are enacted to counteract noise effects before amplitude damping (ADC). These operations, denoted as and , are determined by the measurement outcomes:Where corresponds to the result of and corresponds to the result of .
-
Step 3: Amplitude Damping CorrectionIn this phase, the system is readied for ADC by addressing amplitude damping using Kraus operators for each qubit:Here, represents the probability of decay from the excited state, determined by , where is the energy relaxation rate and t is the evolution time. Note that the r mentioned here is same as the p mentioned in Section 3.5.
-
Step 4: Post-Amplitude Damping CorrectionFollowing ADC, the same offsetting operations from Step 2 are applied.
-
Step 5: Correction RotationFinally, correction rotations are implemented to restore the state to its initial condition. These rotations, and , are applied based on the measurement outcomes:Where corresponds to the result of and corresponds to the result of . The value of is given by
3.7. Quantum State Tomography
3.8. Quantum Fidelity
3.9. Attack Analysis
4. Experimental Results
4.1. Circuits Output on Simulators
4.2. Results of Quantum State Tomography


4.3. Results of Weak Measurements


5. Discussion and Conclusion
Acknowledgments
Appendix


References
- Bennett, C.H.; Brassard, G. Quantum cryptography: Public key distribution and coin tossing. Theoretical computer science 2014, 560, 7–11. [Google Scholar] [CrossRef]
- Bennett, C.H.; Brassard, G.; Crépeau, C.; Jozsa, R.; Peres, A.; Wootters, W.K. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Physical review letters 1993, 70, 1895. [Google Scholar] [CrossRef] [PubMed]
- Zhao, Y.; Qi, B.; Ma, X.; Lo, H.K.; Qian, L. Experimental quantum key distribution with decoy states. Physical review letters 2006, 96, 070502. [Google Scholar] [CrossRef] [PubMed]
- Bouwmeester, D.; Pan, J.W.; Mattle, K.; Eibl, M.; Weinfurter, H.; Zeilinger, A. Experimental quantum teleportation. Nature 1997, 390, 575–579. [Google Scholar] [CrossRef]
- Williams, B.P.; Sadlier, R.J.; Humble, T.S. Superdense coding over optical fiber links with complete Bell-state measurements. Physical review letters 2017, 118, 050501. [Google Scholar] [CrossRef] [PubMed]
- Chatterjee, Y.; Devrari, V.; Behera, B.K.; Panigrahi, P.K. Experimental realization of quantum teleportation using coined quantum walks. Quantum Information Processing 2019, 19. [Google Scholar] [CrossRef]
- Rajiuddin, S.; Baishya, A.; Behera, B.K.; Panigrahi, P.K. Experimental realization of quantum teleportation of an arbitrary two-qubit state using a four-qubit cluster state. Quantum Information Processing 2020, 19, 1–13. [Google Scholar] [CrossRef]
- Sk, R.; Dash, T.; Panigrahi, P.K. Quantum information splitting of an arbitrary three-qubit state by using three sets of GHZ states. IET Quantum Communication 2021, 2, 122–135. [Google Scholar] [CrossRef]
- Sisodia, M.; Shukla, A.; Thapliyal, K.; Pathak, A. Design and experimental realization of an optimal scheme for teleportation of an n-qubit quantum state. Quantum Information Processing 2017, 16, 1–19. [Google Scholar] [CrossRef]
- Sarkar, A.; Chandrashekar, C. Multi-bit quantum random number generation from a single qubit quantum walk. Scientific reports 2019, 9, 12323. [Google Scholar] [CrossRef]
- Kempe, J. Quantum random walks: An introductory overview. Contemporary Physics 2003, 44, 307–327. [Google Scholar] [CrossRef]
- Aharonov, Y.; Davidovich, L.; Zagury, N. Quantum random walks. Phys. Rev. A 1993, 48, 1687–1690. [Google Scholar] [CrossRef]
- Childs, A.M.; Farhi, E.; Gutmann, S. An example of the difference between quantum and classical random walks. Quantum Information Processing 2002, 1, 35–43. [Google Scholar] [CrossRef]
- Shenvi, N.; Kempe, J.; Whaley, K.B. Quantum random-walk search algorithm. Phys. Rev. A 2003, 67, 052307. [Google Scholar] [CrossRef]
- Farhi, E.; Gutmann, S. Quantum computation and decision trees. Physical Review A 1998, 58, 915. [Google Scholar] [CrossRef]
- Venegas-Andraca, S.E. Quantum walks: a comprehensive review. Quantum Information Processing 2012, 11, 1015–1106. [Google Scholar] [CrossRef]
- Qu, D.; Matwiejew, E.; Wang, K.; Wang, J.; Xue, P. Experimental implementation of quantum-walk-based portfolio optimization. Quantum Science and Technology 2024, 9, 025014. [Google Scholar] [CrossRef]
- Razzoli, L.; Cenedese, G.; Bondani, M.; Benenti, G. Efficient Implementation of Discrete-Time Quantum Walks on Quantum Computers. Entropy 2024, 26. [Google Scholar] [CrossRef]
- Shi, W.M.; Xu, F.X.; Zhou, Y.H.; Yang, Y.G. A Novel Image Segmentation Algorithm based on Continuous-Time Quantum Walk using Superpixels. International Journal of Theoretical Physics 2023, 63, 4. [Google Scholar] [CrossRef]
- Aharonov, Y.; Albert, D.Z.; Vaidman, L. How the result of a measurement of a component of the spin of a spin-1/2 particle can turn out to be 100. Physical review letters 1988, 60, 1351. [Google Scholar] [CrossRef] [PubMed]
- Modak, N.; Singh, A.K.; Guchhait, S.; BS, A.; Pal, M.; Ghosh, N. Weak measurements in nano-optics. Current Nanomaterials 2020, 5, 191–213. [Google Scholar] [CrossRef]
- Zhang, L.; Datta, A.; Walmsley, I.A. Precision metrology using weak measurements. Physical review letters 2015, 114, 210801. [Google Scholar] [CrossRef] [PubMed]
- Ting, G.; Feng-Li, Y.; Zhi-Xi, W. Controlled quantum teleportation and secure direct communication. Chinese Physics 2005, 14, 893. [Google Scholar] [CrossRef]
- Shang, Y.; Li, M. Experimental realization of state transfer by quantum walks with two coins. Quantum Science and Technology 2019, 5, 015005. [Google Scholar] [CrossRef]
- Harraz, S.; Cong, S.; Zhang, J.; Nieto, J.J. Quantum fisher information protection of N-qubit Greenberger-Horne-Zeilinger state from decoherence. 2021; arXiv:quant-ph/2112.11590. [Google Scholar] [CrossRef]
- Nielsen, M.A.; Chuang, I.L. Quantum computation and quantum information; Cambridge university press, 2010.


| Controllers | Theoretical | ||
| 1 | 0.76 | 0.24 | |
| 2 | 0.75 | 0.25 | |
| 3 | 0.74 | 0.26 |
| Controllers | Theoretical | ||
| 1 | 0.74 | 0.26 | |
| 2 | 0.75 | 0.25 | |
| 3 | 0.74 | 0.26 |
| Controllers | Theoretical | ||
| 1 | 0.75 | 0.25 | |
| 2 | 0.74 | 0.26 | |
| 3 | 0.75 | 0.25 |
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (http://creativecommons.org/licenses/by/4.0/).