• 文献检索
  • 文档翻译
  • 深度研究
  • 学术资讯
  • Suppr Zotero 插件Zotero 插件
  • 邀请有礼
  • 套餐&价格
  • 历史记录
应用&插件
Suppr Zotero 插件Zotero 插件浏览器插件Mac 客户端Windows 客户端微信小程序
定价
高级版会员购买积分包购买API积分包
服务
文献检索文档翻译深度研究API 文档MCP 服务
关于我们
关于 Suppr公司介绍联系我们用户协议隐私条款
关注我们

Suppr 超能文献

核心技术专利:CN118964589B侵权必究
粤ICP备2023148730 号-1Suppr @ 2026

文献检索

告别复杂PubMed语法,用中文像聊天一样搜索,搜遍4000万医学文献。AI智能推荐,让科研检索更轻松。

立即免费搜索

文件翻译

保留排版,准确专业,支持PDF/Word/PPT等文件格式,支持 12+语言互译。

免费翻译文档

深度研究

AI帮你快速写综述,25分钟生成高质量综述,智能提取关键信息,辅助科研写作。

立即免费体验

经典量子系统控制。

Classical command of quantum systems.

机构信息

Electrical Engineering Department, University of Southern California, Los Angeles, California 90089, USA.

出版信息

Nature. 2013 Apr 25;496(7446):456-60. doi: 10.1038/nature12035.

DOI:10.1038/nature12035
PMID:23619692
Abstract

Quantum computation and cryptography both involve scenarios in which a user interacts with an imperfectly modelled or 'untrusted' system. It is therefore of fundamental and practical interest to devise tests that reveal whether the system is behaving as instructed. In 1969, Clauser, Horne, Shimony and Holt proposed an experimental test that can be passed by a quantum-mechanical system but not by a system restricted to classical physics. Here we extend this test to enable the characterization of a large quantum system. We describe a scheme that can be used to determine the initial state and to classically command the system to evolve according to desired dynamics. The bipartite system is treated as two black boxes, with no assumptions about their inner workings except that they obey quantum physics. The scheme works even if the system is explicitly designed to undermine it; any misbehaviour is detected. Among its applications, our scheme makes it possible to test whether a claimed quantum computer is truly quantum. It also advances towards a goal of quantum cryptography: namely, the use of 'untrusted' devices to establish a shared random key, with security based on the validity of quantum physics.

摘要

量子计算和密码学都涉及用户与不完善建模或“不可信”系统交互的场景。因此,设计能够揭示系统是否按指令运行的测试具有基础和实际意义。1969 年,克劳泽、霍恩、希莫尼和霍尔特提出了一个实验测试,量子力学系统可以通过,但受限于经典物理的系统不能通过。在这里,我们扩展了这个测试,以实现对大型量子系统的特性描述。我们描述了一种方案,可以用于确定初始状态,并按照所需的动力学经典地命令系统演化。双体系统被视为两个黑盒,除了它们遵守量子物理之外,对其内部工作原理没有任何假设。即使系统被明确设计来破坏该方案,该方案也能检测到任何错误行为。在其应用中,我们的方案使得测试声称的量子计算机是否真正是量子的成为可能。它还朝着量子密码学的目标迈进:即使用“不可信”的设备来建立共享的随机密钥,其安全性基于量子物理的有效性。

相似文献

1
Classical command of quantum systems.经典量子系统控制。
Nature. 2013 Apr 25;496(7446):456-60. doi: 10.1038/nature12035.
2
Experimental full-domain mapping of quantum correlation in Clauser-Horne-Shimony-Holt scenarios.克劳泽 - 霍恩 - 希莫尼 - 霍尔特场景中量子关联的实验全域映射
Phys Rev Appl. 2023 Mar;19(3). doi: 10.1103/physrevapplied.19.034049. Epub 2023 Mar 15.
3
Device-independent quantum key distribution with random key basis.具有随机密钥基的与设备无关的量子密钥分发。
Nat Commun. 2021 May 17;12(1):2880. doi: 10.1038/s41467-021-23147-3.
4
Single-Photon Quantum Contextuality on a Chip.芯片上的单光子量子语境性
ACS Photonics. 2017 Nov 15;4(11):2807-2812. doi: 10.1021/acsphotonics.7b00793. Epub 2017 Oct 17.
5
Secrecy in Prepare-and-Measure Clauser-Horne-Shimony-Holt Tests with a Qubit Bound.具有量子比特限制的制备-测量克劳泽-霍恩-希莫尼-霍尔特测试中的保密性
Phys Rev Lett. 2015 Oct 9;115(15):150501. doi: 10.1103/PhysRevLett.115.150501. Epub 2015 Oct 6.
6
Device-Independent Quantum Key Distribution Based on the Mermin-Peres Magic Square Game.基于Mermin-Peres魔方阵游戏的设备无关量子密钥分发
Phys Rev Lett. 2023 Aug 25;131(8):080801. doi: 10.1103/PhysRevLett.131.080801.
7
Maximally nonlocal Clauser-Horne-Shimony-Holt scenarios.最大非局域性的克劳泽 - 霍恩 - 希莫尼 - 霍尔特情形
Sci Rep. 2018 May 8;8(1):7128. doi: 10.1038/s41598-018-24970-3.
8
Experimental two-photon, three-dimensional entanglement for quantum communication.用于量子通信的实验性双光子三维纠缠
Phys Rev Lett. 2002 Dec 9;89(24):240401. doi: 10.1103/PhysRevLett.89.240401. Epub 2002 Nov 20.
9
Hacking the Bell test using classical light in energy-time entanglement-based quantum key distribution.利用基于能量-时间纠缠的量子密钥分发中的经典光对贝尔测试进行黑客攻击。
Sci Adv. 2015 Dec 18;1(11):e1500793. doi: 10.1126/sciadv.1500793. eCollection 2015 Dec.
10
General correlation functions of the Clauser-Horne-Shimony-Holt inequality for arbitrarily high-dimensional systems.任意高维系统的克劳泽 - 霍恩 - 希莫尼 - 霍尔特不等式的广义关联函数。
Phys Rev Lett. 2004 Apr 2;92(13):130404. doi: 10.1103/PhysRevLett.92.130404. Epub 2004 Mar 31.

引用本文的文献

1
Tsirelson bounds for quantum correlations with indefinite causal order.具有不确定因果序的量子关联的齐雷尔森界
Nat Commun. 2025 Apr 7;16(1):3314. doi: 10.1038/s41467-025-58508-9.
2
Post-quantum cryptography and the quantum future of cybersecurity.后量子密码学与网络安全的量子未来。
Phys Rev Appl. 2024 Apr;21(4). doi: 10.1103/physrevapplied.21.040501.
3
Recovering quantum entanglement after its certification.量子纠缠在被认证后进行恢复。

本文引用的文献

1
Demonstration of blind quantum computing.盲量子计算的演示。
Science. 2012 Jan 20;335(6066):303-8. doi: 10.1126/science.1214707.
2
Full-field implementation of a perfect eavesdropper on a quantum cryptography system.全场实现量子密码系统的完美窃听者。
Nat Commun. 2011 Jun 14;2:349. doi: 10.1038/ncomms1348.
3
Secure device-independent quantum key distribution with causally independent measurement devices.使用因果独立测量设备实现安全的设备无关量子密钥分发。
Sci Adv. 2023 Oct 6;9(40):eadi5261. doi: 10.1126/sciadv.adi5261. Epub 2023 Oct 4.
4
A hierarchical approach for building distributed quantum systems.一种构建分布式量子系统的分层方法。
Sci Rep. 2022 Sep 14;12(1):15421. doi: 10.1038/s41598-022-18989-w.
5
Experimental quantum key distribution certified by Bell's theorem.经贝尔定理认证的实验性量子密钥分发。
Nature. 2022 Jul;607(7920):682-686. doi: 10.1038/s41586-022-04941-5. Epub 2022 Jul 27.
6
Quantum algorithmic measurement.量子算法测量
Nat Commun. 2022 Feb 16;13(1):887. doi: 10.1038/s41467-021-27922-0.
7
Significant loophole-free test of Kochen-Specker contextuality using two species of atomic ions.利用两种原子离子对科亨-斯佩克语境性进行重要的无漏洞测试。
Sci Adv. 2022 Feb 11;8(6):eabk1660. doi: 10.1126/sciadv.abk1660. Epub 2022 Feb 9.
8
Quantum verification of NP problems with single photons and linear optics.利用单光子和线性光学对NP问题进行量子验证。
Light Sci Appl. 2021 Aug 18;10(1):169. doi: 10.1038/s41377-021-00608-4.
9
Device-independent quantum key distribution with random key basis.具有随机密钥基的与设备无关的量子密钥分发。
Nat Commun. 2021 May 17;12(1):2880. doi: 10.1038/s41467-021-23147-3.
10
Trading Locality for Time: Certifiable Randomness from Low-Depth Circuits.用局部性换取时间:来自低深度电路的可验证随机性
Commun Math Phys. 2021;382(1):49-86. doi: 10.1007/s00220-021-03963-w. Epub 2021 Feb 9.
Nat Commun. 2011;2:238. doi: 10.1038/ncomms1244.
4
Universally composable privacy amplification from causality constraints.基于因果关系约束的通用可组合隐私增强
Phys Rev Lett. 2009 Apr 10;102(14):140501. doi: 10.1103/PhysRevLett.102.140501.
5
Device-independent security of quantum cryptography against collective attacks.量子密码学针对集体攻击的与设备无关的安全性。
Phys Rev Lett. 2007 Jun 8;98(23):230501. doi: 10.1103/PhysRevLett.98.230501. Epub 2007 Jun 4.
6
No signaling and quantum key distribution.无信号传输与量子密钥分发。
Phys Rev Lett. 2005 Jul 1;95(1):010503. doi: 10.1103/PhysRevLett.95.010503. Epub 2005 Jun 27.
7
Simple proof of security of the BB84 quantum key distribution protocol.BB84量子密钥分发协议安全性的简单证明。
Phys Rev Lett. 2000 Jul 10;85(2):441-4. doi: 10.1103/PhysRevLett.85.441.
8
Unconditional security of quantum key distribution over arbitrarily long distances.
Science. 1999 Mar 26;283(5410):2050-6. doi: 10.1126/science.283.5410.2050.
9
Maximal violation of Bell inequalities for mixed states.混合态下贝尔不等式的最大违背
Phys Rev Lett. 1992 Jun 1;68(22):3259-3261. doi: 10.1103/PhysRevLett.68.3259.
10
Quantum cryptography based on Bell's theorem.基于贝尔定理的量子密码学。
Phys Rev Lett. 1991 Aug 5;67(6):661-663. doi: 10.1103/PhysRevLett.67.661.