Papers
Live trends in quantum computing research, updated daily from arXiv.
Total Papers
28,188
This Month
0
Today
0
Research Volume
13,354 papers in 12 months (+7% vs prior quarter)
Research Focus Areas
Papers by research theme (12 months). Hover for details.
Qubit Platforms
Hardware platform mentions in abstracts — Photonic leads
Identifying Protein Co-Regulatory Network Logic by Solving B-Sat Problems Through Gate-Based Quantum Computing
Aspen Erlandsson Brisebois, Jason Broderick, Zahed Khatooni +3 more·Apr 12, 2025
There is growing awareness that the success of pharmacologic interventions on living organisms is significantly impacted by context and timing of exposure. In turn, this complexity is leading to an increasing focus on regulatory network dynamics in b...
Chip-Based 16 GBaud Continuous-Variable Quantum Key Distribution
A. Hajomer, A. Bomhals, C. Bruynsteen +5 more·Apr 12, 2025
Quantum key distribution (QKD) stands as the most successful application of quantum information science, providing information-theoretic security for key exchange. While it has evolved from proof-of-concept experiments to commercial products, widespr...
Fault-tolerant protocols through spacetime concatenation
Yichen Xu, Arpit Dua·Apr 11, 2025
We introduce a framework called spacetime concatenation for fault-tolerant compilation of syndrome extraction circuits of stabilizer codes. Spacetime concatenation enables efficient compilation of syndrome extraction circuits into dynamical codes thr...
Holographic duality from Howe duality: Chern-Simons gravity as an ensemble of code CFTs
Anatoly Dymarsky, Johan Henriksson, Brian McPeak·Apr 11, 2025
We discuss the holographic correspondence between 3d "Chern-Simons gravity" and an ensemble of 2d Narain code CFTs. Starting from 3d abelian Chern-Simons theory, we construct an ensemble of boundary CFTs defined by gauging all possible maximal subgro...
Bootstrapping Shape Invariance: Numerical Bootstrap as a Detector of Solvable Systems
Yu Aikawa, Takeshi Morita·Apr 11, 2025
Determining the solvability of a given quantum mechanical system is generally challenging. We discuss that the numerical bootstrap method can help us to solve this question in one-dimensional quantum mechanics. We show that the bootstrap method can d...
Perturbative distinguishability of black hole microstates from AdS/CFT correspondence
Jiaju Zhang·Apr 11, 2025
We establish direct evidence for the perturbative distinguishability between black hole microstates and thermal states using the AdS/CFT correspondence. In two-dimensional holographic conformal field theories, we obtain the subsystem fidelity and qua...
A Fully Planar Approach to Field-Coupled Nanocomputing: Scalable Placement and Routing Without Wire Crossings
Benjamin Hien, Marcel Walter, S. Hofmann +1 more·Apr 11, 2025
Field-coupled Nanocomputing (FCN) is a class of promising post-CMOS technologies that transmit information through electric or magnetic fields instead of current flow. They utilize basic building blocks called cells, which can form gates that impleme...
No-Go Theorems for Universal Quantum State Purification via Classically Simulable Operations.
K. He, Chengkai Zhu, Hongshun Yao +3 more·Apr 10, 2025
Quantum state purification, a process that aims to recover a state closer to a system's principal eigenstate from multiple copies of an unknown noisy quantum state, is crucial for restoring noisy states to a more useful form in quantum information pr...
Quantum error correction via multi-particle discrete-time quantum walk
Ryo Asaka, Ryusei Minamikawa·Apr 10, 2025
We propose a scheme of quantum error correction that employs a multi-particle quantum walk defined on nested squares, each hosting a single particle. In this model, each particle moves within its own distinct square through iterations of three discre...
Asymptotically tight security analysis of quantum key distribution based on universal source compression
Takaya Matsuura, Shin-ichi Yamano, Yui Kuramochi +2 more·Apr 10, 2025
Practical quantum key distribution (QKD) protocols require a finite-size security proof. The phase error correction (PEC) approach is one of the general strategies for security analyses that has successfully proved finite-size security for many proto...
Benchmarking weak randomness in Quantum and Natural Sources
Maciej Stankiewicz, Roberto Salazar, Mikołaj Czechlewski +7 more·Apr 9, 2025
Private randomness is a fundamental resource for cryptography, security proofs, and information processing. Quantum devices offer a unique advantage by amplifying weak randomness sources in regimes unattainable by classical means. A central theoretic...
Semi-classical geometric tensor in multiparameter quantum information
Satoya Imai, Jing Yang, Luca Pezzè·Apr 9, 2025
The discrepancy between quantum distinguishability in Hilbert space and classical distinguishability in probability space is expressed by the gap between the quantum and classical Fisher information matrices (QFIM and CFIM, respectively). This intrin...
Emergent metric from wavelet-transformed quantum field theory
Šimon Vedl, Daniel J. George, Fil Simovic +5 more·Apr 9, 2025
We introduce a method of reverse holography by which a bulk metric is shown to arise from locally computable multiscale correlations of a boundary quantum field theory (QFT). The metric is obtained from the Petz-Rényi mutual information defined with ...
Consensus-based qubit configuration optimization for variational algorithms on neutral atom quantum systems
R. D. de Keijzer, Luke Visser, O. Tse +1 more·Apr 9, 2025
We report an algorithm that is able to tailor qubit interactions for individual variational quantum algorithm problems. The algorithm leverages the unique ability of a neutral atom tweezer platform to realize arbitrary qubit position configurations. ...
Machine Learning Approach towards Quantum Error Mitigation for Accurate Molecular Energetics
Srushti Patil, D. Mondal, Rahul Maitra·Apr 9, 2025
Despite significant efforts, the realization of the hybrid quantum-classical algorithms has predominantly been confined to proof-of-principles, mainly due to the hardware noise. With fault-tolerant implementation being a long-term goal, going beyond ...
Chernoff Information Bottleneck for Covert Quantum Target Sensing
Giuseppe Ortolano, Ivano Ruo-Berchera, Leonardo Banchi·Apr 8, 2025
The paradigm of quantum metrology and sensing aims to identify a quantum advantage in precision at a fixed energy of the probe state. However, in practice, employing high-energy classical probes is often simpler than leveraging the quantum regime. Th...
Can gravity mediate the transmission of quantum information?
Andrea Mari, Stefano Zippilli, David Vitali·Apr 8, 2025
We propose an experiment to test the non-classicality of the gravitational interaction. We consider two optomechanical systems that are perfectly isolated, except for a weak gravitational coupling. If a suitable resonance condition is satisfied, an o...
Solving General QUBOs with Warm-Start QAOA via a Reduction to Max-Cut
Bikrant Bhattachayra, Michael Capriotti, Reuben Tate·Apr 8, 2025
The Quantum Approximate Optimization Algorithm (QAOA) is a quantum algorithm that finds approximate solutions to problems in combinatorial optimization, especially those that can be formulated as a Quadratic Unconstrained Binary Optimization (QUBO) p...
Shot noise signatures of candidate states for the fractional quantum Hall <mml:math xmlns:mml="http://www.w3.org/1998/Math/MathML"><mml:mrow><mml:mi>ν</mml:mi><mml:mo>=</mml:mo><mml:mfrac><mml:mn>12</mml:mn><mml:mn>5</mml:mn></mml:mfrac></mml:mrow></mml:math> state
Goutham Vinjamuri, Ankur Das·Apr 8, 2025
Fractional quantum Hall (FQH) states are highly sought after because of their ability to host non-abelian anyons, whose braiding statistics make them excellent candidates for qubits in topological quantum computing. Multiple theoretical studies on th...
Continuous-Variable Quantum Key Distribution with Composable Security and Tight Error Correction Bound for Constrained Devices
Panagiotis Papanastasiou, C. Ottaviani, S. Pirandola +2 more·Apr 8, 2025
Constrained devices, such as smart sensors, wearable devices, and Internet of Things nodes, are increasingly prevalent in society and rely on secure communications to function properly. These devices often operate autonomously, exchanging sensitive d...