Skip to main content
Scientific Reports logoLink to Scientific Reports
. 2020 Feb 20;10:3093. doi: 10.1038/s41598-020-60061-y

Identification of networking quantum teleportation on 14-qubit IBM universal quantum computer

Ni-Ni Huang 1,2, Wei-Hao Huang 1,2, Che-Ming Li 1,2,3,
PMCID: PMC7033242  PMID: 32080312

Abstract

Quantum teleportation enables networking participants to move an unknown quantum state between the nodes of a quantum network, and hence constitutes an essential element in constructing large-sale quantum processors with a quantum modular architecture. Herein, we propose two protocols for teleporting qubits through an N-node quantum network in a highly-entangled box-cluster state or chain-type cluster state. The proposed protocols are systematically scalable to an arbitrary finite number N and applicable to arbitrary size of modules. The protocol based on a box-cluster state is implemented on a 14-qubit IBM quantum computer for N up to 12. To identify faithful networking teleportation, namely that the elements on real devices required for the networking teleportation process are all qualified for achieving teleportation task, we quantify quantum-mechanical processes using a generic classical-process model through which any classical strategies of mimicry of teleportation can be ruled out. From the viewpoint of achieving a genuinely quantum-mechanical process, the present work provides a novel toolbox consisting of the networking teleportation protocols and the criteria for identifying faithful teleportation for universal quantum computers with modular architectures and facilitates further improvements in the reliability of quantum-information processing.

Subject terms: Quantum physics, Quantum information

Introduction

Quantum teleportation provides a method for transporting unknown quantum states between remote systems based on shared entanglement and quantum measurements1. Teleportation constitutes the fundamental element required to perform a wide range of quantum computation and quantum information tasks in a quantum network29. In particular, to construct large-scale quantum computing processors with a modular architecture4,7,1016 (Fig. 1a), ideal teleportation is required to connect the various modules within the network4,7,10,1316 (Fig. 1b,c). Notably, such an ideal quantum process is also essential for the modularization of quantum networks in which spatially-separated quantum nodes communicate across different modules6.

Figure 1.

Figure 1

Networking teleportation in a modular architecture. (a) Modular architecture of the quantum network. Each module is regarded as a node of the quantum network and consists of qubits4,7,10,12,13,16. The modules transmit quantum states to one another by performing intra- and inter-module operations4,7,10,11,1316. The architecture can be extended to realize a universal quantum computer by teleporting a controlled-Z (CZ) gate7. (b) Transmission of quantum information among different modules. Due to the isolation between modules, quantum teleportation4,7,10,1316 is utilized to transport an arbitrary quantum state of qubit 0 (purple) from module 1 to module 2 consisting of qubits 1–6. In particular, qubit 0 is entangled with a flying photon qubit7,11,12,14 (gradient purple) via a CNOT-like operation on Alice’s side14. Alice then measures qubit 0 on a specific basis to enable the flying qubit to carry the information regarding the quantum state of qubit 0 to be transported via remote state preparation80. (c) Networking teleportation protocol based on a 6-qubit box-cluster state Cb,6. The protocol aims to teleport the arbitrary state of qubit 0 from Alice to Bob using a shared entangled state Cb,6 among Alice, the participants and Bob. The main steps of the protocol are as follows: (i) Bell-state measurement (red) on Alice’s flying photon qubit which carries the information of the quantum state of qubit 0 and qubit 1; (ii) specific local measurements (orange) on participants’ qubits 2–5; (iii) appropriate unitary transformations P on Bob’s qubit N to recover the initial input state (purple) in accordance with the measurement results informed by Alice and the participants. (See text for detailed procedures.).

Recently, IBM launched the IBM Q Experience, which makes universal quantum computers accessible to the general public through cloud service17. IBM has also developed Qiskit18 to provide users with the tools required to run their quantum programs on prototype quantum devices and simulators. IBM Q Experience provides an online platform for the experimental testing of the fundamentals of quantum physics1923 and a wide variety of applications in quantum information theory2428. However, while IBM has built both 20-qubit and 50-qubit quantum processors17, a comprehensive characterization of the networking teleportation process for future modular use on IBM quantum devices is still lacking.

Accordingly, we present herein a toolbox for examining the performance of IBM quantum computers, where the networking teleportation protocol is executed. We firstly propose two systematically extensible networking teleportation protocols for a network consisting of N parties based on either a box-cluster state or a chain-type cluster state29,30. The proposed protocols possess applicability to arbitrary finite size of modules and the adaptability to the benchmark provided by a generic classical process model31. We then implement the proposed protocol based on the N-qubit box-cluster state on a 14-qubit quantum processor named ibmq_16_melbourne for N up to 12.

A generic classical-process model providing the strictest criteria in order to rule out any classical strategies of mimicry of teleportation31 is utilized for assessing the performance of the real quantum device, on which the proposed networking teleportation protocol is conducted. Through the generic classical-process model, one can identify whether the experimental networking teleportation process is faithful. In the case that the experimental process is identified as faithful, all the elements on real quantum devices required in the networking teleportation process are identified as all qualified for use. The model is defined as input states satisfying the assumption of realism and their evolutions to output states that can be reconstructed as a density operator, where this evolution conforms to classical stochastic theory. Existing identification methods utilize the state characteristics to verify the teleportation of IBM Q2426, solid-state systems3234, trapped atoms35,36, photonic qubits3741, atomic ensembles42,43 and satellite-based systems44,45. By contrast, the present study provides a novel toolbox consisting of the two scalable N-qubit networking teleportation protocols and the criteria for identifying faithful teleportation.

Results

Cluster states

To implement the proposed networking teleportation protocol, it is first necessary to generate highly-entangled multipartite states (so-called cluster states)29,30. Cluster states with multipartite quantum correlations are considered to be the significant source: basic building block when constructing general modular architectures for quantum networks6.

An N-qubit cluster state C can be generated by applying the controlled-Z (CZ) gates with a specified configuration to the initial states, i.e.,

+N=HN0N, 1

where +=(0+1)/2 and H=(00+01+1011)/2 is the Hadamard transformation (H). The state vector C can then be written in the form

C=(a)I(a)CZ(a,a)+N, 2

where I(a) is the set of qubits that physically interact with qubit a, and CZa,a=00aIa+11aZa denotes the CZ gate acting on the control qubit a and target qubit a. Here, I is a 2-dimensional identity matrix, and Z=(0011) and X=(++) are the Pauli-Z matrix and Pauli-X matrix, respectively, where =(01)/2. The proposed networking teleportation protocol utilizes two different types of physical interaction of the cluster states, namely an N-qubit box-cluster state Cb,N (shown in Fig. 2a, top) and a chain-type cluster state Cc,N (shown in Fig. 2a, bottom).

Figure 2.

Figure 2

Schematic of the N-qubit networking teleportation protocols and participants’ specific measurement basis of N-qubit box-cluster state. (a) Schematic of the proposed networking teleportation protocols. The protocol aims to teleport an arbitrary state ρin (purple) using a shared N-qubit box-cluster state Cb,N (top) or N-qubit chain-type cluster state Cc,N (bottom), consisting of qubits 1–N shared by Alice (pink), the participants (yellow), and Bob (blue). The protocol involves the following three steps: (i) Bell-state measurement performed on qubits 0 and 1 (red) at Alice’s side, (ii) local measurements on the specific basis performed on qubits 2–N-1 (orange) at the participants’ side, and (iii) unitary transformations P (as shown in Eqs. 4 and 6) on qubit N (purple) to recover the teleported state at Bob’s side. (b) Participants’ specific measurement basis in the case of Cb,N with positive even integers from 4 to 12 (from diagrams (i) to (v), respectively). The notation Qni indicates that the logical qubit i in the protocol description corresponds to the physical qubit n on the 14-qubit ibmq_16_melbourne device.

Notably, the advantages are twofold for the teleportation protocols to use either chain-type cluster states or box-cluster states. First, according to the connectivity map of 14-qubit ibmq_16_melbourne device and the other quantum devices on IBMQ17, chain-type cluster states and box-cluster states are the most feasible and applicable types of entangled states to be generated. Second, these two types of cluster states are natural resources to be integrated into different and complex networking protocols, such as universal measurement-based quantum computation30,4648, error correction4952, blind quantum computation5356, as well as quantum cryptography like quantum secret sharing57,58.

Networking teleportation protocols

This section presents a general description of the proposed networking teleportation protocol, wherein either an N-qubit box-cluster state Cb,N (Fig. 2a, top) with positive even integer N up to 12 or an N-qubit chain-type cluster state Cc,N (Fig. 2a, bottom) with arbitrary positive even integer N (Fig. 2a), is employed. The proposed protocols are applicable to arbitrary finite size of modules (Fig. 1). It should be noted that Fig. 1 illustrates the concept of performing our protocols in a modular architecture, where the flying photon qubit is required for the Bell-state measurement performed by Alice because of the separation between the modules. However, it is worth stressing that our protocols are applicable regardless of whether modular architecture is used in universal superconducting quantum computer. Furthermore, the proposed protocols are also adaptable to other network communication systems, such as optics54,58,59, ion traps60,61, and NV centres62.

In the following, we introduce the executive steps for Alice, the participants, and Bob, respectively in the proposed networking teleportation.

  1. Measurement performed by Alice. Alice performs Bell-state measurement on qubit 0 (whose state ρin is arbitrary) and qubit 1, and obtains one of four possible results, namely 00, 01, 10, or 11. The measurement thus projects her two qubits into one of the four different Bell states (UjI)ϕ+ with j = 00, 01, 10, or 11, where
    U00=I,U01=X,U10=Z,U11=ZX, 3
    and ϕ+=(00+11)/2. Alice communicates her measurement outcome j to Bob (step (i) in Fig. 2a). It is worth noting that Bell-state measurement (analysis) is one of the key element in quantum teleportation protocols and has been widely studied especially in optical systems6371; on the other hand, the Bell-state measurement performed on the universal IBM quantum computer is implemented by using universal logic gates followed by measurement on the Pauli-Z basis (Fig. 3c).
  2. Local measurements performed by the participants. Each participant in the teleportation process performs measurement and communicates the result mi classically to Bob, where mi ∈ {+1, −1} represents the possible measurement outcome of the i-th participant’s qubit on a specific measurement basis (step (ii) in Fig. 2a). The protocols based on Cb,N and Cc,N have 2(N−3) and 2(N−2) possible participant measurement results (m2m3, …, mi, …, mN−1), respectively. The detailed steps of the participants’ measurement processes for Cb,N and Cc,N are given in the following:
    1. For Cb,N, every participant performs measurement on a specific basis on their qubit i. In particular, for all of the even qubits of the participants and qubit 3, measurement is performed on the Pauli-X basis for measurements. By contrast, for the remaining odd qubits, measurement is performed on the Pauli-Z basis for measurements (Fig. 2b). A specific example is given in Methods section.
    2. For Cc,N, all of the participants perform local measurements on the Pauli-X basis.
  3. Once Alice’s and the participants’ qubits have been collapsed by their measurements, Bob recovers ρin by applying appropriate unitary operations P on his qubit N, where P ∈ {IZXZXHZHXHZXH}. Note that P is calculated based on Alice’s measurement result j and the participants’ measurement results (m2m3, …, mi, …, mN−1) (step (iii) in Fig. 2a). Bob’s operations for Cb,N and Cc,N, respectively, are elaborated as follows:
    1. For Cb,N, Bob’s operation to recover the arbitrary state has the form
      P=(i=2N1Oi,mi)Uj(H(N)), 4
      where Oi,mi represents the unitary transformation according to measurement result mi of the i-th participant’s qubit. The unitary operations Oi,+1 = I and Oi,−1 are defined as follows:
      O2,1=I,O3,1=X,O4,1=Z,O5,1=I,O6,1=X,O7,1=Z,O8,1=Z,O9,1=X,O10,1=X,O11,1=Z. 5
      Referring to Eq. 4, Uj is the unitary operation according to Alice’s measurement result j, and is obtained using the definition given in Eq. 3. In addition, H(N) is the Hadamard transformation (H) of qubit number N and has a value of H(N) = I if qubit number N can be divided by four; or H(N) = H otherwise. An illustrative case is given in Methods section.
    2. For Cc,N, Bob’s operation to recover the arbitrary state is written in the form
      P=(i=2N1Oi,mi)UjH, 6
      where Oi,mi is the unitary transformation according to measurement result mi of the i-th participant’s qubit. The unitary operations Oi,+1 = I and Oi,−1 are defined respectively as follows:
      Oi,1={XifiisevenZifiisodd. 7
      As described above, Uj in Eq. 6 is the unitary operation determined from Alice’s measurement result j using the definition given in Eq. 3. An illustrative example is given in Methods.

Figure 3.

Figure 3

Schematic showing quantum circuit of networking teleportation based on a 6-qubit box-cluster state Cb,6 on the ibmq_16_melbourne device. The circuit to teleport an arbitrary state of Q0, 0 to Q11, 6 consists of the following: (a) all of the qubits are initialized to 0 and the arbitrary state of qubit Q0, 0 to be teleported is implemented by different unitary operations U1; (b) Cb,6; (c) Bell-state measurement is performed on Alice’s qubits Q0, 0 and Q1, 1; (d) local measurements are performed on the specific basis on the participants’ qubits Q13, 2Q3, 5; (e) state tomography is performed for the transported state on Bob’s qubit Q11, 6, and is implemented by different unitary operations U2 followed by measurement on the Pauli-Z basis. (See the related text for a detailed description).

It should be noted that when calculating P using the protocols based on Cb,N or Cc,N, there are four properties of matrix multiplication: (i) IX = XI = X, IZ = ZI = Z; (ii) XZX = Z, ZXZ = X; (iii) XX = I, ZZ = I, II = I; and (iv) when P is lastly calculated to be XZ, then P should be considered to be ZX. Let us give four illustrative examples: (1) P=IIZIXH(i)ZXH; (2) P=IZIIXIZH(i)ZXZH(ii)XH; (3) P=IXZIXZZX(i)XZXZZX(ii) ZZZX(iii)IZX(i)ZX; (4) P=XZXZXZH(ii)ZZXZH(iii)IXZH(i)XZH(iv)ZXH.

It is worth noting that the two proposed protocols based on either a Cb,N or a Cc,N are both systematically scalable to arbitrary positive even integer N. To extend the proposed networking protocol based on Cb,N for N > 12, the specific measurement basis of the i-th participant’s qubit and the unitary operations Oi,−1 for i > 11 are required to be defined. After all the measurements are performed by Alice and participants, Bob then calculates his operation P using Eq. 4 and recovers ρin by applying P to his qubit.

Identifying quantum-mechanical process of networking teleportation

A generic classical process model31 was utilized to quantitatively analyze the performance of a real quantum device, on which the proposed teleportation protocol was executed.

Suppose that a process of interest is created and its normalized process matrix, χexpt, is obtained experimentally via the method of process tomography (PT)72. If the experimental process cannot be described at all by any classical processes (denoted as χC), then χexpt is said to be a genuinely quantum process (denoted by χQ)31.

A classical process, χC, comprises a classical initial state and its evolution to a final state. The initial system can be regarded as a physical object with properties satisfying the assumption of realism. The system then evolves according to classical stochastic theory to a final state. It should be noted that the assumption of realism predicates that the system state can be described by a set of measurement outcomes. Moreover, the dynamics of these classical states are fully described by the transition probabilities from a specific state to a final state31.

An experimental process, χexpt, is identified as non-classical, i.e., close to the ideal quantum process χQI, if the process fidelity satisfies that Fptr(χexptχQI)>FC maxχCtr(χCχQI) or F¯s,expt>F¯s,C, where F¯s,expt(C)=(2Fexpt(C)+1)/3 is the average state fidelity73. It should be noted that ideal teleportation corresponds to an identity process, for which the process fidelity threshold is given by

FC~0.683, 8

and the average state fidelity threshold for teleportation is

Fs,C~0.789. 9

In contrast, the measure-prepare strategy74 in which Alice directly measures her input state and Bob then prepares the output state accordingly is included as a special case in our generic classical-process model. It can be understood by the fact that the measure-prepare process is not an optimal classical teleportation: FC = 0.5 < 0.683, and the average state fidelity is Fs,C = 0.667 < 0.789. Accordingly, our model provides the strictest criteria to evaluate whether an experimental teleportation can outperform classical mimicry. Our model is further proven in a quantitative way for evaluating an experimental teleportation process75.

Networking teleportation implemented on ibmq_16_melbourne device

The proposed networking teleportation protocol was experimentally implemented on the 14-qubit ibmq_16_melbourne device (Fig. 2b). Five different box-cluster states were considered, namely a 4-qubit box-cluster state Cb,4 consisting of qubits Q1, 1Q12, 4 (Fig. 2b(i)); a 6-qubit box-cluster state Cb,6 consisting of qubits Q1, 1Q11, 6 (Fig. 2b(ii)); an 8-qubit box-cluster state Cb,8 consisting of qubits Q1, 1Q10, 8 (Fig. 2b(iii)); a 10-qubit box-cluster state Cb,10 consisting of qubits Q1, 1Q9, 10 (Fig. 2b(iv)); and a 12-qubit box-cluster state Cb,12 consisting of qubits Q1, 1Q8, 12 (Fig. 2b(v)).

 Figure 3 shows a schematic illustration of the implemented networking teleportation procedure for the 6-qubit box-cluster state Cb,6 (Fig. 1c). As shown, all of the qubits Qni are initially prepared in the state 0 and the arbitrary quantum state of qubit Q0, 0 to be teleported is then prepared by applying the unitary operation U1 (Fig. 3a). To transport an arbitrary quantum state of qubit Q0, 0 to qubit Q11, 6, the networking teleportation procedure commences by preparing a 6-qubit cluster state using the definitions given in Eqs. 1 and 2. The CZ gates are then implemented by a CNOT gate and two H gates in accordance with the connectivity map of the 14-qubit ibmq_16_melbourne quantum processor (Fig. 3b).

Bell-state measurement is then performed on qubits Q0, 0 and Q1, 1 (Fig. 1c(i)) using a CNOT gate and an H gate; followed by measurement on the Pauli-Z basis (Fig. 3c). As described previously, the participants perform measurements on a specific basis (Fig. 1c(ii)). In particular, for all of the even qubits Q13, 2, Q12, 4 and the qubit Q2, 3, the participants perform measurements on the Pauli-X basis (Fig. 2b(ii)), which is implemented by an H gate, followed by measurement on the Pauli-Z basis. For the remaining odd qubit, Q3, 5, the participant performs measurement on the Pauli-Z basis (Fig. 3d).

In the last step of the protocol, Alice sends her measurement result j, and each of the participants sends his or her measurement result mi, to Bob through a classical communications channel. Bob then applies the last unitary operation P defined in Eq. 6 on qubit Q11, 6 to recover the transported state relying on the results from Alice and participants he received (Fig. 1c(iii)).

Note that IBM Q Experience only permits at most one measurement on every given qubit. Moreover, no operations can be employed after a measurement. Thus, it is possible only to obtain the probabilities of all the possible measurement outcomes.

To complete the networking teleportation procedure, quantum state tomography72 is performed on qubit Q11, 6 to reconstruct the density matrix of the teleported state, ρout, by measuring the state in the Pauli basis {X, Y, Z}, where Y=(RRLL) with R=(0+i1)/2 and L=(0i1)/2 (Fig. 3e).

Experimentally, the measurements performed on the Pauli-X or Pauli-Y basis are implemented by using different transformations U2 followed by measurement on the Pauli-Z basis. In particular, the measurement on the Pauli-X basis is implemented by an H gate followed by measurement on the Pauli-Z basis; while the measurement on the Pauli-Y basis is implemented by S and H gates followed by measurement on the Pauli-Z basis. Finally, the last unitary operation P is applied as a post-selection to the experimental density matrices based on the measurement results informed by Alice and the participants, respectively. Herein, it is assumed that the transported state is perfectly recovered by Bob’s operation, P.

To quantitatively characterize the performance of the real quantum processor, including all the required elements for teleportation, where the proposed protocol is implemented, the experimental results were evaluated using the process fidelity criterion 8. In performing the evaluation, complete PT72 was applied to the teleported state ρout of the protocol. Furthermore, states ρin{00,11,++,RR} were chosen as the input states for teleportation. The teleportation process was described by the following positive Hermitian process matrix χexpt:

ρout=m,n=14χmnMmρinMn, 10

where M1 = I, M2 = X, M3 = −iY, and M4 = Z. The ideal teleportation process matrix, χQI, has only one non-zero element, (χQI)11=1. In other words, the input state is teleported without any loss in fidelity (Fig. 4a).

Figure 4.

Figure 4

Absolute values of the reconstructed process matrix χmn with m, n = 1, 2, 3, 4 for the proposed networking teleportation protocol based on Cb,N for: (a) ideal quantum teleportation; (b) N = 4; (c) N = 6; (d) N = 8; (e) N = 10; and (f) N = 12.

Experimentally, to encode the qubit Q0, 0 to be teleported, where this qubit starts in the 0 state, various unitary gates U1 are applied (Fig. 3a). Specifically, to encode the 1 (+) state, an X (H) gate is placed on qubit Q0, 0, while to encode the R state, an H gate is first applied followed by an S gate, where S=00+i11.

Identification of quantum-mechanical process of networking teleportation

Before considering the identification of a real device, on which the proposed N-party networking teleportation protocol is conducted, the protocol was simulated on the 32-qubit ibmq_qasm_simulator device, which enables anonymous users to compose ideal multi-shot executions of quantum circuits and then returns counts through IBM Q Experience17. The aim of the simulation was to verify the correctness of the individual steps in the proposed protocol based on an N-qubit box-cluster state Cb,N and a chain-type cluster state Cc,N, respectively, for N up to 12.

The process fidelities of the networking teleportation protocol based on Cb,N 32-qubit ibmq_qasm_simulator device were calculated to be Fp = 0.9972, 1.0007, 1.0032, 0.9997 and 0.9997 for qubit numbers of N = 4, 6, 8, 10 and 12, respectively (Fig. 5). Meanwhile, the process fidelities of the networking teleportation protocol utilizing Cc,N were calculated to be Fp = 0.9966, 1.0004, 0.9988, 1.0004 and 1.0004, respectively. The state fidelities for the teleported quantum states ρout of the protocols based on Cb,N and Cc,N, respectively, for N up to 12 were calculated to be Fs = 1.0000 in both cases.

Figure 5.

Figure 5

Process fidelity of N-qubit teleportation based on 2- and 3-qubit chain-type cluster states and Cb,N for qubit numbers N = 4, 6, 8, 10 and 12, respectively. The red dotted line denotes the maximum classical process fidelity of FC = 0.683. The bars colored light blue and dark blue denote the results obtained from the 32-qubit ibmq_qasm_simulator device and the 14-qubit ibmq_16_melbourne device, respectively.

We can observe that the process fidelities of the protocols based on Cb,N for N = 6 and 8 and Cc,N for N = 6, 10 and 12 are higher than 1, while those for the other values of N are lower than 1. The reason is that if we conduct the simulation on the 32-qubit ibmq_qasm_simulator device, we will obtain approximate probabilities. However, we will obtain an exact result if and only if the probabilities are zero or one. More specifically, events with zero probabilities will never be observed, while events with probability 0 < p < 1 will be observed proportional to "p” (but unlikely to be exactly "p”)76. The tomographic measurement of density matrices using this simulation measurement result may be able to produce results that violate important basic properties like positivity77. Therefore, the process fidelity is not exactly equal to 1 even though the state fidelities are all equal to 1.

Having validated the proposed protocol, it was conducted based on Cb,N for N=4 to 12 on the 14-qubit ibmq_16_melbourne device. Complete PT was implemented on the teleported state ρout, and formalisms and criteria described in Eqs. 11 and 12 were used to evaluate the performance of the real device, on which our protocol was implemented. Figure 4b–f show the reconstructed process matrix χexpt for different N. One can observe that the experimental teleportation process matrix has four evenly distributed non-zero elements (χexpt)11, (χexpt)22, (χexpt)33, (χexpt)44, while ideally it should have only one non-zero element (χQI)11=1. In other words, the input state is teleported with nearly 75% loss in fidelity.

To investigate the effect of the qubit number N on the performance of the real processor, where the proposed protocol was conducted utilizing both a 2-qubit chain-type cluster state and a 3-qubit chain-type cluster state, respectively. The process fidelities Fptr(χexptχQI) were calculated to be Fp = 0.7166 ± 0.0010, 0.6063 ± 0.0012, 0.2550 ± 0.0012, 0.2523 ± 0.0012, 0.2493 ± 0.0012, 0.2539 ± 0.0012 and 0.2508 ± 0.0012 for qubit numbers N=2, 3, 4, 6, 8, 10 and 12, respectively (Fig. 5). Note that each experimental value in Fig. 5 corresponds to the mean value obtained over 8192 measurements of 10 times. Note also that the error bars are obtained by Poissonian counting statistics and are rounded off to 4 decimals. Finally, the experimental values for N = 4–12 and N = 2–3 were accessed through IBM Q Experience17 on 09 December 2018 and 25 August 2019, respectively.

From the experimental results obtained from the 14-qubit ibmq_16_melbourne device reported above, one can observe that the experimental process fidelities for qubit numbers N = 2, 3, 4, 6, 8, 10 and 12 decrease as N increases. It is also observed that the quality of the experiments when utilizing a 3-qubit chain-type cluster state and Cb,N for qubit numbers N = 4, 6, 8, 10 and 12 does not go beyond the maximum process fidelity of FC = 0.683 (Eq. 8) that can be achieved classically (Fig. 5). Finally, it is noted that the process fidelities are close to 0.25 for qubit numbers N = 4, 6, 8, 10 and 12.

The state fidelity Fs of the teleportation process is defined as the overlap of the ideal transported state ρin and the experimental density matrix ρout. In other words, Fs(ρin, ρout) = trρinρoutρin. It can be observed that the state fidelities of the four transported states (shown in Table 1) also do not surpass the maximum value of 0.789 in Eq. 9 which is achievable by classical means.

Table 1.

State fidelities for the teleported quantum states ρout for qubit numbers N = 2, 3, 4, 6, 8, 10 and 12, respectively. Each experimental value corresponds to the mean value obtained over 8192 measurements of 10 times, considers the Poissonian counting statistics, and is rounded off to 4 decimal places.

N 0 1
2 0.8692 ± 0.0012 0.8646 ± 0.0012
3 0.7168 ± 0.0016 0.7152 ± 0.0016
4 0.5080 ± 0.0017 0.5055 ± 0.0017
6 0.5034 ± 0.0017 0.4994 ± 0.0017
8 0.4991 ± 0.0017 0.4957 ± 0.0017
10 0.4984 ± 0.0017 0.5011 ± 0.0017
12 0.5049 ± 0.0017 0.5031 ± 0.0017
N + R
2 0.8252 ± 0.0016 0.7384 ± 0.0017
3 0.7453 ± 0.0017 0.7420 ± 0.0017
4 0.5000 ± 0.0017 0.5000 ± 0.0017
6 0.5000 ± 0.0017 0.5000 ± 0.0017
8 0.5000 ± 0.0017 0.5000 ± 0.0017
10 0.5000 ± 0.0017 0.5000 ± 0.0017
12 0.5000 ± 0.0017 0.5000 ± 0.0017

In order to explore the potential causes of the experimental process fidelities of the real device, on which the proposed protocol was executed, the following section deconstructs the key ingredients required in the process. A series of analyses are additionally conducted on the shared entanglement and its fundamental CZ gate.

Firstly, we apply an optimal entanglement witness78 to detect the existence of genuine multipartite entangled states on the 14-qubit ibmq_16_melbourne processor. The result implies that the existence of genuine multipartite entanglement cannot be detected in the experimental prepared state on the real quantum device (see Methods). Secondly, to clarify the effect of the CZ gate on the present experimental results for the multipartite cluster states, we characterized the CZ gate on the 14-qubit ibmq_16_melbourne device by using PT. The experimental result suggests that an increasing number of N and CZ gates leads to a corresponding decrease in the fidelity of the networking teleportation procedure on the 14-qubit quantum device (see Methods). Then we inquire into the effects of quantum noise in the experiments by comparing three common noise channels72. The results shows that the noise in the networking teleportation process is similar to that produced in a depolarizing channel (see Methods).

Discussion

In this work, we have proposed two systematically scalable networking teleportation protocols consisting of N parties utilizing either an N-qubit box-cluster state with positive even integer N up to 12, or a chain-type cluster state with arbitrary positive even integer N, to transmit arbitrary quantum states inside and among the modules in a quantum network. The proposed protocols are adaptable to the benchmark provided by a generic classical-process model and applicable to arbitrary finite size of modules. Notably, the original teleportation protocol illustrates that two communication parties, Alice and Bob, can teleport the unknown state by sharing Einstein-Podolsky-Rosen (EPR) pairs1. Our protocols illustrate that many communication parties, Alice, participants and Bob, can teleport the unknown state by sharing multi-qubit cluster states. In contrast to the original protocol, the proposed protocols are more applicable for many communication parties in the future quantum network and can be further integrated into potential networking applications consisting of multiparties, such as protocols for quantum computation30,4656 and quantum cryptography57,58.

We have verified and tested the proposed protocols on both the IBM quantum simulator and the 14-qubit ibmq_16_melbourne device. We have further utilized the generic classical-process model to quantify quantum-mechanical processes for identifying non-classical networking teleportation. The experimental results have shown that the process fidelities of the real quantum device, where the proposed networking teleportation protocol was conducted cannot go beyond the best mimicry attained by classical processes. That is, the components on the real device required for the networking teleportation process are not yet all qualified for use.

We have then unambiguously deconstructed the essential components in the networking teleportation process. We have prepared cluster states consisting of 4, 6, 8, 10 and 12 qubits on a 14-qubit ibmq_16_melbourne device and have shown that genuine multipartite entanglement cannot be detected using entanglement witness operators. We then characterized the effect of the essential CZ gate on a 14-qubit ibmq_16_melbourne device in constructing cluster states by process tomography and utilized the experimental process matrix of the controlled gate to reconstruct the whole networking teleportation procedure. The results showed that as the number of qubit N and CZ gates increase, the fidelity of the networking teleportation procedure decreases. In addition, the noise in the experiments is close to that produced in a depolarizing channel.

Qiskit is arranged in four libraries: Terra, Aqua, Aer and Ignis. The work presented herein utilizes Terra and Aer. Terra is intended for composing and optimizing quantum programs on a particular device, while Aer provides a simulator framework for users to compose and verify quantum circuits using the Qiskit software stack. In future studies, our work can further combine with error mitigation and correction software such as Ignis, one of the four libraries in Qiskit, to characterize the noise and errors induced by hardware via simulations.

Finally, through both the scalability to arbitrary finite even number of the qubit and the adaptability to the more general criteria for identifying non-classical teleportation of the proposed protocol, we provide an essential identification toolbox for future modular uses from a process point of view. It is worth stressing that the toolbox provides an essential assessment for identifying whether all the components on the real quantum device required in the networking teleportation process are all qualified for use. In particular, the proposed assessment method paves the way for further advancement of every key element in the whole networking teleportation process to facilitate the development of future modular techniques with improved reliability in performing quantum-information processing tasks.

Methods

Illustrative examples for the steps in the proposed protocols

In the case of step 2(a), assume that the qubit number is N = 6. In the measurement process, all of the even qubits (i.e., qubits 2 and 4) and qubit 3 are measured on the Pauli-X basis, while the remaining odd particle (i.e., qubit 5) is measured on the Pauli-Z basis (Fig. 1c).

In the case of step 3(a), let us assume that qubit number N = 6, Alice’s measured outcome is j = 01, and the measurement process for the participants’ qubits yields (m2m3m4m5) = (−1, +1, −1, −1). According to the measurement results informed by Alice and the participants, P = IIZIXH, In other words, P = ZXH is applied to recover the input state ρin. That is, Bob recovers ρin by applying first an H gate, then an X gate, and finally a Z gate to his qubit.

In the case of step 3(b), we herein consider an illustrative example in which qubit number N = 8, Alice’s measured outcome is j = 10, and the measurement results of the participants’ qubits are (m2m3m4m5m6m7) = (+1, −1, +1, +1, −1, +1). According to the measurement results informed by Alice and the participants, P = IZIIXIZH. In other words, Bob applies P = XH to recover the input state ρin. That is, Bob recovers ρin by first applying an H gate and then an X gate.

Detection of genuine multipartite entangled state

To detect the existence of genuine multi-partite entangled states on the 14-qubit ibmq_16_melbourne device, which are the essential elements for realizing teleportation, we herein apply an optimal entanglement witness78 to evaluate the quality of the cluster states on the 14-qubit ibmq_16_melbourne processor. For illustration purposes, we consider both a 6-qubit box-cluster state Cb,6 and a 6-qubit chain-type cluster state Cc,6. The witness for Cb,6 has the form

WCb,6=5I6XZZIIIIZZXIZZXIZIIIIZIXZZIXZZIIIIZZX. 11

Meanwhile, the witness for Cc,6 has the form

WCc,6=5I6XZIIIIIIZXZIZXZIIIIIIZXZIZXZIIIIIIZX. 12

For a genuine 6-partite entanglement state close to Cb,6 (Cc,6), W is optimally equal to −1. To minimize the readout error caused by the measurements, the witnesses we used here only require two local measurement settings independent of the number of qubits for detection of each genuine multipartite entanglement. For example, XZZXXZ and ZXXZZX are required to evaluate Cb,6, while XZXZXZ and ZXZXZX are required to evaluate Cc,6.

 Table 2 lists all the observables required to evaluate the witnesses for Cb,6 and Cc,6, respectively. Substituting the experimental results into Eqs. 11 and 12 yields WCb,6 = 5.126 and WCc,6 = 4.1224. This result implies that the existence of genuine six-partite entanglement cannot be detected in the experimental prepared state on the real quantum device. In other words, it is necessary to improve the quality of multi-partite entanglement on the real quantum device. (Note that the experimental values shown in Table 2 were accessed through IBM Q Experience17 on 20 December 2018.)

Table 2.

Experimental values of all the observables on states Cb,6 and Cc,6, respectively, for entanglement witness W measurement. Each experimental value corresponds to the mean value obtained over 8192 measurements of 10 times and the error bars are obtained by Poissonian counting statistics.

Cb,6 Cc,6
Observable Value Observable Value
XZZIII 0.0050 ± 0.0002 XZIIII 0.0811 ± 0.0010
ZXZIII 0.0020 ± 0.0002 ZXZIII − 0.037
ZIXZZI 0.0018 ± 0.0001 IZXZII 0.0139 ± 0.0004
IZZXIZ − 0.087 IIZXZI 0.0193 ± 0.0005
IIZIXZ − 0.03 IIIZXZ 0.3049 ± 0.0016
IIIZZX − 0.017 IIIIZX 0.4951 ± 0.0017

Examination of experimental controlled gate

As shown in Eq. 2, the CZ gate is an essential entangling quantum gate for constructing a cluster state. To clarify the effect of the CZ gate on the present experimental results for the multipartite cluster states, the CZ gate on the 14-qubit ibmq_16_melbourne device was fully characterized by means of quantum process tomography. In particular, the process matrix of the CZ gate was experimentally determined with maximum likelihood79 and was then utilized to reconstruct the whole networking teleportation procedure utilizing Cb,4. The process fidelity was calculated to be Fp = 0.2457. In other words, this suggests that an increasing number of N and CZ gates leads to a corresponding decrease in the fidelity of the networking teleportation procedure on the 14-qubit quantum device. (Note that the tomographic measurement of the CZ gate was accessed through IBM Q Experience17 on 10 April 2019.)

To inquire into the effects of quantum noise in the experiments, we compared three common noise channels72, namely a depolarizing channel (χD), a phase damping channel (χAD), and an amplitude damping channel (χPD), to the experimental process matrix χexpt. The noise channels were defined respectively as

χD(ρ)=(134)IρI+14(XρX+YρY+ZρZ),χPD(ρ)=(112)IρI+12ZρZ,χAD(ρ)=(12I+12Z)ρ(12I+12Z)+14(X+iY)ρ(XiY). 13

An inspection of the computed fidelity values F(χexpt, χnoise) = trχnoiseχexptχnoise (Table 3) shows that the noise in the networking teleportation process is similar to that produced in a depolarizing channel. This then explains why the experimental process fidelities are all close to 0.25.

Table 3.

F(χexpt, χnoise) for networking teleportation protocol utilizing an N-qubit box-cluster state Cb,N and three common noise channels, respectively.

N χD χAD χPD
4 0.9999 0.7080 0.7119
6 1.0000 0.7085 0.7081
8 0.9999 0.7083 0.7053
10 1.0000 0.7062 0.7069
12 0.9999 0.7077 0.7098

Acknowledgements

The authors acknowledge the following: the IBM Q team for the access to their 14-qubit quantum computer through a cloud-computing interface. We also gratefully acknowledge the IBM Q team members, Rudy Raymond, Takashi Imamichi, and Chun-Fu Chen, for their valuable discussions and correspondence on implementation of the networking experiments through the cloud. Finally, we acknowledge the fruitful discussions with Wei-Ting Lee, Shih-Hsuan Chen, Chia-Kuo Chen, and Chien-Ying Huang. This work was partially supported by the Ministry of Science and Technology, Taiwan, under Grant Numbers MOST 107-2628-M-006-001-MY4 and MOST 107-2627-E-006-001.

Author contributions

C.-M.L. devised the basic model. N.-N.H. and W.-H.W. performed the calculation of the protocols and implemented the protocols on the IBM quantum computer. All authors established the final framework and wrote the manuscript.

Competing interests

The authors declare no competing interests.

Footnotes

Publisher’s note Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

References

  • 1.Bennett CH, et al. Teleporting an unknown quantum state via dual classical and Einstein-Podolsky-Rosen channels. Phys. Rev. Lett. 1993;70:1895–1899. doi: 10.1103/PhysRevLett.70.1895. [DOI] [PubMed] [Google Scholar]
  • 2.Kimble HJ. The quantum internet. Nature. 2008;453:1023. doi: 10.1038/nature07127. [DOI] [PubMed] [Google Scholar]
  • 3.Ritter S, et al. An elementary quantum network of single atoms in optical cavities. Nature. 2012;484:195. doi: 10.1038/nature11023. [DOI] [PubMed] [Google Scholar]
  • 4.Hucul D, et al. Modular entanglement of atomic qubits using photons and phonons. Nature Phys. 2015;11:37–42. doi: 10.1038/nphys3150. [DOI] [Google Scholar]
  • 5.Wehner S, Elkouss D, Hanson R. Quantum internet: A vision for the road ahead. Science. 2018;362:eaam9288. doi: 10.1126/science.aam9288. [DOI] [PubMed] [Google Scholar]
  • 6.Pirker A, Wallnöfer J, Dür W. Modular architectures for quantum networks. New J. Phys. 2018;20:053054. doi: 10.1088/1367-2630/aac2aa. [DOI] [Google Scholar]
  • 7.Chou KS, et al. Deterministic teleportation of a quantum gate between two logical qubits. Nature. 2018;561:368. doi: 10.1038/s41586-018-0470-y. [DOI] [PubMed] [Google Scholar]
  • 8.Jing B, et al. Entanglement of three quantum memories via interference of three single photons. Nat. Photon. 2019;13:210. doi: 10.1038/s41566-018-0342-x. [DOI] [Google Scholar]
  • 9.Yamasaki H, Murao M. Distributed encoding and decoding of quantum information over networks. Adv. Quant. Technol. 2019;2:1800066. doi: 10.1002/qute.201800066. [DOI] [Google Scholar]
  • 10.Monroe C, Kim J. Scaling the ion trap quantum processor. Science. 2013;339:1164. doi: 10.1126/science.1231298. [DOI] [PubMed] [Google Scholar]
  • 11.Devoret MH, Schoelkopf RJ. Superconducting circuits for quantum information: an outlook. Science. 2013;339:1169. doi: 10.1126/science.1231930. [DOI] [PubMed] [Google Scholar]
  • 12.Childress L, Walsworth R, Lukin M. Atom-like crystal defects. Phys. Today. 2014;67:38. doi: 10.1063/PT.3.2549. [DOI] [Google Scholar]
  • 13.Monroe C, et al. Large-scale modular quantum-computer architecture with atomic memory and photonic interconnects. Phys. Rev. A. 2014;89:022317. doi: 10.1103/PhysRevA.89.022317. [DOI] [Google Scholar]
  • 14.Narla A, et al. Robust concurrent remote entanglement between two superconducting qubits. Phys. Rev. X. 2016;6:031036. [Google Scholar]
  • 15.Brecht T, et al. Multilayer microwave integrated quantum circuits for scalable quantum computing. npj Quant. Info. 2016;2:16002. doi: 10.1038/npjqi.2016.2. [DOI] [Google Scholar]
  • 16.Leung N, et al. Deterministic bidirectional communication and remote entanglement generation between superconducting qubits. npj Quant. Info. 2019;5:18. doi: 10.1038/s41534-019-0128-0. [DOI] [Google Scholar]
  • 17. IBM Q experience https://quantum-computing.ibm.com
  • 18. Qiskit https://qiskit.org/
  • 19.Alsina D, Latorre JI. Experimental test of Mermin inequalities on a five-qubit quantum computer. Phys. Rev. A. 2016;94:012314. doi: 10.1103/PhysRevA.94.012314. [DOI] [Google Scholar]
  • 20.Wang Y, Li Y, Yin Z-Q, Zeng B. 16-qubit IBM universal quantum computer can be fully entangled. npj Quant. Info. 2018;4:46. doi: 10.1038/s41534-018-0095-x. [DOI] [Google Scholar]
  • 21.Mooney GJ, Hill CD, Hollenberg LC. Entanglement in a 20-Qubit Superconducting Quantum Computer. Sci. Rep. 2019;9:13465. doi: 10.1038/s41598-019-49805-7. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 22.Morris, J., Pollock, F. A. & Modi, K. Non-Markovian memory in IBMQX4. Pre print at https://arxiv.org/abs/1902.07980 (2019).
  • 23.Ku, H.-Y. et al. Experimental test of non-macrorealistic cat-states in the cloud. Pre print at https://arxiv.org/abs/1905.13454 (2019).
  • 24.Devitt SJ. Performing quantum computing experiments in the cloud. Phys. Rev. A. 2016;94:032329. doi: 10.1103/PhysRevA.94.032329. [DOI] [Google Scholar]
  • 25.Fedortchenko, S. A quantum teleportation experiment for undergraduate students. Pre print at https://arxiv.org/abs/1607.02398 (2016).
  • 26.Sisodia M, Shukla A, Thapliyal K, Pathak A. Design and experimental realization of an optimal scheme for teleportation of an n-qubit quantum state. Quant. Inf. Process. 2017;16:292. doi: 10.1007/s11128-017-1744-2. [DOI] [Google Scholar]
  • 27.Behera BK, Banerjee A, Panigrahi PK. Experimental realization of quantum cheque using a five-qubit quantum computer. Quant. Inf. Process. 2017;16:312. doi: 10.1007/s11128-017-1762-0. [DOI] [Google Scholar]
  • 28.Behera BK, Reza T, Gupta A, Panigrahi PK. Designing quantum router in IBM quantum computer. Quant. Inf. Process. 2019;18:328. doi: 10.1007/s11128-019-2436-x. [DOI] [Google Scholar]
  • 29.Briegel HJ, Raussendorf R. Persistent entanglement in arrays of interacting particles. Phys. Rev. Lett. 2001;86:910. doi: 10.1103/PhysRevLett.86.910. [DOI] [PubMed] [Google Scholar]
  • 30.Raussendorf R, Briegel HJ. A one-way quantum computer. Phys. Rev. Lett. 2004;86:5188. doi: 10.1103/PhysRevLett.86.5188. [DOI] [PubMed] [Google Scholar]
  • 31.Hsieh J-H, Chen S-H, Li C-M. Quantifying Quantum-Mechanical Processes. Sci. Rep. 2017;7:13588. doi: 10.1038/s41598-017-13604-9. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 32.Gao WB, et al. Quantum teleportation from a propagating photon to a solid-state spin qubit. Nat. Commun. 2013;4:2744. doi: 10.1038/ncomms3744. [DOI] [PubMed] [Google Scholar]
  • 33.Bussières F, et al. Quantum teleportation from a telecom-wavelength photon to a solid-state quantum memory. Nat. Photon. 2014;8:775. doi: 10.1038/nphoton.2014.215. [DOI] [Google Scholar]
  • 34.Pfaff W, et al. Unconditional quantum teleportation between distant solid-state quantum bits. Science. 2014;345:532. doi: 10.1126/science.1253512. [DOI] [PubMed] [Google Scholar]
  • 35.Riebe M, et al. Deterministic quantum teleportation with atoms. Nature. 2004;429:734. doi: 10.1038/nature02570. [DOI] [PubMed] [Google Scholar]
  • 36.Nölleke C, et al. Efficient teleportation between remote single-atom quantum memories. Phys. Rev. Lett. 2013;110:140403. doi: 10.1103/PhysRevLett.110.140403. [DOI] [PubMed] [Google Scholar]
  • 37.Ursin R, et al. Communications: Quantum teleportation across the Danube. Nature. 2004;430:849. doi: 10.1038/430849a. [DOI] [PubMed] [Google Scholar]
  • 38.Jin X-M, et al. Experimental free-space quantum teleportation. Nat. Photon. 2010;4:376. doi: 10.1038/nphoton.2010.87. [DOI] [Google Scholar]
  • 39.Yin J, et al. Quantum teleportation and entanglement distribution over 100-kilometre free-space channels. Nature. 2012;488:185. doi: 10.1038/nature11332. [DOI] [PubMed] [Google Scholar]
  • 40.Metcalf BJ, et al. Quantum teleportation on a photonic chip. Nat. Photon. 2014;8:770. doi: 10.1038/nphoton.2014.217. [DOI] [Google Scholar]
  • 41.Wang X-L, et al. Quantum teleportation of multiple degrees of freedom of a single photon. Nature. 2015;518:516. doi: 10.1038/nature14246. [DOI] [PubMed] [Google Scholar]
  • 42.Chen Y-A, et al. Memory-built-in quantum teleportation with photonic and atomic qubits. Nat. Phys. 2008;4:103. doi: 10.1038/nphys832. [DOI] [Google Scholar]
  • 43.Krauter H, et al. Deterministic quantum teleportation between distant atomic objects. Nat. Phys. 2013;9:400. doi: 10.1038/nphys2631. [DOI] [Google Scholar]
  • 44.Ren J-G, et al. Ground-to-satellite quantum teleportation. Nature. 2017;549:70. doi: 10.1038/nature23675. [DOI] [PubMed] [Google Scholar]
  • 45.Yin J, et al. Satellite-based entanglement distribution over 1200 kilometers. Science. 2017;356:1140. doi: 10.1126/science.aan3211. [DOI] [PubMed] [Google Scholar]
  • 46.Briegel HJ, Browne DE, Dür W, Raussendorf R, Van den Nest M. Measurement-based quantum computation. Nature Physics. 2009;5:19. doi: 10.1038/nphys1157. [DOI] [Google Scholar]
  • 47.Danos V, Kashefi E. Determinism in the one-way model. Phys. Rev. A. 2006;74:052310. doi: 10.1103/PhysRevA.74.052310. [DOI] [Google Scholar]
  • 48.Browne DE, Kashefi E, Mhalla M, Perdrix S. Generalized flow and determinism in measurement-based quantum computation. New J. Phys. 2007;9:250. doi: 10.1088/1367-2630/9/8/250. [DOI] [Google Scholar]
  • 49.Gottesman, D. Stabilizer Codes and Quantum Error Correction. PhD thesis, Californian Institute of Technology (1997).
  • 50.Schlingemann D, Werner RF. Quantum error-correcting codes associated with graphs. Phys. Rev. A. 2001;65:012308. doi: 10.1103/PhysRevA.65.012308. [DOI] [Google Scholar]
  • 51.Schlingemann D. Stabilizer codes can be realized as graph codes. Quant. Inf. Comp. 2002;2:307–323. [Google Scholar]
  • 52.Aliferis P, Leung DW. Simple proof of fault tolerance in the graph-state model. Phys. Rev. A. 2006;73:032308. doi: 10.1103/PhysRevA.73.032308. [DOI] [Google Scholar]
  • 53.Broadbent, A., Fitzsimons, J. & Kashefi, E. Universal blind quantum computation. In Proc. 50th Annual Symp. Foundations of Computer Science 517-526 (IEEE, 2009).
  • 54.Barz S, et al. Demonstration of blind quantum computing. Science. 2012;335:303–308. doi: 10.1126/science.1214707. [DOI] [PubMed] [Google Scholar]
  • 55.Morimae T, Fujii K. Blind quantum computation protocol in which Alice only makes measurements. Phys. Rev. A. 2013;87:050301(R). doi: 10.1103/PhysRevA.87.050301. [DOI] [Google Scholar]
  • 56.Greganti C, Roehsner M-C, Barz S, Morimae T, Walther P. Demonstration of measurement-only blind quantum computing. New J. Phys. 2016;18:013020. doi: 10.1088/1367-2630/18/1/013020. [DOI] [Google Scholar]
  • 57.Markham D, Sanders BC. Graph states for quantum secret sharing. Phys. Rev. A. 2008;78:042309. doi: 10.1103/PhysRevA.78.042309. [DOI] [Google Scholar]
  • 58.Bell B, et al. Experimental demonstration of graph-state quantum secret sharing. Nat. Commun. 2014;5:5480. doi: 10.1038/ncomms6480. [DOI] [PubMed] [Google Scholar]
  • 59.Wang X-L, et al. Experimental ten-photon entanglement. Phys. Rev. Lett. 2016;117:210502. doi: 10.1103/PhysRevLett.117.210502. [DOI] [PubMed] [Google Scholar]
  • 60.Barreiro JT, et al. An open-system quantum simulator with trapped ions. Nature. 2011;470:486–491. doi: 10.1038/nature09801. [DOI] [PubMed] [Google Scholar]
  • 61.Monz T, et al. 14-qubit entanglement: creation and coherence. Phys. Rev. Lett. 2011;106:130506. doi: 10.1103/PhysRevLett.106.130506. [DOI] [PubMed] [Google Scholar]
  • 62.Cramer J, et al. Repeated quantum error correction on a continuously encoded qubit by real-time feedback. Nat. Commun. 2016;7:11526. doi: 10.1038/ncomms11526. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 63.Mattle K, Weinfurter H, Kwiat PG, Zeilinger A. Dense coding in experimental quantum communication. Phys. Rev. Lett. 1996;76:4656. doi: 10.1103/PhysRevLett.76.4656. [DOI] [PubMed] [Google Scholar]
  • 64.Schuck C, Huber G, Kurtsiefer C, Weinfurter H. Complete deterministic linear optics Bell-state analysis. Phys. Rev. Lett. 2006;96:190501. doi: 10.1103/PhysRevLett.96.190501. [DOI] [PubMed] [Google Scholar]
  • 65.Zhou L, Sheng YB. Complete logic Bell-state analysis assisted with photonic Faraday rotation. Phys. Rev. A. 2015;92:042314. doi: 10.1103/PhysRevA.92.042314. [DOI] [Google Scholar]
  • 66.Sheng YB, Zhou L. Two-step complete polarization logic Bell-state analysis. Sci. Rep. 2015;5:13453. doi: 10.1038/srep13453. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 67.Zhou L, Sheng YB. Feasible logic Bell-state analysis with linear optics. Sci. Rep. 2016;6:20901. doi: 10.1038/srep20901. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 68.Liu YL, Wang MW, Bai CY, Wang TJ. Asymmetrical Bell state analysis for photon-atoms hybrid system. Sci. China-Phys. Mech. Astron. 2019;62:120311. doi: 10.1007/s11433-019-9414-2. [DOI] [Google Scholar]
  • 69.Zheng YY, Liang LX, Zhang M. Error-heralded generation and self-assisted complete analysis of two-photon hyperentangled Bell states through single-sided quantum-dot-cavity systems. Sci. China-Phys. Mech. Astron. 2019;62:970312. doi: 10.1007/s11433-018-9338-8. [DOI] [Google Scholar]
  • 70.Wang GY, Ren BC, Deng FG, Long GL. Complete analysis of hyperentangled Bell states assisted with auxiliary hyperentanglement. Opt. Express. 2019;27:8994. doi: 10.1364/OE.27.008994. [DOI] [PubMed] [Google Scholar]
  • 71.Li T, Miranowicz A, Xia KY, Nori F. Resource-efficient analyzer of Bell and Greenberger-Horne-Zeilinger states of multiphoton systems. Phys. Rev. A. 2019;100:052303. doi: 10.1103/PhysRevA.100.052303. [DOI] [Google Scholar]
  • 72.Nielsen, M. A. & Chuang, I. L. Quantum Computation and Quantum Information (Cambridge Univ. Press, 2000).
  • 73.Gilchrist A, Langford NK, Nielsen MA. Distance measures to compare real and ideal quantum processes. Phys. Rev. A. 2005;71:062310. doi: 10.1103/PhysRevA.71.062310. [DOI] [Google Scholar]
  • 74.Massar S, Popescu S. Optimal extraction of information from finite quantum ensembles. Phys. Rev. Lett. 1995;74:1259. doi: 10.1103/PhysRevLett.74.1259. [DOI] [PubMed] [Google Scholar]
  • 75.Chen S-H, et al. Discriminating Quantum Correlations with Networking Quantum Teleportation. Phys. Rev. Research. 2020;2:013043. doi: 10.1103/PhysRevResearch.2.013043. [DOI] [Google Scholar]
  • 76.Doi, J., Takahashi, H., Raymond, R., Imamichi, T. & Horii, H. Quantum computing simulator on a heterogenous HPC system. 16th ACM Proc. Int. Conf. on Computing Frontiers (New York) pp. 85-93 (2019).
  • 77.James DFV, Kwiat PG, Munro WJ, White AG. Measurement of qubits. Phys. Rev. A. 2001;64:052312. doi: 10.1103/PhysRevA.64.052312. [DOI] [Google Scholar]
  • 78.Tóth G, Gühne O. Detecting genuine multipartite entanglement with two local measurements. Phys. Rev. Lett. 2005;94:060501. doi: 10.1103/PhysRevLett.94.060501. [DOI] [PubMed] [Google Scholar]
  • 79.O’Brien JL, et al. Quantum process tomography of a controlled-NOT gate. Phys. Rev. Lett. 2004;93:080502. doi: 10.1103/PhysRevLett.93.080502. [DOI] [PubMed] [Google Scholar]
  • 80.Bennett CH, et al. Remote state preparation. Phys. Rev. Lett. 2001;87:077902. doi: 10.1103/PhysRevLett.87.077902. [DOI] [PubMed] [Google Scholar]

Articles from Scientific Reports are provided here courtesy of Nature Publishing Group

RESOURCES