Verifiable cloud-based variational quantum algorithms
Abstract
Variational quantum algorithms (VQAs) have shown potential for quantum advantage with noisy intermediate-scale quantum (NISQ) devices for quantum machine learning (QML). However, given the high cost and limited availability of quantum resources, delegating VQAs via cloud networks is a more practical solution for a client with limited quantum capabilities. Recently, Shingu et al. proposed a variational secure cloud quantum computing protocol that leverages ancilla-driven quantum computation (ADQC) to perform cloud-based VQAs with minimal quantum resource consumption. However, their protocol lacks verifiability, which exposes it to potential malicious behaviors by the server. Additionally, channel loss requires frequent re-delegation as the size of the delegated variational circuit grows, complicating verification due to increased circuit complexity. This paper introduces a novel protocol that addresses these challenges by incorporating verifiability and increasing tolerance to channel loss while maintaining low quantum resource consumption for the server and requiring minimal quantum capabilities from the client.
keywords:
Cloud-based variational quantum algorithms , Ancilla-driven quantum computation , Verifiability1 Introduction
Quantum computation [1] has rapidly transitioned from theoretical speculation to practical application, leveraging the principles of quantum mechanics to tackle problems intractable for classical computers. Despite this progress, quantum resources remain scarce and costly, primarily accessible to large corporations. This limitation has spurred efforts to make quantum computation more accessible, especially for a client with limited quantum capabilities.
Blind quantum computation (BQC), a subset of delegated quantum computation (DQC), was first introduced by Childs [2]. It employs quantum one-time padding [3] in gate-based quantum computation (GBQC), enabling a client to delegate quantum computations while ensuring blindness, i.e., the client’s input, output, and algorithm remain hidden from the server. Building on this concept, Broadbent et al. [4] proposed the universal blind quantum computation (UBQC) protocol, also known as the BFK protocol. This protocol uses brickwork states as resource states within measurement-based quantum computation (MBQC) [5] on the server side, requiring the client only to prepare a set of qubits while maintaining blindness. This protocol has spurred research in areas such as verification [6, 7, 8], the reduction of the client’s quantum capabilities [9, 10, 11, 12, 13, 14, 15], joint computational tasks [16], and various applications, including Shor’s algorithm [17] and Grover’s algorithm [18]. Experimental demonstrations of BQC have also been conducted [19, 20].
In parallel, variational quantum algorithms (VQAs)[21] have emerged as a promising framework for leveraging noisy intermediate-scale quantum (NISQ) devices in quantum machine learning (QML)[22]. VQAs have demonstrated potential quantum advantages [23] in domains such as quantum federated learning (QFL)[24], quantum support vector machines (QSVMs)[25], and quantum reinforcement learning (QRL) [26].
Integrating VQAs with BQC provides a promising method for the client with limited quantum capabilities to delegate VQAs to a remote server via cloud networks securely. In previous work, Li et al. [27] combined the BFK protocol [4] with VQAs to implement delegated QFL. However, this approach requires significant quantum resources, with the server needing to entangle qubits, where is the number of qubits required by the original NISQ algorithms and is the depth of the brickwork states [4] in the BFK protocol. Wang et al. [28] mitigated this by employing qubit reuse [29], lowering the server’s quantum resource consumption to qubits.
Shingu et al.[30] further minimized the server’s quantum resource consumption while upholding the principles of BQC by proposing a variational secure cloud quantum computing protocol. This protocol leverages ancilla-driven quantum computation (ADQC)[31] and the no-signaling principle [9] to implement variational quantum algorithms (VQAs) securely. Their approach requires the server to use only qubits per operation. However, this protocol lacks verification and is vulnerable to potential malicious operations by the server. Additionally, it is not robust against channel loss, requiring frequent re-delegation as the size of the delegated variational circuit increases, complicating verification. This paper introduces a new protocol that extends their work by incorporating verifiability and increasing tolerance to channel loss while maintaining low quantum resource consumption for the server and requiring minimal quantum capabilities from the client.
The paper is organized as follows: Section 2 covers the preliminaries, including ADQC, VQAs, and a review of Shingu et al.’s protocol [30]. Section 3 describes the proposed protocol. Section 4 provides an analysis of the protocol, with a focus on verifiability, blindness, correctness, and comparisons with existing protocols. Finally, Section 5 concludes the paper by discussing potential extensions and suggesting directions for future research.
2 Preliminaries
2.1 Ancilla-Driven Quantum Computation
Ancilla-driven quantum computation (ADQC) [31] is a hybrid model that integrates elements of MBQC and GBQC. In ADQC, an ancillary qubit is coupled with a register qubit to implement a single-qubit operation :
(1) |
where represents the designated rotation angle. Alternatively, it can be coupled with two register qubits to implement a controlled-Z gate using the fixed coupling operation . Here, denotes the controlled-Z gate between the register and ancillary qubits, with () representing the Hadamard gate applied to the register (ancillary) qubit. The ancillary qubit is then measured in a specific basis, consistent with MBQC, to ensure determinism, and the measurement outcome determines the evolution of the register qubit(s), as illustrated in Fig. 1 for operator.
Ancillary qubits can be realized as optical photons in optical systems [32] and transmitted to distant locations after being coupled to the register qubits, enabling ADQC to be performed remotely by measuring the ancillary qubits in the basis:
(2) |
2.2 Variational quantum algorithms
Variational quantum algorithms (VQAs) utilize parameterized quantum gates, such as , , and [21], which rotate qubits around the x, y, and z axes of the Bloch sphere, respectively. The rotation angles in the variational circuit are optimized, where denotes a parameterized quantum state.
When incorporating classical data into VQAs, encoding techniques such as amplitude encoding [33] are used to transform the data into quantum states. The general structure of the circuit is illustrated in Fig. 2. VQA circuits can be conceptualized as quantum neural networks [34], where qubits serve as nodes, and quantum gates, represented by matrices, correspond to the weights of a neural network, directly influencing the qubit states.
The variational parameters , where denotes the total number of parameters, are iteratively updated and optimized by a classical optimizer, such as Adam [35], using measurement outcomes from the quantum circuit along with the cost function:
(3) | ||||
where denotes the expectation value of the output state for a given set of parameters , and is the measurement observable. The function represents the objective function, such as mean squared error (MSE) or cross-entropy.
The parameters are iteratively updated via gradient descent, such that , where denotes the learning rate. The gradients are computed using the parameter-shift rule [36]. Specifically, the gradient is given by:
(4) | ||||
where .
2.3 Review of Shingu et al.’s Protocol
The variational secure cloud quantum computing protocol proposed by Shingu et al. employs the circuit depicted in Fig. 1 to perform single-qubit gates and necessitates additional gates to execute two-qubit controlled gates, as shown in Fig. 3.
Specifically, a single-qubit gate is implemented using three consecutive operators with , , and , following Euler’s rotation theorem [37]. Here, and , where , , and are Euler angles. In contrast, a two-qubit controlled gate is realized by decomposing it into multiple operators to be delegated, along with additional gates, Hadamard () gates, the gate, and its conjugate transpose, the gate, which are directly performed by the server, as shown in Fig. 3. The client receives and measures ancillary qubits sent by the server to evolve the register qubits according to ADQC. Subsequently, the server measures the output register qubits and sends the results to the client.
The protocol proceeds as follows:
A1(Preparation phase):
-
A1-1:
The server publicly announces the following: the number of original and variational quantum circuits for gradient calculations, ; the set of unitary operators , where denotes the -th circuit; the set of measurement observables , where is the number of observables measured in the -th circuit; the number of circuit repetitions ; the initial states , where indicates the initial parameters at the current iteration step; the number of variational parameters, ; and the total number of iteration steps for VQAs, .
-
A1-2:
The server prepares register qubits and one ancillary qubit .
A2(Computation phase):
- A2-1:
-
A2-2:
The server measures the output register qubits’ states with the measurement observables and sends the results to the client via classical communication.
-
A2-3:
The client compensates for the Pauli byproduct effect.
-
A2-4:
The server reprepares ancillary qubit .
A3(Parameters updating phase):
-
A3-1:
The server and the client repeat A2 times to derive the expectation values of .
-
A3-2:
The client updates the parameters using its optimizer according to Eq. 4, resulting in for the next iteration.
-
A3-3:
The client computes the measurement angles for the circuits using the parameters .
-
A3-4:
The client and server reiterate the above steps times with and . Based on the results from the -th step, the client’s optimizer updates the parameters to for .
This protocol enables the delegation of VQAs through interaction between the server and the client, requiring only register qubits and a single ancillary qubit. However, if any of the coupled ancillary qubits are lost during transmission, the circuit needs to be re-delegated, which results in a low tolerance to channel loss. Even the most efficient single-photon detectors in optics, which have shown 99% efficiency in recent studies [38, 39], are not immune to this issue. For sufficiently large circuits, the probability of re-delegation becomes significant. For example, consider a circuit where each block consists of an average of four single-qubit gates and one two-qubit control gate. A circuit with six blocks would require operators. The probability of needing to re-delegate the circuit is approximately per delegated operator, increasing exponentially with the number of operators.
Due to channel loss, adding dummy gates for verification becomes impractical, as the circuit would require enough extra trap wires for dummy gates without affecting the wires used for computation. This increases the circuit size and leads to frequent circuit re-delegation. One potential solution to mitigate channel loss is to share Bell pairs between the server and the client, with repeated entanglement generation until successful [9]. However, during each delegation of the operator, as illustrated in Fig. 1, the ancillary qubit is sent to the client for measurement after being coupled with the register qubit. Although the server can send one half of the Bell pair to the client for measurement, additional measurements on the remaining half are required on the server side after being coupled with the register qubit. However, the server cannot perform these measurements in the context of Fig. 1, where measurement on the ancillary qubit is performed by the client, rendering the use of Bell pairs ineffective in this context.
3 The Proposed Protocol
We adopt the strategy outlined in [40], where the server performs measurements after coupling the ancillary qubits with the register qubits, effectively addressing the limitations of using Bell pairs to tolerate channel loss in Shingu et al.’s protocol. The client is required to perform measurements in the bases . For verification, we use trap qubits to create dummy gates in the trap wires as the circuit is transformed into the universal gate patterns shown in Fig. 4(a). Additionally, we delegate encrypted measurements of the output register qubits to the server, making it difficult to identify the trap wires in the circuits.
The client delegates the operators within the universal gate patterns shown in Fig. 4(a), while the server provides the gates. This process includes preparation, computation, verification, and parameter updating phases, as briefly illustrated in Fig. 5. The specific steps are as follows:
B1(Preparation phase):
-
B1-1:
The server publicly announces the following: the number of original and variant variational quantum circuits for gradient calculation, ; the set of transformed unitary operators, ; the number of circuit repetitions, ; the initial states, , for the circuits; the number of variational parameters, ; the total number of iteration steps for VQAs, ; and the size of the transformed circuits, , where and represent the number of input qubits and the circuit depth, respectively.
-
B1-2:
The server prepares register qubits , one ancillary qubit , one ancillary qubit and two ancillary qubits as a Bell pair. Meanwhile, the client chooses register qubits as trap qubits for verification, which is optimal [6].
B2(Computation phase):
-
B2-1:
The server sends one qubit from the Bell pair to the client, who measures it in the basis , yielding the result , where is randomly and uniformly selected from . The client generates a random bit recv_status to indicate the reception status, setting it to 0 if the qubit arrived successfully or to 1 if it was lost. This status is communicated to the server, who generates a new Bell pair and resends half of it to the client until the qubit arrives successfully. The other half of the Bell pair will eventually be in the state:
(5) -
B2-2:
The server employs the transformed circuits using the operator, as depicted in Fig. 4(c), to generate the trial wave functions . In each delegation of the operator, the measurement results and are first sent to the client. The client then uses to compute the encrypted measurement angle:
(6) where is a random bit chosen by the client. This encrypted angle is sent to the server, which measures in the basis . The resulting measurement outcome is then sent to the client. The actual measurement angle is adaptively chosen based on prior Pauli byproducts to ensure determinism in MBQC.
-
B2-3:
In each transformed circuit, of the wires are randomly designated as trap wires, where dummy operations are implemented. On half of these trap wires, the identity gate is applied times on each wire. On the remaining trap wires, a single Hadamard gate is randomly inserted on each wire, while the identity gate occupies the other positions.
-
B2-4:
The server measures the output register qubits, each with Pauli byproducts and , in the basis. To measure in the basis, the client applies an additional Hadamard gate at the end of the original circuit before measuring in the basis. This transformation can be expressed as:
(7) where is the -th output register qubit of for . is the expectation value of in the state , and is the expectation value of in the state .
-
B2-5:
The client compensates for the Pauli byproducts on all output register qubits by flipping the measurement results according to and .
-
B2-6:
The server resets one ancillary qubit to , one to , and reprepares Bell pair .
B3(Verification phase):
-
B3-1:
At the end of B2-3, the output register qubits consist of non-trap qubits and trap qubits in a random permutation designed by the client. The output state can be written as:
(8) where represents the non-trap qubits, and is the Pauli byproduct operator. The subscript includes both non-trap qubits () and trap qubits (), with as the permutation.
-
B3-2:
The client instructs the server to measure all desired trap qubits, in the basis and in the basis, in B2-4. If any undesired output in the basis or in the basis is obtained after compensating for the Pauli byproduct effect, the protocol is terminated.
B4 (Parameters updating phase):
-
B4-1:
The server and the client repeat B2 to B3 times to derive the expectation values of or in each output register qubit.
-
B4-2:
The client utilizes its optimizer to update the parameters according to Eq. 4, resulting in for the next step.
-
B4-3:
The client calculates the measurement angles for circuits using .
-
B4-4:
The client and server reiterate the above steps times with and . Based on the results from the -th step, the client’s optimizer updates the parameters to for .
4 Analysis
4.1 Verifiability
We use trap qubits to detect malicious operations on the output register qubits. The verifiability of the proposed protocol is demonstrated in Theorem I, which follows a method similar to that in [6], where further details can be found.
Theorem 1.
The probability of the client being tricked by the server is exponentially small.
Proof.
If the server is malicious, it may deviate from the state:
(9) |
to an arbitrary state. However, due to the completely positive trace preserving (CPTP) map [11], this deviation can be detected as a random Pauli attack.
Suppose represents a random Pauli attack, where the weight of () is the number of non-trivial operators in , such that , where , , and are the numbers of , , and operators in , respectively. We have . When these operators are applied to the output trap qubits and , will only change to , will only change to , and will change both and to and , respectively.
We can calculate the probabilities that each operator in does not change any trap qubits. Suppose . An operator that does not change any trap qubits will only act on and non-trap qubits, the number of which is . Thus, the probability is:
(10) |
Similarly, for , the probability , and for , the probability can be calculated in the same way.
The proposed protocol requires the client to send qubits, qubit reception statuses, and encrypted measurement angles, which seems to conflict with the no-signaling principle. However, the permutation is not transmitted, ensuring its secrecy. The server is only aware of measuring in the basis, while the basis is implemented by delegating an additional Hadamard gate at the end of the original circuit. Consequently, the server cannot distinguish between trap and non-trap qubits, thereby further protecting without any leakage to the server.
After the client randomly selects a permutation , the probability that does not alter any trap qubits is at most . Consequently, the probability that the server deceives the client is at most:
(11) |
where is the number of original and variant quantum circuits used to calculate gradients, and is the set of circuit repetitions. This probability becomes exponentially small when is sufficiently large, ensuring the protocol’s verifiability.
∎
4.2 Blindness and Correctness
We utilize universal gate patterns in the proposed protocol to ensure both blindness and correctness during computation, with minimal information leakage. Specifically, only the size of the delegated circuit, corresponding to the size of the universal gate patterns, is revealed. The following theorems establish the blindness and correctness of the proposed protocol in the context of cloud-based VQAs.
Theorem 2.
The proposed protocol guarantees input, output, and algorithm blindness.
Proof.
Input Blindness: After the client measures one qubit of the Bell pair, the remaining qubit is left in a maximally mixed state:
(12) |
with the value of hidden from the server.
Output Blindness: After applying the operator, the register qubit is . Upon completion of the delegated circuit, the output register qubits are , where are Pauli byproducts. Since the server cannot determine , it cannot compensate for , and therefore cannot compensate for , leaving the output qubits in a maximally mixed state.
Algorithm Blindness: When the client sends the encrypted measurement angle to the server, the true measurement angle remains concealed, as and are randomly chosen, and is never revealed.
Therefore, the server can only deduce the general structure of the universal gate patterns. ∎
Theorem 3.
The proposed protocol ensures correctness throughout the computation.
Proof.
In each gate pattern, as depicted in Fig. 4(b), the server directly applies the gate, while the operator is implemented using the circuit shown in Fig. 4(c). This procedure results in the state with Pauli byproducts. Further details on this mathematical derivation are provided in A.
The client subsequently adjusts the measurement results provided by the server to account for these Pauli byproducts, ensuring the correct realization of operators within the universal gate patterns. Each gate pattern is parameterized by , enabling the implementation of arbitrary single-qubit gates. For example, the operation can be achieved by setting while appropriately selecting the remaining parameters. Here, and denote arbitrary single-qubit gates, which can be decomposed as and , following Euler’s rotation theorem [37]. Additionally, the gate can be realized within this pattern by setting and , while setting the others to .
Using these gates, any quantum gate in VQAs can be realized. Moreover, the delegated computation adheres to the rules of MBQC, where measurement angles are adaptively chosen to move all Pauli byproducts to the leftmost position, resulting in . By appropriately correcting the measurement results, the client ultimately obtains the desired state . ∎
Verifiable | Client’s quantum capabilities | Tolerance to channel loss | Server’s quantum resource consumption | |
---|---|---|---|---|
Li et al.’s BFK-based protocol [27] | Yes | Prepare qubits | Yes | |
Wang et al.’s BFK-based protocol [28] | Yes | Measure qubits | Yes | |
Shingu et al.’s protocol [30] | No | Measure qubits | No | |
The proposed protocol | Yes | Measure qubits | Yes |
4.3 Comparisons
Table 1 compares the proposed protocol with related protocols for cloud-based VQAs. Our protocol extends the method introduced by Shingu et al. [30] by incorporating verification and increasing tolerance to channel loss. Regarding the client’s quantum capabilities, our protocol requires only minimal quantum resource consumption; specifically, the client needs only to perform measurements in specific bases, which is significantly easier than preparing qubits in optical systems [9].
An additional advantage of our protocol is its improved tolerance to channel loss. In Shingu et al.’s protocol, the loss of any ancillary qubit during transmission necessitates the re-delegation of the entire circuit, which becomes particularly problematic for large circuits. In contrast, our protocol allows the server to perform encrypted measurements, thereby achieving tolerance by sharing Bell pairs between the server and client. While both Wang et al.’s [28] and Li et al.’s [27] BFK-based protocols also tolerate channel loss, Wang et al.’s protocol requires qubits with verification, and Li et al.’s protocol requires qubits with verification, where is the number of qubits in the original NISQ algorithms and is the depth of the brickwork states in the BFK protocols. In contrast, our protocol, adapted from Shingu et al.’s approach, requires only register qubits and four ancillary qubits. Although our protocol employs more qubits due to the added verification step, it still uses significantly fewer qubits than the BFK-based protocols.
5 Conclusion and Discussion
In this paper, we propose a protocol for cloud-based VQAs that extends the work of Shingu et al. by incorporating verifiability and increasing tolerance to channel loss. We have also demonstrated the protocol’s blindness and correctness, ensuring security and accuracy in cloud-based VQAs. Additionally, we compare the client’s quantum capabilities and the server’s resource consumption with those in Shingu et al.’s protocol and BFK-based protocols, demonstrating that our protocol maintains low quantum resource consumption for the server and minimal quantum capabilities for the client.
The proposed protocol can be further extended through two potential schemes. First, if the client possesses multiple photon detectors, the operators can be performed on multiple register qubits in parallel, thereby accelerating the protocol’s runtime. However, this approach increases the server’s quantum resource consumption due to the preparation of additional ancillary qubits. Second, the protocol can be adapted for the client without quantum capabilities by employing the double-server blind quantum computation method [11], which is compatible with the proposed protocol.
Further research is necessary in several areas. Reducing communication costs while ensuring security remains a significant challenge. Additionally, exploring alternative verification methods to reduce quantum resource consumption further would be beneficial. Lastly, instead of directly transforming parameterized gate-based quantum circuits into MBQC patterns, adopting an MBQC-native approach [41, 42, 43] for VQAs could offer improved circuit depth reduction, making it suitable for adaptation to cloud-based VQAs. Our protocol has the potential to pave the way for real-world applications of cloud-based quantum computing.
Acknowledgement
This work is supported by the National Natural Science Foundation of China under Grant Nos. 62072119 and 62271436.
Appendix A Derivation of within Universal Gate Patterns
We analyze the operations within the circuit depicted in Fig. 4(c), involving three ancillary qubits and one register qubit . Let , , and represent the ancillary qubits. After the client measures one half of the Bell pair, yielding the result , the ancillary qubits are prepared in the initial states:
(13) |
Let , , and denote the measurement results of , , and , respectively. The resulting operations on the register and ancillary qubits are:
(14) |
The measurement result of determines the -rotation angle for . We can simplify the above expression by omitting :
(15) |
Since the operation does not entangle with the register qubit, we can omit the operations on . Thus, we obtain the following expression for the remaining qubits:
(16) |
The measurement result of determines the state of :
(17) |
Applying Eq. 6, the above simplifies to:
(18) |
Thus, is obtained with Pauli byproducts on the register qubit .
References
- [1] DiVincenzo, David P. Quantum computation. Science. 270, 255-261 (1995)
- [2] Childs, Andrew M. Quantum Information & Computation. 5, 456-466 (2005)
- [3] Deng, Fu-Guo, and Gui Lu Long. Physical Review A. 69, 052319 (2004)
- [4] Broadbent, Anne, Joseph Fitzsimons, and Elham Kashefi. 2009 50th Annual IEEE Symposium On Foundations Of Computer Science. pp. 517-526 (2009)
- [5] Briegel, Hans J and Browne, David E and Dür, Wolfgang and Raussendorf, Robert and Van den Nest, Maarten. Nature Physics. 5, 19-26 (2009)
- [6] Morimae, Tomoyuki. Physical Review A. 89, 060302 (2014)
- [7] Fitzsimons, Joseph F and Kashefi, Elham. Physical Review A. 96, 012303 (2017)
- [8] Barz, Stefanie and Fitzsimons, Joseph F and Kashefi, Elham and Walther, Philip. Nature Physics. 9, 727-731 (2013)
- [9] Morimae, Tomoyuki and Fujii, Keisuke. Physical Review A. 87, 050301 (2013)
- [10] Li, Qin and Liu, Chengdong and Peng, Yu and Yu, Fang and Zhang, Cai Optics & Laser Technology. 142 pp. 107190 (2021)
- [11] Morimae, Tomoyuki and Fujii, Keisuke. Physical Review Letters. 111, 020502 (2013)
- [12] Li, Qin and Chan, Wai Hong and Wu, Chunhui and Wen, Zhonghua. Physical Review A. 89, 040302 (2014)
- [13] Xu, Hai-Ru and Wang, Bang-Hai. Laser Physics Letters. 19, 015202 (2021)
- [14] Zhang, Xiaoqian. Quantum Information Processing. 21, 14 (2022)
- [15] Cao, Shuxiang. New Journal Of Physics. 25, 103028 (2023)
- [16] Sciarrino, Fabio and Polacchi, Beatrice and Leichtle, Dominik and Limongi, Leonardo and Carvacho, Gonzalo and Milani, Giorgio and Spagnolo, Nicolo and Kaplan, Marc and Kashefi, Elham. Nature Communications. (2023)
- [17] Das, Aritra and Sanders, Barry C. Physical Review A. 106, 012421 (2022)
- [18] Gustiani, Cica and DiVincenzo, David P. Physical Review A. 104, 062422 (2021)
- [19] Barz, Stefanie and Kashefi, Elham and Broadbent, Anne, and Fitzsimons, Joseph F and Zeilinger, Anton and Walther, Philip. Science. 335, 303-308 (2012)
- [20] Huang, He-Liang and Zhao, Qi and Ma, Xiongfeng, and Liu, Chang and Su, Zu-En and Wang, Xi-Lin and Li, Li and Liu, Nai-Le and Sanders, Barry C. and Lu, Chao-Yang and Pan, Jian-Wei. Physical Review Letters. 119, 050503 (2017)
- [21] Cerezo, Marco and Arrasmith, Andrew and Babbush, Ryan and Benjamin, Simon C and Endo, Suguru and Fujii, Keisuke and McClean, Jarrod R and Mitarai, Kosuke and Yuan, Xiao and Cincio, Lukasz and others Nature Reviews Physics. 3, 625-644 (2021)
- [22] Biamonte, Jacob and Wittek, Peter and Pancotti, Nicola and Rebentrost, Patrick and Wiebe, Nathan and Lloyd, Seth. Nature. 549, 195-202 (2017)
- [23] Khan, Tariq M and Robles-Kelly, Antonio. IEEE Access. 8 pp. 219275-219294 (2020)
- [24] Chen, Samuel Yen-Chi and Yoo, Shinjae. Entropy. 23, 460 (2021)
- [25] Rebentrost, Patrick and Mohseni, Masoud and Lloyd, Seth. Physical Review Letters. 113, 130503 (2014,9)
- [26] Dong, Daoyi and Chen, Chunlin and Li, Hanxiong and Tarn, Tzyh-Jong. IEEE Transactions On Systems, Man, And Cybernetics, Part B (Cybernetics). 38, 1207-1220 (2008)
- [27] Li, Weikang and Lu, Sirui and Deng, Dong-Ling. Science China Physics, Mechanics & Astronomy. 64, 100312 (2021)
- [28] Wang, Yuxun and Quan, Junyu and Li, Qin. 2022 14th International Conference On Wireless Communications And Signal Processing (WCSP). pp. 804-808 (2022)
- [29] Houshmand, Monireh and Houshmand, Mahboobeh and Fitzsimons, Joseph F. Physical Review A. 98, 012318 (2018)
- [30] Shingu, Yuta and Takeuchi, Yuki and Endo, Suguru, and Kawabata, Shiro and Watabe, Shohei and Nikuni, Tetsuro and Hakoshima, Hideaki and Matsuzaki, Yuichiro. Physical Review A. 105, 022603 (2022)
- [31] Anders, Janet and Oi, Daniel K. L. and Kashefi, Elham and Browne, Dan E. and Andersson, Erika. Physical Review A. 82, 020301 (2010)
- [32] Agarwal, Girish S. Quantum optics. (Cambridge University Press,2012)
- [33] Nakaji, Kouhei and Uno, Shumpei and Suzuki, Yohichi, and Raymond, Rudy and Onodera, Tamiya and Tanaka, Tomoki and Tezuka, Hiroyuki and Mitsuda, Naoki and Yamamoto, Naoki. Physical Review Research. 4, 023136 (2022)
- [34] Jeswal, SK and Chakraverty, S. Archives Of Computational Methods In Engineering. 26 pp. 793-807 (2019)
- [35] Kingma, Diederik and Ba, Jimmy. International Conference On Learning Representations (ICLR). (2015)
- [36] Schuld, Maria and Bergholm, Ville and Gogolin, Christian and Izaac, Josh and Killoran, Nathan. Physical Review A. 99, 032331 (2019)
- [37] Gothen, Peter and Guedes de Oliveira, António. The College Mathematics Journal. 54, 171-175 (2023)
- [38] Kuzanyan, AS and Kuzanyan, AA and Nikoghosyan, VR. Journal Of Contemporary Physics (Armenian Academy Of Sciences). 53 pp. 338-350 (2018)
- [39] Wenner, J and Yin, Yi and Chen, Yu and Barends, R and Chiaro, B and Jeffrey, E and Kelly, J and Megrant, A and Mutus, JY and Neill, C and others. & Physical Review Letters. 112, 210501 (2014)
- [40] Sueki, Takahiro and Koshiba, Takeshi and Morimae, Tomoyuki. Physical Review A. 87, 060301 (2013)
- [41] Schroeder, Anna and Heller, Matthias and Gachechiladze, Mariami. New Journal Of Physics. (2023)
- [42] Chan, Albie, and Shi, Zheng and Dellantonio, Luca and Dür, Wolfgang and Muschik, Christine A. Physical Review Letters. 132, 240601 (2024)
- [43] Calderón, Luis Mantilla and Feldmann, Polina and Raussendorf, Robert and Bondarenko, Dmytro. ArXiv Preprint ArXiv:2405.08319. (2024)