• Publications
  • Influence
Quantum Computing in the NISQ era and beyond
TLDR
Noisy Intermediate-Scale Quantum (NISQ) technology will be available in the near future, and the 100-qubit quantum computer will not change the world right away - but it should be regarded as a significant step toward the more powerful quantum technologies of the future.
Topological quantum memory
We analyze surface codes, the topological quantum error-correcting codes introduced by Kitaev. In these codes, qubits are arranged in a two-dimensional array on a surface of nontrivial topology, and
Black holes as mirrors: Quantum information in random subsystems
We study information retrieval from evaporating black holes, assuming that the internal dynamics of a black hole is unitary and rapidly mixing, and assuming that the retriever has unlimited control
Encoding a qubit in an oscillator
Quantum error-correcting codes are constructed that embed a finite-dimensional code space in the infinite-dimensional Hilbert space of a system described by continuous quantum variables. These codes
Topological entanglement entropy.
TLDR
The von Neumann entropy of rho, a measure of the entanglement of the interior and exterior variables, has the form S(rho) = alphaL - gamma + ..., where the ellipsis represents terms that vanish in the limit L --> infinity.
Holographic quantum error-correcting codes: toy models for the bulk/boundary correspondence
TLDR
That bulk logical operators can be represented on multiple boundary regions mimics the Rindlerwedge reconstruction of boundary operators from bulk operators, realizing explicitly the quantum error-correcting features of AdS/CFT recently proposed in [1].
Quantum accuracy threshold for concatenated distance-3 codes
TLDR
A new version of the quantum threshold theorem is proved that applies to concatenation of a quantum code that corrects only one error, and this theorem is used to derive arigorous lower bound on the quantum accuracy threshold e0, the best lower bound that has been rigorously proven so far.
Security of quantum key distribution with imperfect devices
This paper prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. This proof
Reliable quantum computers
  • J. Preskill
  • Physics
    Proceedings of the Royal Society of London…
  • 16 May 1997
The new field of quantum error correction has developed spectacularly since its origin less than two years ago. Encoded quantum information can be protected from errors that arise due to uncontrolled
...
1
2
3
4
5
...