Exploring the use of quantum computers for resilience analysis in critical infrastructure networks

  • Abstract
  • Literature Map
  • References
  • Similar Papers
Abstract
Translate article icon Translate Article Star icon
Take notes icon Take Notes

Abstract Resilience analysis of networks representing critical infrastructure is a computationally hard problem, and the question arises of whether quantum computers may be beneficial for this purpose. On the way towards an answer to this problem, we map a small critical infrastructure network on a quantum network composed of dipole–dipole-coupled nodes. The latter are each equipped with up to three discrete (quantum) states, two of which support the connectivity of the network, while the third state, reachable through nondeterministic spontaneous processes, represents a ‘broken’ node. A finite ‘repair’ time is needed to restore the node. To study the dynamics of such networks on a quantum computer, we derive unitary dilations of Kraus operators governing the evolution of our open quantum network, and generate corresponding quantum circuits using the interface. We then study the population dynamics of several cases of increasing complexity on the quantum hardware. We discuss how scaling of errors is related to the depth of the quantum circuits. Ultimately, we show that open quantum systems can be used for modelling critical infrastructure, but quantum computers with much lower error rates than currently available are required for a quantitative resilience analysis.

ReferencesShowing 10 of 24 papers
  • Open Access Icon
  • Cite Count Icon 289
  • 10.1038/s41534-019-0235-y
IBM Q Experience as a versatile experimental testbed for simulating open quantum systems
  • Jan 7, 2020
  • npj Quantum Information
  • Guillermo García-Pérez + 2 more

  • Open Access Icon
  • Cite Count Icon 32
  • 10.1216/rmj-2014-44-1-203
Dilation theory in finite dimensions: The possible, the impossible and the unknown
  • Feb 1, 2014
  • Rocky Mountain Journal of Mathematics
  • Eliahu Levy + 1 more

  • Open Access Icon
  • Cite Count Icon 38
  • 10.1103/physreva.74.062113
Solution of the Lindblad equation in the Kraus representation
  • Dec 28, 2006
  • Physical Review A
  • H Nakazato + 5 more

  • Open Access Icon
  • Cite Count Icon 6567
  • 10.1145/237814.237866
A fast quantum mechanical algorithm for database search
  • Jan 1, 1996
  • Lov K Grover

  • Open Access Icon
  • Cite Count Icon 23
  • 10.1103/physreva.90.063415
Spectral backbone of excitation transport in ultracold Rydberg gases
  • Dec 9, 2014
  • Physical Review A
  • Torsten Scholak + 2 more

  • Open Access Icon
  • PDF Download Icon
  • Cite Count Icon 48
  • 10.22331/q-2022-05-30-726
A general quantum algorithm for open quantum dynamics demonstrated with the Fenna-Matthews-Olson complex
  • May 30, 2022
  • Quantum
  • Zixuan Hu + 4 more

  • Open Access Icon
  • Cite Count Icon 61
  • 10.1103/physreva.91.062308
Universal simulation of Markovian open quantum systems
  • Jun 8, 2015
  • Physical Review A
  • Ryan Sweke + 3 more

  • Cite Count Icon 6721
  • 10.1007/bf02650179
Simulating physics with computers
  • Jun 1, 1982
  • International Journal of Theoretical Physics
  • Richard P Feynman

  • Open Access Icon
  • PDF Download Icon
  • Cite Count Icon 220
  • 10.1103/physrevlett.125.010501
Variational Quantum Simulation of General Processes
  • Jun 29, 2020
  • Physical Review Letters
  • Suguru Endo + 4 more

  • Open Access Icon
  • Cite Count Icon 24
  • 10.1103/physreva.69.054102
Operator-sum representation of time-dependent density operators and its applications
  • May 24, 2004
  • Physical Review A
  • D M Tong + 4 more

Similar Papers
  • Research Article
  • 10.1002/cta.2361
Guest Editorial – Special Issue on Quantum Circuits
  • May 3, 2017
  • International Journal of Circuit Theory and Applications
  • Pier Paolo Civalleri + 2 more

Guest Editorial – Special Issue on Quantum Circuits

  • Single Book
  • 10.47716/978-93-92090-62-2
QUANTUM COMPUTING
  • Jan 9, 2025
  • Dr M S Godwin Premi + 4 more

Quantum Computing represents a paradigm shift in computation, leveraging the principles of quantum mechanics to solve problems intractable for classical computers. This book provides a comprehensive exploration of quantum computing, encompassing its foundational concepts, architecture, algorithms, programming techniques, and real-world applications. Beginning with an overview and historical evolution, it delves into the fundamental differences between classical and quantum computing, highlighting key quantum mechanical phenomena such as superposition, entanglement, and interference. The book further examines quantum states, qubits, and gates, elucidating their roles in quantum computation. The architecture of quantum systems, including superconducting qubits, trapped ions, and photonic qubits, is analyzed alongside quantum circuits, hardware challenges, and error correction mechanisms. Core quantum algorithms, including Shor’s algorithm for factorization and Grover’s algorithm for search, are discussed with practical examples. The book also emphasizes quantum programming, featuring tools like Qiskit, Cirq, and PyQuil, and explores challenges in quantum simulation and circuit development. Applications in cryptography, artificial intelligence, drug discovery, and optimization are detailed, underscoring quantum computing’s transformative potential. The book concludes with an examination of challenges such as scalability, noise, and ethical concerns, while providing insights into future directions, including hardware advancements, emerging algorithms, and integration with classical systems. It serves as an essential resource for students, researchers, and professionals aiming to understand and contribute to the quantum revolution. Keywords: Quantum computing, classical computing, quantum mechanics, qubits, quantum gates, superposition, entanglement, quantum algorithms, Shor’s algorithm, Grover’s algorithm, quantum programming, Qiskit, Cirq, quantum circuits, quantum hardware, error correction, cryptography, artificial intelligence, drug discovery, optimization, scalability, quantum noise, ethical implications, future directions

  • Conference Article
  • Cite Count Icon 13
  • 10.1109/host54066.2022.9840181
Towards an Antivirus for Quantum Computers
  • Jun 27, 2022
  • Sanjay Deshpande + 4 more

Researchers are today exploring models for cloud-based usage of quantum computers where multi-tenancy can be used to share quantum computer hard-ware among multiple users. Multi-tenancy has a promise of allowing better utilization of the quantum computer hardware, but also opens up the quantum computer to new types of security attacks. As this and other recent research shows, it is possible to perform a fault injection attack using crosstalk on quantum computers when a victim and attacker circuits are instantiated as co-tenants on the same quantum computer. To ensure such attacks do not happen, this paper proposes that new techniques should be developed to help catch malicious circuits before they are loaded onto quantum computer hardware. Following ideas from classical computers, a compile-time technique can be designed to scan quantum computer programs for mali-cious or suspicious code patterns before they are compiled into quantum circuits that run on a quantum computer. This paper presents ongoing work which demonstrates how crosstalk can affect Grover's algorithm, and then presents suggestions of how quantum programs could be analyzed to catch circuits that generate large amounts of crosstalk with malicious intent.

  • Single Book
  • 10.62311/nesx/rb978-81-971627-1-8
Quantum Computing: The Next Information Age
  • Apr 24, 2024
  • Murali Krishna Pasupuleti

Abstract: Quantum Computing: The Next Information Age explores the theoretical, algorithmic, technological, and societal dimensions of quantum computing, offering a comprehensive framework that integrates foundational physics with cutting-edge computational innovation. Rooted in the principles of quantum mechanics—superposition, entanglement, and measurement—the book systematically builds a conceptual and mathematical foundation for quantum computation. It addresses the limitations of classical paradigms and articulates the shift toward quantum models such as the quantum circuit model and quantum Turing machines. Through a detailed analysis of quantum algorithms, including Shor’s and Grover’s, and complexity classes such as BQP and QMA, the book outlines the computational advantages offered by quantum systems. It investigates real-world implementations across leading hardware platforms, evaluates error correction and coherence challenges, and examines the feasibility of scalable, fault-tolerant architectures. The role of quantum information in cryptography and secure communication is explored through key protocols (BB84, E91), with attention to the implications for post-quantum security infrastructures. Methodologically, the book combines theoretical modeling, algorithmic construction, comparative complexity analysis, and system-level design review. Results from recent industrial breakthroughs, such as quantum supremacy demonstrations, are synthesized to highlight both promise and limitations. The work concludes with a critical reflection on the philosophical, ethical, and geopolitical implications of the quantum age. This volume provides a rigorous, interdisciplinary foundation for researchers, technologists, and policymakers navigating the emerging quantum frontier. Keywords Quantum computing, quantum algorithms, quantum information, Shor’s algorithm, Grover’s algorithm, quantum cryptography, BB84 protocol, BQP, quantum supremacy, quantum hardware, quantum error correction, NISQ devices, quantum communication, post-quantum security, quantum Turing machine, quantum circuits, entanglement, Hilbert space, quantum internet, computational complexity

  • Single Book
  • 10.62311/nesx/97877
Quantum Computing Chips: Advances in Superconducting and Topological Qubits
  • Mar 5, 2025
  • Murali Krishna Pasupuleti

Abstract: Quantum computing is on the brink of transforming computation, cryptography, artificial intelligence, and materials science, with quantum computing chips at the core of this revolution. "Quantum Computing Chips: Advances in Superconducting and Topological Qubits" provides an in-depth exploration of the latest advancements in quantum hardware, focusing on superconducting and topological qubits, two of the most promising approaches for scalable, fault-tolerant quantum computing. The book examines the fundamental principles of quantum computing, qubit architectures, and fabrication techniques, highlighting how Josephson junctions, transmon qubits, and Majorana fermions contribute to quantum logic operations. It delves into quantum chip integration, error correction strategies, hybrid quantum-classical computing, and emerging quantum networking technologies, offering insights into how industry leaders such as Google, IBM, and Microsoft are advancing quantum processor development. The book also explores the commercialization, industrial impact, and policy challenges of quantum computing chips, discussing applications in cryptography, AI acceleration, quantum simulation, and financial modeling. Through technical analysis, case studies, and expert insights, this book serves as a comprehensive resource for scientists, engineers, researchers, and technology leaders navigating the rapidly evolving quantum computing landscape. Keywords: Quantum computing, superconducting qubits, topological qubits, Josephson junctions, transmon qubits, Majorana fermions, non-Abelian anyons, quantum error correction, quantum chip fabrication, cryogenic quantum systems, hybrid quantum-classical computing, quantum networking, quantum supremacy, quantum cryptography, quantum AI acceleration, quantum materials science, fault-tolerant quantum computing, scalable quantum processors, quantum circuit design, quantum gate fidelity, quantum simulation, IBM quantum computing, Google quantum computing, Microsoft quantum computing, quantum industry, quantum economy, quantum policy, quantum innovation.

  • Conference Article
  • Cite Count Icon 25
  • 10.1109/iiswc50251.2020.00018
Reliability Modeling of NISQ- Era Quantum Computers
  • Oct 1, 2020
  • Ji Liu + 1 more

Recent developments in quantum computers have been pushing up the number of qubits. However, the state-of-the-art Noisy Intermediate Scale Quantum (NISQ) computers still do not have enough qubits to accommodate the error correction circuit. Noise in quantum gates limits the reliability of quantum circuits. To characterize the noise effects, prior methods such as process tomography, gateset tomography and randomized benchmarking have been proposed. However, the challenge is that these methods do not scale well with the number of qubits. Noise models based on the understanding of underneath physics have also been proposed to study different kinds of noise in quantum computers. The difficulty is that there is no widely accepted noise model that incorporates all different kinds of errors. The realworld errors can be very complicated and it remains an active area of research to produce accurate noise models. In this paper, instead of using noise models to estimate the reliability, which is measured with success rates or inference strength, we treat the NISQ quantum computer as a black box. We use several quantum circuit characteristics such as the number of qubits, circuit depth, the number of CNOT gates, and the connection topology of the quantum computer as inputs to the black box and derive a reliability estimation model using (1) polynomial fitting and (2) a shallow neural network. We propose randomized benchmarks with random numbers of qubits and basic gates to generate a large data set for neural network training. We show that the estimated reliability from our black-box model outperforms the noise models from Qiskit. We also showcase that our black-box model can be used to guide quantum circuit optimization at compile time.

  • Preprint Article
  • Cite Count Icon 1
  • 10.5194/egusphere-egu21-922
Conceptualization of a Critical Infrastructure Network – Model for Flood Risk Assessments
  • Mar 3, 2021
  • Roman Schotten + 1 more

<p><span>In flood risk analysis it is a key principle to predetermine consequences of flooding to assets, people and infrastructures. Damages to critical infrastructures are not restricted to the flooded area. The effects of directly affected objects cascades to other infrastructures, which are not directly affected by a flood. Modelling critical infrastructure networks is one possible answer to the question ‘how to include indirect and direct impacts to critical infrastructures?’.</span></p><p>Critical infrastructures are connected in very complex networks. The modelling of those networks has been a basis for different purposes (Ouyang, 2014). Thus, it is a challenge to determine the right method to model a critical infrastructure network. For this example, a network-based and topology-based method will be applied (Pant et al., 2018). The basic model elements are points, connectors and polygons which are utilized to resemble the critical infrastructure network characteristics.</p><p>The objective of this model is to complement the state-of-the-art flood risk analysis with a quantitative analysis of critical infrastructure damages and disruptions for people and infrastructures. These results deliver an extended basis to differentiate the flood risk assessment and to derive measures for flood risk mitigation strategies. From a technical point of view, a critical infrastructure damage analysis will be integrated into the tool ProMaIDes (Bachmann, 2020), a free software for a risk-based evaluation of flood risk mitigation measures.</p><p>The data on critical infrastructure cascades and their potential linkages is scars but necessary for an actionable modelling. The CIrcle method from Deltares delivers a method for a workshop that has proven to deliver applicable datasets for identifying and connecting infrastructures on basis of cascading effects (de Bruijn et al., 2019). The data gained from CIrcle workshops will be one compound for the critical infrastructure network model.</p><p>Acknowledgment: This work is part of the BMBF-IKARIM funded project PARADes (Participatory assessment of flood related disaster prevention and development of an adapted coping system in Ghana).</p><p>Bachmann, D. (2020). ProMaIDeS - Knowledge Base. https://promaides.myjetbrains.com</p><p>de Bruijn, K. M., Maran, C., Zygnerski, M., Jurado, J., Burzel, A., Jeuken, C., & Obeysekera, J. (2019). Flood resilience of critical infrastructure: Approach and method applied to Fort Lauderdale, Florida. Water (Switzerland), 11(3). https://doi.org/10.3390/w11030517</p><p>Ouyang, M. (2014). Review on modeling and simulation of interdependent critical infrastructure systems. Reliability Engineering and System Safety, 121, 43–60. https://doi.org/10.1016/j.ress.2013.06.040</p><p>Pant, R., Thacker, S., Hall, J. W., Alderson, D., & Barr, S. (2018). Critical infrastructure impact assessment due to flood exposure. Journal of Flood Risk Management, 11(1), 22–33. https://doi.org/10.1111/jfr3.12288</p>

  • Research Article
  • Cite Count Icon 2
  • 10.1088/2058-9565/ad80be
Characterizing randomness in parameterized quantum circuits through expressibility and average entanglement
  • Oct 14, 2024
  • Quantum Science and Technology
  • Guilherme Ilário Correr + 4 more

While scalable error correction schemes and fault tolerant quantum computing seem not to be universally accessible in the near sight, the efforts of many researchers have been directed to the exploration of the contemporary available quantum hardware. Due to these limitations, the depth and dimension of the possible quantum circuits are restricted. This motivates the study of circuits with parameterized operations that can be classically optimized in hybrid methods as variational quantum algorithms, enabling the reduction of circuit depth and size. The characteristics of these Parameterized Quantum Circuits (PQCs) are still not fully understood outside the scope of their principal application, motivating the study of their intrinsic properties. In this work, we analyse the generation of random states in PQCs under restrictions on the qubits connectivities, justified by different quantum computer architectures. We apply the expressibility quantifier and the average entanglement as diagnostics for the characteristics of the generated states and classify the circuits depending on the topology of the quantum computer where they can be implemented. As a function of the number of layers and qubits, circuits following a Ring topology will have the highest entanglement and expressibility values, followed by Linear/All-to-all almost together and the Star topology. In addition to the characterization of the differences between the entanglement and expressibility of these circuits, we also place a connection between how steep is the increase on the uniformity of the distribution of the generated states and the generation of entanglement. Circuits generating average and standard deviation for entanglement closer to values obtained with the truly uniformly random ensemble of unitaries present a steeper evolution when compared to others.

  • Conference Article
  • Cite Count Icon 7
  • 10.1109/ets50041.2021.9465405
Test Data-Driven Machine Learning Models for Reliable Quantum Circuit Output
  • May 24, 2021
  • Vedika Saravanan + 1 more

While current quantum computers, referred to as Noisy Intermediate-Scale Quantum (NISQ) computers, are expected to be beneficial for different applications, they are prone to different types of errors. In order to enhance the reliability of quantum systems, noise-aware quantum compilers are used to generate physical quantum circuits to be executed on NISQ computers. The quantum hardware is calibrated very frequently and its error rates are computed accordingly. Based on the hardware error rates, a quantum compiler allocates physical qubits and schedules quantum operations. However, error rates may change post-calibration. To incorporate dynamic error rates into quantum circuit compilation with minimum cost, we propose a Machine Learning (ML)-based scheme to detect the incorrect output of the quantum circuit and predict the Probability of Successful Trials (PST) with high accuracy. Our approach can verify the error rates of the quantum hardware and validate the correctness of the extracted quantum circuit output. We provide a case study of our ML-based reliability models using IBM Q16 Melbourne quantum computer. Our results show that the proposed scheme achieves a very high prediction accuracy.

  • Dissertation
  • 10.32657/10356/62520
Identifying vulnerabilities and extreme risks in critical infrastructure networks
  • Jan 1, 2015
  • Kizhakkedath Akhila

Today’s society is becoming highly dependent on the services provided by various critical infrastructure networks. The increasing complexities and interdependencies among infrastructure networks have exacerbated their susceptibility to various disruption or failure events. It is therefore crucial to understand how the failure of the components in a critical infrastructure network affects the performance and integrity of the whole network. Different types of component failures may result in different levels of failure consequence and it is interesting to investigate which type of failure results in the largest failure consequence in an infrastructure network. A review on critical infrastructure protection shows that there is a need to incorporate geographic proximities in the failure cascading process in infrastructure networks. Hence this research initially investigates the failure consequence in a critical infrastructure network resulting from different types of component removals using a proximity-based cascading model for failure propagation. The feasibility of the proposed study is tested on a real-world transportation network. A review on critical infrastructure simulation and analysis also suggests that all the analyses and subsequent policy decisions on critical infrastructure networks have been made based on the assumption that the infrastructure interdependencies model has been constructed to a fair degree of completeness. Although such analyses that aim at the identification of weaknesses and vulnerabilities in infrastructure networks may go some way in preventing or alleviating disastrous outcomes, the failure to consider unforeseen interdependencies among critical infrastructures can result in extreme disruptions not being anticipated. The review also indicates that although approaches for vulnerability/consequence analysis have been widely studied, a complete risk assessment of infrastructure network disruptions incorporating the probabilities as well as consequences of disruption events has not been given serious attention. Therefore this research also proposes using an optimization algorithm to iteratively search for the possible unforeseen interdependencies as well as the failure points that can result in extreme risk in critical infrastructures, thereby anticipating extreme risk events. In order to illustrate the feasibility of the proposed approach, an agent based model of an infrastructure network along with its known interdependencies has been presented, with a genetic algorithm applied to search for potential unforeseen interdependencies as well as failure modes/points that can result in extreme disruptions. The results from this study show the feasibility of anticipating extreme risk events in infrastructure networks, thereby providing valuable insights for proactive risk management of critical infrastructures.

  • Conference Article
  • 10.5220/0006017101210128
TOWER: Topology Optimization for netWork Enhanced Resilience
  • Jan 1, 2016
  • Enrique De La Hoz + 4 more

Nowadays society is more and more dependent on critical infrastructures. Critical network infrastructures (CNI) are communication networks whose disruption can create a severe impact on other systems including critical infrastructures. In this work, we propose TOWER, a framework for the provision of adequate strategies to optimize service provision and system resilience in CNIs. The goal of TOWER is being able to compute new network topologies for CNIs under the event of malicious attacks. For doing this, TOWER takes into account a risk analysis of the CNI, the results from a cyber-physical IDS and a multilayer model of the network, for taking into account all the existing dependences. TOWER analyses the network structure in order to determine the best strategy for obtaining a network topology, taking into account the existing dependences and the potential conflicting interests when not all requirements can be met. Finally, we present some lines for further development of TOWER.

  • PDF Download Icon
  • Research Article
  • Cite Count Icon 15
  • 10.3390/electronics10080984
Automated Quantum Hardware Selection for Quantum Workflows
  • Apr 20, 2021
  • Electronics
  • Benjamin Weder + 3 more

The execution of a quantum algorithm typically requires various classical pre- and post-processing tasks. Hence, workflows are a promising means to orchestrate these tasks, benefiting from their reliability, robustness, and features, such as transactional processing. However, the implementations of the tasks may be very heterogeneous and they depend on the quantum hardware used to execute the quantum circuits of the algorithm. Additionally, today’s quantum computers are still restricted, which limits the size of the quantum circuits that can be executed. As the circuit size often depends on the input data of the algorithm, the selection of quantum hardware to execute a quantum circuit must be done at workflow runtime. However, modeling all possible alternative tasks would clutter the workflow model and require its adaptation whenever a new quantum computer or software tool is released. To overcome this problem, we introduce an approach to automatically select suitable quantum hardware for the execution of quantum circuits in workflows. Furthermore, it enables the dynamic adaptation of the workflows, depending on the selection at runtime based on reusable workflow fragments. We validate our approach with a prototypical implementation and a case study demonstrating the hardware selection for Simon’s algorithm.

  • Conference Article
  • Cite Count Icon 30
  • 10.1109/ase51524.2021.9678792
QDiff: Differential Testing of Quantum Software Stacks
  • Nov 1, 2021
  • Jiyuan Wang + 3 more

Over the past few years, several quantum software stacks (QSS) have been developed in response to rapid hardware advances in quantum computing. A QSS includes a quantum programming language, an optimizing compiler that translates a quantum algorithm written in a high-level language into quantum gate instructions, a quantum simulator that emulates these instructions on a classical device, and a software controller that sends analog signals to a very expensive quantum hardware based on quantum circuits. In comparison to traditional compilers and architecture simulators, QSSes are difficult to tests due to the probabilistic nature of results, the lack of clear hardware specifications, and quantum programming complexity.This work devises a novel differential testing approach for QSSes, named QDiff with three major innovations: (1) We generate input programs to be tested via semantics-preserving, source to source transformation to explore program variants. (2) We speed up differential testing by filtering out quantum circuits that are not worthwhile to execute on quantum hardware by analyzing static characteristics such as a circuit depth, 2-gate operations, gate error rates, and T1 relaxation time. (3) We design an extensible equivalence checking mechanism via distribution comparison functions such as Kolmogorov–Smirnov test and cross entropy.We evaluate QDiff with three widely-used open source QSSes: Qiskit from IBM, Cirq from Google, and Pyquil from Rigetti. By running QDiff on both real hardware and quantum simulators, we found several critical bugs revealing potential instabilities in these platforms. QDiff’s source transformation is effective in producing semantically equivalent yet not-identical circuits (i.e., 34% of trials), and its filtering mechanism can speed up differential testing by 66%.

  • Research Article
  • Cite Count Icon 67
  • 10.1016/j.scs.2020.102072
Social vulnerability and equity perspectives on interdependent infrastructure network component importance
  • Jan 27, 2020
  • Sustainable Cities and Society
  • Deniz Berfin Karakoc + 3 more

Social vulnerability and equity perspectives on interdependent infrastructure network component importance

  • Book Chapter
  • 10.1093/acrefore/9780190871994.013.30
Circuit Model of Quantum Computation
  • Jan 30, 2024
  • James Wootton

Quantum circuits are an abstract framework to represent quantum dynamics. They are used to formally describe and reason about processes within quantum information technology. They are primarily used in quantum computation, quantum communication, and quantum cryptography—for which they provide a machine code–level description of quantum algorithms and protocols. The quantum circuit model is an abstract representation of these technologies based on the use of quantum circuits, with which algorithms and protocols can be concretely developed and studied. Quantum circuits are typically based on the concept of qubits: two-level quantum systems that serve as a fundamental unit of quantum hardware. In their simplest form, circuits take a set of qubits initialized in a simple known state, apply a set of discrete single- and two-qubit evolutions known as “gates,” and then finally measure all qubits. Any quantum computation can be expressed in this form through a suitable choice of gates, in a quantum analogy of the Boolean circuit model of conventional digital computation. More complex versions of quantum circuits can include features such as qudits, which are higher level quantum systems, as well as the ability to reset and measure qubits or qudits throughout the circuit. However, even the simplest form of the model can be used to emulate such behavior, making it fully sufficient to describe quantum information technology. It is possible to use the quantum circuit model to emulate other models of quantum computing, such as the adiabatic and measurement-based models, which formalize quantum algorithms in a very different way. As well as being a theoretical model to reason about quantum information technology, quantum circuits can also provide a blueprint for quantum hardware development. Corresponding hardware is based on the concept of building physical systems that can be controlled in the way required for qubits or qudits, including applying gates on them in sequence and performing measurements.

More from: Quantum Information Processing
  • New
  • Research Article
  • 10.1007/s11128-025-04975-4
Quantum cryptanalysis on Feistel variants in related-key settings
  • Nov 5, 2025
  • Quantum Information Processing
  • Xiaoyu Wang + 4 more

  • New
  • Research Article
  • 10.1007/s11128-025-04983-4
Maximum and minimum relative entropies of imaginarity
  • Nov 5, 2025
  • Quantum Information Processing
  • Linshuai Zhang + 1 more

  • New
  • Research Article
  • 10.1007/s11128-025-04982-5
Large deviation-based noise mitigation in coupled quantum robotic systems
  • Nov 3, 2025
  • Quantum Information Processing
  • Rohit Singla + 2 more

  • New
  • Research Article
  • 10.1007/s11128-025-04968-3
Construction and optimization of quantum modular exponentiation circuits based on the V gate
  • Nov 3, 2025
  • Quantum Information Processing
  • Xinglan Zhang + 2 more

  • New
  • Research Article
  • 10.1007/s11128-025-04954-9
An efficient and verifiable quantum secret sharing scheme based on a novel seven-qubit entangled state
  • Nov 3, 2025
  • Quantum Information Processing
  • Jing Li + 2 more

  • New
  • Research Article
  • 10.1007/s11128-025-04967-4
Galois self-orthogonal and Galois LCD one-generator $$(\bar{\lambda },\theta ,\ell )$$-monomial codes
  • Nov 3, 2025
  • Quantum Information Processing
  • Oussama Kabbouch + 3 more

  • Research Article
  • 10.1007/s11128-025-04972-7
Quantum signature with formal security proof
  • Oct 29, 2025
  • Quantum Information Processing
  • Huijuan Liu + 4 more

  • Research Article
  • 10.1007/s11128-025-04976-3
A dynamic quantum-resistant code-based public key encryption scheme
  • Oct 29, 2025
  • Quantum Information Processing
  • Pratheeksha Raju + 4 more

  • Research Article
  • 10.1007/s11128-025-04974-5
The evolution of quantum battery capacity of GHZ-like states under Markovian channels
  • Oct 28, 2025
  • Quantum Information Processing
  • Hui Liu + 1 more

  • Research Article
  • 10.1007/s11128-025-04971-8
The physical mechanism of optimizing Bell-like states in the context of quantum state teleportation in the presence of amplitude-damping noise environment
  • Oct 28, 2025
  • Quantum Information Processing
  • Hop Nguyen Van

Save Icon
Up Arrow
Open/Close
  • Ask R Discovery Star icon
  • Chat PDF Star icon

AI summaries and top papers from 250M+ research sources.

Search IconWhat is the difference between bacteria and viruses?
Open In New Tab Icon
Search IconWhat is the function of the immune system?
Open In New Tab Icon
Search IconCan diabetes be passed down from one generation to the next?
Open In New Tab Icon