Write, autoreview, editor, reviewer
3,125
edits
No edit summary |
No edit summary |
||
Line 4: | Line 4: | ||
This stage also implies the ability to perform entanglement distillation and generate multipartite entangled states from bipartite entanglement by exploiting the ability for local memory and control. It allows the implementation of much more complex protocols that require temporary storage of a quantum state during further quantum or classical communication. Interesting applications outside the domain of cryptography are exploiting long distance entanglement to extend the baseline of telescopes, for basic forms of leader election and for improving the synchronization of clocks. | This stage also implies the ability to perform entanglement distillation and generate multipartite entangled states from bipartite entanglement by exploiting the ability for local memory and control. It allows the implementation of much more complex protocols that require temporary storage of a quantum state during further quantum or classical communication. Interesting applications outside the domain of cryptography are exploiting long distance entanglement to extend the baseline of telescopes, for basic forms of leader election and for improving the synchronization of clocks. | ||
==Relevant Parameters== | ==Relevant Parameters== | ||
*Number of rounds <math>k</math>, | |||
*Circuit depth <math>m</math>, | |||
*Number of physical qubits q. | |||
*For each of the operations, an estimate <math>epsilon_j</math> from the ideal operation. |