skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


This content will become publicly available on July 25, 2026

Title: Optimising Perfect Quantum State Transfer for Timing Insensitivity
When studying the perfect transfer of a quantum state from one site to another, it is typically assumed that one can receive the arriving state at a specific instant in time, with perfect accuracy. Here, we study how sensitive perfect state transfer is to that timing. We design engineered spin chains which reduce their sensitivity, proving that this construction is asymptotically optimal. The same construction is applied to the task of creating superpositions, also known as fractional revival.  more » « less
Award ID(s):
2427020
PAR ID:
10634040
Author(s) / Creator(s):
; ;
Publisher / Repository:
arxiv.org (quant-ph)
Date Published:
Edition / Version:
1
Subject(s) / Keyword(s):
Quantum state transfer quantum communication
Format(s):
Medium: X Size: 1MB Other: pdf
Size(s):
1MB
Sponsoring Org:
National Science Foundation
More Like this
  1. In this paper, we show how to construct XX Hamiltonians that realize perfect quantum state transfer and also have the property that the overlap of the time evolved state with the initial state is zero for some time before the transfer time. If the latter takes place, we call it an early exclusion state.We also show that in some cases, early state exclusion is impossible. The proofs rely on properties of Krawtchouk and Chebyshev polynomials. 
    more » « less
  2. Camps-Valls, G.; Ruiz, F. J.; Valera, I. (Ed.)
    Knowing when a graphical model perfectly encodes the conditional independence structure of a distribution is essential in applications, and this is particularly important when performing inference from data. When the model is perfect, there is a one-to-one correspondence between conditional independence statements in the distribution and separation statements in the graph. Previous work has shown that almost all models based on linear directed acyclic graphs as well as Gaussian chain graphs are perfect, the latter of which subsumes Gaussian graphical models (i.e., the undirected Gaussian models) as a special case. In this paper, we directly approach the problem of perfectness for the Gaussian graphical models, and provide a new proof, via a more transparent parametrization, that almost all such models are perfect. Our approach is based on, and substantially extends, a construction of Lněnička and Matúš showing the existence of a perfect Gaussian distribution for any graph. The analysis involves constructing a probability measure on the set of normalized covariance matrices Markov with respect to a graph that may be of independent interest. 
    more » « less
  3. This paper introduces a generalization of perfect state transfer in continuous time quantum walks on graph and explores basic properties and example of this phenomenon. 
    more » « less
  4. Minimal perfect hash functions (MPHFs) are used to provide efficient access to values of large dictionaries (sets of key-value pairs). Discovering new algorithms for building MPHFs is an area of active research, especially from the perspective of storage efficiency. The information-theoretic limit for MPHFs is 1/ln 2 ≈ 1.44 bits per key. The current best practical algorithms range between 2 and 4 bits per key. In this article, we propose two SAT-based constructions of MPHFs. Our first construction yields MPHFs near the information-theoretic limit. For this construction, current state-of-the-art SAT solvers can handle instances where the dictionaries contain up to 40 elements, thereby outperforming the existing (brute-force) methods. Our second construction uses XORSAT filters to realize a practical approach with long-term storage of approximately 1.83 bits per key. 
    more » « less
  5. By exploiting symmetries of finite fields, covering perfect hash families provide a succinct representation for covering arrays of index one. For certain parameters, this connection has led to both the best current asymptotic existence results and the best known efficient construction algorithms for covering arrays. The connection generalizes in a straightforward manner to arrays in which every t-way interaction is covered λ > 1 times, i.e., to covering arrays of index more than one. Using this framework, we focus on easily computed, explicit upper bounds on numbers of rows for various parameters with higher index. 
    more » « less