Michael David Hamrick

Michael David Hamrick
MITRE · CNS

About

30
Publications
731
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
293
Citations
Citations since 2017
0 Research Items
46 Citations
2017201820192020202120222023024681012
2017201820192020202120222023024681012
2017201820192020202120222023024681012
2017201820192020202120222023024681012

Publications

Publications (30)
Article
In this review we survey both standard fault tolerance theory and Kitaev’s model for quantum computation, and demonstrate how they can be combined to yield quantitative results that reveal the interplay between the two. This analysis establishes a methodology allowing one to quantitatively determine design parameters for quantum computers, the valu...
Article
Full-text available
The phase estimation performance of photonic N00N states propagating in an attenuating medium is analyzed. It is shown that the Heisenberg limit is never achieved and that an attenuated separable state of N photons will actually produce a better phase estimate than an equally attenuated N00N state unless the transmittance of the medium is sufficien...
Conference Paper
We introduce a universal operator theoretic framework for quantum fault tolerance that incorporates a top-down approach based on specification of the full system dynamics. This approach leads to more accurate error thresholds.
Article
We report on research directed to problems associated with the propagation of photonic signal states in quantum sensing. Attention is devoted to constraints associated to realistic propagation environments for practical applications of quantum sensing.
Article
Full-text available
We analyze the phase estimation ability of photonic N00N states propagating in a lossy medium. In such a medium a N00N state of N enangled photons cannot achieve the maximum 1/N phase estimation resolution. In fact, unless the transmittance of the medium is extremely high, a signal comprised of an attenuated separable state of N photons will produc...
Article
We study the phase estimation abilites of photonic N00N states, propagating in an attenuating medium, is analyzed. It is shown that N00N states of a given number of enangled photons N, never achieve the 1/N Heisenberg limit if the propagation occurs through lossy medium. It is also shown that a signal comprised of an attenuated separable state of N...
Article
The classical bound on image resolution defined by the Rayleigh limit can be beaten by exploiting the properties of quantum mechanical entanglement. If entangled photons are used as signal states, the best possible resolution is instead given by the Heisenberg limit, an improvement proportional to the number of entangled photons in the signal. In t...
Article
Full-text available
In this paper we introduce a universal operator theoretic framework for quantum fault tolerance. This incorporates a top-down approach that implements a system-level criterion based on specification of the full system dynamics, applied at every level of error correction concatenation. This leads to more accurate determinations of error thresholds t...
Article
Full-text available
In this paper we extend both standard fault tolerance theory and Kitaev's model for quantum computation, combining them so as to yield quantitative results that reveal the interplay between the two. Our analysis establishes a methodology that allows us to quantitatively determine design parameters for a quantum computer, the values of which ensure...
Article
We demonstrate an efficient method of constructing cluster state primitives by exploiting graph state equivalency class properties. We also present a recursion relation for photonic cluster chain length in terms of average resources required.
Article
The model of quantum computation developed by Kitaev (1 ,∮4.1) shows that a perfect, error-free, quantum computer can lead to reliable classical outputs, despite the need to apply a necessarily probabilistic measurement. In this paper we extend the analysis to account for necessarily imperfect quantum computation. The analysis presented here...
Article
The performance of photonic $N00N$ states, propagating in an attenuating medium, is analyzed with respect to phase estimation. It is shown that, for $N00N$ states propagating through a lossy medium, the Heisenberg limit is never achieved. It is also shown that, for a given value of $N$, a signal comprised of an attenuated separable state of $N$ pho...
Article
We demonstrate a method of constructing L-shape cluster states by exploiting equivalence class properties of graph states. The L-shape cluster state is a primitive which can be used to construct cluster states capable of supporting universal quantum computation. The method is device independent but is shown to be considerably more efficient than pr...
Article
In this paper we review the content of the Quantum Computer Condition, which is a rigorously specified criterion that provides a set of mathematical constraints that must be satisfied by a physical system if we intend to use that system as a quantum computing machine, and we discuss an important consequence of it known as the Quantum Computing No-G...
Article
Full-text available
The Quantum Computer Condition (QCC) provides a rigorous and completely general framework for carrying out analyses of questions pertaining to fault-tolerance in quantum computers. In this paper we apply the QCC to the problem of fluctuations and systematic errors in the values of characteristic parameters in realistic systems. We show that fault-t...
Article
We demonstrate a method of creating photonic two-dimensional cluster states that is considerably more efficient than previously proposed approaches. Our method uses only local unitaries and type-I fusion operations. The increased efficiency of our method compared to previously proposed constructions is obtained by identifying and exploiting local e...
Article
Full-text available
The attempt to equate operator quantum error correction (quant-ph/0504189v1) with the quantum computer condition (quant-ph/0507141) in version two of quant-ph/0504189 is shown to be invalid.
Article
In this paper we present a new unified theoretical framework that describes the full dynamics of quantum computation. Our formulation allows any questions pertaining to the physical behavior of a quantum computer to be framed, and in principle, answered. We refer to the central organizing principle developed in this paper, on which our theoretical...
Chapter
Quantum cryptography has attracted much attention because of its potential for providing secret communications that cannot be decrypted by any amount of computational effort. Here we provide an analysis of the BB84 quantum cryptographic protocol that simultaneously takes into account and presents the full set of analytical expressions for effects d...
Article
We perform a comprehensive analysis of practical, necessarily imperfect quantum cryptography systems. We obtain the complete universal expressions for the effective secrecy capacity and rate for quantum cryptography systems taking all direct and ancillary processes into account. We calculate the necessary and sufficient amount of privacy amplificat...
Article
Eavesdropping attacks on quantum key distribution protocols must be designed to be undetectable by the parties distributing the keys. In particular, the count rate statistics measured at the receiver must not be affected. We describe three versions of a near-optimal eavesdropping attack on the BB84 protocol implemented with realistic photon sources...
Article
Abstract. A number of questions associated with practical implementations of quantum cryptography systems having to do with unconditional secrecy, computational loads and effective secrecy rates in the presence of perfect and imperfect sources are discussed. The different types of unconditional secrecy, and their relationship to general communicati...
Article
In order to be practically useful, quantum cryptography must not only provide a guarantee of secrecy, but it must provide this guarantee with a useful, sufficiently large throughput value. The standard result of generalized privacy amplification yields an upper bound only on the average value of the mutual information available to an eavesdropper....
Article
Quantum cryptography has attracted much recent attention due to its potential for providing secret communications that cannot be decrypted by any amount of computational effort. This is the first analysis of the secrecy of a practical implementation of the BB84 protocol that simultaneously takes into account and presents the {\it full} set of compl...
Article
An undetected eavesdropping attack must produce count rate statistics that are indistinguishable from those that would arise in the absence of such an attack. In principle this constraint should force a reduction in the amount of information available to the eavesdropper. In this paper we illustrate, by considering a particular class of eavesdroppi...
Article
We perform a comprehensive analysis of practical quantum cryptography (QC) systems implemented in actual physical environments via either free-space or fiber-optic cable quantum channels for ground-ground, ground-satellite, air-satellite and satellite-satellite links. (1) We obtain universal expressions for the effective secrecy capacity and rate f...
Article
The increased availability of synchrotron x-ray sources has facilitated the development of new diffraction techniques based on x-ray resonant exchange scattering (XRES). Resonant electric dipole (E1) and quadrupole (E2) scattering involving virtual transitions between occupied core and empty valence levels is sensitive to the splitting and filling...

Network

Cited By