Compare Papers

Paper 1

Untangling Surface Codes: Bridging Braids and Lattice Surgery

Alexandru Paler

Year
2025
Journal
arXiv preprint
DOI
arXiv:2511.22290
arXiv
2511.22290

We present a systematic method for translating fault-tolerant quantum circuits between their braiding and lattice surgery (LS) representations within the surface code. Our approach employs the ZX calculus to establish an equivalence between these two paradigms, enabling verified, bidirectional conversion of arbitrary surface-code-level circuits. We show that both braiding and LS operations can be uniformly expressed as compositions of multibody measurements and demonstrate that the Raussendorf compression rule encompasses all known braid and bridge optimizations. We also introduce a novel CNOT circuit with LS. Our framework provides a foundation for the automated verification, compilation, and benchmarking of large-scale surface code computations, advancing toward a unified formal language for topological quantum computation.

Open paper

Paper 2

Measurement-device-independent quantum key distribution based on Bell's inequality

Hua-Lei Yin, Yao Fu, Yan-Lin Tang, Yuan Li, Teng-Yun Chen, Zeng-Bing Chen

Year
2014
Journal
arXiv preprint
DOI
arXiv:1407.7375
arXiv
1407.7375

We propose two quantum key distribution (QKD) protocols based on Bell's inequality, which can be considered as modified time-reversed E91 protocol. Similar to the measurement-device-independent quantum key distribution (MDI-QKD) protocol, the first scheme requires the assumption that Alice and Bob perfectly characterize the encoded quantum states. However, our second protocol does not require this assumption, which can defeat more known and unknown source-side attacks compared with the MDI-QKD. The two protocols are naturally immune to all hacking attacks with respect to detections. Therefore, the security of the two protocols can be proven based on the violation of Bell's inequality with measurement data under fair-sampling assumption. In our simulation, the results of both protocols show that long-distance quantum key distribution over 200 km remains secure with conventional lasers in the asymptotic-data case. We present a new technique to estimate the Bell's inequality violation, which can also be applied to other fields of quantum information processing.

Open paper