Compare Papers

Paper 1

State Decoding in Multi-Stage Cryptography Protocols

Sindhu Chitikela

Year
2013
Journal
arXiv preprint
DOI
arXiv:1306.5192
arXiv
1306.5192

This paper presents a practical method of quantum tomography for decoding the state of photons in a multistage cryptography protocol. This method works if the polarization angles are defined on a fixed plane, as is assumed in several quantum cryptography protocols. We show if there are 2m polarization angles in a fixed plane, we need m number of filters and m2 number of photons through each filter.

Open paper

Paper 2

Tradeoffs on the volume of fault-tolerant circuits

Anirudh Krishna, Gilles Zémor

Year
2025
Journal
arXiv preprint
DOI
arXiv:2510.03057
arXiv
2510.03057

Dating back to the seminal work of von Neumann [von Neumann, Automata Studies, 1956], it is known that error correcting codes can overcome faulty circuit components to enable robust computation. Choosing an appropriate code is non-trivial as it must balance several requirements. Increasing the rate of the code reduces the relative number of redundant bits used in the fault-tolerant circuit, while increasing the distance of the code ensures robustness against faults. If the rate and distance were the only concerns, we could use asymptotically optimal codes as is done in communication settings. However, choosing a code for computation is challenging due to an additional requirement: The code needs to facilitate accessibility of encoded information to enable computation on encoded data. This seems to conflict with having large rate and distance. We prove that this is indeed the case, namely that a code family cannot simultaneously have constant rate, growing distance and short-depth gadgets to perform encoded CNOT gates. As a consequence, achieving good rate and distance may necessarily entail accepting very deep circuits, an undesirable trade-off in certain architectures and applications.

Open paper