<<

Identification of networking on 14- IBM universal quantum computer

Ni-Ni Huang,1, 2 Wei-Hao Huang,1, 2 and Che-Ming Li1, 2, 3, ∗ 1Department of Engineering Science, National Cheng Kung University, Tainan 701, Taiwan 2Center for Quantum Frontiers of Research & Technology, NCKU, Tainan 701, Taiwan 3Center for , Hsinchu 30013, Taiwan (Dated: February 21, 2020) Quantum teleportation enables networking participants to move an unknown be- tween the nodes of a , and hence constitutes an essential element in constructing large-sale quantum processors with a quantum modular architecture. Herein, we propose two pro- tocols for teleporting through an N-node quantum network in a highly-entangled box- or chain-type cluster state. The proposed protocols are systematically scalable to an arbitrary finite number N and applicable to arbitrary size of modules. The protocol based on a box-cluster state is implemented on a 14-qubit IBM quantum computer for N up to 12. To identify faithful networking teleportation, namely that the elements on real devices required for the networking tele- portation process are all qualified for achieving teleportation task, we quantify quantum-mechanical processes using a generic classical-process model through which any classical strategies of mimicry of teleportation can be ruled out. From the viewpoint of achieving a genuinely quantum-mechanical process, the present work provides a novel toolbox consisting of the networking teleportation pro- tocols and the criteria for identifying faithful teleportation for universal quantum computers with modular architectures and facilitates further improvements in the reliability of quantum-information processing.

I. INTRODUCTION Accordingly, we present herein a toolbox for examining the performance of IBM quantum computers, where the Quantum teleportation provides a method for trans- networking teleportation protocol is executed. We firstly porting unknown quantum states between remote sys- propose two systematically extensible networking tele- tems based on shared entanglement and quantum mea- portation protocols for a network consisting of N parties surements [1]. Teleportation constitutes the fundamen- based on either a box-cluster state or a chain-type cluster tal element required to perform a wide range of quan- state [30, 31]. The proposed protocols possess applica- tum computation and tasks in a bility to arbitrary finite size of modules and the adapt- quantum network [2–9]. In particular, to construct large- ability to the benchmark provided by a generic classical scale processors with a modular ar- process model [32]. We then implement the proposed chitecture [4,7, 10–16] (Fig.1a), ideal teleportation is protocol based on the N-qubit box-cluster state on a 14- required to connect the various modules within the net- qubit quantum processor named ibmq 16 melbourne for work [4,7, 10, 13–16] (Figs.1b, c). Notably, such an ideal N up to 12. quantum process is also essential for the modularization A generic classical-process model providing the of quantum networks in which spatially-separated quan- strictest criteria in order to rule out any classical strate- tum nodes communicate across different modules [6]. gies of mimicry of teleportation [32] is utilized for as- Recently, IBM launched the IBM Q Experience, which sessing the performance of the real quantum device, on makes universal quantum computers accessible to the which the proposed networking teleportation protocol is general public through cloud service [18]. IBM has also conducted. Through the generic classical-process model, developed [19] to provide users with the tools one can identify whether the experimental networking required to run their quantum programs on prototype arXiv:2002.08671v1 [quant-ph] 20 Feb 2020 teleportation process is faithful. In the case that the quantum devices and simulators. IBM Q Experience pro- experimental process is identified as faithful, all the ele- vides an online platform for the experimental testing of ments on real quantum devices required in the network- the fundamentals of quantum [20–24] and a wide ing teleportation process are identified as all qualified variety of applications in quantum information theory for use. The model is defined as input states satisfying [25–29]. However, while IBM has built both 20-qubit the assumption of realism and their evolutions to out- and 50-qubit quantum processors [18], a comprehensive put states that can be reconstructed as a density opera- characterization of the networking teleportation process tor, where this evolution conforms to classical stochastic for future modular use on IBM quantum devices is still theory. Existing identification methods utilize the state lacking. characteristics to verify the teleportation of IBM Q [25– 27], solid-state systems [33–35], trapped atoms [36, 37], photonic qubits [38–42], atomic ensembles [43, 44] and satellite-based systems [45, 46]. By contrast, the present ∗ [email protected] study provides a novel toolbox consisting of the two scal- 2

a b c Flying qubit 1 0 1 3 5 Alice Bob 1 Participant 0 2 4 6 Arbitrary state Specific measurement 2 Bell-state measurement 0 1 3 5 2 (iii) P 1 3 5 (i) Recover 2 4 6 2 4 6 Qubit (ii) Physical interaction j mi

FIG. 1. Networking teleportation in a modular architecture. (a) Modular architecture of the quantum network. Each module is regarded as a node of the quantum network and consists of qubits [4,7, 10, 12, 13, 16]. The modules transmit quantum states to one another by performing intra- and inter-module operations [4,7, 10, 11, 13–16]. The architecture can be extended to realize a universal quantum computer by teleporting a controlled-Z (CZ) gate [7]. (b) Transmission of quantum information among different modules. Due to the isolation between modules, quantum teleportation [4,7, 10, 13–16] is utilized to transport an arbitrary quantum state of qubit 0 (purple) from module 1 to module 2 consisting of qubits 1–6. In particular, qubit 0 is entangled with a flying photon qubit [7, 11, 12, 14] (gradient purple) via a CNOT-like operation on Alice’s side [14]. Alice then measures qubit 0 on a specific basis to enable the flying qubit to carry the information regarding the quantum state of qubit 0 to be transported via remote state preparation [17]. (c) Networking teleportation protocol based on a 6-qubit box-cluster state |Cb,6i. The protocol aims to teleport the arbitrary state of qubit 0 from Alice to Bob using a shared entangled state |Cb,6i among Alice, the participants and Bob. The main steps of the protocol are as follows: (i) Bell-state measurement (red) on Alice’s flying photon qubit which carries the information of the quantum state of qubit 0 and qubit 1; (ii) specific local measurements (orange) on participants’ qubits 2–5; (iii) appropriate unitary transformations P on Bob’s qubit N to recover the initial input state (purple) in accordance with the measurement results informed by Alice and the participants. (See text for detailed procedures.) able N-qubit networking teleportation protocols and the and Z = (|0i h0| − |1i h1|) and X = (|+i h+| − |−i h−|) criteria for identifying faithful teleportation. are the Pauli-Z matrix and√ Pauli-X matrix, respectively, where |−i = (|0i − |1i)/ 2. The proposed networking teleportation protocol utilizes two different types of phys- II. CLUSTER STATES ical interaction of the cluster states, namely an N-qubit box-cluster state |Cb,N i (shown in Fig.2a, top) and a To implement the proposed networking teleportation chain-type cluster state |Cc,N i (shown in Fig.2a, bot- protocol, it is first necessary to generate highly-entangled tom). multipartite states (so-called cluster states) [30, 31]. Notably, the advantages are twofold for the teleporta- Cluster states with multipartite quantum correlations are tion protocols to use either chain-type cluster states or considered to be the significant source: basic building box-cluster states. First, according to the connectivity block when constructing general modular architectures map of 14-qubit ibmq 16 melbourne device and the other for quantum networks [6]. quantum devices on IBMQ [18], chain-type cluster states An N-qubit cluster state |Ci can be generated by ap- and box-cluster states are the most feasible and applica- plying the controlled-Z (CZ) gates with a specified con- ble types of entangled states to be generated. Second, figuration to the initial states, i.e., these two types of cluster states are natural resources to be integrated into different and complex networking |+i⊗N = H⊗N |0i⊗N , (1) protocols, such as universal measurement-based quantum √ computation [31, 47–49], error correction [50–53], blind where |+i = (|0√i + |1i)/ 2 and H = (|0i h0| + |0i h1| + quantum computation [54–57], as well as quantum cryp- |1i h0|−|1i h1|)/ 2 is the Hadamard transformation (H). tography like quantum secret sharing [58, 59]. The state vector |Ci can then be written in the form

Y ⊗N |Ci = CZ 0 |+i , (2) (a,a ) III. NETWORKING TELEPORTATION 0 (a )∈I(a) PROTOCOLS where I(a) is the set of qubits that physically interact with qubit a, and CZa,a0 = |0i h0|a ⊗ Ia0 + |1i h1|a ⊗ Za0 This section presents a general description of the pro- denotes the CZ gate acting on the control qubit a and tar- posed networking teleportation protocol, wherein either 0 get qubit a . Here, I is a 2-dimensional identity matrix, an N-qubit box-cluster state |Cb,N i (Fig.2a, top) with 3 positive even integer N up to 12 or an N-qubit chain-type a N-3 N-1 cluster state |Cc,N i (Fig.2a, bottom) with arbitrary pos- 0 1 3 itive even integer N (Fig.2a), is employed. The proposed (iii) P Recover protocols are applicable to arbitrary finite size of mod- (i) 2 4 N-2 N N j ules (Fig.1). It should be noted that Fig.1 illustrates (ii) the concept of performing our protocols in a modular ar- mi chitecture, where the flying photon qubit is required for Alice Specific measurement the Bell-state measurement performed by Alice because Participant Bell-state measurement Bob Arbitrary state (iii) P of the separation between the modules. However, it is Recover 0 1 2 N-1 N N worth stressing that our protocols are applicable regard- less of whether modular architecture is used in universal (ii) (i) j mi superconducting quantum computer. Furthermore, the Q Q proposed protocols are also adaptable to other network b 1, 1 2, 3 Q1, 1 Q2, 3 Q3, 5 Q1, 1 Q2, 3 Q3, 5 Q4, 7 communication systems, such as optics [55, 58, 60], ion X X Z X Z Z traps [61, 62], and NV centres [63]. (i) (ii) (iii) In the following, we introduce the executive steps for X X X X X X Q Q Q Q Alice, the participants, and Bob, respectively in the pro- Q13, 2 Q12, 4 Q13, 2 Q12, 4 Q11, 6 13, 2 12, 4 11, 6 10, 8 Q Q Q Q Q Q Q Q Q Q Q posed networking teleportation. 1, 1 2, 3 3, 5 4, 7 5, 9 1, 1 2, 3 3, 5 4, 7 5, 9 6, 11 X Z Z Z X Z Z Z Z (iv) (v) 1. Measurement performed by Alice. Alice performs X X X X X X X X X Bell-state measurement on qubit 0 (whose state ρin Q Q Q Q Q Q13, 2 Q12, 4 Q11, 6 Q10, 8 Q9, 10 Q8, 12 is arbitrary) and qubit 1, and obtains one of four 13, 2 12, 4 11, 6 10, 8 9, 10 possible results, namely 00, 01, 10, or 11. The FIG. 2. Schematic of the N-qubit networking teleportation measurement thus projects her two qubits into one protocols and participants’ specific measurement basis of N- + of the four different Bell states (Uj ⊗ I) |φ i with qubit box-cluster state. (a) Schematic of the proposed net- j=00, 01, 10, or 11, where working teleportation protocols. The protocol aims to tele- port an arbitrary state ρin (purple) using a shared N-qubit U00 = I,U01 = X, box-cluster state |Cb,N i (top) or N-qubit chain-type cluster (3) U = Z,U = ZX, state |Cc,N i (bottom), consisting of qubits 1–N shared by 10 11 Alice (pink), the participants (yellow), and Bob (blue). The √ protocol involves the following three steps: (i) Bell-state mea- + and |φ i = (|00i + |11i)/ 2. Alice communicates surement performed on qubits 0 and 1 (red) at Alice’s side, her measurement outcome j to Bob (step (i) in (ii) local measurements on the specific basis performed on Fig.2a). It is worth noting that Bell-state measure- qubits 2–N-1 (orange) at the participants’ side, and (iii) uni- ment (analysis) is one of the key element in quan- tary transformations P (as shown in Eqs. (4) and (6)) on qubit tum teleportation protocols and has been widely N (purple) to recover the teleported state at Bob’s side. (b) studied especially in optical systems [64–72]; on the Participants’ specific measurement basis in the case of |Cb,N i other hand, the Bell-state measurement performed with positive even integers from 4 to 12 (from diagrams (i) on the universal IBM quantum computer is imple- to (v), respectively). The notation Qn, i indicates that the logical qubit i in the protocol description corresponds to the mented by using universal logic gates followed by physical qubit n on the 14-qubit ibmq 16 melbourne device. measurement on the Pauli-Z basis (Fig.3c). 2. Local measurements performed by the participants. Each participant in the teleportation process per- is performed on the Pauli-X basis for mea- forms measurement and communicates the result surements. By contrast, for the remaining odd qubits, measurement is performed on the mi classically to Bob, where mi ∈ {+1, −1} rep- resents the possible measurement outcome of the Pauli-Z basis for measurements (Fig.2b). A i-th participant’s qubit on a specific measure- specific example is given in Methods section. ment basis (step (ii) in Fig.2a). The proto- (b) For |Cc,N i, all of the participants perform lo- (N−3) cols based on |Cb,N i and |Cc,N i have 2 and cal measurements on the Pauli-X basis. 2(N−2) possible participant measurement results (m2, m3, . . . , mi, . . . , mN−1), respectively. The de- 3. Once Alice’s and the participants’ qubits have tailed steps of the participants’ measurement pro- been collapsed by their measurements, Bob re- cesses for |Cb,N i and |Cc,N i are given in the follow- covers ρin by applying appropriate unitary op- ing: erations P on his qubit N, where P ∈ {I,Z,X,ZX,H,ZH,XH,ZXH}. Note that P (a) For |Cb,N i, every participant performs mea- is calculated based on Alice’s measurement re- surement on a specific basis on their qubit sult j and the participants’ measurement results i. In particular, for all of the even qubits (m2, m3, . . . , mi, . . . , mN−1) (step (iii) in Fig.2a). of the participants and qubit 3, measurement Bobs operations for |Cb,N i and |Cc,N i, respectively, 4

(i) (ii) (iii) are elaborated as follows: IZX −→ ZX; (4) P = XZXZXZH −→ ZZXZH −→ (i) (iv) (a) For |Cb,N i, Bob’s operation to recover the ar- IXZH −→ XZH −→ ZXH. bitrary state has the form It is worth noting that the two proposed protocols

N−1 based on either a |Cb,N i or a |Cc,N i are both system- Y (N) atically scalable to arbitrary positive even integer N. To P = ( Oi,mi )Uj(H ), (4) extend the proposed networking protocol based on |Cb,N i i=2 for N > 12, the specific measurement basis of the i-th where O represents the unitary transfor- i,mi participant’s qubit and the unitary operations Oi,−1 for mation according to measurement result mi i > 11 are required to be defined. After all the measure- of the i-th participant’s qubit. The unitary ments are performed by Alice and participants, Bob then operations O = I and O are defined as i,+1 i,−1 calculates his operation P using Eq. (4) and recovers ρin follows: by applying P to his qubit. O2,−1 = I,O3,−1 = X, O = Z,O = I, 4,−1 5,−1 IV. IDENTIFYING QUANTUM-MECHANICAL O6,−1 = X,O7,−1 = Z, (5) PROCESS OF NETWORKING TELEPORTATION O8,−1 = Z,O9,−1 = X,

O10,−1 = X,O11,−1 = Z. A generic classical process model [32] was utilized to quantitatively analyze the performance of a real quantum Referring to Eq. (4), Uj is the unitary opera- device, on which the proposed teleportation protocol was tion according to Alice’s measurement result executed. j, and is obtained using the definition given in (N) Suppose that a process of interest is created and its Eq. (3). In addition, H is the Hadamard normalized process matrix, χ , is obtained experimen- transformation (H) of qubit number N and expt (N) tally via the method of process tomography (PT) [73]. has a value of H = I if qubit number N If the experimental process cannot be described at all by can be divided by four; or H(N) = H other- any classical processes (denoted as χC ), then χexpt is said wise. An illustrative case is given in Methods to be a genuinely quantum process (denoted by χ )[32]. section. Q A classical process, χC , comprises a classical initial (b) For |Cc,N i, Bob’s operation to recover the ar- state and its evolution to a final state. The initial sys- bitrary state is written in the form tem can be regarded as a physical object with properties

N−1 satisfying the assumption of realism. The system then Y P = ( O )U H, (6) evolves according to classical stochastic theory to a final i,mi j state. It should be noted that the assumption of realism i=2 predicates that the system state can be described by a where O is the unitary transformation ac- i,mi set of measurement outcomes. Moreover, the dynamics cording to measurement result mi of the i-th of these classical states are fully described by the tran- participant’s qubit. The unitary operations sition probabilities from a specific state to a final state Oi,+1 = I and Oi,−1 are defined respectively [32]. as follows: An experimental process, χexpt, is identified as non-  X if i is even classical, i.e., close to the ideal quantum process χQI , if Oi,−1 = . (7) Z if i is odd the process fidelity satisfies that Fp ≡ tr(χexptχQI ) > FC ≡ max tr(χC χQ ) or F s,expt > F s,C , where χ I As described above, Uj in Eq. (6) is the uni- C tary operation determined from Alice’s mea- F s,expt(C) = (2Fexpt(C) + 1)/3 is the average state fi- surement result j using the definition given in delity [74]. It should be noted that ideal teleportation Eq. (3). An illustrative example is given in corresponds to an identity process, for which the process Methods. fidelity threshold is given by F ∼ 0.683, (8) It should be noted that when calculating P using the C protocols based on |Cb,N i or |Cc,N i, there are four prop- and the average state fidelity threshold for teleportation erties of matrix multiplication: (i) IX = XI = X, is IZ = ZI = Z; (ii) XZX = Z, ZXZ = X; (iii) XX = I, ZZ = I, II = I; and (iv) when P is lastly calculated to Fs,C ∼ 0.789. (9) be XZ, then P should be considered to be ZX. Let us In contrast, the measure-prepare strategy [75] in which (i) give four illustrative examples: (1) P = IIZIXH −→ Alice directly measures her input state and Bob then pre- (i) (ii) pares the output state accordingly is included as a special ZXH; (2) P = IZIIXIZH −→ ZXZH −→ XH; (3) case in our generic classical-process model. It can be un- (i) (ii) (iii) P = IXZIXZZX −→ XZXZZX −→ ZZZX −→ derstood by the fact that the measure-prepare process is 5 not an optimal classical teleportation: FC = 0.5 < 0.683, operations can be employed after a measurement. Thus, and the average state fidelity is Fs,C = 0.667 < 0.789. it is possible only to obtain the probabilities of all the Accordingly, our model provides the strictest criteria to possible measurement outcomes. evaluate whether an experimental teleportation can out- To complete the networking teleportation procedure, perform classical mimicry. Our model is further proven quantum state tomography [73] is performed on qubit in a quantitative way for evaluating an experimental tele- Q11, 6 to reconstruct the of the teleported portation process [76]. state, ρout, by measuring the state in the Pauli basis {X, Y , Z},√ where Y = (|Ri hR| − |Li√ hL|) with |Ri = (|0i + i |1i)/ 2 and |Li = (|0i − i |1i)/ 2 (Fig.3e). V. NETWORKING TELEPORTATION Experimentally, the measurements performed on the IMPLEMENTED ON IBMQ 16 MELBOURNE Pauli-X or Pauli-Y basis are implemented by using dif- DEVICE ferent transformations U2 followed by measurement on the Pauli-Z basis. In particular, the measurement on The proposed networking teleportation protocol the Pauli-X basis is implemented by an H gate followed was experimentally implemented on the 14-qubit by measurement on the Pauli-Z basis; while the mea- ibmq 16 melbourne device (Fig.2b). Five different surement on the Pauli-Y basis is implemented by S† and box-cluster states were considered, namely a 4-qubit H gates followed by measurement on the Pauli-Z basis. box-cluster state |Cb,4i consisting of qubits Q1, 1–Q12, 4 Finally, the last unitary operation P is applied as a post- (Fig.2b(i)); a 6-qubit box-cluster state |Cb,6i consisting selection to the experimental density matrices based on of qubits Q1, 1–Q11, 6 (Fig.2b(ii)); an 8-qubit box-cluster the measurement results informed by Alice and the par- state |Cb,8i consisting of qubits Q1, 1–Q10, 8 (Fig.2b(iii)); ticipants, respectively. Herein, it is assumed that the a 10-qubit box-cluster state |Cb,10i consisting of qubits transported state is perfectly recovered by Bobs opera- Q1, 1–Q9, 10 (Fig.2b(iv)); and a 12-qubit box-cluster state tion, P . |Cb,12i consisting of qubits Q1, 1–Q8, 12 (Fig.2b(v)). To quantitatively characterize the performance of the Fig.3 shows a schematic illustration of the imple- real quantum processor, including all the required ele- mented networking teleportation procedure for the 6- ments for teleportation, where the proposed protocol is implemented, the experimental results were evaluated us- qubit box-cluster state |Cb,6i (Fig.1c). As shown, all ing the process fidelity criterion (8). In performing the of the qubits Qn, i are initially prepared in the state |0i evaluation, complete PT [73] was applied to the tele- and the arbitrary quantum state of qubit Q0, 0 to be tele- ported is then prepared by applying the unitary opera- ported state ρout of the protocol. Furthermore, states ρ ∈ {|0i h0| , |1i h1| , |+i h+| , |Ri hR|} were chosen as the tion U1 (Fig.3a). To transport an arbitrary quantum in input states for teleportation. The teleportation process state of qubit Q0, 0 to qubit Q11, 6, the networking tele- portation procedure commences by preparing a 6-qubit was described by the following positive Hermitian process cluster state using the definitions given in Eqs. (1) and matrix χexpt:

(2). The CZ gates are then implemented by a CNOT 4 X gate and two H gates in accordance with the connec- ρ = χ M ρ M , (10) tivity map of the 14-qubit ibmq 16 melbourne quantum out mn m in n m,n=1 processor (Fig.3b). Bell-state measurement is then performed on qubits where M1 = I, M2 = X, M3 = −iY , and M4 = Z.

Q0, 0 and Q1, 1 (Fig.1c(i)) using a CNOT gate and an The ideal teleportation process matrix, χQI , has only one

H gate; followed by measurement on the Pauli-Z basis non-zero element, (χQI )11 = 1. In other words, the input (Fig.3c). As described previously, the participants per- state is teleported without any loss in fidelity (Fig.4a). form measurements on a specific basis (Fig.1c(ii)). In Experimentally, to encode the qubit Q0, 0 to be tele- particular, for all of the even qubits Q13, 2, Q12, 4 and ported, where this qubit starts in the |0i state, various the qubit Q2, 3, the participants perform measurements unitary gates U1 are applied (Fig.3a). Specifically, to en- on the Pauli-X basis (Fig.2b(ii)), which is implemented code the |1i (|+i) state, an X (H) gate is placed on qubit by an H gate, followed by measurement on the Pauli-Z Q0, 0, while to encode the |Ri state, an H gate is first ap- basis. For the remaining odd qubit, Q3, 5, the participant plied followed by an S gate, where S = |0i h0| + i |1i h1|. performs measurement on the Pauli-Z basis (Fig.3d). In the last step of the protocol, Alice sends her mea- surement result j, and each of the participants sends his VI. IDENTIFICATION OF or her measurement result mi, to Bob through a classi- QUANTUM-MECHANICAL PROCESS OF cal communications channel. Bob then applies the last NETWORKING TELEPORTATION unitary operation P defined in Eq. (6) on qubit Q11, 6 to recover the transported state relying on the results from Before considering the identification of a real device, Alice and participants he received (Fig.1c(iii)). on which the proposed N-party networking teleporta- Note that IBM Q Experience only permits at most tion protocol is conducted, the protocol was simulated on one measurement on every given qubit. Moreover, no the 32-qubit ibmq qasm simulator device, which enables 6

a b c d e z Q0, 0 0 U1 H z Q1, 1 0 H H H z Q13, 2 0 H H z Q2, 3 0 H H H H H H z Q12, 4 0 H H H H H H z Q3, 5 0 H H H H H z Q11, 6 0 H U2

FIG. 3. Schematic showing of networking teleportation based on a 6-qubit box-cluster state |Cb,6i on the ibmq 16 melbourne device. The circuit to teleport an arbitrary state of Q0, 0 to Q11, 6 consists of the following: (a) all of the qubits are initialized to |0i and the arbitrary state of qubit Q0, 0 to be teleported is implemented by different unitary operations U1;(b) |Cb,6i;(c) Bell-state measurement is performed on Alice’s qubits Q0, 0 and Q1, 1;(d) local measurements are performed on the specific basis on the participants’ qubits Q13, 2–Q3, 5;(e) state tomography is performed for the transported state on Bob’s qubit Q11, 6, and is implemented by different unitary operations U2 followed by measurement on the Pauli-Z basis. (See the related text for a detailed description.)

0.9997 and 0.9997 for qubit numbers of N=4, 6, 8, 10 and 12, respectively (Fig.5). Meanwhile, the process fi- delities of the networking teleportation protocol utilizing |Cc,N i were calculated to be Fp = 0.9966, 1.0004, 0.9988, 1.0004 and 1.0004, respectively. The state fidelities for the teleported quantum states ρout of the protocols based on |Cb,N i and |Cc,N i, respectively, for N up to 12 were calculated to be Fs = 1.0000 in both cases. We can observe that the process fidelities of the proto- cols based on |Cb,N i for N=6 and 8 and |Cc,N i for N=6, 10 and 12 are higher than 1, while those for the other val- ues of N are lower than 1. The reason is that if we con- duct the simulation on the 32-qubit ibmq qasm simulator device, we will obtain approximate probabilities. How- ever, we will obtain an exact result if and only if the prob- abilities are zero or one. More specifically, events with zero probabilities will never be observed, while events with probability 0 < p < 1 will be observed proportional to “p” (but unlikely to be exactly “p”) [77]. The to- mographic measurement of density matrices using this FIG. 4. Absolute values of the reconstructed process matrix simulation measurement result may be able to produce χmn with m, n = 1, 2, 3, 4 for the proposed networking results that violate important basic properties like posi- teleportation protocol based on |Cb,N i for: (a) ideal quantum tivity [78]. Therefore, the process fidelity is not exactly teleportation; (b) N=4; (c) N=6; (d) N=8; (e) N=10; and equal to 1 even though the state fidelities are all equal to (f) N=12. 1. Having validated the proposed protocol, it was con- ducted based on |Cb,N i for N=4 to 12 on the 14-qubit anonymous users to compose ideal multi-shot executions ibmq 16 melbourne device. Complete PT was imple- of quantum circuits and then returns counts through IBM mented on the teleported state ρout, and formalisms and Q Experience [18]. The aim of the simulation was to ver- criteria described in Eqs. (11) and (12) were used to ify the correctness of the individual steps in the proposed evaluate the performance of the real device, on which protocol based on an N-qubit box-cluster state |Cb,N i our protocol was implemented. Figs.4b-f show the re- and a chain-type cluster state |C i, respectively, for N c,N constructed process matrix χexpt for different N. One up to 12. can observe that the experimental teleportation process The process fidelities of the networking teleportation matrix has four evenly distributed non-zero elements protocol based on |Cb,N i 32-qubit ibmq qasm simulator (χexpt)11,(χexpt)22,(χexpt)33,(χexpt)44, while ideally it device were calculated to be Fp = 0.9972, 1.0007, 1.0032, should have only one non-zero element (χQI )11 = 1. In 7

fined as the overlap of the ideal transported state ρin and the experimental density matrix ρout. In other words, Teleportation on IBM p√ √ Teleportation on 14-qubit IBM quantum device Fs(ρin, ρout) = tr ρinρout ρin. It can be observed that the state fidelities of the four transported states (shown in TableI) also do not surpass the maximum value of 0.789 in Eq.9 which is achievable by classical means.

N |0i |1i 2 0.8692 ± 0.0012 0.8646 ± 0.0012 3 0.7168 ± 0.0016 0.7152 ± 0.0016 4 0.5080 ± 0.0017 0.5055 ± 0.0017 6 0.5034 ± 0.0017 0.4994 ± 0.0017 8 0.4991 ± 0.0017 0.4957 ± 0.0017 10 0.4984 ± 0.0017 0.5011 ± 0.0017 12 0.5049 ± 0.0017 0.5031 ± 0.0017 N |+i |Ri FIG. 5. Process fidelity of N-qubit teleportation based 2 0.8252 ± 0.0016 0.7384 ± 0.0017 on 2- and 3-qubit chain-type cluster states and |Cb,N i for 3 0.7453 ± 0.0017 0.7420 ± 0.0017 qubit numbers N=4, 6, 8, 10 and 12, respectively. The red 4 0.5000 ± 0.0017 0.5000 ± 0.0017 dotted line denotes the maximum classical process fidelity of 6 0.5000 ± 0.0017 0.5000 ± 0.0017 FC = 0.683. The bars colored light blue and dark blue denote the results obtained from the 32-qubit ibmq qasm simulator 8 0.5000 ± 0.0017 0.5000 ± 0.0017 device and the 14-qubit ibmq 16 melbourne device, respec- 10 0.5000 ± 0.0017 0.5000 ± 0.0017 tively. 12 0.5000 ± 0.0017 0.5000 ± 0.0017

TABLE I. State fidelities for the teleported quantum states ρ for qubit numbers N=2, 3, 4, 6, 8, 10 and 12, respec- other words, the input state is teleported with nearly 75% out tively. Each experimental value corresponds to the mean loss in fidelity. value obtained over 8192 measurements of 10 times, consid- To investigate the effect of the qubit number N on the ers the Poissonian counting statistics, and is rounded off to 4 performance of the real processor, where the proposed decimal places. protocol was conducted utilizing both a 2-qubit chain- type cluster state and a 3-qubit chain-type cluster state, In order to explore the potential causes of the experi- respectively. The process fidelities F ≡ tr(χ χ ) p expt QI mental process fidelities of the real device, on which the were calculated to be Fp = 0.7166 ± 0.0010, 0.6063 ± proposed protocol was executed, the following section de- 0.0012, 0.2550 ± 0.0012, 0.2523 ± 0.0012, 0.2493 ± 0.0012, constructs the key ingredients required in the process. 0.2539 ± 0.0012 and 0.2508 ± 0.0012 for qubit numbers A series of analyses are additionally conducted on the N=2, 3, 4, 6, 8, 10 and 12, respectively (Fig.5). Note shared entanglement and its fundamental CZ gate. that each experimental value in Fig.5 corresponds to Firstly, we apply an optimal entanglement witness [79] the mean value obtained over 8192 measurements of 10 to detect the existence of genuine multipartite entangled times. Note also that the error bars are obtained by states on the 14-qubit ibmq 16 melbourne processor. The Poissonian counting statistics and are rounded off to 4 result implies that the existence of genuine multipartite decimals. Finally, the experimental values for N=4-12 entanglement cannot be detected in the experimental and N=2-3 were accessed through IBM Q Experience [18] prepared state on the real quantum device (see Meth- on 09 December 2018 and 25 August 2019, respectively. ods). Secondly, to clarify the effect of the CZ gate on From the experimental results obtained from the 14- the present experimental results for the multipartite clus- qubit ibmq 16 melbourne device reported above, one can ter states, we characterized the CZ gate on the 14-qubit observe that the experimental process fidelities for qubit ibmq 16 melbourne device by using PT. The experimen- numbers N=2, 3, 4, 6, 8, 10 and 12 decrease as N tal result suggests that an increasing number of N and increases. It is also observed that the quality of the CZ gates leads to a corresponding decrease in the fidelity experiments when utilizing a 3-qubit chain-type cluster of the networking teleportation procedure on the 14-qubit state and |Cb,N i for qubit numbers N=4, 6, 8, 10 and quantum device (see Methods). Then we inquire into the 12 does not go beyond the maximum process fidelity effects of in the experiments by compar- of FC = 0.683 (Eq.8) that can be achieved classically ing three common noise channels [73]. The results shows (Fig.5). Finally, it is noted that the process fidelities are that the noise in the networking teleportation process is close to 0.25 for qubit numbers N=4, 6, 8, 10 and 12. similar to that produced in a depolarizing channel (see The state fidelity Fs of the teleportation process is de- Methods). 8

VII. DISCUSSION In future studies, our work can further combine with er- ror mitigation and correction software such as Ignis, one In this work, we have proposed two systematically scal- of the four libraries in Qiskit, to characterize the noise able networking teleportation protocols consisting of N and errors induced by hardware via simulations. parties utilizing either an N-qubit box-cluster state with Finally, through both the scalability to arbitrary fi- positive even integer N up to 12, or a chain-type cluster nite even number of the qubit and the adaptability to state with arbitrary positive even integer N, to transmit the more general criteria for identifying non-classical tele- arbitrary quantum states inside and among the mod- portation of the proposed protocol, we provide an essen- ules in a quantum network. The proposed protocols tial identification toolbox for future modular uses from are adaptable to the benchmark provided by a generic a process point of view. It is worth stressing that the classical-process model and applicable to arbitrary finite toolbox provides an essential assessment for identifying size of modules. Notably, the original teleportation pro- whether all the components on the real quantum device tocol illustrates that two communication parties, Alice required in the networking teleportation process are all and Bob, can teleport the unknown state by sharing qualified for use. In particular, the proposed assessment Einstein-Podolsky-Rosen (EPR) pairs [1]. Our protocols method paves the way for further advancement of every illustrate that many communication parties, Alice, par- key element in the whole networking teleportation pro- ticipants and Bob, can teleport the unknown state by cess to facilitate the development of future modular tech- sharing multi-qubit cluster states. In contrast to the orig- niques with improved reliability in performing quantum- inal protocol, the proposed protocols are more applicable information processing tasks. for many communication parties in the future quantum network and can be further integrated into potential net- working applications consisting of multiparties, such as VIII. METHODS protocols for quantum computation [31, 47–57] and quan- tum cryptography [58, 59]. A. Illustrative examples for the steps in the We have verified and tested the proposed protocols proposed protocols. on both the IBM quantum simulator and the 14-qubit ibmq 16 melbourne device. We have further utilized In the case of step 2(a), assume that the qubit number the generic classical-process model to quantify quantum- is N = 6. In the measurement process, all of the even mechanical processes for identifying non-classical net- qubits (i.e., qubits 2 and 4) and qubit 3 are measured on working teleportation. The experimental results have the Pauli-X basis, while the remaining odd particle (i.e., shown that the process fidelities of the real quantum de- qubit 5) is measured on the Pauli-Z basis (Fig.1c). vice, where the proposed networking teleportation pro- In the case of step 3(a), let us assume that qubit num- tocol was conducted cannot go beyond the best mimicry ber N=6, Alice’s measured outcome is j = 01, and the attained by classical processes. That is, the components measurement process for the participants’ qubits yields on the real device required for the networking teleporta- (m2, m3, m4, m5) = (−1, +1, −1, −1). According to the tion process are not yet all qualified for use. measurement results informed by Alice and the partic- We have then unambiguously deconstructed the essen- ipants, P = IIZIXH, In other words, P = ZXH is tial components in the networking teleportation process. applied to recover the input state ρin. That is, Bob re- We have prepared cluster states consisting of 4, 6, 8, 10 covers ρin by applying first an H gate, then an X gate, and 12 qubits on a 14-qubit ibmq 16 melbourne device and finally a Z gate to his qubit. and have shown that genuine multipartite entanglement In the case of step 3(b), we herein consider an illustra- cannot be detected using entanglement witness opera- tive example in which qubit number N=8, Alice’s mea- tors. We then characterized the effect of the essential sured outcome is j = 10, and the measurement results of CZ gate on a 14-qubit ibmq 16 melbourne device in con- the participants’ qubits are (m2, m3, m4, m5, m6, m7) = structing cluster states by process tomography and uti- (+1, −1, +1, +1, −1, +1). According to the measure- lized the experimental process matrix of the controlled ment results informed by Alice and the participants, gate to reconstruct the whole networking teleportation P = IZIIXIZH. In other words, Bob applies P = XH procedure. The results showed that as the number of to recover the input state ρin. That is, Bob recovers ρin qubit N and CZ gates increase, the fidelity of the net- by first applying an H gate and then an X gate. working teleportation procedure decreases. In addition, the noise in the experiments is close to that produced in a depolarizing channel. B. Detection of genuine multipartite entangled Qiskit is arranged in four libraries: Terra, Aqua, Aer state. and Ignis. The work presented herein utilizes Terra and Aer. Terra is intended for composing and optimizing To detect the existence of genuine multi-partite entan- quantum programs on a particular device, while Aer pro- gled states on the 14-qubit ibmq 16 melbourne device, vides a simulator framework for users to compose and which are the essential elements for realizing teleporta- verify quantum circuits using the Qiskit software stack. tion, we herein apply an optimal entanglement witness 9

[79] to evaluate the quality of the cluster states on the gate on the 14-qubit ibmq 16 melbourne device was fully 14-qubit ibmq 16 melbourne processor. For illustration characterized by means of quantum process tomography. purposes, we consider both a 6-qubit box-cluster state In particular, the process matrix of the CZ gate was ex- |Cb,6i and a 6-qubit chain-type cluster state |Cc,6i. The perimentally determined with maximum likelihood [80] witness for |Cb,6i has the form and was then utilized to reconstruct the whole network- ing teleportation procedure utilizing |Cb,4i. The process ⊗6 WCb,6 =5I − XZZIII − IZZXIZ − ZXIZII fidelity was calculated to be Fp = 0.2457. In other words, −IIZIXZ − ZIXZZI − IIIZZX. (11) this suggests that an increasing number of N and CZ gates leads to a corresponding decrease in the fidelity of Meanwhile, the witness for |Cc,6i has the form the networking teleportation procedure on the 14-qubit quantum device. (Note that the tomographic measure- W =5I⊗6 − XZIIII − IIZXZI − ZXZIII Cc,6 ment of the CZ gate was accessed through IBM Q Expe- −IIIZXZ − IZXZII − IIIIZX. (12) rience [18] on 10 April 2019.) To inquire into the effects of quantum noise in the ex- For a genuine 6-partite entanglement state close to periments, we compared three common noise channels |Cb,6i (|Cc,6i), hWi is optimally equal to −1. To min- [73], namely a depolarizing channel (χD), a phase damp- imize the readout error caused by the measurements, ing channel (χ ) , and an amplitude damping channel the witnesses we used here only require two local mea- AD (χPD), to the experimental process matrix χexpt. The surement settings independent of the number of qubits noise channels were defined respectively as for detection of each genuine multipartite entanglement. For example, XZZXXZ and ZXXZZX are required to evaluate |Cb,6i , while XZXZXZ and ZXZXZX are 3 1 χD(ρ) = (1 − )IρI + (XρX + Y ρY + ZρZ), required to evaluate |Cc,6i. 4 4 TableII lists all the required to evaluate 1 1 χPD(ρ) = (1 − )IρI + ZρZ, (13) the witnesses for |Cb,6i and |Cc,6i, respectively. Substi- 2 2 tuting the experimental results into Eqs. (11) and (12) 1 1 1 1 1 χAD(ρ) = ( I + Z)ρ( I + Z) + (X +iY )ρ(X −iY ). yields WCb,6 =5.126 and WCc,6 =4.1224. This result 2 2 2 2 4 implies that the existence of genuine six-partite entan- glement cannot be detected in the experimental pre- An inspection of the computed fidelity values F (χexpt, p√ √ pared state on the real quantum device. In other words, χnoise) = tr χnoiseχexpt χnoise (TableIII) shows that it is necessary to improve the quality of multi-partite the noise in the networking teleportation process is sim- entanglement on the real quantum device. (Note that ilar to that produced in a depolarizing channel. This the experimental values shown in TableII were accessed then explains why the experimental process fidelities are through IBM Q Experience [18] on 20 December 2018.) all close to 0.25.

|Cb,6i |Cc,6i N χD χAD χPD Value Observable Value 4 0.9999 0.7080 0.7119 XZZIII 0.0050 ± 0.0002 XZIIII 0.0811 ± 0.0010 6 1.0000 0.7085 0.7081 ZXZIII 0.0020 ± 0.0002 ZXZIII −0.037 8 0.9999 0.7083 0.7053 ZIXZZI 0.0018 ± 0.0001 IZXZII 0.0139 ± 0.0004 10 1.0000 0.7062 0.7069 IZZXIZ −0.087 IIZXZI 0.0193 ± 0.0005 12 0.9999 0.7077 0.7098 IIZIXZ −0.03 IIIZXZ 0.3049 ± 0.0016 TABLE III. F (χexpt, χnoise) for networking teleportation pro- IIIZZX −0.017 IIIIZX 0.4951 ± 0.0017 tocol utilizing an N-qubit box-cluster state |Cb,N i and three common noise channels, respectively. TABLE II. Experimental values of all the observables on states |Cb,6i and |Cc,6i, respectively, for entanglement witness W measurement. Each experimental value corresponds to the mean value obtained over 8192 measurements of 10 times and the error bars are obtained by Poissonian counting statistics. ACKNOWLEDGMENTS

The authors acknowledge the following: the IBM Q team for the access to their 14-qubit quantum computer C. Examination of experimental controlled gate. through a cloud-computing interface. We also gratefully acknowledge the IBM Q team members, Rudy Raymond, As shown in Eq.2, the CZ gate is an essential entan- Takashi Imamichi, and Chun-Fu Chen, for their valu- gling quantum gate for constructing a cluster state. To able discussions and correspondence on implementation clarify the effect of the CZ gate on the present experi- of the networking experiments through the cloud. Fi- mental results for the multipartite cluster states, the CZ nally, we acknowledge the fruitful discussions with Wei- 10

Ting Lee, Shih-Hsuan Chen, Chia-Kuo Chen, and Chien- Ministry of Science and Technology, Taiwan, under Grant Ying Huang. This work was partially supported by the Numbers MOST 107-2628-M-006-001-MY4 and MOST 107-2627-E-006-001.

[1] Bennett, C. H. et al. Teleporting an unknown quantum puter. Sci. Rep. 9, 13465 (2019). state via dual classical and EinsteinPodolskyRosen chan- [23] Morris, J., Pollock, F. A. & Modi, K. Non-Markovian nels. Phys. Rev. Lett. 70, 18951899 (1993). memory in IBMQX4. Preprint at https://arxiv.org/ [2] Kimble, H. J. The quantum internet. Nature 453, 1023 abs/1902.07980 (2019). (2008). [24] Ku, H.-Y. et al. Experimental test of non-macrorealistic [3] Ritter, S. et al. An elementary quantum network of single cat-states in the cloud. Preprint at https://arxiv.org/ atoms in optical cavities. Nature 484, 195 (2012). abs/1905.13454 (2019). [4] Hucul, D. et al. Modular entanglement of atomic qubits [25] Devitt, S. J. Performing quantum computing experi- using photons and phonons. Nature Phys. 11, 3742 ments in the cloud. Phys. Rev. A. 94, 032329 (2016). (2015). [26] Fedortchenko, S. A quantum teleportation experiment [5] Wehner, S., Elkouss, D. & Hanson, R. Quantum inter- for undergraduate students. Preprint at https://arxiv. net: A vision for the road ahead. Science 362, eaam9288 org/abs/1607.02398 (2016). (2018). [27] Sisodia, M., Shukla, A., Thapliyal, K. & Pathak, A. De- [6] Pirker, A., Wallnfer, J. & Dr, W. Modular architectures sign and experimental realization of an optimal scheme for quantum networks. New J. Phys. 20, 053054 (2018). for teleportation of an n-qubit quantum state. Quant. [7] Chou, K. S. et al. Deterministic teleportation of a quan- Inf. Process. 16, 292 (2017). tum gate between two logical qubits. Nature 561, 368 [28] Behera, B. K., Banerjee, A. & Panigrahi, P. K. Experi- (2018). mental realization of quantum cheque using a five-qubit [8] Jing, B. et al. Entanglement of three quantum memories quantum computer. Quant. Inf. Process. 16, 312 (2017). via interference of three single photons. Nat. Photon. 13, [29] Behera, B. K., Reza, T., Gupta, A. & Panigrahi, P. K. 210 (2019). Designing quantum router in IBM quantum computer. [9] Yamasaki, H. & Murao, M. Distributed encoding and Quant. Inf. Process. 18, 328 (2019). decoding of quantum information over networks. Adv. [30] Briegel, H. J. & Raussendorf, R. Persistent entanglement Quant. Technol. 2, 1800066 (2019). in arrays of interacting particles. Phys. Rev. Lett. 86, 910 [10] Monroe, C. & Kim, J. Scaling the quantum pro- (2001). cessor. Science 339, 1164 (2013). [31] Raussendorf, R. & Briegel, H. J. A one-way quantum [11] Devoret, M. H. & Schoelkopf, R. J. Superconducting cir- computer. Phys. Rev. Lett. 86, 5188 (2004). cuits for quantum information: an outlook. Science 339, [32] Hsieh, J.-H., Chen, S.-H. & Li, C.-M. Quantifying 1169 (2013). Quantum-Mechanical Processes. Sci. Rep. 7, 13588 [12] Childress, L., Walsworth, R. & Lukin, M. Atom-like crys- (2017). tal defects. Phys. Today 67, 38 (2014). [33] Gao, W. B. et al. Quantum teleportation from a propa- [13] Monroe, C. et al. Large-scale modular quantum- gating photon to a solid-state qubit. Nat. Commun. computer architecture with atomic memory and photonic 4, 2744 (2013). interconnects. Phys. Rev. A 89, 022317 (2014). [34] Bussires, F. et al. Quantum teleportation from a telecom- [14] Narla, A. et al. Robust concurrent remote entanglement wavelength photon to a solid-state . between two superconducting qubits. Phys. Rev. X 6, Nat. Photon. 8, 775 (2014). 031036 (2016). [35] Pfaff, W. et al. Unconditional quantum teleportation be- [15] Brecht, T. et al. Multilayer microwave integrated quan- tween distant solid-state quantum bits. Science 345, 532 tum circuits for scalable quantum computing. npj Quant. (2014). Info. 2, 16002 (2016). [36] Riebe, M. et al. Deterministic quantum teleportation [16] Leung, N. et al. Deterministic bidirectional communica- with atoms. Nature 429, 734 (2004). tion and remote entanglement generation between super- [37] N¨olleke, C. et al. Efficient teleportation between remote conducting qubits. npj Quant. Info. 5, 18 (2019). single-atom quantum memories. Phys. Rev. Lett. 110, [17] Bennett, C. H. et al. Remote state preparation. Phys. 140403 (2013). Rev. Lett. 87, 077902 (2001). [38] Ursin, R. et al. Communications: Quantum teleportation [18] IBM Q experience https://quantum-computing.ibm. across the Danube. Nature 430, 849 (2004). com [39] Jin, X.-M. et al. Experimental free-space quantum tele- [19] Qiskit https://qiskit.org/ portation. Nat. Photon. 4, 376 (2010). [20] Alsina, D. & Latorre, J. I. Experimental test of Mer- [40] Yin, J. et al. Quantum teleportation and entanglement min inequalities on a five-qubit quantum computer. Phys. distribution over 100-kilometre free-space channels. Na- Rev. A 94, 012314 (2016). ture 488, 185 (2012). [21] Wang, Y., Li, Y., Yin, Z.-q. & Zeng, B. 16-qubit IBM [41] Metcalf, B. J. et al. Quantum teleportation on a photonic universal quantum computer can be fully entangled. npj chip. Nat. Photon. 8, 770 (2014). Quant. Info. 4, 46 (2018). [42] Wang, X.-L. et al. Quantum teleportation of multiple [22] Mooney, G. J., Hill, C. D. & Hollenberg, L. C. Entan- degrees of freedom of a single photon. Nature 518, 516 glement in a 20-Qubit Superconducting Quantum Com- (2015). 11

[43] Chen, Y.-A. et al. Memory-built-in quantum teleporta- Phys. Rev. Lett. 96, 190501 (2006). tion with photonic and atomic qubits. Nat. Phys. 4, 103 [65] Zhou, L. & Sheng, Y. B. Complete logic Bell-state anal- (2008). ysis assisted with photonic Faraday rotation. Phys. Rev. [44] Krauter, H. et al. Deterministic quantum teleportation A 92, 042314 (2015). between distant atomic objects. Nat. Phys. 9, 400 (2013). [66] Sheng, Y. B. & Zhou, L. Two-step complete polarization [45] Ren, J.-G. et al. Ground-to-satellite quantum teleporta- logic Bell-state analysis. Sci. Rep. 5, 13453 (2015). tion. Nature 549, 70 (2017). [67] Zhou, L. & Sheng, Y. B. Feasible logic Bell-state analysis [46] Yin, J. et al. Satellite-based entanglement distribution with linear optics. Sci. Rep. 6, 20901 (2016). over 1200 kilometers. Science 356, 1140 (2017). [68] Liu, Y. L., Wang, M. W., Bai, C. Y. & Wang, T.J., [47] Briegel, H. J., Browne, D. E., Dr, W., Raussendorf, R. Asymmetrical analysis for photon-atoms hy- & Van den Nest, M. Measurement-based quantum com- brid system. Sci. China-Phys. Mech. Astron. 62, 120311 putation. Nature Physics 5, 19 (2009). (2019). [48] Danos, V. & Kashefi, E. Determinism in the one-way [69] Zheng, Y.Y., Liang, L. X. & Zhang, M. Error-heralded model. Phys. Rev. A 74, 052310 (2006). generation and self-assisted complete analysis of two- [49] Browne, D. E., Kashefi, E., Mhalla, M. & Perdrix, S. photon hyperentangled Bell states through single-sided Generalized flow and determinism in measurement-based quantum-dot-cavity systems. Sci. China-Phys. Mech. As- quantum computation. New J. Phys. 9, 250 (2007). tron. 62, 970312 (2019). [50] Gottesman, D. Stabilizer Codes and Quantum Error Cor- [70] Wang, G. Y., Ren, B. C., Deng, F. G. & Long, G. L. rection. PhD thesis, Californian Institute of Technology Complete analysis of hyperentangled Bell states assisted (1997). with auxiliary hyperentanglement. Opt. Express 27, 8994 [51] Schlingemann, D. & Werner, R. F. Quantum error- (2019). correcting codes associated with graphs. Phys. Rev. A [71] Li, T., Miranowicz, A., Xia, K.Y. & Nori, F. 65, 012308 (2001). Resource-efficient analyzer of Bell and Greenberger- [52] Schlingemann, D. Stabilizer codes can be realized as Horne-Zeilinger states of multiphoton systems. Phys. graph codes. Quant. Inf. Comp. 2, 307323 (2002). Rev. A 100, 052303 (2019). [53] Aliferis, P. & Leung, D. W. Simple proof of fault toler- [72] Mattle, K., Weinfurter, H., Kwiat, P. G. & Zeilinger, A. ance in the graph-state model. Phys. Rev. A 73, 032308 Dense coding in experimental quantum communication. (2006). Phys. Rev. Lett. 76, 4656 (1996). [54] Broadbent, A., Fitzsimons, J. & Kashefi, E. Universal [73] Nielsen, M. A. & Chuang, I. L. Quantum Computa- blind quantum computation. In Proc. 50th Annual Symp. tion and Quantum Information (Cambridge Univ. Press, Foundations of Computer Science 517526 (IEEE, 2009). 2000). [55] Barz, S. et al. Demonstration of blind quantum comput- [74] Gilchrist, A., Langford, N. K. & Nielsen, M. A. Distance ing. Science 335, 303308 (2012). measures to compare real and ideal quantum processes. [56] Morimae, T. & Fujii, K. Blind quantum computation Phys. Rev. A 71, 062310 (2005). protocol in which Alice only makes measurements. Phys. [75] Massar, S. & Popescu, S. Optimal extraction of informa- Rev. A 87, 050301(R) (2013). tion from finite quantum ensembles. Phys. Rev. Lett. 74, [57] Greganti, C., Roehsner, M.-C., Barz, S., Morimae, T. 1259 (1995). & Walther, P. Demonstration of measurement-only blind [76] Chen, S.-H. et al. Discriminating Quantum Correlations quantum computing. New J. Phys. 18, 013020 (2016). with Networking Quantum Teleportation. Phys. Rev. Re- [58] Bell, B. et al. Experimental demonstration of graph-state search 2, 013043 (2020). quantum secret sharing. Nat. Commun. 5, 5480 (2014). [77] Doi, J., Takahashi, H., Raymond, R., Imamichi, T. & [59] Markham, D. & Sanders, B. C. Graph states for quantum Horii, H. Quantum computing simulator on a heteroge- secret sharing. Phys. Rev. A 78, 042309 (2008). nous HPC system. 16th ACM Proc. Int. Conf. on Com- [60] Wang, X.-L. et al. Experimental ten-photon entangle- puting Frontiers (New York) pp. 8593 (2019). ment. Phys. Rev. Lett. 117, 210502 (2016). [78] James, D. F. V., Kwiat, P. G., Munro, W. J. & White, [61] Barreiro, J. T. et al. An open-system quantum simulator A. G. Measurement of qubits. Phys. Rev. A 64, 052312 with trapped ions. Nature 470, 486491 (2011). (2001). [62] Monz, T. et al. 14-qubit entanglement: creation and co- [79] Tth, G. & Ghne, O. Detecting genuine multipartite en- herence. Phys. Rev. Lett. 106, 130506 (2011). tanglement with two local measurements. Phys. Rev. [63] Cramer, J. et al. Repeated on Lett. 94, 060501 (2005). a continuously encoded qubit by real-time feedback. Nat. [80] OBrien, J. L. et al. Quantum process tomography of a Commun. 7, 11526 (2016). controlled-NOT gate. Phys. Rev. Lett. 93, 080502 (2004). [64] Schuck, C., Huber, G., Kurtsiefer, C. & Weinfurter, H. Complete deterministic linear optics Bell-state analysis.