{"id":18,"date":"2023-05-30T13:44:47","date_gmt":"2023-05-30T13:44:47","guid":{"rendered":"http:\/\/localhost\/wps\/?page_id=18"},"modified":"2024-01-27T17:55:42","modified_gmt":"2024-01-27T09:55:42","slug":"research","status":"publish","type":"page","link":"http:\/\/cmli.es.ncku.edu.tw\/?page_id=18","title":{"rendered":"Research"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-page\" data-elementor-id=\"18\" class=\"elementor elementor-18\">\n\t\t\t\t\t\t\t<div class=\"elementor-element elementor-element-de02388 e-con-boxed e-flex e-con\" data-id=\"de02388\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-5b5f082 elementor-widget elementor-widget-text-editor\" data-id=\"5b5f082\" data-element_type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.13.3 - 28-05-2023 *\/\n.elementor-widget-text-editor.elementor-drop-cap-view-stacked .elementor-drop-cap{background-color:#69727d;color:#fff}.elementor-widget-text-editor.elementor-drop-cap-view-framed .elementor-drop-cap{color:#69727d;border:3px solid;background-color:transparent}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap{margin-top:8px}.elementor-widget-text-editor:not(.elementor-drop-cap-view-default) .elementor-drop-cap-letter{width:1em;height:1em}.elementor-widget-text-editor .elementor-drop-cap{float:left;text-align:center;line-height:1;font-size:50px}.elementor-widget-text-editor .elementor-drop-cap-letter{display:inline-block}<\/style>\t\t\t\t<p>\u91cf\u5b50\u7cfe\u7e8f\u5c0d\u65bc\u63a2\u7d22\u57fa\u790e\u91cf\u5b50\u7269\u7406\u548c\u5be6\u73fe\u91cf\u5b50\u6280\u8853\u81f3\u70ba\u91cd\u8981\uff0c\u6211\u5011\u7684\u7814\u7a76\u76ee\u7684\u662f\uff1a\u5340\u5225\u201c\u4ee5\u91cf\u5b50\u7cfe\u7e8f\u70ba\u5a92\u4ecb\u7684\u771f\u6b63\u91cf\u5b50\u8cc7\u8a0a\u8655\u7406\u904e\u7a0b\u201d\u8207\u201c\u57fa\u65bc\u53e4\u5178\u7269\u7406\u5b78\u7684\u4efb\u4f55\u6a21\u4eff\u201d\uff0c\u85c9\u4ee5\u767c\u63ee\u91cf\u5b50\u6280\u8853\u4e2d\u771f\u6b63\u91cf\u5b50\u512a\u52e2\u8207\u5176\u50f9\u503c\uff0c\u78ba\u4fdd\u91cf\u5b50\u8cc7\u8a0a\u4e4b\u5b89\u5168\u3002\u57fa\u65bc\u6b64\u76ee\u6a19\uff0c\u6211\u5011\u540c\u6642\u900f\u904e\u5be6\u9a57\u548c\u7406\u8ad6\u65b9\u6cd5\u7814\u7a76\u4ee5\u4e0b\u4e09\u500b\u4e3b\u984c\uff1a\u201c\u5be6\u9a57\u7cfe\u7e8f\u5149\u5b50\u8207\u591a\u5149\u5b50\u7cfe\u7e8f\u7684\u7522\u751f\u8207\u8b58\u5225\u201d\u3001\u201c\u5be6\u9a57\u5149\u5b50\u91cf\u5b50\u7cfe\u7e8f\u65bc\u91cf\u5b50\u8a08\u7b97\u8207\u901a\u8a0a\u4e2d\u7684\u61c9\u7528\u201d\uff0c\u4ee5\u53ca\u201c\u91cf\u5b50\u8cc7\u8a0a\u8655\u7406\u904e\u7a0b\u4e4b\u8b58\u5225\u7406\u8ad6\u201d\u3002\u4e3b\u8981\u7814\u7a76\u6210\u679c\u6982\u8ff0\u5982\u4e0b\uff1a<\/p><p>Quantum entanglement is crucial to exploring essential quantum physics and realizing quantum technology. The purpose of our research is to distinguish between &#8220;real quantum information processing using quantum entanglement as a medium&#8221; and &#8220;any imitation based on classical physics.&#8221; This distinction will help us unleash the actual quantum advantages and value of quantum technology and ensure the security of quantum information. For this purpose, we study the following three projects experimentally and theoretically: &#8220;Generation and identification of experimental entangled photons and multi-photon entanglement,&#8221; &#8220;Application of experimental quantum entanglement in quantum computation and quantum communication,&#8221; and &#8220;Theory of identifying quantum information processing processes.&#8221; The selected research results are summarized below:<\/p>\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-ce66fdb e-con-boxed e-flex e-con\" data-id=\"ce66fdb\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-25b5af5 elementor-widget elementor-widget-heading\" data-id=\"25b5af5\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.13.3 - 28-05-2023 *\/\n.elementor-heading-title{padding:0;margin:0;line-height:1}.elementor-widget-heading .elementor-heading-title[class*=elementor-size-]>a{color:inherit;font-size:inherit;line-height:inherit}.elementor-widget-heading .elementor-heading-title.elementor-size-small{font-size:15px}.elementor-widget-heading .elementor-heading-title.elementor-size-medium{font-size:19px}.elementor-widget-heading .elementor-heading-title.elementor-size-large{font-size:29px}.elementor-widget-heading .elementor-heading-title.elementor-size-xl{font-size:39px}.elementor-widget-heading .elementor-heading-title.elementor-size-xxl{font-size:59px}<\/style><h2 class=\"elementor-heading-title elementor-size-medium\">\u5be6\u9a57\u7cfe\u7e8f\u5149\u5b50\u8207\u591a\u5149\u5b50\u7cfe\u7e8f\u7684\u7522\u751f\u8207\u8b58\u5225 Generation and identification of experimental entangled photons and multi-photon entanglement<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cd8afb9 elementor-widget elementor-widget-accordion\" data-id=\"cd8afb9\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.13.3 - 28-05-2023 *\/\n.elementor-accordion{text-align:left}.elementor-accordion .elementor-accordion-item{border:1px solid #d5d8dc}.elementor-accordion .elementor-accordion-item+.elementor-accordion-item{border-top:none}.elementor-accordion .elementor-tab-title{margin:0;padding:15px 20px;font-weight:700;line-height:1;cursor:pointer;outline:none}.elementor-accordion .elementor-tab-title .elementor-accordion-icon{display:inline-block;width:1.5em}.elementor-accordion .elementor-tab-title .elementor-accordion-icon svg{width:1em;height:1em}.elementor-accordion .elementor-tab-title .elementor-accordion-icon.elementor-accordion-icon-right{float:right;text-align:right}.elementor-accordion .elementor-tab-title .elementor-accordion-icon.elementor-accordion-icon-left{float:left;text-align:left}.elementor-accordion .elementor-tab-title .elementor-accordion-icon .elementor-accordion-icon-closed{display:block}.elementor-accordion .elementor-tab-title .elementor-accordion-icon .elementor-accordion-icon-opened,.elementor-accordion .elementor-tab-title.elementor-active .elementor-accordion-icon-closed{display:none}.elementor-accordion .elementor-tab-title.elementor-active .elementor-accordion-icon-opened{display:block}.elementor-accordion .elementor-tab-content{display:none;padding:15px 20px;border-top:1px solid #d5d8dc}@media (max-width:767px){.elementor-accordion .elementor-tab-title{padding:12px 15px}.elementor-accordion .elementor-tab-title .elementor-accordion-icon{width:1.2em}.elementor-accordion .elementor-tab-content{padding:7px 15px}}.e-con-inner>.elementor-widget-accordion,.e-con>.elementor-widget-accordion{width:var(--container-widget-width);--flex-grow:var(--container-widget-flex-grow)}<\/style>\t\t<div class=\"elementor-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2151\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-2151\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">\u591a\u5149\u5b50\u7cfe\u7e8f\u7684\u5149\u5b50\u878d\u5408\u904e\u7a0b\u4e4b\u91cf\u5316 Quantification of Photon Fusion for Multiphoton Entanglement<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2151\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2151\"><p class=\"MsoNormal\" style=\"text-align: justify; text-justify: inter-ideograph;\"><span style=\"font-family: \u65b0\u7d30\u660e\u9ad4, serif;\"><img decoding=\"async\" class=\"aligncenter wp-image-240\" src=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u591a\u5149\u5b50\u7cfe\u7e8f\u7684\u5149\u5b50\u878d\u5408\u904e\u7a0b\u4e4b\u91cf\u5316-1024x545.jpg\" alt=\"\" width=\"768\" height=\"409\" \/ loading=\"lazy\" srcset=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u591a\u5149\u5b50\u7cfe\u7e8f\u7684\u5149\u5b50\u878d\u5408\u904e\u7a0b\u4e4b\u91cf\u5316-1024x545.jpg 1024w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u591a\u5149\u5b50\u7cfe\u7e8f\u7684\u5149\u5b50\u878d\u5408\u904e\u7a0b\u4e4b\u91cf\u5316-scaled-600x319.jpg 600w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u591a\u5149\u5b50\u7cfe\u7e8f\u7684\u5149\u5b50\u878d\u5408\u904e\u7a0b\u4e4b\u91cf\u5316-300x160.jpg 300w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u591a\u5149\u5b50\u7cfe\u7e8f\u7684\u5149\u5b50\u878d\u5408\u904e\u7a0b\u4e4b\u91cf\u5316-768x409.jpg 768w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u591a\u5149\u5b50\u7cfe\u7e8f\u7684\u5149\u5b50\u878d\u5408\u904e\u7a0b\u4e4b\u91cf\u5316-1536x817.jpg 1536w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u591a\u5149\u5b50\u7cfe\u7e8f\u7684\u5149\u5b50\u878d\u5408\u904e\u7a0b\u4e4b\u91cf\u5316-2048x1090.jpg 2048w\" sizes=\"auto, (max-width: 768px) 100vw, 768px\" \/>\u201c\u5149\u5b50\u878d\u5408\u201d\u662f\u4e00\u7a2e\u5c07\u806f\u5408\u5149\u5b50\u63a2\u6e2c\u4e8b\u4ef6\u7684\u4e0d\u540c\u3001\u4f46\u7121\u6cd5\u5340\u5206\u7684\u96d9\u5149\u5b50\u632f\u5e45\u758a\u52a0\u7684\u975e\u53e4\u5178\u904e\u7a0b\u3002\u9019\u7a2e\u96d9\u5149\u5b50\u5e72\u6d89\u5df2\u88ab\u5ee3\u6cdb\u7528\u65bc\u7522\u751f\u591a\u5149\u5b50\u7cfe\u7e8f\uff0c\u5f9e\u9577\u8ddd\u96e2\u5230\u6676\u7247\u5c3a\u5ea6\u3001\u5f9e\u6e2c\u8a66\u91cf\u5b50\u7269\u7406\u57fa\u790e\u5230\u8655\u7406\u5149\u5b50\u91cf\u5b50\u8cc7\u8a0a\u7b49\uff0c\u90fd\u53ef\u4ee5\u898b\u5230\u5b83\u4e0d\u53ef\u6216\u7f3a\u4e4b\u89d2\u8272\u3002\u96d6\u7136\u91cd\u8981\uff0c\u4f46\u6c92\u6709\u5be6\u9a57\u8b49\u64da\u986f\u793a\u6574\u500b\u5149\u5b50\u878d\u5408\u7684\u80fd\u529b\u53ef\u4ee5\u50cf\u91cf\u5b50\u5be6\u9ad4\u4e00\u6a23\u5b8c\u5168\u88ab\u91cf\u5316\u3002\u5728\u9019\u88e1\uff0c\u6211\u5011\u5c55\u793a\u4e86\u5be6\u9a57\u5149\u5b50\u878d\u5408\u7684\u9996\u6b21\u80fd\u529b\u91cf\u5316\uff08\u5716\u4e2d<\/span><b><u><span lang=\"EN-US\" style=\"font-family: Roboto;\">i<\/span><\/u><\/b><span style=\"font-family: \u65b0\u7d30\u660e\u9ad4, serif;\">\u8207<\/span><b><u><span lang=\"EN-US\" style=\"font-family: Roboto;\">ii<\/span><\/u><\/b><span style=\"font-family: \u65b0\u7d30\u660e\u9ad4, serif;\">\u70ba\u5169\u500b\u5149\u5b50\u878d\u5408\u55ae\u5143\uff09\uff1b\u6211\u5011\u7684\u5b9a\u91cf\u63cf\u8ff0\u5fe0\u5be6\u5730\u6e2c\u91cf\u4e86\u5be6\u9a57\u4e2d\u5149\u5b50\u878d\u5408\u7522\u751f\u548c\u4fdd\u5b58\u7cfe\u7e8f\u5149\u5b50\u5c0d\u7684\u80fd\u529b\u3002\u6b64\u5916\uff0c\u900f\u904e\u5be6\u9a57\u4e0a\u7522\u751f\u56db\u5149\u5b50\u548c\u516d\u5149\u5b50\u7cfe\u7e8f\u614b\uff0c\u6211\u5011\u8868\u660e\u91cf\u5b50\u904e\u7a0b\u80fd\u529b\u91cf\u5316\uff0c\u63d0\u4f9b\u4e86\u5c0d\u7528\u4ee5\u7522\u751f\u771f\u6b63\u7684\u591a\u5149\u5b50\u7cfe\u7e8f\u614b\u4e4b\u591a\u5149\u5b50\u5e72\u6d89\u7684\u7cbe\u78ba\u8a55\u4f30\u3002\u9019\u4e9b\u7d50\u679c\u8b49\u660e\u4e86\u4e00\u7a2e\u5be6\u7528\u7684\u8a3a\u65b7\u65b9\u6cd5\uff0c\u53ef\u4ee5\u5c0d\u901a\u7528\u91cf\u5b50\u5149\u5b50\u7db2\u8def\u548c\u8a2d\u5099\u4e2d\u57fa\u672c\u64cd\u4f5c\u7684\u5149\u5b50\u878d\u5408\u9032\u884c\u57fa\u6e96\u6e2c\u8a66\u3002<\/span><\/p><p class=\"MsoNormal\" style=\"text-align: justify; text-justify: inter-ideograph;\"><span lang=\"EN-US\" style=\"font-family: Roboto;\">Photon fusion is a nonclassical process of superposing two-photon amplitudes of different yet indistinguishable alternatives of a joint photodetection event. This two-photon interference has been extensively utilized in creating multiphoton entanglement, from long-distance to chip-scale implementations, from testing the foundation of quantum physics to processing photonic quantum information. While significant, no experimental evidence exists that the capability of entire photon fusion can be utterly quantified like a quantum entity. Herein, we demonstrate the first capability quantification of experimental photon fusion. (As depicted, i and ii are two units of photon fusion.) Our quantitative characterization faithfully measures the abilities of photon fusion in the experiment to create and preserve entangled photon pairs. Moreover, with the created four- and six-photon entangled states, we show that capability quantification provides a precise assessment of interferometry for generating genuine multiphoton entanglement. These results reveal a practical diagnostic method to benchmark photon fusion underlying the primitive operations in general quantum photonics networks and devices.<\/span><\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2152\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"tab\" aria-controls=\"elementor-tab-content-2152\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">\u91cf\u5b50\u7db2\u8def\u4e2d\u591a\u5149\u5b50\u7cfe\u7e8f\u4e4b\u78ba\u8a8d Scalable Determination of Multipartite Entanglement in Quantum Networks<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2152\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2152\"><p><img decoding=\"async\" class=\"wp-image-242 aligncenter\" src=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u91cf\u5b50\u7db2\u8def\u4e2d\u591a\u5149\u5b50\u7cfe\u7e8f\u4e4b\u78ba\u8a8d_1-1024x563.jpg\" alt=\"\" width=\"512\" height=\"282\" \/ loading=\"lazy\" srcset=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u91cf\u5b50\u7db2\u8def\u4e2d\u591a\u5149\u5b50\u7cfe\u7e8f\u4e4b\u78ba\u8a8d_1-1024x563.jpg 1024w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u91cf\u5b50\u7db2\u8def\u4e2d\u591a\u5149\u5b50\u7cfe\u7e8f\u4e4b\u78ba\u8a8d_1-scaled-600x330.jpg 600w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u91cf\u5b50\u7db2\u8def\u4e2d\u591a\u5149\u5b50\u7cfe\u7e8f\u4e4b\u78ba\u8a8d_1-300x165.jpg 300w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u91cf\u5b50\u7db2\u8def\u4e2d\u591a\u5149\u5b50\u7cfe\u7e8f\u4e4b\u78ba\u8a8d_1-768x423.jpg 768w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u91cf\u5b50\u7db2\u8def\u4e2d\u591a\u5149\u5b50\u7cfe\u7e8f\u4e4b\u78ba\u8a8d_1-1536x845.jpg 1536w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u91cf\u5b50\u7db2\u8def\u4e2d\u591a\u5149\u5b50\u7cfe\u7e8f\u4e4b\u78ba\u8a8d_1-2048x1127.jpg 2048w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><img decoding=\"async\" class=\"wp-image-243 aligncenter\" src=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u5be6\u9a57\u904e\u7a0b\u4e2d\u91cf\u5b50\u95dc\u806f\u7684\u7522\u751f\u80fd\u529b-1024x843.jpg\" alt=\"\" width=\"512\" height=\"421\" \/ loading=\"lazy\" srcset=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u5be6\u9a57\u904e\u7a0b\u4e2d\u91cf\u5b50\u95dc\u806f\u7684\u7522\u751f\u80fd\u529b-1024x843.jpg 1024w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u5be6\u9a57\u904e\u7a0b\u4e2d\u91cf\u5b50\u95dc\u806f\u7684\u7522\u751f\u80fd\u529b-scaled-600x494.jpg 600w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u5be6\u9a57\u904e\u7a0b\u4e2d\u91cf\u5b50\u95dc\u806f\u7684\u7522\u751f\u80fd\u529b-300x247.jpg 300w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u5be6\u9a57\u904e\u7a0b\u4e2d\u91cf\u5b50\u95dc\u806f\u7684\u7522\u751f\u80fd\u529b-768x632.jpg 768w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u5be6\u9a57\u904e\u7a0b\u4e2d\u91cf\u5b50\u95dc\u806f\u7684\u7522\u751f\u80fd\u529b-1536x1264.jpg 1536w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u5be6\u9a57\u904e\u7a0b\u4e2d\u91cf\u5b50\u95dc\u806f\u7684\u7522\u751f\u80fd\u529b-2048x1685.jpg 2048w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/>\u5229\u7528\u91cf\u5b50\u7cfe\u7e8f\u7bc0\u9ede\u6240\u5efa\u69cb\u4e4b\u91cf\u5b50\u7db2\u8def\uff08a\u5716\uff09\u6bd4\u53e4\u5178\u7db2\u8def\u4e4b\u76f8\u95dc\u6027\u66f4\u5f37\uff0c\u53ef\u7528\u65bc\u5d84\u65b0\u4e4b\u91cf\u5b50\u806f\u7db2\u4e4b\u76f8\u95dc\u61c9\u7528\u3002\u7136\u800c\uff0c\u5be6\u969b\u7684\u91cf\u5b50\u7db2\u8def\u5b58\u5728\u566a\u8072\uff0c\u6700\u7cdf\u7cd5\u7684\u60c5\u6cc1\u662f\uff0c\u5c0e\u81f4\u91cf\u5b50\u7bc0\u9ede\u53ef\u4ee5\u88ab\u9810\u5148\u6240\u5b58\u5728\u7684\u53e4\u5178\u6578\u64da\u63cf\u8ff0\uff08b-f\u5716\uff09\u3002\u5728\u9019\u7a2e\u4e0d\u53d7\u4fe1\u4efb\u7684\u7db2\u8def\u4e2d\uff0c\u78ba\u5b9a\u91cf\u5b50\u7db2\u8def\u7684\u4fdd\u771f\u5ea6\u548c\u771f\u6b63\u7684\u591a\u7bc0\u9ede\u7cfe\u7e8f\u6210\u70ba\u81f3\u95dc\u91cd\u8981\u7684\u554f\u984c\u3002\u5728\u9019\u88e1\uff0c\u6211\u5011\u8b49\u660e\uff0c\u5728\u4e0d\u53ef\u4fe1\u661f\u5f62\u7db2\u8def\u4e2d\u78ba\u5b9a\u91cf\u5b50\u7db2\u8def\u4fdd\u771f\u5ea6\u548c\u771f\u6b63\u7684 N \u7bc0\u9ede\u7cfe\u7e8f\u50c5\u9700\u8981 N+1 \u6e2c\u91cf\u3002\u6211\u5011\u7684\u7db2\u8def\u78ba\u5b9a\u65b9\u6cd5\u662f\u900f\u904e\u5075\u6e2c\u771f\u6b63\u7684 N \u7bc0\u9ede Einstein-Podolsky-Rosen \u91cf\u5b50\u53ef\u64cd\u7e31\u6027\u4f86\u5be6\u73fe\u3002\u5728\u5be6\u9a57\u4e0a\uff0c\u6211\u5011\u4f7f\u7528\u81ea\u767c\u53c3\u6578\u4e0b\u8f49\u63db\u7cfe\u7e8f\u5149\u5b50\u6e90\uff08\u4e0b\u5716\uff09\uff0c\u5c55\u793a\u4e86\u771f\u6b63\u7684 3 \u5149\u5b50\u548c 4 \u5149\u5b50\u91cf\u5b50\u7db2\u7d61\u7684\u78ba\u5b9a\uff0c\u4ee5\u53ca\u76ee\u524d\u88ab\u5ee3\u6cdb\u4f7f\u7528\u7684\u7cfe\u7e8f\u898b\u8b49\u6240\u51fa\u73fe\u7684\u7cfe\u7e8f\u8aa4\u5224\uff0c\u5373 1\/2 \u7684\u4fdd\u771f\u5ea6\u6a19\u6e96\u3002\u6211\u5011\u7684\u7d50\u679c\u63d0\u4f9b\u4e86\u4e00\u7a2e\u53ef\u64f4\u5c55\u7684\u65b9\u6cd5\u4f86\u78ba\u5b9a\u73fe\u5be6\u91cf\u5b50\u7db2\u8def\u4e2d\u7684\u591a\u7bc0\u9ede\u7cfe\u7e8f\u3002<\/p><p>Quantum networks of entangled end nodes (Fig. a) serve stronger than the classical correlation for unparalleled quantum internet applications. However, practical quantum networking exists noise, at worst, causing end nodes to be described in pre-existing classical data (Figs. b-f). In such untrusted networks, determining quantum network fidelity and genuine multi-node entanglement becomes crucial problems. Here, we show that deciding quantum network fidelity and genuine N-node entanglement in an untrusted star network requires only N+1 measurement settings. Our network determination method is enabled by detecting genuine N-node Einstein-Podolsky-Rosen steerability. Experimentally, using spontaneous parametric down-conversion entanglement sources (the bottom figure), we demonstrate the determinations of genuine 3-photon and 4-photon quantum networks and the false positives of the widely used entanglement witness, the fidelity criterion of 1\/2. Our results provide a scalable method for determining multipartite entanglement in realistic quantum networks.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-cb6ce28 elementor-widget elementor-widget-spacer\" data-id=\"cb6ce28\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<style>\/*! elementor - v3.13.3 - 28-05-2023 *\/\n.elementor-column .elementor-spacer-inner{height:var(--spacer-size)}.e-con{--container-widget-width:100%}.e-con-inner>.elementor-widget-spacer,.e-con>.elementor-widget-spacer{width:var(--container-widget-width,var(--spacer-size));--align-self:var(--container-widget-align-self,initial);--flex-shrink:0}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container,.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer,.e-con>.elementor-widget-spacer>.elementor-widget-container,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer{height:100%}.e-con-inner>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner,.e-con>.elementor-widget-spacer>.elementor-widget-container>.elementor-spacer>.elementor-spacer-inner{height:var(--container-widget-height,var(--spacer-size))}<\/style>\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-10725b4 e-con-boxed e-flex e-con\" data-id=\"10725b4\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-c546b82 elementor-widget elementor-widget-heading\" data-id=\"c546b82\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\">\u5be6\u9a57\u5149\u5b50\u91cf\u5b50\u7cfe\u7e8f\u65bc\u91cf\u5b50\u8a08\u7b97\u8207\u901a\u8a0a\u4e2d\u7684\u61c9\u7528 Application of experimental quantum entanglement in quantum computation and quantum communication<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-d64e89a elementor-widget elementor-widget-accordion\" data-id=\"d64e89a\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2241\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-2241\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">\u898b\u8b49\u591a\u5149\u5b50\u7cfe\u7e8f\u7db2\u8def\u4e2d\u91cf\u5b50\u540c\u8abf\u7279\u6027\u4e4b\u50b3\u8f38\u904e\u7a0b Witness to Coherence Transmission Processes in Multiphoton Entangled Networks<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2241\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2241\"><p><img decoding=\"async\" class=\"aligncenter wp-image-241\" src=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u898b\u8b49\u591a\u5149\u5b50\u7cfe\u7e8f\u7db2\u8def\u4e2d\u91cf\u5b50\u540c\u8abf\u7279\u6027\u4e4b\u50b3\u8f38\u904e\u7a0b-1024x543.jpg\" alt=\"\" width=\"896\" height=\"476\" \/ loading=\"lazy\" srcset=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u898b\u8b49\u591a\u5149\u5b50\u7cfe\u7e8f\u7db2\u8def\u4e2d\u91cf\u5b50\u540c\u8abf\u7279\u6027\u4e4b\u50b3\u8f38\u904e\u7a0b-1024x543.jpg 1024w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u898b\u8b49\u591a\u5149\u5b50\u7cfe\u7e8f\u7db2\u8def\u4e2d\u91cf\u5b50\u540c\u8abf\u7279\u6027\u4e4b\u50b3\u8f38\u904e\u7a0b-scaled-600x319.jpg 600w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u898b\u8b49\u591a\u5149\u5b50\u7cfe\u7e8f\u7db2\u8def\u4e2d\u91cf\u5b50\u540c\u8abf\u7279\u6027\u4e4b\u50b3\u8f38\u904e\u7a0b-300x159.jpg 300w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u898b\u8b49\u591a\u5149\u5b50\u7cfe\u7e8f\u7db2\u8def\u4e2d\u91cf\u5b50\u540c\u8abf\u7279\u6027\u4e4b\u50b3\u8f38\u904e\u7a0b-768x408.jpg 768w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u898b\u8b49\u591a\u5149\u5b50\u7cfe\u7e8f\u7db2\u8def\u4e2d\u91cf\u5b50\u540c\u8abf\u7279\u6027\u4e4b\u50b3\u8f38\u904e\u7a0b-1536x815.jpg 1536w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u898b\u8b49\u591a\u5149\u5b50\u7cfe\u7e8f\u7db2\u8def\u4e2d\u91cf\u5b50\u540c\u8abf\u7279\u6027\u4e4b\u50b3\u8f38\u904e\u7a0b-2048x1087.jpg 2048w\" sizes=\"auto, (max-width: 896px) 100vw, 896px\" \/><\/p><p>\u91cf\u5b50\u540c\u8abf\u7279\u6027\u662f\u91cf\u5b50\u529b\u5b78\u9810\u6e2c\u7684\u975e\u53e4\u5178\u7279\u5fb5\u4e4b\u4e00\u3002\u4f5c\u70ba\u91cf\u5b50\u6280\u8853\u7684\u8cc7\u6e90\uff0c\u5f9e\u91cf\u5b50\u8a08\u7b97\u5230\u91cf\u5b50\u901a\u8a0a\uff0c\u5f9e\u6676\u7247\u7d1a\u5230\u9060\u8ddd\u96e2\u5be6\u73fe\uff0c\u91cf\u5b50\u540c\u8abf\u7684\u50b3\u8f38\u904e\u7a0b\u5728\u5404\u7a2e\u60c5\u6cc1\u4e0b\u90fd\u662f\u5fc5\u8981\u7684\u3002\u7136\u800c\uff0c\u5982\u4f55\u4f7f\u7528\u6700\u5c0f\u7684\u5be6\u9a57\u6210\u672c\u660e\u78ba\u9a57\u8b49\u5f9e\u540c\u8abf\u6e96\u5099\uff0c\u5230\u5f8c\u7e8c\u540c\u8abf\u50b3\u8f38\u7684\u6210\u529f\u50b3\u8f38\u904e\u7a0b\u4ecd\u6709\u5f85\u63a2\u7a76\u3002\u5728\u9019\u88e1\uff0c\u6211\u5011\u5f9e\u7406\u8ad6\u4e0a\u548c\u5be6\u9a57\u8b49\u660e\uff0c\u53ea\u9700\u4e00\u7a2e\u540c\u8abf\u7522\u751f\u64cd\u4f5c\uff0c\u548c\u4e00\u7a2e\u6e2c\u91cf\u8a2d\u5b9a\uff0c\u5373\u53ef\u898b\u8b49\u76f8\u5e72\u6027\u50b3\u8f38\u904e\u7a0b\uff08\u5716a\uff09\u3002\u6211\u5011\u4f7f\u7528\u591a\u5149\u5b50\u7cfe\u7e8f\u548c\u5e72\u6d89\u6e2c\u91cf\u6280\u8853\u8b49\u660e\u4e86\u56db\u5149\u5b50\u548c\u516d\u5149\u5b50\u7cfe\u7e8f\u7db2\u7d61\u4e2d\u76f8\u5e72\u50b3\u8f38\u904e\u7a0b\u7684\u6709\u6548\u898b\u8b49\uff08\u5716b\uff0cc\uff09\u3002\u4e0a\u8ff0\u7a7a\u9593\u5834\u666f\u4e2d\u7684\u898b\u8b49\uff0c\u53ef\u4ee5\u61c9\u7528\u65bc\u898b\u8b49\u91cf\u5b50\u52d5\u529b\u5b78\u5728\u6642\u9593\u4e0a\u7684\u76f8\u5e72\u6027\u5275\u5efa\u548c\u4fdd\u5b58\u3002\u6240\u5f15\u5165\u7684\u6982\u5ff5\u548c\u65b9\u6cd5\uff0c\u53ef\u7528\u65bc\u660e\u78ba\u6709\u6548\u9a57\u8b49\u76f8\u95dc\u91cf\u5b50\u5de5\u7a0b\u4e2d\u6240\u9700\u4e4b\u540c\u8abf\u91cf\u5b50\u64cd\u7e31\u904e\u7a0b\u3002<\/p><p>Quantum coherence is one of the nonclassical signatures predicted by quantum mechanics. As a resource for quantum technologies, coherence transmission process is necessary in various circumstances, from quantum computation to quantum communication, from chip-scale to large-distance implementations. However, how to unambiguously verify successful transmission processes from coherence preparation to subsequent coherence transfer using minimum experimental costs remains to be discovered. Here, we theoretically and experimentally show that a witness to coherence transmission processes can be performed with only one coherence creation operation and one measurement setting (Fig. a). We demonstrate such efficient witnesses to coherence transmission processes in four-photon and six-photon entangled networks using multiphoton entanglement and interferometry (Figs. b,c). The above witness in spatial scenarios can be applied to witness the coherence creation and preservation of quantum dynamics temporally. The introduced concept and method can be used to unambiguously verify the primitives of coherence manipulation processes in related quantum engineering efficiently.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2242\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"tab\" aria-controls=\"elementor-tab-content-2242\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">\u5229\u7528\u91cf\u5b50\u540c\u8abf\u7372\u76ca\u6548\u61c9\u7c21\u4fbf\u5730\u5075\u6e2c\u91cf\u5b50\u9060\u614b\u88fd\u5099 Efficient Detection of Preparing Quantum Remote States Using Coherence Quantum Benefits<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2242\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2242\"><p><img decoding=\"async\" class=\"aligncenter size-large wp-image-372\" src=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2024\/01\/\u5229\u7528\u91cf\u5b50\u540c\u8abf\u7372\u76ca\u6548\u61c9\u7c21\u4fbf\u5730\u5075\u6e2c\u91cf\u5b50\u9060\u614b\u88fd\u5099-1024x349.png\" alt=\"\" width=\"1024\" height=\"349\" \/ loading=\"lazy\" srcset=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2024\/01\/\u5229\u7528\u91cf\u5b50\u540c\u8abf\u7372\u76ca\u6548\u61c9\u7c21\u4fbf\u5730\u5075\u6e2c\u91cf\u5b50\u9060\u614b\u88fd\u5099-1024x349.png 1024w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2024\/01\/\u5229\u7528\u91cf\u5b50\u540c\u8abf\u7372\u76ca\u6548\u61c9\u7c21\u4fbf\u5730\u5075\u6e2c\u91cf\u5b50\u9060\u614b\u88fd\u5099-600x205.png 600w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2024\/01\/\u5229\u7528\u91cf\u5b50\u540c\u8abf\u7372\u76ca\u6548\u61c9\u7c21\u4fbf\u5730\u5075\u6e2c\u91cf\u5b50\u9060\u614b\u88fd\u5099-300x102.png 300w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2024\/01\/\u5229\u7528\u91cf\u5b50\u540c\u8abf\u7372\u76ca\u6548\u61c9\u7c21\u4fbf\u5730\u5075\u6e2c\u91cf\u5b50\u9060\u614b\u88fd\u5099-768x262.png 768w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2024\/01\/\u5229\u7528\u91cf\u5b50\u540c\u8abf\u7372\u76ca\u6548\u61c9\u7c21\u4fbf\u5730\u5075\u6e2c\u91cf\u5b50\u9060\u614b\u88fd\u5099.png 1499w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/>\u91cf\u5b50\u8cc7\u8a0a\u767c\u9001\u65b9\u53ef\u4ee5\u4f7f\u7528\u9810\u5148\u5171\u4eab\u7684\u7cfe\u7e8f\u5c0d\u3001\u50c5\u767c\u9001\u65b9\u7684\u55ae\u91cf\u5b50\u4f4d\u5143\u6e2c\u91cf\u4ee5\u53ca\u767c\u9001\u65b9\u901a\u77e5\u7684\u63a5\u6536\u65b9\u7684\u7c21\u55ae\u6821\u6b63\uff0c\u4f86\u70ba\u9060\u7aef\u63a5\u6536\u65b9\u6e96\u5099\u91cf\u5b50\u614b\u3002\u8207\u91cf\u5b50\u96b1\u5f62\u50b3\u614b\u76f8\u6bd4\uff0c\u5b83\u70ba\u91cf\u5b50\u8cc7\u8a0a\u63d0\u4f9b\u4e86\u8cc7\u6e90\u9ad8\u6548\u7684\u512a\u52e2\u3002\u5728\u9019\u88e1\uff0c\u6211\u5011\u63d0\u51fa\u4e86\u4e00\u7a2e\u6700\u6709\u6548\u7684\u65b9\u6cd5\u4f86\u6aa2\u6e2c\u9060\u7aef\u72c0\u614b\u6e96\u5099\uff08RSP\uff09\uff0c\u8a72\u65b9\u6cd5\u57fa\u65bc\u91cf\u5b50\u76f8\u5e72\u5171\u4eab\u5c0d\u7684\u975c\u614b\u8cc7\u6e90\u548c RSP \u53c3\u8207\u8005\u8f38\u5165\u7684\u52d5\u614b\u8cc7\u6e90\u6240\u63d0\u4f9b\u7684\u91cf\u5b50\u6548\u76ca\u3002\u5b83\u53ea\u9700\u8981\u63a5\u6536\u5668\u6700\u5c11\u7684\u4e00\u6b21\u984d\u5916\u540c\u8abf\u7522\u751f\u64cd\u4f5c\u4f86\u9a57\u8b49RSP\u3002\u5728\u5be6\u9a57\u4e0a\uff0c\u6211\u5011\u4f7f\u7528\u9ad8\u54c1\u8cea\u504f\u632f\u85a9\u5c3c\u4e9e\u514b\u5e72\u6d89\u5100\u7522\u751f\u7684\u4e0d\u540c\u5149\u5b50\u5c0d\u72c0\u614b\u4f86\u5be6\u73fe\u5f15\u5165\u7684RSP\u8a55\u4f30\uff0c\u78ba\u8a8d\u4e86\u975c\u614b\u548c\u52d5\u614b\u91cf\u5b50\u76f8\u5e72\u8cc7\u6e90\u6240\u767c\u63ee\u7684\u5fc5\u8981\u548c\u5145\u5206\u7684\u4f5c\u7528\uff08\u5982\u5716\u6240\u793a\uff09\uff0c\u4e26\u5c55\u793a\u4e86\u6709\u6548\u7684RSP\u9a57\u8b49\u3002\u6211\u5011\u7684\u7d50\u679c\u63d0\u4f9b\u4e86\u4e00\u7a2e\u5728\u91cf\u5b50\u7db2\u8def\u4e2d\u7684\u91cf\u5b50\u8cc7\u8a0a\u7b49\u5be6\u969b\u5834\u666f\u4e2d\u6709\u6548\u8a55RSP\u7684\u9014\u5f91\u3002<\/p><p>A sender can prepare a quantum state for a remote receiver using preshared entangled pairs, only the sender&#8217;s single-qubit measurement, and the receiver&#8217;s simple correction informed by the sender. It provides resource-efficient advantages over quantum teleportation for quantum information. Here, we propose the most efficient approach to detect the remote state preparation (RSP) based on the quantum benefits powered by quantum coherence&#8217;s static resources of the shared pairs and the dynamic resources both the RSP participants input. It requires only the receiver&#8217;s minimum of one additional coherence creation operation to verify RSP. Experimentally, we implement the introduced RSP assessment using different photon pair states generated from a high-quality polarization Sagnac interferometer, confirming the necessary and sufficient role played by the static and dynamic quantum coherence resources (as shown in the figure) and demonstrating efficient RSP verification. Our results provide a route to efficiently assess RSP in practical scenarios such as quantum information in quantum networks.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-2243\" class=\"elementor-tab-title\" data-tab=\"3\" role=\"tab\" aria-controls=\"elementor-tab-content-2243\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">\u70ba\u771f\u6b63\u7684\u91cf\u5b50\u7db2\u8def\u6e96\u5099\u9060\u7a0b\u72c0\u614b Preparing Remote States for Genuine Quantum Networks<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-2243\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"3\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-2243\"><p><img decoding=\"async\" class=\"aligncenter wp-image-182\" src=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/10\/Genuine-Quantum-Networks.jpg\" alt=\"\" width=\"512\" height=\"320\" \/ loading=\"lazy\" srcset=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/10\/Genuine-Quantum-Networks.jpg 1600w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/10\/Genuine-Quantum-Networks-600x375.jpg 600w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p><p>\u4ee5\u5149\u5b50\u4f5c\u70ba\u5a92\u4ecb\u7684\u91cf\u5b50\u7db2\u8def\u901a\u5e38\u7531\u91cf\u5b50\u901a\u9053\u3001\u4e2d\u7e7c\u5668\u548c\u7d42\u7aef\u7bc0\u9ede\u7d44\u6210\u3002\u9060\u7a0b\u72c0\u614b\u6e96\u5099 (RSP) \u4f7f\u4e00\u500b\u7aef\u7bc0\u9ede\u80fd\u5920\u9060\u7a0b\u6e96\u5099\u5176\u4ed6\u7aef\u7bc0\u9ede\u7684\u72c0\u614b\u3002 RSP \u9084\u5145\u7576\u7db2\u8def\u901a\u8a0a\u7684\u78ba\u5b9a\u6027\u55ae\u5149\u5b50\u6e90\u3002\u5728\u6b64\u7814\u7a76\u4e2d\uff0c\u6211\u5011\u5f9e\u7406\u8ad6\u4e0a\u548c\u5be6\u9a57\u4e0a\u7814\u7a76\u4e86\u9019\u7a2e\u7db2\u8def RSP \u5982\u4f55\u8d85\u8d8a\u4efb\u4f55\u6c92\u6709\u7cfe\u7e8f\u548c\u91cf\u5b50\u4f4d\u5143\u64cd\u4f5c\u7684\u53e4\u5178\u6a21\u64ec\u904e\u7a0b\u3002\u6211\u5011\u63d0\u51fa\u4e86\u4e00\u7a2e\u65b0\u578b\u7684\u91cf\u5b50\u8cc7\u6e90\uff0c\u7a31\u70ba RSP \u80fd\u529b\uff0c\u4ee5\u9a57\u8b49\u771f\u6b63\u7684\u91cf\u5b50\u7db2\u8def\u4e2d\u975e\u53e4\u5178\u72c0\u614b\u6e96\u5099\u548c\u50b3\u8f38\u6240\u9700\u7684\u6240\u6709\u975c\u614b\u548c\u52d5\u614b\u5143\u7d20\uff0c\u4f8b\u5982\u91cf\u5b50\u901a\u9053\u548c\u4e2d\u7e7c\u5668\uff0c\u56e0\u6b64\u8a72\u91cf\u5b50\u8cc7\u6e90\u8d85\u8d8a\u91cf\u5b50\u95dc\u806f\u4e4b\u975c\u614b\u8cc7\u6e90\u3002\u6211\u5011\u900f\u904e\u5be6\u9a57\u8b49\u660e\u4e86\u504f\u632f\u85a9\u5c3c\u4e9e\u514b\u5e72\u6d89\u5100\u7522\u751f\u7684\u5149\u5b50\u5c0d\u7684 RSP \u80fd\u529b\u6e2c\u91cf\uff0c\u5305\u62ec\u6839\u64da\u5149\u5b50\u5c0d\u54c1\u8cea\u5728\u53e4\u5178\u548c\u975e\u53e4\u5178 RSP \u4e4b\u9593\u7684\u8f49\u8b8a\u3002\u6211\u5011\u7684\u7d50\u679c\u6709\u52a9\u65bc\u900f\u904e\u78ba\u8a8d\u7db2\u8def RSP \u4ee5\u767c\u63ee\u4ee5\u5176\u70ba\u57fa\u672c\u904b\u4f5c\u55ae\u5143\u7684\u91cf\u5b50\u806f\u7db2\u4e4b\u91cf\u5b50\u512a\u52e2\u3002<\/p><p>Photon-mediated quantum networks generally consist of quantum channels, repeaters, and end nodes. Remote state preparation (RSP) enables one of the end nodes to prepare the states of the other end nodes remotely. RSP also serves as a deterministic single-photon source for networking communications. Herein, we theoretically and experimentally investigate how such networking RSP surpasses any classical emulation without entanglement and qubit unitaries. We introduce a new type of quantum resource, which we refer to as RSP capability, to validate all the static and dynamic elements required for nonclassical state preparation and transmission in a genuine quantum network, such as quantum channels and repeaters. This goes beyond the static resources of quantum correlations. We experimentally demonstrate the RSP capability measurement of the photon pairs created by a polarization Sagnac interferometer, including the transition between classical and nonclassical RSP depending on the photon-pair qualities. Our results help reveal the quantum advantages arising when networking RSP plays a role.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-45da924 elementor-widget elementor-widget-spacer\" data-id=\"45da924\" data-element_type=\"widget\" data-widget_type=\"spacer.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-spacer\">\n\t\t\t<div class=\"elementor-spacer-inner\"><\/div>\n\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t<div class=\"elementor-element elementor-element-5940e55 e-con-boxed e-flex e-con\" data-id=\"5940e55\" data-element_type=\"container\" data-settings=\"{&quot;content_width&quot;:&quot;boxed&quot;}\">\n\t\t\t\t\t<div class=\"e-con-inner\">\n\t\t\t\t<div class=\"elementor-element elementor-element-3689ddf elementor-widget elementor-widget-heading\" data-id=\"3689ddf\" data-element_type=\"widget\" data-widget_type=\"heading.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t<h2 class=\"elementor-heading-title elementor-size-medium\">\u91cf\u5b50\u8cc7\u8a0a\u8655\u7406\u904e\u7a0b\u4e4b\u8b58\u5225\u7406\u8ad6 Theory of identifying quantum information processing processes<\/h2>\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-72726c3 elementor-widget elementor-widget-accordion\" data-id=\"72726c3\" data-element_type=\"widget\" data-widget_type=\"accordion.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-accordion\" role=\"tablist\">\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1201\" class=\"elementor-tab-title\" data-tab=\"1\" role=\"tab\" aria-controls=\"elementor-tab-content-1201\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">\u9ad8\u6548\u7387\u8207\u8a2d\u5099\u7121\u95dc\u4e4b\u91cf\u5b50\u5bc6\u9470\u5206\u767c Efficient Device-Independent Quantum Key Distribution<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1201\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"1\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1201\"><p><img decoding=\"async\" class=\"aligncenter wp-image-254\" src=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u9ad8\u6548\u7387\u8207\u8a2d\u5099\u7121\u95dc\u4e4b\u91cf\u5b50\u5bc6\u9470\u5206\u767c-1024x738.jpg\" alt=\"\" width=\"512\" height=\"369\" \/ loading=\"lazy\" srcset=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u9ad8\u6548\u7387\u8207\u8a2d\u5099\u7121\u95dc\u4e4b\u91cf\u5b50\u5bc6\u9470\u5206\u767c-1024x738.jpg 1024w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u9ad8\u6548\u7387\u8207\u8a2d\u5099\u7121\u95dc\u4e4b\u91cf\u5b50\u5bc6\u9470\u5206\u767c-600x432.jpg 600w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u9ad8\u6548\u7387\u8207\u8a2d\u5099\u7121\u95dc\u4e4b\u91cf\u5b50\u5bc6\u9470\u5206\u767c-300x216.jpg 300w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u9ad8\u6548\u7387\u8207\u8a2d\u5099\u7121\u95dc\u4e4b\u91cf\u5b50\u5bc6\u9470\u5206\u767c-768x553.jpg 768w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u9ad8\u6548\u7387\u8207\u8a2d\u5099\u7121\u95dc\u4e4b\u91cf\u5b50\u5bc6\u9470\u5206\u767c-1536x1106.jpg 1536w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/11\/\u9ad8\u6548\u7387\u8207\u8a2d\u5099\u7121\u95dc\u4e4b\u91cf\u5b50\u5bc6\u9470\u5206\u767c.jpg 1906w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/>\u8207\u8a2d\u5099\u7121\u95dc\u7684\u91cf\u5b50\u5bc6\u9470\u5206\u767c\uff08DIQKD\uff09\u662f\u4e00\u7a2e\u5bc6\u9470\u5206\u767c\u65b9\u6848\uff0c\u5176\u5b89\u5168\u6027\u57fa\u65bc\u91cf\u5b50\u7269\u7406\u5b9a\u5f8b\uff0c\u4f46\u4e0d\u9700\u8981\u5c0d\u5354\u5b9a\u4e2d\u4f7f\u7528\u7684\u8a2d\u5099\u9032\u884c\u4efb\u4f55\u5047\u8a2d\u3002\u73fe\u6709\u7684\u57fa\u65bc\u7cfe\u7e8f\u7684DIQKD\u5354\u8b70\u7684\u5b89\u5168\u6027\u4f9d\u8cf4\u65bc\u8c9d\u723e\u6e2c\u8a66\u3002\u5728\u9019\u88e1\uff0c\u6211\u5011\u63d0\u51fa\u4e86\u4e00\u7a2e\u9ad8\u6548\u7684\u8a2d\u5099\u7121\u95dc\u91cf\u5b50\u5bc6\u9470\u5206\u767c\uff08EDIQKD\uff09\u5354\u8b70\uff0c\u5176\u4e2d\u4e00\u500b\u53c3\u8207\u8005\u6e96\u5099\u72c0\u614b\u4e26\u901a\u904e\u91cf\u5b50\u901a\u9053\u5c07\u5176\u50b3\u8f38\u7d66\u53e6\u4e00\u500b\u53c3\u8207\u8005\u9032\u884c\u6e2c\u91cf\u3002\u5728\u9019\u500b\u6e96\u5099\u548c\u6e2c\u91cf\u5354\u8b70\u4e2d\uff0c\u53c3\u8207\u8005\u4e4b\u9593\u7684\u50b3\u8f38\u904e\u7a0b\u6839\u64da\u5b89\u5168\u904e\u7a0b\u65b7\u5c64\u6383\u63cf\u9032\u884c\u78ba\u8a8d\uff0c\u6392\u9664\u4f7f\u7528\u53e4\u5178\u521d\u59cb\u72c0\u614b\u3001\u50b3\u8f38\u72c0\u614b\u548c\u6700\u7d42\u72c0\u614b\u7684\u4efb\u4f55\u6a21\u4eff\u3002\u6bd4\u8f03\u78ba\u4fdd\u5b89\u5168\u514d\u53d7\u96c6\u9ad4\u653b\u64ca\u7684\u6240\u9700\u5bc6\u9470\u7522\u751f\u6700\u5c0f\u56de\u5408\u6578\uff0c\u5c0d\u65bc\u5141\u8a31\u91cf\u5b50\u8aa4\u78bc\u7387\u9ad8\u90546.5%\u7684\u53ef\u9760\u5bc6\u9470\uff0cEDIQKD\u5354\u5b9a\u7684\u6548\u7387\u6bd4DIQKD\u5354\u5b9a\u9ad8\u5169\u500b\u6578\u91cf\u7d1a\uff08\u5982\u5716\u6240\u793a\uff09\u3002\u9019\u9805\u512a\u52e2\u5c07\u4f7f\u53c3\u8207\u200b\u200b\u8005\u80fd\u5920\u5927\u5e45\u7bc0\u7701\u7cfe\u7e8f\u5c0d\u6240\u9700\u7684\u8cc7\u6e90\u548c\u6e2c\u91cf\u3002\u6839\u64da\u6700\u8fd1\u6700\u5148\u9032\u7684\u5149\u5b50\u5be6\u9a57\u4e2d\u7684\u6700\u9ad8\u6aa2\u6e2c\u6548\u7387\uff0c\u6211\u5011\u7684\u5354\u8b70\u53ef\u4ee5\u4ee5\u975e\u96f6\u5bc6\u9470\u7387\u5be6\u73fe\uff0c\u4e26\u4fdd\u6301\u6bd4\u901a\u5e38\u7684 DIQKD \u66f4\u6709\u6548\u7387\u3002\u6211\u5011\u7684\u5354\u8b70\u53ca\u5176\u5b89\u5168\u5206\u6790\u53ef\u4ee5\u70ba\u8b58\u5225\u8207\u8a2d\u5099\u7121\u95dc\u7684\u5834\u666f\u4e2d\u5178\u578b\u7684\u6e96\u5099\u548c\u6e2c\u91cf\u91cf\u5b50\u8cc7\u8a0a\u4efb\u52d9\u63d0\u4f9b\u6709\u7528\u7684\u898b\u89e3\u3002<\/p><p>Device-independent quantum key distribution (DIQKD) is a key distribution scheme whose security is based on the laws of quantum physics but does not require any assumptions about the devices used in the protocol. The security of the existing entanglement-based DIQKD protocol relies on the Bell test. Here, we propose an efficient device-independent quantum key distribution (EDIQKD) protocol in which one participant prepares states and transmits them through a quantum channel to another participant to measure. In this prepare-and-measure protocol, the transmission process between participants is characterized according to the process tomography for security, ruling out any mimicry using the classical initial, transmission, and final state. Comparing the minimum number of rounds to guarantee security against collective attacks, the efficiency of the EDIQKD protocol is two orders of magnitude more than that of the DIQKD protocol for the reliable key of which quantum bit error rate is allowed up to 6.5%, as shown in the figure. This advantage will enable participants to substantially conserve the entangled pair&#8217;s demanded resources and the measurement. According to the highest detection efficiency in the recent most advanced photonic experiment, our protocol can be realized with a non-zero key rate and remains more efficient than usual DIQKD. Our protocol and its security analysis may offer helpful insight into identifying the typical prepare-and-measure quantum information tasks with the device-independent scenario.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<div class=\"elementor-accordion-item\">\n\t\t\t\t\t<div id=\"elementor-tab-title-1202\" class=\"elementor-tab-title\" data-tab=\"2\" role=\"tab\" aria-controls=\"elementor-tab-content-1202\" aria-expanded=\"false\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon elementor-accordion-icon-left\" aria-hidden=\"true\">\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-closed\"><i class=\"fas fa-plus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t<span class=\"elementor-accordion-icon-opened\"><i class=\"fas fa-minus\"><\/i><\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t\t\t<\/span>\n\t\t\t\t\t\t\t\t\t\t\t\t<a class=\"elementor-accordion-title\" href=\"\">\u5be6\u9a57\u904e\u7a0b\u4e2d\u91cf\u5b50\u95dc\u806f\u7684\u7522\u751f\u80fd\u529b Quantum Correlation Generation Capability of Experimental Processes<\/a>\n\t\t\t\t\t<\/div>\n\t\t\t\t\t<div id=\"elementor-tab-content-1202\" class=\"elementor-tab-content elementor-clearfix\" data-tab=\"2\" role=\"tabpanel\" aria-labelledby=\"elementor-tab-title-1202\"><p><img decoding=\"async\" class=\"aligncenter wp-image-181\" src=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/10\/Quantum-Correlation.jpg\" alt=\"\" width=\"512\" height=\"223\" \/ loading=\"lazy\" srcset=\"http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/10\/Quantum-Correlation.jpg 1600w, http:\/\/cmli.es.ncku.edu.tw\/wp-content\/uploads\/2023\/10\/Quantum-Correlation-600x261.jpg 600w\" sizes=\"auto, (max-width: 512px) 100vw, 512px\" \/><\/p><p>\u6211\u5011\u63d0\u51fa\u4e86\u4e00\u7a2e\u5be6\u9a57\u4e0a\u53ef\u5be6\u65bd\u4e4b\u65b9\u6cd5\uff0c\u85c9\u7531\u7c21\u55ae\u5730\u6e96\u5099\u5206\u96e2\u72c0\u614b\u4f5c\u70ba\u6e2c\u8a66\u8f38\u5165\uff0c\u7136\u5f8c\u5c0d\u76f8\u61c9\u8f38\u51fa\u7684\u55ae\u500b\u91cf\u5b50\u4f4d\u9032\u884c\u7c21\u55ae\u7684\u5c40\u57df\u6e2c\u91cf\uff0c\u5c31\u53ef\u8b58\u5225\u5be6\u9a57\u904e\u7a0b\u4e2d\u91cf\u5b50\u95dc\u806f\u6027\uff08\u5305\u62ecEPR\u64cd\u63a7\u6027\u548c\u8c9d\u723e\u975e\u5b9a\u57df\u6027\uff09\u7684\u7522\u751f\u80fd\u529b\u3002\u9019\u4e00\u767c\u73fe\u53ef\u7528\u65bc\u901a\u7528\u91cf\u5b50\u8a08\u7b97\u4e2d\uff0c\u96d9\u91cf\u5b50\u4f4d\u5143\u63a7\u5236\u908f\u8f2f\u9598\u5ba2\u89c0\u4e4b\u57fa\u6e96\u6e2c\u8a66\u3002<br \/>A method is introduced for identifying the creation of quantum correlations, including EPR steering and Bell nonlocality, for experimental processes, by simply preparing separable states as test inputs and then performing local measurements on single qubits of the corresponding outputs. This finding enables the construction of objective benchmarks for the two-qubit controlled operations used to perform universal quantum computation.<\/p><\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>\u91cf\u5b50\u7cfe\u7e8f\u5c0d\u65bc\u63a2\u7d22\u57fa\u790e\u91cf\u5b50\u7269\u7406\u548c\u5be6\u73fe\u91cf\u5b50\u6280\u8853\u81f3\u70ba\u91cd\u8981\uff0c\u6211\u5011\u7684\u7814\u7a76\u76ee\u7684\u662f\uff1a\u5340\u5225\u201c\u4ee5\u91cf\u5b50\u7cfe\u7e8f\u70ba\u5a92\u4ecb\u7684\u771f\u6b63\u91cf\u5b50\u8cc7\u8a0a\u8655\u7406<\/p>\n","protected":false},"author":1,"featured_media":0,"parent":0,"menu_order":0,"comment_status":"closed","ping_status":"closed","template":"","meta":{"footnotes":"","_links_to":"","_links_to_target":""},"class_list":["post-18","page","type-page","status-publish","hentry"],"_links":{"self":[{"href":"http:\/\/cmli.es.ncku.edu.tw\/index.php?rest_route=\/wp\/v2\/pages\/18","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/cmli.es.ncku.edu.tw\/index.php?rest_route=\/wp\/v2\/pages"}],"about":[{"href":"http:\/\/cmli.es.ncku.edu.tw\/index.php?rest_route=\/wp\/v2\/types\/page"}],"author":[{"embeddable":true,"href":"http:\/\/cmli.es.ncku.edu.tw\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"http:\/\/cmli.es.ncku.edu.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=18"}],"version-history":[{"count":50,"href":"http:\/\/cmli.es.ncku.edu.tw\/index.php?rest_route=\/wp\/v2\/pages\/18\/revisions"}],"predecessor-version":[{"id":1320,"href":"http:\/\/cmli.es.ncku.edu.tw\/index.php?rest_route=\/wp\/v2\/pages\/18\/revisions\/1320"}],"wp:attachment":[{"href":"http:\/\/cmli.es.ncku.edu.tw\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=18"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}