SlideShare a Scribd company logo
1 of 79
Introduction to
Quantum Computing and
Quantum Information Theory
Contents
I.

Computing and the Laws of Physics
II. A Happy Marriage; Quantum Mechanics &
Computers
III. Qubits and Quantum Gates
IV. Quantum Parallelism
V. Summary
Technological limits
For the past two decades we have enjoyed Gordon Moore’s

law. But all good things may come to an end…
We are limited in our ability to increase
the density and
the speed of a computing engine.

Reliability will also be affected
to increase the speed we need increasingly smaller circuits (light
needs 1 ns to travel 30 cm in vacuum)
smaller circuits  systems consisting only of a few particles subject
to Heissenberg uncertainty
Power dissipation, circuit density, and speed
In 1992 Ralph Merkle from Xerox PARC calculated that a 1

GHz computer operating at room temperature, with 1018
gates packed in a volume of about 1 cm3 would dissipate 3
MW of power.
A small city with 1,000 homes each using 3 KW would require the

same amount of power;
A 500 MW nuclear reactor could only power some 166 such
circuits.
Talking about the heat…
The heat produced by a super dense computing engine is

proportional with the number of elementary computing circuits,
thus, with the volume of the engine. The heat dissipated grows as
the cube of the radius of the device.
To prevent the destruction of the engine we have to remove the
heat through a surface surrounding the device. Henceforth, our
ability to remove heat increases as the square of the radius while
the amount of heat increases with the cube of the size of the
computing engine.
Contents
I.

Computing and the Laws of Physics
II. A Happy Marriage; Quantum Mechanics &
Computers
III. Qubits and Quantum Gates
IV. Quantum Parallelism
V. Summary
A happy marriage…
The two greatest discoveries of the 20-th century
quantum mechanics
stored program computers

produced quantum computing and quantum information
theory
Quantum; Quantum mechanics
Quantum is a Latin word meaning some quantity. In physics it is

used with the same meaning as the word discrete in mathematics,
i.e., some quantity or variable that can take only sharply defined
values as opposed to a continuously varying quantity. The
concepts continuum and continuous are known from geometry
and calculus

smallest possible discrete unit of any physical

property

Quantum mechanics is a mathematical model of the physical

world
Heissenberg uncertainty principle
Heisenberg uncertainty principle says we cannot determine both

the position and the momentum of a quantum particle with
arbitrary precision.

In his Nobel prize lecture on December 11, 1954 Max Born says

about this fundamental principle of Quantum Mechanics : ``... It
shows that not only the determinism of classical physics must be
abandoned, but also the naive concept of reality which looked
upon atomic particles as if they were very small grains of sand.
At every instant a grain of sand has a definite position and
velocity. This is not the case with an electron. If the position is
determined with increasing accuracy, the possibility of
ascertaining its velocity becomes less and vice versa.''
A revolutionary approach to computing and
communication
We need to consider a revolutionary rather than an

evolutionary approach to computing.
Quantum theory does not play only a supporting role by
prescribing the limitations of physical systems used for
computing and communication.
Quantum properties such as
uncertainty,
interference, and
entanglement

form the foundation of a new brand of theory, the quantum
information theory where computational and
communication processes rest upon fundamental physics.
Deterministic versus probabilistic photon behavior
A mathematical model to describe the state of a
quantum system

ψ = α 0 0 + α1 1
| α 0 , α1 |

are complex numbers

| α 0 | + | α1 | = 1
2

2
Superposition and uncertainty
In this model a state

ψ = α 0 0 + α1 1

is a superposition of two basis states, “0” and “1”
This state is unknown before we make a measurement.
After we perform a measurement the system is no longer in an
uncertain state but it is in one of the two basis states.
2 is the probability of observing the outcome “1”

|α0 |
2 is the probability of observing the outcome “0”

|α |
1

| α 0 |2 + | α 1 |2 = 1
The superposition probability rule
If an event may occur in two or more indistinguishable ways then

the probability amplitude of the event is the sum of the probability
amplitudes of each case considered separately (sometimes known
as Feynmann rule).
Quantum computers
In quantum systems the amount of parallelism increases

exponentially with the size of the system, thus with the
number of qubits. This means that the price to pay for an
exponential increase in the power of a quantum
computer is a linear increase in the amount of matter
and space needed to build the larger quantum computing
engine.
A quantum computer will enable us to solve problems
with a very large state space.
Contents
I.

Computing and the Laws of Physics
II. A Happy Marriage; Quantum Mechanics &
Computers
III. Qubits and Quantum Gates
IV. Quantum Parallelism
V. Summary
A bit versus a qubit
A bit
Can be in two distinct states, 0 and 1
A measurement does not affect the state
A qubit
= 0 0 + 1

ψ

can be in state

α

α1

| 0〉 or in state| 1〉 or in any other state that is a

linear combination of the basis state
When we measure the qubit we find it
 in state
 in state

| 0〉 with probability
| 1〉with probability

| α0 |2
| α1 |2
Other states of a qubit
1
1
0 +
1
2
2
1
3
0 +
1
2
2
The Boch sphere representation of one
qubit
A qubit in a superposition state is represented as a vector

connecting the center of the Bloch sphere with a point on its
periphery.
The two probability amplitudes can be expressed using Euler
angles.
Two qubits
Represented as vectors in a 2-dimensional Hilbert space

with four basis vectors

00 , 01 , 10 , 11
When we measure a pair of qubits we decide that the

system it is in one of four states

00 , 01 , 10 , 11
with probabilities

| α 00 | , | α 01 | , | α10 | , | α11 |
2

2

2

2
Two qubits

ψ = α 00 00 + α 01 01 + α10 10 + α11 11

| α 00 | + | α 01 | + | α10 | + | α11 | = 1
2

2

2

2
Measuring two qubits
Before a measurement the state of the system consisting of

two qubits is uncertain (it is given by the previous equation
and the corresponding probabilities).
After the measurement the state is certain, it is
00, 01, 10, or 11 like in the case of a classical two bit
system.
Measuring two qubits (cont’d)
What if we observe only the first qubit, what conclusions

can we draw?
We expect that the system to be left in an uncertain sate,
because we did not measure the second qubit that can still
be in a continuum of states. The first qubit can be
0 with probability
1 with probability

| α 00 |2 + | α 01 |2

| α10 |2 + | α11 |2
Measuring two qubits (cont’d)
Call

ψ

I
0

the post-measurement state when we measure
the first qubit and find it to be 0.
I
Call ψ 1 the post-measurement state when we measure
the first qubit and find it to be 1.

ψ

I
0

=

α 00 00 + α 01 01
| α 00 | + | α 01 |
2

2

ψ

I
1

=

α10 1 0 + α11 11
| α10 | + | α11 |
2

2
Measuring two qubits (cont’d)
Call

ψ

II
0

the post-measurement state when we measure
the second qubit and find it to be 0.
II
Call ψ 1 the post-measurement state when we measure
the second qubit and find it to be 1.

ψ 0II =

α 0 0 00 + α10 10
| α 00 | + | α10 |
2

2

ψ

II
1

=

α 01 01 + α11 11
| α 01 | + | α11 |
2

2
Bell states - a special state of a pair of
qubits
If

1
α 00 = α11 =
and
2

α 01 = α10 = 0

When we measure the first qubit we get the post
I
I
measurement state
ψ =| 11〉

ψ 0 =| 00〉

1

When we measure the second qubit we get the post
mesutrement state
II
ψ II =| 11〉

ψ 0 =| 00〉

1
This is an amazing result!
The two measurements are correlated, once we

measure the first qubit we get exactly the same result as
when we measure the second one.
The two qubits need not be physically constrained to be
at the same location and yet, because of the strong
coupling between them, measurements performed on
the second one allow us to determine the state of the
first.
Entanglement
Entanglement is an elegant, almost exact translation of the

German term Verschrankung used by Schrodinger who was
the first to recognize this quantum effect.
An entangled pair is a single quantum system in a
superposition of equally possible states. The entangled state
contains no information about the individual particles, only
that they are in opposite states.
The important property of an entangled pair is that the
measurement of one particle influences the state of the
other particle. Einstein called that “Spooky action at a
distance".
The spin
In quantum mechanics the intrinsic angular moment, the

spin, is quantized and the values it may take are multiples of
the rationalized Planck constant.
The spin of an atom or of a particle is characterized by the
spin quantum number s , which may assume integer and halfinteger values. For a given value of s the projection of the
spin on any axis may assume 2s + 1 values ranging from - s
to $ + s by unit steps, in other words the spin is quantized.
More about the spin
There are two classes of quantum particles
fermions - spin one-half particles such as the electrons. The
spin quantum numbers of fermions can be
 s=+1/2 and
 s=-1/2

bosons - spin one particles. The spin quantum numbers of

bosons can be
 s=+1,
 s=0, and
 s=-1
The spin of the electron
The electron has spin s = 1 /2 and the spin projection can

assume the values + ½ referred to as spin up, and -1/2 referred
to as spin down.
Light and photons
Light is a form of electromagnetic radiation; the wavelength of

the radiation in the visible spectrum varies from red to violet.
Light can be filtered by selectively absorbing some color ranges
and passing through others.
A polarization filter is a partially transparent material that
transmits light of a particular polarization.
Photons
Photons differ from the spin 1/2 electrons in two ways:
(1) they are massless and
(2) have spin $1$.
 A photon is characterized by its
vector momentum (the vector momentum determines the frequency)
and
polarization.
In the classical theory light is described as having an electric

field which oscillates either vertically, the light is x-polarized,
or horizontally, the light is y-polarized in a plane perpendicular
to the direction of propagation, the z-axis.
The two basis vectors are |h> and |v>
Classical gates
Implement Boolean functions.
Are not reversible (invertible). We cannot recover the input

knowing the output.
This means that there is an iretriviable loss of information
One qubit gates
Transform an input qubit into an output qubit
Characterized by a 2 x 2 matrix with complex coefficients
ψ = α 0 0 + α1 1

ϕ = α 0 +α 1
'
0

 g11
G=
g
 21

ϕ =Gψ

g12 

g 22 


′
 α 0   g11
 =
α′   g
 1   21

g12  α 0 
 
g 22  α1 
 

'
1
One qubit gates
I  identity gate; leaves a qubit unchanged.
 X or NOT gate transposes the components of an input

qubit.
 Y gate.
 Z gate  flips the sign of a qubit.
 H  the Hadamard gate.
One qubit gates
 g11
G =
g
 21

g12 

g 22 


 g11
G =
g
 12
T

*
*
 g11 g11 + g 21 g 21
G +G =  *
 g g + g* g
22 21
 12 11

g 21 

g 22 


*
 g11
+
G = *
g
 12

g g + g g 22 
=I
g g + g g 22 

*
11 12
*
12 12

*
21
*
22

*
g 21 

*
g 22 

Identity transformation, Pauli matrices,
Hadamard
1 0
δ0 = I = 
0 1




ϕ = α 0 0 + α1 1

0 1
δ1 = X = 
1 0




ϕ = α1 0 + α 0 1

0 − i
δ2 = Y = 
i 0 



1 0 
δ3 = Z = 
 0 − 1



1 1 1 

H=
 1 − 1

2


ϕ = −iα1 0 + iα 0 1

ϕ = α 0 0 − α1 1

ϕ = α0

0 +1
2

+ α1

0 −1
2
CNOT a two qubit gate
Two inputs
Control
Target
The control qubit is transferred to the output as is.
The target qubit
Unaltered if the control qubit is 0
Flipped if the control qubit is 1.
VCNOT = ψ ⊗ φ

GCNOT

1

0
=
0

0


WCNOT = GCNOT VCNOT

0
1
0
0

0
0
0
1

0

0
1

0

The two input qubits of a two qubit
gates

ψ = α 0 0 + α1 1
φ = β 0 0 + β1 1

VCNOT

α 0 β 0 


 α 0   β 0   α 0 β1 
= ψ ⊗ φ =  ⊗  = 
α   β  α β 
 1  1  1 0
α β 
 1 1
Two qubit gates

GCNOT = 00 00 + 01 01 + 10 11 + 11 10

GCNOT

1

0
=
0

0


0
1
0
0

0
0
0
1

0

0
1

0

Two qubit gates
WCNOT = GCNOT VCNOT
WCNOT

1

0
=
0

0


0 0 0  α 0 β 0   α 0 β 0 

 

1 0 0  α 0 β1   α 0 β1 
 α β  =  α β 
0 0 1
 1 0   1 1 
0 1 0  α1β1   α1β 0 

 


WCNOT = α 0 β 0 00 + α 0 β1 01 + α1β1 10 + α1β 0 11
WCNOT = α 0 0 ( β 0 0 + β1 1 ) + α1 1 ( β1 0 + β 0 1 )
Final comments on the CNOT gate
CNOT preserves the control qubit (the first and the

second component of the input vector are replicated in
the output vector) and flips the target qubit (the third and
fourth component of the input vector become the fourth
and respectively the third component of the output
vector).

WCNOT = α 0 0 ( β 0 0 + β1 01 ) + α1 1 ( β1 0 + β 0 1 )
The CNOT gate is reversible. The control qubit is

replicated at the output and knowing it we can reconstruct
the target input qubit.
Fredkin gate
Three input and three output qubits
One control
Two target

When the control qubit is
0  the target qubits are replicated to the output
1  the target qubits are swapped
Toffoli gate
Three input and three output qubits
Two control
One target

When both control qubit
are 1  the target qubit is flipped
otherwise the target qubit is not changed.
Toffoli gate is universal. It may
emulate an AND and a NOT gate
Controlled H gate
Generic one qubit controlled gate
Contents
I.

Computing and the Laws of Physics
II. A Happy Marriage; Quantum Mechanics &

Computers
III. Qubits and Quantum Gates
IV. Quantum Parallelism
V. Summary
A quantum circuit

Given a function f(x) we can construct a reversible quantum

circuit consisting of Fredking gates only, capable of
transforming two qubits as follows

The function f(x) is hardwired in the circuit
A quantum circuit (cont’d)
If the second input is zero then the transformation done by

the circuit is
A quantum circuit (cont’d)
Now apply the first qubit through a Hadamad gate.
0 +1

2

0
The resulting sate of the circuit is


0 f(

0 +1

)

f (0) + 1 f (1)
2

2
The output state contains information about f(0) and f(1).
Quantum parallelism
The output of the quantum circuit contains information about
both f(0) and f(1). This property of quantum circuits is called
quantum parallelism.
Quantum parallelism allows us to construct the entire truth
table of a quantum gate array having 2n entries at once. In a
classical system we can compute the truth table in one time step
with 2n gate arrays running in parallel, or we need 2n time steps
with a single gate array.
We start with n qubits, each in state |0> and we apply a WelshHadamard transformation.

Advantages
• Much more powerful
• Faster
• Smaller
• Improvements to science
• Can improve on practical personal electronics
• what we are waiting for….

Christmas!
Difficulties
• Hard to control quantum particles
• Lots of heat
• Expensive
• Difficult to build
• Not enough is known about quantum mechanics
Future Work
• Silicon Quantum Computer
• It may become technology sooner than we expect
• New algorithms and communication
• Maximum exploitation
• Simulate other quantum systems.
Contents
I.

Computing and the Laws of Physics
II. A Happy Marriage; Quantum Mechanics &
Computers
III. Qubits and Quantum Gates
IV. Quantum Parallelism
V. Summary
Final remarks
A tremendous progress has been made in the area of

quantum computing and quantum information theory
during the past decade. Thousands of research papers, a
few solid reference books, and many popular-science
books have been published in recent years in this area.
The growing interest in quantum computing and
quantum information theory is motivated by the
incredible impact this discipline could have on how we
store, process, and transmit data and knowledge in this
information age.
Final remarks (cont’d)
Computer and communication systems using quantum effects

have remarkable properties.
Quantum computers enable efficient simulation of the most complex

physical systems we can envision.
Quantum algorithms allow efficient factoring of large integers with
applications to cryptography.
Quantum search algorithms speedup considerably the process of
identifying patterns in apparently random data.
We can guarantee the security of our quantum communication systems
because eavesdropping on a quantum communication channel can always
be detected.
Final remarks (cont’d)
Building a quantum computer faces tremendous

technological and theoretical challenges.
At the same time, we witness a faster rate of progress in
quantum information theory where applications of quantum
cryptography seem ready for commercialization. Recently, a
successful quantum key distribution experiment over a
distance of some 100 km has been announced.
Gallary
D-Wave's Quantu
Summary
Quantum computing and quantum information theory is

truly an exciting field.
It is too important to be left to the physicists alone….
Thank You

More Related Content

What's hot

A short introduction to Quantum Computing and Quantum Cryptography
A short introduction to Quantum Computing and Quantum CryptographyA short introduction to Quantum Computing and Quantum Cryptography
A short introduction to Quantum Computing and Quantum CryptographyFacultad de Informática UCM
 
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?Mike Hogarth, MD, FACMI, FACP
 
Quantum computer
Quantum computerQuantum computer
Quantum computerNikhil Eg
 
Quantum computing
Quantum computingQuantum computing
Quantum computingRitwik MG
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computersNancy Mann
 
Quantum Computing and Quantum Supremacy at Google
Quantum Computing and Quantum Supremacy at GoogleQuantum Computing and Quantum Supremacy at Google
Quantum Computing and Quantum Supremacy at Googleinside-BigData.com
 
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practiceSthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practiceStHack
 
Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsSendash Pangambam
 
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?Mike Hogarth, MD, FACMI, FACP
 
Quantum computing
Quantum computingQuantum computing
Quantum computingmrevanth
 
Data Structure in Quantum Computing
Data Structure in Quantum ComputingData Structure in Quantum Computing
Data Structure in Quantum ComputingShwetark Deshpande
 
Quantum Computing - A History in the Making
Quantum Computing - A History in the Making Quantum Computing - A History in the Making
Quantum Computing - A History in the Making Gokul Alex
 

What's hot (20)

A short introduction to Quantum Computing and Quantum Cryptography
A short introduction to Quantum Computing and Quantum CryptographyA short introduction to Quantum Computing and Quantum Cryptography
A short introduction to Quantum Computing and Quantum Cryptography
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
 
Quantum computing meghaditya
Quantum computing meghadityaQuantum computing meghaditya
Quantum computing meghaditya
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
 
Quantum Computing and Quantum Supremacy at Google
Quantum Computing and Quantum Supremacy at GoogleQuantum Computing and Quantum Supremacy at Google
Quantum Computing and Quantum Supremacy at Google
 
Quantum Computer
Quantum ComputerQuantum Computer
Quantum Computer
 
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practiceSthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
Sthack 2015 - Renaud "@nono2357" Lifchitz - Quantum computing in practice
 
Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic Concepts
 
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
Taking Quantum Computing for a Spin: What is Imaginary and What is Real?
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Data Structure in Quantum Computing
Data Structure in Quantum ComputingData Structure in Quantum Computing
Data Structure in Quantum Computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum Computing - A History in the Making
Quantum Computing - A History in the Making Quantum Computing - A History in the Making
Quantum Computing - A History in the Making
 
Seminar
SeminarSeminar
Seminar
 

Viewers also liked

Quantum computing - Introduction
Quantum computing - IntroductionQuantum computing - Introduction
Quantum computing - Introductionrushmila
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum ComputersDeepti.B
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum ComputingOwen Wang
 
Big data application using hadoop in cloud [Smart Refrigerator]
Big data application using hadoop in cloud [Smart Refrigerator] Big data application using hadoop in cloud [Smart Refrigerator]
Big data application using hadoop in cloud [Smart Refrigerator] Pushkar Bhandari
 
Classical Computation to Quantum Computation
Classical Computation to Quantum ComputationClassical Computation to Quantum Computation
Classical Computation to Quantum ComputationSneha Ramshanker
 
Implementation of Stopwatch using QCA based Carry Select Adder
Implementation of Stopwatch using QCA based Carry Select AdderImplementation of Stopwatch using QCA based Carry Select Adder
Implementation of Stopwatch using QCA based Carry Select AdderIJTET Journal
 
Study of Logic Gates Using Quantum Cellular Automata
Study of Logic Gates Using Quantum Cellular AutomataStudy of Logic Gates Using Quantum Cellular Automata
Study of Logic Gates Using Quantum Cellular Automataidescitation
 
Vlsi 2014 15
Vlsi 2014 15Vlsi 2014 15
Vlsi 2014 15shahu2212
 
Algorithm and Programming (Sequential Structure)
Algorithm and Programming (Sequential Structure)Algorithm and Programming (Sequential Structure)
Algorithm and Programming (Sequential Structure)Adam Mukharil Bachtiar
 
All optical XOR, CNOT gates with initial insight for quantum computation usin...
All optical XOR, CNOT gates with initial insight for quantum computation usin...All optical XOR, CNOT gates with initial insight for quantum computation usin...
All optical XOR, CNOT gates with initial insight for quantum computation usin...omarshehab
 
You always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloudYou always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloudEric Cattoir
 
Quantum Computation: What is it and Why?
Quantum Computation: What is it and Why?Quantum Computation: What is it and Why?
Quantum Computation: What is it and Why?Stefano Franco
 
9.design of high speed area efficient low power vedic multiplier using revers...
9.design of high speed area efficient low power vedic multiplier using revers...9.design of high speed area efficient low power vedic multiplier using revers...
9.design of high speed area efficient low power vedic multiplier using revers...nareshbk
 
Quantum computer presentation
Quantum computer presentationQuantum computer presentation
Quantum computer presentationkevinl94303
 
What is a thing of the IoT? Aspiration of things narrated by a 'Thing Interpr...
What is a thing of the IoT? Aspiration of things narrated by a 'Thing Interpr...What is a thing of the IoT? Aspiration of things narrated by a 'Thing Interpr...
What is a thing of the IoT? Aspiration of things narrated by a 'Thing Interpr...Pratik Desai, PhD
 

Viewers also liked (20)

Quantum computing - Introduction
Quantum computing - IntroductionQuantum computing - Introduction
Quantum computing - Introduction
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Big data application using hadoop in cloud [Smart Refrigerator]
Big data application using hadoop in cloud [Smart Refrigerator] Big data application using hadoop in cloud [Smart Refrigerator]
Big data application using hadoop in cloud [Smart Refrigerator]
 
Presentation1
Presentation1Presentation1
Presentation1
 
Classical Computation to Quantum Computation
Classical Computation to Quantum ComputationClassical Computation to Quantum Computation
Classical Computation to Quantum Computation
 
Implementation of Stopwatch using QCA based Carry Select Adder
Implementation of Stopwatch using QCA based Carry Select AdderImplementation of Stopwatch using QCA based Carry Select Adder
Implementation of Stopwatch using QCA based Carry Select Adder
 
Study of Logic Gates Using Quantum Cellular Automata
Study of Logic Gates Using Quantum Cellular AutomataStudy of Logic Gates Using Quantum Cellular Automata
Study of Logic Gates Using Quantum Cellular Automata
 
Vlsi 2014 15
Vlsi 2014 15Vlsi 2014 15
Vlsi 2014 15
 
Algorithm and Programming (Sequential Structure)
Algorithm and Programming (Sequential Structure)Algorithm and Programming (Sequential Structure)
Algorithm and Programming (Sequential Structure)
 
All optical XOR, CNOT gates with initial insight for quantum computation usin...
All optical XOR, CNOT gates with initial insight for quantum computation usin...All optical XOR, CNOT gates with initial insight for quantum computation usin...
All optical XOR, CNOT gates with initial insight for quantum computation usin...
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
 
You always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloudYou always dreamt of your own quantum computer. now you can have it in the cloud
You always dreamt of your own quantum computer. now you can have it in the cloud
 
What is qca
What is qcaWhat is qca
What is qca
 
Quantum Computation: What is it and Why?
Quantum Computation: What is it and Why?Quantum Computation: What is it and Why?
Quantum Computation: What is it and Why?
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
9.design of high speed area efficient low power vedic multiplier using revers...
9.design of high speed area efficient low power vedic multiplier using revers...9.design of high speed area efficient low power vedic multiplier using revers...
9.design of high speed area efficient low power vedic multiplier using revers...
 
Quantum computer presentation
Quantum computer presentationQuantum computer presentation
Quantum computer presentation
 
What is a thing of the IoT? Aspiration of things narrated by a 'Thing Interpr...
What is a thing of the IoT? Aspiration of things narrated by a 'Thing Interpr...What is a thing of the IoT? Aspiration of things narrated by a 'Thing Interpr...
What is a thing of the IoT? Aspiration of things narrated by a 'Thing Interpr...
 

Similar to Introduction to Quantum Computing and Quantum Information Theory

Quantum Computing
Quantum ComputingQuantum Computing
Quantum ComputingAmr Mohamed
 
osama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applicationsosama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applicationsRachitdas2
 
2007 001-motivation-to-quantum-computing
2007 001-motivation-to-quantum-computing2007 001-motivation-to-quantum-computing
2007 001-motivation-to-quantum-computingVipul Kumar
 
QC - UNIT 1.ppt
QC - UNIT 1.pptQC - UNIT 1.ppt
QC - UNIT 1.pptkhan188474
 
Quantum entanglement is one of the most intriguing and counterintuitive pheno...
Quantum entanglement is one of the most intriguing and counterintuitive pheno...Quantum entanglement is one of the most intriguing and counterintuitive pheno...
Quantum entanglement is one of the most intriguing and counterintuitive pheno...NishaJaiswal34
 
Quantum computing.pptx
Quantum computing.pptxQuantum computing.pptx
Quantum computing.pptxCaptAvacato
 
The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1Bruno Fedrici, PhD
 
Jack Tuszynski From Quantum Physics to Quantum Biology in 100 Years. How long...
Jack Tuszynski From Quantum Physics to Quantum Biology in 100 Years. How long...Jack Tuszynski From Quantum Physics to Quantum Biology in 100 Years. How long...
Jack Tuszynski From Quantum Physics to Quantum Biology in 100 Years. How long...Kim Solez ,
 
Quantum superposition | Overview
Quantum superposition | OverviewQuantum superposition | Overview
Quantum superposition | OverviewEmanuel Di Nardo
 
Quantum mechanics a brief
Quantum mechanics a briefQuantum mechanics a brief
Quantum mechanics a briefChaitanya Areti
 

Similar to Introduction to Quantum Computing and Quantum Information Theory (20)

Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
osama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applicationsosama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applications
 
quantum-computing.ppt
quantum-computing.pptquantum-computing.ppt
quantum-computing.ppt
 
osama-quantum-computing.ppt
osama-quantum-computing.pptosama-quantum-computing.ppt
osama-quantum-computing.ppt
 
Ieee lecture
Ieee lectureIeee lecture
Ieee lecture
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
MASTER_THESIS-libre
MASTER_THESIS-libreMASTER_THESIS-libre
MASTER_THESIS-libre
 
2007 001-motivation-to-quantum-computing
2007 001-motivation-to-quantum-computing2007 001-motivation-to-quantum-computing
2007 001-motivation-to-quantum-computing
 
Quantum Computation.pptx
Quantum Computation.pptxQuantum Computation.pptx
Quantum Computation.pptx
 
QC - UNIT 1.ppt
QC - UNIT 1.pptQC - UNIT 1.ppt
QC - UNIT 1.ppt
 
Quantum entanglement is one of the most intriguing and counterintuitive pheno...
Quantum entanglement is one of the most intriguing and counterintuitive pheno...Quantum entanglement is one of the most intriguing and counterintuitive pheno...
Quantum entanglement is one of the most intriguing and counterintuitive pheno...
 
Quantum computing.pptx
Quantum computing.pptxQuantum computing.pptx
Quantum computing.pptx
 
The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1
 
Jack Tuszynski From Quantum Physics to Quantum Biology in 100 Years. How long...
Jack Tuszynski From Quantum Physics to Quantum Biology in 100 Years. How long...Jack Tuszynski From Quantum Physics to Quantum Biology in 100 Years. How long...
Jack Tuszynski From Quantum Physics to Quantum Biology in 100 Years. How long...
 
Qunatum computing
Qunatum computing Qunatum computing
Qunatum computing
 
bhanu.pptx
bhanu.pptxbhanu.pptx
bhanu.pptx
 
Atomic structure
Atomic structureAtomic structure
Atomic structure
 
Quantum superposition | Overview
Quantum superposition | OverviewQuantum superposition | Overview
Quantum superposition | Overview
 
Quantum Computing Report
Quantum Computing ReportQuantum Computing Report
Quantum Computing Report
 
Quantum mechanics a brief
Quantum mechanics a briefQuantum mechanics a brief
Quantum mechanics a brief
 

Recently uploaded

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 

Recently uploaded (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 

Introduction to Quantum Computing and Quantum Information Theory

  • 1. Introduction to Quantum Computing and Quantum Information Theory
  • 2. Contents I. Computing and the Laws of Physics II. A Happy Marriage; Quantum Mechanics & Computers III. Qubits and Quantum Gates IV. Quantum Parallelism V. Summary
  • 3. Technological limits For the past two decades we have enjoyed Gordon Moore’s law. But all good things may come to an end… We are limited in our ability to increase the density and the speed of a computing engine. Reliability will also be affected to increase the speed we need increasingly smaller circuits (light needs 1 ns to travel 30 cm in vacuum) smaller circuits  systems consisting only of a few particles subject to Heissenberg uncertainty
  • 4. Power dissipation, circuit density, and speed In 1992 Ralph Merkle from Xerox PARC calculated that a 1 GHz computer operating at room temperature, with 1018 gates packed in a volume of about 1 cm3 would dissipate 3 MW of power. A small city with 1,000 homes each using 3 KW would require the same amount of power; A 500 MW nuclear reactor could only power some 166 such circuits.
  • 5. Talking about the heat… The heat produced by a super dense computing engine is proportional with the number of elementary computing circuits, thus, with the volume of the engine. The heat dissipated grows as the cube of the radius of the device. To prevent the destruction of the engine we have to remove the heat through a surface surrounding the device. Henceforth, our ability to remove heat increases as the square of the radius while the amount of heat increases with the cube of the size of the computing engine.
  • 6. Contents I. Computing and the Laws of Physics II. A Happy Marriage; Quantum Mechanics & Computers III. Qubits and Quantum Gates IV. Quantum Parallelism V. Summary
  • 7. A happy marriage… The two greatest discoveries of the 20-th century quantum mechanics stored program computers produced quantum computing and quantum information theory
  • 8. Quantum; Quantum mechanics Quantum is a Latin word meaning some quantity. In physics it is used with the same meaning as the word discrete in mathematics, i.e., some quantity or variable that can take only sharply defined values as opposed to a continuously varying quantity. The concepts continuum and continuous are known from geometry and calculus smallest possible discrete unit of any physical property Quantum mechanics is a mathematical model of the physical world
  • 9. Heissenberg uncertainty principle Heisenberg uncertainty principle says we cannot determine both the position and the momentum of a quantum particle with arbitrary precision. In his Nobel prize lecture on December 11, 1954 Max Born says about this fundamental principle of Quantum Mechanics : ``... It shows that not only the determinism of classical physics must be abandoned, but also the naive concept of reality which looked upon atomic particles as if they were very small grains of sand. At every instant a grain of sand has a definite position and velocity. This is not the case with an electron. If the position is determined with increasing accuracy, the possibility of ascertaining its velocity becomes less and vice versa.''
  • 10. A revolutionary approach to computing and communication We need to consider a revolutionary rather than an evolutionary approach to computing. Quantum theory does not play only a supporting role by prescribing the limitations of physical systems used for computing and communication. Quantum properties such as uncertainty, interference, and entanglement form the foundation of a new brand of theory, the quantum information theory where computational and communication processes rest upon fundamental physics.
  • 12. A mathematical model to describe the state of a quantum system ψ = α 0 0 + α1 1 | α 0 , α1 | are complex numbers | α 0 | + | α1 | = 1 2 2
  • 13. Superposition and uncertainty In this model a state ψ = α 0 0 + α1 1 is a superposition of two basis states, “0” and “1” This state is unknown before we make a measurement. After we perform a measurement the system is no longer in an uncertain state but it is in one of the two basis states. 2 is the probability of observing the outcome “1”  |α0 | 2 is the probability of observing the outcome “0”  |α | 1 | α 0 |2 + | α 1 |2 = 1
  • 14. The superposition probability rule If an event may occur in two or more indistinguishable ways then the probability amplitude of the event is the sum of the probability amplitudes of each case considered separately (sometimes known as Feynmann rule).
  • 15. Quantum computers In quantum systems the amount of parallelism increases exponentially with the size of the system, thus with the number of qubits. This means that the price to pay for an exponential increase in the power of a quantum computer is a linear increase in the amount of matter and space needed to build the larger quantum computing engine. A quantum computer will enable us to solve problems with a very large state space.
  • 16. Contents I. Computing and the Laws of Physics II. A Happy Marriage; Quantum Mechanics & Computers III. Qubits and Quantum Gates IV. Quantum Parallelism V. Summary
  • 17. A bit versus a qubit A bit Can be in two distinct states, 0 and 1 A measurement does not affect the state A qubit = 0 0 + 1 ψ can be in state α α1 | 0〉 or in state| 1〉 or in any other state that is a linear combination of the basis state When we measure the qubit we find it  in state  in state | 0〉 with probability | 1〉with probability | α0 |2 | α1 |2
  • 18.
  • 19. Other states of a qubit 1 1 0 + 1 2 2 1 3 0 + 1 2 2
  • 20. The Boch sphere representation of one qubit A qubit in a superposition state is represented as a vector connecting the center of the Bloch sphere with a point on its periphery. The two probability amplitudes can be expressed using Euler angles.
  • 21.
  • 22.
  • 23. Two qubits Represented as vectors in a 2-dimensional Hilbert space with four basis vectors 00 , 01 , 10 , 11 When we measure a pair of qubits we decide that the system it is in one of four states 00 , 01 , 10 , 11 with probabilities | α 00 | , | α 01 | , | α10 | , | α11 | 2 2 2 2
  • 24. Two qubits ψ = α 00 00 + α 01 01 + α10 10 + α11 11 | α 00 | + | α 01 | + | α10 | + | α11 | = 1 2 2 2 2
  • 25. Measuring two qubits Before a measurement the state of the system consisting of two qubits is uncertain (it is given by the previous equation and the corresponding probabilities). After the measurement the state is certain, it is 00, 01, 10, or 11 like in the case of a classical two bit system.
  • 26. Measuring two qubits (cont’d) What if we observe only the first qubit, what conclusions can we draw? We expect that the system to be left in an uncertain sate, because we did not measure the second qubit that can still be in a continuum of states. The first qubit can be 0 with probability 1 with probability | α 00 |2 + | α 01 |2 | α10 |2 + | α11 |2
  • 27. Measuring two qubits (cont’d) Call ψ I 0 the post-measurement state when we measure the first qubit and find it to be 0. I Call ψ 1 the post-measurement state when we measure the first qubit and find it to be 1. ψ I 0 = α 00 00 + α 01 01 | α 00 | + | α 01 | 2 2 ψ I 1 = α10 1 0 + α11 11 | α10 | + | α11 | 2 2
  • 28. Measuring two qubits (cont’d) Call ψ II 0 the post-measurement state when we measure the second qubit and find it to be 0. II Call ψ 1 the post-measurement state when we measure the second qubit and find it to be 1. ψ 0II = α 0 0 00 + α10 10 | α 00 | + | α10 | 2 2 ψ II 1 = α 01 01 + α11 11 | α 01 | + | α11 | 2 2
  • 29. Bell states - a special state of a pair of qubits If 1 α 00 = α11 = and 2 α 01 = α10 = 0 When we measure the first qubit we get the post I I measurement state ψ =| 11〉 ψ 0 =| 00〉 1 When we measure the second qubit we get the post mesutrement state II ψ II =| 11〉 ψ 0 =| 00〉 1
  • 30. This is an amazing result! The two measurements are correlated, once we measure the first qubit we get exactly the same result as when we measure the second one. The two qubits need not be physically constrained to be at the same location and yet, because of the strong coupling between them, measurements performed on the second one allow us to determine the state of the first.
  • 31. Entanglement Entanglement is an elegant, almost exact translation of the German term Verschrankung used by Schrodinger who was the first to recognize this quantum effect. An entangled pair is a single quantum system in a superposition of equally possible states. The entangled state contains no information about the individual particles, only that they are in opposite states. The important property of an entangled pair is that the measurement of one particle influences the state of the other particle. Einstein called that “Spooky action at a distance".
  • 32. The spin In quantum mechanics the intrinsic angular moment, the spin, is quantized and the values it may take are multiples of the rationalized Planck constant. The spin of an atom or of a particle is characterized by the spin quantum number s , which may assume integer and halfinteger values. For a given value of s the projection of the spin on any axis may assume 2s + 1 values ranging from - s to $ + s by unit steps, in other words the spin is quantized.
  • 33. More about the spin There are two classes of quantum particles fermions - spin one-half particles such as the electrons. The spin quantum numbers of fermions can be  s=+1/2 and  s=-1/2 bosons - spin one particles. The spin quantum numbers of bosons can be  s=+1,  s=0, and  s=-1
  • 34. The spin of the electron The electron has spin s = 1 /2 and the spin projection can assume the values + ½ referred to as spin up, and -1/2 referred to as spin down.
  • 35. Light and photons Light is a form of electromagnetic radiation; the wavelength of the radiation in the visible spectrum varies from red to violet. Light can be filtered by selectively absorbing some color ranges and passing through others. A polarization filter is a partially transparent material that transmits light of a particular polarization.
  • 36. Photons Photons differ from the spin 1/2 electrons in two ways: (1) they are massless and (2) have spin $1$.  A photon is characterized by its vector momentum (the vector momentum determines the frequency) and polarization. In the classical theory light is described as having an electric field which oscillates either vertically, the light is x-polarized, or horizontally, the light is y-polarized in a plane perpendicular to the direction of propagation, the z-axis. The two basis vectors are |h> and |v>
  • 37. Classical gates Implement Boolean functions. Are not reversible (invertible). We cannot recover the input knowing the output. This means that there is an iretriviable loss of information
  • 38.
  • 39. One qubit gates Transform an input qubit into an output qubit Characterized by a 2 x 2 matrix with complex coefficients
  • 40. ψ = α 0 0 + α1 1 ϕ = α 0 +α 1 ' 0  g11 G= g  21 ϕ =Gψ g12   g 22   ′  α 0   g11  = α′   g  1   21 g12  α 0    g 22  α1    ' 1
  • 41. One qubit gates I  identity gate; leaves a qubit unchanged.  X or NOT gate transposes the components of an input qubit.  Y gate.  Z gate  flips the sign of a qubit.  H  the Hadamard gate.
  • 42. One qubit gates  g11 G = g  21 g12   g 22    g11 G = g  12 T * *  g11 g11 + g 21 g 21 G +G =  *  g g + g* g 22 21  12 11 g 21   g 22   *  g11 + G = * g  12 g g + g g 22  =I g g + g g 22   * 11 12 * 12 12 * 21 * 22 * g 21   * g 22  
  • 43. Identity transformation, Pauli matrices, Hadamard 1 0 δ0 = I =  0 1    ϕ = α 0 0 + α1 1 0 1 δ1 = X =  1 0    ϕ = α1 0 + α 0 1 0 − i δ2 = Y =  i 0     1 0  δ3 = Z =   0 − 1    1 1 1   H=  1 − 1  2  ϕ = −iα1 0 + iα 0 1 ϕ = α 0 0 − α1 1 ϕ = α0 0 +1 2 + α1 0 −1 2
  • 44. CNOT a two qubit gate Two inputs Control Target The control qubit is transferred to the output as is. The target qubit Unaltered if the control qubit is 0 Flipped if the control qubit is 1.
  • 45. VCNOT = ψ ⊗ φ GCNOT 1  0 = 0  0  WCNOT = GCNOT VCNOT 0 1 0 0 0 0 0 1 0  0 1  0 
  • 46. The two input qubits of a two qubit gates ψ = α 0 0 + α1 1 φ = β 0 0 + β1 1 VCNOT α 0 β 0     α 0   β 0   α 0 β1  = ψ ⊗ φ =  ⊗  =  α   β  α β   1  1  1 0 α β   1 1
  • 47. Two qubit gates GCNOT = 00 00 + 01 01 + 10 11 + 11 10 GCNOT 1  0 = 0  0  0 1 0 0 0 0 0 1 0  0 1  0 
  • 48. Two qubit gates WCNOT = GCNOT VCNOT WCNOT 1  0 = 0  0  0 0 0  α 0 β 0   α 0 β 0      1 0 0  α 0 β1   α 0 β1   α β  =  α β  0 0 1  1 0   1 1  0 1 0  α1β1   α1β 0      WCNOT = α 0 β 0 00 + α 0 β1 01 + α1β1 10 + α1β 0 11 WCNOT = α 0 0 ( β 0 0 + β1 1 ) + α1 1 ( β1 0 + β 0 1 )
  • 49. Final comments on the CNOT gate CNOT preserves the control qubit (the first and the second component of the input vector are replicated in the output vector) and flips the target qubit (the third and fourth component of the input vector become the fourth and respectively the third component of the output vector). WCNOT = α 0 0 ( β 0 0 + β1 01 ) + α1 1 ( β1 0 + β 0 1 ) The CNOT gate is reversible. The control qubit is replicated at the output and knowing it we can reconstruct the target input qubit.
  • 50. Fredkin gate Three input and three output qubits One control Two target When the control qubit is 0  the target qubits are replicated to the output 1  the target qubits are swapped
  • 51.
  • 52. Toffoli gate Three input and three output qubits Two control One target When both control qubit are 1  the target qubit is flipped otherwise the target qubit is not changed.
  • 53. Toffoli gate is universal. It may emulate an AND and a NOT gate
  • 55. Generic one qubit controlled gate
  • 56.
  • 57. Contents I. Computing and the Laws of Physics II. A Happy Marriage; Quantum Mechanics &  Computers III. Qubits and Quantum Gates IV. Quantum Parallelism V. Summary
  • 58. A quantum circuit Given a function f(x) we can construct a reversible quantum circuit consisting of Fredking gates only, capable of transforming two qubits as follows The function f(x) is hardwired in the circuit
  • 59. A quantum circuit (cont’d) If the second input is zero then the transformation done by the circuit is
  • 60. A quantum circuit (cont’d) Now apply the first qubit through a Hadamad gate. 0 +1 2 0 The resulting sate of the circuit is  0 f( 0 +1 ) f (0) + 1 f (1) 2 2 The output state contains information about f(0) and f(1).
  • 61.
  • 62. Quantum parallelism The output of the quantum circuit contains information about both f(0) and f(1). This property of quantum circuits is called quantum parallelism. Quantum parallelism allows us to construct the entire truth table of a quantum gate array having 2n entries at once. In a classical system we can compute the truth table in one time step with 2n gate arrays running in parallel, or we need 2n time steps with a single gate array. We start with n qubits, each in state |0> and we apply a WelshHadamard transformation. 
  • 63. Advantages • Much more powerful • Faster • Smaller • Improvements to science • Can improve on practical personal electronics
  • 64. • what we are waiting for…. Christmas!
  • 65. Difficulties • Hard to control quantum particles • Lots of heat • Expensive • Difficult to build • Not enough is known about quantum mechanics
  • 66. Future Work • Silicon Quantum Computer • It may become technology sooner than we expect • New algorithms and communication • Maximum exploitation • Simulate other quantum systems.
  • 67. Contents I. Computing and the Laws of Physics II. A Happy Marriage; Quantum Mechanics & Computers III. Qubits and Quantum Gates IV. Quantum Parallelism V. Summary
  • 68. Final remarks A tremendous progress has been made in the area of quantum computing and quantum information theory during the past decade. Thousands of research papers, a few solid reference books, and many popular-science books have been published in recent years in this area. The growing interest in quantum computing and quantum information theory is motivated by the incredible impact this discipline could have on how we store, process, and transmit data and knowledge in this information age.
  • 69. Final remarks (cont’d) Computer and communication systems using quantum effects have remarkable properties. Quantum computers enable efficient simulation of the most complex physical systems we can envision. Quantum algorithms allow efficient factoring of large integers with applications to cryptography. Quantum search algorithms speedup considerably the process of identifying patterns in apparently random data. We can guarantee the security of our quantum communication systems because eavesdropping on a quantum communication channel can always be detected.
  • 70. Final remarks (cont’d) Building a quantum computer faces tremendous technological and theoretical challenges. At the same time, we witness a faster rate of progress in quantum information theory where applications of quantum cryptography seem ready for commercialization. Recently, a successful quantum key distribution experiment over a distance of some 100 km has been announced.
  • 72.
  • 73.
  • 74.
  • 75.
  • 76.
  • 78. Summary Quantum computing and quantum information theory is truly an exciting field. It is too important to be left to the physicists alone….