SlideShare a Scribd company logo
IOSR Journal of Computer Engineering (IOSR-JCE)
e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 30-34
www.iosrjournals.org
www.iosrjournals.org 30 | Page
Quantum communication and quantum computing
*Sweety Mittal, **Nilesh Kumar Dokania
Lecturar,Yaduvanshi college of engg and technology
Assistant Professor, Guru Nanak Institute Of Management
Abstract: The subject of quantum computing brings together ideas from classical information theory, computer
science, and quantum physics. This review aims to summarize not just quantum computing, but the whole
subject of quantum information theory. Information can be identified as the most general thing which must
propagate from a cause to an effect. It therefore has a fundamentally important role in the science of physics.
However, the mathematical treatment of information, especially information processing, is quite recent, dating
from the mid-20th century. This has meant that the full significance of information as a basic concept in physics
is only now being discovered. This is especially true in quantum mechanics. The theory of quantum information
and computing puts this significance on a firm footing, and has led to some profound and exciting new insights
into the natural world. Among these are the use of quantum states to permit the secure transmission of classical
information (quantum cryptography), the use of quantum entanglement to permit reliable transmission of
quantum states (teleportation), the possibility of preserving quantum coherence in the presence of irreversible
noise processes (quantum error correction), and the use of controlled quantum evolution for efficient
computation (quantum computation). The common theme of all these insights is the use of quantum
entanglement as a computational resource.
Keywords: quantum bits, quantum registers, quantum gates and quantum networks
I. Introduction
First proposed in the 1970s, quantum computing relies on quantum physics by taking advantage of
certain quantum physics properties of atoms or nuclei that allow them to work together as quantum bits, or
qubits, to be the computer's processor and memory. By interacting with each other while being isolated from the
external environment, qubits can perform certain calculations exponentially faster than conventional computers.
. A quantum computer can do an arbitrary reversible classical computation on all the numbers simultaneously,
which a binary system cannot do, and also has some ability to produce interference between various different
numbers. By doing a computation on many different numbers at once, then interfering the results to get a single
answer, a quantum computer has the potential to be much more powerful than a classical computer of the same
size. In using only a single processing unit, a quantum computer can naturally perform myriad operations in
parallel. Quantum computing is not well suited for tasks such as word processing and email, but it is ideal for
tasks such as cryptography and modeling and indexing very large databases.
The review concludes with an outline of the main features of quantum information physics and avenues
for future research.
Fig 1. Basics of quantum computer
II. Requirements of hardware:
Storage: We'll need to store Qbits long enough to perform an interesting computation
Isolation: The Obits must be well isolated from the environment to minimize the decoherece effect.
Readout: We'll need to measure the Qbits efficiently and reliably.
Gates: We'll need to manipulate the quantum states of individual Qbit, so that we can perform quantum gates.
Quantum communication and quantum computing
www.iosrjournals.org 31 | Page
Precision: The quantum gates should be implemented with highly precision if we want the device to work
properly.
Ion Trap: This idea has been suggested by Ignacio Cirac and Peter Zoller. In this scheme the Qbit is
represented by a single ion held in linear Paul trap.
Cavity QED: Pellizzari, Cardiner, Cirac and Zoller have suggested that several neutral atoms to be stored in a
small high finesse optical cavity. The quantum information can be stored in the internal states of the atoms
NMR: This scheme uses nuclear magnetic resonance technology and the Qbits are carried by a a certain nuclear
spin in a particular molecule.
2.2 Algorithm
We describe a quantum algorithm that generalizes the quantum linear system algorithm to arbitrary
problem specifications. We develop a state preparation routine that can initialize generic states, show how
simple ancilla measurements can be used to calculate many quantities of interest, and integrate a quantum-
compatible preconditioner that greatly expands the number of problems that can achieve exponential speedup
over classical linear systems solvers. To demonstrate the algorithm’s applicability, we show how it can be used
to compute the electromagnetic scattering cross section of an arbitrary target exponentially faster than the best
classical algorithm.
2.3 Complexity
Quantum Hamiltonian complexity is an exciting area combining deep questions and techniques from
both quantum complexity theory and condensed matter physics. The connection between these fields arises from
the close relationship between their defining questions: the complexity of constraint satisfaction problems in
complexity theory and the properties of ground states of local Hamiltonians in condensed matter theory.
quantum Hamiltonian complexity provides new approaches and techniques for tackling fundamental questions
in condensed matter physics, in particular the classical simulation of quantum many body systems. The area law
plays a central role in recent progress on using tensor network based techniques for simulating such systems.
The goal of this semester long program is to bring together leading computer scientists, condensed matter
physicists and mathematicians working on these questions, and to build upon the existing bridges and
collaborations between them. One of the important priorities will be to help establish a common language
between the three groups, so that key insights from all three areas can be pooled in tackling the outstanding
issues at the heart of quantum Hamiltonian complexity
2.4 Quantum Cryptography
According to Quantum Mechanics, given the most precise description possible of how things are now,
the most you can do is predict the probability that things will turn out one way or another. Many people
(including, famously, Albert Einstein) found this a disturbing feature of the theory, which suggested to them that
Quantum Mechanics was not the real theory of nature, and that we were missing something. However, in a
pivotal paper in 1964, John Bell showed a way of processing measurement results from certain experiments so
that there is a threshold value, a maximum value which can be obtained by models (known as Local Hidden
Variable models) which describe all possible models of physics which obey two fundamental properties: the
theories should not be capable of transmitting information faster than the speed of light, and measurement
results should be predetermined. However, the way that Bell combined these measurement results also predicted
that a Quantum Mechanical system would exceed this threshold value, i.e., one of those assumptions on the
nature of the physical world must be false. This prediction has been confirmed by numerous experiments in the
intervening years.
To most, this unpredicatability of measurement results would present a problem. However,
cryptographers look to benefit from such features. Information is always represented by measurable physical
properties, and if such properties exist then, their value can be predicted with certainty without in any way
disturbing a system. This is just a description of a perfect eavesdropping. Conversely, if such properties do not
exist prior to measurements, then there is nothing to eavesdrop on. Hence, measuring the so-called Bell
Inequalities in an experiment provides a test of just how much a quantum transmission has been eavesdropped.
Remarkably, this requires very little by way of assumptions about the protocols that are being followed - it
doesn't matter what devices we are using, or if we even trust the person who manufactured the devices or not -
provided a Bell inequality is violated, we can use the measurement results to communicate securely. This is
known as Device Independent cryptography. These ideas were first applied to the classic task in cryptography;
key distribution, although has since been applied in various other instances such as the expansion of a sequence
of random numbers.
Quantum communication and quantum computing
www.iosrjournals.org 32 | Page
III. Working In Quantum Computing
3.1.1 How Computers Work
Computers function by storing data in a binary number format, which result in a series of 1s & 0s
retained in electronic components such astransistors. each component of computer memory is called a bit and
can be manipulated through the steps of Boolean logic so that the bits change, based upon the algorithms applied
by the computer program, between the 1 and 0 modes (sometimes referred to as "on" and "off").
3.1.2 How a Quantum Computer Would Work
A quantum computer, on the other hand, would store information as either a 1, 0, or a quantum
superposition of the two states. Such a "quantum bit," called a qubit, allows for far greater flexibility than the
binary system.
Specifically, a quantum computer would be able to perform calculations on a far greater order of
magnitude than traditional computers ... a concept which has serious concerns and applications in the realm of
cryptography & encryption. Some fear that a successful & practical quantum computer would devastate the
world's financial system by ripping through their computer security encryptions, which are based on factoring
large numbers that literally cannot be cracked by traditional computers within the life span of the universe. A
quantum computer, on the other hand, could factor the numbers in a reasonable period of time.
3.2 Architecture
Fig2:Quantum Computing Sample Architecture
A sufficiently transparent architecture facilitates tool interoperability, focused point-tool development, and
incremental improvements. Quantum algorithm designers and those developing quantum circuit optimizations
can explore new algorithms and error-correction procedures in more realistic settings
involving actual noise and physical resource constraints. Researchers can also simulate important quantum
algorithms on proposed new technologies before doing expensive lab experiments. Our four-phase design flow,
shown in Figure , maps a high-level program representing a quantum algorithm
into a low-level set of machine instructions to be implemented on a physical device. The high-level quantum
programming language encapsulates the mathematical abstractions of quantum mechanics and linear algebra.1
The design flow’s first three phases are part of the quantum computer compiler (QCC). The last phase
implements the algorithm on a quantum device or simulator.
Fig3: Quantum Computing Layered Architeutre
4.1 Ongoing Research in Quantum Computing
Researchers in industry and government labs are exploring various aspects of quantum design and
automation with a wide range of applications. In addition to the examples described below, universities in the
US, Canada, Europe, Japan, and China are carrying out much broader efforts.
Quantum communication and quantum computing
www.iosrjournals.org 33 | Page
4.1.1 BBN Technologies
Based in Cambridge, Massachusetts, BBN Technologies (www.bbn.com) developed the world’s first
quantum key distribution (QKD) network with funding from the US Defense Advanced Research Projects
Agency.The fiber-optical DARPA Quantum Network offers 24x7 quantum cryptography to
secure standard Internet traffic such as Web browsing, e-commerce, and streaming video.
4.1.2 D-Wave Systems
Located in Vancouver, British Columbia, Canada, D-Wave Systems (www.dwavesys.com) builds
superconductor-based software-programmable custom integrated circuits for quantum optimization algorithms
and quantum-physical simulations. These ICs form the heart of a quantum computing
system designed to deliver massively more powerful and faster performance for
cryptanalysis,logistics,bioinformatics,and other applications.
4.1.3 Hewlett-Packard
The Quantum Science Research Group at HP Labs in Palo Alto,California,is exploring nanoscale quantum
optics for information- processing applications (www.hpl.hp.com/research/qsr). In addition, the Quantum
Information Processing Group at the company’s research facility in Bristol, UK, is studying quantum
computation, cryptography, and teleportation and communication
(www.hpl.hp. com/research/qip).
4.1.4 Hypres
Located in Elmsford, New York, Hypres Inc. (www.hypres.com) is the leading developer of
superconducting digital for wireless and optical communication. Based on rapid singleflux
quantum logic, these circuits have achieved gate speeds up to 770 GHz in the laboratory.
4.1.5 IBM Research
Scientists at IBM’s Almaden Research Center in California and the T.J.Watson Research Center’s
Yorktown office in New York developed a nuclear magnetic resonance (NMR) quantum computer
that factored 15 into 3 5 (http://archives.cnn.com/ 2000/TECH/computing/08/15/quantum.reut). Researchers
at the Watson facility and the Zurich Research Lab are also developing Josephson junction quantum devices
(www. research.ibm. com/ss_computing) as well as studying quantum information theory
(www.research.ibm.com/quantuminfo).
4.1.6 Id Quantique
Based in Geneva, Switzerland, id Quantique (www.idquantique. com) is a leading provider of quantum
cryptography solutions, including wire-speed link encryptors, QKD appliances, a turnkey service for securing
communication transfers, and quantum random number generators.The company’s optical
instrumentation product portfolio includes single-photon counters and short-pulse laser sources.
4.1.7 Los Alamos National Lab
The Los Alamos National Lab (http://qso.lanl.gov/qc) in New Mexico is studying quantum-optical
long-distance secure communications and QKD for satellite communications. It has also conducted
groundbreaking work on quantum error correction, decoherence, quantum teleportation, and the adaptation of
NMR technology to quantum information processing.
4.1.8 Magiq Technologies
MagiQ Technologies (www.magiqtech.com), headquartered in New York City, launched the world’s
first commercial quantum cryptography device in 2003. MagiQ Quantum Private Network systems incorporate
QKD over metro-area fiberoptic links to protect against both cryptographic deciphering
and industrial espionage.
4.1.9 NEC Labs
Scientists at NEC’s Fundamental and Environmental Research Laboratories in Japan, in collaboration
with the Riken Institute of Physical and Chemical Research, have demonstrated a basic quantum circuit in a
solid-state quantum device (www.labs.nec.co.jp/Eng/innovative/E3/top.html). Recently, NEC researchers have
also been involved in realizing the fastest fortnight-long, continuous quantum cryptography final-key
generation.
Quantum communication and quantum computing
www.iosrjournals.org 34 | Page
4.1.10 NIST
Established in 2000, the Quantum Information Program at the US National Institute of Standards and
Technology (http:// qubit.nist.gov) is building a prototype 10-qubit quantum processor— made of trapped ions,
neutral atoms, or “artificial atoms” made of superconducting electrical circuits—to provide a proofin- principle
of quantum information processing. Researchers at the program’s facilities in Boulder,Colorado, and
Gaithersburg, Maryland, are also developing a high-speed QKD system with
efficient and precise single-photon sources and detectors.
4.1.11 NTT Basic Research Labs
NTT’s Superconducting Quantum Physics Research Group in Japan focuses on the development of
quantum cryptography protocols (www.brl.ntt.co.jp/group/shitsuryo-g/qc). In particular, they have exhibited
quantum cryptography using a single photon realized in a photonic network of optical fibers.
5.1 Future Outlook
At present, quantum computers and quantum information technology remains in its pioneering stage.
At this very moment obstacles are being surmounted that will provide the knowledge needed to thrust quantum
computers up to their rightful position as the fastest computational machines in existence. Error correction has
made promising progress to date, nearing a point now where we may have the tools required to build a computer
robust enough to adequately withstand the effects of decoherence. Quantum hardware, on the other hand,
remains an emerging field, but the work done thus far suggests that it will only be a matter time before we have
devices large enough to test Shor's and other quantum algorithms. Thereby, quantum computers will emerge as
the superior computational devices at the very least, and perhaps one day make today's modern computer
obsolete. Quantum computation has its origins in highly specialized fields of theoretical physics, but its future
undoubtedly lies in the profound effect it will have on the lives of all mankind.
Fig 4
IV. Conclusion
The field of quantum computing is growing rapidly as many of today's leading computing groups,
universities, colleges, and all the leading IT vendors are researching the topic. This pace is expected to increase
as more research is turned into practical applications. Although practical machines lie years in the future, this
formerly fanciful idea is gaining plausibility.
The current challenge is not to build a full quantum computer right away; instead to move away from
the experiments in which we merely observe quantum phenomena to experiments in which we can control these
phenomena. Systems in which information obeys the laws of quantum mechanics could far exceed the
performance of any conventional computer. Therein lies the opportunity and the reward. No one can predict
when we will build the first quantum computer; it could be this year, perhaps in the next 10 years, or centuries
from now. Obviously, this mind-boggling level of computing power has enormous commercial, industrial, and
scientific applications, but there are some significant technological and conceptual issue to resolve first.
But quantum computers will come.
References
[1] Jacob west http://www.cs.rice.edu/~taha/teaching/05F/210/news/2005_09_16.htm
[2] Jozef Gruska http://www.fi.muni.cz/usr/gruska/quantum/chapters.html
[3] Julian Voss-Andreae's "Quantum Objects http://physics.about.com/od/quantumphysics/f/quantumcomp.html
[4] Pearson IBM press http://www.ibmpressbooks.com/articles/article.asp?p=374693&seqNum=6
[5] Scott Aaronson MIT, Dave Bacon University of Washington
https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDIQFjAA&url=http%3A%2F%2Fww
w.cra.org%2Fccc%2Ffiles%2Fdocs%2Finit%2FQuantum_Computing.pdf&ei=GuhcUuLKFsmArgfpuICQAg&usg=AFQjCNGr2N
l1e-w2s4j888JDZ7QD1-A9dA&sig2=9OCHbjLAddhd-QUzES9MCA
[6] Svore-aho-cross-chuang-markovhttp://research.microsoft.com/pubs/144689/qc-svore-aho-cross-chuang-markov-computer-
magazine-article-a-layered-software-architecture-for-quantum-computing-design-tools-jan06-svore.pdf
[7] University of OXFORD http://www.maths.ox.ac.uk/groups/mathematical-physics/research-areas/quantum-information
[8] Webopedia http://www.webopedia.com/TERM/Q/quantum_computing.html

More Related Content

What's hot

Mehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics DilemmasMehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics Dilemmas
knowdiff
 
Quantum Computing Applications in Power Systems
Quantum Computing Applications in Power SystemsQuantum Computing Applications in Power Systems
Quantum Computing Applications in Power Systems
Power System Operation
 
177
177177
Quantum Computing: The Why and How
Quantum Computing: The Why and HowQuantum Computing: The Why and How
Quantum Computing: The Why and How
inside-BigData.com
 
Quantum Computing Lecture 2: Advanced Concepts
Quantum Computing Lecture 2: Advanced ConceptsQuantum Computing Lecture 2: Advanced Concepts
Quantum Computing Lecture 2: Advanced Concepts
Melanie Swan
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
Ahmed Banafa
 
The Evolution of Quantum Computers
The Evolution of Quantum ComputersThe Evolution of Quantum Computers
The Evolution of Quantum Computers
Subhadra Sundar Chakraborty
 
Quantum Computing Lecture 1: Basic Concepts
Quantum Computing Lecture 1: Basic ConceptsQuantum Computing Lecture 1: Basic Concepts
Quantum Computing Lecture 1: Basic Concepts
Melanie Swan
 
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic InflationG. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation
SEENET-MTP
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
Komal Gupta
 
Few Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the worldFew Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the world
Home
 
Quantum artificial intelligence
Quantum artificial intelligenceQuantum artificial intelligence
Quantum artificial intelligence
Burhan Ahmed
 
Quantum Computers PART 3 Computer That Program itself by Prof. Lili Saghafi
Quantum Computers PART 3 Computer That Program itself by Prof. Lili SaghafiQuantum Computers PART 3 Computer That Program itself by Prof. Lili Saghafi
Quantum Computers PART 3 Computer That Program itself by Prof. Lili Saghafi
Professor Lili Saghafi
 
D-WaveQuantum ComputingAccess & applications via cloud deployment
D-WaveQuantum ComputingAccess & applications via cloud deploymentD-WaveQuantum ComputingAccess & applications via cloud deployment
D-WaveQuantum ComputingAccess & applications via cloud deployment
Rakuten Group, Inc.
 
PPT
PPTPPT
PPT
butest
 
Quantum information technology
Quantum information technologyQuantum information technology
Quantum information technology
mitchellwalls1
 
Big Fast Data in High-Energy Particle Physics
Big Fast Data in High-Energy Particle PhysicsBig Fast Data in High-Energy Particle Physics
Big Fast Data in High-Energy Particle Physics
Andrew Lowe
 
Introduction to Quantum Computation. Part - 1
Introduction to Quantum Computation. Part - 1Introduction to Quantum Computation. Part - 1
Introduction to Quantum Computation. Part - 1
Arunabha Saha
 
Algoritmo quântico
Algoritmo quânticoAlgoritmo quântico
Algoritmo quântico
XequeMateShannon
 
The grid extra dimensions theory
The grid extra dimensions theoryThe grid extra dimensions theory
The grid extra dimensions theory
Eran Sinbar
 

What's hot (20)

Mehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics DilemmasMehran Shaghaghi: Quantum Mechanics Dilemmas
Mehran Shaghaghi: Quantum Mechanics Dilemmas
 
Quantum Computing Applications in Power Systems
Quantum Computing Applications in Power SystemsQuantum Computing Applications in Power Systems
Quantum Computing Applications in Power Systems
 
177
177177
177
 
Quantum Computing: The Why and How
Quantum Computing: The Why and HowQuantum Computing: The Why and How
Quantum Computing: The Why and How
 
Quantum Computing Lecture 2: Advanced Concepts
Quantum Computing Lecture 2: Advanced ConceptsQuantum Computing Lecture 2: Advanced Concepts
Quantum Computing Lecture 2: Advanced Concepts
 
Quantum Internet Explained
Quantum Internet ExplainedQuantum Internet Explained
Quantum Internet Explained
 
The Evolution of Quantum Computers
The Evolution of Quantum ComputersThe Evolution of Quantum Computers
The Evolution of Quantum Computers
 
Quantum Computing Lecture 1: Basic Concepts
Quantum Computing Lecture 1: Basic ConceptsQuantum Computing Lecture 1: Basic Concepts
Quantum Computing Lecture 1: Basic Concepts
 
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic InflationG. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation
G. Djordjevic/ Lj. Nesic: Notes on Real and p-Adic Inflation
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Few Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the worldFew Applications of quantum physics or mechanics around the world
Few Applications of quantum physics or mechanics around the world
 
Quantum artificial intelligence
Quantum artificial intelligenceQuantum artificial intelligence
Quantum artificial intelligence
 
Quantum Computers PART 3 Computer That Program itself by Prof. Lili Saghafi
Quantum Computers PART 3 Computer That Program itself by Prof. Lili SaghafiQuantum Computers PART 3 Computer That Program itself by Prof. Lili Saghafi
Quantum Computers PART 3 Computer That Program itself by Prof. Lili Saghafi
 
D-WaveQuantum ComputingAccess & applications via cloud deployment
D-WaveQuantum ComputingAccess & applications via cloud deploymentD-WaveQuantum ComputingAccess & applications via cloud deployment
D-WaveQuantum ComputingAccess & applications via cloud deployment
 
PPT
PPTPPT
PPT
 
Quantum information technology
Quantum information technologyQuantum information technology
Quantum information technology
 
Big Fast Data in High-Energy Particle Physics
Big Fast Data in High-Energy Particle PhysicsBig Fast Data in High-Energy Particle Physics
Big Fast Data in High-Energy Particle Physics
 
Introduction to Quantum Computation. Part - 1
Introduction to Quantum Computation. Part - 1Introduction to Quantum Computation. Part - 1
Introduction to Quantum Computation. Part - 1
 
Algoritmo quântico
Algoritmo quânticoAlgoritmo quântico
Algoritmo quântico
 
The grid extra dimensions theory
The grid extra dimensions theoryThe grid extra dimensions theory
The grid extra dimensions theory
 

Viewers also liked

B010511015
B010511015B010511015
B010511015
IOSR Journals
 
“Relationship of Kinematic Variables with the Performance of Standing Broad J...
“Relationship of Kinematic Variables with the Performance of Standing Broad J...“Relationship of Kinematic Variables with the Performance of Standing Broad J...
“Relationship of Kinematic Variables with the Performance of Standing Broad J...
IOSR Journals
 
I017256165
I017256165I017256165
I017256165
IOSR Journals
 
J1303067178
J1303067178J1303067178
J1303067178
IOSR Journals
 
B010230811
B010230811B010230811
B010230811
IOSR Journals
 
F010214048
F010214048F010214048
F010214048
IOSR Journals
 
K010117074
K010117074K010117074
K010117074
IOSR Journals
 
Design and Analysis of Microstrip Antenna for CDMA Systems Communication
Design and Analysis of Microstrip Antenna for CDMA Systems CommunicationDesign and Analysis of Microstrip Antenna for CDMA Systems Communication
Design and Analysis of Microstrip Antenna for CDMA Systems Communication
IOSR Journals
 
G017254554
G017254554G017254554
G017254554
IOSR Journals
 
G1101045767
G1101045767G1101045767
G1101045767
IOSR Journals
 
A1104010105
A1104010105A1104010105
A1104010105
IOSR Journals
 
N018219199
N018219199N018219199
N018219199
IOSR Journals
 
J017655258
J017655258J017655258
J017655258
IOSR Journals
 
E017342231
E017342231E017342231
E017342231
IOSR Journals
 
C017311316
C017311316C017311316
C017311316
IOSR Journals
 
B017510306
B017510306B017510306
B017510306
IOSR Journals
 
E013152730
E013152730E013152730
E013152730
IOSR Journals
 
O01052126130
O01052126130O01052126130
O01052126130
IOSR Journals
 
F017414853
F017414853F017414853
F017414853
IOSR Journals
 
O01741103108
O01741103108O01741103108
O01741103108
IOSR Journals
 

Viewers also liked (20)

B010511015
B010511015B010511015
B010511015
 
“Relationship of Kinematic Variables with the Performance of Standing Broad J...
“Relationship of Kinematic Variables with the Performance of Standing Broad J...“Relationship of Kinematic Variables with the Performance of Standing Broad J...
“Relationship of Kinematic Variables with the Performance of Standing Broad J...
 
I017256165
I017256165I017256165
I017256165
 
J1303067178
J1303067178J1303067178
J1303067178
 
B010230811
B010230811B010230811
B010230811
 
F010214048
F010214048F010214048
F010214048
 
K010117074
K010117074K010117074
K010117074
 
Design and Analysis of Microstrip Antenna for CDMA Systems Communication
Design and Analysis of Microstrip Antenna for CDMA Systems CommunicationDesign and Analysis of Microstrip Antenna for CDMA Systems Communication
Design and Analysis of Microstrip Antenna for CDMA Systems Communication
 
G017254554
G017254554G017254554
G017254554
 
G1101045767
G1101045767G1101045767
G1101045767
 
A1104010105
A1104010105A1104010105
A1104010105
 
N018219199
N018219199N018219199
N018219199
 
J017655258
J017655258J017655258
J017655258
 
E017342231
E017342231E017342231
E017342231
 
C017311316
C017311316C017311316
C017311316
 
B017510306
B017510306B017510306
B017510306
 
E013152730
E013152730E013152730
E013152730
 
O01052126130
O01052126130O01052126130
O01052126130
 
F017414853
F017414853F017414853
F017414853
 
O01741103108
O01741103108O01741103108
O01741103108
 

Similar to Quantum communication and quantum computing

An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
Jai Sipani
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
Nancy Mann
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
Abhijit181377
 
Seminar
SeminarSeminar
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
Emran Hossain
 
bhanu.pptx
bhanu.pptxbhanu.pptx
bhanu.pptx
aswinichenemalla
 
Quantum computing1
Quantum computing1Quantum computing1
Quantum computing1
Pravin Pundge
 
Quantum comput ing
Quantum comput ingQuantum comput ing
Quantum comput ing
Pravin Pundge
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
Rishabh Jindal
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
deeksha qanoungo
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
Deepti.B
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
gitrahekno
 
Ppt of nanocomputing
Ppt of nanocomputingPpt of nanocomputing
Ppt of nanocomputing
shwetarathi Rathi
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
Krishna Patel
 
Quantum computation a review
Quantum computation a reviewQuantum computation a review
Quantum computation a review
Editor Jacotech
 
Quantum Computation: An Overview
Quantum Computation: An OverviewQuantum Computation: An Overview
Quantum Computation: An Overview
IRJET Journal
 
Entropy 12-02268-v2
Entropy 12-02268-v2Entropy 12-02268-v2
Entropy 12-02268-v2
CAA Sudan
 
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALAA Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
Saikiran Panjala
 
quantumcomputers-090715210946-phpapp01.pdf
quantumcomputers-090715210946-phpapp01.pdfquantumcomputers-090715210946-phpapp01.pdf
quantumcomputers-090715210946-phpapp01.pdf
AjayRaj912848
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
InnoTech
 

Similar to Quantum communication and quantum computing (20)

An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
 
Presentation on quantum computers
Presentation on quantum computersPresentation on quantum computers
Presentation on quantum computers
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
 
Seminar
SeminarSeminar
Seminar
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
 
bhanu.pptx
bhanu.pptxbhanu.pptx
bhanu.pptx
 
Quantum computing1
Quantum computing1Quantum computing1
Quantum computing1
 
Quantum comput ing
Quantum comput ingQuantum comput ing
Quantum comput ing
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
 
Ppt of nanocomputing
Ppt of nanocomputingPpt of nanocomputing
Ppt of nanocomputing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computation a review
Quantum computation a reviewQuantum computation a review
Quantum computation a review
 
Quantum Computation: An Overview
Quantum Computation: An OverviewQuantum Computation: An Overview
Quantum Computation: An Overview
 
Entropy 12-02268-v2
Entropy 12-02268-v2Entropy 12-02268-v2
Entropy 12-02268-v2
 
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALAA Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
 
quantumcomputers-090715210946-phpapp01.pdf
quantumcomputers-090715210946-phpapp01.pdfquantumcomputers-090715210946-phpapp01.pdf
quantumcomputers-090715210946-phpapp01.pdf
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 

More from IOSR Journals

A011140104
A011140104A011140104
A011140104
IOSR Journals
 
M0111397100
M0111397100M0111397100
M0111397100
IOSR Journals
 
L011138596
L011138596L011138596
L011138596
IOSR Journals
 
K011138084
K011138084K011138084
K011138084
IOSR Journals
 
J011137479
J011137479J011137479
J011137479
IOSR Journals
 
I011136673
I011136673I011136673
I011136673
IOSR Journals
 
G011134454
G011134454G011134454
G011134454
IOSR Journals
 
H011135565
H011135565H011135565
H011135565
IOSR Journals
 
F011134043
F011134043F011134043
F011134043
IOSR Journals
 
E011133639
E011133639E011133639
E011133639
IOSR Journals
 
D011132635
D011132635D011132635
D011132635
IOSR Journals
 
C011131925
C011131925C011131925
C011131925
IOSR Journals
 
B011130918
B011130918B011130918
B011130918
IOSR Journals
 
A011130108
A011130108A011130108
A011130108
IOSR Journals
 
I011125160
I011125160I011125160
I011125160
IOSR Journals
 
H011124050
H011124050H011124050
H011124050
IOSR Journals
 
G011123539
G011123539G011123539
G011123539
IOSR Journals
 
F011123134
F011123134F011123134
F011123134
IOSR Journals
 
E011122530
E011122530E011122530
E011122530
IOSR Journals
 
D011121524
D011121524D011121524
D011121524
IOSR Journals
 

More from IOSR Journals (20)

A011140104
A011140104A011140104
A011140104
 
M0111397100
M0111397100M0111397100
M0111397100
 
L011138596
L011138596L011138596
L011138596
 
K011138084
K011138084K011138084
K011138084
 
J011137479
J011137479J011137479
J011137479
 
I011136673
I011136673I011136673
I011136673
 
G011134454
G011134454G011134454
G011134454
 
H011135565
H011135565H011135565
H011135565
 
F011134043
F011134043F011134043
F011134043
 
E011133639
E011133639E011133639
E011133639
 
D011132635
D011132635D011132635
D011132635
 
C011131925
C011131925C011131925
C011131925
 
B011130918
B011130918B011130918
B011130918
 
A011130108
A011130108A011130108
A011130108
 
I011125160
I011125160I011125160
I011125160
 
H011124050
H011124050H011124050
H011124050
 
G011123539
G011123539G011123539
G011123539
 
F011123134
F011123134F011123134
F011123134
 
E011122530
E011122530E011122530
E011122530
 
D011121524
D011121524D011121524
D011121524
 

Recently uploaded

[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
awadeshbabu
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
thanhdowork
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
SyedAbiiAzazi1
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
IJNSA Journal
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
yokeleetan1
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
IJECEIAES
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
ssuser36d3051
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
mamunhossenbd75
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
camseq
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
rpskprasana
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
anoopmanoharan2
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
Mukeshwaran Balu
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
nooriasukmaningtyas
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
MIGUELANGEL966976
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
Aditya Rajan Patra
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
heavyhaig
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
jpsjournal1
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
PauloRodrigues104553
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
Dr Ramhari Poudyal
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
Ratnakar Mikkili
 

Recently uploaded (20)

[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
[JPP-1] - (JEE 3.0) - Kinematics 1D - 14th May..pdf
 
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
RAT: Retrieval Augmented Thoughts Elicit Context-Aware Reasoning in Long-Hori...
 
14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application14 Template Contractual Notice - EOT Application
14 Template Contractual Notice - EOT Application
 
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMSA SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
A SYSTEMATIC RISK ASSESSMENT APPROACH FOR SECURING THE SMART IRRIGATION SYSTEMS
 
Swimming pool mechanical components design.pptx
Swimming pool  mechanical components design.pptxSwimming pool  mechanical components design.pptx
Swimming pool mechanical components design.pptx
 
Embedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoringEmbedded machine learning-based road conditions and driving behavior monitoring
Embedded machine learning-based road conditions and driving behavior monitoring
 
sieving analysis and results interpretation
sieving analysis and results interpretationsieving analysis and results interpretation
sieving analysis and results interpretation
 
Heat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation pptHeat Resistant Concrete Presentation ppt
Heat Resistant Concrete Presentation ppt
 
Modelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdfModelagem de um CSTR com reação endotermica.pdf
Modelagem de um CSTR com reação endotermica.pdf
 
CSM Cloud Service Management Presentarion
CSM Cloud Service Management PresentarionCSM Cloud Service Management Presentarion
CSM Cloud Service Management Presentarion
 
PPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testingPPT on GRP pipes manufacturing and testing
PPT on GRP pipes manufacturing and testing
 
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
ACRP 4-09 Risk Assessment Method to Support Modification of Airfield Separat...
 
Low power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniquesLow power architecture of logic gates using adiabatic techniques
Low power architecture of logic gates using adiabatic techniques
 
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdfBPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
BPV-GUI-01-Guide-for-ASME-Review-Teams-(General)-10-10-2023.pdf
 
Recycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part IIIRecycled Concrete Aggregate in Construction Part III
Recycled Concrete Aggregate in Construction Part III
 
Technical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prismsTechnical Drawings introduction to drawing of prisms
Technical Drawings introduction to drawing of prisms
 
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTCHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECT
 
Series of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.pptSeries of visio cisco devices Cisco_Icons.ppt
Series of visio cisco devices Cisco_Icons.ppt
 
Literature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptxLiterature Review Basics and Understanding Reference Management.pptx
Literature Review Basics and Understanding Reference Management.pptx
 
Exception Handling notes in java exception
Exception Handling notes in java exceptionException Handling notes in java exception
Exception Handling notes in java exception
 

Quantum communication and quantum computing

  • 1. IOSR Journal of Computer Engineering (IOSR-JCE) e-ISSN: 2278-0661, p- ISSN: 2278-8727Volume 15, Issue 1 (Sep. - Oct. 2013), PP 30-34 www.iosrjournals.org www.iosrjournals.org 30 | Page Quantum communication and quantum computing *Sweety Mittal, **Nilesh Kumar Dokania Lecturar,Yaduvanshi college of engg and technology Assistant Professor, Guru Nanak Institute Of Management Abstract: The subject of quantum computing brings together ideas from classical information theory, computer science, and quantum physics. This review aims to summarize not just quantum computing, but the whole subject of quantum information theory. Information can be identified as the most general thing which must propagate from a cause to an effect. It therefore has a fundamentally important role in the science of physics. However, the mathematical treatment of information, especially information processing, is quite recent, dating from the mid-20th century. This has meant that the full significance of information as a basic concept in physics is only now being discovered. This is especially true in quantum mechanics. The theory of quantum information and computing puts this significance on a firm footing, and has led to some profound and exciting new insights into the natural world. Among these are the use of quantum states to permit the secure transmission of classical information (quantum cryptography), the use of quantum entanglement to permit reliable transmission of quantum states (teleportation), the possibility of preserving quantum coherence in the presence of irreversible noise processes (quantum error correction), and the use of controlled quantum evolution for efficient computation (quantum computation). The common theme of all these insights is the use of quantum entanglement as a computational resource. Keywords: quantum bits, quantum registers, quantum gates and quantum networks I. Introduction First proposed in the 1970s, quantum computing relies on quantum physics by taking advantage of certain quantum physics properties of atoms or nuclei that allow them to work together as quantum bits, or qubits, to be the computer's processor and memory. By interacting with each other while being isolated from the external environment, qubits can perform certain calculations exponentially faster than conventional computers. . A quantum computer can do an arbitrary reversible classical computation on all the numbers simultaneously, which a binary system cannot do, and also has some ability to produce interference between various different numbers. By doing a computation on many different numbers at once, then interfering the results to get a single answer, a quantum computer has the potential to be much more powerful than a classical computer of the same size. In using only a single processing unit, a quantum computer can naturally perform myriad operations in parallel. Quantum computing is not well suited for tasks such as word processing and email, but it is ideal for tasks such as cryptography and modeling and indexing very large databases. The review concludes with an outline of the main features of quantum information physics and avenues for future research. Fig 1. Basics of quantum computer II. Requirements of hardware: Storage: We'll need to store Qbits long enough to perform an interesting computation Isolation: The Obits must be well isolated from the environment to minimize the decoherece effect. Readout: We'll need to measure the Qbits efficiently and reliably. Gates: We'll need to manipulate the quantum states of individual Qbit, so that we can perform quantum gates.
  • 2. Quantum communication and quantum computing www.iosrjournals.org 31 | Page Precision: The quantum gates should be implemented with highly precision if we want the device to work properly. Ion Trap: This idea has been suggested by Ignacio Cirac and Peter Zoller. In this scheme the Qbit is represented by a single ion held in linear Paul trap. Cavity QED: Pellizzari, Cardiner, Cirac and Zoller have suggested that several neutral atoms to be stored in a small high finesse optical cavity. The quantum information can be stored in the internal states of the atoms NMR: This scheme uses nuclear magnetic resonance technology and the Qbits are carried by a a certain nuclear spin in a particular molecule. 2.2 Algorithm We describe a quantum algorithm that generalizes the quantum linear system algorithm to arbitrary problem specifications. We develop a state preparation routine that can initialize generic states, show how simple ancilla measurements can be used to calculate many quantities of interest, and integrate a quantum- compatible preconditioner that greatly expands the number of problems that can achieve exponential speedup over classical linear systems solvers. To demonstrate the algorithm’s applicability, we show how it can be used to compute the electromagnetic scattering cross section of an arbitrary target exponentially faster than the best classical algorithm. 2.3 Complexity Quantum Hamiltonian complexity is an exciting area combining deep questions and techniques from both quantum complexity theory and condensed matter physics. The connection between these fields arises from the close relationship between their defining questions: the complexity of constraint satisfaction problems in complexity theory and the properties of ground states of local Hamiltonians in condensed matter theory. quantum Hamiltonian complexity provides new approaches and techniques for tackling fundamental questions in condensed matter physics, in particular the classical simulation of quantum many body systems. The area law plays a central role in recent progress on using tensor network based techniques for simulating such systems. The goal of this semester long program is to bring together leading computer scientists, condensed matter physicists and mathematicians working on these questions, and to build upon the existing bridges and collaborations between them. One of the important priorities will be to help establish a common language between the three groups, so that key insights from all three areas can be pooled in tackling the outstanding issues at the heart of quantum Hamiltonian complexity 2.4 Quantum Cryptography According to Quantum Mechanics, given the most precise description possible of how things are now, the most you can do is predict the probability that things will turn out one way or another. Many people (including, famously, Albert Einstein) found this a disturbing feature of the theory, which suggested to them that Quantum Mechanics was not the real theory of nature, and that we were missing something. However, in a pivotal paper in 1964, John Bell showed a way of processing measurement results from certain experiments so that there is a threshold value, a maximum value which can be obtained by models (known as Local Hidden Variable models) which describe all possible models of physics which obey two fundamental properties: the theories should not be capable of transmitting information faster than the speed of light, and measurement results should be predetermined. However, the way that Bell combined these measurement results also predicted that a Quantum Mechanical system would exceed this threshold value, i.e., one of those assumptions on the nature of the physical world must be false. This prediction has been confirmed by numerous experiments in the intervening years. To most, this unpredicatability of measurement results would present a problem. However, cryptographers look to benefit from such features. Information is always represented by measurable physical properties, and if such properties exist then, their value can be predicted with certainty without in any way disturbing a system. This is just a description of a perfect eavesdropping. Conversely, if such properties do not exist prior to measurements, then there is nothing to eavesdrop on. Hence, measuring the so-called Bell Inequalities in an experiment provides a test of just how much a quantum transmission has been eavesdropped. Remarkably, this requires very little by way of assumptions about the protocols that are being followed - it doesn't matter what devices we are using, or if we even trust the person who manufactured the devices or not - provided a Bell inequality is violated, we can use the measurement results to communicate securely. This is known as Device Independent cryptography. These ideas were first applied to the classic task in cryptography; key distribution, although has since been applied in various other instances such as the expansion of a sequence of random numbers.
  • 3. Quantum communication and quantum computing www.iosrjournals.org 32 | Page III. Working In Quantum Computing 3.1.1 How Computers Work Computers function by storing data in a binary number format, which result in a series of 1s & 0s retained in electronic components such astransistors. each component of computer memory is called a bit and can be manipulated through the steps of Boolean logic so that the bits change, based upon the algorithms applied by the computer program, between the 1 and 0 modes (sometimes referred to as "on" and "off"). 3.1.2 How a Quantum Computer Would Work A quantum computer, on the other hand, would store information as either a 1, 0, or a quantum superposition of the two states. Such a "quantum bit," called a qubit, allows for far greater flexibility than the binary system. Specifically, a quantum computer would be able to perform calculations on a far greater order of magnitude than traditional computers ... a concept which has serious concerns and applications in the realm of cryptography & encryption. Some fear that a successful & practical quantum computer would devastate the world's financial system by ripping through their computer security encryptions, which are based on factoring large numbers that literally cannot be cracked by traditional computers within the life span of the universe. A quantum computer, on the other hand, could factor the numbers in a reasonable period of time. 3.2 Architecture Fig2:Quantum Computing Sample Architecture A sufficiently transparent architecture facilitates tool interoperability, focused point-tool development, and incremental improvements. Quantum algorithm designers and those developing quantum circuit optimizations can explore new algorithms and error-correction procedures in more realistic settings involving actual noise and physical resource constraints. Researchers can also simulate important quantum algorithms on proposed new technologies before doing expensive lab experiments. Our four-phase design flow, shown in Figure , maps a high-level program representing a quantum algorithm into a low-level set of machine instructions to be implemented on a physical device. The high-level quantum programming language encapsulates the mathematical abstractions of quantum mechanics and linear algebra.1 The design flow’s first three phases are part of the quantum computer compiler (QCC). The last phase implements the algorithm on a quantum device or simulator. Fig3: Quantum Computing Layered Architeutre 4.1 Ongoing Research in Quantum Computing Researchers in industry and government labs are exploring various aspects of quantum design and automation with a wide range of applications. In addition to the examples described below, universities in the US, Canada, Europe, Japan, and China are carrying out much broader efforts.
  • 4. Quantum communication and quantum computing www.iosrjournals.org 33 | Page 4.1.1 BBN Technologies Based in Cambridge, Massachusetts, BBN Technologies (www.bbn.com) developed the world’s first quantum key distribution (QKD) network with funding from the US Defense Advanced Research Projects Agency.The fiber-optical DARPA Quantum Network offers 24x7 quantum cryptography to secure standard Internet traffic such as Web browsing, e-commerce, and streaming video. 4.1.2 D-Wave Systems Located in Vancouver, British Columbia, Canada, D-Wave Systems (www.dwavesys.com) builds superconductor-based software-programmable custom integrated circuits for quantum optimization algorithms and quantum-physical simulations. These ICs form the heart of a quantum computing system designed to deliver massively more powerful and faster performance for cryptanalysis,logistics,bioinformatics,and other applications. 4.1.3 Hewlett-Packard The Quantum Science Research Group at HP Labs in Palo Alto,California,is exploring nanoscale quantum optics for information- processing applications (www.hpl.hp.com/research/qsr). In addition, the Quantum Information Processing Group at the company’s research facility in Bristol, UK, is studying quantum computation, cryptography, and teleportation and communication (www.hpl.hp. com/research/qip). 4.1.4 Hypres Located in Elmsford, New York, Hypres Inc. (www.hypres.com) is the leading developer of superconducting digital for wireless and optical communication. Based on rapid singleflux quantum logic, these circuits have achieved gate speeds up to 770 GHz in the laboratory. 4.1.5 IBM Research Scientists at IBM’s Almaden Research Center in California and the T.J.Watson Research Center’s Yorktown office in New York developed a nuclear magnetic resonance (NMR) quantum computer that factored 15 into 3 5 (http://archives.cnn.com/ 2000/TECH/computing/08/15/quantum.reut). Researchers at the Watson facility and the Zurich Research Lab are also developing Josephson junction quantum devices (www. research.ibm. com/ss_computing) as well as studying quantum information theory (www.research.ibm.com/quantuminfo). 4.1.6 Id Quantique Based in Geneva, Switzerland, id Quantique (www.idquantique. com) is a leading provider of quantum cryptography solutions, including wire-speed link encryptors, QKD appliances, a turnkey service for securing communication transfers, and quantum random number generators.The company’s optical instrumentation product portfolio includes single-photon counters and short-pulse laser sources. 4.1.7 Los Alamos National Lab The Los Alamos National Lab (http://qso.lanl.gov/qc) in New Mexico is studying quantum-optical long-distance secure communications and QKD for satellite communications. It has also conducted groundbreaking work on quantum error correction, decoherence, quantum teleportation, and the adaptation of NMR technology to quantum information processing. 4.1.8 Magiq Technologies MagiQ Technologies (www.magiqtech.com), headquartered in New York City, launched the world’s first commercial quantum cryptography device in 2003. MagiQ Quantum Private Network systems incorporate QKD over metro-area fiberoptic links to protect against both cryptographic deciphering and industrial espionage. 4.1.9 NEC Labs Scientists at NEC’s Fundamental and Environmental Research Laboratories in Japan, in collaboration with the Riken Institute of Physical and Chemical Research, have demonstrated a basic quantum circuit in a solid-state quantum device (www.labs.nec.co.jp/Eng/innovative/E3/top.html). Recently, NEC researchers have also been involved in realizing the fastest fortnight-long, continuous quantum cryptography final-key generation.
  • 5. Quantum communication and quantum computing www.iosrjournals.org 34 | Page 4.1.10 NIST Established in 2000, the Quantum Information Program at the US National Institute of Standards and Technology (http:// qubit.nist.gov) is building a prototype 10-qubit quantum processor— made of trapped ions, neutral atoms, or “artificial atoms” made of superconducting electrical circuits—to provide a proofin- principle of quantum information processing. Researchers at the program’s facilities in Boulder,Colorado, and Gaithersburg, Maryland, are also developing a high-speed QKD system with efficient and precise single-photon sources and detectors. 4.1.11 NTT Basic Research Labs NTT’s Superconducting Quantum Physics Research Group in Japan focuses on the development of quantum cryptography protocols (www.brl.ntt.co.jp/group/shitsuryo-g/qc). In particular, they have exhibited quantum cryptography using a single photon realized in a photonic network of optical fibers. 5.1 Future Outlook At present, quantum computers and quantum information technology remains in its pioneering stage. At this very moment obstacles are being surmounted that will provide the knowledge needed to thrust quantum computers up to their rightful position as the fastest computational machines in existence. Error correction has made promising progress to date, nearing a point now where we may have the tools required to build a computer robust enough to adequately withstand the effects of decoherence. Quantum hardware, on the other hand, remains an emerging field, but the work done thus far suggests that it will only be a matter time before we have devices large enough to test Shor's and other quantum algorithms. Thereby, quantum computers will emerge as the superior computational devices at the very least, and perhaps one day make today's modern computer obsolete. Quantum computation has its origins in highly specialized fields of theoretical physics, but its future undoubtedly lies in the profound effect it will have on the lives of all mankind. Fig 4 IV. Conclusion The field of quantum computing is growing rapidly as many of today's leading computing groups, universities, colleges, and all the leading IT vendors are researching the topic. This pace is expected to increase as more research is turned into practical applications. Although practical machines lie years in the future, this formerly fanciful idea is gaining plausibility. The current challenge is not to build a full quantum computer right away; instead to move away from the experiments in which we merely observe quantum phenomena to experiments in which we can control these phenomena. Systems in which information obeys the laws of quantum mechanics could far exceed the performance of any conventional computer. Therein lies the opportunity and the reward. No one can predict when we will build the first quantum computer; it could be this year, perhaps in the next 10 years, or centuries from now. Obviously, this mind-boggling level of computing power has enormous commercial, industrial, and scientific applications, but there are some significant technological and conceptual issue to resolve first. But quantum computers will come. References [1] Jacob west http://www.cs.rice.edu/~taha/teaching/05F/210/news/2005_09_16.htm [2] Jozef Gruska http://www.fi.muni.cz/usr/gruska/quantum/chapters.html [3] Julian Voss-Andreae's "Quantum Objects http://physics.about.com/od/quantumphysics/f/quantumcomp.html [4] Pearson IBM press http://www.ibmpressbooks.com/articles/article.asp?p=374693&seqNum=6 [5] Scott Aaronson MIT, Dave Bacon University of Washington https://www.google.co.in/url?sa=t&rct=j&q=&esrc=s&source=web&cd=1&cad=rja&ved=0CDIQFjAA&url=http%3A%2F%2Fww w.cra.org%2Fccc%2Ffiles%2Fdocs%2Finit%2FQuantum_Computing.pdf&ei=GuhcUuLKFsmArgfpuICQAg&usg=AFQjCNGr2N l1e-w2s4j888JDZ7QD1-A9dA&sig2=9OCHbjLAddhd-QUzES9MCA [6] Svore-aho-cross-chuang-markovhttp://research.microsoft.com/pubs/144689/qc-svore-aho-cross-chuang-markov-computer- magazine-article-a-layered-software-architecture-for-quantum-computing-design-tools-jan06-svore.pdf [7] University of OXFORD http://www.maths.ox.ac.uk/groups/mathematical-physics/research-areas/quantum-information [8] Webopedia http://www.webopedia.com/TERM/Q/quantum_computing.html