SlideShare a Scribd company logo
1 of 75
Quantum  Information  and the  Importance  of  Basic  Research Charles H. Bennett IBM Research Yorktown NIT Warangal  Videoconference 25 Sep 2009
Computational complexity of physical states and evolutions Information carrying capacity of physical interactions Physical (e.g. thermodynamic) resources required for communication and computation
 
Some computations require a great many intermediate steps to get to the answer.  Factoring large numbers is thought to require more than polynomial time.  Classical Computation Theory shows how to reduce all computations to a sequence of NANDs and Fanouts.  It classifies problems into solvable and unsolvable, and among the solvable ones classifies them by the resources (e.g. time, memory, luck) required to solve them.  Complexity classes P, NP, PSPACE…
a b a a XOR b a a b b c c XOR (a AND b) XOR  gate Toffoli gate Conventional computer logic uses irreversible gates, eg NAND, but these can be simulated by reversible gates.  Toffoli gate is universal.  Reversible gates were used to show that computation is  thermodynamically reversible  in principle.  Now they are used for  quantum computation . self-inverse NAND gate a b NOT(a AND b) no inverse a Fanout
Logical Reversibility and Thermodynamics ,[object Object],[object Object]
Ordinary irreversible computation can be viewed as an approxi-mation or idealization,  often quite justified, in which one considers only the evolution of the computational degrees of freedom and neglects the cost of exporting entropy to the environment.
RNA Polymerase may be viewed as a reversible tape-copying Turing machine.  The chemical reaction is reversible, but in vivo it is driven forward by removal of PP.
In vitro, by adjusting PP vs XTP concentrations, the copying can be made to drift forward or backward while dissipating  <  kT dissipation per step.
Reversible clockwork computer I invented in 1982 (highly impractical)
A Bigger change of Mindset:   Quantum Information
or EPR state
 
Ordinary classical information, such as one finds in a book, can be copied at will and is not disturbed by reading it. ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],But unlike dreams, quantum information obeys well-known laws. Quantum information is more like the information in a dream
 
 
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
 
Measuring an unknown photon’s polarization exactly is impossible (no measurement can yield more than 1 bit about it). Cloning an unknown photon is impossible.  (If either cloning or measuring were possible the other would be also). If you try to amplify an unknown photon by sending it into an ideal laser, the output will be polluted by just enough noise (due to spontaneous emission) to be no more useful than the input in figuring out what the original photon’s polarization was. 28.3 o
Cryptography:  the  One Time Pad   allows messages to be transmitted  in absolute privacy over public channels,  but requires the sender and receiver to have shared secret random data (“key”) beforehand.  One key digit is used  up for each message digit sent.  The key cannot be reused. If it, system becomes insecure.  Message Cryptogram Key delivered securely beforehand +  Key = Cryptogram transmitted publicly Cryptogram    Key = Message One time pad worksheet used by Che Guevara   message key cryptogram
In the end, Alice and Bob will either agree on a shared secret key, or else they will detect that there has been too much eavesdropping to do so safely.  They will not, except with exponentially low probability, agree on a key that is not secret.  Quantum Cryptography avoids the need to hand-deliver the key.
First quantum cryptography paper was presented not far away from here in 1984
 
Original Quantum Cryptographic Apparatus built in 1989 transmitted information secretly over a distance of about 30 cm. Senders side produces very faint green light pulses of 4 different polarizations Quantum channel is an empty space about 30 cm long. There is no Eavesdropper, but if there were she would be detected. Calcite separates polarizations.  Photomultipliers A and B detect single photons.
Modern Quantum  Crypto Key Distribution at  University of  Geneva Also experiments at several other labs, and two commercial QKD systems.
So far, all commercial QKD equipment has taken the form of boring rectangular metal boxes.  Sales have been less than anticipated. Perhaps some new ideas are needed.  ID-Quantique MagiQ Technologies
Frogs, if cooled to 5 o C to reduce thermal noise in their retinas, can see single photons.  This raises the possibility of an all-natural quantum cryptography system,
or EPR state
 
 
 
“ Violation of Bell’s Inequality”
 
 
[object Object],[object Object],[object Object]
unknown quantum state teleported state BBCJPW ’93
A classical channel is a quantum channel with an eavesdropper . A classical computer is a quantum computer handicapped by having eavesdroppers on all its wires.
Fast Quantum Computation (Grover algorithm) (Shor algorithm) (For a quantum computer, factoring is about as easy as multiplication, due to the availability of  entangled  intermediate states.) (For a classical computer, factoring appears to be exponentially harder than multiplication, by the best known algorithms.)
A Computer can be compared to a Stomach Classical  Computer Quantum Computer n -bit input n -bit output Because of the superposition principle and the possibility of entanglement, the intermediate  state of an n-qubit quantum computer state  requires  2 n   complex numbers to describe,  giving a lot more room for maneuvering  a |0000>+ b |0001>+ c |0010>+ d |0011>+… n -bit intermediate  state e.g.  0100
How Much Information is “contained in”  n  qubits, compared to  n  classical bits, or  n  analog variables? Digital  Analog  Quantum Information  required  to specify a state  Information  extractable from state n  bits  n  bits 2 n  complex numbers n  bits n  real numbers n  real numbers Good error  correction  yes  no  yes
This 7 qubit molecule was used to factor 15 4
Physical systems actively considered for quantum computer implementation ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
The Downside of Entanglement
 
Quantum Fault Tolerant Computation  Clean qubits are brought into interaction with the quantum data to siphon off errors, even those that occur during error correction itself.
CMOS Device Performance The end of Moore’s law for conventional hardware is widely predicted on fundamental physical grounds.  Can quantum computers give Moore’s law a new lease on life?  If so, how soon will we have them?
[object Object],[object Object],[object Object],[object Object],[object Object]
BQP NP PSPACE NP Complete (e.g. Traveling Salesman, Frustrated classical ground state) Factoring Simulating  quantum  many-body  dynamics  (even  Fermions*)  QMA-complete (e.g.  Frustrated quantum ground state) Problems thought to be hard for a classical computer,  but easy for  a quantum computer Easy for a classical computer Problems thought to be hard even for a quantum computer Multiplication P Find Stationary State of a Dissipative System,  Classical or Quantum *Bravyi & Kitaev quant-ph/003137, Ortiz et al cond-mat/0012334
[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
Science as a career ,[object Object],[object Object],[object Object],[object Object],[object Object],[object Object]
It was once generally believed that computation had a minimal energy cost of order k B T ln 2 per step (roughly the mean thermal energy of a molecule at ambient temperature T).  Now computation is known to be thermodynamically reversible.  Quantum effects in computers and communications systems were once thought of as merely a nuisance, making small devices less reliable than their larger cousins.  Now they are known to be a valuable resource for both communication and computation, and indeed for understanding the nature of information itself.
Discounting the future Individuals and institutions tend to plan ahead about as far in time as they can reasonably predict.  For politicians this is usually until the next election. We scarcely think about the very distant future, and plan ahead less when current conditions are chaotic and unpredictable.  Lunch time conversation between two astronomers First Astronomer:  “…of course the Sun will only last another 5 billion years or so.” Second Astronomer  (quite upset):   “ What? ” First Astronomer : “I said the Sun will last 5 billion years.” Second Astronomer  (relieved): “Oh!  I thought you’d said  5  million  years .”
Reminiscence of a retired engineer at NASA’s Jet Propulsion Lab whose proudest accomplishment, many years earlier, had been working on the power supplies for the two Voyager spacecraft.  As I recall he said roughly the following: We wanted to have the Voyagers visit all the big planets.  NASA said, “No. Just Jupiter and Saturn.  People don’t care about Uranus and Neptune.”  We said, “If we don’t do it now, the planets won’t be properly aligned to do it again for another 200 years.”  They said, “Legislators understand 2 years, not 200 years. You are only authorized for Jupiter and Saturn.”  So we designed all the systems very conservatively, on the pretext of being conservative, but with the intention of giving  the Voyagers enough power, fuel, and maneuvering and communication ability to go on to visit and photograph Uranus and Neptune, which they ultimately did to everyone’s great satisfaction.
Voyager Photos of Neptune  Bottom Picture Caption August 21, 1989 P-34632C Voyager 2-N32C This image of clouds in Neptune's atmosphere is the first that tests the accuracy of the weather forecast that was made eight days earlier to select targets for the Voyager narrow-angle camera. Three of the four targeted features are visible in this photograph; all three are close to their predicted locations. The Great Dark Spot with its bright white companion is slightly to the left of center. The small bright Scooter is below and to the left, and the second dark spot with its bright core is below the Scooter. Strong eastward winds -- up to 400 mph -- cause the second dark spot to overtake and pass the larger one every five days. The spacecraft was 6.1 million kilometers (3.8 million miles) from the planet at the time of camera shuttering, and the image uses the orange, green and clear filters of the camera. The Voyager Mission is conducted by JPL for NASA's Office of Space Science and Applications.
Surface of Triton, Neptune’s largest moon
 
Quantum Laws & the Universality of Interaction
Classically, there are distinct kinds of interaction that cannot be substituted for one another.  For example, if I’m a speaker and you’re a member my audience, no amount of talking by me enables you to ask me a question. Quantumly, interactions are intrinsically bidirectional. Indeed there is only one kind of interaction, in the sense that any interaction between two systems can be used to simulate any other. One way in which quantum laws are simpler than classical is the universality of interaction.
 
 
 
 
How do Quantum Speedups Work?
Fast Quantum Computation Shor’s algorithm – exponential speedup of factoring – Depends on fast quantum technique for finding the period of a periodic function  Grover’s algorithm – quadratic speedup of search – works by gradually focusing an initially uniform superposition over all candidates into one concentrated on the designated element. Speedup arises from the fact that a linear growth of the amplitude of the desired element in the superposition causes a quadratic growth in the element’s probability.
Well-known facts from number theory.  Let  N  be a number we are trying to factor. For each  a<N,   the function  f a ( x )  =   a x   mod  N  is periodic with period at most N.  Moreover it is easy to calculate.  Let its period be  r a  .  All known classical ways of finding  r a  from  a  are hard.  Any algorithm for calculating  r a  from   a  can be converted to an algorithm for factoring  N. Quantum mechanics makes this calculation easy.
 
2 Slits  1 photon Shor algorithm uses interference to find unknown period of periodic function. N Slits  1 photon Photon impact point yields a little information about slit spacing Photon impact point yields a lot of information about slit spacing
Grover’s quantum search algorithm uses about  √ N  steps to find a unique marked item in a list of  N  elements, where classically  N  steps would be required. In an optical analog, phase plates with a bump at the marked location alternate with fixed optics to steer an initially uniform beam into a beam wholly concentrated at a location corresponding to the bump on the phase plate.  If there are  N  possible bump locations, about  √ N  iterations are required. P = phase plate F = fixed optics Same optical setup works even with a single photon, so after about  √ N   iterations it would be directed to the right location.
Optimality of Grover’s Algorithm:  Why can’t it work in 1 iteration? Repeat the experiment with the phase bump in a different location. Original optical Grover experiment. Because most of the beam misses the bump in either location, the difference between the two light fields can increase only slowly. About √ N  iterations are required to get complete separation.  (BBBV quant-ph/9701001) Small difference after 1 iteration No difference initially
Mask out all but desired area.  Has disadvantage that most of the light is wasted. Like classical trial and error.  If only 1 photon used each time, N tries would be needed. Non-iterative ways to aim a light beam.  Lens:  Concentrates all the light in one pass, but to use a lens is cheating.  Unlike a Grover iteration or a phase plate or mask, a lens steers all parts of the beam, not just those passing through the distinguished location.
How would a working quantum computer change the world?  Exponential speedup of factoring and related problems of mainly cryptographic interest.  Known public key cryptosystems would be broken. Digital signatures broken.  Secret key systems (e.g. DES) still probably OK but would need double the key size.  (Some public key functionality can be replaced by unconditionally secure quantum cryptography.) Exponential speedup for simulating quantum physics. Quadratic speedup for optimization problems like travelling salesman.  No good reason to hope for exponential speedup. No speedup for some other problems.
Fast quantum protocol for the lunch scheduling problem is a distributed form of Grover’s algorithm.  A register of log  N  qubits, initially containing a uniform superposition of all dates, is passed back and forth between the two parties about  √ N  times, gradually building up amplitude on a conflict-free date.  1. Quantum Savings in  Communication Complexity   What else is quantum information good for?
 
Prior shared entanglement helps a good deal if Alice and Bob are trying to hold a quiet conversation in a room full of noisy strangers (Gaussian channel in low signal, high noise, low-attenuation limit) ..seulement avec un … ..blah…blah…blah... wahrscheinlich .then suddenly she swerved.. .because they were on their first date .for example, if you want it sweeter,… I love you ..but without his other kidney.. forever. Don’t ask.
I love you But it doesn’t help much if they are far apart in an empty room (attenuation) What?

More Related Content

What's hot (20)

Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Seminar report on quantum computing
Seminar report on quantum computingSeminar report on quantum computing
Seminar report on quantum computing
 
Cryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptxCryptography & Quantum Computing.pptx
Cryptography & Quantum Computing.pptx
 
Quantum computing presentation 200115
Quantum computing presentation 200115Quantum computing presentation 200115
Quantum computing presentation 200115
 
QuantumComputersPresentation
QuantumComputersPresentationQuantumComputersPresentation
QuantumComputersPresentation
 
Shor’s algorithm the ppt
Shor’s algorithm the pptShor’s algorithm the ppt
Shor’s algorithm the ppt
 
Quantum computers by Emran
Quantum computers by EmranQuantum computers by Emran
Quantum computers by Emran
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Algorithms @ work - Short introduction to Quantum Annealing and opera...
Quantum Algorithms @ work - Short introduction to Quantum Annealing and opera...Quantum Algorithms @ work - Short introduction to Quantum Annealing and opera...
Quantum Algorithms @ work - Short introduction to Quantum Annealing and opera...
 
Introduction a l’Ordinateur Quantique
Introduction a l’Ordinateur QuantiqueIntroduction a l’Ordinateur Quantique
Introduction a l’Ordinateur Quantique
 
Quantum Technology
Quantum TechnologyQuantum Technology
Quantum Technology
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum Computing ppt
Quantum Computing  pptQuantum Computing  ppt
Quantum Computing ppt
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Presentation quantum computers
Presentation quantum computersPresentation quantum computers
Presentation quantum computers
 

Viewers also liked

Ph ddefenseamri
Ph ddefenseamriPh ddefenseamri
Ph ddefenseamritamriquant
 
Hagelin Invincibility Chart Hr
Hagelin Invincibility Chart HrHagelin Invincibility Chart Hr
Hagelin Invincibility Chart HrAMTR
 
W3C Analyst pre-briefing presentation
W3C Analyst pre-briefing presentationW3C Analyst pre-briefing presentation
W3C Analyst pre-briefing presentationQubit
 
Swapping between Two Nonorthogonal Entangled Coherent States (and Branching o...
Swapping between Two Nonorthogonal Entangled Coherent States (and Branching o...Swapping between Two Nonorthogonal Entangled Coherent States (and Branching o...
Swapping between Two Nonorthogonal Entangled Coherent States (and Branching o...Vasudha Pande
 
Would you bet your job on your A/B test results?
Would you bet your job on your A/B test results?Would you bet your job on your A/B test results?
Would you bet your job on your A/B test results?Qubit
 
Teleportation of a Tripartite Entangled Coherent State
Teleportation of a Tripartite Entangled Coherent StateTeleportation of a Tripartite Entangled Coherent State
Teleportation of a Tripartite Entangled Coherent StateVasudha Pande
 
How to win with tag management
How to win with tag managementHow to win with tag management
How to win with tag managementQubit
 
Introduction to Quantum Secret Sharing
Introduction to Quantum Secret SharingIntroduction to Quantum Secret Sharing
Introduction to Quantum Secret SharingArunabha Saha
 
Quantum Information with Continuous Variable systems
Quantum Information with Continuous Variable systemsQuantum Information with Continuous Variable systems
Quantum Information with Continuous Variable systemskarl3s
 
Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurementwtyru1989
 
Quantum Computers New Generation of Computers part 6 by Prof Lili Saghafi
Quantum Computers New Generation of Computers part 6 by Prof Lili SaghafiQuantum Computers New Generation of Computers part 6 by Prof Lili Saghafi
Quantum Computers New Generation of Computers part 6 by Prof Lili SaghafiProfessor Lili Saghafi
 
Logic gates using quantum dots
Logic gates using quantum dotsLogic gates using quantum dots
Logic gates using quantum dotsRohit Kumar Mandal
 
Applications of Quantum Entanglement Presentation
Applications of Quantum Entanglement PresentationApplications of Quantum Entanglement Presentation
Applications of Quantum Entanglement PresentationParis-Anne O'Shea
 
Introduction to Quantum Teleportation & BBCJPW Protocol
Introduction to Quantum Teleportation & BBCJPW ProtocolIntroduction to Quantum Teleportation & BBCJPW Protocol
Introduction to Quantum Teleportation & BBCJPW ProtocolArunabha Saha
 
Quantum entanglement
Quantum entanglementQuantum entanglement
Quantum entanglementAKM666
 
Qubit Bright Sparks #2: Fast consumer, faster company
Qubit Bright Sparks #2: Fast consumer, faster companyQubit Bright Sparks #2: Fast consumer, faster company
Qubit Bright Sparks #2: Fast consumer, faster companyQubit
 

Viewers also liked (20)

Ph ddefenseamri
Ph ddefenseamriPh ddefenseamri
Ph ddefenseamri
 
Hagelin Invincibility Chart Hr
Hagelin Invincibility Chart HrHagelin Invincibility Chart Hr
Hagelin Invincibility Chart Hr
 
W3C Analyst pre-briefing presentation
W3C Analyst pre-briefing presentationW3C Analyst pre-briefing presentation
W3C Analyst pre-briefing presentation
 
Swapping between Two Nonorthogonal Entangled Coherent States (and Branching o...
Swapping between Two Nonorthogonal Entangled Coherent States (and Branching o...Swapping between Two Nonorthogonal Entangled Coherent States (and Branching o...
Swapping between Two Nonorthogonal Entangled Coherent States (and Branching o...
 
Quantum teleportation
Quantum teleportationQuantum teleportation
Quantum teleportation
 
Would you bet your job on your A/B test results?
Would you bet your job on your A/B test results?Would you bet your job on your A/B test results?
Would you bet your job on your A/B test results?
 
Teleportation of a Tripartite Entangled Coherent State
Teleportation of a Tripartite Entangled Coherent StateTeleportation of a Tripartite Entangled Coherent State
Teleportation of a Tripartite Entangled Coherent State
 
How to win with tag management
How to win with tag managementHow to win with tag management
How to win with tag management
 
Introduction to Quantum Secret Sharing
Introduction to Quantum Secret SharingIntroduction to Quantum Secret Sharing
Introduction to Quantum Secret Sharing
 
Quantum Information with Continuous Variable systems
Quantum Information with Continuous Variable systemsQuantum Information with Continuous Variable systems
Quantum Information with Continuous Variable systems
 
Lezione1 ab
Lezione1 abLezione1 ab
Lezione1 ab
 
Uk quantum teleportation3
Uk quantum teleportation3Uk quantum teleportation3
Uk quantum teleportation3
 
Quantum optical measurement
Quantum optical measurementQuantum optical measurement
Quantum optical measurement
 
Quantum Computers New Generation of Computers part 6 by Prof Lili Saghafi
Quantum Computers New Generation of Computers part 6 by Prof Lili SaghafiQuantum Computers New Generation of Computers part 6 by Prof Lili Saghafi
Quantum Computers New Generation of Computers part 6 by Prof Lili Saghafi
 
Logic gates using quantum dots
Logic gates using quantum dotsLogic gates using quantum dots
Logic gates using quantum dots
 
Applications of Quantum Entanglement Presentation
Applications of Quantum Entanglement PresentationApplications of Quantum Entanglement Presentation
Applications of Quantum Entanglement Presentation
 
Quantum Teleportation : Theory and Experiment
Quantum Teleportation : Theory and ExperimentQuantum Teleportation : Theory and Experiment
Quantum Teleportation : Theory and Experiment
 
Introduction to Quantum Teleportation & BBCJPW Protocol
Introduction to Quantum Teleportation & BBCJPW ProtocolIntroduction to Quantum Teleportation & BBCJPW Protocol
Introduction to Quantum Teleportation & BBCJPW Protocol
 
Quantum entanglement
Quantum entanglementQuantum entanglement
Quantum entanglement
 
Qubit Bright Sparks #2: Fast consumer, faster company
Qubit Bright Sparks #2: Fast consumer, faster companyQubit Bright Sparks #2: Fast consumer, faster company
Qubit Bright Sparks #2: Fast consumer, faster company
 

Similar to Quantum Information Importance Basic Research

Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computerskathan
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implicationsInnoTech
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computingIOSR Journals
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptxgitrahekno
 
Quantum computers
Quantum computersQuantum computers
Quantum computerskavya1219
 
Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115domenico di mola
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum ComputingKeshav
 
Seminar on quatum
Seminar on quatumSeminar on quatum
Seminar on quatumaprameyabr1
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computingJai Sipani
 
Quantum computing
Quantum computingQuantum computing
Quantum computingJulien33x
 
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALAA Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALASaikiran Panjala
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminarPankaj Kumar
 

Similar to Quantum Information Importance Basic Research (20)

Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Quantum comput ing
Quantum comput ingQuantum comput ing
Quantum comput ing
 
Quantum computing1
Quantum computing1Quantum computing1
Quantum computing1
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Information FINAL.pptx
Quantum Information FINAL.pptxQuantum Information FINAL.pptx
Quantum Information FINAL.pptx
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Seminar on quatum
Seminar on quatumSeminar on quatum
Seminar on quatum
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Xim $%
Xim $%Xim $%
Xim $%
 
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALAA Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
A Technical Seminar on Quantum Computers By SAIKIRAN PANJALA
 
Quantum computing seminar
Quantum computing seminarQuantum computing seminar
Quantum computing seminar
 
preskill.pptx
preskill.pptxpreskill.pptx
preskill.pptx
 
Ppt of nanocomputing
Ppt of nanocomputingPpt of nanocomputing
Ppt of nanocomputing
 

Recently uploaded

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationRidwan Fadjar
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDGMarianaLemus7
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
My Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 PresentationMy Hashitalk Indonesia April 2024 Presentation
My Hashitalk Indonesia April 2024 Presentation
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
APIForce Zurich 5 April Automation LPDG
APIForce Zurich 5 April  Automation LPDGAPIForce Zurich 5 April  Automation LPDG
APIForce Zurich 5 April Automation LPDG
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Quantum Information Importance Basic Research

  • 1. Quantum Information and the Importance of Basic Research Charles H. Bennett IBM Research Yorktown NIT Warangal Videoconference 25 Sep 2009
  • 2. Computational complexity of physical states and evolutions Information carrying capacity of physical interactions Physical (e.g. thermodynamic) resources required for communication and computation
  • 3.  
  • 4. Some computations require a great many intermediate steps to get to the answer. Factoring large numbers is thought to require more than polynomial time. Classical Computation Theory shows how to reduce all computations to a sequence of NANDs and Fanouts. It classifies problems into solvable and unsolvable, and among the solvable ones classifies them by the resources (e.g. time, memory, luck) required to solve them. Complexity classes P, NP, PSPACE…
  • 5. a b a a XOR b a a b b c c XOR (a AND b) XOR gate Toffoli gate Conventional computer logic uses irreversible gates, eg NAND, but these can be simulated by reversible gates. Toffoli gate is universal. Reversible gates were used to show that computation is thermodynamically reversible in principle. Now they are used for quantum computation . self-inverse NAND gate a b NOT(a AND b) no inverse a Fanout
  • 6.
  • 7. Ordinary irreversible computation can be viewed as an approxi-mation or idealization, often quite justified, in which one considers only the evolution of the computational degrees of freedom and neglects the cost of exporting entropy to the environment.
  • 8. RNA Polymerase may be viewed as a reversible tape-copying Turing machine. The chemical reaction is reversible, but in vivo it is driven forward by removal of PP.
  • 9. In vitro, by adjusting PP vs XTP concentrations, the copying can be made to drift forward or backward while dissipating < kT dissipation per step.
  • 10. Reversible clockwork computer I invented in 1982 (highly impractical)
  • 11. A Bigger change of Mindset: Quantum Information
  • 13.  
  • 14.
  • 15.  
  • 16.  
  • 17.
  • 18.  
  • 19. Measuring an unknown photon’s polarization exactly is impossible (no measurement can yield more than 1 bit about it). Cloning an unknown photon is impossible. (If either cloning or measuring were possible the other would be also). If you try to amplify an unknown photon by sending it into an ideal laser, the output will be polluted by just enough noise (due to spontaneous emission) to be no more useful than the input in figuring out what the original photon’s polarization was. 28.3 o
  • 20. Cryptography: the One Time Pad allows messages to be transmitted in absolute privacy over public channels, but requires the sender and receiver to have shared secret random data (“key”) beforehand. One key digit is used up for each message digit sent. The key cannot be reused. If it, system becomes insecure. Message Cryptogram Key delivered securely beforehand + Key = Cryptogram transmitted publicly Cryptogram  Key = Message One time pad worksheet used by Che Guevara message key cryptogram
  • 21. In the end, Alice and Bob will either agree on a shared secret key, or else they will detect that there has been too much eavesdropping to do so safely. They will not, except with exponentially low probability, agree on a key that is not secret. Quantum Cryptography avoids the need to hand-deliver the key.
  • 22. First quantum cryptography paper was presented not far away from here in 1984
  • 23.  
  • 24. Original Quantum Cryptographic Apparatus built in 1989 transmitted information secretly over a distance of about 30 cm. Senders side produces very faint green light pulses of 4 different polarizations Quantum channel is an empty space about 30 cm long. There is no Eavesdropper, but if there were she would be detected. Calcite separates polarizations. Photomultipliers A and B detect single photons.
  • 25. Modern Quantum Crypto Key Distribution at University of Geneva Also experiments at several other labs, and two commercial QKD systems.
  • 26. So far, all commercial QKD equipment has taken the form of boring rectangular metal boxes. Sales have been less than anticipated. Perhaps some new ideas are needed. ID-Quantique MagiQ Technologies
  • 27. Frogs, if cooled to 5 o C to reduce thermal noise in their retinas, can see single photons. This raises the possibility of an all-natural quantum cryptography system,
  • 29.  
  • 30.  
  • 31.  
  • 32. “ Violation of Bell’s Inequality”
  • 33.  
  • 34.  
  • 35.
  • 36. unknown quantum state teleported state BBCJPW ’93
  • 37. A classical channel is a quantum channel with an eavesdropper . A classical computer is a quantum computer handicapped by having eavesdroppers on all its wires.
  • 38. Fast Quantum Computation (Grover algorithm) (Shor algorithm) (For a quantum computer, factoring is about as easy as multiplication, due to the availability of entangled intermediate states.) (For a classical computer, factoring appears to be exponentially harder than multiplication, by the best known algorithms.)
  • 39. A Computer can be compared to a Stomach Classical Computer Quantum Computer n -bit input n -bit output Because of the superposition principle and the possibility of entanglement, the intermediate state of an n-qubit quantum computer state requires 2 n complex numbers to describe, giving a lot more room for maneuvering a |0000>+ b |0001>+ c |0010>+ d |0011>+… n -bit intermediate state e.g. 0100
  • 40. How Much Information is “contained in” n qubits, compared to n classical bits, or n analog variables? Digital Analog Quantum Information required to specify a state Information extractable from state n bits n bits 2 n complex numbers n bits n real numbers n real numbers Good error correction yes no yes
  • 41. This 7 qubit molecule was used to factor 15 4
  • 42.
  • 43. The Downside of Entanglement
  • 44.  
  • 45. Quantum Fault Tolerant Computation Clean qubits are brought into interaction with the quantum data to siphon off errors, even those that occur during error correction itself.
  • 46. CMOS Device Performance The end of Moore’s law for conventional hardware is widely predicted on fundamental physical grounds. Can quantum computers give Moore’s law a new lease on life? If so, how soon will we have them?
  • 47.
  • 48. BQP NP PSPACE NP Complete (e.g. Traveling Salesman, Frustrated classical ground state) Factoring Simulating quantum many-body dynamics (even Fermions*) QMA-complete (e.g. Frustrated quantum ground state) Problems thought to be hard for a classical computer, but easy for a quantum computer Easy for a classical computer Problems thought to be hard even for a quantum computer Multiplication P Find Stationary State of a Dissipative System, Classical or Quantum *Bravyi & Kitaev quant-ph/003137, Ortiz et al cond-mat/0012334
  • 49.
  • 50.
  • 51. It was once generally believed that computation had a minimal energy cost of order k B T ln 2 per step (roughly the mean thermal energy of a molecule at ambient temperature T). Now computation is known to be thermodynamically reversible. Quantum effects in computers and communications systems were once thought of as merely a nuisance, making small devices less reliable than their larger cousins. Now they are known to be a valuable resource for both communication and computation, and indeed for understanding the nature of information itself.
  • 52. Discounting the future Individuals and institutions tend to plan ahead about as far in time as they can reasonably predict. For politicians this is usually until the next election. We scarcely think about the very distant future, and plan ahead less when current conditions are chaotic and unpredictable. Lunch time conversation between two astronomers First Astronomer: “…of course the Sun will only last another 5 billion years or so.” Second Astronomer (quite upset): “ What? ” First Astronomer : “I said the Sun will last 5 billion years.” Second Astronomer (relieved): “Oh! I thought you’d said 5 million years .”
  • 53. Reminiscence of a retired engineer at NASA’s Jet Propulsion Lab whose proudest accomplishment, many years earlier, had been working on the power supplies for the two Voyager spacecraft. As I recall he said roughly the following: We wanted to have the Voyagers visit all the big planets. NASA said, “No. Just Jupiter and Saturn. People don’t care about Uranus and Neptune.” We said, “If we don’t do it now, the planets won’t be properly aligned to do it again for another 200 years.” They said, “Legislators understand 2 years, not 200 years. You are only authorized for Jupiter and Saturn.” So we designed all the systems very conservatively, on the pretext of being conservative, but with the intention of giving the Voyagers enough power, fuel, and maneuvering and communication ability to go on to visit and photograph Uranus and Neptune, which they ultimately did to everyone’s great satisfaction.
  • 54. Voyager Photos of Neptune Bottom Picture Caption August 21, 1989 P-34632C Voyager 2-N32C This image of clouds in Neptune's atmosphere is the first that tests the accuracy of the weather forecast that was made eight days earlier to select targets for the Voyager narrow-angle camera. Three of the four targeted features are visible in this photograph; all three are close to their predicted locations. The Great Dark Spot with its bright white companion is slightly to the left of center. The small bright Scooter is below and to the left, and the second dark spot with its bright core is below the Scooter. Strong eastward winds -- up to 400 mph -- cause the second dark spot to overtake and pass the larger one every five days. The spacecraft was 6.1 million kilometers (3.8 million miles) from the planet at the time of camera shuttering, and the image uses the orange, green and clear filters of the camera. The Voyager Mission is conducted by JPL for NASA's Office of Space Science and Applications.
  • 55. Surface of Triton, Neptune’s largest moon
  • 56.  
  • 57. Quantum Laws & the Universality of Interaction
  • 58. Classically, there are distinct kinds of interaction that cannot be substituted for one another. For example, if I’m a speaker and you’re a member my audience, no amount of talking by me enables you to ask me a question. Quantumly, interactions are intrinsically bidirectional. Indeed there is only one kind of interaction, in the sense that any interaction between two systems can be used to simulate any other. One way in which quantum laws are simpler than classical is the universality of interaction.
  • 59.  
  • 60.  
  • 61.  
  • 62.  
  • 63. How do Quantum Speedups Work?
  • 64. Fast Quantum Computation Shor’s algorithm – exponential speedup of factoring – Depends on fast quantum technique for finding the period of a periodic function Grover’s algorithm – quadratic speedup of search – works by gradually focusing an initially uniform superposition over all candidates into one concentrated on the designated element. Speedup arises from the fact that a linear growth of the amplitude of the desired element in the superposition causes a quadratic growth in the element’s probability.
  • 65. Well-known facts from number theory. Let N be a number we are trying to factor. For each a<N, the function f a ( x ) = a x mod N is periodic with period at most N. Moreover it is easy to calculate. Let its period be r a . All known classical ways of finding r a from a are hard. Any algorithm for calculating r a from a can be converted to an algorithm for factoring N. Quantum mechanics makes this calculation easy.
  • 66.  
  • 67. 2 Slits 1 photon Shor algorithm uses interference to find unknown period of periodic function. N Slits 1 photon Photon impact point yields a little information about slit spacing Photon impact point yields a lot of information about slit spacing
  • 68. Grover’s quantum search algorithm uses about √ N steps to find a unique marked item in a list of N elements, where classically N steps would be required. In an optical analog, phase plates with a bump at the marked location alternate with fixed optics to steer an initially uniform beam into a beam wholly concentrated at a location corresponding to the bump on the phase plate. If there are N possible bump locations, about √ N iterations are required. P = phase plate F = fixed optics Same optical setup works even with a single photon, so after about √ N iterations it would be directed to the right location.
  • 69. Optimality of Grover’s Algorithm: Why can’t it work in 1 iteration? Repeat the experiment with the phase bump in a different location. Original optical Grover experiment. Because most of the beam misses the bump in either location, the difference between the two light fields can increase only slowly. About √ N iterations are required to get complete separation. (BBBV quant-ph/9701001) Small difference after 1 iteration No difference initially
  • 70. Mask out all but desired area. Has disadvantage that most of the light is wasted. Like classical trial and error. If only 1 photon used each time, N tries would be needed. Non-iterative ways to aim a light beam. Lens: Concentrates all the light in one pass, but to use a lens is cheating. Unlike a Grover iteration or a phase plate or mask, a lens steers all parts of the beam, not just those passing through the distinguished location.
  • 71. How would a working quantum computer change the world? Exponential speedup of factoring and related problems of mainly cryptographic interest. Known public key cryptosystems would be broken. Digital signatures broken. Secret key systems (e.g. DES) still probably OK but would need double the key size. (Some public key functionality can be replaced by unconditionally secure quantum cryptography.) Exponential speedup for simulating quantum physics. Quadratic speedup for optimization problems like travelling salesman. No good reason to hope for exponential speedup. No speedup for some other problems.
  • 72. Fast quantum protocol for the lunch scheduling problem is a distributed form of Grover’s algorithm. A register of log N qubits, initially containing a uniform superposition of all dates, is passed back and forth between the two parties about √ N times, gradually building up amplitude on a conflict-free date. 1. Quantum Savings in Communication Complexity What else is quantum information good for?
  • 73.  
  • 74. Prior shared entanglement helps a good deal if Alice and Bob are trying to hold a quiet conversation in a room full of noisy strangers (Gaussian channel in low signal, high noise, low-attenuation limit) ..seulement avec un … ..blah…blah…blah... wahrscheinlich .then suddenly she swerved.. .because they were on their first date .for example, if you want it sweeter,… I love you ..but without his other kidney.. forever. Don’t ask.
  • 75. I love you But it doesn’t help much if they are far apart in an empty room (attenuation) What?

Editor's Notes

  1. What is information? It is distinguishability considered abstractly, separate from any other property of the things being distinguished. The digital revolution is based on the fact that all information can be expressed in bits, and any needed transformation of it can be accomplished by simple logic operations (“gates”) acting on the bits one and two at a time. The fact that information is independent of its physical embodiment makes possible Moore’s law. Making bits ten times smaller and cheaper increases their usefullness, unlike making shoes or cars ten times smaller and cheaper. We usually take for granted that information can be read or copied without disturbing it. And of course it cannot travel faster than light or backwards in time.
  2. How quantum information is different from, and similar to, classical information.
  3. How quantum information is different from, and similar to, classical information.
  4. Quantum cryptography just involves preparing and measuring qubits, but a quantum computer allows them to interact, via quantum logic gates, to perform computations. The most famous 2-bit quantum gate is the Conrtolled-NOT, the quantum version of the classical EXCLUSIVE-OR or XOR gate. It can be used to copy a vertical or horizontal qubit, but if one tries to copy a diagonal qubit, the copying attempt fails and a new kind of quantum state results instead, a so-called entangled or Einstein-Podolsky-Rosen state of the two qubits that have interacted.
  5. Quantum Information. Quantum theory (as suggested by the medieval-looking font) is older than information and computation theory, dating from the early 20’th century. It has been applied throughout physics, chemistry and engineering with enormous success, but until recently was not directly applied to information processing.
  6. The foundation of quantum mechanics is incomplete distinguishability, embodied in the superposition principle
  7. Superposition illustrated by polarized photons. Horizontal and vertical photons can be reliably distinguished, and can be used to carry one bit each. But when a diagonal photon is subjected to the same measurement process, it behaves sometimes like a horizontal photon and sometimes like a vertical photon. Two polarized photons can be reliably distinguished if and only if their polarization directions are at right angles to one another (“orthogonal”).
  8. Superposition illustrated by polarized photons. Horizontal and vertical photons can be reliably distinguished, and can be used to carry one bit each. But when a diagonal photon is subjected to the same measurement process, it behaves sometimes like a horizontal photon and sometimes like a vertical photon. Two polarized photons can be reliably distinguished if and only if their polarization directions are at right angles to one another (“orthogonal”).
  9. In Quantum Key Distribution, users “Alice” and “Bob” communicate by a quantum channel (green photons) and a classical channel (black bits). An eavesdropper “Eve” eavesdrops on all their classical messages, and can eavesdrop on the photons as much as she dares. But of course eavesdropping on the photons disturbs them. This dilemma means that there are two possible outcomes. If Eve eavesdrops only a little, Alice and Bob will be able to agree on a secret key, a supply of bits known by them and no one else. If Eve eavesdrops too much, Alice and Bob will almost always detect the eavesdropping and abort the protocol. Except with negligible probability, Alice and Bob will not be tricked into agreeing on a key that is not secret. There also exist classical methods of key distribution, in which all communication between Alice and Bob is classical, but these methods are insecure in principle. They can all be broken by an Eve with a sufficiently powerful classical computer, and many of them in widespread use today could be easily broken on a quantum computer. But, unless the laws of quantum mechanics are incorrect, quantum key distribution cannot be broken by any amount of computing power, quantum or classical.
  10. Superposition illustrated by polarized photons. Horizontal and vertical photons can be reliably distinguished, and can be used to carry one bit each. But when a diagonal photon is subjected to the same measurement process, it behaves sometimes like a horizontal photon and sometimes like a vertical photon. Two polarized photons can be reliably distinguished if and only if their polarization directions are at right angles to one another (“orthogonal”).
  11. Quantum cryptography just involves preparing and measuring qubits, but a quantum computer allows them to interact, via quantum logic gates, to perform computations. The most famous 2-bit quantum gate is the Conrtolled-NOT, the quantum version of the classical EXCLUSIVE-OR or XOR gate. It can be used to copy a vertical or horizontal qubit, but if one tries to copy a diagonal qubit, the copying attempt fails and a new kind of quantum state results instead, a so-called entangled or Einstein-Podolsky-Rosen state of the two qubits that have interacted.
  12. When two systems are entangled, they have a definite relation, even though neither system has a state of its own. Entanglement is unlike anything in ordinary experience or classical information theory. It might be compared to the feeling, common in the late 1960’s, of having no opinion oneself but being sure you are on the same wavelength as someone else. Nevertheless it has an exact mathematical description.
  13. Much of the interest in quantum computers stems from the fact that they could greatly speed the solution of up some hard problems, the most famous of which is the factoring of large numbers. Top: a very large classical computation was required to factor the number RSA129. The same number could have been factored in a much smaller number of steps on a quantum computer (the shading inside the quantum computer indicates that during the computation the qubits on the different wires are entangled, even though the final answer is not). If one attempted to observe this intermediate data before the computation was done, the data would be disturbed and the computation would give the wrong answer.
  14. Two implementations that have been tried in the laboratory are linear ion traps and liquid-state nuclear magnetic resonance (NMR).
  15. It is too early to decide which, if any, of these very different physical implementations will work to build a quantum computer.
  16. Between 1994, when Shor discovered his fast quantum factoring algorithm, and 1995, quantum computers were thought to be a fascinating theoretical idea but wildly impractical and unlikely ever to be built. This changed when error-correcting techniques were discovered. These techniques are the quantum version of the discovery by von Neumann that a reliable classical computer could be built out of unreliable parts, if the parts were connected together in a properly redundant fashion.
  17. Quantum fault tolerant computation involves not only error-correction, but the ability to correct errors that happen during the error-correction process, and the ability to overcome the unavoidable spread of errors when an erroneous qubit interacts with a good one. Fortunately all this can be done, if the error rate of the individual gates and wires is low enough to begin with.
  18. Superposition illustrated by polarized photons. Horizontal and vertical photons can be reliably distinguished, and can be used to carry one bit each. But when a diagonal photon is subjected to the same measurement process, it behaves sometimes like a horizontal photon and sometimes like a vertical photon. Two polarized photons can be reliably distinguished if and only if their polarization directions are at right angles to one another (“orthogonal”).
  19. Superposition illustrated by polarized photons. Horizontal and vertical photons can be reliably distinguished, and can be used to carry one bit each. But when a diagonal photon is subjected to the same measurement process, it behaves sometimes like a horizontal photon and sometimes like a vertical photon. Two polarized photons can be reliably distinguished if and only if their polarization directions are at right angles to one another (“orthogonal”).
  20. Much of the interest in quantum computers stems from the fact that they could greatly speed the solution of up some hard problems, the most famous of which is the factoring of large numbers. Top: a very large classical computation was required to factor the number RSA129. The same number could have been factored in a much smaller number of steps on a quantum computer (the shading inside the quantum computer indicates that during the computation the qubits on the different wires are entangled, even though the final answer is not). If one attempted to observe this intermediate data before the computation was done, the data would be disturbed and the computation would give the wrong answer.
  21. Much of the interest in quantum computers stems from the fact that they could greatly speed the solution of up some hard problems, the most famous of which is the factoring of large numbers. Top: a very large classical computation was required to factor the number RSA129. The same number could have been factored in a much smaller number of steps on a quantum computer (the shading inside the quantum computer indicates that during the computation the qubits on the different wires are entangled, even though the final answer is not). If one attempted to observe this intermediate data before the computation was done, the data would be disturbed and the computation would give the wrong answer.
  22. Much of the interest in quantum computers stems from the fact that they could greatly speed the solution of up some hard problems, the most famous of which is the factoring of large numbers. Top: a very large classical computation was required to factor the number RSA129. The same number could have been factored in a much smaller number of steps on a quantum computer (the shading inside the quantum computer indicates that during the computation the qubits on the different wires are entangled, even though the final answer is not). If one attempted to observe this intermediate data before the computation was done, the data would be disturbed and the computation would give the wrong answer.
  23. Much of the interest in quantum computers stems from the fact that they could greatly speed the solution of up some hard problems, the most famous of which is the factoring of large numbers. Top: a very large classical computation was required to factor the number RSA129. The same number could have been factored in a much smaller number of steps on a quantum computer (the shading inside the quantum computer indicates that during the computation the qubits on the different wires are entangled, even though the final answer is not). If one attempted to observe this intermediate data before the computation was done, the data would be disturbed and the computation would give the wrong answer.
  24. Much of the interest in quantum computers stems from the fact that they could greatly speed the solution of up some hard problems, the most famous of which is the factoring of large numbers. Top: a very large classical computation was required to factor the number RSA129. The same number could have been factored in a much smaller number of steps on a quantum computer (the shading inside the quantum computer indicates that during the computation the qubits on the different wires are entangled, even though the final answer is not). If one attempted to observe this intermediate data before the computation was done, the data would be disturbed and the computation would give the wrong answer.
  25. Much of the interest in quantum computers stems from the fact that they could greatly speed the solution of up some hard problems, the most famous of which is the factoring of large numbers. Top: a very large classical computation was required to factor the number RSA129. The same number could have been factored in a much smaller number of steps on a quantum computer (the shading inside the quantum computer indicates that during the computation the qubits on the different wires are entangled, even though the final answer is not). If one attempted to observe this intermediate data before the computation was done, the data would be disturbed and the computation would give the wrong answer.
  26. Superposition illustrated by polarized photons. Horizontal and vertical photons can be reliably distinguished, and can be used to carry one bit each. But when a diagonal photon is subjected to the same measurement process, it behaves sometimes like a horizontal photon and sometimes like a vertical photon. Two polarized photons can be reliably distinguished if and only if their polarization directions are at right angles to one another (“orthogonal”).
  27. Aside from the question of how one might build a quantum computer, the question of what one might do with it is wide open. Quantum computers have been shown to be capable of many other surprising tasks than fast factoring or fast search. To solve the lunchtime scheduling problem classically requires that the two parties exchange a number of bits roughly equal to the size of the less busy person’s calendar. If they use quantum communication, the job can be done in a little over the square root of that amount of communication, O(sqrt(N)log(N)) qubits to be precise.
  28. One promising theoretical field is entanglement assisted communication. Here the two parties, Alice and Bob, share entangled particles beforehand, and it helps them perform various communications tasks, such as sending classical messages from Alice to Bob. Entanglement doubles the rate at which classical information can be sent through a noiseless quantum channel. If the channel is noisy, the rate can be increased by an even larger factor. Another thing prior entanglement makes possible is transmitting intact quantum states through a classical channel. This is called “quantum teleportation”, but is expected mainly to be useful in safely transmitting quantum information from one part of a quantum computer to another, or between quantum computers tied together in a “quantum internet”.