SlideShare a Scribd company logo
Quantum
Computing
Overview
 Introduction
 Data Representation
Computational Complexity
Implementation Technologies
Quantum Computer Languages
Introduction to quantum mechanics
 Quantum mechanics is a fundamental branch of
theoretical physics with wide applications in
experimental physics that replaces classical
mechanics and classical electromagnetism at the
atomic and subatomic levels.
Introduction to quantum mechanics
 Quantum mechanics is a more fundamental theory
than Newtonian mechanics and classical
electromagnetism
 It provides accurate and precise descriptions for
many phenomena that these "classical" theories
simply cannot explain on the atomic and
subatomic level
What is a quantum computer?
 A quantum computer is a machine that performs
calculations based on the laws of quantum mechanics,
which is the behavior of particles at the sub-atomic
level.
•Moore’s Law: We hit the quantum level 2010~2020.
Why bother with quantum
computation?
Computer technology is making
devices smaller and smaller…
…reaching a point where classical
physics is no longer a suitable
model for the laws of physics.
Physics and Computation
• Information is stored in a physical medium,
and manipulated by physical processes.
• The laws of physics dictate the capabilities of
any information processing device.
• Designs of “classical” computers are implicitly
based in the classical framework for physics
• Classical physics is known to be wrong or
incomplete… and has been replaced by a more
powerful framework: quantum mechanics.
The design of devices on such a small scale will
require engineers to control quantum mechanical
effects.
Allowing computers to take advantage of
quantum mechanical behaviour allows us to do
more than cram increasingly many microscopic
components onto a silicon chip…
… it gives us a whole new framework in which
information can be processed in fundamentally
new ways.
The nineteenth century was known as the machine age, the twentieth
century will go down in history as the information age. I believe the twenty-
first century will be the quantum age. Paul Davies, Professor Natural
Philosophy – Australian Centre for Astrobiology
“No, you’re not going to be able to understand it. . .
. You see, my physics students don’t understand
it either. That is because I don’t understand it.
Nobody does. ... The theory of quantum
electrodynamics describes Nature as absurd
from the point of view of common sense. And it
agrees fully with an experiment. So I hope that
you can accept Nature as She is -- absurd.
Richard Feynman
Nobody understands quantum
mechanics
…consider a setup involving a photon source,
a half-silvered mirror (beamsplitter),
and a pair of photon detectors.
photon
source
beamsplitter
detectors
A simple experiment in optics
50%
50%
Simplest explanation: beam-splitter acts
as a classical coin-flip, randomly sending
each photon one way or the other.
Now consider what happens when we fire a
single photon into the device…
… consider a modification of the experiment…
100%
The simplest explanation is wrong!
The simplest explanation for
the modified setup would still
predict a 50-50 distribution…
full mirror
The “weirdness” of quantum mechanics…
Classical probabilities…
Consider a computation tree for a simple two-step (classical) probabilistic
algorithm, which makes a coin-flip at each step, and whose output is 0 or 1:
2
1
2
1
2
1
2
1
2
1
0
1
0
1
The probability of the computation following
a given path is obtained by multiplying the
probabilities along all branches of that
path… in the example the probability the
computation follows the red path is
4
1
2
1
2
1


The probability of the computation giving the
answer 0 is obtained by adding the
probabilities of all paths resulting in 0:
2
1
4
1
4
1


2
1
|0
2
1
2
1
2
1

2
1
|1
|0
|1
2
1
…vs quantum probabilities …
In quantum physics, we have probability amplitudes, which
can have complex phase factors associated with them.
The probability amplitude associated with a path
in the computation tree is obtained by multiplying
the probability amplitudes on that path. In the
example, the red path has amplitude 1/2, and the
green path has amplitude –1/2.
The probability amplitude for getting the answer |0
is obtained by adding the probability amplitudes…
notice that the phase factors can lead to
cancellations! The probability of obtaining |0 is
obtained by squaring the total probability
amplitude. In the example the probability of
getting |0 is
0
2
1
2
1
2








… consider a modification of the experiment…
The simplest explanation for
the modified setup would still
predict a 50-50 distribution…
full mirror
Explanation of experiment
0 0
2
1
1
2
1
100%
0
1
0
2
1
0
2
1


1
0
1
2
1
1
2
1


Representation of Data
 Quantum computers, which have not been built yet, would be based on
the strange principles of quantum mechanics, in which the smallest
particles of light and matter can be in different places at the same time.
 In a quantum computer, one "qubit" - quantum bit - could be both 0 and
1 at the same time. So with three qubits of data, a quantum computer
could store all eight combinations of 0 and 1 simultaneously. That
means a three-qubit quantum computer could calculate eight times
faster than a three-bit digital computer.
 Typical personal computers today calculate 64 bits of data at a time. A
quantum computer with 64 qubits would be 2 to the 64th power faster,
or about 18 billion billion times faster. (Note: billion billion is correct.)
A bit of data is represented by a single atom that is in one of
two states denoted by |0> and |1>. A single bit of this form is
known as a qubit
Representation of Data - Qubits
A physical implementation of a qubit could use the two energy
levels of an atom. An excited state representing |1> and a
ground state representing |0>.
Excited
State
Ground
State
Nucleus
Light pulse of
frequency  for
time interval t
Electron
State |0> State |1>
Representation of Data - Superposition
A single qubit can be forced into a superposition of the two states
denoted by the addition of the state vectors:
|> =  |0> +  |1>
Where  and  are complex numbers and | | + |  | = 1
1 2
1 2 1 2
2 2
A qubit in superposition is in both of the
states |1> and |0 at the same time
Representation of Data - Superposition
Light pulse of
frequency  for time
interval t/2
State |0> State |0> + |1>
Consider a 3 bit qubit register. An equally weighted
superposition of all possible states would be denoted by:
|> = |000> + |001> + . . . + |111>
1
√8
1
√8
1
√8
Data Retrieval
 In general, an n qubit register can represent the numbers 0
through 2^n-1 simultaneously.
Sound too good to be true?…It is!
 If we attempt to retrieve the values represented within a
superposition, the superposition randomly collapses to
represent just one of the original values.
In our equation: |> = 1 |0> + 2 |1> ,  represents the
probability of the superposition collapsing to |0>. The ’s
are called probability amplitudes. In a balanced
superposition,  = 1/√2n where n is the number of qubits.
1 2 1
n
Relationships among data - Entanglement
Entanglement is the ability of quantum systems to exhibit
correlations between states within a superposition.
Imagine two qubits, each in the state |0> + |1> (a superposition
of the 0 and 1.) We can entangle the two qubits such that the
measurement of one qubit is always correlated to the
measurement of the other qubit.
Measuring multi-qubit systems
If we measure both bits of
we get with probability
1
1
0
1
1
0
0
0 11
10
01
00 






y
x
2
xy

Measurement
 ||2, for amplitudes of all states matching an output bit-pattern,
gives the probability that it will be read.
 Example:
0.316|00› + 0.447|01› + 0.548|10› + 0.632|11›
The probability to read the rightmost bit as 0 is |0.316|2 + |0.548|2
= 0.4
 Measurement during a computation changes the state of the system
but can be used in some cases to increase efficiency (measure and halt
or continue).
Quantum mechanics and information
How does this affect communication complexity?
How does this affect information security?
How does this affect computational complexity?
1
0 1
0 


Any physical medium capable of
representing 0 and 1 is in principle capable
of storing any linear combination
A “Probabilistic Turing Machine” (PTM) is an abstract
model of the modern (classical) computer.
Strong Church-Turing Thesis:
A PTM can efficiently simulate any realistic model of
computing.
Widespread belief in the Strong Church-Turing
thesis has been one of the underpinnings of
theoretical computer science.
The Classical Computing Model
What do we mean by “efficient”?
The complexity of an algorithm
measures how much of some resource
(e.g. time, space, energy) the algorithm
uses as a function of the input size.
e.g. the best known algorithms for
factoring an n bit number uses time in
3
3
2
3
1
)
(log
)
))(
1
(
92
.
1
( n
n
n
o
k
e
O 





 
(number field sieve algorithm)
Factoring is believed to be hard on a Turing
machine (or any equivalent model), but how
do we know that there isn’t some novel
architecture on which it is easy?
The Strong Church Turing thesis tells us
that all reasonable models can be efficiently
simulated by a PTM, which implies that if it’s
hard for a PTM it must be hard for any other
reasonable computer.
i.e. we believe computational problems, like
factoring, have an intrinsic difficulty,
independent of how hard we try to find an
efficient algorithm.
In the early 1980s, Richard Feynman observed that
it seems implausible for a PTM to efficiently
simulate quantum mechanical systems…
…quantum computers are
quantum mechanical systems…
… so quantum computing is a model
which seems to violate the Strong
Church-Turing thesis!
Are quantum computers realistic?
Are quantum computers realistic?
The answer seems to be YES!
If the quantum computers are a reasonable model
of computation, and classical devices cannot
efficiently simulate them, then the Strong Church-
Turing thesis needs to be modified to state:
A quantum computer can efficiently simulate
any realistic model of computation.
Applications
• Efficient simulations of quantum systems
• Phase estimation; improved time-frequency and
other measurement standards (e.g. GPS)
• Factoring and Discrete Logarithms
• Hidden subgroup problems
• Amplitude amplification
• and much more…
Quantum Algorithms
a,b  G , ak = b , find k
Integer Factorization (basis of RSA cryptography):
Discrete logarithms (basis of DH crypto, including ECC):
Given N=pq, find p and q.
Computational Complexity Comparison
Classical Quantum
Factoring
Elliptic Curve
Discrete
Logarithms
 
n
n
O
e
3
/
2
3
/
1
log    
n
O
e
n
O log

 
n
O
e    
n
O
e
n
O log

(in terms of number of group multiplications for n-bit inputs)
The following cryptosystems are insecure against such
quantum attacks:
Which cryptosystems are threatened
by Quantum Computers??
• RSA (factoring)
• Rabin (factoring)
• ElGamal (discrete log, including ECC – see Proos and Zalka)
•Buchmann-Williams (principal ideal distance problem)
•and others… (see MMath thesis, Michael Brown, IQC)
Information security protocols must be studied in the context
of quantum information processing.
http://arxiv.org/abs/quant-ph/0301141
We need to worry NOW about information that needs to
remain private for long periods of time.
It takes a long time to change an infrastructure.
Quantum Information Security
•Quantum key establishment (available now/soon)
•Quantum random number generation (available now/soon)
•Quantum money (require stable quantum memory)
•Quantum digital signatures (requires quantum computer)
•Quantum secret sharing (requires quantum computer)
•Multi-party quantum computations
•and more…
We can exploit the eavesdropper detection that is
intrinsic to quantum systems in order to derive new
“unconditionally secure” information security protocols.
The security depends only on the laws of physics, and
not on computational assumptions.
Quantum computing in
computational complexity theory
 The class of problems that can be efficiently solved by quantum
computers is called BQP, for "bounded error, quantum, polynomial
time".
 Quantum computers only run randomized algorithms, so BQP on
quantum computers is the counterpart of BPP on classical computers
 In complexity theory, BPP is the class of decision problems solvable by
a probabilistic Turing machine in polynomial time, with an error
probability of at most 1/3 for all instances. The abbreviation BPP refers
to Bounded-error, Probabilistic, Polynomial time.
Quantum computing in
computational complexity theory
 BQP is suspected to be disjoint from NP-complete and a
strict superset of P, but that is not known.
 Both integer factorization and discrete log are in BQP.
Both of these problems are NP problems suspected to be
outside BPP, and hence outside P
 Both are suspected to not be NP-complete
 There is a common misconception that quantum
computers can solve NP-complete problems in
polynomial time (generally suspected to be false )
Quantum computing in
computational complexity theory
Implementation requirements
 Qubit implementation itself
 Control of unitary evolution
 Initial state preparation (qubits)
 Measurement of the final state(s)
Implementation
 Ion Traps
 Nuclear magnetic resonance (NMR)
 Optical photon computer
 Solid-state
Optical photon computer
 One method of this type uses the interaction
between an atom and photon in a resonator, and
another uses optical devices such as a beam
splitter, mirror, etc.
NMR
 NMR uses the spin of an atomic nucleus to represent a
qubit.
 Chemical bonds between spins are manipulated by a
magnetic field to simulate gates.
 Spins are prepared by magnetising, and induced voltages
are used for measurement. Currently it is thought that
 NMR will not scale to more than about twenty qubits.
 In 2006, the researchers reached a 12-coherence state and
decoded it using liquid state nuclear magnetic resonance
quantum information processors.
Ion Traps
 This method uses two electron orbits of an ion
(charged atom) trapped within an electromagnetic
field in a vacuum to form a qubit (ion trap
method).
Solid-state device
There are two well-known qubits of this type.
1. A qubit achieved by a superconducting circuit
using a Josephson junction that creates a weak
bond between two superconductors.
2. A qubit achieved by a semiconductor quantum
dot, which is a structure from 10 to several
hundred nanometers in size for confining an
electron.
Quantum Computer Languages
Even though no quantum computer has been built that hasn’t stopped
the proliferation of papers on various aspects of the subject. Many such
papers have been written defining language specifications.
 QCL - (Bernhard ¨ Omer) C like syntax and very complete.
http://tph.tuwien.ac.at/»oemer/qcl.html .
 qGCL - (Paolo Zuliani and others)
http://web.comlab.ox.ac.uk/oucl/work/paolo.zuliani/
 Quantum C - (Stephen Blaha) Currently just a specification,
References
 “A survey of quantum computing and automata”. E. de Doncker and
L. Cucos, In Fourth World Multiconference on Systemics, Cybernetics,
and Informatics (SCI'00), (2000).
 “The Temple of Quantum Computing”, Riley T. Perry.2004
 “Quantum Computation:A Computer Science Perspective”, Anders
K.H. Bengtsson. 2005
 http://en.wikipedia.org/wiki/Quantum_computing
 http://www.nec.co.jp/rd/Eng/innovative/E3/top.html
 http://www.sciencedaily.com/
Q & A
Thank You

More Related Content

Similar to quantum-computing.ppt

Quantum computing notes_DN_30 1 2023.pdf
Quantum computing notes_DN_30 1 2023.pdfQuantum computing notes_DN_30 1 2023.pdf
Quantum computing notes_DN_30 1 2023.pdfmithilashegaji
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1Bruno Fedrici, PhD
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum ComputingAmr Mohamed
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computingIOSR Journals
 
The Extraordinary World of Quantum Computing
The Extraordinary World of Quantum ComputingThe Extraordinary World of Quantum Computing
The Extraordinary World of Quantum ComputingTim Ellison
 
Crimson Publishers-Natural Limitations of Quantum Computing
Crimson Publishers-Natural Limitations of Quantum ComputingCrimson Publishers-Natural Limitations of Quantum Computing
Crimson Publishers-Natural Limitations of Quantum ComputingCrimsonpublishers-Electronics
 
Natural Limitations of Quantum Computing: Crimson Publishers
Natural Limitations of Quantum Computing: Crimson PublishersNatural Limitations of Quantum Computing: Crimson Publishers
Natural Limitations of Quantum Computing: Crimson PublishersCrimsonpublishers-Electronics
 
Quantum Evolutionary Algorithm for Solving Bin Packing Problem
Quantum Evolutionary Algorithm for Solving Bin Packing ProblemQuantum Evolutionary Algorithm for Solving Bin Packing Problem
Quantum Evolutionary Algorithm for Solving Bin Packing Probleminventionjournals
 
Fundamentals of quantum computing part i rev
Fundamentals of quantum computing   part i revFundamentals of quantum computing   part i rev
Fundamentals of quantum computing part i revPRADOSH K. ROY
 
Quantum computing.pptx
Quantum computing.pptxQuantum computing.pptx
Quantum computing.pptxCaptAvacato
 

Similar to quantum-computing.ppt (20)

Quantum computing notes_DN_30 1 2023.pdf
Quantum computing notes_DN_30 1 2023.pdfQuantum computing notes_DN_30 1 2023.pdf
Quantum computing notes_DN_30 1 2023.pdf
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1The second quantum revolution: the world beyond binary 0 and 1
The second quantum revolution: the world beyond binary 0 and 1
 
bhanu.pptx
bhanu.pptxbhanu.pptx
bhanu.pptx
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum communication and quantum computing
Quantum communication and quantum computingQuantum communication and quantum computing
Quantum communication and quantum computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
The Evolution of Quantum Computers
The Evolution of Quantum ComputersThe Evolution of Quantum Computers
The Evolution of Quantum Computers
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
The Extraordinary World of Quantum Computing
The Extraordinary World of Quantum ComputingThe Extraordinary World of Quantum Computing
The Extraordinary World of Quantum Computing
 
Crimson Publishers-Natural Limitations of Quantum Computing
Crimson Publishers-Natural Limitations of Quantum ComputingCrimson Publishers-Natural Limitations of Quantum Computing
Crimson Publishers-Natural Limitations of Quantum Computing
 
Natural Limitations of Quantum Computing: Crimson Publishers
Natural Limitations of Quantum Computing: Crimson PublishersNatural Limitations of Quantum Computing: Crimson Publishers
Natural Limitations of Quantum Computing: Crimson Publishers
 
Quantum Evolutionary Algorithm for Solving Bin Packing Problem
Quantum Evolutionary Algorithm for Solving Bin Packing ProblemQuantum Evolutionary Algorithm for Solving Bin Packing Problem
Quantum Evolutionary Algorithm for Solving Bin Packing Problem
 
Fundamentals of quantum computing part i rev
Fundamentals of quantum computing   part i revFundamentals of quantum computing   part i rev
Fundamentals of quantum computing part i rev
 
Seminar
SeminarSeminar
Seminar
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computing.pptx
Quantum computing.pptxQuantum computing.pptx
Quantum computing.pptx
 
Ieee lecture
Ieee lectureIeee lecture
Ieee lecture
 

Recently uploaded

The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfkaushalkr1407
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptSourabh Kumar
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxJisc
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxDenish Jangid
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfVivekanand Anglo Vedic Academy
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfTamralipta Mahavidyalaya
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chipsGeoBlogs
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxEduSkills OECD
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfjoachimlavalley1
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchVikramjit Singh
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345beazzy04
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersPedroFerreira53928
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxricssacare
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...Denish Jangid
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePedroFerreira53928
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptxJosvitaDsouza2
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxbennyroshan06
 

Recently uploaded (20)

Introduction to Quality Improvement Essentials
Introduction to Quality Improvement EssentialsIntroduction to Quality Improvement Essentials
Introduction to Quality Improvement Essentials
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.pptBasic_QTL_Marker-assisted_Selection_Sourabh.ppt
Basic_QTL_Marker-assisted_Selection_Sourabh.ppt
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptxSolid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
Solid waste management & Types of Basic civil Engineering notes by DJ Sir.pptx
 
Sectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdfSectors of the Indian Economy - Class 10 Study Notes pdf
Sectors of the Indian Economy - Class 10 Study Notes pdf
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
NCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdfNCERT Solutions Power Sharing Class 10 Notes pdf
NCERT Solutions Power Sharing Class 10 Notes pdf
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptxJose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
Jose-Rizal-and-Philippine-Nationalism-National-Symbol-2.pptx
 
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...Basic Civil Engineering Notes of Chapter-6,  Topic- Ecosystem, Biodiversity G...
Basic Civil Engineering Notes of Chapter-6, Topic- Ecosystem, Biodiversity G...
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptxMARUTI SUZUKI- A Successful Joint Venture in India.pptx
MARUTI SUZUKI- A Successful Joint Venture in India.pptx
 

quantum-computing.ppt

  • 2. Overview  Introduction  Data Representation Computational Complexity Implementation Technologies Quantum Computer Languages
  • 3. Introduction to quantum mechanics  Quantum mechanics is a fundamental branch of theoretical physics with wide applications in experimental physics that replaces classical mechanics and classical electromagnetism at the atomic and subatomic levels.
  • 4. Introduction to quantum mechanics  Quantum mechanics is a more fundamental theory than Newtonian mechanics and classical electromagnetism  It provides accurate and precise descriptions for many phenomena that these "classical" theories simply cannot explain on the atomic and subatomic level
  • 5. What is a quantum computer?  A quantum computer is a machine that performs calculations based on the laws of quantum mechanics, which is the behavior of particles at the sub-atomic level.
  • 6. •Moore’s Law: We hit the quantum level 2010~2020. Why bother with quantum computation?
  • 7. Computer technology is making devices smaller and smaller… …reaching a point where classical physics is no longer a suitable model for the laws of physics.
  • 8. Physics and Computation • Information is stored in a physical medium, and manipulated by physical processes. • The laws of physics dictate the capabilities of any information processing device. • Designs of “classical” computers are implicitly based in the classical framework for physics • Classical physics is known to be wrong or incomplete… and has been replaced by a more powerful framework: quantum mechanics.
  • 9. The design of devices on such a small scale will require engineers to control quantum mechanical effects. Allowing computers to take advantage of quantum mechanical behaviour allows us to do more than cram increasingly many microscopic components onto a silicon chip… … it gives us a whole new framework in which information can be processed in fundamentally new ways. The nineteenth century was known as the machine age, the twentieth century will go down in history as the information age. I believe the twenty- first century will be the quantum age. Paul Davies, Professor Natural Philosophy – Australian Centre for Astrobiology
  • 10. “No, you’re not going to be able to understand it. . . . You see, my physics students don’t understand it either. That is because I don’t understand it. Nobody does. ... The theory of quantum electrodynamics describes Nature as absurd from the point of view of common sense. And it agrees fully with an experiment. So I hope that you can accept Nature as She is -- absurd. Richard Feynman Nobody understands quantum mechanics
  • 11. …consider a setup involving a photon source, a half-silvered mirror (beamsplitter), and a pair of photon detectors. photon source beamsplitter detectors A simple experiment in optics
  • 12. 50% 50% Simplest explanation: beam-splitter acts as a classical coin-flip, randomly sending each photon one way or the other. Now consider what happens when we fire a single photon into the device…
  • 13. … consider a modification of the experiment… 100% The simplest explanation is wrong! The simplest explanation for the modified setup would still predict a 50-50 distribution… full mirror The “weirdness” of quantum mechanics…
  • 14. Classical probabilities… Consider a computation tree for a simple two-step (classical) probabilistic algorithm, which makes a coin-flip at each step, and whose output is 0 or 1: 2 1 2 1 2 1 2 1 2 1 0 1 0 1 The probability of the computation following a given path is obtained by multiplying the probabilities along all branches of that path… in the example the probability the computation follows the red path is 4 1 2 1 2 1   The probability of the computation giving the answer 0 is obtained by adding the probabilities of all paths resulting in 0: 2 1 4 1 4 1  
  • 15. 2 1 |0 2 1 2 1 2 1  2 1 |1 |0 |1 2 1 …vs quantum probabilities … In quantum physics, we have probability amplitudes, which can have complex phase factors associated with them. The probability amplitude associated with a path in the computation tree is obtained by multiplying the probability amplitudes on that path. In the example, the red path has amplitude 1/2, and the green path has amplitude –1/2. The probability amplitude for getting the answer |0 is obtained by adding the probability amplitudes… notice that the phase factors can lead to cancellations! The probability of obtaining |0 is obtained by squaring the total probability amplitude. In the example the probability of getting |0 is 0 2 1 2 1 2        
  • 16. … consider a modification of the experiment… The simplest explanation for the modified setup would still predict a 50-50 distribution… full mirror Explanation of experiment 0 0 2 1 1 2 1 100% 0 1 0 2 1 0 2 1   1 0 1 2 1 1 2 1  
  • 17. Representation of Data  Quantum computers, which have not been built yet, would be based on the strange principles of quantum mechanics, in which the smallest particles of light and matter can be in different places at the same time.  In a quantum computer, one "qubit" - quantum bit - could be both 0 and 1 at the same time. So with three qubits of data, a quantum computer could store all eight combinations of 0 and 1 simultaneously. That means a three-qubit quantum computer could calculate eight times faster than a three-bit digital computer.  Typical personal computers today calculate 64 bits of data at a time. A quantum computer with 64 qubits would be 2 to the 64th power faster, or about 18 billion billion times faster. (Note: billion billion is correct.)
  • 18. A bit of data is represented by a single atom that is in one of two states denoted by |0> and |1>. A single bit of this form is known as a qubit
  • 19. Representation of Data - Qubits A physical implementation of a qubit could use the two energy levels of an atom. An excited state representing |1> and a ground state representing |0>. Excited State Ground State Nucleus Light pulse of frequency  for time interval t Electron State |0> State |1>
  • 20. Representation of Data - Superposition A single qubit can be forced into a superposition of the two states denoted by the addition of the state vectors: |> =  |0> +  |1> Where  and  are complex numbers and | | + |  | = 1 1 2 1 2 1 2 2 2 A qubit in superposition is in both of the states |1> and |0 at the same time
  • 21. Representation of Data - Superposition Light pulse of frequency  for time interval t/2 State |0> State |0> + |1> Consider a 3 bit qubit register. An equally weighted superposition of all possible states would be denoted by: |> = |000> + |001> + . . . + |111> 1 √8 1 √8 1 √8
  • 22. Data Retrieval  In general, an n qubit register can represent the numbers 0 through 2^n-1 simultaneously. Sound too good to be true?…It is!  If we attempt to retrieve the values represented within a superposition, the superposition randomly collapses to represent just one of the original values. In our equation: |> = 1 |0> + 2 |1> ,  represents the probability of the superposition collapsing to |0>. The ’s are called probability amplitudes. In a balanced superposition,  = 1/√2n where n is the number of qubits. 1 2 1 n
  • 23. Relationships among data - Entanglement Entanglement is the ability of quantum systems to exhibit correlations between states within a superposition. Imagine two qubits, each in the state |0> + |1> (a superposition of the 0 and 1.) We can entangle the two qubits such that the measurement of one qubit is always correlated to the measurement of the other qubit.
  • 24. Measuring multi-qubit systems If we measure both bits of we get with probability 1 1 0 1 1 0 0 0 11 10 01 00        y x 2 xy 
  • 25. Measurement  ||2, for amplitudes of all states matching an output bit-pattern, gives the probability that it will be read.  Example: 0.316|00› + 0.447|01› + 0.548|10› + 0.632|11› The probability to read the rightmost bit as 0 is |0.316|2 + |0.548|2 = 0.4  Measurement during a computation changes the state of the system but can be used in some cases to increase efficiency (measure and halt or continue).
  • 26. Quantum mechanics and information How does this affect communication complexity? How does this affect information security? How does this affect computational complexity? 1 0 1 0    Any physical medium capable of representing 0 and 1 is in principle capable of storing any linear combination
  • 27. A “Probabilistic Turing Machine” (PTM) is an abstract model of the modern (classical) computer. Strong Church-Turing Thesis: A PTM can efficiently simulate any realistic model of computing. Widespread belief in the Strong Church-Turing thesis has been one of the underpinnings of theoretical computer science. The Classical Computing Model
  • 28. What do we mean by “efficient”? The complexity of an algorithm measures how much of some resource (e.g. time, space, energy) the algorithm uses as a function of the input size. e.g. the best known algorithms for factoring an n bit number uses time in 3 3 2 3 1 ) (log ) ))( 1 ( 92 . 1 ( n n n o k e O         (number field sieve algorithm)
  • 29. Factoring is believed to be hard on a Turing machine (or any equivalent model), but how do we know that there isn’t some novel architecture on which it is easy?
  • 30. The Strong Church Turing thesis tells us that all reasonable models can be efficiently simulated by a PTM, which implies that if it’s hard for a PTM it must be hard for any other reasonable computer. i.e. we believe computational problems, like factoring, have an intrinsic difficulty, independent of how hard we try to find an efficient algorithm.
  • 31. In the early 1980s, Richard Feynman observed that it seems implausible for a PTM to efficiently simulate quantum mechanical systems… …quantum computers are quantum mechanical systems… … so quantum computing is a model which seems to violate the Strong Church-Turing thesis!
  • 32. Are quantum computers realistic? Are quantum computers realistic? The answer seems to be YES! If the quantum computers are a reasonable model of computation, and classical devices cannot efficiently simulate them, then the Strong Church- Turing thesis needs to be modified to state: A quantum computer can efficiently simulate any realistic model of computation.
  • 33. Applications • Efficient simulations of quantum systems • Phase estimation; improved time-frequency and other measurement standards (e.g. GPS) • Factoring and Discrete Logarithms • Hidden subgroup problems • Amplitude amplification • and much more…
  • 34. Quantum Algorithms a,b  G , ak = b , find k Integer Factorization (basis of RSA cryptography): Discrete logarithms (basis of DH crypto, including ECC): Given N=pq, find p and q.
  • 35. Computational Complexity Comparison Classical Quantum Factoring Elliptic Curve Discrete Logarithms   n n O e 3 / 2 3 / 1 log     n O e n O log    n O e     n O e n O log  (in terms of number of group multiplications for n-bit inputs)
  • 36. The following cryptosystems are insecure against such quantum attacks: Which cryptosystems are threatened by Quantum Computers?? • RSA (factoring) • Rabin (factoring) • ElGamal (discrete log, including ECC – see Proos and Zalka) •Buchmann-Williams (principal ideal distance problem) •and others… (see MMath thesis, Michael Brown, IQC) Information security protocols must be studied in the context of quantum information processing. http://arxiv.org/abs/quant-ph/0301141 We need to worry NOW about information that needs to remain private for long periods of time. It takes a long time to change an infrastructure.
  • 37. Quantum Information Security •Quantum key establishment (available now/soon) •Quantum random number generation (available now/soon) •Quantum money (require stable quantum memory) •Quantum digital signatures (requires quantum computer) •Quantum secret sharing (requires quantum computer) •Multi-party quantum computations •and more… We can exploit the eavesdropper detection that is intrinsic to quantum systems in order to derive new “unconditionally secure” information security protocols. The security depends only on the laws of physics, and not on computational assumptions.
  • 38. Quantum computing in computational complexity theory  The class of problems that can be efficiently solved by quantum computers is called BQP, for "bounded error, quantum, polynomial time".  Quantum computers only run randomized algorithms, so BQP on quantum computers is the counterpart of BPP on classical computers  In complexity theory, BPP is the class of decision problems solvable by a probabilistic Turing machine in polynomial time, with an error probability of at most 1/3 for all instances. The abbreviation BPP refers to Bounded-error, Probabilistic, Polynomial time.
  • 39. Quantum computing in computational complexity theory  BQP is suspected to be disjoint from NP-complete and a strict superset of P, but that is not known.  Both integer factorization and discrete log are in BQP. Both of these problems are NP problems suspected to be outside BPP, and hence outside P  Both are suspected to not be NP-complete  There is a common misconception that quantum computers can solve NP-complete problems in polynomial time (generally suspected to be false )
  • 41. Implementation requirements  Qubit implementation itself  Control of unitary evolution  Initial state preparation (qubits)  Measurement of the final state(s)
  • 42. Implementation  Ion Traps  Nuclear magnetic resonance (NMR)  Optical photon computer  Solid-state
  • 43. Optical photon computer  One method of this type uses the interaction between an atom and photon in a resonator, and another uses optical devices such as a beam splitter, mirror, etc.
  • 44. NMR  NMR uses the spin of an atomic nucleus to represent a qubit.  Chemical bonds between spins are manipulated by a magnetic field to simulate gates.  Spins are prepared by magnetising, and induced voltages are used for measurement. Currently it is thought that  NMR will not scale to more than about twenty qubits.  In 2006, the researchers reached a 12-coherence state and decoded it using liquid state nuclear magnetic resonance quantum information processors.
  • 45. Ion Traps  This method uses two electron orbits of an ion (charged atom) trapped within an electromagnetic field in a vacuum to form a qubit (ion trap method).
  • 46. Solid-state device There are two well-known qubits of this type. 1. A qubit achieved by a superconducting circuit using a Josephson junction that creates a weak bond between two superconductors. 2. A qubit achieved by a semiconductor quantum dot, which is a structure from 10 to several hundred nanometers in size for confining an electron.
  • 47. Quantum Computer Languages Even though no quantum computer has been built that hasn’t stopped the proliferation of papers on various aspects of the subject. Many such papers have been written defining language specifications.  QCL - (Bernhard ¨ Omer) C like syntax and very complete. http://tph.tuwien.ac.at/»oemer/qcl.html .  qGCL - (Paolo Zuliani and others) http://web.comlab.ox.ac.uk/oucl/work/paolo.zuliani/  Quantum C - (Stephen Blaha) Currently just a specification,
  • 48. References  “A survey of quantum computing and automata”. E. de Doncker and L. Cucos, In Fourth World Multiconference on Systemics, Cybernetics, and Informatics (SCI'00), (2000).  “The Temple of Quantum Computing”, Riley T. Perry.2004  “Quantum Computation:A Computer Science Perspective”, Anders K.H. Bengtsson. 2005  http://en.wikipedia.org/wiki/Quantum_computing  http://www.nec.co.jp/rd/Eng/innovative/E3/top.html  http://www.sciencedaily.com/
  • 49. Q & A Thank You