Introduction to Quantum Computing

Similar documents
Cryptography in a quantum world

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1

Cyber Security in the Quantum Era

Quantum Information Science (QIS)

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

Quantum Information & Quantum Computation

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

A brief survey on quantum computing

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

An Introduction to Quantum Information and Applications

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Quantum Key Distribution and the Future of Encryption

Other Topics in Quantum Information

phys4.20 Page 1 - the ac Josephson effect relates the voltage V across a Junction to the temporal change of the phase difference

Quantum Computing. Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract HISTORY OF QUANTUM COMPUTING-

Quantum Computing is Here, Powered by Open Source. Konstantinos Karagiannis CTO, Security Consulting BT

MAA509: Quantum Computing and Information Introduction

The Relativistic Quantum World

QOT - Quantum Optical Technologies

Introduction to Quantum Information Processing

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles

Secrets of Quantum Information Science

Quantum technology popular science description

Reversible and Quantum computing. Fisica dell Energia - a.a. 2015/2016

1500 AMD Opteron processor (2.2 GHz with 2 GB RAM)

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Quantum Computing. Thorsten Altenkirch

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace

Experimental Quantum Computing: A technology overview

Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo

Quantum Technology 101: Overview of Quantum Computing and Quantum Cybersecurity

Quantum Technologies for Cryptography

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan

*WILEY- Quantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co.

Introduction to Quantum Computing

QUANTUM TECHNOLOGIES: THE SECOND QUANTUM REVOLUTION* Jonathan P. Dowling

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

Topological Quantum Computation. George Toh 11/6/2017

Quantum Information Processing

Lecture Quantum Information Processing II: Implementations. spring term (FS) 2017

Quantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co. KGaA

Lecture 1: Introduction to Public key cryptography

10 - February, 2010 Jordan Myronuk

The quantum threat to cryptography

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií

Breaking RSA with Quantum Computing

The long road of Quantum Computing

Quantum Computing: Foundations to Frontier

Quantum Computing. Part I. Thorsten Altenkirch

Introduction to Quantum Computing for Folks

Lattice-Based Cryptography

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

A central problem in cryptography: the key distribution problem.

Quantum information and the future of physics

Quantum Optics and Quantum Informatics 7.5hp (FKA173) Introductory Lecture

Device-Independent Quantum Information Processing

Some Introductory Notes on Quantum Computing

Quantum Computation: From Quantum Teleportation to the Shor s Algorithm

CS257 Discrete Quantum Computation

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Quantum information. Vlatko Vedral INSTANT

The Deutsch-Josza Algorithm in NMR

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Computation and Communication

The Reality of Quantum Computing

What are we talking about when we talk about post-quantum cryptography?

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

Quantum Computers. Peter Shor MIT

Quantum Computers Is the Future Here?

Quantum Information Transfer and Processing Miloslav Dušek

Basics on quantum information

Talk by Johannes Vrana

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Quantum Computing. The Future of Advanced (Secure) Computing. Dr. Eric Dauler. MIT Lincoln Laboratory 5 March 2018

Basics on quantum information

Promise of Quantum Computation

QLang: Qubit Language

A Matlab Realization of Shor s Quantum Factoring Algorithm

The Future. Currently state of the art chips have gates of length 35 nanometers.

Quantum theory has opened to us the microscopic world of particles, atoms and photons..and has given us the keys of modern technologies

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

Lectures on Fault-Tolerant Quantum Computation

Lecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography

Introduction to Quantum Computing

Quantum Communication. Serge Massar Université Libre de Bruxelles

Security Implications of Quantum Technologies

Quantum Computer. Jaewan Kim School of Computational Sciences Korea Institute for Advanced Study

Factoring on a Quantum Computer

HOMOMORPHIC ENCRYPTION AND LATTICE BASED CRYPTOGRAPHY 1 / 51

Quantum Information. and Communication

6.080/6.089 GITCS May 6-8, Lecture 22/23. α 0 + β 1. α 2 + β 2 = 1

Quantum Information Processing

The Elliptic Curve in https

Quantum Computing: From Science to Application Dr. Andreas Fuhrer Quantum technology, IBM Research - Zurich

D.5 Quantum error correction

Transcription:

Introduction to Quantum Computing Petros Wallden Lecture 1: Introduction 18th September 2017 School of Informatics, University of Edinburgh

Resources 1. Quantum Computation and Quantum Information by Michael A. Nielsen & Isaac L. Chuang 2. Lecture Notes available on http://qcintro.wordpress.com 1

Moore s Law & Quantum Mechanics The number of transistors in each microchip double every two years Soon we will reach atomic scale Quantum Mechanics govern physical systems at this scale Quantum Fluctuations and Uncertainty will affect classical computations 2

Bits Vs Qubits Bit Takes values either 0 or 1 Measurement reveals the value of the bit Can be copied String of bits are described in terms of single bits (local) Qubit Can behave as being simultaneously 0 and 1: α 0 + β 1 Measurement disturbs the system Cannot be copied String of qubits can have properties that cannot be described in terms of single qubits (non-local) Qubits behave as waves and interfere with each other Qubits are physical systems. Many different systems have been used such as: Photons (polarization, number, time-bin encoding), Coherent Light, Electrons (spin, number), Nuclear spin, Optical lattices, Superconductors, etc. 3

Quantumness as Resource Nobel laureate Richard Feynman 1982: Quantum Computer is a computer that uses QM to its advantage. It can simulate quantum systems. Great Developments: - Quantum Algorithms can lead to speed-up - Quantum Computers can break classical Cryptosystems such as the RSA - Quantum Cryptogaphy can encrypt messages with Unconditionally Security (not relying in computational assumptions) - Principles of Quantum Computation can be used to simulate and explore physical phenomena at domains that are not accessible from Black Hole thermodynamics to Condense Matter Physics 4

Secure Quantum Communication - Many quantum cryptographic protocols: Encryption, secret sharing, digital signatures, coin flipping, Unconditionally secure homomorphic encryption - Implementations of Quantum Key Distribution Networks between cities exist in many countries. QKD systems are provided by commercial companies (e.g. idquantique) Quantum Computers - There exist different models of Quantum Computation: Quantum Circuit, Measurement Based (these two will be covered), Adiabatic QC, Topological QC - Implementations have attempted to used different physical systems. Still not scalable (only few qubits operations e.g. factored 143). Superconductor based, Trapped ion, Optical lattices, Nuclear magnetic resonance, quantum optics NQIT (Networked Quantum Information Technologies) Hub (lead by Oxford, Edinburgh is part of): Q20:20, 20 ion traps of 20 qubits each, connected with photons.

Quantum Algorithms Speed-up - 1985 Deutsch & Jozsa showed the first speed up Given a Boolean function f : {0, 1} n {0, 1} determine if it is constant or balanced f = 1 2 n x {0,1} ( 1) f(x) x n The state for any constant function is orthogonal to the state of any balanced function 5

- 1994 Simon s Problem Given a function f : {0, 1} n {0, 1} n finds a such that f(x + a) = f(x) - 1994 Shor s Algorithm Given n-bit integer, find the prime factorisation. Breaks the RSA cryptosystem (most currently used public key encryptions are based on this)

History 1980s Idea of quantum computation. Paul Benioff, Yuri Manin, Richard Feynman, David Deutsch 1990s Theory of efficient quantum simulation. Seth Lloyd 1994 Peter Shor s algorithms for factoring and discrete log. Quantum computers can break RSA, Diffie-Hellman, El Gamal, Elliptic Curve Cryptography and others 2001 Experiment factors 15 using Shor s algorithm 2010s D-Wave, Google, IBM, NQIT and various universities work on developing quantum computers How serious is the involvement in quantum computation? 6

Who invests in Quantum Computing? 7

Who invests in Quantum Computing? 8

Applications 9

Misconceptions 10

Misconceptions 11

State of Art 2001 Shor s algorithm factors 15 on 7 qubits 2011 Shor s algorithm factors 21 2012 Universal quantum computation on 2 fault tolerant qubits 2014-2015 Qubits and gates in silicon chips 2015 D-Wave 2X, 1000 qubits, optimization problems, no fault tolerance 2016 IBM, universal quantum computation on 5 fault tolerant qubits (publicly available) 2020 NQIT, Q20:20, fault tolerant (20 qubits), scalable 12

State of Art: Cryptography 13

State of Art: Cryptography 14

What can you buy 15

What can you buy 16

Quantum Mechanics Nobel laureate Niels Bohr (photo with Einstein) Anyone who is not shocked by quantum theory has not understood it - Basic resource for QC is the distinct properties of quantum theory - To appreciate this one needs to (attempt to) understand QM - QM has been proven very successful and all so far tested predictions has been verified at a unprecedent level of accuracy - However, the conceptual challenges posed by QM are profound. Classical notions such as locality, non-contextuality, determinism even realism has been challenged 17

- The role of the observer and of the measurement are very different - Properties with no classical analogue: Uncertainty, wave-particle duality, no-cloning, indistinguishability of quantum states, teleportation - Also QM is incompatible with the other most successful physical theory General Relativity. This is possible because the former deals with the micro-world while the latter with macro-world. However, for a complete theory of nature one needs to construct a theory that includes both QM and GR and this is probably the greatest challenge for contemporary physics.

Content of the Course Basic concepts from Linear Algebra Axioms of Quantum Mechanics Non-locality, Bell s inequalities and the interpretations of QM No-cloning and no-deleting theorem Quantum Computing via the circuit model Quantum complexity Quantum Algorithms Quantum Cryptography Quantum Computing via the measurement-based model 18