Q Jeff Kinne.

Slides:



Advertisements
Similar presentations
Quantum Computation and Quantum Information – Lecture 3
Advertisements

University of Queensland
Quantum Computing and Qbit Cryptography
Quantum Computing MAS 725 Hartmut Klauck NTU
Code-Breaking with a Quantum Computer Credit for ideas and examples: Prof. N. D. Mermin’s class Phys 681 / Comp Sci 483 “Quantum Computation” (A good class)
Umesh V. Vazirani U. C. Berkeley Quantum Algorithms: a survey.
March 11, 2015CS21 Lecture 271 CS21 Decidability and Tractability Lecture 27 March 11, 2015.
Quantum Computing Ambarish Roy Presentation Flow.
Quantum Computing CPSC 321 Andreas Klappenecker. Plan T November 16: Multithreading R November 18: Quantum Computing T November 23: QC + Exam prep R November.
Quantum Computation and Error Correction Ali Soleimani.
University of Queensland
CSEP 590tv: Quantum Computing
Quantum Computing Joseph Stelmach.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Computers Todd A. Brun Communication Sciences Institute USC.
Quantum Computing Lecture 1 Michele Mosca. l Course Outline
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
By: Mike Neumiller & Brian Yarbrough
DNA and Quantum Computers Russell Deaton Associate Professor Computer Science and Engineering University of Arkansas.
Debasis Sadhukhan M.Sc. Physics, IIT Bombay. 1. Basics of Quantum Computation. 2. Quantum Circuits 3. Quantum Fourier Transform and it’s applications.
Quantum Algorithms for Neural Networks Daniel Shumow.
Alice and Bob’s Excellent Adventure
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
1 hardware of quantum computer 1. quantum registers 2. quantum gates.
David Evans CS150: Computer Science University of Virginia Computer Science Class 33: Computing with Photons From The.
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
Quantum and classical computing Dalibor HRG EECS FER
Quantum Computing and Quantum Programming Language
CSEP 590tv: Quantum Computing Dave Bacon July 20, 2005 Today’s Menu n Qubit registers Begin Quantum Algorithms Administrivia Superdense Coding Finish Teleportation.
Quantum Mechanics(14/2) Hongki Lee BIOPHOTONICS ENGINEERING LABORATORY School of Electrical and Electronic Engineering, Yonsei University Quantum Computing.
Introduction to Quantum Computing
Quantum Computing Michael Larson. The Quantum Computer Quantum computers, like all computers, are machines that perform calculations upon data. Quantum.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Quantum Computation Stephen Jordan. Church-Turing Thesis ● Weak Form: Anything we would regard as “computable” can be computed by a Turing machine. ●
Quantum Computers By Ryan Orvosh.
Intro to Quantum Algorithms SUNY Polytechnic Institute Chen-Fu Chiang Fall 2015.
What is the Smallest RSA Private Key Why is there, at all, such a thing? Why is it not 42? Why is the smallest public key not 35? Or,
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Attendance Syllabus Textbook (hardcopy or electronics) Groups s First-time meeting.
Richard Cleve DC 3524 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Lecture.
Prabhas Chongstitvatana Chulalongkorn University
Encryption and Integrity
COMPSCI 290.2: Computer Security
Quantum Circuit Visualization
Poomipat Phusayangkul
Introduction to Quantum Computing Lecture 1 of 2
Quantum Cryptography Quantum Computing
Cryptography, part 2.
For computer scientists
Quantum Computing: from theory to practice
Quantum Cryptography Christian Schaffner
Quantum Cryptography Alok.T.J EC 11.
Programmable ions set the stage for quantum computers
A Ridiculously Brief Overview
3rd Lecture: QMA & The local Hamiltonian problem (CNT’D)
Quantum Computing and the Quest for Quantum Computational Supremacy
Quantum Computation and Information Chap 1 Intro and Overview: p 28-58
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 24 (2009) Richard.
Discrete Math for CS CMPSC 360 LECTURE 14 Last time:
Spin Many quantum experiments are done with photon polarization instead of electron spin Here is the correspondence between the two And the measurement.
Quantum Computing Hakem Alazmi Jhilakshi Sharma Linda Vu.
CS 150: Computing - From Ada to the Web
Quantum Computing Joseph Stelmach.
Quantum Cryptography Quantum Computing
Quantum Cryptography Quantum Computing
Presentation transcript:

Q Jeff Kinne

Under direction of Dr. Gary Lewandowski. Quantum computing Jeff Kinne Under direction of Dr. Gary Lewandowski.

Church-Turing thesis What is a Turing Machine? Nothing more powerful than a TM? Then maybe we can’t deal with NP-hard problems…

Information theory Computation deals with information. Ultimately, information must be stored physically. Physics will determine the limits of computation. Quantum mechanics?

Quantum computer bits and gates are the basis for our computers. A qubit has the following form: |a|(1,0)+|b|(0,1). a and b are complex numbers. (1,0) is a basis vector and corresponds to the logical state of 0. (0,1) corresponds to 1.

Quantum computer The modulus of a is the probability that the qubit will be measured as (1,0) = 0. The qubit can exist in a superposition of the states 0 and 1 but will always become 0 or 1 when it is measured. Put many qubits together to form a register of quantum bits. A quantum gate maps a superposition of qubits to another superposition.

Deutsch’s algorithm Function mapping {0,1} into itself. There are 4 such possible functions. Seek to determine whether the function is one to one. This could be done by evaluating f(0) XOR f(1).

Fowee’s algorithm Prepare a superposition of all possible two bit states by sending 0,1 through the H gate: H(0) = (1/2)0+(1/2)1, H(1) = (1/2)0-(1/2)1. Put that superposition through the following gate: G(i,j) = (i, j XOR f(i)) Then put it through H again. In the end, we’ll get 1 for the first bit if the function is one to one and 0 otherwise. Measure a global property of the system by evaluating f only once.

Cryptography Method for key distribution that is possibly unbreakable. Pair of properties that cannot simultaneously be measured. Alice sends particles to Bob and picks which property to measure for each. Bob also randomly picks which property to measure.

Cryptography Afterwards, they figure out over a normal channel for which bits they measured the same property. Those bits are the key that they can use for encrypting. They will detect any listening by Eve. If she was listening, they start over.

Other quantum algorithms Factoring integers efficiently. Searching an unsorted list in square root time. Not all that many yet.

Feasibility - hardware 7 qubit register. But need at least 419 qubits to be like a 42 bit computer. NMR technology for qubits. Also need to have the system be isolated long enough to perform many of calculations. Many advances necessary.

Feasibility – software There aren’t that many algorithms yet. Perhaps a compiler-like program could translate a circuit into an algorithm. Systems programs? General purpose quantum paradigm?

Conclusion Results at http://www.cs.xu.edu/~heile/quantum/ soon, also links to more information. TM may die a horrible death but not for a while (at least 30 years). Much potential for QC, but not realized yet.