Download Abstract - The Budker Group

Survey
yes no Was this document useful for you?
   Thank you for your participation!

* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project

Document related concepts

Quantum dot cellular automaton wikipedia , lookup

Wave–particle duality wikipedia , lookup

Renormalization group wikipedia , lookup

Topological quantum field theory wikipedia , lookup

Renormalization wikipedia , lookup

Theoretical and experimental justification for the Schrödinger equation wikipedia , lookup

Relativistic quantum mechanics wikipedia , lookup

Double-slit experiment wikipedia , lookup

Bohr–Einstein debates wikipedia , lookup

Bell test experiments wikipedia , lookup

Basil Hiley wikipedia , lookup

Scalar field theory wikipedia , lookup

Probability amplitude wikipedia , lookup

Delayed choice quantum eraser wikipedia , lookup

Quantum decoherence wikipedia , lookup

Quantum electrodynamics wikipedia , lookup

Measurement in quantum mechanics wikipedia , lookup

Particle in a box wikipedia , lookup

Density matrix wikipedia , lookup

Path integral formulation wikipedia , lookup

Copenhagen interpretation wikipedia , lookup

Quantum field theory wikipedia , lookup

Coherent states wikipedia , lookup

Hydrogen atom wikipedia , lookup

Quantum entanglement wikipedia , lookup

Bell's theorem wikipedia , lookup

Quantum dot wikipedia , lookup

Max Born wikipedia , lookup

Many-worlds interpretation wikipedia , lookup

Quantum fiction wikipedia , lookup

Symmetry in quantum mechanics wikipedia , lookup

Orchestrated objective reduction wikipedia , lookup

EPR paradox wikipedia , lookup

Interpretations of quantum mechanics wikipedia , lookup

History of quantum field theory wikipedia , lookup

Quantum teleportation wikipedia , lookup

Quantum group wikipedia , lookup

Quantum machine learning wikipedia , lookup

Quantum state wikipedia , lookup

Quantum cognition wikipedia , lookup

Hidden variable theory wikipedia , lookup

Quantum computing wikipedia , lookup

T-symmetry wikipedia , lookup

Canonical quantization wikipedia , lookup

Quantum key distribution wikipedia , lookup

Transcript
Patrick Lii
Physics 138
Prof. Budker
5 May 2009
Abstract: Quantum Computers and Qbit Cryptography
In 1994, Peter Shor—then a researcher at the AT&T Bell Labs—published the paper,
“Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum
Computer” describing a quantum algorithm which could be used to efficiently factor huge
numbers into their prime factors. One of the most fascinating applications of this procedure was
the efficiency with which it was able to defeat complex encryption schemes that would otherwise
be impossible to decrypt with a classical computer. Although the basic principles of quantum
computers had been understood for decades, the true potential of quantum computers was not
fully grasped until Shor proposed this eponymous algorithm. In the past decade, the government
(as well as private enterprise) has begun to fund extensive research into quantum computing in
the hopes that quantum computers will eventually take over for classical computing.
Like classical computers, quantum computers utilize bits to store data; however, unlike a
classical bit which can only be in the 0 or 1 state, a quantum bit (qbit) can be in a superposition
of both the 0 and 1 state. The states of qbits are manipulated using quantum gates, which are
simply unitary operators in the Hilbert space of the qbit basis: using many of these quantum
gates in sequence, we can produce a quantum algorithm. The quantum mechanical features of
the quantum computer allow it to process many pieces of information in parallel, and for many
applications this provides a significant speed boost over classical computers.
In 2001, a group at IBM led by Lieven Vandersvpen created a 7-qbit computer using a
nuclear magnetic resonance implementation and proved that Shor’s algorithm could work by
factoring 15 into its prime factors, 3 and 5. Since then, Shor’s algorithm has also been
implemented on a quantum computer consisting of Josephson Charge qbits (Vartiainen et al
2003); additionally, quantum computers based on diamonds (Stoneham et al 2009), optical
lattices, and many other two-level systems have been proposed by physicists and engineers. Still,
we are decades away from a quantum computer which can match all of the capabilities of a
contemporary classical computer. Nonetheless, it is clear that quantum computers represent a
radical and fundamental change in the way in which we think about computing.
The qbits utilized in quantum computing have also been used to develop quantum
cryptography protocols. In 1984, Charles Bennett and Gilles Brassard proposed the BB84 key
distribution scheme which is a method of securely distributing a randomly generated, one-timeuse encryption key between a sender and a receiver using quantum bits. In theory, the BB84
scheme allows the sender and receiver not only to generate a secure key, but also detect if the
transmission is being intercepted or eavesdropped on. Since the proposal of BB84, these
cryptography protocols have been refined to become more robust than before (Scarani et al
2004a).