* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Abstract - The Budker Group
Quantum dot cellular automaton wikipedia , lookup
Wave–particle duality wikipedia , lookup
Renormalization group wikipedia , lookup
Topological quantum field theory wikipedia , lookup
Renormalization wikipedia , lookup
Theoretical and experimental justification for the Schrödinger equation wikipedia , lookup
Relativistic quantum mechanics wikipedia , lookup
Double-slit experiment wikipedia , lookup
Bohr–Einstein debates wikipedia , lookup
Bell test experiments wikipedia , lookup
Basil Hiley wikipedia , lookup
Scalar field theory wikipedia , lookup
Probability amplitude wikipedia , lookup
Delayed choice quantum eraser wikipedia , lookup
Quantum decoherence wikipedia , lookup
Quantum electrodynamics wikipedia , lookup
Measurement in quantum mechanics wikipedia , lookup
Particle in a box wikipedia , lookup
Density matrix wikipedia , lookup
Path integral formulation wikipedia , lookup
Copenhagen interpretation wikipedia , lookup
Quantum field theory wikipedia , lookup
Coherent states wikipedia , lookup
Hydrogen atom wikipedia , lookup
Quantum entanglement wikipedia , lookup
Bell's theorem wikipedia , lookup
Quantum dot wikipedia , lookup
Many-worlds interpretation wikipedia , lookup
Quantum fiction wikipedia , lookup
Symmetry in quantum mechanics wikipedia , lookup
Orchestrated objective reduction wikipedia , lookup
EPR paradox wikipedia , lookup
Interpretations of quantum mechanics wikipedia , lookup
History of quantum field theory wikipedia , lookup
Quantum teleportation wikipedia , lookup
Quantum group wikipedia , lookup
Quantum machine learning wikipedia , lookup
Quantum state wikipedia , lookup
Quantum cognition wikipedia , lookup
Hidden variable theory wikipedia , lookup
Quantum computing wikipedia , lookup
Patrick Lii Physics 138 Prof. Budker 5 May 2009 Abstract: Quantum Computers and Qbit Cryptography In 1994, Peter Shor—then a researcher at the AT&T Bell Labs—published the paper, “Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer” describing a quantum algorithm which could be used to efficiently factor huge numbers into their prime factors. One of the most fascinating applications of this procedure was the efficiency with which it was able to defeat complex encryption schemes that would otherwise be impossible to decrypt with a classical computer. Although the basic principles of quantum computers had been understood for decades, the true potential of quantum computers was not fully grasped until Shor proposed this eponymous algorithm. In the past decade, the government (as well as private enterprise) has begun to fund extensive research into quantum computing in the hopes that quantum computers will eventually take over for classical computing. Like classical computers, quantum computers utilize bits to store data; however, unlike a classical bit which can only be in the 0 or 1 state, a quantum bit (qbit) can be in a superposition of both the 0 and 1 state. The states of qbits are manipulated using quantum gates, which are simply unitary operators in the Hilbert space of the qbit basis: using many of these quantum gates in sequence, we can produce a quantum algorithm. The quantum mechanical features of the quantum computer allow it to process many pieces of information in parallel, and for many applications this provides a significant speed boost over classical computers. In 2001, a group at IBM led by Lieven Vandersvpen created a 7-qbit computer using a nuclear magnetic resonance implementation and proved that Shor’s algorithm could work by factoring 15 into its prime factors, 3 and 5. Since then, Shor’s algorithm has also been implemented on a quantum computer consisting of Josephson Charge qbits (Vartiainen et al 2003); additionally, quantum computers based on diamonds (Stoneham et al 2009), optical lattices, and many other two-level systems have been proposed by physicists and engineers. Still, we are decades away from a quantum computer which can match all of the capabilities of a contemporary classical computer. Nonetheless, it is clear that quantum computers represent a radical and fundamental change in the way in which we think about computing. The qbits utilized in quantum computing have also been used to develop quantum cryptography protocols. In 1984, Charles Bennett and Gilles Brassard proposed the BB84 key distribution scheme which is a method of securely distributing a randomly generated, one-timeuse encryption key between a sender and a receiver using quantum bits. In theory, the BB84 scheme allows the sender and receiver not only to generate a secure key, but also detect if the transmission is being intercepted or eavesdropped on. Since the proposal of BB84, these cryptography protocols have been refined to become more robust than before (Scarani et al 2004a).