Introduction to Quantum Computing

Similar documents
Introduction to Quantum Computing

Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary

Shor s algorithm and secret sharing

QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University

Quantum Computing. Robert Sizemore

Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar

Factoring by Quantum Computers

arxiv:quant-ph/ v2 19 Jan 2000

Quantum Computers vs. Computers

The New Approach of Quantum Cryptography in Network Security

How To Solve An Npa-Complete Problems With Quantum Computing And Chaotic Dynamics

QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION

Introduction to Quantum Computing

Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell

24 th IEEE Annual Computer Communications Workshop (CCW)

Quantum Algorithms Lecture Notes Summer School on Theory and Technology in Quantum Information, Communication, Computation and Cryptography

QOT - Quantum Optical Technologies

Quantum Computing and Grover s Algorithm

0.1 Phase Estimation Technique

A Probabilistic Quantum Key Transfer Protocol

Bits Superposition Quantum Parallelism

Quantum Computing: Lecture Notes. Ronald de Wolf

CSCE 465 Computer & Network Security

What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm

Quantum computing in practice

Elements of Applied Cryptography Public key encryption

A New Generic Digital Signature Algorithm

Basic Algorithms In Computer Algebra

Secure Network Communication Part II II Public Key Cryptography. Public Key Cryptography

Cryptography and Network Security Chapter 9

Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and

Study of algorithms for factoring integers and computing discrete logarithms

Lecture 13 - Basic Number Theory.

Factoring & Primality

Quantum Computability and Complexity and the Limits of Quantum Computation

Quantum Computing Architectures

Cryptography and Network Security

Quantum Computers. And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, Quantum Computers

Quantum Safe Security Workgroup Presentation. Battelle / ID Quantique / QuantumCTek CSA EMEA Congress, Rome 19 November 2014

CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives

arxiv:quant-ph/ v2 25 Jan 1996

Mathematics of Internet Security. Keeping Eve The Eavesdropper Away From Your Credit Card Information

Keywords Quantum logic gates, Quantum computing, Logic gate, Quantum computer

Table of Contents. Bibliografische Informationen digitalisiert durch

Public Key (asymmetric) Cryptography

Notes on Network Security Prof. Hemant K. Soni

Network Security Using Quantum Cryptography N.Kusuma#1, N.Sai Tejaswi#2, T.Anitha,#3, K.V.D Kiran*4

CRYPTOGRAPHY IN NETWORK SECURITY

DO WE REALLY UNDERSTAND QUANTUM MECHANICS?

Bevezetés a kvantum-informatikába és kommunikációba 2014/2015 tavasz. Mérés, NCT, kvantumállapot március 12.

CIS 5371 Cryptography. 8. Encryption --

2.1 Complexity Classes

Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission

Cryptography Lecture 8. Digital signatures, hash functions

A SOFTWARE COMPARISON OF RSA AND ECC

Lukasz Pater CMMS Administrator and Developer

Library (versus Language) Based Parallelism in Factoring: Experiments in MPI. Dr. Michael Alexander Dr. Sonja Sewera.

Quantum Encoder and Decoder for Secret Key Distribution with Check Bits

1 Message Authentication

Lecture 1 Version: 14/08/28. Frontiers of Condensed Matter San Sebastian, Aug , Dr. Leo DiCarlo l.dicarlo@tudelft.nl dicarlolab.tudelft.

Software Tool for Implementing RSA Algorithm

Securing Your Data In Transit For The Long Term

The Mathematics of the RSA Public-Key Cryptosystem

Quantum Algorithms in NMR Experiments. 25 th May 2012 Ling LIN & Michael Loretz

COMPSCI 111/111G. Quantum Computing. Term 1, Prepared using LATEX Beamer by Cristian S.Calude 1 / 26

Thnkwell s Homeschool Precalculus Course Lesson Plan: 36 weeks

Factoring. Factoring 1

Introduction. Digital Signature

A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing

Current Standard: Mathematical Concepts and Applications Shape, Space, and Measurement- Primary

Lecture Note 5 PUBLIC-KEY CRYPTOGRAPHY. Sourav Mukhopadhyay

Lecture 13: Factoring Integers

NEW YORK STATE TEACHER CERTIFICATION EXAMINATIONS

Overview of Public-Key Cryptography

FACTORING LARGE NUMBERS, A GREAT WAY TO SPEND A BIRTHDAY

Principles of Public Key Cryptography. Applications of Public Key Cryptography. Security in Public Key Algorithms

South Carolina College- and Career-Ready (SCCCR) Pre-Calculus

ALGEBRA 2 CRA 2 REVIEW - Chapters 1-6 Answer Section

Arithmetic algorithms for cryptology 5 October 2015, Paris. Sieves. Razvan Barbulescu CNRS and IMJ-PRG. R. Barbulescu Sieves 0 / 28

Quantum Cryptography: The Ultimate Solution to Secure Data Transmission?

Public Key Cryptography and RSA. Review: Number Theory Basics

Software Implementation of Gong-Harn Public-key Cryptosystem and Analysis

Outline. Computer Science 418. Digital Signatures: Observations. Digital Signatures: Definition. Definition 1 (Digital signature) Digital Signatures

MATH 168: FINAL PROJECT Troels Eriksen. 1 Introduction

Discrete Mathematics, Chapter 4: Number Theory and Cryptography

Factoring Algorithms

Quantum Computing and Cryptography Their impact on cryptographic practice

Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range

RSA Attacks. By Abdulaziz Alrasheed and Fatima

Transcription:

Introduction to Quantum Computing Frédéric Magniez LIAFA & PCQC, Université Paris Diderot

The genesis 2 Copenhagen School (Bohr, Heisenberg, ) - The state of a quantum particule is only fixed after a measurement - Bennett, Brassard 84: perfectly secure quantum encryption that can be used in practice Paradoxe of Einstein, Podolsky, Rosen 35 - Very distant particules remain linked? - Aspect, Grangier, Roger, Dalibard 82: yes - Quantum encryption of Ekert 91 can be certifiable

Quantum boxes Classical information is encoded using bit (0/1) - The measure describes the state of the system 3 Preskill - A random bit is a hidden bit Quantum information is encoded using quantum-bit - Several possible measures - Outcome is determined during the measurement

Quantum key distribution 4 Problem - Setting No prior shared secret information between Alice and Bob Authenticated classical channel - Goal: Get a private key between Alice and Bob - Application: One-time pad (Miller 1882-Shanon 1945) Classical results - Impossible: all the information is in the canal - Possible (using randomized techniques): Amplify the privacy of an imperfect private key Washington-Moscow hotline (1963)

The protocol BB84 [Bennett-Brassard 84] 5 Protocol: quantum part Key: Encoding: Decoding: Key: Protocol: classical part - Reconciliation: Alice and Bob publicly announce their coding choices A&B only keep key bits with same choices - Security: Intercepting and opening a box errors A&B check few key bits at random positions - Privacy amplification: Perfect key using with few other more key bits Conclusion - Secrete key generation using an authenticated classical channel - Small initial private key large private key, with no authenticated channel

The protocol BB84 [Bennett-Brassard 84] 5 Protocol: quantum part Key: Encoding: Decoding: Key: Protocol: classical part - Reconciliation: Alice and Bob publicly announce their coding choices A&B only keep key bits with same choices - Security: Intercepting and opening a box errors A&B check few key bits at random positions - Privacy amplification: Perfect key using with few other more key bits Conclusion - Secrete key generation using an authenticated classical channel - Small initial private key large private key, with no authenticated channel

Superposition 6 Quantum randomness: principle of superposition - 1 qubit is in superposition of 2 values 1 2 (, ) 0i + 1i 0 2 - Rotation of axes: another measure 1 1 0i + 1i 0 0 1 1 0 0

Polarization of photons 7 State - Polarization: 2-dimensional vector i = cos i + sin "i Measure - Calcite crystal separates horizontal and vertical polarizations A measure modifies the system Transformation - Well known transformation: half-wave blade orthogonal symmetry around its axis - Any rotations (possibly with complex angles) cos 2 sin 2

Qubit 8 State - 2-dimensional unit vector i = cos 0i +sin 1i 1i 0i general case (complex amplitudes): i = = 0i + 1i, 2 + 2 =1 Measure - Randomized orthogonal projection Evolution 0i + 1i Measure 2 2 0i 1i - Unitary transformation G 2 U(2) ( reversible) Definition: G 2 C 2 2 s.t. G G = Id i G 0 i = G i 0 i = G i G i

Examples of transformations 9 Reversible classical transformation - Identity - Negation Hadamard transformation - Definition: half-wave blade at 22,5 bi bi H Id - Properties: quantum coin flipping bi bi NOT 1 bi 0i H bi H 1 p 2 ( 0i + 1i) H Measure H = p 1 1 1 2 1 1 1 p 2 ( 0i + ( Measure bi 1) b 1i) 1 2 1 2 0i 1i Measure does not commute

Entanglement 10 Principle: 2 distant boxes which remain entangled - Outcomes are random - but correlated if boxes are opened similarly - and uncorrelated otherwise Bell 64 inequality - Cooperative random game Classical 75% of victory Quantum > 85% of victoiry - Experimental verification at Orsay in 1982 - Application: quantum certification

Bell-CHSH inequality as a classical game 11 Game - Alice and Bob share random bits but cannot communicate - Alice receives a random bit x, Bob y - Alice returns a bit a, Bob b x y a shared random bits b - Goal: maximize 0 1 0 0 0 1 0 1 p = Pr(a b = x ^ y) x,y Classically: CHSH inequality [1969] 0 1 0 0 1 1 1 0 - Best deterministic strategy: a = b =0 =) p = 3 4 - Theorem: the best probabilistic strategy is not better than the best deterministic strategy

n-qubit 12 State - i2c {0,1}n such that k ik =1 i = X x xi X x2{0,1} with n x 2 =1 x2{0,1} n - Examples - Separated 2-qubit: 00i + 01i = 0i( 0i + 1i) - Entangled 2-qubit: 00i + 11i 6= 1i 2i EPR state Measure - Randomized X orthogonal projection x xi Measure x2{0,1} n Evolution - Unitary transformation G 2 U(2 n ) i G x 2 ( G 2 C 2n 2 n s.t. G G = Id) 0 i = G i xi

Transformation c NOT 13 Definition c NOT 0bi = 0bi c NOT 1bi = 1i (1 c NOT abi = ai a b)i bi c NOT = 0 1 1000 B0100 C @ 0001A 0010 Representation control bit target bit NOT Bell basis change xi H yi NOT xyi 00i = 1 p 2 ( 00i + 11i) 01i = 1 p 2 ( 01i + 10i) 10i = 1 p 2 ( 00i 11i = 1 p 2 ( 01i 11i) 10i)

EPR state 14 Setting - Assume Alice & Bob shares an EPR state: p 1 2 ( 00i + 11i) Alice has the first qubit, and Bob the second one 0 0 + 1 1 - Alice & Bob observe their qubit and respectively get bit a,b Fact - a=b with probability 1 - a (resp. b) is a uniform random bit Classical analogue? - Shared randomness model: Alice and Bob have access to shared random bits Non product distribution: / 2 / 2 00 with prob. 1/2 and 11 with prob. 1/2 - Can we simulate quantum physic using shared randomness? shared random bits

Bell-CHSH inequality as a quantum game 15 Reminder - Goal: maximize Quantumly - Alain and Bob share an EPR state x a p = Pr(a b = x ^ y) x,y 0 0 + 1 1 / 2 / 2 y b - Bob performs a rotation of angle - If x =1, Alain performs a rotation of angle - If y =1, Bob performs a rotation of angle 8 4 4 - Alain et Bob observe their qubit and send their respective outcomes - Theorem: p = cos 2 ( 8 ) 0.85 Realization: [Aspect-Grangier-Roger-Dalibard: Orsay 82]

Superdense coding [1992] 16 Problem - Alice & Bob share an EPR state: - Alice wants to send two bits xy to Bob - But Alice can only send one qubit to Bob 00i = 1 p 2 ( 00i + 11i) 0 0 / 2 + 1-qubit 1 1 / 2 xy xy? Bell basis change xi H yi NOT xyi 00i = 1 p 2 ( 00i + 11i) 01i = 1 p 2 ( 01i + 10i) 10i = 1 p 2 ( 00i 11i = 1 p 2 ( 01i 11i) 10i) Protocol - Alice applies to its qubit NOT, if y=1; and FLIP, if x=1 - Alice sends its qubit to Bob - Bob performs the inverse of the Bell basis change, and observes xy FLIP = 1 0 0 1

Quantum teleportation 17 Problem - Alice wants to transmit a qubit i to Bob - Bob: far and unknown position to Alice i i Realization Alice 0 0 Bob ψ Interaction quantique Interaction interne Interaction classique The quantum communication does not reveal anything on i Alice ψ Bob

Realization of teleportation 18 Circuit i = 0i + 1i Analysis 0i 0i H NOT NOT - 1 P Final state with xyi = (NOT) y (FLIP) x 2 x,y xyi xyi i - By measuring x,y, third qubit is projected to xyi xyi i - After learning x,y, Bob can correct to Realizations - 1 photon [Zeilinger et al : Innsbruck 97] - 1 photon, 6 km [Gisin et al : Genève 02] - 1 atom [Blatt et al : Innsbruck 04] - Today: over 100km H Measure xi yi xyi

NATURE NEWS Google and NASA snap up quantum computer 19 D-Wave machine to work on artificial-intelligence problems. Nicola Jones 16 May 2013 D-Wave, the small company that sells the world s only commercial quantum computer, has just bagged an impressive new customer: a collaboration between Google, NASA and the non-profit Universities Space Research Association. The three organizations have joined forces to install a D-Wave Two, the computer company's latest model, in a facility launched by the collaboration the Quantum Artificial Intelligence Lab at NASA's Ames Research Center in Moffett Field, California. The lab will explore areas such as machine learning making computers sort and analyse data on the basis of previous experience. This is useful for functions such as language translation, image searches and voice-command recognition. We actually think quantum machine learning may provide the most creative problem-solving process under the known laws of physics, says a blog post from Google describing the deal. Print The D-Wave Two quantum computer has a 512- qubit processor (pictured) that can do some calculations thousands of times faster than conventional computers. D-WAVE

In the News Barack Obama Drones American Airlines Benghazi American Idol Safari Power Saver Click to Start Flash Plug-in 20 Senate report: Benghazi attack was preventable VIDEO Top Springsteen political moments MAP The United States (of Pizza) NSA seeks to build quantum computer that could crack most types of encryption By Steven Rich and Barton Gellman, Published: January 2 E-mail the writers In room-size metal boxes secure against electromagnetic leaks, the National Security Agency is racing to build a computer that could break nearly every kind of encryption used to protect banking, medical, business and government records around the world. According to documents provided by former NSA contractor Edward Snowden, the effort to build a cryptologically useful quantum computer a machine exponentially faster than classical computers is part of a $79.7 million research program titled Penetrating Hard Targets. Much of the work is hosted under classified contracts at a laboratory in College Park, Md. Vous Vendez Un Bien? 20

Supercomputer 21 Feynman 81 - Can quantum systems be probabilistically simulated by a classical computer? [...] the answer is certainly, No Deutsch 85 - Quantum Turing Machine - Existence of a universal Turing Machine Simon, Shor 94 - Quantum algorithms with exponential speedup - Quantum attack of public-key crypto-systems

Quantum parallelism 22 n-qubit - Superposition of all possible values - 2 n possible values Parallel computation - In one step, 2 n computations - But only one outcome can be (randomly) observed Strategy Nb of particules in the Universe 2 300 - Combine cleverly those values before measuring them 4 bits can take 2 4 =16 values 0000 0001 0010 0011 0100 0101 0110 0111 1000 1001 1010 1011 1100 1101 1110 1111

Asymmetric encryption 23 One-way functions - Example: multiplication / factorization - Bases of modern encryption (Rivest, Shamir, Adleman 77) RSA challenges (1991-2007) - RSA-100, $1,000, 1991 - RSA-640, $20,000, 2005 17 x 19 =? 667 =? x? 310741824049004372135075003588856 793003734602284272754572016194882 320644051808150455634682967172328 678243791627283803341547107310850 191954852900733772482278352574238 6454014691736602477652346609 =? x?

Quantum algorithm for factorization 24 Classical reduction - Factorization can be reduced to period finding (of some arithmetic function) Quantum tool: Fourier Transform Shor 94 - FT reveals the period of a signal - FT is (very) fast on a quantum superposition 3107418240490043721350750035888567930037346022842727545720161948823206440518081504556346829671723 286782437916272838033415471073108501919548529007337724822783525742386454014691736602477652346609 = 1634733645809253848443133883865090859841783670033092312181110852389333100104508151212118167511579 x 1900871281664822113126851573935413975471896789968515493666638539088027103802104498957191261465571

From period finding to factorization 25 Theorem [Simon-Shor 94] - Finding the period of any function on an abelian group can be done in quantum time poly (log G ) Order finding - Input: integers n and a such that gcd(a,n)=1 - Output: the smallest integer q 0 such that a q = 1 mod n - Reduction to period finding: the period of x a x mod n is q Factorization - Input: integer n - Output: a nontrivial divisor of n Reduction : Factorization R Order finding - Check that gcd(a,n)=1 - Compute the order q of a mod n - Restart if q is odd or a q/2-1 mod n - Otherwise (a q/2-1) (a q/2 + 1) = 0 mod n - Return gcd(a q/2 ± 1, n)

Simon s problem 26 Problem - Oracle input: f : {0, 1} n {0, 1} n a black-box function xi U f 0 f(x) xi xi U f xi wi w f(x)i such that - Output: the period s Complexity - Randomly: 2 (n) queries - Quantumly: O(n) queries and time O(n 3 ) Idea - Use a Fourier transformation: QFT n xi = 1 where x y = X i 9s 6= 0 n : 8x 6= y, f(x) =f(y) () y = x x i y i mod 2 2 n/2 X y ( 1) x y yi s - Realization of QFTn using Hadamard gates: 1 bi H p2 ( 0i + ( 1) b 1i) QFT n H H H

Quantum solution 27 0 n i QFT n QFT n Measure yi : y 2 s? U f 0 n i Measure f(x)i Initialization: Parallelization: 1 Query to f: Filter: Interferences: 0 n i 0 n i X 2 n/2 x X 1 2 n/2 x xi 0 n i X 1 2 (n+1)/2 y X 1 2 (n+1)/2 y X 1 2 (n 1)/2 xi f(x)i 1 p 2 ( xi + x y:s y=0 si) f(x)i (( 1) x y + ( 1) (x s) y ) yi f(x)i ( 1) x y (1 + ( 1) s y ) yi f(x)i yi f(x)i

Finding the period 28 Construction of a linear system - After iterations: - s 0 n is solution of the linear system in t: n + k y 1,y 2,...,y n+k s y 1 t = 0 y 2 t = 0 y 1 1 t 1 + y 1 2 t 2 +...+ y 1 n t n =0 y 2 1 t 1 + y 2 2 t 2 +...+ y 2 n t n =0. y n+k t = 0. y n+k 1 t 1 + y n+k 2 t 2 +...+ yn n+k t n =0 - The y i are of rank n-1 with proba 1-1/2 k+1 - System solutions: 0 n and s Complexity - Constructing the system: O(n) queries, time O(n) - Solving the system: no query, time O(n 3 )

More difficult... 29 Period Finding(G) - Oracle input: function f on G such that f is strictly periodic for some unknown H G: f(x) =f(y) () y 2 xh G H a 1 H f - Output: generator set for H Examples - Simon Problem: - Factorization : - Discrete logarithm: - Pell s equations: - Graph Isomorphism: a t H G =(Z 2 ) n,h= {0,s} G = Z, H= rz G = Z 2,H= {(rx, x) :x 2 Z} G = R G = S n Quantum polynomial time algorithms (in log G ) - Abelian groups G: QFT-based algorithm [1995] - Normal period groups H: QFT-based algorithm [2000] - Solvable groups G of constant exponent and constant length [2003] -...

Hard instances 30 Shift problem - Dihedral group Z N o Z 2 : sub-exponential time 2 O( log N) [2003] f(, 0) f(, 1) Graph Isomorphism A : B : 2 5 12 3 9 7 6 10 15 4 shift = -3 3 9 7 6 10 15 4 2 5 12 - Instance of Period Finding on the symmetric group where we just know how to implement QFT... [1997] A B a 1 b 6 c 8 d 3 e 5 f 2 g 4 h 7 General case - Polynomial number of queries to f, but exponential post-processing time [1999]

Grover search algorithm 31 Grover problem - Oracle input: f : [N] {0,1} - Output: find x0 such that f(x0)=1, if there is any - Constraint: f is a black-box Query complexity - Randomly: ϴ(N) - Quantumly: ϴ( N)

Graph search 32 Setting - Graph G on a vertex-set X - Set M X of unknown marked vertices Problem - Move to a marked vertex - Constraints Displacements restricted to the edges of G Can check if x is marked only if currently at position x - Complexity: # of moves

Search via random walk 33 Setting - Probability transitions: Markov chain P = (pxy) on G Locality pxy 0 only if (x, y) is an edge of G - Starting vertex: Stationary distribution π on vertices of G π: 1-eigenvector of P Random search 1. Sample from stationary distribution of P 2. Repeat a. Check if current state is marked b. Move according to P Hitting time - HT: Average # iterations of Random search to hit a marked element average complexity : Sample + 1/(HT) ( Check + Move ) Examples - HT(Complete graph) = N (# of vertices) - HT(2D grid) = N x log N

Quantum walk 34 Some examples - [1995]: Complete graph - [2003]: Hypercube - [2004]: Johnson Graph - [2005]: 2D-Grid Generic construction - Quantum analogue of a symmetric Markov chain P [2004] - Generalization for reversible walks and simplified analysis [2007] Theorem - There is a quantum analogue of Random search which finds a marked elements with complexity Sample + 1/ (HT) ( Check + Move )

Important application: Element distinctness 35 Element Distinctness - Input: List of N numbers {x1, x2, x3,, xn} - Output: Are all the numbers distinct? (or is there a collision: xi = xj, i j) - Complexity: # of queried numbers - Classically: N - Using Grover search: N 3/4 [2001] - Using quantum walk on Johnson graph: N 2/3 [2004] - Lower bound: N 2/3 [2002] Algorithm - Johnson Graph (N, r) Vertices: { S {1, 2,, N}: S =r } Edges: { (S, T): Δ(T S) =1 } - Hitting time: HT = O(N 2 /r) - Runtime: r + (N 2 /r) ( 0 + 2 ) N 2/3 x 2 x 5 x 2 x 3 x 8 x 13 x 10 x 13 x 2 x 3 x 8 x 13 x 2 x 3 x 5 = x 7 x 2 x 3 x 5 x 13 sample check move

How many quantum algorithms exist? 36 Unstructured problems - Grover algorithm [1996] Algebraic problems - Simon-Shor algorithm [1994] Well structured problems - Classical algorithms are optimal Problems with few structures - Quantum walk based algorithms [2003] quantum analogy of random walks - Examples Element Distinctness, Commutativity: N 2/3 [2004] Triangle Finding: N 9/7 (lower bound N) [2013] Square Finding: N 1.25 (lower bound N) [2010] Matrix Multiplication: N 5/3 (lower bound N 3/2 ) [2006] AND-OR Tree evaluation: N [2007]

The superiority of Quantum Computing 37 Cryptography - Secrete Key Distribution Protocol [Bennett, Brassard 84] Implementation: ~100 km Information Theory - EPR Paradox [Einstein, Podolsky, Rosen 35] Realization: 1982 [Orsay] - Teleportation [Bennett, Brassard, Crépeau, Jozsa, Peres, Wootters 93] Realization: 1997 [Innsbruck] Algorithms - Polynomial algorithm for Period Finding [Simon, Shor 94] Factorization, Discrete Logarithm - Quadratic speedup for Database Search [Grover 96] - Quantum computer? 1995: 2-qubit [ENS], 2000: 5-qubit [IBM], 2006: 12-qubit [Waterloo]

The superiority of Quantum Computing 37 Cryptography - Secrete Key Distribution Protocol [Bennett, Brassard 84] Implementation: ~100 km Information Theory - EPR Paradox [Einstein, Podolsky, Rosen 35] Realization: 1982 [Orsay] - Teleportation [Bennett, Brassard, Crépeau, Jozsa, Peres, Wootters 93] Realization: 1997 [Innsbruck] Algorithms - Polynomial algorithm for Period Finding [Simon, Shor 94] Factorization, Discrete Logarithm - Quadratic speedup for Database Search [Grover 96] - Quantum computer? 1995: 2-qubit [ENS], 2000: 5-qubit [IBM], 2006: 12-qubit [Waterloo] Quantum proofs for classical theorems - http://arxiv.org/abs/0910.3376 [Drucker, de Wolf 09]

Where does the quantum superiority come from? 38 Entanglement? - Classical entanglement exists: shared randomness - But quantum entanglement is stronger Bell-CHSH inequality and applications Complex amplitudes? - No: they can be simulated using only real amplitude Negative amplitudes? - Yes: they can induce destructive interferences 0 0 + 1 1 / 2 / 2 Hardness of amplitudes? - No: amplitudes must be easily computable for being physically realizable

Future 39 Applications - Unfalsifiable money, artificial intelligence, Quantum computing - For a better understanding of quantum phenomenon - New mathematical tool for proving results in classical computing Technology - Computer, intermediate models: boson sampling - Certification : encryption, random generator, computation

Some quantum centers in the world 40 IQIS CQC RQC IQC PCQC IQI QIS QISC CQI CQT CQC 2 T

www.pcqc.fr 41