SlideShare una empresa de Scribd logo
Quantum Computing
Ronald de Wolf
Quantum-mechanical computers
Quantum-mechanical computers
Our society runs on classical computers
Quantum-mechanical computers
Our society runs on classical computers:
memory-locations have specific value (0 or 1),
processor acts on specific location, . . .
Quantum-mechanical computers
Our society runs on classical computers:
memory-locations have specific value (0 or 1),
processor acts on specific location, . . .
But our world is not classical, so let’s study
quantum-mechanical computers
Quantum-mechanical computers
Our society runs on classical computers:
memory-locations have specific value (0 or 1),
processor acts on specific location, . . .
But our world is not classical, so let’s study
quantum-mechanical computers
Why?
1. Enable further miniaturization (Moore’s law)
Quantum-mechanical computers
Our society runs on classical computers:
memory-locations have specific value (0 or 1),
processor acts on specific location, . . .
But our world is not classical, so let’s study
quantum-mechanical computers
Why?
1. Enable further miniaturization (Moore’s law)
2. Enable large speed-up for some important problems
Quantum-mechanical computers
Our society runs on classical computers:
memory-locations have specific value (0 or 1),
processor acts on specific location, . . .
But our world is not classical, so let’s study
quantum-mechanical computers
Why?
1. Enable further miniaturization (Moore’s law)
2. Enable large speed-up for some important problems
3. The goal of computer science is to study the power
of the best computing machines that Nature allows us
Quantum computers: hype vs substance
The goal of this talk:
Assume large quantum computers will be built in the next decades.
Where will they have a real impact?
Quantum computers: hype vs substance
The goal of this talk:
Assume large quantum computers will be built in the next decades.
Where will they have a real impact?
Probably: Cryptography, optimization, simulation
Quantum computers: hype vs substance
The goal of this talk:
Assume large quantum computers will be built in the next decades.
Where will they have a real impact?
Probably: Cryptography, optimization, simulation
Maybe: Machine learning
Quantum computers: hype vs substance
The goal of this talk:
Assume large quantum computers will be built in the next decades.
Where will they have a real impact?
Probably: Cryptography, optimization, simulation
Maybe: Machine learning
Forget about it: NP-hard problems (TSP, protein folding,. . . )
Quantum computers: hype vs substance
The goal of this talk:
Assume large quantum computers will be built in the next decades.
Where will they have a real impact?
Probably: Cryptography, optimization, simulation
Maybe: Machine learning
Forget about it: NP-hard problems (TSP, protein folding,. . . ),
ending climate change, finding ET, . . .
Quantum bits
Quantum bits
A classical bit is 0 or 1
Quantum bits
A classical bit is 0 or 1
Quantum mechanics allows superposition of |0 and |1 ,
each with its own “amplitude”
Quantum bits
A classical bit is 0 or 1
Quantum mechanics allows superposition of |0 and |1 ,
each with its own “amplitude”. This is a qubit
Quantum bits
A classical bit is 0 or 1
Quantum mechanics allows superposition of |0 and |1 ,
each with its own “amplitude”. This is a qubit
We can use any physical system with two distinguishable basis
states to build a qubit:
Quantum bits
A classical bit is 0 or 1
Quantum mechanics allows superposition of |0 and |1 ,
each with its own “amplitude”. This is a qubit
We can use any physical system with two distinguishable basis
states to build a qubit:
electron spin
Quantum bits
A classical bit is 0 or 1
Quantum mechanics allows superposition of |0 and |1 ,
each with its own “amplitude”. This is a qubit
We can use any physical system with two distinguishable basis
states to build a qubit:
electron spin, photon polarization
Quantum bits
A classical bit is 0 or 1
Quantum mechanics allows superposition of |0 and |1 ,
each with its own “amplitude”. This is a qubit
We can use any physical system with two distinguishable basis
states to build a qubit:
electron spin, photon polarization, | + |
Quantum bits
A classical bit is 0 or 1
Quantum mechanics allows superposition of |0 and |1 ,
each with its own “amplitude”. This is a qubit
We can use any physical system with two distinguishable basis
states to build a qubit:
electron spin, photon polarization, | + |
2 qubits: superposition of 4 possible basis states (00,01,10,11)
Quantum bits
A classical bit is 0 or 1
Quantum mechanics allows superposition of |0 and |1 ,
each with its own “amplitude”. This is a qubit
We can use any physical system with two distinguishable basis
states to build a qubit:
electron spin, photon polarization, | + |
2 qubits: superposition of 4 possible basis states (00,01,10,11)
3 qubits: superposition of 8 possible basis states
Quantum bits
A classical bit is 0 or 1
Quantum mechanics allows superposition of |0 and |1 ,
each with its own “amplitude”. This is a qubit
We can use any physical system with two distinguishable basis
states to build a qubit:
electron spin, photon polarization, | + |
2 qubits: superposition of 4 possible basis states (00,01,10,11)
3 qubits: superposition of 8 possible basis states
...
n qubits: superposition of 2n possible basis states
Quantum bits
A classical bit is 0 or 1
Quantum mechanics allows superposition of |0 and |1 ,
each with its own “amplitude”. This is a qubit
We can use any physical system with two distinguishable basis
states to build a qubit:
electron spin, photon polarization, | + |
2 qubits: superposition of 4 possible basis states (00,01,10,11)
3 qubits: superposition of 8 possible basis states
...
n qubits: superposition of 2n possible basis states
Described by a “wavefunction”: vector of all 2n amplitudes
Quantum computers in a nutshell
Quantum computers in a nutshell
Waves can strengthen or weaken each other:
Quantum computers in a nutshell
Waves can strengthen or weaken each other:
Quantum computers in a nutshell
Waves can strengthen or weaken each other:
Quantum computation = superposition + interference
Quantum computers in a nutshell
Waves can strengthen or weaken each other:
Quantum computation = superposition + interference
1. Start with qubits in some simple state (e.g. all |0 )
Quantum computers in a nutshell
Waves can strengthen or weaken each other:
Quantum computation = superposition + interference
1. Start with qubits in some simple state (e.g. all |0 )
2. Run circuit of “elementary gates”
creating the right interference,
so the final state has most of its
weight on solutions to your problem
Quantum computers in a nutshell
Waves can strengthen or weaken each other:
Quantum computation = superposition + interference
1. Start with qubits in some simple state (e.g. all |0 )
2. Run circuit of “elementary gates”
creating the right interference,
so the final state has most of its
weight on solutions to your problem
3. Measuring the final state then gives solution
Where do we stand today?
Where do we stand today?
We are entering the NISQ era (Preskill’18):
Noisy Intermediate-Scale Quantum technology
Where do we stand today?
We are entering the NISQ era (Preskill’18):
Noisy Intermediate-Scale Quantum technology
IBM, Google, Intel are close to 50-70 reasonably good qubits.
Where do we stand today?
We are entering the NISQ era (Preskill’18):
Noisy Intermediate-Scale Quantum technology
IBM, Google, Intel are close to 50-70 reasonably good qubits.
But 50-70 qubits is not a lot: classical computers have billions
of bits
Where do we stand today?
We are entering the NISQ era (Preskill’18):
Noisy Intermediate-Scale Quantum technology
IBM, Google, Intel are close to 50-70 reasonably good qubits.
But 50-70 qubits is not a lot: classical computers have billions
of bits. And “reasonably good” is also not great
Where do we stand today?
We are entering the NISQ era (Preskill’18):
Noisy Intermediate-Scale Quantum technology
IBM, Google, Intel are close to 50-70 reasonably good qubits.
But 50-70 qubits is not a lot: classical computers have billions
of bits. And “reasonably good” is also not great
We’ll need error-correction to deal with errors,
and that will require many more physical qubits
Where do we stand today?
We are entering the NISQ era (Preskill’18):
Noisy Intermediate-Scale Quantum technology
IBM, Google, Intel are close to 50-70 reasonably good qubits.
But 50-70 qubits is not a lot: classical computers have billions
of bits. And “reasonably good” is also not great
We’ll need error-correction to deal with errors,
and that will require many more physical qubits
“Quantum supremacy” may be reached soon:
some quantum computation that cannot be simulated on
today’s best supercomputers in a reasonable amount of time
Where do we stand today?
We are entering the NISQ era (Preskill’18):
Noisy Intermediate-Scale Quantum technology
IBM, Google, Intel are close to 50-70 reasonably good qubits.
But 50-70 qubits is not a lot: classical computers have billions
of bits. And “reasonably good” is also not great
We’ll need error-correction to deal with errors,
and that will require many more physical qubits
“Quantum supremacy” may be reached soon:
some quantum computation that cannot be simulated on
today’s best supercomputers in a reasonable amount of time
But useful quantum supremacy is still years away
Potential impact area 1: cryptography
The ancient art of secret communication
Potential impact area 1: cryptography
The ancient art of secret communication
Julius Caesar encrypted his letters
by shifting the alphabet (easy to break)
Potential impact area 1: cryptography
The ancient art of secret communication
Julius Caesar encrypted his letters
by shifting the alphabet (easy to break)
The nazis encrypted their
messages using fancy “Enigma”
machines with secret settings
that changed every day
(broken by Turing and others
using the first computers)
Potential impact area 1: cryptography
The ancient art of secret communication
Julius Caesar encrypted his letters
by shifting the alphabet (easy to break)
The nazis encrypted their
messages using fancy “Enigma”
machines with secret settings
that changed every day
(broken by Turing and others
using the first computers)
Since the 1970s: more systematic, mathematical study
Potential impact area 1: cryptography
The ancient art of secret communication
Julius Caesar encrypted his letters
by shifting the alphabet (easy to break)
The nazis encrypted their
messages using fancy “Enigma”
machines with secret settings
that changed every day
(broken by Turing and others
using the first computers)
Since the 1970s: more systematic, mathematical study
Two branches: codemakers and codebreakers
Codebreaking
Codebreaking
Public-key cryptosystems are great
Codebreaking
Public-key cryptosystems are great:
you choose private key and public key
Codebreaking
Public-key cryptosystems are great:
you choose private key and public key
everybody with the public key
can send you encrypted messages
Codebreaking
Public-key cryptosystems are great:
you choose private key and public key
everybody with the public key
can send you encrypted messages
messages can only be decrypted by
someone with the private key (=only you)
Codebreaking
Public-key cryptosystems are great:
you choose private key and public key
everybody with the public key
can send you encrypted messages
messages can only be decrypted by
someone with the private key (=only you)
. . . unless they can solve some hard math problem
Codebreaking
Public-key cryptosystems are great:
you choose private key and public key
everybody with the public key
can send you encrypted messages
messages can only be decrypted by
someone with the private key (=only you)
. . . unless they can solve some hard math problem
Most public-key crypto is based on the assumed hardness of
- factoring large integers (RSA), or
- finding discrete logarithms (Diffie-Hellman, Elliptic curve)
Codebreaking
Public-key cryptosystems are great:
you choose private key and public key
everybody with the public key
can send you encrypted messages
messages can only be decrypted by
someone with the private key (=only you)
. . . unless they can solve some hard math problem
Most public-key crypto is based on the assumed hardness of
- factoring large integers (RSA), or
- finding discrete logarithms (Diffie-Hellman, Elliptic curve)
Shor’s algorithm breaks this using a few thousand good qubits
Is this an imminent threat?
Is this an imminent threat?
Relax, quantum computers
ain’t gonna happen anytime soon. . .
Is this an imminent threat?
Relax, quantum computers
ain’t gonna happen anytime soon. . .
Maybe, maybe not.
Is this an imminent threat?
Relax, quantum computers
ain’t gonna happen anytime soon. . .
Maybe, maybe not.
But many countries have laws requiring top-secret documents
to be protected for the next 20-30 years.
Is this an imminent threat?
Relax, quantum computers
ain’t gonna happen anytime soon. . .
Maybe, maybe not.
But many countries have laws requiring top-secret documents
to be protected for the next 20-30 years.
If somebody steals your encrypted records now and decrypts it
10 years later using a quantum computer, that’s still bad.
Is this an imminent threat?
Relax, quantum computers
ain’t gonna happen anytime soon. . .
Maybe, maybe not.
But many countries have laws requiring top-secret documents
to be protected for the next 20-30 years.
If somebody steals your encrypted records now and decrypts it
10 years later using a quantum computer, that’s still bad.
Also, changing our crypto infrastructure will take a long time
Is this an imminent threat?
Relax, quantum computers
ain’t gonna happen anytime soon. . .
Maybe, maybe not.
But many countries have laws requiring top-secret documents
to be protected for the next 20-30 years.
If somebody steals your encrypted records now and decrypts it
10 years later using a quantum computer, that’s still bad.
Also, changing our crypto infrastructure will take a long time
So, how to fix
cryptography
against quantum
adversaries?
Is this an imminent threat?
Relax, quantum computers
ain’t gonna happen anytime soon. . .
Maybe, maybe not.
But many countries have laws requiring top-secret documents
to be protected for the next 20-30 years.
If somebody steals your encrypted records now and decrypts it
10 years later using a quantum computer, that’s still bad.
Also, changing our crypto infrastructure will take a long time
So, how to fix
cryptography
against quantum
adversaries?
Is this an imminent threat?
Relax, quantum computers
ain’t gonna happen anytime soon. . .
Maybe, maybe not.
But many countries have laws requiring top-secret documents
to be protected for the next 20-30 years.
If somebody steals your encrypted records now and decrypts it
10 years later using a quantum computer, that’s still bad.
Also, changing our crypto infrastructure will take a long time
So, how to fix
cryptography
against quantum
adversaries?
Is this an imminent threat?
Relax, quantum computers
ain’t gonna happen anytime soon. . .
Maybe, maybe not.
But many countries have laws requiring top-secret documents
to be protected for the next 20-30 years.
If somebody steals your encrypted records now and decrypts it
10 years later using a quantum computer, that’s still bad.
Also, changing our crypto infrastructure will take a long time
So, how to fix
cryptography
against quantum
adversaries?
Classical codemaking: post-quantum cryptography
Classical codemaking: post-quantum cryptography
Minimal adaptation: keep the idea of public-key crypto, but
base it on other math problems than factoring or discrete log.
Classical codemaking: post-quantum cryptography
Minimal adaptation: keep the idea of public-key crypto, but
base it on other math problems than factoring or discrete log.
Prominent examples: lattice problems,
error-correcting code problems, . . .
Classical codemaking: post-quantum cryptography
Minimal adaptation: keep the idea of public-key crypto, but
base it on other math problems than factoring or discrete log.
Prominent examples: lattice problems,
error-correcting code problems, . . .
Advantages: Users only need classical computers,
we can keep our efficient public-key infrastructure
Classical codemaking: post-quantum cryptography
Minimal adaptation: keep the idea of public-key crypto, but
base it on other math problems than factoring or discrete log.
Prominent examples: lattice problems,
error-correcting code problems, . . .
Advantages: Users only need classical computers,
we can keep our efficient public-key infrastructure
Disadvantages: Are these systems secure against quantum
computers?
Classical codemaking: post-quantum cryptography
Minimal adaptation: keep the idea of public-key crypto, but
base it on other math problems than factoring or discrete log.
Prominent examples: lattice problems,
error-correcting code problems, . . .
Advantages: Users only need classical computers,
we can keep our efficient public-key infrastructure
Disadvantages: Are these systems secure against quantum
computers? Who knows; not enough research yet
Classical codemaking: post-quantum cryptography
Minimal adaptation: keep the idea of public-key crypto, but
base it on other math problems than factoring or discrete log.
Prominent examples: lattice problems,
error-correcting code problems, . . .
Advantages: Users only need classical computers,
we can keep our efficient public-key infrastructure
Disadvantages: Are these systems secure against quantum
computers? Who knows; not enough research yet
NIST is running a competition for the best candidate scheme
Quantum codemaking: quantum cryptography
Quantum codemaking: quantum cryptography
Use quantum to induce an information-gain-vs-disturbance
tradeoff: if adversary learns a lot about state of quantum
channel, then they necessarily disturb it, and will be detected
Quantum codemaking: quantum cryptography
Use quantum to induce an information-gain-vs-disturbance
tradeoff: if adversary learns a lot about state of quantum
channel, then they necessarily disturb it, and will be detected
BB’84 quantum key distribution: Alice and Bob can obtain a
shared secret key by communicating over a public quantum
channel and a public authenticated classical channel
Quantum codemaking: quantum cryptography
Use quantum to induce an information-gain-vs-disturbance
tradeoff: if adversary learns a lot about state of quantum
channel, then they necessarily disturb it, and will be detected
BB’84 quantum key distribution: Alice and Bob can obtain a
shared secret key by communicating over a public quantum
channel and a public authenticated classical channel
Advantages: Information-theoretic security against quantum
adversary
Quantum codemaking: quantum cryptography
Use quantum to induce an information-gain-vs-disturbance
tradeoff: if adversary learns a lot about state of quantum
channel, then they necessarily disturb it, and will be detected
BB’84 quantum key distribution: Alice and Bob can obtain a
shared secret key by communicating over a public quantum
channel and a public authenticated classical channel
Advantages: Information-theoretic security against quantum
adversary. Doable with current technology, even via satellites!
Quantum codemaking: quantum cryptography
Use quantum to induce an information-gain-vs-disturbance
tradeoff: if adversary learns a lot about state of quantum
channel, then they necessarily disturb it, and will be detected
BB’84 quantum key distribution: Alice and Bob can obtain a
shared secret key by communicating over a public quantum
channel and a public authenticated classical channel
Advantages: Information-theoretic security against quantum
adversary. Doable with current technology, even via satellites!
Disadvantages: Inefficient
point-to-point communication.
Quantum codemaking: quantum cryptography
Use quantum to induce an information-gain-vs-disturbance
tradeoff: if adversary learns a lot about state of quantum
channel, then they necessarily disturb it, and will be detected
BB’84 quantum key distribution: Alice and Bob can obtain a
shared secret key by communicating over a public quantum
channel and a public authenticated classical channel
Advantages: Information-theoretic security against quantum
adversary. Doable with current technology, even via satellites!
Disadvantages: Inefficient
point-to-point communication.
Limited distance.
Quantum codemaking: quantum cryptography
Use quantum to induce an information-gain-vs-disturbance
tradeoff: if adversary learns a lot about state of quantum
channel, then they necessarily disturb it, and will be detected
BB’84 quantum key distribution: Alice and Bob can obtain a
shared secret key by communicating over a public quantum
channel and a public authenticated classical channel
Advantages: Information-theoretic security against quantum
adversary. Doable with current technology, even via satellites!
Disadvantages: Inefficient
point-to-point communication.
Limited distance.
Current implementations
have often been hacked
Potential impact area 2: optimization
Potential impact area 2: optimization
Optimization is one of the main applications of computers
in the real world: allocating resources to jobs, scheduling
lectures, optimizing designs, minimizing energy use, etc.
Potential impact area 2: optimization
Optimization is one of the main applications of computers
in the real world: allocating resources to jobs, scheduling
lectures, optimizing designs, minimizing energy use, etc.
Quantum computers can help
Potential impact area 2: optimization
Optimization is one of the main applications of computers
in the real world: allocating resources to jobs, scheduling
lectures, optimizing designs, minimizing energy use, etc.
Quantum computers can help:
Grover’s search algorithm
Potential impact area 2: optimization
Optimization is one of the main applications of computers
in the real world: allocating resources to jobs, scheduling
lectures, optimizing designs, minimizing energy use, etc.
Quantum computers can help:
Grover’s search algorithm
Finding the shortest path on a map
Potential impact area 2: optimization
Optimization is one of the main applications of computers
in the real world: allocating resources to jobs, scheduling
lectures, optimizing designs, minimizing energy use, etc.
Quantum computers can help:
Grover’s search algorithm
Finding the shortest path on a map
Speed-ups for linear programs
Potential impact area 2: optimization
Optimization is one of the main applications of computers
in the real world: allocating resources to jobs, scheduling
lectures, optimizing designs, minimizing energy use, etc.
Quantum computers can help:
Grover’s search algorithm
Finding the shortest path on a map
Speed-ups for linear programs
Gradient descent towards minimum
Potential impact area 2: optimization
Optimization is one of the main applications of computers
in the real world: allocating resources to jobs, scheduling
lectures, optimizing designs, minimizing energy use, etc.
Quantum computers can help:
Grover’s search algorithm
Finding the shortest path on a map
Speed-ups for linear programs
Gradient descent towards minimum
Finite-element methods
Potential impact area 2: optimization
Optimization is one of the main applications of computers
in the real world: allocating resources to jobs, scheduling
lectures, optimizing designs, minimizing energy use, etc.
Quantum computers can help:
Grover’s search algorithm
Finding the shortest path on a map
Speed-ups for linear programs
Gradient descent towards minimum
Finite-element methods
Typically these only give limited (“polynomial”) speed-up;
whether that’s worthwhile depends on the cost of a QC
Potential impact area 2: optimization
Optimization is one of the main applications of computers
in the real world: allocating resources to jobs, scheduling
lectures, optimizing designs, minimizing energy use, etc.
Quantum computers can help:
Grover’s search algorithm
Finding the shortest path on a map
Speed-ups for linear programs
Gradient descent towards minimum
Finite-element methods
Typically these only give limited (“polynomial”) speed-up;
whether that’s worthwhile depends on the cost of a QC
Classical input needs to be accessible in superposition,
so needs to be stored in Quantum Random Access Memory
Quantum machine learning
Quantum machine learning
Machine learning has gotten hugely
successful in the last 5 years
Quantum machine learning
Machine learning has gotten hugely
successful in the last 5 years
After choosing set M of possible models & cleaning up data
Quantum machine learning
Machine learning has gotten hugely
successful in the last 5 years
After choosing set M of possible models & cleaning up data,
machine learning boils down to an optimization problem:
max
m∈M
fit of m with the data
Quantum machine learning
Machine learning has gotten hugely
successful in the last 5 years
After choosing set M of possible models & cleaning up data,
machine learning boils down to an optimization problem:
max
m∈M
fit of m with the data
Quantum computers can speed this up (in some cases)
Quantum machine learning
Machine learning has gotten hugely
successful in the last 5 years
After choosing set M of possible models & cleaning up data,
machine learning boils down to an optimization problem:
max
m∈M
fit of m with the data
Quantum computers can speed this up (in some cases)
Often the data consists of vectors in some large dimension d.
Can try to prepare those as log2(d)-qubit states, manipulate
those with quantum algorithms
Quantum machine learning
Machine learning has gotten hugely
successful in the last 5 years
After choosing set M of possible models & cleaning up data,
machine learning boils down to an optimization problem:
max
m∈M
fit of m with the data
Quantum computers can speed this up (in some cases)
Often the data consists of vectors in some large dimension d.
Can try to prepare those as log2(d)-qubit states, manipulate
those with quantum algorithms. Easier said than done. . .
Potential impact area 3: simulation
Potential impact area 3: simulation
Much effort on understanding quantum
systems for materials, batteries, drugs,
high-temperature superconductivity etc.
Potential impact area 3: simulation
Much effort on understanding quantum
systems for materials, batteries, drugs,
high-temperature superconductivity etc.
Potential impact area 3: simulation
Much effort on understanding quantum
systems for materials, batteries, drugs,
high-temperature superconductivity etc.
Sophisticated classical methods hit a wall for larger systems,
because of the exponential number of amplitudes in a state
Potential impact area 3: simulation
Much effort on understanding quantum
systems for materials, batteries, drugs,
high-temperature superconductivity etc.
Sophisticated classical methods hit a wall for larger systems,
because of the exponential number of amplitudes in a state
Think of quantum computer as universal quantum simulator:
given a sufficiently simple description of a physical system
(“Hamiltonian”), a quantum computer can simulate
the evolution of a given initial state for some time t
Potential impact area 3: simulation
Much effort on understanding quantum
systems for materials, batteries, drugs,
high-temperature superconductivity etc.
Sophisticated classical methods hit a wall for larger systems,
because of the exponential number of amplitudes in a state
Think of quantum computer as universal quantum simulator:
given a sufficiently simple description of a physical system
(“Hamiltonian”), a quantum computer can simulate
the evolution of a given initial state for some time t
This could lead to better materials, drugs, . . .
Potential impact area 3: simulation
Much effort on understanding quantum
systems for materials, batteries, drugs,
high-temperature superconductivity etc.
Sophisticated classical methods hit a wall for larger systems,
because of the exponential number of amplitudes in a state
Think of quantum computer as universal quantum simulator:
given a sufficiently simple description of a physical system
(“Hamiltonian”), a quantum computer can simulate
the evolution of a given initial state for some time t
This could lead to better materials, drugs, . . .
Could already be useful with 100s good qubits (unlike Shor)
Conclusion
Quantum mechanics: best physical theory we have
Conclusion
Quantum mechanics: best physical theory we have
Fundamentally different from classical physics:
superposition, interference, entanglement
Conclusion
Quantum mechanics: best physical theory we have
Fundamentally different from classical physics:
superposition, interference, entanglement
Quantum computers can use these non-classical effects for
many useful things: cryptography, optimization, simulation.
Though it will probably remain a “special purpose” computer
Conclusion
Quantum mechanics: best physical theory we have
Fundamentally different from classical physics:
superposition, interference, entanglement
Quantum computers can use these non-classical effects for
many useful things: cryptography, optimization, simulation.
Though it will probably remain a “special purpose” computer
People are working hard on physical implementations
Conclusion
Quantum mechanics: best physical theory we have
Fundamentally different from classical physics:
superposition, interference, entanglement
Quantum computers can use these non-classical effects for
many useful things: cryptography, optimization, simulation.
Though it will probably remain a “special purpose” computer
People are working hard on physical implementations
What will this mean in practice?
We’ll see. . . though we are still far
from a large-scale quantum computer

Más contenido relacionado

La actualidad más candente

Quantum computer
Quantum computerQuantum computer
Quantum computer
Nikhil Eg
 

La actualidad más candente (20)

Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum Computing - Basic Concepts
Quantum Computing - Basic ConceptsQuantum Computing - Basic Concepts
Quantum Computing - Basic Concepts
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Qunatum computing
Qunatum computing Qunatum computing
Qunatum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Seminar
SeminarSeminar
Seminar
 
Quantum computing meghaditya
Quantum computing meghadityaQuantum computing meghaditya
Quantum computing meghaditya
 
Quantum computing - Introduction
Quantum computing - IntroductionQuantum computing - Introduction
Quantum computing - Introduction
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum Computing: The Why and How
Quantum Computing: The Why and HowQuantum Computing: The Why and How
Quantum Computing: The Why and How
 
Quantum Computing Explained
Quantum Computing ExplainedQuantum Computing Explained
Quantum Computing Explained
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 

Similar a Quantum Computing

Similar a Quantum Computing (20)

Quantum Computing Basics
Quantum Computing BasicsQuantum Computing Basics
Quantum Computing Basics
 
What is a quantum computer
What is a quantum computerWhat is a quantum computer
What is a quantum computer
 
Fundamentals of Quantum Computing
Fundamentals of Quantum ComputingFundamentals of Quantum Computing
Fundamentals of Quantum Computing
 
bhanu.pptx
bhanu.pptxbhanu.pptx
bhanu.pptx
 
quantum computing22.pptx
quantum computing22.pptxquantum computing22.pptx
quantum computing22.pptx
 
preskill.pptx
preskill.pptxpreskill.pptx
preskill.pptx
 
CA_final_paper
CA_final_paperCA_final_paper
CA_final_paper
 
The Extraordinary World of Quantum Computing
The Extraordinary World of Quantum ComputingThe Extraordinary World of Quantum Computing
The Extraordinary World of Quantum Computing
 
Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115Quantum nature poli_mi_ddm_200115
Quantum nature poli_mi_ddm_200115
 
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
From Bits to Qubits: Can Medicine Benefit From Quantum Computing?
 
Presentation on quantum_computing
Presentation on quantum_computingPresentation on quantum_computing
Presentation on quantum_computing
 
Quantum computers
Quantum   computersQuantum   computers
Quantum computers
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili SaghafiQuantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
Quantum Computing Quantum Internet 2020_unit 1 By: Prof. Lili Saghafi
 
Quantum computation with superconductors
Quantum computation with superconductorsQuantum computation with superconductors
Quantum computation with superconductors
 
Quantum Computing Explained.pdf
Quantum Computing Explained.pdfQuantum Computing Explained.pdf
Quantum Computing Explained.pdf
 
quantum computing.pdf
quantum computing.pdfquantum computing.pdf
quantum computing.pdf
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Technological Survey on Quantum Computing
Technological Survey on Quantum ComputingTechnological Survey on Quantum Computing
Technological Survey on Quantum Computing
 
An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
 

Más de Advanced-Concepts-Team

Pablo Gomez - Solving Large-scale Challenges with ESA Datalabs
Pablo Gomez - Solving Large-scale Challenges with ESA DatalabsPablo Gomez - Solving Large-scale Challenges with ESA Datalabs
Pablo Gomez - Solving Large-scale Challenges with ESA Datalabs
Advanced-Concepts-Team
 
Jonathan Sauder - Miniaturizing Mechanical Systems for CubeSats: Design Princ...
Jonathan Sauder - Miniaturizing Mechanical Systems for CubeSats: Design Princ...Jonathan Sauder - Miniaturizing Mechanical Systems for CubeSats: Design Princ...
Jonathan Sauder - Miniaturizing Mechanical Systems for CubeSats: Design Princ...
Advanced-Concepts-Team
 
EDEN ISS - A space greenhouse analogue in Antarctica
EDEN ISS - A space greenhouse analogue in AntarcticaEDEN ISS - A space greenhouse analogue in Antarctica
EDEN ISS - A space greenhouse analogue in Antarctica
Advanced-Concepts-Team
 
How to give a robot a soul
How to give a robot a soulHow to give a robot a soul
How to give a robot a soul
Advanced-Concepts-Team
 
Vernal pools a new ecosystem for astrobiology studies
Vernal pools a new ecosystem for astrobiology studiesVernal pools a new ecosystem for astrobiology studies
Vernal pools a new ecosystem for astrobiology studies
Advanced-Concepts-Team
 

Más de Advanced-Concepts-Team (20)

2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf
2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf
2024.03.22 - Mike Heddes - Introduction to Hyperdimensional Computing.pdf
 
Isabelle Diacaire - From Ariadnas to Industry R&D in optics and photonics
Isabelle Diacaire - From Ariadnas to Industry R&D in optics and photonicsIsabelle Diacaire - From Ariadnas to Industry R&D in optics and photonics
Isabelle Diacaire - From Ariadnas to Industry R&D in optics and photonics
 
The ExoGRAVITY project - observations of exoplanets from the ground with opti...
The ExoGRAVITY project - observations of exoplanets from the ground with opti...The ExoGRAVITY project - observations of exoplanets from the ground with opti...
The ExoGRAVITY project - observations of exoplanets from the ground with opti...
 
MOND_famaey.pdf
MOND_famaey.pdfMOND_famaey.pdf
MOND_famaey.pdf
 
Pablo Gomez - Solving Large-scale Challenges with ESA Datalabs
Pablo Gomez - Solving Large-scale Challenges with ESA DatalabsPablo Gomez - Solving Large-scale Challenges with ESA Datalabs
Pablo Gomez - Solving Large-scale Challenges with ESA Datalabs
 
Jonathan Sauder - Miniaturizing Mechanical Systems for CubeSats: Design Princ...
Jonathan Sauder - Miniaturizing Mechanical Systems for CubeSats: Design Princ...Jonathan Sauder - Miniaturizing Mechanical Systems for CubeSats: Design Princ...
Jonathan Sauder - Miniaturizing Mechanical Systems for CubeSats: Design Princ...
 
Towards an Artificial Muse for new Ideas in Quantum Physics
Towards an Artificial Muse for new Ideas in Quantum PhysicsTowards an Artificial Muse for new Ideas in Quantum Physics
Towards an Artificial Muse for new Ideas in Quantum Physics
 
EDEN ISS - A space greenhouse analogue in Antarctica
EDEN ISS - A space greenhouse analogue in AntarcticaEDEN ISS - A space greenhouse analogue in Antarctica
EDEN ISS - A space greenhouse analogue in Antarctica
 
How to give a robot a soul
How to give a robot a soulHow to give a robot a soul
How to give a robot a soul
 
Information processing with artificial spiking neural networks
Information processing with artificial spiking neural networksInformation processing with artificial spiking neural networks
Information processing with artificial spiking neural networks
 
Exploring Architected Materials Using Machine Learning
Exploring Architected Materials Using Machine LearningExploring Architected Materials Using Machine Learning
Exploring Architected Materials Using Machine Learning
 
Electromagnetically Actuated Systems for Modular, Self-Assembling and Self-Re...
Electromagnetically Actuated Systems for Modular, Self-Assembling and Self-Re...Electromagnetically Actuated Systems for Modular, Self-Assembling and Self-Re...
Electromagnetically Actuated Systems for Modular, Self-Assembling and Self-Re...
 
HORUS: Peering into Lunar Shadowed Regions with AI
HORUS: Peering into Lunar Shadowed Regions with AIHORUS: Peering into Lunar Shadowed Regions with AI
HORUS: Peering into Lunar Shadowed Regions with AI
 
META-SPACE: Psycho-physiologically Adaptive and Personalized Virtual Reality ...
META-SPACE: Psycho-physiologically Adaptive and Personalized Virtual Reality ...META-SPACE: Psycho-physiologically Adaptive and Personalized Virtual Reality ...
META-SPACE: Psycho-physiologically Adaptive and Personalized Virtual Reality ...
 
The Large Interferometer For Exoplanets (LIFE) II: Key Methods and Technologies
The Large Interferometer For Exoplanets (LIFE) II: Key Methods and TechnologiesThe Large Interferometer For Exoplanets (LIFE) II: Key Methods and Technologies
The Large Interferometer For Exoplanets (LIFE) II: Key Methods and Technologies
 
Black Holes and Bright Quasars
Black Holes and Bright QuasarsBlack Holes and Bright Quasars
Black Holes and Bright Quasars
 
In vitro simulation of spaceflight environment to elucidate combined effect o...
In vitro simulation of spaceflight environment to elucidate combined effect o...In vitro simulation of spaceflight environment to elucidate combined effect o...
In vitro simulation of spaceflight environment to elucidate combined effect o...
 
The Large Interferometer For Exoplanets (LIFE): the science of characterising...
The Large Interferometer For Exoplanets (LIFE): the science of characterising...The Large Interferometer For Exoplanets (LIFE): the science of characterising...
The Large Interferometer For Exoplanets (LIFE): the science of characterising...
 
Vernal pools a new ecosystem for astrobiology studies
Vernal pools a new ecosystem for astrobiology studiesVernal pools a new ecosystem for astrobiology studies
Vernal pools a new ecosystem for astrobiology studies
 
Keeping a Sentinel Eye on the Volcanoes – from Space!
Keeping a Sentinel Eye on the Volcanoes – from Space!Keeping a Sentinel Eye on the Volcanoes – from Space!
Keeping a Sentinel Eye on the Volcanoes – from Space!
 

Último

platelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptxplatelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptx
muralinath2
 
Climate extremes likely to drive land mammal extinction during next supercont...
Climate extremes likely to drive land mammal extinction during next supercont...Climate extremes likely to drive land mammal extinction during next supercont...
Climate extremes likely to drive land mammal extinction during next supercont...
Sérgio Sacani
 
Seminar on Halal AGriculture and Fisheries.pptx
Seminar on Halal AGriculture and Fisheries.pptxSeminar on Halal AGriculture and Fisheries.pptx
Seminar on Halal AGriculture and Fisheries.pptx
RUDYLUMAPINET2
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
muralinath2
 
FAIR & AI Ready KGs for Explainable Predictions
FAIR & AI Ready KGs for Explainable PredictionsFAIR & AI Ready KGs for Explainable Predictions
FAIR & AI Ready KGs for Explainable Predictions
Michel Dumontier
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
muralinath2
 
Aerodynamics. flippatterncn5tm5ttnj6nmnynyppt
Aerodynamics. flippatterncn5tm5ttnj6nmnynypptAerodynamics. flippatterncn5tm5ttnj6nmnynyppt
Aerodynamics. flippatterncn5tm5ttnj6nmnynyppt
sreddyrahul
 

Último (20)

SAMPLING.pptx for analystical chemistry sample techniques
SAMPLING.pptx for analystical chemistry sample techniquesSAMPLING.pptx for analystical chemistry sample techniques
SAMPLING.pptx for analystical chemistry sample techniques
 
platelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptxplatelets- lifespan -Clot retraction-disorders.pptx
platelets- lifespan -Clot retraction-disorders.pptx
 
INSIGHT Partner Profile: Tampere University
INSIGHT Partner Profile: Tampere UniversityINSIGHT Partner Profile: Tampere University
INSIGHT Partner Profile: Tampere University
 
Climate extremes likely to drive land mammal extinction during next supercont...
Climate extremes likely to drive land mammal extinction during next supercont...Climate extremes likely to drive land mammal extinction during next supercont...
Climate extremes likely to drive land mammal extinction during next supercont...
 
In silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptxIn silico drugs analogue design: novobiocin analogues.pptx
In silico drugs analogue design: novobiocin analogues.pptx
 
Seminar on Halal AGriculture and Fisheries.pptx
Seminar on Halal AGriculture and Fisheries.pptxSeminar on Halal AGriculture and Fisheries.pptx
Seminar on Halal AGriculture and Fisheries.pptx
 
Gliese 12 b, a temperate Earth-sized planet at 12 parsecs discovered with TES...
Gliese 12 b, a temperate Earth-sized planet at 12 parsecs discovered with TES...Gliese 12 b, a temperate Earth-sized planet at 12 parsecs discovered with TES...
Gliese 12 b, a temperate Earth-sized planet at 12 parsecs discovered with TES...
 
ESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptxESR_factors_affect-clinic significance-Pathysiology.pptx
ESR_factors_affect-clinic significance-Pathysiology.pptx
 
Lab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerinLab report on liquid viscosity of glycerin
Lab report on liquid viscosity of glycerin
 
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...The ASGCT Annual Meeting was packed with exciting progress in the field advan...
The ASGCT Annual Meeting was packed with exciting progress in the field advan...
 
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of LipidsGBSN - Biochemistry (Unit 5) Chemistry of Lipids
GBSN - Biochemistry (Unit 5) Chemistry of Lipids
 
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATIONPRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
PRESENTATION ABOUT PRINCIPLE OF COSMATIC EVALUATION
 
FAIR & AI Ready KGs for Explainable Predictions
FAIR & AI Ready KGs for Explainable PredictionsFAIR & AI Ready KGs for Explainable Predictions
FAIR & AI Ready KGs for Explainable Predictions
 
National Biodiversity protection initiatives and Convention on Biological Di...
National Biodiversity protection initiatives and  Convention on Biological Di...National Biodiversity protection initiatives and  Convention on Biological Di...
National Biodiversity protection initiatives and Convention on Biological Di...
 
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
Circulatory system_ Laplace law. Ohms law.reynaults law,baro-chemo-receptors-...
 
word2vec, node2vec, graph2vec, X2vec: Towards a Theory of Vector Embeddings o...
word2vec, node2vec, graph2vec, X2vec: Towards a Theory of Vector Embeddings o...word2vec, node2vec, graph2vec, X2vec: Towards a Theory of Vector Embeddings o...
word2vec, node2vec, graph2vec, X2vec: Towards a Theory of Vector Embeddings o...
 
NuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final versionNuGOweek 2024 Ghent - programme - final version
NuGOweek 2024 Ghent - programme - final version
 
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdfSCHIZOPHRENIA Disorder/ Brain Disorder.pdf
SCHIZOPHRENIA Disorder/ Brain Disorder.pdf
 
Aerodynamics. flippatterncn5tm5ttnj6nmnynyppt
Aerodynamics. flippatterncn5tm5ttnj6nmnynypptAerodynamics. flippatterncn5tm5ttnj6nmnynyppt
Aerodynamics. flippatterncn5tm5ttnj6nmnynyppt
 
Hemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptxHemoglobin metabolism_pathophysiology.pptx
Hemoglobin metabolism_pathophysiology.pptx
 

Quantum Computing

  • 3. Quantum-mechanical computers Our society runs on classical computers
  • 4. Quantum-mechanical computers Our society runs on classical computers: memory-locations have specific value (0 or 1), processor acts on specific location, . . .
  • 5. Quantum-mechanical computers Our society runs on classical computers: memory-locations have specific value (0 or 1), processor acts on specific location, . . . But our world is not classical, so let’s study quantum-mechanical computers
  • 6. Quantum-mechanical computers Our society runs on classical computers: memory-locations have specific value (0 or 1), processor acts on specific location, . . . But our world is not classical, so let’s study quantum-mechanical computers Why? 1. Enable further miniaturization (Moore’s law)
  • 7. Quantum-mechanical computers Our society runs on classical computers: memory-locations have specific value (0 or 1), processor acts on specific location, . . . But our world is not classical, so let’s study quantum-mechanical computers Why? 1. Enable further miniaturization (Moore’s law) 2. Enable large speed-up for some important problems
  • 8. Quantum-mechanical computers Our society runs on classical computers: memory-locations have specific value (0 or 1), processor acts on specific location, . . . But our world is not classical, so let’s study quantum-mechanical computers Why? 1. Enable further miniaturization (Moore’s law) 2. Enable large speed-up for some important problems 3. The goal of computer science is to study the power of the best computing machines that Nature allows us
  • 9.
  • 10. Quantum computers: hype vs substance The goal of this talk: Assume large quantum computers will be built in the next decades. Where will they have a real impact?
  • 11. Quantum computers: hype vs substance The goal of this talk: Assume large quantum computers will be built in the next decades. Where will they have a real impact? Probably: Cryptography, optimization, simulation
  • 12. Quantum computers: hype vs substance The goal of this talk: Assume large quantum computers will be built in the next decades. Where will they have a real impact? Probably: Cryptography, optimization, simulation Maybe: Machine learning
  • 13. Quantum computers: hype vs substance The goal of this talk: Assume large quantum computers will be built in the next decades. Where will they have a real impact? Probably: Cryptography, optimization, simulation Maybe: Machine learning Forget about it: NP-hard problems (TSP, protein folding,. . . )
  • 14. Quantum computers: hype vs substance The goal of this talk: Assume large quantum computers will be built in the next decades. Where will they have a real impact? Probably: Cryptography, optimization, simulation Maybe: Machine learning Forget about it: NP-hard problems (TSP, protein folding,. . . ), ending climate change, finding ET, . . .
  • 16. Quantum bits A classical bit is 0 or 1
  • 17. Quantum bits A classical bit is 0 or 1 Quantum mechanics allows superposition of |0 and |1 , each with its own “amplitude”
  • 18. Quantum bits A classical bit is 0 or 1 Quantum mechanics allows superposition of |0 and |1 , each with its own “amplitude”. This is a qubit
  • 19. Quantum bits A classical bit is 0 or 1 Quantum mechanics allows superposition of |0 and |1 , each with its own “amplitude”. This is a qubit We can use any physical system with two distinguishable basis states to build a qubit:
  • 20. Quantum bits A classical bit is 0 or 1 Quantum mechanics allows superposition of |0 and |1 , each with its own “amplitude”. This is a qubit We can use any physical system with two distinguishable basis states to build a qubit: electron spin
  • 21. Quantum bits A classical bit is 0 or 1 Quantum mechanics allows superposition of |0 and |1 , each with its own “amplitude”. This is a qubit We can use any physical system with two distinguishable basis states to build a qubit: electron spin, photon polarization
  • 22. Quantum bits A classical bit is 0 or 1 Quantum mechanics allows superposition of |0 and |1 , each with its own “amplitude”. This is a qubit We can use any physical system with two distinguishable basis states to build a qubit: electron spin, photon polarization, | + |
  • 23. Quantum bits A classical bit is 0 or 1 Quantum mechanics allows superposition of |0 and |1 , each with its own “amplitude”. This is a qubit We can use any physical system with two distinguishable basis states to build a qubit: electron spin, photon polarization, | + | 2 qubits: superposition of 4 possible basis states (00,01,10,11)
  • 24. Quantum bits A classical bit is 0 or 1 Quantum mechanics allows superposition of |0 and |1 , each with its own “amplitude”. This is a qubit We can use any physical system with two distinguishable basis states to build a qubit: electron spin, photon polarization, | + | 2 qubits: superposition of 4 possible basis states (00,01,10,11) 3 qubits: superposition of 8 possible basis states
  • 25. Quantum bits A classical bit is 0 or 1 Quantum mechanics allows superposition of |0 and |1 , each with its own “amplitude”. This is a qubit We can use any physical system with two distinguishable basis states to build a qubit: electron spin, photon polarization, | + | 2 qubits: superposition of 4 possible basis states (00,01,10,11) 3 qubits: superposition of 8 possible basis states ... n qubits: superposition of 2n possible basis states
  • 26. Quantum bits A classical bit is 0 or 1 Quantum mechanics allows superposition of |0 and |1 , each with its own “amplitude”. This is a qubit We can use any physical system with two distinguishable basis states to build a qubit: electron spin, photon polarization, | + | 2 qubits: superposition of 4 possible basis states (00,01,10,11) 3 qubits: superposition of 8 possible basis states ... n qubits: superposition of 2n possible basis states Described by a “wavefunction”: vector of all 2n amplitudes
  • 27. Quantum computers in a nutshell
  • 28. Quantum computers in a nutshell Waves can strengthen or weaken each other:
  • 29. Quantum computers in a nutshell Waves can strengthen or weaken each other:
  • 30. Quantum computers in a nutshell Waves can strengthen or weaken each other: Quantum computation = superposition + interference
  • 31. Quantum computers in a nutshell Waves can strengthen or weaken each other: Quantum computation = superposition + interference 1. Start with qubits in some simple state (e.g. all |0 )
  • 32. Quantum computers in a nutshell Waves can strengthen or weaken each other: Quantum computation = superposition + interference 1. Start with qubits in some simple state (e.g. all |0 ) 2. Run circuit of “elementary gates” creating the right interference, so the final state has most of its weight on solutions to your problem
  • 33. Quantum computers in a nutshell Waves can strengthen or weaken each other: Quantum computation = superposition + interference 1. Start with qubits in some simple state (e.g. all |0 ) 2. Run circuit of “elementary gates” creating the right interference, so the final state has most of its weight on solutions to your problem 3. Measuring the final state then gives solution
  • 34. Where do we stand today?
  • 35. Where do we stand today? We are entering the NISQ era (Preskill’18): Noisy Intermediate-Scale Quantum technology
  • 36. Where do we stand today? We are entering the NISQ era (Preskill’18): Noisy Intermediate-Scale Quantum technology IBM, Google, Intel are close to 50-70 reasonably good qubits.
  • 37. Where do we stand today? We are entering the NISQ era (Preskill’18): Noisy Intermediate-Scale Quantum technology IBM, Google, Intel are close to 50-70 reasonably good qubits. But 50-70 qubits is not a lot: classical computers have billions of bits
  • 38. Where do we stand today? We are entering the NISQ era (Preskill’18): Noisy Intermediate-Scale Quantum technology IBM, Google, Intel are close to 50-70 reasonably good qubits. But 50-70 qubits is not a lot: classical computers have billions of bits. And “reasonably good” is also not great
  • 39. Where do we stand today? We are entering the NISQ era (Preskill’18): Noisy Intermediate-Scale Quantum technology IBM, Google, Intel are close to 50-70 reasonably good qubits. But 50-70 qubits is not a lot: classical computers have billions of bits. And “reasonably good” is also not great We’ll need error-correction to deal with errors, and that will require many more physical qubits
  • 40. Where do we stand today? We are entering the NISQ era (Preskill’18): Noisy Intermediate-Scale Quantum technology IBM, Google, Intel are close to 50-70 reasonably good qubits. But 50-70 qubits is not a lot: classical computers have billions of bits. And “reasonably good” is also not great We’ll need error-correction to deal with errors, and that will require many more physical qubits “Quantum supremacy” may be reached soon: some quantum computation that cannot be simulated on today’s best supercomputers in a reasonable amount of time
  • 41. Where do we stand today? We are entering the NISQ era (Preskill’18): Noisy Intermediate-Scale Quantum technology IBM, Google, Intel are close to 50-70 reasonably good qubits. But 50-70 qubits is not a lot: classical computers have billions of bits. And “reasonably good” is also not great We’ll need error-correction to deal with errors, and that will require many more physical qubits “Quantum supremacy” may be reached soon: some quantum computation that cannot be simulated on today’s best supercomputers in a reasonable amount of time But useful quantum supremacy is still years away
  • 42. Potential impact area 1: cryptography The ancient art of secret communication
  • 43. Potential impact area 1: cryptography The ancient art of secret communication Julius Caesar encrypted his letters by shifting the alphabet (easy to break)
  • 44. Potential impact area 1: cryptography The ancient art of secret communication Julius Caesar encrypted his letters by shifting the alphabet (easy to break) The nazis encrypted their messages using fancy “Enigma” machines with secret settings that changed every day (broken by Turing and others using the first computers)
  • 45. Potential impact area 1: cryptography The ancient art of secret communication Julius Caesar encrypted his letters by shifting the alphabet (easy to break) The nazis encrypted their messages using fancy “Enigma” machines with secret settings that changed every day (broken by Turing and others using the first computers) Since the 1970s: more systematic, mathematical study
  • 46. Potential impact area 1: cryptography The ancient art of secret communication Julius Caesar encrypted his letters by shifting the alphabet (easy to break) The nazis encrypted their messages using fancy “Enigma” machines with secret settings that changed every day (broken by Turing and others using the first computers) Since the 1970s: more systematic, mathematical study Two branches: codemakers and codebreakers
  • 49. Codebreaking Public-key cryptosystems are great: you choose private key and public key
  • 50. Codebreaking Public-key cryptosystems are great: you choose private key and public key everybody with the public key can send you encrypted messages
  • 51. Codebreaking Public-key cryptosystems are great: you choose private key and public key everybody with the public key can send you encrypted messages messages can only be decrypted by someone with the private key (=only you)
  • 52. Codebreaking Public-key cryptosystems are great: you choose private key and public key everybody with the public key can send you encrypted messages messages can only be decrypted by someone with the private key (=only you) . . . unless they can solve some hard math problem
  • 53. Codebreaking Public-key cryptosystems are great: you choose private key and public key everybody with the public key can send you encrypted messages messages can only be decrypted by someone with the private key (=only you) . . . unless they can solve some hard math problem Most public-key crypto is based on the assumed hardness of - factoring large integers (RSA), or - finding discrete logarithms (Diffie-Hellman, Elliptic curve)
  • 54. Codebreaking Public-key cryptosystems are great: you choose private key and public key everybody with the public key can send you encrypted messages messages can only be decrypted by someone with the private key (=only you) . . . unless they can solve some hard math problem Most public-key crypto is based on the assumed hardness of - factoring large integers (RSA), or - finding discrete logarithms (Diffie-Hellman, Elliptic curve) Shor’s algorithm breaks this using a few thousand good qubits
  • 55. Is this an imminent threat?
  • 56. Is this an imminent threat? Relax, quantum computers ain’t gonna happen anytime soon. . .
  • 57. Is this an imminent threat? Relax, quantum computers ain’t gonna happen anytime soon. . . Maybe, maybe not.
  • 58. Is this an imminent threat? Relax, quantum computers ain’t gonna happen anytime soon. . . Maybe, maybe not. But many countries have laws requiring top-secret documents to be protected for the next 20-30 years.
  • 59. Is this an imminent threat? Relax, quantum computers ain’t gonna happen anytime soon. . . Maybe, maybe not. But many countries have laws requiring top-secret documents to be protected for the next 20-30 years. If somebody steals your encrypted records now and decrypts it 10 years later using a quantum computer, that’s still bad.
  • 60. Is this an imminent threat? Relax, quantum computers ain’t gonna happen anytime soon. . . Maybe, maybe not. But many countries have laws requiring top-secret documents to be protected for the next 20-30 years. If somebody steals your encrypted records now and decrypts it 10 years later using a quantum computer, that’s still bad. Also, changing our crypto infrastructure will take a long time
  • 61. Is this an imminent threat? Relax, quantum computers ain’t gonna happen anytime soon. . . Maybe, maybe not. But many countries have laws requiring top-secret documents to be protected for the next 20-30 years. If somebody steals your encrypted records now and decrypts it 10 years later using a quantum computer, that’s still bad. Also, changing our crypto infrastructure will take a long time So, how to fix cryptography against quantum adversaries?
  • 62. Is this an imminent threat? Relax, quantum computers ain’t gonna happen anytime soon. . . Maybe, maybe not. But many countries have laws requiring top-secret documents to be protected for the next 20-30 years. If somebody steals your encrypted records now and decrypts it 10 years later using a quantum computer, that’s still bad. Also, changing our crypto infrastructure will take a long time So, how to fix cryptography against quantum adversaries?
  • 63. Is this an imminent threat? Relax, quantum computers ain’t gonna happen anytime soon. . . Maybe, maybe not. But many countries have laws requiring top-secret documents to be protected for the next 20-30 years. If somebody steals your encrypted records now and decrypts it 10 years later using a quantum computer, that’s still bad. Also, changing our crypto infrastructure will take a long time So, how to fix cryptography against quantum adversaries?
  • 64. Is this an imminent threat? Relax, quantum computers ain’t gonna happen anytime soon. . . Maybe, maybe not. But many countries have laws requiring top-secret documents to be protected for the next 20-30 years. If somebody steals your encrypted records now and decrypts it 10 years later using a quantum computer, that’s still bad. Also, changing our crypto infrastructure will take a long time So, how to fix cryptography against quantum adversaries?
  • 66. Classical codemaking: post-quantum cryptography Minimal adaptation: keep the idea of public-key crypto, but base it on other math problems than factoring or discrete log.
  • 67. Classical codemaking: post-quantum cryptography Minimal adaptation: keep the idea of public-key crypto, but base it on other math problems than factoring or discrete log. Prominent examples: lattice problems, error-correcting code problems, . . .
  • 68. Classical codemaking: post-quantum cryptography Minimal adaptation: keep the idea of public-key crypto, but base it on other math problems than factoring or discrete log. Prominent examples: lattice problems, error-correcting code problems, . . . Advantages: Users only need classical computers, we can keep our efficient public-key infrastructure
  • 69. Classical codemaking: post-quantum cryptography Minimal adaptation: keep the idea of public-key crypto, but base it on other math problems than factoring or discrete log. Prominent examples: lattice problems, error-correcting code problems, . . . Advantages: Users only need classical computers, we can keep our efficient public-key infrastructure Disadvantages: Are these systems secure against quantum computers?
  • 70. Classical codemaking: post-quantum cryptography Minimal adaptation: keep the idea of public-key crypto, but base it on other math problems than factoring or discrete log. Prominent examples: lattice problems, error-correcting code problems, . . . Advantages: Users only need classical computers, we can keep our efficient public-key infrastructure Disadvantages: Are these systems secure against quantum computers? Who knows; not enough research yet
  • 71. Classical codemaking: post-quantum cryptography Minimal adaptation: keep the idea of public-key crypto, but base it on other math problems than factoring or discrete log. Prominent examples: lattice problems, error-correcting code problems, . . . Advantages: Users only need classical computers, we can keep our efficient public-key infrastructure Disadvantages: Are these systems secure against quantum computers? Who knows; not enough research yet NIST is running a competition for the best candidate scheme
  • 73. Quantum codemaking: quantum cryptography Use quantum to induce an information-gain-vs-disturbance tradeoff: if adversary learns a lot about state of quantum channel, then they necessarily disturb it, and will be detected
  • 74. Quantum codemaking: quantum cryptography Use quantum to induce an information-gain-vs-disturbance tradeoff: if adversary learns a lot about state of quantum channel, then they necessarily disturb it, and will be detected BB’84 quantum key distribution: Alice and Bob can obtain a shared secret key by communicating over a public quantum channel and a public authenticated classical channel
  • 75. Quantum codemaking: quantum cryptography Use quantum to induce an information-gain-vs-disturbance tradeoff: if adversary learns a lot about state of quantum channel, then they necessarily disturb it, and will be detected BB’84 quantum key distribution: Alice and Bob can obtain a shared secret key by communicating over a public quantum channel and a public authenticated classical channel Advantages: Information-theoretic security against quantum adversary
  • 76. Quantum codemaking: quantum cryptography Use quantum to induce an information-gain-vs-disturbance tradeoff: if adversary learns a lot about state of quantum channel, then they necessarily disturb it, and will be detected BB’84 quantum key distribution: Alice and Bob can obtain a shared secret key by communicating over a public quantum channel and a public authenticated classical channel Advantages: Information-theoretic security against quantum adversary. Doable with current technology, even via satellites!
  • 77. Quantum codemaking: quantum cryptography Use quantum to induce an information-gain-vs-disturbance tradeoff: if adversary learns a lot about state of quantum channel, then they necessarily disturb it, and will be detected BB’84 quantum key distribution: Alice and Bob can obtain a shared secret key by communicating over a public quantum channel and a public authenticated classical channel Advantages: Information-theoretic security against quantum adversary. Doable with current technology, even via satellites! Disadvantages: Inefficient point-to-point communication.
  • 78. Quantum codemaking: quantum cryptography Use quantum to induce an information-gain-vs-disturbance tradeoff: if adversary learns a lot about state of quantum channel, then they necessarily disturb it, and will be detected BB’84 quantum key distribution: Alice and Bob can obtain a shared secret key by communicating over a public quantum channel and a public authenticated classical channel Advantages: Information-theoretic security against quantum adversary. Doable with current technology, even via satellites! Disadvantages: Inefficient point-to-point communication. Limited distance.
  • 79. Quantum codemaking: quantum cryptography Use quantum to induce an information-gain-vs-disturbance tradeoff: if adversary learns a lot about state of quantum channel, then they necessarily disturb it, and will be detected BB’84 quantum key distribution: Alice and Bob can obtain a shared secret key by communicating over a public quantum channel and a public authenticated classical channel Advantages: Information-theoretic security against quantum adversary. Doable with current technology, even via satellites! Disadvantages: Inefficient point-to-point communication. Limited distance. Current implementations have often been hacked
  • 80. Potential impact area 2: optimization
  • 81. Potential impact area 2: optimization Optimization is one of the main applications of computers in the real world: allocating resources to jobs, scheduling lectures, optimizing designs, minimizing energy use, etc.
  • 82. Potential impact area 2: optimization Optimization is one of the main applications of computers in the real world: allocating resources to jobs, scheduling lectures, optimizing designs, minimizing energy use, etc. Quantum computers can help
  • 83. Potential impact area 2: optimization Optimization is one of the main applications of computers in the real world: allocating resources to jobs, scheduling lectures, optimizing designs, minimizing energy use, etc. Quantum computers can help: Grover’s search algorithm
  • 84. Potential impact area 2: optimization Optimization is one of the main applications of computers in the real world: allocating resources to jobs, scheduling lectures, optimizing designs, minimizing energy use, etc. Quantum computers can help: Grover’s search algorithm Finding the shortest path on a map
  • 85. Potential impact area 2: optimization Optimization is one of the main applications of computers in the real world: allocating resources to jobs, scheduling lectures, optimizing designs, minimizing energy use, etc. Quantum computers can help: Grover’s search algorithm Finding the shortest path on a map Speed-ups for linear programs
  • 86. Potential impact area 2: optimization Optimization is one of the main applications of computers in the real world: allocating resources to jobs, scheduling lectures, optimizing designs, minimizing energy use, etc. Quantum computers can help: Grover’s search algorithm Finding the shortest path on a map Speed-ups for linear programs Gradient descent towards minimum
  • 87. Potential impact area 2: optimization Optimization is one of the main applications of computers in the real world: allocating resources to jobs, scheduling lectures, optimizing designs, minimizing energy use, etc. Quantum computers can help: Grover’s search algorithm Finding the shortest path on a map Speed-ups for linear programs Gradient descent towards minimum Finite-element methods
  • 88. Potential impact area 2: optimization Optimization is one of the main applications of computers in the real world: allocating resources to jobs, scheduling lectures, optimizing designs, minimizing energy use, etc. Quantum computers can help: Grover’s search algorithm Finding the shortest path on a map Speed-ups for linear programs Gradient descent towards minimum Finite-element methods Typically these only give limited (“polynomial”) speed-up; whether that’s worthwhile depends on the cost of a QC
  • 89. Potential impact area 2: optimization Optimization is one of the main applications of computers in the real world: allocating resources to jobs, scheduling lectures, optimizing designs, minimizing energy use, etc. Quantum computers can help: Grover’s search algorithm Finding the shortest path on a map Speed-ups for linear programs Gradient descent towards minimum Finite-element methods Typically these only give limited (“polynomial”) speed-up; whether that’s worthwhile depends on the cost of a QC Classical input needs to be accessible in superposition, so needs to be stored in Quantum Random Access Memory
  • 91. Quantum machine learning Machine learning has gotten hugely successful in the last 5 years
  • 92. Quantum machine learning Machine learning has gotten hugely successful in the last 5 years After choosing set M of possible models & cleaning up data
  • 93. Quantum machine learning Machine learning has gotten hugely successful in the last 5 years After choosing set M of possible models & cleaning up data, machine learning boils down to an optimization problem: max m∈M fit of m with the data
  • 94. Quantum machine learning Machine learning has gotten hugely successful in the last 5 years After choosing set M of possible models & cleaning up data, machine learning boils down to an optimization problem: max m∈M fit of m with the data Quantum computers can speed this up (in some cases)
  • 95. Quantum machine learning Machine learning has gotten hugely successful in the last 5 years After choosing set M of possible models & cleaning up data, machine learning boils down to an optimization problem: max m∈M fit of m with the data Quantum computers can speed this up (in some cases) Often the data consists of vectors in some large dimension d. Can try to prepare those as log2(d)-qubit states, manipulate those with quantum algorithms
  • 96. Quantum machine learning Machine learning has gotten hugely successful in the last 5 years After choosing set M of possible models & cleaning up data, machine learning boils down to an optimization problem: max m∈M fit of m with the data Quantum computers can speed this up (in some cases) Often the data consists of vectors in some large dimension d. Can try to prepare those as log2(d)-qubit states, manipulate those with quantum algorithms. Easier said than done. . .
  • 97. Potential impact area 3: simulation
  • 98. Potential impact area 3: simulation Much effort on understanding quantum systems for materials, batteries, drugs, high-temperature superconductivity etc.
  • 99. Potential impact area 3: simulation Much effort on understanding quantum systems for materials, batteries, drugs, high-temperature superconductivity etc.
  • 100. Potential impact area 3: simulation Much effort on understanding quantum systems for materials, batteries, drugs, high-temperature superconductivity etc. Sophisticated classical methods hit a wall for larger systems, because of the exponential number of amplitudes in a state
  • 101. Potential impact area 3: simulation Much effort on understanding quantum systems for materials, batteries, drugs, high-temperature superconductivity etc. Sophisticated classical methods hit a wall for larger systems, because of the exponential number of amplitudes in a state Think of quantum computer as universal quantum simulator: given a sufficiently simple description of a physical system (“Hamiltonian”), a quantum computer can simulate the evolution of a given initial state for some time t
  • 102. Potential impact area 3: simulation Much effort on understanding quantum systems for materials, batteries, drugs, high-temperature superconductivity etc. Sophisticated classical methods hit a wall for larger systems, because of the exponential number of amplitudes in a state Think of quantum computer as universal quantum simulator: given a sufficiently simple description of a physical system (“Hamiltonian”), a quantum computer can simulate the evolution of a given initial state for some time t This could lead to better materials, drugs, . . .
  • 103. Potential impact area 3: simulation Much effort on understanding quantum systems for materials, batteries, drugs, high-temperature superconductivity etc. Sophisticated classical methods hit a wall for larger systems, because of the exponential number of amplitudes in a state Think of quantum computer as universal quantum simulator: given a sufficiently simple description of a physical system (“Hamiltonian”), a quantum computer can simulate the evolution of a given initial state for some time t This could lead to better materials, drugs, . . . Could already be useful with 100s good qubits (unlike Shor)
  • 104. Conclusion Quantum mechanics: best physical theory we have
  • 105. Conclusion Quantum mechanics: best physical theory we have Fundamentally different from classical physics: superposition, interference, entanglement
  • 106. Conclusion Quantum mechanics: best physical theory we have Fundamentally different from classical physics: superposition, interference, entanglement Quantum computers can use these non-classical effects for many useful things: cryptography, optimization, simulation. Though it will probably remain a “special purpose” computer
  • 107. Conclusion Quantum mechanics: best physical theory we have Fundamentally different from classical physics: superposition, interference, entanglement Quantum computers can use these non-classical effects for many useful things: cryptography, optimization, simulation. Though it will probably remain a “special purpose” computer People are working hard on physical implementations
  • 108. Conclusion Quantum mechanics: best physical theory we have Fundamentally different from classical physics: superposition, interference, entanglement Quantum computers can use these non-classical effects for many useful things: cryptography, optimization, simulation. Though it will probably remain a “special purpose” computer People are working hard on physical implementations What will this mean in practice? We’ll see. . . though we are still far from a large-scale quantum computer