Results 1  10
of
39
Oracle quantum computing
 Brassard & U.Vazirani, Strengths and weaknesses of quantum computing
, 1994
"... \Because nature isn't classical, dammit..." ..."
Abstract

Cited by 115 (8 self)
 Add to MetaCart
\Because nature isn't classical, dammit..."
Efficient simulation of quantum systems by quantum computers
, 1998
"... We show that the time evolution of the wave function of a quantummechanical manyparticle system can be simulated precisely and efficiently on a quantum computer. The time needed for such a simulation is comparable to the time of a conventional simulation of the corresponding classical system, a per ..."
Abstract

Cited by 79 (0 self)
 Add to MetaCart
We show that the time evolution of the wave function of a quantummechanical manyparticle system can be simulated precisely and efficiently on a quantum computer. The time needed for such a simulation is comparable to the time of a conventional simulation of the corresponding classical system, a performance which can’t be expected from any classical simulation of a quantum system. We then show how quantities of interest, like the energy spectrum of a system, can be obtained. We also indicate that ultimately the simulation of quantum field theory might be possible on large quantum computers.
Quantum information with rydberg atoms
 Rev. Mod. Phys
, 2010
"... Rydberg atoms with principal quantum number n1 have exaggerated atomic properties including dipoledipole interactions that scale as n4 and radiative lifetimes that scale as n3. It was proposed a decade ago to take advantage of these properties to implement quantum gates between neutral atom qubits. ..."
Abstract

Cited by 47 (2 self)
 Add to MetaCart
(Show Context)
Rydberg atoms with principal quantum number n1 have exaggerated atomic properties including dipoledipole interactions that scale as n4 and radiative lifetimes that scale as n3. It was proposed a decade ago to take advantage of these properties to implement quantum gates between neutral atom qubits. The availability of a strong longrange interaction that can be coherently turned on and off is an enabling resource for a wide range of quantum information tasks stretching far beyond the original gate proposal. Rydberg enabled capabilities include longrange twoqubit gates, collective encoding of multiqubit registers, implementation of robust lightatom quantum interfaces, and the potential for simulating quantum manybody physics. The advances of the last decade are reviewed, covering both theoretical and experimental aspects of Rydbergmediated quantum information processing.
The Ion Trap Quantum Information Processor
 Appl. Phys. B
, 1997
"... An introductory review of the linear ion trap is given, with particular regard to its use for quantum information processing. The discussion aims to bring together ideas from information theory and experimental ion trapping, to provide a resource to workers unfamiliar with one or the other of these ..."
Abstract

Cited by 30 (2 self)
 Add to MetaCart
(Show Context)
An introductory review of the linear ion trap is given, with particular regard to its use for quantum information processing. The discussion aims to bring together ideas from information theory and experimental ion trapping, to provide a resource to workers unfamiliar with one or the other of these subjects. It is shown that information theory provides valuable concepts for the experimental use of ion traps, especially error correction, and conversely the ion trap provides a valuable link between information theory and physics, with attendant physical insights. Example parameters are given for the case of calcium ions. Passive stabilisation will allow about 200 computing operations on 10 ions; with error correction this can be greatly extended. 1
Architectural implications of quantum computing technologies
 ACM Journal on Emerging Technologies in Computing Systems (JETC
, 2006
"... In this article we present a classification scheme for quantum computing technologies that is based on the characteristics most relevant to computer systems architecture. The engineering tradeoffs of execution speed, decoherence of the quantum states, and size of systems are described. Concurrency, ..."
Abstract

Cited by 27 (4 self)
 Add to MetaCart
In this article we present a classification scheme for quantum computing technologies that is based on the characteristics most relevant to computer systems architecture. The engineering tradeoffs of execution speed, decoherence of the quantum states, and size of systems are described. Concurrency, storage capacity, and interconnection network topology influence algorithmic efficiency, while quantum error correction and necessary quantum state measurement are the ultimate drivers of logical clock speed. We discuss several proposed technologies. Finally, we use our taxonomy to explore architectural implications for common arithmetic circuits, examine the implementation of quantum error correction, and discuss clusterstate quantum computation.
Decoherence limits to quantum computation using trapped ions
 Online preprint quantph/9610015), Proc.Roy.Soc.Lond. A453
, 1997
"... We investigate the problem of factorization of large numbers on a quantum computer which we imagine to be realized within a linear ion trap. We derive upper bounds on the size of the numbers that can be factorized on such a quantum computer. These upper bounds are independent of the power of the app ..."
Abstract

Cited by 22 (3 self)
 Add to MetaCart
We investigate the problem of factorization of large numbers on a quantum computer which we imagine to be realized within a linear ion trap. We derive upper bounds on the size of the numbers that can be factorized on such a quantum computer. These upper bounds are independent of the power of the applied laser. We investigate two possible ways to implement qubits, in metastable optical transitions and in Zeeman sublevels of a stable ground state, and show that in both cases the numbers that can be factorized are not large enough to be of practical interest. We also investigate the effect of quantum error correction on our estimates and show that in realistic systems the impact of quantum error correction is much smaller than expected. Again no number of practical interest can be factorized.
Level reduction and the quantum threshold theorem
 PH.D. THESIS, CALTECH, 2007, EPRINT ARXIV:QUANTPH/0703230
, 2007
"... ..."
(Show Context)
Quantum computing: Pro and con
 Proc. Royal Soc. London A
, 1997
"... I assess the potential of quantum computation. Broad and important applications must be found to justify construction of a quantum computer; I review some of the known quantum algorithms and consider the prospects for finding new ones. Quantum computers are notoriously susceptible to making errors; ..."
Abstract

Cited by 12 (0 self)
 Add to MetaCart
I assess the potential of quantum computation. Broad and important applications must be found to justify construction of a quantum computer; I review some of the known quantum algorithms and consider the prospects for finding new ones. Quantum computers are notoriously susceptible to making errors; I discuss recently developed faulttolerant procedures that enable a quantum computer with noisy gates to perform reliably. Quantum computing hardware is still in its infancy; I comment on the specifications that should be met by future hardware. Over the past few years, work on quantum computation has erected a new classification of computational complexity, has generated profound insights into the nature of decoherence, and has stimulated the formulation of new techniques in highprecision experimental physics. A broad interdisciplinary effort will be needed if quantum computers are to fulfil their destiny as the world's fastest computing devices. This paper is an expanded version of remarks that were prepared for a panel discussion
A Quick Glance at Quantum Cryptography
, 1998
"... The recent application of the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secret communication. As a result of these new developments, it is now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it oc ..."
Abstract

Cited by 11 (2 self)
 Add to MetaCart
The recent application of the principles of quantum mechanics to cryptography has led to a remarkable new dimension in secret communication. As a result of these new developments, it is now possible to construct cryptographic communication systems which detect unauthorized eavesdropping should it occur, and which give a guarantee of no eavesdropping should it not occur. Contents 1 Cryptographic systems before quantum cryptography 3 2 Preamble to quantum cryptography 7 Partially supported by ARL Contract #DAAL0195P1884, ARO Grant #P38804PH QC, and the LOOP Fund. 3 The BB84 quantum cryptographic protocol without noise 10 3.1 Stage 1. Communication over a quantum channel . . . . . . . 12 3.2 Stage 2. Communication in two phases over a public channel . 14 3.2.1 Phase 1 of Stage 2. Extraction of raw key . . . . . . . 14 3.2.2 Phase 2 of Stage 2. Detection of Eve's intrusion via error detection . . . . . . . . . . . . . . . . . . . . . . 15 4 The BB84 quantum cryptographic pr...