Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

Quantum computing

From Wikipedia, the free encyclopedia
Computer hardware technology that uses quantum mechanics

Bloch sphere representation of a qubit. The state|ψ=α|0+β|1{\displaystyle |\psi \rangle =\alpha |0\rangle +\beta |1\rangle }is a point on the surface of the sphere, partway between the poles,|0{\displaystyle |0\rangle } and|1{\displaystyle |1\rangle }.

Aquantum computer is a (real or theoretical)computer that exploitssuperposed andentangledstates, and the intrinsicallynon-deterministic outcomes ofquantum measurements, as features of its computation. Quantum computers can be viewed as sampling from quantum systems that evolve in ways that may be described as operating on an enormous number of possibilities simultaneously, though still subject to strict computational constraints. By contrast, ordinary ("classical") computers operate according todeterministic rules. (Aclassical computer can, in principle, be replicated by aclassical mechanical device, with only a simple multiple of time cost. On the other hand (it is believed), a quantum computer would requireexponentially more time and energy to be simulated classically.) It is widely believed that a quantum computer could performsome calculations exponentially faster than any classical computer. For example, a large-scale quantum computer couldbreak some widely used public-key cryptographic schemes and aid physicists in performingphysical simulations. However, current hardware implementations of quantum computation are largely experimental and only suitable for specialized tasks.

The basicunit of information in quantum computing, thequbit (or "quantum bit"), serves the same function as thebit in ordinary or "classical" computing.[1] However, unlike a classical bit, which can be in one of two states (abinary), a qubit can exist in alinear combination of two states known as aquantum superposition. The result ofmeasuring a qubit is one of the two states given by aprobabilistic rule. If a quantum computer manipulates the qubit in a particular way,wave interference effects amplify the probability of the desired measurement result. The design ofquantum algorithms involves creating procedures that allow a quantum computer to perform this amplification.

Quantum computers are not yet practical for real-world applications. Physically engineering high-quality qubits has proven to be challenging. If a physical qubit is not sufficientlyisolated from its environment, it suffers fromquantum decoherence, introducingnoise into calculations. National governments have invested heavily in experimental research aimed at developing scalable qubits with longer coherence times and lower error rates. Example implementations includesuperconductors (which isolate anelectrical current by eliminatingelectrical resistance) andion traps (which confine a singleatomic particle usingelectromagnetic fields). Researchers have claimed, and are widely believed to be correct, that certain quantum devices can outperform classical computers on narrowly defined tasks, a milestone referred to as quantum advantage orquantum supremacy. These tasks are not necessarily useful for real-world applications.

History

[edit]
For a chronological guide, seeTimeline of quantum computing and communication.

For many years, the fields ofquantum mechanics andcomputer science formed distinct academic communities.[2]Modern quantum theory was developed in the 1920s to explain perplexing physical phenomena observed at atomic scales,[3][4] anddigital computers emerged in the following decades to replacehuman computers for tedious calculations.[5] Both disciplines had practical applications duringWorld War II; computers played a major role inwartime cryptography,[6] and quantum physics was essential fornuclear physics used in theManhattan Project.[7]

Asphysicists applied quantum mechanical models to computational problems and swapped digitalbits forqubits, the fields of quantum mechanics and computer science began to converge. In 1980,Paul Benioff introduced thequantum Turing machine, which uses quantum theory to describe a simplified computer.[8]When digital computers became faster, physicists faced anexponential increase in overhead whensimulating quantum dynamics,[9] promptingYuri Manin andRichard Feynman to independently suggest that hardware based on quantum phenomena might be more efficient for computer simulation.[10][11][12]In a 1984 paper,Charles Bennett andGilles Brassard applied quantum theory tocryptography protocols and demonstrated that quantum key distribution could enhanceinformation security.[13][14]

Quantum algorithms then emerged for solvingoracle problems, such asDeutsch's algorithm in 1985,[15] theBernstein–Vazirani algorithm in 1993,[16] andSimon's algorithm in 1994.[17]These algorithms did not solve practical problems, but demonstrated mathematically that one could obtain more information by querying ablack box with a quantum state insuperposition, sometimes referred to asquantum parallelism.[18]

Peter Shor (pictured here in 2017) showed in 1994 that a scalable quantum computer would be able to breakRSA encryption.

Peter Shor built on these results withhis 1994 algorithm for breaking the widely usedRSA andDiffie–Hellman encryption protocols,[19] which drew significant attention to the field of quantum computing. In 1996,Grover's algorithm established a quantum speedup for the widely applicableunstructured search problem.[20][21] The same year,Seth Lloyd proved that quantum computers could simulate quantum systems without the exponential overhead present in classical simulations,[22] validating Feynman's 1982 conjecture.[23]

Over the years,experimentalists have constructed small-scale quantum computers usingtrapped ions and superconductors.[24]In 1998, a two-qubit quantum computer demonstrated the feasibility of the technology,[25][26] and subsequent experiments have increased the number of qubits and reduced error rates.[24]

In 2019,Google AI andNASA announced that they had achievedquantum supremacy with a 54-qubit machine, performing a computation that any classical computer would find impossible.[27][28][29][30]

This announcement was met with a rebuttal fromIBM, which contended that the calculation Google claimed would take 10,000 years could be performed in just 2.5 days on itsSummit supercomputer if its architecture were optimized, sparking a debate over the precise threshold for "quantum supremacy".[31]

Quantum information processing

[edit]

Computer engineers typically describe amodern computer's operation in terms ofclassical electrodynamics. In these "classical" computers, some components (such assemiconductors andrandom number generators) may rely on quantum behavior; however, because they are notisolated from their environment, anyquantum information eventually quicklydecoheres. Whileprogrammers may depend onprobability theory when designing arandomized algorithm, quantum-mechanical notions such assuperposition andwave interference are largely irrelevant inprogram analysis.

Quantum programs, in contrast, rely on precise control ofcoherent quantum systems. Physicistsdescribe these systems mathematically usinglinear algebra.Complex numbers modelprobability amplitudes,vectors modelquantum states, andmatrices model the operations that can be performed on these states. Programming a quantum computer is then a matter ofcomposing operations in such a way that the resulting program computes a useful result in theory and is implementable in practice.

As physicistCharlie Bennett describes the relationship between quantum and classical computers,[32]

A classical computer is a quantum computer ... so we shouldn't be asking about "where do quantum speedups come from?" We should say, "Well, all computers are quantum. ... Where do classical slowdowns come from?"

Quantum information

[edit]

Just as the bit is the basic concept of classical information theory, thequbit is the fundamental unit ofquantum information. The same termqubit is used to refer to an abstract mathematical model and to any physical system that is represented by that model. A classical bit, by definition, exists in either of two physical states, which can be denoted 0 and 1. A qubit is also described by a state, and two states, often written|0{\displaystyle |0\rangle } and|1{\displaystyle |1\rangle }, serve as the quantum counterparts of the classical states 0 and 1. However, the quantum states|0{\displaystyle |0\rangle } and|1{\displaystyle |1\rangle } belong to avector space, meaning that they can be multiplied by constants and added together, and the result is again a valid quantum state. Such a combination is known as asuperposition of|0{\displaystyle |0\rangle } and|1{\displaystyle |1\rangle }.[33][34]

A two-dimensionalvector mathematically represents a qubit state. Physicists typically usebra–ket notation for quantum mechanicallinear algebra, writing|ψ{\displaystyle |\psi \rangle }'ketpsi' for a vector labeledψ{\displaystyle \psi }. Because a qubit is a two-state system, any qubit state takes the formα|0+β|1{\displaystyle \alpha |0\rangle +\beta |1\rangle }, where|0{\displaystyle |0\rangle } and|1{\displaystyle |1\rangle } are the standardbasis states,[a] andα{\displaystyle \alpha } andβ{\displaystyle \beta } are theprobability amplitudes, which are in generalcomplex numbers.[34] If eitherα{\displaystyle \alpha } orβ{\displaystyle \beta } is zero, the qubit is effectively a classical bit; when both are nonzero, the qubit is in superposition. Such aquantum state vector behaves similarly to a (classical)probability vector, with one key difference: unlike probabilities, probabilityamplitudes are not necessarily positive numbers.[36] Negative amplitudes allow for destructive wave interference.

When a qubit ismeasured in thestandard basis, the result is a classical bit. TheBorn rule describes thenorm-squared correspondence between amplitudes and probabilities—when measuring a qubitα|0+β|1{\displaystyle \alpha |0\rangle +\beta |1\rangle }, the statecollapses to|0{\displaystyle |0\rangle } with probability|α|2{\displaystyle |\alpha |^{2}}, or to|1{\displaystyle |1\rangle } with probability|β|2{\displaystyle |\beta |^{2}}.Any valid qubit state has coefficientsα{\displaystyle \alpha } andβ{\displaystyle \beta } such that|α|2+|β|2=1{\displaystyle |\alpha |^{2}+|\beta |^{2}=1}.As an example, measuring the qubit1/2|0+1/2|1{\displaystyle 1/{\sqrt {2}}|0\rangle +1/{\sqrt {2}}|1\rangle } would produce either|0{\displaystyle |0\rangle } or|1{\displaystyle |1\rangle } with equal probability.

Each additional qubit doubles thedimension of thestate space.[35]As an example, the vector1/√2|00⟩ +1/√2|01⟩ represents a two-qubit state, atensor product of the qubit|0⟩ with the qubit1/√2|0⟩ +1/√2|1⟩.This vector inhabits a four-dimensionalvector space spanned by the basis vectors|00⟩,|01⟩,|10⟩, and|11⟩.TheBell state1/√2|00⟩ +1/√2|11⟩ is impossible to decompose into the tensor product of two individual qubits—the two qubits areentangled because neither qubit has a state vector of its own.In general, the vector space for ann-qubit system is2n-dimensional, and this makes it challenging for a classical computer to simulate a quantum one: representing a 100-qubit system requires storing 2100 classical values.

Unitary operators

[edit]
See also:Unitarity (physics)

The state of this one-qubitquantum memory can be manipulated by applyingquantum logic gates, analogous to how classical memory can be manipulated withclassical logic gates. One important gate for both classical and quantum computation is the NOT gate, which can be represented by amatrixX:=(0110).{\displaystyle X:={\begin{pmatrix}0&1\\1&0\end{pmatrix}}.}Mathematically, the application of such a logic gate to a quantum state vector is modeled withmatrix multiplication. Thus

X|0=|1{\displaystyle X|0\rangle =|1\rangle } andX|1=|0{\displaystyle X|1\rangle =|0\rangle }.

The mathematics of single-qubit gates can be extended to operate on multi-qubit quantum memories in two important ways. One way is simply to select a qubit and apply that gate to the target qubit while leaving the remainder of the memory unaffected. Another way is to apply the gate to its target only if another part of the memory is in a desired state. These two choices can be illustrated using another example. The possible states of a two-qubit quantum memory are|00:=(1000);|01:=(0100);|10:=(0010);|11:=(0001).{\displaystyle |00\rangle :={\begin{pmatrix}1\\0\\0\\0\end{pmatrix}};\quad |01\rangle :={\begin{pmatrix}0\\1\\0\\0\end{pmatrix}};\quad |10\rangle :={\begin{pmatrix}0\\0\\1\\0\end{pmatrix}};\quad |11\rangle :={\begin{pmatrix}0\\0\\0\\1\end{pmatrix}}.}Thecontrolled NOT (CNOT) gate can then be represented using the following matrix:CNOT:=(1000010000010010).{\displaystyle \operatorname {CNOT} :={\begin{pmatrix}1&0&0&0\\0&1&0&0\\0&0&0&1\\0&0&1&0\end{pmatrix}}.}As a mathematical consequence of this definition,CNOT|00=|00{\textstyle \operatorname {CNOT} |00\rangle =|00\rangle },CNOT|01=|01{\textstyle \operatorname {CNOT} |01\rangle =|01\rangle },CNOT|10=|11{\textstyle \operatorname {CNOT} |10\rangle =|11\rangle }, andCNOT|11=|10{\textstyle \operatorname {CNOT} |11\rangle =|10\rangle }. In other words, the CNOT applies a NOT gate (X{\textstyle X} from before) to the second qubit if and only if the first qubit is in the state|1{\textstyle |1\rangle }. If the first qubit is|0{\textstyle |0\rangle }, nothing is done to either qubit.

In summary, quantum computation can be described as a network of quantum logic gates and measurements. However, anymeasurement can be deferred to the end of quantum computation, though this deferment may come at a computational cost, so mostquantum circuits depict a network consisting only of quantum logic gates and no measurements.

Quantum parallelism

[edit]

Quantum parallelism is the heuristic that quantum computers can be thought of as evaluating a function for multiple input values simultaneously. This can be achieved by preparing a quantum system in a superposition of input states and applying a unitary transformation that encodes the function to be evaluated. The resulting state encodes the function's output values for all input values in the superposition, enabling the simultaneous computation of multiple outputs. This property is key to the speedup of many quantum algorithms. However, "parallelism" in this sense is insufficient to speed up a computation, because the measurement at the end of the computation gives only one value. To be useful, a quantum algorithm must also incorporate some other conceptual ingredient.[37][38]

Quantum programming

[edit]
Further information:Quantum programming

There are multiplemodels of computation for quantum computing, distinguished by the basic elements in which the computation is decomposed.

Gate array

[edit]
A quantum circuit diagram implementing aToffoli gate frommore primitive gates

Aquantum gate array decomposes computation into a sequence of few-qubitquantum gates. A quantum computation can be described as a network of quantum logic gates and measurements. However, any measurement can be deferred to the end of quantum computation, though this deferment may come at a computational cost, so most quantum circuits depict a network consisting only of quantum logic gates and no measurements.

Any quantum computation (which is, in the above formalism, anyunitary matrix of size2n×2n{\displaystyle 2^{n}\times 2^{n}} overn{\displaystyle n} qubits) can be represented as a network of quantum logic gates from a fairly small family of gates. A choice of gate family that enables this construction is known as auniversal gate set, since a computer that can run such circuits is auniversal quantum computer. One common such set includes all single-qubit gates as well as the CNOT gate from above. This means any quantum computation can be performed by executing a sequence of single-qubit gates together with CNOT gates. Though this gate set is infinite, it can be replaced with a finite gate set by appealing to theSolovay-Kitaev theorem. Implementation of Boolean functions using the few-qubit quantum gates is presented here.[39]

Measurement-based quantum computing

[edit]

Ameasurement-based quantum computer decomposes computation into a sequence ofBell state measurements and single-qubitquantum gates applied to a highly entangled initial state (acluster state), using a technique calledquantum gate teleportation.

Adiabatic quantum computing

[edit]

Anadiabatic quantum computer, based onquantum annealing, decomposes computation into a slow continuous transformation of an initialHamiltonian into a final Hamiltonian, whose ground states contain the solution.[40]

Neuromorphic quantum computing

[edit]

Neuromorphic quantum computing (abbreviated 'n.quantum computing') is an unconventional process of computing that usesneuromorphic computing to perform quantum operations. It was suggested that quantum algorithms, which are algorithms that run on a realistic model of quantum computation, can be computed equally efficiently with neuromorphic quantum computing. Both traditional quantum computing and neuromorphic quantum computing are physics-based unconventional computing approaches to computations and do not follow thevon Neumann architecture. They both construct a system (a circuit) that represents the physical problem at hand and then leverage their respective physics properties of the system to seek the "minimum". Neuromorphic quantum computing and quantum computing share similar physical properties during computation.

Topological quantum computing

[edit]

Atopological quantum computer decomposes computation into the braiding ofanyons in a 2D lattice.[41]

Quantum Turing machine

[edit]

Aquantum Turing machine is the quantum analog of aTuring machine.[8] All of these models of computation—quantum circuits,[42]one-way quantum computation,[43] adiabatic quantum computation,[44] and topological quantum computation[45]—have been shown to be equivalent to the quantum Turing machine; given a perfect implementation of one such quantum computer, it can simulate all the others with no more than polynomial overhead. This equivalence need not hold for practical quantum computers, since the overhead of simulation may be too large to be practical.

Noisy intermediate-scale quantum computing

[edit]

Thethreshold theorem shows how increasing the number of qubits can mitigate errors,[46] yet fully fault-tolerant quantum computing remains "a rather distant dream".[47] According to some researchers,noisy intermediate-scale quantum (NISQ) machines may have specialized uses in the near future, butnoise in quantum gates limits their reliability.[47]Scientists atHarvard University successfully created "quantum circuits" that correct errors more efficiently than alternative methods, which may potentially remove a major obstacle to practical quantum computers.[48] The Harvard research team was supported byMIT,QuEra Computing,Caltech, andPrinceton University and funded byDARPA's Optimization with Noisy Intermediate-Scale Quantum devices (ONISQ) program.[49][50]

Quantum cryptography and cybersecurity

[edit]
Main article:Quantum cryptography

Digital cryptography enables communications to remain private, preventing unauthorized parties from accessing them. Conventional encryption, the obscuring of a message with a key through an algorithm, relies on the algorithm being difficult to reverse. Encryption is also the basis for digital signatures and authentication mechanisms. Quantum computing may be sufficiently more powerful that difficult reversals are feasible, allowing messages relying on conventional encryption to be read.[51]

Quantum cryptography replaces conventional algorithms with computations based on quantum computing. In principle, quantum encryption would be impossible to decode even with a quantum computer. This advantage comes at a significant cost in terms of elaborate infrastructure, while effectively preventing legitimate decoding of messages by governmental security officials.[51]

Ongoing research in quantum andpost-quantum cryptography has led to new algorithms forquantum key distribution, initial work on quantumrandom number generation and to some early technology demonstrations.[52]: 1012–1036 

Communication

[edit]
Further information:Quantum information science

Quantum cryptography enables new ways to transmit data securely; for example,quantum key distribution uses entangled quantum states to establish securecryptographic keys.[52]: 1017  When a sender and receiver exchange quantum states, they can guarantee that anadversary does not intercept the message, as any unauthorized eavesdropper would disturb the delicate quantum system and introduce a detectable change.[53] With appropriatecryptographic protocols, the sender and receiver can thus establish shared private information resistant to eavesdropping.[13][54]

Modernfiber-optic cables can transmit quantum information over relatively short distances. Ongoing experimental research aims to develop more reliable hardware (such as quantum repeaters), hoping to scale this technology to long-distancequantum networks with end-to-end entanglement. Theoretically, this could enable novel technological applications, such as distributed quantum computing and enhancedquantum sensing.[55][56]

Algorithms

[edit]

Progress in findingquantum algorithms typically focuses on this quantum circuit model, though exceptions like thequantum adiabatic algorithm exist. Quantum algorithms can be roughly categorized by the type of speedup achieved over corresponding classical algorithms.[57]

Quantum algorithms that offer more than a polynomial speedup over the best-known classical algorithm includeShor's algorithm for factoring and the related quantum algorithms for computingdiscrete logarithms, solvingPell's equation, and, more generally, solving thehidden subgroup problem forabelian finite groups.[57] These algorithms depend on the primitive of thequantum Fourier transform. No mathematical proof has been found that shows that an equally fast classical algorithm cannot be discovered, but evidence suggests that this is unlikely.[58] Certain oracle problems likeSimon's problem and theBernstein–Vazirani problem do give provable speedups, though this is in thequantum query model, which is a restricted model where lower bounds are much easier to prove and don't necessarily translate to speedups for practical problems.

Other problems, including the simulation of quantum physical processes from chemistry and solid-state physics, the approximation of certainJones polynomials, and thequantum algorithm for linear systems of equations, have quantum algorithms appearing to give super-polynomial speedups and areBQP-complete. Because these problems are BQP-complete, an equally fast classical algorithm for them would imply that "no quantum algorithm" provides a super-polynomial speedup, which is believed to be unlikely.[59]

In addition to these problems, quantum algorithms are being explored for applications in cryptography, optimization, and machine learning, although most of these remain at the research stage and require significant advances in error correction and hardware scalability before practical implementation.[60]

Some quantum algorithms, such asGrover's algorithm andamplitude amplification, give polynomial speedups over corresponding classical algorithms.[57] Though these algorithms give comparably modest quadratic speedup, they are widely applicable and thus give speedups for a wide range of problems.[21] These speed-ups are, however, over the theoretical worst-case of classical algorithms, and concrete real-world speed-ups over algorithms used in practice have not been demonstrated.

Simulation of quantum systems

[edit]
Main article:Quantum simulation

Since chemistry and nanotechnology rely on understanding quantum systems, and such systems are impossible to simulate in an efficient manner classically,quantum simulation may be an important application of quantum computing.[61] Quantum simulation could also be used to simulate the behavior of atoms and particles at unusual conditions such as the reactions inside acollider.[62] In June 2023, IBM computer scientists reported that a quantum computer produced better results for a physics problem than a conventional supercomputer.[63][64]

About 2% of the annual global energy output is used fornitrogen fixation to produceammonia for theHaber process in the agricultural fertiliser industry (even though naturally occurring organisms also produce ammonia). Quantum simulations might be used to understand this process and increase the energy efficiency of production.[65] It is expected that an early use of quantum computing will be modeling that improves the efficiency of the Haber–Bosch process[66] by the mid-2020s[67] although some have predicted it will take longer.[68]

Post-quantum cryptography

[edit]
Main article:Post-quantum cryptography

A notable application of quantum computing is inattacking cryptographic systems that are currently in use.Integer factorization, which underpins the security ofpublic key cryptographic systems, is believed to be computationally infeasible on aclassical computer for large integers if they are the product of a fewprime numbers (e.g., the product of two 300-digit primes).[69] By contrast, a quantum computer could solve this problem exponentially faster using Shor's algorithm to factor the integer.[70] This ability would allow a quantum computer to break many of thecryptographic systems in use today, in the sense that there would be apolynomial time (in the number of digits of the integer) algorithm for solving the problem. In particular, most of the popularpublic key ciphers are based on the difficulty of factoring integers or thediscrete logarithm problem, both of which can be solved by Shor's algorithm. In particular, theRSA,Diffie–Hellman, andelliptic curve Diffie–Hellman algorithms could be broken. These are used to protect secure Web pages, encrypted email, and many other types of data. Breaking these would have significant ramifications for electronic privacy and security.

Identifying cryptographic systems that may be secure against quantum algorithms is an actively researched topic under the field ofpost-quantum cryptography.[71][72] Some public-key algorithms are based on problems other than the integer factorization and discrete logarithm problems to which Shor's algorithm applies, such as theMcEliece cryptosystem, which relies on a hard problem incoding theory.[71][73]Lattice-based cryptosystems are also not known to be broken by quantum computers, and finding a polynomial time algorithm for solving thedihedralhidden subgroup problem, which would break many lattice-based cryptosystems, is a well-studied open problem.[74] It has been shown that applying Grover's algorithm to break asymmetric (secret-key) algorithm by brute force requires time equal to roughly 2n/2 invocations of the underlying cryptographic algorithm, compared with roughly 2n in the classical case,[75] meaning that symmetric key lengths are effectively halved: AES-256 would have comparable security against an attack using Grover's algorithm to that AES-128 has against classical brute-force search (seeKey size).

Search problems

[edit]
Main article:Grover's algorithm

The most well-known example of a problem that allows for a polynomial quantum speedup isunstructured search, which involves finding a marked item out of a list ofn{\displaystyle n} items in a database. This can be solved by Grover's algorithm usingO(n){\displaystyle O({\sqrt {n}})} queries to the database, quadratically fewer than theΩ(n){\displaystyle \Omega (n)} queries required for classical algorithms. In this case, the advantage is not only provable but also optimal: it has been shown that Grover's algorithm gives the maximal possible probability of finding the desired element for any number of oracle lookups. Many examples of provable quantum speedups for query problems are based on Grover's algorithm, includingBrassard, Høyer, and Tapp's algorithm for finding collisions in two-to-one functions,[76] and Farhi, Goldstone, and Gutmann's algorithm for evaluating NAND trees.[77]

Problems that can be efficiently addressed with Grover's algorithm have the following properties:[78][79]

  1. There is no searchable structure in the collection of possible answers,
  2. The number of possible answers to check is the same as the number of inputs to the algorithm, and
  3. There exists a Boolean function that evaluates each input and determines whether it is the correct answer.

For problems with all these properties, the running time of Grover's algorithm on a quantum computer scales as the square root of the number of inputs (or elements in the database), as opposed to the linear scaling of classical algorithms. A general class of problems to which Grover's algorithm can be applied[80] is aBoolean satisfiability problem, where thedatabase through which the algorithm iterates is that of all possible answers. An example and possible application of this is apassword cracker that attempts to guess a password. Breakingsymmetric ciphers with this algorithm is of interest to government agencies.[81]

Quantum annealing

[edit]

Quantum annealing relies on the adiabatic theorem to undertake calculations. A system is placed in the ground state for a simple Hamiltonian, which slowly evolves to a more complicated Hamiltonian whose ground state represents the solution to the problem in question. The adiabatic theorem states that if the evolution is slow enough, the system will stay in its ground state at all times through the process. Quantum annealing can solveIsing models and the (computationally equivalent)QUBO problem, which in turn can be used to encode a wide range ofcombinatorial optimization problems.[82]Adiabatic optimization may be helpful for solvingcomputational biology problems.[83]

Machine learning

[edit]
Main article:Quantum machine learning

Since quantum computers can produce outputs that classical computers cannot produce efficiently, and since quantum computation is fundamentally linear algebraic, some express hope in developing quantum algorithms that can speed upmachine learning tasks.[47][84]

For example, theHHL Algorithm, named after its discoverers Harrow, Hassidim, and Lloyd, is believed to provide speedup over classical counterparts.[47][85] Some research groups have recently explored the use of quantum annealing hardware for trainingBoltzmann machines anddeep neural networks.[86][87][88]

Deep generative chemistry models emerge as powerful tools to expeditedrug discovery. However, the immense size and complexity of the structural space of all possible drug-like molecules pose significant obstacles, which could be overcome in the future by quantum computers. Quantum computers are naturally good for solving complex quantum many-body problems[22] and thus may be instrumental in applications involving quantum chemistry. Therefore, one can expect that quantum-enhanced generative models[89] including quantum GANs[90] may eventually be developed into ultimate generative chemistry algorithms.

Engineering

[edit]
Awafer ofadiabatic quantum computers

As of 2023,[update] classical computers outperform quantum computers for all real-world applications. While current quantum computers may speed up solutions to particular mathematical problems, they give no computational advantage for practical tasks. Scientists and engineers are exploring multiple technologies for quantum computing hardware and hope to develop scalable quantum architectures, but serious obstacles remain.[91][92]

Challenges

[edit]

There are a number of technical challenges in building a large-scale quantum computer.[93] PhysicistDavid DiVincenzo has listedthese requirements for a practical quantum computer:[94]

  • Physically scalable to increase the number of qubits
  • Qubits that can be initialized to arbitrary values
  • Quantum gates that are faster thandecoherence time
  • Universal gate set
  • Qubits that can be read easily.

Sourcing parts for quantum computers is also very difficult.Superconducting quantum computers, like those constructed byGoogle andIBM, needhelium-3, anuclear research byproduct, and specialsuperconducting cables made only by the Japanese company Coax Co.[95]

The control of multi-qubit systems requires the generation and coordination of a large number of electrical signals with tight and deterministic timing resolution. This has led to the development ofquantum controllers that enable interfacing with the qubits. Scaling these systems to support a growing number of qubits is an additional challenge.[96]

Decoherence

[edit]

One of the greatest challenges involved in constructing quantum computers is controlling or removing quantum decoherence. This usually means isolating the system from its environment, as interactions with the external world cause the system to decohere. However, other sources of decoherence also exist. Examples include the quantum gates, the lattice vibrations, and the background thermonuclear spin of the physical system used to implement the qubits. Decoherence is irreversible, as it is effectively non-unitary, and is usually something that should be highly controlled, if not avoided. Decoherence times for candidate systems in particular, the transverse relaxation timeT2 (forNMR andMRI technology, also called thedephasing time), typically range between nanoseconds and seconds at low temperatures.[97] Currently, some quantum computers require their qubits to be cooled to 20 millikelvin (usually using adilution refrigerator[98]) in order to prevent significant decoherence.[99] A 2020 study argues thationizing radiation such ascosmic rays can nevertheless cause certain systems to decohere within milliseconds.[100]

As a result, time-consuming tasks may render some quantum algorithms inoperable, as attempting to maintain the state of qubits for a long enough duration will eventually corrupt the superpositions.[101]

These issues are more difficult for optical approaches as the timescales are orders of magnitude shorter, and an often-cited approach to overcoming them is opticalpulse shaping. Error rates are typically proportional to the ratio of operating time to decoherence time; hence, any operation must be completed much more quickly than the decoherence time.

As described by thethreshold theorem, if the error rate is small enough, it is thought to be possible to usequantum error correction to suppress errors and decoherence. This allows the total calculation time to be longer than the decoherence time if the error correction scheme can correct errors faster than decoherence introduces them. An often-cited figure for the required error rate in each gate for fault-tolerant computation is 10−3, assuming the noise is depolarizing.

Meeting this scalability condition is possible for a wide range of systems. However, the use of error correction brings with it the cost of a greatly increased number of required qubits. The number required to factor integers using Shor's algorithm is still polynomial, and thought to be betweenL andL2, whereL is the number of binary digits in the number to be factored; error correction algorithms would inflate this figure by an additional factor ofL. For a 1000-bit number, this implies a need for about 104 bits without error correction.[102] With error correction, the figure would rise to about 107 bits. Computation time is aboutL2 or about 107 steps and at 1 MHz, about 10 seconds. However, the encoding and error-correction overheads increase the size of a real fault-tolerant quantum computer by several orders of magnitude. Careful estimates[103][104] show that at least 3 million physical qubits would factor 2,048-bit integer in 5 months on a fully error-corrected trapped-ion quantum computer. In terms of the number of physical qubits, to date, this remains the lowest estimate[105] for practically useful integer factorization problem sizing 1,024-bit or larger.

One approach to overcoming errors combineslow-density parity-check code withcat qubits that have intrinsic bit-flip error suppression. Implementing 100 logical qubits with 768 cat qubits could reduce the error rate to one part in 108 per cycle per bit.[106]

Another approach to the stability-decoherence problem is to create atopological quantum computer withanyons,quasi-particles used as threads, and relying onbraid theory to form stable logic gates.[107][108] Non-Abelian anyons can, in effect, remember how they have been manipulated, making them potentially useful in quantum computing.[109] As of 2025, Microsoft and other organizations are investing in quasi-particle research.[109]

Quantum supremacy

[edit]

PhysicistJohn Preskill coined the termquantum supremacy to describe the engineering feat of demonstrating that a programmable quantum device can solve a problem beyond the capabilities of state-of-the-art classical computers.[110][47][111] The problem need not be useful, so some view the quantum supremacy test only as a potential future benchmark.[112]

In October 2019, Google AI Quantum, with the help of NASA, became the first to claim to have achieved quantum supremacy by performing calculations on theSycamore quantum computer more than 3,000,000 times faster than they could be done onSummit, generally considered the world's fastest computer.[28][113][114] This claim has been subsequently challenged: IBM has stated that Summit can perform samples much faster than claimed,[115][116] and researchers have since developed better algorithms for the sampling problem used to claim quantum supremacy, giving substantial reductions to the gap between Sycamore and classical supercomputers[117][118][119] and even beating it.[120][121][122]

In December 2020, a group atUSTC implemented a type ofBoson sampling on 76 photons with aphotonic quantum computer,Jiuzhang, to demonstrate quantum supremacy.[123][124][125] The authors claim that a classical contemporary supercomputer would require a computational time of 600 million years to generate the number of samples their quantum processor can generate in 20 seconds.[126]

Claims of quantum supremacy have generated hype around quantum computing,[127] but they are based on contrived benchmark tasks that do not directly imply useful real-world applications.[91][128]

In January 2024, a study published inPhysical Review Letters provided direct verification of quantum supremacy experiments by computing exact amplitudes for experimentally generated bitstrings using a new-generation Sunway supercomputer, demonstrating a significant leap in simulation capability built on a multiple-amplitude tensor network contraction algorithm. This development underscores the evolving landscape of quantum computing, highlighting both the progress and the complexities involved in validating quantum supremacy claims.[129]

Skepticism

[edit]

Despite high hopes for quantum computing, significant progress in hardware, and optimism about future applications, a 2023Nature spotlight article summarized current quantum computers as being "For now, [good for] absolutely nothing".[91] The article elaborated that quantum computers are yet to be more useful or efficient than conventional computers in any case, though it also argued that, in the long term, such computers are likely to be useful. A 2023Communications of the ACM article[92] found that current quantum computing algorithms are "insufficient for practical quantum advantage without significant improvements across the software/hardware stack". It argues that the most promising candidates for achieving speedup with quantum computers are "small-data problems", for example, in chemistry and materials science. However, the article also concludes that a large range of the potential applications it considered, such as machine learning, "will not achieve quantum advantage with current quantum algorithms in the foreseeable future", and it identified I/O constraints that make speedup unlikely for "big data problems, unstructured linear systems, and database search based on Grover's algorithm".

This state of affairs can be traced to several current and long-term considerations.

  • Conventional computer hardware and algorithms are not only optimized for practical tasks, but are still improving rapidly, particularlyGPU accelerators.
  • Current quantum computing hardware generates only a limited amount ofentanglement before getting overwhelmed by noise.
  • Quantum algorithms provide speedup over conventional algorithms only for some tasks, and matching these tasks with practical applications proved challenging. Some promising tasks and applications require resources far beyond those available today.[130][131] In particular, processing large amounts of non-quantum data is a challenge for quantum computers.[92]
  • Some promising algorithms have been "dequantized", i.e., their non-quantum analogues with similar complexity have been found.
  • Ifquantum error correction is used to scale quantum computers to practical applications, its overhead may undermine the speedup offered by many quantum algorithms.[92]
  • Complexity analysis of algorithms sometimes makes abstract assumptions that do not hold in applications. For example, input data may not already be available encoded in quantum states, and "oracle functions" used in Grover's algorithm often have internal structure that can be exploited for faster algorithms.

In particular, building computers with large numbers of qubits may be futile if those qubits are not connected well enough and cannot maintain a sufficiently high degree of entanglement for a long time. When trying to outperform conventional computers, quantum computing researchers often look for new tasks that can be solved on quantum computers, but this leaves the possibility that efficient non-quantum techniques will be developed in response, as seen for Quantum supremacy demonstrations. Therefore, it is desirable to prove lower bounds on the complexity of best possible non-quantum algorithms (which may be unknown) and show that some quantum algorithms asymptotically improve upon those bounds.

Bill Unruh doubted the practicality of quantum computers in a paper published in 1994.[132]Paul Davies argued that a 400-qubit computer would even come into conflict with the cosmological information bound implied by theholographic principle.[133] Skeptics likeGil Kalai doubt that quantum supremacy will ever be achieved.[134][135][136] PhysicistMikhail Dyakonov has expressed skepticism of quantum computing as follows:

"So the number of continuous parameters describing the state of such a useful quantum computer at any given moment must be... about 10300... Could we ever learn to control the more than 10300 continuously variable parameters defining the quantum state of such a system? My answer is simple.No, never."[137]

Physical realizations

[edit]
Further information:List of proposed quantum registers
Quantum System One, a quantum computer byIBM from 2019 with 20 superconducting qubits[138]

A practical quantum computer must use a physical system as a programmable quantum register.[139] Researchers are exploring several technologies as candidates for reliable qubit implementations.[140]Superconductors andtrapped ions are some of the most developed proposals, but experimentalists are considering other hardware possibilities as well.[141]For example,topological quantum computer approaches are being explored for more fault-tolerance computing systems.[142]

The first quantum logic gates were implemented withtrapped ions and prototype general-purpose machines with up to 20 qubits have been realized. However, the technology behind these devices combines complex vacuum equipment, lasers, and microwave and radio frequency equipment, making full-scale processors difficult to integrate with standard computing equipment. Moreover, the trapped ion system itself has engineering challenges to overcome.[143]

The largest commercial systems are based onsuperconductor devices and have scaled to 2000 qubits. However, the error rates for larger machines have been on the order of 5%. Technologically, these devices are all cryogenic and scaling to large numbers of qubits requires wafer-scale integration, a serious engineering challenge by itself.[144]

Potential applications

[edit]

With focus on business management's point of view, the potential applications of quantum computing into four major categories are cybersecurity, data analytics and artificial intelligence, optimization and simulation, and data management and searching.[145]

Other applications include healthcare (i.e., drug discovery), financial modeling, and natural language processing.[146]

Theory

[edit]

Computability

[edit]
Further information:Computability theory

Anycomputational problem solvable by a classical computer is also solvable by a quantum computer.[147] Intuitively, this is because it is believed that all physical phenomena, including the operation of classical computers, can be described usingquantum mechanics, which underlies the operation of quantum computers.

Conversely, any problem solvable by a quantum computer is also solvable by a classical computer. It is possible to simulate both quantum and classical computers manually with just some paper and a pen, if given enough time. More formally, any quantum computer can be simulated by aTuring machine. In other words, quantum computers provide no additional power over classical computers in terms ofcomputability. This means that quantum computers cannot solveundecidable problems like thehalting problem, and the existence of quantum computers does not disprove theChurch–Turing thesis.[148]

Complexity

[edit]
Main article:Quantum complexity theory

While quantum computers cannot solve any problems that classical computers cannot already solve, it is suspected that they can solve certain problems faster than classical computers. For instance, it is known that quantum computers can efficientlyfactor integers, while this is not believed to be the case for classical computers.

The class ofproblems that can be efficiently solved by a quantum computer with bounded error is calledBQP, for "bounded error, quantum, polynomial time". More formally, BQP is the class of problems that can be solved by a polynomial-time quantum Turing machine with an error probability of at most 1/3. As a class of probabilistic problems, BQP is the quantum counterpart toBPP ("bounded error, probabilistic, polynomial time"), the class of problems that can be solved by polynomial-timeprobabilistic Turing machines with bounded error.[149] It is known thatBPPBQP{\displaystyle {\mathsf {BPP\subseteq BQP}}} and is widely suspected thatBQPBPP{\displaystyle {\mathsf {BQP\subsetneq BPP}}}, which intuitively would mean that quantum computers are more powerful than classical computers in terms oftime complexity.[150]

The suspected relationship of BQP to several classical complexity classes[59]

The exact relationship of BQP toP,NP, andPSPACE is not known. However, it is known thatPBQPPSPACE{\displaystyle {\mathsf {P\subseteq BQP\subseteq PSPACE}}}; that is, all problems that can be efficiently solved by a deterministic classical computer can also be efficiently solved by a quantum computer, and all problems that can be efficiently solved by a quantum computer can also be solved by a deterministic classical computer with polynomial space resources. It is further suspected that BQP is a strict superset of P, meaning that there exist problems that are efficiently solvable by quantum computers that are not efficiently solvable by deterministic classical computers. For instance, integer factorization and thediscrete logarithm problem are known to be in BQP and are suspected to be outside of P. On the relationship of BQP to NP, little is known beyond the fact that some NP problems that are believed not to be in P are also in BQP (integer factorization and the discrete logarithm problem are both in NP, for example). It is suspected thatNPBQP{\displaystyle {\mathsf {NP\nsubseteq BQP}}}; that is, it is believed that there are efficiently checkable problems that are not efficiently solvable by a quantum computer. As a direct consequence of this belief, it is also suspected that BQP is disjoint from the class ofNP-complete problems (if an NP-complete problem were in BQP, then it would follow fromNP-hardness that all problems in NP are in BQP).[151]

See also

[edit]
Wikimedia Commons has media related toQuantum computing.

Notes

[edit]
  1. ^Thestandard basis is also thecomputational basis.[35]

References

[edit]
  1. ^Mermin 2007, p. 1.
  2. ^Aaronson 2013, p. 132.
  3. ^Zwiebach, Barton (2022).Mastering Quantum Mechanics: Essentials, Theory, and Applications. MIT Press. §1.ISBN 978-0-262-04613-8.Quantum physics has replaced classical physics as the correct fundamental description of our physical universe. It is used routinely to describe most phenomena that occur at short distances. [...] The era of quantum physics began in earnest in 1925 with the discoveries of Erwin Schrödinger and Werner Heisenberg. The seeds for these discoveries were planted by Max Planck, Albert Einstein, Niels Bohr, Louis de Broglie, and others.
  4. ^Weinberg, Steven (2015). "Historical Introduction".Lectures on Quantum Mechanics (2nd ed.). Cambridge University Press. pp. 1–30.ISBN 978-1-107-11166-0.
  5. ^Ceruzzi, Paul E. (2012).Computing: A Concise History.Cambridge, Massachusetts: MIT Press. pp. 3, 46.ISBN 978-0-262-31038-3.OCLC 796812982.
  6. ^Hodges, Andrew (2014).Alan Turing: The Enigma. Princeton, New Jersey:Princeton University Press. p. xviii.ISBN 978-0-691-16472-4.
  7. ^Mårtensson-Pendrill, Ann-Marie (1 November 2006). "The Manhattan project—a part of physics history".Physics Education.41 (6):493–501.Bibcode:2006PhyEd..41..493M.doi:10.1088/0031-9120/41/6/001.ISSN 0031-9120.S2CID 120294023.
  8. ^abBenioff, Paul (1980). "The computer as a physical system: A microscopic quantum mechanical Hamiltonian model of computers as represented by Turing machines".Journal of Statistical Physics.22 (5):563–591.Bibcode:1980JSP....22..563B.doi:10.1007/bf01011339.S2CID 122949592.
  9. ^Buluta, Iulia; Nori, Franco (2 October 2009). "Quantum Simulators".Science.326 (5949):108–111.Bibcode:2009Sci...326..108B.doi:10.1126/science.1177838.ISSN 0036-8075.PMID 19797653.S2CID 17187000.
  10. ^Manin, Yu. I. (1980).Vychislimoe i nevychislimoe [Computable and Noncomputable] (in Russian). Soviet Radio. pp. 13–15. Archived fromthe original on 10 May 2013. Retrieved4 March 2013.
  11. ^Feynman, Richard (June 1982)."Simulating Physics with Computers"(PDF).International Journal of Theoretical Physics.21 (6/7):467–488.Bibcode:1982IJTP...21..467F.doi:10.1007/BF02650179.S2CID 124545445. Archived fromthe original(PDF) on 8 January 2019. Retrieved28 February 2019.
  12. ^Nielsen & Chuang 2010, p. 214.
  13. ^abBennett, C. H.; Brassard, G. (1984). "Quantum cryptography: Public key distribution and coin tossing".Proceedings of the International Conference on Computers, Systems & Signal Processing, Bangalore, India. Vol. 1. New York: IEEE. pp. 175–179. Reprinted asBennett, C. H.; Brassard, G. (4 December 2014)."Quantum cryptography: Public key distribution and coin tossing".Theoretical Computer Science. Theoretical Aspects of Quantum Cryptography – celebrating 30 years of BB84.560 (1):7–11.arXiv:2003.06557.doi:10.1016/j.tcs.2014.05.025.
  14. ^Brassard, G. (2005). "Brief history of quantum cryptography: A personal perspective".IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005. Awaji Island, Japan: IEEE. pp. 19–23.arXiv:quant-ph/0604072.doi:10.1109/ITWTPI.2005.1543949.ISBN 978-0-7803-9491-9.S2CID 16118245.
  15. ^Deutsch, D. (8 July 1985). "Quantum theory, the Church–Turing principle and the universal quantum computer".Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences.400 (1818):97–117.Bibcode:1985RSPSA.400...97D.doi:10.1098/rspa.1985.0070.ISSN 0080-4630.S2CID 1438116.
  16. ^Bernstein, Ethan; Vazirani, Umesh (1993)."Quantum complexity theory".Proceedings of the twenty-fifth annual ACM symposium on Theory of computing – STOC '93. San Diego, California, United States: ACM Press. pp. 11–20.doi:10.1145/167088.167097.ISBN 978-0-89791-591-5.S2CID 676378.
  17. ^Simon, D. R. (1994). "On the power of quantum computation".Proceedings 35th Annual Symposium on Foundations of Computer Science. Santa Fe, New Mexico, USA: IEEE Comput. Soc. Press. pp. 116–123.doi:10.1109/SFCS.1994.365701.ISBN 978-0-8186-6580-6.S2CID 7457814.
  18. ^Nielsen & Chuang 2010, p. 30-32.
  19. ^Shor 1994.
  20. ^Grover, Lov K. (1996).A fast quantum mechanical algorithm for database search. ACM symposium on Theory of computing.Philadelphia: ACM Press. pp. 212–219.arXiv:quant-ph/9605043.doi:10.1145/237814.237866.ISBN 978-0-89791-785-8.
  21. ^abNielsen & Chuang 2010, p. 7.
  22. ^abLloyd, Seth (23 August 1996). "Universal Quantum Simulators".Science.273 (5278):1073–1078.Bibcode:1996Sci...273.1073L.doi:10.1126/science.273.5278.1073.ISSN 0036-8075.PMID 8688088.S2CID 43496899.
  23. ^Cao, Yudong; Romero, Jonathan; Olson, Jonathan P.; Degroote, Matthias; Johnson, Peter D.; et al. (9 October 2019). "Quantum Chemistry in the Age of Quantum Computing".Chemical Reviews.119 (19):10856–10915.arXiv:1812.09976.doi:10.1021/acs.chemrev.8b00803.ISSN 0009-2665.PMID 31469277.S2CID 119417908.
  24. ^abGrumbling & Horowitz 2019, pp. 164–169.
  25. ^Chuang, Isaac L.; Gershenfeld, Neil; Kubinec, Markdoi (April 1998). "Experimental Implementation of Fast Quantum Searching".Physical Review Letters.80 (15).American Physical Society:3408–3411.Bibcode:1998PhRvL..80.3408C.doi:10.1103/PhysRevLett.80.3408.
  26. ^Holton, William Coffeen."quantum computer".Encyclopedia Britannica.Encyclopædia Britannica. Retrieved4 December 2021.
  27. ^Gibney, Elizabeth (23 October 2019)."Hello quantum world! Google publishes landmark quantum supremacy claim".Nature.574 (7779):461–462.Bibcode:2019Natur.574..461G.doi:10.1038/d41586-019-03213-z.PMID 31645740.
  28. ^abLay summary:Martinis, John; Boixo, Sergio (23 October 2019)."Quantum Supremacy Using a Programmable Superconducting Processor".Nature.574 (7779).Google AI:505–510.arXiv:1910.11333.Bibcode:2019Natur.574..505A.doi:10.1038/s41586-019-1666-5.PMID 31645734.S2CID 204836822. Retrieved27 April 2022.
     • Journal article:Arute, Frank; Arya, Kunal; Babbush, Ryan; Bacon, Dave; Bardin, Joseph C.; et al. (23 October 2019). "Quantum supremacy using a programmable superconducting processor".Nature.574 (7779):505–510.arXiv:1910.11333.Bibcode:2019Natur.574..505A.doi:10.1038/s41586-019-1666-5.PMID 31645734.S2CID 204836822.
  29. ^Aaronson, Scott (30 October 2019)."Opinion | Why Google's Quantum Supremacy Milestone Matters".The New York Times.ISSN 0362-4331. Retrieved25 September 2021.
  30. ^Pan, Feng; Zhang, Pan (4 March 2021). "Simulating the Sycamore quantum supremacy circuits".arXiv:2103.03074 [quant-ph].
  31. ^Sample, Ian (23 October 2019)."Google claims it has achieved 'quantum supremacy' – but IBM disagrees".The Guardian.ISSN 0261-3077. Retrieved1 August 2025.
  32. ^Bennett, Charlie (31 July 2020).Information Is Quantum: How Physics Helped Explain the Nature of Information and What Can Be Done With It (Videotape). Event occurs at 1:08:22 – via YouTube.
  33. ^Nielsen & Chuang 2010, p. 13.
  34. ^abMermin 2007, p. 17.
  35. ^abMermin 2007, p. 18.
  36. ^Aaronson 2013, p. 110.
  37. ^Nielsen & Chuang 2010, p. 30–32.
  38. ^Mermin 2007, pp. 38–39.
  39. ^Kurgalin, Sergei; Borzunov, Sergei (2021).Concise guide to quantum computing: algorithms, exercises, and implementations. Texts in computer science. Cham: Springer.ISBN 978-3-030-65054-4.
  40. ^Das, A.; Chakrabarti, B. K. (2008). "Quantum Annealing and Analog Quantum Computation".Rev. Mod. Phys.80 (3):1061–1081.arXiv:0801.2193.Bibcode:2008RvMP...80.1061D.CiteSeerX 10.1.1.563.9990.doi:10.1103/RevModPhys.80.1061.S2CID 14255125.
  41. ^Nayak, Chetan; Simon, Steven; Stern, Ady; Das Sarma, Sankar (2008). "Nonabelian Anyons and Quantum Computation".Reviews of Modern Physics.80 (3):1083–1159.arXiv:0707.1889.Bibcode:2008RvMP...80.1083N.doi:10.1103/RevModPhys.80.1083.S2CID 119628297.
  42. ^Chi-Chih Yao, A. (1993). "Quantum circuit complexity".Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science. pp. 352–361.doi:10.1109/SFCS.1993.366852.ISBN 0-8186-4370-6.S2CID 195866146.
  43. ^Raussendorf, Robert; Browne, Daniel E.; Briegel, Hans J. (25 August 2003). "Measurement-based quantum computation on cluster states".Physical Review A.68 (2) 022312.arXiv:quant-ph/0301052.Bibcode:2003PhRvA..68b2312R.doi:10.1103/PhysRevA.68.022312.S2CID 6197709.
  44. ^Aharonov, Dorit; van Dam, Wim; Kempe, Julia; Landau, Zeph; Lloyd, Seth; Regev, Oded (1 January 2008). "Adiabatic Quantum Computation Is Equivalent to Standard Quantum Computation".SIAM Review.50 (4):755–787.arXiv:quant-ph/0405098.Bibcode:2008SIAMR..50..755A.doi:10.1137/080734479.ISSN 0036-1445.S2CID 1503123.
  45. ^Freedman, Michael H.; Larsen, Michael; Wang, Zhenghan (1 June 2002). "A Modular Functor Which is Universal for Quantum Computation".Communications in Mathematical Physics.227 (3):605–622.arXiv:quant-ph/0001108.Bibcode:2002CMaPh.227..605F.doi:10.1007/s002200200645.ISSN 0010-3616.S2CID 8990600.
  46. ^Nielsen & Chuang 2010, p. 481.
  47. ^abcdePreskill, John (6 August 2018)."Quantum Computing in the NISQ era and beyond".Quantum.2 79.arXiv:1801.00862.Bibcode:2018Quant...2...79P.doi:10.22331/q-2018-08-06-79.S2CID 44098998.
  48. ^Bluvstein, Dolev; Evered, Simon J.; Geim, Alexandra A.; Li, Sophie H.; Zhou, Hengyun; Manovitz, Tom; Ebadi, Sepehr; Cain, Madelyn; Kalinowski, Marcin; Hangleiter, Dominik; Ataides, J. Pablo Bonilla; Maskara, Nishad; Cong, Iris; Gao, Xun; Rodriguez, Pedro Sales (6 December 2023)."Logical quantum processor based on reconfigurable atom arrays".Nature.626 (7997):58–65.arXiv:2312.03982.doi:10.1038/s41586-023-06927-3.ISSN 1476-4687.PMC 10830422.PMID 38056497.S2CID 266052773.
  49. ^"DARPA-Funded Research Leads to Quantum Computing Breakthrough".darpa.mil. 6 December 2023. Retrieved5 January 2024.
  50. ^Choudhury, Rizwan (30 December 2023)."Top 7 innovation stories of 2023 – Interesting Engineering".interestingengineering.com. Retrieved6 January 2024.
  51. ^abGisin, Nicolas; Ribordy, Grégoire; Tittel, Wolfgang; Zbinden, Hugo (8 March 2002)."Quantum cryptography".Reviews of Modern Physics.74 (1):145–195.arXiv:quant-ph/0101098.Bibcode:2002RvMP...74..145G.doi:10.1103/RevModPhys.74.145.ISSN 0034-6861.
  52. ^abPirandola, S.; Andersen, U. L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; Pereira, J.; Razavi, M.; Shamsul Shaari, J.; Tomamichel, M.; Usenko, V. C.; Vallone, G.; Villoresi, P.; Wallden, P. (2020). "Advances in quantum cryptography".Advances in Optics and Photonics.12 (4): 1012.arXiv:1906.01645.Bibcode:2020AdOP...12.1012P.doi:10.1364/AOP.361502.
  53. ^Xu, Feihu; Ma, Xiongfeng; Zhang, Qiang; Lo, Hoi-Kwong; Pan, Jian-Wei (26 May 2020). "Secure quantum key distribution with realistic devices".Reviews of Modern Physics.92 (2): 025002-3.arXiv:1903.09051.Bibcode:2020RvMP...92b5002X.doi:10.1103/RevModPhys.92.025002.S2CID 210942877.
  54. ^Xu, Guobin; Mao, Jianzhou; Sakk, Eric; Wang, Shuangbao Paul (22 March 2023). "An Overview of Quantum-Safe Approaches: Quantum Key Distribution and Post-Quantum Cryptography".2023 57th Annual Conference on Information Sciences and Systems (CISS).IEEE. p. 3.doi:10.1109/CISS56502.2023.10089619.ISBN 978-1-6654-5181-9.
  55. ^Kozlowski, Wojciech; Wehner, Stephanie (25 September 2019). "Towards Large-Scale Quantum Networks".Proceedings of the Sixth Annual ACM International Conference on Nanoscale Computing and Communication. ACM. pp. 1–7.arXiv:1909.08396.doi:10.1145/3345312.3345497.ISBN 978-1-4503-6897-1.
  56. ^Guo, Xueshi; Breum, Casper R.; Borregaard, Johannes; Izumi, Shuro; Larsen, Mikkel V.; Gehring, Tobias; Christandl, Matthias; Neergaard-Nielsen, Jonas S.; Andersen, Ulrik L. (23 December 2019). "Distributed quantum sensing in a continuous-variable entangled network".Nature Physics.16 (3):281–284.arXiv:1905.09408.doi:10.1038/s41567-019-0743-x.ISSN 1745-2473.S2CID 256703226.
  57. ^abcJordan, Stephen (14 October 2022) [22 April 2011]."Quantum Algorithm Zoo".Archived from the original on 29 April 2018.
  58. ^Aaronson, Scott; Arkhipov, Alex (6 June 2011). "The computational complexity of linear optics".Proceedings of the forty-third annual ACM symposium on Theory of computing.San Jose, California:Association for Computing Machinery. pp. 333–342.arXiv:1011.3245.doi:10.1145/1993636.1993682.ISBN 978-1-4503-0691-1.
  59. ^abNielsen & Chuang 2010, p. 42.
  60. ^Preskill 2018.
  61. ^Norton, Quinn (15 February 2007)."The Father of Quantum Computing".Wired.
  62. ^Ambainis, Andris (Spring 2014)."What Can We Do with a Quantum Computer?". Institute for Advanced Study.
  63. ^Chang, Kenneth (14 June 2023)."Quantum Computing Advance Begins New Era, IBM Says – A quantum computer came up with better answers to a physics problem than a conventional supercomputer".The New York Times.Archived from the original on 14 June 2023. Retrieved15 June 2023.
  64. ^Kim, Youngseok; et al. (14 June 2023)."Evidence for the utility of quantum computing before fault tolerance".Nature.618 (7965):500–505.Bibcode:2023Natur.618..500K.doi:10.1038/s41586-023-06096-3.PMC 10266970.PMID 37316724.
  65. ^Morello, Andrea (21 November 2018).Lunch & Learn: Quantum Computing.Sibos TV. Archived from the original on 15 February 2021. Retrieved4 February 2021 – via YouTube.{{cite AV media}}: CS1 maint: bot: original URL status unknown (link)
  66. ^Ruane, Jonathan; McAfee, Andrew; Oliver, William D. (1 January 2022)."Quantum Computing for Business Leaders".Harvard Business Review.ISSN 0017-8012. Retrieved12 April 2023.
  67. ^Budde, Florian; Volz, Daniel (12 July 2019)."Quantum computing and the chemical industry | McKinsey".www.mckinsey.com. McKinsey and Company. Retrieved12 April 2023.[dead link]
  68. ^Bourzac, Katherine (30 October 2017)."Chemistry is quantum computing's killer app".cen.acs.org. American Chemical Society. Retrieved12 April 2023.
  69. ^Lenstra, Arjen K. (2000)."Integer Factoring"(PDF).Designs, Codes and Cryptography.19 (2/3):101–128.doi:10.1023/A:1008397921377.S2CID 9816153. Archived fromthe original(PDF) on 10 April 2015.
  70. ^Nielsen & Chuang 2010, p. 216.
  71. ^abBernstein, Daniel J. (2009). "Introduction to post-quantum cryptography".Post-Quantum Cryptography. Berlin, Heidelberg: Springer. pp. 1–14.doi:10.1007/978-3-540-88702-7_1.ISBN 978-3-540-88701-0.S2CID 61401925.
  72. ^See alsopqcrypto.org, a bibliography maintained by Daniel J. Bernstein andTanja Lange on cryptography not known to be broken by quantum computing.
  73. ^McEliece, R. J. (January 1978)."A Public-Key Cryptosystem Based On Algebraic Coding Theory"(PDF).DSNPR.44:114–116.Bibcode:1978DSNPR..44..114M.
  74. ^Kobayashi, H.; Gall, F. L. (2006)."Dihedral Hidden Subgroup Problem: A Survey".Information and Media Technologies.1 (1):178–185.doi:10.2197/ipsjdc.1.470.
  75. ^Bennett, Charles H.; Bernstein, Ethan; Brassard, Gilles; Vazirani, Umesh (October 1997). "Strengths and Weaknesses of Quantum Computing".SIAM Journal on Computing.26 (5):1510–1523.arXiv:quant-ph/9701001.Bibcode:1997quant.ph..1001B.doi:10.1137/s0097539796300933.S2CID 13403194.
  76. ^Brassard, Gilles; Høyer, Peter; Tapp, Alain (2016). "Quantum Algorithm for the Collision Problem". In Kao, Ming-Yang (ed.).Encyclopedia of Algorithms. New York, New York: Springer. pp. 1662–1664.arXiv:quant-ph/9705002.doi:10.1007/978-1-4939-2864-4_304.ISBN 978-1-4939-2864-4.S2CID 3116149.
  77. ^Farhi, Edward; Goldstone, Jeffrey; Gutmann, Sam (23 December 2008)."A Quantum Algorithm for the Hamiltonian NAND Tree".Theory of Computing.4 (1):169–190.doi:10.4086/toc.2008.v004a008.ISSN 1557-2862.S2CID 8258191.
  78. ^Williams, Colin P. (2011).Explorations in Quantum Computing.Springer. pp. 242–244.ISBN 978-1-84628-887-6.
  79. ^Grover, Lov (29 May 1996). "A fast quantum mechanical algorithm for database search".arXiv:quant-ph/9605043.
  80. ^Ambainis, Ambainis (June 2004). "Quantum search algorithms".ACM SIGACT News.35 (2):22–35.arXiv:quant-ph/0504012.Bibcode:2005quant.ph..4012A.doi:10.1145/992287.992296.S2CID 11326499.
  81. ^Rich, Steven; Gellman, Barton (1 February 2014)."NSA seeks to build quantum computer that could crack most types of encryption".The Washington Post.
  82. ^Lucas, Andrew (2014)."Ising formulations of many NP problems".Frontiers in Physics.2: 5.arXiv:1302.5843.Bibcode:2014FrP.....2....5L.doi:10.3389/fphy.2014.00005.
  83. ^Outeiral, Carlos; Strahm, Martin; Morris, Garrett; Benjamin, Simon; Deane, Charlotte; Shi, Jiye (2021)."The prospects of quantum computing in computational molecular biology".WIREs Computational Molecular Science.11 e1481.arXiv:2005.12792.doi:10.1002/wcms.1481.S2CID 218889377.
  84. ^Biamonte, Jacob; Wittek, Peter; Pancotti, Nicola; Rebentrost, Patrick; Wiebe, Nathan; Lloyd, Seth (September 2017). "Quantum machine learning".Nature.549 (7671):195–202.arXiv:1611.09347.Bibcode:2017Natur.549..195B.doi:10.1038/nature23474.ISSN 0028-0836.PMID 28905917.S2CID 64536201.
  85. ^Harrow, Aram; Hassidim, Avinatan; Lloyd, Seth (2009). "Quantum algorithm for solving linear systems of equations".Physical Review Letters.103 (15) 150502.arXiv:0811.3171.Bibcode:2009PhRvL.103o0502H.doi:10.1103/PhysRevLett.103.150502.PMID 19905613.S2CID 5187993.
  86. ^Benedetti, Marcello; Realpe-Gómez, John; Biswas, Rupak; Perdomo-Ortiz, Alejandro (9 August 2016)."Estimation of effective temperatures in quantum annealers for sampling applications: A case study with possible applications in deep learning".Physical Review A.94 (2) 022308.arXiv:1510.07611.Bibcode:2016PhRvA..94b2308B.doi:10.1103/PhysRevA.94.022308.
  87. ^Ajagekar, Akshay; You, Fengqi (5 December 2020). "Quantum computing assisted deep learning for fault detection and diagnosis in industrial process systems".Computers & Chemical Engineering.143 107119.arXiv:2003.00264.doi:10.1016/j.compchemeng.2020.107119.ISSN 0098-1354.S2CID 211678230.
  88. ^Ajagekar, Akshay; You, Fengqi (1 December 2021)."Quantum computing based hybrid deep learning for fault diagnosis in electrical power systems".Applied Energy.303 117628.Bibcode:2021ApEn..30317628A.doi:10.1016/j.apenergy.2021.117628.ISSN 0306-2619.
  89. ^Gao, Xun; Anschuetz, Eric R.; Wang, Sheng-Tao; Cirac, J. Ignacio; Lukin, Mikhail D. (2022). "Enhancing Generative Models via Quantum Correlations".Physical Review X.12 (2) 021037.arXiv:2101.08354.Bibcode:2022PhRvX..12b1037G.doi:10.1103/PhysRevX.12.021037.S2CID 231662294.
  90. ^Li, Junde; Topaloglu, Rasit; Ghosh, Swaroop (9 January 2021). "Quantum Generative Models for Small Molecule Drug Discovery".IEEE Transactions on Quantum Engineering.2:1–8.arXiv:2101.03438.Bibcode:2021ITQE....2E4804L.doi:10.1109/TQE.2021.3104804.
  91. ^abcBrooks, Michael (24 May 2023)."Quantum computers: what are they good for?".Nature.617 (7962):S1 –S3.Bibcode:2023Natur.617S...1B.doi:10.1038/d41586-023-01692-9.PMID 37225885.S2CID 258847001.
  92. ^abcdTorsten Hoefler; Thomas Häner; Matthias Troyer (May 2023)."Disentangling Hype from Practicality: On Realistically Achieving Quantum Advantage". Communications of the ACM.
  93. ^Dyakonov, Mikhail (15 November 2018)."The Case Against Quantum Computing".IEEE Spectrum.
  94. ^DiVincenzo, David P. (13 April 2000). "The Physical Implementation of Quantum Computation".Fortschritte der Physik.48 (9–11):771–783.arXiv:quant-ph/0002077.Bibcode:2000ForPh..48..771D.doi:10.1002/1521-3978(200009)48:9/11<771::AID-PROP771>3.0.CO;2-E.S2CID 15439711.
  95. ^Giles, Martin (17 January 2019)."We'd have more quantum computers if it weren't so hard to find the damn cables". MIT Technology Review. Retrieved17 May 2021.
  96. ^Pauka SJ, Das K, Kalra B, Moini A, Yang Y, Trainer M, Bousquet A, Cantaloube C, Dick N, Gardner GC, Manfra MJ, Reilly DJ (2021)."A cryogenic CMOS chip for generating control signals for multiple qubits".Nature Electronics.4 (4):64–70.arXiv:1912.01299.doi:10.1038/s41928-020-00528-y.S2CID 231715555.
  97. ^DiVincenzo, David P. (1995). "Quantum Computation".Science.270 (5234):255–261.Bibcode:1995Sci...270..255D.CiteSeerX 10.1.1.242.2165.doi:10.1126/science.270.5234.255.S2CID 220110562.
  98. ^Zu, H.; Dai, W.; de Waele, A.T.A.M. (2022). "Development of Dilution refrigerators – A review".Cryogenics.121.doi:10.1016/j.cryogenics.2021.103390.ISSN 0011-2275.S2CID 244005391.
  99. ^Jones, Nicola (19 June 2013)."Computing: The quantum company".Nature.498 (7454):286–288.Bibcode:2013Natur.498..286J.doi:10.1038/498286a.PMID 23783610.
  100. ^Vepsäläinen, Antti P.; Karamlou, Amir H.; Orrell, John L.; Dogra, Akshunna S.; Loer, Ben; et al. (August 2020)."Impact of ionizing radiation on superconducting qubit coherence".Nature.584 (7822):551–556.arXiv:2001.09190.Bibcode:2020Natur.584..551V.doi:10.1038/s41586-020-2619-8.ISSN 1476-4687.PMID 32848227.S2CID 210920566.
  101. ^Amy, Matthew; Matteo, Olivia; Gheorghiu, Vlad; Mosca, Michele; Parent, Alex; Schanck, John (30 November 2016). "Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3".arXiv:1603.09383 [quant-ph].
  102. ^Dyakonov, M. I. (14 October 2006). S. Luryi; Xu, J.; Zaslavsky, A. (eds.). "Is Fault-Tolerant Quantum Computation Really Possible?".Future Trends in Microelectronics. Up the Nano Creek:4–18.arXiv:quant-ph/0610117.Bibcode:2006quant.ph.10117D.
  103. ^Ahsan, Muhammad (2015).Architecture Framework for Trapped-ion Quantum Computer based on Performance Simulation Tool.Bibcode:2015PhDT........56A.OCLC 923881411.
  104. ^Ahsan, Muhammad; Meter, Rodney Van; Kim, Jungsang (28 December 2016)."Designing a Million-Qubit Quantum Computer Using a Resource Performance Simulator".ACM Journal on Emerging Technologies in Computing Systems.12 (4): 39:1–39:25.arXiv:1512.00796.doi:10.1145/2830570.ISSN 1550-4832.S2CID 1258374.
  105. ^Gidney, Craig; Ekerå, Martin (15 April 2021). "How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits".Quantum.5 433.arXiv:1905.09749.Bibcode:2021Quant...5..433G.doi:10.22331/q-2021-04-15-433.ISSN 2521-327X.S2CID 162183806.
  106. ^Ruiz, Diego; Guillaud, Jérémie; Leverrier, Anthony; Mirrahimi, Mazyar; Vuillot, Christophe (26 January 2025)."LDPC-cat codes for low-overhead quantum computing in 2D".Nature Communications.16 (1) 1040.arXiv:2401.09541.Bibcode:2025NatCo..16.1040R.doi:10.1038/s41467-025-56298-8.ISSN 2041-1723.PMC 11762751.PMID 39863608.
  107. ^Freedman, Michael H.;Kitaev, Alexei;Larsen, Michael J.; Wang, Zhenghan (2003). "Topological quantum computation".Bulletin of the American Mathematical Society.40 (1):31–38.arXiv:quant-ph/0101025.doi:10.1090/S0273-0979-02-00964-3.MR 1943131.
  108. ^Monroe, Don (1 October 2008)."Anyons: The breakthrough quantum computing needs?".New Scientist.
  109. ^abCossins, Daniel (28 June 2025). "How to think about...Quasiparticles".New Scientist.266 (3549): 34.doi:10.1016/S0262-4079(25)01046-2.
  110. ^Preskill, John (26 March 2012). "Quantum computing and the entanglement frontier".arXiv:1203.5813 [quant-ph].
  111. ^Boixo, Sergio; Isakov, Sergei V.; Smelyanskiy, Vadim N.; Babbush, Ryan; Ding, Nan; et al. (2018). "Characterizing Quantum Supremacy in Near-Term Devices".Nature Physics.14 (6):595–600.arXiv:1608.00263.Bibcode:2018NatPh..14..595B.doi:10.1038/s41567-018-0124-x.S2CID 4167494.
  112. ^Savage, Neil (5 July 2017)."Quantum Computers Compete for "Supremacy"".Scientific American.
  113. ^Giles, Martin (20 September 2019)."Google researchers have reportedly achieved 'quantum supremacy'".MIT Technology Review. Retrieved15 May 2020.
  114. ^Tavares, Frank (23 October 2019)."Google and NASA Achieve Quantum Supremacy".NASA. Retrieved16 November 2021.
  115. ^Pednault, Edwin; Gunnels, John A.; Nannicini, Giacomo; Horesh, Lior; Wisnieff, Robert (22 October 2019). "Leveraging Secondary Storage to Simulate Deep 54-qubit Sycamore Circuits".arXiv:1910.09534 [quant-ph].
  116. ^Cho, Adrian (23 October 2019)."IBM casts doubt on Google's claims of quantum supremacy".Science.doi:10.1126/science.aaz6080.ISSN 0036-8075.S2CID 211982610.
  117. ^Liu, Yong (Alexander); Liu, Xin (Lucy); Li, Fang (Nancy); Fu, Haohuan; Yang, Yuling; et al. (14 November 2021). "Closing the "quantum supremacy" gap".Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis. SC '21. New York, New York: Association for Computing Machinery. pp. 1–12.arXiv:2110.14502.doi:10.1145/3458817.3487399.ISBN 978-1-4503-8442-1.S2CID 239036985.
  118. ^Bulmer, Jacob F. F.; Bell, Bryn A.; Chadwick, Rachel S.; Jones, Alex E.; Moise, Diana; et al. (28 January 2022)."The boundary for quantum advantage in Gaussian boson sampling".Science Advances.8 (4) eabl9236.arXiv:2108.01622.Bibcode:2022SciA....8.9236B.doi:10.1126/sciadv.abl9236.ISSN 2375-2548.PMC 8791606.PMID 35080972.
  119. ^McCormick, Katie (10 February 2022)."Race Not Over Between Classical and Quantum Computers".Physics.15 19.Bibcode:2022PhyOJ..15...19M.doi:10.1103/Physics.15.19.S2CID 246910085.
  120. ^Pan, Feng; Chen, Keyang; Zhang, Pan (2022). "Solving the Sampling Problem of the Sycamore Quantum Circuits".Physical Review Letters.129 (9) 090502.arXiv:2111.03011.Bibcode:2022PhRvL.129i0502P.doi:10.1103/PhysRevLett.129.090502.PMID 36083655.S2CID 251755796.
  121. ^Cho, Adrian (2 August 2022)."Ordinary computers can beat Google's quantum computer after all".Science.377.doi:10.1126/science.ade2364.
  122. ^"Google's 'quantum supremacy' usurped by researchers using ordinary supercomputer".TechCrunch. 5 August 2022. Retrieved7 August 2022.
  123. ^Ball, Philip (3 December 2020). "Physicists in China challenge Google's 'quantum advantage'".Nature.588 (7838): 380.Bibcode:2020Natur.588..380B.doi:10.1038/d41586-020-03434-7.PMID 33273711.S2CID 227282052.
  124. ^Garisto, Daniel."Light-based Quantum Computer Exceeds Fastest Classical Supercomputers".Scientific American. Retrieved7 December 2020.
  125. ^Conover, Emily (3 December 2020)."The new light-based quantum computer Jiuzhang has achieved quantum supremacy".Science News. Retrieved7 December 2020.
  126. ^Zhong, Han-Sen; Wang, Hui; Deng, Yu-Hao; Chen, Ming-Cheng; Peng, Li-Chao; et al. (3 December 2020). "Quantum computational advantage using photons".Science.370 (6523):1460–1463.arXiv:2012.01625.Bibcode:2020Sci...370.1460Z.doi:10.1126/science.abe8770.ISSN 0036-8075.PMID 33273064.S2CID 227254333.
  127. ^Roberson, Tara M. (21 May 2020)."Can Hype Be a Force for Good?".Public Understanding of Science.29 (5):544–552.doi:10.1177/0963662520923109.ISSN 0963-6625.PMID 32438851.S2CID 218831653.
  128. ^Cavaliere, Fabio; Mattsson, John; Smeets, Ben (September 2020)."The security implications of quantum cryptography and quantum computing".Network Security.2020 (9):9–15.doi:10.1016/S1353-4858(20)30105-7.ISSN 1353-4858.S2CID 222349414.
  129. ^Liu, Yong; Chen, Yaojian; Guo, Chu; Song, Jiawei; Shi, Xinmin; Gan, Lin; Wu, Wenzhao; Wu, Wei; Fu, Haohuan; Liu, Xin; Chen, Dexun; Zhao, Zhifeng; Yang, Guangwen; Gao, Jiangang (16 January 2024)."Verifying Quantum Advantage Experiments with Multiple Amplitude Tensor Network Contraction".Physical Review Letters.132 (3) 030601.arXiv:2212.04749.Bibcode:2024PhRvL.132c0601L.doi:10.1103/PhysRevLett.132.030601.ISSN 0031-9007.PMID 38307065.
  130. ^Monroe, Don (December 2022)."Quantum Computers and the Universe". Communications of the ACM.
  131. ^Swayne, Matt (20 June 2023)."PsiQuantum Sees 700x Reduction in Computational Resource Requirements to Break Elliptic Curve Cryptography With a Fault Tolerant Quantum Computer".The Quanrum Insider.
  132. ^Unruh, Bill (1995). "Maintaining coherence in Quantum Computers".Physical Review A.51 (2):992–997.arXiv:hep-th/9406058.Bibcode:1995PhRvA..51..992U.doi:10.1103/PhysRevA.51.992.PMID 9911677.S2CID 13980886.
  133. ^Davies, Paul (6 March 2007). "The implications of a holographic universe for quantum information science and the nature of physical law".arXiv:quant-ph/0703041.
  134. ^Regan, K. W. (23 April 2016)."Quantum Supremacy and Complexity".Gödel's Lost Letter and P=NP.
  135. ^Kalai, Gil (May 2016)."The Quantum Computer Puzzle"(PDF).Notices of the AMS.63 (5):508–516.
  136. ^Rinott, Yosef; Shoham, Tomer; Kalai, Gil (13 July 2021). "Statistical Aspects of the Quantum Supremacy Demonstration".arXiv:2008.05177 [quant-ph].
  137. ^Dyakonov, Mikhail (15 November 2018)."The Case Against Quantum Computing".IEEE Spectrum. Retrieved3 December 2019.
  138. ^Russell, John (10 January 2019)."IBM Quantum Update: Q System One Launch, New Collaborators, and QC Center Plans".HPCwire. Retrieved9 January 2023.
  139. ^Tacchino, Francesco; Chiesa, Alessandro; Carretta, Stefano; Gerace, Dario (19 December 2019)."Quantum Computers as Universal Quantum Simulators: State-of-the-Art and Perspectives".Advanced Quantum Technologies.3 (3) 1900052.arXiv:1907.03505.doi:10.1002/qute.201900052.ISSN 2511-9044.S2CID 195833616.
  140. ^Grumbling & Horowitz 2019, p. 127.
  141. ^Grumbling & Horowitz 2019, p. 114.
  142. ^Nayak, Chetan; Simon, Steven H.; Stern, Ady; Freedman, Michael; Das Sarma, Sankar (12 September 2008)."Non-Abelian anyons and topological quantum computation".Reviews of Modern Physics.80 (3):1083–1159.arXiv:0707.1889.Bibcode:2008RvMP...80.1083N.doi:10.1103/RevModPhys.80.1083.
  143. ^Grumbling & Horowitz 2019, p. 119.
  144. ^Grumbling & Horowitz 2019, p. 126.
  145. ^Leong, Kelvin; Sung, Anna (November 2022)."What Business Managers Should Know About Quantum Computing?"(PDF).Journal of Interdisciplinary Sciences. Retrieved13 August 2023.
  146. ^"10 Quantum Computing Applications & Examples to Know".Built In. Retrieved21 June 2025.
  147. ^Nielsen & Chuang 2010, p. 29.
  148. ^Nielsen & Chuang 2010, p. 126.
  149. ^Nielsen & Chuang 2010, p. 41.
  150. ^Nielsen & Chuang 2010, p. 201.
  151. ^Bernstein, Ethan; Vazirani, Umesh (1997)."Quantum Complexity Theory".SIAM Journal on Computing.26 (5):1411–1473.CiteSeerX 10.1.1.144.7852.doi:10.1137/S0097539796300921.

Sources

[edit]

Further reading

[edit]

Textbooks

[edit]

Academic papers

[edit]

External links

[edit]
Lectures
Models
Architecture
Instruction set
architectures
Types
Instruction
sets
Execution
Instruction pipelining
Hazards
Out-of-order
Speculative
Parallelism
Level
Multithreading
Flynn's taxonomy
Processor
performance
Types
By application
Systems
on chip
Hardware
accelerators
Word size
Core count
Components
Functional
units
Logic
Registers
Control unit
Datapath
Circuitry
Power
management
Related
General
Theorems
Quantum
communication
Quantum cryptography
Quantum algorithms
Quantum
complexity theory
Quantum
processor benchmarks
Quantum
computing models
Quantum
error correction
Physical
implementations
Quantum optics
Ultracold atoms
Spin-based
Superconducting
Quantum
programming
Fields
Quantum
Other
Background
Fundamentals
Formulations
Equations
Interpretations
Experiments
Science
Technology
Extensions
Related
National
Other
Retrieved from "https://en.wikipedia.org/w/index.php?title=Quantum_computing&oldid=1321582485"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp