Quantum Computing Principles and Applications
Quantum Computing Principles and Applications
2020
Seong-Moo Yoo
University of Alabama in Huntsville, [email protected]
Part of the Communication Technology and New Media Commons, Computer and Systems
Architecture Commons, Information Security Commons, Management Information Systems Commons,
Science and Technology Studies Commons, Technology and Innovation Commons, and the Theory and
Algorithms Commons
Recommended Citation
Kanamori, Yoshito and Yoo, Seong-Moo (2020) "Quantum Computing: Principles and Applications,"
Journal of International Technology and Information Management: Vol. 29 : Iss. 2 , Article 3.
Available at: https://scholarworks.lib.csusb.edu/jitim/vol29/iss2/3
This Article is brought to you for free and open access by CSUSB ScholarWorks. It has been accepted for inclusion
in Journal of International Technology and Information Management by an authorized editor of CSUSB
ScholarWorks. For more information, please contact [email protected].
Journal of International Technology and Information Management Volume 29, Number 2 2020
Yoshito Kanamori
(University of Alaska Anchorage)
Seong-Moo Yoo
(University of Alabama in Huntsville)
ABSTRACT
The development of quantum computers over the past few years is one of the most
significant advancements in the history of quantum computing. D-Wave quantum
computer has been available for more than eight years. IBM has made its quantum
computer accessible via its cloud service. Also, Microsoft, Google, Intel, and NASA
have been heavily investing in the development of quantum computers and their
applications. The quantum computer seems to be no longer just for physicists and
computer scientists, but also for information system researchers. This paper
introduces the basic concepts of quantum computing and describes well-known
quantum applications for non-physicists. The current status of the developments in
quantum computing is also presented.
INTRODUCTION
supremacy,” where we could perform tasks with controlled quantum systems going
beyond what could be achieved with ordinary digital computers (Preskill, 2012).
However, IBM claimed that Google’s quantum computer did not reach quantum
supremacy because the same task could be done with an ideal algorithm on a
classical computer in 2.5 days (Pednault, Gunnels, Maslov, & Gambetta, 2019).
Intel, Rigetti, and IonQ also have been developing a quantum computer in their
laboratories (Gomes, 2018). Microsoft has released the quantum development kit
(QDK) and the quantum programming toolkit Q# for Visual Studio (“Quantum
Development Kit | Microsoft,” 2019), which allows users to simulate quantum
circuits on a classical computer. Microsoft also started Azure Quantum, which
provides Internet cloud access to their quantum computer simulators and the real
quantum hardware supplied by Honeywell, IonQ, and QCI. Similarly, Amazon
started a quantum computing service via AWS, called Amazon Braket, where users
can remotely use the quantum computer hardware of the partners: D-wave, IonQ,
and Rigetti.
Although everyone in business may not need a quantum computer for their tasks,
many business applications can be improved by quantum computing, as mentioned
above ((Bo) Ewald, 2019; Chalmers Brown, 2018; Cusumano, 2018; “D-Wave:
Quantum Computing Applications,” 2019; Robert Hackett, 2019). It seems that the
time has come for researchers who are not necessarily physicists to design new
business applications for quantum computers and communications.
This paper introduces the basic concepts of quantum computing, particularly for a
general-purpose gate-based quantum computer, and describes the well-researched
applications of quantum computing for non-experts. The next section provides the
fundamentals of quantum computing. Section 3 describes three applications:
Glover’s quantum search algorithm, Shor’s quantum integer factoring algorithm,
and Quantum key distribution protocol. In section 4, a brief survey of the current
status and research challenges in quantum computing is presented.
design such a quantum circuit, quantum mechanics is used to describe the states
since those microscopic objects do not follow the rules of classical physics. The
state of a qubit can be written as a vector |𝜓⟩.
|𝜓⟩ = 𝛼|0⟩ + 𝛽|1⟩, {𝛼, 𝛽 ∈ ℂ} (1)
where 𝛼 and 𝛽 are complex numbers ℂ , called probability amplitude, and
satisfy |𝛼|2 + |β|2 = 1. |𝛼|2 is the probability of getting the state |0⟩ as the result
of the measurement on the qubit |𝜓⟩ while |𝛽⟩2 is the probability of getting |1⟩.
“| ⟩” is a standard notation for specifying states in quantum mechanics, called
column vector or ket vector in the Dirac notation. The orthonormal basis |0⟩ and
|1⟩ can be written as
|0⟩ = [1,0]T , |1⟩ = [0,1]T (2 )
Quantum states combine through the tensor product. For instance, two qubits state
can be written as |𝜓1 ⟩ ⊗ |𝜓2 ⟩, where “⊗” indicates a tensor product, or more
compactly |𝜓1 ⟩|𝜓2 ⟩ or |𝜓1 𝜓2 ⟩. For example,
𝑇 𝑇
|𝜓1 ⟩ ⊗ |𝜓2 ⟩ = [𝜓1,0 , 𝜓1,1 ] ⊗ [𝜓2,0 , 𝜓2,1 ]
= [𝜓1,0 𝜓2,0 , 𝜓1,0 𝜓2,1 , 𝜓1,1 𝜓2,0, 𝜓1,1 𝜓2,1]𝑇 (3)
where |𝜓𝑖 ⟩ = 𝛼|0⟩ + 𝛽|1⟩ = 𝛼[1,0]𝑇 + 𝛽[0, 1]𝑇 = [𝛼, 𝛽]𝑇 = [𝜓𝑖,0 , 𝜓𝑖,1 ]𝑇 .
Superposition State
Figure 2: The half of photons are found at DV, and the rest are at DH
Since the probability of finding the horizontally polarized photon |𝜓⟩ = |𝐻⟩ or
vertically polarized photon |𝜓⟩ = |𝑉⟩ at the PBS is ½, the probability amplitudes
𝛼 and 𝛽 should be 1/√2. Thus, the state of a photon just before PBS can be written
as
1 1
|𝑉⟩ |𝜓⟩ = |𝐻⟩ +(4)
√2 √2
Since |H⟩ is used to represent a classical bit “0” and |V⟩ is used for “1”, the
expression (4) is written as
1 1
|1⟩ |𝜓⟩ = |0⟩ + (5 )
√2 √2
When a photon is prepared in this state, the digital information encoded in the
photon is “0” or “1”. We can interpret the equation (5) as meaning the states
“0” and “1” exist at the same time. This unique state is called a superposition state.
When two qubits are both in the superposition state (5), the state can be written as
1 1 1 1
|𝜓1 ⟩|𝜓2 ⟩ = { |0⟩ + |1⟩} { |1⟩} |0⟩ +
√2 √2 √2 √2
1 1
= {[1,1]𝑇 ⊗ [1,1]𝑇 } = [1,1,1,1]𝑇
2 2
1
= {[1,0,0,0]𝑇 + [0,1,0,0]𝑇 + [0,0,1,0]𝑇 + [0,0,0,1]𝑇 }
2
1 1 1 1
= |0⟩|0⟩ + |0⟩|1⟩ + |1⟩|0⟩ + |1⟩|1⟩ (6)
2 2 2 2
This two-qubit state represents four classical binary states (00, 01, 10, 11) at the
same time. When a quantum computer prepares n qubits in a superposition state as
its input for a quantum circuit (Figure 3), 2n possible inputs can be processed
simultaneously. This quantum parallelism is one of the significant advantages of
quantum computers.
find the original state from the measured result similar to classical one-way function
(e.g., hash.)
The basic operations to manipulate an input state for a quantum circuit is called
quantum gates. Each gate operation can be mathematically represented with a
matrix. For instance, the Filter-45° in Figure 2 converts from one of the orthogonal
1 1
base states (i.e., |0⟩) to a superposition state (i.e., |0⟩ + |1⟩.) This operation
√2 √2
can be expressed with the following matrix 𝑈𝐻 , called Hadamard gate (Nielsen &
Chuang, 2010).
1 1 1 1 1 1
𝑈𝐻 |0⟩ = [ ][ ] = |0⟩ + |1⟩ (7)
√2 1 −1 0 √2 √2
Another example of the quantum gate is the controlled-NOT (cNOT) gate (Figure
4), which behaves like a classical XOR gate, as shown in Table 1.
Table 1: A truth table for the quantum XOR gate with two inputs and two
outputs
𝜓𝑖𝑛1 𝜓𝑖𝑛2 𝜓𝑜𝑢𝑡1 𝜓𝑜𝑢𝑡2
0 0 0 0
0 1 0 1
1 0 1 1
1 1 1 0
This quantum gate negates the state of the second qubit |𝜓𝑖𝑛2 ⟩ only when the first
qubit |𝜓𝑖𝑛1 ⟩ is |1⟩ while |𝜓𝑖𝑛1 ⟩ itself is unchanged by the gate (i.e., |𝜓𝑖𝑛1 ⟩
=|𝜓𝑜𝑢𝑡1 ⟩). This operation can be written as:
Table 2: A truth table for the classical NAND gate with two inputs
𝐼𝑁1 𝐼𝑁2 𝑂𝑢𝑡
0 0 1
0 1 1
1 0 1
1 1 0
If the NAND gate is built based on the truth table above and the inputs are two
qubits |0⟩|1⟩ = [1, 0]T ⊗ [0, 1]T = [0,1,0,0]T , the operation can be written as
following (Yanofsky & Mannucci, 2008),
0 0 0 1
𝑁𝐴𝑁𝐷: [ ] (9)
1 1 1 0
0 0 0 1
𝑈𝑁𝐴𝑁𝐷 |0⟩|1⟩ = [ ] [0,1,0,0]𝑇 = [0,1]𝑇 = |1⟩ (10)
1 1 1 0
However, this NAND gate cannot be realized with quantum gates because two-bit
information before the gate becomes one bit after the gate in (10). Quantum
mechanics does not allow the system (e.g., quantum circuit) to lose information
unless the quantum states in the system are measured. Therefore, quantum gates
must have the same number of inputs as the outputs and must be reversible with no
information loss by the gates. In contrast, classical gates except NOT gate are one-
way functions and lose some of the input information at the exit of the gate. This
requirement is another significant difference from classical computing.
A quantum NAND gate can be made of a Toffoli gate, also known as the controlled-
controlled-NOT (ccNOT) gate (Figure 5, Table 4). The revised truth table for the
quantum NAND gate is given in Table 3.
When the Toffoli gate with 𝜓𝑖𝑛3 = 1, the ccNOT gate works as a NAND gate.
𝜓𝑜𝑢𝑡3 = ¬(𝜓𝑖𝑛1 ∧ 𝜓𝑖𝑛2 ) (11)
Thus, we can build any digital logic with the quantum gates theoretically.
When 𝜓𝑖𝑛2 is zero in Table 1, the cNOT gate keeps the 𝜓𝑜𝑢𝑡2 to be zero for 𝜓𝑖𝑛1 =
0 and changes 𝜓𝑜𝑢𝑡2 to be one for 𝜓𝑖𝑛1 = 1. Thus, it seems that cNOT gate copies
the classical bit information in 𝜓𝑖𝑛1 to 𝜓𝑜𝑢𝑡2 when 𝜓𝑖𝑛2 = 0.
|𝜓𝑜𝑢𝑡1 ⟩|𝜓𝑜𝑢𝑡2 ⟩ = 𝑐𝑁𝑂𝑇|0⟩|0⟩ = |0⟩|0⟩
(12)
|𝜓𝑜𝑢𝑡1 ⟩|𝜓𝑜𝑢𝑡2 ⟩ = 𝑐𝑁𝑂𝑇|1⟩|0⟩ = |1⟩|1⟩
If cNOT gate can copy an arbitrary state in a qubit to the other qubit, it should be
valid for a superposition state. When the input 𝜓𝑖𝑛1 is 𝛼|0⟩ + 𝛽|1⟩, the output
𝜓𝑜𝑢𝑡2 should be 𝛼|0⟩ + 𝛽|1⟩.
However, from (12), the output from the cNOT gate for the superposition state turns
out to be 𝛼|0⟩|0⟩ + 𝛽|1⟩|1⟩.
|𝜓𝑜𝑢𝑡1 ⟩|𝜓𝑜𝑢𝑡2 ⟩ = 𝑐𝑁𝑂𝑇(𝛼|0⟩ + 𝛽|1⟩)|0⟩
= 𝑐𝑁𝑂𝑇(𝛼|0⟩|0⟩ + 𝛽|1⟩|0⟩)
= 𝛼|0⟩|0⟩ + 𝛽|1⟩|1⟩ (14)
Obviously, the equation (13) is not equal to (14). In quantum mechanics, the
replication of an arbitrary quantum state is not possible. This restriction is known
as the no-cloning theorem (Nielsen & Chuang, 2010; Wootters & Zurek, 1982).
Even if cNOT gate seems to copy the classical bit information in |𝜓𝑖𝑛1 ⟩ to |𝜓𝑜𝑢𝑡2 ⟩,
this is not a classical meaning of “copy”. The results in (12) are the special cases
for 𝛼 = 1 or 𝛽 = 1 (|α|2 + |𝛽|2 = 1).
Also, the resulting states in (14) is quite impressive. The equation says, when we
observe zero in 𝜓𝑜𝑢𝑡1 by measurement, we know 𝜓𝑜𝑢𝑡2 is also zero with no
additional measurement. Similarly, when we find one in 𝜓𝑜𝑢𝑡1 , we know 𝜓𝑜𝑢𝑡2 is
also one without measuring 𝜓𝑜𝑢𝑡2 . In other words, the quantum state in 𝜓𝑜𝑢𝑡2
depends on the value observed in |𝜓𝑜𝑢𝑡1 ⟩. Thus, the outputs 𝜓𝑜𝑢𝑡1 and 𝜓𝑜𝑢𝑡2
cannot be described independently. This bizarre states, where the individual states
of qubits are intimately related to one another, is called the entangled state. There
is no way to express the entangled states as separable states like the expression
|𝜓𝑜𝑢𝑡1 ⟩ = (𝛼|0⟩ + 𝛽|1⟩) and |𝜓𝑜𝑢𝑡2 ⟩ = (𝛼|0⟩ + 𝛽|1⟩) in (13). The use of
entangled states is another essential ingredient of quantum computing.
APPLICATIONS
Quantum Computations
For example, four classical values {0, 1, 2, and 3} can be stored in two qubits
simultaneously, which can be written as the state (6). For example, a circuit can be
designed to compute 𝑓(𝑥) = 𝑥 + 5 . It seems that four computations can be
performed with only one step by placing the qubits in the superposition states in the
circuit. However, the output state is a superposition state of four possible output
values {5, 6, 7, and 8}. The result of the measurement on the output qubits is one
of the four possible outputs. In short, when a classical logic is implemented as a
quantum circuit, the output qubits are the superposition of 2𝑛 outputs for 2𝑛
inputs.
The measurement result is one of 2𝑛 possible output states with the probability
1/2𝑛 . Therefore, a quantum circuit needs to be designed to manipulate the
probability amplitudes of the qubits so that an expected result can be found by the
measurement with the probability higher than 1/2𝑛 . In this section, two well-
known quantum algorithms that significantly outperform classical algorithms are
introduced.
Grover’s algorithm
This database search algorithm is designed to find an item in an unordered list. For
example, it can be used for speeding up brute force key search on symmetric key
encryption such as AES (Bernstein, 2010). It is known that this algorithm requires
𝑂(√𝑁) operations to search an unsorted array of size N, which requires 𝑂(𝑁)
operations for classical algorithms (Grover, 1996).
The idea of Grover’s algorithm is the following. When the number 𝑥𝑎 that satisfies
𝑓(𝑥𝑎 ) = 1 needs to be found in a large unsorted database, the qubits are set to be
in a superposition state of all possible ID numbers {𝑥 = 0,1,2, … , 𝑁 − 1} as the
initial state. To simplify the expression, the decimal notation is used for n-qubit.
For example,|1⟩|0⟩|0⟩ is written as |4⟩. The initial state (Figure 6) can be written
as
𝑁−1
Next, a quantum circuit is used to flip the phase of the state where x is equal to 𝑥𝑎
(Figure 7).
N−1
0 𝑥 ≠ 𝑥𝑎
where 𝑓(𝑥) = [ .
1 𝑥 = 𝑥𝑎
𝑁−1 𝑁−1
|𝜓 ′′ ⟩ = ∑ {𝜌𝑎𝑣𝑒 − (𝜌𝑥 − 𝜌𝑎𝑣𝑒 )}|𝑥⟩ = ∑ (2𝜌𝑎𝑣𝑒 − 𝜌𝑥 )|𝑥⟩ (17)
𝑥=0 𝑥=0
1
where 𝜌𝑎𝑣𝑒 = ∑𝑁−1
𝑥=0 𝜌𝑥 . 𝑁
This operation is called inversion about the average. As shown in the example with
N = 8 (n = 3), the probability amplitude of the target state |3⟩ goes up to 5/2√8
from 1/√8 after the operation, while the amplitudes for the rest of the states is
2
reduced to 1/2√8 . This result still satisfies ∑𝑁−1 2
𝑥=0 𝜌𝑥 = (5/2√8) + 7 × ( 1/
2
2√8) = 1. Thus, the probability of finding the target state |3⟩ by measurement is
increased from 12.5% to 78.1%. If the operation is repeated one more time, 𝜌𝑎𝑣𝑒 =
2
1/8√8 and 2𝜌𝑎𝑣𝑒 − 𝜌𝑥3 = 11/4√8 . Thus, the probability (2𝜌𝑎𝑣𝑒 − 𝜌𝑥3 ) is
increased to 94.5%.
By performing inversion about the average multiple times, the probability of
yielding the targeted ID 𝑥𝑎 by measurement can be boosted from the initial
probability of 1/𝑁. Since finding an item from 𝑁 items takes 𝑁/2 operations on
average, when 𝑁 is small, the quantum algorithm does not substantially exceed the
performance of classical algorithms.
𝑂(√𝑁) < 𝑂(𝑁/2) (18)
However, when 𝑁 is large, the advantage is quite distinct. For example, when a
database has 106 items (e.g., for biometric authentications), Grover’s algorithm
only needs 1000 steps to search an item while a classical algorithm needs 50,000
steps (Morsch, 2008).
Shor’s Algorithm
In 1994, Peter Shor showed that a quantum computer could be used to factor a large
integer in polynomial time (Shor, 1994). His algorithm attracted a great deal of
attention from security agencies since, if a quantum computer is developed, it can
break the RSA encryption algorithms (Van Meter & Horsman, 2013), which is the
most widely used public-key encryption algorithm.
Shor’s algorithm consists of classical parts and quantum parts. This section explains
how quantum computation is utilized with the classical computation in Shor’s
algorithm after the RSA algorithm is briefly introduced.
A receiver of a secret message, Alice, chooses two large prime numbers (𝑝, 𝑞) and
computes 𝑁 = 𝑝𝑞. Also, she randomly chooses a number 𝑒, which is coprime to
(𝑝 − 1)(𝑞 − 1) . (i.e., gcd{𝑒, (𝑝 − 1)(𝑞 − 1)} ≡ 1 ) and finds the number 𝑑 ,
which satisfies
𝑒𝑑 ≡ 1 𝑚𝑜𝑑{(𝑝 − 1)(𝑞 − 1)} (19)
She makes those two numbers (𝑁, 𝑒) available as her public key and keeps the
number 𝑑 as her private key. To encrypt a message 𝑀, a sender, Bob, computes
𝐶 = 𝑀𝑒 𝑚𝑜𝑑 𝑁. For decryption, Alice computes 𝑀 = 𝐶 𝑑 𝑚𝑜𝑑 𝑁.
In order to break the security of the RSA, the eavesdropper, Eve, needs to find the
private key 𝑑. Since 𝑁 and 𝑒 are in public, all she has to do is to find 𝑝 and 𝑞 from
𝑁 to compute (19). However, there is no classical algorithm that can factor a large
integer in polynomial time. The security of the RSA encryption relies on the
difficulty of factoring a large integer (e.g., 200 digits)(Schneier, 1996).
Therefore, when 𝑚 = 4,8,12, …, the function 𝑓7,15 (𝑚) is equal to 1. The least
positive exponent is the length of the period generated by 𝑓𝑎,𝑁 (𝑚). In this example,
the period r is 4.
The condition (21) can be revised by subtracting one from both sides of the
equivalence.
𝑎𝑟 − 1 ≡ 0 𝑚𝑜𝑑 𝑁 (23)
When the period r is an even number,
(𝑎𝑟/2 − 1)(𝑎𝑟/2 + 1) ≡ 0 𝑚𝑜𝑑 𝑁 (24)
Thus, when the integer N is a divisor of (𝑎𝑟/2 − 1)(𝑎𝑟/2 + 1), the remainder is
zero. There is a good chance that one of two factors (𝑎𝑟/2 − 1) or (𝑎𝑟/2 + 1) is a
factor for 𝑁. By using the classical Euclidean algorithm, a factor for 𝑁 can be found
with 𝑔𝑐𝑑 {𝑎𝑟/2 − 1, 𝑁} and 𝑔𝑐𝑑 {𝑎𝑟/2 + 1, 𝑁} except for the case where 𝑎𝑟/2 =
±1 𝑚𝑜𝑑 𝑁. In the example, when 𝑚 = 4, the factors 3 and 5 for 𝑁 = 15 can be
found calculating 𝑔𝑐𝑑{72 − 1, 15} = 𝑔𝑐𝑑{48, 15} = 3 and 𝑔𝑐𝑑{72 + 1, 15} =
𝑔𝑐𝑑{50, 15} = 5.
When the integer N is large (e.g., 200 digits), finding the period of 𝑓𝑎,𝑁 (𝑚) is very
time-consuming with a classical computer (if possible.) Thus, a quantum
superposition state is used to find the period by computing 𝑓𝑎,𝑁 (𝑚) for 𝑚 = 0 to,
at least, 𝑚 = 𝑁 2 .
In Grover’s algorithm, only one set of qubits in the superposition state is
manipulated to increase the probability of finding the targeted index by
measurement on the qubits. In Shor’s algorithm, two sets of qubits are used: |𝜓1 ⟩
for the input m and |𝜓2 ⟩ for the output of 𝑓𝑎,𝑁 (𝑚) in (20). The number of qubits
for |𝜓2 ⟩ is 𝑘 = log 𝑁 since 𝑓𝑎,𝑁 (𝑚) is always less than 𝑁 while the number of
qubits for |𝜓1 ⟩ is, at least, log 𝑁 2 = 2𝑘 (Yanofsky & Mannucci, 2008). Similar to
(15), the initial state of the qubits for m is
𝑁 2 −1
|𝜓1 ⟩ = ∑ 𝜌𝑚 |𝑚⟩ = 𝜌0 |0⟩ + 𝜌1 |1⟩ + 𝜌2 |2⟩ + ⋯ + 𝜌𝑁2−1 |𝑁 2 − 1⟩ (25)
𝑚=0
where the initial values of 𝜌𝑚 are 1/√22k . The initial state of the qubits for
𝑓𝑎,𝑁 (𝑚) is
|𝜓2 ⟩ = |000 … 0⟩ = |0⟩ (26)
|𝜓1 ⟩ and |𝜓2 ⟩ are placed into a quantum circuit which computes 𝑓𝑎,𝑁 (𝑚) as shown
in Figure 9.
Obviously, |𝜓1 ⟩ and |𝜓2 ′⟩ cannot be expressed as a separable state like their initial
states.
When the second set of qubits |𝜓2 ′⟩ is measured, the superposition state of |𝜓2 ′⟩ is
corrupted and one of four states (i.e., 𝜓2 = 1,7,4,13) is observed on |𝜓2 ′⟩. But, the
first set of qubits |𝜓1 ⟩ is still in a superposition state. When 4 is yielded by the
measurement on |𝜓2 ⟩, the state (28) will be
1
|𝜓1 ⟩|𝜓2 ′⟩ = (|2⟩|4⟩ + |6⟩|4⟩ + |10⟩|4⟩ + ⋯ + |254⟩|4⟩)
√64
1
= (|2⟩ + |6⟩ + |10⟩ + ⋯ + |254⟩)|4⟩ (29)
√64
Thus, the period 𝑟 of 𝑓𝑎,𝑁 (𝑚) can be observed as the distance Δ𝑡 between
successive possible states of |𝜓1 ⟩ in Figure 10.
A simple measurement on |𝜓1 ⟩ is not useful to find 𝑟 since the measurement result
is 𝑚 = 𝑙𝛥𝑡 + 𝑡0 (where 𝑡0 is unknown and 𝑙 = 0,1,2,3, …). The offset 𝑡0 needs to
be eliminated before the measurement. A quantum circuit for Discrete Fourier
Transform for qubits, called quantum Fourier Transform (QFT), is designed to
eliminate the offset in |𝜓1 ⟩ and to convert 𝛥𝑡 to 22𝑘 /𝑟 . After the QFT operation,
the measurement on the state |𝜓1 ′⟩ yields a number 𝑐 = 𝑗[22𝑘 /𝑟] (𝑗 = 1,2,3, …).
Since 22𝑘 is known, the result value 𝑐 can be divided by 22𝑘 .
𝑐 𝑗
2𝑘
= (30)
2 𝑟
By using the continued fraction expansion, the closest rational to 𝑗/𝑟 can be found
(Rieffel & Polak, 2000; Williams & Clearwater, 1998). By repeating this quantum
operation several times, the period 𝑟 can be found.
Quantum cryptography (Gisin, Ribordy, Tittel, & Zbinden, 2002) is currently one
of the most practical applications of quantum information science. The most well-
known quantum cryptography is the quantum key distribution (QKD) protocol
(Bennett & Brassard, 1984), which has been implemented and commercially
available for more than a decade. The OKD with the one-time pad can provide
theoretically unbreakable end-to-end security by utilizing quantum mechanical
properties in a classical cryptographic protocol. Here “unbreakable” means that the
security of the cryptography does not rely on the complexity of the algorithm but a
physical property that prevents decryptions without the key. The one-time pad is
classical cryptography known to be a perfect encryption scheme (Schneier, 1996).
The protocol is simple as follows. A sender, called Alice, generates n-bit random
number K as a one-time shared key and delivers it to a receiver, called Bob, before
the communication.
𝐾 = {𝑘𝑖 = 0,1 | 𝑖 = 1,2,3, … 𝑛}
When Alice wants to deliver an n-bit secret message M to Bob, Alice performs
exclusive OR operations for each bit in M and K, respectively. Then, she sends the
resulting bit sequence C to Bob and discards the K.
𝑀 = {𝑚𝑖 = 0,1 | 𝑖 = 1,2,3, … , 𝑛}
𝐶 = {𝑐𝑖 = 𝑚𝑖 ⨁𝑘𝑖 | 𝑖 = 1,2,3, … , 𝑛}
Bob decrypts the ciphertext C by performing exclusive OR operations with the
shared key K and discards the K.
This is an entirely secure protocol. The random bit sequence added to the message
produces an utterly random bit sequence. Since the key is used only once, there is
no possible attack except making a guess of n-bit random bit sequence for an n-bit
message. The problem with this method is that there is no perfectly secure way to
deliver the key (i.e., K) to Bob prior to the communication. If classical cryptography
such as RSA or AES was used, the strength of the one-time pad protocol relies on
the strength of the classical cryptography, which is not a perfect encryption scheme.
QKD plays a significant role in delivering the keys for the one-time pad. The first
QKD was proposed by C.H. Bennett and G. Brassard in 1984, called BB84
protocol. BB84 uses photons to deliver a random sequence of bits, which will be
used as a shared key between Alice and Bob after the completion of the protocol.
We introduce the implementation of BB84 with the photon polarization in the
following discussion to be consistent with the experiments introduced in section 2.
Alice’s filter can be set to four different angles: 0°, 45°, 90°, and 135° while Bob
can change the orientation of the base angle (PBS) to 0° or 45° degrees (Figure 12).
In the cases that Alice and Bob chose the same base by chance, Alice and Bob can
share the same classical bit information. However, when Alice and Bob used
different bases, the bit information is discarded because Bob’s measurement result
is not reliable.
For example, when Alice chooses D base and 𝑟𝑖 = 0, the polarization is rotated by
45 degrees. Thus, by using a rotation operator, Jones matrix for a rotator (Saleh &
Teich, 1991),
𝑐𝑜𝑠𝜃 −𝑠𝑖𝑛𝜃
𝑈𝑅(𝜃) = [ ] (31)
𝑠𝑖𝑛𝜃 𝑐𝑜𝑠𝜃
the state of the photon can be written as
1 1
|𝜓𝑖 ⟩ = 𝑈𝑅(45°) |0⟩ =
|1⟩. |0⟩ +
(32)
√2 √2
Similar to the example in Figure 2, if Bob chooses the H-V base, Bob obtains |0⟩
1
or |1⟩ with the probability 2 . When there is a 45-degree difference between the
rotation angle of Alice’s photon and the orientation of Bob’s base, Bob’s
1
measurement result is 0 or 1 with the probability of 2.
The same rule is applied to the measurements by an eavesdropper, Eve. If Eve has
the same equipment as Alice and Bob, she can intercept the photons from Alice and
retransmit the same state of a photon to Bob. However, since Eve does not know
which base she should use for the measurement, 25% of the measurement results
are wrong. If Eve encodes new photons based on her measurement results and
transmits them to Bob, the 25 % of Bob’s measurement results are also incorrect.
Thus, the existence of an eavesdropper significantly increases the error rate. Alice
and Bob can detect Eve’s attack by checking some bits in K to calculate the error
rate. Although Eve may try to make copies of Alice’s photon to avoid increasing
errors, the no-cloning theorem forbids the replication of an arbitrary unknown
quantum state.
CHALLENGES
Quantum Computer
can correct some errors, but the error correction mechanism requires a lot of extra
qubits to be managed. Also, the operations with the qubits need to be performed at
cryogenic temperatures. This requires refrigeration technologies, which are scalable
to quantum circuits with a few hundred qubits.
D-Wave’s quantum computer uses superconducting flux qubit generated inside the
circulating current in a loop acting as a quantum mechanical spin (Lupaşcu et al.,
2007) and currently has about 2000 qubits (Gibney, 2017), but is not a general-
purpose computer like the gate-based quantum computer. It uses quantum
annealing (Kadowaki & Nishimori, 1998) to solve only specific types of problems,
such as optimization problems. It has not been reported that D-wave’s quantum
computer can perform Shor’s algorithm or Grover’s algorithm with large numbers.
QKD schemes have been implemented in free space (Hughes, Nordholt, Derkacs,
& Peterson, 2002) and optical fiber (Gordon, Fernandez, Townsend, & Buller,
2004).
A QKD system with a phase encoding in a standard telecommunication optical fiber
network was implemented (Gobby, Yuan, & Shields, 2004). In 2004, the first real
bank transfer utilizing a QKD system took place (Poppe et al., 2004). In 2012, the
QKD system over 260 km in standard telecom fiber was experimentally realized
(Wang et al., 2012). In 2017, the free-space QKD system over 53 km in daylight
was demonstrated (Liao et al., 2017). Also, several companies have been offering
QKD commercial products for more than a decade (“ID Quantique,” n.d.; “MagiQ
Technologies.,” n.d.). However, they have not been disseminated widely through
the community of information security practitioners.
One of the significant issues with a QKD for the practitioners is that there is no
commercially available quantum repeater to extend the distance and to fan out
across a network. A photon is, by its nature, prone to interfere with its environment.
It is not a critical problem for a short distance QKD scheme because the data
transmitted over a quantum channel are random bits that can be discarded when
they have errors. For long-distance, the amplification of the signal (i.e., a photon)
is necessary due to the high SNR (signal to noise ratio). However, it is very
challenging (if possible) to develop a quantum repeater (Meter & Touch, 2013)
since replication of a transmitted unknown photon is not possible due to the no-
cloning theorem. Although quantum repeaters have been proposed (Briegel, Dür,
Cirac, & Zoller, 1998; Jiang et al., 2009; Meter & Touch, 2013; Zwerger, Dür, &
Briegel, 2012; Zwerger, Pirker, Dunjko, Briegel, & Dür, 2017), current
commercially available QKD systems are generally designed to be used with point-
to-point dedicated connections between networks (Aleksic et al., 2015). Thus, the
application of the QKD is still limited to metropolitan area networks (W. Chen et
al., 2009; Elliott et al., 2005; Sasaki et al., 2011; Stucki et al., 2011).
In 2018, the distribution of entangled photon pairs via a satellite was demonstrated.
It enabled sharing the entangled photon pairs between two locations separated by
more than 1200 km (Yin et al., 2017). The satellite system may be used for
entanglement-based QKD (Ekert, 1991) and as a repeater station for QKD
networks.
Another issue about QKD schemes is their security. The QKD schemes do not
generally guarantee that the origin of the message is genuine. If an eavesdropper is
capable of compromising both quantum and classical channels, the man-in-the-
middle attack against QKD schemes is possible (Pacher et al., 2016; Svozil, 2005).
Therefore, authentication functionalities need to be incorporated into QKD
schemes, especially for multipoint connections.
CONCLUSION
In this paper, the fundamental principles used in the quantum computations and
three well-known quantum applications were introduced. Quantum computing is a
promising technology, which changes our lives in many ways. Quantum computer
improves database search significantly and solves many optimization problems
used in business such as data analytics (e.g., big data (Philip Chen & Zhang, 2014)),
logistics (e.g., optimizing routes of 10,000 taxies (Cusumano, 2018)), and medical
research (Parsons, 2011) while quantum computing can be a cybersecurity threat
until we have post-quantum cryptography (cryptographic algorithms that are secure
against the attacks by quantum computers (L. Chen et al., 2016; Mailloux, Lewis,
Riggs, & Grimaila, 2016).)
After Shor’s and Grover’s algorithms were found, researchers have not found many
useful quantum algorithms that substantially outperform classical algorithms. Shor
states in his paper, “Any quantum algorithm offering a speed-up over classical
computation must use interference; this phenomenon is unknown in classical
computer science, and most theoretical computer scientists are not used to
reasoning about it” (Shor & W., 2003). As researches in quantum computing get
more attention from government, industry, and academia, more useful quantum
algorithms are expected to be found.
Although it may take ten years to build a quantum computer that significantly
outperforms classical computers, every business needs to think of new quantum
applications to prepare for the day. As fortune 500 companies have kept investing
in quantum computing, there must be chances to find a high grade of gold ore in
this research and business fields.
REFERENCE
Morsch, O. (2008). Quantum bits and quantum secrets : how quantum physics is
revolutionizing codes and computers. Wiley-VCH.
National Aeronautics and Space Administration. (2015). Quantum Computer
Project Accelerating Advanced Computing for NASA Missions. Retrieved
January 27, 2020, from
https://nas.nasa.gov/assets/pdf/Quantum_Computer_Fact_Sheet_Fall2015.pd
f
Nielsen, M. A., & Chuang, I. L. (2010). Quantum Computation and Quantum
Information (10th Anniv). Cambridge University Press.
O’Brien, J. L., Pryde, G. J., White, A. G., Ralph, T. C., & Branning, D. (2003).
Demonstration of an all-optical quantum controlled-NOT gate. Nature,
426(6964), 264–267. https://doi.org/10.1038/nature02054
Pacher, C., Abidin, A., Lorünser, T., Peev, M., Ursin, R., Zeilinger, A., &
Larsson, J.-Å. (2016). Attacks on quantum key distribution protocols that
employ non-ITS authentication. Quantum Information Processing, 15(1),
327–362. https://doi.org/10.1007/s11128-015-1160-4
Parsons, D. F. (2011). Possible medical and biomedical uses of quantum
computing. NeuroQuantology, 9(3), 596–600.
https://doi.org/10.14704/nq.2011.9.3.412
Pednault, E., Gunnels, J., Maslov, D., & Gambetta, J. (2019). On “Quantum
Supremacy.” Retrieved January 25, 2020, from
https://www.ibm.com/blogs/research/2019/10/on-quantum-supremacy/
Philip Chen, C. L., & Zhang, C.-Y. (2014). Data-intensive applications,
challenges, techniques and technologies: A survey on Big Data. Information
Sciences, 275, 314–347. https://doi.org/10.1016/J.INS.2014.01.015
Plantenberg, J. H., de Groot, P. C., Harmans, C. J. P. M., & Mooij, J. E. (2007).
Demonstration of controlled-NOT quantum gates on a pair of
superconducting quantum bits. Nature, 447(7146), 836–839.
https://doi.org/10.1038/nature05896
Poppe, A., Fedrizzi, A., Ursin, R., Böhm, H. R., Lorünser, T., Maurhardt, O., …
Zeilinger, A. (2004). Practical quantum key distribution with polarization
entangled photons. Optics Express, 12(16), 3865.
https://doi.org/10.1364/OPEX.12.003865
Preskill, J. (2012). Quantum computing and the entanglement frontier. Retrieved
from http://arxiv.org/abs/1203.5813
Quantum Development Kit | Microsoft. (2019). Retrieved June 27, 2019, from
https://www.microsoft.com/en-us/quantum/development-kit
Rieffel, E., & Polak, W. (2000). An introduction to quantum computing for non-
physicists. ACM Computing Surveys, 32(3), 300–335. Retrieved from
http://doi.acm.org/10.1145/367701.367709
Robert Hackett. (2019). Big Businesses Racing to Use Quantum Computing to
883–887. https://doi.org/10.1038/414883a
Wang, S., Chen, W., Guo, J.-F., Yin, Z.-Q., Li, H.-W., Zhou, Z., … Han, Z.-F.
(2012). 2 GHz clock quantum key distribution over 260 km of standard
telecom fiber. Optics Letters, 37(6), 1008.
https://doi.org/10.1364/OL.37.001008
Wheatley, M. (n.d.). SiliconANGLE: D-Wave debuts new 5,000-qubit quantum
computer | D-Wave Systems. Retrieved January 26, 2020, from
https://www.dwavesys.com/media-coverage/siliconangle-d-wave-debuts-
new-5000-qubit-quantum-computer
Williams, C. P., & Clearwater, S. H. (1998). Explorations in quantum computing.
New York, NY: Springer-Verlag.
Wootters, W. K., & Zurek, W. H. (1982). A single quantum cannot be cloned.
Nature, 299(5886), 802–803. https://doi.org/10.1038/299802a0
Yanofsky, N. S., & Mannucci, M. A. (2008). Quantum computing for computer
scientists. New York, NY: Cambridge University Press.
Yin, J., Cao, Y., Li, Y.-H., Liao, S.-K., Zhang, L., Ren, J.-G., … Pan, J.-W.
(2017). Satellite-based entanglement distribution over 1200 kilometers.
Science (New York, N.Y.), 356(6343), 1140–1144.
https://doi.org/10.1126/science.aan3211
Zwerger, M., Dür, W., & Briegel, H. J. (2012). Measurement-based quantum
repeaters. Physical Review A, 85(6), 062326.
https://doi.org/10.1103/PhysRevA.85.062326
Zwerger, M., Pirker, A., Dunjko, V., Briegel, H. J., & Dür, W. (2017). Long-
range big quantum-data transmission. Physical Review Letters, 120(3),
030503. https://doi.org/10.1103/PhysRevLett.120.030503