Practical Applications of Quantum Computing
Practical Applications of Quantum Computing
Practical Applications of
Quantum Computing
Esam El-Araby, Manu Chaudhary, Ishraq Ul Islam,
David Levy, Dylan Kneidel, Mingyoung Jeng, Alvir Nobel and
Vinayak Jha
Abstract
1. Introduction
interactions with the environment [4] and is, therefore, an especially critical challenge
for current NISQ devices. Moreover, quantum algorithms that require deep quantum
circuits take a longer time to run and exacerbate the impact of decoherence [5]. These
limitations make practical implementations of complex quantum algorithms quite
challenging.
This chapter sets out to present and review existing research efforts that demon-
strate some practical applications of quantum computing. On a high level, quantum
computations generally consist of three stages: (1) data input/encoding, (2) data
processing, and (3) data output/decoding. This chapter has thus been organized
roughly in that same flow. More specifically, Section 2 describes a technique for
encoding data into the quantum domain from the classical domain, termed as
classical-to-quantum (C2Q) data encoding, while Section 3 describes algorithm
development and optimization for quantum systems, and Section 4 discusses some
techniques for quantum-to-classical (Q2C) data decoding. In addition, Section 5
explores research in quantum communications that combines chaotic communica-
tions with quantum key distribution (QKD) for enhancing both security and commu-
nication range. Finally, Section 6 concludes the chapter with closing remarks.
The state jψi of a single qubit can be visualized using a Bloch sphere of global scale
r ¼ 1, global phase t, azimuth angle ϕ, and elevation angle θ. To initialize jψi from the
ground state j0i, the ZYZ or Pauli decomposition can be used to apply a rotation of
2
Practical Applications of Quantum Computing
DOI: http://dx.doi.org/10.5772/intechopen.1003033
Figure 1.
Pauli (ZYZ) decomposition for single-qubit state synthesis [10].
angle t around the z-axis, followed by another rotation of angle θ around the y-axis,
and finally a rotation of angle ϕ around the z-axis, see Figure 1 and Eq. (2). Con-
versely, the parameters t, θ, and ϕ in Eq. (2) can be derived from the state coefficients
α and β using Eq. (3),
jψi ¼ C0 j0i þ C1 j1i ¼ αj0i þ βj1i
t
¼ Rz ðϕÞ Ry ðθÞ rei2 j0i (2)
¼ Rz ðϕÞ Ry ðθÞ Rz ðtÞ r j0i
∣β∣
t ¼ ∠β þ ∠α, θ ¼ 2 tan 1 , ϕ ¼ ∠β ∠α, (3)
∣α∣
qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi qffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
where ∣α∣ ¼ Re 2 ðαÞ þ Im2 ðαÞ, ∠α ¼ cos 1 Re∣α∣ðαÞ , ∣β∣ ¼ Re 2 ðβÞ þ Im2 ðβÞ and
∠β ¼ cos 1 Re∣β∣ðβÞ .
To synthesize an arbitrary multi-qubit state from the ground state jψ 0 i ¼ j0i ⊗ n ,
an operation U C2Q
j , see Figure 2, can be used to iteratively synthesize the entangled
state of the j-th qubit in the output state, where 0 ≤ j < n. U C2Q
j is composed of kj ¼
2ðn1jÞ conditional Δi,j rotation operations, where 0 ≤ i < kj . Thus, U C2Q
j can be
represented by a block-diagonal matrix, where each diagonal block is a 2 2 trans-
formation matrix Δi,j , see Eq. (4). Block-diagonal matrices such as U C2Q j can be
implemented using a uniformly-controlled circuit or a quantum multiplexer [6]. In
this approach, the target qubit, i.e., the least-significant qubit, is subjected to various
gates or operations for every possible combination of the control qubits. In Figure 2,
the ‘square box’ notation [6] is used for the control bits, and the parameterized
operations on the data qubit are replaced by a single box denoting the operation. The
overall transformation U C2Q from the ground state jψ 0 i ¼ j0i ⊗ n to jψi can be
expressed by Eq. (5), also see Figure 3.
Figure 2.
Multiplexer (conditional-logic) quantum circuit [10].
3
Quantum Computers - From Fundamentals to Technology
Figure 3.
Quantum circuits for unitary C2Q data encoding [10].
U C2Q
j ¼ Δ0,j ⊕Δ1,j ⊕⋯Δi,j ⋯⊕Δðkj 1Þ,j
(4)
¼ diag Δ0,j , Δ1,j , ⋯, Δi,j , ⋯, Δðkj 1Þ,j
!
Y
n1
C2Q C2Q ⊗j
U C2Q ¼ U 0 ðt, θ, ϕÞ U j ðθÞ ⊗ I
j¼1 (5)
¼ U C2Q
0 ðt, θ, ϕÞ U rem ðθÞ
C2Q
4
Practical Applications of Quantum Computing
DOI: http://dx.doi.org/10.5772/intechopen.1003033
8
> C2iþ1
>
> pffiffiffiffiffiffi , Pi,j 6¼ 0, j ¼ 0, 0 ≤ i < 2ðn1Þ
>
> Pi,j
>
< sffiffiffiffiffiffiffiffiffiffiffiffiffiffiffiffi
βi,j ¼ P2iþ1,j1 (8)
>
>
> , Pi,j 6¼ 0, 1 ≤ j < n, 0 ≤ i < 2ðn1jÞ
>
> Pi,j
>
:
0, Pi,j ¼ 0
where 0 ≤ j < n, 0 ≤ i < kj , and kj ¼ 2ðn1jÞ : The derivations of circuit depths and
experimental results can be found in [10].
This section introduces the readers to recent research work on some practical
applications of quantum computing. The techniques presented here are (1) dimension
reduction, (2) pattern recognition, and (3) quantum sorting.
5
Quantum Computers - From Fundamentals to Technology
X
N 1 X
N 1
∣ψi ¼ f ðq ΔtÞ∣qi, where jf ðq ΔtÞj2 ¼ 1 (11)
q¼0 q¼0
1 X N1 X
N1
qj
∣ψiQHT ¼ pffiffiffiffi f ðq ΔtÞΨD ∣ji (12)
N j¼0 q¼0 K
Quantum RoL and RoR gates [16] are specifically designed permutation operations
constructed using SWAP gates. Each gate executes a cyclic rotation, i.e., perfect-
shuffle, of input qubits, through a series of n 1 SWAP gates over n qubits, see
Figure 4.
Figure 4.
Rotate-left (RoL) and rotate-right (RoR) gates [16].
6
Practical Applications of Quantum Computing
DOI: http://dx.doi.org/10.5772/intechopen.1003033
Figure 5.
Circuits for QHT decomposition [17]. (a) Single-level decomposition of d-dimensional QHT. (b) ℓ-level,
d-dimensional packet decomposition.
X
d1
γ ¼ ð1 H gate þ ðni 1ÞSWAP gateÞ
i¼0 (15)
¼ d H gate þ ðn dÞSWAP gate ¼ n gates
Figure 6.
ℓ-level, d-dimensional pyramidal decomposition [17]. (a) Structure of pyramidal decomposition. (b) Interlevel
permutations.
The total gate count, denoted as γ pyr , for the multilevel pyramidal decomposition is
determined using Figure 6 and is expressed by Eq. (21), where n0 denotes the number
of required qubits for the first dimension. However, the pyramidal structure reduces
P dℓðℓ1Þ
the gate count required for the packet decomposition by a factor ℓ1 i¼0 ðd iÞ ¼ 2 ,
see Figure 6a, while requiring additional gates γ pyrperm , for interlevel permutations as
shown in Figure 6b and expressed by Eq. (22).
d ℓ ðℓ 1 Þ
γ pyr ¼ γ pkt þ γ pyrperm , where (21)
2
d ðℓ 1Þ ℓ ðd 1Þ
γ pyrperm ¼ n n0 (22)
2 2
Figure 7a and b show a ð64 64 3Þpixel input image and the corresponding
output image after 1-level of 3D-QHT, respectively. Figure 7c presents the output
8
Practical Applications of Quantum Computing
DOI: http://dx.doi.org/10.5772/intechopen.1003033
Figure 7.
Dimension reduction on ð64 64 3Þ-pixel RGB images using 1-level 3D-QHT [16]. (a) Original RGB images.
(b) Output images from MATLAB simulations. (c) Output images from IBM-Q simulations.
Figure 8.
Pattern recognition using quantum dimension reduction [20]. (a) Overview of methodology for pattern recognition
using dimension reduction [20]. (b) Pattern recognition using quantum dimension reduction on a (512 512)-
pixel image.
9
Quantum Computers - From Fundamentals to Technology
N r quantum basis states. Here, L ¼ ⌊21 log 2 NNr ⌋, N r is pre-determined quantum data
resolution less than N. The N r reduced data is represented with nr qubits, on which a
search to find a number of patterns/basis states N patterns is performed. Thus, the
multilevel 2D-QHT reduces the dimensionality of the data and the multipattern QGS
returns the indices of the searched pattern, see Figure 8b. The use of this technique
yields faster results compared to classical dimension reduction and search methods [20].
Figure 9.
Modified quantum circuit for multi-pattern Grover’s algorithm [23].
10
Practical Applications of Quantum Computing
DOI: http://dx.doi.org/10.5772/intechopen.1003033
positioned at the first N patterns indices in the search list. This is followed by the
application of a diffusion circuit U diffusion , which increases the probabilities of locating
the pattern(s). The second modification incorporates a permutation operation,
referred to as U permute , which utilizes ancilla qubits for encoding and assigning proba-
bility coefficients to the corresponding basis states. This step is critical for successfully
locating the target pattern(s).
The modified quantum circuit for multi-pattern Grover’s algorithm, see Figure 9
has four inputs:
• a collection of n compute qubits that are all initialized to the state ∣ψi ¼ ∣0i,
After applying the H gate, the input qubit state vector ∣ψ in i is expressed as
PN1
∣ψ in i ¼ p1ffiffiffi
N i¼0 ∣ii. After putting the input qubits in superposition, a modified
dynamic oracle operator U oracle and an unmodified diffusion operator U diffusion are
applied m times to amplify the first N patterns states. The optimal number of iterations,
m is determined using Eq. (23) where k ¼ 1,3,5,7, … is an odd number. Since, only the
initial N patterns are amplified, a permutation operation, denoted as U permute is required
to assign higher amplitudes to the target states based on input patterns P. The final
output state is derived by performing these repeated iterations and the complete
process can be represented by a single unitary matrix, denoted as
m
U G ¼ U diffusion U oracle . The probability Psuccess of successfully finding a desired pat-
tern in the final output state ∣ψ out i is expressed in Eq. (24) [24], where N patterns ≤ N.
6 7
6 7
6 7
6 πk 7
m¼6
4 qffiffiffiffiffiffiffiffiffiffiffiffi 7
5 (23)
N patterns
4 sin 1 N
Modified oracle and diffusion circuits: The modified oracle circuit U oracle uses CNOT
gates to dynamically modify the target patterns as seen in Figure 10a and b.
This dynamic search pattern modification extends the algorithm’s capabilities to
search for any pattern using a single quantum circuit. The CNOT gates within each
oracle are efficiently controlled using ancilla qubits by adjusting them to the current
pattern ∣ii, see Figure 10a. For multi-pattern search, cascaded and incremental single-
11
Quantum Computers - From Fundamentals to Technology
Figure 10.
Modified Grover’s oracle for single and multiple solutions/pattern [23]. (a) Single solution/pattern. (b) Multiple
solutions/patterns.
pattern oracle quantum circuits are applied to invert the first N patterns amplitudes as
depicted in Figure 10b. The output of the oracle is provided to the diffusion circuit for
amplification. The U oracle and U diffusion are then iterated over m times to maximize the
target amplitudes.
Quantum state permutation: In the modified design of Grover’s algorithm, the
amplitudes of the first N patterns states are amplified, and an additional permutation step
assigns these amplitudes to the target basis states within the output state ∣ψ out i. For a
detailed study of the permutation circuit, please refer to [23].
Bitonic sequences [27] are sequences of elements which first increase monotonically
in value and then decrease monotonically. A bitonic sequence can be expressed as
x0 ≤ ⋯ ≤ xi ≥ ⋯xn1 where 0 ≤ i < n. Sequences sorted in ascending order or
descending order are also considered bitonic sequences with zero elements on the
descending side and ascending side respectively.
The classical version of the algorithm works by taking in an unsorted input
sequence and recursively creating and merging smaller bitonic sequences into larger
sequences until the whole list is eventually sorted. The bitonic sort algorithm is
modeled as a sorting network [27] which uses comparator circuits that compare two
input elements ðx0 , x1 Þ and produces an output sequence ðmaxðx0 , x1 Þ, minðx0 , x1 ÞÞ or
ðminðx0 , x1 Þ, maxðx0 , x1 ÞÞ based on how the comparator is configured.
A quantum implementation of the comparator [25] takes two qubits, ∣q0 i and ∣q1 i,
and a mode qubit as inputs and if the mode qubit is ∣0i sets ∣q0 i ¼ min q0 , q1 and
12
Practical Applications of Quantum Computing
DOI: http://dx.doi.org/10.5772/intechopen.1003033
∣q1 i ¼ max q0 , q1 . Similarly, if the mode qubit is set to ∣1i, it sets ∣q0 i ¼ max q0 , q1
and ∣q1 i ¼ min q0 , q1 . An implementation of such a comparator circuit is provided in
Figure 11.
The perfect shuffle [28] technique improves the temporal complexity of a bitonic
sort, which helps against the decoherence constraints on a quantum computer. A
perfect shuffle intersperses elements of two equal length sequences, so that each
element in the first group is followed by the corresponding element at the same
position in the second group. The quantum perfect shuffle (QPS) [25] is a quantum
implementation of a perfect shuffle that leverages the fact that a cyclical left shift on
the indexes of a sequence of elements, expressed in their binary form, performs the
equivalent of a perfect shuffle on the elements of that sequence. The quantum perfect
shuffle can be implemented by a series of SWAP gates, identical to the RoL circuit
shown in Figure 4.
Data is encoded into a quantum circuit with n qubits using amplitude encoding
[11] and follows Algorithm 1.1. The algorithm operates in m stages, where
m ¼ log 2 ðnÞ. At each stage t, m t QPS operations are performed, followed by t QPS-
comparison pairs, see Figure 12. A QPS-comparison pair is a QPS operation followed
by a comparison operation, which is the application of a set of comparators between
two adjacent qubits, see Figure 11.
For t ¼ 1, the comparators are applied with their modes following an alternating
min-max (mode 0) and max-min (mode 1) pattern, which can be represented as
½0,1,0,1, ⋯. For each subsequent stage 1 < t < m, the pattern begins as ½0,1,0,1, ⋯ for
the first QPS-comparison pair and is quantum perfect-shuffled before each of the
following QPS-comparison pairs in the same stage. Finally, when t ¼ m, the compar-
ator pattern is ½0,0,0,0, ⋯ and no perfect shuffle of the pattern is necessary. The
Figure 11.
Quantum comparator circuits [25]. (a) Quantum Comparator Circuit, Mode 0. (b) Quantum Comparator
Circuit, Mode 1.
Figure 12.
Quantum circuit for combined bitonic sort with perfect shuffle permutation [25].
13
Quantum Computers - From Fundamentals to Technology
Figure 13.
Example of an 8-qubit quantum bitonic sorter [25].
general structure of the algorithm is provided in Figure 12 and an example circuit for
an 8-qubit bitonic sorter is given in Figure 13.
Figure 14.
Q2C data decoding using conventional and QHT-based methods [17]. (a) Conventional Q2C data decoding. (b)
QHT-based Q2C data decoding.
general, a substantial number of repeated circuit samples are required to enhance the
measurement accuracy and to reduce the impact of statistical noise. Consequently,
this significantly increases the total time required for circuit execution.
To minimize the overhead of repeated circuit sampling, algorithms which
decrease either the number of measured qubits or the number of required shots
can be added to the circuit immediately prior to measurement. One effective
technique for reducing the number of measured qubits is the multilevel-decomposable
QHT [17]. By using this approach, data initially represented by n qubits can be
transformed into a representation using fewer qubits, specifically k ¼ n ðℓ dÞ,
where 0 ≤ k ≤ n, 0 ≤ ℓ ≤ ðn=dÞ represents the number of decomposition levels, and
Figure 15.
ℓ-level, d-dimensional measurement-based decomposition [17]. (a) Single-gate depth with H gates.
(b) Zero-depth circuit.
15
Quantum Computers - From Fundamentals to Technology
Brassard in 1984, is one of the earliest and most widely used QKD protocols. It uses
photons’ polarization properties to transmit the key information, establishing a secure
key between two communicators.
Figure 16.
Chaotic communication system secured by QKD [36].
Figure 17.
The communication scheme’s transmitter and receiver hardware models [36]. (a) Chaotic transmitter model. (b)
Chaotic receiver model.
17
Quantum Computers - From Fundamentals to Technology
Figure 18.
Preshared codebook for encrypting/decrypting data [36].
Figure 19.
Transmission of a ð512 512Þ-pixel image between Alice and Bob at SNR ¼ 0:1dB, with interception attempted
by Eve [36]. (a) Original image transmitted by Alice using parameters σ = 10, ρ = 54, β = 4. (b) Reconstructed
image by Bob using recovered parameters σ = 10, ρ = 54, β = 4 and 0% pixel error. (c) Reconstructed image by Eve
using incorrect parameters σ = 10, ρ = 45.6, β = 14 and 98.4652% pixel error.
central characters are defined as Alice (the sender or source of information), Bob
(intended recipient), and Eve (eavesdropper seeking unauthorized access to trans-
mitted data). The effectiveness of this technique is illustrated by the practical exper-
imental results shown in Figure 19, please refer to [16] for complete results.
Figure 19b shows the grayscale image of size ð512 512Þ pixels transmitted by Alice
and reconstructed by Bob showing 0% error in pixels between the original and
reconstructed image. However, when Eve tries to reconstruct the image without
knowing the choatic parameters quantumly shared by Alice and Bob, it results in
98.46% pixel error, see Figure 19c.
6. Conclusions
chapter presented optimized circuits for QWT to achieve efficient dimension reduc-
tion in multi-dimensional high-resolution data and an innovative approach for pattern
recognition using QWT and Grover’s search. For practical implementations of these
algorithms, methodologies for classical-to-quantum (C2Q) data encoding and
quantum-to-classical (Q2C) data decoding were also presented. This chapter also
presented an efficient quantum sorting technique, which amalgamates perfect-shuffle
and bitonic networks. Finally, in the field of quantum communications, a novel free-
space optical (FSO) communication system that combines chaotic communications
with Quantum Key Distribution (QKD) was discussed focusing on enhancing security
and extending the communication range. This chapter serves as an invitation to
readers to explore further, delve deeper, and engage with the ongoing journey of
quantum computing’s practical impact on various domains.
Acknowledgements
This research used resources of the Oak Ridge Leadership Computing Facility,
which is a DOE Office of Science User Facility supported under Contract DE-
AC05-00OR22725.
Author details
Esam El-Araby*†, Manu Chaudhary†, Ishraq Ul Islam†, David Levy†, Dylan Kneidel†,
Mingyoung Jeng†, Alvir Nobel† and Vinayak Jha†
The University of Kansas, Lawrence, USA
© 2023 The Author(s). Licensee IntechOpen. This chapter is distributed under the terms of
the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0),
which permits unrestricted use, distribution, and reproduction in any medium, provided
the original work is properly cited.
19
Quantum Computers - From Fundamentals to Technology
References
[1] Shor PW. Algorithms for quantum the 27th Conference on Pattern Languages
computation: Discrete logarithms and of Programs (online). 2020. pp. 1-11
factoring. In: Proceedings 35th Annual
Symposium on Foundations of [10] El-Araby E, Mahmud N, Jeng MJ,
Computer Science. New Mexico, USA: MacGillivray A, Manu Chaudhary M,
IEEE; 1994. pp. 124-134 Nobel AI, et al. Towards complete and
scalable emulation of quantum
[2] Bennett CH, DiVincenzo DP. algorithms on high-performance
Quantum information and computation. reconfigurable computers. IEEE
Nature. 2000;404(6775):247-255 Transactions on Computers. 2023;72(8):
2350-2364
[3] Preskill J. Quantum computing in the
nisq era and beyond. Quantum. 2018;2: [11] Williams CP. Explorations in
79 Quantum Computing. Berlin, Germany:
Springer Science & Business Media; 2010
[4] Schlosshauer M. Quantum
decoherence. Physics Reports. 2019;831:
[12] Mahmud N, Haase-Divine B,
1-57
MacGillivray A, El-Araby E. Quantum
dimension reduction for pattern
[5] Zhang C, Chen Y, Jin Y, Ahn W,
recognition in high-resolution spatio-
Zhang Y, Zhang EZ. A depth-aware
spectral data. IEEE Transactions on
swap insertion scheme for the qubit
Computers. 2020;71(1):1-12
mapping problem. arXiv preprint arXiv:
2002.07289. 2020
[13] El-Araby E, El-Ghazawi T, Le
Moigne J, Gaj K. Wavelet spectral
[6] Shende VV, Bullock SS, Markov IL.
dimension reduction of hyperspectral
Synthesis of quantum-logic circuits. imagery on a reconfigurable computer.
IEEE Transactions on Computer-Aided In: Proceedings. 2004 IEEE International
Design of Integrated Circuits and Conference on Field-Programmable
Systems. 2006;25(6):1000-1010 Technology (IEEE Cat. No. 04EX921).
Brisbane, Australia: IEEE; 2004.
[7] Mottonen M, Vartiainen JJ, pp. 399-402
Bergholm V, Salomaa MM.
Transformation of quantum states using [14] Li H-S, Fan P, Xia H-y, Song S, He X.
uniformly controlled rotations. arXiv The multi-level and multi-dimensional
preprint quant-ph/0407010. 2004 quantum wavelet packet transforms.
Scientific Reports. 2018;8(1):1-23
[8] Niemann P, Datta R, Wille R. Logic
synthesis for quantum state generation. [15] Wickmann JMG. A Wavelet
In: 2016 IEEE 46th International Approach to Dimension Reduction and
Symposium on Multiple-Valued Logic Classification of Hyperspectral Data.
(ISMVL). Sapporo, Japan: IEEE; 2016. [Thesis]. Faculty of Mathematics and
pp. 247-252 Natural Sciences, University of Oslo.
2007
[9] Weigold M, Barzen J, Leymann F,
Salm M. Data encoding patterns for [16] Mahmud N, Macgillivray A,
quantum computing. In: Proceedings of Chaudhary M, El-Araby E.
20
Practical Applications of Quantum Computing
DOI: http://dx.doi.org/10.5772/intechopen.1003033
[17] Mingyoung Jeng SM, Islam DL, [24] Boyer M, Brassard G, Høyer P,
Riachi A, Manu Chaudhary M, Nobel AI, Tapp A. Tight bounds on quantum
Kneidel D, et al. Improving quantum-to- searching. Fortschritte der Physik:
classical data decoding using optimized Progress of Physics. 1998;46(4–5):493-505
quantum wavelet transform. The
Journal of Supercomputing. 2023;2023: [25] Mahmud N, Srimoungchanh B,
1-30 Haase-Divine B, Blankenau N,
Kuhnke A, El-Araby E. Combining
[18] Mahmud N, Jeng MJ, et al. Time- perfect shuffle and bitonic networks for
efficient quantum-to-classical data efficient quantum sorting. In: 2019 IEEE/
decoding. In: The International ACM International Workshop on
Conference on Emergent Quantum Heterogeneous High-Performance
Technologies (ICEQT 2022). To Reconfigurable Computing (H2RC).
appear in Transactions on Denver, CO, USA: IEEE; 2019. pp. 42-49
Computational Science &
Computational Intelligence. Las Vegas, [26] Akl SG. Parallel Sorting Algorithms.
Nevada, USA: Springer Nature – Vol. 12. Cambridge, Massachusetts:
Research Book Series; 2022 Academic Press; 2014
22