Quantum Cryptography

Total Page:16

File Type:pdf, Size:1020Kb

Quantum Cryptography INSTITUTE FOR QUANTUM COMPUTING FOR QUANTUM INSTITUTE BY DR. THOMAS JENNEWEIN, ASSOCIATE PROFESSOR & ERIC CHOI, SENIOR TECHNICAL ASSOCIATE assessment 2014 market study & study market 2014 business opportunities business quantum quantum cryptography market study » 1. executive summary 1 2. introduction 3 2.1. Relevance and Implications of Quantum Information 3 2.2. About the Institute for Quantum Computing 4 3. overview of quantum cryptography 5 3.1. Inherent Vulnerabilities of Conventional Cryptography 5 3.2. Quantum Cryptography and Quantum Key Distribution (QKD) 6 3.3. Examples of Terrestrial QKD Implementations 11 3.4. Satellite-Based QKD: The Quantum Space Race 18 4.market overview 23 4.1. Financial Cost of Information Security Breaches 23 4.2. Current Market for IT Security and Encryption 25 5. competitive landscape 29 5.1. Current Commercial Vendors 29 5.2. Recent Commercial Market Activity 37 6.market potential 39 6.1. Discussion of Market Potential 39 6.2. Quantum Cryptography 41 6.3. Market Segmentation 43 6.4. Satellite-Based QKD 43 7. conclusion 45 8. endnotes 47 9.appendices 50 9.1. Appendix A: List of Acronyms 50 9.2. Appendix B: Acknowledgements 53 1. executive summary There is a serious threat to the current cryptographic systems upon which modern information and communications technology depends. Most current encryption techniques are based upon assumptions of mathematical complexity that are actually not proven. Therefore, a sudden or unexpected algorithmic innovation could immediately compromise many modern security systems. In the longer term, quantum computers will be able to quickly solve the mathematical problems upon which most current key establishment methods are based, rendering them useless. Only systems based on quantum cryptography can offer long-term data security. Since quantum cryptography relies upon fundamental laws of physics rather than mathematical assumptions, it will never be threatened by new I algorithms or more powerful computers. Quantum key distribution (QKD) QUANTUM FOR NSTITUTE establishes highly secure keys between distant parties by using single photons to transmit each bit of the key. Since photons behave according to the laws of quantum mechanics they cannot be tapped, copied or measured without leaving tell-tale signs of observation. Such systems provide the peace of mind knowledge that any eavesdropping can be immediately detected and addressed. Quantum key distribution is not science fiction, but a present day reality. A C number of companies are currently selling commercial QKD systems, and OMPUTING several other firms offer related products and services. QKD has attracted the attention of high technology firms such as Alcatel-Lucent, Raytheon, HP, IBM : and Toshiba. Terrestrial QKD networks using fibre optic cables or free-space U atmospheric transmission are in operation today for both research and niche NIVERSITY OF commercial applications such as secure bank transactions and data transfers. Due to some fundamental physical constraints, a complementary solution would be required to cover distances beyond a few hundred kilometers. Light W signals inevitably attenuate as they are transmitted through fibre optic cables, ATERLOO and conventional signal amplifiers cannot be used because they would compromise the quantum mechanical phenomena upon which QKD depends for the detection of eavesdropping. Free-space atmospheric QKD links are limited to line-of-sight, subject to local geographical constraints and ultimately 1 the curvature of the Earth. The only way to offer long-distance QKD services with current technology is to use satellites as complementary trusted nodes bridging the distance between geographically dispersed QKD ground networks, for example, between cities or continents. Teams in Canada, Europe, the U.S., Japan, China and other nations are currently engaged in a “Quantum Space Race”, vying to be the first to demonstrate QKD from space. The winning team would not only claim a historic scientific accomplishment but would also be the front-runner to seize a potentially lucrative future business opportunity. Currently, the market for quantum cryptography is estimated to be on the order of $30-million. Over the long-term, as regulatory requirements for quantum-resistant cryptosystems are expected to become enacted, it is anticipated that the market will grow significantly. IQC estimates the potential overall global market for quantum cryptography could reach $23-billion within twenty years. Satellite-based QKD for long-distance secure key distribution would be a subset of this overall quantum cryptography market. Such a service could be implemented with either a constellation of low Earth orbit (LEO) microsatellites or hosted payloads aboard geostationary (GEO) satellites. IQC estimates a potential global market for satellite-based QKD of up to $382-million per year within the next two decades. 2 2.introduction 2.1. RELEVANCE AND IMPLICATIONS OF QUANTUM INFORMATION Each force of Nature that humanity has harnessed has had a lasting impact on society. Fire, steam, electromagnetism and the splitting of atomic nuclei represent the most compelling examples. What could be the next force of nature that we can harness? What forces remain untamed? Quantum theory was discovered at the beginning of the 20th Century and is used to describe the behaviour of atoms, molecules, photons (quanta of light) and their constituents. As a better understanding of this domain was I developed, we have often been left perplexed about the seemingly paradoxical QUANTUM FOR NSTITUTE behaviour of nature at the atomic scale: particles that cannot be pinpointed because of the uncertainty principle; photons and atoms that act as if they are in two places at the same time; the interchangeability of particles and waves. For most of the 20th Century, these phenomena were thought to be only curiosities. Over the last 25 years, however, physicists and chemists started to develop better technologies with which to explore the intricacies of the quantum domain. They were able to demonstrate that indeed Nature behaves C precisely as this theory predicts. A great deal of thought and experiment has OMPUTING been applied attempting to understand the phenomena presented by quantum mechanics. : Ironically, it is quantum mechanics that poses both the greatest threat to U NIVERSITY OF conventional cryptography and the best means of securing it. Today, most encryption technologies are based on unproven assumptions of mathematical complexity. There is a significant likelihood that practical quantum computers will be able to solve these problems, and this probability is too significant to W ignore. Quantum cryptography, however, which relies upon the same ATERLOO fundamental physical laws, will deliver long-term data security, never to be threatened by new algorithms or increased computational power. 3 2.2. ABOUT THE INSTITUTE FOR QUANTUM COMPUTING The mission of the Institute for in Canada and has allowed the Quantum Computing (IQC), a institute to gain important know- research institution located at the how that is leading to collaborations University of Waterloo, is to with other universities and aggressively explore and advance organizations including the application of quantum Communications Security mechanical systems to a vast array Establishment Canada (CSEC), the of relevant information processing Canadian Space Agency (CSA) and techniques. The idea for founding a the University of Calgary. Since large-scale quantum information 2010, IQC has been working with program in Waterloo was a result of partners in government and discussions among founder and industry to advance concepts for former co-CEO of BlackBerry Mike demonstrating long-distance Lazaridis, the University of Waterloo quantum key distribution via Earth- and Professor Michele Mosca, and orbiting satellite (see Section 3.4.1). the founding Executive Director of the Perimeter Institute for Figure 1 – IQC Executive Director, Professor Raymond Laflamme Theoretical Physics, Howard Burton. IQC was officially established in October 2002 and has since built an international reputation as a leader in quantum information science and technology. The Institute is devoted to interdisciplinary research bridging foundational issues to technology development through both theoretical and experimental investigations. The main themes of research are quantum computing, communications and sensors. IQC is strongly involved in the standardization of quantum key distribution systems within the European Telecommunications Standards Institute (ETSI). The Institute operates a free-space quantum link test-bed that can transfer entanglement and cryptographic keys between buildings on the campus of the University of Waterloo (see Section 3.3.1). This is a double-link configuration, where the entangled photon pairs are sent along two different paths of about 1.3 km in length. IQC’s test system is unique 4 3. overview of quantum cryptography 3.1. INHERENT VULNERABILITIES OF CONVENTIONAL CRYPTOGRAPHY A serious catastrophe is looming that threatens to compromise the current cryptographic systems upon which the information and communications technology (ICT) infrastructure of the modern world depends. It is cryptography that allows us to leverage a relatively small amount of physical security and trust in order to be able to use the wider untrusted ICT infrastructure in a practical manner with reasonable assurances of privacy and security. Reliable cryptography is absolutely fundamental both
Recommended publications
  • Quantum Information Science and the Technology Frontier Jake Taylor February 5Th, 2020
    Quantum Information Science and the Technology Frontier Jake Taylor February 5th, 2020 Office of Science and Technology Policy www.whitehouse.gov/ostp www.ostp.gov @WHOSTP Photo credit: Lloyd Whitman The National Quantum Initiative Signed Dec 21, 2018 11 years of sustained effort DOE: new centers working with the labs, new programs NSF: new academic centers NIST: industrial consortium, expand core programs Coordination: NSTC combined with a National Coordination Office and an external Advisory committee 2 National Science and Technology Council • Subcommittee on Quantum Information Science (SCQIS) • DoE, NSF, NIST co-chairs • Coordinates NQI, other research activities • Subcommittee on Economic and Security Implications of Quantum Science (ESIX) • DoD, DoE, NSA co-chairs • Civilian, IC, Defense conversation space 3 Policy Recommendations • Focus on a science-first approach that aims to identify and solve Grand Challenges: problems whose solutions enable transformative scientific and industrial progress; • Build a quantum-smart and diverse workforce to meet the needs of a growing field; • Encourage industry engagement, providing appropriate mechanisms for public-private partnerships; • Provide the key infrastructure and support needed to realize the scientific and technological opportunities; • Drive economic growth; • Maintain national security; and • Continue to develop international collaboration and cooperation. 4 Quantum Sensing Accuracy via physical law New modalities of measurement Concept: atoms are indistinguishable. Use Challenge: measuring inside the body. Use this to create time standards, enables quantum behavior of individual nuclei to global navigation. image magnetic resonances (MRI) Concept: speed of light is constant. Use this Challenge: estimating length limited by ‘shot to measure distance using a time standard. noise’ (individual photons!).
    [Show full text]
  • American Leadership in Quantum Technology Joint Hearing
    AMERICAN LEADERSHIP IN QUANTUM TECHNOLOGY JOINT HEARING BEFORE THE SUBCOMMITTEE ON RESEARCH AND TECHNOLOGY & SUBCOMMITTEE ON ENERGY COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HOUSE OF REPRESENTATIVES ONE HUNDRED FIFTEENTH CONGRESS FIRST SESSION OCTOBER 24, 2017 Serial No. 115–32 Printed for the use of the Committee on Science, Space, and Technology ( Available via the World Wide Web: http://science.house.gov U.S. GOVERNMENT PUBLISHING OFFICE 27–671PDF WASHINGTON : 2018 For sale by the Superintendent of Documents, U.S. Government Publishing Office Internet: bookstore.gpo.gov Phone: toll free (866) 512–1800; DC area (202) 512–1800 Fax: (202) 512–2104 Mail: Stop IDCC, Washington, DC 20402–0001 COMMITTEE ON SCIENCE, SPACE, AND TECHNOLOGY HON. LAMAR S. SMITH, Texas, Chair FRANK D. LUCAS, Oklahoma EDDIE BERNICE JOHNSON, Texas DANA ROHRABACHER, California ZOE LOFGREN, California MO BROOKS, Alabama DANIEL LIPINSKI, Illinois RANDY HULTGREN, Illinois SUZANNE BONAMICI, Oregon BILL POSEY, Florida ALAN GRAYSON, Florida THOMAS MASSIE, Kentucky AMI BERA, California JIM BRIDENSTINE, Oklahoma ELIZABETH H. ESTY, Connecticut RANDY K. WEBER, Texas MARC A. VEASEY, Texas STEPHEN KNIGHT, California DONALD S. BEYER, JR., Virginia BRIAN BABIN, Texas JACKY ROSEN, Nevada BARBARA COMSTOCK, Virginia JERRY MCNERNEY, California BARRY LOUDERMILK, Georgia ED PERLMUTTER, Colorado RALPH LEE ABRAHAM, Louisiana PAUL TONKO, New York DRAIN LAHOOD, Illinois BILL FOSTER, Illinois DANIEL WEBSTER, Florida MARK TAKANO, California JIM BANKS, Indiana COLLEEN HANABUSA, Hawaii ANDY BIGGS, Arizona CHARLIE CRIST, Florida ROGER W. MARSHALL, Kansas NEAL P. DUNN, Florida CLAY HIGGINS, Louisiana RALPH NORMAN, South Carolina SUBCOMMITTEE ON RESEARCH AND TECHNOLOGY HON. BARBARA COMSTOCK, Virginia, Chair FRANK D. LUCAS, Oklahoma DANIEL LIPINSKI, Illinois RANDY HULTGREN, Illinois ELIZABETH H.
    [Show full text]
  • Defense Primer: Quantum Technology
    Updated June 7, 2021 Defense Primer: Quantum Technology Quantum technology translates the principles of quantum Successful development and deployment of such sensors physics into technological applications. In general, quantum could lead to significant improvements in submarine technology has not yet reached maturity; however, it could detection and, in turn, compromise the survivability of sea- hold significant implications for the future of military based nuclear deterrents. Quantum sensors could also sensing, encryption, and communications, as well as for enable military personnel to detect underground structures congressional oversight, authorizations, and appropriations. or nuclear materials due to their expected “extreme sensitivity to environmental disturbances.” The sensitivity Key Concepts in Quantum Technology of quantum sensors could similarly potentially enable Quantum applications rely on a number of key concepts, militaries to detect electromagnetic emissions, thus including superposition, quantum bits (qubits), and enhancing electronic warfare capabilities and potentially entanglement. Superposition refers to the ability of quantum assisting in locating concealed adversary forces. systems to exist in two or more states simultaneously. A qubit is a computing unit that leverages the principle of The DSB concluded that quantum radar, hypothesized to be superposition to encode information. (A classical computer capable of identifying the performance characteristics (e.g., encodes information in bits that can represent binary
    [Show full text]
  • EU–US Collaboration on Quantum Technologies Emerging Opportunities for Research and Standards-Setting
    Research EU–US collaboration Paper on quantum technologies International Security Programme Emerging opportunities for January 2021 research and standards-setting Martin Everett Chatham House, the Royal Institute of International Affairs, is a world-leading policy institute based in London. Our mission is to help governments and societies build a sustainably secure, prosperous and just world. EU–US collaboration on quantum technologies Emerging opportunities for research and standards-setting Summary — While claims of ‘quantum supremacy’ – where a quantum computer outperforms a classical computer by orders of magnitude – continue to be contested, the security implications of such an achievement have adversely impacted the potential for future partnerships in the field. — Quantum communications infrastructure continues to develop, though technological obstacles remain. The EU has linked development of quantum capacity and capability to its recovery following the COVID-19 pandemic and is expected to make rapid progress through its Quantum Communication Initiative. — Existing dialogue between the EU and US highlights opportunities for collaboration on quantum technologies in the areas of basic scientific research and on communications standards. While the EU Quantum Flagship has already had limited engagement with the US on quantum technology collaboration, greater direct cooperation between EUPOPUSA and the Flagship would improve the prospects of both parties in this field. — Additional support for EU-based researchers and start-ups should be provided where possible – for example, increasing funding for representatives from Europe to attend US-based conferences, while greater investment in EU-based quantum enterprises could mitigate potential ‘brain drain’. — Superconducting qubits remain the most likely basis for a quantum computer. Quantum computers composed of around 50 qubits, as well as a quantum cloud computing service using greater numbers of superconducting qubits, are anticipated to emerge in 2021.
    [Show full text]
  • Quantum Computing Methods for Supervised Learning Arxiv
    Quantum Computing Methods for Supervised Learning Viraj Kulkarni1, Milind Kulkarni1, Aniruddha Pant2 1 Vishwakarma University 2 DeepTek Inc June 23, 2020 Abstract The last two decades have seen an explosive growth in the theory and practice of both quantum computing and machine learning. Modern machine learning systems process huge volumes of data and demand massive computational power. As silicon semiconductor miniaturization approaches its physics limits, quantum computing is increasingly being considered to cater to these computational needs in the future. Small-scale quantum computers and quantum annealers have been built and are already being sold commercially. Quantum computers can benefit machine learning research and application across all science and engineering domains. However, owing to its roots in quantum mechanics, research in this field has so far been confined within the purview of the physics community, and most work is not easily accessible to researchers from other disciplines. In this paper, we provide a background and summarize key results of quantum computing before exploring its application to supervised machine learning problems. By eschewing results from physics that have little bearing on quantum computation, we hope to make this introduction accessible to data scientists, machine learning practitioners, and researchers from across disciplines. 1 Introduction Supervised learning is the most commonly applied form of machine learning. It works in two arXiv:2006.12025v1 [quant-ph] 22 Jun 2020 stages. During the training stage, the algorithm extracts patterns from the training dataset that contains pairs of samples and labels and converts these patterns into a mathematical representation called a model. During the inference stage, this model is used to make predictions about unseen samples.
    [Show full text]
  • Quantum Computing in the NISQ Era and Beyond
    Quantum Computing in the NISQ era and beyond John Preskill Institute for Quantum Information and Matter and Walter Burke Institute for Theoretical Physics, California Institute of Technology, Pasadena CA 91125, USA 30 July 2018 Noisy Intermediate-Scale Quantum (NISQ) technology will be available in the near future. Quantum computers with 50-100 qubits may be able to perform tasks which surpass the capabilities of today’s classical digital computers, but noise in quantum gates will limit the size of quantum circuits that can be executed reliably. NISQ devices will be useful tools for exploring many-body quantum physics, and may have other useful applications, but the 100-qubit quantum computer will not change the world right away — we should regard it as a significant step toward the more powerful quantum technologies of the future. Quantum technologists should continue to strive for more accurate quantum gates and, eventually, fully fault-tolerant quantum computing. 1 Introduction Now is an opportune time for a fruitful discussion among researchers, entrepreneurs, man- agers, and investors who share an interest in quantum computing. There has been a recent surge of investment by both large public companies and startup companies, a trend that has surprised many quantumists working in academia. While we have long recognized the commercial potential of quantum technology, this ramping up of industrial activity has happened sooner and more suddenly than most of us expected. In this article I assess the current status and future potential of quantum computing. Because quantum computing technology is so different from the information technology we use now, we have only a very limited ability to glimpse its future applications, or to project when these applications will come to fruition.
    [Show full text]
  • Framework for Wireless Network Security Using Quantum Cryptography-Journal
    FRAMEWORK FOR WIRELESS NETWORK SECURITY USING QUANTUM CRYPTOGRAPHY Priyanka Bhatia1 and Ronak Sumbaly2 1, 2 Department of Computer Science, BITS Pilani Dubai, United Arab Emirates ABSTRACT Data that is transient over an unsecured wireless network is always susceptible to being intercepted by anyone within the range of the wireless signal. Hence providing secure communication to keep the user’s information and devices safe when connected wirelessly has become one of the major concerns. Quantum cryptography provides a solution towards absolute communication security over the network by encoding information as polarized photons, which can be sent through the air. This paper explores on the aspect of application of quantum cryptography in wireless networks. In this paper we present a methodology for integrating quantum cryptography and security of IEEE 802.11 wireless networks in terms of distribution of the encryption keys. KEYWORDS IEEE 802.11, Key Distribution, Network Security, Quantum Cryptography, Wireless Network. 1. INTRODUCTION Wireless Networks are becoming increasing widespread, and majority of coffee shops, airports, hotels, offices, universities and other public places are making use of these for a means of communication today. They’re convenient due to their portability and high-speed information exchange in homes, offices and enterprises. The advancement in modern wireless technology has led users to switch to a wireless network as compared to a LAN based network connected using Ethernet cables. Unfortunately, they often aren’t secure and security issues have become a great concern. If someone is connected to a Wi-Fi network, and sends information through websites or mobile apps, it is easy for someone else to access this information.
    [Show full text]
  • Quantum Information Science
    Quantum Information Science Seth Lloyd Professor of Quantum-Mechanical Engineering Director, WM Keck Center for Extreme Quantum Information Theory (xQIT) Massachusetts Institute of Technology Article Outline: Glossary I. Definition of the Subject and Its Importance II. Introduction III. Quantum Mechanics IV. Quantum Computation V. Noise and Errors VI. Quantum Communication VII. Implications and Conclusions 1 Glossary Algorithm: A systematic procedure for solving a problem, frequently implemented as a computer program. Bit: The fundamental unit of information, representing the distinction between two possi- ble states, conventionally called 0 and 1. The word ‘bit’ is also used to refer to a physical system that registers a bit of information. Boolean Algebra: The mathematics of manipulating bits using simple operations such as AND, OR, NOT, and COPY. Communication Channel: A physical system that allows information to be transmitted from one place to another. Computer: A device for processing information. A digital computer uses Boolean algebra (q.v.) to processes information in the form of bits. Cryptography: The science and technique of encoding information in a secret form. The process of encoding is called encryption, and a system for encoding and decoding is called a cipher. A key is a piece of information used for encoding or decoding. Public-key cryptography operates using a public key by which information is encrypted, and a separate private key by which the encrypted message is decoded. Decoherence: A peculiarly quantum form of noise that has no classical analog. Decoherence destroys quantum superpositions and is the most important and ubiquitous form of noise in quantum computers and quantum communication channels.
    [Show full text]
  • Scalable Quantum Cryptography Network for Protected Automation Communication Making Quantum Key Distribution (QKD) Available to Critical Energy Infrastructure
    Scalable Quantum Cryptography Network for Protected Automation Communication Making quantum key distribution (QKD) available to critical energy infrastructure Background changes the key in an immediate and Benefits measurable way, reducing the risk that The power grid is increasingly more reliant information thought to be securely • QKD lets the operator know, in real- on a distributed network of automation encrypted has actually been compromised. time, if a secret key has been stolen components such as phasor measurement units (PMUs) and supervisory control and Objectives • Reduces the risk that a “man-in-the- data acquisition (SCADA) systems, to middle” cyber-attack might allow In the past, QKD solutions have been unauthorized access to energy manage the generation, transmission and limited to point-to-point communications sector data distribution of electricity. As the number only. To network many devices required of deployed components has grown dedicated QKD systems to be established Partners rapidly, so too has the need for between every client on the network. This accompanying cybersecurity measures that resulted in an expensive and complex • Qubitekk, Inc. (lead) enable the grid to sustain critical functions network of multiple QKD links. To • Oak Ridge National Laboratory even during a cyber-attack. To protect achieve multi-client communications over (ORNL) against cyber-attacks, many aspects of a single quantum channel, Oak Ridge cybersecurity must be addressed in • Schweitzer Engineering Laboratories National Laboratory (ORNL) developed a parallel. However, authentication and cost-effective solution that combined • EPB encryption of data communication between commercial point-to-point QKD systems • University of Tennessee distributed automation components is of with a new, innovative add-on technology particular importance to ensure resilient called Accessible QKD for Cost-Effective energy delivery systems.
    [Show full text]
  • Quantum Error Correcting Codes and the Security Proof of the BB84 Protocol
    Quantum Error Correcting Codes and the Security Proof of the BB84 Protocol Ramesh Bhandari Laboratory for Telecommunication Sciences 8080 Greenmead Drive, College Park, Maryland 20740, USA [email protected] (Dated: December 2011) We describe the popular BB84 protocol and critically examine its security proof as presented by Shor and Preskill. The proof requires the use of quantum error-correcting codes called the Calderbank-Shor- Steanne (CSS) quantum codes. These quantum codes are constructed in the quantum domain from two suitable classical linear codes, one used to correct for bit-flip errors and the other for phase-flip errors. Consequently, as a prelude to the security proof, the report reviews the essential properties of linear codes, especially the concept of cosets, before building the quantum codes that are utilized in the proof. The proof considers a security entanglement-based protocol, which is subsequently reduced to a “Prepare and Measure” protocol similar in structure to the BB84 protocol, thus establishing the security of the BB84 protocol. The proof, however, is not without assumptions, which are also enumerated. The treatment throughout is pedagogical, and this report, therefore, serves as a useful tutorial for researchers, practitioners and students, new to the field of quantum information science, in particular quantum cryptography, as it develops the proof in a systematic manner, starting from the properties of linear codes, and then advancing to the quantum error-correcting codes, which are critical to the understanding
    [Show full text]
  • A Cryptographic Leash on Quantum Devices
    BULLETIN (New Series) OF THE AMERICAN MATHEMATICAL SOCIETY Volume 57, Number 1, January 2020, Pages 39–76 https://doi.org/10.1090/bull/1678 Article electronically published on October 9, 2019 VERIFYING QUANTUM COMPUTATIONS AT SCALE: A CRYPTOGRAPHIC LEASH ON QUANTUM DEVICES THOMAS VIDICK Abstract. Rapid technological advances point to a near future where engi- neered devices based on the laws of quantum mechanics are able to implement computations that can no longer be emulated on a classical computer. Once that stage is reached, will it be possible to verify the results of the quantum device? Recently, Mahadev introduced a solution to the following problem: Is it possible to delegate a quantum computation to a quantum device in a way that the final outcome of the computation can be verified on a classical computer, given that the device may be faulty or adversarial and given only the ability to generate classical instructions and obtain classical readout information in return? Mahadev’s solution combines the framework of interactive proof systems from complexity theory with an ingenious use of classical cryptographic tech- niques to tie a “cryptographic leash” around the quantum device. In these notes I give a self-contained introduction to her elegant solution, explaining the required concepts from complexity, quantum computing, and cryptogra- phy, and how they are brought together in Mahadev’s protocol for classical verification of quantum computations. Quantum mechanics has been a source of endless fascination throughout the 20th century—and continues to be in the 21st. Two of the most thought-provoking as- pects of the theory are the exponential scaling of parameter space (a pure state of n qubits requires 2n −1 complex parameters to be fully specified), and the uncertainty principle (measurements represented by noncommuting observables cannot be per- formed simultaneously without perturbing the state).
    [Show full text]
  • Foundations of Quantum Computing and Complexity
    Foundations of quantum computing and complexity Richard Jozsa DAMTP University of CamBridge Why quantum computing? - physics and computation A key question: what is computation.. ..fundamentally? What makes it work? What determines its limitations?... Information storage bits 0,1 -- not abstract Boolean values but two distinguishable states of a physical system Information processing: updating information A physical evolution of the information-carrying physical system Hence (Deutsch 1985): Possibilities and limitations of information storage / processing / communication must all depend on the Laws of Physics and cannot be determined from mathematics alone! Conventional computation (bits / Boolean operations etc.) based on structures from classical physics. But classical physics has been superseded by quantum physics … Current very high interest in Quantum Computing “Quantum supremacy” expectation of imminent availability of a QC device that can perform some (albeit maybe not at all useful..) computational tasK beyond the capability of all currently existing classical computers. More generally: many other applications of quantum computing and quantum information ideas: Novel possibilities for information security (quantum cryptography), communication (teleportation, quantum channels), ultra-high precision sensing, etc; and with larger QC devices: “useful” computational tasKs (quantum algorithms offering significant benefits over possibilities of classical computing) such as: Factoring and discrete logs evaluation; Simulation of quantum systems: design of large molecules (quantum chemistry) for new nano-materials, drugs etc. Some Kinds of optimisation tasKs (semi-definite programming etc), search problems. Currently: we’re on the cusp of a “quantum revolution in technology”. Novel quantum effects for computation and complexity Quantum entanglement; Superposition/interference; Quantum measurement. Quantum processes cannot compute anything that’s not computable classically.
    [Show full text]