Quantum Computing for Location Determination

Total Page:16

File Type:pdf, Size:1020Kb

Quantum Computing for Location Determination Quantum Computing for Location Determination Ahmed Shokry Moustafa Youssef Alexandria University AUC and Alexandria University Alexandria, Egypt Alexandria, Egypt [email protected] [email protected] p ABSTRACT to unstructured data searches from >¹=º to >¹ =º [19]. Since Quantum computing provides a new way for approaching then, interest in QC has sparked with a number of big compa- problem solving, enabling efficient solutions for problems nies and startups investing in realizing quantum computers that are hard on classical computers. It is based on leveraging and providing tools for programmers to develop quantum how quantum particles behave. With researchers around algorithms. This materialized in currently having real cloud- the world showing quantum supremacy and the availability based quantum computers with free accounts to researchers of cloud-based quantum computers with free accounts for [16, 27] as well as a large number of quantum programming researchers, quantum computing is becoming a reality. languages and simulators [2, 17, 27]. In October 2019, Google In this paper, we explore both the opportunities and chal- announced that it has reached quantum supremacy with an lenges that quantum computing has for location determina- array of 54 qubits by performing a series of operations in tion research. Specifically, we introduce an example for the 200 seconds that would take a supercomputer about 10,000 expected gain of using quantum algorithms by providing years to complete [2]. In December 2020, a Chinese research an efficient quantum implementation of the well-known RF group reached quantum supremacy by implementing Boson fingerprinting algorithm and run it on an instance ofthe sampling on 76 photons with the Jiuzhang quantum com- IBM Quantum Experience computer. The proposed quan- puter [57]. The quantum computer generates the samples in tum algorithm has a complexity that is exponentially better 20 seconds that would take a classical supercomputer 600 than its classical algorithm version, both in space and run- million years of computation. ning time. We further discuss both software and hardware In this paper, we explore the opportunities and challenges research challenges and opportunities that researchers can of applying quantum computing to the field of location de- build on to explore this exciting new domain. termination. Specifically, we discuss both algorithmic and hardware advantages that QC provides for use with location KEYWORDS determination as well as highlight the research challenges that need to be addressed to fully leverage their potential. As quantum computing, location determination systems, quan- an example, we present a quantum RF fingerprint matching tum sensors, quantum location determination, next genera- algorithm that requires space and runs in >¹< log¹# ºº as tion location tracking systems compared to the classical algorithm that requires space and runs in >¹<# º, where # is the number of access points and 1 INTRODUCTION < is the number of fingerprinting locations. This exponential Quantum Computing (QC) is a new field at the intersection speedup in complexity and saving in space can be further of physics, mathematics, and computer science. It leverages enhanced to >¹;>6¹<# ºº using more advanced algorithms. the phenomena of quantum mechanics to improve the effi- We validate our algorithm on an instance of the IBM Quan- ciency of computation. Specifically, to store and manipulate tum Experience platform and discuss its performance. We information, quantum computers use quantum bits (qubits). end the paper by a discussion of the different opportunities arXiv:2106.11751v2 [quant-ph] 24 Jun 2021 Qubits are represented by subatomic particles properties like offered and challenges posed by quantum computing tothe the spin of electrons or polarization of photons. Quantum field of location tracking systems. computers leverage the quantum mechanical phenomena The rest of the paper is organized as follow: we start of superposition, entanglement, and interference to create with a brief background on quantum computing in Section 2. states that scale exponentially with the number of qubits, Section 3 provides the details of our quantum fingerprint potentially allowing solving problems that are traditionally matching algorithm and its evaluation. We present different hard to solve on classical computers [37]. challenges and opportunities of QC for location tracking in In 1994, Peter Shor presented a theoretical quantum al- Section 4. Finally, sections 5 and 6 discuss related work and gorithm that could efficiently break the widely used RSA conclude the paper, respectively. encryption algorithm [45]. In 1996, Lov Grover developed a quantum algorithm that dramatically sped up the solution 0 with prob. 0.5 jB>DA24i j0i 퐻 1 with prob. 0.5 jC0A64C1i Figure 1: A simple quantum circuit. Single lines carry jC0A64C2i quantum information while double lines carry classi- cal information. Figure 2: An example of controlled gates. The two tar- 2 BACKGROUND get qubits are swapped, if and only if, the source line j1i In this section, we give a brief background on the basic con- is . cepts of quantum computing that we will build on in the rest amplitude of the measured state). The state collapses to the of the paper. observed classical bit value. A quantum bit (qubit) is the basic unit of information and It is important to note that the concept of quantum inter- is analogue to the classical bit. Contrary to classical bits, a ference is at the core of quantum computing. Using quantum qubit can exist in a superposition of the zero and one states. interference, one uses gates to cleverly and intentionally bias This superposition is what allows quantum computations to the content of the qubits towards the needed state, hence work on both states at the same time. This is often referred achieving a specific computation result. to as quantum parallelism. Qubits can have various physical The notion of qubit can be extended to higher dimen- implementations, e.g. the polarization of photons. sions using a quantum register. A quantum register jki, Formally, the Dirac notation is commonly used to describe consisting of = qubits, lives in a 2=-dimensional complex k U V U V k Í2=−1 U 8 the state of a qubit as j i = j0i ¸ j1i, where and are Hilbert space H. Register j i = 0 8 j i is specified Í 2 complex numbers called the amplitudes of classical states j0i by complex numbers U0, ..., U2=−1, where jU8 j = 1. Ba- and j1i, respectively. The state of the qubit is normalized, i.e. sis state j8i denotes the binary encoding of integer 8. We U2 ¸ V2 = 1. When the state jki is measured, only one of j0i use the tensor product ⊗ to compose two quantum sys- or j1i is observed, with probability U2 and V2, respectively. tems. For example, we can compose the two quantum states The measurement process is destructive, in the sense that the jki = U j0i ¸ V j1i and jqi = W j0i ¸X j1i as jli = jki ⊗ jqi = state collapses to the value j0i or j1i that has been observed, UW j00i ¸ UX j01i ¸ VW j10i ¸ VX j11i. losing the original amplitudes U and V [37]. Gates can also be defined on multiple qubits. For example, Operations on qubits are usually represented by gates, Figure 2 illustrates a frequently encountered gate in quan- similar to a classical circuit. An example of a common quan- tum circuits, the control gate. In a control gate, the operation tum gate is the NOT gate (also called Pauli-X gate) that is (e.g. Swap) is performed on the target wire(s), if and only if, analogous to the not gate in classical circuits. In particular, the source line is j1i. This can be used to “entangle” qubits when we apply the NOT gate to the state jk0i = U j0i ¸ V j1i, together. Entangled qubits are correlated with one another, we get the state jk1i = V j0i ¸ U j1i. Gates are usually repre- in the sense that information on one qubit will reveal in- sented by unitary matrices while states are represented by formation about the other unknown qubit, even if they are 0 1 separated by large distance [37]. column vectors1. The matrix for the NOT gate is and 1 0 A common way to describe a quantum algorithm is to use the above operation can be written as jk1i = #$) ¹jk0iº = a quantum circuit, which is a combination of the quantum U 0 1 . gates (e.g as in Figure 1). The input to the circuit is a number 1 0 V of qubits (in quantum registers) and the gates act on them Another important gate is the Walsh–Hadamard gate, 퐻, to change the combined circuit state using superposition, that maps j0i to p1 ¹j0i ¸ j1iº, i.e. a superposition state with 2 entanglement, and interference to reach a desired output equal probability for j0i and j1i; and maps j1i to p1 ¹j0i−j1iº. state that is a function of the algorithm output. The final step 2 Figure 1 shows a simple quantum circuit. Single lines carry is to measure the output state(s), which reveals the required quantum information while double lines carry classical in- information. formation (typically after measurement). The simple circuit Finally, the no-cloning theorem [51] indicates that, counter applies an 퐻 gate to state j0i, which produces the state to classical bits, quantum bits cannot be cloned. Therefore, p1 ¹j0i¸j1iº at the output of the gate. The measurement step one cannot assume that a quantum bit can be copied as 2 needed (i.e. there is no fan-out as in classical circuits). This produces either 0 or 1 with equal probability (the squared has a number of implications on designing quantum algo- rithm. For example, the no cloning theorem is a vital ingre- 1The ket notation j.i is used for column vectors while the bra notation h.j dient in quantum cryptography as it forbids eavesdroppers is used for row vectors.
Recommended publications
  • Marching Towards Quantum Supremacy
    Princeton Center for Theoretical Science The Princeton Center for Theoretical Science is dedicated to exploring the frontiers of theory in the natural sciences. Its purpose is to promote interaction among theorists and seed new directions in research, especially in areas cutting across traditional disciplinary boundaries. The Center is home to a corps of Center Postdoctoral Fellows, chosen from nominations made by senior theoretical scientists around the world. A group of senior Faculty Fellows, chosen from science and engineering departments across the campus, are responsible for guiding the Center. Center activities include focused topical programs chosen from proposals by Princeton faculty across the natural sciences. The Center is located on the fourth floor of Jadwin Hall, in the heart of the campus “science neighborhood”. The Center hopes to become the focus for innovation and cross-fertilization in theoretical natural science at Princeton. Faculty Fellows Igor Klebanov, Director Ned Wingreen, Associate Director Marching Towards Quantum Andrei Bernevig Jeremy Goodman Duncan Haldane Supremacy Andrew Houck Mariangela Lisanti Thanos Panagiotopoulos Frans Pretorius November 13-15, 2019 Center Postdoctoral Fellows Ricard Alert-Zenon 2018-2021 PCTS Seminar Room Nathan Benjamin 2018-2021 Andrew Chael 2019-2022 Jadwin Hall, Fourth Floor, Room 407 Amos Chan 2019-2022 Fani Dosopoulou 2018-2021 Biao Lian 2017-2020 Program Organizers Vladimir Narovlansky 2019-2022 Sergey Frolov Sabrina Pasterski 2019-2022 Abhinav Prem 2018-2021 Michael Gullans
    [Show full text]
  • Four Results of Jon Kleinberg a Talk for St.Petersburg Mathematical Society
    Four Results of Jon Kleinberg A Talk for St.Petersburg Mathematical Society Yury Lifshits Steklov Institute of Mathematics at St.Petersburg May 2007 1 / 43 2 Hubs and Authorities 3 Nearest Neighbors: Faster Than Brute Force 4 Navigation in a Small World 5 Bursty Structure in Streams Outline 1 Nevanlinna Prize for Jon Kleinberg History of Nevanlinna Prize Who is Jon Kleinberg 2 / 43 3 Nearest Neighbors: Faster Than Brute Force 4 Navigation in a Small World 5 Bursty Structure in Streams Outline 1 Nevanlinna Prize for Jon Kleinberg History of Nevanlinna Prize Who is Jon Kleinberg 2 Hubs and Authorities 2 / 43 4 Navigation in a Small World 5 Bursty Structure in Streams Outline 1 Nevanlinna Prize for Jon Kleinberg History of Nevanlinna Prize Who is Jon Kleinberg 2 Hubs and Authorities 3 Nearest Neighbors: Faster Than Brute Force 2 / 43 5 Bursty Structure in Streams Outline 1 Nevanlinna Prize for Jon Kleinberg History of Nevanlinna Prize Who is Jon Kleinberg 2 Hubs and Authorities 3 Nearest Neighbors: Faster Than Brute Force 4 Navigation in a Small World 2 / 43 Outline 1 Nevanlinna Prize for Jon Kleinberg History of Nevanlinna Prize Who is Jon Kleinberg 2 Hubs and Authorities 3 Nearest Neighbors: Faster Than Brute Force 4 Navigation in a Small World 5 Bursty Structure in Streams 2 / 43 Part I History of Nevanlinna Prize Career of Jon Kleinberg 3 / 43 Nevanlinna Prize The Rolf Nevanlinna Prize is awarded once every 4 years at the International Congress of Mathematicians, for outstanding contributions in Mathematical Aspects of Information Sciences including: 1 All mathematical aspects of computer science, including complexity theory, logic of programming languages, analysis of algorithms, cryptography, computer vision, pattern recognition, information processing and modelling of intelligence.
    [Show full text]
  • Navigability of Small World Networks
    Navigability of Small World Networks Pierre Fraigniaud CNRS and University Paris Sud http://www.lri.fr/~pierre Introduction Interaction Networks • Communication networks – Internet – Ad hoc and sensor networks • Societal networks – The Web – P2P networks (the unstructured ones) • Social network – Acquaintance – Mail exchanges • Biology (Interactome network), linguistics, etc. Dec. 19, 2006 HiPC'06 3 Common statistical properties • Low density • “Small world” properties: – Average distance between two nodes is small, typically O(log n) – The probability p that two distinct neighbors u1 and u2 of a same node v are neighbors is large. p = clustering coefficient • “Scale free” properties: – Heavy tailed probability distributions (e.g., of the degrees) Dec. 19, 2006 HiPC'06 4 Gaussian vs. Heavy tail Example : human sizes Example : salaries µ Dec. 19, 2006 HiPC'06 5 Power law loglog ppk prob{prob{ X=kX=k }} ≈≈ kk-α loglog kk Dec. 19, 2006 HiPC'06 6 Random graphs vs. Interaction networks • Random graphs: prob{e exists} ≈ log(n)/n – low clustering coefficient – Gaussian distribution of the degrees • Interaction networks – High clustering coefficient – Heavy tailed distribution of the degrees Dec. 19, 2006 HiPC'06 7 New problematic • Why these networks share these properties? • What model for – Performance analysis of these networks – Algorithm design for these networks • Impact of the measures? • This lecture addresses navigability Dec. 19, 2006 HiPC'06 8 Navigability Milgram Experiment • Source person s (e.g., in Wichita) • Target person t (e.g., in Cambridge) – Name, professional occupation, city of living, etc. • Letter transmitted via a chain of individuals related on a personal basis • Result: “six degrees of separation” Dec.
    [Show full text]
  • A Decade of Lattice Cryptography
    Full text available at: http://dx.doi.org/10.1561/0400000074 A Decade of Lattice Cryptography Chris Peikert Computer Science and Engineering University of Michigan, United States Boston — Delft Full text available at: http://dx.doi.org/10.1561/0400000074 Foundations and Trends R in Theoretical Computer Science Published, sold and distributed by: now Publishers Inc. PO Box 1024 Hanover, MA 02339 United States Tel. +1-781-985-4510 www.nowpublishers.com [email protected] Outside North America: now Publishers Inc. PO Box 179 2600 AD Delft The Netherlands Tel. +31-6-51115274 The preferred citation for this publication is C. Peikert. A Decade of Lattice Cryptography. Foundations and Trends R in Theoretical Computer Science, vol. 10, no. 4, pp. 283–424, 2014. R This Foundations and Trends issue was typeset in LATEX using a class file designed by Neal Parikh. Printed on acid-free paper. ISBN: 978-1-68083-113-9 c 2016 C. Peikert All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying, recording or otherwise, without prior written permission of the publishers. Photocopying. In the USA: This journal is registered at the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923. Authorization to photocopy items for in- ternal or personal use, or the internal or personal use of specific clients, is granted by now Publishers Inc for users registered with the Copyright Clearance Center (CCC). The ‘services’ for users can be found on the internet at: www.copyright.com For those organizations that have been granted a photocopy license, a separate system of payment has been arranged.
    [Show full text]
  • Constraint Based Dimension Correlation and Distance
    Preface The papers in this volume were presented at the Fourteenth Annual IEEE Conference on Computational Complexity held from May 4-6, 1999 in Atlanta, Georgia, in conjunction with the Federated Computing Research Conference. This conference was sponsored by the IEEE Computer Society Technical Committee on Mathematical Foundations of Computing, in cooperation with the ACM SIGACT (The special interest group on Algorithms and Complexity Theory) and EATCS (The European Association for Theoretical Computer Science). The call for papers sought original research papers in all areas of computational complexity. A total of 70 papers were submitted for consideration of which 28 papers were accepted for the conference and for inclusion in these proceedings. Six of these papers were accepted to a joint STOC/Complexity session. For these papers the full conference paper appears in the STOC proceedings and a one-page summary appears in these proceedings. The program committee invited two distinguished researchers in computational complexity - Avi Wigderson and Jin-Yi Cai - to present invited talks. These proceedings contain survey articles based on their talks. The program committee thanks Pradyut Shah and Marcus Schaefer for their organizational and computer help, Steve Tate and the SIGACT Electronic Publishing Board for the use and help of the electronic submissions server, Peter Shor and Mike Saks for the electronic conference meeting software and Danielle Martin of the IEEE for editing this volume. The committee would also like to thank the following people for their help in reviewing the papers: E. Allender, V. Arvind, M. Ajtai, A. Ambainis, G. Barequet, S. Baumer, A. Berthiaume, S.
    [Show full text]
  • Inter Actions Department of Physics 2015
    INTER ACTIONS DEPARTMENT OF PHYSICS 2015 The Department of Physics has a very accomplished family of alumni. In this issue we begin to recognize just a few of them with stories submitted by graduates from each of the decades since 1950. We want to invite all of you to renew and strengthen your ties to our department. We would love to hear from you, telling us what you are doing and commenting on how the department has helped in your career and life. Alumna returns to the Physics Department to Implement New MCS Core Education When I heard that the Department of Physics needed a hand implementing the new MCS Core Curriculum, I couldn’t imagine a better fit. Not only did it provide an opportunity to return to my hometown, but Carnegie Mellon itself had been a fixture in my life for many years, from taking classes as a high school student to teaching after graduation. I was thrilled to have the chance to return. I graduated from Carnegie Mellon in 2008, with a B.S. in physics and a B.A. in Japanese. Afterwards, I continued to teach at CMARC’s Summer Academy for Math and Science during the summers while studying down the street at the University of Pittsburgh. In 2010, I earned my M.A. in East Asian Studies there based on my research into how cultural differences between Japan and America have helped shape their respective robotics industries. After receiving my master’s degree and spending a summer studying in Japan, I taught for Kaplan as graduate faculty for a year before joining the Department of Physics at Cornell University.
    [Show full text]
  • ANGLAIS Durée : 2 Heures
    CONCOURS D’ADMISSION 2021 FILIERE UNIVERSITAIRE INTERNATIONALE FORMATION FRANCOPHONE FUI-FF_ Session 2_Printemps Épreuve n°4 ANGLAIS Durée : 2 heures L’utilisation de dictionnaires et traducteurs électroniques n’est pas autorisée pour cette épreuve Physicists Need to Be More Careful with How They Name Things The popular term “quantum supremacy,” which refers to quantum computers outperforming classical ones, is uncomfortably reminiscent of “white supremacy” Adapted from Scientific American, By Ian Durham, Daniel Garisto, Karoline Wiesner on February 20, 2021 In 2012, quantum physicist John Preskill wrote, “We hope to hasten the day when well controlled quantum systems can perform tasks surpassing what can be done in the classical world.” Less than a decade later, two quantum computing systems have met that mark: Google’s Sycamore, and the University of Science and Technology of China’s Jiǔzhāng. Both solved 5 narrowly designed problems that are, so far as we know, impossible for classical computers to solve quickly. How quickly? How “impossible” ? To solve a problem that took Jiǔzhāng 200 seconds, even the fastest supercomputers are estimated to take at least two billion years. Describing what then may have seemed a far-off goal, Preskill gave it a name: “quantum supremacy.” In a blog post at the time, he explained “I’m not completely happy with this term, 10 and would be glad if readers could suggest something better.” We’re not happy with it either, and we believe that the physics community should be more careful with its language, for both social and scientific reasons. Even in the abstruse realms of matter and energy, language matters because physics is done by people.
    [Show full text]
  • The BBVA Foundation Recognizes Charles H. Bennett, Gilles Brassard
    www.frontiersofknowledgeawards-fbbva.es Press release 3 March, 2020 The BBVA Foundation recognizes Charles H. Bennett, Gilles Brassard and Peter Shor for their fundamental role in the development of quantum computation and cryptography In the 1980s, chemical physicist Bennett and computer scientist Brassard invented quantum cryptography, a technology that using the laws of quantum physics in a way that makes them unreadable to eavesdroppers, in the words of the award committee The importance of this technology was demonstrated ten years later, when mathematician Shor discovered that a hypothetical quantum computer would drive a hole through the conventional cryptographic systems that underpin the security and privacy of Internet communications Their landmark contributions have boosted the development of quantum computers, which promise to perform calculations at a far greater speed and scale than machines, and enabled cryptographic systems that guarantee the inviolability of communications The BBVA Foundation Frontiers of Knowledge Award in Basic Sciences has gone in this twelfth edition to Charles Bennett, Gilles Brassard and Peter Shor for their outstanding contributions to the field of quantum computation and communication Bennett and Brassard, a chemical physicist and computer scientist respectively, invented quantum cryptography in the 1980s to ensure the physical inviolability of data communications. The importance of their work became apparent ten years later, when mathematician Peter Shor discovered that a hypothetical quantum computer would render effectively useless the communications. The award committee, chaired by Nobel Physics laureate Theodor Hänsch with quantum physicist Ignacio Cirac acting as its secretary, remarked on the leap forward in quantum www.frontiersofknowledgeawards-fbbva.es Press release 3 March, 2020 technologies witnessed in these last few years, an advance which draws heavily on the new .
    [Show full text]
  • Quantum-Proofing the Blockchain
    QUANTUM-PROOFING THE BLOCKCHAIN Vlad Gheorghiu, Sergey Gorbunov, Michele Mosca, and Bill Munson University of Waterloo November 2017 A BLOCKCHAIN RESEARCH INSTITUTE BIG IDEA WHITEPAPER Realizing the new promise of the digital economy In 1994, Don Tapscott coined the phrase, “the digital economy,” with his book of that title. It discussed how the Web and the Internet of information would bring important changes in business and society. Today the Internet of value creates profound new possibilities. In 2017, Don and Alex Tapscott launched the Blockchain Research Institute to help realize the new promise of the digital economy. We research the strategic implications of blockchain technology and produce practical insights to contribute global blockchain knowledge and help our members navigate this revolution. Our findings, conclusions, and recommendations are initially proprietary to our members and ultimately released to the public in support of our mission. To find out more, please visitwww.blockchainresearchinstitute.org . Blockchain Research Institute, 2018 Except where otherwise noted, this work is copyrighted 2018 by the Blockchain Research Institute and licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 International Public License. To view a copy of this license, send a letter to Creative Commons, PO Box 1866, Mountain View, CA 94042, USA, or visit creativecommons.org/ licenses/by-nc-nd/4.0/legalcode. This document represents the views of its author(s), not necessarily those of Blockchain Research Institute or the Tapscott Group. This material is for informational purposes only; it is neither investment advice nor managerial consulting. Use of this material does not create or constitute any kind of business relationship with the Blockchain Research Institute or the Tapscott Group, and neither the Blockchain Research Institute nor the Tapscott Group is liable for the actions of persons or organizations relying on this material.
    [Show full text]
  • Quantum Error Correction
    Quantum Error Correction Peter Young (Dated: March 6, 2020) I. INTRODUCTION Quantum error correction has developed into a huge topic, so here we will only be able to describe the main ideas. Error correction is essential for quantum computing, but appeared at first to be impossible, for reasons that we shall see. The field was transformed in 1995 by Shor[1] and Steane[2] who showed that quantum error correction is feasible. Before Shor and Steane, the goal of building a useful quantum computer seemed clearly unattainable. After those two papers, while building a quantum computer obviously posed enormous challenges, it was not necessarily impossible. Some general references on quantum error correction are Refs. [3{6]. Let us start by giving a simple discussion of classical error correction which will motivate our study of quantum error correction. In classical computers error correction is not necessary. This is because the hardware for one bit is huge on an atomic scale and the states 0 and 1 are so different that the probability of an unwanted flip is tiny. However, error correction is needed classically for transmitting a signal over large distances where it attenuates and can be corrupted by noise. To do error correction one needs to have redundancy. One simple way of doing classical error correction is to encode each logical bit by three physical bits, i.e. j0i ! j0i ≡ j0ij0ij0i ≡ j000i ; (1a) j1i ! j1i ≡ j1ij1ij1i ≡ j111i : (1b) The sets of three bits, j000i and j111i, are called codewords. One monitors the codewords to look for errors. If the bits in a codeword are not all the same one uses \majority rule" to correct.
    [Show full text]
  • Pairwise Independence and Derandomization
    Pairwise Independence and Derandomization Pairwise Independence and Derandomization Michael Luby Digital Fountain Fremont, CA, USA Avi Wigderson Institute for Advanced Study Princeton, NJ, USA [email protected] Boston – Delft Foundations and TrendsR in Theoretical Computer Science Published, sold and distributed by: now Publishers Inc. PO Box 1024 Hanover, MA 02339 USA Tel. +1-781-985-4510 www.nowpublishers.com [email protected] Outside North America: now Publishers Inc. PO Box 179 2600 AD Delft The Netherlands Tel. +31-6-51115274 A Cataloging-in-Publication record is available from the Library of Congress The preferred citation for this publication is M. Luby and A. Wigderson, Pairwise R Independence and Derandomization, Foundation and Trends in Theoretical Com- puter Science, vol 1, no 4, pp 237–301, 2005 Printed on acid-free paper ISBN: 1-933019-22-0 c 2006 M. Luby and A. Wigderson All rights reserved. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, mechanical, photocopying, recording or otherwise, without prior written permission of the publishers. Photocopying. In the USA: This journal is registered at the Copyright Clearance Cen- ter, Inc., 222 Rosewood Drive, Danvers, MA 01923. Authorization to photocopy items for internal or personal use, or the internal or personal use of specific clients, is granted by now Publishers Inc for users registered with the Copyright Clearance Center (CCC). The ‘services’ for users can be found on the internet at: www.copyright.com For those organizations that have been granted a photocopy license, a separate system of payment has been arranged.
    [Show full text]
  • Quantum Error Correction1
    QUANtum error correction1 Quantum Error Correction James Sayre M.D. Department of Physics, University of Washington Author Note James Sayre Department of Physics University of Washington QUANtum error correction2 Abstract Quantum Computing holds enormous promise. Theoretically these computers should be able to scale exponentially in speed and storage. This spectacular capability comes at a price. Qubits are the basic storage unit. The information they store degrades over time due to decoherence and quantum noise. This degradation must be controlled if not eliminated. An entire field of inquiry is devoted to this is the function of quantum error correction. This paper starts with a discussion of the theoretical underpinnings of quantum error correction. Various methods are then described in detail. Keywords: Quantum Computing, Error Correction, Threshold Theorem, Shor’s ​ Algorithm, Steane Code, Shor’s Code. QUANtum error correction3 Quantum Error Correction Quantum Computing holds enormous promise. A useful quantum computer will have the capability to perform searches, factorizations and quantum mechanical simulations far beyond the capability of classical computers [1] [2]. For instance, such a computer running Shor’s algorithm will be able to factorize a large number in polynomial time [3]. This is a tremendous speed advantage over a classical computer that requires exponential time to complete the same task. In theory a computation that requires millions of years on a classical computer could take hours on a quantum computer. The basic building block of a quantum computer is a qubit. Analogous to a classical bit, the qubit combines with other qubits to store numbers. Unlike classical computers, that storage grows exponentially with the number of qubits.
    [Show full text]