多动症是什么原因造成| 呼吸困难是什么原因| 隋朝之前是什么朝代| 急性胃肠炎吃什么药| 孕妇梦见好多蛇是什么预兆| 什么样的女人最吸引男人| 鸡蛋壳薄是什么原因| 喜大普奔是什么意思| 集体户口和个人户口有什么区别| 阴道发炎用什么药| 林深时见鹿什么意思| 心脏主要由什么组织构成| 霍霍是什么意思| 无创什么时候做| 什么动物会冬眠| 乳酸菌和益生菌有什么区别| 白癜风有什么症状| 尿路感染需要做什么检查| smzco是什么药片| 手掌横纹代表什么意思| 巡视员是什么级别| 女人三十如狼四十如虎什么意思| 邪不压正什么意思| 舌苔白色是什么原因| 心灵的洗礼是什么意思| 摆子是什么意思| 荷兰机场叫什么| 儿童办理身份证需要什么材料| 八府巡按是什么官| 长骨刺是什么原因导致的| 改年龄需要什么手续| 铁锚是什么意思| 糖尿病为什么治不好| tfboys什么意思| 94年属什么今年多大| 为什么会突然流鼻血| 什么颜色加什么颜色是黑色| 刘邦字什么| 右束支传导阻滞是什么病| 1998年属虎是什么命| 凌波仙子指的是什么花| 掉头发去医院挂什么科| 彻夜难眠什么意思| 六月十六是什么星座| 吃止疼药有什么副作用| 女人是什么动物| 老年人腿脚无力是什么原因| 痰多是什么原因| 红色的蛇是什么蛇| 不寐病属于什么病症| er什么意思| 什么茶减肥| 可好是什么意思| 枸杞与菊花一起泡水喝有什么功效| 红颜是什么意思| 爱新觉罗改成什么姓了| 虫草适合什么人吃| 妊娠纹长什么样| 学五行属什么| 儿童感冒咳嗽吃什么药| 胃气上逆是什么原因| 广州有什么特产| 孕妇喝什么汤最好最有营养| 脑彩超能检查出什么| st是什么单位| 突兀什么意思| 米线是用什么做的| 腿毛长得快是什么原因| 画龙点睛是什么意思| 50年属什么生肖| 烂脚丫用什么药最好| 胸腔疼痛是什么原因| tea什么意思| 琛读什么| 产后大出血一般发生在什么时候| 疱疹是什么症状| 非营运车辆是什么意思| 隐翅虫长什么样子| 罗汉是什么意思| s和m是什么意思啊| 脚掉皮是什么原因| ami是什么| 马刺是什么| 什么不得| 瑞舒伐他汀什么时候吃最好| 蔻依属于什么档次| 印度以什么人种为主| 丙烯是什么| 2006年出生属什么| 芒果不能和什么一起吃| 1952属什么生肖| 六月二十六是什么日子| 米线和米粉有什么区别| 水痘疫苗叫什么| iruri 什么意思| 胆结石可以吃什么水果| 鸡鸣寺求什么| 甲状腺结节忌口什么| 拔苗助长是什么生肖| 11月17号是什么星座| 三分三是什么药| neu是什么意思| 温州有什么区| 梦见买衣服是什么预兆| 吃什么能丰胸| 马标志的车是什么牌子| 芒果是什么季节的水果| 女性阴毛变白是什么原因| 漠河什么时候可以看到极光| 什么是溺水| 女司机为什么开不好车| 抗原是什么| 梦见找鞋子是什么意思| 糖类抗原50是什么指标| 完美落幕是什么意思| 智力是什么意思| 空调多少匹什么意思| hvp阳性是什么病| 臭虫是什么| 慰安妇是什么| 免去职务是什么意思| 死党什么意思| 什么家庭养出自私冷漠| 县宣传部长是什么级别| 替代品是什么意思| 迪丽热巴的全名叫什么| 阳痿是什么| 屁股出血什么原因| 痛风病人吃什么菜| 盗墓笔记讲的是什么故事| 什么情况下要打破伤风| 什么药清肺化痰好| 什么是卵泡期| 怀孕是什么脉象| 莅临什么意思| kids是什么牌子| 两肋插刀是什么意思| 喝什么可以减肥瘦肚子| 摄入是什么意思| 喝啤酒吃什么菜最好| 牙痛是什么原因引起的| 血压高什么原因| 什么是素质教育| 吃盐吃多了有什么危害| 白蛋白高是什么原因| 早上10点是什么时辰| 好好好是什么语气| 小孩子不吃饭是什么原因引起的| 肠胃炎饮食要注意什么| 05年属什么| 吃火锅都吃什么菜| 舌尖发麻是什么原因| 进展是什么意思| 丙五行属什么| 产后抑郁一般发生在产后什么时间| 困惑是什么意思| 法令纹上的痣代表什么| 乳头很痒是什么原因| 冬练三九夏练三伏是什么意思| 喝苦荞茶对身体有什么好处| 万事如意是什么生肖| 阴阳失调是什么意思| 品检是做什么的| 火车头是什么意思| 右侧中耳乳突炎是什么意思| 辟谷什么意思| 流产是什么样子的| 肺的作用和功能是什么| 放我一个人生活是什么歌| 什么是辛辣刺激性食物| 穿丝袜有什么好处| 声音沙哑是什么原因| 台湾有什么特产最有名| 香蕉水是什么| 脖子痛什么原因引起的| 头伏二伏三伏吃什么| 眼底充血用什么眼药水| 无脑儿是什么意思| 走读是什么意思| 木驴是什么| 什么眼镜框最轻最舒服| 血氧饱和度低于90有什么危害| mg是什么元素| 体质是什么意思| 为什么会咳嗽| 黑便是什么原因| 巧克力和什么不能一起吃| 螺蛳粉为什么叫螺蛳粉| AMI是什么病| 路过是什么意思| 肠胃不好吃什么比较好| 足字旁的字有什么| 曼陀罗是什么| dp什么意思| 烫伤擦什么药膏| 肺与什么相表里| 金字是什么部首| 血压高要吃什么蔬菜能降血压| 股票杠杆是什么意思| 灰指甲用什么药效果好| 痔核是什么| 宾至如归是什么意思| 鹿土念什么| 两只小船儿孤孤零零是什么歌| 辟谷吃什么| 植物神经紊乱挂什么科| 头顶痛是什么原因| 睡眠不好去医院看什么科| 处女座跟什么星座最配| 打啵什么意思| 求婚是什么意思| 小节是什么意思| 梨子什么季节成熟| 蜂蜜喝了有什么好处| 产复欣颗粒什么时候吃| 胎盘是什么| 脚后跟干裂起硬皮用什么药| 平面模特是做什么的| c1是什么| 果脯是什么东西| 什么是失信被执行人| 牙龈长期出血是什么原因| homme是什么意思| 2018年生肖属什么| 工口什么意思| ped是什么意思| 发呆是什么意思| 莲白是什么菜| 阑尾炎是什么病| 贪小失大什么意思| 海马有什么功效作用| 铁蛋白偏高是什么原因| 是的什么意思| 为老不尊是什么意思| 禅茶一味什么意思| 午夜梦回是什么意思| 舌下含服是什么意思| 医保卡是什么样子的| 血压高呕吐是什么征兆| lv中文名叫什么| gp是什么的缩写| 品是什么意思| 宫颈炎用什么药物治疗比较好| 脖子淋巴结肿大是什么原因| 胱抑素c高是什么原因| 护手霜什么牌子的效果好| 什么草药能治痔疮| 拉谷谷女装什么档次的| 什么是横纹肌溶解症| 亚麻酸是什么东西| 是什么表情包| cri是什么意思| 前列腺增生伴钙化是什么意思| 黄瓜为什么会苦| 痢疾是什么原因引起的| 双侧附睾头囊肿是什么意思| 吃完杏不能吃什么| 神器积分换什么最划算| 什么叫上升星座| 头疼可以吃什么药| 经常晕车是什么原因| 石榴石是什么材质| 前庭功能检查是查什么| 什么是盐| 百度Jump to content

塔丝隆是什么面料

From Wikipedia, the free encyclopedia
百度 近日,王宝强离婚的消息仍在微信朋友圈持续发酵,令广大网友感叹明星家庭生活的不寻常。

Bloch sphere representation of a qubit. The state is a point on the surface of the sphere, partway between the poles, and .

A quantum computer is a (real or theoretical) computer that uses quantum mechanical phenomena in an essential way: a quantum computer exploits superposed and entangled states and the (non-deterministic) outcomes of quantum measurements as features of its computation. Ordinary ("classical") computers operate, by contrast, using deterministic rules. Any classical computer can, in principle, be replicated using a (classical) mechanical device such as a Turing machine, with at most a constant-factor slowdown in time—unlike quantum computers, which are believed to require exponentially more resources to simulate classically. It is widely believed that a scalable quantum computer could perform some calculations exponentially faster than any classical computer. Theoretically, a large-scale quantum computer could break some widely used encryption schemes and aid physicists in performing physical simulations. However, current hardware implementations of quantum computation are largely experimental and only suitable for specialized tasks.

The basic unit of information in quantum computing, the qubit (or "quantum bit"), serves the same function as the bit in ordinary or "classical" computing.[1] However, unlike a classical bit, which can be in one of two states (a binary), a qubit can exist in a superposition of its two "basis" states, a state that is in an abstract sense "between" the two basis states. When measuring a qubit, the result is a probabilistic output of a classical bit. If a quantum computer manipulates the qubit in a particular way, wave interference effects can amplify the desired measurement results. The design of quantum algorithms involves creating procedures that allow a quantum computer to perform calculations efficiently and quickly.

Quantum computers are not yet practical for real-world applications. Physically engineering high-quality qubits has proven to be challenging. If a physical qubit is not sufficiently isolated from its environment, it suffers from quantum decoherence, introducing noise into calculations. National governments have invested heavily in experimental research aimed at developing scalable qubits with longer coherence times and lower error rates. Example implementations include superconductors (which isolate an electrical current by eliminating electrical resistance) and ion traps (which confine a single atomic particle using electromagnetic fields). Researchers have demonstrated that certain quantum devices can outperform classical computers on narrowly defined tasks, a milestone referred to as quantum advantage (previously quantum supremacy), though these tasks are not necessarily useful for real-world applications.

History

[edit]

For many years, the fields of quantum mechanics and computer science formed distinct academic communities.[2] Modern quantum theory developed in the 1920s to explain perplexing physical phenomena observed at atomic scales,[3][4] and digital computers emerged in the following decades to replace human computers for tedious calculations.[5] Both disciplines had practical applications during World War II; computers played a major role in wartime cryptography,[6] and quantum physics was essential for nuclear physics used in the Manhattan Project.[7]

As physicists applied quantum mechanical models to computational problems and swapped digital bits for qubits, the fields of quantum mechanics and computer science began to converge. In 1980, Paul Benioff introduced the quantum Turing machine, which uses quantum theory to describe a simplified computer.[8] When digital computers became faster, physicists faced an exponential increase in overhead when simulating quantum dynamics,[9] prompting Yuri Manin and Richard Feynman to independently suggest that hardware based on quantum phenomena might be more efficient for computer simulation.[10][11][12] In a 1984 paper, Charles Bennett and Gilles Brassard applied quantum theory to cryptography protocols and demonstrated that quantum key distribution could enhance information security.[13][14]

Quantum algorithms then emerged for solving oracle problems, such as Deutsch's algorithm in 1985,[15] the Bernstein–Vazirani algorithm in 1993,[16] and Simon's algorithm in 1994.[17] These algorithms did not solve practical problems, but demonstrated mathematically that one could gain more information by querying a black box with a quantum state in superposition, sometimes referred to as quantum parallelism.[18]

Peter Shor (pictured here in 2017) showed in 1994 that a scalable quantum computer would be able to break RSA encryption.

Peter Shor built on these results with his 1994 algorithm for breaking the widely used RSA and Diffie–Hellman encryption protocols,[19] which drew significant attention to the field of quantum computing. In 1996, Grover's algorithm established a quantum speedup for the widely applicable unstructured search problem.[20][21] The same year, Seth Lloyd proved that quantum computers could simulate quantum systems without the exponential overhead present in classical simulations,[22] validating Feynman's 1982 conjecture.[23]

Over the years, experimentalists have constructed small-scale quantum computers using trapped ions and superconductors.[24] In 1998, a two-qubit quantum computer demonstrated the feasibility of the technology,[25][26] and subsequent experiments have increased the number of qubits and reduced error rates.[24]

In 2019, Google AI and NASA announced that they had achieved quantum supremacy with a 54-qubit machine, performing a computation that is impossible for any classical computer.[27][28][29] [30]

This announcement was met with a rebuttal from Google's direct competitor, IBM. IBM contended that the calculation Google claimed would take 10,000 years could be performed in just 2.5 days on its own Summit supercomputer if its architecture were optimized, sparking a debate over the precise threshold for "quantum supremacy".[31]

Quantum information processing

[edit]

Computer engineers typically describe a modern computer's operation in terms of classical electrodynamics. Within these "classical" computers, some components (such as semiconductors and random number generators) may rely on quantum behavior, but these components are not isolated from their environment, so any quantum information quickly decoheres. While programmers may depend on probability theory when designing a randomized algorithm, quantum mechanical notions like superposition and interference are largely irrelevant for program analysis.

Quantum programs, in contrast, rely on precise control of coherent quantum systems. Physicists describe these systems mathematically using linear algebra. Complex numbers model probability amplitudes, vectors model quantum states, and matrices model the operations that can be performed on these states. Programming a quantum computer is then a matter of composing operations in such a way that the resulting program computes a useful result in theory and is implementable in practice.

As physicist Charlie Bennett describes the relationship between quantum and classical computers,[32]

A classical computer is a quantum computer ... so we shouldn't be asking about "where do quantum speedups come from?" We should say, "well, all computers are quantum. ... Where do classical slowdowns come from?"

Quantum information

[edit]

Just as the bit is the basic concept of classical information theory, the qubit is the fundamental unit of quantum information. The same term qubit is used to refer to an abstract mathematical model and to any physical system that is represented by that model. A classical bit, by definition, exists in either of two physical states, which can be denoted 0 and 1. A qubit is also described by a state, and two states often written and serve as the quantum counterparts of the classical states 0 and 1. However, the quantum states and belong to a vector space, meaning that they can be multiplied by constants and added together, and the result is again a valid quantum state. Such a combination is known as a superposition of and .[33][34]

A two-dimensional vector mathematically represents a qubit state. Physicists typically use Dirac notation for quantum mechanical linear algebra, writing 'ket psi' for a vector labeled . Because a qubit is a two-state system, any qubit state takes the form , where and are the standard basis states,[a] and and are the probability amplitudes, which are in general complex numbers.[34] If either or is zero, the qubit is effectively a classical bit; when both are nonzero, the qubit is in superposition. Such a quantum state vector acts similarly to a (classical) probability vector, with one key difference: unlike probabilities, probability amplitudes are not necessarily positive numbers.[36] Negative amplitudes allow for destructive wave interference.

When a qubit is measured in the standard basis, the result is a classical bit. The Born rule describes the norm-squared correspondence between amplitudes and probabilities—when measuring a qubit , the state collapses to with probability , or to with probability . Any valid qubit state has coefficients and such that . As an example, measuring the qubit would produce either or with equal probability.

Each additional qubit doubles the dimension of the state space.[35] As an example, the vector ?1/√2?|00? + ?1/√2?|01? represents a two-qubit state, a tensor product of the qubit |0? with the qubit ?1/√2?|0? + ?1/√2?|1?. This vector inhabits a four-dimensional vector space spanned by the basis vectors |00?, |01?, |10?, and |11?. The Bell state ?1/√2?|00? + ?1/√2?|11? is impossible to decompose into the tensor product of two individual qubits—the two qubits are entangled because neither qubit has a state vector of its own. In general, the vector space for an n-qubit system is 2n-dimensional, and this makes it challenging for a classical computer to simulate a quantum one: representing a 100-qubit system requires storing 2100 classical values.

Unitary operators

[edit]

The state of this one-qubit quantum memory can be manipulated by applying quantum logic gates, analogous to how classical memory can be manipulated with classical logic gates. One important gate for both classical and quantum computation is the NOT gate, which can be represented by a matrix Mathematically, the application of such a logic gate to a quantum state vector is modelled with matrix multiplication. Thus

and .

The mathematics of single qubit gates can be extended to operate on multi-qubit quantum memories in two important ways. One way is simply to select a qubit and apply that gate to the target qubit while leaving the remainder of the memory unaffected. Another way is to apply the gate to its target only if another part of the memory is in a desired state. These two choices can be illustrated using another example. The possible states of a two-qubit quantum memory are The controlled NOT (CNOT) gate can then be represented using the following matrix: As a mathematical consequence of this definition, , , , and . In other words, the CNOT applies a NOT gate ( from before) to the second qubit if and only if the first qubit is in the state . If the first qubit is , nothing is done to either qubit.

In summary, quantum computation can be described as a network of quantum logic gates and measurements. However, any measurement can be deferred to the end of quantum computation, though this deferment may come at a computational cost, so most quantum circuits depict a network consisting only of quantum logic gates and no measurements.

Quantum parallelism

[edit]

Quantum parallelism is the heuristic that quantum computers can be thought of as evaluating a function for multiple input values simultaneously. This can be achieved by preparing a quantum system in a superposition of input states and applying a unitary transformation that encodes the function to be evaluated. The resulting state encodes the function's output values for all input values in the superposition, allowing for the computation of multiple outputs simultaneously. This property is key to the speedup of many quantum algorithms. However, "parallelism" in this sense is insufficient to speed up a computation, because the measurement at the end of the computation gives only one value. To be useful, a quantum algorithm must also incorporate some other conceptual ingredient.[37][38]

Quantum programming

[edit]

There are a number of models of computation for quantum computing, distinguished by the basic elements in which the computation is decomposed.

Gate array

[edit]
A quantum circuit diagram implementing a Toffoli gate from more primitive gates

A quantum gate array decomposes computation into a sequence of few-qubit quantum gates. A quantum computation can be described as a network of quantum logic gates and measurements. However, any measurement can be deferred to the end of quantum computation, though this deferment may come at a computational cost, so most quantum circuits depict a network consisting only of quantum logic gates and no measurements.

Any quantum computation (which is, in the above formalism, any unitary matrix of size over qubits) can be represented as a network of quantum logic gates from a fairly small family of gates. A choice of gate family that enables this construction is known as a universal gate set, since a computer that can run such circuits is a universal quantum computer. One common such set includes all single-qubit gates as well as the CNOT gate from above. This means any quantum computation can be performed by executing a sequence of single-qubit gates together with CNOT gates. Though this gate set is infinite, it can be replaced with a finite gate set by appealing to the Solovay-Kitaev theorem. Implementation of Boolean functions using the few-qubit quantum gates is presented here.[39]

Measurement-based quantum computing

[edit]

A measurement-based quantum computer decomposes computation into a sequence of Bell state measurements and single-qubit quantum gates applied to a highly entangled initial state (a cluster state), using a technique called quantum gate teleportation.

Adiabatic quantum computing

[edit]

An adiabatic quantum computer, based on quantum annealing, decomposes computation into a slow continuous transformation of an initial Hamiltonian into a final Hamiltonian, whose ground states contain the solution.[40]

Neuromorphic quantum computing

[edit]

Neuromorphic quantum computing (abbreviated as 'n.quantum computing') is an unconventional type of computing that uses neuromorphic computing to perform quantum operations. It was suggested that quantum algorithms, which are algorithms that run on a realistic model of quantum computation, can be computed equally efficiently with neuromorphic quantum computing. Both traditional quantum computing and neuromorphic quantum computing are physics-based unconventional computing approaches to computations and do not follow the von Neumann architecture. They both construct a system (a circuit) that represents the physical problem at hand and then leverage their respective physics properties of the system to seek the "minimum". Neuromorphic quantum computing and quantum computing share similar physical properties during computation.

Topological quantum computing

[edit]

A topological quantum computer decomposes computation into the braiding of anyons in a 2D lattice.[41]

Quantum Turing machine

[edit]

A quantum Turing machine is the quantum analog of a Turing machine.[8] All of these models of computation—quantum circuits,[42] one-way quantum computation,[43] adiabatic quantum computation,[44] and topological quantum computation[45]—have been shown to be equivalent to the quantum Turing machine; given a perfect implementation of one such quantum computer, it can simulate all the others with no more than polynomial overhead. This equivalence need not hold for practical quantum computers, since the overhead of simulation may be too large to be practical.

Noisy intermediate-scale quantum computing

[edit]

The threshold theorem shows how increasing the number of qubits can mitigate errors,[46] yet fully fault-tolerant quantum computing remains "a rather distant dream".[47] According to some researchers, noisy intermediate-scale quantum (NISQ) machines may have specialized uses in the near future, but noise in quantum gates limits their reliability.[47] Scientists at Harvard University successfully created "quantum circuits" that correct errors more efficiently than alternative methods, which may potentially remove a major obstacle to practical quantum computers.[48] The Harvard research team was supported by MIT, QuEra Computing, Caltech, and Princeton University and funded by DARPA's Optimization with Noisy Intermediate-Scale Quantum devices (ONISQ) program.[49][50]

Quantum cryptography and cybersecurity

[edit]

Quantum computing has significant potential applications in the fields of cryptography and cybersecurity. Quantum cryptography, which leverages the principles of quantum mechanics, offers the possibility of secure communication channels that are fundamentally resistant to eavesdropping. Quantum key distribution (QKD) protocols, such as BB84, enable the secure exchange of cryptographic keys between parties, ensuring the confidentiality and integrity of communication. Additionally, quantum random number generators (QRNGs) can produce high-quality randomness, which is essential for secure encryption.

At the same time, quantum computing poses substantial challenges to traditional cryptographic systems. Shor's algorithm, a quantum algorithm for integer factorization, could potentially break widely used public-key encryption schemes like RSA, which rely on the intractability of factoring large numbers. This has prompted a global effort to develop post-quantum cryptography—algorithms designed to resist both classical and quantum attacks. This field remains an active area of research and standardization, aiming to future-proof critical infrastructure against quantum-enabled threats.

Ongoing research in quantum and post-quantum cryptography will be critical for maintaining the integrity of digital infrastructure. Advances such as new QKD protocols, improved QRNGs, and the international standardization of quantum-resistant algorithms will play a key role in ensuring the security of communication and data in the emerging quantum era.[51]

Quantum computing also presents broader systemic and geopolitical risks. These include the potential to break current encryption protocols, disrupt financial systems, and accelerate the development of dual-use technologies such as advanced military systems or engineered pathogens. As a result, nations and corporations are actively investing in post-quantum safeguards, and the race for quantum supremacy is increasingly shaping global power dynamics.[52]

Communication

[edit]

Quantum cryptography enables new ways to transmit data securely; for example, quantum key distribution uses entangled quantum states to establish secure cryptographic keys.[53] When a sender and receiver exchange quantum states, they can guarantee that an adversary does not intercept the message, as any unauthorized eavesdropper would disturb the delicate quantum system and introduce a detectable change.[54] With appropriate cryptographic protocols, the sender and receiver can thus establish shared private information resistant to eavesdropping.[13][55]

Modern fiber-optic cables can transmit quantum information over relatively short distances. Ongoing experimental research aims to develop more reliable hardware (such as quantum repeaters), hoping to scale this technology to long-distance quantum networks with end-to-end entanglement. Theoretically, this could enable novel technological applications, such as distributed quantum computing and enhanced quantum sensing.[56][57]

Algorithms

[edit]

Progress in finding quantum algorithms typically focuses on this quantum circuit model, though exceptions like the quantum adiabatic algorithm exist. Quantum algorithms can be roughly categorized by the type of speedup achieved over corresponding classical algorithms.[58]

Quantum algorithms that offer more than a polynomial speedup over the best-known classical algorithm include Shor's algorithm for factoring and the related quantum algorithms for computing discrete logarithms, solving Pell's equation, and more generally solving the hidden subgroup problem for abelian finite groups.[58] These algorithms depend on the primitive of the quantum Fourier transform. No mathematical proof has been found that shows that an equally fast classical algorithm cannot be discovered, but evidence suggests that this is unlikely.[59] Certain oracle problems like Simon's problem and the Bernstein–Vazirani problem do give provable speedups, though this is in the quantum query model, which is a restricted model where lower bounds are much easier to prove and doesn't necessarily translate to speedups for practical problems.

Other problems, including the simulation of quantum physical processes from chemistry and solid-state physics, the approximation of certain Jones polynomials, and the quantum algorithm for linear systems of equations, have quantum algorithms appearing to give super-polynomial speedups and are BQP-complete. Because these problems are BQP-complete, an equally fast classical algorithm for them would imply that no quantum algorithm gives a super-polynomial speedup, which is believed to be unlikely.[60]

Some quantum algorithms, like Grover's algorithm and amplitude amplification, give polynomial speedups over corresponding classical algorithms.[58] Though these algorithms give comparably modest quadratic speedup, they are widely applicable and thus give speedups for a wide range of problems.[21]

Simulation of quantum systems

[edit]

Since chemistry and nanotechnology rely on understanding quantum systems, and such systems are impossible to simulate in an efficient manner classically, quantum simulation may be an important application of quantum computing.[61] Quantum simulation could also be used to simulate the behavior of atoms and particles at unusual conditions such as the reactions inside a collider.[62] In June 2023, IBM computer scientists reported that a quantum computer produced better results for a physics problem than a conventional supercomputer.[63][64]

About 2% of the annual global energy output is used for nitrogen fixation to produce ammonia for the Haber process in the agricultural fertilizer industry (even though naturally occurring organisms also produce ammonia). Quantum simulations might be used to understand this process and increase the energy efficiency of production.[65] It is expected that an early use of quantum computing will be modeling that improves the efficiency of the Haber–Bosch process[66] by the mid-2020s[67] although some have predicted it will take longer.[68]

Post-quantum cryptography

[edit]

A notable application of quantum computation is for attacks on cryptographic systems that are currently in use. Integer factorization, which underpins the security of public key cryptographic systems, is believed to be computationally infeasible with an ordinary computer for large integers if they are the product of few prime numbers (e.g., products of two 300-digit primes).[69] By comparison, a quantum computer could solve this problem exponentially faster using Shor's algorithm to find its factors.[70] This ability would allow a quantum computer to break many of the cryptographic systems in use today, in the sense that there would be a polynomial time (in the number of digits of the integer) algorithm for solving the problem. In particular, most of the popular public key ciphers are based on the difficulty of factoring integers or the discrete logarithm problem, both of which can be solved by Shor's algorithm. In particular, the RSA, Diffie–Hellman, and elliptic curve Diffie–Hellman algorithms could be broken. These are used to protect secure Web pages, encrypted email, and many other types of data. Breaking these would have significant ramifications for electronic privacy and security.

Identifying cryptographic systems that may be secure against quantum algorithms is an actively researched topic under the field of post-quantum cryptography.[71][72] Some public-key algorithms are based on problems other than the integer factorization and discrete logarithm problems to which Shor's algorithm applies, like the McEliece cryptosystem based on a problem in coding theory.[71][73] Lattice-based cryptosystems are also not known to be broken by quantum computers, and finding a polynomial time algorithm for solving the dihedral hidden subgroup problem, which would break many lattice based cryptosystems, is a well-studied open problem.[74] It has been proven that applying Grover's algorithm to break a symmetric (secret key) algorithm by brute force requires time equal to roughly 2n/2 invocations of the underlying cryptographic algorithm, compared with roughly 2n in the classical case,[75] meaning that symmetric key lengths are effectively halved: AES-256 would have the same security against an attack using Grover's algorithm that AES-128 has against classical brute-force search (see Key size).

Search problems

[edit]

The most well-known example of a problem that allows for a polynomial quantum speedup is unstructured search, which involves finding a marked item out of a list of items in a database. This can be solved by Grover's algorithm using queries to the database, quadratically fewer than the queries required for classical algorithms. In this case, the advantage is not only provable but also optimal: it has been shown that Grover's algorithm gives the maximal possible probability of finding the desired element for any number of oracle lookups. Many examples of provable quantum speedups for query problems are based on Grover's algorithm, including Brassard, H?yer, and Tapp's algorithm for finding collisions in two-to-one functions,[76] and Farhi, Goldstone, and Gutmann's algorithm for evaluating NAND trees.[77]

Problems that can be efficiently addressed with Grover's algorithm have the following properties:[78][79]

  1. There is no searchable structure in the collection of possible answers,
  2. The number of possible answers to check is the same as the number of inputs to the algorithm, and
  3. There exists a Boolean function that evaluates each input and determines whether it is the correct answer.

For problems with all these properties, the running time of Grover's algorithm on a quantum computer scales as the square root of the number of inputs (or elements in the database), as opposed to the linear scaling of classical algorithms. A general class of problems to which Grover's algorithm can be applied[80] is a Boolean satisfiability problem, where the database through which the algorithm iterates is that of all possible answers. An example and possible application of this is a password cracker that attempts to guess a password. Breaking symmetric ciphers with this algorithm is of interest to government agencies.[81]

Quantum annealing

[edit]

Quantum annealing relies on the adiabatic theorem to undertake calculations. A system is placed in the ground state for a simple Hamiltonian, which slowly evolves to a more complicated Hamiltonian whose ground state represents the solution to the problem in question. The adiabatic theorem states that if the evolution is slow enough the system will stay in its ground state at all times through the process. Quantum annealing can solve Ising models and the (computationally equivalent) QUBO problem, which in turn can be used to encode a wide range of combinatorial optimization problems.[82] Adiabatic optimization may be helpful for solving computational biology problems.[83]

Machine learning

[edit]

Since quantum computers can produce outputs that classical computers cannot produce efficiently, and since quantum computation is fundamentally linear algebraic, some express hope in developing quantum algorithms that can speed up machine learning tasks.[47][84]

For example, the HHL Algorithm, named after its discoverers Harrow, Hassidim, and Lloyd, is believed to provide speedup over classical counterparts.[47][85] Some research groups have recently explored the use of quantum annealing hardware for training Boltzmann machines and deep neural networks.[86][87][88]

Deep generative chemistry models emerge as powerful tools to expedite drug discovery. However, the immense size and complexity of the structural space of all possible drug-like molecules pose significant obstacles, which could be overcome in the future by quantum computers. Quantum computers are naturally good for solving complex quantum many-body problems[22] and thus may be instrumental in applications involving quantum chemistry. Therefore, one can expect that quantum-enhanced generative models[89] including quantum GANs[90] may eventually be developed into ultimate generative chemistry algorithms.

Engineering

[edit]
A wafer of adiabatic quantum computers

As of 2023, classical computers outperform quantum computers for all real-world applications. While current quantum computers may speed up solutions to particular mathematical problems, they give no computational advantage for practical tasks. Scientists and engineers are exploring multiple technologies for quantum computing hardware and hope to develop scalable quantum architectures, but serious obstacles remain.[91][92]

Challenges

[edit]

There are a number of technical challenges in building a large-scale quantum computer.[93] Physicist David DiVincenzo has listed these requirements for a practical quantum computer:[94]

  • Physically scalable to increase the number of qubits
  • Qubits that can be initialized to arbitrary values
  • Quantum gates that are faster than decoherence time
  • Universal gate set
  • Qubits that can be read easily.

Sourcing parts for quantum computers is also very difficult. Superconducting quantum computers, like those constructed by Google and IBM, need helium-3, a nuclear research byproduct, and special superconducting cables made only by the Japanese company Coax Co.[95]

The control of multi-qubit systems requires the generation and coordination of a large number of electrical signals with tight and deterministic timing resolution. This has led to the development of quantum controllers that enable interfacing with the qubits. Scaling these systems to support a growing number of qubits is an additional challenge.[96]

Decoherence

[edit]

One of the greatest challenges involved in constructing quantum computers is controlling or removing quantum decoherence. This usually means isolating the system from its environment as interactions with the external world cause the system to decohere. However, other sources of decoherence also exist. Examples include the quantum gates and the lattice vibrations and background thermonuclear spin of the physical system used to implement the qubits. Decoherence is irreversible, as it is effectively non-unitary, and is usually something that should be highly controlled, if not avoided. Decoherence times for candidate systems in particular, the transverse relaxation time T2 (for NMR and MRI technology, also called the dephasing time), typically range between nanoseconds and seconds at low temperatures.[97] Currently, some quantum computers require their qubits to be cooled to 20 millikelvin (usually using a dilution refrigerator[98]) in order to prevent significant decoherence.[99] A 2020 study argues that ionizing radiation such as cosmic rays can nevertheless cause certain systems to decohere within milliseconds.[100]

As a result, time-consuming tasks may render some quantum algorithms inoperable, as attempting to maintain the state of qubits for a long enough duration will eventually corrupt the superpositions.[101]

These issues are more difficult for optical approaches as the timescales are orders of magnitude shorter and an often-cited approach to overcoming them is optical pulse shaping. Error rates are typically proportional to the ratio of operating time to decoherence time; hence any operation must be completed much more quickly than the decoherence time.

As described by the threshold theorem, if the error rate is small enough, it is thought to be possible to use quantum error correction to suppress errors and decoherence. This allows the total calculation time to be longer than the decoherence time if the error correction scheme can correct errors faster than decoherence introduces them. An often-cited figure for the required error rate in each gate for fault-tolerant computation is 10?3, assuming the noise is depolarizing.

Meeting this scalability condition is possible for a wide range of systems. However, the use of error correction brings with it the cost of a greatly increased number of required qubits. The number required to factor integers using Shor's algorithm is still polynomial, and thought to be between L and L2, where L is the number of binary digits in the number to be factored; error correction algorithms would inflate this figure by an additional factor of L. For a 1000-bit number, this implies a need for about 104 bits without error correction.[102] With error correction, the figure would rise to about 107 bits. Computation time is about L2 or about 107 steps and at 1 MHz, about 10 seconds. However, the encoding and error-correction overheads increase the size of a real fault-tolerant quantum computer by several orders of magnitude. Careful estimates[103][104] show that at least 3 million physical qubits would factor 2,048-bit integer in 5 months on a fully error-corrected trapped-ion quantum computer. In terms of the number of physical qubits, to date, this remains the lowest estimate[105] for practically useful integer factorization problem sizing 1,024-bit or larger.

Another approach to the stability-decoherence problem is to create a topological quantum computer with anyons, quasi-particles used as threads, and relying on braid theory to form stable logic gates.[106][107] Non-Abelian anyons can, in effect, remember how they have been manipulated, making the potentially useful in quantum computing.[108] As of 2025, Microsoft and other organizations are investing in quasi-particle research.[108]

Quantum supremacy

[edit]

Physicist John Preskill coined the term quantum supremacy to describe the engineering feat of demonstrating that a programmable quantum device can solve a problem beyond the capabilities of state-of-the-art classical computers.[109][110][111] The problem need not be useful, so some view the quantum supremacy test only as a potential future benchmark.[112]

In October 2019, Google AI Quantum, with the help of NASA, became the first to claim to have achieved quantum supremacy by performing calculations on the Sycamore quantum computer more than 3,000,000 times faster than they could be done on Summit, generally considered the world's fastest computer.[28][113][114] This claim has been subsequently challenged: IBM has stated that Summit can perform samples much faster than claimed,[115][116] and researchers have since developed better algorithms for the sampling problem used to claim quantum supremacy, giving substantial reductions to the gap between Sycamore and classical supercomputers[117][118][119] and even beating it.[120][121][122]

In December 2020, a group at USTC implemented a type of Boson sampling on 76 photons with a photonic quantum computer, Jiuzhang, to demonstrate quantum supremacy.[123][124][125] The authors claim that a classical contemporary supercomputer would require a computational time of 600 million years to generate the number of samples their quantum processor can generate in 20 seconds.[126]

Claims of quantum supremacy have generated hype around quantum computing,[127] but they are based on contrived benchmark tasks that do not directly imply useful real-world applications.[91][128]

In January 2024, a study published in Physical Review Letters provided direct verification of quantum supremacy experiments by computing exact amplitudes for experimentally generated bitstrings using a new-generation Sunway supercomputer, demonstrating a significant leap in simulation capability built on a multiple-amplitude tensor network contraction algorithm. This development underscores the evolving landscape of quantum computing, highlighting both the progress and the complexities involved in validating quantum supremacy claims.[129]

Skepticism

[edit]

Despite high hopes for quantum computing, significant progress in hardware, and optimism about future applications, a 2023 Nature spotlight article summarized current quantum computers as being "For now, [good for] absolutely nothing".[91] The article elaborated that quantum computers are yet to be more useful or efficient than conventional computers in any case, though it also argued that in the long term such computers are likely to be useful. A 2023 Communications of the ACM article[92] found that current quantum computing algorithms are "insufficient for practical quantum advantage without significant improvements across the software/hardware stack". It argues that the most promising candidates for achieving speedup with quantum computers are "small-data problems", for example in chemistry and materials science. However, the article also concludes that a large range of the potential applications it considered, such as machine learning, "will not achieve quantum advantage with current quantum algorithms in the foreseeable future", and it identified I/O constraints that make speedup unlikely for "big data problems, unstructured linear systems, and database search based on Grover's algorithm".

This state of affairs can be traced to several current and long-term considerations.

  • Conventional computer hardware and algorithms are not only optimized for practical tasks, but are still improving rapidly, particularly GPU accelerators.
  • Current quantum computing hardware generates only a limited amount of entanglement before getting overwhelmed by noise.
  • Quantum algorithms provide speedup over conventional algorithms only for some tasks, and matching these tasks with practical applications proved challenging. Some promising tasks and applications require resources far beyond those available today.[130][131] In particular, processing large amounts of non-quantum data is a challenge for quantum computers.[92]
  • Some promising algorithms have been "dequantized", i.e., their non-quantum analogues with similar complexity have been found.
  • If quantum error correction is used to scale quantum computers to practical applications, its overhead may undermine speedup offered by many quantum algorithms.[92]
  • Complexity analysis of algorithms sometimes makes abstract assumptions that do not hold in applications. For example, input data may not already be available encoded in quantum states, and "oracle functions" used in Grover's algorithm often have internal structure that can be exploited for faster algorithms.

In particular, building computers with large numbers of qubits may be futile if those qubits are not connected well enough and cannot maintain sufficiently high degree of entanglement for a long time. When trying to outperform conventional computers, quantum computing researchers often look for new tasks that can be solved on quantum computers, but this leaves the possibility that efficient non-quantum techniques will be developed in response, as seen for Quantum supremacy demonstrations. Therefore, it is desirable to prove lower bounds on the complexity of best possible non-quantum algorithms (which may be unknown) and show that some quantum algorithms asymptomatically improve upon those bounds.

Bill Unruh doubted the practicality of quantum computers in a paper published in 1994.[132] Paul Davies argued that a 400-qubit computer would even come into conflict with the cosmological information bound implied by the holographic principle.[133] Skeptics like Gil Kalai doubt that quantum supremacy will ever be achieved.[134][135][136] Physicist Mikhail Dyakonov has expressed skepticism of quantum computing as follows:

"So the number of continuous parameters describing the state of such a useful quantum computer at any given moment must be... about 10300... Could we ever learn to control the more than 10300 continuously variable parameters defining the quantum state of such a system? My answer is simple. No, never."[137]

Physical realizations

[edit]
Quantum System One, a quantum computer by IBM from 2019 with 20 superconducting qubits[138]

A practical quantum computer must use a physical system as a programmable quantum register.[139] Researchers are exploring several technologies as candidates for reliable qubit implementations.[140] Superconductors and trapped ions are some of the most developed proposals, but experimentalists are considering other hardware possibilities as well.[141] For example, topological quantum computer approaches are being explored for more fault-tolerance computing systems.[142]

The first quantum logic gates were implemented with trapped ions and prototype general purpose machines with up to 20 qubits have been realized. However, the technology behind these devices combines complex vacuum equipment, lasers, microwave and radio frequency equipment making full scale processors difficult to integrate with standard computing equipment. Moreover, the trapped ion system itself has engineering challenges to overcome.[143]

The largest commercial systems are based on superconductor devices and have scaled to 2000 qubits. However, the error rates for larger machines have been on the order of 5%. Technologically these devices are all cryogenic and scaling to large numbers of qubits requires wafer-scale integration, a serious engineering challenge by itself.[144]

Potential applications

[edit]

With focus on business management's point of view, the potential applications of quantum computing into four major categories are cybersecurity, data analytics and artificial intelligence, optimization and simulation, and data management and searching.[145]

Other applications include healthcare (ie. drug discovery), financial modeling, and natural language processing. [146]

Theory

[edit]

Computability

[edit]

Any computational problem solvable by a classical computer is also solvable by a quantum computer.[147] Intuitively, this is because it is believed that all physical phenomena, including the operation of classical computers, can be described using quantum mechanics, which underlies the operation of quantum computers.

Conversely, any problem solvable by a quantum computer is also solvable by a classical computer. It is possible to simulate both quantum and classical computers manually with just some paper and a pen, if given enough time. More formally, any quantum computer can be simulated by a Turing machine. In other words, quantum computers provide no additional power over classical computers in terms of computability. This means that quantum computers cannot solve undecidable problems like the halting problem, and the existence of quantum computers does not disprove the Church–Turing thesis.[148]

Complexity

[edit]

While quantum computers cannot solve any problems that classical computers cannot already solve, it is suspected that they can solve certain problems faster than classical computers. For instance, it is known that quantum computers can efficiently factor integers, while this is not believed to be the case for classical computers.

The class of problems that can be efficiently solved by a quantum computer with bounded error is called BQP, for "bounded error, quantum, polynomial time". More formally, BQP is the class of problems that can be solved by a polynomial-time quantum Turing machine with an error probability of at most 1/3. As a class of probabilistic problems, BQP is the quantum counterpart to BPP ("bounded error, probabilistic, polynomial time"), the class of problems that can be solved by polynomial-time probabilistic Turing machines with bounded error.[149] It is known that and is widely suspected that , which intuitively would mean that quantum computers are more powerful than classical computers in terms of time complexity.[150]

The suspected relationship of BQP to several classical complexity classes[60]

The exact relationship of BQP to P, NP, and PSPACE is not known. However, it is known that ; that is, all problems that can be efficiently solved by a deterministic classical computer can also be efficiently solved by a quantum computer, and all problems that can be efficiently solved by a quantum computer can also be solved by a deterministic classical computer with polynomial space resources. It is further suspected that BQP is a strict superset of P, meaning there are problems that are efficiently solvable by quantum computers that are not efficiently solvable by deterministic classical computers. For instance, integer factorization and the discrete logarithm problem are known to be in BQP and are suspected to be outside of P. On the relationship of BQP to NP, little is known beyond the fact that some NP problems that are believed not to be in P are also in BQP (integer factorization and the discrete logarithm problem are both in NP, for example). It is suspected that ; that is, it is believed that there are efficiently checkable problems that are not efficiently solvable by a quantum computer. As a direct consequence of this belief, it is also suspected that BQP is disjoint from the class of NP-complete problems (if an NP-complete problem were in BQP, then it would follow from NP-hardness that all problems in NP are in BQP).[151]

See also

[edit]

Notes

[edit]
  1. ^ The standard basis is also the computational basis.[35]

Quantum computers are now being used in production environments like telecom and pharmaceuticals.[152]

Sources

[edit]
  • Aaronson, Scott (2013). Quantum Computing Since Democritus. Cambridge University Press. doi:10.1017/CBO9780511979309. ISBN 978-0-521-19956-8. OCLC 829706638.
  • Grumbling, Emily; Horowitz, Mark, eds. (2019). Quantum Computing: Progress and Prospects. Washington, DC: The National Academies Press. doi:10.17226/25196. ISBN 978-0-309-47970-7. OCLC 1091904777. S2CID 125635007.
  • Mermin, N. David (2007). Quantum Computer Science: An Introduction. doi:10.1017/CBO9780511813870. ISBN 978-0-511-34258-5. OCLC 422727925.
  • Nielsen, Michael; Chuang, Isaac (2010). Quantum Computation and Quantum Information (10th anniversary ed.). doi:10.1017/CBO9780511976667. ISBN 978-0-511-99277-3. OCLC 700706156. S2CID 59717455.
  • Shor, Peter W. (1994). Algorithms for Quantum Computation: Discrete Logarithms and Factoring. Symposium on Foundations of Computer Science. Santa Fe, New Mexico: IEEE. pp. 124–134. doi:10.1109/SFCS.1994.365700. ISBN 978-0-8186-6580-6.

Further reading

[edit]

Textbooks

[edit]

Academic papers

[edit]
[edit]
Lectures
  1. ^ Mermin 2007, p. 1.
  2. ^ Aaronson 2013, p. 132.
  3. ^ Zwiebach, Barton (2022). Mastering Quantum Mechanics: Essentials, Theory, and Applications. MIT Press. §1. ISBN 978-0-262-04613-8. Quantum physics has replaced classical physics as the correct fundamental description of our physical universe. It is used routinely to describe most phenomena that occur at short distances. [...] The era of quantum physics began in earnest in 1925 with the discoveries of Erwin Schr?dinger and Werner Heisenberg. The seeds for these discoveries were planted by Max Planck, Albert Einstein, Niels Bohr, Louis de Broglie, and others.
  4. ^ Weinberg, Steven (2015). "Historical Introduction". Lectures on Quantum Mechanics (2nd ed.). Cambridge University Press. pp. 1–30. ISBN 978-1-107-11166-0.
  5. ^ Ceruzzi, Paul E. (2012). Computing: A Concise History. Cambridge, Massachusetts: MIT Press. pp. 3, 46. ISBN 978-0-262-31038-3. OCLC 796812982.
  6. ^ Hodges, Andrew (2014). Alan Turing: The Enigma. Princeton, New Jersey: Princeton University Press. p. xviii. ISBN 9780691164724.
  7. ^ M?rtensson-Pendrill, Ann-Marie (1 November 2006). "The Manhattan project—a part of physics history". Physics Education. 41 (6): 493–501. Bibcode:2006PhyEd..41..493M. doi:10.1088/0031-9120/41/6/001. ISSN 0031-9120. S2CID 120294023.
  8. ^ a b Benioff, Paul (1980). "The computer as a physical system: A microscopic quantum mechanical Hamiltonian model of computers as represented by Turing machines". Journal of Statistical Physics. 22 (5): 563–591. Bibcode:1980JSP....22..563B. doi:10.1007/bf01011339. S2CID 122949592.
  9. ^ Buluta, Iulia; Nori, Franco (2 October 2009). "Quantum Simulators". Science. 326 (5949): 108–111. Bibcode:2009Sci...326..108B. doi:10.1126/science.1177838. ISSN 0036-8075. PMID 19797653. S2CID 17187000.
  10. ^ Manin, Yu. I. (1980). Vychislimoe i nevychislimoe [Computable and Noncomputable] (in Russian). Soviet Radio. pp. 13–15. Archived from the original on 10 May 2013. Retrieved 4 March 2013.
  11. ^ Feynman, Richard (June 1982). "Simulating Physics with Computers" (PDF). International Journal of Theoretical Physics. 21 (6/7): 467–488. Bibcode:1982IJTP...21..467F. doi:10.1007/BF02650179. S2CID 124545445. Archived from the original (PDF) on 8 January 2019. Retrieved 28 February 2019.
  12. ^ Nielsen & Chuang 2010, p. 214.
  13. ^ a b Bennett, C. H.; Brassard, G. (1984). "Quantum cryptography: Public key distribution and coin tossing". Proceedings of the International Conference on Computers, Systems & Signal Processing, Bangalore, India. Vol. 1. New York: IEEE. pp. 175–179. Reprinted as Bennett, C. H.; Brassard, G. (4 December 2014). "Quantum cryptography: Public key distribution and coin tossing". Theoretical Computer Science. Theoretical Aspects of Quantum Cryptography – celebrating 30 years of BB84. 560 (1): 7–11. arXiv:2003.06557. doi:10.1016/j.tcs.2014.05.025.
  14. ^ Brassard, G. (2005). "Brief history of quantum cryptography: A personal perspective". IEEE Information Theory Workshop on Theory and Practice in Information-Theoretic Security, 2005. Awaji Island, Japan: IEEE. pp. 19–23. arXiv:quant-ph/0604072. doi:10.1109/ITWTPI.2005.1543949. ISBN 978-0-7803-9491-9. S2CID 16118245.
  15. ^ Deutsch, D. (8 July 1985). "Quantum theory, the Church–Turing principle and the universal quantum computer". Proceedings of the Royal Society of London. A. Mathematical and Physical Sciences. 400 (1818): 97–117. Bibcode:1985RSPSA.400...97D. doi:10.1098/rspa.1985.0070. ISSN 0080-4630. S2CID 1438116.
  16. ^ Bernstein, Ethan; Vazirani, Umesh (1993). "Quantum complexity theory". Proceedings of the twenty-fifth annual ACM symposium on Theory of computing – STOC '93. San Diego, California, United States: ACM Press. pp. 11–20. doi:10.1145/167088.167097. ISBN 978-0-89791-591-5. S2CID 676378.
  17. ^ Simon, D. R. (1994). "On the power of quantum computation". Proceedings 35th Annual Symposium on Foundations of Computer Science. Santa Fe, New Mexico, USA: IEEE Comput. Soc. Press. pp. 116–123. doi:10.1109/SFCS.1994.365701. ISBN 978-0-8186-6580-6. S2CID 7457814.
  18. ^ Nielsen & Chuang 2010, p. 30-32.
  19. ^ Shor 1994.
  20. ^ Grover, Lov K. (1996). A fast quantum mechanical algorithm for database search. ACM symposium on Theory of computing. Philadelphia: ACM Press. pp. 212–219. arXiv:quant-ph/9605043. doi:10.1145/237814.237866. ISBN 978-0-89791-785-8.
  21. ^ a b Nielsen & Chuang 2010, p. 7.
  22. ^ a b Lloyd, Seth (23 August 1996). "Universal Quantum Simulators". Science. 273 (5278): 1073–1078. Bibcode:1996Sci...273.1073L. doi:10.1126/science.273.5278.1073. ISSN 0036-8075. PMID 8688088. S2CID 43496899.
  23. ^ Cao, Yudong; Romero, Jonathan; Olson, Jonathan P.; Degroote, Matthias; Johnson, Peter D.; et al. (9 October 2019). "Quantum Chemistry in the Age of Quantum Computing". Chemical Reviews. 119 (19): 10856–10915. arXiv:1812.09976. doi:10.1021/acs.chemrev.8b00803. ISSN 0009-2665. PMID 31469277. S2CID 119417908.
  24. ^ a b Grumbling & Horowitz 2019, pp. 164–169.
  25. ^ Chuang, Isaac L.; Gershenfeld, Neil; Kubinec, Markdoi (April 1998). "Experimental Implementation of Fast Quantum Searching". Physical Review Letters. 80 (15). American Physical Society: 3408–3411. Bibcode:1998PhRvL..80.3408C. doi:10.1103/PhysRevLett.80.3408.
  26. ^ Holton, William Coffeen. "quantum computer". Encyclopedia Britannica. Encyclop?dia Britannica. Retrieved 4 December 2021.
  27. ^ Gibney, Elizabeth (23 October 2019). "Hello quantum world! Google publishes landmark quantum supremacy claim". Nature. 574 (7779): 461–462. Bibcode:2019Natur.574..461G. doi:10.1038/d41586-019-03213-z. PMID 31645740.
  28. ^ a b Lay summary: Martinis, John; Boixo, Sergio (23 October 2019). "Quantum Supremacy Using a Programmable Superconducting Processor". Nature. 574 (7779). Google AI: 505–510. arXiv:1910.11333. Bibcode:2019Natur.574..505A. doi:10.1038/s41586-019-1666-5. PMID 31645734. S2CID 204836822. Retrieved 27 April 2022.
     ? Journal article: Arute, Frank; Arya, Kunal; Babbush, Ryan; Bacon, Dave; Bardin, Joseph C.; et al. (23 October 2019). "Quantum supremacy using a programmable superconducting processor". Nature. 574 (7779): 505–510. arXiv:1910.11333. Bibcode:2019Natur.574..505A. doi:10.1038/s41586-019-1666-5. PMID 31645734. S2CID 204836822.
  29. ^ Aaronson, Scott (30 October 2019). "Opinion | Why Google's Quantum Supremacy Milestone Matters". The New York Times. ISSN 0362-4331. Retrieved 25 September 2021.
  30. ^ Pan, Feng; Zhang, Pan (4 March 2021). "Simulating the Sycamore quantum supremacy circuits". arXiv:2103.03074 [quant-ph].
  31. ^ Sample, Ian; editor, Ian Sample Science (23 October 2019). "Google claims it has achieved 'quantum supremacy' – but IBM disagrees". The Guardian. ISSN 0261-3077. Retrieved 1 August 2025. {{cite news}}: |last2= has generic name (help)
  32. ^ Bennett, Charlie (31 July 2020). Information Is Quantum: How Physics Helped Explain the Nature of Information and What Can Be Done With It (Videotape). Event occurs at 1:08:22 – via YouTube.
  33. ^ Nielsen & Chuang 2010, p. 13.
  34. ^ a b Mermin 2007, p. 17.
  35. ^ a b Mermin 2007, p. 18.
  36. ^ Aaronson 2013, p. 110.
  37. ^ Nielsen & Chuang 2010, p. 30–32.
  38. ^ Mermin 2007, pp. 38–39.
  39. ^ Kurgalin, Sergei; Borzunov, Sergei (2021). Concise guide to quantum computing: algorithms, exercises, and implementations. Texts in computer science. Cham: Springer. ISBN 978-3-030-65054-4.
  40. ^ Das, A.; Chakrabarti, B. K. (2008). "Quantum Annealing and Analog Quantum Computation". Rev. Mod. Phys. 80 (3): 1061–1081. arXiv:0801.2193. Bibcode:2008RvMP...80.1061D. CiteSeerX 10.1.1.563.9990. doi:10.1103/RevModPhys.80.1061. S2CID 14255125.
  41. ^ Nayak, Chetan; Simon, Steven; Stern, Ady; Das Sarma, Sankar (2008). "Nonabelian Anyons and Quantum Computation". Reviews of Modern Physics. 80 (3): 1083–1159. arXiv:0707.1889. Bibcode:2008RvMP...80.1083N. doi:10.1103/RevModPhys.80.1083. S2CID 119628297.
  42. ^ Chi-Chih Yao, A. (1993). "Quantum circuit complexity". Proceedings of 1993 IEEE 34th Annual Foundations of Computer Science. pp. 352–361. doi:10.1109/SFCS.1993.366852. ISBN 0-8186-4370-6. S2CID 195866146.
  43. ^ Raussendorf, Robert; Browne, Daniel E.; Briegel, Hans J. (25 August 2003). "Measurement-based quantum computation on cluster states". Physical Review A. 68 (2): 022312. arXiv:quant-ph/0301052. Bibcode:2003PhRvA..68b2312R. doi:10.1103/PhysRevA.68.022312. S2CID 6197709.
  44. ^ Aharonov, Dorit; van Dam, Wim; Kempe, Julia; Landau, Zeph; Lloyd, Seth; Regev, Oded (1 January 2008). "Adiabatic Quantum Computation Is Equivalent to Standard Quantum Computation". SIAM Review. 50 (4): 755–787. arXiv:quant-ph/0405098. Bibcode:2008SIAMR..50..755A. doi:10.1137/080734479. ISSN 0036-1445. S2CID 1503123.
  45. ^ Freedman, Michael H.; Larsen, Michael; Wang, Zhenghan (1 June 2002). "A Modular Functor Which is Universal for Quantum Computation". Communications in Mathematical Physics. 227 (3): 605–622. arXiv:quant-ph/0001108. Bibcode:2002CMaPh.227..605F. doi:10.1007/s002200200645. ISSN 0010-3616. S2CID 8990600.
  46. ^ Nielsen & Chuang 2010, p. 481.
  47. ^ a b c d Preskill, John (6 August 2018). "Quantum Computing in the NISQ era and beyond". Quantum. 2 79. arXiv:1801.00862. Bibcode:2018Quant...2...79P. doi:10.22331/q-2025-08-07-79. S2CID 44098998.
  48. ^ Bluvstein, Dolev; Evered, Simon J.; Geim, Alexandra A.; Li, Sophie H.; Zhou, Hengyun; Manovitz, Tom; Ebadi, Sepehr; Cain, Madelyn; Kalinowski, Marcin; Hangleiter, Dominik; Ataides, J. Pablo Bonilla; Maskara, Nishad; Cong, Iris; Gao, Xun; Rodriguez, Pedro Sales (6 December 2023). "Logical quantum processor based on reconfigurable atom arrays". Nature. 626 (7997): 58–65. arXiv:2312.03982. doi:10.1038/s41586-023-06927-3. ISSN 1476-4687. PMC 10830422. PMID 38056497. S2CID 266052773.
  49. ^ "DARPA-Funded Research Leads to Quantum Computing Breakthrough". darpa.mil. 6 December 2023. Retrieved 5 January 2024.
  50. ^ Choudhury, Rizwan (30 December 2023). "Top 7 innovation stories of 2023 – Interesting Engineering". interestingengineering.com. Retrieved 6 January 2024.
  51. ^ Pirandola, S.; Andersen, U. L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; Pereira, J.; Razavi, M.; Shamsul Shaari, J.; Tomamichel, M.; Usenko, V. C.; Vallone, G.; Villoresi, P.; Wallden, P. (2020). "Advances in quantum cryptography". Advances in Optics and Photonics. 12 (4): 1012–1236. arXiv:1906.01645. Bibcode:2020AdOP...12.1012P. doi:10.1364/AOP.361502.
  52. ^ Inderwildi, Oliver (14 April 2025). "The Quantum Computing Revolution: From Technological Opportunity to Geopolitical Power Shift". The Geopolitical Economist. Retrieved 14 April 2025.
  53. ^ Pirandola, S.; Andersen, U. L.; Banchi, L.; Berta, M.; Bunandar, D.; Colbeck, R.; Englund, D.; Gehring, T.; Lupo, C.; Ottaviani, C.; Pereira, J. L.; Razavi, M.; Shamsul Shaari, J.; Tomamichel, M.; Usenko, V. C. (14 December 2020). "Advances in quantum cryptography". Advances in Optics and Photonics. 12 (4): 1017. arXiv:1906.01645. Bibcode:2020AdOP...12.1012P. doi:10.1364/AOP.361502. ISSN 1943-8206. S2CID 174799187.
  54. ^ Xu, Feihu; Ma, Xiongfeng; Zhang, Qiang; Lo, Hoi-Kwong; Pan, Jian-Wei (26 May 2020). "Secure quantum key distribution with realistic devices". Reviews of Modern Physics. 92 (2): 025002-3. arXiv:1903.09051. Bibcode:2020RvMP...92b5002X. doi:10.1103/RevModPhys.92.025002. S2CID 210942877.
  55. ^ Xu, Guobin; Mao, Jianzhou; Sakk, Eric; Wang, Shuangbao Paul (22 March 2023). "An Overview of Quantum-Safe Approaches: Quantum Key Distribution and Post-Quantum Cryptography". 2023 57th Annual Conference on Information Sciences and Systems (CISS). IEEE. p. 3. doi:10.1109/CISS56502.2023.10089619. ISBN 978-1-6654-5181-9.
  56. ^ Kozlowski, Wojciech; Wehner, Stephanie (25 September 2019). "Towards Large-Scale Quantum Networks". Proceedings of the Sixth Annual ACM International Conference on Nanoscale Computing and Communication. ACM. pp. 1–7. arXiv:1909.08396. doi:10.1145/3345312.3345497. ISBN 978-1-4503-6897-1.
  57. ^ Guo, Xueshi; Breum, Casper R.; Borregaard, Johannes; Izumi, Shuro; Larsen, Mikkel V.; Gehring, Tobias; Christandl, Matthias; Neergaard-Nielsen, Jonas S.; Andersen, Ulrik L. (23 December 2019). "Distributed quantum sensing in a continuous-variable entangled network". Nature Physics. 16 (3): 281–284. arXiv:1905.09408. doi:10.1038/s41567-019-0743-x. ISSN 1745-2473. S2CID 256703226.
  58. ^ a b c Jordan, Stephen (14 October 2022) [22 April 2011]. "Quantum Algorithm Zoo". Archived from the original on 29 April 2018.
  59. ^ Aaronson, Scott; Arkhipov, Alex (6 June 2011). "The computational complexity of linear optics". Proceedings of the forty-third annual ACM symposium on Theory of computing. San Jose, California: Association for Computing Machinery. pp. 333–342. arXiv:1011.3245. doi:10.1145/1993636.1993682. ISBN 978-1-4503-0691-1.
  60. ^ a b Nielsen & Chuang 2010, p. 42.
  61. ^ Norton, Quinn (15 February 2007). "The Father of Quantum Computing". Wired.
  62. ^ Ambainis, Andris (Spring 2014). "What Can We Do with a Quantum Computer?". Institute for Advanced Study.
  63. ^ Chang, Kenneth (14 June 2023). "Quantum Computing Advance Begins New Era, IBM Says – A quantum computer came up with better answers to a physics problem than a conventional supercomputer". The New York Times. Archived from the original on 14 June 2023. Retrieved 15 June 2023.
  64. ^ Kim, Youngseok; et al. (14 June 2023). "Evidence for the utility of quantum computing before fault tolerance". Nature. 618 (7965): 500–505. Bibcode:2023Natur.618..500K. doi:10.1038/s41586-023-06096-3. PMC 10266970. PMID 37316724.
  65. ^ Morello, Andrea (21 November 2018). Lunch & Learn: Quantum Computing. Sibos TV. Archived from the original on 15 February 2021. Retrieved 4 February 2021 – via YouTube.{{cite AV media}}: CS1 maint: bot: original URL status unknown (link)
  66. ^ Ruane, Jonathan; McAfee, Andrew; Oliver, William D. (1 January 2022). "Quantum Computing for Business Leaders". Harvard Business Review. ISSN 0017-8012. Retrieved 12 April 2023.
  67. ^ Budde, Florian; Volz, Daniel (12 July 2019). "Quantum computing and the chemical industry | McKinsey". www.mckinsey.com. McKinsey and Company. Retrieved 12 April 2023.
  68. ^ Bourzac, Katherine (30 October 2017). "Chemistry is quantum computing's killer app". cen.acs.org. American Chemical Society. Retrieved 12 April 2023.
  69. ^ Lenstra, Arjen K. (2000). "Integer Factoring" (PDF). Designs, Codes and Cryptography. 19 (2/3): 101–128. doi:10.1023/A:1008397921377. S2CID 9816153. Archived from the original (PDF) on 10 April 2015.
  70. ^ Nielsen & Chuang 2010, p. 216.
  71. ^ a b Bernstein, Daniel J. (2009). "Introduction to post-quantum cryptography". Post-Quantum Cryptography. Berlin, Heidelberg: Springer. pp. 1–14. doi:10.1007/978-3-540-88702-7_1. ISBN 978-3-540-88701-0. S2CID 61401925.
  72. ^ See also pqcrypto.org, a bibliography maintained by Daniel J. Bernstein and Tanja Lange on cryptography not known to be broken by quantum computing.
  73. ^ McEliece, R. J. (January 1978). "A Public-Key Cryptosystem Based On Algebraic Coding Theory" (PDF). DSNPR. 44: 114–116. Bibcode:1978DSNPR..44..114M.
  74. ^ Kobayashi, H.; Gall, F. L. (2006). "Dihedral Hidden Subgroup Problem: A Survey". Information and Media Technologies. 1 (1): 178–185. doi:10.2197/ipsjdc.1.470.
  75. ^ Bennett, Charles H.; Bernstein, Ethan; Brassard, Gilles; Vazirani, Umesh (October 1997). "Strengths and Weaknesses of Quantum Computing". SIAM Journal on Computing. 26 (5): 1510–1523. arXiv:quant-ph/9701001. Bibcode:1997quant.ph..1001B. doi:10.1137/s0097539796300933. S2CID 13403194.
  76. ^ Brassard, Gilles; H?yer, Peter; Tapp, Alain (2016). "Quantum Algorithm for the Collision Problem". In Kao, Ming-Yang (ed.). Encyclopedia of Algorithms. New York, New York: Springer. pp. 1662–1664. arXiv:quant-ph/9705002. doi:10.1007/978-1-4939-2864-4_304. ISBN 978-1-4939-2864-4. S2CID 3116149.
  77. ^ Farhi, Edward; Goldstone, Jeffrey; Gutmann, Sam (23 December 2008). "A Quantum Algorithm for the Hamiltonian NAND Tree". Theory of Computing. 4 (1): 169–190. doi:10.4086/toc.2008.v004a008. ISSN 1557-2862. S2CID 8258191.
  78. ^ Williams, Colin P. (2011). Explorations in Quantum Computing. Springer. pp. 242–244. ISBN 978-1-84628-887-6.
  79. ^ Grover, Lov (29 May 1996). "A fast quantum mechanical algorithm for database search". arXiv:quant-ph/9605043.
  80. ^ Ambainis, Ambainis (June 2004). "Quantum search algorithms". ACM SIGACT News. 35 (2): 22–35. arXiv:quant-ph/0504012. Bibcode:2005quant.ph..4012A. doi:10.1145/992287.992296. S2CID 11326499.
  81. ^ Rich, Steven; Gellman, Barton (1 February 2014). "NSA seeks to build quantum computer that could crack most types of encryption". The Washington Post.
  82. ^ Lucas, Andrew (2014). "Ising formulations of many NP problems". Frontiers in Physics. 2: 5. arXiv:1302.5843. Bibcode:2014FrP.....2....5L. doi:10.3389/fphy.2014.00005.
  83. ^ Outeiral, Carlos; Strahm, Martin; Morris, Garrett; Benjamin, Simon; Deane, Charlotte; Shi, Jiye (2021). "The prospects of quantum computing in computational molecular biology". WIREs Computational Molecular Science. 11. arXiv:2005.12792. doi:10.1002/wcms.1481. S2CID 218889377.
  84. ^ Biamonte, Jacob; Wittek, Peter; Pancotti, Nicola; Rebentrost, Patrick; Wiebe, Nathan; Lloyd, Seth (September 2017). "Quantum machine learning". Nature. 549 (7671): 195–202. arXiv:1611.09347. Bibcode:2017Natur.549..195B. doi:10.1038/nature23474. ISSN 0028-0836. PMID 28905917. S2CID 64536201.
  85. ^ Harrow, Aram; Hassidim, Avinatan; Lloyd, Seth (2009). "Quantum algorithm for solving linear systems of equations". Physical Review Letters. 103 (15): 150502. arXiv:0811.3171. Bibcode:2009PhRvL.103o0502H. doi:10.1103/PhysRevLett.103.150502. PMID 19905613. S2CID 5187993.
  86. ^ Benedetti, Marcello; Realpe-Gómez, John; Biswas, Rupak; Perdomo-Ortiz, Alejandro (9 August 2016). "Estimation of effective temperatures in quantum annealers for sampling applications: A case study with possible applications in deep learning". Physical Review A. 94 (2): 022308. arXiv:1510.07611. Bibcode:2016PhRvA..94b2308B. doi:10.1103/PhysRevA.94.022308.
  87. ^ Ajagekar, Akshay; You, Fengqi (5 December 2020). "Quantum computing assisted deep learning for fault detection and diagnosis in industrial process systems". Computers & Chemical Engineering. 143 107119. arXiv:2003.00264. doi:10.1016/j.compchemeng.2020.107119. ISSN 0098-1354. S2CID 211678230.
  88. ^ Ajagekar, Akshay; You, Fengqi (1 December 2021). "Quantum computing based hybrid deep learning for fault diagnosis in electrical power systems". Applied Energy. 303 117628. Bibcode:2021ApEn..30317628A. doi:10.1016/j.apenergy.2021.117628. ISSN 0306-2619.
  89. ^ Gao, Xun; Anschuetz, Eric R.; Wang, Sheng-Tao; Cirac, J. Ignacio; Lukin, Mikhail D. (2022). "Enhancing Generative Models via Quantum Correlations". Physical Review X. 12 (2): 021037. arXiv:2101.08354. Bibcode:2022PhRvX..12b1037G. doi:10.1103/PhysRevX.12.021037. S2CID 231662294.
  90. ^ Li, Junde; Topaloglu, Rasit; Ghosh, Swaroop (9 January 2021). "Quantum Generative Models for Small Molecule Drug Discovery". arXiv:2101.03438 [cs.ET].
  91. ^ a b c Brooks, Michael (24 May 2023). "Quantum computers: what are they good for?". Nature. 617 (7962): S1 – S3. Bibcode:2023Natur.617S...1B. doi:10.1038/d41586-023-01692-9. PMID 37225885. S2CID 258847001.
  92. ^ a b c d Torsten Hoefler; Thomas H?ner; Matthias Troyer (May 2023). "Disentangling Hype from Practicality: On Realistically Achieving Quantum Advantage". Communications of the ACM.
  93. ^ Dyakonov, Mikhail (15 November 2018). "The Case Against Quantum Computing". IEEE Spectrum.
  94. ^ DiVincenzo, David P. (13 April 2000). "The Physical Implementation of Quantum Computation". Fortschritte der Physik. 48 (9–11): 771–783. arXiv:quant-ph/0002077. Bibcode:2000ForPh..48..771D. doi:10.1002/1521-3978(200009)48:9/11<771::AID-PROP771>3.0.CO;2-E. S2CID 15439711.
  95. ^ Giles, Martin (17 January 2019). "We'd have more quantum computers if it weren't so hard to find the damn cables". MIT Technology Review. Retrieved 17 May 2021.
  96. ^ Pauka SJ, Das K, Kalra B, Moini A, Yang Y, Trainer M, Bousquet A, Cantaloube C, Dick N, Gardner GC, Manfra MJ, Reilly DJ (2021). "A cryogenic CMOS chip for generating control signals for multiple qubits". Nature Electronics. 4 (4): 64–70. arXiv:1912.01299. doi:10.1038/s41928-020-00528-y. S2CID 231715555.
  97. ^ DiVincenzo, David P. (1995). "Quantum Computation". Science. 270 (5234): 255–261. Bibcode:1995Sci...270..255D. CiteSeerX 10.1.1.242.2165. doi:10.1126/science.270.5234.255. S2CID 220110562.
  98. ^ Zu, H.; Dai, W.; de Waele, A.T.A.M. (2022). "Development of Dilution refrigerators – A review". Cryogenics. 121. doi:10.1016/j.cryogenics.2021.103390. ISSN 0011-2275. S2CID 244005391.
  99. ^ Jones, Nicola (19 June 2013). "Computing: The quantum company". Nature. 498 (7454): 286–288. Bibcode:2013Natur.498..286J. doi:10.1038/498286a. PMID 23783610.
  100. ^ Veps?l?inen, Antti P.; Karamlou, Amir H.; Orrell, John L.; Dogra, Akshunna S.; Loer, Ben; et al. (August 2020). "Impact of ionizing radiation on superconducting qubit coherence". Nature. 584 (7822): 551–556. arXiv:2001.09190. Bibcode:2020Natur.584..551V. doi:10.1038/s41586-020-2619-8. ISSN 1476-4687. PMID 32848227. S2CID 210920566.
  101. ^ Amy, Matthew; Matteo, Olivia; Gheorghiu, Vlad; Mosca, Michele; Parent, Alex; Schanck, John (30 November 2016). "Estimating the cost of generic quantum pre-image attacks on SHA-2 and SHA-3". arXiv:1603.09383 [quant-ph].
  102. ^ Dyakonov, M. I. (14 October 2006). S. Luryi; Xu, J.; Zaslavsky, A. (eds.). "Is Fault-Tolerant Quantum Computation Really Possible?". Future Trends in Microelectronics. Up the Nano Creek: 4–18. arXiv:quant-ph/0610117. Bibcode:2006quant.ph.10117D.
  103. ^ Ahsan, Muhammad (2015). Architecture Framework for Trapped-ion Quantum Computer based on Performance Simulation Tool. Bibcode:2015PhDT........56A. OCLC 923881411.
  104. ^ Ahsan, Muhammad; Meter, Rodney Van; Kim, Jungsang (28 December 2016). "Designing a Million-Qubit Quantum Computer Using a Resource Performance Simulator". ACM Journal on Emerging Technologies in Computing Systems. 12 (4): 39:1–39:25. arXiv:1512.00796. doi:10.1145/2830570. ISSN 1550-4832. S2CID 1258374.
  105. ^ Gidney, Craig; Eker?, Martin (15 April 2021). "How to factor 2048 bit RSA integers in 8 hours using 20 million noisy qubits". Quantum. 5 433. arXiv:1905.09749. Bibcode:2021Quant...5..433G. doi:10.22331/q-2025-08-07-433. ISSN 2521-327X. S2CID 162183806.
  106. ^ Freedman, Michael H.; Kitaev, Alexei; Larsen, Michael J.; Wang, Zhenghan (2003). "Topological quantum computation". Bulletin of the American Mathematical Society. 40 (1): 31–38. arXiv:quant-ph/0101025. doi:10.1090/S0273-2025-08-07964-3. MR 1943131.
  107. ^ Monroe, Don (1 October 2008). "Anyons: The breakthrough quantum computing needs?". New Scientist.
  108. ^ a b Cossins, Daniel (28 June 2025). "How to think about...Quasiparticles". New Scientist. 266 (3549): 34.
  109. ^ Preskill, John (26 March 2012). "Quantum computing and the entanglement frontier". arXiv:1203.5813 [quant-ph].
  110. ^ Preskill, John (6 August 2018). "Quantum Computing in the NISQ era and beyond". Quantum. 2 79. arXiv:1801.00862. Bibcode:2018Quant...2...79P. doi:10.22331/q-2025-08-07-79.
  111. ^ Boixo, Sergio; Isakov, Sergei V.; Smelyanskiy, Vadim N.; Babbush, Ryan; Ding, Nan; et al. (2018). "Characterizing Quantum Supremacy in Near-Term Devices". Nature Physics. 14 (6): 595–600. arXiv:1608.00263. Bibcode:2018NatPh..14..595B. doi:10.1038/s41567-018-0124-x. S2CID 4167494.
  112. ^ Savage, Neil (5 July 2017). "Quantum Computers Compete for "Supremacy"". Scientific American.
  113. ^ Giles, Martin (20 September 2019). "Google researchers have reportedly achieved 'quantum supremacy'". MIT Technology Review. Retrieved 15 May 2020.
  114. ^ Tavares, Frank (23 October 2019). "Google and NASA Achieve Quantum Supremacy". NASA. Retrieved 16 November 2021.
  115. ^ Pednault, Edwin; Gunnels, John A.; Nannicini, Giacomo; Horesh, Lior; Wisnieff, Robert (22 October 2019). "Leveraging Secondary Storage to Simulate Deep 54-qubit Sycamore Circuits". arXiv:1910.09534 [quant-ph].
  116. ^ Cho, Adrian (23 October 2019). "IBM casts doubt on Google's claims of quantum supremacy". Science. doi:10.1126/science.aaz6080. ISSN 0036-8075. S2CID 211982610.
  117. ^ Liu, Yong (Alexander); Liu, Xin (Lucy); Li, Fang (Nancy); Fu, Haohuan; Yang, Yuling; et al. (14 November 2021). "Closing the "quantum supremacy" gap". Proceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis. SC '21. New York, New York: Association for Computing Machinery. pp. 1–12. arXiv:2110.14502. doi:10.1145/3458817.3487399. ISBN 978-1-4503-8442-1. S2CID 239036985.
  118. ^ Bulmer, Jacob F. F.; Bell, Bryn A.; Chadwick, Rachel S.; Jones, Alex E.; Moise, Diana; et al. (28 January 2022). "The boundary for quantum advantage in Gaussian boson sampling". Science Advances. 8 (4): eabl9236. arXiv:2108.01622. Bibcode:2022SciA....8.9236B. doi:10.1126/sciadv.abl9236. ISSN 2375-2548. PMC 8791606. PMID 35080972.
  119. ^ McCormick, Katie (10 February 2022). "Race Not Over Between Classical and Quantum Computers". Physics. 15 19. Bibcode:2022PhyOJ..15...19M. doi:10.1103/Physics.15.19. S2CID 246910085.
  120. ^ Pan, Feng; Chen, Keyang; Zhang, Pan (2022). "Solving the Sampling Problem of the Sycamore Quantum Circuits". Physical Review Letters. 129 (9): 090502. arXiv:2111.03011. Bibcode:2022PhRvL.129i0502P. doi:10.1103/PhysRevLett.129.090502. PMID 36083655. S2CID 251755796.
  121. ^ Cho, Adrian (2 August 2022). "Ordinary computers can beat Google's quantum computer after all". Science. 377. doi:10.1126/science.ade2364.
  122. ^ "Google's 'quantum supremacy' usurped by researchers using ordinary supercomputer". TechCrunch. 5 August 2022. Retrieved 7 August 2022.
  123. ^ Ball, Philip (3 December 2020). "Physicists in China challenge Google's 'quantum advantage'". Nature. 588 (7838): 380. Bibcode:2020Natur.588..380B. doi:10.1038/d41586-020-03434-7. PMID 33273711. S2CID 227282052.
  124. ^ Garisto, Daniel. "Light-based Quantum Computer Exceeds Fastest Classical Supercomputers". Scientific American. Retrieved 7 December 2020.
  125. ^ Conover, Emily (3 December 2020). "The new light-based quantum computer Jiuzhang has achieved quantum supremacy". Science News. Retrieved 7 December 2020.
  126. ^ Zhong, Han-Sen; Wang, Hui; Deng, Yu-Hao; Chen, Ming-Cheng; Peng, Li-Chao; et al. (3 December 2020). "Quantum computational advantage using photons". Science. 370 (6523): 1460–1463. arXiv:2012.01625. Bibcode:2020Sci...370.1460Z. doi:10.1126/science.abe8770. ISSN 0036-8075. PMID 33273064. S2CID 227254333.
  127. ^ Roberson, Tara M. (21 May 2020). "Can Hype Be a Force for Good?". Public Understanding of Science. 29 (5): 544–552. doi:10.1177/0963662520923109. ISSN 0963-6625. PMID 32438851. S2CID 218831653.
  128. ^ Cavaliere, Fabio; Mattsson, John; Smeets, Ben (September 2020). "The security implications of quantum cryptography and quantum computing". Network Security. 2020 (9): 9–15. doi:10.1016/S1353-4858(20)30105-7. ISSN 1353-4858. S2CID 222349414.
  129. ^ Liu, Yong; Chen, Yaojian; Guo, Chu; Song, Jiawei; Shi, Xinmin; Gan, Lin; Wu, Wenzhao; Wu, Wei; Fu, Haohuan; Liu, Xin; Chen, Dexun; Zhao, Zhifeng; Yang, Guangwen; Gao, Jiangang (16 January 2024). "Verifying Quantum Advantage Experiments with Multiple Amplitude Tensor Network Contraction". Physical Review Letters. 132 (3): 030601. arXiv:2212.04749. Bibcode:2024PhRvL.132c0601L. doi:10.1103/PhysRevLett.132.030601. ISSN 0031-9007. PMID 38307065.
  130. ^ Monroe, Don (December 2022). "Quantum Computers and the Universe". Communications of the ACM.
  131. ^ Swayne, Matt (20 June 2023). "PsiQuantum Sees 700x Reduction in Computational Resource Requirements to Break Elliptic Curve Cryptography With a Fault Tolerant Quantum Computer". The Quanrum Insider.
  132. ^ Unruh, Bill (1995). "Maintaining coherence in Quantum Computers". Physical Review A. 51 (2): 992–997. arXiv:hep-th/9406058. Bibcode:1995PhRvA..51..992U. doi:10.1103/PhysRevA.51.992. PMID 9911677. S2CID 13980886.
  133. ^ Davies, Paul (6 March 2007). "The implications of a holographic universe for quantum information science and the nature of physical law". arXiv:quant-ph/0703041.
  134. ^ Regan, K. W. (23 April 2016). "Quantum Supremacy and Complexity". G?del's Lost Letter and P=NP.
  135. ^ Kalai, Gil (May 2016). "The Quantum Computer Puzzle" (PDF). Notices of the AMS. 63 (5): 508–516.
  136. ^ Rinott, Yosef; Shoham, Tomer; Kalai, Gil (13 July 2021). "Statistical Aspects of the Quantum Supremacy Demonstration". arXiv:2008.05177 [quant-ph].
  137. ^ Dyakonov, Mikhail (15 November 2018). "The Case Against Quantum Computing". IEEE Spectrum. Retrieved 3 December 2019.
  138. ^ Russell, John (10 January 2019). "IBM Quantum Update: Q System One Launch, New Collaborators, and QC Center Plans". HPCwire. Retrieved 9 January 2023.
  139. ^ Tacchino, Francesco; Chiesa, Alessandro; Carretta, Stefano; Gerace, Dario (19 December 2019). "Quantum Computers as Universal Quantum Simulators: State-of-the-Art and Perspectives". Advanced Quantum Technologies. 3 (3): 1900052. arXiv:1907.03505. doi:10.1002/qute.201900052. ISSN 2511-9044. S2CID 195833616.
  140. ^ Grumbling & Horowitz 2019, p. 127.
  141. ^ Grumbling & Horowitz 2019, p. 114.
  142. ^ Nayak, Chetan; Simon, Steven H.; Stern, Ady; Freedman, Michael; Das Sarma, Sankar (12 September 2008). "Non-Abelian anyons and topological quantum computation". Reviews of Modern Physics. 80 (3): 1083–1159. arXiv:0707.1889. Bibcode:2008RvMP...80.1083N. doi:10.1103/RevModPhys.80.1083.
  143. ^ Grumbling & Horowitz 2019, p. 119.
  144. ^ Grumbling & Horowitz 2019, p. 126.
  145. ^ Leong, Kelvin; Sung, Anna (November 2022). "What Business Managers Should Know About Quantum Computing?" (PDF). Journal of Interdisciplinary Sciences. Retrieved 13 August 2023.
  146. ^ "10 Quantum Computing Applications & Examples to Know". Built In. Retrieved 21 June 2025.
  147. ^ Nielsen & Chuang 2010, p. 29.
  148. ^ Nielsen & Chuang 2010, p. 126.
  149. ^ Nielsen & Chuang 2010, p. 41.
  150. ^ Nielsen & Chuang 2010, p. 201.
  151. ^ Bernstein, Ethan; Vazirani, Umesh (1997). "Quantum Complexity Theory". SIAM Journal on Computing. 26 (5): 1411–1473. CiteSeerX 10.1.1.144.7852. doi:10.1137/S0097539796300921.
  152. ^ Techi Editorial Team (6 August 2025). "Quantum Computing in 2025: Industry Applications and Breakthroughs". Techi. Retrieved 6 August 2025.
尹什么意思 咨询是什么意思 分心念什么 喝酒对身体有什么危害 免冠照什么意思
口腔溃疡挂什么科就诊 7.9什么星座 什么泡面最好吃 金钱草有什么功效 水瓶是什么象星座
停经吃什么能来月经 脊髓损伤有什么症状 梦见蛇咬别人是什么意思 微信头像用什么好 肚脐左上方是什么部位
珠海有什么好玩的 减肥喝什么茶 前列腺在什么位置 一什么铅笔 11月28是什么星座
肛周瘙痒是什么原因hcv9jop6ns1r.cn 寒碜是什么意思hcv7jop5ns6r.cn 什么是同素异形体hcv8jop1ns9r.cn 召力念什么hcv7jop6ns6r.cn 凝血六项是检查什么的hcv9jop7ns0r.cn
145什么意思hcv7jop7ns0r.cn 指甲小月牙代表什么hcv9jop8ns2r.cn 请结合临床是什么意思hcv8jop0ns5r.cn 骨龄大于年龄意味着什么fenrenren.com 第一次要注意什么hcv8jop7ns3r.cn
防是什么生肖naasee.com 肚子受凉吃什么药hcv8jop3ns6r.cn 为什么叫中日友好医院hcv9jop5ns6r.cn 带状疱疹是什么原因引起hcv9jop2ns5r.cn 士多啤梨是什么水果hcv7jop7ns4r.cn
15度穿什么衣服合适onlinewuye.com 六字真言是什么意思hcv8jop1ns9r.cn 墨龟为什么只能养一只hcv8jop8ns1r.cn 4月28日是什么日子hcv8jop4ns3r.cn 老烂腿用什么药最好cj623037.com
百度