To save content items to your account,
please confirm that you agree to abide by our usage policies.
If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account.
Find out more about saving content to .
To save content items to your Kindle, first ensure no-reply@cambridge.org
is added to your Approved Personal Document E-mail List under your Personal Document Settings
on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part
of your Kindle email address below.
Find out more about saving to your Kindle.
Note you can select to save to either the @free.kindle.com or @kindle.com variations.
‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi.
‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.
Deducing the quantum state of your device is essential for diagnosing and perfecting it, and the methods needed for this are introduced in this chapter. We also extend the discussion to methods used to validate noisy, intermediate-scale quantum computers when they grow too large for tomography to be used.
The generic properties of physical qubits are discussed in detail: in particular the need for an energy gap to ensure cooling and its implications for the size of devices. The basic notions of controlling qubits by external forces shows us how single-qubit gates are implemented.
The chapter presents several topics outside of the theory where some ideas and results around proof complexity generators appear to be relevant. These include SAT algorithms, the optimality problem of proof complexity, structured PHP approach, the incompleteness theorem and total NP search problems.
A random temporal graph is an Erdős-Rényi random graph $G(n,p)$, together with a random ordering of its edges. A path in the graph is called increasing if the edges on the path appear in increasing order. A set $S$ of vertices forms a temporal clique if for all $u,v \in S$, there is an increasing path from $u$ to $v$. Becker, Casteigts, Crescenzi, Kodric, Renken, Raskin and Zamaraev [(2023) Giant components in random temporal graphs. arXiv,2205.14888] proved that if $p=c\log n/n$ for $c\gt 1$, then, with high probability, there is a temporal clique of size $n-o(n)$. On the other hand, for $c\lt 1$, with high probability, the largest temporal clique is of size $o(n)$. In this note, we improve the latter bound by showing that, for $c\lt 1$, the largest temporal clique is of constant size with high probability.
The chapter examines possible stretch of generators and relates it to problems about Kolmogorov's complexity, the feasible disjunction property and to a related notion of disjunction hardness of generators. The truth-table function is presented as a key example of a generator and its hardness and pseudosurjectivity is considered. A problem about time-bounded Kolmogorov complexity is formulated.
Several other technologies under development to exploit quantum power are discussed in this chapter. You will learn about quantum key distribution; improving measurements of phase shifts is used as an example to demonstrate the power of entanglement in beating the standard quantum limit. How the latter is used to improve detection of objects is also discussed. Finally, modelling complicated quantum systems by designing simpler and easier to control systems, represented by quantum circuits, simplifies the studying of such systems, allowing us to gain better insight into their physics and to make better predictions about them.
Quantum computing technology was born in the 1970s and 1980s when a handful of visionary thinkers such as Paul Benioff, Richard Feynman, and David Deutsch first speculated about how the precepts of quantum mechanics might impact computer science. In 1984 Gilles Brassard, a computer scientist and cryptographer, and Charles Bennett, a specialist in physics and information theory, devised a practical application for quantum mechanics in the field of secure communication.
Here we build the skills needed to master how a quantum computer can factor very large numbers much more efficiently than a classical computer; i.e., it is a chapter dedicated to Shor’s algorithm. The Fourier transform, and its quantum analogue are introduced and applied to period finding. These are then applied to show how the problem of factoring large numbers amounts to finding the period of a modular exponential function. Moreover, the consequences of such a capability on the everyday security in (internet) communications using RSA encryption is also discussed.
The origin of decoherence of qubits is described by a simple example, and the two key methods to defeat decoherence, namely decoherence-free spaces and error-correcting codes are introduced.