Skip to main content Accessibility help
×
Hostname: page-component-77c89778f8-vsgnj Total loading time: 0 Render date: 2024-07-18T17:04:13.799Z Has data issue: false hasContentIssue false

11 - Applications of entanglement: Heisenberg-limited interferometry and quantum information processing

Published online by Cambridge University Press:  05 September 2012

Christopher Gerry
Affiliation:
Lehman College, City University of New York
Peter Knight
Affiliation:
Imperial College of Science, Technology and Medicine, London
Get access

Summary

“All information is physical”, the slogan advocated over many years by Rolf Landauer of IBM, has recently led to some remarkable changes in the way we view communications, computing and cryptography. By employing quantum physics, several objectives that were thought impossible in a classical world have now proven to be possible. Quantum communications links, for example, become impossible to eavesdrop without detection. Quantum computers (were they to be realized) could turn some algorithms that are labelled “difficult” for a classical machine, no matter how powerful, into ones that become “simple”. The details of what constitutes “difficult” and what “easy” are the subject of mathematical complexity theory, but an example here will illustrate the point and the impact that quantum information processors will have on all of us. The security of many forms of encryption is predicated on the difficulty of factoring large numbers. Finding the factors of a 1024-digit number would take longer than the age of the universe on a computer designed according to the laws of classical physics, and yet can be done in the blink of an eye on a quantum computer were it to have a comparable clock speed. But only if we can build one, and that's the challenge! No one has yet realized a quantum register of the necessary size, or quantum gates with the prerequisite accuracy. Yet it is worth the chase, as a quantum computer with a modest-sized register could out-perform any classical machine.

Type
Chapter
Information
Publisher: Cambridge University Press
Print publication year: 2004

Access options

Get access to the full version of this content by using one of the access options below. (Log in options will check for institutional or personal access. Content may require purchase if you do not have access.)

References

G. E. Moore, Electronics, 38 (1965), April 19 issue. This paper can be found at www.intel.com/research/silicon/mooreslaw/htm
Reprinted in J. S. Bell, Speakable and Unspeakable in Quantum Mechanics (Cambridge: Cambridge University Press, 1987), p. 139
Bollinger, J. J., Itano, W. M., Wineland, D. J. and Heinzen, D. J., Phys. Rev. A, 54 (1996), R4649; C. C. Gerry, Phys. Rev. A, 61 (2000), 043811CrossRef
W. Heitler, The Quantum Theory of Radiation, 3rd edition (London: Oxford University Press, 1954)
Kok, P., Lee, H. and Dowling, J. P., Phys. Rev. A, 65 (2002), 052104CrossRef
Gerry, C. C. and Campos, R. A., Phys. Rev. A, 64 (2001), 063814; C. C. Gerry, A. Benmoussa and R. A. Campos, Phys. Rev. A, 66 (2002), 013804CrossRef
See, for example, Banaszek, K. and Walmsley, I. A., Opt. Lett. 28 (2003), 52; M. J. Fitch, B. C. Jacobs, T. B. Pittman and J. D. Franson, Phys. Rev. A, 68 (2003), 043814CrossRef
Holland, M. J. and Burnett, K., Phys. Rev. Lett., 71 (1993), 1355CrossRef
Campos, R. A., Gerry, C. C. and Benmoussa, A., Phys. Rev. A, 68 (2003), 023810CrossRef
Bennett, C. H., Brassrad, G., Crepeau, C., Jozsa, R., Peres, A. and Wooters, W. K., Phys. Rev. Lett., 70 (1993), 1895CrossRef
Boschi, D., Branca, S., Martini, F. and Hardy, L., Phys. Rev. Lett., 80 (1998), 1121CrossRef
Bouwmeester, D., Pan, J.-W., Mattle, K., Eibl, M., Weinfurter, H. and Zeilinger, A., Nature, 390 (1997), 575CrossRef
Furuwasa, A., S⊘rensen, J., Braunstein, S. L., Fuchs, C. A., Kimble, H. J. and Polzik, E. S., Science, 282 (1998), 706CrossRef
R. Rivest, A. Shamir and L. Adleman, “On Digital Signatures and Public-Key Cryptosystems”, MIT Laboratory for Computer Science Technical Report, MIT/LCS/TR-212 (January 1979)
Deutsch, D., Proc. R. Soc. Lond. A 400 (1985), 97CrossRef
Deutsch, D. and Jozsa, R., Proc. R. Soc. Lond. A 439 (1992), 553CrossRef
P. W. Shor, in Proceedings of the 35th Symposium on Foundations of Computer Science, Los Alamitos, edited by S. Goldwasser (1994) (IEEE Computer Society Press), p. 124
Vandersypen, L. M. K., Steffen, M., Breyta, G., Yannoni, C. S., Sherwood, M. H. and Chuang, I. L., Nature, 414 (2001), 883CrossRef
Bennett, C. H. and Brassard, G., in Proc. of IEEE Conference on Computers, Systems and Signal Processing (New York: IEEE Press, 1984). See also C. H. Bennett. F. Besette, G. Brassard, L. Salvail and J. Smolin, J. Cryptol., 5 (1992), 3CrossRef
Bennett, C. H., Phys. Rev. Lett., 68 (1992), 3121CrossRef
Ekert, A. K., Phys. Rev. Lett., 67 (1991), 661CrossRef
Gisin, N., Ribordy, G., Tittel, W. and Zbinden, H., Rev. Mod. Phys., 74 (2002), 145CrossRef
Guide, S., Riebe, M., Lancaster, G. P. T., Becher, C., Eschner, J., Häffner, H., Schmidt-Kaler, F., Chuang, I. L. and Blatt, R., Nature, 421 (2003), 48
Grover, L. K., Phys. Rev. Lett., 79 (1997), 325CrossRef
Chuang, I. L. and Yamamoto, Y., Phys. Rev. A, 52 (1995), 3489CrossRef
Fredkin, E. and Toffoli, T., Int. J. Theor. Phys., 21 (1982), 219CrossRef
Milburn, G. J., Phys. Rev. A, 62 (1989), 2124
O'Brien, J. L., Pryde, G. J., White, A. G., Ralph, T. C. and Branning, D., Nature, 426 (2003), 264CrossRef
Knill, E., Laflamme, R. and Milburn, G., Nature, 409 (2001), 46CrossRef
See Sleator, T. and Weinfurter, H., Phys. Rev. Lett., 74 (1995), 4087; P. Domokos, J. M. Raimond, M. Brune and S. Haroche, Phys. Rev. A, 52 (1995), 3554CrossRef
See Monroe, C., Meekhof, D. M., King, B. E., Itano, W. M. and Wineland, D. J., Phys. Rev. Lett., 75 (1995), 4714
See Meacher, D. R., Contemp. Phys., 39 (1998), 329; I. H. Deutsch and G. K. Brennen, Forts. Phys., 48 (2000), 925CrossRef
Calderbank, A. and Shor, P., Phys. Rev. A, 52 (1995), R2493; Phys. Rev. A, 54 (1996), 1098; A. M. Steane, Phys. Rev. Lett., 77 (1995), 793
Palma, G. M., Suominen, K.-A. and Ekert, A. K., Proc. R. Soc. Lond., A 452 (1996), 567CrossRef
Lidar, D., Chuang, I. L. and Whaley, B., Phys. Rev. Lett., 81 (1998), 2594CrossRef
P. Garrett, Making and Breaking Codes: An Introduction to Cryptology (Upper Saddle River: Prentice Hall, 2001)
S. Singh, The Code Book: The Science of Secrecy from Ancient Eygpt to Quantum Cryptography (New York: Anchor Books, 1999)
H.-K. Lo, S. Popescu and T. Spliller (editors), Introduction to Quantum Computation and Quantum Information (Singapore: World Scientific, 1998)
D. Bouwmeester, A. K. Ekert and A. Zeilinger (editors), The Physics of Quantum Information (Berlin: Springer, 2000)
M. Nielsen and I. L. Chuang, Quantum Information and Quantum Computation (Cambridge: Cambridge University Press, 2001)
S. L. Braunstein and H.-K. Lo, Scalable Quantum Computers (Berlin: Wiley-VCH, 2001)
Barenco, A., “Quantum physics and computers”, Contemp. Phys., 37 (1996), 375CrossRefGoogle Scholar
DiVincenzo, D. P., “Quantum Computation”, Science, 270 (1995), 255CrossRefGoogle Scholar
Hughes, R. J., Alde, D. M., Dyer, P., Luther, G. G., Morgan, G. L. and Schauer, M., “Quantum cryptography”, Contemp. Phys., 36 (1995), 149CrossRefGoogle Scholar
Phoenix, S. J. D. and Townsend, P. D., “Quantum cryptography: how to beat the code breakers using quantum mechanics”, Contemp. Phys., 36 (1995), 165CrossRefGoogle Scholar
Plenio, M. B. and Vedral, V., “Teleportation, entanglement and thermodynamics in the quantum world”, Contemp. Phys., 39 (1998), 431CrossRefGoogle Scholar

Save book to Kindle

To save this book to your Kindle, first ensure coreplatform@cambridge.org is added to your Approved Personal Document E-mail List under your Personal Document Settings on the Manage Your Content and Devices page of your Amazon account. Then enter the ‘name’ part of your Kindle email address below. Find out more about saving to your Kindle.

Note you can select to save to either the @free.kindle.com or @kindle.com variations. ‘@free.kindle.com’ emails are free but can only be saved to your device when it is connected to wi-fi. ‘@kindle.com’ emails can be delivered even when you are not connected to wi-fi, but note that service fees apply.

Find out more about the Kindle Personal Document Service.

Available formats
×

Save book to Dropbox

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Dropbox.

Available formats
×

Save book to Google Drive

To save content items to your account, please confirm that you agree to abide by our usage policies. If this is the first time you use this feature, you will be asked to authorise Cambridge Core to connect with your account. Find out more about saving content to Google Drive.

Available formats
×