Skip to main content Accessibility help
×
Home
  • Print publication year: 2004
  • Online publication date: September 2012

11 - Applications of entanglement: Heisenberg-limited interferometry and quantum information processing

Summary

“All information is physical”, the slogan advocated over many years by Rolf Landauer of IBM, has recently led to some remarkable changes in the way we view communications, computing and cryptography. By employing quantum physics, several objectives that were thought impossible in a classical world have now proven to be possible. Quantum communications links, for example, become impossible to eavesdrop without detection. Quantum computers (were they to be realized) could turn some algorithms that are labelled “difficult” for a classical machine, no matter how powerful, into ones that become “simple”. The details of what constitutes “difficult” and what “easy” are the subject of mathematical complexity theory, but an example here will illustrate the point and the impact that quantum information processors will have on all of us. The security of many forms of encryption is predicated on the difficulty of factoring large numbers. Finding the factors of a 1024-digit number would take longer than the age of the universe on a computer designed according to the laws of classical physics, and yet can be done in the blink of an eye on a quantum computer were it to have a comparable clock speed. But only if we can build one, and that's the challenge! No one has yet realized a quantum register of the necessary size, or quantum gates with the prerequisite accuracy. Yet it is worth the chase, as a quantum computer with a modest-sized register could out-perform any classical machine.

References
G. E. Moore, Electronics, 38 (1965), April 19 issue. This paper can be found at www.intel.com/research/silicon/mooreslaw/htm
Reprinted in J. S. Bell, Speakable and Unspeakable in Quantum Mechanics (Cambridge: Cambridge University Press, 1987), p. 139
Bollinger, J. J., Itano, W. M., Wineland, D. J. and Heinzen, D. J., Phys. Rev. A, 54 (1996), R4649; C. C. Gerry, Phys. Rev. A, 61 (2000), 043811
W. Heitler, The Quantum Theory of Radiation, 3rd edition (London: Oxford University Press, 1954)
Kok, P., Lee, H. and Dowling, J. P., Phys. Rev. A, 65 (2002), 052104
Gerry, C. C. and Campos, R. A., Phys. Rev. A, 64 (2001), 063814; C. C. Gerry, A. Benmoussa and R. A. Campos, Phys. Rev. A, 66 (2002), 013804
See, for example, Banaszek, K. and Walmsley, I. A., Opt. Lett. 28 (2003), 52; M. J. Fitch, B. C. Jacobs, T. B. Pittman and J. D. Franson, Phys. Rev. A, 68 (2003), 043814
Holland, M. J. and Burnett, K., Phys. Rev. Lett., 71 (1993), 1355
Campos, R. A., Gerry, C. C. and Benmoussa, A., Phys. Rev. A, 68 (2003), 023810
Bennett, C. H., Brassrad, G., Crepeau, C., Jozsa, R., Peres, A. and Wooters, W. K., Phys. Rev. Lett., 70 (1993), 1895
Boschi, D., Branca, S., Martini, F. and Hardy, L., Phys. Rev. Lett., 80 (1998), 1121
Bouwmeester, D., Pan, J.-W., Mattle, K., Eibl, M., Weinfurter, H. and Zeilinger, A., Nature, 390 (1997), 575
Furuwasa, A., S⊘rensen, J., Braunstein, S. L., Fuchs, C. A., Kimble, H. J. and Polzik, E. S., Science, 282 (1998), 706
R. Rivest, A. Shamir and L. Adleman, “On Digital Signatures and Public-Key Cryptosystems”, MIT Laboratory for Computer Science Technical Report, MIT/LCS/TR-212 (January 1979)
Deutsch, D., Proc. R. Soc. Lond. A 400 (1985), 97
Deutsch, D. and Jozsa, R., Proc. R. Soc. Lond. A 439 (1992), 553
P. W. Shor, in Proceedings of the 35th Symposium on Foundations of Computer Science, Los Alamitos, edited by S. Goldwasser (1994) (IEEE Computer Society Press), p. 124
Vandersypen, L. M. K., Steffen, M., Breyta, G., Yannoni, C. S., Sherwood, M. H. and Chuang, I. L., Nature, 414 (2001), 883
Bennett, C. H. and Brassard, G., in Proc. of IEEE Conference on Computers, Systems and Signal Processing (New York: IEEE Press, 1984). See also C. H. Bennett. F. Besette, G. Brassard, L. Salvail and J. Smolin, J. Cryptol., 5 (1992), 3
Bennett, C. H., Phys. Rev. Lett., 68 (1992), 3121
Ekert, A. K., Phys. Rev. Lett., 67 (1991), 661
Gisin, N., Ribordy, G., Tittel, W. and Zbinden, H., Rev. Mod. Phys., 74 (2002), 145
Guide, S., Riebe, M., Lancaster, G. P. T., Becher, C., Eschner, J., Häffner, H., Schmidt-Kaler, F., Chuang, I. L. and Blatt, R., Nature, 421 (2003), 48
Grover, L. K., Phys. Rev. Lett., 79 (1997), 325
Chuang, I. L. and Yamamoto, Y., Phys. Rev. A, 52 (1995), 3489
Fredkin, E. and Toffoli, T., Int. J. Theor. Phys., 21 (1982), 219
Milburn, G. J., Phys. Rev. A, 62 (1989), 2124
O'Brien, J. L., Pryde, G. J., White, A. G., Ralph, T. C. and Branning, D., Nature, 426 (2003), 264
Knill, E., Laflamme, R. and Milburn, G., Nature, 409 (2001), 46
See Sleator, T. and Weinfurter, H., Phys. Rev. Lett., 74 (1995), 4087; P. Domokos, J. M. Raimond, M. Brune and S. Haroche, Phys. Rev. A, 52 (1995), 3554
See Monroe, C., Meekhof, D. M., King, B. E., Itano, W. M. and Wineland, D. J., Phys. Rev. Lett., 75 (1995), 4714
See Meacher, D. R., Contemp. Phys., 39 (1998), 329; I. H. Deutsch and G. K. Brennen, Forts. Phys., 48 (2000), 925
Calderbank, A. and Shor, P., Phys. Rev. A, 52 (1995), R2493; Phys. Rev. A, 54 (1996), 1098; A. M. Steane, Phys. Rev. Lett., 77 (1995), 793
Palma, G. M., Suominen, K.-A. and Ekert, A. K., Proc. R. Soc. Lond., A 452 (1996), 567
Lidar, D., Chuang, I. L. and Whaley, B., Phys. Rev. Lett., 81 (1998), 2594
Bibliography
P. Garrett, Making and Breaking Codes: An Introduction to Cryptology (Upper Saddle River: Prentice Hall, 2001)
S. Singh, The Code Book: The Science of Secrecy from Ancient Eygpt to Quantum Cryptography (New York: Anchor Books, 1999)
H.-K. Lo, S. Popescu and T. Spliller (editors), Introduction to Quantum Computation and Quantum Information (Singapore: World Scientific, 1998)
D. Bouwmeester, A. K. Ekert and A. Zeilinger (editors), The Physics of Quantum Information (Berlin: Springer, 2000)
M. Nielsen and I. L. Chuang, Quantum Information and Quantum Computation (Cambridge: Cambridge University Press, 2001)
S. L. Braunstein and H.-K. Lo, Scalable Quantum Computers (Berlin: Wiley-VCH, 2001)
Barenco, A., “Quantum physics and computers”, Contemp. Phys., 37 (1996), 375
DiVincenzo, D. P., “Quantum Computation”, Science, 270 (1995), 255
Hughes, R. J., Alde, D. M., Dyer, P., Luther, G. G., Morgan, G. L. and Schauer, M., “Quantum cryptography”, Contemp. Phys., 36 (1995), 149
Phoenix, S. J. D. and Townsend, P. D., “Quantum cryptography: how to beat the code breakers using quantum mechanics”, Contemp. Phys., 36 (1995), 165
Plenio, M. B. and Vedral, V., “Teleportation, entanglement and thermodynamics in the quantum world”, Contemp. Phys., 39 (1998), 431