Welcome to the Quantum Jargon Decoder

Quantum computing, quantum information, and quantum cryptography are revolutionizing how we think about computation, communication, and security. But the field is drowning in jargon.

Qubits. Superposition. Entanglement. Decoherence. T1 times. Surface codes. NISQ. QKD.

If you’ve ever felt lost reading a quantum computing paper, tutorial, or press release, you’re not alone. This glossary exists to help you decode the quantum world.

Who is this for?

  • Newcomers taking their first steps into quantum computing
  • Software developers exploring quantum programming
  • Researchers from adjacent fields entering the quantum space
  • Students studying quantum information theory
  • Anyone who wants to refresh their memory on a specific term
  • Professionals trying to cut through the hype and understand what’s real

How to use this guide

Each term includes:

  • A one-liner summary for quick reference
  • A detailed explanation for deeper understanding
  • Cross-references to related concepts
  • Practical context on why the term matters

Start with the Introduction to Quantum Jargon if you’re completely new, or jump directly to any term that’s puzzling you.

A note on rigor

This is an informal glossary. We prioritize clarity and intuition over mathematical precision. When a concept requires deep mathematical treatment, we’ll point you to the right resources. The goal is to give you a working understanding, not to replace a textbook.

Contribute

Spot an error? Have a term to add? Think an explanation could be clearer? This is an open project and contributions are welcome. Every page has an “Edit” link that takes you directly to the source.


“The quantum world is strange, but the jargon doesn’t have to be.”

Time to decode it.

The Quantum Computing Stack

Before diving into individual terms, it helps to understand how quantum computing is organized. Like classical computing, quantum computing has “layers” or a “stack” that builds from physics up to applications.

The Layers

1. Physical Layer (The Hardware)

At the bottom is actual quantum hardware. This includes:

  • Qubits: The physical quantum systems that store information (superconducting circuits, trapped ions, photons, etc.)
  • Control systems: Lasers, microwave pulses, and electronics that manipulate qubits
  • Cooling systems: Dilution refrigerators that keep superconducting qubits near absolute zero

Key terms: Superconducting Qubit, Trapped Ion, Photonic Qubit

2. Quantum Gate Layer

Above the physics, we have quantum operations:

  • Gates: The quantum equivalent of logic gates (AND, OR, NOT in classical computing)
  • Circuits: Sequences of gates that perform computations
  • Measurement: Reading out the result of a computation

Key terms: Quantum Gate, Hadamard Gate, CNOT Gate, Quantum Circuit

3. Error Correction Layer

Quantum systems are noisy. This layer deals with that:

  • Error detection: Finding when errors occur
  • Error correction: Fixing errors without destroying quantum information
  • Logical qubits: Error-protected qubits built from many physical qubits

Key terms: Quantum Error Correction, Surface Code, Logical Qubit, Fault Tolerance

4. Algorithm Layer

This is where computation happens:

  • Quantum algorithms: Procedures that leverage quantum effects for computational advantage
  • Variational methods: Hybrid quantum-classical approaches for near-term devices

Key terms: Shor’s Algorithm, Grover’s Algorithm, VQE, QAOA

5. Application Layer

At the top, real-world problems:

  • Cryptography: Secure communication, key distribution
  • Chemistry: Molecular simulation, drug discovery
  • Optimization: Supply chain, finance, logistics
  • Machine learning: Quantum-enhanced AI

Key terms: Quantum Key Distribution, Quantum Simulation, Quantum Machine Learning

Where Are We Today?

As of 2024-2025, we’re in the NISQ era (Noisy Intermediate-Scale Quantum). This means:

  • We have quantum computers with 50-1000+ qubits
  • These qubits are “noisy” (error-prone) and lack full error correction
  • We’re exploring what useful tasks these imperfect machines can do
  • Full fault-tolerant quantum computing is still years away

Key terms: NISQ, Quantum Advantage, Fault-Tolerant Quantum Computing

The Path Forward

Today: NISQ devices (noisy, limited)
       ↓
Next:  Early fault-tolerant systems (100s of logical qubits)
       ↓
Goal:  Large-scale fault-tolerant quantum computers (millions of qubits)

Understanding this stack helps contextualize every term you’ll encounter. When someone mentions “T1 times,” you know that’s about physical hardware. When they discuss “logical qubits,” that’s the error correction layer. When they’re excited about “quantum advantage,” that’s about the algorithm/application layers proving real value.


Next: From Classical to Quantum - Understanding what makes quantum different.

From Classical to Quantum

What makes quantum computing fundamentally different from classical computing? This section breaks down the core concepts that separate the two worlds.

Classical Bits vs. Quantum Bits

Classical Bit

A classical bit is simple: it’s either 0 or 1. Period.

Classical bit: 0  OR  1

Every computer you’ve ever used processes information this way. Billions of transistors switching between two states.

Quantum Bit (Qubit)

A qubit can be 0, 1, or both at the same time.

Qubit: α|0⟩ + β|1⟩

This “both at the same time” is called superposition. The numbers α and β are complex numbers called amplitudes that describe the probability of measuring 0 or 1.

Important: When you measure a qubit, you get a definite answer (0 or 1). The superposition “collapses.” You can’t peek at the superposition directly.

The Three Pillars of Quantum Computing

1. Superposition

A qubit in superposition isn’t undecided. It’s genuinely in multiple states simultaneously. This allows quantum computers to explore many possibilities at once.

This qubit has equal probability of being measured as 0 or 1.

Why it matters: With qubits, you can represent states simultaneously. 50 qubits can represent more states than a classical supercomputer can track individually.

2. Entanglement

When qubits become entangled, their states become correlated in ways impossible classically. Measure one, and you instantly know something about the other, regardless of distance.

The most famous entangled state is the Bell state:

Both qubits are in superposition, but they’re perfectly correlated: if you measure the first as 0, the second will also be 0. Measure 1, and the second is 1.

Why it matters: Entanglement is a resource for quantum computation and communication. It enables quantum teleportation, superdense coding, and is essential for quantum speedups.

3. Interference

Quantum states can interfere with each other, like waves in water. Amplitudes can add (constructive interference) or cancel (destructive interference).

Why it matters: Quantum algorithms are designed to make wrong answers interfere destructively and right answers interfere constructively. This is how you extract useful results from quantum computation.

How Quantum Computation Works

A quantum computation follows this pattern:

1. INITIALIZE: Prepare qubits in a known state (usually |0⟩)
2. SUPERPOSE: Put qubits into superposition (using Hadamard gates, etc.)
3. ENTANGLE: Create correlations between qubits (using CNOT gates, etc.)
4. COMPUTE: Apply quantum gates that cause interference
5. MEASURE: Read out the final answer

The art of quantum algorithm design is arranging steps 2-4 so that interference amplifies correct answers and suppresses wrong ones.

What Quantum Computers Are NOT

Common myths:

NOT exponentially parallel classical computers: You can’t just run all possible inputs simultaneously and read all outputs. Measurement gives you ONE result.

NOT instantaneous: Quantum operations take time, and quantum algorithms have complexity like classical ones.

NOT universally faster: Only specific problems have known quantum speedups. For many tasks, classical computers are just as good or better.

NOT breaking physics: Entanglement doesn’t enable faster-than-light communication. You need classical communication to use quantum correlations.

When Quantum Computers Help

Quantum computers excel at specific problem types:

Problem TypeExampleQuantum Advantage
FactoringBreaking RSAExponential (Shor’s Algorithm)
Unstructured searchDatabase searchQuadratic (Grover’s Algorithm)
SimulationMolecular chemistryPotentially exponential
OptimizationCombinatorial problemsUnclear/Active research
Linear algebraSolving linear systemsExponential* (HHL)

*With caveats about input/output

Key Intuition

Think of quantum computing like this:

Classical computing is like reading a book page by page.

Quantum computing is like having a book where all pages exist in superposition, and through careful manipulation, you can make the page you’re looking for “pop out” with high probability.

The challenge? Designing that “careful manipulation.” Most of the pages you don’t want need to interfere destructively, while the answer constructively builds up. This is genuinely hard, which is why useful quantum algorithms are rare and precious.


Now you have the conceptual foundation. Head to the Acronyms for quick reference, or dive into specific definitions to explore further.

Acronyms

A list of common acronyms you’ll encounter in quantum computing, quantum information, and quantum cryptography.


B

C

  • CNOT: Controlled-NOT (gate) - see CNOT Gate
  • CZ: Controlled-Z (gate)

E

  • E91: Ekert 1991 (QKD protocol) - see E91 Protocol
  • EPR: Einstein-Podolsky-Rosen (paradox/pair)

F

G

  • GHZ: Greenberger-Horne-Zeilinger (state)

N

  • NISQ: Noisy Intermediate-Scale Quantum - see NISQ

P

Q

R

  • RSA: Rivest-Shamir-Adleman (cryptosystem)

V


Common Notation

  • |ψ⟩: Ket notation for a quantum state (pronounced “ket psi”)
  • ⟨ψ|: Bra notation (pronounced “bra psi”)
  • ⟨ψ|φ⟩: Inner product (pronounced “bra-ket” or “bracket”)
  • |0⟩, |1⟩: Computational basis states
  • |+⟩, |−⟩: Hadamard basis states,
  • : Tensor product (combining quantum systems)
  • : Dagger (Hermitian conjugate)
  • I: Identity operator
  • ρ: Density matrix
  • H: Hadamard gate (or Hamiltonian, depending on context)
  • X, Y, Z: Pauli matrices/gates
  • T₁, T₂: Relaxation and dephasing times

Missing an acronym? Contribute to add it!

Qubit

The quantum analog of a classical bit, and the basic unit of quantum information.


A qubit (quantum bit) is a two-level quantum system that serves as the basic unit of information in quantum computing. Unlike a classical bit, which is definitively 0 or 1, a qubit can exist in a superposition of both states simultaneously.

Mathematical Description

A qubit’s state is described as:

where:

  • and are the computational basis states
  • and are complex amplitudes
  • (normalization condition)

When measured, the qubit collapses to with probability or to with probability .

Physical Implementations

Qubits can be realized in many physical systems:

TechnologyQubit TypeKey Players
Superconducting circuitsTransmon, flux qubitIBM, Google, Rigetti
Trapped ionsHyperfine/Zeeman levelsIonQ, Quantinuum
PhotonsPolarization, pathXanadu, PsiQuantum
Neutral atomsGround/Rydberg statesQuEra, Pasqal
Quantum dotsSpin statesIntel
NV centersSpin statesVarious research

Key Properties

  1. Superposition: A qubit can be in a combination of and
  2. Measurement collapse: Observing a qubit forces it into a definite state
  3. No-cloning: You cannot copy an unknown qubit state (see No-Cloning Theorem)
  4. Entanglement: Qubits can become correlated with other qubits (see Entanglement)

Visualization

The Bloch sphere provides a geometric visualization of a qubit’s state. Any pure qubit state corresponds to a point on the surface of a unit sphere:

  • is at the north pole
  • is at the south pole
  • Superposition states lie elsewhere on the sphere

Why It Matters

The qubit is the foundation of everything in quantum computing. Understanding qubits is essential for understanding:


See also: Superposition, Bloch Sphere, Quantum State, Logical Qubit, Physical Qubit

Superposition

A quantum system existing in multiple states simultaneously until measured.


Superposition is perhaps the most famous feature of quantum mechanics. A quantum system in superposition is not in one definite state but rather in a combination of multiple possible states at once.

The Concept

Consider a qubit. Classically, a bit is either 0 or 1. A qubit in superposition is both 0 and 1 simultaneously:

This is not the same as:

  • Being 0 or 1 but we don’t know which (that’s classical uncertainty)
  • Switching rapidly between 0 and 1
  • Being “kind of” 0 and “kind of” 1

Superposition is genuinely being in multiple states at once, a distinctly quantum phenomenon with no classical analog.

Measurement and Collapse

When you measure a qubit in superposition, you get a definite result:

  • with probability
  • with probability

After measurement, the superposition is destroyed. The qubit is now in the measured state. This is called wavefunction collapse or state collapse.

Creating Superposition

The most common way to create superposition is with the Hadamard gate:

This takes a qubit in state and puts it in an equal superposition.

Multi-Qubit Superposition

With qubits, you can create superposition over states:

For example, 3 qubits can be in superposition over 8 states (000, 001, 010, 011, 100, 101, 110, 111) simultaneously.

This is often called quantum parallelism, but be careful! You can’t simply “read out” all values. Measurement gives you just one result.

Why It Matters

Superposition is essential for:

  • Quantum parallelism: Processing multiple possibilities simultaneously
  • Quantum interference: Making wrong answers cancel out (see Interference)
  • Quantum speedups: Algorithms like Grover’s exploit superposition

Common Misconception

Superposition ≠ randomness. A qubit in state is not in superposition. It will definitely measure as 0. A qubit in superposition has specific amplitudes that determine measurement probabilities and can interfere with other amplitudes.


See also: Qubit, Hadamard Gate, Measurement, Quantum Parallelism

Entanglement

A quantum correlation between particles where the state of one instantly relates to the state of another, regardless of distance.


Entanglement is one of the most profound features of quantum mechanics. When particles become entangled, their quantum states become correlated in ways that have no classical explanation. Einstein famously called it “spooky action at a distance.”

The Basic Idea

Consider two qubits in this state (a Bell state):

This state says: “Both qubits are in superposition, but they’re perfectly correlated.”

  • Measure the first qubit as 0 → the second qubit is definitely 0
  • Measure the first qubit as 1 → the second qubit is definitely 1

The correlation is instant and works regardless of how far apart the qubits are separated.

What Entanglement Is NOT

  • NOT faster-than-light communication: You can’t send information using entanglement alone. The measurement results are random, and you can’t control what you get.
  • NOT the same as classical correlation: If I put one red ball and one blue ball in separate boxes and ship them apart, opening one tells me the other’s color. But quantum entanglement is different. Bell’s theorem proves this mathematically.

Creating Entanglement

The standard way to entangle two qubits:

  1. Start with
  2. Apply Hadamard to the first qubit:
  3. Apply CNOT with first qubit as control:

Types of Entangled States

Bell States (2 qubits):

GHZ State (3+ qubits):

W State (3 qubits):

Why It Matters

Entanglement is a resource for quantum computing and communication:

ApplicationHow Entanglement Helps
Quantum teleportationTransfer quantum states using entanglement + classical bits
Superdense codingSend 2 classical bits using 1 qubit + entanglement
Quantum key distributionDetect eavesdroppers via entanglement correlations
Quantum algorithmsCreate correlations that enable speedups
Quantum error correctionSpread information across entangled qubits

Measuring Entanglement

How do you know if a state is entangled? A pure state of two systems is entangled if it cannot be written as a product state . For mixed states, various entanglement measures exist (concurrence, negativity, entanglement entropy).


See also: Bell State, Bell Inequality, Quantum Teleportation, CNOT Gate

Quantum State

The complete mathematical description of a quantum system, containing all information needed to predict measurement outcomes.


A quantum state is the mathematical object that fully describes a quantum system. It encodes everything you can know about the system and determines the probabilities of all possible measurement outcomes.

Pure States

The simplest quantum states are pure states, represented as vectors in Hilbert space using bra-ket notation:

A pure state represents a system with no classical uncertainty. Any uncertainty is purely quantum mechanical (superposition).

Properties of Pure States

  • Represented by a vector (a “ket”)
  • Normalized:
  • Can be visualized on the Bloch sphere (for single qubits)

Mixed States

When there is classical uncertainty (e.g., the system might be in state with probability or with probability ), we use mixed states represented by density matrices:

Mixed states arise from:

  • Classical uncertainty about preparation
  • Decoherence (interaction with environment)
  • Tracing out part of an entangled system

State Space

For a single qubit, the state space is 2-dimensional. For qubits, the state space is -dimensional. This exponential growth is both the promise and challenge of quantum computing:

QubitsState Space Dimension
12
24
101,024
50~10^15
100~10^30

Common States

Single-qubit basis states:

  • and : computational basis
  • and : Hadamard basis

Multi-qubit states:

  • : 2-qubit computational basis
  • Bell states: maximally entangled 2-qubit states

State Evolution

Quantum states evolve in two ways:

  1. Unitary evolution: Applying quantum gates

  2. Measurement: Collapsing to an eigenstate

Describing States

Multiple equivalent ways to describe quantum states:

RepresentationUse Case
State vector Pure states
Density matrix Pure or mixed states
Bloch vectorSingle-qubit visualization
Wavefunction Position representation

See also: Pure State, Mixed State, Density Matrix, Bloch Sphere, Hilbert Space

Bloch Sphere

A geometric representation of a single qubit’s state as a point on (or inside) a unit sphere.


The Bloch sphere is the standard way to visualize single-qubit states. Every pure state of a qubit corresponds to a unique point on the surface of a unit sphere, making it invaluable for building intuition about quantum operations.

The Geometry

A general single-qubit pure state can be written as:

where:

  • (theta): angle from the north pole (0 to π)
  • (phi): azimuthal angle around the equator (0 to 2π)

These angles define a point on the sphere:

  • North pole ():
  • South pole ():
  • Equator (): Equal superposition states like , , ,

Key Points on the Sphere

StatePositionCoordinates
North pole(0, 0, 1)
South pole(0, 0, -1)
+X axis(1, 0, 0)
-X axis(-1, 0, 0)
+Y axis(0, 1, 0)
-Y axis(0, -1, 0)

Gates as Rotations

Single-qubit gates correspond to rotations on the Bloch sphere:

  • Pauli X: 180° rotation around X-axis (bit flip: )
  • Pauli Y: 180° rotation around Y-axis
  • Pauli Z: 180° rotation around Z-axis (phase flip)
  • Hadamard: 180° rotation around the axis halfway between X and Z
  • Phase gates: Rotations around Z-axis by various angles

Any single-qubit gate is a rotation on the Bloch sphere, and any rotation can be decomposed into rotations around X, Y, and Z axes.

Mixed States

For mixed states, points lie inside the sphere:

  • Pure states: surface of the sphere (radius = 1)
  • Mixed states: inside the sphere (radius < 1)
  • Maximally mixed state (): center of the sphere

The radius indicates the “purity” of the state.

Limitations

The Bloch sphere only works for single qubits. For multiple qubits, the state space is too high-dimensional to visualize this way. There’s no simple “Bloch sphere” for 2 or more qubits.

Why It Matters

The Bloch sphere is essential for:

  • Building intuition about qubit states and gates
  • Visualizing quantum operations
  • Understanding errors (how states drift on the sphere)
  • Teaching quantum computing concepts

See also: Qubit, Quantum State, Pauli Gates, Mixed State

Measurement

The process of extracting classical information from a quantum system, which fundamentally disturbs the quantum state.


Measurement is how we get information out of a quantum computer. It’s also one of the most counterintuitive aspects of quantum mechanics: measuring a quantum system fundamentally changes it.

The Measurement Process

When you measure a qubit in the computational basis:

  1. Before: Qubit is in state
  2. Measurement: You observe either 0 or 1
  3. After: Qubit “collapses” to the observed state ( or )

The probabilities are given by the Born rule:

  • Probability of 0:
  • Probability of 1:

Key Properties

Probabilistic

Even if you know the exact quantum state, you can only predict measurement probabilities, not definite outcomes (unless the state is already an eigenstate of the measurement).

Irreversible

Measurement destroys the superposition. You cannot “undo” a measurement to recover the original state.

Basis-Dependent

You can measure in different bases:

  • Computational basis (Z): Measures vs
  • Hadamard basis (X): Measures vs
  • Y basis: Measures vs

The same state gives different results in different bases.

Types of Measurement

Projective Measurement

The standard quantum measurement, described by projection operators. For computational basis:

POVM (Positive Operator-Valued Measure)

A generalization that allows for more measurement outcomes than basis states. Used in quantum information theory and quantum cryptography.

Weak Measurement

Partial measurement that disturbs the state less but provides less information. Useful for studying quantum systems without fully collapsing them.

Mid-Circuit Measurement

Modern quantum computers support measuring qubits in the middle of a circuit (not just at the end). This enables:

  • Classical feedforward: Conditioning later operations on measurement results
  • Quantum error correction: Measuring syndromes without destroying logical information
  • Repeat-until-success protocols: Retrying until desired outcome occurs

Measurement in Practice

In real quantum hardware, measurement is often the slowest and noisiest operation:

  • Superconducting qubits: ~1 μs readout time
  • Trapped ions: ~100 μs readout time

Measurement errors (misreading 0 as 1 or vice versa) are a significant source of noise.

Why It Matters

  • Measurement is how we extract answers from quantum computations
  • The measurement problem is at the heart of quantum mechanics interpretation debates
  • Understanding measurement is important for designing algorithms and error correction

See also: Born Rule, Quantum State, Superposition, Quantum Circuit

Born Rule

The fundamental rule that connects quantum amplitudes to measurement probabilities: probability equals amplitude squared.


The Born rule is the bridge between the abstract mathematics of quantum mechanics and experimental observations. It tells us how to calculate the probability of getting a particular measurement outcome.

The Rule

For a quantum state , the probability of measuring outcome is:

In other words: probability = |amplitude|²

Example

Consider a qubit in state:

The measurement probabilities are:

Note that probabilities sum to 1 (which is why we need the normalization condition).

Why Squared?

The Born rule is a postulate of quantum mechanics. It’s not derived from deeper principles. Some interpretations (like many-worlds) attempt to derive it, but we accept it because it matches experimental results with extraordinary precision.

The squaring is key:

  • Amplitudes can be negative or complex
  • Probabilities must be non-negative
  • The absolute value squared ensures non-negative probabilities

For Density Matrices

For mixed states described by density matrix :

Why It Matters

The Born rule is:

  • The only way to connect quantum theory to experiment
  • Why quantum amplitudes interfering can affect measurement outcomes
  • Fundamental to understanding why quantum algorithms work

See also: Measurement, Quantum State, Superposition

Bra-Ket Notation

The standard mathematical notation for quantum states, invented by Dirac, using angle brackets and vertical bars.


Bra-ket notation (also called Dirac notation) is the standard language for writing quantum states and operations. Once you learn it, quantum mechanics becomes much easier to read and write.

The Basics

Kets |⟩

A ket represents a quantum state (a column vector):

You can put any label inside: , , , , , etc.

Bras ⟨|

A bra is the conjugate transpose of a ket (a row vector):

where is the complex conjugate of .

Operations

Inner Product (Bra-Ket)

Combining a bra and a ket gives a number:

This is also called a bracket (bra + ket = bracket).

For computational basis states:

Outer Product (Ket-Bra)

Combining a ket and a bra gives an operator (matrix):

Common Notation

NotationMeaning
Quantum state (ket)
Conjugate transpose (bra)
Inner product
Outer product (operator)
Matrix element of operator A
Operator A applied to state

Multi-Qubit States

For multiple qubits, we use tensor products:

All three notations mean the same thing. The tensor product symbol is often omitted.

Why This Notation?

  1. Compact: is shorter than writing column vectors
  2. Flexible: Works in any dimension, any basis
  3. Intuitive: Inner products look like what they compute
  4. Standard: Universal in quantum physics and computing

Pronunciation

  • : “ket zero”
  • : “bra psi”
  • : “bra phi ket psi” or “phi inner psi” or “bracket phi psi”

See also: Quantum State, Hilbert Space, Density Matrix

Density Matrix

A mathematical representation of quantum states that can describe both pure and mixed states, essential for open quantum systems and quantum noise.


A density matrix (also called a density operator) is a more general way to describe quantum states than state vectors. It’s essential when dealing with classical uncertainty, entangled subsystems, or noise.

Definition

For a pure state , the density matrix is:

For a mixed state (classical probability distribution over pure states):

where is the probability of being in state .

Example

Pure state :

Mixed state (50% , 50% ):

Note: These are different states! The pure state has off-diagonal elements (coherence), the mixed state doesn’t.

Properties

A valid density matrix must satisfy:

  1. Hermitian:
  2. Positive semi-definite: All eigenvalues
  3. Trace one:

Pure vs Mixed

How to tell if a state is pure or mixed:

PropertyPure StateMixed State
= 1< 1
Rank1> 1
Can be written as YesNo
On Bloch sphereSurfaceInterior

Measurement Probabilities

Using the Born rule with density matrices:

Time Evolution

Density matrices evolve via:

For open systems (with noise), we use quantum channels:

Why It Matters

Density matrices are essential for:

  • Describing noise and decoherence: Real quantum systems interact with their environment
  • Partial traces: Describing part of an entangled system
  • Quantum error correction: Tracking how errors affect states
  • Quantum information measures: Entropy, fidelity, trace distance

See also: Pure State, Mixed State, Quantum Channel

Pure State

A quantum state with no classical uncertainty. The most complete description of a quantum system.


A pure state represents a quantum system about which we have maximal knowledge. All uncertainty in a pure state is fundamentally quantum mechanical (superposition), not classical.

Definition

A pure state can be written as a single state vector:

Or equivalently, as a rank-1 density matrix:

Examples

  • : a definite computational basis state
  • : a superposition, but still pure
  • Bell states: entangled but pure

Characteristics

PropertyValue for Pure States
Purity 1
Von Neumann entropy0
Bloch sphere (1 qubit)On the surface
Density matrix rank1

Pure ≠ Definite

A common misconception: pure state does not mean the measurement outcome is certain.

is a pure state, but measuring it in the computational basis gives 0 or 1 with 50% probability each. The state is “pure” because there’s no additional classical uncertainty. We know the exact quantum state.

When Pure States Become Mixed

Pure states can become mixed states through:

  • Decoherence: Interaction with the environment
  • Partial trace: Looking at only part of an entangled system
  • Incomplete knowledge: Not knowing which state was prepared

See also: Mixed State, Density Matrix, Quantum State

Mixed State

A quantum state with classical uncertainty, a statistical mixture of pure states.


A mixed state describes a quantum system where we don’t have complete information. It’s a probabilistic combination of pure states, representing classical uncertainty on top of quantum uncertainty.

Definition

A mixed state cannot be written as a single state vector. It’s represented by a density matrix:

where are classical probabilities (summing to 1) and are pure states.

Example: The Maximally Mixed State

The simplest mixed state for a qubit:

This represents “no information at all” - maximum classical uncertainty.

Mixed ≠ Superposition

This is important to understand:

Superposition (Pure)Mixture (Mixed)
State50% + 50%
Density matrix
Off-diagonal termsNon-zero (coherence)Zero (no coherence)
Can interfereYesNo

The off-diagonal elements (“coherences”) are what distinguishes quantum superposition from classical probability.

How Mixed States Arise

  1. Incomplete preparation: You prepare or but forget which
  2. Decoherence: Environment interaction destroys coherence
  3. Partial trace: Taking part of an entangled system

Example: Entanglement and Mixed States

If two qubits are in Bell state and you only have access to one qubit:

Your qubit looks maximally mixed, even though the total system is pure!

Characteristics

PropertyPureMixed
= 1< 1
Von Neumann entropy0> 0
Bloch sphere (1 qubit)SurfaceInterior

Why It Matters

Mixed states are essential for:


See also: Pure State, Density Matrix, Decoherence

Hilbert Space

The mathematical space where quantum states live: a complete complex vector space with an inner product.


A Hilbert space is the mathematical arena for quantum mechanics. Every quantum state is a vector in a Hilbert space, and quantum operations are linear transformations on this space.

The Basics

For quantum computing purposes, think of a Hilbert space as:

  • A complex vector space (vectors have complex number components)
  • Equipped with an inner product
  • Complete (no “holes” or missing points)

Dimension

The dimension of the Hilbert space determines how many basis states exist:

SystemDimensionBasis States
1 qubit2
2 qubits4
n qubitsAll -bit strings
Harmonic oscillator

The exponential growth () is both the power and the challenge of quantum computing.

Key Properties

Inner Product

For any two states and :

Properties:

  • (and equals zero only if )
  • (conjugate symmetry)

Orthonormality

Basis states are orthonormal:

Normalization

Physical quantum states have unit norm:

Tensor Products

When combining quantum systems, Hilbert spaces combine via tensor products:

Dimension multiplies: if has dimension and has dimension , then has dimension .

For Working Quantum Scientists

In practice, you usually don’t need to think deeply about Hilbert space theory. Just know:

  1. States are vectors:
  2. Operators are matrices:
  3. Inner products give probabilities:
  4. Dimension grows exponentially with qubit count

Infinite-Dimensional Hilbert Spaces

Continuous-variable quantum computing and quantum field theory use infinite-dimensional Hilbert spaces. These require more mathematical care but the basic ideas remain similar.


See also: Quantum State, Bra-Ket Notation, Qubit

Quantum Gate

A basic operation on qubits, the quantum equivalent of classical logic gates.


A quantum gate is a basic operation that transforms quantum states. Just as classical computers use AND, OR, and NOT gates, quantum computers use quantum gates to perform computations.

Key Properties

Unitary

Every quantum gate is represented by a unitary matrix :

This ensures:

  • Reversibility (every gate has an inverse: )
  • Preservation of probability (states stay normalized)

Reversible

Unlike classical gates (AND, OR destroy information), quantum gates are always reversible. Given the output, you can recover the input.

Common Single-Qubit Gates

GateMatrixEffect
Pauli XBit flip
Pauli YBit + phase flip
Pauli ZPhase flip
Hadamard (H)Creates superposition
Phase (S)π/2 phase
T Gateπ/4 phase

Common Multi-Qubit Gates

GateQubitsEffect
CNOT2Controlled NOT (entangling)
CZ2Controlled Z
SWAP2Exchanges two qubits
Toffoli3Controlled-controlled NOT

Gate Application

Applying gate to state :

For density matrices:

Rotation Gates

Single-qubit gates can be parameterized as rotations:

Any single-qubit gate can be decomposed into rotations:

Gate Sets

A universal gate set can approximate any quantum operation:

  • {H, T, CNOT}: standard universal set
  • {H, Toffoli}: also universal

Physical Implementation

Gates are implemented differently on different hardware:

  • Superconducting qubits: Microwave pulses
  • Trapped ions: Laser pulses
  • Photonic: Beam splitters, phase shifters

Gate times and error rates are key performance metrics. Fidelity measures how close a real gate is to the ideal operation.


See also: Quantum Circuit, Pauli Gates, Hadamard Gate, CNOT Gate, Universal Gate Set

Pauli Gates

The three fundamental single-qubit gates (X, Y, Z) that form the building blocks of quantum operations.


The Pauli gates (also called Pauli matrices or Pauli operators) are three fundamental single-qubit operations named after physicist Wolfgang Pauli. They’re ubiquitous in quantum computing.

The Three Gates

Pauli X (Bit Flip)

  • Swaps
  • Quantum analog of classical NOT
  • 180° rotation around X-axis on Bloch sphere

Pauli Y

  • Combined bit and phase flip
  • 180° rotation around Y-axis

Pauli Z (Phase Flip)

  • Leaves unchanged, flips sign of
  • 180° rotation around Z-axis

Key Properties

Self-Inverse

Each Pauli gate is its own inverse:

Anti-Commutation

Paulis anti-commute with each other:

Hermitian

All Paulis are Hermitian (), meaning they’re also valid observables (measurement operators).

Eigenvalues

Each Pauli has eigenvalues +1 and -1:

  • X eigenstates:
  • Y eigenstates:
  • Z eigenstates:

Pauli Group

The Pauli group consists of all products of Paulis with phases :

For qubits, Pauli strings are tensor products like .

Why They Matter

Paulis are fundamental because:

  • They form a basis for all 2×2 matrices
  • Quantum error correction describes errors as Pauli operations
  • Pauli decomposition expresses Hamiltonians in terms of Paulis
  • Measurements are often in Pauli bases (X, Y, or Z)

See also: Quantum Gate, Bloch Sphere, Hadamard Gate

Hadamard Gate

The gateway to superposition, transforms basis states into equal superpositions.


The Hadamard gate (H gate) is perhaps the most important single-qubit gate. It creates superposition from definite states and is the starting point for most quantum algorithms.

Definition

Action on Basis States

The Hadamard creates an equal superposition with 50/50 measurement probabilities.

Key Properties

Self-Inverse

Applying Hadamard twice returns to the original state.

Basis Change

Hadamard transforms between two important bases:

  • Computational basis: (Z eigenstates)
  • Hadamard basis: (X eigenstates)

Relation to Paulis

Also: and

Bloch Sphere

Hadamard is a 180° rotation around the axis halfway between X and Z.

Hadamard on Multiple Qubits

Applying H to all qubits creates a uniform superposition over all states:

This is the starting point for many quantum algorithms (Grover’s, Shor’s, etc.).

Walsh-Hadamard Transform

The -qubit Hadamard operation:

where is the bitwise inner product. This is the quantum Walsh-Hadamard transform.

In Quantum Circuits

The Hadamard is typically drawn as a box with “H”:

     ┌───┐
|0⟩──┤ H ├──|+⟩
     └───┘

Why It’s Important

Almost every quantum algorithm starts with Hadamards:

  1. Initialize qubits in
  2. Apply Hadamard to create superposition
  3. Perform computation
  4. Extract answer

Without Hadamard, there’s no superposition. Without superposition, there’s no quantum advantage.


See also: Superposition, Quantum Gate, Pauli Gates, Quantum Algorithm

CNOT Gate

The standard two-qubit entangling gate. Flips the target qubit if and only if the control qubit is |1>.


The CNOT (Controlled-NOT) gate is the most important two-qubit gate in quantum computing. It’s essential for creating entanglement and is part of every universal gate set.

Definition

The CNOT operates on two qubits: a control and a target.

Action

If control is : target unchanged If control is : target flipped (X gate applied)

InputOutput

Shorthand: where is XOR.

Circuit Symbol

Control: ──●──
           │
Target:  ──⊕──

The dot (●) marks the control; the circle-plus (⊕) marks the target.

Creating Entanglement

CNOT is the standard way to create entangled states:

|0⟩ ──H────●────  →  |Φ+⟩ = (|00⟩ + |11⟩)/√2
           │
|0⟩ ───────⊕────
  1. Start:
  2. After H:
  3. After CNOT:

This is a Bell state, maximally entangled!

Properties

Self-Inverse

Relation to Other Gates

Can be written as controlled-X:

Basis Changes

With Hadamards, control and target can be swapped:

Physical Implementation

CNOT is a native gate on some platforms:

  • Superconducting: Cross-resonance or iSWAP-based
  • Trapped ions: Mølmer-Sørensen or XX gates
  • Photonic: Requires non-linearities or measurement

CNOT fidelity is a key benchmark for quantum hardware.

Universal Computation

CNOT + single-qubit gates = universal quantum computing. Any quantum operation can be decomposed into CNOTs and single-qubit rotations.


See also: Entanglement, Quantum Gate, Bell State, Universal Gate Set, Toffoli Gate

Toffoli Gate

A three-qubit gate that flips the target only when both control qubits are |1>. Also known as the quantum AND gate.


The Toffoli gate (also called CCNOT or Controlled-Controlled-NOT) is a three-qubit gate that’s universal for classical reversible computation and important for quantum algorithms.

Definition

Two control qubits, one target qubit:

The target flips only when both controls are .

InputOutput

Circuit Symbol

Control 1: ──●──
             │
Control 2: ──●──
             │
Target:    ──⊕──

Classical Reversible Computing

The Toffoli gate is universal for classical reversible computation:

  • AND: Set target to , result is
  • NOT: Set both controls to
  • FANOUT: Can copy classical bits

Any classical circuit can be made reversible using Toffoli gates (with ancilla bits).

Quantum Universality

Toffoli + Hadamard is universal for quantum computing. However, Toffoli alone (without superposition-creating gates) cannot perform universal quantum computation.

Decomposition

A Toffoli can be decomposed into simpler gates:

──●────●────────●────●────●──
  │    │        │    │    │
──●────┼────●───┼────●────┼──
  │    │    │   │    │    │
──┼──T─X─T†─X─T─X─T†─X────┼──

This uses ~6 CNOT gates and several T gates, making it expensive on near-term hardware.

Applications

  • Quantum arithmetic: Addition, multiplication circuits
  • Grover’s oracle: Marking solutions in search
  • Reversible classical subroutines: Embedding classical functions in quantum algorithms
  • Quantum error correction: Syndrome extraction

Generalization

  • Multi-controlled NOT (MCX): control qubits, 1 target
  • Decomposition cost grows with number of controls

See also: CNOT Gate, Quantum Gate, Universal Gate Set, T Gate

Phase Gate

Gates that add a phase to the |1⟩ state while leaving |0⟩ unchanged.


Phase gates are a family of single-qubit gates that modify the relative phase between and without changing measurement probabilities in the computational basis.

General Form

Action: ,

Common Phase Gates

S Gate (Phase Gate, √Z)

  • Quarter turn around Z-axis on Bloch sphere
  • Part of Clifford group

S† (S-dagger)

Inverse of S gate.

T Gate (π/8 Gate, √S)

  • Eighth turn around Z-axis
  • NOT in Clifford group (makes it powerful)
  • See T Gate for more

Z Gate

Actually a Pauli gate, but also a phase gate with .

Controlled Phase Gates

CZ (Controlled-Z)

Applies Z to target when control is . Symmetric: control and target are interchangeable!

CP (Controlled-Phase)

Adds phase only to state.

On the Bloch Sphere

Phase gates rotate around the Z-axis:

  • rotates by angle around Z
  • Only affects superposition states (states on the equator)
  • Pure or states appear unchanged

Why Phase Matters

You might wonder: if phases don’t affect measurement probabilities, why care?

Phases matter because of interference. When paths recombine (through gates like Hadamard), phases determine whether amplitudes add or cancel:

The phase flip changed the final measurement outcome!


See also: T Gate, Pauli Gates, Quantum Gate, Bloch Sphere

T Gate

The “magic” gate that enables universal quantum computation when combined with Clifford gates.


The T gate (also called the π/8 gate) is a single-qubit phase gate needed for universal quantum computation.

Definition

Action: ,

The name “π/8 gate” comes from writing where the global phase is π/8.

Why T is Special

Non-Clifford

The Clifford gates (H, S, CNOT, and combinations) can be efficiently simulated classically. Adding the T gate makes the gate set universal and computationally powerful.

Magic States

T gates can be implemented using “magic states” and Clifford operations:

This is important for fault-tolerant quantum computing.

T Gate Count

In fault-tolerant quantum computing, T gates are typically the most expensive operation (requiring complex state distillation). Algorithm efficiency is often measured in T-count: the number of T gates required.

OperationApproximate T-count
Toffoli~7
Controlled rotation~10-50
Quantum arithmeticVaries widely

Properties

T† (T-dagger) is the inverse:

Bloch Sphere

T is a π/4 (45°) rotation around the Z-axis, an eighth of a full rotation.

In Practice

T gates appear throughout quantum algorithms:


See also: Phase Gate, Universal Gate Set, Fault-Tolerant Quantum Computing, Toffoli Gate

SWAP Gate

Exchanges the states of two qubits.


The SWAP gate does exactly what its name suggests: it swaps the quantum states of two qubits.

Definition

Action:

InputOutput

Circuit Symbol

──✕──
  │
──✕──

Or sometimes with crossing lines.

Decomposition

SWAP can be built from three CNOTs:

──●────⊕────●──
  │    │    │
──⊕────●────⊕──

This is the standard decomposition used when SWAP isn’t a native gate.

Variants

√SWAP (Square Root of SWAP)

An entangling gate sometimes native to certain hardware.

iSWAP

Swaps states and adds a phase. Native gate on some superconducting processors (Google Sycamore).

CSWAP (Fredkin Gate)

Controlled-SWAP: swaps two qubits only when control is .

Why It Matters

Connectivity

Many quantum computers have limited qubit connectivity (not all pairs can interact directly). SWAP gates route quantum information:

Before: q0 ─ q1 ─ q2 ─ q3  (linear connectivity)

To interact q0 with q3:
1. SWAP q0, q1
2. SWAP q1, q2
3. Now original q0 state is next to q3

Circuit Compilation

Mapping logical circuits to physical hardware often requires inserting many SWAP gates, increasing circuit depth and errors.

SWAP Test

A circuit for estimating state overlap:

|0⟩ ──H──●──H──M
         │
|ψ⟩ ─────✕─────
         │
|φ⟩ ─────✕─────

Probability of measuring 0 is .


See also: CNOT Gate, Quantum Gate, Circuit Depth

Universal Gate Set

A set of quantum gates that can approximate any quantum operation to arbitrary precision.


A universal gate set is a collection of quantum gates from which any possible quantum computation can be constructed. This is analogous to how AND, OR, and NOT can build any classical Boolean circuit.

The Key Theorem

Solovay-Kitaev Theorem: Any single-qubit gate can be approximated to precision using gates from a universal set (where ).

This means we don’t need infinitely many gates. A small finite set suffices.

Common Universal Gate Sets

The most commonly cited universal set:

  • Hadamard (H): Creates superposition
  • T gate: Provides the “magic” (non-Clifford) element
  • CNOT: Entangles qubits

Any quantum algorithm can be compiled into these three gates.

Alternative universal set:

Continuous Gate Sets

For error-free simulation, continuous rotations suffice:

  • for any
  • Any two-qubit entangling gate + arbitrary single-qubit rotations

Clifford Gates (NOT Universal)

The Clifford group is generated by:

Clifford circuits can be simulated efficiently on classical computers (Gottesman-Knill theorem). They become universal only when supplemented with a non-Clifford gate like T.

Why Universality Matters

  1. Hardware-agnostic algorithms: Write algorithms once, compile to any gate set
  2. Error correction: Fault-tolerant schemes implement universal sets
  3. Equivalence: All universal quantum computers are computationally equivalent

Gate Synthesis

Converting arbitrary operations to gates from a universal set:

TargetCompilation Approach
Single-qubit unitarySolovay-Kitaev algorithm
Multi-qubit unitaryDecomposition into CNOT + single-qubit
Controlled operationsStandard constructions

Native Gate Sets

Different hardware has different native gates:

PlatformTypical Native Gates
Superconducting (IBM)√X, CNOT, R_z
Superconducting (Google)√iSWAP, Phased XZ
Trapped IonXX, arbitrary single-qubit
PhotonicBeam splitters, phase shifters

Compilers translate circuits to native gate sets.


See also: Quantum Gate, T Gate, CNOT Gate, Fault Tolerance

Quantum Circuit

A sequence of quantum gates applied to qubits, representing a quantum computation.


A quantum circuit is the standard model for describing quantum computations. It shows qubits as horizontal lines (wires) and gates as boxes or symbols applied to those wires.

Structure

     ┌───┐     ┌───┐
q0: ─┤ H ├──●──┤ X ├─ M
     └───┘  │  └───┘
            │
q1: ────────⊕──────── M

Components:

  • Wires: Horizontal lines representing qubits (time flows left to right)
  • Gates: Boxes/symbols representing quantum operations
  • Measurements: Usually at the end, marked with M or meter symbol

Reading a Circuit

  1. Start with initial states (usually for each qubit)
  2. Apply gates from left to right
  3. Gates on different wires at the same horizontal position happen simultaneously
  4. Measure at the end to get classical output

Circuit Metrics

Width

Number of qubits used.

Depth

See Circuit Depth for more details on time steps (layers of parallel gates).

Gate Count

Total number of gates, often broken down by type (single-qubit, two-qubit, T-gates).

Example: Bell State Preparation

     ┌───┐
q0: ─┤ H ├──●──
     └───┘  │
            │
q1: ────────⊕──
  1. Start:
  2. H on q0:
  3. CNOT:

Circuit Identities

Gates can often be simplified:

  • (Hadamard is self-inverse)
  • , ,
  • Adjacent CNOTs cancel
  • ,

Optimizers use these to reduce circuit complexity.

Subcircuits and Oracles

Complex operations are often drawn as single boxes:

     ┌─────────┐
q: ──┤         ├──
     │    U    │
q: ──┤         ├──
     │         │
q: ──┤         ├──
     └─────────┘

This abstracts away internal details.

Barriers

Vertical lines that prevent optimization across them:

q0: ──H──|──X──
         |
q1: ──X──|──H──

Useful for separating distinct algorithm phases.

Classical Control

Modern circuits support mid-circuit measurement and classical feedback:

q0: ──H──M─────
         ║
         ╠══╗
q1: ─────║──X── (X if measurement = 1)

Double lines represent classical bits; gates conditioned on classical values.


See also: Quantum Gate, Circuit Depth, Quantum Algorithm, SWAP Gate

Circuit Depth

The number of sequential time steps in a quantum circuit. A key metric for NISQ-era computation.


Circuit depth measures how many layers of gates must be applied sequentially. It’s one of the most important metrics for determining whether a circuit can run on real hardware.

Definition

Depth is the longest path through the circuit, counting layers of gates that cannot be parallelized:

Layer:   1    2    3    4
         │    │    │    │
q0: ──H──┼────●────┼────X──
         │    │    │    │
q1: ──H──●────┼────X────┼──
         │    │    │    │
q2: ─────⊕────⊕────H────M──

This circuit has depth 4.

Why Depth Matters

Decoherence

Qubits lose their quantum properties over time (T1, T2 times). Deeper circuits mean more time for errors to accumulate.

Rule of thumb: Circuit depth should be much less than / gate time.

Error Accumulation

Each gate has some error probability. Errors compound:

  • 100 gates at 99.9% fidelity each: ~90% overall fidelity
  • 1000 gates at 99.9% fidelity each: ~37% overall fidelity

NISQ Limitations

NISQ devices can typically run circuits with depth ~100-1000 before noise overwhelms the signal. Fault-tolerant systems will enable much deeper circuits.

Depth vs. Width Trade-offs

Sometimes you can trade depth for width (more qubits):

ApproachDepthWidth
SequentialHighLow
ParallelLowHigh

Example: Computing

  • Sequential: Depth 4, Width 1
  • Parallel tree: Depth 2, Width 4

Reducing Depth

Techniques for shallower circuits:

  1. Parallelization: Run independent gates simultaneously
  2. Gate cancellation: Remove redundant gate pairs
  3. Approximate compilation: Trade accuracy for depth
  4. Algorithmic redesign: Use algorithms with inherently lower depth

Two-Qubit Gate Depth

Often, two-qubit gate depth is more relevant than total depth, since two-qubit gates are typically slower and noisier:

1Q gates: Fast, high fidelity (~99.9%)
2Q gates: Slower, lower fidelity (~99-99.9%)

Reporting Depth

When comparing algorithms or hardware, always clarify:

  • Total depth vs. two-qubit depth
  • Native gate set used
  • Whether optimization was applied

See also: Quantum Circuit, NISQ, Decoherence, T2 Time

Quantum Parallelism

The ability of quantum computers to process multiple inputs simultaneously through superposition.


Quantum parallelism refers to a quantum computer’s ability to evaluate a function on many inputs at once by exploiting superposition.

The Basic Idea

Classically, to evaluate on inputs, you need evaluations.

Quantumly, you can create a superposition of all inputs and evaluate once:

Apply to superposition:

One quantum operation, function evaluations encoded in the state!

Example: 3 Qubits

With 3 input qubits in superposition:

All 8 inputs ( through ) exist simultaneously.

The Catch

Here’s the critical limitation: you can’t read all the answers.

Measurement gives you ONE random result. The superposition collapses.

Before measurement: |f(0)⟩ + |f(1)⟩ + |f(2)⟩ + ... (all answers)
After measurement:  |f(k)⟩ (one random answer)

How Quantum Algorithms Use It

Quantum algorithms don’t just compute all answers. They use interference to extract useful information:

Deutsch-Josza

Determine if function is constant or balanced in ONE query (classically needs ~N/2).

Find the marked item in queries instead of .

Shor’s Factoring

Use parallelism + QFT to find periodicity, enabling factoring.

The Pattern

  1. Create superposition over all inputs
  2. Evaluate function (quantum parallelism)
  3. Apply interference (constructive for answers, destructive for non-answers)
  4. Measure to extract the useful result

Common Misconception

Wrong: “Quantum computers try all solutions and pick the right one”

Right: Quantum computers use interference to make correct answers more probable. Designing this interference is the hard part, which is why we have only a handful of useful quantum algorithms.

Exponential State Space

With qubits:

  • basis states can be in superposition
  • But only qubits of information can be extracted (Holevo bound)

The challenge is designing algorithms that concentrate useful information into measurable outcomes.


See also: Superposition, Quantum Algorithm, Grover’s Algorithm

Quantum Algorithm

A step-by-step procedure for solving a problem using quantum computation, often providing speedup over classical algorithms.


A quantum algorithm is a procedure designed to run on a quantum computer. The best quantum algorithms exploit superposition, entanglement, and interference to solve problems faster than any known classical algorithm.

Anatomy of a Quantum Algorithm

Most quantum algorithms follow this pattern:

1. Initialize: Prepare qubits in |0⟩
2. Superpose: Create superposition (usually with Hadamards)
3. Compute: Apply problem-specific transformations
4. Interfere: Make correct answers constructive, wrong answers destructive
5. Measure: Extract the answer

The art is in step 4: designing interference patterns that amplify correct solutions.

Major Quantum Algorithms

Exponential Speedups

AlgorithmProblemSpeedup
Shor’sInteger factoringExponential
HHLLinear systemsExponential*
Quantum simulationSimulating quantum systemsExponential

*With caveats about input/output

Polynomial Speedups

AlgorithmProblemSpeedup
Grover’sUnstructured searchQuadratic
Quantum walksGraph problemsVaries

Near-Term Algorithms

AlgorithmApplication
VQEChemistry, materials
QAOAOptimization
QMLMachine learning

What Makes Algorithms Quantum?

A quantum algorithm must use genuinely quantum resources:

  • Superposition: Process multiple states simultaneously
  • Entanglement: Create correlations impossible classically
  • Interference: Combine amplitudes to concentrate probability

Algorithms that don’t use these don’t provide quantum advantage.

Complexity Classes

ClassDescriptionExample Problems
BQPEfficiently solvable by quantum computersFactoring, simulation
QMAQuantum analog of NPGround state energy

The Landscape

                    All Problems
                         │
          ┌──────────────┼──────────────┐
          │              │              │
    Classically     Quantum         Intractable
    Efficient      Advantage         for Both
    (P, BPP)        (BQP)              (?)
          │              │
    Sorting,       Factoring,
    Search         Simulation

Why So Few Algorithms?

Designing quantum algorithms is hard. We can’t just “quantize” classical algorithms. Each requires:

  • Finding structure in the problem
  • Designing interference to exploit that structure
  • Proving the speedup exists

New quantum algorithms are rare discoveries, celebrated by the community.


See also: Shor’s Algorithm, Grover’s Algorithm, Quantum Speedup, Quantum Parallelism

Shor’s Algorithm

The quantum algorithm that factors integers exponentially faster than any known classical algorithm, threatening RSA encryption.


Shor’s algorithm, discovered by Peter Shor in 1994, efficiently factors large integers. This is devastating for RSA and similar cryptosystems that rely on factoring being hard.

The Impact

Classical factoring of an -bit number: (best known) Quantum factoring with Shor’s: or better

For a 2048-bit RSA key:

  • Classical: Millions of years
  • Quantum: Hours to days (with a large fault-tolerant quantum computer)

How It Works

Shor’s algorithm has two main parts:

1. Classical Reduction

Factoring is reduced to period finding:

  • Pick random (the number to factor)
  • Find the period of
  • Use to find factors via

2. Quantum Period Finding

This is the quantum part:

  1. Create superposition over all :
  2. Compute quantumly:
  3. Apply Quantum Fourier Transform to first register
  4. Measure to get information about the period

The QFT causes interference that reveals the period with high probability.

Circuit Overview

|0⟩^n ──H^⊗n──┬─── QFT ── Measure ──→ period info
              │
|0⟩^m ────────⊕── (modular exponentiation)

Resource Requirements

To factor an -bit number:

  • Qubits: (roughly qubits)
  • Gates: (dominated by modular exponentiation)
  • T-gates: Many millions for cryptographically relevant sizes

Current Status

MilestoneStatus
Factor 15Done (2001, with tricks)
Factor 21Done (2012)
Factor 2048-bitRequires ~4000 logical qubits, millions of physical qubits

We’re far from breaking real-world RSA. But it’s a matter of engineering, not fundamental obstacles.

Implications

  1. Cryptographic transition: Moving to post-quantum cryptography
  2. Security timeline: Data encrypted today could be decrypted later (“harvest now, decrypt later”)
  3. Motivation for quantum computing: Major driver of quantum research and funding

Variants

  • Simplified Shor’s: For specific numbers with known structure
  • Quantum resource estimation: Ongoing research to reduce requirements
  • Hybrid approaches: Some classical preprocessing

Historical Note

Shor’s algorithm was the “killer app” that launched serious interest in quantum computing. It showed quantum computers could solve a problem of real-world importance exponentially faster.


See also: Quantum Fourier Transform, Quantum Phase Estimation, Post-Quantum Cryptography, Quantum Advantage

Grover’s Algorithm

A quantum search algorithm providing quadratic speedup for finding items in unsorted databases.


Grover’s algorithm (1996) searches an unsorted database of items in queries, compared to classically. It’s one of the foundational quantum algorithms.

The Problem

Given a function that returns 1 for exactly one “marked” item and 0 otherwise, find the marked item.

  • Classical: Check items one by one → queries on average
  • Quantum (Grover): queries

The Algorithm

Grover’s algorithm repeatedly applies two operations:

1. Oracle

Marks the solution by flipping its sign:

2. Diffusion

Reflects amplitudes about their average (amplitude amplification): where is the uniform superposition.

The Circuit

|0⟩^n ── H^⊗n ──┬── O ── D ──┬── ... ── Measure
                │            │
            (repeat √N times)

Geometric Intuition

Think of the state as a vector in a 2D plane:

  • One axis: the marked state
  • Other axis: superposition of unmarked states

Each Grover iteration rotates the state vector toward by angle .

After iterations, the state points at (or very close to) .

Example: N = 4

  • 4 items, need to find 1 marked item
  • Classical: 2.25 queries on average
  • Grover: ~1 iteration (plus setup)

Starting state:

If is marked:

  1. Oracle:
  2. Diffusion: (exactly the answer!)

Key Properties

Optimal

Grover’s algorithm is provably optimal. No quantum algorithm can do better than for unstructured search.

Works with Multiple Solutions

If items are marked, the algorithm finds one in queries.

Requires Knowing When to Stop

Over-iterating causes the amplitude to “rotate past” the solution. You need to know approximately how many iterations to run.

Applications

  • Database search: Searching unsorted data
  • Cryptography: Speed up brute-force attacks (effectively halving key lengths)
  • Satisfiability: Search for satisfying assignments
  • Amplitude amplification: Generalization used in many algorithms

Practical Considerations

Quadratic speedup is significant but not transformative:

  • queries (meaningful)
  • But requires a quantum oracle for , and building this can be expensive

See also: Quantum Algorithm, Quantum Speedup

Quantum Fourier Transform

The quantum version of the discrete Fourier transform, a key subroutine in many quantum algorithms.


The Quantum Fourier Transform (QFT) is a linear transformation on quantum states that’s central to algorithms like Shor’s and quantum phase estimation.

Definition

The QFT maps computational basis states as:

where for qubits.

Matrix Form

For 2 qubits ():

Why It’s Important

Classical FFT: O(N log N)

The Fast Fourier Transform revolutionized signal processing.

Quantum QFT: O(n²) = O(log² N)

Exponentially faster! This speedup is key to Shor’s algorithm.

The Circuit

The QFT has a remarkably simple circuit using only Hadamards and controlled rotations:

|x₀⟩ ──H──R₂──R₃──...──Rₙ──────────────────
          │   │       │
|x₁⟩ ─────●───┼───...─┼────H──R₂──...──Rₙ₋₁──
              │       │        │       │
|x₂⟩ ─────────●───...─┼────────●───...─┼──────
                      │                │
...                   ...              ...
                      │                │
|xₙ⟩ ─────────────────●────────────────●──H──

Plus SWAP gates at the end to reverse bit order.

Gates used:

  • Hadamard:
  • Controlled rotation:

Inverse QFT

The inverse is simply the conjugate transpose:

Same circuit but with negative rotation angles, run in reverse.

Applications

AlgorithmHow QFT is Used
Shor’s AlgorithmExtract period from superposition
Phase EstimationConvert phase to binary representation
Quantum countingCount solutions via phase estimation
HHL AlgorithmPart of eigenvalue processing

Important Caveat

The QFT is fast, but there’s a catch:

  • Input: Requires preparing the input state (often expensive)
  • Output: Result is in amplitudes (can’t read them all directly)

The QFT is useful when it’s part of a larger algorithm that handles input/output appropriately.

Approximate QFT

For practical purposes, very small rotations ( for large ) can be omitted:

This reduces circuit depth with minimal accuracy loss.


See also: Shor’s Algorithm, Quantum Phase Estimation, Quantum Algorithm

Quantum Phase Estimation

An algorithm to estimate the eigenvalue (phase) of a unitary operator. A key subroutine in many quantum algorithms.


Quantum Phase Estimation (QPE) determines the phase when a unitary acts on its eigenstate: .

The Problem

Given:

  • A unitary operator
  • An eigenstate (or superposition of eigenstates)

Find: The phase such that

The Circuit

|0⟩ ──H────────●────────────────────QFT†── Measure (θ₀)
               │
|0⟩ ──H────────┼────●──────────────QFT†── Measure (θ₁)
               │    │
|0⟩ ──H────────┼────┼────●────────QFT†── Measure (θ₂)
               │    │    │
|u⟩ ──────────U¹───U²───U⁴────────────── (unchanged)

Key components:

  1. Counting register: qubits initialized to , determines precision
  2. Target register: Holds the eigenstate
  3. Controlled-U operations: Apply controlled by qubit
  4. Inverse QFT: Extracts the phase as a binary number

How It Works

  1. Hadamards create superposition in counting register
  2. Controlled- operations encode phase information
  3. The counting register ends up in state encoding
  4. Inverse QFT converts phase to binary representation
  5. Measurement reads out (approximately)

Precision

With counting qubits:

  • Precision: (can distinguish values differing by )
  • Success probability: High for that’s exactly representable
  • For general : Concentration around true value

Applications

Shor’s Algorithm

QPE finds the period of modular exponentiation.

Estimate eigenvalues of molecular Hamiltonians → ground state energies.

HHL Algorithm

Estimate eigenvalues for matrix inversion.

Quantum Counting

Count Grover solutions by estimating phase related to solution count.

Variants

Iterative Phase Estimation

Uses single counting qubit, repeated measurements. More noise-resilient, useful for NISQ.

Robust Phase Estimation

Handles noise and imperfect eigenstates better.

Quantum Eigenvalue Estimation

Generalizations for non-eigenstate inputs (get superposition of phases).

Resource Requirements

For -bit precision:

  • Counting qubits:
  • Controlled- calls: (can be expensive!)
  • QFT on qubits

The cost of implementing controlled- is often the bottleneck.


See also: Quantum Fourier Transform, Shor’s Algorithm, VQE

VQE

Variational Quantum Eigensolver: a hybrid quantum-classical algorithm for finding ground state energies, especially useful in quantum chemistry.


VQE (Variational Quantum Eigensolver) is the flagship algorithm for near-term quantum computers. It’s a hybrid approach that uses a quantum computer to evaluate energies and a classical computer to optimize parameters.

The Goal

Find the ground state energy of a Hamiltonian :

This is important for quantum chemistry (molecular ground states) and materials science.

How It Works

The Variational Principle

For any trial state :

The energy of any guess is always ≥ true ground state energy. So minimize!

The Algorithm

┌─────────────────────────────────────────────────────┐
│                  Classical Computer                  │
│  ┌─────────────┐                    ┌────────────┐  │
│  │  Optimizer  │◄──── Energy ◄─────│   Measure  │  │
│  │   (θ→θ')    │                    │ expectation│  │
│  └──────┬──────┘                    └─────▲──────┘  │
│         │ New θ                           │         │
│         ▼                                 │         │
│  ┌──────────────────────────────────────────────┐  │
│  │              Quantum Computer                 │  │
│  │                                               │  │
│  │  |0⟩ ──[Ansatz(θ)]──── Measure               │  │
│  │                                               │  │
│  └──────────────────────────────────────────────┘  │
└─────────────────────────────────────────────────────┘
  1. Prepare: Create parameterized trial state on quantum computer
  2. Measure: Estimate via measurements
  3. Optimize: Classical optimizer updates to minimize energy
  4. Repeat: Until convergence

The Ansatz

The ansatz is the parameterized circuit structure:

|0⟩ ──Ry(θ₁)──●──Ry(θ₃)──...
              │
|0⟩ ──Ry(θ₂)──⊕──Ry(θ₄)──...

Common ansatzes:

  • UCCSD: Unitary coupled cluster (chemistry-inspired)
  • Hardware-efficient: Native gates, easy to run
  • Problem-specific: Tailored to symmetries

Measuring the Hamiltonian

Hamiltonians are decomposed into Pauli strings:

where are Pauli operators (e.g., ).

Each term measured separately, results combined classically.

Challenges

ChallengeIssue
Barren plateausGradients vanish in deep circuits
NoiseNISQ devices have errors
Measurement overheadMany shots needed for precision
Classical optimizationCan get stuck in local minima

Applications

  • Quantum chemistry: Molecular energies, reaction pathways
  • Materials science: Band structures, superconductivity
  • Optimization: Via encoding problems as Hamiltonians

Relation to Other Algorithms

  • QPE: More accurate but needs fault tolerance
  • QAOA: Similar variational structure, for optimization
  • VQA: VQE is a specific type of variational quantum algorithm

See also: Variational Quantum Algorithm, QAOA, Hamiltonian, NISQ

QAOA

Quantum Approximate Optimization Algorithm: a hybrid algorithm for combinatorial optimization problems.


QAOA (Quantum Approximate Optimization Algorithm) is a variational algorithm designed to find approximate solutions to combinatorial optimization problems. Introduced by Farhi et al. in 2014.

The Setup

Given an optimization problem encoded as a cost function over bit strings , find:

Examples: MaxCut, traveling salesman, scheduling, portfolio optimization.

The Algorithm

QAOA uses a parameterized quantum circuit alternating between two operations:

1. Problem Hamiltonian

Encodes the cost function:

2. Mixer Hamiltonian

Creates transitions between states:

Usually (sum of Pauli X on all qubits).

The Circuit (depth )

|+⟩^n ── U_C(γ₁) ── U_B(β₁) ── U_C(γ₂) ── U_B(β₂) ── ... ── Measure

Parameters: and

The Variational Loop

1. Choose p (circuit depth)
2. Initialize parameters (γ, β)
3. Repeat:
   a. Run QAOA circuit on quantum computer
   b. Measure in computational basis
   c. Compute expected cost ⟨C⟩
   d. Classical optimizer updates (γ, β)
4. Return best solution found

Example: MaxCut

Problem: Partition graph vertices to maximize edges cut.

Encoding:

Each edge contributes 1 if endpoints have different values (cut), 0 otherwise.

Performance

Theoretical

  • : Converges to optimal solution
  • Small : Provides approximation

Practical (NISQ)

  • Low depth () to manage noise
  • Approximation quality varies by problem
  • Ongoing research on when QAOA beats classical

Variants

VariantDescription
Warm-start QAOAInitialize from classical solution
ADAPT-QAOAAdaptive ansatz construction
Recursive QAOAApply recursively to subproblems
QAOA+Extended mixer Hamiltonians

Comparison with VQE

AspectQAOAVQE
Primary useOptimizationGround state
AnsatzProblem-structuredFlexible
Parameters2pVaries widely
LayersAlternating U_C, U_BGeneral gates

Challenges

  • Parameter optimization: Non-convex landscape
  • Barren plateaus: Can occur at high depth
  • Classical competition: Best classical algorithms are strong
  • Noise sensitivity: Errors accumulate with depth

See also: VQE, Variational Quantum Algorithm, NISQ, Quantum Speedup

Quantum Simulation

Using quantum computers to simulate quantum systems. Potentially the most impactful near-term application.


Quantum simulation uses controllable quantum systems to simulate other quantum systems. This is widely considered the most promising application of quantum computing, with potential breakthroughs in chemistry, materials science, and physics.

Feynman’s Vision

Richard Feynman (1982) observed that simulating quantum systems on classical computers is exponentially hard:

“Nature isn’t classical, dammit, and if you want to make a simulation of nature, you’d better make it quantum mechanical.”

A quantum computer naturally represents quantum states, potentially offering exponential speedup for simulation.

Types of Quantum Simulation

Analog Simulation

Map the target system directly onto quantum hardware:

  • Target Hamiltonian ↔ Hardware Hamiltonian
  • Let system evolve naturally
  • Examples: Cold atoms simulating condensed matter

Digital Simulation

Use quantum gates to simulate time evolution:

  • Decompose evolution into gate sequences
  • Trotter-Suzuki decomposition
  • More flexible but more overhead

Hybrid Approaches

Combine analog and digital methods for best of both worlds.

Simulating Hamiltonians

Given Hamiltonian , simulate evolution :

Trotter Formula

Decompose into easy-to-simulate terms, apply in sequence.

Product Formulas

Higher-order decompositions for better accuracy:

  • First-order: Error
  • Second-order: Error
  • Higher orders available

Modern Methods

  • Quantum signal processing
  • Qubitization
  • Linear combination of unitaries (LCU)

Applications

Quantum Chemistry

  • Molecular ground state energies
  • Reaction dynamics
  • Drug discovery
  • Catalyst design

Materials Science

  • High-temperature superconductivity
  • Topological materials
  • Battery chemistry

Fundamental Physics

  • Lattice gauge theories (QCD)
  • Quantum field theory
  • Black hole physics

Biology

  • Protein folding (quantum aspects)
  • Photosynthesis
  • Enzyme catalysis

Resource Estimates

ApplicationLogical QubitsT-gates
Small molecules (H₂, LiH)10-10010³-10⁵
Drug-like molecules100-100010⁶-10⁹
Catalyst design1000+10⁹+

Current State

  • NISQ era: Small molecules, proof-of-concept
  • Near-term goal: Beyond classical simulation capabilities
  • Long-term: Industrial-scale chemistry/materials

Why It Matters

Classical simulation costs scale exponentially with system size. Quantum simulation scales polynomially. This could enable:

  • Designing new drugs computationally
  • Room-temperature superconductors
  • Better batteries and solar cells
  • Understanding fundamental physics

See also: VQE, Hamiltonian, Quantum Advantage, NISQ

Quantum Channel

A mathematical description of how quantum states transform, including noise and decoherence effects.


A quantum channel (also called a quantum operation or completely positive trace-preserving map) describes how quantum states evolve, especially when interacting with an environment.

Definition

A quantum channel maps density matrices to density matrices:

It must be:

  1. Linear:
  2. Completely positive: Maps positive operators to positive operators (even when extended)
  3. Trace-preserving:

Kraus Representation

Every quantum channel can be written as:

where are Kraus operators satisfying .

Common Quantum Channels

Unitary Channel

Ideal, noise-free evolution:

Single Kraus operator: .

Depolarizing Channel

Random Pauli errors with probability :

Turns state toward maximally mixed state.

Amplitude Damping

Models energy loss (e.g., photon emission):

Related to T1 decay.

Phase Damping (Dephasing)

Loses phase information without energy loss:

Related to T2 decay.

Bit Flip Channel

Random X error:

Phase Flip Channel

Random Z error:

Channel Composition

Channels compose naturally:

Multiple noise sources combine into a single effective channel.

Channel Capacity

The quantum channel capacity quantifies how much quantum information can be reliably transmitted. Different capacities exist for:

  • Classical information over quantum channel
  • Quantum information (with/without entanglement assistance)

Why It Matters

Quantum channels are essential for:

  • Modeling realistic noise in quantum computers
  • Designing error correction codes
  • Quantum communication protocols
  • Understanding decoherence

See also: Density Matrix, Decoherence, Quantum Error Correction

Fidelity

A measure of how close two quantum states are, similar to a distance metric.


Fidelity quantifies how similar two quantum states are. It’s one of the most important metrics in quantum information, used to assess gate quality, state preparation, and algorithm success.

Definition

For Pure States

This equals 1 if the states are identical (up to global phase), 0 if orthogonal.

For General States (Density Matrices)

Simplified when one state is pure:

Properties

PropertyDescription
Range
Symmetric
States are identical
States are orthogonal

Fidelity in Practice

Gate Fidelity

How well does an implemented gate match the ideal?

Typical values:

  • Single-qubit gates: 99.5-99.99%
  • Two-qubit gates: 99-99.9%

State Fidelity

How well was a target state prepared?

Process Fidelity

How well does a quantum process match the ideal, averaged over all inputs.

Average Gate Fidelity

Often reported as average over all input states:

where is the dimension (2 for single qubit, 4 for two qubits).

Fidelity vs Error Rate

Infidelity = is approximately the error rate for high-fidelity operations:

FidelityInfidelityInterpretation
99%1%1 in 100 operations fail
99.9%0.1%1 in 1,000 operations fail
99.99%0.01%1 in 10,000 operations fail

Relation to Other Metrics

  • Trace distance:
  • Diamond distance: For processes/channels

Why It Matters

Fidelity is used everywhere in quantum computing:

  • Benchmarking quantum hardware
  • Comparing algorithms
  • Error correction thresholds
  • Quantum communication protocols

See also: Quantum State, Quantum Gate, Quantum Error Correction

Quantum Teleportation

A protocol to transfer quantum states using entanglement and classical communication, without physically sending the quantum system.


Quantum teleportation transmits an unknown quantum state from one location to another using a shared entangled pair and classical communication. No physical quantum system travels; only classical information is sent.

The Setup

Three parties:

  • Alice: Has unknown state to teleport
  • Bob: Will receive the state
  • Shared resource: Alice and Bob share a Bell pair

The Protocol

Initial State

Alice has qubit (the unknown state) and qubit (her half of the Bell pair). Bob has qubit (his half of the Bell pair).

Step 1: Bell Measurement

Alice performs a Bell state measurement on qubits and , getting one of four outcomes: 00, 01, 10, or 11.

Step 2: Classical Communication

Alice sends her 2-bit measurement result to Bob (classical channel).

Step 3: Correction

Based on Alice’s message, Bob applies a correction:

Alice’s ResultBob’s Correction
00 (nothing)
01
10
11

Result

Bob now has exactly. Alice’s original is destroyed.

Circuit Diagram

|ψ⟩ ────●────H────M──────────╓
        │                    ║ (classical)
|Φ+⟩ ───⊕─────────M────────╫─╫──
                           ║ ║
|B⟩ ───────────────────X───╫─Z── |ψ⟩
                       ▲   ║
                       └───╨───

Key Properties

No Faster-Than-Light Communication

Teleportation requires classical communication (limited to light speed). Without knowing Alice’s measurement result, Bob’s qubit looks completely random.

Destroys Original State

The no-cloning theorem is satisfied: is destroyed at Alice’s location when created at Bob’s.

Requires Pre-Shared Entanglement

The Bell pair must be distributed beforehand. Teleportation “spends” the entanglement.

Applications

ApplicationUse
Quantum networksTransfer quantum states between nodes
Quantum computingMove states between processors
Quantum repeatersEnable long-distance quantum communication
Gate teleportationImplement gates using teleportation

Gate Teleportation

A powerful generalization: instead of teleporting , teleport for some gate . This is key to fault-tolerant quantum computing.

Experimental Milestones

  • 1997: First demonstration (photons, ~1 meter)
  • 2012: 143 km (Canary Islands)
  • 2017: 1,400 km (satellite, Micius)
  • Ongoing: Integrated into quantum networks

See also: Entanglement, Bell State, No-Cloning Theorem

No-Cloning Theorem

A fundamental theorem proving it’s impossible to create an exact copy of an arbitrary unknown quantum state.


The no-cloning theorem states that there is no quantum operation that can copy an arbitrary unknown quantum state. This is one of the most important results in quantum information theory.

The Theorem

Statement: There is no unitary operation such that: for all quantum states .

The Proof (Simplified)

Suppose such a cloning machine existed. Consider two states and :

Taking the inner product:

So , which means equals 0 or 1.

This means you can only clone states that are either identical or orthogonal, not arbitrary states. Contradiction.

What You CAN Do

Clone Known States

If you know what state you have, you can prepare copies:

Clone Classical Information

Measure first (destroying quantum information), then copy:

Approximate Cloning

Create imperfect copies with bounded fidelity. The best universal cloner achieves fidelity 5/6 for qubits.

Clone Orthogonal States

A set of mutually orthogonal states can be cloned (they’re distinguishable, hence effectively classical).

Implications

Quantum Cryptography Security

QKD security relies on no-cloning. An eavesdropper can’t copy quantum states to analyze later without disturbing them.

Quantum Information is Fragile

You can’t backup quantum states. Loss or error destroys information permanently (without error correction).

Teleportation Doesn’t Clone

Quantum teleportation destroys the original when creating the copy, satisfying no-cloning.

Distinguishing Quantum from Classical

Classical information (bits) can be freely copied. Quantum information (qubits) cannot. This is a fundamental difference.

TheoremStatement
No-deletingCan’t delete one of two identical copies
No-broadcastingCan’t clone mixed states
No-hidingQuantum information can’t be hidden in correlations

Historical Note

Proved independently by Wootters-Zurek and Dieks in 1982. It was initially seen as a limitation, but later recognized as the foundation of quantum cryptography’s security.


See also: Quantum Key Distribution, Quantum Teleportation, Quantum State, Quantum Money

Bell State

The four maximally entangled two-qubit states, a key resource for quantum communication protocols.


Bell states (also called EPR pairs or Bell pairs) are the four maximally entangled states of two qubits. They’re named after physicist John Bell and are fundamental to quantum information.

The Four Bell States

Alternative notation: .

Properties

Maximally Entangled

Each Bell state has maximum entanglement. Tracing out either qubit gives the maximally mixed state:

Perfect Correlations

Measuring both qubits in the same basis always gives correlated results:

StateZ-basis correlationX-basis correlation
Same (00 or 11)Same (++ or –)
SameOpposite
Opposite (01 or 10)Same
OppositeOpposite

Orthonormal Basis

The four Bell states form a complete orthonormal basis for two qubits. Any two-qubit state can be written as a superposition of Bell states.

Creating Bell States

The standard circuit (Bell circuit):

|0⟩ ──H────●──── |Φ+⟩
           │
|0⟩ ───────⊕────
  1. Hadamard on first qubit
  2. CNOT with first as control

Different input states produce different Bell states.

Bell Measurement

A Bell measurement projects onto the Bell basis, distinguishing all four states.

Circuit (reverse of creation):

     ●────H──── Measure → tells which Bell state
     │
     ⊕──────── Measure →

Applications

ApplicationHow Bell States Are Used
Quantum teleportationShared entanglement resource
Superdense codingChannel for 2 bits per qubit
QKD (E91)Detect eavesdroppers
Bell testsProve quantum mechanics is non-local
Entanglement swappingExtend entanglement range

Bell State as a Resource

Think of a Bell pair as a resource that can be “spent”:

  • Teleportation consumes one Bell pair to send one qubit
  • Superdense coding consumes one Bell pair to send two classical bits

Entanglement is a currency in quantum information!


See also: Entanglement, Bell Inequality, Quantum Teleportation, CNOT Gate

Bell Inequality

Mathematical inequalities that distinguish quantum mechanics from classical hidden-variable theories.


Bell inequalities are constraints that any local hidden-variable theory must satisfy. Quantum mechanics violates these inequalities, proving that nature is fundamentally non-classical.

The Question

Can quantum correlations be explained by hidden classical information? Einstein believed quantum randomness might reflect our ignorance of “hidden variables.” Bell’s 1964 theorem showed this is impossible (under reasonable assumptions).

Local Hidden Variables

A local hidden-variable theory assumes:

  1. Realism: Measurement outcomes are predetermined by hidden variables
  2. Locality: Measurements on one particle can’t instantly affect another

Bell proved: Any such theory satisfies certain inequalities that quantum mechanics violates.

The CHSH Inequality

The most commonly used Bell inequality (CHSH):

For two parties (Alice and Bob) with two measurement settings each (a, a’ and b, b’):

where is the correlation between measurements.

Classical Bound

Any local hidden-variable theory:

Quantum Bound

Quantum mechanics allows up to: (Tsirelson’s bound)

Experimental Tests

To test Bell inequalities:

  1. Prepare entangled particles
  2. Separate them (space-like separation ideally)
  3. Choose measurement settings randomly
  4. Check if correlations violate the inequality

Milestone Experiments

  • 1982 (Aspect): First convincing violation
  • 2015 (Loophole-free): Closed major loopholes simultaneously
  • 2022 (Nobel Prize): Awarded to Aspect, Clauser, Zeilinger

Loopholes

Early experiments had potential issues:

LoopholeIssueResolution
LocalitySettings might not be truly random/separatedSpace-like separation, random number generators
DetectionNot all particles detectedHigh-efficiency detectors
Freedom-of-choiceMeasurement choices might be predeterminedCosmic random number sources

Modern experiments close all known loopholes.

Implications

Bell inequality violations prove:

  1. No local hidden variables: Nature isn’t locally deterministic
  2. Entanglement is real: Not just a mathematical artifact
  3. Quantum non-locality: Correlations can’t be explained classically

This doesn’t allow faster-than-light communication (results still look random locally).

Device-Independent Applications

Bell violations can certify quantum properties without trusting the devices:

  • Device-independent QKD
  • Certified randomness generation
  • Self-testing quantum states

See also: Entanglement, Bell State, Quantum Key Distribution

Quantum Key Distribution

Using quantum mechanics to establish secure cryptographic keys between two parties, with security guaranteed by physics.


Quantum Key Distribution (QKD) enables two parties (traditionally Alice and Bob) to generate a shared secret key with security guaranteed by the laws of quantum physics, not computational assumptions.

The Goal

Create a shared random key that:

  1. Only Alice and Bob know
  2. Any eavesdropping attempt is detectable
  3. Security doesn’t depend on computational hardness

Why Quantum?

Classical key exchange (like Diffie-Hellman) relies on mathematical problems being hard to solve. A powerful enough computer (or algorithm) could break it.

QKD security comes from physics:

  • No-cloning theorem: Can’t copy unknown quantum states
  • Measurement disturbance: Observing qubits changes them
  • Bell inequality violations: Certify genuine quantum correlations

Major Protocols

BB84

The original QKD protocol (1984):

  • Uses single photons in two bases
  • Detect eavesdropping via error rate

E91

Entanglement-based (1991):

  • Uses entangled photon pairs
  • Security from Bell inequality violations

Continuous-Variable QKD

Uses coherent states and homodyne detection:

  • Compatible with telecom infrastructure
  • Different noise analysis

Basic QKD Steps

1. QUANTUM TRANSMISSION
   Alice sends quantum states to Bob
   (photons encoding bits)

2. BASIS RECONCILIATION
   Alice & Bob compare measurement bases (publicly)
   Keep only matching-basis results

3. ERROR ESTIMATION
   Compare subset of key bits (publicly)
   High error rate → eavesdropper detected

4. ERROR CORRECTION
   Fix remaining errors in the key

5. PRIVACY AMPLIFICATION
   Shrink key to remove eavesdropper's information

Result: Shorter but perfectly secure key

Security

Information-Theoretic Security

QKD can provide unconditional security: secure against any attack, even with unlimited computing power.

Assumptions Still Required

  • Quantum mechanics is correct
  • Devices work as specified
  • No side channels

Device-Independent QKD

Device-independent QKD removes device assumptions using Bell inequality violations. Security is certified by observed quantum correlations.

Practical Considerations

ChallengeCurrent State
Distance~100 km fiber, 1000+ km satellite
Key rate~Mbps (short distance), ~kbps (long distance)
IntegrationCommercial systems available
CostStill expensive, specialized equipment

Quantum Networks

For multiple users, QKD networks are being developed:

  • Trusted node networks (relay through secure stations)
  • Quantum repeaters (future: extend range without trust)
  • Satellite QKD (demonstrated by China’s Micius)

Relation to Post-Quantum Cryptography

ApproachSecurity BasisProtects
QKDPhysicsKey exchange
Post-QuantumMathematical hardnessAll cryptography

Both are responses to quantum computing threats but work differently.


See also: BB84 Protocol, E91 Protocol, No-Cloning Theorem, Post-Quantum Cryptography, Quantum Random Number Generator, Device-Independent Security

BB84 Protocol

The first quantum key distribution protocol, using single photons in two conjugate bases.


BB84 is the original QKD protocol, proposed by Charles Bennett and Gilles Brassard in 1984. It remains the most widely implemented QKD scheme.

The Setup

Alice wants to share a secret key with Bob. Eve (eavesdropper) may try to intercept.

The Two Bases

BasisStatesBit Values
Rectilinear (+), 0, 1
Diagonal (×), 0, 1

Key insight: Measuring in the wrong basis gives random results.

The Protocol

Step 1: Quantum Transmission

Alice, for each bit:

  1. Randomly chooses basis (+ or ×)
  2. Randomly chooses bit value (0 or 1)
  3. Sends corresponding photon to Bob

Bob, for each received photon:

  1. Randomly chooses basis (+ or ×)
  2. Measures and records result

Step 2: Sifting (Basis Reconciliation)

Over public channel:

  1. Alice and Bob announce their bases (not results!)
  2. Keep only bits where bases matched
  3. Discard the rest (~50% of bits)

Step 3: Error Estimation

  1. Randomly select and compare some key bits (publicly)
  2. Calculate error rate
  3. If error rate > threshold: abort (eavesdropper detected!)

Step 4: Post-Processing

  1. Error correction: Fix remaining errors
  2. Privacy amplification: Shrink key to remove Eve’s information

Why It’s Secure

If Eve Intercepts and Resends

Eve doesn’t know Alice’s basis. She must guess:

  • Guess correctly (50%): No disturbance
  • Guess wrong (50%): Introduces 25% error in that bit

Overall: Eve’s interception causes ~25% error rate in intercepted bits.

Detection

If Alice and Bob see error rate > 11% (theoretical threshold), they know Eve was present and abort.

Example

Alice's bits:    1    0    1    1    0    0    1    0
Alice's bases:   +    ×    +    ×    ×    +    ×    +
States sent:    |1⟩  |+⟩  |1⟩  |-⟩  |+⟩  |0⟩  |-⟩  |0⟩

Bob's bases:     ×    ×    +    +    ×    +    ×    ×
Bob's results:   ?    0    1    ?    0    0    1    ?

Matching bases:       ✓    ✓         ✓    ✓    ✓
Sifted key:          0    1         0    0    1

Bob’s “?” indicates random result (wrong basis).

Practical Implementations

Photon Sources

  • Weak coherent pulses (attenuated laser)
  • Single-photon sources (better but harder)
  • Decoy states (detect photon-number attacks)

Challenges

  • Photon loss over distance
  • Detector dark counts
  • Timing synchronization
  • Side-channel attacks

Variants

ProtocolImprovement
Decoy-state BB84Defeats photon-number splitting attacks
BBM92Entanglement-based version
SARG04Better for weak coherent pulses

See also: Quantum Key Distribution, E91 Protocol, No-Cloning Theorem, Wiesner State

E91 Protocol

An entanglement-based quantum key distribution protocol using Bell inequality violations for security.


E91 is a QKD protocol proposed by Artur Ekert in 1991. Unlike BB84, it uses entanglement and Bell inequalities to guarantee security.

The Key Idea

Alice and Bob share entangled photon pairs. By measuring Bell inequality violations, they can verify:

  1. Their photons are genuinely entangled
  2. No eavesdropper has disturbed the quantum channel

The Setup

A source produces Bell pairs:

One photon goes to Alice, one to Bob.

Measurement Bases

Alice’s ChoicesAngles
45°
90°
Bob’s ChoicesAngles
22.5°
67.5°
112.5°

The Protocol

Step 1: Measurement

For each photon pair:

  1. Alice randomly chooses , , or and measures
  2. Bob randomly chooses , , or and measures

Step 2: Public Comparison

Alice and Bob announce their measurement choices (not results).

Step 3: Key Generation

When Alice chose and Bob chose , or Alice chose and Bob chose :

  • These bases are parallel
  • Results are perfectly anti-correlated
  • Use for key bits

Step 4: Security Check

Use other combinations (, , , ) to compute CHSH:

Step 5: Verify Bell Violation

  • If : Maximum quantum violation, no eavesdropper
  • If : Some disturbance, possibly Eve
  • If : Classical correlations only, Eve has full information

Security from Bell Violations

The key insight: Bell violations certify quantum correlations.

If Eve intercepts and resends, she breaks the entanglement, reducing Bell violation. Alice and Bob detect this as reduced value.

Comparison with BB84

AspectBB84E91
ResourceSingle photonsEntangled pairs
Security proofNo-cloningBell inequalities
Source locationWith AliceCan be anywhere
Device-independentNoCloser to DI

Advantages of E91

  1. Source can be untrusted: Even if Eve controls the source, Bell violations prove security
  2. Path to device-independence: Foundation for Device-Independent QKD (DI-QKD)
  3. Symmetric: Neither party needs to trust the source

Practical Considerations

  • Generating high-quality entangled pairs is harder than single photons
  • Loss affects both photons (reduces rate more)
  • Demonstrated over 100+ km

See also: Quantum Key Distribution, BB84 Protocol, Bell Inequality

Quantum Random Number Generator

A device that produces true randomness from quantum measurements, not pseudo-randomness from algorithms.


A Quantum Random Number Generator (QRNG) exploits the fundamental randomness of quantum mechanics to generate provably random numbers. Unlike classical pseudo-random number generators (PRNGs), QRNGs produce true randomness.

Why Quantum?

Classical “Random” Numbers

  • PRNGs are deterministic algorithms
  • Given the seed, output is predictable
  • Technically pseudo-random, not truly random

Quantum Randomness

  • Measurement outcomes are fundamentally unpredictable
  • Not due to ignorance: nature itself is random
  • No hidden variables determine outcomes (Bell’s theorem)

Basic Principle

Simplest QRNG:

  1. Prepare qubit in
  2. Measure in computational basis
  3. Result (0 or 1) is truly random with 50/50 probability

Implementation Methods

Photon-Based

MethodPrinciple
Beam splitterPhoton randomly reflects or transmits
Vacuum fluctuationsQuantum noise in light field
Photon arrival timeRandom detection timing
PolarizationRandom polarization measurement

Other Platforms

  • Superconducting qubits
  • Atomic systems
  • Quantum dots

Rates and Devices

Device TypeTypical Rate
Commercial QRNG100 Mbps - 1 Gbps
Lab systemsUp to 100 Gbps
Integrated chips10-100 Mbps

Commercial QRNGs are available from companies like ID Quantique, Quantis, and others.

Applications

Cryptography

  • Key generation for encryption
  • Nonces and initialization vectors
  • QKD bit choices

Scientific

  • Monte Carlo simulations
  • Statistical sampling
  • Randomized algorithms

Gaming and Lotteries

  • Provably fair random selection
  • Online gambling
  • Government lotteries

Certifying Randomness

How do you know the QRNG is working properly?

Device-Dependent

Trust that the device implements quantum measurement correctly.

Device-Independent

Use Bell inequality violations to certify randomness without trusting devices:

  • CHSH violation proves quantum process
  • Randomness certified by physics, not device specifications

Self-Testing

Intermediate approaches that verify some properties.

Challenges

ChallengeIssue
BiasImperfect devices may favor 0 or 1
CorrelationsAdjacent bits might be correlated
Classical noiseMix of quantum and classical randomness
VerificationProving the source is truly quantum

Solutions

  • Randomness extraction (post-processing to remove bias)
  • Statistical testing (NIST tests, Diehard tests)
  • Device certification

See also: Quantum Key Distribution, Measurement, Bell Inequality

Post-Quantum Cryptography

Cryptographic algorithms designed to be secure against both classical and quantum computers.


Post-Quantum Cryptography (PQC), also called quantum-resistant or quantum-safe cryptography, refers to cryptographic algorithms that remain secure even if an adversary has a quantum computer.

The Threat

Shor’s algorithm can break:

  • RSA: Factoring large numbers
  • ECC: Discrete logarithm on elliptic curves
  • DH/DSA: Discrete logarithm in finite fields

These underpin most of today’s public-key cryptography. A large quantum computer would compromise secure communications, digital signatures, and more.

The Timeline

PhaseStatus
StandardizationNIST finalized first standards (2024)
TransitionUnderway (hybrid approaches)
Quantum computersNot yet cryptographically relevant

“Harvest now, decrypt later”: Data encrypted today could be stored and decrypted once quantum computers exist.

PQC Approaches

Lattice-Based Cryptography

Based on hard lattice problems (e.g., Learning With Errors).

  • Examples: Kyber (key exchange), Dilithium (signatures)
  • Pros: Efficient, well-studied
  • Cons: Larger keys than classical

Hash-Based Signatures

Security relies only on hash function properties.

  • Examples: SPHINCS+, XMSS
  • Pros: Conservative security assumptions
  • Cons: Larger signatures, stateful versions have management challenges

Code-Based Cryptography

Based on error-correcting codes.

  • Examples: Classic McEliece, BIKE
  • Pros: Long history (1978)
  • Cons: Very large public keys

Isogeny-Based

Based on maps between elliptic curves.

  • Examples: SIKE (broken in 2022!)
  • Status: Active research, some schemes broken

Multivariate Cryptography

Based on solving multivariate polynomial equations.

  • Examples: Rainbow (broken), ongoing research
  • Status: Several schemes broken, active area

NIST Standardization

NIST’s post-quantum cryptography project (2016-2024) selected:

Key Encapsulation (Encryption)

  • ML-KEM (Kyber): Primary standard

Digital Signatures

  • ML-DSA (Dilithium): Primary standard
  • SLH-DSA (SPHINCS+): Hash-based alternative
  • FN-DSA (Falcon): Efficient signatures

Migration Strategy

Hybrid Approaches

Combine classical and post-quantum algorithms:

Hybrid Key = Classical_KEM(key) || PQ_KEM(key)

Secure if either is unbroken.

Crypto Agility

Design systems to swap algorithms easily, which is needed for future updates.

PQC vs QKD

AspectPQCQKD
Security basisMathematical hardnessPhysics
DeploymentSoftware updateNew hardware
CoverageAll cryptographyKey exchange only
MaturityStandardizedLimited deployment

Most organizations need PQC. QKD is complementary for highest-security applications.


See also: Shor’s Algorithm, Quantum Key Distribution, Lattice-Based Cryptography, Quantum-Safe

Quantum-Safe

Cryptographic systems that remain secure against attacks from quantum computers.


Quantum-safe (or quantum-resistant) describes cryptographic algorithms and systems that are secure against adversaries with access to quantum computers. It’s often used interchangeably with post-quantum cryptography.

What’s At Risk

Shor’s algorithm threatens:

AlgorithmUseStatus
RSAEncryption, signaturesBroken by quantum
ECDH/ECDSAKey exchange, signaturesBroken by quantum
DSASignaturesBroken by quantum
Diffie-HellmanKey exchangeBroken by quantum

Grover’s algorithm weakens:

AlgorithmImpact
AES-128Effective security reduced to 64 bits
AES-256Effective security reduced to 128 bits
SHA-256Collision resistance reduced

What’s Already Quantum-Safe

Symmetric Cryptography

With doubled key sizes:

  • AES-256: Quantum-safe (128-bit security)
  • SHA-384/SHA-512: Quantum-safe for hashing

Hash-Based Signatures

  • SPHINCS+, XMSS, LMS
  • Security from hash functions only

Achieving Quantum Safety

1. Post-Quantum Algorithms

Use PQC standards:

  • ML-KEM (Kyber) for key encapsulation
  • ML-DSA (Dilithium) for signatures

2. Quantum Key Distribution

Use QKD for key exchange:

  • Physics-based security
  • Requires specialized hardware

3. Hybrid Approaches

Combine classical and post-quantum:

  • Secure if either algorithm holds
  • Transition strategy

Migration Checklist

□ Inventory cryptographic assets
□ Identify quantum-vulnerable algorithms
□ Prioritize high-value, long-lifetime data
□ Plan hybrid deployment
□ Test post-quantum alternatives
□ Update protocols and standards
□ Deploy and monitor

Certification and Standards

StandardDescription
NIST PQCUS post-quantum standards
ETSI QSCEuropean quantum-safe cryptography
ISO/IECInternational standards in development
CNSA 2.0US government requirements

Common Misconceptions

“AES is broken by quantum computers” No. AES with sufficient key length remains secure.

“We need to switch immediately” Urgency depends on data lifetime. “Harvest now, decrypt later” threatens long-term secrets.

“QKD solves everything” QKD only does key exchange. You still need quantum-safe algorithms for signatures, authentication, etc.


See also: Post-Quantum Cryptography, Shor’s Algorithm, Quantum Key Distribution, Lattice-Based Cryptography

Lattice-Based Cryptography

Cryptographic systems based on hard mathematical problems involving lattices. The foundation of most post-quantum standards.


Lattice-based cryptography builds cryptographic primitives from computationally hard problems on mathematical lattices. It’s the basis for the primary post-quantum cryptography standards.

What’s a Lattice?

A lattice is a regular grid of points in -dimensional space, generated by integer combinations of basis vectors:

Think of it as an infinite, regular arrangement of points in space.

Hard Problems

Learning With Errors (LWE)

Given noisy linear equations over a ring:

Find the secret given many pairs. The noise is small but makes solving hard.

Ring-LWE

LWE over polynomial rings. More efficient and used in practice.

Module-LWE

A middle ground between LWE and Ring-LWE.

Short Integer Solution (SIS)

Find a short non-zero vector in the null space of a matrix.

Shortest Vector Problem (SVP)

Find the shortest non-zero vector in a lattice. Believed hard even for quantum computers.

Why Lattices for PQC?

PropertyBenefit
Quantum resistanceNo known quantum speedup for lattice problems
EfficiencyRelatively fast operations
VersatilitySupports encryption, signatures, FHE
Worst-case hardnessAverage-case security from worst-case problems

NIST Standards

ML-KEM (Kyber)

  • Type: Key Encapsulation Mechanism
  • Based on: Module-LWE
  • Use: Key exchange

ML-DSA (Dilithium)

  • Type: Digital signature
  • Based on: Module-LWE + Module-SIS
  • Use: Authentication

FN-DSA (Falcon)

  • Type: Digital signature
  • Based on: NTRU lattices
  • Use: Compact signatures

Key Sizes

Lattice schemes have larger keys than classical:

SchemePublic KeyCiphertext/Signature
Kyber-7681,184 bytes1,088 bytes
RSA-2048256 bytes256 bytes
Dilithium-31,952 bytes3,293 bytes
ECDSA-25664 bytes64 bytes

Larger but manageable for most applications.

Beyond Encryption

Lattices enable advanced cryptography:

  • Fully Homomorphic Encryption (FHE): Compute on encrypted data
  • Attribute-Based Encryption: Access control via attributes
  • Functional Encryption: Controlled function evaluation

Security Levels

NIST defines security levels:

LevelClassical SecurityQuantum Security
1AES-128~64-bit
3AES-192~128-bit
5AES-256~256-bit

See also: Post-Quantum Cryptography, Quantum-Safe, Shor’s Algorithm

Quantum Money

Quantum states serving as unforgeable currency, exploiting the no-cloning theorem to prevent counterfeiting.


Quantum money is a theoretical concept where currency exists as quantum states that cannot be copied, making counterfeiting physically impossible.

The Idea

Classical money can be counterfeited by copying. But the no-cloning theorem says you can’t copy an unknown quantum state. So: make money from quantum states!

Wiesner’s Scheme (1983)

The original quantum money proposal:

Creation (by bank)

For each bill:

  1. Generate random serial number
  2. Create qubits, each randomly in , , , or
  3. Record the serial number and basis choices in secret database
  4. Bill = serial number + quantum state

Verification

  1. Customer presents bill to bank
  2. Bank looks up bases for that serial number
  3. Measures each qubit in the recorded basis
  4. If all correct → valid; if errors → counterfeit

Why It’s Unforgeable

Counterfeiter doesn’t know the bases. Any measurement to learn the state disturbs it. Can’t clone without knowing.

Limitations of Wiesner’s Scheme

IssueProblem
Bank verificationMust return to bank to verify
Quantum memoryMust store fragile quantum states
Single useMeasuring bill reveals some information

Public-Key Quantum Money

Can anyone verify without bank involvement?

Requirements

  • Public verification: Anyone can verify
  • Unforgeability: Still can’t copy

This is much harder. Some proposals exist but are less practical.

Types of Quantum Money

Private-Key (Wiesner-type)

  • Only issuer can verify
  • Simpler to achieve

Public-Key

  • Anyone can verify
  • Much more challenging
  • Active research area

Quantum Tokens

  • Single-use credentials
  • Simpler security requirements

Current Status

Quantum money remains largely theoretical:

  • Requires long-lived quantum memory
  • No practical systems deployed
  • Active research in quantum-computational money (based on computational assumptions)
ConceptDescription
Quantum tokensSingle-use authorization
Quantum signaturesSign documents with quantum states
Quantum copy protectionSoftware that can’t be pirated

Why It Matters

Quantum money demonstrates:

  • Practical implications of no-cloning
  • Quantum advantages for security
  • The frontier of quantum cryptography

See also: No-Cloning Theorem, Quantum Key Distribution

Wiesner State

Quantum states used in Wiesner’s quantum money scheme, randomly chosen from conjugate bases to prevent counterfeiting.


Wiesner states are the quantum states used in Stephen Wiesner’s pioneering 1983 quantum money proposal. Each state is randomly chosen from two conjugate bases, making them impossible to copy without knowing the basis.

The States

For each qubit in a quantum “bill,” the bank randomly chooses one of four states:

StateBasisBit Value
Computational (Z)0
Computational (Z)1
Hadamard (X)0
Hadamard (X)1

Why They’re Unforgeable

A counterfeiter trying to copy a Wiesner state faces a dilemma:

  1. Unknown basis: They don’t know if the state is in the Z or X basis
  2. Measurement disturbs: Measuring in the wrong basis destroys information
  3. No-cloning: Can’t copy without knowing the state

If the counterfeiter guesses the wrong basis:

  • Measuring or in X basis → random result
  • Measuring or in Z basis → random result

Any attempt to learn the state changes it, making counterfeiting detectable.

The Protocol

Bank Creates Money

  1. Generate random serial number
  2. For each of positions, randomly choose basis (Z or X) and bit (0 or 1)
  3. Prepare the corresponding quantum state
  4. Store in secret database
  5. Bill = serial number + qubits in Wiesner states

Verification

  1. Customer presents bill with serial number
  2. Bank looks up the bases for
  3. Measures each qubit in the recorded basis
  4. If all measurements match recorded bits → valid
  5. If errors → counterfeit detected

Security Analysis

If a counterfeiter tries to copy by measuring and re-preparing:

  • Probability of guessing one basis correctly: 1/2
  • Probability of all bases correct:
  • For : Success probability

Historical Significance

Wiesner’s 1983 paper (written in 1970, published later) was foundational:

  • First application of quantum mechanics to cryptography
  • Introduced conjugate coding
  • Inspired BB84 quantum key distribution
  • Showed quantum information has unique security properties

Limitations

LimitationIssue
Bank verificationMust return to bank to verify
Quantum memoryStates must be preserved
Single useVerification reveals basis information

Connection to BB84

BB84 directly uses Wiesner’s conjugate coding idea:

  • Same four states
  • Random basis choice
  • Security from measurement disturbance

BB84 is essentially “Wiesner states for key distribution.”


See also: Quantum Money, BB84 Protocol, No-Cloning Theorem, Conjugate Coding

Device-Independent Security

Security guarantees that hold even when you don’t trust the devices, proven through Bell inequality violations.


Device-independent security is a cryptographic paradigm where security doesn’t rely on trusting the internal workings of quantum devices. Instead, security is certified by observing quantum correlations that violate Bell inequalities.

The Problem

Standard quantum protocols assume:

  • Devices prepare the states they claim
  • Measurements work as specified
  • No hidden side channels

But what if a manufacturer is malicious? Or devices are compromised?

The Solution

Device-independent protocols treat devices as “black boxes”:

  • Only observe inputs (settings) and outputs (results)
  • Test for Bell inequality violations
  • Violations prove genuine quantum behavior

Why It Works

Bell inequality violations can only come from true quantum entanglement. Classical devices cannot fake these correlations, no matter how sophisticated.

Bell Test ResultImplication
No violationCould be classical, no security guarantee
Violation observedMust be quantum, security follows

Applications

Device-Independent QKD

Generate encryption keys secure against:

  • Malicious device manufacturers
  • Compromised hardware
  • Unknown implementation flaws

Device-Independent Randomness

Certify that random numbers are truly unpredictable, even if you built the device yourself.

Self-Testing

Verify that a quantum device performs as claimed without opening it up.

The Trade-off

AspectStandard ProtocolsDevice-Independent
Trust requiredTrust devicesTrust physics only
PerformanceHigh key ratesMuch lower rates
ImplementationPractical todayExperimentally challenging
SecurityRelies on modelsUnconditional

Requirements

Device-independent protocols need:

  • High-efficiency detectors (~80%+) to close detection loophole
  • Space-like separation to close locality loophole
  • Many rounds for statistical significance

Current Status

  • First demonstrations achieved (2022)
  • Distances: ~400 meters
  • Key rates: Very low (proof of concept)
  • Active research area

Why It Matters

Device-independent security represents the ultimate in cryptographic paranoia: trust nothing except the laws of physics. Even if every component is built by an adversary, security holds if Bell tests pass.


See also: Bell Inequality, Quantum Key Distribution, Entanglement

Superconducting Qubit

Qubits made from superconducting circuits that behave as artificial atoms. The leading technology for near-term quantum computers.


Superconducting qubits are the most widely deployed quantum computing technology. They use superconducting circuits cooled to millikelvin temperatures to create quantum two-level systems.

How They Work

Superconductivity

At very low temperatures (~15 mK), certain materials conduct electricity with zero resistance. Currents can flow indefinitely.

The Josephson Junction

The key element: two superconductors separated by a thin insulator. It creates a non-linear inductor that enables quantum behavior:

  • Quantized energy levels (like an atom)
  • Controllable transitions between levels

Qubit States

  • : Ground state
  • : First excited state
  • Energy difference: ~5 GHz (microwave range)

Types of Superconducting Qubits

TypePrincipleUsed By
TransmonCharge qubit with reduced sensitivityIBM, Google, Rigetti
Flux qubitCirculating current directionD-Wave (annealing)
Phase qubitJunction phaseHistorical
FluxoniumEnhanced coherenceResearch

The transmon dominates current quantum computers.

Control and Readout

Control

  • Microwave pulses at qubit frequency (~5 GHz)
  • Pulse shape determines gate operation
  • Single-qubit gates: ~20 ns
  • Two-qubit gates: ~50-200 ns

Readout

  • Coupled to microwave resonator
  • Measure resonator frequency shift
  • ~1 μs readout time

Operating Conditions

ParameterTypical Value
Temperature10-20 mK
CoolingDilution refrigerator
Frequency4-8 GHz
T1 time50-500 μs
T2 time50-200 μs
Gate fidelity (1Q)99.9%+
Gate fidelity (2Q)99-99.9%

Advantages

AdvantageDetails
FabricationLeverages semiconductor manufacturing
ScalabilityLithographic techniques
ControlFast microwave electronics
ConnectivityCan couple many qubits
TunabilityFrequencies can be adjusted

Challenges

ChallengeIssue
CoolingRequires dilution refrigerators
ScaleWiring and control bottlenecks
CoherenceMaterial defects limit T1, T2
CrosstalkUnwanted qubit interactions

Major Players

  • IBM: Transmon-based, cloud access (IBM Quantum)
  • Google: Sycamore processor, quantum supremacy claim
  • Rigetti: Full-stack approach
  • IQM: European manufacturer

Current State

  • Largest systems: 1000+ qubits (IBM)
  • Best 2-qubit fidelity: ~99.9%
  • Active research on error correction

See also: T1 Time, T2 Time

Trapped Ion

Qubits encoded in individual atoms suspended by electromagnetic fields, offering high fidelity and long coherence times.


Trapped ion quantum computers use individual atoms confined by electromagnetic fields as qubits. The electronic states of these ions encode quantum information.

How It Works

Trapping

Ions are held in place by oscillating electric fields (Paul trap or linear trap):

  • Radio-frequency fields create an effective potential well
  • Ions levitate in vacuum, isolated from the environment
  • Can trap chains of tens of ions

Qubit Encoding

Two approaches:

TypeStatesTypical Splitting
HyperfineNuclear spin states~GHz
OpticalGround + metastable excited~THz

Example: Ytterbium-171 (Yb+) hyperfine qubit uses two nuclear spin states.

Control

Single-Qubit Gates

  • Apply focused laser beams to individual ions
  • Stimulated Raman transitions between qubit states
  • Can also use microwave pulses

Two-Qubit Gates

  • Ions interact via shared motional modes
  • Laser pulses create spin-dependent forces
  • Mølmer-Sørensen gate: ~99.9% fidelity demonstrated

Readout

  • Shine resonant laser
  • Ion in bright state: fluoresces (measure 1)
  • Ion in dark state: no fluorescence (measure 0)

Advantages

AdvantageDetails
Identical qubitsAll atoms of same species are identical
Long coherenceT2 up to seconds or minutes
High fidelityBest gate fidelities achieved
All-to-all connectivityAny ion can interact with any other
Optical interfaceNatural for quantum networks

Specifications

ParameterTypical Value
T1 timeSeconds to minutes
T2 timeSeconds (with dynamical decoupling)
1-qubit gate fidelity>99.99%
2-qubit gate fidelity>99.9%
Gate time (1Q)~1-10 μs
Gate time (2Q)~100-500 μs
Readout fidelity>99.9%

Challenges

ChallengeIssue
SpeedGates are slower than superconducting
ScalingAdding ions to chain becomes harder
Optics complexityMany laser beams needed
Vacuum requirementsUltra-high vacuum needed

Scaling Approaches

Quantum CCD

Move ions between trapping zones using electrode voltages. Demonstrated by Quantinuum.

Photonic Interconnects

Connect separate ion traps via optical fiber using photon-mediated entanglement.

2D Arrays

Trap ions in 2D grids rather than linear chains.

Major Players

  • Quantinuum (Honeywell + Cambridge Quantum): QCCD architecture
  • IonQ: Linear chains, photonic scaling
  • Alpine Quantum Technologies: European player
  • University labs: NIST, Duke, Oxford, Innsbruck

See also: Qubit, T1 Time, T2 Time, Quantum Gate

Photonic Qubit

Quantum information encoded in photons, ideal for quantum communication and potentially scalable quantum computing.


Photonic qubits use single photons or optical modes to encode quantum information. They’re the workhorses of quantum communication and a promising path to scalable quantum computing.

Encoding Methods

Polarization Encoding

Simple, robust, limited to single-rail.

Path Encoding (Dual-Rail)

Photon presence in one of two paths.

Time-Bin Encoding

When the photon arrives encodes the qubit.

Continuous Variable

Encode in quadratures of the electromagnetic field (like position and momentum of light).

Single-Qubit Operations

Simple with linear optics:

  • Waveplates: Rotate polarization (any single-qubit gate)
  • Beam splitters: Mix paths
  • Phase shifters: Add phases

Single-qubit gates are essentially perfect!

Two-Qubit Operations

This is the hard part. Photons don’t naturally interact.

KLM Protocol

Knill-Laflamme-Milburn (2001): Use measurement and feedforward:

  • Non-deterministic gates that work ~1/16 of the time
  • Requires many ancilla photons and fast switching

Fusion-Based Quantum Computing

  • Create small entangled states (resource states)
  • Fuse them together via measurement
  • Xanadu and PsiQuantum approach

Measurement-Based QC

Measurement-Based QC (MBQC): Create cluster states, compute via measurement.

Advantages

AdvantageDetails
Room temperatureNo cooling required
Long coherencePhotons don’t interact with environment
Natural for communicationTravels at light speed in fiber/free space
High-fidelity 1Q gatesEssentially perfect linear optics
NetworkingIdeal for quantum internet

Challenges

ChallengeIssue
Two-qubit gatesNon-deterministic, resource-intensive
Single-photon sourcesHard to make efficient, indistinguishable sources
Photon lossMajor error source
Detection efficiencyNeed near-perfect detectors

Hardware Components

ComponentPurpose
SPDC sourceGenerate photon pairs
Quantum dotsSingle-photon sources
Beam splittersQuantum interference
Single-photon detectorsMeasure qubits
WaveguidesRoute photons on-chip

Major Players

  • PsiQuantum: Million-qubit photonic computer goal
  • Xanadu: Gaussian boson sampling, Borealis
  • Quandela: European, integrated photonics
  • ORCA Computing: Quantum memory approach

See also: Qubit, Quantum Teleportation

Neutral Atom

Qubits encoded in neutral atoms held by optical tweezers, offering large-scale arrays and reconfigurable connectivity.


Neutral atom quantum computers trap individual atoms using focused laser beams (optical tweezers) and encode qubits in their electronic states. They’ve emerged as a promising platform for large-scale quantum computing.

How It Works

Trapping

  • Optical tweezers: Focused laser beams create potential wells
  • Atoms are trapped at intensity maxima (for red-detuned light)
  • Can create 2D or 3D arrays with hundreds of atoms

Qubit Encoding

Typically use:

  • Ground state:
  • Rydberg state: (highly excited state)

Or hyperfine states in the ground manifold.

Rydberg Interactions

The key to two-qubit gates: Rydberg blockade.

When one atom is in the Rydberg state:

  • Nearby atoms are shifted out of resonance
  • Creates effective long-range interaction
  • Range: several micrometers

This enables fast two-qubit gates.

Operations

Single-Qubit Gates

  • Global laser pulses for all qubits
  • Local addressing for individual control
  • Microwave or Raman transitions

Two-Qubit Gates

  • Excite both atoms to Rydberg states
  • Blockade creates controlled phase
  • CZ gates demonstrated with high fidelity

Readout

  • Fluorescence imaging
  • Atoms in certain states scatter light, others don’t
  • Camera captures array snapshot

Advantages

AdvantageDetails
ScalabilityArrays of 1000+ atoms demonstrated
Identical qubitsAll atoms of same isotope are identical
ReconfigurableCan rearrange atoms with tweezers
Long coherenceT2 > 1 second possible
All-to-all connectivityRydberg interactions can be long-range

Specifications

ParameterTypical Value
Array size100-1000+ atoms
T1 timeSeconds
T2 timeMilliseconds to seconds
1-qubit fidelity>99.5%
2-qubit fidelity>99%
Gate time~μs

Challenges

ChallengeIssue
Atom lossAtoms occasionally escape traps
Motional heatingAtoms gain energy
CrosstalkRydberg interactions with unintended neighbors
Imaging resolutionMust distinguish closely spaced atoms

Major Players

  • QuEra Computing: Boston-based, public access
  • Pasqal: French, 2D and 3D arrays
  • Atom Computing: Long coherence focus
  • Many university groups: Harvard, Caltech, JILA

Unique Capabilities

Native Multi-Qubit Gates

Rydberg interactions can implement gates on 3+ qubits natively.

Analog Quantum Simulation

Arrays naturally simulate spin models.

Reconfigurability

Can physically move atoms to change connectivity mid-computation.


See also: Qubit, Trapped Ion, Quantum Simulation

Decoherence

The loss of quantum coherence due to interaction with the environment, and the primary obstacle to quantum computing.


Decoherence is the process by which a quantum system loses its quantum properties (superposition, entanglement) through interaction with its environment. It’s the primary obstacle to building useful quantum computers.

The Problem

An isolated quantum system maintains coherent superpositions:

But real systems interact with their environment. This interaction:

  1. Leaks quantum information to the environment
  2. Destroys superposition
  3. Turns pure states into mixed states

Two Types of Decoherence

Relaxation (T1 Decay)

Energy loss to the environment:

Think: Excited atom spontaneously emitting a photon.

Characterized by T1 time.

Dephasing (T2 Decay)

Loss of phase information without energy exchange:

Think: Random fluctuations in the qubit frequency.

Characterized by T2 time.

Relationship: (dephasing can’t be slower than relaxation).

Mathematical Picture

Initial state (pure):

After decoherence (mixed):

Off-diagonal terms (coherences) vanish.

Sources of Decoherence

SourcePlatformEffect
Thermal photonsSuperconductingT1 decay
Material defectsSuperconductingT1 and T2
Magnetic field noiseIons, spinsT2 decay
Electric field noiseCharge qubitsT2 decay
PhononsSolid stateT1 and T2
Spontaneous emissionAtomsT1 decay

Why It’s Devastating

Circuit Depth Limit

If gate time 50 ns and 100 μs:

After ~2000 gates, coherence is lost.

Error Accumulation

Each gate has some error. Without error correction:

Decoherence makes larger over time.

Fighting Decoherence

StrategyHow It Helps
Better isolationReduce environmental coupling
Lower temperatureReduce thermal noise
Material purityFewer defects
Error correctionFix errors as they occur
Dynamical decouplingPulse sequences refocus phase
Shorter algorithmsFinish before decoherence

The Race

Quantum computing is a race between:

  • Gate operations (doing useful work)
  • Decoherence (destroying quantum information)

Success requires:


See also: T1 Time, T2 Time, Quantum Error Correction, Mixed State

T1 Time

The energy relaxation time: how long a qubit can stay in the excited state before decaying to ground.


T1 (also called the relaxation time or longitudinal relaxation time) measures how long a qubit maintains its energy before spontaneously releasing it to the environment.

Definition

If a qubit is prepared in , the probability of finding it still in after time :

T1 is the time constant for exponential decay to the ground state.

Physical Picture

A qubit in has higher energy than . Over time:

  • Energy leaks to the environment (as photons, phonons, etc.)
  • Qubit relaxes:
  • This is irreversible (energy is gone)

Typical Values

PlatformTypical T1
Superconducting (transmon)50-500 μs
Trapped ionSeconds to minutes
Neutral atomSeconds
NV center~6 ms (room temp)
Silicon spin>1 second

Causes of T1 Decay

CausePlatform
Purcell decayAll (coupling to resonators)
Material defectsSuperconducting
Dielectric lossSuperconducting
Spontaneous emissionAtoms, ions
Thermal photonsAll (if not cold enough)

Measurement

Inversion Recovery

  1. Prepare (with X gate)
  2. Wait time
  3. Measure
  4. Repeat for various
  5. Fit exponential to get T1
|1⟩ ──[wait t]── Measure → P(1) = e^{-t/T1}

Why T1 Matters

Information Loss

A qubit in superposition will have its component decay:

Circuit Depth Limit

Must complete computation before T1 decay destroys information.

Fundamental Bound on T2

T1 limits T2:

You can’t have coherence (T2) without energy (T1).

Improving T1

StrategyHow It Helps
Lower temperatureReduces thermal photons
Better materialsFewer defect loss channels
Filter modesBlock energy loss paths
Longer wavelengthLower photon emission rate
Purcell filteringSuppress resonator decay

Relation to T2

  • T1: Energy relaxation (longitudinal)
  • T2: Total coherence (includes dephasing)
  • always
  • when dephasing dominates

See also: T2 Time, Decoherence, Superconducting Qubit

T2 Time

The coherence time: how long a qubit maintains phase coherence in a superposition state.


T2 (also called the dephasing time or transverse relaxation time) measures how long a qubit can maintain a coherent superposition before the phase relationship is lost.

Definition

For a qubit in superposition :

The off-diagonal elements of the density matrix decay as:

T2 characterizes how quickly the qubit “forgets” its phase.

T2 vs T2*

MetricWhat It MeasuresHow to Measure
T2*Includes static and slow noiseFree induction decay (Ramsey)
T2 (echo)Removes slow noiseHahn echo or dynamical decoupling

T2* ≤ T2 ≤ 2T1

Physical Picture

A qubit in :

  • Has a definite phase relationship between and
  • Noise causes the phase to wander randomly
  • After time T2, phase is completely randomized
  • Interference effects are lost

Measurement: Ramsey Experiment

|0⟩ ── H ──[wait t]── H ── Measure
  1. Create with Hadamard
  2. Wait time (phase accumulates)
  3. Second Hadamard converts phase to amplitude
  4. Oscillations decay with time constant T2*

Measurement: Hahn Echo (T2)

|0⟩ ── H ──[t/2]── X ──[t/2]── H ── Measure

The X gate (π pulse) in the middle refocuses slow phase errors:

  • Low-frequency noise is canceled out
  • Gives longer T2 compared to T2*

Typical Values

PlatformT2*T2 (echo)
Superconducting20-100 μs50-200 μs
Trapped ion~msSeconds
NV center~μs~ms
Silicon spin~μs~ms

Causes of T2 Decay

CauseTypeRefocusable?
Slow magnetic field noiseT2*Yes
1/f noiseT2*Partially
Fast noise (white)T2No
Photon shot noiseT2No
T1 decayT2No

Dynamical Decoupling

Extend T2 with more refocusing pulses:

── H ──[τ]── X ──[2τ]── X ──[2τ]── X ──[τ]── H ──

More pulses → better noise cancellation → longer effective T2.

Sequences: CPMG, XY4, XY8, etc.

Why T2 Matters

T2 is often the limiting factor:

The Coherence Budget

If T2 = 100 μs and gate time = 50 ns:

This is why faster gates and longer T2 both help.


See also: T1 Time, Decoherence, Circuit Depth

Quantum Error Correction

Encoding quantum information redundantly to detect and correct errors. Required for fault-tolerant quantum computing.


Quantum Error Correction (QEC) protects quantum information from errors by encoding it across multiple physical qubits. It’s the key to building large-scale quantum computers.

The Challenge

Classical error correction: Copy the bit, use majority voting. But quantum has the no-cloning theorem, so you can’t copy!

Also, quantum errors are continuous (small rotations), not just bit flips.

How QEC Works

The Key Insights

  1. Don’t measure the qubits directly: That would collapse the state
  2. Measure the errors instead: Use “syndromes” that reveal error type
  3. Encode in subspace: Logical states span multiple physical qubits
  4. Errors become detectable: Errors move state out of code space

Basic Structure

Logical qubit = protected quantum information.

Types of Errors

All errors can be decomposed into Pauli errors:

ErrorEffectSymbol
Bit flipX
Phase flipZ
BothBit + phaseY

Simple Example: 3-Qubit Code

Protects against single bit flip (X error):

Syndrome measurement:

  • Measure parity of qubits 1,2 (without measuring individual values)
  • Measure parity of qubits 2,3
SyndromeError
00None
10Qubit 1
11Qubit 2
01Qubit 3

Real Codes

Surface Code

  • Leading candidate for fault tolerance
  • 2D layout, local measurements
  • ~1000 physical qubits per logical qubit

Stabilizer Codes

  • Mathematical framework for QEC
  • Includes Steane code, CSS codes

Bacon-Shor Code

  • Gauge qubits for simpler syndrome measurement

Color Codes

  • Alternative to surface code with transversal gates

The Error Correction Cycle

1. Perform computation gates
2. Measure syndromes (detect errors)
3. Decode: Figure out what errors occurred
4. Correct: Apply corrections (or track in software)
5. Repeat

This cycle must be faster than errors accumulate.

Threshold Theorem

If physical error rate is below threshold :

  • Logical error rate can be made arbitrarily small
  • By using more physical qubits

For surface code:

The Overhead

Error RatePhysical Qubits per Logical
~1,000
~100
Target: Many more

This is why we need millions of physical qubits for useful quantum computers.


See also: Surface Code, Logical Qubit, Fault Tolerance, Fidelity

Surface Code

The leading quantum error correction code, using a 2D grid of qubits with local measurements.


The surface code is the most promising error correction code for near-term fault-tolerant quantum computers. It has high error thresholds and requires only nearest-neighbor interactions.

Structure

Qubits arranged in a 2D grid:

    ●───○───●───○───●
    │   │   │   │   │
    ○───●───○───●───○
    │   │   │   │   │
    ●───○───●───○───●
    │   │   │   │   │
    ○───●───○───●───○

● = Data qubit
○ = Ancilla (measurement) qubit

Two types of measurements:

  • X stabilizers: Detect Z errors (measure X on 4 neighbors)
  • Z stabilizers: Detect X errors (measure Z on 4 neighbors)

Logical Qubit

A surface code “patch” encodes one logical qubit:

  • Size: data qubits ( = code distance)
  • Logical , : Defined by boundary conditions
  • Logical X, Z: Chains of operators across the patch

Error Correction

Errors create pairs of “defects” in syndrome measurements:

    0   0   0   0       0   0   0   0
      0   0   0   0  →    1   0   0   0   (error here)
    0   0   0   0       0   1   0   0

Decoder matches defects to identify errors. Most likely error pattern is corrected.

Code Distance

Distance = minimum number of errors to cause logical error.

DistanceData QubitsTotal Qubits
3917
52549
74997
d~~

Higher distance → better protection (but more qubits).

Error Threshold

The surface code has threshold .

If physical error rate :

Logical error rate decreases exponentially with distance!

Logical Operations

OperationImplementation
Logical XChain of X across patch
Logical ZChain of Z across patch
Logical HCode deformation
Logical SMagic state injection
Logical TMagic state distillation
Logical CNOTLattice surgery

Non-Clifford gates (T) are expensive and require “magic states.”

Lattice Surgery

Merge and split surface code patches to perform logical operations:

Patch A ──[merge]── Patch B
        ──[measure]──
        ──[split]──

This implements logical CNOT between patches.

Advantages

AdvantageDetails
High threshold~1%, achievable with current technology
Local operationsOnly nearest-neighbor interactions
2D layoutMatches chip architecture
FlexibleCan change code size dynamically

Challenges

ChallengeIssue
Qubit overhead~1000 physical per logical
Classical decodingMust be fast enough
Magic statesT gates require distillation
Physical footprintLarge chips needed

Current Status

  • Google, IBM, Quantinuum demonstrating surface code
  • Error rates approaching threshold
  • Full fault-tolerant computation still requires significant scaling

See also: Quantum Error Correction, Logical Qubit, Fault Tolerance

Logical Qubit

A qubit encoded across multiple physical qubits for error protection. The basic unit of fault-tolerant quantum computing.


A logical qubit is quantum information encoded in a way that’s protected from errors. It’s built from multiple physical qubits using quantum error correction.

Physical vs Logical

AspectPhysical QubitLogical Qubit
HardwareSingle quantum systemMany physical qubits
ErrorsAccumulatedCorrected
LifetimeT1, T2Can be arbitrarily long
OperationsNative gatesLogical gates (more complex)

Encoding

A logical qubit state is a superposition in a larger Hilbert space:

where and are encoded states spanning multiple physical qubits.

Example: 3-Qubit Code

3 physical qubits → 1 logical qubit

Surface Code

~ physical qubits → 1 logical qubit

Logical Operations

Operations on logical qubits are constructed from physical operations:

Logical GatePhysical Implementation
Logical X ()X on specific physical qubits
Logical Z ()Z on specific physical qubits
Logical CNOTLattice surgery, transversal gates
Logical TMagic state injection

The Overhead

The “cost” of a logical qubit depends on:

  • Error correction code used
  • Physical error rate
  • Target logical error rate
Physical Error RateLogical Qubits Needed
~1000 physical per logical
~100 physical per logical

Quality Metrics

Logical Error Rate

Probability of logical error per round:

Lower is better.

Logical Gate Fidelity

How well logical gates are implemented.

Why We Need Them

NISQ devices use physical qubits directly:

  • Limited circuit depth
  • Errors accumulate
  • Results become noise

Logical qubits enable:

  • Arbitrary circuit depth
  • Reliable computation
  • True quantum advantage

Current Status

  • Demonstrations of logical qubits (Google, Quantinuum, IBM)
  • Error rates not yet better than physical in useful regimes
  • Key milestone: Logical qubit outperforming its physical components

See also: Physical Qubit, Quantum Error Correction, Surface Code, Fault-Tolerant Quantum Computing

Physical Qubit

An actual quantum system serving as a qubit, the raw hardware before error correction.


A physical qubit is a real quantum system that implements a qubit. It’s the actual hardware: a superconducting circuit, a trapped ion, a photon, etc.

Physical vs Logical

AspectPhysical QubitLogical Qubit
What it isReal hardwareEncoded information
ErrorsSubject to noiseError-protected
CountWhat vendors reportMuch fewer
QualityVaries (T1, T2, fidelity)Target: very high

Physical Qubit Technologies

TechnologyPhysical SystemLeader
SuperconductingJosephson junction circuitIBM, Google
Trapped ionIonized atomIonQ, Quantinuum
Neutral atomNeutral atom in tweezerQuEra, Pasqal
PhotonicSingle photonXanadu, PsiQuantum
Quantum dotElectron spinIntel
NV centerDiamond defectVarious

Quality Metrics

Coherence Times

  • T1: Energy relaxation time
  • T2: Phase coherence time

Gate Fidelities

  • Single-qubit gate: How accurately gates are applied (~99.9%)
  • Two-qubit gate: Entangling gate accuracy (~99-99.9%)

Readout Fidelity

  • How accurately the qubit state is measured (~99%)

Connectivity

  • Which qubits can directly interact
  • Nearest-neighbor vs all-to-all

Qubit Counts

When companies announce “X qubits,” they mean physical qubits:

CompanyPhysical Qubits (2024-25)
IBM1000+
Google70+
IonQ30+
Quantinuum32

Logical qubit counts are much smaller (single digits to tens).

The Scaling Challenge

Going from physical to useful logical qubits:

Physical qubits:        1,000
  → With error correction
Logical qubits:         1-10
  → For useful computation
Needed logical qubits:  100-10,000
  → Therefore need
Physical qubits:        100,000 - 10,000,000+

This is why quantum computing is hard.

Noise Sources

Every physical qubit platform has specific noise:

PlatformMain Noise Sources
SuperconductingMaterial defects, thermal photons
Trapped ionLaser noise, heating
Neutral atomAtom loss, laser fluctuations
PhotonicPhoton loss

See also: Logical Qubit, Qubit, Decoherence, NISQ

Fault Tolerance

The ability to perform reliable computation despite faulty components. The goal of large-scale quantum computing.


Fault tolerance means a system can continue working correctly even when individual components fail. In quantum computing, it means performing accurate computation despite noisy qubits and gates.

The Problem

Quantum hardware is noisy:

  • Gates have ~0.1-1% error rates
  • Qubits lose coherence over time
  • Measurements can be wrong

Without fault tolerance, errors accumulate faster than computation proceeds.

The Solution: Error Correction Done Right

Quantum error correction encodes information protectively, but the correction process itself uses noisy gates!

Fault tolerance ensures errors during correction don’t spread uncontrollably:

  • Errors in one qubit don’t propagate to many
  • Syndrome extraction doesn’t amplify errors
  • The whole system is self-consistent

Fault-Tolerant Design Principles

1. Transversal Gates

Apply gates qubit-by-qubit across code blocks:

Block 1: ──U──U──U──
Block 2: ──U──U──U──

Errors stay localized.

2. Flag Qubits

Detect when errors might have spread during syndrome measurement.

3. Code Concatenation

Encode logical qubits within logical qubits:

Physical → Level 1 logical → Level 2 logical → ...

Each level suppresses errors further.

4. Careful Circuit Design

Every syndrome extraction circuit must be fault-tolerant.

Threshold Theorem

The foundation of fault tolerance:

If the physical error rate is below a threshold , logical error rates can be made arbitrarily small by using enough physical qubits.

where is related to code distance.

Threshold Values

CodeApproximate Threshold
Surface code~1%
Steane code~0.01%
Concatenated codes~0.001%

Surface code’s high threshold is why it’s favored.

Requirements for Fault Tolerance

RequirementWhy
Error rate below thresholdFoundation of everything
Fast classical processingDecode syndromes in real-time
Scalable architectureNeed millions of qubits
Mid-circuit measurementMeasure syndromes during computation
Low-latency feedbackCorrect errors before they spread

Current Status

MilestoneStatus
Demonstrate error correctionDone
Below-threshold error ratesAchieved for some gates
Logical qubit better than physicalRecent demonstrations
Useful fault-tolerant computationYears away

The Path Forward

Today:     NISQ (noisy, no error correction)
           ↓
Next:      Early fault tolerance (limited logical qubits)
           ↓
Goal:      Full fault tolerance (arbitrary computation)

See also: Quantum Error Correction, Logical Qubit, Fault-Tolerant Quantum Computing

Quantum Speedup

When a quantum algorithm solves a problem asymptotically faster than the best known classical algorithm.


Quantum speedup refers to a quantum algorithm outperforming classical algorithms, either provably or based on current knowledge.

Types of Speedup

Proven Speedup

Quantum is provably faster (information-theoretic lower bound for classical):

ProblemClassicalQuantumSpeedup
Unstructured searchQuadratic
Parity on OR treeQuadratic

Superpolynomial (Believed)

Based on computational complexity assumptions:

ProblemClassical (best known)Quantum
Factoring
Discrete log
Certain simulationsExponentialPolynomial

Polynomial Speedup

Faster by a polynomial factor:

ProblemClassicalQuantum
Search
Collision finding

The Speedup Landscape

         Quantum Speedups
              │
    ┌─────────┴─────────┐
    │                   │
Exponential         Polynomial
    │                   │
 Factoring          Grover search
 Simulation         Many others
 Period finding

Important Caveats

Input/Output

Many quantum speedups assume quantum input or only require quantum output:

  • HHL: Exponential speedup… if you can prepare input and only need expectation values
  • Speedup may vanish with classical I/O overhead

Constant Factors

Quantum algorithms often have large constant factors:

  • Gate overhead
  • Error correction costs
  • Classical simulation may win for small problems

Problem Structure

Speedups exploit specific problem structure:

  • Shor’s uses periodicity
  • Grover’s uses function structure
  • Not all problems have exploitable structure

No Speedup

Some problems have no quantum speedup:

  • Sorting: Still
  • General NP-complete: No known speedup
  • PSPACE-complete: Quantum in PSPACE, so no exponential speedup

Measuring Real Speedup

For practical comparisons:

  • Wall-clock time on real problems
  • Include all overheads (error correction, I/O)
  • Compare to best classical hardware and algorithms

Current status: Still demonstrating quantum advantage on artificial problems.


See also: Quantum Advantage, Grover’s Algorithm, Shor’s Algorithm

Quantum Supremacy

A quantum computer performing a task that’s practically impossible for any classical computer, regardless of usefulness.


Quantum supremacy (also called quantum computational supremacy) is the milestone where a quantum computer solves a problem that no classical computer can solve in reasonable time.

The Concept

  • Not about usefulness: The problem can be artificial
  • About capability: Demonstrating quantum beats classical
  • Practical impossibility: Classical would take thousands/millions of years

Google’s 2019 Claim

Google’s Sycamore processor (53 qubits):

  • Sampled from random quantum circuits
  • ~200 seconds on quantum computer
  • Claimed: 10,000 years on classical supercomputers

The Task

Sample outputs from a random quantum circuit. The output distribution is hard to simulate classically.

IBM’s Response

IBM claimed the classical simulation could be done in 2.5 days using different techniques (trading time for storage).

Why Random Circuit Sampling?

It’s designed to be:

  1. Hard for classical: Deep random circuits are hard to simulate
  2. Easy to verify: Statistical tests on output distribution
  3. Achievable now: Doesn’t need error correction

Controversy Over the Term

Many researchers prefer “quantum advantage” because:

  • “Supremacy” has problematic connotations
  • It doesn’t imply practical advantage
  • “Advantage” is more accurate

Subsequent Claims

YearSystemTask
2019Google SycamoreRandom circuit sampling
2020USTC JiuzhangGaussian boson sampling
2021USTC ZuchongzhiRandom circuit sampling
2023+VariousImproved demonstrations

Challenges to Claims

Classical algorithms keep improving:

  • Tensor network methods
  • GPU acceleration
  • Approximate simulation

The bar for supremacy keeps moving!

What It Means (and Doesn’t)

Does Mean

  • Quantum computers can do something classical can’t
  • The physics works as expected
  • Progress toward useful quantum computing

Doesn’t Mean

  • Quantum computers are “better” at everything
  • Useful problems are solvable
  • Classical computers are obsolete

The Path Forward

Quantum supremacy (artificial tasks)
        ↓
[Quantum advantage](./quantum_advantage.md) (useful tasks)
        ↓
Practical quantum computing (real-world impact)

We’re still working on the middle step.


See also: Quantum Advantage, NISQ, Quantum Speedup

Quantum Advantage

A quantum computer solving a useful problem better than classical computers. The practical goal of quantum computing.


Quantum advantage (sometimes called quantum utility) is when a quantum computer outperforms classical computers on a problem that actually matters.

Advantage vs Supremacy

AspectQuantum SupremacyQuantum Advantage
Problem typeCan be artificialMust be useful
UsefulnessNot requiredRequired
VerificationStatisticalPractical value
StatusClaimed (2019+)Being pursued

What “Advantage” Means

The quantum solution must be better in some meaningful way:

  • Faster: Less time to solution
  • Cheaper: Less resources (energy, hardware)
  • Better quality: More accurate results
  • Newly possible: Enables previously impossible computations

Candidate Applications

Near-Term (NISQ Era)

ApplicationStatusChallenge
Quantum chemistryActive researchNoise, accuracy
OptimizationActive researchUnclear advantage
Machine learningExploredFinding right problems
FinanceExploredDefining clear advantage

Long-Term (Fault-Tolerant)

ApplicationExpected Impact
CryptanalysisBreak RSA, ECC
Drug discoveryMolecular simulation
Materials designSuperconductors, catalysts
OptimizationLogistics, scheduling

Challenges to Achieving Advantage

Moving Classical Target

Classical algorithms improve:

  • Tensor networks for quantum simulation
  • Better heuristics for optimization
  • GPU acceleration

Fair Comparison

Must compare:

  • Best quantum algorithm vs best classical
  • On same problem and metric
  • Including all overheads

Practical Constraints

  • Error correction overhead
  • Problem encoding costs
  • Input/output bottlenecks

IBM’s “Utility” Experiments (2023)

IBM demonstrated:

  • 127-qubit processor (Eagle)
  • Physics simulation task
  • Results matching classical (where possible)
  • Extended beyond classical verification

Controversial whether this counts as “advantage.”

The Gap

Quantum supremacy: ✓ Demonstrated (artificial problems)
                    │
        [We are here - trying to bridge the gap]
                    │
Quantum advantage: ? Not yet clear (useful problems)

When Will We See It?

Estimates vary widely:

  • Optimistic: Already happening / imminent
  • Moderate: 5-10 years
  • Conservative: Requires fault tolerance

Depends heavily on what counts as “useful.”


See also: Quantum Supremacy, NISQ, Quantum Speedup, Quantum Simulation

NISQ

Noisy Intermediate-Scale Quantum: the current era of quantum computing with imperfect qubits and no error correction.


NISQ (Noisy Intermediate-Scale Quantum) describes the current generation of quantum computers. The term was coined by John Preskill in 2018.

What NISQ Means

Noisy

  • Qubits have errors
  • Gates are imperfect (~0.1-1% error)
  • Coherence times limit computation depth
  • No error correction

Intermediate-Scale

  • 50-1000+ qubits (current devices)
  • Too many to simulate classically
  • Too few/noisy for fault tolerance

Quantum

  • Genuinely quantum behavior
  • Entanglement, superposition
  • Potential for quantum advantage

NISQ Characteristics

PropertyNISQ Value
Qubits50-1000+
2-qubit gate fidelity99-99.9%
Circuit depth~100-1000
Error correctionNone
Computation timeSeconds to minutes

NISQ Algorithms

Algorithms designed for noisy devices:

AlgorithmApplication
VQEChemistry
QAOAOptimization
Quantum kernel methodsMachine learning
Variational classifiersClassification

Common theme: Variational/hybrid quantum-classical approaches.

NISQ Challenges

ChallengeImpact
Noise accumulationLimits circuit depth
Barren plateausTraining difficulty
Limited connectivityExtra SWAP gates
Calibration driftResults vary over time

The NISQ Question

Can NISQ devices achieve quantum advantage?

Optimistic view: Yes, for specific problems Pessimistic view: Noise always wins; need error correction

The jury is still out.

Post-NISQ: What’s Next?

NISQ (Now)
  │
  ├── More qubits, better fidelity
  │
  ↓
Early Fault-Tolerant (Coming)
  │
  ├── Logical qubits demonstrated
  ├── Partial error correction
  │
  ↓
Full Fault-Tolerant (Future)
  │
  └── Arbitrary computations

Why NISQ Matters

Even if NISQ can’t achieve full advantage:

  • Learning to operate quantum systems
  • Developing software and algorithms
  • Understanding error behavior
  • Training the workforce
  • Building toward fault tolerance

NISQ Timeline

YearMilestone
2016IBM 5-qubit cloud access
2019Google 53-qubit “supremacy”
2021100+ qubits
20231000+ qubits (IBM Condor)
2024+Error correction demonstrations

See also: VQE, QAOA, Quantum Advantage, Fault-Tolerant Quantum Computing

Fault-Tolerant Quantum Computing

Quantum computing with error correction, enabling arbitrarily long and accurate computations.


Fault-Tolerant Quantum Computing (FTQC) is the ultimate goal: quantum computers that can run arbitrarily long computations with arbitrarily low error rates.

NISQ vs FTQC

AspectNISQFTQC
Error correctionNoneFull
QubitsPhysicalLogical
Circuit depth~100-1000Unlimited
Error rate~0.1-1% per gate~ or better
Computation typeLimitedUniversal

Requirements for FTQC

1. Below-Threshold Error Rates

Physical error rate (threshold). For surface code:

2. Enough Physical Qubits

Ratio of physical to logical qubits:

  • Near threshold: ~1000:1
  • Below threshold: Can be ~100:1

3. Fast Classical Processing

  • Decode error syndromes in real-time
  • Faster than errors accumulate
  • Challenging at scale

4. Mid-Circuit Measurement

  • Measure syndromes during computation
  • Feed-forward based on results

5. Scalable Architecture

  • Millions of physical qubits eventually
  • Manageable control systems

What FTQC Enables

ApplicationWhy FTQC Is Needed
Shor’s algorithmDeep circuits, many operations
Large molecular simulationsPrecision requires many gates
Arbitrary quantum algorithmsNo depth limitations

The FTQC Stack

┌────────────────────────────┐
│    Quantum Applications    │
├────────────────────────────┤
│    Logical Operations      │
├────────────────────────────┤
│    Error Correction        │
│    (Surface code, etc.)    │
├────────────────────────────┤
│    Physical Qubits         │
│    (Hardware platform)     │
└────────────────────────────┘

Resource Estimates

For useful computations:

TaskLogical QubitsPhysical Qubits (estimated)
Factor 2048-bit RSA~4,000~4-20 million
Simulate FeMoco~4,000~4-20 million
Quantum chemistry100-1000100K-10M

Timeline

PhaseDescriptionTimeline
CurrentNISQ devicesNow
Near-termError correction demos2024-2026
Medium-termEarly FTQC2027-2030
Long-termFull FTQC2030s+

Timelines are highly uncertain.

Current Progress

  • Below-threshold operations: Demonstrated
  • Logical qubits: Created, but not yet better than physical
  • Logical operations: Demonstrated at small scale
  • Full FTQC: Not yet achieved

The Challenge Ahead

Physical error rate:     ~0.1%    ✓ Achieved
                              ↓
Logical error rate:      ~10⁻⁶   ? In progress
                              ↓
Required for utility:    ~10⁻¹⁰  ✗ Far to go

Scaling from ~100 qubits to millions while maintaining quality.


See also: NISQ, Quantum Error Correction, Surface Code, Logical Qubit, Fault Tolerance

Variational Quantum Algorithm

A class of hybrid quantum-classical algorithms using parameterized circuits optimized by classical computers.


Variational Quantum Algorithms (VQAs) are the primary approach for near-term (NISQ) quantum computing. They combine quantum circuit evaluation with classical optimization.

The Structure

┌─────────────────────────────────────────────────────┐
│                Classical Computer                    │
│  ┌─────────────┐                    ┌────────────┐  │
│  │  Optimizer  │◄──── Cost ◄───────│   Measure  │  │
│  │   (θ→θ')    │                    │ expectation│  │
│  └──────┬──────┘                    └─────▲──────┘  │
│         │ New θ                           │         │
│         ▼                                 │         │
│  ┌──────────────────────────────────────────────┐  │
│  │              Quantum Computer                 │  │
│  │  |0⟩ ──[Ansatz U(θ)]──── Measure             │  │
│  └──────────────────────────────────────────────┘  │
└─────────────────────────────────────────────────────┘
  1. Ansatz: Parameterized quantum circuit
  2. Evaluate: Measure expectation value
  3. Optimize: Classical optimizer updates
  4. Repeat: Until convergence

Key Components

Ansatz (Circuit Structure)

Parameterized circuit that can represent the solution:

Ansatz TypeDescription
Hardware-efficientUses native gates
Problem-inspiredEncodes domain knowledge
UCCSDChemistry-motivated

Cost Function

What you’re minimizing:

  • Energy (for VQE)
  • Objective value (for QAOA)
  • Classification loss (for QML)

Classical Optimizer

Updates parameters based on cost:

  • Gradient-based: ADAM, L-BFGS
  • Gradient-free: COBYLA, Nelder-Mead
  • Quantum-aware: SPSA, QNG
AlgorithmApplication
VQEGround state energy
QAOACombinatorial optimization
VQLSLinear systems
VQCClassification
QGANGenerative models

Why Variational?

NISQ-Friendly

  • Short circuits (low depth)
  • Resilient to some noise
  • Flexible structure

Trainable

  • Classical optimizer handles complexity
  • Adapts to problem instance
  • No deep understanding needed

Challenges

ChallengeIssue
Barren plateausVanishing gradients
NoiseCorrupts cost landscape
OptimizationLocal minima, long training
ExpressibilityCan ansatz represent solution?
TrainabilityCan we find the solution?

Outlook

VQAs are pragmatic but limited:

  • Good for exploring NISQ capabilities
  • Unclear when they outperform classical
  • May not scale to large problems

Bridge to fault-tolerant era or dead end? Jury’s out.


See also: VQE, QAOA, NISQ

Parameterized Quantum Circuit

A quantum circuit with adjustable parameters, similar to a neural network layer.


A Parameterized Quantum Circuit (PQC), also called a quantum circuit ansatz or variational circuit, is a quantum circuit whose gates depend on tunable parameters.

Structure

Each layer contains:

  • Fixed entangling gates (e.g., CNOT)
  • Parameterized rotation gates (e.g., , )

Example Circuit

         θ₁      θ₂      θ₃
|0⟩ ──Ry(θ₁)──●──Ry(θ₃)──●──
              │          │
|0⟩ ──Ry(θ₂)──⊕──Ry(θ₄)──⊕──

Parameters are optimized.

Common Building Blocks

Rotation Gates

Entangling Layers

  • CNOT ladders
  • CZ layers
  • All-to-all connectivity

Ansatz Types

TypeDescriptionUse Case
Hardware-efficientNative gates, easy to runGeneral
HeuristicAlternating rotation + entangleNISQ
Problem-specificEncodes problem structureChemistry, optimization
UCCSDCoupled cluster inspiredQuantum chemistry

Training PQCs

Like neural networks, PQCs are trained by:

  1. Forward pass: Run circuit, measure expectation
  2. Compute cost: Compare to target
  3. Backward pass: Estimate gradients
  4. Update: Adjust parameters

Gradient Methods

Parameter shift rule:

Requires two circuit evaluations per parameter.

Expressibility

How much of Hilbert space can the PQC reach?

More ExpressiveLess Expressive
Can represent more statesSimpler optimization
More parametersFewer parameters
Deeper circuitsShallower circuits
More barren plateausEasier training

Trade-off between expressibility and trainability.

Applications

  • VQE: Ansatz for molecular wave functions
  • QAOA: Alternating problem/mixer layers
  • QML: Feature maps and variational classifiers

Comparison to Neural Networks

AspectPQCNeural Network
Building blocksQuantum gatesLinear + nonlinear
State spaceHilbert spaceReal vectors
GradientsParameter shiftBackpropagation
TrainingSimilar challengesMature field

See also: Variational Quantum Algorithm, Quantum Machine Learning

Quantum Machine Learning

Using quantum computers to enhance machine learning, from quantum speedups to variational classifiers.


Quantum Machine Learning (QML) explores the intersection of quantum computing and machine learning. It encompasses both quantum algorithms for ML tasks and ML techniques for quantum systems.

The Landscape

                    QML
                     │
    ┌────────────────┼────────────────┐
    │                │                │
Quantum for ML    Hybrid        ML for Quantum
    │                │                │
HHL, sampling    VQC, QSVM      Error mitigation,
speedups         on NISQ        circuit optimization

Quantum Speedups for ML

Theoretical Speedups

AlgorithmClassicalQuantumCaveat
HHL (linear systems)Input/output issues
RecommendationDequantized
PCAData loading

The Catch

Many quantum ML speedups have been “dequantized” (classical algorithms found that match them). Data loading often kills the advantage.

Near-Term QML (NISQ)

Variational Quantum Classifiers

Parameterized circuits as ML models:

Classical data → Encode → [VQC(θ)] → Measure → Prediction

Quantum Kernels

Use quantum circuits to compute kernel functions:

Then use classical SVM.

Quantum Neural Networks

Hybrid models combining quantum circuits with classical networks.

Challenges

ChallengeIssue
Barren plateausGradients vanish
Data encodingClassical → quantum bottleneck
ReadoutLimited information extraction
Advantage unclearClassical ML is very good
NoiseErrors corrupt learning

Where QML Might Help

Quantum Data

Learning from quantum systems (natural fit):

  • Quantum chemistry
  • Quantum sensor data
  • Quantum state tomography

Structure in Data

Data with quantum-like structure:

  • High-dimensional correlations
  • Specific symmetries

Kernel Methods

Quantum kernels for specific data types.

Current State of the Field

Optimistic View

  • Exploring what’s possible
  • Some problems may suit quantum
  • Foundation for future advantage

Skeptical View

  • No clear advantage demonstrated
  • Classical ML keeps improving
  • Barren plateaus limit scaling

The Debate

“Will QML provide practical advantage?”

  • Proponents: Right problem + right encoding = advantage
  • Skeptics: Classical ML is hard to beat; overhead too high

The honest answer: We don’t know yet.


See also: Quantum Neural Network, Variational Quantum Algorithm

Quantum Neural Network

A parameterized quantum circuit used as a machine learning model, similar to a classical neural network.


A Quantum Neural Network (QNN) is a parameterized quantum circuit trained to perform machine learning tasks like classification or regression.

Structure

Input x → [Encoding S(x)] → [Variational U(θ)] → Measure → Output

1. Data Encoding

Convert classical data to quantum state:

Methods:

  • Angle encoding: gates
  • Amplitude encoding: Data in amplitudes
  • Feature maps: More complex encodings

2. Variational Layers

Parameterized circuit with trainable parameters:

3. Measurement

Extract prediction from quantum state:

Training

Like classical neural networks:

  1. Forward pass (circuit execution)
  2. Compute loss
  3. Compute gradients (parameter shift rule)
  4. Update parameters

Architectures

Variational Quantum Classifier (VQC)

Binary classification:

Quantum Convolutional NN

Inspired by CNNs:

  • Local operations (like convolutions)
  • Pooling via measurement

Hybrid Networks

Classical layers + quantum layers:

Classical NN → Quantum circuit → Classical NN

Comparison to Classical NNs

AspectClassical NNQNN
State spaceReal vectorsHilbert space
ParametersWeightsGate angles
NonlinearityActivation functionsMeasurement
GradientsBackpropParameter shift
ScaleBillions of parameters~100s of parameters

Advantages (Potential)

  • Exponentially large state space
  • Natural quantum data handling
  • Possible expressibility advantages
  • Different inductive biases

Challenges

ChallengeIssue
Barren plateausGradients vanish
Limited qubitsSmall models only
NoiseTraining is unstable
Advantage unclearClassical NNs are powerful

Current Applications

  • Quantum chemistry (with quantum data)
  • Small classification benchmarks
  • Proof-of-concept demonstrations
  • Hybrid quantum-classical models

Open Questions

  • When do QNNs outperform classical?
  • How to avoid barren plateaus?
  • What problems are best suited?
  • How do they scale?

See also: Parameterized Quantum Circuit, Quantum Machine Learning

Hamiltonian

The operator describing a quantum system’s total energy. Central to quantum simulation and variational algorithms.


The Hamiltonian is the fundamental operator in quantum mechanics. It describes the energy of a system and governs how it evolves in time.

Role in Quantum Mechanics

Energy Eigenvalues

Eigenstates have definite energies. The ground state has the lowest energy .

Time Evolution

Solutions:

In Quantum Computing

Hamiltonians appear everywhere:

Quantum Simulation

Simulating Hamiltonian evolution:

is a core quantum computing application.

Variational Algorithms

VQE finds ground state energy:

Adiabatic Computing

Evolve system under time-dependent Hamiltonian:

Pauli Decomposition

On qubits, any Hamiltonian can be written as:

where are Pauli strings (products of ).

Example (2 qubits):

Physical Examples

Transverse-Field Ising Model

Models magnetic systems, phase transitions.

Molecular Hamiltonian

Electronic structure of molecules.

Heisenberg Model

Spin-spin interactions.

Computing Expectation Values

Measuring requires measuring each Pauli term:

Many measurements needed (measurement overhead).

Why It Matters

Understanding Hamiltonians is essential for:


See also: VQE, Quantum Simulation