Welcome to the Quantum Jargon Decoder
Quantum computing, quantum information, and quantum cryptography are revolutionizing how we think about computation, communication, and security. But the field is drowning in jargon.
Qubits. Superposition. Entanglement. Decoherence. T1 times. Surface codes. NISQ. QKD.
If you’ve ever felt lost reading a quantum computing paper, tutorial, or press release, you’re not alone. This glossary exists to help you decode the quantum world.
Who is this for?
- Newcomers taking their first steps into quantum computing
- Software developers exploring quantum programming
- Researchers from adjacent fields entering the quantum space
- Students studying quantum information theory
- Anyone who wants to refresh their memory on a specific term
- Professionals trying to cut through the hype and understand what’s real
How to use this guide
Each term includes:
- A one-liner summary for quick reference
- A detailed explanation for deeper understanding
- Cross-references to related concepts
- Practical context on why the term matters
Start with the Introduction to Quantum Jargon if you’re completely new, or jump directly to any term that’s puzzling you.
A note on rigor
This is an informal glossary. We prioritize clarity and intuition over mathematical precision. When a concept requires deep mathematical treatment, we’ll point you to the right resources. The goal is to give you a working understanding, not to replace a textbook.
Contribute
Spot an error? Have a term to add? Think an explanation could be clearer? This is an open project and contributions are welcome. Every page has an “Edit” link that takes you directly to the source.
“The quantum world is strange, but the jargon doesn’t have to be.”
Time to decode it.
The Quantum Computing Stack
Before diving into individual terms, it helps to understand how quantum computing is organized. Like classical computing, quantum computing has “layers” or a “stack” that builds from physics up to applications.
The Layers
1. Physical Layer (The Hardware)
At the bottom is actual quantum hardware. This includes:
- Qubits: The physical quantum systems that store information (superconducting circuits, trapped ions, photons, etc.)
- Control systems: Lasers, microwave pulses, and electronics that manipulate qubits
- Cooling systems: Dilution refrigerators that keep superconducting qubits near absolute zero
Key terms: Superconducting Qubit, Trapped Ion, Photonic Qubit
2. Quantum Gate Layer
Above the physics, we have quantum operations:
- Gates: The quantum equivalent of logic gates (AND, OR, NOT in classical computing)
- Circuits: Sequences of gates that perform computations
- Measurement: Reading out the result of a computation
Key terms: Quantum Gate, Hadamard Gate, CNOT Gate, Quantum Circuit
3. Error Correction Layer
Quantum systems are noisy. This layer deals with that:
- Error detection: Finding when errors occur
- Error correction: Fixing errors without destroying quantum information
- Logical qubits: Error-protected qubits built from many physical qubits
Key terms: Quantum Error Correction, Surface Code, Logical Qubit, Fault Tolerance
4. Algorithm Layer
This is where computation happens:
- Quantum algorithms: Procedures that leverage quantum effects for computational advantage
- Variational methods: Hybrid quantum-classical approaches for near-term devices
Key terms: Shor’s Algorithm, Grover’s Algorithm, VQE, QAOA
5. Application Layer
At the top, real-world problems:
- Cryptography: Secure communication, key distribution
- Chemistry: Molecular simulation, drug discovery
- Optimization: Supply chain, finance, logistics
- Machine learning: Quantum-enhanced AI
Key terms: Quantum Key Distribution, Quantum Simulation, Quantum Machine Learning
Where Are We Today?
As of 2024-2025, we’re in the NISQ era (Noisy Intermediate-Scale Quantum). This means:
- We have quantum computers with 50-1000+ qubits
- These qubits are “noisy” (error-prone) and lack full error correction
- We’re exploring what useful tasks these imperfect machines can do
- Full fault-tolerant quantum computing is still years away
Key terms: NISQ, Quantum Advantage, Fault-Tolerant Quantum Computing
The Path Forward
Today: NISQ devices (noisy, limited)
↓
Next: Early fault-tolerant systems (100s of logical qubits)
↓
Goal: Large-scale fault-tolerant quantum computers (millions of qubits)
Understanding this stack helps contextualize every term you’ll encounter. When someone mentions “T1 times,” you know that’s about physical hardware. When they discuss “logical qubits,” that’s the error correction layer. When they’re excited about “quantum advantage,” that’s about the algorithm/application layers proving real value.
Next: From Classical to Quantum - Understanding what makes quantum different.
From Classical to Quantum
What makes quantum computing fundamentally different from classical computing? This section breaks down the core concepts that separate the two worlds.
Classical Bits vs. Quantum Bits
Classical Bit
A classical bit is simple: it’s either 0 or 1. Period.
Classical bit: 0 OR 1
Every computer you’ve ever used processes information this way. Billions of transistors switching between two states.
Quantum Bit (Qubit)
A qubit can be 0, 1, or both at the same time.
Qubit: α|0⟩ + β|1⟩
This “both at the same time” is called superposition. The numbers α and β are complex numbers called amplitudes that describe the probability of measuring 0 or 1.
Important: When you measure a qubit, you get a definite answer (0 or 1). The superposition “collapses.” You can’t peek at the superposition directly.
The Three Pillars of Quantum Computing
1. Superposition
A qubit in superposition isn’t undecided. It’s genuinely in multiple states simultaneously. This allows quantum computers to explore many possibilities at once.
This qubit has equal probability of being measured as 0 or 1.
Why it matters: With qubits, you can represent states simultaneously. 50 qubits can represent more states than a classical supercomputer can track individually.
2. Entanglement
When qubits become entangled, their states become correlated in ways impossible classically. Measure one, and you instantly know something about the other, regardless of distance.
The most famous entangled state is the Bell state:
Both qubits are in superposition, but they’re perfectly correlated: if you measure the first as 0, the second will also be 0. Measure 1, and the second is 1.
Why it matters: Entanglement is a resource for quantum computation and communication. It enables quantum teleportation, superdense coding, and is essential for quantum speedups.
3. Interference
Quantum states can interfere with each other, like waves in water. Amplitudes can add (constructive interference) or cancel (destructive interference).
Why it matters: Quantum algorithms are designed to make wrong answers interfere destructively and right answers interfere constructively. This is how you extract useful results from quantum computation.
How Quantum Computation Works
A quantum computation follows this pattern:
1. INITIALIZE: Prepare qubits in a known state (usually |0⟩)
2. SUPERPOSE: Put qubits into superposition (using Hadamard gates, etc.)
3. ENTANGLE: Create correlations between qubits (using CNOT gates, etc.)
4. COMPUTE: Apply quantum gates that cause interference
5. MEASURE: Read out the final answer
The art of quantum algorithm design is arranging steps 2-4 so that interference amplifies correct answers and suppresses wrong ones.
What Quantum Computers Are NOT
Common myths:
NOT exponentially parallel classical computers: You can’t just run all possible inputs simultaneously and read all outputs. Measurement gives you ONE result.
NOT instantaneous: Quantum operations take time, and quantum algorithms have complexity like classical ones.
NOT universally faster: Only specific problems have known quantum speedups. For many tasks, classical computers are just as good or better.
NOT breaking physics: Entanglement doesn’t enable faster-than-light communication. You need classical communication to use quantum correlations.
When Quantum Computers Help
Quantum computers excel at specific problem types:
| Problem Type | Example | Quantum Advantage |
|---|---|---|
| Factoring | Breaking RSA | Exponential (Shor’s Algorithm) |
| Unstructured search | Database search | Quadratic (Grover’s Algorithm) |
| Simulation | Molecular chemistry | Potentially exponential |
| Optimization | Combinatorial problems | Unclear/Active research |
| Linear algebra | Solving linear systems | Exponential* (HHL) |
*With caveats about input/output
Key Intuition
Think of quantum computing like this:
Classical computing is like reading a book page by page.
Quantum computing is like having a book where all pages exist in superposition, and through careful manipulation, you can make the page you’re looking for “pop out” with high probability.
The challenge? Designing that “careful manipulation.” Most of the pages you don’t want need to interfere destructively, while the answer constructively builds up. This is genuinely hard, which is why useful quantum algorithms are rare and precious.
Now you have the conceptual foundation. Head to the Acronyms for quick reference, or dive into specific definitions to explore further.
Acronyms
A list of common acronyms you’ll encounter in quantum computing, quantum information, and quantum cryptography.
B
- BB84: Bennett-Brassard 1984 (QKD protocol) - see BB84 Protocol
C
- CNOT: Controlled-NOT (gate) - see CNOT Gate
- CZ: Controlled-Z (gate)
E
- E91: Ekert 1991 (QKD protocol) - see E91 Protocol
- EPR: Einstein-Podolsky-Rosen (paradox/pair)
F
- FTQC: Fault-Tolerant Quantum Computing - see Fault-Tolerant Quantum Computing
G
- GHZ: Greenberger-Horne-Zeilinger (state)
N
- NISQ: Noisy Intermediate-Scale Quantum - see NISQ
P
- PQC:
- Post-Quantum Cryptography - see Post-Quantum Cryptography
- Parameterized Quantum Circuit - see Parameterized Quantum Circuit
Q
- QAOA: Quantum Approximate Optimization Algorithm - see QAOA
- QC: Quantum Computing/Computer
- QEC: Quantum Error Correction - see Quantum Error Correction
- QFT: Quantum Fourier Transform - see Quantum Fourier Transform
- QKD: Quantum Key Distribution - see Quantum Key Distribution
- QML: Quantum Machine Learning - see Quantum Machine Learning
- QNN: Quantum Neural Network - see Quantum Neural Network
- QPE: Quantum Phase Estimation - see Quantum Phase Estimation
- QPU: Quantum Processing Unit
- QRNG: Quantum Random Number Generator - see Quantum Random Number Generator
R
- RSA: Rivest-Shamir-Adleman (cryptosystem)
V
- VQA: Variational Quantum Algorithm - see Variational Quantum Algorithm
- VQE: Variational Quantum Eigensolver - see VQE
Common Notation
- |ψ⟩: Ket notation for a quantum state (pronounced “ket psi”)
- ⟨ψ|: Bra notation (pronounced “bra psi”)
- ⟨ψ|φ⟩: Inner product (pronounced “bra-ket” or “bracket”)
- |0⟩, |1⟩: Computational basis states
- |+⟩, |−⟩: Hadamard basis states,
- ⊗: Tensor product (combining quantum systems)
- †: Dagger (Hermitian conjugate)
- I: Identity operator
- ρ: Density matrix
- H: Hadamard gate (or Hamiltonian, depending on context)
- X, Y, Z: Pauli matrices/gates
- T₁, T₂: Relaxation and dephasing times
Missing an acronym? Contribute to add it!
Qubit
The quantum analog of a classical bit, and the basic unit of quantum information.
A qubit (quantum bit) is a two-level quantum system that serves as the basic unit of information in quantum computing. Unlike a classical bit, which is definitively 0 or 1, a qubit can exist in a superposition of both states simultaneously.
Mathematical Description
A qubit’s state is described as:
where:
- and are the computational basis states
- and are complex amplitudes
- (normalization condition)
When measured, the qubit collapses to with probability or to with probability .
Physical Implementations
Qubits can be realized in many physical systems:
| Technology | Qubit Type | Key Players |
|---|---|---|
| Superconducting circuits | Transmon, flux qubit | IBM, Google, Rigetti |
| Trapped ions | Hyperfine/Zeeman levels | IonQ, Quantinuum |
| Photons | Polarization, path | Xanadu, PsiQuantum |
| Neutral atoms | Ground/Rydberg states | QuEra, Pasqal |
| Quantum dots | Spin states | Intel |
| NV centers | Spin states | Various research |
Key Properties
- Superposition: A qubit can be in a combination of and
- Measurement collapse: Observing a qubit forces it into a definite state
- No-cloning: You cannot copy an unknown qubit state (see No-Cloning Theorem)
- Entanglement: Qubits can become correlated with other qubits (see Entanglement)
Visualization
The Bloch sphere provides a geometric visualization of a qubit’s state. Any pure qubit state corresponds to a point on the surface of a unit sphere:
- is at the north pole
- is at the south pole
- Superposition states lie elsewhere on the sphere
Why It Matters
The qubit is the foundation of everything in quantum computing. Understanding qubits is essential for understanding:
- Quantum gates (operations on qubits)
- Quantum circuits (sequences of gates)
- Quantum algorithms (computational procedures)
See also: Superposition, Bloch Sphere, Quantum State, Logical Qubit, Physical Qubit
Superposition
A quantum system existing in multiple states simultaneously until measured.
Superposition is perhaps the most famous feature of quantum mechanics. A quantum system in superposition is not in one definite state but rather in a combination of multiple possible states at once.
The Concept
Consider a qubit. Classically, a bit is either 0 or 1. A qubit in superposition is both 0 and 1 simultaneously:
This is not the same as:
- Being 0 or 1 but we don’t know which (that’s classical uncertainty)
- Switching rapidly between 0 and 1
- Being “kind of” 0 and “kind of” 1
Superposition is genuinely being in multiple states at once, a distinctly quantum phenomenon with no classical analog.
Measurement and Collapse
When you measure a qubit in superposition, you get a definite result:
- with probability
- with probability
After measurement, the superposition is destroyed. The qubit is now in the measured state. This is called wavefunction collapse or state collapse.
Creating Superposition
The most common way to create superposition is with the Hadamard gate:
This takes a qubit in state and puts it in an equal superposition.
Multi-Qubit Superposition
With qubits, you can create superposition over states:
For example, 3 qubits can be in superposition over 8 states (000, 001, 010, 011, 100, 101, 110, 111) simultaneously.
This is often called quantum parallelism, but be careful! You can’t simply “read out” all values. Measurement gives you just one result.
Why It Matters
Superposition is essential for:
- Quantum parallelism: Processing multiple possibilities simultaneously
- Quantum interference: Making wrong answers cancel out (see Interference)
- Quantum speedups: Algorithms like Grover’s exploit superposition
Common Misconception
Superposition ≠ randomness. A qubit in state is not in superposition. It will definitely measure as 0. A qubit in superposition has specific amplitudes that determine measurement probabilities and can interfere with other amplitudes.
See also: Qubit, Hadamard Gate, Measurement, Quantum Parallelism
Entanglement
A quantum correlation between particles where the state of one instantly relates to the state of another, regardless of distance.
Entanglement is one of the most profound features of quantum mechanics. When particles become entangled, their quantum states become correlated in ways that have no classical explanation. Einstein famously called it “spooky action at a distance.”
The Basic Idea
Consider two qubits in this state (a Bell state):
This state says: “Both qubits are in superposition, but they’re perfectly correlated.”
- Measure the first qubit as 0 → the second qubit is definitely 0
- Measure the first qubit as 1 → the second qubit is definitely 1
The correlation is instant and works regardless of how far apart the qubits are separated.
What Entanglement Is NOT
- NOT faster-than-light communication: You can’t send information using entanglement alone. The measurement results are random, and you can’t control what you get.
- NOT the same as classical correlation: If I put one red ball and one blue ball in separate boxes and ship them apart, opening one tells me the other’s color. But quantum entanglement is different. Bell’s theorem proves this mathematically.
Creating Entanglement
The standard way to entangle two qubits:
Types of Entangled States
Bell States (2 qubits):
GHZ State (3+ qubits):
W State (3 qubits):
Why It Matters
Entanglement is a resource for quantum computing and communication:
| Application | How Entanglement Helps |
|---|---|
| Quantum teleportation | Transfer quantum states using entanglement + classical bits |
| Superdense coding | Send 2 classical bits using 1 qubit + entanglement |
| Quantum key distribution | Detect eavesdroppers via entanglement correlations |
| Quantum algorithms | Create correlations that enable speedups |
| Quantum error correction | Spread information across entangled qubits |
Measuring Entanglement
How do you know if a state is entangled? A pure state of two systems is entangled if it cannot be written as a product state . For mixed states, various entanglement measures exist (concurrence, negativity, entanglement entropy).
See also: Bell State, Bell Inequality, Quantum Teleportation, CNOT Gate
Quantum State
The complete mathematical description of a quantum system, containing all information needed to predict measurement outcomes.
A quantum state is the mathematical object that fully describes a quantum system. It encodes everything you can know about the system and determines the probabilities of all possible measurement outcomes.
Pure States
The simplest quantum states are pure states, represented as vectors in Hilbert space using bra-ket notation:
A pure state represents a system with no classical uncertainty. Any uncertainty is purely quantum mechanical (superposition).
Properties of Pure States
- Represented by a vector (a “ket”)
- Normalized:
- Can be visualized on the Bloch sphere (for single qubits)
Mixed States
When there is classical uncertainty (e.g., the system might be in state with probability or with probability ), we use mixed states represented by density matrices:
Mixed states arise from:
- Classical uncertainty about preparation
- Decoherence (interaction with environment)
- Tracing out part of an entangled system
State Space
For a single qubit, the state space is 2-dimensional. For qubits, the state space is -dimensional. This exponential growth is both the promise and challenge of quantum computing:
| Qubits | State Space Dimension |
|---|---|
| 1 | 2 |
| 2 | 4 |
| 10 | 1,024 |
| 50 | ~10^15 |
| 100 | ~10^30 |
Common States
Single-qubit basis states:
- and : computational basis
- and : Hadamard basis
Multi-qubit states:
- : 2-qubit computational basis
- Bell states: maximally entangled 2-qubit states
State Evolution
Quantum states evolve in two ways:
-
Unitary evolution: Applying quantum gates
-
Measurement: Collapsing to an eigenstate
Describing States
Multiple equivalent ways to describe quantum states:
| Representation | Use Case |
|---|---|
| State vector | Pure states |
| Density matrix | Pure or mixed states |
| Bloch vector | Single-qubit visualization |
| Wavefunction | Position representation |
See also: Pure State, Mixed State, Density Matrix, Bloch Sphere, Hilbert Space
Bloch Sphere
A geometric representation of a single qubit’s state as a point on (or inside) a unit sphere.
The Bloch sphere is the standard way to visualize single-qubit states. Every pure state of a qubit corresponds to a unique point on the surface of a unit sphere, making it invaluable for building intuition about quantum operations.
The Geometry
A general single-qubit pure state can be written as:
where:
- (theta): angle from the north pole (0 to π)
- (phi): azimuthal angle around the equator (0 to 2π)
These angles define a point on the sphere:
- North pole ():
- South pole ():
- Equator (): Equal superposition states like , , ,
Key Points on the Sphere
| State | Position | Coordinates |
|---|---|---|
| North pole | (0, 0, 1) | |
| South pole | (0, 0, -1) | |
| +X axis | (1, 0, 0) | |
| -X axis | (-1, 0, 0) | |
| +Y axis | (0, 1, 0) | |
| -Y axis | (0, -1, 0) |
Gates as Rotations
Single-qubit gates correspond to rotations on the Bloch sphere:
- Pauli X: 180° rotation around X-axis (bit flip: )
- Pauli Y: 180° rotation around Y-axis
- Pauli Z: 180° rotation around Z-axis (phase flip)
- Hadamard: 180° rotation around the axis halfway between X and Z
- Phase gates: Rotations around Z-axis by various angles
Any single-qubit gate is a rotation on the Bloch sphere, and any rotation can be decomposed into rotations around X, Y, and Z axes.
Mixed States
For mixed states, points lie inside the sphere:
- Pure states: surface of the sphere (radius = 1)
- Mixed states: inside the sphere (radius < 1)
- Maximally mixed state (): center of the sphere
The radius indicates the “purity” of the state.
Limitations
The Bloch sphere only works for single qubits. For multiple qubits, the state space is too high-dimensional to visualize this way. There’s no simple “Bloch sphere” for 2 or more qubits.
Why It Matters
The Bloch sphere is essential for:
- Building intuition about qubit states and gates
- Visualizing quantum operations
- Understanding errors (how states drift on the sphere)
- Teaching quantum computing concepts
See also: Qubit, Quantum State, Pauli Gates, Mixed State
Measurement
The process of extracting classical information from a quantum system, which fundamentally disturbs the quantum state.
Measurement is how we get information out of a quantum computer. It’s also one of the most counterintuitive aspects of quantum mechanics: measuring a quantum system fundamentally changes it.
The Measurement Process
When you measure a qubit in the computational basis:
- Before: Qubit is in state
- Measurement: You observe either 0 or 1
- After: Qubit “collapses” to the observed state ( or )
The probabilities are given by the Born rule:
- Probability of 0:
- Probability of 1:
Key Properties
Probabilistic
Even if you know the exact quantum state, you can only predict measurement probabilities, not definite outcomes (unless the state is already an eigenstate of the measurement).
Irreversible
Measurement destroys the superposition. You cannot “undo” a measurement to recover the original state.
Basis-Dependent
You can measure in different bases:
- Computational basis (Z): Measures vs
- Hadamard basis (X): Measures vs
- Y basis: Measures vs
The same state gives different results in different bases.
Types of Measurement
Projective Measurement
The standard quantum measurement, described by projection operators. For computational basis:
POVM (Positive Operator-Valued Measure)
A generalization that allows for more measurement outcomes than basis states. Used in quantum information theory and quantum cryptography.
Weak Measurement
Partial measurement that disturbs the state less but provides less information. Useful for studying quantum systems without fully collapsing them.
Mid-Circuit Measurement
Modern quantum computers support measuring qubits in the middle of a circuit (not just at the end). This enables:
- Classical feedforward: Conditioning later operations on measurement results
- Quantum error correction: Measuring syndromes without destroying logical information
- Repeat-until-success protocols: Retrying until desired outcome occurs
Measurement in Practice
In real quantum hardware, measurement is often the slowest and noisiest operation:
- Superconducting qubits: ~1 μs readout time
- Trapped ions: ~100 μs readout time
Measurement errors (misreading 0 as 1 or vice versa) are a significant source of noise.
Why It Matters
- Measurement is how we extract answers from quantum computations
- The measurement problem is at the heart of quantum mechanics interpretation debates
- Understanding measurement is important for designing algorithms and error correction
See also: Born Rule, Quantum State, Superposition, Quantum Circuit
Born Rule
The fundamental rule that connects quantum amplitudes to measurement probabilities: probability equals amplitude squared.
The Born rule is the bridge between the abstract mathematics of quantum mechanics and experimental observations. It tells us how to calculate the probability of getting a particular measurement outcome.
The Rule
For a quantum state , the probability of measuring outcome is:
In other words: probability = |amplitude|²
Example
Consider a qubit in state:
The measurement probabilities are:
Note that probabilities sum to 1 (which is why we need the normalization condition).
Why Squared?
The Born rule is a postulate of quantum mechanics. It’s not derived from deeper principles. Some interpretations (like many-worlds) attempt to derive it, but we accept it because it matches experimental results with extraordinary precision.
The squaring is key:
- Amplitudes can be negative or complex
- Probabilities must be non-negative
- The absolute value squared ensures non-negative probabilities
For Density Matrices
For mixed states described by density matrix :
Why It Matters
The Born rule is:
- The only way to connect quantum theory to experiment
- Why quantum amplitudes interfering can affect measurement outcomes
- Fundamental to understanding why quantum algorithms work
See also: Measurement, Quantum State, Superposition
Bra-Ket Notation
The standard mathematical notation for quantum states, invented by Dirac, using angle brackets and vertical bars.
Bra-ket notation (also called Dirac notation) is the standard language for writing quantum states and operations. Once you learn it, quantum mechanics becomes much easier to read and write.
The Basics
Kets |⟩
A ket represents a quantum state (a column vector):
You can put any label inside: , , , , , etc.
Bras ⟨|
A bra is the conjugate transpose of a ket (a row vector):
where is the complex conjugate of .
Operations
Inner Product (Bra-Ket)
Combining a bra and a ket gives a number:
This is also called a bracket (bra + ket = bracket).
For computational basis states:
Outer Product (Ket-Bra)
Combining a ket and a bra gives an operator (matrix):
Common Notation
| Notation | Meaning |
|---|---|
| Quantum state (ket) | |
| Conjugate transpose (bra) | |
| Inner product | |
| Outer product (operator) | |
| Matrix element of operator A | |
| Operator A applied to state |
Multi-Qubit States
For multiple qubits, we use tensor products:
All three notations mean the same thing. The tensor product symbol is often omitted.
Why This Notation?
- Compact: is shorter than writing column vectors
- Flexible: Works in any dimension, any basis
- Intuitive: Inner products look like what they compute
- Standard: Universal in quantum physics and computing
Pronunciation
- : “ket zero”
- : “bra psi”
- : “bra phi ket psi” or “phi inner psi” or “bracket phi psi”
See also: Quantum State, Hilbert Space, Density Matrix
Density Matrix
A mathematical representation of quantum states that can describe both pure and mixed states, essential for open quantum systems and quantum noise.
A density matrix (also called a density operator) is a more general way to describe quantum states than state vectors. It’s essential when dealing with classical uncertainty, entangled subsystems, or noise.
Definition
For a pure state , the density matrix is:
For a mixed state (classical probability distribution over pure states):
where is the probability of being in state .
Example
Pure state :
Mixed state (50% , 50% ):
Note: These are different states! The pure state has off-diagonal elements (coherence), the mixed state doesn’t.
Properties
A valid density matrix must satisfy:
- Hermitian:
- Positive semi-definite: All eigenvalues
- Trace one:
Pure vs Mixed
How to tell if a state is pure or mixed:
| Property | Pure State | Mixed State |
|---|---|---|
| = 1 | < 1 | |
| Rank | 1 | > 1 |
| Can be written as | Yes | No |
| On Bloch sphere | Surface | Interior |
Measurement Probabilities
Using the Born rule with density matrices:
Time Evolution
Density matrices evolve via:
For open systems (with noise), we use quantum channels:
Why It Matters
Density matrices are essential for:
- Describing noise and decoherence: Real quantum systems interact with their environment
- Partial traces: Describing part of an entangled system
- Quantum error correction: Tracking how errors affect states
- Quantum information measures: Entropy, fidelity, trace distance
See also: Pure State, Mixed State, Quantum Channel
Pure State
A quantum state with no classical uncertainty. The most complete description of a quantum system.
A pure state represents a quantum system about which we have maximal knowledge. All uncertainty in a pure state is fundamentally quantum mechanical (superposition), not classical.
Definition
A pure state can be written as a single state vector:
Or equivalently, as a rank-1 density matrix:
Examples
- : a definite computational basis state
- : a superposition, but still pure
- Bell states: entangled but pure
Characteristics
| Property | Value for Pure States |
|---|---|
| Purity | 1 |
| Von Neumann entropy | 0 |
| Bloch sphere (1 qubit) | On the surface |
| Density matrix rank | 1 |
Pure ≠ Definite
A common misconception: pure state does not mean the measurement outcome is certain.
is a pure state, but measuring it in the computational basis gives 0 or 1 with 50% probability each. The state is “pure” because there’s no additional classical uncertainty. We know the exact quantum state.
When Pure States Become Mixed
Pure states can become mixed states through:
- Decoherence: Interaction with the environment
- Partial trace: Looking at only part of an entangled system
- Incomplete knowledge: Not knowing which state was prepared
See also: Mixed State, Density Matrix, Quantum State
Mixed State
A quantum state with classical uncertainty, a statistical mixture of pure states.
A mixed state describes a quantum system where we don’t have complete information. It’s a probabilistic combination of pure states, representing classical uncertainty on top of quantum uncertainty.
Definition
A mixed state cannot be written as a single state vector. It’s represented by a density matrix:
where are classical probabilities (summing to 1) and are pure states.
Example: The Maximally Mixed State
The simplest mixed state for a qubit:
This represents “no information at all” - maximum classical uncertainty.
Mixed ≠ Superposition
This is important to understand:
| Superposition (Pure) | Mixture (Mixed) | |
|---|---|---|
| State | 50% + 50% | |
| Density matrix | ||
| Off-diagonal terms | Non-zero (coherence) | Zero (no coherence) |
| Can interfere | Yes | No |
The off-diagonal elements (“coherences”) are what distinguishes quantum superposition from classical probability.
How Mixed States Arise
- Incomplete preparation: You prepare or but forget which
- Decoherence: Environment interaction destroys coherence
- Partial trace: Taking part of an entangled system
Example: Entanglement and Mixed States
If two qubits are in Bell state and you only have access to one qubit:
Your qubit looks maximally mixed, even though the total system is pure!
Characteristics
| Property | Pure | Mixed |
|---|---|---|
| = 1 | < 1 | |
| Von Neumann entropy | 0 | > 0 |
| Bloch sphere (1 qubit) | Surface | Interior |
Why It Matters
Mixed states are essential for:
- Describing realistic quantum systems (always some noise)
- Modeling decoherence
- Quantum error correction
- Quantum thermodynamics
See also: Pure State, Density Matrix, Decoherence
Hilbert Space
The mathematical space where quantum states live: a complete complex vector space with an inner product.
A Hilbert space is the mathematical arena for quantum mechanics. Every quantum state is a vector in a Hilbert space, and quantum operations are linear transformations on this space.
The Basics
For quantum computing purposes, think of a Hilbert space as:
- A complex vector space (vectors have complex number components)
- Equipped with an inner product
- Complete (no “holes” or missing points)
Dimension
The dimension of the Hilbert space determines how many basis states exist:
| System | Dimension | Basis States |
|---|---|---|
| 1 qubit | 2 | |
| 2 qubits | 4 | |
| n qubits | All -bit strings | |
| Harmonic oscillator |
The exponential growth () is both the power and the challenge of quantum computing.
Key Properties
Inner Product
For any two states and :
Properties:
- (and equals zero only if )
- (conjugate symmetry)
Orthonormality
Basis states are orthonormal:
Normalization
Physical quantum states have unit norm:
Tensor Products
When combining quantum systems, Hilbert spaces combine via tensor products:
Dimension multiplies: if has dimension and has dimension , then has dimension .
For Working Quantum Scientists
In practice, you usually don’t need to think deeply about Hilbert space theory. Just know:
- States are vectors:
- Operators are matrices:
- Inner products give probabilities:
- Dimension grows exponentially with qubit count
Infinite-Dimensional Hilbert Spaces
Continuous-variable quantum computing and quantum field theory use infinite-dimensional Hilbert spaces. These require more mathematical care but the basic ideas remain similar.
See also: Quantum State, Bra-Ket Notation, Qubit
Quantum Gate
A basic operation on qubits, the quantum equivalent of classical logic gates.
A quantum gate is a basic operation that transforms quantum states. Just as classical computers use AND, OR, and NOT gates, quantum computers use quantum gates to perform computations.
Key Properties
Unitary
Every quantum gate is represented by a unitary matrix :
This ensures:
- Reversibility (every gate has an inverse: )
- Preservation of probability (states stay normalized)
Reversible
Unlike classical gates (AND, OR destroy information), quantum gates are always reversible. Given the output, you can recover the input.
Common Single-Qubit Gates
| Gate | Matrix | Effect |
|---|---|---|
| Pauli X | Bit flip | |
| Pauli Y | Bit + phase flip | |
| Pauli Z | Phase flip | |
| Hadamard (H) | Creates superposition | |
| Phase (S) | π/2 phase | |
| T Gate | π/4 phase |
Common Multi-Qubit Gates
| Gate | Qubits | Effect |
|---|---|---|
| CNOT | 2 | Controlled NOT (entangling) |
| CZ | 2 | Controlled Z |
| SWAP | 2 | Exchanges two qubits |
| Toffoli | 3 | Controlled-controlled NOT |
Gate Application
Applying gate to state :
For density matrices:
Rotation Gates
Single-qubit gates can be parameterized as rotations:
Any single-qubit gate can be decomposed into rotations:
Gate Sets
A universal gate set can approximate any quantum operation:
- {H, T, CNOT}: standard universal set
- {H, Toffoli}: also universal
Physical Implementation
Gates are implemented differently on different hardware:
- Superconducting qubits: Microwave pulses
- Trapped ions: Laser pulses
- Photonic: Beam splitters, phase shifters
Gate times and error rates are key performance metrics. Fidelity measures how close a real gate is to the ideal operation.
See also: Quantum Circuit, Pauli Gates, Hadamard Gate, CNOT Gate, Universal Gate Set
Pauli Gates
The three fundamental single-qubit gates (X, Y, Z) that form the building blocks of quantum operations.
The Pauli gates (also called Pauli matrices or Pauli operators) are three fundamental single-qubit operations named after physicist Wolfgang Pauli. They’re ubiquitous in quantum computing.
The Three Gates
Pauli X (Bit Flip)
- Swaps
- Quantum analog of classical NOT
- 180° rotation around X-axis on Bloch sphere
Pauli Y
- Combined bit and phase flip
- 180° rotation around Y-axis
Pauli Z (Phase Flip)
- Leaves unchanged, flips sign of
- 180° rotation around Z-axis
Key Properties
Self-Inverse
Each Pauli gate is its own inverse:
Anti-Commutation
Paulis anti-commute with each other:
Hermitian
All Paulis are Hermitian (), meaning they’re also valid observables (measurement operators).
Eigenvalues
Each Pauli has eigenvalues +1 and -1:
- X eigenstates:
- Y eigenstates:
- Z eigenstates:
Pauli Group
The Pauli group consists of all products of Paulis with phases :
For qubits, Pauli strings are tensor products like .
Why They Matter
Paulis are fundamental because:
- They form a basis for all 2×2 matrices
- Quantum error correction describes errors as Pauli operations
- Pauli decomposition expresses Hamiltonians in terms of Paulis
- Measurements are often in Pauli bases (X, Y, or Z)
See also: Quantum Gate, Bloch Sphere, Hadamard Gate
Hadamard Gate
The gateway to superposition, transforms basis states into equal superpositions.
The Hadamard gate (H gate) is perhaps the most important single-qubit gate. It creates superposition from definite states and is the starting point for most quantum algorithms.
Definition
Action on Basis States
The Hadamard creates an equal superposition with 50/50 measurement probabilities.
Key Properties
Self-Inverse
Applying Hadamard twice returns to the original state.
Basis Change
Hadamard transforms between two important bases:
- Computational basis: (Z eigenstates)
- Hadamard basis: (X eigenstates)
Relation to Paulis
Also: and
Bloch Sphere
Hadamard is a 180° rotation around the axis halfway between X and Z.
Hadamard on Multiple Qubits
Applying H to all qubits creates a uniform superposition over all states:
This is the starting point for many quantum algorithms (Grover’s, Shor’s, etc.).
Walsh-Hadamard Transform
The -qubit Hadamard operation:
where is the bitwise inner product. This is the quantum Walsh-Hadamard transform.
In Quantum Circuits
The Hadamard is typically drawn as a box with “H”:
┌───┐
|0⟩──┤ H ├──|+⟩
└───┘
Why It’s Important
Almost every quantum algorithm starts with Hadamards:
- Initialize qubits in
- Apply Hadamard to create superposition
- Perform computation
- Extract answer
Without Hadamard, there’s no superposition. Without superposition, there’s no quantum advantage.
See also: Superposition, Quantum Gate, Pauli Gates, Quantum Algorithm
CNOT Gate
The standard two-qubit entangling gate. Flips the target qubit if and only if the control qubit is |1>.
The CNOT (Controlled-NOT) gate is the most important two-qubit gate in quantum computing. It’s essential for creating entanglement and is part of every universal gate set.
Definition
The CNOT operates on two qubits: a control and a target.
Action
If control is : target unchanged If control is : target flipped (X gate applied)
| Input | Output |
|---|---|
Shorthand: where is XOR.
Circuit Symbol
Control: ──●──
│
Target: ──⊕──
The dot (●) marks the control; the circle-plus (⊕) marks the target.
Creating Entanglement
CNOT is the standard way to create entangled states:
|0⟩ ──H────●──── → |Φ+⟩ = (|00⟩ + |11⟩)/√2
│
|0⟩ ───────⊕────
- Start:
- After H:
- After CNOT:
This is a Bell state, maximally entangled!
Properties
Self-Inverse
Relation to Other Gates
Can be written as controlled-X:
Basis Changes
With Hadamards, control and target can be swapped:
Physical Implementation
CNOT is a native gate on some platforms:
- Superconducting: Cross-resonance or iSWAP-based
- Trapped ions: Mølmer-Sørensen or XX gates
- Photonic: Requires non-linearities or measurement
CNOT fidelity is a key benchmark for quantum hardware.
Universal Computation
CNOT + single-qubit gates = universal quantum computing. Any quantum operation can be decomposed into CNOTs and single-qubit rotations.
See also: Entanglement, Quantum Gate, Bell State, Universal Gate Set, Toffoli Gate
Toffoli Gate
A three-qubit gate that flips the target only when both control qubits are |1>. Also known as the quantum AND gate.
The Toffoli gate (also called CCNOT or Controlled-Controlled-NOT) is a three-qubit gate that’s universal for classical reversible computation and important for quantum algorithms.
Definition
Two control qubits, one target qubit:
The target flips only when both controls are .
| Input | Output |
|---|---|
Circuit Symbol
Control 1: ──●──
│
Control 2: ──●──
│
Target: ──⊕──
Classical Reversible Computing
The Toffoli gate is universal for classical reversible computation:
- AND: Set target to , result is
- NOT: Set both controls to
- FANOUT: Can copy classical bits
Any classical circuit can be made reversible using Toffoli gates (with ancilla bits).
Quantum Universality
Toffoli + Hadamard is universal for quantum computing. However, Toffoli alone (without superposition-creating gates) cannot perform universal quantum computation.
Decomposition
A Toffoli can be decomposed into simpler gates:
──●────●────────●────●────●──
│ │ │ │ │
──●────┼────●───┼────●────┼──
│ │ │ │ │ │
──┼──T─X─T†─X─T─X─T†─X────┼──
This uses ~6 CNOT gates and several T gates, making it expensive on near-term hardware.
Applications
- Quantum arithmetic: Addition, multiplication circuits
- Grover’s oracle: Marking solutions in search
- Reversible classical subroutines: Embedding classical functions in quantum algorithms
- Quantum error correction: Syndrome extraction
Generalization
- Multi-controlled NOT (MCX): control qubits, 1 target
- Decomposition cost grows with number of controls
See also: CNOT Gate, Quantum Gate, Universal Gate Set, T Gate
Phase Gate
Gates that add a phase to the |1⟩ state while leaving |0⟩ unchanged.
Phase gates are a family of single-qubit gates that modify the relative phase between and without changing measurement probabilities in the computational basis.
General Form
Action: ,
Common Phase Gates
S Gate (Phase Gate, √Z)
- Quarter turn around Z-axis on Bloch sphere
- Part of Clifford group
S† (S-dagger)
Inverse of S gate.
T Gate (π/8 Gate, √S)
- Eighth turn around Z-axis
- NOT in Clifford group (makes it powerful)
- See T Gate for more
Z Gate
Actually a Pauli gate, but also a phase gate with .
Controlled Phase Gates
CZ (Controlled-Z)
Applies Z to target when control is . Symmetric: control and target are interchangeable!
CP (Controlled-Phase)
Adds phase only to state.
On the Bloch Sphere
Phase gates rotate around the Z-axis:
- rotates by angle around Z
- Only affects superposition states (states on the equator)
- Pure or states appear unchanged
Why Phase Matters
You might wonder: if phases don’t affect measurement probabilities, why care?
Phases matter because of interference. When paths recombine (through gates like Hadamard), phases determine whether amplitudes add or cancel:
The phase flip changed the final measurement outcome!
See also: T Gate, Pauli Gates, Quantum Gate, Bloch Sphere
T Gate
The “magic” gate that enables universal quantum computation when combined with Clifford gates.
The T gate (also called the π/8 gate) is a single-qubit phase gate needed for universal quantum computation.
Definition
Action: ,
The name “π/8 gate” comes from writing where the global phase is π/8.
Why T is Special
Non-Clifford
The Clifford gates (H, S, CNOT, and combinations) can be efficiently simulated classically. Adding the T gate makes the gate set universal and computationally powerful.
Magic States
T gates can be implemented using “magic states” and Clifford operations:
This is important for fault-tolerant quantum computing.
T Gate Count
In fault-tolerant quantum computing, T gates are typically the most expensive operation (requiring complex state distillation). Algorithm efficiency is often measured in T-count: the number of T gates required.
| Operation | Approximate T-count |
|---|---|
| Toffoli | ~7 |
| Controlled rotation | ~10-50 |
| Quantum arithmetic | Varies widely |
Properties
T† (T-dagger) is the inverse:
Bloch Sphere
T is a π/4 (45°) rotation around the Z-axis, an eighth of a full rotation.
In Practice
T gates appear throughout quantum algorithms:
- Toffoli gate decompositions
- Arbitrary rotation synthesis
- Quantum arithmetic circuits
- Phase kickback in phase estimation
See also: Phase Gate, Universal Gate Set, Fault-Tolerant Quantum Computing, Toffoli Gate
SWAP Gate
Exchanges the states of two qubits.
The SWAP gate does exactly what its name suggests: it swaps the quantum states of two qubits.
Definition
Action:
| Input | Output |
|---|---|
Circuit Symbol
──✕──
│
──✕──
Or sometimes with crossing lines.
Decomposition
SWAP can be built from three CNOTs:
──●────⊕────●──
│ │ │
──⊕────●────⊕──
This is the standard decomposition used when SWAP isn’t a native gate.
Variants
√SWAP (Square Root of SWAP)
An entangling gate sometimes native to certain hardware.
iSWAP
Swaps states and adds a phase. Native gate on some superconducting processors (Google Sycamore).
CSWAP (Fredkin Gate)
Controlled-SWAP: swaps two qubits only when control is .
Why It Matters
Connectivity
Many quantum computers have limited qubit connectivity (not all pairs can interact directly). SWAP gates route quantum information:
Before: q0 ─ q1 ─ q2 ─ q3 (linear connectivity)
To interact q0 with q3:
1. SWAP q0, q1
2. SWAP q1, q2
3. Now original q0 state is next to q3
Circuit Compilation
Mapping logical circuits to physical hardware often requires inserting many SWAP gates, increasing circuit depth and errors.
SWAP Test
A circuit for estimating state overlap:
|0⟩ ──H──●──H──M
│
|ψ⟩ ─────✕─────
│
|φ⟩ ─────✕─────
Probability of measuring 0 is .
See also: CNOT Gate, Quantum Gate, Circuit Depth
Universal Gate Set
A set of quantum gates that can approximate any quantum operation to arbitrary precision.
A universal gate set is a collection of quantum gates from which any possible quantum computation can be constructed. This is analogous to how AND, OR, and NOT can build any classical Boolean circuit.
The Key Theorem
Solovay-Kitaev Theorem: Any single-qubit gate can be approximated to precision using gates from a universal set (where ).
This means we don’t need infinitely many gates. A small finite set suffices.
Common Universal Gate Sets
The most commonly cited universal set:
- Hadamard (H): Creates superposition
- T gate: Provides the “magic” (non-Clifford) element
- CNOT: Entangles qubits
Any quantum algorithm can be compiled into these three gates.
Alternative universal set:
Continuous Gate Sets
For error-free simulation, continuous rotations suffice:
- for any
- Any two-qubit entangling gate + arbitrary single-qubit rotations
Clifford Gates (NOT Universal)
The Clifford group is generated by:
- H (Hadamard)
- S (Phase gate)
- CNOT
Clifford circuits can be simulated efficiently on classical computers (Gottesman-Knill theorem). They become universal only when supplemented with a non-Clifford gate like T.
Why Universality Matters
- Hardware-agnostic algorithms: Write algorithms once, compile to any gate set
- Error correction: Fault-tolerant schemes implement universal sets
- Equivalence: All universal quantum computers are computationally equivalent
Gate Synthesis
Converting arbitrary operations to gates from a universal set:
| Target | Compilation Approach |
|---|---|
| Single-qubit unitary | Solovay-Kitaev algorithm |
| Multi-qubit unitary | Decomposition into CNOT + single-qubit |
| Controlled operations | Standard constructions |
Native Gate Sets
Different hardware has different native gates:
| Platform | Typical Native Gates |
|---|---|
| Superconducting (IBM) | √X, CNOT, R_z |
| Superconducting (Google) | √iSWAP, Phased XZ |
| Trapped Ion | XX, arbitrary single-qubit |
| Photonic | Beam splitters, phase shifters |
Compilers translate circuits to native gate sets.
See also: Quantum Gate, T Gate, CNOT Gate, Fault Tolerance
Quantum Circuit
A sequence of quantum gates applied to qubits, representing a quantum computation.
A quantum circuit is the standard model for describing quantum computations. It shows qubits as horizontal lines (wires) and gates as boxes or symbols applied to those wires.
Structure
┌───┐ ┌───┐
q0: ─┤ H ├──●──┤ X ├─ M
└───┘ │ └───┘
│
q1: ────────⊕──────── M
Components:
- Wires: Horizontal lines representing qubits (time flows left to right)
- Gates: Boxes/symbols representing quantum operations
- Measurements: Usually at the end, marked with M or meter symbol
Reading a Circuit
- Start with initial states (usually for each qubit)
- Apply gates from left to right
- Gates on different wires at the same horizontal position happen simultaneously
- Measure at the end to get classical output
Circuit Metrics
Width
Number of qubits used.
Depth
See Circuit Depth for more details on time steps (layers of parallel gates).
Gate Count
Total number of gates, often broken down by type (single-qubit, two-qubit, T-gates).
Example: Bell State Preparation
┌───┐
q0: ─┤ H ├──●──
└───┘ │
│
q1: ────────⊕──
- Start:
- H on q0:
- CNOT:
Circuit Identities
Gates can often be simplified:
- (Hadamard is self-inverse)
- , ,
- Adjacent CNOTs cancel
- ,
Optimizers use these to reduce circuit complexity.
Subcircuits and Oracles
Complex operations are often drawn as single boxes:
┌─────────┐
q: ──┤ ├──
│ U │
q: ──┤ ├──
│ │
q: ──┤ ├──
└─────────┘
This abstracts away internal details.
Barriers
Vertical lines that prevent optimization across them:
q0: ──H──|──X──
|
q1: ──X──|──H──
Useful for separating distinct algorithm phases.
Classical Control
Modern circuits support mid-circuit measurement and classical feedback:
q0: ──H──M─────
║
╠══╗
q1: ─────║──X── (X if measurement = 1)
Double lines represent classical bits; gates conditioned on classical values.
See also: Quantum Gate, Circuit Depth, Quantum Algorithm, SWAP Gate
Circuit Depth
The number of sequential time steps in a quantum circuit. A key metric for NISQ-era computation.
Circuit depth measures how many layers of gates must be applied sequentially. It’s one of the most important metrics for determining whether a circuit can run on real hardware.
Definition
Depth is the longest path through the circuit, counting layers of gates that cannot be parallelized:
Layer: 1 2 3 4
│ │ │ │
q0: ──H──┼────●────┼────X──
│ │ │ │
q1: ──H──●────┼────X────┼──
│ │ │ │
q2: ─────⊕────⊕────H────M──
This circuit has depth 4.
Why Depth Matters
Decoherence
Qubits lose their quantum properties over time (T1, T2 times). Deeper circuits mean more time for errors to accumulate.
Rule of thumb: Circuit depth should be much less than / gate time.
Error Accumulation
Each gate has some error probability. Errors compound:
- 100 gates at 99.9% fidelity each: ~90% overall fidelity
- 1000 gates at 99.9% fidelity each: ~37% overall fidelity
NISQ Limitations
NISQ devices can typically run circuits with depth ~100-1000 before noise overwhelms the signal. Fault-tolerant systems will enable much deeper circuits.
Depth vs. Width Trade-offs
Sometimes you can trade depth for width (more qubits):
| Approach | Depth | Width |
|---|---|---|
| Sequential | High | Low |
| Parallel | Low | High |
Example: Computing
- Sequential: Depth 4, Width 1
- Parallel tree: Depth 2, Width 4
Reducing Depth
Techniques for shallower circuits:
- Parallelization: Run independent gates simultaneously
- Gate cancellation: Remove redundant gate pairs
- Approximate compilation: Trade accuracy for depth
- Algorithmic redesign: Use algorithms with inherently lower depth
Two-Qubit Gate Depth
Often, two-qubit gate depth is more relevant than total depth, since two-qubit gates are typically slower and noisier:
1Q gates: Fast, high fidelity (~99.9%)
2Q gates: Slower, lower fidelity (~99-99.9%)
Reporting Depth
When comparing algorithms or hardware, always clarify:
- Total depth vs. two-qubit depth
- Native gate set used
- Whether optimization was applied
See also: Quantum Circuit, NISQ, Decoherence, T2 Time
Quantum Parallelism
The ability of quantum computers to process multiple inputs simultaneously through superposition.
Quantum parallelism refers to a quantum computer’s ability to evaluate a function on many inputs at once by exploiting superposition.
The Basic Idea
Classically, to evaluate on inputs, you need evaluations.
Quantumly, you can create a superposition of all inputs and evaluate once:
Apply to superposition:
One quantum operation, function evaluations encoded in the state!
Example: 3 Qubits
With 3 input qubits in superposition:
All 8 inputs ( through ) exist simultaneously.
The Catch
Here’s the critical limitation: you can’t read all the answers.
Measurement gives you ONE random result. The superposition collapses.
Before measurement: |f(0)⟩ + |f(1)⟩ + |f(2)⟩ + ... (all answers)
After measurement: |f(k)⟩ (one random answer)
How Quantum Algorithms Use It
Quantum algorithms don’t just compute all answers. They use interference to extract useful information:
Deutsch-Josza
Determine if function is constant or balanced in ONE query (classically needs ~N/2).
Grover’s Search
Find the marked item in queries instead of .
Shor’s Factoring
Use parallelism + QFT to find periodicity, enabling factoring.
The Pattern
- Create superposition over all inputs
- Evaluate function (quantum parallelism)
- Apply interference (constructive for answers, destructive for non-answers)
- Measure to extract the useful result
Common Misconception
Wrong: “Quantum computers try all solutions and pick the right one”
Right: Quantum computers use interference to make correct answers more probable. Designing this interference is the hard part, which is why we have only a handful of useful quantum algorithms.
Exponential State Space
With qubits:
- basis states can be in superposition
- But only qubits of information can be extracted (Holevo bound)
The challenge is designing algorithms that concentrate useful information into measurable outcomes.
See also: Superposition, Quantum Algorithm, Grover’s Algorithm
Quantum Algorithm
A step-by-step procedure for solving a problem using quantum computation, often providing speedup over classical algorithms.
A quantum algorithm is a procedure designed to run on a quantum computer. The best quantum algorithms exploit superposition, entanglement, and interference to solve problems faster than any known classical algorithm.
Anatomy of a Quantum Algorithm
Most quantum algorithms follow this pattern:
1. Initialize: Prepare qubits in |0⟩
2. Superpose: Create superposition (usually with Hadamards)
3. Compute: Apply problem-specific transformations
4. Interfere: Make correct answers constructive, wrong answers destructive
5. Measure: Extract the answer
The art is in step 4: designing interference patterns that amplify correct solutions.
Major Quantum Algorithms
Exponential Speedups
| Algorithm | Problem | Speedup |
|---|---|---|
| Shor’s | Integer factoring | Exponential |
| HHL | Linear systems | Exponential* |
| Quantum simulation | Simulating quantum systems | Exponential |
*With caveats about input/output
Polynomial Speedups
| Algorithm | Problem | Speedup |
|---|---|---|
| Grover’s | Unstructured search | Quadratic |
| Quantum walks | Graph problems | Varies |
Near-Term Algorithms
What Makes Algorithms Quantum?
A quantum algorithm must use genuinely quantum resources:
- Superposition: Process multiple states simultaneously
- Entanglement: Create correlations impossible classically
- Interference: Combine amplitudes to concentrate probability
Algorithms that don’t use these don’t provide quantum advantage.
Complexity Classes
| Class | Description | Example Problems |
|---|---|---|
| BQP | Efficiently solvable by quantum computers | Factoring, simulation |
| QMA | Quantum analog of NP | Ground state energy |
The Landscape
All Problems
│
┌──────────────┼──────────────┐
│ │ │
Classically Quantum Intractable
Efficient Advantage for Both
(P, BPP) (BQP) (?)
│ │
Sorting, Factoring,
Search Simulation
Why So Few Algorithms?
Designing quantum algorithms is hard. We can’t just “quantize” classical algorithms. Each requires:
- Finding structure in the problem
- Designing interference to exploit that structure
- Proving the speedup exists
New quantum algorithms are rare discoveries, celebrated by the community.
See also: Shor’s Algorithm, Grover’s Algorithm, Quantum Speedup, Quantum Parallelism
Shor’s Algorithm
The quantum algorithm that factors integers exponentially faster than any known classical algorithm, threatening RSA encryption.
Shor’s algorithm, discovered by Peter Shor in 1994, efficiently factors large integers. This is devastating for RSA and similar cryptosystems that rely on factoring being hard.
The Impact
Classical factoring of an -bit number: (best known) Quantum factoring with Shor’s: or better
For a 2048-bit RSA key:
- Classical: Millions of years
- Quantum: Hours to days (with a large fault-tolerant quantum computer)
How It Works
Shor’s algorithm has two main parts:
1. Classical Reduction
Factoring is reduced to period finding:
- Pick random (the number to factor)
- Find the period of
- Use to find factors via
2. Quantum Period Finding
This is the quantum part:
- Create superposition over all :
- Compute quantumly:
- Apply Quantum Fourier Transform to first register
- Measure to get information about the period
The QFT causes interference that reveals the period with high probability.
Circuit Overview
|0⟩^n ──H^⊗n──┬─── QFT ── Measure ──→ period info
│
|0⟩^m ────────⊕── (modular exponentiation)
Resource Requirements
To factor an -bit number:
- Qubits: (roughly qubits)
- Gates: (dominated by modular exponentiation)
- T-gates: Many millions for cryptographically relevant sizes
Current Status
| Milestone | Status |
|---|---|
| Factor 15 | Done (2001, with tricks) |
| Factor 21 | Done (2012) |
| Factor 2048-bit | Requires ~4000 logical qubits, millions of physical qubits |
We’re far from breaking real-world RSA. But it’s a matter of engineering, not fundamental obstacles.
Implications
- Cryptographic transition: Moving to post-quantum cryptography
- Security timeline: Data encrypted today could be decrypted later (“harvest now, decrypt later”)
- Motivation for quantum computing: Major driver of quantum research and funding
Variants
- Simplified Shor’s: For specific numbers with known structure
- Quantum resource estimation: Ongoing research to reduce requirements
- Hybrid approaches: Some classical preprocessing
Historical Note
Shor’s algorithm was the “killer app” that launched serious interest in quantum computing. It showed quantum computers could solve a problem of real-world importance exponentially faster.
See also: Quantum Fourier Transform, Quantum Phase Estimation, Post-Quantum Cryptography, Quantum Advantage
Grover’s Algorithm
A quantum search algorithm providing quadratic speedup for finding items in unsorted databases.
Grover’s algorithm (1996) searches an unsorted database of items in queries, compared to classically. It’s one of the foundational quantum algorithms.
The Problem
Given a function that returns 1 for exactly one “marked” item and 0 otherwise, find the marked item.
- Classical: Check items one by one → queries on average
- Quantum (Grover): queries
The Algorithm
Grover’s algorithm repeatedly applies two operations:
1. Oracle
Marks the solution by flipping its sign:
2. Diffusion
Reflects amplitudes about their average (amplitude amplification): where is the uniform superposition.
The Circuit
|0⟩^n ── H^⊗n ──┬── O ── D ──┬── ... ── Measure
│ │
(repeat √N times)
Geometric Intuition
Think of the state as a vector in a 2D plane:
- One axis: the marked state
- Other axis: superposition of unmarked states
Each Grover iteration rotates the state vector toward by angle .
After iterations, the state points at (or very close to) .
Example: N = 4
- 4 items, need to find 1 marked item
- Classical: 2.25 queries on average
- Grover: ~1 iteration (plus setup)
Starting state:
If is marked:
- Oracle:
- Diffusion: (exactly the answer!)
Key Properties
Optimal
Grover’s algorithm is provably optimal. No quantum algorithm can do better than for unstructured search.
Works with Multiple Solutions
If items are marked, the algorithm finds one in queries.
Requires Knowing When to Stop
Over-iterating causes the amplitude to “rotate past” the solution. You need to know approximately how many iterations to run.
Applications
- Database search: Searching unsorted data
- Cryptography: Speed up brute-force attacks (effectively halving key lengths)
- Satisfiability: Search for satisfying assignments
- Amplitude amplification: Generalization used in many algorithms
Practical Considerations
Quadratic speedup is significant but not transformative:
- → queries (meaningful)
- But requires a quantum oracle for , and building this can be expensive
See also: Quantum Algorithm, Quantum Speedup
Quantum Fourier Transform
The quantum version of the discrete Fourier transform, a key subroutine in many quantum algorithms.
The Quantum Fourier Transform (QFT) is a linear transformation on quantum states that’s central to algorithms like Shor’s and quantum phase estimation.
Definition
The QFT maps computational basis states as:
where for qubits.
Matrix Form
For 2 qubits ():
Why It’s Important
Classical FFT: O(N log N)
The Fast Fourier Transform revolutionized signal processing.
Quantum QFT: O(n²) = O(log² N)
Exponentially faster! This speedup is key to Shor’s algorithm.
The Circuit
The QFT has a remarkably simple circuit using only Hadamards and controlled rotations:
|x₀⟩ ──H──R₂──R₃──...──Rₙ──────────────────
│ │ │
|x₁⟩ ─────●───┼───...─┼────H──R₂──...──Rₙ₋₁──
│ │ │ │
|x₂⟩ ─────────●───...─┼────────●───...─┼──────
│ │
... ... ...
│ │
|xₙ⟩ ─────────────────●────────────────●──H──
Plus SWAP gates at the end to reverse bit order.
Gates used:
- Hadamard:
- Controlled rotation:
Inverse QFT
The inverse is simply the conjugate transpose:
Same circuit but with negative rotation angles, run in reverse.
Applications
| Algorithm | How QFT is Used |
|---|---|
| Shor’s Algorithm | Extract period from superposition |
| Phase Estimation | Convert phase to binary representation |
| Quantum counting | Count solutions via phase estimation |
| HHL Algorithm | Part of eigenvalue processing |
Important Caveat
The QFT is fast, but there’s a catch:
- Input: Requires preparing the input state (often expensive)
- Output: Result is in amplitudes (can’t read them all directly)
The QFT is useful when it’s part of a larger algorithm that handles input/output appropriately.
Approximate QFT
For practical purposes, very small rotations ( for large ) can be omitted:
This reduces circuit depth with minimal accuracy loss.
See also: Shor’s Algorithm, Quantum Phase Estimation, Quantum Algorithm
Quantum Phase Estimation
An algorithm to estimate the eigenvalue (phase) of a unitary operator. A key subroutine in many quantum algorithms.
Quantum Phase Estimation (QPE) determines the phase when a unitary acts on its eigenstate: .
The Problem
Given:
- A unitary operator
- An eigenstate (or superposition of eigenstates)
Find: The phase such that
The Circuit
|0⟩ ──H────────●────────────────────QFT†── Measure (θ₀)
│
|0⟩ ──H────────┼────●──────────────QFT†── Measure (θ₁)
│ │
|0⟩ ──H────────┼────┼────●────────QFT†── Measure (θ₂)
│ │ │
|u⟩ ──────────U¹───U²───U⁴────────────── (unchanged)
Key components:
- Counting register: qubits initialized to , determines precision
- Target register: Holds the eigenstate
- Controlled-U operations: Apply controlled by qubit
- Inverse QFT: Extracts the phase as a binary number
How It Works
- Hadamards create superposition in counting register
- Controlled- operations encode phase information
- The counting register ends up in state encoding
- Inverse QFT converts phase to binary representation
- Measurement reads out (approximately)
Precision
With counting qubits:
- Precision: (can distinguish values differing by )
- Success probability: High for that’s exactly representable
- For general : Concentration around true value
Applications
Shor’s Algorithm
QPE finds the period of modular exponentiation.
Quantum Chemistry (VQE-related)
Estimate eigenvalues of molecular Hamiltonians → ground state energies.
HHL Algorithm
Estimate eigenvalues for matrix inversion.
Quantum Counting
Count Grover solutions by estimating phase related to solution count.
Variants
Iterative Phase Estimation
Uses single counting qubit, repeated measurements. More noise-resilient, useful for NISQ.
Robust Phase Estimation
Handles noise and imperfect eigenstates better.
Quantum Eigenvalue Estimation
Generalizations for non-eigenstate inputs (get superposition of phases).
Resource Requirements
For -bit precision:
- Counting qubits:
- Controlled- calls: (can be expensive!)
- QFT on qubits
The cost of implementing controlled- is often the bottleneck.
See also: Quantum Fourier Transform, Shor’s Algorithm, VQE
VQE
Variational Quantum Eigensolver: a hybrid quantum-classical algorithm for finding ground state energies, especially useful in quantum chemistry.
VQE (Variational Quantum Eigensolver) is the flagship algorithm for near-term quantum computers. It’s a hybrid approach that uses a quantum computer to evaluate energies and a classical computer to optimize parameters.
The Goal
Find the ground state energy of a Hamiltonian :
This is important for quantum chemistry (molecular ground states) and materials science.
How It Works
The Variational Principle
For any trial state :
The energy of any guess is always ≥ true ground state energy. So minimize!
The Algorithm
┌─────────────────────────────────────────────────────┐
│ Classical Computer │
│ ┌─────────────┐ ┌────────────┐ │
│ │ Optimizer │◄──── Energy ◄─────│ Measure │ │
│ │ (θ→θ') │ │ expectation│ │
│ └──────┬──────┘ └─────▲──────┘ │
│ │ New θ │ │
│ ▼ │ │
│ ┌──────────────────────────────────────────────┐ │
│ │ Quantum Computer │ │
│ │ │ │
│ │ |0⟩ ──[Ansatz(θ)]──── Measure │ │
│ │ │ │
│ └──────────────────────────────────────────────┘ │
└─────────────────────────────────────────────────────┘
- Prepare: Create parameterized trial state on quantum computer
- Measure: Estimate via measurements
- Optimize: Classical optimizer updates to minimize energy
- Repeat: Until convergence
The Ansatz
The ansatz is the parameterized circuit structure:
|0⟩ ──Ry(θ₁)──●──Ry(θ₃)──...
│
|0⟩ ──Ry(θ₂)──⊕──Ry(θ₄)──...
Common ansatzes:
- UCCSD: Unitary coupled cluster (chemistry-inspired)
- Hardware-efficient: Native gates, easy to run
- Problem-specific: Tailored to symmetries
Measuring the Hamiltonian
Hamiltonians are decomposed into Pauli strings:
where are Pauli operators (e.g., ).
Each term measured separately, results combined classically.
Challenges
| Challenge | Issue |
|---|---|
| Barren plateaus | Gradients vanish in deep circuits |
| Noise | NISQ devices have errors |
| Measurement overhead | Many shots needed for precision |
| Classical optimization | Can get stuck in local minima |
Applications
- Quantum chemistry: Molecular energies, reaction pathways
- Materials science: Band structures, superconductivity
- Optimization: Via encoding problems as Hamiltonians
Relation to Other Algorithms
- QPE: More accurate but needs fault tolerance
- QAOA: Similar variational structure, for optimization
- VQA: VQE is a specific type of variational quantum algorithm
See also: Variational Quantum Algorithm, QAOA, Hamiltonian, NISQ
QAOA
Quantum Approximate Optimization Algorithm: a hybrid algorithm for combinatorial optimization problems.
QAOA (Quantum Approximate Optimization Algorithm) is a variational algorithm designed to find approximate solutions to combinatorial optimization problems. Introduced by Farhi et al. in 2014.
The Setup
Given an optimization problem encoded as a cost function over bit strings , find:
Examples: MaxCut, traveling salesman, scheduling, portfolio optimization.
The Algorithm
QAOA uses a parameterized quantum circuit alternating between two operations:
1. Problem Hamiltonian
Encodes the cost function:
2. Mixer Hamiltonian
Creates transitions between states:
Usually (sum of Pauli X on all qubits).
The Circuit (depth )
|+⟩^n ── U_C(γ₁) ── U_B(β₁) ── U_C(γ₂) ── U_B(β₂) ── ... ── Measure
Parameters: and
The Variational Loop
1. Choose p (circuit depth)
2. Initialize parameters (γ, β)
3. Repeat:
a. Run QAOA circuit on quantum computer
b. Measure in computational basis
c. Compute expected cost ⟨C⟩
d. Classical optimizer updates (γ, β)
4. Return best solution found
Example: MaxCut
Problem: Partition graph vertices to maximize edges cut.
Encoding:
Each edge contributes 1 if endpoints have different values (cut), 0 otherwise.
Performance
Theoretical
- : Converges to optimal solution
- Small : Provides approximation
Practical (NISQ)
- Low depth () to manage noise
- Approximation quality varies by problem
- Ongoing research on when QAOA beats classical
Variants
| Variant | Description |
|---|---|
| Warm-start QAOA | Initialize from classical solution |
| ADAPT-QAOA | Adaptive ansatz construction |
| Recursive QAOA | Apply recursively to subproblems |
| QAOA+ | Extended mixer Hamiltonians |
Comparison with VQE
| Aspect | QAOA | VQE |
|---|---|---|
| Primary use | Optimization | Ground state |
| Ansatz | Problem-structured | Flexible |
| Parameters | 2p | Varies widely |
| Layers | Alternating U_C, U_B | General gates |
Challenges
- Parameter optimization: Non-convex landscape
- Barren plateaus: Can occur at high depth
- Classical competition: Best classical algorithms are strong
- Noise sensitivity: Errors accumulate with depth
See also: VQE, Variational Quantum Algorithm, NISQ, Quantum Speedup
Quantum Simulation
Using quantum computers to simulate quantum systems. Potentially the most impactful near-term application.
Quantum simulation uses controllable quantum systems to simulate other quantum systems. This is widely considered the most promising application of quantum computing, with potential breakthroughs in chemistry, materials science, and physics.
Feynman’s Vision
Richard Feynman (1982) observed that simulating quantum systems on classical computers is exponentially hard:
“Nature isn’t classical, dammit, and if you want to make a simulation of nature, you’d better make it quantum mechanical.”
A quantum computer naturally represents quantum states, potentially offering exponential speedup for simulation.
Types of Quantum Simulation
Analog Simulation
Map the target system directly onto quantum hardware:
- Target Hamiltonian ↔ Hardware Hamiltonian
- Let system evolve naturally
- Examples: Cold atoms simulating condensed matter
Digital Simulation
Use quantum gates to simulate time evolution:
- Decompose evolution into gate sequences
- Trotter-Suzuki decomposition
- More flexible but more overhead
Hybrid Approaches
Combine analog and digital methods for best of both worlds.
Simulating Hamiltonians
Given Hamiltonian , simulate evolution :
Trotter Formula
Decompose into easy-to-simulate terms, apply in sequence.
Product Formulas
Higher-order decompositions for better accuracy:
- First-order: Error
- Second-order: Error
- Higher orders available
Modern Methods
- Quantum signal processing
- Qubitization
- Linear combination of unitaries (LCU)
Applications
Quantum Chemistry
- Molecular ground state energies
- Reaction dynamics
- Drug discovery
- Catalyst design
Materials Science
- High-temperature superconductivity
- Topological materials
- Battery chemistry
Fundamental Physics
- Lattice gauge theories (QCD)
- Quantum field theory
- Black hole physics
Biology
- Protein folding (quantum aspects)
- Photosynthesis
- Enzyme catalysis
Resource Estimates
| Application | Logical Qubits | T-gates |
|---|---|---|
| Small molecules (H₂, LiH) | 10-100 | 10³-10⁵ |
| Drug-like molecules | 100-1000 | 10⁶-10⁹ |
| Catalyst design | 1000+ | 10⁹+ |
Current State
- NISQ era: Small molecules, proof-of-concept
- Near-term goal: Beyond classical simulation capabilities
- Long-term: Industrial-scale chemistry/materials
Why It Matters
Classical simulation costs scale exponentially with system size. Quantum simulation scales polynomially. This could enable:
- Designing new drugs computationally
- Room-temperature superconductors
- Better batteries and solar cells
- Understanding fundamental physics
See also: VQE, Hamiltonian, Quantum Advantage, NISQ
Quantum Channel
A mathematical description of how quantum states transform, including noise and decoherence effects.
A quantum channel (also called a quantum operation or completely positive trace-preserving map) describes how quantum states evolve, especially when interacting with an environment.
Definition
A quantum channel maps density matrices to density matrices:
It must be:
- Linear:
- Completely positive: Maps positive operators to positive operators (even when extended)
- Trace-preserving:
Kraus Representation
Every quantum channel can be written as:
where are Kraus operators satisfying .
Common Quantum Channels
Unitary Channel
Ideal, noise-free evolution:
Single Kraus operator: .
Depolarizing Channel
Random Pauli errors with probability :
Turns state toward maximally mixed state.
Amplitude Damping
Models energy loss (e.g., photon emission):
Related to T1 decay.
Phase Damping (Dephasing)
Loses phase information without energy loss:
Related to T2 decay.
Bit Flip Channel
Random X error:
Phase Flip Channel
Random Z error:
Channel Composition
Channels compose naturally:
Multiple noise sources combine into a single effective channel.
Channel Capacity
The quantum channel capacity quantifies how much quantum information can be reliably transmitted. Different capacities exist for:
- Classical information over quantum channel
- Quantum information (with/without entanglement assistance)
Why It Matters
Quantum channels are essential for:
- Modeling realistic noise in quantum computers
- Designing error correction codes
- Quantum communication protocols
- Understanding decoherence
See also: Density Matrix, Decoherence, Quantum Error Correction
Fidelity
A measure of how close two quantum states are, similar to a distance metric.
Fidelity quantifies how similar two quantum states are. It’s one of the most important metrics in quantum information, used to assess gate quality, state preparation, and algorithm success.
Definition
For Pure States
This equals 1 if the states are identical (up to global phase), 0 if orthogonal.
For General States (Density Matrices)
Simplified when one state is pure:
Properties
| Property | Description |
|---|---|
| Range | |
| Symmetric | |
| States are identical | |
| States are orthogonal |
Fidelity in Practice
Gate Fidelity
How well does an implemented gate match the ideal?
Typical values:
- Single-qubit gates: 99.5-99.99%
- Two-qubit gates: 99-99.9%
State Fidelity
How well was a target state prepared?
Process Fidelity
How well does a quantum process match the ideal, averaged over all inputs.
Average Gate Fidelity
Often reported as average over all input states:
where is the dimension (2 for single qubit, 4 for two qubits).
Fidelity vs Error Rate
Infidelity = is approximately the error rate for high-fidelity operations:
| Fidelity | Infidelity | Interpretation |
|---|---|---|
| 99% | 1% | 1 in 100 operations fail |
| 99.9% | 0.1% | 1 in 1,000 operations fail |
| 99.99% | 0.01% | 1 in 10,000 operations fail |
Relation to Other Metrics
- Trace distance:
- Diamond distance: For processes/channels
Why It Matters
Fidelity is used everywhere in quantum computing:
- Benchmarking quantum hardware
- Comparing algorithms
- Error correction thresholds
- Quantum communication protocols
See also: Quantum State, Quantum Gate, Quantum Error Correction
Quantum Teleportation
A protocol to transfer quantum states using entanglement and classical communication, without physically sending the quantum system.
Quantum teleportation transmits an unknown quantum state from one location to another using a shared entangled pair and classical communication. No physical quantum system travels; only classical information is sent.
The Setup
Three parties:
- Alice: Has unknown state to teleport
- Bob: Will receive the state
- Shared resource: Alice and Bob share a Bell pair
The Protocol
Initial State
Alice has qubit (the unknown state) and qubit (her half of the Bell pair). Bob has qubit (his half of the Bell pair).
Step 1: Bell Measurement
Alice performs a Bell state measurement on qubits and , getting one of four outcomes: 00, 01, 10, or 11.
Step 2: Classical Communication
Alice sends her 2-bit measurement result to Bob (classical channel).
Step 3: Correction
Based on Alice’s message, Bob applies a correction:
| Alice’s Result | Bob’s Correction |
|---|---|
| 00 | (nothing) |
| 01 | |
| 10 | |
| 11 |
Result
Bob now has exactly. Alice’s original is destroyed.
Circuit Diagram
|ψ⟩ ────●────H────M──────────╓
│ ║ (classical)
|Φ+⟩ ───⊕─────────M────────╫─╫──
║ ║
|B⟩ ───────────────────X───╫─Z── |ψ⟩
▲ ║
└───╨───
Key Properties
No Faster-Than-Light Communication
Teleportation requires classical communication (limited to light speed). Without knowing Alice’s measurement result, Bob’s qubit looks completely random.
Destroys Original State
The no-cloning theorem is satisfied: is destroyed at Alice’s location when created at Bob’s.
Requires Pre-Shared Entanglement
The Bell pair must be distributed beforehand. Teleportation “spends” the entanglement.
Applications
| Application | Use |
|---|---|
| Quantum networks | Transfer quantum states between nodes |
| Quantum computing | Move states between processors |
| Quantum repeaters | Enable long-distance quantum communication |
| Gate teleportation | Implement gates using teleportation |
Gate Teleportation
A powerful generalization: instead of teleporting , teleport for some gate . This is key to fault-tolerant quantum computing.
Experimental Milestones
- 1997: First demonstration (photons, ~1 meter)
- 2012: 143 km (Canary Islands)
- 2017: 1,400 km (satellite, Micius)
- Ongoing: Integrated into quantum networks
See also: Entanglement, Bell State, No-Cloning Theorem
No-Cloning Theorem
A fundamental theorem proving it’s impossible to create an exact copy of an arbitrary unknown quantum state.
The no-cloning theorem states that there is no quantum operation that can copy an arbitrary unknown quantum state. This is one of the most important results in quantum information theory.
The Theorem
Statement: There is no unitary operation such that: for all quantum states .
The Proof (Simplified)
Suppose such a cloning machine existed. Consider two states and :
Taking the inner product:
So , which means equals 0 or 1.
This means you can only clone states that are either identical or orthogonal, not arbitrary states. Contradiction.
What You CAN Do
Clone Known States
If you know what state you have, you can prepare copies:
Clone Classical Information
Measure first (destroying quantum information), then copy:
Approximate Cloning
Create imperfect copies with bounded fidelity. The best universal cloner achieves fidelity 5/6 for qubits.
Clone Orthogonal States
A set of mutually orthogonal states can be cloned (they’re distinguishable, hence effectively classical).
Implications
Quantum Cryptography Security
QKD security relies on no-cloning. An eavesdropper can’t copy quantum states to analyze later without disturbing them.
Quantum Information is Fragile
You can’t backup quantum states. Loss or error destroys information permanently (without error correction).
Teleportation Doesn’t Clone
Quantum teleportation destroys the original when creating the copy, satisfying no-cloning.
Distinguishing Quantum from Classical
Classical information (bits) can be freely copied. Quantum information (qubits) cannot. This is a fundamental difference.
Related Theorems
| Theorem | Statement |
|---|---|
| No-deleting | Can’t delete one of two identical copies |
| No-broadcasting | Can’t clone mixed states |
| No-hiding | Quantum information can’t be hidden in correlations |
Historical Note
Proved independently by Wootters-Zurek and Dieks in 1982. It was initially seen as a limitation, but later recognized as the foundation of quantum cryptography’s security.
See also: Quantum Key Distribution, Quantum Teleportation, Quantum State, Quantum Money
Bell State
The four maximally entangled two-qubit states, a key resource for quantum communication protocols.
Bell states (also called EPR pairs or Bell pairs) are the four maximally entangled states of two qubits. They’re named after physicist John Bell and are fundamental to quantum information.
The Four Bell States
Alternative notation: .
Properties
Maximally Entangled
Each Bell state has maximum entanglement. Tracing out either qubit gives the maximally mixed state:
Perfect Correlations
Measuring both qubits in the same basis always gives correlated results:
| State | Z-basis correlation | X-basis correlation |
|---|---|---|
| Same (00 or 11) | Same (++ or –) | |
| Same | Opposite | |
| Opposite (01 or 10) | Same | |
| Opposite | Opposite |
Orthonormal Basis
The four Bell states form a complete orthonormal basis for two qubits. Any two-qubit state can be written as a superposition of Bell states.
Creating Bell States
The standard circuit (Bell circuit):
|0⟩ ──H────●──── |Φ+⟩
│
|0⟩ ───────⊕────
Different input states produce different Bell states.
Bell Measurement
A Bell measurement projects onto the Bell basis, distinguishing all four states.
Circuit (reverse of creation):
●────H──── Measure → tells which Bell state
│
⊕──────── Measure →
Applications
| Application | How Bell States Are Used |
|---|---|
| Quantum teleportation | Shared entanglement resource |
| Superdense coding | Channel for 2 bits per qubit |
| QKD (E91) | Detect eavesdroppers |
| Bell tests | Prove quantum mechanics is non-local |
| Entanglement swapping | Extend entanglement range |
Bell State as a Resource
Think of a Bell pair as a resource that can be “spent”:
- Teleportation consumes one Bell pair to send one qubit
- Superdense coding consumes one Bell pair to send two classical bits
Entanglement is a currency in quantum information!
See also: Entanglement, Bell Inequality, Quantum Teleportation, CNOT Gate
Bell Inequality
Mathematical inequalities that distinguish quantum mechanics from classical hidden-variable theories.
Bell inequalities are constraints that any local hidden-variable theory must satisfy. Quantum mechanics violates these inequalities, proving that nature is fundamentally non-classical.
The Question
Can quantum correlations be explained by hidden classical information? Einstein believed quantum randomness might reflect our ignorance of “hidden variables.” Bell’s 1964 theorem showed this is impossible (under reasonable assumptions).
Local Hidden Variables
A local hidden-variable theory assumes:
- Realism: Measurement outcomes are predetermined by hidden variables
- Locality: Measurements on one particle can’t instantly affect another
Bell proved: Any such theory satisfies certain inequalities that quantum mechanics violates.
The CHSH Inequality
The most commonly used Bell inequality (CHSH):
For two parties (Alice and Bob) with two measurement settings each (a, a’ and b, b’):
where is the correlation between measurements.
Classical Bound
Any local hidden-variable theory:
Quantum Bound
Quantum mechanics allows up to: (Tsirelson’s bound)
Experimental Tests
To test Bell inequalities:
- Prepare entangled particles
- Separate them (space-like separation ideally)
- Choose measurement settings randomly
- Check if correlations violate the inequality
Milestone Experiments
- 1982 (Aspect): First convincing violation
- 2015 (Loophole-free): Closed major loopholes simultaneously
- 2022 (Nobel Prize): Awarded to Aspect, Clauser, Zeilinger
Loopholes
Early experiments had potential issues:
| Loophole | Issue | Resolution |
|---|---|---|
| Locality | Settings might not be truly random/separated | Space-like separation, random number generators |
| Detection | Not all particles detected | High-efficiency detectors |
| Freedom-of-choice | Measurement choices might be predetermined | Cosmic random number sources |
Modern experiments close all known loopholes.
Implications
Bell inequality violations prove:
- No local hidden variables: Nature isn’t locally deterministic
- Entanglement is real: Not just a mathematical artifact
- Quantum non-locality: Correlations can’t be explained classically
This doesn’t allow faster-than-light communication (results still look random locally).
Device-Independent Applications
Bell violations can certify quantum properties without trusting the devices:
- Device-independent QKD
- Certified randomness generation
- Self-testing quantum states
See also: Entanglement, Bell State, Quantum Key Distribution
Quantum Key Distribution
Using quantum mechanics to establish secure cryptographic keys between two parties, with security guaranteed by physics.
Quantum Key Distribution (QKD) enables two parties (traditionally Alice and Bob) to generate a shared secret key with security guaranteed by the laws of quantum physics, not computational assumptions.
The Goal
Create a shared random key that:
- Only Alice and Bob know
- Any eavesdropping attempt is detectable
- Security doesn’t depend on computational hardness
Why Quantum?
Classical key exchange (like Diffie-Hellman) relies on mathematical problems being hard to solve. A powerful enough computer (or algorithm) could break it.
QKD security comes from physics:
- No-cloning theorem: Can’t copy unknown quantum states
- Measurement disturbance: Observing qubits changes them
- Bell inequality violations: Certify genuine quantum correlations
Major Protocols
BB84
The original QKD protocol (1984):
- Uses single photons in two bases
- Detect eavesdropping via error rate
E91
Entanglement-based (1991):
- Uses entangled photon pairs
- Security from Bell inequality violations
Continuous-Variable QKD
Uses coherent states and homodyne detection:
- Compatible with telecom infrastructure
- Different noise analysis
Basic QKD Steps
1. QUANTUM TRANSMISSION
Alice sends quantum states to Bob
(photons encoding bits)
2. BASIS RECONCILIATION
Alice & Bob compare measurement bases (publicly)
Keep only matching-basis results
3. ERROR ESTIMATION
Compare subset of key bits (publicly)
High error rate → eavesdropper detected
4. ERROR CORRECTION
Fix remaining errors in the key
5. PRIVACY AMPLIFICATION
Shrink key to remove eavesdropper's information
Result: Shorter but perfectly secure key
Security
Information-Theoretic Security
QKD can provide unconditional security: secure against any attack, even with unlimited computing power.
Assumptions Still Required
- Quantum mechanics is correct
- Devices work as specified
- No side channels
Device-Independent QKD
Device-independent QKD removes device assumptions using Bell inequality violations. Security is certified by observed quantum correlations.
Practical Considerations
| Challenge | Current State |
|---|---|
| Distance | ~100 km fiber, 1000+ km satellite |
| Key rate | ~Mbps (short distance), ~kbps (long distance) |
| Integration | Commercial systems available |
| Cost | Still expensive, specialized equipment |
Quantum Networks
For multiple users, QKD networks are being developed:
- Trusted node networks (relay through secure stations)
- Quantum repeaters (future: extend range without trust)
- Satellite QKD (demonstrated by China’s Micius)
Relation to Post-Quantum Cryptography
| Approach | Security Basis | Protects |
|---|---|---|
| QKD | Physics | Key exchange |
| Post-Quantum | Mathematical hardness | All cryptography |
Both are responses to quantum computing threats but work differently.
See also: BB84 Protocol, E91 Protocol, No-Cloning Theorem, Post-Quantum Cryptography, Quantum Random Number Generator, Device-Independent Security
BB84 Protocol
The first quantum key distribution protocol, using single photons in two conjugate bases.
BB84 is the original QKD protocol, proposed by Charles Bennett and Gilles Brassard in 1984. It remains the most widely implemented QKD scheme.
The Setup
Alice wants to share a secret key with Bob. Eve (eavesdropper) may try to intercept.
The Two Bases
| Basis | States | Bit Values |
|---|---|---|
| Rectilinear (+) | , | 0, 1 |
| Diagonal (×) | , | 0, 1 |
Key insight: Measuring in the wrong basis gives random results.
The Protocol
Step 1: Quantum Transmission
Alice, for each bit:
- Randomly chooses basis (+ or ×)
- Randomly chooses bit value (0 or 1)
- Sends corresponding photon to Bob
Bob, for each received photon:
- Randomly chooses basis (+ or ×)
- Measures and records result
Step 2: Sifting (Basis Reconciliation)
Over public channel:
- Alice and Bob announce their bases (not results!)
- Keep only bits where bases matched
- Discard the rest (~50% of bits)
Step 3: Error Estimation
- Randomly select and compare some key bits (publicly)
- Calculate error rate
- If error rate > threshold: abort (eavesdropper detected!)
Step 4: Post-Processing
- Error correction: Fix remaining errors
- Privacy amplification: Shrink key to remove Eve’s information
Why It’s Secure
If Eve Intercepts and Resends
Eve doesn’t know Alice’s basis. She must guess:
- Guess correctly (50%): No disturbance
- Guess wrong (50%): Introduces 25% error in that bit
Overall: Eve’s interception causes ~25% error rate in intercepted bits.
Detection
If Alice and Bob see error rate > 11% (theoretical threshold), they know Eve was present and abort.
Example
Alice's bits: 1 0 1 1 0 0 1 0
Alice's bases: + × + × × + × +
States sent: |1⟩ |+⟩ |1⟩ |-⟩ |+⟩ |0⟩ |-⟩ |0⟩
Bob's bases: × × + + × + × ×
Bob's results: ? 0 1 ? 0 0 1 ?
Matching bases: ✓ ✓ ✓ ✓ ✓
Sifted key: 0 1 0 0 1
Bob’s “?” indicates random result (wrong basis).
Practical Implementations
Photon Sources
- Weak coherent pulses (attenuated laser)
- Single-photon sources (better but harder)
- Decoy states (detect photon-number attacks)
Challenges
- Photon loss over distance
- Detector dark counts
- Timing synchronization
- Side-channel attacks
Variants
| Protocol | Improvement |
|---|---|
| Decoy-state BB84 | Defeats photon-number splitting attacks |
| BBM92 | Entanglement-based version |
| SARG04 | Better for weak coherent pulses |
See also: Quantum Key Distribution, E91 Protocol, No-Cloning Theorem, Wiesner State
E91 Protocol
An entanglement-based quantum key distribution protocol using Bell inequality violations for security.
E91 is a QKD protocol proposed by Artur Ekert in 1991. Unlike BB84, it uses entanglement and Bell inequalities to guarantee security.
The Key Idea
Alice and Bob share entangled photon pairs. By measuring Bell inequality violations, they can verify:
- Their photons are genuinely entangled
- No eavesdropper has disturbed the quantum channel
The Setup
A source produces Bell pairs:
One photon goes to Alice, one to Bob.
Measurement Bases
| Alice’s Choices | Angles |
|---|---|
| 0° | |
| 45° | |
| 90° |
| Bob’s Choices | Angles |
|---|---|
| 22.5° | |
| 67.5° | |
| 112.5° |
The Protocol
Step 1: Measurement
For each photon pair:
- Alice randomly chooses , , or and measures
- Bob randomly chooses , , or and measures
Step 2: Public Comparison
Alice and Bob announce their measurement choices (not results).
Step 3: Key Generation
When Alice chose and Bob chose , or Alice chose and Bob chose :
- These bases are parallel
- Results are perfectly anti-correlated
- Use for key bits
Step 4: Security Check
Use other combinations (, , , ) to compute CHSH:
Step 5: Verify Bell Violation
- If : Maximum quantum violation, no eavesdropper
- If : Some disturbance, possibly Eve
- If : Classical correlations only, Eve has full information
Security from Bell Violations
The key insight: Bell violations certify quantum correlations.
If Eve intercepts and resends, she breaks the entanglement, reducing Bell violation. Alice and Bob detect this as reduced value.
Comparison with BB84
| Aspect | BB84 | E91 |
|---|---|---|
| Resource | Single photons | Entangled pairs |
| Security proof | No-cloning | Bell inequalities |
| Source location | With Alice | Can be anywhere |
| Device-independent | No | Closer to DI |
Advantages of E91
- Source can be untrusted: Even if Eve controls the source, Bell violations prove security
- Path to device-independence: Foundation for Device-Independent QKD (DI-QKD)
- Symmetric: Neither party needs to trust the source
Practical Considerations
- Generating high-quality entangled pairs is harder than single photons
- Loss affects both photons (reduces rate more)
- Demonstrated over 100+ km
See also: Quantum Key Distribution, BB84 Protocol, Bell Inequality
Quantum Random Number Generator
A device that produces true randomness from quantum measurements, not pseudo-randomness from algorithms.
A Quantum Random Number Generator (QRNG) exploits the fundamental randomness of quantum mechanics to generate provably random numbers. Unlike classical pseudo-random number generators (PRNGs), QRNGs produce true randomness.
Why Quantum?
Classical “Random” Numbers
- PRNGs are deterministic algorithms
- Given the seed, output is predictable
- Technically pseudo-random, not truly random
Quantum Randomness
- Measurement outcomes are fundamentally unpredictable
- Not due to ignorance: nature itself is random
- No hidden variables determine outcomes (Bell’s theorem)
Basic Principle
Simplest QRNG:
- Prepare qubit in
- Measure in computational basis
- Result (0 or 1) is truly random with 50/50 probability
Implementation Methods
Photon-Based
| Method | Principle |
|---|---|
| Beam splitter | Photon randomly reflects or transmits |
| Vacuum fluctuations | Quantum noise in light field |
| Photon arrival time | Random detection timing |
| Polarization | Random polarization measurement |
Other Platforms
- Superconducting qubits
- Atomic systems
- Quantum dots
Rates and Devices
| Device Type | Typical Rate |
|---|---|
| Commercial QRNG | 100 Mbps - 1 Gbps |
| Lab systems | Up to 100 Gbps |
| Integrated chips | 10-100 Mbps |
Commercial QRNGs are available from companies like ID Quantique, Quantis, and others.
Applications
Cryptography
- Key generation for encryption
- Nonces and initialization vectors
- QKD bit choices
Scientific
- Monte Carlo simulations
- Statistical sampling
- Randomized algorithms
Gaming and Lotteries
- Provably fair random selection
- Online gambling
- Government lotteries
Certifying Randomness
How do you know the QRNG is working properly?
Device-Dependent
Trust that the device implements quantum measurement correctly.
Device-Independent
Use Bell inequality violations to certify randomness without trusting devices:
- CHSH violation proves quantum process
- Randomness certified by physics, not device specifications
Self-Testing
Intermediate approaches that verify some properties.
Challenges
| Challenge | Issue |
|---|---|
| Bias | Imperfect devices may favor 0 or 1 |
| Correlations | Adjacent bits might be correlated |
| Classical noise | Mix of quantum and classical randomness |
| Verification | Proving the source is truly quantum |
Solutions
- Randomness extraction (post-processing to remove bias)
- Statistical testing (NIST tests, Diehard tests)
- Device certification
See also: Quantum Key Distribution, Measurement, Bell Inequality
Post-Quantum Cryptography
Cryptographic algorithms designed to be secure against both classical and quantum computers.
Post-Quantum Cryptography (PQC), also called quantum-resistant or quantum-safe cryptography, refers to cryptographic algorithms that remain secure even if an adversary has a quantum computer.
The Threat
Shor’s algorithm can break:
- RSA: Factoring large numbers
- ECC: Discrete logarithm on elliptic curves
- DH/DSA: Discrete logarithm in finite fields
These underpin most of today’s public-key cryptography. A large quantum computer would compromise secure communications, digital signatures, and more.
The Timeline
| Phase | Status |
|---|---|
| Standardization | NIST finalized first standards (2024) |
| Transition | Underway (hybrid approaches) |
| Quantum computers | Not yet cryptographically relevant |
“Harvest now, decrypt later”: Data encrypted today could be stored and decrypted once quantum computers exist.
PQC Approaches
Lattice-Based Cryptography
Based on hard lattice problems (e.g., Learning With Errors).
- Examples: Kyber (key exchange), Dilithium (signatures)
- Pros: Efficient, well-studied
- Cons: Larger keys than classical
Hash-Based Signatures
Security relies only on hash function properties.
- Examples: SPHINCS+, XMSS
- Pros: Conservative security assumptions
- Cons: Larger signatures, stateful versions have management challenges
Code-Based Cryptography
Based on error-correcting codes.
- Examples: Classic McEliece, BIKE
- Pros: Long history (1978)
- Cons: Very large public keys
Isogeny-Based
Based on maps between elliptic curves.
- Examples: SIKE (broken in 2022!)
- Status: Active research, some schemes broken
Multivariate Cryptography
Based on solving multivariate polynomial equations.
- Examples: Rainbow (broken), ongoing research
- Status: Several schemes broken, active area
NIST Standardization
NIST’s post-quantum cryptography project (2016-2024) selected:
Key Encapsulation (Encryption)
- ML-KEM (Kyber): Primary standard
Digital Signatures
- ML-DSA (Dilithium): Primary standard
- SLH-DSA (SPHINCS+): Hash-based alternative
- FN-DSA (Falcon): Efficient signatures
Migration Strategy
Hybrid Approaches
Combine classical and post-quantum algorithms:
Hybrid Key = Classical_KEM(key) || PQ_KEM(key)
Secure if either is unbroken.
Crypto Agility
Design systems to swap algorithms easily, which is needed for future updates.
PQC vs QKD
| Aspect | PQC | QKD |
|---|---|---|
| Security basis | Mathematical hardness | Physics |
| Deployment | Software update | New hardware |
| Coverage | All cryptography | Key exchange only |
| Maturity | Standardized | Limited deployment |
Most organizations need PQC. QKD is complementary for highest-security applications.
See also: Shor’s Algorithm, Quantum Key Distribution, Lattice-Based Cryptography, Quantum-Safe
Quantum-Safe
Cryptographic systems that remain secure against attacks from quantum computers.
Quantum-safe (or quantum-resistant) describes cryptographic algorithms and systems that are secure against adversaries with access to quantum computers. It’s often used interchangeably with post-quantum cryptography.
What’s At Risk
Shor’s algorithm threatens:
| Algorithm | Use | Status |
|---|---|---|
| RSA | Encryption, signatures | Broken by quantum |
| ECDH/ECDSA | Key exchange, signatures | Broken by quantum |
| DSA | Signatures | Broken by quantum |
| Diffie-Hellman | Key exchange | Broken by quantum |
Grover’s algorithm weakens:
| Algorithm | Impact |
|---|---|
| AES-128 | Effective security reduced to 64 bits |
| AES-256 | Effective security reduced to 128 bits |
| SHA-256 | Collision resistance reduced |
What’s Already Quantum-Safe
Symmetric Cryptography
With doubled key sizes:
- AES-256: Quantum-safe (128-bit security)
- SHA-384/SHA-512: Quantum-safe for hashing
Hash-Based Signatures
- SPHINCS+, XMSS, LMS
- Security from hash functions only
Achieving Quantum Safety
1. Post-Quantum Algorithms
Use PQC standards:
- ML-KEM (Kyber) for key encapsulation
- ML-DSA (Dilithium) for signatures
2. Quantum Key Distribution
Use QKD for key exchange:
- Physics-based security
- Requires specialized hardware
3. Hybrid Approaches
Combine classical and post-quantum:
- Secure if either algorithm holds
- Transition strategy
Migration Checklist
□ Inventory cryptographic assets
□ Identify quantum-vulnerable algorithms
□ Prioritize high-value, long-lifetime data
□ Plan hybrid deployment
□ Test post-quantum alternatives
□ Update protocols and standards
□ Deploy and monitor
Certification and Standards
| Standard | Description |
|---|---|
| NIST PQC | US post-quantum standards |
| ETSI QSC | European quantum-safe cryptography |
| ISO/IEC | International standards in development |
| CNSA 2.0 | US government requirements |
Common Misconceptions
“AES is broken by quantum computers” No. AES with sufficient key length remains secure.
“We need to switch immediately” Urgency depends on data lifetime. “Harvest now, decrypt later” threatens long-term secrets.
“QKD solves everything” QKD only does key exchange. You still need quantum-safe algorithms for signatures, authentication, etc.
See also: Post-Quantum Cryptography, Shor’s Algorithm, Quantum Key Distribution, Lattice-Based Cryptography
Lattice-Based Cryptography
Cryptographic systems based on hard mathematical problems involving lattices. The foundation of most post-quantum standards.
Lattice-based cryptography builds cryptographic primitives from computationally hard problems on mathematical lattices. It’s the basis for the primary post-quantum cryptography standards.
What’s a Lattice?
A lattice is a regular grid of points in -dimensional space, generated by integer combinations of basis vectors:
Think of it as an infinite, regular arrangement of points in space.
Hard Problems
Learning With Errors (LWE)
Given noisy linear equations over a ring:
Find the secret given many pairs. The noise is small but makes solving hard.
Ring-LWE
LWE over polynomial rings. More efficient and used in practice.
Module-LWE
A middle ground between LWE and Ring-LWE.
Short Integer Solution (SIS)
Find a short non-zero vector in the null space of a matrix.
Shortest Vector Problem (SVP)
Find the shortest non-zero vector in a lattice. Believed hard even for quantum computers.
Why Lattices for PQC?
| Property | Benefit |
|---|---|
| Quantum resistance | No known quantum speedup for lattice problems |
| Efficiency | Relatively fast operations |
| Versatility | Supports encryption, signatures, FHE |
| Worst-case hardness | Average-case security from worst-case problems |
NIST Standards
ML-KEM (Kyber)
- Type: Key Encapsulation Mechanism
- Based on: Module-LWE
- Use: Key exchange
ML-DSA (Dilithium)
- Type: Digital signature
- Based on: Module-LWE + Module-SIS
- Use: Authentication
FN-DSA (Falcon)
- Type: Digital signature
- Based on: NTRU lattices
- Use: Compact signatures
Key Sizes
Lattice schemes have larger keys than classical:
| Scheme | Public Key | Ciphertext/Signature |
|---|---|---|
| Kyber-768 | 1,184 bytes | 1,088 bytes |
| RSA-2048 | 256 bytes | 256 bytes |
| Dilithium-3 | 1,952 bytes | 3,293 bytes |
| ECDSA-256 | 64 bytes | 64 bytes |
Larger but manageable for most applications.
Beyond Encryption
Lattices enable advanced cryptography:
- Fully Homomorphic Encryption (FHE): Compute on encrypted data
- Attribute-Based Encryption: Access control via attributes
- Functional Encryption: Controlled function evaluation
Security Levels
NIST defines security levels:
| Level | Classical Security | Quantum Security |
|---|---|---|
| 1 | AES-128 | ~64-bit |
| 3 | AES-192 | ~128-bit |
| 5 | AES-256 | ~256-bit |
See also: Post-Quantum Cryptography, Quantum-Safe, Shor’s Algorithm
Quantum Money
Quantum states serving as unforgeable currency, exploiting the no-cloning theorem to prevent counterfeiting.
Quantum money is a theoretical concept where currency exists as quantum states that cannot be copied, making counterfeiting physically impossible.
The Idea
Classical money can be counterfeited by copying. But the no-cloning theorem says you can’t copy an unknown quantum state. So: make money from quantum states!
Wiesner’s Scheme (1983)
The original quantum money proposal:
Creation (by bank)
For each bill:
- Generate random serial number
- Create qubits, each randomly in , , , or
- Record the serial number and basis choices in secret database
- Bill = serial number + quantum state
Verification
- Customer presents bill to bank
- Bank looks up bases for that serial number
- Measures each qubit in the recorded basis
- If all correct → valid; if errors → counterfeit
Why It’s Unforgeable
Counterfeiter doesn’t know the bases. Any measurement to learn the state disturbs it. Can’t clone without knowing.
Limitations of Wiesner’s Scheme
| Issue | Problem |
|---|---|
| Bank verification | Must return to bank to verify |
| Quantum memory | Must store fragile quantum states |
| Single use | Measuring bill reveals some information |
Public-Key Quantum Money
Can anyone verify without bank involvement?
Requirements
- Public verification: Anyone can verify
- Unforgeability: Still can’t copy
This is much harder. Some proposals exist but are less practical.
Types of Quantum Money
Private-Key (Wiesner-type)
- Only issuer can verify
- Simpler to achieve
Public-Key
- Anyone can verify
- Much more challenging
- Active research area
Quantum Tokens
- Single-use credentials
- Simpler security requirements
Current Status
Quantum money remains largely theoretical:
- Requires long-lived quantum memory
- No practical systems deployed
- Active research in quantum-computational money (based on computational assumptions)
Related Concepts
| Concept | Description |
|---|---|
| Quantum tokens | Single-use authorization |
| Quantum signatures | Sign documents with quantum states |
| Quantum copy protection | Software that can’t be pirated |
Why It Matters
Quantum money demonstrates:
- Practical implications of no-cloning
- Quantum advantages for security
- The frontier of quantum cryptography
See also: No-Cloning Theorem, Quantum Key Distribution
Wiesner State
Quantum states used in Wiesner’s quantum money scheme, randomly chosen from conjugate bases to prevent counterfeiting.
Wiesner states are the quantum states used in Stephen Wiesner’s pioneering 1983 quantum money proposal. Each state is randomly chosen from two conjugate bases, making them impossible to copy without knowing the basis.
The States
For each qubit in a quantum “bill,” the bank randomly chooses one of four states:
| State | Basis | Bit Value |
|---|---|---|
| Computational (Z) | 0 | |
| Computational (Z) | 1 | |
| Hadamard (X) | 0 | |
| Hadamard (X) | 1 |
Why They’re Unforgeable
A counterfeiter trying to copy a Wiesner state faces a dilemma:
- Unknown basis: They don’t know if the state is in the Z or X basis
- Measurement disturbs: Measuring in the wrong basis destroys information
- No-cloning: Can’t copy without knowing the state
If the counterfeiter guesses the wrong basis:
- Measuring or in X basis → random result
- Measuring or in Z basis → random result
Any attempt to learn the state changes it, making counterfeiting detectable.
The Protocol
Bank Creates Money
- Generate random serial number
- For each of positions, randomly choose basis (Z or X) and bit (0 or 1)
- Prepare the corresponding quantum state
- Store in secret database
- Bill = serial number + qubits in Wiesner states
Verification
- Customer presents bill with serial number
- Bank looks up the bases for
- Measures each qubit in the recorded basis
- If all measurements match recorded bits → valid
- If errors → counterfeit detected
Security Analysis
If a counterfeiter tries to copy by measuring and re-preparing:
- Probability of guessing one basis correctly: 1/2
- Probability of all bases correct:
- For : Success probability
Historical Significance
Wiesner’s 1983 paper (written in 1970, published later) was foundational:
- First application of quantum mechanics to cryptography
- Introduced conjugate coding
- Inspired BB84 quantum key distribution
- Showed quantum information has unique security properties
Limitations
| Limitation | Issue |
|---|---|
| Bank verification | Must return to bank to verify |
| Quantum memory | States must be preserved |
| Single use | Verification reveals basis information |
Connection to BB84
BB84 directly uses Wiesner’s conjugate coding idea:
- Same four states
- Random basis choice
- Security from measurement disturbance
BB84 is essentially “Wiesner states for key distribution.”
See also: Quantum Money, BB84 Protocol, No-Cloning Theorem, Conjugate Coding
Device-Independent Security
Security guarantees that hold even when you don’t trust the devices, proven through Bell inequality violations.
Device-independent security is a cryptographic paradigm where security doesn’t rely on trusting the internal workings of quantum devices. Instead, security is certified by observing quantum correlations that violate Bell inequalities.
The Problem
Standard quantum protocols assume:
- Devices prepare the states they claim
- Measurements work as specified
- No hidden side channels
But what if a manufacturer is malicious? Or devices are compromised?
The Solution
Device-independent protocols treat devices as “black boxes”:
- Only observe inputs (settings) and outputs (results)
- Test for Bell inequality violations
- Violations prove genuine quantum behavior
Why It Works
Bell inequality violations can only come from true quantum entanglement. Classical devices cannot fake these correlations, no matter how sophisticated.
| Bell Test Result | Implication |
|---|---|
| No violation | Could be classical, no security guarantee |
| Violation observed | Must be quantum, security follows |
Applications
Device-Independent QKD
Generate encryption keys secure against:
- Malicious device manufacturers
- Compromised hardware
- Unknown implementation flaws
Device-Independent Randomness
Certify that random numbers are truly unpredictable, even if you built the device yourself.
Self-Testing
Verify that a quantum device performs as claimed without opening it up.
The Trade-off
| Aspect | Standard Protocols | Device-Independent |
|---|---|---|
| Trust required | Trust devices | Trust physics only |
| Performance | High key rates | Much lower rates |
| Implementation | Practical today | Experimentally challenging |
| Security | Relies on models | Unconditional |
Requirements
Device-independent protocols need:
- High-efficiency detectors (~80%+) to close detection loophole
- Space-like separation to close locality loophole
- Many rounds for statistical significance
Current Status
- First demonstrations achieved (2022)
- Distances: ~400 meters
- Key rates: Very low (proof of concept)
- Active research area
Why It Matters
Device-independent security represents the ultimate in cryptographic paranoia: trust nothing except the laws of physics. Even if every component is built by an adversary, security holds if Bell tests pass.
See also: Bell Inequality, Quantum Key Distribution, Entanglement
Superconducting Qubit
Qubits made from superconducting circuits that behave as artificial atoms. The leading technology for near-term quantum computers.
Superconducting qubits are the most widely deployed quantum computing technology. They use superconducting circuits cooled to millikelvin temperatures to create quantum two-level systems.
How They Work
Superconductivity
At very low temperatures (~15 mK), certain materials conduct electricity with zero resistance. Currents can flow indefinitely.
The Josephson Junction
The key element: two superconductors separated by a thin insulator. It creates a non-linear inductor that enables quantum behavior:
- Quantized energy levels (like an atom)
- Controllable transitions between levels
Qubit States
- : Ground state
- : First excited state
- Energy difference: ~5 GHz (microwave range)
Types of Superconducting Qubits
| Type | Principle | Used By |
|---|---|---|
| Transmon | Charge qubit with reduced sensitivity | IBM, Google, Rigetti |
| Flux qubit | Circulating current direction | D-Wave (annealing) |
| Phase qubit | Junction phase | Historical |
| Fluxonium | Enhanced coherence | Research |
The transmon dominates current quantum computers.
Control and Readout
Control
- Microwave pulses at qubit frequency (~5 GHz)
- Pulse shape determines gate operation
- Single-qubit gates: ~20 ns
- Two-qubit gates: ~50-200 ns
Readout
- Coupled to microwave resonator
- Measure resonator frequency shift
- ~1 μs readout time
Operating Conditions
| Parameter | Typical Value |
|---|---|
| Temperature | 10-20 mK |
| Cooling | Dilution refrigerator |
| Frequency | 4-8 GHz |
| T1 time | 50-500 μs |
| T2 time | 50-200 μs |
| Gate fidelity (1Q) | 99.9%+ |
| Gate fidelity (2Q) | 99-99.9% |
Advantages
| Advantage | Details |
|---|---|
| Fabrication | Leverages semiconductor manufacturing |
| Scalability | Lithographic techniques |
| Control | Fast microwave electronics |
| Connectivity | Can couple many qubits |
| Tunability | Frequencies can be adjusted |
Challenges
| Challenge | Issue |
|---|---|
| Cooling | Requires dilution refrigerators |
| Scale | Wiring and control bottlenecks |
| Coherence | Material defects limit T1, T2 |
| Crosstalk | Unwanted qubit interactions |
Major Players
- IBM: Transmon-based, cloud access (IBM Quantum)
- Google: Sycamore processor, quantum supremacy claim
- Rigetti: Full-stack approach
- IQM: European manufacturer
Current State
- Largest systems: 1000+ qubits (IBM)
- Best 2-qubit fidelity: ~99.9%
- Active research on error correction
Trapped Ion
Qubits encoded in individual atoms suspended by electromagnetic fields, offering high fidelity and long coherence times.
Trapped ion quantum computers use individual atoms confined by electromagnetic fields as qubits. The electronic states of these ions encode quantum information.
How It Works
Trapping
Ions are held in place by oscillating electric fields (Paul trap or linear trap):
- Radio-frequency fields create an effective potential well
- Ions levitate in vacuum, isolated from the environment
- Can trap chains of tens of ions
Qubit Encoding
Two approaches:
| Type | States | Typical Splitting |
|---|---|---|
| Hyperfine | Nuclear spin states | ~GHz |
| Optical | Ground + metastable excited | ~THz |
Example: Ytterbium-171 (Yb+) hyperfine qubit uses two nuclear spin states.
Control
Single-Qubit Gates
- Apply focused laser beams to individual ions
- Stimulated Raman transitions between qubit states
- Can also use microwave pulses
Two-Qubit Gates
- Ions interact via shared motional modes
- Laser pulses create spin-dependent forces
- Mølmer-Sørensen gate: ~99.9% fidelity demonstrated
Readout
- Shine resonant laser
- Ion in bright state: fluoresces (measure 1)
- Ion in dark state: no fluorescence (measure 0)
Advantages
| Advantage | Details |
|---|---|
| Identical qubits | All atoms of same species are identical |
| Long coherence | T2 up to seconds or minutes |
| High fidelity | Best gate fidelities achieved |
| All-to-all connectivity | Any ion can interact with any other |
| Optical interface | Natural for quantum networks |
Specifications
| Parameter | Typical Value |
|---|---|
| T1 time | Seconds to minutes |
| T2 time | Seconds (with dynamical decoupling) |
| 1-qubit gate fidelity | >99.99% |
| 2-qubit gate fidelity | >99.9% |
| Gate time (1Q) | ~1-10 μs |
| Gate time (2Q) | ~100-500 μs |
| Readout fidelity | >99.9% |
Challenges
| Challenge | Issue |
|---|---|
| Speed | Gates are slower than superconducting |
| Scaling | Adding ions to chain becomes harder |
| Optics complexity | Many laser beams needed |
| Vacuum requirements | Ultra-high vacuum needed |
Scaling Approaches
Quantum CCD
Move ions between trapping zones using electrode voltages. Demonstrated by Quantinuum.
Photonic Interconnects
Connect separate ion traps via optical fiber using photon-mediated entanglement.
2D Arrays
Trap ions in 2D grids rather than linear chains.
Major Players
- Quantinuum (Honeywell + Cambridge Quantum): QCCD architecture
- IonQ: Linear chains, photonic scaling
- Alpine Quantum Technologies: European player
- University labs: NIST, Duke, Oxford, Innsbruck
See also: Qubit, T1 Time, T2 Time, Quantum Gate
Photonic Qubit
Quantum information encoded in photons, ideal for quantum communication and potentially scalable quantum computing.
Photonic qubits use single photons or optical modes to encode quantum information. They’re the workhorses of quantum communication and a promising path to scalable quantum computing.
Encoding Methods
Polarization Encoding
Simple, robust, limited to single-rail.
Path Encoding (Dual-Rail)
Photon presence in one of two paths.
Time-Bin Encoding
When the photon arrives encodes the qubit.
Continuous Variable
Encode in quadratures of the electromagnetic field (like position and momentum of light).
Single-Qubit Operations
Simple with linear optics:
- Waveplates: Rotate polarization (any single-qubit gate)
- Beam splitters: Mix paths
- Phase shifters: Add phases
Single-qubit gates are essentially perfect!
Two-Qubit Operations
This is the hard part. Photons don’t naturally interact.
KLM Protocol
Knill-Laflamme-Milburn (2001): Use measurement and feedforward:
- Non-deterministic gates that work ~1/16 of the time
- Requires many ancilla photons and fast switching
Fusion-Based Quantum Computing
- Create small entangled states (resource states)
- Fuse them together via measurement
- Xanadu and PsiQuantum approach
Measurement-Based QC
Measurement-Based QC (MBQC): Create cluster states, compute via measurement.
Advantages
| Advantage | Details |
|---|---|
| Room temperature | No cooling required |
| Long coherence | Photons don’t interact with environment |
| Natural for communication | Travels at light speed in fiber/free space |
| High-fidelity 1Q gates | Essentially perfect linear optics |
| Networking | Ideal for quantum internet |
Challenges
| Challenge | Issue |
|---|---|
| Two-qubit gates | Non-deterministic, resource-intensive |
| Single-photon sources | Hard to make efficient, indistinguishable sources |
| Photon loss | Major error source |
| Detection efficiency | Need near-perfect detectors |
Hardware Components
| Component | Purpose |
|---|---|
| SPDC source | Generate photon pairs |
| Quantum dots | Single-photon sources |
| Beam splitters | Quantum interference |
| Single-photon detectors | Measure qubits |
| Waveguides | Route photons on-chip |
Major Players
- PsiQuantum: Million-qubit photonic computer goal
- Xanadu: Gaussian boson sampling, Borealis
- Quandela: European, integrated photonics
- ORCA Computing: Quantum memory approach
See also: Qubit, Quantum Teleportation
Neutral Atom
Qubits encoded in neutral atoms held by optical tweezers, offering large-scale arrays and reconfigurable connectivity.
Neutral atom quantum computers trap individual atoms using focused laser beams (optical tweezers) and encode qubits in their electronic states. They’ve emerged as a promising platform for large-scale quantum computing.
How It Works
Trapping
- Optical tweezers: Focused laser beams create potential wells
- Atoms are trapped at intensity maxima (for red-detuned light)
- Can create 2D or 3D arrays with hundreds of atoms
Qubit Encoding
Typically use:
- Ground state:
- Rydberg state: (highly excited state)
Or hyperfine states in the ground manifold.
Rydberg Interactions
The key to two-qubit gates: Rydberg blockade.
When one atom is in the Rydberg state:
- Nearby atoms are shifted out of resonance
- Creates effective long-range interaction
- Range: several micrometers
This enables fast two-qubit gates.
Operations
Single-Qubit Gates
- Global laser pulses for all qubits
- Local addressing for individual control
- Microwave or Raman transitions
Two-Qubit Gates
- Excite both atoms to Rydberg states
- Blockade creates controlled phase
- CZ gates demonstrated with high fidelity
Readout
- Fluorescence imaging
- Atoms in certain states scatter light, others don’t
- Camera captures array snapshot
Advantages
| Advantage | Details |
|---|---|
| Scalability | Arrays of 1000+ atoms demonstrated |
| Identical qubits | All atoms of same isotope are identical |
| Reconfigurable | Can rearrange atoms with tweezers |
| Long coherence | T2 > 1 second possible |
| All-to-all connectivity | Rydberg interactions can be long-range |
Specifications
| Parameter | Typical Value |
|---|---|
| Array size | 100-1000+ atoms |
| T1 time | Seconds |
| T2 time | Milliseconds to seconds |
| 1-qubit fidelity | >99.5% |
| 2-qubit fidelity | >99% |
| Gate time | ~μs |
Challenges
| Challenge | Issue |
|---|---|
| Atom loss | Atoms occasionally escape traps |
| Motional heating | Atoms gain energy |
| Crosstalk | Rydberg interactions with unintended neighbors |
| Imaging resolution | Must distinguish closely spaced atoms |
Major Players
- QuEra Computing: Boston-based, public access
- Pasqal: French, 2D and 3D arrays
- Atom Computing: Long coherence focus
- Many university groups: Harvard, Caltech, JILA
Unique Capabilities
Native Multi-Qubit Gates
Rydberg interactions can implement gates on 3+ qubits natively.
Analog Quantum Simulation
Arrays naturally simulate spin models.
Reconfigurability
Can physically move atoms to change connectivity mid-computation.
See also: Qubit, Trapped Ion, Quantum Simulation
Decoherence
The loss of quantum coherence due to interaction with the environment, and the primary obstacle to quantum computing.
Decoherence is the process by which a quantum system loses its quantum properties (superposition, entanglement) through interaction with its environment. It’s the primary obstacle to building useful quantum computers.
The Problem
An isolated quantum system maintains coherent superpositions:
But real systems interact with their environment. This interaction:
- Leaks quantum information to the environment
- Destroys superposition
- Turns pure states into mixed states
Two Types of Decoherence
Relaxation (T1 Decay)
Energy loss to the environment:
Think: Excited atom spontaneously emitting a photon.
Characterized by T1 time.
Dephasing (T2 Decay)
Loss of phase information without energy exchange:
Think: Random fluctuations in the qubit frequency.
Characterized by T2 time.
Relationship: (dephasing can’t be slower than relaxation).
Mathematical Picture
Initial state (pure):
After decoherence (mixed):
Off-diagonal terms (coherences) vanish.
Sources of Decoherence
| Source | Platform | Effect |
|---|---|---|
| Thermal photons | Superconducting | T1 decay |
| Material defects | Superconducting | T1 and T2 |
| Magnetic field noise | Ions, spins | T2 decay |
| Electric field noise | Charge qubits | T2 decay |
| Phonons | Solid state | T1 and T2 |
| Spontaneous emission | Atoms | T1 decay |
Why It’s Devastating
Circuit Depth Limit
If gate time 50 ns and 100 μs:
After ~2000 gates, coherence is lost.
Error Accumulation
Each gate has some error. Without error correction:
Decoherence makes larger over time.
Fighting Decoherence
| Strategy | How It Helps |
|---|---|
| Better isolation | Reduce environmental coupling |
| Lower temperature | Reduce thermal noise |
| Material purity | Fewer defects |
| Error correction | Fix errors as they occur |
| Dynamical decoupling | Pulse sequences refocus phase |
| Shorter algorithms | Finish before decoherence |
The Race
Quantum computing is a race between:
- Gate operations (doing useful work)
- Decoherence (destroying quantum information)
Success requires:
See also: T1 Time, T2 Time, Quantum Error Correction, Mixed State
T1 Time
The energy relaxation time: how long a qubit can stay in the excited state before decaying to ground.
T1 (also called the relaxation time or longitudinal relaxation time) measures how long a qubit maintains its energy before spontaneously releasing it to the environment.
Definition
If a qubit is prepared in , the probability of finding it still in after time :
T1 is the time constant for exponential decay to the ground state.
Physical Picture
A qubit in has higher energy than . Over time:
- Energy leaks to the environment (as photons, phonons, etc.)
- Qubit relaxes:
- This is irreversible (energy is gone)
Typical Values
| Platform | Typical T1 |
|---|---|
| Superconducting (transmon) | 50-500 μs |
| Trapped ion | Seconds to minutes |
| Neutral atom | Seconds |
| NV center | ~6 ms (room temp) |
| Silicon spin | >1 second |
Causes of T1 Decay
| Cause | Platform |
|---|---|
| Purcell decay | All (coupling to resonators) |
| Material defects | Superconducting |
| Dielectric loss | Superconducting |
| Spontaneous emission | Atoms, ions |
| Thermal photons | All (if not cold enough) |
Measurement
Inversion Recovery
- Prepare (with X gate)
- Wait time
- Measure
- Repeat for various
- Fit exponential to get T1
|1⟩ ──[wait t]── Measure → P(1) = e^{-t/T1}
Why T1 Matters
Information Loss
A qubit in superposition will have its component decay:
Circuit Depth Limit
Must complete computation before T1 decay destroys information.
Fundamental Bound on T2
T1 limits T2:
You can’t have coherence (T2) without energy (T1).
Improving T1
| Strategy | How It Helps |
|---|---|
| Lower temperature | Reduces thermal photons |
| Better materials | Fewer defect loss channels |
| Filter modes | Block energy loss paths |
| Longer wavelength | Lower photon emission rate |
| Purcell filtering | Suppress resonator decay |
Relation to T2
- T1: Energy relaxation (longitudinal)
- T2: Total coherence (includes dephasing)
- always
- when dephasing dominates
See also: T2 Time, Decoherence, Superconducting Qubit
T2 Time
The coherence time: how long a qubit maintains phase coherence in a superposition state.
T2 (also called the dephasing time or transverse relaxation time) measures how long a qubit can maintain a coherent superposition before the phase relationship is lost.
Definition
For a qubit in superposition :
The off-diagonal elements of the density matrix decay as:
T2 characterizes how quickly the qubit “forgets” its phase.
T2 vs T2*
| Metric | What It Measures | How to Measure |
|---|---|---|
| T2* | Includes static and slow noise | Free induction decay (Ramsey) |
| T2 (echo) | Removes slow noise | Hahn echo or dynamical decoupling |
T2* ≤ T2 ≤ 2T1
Physical Picture
A qubit in :
- Has a definite phase relationship between and
- Noise causes the phase to wander randomly
- After time T2, phase is completely randomized
- Interference effects are lost
Measurement: Ramsey Experiment
|0⟩ ── H ──[wait t]── H ── Measure
- Create with Hadamard
- Wait time (phase accumulates)
- Second Hadamard converts phase to amplitude
- Oscillations decay with time constant T2*
Measurement: Hahn Echo (T2)
|0⟩ ── H ──[t/2]── X ──[t/2]── H ── Measure
The X gate (π pulse) in the middle refocuses slow phase errors:
- Low-frequency noise is canceled out
- Gives longer T2 compared to T2*
Typical Values
| Platform | T2* | T2 (echo) |
|---|---|---|
| Superconducting | 20-100 μs | 50-200 μs |
| Trapped ion | ~ms | Seconds |
| NV center | ~μs | ~ms |
| Silicon spin | ~μs | ~ms |
Causes of T2 Decay
| Cause | Type | Refocusable? |
|---|---|---|
| Slow magnetic field noise | T2* | Yes |
| 1/f noise | T2* | Partially |
| Fast noise (white) | T2 | No |
| Photon shot noise | T2 | No |
| T1 decay | T2 | No |
Dynamical Decoupling
Extend T2 with more refocusing pulses:
── H ──[τ]── X ──[2τ]── X ──[2τ]── X ──[τ]── H ──
More pulses → better noise cancellation → longer effective T2.
Sequences: CPMG, XY4, XY8, etc.
Why T2 Matters
T2 is often the limiting factor:
- Determines maximum circuit depth
- Sets error rates for idling qubits
- Limits quantum memory duration
The Coherence Budget
If T2 = 100 μs and gate time = 50 ns:
This is why faster gates and longer T2 both help.
See also: T1 Time, Decoherence, Circuit Depth
Quantum Error Correction
Encoding quantum information redundantly to detect and correct errors. Required for fault-tolerant quantum computing.
Quantum Error Correction (QEC) protects quantum information from errors by encoding it across multiple physical qubits. It’s the key to building large-scale quantum computers.
The Challenge
Classical error correction: Copy the bit, use majority voting. But quantum has the no-cloning theorem, so you can’t copy!
Also, quantum errors are continuous (small rotations), not just bit flips.
How QEC Works
The Key Insights
- Don’t measure the qubits directly: That would collapse the state
- Measure the errors instead: Use “syndromes” that reveal error type
- Encode in subspace: Logical states span multiple physical qubits
- Errors become detectable: Errors move state out of code space
Basic Structure
Logical qubit = protected quantum information.
Types of Errors
All errors can be decomposed into Pauli errors:
| Error | Effect | Symbol |
|---|---|---|
| Bit flip | X | |
| Phase flip | Z | |
| Both | Bit + phase | Y |
Simple Example: 3-Qubit Code
Protects against single bit flip (X error):
Syndrome measurement:
- Measure parity of qubits 1,2 (without measuring individual values)
- Measure parity of qubits 2,3
| Syndrome | Error |
|---|---|
| 00 | None |
| 10 | Qubit 1 |
| 11 | Qubit 2 |
| 01 | Qubit 3 |
Real Codes
Surface Code
- Leading candidate for fault tolerance
- 2D layout, local measurements
- ~1000 physical qubits per logical qubit
Stabilizer Codes
- Mathematical framework for QEC
- Includes Steane code, CSS codes
Bacon-Shor Code
- Gauge qubits for simpler syndrome measurement
Color Codes
- Alternative to surface code with transversal gates
The Error Correction Cycle
1. Perform computation gates
2. Measure syndromes (detect errors)
3. Decode: Figure out what errors occurred
4. Correct: Apply corrections (or track in software)
5. Repeat
This cycle must be faster than errors accumulate.
Threshold Theorem
If physical error rate is below threshold :
- Logical error rate can be made arbitrarily small
- By using more physical qubits
For surface code:
The Overhead
| Error Rate | Physical Qubits per Logical |
|---|---|
| ~1,000 | |
| ~100 | |
| Target: | Many more |
This is why we need millions of physical qubits for useful quantum computers.
See also: Surface Code, Logical Qubit, Fault Tolerance, Fidelity
Surface Code
The leading quantum error correction code, using a 2D grid of qubits with local measurements.
The surface code is the most promising error correction code for near-term fault-tolerant quantum computers. It has high error thresholds and requires only nearest-neighbor interactions.
Structure
Qubits arranged in a 2D grid:
●───○───●───○───●
│ │ │ │ │
○───●───○───●───○
│ │ │ │ │
●───○───●───○───●
│ │ │ │ │
○───●───○───●───○
● = Data qubit
○ = Ancilla (measurement) qubit
Two types of measurements:
- X stabilizers: Detect Z errors (measure X on 4 neighbors)
- Z stabilizers: Detect X errors (measure Z on 4 neighbors)
Logical Qubit
A surface code “patch” encodes one logical qubit:
- Size: data qubits ( = code distance)
- Logical , : Defined by boundary conditions
- Logical X, Z: Chains of operators across the patch
Error Correction
Errors create pairs of “defects” in syndrome measurements:
0 0 0 0 0 0 0 0
0 0 0 0 → 1 0 0 0 (error here)
0 0 0 0 0 1 0 0
Decoder matches defects to identify errors. Most likely error pattern is corrected.
Code Distance
Distance = minimum number of errors to cause logical error.
| Distance | Data Qubits | Total Qubits |
|---|---|---|
| 3 | 9 | 17 |
| 5 | 25 | 49 |
| 7 | 49 | 97 |
| d | ~ | ~ |
Higher distance → better protection (but more qubits).
Error Threshold
The surface code has threshold .
If physical error rate :
Logical error rate decreases exponentially with distance!
Logical Operations
| Operation | Implementation |
|---|---|
| Logical X | Chain of X across patch |
| Logical Z | Chain of Z across patch |
| Logical H | Code deformation |
| Logical S | Magic state injection |
| Logical T | Magic state distillation |
| Logical CNOT | Lattice surgery |
Non-Clifford gates (T) are expensive and require “magic states.”
Lattice Surgery
Merge and split surface code patches to perform logical operations:
Patch A ──[merge]── Patch B
──[measure]──
──[split]──
This implements logical CNOT between patches.
Advantages
| Advantage | Details |
|---|---|
| High threshold | ~1%, achievable with current technology |
| Local operations | Only nearest-neighbor interactions |
| 2D layout | Matches chip architecture |
| Flexible | Can change code size dynamically |
Challenges
| Challenge | Issue |
|---|---|
| Qubit overhead | ~1000 physical per logical |
| Classical decoding | Must be fast enough |
| Magic states | T gates require distillation |
| Physical footprint | Large chips needed |
Current Status
- Google, IBM, Quantinuum demonstrating surface code
- Error rates approaching threshold
- Full fault-tolerant computation still requires significant scaling
See also: Quantum Error Correction, Logical Qubit, Fault Tolerance
Logical Qubit
A qubit encoded across multiple physical qubits for error protection. The basic unit of fault-tolerant quantum computing.
A logical qubit is quantum information encoded in a way that’s protected from errors. It’s built from multiple physical qubits using quantum error correction.
Physical vs Logical
| Aspect | Physical Qubit | Logical Qubit |
|---|---|---|
| Hardware | Single quantum system | Many physical qubits |
| Errors | Accumulated | Corrected |
| Lifetime | T1, T2 | Can be arbitrarily long |
| Operations | Native gates | Logical gates (more complex) |
Encoding
A logical qubit state is a superposition in a larger Hilbert space:
where and are encoded states spanning multiple physical qubits.
Example: 3-Qubit Code
3 physical qubits → 1 logical qubit
Surface Code
~ physical qubits → 1 logical qubit
Logical Operations
Operations on logical qubits are constructed from physical operations:
| Logical Gate | Physical Implementation |
|---|---|
| Logical X () | X on specific physical qubits |
| Logical Z () | Z on specific physical qubits |
| Logical CNOT | Lattice surgery, transversal gates |
| Logical T | Magic state injection |
The Overhead
The “cost” of a logical qubit depends on:
- Error correction code used
- Physical error rate
- Target logical error rate
| Physical Error Rate | Logical Qubits Needed |
|---|---|
| ~1000 physical per logical | |
| ~100 physical per logical |
Quality Metrics
Logical Error Rate
Probability of logical error per round:
Lower is better.
Logical Gate Fidelity
How well logical gates are implemented.
Why We Need Them
NISQ devices use physical qubits directly:
- Limited circuit depth
- Errors accumulate
- Results become noise
Logical qubits enable:
- Arbitrary circuit depth
- Reliable computation
- True quantum advantage
Current Status
- Demonstrations of logical qubits (Google, Quantinuum, IBM)
- Error rates not yet better than physical in useful regimes
- Key milestone: Logical qubit outperforming its physical components
See also: Physical Qubit, Quantum Error Correction, Surface Code, Fault-Tolerant Quantum Computing
Physical Qubit
An actual quantum system serving as a qubit, the raw hardware before error correction.
A physical qubit is a real quantum system that implements a qubit. It’s the actual hardware: a superconducting circuit, a trapped ion, a photon, etc.
Physical vs Logical
| Aspect | Physical Qubit | Logical Qubit |
|---|---|---|
| What it is | Real hardware | Encoded information |
| Errors | Subject to noise | Error-protected |
| Count | What vendors report | Much fewer |
| Quality | Varies (T1, T2, fidelity) | Target: very high |
Physical Qubit Technologies
| Technology | Physical System | Leader |
|---|---|---|
| Superconducting | Josephson junction circuit | IBM, Google |
| Trapped ion | Ionized atom | IonQ, Quantinuum |
| Neutral atom | Neutral atom in tweezer | QuEra, Pasqal |
| Photonic | Single photon | Xanadu, PsiQuantum |
| Quantum dot | Electron spin | Intel |
| NV center | Diamond defect | Various |
Quality Metrics
Coherence Times
Gate Fidelities
- Single-qubit gate: How accurately gates are applied (~99.9%)
- Two-qubit gate: Entangling gate accuracy (~99-99.9%)
Readout Fidelity
- How accurately the qubit state is measured (~99%)
Connectivity
- Which qubits can directly interact
- Nearest-neighbor vs all-to-all
Qubit Counts
When companies announce “X qubits,” they mean physical qubits:
| Company | Physical Qubits (2024-25) |
|---|---|
| IBM | 1000+ |
| 70+ | |
| IonQ | 30+ |
| Quantinuum | 32 |
Logical qubit counts are much smaller (single digits to tens).
The Scaling Challenge
Going from physical to useful logical qubits:
Physical qubits: 1,000
→ With error correction
Logical qubits: 1-10
→ For useful computation
Needed logical qubits: 100-10,000
→ Therefore need
Physical qubits: 100,000 - 10,000,000+
This is why quantum computing is hard.
Noise Sources
Every physical qubit platform has specific noise:
| Platform | Main Noise Sources |
|---|---|
| Superconducting | Material defects, thermal photons |
| Trapped ion | Laser noise, heating |
| Neutral atom | Atom loss, laser fluctuations |
| Photonic | Photon loss |
See also: Logical Qubit, Qubit, Decoherence, NISQ
Fault Tolerance
The ability to perform reliable computation despite faulty components. The goal of large-scale quantum computing.
Fault tolerance means a system can continue working correctly even when individual components fail. In quantum computing, it means performing accurate computation despite noisy qubits and gates.
The Problem
Quantum hardware is noisy:
- Gates have ~0.1-1% error rates
- Qubits lose coherence over time
- Measurements can be wrong
Without fault tolerance, errors accumulate faster than computation proceeds.
The Solution: Error Correction Done Right
Quantum error correction encodes information protectively, but the correction process itself uses noisy gates!
Fault tolerance ensures errors during correction don’t spread uncontrollably:
- Errors in one qubit don’t propagate to many
- Syndrome extraction doesn’t amplify errors
- The whole system is self-consistent
Fault-Tolerant Design Principles
1. Transversal Gates
Apply gates qubit-by-qubit across code blocks:
Block 1: ──U──U──U──
Block 2: ──U──U──U──
Errors stay localized.
2. Flag Qubits
Detect when errors might have spread during syndrome measurement.
3. Code Concatenation
Encode logical qubits within logical qubits:
Physical → Level 1 logical → Level 2 logical → ...
Each level suppresses errors further.
4. Careful Circuit Design
Every syndrome extraction circuit must be fault-tolerant.
Threshold Theorem
The foundation of fault tolerance:
If the physical error rate is below a threshold , logical error rates can be made arbitrarily small by using enough physical qubits.
where is related to code distance.
Threshold Values
| Code | Approximate Threshold |
|---|---|
| Surface code | ~1% |
| Steane code | ~0.01% |
| Concatenated codes | ~0.001% |
Surface code’s high threshold is why it’s favored.
Requirements for Fault Tolerance
| Requirement | Why |
|---|---|
| Error rate below threshold | Foundation of everything |
| Fast classical processing | Decode syndromes in real-time |
| Scalable architecture | Need millions of qubits |
| Mid-circuit measurement | Measure syndromes during computation |
| Low-latency feedback | Correct errors before they spread |
Current Status
| Milestone | Status |
|---|---|
| Demonstrate error correction | Done |
| Below-threshold error rates | Achieved for some gates |
| Logical qubit better than physical | Recent demonstrations |
| Useful fault-tolerant computation | Years away |
The Path Forward
Today: NISQ (noisy, no error correction)
↓
Next: Early fault tolerance (limited logical qubits)
↓
Goal: Full fault tolerance (arbitrary computation)
See also: Quantum Error Correction, Logical Qubit, Fault-Tolerant Quantum Computing
Quantum Speedup
When a quantum algorithm solves a problem asymptotically faster than the best known classical algorithm.
Quantum speedup refers to a quantum algorithm outperforming classical algorithms, either provably or based on current knowledge.
Types of Speedup
Proven Speedup
Quantum is provably faster (information-theoretic lower bound for classical):
| Problem | Classical | Quantum | Speedup |
|---|---|---|---|
| Unstructured search | Quadratic | ||
| Parity on OR tree | Quadratic |
Superpolynomial (Believed)
Based on computational complexity assumptions:
| Problem | Classical (best known) | Quantum |
|---|---|---|
| Factoring | ||
| Discrete log | ||
| Certain simulations | Exponential | Polynomial |
Polynomial Speedup
Faster by a polynomial factor:
| Problem | Classical | Quantum |
|---|---|---|
| Search | ||
| Collision finding |
The Speedup Landscape
Quantum Speedups
│
┌─────────┴─────────┐
│ │
Exponential Polynomial
│ │
Factoring Grover search
Simulation Many others
Period finding
Important Caveats
Input/Output
Many quantum speedups assume quantum input or only require quantum output:
- HHL: Exponential speedup… if you can prepare input and only need expectation values
- Speedup may vanish with classical I/O overhead
Constant Factors
Quantum algorithms often have large constant factors:
- Gate overhead
- Error correction costs
- Classical simulation may win for small problems
Problem Structure
Speedups exploit specific problem structure:
- Shor’s uses periodicity
- Grover’s uses function structure
- Not all problems have exploitable structure
No Speedup
Some problems have no quantum speedup:
- Sorting: Still
- General NP-complete: No known speedup
- PSPACE-complete: Quantum in PSPACE, so no exponential speedup
Measuring Real Speedup
For practical comparisons:
- Wall-clock time on real problems
- Include all overheads (error correction, I/O)
- Compare to best classical hardware and algorithms
Current status: Still demonstrating quantum advantage on artificial problems.
See also: Quantum Advantage, Grover’s Algorithm, Shor’s Algorithm
Quantum Supremacy
A quantum computer performing a task that’s practically impossible for any classical computer, regardless of usefulness.
Quantum supremacy (also called quantum computational supremacy) is the milestone where a quantum computer solves a problem that no classical computer can solve in reasonable time.
The Concept
- Not about usefulness: The problem can be artificial
- About capability: Demonstrating quantum beats classical
- Practical impossibility: Classical would take thousands/millions of years
Google’s 2019 Claim
Google’s Sycamore processor (53 qubits):
- Sampled from random quantum circuits
- ~200 seconds on quantum computer
- Claimed: 10,000 years on classical supercomputers
The Task
Sample outputs from a random quantum circuit. The output distribution is hard to simulate classically.
IBM’s Response
IBM claimed the classical simulation could be done in 2.5 days using different techniques (trading time for storage).
Why Random Circuit Sampling?
It’s designed to be:
- Hard for classical: Deep random circuits are hard to simulate
- Easy to verify: Statistical tests on output distribution
- Achievable now: Doesn’t need error correction
Controversy Over the Term
Many researchers prefer “quantum advantage” because:
- “Supremacy” has problematic connotations
- It doesn’t imply practical advantage
- “Advantage” is more accurate
Subsequent Claims
| Year | System | Task |
|---|---|---|
| 2019 | Google Sycamore | Random circuit sampling |
| 2020 | USTC Jiuzhang | Gaussian boson sampling |
| 2021 | USTC Zuchongzhi | Random circuit sampling |
| 2023+ | Various | Improved demonstrations |
Challenges to Claims
Classical algorithms keep improving:
- Tensor network methods
- GPU acceleration
- Approximate simulation
The bar for supremacy keeps moving!
What It Means (and Doesn’t)
Does Mean
- Quantum computers can do something classical can’t
- The physics works as expected
- Progress toward useful quantum computing
Doesn’t Mean
- Quantum computers are “better” at everything
- Useful problems are solvable
- Classical computers are obsolete
The Path Forward
Quantum supremacy (artificial tasks)
↓
[Quantum advantage](./quantum_advantage.md) (useful tasks)
↓
Practical quantum computing (real-world impact)
We’re still working on the middle step.
See also: Quantum Advantage, NISQ, Quantum Speedup
Quantum Advantage
A quantum computer solving a useful problem better than classical computers. The practical goal of quantum computing.
Quantum advantage (sometimes called quantum utility) is when a quantum computer outperforms classical computers on a problem that actually matters.
Advantage vs Supremacy
| Aspect | Quantum Supremacy | Quantum Advantage |
|---|---|---|
| Problem type | Can be artificial | Must be useful |
| Usefulness | Not required | Required |
| Verification | Statistical | Practical value |
| Status | Claimed (2019+) | Being pursued |
What “Advantage” Means
The quantum solution must be better in some meaningful way:
- Faster: Less time to solution
- Cheaper: Less resources (energy, hardware)
- Better quality: More accurate results
- Newly possible: Enables previously impossible computations
Candidate Applications
Near-Term (NISQ Era)
| Application | Status | Challenge |
|---|---|---|
| Quantum chemistry | Active research | Noise, accuracy |
| Optimization | Active research | Unclear advantage |
| Machine learning | Explored | Finding right problems |
| Finance | Explored | Defining clear advantage |
Long-Term (Fault-Tolerant)
| Application | Expected Impact |
|---|---|
| Cryptanalysis | Break RSA, ECC |
| Drug discovery | Molecular simulation |
| Materials design | Superconductors, catalysts |
| Optimization | Logistics, scheduling |
Challenges to Achieving Advantage
Moving Classical Target
Classical algorithms improve:
- Tensor networks for quantum simulation
- Better heuristics for optimization
- GPU acceleration
Fair Comparison
Must compare:
- Best quantum algorithm vs best classical
- On same problem and metric
- Including all overheads
Practical Constraints
- Error correction overhead
- Problem encoding costs
- Input/output bottlenecks
IBM’s “Utility” Experiments (2023)
IBM demonstrated:
- 127-qubit processor (Eagle)
- Physics simulation task
- Results matching classical (where possible)
- Extended beyond classical verification
Controversial whether this counts as “advantage.”
The Gap
Quantum supremacy: ✓ Demonstrated (artificial problems)
│
[We are here - trying to bridge the gap]
│
Quantum advantage: ? Not yet clear (useful problems)
When Will We See It?
Estimates vary widely:
- Optimistic: Already happening / imminent
- Moderate: 5-10 years
- Conservative: Requires fault tolerance
Depends heavily on what counts as “useful.”
See also: Quantum Supremacy, NISQ, Quantum Speedup, Quantum Simulation
NISQ
Noisy Intermediate-Scale Quantum: the current era of quantum computing with imperfect qubits and no error correction.
NISQ (Noisy Intermediate-Scale Quantum) describes the current generation of quantum computers. The term was coined by John Preskill in 2018.
What NISQ Means
Noisy
- Qubits have errors
- Gates are imperfect (~0.1-1% error)
- Coherence times limit computation depth
- No error correction
Intermediate-Scale
- 50-1000+ qubits (current devices)
- Too many to simulate classically
- Too few/noisy for fault tolerance
Quantum
- Genuinely quantum behavior
- Entanglement, superposition
- Potential for quantum advantage
NISQ Characteristics
| Property | NISQ Value |
|---|---|
| Qubits | 50-1000+ |
| 2-qubit gate fidelity | 99-99.9% |
| Circuit depth | ~100-1000 |
| Error correction | None |
| Computation time | Seconds to minutes |
NISQ Algorithms
Algorithms designed for noisy devices:
| Algorithm | Application |
|---|---|
| VQE | Chemistry |
| QAOA | Optimization |
| Quantum kernel methods | Machine learning |
| Variational classifiers | Classification |
Common theme: Variational/hybrid quantum-classical approaches.
NISQ Challenges
| Challenge | Impact |
|---|---|
| Noise accumulation | Limits circuit depth |
| Barren plateaus | Training difficulty |
| Limited connectivity | Extra SWAP gates |
| Calibration drift | Results vary over time |
The NISQ Question
Can NISQ devices achieve quantum advantage?
Optimistic view: Yes, for specific problems Pessimistic view: Noise always wins; need error correction
The jury is still out.
Post-NISQ: What’s Next?
NISQ (Now)
│
├── More qubits, better fidelity
│
↓
Early Fault-Tolerant (Coming)
│
├── Logical qubits demonstrated
├── Partial error correction
│
↓
Full Fault-Tolerant (Future)
│
└── Arbitrary computations
Why NISQ Matters
Even if NISQ can’t achieve full advantage:
- Learning to operate quantum systems
- Developing software and algorithms
- Understanding error behavior
- Training the workforce
- Building toward fault tolerance
NISQ Timeline
| Year | Milestone |
|---|---|
| 2016 | IBM 5-qubit cloud access |
| 2019 | Google 53-qubit “supremacy” |
| 2021 | 100+ qubits |
| 2023 | 1000+ qubits (IBM Condor) |
| 2024+ | Error correction demonstrations |
See also: VQE, QAOA, Quantum Advantage, Fault-Tolerant Quantum Computing
Fault-Tolerant Quantum Computing
Quantum computing with error correction, enabling arbitrarily long and accurate computations.
Fault-Tolerant Quantum Computing (FTQC) is the ultimate goal: quantum computers that can run arbitrarily long computations with arbitrarily low error rates.
NISQ vs FTQC
| Aspect | NISQ | FTQC |
|---|---|---|
| Error correction | None | Full |
| Qubits | Physical | Logical |
| Circuit depth | ~100-1000 | Unlimited |
| Error rate | ~0.1-1% per gate | ~ or better |
| Computation type | Limited | Universal |
Requirements for FTQC
1. Below-Threshold Error Rates
Physical error rate (threshold). For surface code:
2. Enough Physical Qubits
Ratio of physical to logical qubits:
- Near threshold: ~1000:1
- Below threshold: Can be ~100:1
3. Fast Classical Processing
- Decode error syndromes in real-time
- Faster than errors accumulate
- Challenging at scale
4. Mid-Circuit Measurement
- Measure syndromes during computation
- Feed-forward based on results
5. Scalable Architecture
- Millions of physical qubits eventually
- Manageable control systems
What FTQC Enables
| Application | Why FTQC Is Needed |
|---|---|
| Shor’s algorithm | Deep circuits, many operations |
| Large molecular simulations | Precision requires many gates |
| Arbitrary quantum algorithms | No depth limitations |
The FTQC Stack
┌────────────────────────────┐
│ Quantum Applications │
├────────────────────────────┤
│ Logical Operations │
├────────────────────────────┤
│ Error Correction │
│ (Surface code, etc.) │
├────────────────────────────┤
│ Physical Qubits │
│ (Hardware platform) │
└────────────────────────────┘
Resource Estimates
For useful computations:
| Task | Logical Qubits | Physical Qubits (estimated) |
|---|---|---|
| Factor 2048-bit RSA | ~4,000 | ~4-20 million |
| Simulate FeMoco | ~4,000 | ~4-20 million |
| Quantum chemistry | 100-1000 | 100K-10M |
Timeline
| Phase | Description | Timeline |
|---|---|---|
| Current | NISQ devices | Now |
| Near-term | Error correction demos | 2024-2026 |
| Medium-term | Early FTQC | 2027-2030 |
| Long-term | Full FTQC | 2030s+ |
Timelines are highly uncertain.
Current Progress
- Below-threshold operations: Demonstrated
- Logical qubits: Created, but not yet better than physical
- Logical operations: Demonstrated at small scale
- Full FTQC: Not yet achieved
The Challenge Ahead
Physical error rate: ~0.1% ✓ Achieved
↓
Logical error rate: ~10⁻⁶ ? In progress
↓
Required for utility: ~10⁻¹⁰ ✗ Far to go
Scaling from ~100 qubits to millions while maintaining quality.
See also: NISQ, Quantum Error Correction, Surface Code, Logical Qubit, Fault Tolerance
Variational Quantum Algorithm
A class of hybrid quantum-classical algorithms using parameterized circuits optimized by classical computers.
Variational Quantum Algorithms (VQAs) are the primary approach for near-term (NISQ) quantum computing. They combine quantum circuit evaluation with classical optimization.
The Structure
┌─────────────────────────────────────────────────────┐
│ Classical Computer │
│ ┌─────────────┐ ┌────────────┐ │
│ │ Optimizer │◄──── Cost ◄───────│ Measure │ │
│ │ (θ→θ') │ │ expectation│ │
│ └──────┬──────┘ └─────▲──────┘ │
│ │ New θ │ │
│ ▼ │ │
│ ┌──────────────────────────────────────────────┐ │
│ │ Quantum Computer │ │
│ │ |0⟩ ──[Ansatz U(θ)]──── Measure │ │
│ └──────────────────────────────────────────────┘ │
└─────────────────────────────────────────────────────┘
- Ansatz: Parameterized quantum circuit
- Evaluate: Measure expectation value
- Optimize: Classical optimizer updates
- Repeat: Until convergence
Key Components
Ansatz (Circuit Structure)
Parameterized circuit that can represent the solution:
| Ansatz Type | Description |
|---|---|
| Hardware-efficient | Uses native gates |
| Problem-inspired | Encodes domain knowledge |
| UCCSD | Chemistry-motivated |
Cost Function
What you’re minimizing:
Classical Optimizer
Updates parameters based on cost:
- Gradient-based: ADAM, L-BFGS
- Gradient-free: COBYLA, Nelder-Mead
- Quantum-aware: SPSA, QNG
Popular VQAs
| Algorithm | Application |
|---|---|
| VQE | Ground state energy |
| QAOA | Combinatorial optimization |
| VQLS | Linear systems |
| VQC | Classification |
| QGAN | Generative models |
Why Variational?
NISQ-Friendly
- Short circuits (low depth)
- Resilient to some noise
- Flexible structure
Trainable
- Classical optimizer handles complexity
- Adapts to problem instance
- No deep understanding needed
Challenges
| Challenge | Issue |
|---|---|
| Barren plateaus | Vanishing gradients |
| Noise | Corrupts cost landscape |
| Optimization | Local minima, long training |
| Expressibility | Can ansatz represent solution? |
| Trainability | Can we find the solution? |
Outlook
VQAs are pragmatic but limited:
- Good for exploring NISQ capabilities
- Unclear when they outperform classical
- May not scale to large problems
Bridge to fault-tolerant era or dead end? Jury’s out.
Parameterized Quantum Circuit
A quantum circuit with adjustable parameters, similar to a neural network layer.
A Parameterized Quantum Circuit (PQC), also called a quantum circuit ansatz or variational circuit, is a quantum circuit whose gates depend on tunable parameters.
Structure
Each layer contains:
- Fixed entangling gates (e.g., CNOT)
- Parameterized rotation gates (e.g., , )
Example Circuit
θ₁ θ₂ θ₃
|0⟩ ──Ry(θ₁)──●──Ry(θ₃)──●──
│ │
|0⟩ ──Ry(θ₂)──⊕──Ry(θ₄)──⊕──
Parameters are optimized.
Common Building Blocks
Rotation Gates
Entangling Layers
- CNOT ladders
- CZ layers
- All-to-all connectivity
Ansatz Types
| Type | Description | Use Case |
|---|---|---|
| Hardware-efficient | Native gates, easy to run | General |
| Heuristic | Alternating rotation + entangle | NISQ |
| Problem-specific | Encodes problem structure | Chemistry, optimization |
| UCCSD | Coupled cluster inspired | Quantum chemistry |
Training PQCs
Like neural networks, PQCs are trained by:
- Forward pass: Run circuit, measure expectation
- Compute cost: Compare to target
- Backward pass: Estimate gradients
- Update: Adjust parameters
Gradient Methods
Parameter shift rule:
Requires two circuit evaluations per parameter.
Expressibility
How much of Hilbert space can the PQC reach?
| More Expressive | Less Expressive |
|---|---|
| Can represent more states | Simpler optimization |
| More parameters | Fewer parameters |
| Deeper circuits | Shallower circuits |
| More barren plateaus | Easier training |
Trade-off between expressibility and trainability.
Applications
- VQE: Ansatz for molecular wave functions
- QAOA: Alternating problem/mixer layers
- QML: Feature maps and variational classifiers
Comparison to Neural Networks
| Aspect | PQC | Neural Network |
|---|---|---|
| Building blocks | Quantum gates | Linear + nonlinear |
| State space | Hilbert space | Real vectors |
| Gradients | Parameter shift | Backpropagation |
| Training | Similar challenges | Mature field |
See also: Variational Quantum Algorithm, Quantum Machine Learning
Quantum Machine Learning
Using quantum computers to enhance machine learning, from quantum speedups to variational classifiers.
Quantum Machine Learning (QML) explores the intersection of quantum computing and machine learning. It encompasses both quantum algorithms for ML tasks and ML techniques for quantum systems.
The Landscape
QML
│
┌────────────────┼────────────────┐
│ │ │
Quantum for ML Hybrid ML for Quantum
│ │ │
HHL, sampling VQC, QSVM Error mitigation,
speedups on NISQ circuit optimization
Quantum Speedups for ML
Theoretical Speedups
| Algorithm | Classical | Quantum | Caveat |
|---|---|---|---|
| HHL (linear systems) | Input/output issues | ||
| Recommendation | Dequantized | ||
| PCA | Data loading |
The Catch
Many quantum ML speedups have been “dequantized” (classical algorithms found that match them). Data loading often kills the advantage.
Near-Term QML (NISQ)
Variational Quantum Classifiers
Parameterized circuits as ML models:
Classical data → Encode → [VQC(θ)] → Measure → Prediction
Quantum Kernels
Use quantum circuits to compute kernel functions:
Then use classical SVM.
Quantum Neural Networks
Hybrid models combining quantum circuits with classical networks.
Challenges
| Challenge | Issue |
|---|---|
| Barren plateaus | Gradients vanish |
| Data encoding | Classical → quantum bottleneck |
| Readout | Limited information extraction |
| Advantage unclear | Classical ML is very good |
| Noise | Errors corrupt learning |
Where QML Might Help
Quantum Data
Learning from quantum systems (natural fit):
- Quantum chemistry
- Quantum sensor data
- Quantum state tomography
Structure in Data
Data with quantum-like structure:
- High-dimensional correlations
- Specific symmetries
Kernel Methods
Quantum kernels for specific data types.
Current State of the Field
Optimistic View
- Exploring what’s possible
- Some problems may suit quantum
- Foundation for future advantage
Skeptical View
- No clear advantage demonstrated
- Classical ML keeps improving
- Barren plateaus limit scaling
The Debate
“Will QML provide practical advantage?”
- Proponents: Right problem + right encoding = advantage
- Skeptics: Classical ML is hard to beat; overhead too high
The honest answer: We don’t know yet.
See also: Quantum Neural Network, Variational Quantum Algorithm
Quantum Neural Network
A parameterized quantum circuit used as a machine learning model, similar to a classical neural network.
A Quantum Neural Network (QNN) is a parameterized quantum circuit trained to perform machine learning tasks like classification or regression.
Structure
Input x → [Encoding S(x)] → [Variational U(θ)] → Measure → Output
1. Data Encoding
Convert classical data to quantum state:
Methods:
- Angle encoding: gates
- Amplitude encoding: Data in amplitudes
- Feature maps: More complex encodings
2. Variational Layers
Parameterized circuit with trainable parameters:
3. Measurement
Extract prediction from quantum state:
Training
Like classical neural networks:
- Forward pass (circuit execution)
- Compute loss
- Compute gradients (parameter shift rule)
- Update parameters
Architectures
Variational Quantum Classifier (VQC)
Binary classification:
Quantum Convolutional NN
Inspired by CNNs:
- Local operations (like convolutions)
- Pooling via measurement
Hybrid Networks
Classical layers + quantum layers:
Classical NN → Quantum circuit → Classical NN
Comparison to Classical NNs
| Aspect | Classical NN | QNN |
|---|---|---|
| State space | Real vectors | Hilbert space |
| Parameters | Weights | Gate angles |
| Nonlinearity | Activation functions | Measurement |
| Gradients | Backprop | Parameter shift |
| Scale | Billions of parameters | ~100s of parameters |
Advantages (Potential)
- Exponentially large state space
- Natural quantum data handling
- Possible expressibility advantages
- Different inductive biases
Challenges
| Challenge | Issue |
|---|---|
| Barren plateaus | Gradients vanish |
| Limited qubits | Small models only |
| Noise | Training is unstable |
| Advantage unclear | Classical NNs are powerful |
Current Applications
- Quantum chemistry (with quantum data)
- Small classification benchmarks
- Proof-of-concept demonstrations
- Hybrid quantum-classical models
Open Questions
- When do QNNs outperform classical?
- How to avoid barren plateaus?
- What problems are best suited?
- How do they scale?
See also: Parameterized Quantum Circuit, Quantum Machine Learning
Hamiltonian
The operator describing a quantum system’s total energy. Central to quantum simulation and variational algorithms.
The Hamiltonian is the fundamental operator in quantum mechanics. It describes the energy of a system and governs how it evolves in time.
Role in Quantum Mechanics
Energy Eigenvalues
Eigenstates have definite energies. The ground state has the lowest energy .
Time Evolution
Solutions:
In Quantum Computing
Hamiltonians appear everywhere:
Quantum Simulation
Simulating Hamiltonian evolution:
is a core quantum computing application.
Variational Algorithms
VQE finds ground state energy:
Adiabatic Computing
Evolve system under time-dependent Hamiltonian:
Pauli Decomposition
On qubits, any Hamiltonian can be written as:
where are Pauli strings (products of ).
Example (2 qubits):
Physical Examples
Transverse-Field Ising Model
Models magnetic systems, phase transitions.
Molecular Hamiltonian
Electronic structure of molecules.
Heisenberg Model
Spin-spin interactions.
Computing Expectation Values
Measuring requires measuring each Pauli term:
Many measurements needed (measurement overhead).
Why It Matters
Understanding Hamiltonians is essential for:
- Quantum chemistry applications
- Quantum simulation
- Variational algorithms
- Understanding hardware noise
- Designing error correction
See also: VQE, Quantum Simulation