A tale of quantum computers Alexandru Gheorghiu - - PowerPoint PPT Presentation

a tale of quantum computers
SMART_READER_LITE
LIVE PREVIEW

A tale of quantum computers Alexandru Gheorghiu - - PowerPoint PPT Presentation

A tale of quantum computers Alexandru Gheorghiu gheorghiuandru@gmail.com The University of Edinburgh I V N E U R S E I H T Y T O H F G R E U D B I N A long time ago in a galaxy not so far away... Quantum Mechanics


slide-1
SLIDE 1

A tale of quantum computers

Alexandru Gheorghiu gheorghiuandru@gmail.com

The University of Edinburgh

T H E U N I V E R S I T Y O F E D I N B U R G H

slide-2
SLIDE 2

A long time ago in a galaxy not so far away...

slide-3
SLIDE 3

Quantum Mechanics

slide-4
SLIDE 4

Quantum Mechanics

1900s-1930s Inception of Quantum Mechanics

slide-5
SLIDE 5

Quantum Mechanics

1900s-1930s Inception of Quantum Mechanics

slide-6
SLIDE 6

Quantum Mechanics

1900s-1930s Inception of Quantum Mechanics Extremely successful theory leading to many many discoveries...

slide-7
SLIDE 7

Quantum Computation

slide-8
SLIDE 8

Quantum Computation

While highly accurate, quantum systems are extremely complex

slide-9
SLIDE 9

Quantum Computation

While highly accurate, quantum systems are extremely complex Polarizations for system of 100 photons → 2100 variables!

slide-10
SLIDE 10

Quantum Computation

While highly accurate, quantum systems are extremely complex Polarizations for system of 100 photons → 2100 variables!

  • “What kind of computer are we

going to use to simulate physics?” Richard Feynman (1981)

slide-11
SLIDE 11

Quantum Computation

While highly accurate, quantum systems are extremely complex Polarizations for system of 100 photons → 2100 variables!

  • “What kind of computer are we

going to use to simulate physics?” Richard Feynman (1981)

  • Simulate physics = simulate QM
slide-12
SLIDE 12

Quantum Computation

While highly accurate, quantum systems are extremely complex Polarizations for system of 100 photons → 2100 variables!

  • “What kind of computer are we

going to use to simulate physics?” Richard Feynman (1981)

  • Simulate physics = simulate QM
  • Exponential overhead for classical

computers

slide-13
SLIDE 13

Quantum Computation

While highly accurate, quantum systems are extremely complex Polarizations for system of 100 photons → 2100 variables!

  • “What kind of computer are we

going to use to simulate physics?” Richard Feynman (1981)

  • Simulate physics = simulate QM
  • Exponential overhead for classical

computers

  • A task for super-computers
slide-14
SLIDE 14

Quantum Computation

While highly accurate, quantum systems are extremely complex Polarizations for system of 100 photons → 2100 variables!

  • “What kind of computer are we

going to use to simulate physics?” Richard Feynman (1981)

  • Simulate physics = simulate QM
  • Exponential overhead for classical

computers

  • A task for super-computers

Feynman’s idea: Make a computer with quantum computing elements!

slide-15
SLIDE 15

Brief history

slide-16
SLIDE 16

Brief history

  • 1980s Idea of quantum computation. Paul Benioff, Yuri

Manin, Richard Feynman, David Deutsch

slide-17
SLIDE 17

Brief history

  • 1980s Idea of quantum computation. Paul Benioff, Yuri

Manin, Richard Feynman, David Deutsch

  • 1990s Theory of efficient quantum simulation. Seth Lloyd
slide-18
SLIDE 18

Brief history

  • 1980s Idea of quantum computation. Paul Benioff, Yuri

Manin, Richard Feynman, David Deutsch

  • 1990s Theory of efficient quantum simulation. Seth Lloyd
  • 1994 Peter Shor’s algorithms for factoring and discrete log.

Quantum computers can break RSA, Diffie-Hellman, El Gamal, Elliptic Curve Cryptography and others

slide-19
SLIDE 19

Brief history

  • 1980s Idea of quantum computation. Paul Benioff, Yuri

Manin, Richard Feynman, David Deutsch

  • 1990s Theory of efficient quantum simulation. Seth Lloyd
  • 1994 Peter Shor’s algorithms for factoring and discrete log.

Quantum computers can break RSA, Diffie-Hellman, El Gamal, Elliptic Curve Cryptography and others

  • 2001 Experiment factors 15 using Shor’s algorithm
slide-20
SLIDE 20

Brief history

  • 1980s Idea of quantum computation. Paul Benioff, Yuri

Manin, Richard Feynman, David Deutsch

  • 1990s Theory of efficient quantum simulation. Seth Lloyd
  • 1994 Peter Shor’s algorithms for factoring and discrete log.

Quantum computers can break RSA, Diffie-Hellman, El Gamal, Elliptic Curve Cryptography and others

  • 2001 Experiment factors 15 using Shor’s algorithm
  • 2010s D-Wave, Google, IBM, NQIT and various universities

work on developing quantum computers

slide-21
SLIDE 21

Brief history

  • 1980s Idea of quantum computation. Paul Benioff, Yuri

Manin, Richard Feynman, David Deutsch

  • 1990s Theory of efficient quantum simulation. Seth Lloyd
  • 1994 Peter Shor’s algorithms for factoring and discrete log.

Quantum computers can break RSA, Diffie-Hellman, El Gamal, Elliptic Curve Cryptography and others

  • 2001 Experiment factors 15 using Shor’s algorithm
  • 2010s D-Wave, Google, IBM, NQIT and various universities

work on developing quantum computers How serious is the involvement in quantum computation?

slide-22
SLIDE 22

Who invests in Quantum Computing?

slide-23
SLIDE 23

Development and current status

slide-24
SLIDE 24

Other applications

slide-25
SLIDE 25

Other applications

  • Data mining and efficient unstructured querying
slide-26
SLIDE 26

Other applications

  • Data mining and efficient unstructured querying
  • Machine learning and quantum machine learning
slide-27
SLIDE 27

Other applications

  • Data mining and efficient unstructured querying
  • Machine learning and quantum machine learning
  • Efficient distributed computation
slide-28
SLIDE 28

Other applications

  • Data mining and efficient unstructured querying
  • Machine learning and quantum machine learning
  • Efficient distributed computation
  • Efficient communication
slide-29
SLIDE 29

Other applications

  • Data mining and efficient unstructured querying
  • Machine learning and quantum machine learning
  • Efficient distributed computation
  • Efficient communication
  • Data compression
slide-30
SLIDE 30

Other applications

  • Data mining and efficient unstructured querying
  • Machine learning and quantum machine learning
  • Efficient distributed computation
  • Efficient communication
  • Data compression
  • Quantum cryptography (more on that later)
slide-31
SLIDE 31

Other applications

  • Data mining and efficient unstructured querying
  • Machine learning and quantum machine learning
  • Efficient distributed computation
  • Efficient communication
  • Data compression
  • Quantum cryptography (more on that later)

“For me, the single most important application of a quantum computer is disproving the people who said it’s impossible. The rest is just icing on the cake” Scott Aaronson

slide-32
SLIDE 32

Misconceptions

slide-33
SLIDE 33

Misconceptions

slide-34
SLIDE 34

How do they work?

slide-35
SLIDE 35

How do they work?

slide-36
SLIDE 36

How do they work?

slide-37
SLIDE 37

How do they work?

slide-38
SLIDE 38

How do they work?

Bits: 0, 1 Qubits: |0, |1

slide-39
SLIDE 39

How do they work?

Bits: 0, 1 Qubits: |0, |1 General qubit: |ψ = α |0 + β |1

slide-40
SLIDE 40

How do they work?

Bits: 0, 1 Qubits: |0, |1 General qubit: |ψ = α |0 + β |1 α, β are amplitudes (complex numbers)

slide-41
SLIDE 41

How do they work?

Bits: 0, 1 Qubits: |0, |1 General qubit: |ψ = α |0 + β |1 α, β are amplitudes (complex numbers) |α|2 probability of observing |0, |β|2 probability of observing |1 |α|2 + |β|2 = 1

slide-42
SLIDE 42

How to make them?

slide-43
SLIDE 43

How to make them?

  • Atom energy levels +

magnetic fields

slide-44
SLIDE 44

How to make them?

  • Atom energy levels +

magnetic fields

  • Photon polarization +

crystals

slide-45
SLIDE 45

How to make them?

  • Atom energy levels +

magnetic fields

  • Photon polarization +

crystals

  • Photon paths + mirrors and

crystals

slide-46
SLIDE 46

How to make them?

  • Atom energy levels +

magnetic fields

  • Photon polarization +

crystals

  • Photon paths + mirrors and

crystals

  • Electron spin + magnetic

fields

slide-47
SLIDE 47

How to make them?

  • Atom energy levels +

magnetic fields

  • Photon polarization +

crystals

  • Photon paths + mirrors and

crystals

  • Electron spin + magnetic

fields

  • Hybrid systems and others...
slide-48
SLIDE 48

Summary

slide-49
SLIDE 49

Summary

  • State

Classical

  • Bits (0, 1)

Quantum

  • Qubits (α |0 + β |1)
slide-50
SLIDE 50

Summary

  • State
  • Computation

process Classical

  • Bits (0, 1)
  • Logical (AND, OR,

NAND) Quantum

  • Qubits (α |0 + β |1)
  • Unitary

(interference)

slide-51
SLIDE 51

Summary

  • State
  • Computation

process

  • Realization

Classical

  • Bits (0, 1)
  • Logical (AND, OR,

NAND)

  • Voltage, light

intensity etc Quantum

  • Qubits (α |0 + β |1)
  • Unitary

(interference)

  • Atomic energy levels,

polarization etc

slide-52
SLIDE 52

How will they look?

slide-53
SLIDE 53

Challenges

slide-54
SLIDE 54

Challenges

  • Maintaining superposition

states (coherence)

slide-55
SLIDE 55

Challenges

  • Maintaining superposition

states (coherence)

  • Interaction with the

environment → decoherence

slide-56
SLIDE 56

Challenges

  • Maintaining superposition

states (coherence)

  • Interaction with the

environment → decoherence

  • Noise
slide-57
SLIDE 57

Challenges

  • Maintaining superposition

states (coherence)

  • Interaction with the

environment → decoherence

  • Noise
  • Fault tolerance
slide-58
SLIDE 58

Challenges

  • Maintaining superposition

states (coherence)

  • Interaction with the

environment → decoherence

  • Noise
  • Fault tolerance
  • Scalability
slide-59
SLIDE 59

Challenges

  • Maintaining superposition

states (coherence)

  • Interaction with the

environment → decoherence

  • Noise
  • Fault tolerance
  • Scalability
  • Only technological

limitations

slide-60
SLIDE 60

State of the art

slide-61
SLIDE 61

State of the art

  • 2001 Shor’s algorithm factors 15 on 7 qubits
slide-62
SLIDE 62

State of the art

  • 2001 Shor’s algorithm factors 15 on 7 qubits
  • 2011 Shor’s algorithm factors 21
slide-63
SLIDE 63

State of the art

  • 2001 Shor’s algorithm factors 15 on 7 qubits
  • 2011 Shor’s algorithm factors 21
  • 2012 Universal quantum computation on 2 fault tolerant

qubits

slide-64
SLIDE 64

State of the art

  • 2001 Shor’s algorithm factors 15 on 7 qubits
  • 2011 Shor’s algorithm factors 21
  • 2012 Universal quantum computation on 2 fault tolerant

qubits

  • 2014-2015 Qubits and gates in silicon chips
slide-65
SLIDE 65

State of the art

  • 2001 Shor’s algorithm factors 15 on 7 qubits
  • 2011 Shor’s algorithm factors 21
  • 2012 Universal quantum computation on 2 fault tolerant

qubits

  • 2014-2015 Qubits and gates in silicon chips
  • 2015 D-Wave 2X, 1000 qubits, optimization problems, no

fault tolerance

slide-66
SLIDE 66

State of the art

  • 2001 Shor’s algorithm factors 15 on 7 qubits
  • 2011 Shor’s algorithm factors 21
  • 2012 Universal quantum computation on 2 fault tolerant

qubits

  • 2014-2015 Qubits and gates in silicon chips
  • 2015 D-Wave 2X, 1000 qubits, optimization problems, no

fault tolerance

  • 2020 NQIT, Q20:20, fault tolerant (20 qubits), scalable
slide-67
SLIDE 67

State of the art

  • 2001 Shor’s algorithm factors 15 on 7 qubits
  • 2011 Shor’s algorithm factors 21
  • 2012 Universal quantum computation on 2 fault tolerant

qubits

  • 2014-2015 Qubits and gates in silicon chips
  • 2015 D-Wave 2X, 1000 qubits, optimization problems, no

fault tolerance

  • 2020 NQIT, Q20:20, fault tolerant (20 qubits), scalable
  • And others...
slide-68
SLIDE 68

Towards quantum secure cryptography

slide-69
SLIDE 69

Towards quantum secure cryptography

Will quantum computers pose a threat to cryptography?

slide-70
SLIDE 70

Towards quantum secure cryptography

Will quantum computers pose a threat to cryptography? Existing crypto based on unproven hard problems (factoring, discrete log etc)

slide-71
SLIDE 71

Towards quantum secure cryptography

Will quantum computers pose a threat to cryptography? Existing crypto based on unproven hard problems (factoring, discrete log etc) How long do you want your data to stay secure? (∼ 20 years)

slide-72
SLIDE 72

Towards quantum secure cryptography

Will quantum computers pose a threat to cryptography? Existing crypto based on unproven hard problems (factoring, discrete log etc) How long do you want your data to stay secure? (∼ 20 years) How long to make the Internet quantum secure? (∼ 20 years)

slide-73
SLIDE 73

Towards quantum secure cryptography

Will quantum computers pose a threat to cryptography? Existing crypto based on unproven hard problems (factoring, discrete log etc) How long do you want your data to stay secure? (∼ 20 years) How long to make the Internet quantum secure? (∼ 20 years) What about problems that are hard for quantum computers?

slide-74
SLIDE 74

Towards quantum secure cryptography

Will quantum computers pose a threat to cryptography? Existing crypto based on unproven hard problems (factoring, discrete log etc) How long do you want your data to stay secure? (∼ 20 years) How long to make the Internet quantum secure? (∼ 20 years) What about problems that are hard for quantum computers? “Even if a classical protocol is proven secure based on the hardness

  • f some problem, and that problem is hard even for quantum

computers, we have no guarantee that the protocol is secure against quantum computers.” Dominique Unruh

slide-75
SLIDE 75

Quantum Cryptography

slide-76
SLIDE 76

Quantum Cryptography

  • Idea: do not base security
  • n computational problems,

but on the laws of physics

slide-77
SLIDE 77

Quantum Cryptography

  • Idea: do not base security
  • n computational problems,

but on the laws of physics

  • Assuming quantum

mechanics is correct, unconditional security

slide-78
SLIDE 78

Quantum Cryptography

  • Idea: do not base security
  • n computational problems,

but on the laws of physics

  • Assuming quantum

mechanics is correct, unconditional security

  • Adversary with unlimited

power cannot break the encryption

slide-79
SLIDE 79

Quantum Cryptography

  • Idea: do not base security
  • n computational problems,

but on the laws of physics

  • Assuming quantum

mechanics is correct, unconditional security

  • Adversary with unlimited

power cannot break the encryption

  • First development: quantum

money scheme

slide-80
SLIDE 80

Quantum Cryptography

  • Idea: do not base security
  • n computational problems,

but on the laws of physics

  • Assuming quantum

mechanics is correct, unconditional security

  • Adversary with unlimited

power cannot break the encryption

  • First development: quantum

money scheme

  • Quantum key distribution
slide-81
SLIDE 81

Quantum Cryptography

  • Idea: do not base security
  • n computational problems,

but on the laws of physics

  • Assuming quantum

mechanics is correct, unconditional security

  • Adversary with unlimited

power cannot break the encryption

  • First development: quantum

money scheme

  • Quantum key distribution
  • Uses one-time pad
slide-82
SLIDE 82

One-time pad

slide-83
SLIDE 83

One-time pad

M1

slide-84
SLIDE 84

One-time pad

M1 ⊕ Key

slide-85
SLIDE 85

One-time pad

M1 ⊕ Key = C1

slide-86
SLIDE 86

One-time pad

M1 ⊕ Key = C1 C1 ⊕ Key = M1

slide-87
SLIDE 87

One-time pad

slide-88
SLIDE 88

One-time pad

M2 ⊕ Key = C2

slide-89
SLIDE 89

One-time pad

M2 ⊕ Key = C2 C1 ⊕ C2 = M1 ⊕ M2

slide-90
SLIDE 90

Quantum Key Distribution (QKD)

slide-91
SLIDE 91

Quantum Key Distribution (QKD)

Make two parties share a random secret key

slide-92
SLIDE 92

Quantum Key Distribution (QKD)

Make two parties share a random secret key Arbitrary size key → arbitrary number of messages

slide-93
SLIDE 93

Quantum Key Distribution (QKD)

Make two parties share a random secret key Arbitrary size key → arbitrary number of messages Communication bandwidth limited by key rate

slide-94
SLIDE 94

Quantum Key Distribution (QKD)

Make two parties share a random secret key Arbitrary size key → arbitrary number of messages Communication bandwidth limited by key rate

  • BB84
slide-95
SLIDE 95

Quantum Key Distribution (QKD)

Make two parties share a random secret key Arbitrary size key → arbitrary number of messages Communication bandwidth limited by key rate

  • BB84
  • Uncertainty

principle

slide-96
SLIDE 96

Quantum Key Distribution (QKD)

Make two parties share a random secret key Arbitrary size key → arbitrary number of messages Communication bandwidth limited by key rate

  • BB84
  • Uncertainty

principle

  • No cloning
slide-97
SLIDE 97

Quantum Key Distribution (QKD)

Make two parties share a random secret key Arbitrary size key → arbitrary number of messages Communication bandwidth limited by key rate

  • BB84
  • Uncertainty

principle

  • No cloning
  • Unconditional

security (based

  • n QM)
slide-98
SLIDE 98

Quantum Key Distribution (QKD)

slide-99
SLIDE 99

Quantum Key Distribution (QKD)

What about exploiting the implementation?

slide-100
SLIDE 100

Quantum Key Distribution (QKD)

What about exploiting the implementation? Not a problem!

slide-101
SLIDE 101

Quantum Key Distribution (QKD)

What about exploiting the implementation? Not a problem!

  • Device

independence

slide-102
SLIDE 102

Quantum Key Distribution (QKD)

What about exploiting the implementation? Not a problem!

  • Device

independence

  • QKD with

untrusted devices

slide-103
SLIDE 103

Quantum Key Distribution (QKD)

What about exploiting the implementation? Not a problem!

  • Device

independence

  • QKD with

untrusted devices

  • Quantum

entanglement

slide-104
SLIDE 104

Quantum Key Distribution (QKD)

What about exploiting the implementation? Not a problem!

  • Device

independence

  • QKD with

untrusted devices

  • Quantum

entanglement

  • Testing for

correlations

slide-105
SLIDE 105

Quantum Key Distribution (QKD)

What about exploiting the implementation? Not a problem!

  • Device

independence

  • QKD with

untrusted devices

  • Quantum

entanglement

  • Testing for

correlations

  • Difficult to

realize

slide-106
SLIDE 106

What you can buy today

slide-107
SLIDE 107

What you can buy today

slide-108
SLIDE 108

State of the art

slide-109
SLIDE 109

State of the art

  • QKD backbone
  • To be completed 2016
  • QuantumCTek
  • Commercial and government

use

slide-110
SLIDE 110

State of the art

  • QKD backbone
  • To be completed 2016
  • QuantumCTek
  • Commercial and government

use

  • QKD network
  • To be completed
  • Battelle and ID Quantique
  • Commercial and government

use

slide-111
SLIDE 111

Other uses of Quantum Cryptography

slide-112
SLIDE 112

Other uses of Quantum Cryptography

  • Secure authentication
slide-113
SLIDE 113

Other uses of Quantum Cryptography

  • Secure authentication
  • Digital signatures
slide-114
SLIDE 114

Other uses of Quantum Cryptography

  • Secure authentication
  • Digital signatures
  • Quantum money
slide-115
SLIDE 115

Other uses of Quantum Cryptography

  • Secure authentication
  • Digital signatures
  • Quantum money
  • Secure delegated (quantum) computation
slide-116
SLIDE 116

Other uses of Quantum Cryptography

  • Secure authentication
  • Digital signatures
  • Quantum money
  • Secure delegated (quantum) computation
  • Secure multi-party (quantum) computation
slide-117
SLIDE 117

Other uses of Quantum Cryptography

  • Secure authentication
  • Digital signatures
  • Quantum money
  • Secure delegated (quantum) computation
  • Secure multi-party (quantum) computation
  • Relativistic quantum cryptography
slide-118
SLIDE 118

Other uses of Quantum Cryptography

  • Secure authentication
  • Digital signatures
  • Quantum money
  • Secure delegated (quantum) computation
  • Secure multi-party (quantum) computation
  • Relativistic quantum cryptography

“In the next 6-24 months, organizations without a well articulated quantum risk management plan will loose business to organizations that do” Michele Mosca (October 2015)

slide-119
SLIDE 119

Recommended reading

slide-120
SLIDE 120

Recommended technical reading

slide-121
SLIDE 121

Conclusions

  • Quantum computers would be extremely useful
  • They can solve problems efficiently using interference
  • Recently, lots of investments and interest
  • Poses a risk to existing cryptography
  • Quantum cryptography to the rescue
  • Unconditional security and device independence
  • Commercial systems already exist
slide-122
SLIDE 122

Conclusions

  • Quantum computers would be extremely useful
  • They can solve problems efficiently using interference
  • Recently, lots of investments and interest
  • Poses a risk to existing cryptography
  • Quantum cryptography to the rescue
  • Unconditional security and device independence
  • Commercial systems already exist

There’s still a lot of work to be done...

slide-123
SLIDE 123

Conclusions

  • Quantum computers would be extremely useful
  • They can solve problems efficiently using interference
  • Recently, lots of investments and interest
  • Poses a risk to existing cryptography
  • Quantum cryptography to the rescue
  • Unconditional security and device independence
  • Commercial systems already exist

There’s still a lot of work to be done... “I don’t pretend we have all the answers. But the questions are certainly worth thinking about.” Arthur C. Clarke

slide-124
SLIDE 124

Thank you!

slide-125
SLIDE 125

Reading material and references

  • Quantum Computing since Democritus -

http://www.scottaaronson.com/democritus/

  • Quantum Computation and Quantum Information -

http://www.amazon.com/ Quantum-Computation-Information-Anniversary-Edition/ dp/1107002176

  • Scott Aaronson’s blog -

http://www.scottaaronson.com/blog/

  • Michael Nielsen’s blog -

http://michaelnielsen.org/blog/

  • Nice paper on quantum crypto - http://www.nature.com/

nature/journal/v507/n7493/full/nature13132.html

  • Quantum Computing for Computer Scientists -

http://www.amazon.co.uk/ Quantum-Computing-Computer-Scientists-Yanofsky/ dp/0521879965/ref=sr_1_1?ie=UTF8&qid=1451928677& sr=8-1&keywords=quantum+computing+for+computer+ scientists

slide-126
SLIDE 126

References

  • Feynman’s original paper on QC - https://www.cs.

berkeley.edu/~christos/classics/Feynman.pdf

  • Efficient quantum simulation, Seth Lloyd - https://www.

sciencemag.org/content/273/5278/1073.abstract

  • Experiment to factor 15 - http://www.nature.com/

nature/journal/v414/n6866/full/414883a.html

  • Experiment to factor 21 - http://www.nature.com/

nphoton/journal/v6/n11/full/nphoton.2012.259.html

  • Universal QC with 2 qubits - http://www.nature.com/

nature/journal/v484/n7392/abs/nature10900.html

  • QC in silicon - http://www.nature.com/nature/journal/

v526/n7573/full/nature15263.html

  • NQIT and Q20:20 - http://nqit.ox.ac.uk/technologies
  • D-Wave - http://www.dwavesys.com/
slide-127
SLIDE 127

References

  • Source for Dominique Unruh’s quote on slide 19 -

https://eprint.iacr.org/2010/212.pdf

  • Michele Mosca on the quantum risk to cryptography -

https://www.youtube.com/watch?v=eEn8LT119bY

  • Review of quantum cryptography - http://journals.aps.
  • rg/rmp/abstract/10.1103/RevModPhys.74.145
  • Device independence - https:

//www.icfo.eu/images/publications/J07-045.pdf

  • Quantum machine learning -

http://www.scottaaronson.com/papers/qml.pdf

  • List of existing quantum algorithms -

http://math.nist.gov/quantum/zoo/

  • Workshop on quantum computation - http:

//workshop.rosedu.org/2015/sesiuni/quantum-comp

slide-128
SLIDE 128

References

  • Image on slide 3 (Solvay conference) -

https://en.wikipedia.org/wiki/File: Solvay_conference_1927.jpg

  • Image on slide 4 (Richard P. Feynman) -

https://upload.wikimedia.org/wikipedia/en/4/42/ Richard_Feynman_Nobel.jpg

  • Image on slide 7 (development ladder) - M.H. Devoret, R.J.

Schoelkopf, Superconducting Circuits for Quantum Information: An Outlook, Science 8 March 2013, Vol. 339,

  • no. 6124, pp. 1169-1174, DOI:10.1126/science.1231930
  • Image on slide 9 (SMBC comic) -

http://www.smbc-comics.com/?id=1623

  • Image on slide 11 (comparison) -

http://download2.cerimes.fr/canalu/documents/ fuscia/quantum.turing.test_13249/kashefi.pdf

slide-129
SLIDE 129

References

  • Image on slide 12 (atom energy levels) - https:

//dr282zn36sxxg.cloudfront.net/datastreams/f-d% 3A96a9d2797f6e33d4a10187aeef0abdb52be51b8602c4fda58fa9768d% 2BIMAGE_THUMB_POSTCARD%2BIMAGE_THUMB_POSTCARD.1

  • Image on slide 12 (photon polarization) -

https://physics.aps.org/articles/v5/86

  • Image on slide 12 (optical paths) -

https://www.quora.com/ What-is-a-physical-example-of-a-unitary-operator-in-quantum- answer/Bingjie-Wang-2

  • Image on slide

14 (D-Wave chip) - http://www.aboutai.com/2014/07/11/ how-d-wave-built-quantum-computing-hardware-for-the-next-

  • Image on slide 14 (Optics) -

http://www.ichf.edu.pl/res/CL/research_en.html

  • Image on slide 14 (Optical chip) - http://www.bristol.ac.

uk/news/2015/april/photonic-chip.html

slide-130
SLIDE 130

References

  • Image on slide 14 (Ion trap top) - http://jqi.umd.edu/

sites/default/files/images/razoriontrap-001.jpg

  • Image on slide 14 (Ion trap bottom) - http://www.nist.

gov/pml/div688/microwave-quantum-081011.cfm

  • Image on slide 18 (Huge atom) -

http://www.economist.com/node/6877077

  • Image on slide 18 (quantum money) - https://a248.e.

akamai.net/f/1097/1823/7m/deliveryimages.acm.org/ 10.1145/2250000/2240258/figs/f2.jpg

  • Image on slide 19 (Death star) -

https://techrepublic-a.akamaihd.net/hub/i/2015/ 05/07/7663b419-f49c-11e4-940f-14feb5cc3d2a/death_ star_schematic.gif

  • Image on slide 20 (Lightsaber) -

http://vignette3.wikia.nocookie.net/starwars/ images/4/41/KunLightsaberSchematic.jpg/revision/ latest?cb=20110717211606

slide-131
SLIDE 131

References

  • Image on slide 21 (BB84) - http:

//swissquantum.idquantique.com/IMG/jpg/bb84.jpg

  • Image on slide 22 (Device independence) -

https://physics.aps.org/articles/v7/99

  • Image on slide 23 (idquantique website) -

http://www.idquantique.com/quantum-safe-crypto/

  • Image on slide 24 (QKD rack) - http://www.vad1.com/

photo/stock/a299-3-boxes-labeled.pdf

  • Image on slide 25 (China network) - http:

//2014.qcrypt.net/wp-content/uploads/Zhao.pdf

  • Image on slide 25 (US network) -

http://www.theverge.com/2014/11/18/7214483/ quantum-networks-expand-across-three-continents