A deceptive step towards quantum speedup detection
نویسندگان
چکیده
منابع مشابه
Quantum speedup by quantum annealing.
We study the glued-trees problem from A. M. Childs, R. Cleve, E. Deotto, E. Farhi, S. Gutmann, and D. Spielman, in Proceedings of the 35th Annual ACM Symposium on Theory of Computing (ACM, San Diego, CA, 2003), p. 59. in the adiabatic model of quantum computing and provide an annealing schedule to solve an oracular problem exponentially faster than classically possible. The Hamiltonians involve...
متن کاملQuantum speedup in stoquastic adiabatic quantum computation
Quantum computation provides exponential speedup for solving certain mathematical problems against classical computers. Motivated by current rapid experimental progress on quantum computing devices, various models of quantum computation have been investigated to show quantum computational supremacy. At a commercial side, quantum annealing machine realizes the quantum Ising model with a transver...
متن کاملDefining and detecting quantum speedup
Troels F. Rønnow, Zhihui Wang, Joshua Job, Sergio Boixo, Sergei V. Isakov, David Wecker, John M. Martinis, Daniel A. Lidar, and Matthias Troyer∗1 Theoretische Physik, ETH Zurich, 8093 Zurich, Switzerland Department of Chemistry and Center for Quantum Information Science & Technology, University of Southern California, Los Angeles, California 90089, USA Department of Physics and Center for Quant...
متن کاملMeasures of Quantum Computing Speedup
SFI Working Papers contain accounts of scienti5ic work of the author(s) and do not necessarily represent the views of the Santa Fe Institute. We accept papers intended for publication in peer-‐reviewed journals or proceedings volumes, but not papers that have already appeared in print. Except for papers by our external faculty, papers must be based on work done at SFI, inspired by an invited v...
متن کاملFrom Quantum to Wireless: A Step Towards Physical-Layer Security
Quantum information theory is widely recognized as an arguably powerful paradigm for physically secure communications. In general, any attack that an eavesdropper, say Eve, perpetrates in order to gain access to messages or keys exchanged by the legitimate parties, say Alice and Bob, will result in disturbances to quantum states that can be detected with overwhelming probability — security is g...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Quantum Science and Technology
سال: 2018
ISSN: 2058-9565
DOI: 10.1088/2058-9565/aac8b2