Comment on Demonstrations of Shor's Algorithm in the Past Decades

نویسندگان

  • Zhengjun Cao
  • Zhenfu Cao
  • Lihua Liu
چکیده

We remark that the experimental demonstrations of Shor’s algorithm in the past decades are falsely claimed and flawed, because they had used too less qubits in the first quantum register to accomplish the step of Continued Fraction Expansion in Shor’s algorithm. More worse, the amount of qubits used in some experiments are too less to represent all residues modulo n, which means that the number n cannot be truly involved in the related computations.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Remarks on Quantum Modular Exponentiation and Some Experimental Demonstrations of Shor's Algorithm

An efficient quantum modular exponentiation method is indispensible for Shor’s factoring algorithm. But we find that all descriptions presented by Shor, Nielsen and Chuang, Markov and Saeedi, et al., are flawed. We also remark that some experimental demonstrations of Shor’s algorithm are misleading, because they violate the necessary condition that the selected number q = 2s, where s is the num...

متن کامل

Priority Setting: Right Answer to a Far Too Narrow Question?; Comment on “Global Developments in Priority Setting in Health”

In their recent editorial, Baltussen and colleagues provide a concise summary of the prevailing discourse on priority-setting in health policy. Their perspective is entirely consistent with current practice, yet they unintentionally demonstrate the narrowness and moral precariousness of that discourse and practice. I respond with demonstrations of the importance of ‘interrogating scarcity’ in a...

متن کامل

Neoliberalism 4.0: The Rise of Illiberal Capitalism; Comment on “How Neoliberalism Is Shaping the Supply of Unhealthy Commodities and What This Means for NCD Prevention”

Neoliberal logic and institutional lethargy may well explain part of the reason why governments pay little attention to how their economic and development policies negatively affect health outcomes associated with the global diffusion of unhealthy commodities. In calling attention to this the authors encourage health advocates to consider strategies other than just regu...

متن کامل

An Optimization K-Modes Clustering Algorithm with Elephant Herding Optimization Algorithm for Crime Clustering

The detection and prevention of crime, in the past few decades, required several years of research and analysis. However, today, thanks to smart systems based on data mining techniques, it is possible to detect and prevent crime in a considerably less time. Classification and clustering-based smart techniques can classify and cluster the crime-related samples. The most important factor in the c...

متن کامل

A Secure Routing Algorithm for Underwater Wireless Sensor Networks

Recently, underwater Wireless Sensor Networks (UWSNs) attracted the interest of many researchers and the past three decades have held the rapid progress of underwater acoustic communication. One of the major problems in UWSNs is how to transfer data from the mobile node to the base stations and choosing the optimized route for data transmission. Secure routing in UWSNs is necessary for packet d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2015  شماره 

صفحات  -

تاریخ انتشار 2015