Category Archives: Quantum Computing

Device Puts Photons in the Fast Lane – Optics & Photonics News

An artists rendering of the nanoscale opto-electro-mechanical switch recently demonstrated by a team of scientists from ETH Zurich, NIST and Chalmers University. [Image: S. Kelley/NIST]

A lightning-fast electro-opto-mechanical switch developed by a team of researchers in Switzerland, the United States and Sweden reportedly could substantially advance a number of emerging optics- and photonics-based technologies, including autonomous vehicles, neural networks, and optical and quantum computing (Science, doi: 10.1126/science.aay8645).

The new switchoperating at a speed of tens of nanosecondsrelies on an electrostatic, nanometer-scale manipulation of a thin, low-mass gold membrane that forms an air-gap hybrid photonicplasmonic waveguide. The switch is capable of routing light from one silicon-based computer chip to another with low signal loss and at low voltages.

That ability to rapidly re-route light signals, the researchers believe, could have application in autonomous vehicles, for example, because the signals could continuously scan all parts of the roadway measuring distances between other vehicles and pedestrians. For neural networks, powerful light-based circuits could carry more information at speeds much greater than electricity-based circuits, aiding such tasks as pattern recognition and risk management.

The switch exploits the wave nature of incoming light. Electrostatic adjustment of its gold membrane creates light waves that either interfere constructively, aligning and reinforcing each other, or destructively, cresting out of step and canceling each other.

With destructive interference, the research team reports, the switch can redirect light to another chip with low signal loss. Also important, light leaking from the chips silicon waveguide strikes the gold membrane, inducing groups of electrons to oscillate as plasmons. Researchers can manipulate the plasmons over nanoscale distancesmuch shorter than the wavelength of the original lightbefore converting them back into light. This keeps the optical switch extremely compact.

Light travels along a silicon waveguide where electrostatic adjustment of a gold membrane can either block or redirect the light along a parallel waveguide to another chip with low signal loss. Plasmonic effects on the gold membrane mean the light can be manipulated over nanoscale distances, keeping chip size extremely compact. [Image: S. Kelly/NIST]

The main advantage of our switch is the ability to induce a pi-phase shift at low driving voltage and small device size, says project leader Christian Haffner of the National Institute of Standards and Technology and the University of Maryland, USA, and ETH Zurich, Switzerland. Also, I am excited that we can do this with plasmonic elements without suffering from high optical losses that are normally inherent to this technology.

Scientists once thought a plasmonic system would attenuate light signals because photons would penetrate the interior of the gold membrane where electrons would absorb much of the light energy. The compactness of the research teams device, with a design that ensures few photons penetrate the membrane, has meant a light-signal loss of just 2.5% compared with 60% for previous optical switches. This puts the new switch within reach of commercial application, the researchers say.

Whats more, the international team hopes to make the device even smaller by shortening the distance between the gold membrane and the silicon disk, further reducing signal loss.

For analog computing, the ability of the new opto-mechanical switch to route high-speed optical data streams might find more immediate use in supercomputers, Haffner says. But it provides great potential for optical computing including one day optical quantum computing.

Current optical quantum technologiesincluding the vision of realizing an optical quantum computerare in need of classical phase-shifting elements that are compact and feature low energy consumption, Haffner says. Prior-art optical switches, he notes, suffer from large energy consumption, are bulky and the heat they produce can reduce the purity of the quantum state.

Implementing our switches in these applications could overcome these limitations enabling quantum circuits of larger complexity, Haffner says.

Continue reading here:
Device Puts Photons in the Fast Lane - Optics & Photonics News

Race is on to build quantum-proof encryption – Financial Times

When Google said it had achieved quantum supremacy by eclipsing the performance of classical supercomputers, experts reacted with both excitement and concern about how next-generation computing could affect everything from medicine to financial portfolio optimisation.

In October, the tech group said its Sycamore quantum processor had, in 200 seconds, performed a task that would take the worlds best supercomputer 10,000 years to complete, although the magnitude of this claim is disputed by the likes of IBM.

Quantum computers which exploit the quirky behaviour of subatomic particles that can be in two states simultaneously may prove a useful technology for tasks requiring optimisation and comparison; that is, to find the best route or choice by examining all the options. This could range from finding the most cost-effective route for shipping goods to the most efficient way to extract natural resources.

Experts say quantum computing has the potential to transform materials science and drug development by comprehensively modelling molecules, while its ability to model interconnected dependencies could optimise financial portfolios.

However, cyber security experts and intelligence agencies worry that data security encryption systems will be blown away by the quantum tornado.

Encryption underpins everything from instant messaging services such as WhatsApp to online banking, ecommerce and secure web browsing. It uses algorithms to scramble data from the sender and gives the receiver a decryption key. These algorithms are based on mathematical functions that are easy to compute in one direction but hard to invert. Computing the product of two numbers is easy but factoring large prime numbers is difficult.

Even if the first quantum computer does not come for 20 years we are, in a sense, already late

Even with the biggest computers, factoring is hard once you are looking at numbers into, say, three or four hundred digits, says Christophe Petit, senior lecturer at Birmingham universitys School of Computer Science. There just isnt a method to efficiently solve that problem and encryption relies on that hardness.

With the extra power provided by quantum computers, problems such as factoring are easily scalable. The day a big quantum computer is built, all the cryptography we are using today is dead, warns Mr Petit.

It is uncertain when the first true quantum computer will arrive. There is also a long journey between building a computer with quantum-like properties compared with a full-scale, commercial version, partly because of the ultra-low temperature conditions required by quantum computers. However, there are fears that a malicious state could get far enough to wreak havoc.

Cracking encryption could enable a rogue actor to spy on communications and data including classified intelligence flowing between military agencies or gain backdoor access to critical infrastructures and facilities. Financial data also relies heavily on quantum-vulnerable encryption.

To crack encryption, all you need is one working quantum computer under laboratory conditions, says Andersen Cheng, chief executive of Post-Quantum, a cyber security company. Mr Cheng likens it to building an engine and gearbox compared with manufacturing an entire car. A lot of nation states are building quantum computers and they just need a working engine to start cracking encryption, he says.

In the public discourse, people are saying it will be 10 to 20 years until we have the first full commercially available quantum computer, says Mr Cheng. In the cyber security domain, they say it will be more like five to 10 years, but the intelligence community [has] become worried...over the past two years. They believe a working quantum computer will arrive much earlier than we think.

Wednesday, 20 November, 2019

Agencies including the National Security Agency and National Institute of Standards and Technology in the US, and Government Communications Headquarters in the UK, are working on post-quantum cyber security.

To build quantum-resistant encryption, cyber teams seek out categories of problems for which simultaneous processing power confers no advantage. These should be problems that are already understood but take substantial time to solve.

Lattice-based cryptography is a leading approach explored by the likes of IBM. It uses high-dimension geometric structures to hide information in ways considered impossible to solve without the key, even for quantum computers. An alternative technique, borrowed from the satellite industry, deliberately introduces random errors into the encryption process to make the output look different every time, even if the same input is being encrypted, according to Mr Cheng.

While a small network of cyber researchers has been exploring post-quantum security protocols for decades, experts say we need to raise the pace. We want to be ready not just when quantum computers come out but 20 years earlier, says Mr Petit. We should be rolling out encryption in evoting systems, medical data, and aircraft, for instance that will be secure for decades. Even if the first quantum computer does not come for 20 years we are, in a sense, already late.

See the original post:
Race is on to build quantum-proof encryption - Financial Times

Atos partners with Zapata to deliver complete quantum computing solution to the enterprise – Quantaneo, the Quantum Computing Source

The joint solution allows organizations to engage the worlds most difficult computational problems within oil and gas, aviation, finance and pharmaceutical industries with a unique approach ready to deploy and scale to real-world challenges. In addition, Atos and Zapata will also come together to provide comprehensive consulting services to help customers become quickly up-to-speed on the capabilities of quantum computing to solve their business problems.

Orquestra combines a software platform and quantum algorithm libraries to enable the next generation of discoveries for a wide range of industries including chemistry, pharmaceuticals, logistics, finance and materials science on quantum computers.

With Orquestra, weve developed a powerful software platform that delivers real world advances in computational power for applications particularly in chemistry, machine learning, and optimization to run on Atos leading hardware solution, said Christopher Savoie, CEO of Zapata Computing. With Atos global footprint in over 70 countries, our partnership creates a complete solution for innovative enterprises developing their quantum roadmap for the future and accelerates the introduction and implementation of quantum computing to industries and markets worldwide.

Atos QLM is a stand-alone, hardware-agnostic appliance that provides access to an evolutive quantum programming environment and simulates the behavior of any kind of quantum computing technology. Atos has installed the QLM in numerous countries including Austria, France, Germany, India, the Netherlands, the United Kingdom, and the United States empowering major research programs, including Oak Ridge National Laboratory and Argonne National Laboratory.

Partnering with Zapata to pair their next-generation of accessible, high-powered quantum software with the Atos QLM allows organizations to break through their computational glass ceilings and aim for new heights in practical business applications, said Cyril Allouche, VP, Head of the Quantum R&D Program at Atos. We are also taking all necessary steps to implement quantum solutions by providing appropriate training, onboarding and consulting services to customize the platform to specific business problems.

Zapatas Orquestra software already supports several key use cases that can be deployed using the Atos QLM and benefit from its unique circuit optimization features and simulation capabilities, including:

Engineering design Orquestra provides a quantum method for solving problems related to partial differential equation (PDE) in mechanical and materials engineering. Areas of applications include engine design and optimization, aerodynamics and chemical engineering. Quantum chemistry simulation Zapatas algorithms solve physical chemistry problems, such as simulating strongly correlated electronic structure problems where traditional quantum chemistry methods typically struggle in terms of accuracy and efficiency. Quantum enhanced AI: Dimensionality reduction Many real-world problems involve large data sets with a multitude of features. Zapata has developed a novel set of quantum techniques that allows for mapping high-dimensional data onto low-dimensional latent spaces in ways that are intractable with classical techniques. Generative models Companies using the Atos QLM can leverage Orquestra to train generative models with less data (for instance in digital content creation), improve the accuracy of predictions on sparse datasets (for instance in predictive maintenance) and improve data classification algorithms.

See the rest here:
Atos partners with Zapata to deliver complete quantum computing solution to the enterprise - Quantaneo, the Quantum Computing Source

NTT offers researchers $1 million salaries in bid to lure top talent in cryptography, quantum computing – The Japan Times

Telecom giant NTT Group is offering record pay to hire top scientists as it looks to match some of the basic research prowess of global powerhouses including Alphabet Inc. and Apple Inc.

The former Japanese telephone monopoly has set annual salaries of as much as $1 million (108.45 million) for researchers at its labs in Palo Alto, California, said Kazuhiro Gomi, president of the companys research arm. Thats more than the company pays its chief executive officer and 41-year veteran Jun Sawada, and a rare step for a traditional Japanese company like NTT.

The increased investment in basic science comes as NTT is regrouping its businesses to focus more on cloud computing services and data centers amid a dimming outlook for profit from its mainstay mobile phone carrier. Having star scientists on the labs payroll, backed by a 25 billion five-year budget, helps the group draw better technology workers and partners as it wages a global war for the top talent it needs to expand globally, Gomi said.

We are competing with companies like Google and Apple, said Gomi, explaining that the company had traditionally followed the Japanese norm of modest pay. It wouldnt be possible several years back.

Tatsuaki Okamoto, director of cryptography & information security for NTT Research, is an example of a star that has helped draw in other top researchers in encryption, where interest in cryptocurrencies has led to surging demand for expertise. Okamoto, an NTT R&D fellow since 1999, is known globally as a key researcher on block-chain technologies for cryptocurrencies.

The talent NTT is gathering is focused on cryptography, quantum computing and medical informatics in a bet that these fields can yield breakthroughs on a horizon of five years or more, said Kei Karasawa, vice president of corporate strategy for NTT Research.

The lab also needs big name scientists because for most top researchers, high pay alone isnt enough, said Karasawa. Scientists strongly prefer to work with the leaders in their field, he said.

Moreover, NTTs pay isnt at the top of the range in all fields. Oracle Corp., the software-maker racing to catch Microsoft Corp. and Amazon.com Inc. in cloud computing, offered a pay package worth $6 million to hire a single expert in artificial intelligence, Business Insider reported. And while $1 million a year dwarfs the pay of many IT professionals, its far less than what most chief executives make at global companies of NTTs scale.

That too is a contrast with Japan, where average CEO pay at top companies is less than $1 million, compared with more than 10 times that for the average U.S. boss of a big firm.

NTT is pushing for overseas growth while forecasting a 13 percent drop in net income at NTT Docomo Inc. this fiscal year, following a 16 percent decline in the previous year. NTT said it was forming a global technology and services provider by combining the capabilities of 28 of its companies including NTT Communications Corp., Dimension Data Holdings PLC and NTT Security Corp. The goal is to create a top 5 global technology and business solutions provider with $20 billion in revenue outside Japan, Sawada said at the time.

Cryptography, the science of encoding and decoding data to maintain privacy, is fundamental to the internets security and plays a role in blockchain and cryptocurrencies, two red-hot areas of research and development. Quantum computing, which uses properties of quantum mechanics to speed up processing, has the potential to help discover new drugs and improve the algorithms that shape industrial logistics and supply chains.

The third area, medical informatics, presents an opportunity to apply powerful computing technologies to mapping molecules in a way that can help scientists better understand viruses and how to combat them.

More here:
NTT offers researchers $1 million salaries in bid to lure top talent in cryptography, quantum computing - The Japan Times

D-Wave sticks with its approach to quantum computing – TechCrunch

Earlier this month, at the WebSummit conference in Lisbon, D-Wave and Volkswagen teamed up to manage a fleet of buses using a new system that, among other things, used D-Waves quantum technology to help generate the most efficient routes. While D-Waves 2000Q only played a small part in this process, its nevertheless a sign that quantum computing is slowly getting ready for production use and that D-Waves approach, somewhat controversial in its early days, is paying off.

Unlike other players in the quantum computing market, D-Wave always bet on quantum annealing as its core technology. This technology lends itself perfectly to optimization problems like the kind of routing problem the company tackled with VW, as well as sampling problems, which, in the context of quantum computing, are useful for improving machine learning models, for example. Depending on their complexity, some of these problems are nearly impossible to solve with classical computers (at least in a reasonable time).

Grossly simplified, with quantum annealing, you are building a system that almost naturally optimizes itself for the lowest energy state, which then represents the solution to your problem.

Microsoft, IBM, Rigetti and others are mostly focused on building gate-model quantum computers and they are starting to see results (with the exception of Microsoft, which doesnt have a working computer just yet and is hence betting on partnerships for the time being). But this is also a far more complex problem. And while you cant really compare these technologies qubit to qubit, its telling that D-Waves latest machines, the Advantage, will feature 5,000 qubits while the state of the art among the gate-model proponents is just over 50. Scaling these machines up is hard, though, especially given that the industry is still trying to figure out how to manage the noise issues.

D-Wave remains the only major player thats betting on annealing, but the companys CEO Vern Brownell remains optimistic that this is the right approach. We feel more strongly about our decision to do quantum annealing now that there are a few companies that actually have quantum computers that people can access, he said in an interview earlier this month.

We have customers, Volkswagen included, that have run problems against those other computers and seeing what they can actually do and its vastly different. Our capability is many orders of magnitude faster for most problems than what you can do with other quantum computers. And that is because of the choice of quantum annealing. And that is because quantum healing is more robust to errors. Error correction, he argues, remains the fundamental problem, and will hamper the performance of these systems for the foreseeable future. And in order to move into the enterprise or any kind of practical application, that error correction needs to be wrestled with, he noted.

Continue reading here:
D-Wave sticks with its approach to quantum computing - TechCrunch

Information overload: The promise and risk of quantum computing – Bulletin of the Atomic Scientists

Google recently announced a breakthrough in quantum computing. Sundar Pichai, Google's CEO, reportedly compared the achievement to the Wright brothers' first flight. Credit: Composite by Matt Field. (Creative Commons photos by Maurizio Pesce and Steve Jurvetson.)

The English philosopher Sir Francis Bacon is often credited with saying knowledge is power. Although Bacons aphorism is still in circulation, the 16th century thinker clearly didnt predict the advent of the modern-day search engine. Now knowledge is so readily available that information overload, rather, is a problem. Perhaps a more meaningful maxim would be something along the lines of: The ability to sort and process large amounts of knowledge is power. And that ability will be dramatically increasedfor good and illas researchers make progress in the field of quantum computing.

The international security community in particular has been grappling with the implications of access to vast troves of information. Twentieth century practitioners prioritized scientific efforts that improved technologies such as the surveillance drone to collect data. In the 21st century, however, the security community is dealing with the ramifications of those effortsthe need to process the huge amounts of data that drones, satellites, and other technologies can acquire. But in the age of big data and information technologies, practitioners face a challenging new paradigm: Government isnt necessarily at the forefront of development in data processing technology; private industry is. Policy makers must confront the uncomfortable reality that the future of national security now relies on the governments ability to oversee, regulate, and adopt the research and emerging technologies developed by private companies.

Case in point: Google recently claimed to have achieved so-called quantum supremacy, marking an important development in a perennially just-over-the-horizon technology that could dramatically improve the speed at which computers can complete complex tasks. Its also a technology that, if used by adversarial countries, could disrupt important aspects of US national security such as data protection.

Googles claim of quantum supremacy. Googles announcement was another milestone in the international competition to harness data processing technologies like artificial intelligence. Although the significance of the companys accomplishment has been challenged by industry competitors, the announcement at least confirms the steady progress and commitment of private industry leaders to the development of technologies that could have major implications for national security. Quantum supremacy refers to a benchmark indicating that a quantum system can perform a given function faster than a classic computer. Google developed a quantum processor with 53 operational qubitsthe principle unit of information in a quantum computerthat successfully completed a computationally intensive task in only 200 seconds. Google scientists estimated it would take the most powerful classical supercomputer over 10,000 years to complete the same task.

At this point, quantum computers are still mostly being built and tested to execute specific and carefully chosen tasks that could, in theory, be executed classically. The technological limitations of quantum computing are such that accomplishing a given task requires a custom built and programmed quantum computing system. This means that each iterative achievement will likely be respective of the highly specific task that each individually developed quantum computer will be built for and potentially respective of the specific method of operation applied. This technical reality, taken in the context of the standing definition for quantum supremacy, implies there may be several announcements by groups claiming that theyve achieved this or that quantum supremacy.

The necessary progress to definitively surpass classic computers and achieve universal quantum supremacy, rather than piecemeal quantum supremacy, will require both hardware and software improvements. Even after significant innovation, it is highly unlikely that quantum computers will ever replace classical versions for most day-to-day operations. Rather, clever implementation will see the two working most effectively as complements to each other.

Impact on national security. The most suitable applications for quantum computers are problems with large, multi-dimensional parameter spaces that require the manipulation and optimization of significant numbers of independent variables. Consider the ways important national security information is protected and accessed, in technical terms, the ways it is encrypted and decrypted. Due to the high processing power of quantum computers, modern encryption methods that would take classic computers a long time to break would be rendered useless. The unique physical properties of proposed quantum computers would allow them to seek all possible solutions to an encryption algorithm simultaneously, giving an answer that reflects the probability of each outcome. This ability puts national-security-sensitive data at risk. In fact, hackers are already banking on this potentiality and storing available data until some point in the future when the data may be decrypted with quantum computers.

Beyond data processing and manipulation, through increased simulation and computation capabilities, quantum computers could help advance a number of scientific fields, including materials sciences. From improving drone battery-life to solving military logistics issues, researchers are predicting any number of national security applications for quantum computing.

More broadly, quantum computers could augment other emerging information technologies in the security field, like artificial intelligence and machine learning. Likewise, developments in these fields would also lead to an acceleration of quantum computer research. The interconnectedness of these emerging information technologies, and the fact that an improvement in any one of the technologies in the competition for big data primacy would accelerate the others, means it will be critical that governments monitor all information technology research and identify likely coevolution trajectories in order to secure data and infrastructure necessary for national security.

Googles achievement signals another inflection point in that national governments are falling behind private industry as the leading developers of military-relevant technology. Unlike historical technologies that have revolutionized national security, quantum computing research is being driven by robust private industries in both China and the United Statesthe two countries frequently engaged in whats sometimes called the quantum computer arms race.

Although this shift in innovation influence may not necessarily be a bad thingit could prevent broadly relevant technologies from being siloed by the military communityit does require that military and national security practitioners adjust technology development strategies, including addressing the economic and skill barriers to adapting civilian technologies for military application.

Its also worth noting that the focus on civilian development of quantum computers might lead to asymmetric capabilities favoring offensive (operational and manipulative) rather than defensive (protective) technologies. For instance, private industries are most focused on developing quantum computers and less focused on developing quantum-safe encryption methods. This could result in a misbalance between offensive and defensive capabilities that could be catastrophic for national security if the scale tips too far. Governments must proactively identify and prioritize innovation in areas underfunded by the private sector that will be necessary to maintain national security infrastructure.

The US governments approach. In September 2018, the White House issued a national strategy on quantum information science that included near- and long-term development goals. The high-level overview identified a number of specific priorities set by the federal government, including bolstering the national economic, research, and education infrastructure required for quantum information technology development. It also called for collaborating with private industry and with other countries. Congress then passed the National Quantum Initiative Act to allocate funding for a national strategy that fosters public-private-academic partnerships. To address a key vulnerability of the post-quantum-supremacy world, the US National Institute of Standards and Technology is driving the development of quantum-safe encryption methods, an area that has not received comparable resources from private industry. The agencys timeline suggests that the earliest draft of these encryption algorithms and standards will be completed by 2022.

National security priorities. The fact that there was controversy over Googles claim to quantum supremacy indicates that the terminology used to discuss quantum computing is weak and vague. Given the hardware and software limits preventing universal supremacy, the importance of any given instance of quantum supremacy is related to the function that the quantum computer can perform. Striking a proactive and reactive balance to new developments will requires that government project leaders accept that (at least for now) universal quantum computers capable of performing a wide variety of functions are likely decades away from being developed. National security thinkers should instead identify which specific types of supremacy will have meaningful impacts. One that can perform decryption faster than a traditional computer, for instance, would be highly disruptive.

Googles announcement and quantum computing writ large must be considered as part of the broader big data competition. The development of different emerging information technologies, and their respective impacts on national security, must not be considered in isolation. A significant development in any one of the rising technologies will likely have a domino effect and trigger innovation progress in other areas. The promise of quantum computing is the vast new knowledge it will unlock.

Thats also the risk.

Read more:
Information overload: The promise and risk of quantum computing - Bulletin of the Atomic Scientists

Dell Technologies on democratising 5G and the future of quantum computing – ZDNet

Michael Dell said he would like to think his company has been a force for good in terms of democratising access to technology and making it more available to everyone.

Speaking with media this week during the Dell Technologies Summit in Austin, the CEO and his president and CTO of products and operations John Roese, said it's important that tech isn't reserved for the elite.

"The lever that you can pull -- it has always worked -- is broad availability to the technology and so something like 5G, our aspiration, we're doing a lot of work right now. Michael specifically, we're trying to basically bend the curve on the economics of 5G by aggressively moving towards virtualisation and simplification," Roese added.

"The net result of that is If we can drive the economic model so that we can flatten that, make it less of a premium product for only the elite, but make it available to everybody -- that's obviously good for us and good for the industry."

According to Roese, it also opens up opportunities for people to change the education cycle.

"Imagine, you know, underdeveloped environments, or even populations that are literally being able to do holographic or AR-based experiences at a cost-effective level -- it changes the curve," he said.

"I was on the board when they got One Laptop per Child in the 2000s, and the whole fact of making children literate, who couldn't even read and write with a piece of technology was because we drove the cost of compute way down, we made it generally available."

Roese said Dell Technologies' goal is not to create technology for five people, in a unit volume of three, rather it's to make it available everywhere.

"And the way that we do it is standardisation, basically making it easy to consume, driving the cost out of it and making it accessible," he said "That lever spawns the innovation cycle that can actually change things like poverty, change literacy rates, and we have good evidence that when that happens, that's exactly what occurs.

"And this next cycle, trust me, we have no other goal, than broad adoption of these technologies."

When asked during a media session what Dell Technologies was doing in the quantum computing space, Dell said "it could go either way".

"We believe the physics are sound, and something will happen in the quantum world that will be a disruption," Roese said, clarifying the company's position. "There are three conditions that have to be true before any kind of adoption."

The first, he said, is an industry-wide agreement on a quantum computing architecture, which is yet to happen with sufficient scale; the second is that quantum computing has to be made to work in the real world.

"We have huge activity going on in the industry around trapped ions, trapped charged particles, trapped photons, that work has not been done -- it is too esoteric to do," he continued.

The third is the development of a software framework and how quantum will be experienced.

"The good news is all three of those are happening, we're working with most of those companies -- I just did a bit of a tour a couple of weeks ago with most of the quantum startups in the world and they are basically on a journey that over the next, let's say five years, we will start to see incremental breakthroughs. They will be very, very narrow -- kind of like the equivalent of like vacuum tube era of technology is what's happening now," Roese said.

See also: Australia's ambitious plan to win the quantum race

Roese pointed to Google's recent announcement, and said the only thing the search giant's "breakthrough" did was create a random number generator, which is something that's never been achieved in a classical computer.

"Now it's not usable for anything yet, but those kind of breakthroughs will happen, but it will happen over a long cycle," he said.

"We are observing, we are engaged, we think this will manifest as an accelerator in the cloud that you'll do certain mathematical functions -- it will not replace your generalised compute infrastructure, probably ever, but it will be interesting over time.

"We're watching it closely, we're involved in it, but if you're worried about changing your entire IT architecture and your strategy and your investment portfolio because of quantum -- don't do that. we will let you know -- my commitment to Michael is I'll give him two to three years notice before he has to decide to do R&D in this space and that's not happening."

Asha Barbaschow travelled to Dell Technologies Summit as a guest of Dell Technologies.

Read this article:
Dell Technologies on democratising 5G and the future of quantum computing - ZDNet

How Serious Is the Threat of Quantum Computing to Crypto? – Finance Magnates

The science of quantum physics is being used to build quantum computerspowerful machines that have the ability to solve incredibly complex mathematical equations much more quickly than even the most advanced computers available today.

As such, any data thats encrypted using mathematical equationsincluding banking data, intelligence data protected by the government, and encrypted messages on cell phonesis vulnerable to being exposed by quantum computing. Most notably, in this case, encrypted cryptocurrency datasuch as private wallet keysare also vulnerable to quantum computing technology.

London Summit 2019 Launches the Latest Era in FX and Fintech Join Now

In other words, quantum computing could potentially be used to uncover every private key on a blockchain network, thus rendering that networks users vulnerable to hacking and theft.

Therefore, the point in time at which quantum computers can solve problems that ordinary computers cannotalso known as the quantum supremacyis considered to be a serious threat to the security of blockchain networks.

How far away are we from this quantum supremacy?

Last week, joked Kadan Stadelmann, CTO of Komodo, a multichain architecture project, to Finance Magnates.

In any case, jokes apart, from a technical standpoint we have to consider the quantum supremacy era already here now. The industry leaders in this area have already publicly presented functional two to three-figure qubit chips, which means with unlimited resources and space this could be scaled up quite fast.

Google, for example, just presented how their 54 Qubit chip performed a computation which would take the worlds most powerful supercomputer 10,000 years in just 200 seconds. This doesnt even cover the non-public segment of this industry.

What are qubits? While a classical computer uses bits, which are represented either 0s or 1s. Qubits, on the other hand, can be 0s or 1sor both at different times. Qubits are the thing that make quantum computers so powerful: if a normal computer is operating with four bits, that computer could arrange those bits in any of 16 combinations, one after the other, in order to solve an equation.

With four qubits, however, a quantum computer could arrange four qubits into 16 combinations all at one time. According to Decrypt, just 20 qubits can store more than a million values in parallel, which allows a quantum computer to be able to work through a problem by performing calculations in parallel rather than one at a time.

However, Vlad Miller, CEO of the Ethereum Express company, explained that blockchain network ledgers are not susceptible to hacking by quantum computers.

Today, records of all cryptocurrency transactions are stored on blockchain. Since the copies of the data are distributed among all users, they are almost impossible to change, he said. No data block can be removed or modified without affecting all other blocks, which would require the consent of most network users. In this sense, blockchain is resistant to quantum computers, and the growth of computing power will not affect the security of the system.

Indeed, the threat posed by quantum computers is more likely to concern the vulnerability of personal cryptocurrency accounts or wallets. These powerful computers can hack user codes that are used to authorize transactions.

[] Until recently, this was considered mathematically impossible, Miller continued. An ordinary binary computer is not able to crack a cryptocurrency key, but for quantum machines, this is not difficult because of the incredible computing power.

Charles Phan, Charles Phan, CTO of Cryptocurrency Derivatives Exchange Interdax, also pointed out to Finance Magnates that the SHA-256 function used in mining is another area where quantum computers could influence bitcoin [and] crypto. However, the risk is much lower here.

An adversary with a quantum computer could also direct it towards mining bitcoin if they achieve 51% control of the hash power, then they can permit double-spending and do what it likes. They could also cause damage to the network if they control a significant proportion less than 51%.

How immediate is the threat of quantum computing to blockchain networks, and what can these networks do to protect themselves?

KVB PRIME Gains Key UK Influence by Sponsoring Major Finance ConferenceGo to article >>

Eventually, quantum computers will force changes in cryptocurrency systems, but todays quantum computers exist only in the lab and are a long way from having practical impacts on cryptocurrencies, said Edward Felten, Co-Founder and Chief Scientist of Offchain Labs, a second-layer scaling solution for Ethereum, to Finance Magnates. Ed is also the former White House Deputy United States Chief Technology Officer.

Over time, cryptocurrencies will need to evolve to use different encryption and hashing methods that are quantum-resistant. Crypto communities should be talking about how to do this, but its not yet an emergency.

At what point will it become an emergency? Vlad Miller said that although the United States National Security Agency predicted in 2016 that decades would pass before quantum computers pose a serious threat to encrypted information, given the pace of development of this technology over the past year and a half, the conclusions of the NSA seem overly optimistic. In fact, many experts believe that the threat will arise in the next 15 or even 10 years.

Therefore, a number of blockchain projects are already preparing for this quantum supremacy.

Kadan Stadelmann explained that while [quantum computers] certainly pose a long-term threat to most cryptocurrencies in their current form, the more legitimate projects are already deploying countermeasures in the form of quantum-proof cryptography.

Even already existing cryptocurrency networks will be able to migrate to quantum-resistant algorithms and digital signature schemes, he said.

Therefore, by the time quantum computers are available to the wider public, expect most remaining cryptocurrencies to have already made the leap into the quantum-resistance movement (so to speak.)

However, this may be easier said than donemetaphorically [speaking], pre-existing chains can already flip a switch and immediately deploy a quantum-resistance mechanism, Stadelmann said to Finance Magnates. However, networks that have historically found it difficult to reach consensus on important software upgrades (for example, the Bitcoin network) could potentially run into trouble.

If a quantum computer breaks this cryptography used by Bitcoin, anyone who has re-used a bitcoin address is vulnerable, Charles Phan explained. However, the information a quantum computer needs isnt available until the first transaction from a public key is seen, so individuals who use a different public key each time would be safe.

Still, though, quantum processors threaten only the modern generation of cryptocurrencies like bitcoin, Vlad Miller explained to Finance Magnates.

To protect them, users will have to switch to new authentication methods for authorizing transactions in blockchain-based networks.

Indeed, the solution to this problem will be new methods of cryptography resistant to quantum computing. Today many crypto companies are developing a wide range of such solutions. Some of them are based on long-discovered mathematical methods, such as Lamports signatures, Merkle structures, and the sharing of secrets.

Therefore, it is quite likely that blockchain networks will be secure from the threat that quantum computing poses. Platforms will change their locks once quantum computers start to move out of the lab, said Matthew Hine, Business Strategist at Radix., to Finance Magnates.

But everyone should be very hesitant to publicly publish encrypted information with the expectation that it will be secret forever.

View post:
How Serious Is the Threat of Quantum Computing to Crypto? - Finance Magnates

Superconducting quantum computing – Wikipedia

Quantum computing implementation

Superconducting quantum computing is an implementation of a quantum computer in superconducting electronic circuits. Research in superconducting quantum computing is conducted by Google,[1] IBM,[2] BBN Technologies,[3] Rigetti,[4] and Intel.[5] as of May2016[update], up to nine fully controllable qubits are demonstrated in a 1D array,[6] up to sixteen in a 2D architecture.[2]

More than two thousand superconducting qubits are in a commercial product by D-Wave Systems, however these qubits implement quantum annealing instead of a universal model of quantum computation.

Classical computation models rely on physical implementations consistent with the laws of classical mechanics.[8] It is known, however, that the classical description is only accurate for specific cases, while the more general description of nature is given by quantum mechanics. Quantum computation studies the application of quantum phenomena, that are beyond the scope of classical approximation, for information processing and communication. Various models of quantum computation exist, however the most popular models incorporate the concepts of qubits and quantum gates. A qubit is a generalization of a bit - a system with two possible states, that can be in a quantum superposition of both. A quantum gate is a generalization of a logic gate: it describes the transformation that one or more qubits will experience after the gate is applied on them, given their initial state. The physical implementation of qubits and gates is difficult, for the same reasons that quantum phenomena are hard to observe in everyday life. One approach is to implement the quantum computers in superconductors, where the quantum effects become macroscopic, though at a price of extremely low operation temperatures.

In a superconductor, the basic charge carriers are pairs of electrons (known as Cooper pairs), rather than the single electrons in a normal conductor. The total spin of a Cooper pair is an integer number, thus the Cooper pairs are bosons (while the single electrons in the normal conductor are fermions). Cooled bosons, contrary to cooled fermions, are allowed to occupy a single quantum energy level, in an effect known as the Bose-Einstein condensate. In a classical interpretation it would correspond to multiple particles occupying the same position in space and having an equal momentum, effectively behaving as a single particle.

At every point of a superconducting electronic circuit (that is a network of electrical elements), the condensate wave function describing the charge flow is well-defined by a specific complex probability amplitude. In a normal conductor electrical circuit, the same quantum description is true for individual charge carriers, however the various wave functions are averaged in the macroscopic analysis, making it impossible to observe quantum effects. The condensate wave function allows designing and measuring macroscopic quantum effects. For example, only a discrete number of magnetic flux quanta penetrates a superconducting loop, similarly to the discrete atomic energy levels in the Bohr model. In both cases, the quantization is a result of the complex amplitude continuity. Differing from the microscopic quantum systems (such as atoms or photons) used for implementations of quantum computers, the parameters of the superconducting circuits may be designed by setting the (classical) values of the electrical elements that compose them, e.g. adjusting the capacitance or inductance.

In order to obtain a quantum mechanical description of an electrical circuit a few steps are required. First, all the electrical elements are described with the condensate wave function amplitude and phase, rather than with the closely related macroscopic current and voltage description used for classical circuits. For example, a square of the wave function amplitude at some point in space is the probability of finding a charge carrier there, hence the square of the amplitude corresponds to the classical charge distribution. Second, generalized Kirchhoff's circuit laws are applied at every node of the circuit network to obtain the equations of motion. Finally, the equations of motion are reformulated to Lagrangian mechanics and a quantum Hamiltonian is derived.

The devices are typically designed in the radio-frequency spectrum, cooled down in dilution refrigerators below 100mK and addressed with conventional electronic instruments, e.g. frequency synthesizers and spectrum analyzers. Typical dimensions on the scale of micrometers, with sub-micrometer resolution, allow a convenient design of a quantum Hamiltonian with the well-established integrated circuit technology.

A distinguishing feature of superconducting quantum circuits is the usage of a Josephson junction - an electrical element non existent in normal conductors. A junction is a weak connection between two leads of a superconducting wire, usually implemented as a thin layer of insulator with a shadow evaporation technique. The condensate wave functions on the two sides of the junction are weakly correlated - they are allowed to have different superconducting phases, contrary to the case of a continuous superconducting wire, where the superconducting wave function must be continuous. The current through the junction occurs by quantum tunneling. This is used to create a non-linear inductance which is essential for qubit design, as it allows a design of anharmonic oscillators. A quantum harmonic oscillator cannot be used as a qubit, as there is no way to address only two of its states.

The three superconducting qubit archetypes are the phase, charge and flux qubits, though many hybridizations exist (Fluxonium,[9] Transmon,[10] Xmon,[11] Quantronium[12]). For any qubit implementation, the logical quantum states { | 0 , | 1 } {displaystyle {|0rangle ,|1rangle }} are to be mapped to the different states of the physical system, typically to the discrete (quantized) energy levels or to their quantum superpositions. In the charge qubit, different energy levels correspond to an integer number of Cooper pairs on a superconducting island. In the flux qubit, the energy levels correspond to different integer numbers of magnetic flux quanta trapped in a superconducting ring. In the phase qubit, the energy levels correspond to different quantum charge oscillation amplitudes across a Josephson junction, where the charge and the phase are analogous to momentum and position correspondingly of a quantum harmonic oscillator. Note that the phase here is the complex argument of the superconducting wavefunction, also known as the superconducting order parameter, not the phase between the different states of the qubit.

In the table below, the three archetypes are reviewed. In the first row, the qubit electrical circuit diagram is presented. In the second, the quantum Hamiltonian derived from the circuit is shown. Generally, the Hamiltonian can be divided to a "kinetic" and "potential" parts, in analogy to a particle in a potential well. The particle mass corresponds to some inverse function of the circuit capacitance, while the shape of the potential is governed by the regular inductors and Josephson junctions. One of the first challenges in qubit design is to shape the potential well and to choose the particle mass in a way that the energy separation between specific two of the energy levels will differ from all other inter-level energy separations in the system. These two levels will be used as the logical states of the qubit. The schematic wave solutions in the third row of the table depict the complex amplitude of the phase variable. In other words, if a phase of the qubit is measured while the qubit is in a specific state, there is a non-zero probability to measure a specific value only where the depicted wave function oscillates. All three rows are essentially three different presentations of the same physical system.

Type

Aspect

A superconducting island (encircled with a dashed line) defined between the leads of a capacitor with capacitance C {displaystyle C} and a Josephson junction with energy E J {displaystyle E_{J}} is biased by voltage U {displaystyle U}

A superconducting loop with inductance L {displaystyle L} is interrupted by a junction with Josephson energy E J {displaystyle E_{J}} . Bias flux {displaystyle Phi } is induced by a flux line with a current I 0 {displaystyle I_{0}}

Josephson junction with energy parameter E J {displaystyle E_{J}} is biased by a current I 0 {displaystyle I_{0}}

H = E C ( N N g ) 2 E J cos {displaystyle H=E_{C}(N-N_{g})^{2}-E_{J}cos phi } ,where N {displaystyle N} is the number of Cooper pairs to tunnel the junction, N g = C V 0 / 2 e {displaystyle N_{g}=CV_{0}/2e} is the charge on the capacitor in units of Cooper pairs number, E C = ( 2 e ) 2 / 2 ( C J + C ) {displaystyle E_{C}=(2e)^{2}/2(C_{J}+C)} is the charging energy associated with both the capacitance C {displaystyle C} and the Josephson junction capacitance C J {displaystyle C_{J}} , and {displaystyle phi } is the superconducting wave function phase difference across the junction.

H = q 2 2 C J + ( 0 2 ) 2 2 2 L E J cos [ 2 0 ] {displaystyle H={frac {q^{2}}{2C_{J}}}+left({frac {Phi _{0}}{2pi }}right)^{2}{frac {phi ^{2}}{2L}}-E_{J}cos left[phi -Phi {frac {2pi }{Phi _{0}}}right]} ,where q {displaystyle q} is the charge on the junction capacitance C J {displaystyle C_{J}} and {displaystyle phi } is the superconducting wave function phase difference across the Josephson junction. {displaystyle phi } is allowed to take values greater than 2 {displaystyle 2pi } , and thus is alternatively defined as the time integral of voltage along the inductance L {displaystyle L} .

H = ( 2 e ) 2 2 C J q 2 I 0 0 2 E J cos {displaystyle H={frac {(2e)^{2}}{2C_{J}}}q^{2}-I_{0}{frac {Phi _{0}}{2pi }}phi -E_{J}cos phi } , where C J {displaystyle C_{J}} is the capacitance associated with the Josephson junction, 0 {displaystyle Phi _{0}} is the magnetic flux quantum, q {displaystyle q} is the charge on the junction capacitance C J {displaystyle C_{J}} and {displaystyle phi } is the phase across the junction.

The potential part of the Hamiltonian, E J cos {displaystyle -E_{J}cos phi } , is depicted with the thick red line. Schematic wave function solutions are depicted with thin lines, lifted to their appropriate energy level for clarity. Only the solid wave functions are used for computation. The bias voltage is set so that N g = 1 2 {displaystyle N_{g}={frac {1}{2}}} , minimizing the energy gap between | 0 {displaystyle |0rangle } and | 1 {displaystyle |1rangle } , thus making the gap different from other energy gaps (e.g. the gap between | 1 {displaystyle |1rangle } and | 2 {displaystyle |2rangle } ). The difference in gaps allows addressing transitions from | 0 {displaystyle |0rangle } to | 1 {displaystyle |1rangle } and vice versa only, without populating other states, thus effectively treating the circuit as a two-level system (qubit).

The potential part of the Hamiltonian, ( 0 2 ) 2 2 2 L E J cos [ 2 0 ] {displaystyle left({frac {Phi _{0}}{2pi }}right)^{2}{frac {phi ^{2}}{2L}}-E_{J}cos left[phi -Phi {frac {2pi }{Phi _{0}}}right]} , plotted for the bias flux = 0 / 2 {displaystyle Phi =Phi _{0}/2} , is depicted with the thick red line. Schematic wave function solutions are depicted with thin lines, lifted to their appropriate energy level for clarity. Only the solid wave functions are used for computation. Different wells correspond to a different number of flux quanta trapped in the superconducting loops. The two lower states correspond to a symmetrical and an antisymmetrical superposition of zero or single trapped flux quanta, sometimes denoted as clockwise and counterclockwise loop current states: | 0 = [ | + | ] / 2 {displaystyle |0rangle =left[|circlearrowleft rangle +|circlearrowright rangle right]/{sqrt {2}}} and | 1 = [ | | ] / 2 {displaystyle |1rangle =left[|circlearrowleft rangle -|circlearrowright rangle right]/{sqrt {2}}} .

The so-called "washboard" potential part of the Hamiltonian, I 0 0 2 E J cos {displaystyle -I_{0}{frac {Phi _{0}}{2pi }}phi -E_{J}cos phi } , is depicted with the thick red line. Schematic wave function solutions are depicted with thin lines, lifted to their appropriate energy level for clarity. Only the solid wave functions are used for computation. The bias current is adjusted to make the wells shallow enough to contain exactly two localized wave functions. A slight increase in the bias current causes a selective "spill" of the higher energy state ( | 1 {displaystyle |1rangle } ), expressed with a measurable voltage spike - a mechanism commonly used for phase qubit measurement.

The GHz energy gap between the energy levels of a superconducting qubit is intentionally designed to be compatible with available electronic equipment, due to the terahertz gap - lack of equipment in the higher frequency band. In addition, the superconductor energy gap implies a top limit of operation below ~1THz (beyond it, the Cooper pairs break). On the other hand, the energy level separation cannot be too small due to cooling considerations: a temperature of 1K implies energy fluctuations of 20GHz. Temperatures of tens of mili-Kelvin achieved in dilution refrigerators allow qubit operation at a ~5GHz energy level separation. The qubit energy level separation may often be adjusted by means of controlling a dedicated bias current line, providing a "knob" to fine tune the qubit parameters.

An arbitrary single qubit gate is achieved by rotation in the Bloch sphere. The rotations between the different energy levels of a single qubit are induced by microwave pulses sent to an antenna or transmission line coupled to the qubit, with a frequency resonant with the energy separation between the levels. Individual qubits may be addressed by a dedicated transmission line, or by a shared one if the other qubits are off resonance. The axis of rotation is set by quadrature amplitude modulation of the microwave pulse, while the pulse length determines the angle of rotation.[14]

More formally, following the notation of,[14] for a driving signal

E ( t ) = E x ( t ) cos ( d t ) + E y ( t ) sin ( d t ) {displaystyle {mathcal {E}}(t)={mathcal {E}}^{x}(t)cos(omega _{d}t)+{mathcal {E}}^{y}(t)sin(omega _{d}t)}

of frequency d {displaystyle omega _{d}} , a driven qubit Hamiltonian in a rotating wave approximation is

H R / = ( d ) | 1 1 | + E x ( t ) 2 x + E y ( t ) 2 y {displaystyle H^{R}/hbar =(omega -omega _{d})|1rangle langle 1|+{frac {{mathcal {E}}^{x}(t)}{2}}sigma _{x}+{frac {{mathcal {E}}^{y}(t)}{2}}sigma _{y}} ,

where {displaystyle omega } is the qubit resonance and x , y {displaystyle sigma _{x},sigma _{y}} are Pauli matrices.

In order to implement a rotation about the X {displaystyle X} axis, one can set E y ( t ) = 0 {displaystyle {mathcal {E}}^{y}(t)=0} and apply the microwave pulse at frequency d = {displaystyle omega _{d}=omega } for time t g {displaystyle t_{g}} . The resulting transformation is

U x = exp { i 0 t g H R d t } = exp { i 0 t g E x ( t ) d t x / 2 } {displaystyle U_{x}=exp left{-{frac {i}{hbar }}int _{0}^{t_{g}}H^{R}dtright}=exp left{-iint _{0}^{t_{g}}{mathcal {E}}^{x}(t)dtcdot sigma _{x}/2right}} ,

that is exactly the rotation operator R X ( ) {displaystyle R_{X}(theta )} by angle = 0 t g E x ( t ) d t {displaystyle theta =int _{0}^{t_{g}}{mathcal {E}}^{x}(t)dt} about the X {displaystyle X} axis in the Bloch sphere. An arbitrary rotation about the Y {displaystyle Y} axis can be implemented in a similar way. Showing the two rotation operators is sufficient for universality, as every single qubit unitary operator U {displaystyle U} may be presented as U = R X ( 1 ) R Y ( 2 ) R X ( 3 ) {displaystyle U=R_{X}(theta _{1})R_{Y}(theta _{2})R_{X}(theta _{3})} (up to a global phase, that is physically unimportant) by a procedure known as the X Y {displaystyle X-Y} decomposition.[15]

For example, setting 0 t g E x ( t ) d t = {displaystyle int _{0}^{t_{g}}{mathcal {E}}^{x}(t)dt=pi } results with a transformation

U x = exp { i 0 t g E x ( t ) d t x / 2 } = e i x / 2 = i x {displaystyle U_{x}=exp left{-iint _{0}^{t_{g}}{mathcal {E}}^{x}(t)dtcdot sigma _{x}/2right}=e^{-ipi sigma _{x}/2}=-isigma _{x}} ,

that is known as the NOT gate (up to the global phase i {displaystyle -i} ).

Coupling qubits is essential for implementing 2-qubit gates. Coupling two qubits may be achieved by connecting them to an intermediate electrical coupling circuit. The circuit might be a fixed element, such as a capacitor, or controllable, such as a DC-SQUID. In the first case, decoupling the qubits (during the time the gate is off) is achieved by tuning the qubits out of resonance one from another, i.e. making the energy gaps between their computational states different.[16] This approach is inherently limited to allow nearest-neighbor coupling only, as a physical electrical circuit is to be lay out in between the connected qubits. Notably, D-Wave Systems' nearest-neighbor coupling achieves a highly connected unit cell of 8 qubits in the Chimera graph configuration. Generally, quantum algorithms require coupling between arbitrary qubits, therefore the connectivity limitation is likely to require multiple swap operations, limiting the length of the possible quantum computation before the processor decoherence.

Another method of coupling two or more qubits is by coupling them to an intermediate quantum bus. The quantum bus is often implemented as a microwave cavity, modeled by a quantum harmonic oscillator. Coupled qubits may be brought in and out of resonance with the bus and one with the other, hence eliminating the nearest-neighbor limitation. The formalism used to describe this coupling is cavity quantum electrodynamics, where qubits are analogous to atoms interacting with optical photon cavity, with the difference of GHz rather than THz regime of the electromagnetic radiation.

One popular gating mechanism includes two qubits and a bus, all tuned to different energy level separations. Applying microwave excitation to the first qubit, with a frequency resonant with the second qubit, causes a x {displaystyle sigma _{x}} rotation of the second qubit. The rotation direction depends on the state of the first qubit, allowing a controlled phase gate construction.[17]

More formally, following the notation of,[17] the drive Hamiltonian describing the system excited through the first qubit driving line is

H D / = A ( t ) cos ( ~ 2 t ) ( x I J 12 z x + m 12 I x ) {displaystyle H_{D}/hbar =A(t)cos({tilde {omega }}_{2}t)left(sigma _{x}otimes I-{frac {J}{Delta _{12}}}sigma _{z}otimes sigma _{x}+m_{12}Iotimes sigma _{x}right)} ,

where A ( t ) {displaystyle A(t)} is the shape of the microwave pulse in time, ~ 2 {displaystyle {tilde {omega }}_{2}} is the resonance frequency of the second qubit, { I , x , y , z } {displaystyle {I,sigma _{x},sigma _{y},sigma _{z}}} are the Pauli matrices, J {displaystyle J} is the coupling coefficient between the two qubits via the resonator, 12 1 2 {displaystyle Delta _{12}equiv omega _{1}-omega _{2}} is the qubit detuning, m 12 {displaystyle m_{12}} is the stray (unwanted) coupling between qubits and {displaystyle hbar } is Planck constant divided by 2 {displaystyle 2pi } . The time integral over A ( t ) {displaystyle A(t)} determines the angle of rotation. Unwanted rotations due to the first and third terms of the Hamiltonian can be compensated with single qubit operations. The remaining part is exactly the controlled-X gate.

Architecture-specific readout (measurement) mechanisms exist. The readout of a phase qubit is explained in the qubit archetypes table above. A state of the flux qubit is often read by an adjust DC-SQUID magnetometer. A more general readout scheme includes a coupling to a microwave resonator, where the resonance frequency of the resonator is shifted by the qubit state.[18]

The list of DiVincenzo's criteria for a physical system to implement a logical qubit is satisfied by the superconducting implementation. The challenges currently faced by the superconducting approach are mostly in the field of microwave engineering.[18]

More here:
Superconducting quantum computing - Wikipedia

Quantum computing | MIT News

Researchers integrate diamond-based sensing components onto a chip to enable low-cost, high-performance quantum hardware.

New detection tool could be used to make quantum computers robust against unwanted environmental disturbances.

Observation of the predicted non-Abelian Aharonov-Bohm Effect may offer step toward fault-tolerant quantum computers.

Shining light through household bleach creates fluorescent quantum defects in carbon nanotubes for quantum computing and biomedical imaging.

MITs Senthil Todadri and Xiao-Gang Wen will study highly entangled quantum matter in a collaboration supported by the Simons Foundation.

New dual-cavity design emits more single photons that can carry quantum information at room temperature.

Shor awarded the $150,000 prize, named after a fifth-century B.C. Chinese scientist, for his groundbreaking theoretical work in the field of quantum computation.

MIT researchers find a new way to make nanoscale measurements of fields in more than one dimension.

Efficient chip enables low-power devices to run todays toughest quantum encryption schemes.

The prestigious awards are supporting five innovative projects that challenge established norms and have the potential to be world-changing.

Approach developed by MIT engineers surmounts longstanding problem of light scattering within biological tissue and other complex materials.

William Oliver says a lack of available quantum scientists and engineers may be an inhibitor of the technologys growth.

Eleven new professors join the MIT community.

First measurement of its kind could provide stepping stone to practical quantum computing.

MIT researchers have demonstrated that a tungsten ditelluride-based transistor combines two different electronic states of matter.

Professors Daniel Harlow, Aram Harrow, Hong Liu, and Jesse Thaler among the first recipients of new honor for advances in quantum understanding.

PhD student David Layden in the Quantum Engineering Group has a new approach to spatial noise filtering that boosts development of ultra-sensitive quantum sensors.

Scientists find a theoretical optical device may have uses in quantum computing.

New York Times op-ed by MIT president says a national focus on innovation and research is more effective than only playing defense on trade practices.

Math and physics major Shaun Datta wraps up four years of pushing himself beyond his comfort zone by singing a cappella with the MIT Logarhythms.

The rest is here:
Quantum computing | MIT News