Abstract
This chapter provides detailed descriptions of the most intellectually valued algorithms in quantum computing, including Peter Shor’s factoring algorithm and Lov Grover search algorithm, among others. An attempt is made to explain the subtle aspects of the algorithms and why such algorithms are valued.
Programming is the art of algorithm design and the craft of debugging errant code.
—Ellen Ullman
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Cleve et al. [12].
- 2.
The reader may refer to Nielsen and Chuang [34], pp. 238–240 to learn more.
- 3.
The reader may refer to Nielsen and Chuang [34], pp. 240–242 to learn more.
- 4.
A number is an abstract idea. The symbolic representation of a number (such as 1, 2, …, or I, II, …, or i, ii, …, etc.) is called a numeral. However, in common usage, the word number is used for both the idea and the symbol. Our notion of a number has enlarged over many centuries to include such numbers as negative numbers, rational and irrational numbers, and complex numbers. The notion of a negative number took several centuries before it found acceptance by mathematicians.
The notion of complex numbers, which require taking the square root of negative numbers, took place in the sixteenth century. It was originally used as a mathematical artifice to enable square roots to be taken with impunity. Its remarkable properties were later discovered by a bunch of talented mathematicians. It is difficult to imagine the creation of quantum mechanics without complex numbers. The secrets of nature lie hidden in the numbers.
- 5.
Gauss [17].
- 6.
Coinciding exactly when the remainders are compared.
- 7.
See, e.g., Weisstein, Eric W., “Congruence.” From MathWorld—A Wolfram Web Resource. http://mathworld.wolfram.com/Congruence.html.
- 8.
From the Latin integer, which means with untouched integrity, whole, entire. The symbol Z comes from the German word Zahlen, which means numbers.
- 9.
Deutsch [14].
- 10.
Bernstein and Vazirani [7].
- 11.
Tarantola [41]. See also: http://www.dwavesys.com/, Website of D-Wave.
- 12.
The D-Wave 2000Q™ System: Technology Overview. https://www.dwavesys.com/sites/default/files/D-Wave%202000Q%20Tech%20Collateral_0117F.pdf.
- 13.
Kelly [29].
- 14.
Intel [25].
- 15.
IBM [24].
- 16.
See, e.g., Quantum Computing Market Forecast 2020–2025. Market Research Media, 16 May 2019. https://www.marketresearchmedia.com/?p=850; and ScienceDaily.com at https://www.sciencedaily.com/ for new developments.
- 17.
- 18.
To keep the discussions simple, we shall not consider the case when N ≠ 2n. However, we do remark that the larger the power of 2 used as a base for the transform, the better is the approximation. See Rieffel and Polak [36], p. 318.
- 19.
These are a Hadamard gate and n − 1 conditional rotations on the first qubit , followed by a Hadamard gate and n − 2 conditional rotations on the second qubit , and so on. In all there will be \( n + \left( {n - 1} \right) + \cdots + 1 = n\left( {n + 1} \right)/2 \) gates. In addition, there are at most n/2 swaps to be done where each swap can be accomplished using three controlled-not gates.
- 20.
This, of course, does not mean that QFT can be used in such applications as speech recognition or other signal processing applications. This is because the amplitudes in a quantum computer cannot be directly accessed by measurement. Thus, there is no way of determining the Fourier transformed amplitudes of the original state. Worse still, there is, in general, no way to efficiently prepare the original state to be Fourier transformed (see Nielsen and Chuang [34], p. 220).
- 21.
Cleve et al. [12], p. 6.
- 22.
Two integers are relatively prime if they do not share common positive factors (divisors) except 1.
- 23.
For applications in quantum computing, it is convenient to allow \( a_{0} = 0 \) as well.
- 24.
For a good description of continued fractions see http://www.mcs.surrey.ac.uk/Personal/R.Knott/Fibonacci/cfINTRO.html#euclidsAlg.
- 25.
- 26.
The RSA system was invented by Ronald Rivest, Adi Shamir, and Leonard Adleman in 1978. It rules e-commerce and pops up in countless security applications. They received the Turing Award (2002) for their contributions to public key cryptography .
- 27.
Coprime: Two integers a and b are coprime (or relatively prime) if the greatest common divisor of a and b is 1. For example, 55555 and 7811 are coprime even though neither number is itself a prime. One may use Euclid’s algorithm to determine if x and N are coprime.
- 28.
Vandersypen et al. [45]. They designed and made a molecule that has seven nuclear spins—the nuclei of five fluorine and two carbon atoms—which can interact with each other as qubits , be programmed by radio frequency pulses and be detected by nuclear magnetic resonance (NMR) instruments. They controlled a vial of a billion-billion (1018) of these molecules as they executed Shor’s algorithm and correctly identified 3 and 5 as the factors of 15.
- 29.
Lucero et al. [32].
- 30.
- 31.
- 32.
See, e.g., Johansson and Larsson [26].
- 33.
See, e.g., Geller and Zhou [18].
- 34.
- 35.
- 36.
Boyer et al. [8].
- 37.
- 38.
Vandersypen et al. [44].
- 39.
Figgatt et al. [16].
- 40.
Bennett et al. [4].
- 41.
Modal value: the most frequently occurring value.
- 42.
Bennett and Wiesner [6].
- 43.
Bennett et al. [5].
- 44.
- 45.
Peres [35].
- 46.
ASRC [2].
- 47.
Turing [43].
- 48.
Landauer [31].
- 49.
Brandt et al. [9].
References
ANU. Australian National University, Physicists Solve Quantum Tunneling Mystery. Phys.org, 27 May 2015 (2015). https://phys.org/news/2015-05-physicists-quantum-tunneling-mystery.html
ASRC. Advanced Science Research Center, GC/CUNY, A new theory for trapping light particles aims to advance development of quantum computers. Sci. Daily, 24 June 2019 (2019). https://www.sciencedaily.com/releases/2019/06/190624173830.htm
A. Barenco, Quantum physics and computers. Contemp. Phys. 37(5), 375–389 (1996). Preprint at http://arxiv.org/abs/quant-ph/9612014
C.H. Bennett, E. Bernstein, G. Brassard, U. Vazirani, Strengths and weaknesses of quantum computing. Preprint quant-ph/9701001 (1997). https://arxiv.org/pdf/quant-ph/9701001.pdf
C.H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, A. Peres, W. Wootters, teleporting an unknown quantum state via dual classical and EPR channels. Phys. Rev. Lett. 70, 1895–1899 (1993). http://www.research.ibm.com/quantuminfo/teleportation/teleportation.html
C.H. Bennett, S.J. Wiesner, Communication via one- and two-particle operators on Einstein-Podolsky-Rosen states, Phys. Rev. Lett. 69(20), 2881–2884 (1992)
E. Bernstein, U.V. Vazirani, Quantum complexity theory. SIAM J. Comput. 26(5), 1411–1473 (1997). A preliminary version of this paper appeared in the Proceedings of the 25th ACM Symposium on the Theory of Computing, 1993
Boyer, M., Brassard, G., Hoyer, P., Tapp, A. Tight bounds on quantum search, in Proceedings of the Workshop on Physics of Computation: PhysComp’96, Los Alamitos, CA, pp. 36–43 (1996). http://xxx.lanl.gov/abs/quant-ph/9805082
B.B. Brandt, C. Yannouleas, U. Landman, Interatomic interaction effects on second-order momentum correlations and Hong-Ou-Mandel interference of double-well-trapped ultracold fermionic atoms. arXiv:1801.02295v3 [cond-mat.quant-gas], 16 March 2018. https://arxiv.org/pdf/1801.02295.pdf. Also at Phys. Rev. A 97, 053601. Published 4 May 2018
S.L. Braunstein, Quantum Computation (A tutorial paper) (1995). http://www-users.cs.york.ac.uk/~schmuel/comp/comp_best.pdf
I.L. Chuang, N. Gershenfeld, M. Kubinec, Experimental implementation of fast quantum searching. Phys. Rev. Lett. 80, 3408–3411 (1998)
R. Cleve, A. Ekert, C. Macchiavllo, M. Mosca, Quantum algorithms revisited. Proc. R. Soc. Lond. A, 454, pp. 339–354 (1998). See preprint at: arXiv:quant-ph/9708016 v1 8 Aug 1997, http://arxiv.org/PS_cache/quant-ph/pdf/9708/9708016v1.pdf
D. Coppersmith, An Approximate Fourier Transform Useful in Quantum Factoring, IBM Research Report RC 19642 (1994)
D. Deutsch, Quantum theory, the Church-Turing principle and the universal quantum computer. Proc. R. Soc. Lond.; Ser. A, Math. Phys. Sci. 400(1818), 97–117 (1985). http://www.qubit.org/oldsite/resource/deutsch85.pdf
A. Ekert, R. Jozsa, Quantum computation and Shor’s factoring algorithm. Rev. Mod. Phys. 68(3), 733–753 (1996). http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.173.1518&rep=rep1&type=pdf
C. Figgatt et al., Complete 3-Qubit Grover search on a programmable quantum computer. Nat. Commun. 8 (2017). https://doi.org/10.1038/s41467-017-01904-7. Article number: 1918
C.F. Gauss, Disquisitiones Arithmeticae, (Arithmetical Investigations; original text in Latin) Translated by A. A. Clarke, Yale University Press, New Haven, Connecticut, 1966; Reprint edition by Springer-Verlag, New York, 1986
M.R. Geller, Z. Zhou, Factoring 51 and 85 with 8 qubits. Sci. Rep. 3 (2013). https://www.nature.com/articles/srep03023; https://doi.org/10.1038/srep03023. Article number: 3023
N.A. Gershenfeld, I.L. Chuang, Quantum computing with molecules. Sci. Am. 278(6), 66–71 (1998). http://cba.mit.edu/docs/papers/98.06.sciqc.pdf
L.K. Grover, A fast quantum mechanical algorithm for database search, in Proceedings of the 28th Annual ACM Symposium on the Theory of Computing, Philadelphia, pp. 212–219 (1996). Available at http://xxx.lanl.gov/abs/quant-ph/9605043
L.K. Grover, Quantum mechanics helps in searching for a needle in a haystack. Phys. Rev. Lett. 79(2), 325–328. 14 July 1997. Available at https://arxiv.org/pdf/quant-ph/9706033.pdf
L.K. Grover, Quantum computing. The Sci. (July/August), 24–30 (1999). http://cryptome.org/qc-grover.htm
L.K. Grover, From Schrödinger Equation to the Quantum Search Algorithm, quant-ph/0109116, Sept 22 2002. http://arxiv.org/PS_cache/quant-ph/pdf/0109/0109116.pdf
IBM, IBM Announces Advances to IBM Quantum Systems & Ecosystem. IBM News Room, 10 Nov 2017 (2017). https://www-03.ibm.com/press/us/en/pressrelease/53374.wss
Intel. 2018 CES: Intel Advances Quantum and Neuromorphic Computing Research. Intel Newsroom, 08 Jan 2018 (2018). https://newsroom.intel.com/news/intel-advances-quantum-neuromorphic-computing-research/
N. Johansson, J.-A. Larsson, Realization of Shor’s algorithm at room temperature (2017). arXiv:1706.03215v1 [quant-ph] 10 Jun 2017. https://arxiv.org/pdf/1706.03215.pdf
H. Johnston, Shor’s algorithm is implemented using five trapped ions. PhysicsWorld.com, 04 March 2016 (2016). http://physicsworld.com/cws/article/news/2016/mar/04/shors-algorithm-is-implemented-using-five-trapped-ions#comments
R. Jozsa, Quantum algorithms and the fourier transform (1997). arXiv:quant-ph/9707033v1 17 Jul 1997. https://arxiv.org/pdf/quant-ph/9707033.pdf
J. Kelly, A Preview of Bristlecone. Google’s New Quantum Processor. Google AI Blog, 05 March 2018 (2018). https://ai.googleblog.com/2018/03/a-preview-of-bristlecone-googles-new.html
A. Kitaev, Quantum Measurements and the Abelian Stabiliser Problem. arXiv:quant-ph/9511026. 20 Nov 1995 (1995). https://arxiv.org/pdf/quant-ph/9511026.pdf
R. Landauer, Irreversibility and heat generation in the computing process. IBM J. Res. Dev. 5(3), 183–191 (1961). (Reprinted in IBM Journal of Research and Development, Vol. 44, No. 1/2 January/March 2000, pp. 261–269.). http://www.research.ibm.com/journal/rd/441/landauerii.pdf
E. Lucero et al., Computing prime factors with a Josephson phase qubit quantum processor. Nat. Phys. 8, 719–723 (2012)
T. Monz et al., Realization of a scalable Shor algorithm. Science 351(6277), pp. 1068–1070 (2016). 04 March 2016
M.A. Nielsen, I.L. Chuang, Quantum Computation and Quantum Information (Cambridge University Press, 2000). [Errata at http://www.squint.org/qci/]
A. Peres, How the no-cloning theorem got its name (2002). arXiv:quant-ph/0205076v1, 14 May 2002. http://arxiv.org/PS_cache/quant-ph/pdf/0205/0205076v1.pdf. (As Asher reports, the title of the paper was contributed by John Wheeler.)
E. Rieffel, W. Polak, An introduction to quantum computing for non-physicists. ACM Comput. Surv. 32(3), 300–335 (2000). http://math.vassar.edu/Classes/280/papers/rieffelpolak.pdf; http://xxx.lanl.gov/abs/quant-ph/9809016
P.W. Shor, Algorithms for quantum computation: discrete log and factoring, in Proceedings of the 35th Annual Symposium on Foundations of Computer Science, pp. 124–134, Nov 1994. ftp://netlib.att.com/netlib/att/math/shorquantum.algorithms.ps.Z
P.W. Shor, Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Sci. Stat. Comput. 26(5), 1484–1509 (1997). Preprint at http://www.arxiv.org/PS_cache/quant-ph/pdf/9508/9508027.pdf
J.A. Smolin, G. Smith, A. Vargo, Pretending to factor large numbers on a quantum computer, arXiv:1301.7007v1 [quant-ph] (2013). http://arxiv.org/abs/1301.7007
J.A. Smolin, G. Smith, A. Vargo, Oversimplifying quantum factoring. Nature 499, 163–165 (11 July 2013)
A. Tarantola, The quantum D-wave 2 is 3600 times faster than a super computer. GIZMODO. 04 March 2014 (2014). http://gizmodo.com/the-quantum-d-wave-2-is-3-600-times-faster-than-a-super-1532199369
L. Torlina et al., Interpreting attoclock measurements of tunnelling times. Nat. Phys. 11, 503–508 (2015). 25 May 2015. http://people.physics.anu.edu.au/~ask107/INSPEC/PNAS.pdf
A. Turing, On computable numbers, with an application to the Entscheidungsproblem. Proc. Lond. Math. Soc. Ser. 2 42, 230–265 (1936). http://www.turingarchive.org/viewer/?id=466&title=01bb (Errata (1937): 43, pp. 544–546. http://www.abelard.org/turpap2/tp2-ie.asp
L.M.K. Vandersypen, M. Steffen, M.H. Sherwood, C.S. Yannoni, G. Breyta, I.L. Chuang, Implementation of a three-quantum-bit search algorithm. Appl. Phys. Lett. 76(5), 646–648 (2000). 31 Jan, 2000. Available at https://arxiv.org/pdf/quant-ph/9910075.pdf
L.M.K. Vandersypen, M. Steffen, G. Breyta, C.S. Yannoni, M.H. Sherwood, I.L. Chuang, Experimental realization of Shor’s quantum factoring algorithm using nuclear magnetic resonance. Nature 414, 883–887 (2001). 20–27 Dec 2001. http://www.fisica.uniud.it/~giannozz/Corsi/FisMod/Testi/nature.pdf
Vazirani, Kitaev’s factoring algorithm. Lecture 04, 04 Sept 1997 (1997). https://users.cs.duke.edu/~reif/courses/randlectures/UVnotes/lec18.pdf
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Copyright information
© 2020 Springer Nature Singapore Pte Ltd.
About this chapter
Cite this chapter
Bera, R.K. (2020). The Crown Jewels of Quantum Algorithms. In: The Amazing World of Quantum Computing. Undergraduate Lecture Notes in Physics. Springer, Singapore. https://doi.org/10.1007/978-981-15-2471-4_10
Download citation
DOI: https://doi.org/10.1007/978-981-15-2471-4_10
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-15-2470-7
Online ISBN: 978-981-15-2471-4
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)