Abstract
The new Quantum Information Theory augurs powerful machines that obey the “entangled” logic of the subatomic world. Parallelism, entanglement, teleportation, no-cloning and quantum cryptography are typical peculiarities of this novel way of understanding computation. In this article, we highlight and explain these fundamental ingredients that make Quantum Computing potentially powerful and Quantum Communications reliable.
Similar content being viewed by others
References
Aspect A, Grangier P, Roger G (1981) Experimental tests of realistic local theories via Bell’s theorem. Phys Rev Lett 47:460–463
Bell JS (1966) On the problem of hidden variables in quantum mechanics. Rev Mod Phys 38:447–452
Bennett CH, Brassard G (1984) Quantum cryptography: public-key distribution and coin tossing. In: Proceedings IEEE international conference on computers, systems and signal processing, Bangalore, India, (IEEE, New York), pp 175–179
Bennett CH, Brassard G, Crepeau C, Jozsa R, Peres A, Wootters WK (1993) Teleporting an unknown quantum state via dual classical and EPR channels. Phys Rev Lett 70:1895–1899
Bouwmeester D, Pan JW, Mattle K, Eibl M, Weinfurter H, Zeilinger A (1997) Experimental quantum teleportation. Nature 390:575–579
Calixto M (2004) On the hidden subgroup problem and efficient quantum algorithms. In: Alvarez-Estrada RF, Dobado A, Fernández LA, Martín-Delgado MA, Munoz Sudupe A (eds) Fundamental physics workshop in honor to A. Galindo, Aula Documental de Investigación, Madrid
Cirac JI, Zoller P (1995) Quantum computation with cold trapped ions. Phys Rev Lett 74:4091–4094
Deutsch D (1985) Quantum theory, the Church-Turing hypothesis and universal quantum computers. Proc Roy Soc Lond A400:97–116
Doyle AC, Hodgson JA (1994) Sherlock Holmes. Basingstoke, Macmillan
Einstein A, Podolsky B, Rosen N (1935) Can quantum-mechanical description of physical reality be considered complete? Phys Rev 47:777–780
Ekert A (1991) Quantum cryptography based on Bell’s theorem. Phys Rev Lett 67:661–663
Feynman RP (1982) Simulating physics with computers. Int J Theor Phys 21:467–488
Grover LK (1997) Quantum mechanics helps in searching for needle in a haystack. Phys Rev Lett 79:325–328
Hirvensalo M (2001) Quantum computing, natural computing series. Springer-Verlag, New York
Menezes A, van Oorschot P, Vanstone S (1997) Handbook of applied cryptography. CRC Press, Baco Raton
Nielsen MA, Chuang IL (2000) Quantum computation and quantum information. Cambridge University Press, Cambridge
Preskill J (1998) Quantum computation. Lecture notes for physics 229
Schumacher B (1995) Quantum coding. Phys Rev A51:2738; Schumacher B, Nielsen MA (1996) Quantum data processing and error correction. Phys Rev A54:2629
Scientific American, special edition Solid state century (December 1997)
Shor PW (1994) Algorithms for quantum computation: discrete logarithms and factoring, 35th Annual Symposium of Foundations of Computer Science, pp 124–134
Williams CP, Clearwater SH (1997) Explorations in quantum computing. Springer-Verlag, New York
Acknowledgements
Work partially supported by the spanish MCYT and Fundación Séneca under projects FIS2005-05736-C03-01 and 03100/PI/05.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Calixto, M. Quantum computation and cryptography: an overview. Nat Comput 8, 663–679 (2009). https://doi.org/10.1007/s11047-008-9094-8
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11047-008-9094-8