Feeds

Boffins go dotty over quantum teleportation

No 'beaming up' was involved

Securing Web Applications Made Simple and Scalable

Researchers at the University of Singapore have demonstrated that it is possible to "teleport" information from one so-called quantum dot to another.

The team used a computer model to show that decoherence, the tendency of quantum information to leak into the environment, is not a problem when working on such a small scale, and that quantum information about one dot can be transferred to another without loss.

Quantum dots are large clusters of atoms that can be described by a single quantum state, in the same way that an atom is. This makes them ideal candidates for use as quantum bits, or qbits, in quantum computing.

They used a computer model to study the transfer or swapping of states between two dots, and determined that it can be done perfectly, under certain very specific conditions. The model revealed that the fidelity of the teleportation is proportional to the entanglement of the two dots, and that a two-dot system would still work under a moderate amount of decoherence.

(Entanglement means that the mathematical description of one dot must refer to the other dot, regardless of how far apart from one another they are. Decoherence is the fact of information being lost by a system through interaction with the environment.)

In theory the work paves the way for functioning large scale quantum computers, which depend on being able to move information around, just like normal computers do. But the reality may be a bit more complex.

Professor Ben Murdin, head of the Photonics group at the University of Surrey says he remains cautious.The real test of all these systems comes when you try to scale up.

"It is relatively easy to build one or two identical quantum dots. The problem comes when you want more than that."

Making identical dots is hard enough, he explained. Making more is even harder because you increase your chances of making an error. Even if you could replicate your original dot multiple times without errors, you run into serious problems with information loss caused by the decoherence which increases with the complexity of the system.

"The more dots you have, the more they tend to leak information into the environment, and the less equal they are. Which has a similar sort of effect," he told us. "Essentially, the bigger the system is, the noisier it becomes."

Despite his misgivings, Professor Murdin notes: "This research is a critical step to get quantum computers into real world applications. Right now, information is whizzing around all over the place on your computer. Quantum information will only really be useful once we can move it around, too.

"But as to when we will see a quantum computer for sale...that is a tough question."

The research is by K.W. Choo and L. C. Kwek, entitled Quantum dot as a resource for teleportation and state swapping and published in Phys. Rev. B 75 205321 (2007). ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Malaysian Airlines flight MH17 claimed lives of HIV/AIDS cure scientists
Researchers, advocates, health workers among those on shot-down plane
The Sun took a day off last week and made NO sunspots
Someone needs to get that lazy star cooking again before things get cold around here
Mwa-ha-ha-ha! Eccentric billionaire Musk gets his PRIVATE SPACEPORT
In the Lone Star State, perhaps appropriately enough
MARS NEEDS OCEANS to support life - and so do exoplanets
Just being in the Goldilocks zone doesn't mean there'll be anyone to eat the porridge
Diary note: Pluto's close-up is a year from … now!
New Horizons is less than a year from the dwarf planet
Forty-five years ago: FOOTPRINTS FOUND ON MOON
NASA won't be back any time soon, sadly
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.