Feeds

Quantum computer one step closer after ‘true’ quantum calculation

Baby steps

High performance access to file storage

An international group of physicists has had an important “first” acknowledged by the journal Nature Photonics: they built the first complete single-qubit system to implement a key algorithm in quantum computing.

The research, abstract here, is an end-to-end implementation of a quantum phase estimation algorithm. Quantum phase estimation is one of the important sub-classes of the discipline, since it’s a problem that only a quantum computer can, in theory, solve in polynomial time.

While prior experiments have demonstrated that the quantum states produced in a phase estimation could be read out, what the Nature: Photonics publication recognises is that this experiment runs the whole process: input, processing, and output.

As the researchers write in their paper: “all demonstrations to date have required already knowing the answer to construct the algorithm.”

This has been done, according to project leader Dr Xiao-Qi Zhou, so that experimenters could create quantum circuits simple enough to actually test. To get around the need to “look in the back of the book”, so to speak, his team – comprising researchers from the University of Bristol and the University of Queensland – embarked on the more ambitious project of building the entire quantum circuit “to implement the phase estimation algorithm without simplification”

As stated in the paper: “We have implemented the complete quantum phase estimation algorithm for a single qubit unitary in which the answer is calculated by the algorithm.”

Just as interesting is the claim made by the researchers that their approach is also scalable to multi-qubit systems, since both the algorithm and the number of qubits can be scaled.

The original work was carried out prior to 2011, and the pre-publication paper released at Arxiv, here. ®

High performance access to file storage

More from The Register

next story
Fancy joining Reg hack on quid-a-day challenge?
Recruiting now for charity starvation diet
Red-faced LOHAN team 'fesses up in blown SPEARS fuse fiasco
Standing in the corner, big pointy 'D' hats
KILLER SPONGES menacing California coastline
Surfers are safe, crustaceans less so
LOHAN's Punch and Judy show relaunches Thursday
Weather looking good for second pop at test flights
Discovery time for 200m WONDER MATERIALS shaved from 4 MILLENNIA... to 4 years
Alloy, Alloy: Boffins in speed-classification breakthrough
Elon Musk's LEAKY THRUSTER gas stalls Space Station supply run
Helium seeps from Falcon 9 first stage, delays new legs for NASA robonaut
Top Secret US payload launched into space successfully
Clandestine NRO spacecraft sets off on its unknown mission
New FEMTO-MOON sighted BIRTHING from Saturn's RING
Icy 'Peggy' looks to be leaving the outer rings
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.