{"title":"量子信息技术","authors":"K. Nemoto, Masahide Sasaki, G. J. Milburn","doi":"10.2201/NIIPI.2011.8.0","DOIUrl":null,"url":null,"abstract":"The basic ideas in quantum information processing (QIP) dates from several decades back, however the research development based on these ideas started only a little more than a decade ago. The initial ideas of quantum information processing emerged from the fundamental difference between quantum physics and classical physics. It was, and still is, hard to analyse quantum systems in general, and in particular when a quantum system gets bigger, it soon becomes intractable even with high performance computers. To analyse a quantum system, Feynman suggested that we should use a computer based on quantum physics. This is the initial idea of quantum information processing. By contrast to quantum computers, all non-quantum-physicsbased computers, that is, all the existing ones including high performance computers, are now called “classical computers” indicating computers based on classical physics. The research on quantum information processing did not take off until 1990s. Until then, the technology to manipulate quantum was yet not ready, and more importantly, the theory for QIP was not developed enough to show the way to efficiently use quantum nature to carry out computation. Quantum key distribution (QKD) was one of the first QIP protocols successfully implemented and developed in 1990s. QKD is a protocol to exchange secure key material between authenticated users at a distance. Thanks to a property that overlapping quantum states cannot be cloned without trace of interaction, the protocol can detect an eavesdropper by measuring the quantum states and post-processing the signals via classical communication between the users. As one-time pad using QKD was proven to be secure against an eavesdropper who has unbounded ability, unlike conventional cryptogra-","PeriodicalId":91638,"journal":{"name":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","volume":"123 1","pages":"1-3"},"PeriodicalIF":0.0000,"publicationDate":"2011-03-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"8","resultStr":"{\"title\":\"Quantum information technology\",\"authors\":\"K. Nemoto, Masahide Sasaki, G. J. Milburn\",\"doi\":\"10.2201/NIIPI.2011.8.0\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The basic ideas in quantum information processing (QIP) dates from several decades back, however the research development based on these ideas started only a little more than a decade ago. The initial ideas of quantum information processing emerged from the fundamental difference between quantum physics and classical physics. It was, and still is, hard to analyse quantum systems in general, and in particular when a quantum system gets bigger, it soon becomes intractable even with high performance computers. To analyse a quantum system, Feynman suggested that we should use a computer based on quantum physics. This is the initial idea of quantum information processing. By contrast to quantum computers, all non-quantum-physicsbased computers, that is, all the existing ones including high performance computers, are now called “classical computers” indicating computers based on classical physics. The research on quantum information processing did not take off until 1990s. Until then, the technology to manipulate quantum was yet not ready, and more importantly, the theory for QIP was not developed enough to show the way to efficiently use quantum nature to carry out computation. Quantum key distribution (QKD) was one of the first QIP protocols successfully implemented and developed in 1990s. QKD is a protocol to exchange secure key material between authenticated users at a distance. Thanks to a property that overlapping quantum states cannot be cloned without trace of interaction, the protocol can detect an eavesdropper by measuring the quantum states and post-processing the signals via classical communication between the users. As one-time pad using QKD was proven to be secure against an eavesdropper who has unbounded ability, unlike conventional cryptogra-\",\"PeriodicalId\":91638,\"journal\":{\"name\":\"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing\",\"volume\":\"123 1\",\"pages\":\"1-3\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2011-03-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"8\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.2201/NIIPI.2011.8.0\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"... Proceedings of the ... IEEE International Conference on Progress in Informatics and Computing. IEEE International Conference on Progress in Informatics and Computing","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.2201/NIIPI.2011.8.0","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 8

摘要

量子信息处理(QIP)的基本思想可以追溯到几十年前,然而基于这些思想的研究发展仅在十多年前开始。量子信息处理的最初想法源于量子物理学与经典物理学之间的根本差异。一般来说,分析量子系统过去是,现在仍然是困难的,特别是当量子系统变得更大时,即使使用高性能计算机,它也很快变得棘手。为了分析量子系统,费曼建议我们应该使用基于量子物理学的计算机。这是量子信息处理的最初想法。与量子计算机相比,所有非基于量子物理的计算机,即包括高性能计算机在内的所有现有计算机,现在都被称为“经典计算机”,即基于经典物理的计算机。量子信息处理的研究直到20世纪90年代才开始起步。在此之前,操纵量子的技术还没有准备好,更重要的是,QIP的理论还没有发展到足以展示有效利用量子性质进行计算的方法。量子密钥分发(QKD)是20世纪90年代成功实现和开发的首批QIP协议之一。QKD是一种在经过身份验证的用户之间远距离交换安全密钥材料的协议。由于没有相互作用的痕迹就无法克隆重叠的量子态,因此该协议可以通过测量量子态并通过用户之间的经典通信对信号进行后处理来检测窃听者。与传统密码不同,使用QKD的一次性密码被证明对具有无限能力的窃听者是安全的
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Quantum information technology
The basic ideas in quantum information processing (QIP) dates from several decades back, however the research development based on these ideas started only a little more than a decade ago. The initial ideas of quantum information processing emerged from the fundamental difference between quantum physics and classical physics. It was, and still is, hard to analyse quantum systems in general, and in particular when a quantum system gets bigger, it soon becomes intractable even with high performance computers. To analyse a quantum system, Feynman suggested that we should use a computer based on quantum physics. This is the initial idea of quantum information processing. By contrast to quantum computers, all non-quantum-physicsbased computers, that is, all the existing ones including high performance computers, are now called “classical computers” indicating computers based on classical physics. The research on quantum information processing did not take off until 1990s. Until then, the technology to manipulate quantum was yet not ready, and more importantly, the theory for QIP was not developed enough to show the way to efficiently use quantum nature to carry out computation. Quantum key distribution (QKD) was one of the first QIP protocols successfully implemented and developed in 1990s. QKD is a protocol to exchange secure key material between authenticated users at a distance. Thanks to a property that overlapping quantum states cannot be cloned without trace of interaction, the protocol can detect an eavesdropper by measuring the quantum states and post-processing the signals via classical communication between the users. As one-time pad using QKD was proven to be secure against an eavesdropper who has unbounded ability, unlike conventional cryptogra-
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
A convolutional neural network based approach towards real-time hard hat detection Report on the analyses and the applications of a large-scale news video archive: NII TV-RECS Large-scale cross-media analysis and mining from socially curated contents Scalable Approaches for Content -based Video Retrieval 湘南会議 The future of multimedia analysis and mining
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1