• Title/Summary/Keyword: quantum computing

Search Result 110, Processing Time 0.028 seconds

A review on a 4 K cryogenic refrigeration system for quantum computing

  • Park, Jiho;Kim, Bokeum;Jeong, Sangkwon
    • Progress in Superconductivity and Cryogenics
    • /
    • v.24 no.2
    • /
    • pp.1-6
    • /
    • 2022
  • This paper reviews the literature that has been published since 1980s related to cryogenic refrigeration systems for quantum computing. The reason why such a temperature level of 10-20 mK is necessary for quantum computing is that the superconducting qubit is sensitive to even very small thermal disturbances. The entanglement of the qubits may not be sustained due to thermal fluctuations and mechanical vibrations beyond their thresholds. This phenomenon is referred to as decoherence, and it causes an computation error in operation. For the stable operation of the quantum computer, a low-vibration cryogenic refrigeration system is imperative as an enabling technology. Conventional dilution refrigerators (DR), so called 'wet' DR, are precooled by liquid helium, but a more convenient and economical precooling method can be achieved by using a mechanical refrigerator instead of liquid cryogen. These 'dry' DRs typically equip pulse-tube refrigerators (PTR) for precooling the DRs around 4 K because of its particular advantage of low vibration characteristic. In this review paper, we have focused on the development status of 4 K PTRs and further potential development issues will be also discussed. A quiet 4 K refrigerator not only serves as an indispensable precooler of DR but also immediately enhances the characteristics of low noise amplifiers (LNA) or other cryo-electronics of various type quantum computers.

A Secure Quantum-Resistant Authentication and Key Distribution Protocol for NFC Payment Environments (NFC 결제 환경에서 양자 컴퓨팅에 안전한 인증 및 키 분배 프로토콜)

  • Kim, JongHyun;Park, KiSung;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.21 no.4
    • /
    • pp.485-492
    • /
    • 2018
  • Recently, the numerous authentication and key distribution protocol for NFC payment environment have been proposed using public key cryptosystems. However, these protocol are vulnerable to quantum computing attack because quantum computing can solve factoring and discrete logarithm problem effectively using Grover and Shor's algorithm. For these reason, the secure authentication and key distribution have become a very important security issue in order to prevent quantum computing attacks. Therefore, to ensure user's payment information and privacy, we propose a secure quantum resistant authentication and key distribution protocol for NFC payment environments.

Trends in Chip Fabrication Infrastructure for Implementation in Quantum Technology (양자 기술 구현을 위한 칩 제작 인프라 기술 동향)

  • J.W. Kim;K.W. Moon;J.J. Ju
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.1
    • /
    • pp.9-16
    • /
    • 2023
  • In the rapidly growing field of quantum computing, it is evident that a robust supply chain is needed for commercialization or large-scale production of quantum chips. As a result, the success of many R&D projects worldwide relies on the development of quantum chip foundries. In this paper, a variety of quantum chip foundries, particularly the ones creating photonic integrated circuit (PIC) quantum chips, are reviewed and summarized to demonstrate current technological trends. Global projects aiming to establish new foundries, as well as information regarding their respective funding, are also included to identify the evolutionary direction of quantum computing infrastructure. Furthermore, the potential application of lithium niobate as a novel material platform for quantum chips is also discussed.

Protection Technologies against Large-scale Computing Attacks in Blockchain (블록체인에서 대용량 컴퓨팅 공격 보호 기술)

  • Lee, Hakjun;Won, Dongho;Lee, Youngsook
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.11-19
    • /
    • 2019
  • The blockchain is a technique for managing transaction data in distributed computing manner without the involvement of central trust authority. The blockchain has been used in various area such as manufacturing, culture, and public as well as finance because of its advantage of the security, efficiency and applicability. In the blockchain, it was considered safe against 51% attack because the adversary could not have more than 50% hash power. However, there have been cases caused by large-scale computing attacks such as 51% and selfish mining attack, and the frequency of these attacks is increasing. In addition, since the development of quantum computers can hold exponentially more information than their classical computer, it faces a new type of threat using quantum algorithms. In this paper, we perform the security analysis of blockchain attacks composing the large computing capabilities including quantum computing attacks. Finally, we suggest the technologies and future direction of the blockchain development in order to be safe against large-scale computing attacks.

Quantum computing using applied electric field to quantum dots

  • Meighan, A.;Rostami, A.;Abbasian, K.
    • Advances in nano research
    • /
    • v.2 no.1
    • /
    • pp.15-22
    • /
    • 2014
  • In recent years, spins of confined carriers in quantum dots are promising candidates for the logical units in quantum computers. In many concepts developed so far, the individual spin q-bits are being manipulated by magnetic fields, which is difficult to achieve. In the current research the recent developments of spin based quantum computing has been reviewed. Then, Single-hole spin in a molecular quantum dots with less energy and more speed has been electrically manipulated and the results have been compared with the magnetic manipulating of the spin.

A NTRU-based Authentication and Key Distribution Protocol for SIP (SIP에서 NTRU 기반 인증 및 키 분배 프로토콜)

  • Jeong, SeongHa;Park, KiSung;Lee, KyungKeun;Park, YoungHo
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.11
    • /
    • pp.1768-1775
    • /
    • 2017
  • The SIP(Session Initiation Protocol) is an application layer call signaling protocol which can create, modify and terminate the session of user, and provides various services in combination with numerous existing protocols. However, most of cryptosystems for SIP cannot prevent quantum computing attack because they have used ECC(Elliptic Curve Cryptosystem). In this paper, we propose a NTRU based authentication and key distribution protocol for SIP in order to protect quantum computing attacks. The proposed protocol can prevent various attacks such as quantum computing attack, server spoofing attack, man-in-the middle attack and impersonation attack anonymity, and our protocol can provide user's anonymity.

Quantum Computing Policy and Technology Trends and Implications (양자컴퓨터 정책 및 기술 동향과 시사점)

  • J.H. Chung
    • Electronics and Telecommunications Trends
    • /
    • v.38 no.1
    • /
    • pp.1-8
    • /
    • 2023
  • In this research, policies, and technology trends associated with quantum computers were examined, and through this, implications for domestic methods were derived. It is not a guarantee that developing quantum computing technology suited for domestic use would be successful to emulate the success stories of technology-leading nations. Technology leaders like the United States, China, and Europe are putting together strategic technology blocks to compete for technological hegemony. Adapting to and exploiting this trend will help us develop future technologies and secure market competitiveness. The dominant technology in the area of quantum computing has not yet been established. In the future, there will be fair competition in every specific technology area. At this point, it may be claimed that making audacious decisions will still lead to technological superiority.

A Study on the Industrial Applications of Quantum Information Processing and Communication (퀀텀정보통신기술의 산업적 응용가능성에 관한 연구)

  • Kwon, Moon-Ju;Kim, Richard C.S.;Park, Seong-Taek;Kim, Tae Ung
    • Journal of Digital Convergence
    • /
    • v.11 no.7
    • /
    • pp.173-184
    • /
    • 2013
  • Quantum Information Processing and Communication, based on the physical laws of Quantum mechanics, exploits fundamentally new modes of computation and communication and holds the promise of immense computing power beyond the capabilities of any classical computer. In Quantum Information Processing, replacing bits with qubits, one makes two-state quantum systems that do not possess in general the definite values of 0 or 1 of classical bits, but rather are in a so-called. "coherent superposition", of the two. Full exploitation of this additional freedom implies that new processing devices need to be designed and implemented, and that a large scale quantum computer can in principle be built. New discoveries will enable a range of exciting new possibilities including: greatly improved sensors with potential impact for mineral exploration and improved medical imaging and a revolutionary new computational paradigm that will likely lead to the creation of computing devices capable of efficiently solving problems that cannot be solved on a classical computer. In short, Quantum computing is an economy game changer, with a potential of disrupting entire industries and creating new ones.

ETRI AI Strategy #2: Strengthening Competencies in AI Semiconductor & Computing Technologies (ETRI AI 실행전략 2: AI 반도체 및 컴퓨팅시스템 기술경쟁력 강화)

  • Choi, S.S.;Yeon, S.J.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.7
    • /
    • pp.13-22
    • /
    • 2020
  • There is no denying that computing power has been a crucial driving force behind the development of artificial intelligence today. In addition, artificial intelligence (AI) semiconductors and computing systems are perceived to have promising industrial value in the market along with rapid technological advances. Therefore, success in this field is also meaningful to the nation's growth and competitiveness. In this context, ETRI's AI strategy proposes implementation directions and tasks with the aim of strengthening the technological competitiveness of AI semiconductors and computing systems. The paper contains a brief background of ETRI's AI Strategy #2, research and development trends, and key tasks in four major areas: 1) AI processors, 2) AI computing systems, 3) neuromorphic computing, and 4) quantum computing.

A multilayered Pauli tracking architecture for lattice surgery-based logical qubits

  • Jin-Ho, On;Chei-Yol Kim;Soo-Cheol Oh;Sang-Min Lee;Gyu-Il Cha
    • ETRI Journal
    • /
    • v.45 no.3
    • /
    • pp.462-478
    • /
    • 2023
  • In quantum computing, the use of Pauli frames through software traces of classical computers improves computation efficiency. In previous studies, error correction and Pauli operation tracking have been performed simultaneously using integrated Pauli frames in the physical layer. In such a complex processing structure, the number of simultaneous operations processed in the physical layer exponentially increases as the distance of the surface code encoding logical qubit increases. This study proposes a Pauli frame management architecture partitioned into two layers for a lattice surgery-based surface code and describes its structure and operation rules. To evaluate the effectiveness of our method, we generated a random circuit according to the gate ratios constituting the commonly known quantum circuits and compared the generated circuit with the existing Pauli frame and our method. Simulations show a decrease of about 5% over traditional methods. In the case of experiments that only increase the code distance of the logical qubit, it can be seen that the effect of reducing the physical operation through the logical Pauli frame becomes more important.