scispace - formally typeset
Search or ask a question
Author

Isaac L. Chuang

Bio: Isaac L. Chuang is an academic researcher from Massachusetts Institute of Technology. The author has contributed to research in topics: Quantum computer & Quantum information. The author has an hindex of 64, co-authored 299 publications receiving 65269 citations. Previous affiliations of Isaac L. Chuang include Bell Labs & University of California, Santa Barbara.


Papers
More filters
Journal ArticleDOI
TL;DR: In this article, an implementation of the simplest instance of Shor's quantum factoring algorithm is presented, for factorization of ${N=15}$ (whose prime factors are 3 and 5), which can be manipulated with room temperature liquid state nuclear magnetic resonance techniques.
Abstract: The number of steps any classical computer requires in order to find the prime factors of an $l$-digit integer $N$ increases exponentially with $l$, at least using algorithms known at present. Factoring large integers is therefore conjectured to be intractable classically, an observation underlying the security of widely used cryptographic codes. Quantum computers, however, could factor integers in only polynomial time, using Shor's quantum factoring algorithm. Although important for the study of quantum computers, experimental demonstration of this algorithm has proved elusive. Here we report an implementation of the simplest instance of Shor's algorithm: factorization of ${N=15}$ (whose prime factors are 3 and 5). We use seven spin-1/2 nuclei in a molecule as quantum bits, which can be manipulated with room temperature liquid state nuclear magnetic resonance techniques. This method of using nuclei to store quantum information is in principle scalable to many quantum bit systems, but such scalability is not implied by the present work. The significance of our work lies in the demonstration of experimental and theoretical techniques for precise control and modelling of complex quantum computers. In particular, we present a simple, parameter-free but predictive model of decoherence effects in our system.
01 Jan 2010
TL;DR: In this article, the superconducting transition is verified by measuring the resistance and critical current using a 4-wire measurement on the trap structure, and observing change in the rf re-flection.
Abstract: Sr ions at cryo-genic temperatures. The superconducting transition is verified and characterized by measuring the resistanceand critical current using a 4-wire measurement on the trap structure, and observing change in the rf re-flection. The lowest observed heating rate is 2.1(3) quanta/sec at 800 kHz at 6 K and shows no significantchange across the superconducting transition, suggesting that anomalous heating is primarily caused by noisesources on the surface. This demonstration of superconducting ion traps opens up possibilities for integratingtrapped ions and molecular ions with superconducting devices.Microfabricated surface electrode ion traps have signif-icantly advanced the capabilities of trapped ion systemsfor quantum information processing
Journal ArticleDOI
TL;DR: In this paper , a model of quantum signal processing (QSP) with generic perturbative noise in the signal processing basis and a diagrammatic notation useful for analyzing such errors is presented.
Abstract: Recent progress in quantum signal processing (QSP) and its generalization, quantum singular value transformation, has led to a grand unification of quantum algorithms. However, inherent experimental noise in quantum devices severely limits the length of realizable QSP sequences. We consider a model of QSP with generic perturbative noise in the signal processing basis and present a diagrammatic notation useful for analyzing such errors. To demonstrate our technique, we study a specific coherent error, that of under- or overrotation of the signal processing operator parametrized by $\ensuremath{\epsilon}\ensuremath{\ll}1$. For this coherent error model, it is shown that while Pauli $Z$ errors are not recoverable without additional resources, Pauli $X$ and $Y$ errors can be arbitrarily suppressed by coherently appending a noisy recovery QSP without the use of additional resources or ancillas. Furthermore, through a careful accounting of errors using our diagrammatic tools, we provide an upper and lower bound on the length of this recovery QSP operator. We anticipate that the perturbative technique and the diagrammatic notation proposed here will facilitate future study of generic noise in QSP and quantum algorithms.
Proceedings ArticleDOI
01 Jul 2018
TL;DR: In this paper, the authors measured the noise imparted to an optical signal propagating along a 42-km deployed optical fiber link using two different techniques employing referenced mode-locked lasers.
Abstract: Noise imparted to an optical signal propagating along a 42-km deployed optical fiber link is measured using two different techniques employing referenced mode-locked lasers. We compare the two techniques and assess their suitability for stabilizing the fiber link for quantum networks.

Cited by
More filters
Journal ArticleDOI

[...]

08 Dec 2001-BMJ
TL;DR: There is, I think, something ethereal about i —the square root of minus one, which seems an odd beast at that time—an intruder hovering on the edge of reality.
Abstract: There is, I think, something ethereal about i —the square root of minus one. I remember first hearing about it at school. It seemed an odd beast at that time—an intruder hovering on the edge of reality. Usually familiarity dulls this sense of the bizarre, but in the case of i it was the reverse: over the years the sense of its surreal nature intensified. It seemed that it was impossible to write mathematics that described the real world in …

33,785 citations

01 Dec 2010
TL;DR: This chapter discusses quantum information theory, public-key cryptography and the RSA cryptosystem, and the proof of Lieb's theorem.
Abstract: Part I. Fundamental Concepts: 1. Introduction and overview 2. Introduction to quantum mechanics 3. Introduction to computer science Part II. Quantum Computation: 4. Quantum circuits 5. The quantum Fourier transform and its application 6. Quantum search algorithms 7. Quantum computers: physical realization Part III. Quantum Information: 8. Quantum noise and quantum operations 9. Distance measures for quantum information 10. Quantum error-correction 11. Entropy and information 12. Quantum information theory Appendices References Index.

14,825 citations

Journal ArticleDOI
TL;DR: Spintronics, or spin electronics, involves the study of active control and manipulation of spin degrees of freedom in solid-state systems as discussed by the authors, where the primary focus is on the basic physical principles underlying the generation of carrier spin polarization, spin dynamics, and spin-polarized transport.
Abstract: Spintronics, or spin electronics, involves the study of active control and manipulation of spin degrees of freedom in solid-state systems. This article reviews the current status of this subject, including both recent advances and well-established results. The primary focus is on the basic physical principles underlying the generation of carrier spin polarization, spin dynamics, and spin-polarized transport in semiconductors and metals. Spin transport differs from charge transport in that spin is a nonconserved quantity in solids due to spin-orbit and hyperfine coupling. The authors discuss in detail spin decoherence mechanisms in metals and semiconductors. Various theories of spin injection and spin-polarized transport are applied to hybrid structures relevant to spin-based devices and fundamental studies of materials properties. Experimental work is reviewed with the emphasis on projected applications, in which external electric and magnetic fields and illumination by light will be used to control spin and charge dynamics to create new functionalities not feasible or ineffective with conventional electronics.

9,158 citations

Journal ArticleDOI
23 Jun 2006-Science
TL;DR: This work shows how electromagnetic fields can be redirected at will and proposes a design strategy that has relevance to exotic lens design and to the cloaking of objects from electromagnetic fields.
Abstract: Using the freedom of design that metamaterials provide, we show how electromagnetic fields can be redirected at will and propose a design strategy. The conserved fields-electric displacement field D, magnetic induction field B, and Poynting vector B-are all displaced in a consistent manner. A simple illustration is given of the cloaking of a proscribed volume of space to exclude completely all electromagnetic fields. Our work has relevance to exotic lens design and to the cloaking of objects from electromagnetic fields.

7,811 citations

Journal ArticleDOI
TL;DR: In this paper, the authors considered factoring integers and finding discrete logarithms on a quantum computer and gave an efficient randomized algorithm for these two problems, which takes a number of steps polynomial in the input size of the integer to be factored.
Abstract: A digital computer is generally believed to be an efficient universal computing device; that is, it is believed able to simulate any physical computing device with an increase in computation time by at most a polynomial factor. This may not be true when quantum mechanics is taken into consideration. This paper considers factoring integers and finding discrete logarithms, two problems which are generally thought to be hard on a classical computer and which have been used as the basis of several proposed cryptosystems. Efficient randomized algorithms are given for these two problems on a hypothetical quantum computer. These algorithms take a number of steps polynomial in the input size, e.g., the number of digits of the integer to be factored.

7,427 citations