-
Book Overview & Buying
-
Table Of Contents
A Practical Guide to Quantum Computing
By :
In this chapter, we have studied several different applications of individual qubits, including schemes for quantum money that cannot be forged, protocols for distributing secret keys that are practically impossible to break, and methods to distinguish working bombs from duds without making them explode.
With these examples, you now have a deep understanding of how qubit states, gates, and measurements work in practice, and how to exploit certain quantum phenomena, including superposition, interference, the no-cloning theorem, and the uncertainty principle. You are also familiar with some of the applications of quantum systems based on single qubits, including their use in securing communications through the use of Quantum Key Distribution protocols.
In the next chapter, we are going to put all this into practice. We will take our first steps in quantum computer programming using Qiskit, a very comprehensive Python library that will help us manipulate qubits with both quantum...