{"title":"EPR and Bell’s theorem, and quantum algorithms","authors":"I. Kenyon","doi":"10.1093/oso/9780198808350.003.0010","DOIUrl":null,"url":null,"abstract":"EPR showed that quantum mechanics is not a local deterministic theory and on this account they argued that it is incomplete. Quantum mechanics predicts correlations over time-like separations. The suggested resolution in terms of local hidden variables is presented. Bell’s analysis leading to experimental tests is described. The experiment of Aspect, Grangier and Roger vindicating quantum mechanics is described. More refined experiments, avoiding conceivable biases, confirm this result. Then computing based on quantum principles is discussed. Bits with two states in a register would be replaced by qubits with values represented by points on the Bloch sphere. Basic gates are presented. Shor’s algorithm to decompose products of primes is described and a gate structure presented to implement it. Implementation would undermine current encryption methods. Quantum cryptography is described using the BB84 protocol. The no-cloning theorem protects this absolutely against attempts to intercept the encryption data.","PeriodicalId":165376,"journal":{"name":"Quantum 20/20","volume":"12 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2019-09-10","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Quantum 20/20","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1093/oso/9780198808350.003.0010","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
EPR showed that quantum mechanics is not a local deterministic theory and on this account they argued that it is incomplete. Quantum mechanics predicts correlations over time-like separations. The suggested resolution in terms of local hidden variables is presented. Bell’s analysis leading to experimental tests is described. The experiment of Aspect, Grangier and Roger vindicating quantum mechanics is described. More refined experiments, avoiding conceivable biases, confirm this result. Then computing based on quantum principles is discussed. Bits with two states in a register would be replaced by qubits with values represented by points on the Bloch sphere. Basic gates are presented. Shor’s algorithm to decompose products of primes is described and a gate structure presented to implement it. Implementation would undermine current encryption methods. Quantum cryptography is described using the BB84 protocol. The no-cloning theorem protects this absolutely against attempts to intercept the encryption data.