Читать книгу Quantum Computing - Melanie Swan - Страница 7
На сайте Литреса книга снята с продажи.
ОглавлениеContents
About the Authors
List of Figures
List of Tables
Chapter 1Introduction
1.1Quantum Futures?
1.2Technophysics
1.2.1Conceptual toolkit of ideas
1.2.2New slate of all-purpose smart technology features
1.3Chapter Highlights
References
Part 1 Smart Networks and Quantum Computing
Chapter 2Smart Networks: Classical and Quantum Field Theory
2.1Smart Networks
2.2Smart Network Theory
2.2.1Conventional (SNFT) and (SNQFT)
2.2.2Smart network technologies are quantum-ready
2.3Two Eras of Network Computing
2.3.1Smart Networks 1.0
2.3.2Smart Networks 2.0
2.3.3Smart Networks 3.0: Quantum smart networks
2.3.4Smart network convergence
2.4Smart Network Field Theory: Classical and Quantum
2.4.1Theory requirements: Characterize, monitor, and control
2.5Smart Network Field Theory Development
2.5.1The “field” in field theory
2.5.2Statistical physics
2.6Field Theory
2.6.1The field is the fundamental building block of reality
2.6.2Field theories: Fundamental or effective
2.6.3The smart network theories are effective field theories
2.6.4Complex multi-level systems
2.7Five Steps to Defining an Effective Field Theory
References
Chapter 3Quantum Computing: Basic Concepts
3.1Introduction
3.1.1Breaking RSA encryption
3.2Basic Concepts: Bit and Qubit
3.2.1Quantum computing and classical computing
3.2.2Bit and qubit
3.2.3Creating qubits
3.3Quantum Hardware Approaches
3.3.1The DiVincenzo criteria
3.3.2Superconducting circuits: Standard gate model
3.3.3Superconducting circuits: Quantum annealing machines
3.3.4Ion trapping
3.3.5Majorana fermions and topological quantum computing
3.3.6Quantum photonics
3.3.7Neutral atoms, diamond defects, quantum dots, and nuclear magnetic resonance
References
Chapter 4Advanced Quantum Computing: Interference and Entanglement
4.1Introduction
4.1.1Quantum statistics
4.2Interference
4.2.1Interference and amplitude
4.3Noisy Intermediate-Scale Quantum Devices
4.3.1Computability and computational complexity
4.4Quantum Error Correction
4.4.1Practical concerns and status
4.4.2Quantum state decoherence
4.4.3Entanglement property of qubits
4.4.4Quantum information processors
4.5Bell Inequalities and Quantum Computing
4.5.1Introduction to inequalities
4.5.2Bell inequalities
4.6Practical Applications of Entanglement: NIST Randomness Beacon
4.6.1Certifiably random bits
References
Part 2 Blockchain and Zero-Knowledge Proofs
Chapter 5Classical Blockchain
5.1Introduction: Functionality and Scalability Upgrades
5.2Computational Verification and Selectable Trust Models
5.3Layer 2 and the Lightning Network
5.3.1Introduction to the Lightning Network
5.3.2Basic routing on the Lightning Network
5.3.3Smart routing: Sphinx routing and rendez-vous routing
5.3.4A new layer in the Lightning Network: Channel factories
5.3.5Smart routing through atomic multi-path routing
5.4World Economic History on Replay
5.5Verifiable Markets, Marketplaces, Gaming, Stablecoins
5.5.1Verifiable markets
5.5.2Digital marketplaces
5.5.3Stablecoins
5.6Consensus
5.6.1Next-generation classical consensus
5.6.2Next-generation PBFT: Algorand and DFINITY
5.6.3Quantum Byzantine Agreement
References
Chapter 6Quantum Blockchain
6.1Quantum Blockchain
6.1.1Quantum-secure blockchains and quantum-based logic
6.1.2Proposal for quantum Bitcoin
6.1.3Quantum consensus: Grover’s algorithm, quantum annealing, light
6.1.4Quantum money
6.2Quantum Internet
6.2.1Quantum network theory
6.3Quantum Networks: A Deeper Dive
6.3.1The internet’s new infrastructure: Entanglement routing
6.3.2Quantum memory
6.4Quantum Cryptography and Quantum Key Distribution
6.4.1Quantum key distribution
6.4.2Satellite-based quantum key distribution: Global space race
6.4.3Key lifecycle management
6.5Quantum Security: Blockchain Risk of Quantum Attack
6.5.1Risk of quantum attack in authentication
6.5.2Risk of quantum attack in mining
6.6Quantum-Resistant Cryptography for Blockchains
References
Chapter 7Zero-Knowledge Proof Technology
7.1Zero-Knowledge Proofs: Basic Concept
7.2Zero-Knowledge Proofs and Public Key Infrastructure Cryptography
7.2.1Public key infrastructure
7.2.2Blockchain addresses
7.3Zero-Knowledge Proofs: Interactive Proofs
7.3.1Interactive proofs: Graph isomorphism example
7.4Zero-Knowledge Proofs in Blockchains
7.4.1Zero-knowledge proofs: Range proofs
7.4.2Unspent transaction outputs model
7.5State-of-the-Art: SNARKs, Bulletproofs, and STARKs
7.5.1SNARKs and multi-party computation
7.5.2Bulletproofs and STARKs
7.6State-of-the-Art: Zether for Account-Based Blockchains
7.6.1Bulletproofs: Confidential transactions for UTXO chains
7.6.2Zether: Confidential transactions for account chains
7.6.3Confidential smart contract transactions
7.6.4IPFS interactive proof-of-time and proof-of-space
References
Chapter 8Post-quantum Cryptography and Quantum Proofs
8.1STARKs
8.1.1Proof technology: The math behind STARKs
8.1.2Probabilistically checkable proofs
8.1.3PCPs of proximity and IOPs: Making PCPs more efficient
8.1.4IOPs: Multi-round probabilistically checkable proofs
8.1.5Holographic proofs and error-correcting codes
8.2Holographic Codes
8.2.1Holographic algorithms
8.3Post-quantum Cryptography: Lattices and Hash Functions
8.3.1Lattice-based cryptography
8.3.2What is a lattice?
8.3.3Lattice-based cryptography and zero-knowledge proofs
8.3.4Lattice-based cryptography and blockchains
8.3.5Hash function-based cryptography
8.4Quantum Proofs
8.4.1Non-interactive and interactive proofs
8.4.2Conclusion on quantum proofs
8.5Post-quantum Random Oracle Model
8.6Quantum Cryptography Futures
8.6.1Non-Euclidean lattice-based cryptosystems
References
Part 3 Machine Learning and Artificial Intelligence
Chapter 9Classical Machine Learning
9.1Machine Learning and Deep Learning Neural Networks
9.1.1Why is deep learning called “deep”?
9.1.2Why is deep learning called “learning”?
9.1.3Big data is not smart data
9.1.4Types of deep learning networks
9.2Perceptron Processing Units
9.2.1Jaw line or square of color is a relevant feature?
9.3Technical Principles of Deep Learning Networks
9.3.1Logistic regression: s-curve functions
9.3.2Modular processing network node structure
9.3.3Optimization: Backpropagation and gradient descent
9.4Challenges and Advances
9.4.1Generalized learning
9.4.2Spin glass: Dark knowledge and adversarial networks
9.4.3Software: Nonlinear dimensionality reduction
9.4.4Software: Loss optimization and activation functions
9.4.5Hardware: Network structure and autonomous networks
9.5Deep Learning Applications
9.5.1Object recognition (IDtech) (Deep learning 1.0)
9.5.2Pattern recognition (Deep learning 2.0)
9.5.3Forecasting, prediction, simulation (Deep learning 3.0)
References
Chapter 10Quantum Machine Learning
10.1Machine Learning, Information Geometry, and Geometric Deep Learning
10.1.1Machine learning as an n-dimensional computation graph
10.1.2Information geometry: Geometry as a selectable parameter
10.1.3Geometric deep learning
10.2Standardized Methods for Quantum Computing
10.2.1Standardized quantum computation tools
10.2.2Standardized quantum computation algorithms
10.2.3Quantum optimization
10.2.4Quantum simulation
10.2.5Examples of quantum machine learning
References
Part 4 Smart Network Field Theories
Chapter 11Model Field Theories: Neural Statistics and Spin Glass
11.1Summary of Statistical Neural Field Theory
11.2Neural Statistics: System Norm and Criticality
11.2.1Mean field theory describes stable equilibrium systems
11.2.2Statistical neural field theory describes system criticality
11.3Detailed Description of Statistical Neural Field Theory
11.3.1Master field equation for the neural system
11.3.2Markov random walk redefined as Markov random field
11.3.3Linear and nonlinear models of the system action
11.3.4System criticality
11.3.5Optimal control theory
11.4Summary of the Spin-Glass Model
11.5Spin-Glass Model: System Norm and Criticality
11.6Detailed Description of the Spin-Glass Model
11.6.1Spin glasses
11.6.2Advanced model: p-Spherical spin glass
11.6.3Applications of the spin-glass model: Loss optimization
References
Chapter 12Smart Network Field Theory Specification and Examples
12.1Motivation for Smart Network Field Theory
12.2Minimal Elements of Smart Network Field Theory
12.3Smart Network System Definition
12.4Smart Network System Operation
12.4.1Temperature term
12.4.2Hamiltonian term
12.4.3Scale-spanning portability
12.5Smart Network System Criticality
12.5.1Particles (nodes)
12.5.2Node states
12.5.3Node action
12.5.4State transitions
12.6Applications of Smart Network Field Theories
12.6.1Smart network service provisioning application layers
12.6.2Basic administrative services
12.6.3Value-added services
12.6.4Smart network metrics
References
Part 5 The AdS/CFT Correspondence and Holographic Codes
Chapter 13The AdS/CFT Correspondence
13.1History and Summary of the AdS/CFT Correspondence
13.2The AdS/CFT Correspondence: Basic Concepts
13.2.1The holographic principle
13.2.2Holographic principle formalized in the AdS/CFT correspondence
13.2.3Quantum error-correction code interpretation
13.3The AdS/CFT Correspondence is Information-Theoretic
13.3.1Black hole information paradox
13.3.2The information-theoretic view
13.4The AdS/CFT Correspondence as Quantum Error Correction
13.4.1The AdS/CFT correspondence: Emergent bulk locality
13.4.2Quantum error correction with the correspondence
13.4.3Emergent bulk structure through error correction
13.4.4Extending AdS–Rindler with quantum secret-sharing
13.5Holographic Methods: The AdS/CFT Correspondence
13.5.1The correspondence as a complexity technology
13.5.2Strongly coupled systems: AdS/CMT correspondence
13.5.3Strongly coupled plasmas
References
Chapter 14Holographic Quantum Error-Correcting Codes
14.1Holographic Quantum Error-Correcting Codes
14.1.1Quantum error correction
14.1.2Tensor networks and MERA tensor networks
14.1.3AdS/CFT holographic quantum error-correcting codes
14.2Other Holographic Quantum Error-Correcting Codes
14.2.1.Emergent bulk geometry from boundary entanglement
14.2.2Ryu–Takayanagi quantum error correction codes
14.2.3Extending MERA tensor network models
14.2.4Bosonic error-correction codes
14.3Quantum Coding Theory
14.4Technophysics: AdS/Deep Learning Correspondence
14.4.1Novel uses of quantum error-correction architecture
References
Part 6 Quantum Smart Networks
Chapter 15AdS/Smart Network Correspondence and Conclusion
15.1Smart Network Quantum Field Theory
15.1.1AdS/CFT correspondence-motivated SNQFT
15.1.2Minimal elements of smart network quantum field theory
15.1.3Nature’s quantum security features
15.1.4Random tensors: A graph is a field
15.2The AdS/CFT Correspondence Generalized to the SNQFT
15.2.1Bidirectional: Bulk–boundary linkage
15.2.2Unidirectional: Interrogate complexity with simplicity
15.3Adding Dynamics to the AdS/CFT Correspondence
15.3.1Spin glass interpretation of the AdS/CFT correspondence
15.3.2Holographic geometry is free
15.4Quantum Information/SNQFT Correspondence
15.4.1Strategy: Solve any theory as a field theory in one fewer dimensions
15.4.2Macroscale reality is the boundary to the quantum mechanical bulk
15.5The SNFT is the Boundary CFT to the Bulk Quantum Information Domain
15.5.1The internet as a quantum computer
15.5.2Computing particle-many systems with the quantum internet
15.6Risks and Limitations
15.7Conclusion
15.7.1From probability to correspondence
15.7.2Farther consequences: Quantum computing eras
References
Glossary
Index