Summary
As progress is made in implementing quantum computers, the question is looming: What will we do with them?
This proposal is concerned with the theoretical computer science aspects of this question. Part of this question is concerned with quantum algorithms (WP1). We know of several examples of quantum algorithms with large speedups over the best known classical algorithms, such as Shor's poly-time integer factorization algorithm. While this is evidence that quantum computers will be useful once built, it does not tell us what quantum computers will be used for in practice (probably not much factoring). To ensure that quantum computer users are best able to make use of them, we will focus on developing general techniques for the design of quantum algorithms that can be easily applied by subject-matter experts in different fields to the problems that interest them.
We will also consider the constraints of early quantum computers in our algorithm design. First, we would like to understand how the limited memory of early quantum computers will impact what they can do. Some of the most important techniques for designing quantum algorithms are already well-suited to the study of space-bounded computation, and we will generalize and improve these in WP1. To complement this, we will study lower bounds and complexity (WP2), focusing on space-bounded complexity classes, which have many relationships with other complexity classes. Second, since most early users will have to delegate their quantum computations, we would like to understand which quantum algorithms can still be used in various delegated or multiparty settings where some type of security is a consideration. We take the novel approach of using a quantum algorithmic model called span programs to design secure quantum computing protocols (WP3). It turns out that space-bounded models and secure quantum computation are very much related, and understanding this relationship is what ties this proposal together.
This proposal is concerned with the theoretical computer science aspects of this question. Part of this question is concerned with quantum algorithms (WP1). We know of several examples of quantum algorithms with large speedups over the best known classical algorithms, such as Shor's poly-time integer factorization algorithm. While this is evidence that quantum computers will be useful once built, it does not tell us what quantum computers will be used for in practice (probably not much factoring). To ensure that quantum computer users are best able to make use of them, we will focus on developing general techniques for the design of quantum algorithms that can be easily applied by subject-matter experts in different fields to the problems that interest them.
We will also consider the constraints of early quantum computers in our algorithm design. First, we would like to understand how the limited memory of early quantum computers will impact what they can do. Some of the most important techniques for designing quantum algorithms are already well-suited to the study of space-bounded computation, and we will generalize and improve these in WP1. To complement this, we will study lower bounds and complexity (WP2), focusing on space-bounded complexity classes, which have many relationships with other complexity classes. Second, since most early users will have to delegate their quantum computations, we would like to understand which quantum algorithms can still be used in various delegated or multiparty settings where some type of security is a consideration. We take the novel approach of using a quantum algorithmic model called span programs to design secure quantum computing protocols (WP3). It turns out that space-bounded models and secure quantum computation are very much related, and understanding this relationship is what ties this proposal together.
Unfold all
/
Fold all
More information & hyperlinks
Web resources: | https://cordis.europa.eu/project/id/101040624 |
Start date: | 01-07-2022 |
End date: | 30-06-2027 |
Total budget - Public funding: | 1 499 798,75 Euro - 1 499 798,00 Euro |
Cordis data
Original description
As progress is made in implementing quantum computers, the question is looming: What will we do with them?This proposal is concerned with the theoretical computer science aspects of this question. Part of this question is concerned with quantum algorithms (WP1). We know of several examples of quantum algorithms with large speedups over the best known classical algorithms, such as Shor's poly-time integer factorization algorithm. While this is evidence that quantum computers will be useful once built, it does not tell us what quantum computers will be used for in practice (probably not much factoring). To ensure that quantum computer users are best able to make use of them, we will focus on developing general techniques for the design of quantum algorithms that can be easily applied by subject-matter experts in different fields to the problems that interest them.
We will also consider the constraints of early quantum computers in our algorithm design. First, we would like to understand how the limited memory of early quantum computers will impact what they can do. Some of the most important techniques for designing quantum algorithms are already well-suited to the study of space-bounded computation, and we will generalize and improve these in WP1. To complement this, we will study lower bounds and complexity (WP2), focusing on space-bounded complexity classes, which have many relationships with other complexity classes. Second, since most early users will have to delegate their quantum computations, we would like to understand which quantum algorithms can still be used in various delegated or multiparty settings where some type of security is a consideration. We take the novel approach of using a quantum algorithmic model called span programs to design secure quantum computing protocols (WP3). It turns out that space-bounded models and secure quantum computation are very much related, and understanding this relationship is what ties this proposal together.
Status
SIGNEDCall topic
ERC-2021-STGUpdate Date
09-02-2023
Images
No images available.
Geographical location(s)