๐ŸŒŒ
Privacy Village Academy
Join The Community!AcademyAbout HGPE
  • Hitchhiker's Guide to Privacy Engineering
    • โ“What is HGPE?
      • โš–๏ธWho is this for?
      • ๐Ÿง™โ€โ™‚๏ธPrivacy Engineering
      • ๐ŸŽจCreative Privacy
      • ๐Ÿ”ฎGenerative AI
      • ๐Ÿง‘โ€๐Ÿ’ปAbout the Author
  • ๐Ÿง™โ€โ™‚๏ธThe Ethical AI Governance Playbook 2025 Edition
    • ๐Ÿค–Chapter 1 : AI Literacy
    • ๐ŸŒChapter 2 : AI Governance in the 21st Century
    • โŒ›Chapter 3 - Getting Started with AI Act Compliance
    • ๐Ÿš€Chapter 4 : Rise of AI Governance: Building Ethical & Compliant AI
    • Chapter 5 : Introduction to the Lifecycle of AI
  • ๐ŸŽ“Privacy Engineering Field Guide Season 1
    • โ“Decoding the Digital World: Exploring Everyday Technology
    • ๐Ÿ‘๏ธIntroduction: Why Privacy Matters?
      • Age of Mass Surveillance
      • Privacy & Democracy
      • Privacy & Government Surveillance
    • โšกChapter 1 : How Computers Work?
      • Electricity
      • Bits
      • Logic Gates
      • Central Processing Unit (CPU)
      • Graphic Processing Unit (GPU)
      • Motherboard
      • Data Storage
      • Databases
      • Operating System (OS)
      • Computer Code
      • Programming Languages
      • The File System
      • Bugs and Errors
      • Computer Virus
      • Internet of Things (IoT)
      • Cloud Computing
    • ๐Ÿ›ฐ๏ธChapter 2 : How the internet works?
      • Physical Infrastructure
      • Network and Protocols
      • Switch
      • Routers
      • IP Address
      • Domain Name System (DNS)
      • Mac Address
      • TCP / IP
      • OSI Model
      • Packets
      • The Client - Server Architecture
      • Secure Socket Shell (SSH)
      • Transport Layer Security (TLS)
      • Firewall
      • Tunnels and VPNs
      • Proxy Server
    • ๐Ÿ–ฅ๏ธChapter 3 : How Websites Work?
      • HTML
      • CSS
      • Javascript
      • Web Server
      • Browser
      • HTTP
      • Databases
      • Front End (Client Side)
      • Back End (Server Side)
      • Cookies
      • Local Storage
      • Session Storage
      • IndexedDB
      • XHR Requests
      • Web APIs
      • Webhooks
      • Email Server
      • HTTPS
      • Web Application Firewall
      • Single Sign-on (SS0)
      • OAuth 2.0
      • Pixels
      • Canvas Fingerprinting
      • Email Tracking
      • Containers
      • CI/CD
      • Kubernetes
      • Serverless Architecture
    • โš›๏ธChapter 4 : How Quantum Computers Work?
      • Quantum Properties
      • Quantum Bits (Qubits)
      • Decoherence
      • Quantum Circuits
      • Quantum Algorithms
      • Quantum Sensing
      • Post-Quantum Cryptography
    • ๐Ÿ“ณChapter 5 : Mobile Apps and Privacy
      • Battery
      • Processor
      • Mobile Operating Systems
      • Mobile Data Storage
      • Cellular Data
      • Mobile Device Sensors
      • Wireless Connectivity
      • Camera & Microphone
      • Mobile Apps
      • Software Development Kits (SDKs)
      • Mobile Device Identifiers
      • Bring Your Own Device (BYOD)
  • ๐Ÿ•ต๏ธโ€โ™‚๏ธPrivacy Engineering Field Guide Season 2
    • โ“Introduction to Privacy Engineering for Non-Techs
      • ๐ŸŽญChapter 1 : Digital Identities
        • What is identity?
        • Authentication Flows
        • Authentication vs. Authorization
        • OAuth 2.0
        • OpenID Connect (OIDC)
        • Self Sovereign Identities
        • Decentralized Identifiers
        • eIDAS
      • ๐Ÿ‘๏ธโ€๐Ÿ—จ๏ธChapter 2 : De-Identification
        • Introduction to De-Identification?
        • Input / Output Privacy
        • De-identification Strategies
        • K-Anonymity
        • Differential Privacy
        • Privacy Threat Modeling
  • ๐Ÿ“–HGPE Story and Lore
    • ๐ŸชฆChapter 1 : The Prologue
    • โ˜„๏ธChapter 2 : Battle for Earth
    • ๐Ÿฆ Chapter 3 : A Nightmare To Remember
    • ๐Ÿง™โ€โ™‚๏ธChapter 4 : The Academy
    • ๐ŸŒƒChapter 5: The Approaching Darkness
    • โš”๏ธChapter 6 : The Invasion
    • ๐ŸฐChapter 7 : The Fall of the Academy
    • ๐Ÿ›ฉ๏ธChapter 8 : The Escape
    • ๐ŸชChapter 9 : The Moon Cave
    • ๐Ÿฆ‡Chapter 10: Queen of Darkness
  • ๐Ÿ“บVideos, Audio Book and Soundtracks
    • ๐ŸŽงReading Episodes
    • ๐ŸŽนSoundtracks
  • ๐Ÿ‘พHGPE Privacy Games and Challenges
    • ๐ŸŽฎData Privacy Day'23 / Privacy Treasure Hunt Game
    • ๐ŸงฉPrivacy Quest
  • ๐Ÿ“ฌSubscribe Now!
Powered by GitBook
On this page
  • What is Decoherence?
  • Quantum Fault Tolerance
  • The Bit-Flip Code
  • Quantum Winter

Was this helpful?

  1. Privacy Engineering Field Guide Season 1
  2. Chapter 4 : How Quantum Computers Work?

Decoherence

PreviousQuantum Bits (Qubits)NextQuantum Circuits

Last updated 2 years ago

Was this helpful?

What is Decoherence?

You can think of decoherence as the ultimate buzzkill for quantum computers, spoiling all the fun of their superposition states.

Decoherence occurs when the quantum behavior of qubits decays. The quantum state can be disturbed instantly by vibrations or temperature changes. This can cause qubits to fall out of superposition and cause errors to appear in computing.

Qubits have very short lifespans before they "break" and their state changes unintentionally, ruining your computation.

This causes the qubits to lose their superposition state and settle into a single state, just like the partygoers would settle down and go home if the party was shut down.

This can be a problem for quantum computers because it means that the qubits lose their ability to consider multiple possibilities at once.

Decoherence means the unwanted interaction of your qubits, your quantum computer, and the external environment. Quantum coherence is a desired property for a qubit. Coherence tells us something about how long a qubit retains its information as some sort of lifetime.

Noise is one of the biggest problems in quantum computing.

All quantum computers built today have qubits that interfere with each other and are very noisy. Thatโ€™s why we hope to get error-corrected quantum computers where qubits act like the abstract qubits that we want them to be.

The trouble is any interaction with the external world that leaks out the information whether a qubit is 1 or 0 to be recorded in the radiation in the room or molecules in the air or the wires it is as if that qubit has been measured.

The state has now collapsed, it has been entangled with its environment and causing it to lose its quantum state. Thatโ€™s why qubits need to become perfectly isolated from each other. Thatโ€™s impossible in order to tell them what to do in a quantum computer. This was the reason why in the 90s quantum computer was believed to be impossible.

Quantum Fault Tolerance

Quantum Fault Tolerance theory emerged to build a reliable quantum computer.

Qubits are not required to be perfectly isolated but really well isolated. Even if every qubit is leaking its state to the environment at some rate, as long as that rate is low enough we can encode the information that we care about in very clever ways across the collective states of multiple qubits. We are constantly monitoring the qubits for leaks to detect and correct the errors from the remaining qubits.

Error correction imposes an overhead in the number of qubits to build a scalable quantum computer.

The Bit-Flip Code

The bit-flip code uses two spare qubits to protect an original qubit.

If one of the qubits suffers an error, the error correction code can use the other qubits to "fix" it back into the proper state.

Quantum Winter

Even after a tremendous amount of public and private money is spent pursuing quantum technologies, some papers claim that quantum computing is just too complicated and wonโ€™t be effective for at least the next few decades.

In the quantum winter scenario, qubits will remain noisy and quantum computers will never scale.

Eventually, classical computers might remain faster and more practical than owning or using a quantum computer.

๐ŸŽ“
โš›๏ธ
As Red and Kyle approached the cave lab of Lilith, they could feel a sense of dread and fear creeping up on them. The entrance was dark and foreboding, with strange, grotesque shapes lurking in the shadows.
Page cover image