Professional Documents
Culture Documents
Table of Contents
Introduction 2
References 20
Introduction
Quantum computing (QC) represents the new technological frontier. Tools are being
created to control entangled quantum states of particles which are so complex that
they can’t be simulated with our best supercomputers. Yoo et al. (2012) defines QC
as a digital innovation because it relies on digital technology platforms to create a
novel computational method. Hitherto considerations don't extend past small,
individual use-cases, despite QC having sizable implications for every industry.
Academically, QC doesn’t conform to the theoretical frameworks surrounding
disruptive digital innovations. These research gaps created the impetus for this
paper, and they will be addressed by augmenting the existing disruptive innovation
frameworks. Using this tool, forecasting the future implications for global markets
becomes more feasible. For example, cyber security’s effects on the development of
QC and its implications in the post-quantum world are overarching and profound. If
delivered at global scale, quantum computing has the potential to provide provably
unbreakable security. Contrastingly, it could empower malicious actors with the
intractable power to hack nearly all existing information systems that use industry
standard cryptographic methods. This paper will outline the fundamentals of
quantum computing, alongside the existing QC landscape. Following this, future
developments of the technology are considered, alongside cyber security as an
example of a use-case that advances quantum computing’s development. Lastly,
this paper analyses the future of quantum computing for global business practices,
especially as they pertain to cyber security, and suggests some challenges to
progress.
2
Quantum Computing Overview
3
The Global Quantum Computing Market
In 2017 the enterprise cloud computing market was valued at $650m (Lanjudkar,
2019). Forecasts of the global QC market can be unreliable due to the technology’s
infancy, but according to Statista (2019a), who complied multiple market forecasts
(Figure 1), QC will become a billion-dollar industry between 2020 and 2030.
Statista, 2019a
4
Figure 2: Size of the enterprise quantum computing market worldwide 2017 to 2030 (in
million USD)
Tractica, 2019a
5
Figure 3: Number of qubits achieved in quantum computers by organisations from
1998 to 2019
CB Insights, 2019
With this trend forecast to continue, demonstrable quantum supremacy is not far in
the distance (Holst, 2019). Figure 3 also suggests American tech companies have
been responsible for the biggest breakthroughs in achieving high qubit machines
until now.
Another important consideration for the state of existing quantum computers is their
relative cost and complexity to configure. Remote access removes the barriers to
adoption for businesses, giving rise to the Quantum as a Service (QaaS) industry.
The business model has some of the largest players contributing to it, despite being
in the inception phase. For example, in 2019 Rigetti announced that their 32-qubit
hybrid quantum computer chip will be available on AWS Braket (AWS, 2020).
Alibaba released an 11-qubit quantum computer to their cloud service in 2018 (Gao
& Mak, 2018) and IBM released a 28-qubit machine called “Raleigh” in 2020 (Chow
& Gametta, 2020).
6
Figure 4: Government investment into quantum computing technology
Holst, 2019
7
Figure 5: Quantum computing companies ranked by total equity funding as of
October 2019 (in million USD)
Statista, 2018
8
Figure 6: Quantum Computing Startup Deals and Funding Worldwide From
2012 to 2019
Statista, 2019b
Figure 6 shows that startup funding deals over the past 8 years has only shown
slight growth, but the financial implications have steadily risen. Most notably, since
2017 YoY investment has broken the $100m barrier. Funding has increased as
technology steadily proves its applicability and comes closer to commercial viability.
Notwithstanding, Figure 6 excludes hidden internal investments made by firms, such
as IBM and Alibaba, potentially worth millions of dollars.
9
Figure 7: Timeline of Quantum Computing Developments
From the time horizon and interdisciplinary approach of academics and businesses
(Figure 7), it is clear that there was no unilateral coordination of research and
development efforts. Interestingly, unilateral approaches to quantum computing
developments may be possible in future. Tushman et al. (1991) argued that products
should be seen as subsystems, each of which is individually innovated. Today’s
technology firms and governments control enough resources to innovate these
subsystems.
Schmidt and Druehl (2008) likewise critique disruptive innovation theory, arguing that
inaction of incumbents allows new technology to develop into a sufficient alternative
to the existing conditions. Therefore the new technology is only disruptive in the long
10
run. This theory appears more closely aligned with QC’s trajectory, possibly because
disruptive innovation theory is too focused on market niches and supply-side
interactions (McDowall, 2018; Adner, 2002). An alternative trajectory for digital
innovations was suggested by Phaal et al. (2004), who argued that substantial
improvements in performance become impossible over time due to economic or
technical constraints. The slowdown creates a turbulent environment until a new
dominant design emerges. Given that Moore’s law has begun to fail, thanks to the
dimensional limits of atoms themselves, the new dominant design might be quantum
computing (Spender, 2018). Contrastingly, technological competition analysis has
revealed that transitions between technologies are not due to incumbent
technology’s limits (Cooper & Schendel, 1976; Henderson, 1995). In summary,
disruptive innovation theory does not appear to represent quantum computing’s
trajectory into the mass market. Alternative theories look more promising, but a new
conceptualization is required.
Revolutionary Innovation
To advance understanding of QC’s development trajectory, Figure 8 outlines an
augmented version of the disruptive innovation concept by Christensen et al. (2015).
11
As a revolutionary innovation, rather than simply disruptive, quantum computing
begins from the highest price point per unit of performance and slowly becomes
more attractive for mainstream markets. During phase 1, efficient algorithms do not
exist for each use-case and infrastructure experiences decoherence or lacks qubits.
This makes QC applicable to very few practical situations, and progress is mainly
academic or extremely high risk investments. In phase 2, price per performance unit
begins to fall with increasing speed as the innovation develops with iterative help
from the niche use-cases that it now serves. For example, the UK government
announced £1bn in funding for quantum technologies from a mix of private and
public sector. From this, they expect to realise commercial opportunities that
otherwise would not have been met, proving that financial assistance is necessary to
develop at the requisite speed (Department for Business, Energy & Industrial
Strategy, 2019). Such developments in quantum computing may allow it to tip into
phase 3: a mass market forms, sparking continuous funding for product development
on a larger scale, in tandem with new applications of the technology being found.
From QC’s development history, and its current investment and adoption levels, it is
likely that the technology is coming to the end of phase 2 of the revolutionary
innovation lifecycle. It has entered the realm of niche-use cases, as will be later
discussed, but has not quite hit the high end of the market at the end of phase 2.
This is foreseeable in the future, however as it took nearly 50 years to get to this
point in the life cycle, further developments are not expected soon. In conclusion,
augmenting existing disruptive innovation theory appears to be a more accurate
description of where the technology came from and therefore more likely to forecast
its future.
12
Quantum Computing’s Development Future
Funding for QC is relatively small compared to AI and blockchain, as QC is not
advanced enough to present a viable return on investment for short-term equity
funding (Holst, 2019). However, one alternative measure of the development future
is applications for related patents.
Relecura, 2018a
13
Figure 10: Share of quantum computing patent applications worldwide from
1999-2017, by country
Relecura, 2018b
China and Taiwan make up 22% with few other large individual players, further
highlighting the China vs America competition in this field (Figure 10). Impacts of this
are likely to be moulded by the idiosyncratic political landscape and extent to which
key industries adopt the technology in each country, making them hard to predict.
Overall the development future of quantum computing is bright, with research
translating into patentable technological developments.
14
used to encrypt a file (public key) does not pose a security risk because only the
prime factors of that integer can decrypt it (private keys). The public key can be
published, allowing encrypted communications to be sent between parties. However
only authorised parties (those with the private keys) can decrypt the messages.
These difficulties in factoring primes constitute a fundamental cornerstone of modern
cryptography, especially industry standard encryptions like Rivest-Shamir-Adleman
(RSA) or Elliptic Curve Cryptography (ECC) (Rivest et al., 1983; Miller, 1986).
15
Figure 11: Number of quantum cryptography patent applications worldwide, as
of 2015, by country
However, QKD is only feasible with fault-tolerant quantum computers which are still
decades away from being available. The quantum cryptography patents (Figure 11)
show that progress is being made, but QKDs are not in the foreseeable future.
Quantum Annealing
Quantum annealing is metaheuristic for finding the minimum of a given function over
a set of finite possible solutions (Stollenwerk et al., 2020). It is best used in
optimisation problems for researchers to find absolute minimum sizes, lengths,
costs, and distances (CB Insights, 2019). For example, Stollenwerk et al. (2020)
16
found optimal trajectories for air traffic management. Alternatively, Google and
D-Wave partnered with Volkswagen to optimise Beijing’s traffic flows (Neukart et al.,
2017). Quantum annealing found ideal paths for each individual vehicle, resulting in
the average congested routes falling from 140 to 58. This is a clear example of
quantum supremacy, but hypothetical applications are even more impressive. For
example, state and topology attacks are two cyber attacks in which a malicious actor
seeks to change the meter or network data, enabling them to interfere with state or
topology estimates, and thus operations (Liu et al., 2009; Kim & Tong, 2013a). To
find the optimal countermeasure to these attacks is equivalent to finding the
minimum vertex cover of the sub-network’s topology (Kim & Tong, 2013b).
Therefore, Javad-Kalbasi et al. (2019) argued that quantum annealing is the
strongest defence mechanism against such attacks, suggesting that in a
post-quantum world we may have even stronger cyber security measures. Equally,
CB Insights (2019) suggest using quantum annealing to optimize aircraft routing
according to weather, airport schedules, passenger information and fuel costs.
Classical computers would take thousands of years to solve this problem.
Summarily, widespread quantum annealing may optimise many practical scenarios
alongside offering improvements to cyber security.
Quantum as a Service
Due to QC’s installation and maintenance costs, QaaS is the only pragmatic delivery
model for global scale quantum computing. Many firms will see no benefit to
developing in-house quantum capabilities, especially if QaaS offers a cost-effective
alternative. Therefore, it is foreseeable that QaaS will be responsible for the majority
of enterprise quantum computing’s $5.8bn market in 2025 (Lanjudkar, 2019). In this
event, global monopoly powers are likely to have condensed into the handful of
companies that offer QaaS. This questions whether a global monopoly on the best
computational technology, especially one with QC’s cyber security implications,
should be controlled by private companies. However, in a future where quantum
computing is available to the mass market, there are benefits to be realised. One
example is Grover’s algorithm (1998) which searches unstructured datasets with
time complexity O(√n) instead of O(n) like classical computers (Wichert, 2016). This
is hyper-efficient for applications like web searches or processing high-scale IoT data
streams, both of which will become more important in future. Alternatively, QaaS
could improve training of AI models because quantum-enabled AI can ingest large
volumes of unstructured data at high velocity (Zhaokai et al., 2014). Simultaneously,
QaaS may empower malicious actors with the tools to undermine the cryptographic
principles upon which our cyber security is based. This is however counterbalanced
by the few entities who own quantum computers, and therefore have usage
oversight. Summarily, the advent of QaaS has huge ethical implications for global
17
monopoly powers, with both the potential to improve our information systems and to
destroy their security.
18
Furthermore, existing legislative infrastructure needs to be addressed. Under Article
32 of the EU’s General Data Protection Regulation (2018), there is a clause requiring
“state of the art” technical measures to ensure cyber security is appropriate to risks.
Similarly, the FTC requires “reasonable safeguards” under the Federal Trade
Commission Act Section 5 (The US Federal Reserve, 2017). The question of how to
decide what constitutes “state of the art” or “reasonable safeguards” becomes more
salient over time, considering QC’s forecasted growth in the most important
consumer markets in the world (Figure 12).
Figure 12: Size of the enterprise quantum computing market by industry from
2017 to 2030 (in million USD)
Tractica, 2019b
Aerospace, Agriculture, Life Sciences, and Automotive industries have the highest
forecasted quantum computing growth according to Figure 12. These industries
require some of the most stringent regulatory standards, necessitating progressive
legislation in the face of quantum supremacy and its impacts on cyber security.
Currently, law-making ignores the advent of quantum computing, creating a
potentially uncertain environment in which future businesses can operate. The risk of
retrospective legislation undermining existing commercial practices also reduces risk
taking and therefore investment in QC. As such, the legislative environment is
currently a barrier to progress for quantum computing and clarification is required as
to whether citizens have a right to quantum-resistant products and services in the
future.
19
References
AWS (2020) Amazon Braket Hardware Providers. Amazon Web Services [online].
Available at: https://aws.amazon.com/braket/hardware-providers/ [Accessed 19
February 2020]
Arome, G., Kayode, A. B., Olusola, A. A., Sunday, A. O., Abimbola, S. O. (2019)
Post-Quantum Crystography System for Secure Electronic Voting, Open Computer
Science, 9(1), p. 292. doi: 10.1515/comp-2019-0018.
Bermudo Mera, J. M., Liu, S., Sepulveda, J. (2019) Post-Quantum Enabled Cyber
Physical Systems. IEEE Embedded Systems Letters, 1 1(4), pp. 106–110. doi:
10.1109/LES.2019.2895392.
Chen, J., He, D., Peng, C., Zeadally, S. (2019) Isogeny-Based Cryptography: A
Promising Post-Quantum Technique. IT Professional, 21(6), pp. 27–32. doi:
10.1109/MITP.2019.2943136.
Chiang, H., Filimonov, Y., Gutierrez, D., Khitun, A., Khivintsev, Y., Kozhevnikov, A.,
Ranjbar, M. (2016) Prime factorization using magnonic holographic devices, Journal
of Applied Physics, 120(12), pp. 123901–1.
Chow, J., Gambetta, J. (2020) Quantum Takes Flight: Moving from Laboratory
vailable at:
DEmonstrations to Building Systems. IBM [online] A
https://www.ibm.com/blogs/research/2020/01/quantum-volume-32/ [Accessed 19
February 2020]
20
Chuang, I. L., Gersenfeld, N., Kubinec, M. (1998). Experimental Implementation of
Fast Quantum Searching. Physical Review Letters, 8 0(15), pp. 3408-3411.
Department for Business, Energy & Industrial Strategy (2019). £1 billion investment
makes UK a frontrunner in quantum technologies. [press release] 13 June 2019.
Available at:
https://www.gov.uk/government/news/1-billion-investment-makes-uk-a-frontrunner-in
-quantum-technologies [Accessed 23 February 2020]
Gao, F., Mak, L. (2018) Alibaba Cloud and CAS Launch One of the World’s Most
Powerful Public Quantum Computing Services. Alibaba Cloud [online] Available at:
https://www.alibabacloud.com/press-room/alibaba-cloud-and-cas-launch-one-of-the-
worlds-most [Accessed 19 February 2020]
Grosshans, F., Lawson, T., Morain, F., Smith, B., (2015). Factoring safe semiprimes
with a single quantum query. arXiv preprint arXiv:1511.04385. [Accessed: 15
February 2020]
Henderson R. (1995). Of life cycles real and imaginary: the unexpectedly long old
age of optical lithography. Research Policy 24(4), pp. 631–643.
10.1016/S0048-7333(94)00790-X
Holst, A. (2019). Quantum Computing: A dossierplus on the state and outlook of the
5th generation of computing.Statista. Statista Inc.. Available at:
21
https://0-www-statista-com.pugwash.lib.warwick.ac.uk/study/61640/quantum-computi
ng/ [Accessed: 13 February 2020]
Kim, J., Tong, L. (2013a) On Topology Attack of a Smart Grid: Undetectable Attacks
and Countermeasures. IEEE Journal on Selected Areas in Communications, 31(7),
pp. 1294-1305
Kim, J., Tong, L. (2013b) On phasor measurement unit placement against state and
topology attacks. IEEE International Conference on Smart Grid Communications.
Vancouver, Canada, 21-24 October 2013, New York: IEEE
Ladd, T. D., Jelezko, F., Laflamme, R., Nakamura, Y., Monroe, C., O’Brien, J. L.
(2010) Quantum computers, Nature, 464(7285), pp. 45-53.
Liu, Y., Ning, P., Reiter, M. K. (2009) False data injection attacks against state
estimation in electric power grids. Proceedings of the 16th ACM conference on
Computer and communications security, Chicago, USA, 9-13 November 2009. New
York: IEEE.
22
Mayers, D. (2001) Unconditional Security in Quantum Cryptography, Journal of
Association for Computing Machinery, 48(3), pp. 351–406,
McDowall, W. (2018) Disruptive innovation and energy transitions: Is Chirstensen’s
theory helpful? Energy Research & Social Science, 37 pp. 243-246. Doi:
10.1016/j.erss.2017.10.049
Miller, V. S. (1986) Use of Elliptic Curves in Cryptography. In: Williams H.C. (eds)
Advances in Cryptology: CRYPTO ’85 Proceedings. Berlin, Springer. Pp.416-426.
Neukart, F., Compostella, G., Seidel, C., von Dollen, D., Yarkoni, S., Parney, B.
, p 26.
(2017) Traffic flow optimization using a quantum annealer. Frontiers in ICT, 4
https://doi.org/10.3389/fict.2017.00029
Preskill, J., (2018). Quantum Computing in the NISQ era and beyond. Quantum, 2,
p.79. DOI: https://doi.org/10.22331/q-2018-08-06-79
23
https://0-www-statista-com.pugwash.lib.warwick.ac.uk/statistics/947927/quantum-co
mputing-patent-applications-share-by-country/ [Accessed: 22 February 2020]
Rivest, R. L., Shamir, A., Adleman, L. (1983) A Method for Obtaining Digital
Signatures and Public-Key Cryptosystems, Communications of the ACM, 26(1),
p.96. Available at:
http://0-search.ebscohost.com.pugwash.lib.warwick.ac.uk/login.aspx?direct=true&db
=edb&AN=5221774&site=eds-live [Accessed: 28 February 2020]
Smith-Goodson, P. (2019) Quantum USA Vs. Quantum China: The World’s Most
Important Technology Race. Forbes.com [ online]. Available at:
https://www.forbes.com/sites/moorinsights/2019/10/10/quantum-usa-vs-quantum-chi
na-the-worlds-most-important-technology-race/#4415c4ff72de [Accessed: 16
February 2020]
Spender, M. (2018). The End of Moore’s Law. US Black Engineer and Information
1(1), p.76.
Technology, 4
Srivastava, R. K., Fahey, L., Christensen, H. L. (2001) The resource-based view and
marketing: The role of market-based assets in gaining competitive advantage.
Journal of Management, 2 7, pp. 777-802. D
oi: 10.1177/014920630102700610
Statista. (2019b). Quantum computing startup deals and funding worldwide from
2012 to 2019. Statista. Statista Inc.. Available at:
24
https://0-www-statista-com.pugwash.lib.warwick.ac.uk/statistics/950790/quantum-co
mputing-equity-funding-worldwide/ [Accessed: 15 February 2020]
Stollenwerk, T., O’Gorman, B., Venturelli, D., MAndra, S., Rodionova, O., Ng, H.,
Sridhar, B., Rieffel, E. G., Biswas, R. (2020) Quantum Annealing Applied to
De-Conflicting Optimal Trajectories for Air Traffic Management, IEEE Transactions
on Intelligent Transportation Systems, 21(1), pp. 285–297. doi:
10.1109/TITS.2019.2891235.
The US Federal Reserve (2017) Federal Trade Commission Act Section 5: Unfair or
Deceptive Acts or Practices. The US Federal Reserve [online]. Chapter 311, Statute
719. Available at: https://www.federalreserve.gov/boarddocs/supmanual/cch/ftca.pdf
[Accessed 22 February 2020]
Tractica. (2019a). Size of the enterprise quantum computing market worldwide from
2017 to 2030 (in million U.S. dollars). Statista. Statista Inc.. Available at:
https://0-www-statista-com.pugwash.lib.warwick.ac.uk/statistics/962845/global-enter
prise-quantum-computing-market/ [Accessed: 15 February 2020]
Tractica. (2019b). Size of the enterprise quantum computing market by industry from
2017 to 2030 (in million U.S. dollars)*. Statista. Statista Inc.. Available at:
https://0-www-statista-com.pugwash.lib.warwick.ac.uk/statistics/962882/global-enter
prise-quantum-computing-market-by-industry/ [Accessed: 22 February 2020]
Wang, H., Wang, Y., Zhang, H. (2018) Quantum Polynomial-Time Fixed-Point Attack
for RSA. China Communications, 15(2), pp. 25-32. DOI: 10.1109/CC.2018.8300269
25
Wichert, A. (2016). Artificial Intelligence and a Universal Quantum Computer. AI
Communications. 2 9(4) pp. 537-545. DOI 10.3233/AIC-160699
Yoo, Y., Boland, Jr R.J., Lyytinen, K., Majchrzak, A. (2012) Organizing for innovation
in the digitized world. Organization Science 23(5), pp.1398–1408
Zhaokai, L., Xiaomei, L., Nanyang, X., jiangfeng, D. (2014) Experimental Realization
of Quantum Artificial Intelligence. Physical Review Letters 114(14) doi:
10.1103/PhysRevLett.114.140504.
26