Quantum Computing based on Tensor Products Overview and Introduction
|
|
- Laura Gallagher
- 5 years ago
- Views:
Transcription
1 Quantum Computing based on Tensor Products Overview and Introduction Guillermo Morales Luna Computer Science Section CINVESTAV-IPN 5-th International Workshop on Applied Category Theory Graph-Operad Logic Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 1 / 38
2 Agenda 1 Abstract 2 Overview of the whole course 3 References 4 Hilbert Spaces 5 Function Evaluation 6 Deutsch-Jozsa s Algorithm 7 Quantum Computation of the Discrete Fourier Transform 8 Shor Algorithm 9 Quantum Cryptography 10 Communication Complexity Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 2 / 38
3 Agenda 1 Abstract 2 Overview of the whole course 3 References 4 Hilbert Spaces 5 Function Evaluation 6 Deutsch-Jozsa s Algorithm 7 Quantum Computation of the Discrete Fourier Transform 8 Shor Algorithm 9 Quantum Cryptography 10 Communication Complexity Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 3 / 38
4 Abstract We present a short introduction to Quantum Computing (QC) from a procedural point of view. Rather, it is a course of parallel computing based on tensor products. We introduce primitive functions and the compositional schemes of QC. We use Tensor Product notation instead of the more conventional Dirac s ket notation. We introduce basic notions of Tensor Products and Hilbert Spaces and the qubits as points in the unit circle in the two-dimensional complex Hilbert space, then any word consisting of qubits lies in the corresponding unit sphere of the tensor product of these spaces. We illustrate the computing paradigm through the classical Deutsch-Josza algorithm. Then we show the quantum algorithm to compute the Discrete Fourier Transform in linear time and the famous polynomial-time Shor algorithm for integer factorization. We finish our exposition with a basic introduction to Quantum Cryptography and Quantum Communication Complexity. Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 4 / 38
5 Agenda 1 Abstract 2 Overview of the whole course 3 References 4 Hilbert Spaces 5 Function Evaluation 6 Deutsch-Jozsa s Algorithm 7 Quantum Computation of the Discrete Fourier Transform 8 Shor Algorithm 9 Quantum Cryptography 10 Communication Complexity Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 5 / 38
6 Overview of the whole course Contents 1 Introduction 2 Tensor Products 1 Vector and Space Products 2 Products of Linear Maps 3 Basic Notions on Quantum Computing 1 Measurement Principle 2 Qubits and Words of Quantum Information 3 Quantum Gates 4 Observables and the Heisenberg Principle of Uncertainty 5 Evaluation of Boolean Functions 6 Deutsch-Jozsa s Algorithm 4 Quantum Computation of the Discrete Fourier Transform Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 6 / 38
7 5 Shor Algorithm 1 A Short Refreshment of Number Theory 2 Quantum Algorithm to Calculate the Order of a Number 1 Elements whose Order is a Power of 2 2 Elements with Arbitrary Order 6 Quantum Cryptography: Key Agreement Protocols 1 Channels without Noise 2 Channels with Noise 7 Communication Complexity 1 Parities Addition 2 Congruent Functions with the Hamming Weight Map 3 Identity Checking 4 Inner Product 1 Using an Entangled Pair of Qubits 2 Algorithm without Entangled States 5 Deutsch-Josza Relation Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 7 / 38
8 Agenda 1 Abstract 2 Overview of the whole course 3 References 4 Hilbert Spaces 5 Function Evaluation 6 Deutsch-Jozsa s Algorithm 7 Quantum Computation of the Discrete Fourier Transform 8 Shor Algorithm 9 Quantum Cryptography 10 Communication Complexity Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 8 / 38
9 General references Quantum Computing D. Bouwmeester, A. K. Ekert, and A. Zeilinger. The Physics of Quantum Information: Quantum Cryptography, Quantum Teleportation, Quantum Computation. Springer, Berlin, G. Brassard. Quantum communication complexity (a survey), G. Brassard, I. Chuang, S. Lloyds, and C. Monroe. Quantum computing. Proc. Natl. Acad. Sci. USA, 95: , Sept M. Nielsen and I. Chuang. Quantum Computation and Quantum Information. Cambridge University Press, Cambridge, Physics and Math R. Abraham, J. E. Marsden, and T. Ratiu. Manifolds, Tensor Analysis, and Applications. Springer-Verlag, Berlin, J. S. Bell. On the Einstein-Podolsky-Rosen paradox. Physics, 1:195, S. Lang. Algebra, 4-th Edition. Springer-Verlag, Berlin, Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 9 / 38
10 Special topics Classics D. Deutsch. Quantum Theory, the Church-Turing Principle and the Universal Quantum Computer. Proceedings of the Royal Society of London Ser. A, 400:96 117, D. Deutsch and R. Jozsa. Rapid solution of problems by quantum computation. Proceedings of the Royal Society of London Ser. A, 439: , A. S. Holevo. Some estimates of the information transmitted by a quantum communication channel. Probl. Peredachi Inf., 9:3, Also Probl. Inf. Transm. (USSR) 9, 177 (1973). P. W. Shor. Algorithms for quantum computation: Discrete logarithms and factoring. In IEEE Symposium on Foundations of Computer Science, pages IEEE, P. W. Shor. Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer. SIAM Journal on Computing, 26: , Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 10 / 38
11 Algorithmics and Crypto T. Hogg. Solving highly constrained search problems with quantum computers. Journal of Artificial Intelligence Research, 10:39 66, C. Lavor, L. Manssur, and R. Portugal. Shor s algorithm for factoring large integers. Mar S. J. Lomonaco. A Quick Glance at Quantum Cryptography. Cryptologia, 23:1 41, S. J. Lomonaco. A Talk on Quantum Cryptography or How Alice Outwits Eve. arxiv: quant-ph/ v1, Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 11 / 38
12 Quantum complexity E. Bernstein and U. Vasirani. Quantum complexity theory. In Proc. of the 25-th Annual ACM Symposium on Theory of Computing, AIP Conference Proceedings. Association of Computing Machinery, R. Cleve. An introduction to quantum complexity theory, Entanglement G. Brassard, R. Cleve, and A. Tapp. Cost of exactly simulating quantum entanglement with classical communication. Phys. Rev. Lett., 83: , H. Buhrman, R. Cleve, and W. van Dam. Quantum entanglement and communication complexity. SIAM J. Comp., 30(6): , March S. Massar, D. Bacon, N. Cerf, and R. Cleve. Classical simulation of quantum entanglement without local hidden variables. Phys. Rev. A, 63:52305, Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 12 / 38
13 Agenda 1 Abstract 2 Overview of the whole course 3 References 4 Hilbert Spaces 5 Function Evaluation 6 Deutsch-Jozsa s Algorithm 7 Quantum Computation of the Discrete Fourier Transform 8 Shor Algorithm 9 Quantum Cryptography 10 Communication Complexity Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 13 / 38
14 Hilbert Spaces Basic notions Complex field. C Vector space. H: Non-empty set. 0 H Addition. + : H H H. (H, +) Abelian group Scalar multiplication. : C H H. Distributive w.r.t. addition Inner product. : H H C. Sesquilinear form. Positive definite. Norm. 2 : H R +, x 2 = x x. Completeness. Every Cauchy sequence is convergent. Autoduality. For each T H exists y H: T(x) = y x. Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 14 / 38
15 Geometrical properties: m-dimensional Hilbert spaces Canonical basis. e j = (δ ij ) i<m Unit sphere. E m = {v H 1 = v H v =: v v } Unitary map. U : H H linear s.t. M H M = 1 mm. U Em : E m E m Tensor products Spaces. dim(u) = n & dim(v) = m dim(u V) = nm. U V U V. The difference consists of entangled states. Vectors. x U & y V x y U V. Maps. S : U 1 V 1 & T : U 2 V 2 S T : U 1 U 2 V 1 V 2. Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 15 / 38
16 Measurement Principle In current state v = (v i1 ) i<m = m 1 i=0 E m, for each i < m, with probability v i1 2 the following is performed: The index i is output and the computing control is transferred to the state e i. Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 16 / 38
17 Qubits and Quregisters Spaces and basis H 1 = C 2 ; H n = H n 1 H 1 dim(h n ) = 2 n e 0 = [1 0] T and e 1 = [0 1] T basis in H 1. (e εn 1 ε 1 ε 0 ) εn 1,...,ε 1,ε 0 {0,1} basis in H n. Qubits. z E 2 unit sphere in H 1. Quregister. z 1 z n 1 = z i, i N, qubits z 1 z n 1 E 2 n H n Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 17 / 38
18 Quantum speed-up Conventional Dirac s ket notation ε n 1 ε 1 ε 0 := e εn 1 ε 1 ε 0 = e εn 1 e ε1 e ε0 =: ε n 1 ε 1 ε 0 (1) Any state in H n, σ(z) = ε {0,1} n z εe ε is determined by 2 n coordinates. If U : H n H n is a quantum operator, the target state σ(uz) consists also of 2 n coordinates. A calculus involving an exponential number of terms is performed in just one step of the quantum computation. Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 18 / 38
19 Agenda 1 Abstract 2 Overview of the whole course 3 References 4 Hilbert Spaces 5 Function Evaluation 6 Deutsch-Jozsa s Algorithm 7 Quantum Computation of the Discrete Fourier Transform 8 Shor Algorithm 9 Quantum Cryptography 10 Communication Complexity Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 19 / 38
20 Function Evaluation V = {0, 1}: binary digits Each index in the set {0,..., 2 n 1} corresponds to a string ε = (ε n 1,..., ε 1, ε 0 ) V n which in turn corresponds to e ε H n. Let f : V n V m be a function. A quantum algorithm U f : H n+m H n+m computes f if U f : e ε 0 e ε ɛe f(ε) where ɛ = 1. A final measurement on last qubits provides the value f(ε), with probability 1. Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 20 / 38
21 Agenda 1 Abstract 2 Overview of the whole course 3 References 4 Hilbert Spaces 5 Function Evaluation 6 Deutsch-Jozsa s Algorithm 7 Quantum Computation of the Discrete Fourier Transform 8 Shor Algorithm 9 Quantum Cryptography 10 Communication Complexity Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 21 / 38
22 Deutsch-Jozsa s Algorithm Let V = {0, 1} be the set of classical truth values. Deutsch-Jozsa s problem Decide, for a given f : V V, whether it is constant or balanced in just one computing step. Given f, let U f be the matrix s.t. U f (e x e z ) = (e x e (z+f(x)) mod 2 ). We have H 2 U f H 2 : e 0 e 1 εe S e 1 where H 2 is Hadamard s operator, ε { 1, 1} is a sign and S is a signal indicating whether f is balanced or not. S coincides with f(0) f(1). Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 22 / 38
23 Agenda 1 Abstract 2 Overview of the whole course 3 References 4 Hilbert Spaces 5 Function Evaluation 6 Deutsch-Jozsa s Algorithm 7 Quantum Computation of the Discrete Fourier Transform 8 Shor Algorithm 9 Quantum Cryptography 10 Communication Complexity Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 23 / 38
24 Quantum Computation of the Discrete Fourier Transform Given f = n 1 j=0 f(j)e j C n, its discrete Fourier transform is n 1 DFT(f) = ˆf 1 n 1 ( ) 2πijk = exp f(k) n n e j C n. j=0 k=0 DFT is linear transform and, w.r.t. ( ( the canonical basis, it is represented by the unitary matrix DFT = 1 2πijk )) n exp n jk Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 24 / 38
25 If n = 2 ν, H ν = C n, and by identifying each j [[0, 2 ν 1]] with ε j = ε j,ν 1 ε j,1 ε j,0 : DFT(e εj ) = ν (e 0 + exp ( ) ) πij e 1 2 k k=0 ( ) ) ( ) ) ( ) ) = (e 1 πij 0 +exp e 1 (e 1 πij 0 +exp e 1 (e 1 πij 0 +exp 2 2 ν 1 e 1 (2) The products appearing in this tensor product suggest the operators Q k : H 1 H 1 and their controlled versions: Q k = 1 0 ( ) πi 0 exp 2 k, Q c kj = exp ( πi ) j 2 k. Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 25 / 38
26 Algorithm for the Fourier transform Input. n = 2 ν, f C n = H ν. Output. ˆf = DFT(f) H ν. Procedure DFT(n, f) 1 Let x 0 := H(e 0 ). 2 For each j [[0, 2 ν 1]], or equivalently, for each (ε j,ν 1 ε j,1 ε j,0 ) {0, 1} ν, do (in parallel): 1 For each k [[0, ν 1]] do (in parallel): 1 Let δ := R k ( εj k ) be the reverse of the chain consisting of the (k + 1) less significant bits. 2 Let y jk := x 0. 3 For l = 0 to k do { y jk := Q c2 (y jk, e δj,l ) } 2 Let y j := y j0 y j,ν 1. 3 Output as result ˆf = 2 ν 1 j=0 f jy j. Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 26 / 38
27 Agenda 1 Abstract 2 Overview of the whole course 3 References 4 Hilbert Spaces 5 Function Evaluation 6 Deutsch-Jozsa s Algorithm 7 Quantum Computation of the Discrete Fourier Transform 8 Shor Algorithm 9 Quantum Cryptography 10 Communication Complexity Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 27 / 38
28 Let n be an integer to be factored 1 Select an integer m such that 1 < m < n. 2 If gcd(n, m) = d > 1, then d is a non-trivial factor of n. 3 Otherwise, m is in the multiplicative group of remainders of n. 1 If m has an even order r, then k = m r 2 will be such that k 2 = 1 mod n, and (k 1)(k + 1) = 0 mod n. 2 By calculating gcd(n, k 1) and gcd(n, k + 1), one gets non-trivial factors of n. Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 28 / 38
29 Biggest problem Calculate the order of a current element m in Φ(n) Let ν = log 2 n, ν is the size of n. O(n) = O(2 ν ), thus an exhaustive procedure has exponential complexity with respect to the input size. Shor s algorithm is based over a polynomial-time procedure in ν to calculate the order of an element. Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 29 / 38
30 Agenda 1 Abstract 2 Overview of the whole course 3 References 4 Hilbert Spaces 5 Function Evaluation 6 Deutsch-Jozsa s Algorithm 7 Quantum Computation of the Discrete Fourier Transform 8 Shor Algorithm 9 Quantum Cryptography 10 Communication Complexity Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 30 / 38
31 Quantum Cryptography: Key Agreement Protocols Two entities, Alice and Bob, should agree in private a common key. They may use two transmission channels Quantum channel Transmits just one-way, say from Alice to Bob. Classical channel Transmits bidirectionally. We will present the BB84 Protocol, without and with noise. Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 31 / 38
32 Quantum computing elements E 0 = {e 0 0 = (1, 0), e0 1 = (0, 1)}: canonical basis of H 1 H(E 0 ) = E 1 = {e 1 0, e1 1 }: basis of H 1 obtained by applying Hadamard s operator to E 0. E 0 corresponds to a spin with vertical horizontal polarization, E 0 = {, }, while E 1 corresponds to a spin with oblique or NW NE polarization, E 1 = {, }. The same sequence of qubits can be measured either w.r.t. to E 0 or E 1. An eavesdropper can be detected quite directly! This is characteristic of Quantum Cryptography. Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 32 / 38
33 Agenda 1 Abstract 2 Overview of the whole course 3 References 4 Hilbert Spaces 5 Function Evaluation 6 Deutsch-Jozsa s Algorithm 7 Quantum Computation of the Discrete Fourier Transform 8 Shor Algorithm 9 Quantum Cryptography 10 Communication Complexity Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 33 / 38
34 Communication Complexity The complexity of a communication process is determined by the minimum information quantity that should be transmitted, in order that the total information can be recovered by the receiving part, within a given context. Optimal Transmission Let us assume that three sets X, Y, Z are given and a function f : X Y Z. At some moment, Alice, who is a communicating part, possesses a point x X, Bob, who is a second part, possesses a point y Y and both parts should calculate z = f(x, y), by interchanging the minimum information quantity. Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 34 / 38
35 Identity Checking Exact and obvious method If f : (x, y) χ = (x, y) is the characteristic function of the identity relation: f(x, y) = 1 if and only if x = y, then Alice and Bob should interchange n bits to calculate f(x, y). n is exponential with respect to its size! Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 35 / 38
36 An interesting question is whether an exact algorithm can be obtained with logarithmic complexity. The following theorem excludes the possibility to communicate more than k (classical) bits of information by transmitting k qubits. Holevo s Theorem The information quantity recovered from a register of qubits is upperly bounded by the value of von Neumann s entropy, which is bounded by Shannon s entropy. Both entropies coincide whenever the qubits are pairwise orthogonal. However, in Quantum Computing the use of the notion of entangled states improves the communication complexities of several procedures. Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 36 / 38
37 Deutsch-Josza Relation Pseudotelepathy Game Given four sets X, Y, A and B, a relation R X and A B, and the fact that Alice and Bob are separated, far from each other, at a given moment Alice receives a point x X, Bob a y Y and they, trying to interchange the minimum information, should produce, respectively, a A and b B such that (x, y, a, b) R. Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 37 / 38
38 In particular, for n = 2 k a power of 2, X = {0, 1} n = Y, A = {0, 1} k = B R is Deutsch-Josza relation (x, y, a, b) R [ (H n (x, y) = 0 a = b) { H n (x, y) 0, n }] 2 (H n (x, y) = n 2 a b ) (3) If the points x and y of Alice and Bob coincide, then the sequences that they produce should coincide If x and y differ exactly in half of the bits, then the produced sequences should differ In any other case no restrictions on produced sequences Morales-Luna (CINVESTAV) QC based on Tensor Products 5-th Int. WS App. Cat. Th. 38 / 38
Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction
Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states
More informationTeleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)
Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Rahul Jain U. Waterloo and Institute for Quantum Computing, rjain@cs.uwaterloo.ca entry editor: Andris Ambainis
More informationQuantum communication protocols based on entanglement swapping
Journal of Physics: Conference Series PAPER OPEN ACCESS Quantum communication protocols based on entanglement swapping To cite this article: Guillermo Morales-Luna 015 J. Phys.: Conf. Ser. 64 01003 View
More informationThe P versus NP Problem in Quantum Physics
NeuroQuantology December 04 Volume Issue 4 Page 350-354 350 The P versus NP Problem in Quantum Physics Daegene Song ABSTRACT Motivated by the fact that information is encoded and processed by physical
More informationAdvanced Cryptography Quantum Algorithms Christophe Petit
The threat of quantum computers Advanced Cryptography Quantum Algorithms Christophe Petit University of Oxford Christophe Petit -Advanced Cryptography 1 Christophe Petit -Advanced Cryptography 2 The threat
More informationUnitary evolution: this axiom governs how the state of the quantum system evolves in time.
CS 94- Introduction Axioms Bell Inequalities /7/7 Spring 7 Lecture Why Quantum Computation? Quantum computers are the only model of computation that escape the limitations on computation imposed by the
More informationBasics on quantum information
Basics on quantum information Mika Hirvensalo Department of Mathematics and Statistics University of Turku mikhirve@utu.fi Thessaloniki, May 2016 Mika Hirvensalo Basics on quantum information 1 of 52 Brief
More informationarxiv: v1 [quant-ph] 14 May 2010
arxiv:1005.449v1 [quant-ph] 14 May 010 Quantum Computation and Pseudo-telepathic Games Jeffrey Bub Department of Philosophy, University of Maryland, College Park, MD 074 Abstract A quantum algorithm succeeds
More informationQuantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem
Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted
More informationNew Quantum Algorithm Solving the NP Complete Problem
ISSN 070-0466, p-adic Numbers, Ultrametric Analysis and Applications, 01, Vol. 4, No., pp. 161 165. c Pleiades Publishing, Ltd., 01. SHORT COMMUNICATIONS New Quantum Algorithm Solving the NP Complete Problem
More informationBasics on quantum information
Basics on quantum information Mika Hirvensalo Department of Mathematics and Statistics University of Turku mikhirve@utu.fi Thessaloniki, May 2014 Mika Hirvensalo Basics on quantum information 1 of 49 Brief
More informationQuantum Communication Complexity
Quantum Communication Complexity Ronald de Wolf Communication complexity has been studied extensively in the area of theoretical computer science and has deep connections with seemingly unrelated areas,
More informationAn Introduction to Quantum Information and Applications
An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded
More informationQuantum Information Processing and Diagrams of States
Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University
More informationQuantum Communication
Quantum Communication Harry Buhrman CWI & University of Amsterdam Physics and Computing Computing is physical Miniaturization quantum effects Quantum Computers ) Enables continuing miniaturization ) Fundamentally
More informationQuantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139
Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense
More informationQLang: Qubit Language
QLang: Qubit Language Christopher Campbell Clément Canonne Sankalpa Khadka Winnie Narang Jonathan Wong September 24, 24 Introduction In 965, Gordon Moore predicted that the number of transistors in integrated
More informationChallenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley
Challenges in Quantum Information Science Umesh V. Vazirani U. C. Berkeley 1 st quantum revolution - Understanding physical world: periodic table, chemical reactions electronic wavefunctions underlying
More informationIntroduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm
Part I: Quantum Gates and Simon s Algorithm Martin Rötteler NEC Laboratories America, Inc. 4 Independence Way, Suite 00 Princeton, NJ 08540, U.S.A. International Summer School on Quantum Information, Max-Planck-Institut
More informationCLASSIFICATION OF MAXIMALLY ENTANGLED STATES OF SPIN 1/2 PARTICLES
CLASSIFICATION OF MAXIMALLY ENTANGLED STATES OF SPIN 1/ PARTICLES S. Ghosh, G. Kar, and A. Roy Physics and Applied Mathematics Unit Indian Statistical Institute 03, B. T. Road Calcutta 700 035 India. E
More informationarxiv: v1 [quant-ph] 6 Feb 2013
Exact quantum query complexity of EXACT and THRESHOLD arxiv:302.235v [quant-ph] 6 Feb 203 Andris Ambainis Jānis Iraids Juris Smotrovs University of Latvia, Raiņa bulvāris 9, Riga, LV-586, Latvia February
More informationSeminar 1. Introduction to Quantum Computing
Seminar 1 Introduction to Quantum Computing Before going in I am also a beginner in this field If you are interested, you can search more using: Quantum Computing since Democritus (Scott Aaronson) Quantum
More informationAPPLYING QUANTUM COMPUTER FOR THE REALIZATION OF SPSA ALGORITHM Oleg Granichin, Alexey Wladimirovich
APPLYING QUANTUM COMPUTER FOR THE REALIZATION OF SPSA ALGORITHM Oleg Granichin, Alexey Wladimirovich Department of Mathematics and Mechanics St. Petersburg State University Abstract The estimates of the
More informationThe Two Quantum Measurement Theories and the Bell-Kochen-Specker Paradox
International Journal of Electronic Engineering Computer Science Vol. 1, No. 1, 2016, pp. 40-44 http://www.aiscience.org/journal/ijeecs The Two Quantum Measurement Theories the Bell-Kochen-Specker Paradox
More informationIntroduction to Quantum Computation
Chapter 1 Introduction to Quantum Computation 1.1 Motivations The main task in this course is to discuss application of quantum mechanics to information processing (or computation). Why? Education:Asingleq-bitisthesmallestpossiblequantummechanical
More informationFactoring on a Quantum Computer
Factoring on a Quantum Computer The Essence Shor s Algorithm Wolfgang Polak wp@pocs.com Thanks to: Eleanor Rieffel Fuji Xerox Palo Alto Laboratory Wolfgang Polak San Jose State University, 4-14-010 - p.
More informationIntroduction into Quantum Computations Alexei Ashikhmin Bell Labs
Introduction into Quantum Computations Alexei Ashikhmin Bell Labs Workshop on Quantum Computing and its Application March 16, 2017 Qubits Unitary transformations Quantum Circuits Quantum Measurements Quantum
More informationExponential quantum enhancement for distributed addition with local nonlinearity
Quantum Inf Process (2010) 9:47 59 DOI 10.1007/s11128-009-0126-9 Exponential quantum enhancement for distributed addition with local nonlinearity Adam Henry Marblestone Michel Devoret Received: 7 May 2009
More informationIntroduction to Quantum Computation
Introduction to Quantum Computation Ioan Burda Introduction to Quantum Computation Copyright 2005 Ioan Burda All rights reserved. Universal Publishers Boca Raton, Florida USA 2005 ISBN: 1-58112- 466-X
More information)j > Riley Tipton Perry University of New South Wales, Australia. World Scientific CHENNAI
Riley Tipton Perry University of New South Wales, Australia )j > World Scientific NEW JERSEY LONDON. SINGAPORE BEIJING SHANSHAI HONG K0N6 TAIPEI» CHENNAI Contents Acknowledgments xi 1. Introduction 1 1.1
More informationQuantum Information Types
qitd181 Quantum Information Types Robert B. Griffiths Version of 6 February 2012 References: R. B. Griffiths, Types of Quantum Information, Phys. Rev. A 76 (2007) 062320; arxiv:0707.3752 Contents 1 Introduction
More informationAn Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata
An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of
More informationIntroduction to Quantum Key Distribution
Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is
More informationEinführung in die Quanteninformation
Einführung in die Quanteninformation Hans J. Briegel Theoretical Physics, U Innsbruck Department of Philosophy, U Konstanz* *MWK Baden-Württemberg Quanteninformationsverarbeitung Untersuchung grundlegender
More informationROM-BASED COMPUTATION: QUANTUM VERSUS CLASSICAL
arxiv:quant-ph/0109016v2 2 Jul 2002 ROM-BASED COMPUTATION: QUANTUM VERSUS CLASSICAL B. C. Travaglione, M. A. Nielsen Centre for Quantum Computer Technology, University of Queensland St Lucia, Queensland,
More informationQuantum Computing: Foundations to Frontier Fall Lecture 3
Quantum Computing: Foundations to Frontier Fall 018 Lecturer: Henry Yuen Lecture 3 Scribes: Seyed Sajjad Nezhadi, Angad Kalra Nora Hahn, David Wandler 1 Overview In Lecture 3, we started off talking about
More informationarxiv:quant-ph/ v3 12 Mar 1998
Quantum Entanglement and the Communication Complexity of the Inner Product Function Richard Cleve, Wim van Dam, Michael Nielsen, and Alain Tapp arxiv:quant-ph/970809v Mar 998 University of Calgary University
More information*WILEY- Quantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co.
Joachim Stolze and Dieter Suter Quantum Computing A Short Course from Theory to Experiment Second, Updated and Enlarged Edition *WILEY- VCH WILEY-VCH Verlag GmbH & Co. KGaA Contents Preface XIII 1 Introduction
More informationLecture 3: Hilbert spaces, tensor products
CS903: Quantum computation and Information theory (Special Topics In TCS) Lecture 3: Hilbert spaces, tensor products This lecture will formalize many of the notions introduced informally in the second
More informationBell inequality for qunits with binary measurements
Bell inequality for qunits with binary measurements arxiv:quant-ph/0204122v1 21 Apr 2002 H. Bechmann-Pasquinucci and N. Gisin Group of Applied Physics, University of Geneva, CH-1211, Geneva 4, Switzerland
More informationMultiplicativity of Maximal p Norms in Werner Holevo Channels for 1 < p 2
Multiplicativity of Maximal p Norms in Werner Holevo Channels for 1 < p 2 arxiv:quant-ph/0410063v1 8 Oct 2004 Nilanjana Datta Statistical Laboratory Centre for Mathematical Sciences University of Cambridge
More informationA Gentle Introduction to Quantum Computing
A Gentle Introduction to Quantum Computing Abdullah Khalid 01-10-0168 School of Science and Engineering Lahore University of Management Sciences Friday 3 rd June, 011 Contents 1 Introduction to Quantum
More informationTheory Component of the Quantum Computing Roadmap
3.2.4 Quantum simulation Quantum simulation represents, along with Shor s and Grover s algorithms, one of the three main experimental applications of quantum computers. Of the three, quantum simulation
More informationQuantum Computing. Quantum Computing. Sushain Cherivirala. Bits and Qubits
Quantum Computing Bits and Qubits Quantum Computing Sushain Cherivirala Quantum Gates Measurement of Qubits More Quantum Gates Universal Computation Entangled States Superdense Coding Measurement Revisited
More informationLogic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation
Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate
More informationQuantum Error Correction Codes-From Qubit to Qudit. Xiaoyi Tang, Paul McGuirk
Quantum Error Correction Codes-From Qubit to Qudit Xiaoyi Tang, Paul McGuirk Outline Introduction to quantum error correction codes (QECC) Qudits and Qudit Gates Generalizing QECC to Qudit computing Need
More informationarxiv:quant-ph/ v2 3 Oct 2000
Quantum key distribution without alternative measurements Adán Cabello Departamento de Física Aplicada, Universidad de Sevilla, 0 Sevilla, Spain January, 0 arxiv:quant-ph/990v Oct 000 Entanglement swapping
More informationGraph Non-Isomorphism Has a Succinct Quantum Certificate
Graph Non-Isomorphism Has a Succinct Quantum Certificate Tatsuaki Okamoto Keisuke Tanaka Summary This paper presents the first quantum computational characterization of the Graph Non-Isomorphism problem
More informationShor s Algorithm. Polynomial-time Prime Factorization with Quantum Computing. Sourabh Kulkarni October 13th, 2017
Shor s Algorithm Polynomial-time Prime Factorization with Quantum Computing Sourabh Kulkarni October 13th, 2017 Content Church Thesis Prime Numbers and Cryptography Overview of Shor s Algorithm Implementation
More informationarxiv:quant-ph/ v3 11 Mar 2004
ariv:quant-ph/040148v3 11 ar 004 Generalized G States and Distributed Quantum Computing Anocha Yimsiriwattana and Samuel J. Lomonaco Jr. Abstract. A key problem in quantum computing is finding a viable
More informationIntroduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan
Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography D. J. Guan Abstract The development of quantum algorithms and quantum information theory, as well as the design
More informationIntroduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871
Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871 Lecture 1 (2017) Jon Yard QNC 3126 jyard@uwaterloo.ca TAs Nitica Sakharwade nsakharwade@perimeterinstitute.ca
More informationQuantum algorithms for testing Boolean functions
Quantum algorithms for testing Boolean functions Dominik F. Floess Erika Andersson SUPA, School of Engineering and Physical Sciences Heriot-Watt University, Edinburgh EH4 4AS, United Kingdom dominikfloess@gmx.de
More informationIntroduction to Quantum Computing for Folks
Introduction to Quantum Computing for Folks Joint Advanced Student School 2009 Ing. Javier Enciso encisomo@in.tum.de Technische Universität München April 2, 2009 Table of Contents 1 Introduction 2 Quantum
More informationAn Architectural Framework For Quantum Algorithms Processing Unit (QAPU)
An Architectural Framework For Quantum s Processing Unit (QAPU) Mohammad Reza Soltan Aghaei, Zuriati Ahmad Zukarnain, Ali Mamat, and ishamuddin Zainuddin Abstract- The focus of this study is developing
More informationINTRODUCTION TO QUANTUM COMPUTING
INTRODUCTION TO QUANTUM COMPUTING Writen by: Eleanor Rieffel and Wolfgang Polak Presented by: Anthony Luaders OUTLINE: Introduction Notation Experiment Quantum Bit Quantum Key Distribution Multiple Qubits
More informationEntanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen
Entanglement arnoldzwicky.org Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen PHYS403, July 26, 2017 Entanglement A quantum object can
More informationQuantum Computation: From Quantum Teleportation to the Shor s Algorithm
Quantum Computation: From Quantum Teleportation to the Shor s Algorithm J. J. Ruiz-Lorenzo Dep. Física, Universidad de Extremadura Instituto de Computación Científica Avanzada de Extremadura (ICCAEx) http://www.eweb.unex.es/eweb/fisteor/juan
More informationQuantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co. KGaA
Joachim Stolze and Dieter Suter Quantum Computing A Short Course from Theory to Experiment Second, Updated and Enlarged Edition WILEY- VCH WILEY-VCH Verlag GmbH & Co. KGaA Preface XIII 1 Introduction and
More informationAn Introduction to Quantum Computation and Quantum Information
An to and Graduate Group in Applied Math University of California, Davis March 13, 009 A bit of history Benioff 198 : First paper published mentioning quantum computing Feynman 198 : Use a quantum computer
More informationQuantum Hashing for Finite Abelian Groups arxiv: v1 [quant-ph] 7 Mar 2016
Quantum Hashing for Finite Abelian Groups arxiv:1603.02209v1 [quant-ph] 7 Mar 2016 Alexander Vasiliev Abstract We propose a generalization of the quantum hashing technique based on the notion of the small-bias
More informationQuantum walks public key cryptographic system (Extended Abstract)
Quantum walks public key cryptographic system (Extended Abstract) C. Vlachou 3 J. Rodrigues 1,2 P. Mateus 1,2 N. Paunković 1,2 A. Souto 1,2 1 SQIG - Instituto de Telecomunicações 2 Departamento de Matemática
More informationQuantum Computing. Thorsten Altenkirch
Quantum Computing Thorsten Altenkirch Is Computation universal? Alonzo Church - calculus Alan Turing Turing machines computable functions The Church-Turing thesis All computational formalisms define the
More information1 1D Schrödinger equation: Particle in an infinite box
1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Part I Emma Strubell http://cs.umaine.edu/~ema/quantum_tutorial.pdf April 12, 2011 Overview Outline What is quantum computing? Background Caveats Fundamental differences
More information9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.
9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance
More informationRecasting Mermin s multi-player game into the framework of pseudo-telepathy
Recasting Mermin s multi-player game into the framework of pseudo-telepathy arxiv:quant-ph/040805v 16 Jun 005 Gilles Brassard Anne Broadbent Alain Tapp Département IRO, Université de Montréal C.P. 618,
More informationSingle qubit + CNOT gates
Lecture 6 Universal quantum gates Single qubit + CNOT gates Single qubit and CNOT gates together can be used to implement an arbitrary twolevel unitary operation on the state space of n qubits. Suppose
More informationEntanglement and Quantum Computation
Appearing in Geometric Issues in the Foundations of Science eds. S. Huggett, L. Mason, K. P. Tod, S. T. Tsou and N. M. J. Woodhouse, Oxford University Press 1997. Entanglement and Quantum Computation Richard
More informationQuantum Teleportation. Gur Yaari for HEisenberg's Seminar on Quantum Optics
Quantum Teleportation Gur Yaari for HEisenberg's Seminar on Quantum Optics Bell States Maximum Entangled Quantum States: The usual form of the CHSH inequality is: E(a, b) E(a, b ) + E(a, b) + E(a
More informationOn balance of information in bipartite quantum communication systems: entanglement-energy analogy
On balance of information in bipartite quantum communication systems: entanglement-energy analogy Ryszard Horodecki 1,, Micha l Horodecki 1, and Pawe l Horodecki 2, 1 Institute of Theoretical Physics and
More informationInstantaneous Nonlocal Measurements
Instantaneous Nonlocal Measurements Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA July 22, 2010 References Entanglement consumption of instantaneous nonlocal quantum measurements.
More informationQUANTUM PHASE ESTIMATION WITH ARBITRARY CONSTANT-PRECISION PHASE SHIFT OPERATORS
Quantum Information and Computation, Vol., No. 9&0 (0) 0864 0875 c Rinton Press QUANTUM PHASE ESTIMATION WITH ARBITRARY CONSTANT-PRECISION PHASE SHIFT OPERATORS HAMED AHMADI Department of Mathematics,
More informationEntanglement and information
Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit
More informationSecurity Implications of Quantum Technologies
Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu
More informationLecture 4: Postulates of quantum mechanics
Lecture 4: Postulates of quantum mechanics Rajat Mittal IIT Kanpur The postulates of quantum mechanics provide us the mathematical formalism over which the physical theory is developed. For people studying
More information1 1D Schrödinger equation: Particle in an infinite box
1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider
More informationSUPERDENSE CODING AND QUANTUM TELEPORTATION
SUPERDENSE CODING AND QUANTUM TELEPORTATION YAQIAO LI This note tries to rephrase mathematically superdense coding and quantum teleportation explained in [] Section.3 and.3.7, respectively (as if I understood
More informationQuantum Information Processing
Quantum Information Processing Harry Buhrman CWI & University of Amsterdam Physics and Computing Computing is physical Miniaturization quantum effects Quantum Computers 1) Enables continuing miniaturization
More informationSubstituting a qubit for an arbitrarily large amount of classical communication
Substituting a qubit for an arbitrarily large amount of classical communication Ernesto F. Galvão and Lucien Hardy Centre for Quantum Computation, Clarendon Laboratory, University of Oxford, Parks Road,
More informationQuantum Cryptography and Security of Information Systems
Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty
More informationCompute the Fourier transform on the first register to get x {0,1} n x 0.
CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary
More informationarxiv: v7 [quant-ph] 20 Mar 2017
Quantum oblivious transfer and bit commitment protocols based on two non-orthogonal states coding arxiv:1306.5863v7 [quant-ph] 0 Mar 017 Li Yang State Key Laboratory of Information Security, Institute
More informationPhysics is becoming too difficult for physicists. David Hilbert (mathematician)
Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving
More informationSome Introductory Notes on Quantum Computing
Some Introductory Notes on Quantum Computing Markus G. Kuhn http://www.cl.cam.ac.uk/~mgk25/ Computer Laboratory University of Cambridge 2000-04-07 1 Quantum Computing Notation Quantum Computing is best
More informationA Holevo-type bound for a Hilbert Schmidt distance measure
Journal of Quantum Information Science, 205, *,** Published Online **** 204 in SciRes. http://www.scirp.org/journal/**** http://dx.doi.org/0.4236/****.204.***** A Holevo-type bound for a Hilbert Schmidt
More informationarxiv:quant-ph/ v1 13 Jan 2003
Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The
More informationQuantum error correction in the presence of spontaneous emission
PHYSICAL REVIEW A VOLUME 55, NUMBER 1 JANUARY 1997 Quantum error correction in the presence of spontaneous emission M. B. Plenio, V. Vedral, and P. L. Knight Blackett Laboratory, Imperial College London,
More informationQuantum Computers. Peter Shor MIT
Quantum Computers Peter Shor MIT 1 What is the difference between a computer and a physics experiment? 2 One answer: A computer answers mathematical questions. A physics experiment answers physical questions.
More informationEntanglement and Quantum Teleportation
Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,
More informationInformation quantique, calcul quantique :
Séminaire LARIS, 8 juillet 2014. Information quantique, calcul quantique : des rudiments à la recherche (en 45min!). François Chapeau-Blondeau LARIS, Université d Angers, France. 1/25 Motivations pour
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Toni Bluher Math Research Group, NSA 2018 Women and Mathematics Program Disclaimer: The opinions expressed are those of the writer and not necessarily those of NSA/CSS,
More informationA Systematic Algorithm for Quantum Boolean Circuits Construction
A Systematic Algorithm for Quantum Boolean Circuits Construction I.M. Tsai and S.Y. Kuo arxiv:quant-ph/0104037v2 19 Apr 2001 Department of Electrical Engineering, National Taiwan University, Taipei, Taiwan.
More informationIs Entanglement Sufficient to Enable Quantum Speedup?
arxiv:107.536v3 [quant-ph] 14 Sep 01 Is Entanglement Sufficient to Enable Quantum Speedup? 1 Introduction The mere fact that a quantum computer realises an entangled state is ususally concluded to be insufficient
More informationQuantum Computing: A Future Trends in Computing
Volume 3, No. 3, May-June 2012 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info Quantum Computing: A Future Trends in Computing Amit V.Pandhare
More informationarxiv: v1 [quant-ph] 11 Jul 2011
Multi-query quantum sums David A. Meyer and James Pommersheim, arxiv:07.940v [quant-ph] Jul 0 Department of Mathematics University of California/San Diego, La Jolla, CA 909-0 Department of Mathematics
More informationUNIVERSAL HYBRID QUANTUM PROCESSORS
XJ0300183 Письма в ЭЧАЯ. 2003. 1[116] Particles and Nuclei, Letters. 2003. No. 1[116] UNIVERSAL HYBRID QUANTUM PROCESSORS A. Yu. Vlasov 1 FRC7IRH, St. Petersburg, Russia A quantum processor (the programmable
More informationOn Quantum vs. Classical Communication Complexity
On Quantum vs. Classical Communication Complexity Dmitry Gavinsky Institute of Mathematics, Praha Czech Academy of Sciences Introduction Introduction The setting of communication complexity is one of the
More informationTHE RESEARCH OF QUANTUM PHASE ESTIMATION
THE RESEARCH OF QUANTUM PHASE ESTIMATION ALGORITHM Zhuang Jiayu 1,Zhao Junsuo,XuFanjiang, QiaoPeng& Hu Haiying 1 Science and Technology on Integrated Information System Laboratory, Institute of Software
More informationErrata list, Nielsen & Chuang. rrata/errata.html
Errata list, Nielsen & Chuang http://www.michaelnielsen.org/qcqi/errata/e rrata/errata.html Part II, Nielsen & Chuang Quantum circuits (Ch 4) SK Quantum algorithms (Ch 5 & 6) Göran Johansson Physical realisation
More information