Algorithms in the Quantum Computing Framework
|
|
- Myles Merritt
- 5 years ago
- Views:
Transcription
1 Algorithms in the Quantum Computing Framework Juanjo Rué, Sebastià Xambó Laboratoire d Informatique, École Polytechnique (Palaiseau, Paris), ExploreMaps ERC Project Seminar on Quantum Processing: Mathematics, Physics and Technology, IEC, 25th February 2010
2 Summary of the talk Explain the phase estimate framework. Explain the order finding q-algorithm. Explain the factoring q-algorithm. Scope of these techniques Open problems and conclusions
3 Shor s algorithm: order finding and factoring
4 The work of Peter Shor Combinatorics, bin packing, quantum computing,... Nevalinna prize (1998), Gödel prize (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer SIAM Journal of Computing 26, pp (1997) Laudatio ICM 1998: To read our , how mean of the spies and their quantum machine; Be comforted though, they do not yet know how to factorize twelve or fifteen.
5 Quantum Fourier Transform revisited Appereance of periodic phenomenon: change of basis The quantum context provides optimal realizations of the Fourier Transform: F k = 1 2 n 1 kj 2πi e 2 n j 2 n j=0 Exponential order in the classical framework (FFT) vs quadratic in the quantum framework (QFT).
6 The phase estimate: a general algorithm The quantum Fourier transform can be used to get eigenvalues of an unitary operator: Uu = e 2πiϕ u The general procedure starts in the following way: z = 1 2 t ( 0 +e2πi2t 1ϕ 1 ) t)... ( 0 +e 2πi21ϕ 1 )( 0 +e 2πi20ϕ 1 ) u
7 Phase estimate (2) z can be written in the form 1 2 t 2 t 1 j=0 e2πiϕj j u. We proceed with F I : 2 1 t 1 2 t j=0 Two cases: e 2πiϕj j u = 1 2 t 1 2 t j=0 ϕ 2πi e 2 t j j u F I = ϕ u. If ϕ could be written with exactly t bits, then ϕ = ϕ. In the other case, ϕ is a superposition. What do we do in the second case?
8 Phase estimate (and 3) Let ε > 0, 0 < ϕ = 1 2 ϕ < 1 and k a natural integer. Let t be t the number of bits used. Then, if ( t = k + log ) 2ε with probability 1 ε the value ϕ measured after applying F I satisfies ϕ ϕ < 2 k. 2 t Roughly speaking, taking a large value for the number of bits the algorithm gives, with high probability, a value which is closed to the real one. Get good implementations for U How do we construct u? Can we recover the real ϕ from a good estimate ϕ?
9 Searching the order of an element We solve a different problem: given an integer a such that (a, n) = 1, which is the order of a in (Z/nZ)? This problem can be stated in terms of an spectral one: Definition of a convenient unitary operator: U(a, n)u j = u ja (mod n), 0 j n Construction of a family of eigenvectors (reminiscent of representation theory): v s = A nice eigenvalue: U(a, n)v s = ord(a) 1 k=0 ord(a) 1 k=0 e 2πi e 2πi sk ord(a) u a k (mod n) sk ord(a) u a k+1 (mod n) = e 2πi s ord(a) v s
10 Analysis: looking at U(a, n), v s Operator U(a, n): classical modular exponenciation Complexity O ( log(n) 3). Eigenvectors v s ord(a) 1 1 ord(a) s=0 e 2πij s ord(a) v s = a j (mod n) 2 1 t 1 j t 1 j a j (mod n) 2 t 2 t j=0 j=0 1 2 t ord(a) ord(a) 1 s=0 2 t 1 j=0 e 2πij s ord(a) j v s
11 Last step: what we do which a bad estimate? Applying F I we get ord(a) 1 1 s ord(a) v s ord(a) s=0 At the end, we measure the first component: s ord(a) Can we extract information from the real value using this estimate?
12 Intermezzo: continued fractions Let p q be a rational number. Then, p q representation of the form admits a finite We write p q = [p 0, p 1,..., p k ]. p q = p p p The numbers [p 0,..., p r ], r < k are the convergents of p q. Main result: Let p q a rational number. If x satisfies the property p q x < 1 2q 2, then p q is a convergent of x.
13 Continued fractions and estimates Taking a number of bits equal to 2 log 2 (n) log ( ε ) we assure that, with probability 1 ε 1 s 2 t ord(a) s ord(a) < log 2 (n) +1 < 1 2 ord(a) 2 Hence, Two cases: s ord(a) is a convergent of s ord(a). (s, ord(a)) = 1, all works fine! (s, ord(a)) = r 1, we get ord(a) r. Repeat ALL with a ord(a) r
14 ...And now, Factoring! Let N be an integer. We want to find a proper divisor of N. The strategy is the following: let x (Z/NZ) x ord(x) 1 0(N) ord(x) 0(2) ) ) (x ord(x) 2 1 (x ord(x) (N) Not possible that ) ) ) ) ((x ord(x) 2 1, N = ((x ord(x) 2 + 1, N = 1 Hence, we need to find and element x in (Z/NZ) with even order, such that x ord(x) 2 is not 1(N). Can the choice be done uniformly at random?
15 ...And now, Factoring! (2) Let N = m i=1 pα i i its decomposition in prime factors. Let x be a uniformly distributed random element in (Z/NZ). Then ) P (ord(x) 0(2), x ord(x) 2 1(N) 1 2 m. Hence, for N = p 1 p 2 we have a probability greater than 0.75 to get a nice generator!
16 Shor s algorithm INPUT: an integer N which can be written with L bits. OUTPUT: a proper divisor of N. 1. If N 0(2), we return 2, and that s all! 2. We determine if N = a b. This can be done classically with L 3 operations. If this is the case, return a, and that s all! 3. Choose x in {1, 2,..., N 1} uniformly at random. If (x, N) > 1, return (x, N) and that s all! 4. If (x, N) = 1 ord(x) using the order searching algorithm with complexity O(L 3 ). 5. If ord(x) 1(2) or x ord(x) 2 1 (mod N), we return to point 3. Good cases have a high probability to happen! 6. Compute (x ord(x) 2 1, N), (x ord(x) 2 + 1, N), return the bigger, and that s all! A more detailed analysis of point 5 could be done O(log(L)).
17 Scope and open problems
18 Beyond the spectral techniques Order-finding is a problem in which periodicities appear: discrete logarithm problem, period finding,... All these problems can be generalized (in some sense) to finite Abelian groups...but more difficult is to do this for non-abelian groups. (Hallner, 2003) Connections with computacional and algebraic number theory: structure of the units of Z[ D] Pell s Equation: ( x ) ( Dy x ) Dy = 1 x 2 Dy 2 = 1 Deal with other algebraic parameters?
19 (Quantum) Random walks and problems on graphs Grover s search can be generalized to more complex structures: graphs Classically, to search on a graph we can perform a random walk. Do the same, but in the quantum framework Could be this ideas taken to deal with more general graph (and hypergraphs, and oriented graphs, and weighted graphs) problems? Strong connections with Complexity and P=NP in theoretical Computer Science.
20 Some philosophical questions The output of the problems treated so far can be tested The results for testing primality, finding optimal parameters on large graphs cannot be tested! Can we create frameworks to assure categorical algorithms or there is an unavoidable limitation on the language? Are problems that cannot be codified using the rules of the quantum formalism? Are there unavoidable limitations in order to simulate quantum phenomena? (Inherent to nature)
21 Conclusions
22 Conclusions We have presented the phase estimate general framework, and its connection with the QFT. Reduction of order-finding to a linear algebra problem We have reduced the problem of factoring to the problem of order-finding. Spectral techniques can be applied to more difficult problems.
23 Thank you 15 = 3 5
Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871
Introduction to Quantum Information Processing QIC 71 / CS 768 / PH 767 / CO 681 / AM 871 Lecture 8 (217) Jon Yard QNC 3126 jyard@uwaterloo.ca http://math.uwaterloo.ca/~jyard/qic71 1 Recap of: Eigenvalue
More informationShor s Algorithm. Elisa Bäumer, Jan-Grimo Sobez, Stefan Tessarini May 15, 2015
Shor s Algorithm Elisa Bäumer, Jan-Grimo Sobez, Stefan Tessarini May 15, 2015 Integer factorization n = p q (where p, q are prime numbers) is a cryptographic one-way function Classical algorithm with best
More informationShor s Prime Factorization Algorithm
Shor s Prime Factorization Algorithm Bay Area Quantum Computing Meetup - 08/17/2017 Harley Patton Outline Why is factorization important? Shor s Algorithm Reduction to Order Finding Order Finding Algorithm
More informationIntroduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681
Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 48 / C&O 68 Lecture (2) Richard Cleve DC 27 cleve@cs.uwaterloo.ca Order-finding via eigenvalue estimation 2 Order-finding
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing The lecture notes were prepared according to Peter Shor s papers Quantum Computing and Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a
More informationPhase estimation. p. 1/24
p. 1/24 Phase estimation Last time we saw how the quantum Fourier transform made it possible to find the period of a function by repeated measurements and the greatest common divisor (GCD) algorithm. We
More informationQUANTUM PHASE ESTIMATION WITH ARBITRARY CONSTANT-PRECISION PHASE SHIFT OPERATORS
Quantum Information and Computation, Vol., No. 9&0 (0) 0864 0875 c Rinton Press QUANTUM PHASE ESTIMATION WITH ARBITRARY CONSTANT-PRECISION PHASE SHIFT OPERATORS HAMED AHMADI Department of Mathematics,
More informationQuantum Computers. Peter Shor MIT
Quantum Computers Peter Shor MIT 1 What is the difference between a computer and a physics experiment? 2 One answer: A computer answers mathematical questions. A physics experiment answers physical questions.
More informationAdvanced Cryptography Quantum Algorithms Christophe Petit
The threat of quantum computers Advanced Cryptography Quantum Algorithms Christophe Petit University of Oxford Christophe Petit -Advanced Cryptography 1 Christophe Petit -Advanced Cryptography 2 The threat
More informationQuantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT
Quantum algorithms (CO 78, Winter 008) Prof. Andrew Childs, University of Waterloo LECTURE : Quantum circuits and the abelian QFT This is a course on quantum algorithms. It is intended for graduate students
More informationQuantum Phase Estimation using Multivalued Logic
Quantum Phase Estimation using Multivalued Logic Agenda Importance of Quantum Phase Estimation (QPE) QPE using binary logic QPE using MVL Performance Requirements Salient features Conclusion Introduction
More informationQuantum Computing. Thorsten Altenkirch
Quantum Computing Thorsten Altenkirch Is Computation universal? Alonzo Church - calculus Alan Turing Turing machines computable functions The Church-Turing thesis All computational formalisms define the
More informationAn Architectural Framework For Quantum Algorithms Processing Unit (QAPU)
An Architectural Framework For Quantum s Processing Unit (QAPU) Mohammad Reza Soltan Aghaei, Zuriati Ahmad Zukarnain, Ali Mamat, and ishamuddin Zainuddin Abstract- The focus of this study is developing
More informationAn Introduction to Proof-based Mathematics Harvard/MIT ESP: Summer HSSP Isabel Vogt
An Introduction to Proof-based Mathematics Harvard/MIT ESP: Summer HSSP Isabel Vogt Class Objectives Field Axioms Finite Fields Field Extensions Class 5: Fields and Field Extensions 1 1. Axioms for a field
More informationQuantum algorithms for computing short discrete logarithms and factoring RSA integers
Quantum algorithms for computing short discrete logarithms and factoring RSA integers Martin Ekerå, Johan Håstad February, 07 Abstract In this paper we generalize the quantum algorithm for computing short
More informationLecture note 8: Quantum Algorithms
Lecture note 8: Quantum Algorithms Jian-Wei Pan Physikalisches Institut der Universität Heidelberg Philosophenweg 12, 69120 Heidelberg, Germany Outline Quantum Parallelism Shor s quantum factoring algorithm
More informationLogic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation
Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate
More information2 A Fourier Transform for Bivariate Functions
Stanford University CS59Q: Quantum Computing Handout 0 Luca Trevisan October 5, 0 Lecture 0 In which we present a polynomial time quantum algorithm for the discrete logarithm problem. The Discrete Log
More information)j > Riley Tipton Perry University of New South Wales, Australia. World Scientific CHENNAI
Riley Tipton Perry University of New South Wales, Australia )j > World Scientific NEW JERSEY LONDON. SINGAPORE BEIJING SHANSHAI HONG K0N6 TAIPEI» CHENNAI Contents Acknowledgments xi 1. Introduction 1 1.1
More informationQuantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem
Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted
More informationFactoring on a Quantum Computer
Factoring on a Quantum Computer The Essence Shor s Algorithm Wolfgang Polak wp@pocs.com Thanks to: Eleanor Rieffel Fuji Xerox Palo Alto Laboratory Wolfgang Polak San Jose State University, 4-14-010 - p.
More informationFactoring integers with a quantum computer
Factoring integers with a quantum computer Andrew Childs Department of Combinatorics and Optimization and Institute for Quantum Computing University of Waterloo Eighth Canadian Summer School on Quantum
More informationQuantum algorithms for hidden nonlinear structures
Quantum algorithms for hidden nonlinear structures Andrew Childs Waterloo Leonard Schulman Caltech Umesh Vazirani Berkeley Shor s algorithm finds hidden linear structures [Shor 94]: Efficient quantum algorithms
More informationTheoretical Cryptography, Lecture 13
Theoretical Cryptography, Lecture 13 Instructor: Manuel Blum Scribe: Ryan Williams March 1, 2006 1 Today Proof that Z p has a generator Overview of Integer Factoring Discrete Logarithm and Quadratic Residues
More informationA Glimpse of Quantum Computation
A Glimpse of Quantum Computation Zhengfeng Ji (UTS:QSI) QCSS 2018, UTS 1. 1 Introduction What is quantum computation? Where does the power come from? Superposition Incompatible states can coexist Transformation
More informationQuantum NP - Cont. Classical and Quantum Computation A.Yu Kitaev, A. Shen, M. N. Vyalyi 2002
Quantum NP - Cont. Classical and Quantum Computation A.Yu Kitaev, A. Shen, M. N. Vyalyi 2002 1 QMA - the quantum analog to MA (and NP). Definition 1 QMA. The complexity class QMA is the class of all languages
More informationLecture 14. Outline. 1. Finish Polynomials and Secrets. 2. Finite Fields: Abstract Algebra 3. Erasure Coding
Lecture 14. Outline. 1. Finish Polynomials and Secrets. 2. Finite Fields: Abstract Algebra 3. Erasure Coding Modular Arithmetic Fact and Secrets Modular Arithmetic Fact: There is exactly 1 polynomial of
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Toni Bluher Math Research Group, NSA 2018 Women and Mathematics Program Disclaimer: The opinions expressed are those of the writer and not necessarily those of NSA/CSS,
More informationExponential algorithmic speedup by quantum walk
Exponential algorithmic speedup by quantum walk Andrew Childs MIT Center for Theoretical Physics joint work with Richard Cleve Enrico Deotto Eddie Farhi Sam Gutmann Dan Spielman quant-ph/0209131 Motivation
More informationD-MATH Algebra II FS18 Prof. Marc Burger. Solution 26. Cyclotomic extensions.
D-MAH Algebra II FS18 Prof. Marc Burger Solution 26 Cyclotomic extensions. In the following, ϕ : Z 1 Z 0 is the Euler function ϕ(n = card ((Z/nZ. For each integer n 1, we consider the n-th cyclotomic polynomial
More informationHow behavior of systems with sparse spectrum can be predicted on a quantum computer
How behavior of systems with sparse spectrum can be predicted on a quantum computer arxiv:quant-ph/0004021v2 26 Jun 2000 Yuri Ozhigov Abstract Call a spectrum of Hamiltonian sparse if each eigenvalue can
More informationAn Improved Quantum Fourier Transform Algorithm and Applications
An Improved Quantum Fourier Transform Algorithm and Applications Lisa Hales Group in Logic and the Methodology of Science University of California at Berkeley hales@cs.berkeley.edu Sean Hallgren Ý Computer
More informationLecture 15: The Hidden Subgroup Problem
CS 880: Quantum Information Processing 10/7/2010 Lecture 15: The Hidden Subgroup Problem Instructor: Dieter van Melkebeek Scribe: Hesam Dashti The Hidden Subgroup Problem is a particular type of symmetry
More informationShor Factorization Algorithm
qitd52 Shor Factorization Algorithm Robert B. Griffiths Version of 7 March 202 References: Mermin = N. D. Mermin, Quantum Computer Science (Cambridge University Press, 2007), Ch. 3 QCQI = M. A. Nielsen
More informationSuper-strong Approximation I
Super-strong Approximation I Emmanuel Breuillard Université Paris-Sud, Orsay, France IPAM, February 9th, 2015 Strong Approximation G = connected, simply connected, semisimple algebraic group defined over
More informationC/CS/Phys 191 Shor s order (period) finding algorithm and factoring 11/01/05 Fall 2005 Lecture 19
C/CS/Phys 9 Shor s order (period) finding algorithm and factoring /0/05 Fall 2005 Lecture 9 Readings Benenti et al., Ch. 3.2-3.4 Stolze and Suter, uantum Computing, Ch. 8.3 Nielsen and Chuang, uantum Computation
More informationEuler s, Fermat s and Wilson s Theorems
Euler s, Fermat s and Wilson s Theorems R. C. Daileda February 17, 2018 1 Euler s Theorem Consider the following example. Example 1. Find the remainder when 3 103 is divided by 14. We begin by computing
More informationQuantum computing. Shor s factoring algorithm. Dimitri Petritis. UFR de mathématiques Université de Rennes CNRS (UMR 6625) Rennes, 30 novembre 2018
Shor s factoring algorithm Dimitri Petritis UFR de mathématiques Université de Rennes CNRS (UMR 6625) Rennes, 30 novembre 2018 Classical Turing machines Theoretical model of classical computer = classical
More informationarxiv:quant-ph/ v3 21 Feb 2003
Circuit for Shor s algorithm using 2n+3 qubits arxiv:quant-ph/2595v3 21 Feb 23 Stéphane Beauregard Abstract We try to minimize the number of qubits needed to factor an integer of n bits using Shor s algorithm
More informationBjorn Poonen. MSRI Introductory Workshop on Rational and Integral Points on Higher-dimensional Varieties. January 18, 2006
University of California at Berkeley MSRI Introductory Workshop on Rational and Integral Points on Higher-dimensional Varieties January 18, 2006 The original problem H10: Find an algorithm that solves
More informationQIP Note: On the Quantum Fourier Transform and Applications
QIP ote: On the Quantum Fourier Transform and Applications Ivan Damgård 1 Introduction This note introduces Fourier transforms over finite Abelian groups, and shows how this can be used to find the period
More informationAlgebraic Constructions of Graphs
Spectral Graph Theory Lecture 15 Algebraic Constructions of Graphs Daniel A. Spielman October 17, 2012 15.1 Overview In this lecture, I will explain how to make graphs from linear error-correcting codes.
More informationFigure 1: Circuit for Simon s Algorithm. The above circuit corresponds to the following sequence of transformations.
CS 94 //09 Fourier Transform, Period Finding and Factoring in BQP Spring 009 Lecture 4 Recap: Simon s Algorithm Recall that in the Simon s problem, we are given a function f : Z n Zn (i.e. from n-bit strings
More informationClassifying classes of structures in model theory
Classifying classes of structures in model theory Saharon Shelah The Hebrew University of Jerusalem, Israel, and Rutgers University, NJ, USA ECM 2012 Saharon Shelah (HUJI and Rutgers) Classifying classes
More informationDiscrete quantum random walks
Quantum Information and Computation: Report Edin Husić edin.husic@ens-lyon.fr Discrete quantum random walks Abstract In this report, we present the ideas behind the notion of quantum random walks. We further
More informationElliptic Curves Spring 2013 Lecture #12 03/19/2013
18.783 Elliptic Curves Spring 2013 Lecture #12 03/19/2013 We now consider our first practical application of elliptic curves: factoring integers. Before presenting the elliptic curve method (ECM) for factoring
More informationQuantum Computer Simulation Using CUDA (Quantum Fourier Transform Algorithm)
Quantum Computer Simulation Using CUDA (Quantum Fourier Transform Algorithm) Alexander Smith & Khashayar Khavari Department of Electrical and Computer Engineering University of Toronto April 15, 2009 Alexander
More informationNo Laplacian Perfect State Transfer in Trees
No Laplacian Perfect State Transfer in Trees arxiv:1408.2935v1 [math.co] 13 Aug 2014 Gabriel Coutinho Henry Liu October 15, 2018 Abstract We consider a system of qubits coupled via nearest-neighbour interaction
More informationShort Course in Quantum Information Lecture 5
Short Course in Quantum Information Lecture 5 Quantum Algorithms Prof. Andrew Landahl University of New Mexico Course Info All materials downloadable @ website http://info.phys.unm.edu/~deutschgroup/deutschclasses.html
More informationQuantum Complexity Theory. Wim van Dam HP Labs MSRI UC Berkeley SQUINT 3 June 16, 2003
Quantum Complexity Theory Wim van Dam HP Labs MSRI UC Berkeley SQUINT 3 June 16, 2003 Complexity Theory Complexity theory investigates what resources (time, space, randomness, etc.) are required to solve
More informationPh 219b/CS 219b. Exercises Due: Wednesday 11 February 2009
1 Ph 219b/CS 219b Exercises Due: Wednesday 11 February 2009 5.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Part II Emma Strubell http://cs.umaine.edu/~ema/quantum_tutorial.pdf April 13, 2011 Overview Outline Grover s Algorithm Quantum search A worked example Simon s algorithm
More informationMathematics of Public Key Cryptography
Mathematics of Public Key Cryptography Eric Baxter April 12, 2014 Overview Brief review of public-key cryptography Mathematics behind public-key cryptography algorithms What is Public-Key Cryptography?
More informationQuantum Computation and Communication
Tom Lake tswsl1989@sucs.org 16/02/2012 quan tum me chan ics: The branch of mechanics that deals with the mathematical description of the motion and interaction of subatomic particles - OED quan tum me
More informationSome Introductory Notes on Quantum Computing
Some Introductory Notes on Quantum Computing Markus G. Kuhn http://www.cl.cam.ac.uk/~mgk25/ Computer Laboratory University of Cambridge 2000-04-07 1 Quantum Computing Notation Quantum Computing is best
More informationZEROS OF POLYNOMIAL FUNCTIONS ALL I HAVE TO KNOW ABOUT POLYNOMIAL FUNCTIONS
ZEROS OF POLYNOMIAL FUNCTIONS ALL I HAVE TO KNOW ABOUT POLYNOMIAL FUNCTIONS TOOLS IN FINDING ZEROS OF POLYNOMIAL FUNCTIONS Synthetic Division and Remainder Theorem (Compressed Synthetic Division) Fundamental
More informationEndomorphism algebras of semistable abelian varieties over Q of GL(2)-type
of semistable abelian varieties over Q of GL(2)-type UC Berkeley Tatefest May 2, 2008 The abelian varieties in the title are now synonymous with certain types of modular forms. (This is true because we
More informationQUANTUM CRYPTOGRAPHY QUANTUM COMPUTING. Philippe Grangier, Institut d'optique, Orsay. from basic principles to practical realizations.
QUANTUM CRYPTOGRAPHY QUANTUM COMPUTING Philippe Grangier, Institut d'optique, Orsay 1. Quantum cryptography : from basic principles to practical realizations. 2. Quantum computing : a conceptual revolution
More informationQuantum Algorithms. 1. Definition of the Subject and Its Importance. 4. Factoring, Discrete Logarithms, and the Abelian Hidden Subgroup Problem
Quantum Algorithms Michele Mosca Institute for Quantum Computing and Dept. of Combinatorics & Optimization University of Waterloo and St. Jerome s University, and Perimeter Institute for Theoretical Physics
More informationThe existence of designs - after Peter Keevash
The existence of designs - after Peter Keevash Bourbaki seminar, IHP, Paris, June 27, 2015 Introduction: Designs and Steiner systems A set S of q-subsets of an n-set X is a design with parameters (n, q,
More informationFast, twist-secure elliptic curve cryptography from Q-curves
Fast, twist-secure elliptic curve cryptography from Q-curves Benjamin Smith Team GRACE INRIA Saclay Île-de-France Laboratoire d Informatique de l École polytechnique (LIX) ECC #17, Leuven September 16,
More informationFrom Adversaries to Algorithms. Troy Lee Rutgers University
From Adversaries to Algorithms Troy Lee Rutgers University Quantum Query Complexity As in classical complexity, it is difficult to show lower bounds on the time or number of gates required to solve a problem
More informationQuestionnaire for CSET Mathematics subset 1
Questionnaire for CSET Mathematics subset 1 Below is a preliminary questionnaire aimed at finding out your current readiness for the CSET Math subset 1 exam. This will serve as a baseline indicator for
More informationIn fact, 3 2. It is not known whether 3 1. All three problems seem hard, although Shor showed that one can solve 3 quickly on a quantum computer.
Attacks on RSA, some using LLL Recall RSA: N = pq hard to factor. Choose e with gcd(e,φ(n)) = 1, where φ(n) = (p 1)(q 1). Via extended Euclid, find d with ed 1 (mod φ(n)). Discard p and q. Public key is
More informationCOMPUTATIONAL COMPLEXITY
COMPUTATIONAL COMPLEXITY A Modern Approach SANJEEV ARORA Princeton University BOAZ BARAK Princeton University {Щ CAMBRIDGE Щ0 UNIVERSITY PRESS Contents About this book Acknowledgments Introduction page
More informationShor s Quantum Factorization Algorithm
Shor s Quantum Factorization Algorithm Tayeb Aïssiou Department of Mathematics and Statistics McGill University, Montreal, Quebec Canada H3A K6 e-mail: tayeb.aissiou@mail.mcgill.ca November, 5 Abstract
More informationOn the polynomial x(x + 1)(x + 2)(x + 3)
On the polynomial x(x + 1)(x + 2)(x + 3) Warren Sinnott, Steven J Miller, Cosmin Roman February 27th, 2004 Abstract We show that x(x + 1)(x + 2)(x + 3) is never a perfect square or cube for x a positive
More informationCOMS W4995 Introduction to Cryptography September 29, Lecture 8: Number Theory
COMS W4995 Introduction to Cryptography September 29, 2005 Lecture 8: Number Theory Lecturer: Tal Malkin Scribes: Elli Androulaki, Mohit Vazirani Summary This lecture focuses on some basic Number Theory.
More informationAn Introduction to Quantum Information and Applications
An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded
More informationQuantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )
Quantum Computing 101 ( Everything you wanted to know about quantum computers but were afraid to ask. ) Copyright Chris Lomont, 2004 2 67 1 = 193707721 761838257287 Took American Mathematician Frank Nelson
More informationQuantum wires, orthogonal polynomials and Diophantine approximation
Quantum wires, orthogonal polynomials and Diophantine approximation Introduction Quantum Mechanics (QM) is a linear theory Main idea behind Quantum Information (QI): use the superposition principle of
More informationLecture 10: Eigenvalue Estimation
CS 880: Quantum Information Processing 9/7/010 Lecture 10: Eigenvalue Estimation Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený Last time we discussed the quantum Fourier transform, and introduced
More informationPrimes and Factorization
Primes and Factorization 1 A prime number is an integer greater than 1 with no proper divisors. The list begins 2, 3, 5, 7, 11, 13, 19,... See http://primes.utm.edu/ for a wealth of information about primes.
More information5.4 ElGamal - definition
5.4 ElGamal - definition In this section we define the ElGamal encryption scheme. Next to RSA it is the most important asymmetric encryption scheme. Recall that for a cyclic group G, an element g G is
More informationarxiv:quant-ph/ Nov 2000
Basic concepts in quantum computation Artur Ekert, Patrick Hayden and Hitoshi Inamori Centre for Quantum Computation, University of Oxford, Oxford OX1 3PU, United Kingdom arxiv:quant-ph/0011013 Nov 000
More informationComputing the modular equation
Computing the modular equation Andrew V. Sutherland (MIT) Barcelona-Boston-Tokyo Number Theory Seminar in Memory of Fumiyuki Momose Andrew V. Sutherland (MIT) Computing the modular equation 1 of 8 The
More informationMath 319 Problem Set #2 Solution 14 February 2002
Math 39 Problem Set # Solution 4 February 00. (.3, problem 8) Let n be a positive integer, and let r be the integer obtained by removing the last digit from n and then subtracting two times the digit ust
More informationModel-theoretic distality and incidence combinatorics
Model-theoretic distality and incidence combinatorics Artem Chernikov UCLA Model Theory and Combinatorics workshop IHP, Paris, France Jan 29, 2018 Intro I will discuss generalizations of various results
More informationThe Quantum Query Complexity of Algebraic Properties
The Quantum Query Complexity of Algebraic Properties Sebastian Dörn Institut für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430
More informationA Gentle Introduction to Quantum Computing
A Gentle Introduction to Quantum Computing Abdullah Khalid 01-10-0168 School of Science and Engineering Lahore University of Management Sciences Friday 3 rd June, 011 Contents 1 Introduction to Quantum
More informationNumerical Methods. Equations and Partial Fractions. Jaesung Lee
Numerical Methods Equations and Partial Fractions Jaesung Lee Solving linear equations Solving linear equations Introduction Many problems in engineering reduce to the solution of an equation or a set
More informationQuantum Computation, NP-Completeness and physical reality [1] [2] [3]
Quantum Computation, NP-Completeness and physical reality [1] [2] [3] Compiled by Saman Zarandioon samanz@rutgers.edu 1 Introduction The NP versus P question is one of the most fundamental questions in
More informationarxiv:quant-ph/ v1 17 Jul 1997
Submitted to Proc. Roy. Soc. Lond. A for the Proceedings of the Santa Barbara Conference on Quantum Coherence and Decoherence held in December 1996, edited by E. Knill, R. LaFlamme and W. Zurek. Quantum
More informationNew Quantum Algorithm Solving the NP Complete Problem
ISSN 070-0466, p-adic Numbers, Ultrametric Analysis and Applications, 01, Vol. 4, No., pp. 161 165. c Pleiades Publishing, Ltd., 01. SHORT COMMUNICATIONS New Quantum Algorithm Solving the NP Complete Problem
More informationPeriodicity & State Transfer Some Results Some Questions. Periodic Graphs. Chris Godsil. St John s, June 7, Chris Godsil Periodic Graphs
St John s, June 7, 2009 Outline 1 Periodicity & State Transfer 2 Some Results 3 Some Questions Unitary Operators Suppose X is a graph with adjacency matrix A. Definition We define the operator H X (t)
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Einar Pius University of Edinburgh Why this Course To raise interest in quantum computing To show how quantum computers could be useful To talk about concepts not found
More informationAlgorithms for quantum computers. Andrew Childs Department of Combinatorics & Optimization and Institute for Quantum Computing University of Waterloo
Algorithms for quantum computers Andrew Childs Department of Combinatorics & Optimization and Institute for Quantum Computing University of Waterloo What is a computer? A means for performing calculations
More informationChapter 2 The Group U(1) and its Representations
Chapter 2 The Group U(1) and its Representations The simplest example of a Lie group is the group of rotations of the plane, with elements parametrized by a single number, the angle of rotation θ. It is
More informationImplementing Competitive Learning in a Quantum System
Implementing Competitive Learning in a Quantum System Dan Ventura fonix corporation dventura@fonix.com http://axon.cs.byu.edu/dan Abstract Ideas from quantum computation are applied to the field of neural
More informationInput Decidable Language -- Program Halts on all Input Encoding of Input -- Natural Numbers Encoded in Binary or Decimal, Not Unary
Complexity Analysis Complexity Theory Input Decidable Language -- Program Halts on all Input Encoding of Input -- Natural Numbers Encoded in Binary or Decimal, Not Unary Output TRUE or FALSE Time and Space
More informationIBM Research Report. arxiv:quant-ph/ v1 16 Jan An Approximate Fourier Transform Useful in Quantum Factoring
RC 964 (07//94) Mathematics IBM Research Report arxiv:quant-ph/00067v 6 Jan 00 An Approximate Fourier Transform Useful in Quantum Factoring D. Coppersmith IBM Research Division T.J. Watson Research Center
More informationDefinition For a set F, a polynomial over F with variable x is of the form
*6. Polynomials Definition For a set F, a polynomial over F with variable x is of the form a n x n + a n 1 x n 1 + a n 2 x n 2 +... + a 1 x + a 0, where a n, a n 1,..., a 1, a 0 F. The a i, 0 i n are the
More informationQuantum Computing. 6. Quantum Computer Architecture 7. Quantum Computers and Complexity
Quantum Computing 1. Quantum States and Quantum Gates 2. Multiple Qubits and Entangled States 3. Quantum Gate Arrays 4. Quantum Parallelism 5. Examples of Quantum Algorithms 1. Grover s Unstructured Search
More informationMahler measure as special values of L-functions
Mahler measure as special values of L-functions Matilde N. Laĺın Université de Montréal mlalin@dms.umontreal.ca http://www.dms.umontreal.ca/~mlalin CRM-ISM Colloquium February 4, 2011 Diophantine equations
More information300-Level Math Courses
300-Level Math Courses Math 250: Elementary Differential Equations A differential equation is an equation relating an unknown function to one or more of its derivatives; for instance, f = f is a differential
More information1 The Fundamental Theorem of Arithmetic. A positive integer N has a unique prime power decomposition. Primality Testing. and. Integer Factorisation
1 The Fundamental Theorem of Arithmetic A positive integer N has a unique prime power decomposition 2 Primality Testing Integer Factorisation (Gauss 1801, but probably known to Euclid) The Computational
More informationQuantum Computing and the Possible Effects on Modern Security Practices
Quantum Computing and the Possible Effects on Modern Security Practices SE 4C03 Winter 2005 Kartik Sivaramakrishnan Researched by: Jeffery Lindner, 9904294 Due: April 04, 2005 Table of Contents Introduction...
More informationOn the query complexity of counterfeiting quantum money
On the query complexity of counterfeiting quantum money Andrew Lutomirski December 14, 2010 Abstract Quantum money is a quantum cryptographic protocol in which a mint can produce a state (called a quantum
More informationarxiv:quant-ph/ v2 22 Jan 2004
Shor s discrete logarithm quantum algorithm for elliptic curves arxiv:quant-ph/0301141v2 22 Jan 2004 John Proos and Christof Zalka Department of Combinatorics and Optimization University of Waterloo, Waterloo,
More informationGraph Non-Isomorphism Has a Succinct Quantum Certificate
Graph Non-Isomorphism Has a Succinct Quantum Certificate Tatsuaki Okamoto Keisuke Tanaka Summary This paper presents the first quantum computational characterization of the Graph Non-Isomorphism problem
More information