Quantum Information Science. Jaewan Kim School of Computational Sciences Korea Institute for Advanced Study Seoul, Korea

Size: px
Start display at page:

Download "Quantum Information Science. Jaewan Kim School of Computational Sciences Korea Institute for Advanced Study Seoul, Korea"

Transcription

1 Quantum Information Science Jaewan Kim School of Computational Sciences Korea Institute for Advanced Study Seoul, Korea

2 Quantum Physics Information Science Quantum Information Science Quantum Parallelism Quantum computing is exponentially larger and faster than digital computing. Quantum Fourier Transform, Quantum Database Search, Quantum Many-Body Simulation (Nanotechnology) No Clonability of Quantum Information, Irrevesability of Quantum Measurement Quantum Cryptography (Absolutely secure digital communication) Quantum Correlation by Quantum Entanglement Quantum Teleportation, Quantum Superdense Coding, Quantum Cryptography, Quantum Imaging

3 Quantum Information Processing Quantum Computer Quantum Algorithms: Softwares Simulation of quantum many-body systems Factoring large integers Database search Experiments: Hardwares Ion Traps NMR Cavity QED, etc. NT IT BT

4 Quantum Information Processing Quantum Communication Quantum Cryptography Absolutely secure digital communication Generation and Distribution of Quantum Key optical fiber wireless secure satellite communication Quantum Teleportation Photons Atoms, Molecules Quantum Imaging and Quantum Metrology IT

5 Bit and Logic Gate NOT A N D OR XOR NAND C-NOT CCN ( Toffoli ) C-Exch ( Fredkin ) Universal Reversible Universal Reversible

6 Classical Computation Hilbert (1900): 23 most challenging math problems Is there a mechanical procedure by which the truth or falsity of any mathematical conjecture could be decided? T u r i n g Conjecture ~ Sequence of 0 s and 1 s Read/Write Head: Logic Gates Model of Modern Computers

7 Turing Machine Finite State Machine: Head q q q = s = d = f( q, s) g( q, s) d( q, s) d Bit {0,1} s s' Infinitely long tape: Storage

8 Quantum Information {0,1} Bit Qubit N bits 2 N states, One at a time Linearly parallel computing AT BEST N qubits Linear superposition of 2 N states at the same time Exponentially parallel computing Quantum Parallelism But when you extract result, you cannot get all of them. a 0 + b1 with a + b = 1 Deutsch 2 2

9 Quantum Algorithms 1. [Feynman] Simulation of Quantum Physical Systems with HUGE Hilber space ( 2 N -D ) e.g. Strongly Correlated Electron Systems 2. [Peter Shor] Factoring large integers, period finding t q Pol (N) t cl Exp (N 1/3 ) 3. [Grover] Searching t q N t cl ~ N/2

10 N bits N bits Digital Computer Digital Computers in parallel m{ 1 N m N N bits N bits Quantum Computer : Quantum Parallelism N bits N bits

11 ? No Male F No Female

12 ? No Male F No Young O No Female M

13

14

15 M Y F Female / Male vs. Young / Old O F No Young No Male No Female

16 Y F O M F No Young O No Male M F Y O No Female F O M

17

18 양자암호통신

19

20

21

22

23 ψ ψ Simplest form of quantum uncertainty principle

24 1 0 = H 0 = D Bloch sphere z 1 0 = 0 θ 0 1 = 0 ϕ y H = 2 1 x = 1 Pure states on the surface of a Bloch sphere

25 Quantum Gates Time-dependent Schrödinger Eq. i ψ = H ψ t iht / ψ( t) = e ψ(0) = U( t) ψ(0) P ( ) = i 0 I θ θ e 0 1 X = = i Z =P( π )= Y = XZ= or ixz = i H = Hadamard H 0 = = = ( ) H 1 = = = ( 0 1 ) Unitary Transform Norm Preserving Reversible

26 Hadamard Gate H1 H2... HN N = N = ( 0 ) N N N N 2 N = k( binary expression) N 2 k = 0 ( 0 1 ) ( 0 1 )... ( 0 1 ) N

27 Universal Quantum Gates General Rotation of a Single Qubit θ iφ θ cos ie sin 2 2 V( θφ, ) = + iφ θ θ ie sin cos 2 2 X c : CNOT (controlled - NOT) or XOR = 0 0 I X V X a b = a a b c

28 Scalable Qubits Initial State Quantum Network DiVincenzo, Qu-Ph/ Unitary evolution : Deterministic : Reversible Universal Gates Ψ H t X X 1 H 2C X 13 Ψ M M M Cohere, Not Decohere Quantum measurement : Probabilistic : Irreversible change

29 Quantum Key Distribution [BB84,B92] Single-Qubit Gates ~ 3 QKD[E91] Quantum Repeater Quantum Teleportation Quantum Error Correction Quantum Computer Single- & Two-Qubit Gates Single- & Two-Qubit Gates ~ 3

30 Physical systems actively considered for quantum computer implementation Liquid-state NMR NMR spin lattices I o n - t ra p Neutral-atom optical lattices Cavity QED + atoms Linear optics with single photons Nitrogen vacancies in diamond Electrons on liquid He Josephson junctions charge qubits flux qubits Spin spectroscopies, impurities in semiconductors Coupled quantum dots Qubits: spin,charge, excitons Exchange coupled, cavity coupled

31 Chuang Nature 414, (20/27 Dec 2001) OR QP/

32 Quantum-dot array proposal

33 Ion Traps Couple lowest centre-of-mass modes to internal electronic states of N ions.

34 Quantum Error Correcting Code Three Bit Code Encode Recover Decode φ 0 0 channel noise 0 0 M M U m 1m2 φ

35 Cryptography and QIP Giving disease (Q Comp), Giving medicine (QKD). Public Key Cryptosystem (Asymmetric) Computationally Secure Based on unproven mathematical conjectures Cursed by Quantum Computation One-Time Pad (Symmetric) Unconditionally Secure Impractical Saved by Quantum Cryptography

36

37 Quantum Key Distribution is a major paradigm shift in the development of cryptography. Conventional and quantum cryptography are a powerful combination in making a secure communications a reality. -Burt Kaliski, Chief Scientist, RSA Laboratories

38 [Symmetric] One-Time pad Alice Bob Tell me the password. Pass word + key = Eve key = pass word

39 [Symmetric] One-Time Pad Alice M = K = E = Vernam Bob E = K = M = Unconditionally Secure Impractical: Generation and Distribution (random) (random)

40 KEY Cypher T e x t Encoding M K: 0 0=0, 0 1=1, 1 0=1, 1 1= KEY

41 [Symmetric] Why is it called One-Time? E1 = M1 K E2 = M2 K E1 E2 = ( M1 K ) ( M2 K ) = M1 M2 ( K K ) = M1 M2 ( 0 ) = M1 M2

42 [Asymmetric] Public Key Cryptosystem Diffie, Hellman RSA : Rivest, Shamir, Adleman Alice1, Alice2, Message [m] Encryption Encryption Key [k] Computationally Secure Eve Cryptogram [c] Bob Message [m] Decryption Decryption Key [d=f(k)] Could be broken, especially by Quantum Computers

43 [Asymmetric] RSA Cryptosystem Message M n = p q, e d = 1 mod (p-1)(q-1) n, e : Public Key (Encryption) n, d : Secret Key (Decryption) Alice : E = M e mod n Bob : M = E d mod n M Message

44 RSA Example Bob s Keys p = 11, q = 13, n = p q = 143 d = 103, e = 7 d e mod (p-1)(q-1) = 103 x 7 mod 120 = 1 Alice s Message: M = 9 E = M e mod n = 9 7 mod 143 = 48 Bob M=E d mod n = mod 143 = 9

45 How Hard is Factoring? Almost exponentially complex with the number of digits, L RSA129 (1977) Factored 17 years later using 1,600 computers 2,000 Digit Number Impossible to factor even Vazirani With as many digital computers as the number of particles in the Universe (10 80 ) In as long time as the age of the universe (10 18 sec)

46

47 No Cloning Theorem An Unknown Quantum State Cannot Be Cloned. <Proof> U ( α 0 ) ( 0 ) = α α Zurek, Wootters Diks U β = β β α β 1 Let γ = ( α + β ). 2 1 Then U ( γ 0 ) = ( α α + β β ) γ γ 2

48 Controlled-NOT XOR X X = 0 0 I X AB AA B AA B = = AB AB = A B A B AB

49 Qubit Copying Circuit? x x x x 0 y x y x ψ = a 0 + b 1 0 ψ = a 0 + b 1 a 00 + b 11 ψ = a 0 + b 1

50 IF an unknow quantum state CAN be cloned Quantum States can be measured as accurately as possible??? ψ ψ, ψ, ψ, ψ measure, measure, Communication Faster Than Light? ψ = 1 A 0 B - 0 A 1 B for 0 = + A - B - - A + B for 1

51 Communication Faster Than Light when unknown quantum state can be copied. Alice wants to send Bob 1. Alice mesures her qubit in { +>, ->}. Alice s state will become +> or ->. Bob s state will become -> or +>. Let s assume it is +>. Bob makes many copies of this. He measures them in { +>, ->}, and gets 100% +>. He measures them in { 0>, 1>}, and gets 50% 0> and 50% 1>. Thus Bob can conclude that Alice measured her state in { +>, ->}.

52 Mysterious Connection Between QM & Relativity Weinberg: Can QM be nonlinear? Experiments: Not so positive result. Polchinski, Gisin: If QM is nonlinear, communication faster than light is possible.

53 Irreversability of Quantum Measurement If you describe it as that, that is not it anymore - 老子 - ψ = a 0 + b 1 = c 0' + d 1' Measure in { 0, 1 } 0 or 1 Measure in { 0', 1' } 0' or 1'

54 Quantum Cryptography Quantum Key Distribution BB84, B92, E91 No Cloning & Irreversability of Quantum Measurement Alice EVE (eavesdropper) Single Photon, Ent., Coh. Bob 1. Interconvertibility between stationary and flying qubits. 2. Faithful transmission of flying qubits. DiVincenzo, Qu-Ph/

55 BB84: 4 Polarizations 0 o,90 o 0 o,45 o 0 o,45 o D1 PC1 PC2 Laser PC3 P B S A1 A2 B Alice A1 = A2 = P = Bob B = D = D0

56 BB84 full implementation Authenticated Public Discussion Mesurement in random basis Y e s Same basis? No Null result or different basis Discard Transmission of raw data: Random coding on single photons Initial Authentication NEEDED Check random sample Error < Q% Y e s Reconciliation of bit strings Parity check n bits Secret key s bits No Stop Estimate information leakage k bits Privacy Amplification Keep the parities

57 World s first QKD (1989): Bennett(IBM) et al. 32 cm in free space with 4 polarizations

58 KIAS-ETRI, December km Quantum Cryptography

59

60

61

62 Deutsch Algorithm Global property of f

63 Quantum Fourier Transform ~n 2 =(log 2 N) 2 vs N log 2 N ***can be used only as a subroutine, used for factoring

64 Molding a Quantum State Ψ H t X X 1 H 2C X 13 Ψ M M M Molding

65 Sculpturing a Quantum State - Cluster State Quantum Computing Initialize each qubit in + state. 2. Contolled-Phase between the neighboring qubits. 3. Single qubit manipulations and single qubit measurements only [Sculpturing]. No two qubit operations!

66 Entanglement EPR & Nonlocality Alice Bob 1 2 ( ) ψ A B A B A B φ Local Hidden Variable Bell s Inequality Aspect s Experiment Quantum Mechanics is nonlocal! 1 GHZ State: ( + ) A B C A B C

67 Bell s inequality, CHSH inequality (Classical) Violation of inequality (Quantum)

68 Alice x Entanglement Quantum correlation Bob y Classical physics: x and y are decided when picked up. 0 1 or 1 0 A B A B Quantum physics: x and y are decided when measured. {0,1} basis 0 or 1 1 {+,-} basis + or - Ψ = ( A B A B) 2 1 = ( + + A B A B) = 0 + 1, = ( ) ( )

69 Entanglement and Two-Qubit Gate a 0 + b 1 0 a 0 + b a b 1 1 a b 1 1 1

70 Classical Teleportation? Alice X a m m 1 bit Bob b m 1 X 1 bit Correlated P a i r X = 0 or 1 1 bit a 1 bit {0,1} b 1 bit x a m b = x 1 1 = x 1

71 Quantum Teleportation Transportation Continuous movement through space P P Quantum Teleportation B 1, B 2 X A BX

72 Quantum Teleportation Transmit an unknown qubit Alice Bell State Measurement Φ ±, Ψ ± without sending the qubit 2 Bits Classical Information Entangled Pair unknown Ω = α 0 + β 1 Bob Unitary Transform I, Z, X, Y Bennett et al. Ω = α 0 + β 1 E P R - S o u r c e

73

74

75

76 θ = ο X A B

77 θ = ο X A B

78 θ = ο X A B

79 θ = ο Bell Measurement 0 Leave it as it is. X A B

80 θ = ο Bell Measurement 1 Rotate it by -90 o. X A B

81 θ = ο X A B

82 Single Particle Entanglement 1 Single Photon Single Electron ( + + H = t c1 c2 + c2c1 ) 2 Beam Splitter 2 1 ψ = ( ) 2 1 or ψ = f e + e f 2 ( ) φ = + 2 ( )

83 Quantum Teleportation using Single Particle Entanglement Lee, JK, Qu-ph/ ; Phys. Rev. A 63, (2001)

84 PRL88, (2002) or QP/ "Active" Teleportation of a Quantum Bit S. Giacomini, F. Sciarrino, E. Lombardi and F. De Martini

85 Quantum Teleportation of Single Particle Entanglement Lee, Qu-ph/ ; Phys. Rev. A 64, (2001)

86 Quantum Superdense Coding Transmit two bits by sending one qubit Alice I, X, Y, Z 1 qubit Entanglement Bob X H AB A 2 bit A B EPR

87 Quantum Superdense Coding I 0 0 A: = (0 + 1) 0 X : A = (1 + 0) : : A B A B XAB HA YA : = (1 0)1 11 Z A: = (0 1) Alice s manipulation Alice sends the qubit to Bob 1 qubit Bob s manipulation 4 states differentiated 2 bit

88 Tripartite Qubit Entanglement Z-basis: 0 with 1, 1 with + 1 X-basis: a with 1, b 0 1 with a + b, 1 a b Y-basis: c 0 + i 1 with 1, d 0 i 1 with + 1 ( ) 0 c + d, 1 i c b Not expectation values A GHZ 1 = { } : Z-basis 2 ( a + b)( a + b)( a + b) + ( a b)( a b)( a b) aaa + abb + bab + bba : xxx = 1 B C xxx xyy yxy yyx = ( a + b)( c + d)( c + d) ( a b)( c d)( c d) acd + adc + bcc + bdd : xyy =+ 1 = 1 =+ 1 = ( ) ( ) ( ) = A B C x y x y x y 1?

89 Bipartite Qubit Entanglement Not expectation values counterfactual argument Ψ = a 00 + b 01 + c 10 + d 11 with a + b + c = = 0 00 Ψ = 0 = a b Ψ = 0= a c p = 00 Ψ = a A 0 0 B 0 0 = A B Maximize p! p p A B B A A B A B A = pa = pb p = = p + p p = p + p p = p A A B 1 2 A A B 0 B papb(1 pa)(1 pb) 1 p p 1± pa = pb = 1, pa = pb = = g: golden mean p = g 9 % A B

90

91

92 Zurek, QP/

93 j 1 = 3 + R 4 2 ( ) ìé ï 1 1 ù 3 ïê 2 2 rlr = j j = í ï ê 4 ïê ï 1 1 ïë ïî ê 2 2 ú û R R 4 4 R

94 Parametric Down Conversion : Splitting a photon into two w w 2 w w 2

95 j 1 = r = j j LR ( ) L R L R w 3 L R 4 L 4 R C K Hong and T Noh (1998) Y-H Kim and Y Shi (2000)

96 Delayed Choice Quantum Erasure REVISITED Kim et al., PRL84, 1(2000); C.K.Hong and T.G.Noh, JOSA B15, 1192(1998)

97 j 1 = ( ) L R L R 1 ì æ ö æ ö üïì + ï ü U U ï L L L i 3 L L L r i 4 ïïhc.. ï LR = L j j L = í ýí ý 2 ç 2 2 è rlr = 2 ø R j j çè R ø ïï ïîï ïî ïþ ïþ D 3 2 BSA D R L D 0 D 2 BS 4 4 L 4 R D 4 U L BSB 1 é 1 i 1 i ù i 1 i = 0 i i êë 2 2úû

98 + r = 1 U j j U 1 RD1 L L L L 1 = { 3 i 4 }{ 3 i 4 } ìé ï 1 i ù 3 ïê 8 8 = ï í ê 4 ï ïê - i 1 ïë ïî ê 8 8 ú û R R R R 3 4 D 3 2 BSA D R L D 0 D 2 BS 4 4 L 4 R D 4 BSB 1 + r = 2 U j j U 2 RD2 L L L L 1 = { i 3 4 }{ i 3 4 } ìé ï 1 i ù 3 ïê = ï í ê 4 ïê ï i 1 ïë ïî ê 8 8 û ú R R R R 3 4

99 D 3 2 BSA D R L D 0 D 2 BS 4 4 L 4 R D 4 BSB 1 é 1 i ù é1 i ù é1 0 ù = + = ( 1 2) i 1 i ê- ë 8 8úû êë 8 8 úû êë 4úû r R D +D

100 1 é1 0ù r = 3 U U + 3 = 3 3 = 4 3 L j j RD L L L R R 4 êë 0 0úû D 3 2 BSA D R L D 0 D 2 BS 4 4 L 4 R D 4 BSB 1 1 é0 0 ù r = 4 U U + 4 = 4 4 = 4 L j j RD L L L R R êë 4úû

101 Environment Decoherence D 3 BSA 2 3 D 2 D 1 D 0 3 L j 1 = r = j j LR 3 R ( ) L R L R BS 4 L 4 4 R D 4 BSB é1 0ù r { } R = trl rlr = + = R R R R 2 2 ê ë0 1 ú û é1 0 ù é1 0 0 ù 4 é ù é ù 4 2 = + + ( ) = ê 0 0ú ê 0 1 ê 4ú ë û ë 4ú ë û û êë 2úû r R D +D +D +D

102 Entanglement and Decoherence A Zurek B or Environment When system A is entangled with environment, state of A cannot be described by a state vector, but by a density matrix. Ψ AB = a 0 A 0 B + b 1 A 1 B = ψ A φ B ρ A = T r B ρ AB = T r B Ψ AB AB Ψ = a 2 0 = ψ A A ψ 0 b 2 ba* ab*

103 Quantum Repeater 1. Quantum Repeater ~100 km Indefinite distance Briegel, Durr, Cirac, and Zoller, quant-ph/ Transmission: Photon Storage, Processing: Atomic Physics, etc. 2. Multiuser Quantum Network 1:1 multiusers & Entanglement Purification Phoenix, Barnett, Townsend, and Blow, JMO 42, 1155 (1995) Biham, Huttner, and Mor, Phys. Rev. A 54, 2651 (1996)

104 Optical Imaging by Two-Photon Entanglement Shih et al., PRA52, R3429 (1995).

105 yes no no yes

106

107 Quantum Lithography

108

109

110

111

112 Quantum Interferometric Optical Lithography: Exploiting Entanglement to Beat the Diffraction Limit Agedi N. Boto,1 Pieter Kok,2 Daniel S. Abrams,1 Samuel L. Braunstein,2 Colin P. Williams,1 and Jonathan P. Dowling1,* PRL85, 2733 (2000) Two-Photon Diffraction and Quantum Lithography Milena D Angelo, Maria V. Chekhova,* and Yanhua Shih PRL87, (2001)

113 Quantum Metrology We are applying our understanding of the quantum nature of entangled-photon pairs for the characterization of optical-detector quantum efficiency, source radiation density, and photonic-material characteristics, all without the necessity of employing a reference. The use of this unique light source provides particular advantages over the classical counterparts that are traditionally used. A n o t h e r e x a m p l e i s p r o v i d e d b y a t e c h n i q u e w e c a l l quantum ellipsometry. The high accuracy required in traditional ellipsometric measurements necessitates the absolute calibration of both the source and the detector. These requirements can be circumvented by using spontaneous parametric down-conversion in conjunction with a novel polarization interferometer and coincidencecounting detection scheme. Entangled-photon ellipsometry A. F. Abouraddy, K. C. Toussaint, Jr., A. V. Sergienko, B. E. A. Saleh, and M. C. Teich J. O p t. S o c. A m. B. 19, (2002). [PDF] Ellipsometric measurements by use of photon pairs generated by spontaneous parametric downconversion Ayman F. Abouraddy, Kimani C. Toussaint, Jr., Alexander V. Sergienko, Bahaa E. A. Saleh, and Malvin C. Teich Opt. Lett. 26, (2001). [PDF]

114 Quantum Physics Information Science Quantum Information Science Quantum Parallelism Quantum computing is exponentially larger and faster than digital computing. Quantum Fourier Transform, Quantum Database Search, Quantum Many-Body Simulation (Nanotechnology) No Clonability of Quantum Information, Irrevesability of Quantum Measurement Quantum Cryptography (Absolutely secure digital communication) Quantum Correlation by Quantum Entanglement Quantum Teleportation, Quantum Superdense Coding, Quantum Cryptography, Quantum Imaging

Quantum Computer. Jaewan Kim School of Computational Sciences Korea Institute for Advanced Study

Quantum Computer. Jaewan Kim School of Computational Sciences Korea Institute for Advanced Study Quantum Computer Jaewan Kim jaewan@kias.re.kr School of Computational Sciences Korea Institute for Advanced Study KIAS (Korea Institute for Advanced Study) Established in 1996 Located in Seoul, Korea Pure

More information

Quantum Entanglement and Decoherence

Quantum Entanglement and Decoherence Quantum Entanglement an Decoherence Jaewan Kim (jaewan@kias.re.kr) KIAS I think of my lifetime in physics as ivie into three perios. In the first perio I was in the grip of the iea that Everything is Particles,

More information

*WILEY- Quantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co.

*WILEY- Quantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co. Joachim Stolze and Dieter Suter Quantum Computing A Short Course from Theory to Experiment Second, Updated and Enlarged Edition *WILEY- VCH WILEY-VCH Verlag GmbH & Co. KGaA Contents Preface XIII 1 Introduction

More information

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Information Transfer and Processing Miloslav Dušek Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the

More information

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation QSIT09.V01 Page 1 1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation What is quantum mechanics good for? traditional historical perspective: beginning of 20th century: classical

More information

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1 1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation What is quantum mechanics good for? traditional historical perspective: beginning of 20th century: classical physics fails

More information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Physics is becoming too difficult for physicists. David Hilbert (mathematician) Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving

More information

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Quantum Computers. Todd A. Brun Communication Sciences Institute USC Quantum Computers Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose components are individual

More information

Quantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co. KGaA

Quantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co. KGaA Joachim Stolze and Dieter Suter Quantum Computing A Short Course from Theory to Experiment Second, Updated and Enlarged Edition WILEY- VCH WILEY-VCH Verlag GmbH & Co. KGaA Preface XIII 1 Introduction and

More information

Secrets of Quantum Information Science

Secrets of Quantum Information Science Secrets of Quantum Information Science Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose

More information

EPR paradox, Bell inequality, etc.

EPR paradox, Bell inequality, etc. EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project

More information

Quantum Information Processing and Diagrams of States

Quantum Information Processing and Diagrams of States Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University

More information

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate

More information

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen Entanglement arnoldzwicky.org Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen PHYS403, July 26, 2017 Entanglement A quantum object can

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

Transmitting and Hiding Quantum Information

Transmitting and Hiding Quantum Information 2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009 An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer

More information

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles Quantum Computation 650 Spring 2009 Lectures 1-21 The World of Quantum Information Marianna Safronova Department of Physics and Astronomy February 10, 2009 Outline Quantum Information: fundamental principles

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley Challenges in Quantum Information Science Umesh V. Vazirani U. C. Berkeley 1 st quantum revolution - Understanding physical world: periodic table, chemical reactions electronic wavefunctions underlying

More information

Quantum Cryptography and Security of Information Systems

Quantum Cryptography and Security of Information Systems Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty

More information

Quantum Computation: From Quantum Teleportation to the Shor s Algorithm

Quantum Computation: From Quantum Teleportation to the Shor s Algorithm Quantum Computation: From Quantum Teleportation to the Shor s Algorithm J. J. Ruiz-Lorenzo Dep. Física, Universidad de Extremadura Instituto de Computación Científica Avanzada de Extremadura (ICCAEx) http://www.eweb.unex.es/eweb/fisteor/juan

More information

Seminar 1. Introduction to Quantum Computing

Seminar 1. Introduction to Quantum Computing Seminar 1 Introduction to Quantum Computing Before going in I am also a beginner in this field If you are interested, you can search more using: Quantum Computing since Democritus (Scott Aaronson) Quantum

More information

Problem Set: TT Quantum Information

Problem Set: TT Quantum Information Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C

More information

An Introduction to Quantum Information and Applications

An Introduction to Quantum Information and Applications An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded

More information

IBM quantum experience: Experimental implementations, scope, and limitations

IBM quantum experience: Experimental implementations, scope, and limitations IBM quantum experience: Experimental implementations, scope, and limitations Plan of the talk IBM Quantum Experience Introduction IBM GUI Building blocks for IBM quantum computing Implementations of various

More information

The information content of a quantum

The information content of a quantum The information content of a quantum A few words about quantum computing Bell-state measurement Quantum dense coding Teleportation (polarisation states) Quantum error correction Teleportation (continuous

More information

Semiconductors: Applications in spintronics and quantum computation. Tatiana G. Rappoport Advanced Summer School Cinvestav 2005

Semiconductors: Applications in spintronics and quantum computation. Tatiana G. Rappoport Advanced Summer School Cinvestav 2005 Semiconductors: Applications in spintronics and quantum computation Advanced Summer School 1 I. Background II. Spintronics Spin generation (magnetic semiconductors) Spin detection III. Spintronics - electron

More information

Entanglement and Quantum Teleportation

Entanglement and Quantum Teleportation Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,

More information

2.0 Basic Elements of a Quantum Information Processor. 2.1 Classical information processing The carrier of information

2.0 Basic Elements of a Quantum Information Processor. 2.1 Classical information processing The carrier of information QSIT09.L03 Page 1 2.0 Basic Elements of a Quantum Information Processor 2.1 Classical information processing 2.1.1 The carrier of information - binary representation of information as bits (Binary digits).

More information

Introduction to Quantum Computation

Introduction to Quantum Computation Chapter 1 Introduction to Quantum Computation 1.1 Motivations The main task in this course is to discuss application of quantum mechanics to information processing (or computation). Why? Education:Asingleq-bitisthesmallestpossiblequantummechanical

More information

example: e.g. electron spin in a field: on the Bloch sphere: this is a rotation around the equator with Larmor precession frequency ω

example: e.g. electron spin in a field: on the Bloch sphere: this is a rotation around the equator with Larmor precession frequency ω Dynamics of a Quantum System: QM postulate: The time evolution of a state ψ> of a closed quantum system is described by the Schrödinger equation where H is the hermitian operator known as the Hamiltonian

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

Quantum Cryptographic Network based on Quantum Memories. Abstract

Quantum Cryptographic Network based on Quantum Memories. Abstract Quantum Cryptographic Network based on Quantum Memories Eli Biham Computer Science Department Technion Haifa 32000, Israel Bruno Huttner Group of Applied Physics University of Geneva CH-2, Geneva 4, Switzerland

More information

A central problem in cryptography: the key distribution problem.

A central problem in cryptography: the key distribution problem. Scientific American 314, 48-55 (2016) A central problem in cryptography: the key distribution problem. Mathematics solution: public key cryptography. Public-key cryptography relies on the computational

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security Hacking Quantum Cryptography Marina von Steinkirch ~ Yelp Security Agenda 1. Quantum Mechanics in 10 mins 2. Quantum Computing in 11 mins 3. Quantum Key Exchange in 100 mins (or more minutes) Some disclaimers

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

Quantum key distribution with 2-bit quantum codes

Quantum key distribution with 2-bit quantum codes Quantum key distribution with -bit quantum codes Xiang-Bin Wang Imai Quantum Computation and Information project, ERATO, Japan Sci. and Tech. Corp. Daini Hongo White Bldg. 0, 5-8-3, Hongo, Bunkyo, Tokyo

More information

Quantum computing! quantum gates! Fisica dell Energia!

Quantum computing! quantum gates! Fisica dell Energia! Quantum computing! quantum gates! Fisica dell Energia! What is Quantum Computing?! Calculation based on the laws of Quantum Mechanics.! Uses Quantum Mechanical Phenomena to perform operations on data.!

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Part I Emma Strubell http://cs.umaine.edu/~ema/quantum_tutorial.pdf April 12, 2011 Overview Outline What is quantum computing? Background Caveats Fundamental differences

More information

Quantum Information Processing

Quantum Information Processing Quantum Information Processing Jonathan Jones http://nmr.physics.ox.ac.uk/teaching The Information Age Communication Shannon Computation Turing Current approaches are essentially classical which is wrong

More information

phys4.20 Page 1 - the ac Josephson effect relates the voltage V across a Junction to the temporal change of the phase difference

phys4.20 Page 1 - the ac Josephson effect relates the voltage V across a Junction to the temporal change of the phase difference Josephson Effect - the Josephson effect describes tunneling of Cooper pairs through a barrier - a Josephson junction is a contact between two superconductors separated from each other by a thin (< 2 nm)

More information

Quantum key distribution for the lazy and careless

Quantum key distribution for the lazy and careless Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center

More information

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII Quantum cryptography Part XIII Quantum cryptography Quantum cryptography has a potential to be cryptography of st century. An important new feature of quantum cryptography is that security of quantum cryptographic

More information

Introduction to Quantum Key Distribution

Introduction to Quantum Key Distribution Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is

More information

arxiv:quant-ph/ v1 13 Mar 2007

arxiv:quant-ph/ v1 13 Mar 2007 Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,

More information

Introduction to Quantum Computing for Folks

Introduction to Quantum Computing for Folks Introduction to Quantum Computing for Folks Joint Advanced Student School 2009 Ing. Javier Enciso encisomo@in.tum.de Technische Universität München April 2, 2009 Table of Contents 1 Introduction 2 Quantum

More information

Quantum Gates, Circuits & Teleportation

Quantum Gates, Circuits & Teleportation Chapter 3 Quantum Gates, Circuits & Teleportation Unitary Operators The third postulate of quantum physics states that the evolution of a quantum system is necessarily unitary. Geometrically, a unitary

More information

Physics ; CS 4812 Problem Set 4

Physics ; CS 4812 Problem Set 4 Physics 4481-7681; CS 4812 Problem Set 4 Six problems (six pages), all short, covers lectures 11 15, due in class 25 Oct 2018 Problem 1: 1-qubit state tomography Consider a 1-qubit state ψ cos θ 2 0 +

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

A Superluminal communication solution based on Four-photon entanglement

A Superluminal communication solution based on Four-photon entanglement A Superluminal communication solution based on Four-photon entanglement Jia-Run Deng cmos001@163.com Abstract : Based on the improved design of Four-photon entanglement device and the definition of Encoding

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =

More information

Towards Scalable Linear-Optical Quantum Computers

Towards Scalable Linear-Optical Quantum Computers Quantum Information Processing, Vol. 3, Nos. 1 5, October 2004 ( 2004) Towards Scalable Linear-Optical Quantum Computers J. P. Dowling, 1,5 J. D. Franson, 2 H. Lee, 1,4 and G. J. Milburn 3 Received February

More information

Probabilistic exact cloning and probabilistic no-signalling. Abstract

Probabilistic exact cloning and probabilistic no-signalling. Abstract Probabilistic exact cloning and probabilistic no-signalling Arun Kumar Pati Quantum Optics and Information Group, SEECS, Dean Street, University of Wales, Bangor LL 57 IUT, UK (August 5, 999) Abstract

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145

More information

Quantum Information Processing with Trapped Ions. Experimental implementation of quantum information processing with trapped ions

Quantum Information Processing with Trapped Ions. Experimental implementation of quantum information processing with trapped ions Quantum Information Processing with Trapped Ions Overview: Experimental implementation of quantum information processing with trapped ions 1. Implementation concepts of QIP with trapped ions 2. Quantum

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

Single-photon quantum error rejection and correction with linear optics

Single-photon quantum error rejection and correction with linear optics Single-photon quantum error rejection and correction with linear optics Demetrios Kalamidas Institute for ltrafast Spectroscopy and Lasers, City College of the City niversity of New York, 138 Street &

More information

Preparing multi-partite entanglement of photons and matter qubits

Preparing multi-partite entanglement of photons and matter qubits Preparing multi-partite entanglement of photons and matter qubits Pieter Kok, Sean D. Barrett, Timothy P. Spiller Trusted Systems Laboratory HP Laboratories Bristol HPL-2005-199 November 23, 2005* state

More information

Quantum Computing. Thorsten Altenkirch

Quantum Computing. Thorsten Altenkirch Quantum Computing Thorsten Altenkirch Is Computation universal? Alonzo Church - calculus Alan Turing Turing machines computable functions The Church-Turing thesis All computational formalisms define the

More information

Reversible and Quantum computing. Fisica dell Energia - a.a. 2015/2016

Reversible and Quantum computing. Fisica dell Energia - a.a. 2015/2016 Reversible and Quantum computing Fisica dell Energia - a.a. 2015/2016 Reversible computing A process is said to be logically reversible if the transition function that maps old computational states to

More information

Schemes to generate entangled photon pairs via spontaneous parametric down conversion

Schemes to generate entangled photon pairs via spontaneous parametric down conversion Schemes to generate entangled photon pairs via spontaneous parametric down conversion Atsushi Yabushita Department of Electrophysics National Chiao-Tung University? Outline Introduction Optical parametric

More information

Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan

Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography D. J. Guan Abstract The development of quantum algorithms and quantum information theory, as well as the design

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

Optical Quantum Imaging, Computing, and Metrology: WHAT S NEW WITH N00N STATES? Jonathan P. Dowling

Optical Quantum Imaging, Computing, and Metrology: WHAT S NEW WITH N00N STATES? Jonathan P. Dowling Optical Quantum Imaging, Computing, and Metrology: WHAT S NEW WITH N00N STATES? Jonathan P. Dowling Hearne Institute for Theoretical Physics Louisiana State University Baton Rouge, Louisiana quantum.phys.lsu.edu

More information

QUANTUM CRYPTOGRAPHY QUANTUM COMPUTING. Philippe Grangier, Institut d'optique, Orsay. from basic principles to practical realizations.

QUANTUM CRYPTOGRAPHY QUANTUM COMPUTING. Philippe Grangier, Institut d'optique, Orsay. from basic principles to practical realizations. QUANTUM CRYPTOGRAPHY QUANTUM COMPUTING Philippe Grangier, Institut d'optique, Orsay 1. Quantum cryptography : from basic principles to practical realizations. 2. Quantum computing : a conceptual revolution

More information

The Three Upcoming Revolutions in Physics and Astronomy that will Affect Everyone. Quantum Information Nov. 12, 2002

The Three Upcoming Revolutions in Physics and Astronomy that will Affect Everyone. Quantum Information Nov. 12, 2002 The Three Upcoming Revolutions in Physics and Astronomy that will Affect Everyone Quantum Information Nov. 12, 2002 The History of Secrecy Enemy of the State You re being watched Big Brother You are captured

More information

IBM Systems for Cognitive Solutions

IBM Systems for Cognitive Solutions IBM Q Quantum Computing IBM Systems for Cognitive Solutions Ehningen 12 th of July 2017 Albert Frisch, PhD - albert.frisch@de.ibm.com 2017 IBM 1 st wave of Quantum Revolution lasers atomic clocks GPS sensors

More information

Quantum Communication. Serge Massar Université Libre de Bruxelles

Quantum Communication. Serge Massar Université Libre de Bruxelles Quantum Communication Serge Massar Université Libre de Bruxelles Plan Why Quantum Communication? Prepare and Measure schemes QKD Using Entanglement Teleportation Communication Complexity And now what?

More information

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum

More information

Correcting noise in optical fibers via dynamic decoupling

Correcting noise in optical fibers via dynamic decoupling Introduction CPMG Our results Conclusions Correcting noise in optical fibers via dynamic decoupling Bhaskar Bardhan 1, Petr Anisimov 1, Manish Gupta 1, Katherine Brown 1, N. Cody Jones 2, Hwang Lee 1,

More information

Quantum Teleportation Pt. 1

Quantum Teleportation Pt. 1 Quantum Teleportation Pt. 1 PHYS 500 - Southern Illinois University April 17, 2018 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 1 April 17, 2018 1 / 13 Types of Communication In the

More information

Quantum non-demolition measurements:

Quantum non-demolition measurements: Quantum non-demolition measurements: One path to truly scalable quantum computation Kae Nemoto Tim Spiller Sean Barrett Ray Beausoleil Pieter Kok Bill Munro HP Labs (Bristol) Why should optical quantum

More information

Security and implementation of differential phase shift quantum key distribution systems

Security and implementation of differential phase shift quantum key distribution systems Security and implementation of differential phase shift quantum key distribution systems Eleni Diamanti University Ph.D. Oral Examination June 1 st, 2006 Classical cryptography cryptography = κρυπτός +

More information

Solid-state quantum communications and quantum computation based on single quantum-dot spin in optical microcavities

Solid-state quantum communications and quantum computation based on single quantum-dot spin in optical microcavities CQIQC-V -6 August, 03 Toronto Solid-state quantum communications and quantum computation based on single quantum-dot spin in optical microcavities Chengyong Hu and John G. Rarity Electrical & Electronic

More information

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography

Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography Peter Schwabe October 21 and 28, 2011 So far we assumed that Alice and Bob both have some key, which nobody else has. How

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Petros Wallden Lecture 1: Introduction 18th September 2017 School of Informatics, University of Edinburgh Resources 1. Quantum Computation and Quantum Information by Michael

More information

What is a quantum computer? Quantum Architecture. Quantum Mechanics. Quantum Superposition. Quantum Entanglement. What is a Quantum Computer (contd.

What is a quantum computer? Quantum Architecture. Quantum Mechanics. Quantum Superposition. Quantum Entanglement. What is a Quantum Computer (contd. What is a quantum computer? Quantum Architecture by Murat Birben A quantum computer is a device designed to take advantage of distincly quantum phenomena in carrying out a computational task. A quantum

More information

Information quantique, calcul quantique :

Information quantique, calcul quantique : Séminaire LARIS, 8 juillet 2014. Information quantique, calcul quantique : des rudiments à la recherche (en 45min!). François Chapeau-Blondeau LARIS, Université d Angers, France. 1/25 Motivations pour

More information

Quantum Computation with Neutral Atoms

Quantum Computation with Neutral Atoms Quantum Computation with Neutral Atoms Marianna Safronova Department of Physics and Astronomy Why quantum information? Information is physical! Any processing of information is always performed by physical

More information

Quantum Computation and Communication

Quantum Computation and Communication Tom Lake tswsl1989@sucs.org 16/02/2012 quan tum me chan ics: The branch of mechanics that deals with the mathematical description of the motion and interaction of subatomic particles - OED quan tum me

More information

Differential Phase Shift Quantum Key Distribution and Beyond

Differential Phase Shift Quantum Key Distribution and Beyond Differential Phase Shift Quantum Key Distribution and Beyond Yoshihisa Yamamoto E. L. Ginzton Laboratory, Stanford University National Institute of Informatics (Tokyo, Japan) DPS-QKD system Protocol System

More information

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding. CS 94- Bell States Bell Inequalities 9//04 Fall 004 Lecture Hilbert Space Entanglement Quantum Gates Bell States Superdense Coding 1 One qubit: Recall that the state of a single qubit can be written as

More information

Quantum Computer Architecture

Quantum Computer Architecture Quantum Computer Architecture Scalable and Reliable Quantum Computers Greg Byrd (ECE) CSC 801 - Feb 13, 2018 Overview 1 Sources 2 Key Concepts Quantum Computer 3 Outline 4 Ion Trap Operation The ion can

More information

Quantum Entanglement Assisted Key Distribution

Quantum Entanglement Assisted Key Distribution Quantum Entanglement Assisted Key Distribution Ke Tang *, Ping Ji *+, Xiaowen Zhang * Graduate Center, City University of New York, ke.tang@qc.cuny.edu + John Jay College of Criminal Justice, City University

More information

arxiv:quant-ph/ v5 6 Apr 2005

arxiv:quant-ph/ v5 6 Apr 2005 Nonunitary quantum circuit Hiroaki Terashima 1, and Masahito Ueda 1, arxiv:quant-ph/3461v5 6 Apr 5 1 Department of Physics, Tokyo Institute of Technology, Tokyo 15-8551, Japan CREST, Japan Science and

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

Fidelity of Quantum Teleportation through Noisy Channels

Fidelity of Quantum Teleportation through Noisy Channels Fidelity of Quantum Teleportation through Noisy Channels Sangchul Oh, Soonchil Lee, and Hai-woong Lee Department of Physics, Korea Advanced Institute of Science and Technology, Daejon, 305-701, Korea (Dated:

More information

b) (5 points) Give a simple quantum circuit that transforms the state

b) (5 points) Give a simple quantum circuit that transforms the state C/CS/Phy191 Midterm Quiz Solutions October 0, 009 1 (5 points) Short answer questions: a) (5 points) Let f be a function from n bits to 1 bit You have a quantum circuit U f for computing f If you wish

More information

Errata list, Nielsen & Chuang. rrata/errata.html

Errata list, Nielsen & Chuang.  rrata/errata.html Errata list, Nielsen & Chuang http://www.michaelnielsen.org/qcqi/errata/e rrata/errata.html Part II, Nielsen & Chuang Quantum circuits (Ch 4) SK Quantum algorithms (Ch 5 & 6) Göran Johansson Physical realisation

More information

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36 QUANTUM INFORMATION - THE NO-HIDING THEOREM Arun K Pati akpati@iopb.res.in Instititute of Physics, Bhubaneswar-751005, Orissa, INDIA and Th. P. D, BARC, Mumbai-400085, India QUANTUM INFORMATION -THE NO-HIDING

More information

Quantum Computing New Frontiers

Quantum Computing New Frontiers Quantum Computing New Frontiers M. Suhail Zubairy Department of Physics and Institute for Quantum Studies Texas A&M University Quantum Computation Computational power could exceed that of Turing machines

More information

arxiv:quant-ph/ v1 6 Dec 2005

arxiv:quant-ph/ v1 6 Dec 2005 Quantum Direct Communication with Authentication Hwayean Lee 1,,4, Jongin Lim 1,, HyungJin Yang,3 arxiv:quant-ph/051051v1 6 Dec 005 Center for Information Security TechnologiesCIST) 1, Graduate School

More information

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. ) Quantum Computing 101 ( Everything you wanted to know about quantum computers but were afraid to ask. ) Copyright Chris Lomont, 2004 2 67 1 = 193707721 761838257287 Took American Mathematician Frank Nelson

More information