Quantum Information Science. Jaewan Kim School of Computational Sciences Korea Institute for Advanced Study Seoul, Korea
|
|
- Chloe Bennett
- 6 years ago
- Views:
Transcription
1 Quantum Information Science Jaewan Kim School of Computational Sciences Korea Institute for Advanced Study Seoul, Korea
2 Quantum Physics Information Science Quantum Information Science Quantum Parallelism Quantum computing is exponentially larger and faster than digital computing. Quantum Fourier Transform, Quantum Database Search, Quantum Many-Body Simulation (Nanotechnology) No Clonability of Quantum Information, Irrevesability of Quantum Measurement Quantum Cryptography (Absolutely secure digital communication) Quantum Correlation by Quantum Entanglement Quantum Teleportation, Quantum Superdense Coding, Quantum Cryptography, Quantum Imaging
3 Quantum Information Processing Quantum Computer Quantum Algorithms: Softwares Simulation of quantum many-body systems Factoring large integers Database search Experiments: Hardwares Ion Traps NMR Cavity QED, etc. NT IT BT
4 Quantum Information Processing Quantum Communication Quantum Cryptography Absolutely secure digital communication Generation and Distribution of Quantum Key optical fiber wireless secure satellite communication Quantum Teleportation Photons Atoms, Molecules Quantum Imaging and Quantum Metrology IT
5 Bit and Logic Gate NOT A N D OR XOR NAND C-NOT CCN ( Toffoli ) C-Exch ( Fredkin ) Universal Reversible Universal Reversible
6 Classical Computation Hilbert (1900): 23 most challenging math problems Is there a mechanical procedure by which the truth or falsity of any mathematical conjecture could be decided? T u r i n g Conjecture ~ Sequence of 0 s and 1 s Read/Write Head: Logic Gates Model of Modern Computers
7 Turing Machine Finite State Machine: Head q q q = s = d = f( q, s) g( q, s) d( q, s) d Bit {0,1} s s' Infinitely long tape: Storage
8 Quantum Information {0,1} Bit Qubit N bits 2 N states, One at a time Linearly parallel computing AT BEST N qubits Linear superposition of 2 N states at the same time Exponentially parallel computing Quantum Parallelism But when you extract result, you cannot get all of them. a 0 + b1 with a + b = 1 Deutsch 2 2
9 Quantum Algorithms 1. [Feynman] Simulation of Quantum Physical Systems with HUGE Hilber space ( 2 N -D ) e.g. Strongly Correlated Electron Systems 2. [Peter Shor] Factoring large integers, period finding t q Pol (N) t cl Exp (N 1/3 ) 3. [Grover] Searching t q N t cl ~ N/2
10 N bits N bits Digital Computer Digital Computers in parallel m{ 1 N m N N bits N bits Quantum Computer : Quantum Parallelism N bits N bits
11 ? No Male F No Female
12 ? No Male F No Young O No Female M
13
14
15 M Y F Female / Male vs. Young / Old O F No Young No Male No Female
16 Y F O M F No Young O No Male M F Y O No Female F O M
17
18 양자암호통신
19
20
21
22
23 ψ ψ Simplest form of quantum uncertainty principle
24 1 0 = H 0 = D Bloch sphere z 1 0 = 0 θ 0 1 = 0 ϕ y H = 2 1 x = 1 Pure states on the surface of a Bloch sphere
25 Quantum Gates Time-dependent Schrödinger Eq. i ψ = H ψ t iht / ψ( t) = e ψ(0) = U( t) ψ(0) P ( ) = i 0 I θ θ e 0 1 X = = i Z =P( π )= Y = XZ= or ixz = i H = Hadamard H 0 = = = ( ) H 1 = = = ( 0 1 ) Unitary Transform Norm Preserving Reversible
26 Hadamard Gate H1 H2... HN N = N = ( 0 ) N N N N 2 N = k( binary expression) N 2 k = 0 ( 0 1 ) ( 0 1 )... ( 0 1 ) N
27 Universal Quantum Gates General Rotation of a Single Qubit θ iφ θ cos ie sin 2 2 V( θφ, ) = + iφ θ θ ie sin cos 2 2 X c : CNOT (controlled - NOT) or XOR = 0 0 I X V X a b = a a b c
28 Scalable Qubits Initial State Quantum Network DiVincenzo, Qu-Ph/ Unitary evolution : Deterministic : Reversible Universal Gates Ψ H t X X 1 H 2C X 13 Ψ M M M Cohere, Not Decohere Quantum measurement : Probabilistic : Irreversible change
29 Quantum Key Distribution [BB84,B92] Single-Qubit Gates ~ 3 QKD[E91] Quantum Repeater Quantum Teleportation Quantum Error Correction Quantum Computer Single- & Two-Qubit Gates Single- & Two-Qubit Gates ~ 3
30 Physical systems actively considered for quantum computer implementation Liquid-state NMR NMR spin lattices I o n - t ra p Neutral-atom optical lattices Cavity QED + atoms Linear optics with single photons Nitrogen vacancies in diamond Electrons on liquid He Josephson junctions charge qubits flux qubits Spin spectroscopies, impurities in semiconductors Coupled quantum dots Qubits: spin,charge, excitons Exchange coupled, cavity coupled
31 Chuang Nature 414, (20/27 Dec 2001) OR QP/
32 Quantum-dot array proposal
33 Ion Traps Couple lowest centre-of-mass modes to internal electronic states of N ions.
34 Quantum Error Correcting Code Three Bit Code Encode Recover Decode φ 0 0 channel noise 0 0 M M U m 1m2 φ
35 Cryptography and QIP Giving disease (Q Comp), Giving medicine (QKD). Public Key Cryptosystem (Asymmetric) Computationally Secure Based on unproven mathematical conjectures Cursed by Quantum Computation One-Time Pad (Symmetric) Unconditionally Secure Impractical Saved by Quantum Cryptography
36
37 Quantum Key Distribution is a major paradigm shift in the development of cryptography. Conventional and quantum cryptography are a powerful combination in making a secure communications a reality. -Burt Kaliski, Chief Scientist, RSA Laboratories
38 [Symmetric] One-Time pad Alice Bob Tell me the password. Pass word + key = Eve key = pass word
39 [Symmetric] One-Time Pad Alice M = K = E = Vernam Bob E = K = M = Unconditionally Secure Impractical: Generation and Distribution (random) (random)
40 KEY Cypher T e x t Encoding M K: 0 0=0, 0 1=1, 1 0=1, 1 1= KEY
41 [Symmetric] Why is it called One-Time? E1 = M1 K E2 = M2 K E1 E2 = ( M1 K ) ( M2 K ) = M1 M2 ( K K ) = M1 M2 ( 0 ) = M1 M2
42 [Asymmetric] Public Key Cryptosystem Diffie, Hellman RSA : Rivest, Shamir, Adleman Alice1, Alice2, Message [m] Encryption Encryption Key [k] Computationally Secure Eve Cryptogram [c] Bob Message [m] Decryption Decryption Key [d=f(k)] Could be broken, especially by Quantum Computers
43 [Asymmetric] RSA Cryptosystem Message M n = p q, e d = 1 mod (p-1)(q-1) n, e : Public Key (Encryption) n, d : Secret Key (Decryption) Alice : E = M e mod n Bob : M = E d mod n M Message
44 RSA Example Bob s Keys p = 11, q = 13, n = p q = 143 d = 103, e = 7 d e mod (p-1)(q-1) = 103 x 7 mod 120 = 1 Alice s Message: M = 9 E = M e mod n = 9 7 mod 143 = 48 Bob M=E d mod n = mod 143 = 9
45 How Hard is Factoring? Almost exponentially complex with the number of digits, L RSA129 (1977) Factored 17 years later using 1,600 computers 2,000 Digit Number Impossible to factor even Vazirani With as many digital computers as the number of particles in the Universe (10 80 ) In as long time as the age of the universe (10 18 sec)
46
47 No Cloning Theorem An Unknown Quantum State Cannot Be Cloned. <Proof> U ( α 0 ) ( 0 ) = α α Zurek, Wootters Diks U β = β β α β 1 Let γ = ( α + β ). 2 1 Then U ( γ 0 ) = ( α α + β β ) γ γ 2
48 Controlled-NOT XOR X X = 0 0 I X AB AA B AA B = = AB AB = A B A B AB
49 Qubit Copying Circuit? x x x x 0 y x y x ψ = a 0 + b 1 0 ψ = a 0 + b 1 a 00 + b 11 ψ = a 0 + b 1
50 IF an unknow quantum state CAN be cloned Quantum States can be measured as accurately as possible??? ψ ψ, ψ, ψ, ψ measure, measure, Communication Faster Than Light? ψ = 1 A 0 B - 0 A 1 B for 0 = + A - B - - A + B for 1
51 Communication Faster Than Light when unknown quantum state can be copied. Alice wants to send Bob 1. Alice mesures her qubit in { +>, ->}. Alice s state will become +> or ->. Bob s state will become -> or +>. Let s assume it is +>. Bob makes many copies of this. He measures them in { +>, ->}, and gets 100% +>. He measures them in { 0>, 1>}, and gets 50% 0> and 50% 1>. Thus Bob can conclude that Alice measured her state in { +>, ->}.
52 Mysterious Connection Between QM & Relativity Weinberg: Can QM be nonlinear? Experiments: Not so positive result. Polchinski, Gisin: If QM is nonlinear, communication faster than light is possible.
53 Irreversability of Quantum Measurement If you describe it as that, that is not it anymore - 老子 - ψ = a 0 + b 1 = c 0' + d 1' Measure in { 0, 1 } 0 or 1 Measure in { 0', 1' } 0' or 1'
54 Quantum Cryptography Quantum Key Distribution BB84, B92, E91 No Cloning & Irreversability of Quantum Measurement Alice EVE (eavesdropper) Single Photon, Ent., Coh. Bob 1. Interconvertibility between stationary and flying qubits. 2. Faithful transmission of flying qubits. DiVincenzo, Qu-Ph/
55 BB84: 4 Polarizations 0 o,90 o 0 o,45 o 0 o,45 o D1 PC1 PC2 Laser PC3 P B S A1 A2 B Alice A1 = A2 = P = Bob B = D = D0
56 BB84 full implementation Authenticated Public Discussion Mesurement in random basis Y e s Same basis? No Null result or different basis Discard Transmission of raw data: Random coding on single photons Initial Authentication NEEDED Check random sample Error < Q% Y e s Reconciliation of bit strings Parity check n bits Secret key s bits No Stop Estimate information leakage k bits Privacy Amplification Keep the parities
57 World s first QKD (1989): Bennett(IBM) et al. 32 cm in free space with 4 polarizations
58 KIAS-ETRI, December km Quantum Cryptography
59
60
61
62 Deutsch Algorithm Global property of f
63 Quantum Fourier Transform ~n 2 =(log 2 N) 2 vs N log 2 N ***can be used only as a subroutine, used for factoring
64 Molding a Quantum State Ψ H t X X 1 H 2C X 13 Ψ M M M Molding
65 Sculpturing a Quantum State - Cluster State Quantum Computing Initialize each qubit in + state. 2. Contolled-Phase between the neighboring qubits. 3. Single qubit manipulations and single qubit measurements only [Sculpturing]. No two qubit operations!
66 Entanglement EPR & Nonlocality Alice Bob 1 2 ( ) ψ A B A B A B φ Local Hidden Variable Bell s Inequality Aspect s Experiment Quantum Mechanics is nonlocal! 1 GHZ State: ( + ) A B C A B C
67 Bell s inequality, CHSH inequality (Classical) Violation of inequality (Quantum)
68 Alice x Entanglement Quantum correlation Bob y Classical physics: x and y are decided when picked up. 0 1 or 1 0 A B A B Quantum physics: x and y are decided when measured. {0,1} basis 0 or 1 1 {+,-} basis + or - Ψ = ( A B A B) 2 1 = ( + + A B A B) = 0 + 1, = ( ) ( )
69 Entanglement and Two-Qubit Gate a 0 + b 1 0 a 0 + b a b 1 1 a b 1 1 1
70 Classical Teleportation? Alice X a m m 1 bit Bob b m 1 X 1 bit Correlated P a i r X = 0 or 1 1 bit a 1 bit {0,1} b 1 bit x a m b = x 1 1 = x 1
71 Quantum Teleportation Transportation Continuous movement through space P P Quantum Teleportation B 1, B 2 X A BX
72 Quantum Teleportation Transmit an unknown qubit Alice Bell State Measurement Φ ±, Ψ ± without sending the qubit 2 Bits Classical Information Entangled Pair unknown Ω = α 0 + β 1 Bob Unitary Transform I, Z, X, Y Bennett et al. Ω = α 0 + β 1 E P R - S o u r c e
73
74
75
76 θ = ο X A B
77 θ = ο X A B
78 θ = ο X A B
79 θ = ο Bell Measurement 0 Leave it as it is. X A B
80 θ = ο Bell Measurement 1 Rotate it by -90 o. X A B
81 θ = ο X A B
82 Single Particle Entanglement 1 Single Photon Single Electron ( + + H = t c1 c2 + c2c1 ) 2 Beam Splitter 2 1 ψ = ( ) 2 1 or ψ = f e + e f 2 ( ) φ = + 2 ( )
83 Quantum Teleportation using Single Particle Entanglement Lee, JK, Qu-ph/ ; Phys. Rev. A 63, (2001)
84 PRL88, (2002) or QP/ "Active" Teleportation of a Quantum Bit S. Giacomini, F. Sciarrino, E. Lombardi and F. De Martini
85 Quantum Teleportation of Single Particle Entanglement Lee, Qu-ph/ ; Phys. Rev. A 64, (2001)
86 Quantum Superdense Coding Transmit two bits by sending one qubit Alice I, X, Y, Z 1 qubit Entanglement Bob X H AB A 2 bit A B EPR
87 Quantum Superdense Coding I 0 0 A: = (0 + 1) 0 X : A = (1 + 0) : : A B A B XAB HA YA : = (1 0)1 11 Z A: = (0 1) Alice s manipulation Alice sends the qubit to Bob 1 qubit Bob s manipulation 4 states differentiated 2 bit
88 Tripartite Qubit Entanglement Z-basis: 0 with 1, 1 with + 1 X-basis: a with 1, b 0 1 with a + b, 1 a b Y-basis: c 0 + i 1 with 1, d 0 i 1 with + 1 ( ) 0 c + d, 1 i c b Not expectation values A GHZ 1 = { } : Z-basis 2 ( a + b)( a + b)( a + b) + ( a b)( a b)( a b) aaa + abb + bab + bba : xxx = 1 B C xxx xyy yxy yyx = ( a + b)( c + d)( c + d) ( a b)( c d)( c d) acd + adc + bcc + bdd : xyy =+ 1 = 1 =+ 1 = ( ) ( ) ( ) = A B C x y x y x y 1?
89 Bipartite Qubit Entanglement Not expectation values counterfactual argument Ψ = a 00 + b 01 + c 10 + d 11 with a + b + c = = 0 00 Ψ = 0 = a b Ψ = 0= a c p = 00 Ψ = a A 0 0 B 0 0 = A B Maximize p! p p A B B A A B A B A = pa = pb p = = p + p p = p + p p = p A A B 1 2 A A B 0 B papb(1 pa)(1 pb) 1 p p 1± pa = pb = 1, pa = pb = = g: golden mean p = g 9 % A B
90
91
92 Zurek, QP/
93 j 1 = 3 + R 4 2 ( ) ìé ï 1 1 ù 3 ïê 2 2 rlr = j j = í ï ê 4 ïê ï 1 1 ïë ïî ê 2 2 ú û R R 4 4 R
94 Parametric Down Conversion : Splitting a photon into two w w 2 w w 2
95 j 1 = r = j j LR ( ) L R L R w 3 L R 4 L 4 R C K Hong and T Noh (1998) Y-H Kim and Y Shi (2000)
96 Delayed Choice Quantum Erasure REVISITED Kim et al., PRL84, 1(2000); C.K.Hong and T.G.Noh, JOSA B15, 1192(1998)
97 j 1 = ( ) L R L R 1 ì æ ö æ ö üïì + ï ü U U ï L L L i 3 L L L r i 4 ïïhc.. ï LR = L j j L = í ýí ý 2 ç 2 2 è rlr = 2 ø R j j çè R ø ïï ïîï ïî ïþ ïþ D 3 2 BSA D R L D 0 D 2 BS 4 4 L 4 R D 4 U L BSB 1 é 1 i 1 i ù i 1 i = 0 i i êë 2 2úû
98 + r = 1 U j j U 1 RD1 L L L L 1 = { 3 i 4 }{ 3 i 4 } ìé ï 1 i ù 3 ïê 8 8 = ï í ê 4 ï ïê - i 1 ïë ïî ê 8 8 ú û R R R R 3 4 D 3 2 BSA D R L D 0 D 2 BS 4 4 L 4 R D 4 BSB 1 + r = 2 U j j U 2 RD2 L L L L 1 = { i 3 4 }{ i 3 4 } ìé ï 1 i ù 3 ïê = ï í ê 4 ïê ï i 1 ïë ïî ê 8 8 û ú R R R R 3 4
99 D 3 2 BSA D R L D 0 D 2 BS 4 4 L 4 R D 4 BSB 1 é 1 i ù é1 i ù é1 0 ù = + = ( 1 2) i 1 i ê- ë 8 8úû êë 8 8 úû êë 4úû r R D +D
100 1 é1 0ù r = 3 U U + 3 = 3 3 = 4 3 L j j RD L L L R R 4 êë 0 0úû D 3 2 BSA D R L D 0 D 2 BS 4 4 L 4 R D 4 BSB 1 1 é0 0 ù r = 4 U U + 4 = 4 4 = 4 L j j RD L L L R R êë 4úû
101 Environment Decoherence D 3 BSA 2 3 D 2 D 1 D 0 3 L j 1 = r = j j LR 3 R ( ) L R L R BS 4 L 4 4 R D 4 BSB é1 0ù r { } R = trl rlr = + = R R R R 2 2 ê ë0 1 ú û é1 0 ù é1 0 0 ù 4 é ù é ù 4 2 = + + ( ) = ê 0 0ú ê 0 1 ê 4ú ë û ë 4ú ë û û êë 2úû r R D +D +D +D
102 Entanglement and Decoherence A Zurek B or Environment When system A is entangled with environment, state of A cannot be described by a state vector, but by a density matrix. Ψ AB = a 0 A 0 B + b 1 A 1 B = ψ A φ B ρ A = T r B ρ AB = T r B Ψ AB AB Ψ = a 2 0 = ψ A A ψ 0 b 2 ba* ab*
103 Quantum Repeater 1. Quantum Repeater ~100 km Indefinite distance Briegel, Durr, Cirac, and Zoller, quant-ph/ Transmission: Photon Storage, Processing: Atomic Physics, etc. 2. Multiuser Quantum Network 1:1 multiusers & Entanglement Purification Phoenix, Barnett, Townsend, and Blow, JMO 42, 1155 (1995) Biham, Huttner, and Mor, Phys. Rev. A 54, 2651 (1996)
104 Optical Imaging by Two-Photon Entanglement Shih et al., PRA52, R3429 (1995).
105 yes no no yes
106
107 Quantum Lithography
108
109
110
111
112 Quantum Interferometric Optical Lithography: Exploiting Entanglement to Beat the Diffraction Limit Agedi N. Boto,1 Pieter Kok,2 Daniel S. Abrams,1 Samuel L. Braunstein,2 Colin P. Williams,1 and Jonathan P. Dowling1,* PRL85, 2733 (2000) Two-Photon Diffraction and Quantum Lithography Milena D Angelo, Maria V. Chekhova,* and Yanhua Shih PRL87, (2001)
113 Quantum Metrology We are applying our understanding of the quantum nature of entangled-photon pairs for the characterization of optical-detector quantum efficiency, source radiation density, and photonic-material characteristics, all without the necessity of employing a reference. The use of this unique light source provides particular advantages over the classical counterparts that are traditionally used. A n o t h e r e x a m p l e i s p r o v i d e d b y a t e c h n i q u e w e c a l l quantum ellipsometry. The high accuracy required in traditional ellipsometric measurements necessitates the absolute calibration of both the source and the detector. These requirements can be circumvented by using spontaneous parametric down-conversion in conjunction with a novel polarization interferometer and coincidencecounting detection scheme. Entangled-photon ellipsometry A. F. Abouraddy, K. C. Toussaint, Jr., A. V. Sergienko, B. E. A. Saleh, and M. C. Teich J. O p t. S o c. A m. B. 19, (2002). [PDF] Ellipsometric measurements by use of photon pairs generated by spontaneous parametric downconversion Ayman F. Abouraddy, Kimani C. Toussaint, Jr., Alexander V. Sergienko, Bahaa E. A. Saleh, and Malvin C. Teich Opt. Lett. 26, (2001). [PDF]
114 Quantum Physics Information Science Quantum Information Science Quantum Parallelism Quantum computing is exponentially larger and faster than digital computing. Quantum Fourier Transform, Quantum Database Search, Quantum Many-Body Simulation (Nanotechnology) No Clonability of Quantum Information, Irrevesability of Quantum Measurement Quantum Cryptography (Absolutely secure digital communication) Quantum Correlation by Quantum Entanglement Quantum Teleportation, Quantum Superdense Coding, Quantum Cryptography, Quantum Imaging
Quantum Computer. Jaewan Kim School of Computational Sciences Korea Institute for Advanced Study
Quantum Computer Jaewan Kim jaewan@kias.re.kr School of Computational Sciences Korea Institute for Advanced Study KIAS (Korea Institute for Advanced Study) Established in 1996 Located in Seoul, Korea Pure
More informationQuantum Entanglement and Decoherence
Quantum Entanglement an Decoherence Jaewan Kim (jaewan@kias.re.kr) KIAS I think of my lifetime in physics as ivie into three perios. In the first perio I was in the grip of the iea that Everything is Particles,
More information*WILEY- Quantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co.
Joachim Stolze and Dieter Suter Quantum Computing A Short Course from Theory to Experiment Second, Updated and Enlarged Edition *WILEY- VCH WILEY-VCH Verlag GmbH & Co. KGaA Contents Preface XIII 1 Introduction
More informationQuantum Information Transfer and Processing Miloslav Dušek
Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the
More information1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation
QSIT09.V01 Page 1 1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation What is quantum mechanics good for? traditional historical perspective: beginning of 20th century: classical
More informationquantum mechanics is a hugely successful theory... QSIT08.V01 Page 1
1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation What is quantum mechanics good for? traditional historical perspective: beginning of 20th century: classical physics fails
More informationPhysics is becoming too difficult for physicists. David Hilbert (mathematician)
Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving
More informationQuantum Computers. Todd A. Brun Communication Sciences Institute USC
Quantum Computers Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose components are individual
More informationQuantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co. KGaA
Joachim Stolze and Dieter Suter Quantum Computing A Short Course from Theory to Experiment Second, Updated and Enlarged Edition WILEY- VCH WILEY-VCH Verlag GmbH & Co. KGaA Preface XIII 1 Introduction and
More informationSecrets of Quantum Information Science
Secrets of Quantum Information Science Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose
More informationEPR paradox, Bell inequality, etc.
EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project
More informationQuantum Information Processing and Diagrams of States
Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University
More informationLogic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation
Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate
More informationEntanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen
Entanglement arnoldzwicky.org Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen PHYS403, July 26, 2017 Entanglement A quantum object can
More informationQuantum Cryptography. Marshall Roth March 9, 2007
Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and
More informationTransmitting and Hiding Quantum Information
2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents
More informationTutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction
Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states
More informationAn Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009
An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer
More informationQuantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles
Quantum Computation 650 Spring 2009 Lectures 1-21 The World of Quantum Information Marianna Safronova Department of Physics and Astronomy February 10, 2009 Outline Quantum Information: fundamental principles
More information10 - February, 2010 Jordan Myronuk
10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States
More informationChapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution
Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation
More informationSecurity Implications of Quantum Technologies
Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu
More informationChallenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley
Challenges in Quantum Information Science Umesh V. Vazirani U. C. Berkeley 1 st quantum revolution - Understanding physical world: periodic table, chemical reactions electronic wavefunctions underlying
More informationQuantum Cryptography and Security of Information Systems
Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty
More informationQuantum Computation: From Quantum Teleportation to the Shor s Algorithm
Quantum Computation: From Quantum Teleportation to the Shor s Algorithm J. J. Ruiz-Lorenzo Dep. Física, Universidad de Extremadura Instituto de Computación Científica Avanzada de Extremadura (ICCAEx) http://www.eweb.unex.es/eweb/fisteor/juan
More informationSeminar 1. Introduction to Quantum Computing
Seminar 1 Introduction to Quantum Computing Before going in I am also a beginner in this field If you are interested, you can search more using: Quantum Computing since Democritus (Scott Aaronson) Quantum
More informationProblem Set: TT Quantum Information
Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C
More informationAn Introduction to Quantum Information and Applications
An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded
More informationIBM quantum experience: Experimental implementations, scope, and limitations
IBM quantum experience: Experimental implementations, scope, and limitations Plan of the talk IBM Quantum Experience Introduction IBM GUI Building blocks for IBM quantum computing Implementations of various
More informationThe information content of a quantum
The information content of a quantum A few words about quantum computing Bell-state measurement Quantum dense coding Teleportation (polarisation states) Quantum error correction Teleportation (continuous
More informationSemiconductors: Applications in spintronics and quantum computation. Tatiana G. Rappoport Advanced Summer School Cinvestav 2005
Semiconductors: Applications in spintronics and quantum computation Advanced Summer School 1 I. Background II. Spintronics Spin generation (magnetic semiconductors) Spin detection III. Spintronics - electron
More informationEntanglement and Quantum Teleportation
Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,
More information2.0 Basic Elements of a Quantum Information Processor. 2.1 Classical information processing The carrier of information
QSIT09.L03 Page 1 2.0 Basic Elements of a Quantum Information Processor 2.1 Classical information processing 2.1.1 The carrier of information - binary representation of information as bits (Binary digits).
More informationIntroduction to Quantum Computation
Chapter 1 Introduction to Quantum Computation 1.1 Motivations The main task in this course is to discuss application of quantum mechanics to information processing (or computation). Why? Education:Asingleq-bitisthesmallestpossiblequantummechanical
More informationexample: e.g. electron spin in a field: on the Bloch sphere: this is a rotation around the equator with Larmor precession frequency ω
Dynamics of a Quantum System: QM postulate: The time evolution of a state ψ> of a closed quantum system is described by the Schrödinger equation where H is the hermitian operator known as the Hamiltonian
More informationQuantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139
Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense
More informationQuantum Cryptographic Network based on Quantum Memories. Abstract
Quantum Cryptographic Network based on Quantum Memories Eli Biham Computer Science Department Technion Haifa 32000, Israel Bruno Huttner Group of Applied Physics University of Geneva CH-2, Geneva 4, Switzerland
More informationA central problem in cryptography: the key distribution problem.
Scientific American 314, 48-55 (2016) A central problem in cryptography: the key distribution problem. Mathematics solution: public key cryptography. Public-key cryptography relies on the computational
More informationPing Pong Protocol & Auto-compensation
Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol
More informationHacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security
Hacking Quantum Cryptography Marina von Steinkirch ~ Yelp Security Agenda 1. Quantum Mechanics in 10 mins 2. Quantum Computing in 11 mins 3. Quantum Key Exchange in 100 mins (or more minutes) Some disclaimers
More informationLECTURE NOTES ON Quantum Cryptography
Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationQuantum key distribution with 2-bit quantum codes
Quantum key distribution with -bit quantum codes Xiang-Bin Wang Imai Quantum Computation and Information project, ERATO, Japan Sci. and Tech. Corp. Daini Hongo White Bldg. 0, 5-8-3, Hongo, Bunkyo, Tokyo
More informationQuantum computing! quantum gates! Fisica dell Energia!
Quantum computing! quantum gates! Fisica dell Energia! What is Quantum Computing?! Calculation based on the laws of Quantum Mechanics.! Uses Quantum Mechanical Phenomena to perform operations on data.!
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Part I Emma Strubell http://cs.umaine.edu/~ema/quantum_tutorial.pdf April 12, 2011 Overview Outline What is quantum computing? Background Caveats Fundamental differences
More informationQuantum Information Processing
Quantum Information Processing Jonathan Jones http://nmr.physics.ox.ac.uk/teaching The Information Age Communication Shannon Computation Turing Current approaches are essentially classical which is wrong
More informationphys4.20 Page 1 - the ac Josephson effect relates the voltage V across a Junction to the temporal change of the phase difference
Josephson Effect - the Josephson effect describes tunneling of Cooper pairs through a barrier - a Josephson junction is a contact between two superconductors separated from each other by a thin (< 2 nm)
More informationQuantum key distribution for the lazy and careless
Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center
More informationQuantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII
Quantum cryptography Part XIII Quantum cryptography Quantum cryptography has a potential to be cryptography of st century. An important new feature of quantum cryptography is that security of quantum cryptographic
More informationIntroduction to Quantum Key Distribution
Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is
More informationarxiv:quant-ph/ v1 13 Mar 2007
Quantum Key Distribution with Classical Bob Michel Boyer 1, Dan Kenigsberg 2 and Tal Mor 2 1. Département IRO, Université de Montréal Montréal (Québec) H3C 3J7 CANADA 2. Computer Science Department, Technion,
More informationIntroduction to Quantum Computing for Folks
Introduction to Quantum Computing for Folks Joint Advanced Student School 2009 Ing. Javier Enciso encisomo@in.tum.de Technische Universität München April 2, 2009 Table of Contents 1 Introduction 2 Quantum
More informationQuantum Gates, Circuits & Teleportation
Chapter 3 Quantum Gates, Circuits & Teleportation Unitary Operators The third postulate of quantum physics states that the evolution of a quantum system is necessarily unitary. Geometrically, a unitary
More informationPhysics ; CS 4812 Problem Set 4
Physics 4481-7681; CS 4812 Problem Set 4 Six problems (six pages), all short, covers lectures 11 15, due in class 25 Oct 2018 Problem 1: 1-qubit state tomography Consider a 1-qubit state ψ cos θ 2 0 +
More informationQuantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security
Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD
More informationA Superluminal communication solution based on Four-photon entanglement
A Superluminal communication solution based on Four-photon entanglement Jia-Run Deng cmos001@163.com Abstract : Based on the improved design of Four-photon entanglement device and the definition of Encoding
More information1 1D Schrödinger equation: Particle in an infinite box
1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider
More information1 1D Schrödinger equation: Particle in an infinite box
1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =
More informationTowards Scalable Linear-Optical Quantum Computers
Quantum Information Processing, Vol. 3, Nos. 1 5, October 2004 ( 2004) Towards Scalable Linear-Optical Quantum Computers J. P. Dowling, 1,5 J. D. Franson, 2 H. Lee, 1,4 and G. J. Milburn 3 Received February
More informationProbabilistic exact cloning and probabilistic no-signalling. Abstract
Probabilistic exact cloning and probabilistic no-signalling Arun Kumar Pati Quantum Optics and Information Group, SEECS, Dean Street, University of Wales, Bangor LL 57 IUT, UK (August 5, 999) Abstract
More informationEntanglement and information
Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit
More informationQuantum Cryptography
Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145
More informationQuantum Information Processing with Trapped Ions. Experimental implementation of quantum information processing with trapped ions
Quantum Information Processing with Trapped Ions Overview: Experimental implementation of quantum information processing with trapped ions 1. Implementation concepts of QIP with trapped ions 2. Quantum
More informationAn Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata
An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of
More informationSingle-photon quantum error rejection and correction with linear optics
Single-photon quantum error rejection and correction with linear optics Demetrios Kalamidas Institute for ltrafast Spectroscopy and Lasers, City College of the City niversity of New York, 138 Street &
More informationPreparing multi-partite entanglement of photons and matter qubits
Preparing multi-partite entanglement of photons and matter qubits Pieter Kok, Sean D. Barrett, Timothy P. Spiller Trusted Systems Laboratory HP Laboratories Bristol HPL-2005-199 November 23, 2005* state
More informationQuantum Computing. Thorsten Altenkirch
Quantum Computing Thorsten Altenkirch Is Computation universal? Alonzo Church - calculus Alan Turing Turing machines computable functions The Church-Turing thesis All computational formalisms define the
More informationReversible and Quantum computing. Fisica dell Energia - a.a. 2015/2016
Reversible and Quantum computing Fisica dell Energia - a.a. 2015/2016 Reversible computing A process is said to be logically reversible if the transition function that maps old computational states to
More informationSchemes to generate entangled photon pairs via spontaneous parametric down conversion
Schemes to generate entangled photon pairs via spontaneous parametric down conversion Atsushi Yabushita Department of Electrophysics National Chiao-Tung University? Outline Introduction Optical parametric
More informationIntroduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan
Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography D. J. Guan Abstract The development of quantum algorithms and quantum information theory, as well as the design
More information5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes
5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.
More informationOptical Quantum Imaging, Computing, and Metrology: WHAT S NEW WITH N00N STATES? Jonathan P. Dowling
Optical Quantum Imaging, Computing, and Metrology: WHAT S NEW WITH N00N STATES? Jonathan P. Dowling Hearne Institute for Theoretical Physics Louisiana State University Baton Rouge, Louisiana quantum.phys.lsu.edu
More informationQUANTUM CRYPTOGRAPHY QUANTUM COMPUTING. Philippe Grangier, Institut d'optique, Orsay. from basic principles to practical realizations.
QUANTUM CRYPTOGRAPHY QUANTUM COMPUTING Philippe Grangier, Institut d'optique, Orsay 1. Quantum cryptography : from basic principles to practical realizations. 2. Quantum computing : a conceptual revolution
More informationThe Three Upcoming Revolutions in Physics and Astronomy that will Affect Everyone. Quantum Information Nov. 12, 2002
The Three Upcoming Revolutions in Physics and Astronomy that will Affect Everyone Quantum Information Nov. 12, 2002 The History of Secrecy Enemy of the State You re being watched Big Brother You are captured
More informationIBM Systems for Cognitive Solutions
IBM Q Quantum Computing IBM Systems for Cognitive Solutions Ehningen 12 th of July 2017 Albert Frisch, PhD - albert.frisch@de.ibm.com 2017 IBM 1 st wave of Quantum Revolution lasers atomic clocks GPS sensors
More informationQuantum Communication. Serge Massar Université Libre de Bruxelles
Quantum Communication Serge Massar Université Libre de Bruxelles Plan Why Quantum Communication? Prepare and Measure schemes QKD Using Entanglement Teleportation Communication Complexity And now what?
More informationDetection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations
Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum
More informationCorrecting noise in optical fibers via dynamic decoupling
Introduction CPMG Our results Conclusions Correcting noise in optical fibers via dynamic decoupling Bhaskar Bardhan 1, Petr Anisimov 1, Manish Gupta 1, Katherine Brown 1, N. Cody Jones 2, Hwang Lee 1,
More informationQuantum Teleportation Pt. 1
Quantum Teleportation Pt. 1 PHYS 500 - Southern Illinois University April 17, 2018 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 1 April 17, 2018 1 / 13 Types of Communication In the
More informationQuantum non-demolition measurements:
Quantum non-demolition measurements: One path to truly scalable quantum computation Kae Nemoto Tim Spiller Sean Barrett Ray Beausoleil Pieter Kok Bill Munro HP Labs (Bristol) Why should optical quantum
More informationSecurity and implementation of differential phase shift quantum key distribution systems
Security and implementation of differential phase shift quantum key distribution systems Eleni Diamanti University Ph.D. Oral Examination June 1 st, 2006 Classical cryptography cryptography = κρυπτός +
More informationSolid-state quantum communications and quantum computation based on single quantum-dot spin in optical microcavities
CQIQC-V -6 August, 03 Toronto Solid-state quantum communications and quantum computation based on single quantum-dot spin in optical microcavities Chengyong Hu and John G. Rarity Electrical & Electronic
More informationSecurity Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography
Security Issues in Cloud Computing Modern Cryptography II Asymmetric Cryptography Peter Schwabe October 21 and 28, 2011 So far we assumed that Alice and Bob both have some key, which nobody else has. How
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Petros Wallden Lecture 1: Introduction 18th September 2017 School of Informatics, University of Edinburgh Resources 1. Quantum Computation and Quantum Information by Michael
More informationWhat is a quantum computer? Quantum Architecture. Quantum Mechanics. Quantum Superposition. Quantum Entanglement. What is a Quantum Computer (contd.
What is a quantum computer? Quantum Architecture by Murat Birben A quantum computer is a device designed to take advantage of distincly quantum phenomena in carrying out a computational task. A quantum
More informationInformation quantique, calcul quantique :
Séminaire LARIS, 8 juillet 2014. Information quantique, calcul quantique : des rudiments à la recherche (en 45min!). François Chapeau-Blondeau LARIS, Université d Angers, France. 1/25 Motivations pour
More informationQuantum Computation with Neutral Atoms
Quantum Computation with Neutral Atoms Marianna Safronova Department of Physics and Astronomy Why quantum information? Information is physical! Any processing of information is always performed by physical
More informationQuantum Computation and Communication
Tom Lake tswsl1989@sucs.org 16/02/2012 quan tum me chan ics: The branch of mechanics that deals with the mathematical description of the motion and interaction of subatomic particles - OED quan tum me
More informationDifferential Phase Shift Quantum Key Distribution and Beyond
Differential Phase Shift Quantum Key Distribution and Beyond Yoshihisa Yamamoto E. L. Ginzton Laboratory, Stanford University National Institute of Informatics (Tokyo, Japan) DPS-QKD system Protocol System
More informationHilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.
CS 94- Bell States Bell Inequalities 9//04 Fall 004 Lecture Hilbert Space Entanglement Quantum Gates Bell States Superdense Coding 1 One qubit: Recall that the state of a single qubit can be written as
More informationQuantum Computer Architecture
Quantum Computer Architecture Scalable and Reliable Quantum Computers Greg Byrd (ECE) CSC 801 - Feb 13, 2018 Overview 1 Sources 2 Key Concepts Quantum Computer 3 Outline 4 Ion Trap Operation The ion can
More informationQuantum Entanglement Assisted Key Distribution
Quantum Entanglement Assisted Key Distribution Ke Tang *, Ping Ji *+, Xiaowen Zhang * Graduate Center, City University of New York, ke.tang@qc.cuny.edu + John Jay College of Criminal Justice, City University
More informationarxiv:quant-ph/ v5 6 Apr 2005
Nonunitary quantum circuit Hiroaki Terashima 1, and Masahito Ueda 1, arxiv:quant-ph/3461v5 6 Apr 5 1 Department of Physics, Tokyo Institute of Technology, Tokyo 15-8551, Japan CREST, Japan Science and
More informationCryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1
Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption
More informationFidelity of Quantum Teleportation through Noisy Channels
Fidelity of Quantum Teleportation through Noisy Channels Sangchul Oh, Soonchil Lee, and Hai-woong Lee Department of Physics, Korea Advanced Institute of Science and Technology, Daejon, 305-701, Korea (Dated:
More informationb) (5 points) Give a simple quantum circuit that transforms the state
C/CS/Phy191 Midterm Quiz Solutions October 0, 009 1 (5 points) Short answer questions: a) (5 points) Let f be a function from n bits to 1 bit You have a quantum circuit U f for computing f If you wish
More informationErrata list, Nielsen & Chuang. rrata/errata.html
Errata list, Nielsen & Chuang http://www.michaelnielsen.org/qcqi/errata/e rrata/errata.html Part II, Nielsen & Chuang Quantum circuits (Ch 4) SK Quantum algorithms (Ch 5 & 6) Göran Johansson Physical realisation
More informationQUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36
QUANTUM INFORMATION - THE NO-HIDING THEOREM Arun K Pati akpati@iopb.res.in Instititute of Physics, Bhubaneswar-751005, Orissa, INDIA and Th. P. D, BARC, Mumbai-400085, India QUANTUM INFORMATION -THE NO-HIDING
More informationQuantum Computing New Frontiers
Quantum Computing New Frontiers M. Suhail Zubairy Department of Physics and Institute for Quantum Studies Texas A&M University Quantum Computation Computational power could exceed that of Turing machines
More informationarxiv:quant-ph/ v1 6 Dec 2005
Quantum Direct Communication with Authentication Hwayean Lee 1,,4, Jongin Lim 1,, HyungJin Yang,3 arxiv:quant-ph/051051v1 6 Dec 005 Center for Information Security TechnologiesCIST) 1, Graduate School
More informationQuantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )
Quantum Computing 101 ( Everything you wanted to know about quantum computers but were afraid to ask. ) Copyright Chris Lomont, 2004 2 67 1 = 193707721 761838257287 Took American Mathematician Frank Nelson
More information