Private quantum subsystems and error correction

Size: px
Start display at page:

Download "Private quantum subsystems and error correction"

Transcription

1 Private quantum subsystems and error correction Sarah Plosker Department of Mathematics and Computer Science Brandon University September 26, 2014

2 Outline 1 Classical Versus Quantum Setting Classical Setting Quantum Setting 2 Thought Experiments (1930 s) 3 QIT: States and Channels 4 Quantum Cryptography Private Quantum Subsystem Example 5 Connection with Quantum Error Correction Complementarity of Q. Cryptography and QEC From QEC to QCrypto? 6 Conclusion

3 The Setup Alice (Sender) channel Φ Bob (Receiver) Input Message noise Output Message

4 States Definition A bit is a variable that can take as value either 0 or 1. Its realized value is called the state of the system (on/off, up/down, +/, true/false,... ).

5 States Definition A bit is a variable that can take as value either 0 or 1. Its realized value is called the state of the system (on/off, up/down, +/, true/false,... ). Classically: (KABOOM!)

6 States Definition A qubit is a system that is the quantum analogue of a bit. Its state is a two-dimensional complex vector φ = α 0 + β 1, where α and β are probability amplitudes, ( ) meaning ( ) 1 0 α 2 + β 2 = 1, α, β C, and 0 =, 1 =, using Dirac 0 1 (bra-ket) notation.

7 States Definition A qubit is a system that is the quantum analogue of a bit. Its state is a two-dimensional complex vector φ = α 0 + β 1, where α and β are probability amplitudes, ( ) meaning ( ) 1 0 α 2 + β 2 = 1, α, β C, and 0 =, 1 =, using Dirac 0 1 (bra-ket) notation. Thus a quantum system is in a state that, with probability α 2, will be measured as 0, and with probability β 2, will be measured as 1 ; though it is truly a superposition of both of the states.

8 Copenhagen Interpretation Interpretation of quantum mechanics by Bohr and Heisenberg, supported by von Neumann, Pauli. Opposed by Einstein, Schrödinger, Russell. 1 The Uncertainty Principle (also called the Indeterminacy Principle) of Heisenberg: The state of every particle is described by a wavefunction. The act of measurement causes the probabilities of the wavefunction to collapse to the value defined by the measurement. 2 Principle of Complementarity of Bohr: Wave-particle duality: light, electrons,..., in short, all energy (and thus all matter) exhibits both wave-like and particle-like properties.

9 Schrödinger s Cat Thought experiment (1935): A cat is put in a sealed box, along with a small amount of radioactive substance and a flask of poison. If any radioactive decay is detected, the flash of poison is broken and the cat dies. If no radioactive decay is detected, then nothing happens. After a while, the cat is simultaneously dead and alive. Yet, when we look in the box, we see the cat either dead or alive, not both. cat = 1 2 dead alive

10 Schrödinger s Cat (cont.)

11 Schrödinger s Cat (cont.)

12 EPR Paradox Entangled states violate the classical principle of locality the idea that an object is directly influenced only by its immediate surroundings.

13 EPR Paradox Entangled states violate the classical principle of locality the idea that an object is directly influenced only by its immediate surroundings. The easiest way to see evidence of entanglement is to measure one component of an entangled state. This measurement fixes the value of the other component of the state, implying non-local communication between the two parts.

14 EPR Paradox Entangled states violate the classical principle of locality the idea that an object is directly influenced only by its immediate surroundings. The easiest way to see evidence of entanglement is to measure one component of an entangled state. This measurement fixes the value of the other component of the state, implying non-local communication between the two parts. Entanglement can be used as a resource in order to implement quantum teleportation.

15 Example of Entanglement Electron spin, when measured, can be either of two states: spin up or spin down. In the absence of measurement, electron spin is in a superposition of the two states / (even without entanglement).

16 Example of Entanglement Electron spin, when measured, can be either of two states: spin up or spin down. In the absence of measurement, electron spin is in a superposition of the two states / (even without entanglement). Consider an entangled electron pair; suppose the state of one of the electrons is measured as spin up. This measurement fixes the state of the other electron it will be spin down.

17 Example of Entanglement Electron spin, when measured, can be either of two states: spin up or spin down. In the absence of measurement, electron spin is in a superposition of the two states / (even without entanglement). Consider an entangled electron pair; suppose the state of one of the electrons is measured as spin up. This measurement fixes the state of the other electron it will be spin down. In this sense, even when spatially separated, entangled electron pairs behave as a single quantum object.

18 States pure state: ψ unit vector in C n rank one projection associated to a pure state: ρ ψ = ψ ψ M n mixed state (density matrix): ρ = i p i ψ ψ 0, Trρ = 1.

19 Separable vs Entangled Pure States In quantum mechanics, one often looks at tensor product quantum systems, for which different users (Alice, Bob, Charlie,... ) have access to the individual tensored Hilbert spaces.

20 Separable vs Entangled Pure States In quantum mechanics, one often looks at tensor product quantum systems, for which different users (Alice, Bob, Charlie,... ) have access to the individual tensored Hilbert spaces. A pure state ψ C m C n is called separable if it can be written as an elementary tensor: ψ = ϕ φ where ϕ C m, φ C n. Otherwise, ψ is said to be entangled.

21 Separable vs Entangled Mixed States In the case of mixed states, we say that ρ M m M n is separable if it can be written as a convex combination of separable pure states: ρ = i p i ρ ϕi ρ φi, where ρ ϕi = ϕ i ϕ i M m and ρ φi = φ i φ i M n. Otherwise, ρ is said to be entangled.

22 Completely Positive Maps Definition We say that a linear map Φ : M m M n is completely positive (CP) if the induced mappings Φ d : M d M m M d M n, defined by Φ d = id d Φ, are positive for all d.

23 Completely Positive Maps Definition We say that a linear map Φ : M m M n is completely positive (CP) if the induced mappings Φ d : M d M m M d M n, defined by Φ d = id d Φ, are positive for all d. A map is called trace preserving if Tr(Φ(X )) = Tr(X ) for all X.

24 Quantum Channels Definition A (quantum) channel Φ is a linear, CP, trace preserving (CPTP) map.

25 Quantum Channels Definition A (quantum) channel Φ is a linear, CP, trace preserving (CPTP) map. We can always write a quantum channel in the form Φ(ρ) = i V iρvi, where i V i V i = I. We call V i the Choi/Kraus operators of Φ.

26 Random Unitary Channels A quantum channel Φ : M m M m is called a unitary channel if we can write Φ(ρ) = UρU for all ρ M m. Such a channel has a single Kraus operator U M m. Trace-preservation forces U to be unitary.

27 Random Unitary Channels A quantum channel Φ : M m M m is called a unitary channel if we can write Φ(ρ) = UρU for all ρ M m. Such a channel has a single Kraus operator U M m. Trace-preservation forces U to be unitary. As a natural generalization of this example, a channel Φ is called a random unitary channel if it admits a decomposition Φ(ρ) = i p i U i ρu i for all ρ, where p i form a probability distribution and U i are unitary operators.

28 Partial Trace Definition The map Tr k : M m M k M m defined by Tr k = id m Tr is called the partial trace (with respect to M k ) and we say that we trace out the system M k. We could similarly define the partial trace with respect to M m. The partial trace is in fact a linear, trace preserving, completely positive map, and as such it is a quantum channel.

29 Stinespring s theorem Schrödinger picture Theorem Suppose that Φ : M m M n is a completely positive trace preserving linear map. Then for some k mn, there exists a partial isometry U M nk mk, and a pure state ψ C k such that Φ(ρ) = Tr k (U(ρ ρ ψ )U ) for all ρ M m. (1)

30 This is the Schrödinger picture for the (discrete) time evolution of quantum states. If we define V φ := U( φ ψ ) for all pure states φ C m, for some fixed pure state ψ C k, then we can write equation (1) more succinctly as Φ(ρ) = Tr k (V ρv ). The general form for U is V 1 V 2 V k U = ( V ), where V =..

31 Purification of Mixed States Fix a density operator ρ 0 M m, and consider the quantum channel Φ : C M m defined by Φ(c 1) = c ρ 0 for all c C.

32 Purification of Mixed States Fix a density operator ρ 0 M m, and consider the quantum channel Φ : C M m defined by Φ(c 1) = c ρ 0 for all c C. Then, with M k = C M m = M m and U M m 2 m, the Stinespring Theorem gives ρ 0 = Φ(1) = Tr k (U(1 ρ ψ )U ) = Tr k (ρ ψ ), where ψ M m 2 = M m M m is a purification of ρ 0, and the freedom in U (and thus in ψ ) yields all possible purifications ρ ψ for ρ 0.

33 Purification of Mixed States Fix a density operator ρ 0 M m, and consider the quantum channel Φ : C M m defined by Φ(c 1) = c ρ 0 for all c C. Then, with M k = C M m = M m and U M m 2 m, the Stinespring Theorem gives ρ 0 = Φ(1) = Tr k (U(1 ρ ψ )U ) = Tr k (ρ ψ ), where ψ M m 2 = M m M m is a purification of ρ 0, and the freedom in U (and thus in ψ ) yields all possible purifications ρ ψ for ρ 0. This idea of dilation constructions of channels and states is known as going to the church of the larger Hilbert space, a phrase credited to John Smolin.

34 Conjugate/Complementary Channels Definition Given a quantum channel Φ : M m M n, consider the Stinespring representation given by V M nk m and M k for which Φ(ρ) = Tr k (V ρv ). Then the corresponding conjugate (or complementary) channel is the quantum channel Φ : M m M k given by Φ (ρ) = Tr n (V ρv ).

35 Computing Kraus Operators for Conjugates We can compute the Kraus operators of the complementary channel by stacking the j-th row of each of the Kraus operators V i of Φ one below the next, to obtain the j-th Kraus operator R j of Φ.

36 Motivation Question: How can we protect information stored in a quantum state from an external observer?

37 Motivation Question: How can we protect information stored in a quantum state from an external observer? Quantum cryptography is used to hide information when sending quantum information through a quantum channel so that the original message cannot be recovered by a third party.

38 Example Alice wishes to send a message ψ from a particular set S to Bob without an eavesdropper, Eve, being able to learn the message.

39 Example Alice wishes to send a message ψ from a particular set S to Bob without an eavesdropper, Eve, being able to learn the message. Alice can perform any unitary operation from a set {U i } with probability p i ({U i } and {p i } are known publicly)

40 Example Alice wishes to send a message ψ from a particular set S to Bob without an eavesdropper, Eve, being able to learn the message. Alice can perform any unitary operation from a set {U i } with probability p i ({U i } and {p i } are known publicly) Alice and Bob share a key, i 0 (privately), and Alice applies U i0 corresponding to i 0 to her message ρ ψ ; that is, ρ ψ U i0 ρ ψ U i 0.

41 Example Alice wishes to send a message ψ from a particular set S to Bob without an eavesdropper, Eve, being able to learn the message. Alice can perform any unitary operation from a set {U i } with probability p i ({U i } and {p i } are known publicly) Alice and Bob share a key, i 0 (privately), and Alice applies U i0 corresponding to i 0 to her message ρ ψ ; that is, ρ ψ U i0 ρ ψ U i 0. Bob receives the output message, and, knowing i 0, can undo Alice s operation to recover the original message.

42 Example Alice wishes to send a message ψ from a particular set S to Bob without an eavesdropper, Eve, being able to learn the message. Alice can perform any unitary operation from a set {U i } with probability p i ({U i } and {p i } are known publicly) Alice and Bob share a key, i 0 (privately), and Alice applies U i0 corresponding to i 0 to her message ρ ψ ; that is, ρ ψ U i0 ρ ψ U i 0. Bob receives the output message, and, knowing i 0, can undo Alice s operation to recover the original message. This is secure against Eve, who does not know i 0, and always sees the same output ρ 0 = i p iu i (ρ)ui regardless of Alice s input message.

43 Example Alice wishes to send a message ψ from a particular set S to Bob without an eavesdropper, Eve, being able to learn the message. Alice can perform any unitary operation from a set {U i } with probability p i ({U i } and {p i } are known publicly) Alice and Bob share a key, i 0 (privately), and Alice applies U i0 corresponding to i 0 to her message ρ ψ ; that is, ρ ψ U i0 ρ ψ U i 0. Bob receives the output message, and, knowing i 0, can undo Alice s operation to recover the original message. This is secure against Eve, who does not know i 0, and always sees the same output ρ 0 = i p iu i (ρ)ui regardless of Alice s input message.

44 Private Quantum Channels Definition Definition Let S C m be a subspace of pure states, let Φ : M m M k M n be a quantum channel, let ρ a M k be an auxiliary density matrix, and let ρ 0 M n. Then [S, Φ, ρ a, ρ 0 ] is a private quantum channel if we have Φ(ρ ψ ρ a ) = ρ 0 for all ψ S. Motivating class of examples: random unitary channels, where Φ(ρ) = i p iu i ρu i.

45 Private Quantum Channels Note: In previous works, the ancilla state ρ a is used theoretically, but does not appear in physical examples (Ambainis et al, Boykin-Roychowdhury, 2000) ρ 0 is often taken to be the maximally mixed state 1 d I (Boykin-Roychowdhury).

46 Completely Depolarizing Channel The simplest example of a private quantum channel is the completely depolarizing channel E acting on M 2. Define the Pauli matrices as X = ( ) Y = ( ) 0 i i 0 Z = ( )

47 Completely Depolarizing Channel The simplest example of a private quantum channel is the completely depolarizing channel E acting on M 2. Define the Pauli matrices as X = ( ) Y = ( ) 0 i i 0 Z = Then E(ρ) = 1 4 (I ρ I +X ρx + Y ρy + ZρZ) = 1 2 I. ( ) The completely depolarizing channel sends all density matrices to the maximally mixed state.

48 Private Subsystem We call A and B subsystems of C n if we can write C n = (A B) (A B). The subspaces of C n can be viewed as subsystems B for which A is one-dimensional. A subscript on a state will indicate to which subsystem the state belongs, e.g. σ A means the operator belongs to M na.

49 Private Subsystem We call A and B subsystems of C n if we can write C n = (A B) (A B). The subspaces of C n can be viewed as subsystems B for which A is one-dimensional. A subscript on a state will indicate to which subsystem the state belongs, e.g. σ A means the operator belongs to M na. Subsystem encodings first arose in quantum information in 2004 through the work of Bartlett-Rudolph-Spekkens (quantum cryptography) and Kribs-Laflamme-Poulin ( operator quantum error correction).

50 Private Subsystem Definition Let Φ : M n M n be a channel and let B be a subsystem of C n. Then B is a completely private subsystem for Φ if there is a ρ 0 M n and σ A M na such that Definition Φ(σ A σ B ) = ρ 0 for all σ B. Let Φ : M n M n be a channel and let B be a subsystem of C n. Then B is a operator private subsystem for Φ if there is a ρ 0 M n such that Φ(σ A σ B ) = ρ 0 for all σ A, for all σ B

51 Phase Damping Channel Consider the following phase damping channels acting on M 4 : Λ i (ρ) = 1 2 (ρ + Z iρz i ), for all ρ M 4, where Z 1 = Z I 2 and Z 2 = I 2 Z.

52 Phase Damping Channel Consider the following phase damping channels acting on M 4 : Λ i (ρ) = 1 2 (ρ + Z iρz i ), for all ρ M 4, where Z 1 = Z I 2 and Z 2 = I 2 Z. For i = 1, 2, Λ i is not private: the diagonal entries of the input ρ are preserved Eve would be able to learn some information about the original message based on what diagonal terms she observes.

53 Privacy for phase damping channel? Let Λ be the composition of the application of the maps Λ 1 and Λ 2 : Λ(ρ) = Λ 2 Λ 1.

54 Privacy for phase damping channel? Let Λ be the composition of the application of the maps Λ 1 and Λ 2 : Λ(ρ) = Λ 2 Λ 1. The Kraus operators for Λ are { 1 2 I I, 1 2 I Z, 1 2 Z I, 1 2 ZZ}.

55 Privacy for phase damping channel? Let Λ be the composition of the application of the maps Λ 1 and Λ 2 : Λ(ρ) = Λ 2 Λ 1. The Kraus operators for Λ are { 1 2 I I, 1 2 I Z, 1 2 Z I, 1 2 ZZ}. Similar to before, we find Λ preserves the diagonal of the input ρ (in this case the output is a diagonal matrix); no private subspace exists.

56 Privacy for phase damping channel? However, consider a density matrix ρ L = 1 (I I +αxx + βy I +γzx ). 4 We note that Λ(ρ L ) = 1 4 I 2 I 2, for any ρ L of this form. Thus Λ is private for some set of states, which we can show forms a subsystem.

57 Common Physical Gates The T -gate, K = 1 ( ) 1 1, 2 i i CNOT 1,2 = , CNOT 2,1 = ,

58 Private subsystem for phase damping Let U = CNOT 1,2 CNOT 2,1 (K I 2 ). The composition U( )U acts as XX I Y YI I Z ZX I X. Thus, we obtain ρ L ρ = 1 4 (I 2 I 2 +γ I X + α I Y + β I Z). we see the set of operators Uρ L U generate the algebra I 2 M 2. In other words, the set M 4 (S) spanned by all ρ L is isomorphic to I 2 M 2.

59 Quantum Error Correction How can we protect our quantum information against sources of quantum noise?

60 Quantum Error Correction How can we protect our quantum information against sources of quantum noise? Quantum error correction is used to recover information from errors introduced by noise that occurs when sending quantum information through a quantum channel.

61 Quantum Error Correction How can we protect our quantum information against sources of quantum noise? Quantum error correction is used to recover information from errors introduced by noise that occurs when sending quantum information through a quantum channel. Definition Let Φ : M n M n be a channel and let B be a subsystem of M n. Then B is a correctable subsystem for Φ if there exists a quantum channel R, called a recovery operation, such that for all σ A, for all σ B, there exists a τ A we have R Φ(σ A σ B ) = τ A σ B.

62 Quantum Error Correction How can we protect our quantum information against sources of quantum noise? Quantum error correction is used to recover information from errors introduced by noise that occurs when sending quantum information through a quantum channel. Definition Let Φ : M n M n be a channel and let B be a subsystem of M n. Then B is a correctable subsystem for Φ if there exists a quantum channel R, called a recovery operation, such that for all σ A, for all σ B, there exists a τ A we have R Φ(σ A σ B ) = τ A σ B. Note: For correctable subspace S, we have R Φ(ρ) = ρ for all ρ M(S).

63 Complementarity of Private Subspaces Both quantum error correction and quantum cryptography protect against the unwanted leakage, or loss, of quantum information and there is an established connection between such notions: Theorem (Kretschmann-Kribs-Spekkens) Given a conjugate pair of quantum channels Φ, Φ, a subsystem S is error-correctable for one if and only if it is an operator private subsystem for the other. The extreme example of this phenomena is given by a unitary channel paired with the completely depolarizing channel where the entire Hilbert space is the correctable (private) subspace.

64 Example (cont.) For our phase damping channel Λ, we can easily compute the Kraus operators of Λ : We find Λ (U( 1 2 I A σ B )U ) = 1 4 I 2 I 2. Instead of being correctable on the private subsystem I 2 M 2, the complementary channel Λ (with the proper unitary transformation) is completely depolarizing! All information is lost, so there is no possibility of the channel being quantum error correctable.

65 Quantum Circuit Diagram Let Φ : M m M n. Let (V Φ, M k ) be the Stinespring representation for Φ. M n Φ(ρ) = ρ 0 Tr k ρ Mm V Φ Tr n M k M k U R R Φ (ρ) = ρ

66 The big picture ρ Z 0 0 K Z Φ(ρ) + + Mixing ancilla + + Φ (ρ) + + The dotted box ( ) represents the mixed state encoding The dashed box ( ) encodes the state ρ into the mixed state encoding ρ The solid box ( ) performed the private quantum channel

67 From QEC to QCrypto? General Program: Using the algebraic bridge given by the notion of conjugate channels, we wish to investigate what results, techniques, special types of codes, applications, etc,. from the well-studied field of quantum error correction have analogues or versions in the world of private quantum codes and quantum cryptography. At the least, we can use work from QEC as motivation for studies in this different setting.

68 Knill-Laflamme Theorem for QEC Theorem Let S be a subspace of C n and let P be the projector onto M n (S). Suppose Φ is a quantum channel with Kraus operators {E i }. Then there exists an error-correction operation R correcting Φ on S if and only if PEi E jp = α ij P for some Hermitian matrix α = [α ij ] ij of complex numbers.

69 Knill-Laflamme Type Conditions for Private Subspaces Using the bridge between privacy and quantum error correction, we can formulate Knill-Laflamme type conditions for the private setting. Theorem (Kribs P.) Let S be a subspace of C n and let P be the projector onto M n (S). Then S is private for a quantum channel Φ with output state ρ 0 ; i.e., Φ(ρ) = ρ 0 for all ρ M(S) if and only if for all X λ X C : PΦ (X )P = λ X P. In this case, λ X = Tr(ρ 0 X ), where Φ (X ) = i V i XV i.

70 Knill-Laflamme Type Conditions for Private Subsystems Theorem (Jochym-O Connor Kribs Laflamme P.) A subsystem B is private for a channel Φ(ρ) = i V iρvi with fixed σ A M(H A ) and output state ρ 0 if and only if there are complex scalars λ ijkl forming an isometry matrix λ = (λ ijkl ) such that p k V j ψ A,k = i,l λ ijkl ql φ l ψ B,i, where ψ A,k (p k ) and φ l (q l ) are eigenstates (eigenvalues) of σ A and ρ 0 respectively, ψ B,i is an orthonormal basis for B, and where ψ A,k is viewed as a channel from B into S.

71 Necessary Condition for Negative Private Subspace Result Theorem (Jochym-O Connor Kribs Laflamme P.) Let Φ be a quantum channel whose Kraus operators are a set of commuting unitary operators { p i U i }, where p i is a scaling factor such that i p i = 1. Then there exists no private subspace S for Φ.

72 Conclusion We ve seen several variations of private quantum channel/code/subspace/operator subsystem/completely (private) subsystem... Knill-Laflamme analogue for private setting via complementary channels. The theorem linking QEC with quantum cryptography doesn t work for completely private subsystems. Relaxed definition of conjugate channel?

73 Big Picture Over the last 10 years, there s been lots of progress in QEC motivated by operator algebraic approach At this point, much less mathematical development on PQC side; still at an early stage. Still lots to uncover in particular, an overarching mathematical formalism of private subsystems, similar to the Stabilizer formalism in QEC.

Quantum decoherence. Éric Oliver Paquette (U. Montréal) -Traces Worshop [Ottawa]- April 29 th, Quantum decoherence p. 1/2

Quantum decoherence. Éric Oliver Paquette (U. Montréal) -Traces Worshop [Ottawa]- April 29 th, Quantum decoherence p. 1/2 Quantum decoherence p. 1/2 Quantum decoherence Éric Oliver Paquette (U. Montréal) -Traces Worshop [Ottawa]- April 29 th, 2007 Quantum decoherence p. 2/2 Outline Quantum decoherence: 1. Basics of quantum

More information

Lecture 4: Postulates of quantum mechanics

Lecture 4: Postulates of quantum mechanics Lecture 4: Postulates of quantum mechanics Rajat Mittal IIT Kanpur The postulates of quantum mechanics provide us the mathematical formalism over which the physical theory is developed. For people studying

More information

Lecture 11 September 30, 2015

Lecture 11 September 30, 2015 PHYS 7895: Quantum Information Theory Fall 015 Lecture 11 September 30, 015 Prof. Mark M. Wilde Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike

More information

Operator Quantum Error Correcting Codes

Operator Quantum Error Correcting Codes Operator Quantum Error Correcting Codes Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. June 18, 2008 Vlad Gheorghiu (CMU) Operator Quantum Error Correcting

More information

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Rahul Jain U. Waterloo and Institute for Quantum Computing, rjain@cs.uwaterloo.ca entry editor: Andris Ambainis

More information

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding. CS 94- Bell States Bell Inequalities 9//04 Fall 004 Lecture Hilbert Space Entanglement Quantum Gates Bell States Superdense Coding 1 One qubit: Recall that the state of a single qubit can be written as

More information

2. Introduction to quantum mechanics

2. Introduction to quantum mechanics 2. Introduction to quantum mechanics 2.1 Linear algebra Dirac notation Complex conjugate Vector/ket Dual vector/bra Inner product/bracket Tensor product Complex conj. matrix Transpose of matrix Hermitian

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

Some Introductory Notes on Quantum Computing

Some Introductory Notes on Quantum Computing Some Introductory Notes on Quantum Computing Markus G. Kuhn http://www.cl.cam.ac.uk/~mgk25/ Computer Laboratory University of Cambridge 2000-04-07 1 Quantum Computing Notation Quantum Computing is best

More information

Introduction to Quantum Mechanics

Introduction to Quantum Mechanics Introduction to Quantum Mechanics R. J. Renka Department of Computer Science & Engineering University of North Texas 03/19/2018 Postulates of Quantum Mechanics The postulates (axioms) of quantum mechanics

More information

Quantum Information Types

Quantum Information Types qitd181 Quantum Information Types Robert B. Griffiths Version of 6 February 2012 References: R. B. Griffiths, Types of Quantum Information, Phys. Rev. A 76 (2007) 062320; arxiv:0707.3752 Contents 1 Introduction

More information

PHY305: Notes on Entanglement and the Density Matrix

PHY305: Notes on Entanglement and the Density Matrix PHY305: Notes on Entanglement and the Density Matrix Here follows a short summary of the definitions of qubits, EPR states, entanglement, the density matrix, pure states, mixed states, measurement, and

More information

Lecture 3: Hilbert spaces, tensor products

Lecture 3: Hilbert spaces, tensor products CS903: Quantum computation and Information theory (Special Topics In TCS) Lecture 3: Hilbert spaces, tensor products This lecture will formalize many of the notions introduced informally in the second

More information

Basics on quantum information

Basics on quantum information Basics on quantum information Mika Hirvensalo Department of Mathematics and Statistics University of Turku mikhirve@utu.fi Thessaloniki, May 2014 Mika Hirvensalo Basics on quantum information 1 of 49 Brief

More information

Ensembles and incomplete information

Ensembles and incomplete information p. 1/32 Ensembles and incomplete information So far in this course, we have described quantum systems by states that are normalized vectors in a complex Hilbert space. This works so long as (a) the system

More information

Quantum Gates, Circuits & Teleportation

Quantum Gates, Circuits & Teleportation Chapter 3 Quantum Gates, Circuits & Teleportation Unitary Operators The third postulate of quantum physics states that the evolution of a quantum system is necessarily unitary. Geometrically, a unitary

More information

. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i.

. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i. CS 94- Hilbert Spaces, Tensor Products, Quantum Gates, Bell States 1//07 Spring 007 Lecture 01 Hilbert Spaces Consider a discrete quantum system that has k distinguishable states (eg k distinct energy

More information

Basics on quantum information

Basics on quantum information Basics on quantum information Mika Hirvensalo Department of Mathematics and Statistics University of Turku mikhirve@utu.fi Thessaloniki, May 2016 Mika Hirvensalo Basics on quantum information 1 of 52 Brief

More information

Unitary evolution: this axiom governs how the state of the quantum system evolves in time.

Unitary evolution: this axiom governs how the state of the quantum system evolves in time. CS 94- Introduction Axioms Bell Inequalities /7/7 Spring 7 Lecture Why Quantum Computation? Quantum computers are the only model of computation that escape the limitations on computation imposed by the

More information

Chapter 5. Density matrix formalism

Chapter 5. Density matrix formalism Chapter 5 Density matrix formalism In chap we formulated quantum mechanics for isolated systems. In practice systems interect with their environnement and we need a description that takes this feature

More information

Lecture 6: Quantum error correction and quantum capacity

Lecture 6: Quantum error correction and quantum capacity Lecture 6: Quantum error correction and quantum capacity Mark M. Wilde The quantum capacity theorem is one of the most important theorems in quantum hannon theory. It is a fundamentally quantum theorem

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

1. Basic rules of quantum mechanics

1. Basic rules of quantum mechanics 1. Basic rules of quantum mechanics How to describe the states of an ideally controlled system? How to describe changes in an ideally controlled system? How to describe measurements on an ideally controlled

More information

Qubits vs. bits: a naive account A bit: admits two values 0 and 1, admits arbitrary transformations. is freely readable,

Qubits vs. bits: a naive account A bit: admits two values 0 and 1, admits arbitrary transformations. is freely readable, Qubits vs. bits: a naive account A bit: admits two values 0 and 1, admits arbitrary transformations. is freely readable, A qubit: a sphere of values, which is spanned in projective sense by two quantum

More information

b) (5 points) Give a simple quantum circuit that transforms the state

b) (5 points) Give a simple quantum circuit that transforms the state C/CS/Phy191 Midterm Quiz Solutions October 0, 009 1 (5 points) Short answer questions: a) (5 points) Let f be a function from n bits to 1 bit You have a quantum circuit U f for computing f If you wish

More information

Structure of Unital Maps and the Asymptotic Quantum Birkhoff Conjecture. Peter Shor MIT Cambridge, MA Joint work with Anand Oza and Dimiter Ostrev

Structure of Unital Maps and the Asymptotic Quantum Birkhoff Conjecture. Peter Shor MIT Cambridge, MA Joint work with Anand Oza and Dimiter Ostrev Structure of Unital Maps and the Asymptotic Quantum Birkhoff Conjecture Peter Shor MIT Cambridge, MA Joint work with Anand Oza and Dimiter Ostrev The Superposition Principle (Physicists): If a quantum

More information

Entanglement: concept, measures and open problems

Entanglement: concept, measures and open problems Entanglement: concept, measures and open problems Division of Mathematical Physics Lund University June 2013 Project in Quantum information. Supervisor: Peter Samuelsson Outline 1 Motivation for study

More information

Introduction to Quantum Information Hermann Kampermann

Introduction to Quantum Information Hermann Kampermann Introduction to Quantum Information Hermann Kampermann Heinrich-Heine-Universität Düsseldorf Theoretische Physik III Summer school Bleubeuren July 014 Contents 1 Quantum Mechanics...........................

More information

Recovery in quantum error correction for general noise without measurement

Recovery in quantum error correction for general noise without measurement Quantum Information and Computation, Vol. 0, No. 0 (2011) 000 000 c Rinton Press Recovery in quantum error correction for general noise without measurement CHI-KWONG LI Department of Mathematics, College

More information

Lecture: Quantum Information

Lecture: Quantum Information Lecture: Quantum Information Transcribed by: Crystal Noel and Da An (Chi Chi) November 10, 016 1 Final Proect Information Find an issue related to class you are interested in and either: read some papers

More information

Quantum computing and mathematical research. Chi-Kwong Li The College of William and Mary

Quantum computing and mathematical research. Chi-Kwong Li The College of William and Mary and mathematical research The College of William and Mary Classical computing Classical computing Hardware - Beads and bars. Classical computing Hardware - Beads and bars. Input - Using finger skill to

More information

Entropy in Classical and Quantum Information Theory

Entropy in Classical and Quantum Information Theory Entropy in Classical and Quantum Information Theory William Fedus Physics Department, University of California, San Diego. Entropy is a central concept in both classical and quantum information theory,

More information

Single qubit + CNOT gates

Single qubit + CNOT gates Lecture 6 Universal quantum gates Single qubit + CNOT gates Single qubit and CNOT gates together can be used to implement an arbitrary twolevel unitary operation on the state space of n qubits. Suppose

More information

DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS

DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS SCOTT HOTTOVY Abstract. Quantum networks are used to transmit and process information by using the phenomena of quantum mechanics.

More information

Introduction to quantum information processing

Introduction to quantum information processing Introduction to quantum information processing Fidelity and other distance metrics Brad Lackey 3 November 2016 FIDELITY AND OTHER DISTANCE METRICS 1 of 17 OUTLINE 1 Noise channels 2 Fidelity 3 Trace distance

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

Lecture 2: Introduction to Quantum Mechanics

Lecture 2: Introduction to Quantum Mechanics CMSC 49: Introduction to Quantum Computation Fall 5, Virginia Commonwealth University Sevag Gharibian Lecture : Introduction to Quantum Mechanics...the paradox is only a conflict between reality and your

More information

Basic Notation and Background

Basic Notation and Background Department of Mathematics, The College of William and Mary, Williamsburg, Virginia, USA; Department of Mathematics, Taiyuan University of Technology, Taiyuan, Shanxi, P.R. of China. Hilbert spaces The

More information

EPR paradox, Bell inequality, etc.

EPR paradox, Bell inequality, etc. EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project

More information

Mathematical Methods for Quantum Information Theory. Part I: Matrix Analysis. Koenraad Audenaert (RHUL, UK)

Mathematical Methods for Quantum Information Theory. Part I: Matrix Analysis. Koenraad Audenaert (RHUL, UK) Mathematical Methods for Quantum Information Theory Part I: Matrix Analysis Koenraad Audenaert (RHUL, UK) September 14, 2008 Preface Books on Matrix Analysis: R. Bhatia, Matrix Analysis, Springer, 1997.

More information

Lecture 14: Quantum information revisited

Lecture 14: Quantum information revisited CPSC 59/69: Quantum Computation John Watrous, University of Calgary Lecture 4: Quantum information revisited March 4, 006 So far, this course has focused almost entirely on quantum algorithms The next

More information

Lecture 13B: Supplementary Notes on Advanced Topics. 1 Inner Products and Outer Products for Single Particle States

Lecture 13B: Supplementary Notes on Advanced Topics. 1 Inner Products and Outer Products for Single Particle States Lecture 13B: Supplementary Notes on Advanced Topics Outer Products, Operators, Density Matrices In order to explore the complexity of many particle systems a different way to represent multiparticle states

More information

Lectures 1 and 2: Axioms for Quantum Theory

Lectures 1 and 2: Axioms for Quantum Theory Lectures 1 and 2: Axioms for Quantum Theory Joseph Emerson Course: AMATH 900/AMATH 495/PHYS 490 Foundations and Interpretations of Quantum Theory Course Instructors: Joseph Emerson and Ray Laflamme Hosted

More information

Quantum Measurements: some technical background

Quantum Measurements: some technical background Quantum Measurements: some technical background [From the projection postulate to density matrices & (introduction to) von Neumann measurements] (AKA: the boring lecture) First: One more example I wanted

More information

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels JOURNAL OF CHEMISTRY 57 VOLUME NUMBER DECEMBER 8 005 A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels Miri Shlomi

More information

Lecture 6: Further remarks on measurements and channels

Lecture 6: Further remarks on measurements and channels CS 766/QIC 820 Theory of Quantum Information Fall 2011) Lecture 6: Further remarks on measurements and channels In this lecture we will discuss a few loosely connected topics relating to measurements and

More information

SUPERDENSE CODING AND QUANTUM TELEPORTATION

SUPERDENSE CODING AND QUANTUM TELEPORTATION SUPERDENSE CODING AND QUANTUM TELEPORTATION YAQIAO LI This note tries to rephrase mathematically superdense coding and quantum teleportation explained in [] Section.3 and.3.7, respectively (as if I understood

More information

Quantum Entanglement and the Bell Matrix

Quantum Entanglement and the Bell Matrix Quantum Entanglement and the Bell Matrix Marco Pedicini (Roma Tre University) in collaboration with Anna Chiara Lai and Silvia Rognone (La Sapienza University of Rome) SIMAI2018 - MS27: Discrete Mathematics,

More information

Introduction into Quantum Computations Alexei Ashikhmin Bell Labs

Introduction into Quantum Computations Alexei Ashikhmin Bell Labs Introduction into Quantum Computations Alexei Ashikhmin Bell Labs Workshop on Quantum Computing and its Application March 16, 2017 Qubits Unitary transformations Quantum Circuits Quantum Measurements Quantum

More information

The Minimax Fidelity for Quantum Channels: Theory and Some Applications

The Minimax Fidelity for Quantum Channels: Theory and Some Applications The Minimax Fidelity for Quantum Channels: Theory and Some Applications Maxim Raginsky University of I!inois V.P. Belavkin, G.M. D Ariano and M. Raginsky Operational distance and fidelity for quantum channels

More information

arxiv:quant-ph/ v1 13 Jan 2003

arxiv:quant-ph/ v1 13 Jan 2003 Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The

More information

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36 QUANTUM INFORMATION - THE NO-HIDING THEOREM Arun K Pati akpati@iopb.res.in Instititute of Physics, Bhubaneswar-751005, Orissa, INDIA and Th. P. D, BARC, Mumbai-400085, India QUANTUM INFORMATION -THE NO-HIDING

More information

Quantum information and quantum computing

Quantum information and quantum computing Middle East Technical University, Department of Physics January 7, 009 Outline Measurement 1 Measurement 3 Single qubit gates Multiple qubit gates 4 Distinguishability 5 What s measurement? Quantum measurement

More information

Non-Completely Positive Maps: Properties and Applications

Non-Completely Positive Maps: Properties and Applications Non-Completely Positive Maps: Properties and Applications By Christopher Wood A thesis submitted to Macquarie University in partial fulfilment of the degree of Bachelor of Science with Honours Department

More information

Application of Structural Physical Approximation to Partial Transpose in Teleportation. Satyabrata Adhikari Delhi Technological University (DTU)

Application of Structural Physical Approximation to Partial Transpose in Teleportation. Satyabrata Adhikari Delhi Technological University (DTU) Application of Structural Physical Approximation to Partial Transpose in Teleportation Satyabrata Adhikari Delhi Technological University (DTU) Singlet fraction and its usefulness in Teleportation Singlet

More information

QUANTUM COMPUTING 10.

QUANTUM COMPUTING 10. QUANTUM COMPUTING 10. Jozef Gruska Faculty of Informatics Brno Czech Republic December 20, 2011 10. QUANTUM ERROR CORRECTION CODES Quantum computing based on pure states and unitary evolutions is an idealization

More information

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance. 9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance

More information

On the Relation between Quantum Discord and Purified Entanglement

On the Relation between Quantum Discord and Purified Entanglement On the Relation between Quantum Discord and Purified Entanglement by Eric Webster A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics

More information

1 Mathematical preliminaries

1 Mathematical preliminaries 1 Mathematical preliminaries The mathematical language of quantum mechanics is that of vector spaces and linear algebra. In this preliminary section, we will collect the various definitions and mathematical

More information

Entanglement Manipulation

Entanglement Manipulation Entanglement Manipulation Steven T. Flammia 1 1 Perimeter Institute for Theoretical Physics, Waterloo, Ontario, N2L 2Y5 Canada (Dated: 22 March 2010) These are notes for my RIT tutorial lecture at the

More information

Quantum Entanglement and Measurement

Quantum Entanglement and Measurement Quantum Entanglement and Measurement Haye Hinrichsen in collaboration with Theresa Christ University of Würzburg, Germany 2nd Workhop on Quantum Information and Thermodynamics Korea Institute for Advanced

More information

Logical error rate in the Pauli twirling approximation

Logical error rate in the Pauli twirling approximation Logical error rate in the Pauli twirling approximation Amara Katabarwa and Michael R. Geller Department of Physics and Astronomy, University of Georgia, Athens, Georgia 30602, USA (Dated: April 10, 2015)

More information

Short Course in Quantum Information Lecture 2

Short Course in Quantum Information Lecture 2 Short Course in Quantum Information Lecture Formal Structure of Quantum Mechanics Course Info All materials downloadable @ website http://info.phys.unm.edu/~deutschgroup/deutschclasses.html Syllabus Lecture

More information

Quantum Hadamard channels (I)

Quantum Hadamard channels (I) .... Quantum Hadamard channels (I) Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. July 8, 2010 Vlad Gheorghiu (CMU) Quantum Hadamard channels (I) July 8, 2010

More information

An Interpolation Problem by Completely Positive Maps and its. Quantum Cloning

An Interpolation Problem by Completely Positive Maps and its. Quantum Cloning An Interpolation Problem by Completely Positive Maps and its Application in Quantum Cloning College of Mathematics and Information Science, Shaanxi Normal University, Xi an, China, 710062 gzhihua@tom.com

More information

Introduction to Quantum Computing for Folks

Introduction to Quantum Computing for Folks Introduction to Quantum Computing for Folks Joint Advanced Student School 2009 Ing. Javier Enciso encisomo@in.tum.de Technische Universität München April 2, 2009 Table of Contents 1 Introduction 2 Quantum

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

arxiv: v2 [quant-ph] 16 Mar 2014

arxiv: v2 [quant-ph] 16 Mar 2014 Approximate quantum error correction for generalized amplitude damping errors Carlo Cafaro 1, and Peter van Loock 1 Max-Planck Institute for the Science of Light, 91058 Erlangen, Germany and Institute

More information

A Course in Quantum Information Theory

A Course in Quantum Information Theory A Course in Quantum Information Theory Ofer Shayevitz Spring 2007 Based on lectures given at the Tel Aviv University Edited by Anatoly Khina Version compiled January 9, 2010 Contents 1 Preliminaries 3

More information

Quantum Physics II (8.05) Fall 2002 Assignment 3

Quantum Physics II (8.05) Fall 2002 Assignment 3 Quantum Physics II (8.05) Fall 00 Assignment Readings The readings below will take you through the material for Problem Sets and 4. Cohen-Tannoudji Ch. II, III. Shankar Ch. 1 continues to be helpful. Sakurai

More information

Compression and entanglement, entanglement transformations

Compression and entanglement, entanglement transformations PHYSICS 491: Symmetry and Quantum Information April 27, 2017 Compression and entanglement, entanglement transformations Lecture 8 Michael Walter, Stanford University These lecture notes are not proof-read

More information

A Simple Model of Quantum Trajectories. Todd A. Brun University of Southern California

A Simple Model of Quantum Trajectories. Todd A. Brun University of Southern California A Simple Model of Quantum Trajectories Todd A. Brun University of Southern California Outline 1. Review projective and generalized measurements. 2. A simple model of indirect measurement. 3. Weak measurements--jump-like

More information

Quantum Computing Lecture 2. Review of Linear Algebra

Quantum Computing Lecture 2. Review of Linear Algebra Quantum Computing Lecture 2 Review of Linear Algebra Maris Ozols Linear algebra States of a quantum system form a vector space and their transformations are described by linear operators Vector spaces

More information

Quantum Teleportation Pt. 1

Quantum Teleportation Pt. 1 Quantum Teleportation Pt. 1 PHYS 500 - Southern Illinois University April 17, 2018 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 1 April 17, 2018 1 / 13 Types of Communication In the

More information

Concentration of Measure Effects in Quantum Information. Patrick Hayden (McGill University)

Concentration of Measure Effects in Quantum Information. Patrick Hayden (McGill University) Concentration of Measure Effects in Quantum Information Patrick Hayden (McGill University) Overview Superdense coding Random states and random subspaces Superdense coding of quantum states Quantum mechanical

More information

Algebraic Theory of Entanglement

Algebraic Theory of Entanglement Algebraic Theory of (arxiv: 1205.2882) 1 (in collaboration with T.R. Govindarajan, A. Queiroz and A.F. Reyes-Lega) 1 Physics Department, Syracuse University, Syracuse, N.Y. and The Institute of Mathematical

More information

arxiv:quant-ph/ v1 1 Jul 1998

arxiv:quant-ph/ v1 1 Jul 1998 arxiv:quant-ph/9807006v1 1 Jul 1998 The Heisenberg Representation of Quantum Computers Daniel Gottesman T-6 Group Los Alamos National Laboratory Los Alamos, NM 87545 February 1, 2008 Abstract Since Shor

More information

Quantum Computing Lecture 3. Principles of Quantum Mechanics. Anuj Dawar

Quantum Computing Lecture 3. Principles of Quantum Mechanics. Anuj Dawar Quantum Computing Lecture 3 Principles of Quantum Mechanics Anuj Dawar What is Quantum Mechanics? Quantum Mechanics is a framework for the development of physical theories. It is not itself a physical

More information

Quantum Mechanics and Quantum Computing: an Introduction. Des Johnston, Notes by Bernd J. Schroers Heriot-Watt University

Quantum Mechanics and Quantum Computing: an Introduction. Des Johnston, Notes by Bernd J. Schroers Heriot-Watt University Quantum Mechanics and Quantum Computing: an Introduction Des Johnston, Notes by Bernd J. Schroers Heriot-Watt University Contents Preface page Introduction. Quantum mechanics (partly excerpted from Wikipedia).

More information

Majorization-preserving quantum channels

Majorization-preserving quantum channels Majorization-preserving quantum channels arxiv:1209.5233v2 [quant-ph] 15 Dec 2012 Lin Zhang Institute of Mathematics, Hangzhou Dianzi University, Hangzhou 310018, PR China Abstract In this report, we give

More information

Physics 239/139 Spring 2018 Assignment 6

Physics 239/139 Spring 2018 Assignment 6 University of California at San Diego Department of Physics Prof. John McGreevy Physics 239/139 Spring 2018 Assignment 6 Due 12:30pm Monday, May 14, 2018 1. Brainwarmers on Kraus operators. (a) Check that

More information

Applications of Semidefinite Programming in Quantum Cryptography

Applications of Semidefinite Programming in Quantum Cryptography Applications of Semidefinite Programming in Quantum Cryptography by Jamie W. J. Sikora A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Petros Wallden Lecture 3: Basic Quantum Mechanics 26th September 2016 School of Informatics, University of Edinburgh Resources 1. Quantum Computation and Quantum Information

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

1 Measurements, Tensor Products, and Entanglement

1 Measurements, Tensor Products, and Entanglement Stanford University CS59Q: Quantum Computing Handout Luca Trevisan September 7, 0 Lecture In which we describe the quantum analogs of product distributions, independence, and conditional probability, and

More information

CS/Ph120 Homework 1 Solutions

CS/Ph120 Homework 1 Solutions CS/Ph0 Homework Solutions October, 06 Problem : State discrimination Suppose you are given two distinct states of a single qubit, ψ and ψ. a) Argue that if there is a ϕ such that ψ = e iϕ ψ then no measurement

More information

Introduction to Quantum Cryptography

Introduction to Quantum Cryptography Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics

More information

Instantaneous Nonlocal Measurements

Instantaneous Nonlocal Measurements Instantaneous Nonlocal Measurements Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA July 22, 2010 References Entanglement consumption of instantaneous nonlocal quantum measurements.

More information

Ph 219/CS 219. Exercises Due: Friday 20 October 2006

Ph 219/CS 219. Exercises Due: Friday 20 October 2006 1 Ph 219/CS 219 Exercises Due: Friday 20 October 2006 1.1 How far apart are two quantum states? Consider two quantum states described by density operators ρ and ρ in an N-dimensional Hilbert space, and

More information

arxiv: v2 [quant-ph] 26 Mar 2012

arxiv: v2 [quant-ph] 26 Mar 2012 Optimal Probabilistic Simulation of Quantum Channels from the Future to the Past Dina Genkina, Giulio Chiribella, and Lucien Hardy Perimeter Institute for Theoretical Physics, 31 Caroline Street North,

More information

Degradable Quantum Channels

Degradable Quantum Channels Degradable Quantum Channels Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA May 27, 2010 References The capacity of a quantum channel for simultaneous transmission of classical

More information

Entanglement and Quantum Teleportation

Entanglement and Quantum Teleportation Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,

More information

A Survey on Quantum Channel Capacities

A Survey on Quantum Channel Capacities 1 A Survey on Quantum Channel Capacities Laszlo Gyongyosi, 1,2,3, Member, IEEE, Sandor Imre, 2 Senior Member, IEEE, and Hung Viet Nguyen, 1 Member, IEEE 1 School of Electronics and Computer Science, University

More information

Quantum computing! quantum gates! Fisica dell Energia!

Quantum computing! quantum gates! Fisica dell Energia! Quantum computing! quantum gates! Fisica dell Energia! What is Quantum Computing?! Calculation based on the laws of Quantum Mechanics.! Uses Quantum Mechanical Phenomena to perform operations on data.!

More information

Quantum Entanglement: Detection, Classification, and Quantification

Quantum Entanglement: Detection, Classification, and Quantification Quantum Entanglement: Detection, Classification, and Quantification Diplomarbeit zur Erlangung des akademischen Grades,,Magister der Naturwissenschaften an der Universität Wien eingereicht von Philipp

More information

Introduction to Quantum Computation

Introduction to Quantum Computation Chapter 1 Introduction to Quantum Computation 1.1 Motivations The main task in this course is to discuss application of quantum mechanics to information processing (or computation). Why? Education:Asingleq-bitisthesmallestpossiblequantummechanical

More information

Quantum key distribution for the lazy and careless

Quantum key distribution for the lazy and careless Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center

More information

A Study of Topological Quantum Error Correcting Codes Part I: From Classical to Quantum ECCs

A Study of Topological Quantum Error Correcting Codes Part I: From Classical to Quantum ECCs A Study of Topological Quantum Error Correcting Codes Part I: From Classical to Quantum ECCs Preetum Nairan preetum@bereley.edu Mar 3, 05 Abstract This survey aims to highlight some interesting ideas in

More information

Maximal vectors in Hilbert space and quantum entanglement

Maximal vectors in Hilbert space and quantum entanglement Maximal vectors in Hilbert space and quantum entanglement William Arveson arveson@math.berkeley.edu UC Berkeley Summer 2008 arxiv:0712.4163 arxiv:0801.2531 arxiv:0804.1140 Overview Quantum Information

More information

Quantum Information Theory Tutorial

Quantum Information Theory Tutorial Quantum Information Theory Tutorial Mark M. Wilde Hearne Institute for Theoretical Physics, Department of Physics and Astronomy, Center for Computation and Technology, Louisiana State University, Baton

More information