Private quantum subsystems and error correction
|
|
- Bartholomew Parrish
- 5 years ago
- Views:
Transcription
1 Private quantum subsystems and error correction Sarah Plosker Department of Mathematics and Computer Science Brandon University September 26, 2014
2 Outline 1 Classical Versus Quantum Setting Classical Setting Quantum Setting 2 Thought Experiments (1930 s) 3 QIT: States and Channels 4 Quantum Cryptography Private Quantum Subsystem Example 5 Connection with Quantum Error Correction Complementarity of Q. Cryptography and QEC From QEC to QCrypto? 6 Conclusion
3 The Setup Alice (Sender) channel Φ Bob (Receiver) Input Message noise Output Message
4 States Definition A bit is a variable that can take as value either 0 or 1. Its realized value is called the state of the system (on/off, up/down, +/, true/false,... ).
5 States Definition A bit is a variable that can take as value either 0 or 1. Its realized value is called the state of the system (on/off, up/down, +/, true/false,... ). Classically: (KABOOM!)
6 States Definition A qubit is a system that is the quantum analogue of a bit. Its state is a two-dimensional complex vector φ = α 0 + β 1, where α and β are probability amplitudes, ( ) meaning ( ) 1 0 α 2 + β 2 = 1, α, β C, and 0 =, 1 =, using Dirac 0 1 (bra-ket) notation.
7 States Definition A qubit is a system that is the quantum analogue of a bit. Its state is a two-dimensional complex vector φ = α 0 + β 1, where α and β are probability amplitudes, ( ) meaning ( ) 1 0 α 2 + β 2 = 1, α, β C, and 0 =, 1 =, using Dirac 0 1 (bra-ket) notation. Thus a quantum system is in a state that, with probability α 2, will be measured as 0, and with probability β 2, will be measured as 1 ; though it is truly a superposition of both of the states.
8 Copenhagen Interpretation Interpretation of quantum mechanics by Bohr and Heisenberg, supported by von Neumann, Pauli. Opposed by Einstein, Schrödinger, Russell. 1 The Uncertainty Principle (also called the Indeterminacy Principle) of Heisenberg: The state of every particle is described by a wavefunction. The act of measurement causes the probabilities of the wavefunction to collapse to the value defined by the measurement. 2 Principle of Complementarity of Bohr: Wave-particle duality: light, electrons,..., in short, all energy (and thus all matter) exhibits both wave-like and particle-like properties.
9 Schrödinger s Cat Thought experiment (1935): A cat is put in a sealed box, along with a small amount of radioactive substance and a flask of poison. If any radioactive decay is detected, the flash of poison is broken and the cat dies. If no radioactive decay is detected, then nothing happens. After a while, the cat is simultaneously dead and alive. Yet, when we look in the box, we see the cat either dead or alive, not both. cat = 1 2 dead alive
10 Schrödinger s Cat (cont.)
11 Schrödinger s Cat (cont.)
12 EPR Paradox Entangled states violate the classical principle of locality the idea that an object is directly influenced only by its immediate surroundings.
13 EPR Paradox Entangled states violate the classical principle of locality the idea that an object is directly influenced only by its immediate surroundings. The easiest way to see evidence of entanglement is to measure one component of an entangled state. This measurement fixes the value of the other component of the state, implying non-local communication between the two parts.
14 EPR Paradox Entangled states violate the classical principle of locality the idea that an object is directly influenced only by its immediate surroundings. The easiest way to see evidence of entanglement is to measure one component of an entangled state. This measurement fixes the value of the other component of the state, implying non-local communication between the two parts. Entanglement can be used as a resource in order to implement quantum teleportation.
15 Example of Entanglement Electron spin, when measured, can be either of two states: spin up or spin down. In the absence of measurement, electron spin is in a superposition of the two states / (even without entanglement).
16 Example of Entanglement Electron spin, when measured, can be either of two states: spin up or spin down. In the absence of measurement, electron spin is in a superposition of the two states / (even without entanglement). Consider an entangled electron pair; suppose the state of one of the electrons is measured as spin up. This measurement fixes the state of the other electron it will be spin down.
17 Example of Entanglement Electron spin, when measured, can be either of two states: spin up or spin down. In the absence of measurement, electron spin is in a superposition of the two states / (even without entanglement). Consider an entangled electron pair; suppose the state of one of the electrons is measured as spin up. This measurement fixes the state of the other electron it will be spin down. In this sense, even when spatially separated, entangled electron pairs behave as a single quantum object.
18 States pure state: ψ unit vector in C n rank one projection associated to a pure state: ρ ψ = ψ ψ M n mixed state (density matrix): ρ = i p i ψ ψ 0, Trρ = 1.
19 Separable vs Entangled Pure States In quantum mechanics, one often looks at tensor product quantum systems, for which different users (Alice, Bob, Charlie,... ) have access to the individual tensored Hilbert spaces.
20 Separable vs Entangled Pure States In quantum mechanics, one often looks at tensor product quantum systems, for which different users (Alice, Bob, Charlie,... ) have access to the individual tensored Hilbert spaces. A pure state ψ C m C n is called separable if it can be written as an elementary tensor: ψ = ϕ φ where ϕ C m, φ C n. Otherwise, ψ is said to be entangled.
21 Separable vs Entangled Mixed States In the case of mixed states, we say that ρ M m M n is separable if it can be written as a convex combination of separable pure states: ρ = i p i ρ ϕi ρ φi, where ρ ϕi = ϕ i ϕ i M m and ρ φi = φ i φ i M n. Otherwise, ρ is said to be entangled.
22 Completely Positive Maps Definition We say that a linear map Φ : M m M n is completely positive (CP) if the induced mappings Φ d : M d M m M d M n, defined by Φ d = id d Φ, are positive for all d.
23 Completely Positive Maps Definition We say that a linear map Φ : M m M n is completely positive (CP) if the induced mappings Φ d : M d M m M d M n, defined by Φ d = id d Φ, are positive for all d. A map is called trace preserving if Tr(Φ(X )) = Tr(X ) for all X.
24 Quantum Channels Definition A (quantum) channel Φ is a linear, CP, trace preserving (CPTP) map.
25 Quantum Channels Definition A (quantum) channel Φ is a linear, CP, trace preserving (CPTP) map. We can always write a quantum channel in the form Φ(ρ) = i V iρvi, where i V i V i = I. We call V i the Choi/Kraus operators of Φ.
26 Random Unitary Channels A quantum channel Φ : M m M m is called a unitary channel if we can write Φ(ρ) = UρU for all ρ M m. Such a channel has a single Kraus operator U M m. Trace-preservation forces U to be unitary.
27 Random Unitary Channels A quantum channel Φ : M m M m is called a unitary channel if we can write Φ(ρ) = UρU for all ρ M m. Such a channel has a single Kraus operator U M m. Trace-preservation forces U to be unitary. As a natural generalization of this example, a channel Φ is called a random unitary channel if it admits a decomposition Φ(ρ) = i p i U i ρu i for all ρ, where p i form a probability distribution and U i are unitary operators.
28 Partial Trace Definition The map Tr k : M m M k M m defined by Tr k = id m Tr is called the partial trace (with respect to M k ) and we say that we trace out the system M k. We could similarly define the partial trace with respect to M m. The partial trace is in fact a linear, trace preserving, completely positive map, and as such it is a quantum channel.
29 Stinespring s theorem Schrödinger picture Theorem Suppose that Φ : M m M n is a completely positive trace preserving linear map. Then for some k mn, there exists a partial isometry U M nk mk, and a pure state ψ C k such that Φ(ρ) = Tr k (U(ρ ρ ψ )U ) for all ρ M m. (1)
30 This is the Schrödinger picture for the (discrete) time evolution of quantum states. If we define V φ := U( φ ψ ) for all pure states φ C m, for some fixed pure state ψ C k, then we can write equation (1) more succinctly as Φ(ρ) = Tr k (V ρv ). The general form for U is V 1 V 2 V k U = ( V ), where V =..
31 Purification of Mixed States Fix a density operator ρ 0 M m, and consider the quantum channel Φ : C M m defined by Φ(c 1) = c ρ 0 for all c C.
32 Purification of Mixed States Fix a density operator ρ 0 M m, and consider the quantum channel Φ : C M m defined by Φ(c 1) = c ρ 0 for all c C. Then, with M k = C M m = M m and U M m 2 m, the Stinespring Theorem gives ρ 0 = Φ(1) = Tr k (U(1 ρ ψ )U ) = Tr k (ρ ψ ), where ψ M m 2 = M m M m is a purification of ρ 0, and the freedom in U (and thus in ψ ) yields all possible purifications ρ ψ for ρ 0.
33 Purification of Mixed States Fix a density operator ρ 0 M m, and consider the quantum channel Φ : C M m defined by Φ(c 1) = c ρ 0 for all c C. Then, with M k = C M m = M m and U M m 2 m, the Stinespring Theorem gives ρ 0 = Φ(1) = Tr k (U(1 ρ ψ )U ) = Tr k (ρ ψ ), where ψ M m 2 = M m M m is a purification of ρ 0, and the freedom in U (and thus in ψ ) yields all possible purifications ρ ψ for ρ 0. This idea of dilation constructions of channels and states is known as going to the church of the larger Hilbert space, a phrase credited to John Smolin.
34 Conjugate/Complementary Channels Definition Given a quantum channel Φ : M m M n, consider the Stinespring representation given by V M nk m and M k for which Φ(ρ) = Tr k (V ρv ). Then the corresponding conjugate (or complementary) channel is the quantum channel Φ : M m M k given by Φ (ρ) = Tr n (V ρv ).
35 Computing Kraus Operators for Conjugates We can compute the Kraus operators of the complementary channel by stacking the j-th row of each of the Kraus operators V i of Φ one below the next, to obtain the j-th Kraus operator R j of Φ.
36 Motivation Question: How can we protect information stored in a quantum state from an external observer?
37 Motivation Question: How can we protect information stored in a quantum state from an external observer? Quantum cryptography is used to hide information when sending quantum information through a quantum channel so that the original message cannot be recovered by a third party.
38 Example Alice wishes to send a message ψ from a particular set S to Bob without an eavesdropper, Eve, being able to learn the message.
39 Example Alice wishes to send a message ψ from a particular set S to Bob without an eavesdropper, Eve, being able to learn the message. Alice can perform any unitary operation from a set {U i } with probability p i ({U i } and {p i } are known publicly)
40 Example Alice wishes to send a message ψ from a particular set S to Bob without an eavesdropper, Eve, being able to learn the message. Alice can perform any unitary operation from a set {U i } with probability p i ({U i } and {p i } are known publicly) Alice and Bob share a key, i 0 (privately), and Alice applies U i0 corresponding to i 0 to her message ρ ψ ; that is, ρ ψ U i0 ρ ψ U i 0.
41 Example Alice wishes to send a message ψ from a particular set S to Bob without an eavesdropper, Eve, being able to learn the message. Alice can perform any unitary operation from a set {U i } with probability p i ({U i } and {p i } are known publicly) Alice and Bob share a key, i 0 (privately), and Alice applies U i0 corresponding to i 0 to her message ρ ψ ; that is, ρ ψ U i0 ρ ψ U i 0. Bob receives the output message, and, knowing i 0, can undo Alice s operation to recover the original message.
42 Example Alice wishes to send a message ψ from a particular set S to Bob without an eavesdropper, Eve, being able to learn the message. Alice can perform any unitary operation from a set {U i } with probability p i ({U i } and {p i } are known publicly) Alice and Bob share a key, i 0 (privately), and Alice applies U i0 corresponding to i 0 to her message ρ ψ ; that is, ρ ψ U i0 ρ ψ U i 0. Bob receives the output message, and, knowing i 0, can undo Alice s operation to recover the original message. This is secure against Eve, who does not know i 0, and always sees the same output ρ 0 = i p iu i (ρ)ui regardless of Alice s input message.
43 Example Alice wishes to send a message ψ from a particular set S to Bob without an eavesdropper, Eve, being able to learn the message. Alice can perform any unitary operation from a set {U i } with probability p i ({U i } and {p i } are known publicly) Alice and Bob share a key, i 0 (privately), and Alice applies U i0 corresponding to i 0 to her message ρ ψ ; that is, ρ ψ U i0 ρ ψ U i 0. Bob receives the output message, and, knowing i 0, can undo Alice s operation to recover the original message. This is secure against Eve, who does not know i 0, and always sees the same output ρ 0 = i p iu i (ρ)ui regardless of Alice s input message.
44 Private Quantum Channels Definition Definition Let S C m be a subspace of pure states, let Φ : M m M k M n be a quantum channel, let ρ a M k be an auxiliary density matrix, and let ρ 0 M n. Then [S, Φ, ρ a, ρ 0 ] is a private quantum channel if we have Φ(ρ ψ ρ a ) = ρ 0 for all ψ S. Motivating class of examples: random unitary channels, where Φ(ρ) = i p iu i ρu i.
45 Private Quantum Channels Note: In previous works, the ancilla state ρ a is used theoretically, but does not appear in physical examples (Ambainis et al, Boykin-Roychowdhury, 2000) ρ 0 is often taken to be the maximally mixed state 1 d I (Boykin-Roychowdhury).
46 Completely Depolarizing Channel The simplest example of a private quantum channel is the completely depolarizing channel E acting on M 2. Define the Pauli matrices as X = ( ) Y = ( ) 0 i i 0 Z = ( )
47 Completely Depolarizing Channel The simplest example of a private quantum channel is the completely depolarizing channel E acting on M 2. Define the Pauli matrices as X = ( ) Y = ( ) 0 i i 0 Z = Then E(ρ) = 1 4 (I ρ I +X ρx + Y ρy + ZρZ) = 1 2 I. ( ) The completely depolarizing channel sends all density matrices to the maximally mixed state.
48 Private Subsystem We call A and B subsystems of C n if we can write C n = (A B) (A B). The subspaces of C n can be viewed as subsystems B for which A is one-dimensional. A subscript on a state will indicate to which subsystem the state belongs, e.g. σ A means the operator belongs to M na.
49 Private Subsystem We call A and B subsystems of C n if we can write C n = (A B) (A B). The subspaces of C n can be viewed as subsystems B for which A is one-dimensional. A subscript on a state will indicate to which subsystem the state belongs, e.g. σ A means the operator belongs to M na. Subsystem encodings first arose in quantum information in 2004 through the work of Bartlett-Rudolph-Spekkens (quantum cryptography) and Kribs-Laflamme-Poulin ( operator quantum error correction).
50 Private Subsystem Definition Let Φ : M n M n be a channel and let B be a subsystem of C n. Then B is a completely private subsystem for Φ if there is a ρ 0 M n and σ A M na such that Definition Φ(σ A σ B ) = ρ 0 for all σ B. Let Φ : M n M n be a channel and let B be a subsystem of C n. Then B is a operator private subsystem for Φ if there is a ρ 0 M n such that Φ(σ A σ B ) = ρ 0 for all σ A, for all σ B
51 Phase Damping Channel Consider the following phase damping channels acting on M 4 : Λ i (ρ) = 1 2 (ρ + Z iρz i ), for all ρ M 4, where Z 1 = Z I 2 and Z 2 = I 2 Z.
52 Phase Damping Channel Consider the following phase damping channels acting on M 4 : Λ i (ρ) = 1 2 (ρ + Z iρz i ), for all ρ M 4, where Z 1 = Z I 2 and Z 2 = I 2 Z. For i = 1, 2, Λ i is not private: the diagonal entries of the input ρ are preserved Eve would be able to learn some information about the original message based on what diagonal terms she observes.
53 Privacy for phase damping channel? Let Λ be the composition of the application of the maps Λ 1 and Λ 2 : Λ(ρ) = Λ 2 Λ 1.
54 Privacy for phase damping channel? Let Λ be the composition of the application of the maps Λ 1 and Λ 2 : Λ(ρ) = Λ 2 Λ 1. The Kraus operators for Λ are { 1 2 I I, 1 2 I Z, 1 2 Z I, 1 2 ZZ}.
55 Privacy for phase damping channel? Let Λ be the composition of the application of the maps Λ 1 and Λ 2 : Λ(ρ) = Λ 2 Λ 1. The Kraus operators for Λ are { 1 2 I I, 1 2 I Z, 1 2 Z I, 1 2 ZZ}. Similar to before, we find Λ preserves the diagonal of the input ρ (in this case the output is a diagonal matrix); no private subspace exists.
56 Privacy for phase damping channel? However, consider a density matrix ρ L = 1 (I I +αxx + βy I +γzx ). 4 We note that Λ(ρ L ) = 1 4 I 2 I 2, for any ρ L of this form. Thus Λ is private for some set of states, which we can show forms a subsystem.
57 Common Physical Gates The T -gate, K = 1 ( ) 1 1, 2 i i CNOT 1,2 = , CNOT 2,1 = ,
58 Private subsystem for phase damping Let U = CNOT 1,2 CNOT 2,1 (K I 2 ). The composition U( )U acts as XX I Y YI I Z ZX I X. Thus, we obtain ρ L ρ = 1 4 (I 2 I 2 +γ I X + α I Y + β I Z). we see the set of operators Uρ L U generate the algebra I 2 M 2. In other words, the set M 4 (S) spanned by all ρ L is isomorphic to I 2 M 2.
59 Quantum Error Correction How can we protect our quantum information against sources of quantum noise?
60 Quantum Error Correction How can we protect our quantum information against sources of quantum noise? Quantum error correction is used to recover information from errors introduced by noise that occurs when sending quantum information through a quantum channel.
61 Quantum Error Correction How can we protect our quantum information against sources of quantum noise? Quantum error correction is used to recover information from errors introduced by noise that occurs when sending quantum information through a quantum channel. Definition Let Φ : M n M n be a channel and let B be a subsystem of M n. Then B is a correctable subsystem for Φ if there exists a quantum channel R, called a recovery operation, such that for all σ A, for all σ B, there exists a τ A we have R Φ(σ A σ B ) = τ A σ B.
62 Quantum Error Correction How can we protect our quantum information against sources of quantum noise? Quantum error correction is used to recover information from errors introduced by noise that occurs when sending quantum information through a quantum channel. Definition Let Φ : M n M n be a channel and let B be a subsystem of M n. Then B is a correctable subsystem for Φ if there exists a quantum channel R, called a recovery operation, such that for all σ A, for all σ B, there exists a τ A we have R Φ(σ A σ B ) = τ A σ B. Note: For correctable subspace S, we have R Φ(ρ) = ρ for all ρ M(S).
63 Complementarity of Private Subspaces Both quantum error correction and quantum cryptography protect against the unwanted leakage, or loss, of quantum information and there is an established connection between such notions: Theorem (Kretschmann-Kribs-Spekkens) Given a conjugate pair of quantum channels Φ, Φ, a subsystem S is error-correctable for one if and only if it is an operator private subsystem for the other. The extreme example of this phenomena is given by a unitary channel paired with the completely depolarizing channel where the entire Hilbert space is the correctable (private) subspace.
64 Example (cont.) For our phase damping channel Λ, we can easily compute the Kraus operators of Λ : We find Λ (U( 1 2 I A σ B )U ) = 1 4 I 2 I 2. Instead of being correctable on the private subsystem I 2 M 2, the complementary channel Λ (with the proper unitary transformation) is completely depolarizing! All information is lost, so there is no possibility of the channel being quantum error correctable.
65 Quantum Circuit Diagram Let Φ : M m M n. Let (V Φ, M k ) be the Stinespring representation for Φ. M n Φ(ρ) = ρ 0 Tr k ρ Mm V Φ Tr n M k M k U R R Φ (ρ) = ρ
66 The big picture ρ Z 0 0 K Z Φ(ρ) + + Mixing ancilla + + Φ (ρ) + + The dotted box ( ) represents the mixed state encoding The dashed box ( ) encodes the state ρ into the mixed state encoding ρ The solid box ( ) performed the private quantum channel
67 From QEC to QCrypto? General Program: Using the algebraic bridge given by the notion of conjugate channels, we wish to investigate what results, techniques, special types of codes, applications, etc,. from the well-studied field of quantum error correction have analogues or versions in the world of private quantum codes and quantum cryptography. At the least, we can use work from QEC as motivation for studies in this different setting.
68 Knill-Laflamme Theorem for QEC Theorem Let S be a subspace of C n and let P be the projector onto M n (S). Suppose Φ is a quantum channel with Kraus operators {E i }. Then there exists an error-correction operation R correcting Φ on S if and only if PEi E jp = α ij P for some Hermitian matrix α = [α ij ] ij of complex numbers.
69 Knill-Laflamme Type Conditions for Private Subspaces Using the bridge between privacy and quantum error correction, we can formulate Knill-Laflamme type conditions for the private setting. Theorem (Kribs P.) Let S be a subspace of C n and let P be the projector onto M n (S). Then S is private for a quantum channel Φ with output state ρ 0 ; i.e., Φ(ρ) = ρ 0 for all ρ M(S) if and only if for all X λ X C : PΦ (X )P = λ X P. In this case, λ X = Tr(ρ 0 X ), where Φ (X ) = i V i XV i.
70 Knill-Laflamme Type Conditions for Private Subsystems Theorem (Jochym-O Connor Kribs Laflamme P.) A subsystem B is private for a channel Φ(ρ) = i V iρvi with fixed σ A M(H A ) and output state ρ 0 if and only if there are complex scalars λ ijkl forming an isometry matrix λ = (λ ijkl ) such that p k V j ψ A,k = i,l λ ijkl ql φ l ψ B,i, where ψ A,k (p k ) and φ l (q l ) are eigenstates (eigenvalues) of σ A and ρ 0 respectively, ψ B,i is an orthonormal basis for B, and where ψ A,k is viewed as a channel from B into S.
71 Necessary Condition for Negative Private Subspace Result Theorem (Jochym-O Connor Kribs Laflamme P.) Let Φ be a quantum channel whose Kraus operators are a set of commuting unitary operators { p i U i }, where p i is a scaling factor such that i p i = 1. Then there exists no private subspace S for Φ.
72 Conclusion We ve seen several variations of private quantum channel/code/subspace/operator subsystem/completely (private) subsystem... Knill-Laflamme analogue for private setting via complementary channels. The theorem linking QEC with quantum cryptography doesn t work for completely private subsystems. Relaxed definition of conjugate channel?
73 Big Picture Over the last 10 years, there s been lots of progress in QEC motivated by operator algebraic approach At this point, much less mathematical development on PQC side; still at an early stage. Still lots to uncover in particular, an overarching mathematical formalism of private subsystems, similar to the Stabilizer formalism in QEC.
Quantum decoherence. Éric Oliver Paquette (U. Montréal) -Traces Worshop [Ottawa]- April 29 th, Quantum decoherence p. 1/2
Quantum decoherence p. 1/2 Quantum decoherence Éric Oliver Paquette (U. Montréal) -Traces Worshop [Ottawa]- April 29 th, 2007 Quantum decoherence p. 2/2 Outline Quantum decoherence: 1. Basics of quantum
More informationLecture 4: Postulates of quantum mechanics
Lecture 4: Postulates of quantum mechanics Rajat Mittal IIT Kanpur The postulates of quantum mechanics provide us the mathematical formalism over which the physical theory is developed. For people studying
More informationLecture 11 September 30, 2015
PHYS 7895: Quantum Information Theory Fall 015 Lecture 11 September 30, 015 Prof. Mark M. Wilde Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike
More informationOperator Quantum Error Correcting Codes
Operator Quantum Error Correcting Codes Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. June 18, 2008 Vlad Gheorghiu (CMU) Operator Quantum Error Correcting
More informationTeleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)
Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Rahul Jain U. Waterloo and Institute for Quantum Computing, rjain@cs.uwaterloo.ca entry editor: Andris Ambainis
More informationHilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.
CS 94- Bell States Bell Inequalities 9//04 Fall 004 Lecture Hilbert Space Entanglement Quantum Gates Bell States Superdense Coding 1 One qubit: Recall that the state of a single qubit can be written as
More information2. Introduction to quantum mechanics
2. Introduction to quantum mechanics 2.1 Linear algebra Dirac notation Complex conjugate Vector/ket Dual vector/bra Inner product/bracket Tensor product Complex conj. matrix Transpose of matrix Hermitian
More informationQuantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139
Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense
More informationSome Introductory Notes on Quantum Computing
Some Introductory Notes on Quantum Computing Markus G. Kuhn http://www.cl.cam.ac.uk/~mgk25/ Computer Laboratory University of Cambridge 2000-04-07 1 Quantum Computing Notation Quantum Computing is best
More informationIntroduction to Quantum Mechanics
Introduction to Quantum Mechanics R. J. Renka Department of Computer Science & Engineering University of North Texas 03/19/2018 Postulates of Quantum Mechanics The postulates (axioms) of quantum mechanics
More informationQuantum Information Types
qitd181 Quantum Information Types Robert B. Griffiths Version of 6 February 2012 References: R. B. Griffiths, Types of Quantum Information, Phys. Rev. A 76 (2007) 062320; arxiv:0707.3752 Contents 1 Introduction
More informationPHY305: Notes on Entanglement and the Density Matrix
PHY305: Notes on Entanglement and the Density Matrix Here follows a short summary of the definitions of qubits, EPR states, entanglement, the density matrix, pure states, mixed states, measurement, and
More informationLecture 3: Hilbert spaces, tensor products
CS903: Quantum computation and Information theory (Special Topics In TCS) Lecture 3: Hilbert spaces, tensor products This lecture will formalize many of the notions introduced informally in the second
More informationBasics on quantum information
Basics on quantum information Mika Hirvensalo Department of Mathematics and Statistics University of Turku mikhirve@utu.fi Thessaloniki, May 2014 Mika Hirvensalo Basics on quantum information 1 of 49 Brief
More informationEnsembles and incomplete information
p. 1/32 Ensembles and incomplete information So far in this course, we have described quantum systems by states that are normalized vectors in a complex Hilbert space. This works so long as (a) the system
More informationQuantum Gates, Circuits & Teleportation
Chapter 3 Quantum Gates, Circuits & Teleportation Unitary Operators The third postulate of quantum physics states that the evolution of a quantum system is necessarily unitary. Geometrically, a unitary
More information. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i.
CS 94- Hilbert Spaces, Tensor Products, Quantum Gates, Bell States 1//07 Spring 007 Lecture 01 Hilbert Spaces Consider a discrete quantum system that has k distinguishable states (eg k distinct energy
More informationBasics on quantum information
Basics on quantum information Mika Hirvensalo Department of Mathematics and Statistics University of Turku mikhirve@utu.fi Thessaloniki, May 2016 Mika Hirvensalo Basics on quantum information 1 of 52 Brief
More informationUnitary evolution: this axiom governs how the state of the quantum system evolves in time.
CS 94- Introduction Axioms Bell Inequalities /7/7 Spring 7 Lecture Why Quantum Computation? Quantum computers are the only model of computation that escape the limitations on computation imposed by the
More informationChapter 5. Density matrix formalism
Chapter 5 Density matrix formalism In chap we formulated quantum mechanics for isolated systems. In practice systems interect with their environnement and we need a description that takes this feature
More informationLecture 6: Quantum error correction and quantum capacity
Lecture 6: Quantum error correction and quantum capacity Mark M. Wilde The quantum capacity theorem is one of the most important theorems in quantum hannon theory. It is a fundamentally quantum theorem
More informationAn Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata
An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of
More information1. Basic rules of quantum mechanics
1. Basic rules of quantum mechanics How to describe the states of an ideally controlled system? How to describe changes in an ideally controlled system? How to describe measurements on an ideally controlled
More informationQubits vs. bits: a naive account A bit: admits two values 0 and 1, admits arbitrary transformations. is freely readable,
Qubits vs. bits: a naive account A bit: admits two values 0 and 1, admits arbitrary transformations. is freely readable, A qubit: a sphere of values, which is spanned in projective sense by two quantum
More informationb) (5 points) Give a simple quantum circuit that transforms the state
C/CS/Phy191 Midterm Quiz Solutions October 0, 009 1 (5 points) Short answer questions: a) (5 points) Let f be a function from n bits to 1 bit You have a quantum circuit U f for computing f If you wish
More informationStructure of Unital Maps and the Asymptotic Quantum Birkhoff Conjecture. Peter Shor MIT Cambridge, MA Joint work with Anand Oza and Dimiter Ostrev
Structure of Unital Maps and the Asymptotic Quantum Birkhoff Conjecture Peter Shor MIT Cambridge, MA Joint work with Anand Oza and Dimiter Ostrev The Superposition Principle (Physicists): If a quantum
More informationEntanglement: concept, measures and open problems
Entanglement: concept, measures and open problems Division of Mathematical Physics Lund University June 2013 Project in Quantum information. Supervisor: Peter Samuelsson Outline 1 Motivation for study
More informationIntroduction to Quantum Information Hermann Kampermann
Introduction to Quantum Information Hermann Kampermann Heinrich-Heine-Universität Düsseldorf Theoretische Physik III Summer school Bleubeuren July 014 Contents 1 Quantum Mechanics...........................
More informationRecovery in quantum error correction for general noise without measurement
Quantum Information and Computation, Vol. 0, No. 0 (2011) 000 000 c Rinton Press Recovery in quantum error correction for general noise without measurement CHI-KWONG LI Department of Mathematics, College
More informationLecture: Quantum Information
Lecture: Quantum Information Transcribed by: Crystal Noel and Da An (Chi Chi) November 10, 016 1 Final Proect Information Find an issue related to class you are interested in and either: read some papers
More informationQuantum computing and mathematical research. Chi-Kwong Li The College of William and Mary
and mathematical research The College of William and Mary Classical computing Classical computing Hardware - Beads and bars. Classical computing Hardware - Beads and bars. Input - Using finger skill to
More informationEntropy in Classical and Quantum Information Theory
Entropy in Classical and Quantum Information Theory William Fedus Physics Department, University of California, San Diego. Entropy is a central concept in both classical and quantum information theory,
More informationSingle qubit + CNOT gates
Lecture 6 Universal quantum gates Single qubit + CNOT gates Single qubit and CNOT gates together can be used to implement an arbitrary twolevel unitary operation on the state space of n qubits. Suppose
More informationDECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS
DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS SCOTT HOTTOVY Abstract. Quantum networks are used to transmit and process information by using the phenomena of quantum mechanics.
More informationIntroduction to quantum information processing
Introduction to quantum information processing Fidelity and other distance metrics Brad Lackey 3 November 2016 FIDELITY AND OTHER DISTANCE METRICS 1 of 17 OUTLINE 1 Noise channels 2 Fidelity 3 Trace distance
More informationTutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction
Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states
More informationLecture 2: Introduction to Quantum Mechanics
CMSC 49: Introduction to Quantum Computation Fall 5, Virginia Commonwealth University Sevag Gharibian Lecture : Introduction to Quantum Mechanics...the paradox is only a conflict between reality and your
More informationBasic Notation and Background
Department of Mathematics, The College of William and Mary, Williamsburg, Virginia, USA; Department of Mathematics, Taiyuan University of Technology, Taiyuan, Shanxi, P.R. of China. Hilbert spaces The
More informationEPR paradox, Bell inequality, etc.
EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project
More informationMathematical Methods for Quantum Information Theory. Part I: Matrix Analysis. Koenraad Audenaert (RHUL, UK)
Mathematical Methods for Quantum Information Theory Part I: Matrix Analysis Koenraad Audenaert (RHUL, UK) September 14, 2008 Preface Books on Matrix Analysis: R. Bhatia, Matrix Analysis, Springer, 1997.
More informationLecture 14: Quantum information revisited
CPSC 59/69: Quantum Computation John Watrous, University of Calgary Lecture 4: Quantum information revisited March 4, 006 So far, this course has focused almost entirely on quantum algorithms The next
More informationLecture 13B: Supplementary Notes on Advanced Topics. 1 Inner Products and Outer Products for Single Particle States
Lecture 13B: Supplementary Notes on Advanced Topics Outer Products, Operators, Density Matrices In order to explore the complexity of many particle systems a different way to represent multiparticle states
More informationLectures 1 and 2: Axioms for Quantum Theory
Lectures 1 and 2: Axioms for Quantum Theory Joseph Emerson Course: AMATH 900/AMATH 495/PHYS 490 Foundations and Interpretations of Quantum Theory Course Instructors: Joseph Emerson and Ray Laflamme Hosted
More informationQuantum Measurements: some technical background
Quantum Measurements: some technical background [From the projection postulate to density matrices & (introduction to) von Neumann measurements] (AKA: the boring lecture) First: One more example I wanted
More informationA review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels
JOURNAL OF CHEMISTRY 57 VOLUME NUMBER DECEMBER 8 005 A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels Miri Shlomi
More informationLecture 6: Further remarks on measurements and channels
CS 766/QIC 820 Theory of Quantum Information Fall 2011) Lecture 6: Further remarks on measurements and channels In this lecture we will discuss a few loosely connected topics relating to measurements and
More informationSUPERDENSE CODING AND QUANTUM TELEPORTATION
SUPERDENSE CODING AND QUANTUM TELEPORTATION YAQIAO LI This note tries to rephrase mathematically superdense coding and quantum teleportation explained in [] Section.3 and.3.7, respectively (as if I understood
More informationQuantum Entanglement and the Bell Matrix
Quantum Entanglement and the Bell Matrix Marco Pedicini (Roma Tre University) in collaboration with Anna Chiara Lai and Silvia Rognone (La Sapienza University of Rome) SIMAI2018 - MS27: Discrete Mathematics,
More informationIntroduction into Quantum Computations Alexei Ashikhmin Bell Labs
Introduction into Quantum Computations Alexei Ashikhmin Bell Labs Workshop on Quantum Computing and its Application March 16, 2017 Qubits Unitary transformations Quantum Circuits Quantum Measurements Quantum
More informationThe Minimax Fidelity for Quantum Channels: Theory and Some Applications
The Minimax Fidelity for Quantum Channels: Theory and Some Applications Maxim Raginsky University of I!inois V.P. Belavkin, G.M. D Ariano and M. Raginsky Operational distance and fidelity for quantum channels
More informationarxiv:quant-ph/ v1 13 Jan 2003
Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The
More informationQUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36
QUANTUM INFORMATION - THE NO-HIDING THEOREM Arun K Pati akpati@iopb.res.in Instititute of Physics, Bhubaneswar-751005, Orissa, INDIA and Th. P. D, BARC, Mumbai-400085, India QUANTUM INFORMATION -THE NO-HIDING
More informationQuantum information and quantum computing
Middle East Technical University, Department of Physics January 7, 009 Outline Measurement 1 Measurement 3 Single qubit gates Multiple qubit gates 4 Distinguishability 5 What s measurement? Quantum measurement
More informationNon-Completely Positive Maps: Properties and Applications
Non-Completely Positive Maps: Properties and Applications By Christopher Wood A thesis submitted to Macquarie University in partial fulfilment of the degree of Bachelor of Science with Honours Department
More informationApplication of Structural Physical Approximation to Partial Transpose in Teleportation. Satyabrata Adhikari Delhi Technological University (DTU)
Application of Structural Physical Approximation to Partial Transpose in Teleportation Satyabrata Adhikari Delhi Technological University (DTU) Singlet fraction and its usefulness in Teleportation Singlet
More informationQUANTUM COMPUTING 10.
QUANTUM COMPUTING 10. Jozef Gruska Faculty of Informatics Brno Czech Republic December 20, 2011 10. QUANTUM ERROR CORRECTION CODES Quantum computing based on pure states and unitary evolutions is an idealization
More information9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.
9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance
More informationOn the Relation between Quantum Discord and Purified Entanglement
On the Relation between Quantum Discord and Purified Entanglement by Eric Webster A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master of Mathematics
More information1 Mathematical preliminaries
1 Mathematical preliminaries The mathematical language of quantum mechanics is that of vector spaces and linear algebra. In this preliminary section, we will collect the various definitions and mathematical
More informationEntanglement Manipulation
Entanglement Manipulation Steven T. Flammia 1 1 Perimeter Institute for Theoretical Physics, Waterloo, Ontario, N2L 2Y5 Canada (Dated: 22 March 2010) These are notes for my RIT tutorial lecture at the
More informationQuantum Entanglement and Measurement
Quantum Entanglement and Measurement Haye Hinrichsen in collaboration with Theresa Christ University of Würzburg, Germany 2nd Workhop on Quantum Information and Thermodynamics Korea Institute for Advanced
More informationLogical error rate in the Pauli twirling approximation
Logical error rate in the Pauli twirling approximation Amara Katabarwa and Michael R. Geller Department of Physics and Astronomy, University of Georgia, Athens, Georgia 30602, USA (Dated: April 10, 2015)
More informationShort Course in Quantum Information Lecture 2
Short Course in Quantum Information Lecture Formal Structure of Quantum Mechanics Course Info All materials downloadable @ website http://info.phys.unm.edu/~deutschgroup/deutschclasses.html Syllabus Lecture
More informationQuantum Hadamard channels (I)
.... Quantum Hadamard channels (I) Vlad Gheorghiu Department of Physics Carnegie Mellon University Pittsburgh, PA 15213, U.S.A. July 8, 2010 Vlad Gheorghiu (CMU) Quantum Hadamard channels (I) July 8, 2010
More informationAn Interpolation Problem by Completely Positive Maps and its. Quantum Cloning
An Interpolation Problem by Completely Positive Maps and its Application in Quantum Cloning College of Mathematics and Information Science, Shaanxi Normal University, Xi an, China, 710062 gzhihua@tom.com
More informationIntroduction to Quantum Computing for Folks
Introduction to Quantum Computing for Folks Joint Advanced Student School 2009 Ing. Javier Enciso encisomo@in.tum.de Technische Universität München April 2, 2009 Table of Contents 1 Introduction 2 Quantum
More informationEntanglement and information
Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit
More informationarxiv: v2 [quant-ph] 16 Mar 2014
Approximate quantum error correction for generalized amplitude damping errors Carlo Cafaro 1, and Peter van Loock 1 Max-Planck Institute for the Science of Light, 91058 Erlangen, Germany and Institute
More informationA Course in Quantum Information Theory
A Course in Quantum Information Theory Ofer Shayevitz Spring 2007 Based on lectures given at the Tel Aviv University Edited by Anatoly Khina Version compiled January 9, 2010 Contents 1 Preliminaries 3
More informationQuantum Physics II (8.05) Fall 2002 Assignment 3
Quantum Physics II (8.05) Fall 00 Assignment Readings The readings below will take you through the material for Problem Sets and 4. Cohen-Tannoudji Ch. II, III. Shankar Ch. 1 continues to be helpful. Sakurai
More informationCompression and entanglement, entanglement transformations
PHYSICS 491: Symmetry and Quantum Information April 27, 2017 Compression and entanglement, entanglement transformations Lecture 8 Michael Walter, Stanford University These lecture notes are not proof-read
More informationA Simple Model of Quantum Trajectories. Todd A. Brun University of Southern California
A Simple Model of Quantum Trajectories Todd A. Brun University of Southern California Outline 1. Review projective and generalized measurements. 2. A simple model of indirect measurement. 3. Weak measurements--jump-like
More informationQuantum Computing Lecture 2. Review of Linear Algebra
Quantum Computing Lecture 2 Review of Linear Algebra Maris Ozols Linear algebra States of a quantum system form a vector space and their transformations are described by linear operators Vector spaces
More informationQuantum Teleportation Pt. 1
Quantum Teleportation Pt. 1 PHYS 500 - Southern Illinois University April 17, 2018 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 1 April 17, 2018 1 / 13 Types of Communication In the
More informationConcentration of Measure Effects in Quantum Information. Patrick Hayden (McGill University)
Concentration of Measure Effects in Quantum Information Patrick Hayden (McGill University) Overview Superdense coding Random states and random subspaces Superdense coding of quantum states Quantum mechanical
More informationAlgebraic Theory of Entanglement
Algebraic Theory of (arxiv: 1205.2882) 1 (in collaboration with T.R. Govindarajan, A. Queiroz and A.F. Reyes-Lega) 1 Physics Department, Syracuse University, Syracuse, N.Y. and The Institute of Mathematical
More informationarxiv:quant-ph/ v1 1 Jul 1998
arxiv:quant-ph/9807006v1 1 Jul 1998 The Heisenberg Representation of Quantum Computers Daniel Gottesman T-6 Group Los Alamos National Laboratory Los Alamos, NM 87545 February 1, 2008 Abstract Since Shor
More informationQuantum Computing Lecture 3. Principles of Quantum Mechanics. Anuj Dawar
Quantum Computing Lecture 3 Principles of Quantum Mechanics Anuj Dawar What is Quantum Mechanics? Quantum Mechanics is a framework for the development of physical theories. It is not itself a physical
More informationQuantum Mechanics and Quantum Computing: an Introduction. Des Johnston, Notes by Bernd J. Schroers Heriot-Watt University
Quantum Mechanics and Quantum Computing: an Introduction Des Johnston, Notes by Bernd J. Schroers Heriot-Watt University Contents Preface page Introduction. Quantum mechanics (partly excerpted from Wikipedia).
More informationMajorization-preserving quantum channels
Majorization-preserving quantum channels arxiv:1209.5233v2 [quant-ph] 15 Dec 2012 Lin Zhang Institute of Mathematics, Hangzhou Dianzi University, Hangzhou 310018, PR China Abstract In this report, we give
More informationPhysics 239/139 Spring 2018 Assignment 6
University of California at San Diego Department of Physics Prof. John McGreevy Physics 239/139 Spring 2018 Assignment 6 Due 12:30pm Monday, May 14, 2018 1. Brainwarmers on Kraus operators. (a) Check that
More informationApplications of Semidefinite Programming in Quantum Cryptography
Applications of Semidefinite Programming in Quantum Cryptography by Jamie W. J. Sikora A thesis presented to the University of Waterloo in fulfillment of the thesis requirement for the degree of Master
More informationIntroduction to Quantum Computing
Introduction to Quantum Computing Petros Wallden Lecture 3: Basic Quantum Mechanics 26th September 2016 School of Informatics, University of Edinburgh Resources 1. Quantum Computation and Quantum Information
More informationCryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1
Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption
More information1 Measurements, Tensor Products, and Entanglement
Stanford University CS59Q: Quantum Computing Handout Luca Trevisan September 7, 0 Lecture In which we describe the quantum analogs of product distributions, independence, and conditional probability, and
More informationCS/Ph120 Homework 1 Solutions
CS/Ph0 Homework Solutions October, 06 Problem : State discrimination Suppose you are given two distinct states of a single qubit, ψ and ψ. a) Argue that if there is a ϕ such that ψ = e iϕ ψ then no measurement
More informationIntroduction to Quantum Cryptography
Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics
More informationInstantaneous Nonlocal Measurements
Instantaneous Nonlocal Measurements Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA July 22, 2010 References Entanglement consumption of instantaneous nonlocal quantum measurements.
More informationPh 219/CS 219. Exercises Due: Friday 20 October 2006
1 Ph 219/CS 219 Exercises Due: Friday 20 October 2006 1.1 How far apart are two quantum states? Consider two quantum states described by density operators ρ and ρ in an N-dimensional Hilbert space, and
More informationarxiv: v2 [quant-ph] 26 Mar 2012
Optimal Probabilistic Simulation of Quantum Channels from the Future to the Past Dina Genkina, Giulio Chiribella, and Lucien Hardy Perimeter Institute for Theoretical Physics, 31 Caroline Street North,
More informationDegradable Quantum Channels
Degradable Quantum Channels Li Yu Department of Physics, Carnegie-Mellon University, Pittsburgh, PA May 27, 2010 References The capacity of a quantum channel for simultaneous transmission of classical
More informationEntanglement and Quantum Teleportation
Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,
More informationA Survey on Quantum Channel Capacities
1 A Survey on Quantum Channel Capacities Laszlo Gyongyosi, 1,2,3, Member, IEEE, Sandor Imre, 2 Senior Member, IEEE, and Hung Viet Nguyen, 1 Member, IEEE 1 School of Electronics and Computer Science, University
More informationQuantum computing! quantum gates! Fisica dell Energia!
Quantum computing! quantum gates! Fisica dell Energia! What is Quantum Computing?! Calculation based on the laws of Quantum Mechanics.! Uses Quantum Mechanical Phenomena to perform operations on data.!
More informationQuantum Entanglement: Detection, Classification, and Quantification
Quantum Entanglement: Detection, Classification, and Quantification Diplomarbeit zur Erlangung des akademischen Grades,,Magister der Naturwissenschaften an der Universität Wien eingereicht von Philipp
More informationIntroduction to Quantum Computation
Chapter 1 Introduction to Quantum Computation 1.1 Motivations The main task in this course is to discuss application of quantum mechanics to information processing (or computation). Why? Education:Asingleq-bitisthesmallestpossiblequantummechanical
More informationQuantum key distribution for the lazy and careless
Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center
More informationA Study of Topological Quantum Error Correcting Codes Part I: From Classical to Quantum ECCs
A Study of Topological Quantum Error Correcting Codes Part I: From Classical to Quantum ECCs Preetum Nairan preetum@bereley.edu Mar 3, 05 Abstract This survey aims to highlight some interesting ideas in
More informationMaximal vectors in Hilbert space and quantum entanglement
Maximal vectors in Hilbert space and quantum entanglement William Arveson arveson@math.berkeley.edu UC Berkeley Summer 2008 arxiv:0712.4163 arxiv:0801.2531 arxiv:0804.1140 Overview Quantum Information
More informationQuantum Information Theory Tutorial
Quantum Information Theory Tutorial Mark M. Wilde Hearne Institute for Theoretical Physics, Department of Physics and Astronomy, Center for Computation and Technology, Louisiana State University, Baton
More information