INTRODUCTION TO QUANTUM COMPUTING
|
|
- Roy Fisher
- 5 years ago
- Views:
Transcription
1 INTRODUCTION TO QUANTUM COMPUTING Writen by: Eleanor Rieffel and Wolfgang Polak Presented by: Anthony Luaders
2 OUTLINE: Introduction Notation Experiment Quantum Bit Quantum Key Distribution Multiple Qubits Entangled Particles Recent News Suggested Reading Sources
3 INTRODUCTION 1980 s, Richard Feynman observed that certain quantum mechanical effects cannot be simulated on a classical computer. 1994, Peter Shor described a polynomial time quantum algorithm for factoring integers.
4 CLASSIC COMPUTING The time it takes to do certain computations can be decreased using parallel processors Exponential decrease in amount of time Exponential increase in the number of processors Exponential increase in the amount of physical space
5 QUANTUM COMPUTING The time it takes to do certain computations can be decreased using parallel processors Exponential decrease in amount of time Linear increase in the number of processors Linear increase in the amount of physical space This is known as quantum parallelism There is a catch While massive parallel computation can be preformed, access to the results is restricted Fix Shor s factorization algorithm Grover s search algorithm
6 OUTLINE: Introduction Notation Experiment Quantum Bit Quantum Key Distribution Multiple Qubits Entangled Particles Recent News Suggested Reading Sources
7 BAR-KET NOTATION The matching bra, x, denotes the conjugate transpose of x Example: The orthonormal basis{ 0, 1 } can be expressed as {(1, 0) T, (0, 1) T } Any complex linear combination of 0 and 1, (a 0 + b 1 ), can be written (a, b) T Note the order of the basis vectors is arbitrary, but it must be consistent
8 NOTATION: INNER AND OUTER PRODUCT The inner product x y - found by combining x and y as in x y Example 0 is a unit vector. 0 0 = 1 Since 0 and 1 are orthogonal we have 0 1 = 0 The outer product x y - found by combining y and x Example 0 1 is the transformation that maps 1 to is the transformation that maps 0 to (0, 0) T
9 OUTLINE: Introduction Notation Experiment Quantum Bit Quantum Key Distribution Multiple Qubits Entangled Particles Recent News Suggested Reading Sources
10 EXPERIMENT Need A strong light source such as a laser pointer Three polarization filters (can be picked up at any camera supply store) Purpose Named A, B and C Polarized horizontally at 45 degrees Demonstrates some of the principles of quantum mechanics through photons and their polarization
11 STEP ONE Shine the laser (light source) at a projection screen Insert filter A between the laser and the screen closer to the light source Assume the incoming light is randomly polarized The output now has half the intensity of the incoming light source
12 STEP TWO Insert filter C between the filter A and the screen closer to the screen The intensity of the output drops to zero
13 STEP THREE Insert filter B between filter A and filter C There will be a small amount of light visible on the screen Exactly one eighth of the original light
14 THE EXPLANATION A photon s polarization state can be modeled by a unit vector a + b (horizontal polarization) (vertical polarization) a and b are complex numbers a 2 + b 2 = 1 The measurement postulate of quantum mechanics states that any device measuring a two-dimensional system has an associated orthonormal basis with respect to which the quantum measurement takes place
15 MEASURING THE STATE Measurement of a state transforms the state into one of the measuring device s associated basis vector The probability that the state is measured as basis vector u is u 2 = a + b has a probability of with probability a 2 with probability b 2 Measurement of the quantum state will change the state to the result of the measurement Measuring = a + b results in Now changes to
16 UNDERSTANDING: STEP ONE & TWO Filter A measures the photon polarization with respect to the basis vector Photons that pass through all have polarization Those that are reflected all have polarization Assume that the light source produces photons with random polarization Filter A will measure 50% of all the photons as horizontally polarized. Filter C will measure these photons with respect to The state = ill be projected onto with probability 0 Thus no photons get through
17 UNDERSTANDING: STEP THREE Filter B measures the quantum state with respect to the basis This can be rewritten as {, } The photons measured as pass through 50% of the photons passing through A will pass through B and be in state Photons will be measured by filter C as with probability 1/2
18 OUTLINE: Introduction Notation Experiment Quantum Bit Quantum Key Distribution Multiple Qubits Entangled Particles Recent News Suggested Reading Sources
19 QUANTUM BIT: QUBIT A quantum bit, or qubit, is a unit vector in a twodimensional complex vector space for which a particular basis, denoted by { 0, 1 }, has been fixed A classical bit can have a state of either 0 or 1 A qubit can have a state of either 0, 1 or both Having a state of both is known as superposition No good classical explination Cannot be viewed as between 0 and 1 Cannot be viewed as a hidden unknown that represents either 0 or 1
20 OUTLINE: Introduction Notation Experiment Quantum Bit Quantum Key Distribution Multiple Qubits Entangled Particles Recent News Suggested Reading Sources
21 QUANTUM KEY DISTRIBUTION In 1984, Bennett and Brassard described the first quantum key distribution scheme Sequences of single qubits can be used to transmit private keys on insecure channels Consider Alice and Bob want to communicate privately They are connected by an ordinary bidirectional open channel They are also connected by a unidirectional quantum channel Both channels can be observed by Eve the ease dropper
22 ESTABLISHING A SECRET KEY Alice sends a sequence of bits to Bob For each bit Alice randomly uses on of the following two bases for encoding each bit s or
23 BOB RECEIVES EACH PHOTON Bob measures the state of the photon he receives by randomly picking either basis Now, Alice and Bob communicate on the open channel by using the same encoding and decoding With this information they can determine which bits were transmitted correctly They will use these keys and discard all others On average they will agree on 50% of all bits transmitted
24 EVE THE EASE DROPPER Suppose Eve measures the state of the photon transmitted by Alice She resends new photons with the measured state She will use the wrong basis roughly 50% of the time Bob measures the resent qubit with the correct basis There will be a 25% probability that he measures the wrong value Thus, ease dropping on the quantum channel is bound to introduce a high error rate that both Alice and Bob can detect
25 OUTLINE: Introduction Notation Experiment Quantum Bit Quantum Key Distribution Multiple Qubits Entangled Particles Recent News Suggested Reading Sources
26 MULTIPLE QUBITS Classical Physics states the possible states of a system of n particles form a vector space of 2n dimensions Based on individual states that can be described by a vector of two-dimensional vector space A quantum system is a different story n qubits have a state space of 2 n dimensions This is what suggest a possible an exponential speed-up of computation on quantum computers over classical computers
27 CARTESIAN VS. TENSOR PRODUCT Classically particles combine through the cartesian product Let V and W be 2 two-dimensional complex vector spaces V = {v 1,v 2 } and W = {w 1,w 2 } The cartesian product of these two is {v 1, v 2, w 1, w 2 } Quantum states combine through the tensor product The tensor product of V and W is {v1 w1,v1 w2,v2 w1,v2 w2} Thus, { 0, 1 }, has basis { 0 0, 0 1, 1 0, 1 1 } Which can be written more compactly as { 00, 01, 10, 11 }
28 A BASIS FOR A 3-QUBIT SYSTEM Has 8 basis vectors In general an n-qubit system has 2 n basis vectors
29 A STATE THAT CANNOT BE DESCRIBED The state is an example We cannot find a 1, a 2, b 1, b 2 such that (a b 1 1 ) (a b 2 1 ) = a 1 b 2 = 0 implies that either a 1 a 2 = 0 or b 1 b 2 = 0 These states have no classical counterpart These states provide the exponential growth of quantum state spaces They are known as entangled states
30 OUTLINE: Introduction Notation Experiment Quantum Bit Quantum Key Distribution Multiple Qubits Entangled Particles Recent News Suggested Reading Sources
31 ENTANGLED PARTICLES If the measurement of one particle has an effect on the other it is considered to be entangled Take the state The probability that the first bit is measured to be 0 is 1/2 if the second bit has not been measured If the second bit had been measured, the probability that the first bit is measured as 0 is either 1 or 0, depending on whether the second bit was measured as 0 or 1 respectively Therefore this state is entangled
32 THE EPR PARADOX Einstein, Podolsky and Rosen proposed an experiment that uses entangled particles in a manner that seemed to violate fundamental principles of relativity. Image Alice has one pair of 1/ / 2 11 and Bob takes the other
33 ALICE AND BOB They are arbitrarily far apart Alice measures her particle and observes state 0 If Bob measures his particle he will also observe 0 This change occurs instantaneously Is it possible for Alice and Bob to communicate faster than the speed of light? No, there is no way for either of them to use this mechanism to communicate Why?
34 WHY: EPR? Einstein, Podolsky and Rosen proposed that each particle has some internal state that completely determines what the result of any given measurement will be. This is an example of a local hidden variable theory An actual experiment showed that Bell s inequality is violated. Quantum mechanics cannot be explained by any local hidden variable theory
35 WHY: CAUSE AND EFFECT? Stated earlier that Alice affects a measurement performed by Bob, this is incorrect It is possible to set up the EPR scenario so that one observer sees Alice measure first, then Bob In this same scenario another observer sees Bob measure first, then Alice Thus, cause and effect cannot be compatible with both observers seeing cause from different people This resolves the EPR paradox All we can say is that Alice and Bob will observe the same random behavior
36 OUTLINE: Introduction Notation Experiment Quantum Bit Quantum Key Distribution Multiple Qubits Entangled Particles Recent News Suggested Reading Sources
37 RECENT NEWS Four qubits 6cm by 6cm chip that holds nine quantum devices 10 qubits could be possible by the end of the year Perfect Diamonds Scientist have developed a new way to manipulate atoms Works at room temperature Cheaper than creating atoms
38 OUTLINE: Introduction Notation Experiment Quantum Bit Quantum Key Distribution Multiple Qubits Entangled Particles Recent News Suggested Reading Sources
39 SUGGESTED READING An Introduction to Quantum Computing for Non- Physicist by Eleanor Rieffel and Wolfgang Polak Approaching Quantum Computing by Dan C. Marinescu and Gabriela M. Marinescu Classical and Quantum Information by Dan C. Marinescu Programming the Universe by Seth Lloyd
40 OUTLINE: Introduction Notation Experiment Quantum Bit Quantum Key Distribution Multiple Qubits Entangled Particles Recent News Suggested Reading Sources
41 SOURCES Rieffel, Eleanor, and Wolfgang Polak. "An Introduction to Quantum Computing for Non-Physicists." AMC Computing Surveys 32.3 (2000): Palmer Science, Jason. "BBC News - Quantum Computing Device Hints at Powerful Future." BBC - Homepage. 22 Mar Web. 11 Apr < Powell, Devin. "Diamond Could Store Quantum Information." Science News. 24 Mar Web. 11 Apr < generic/id/71588/title/ Diamond_could_store_quantum_information>.
An Introduction to Quantum Computing for Non-Physicists
An Introduction to Quantum Computing for Non-Physicists ELEANOR RIEFFEL FX Palo Alto Laboratory AND WOLFGANG POLAK Richard Feynman s observation that certain quantum mechanical effects cannot be simulated
More informationarxiv:quant-ph/ v2 19 Jan 2000
An Introduction to Quantum Computing for Non-Physicists arxiv:quant-ph/9809016 v 19 Jan 000 Eleanor Rieffel FX Palo Alto Labratory and Wolfgang Polak Consultant FX Palo Alto Laboratory, 3400 Hillview Avenue,
More informationIntroduction to Quantum Computing for Folks
Introduction to Quantum Computing for Folks Joint Advanced Student School 2009 Ing. Javier Enciso encisomo@in.tum.de Technische Universität München April 2, 2009 Table of Contents 1 Introduction 2 Quantum
More informationINTRODUCTORY NOTES ON QUANTUM COMPUTATION
INTRODUCTORY NOTES ON QUANTUM COMPUTATION Keith Hannabuss Balliol College, Oxford Hilary Term 2009 Notation. In these notes we shall often use the physicists bra-ket notation, writing ψ for a vector ψ
More informationPhysics is becoming too difficult for physicists. David Hilbert (mathematician)
Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving
More informationAn Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata
An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of
More information1 1D Schrödinger equation: Particle in an infinite box
1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =
More informationB. BASIC CONCEPTS FROM QUANTUM THEORY 93
B. BASIC CONCEPTS FROM QUANTUM THEORY 93 B.5 Superposition B.5.a Bases 1. In QM certain physical quantities are quantized, such as the energy of an electron in an atom. Therefore an atom might be in certain
More information10 - February, 2010 Jordan Myronuk
10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States
More information1 1D Schrödinger equation: Particle in an infinite box
1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider
More informationD. Bouwmeester et. al. Nature (1997) Joep Jongen. 21th june 2007
al D. Bouwmeester et. al. Nature 390 575 (1997) Universiteit Utrecht 1th june 007 Outline 1 3 4 5 EPR Paradox 1935: Einstein, Podolsky & Rosen Decay of a π meson: π 0 e + e + Entangled state: ψ = 1 ( +
More informationQuantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139
Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense
More informationSecurity Implications of Quantum Technologies
Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu
More informationUnitary evolution: this axiom governs how the state of the quantum system evolves in time.
CS 94- Introduction Axioms Bell Inequalities /7/7 Spring 7 Lecture Why Quantum Computation? Quantum computers are the only model of computation that escape the limitations on computation imposed by the
More informationTutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction
Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states
More informationC. QUANTUM INFORMATION 111
C. QUANTUM INFORMATION 111 C Quantum information C.1 Qubits C.1.a Single qubits 1. Qubit: Just as the bits 0 and 1 are represented by distinct physical states, so the quantum bits (or qubits) 0i and 1i
More informationC. QUANTUM INFORMATION 99
C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)
More informationThe Relativistic Quantum World
The Relativistic Quantum World A lecture series on Relativity Theory and Quantum Mechanics Marcel Merk University of Maastricht, Sept 24 Oct 15, 2014 Relativity Quantum Mechanics The Relativistic Quantum
More informationQuantum information and quantum computing
Middle East Technical University, Department of Physics January 7, 009 Outline Measurement 1 Measurement 3 Single qubit gates Multiple qubit gates 4 Distinguishability 5 What s measurement? Quantum measurement
More informationCryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1
Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption
More informationQuantum Information Processing
Quantum Information Processing Jonathan Jones http://nmr.physics.ox.ac.uk/teaching The Information Age Communication Shannon Computation Turing Current approaches are essentially classical which is wrong
More informationTeleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)
Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters) Rahul Jain U. Waterloo and Institute for Quantum Computing, rjain@cs.uwaterloo.ca entry editor: Andris Ambainis
More informationBasics on quantum information
Basics on quantum information Mika Hirvensalo Department of Mathematics and Statistics University of Turku mikhirve@utu.fi Thessaloniki, May 2016 Mika Hirvensalo Basics on quantum information 1 of 52 Brief
More informationIntroduction to Quantum Cryptography
Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics
More informationEntanglement and information
Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit
More informationQuantum Teleportation Pt. 1
Quantum Teleportation Pt. 1 PHYS 500 - Southern Illinois University April 17, 2018 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 1 April 17, 2018 1 / 13 Types of Communication In the
More informationQuantum Cryptography
Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum
More informationQuantum Computing 1. Multi-Qubit System. Goutam Biswas. Lect 2
Quantum Computing 1 Multi-Qubit System Quantum Computing State Space of Bits The state space of a single bit is {0,1}. n-bit state space is {0,1} n. These are the vertices of the n-dimensional hypercube.
More informationFactoring on a Quantum Computer
Factoring on a Quantum Computer The Essence Shor s Algorithm Wolfgang Polak wp@pocs.com Thanks to: Eleanor Rieffel Fuji Xerox Palo Alto Laboratory Wolfgang Polak San Jose State University, 4-14-010 - p.
More informationQuantum Computing. Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract HISTORY OF QUANTUM COMPUTING-
Quantum Computing Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract Formerly, Turing Machines were the exemplar by which computability and efficiency
More informationAn Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009
An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer
More informationEPR paradox, Bell inequality, etc.
EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project
More informationBasics on quantum information
Basics on quantum information Mika Hirvensalo Department of Mathematics and Statistics University of Turku mikhirve@utu.fi Thessaloniki, May 2014 Mika Hirvensalo Basics on quantum information 1 of 49 Brief
More informationChapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution
Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation
More informationQuantum cryptography -the final battle?
Quantum cryptography -the final battle? CS4236 Principles of Computer Security National University of Singapore Jonas Rundberg, NT030157A This presentation Quantum mechanics Introduction Notation Polarized
More informationThe Future. Currently state of the art chips have gates of length 35 nanometers.
Quantum Computing Moore s Law The Future Currently state of the art chips have gates of length 35 nanometers. The Future Currently state of the art chips have gates of length 35 nanometers. When gate lengths
More informationQuantum Teleportation Pt. 3
Quantum Teleportation Pt. 3 PHYS 500 - Southern Illinois University March 7, 2017 PHYS 500 - Southern Illinois University Quantum Teleportation Pt. 3 March 7, 2017 1 / 9 A Bit of History on Teleportation
More information{0,1} = B versus a 0 +b 1 C 2
Quantum Computing 1 Birth of a Qubit {0,1} = B versus a 0 +b 1 C 2 Quantum Computing 2 I believe Quantum Physics is not a prerequisite of quantum computing unless one wants to build a quantum computer.
More informationAn Introduction to Quantum Information and Applications
An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded
More informationHilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.
CS 94- Bell States Bell Inequalities 9//04 Fall 004 Lecture Hilbert Space Entanglement Quantum Gates Bell States Superdense Coding 1 One qubit: Recall that the state of a single qubit can be written as
More informationQuantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G.
Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G. Kwiat Physics 403 talk: December 2, 2014 Entanglement is a feature of compound
More informationSome Introductory Notes on Quantum Computing
Some Introductory Notes on Quantum Computing Markus G. Kuhn http://www.cl.cam.ac.uk/~mgk25/ Computer Laboratory University of Cambridge 2000-04-07 1 Quantum Computing Notation Quantum Computing is best
More informationQuantum Computers. Todd A. Brun Communication Sciences Institute USC
Quantum Computers Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose components are individual
More informationA Superluminal communication solution based on Four-photon entanglement
A Superluminal communication solution based on Four-photon entanglement Jia-Run Deng cmos001@163.com Abstract : Based on the improved design of Four-photon entanglement device and the definition of Encoding
More informationIntroduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan
Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography D. J. Guan Abstract The development of quantum algorithms and quantum information theory, as well as the design
More informationIntroduction. An Introduction to Quantum Computation and Quantum Communication. Why would we care? What approximation do we remove?
An Introduction to Quantum Computation and Quantum Communication Rob Pike Bell Labs Lucent Technologies rob@plan9.bell-labs.com June 23, 2000 An analogy: Introduction Newtonian physics is an approximation
More informationBasic concepts from quantum theory
B. BASIC CONCEPTS FROM QUANTUM THEORY 77 B Basic concepts from quantum theory B.1 Introduction B.1.a Bases In quantum mechanics certain physical quantities are quantized, such as the energy of an electron
More informationMeasuring Quantum Teleportation. Team 10: Pranav Rao, Minhui Zhu, Marcus Rosales, Marc Robbins, Shawn Rosofsky
Measuring Quantum Teleportation Team 10: Pranav Rao, Minhui Zhu, Marcus Rosales, Marc Robbins, Shawn Rosofsky What does Quantum Mechanics have to do with Teleportation? QM exhibits non-locality What is
More informationLECTURE NOTES ON Quantum Cryptography
Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationA review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels
JOURNAL OF CHEMISTRY 57 VOLUME NUMBER DECEMBER 8 005 A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels Miri Shlomi
More informationSUPERDENSE CODING AND QUANTUM TELEPORTATION
SUPERDENSE CODING AND QUANTUM TELEPORTATION YAQIAO LI This note tries to rephrase mathematically superdense coding and quantum teleportation explained in [] Section.3 and.3.7, respectively (as if I understood
More informationQuantum Gates, Circuits & Teleportation
Chapter 3 Quantum Gates, Circuits & Teleportation Unitary Operators The third postulate of quantum physics states that the evolution of a quantum system is necessarily unitary. Geometrically, a unitary
More informationA Matlab Realization of Shor s Quantum Factoring Algorithm
1 A Matlab Realization of Shor s Quantum Factoring Algorithm S. Jha, P. Chatterjee, A.Falor and M. Chakraborty, Member IEEE Department of Information Technology Institute of Engineering & Management Kolkata,
More informationIntroduction to Quantum Mechanics
Introduction to Quantum Mechanics R. J. Renka Department of Computer Science & Engineering University of North Texas 03/19/2018 Postulates of Quantum Mechanics The postulates (axioms) of quantum mechanics
More informationQuantum Communication
Quantum Communication Harry Buhrman CWI & University of Amsterdam Physics and Computing Computing is physical Miniaturization quantum effects Quantum Computers ) Enables continuing miniaturization ) Fundamentally
More informationSecrets of Quantum Information Science
Secrets of Quantum Information Science Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose
More information1 Measurements, Tensor Products, and Entanglement
Stanford University CS59Q: Quantum Computing Handout Luca Trevisan September 7, 0 Lecture In which we describe the quantum analogs of product distributions, independence, and conditional probability, and
More information6.896 Quantum Complexity Theory September 9, Lecture 2
6.96 Quantum Complexity Theory September 9, 00 Lecturer: Scott Aaronson Lecture Quick Recap The central object of study in our class is BQP, which stands for Bounded error, Quantum, Polynomial time. Informally
More informationQuantum Computers. Peter Shor MIT
Quantum Computers Peter Shor MIT 1 What is the difference between a computer and a physics experiment? 2 One answer: A computer answers mathematical questions. A physics experiment answers physical questions.
More informationBell s inequalities and their uses
The Quantum Theory of Information and Computation http://www.comlab.ox.ac.uk/activities/quantum/course/ Bell s inequalities and their uses Mark Williamson mark.williamson@wofson.ox.ac.uk 10.06.10 Aims
More informationLecture 2: Introduction to Quantum Mechanics
CMSC 49: Introduction to Quantum Computation Fall 5, Virginia Commonwealth University Sevag Gharibian Lecture : Introduction to Quantum Mechanics...the paradox is only a conflict between reality and your
More information5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes
5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.
More information. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i.
CS 94- Hilbert Spaces, Tensor Products, Quantum Gates, Bell States 1//07 Spring 007 Lecture 01 Hilbert Spaces Consider a discrete quantum system that has k distinguishable states (eg k distinct energy
More informationHacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security
Hacking Quantum Cryptography Marina von Steinkirch ~ Yelp Security Agenda 1. Quantum Mechanics in 10 mins 2. Quantum Computing in 11 mins 3. Quantum Key Exchange in 100 mins (or more minutes) Some disclaimers
More informationarxiv:quant-ph/ v2 2 Jan 2007
Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1
More informationEntanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen
Entanglement arnoldzwicky.org Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen PHYS403, July 26, 2017 Entanglement A quantum object can
More informationQuantum Teleportation with Photons. Bouwmeester, D; Pan, J-W; Mattle, K; et al. "Experimental quantum teleportation". Nature 390, 575 (1997).
Quantum Teleportation with Photons Jessica Britschgi Pascal Basler Bouwmeester, D; Pan, J-W; Mattle, K; et al. "Experimental quantum teleportation". Nature 390, 575 (1997). Outline The Concept of Quantum
More informationLogic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation
Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate
More information2. Introduction to quantum mechanics
2. Introduction to quantum mechanics 2.1 Linear algebra Dirac notation Complex conjugate Vector/ket Dual vector/bra Inner product/bracket Tensor product Complex conj. matrix Transpose of matrix Hermitian
More informationLecture 4. QUANTUM MECHANICS FOR MULTIPLE QUBIT SYSTEMS
Lecture 4. QUANTUM MECHANICS FOR MULTIPLE QUBIT SYSTEMS 4.1 Multiple Qubits Next we consider a system of two qubits. If these were two classical bits, then there would be four possible states,, 1, 1, and
More informationarxiv:quant-ph/ v1 13 Jan 2003
Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The
More informationEntanglement and Quantum Teleportation
Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,
More informationUnconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel
Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel Kiyoshi Tamaki *Perimeter Institute for Theoretical Physics Collaboration with Masato Koashi
More information9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.
9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance
More informationEnigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski
1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every
More information1. Introduction: Seminar Report Quantum Computing
1. Introduction: Civilization has advanced as people discovered new ways of exploiting various physical resources such as materials, forces and energies. In the twentieth century information was added
More informationQuantum Information Transfer and Processing Miloslav Dušek
Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the
More informationUsing Quantum Effects for Computer Security
Using Quantum Effects for Computer Security Arran Hartgroves, James Harvey, Kiran Parmar Thomas Prosser, Michael Tucker December 3, 2004 1 Introduction Computer security is a rapidly changing field. New
More informationarxiv:quant-ph/ v2 3 Oct 2000
Quantum key distribution without alternative measurements Adán Cabello Departamento de Física Aplicada, Universidad de Sevilla, 0 Sevilla, Spain January, 0 arxiv:quant-ph/990v Oct 000 Entanglement swapping
More informationAdvanced Cryptography Quantum Algorithms Christophe Petit
The threat of quantum computers Advanced Cryptography Quantum Algorithms Christophe Petit University of Oxford Christophe Petit -Advanced Cryptography 1 Christophe Petit -Advanced Cryptography 2 The threat
More informationA single quantum cannot be teleported
1 quant-ph/010060 A single quantum cannot be teleported Daniele Tommasini Departamento de Física Aplicada, Universidad de Vigo, 3004 Ourense, Spain Due to the Heisemberg uncertainty principle, it is impossible
More informationEntanglement and nonlocality
Entanglement and nonlocality (collected notes) Fabio Grazioso 2015-06-24 23:06 EDT 2 Contents 1 Introduction 5 1.1 foreword.................................... 5 1.2 general picture................................
More informationQuantum key distribution for the lazy and careless
Quantum key distribution for the lazy and careless Noisy preprocessing and twisted states Joseph M. Renes Theoretical Quantum Physics, Institut für Angewandte Physik Technische Universität Darmstadt Center
More informationProblem Set: TT Quantum Information
Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C
More informationDevice-Independent Quantum Information Processing
Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information
More informationA probabilistic quantum key transfer protocol
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska
More informationQuantum Entanglement and Cryptography. Deepthi Gopal, Caltech
+ Quantum Entanglement and Cryptography Deepthi Gopal, Caltech + Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts
More informationQuantum Measurement and Bell s Theorem
Chapter 7 Quantum Measurement and Bell s Theorem The combination of the facts that there is a probability amplitude that superimposes states a from adding of all paths, a wavelike property, and the interactions
More informationHonors 225 Physics Study Guide/Chapter Summaries for Final Exam; Roots Chapters 15-18
Honors 225 Physics Study Guide/Chapter Summaries for Final Exam; Roots Chapters 15-18 Chapter 15 Collapsing the Wave If a particle is in a quantum superposition state (that is, a superposition of eigenfunctions
More informationDetection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations
Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum
More informationIntroduction to Quantum Key Distribution
Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is
More informationQuantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII
Quantum cryptography Part XIII Quantum cryptography Quantum cryptography has a potential to be cryptography of st century. An important new feature of quantum cryptography is that security of quantum cryptographic
More informationQuantum Entanglement Assisted Key Distribution
Quantum Entanglement Assisted Key Distribution Ke Tang *, Ping Ji *+, Xiaowen Zhang * Graduate Center, City University of New York, ke.tang@qc.cuny.edu + John Jay College of Criminal Justice, City University
More informationQuantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií
České vysoké učení technické v Praze Fakulta informačních technologií Katedra teoretické informatiky Evropský sociální fond Praha & EU: Investujeme do vaší budoucnosti MI-MVI Methods of Computational Intelligence(2010/2011)
More informationPh 219/CS 219. Exercises Due: Friday 3 November 2006
Ph 9/CS 9 Exercises Due: Friday 3 November 006. Fidelity We saw in Exercise. that the trace norm ρ ρ tr provides a useful measure of the distinguishability of the states ρ and ρ. Another useful measure
More informationQuantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security
Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD
More informationA New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)
A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport
More informationEntanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017
Entanglement Michelle Victora Advisor: Paul G. Kwiat Physics 403 talk: March 13, 2017 Introduction to entanglement Making entanglement in the lab Applications Quantum states describing more than one system
More informationQuantum Cryptography. Marshall Roth March 9, 2007
Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and
More informationLecture 4: Postulates of quantum mechanics
Lecture 4: Postulates of quantum mechanics Rajat Mittal IIT Kanpur The postulates of quantum mechanics provide us the mathematical formalism over which the physical theory is developed. For people studying
More information