Uncertainty Principle
|
|
- Sophia Taylor
- 5 years ago
- Views:
Transcription
1 Uncertainty Principle n n A Fourier transform of f is a function of frequency v Let be Δv the frequency range n It can be proved that ΔtΔv 1/(4 π) n n If Δt is small, f corresponds to a small interval of the whole function n Lower frequencies are not represented For higher frequency range, a big interval of the function n Good frequency representation, bad time resolution, Δt is big 1
2 n One cannot know what spectral components exist at what instances of times n What one can know are the time intervals in which certain band of frequencies exist, which is a resolution problem n The problem has to do with the width of the window function that is used Narrow window è good time resolution, poor frequency resolution Wide window è good frequency resolution, poor time resolution Conjugate pairs n Another unexpected property of the nature: n Physical variables come in conjugate pairs n Position and momentum n Energy and time n Both of which cannot be simultaneously measured with accuracy 2
3 Uncertainty principle n If p and q are conjugate pairs n Position and momentum n Energy and time n Both cannot be simultaneously measured with arbitrarily high accuracy Uncertainty principle n A Fourier transform of f is a function of frequency v n Let be Δv the frequency range ΔtΔv 1/(4 π) n Planck: n Energy is bounded in discrete packets called quanta n Every energy quantum is associated with an oscillatory phenomenon, having a certain frequency 3
4 n The probability of observing θ i when the system is in state x i is x E( θ i )x n We can compute the expected value of an observable A in state x H n n The expected value E x (A) = θ 1 x E( θ 1 )x +!+ 1 θ m x E( θ m )x E x (A) = x θ 1 E( θ 1 ) +!+ x θ m E( θ m )x E x (A) = x Ax n Now if we measure a particular observable  of a quantum state ψ and always obtain the same answer, then must be eigenstate of  (It is sharp) n ψ is eigenvector of Â, a is real ψ ˆ A ψ = a ψ a R 4
5 n Now let us consider of measuring a different observable represented by the operator B ˆ, ψ for which is not an eigenstate of B ˆ n If we measure the observable B ˆ of the quantum system in state ψ we would typically obtain different answers each time we made the measurements ˆ A = ˆ A ψ = ψ Aψ n The notation refers to the average value that you would obtain if one puts repeatedly the system in the same state ψ and one would repeatedly measure the observable µ = E ψ (A) = ˆ A = ˆ A ψ = ψ Aψ 5
6 n The root mean square deviation of the observables is given by (standard deviation) Δ ˆ A = A ˆ 2 A ˆ 2 Δ ˆ B = B ˆ 2 B ˆ 2 Var ψ (A) = E ψ ((A µ) 2 ) = (A µ)ψ 2 n The quantities quantify the uncertainty with which the values of the observables are known n As ψ is an eigenstate of the observable Â, then because the same answer is obtained each time the observable  is measured Δ ˆ A = 0 Δ ˆ A and Δ ˆ B n However as ψ is not the eigenstate of B ˆ, Δ ˆ B 0 6
7 n The question arise as to what happens if we try to measure both observables n The answer depends on the order in which we make the measurements n If we measured observable  first, then the act of measurement would not perturb the state since is already eigenstate of  n If we measured the observable first, then as ψ is not eigenstate of B ˆ, the act of measuring ψ will perturb the state of the system n We look at the difference between measurements performed in each order n To do it we construct the commutator operator A ˆ, B ˆ A B ˆ B ˆ A ˆ [ ] = ˆ B ˆ 7
8 n It can be shown that if two observables are measured simultaneously, the uncertainty in their joint values must always obey the inequality (Heisenberg Uncertainty) ΔA ˆ ΔB ˆ 1 [ ˆ 2 A, B ˆ ] Δ ˆ A Δ ˆ B 1 2 x [ A ˆ, B ˆ ]x Var ψ (A)Var ψ (B) 1 4 x [ A ˆ, B ˆ ]x 2 n The inequality follows from Cauchy- Schwarz inequality 8
9 n Gives one form of the Robertson- Schroinger relation: Δ ˆ A Δ ˆ B 1 2 [ A ˆ, B ˆ ] Δ ˆ A Δ ˆ B 1 2 x [ A ˆ, B ˆ ]x Var ψ (A)Var ψ (B) 1 4 x [ A ˆ, B ˆ ]x 2 9
10 n Quantum annealing is a method for finding the global minimum of a function n Quantum annealing attempts to avoid local minima by means of a quantum fluctuation parameter that replaces a state by a randomly selected neighboring state. 10
11 n In quantum annealing, the quantum fluctuation parameter replaces a local minimum state with a randomly selected neighboring state in some fixed radius. n The neighborhood extends over the whole search space at the beginning, and then, it is slowly reduced until the neighborhood shrinks to those few states that differ minimally from the current states. n In a quantum system, the quantum fluctuation can be performed directly by an adiabatic process rather than needing to be simulated. n These processes are based on quantum tunneling 11
12 n The Heisenberg uncertainty principle means that some energy can be borrowed, to overcome some mountain and go out of a minimum as long as we repay it in the time interval n Quantum tunneling is based on the Heisenberg uncertainty principle and the wave-particle duality of matter represented by the wave propagation. 12
13 n Quantum annealing can speed up some machine learning tasks that are based on a gradient descent method, such as the back-propagation algorithm that is used in artificial neural networks. It is an alternative to the simulated annealing that is used in the learning and optimization tasks. 13
14 Polarization n Reduce a message to a sequence of bits and then create a stream of photons placed in a certain quantum state corresponding to these bits n The photon property we are interested is called polarization 14
15 n It is possible to create photons with its electric fields oscillating in any desired plane n Polarized photons whose electric fields oscillate in a plane either 0º or 90º to some line rectilinear n Polarized photons whose electric fields oscillate in a plane either 45º or 135º diagonal n Binary 0 represented by 0º and 45º n Binary 1 represented by 90º and 135º 15
16 Measuring the polarization n It is necessary to measure the polarization n We perform the measurements with calcium carbonate crystal n It has the property of bifrigence n Electrons are not bound with equal strength n Photon passing through the crystal will feel a different electromagnetic force depending on the orientation of its electric field n Polarized photons whose electric fields oscillate in a plane either 0º or 90º to some line rectilinear n If the polarization axis is aligned so that vertical 90º polarized photons pass through it n A photon with horizontal polarization 0º will also pass through the crystal but it will emerge shifted 16
17 n Polarized photons whose electric fields oscillate in a plane either 45º or 135º diagonal n Uncertainty principle says that the polarizer provides no information about the original polarization n The calcite crystal has to be aligned in diagonal n It is impossible to measure both rectilinear and diagonal polarization exactly n Any attempt to measure rectilinear polarization perturbs the diagonal polarization and vice verse n Why? The commutator describing both measurements does not vanish 17
18 n We can design a secret protocol for exchanging a secret key n It can be guaranteed, that nobody interferes with the message n An eavesdropping can be detected n Alice makes to encode bits as polarized photons (first row) n Then each bit she chose to encode it either rectilinear (+) or in the diagonal polarization (x), the choice is made randomly n Alice then sends the photons she created to bob (third row) 18
19 n Bob receipts the photons (first row) n He chooses a polarizer orientation with which he measures the direction of polarization (randomly) n He reconstructs the bits (third row) n Detection of eavesdropping n Alice and Bob compare a subset of bits which were generated with same polarization n The must be equal! n 19
20 n If they are not equal, it means that some one other has measured them, there was an eavesdropping! n Once Alice and Bob decided that the channel is secure, Alice tells Bob what polarization she used for each of her bits n Bob compares his polarization and read the bits, tells Alice about his polarization n These bits are now only known to Bob and Alice! 20
21 IBM s Watson Research Center
Quantum Cryptography
Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum
More information1 1D Schrödinger equation: Particle in an infinite box
1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =
More information1 1D Schrödinger equation: Particle in an infinite box
1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider
More information+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1
Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction
More informationQuantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139
Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense
More informationAn Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata
An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of
More informationPhysics is becoming too difficult for physicists. David Hilbert (mathematician)
Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving
More informationIntroduction to Quantum Cryptography
Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics
More informationPhysical Measurement. Uncertainty Principle for Measurement
Physical Measurement Uncertainty Principle for Measurement Measuring rod is marked in equispaced intervals of which there are N of one unit of measurement size of the interval is 1/N The measuring variable
More information9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.
9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance
More informationSecurity Implications of Quantum Technologies
Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu
More informationQuantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security
Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD
More informationEntanglement and information
Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit
More informationEnigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski
1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every
More information2. Introduction to quantum mechanics
2. Introduction to quantum mechanics 2.1 Linear algebra Dirac notation Complex conjugate Vector/ket Dual vector/bra Inner product/bracket Tensor product Complex conj. matrix Transpose of matrix Hermitian
More informationHilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.
CS 94- Bell States Bell Inequalities 9//04 Fall 004 Lecture Hilbert Space Entanglement Quantum Gates Bell States Superdense Coding 1 One qubit: Recall that the state of a single qubit can be written as
More informationQuantum Mechanics is Linear Algebra. Noah Graham Middlebury College February 25, 2014
Quantum Mechanics is Linear Algebra Noah Graham Middlebury College February 25, 24 Linear Algebra Cheat Sheet Column vector quantum state: v = v v 2. Row vector dual state: w = w w 2... Inner product:
More informationQuantum Entanglement and Cryptography. Deepthi Gopal, Caltech
+ Quantum Entanglement and Cryptography Deepthi Gopal, Caltech + Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts
More informationEntanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017
Entanglement Michelle Victora Advisor: Paul G. Kwiat Physics 403 talk: March 13, 2017 Introduction to entanglement Making entanglement in the lab Applications Quantum states describing more than one system
More informationContinuous quantum states, Particle on a line and Uncertainty relations
Continuous quantum states, Particle on a line and Uncertainty relations So far we have considered k-level (discrete) quantum systems. Now we turn our attention to continuous quantum systems, such as a
More informationNetwork Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices
Global Journal of Computer Science and Technology Volume 11 Issue 12 Version 1.0 July Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:
More informationA probabilistic quantum key transfer protocol
SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska
More information5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes
5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.
More informationquantum distribution of a sudoku key Sian K. Jones University of South Wales
Games and Puzzles quantum distribution of a sudoku key Sian K. Jones University of South Wales sian-kathryn.jones@southwales.ac.uk Abstract: Sudoku grids are often cited as being useful in cryptography
More informationPing Pong Protocol & Auto-compensation
Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol
More informationSection 6: Measurements, Uncertainty and Spherical Symmetry Solutions
Physics 143a: Quantum Mechanics I Spring 015, Harvard Section 6: Measurements, Uncertainty and Spherical Symmetry Solutions Here is a summary of the most important points from the recent lectures, relevant
More informationCryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1
Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption
More informationFundamental of Spectroscopy for Optical Remote Sensing Xinzhao Chu I 10 3.4. Principle of Uncertainty Indeterminacy 0. Expression of Heisenberg s Principle of Uncertainty It is worth to point out that
More informationQuantum cryptography -the final battle?
Quantum cryptography -the final battle? CS4236 Principles of Computer Security National University of Singapore Jonas Rundberg, NT030157A This presentation Quantum mechanics Introduction Notation Polarized
More informationLecture 4 (Sep. 18, 2017)
Lecture 4 8.3 Quantum Theory I, Fall 07 Lecture 4 (Sep. 8, 07) 4. Measurement 4.. Spin- Systems Last time, we said that a general state in a spin- system can be written as ψ = c + + + c, (4.) where +,
More information10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem.
10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem. Clifton, Bub, Halvorson (2003) Motivation: Can quantum physics be reduced to information-theoretic principles? CBH Theorem:
More informationQuantum Dense Coding and Quantum Teleportation
Lecture Note 3 Quantum Dense Coding and Quantum Teleportation Jian-Wei Pan Bell states maximally entangled states: ˆ Φ Ψ Φ x σ Dense Coding Theory: [C.. Bennett & S. J. Wiesner, Phys. Rev. Lett. 69, 88
More informationElectron in a Box. A wave packet in a square well (an electron in a box) changing with time.
Electron in a Box A wave packet in a square well (an electron in a box) changing with time. Last Time: Light Wave model: Interference pattern is in terms of wave intensity Photon model: Interference in
More informationSecrecy and the Quantum
Secrecy and the Quantum Benjamin Schumacher Department of Physics Kenyon College Bright Horizons 35 (July, 2018) Keeping secrets Communication Alice sound waves, photons, electrical signals, paper and
More informationLECTURE NOTES ON Quantum Cryptography
Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq
More informationarxiv:quant-ph/ v1 13 Jan 2003
Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The
More informationEPR paradox, Bell inequality, etc.
EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project
More informationPh 219/CS 219. Exercises Due: Friday 3 November 2006
Ph 9/CS 9 Exercises Due: Friday 3 November 006. Fidelity We saw in Exercise. that the trace norm ρ ρ tr provides a useful measure of the distinguishability of the states ρ and ρ. Another useful measure
More informationAlternative Approaches Quantum Cryptography and Bounded Storage Model
JASS 05 - Course 1 Alternative Approaches Quantum Cryptography and Bounded Storage Model Andreas Würfl 28th March 2005 Abstract Several encryption algorithms have been discussed in the course of this seminar.
More informationBits. Chapter 1. Information can be learned through observation, experiment, or measurement.
Chapter 1 Bits Information is measured in bits, just as length is measured in meters and time is measured in seconds. Of course knowing the amount of information is not the same as knowing the information
More informationProblem Set: TT Quantum Information
Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C
More informationThe Relativistic Quantum World
The Relativistic Quantum World A lecture series on Relativity Theory and Quantum Mechanics Marcel Merk University of Maastricht, Sept 24 Oct 15, 2014 Relativity Quantum Mechanics The Relativistic Quantum
More informationResearch Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract
Research Proposal for Secure Double slit experiment Sandeep Cheema Security Analyst, Vichara Technologies Abstract The key objective of this research proposal is to resolve or advance with the measurement
More informationLecture: Quantum Information
Lecture: Quantum Information Transcribed by: Crystal Noel and Da An (Chi Chi) November 10, 016 1 Final Proect Information Find an issue related to class you are interested in and either: read some papers
More informationCS/Ph120 Homework 8 Solutions
CS/Ph0 Homework 8 Solutions December, 06 Problem : Thinking adversarially. Solution: (Due to De Huang) Attack to portocol : Assume that Eve has a quantum machine that can store arbitrary amount of quantum
More informationIntroduction to particle physics Lecture 3: Quantum Mechanics
Introduction to particle physics Lecture 3: Quantum Mechanics Frank Krauss IPPP Durham U Durham, Epiphany term 2010 Outline 1 Planck s hypothesis 2 Substantiating Planck s claim 3 More quantisation: Bohr
More informationA Matlab Realization of Shor s Quantum Factoring Algorithm
1 A Matlab Realization of Shor s Quantum Factoring Algorithm S. Jha, P. Chatterjee, A.Falor and M. Chakraborty, Member IEEE Department of Information Technology Institute of Engineering & Management Kolkata,
More informationLecture 18: Quantum Information Theory and Holevo s Bound
Quantum Computation (CMU 1-59BB, Fall 2015) Lecture 1: Quantum Information Theory and Holevo s Bound November 10, 2015 Lecturer: John Wright Scribe: Nicolas Resch 1 Question In today s lecture, we will
More informationPhysics ; CS 4812 Problem Set 4
Physics 4481-7681; CS 4812 Problem Set 4 Six problems (six pages), all short, covers lectures 11 15, due in class 25 Oct 2018 Problem 1: 1-qubit state tomography Consider a 1-qubit state ψ cos θ 2 0 +
More informationQuantum Gates, Circuits & Teleportation
Chapter 3 Quantum Gates, Circuits & Teleportation Unitary Operators The third postulate of quantum physics states that the evolution of a quantum system is necessarily unitary. Geometrically, a unitary
More informationA review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels
JOURNAL OF CHEMISTRY 57 VOLUME NUMBER DECEMBER 8 005 A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels Miri Shlomi
More informationLecture 6: Quantum error correction and quantum capacity
Lecture 6: Quantum error correction and quantum capacity Mark M. Wilde The quantum capacity theorem is one of the most important theorems in quantum hannon theory. It is a fundamentally quantum theorem
More informationA Simple Model of Quantum Trajectories. Todd A. Brun University of Southern California
A Simple Model of Quantum Trajectories Todd A. Brun University of Southern California Outline 1. Review projective and generalized measurements. 2. A simple model of indirect measurement. 3. Weak measurements--jump-like
More information1 Mathematical preliminaries
1 Mathematical preliminaries The mathematical language of quantum mechanics is that of vector spaces and linear algebra. In this preliminary section, we will collect the various definitions and mathematical
More informationCommunication Complexity. The dialogues of Alice and Bob...
Communication Complexity The dialogues of Alice and Bob... Alice and Bob make a date Alice and Bob make a date Are you free on Friday? Alice and Bob make a date Are you free on Friday? No, have to work
More informationExperiments testing macroscopic quantum superpositions must be slow
Experiments testing macroscopic quantum superpositions must be slow spatial (Scientic Reports (2016) - arxiv:1509.02408) Andrea Mari, Giacomo De Palma, Vittorio Giovannetti NEST - Scuola Normale Superiore
More informationDiscrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution
CS 70 Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution 1. Polynomial intersections Find (and prove) an upper-bound on the number of times two distinct degree
More informationAQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013
AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013 Lecturer: Dr. Mark Tame Introduction With the emergence of new types of information, in this case
More informationIntroduction to Quantum Key Distribution
Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is
More informationHacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security
Hacking Quantum Cryptography Marina von Steinkirch ~ Yelp Security Agenda 1. Quantum Mechanics in 10 mins 2. Quantum Computing in 11 mins 3. Quantum Key Exchange in 100 mins (or more minutes) Some disclaimers
More informationTutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction
Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states
More informationAPPLICATIONS. Quantum Communications
SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction
More informationEntanglement and Quantum Teleportation
Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,
More informationQuantum Physics in the Nanoworld
Hans Lüth Quantum Physics in the Nanoworld Schrödinger's Cat and the Dwarfs 4) Springer Contents 1 Introduction 1 1.1 General and Historical Remarks 1 1.2 Importance for Science and Technology 3 1.3 Philosophical
More informationSingle and Entangled photons. Edward Pei
Single and Entangled photons Edward Pei War is most commonly thought of as men fighting with their fist, and power is determined by physical strength. Behind the lines, however, knowledge is power. For
More informationQuantum Measurement and Bell s Theorem
Chapter 7 Quantum Measurement and Bell s Theorem The combination of the facts that there is a probability amplitude that superimposes states a from adding of all paths, a wavelike property, and the interactions
More informationChapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution
Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation
More informationSemiconductor Physics and Devices
Introduction to Quantum Mechanics In order to understand the current-voltage characteristics, we need some knowledge of electron behavior in semiconductor when the electron is subjected to various potential
More information10 - February, 2010 Jordan Myronuk
10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States
More informationCryptography in a quantum world
T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?
More informationA New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)
A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport
More informationIntroduction to Quantum Mechanics
Introduction to Quantum Mechanics R. J. Renka Department of Computer Science & Engineering University of North Texas 03/19/2018 Postulates of Quantum Mechanics The postulates (axioms) of quantum mechanics
More informationPhysics 217 Problem Set 1 Due: Friday, Aug 29th, 2008
Problem Set 1 Due: Friday, Aug 29th, 2008 Course page: http://www.physics.wustl.edu/~alford/p217/ Review of complex numbers. See appendix K of the textbook. 1. Consider complex numbers z = 1.5 + 0.5i and
More informationQuantum decoherence. Éric Oliver Paquette (U. Montréal) -Traces Worshop [Ottawa]- April 29 th, Quantum decoherence p. 1/2
Quantum decoherence p. 1/2 Quantum decoherence Éric Oliver Paquette (U. Montréal) -Traces Worshop [Ottawa]- April 29 th, 2007 Quantum decoherence p. 2/2 Outline Quantum decoherence: 1. Basics of quantum
More informationRevision Guide for Chapter 7
Revision Guide for Chapter 7 Contents Student s Checklist Revision Notes Path of least time... 4 Interference of photons... 5 Quantum behaviour... 5 Photons... 6 Electron diffraction... 7 Probability...
More informationPLEASE LET ME KNOW IF YOU FIND TYPOS (send to
Teoretisk Fysik KTH Advanced QM (SI2380), Lecture 2 (Summary of concepts) 1 PLEASE LET ME KNOW IF YOU FIND TYPOS (send email to langmann@kth.se) The laws of QM 1. I now discuss the laws of QM and their
More informationQuantum Mechanics C (130C) Winter 2014 Final exam
University of California at San Diego Department of Physics Prof. John McGreevy Quantum Mechanics C (130C Winter 014 Final exam Please remember to put your name on your exam booklet. This is a closed-book
More informationNumber theory (Chapter 4)
EECS 203 Spring 2016 Lecture 12 Page 1 of 8 Number theory (Chapter 4) Review Compute 6 11 mod 13 in an efficient way What is the prime factorization of 100? 138? What is gcd(100, 138)? What is lcm(100,138)?
More informationINTRODUCTORY NOTES ON QUANTUM COMPUTATION
INTRODUCTORY NOTES ON QUANTUM COMPUTATION Keith Hannabuss Balliol College, Oxford Hilary Term 2009 Notation. In these notes we shall often use the physicists bra-ket notation, writing ψ for a vector ψ
More informationThe Electron Cloud. Here is what we know about the electron cloud:
The Electron Cloud Here is what we know about the electron cloud: It contains the subatomic particles called electrons This area accounts for most of the volume of the atom ( empty space) These electrons
More informationQuantum Communication. Serge Massar Université Libre de Bruxelles
Quantum Communication Serge Massar Université Libre de Bruxelles Plan Why Quantum Communication? Prepare and Measure schemes QKD Using Entanglement Teleportation Communication Complexity And now what?
More informationQuantum sampling of mixed states
Quantum sampling of mixed states Philippe Lamontagne January 7th Philippe Lamontagne Quantum sampling of mixed states January 7th 1 / 9 The setup Philippe Lamontagne Quantum sampling of mixed states January
More informationRichard Feynman: Electron waves are probability waves in the ocean of uncertainty.
Richard Feynman: Electron waves are probability waves in the ocean of uncertainty. Last Time We Solved some of the Problems with Classical Physics Discrete Spectra? Bohr Model but not complete. Blackbody
More informationNotes on wavefunctions II: momentum wavefunctions
Notes on wavefunctions II: momentum wavefunctions and uncertainty Te state of a particle at any time is described by a wavefunction ψ(x). Tese wavefunction must cange wit time, since we know tat particles
More informationChapter 38 Quantum Mechanics
Chapter 38 Quantum Mechanics Units of Chapter 38 38-1 Quantum Mechanics A New Theory 37-2 The Wave Function and Its Interpretation; the Double-Slit Experiment 38-3 The Heisenberg Uncertainty Principle
More informationQuantum secret sharing based on quantum error-correcting codes
Quantum secret sharing based on quantum error-correcting codes Zhang Zu-Rong( ), Liu Wei-Tao( ), and Li Cheng-Zu( ) Department of Physics, School of Science, National University of Defense Technology,
More informationC/CS/Phys C191 Quantum Mechanics in a Nutshell 10/06/07 Fall 2009 Lecture 12
C/CS/Phys C191 Quantum Mechanics in a Nutshell 10/06/07 Fall 2009 Lecture 12 In this lecture we summarize the essential physical and mathematical aspects of quantum mechanics relevant to this course. Topics
More informationA single quantum cannot be teleported
1 quant-ph/010060 A single quantum cannot be teleported Daniele Tommasini Departamento de Física Aplicada, Universidad de Vigo, 3004 Ourense, Spain Due to the Heisemberg uncertainty principle, it is impossible
More informationCPSC 467b: Cryptography and Computer Security
CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 11 February 21, 2013 CPSC 467b, Lecture 11 1/27 Discrete Logarithm Diffie-Hellman Key Exchange ElGamal Key Agreement Primitive Roots
More informationQuantum Physics Lecture 9
Quantum Physics Lecture 9 Potential barriers and tunnelling Examples E < U o Scanning Tunelling Microscope E > U o Ramsauer-Townsend Effect Angular Momentum - Orbital - Spin Pauli exclusion principle potential
More informationarxiv:quant-ph/ v2 2 Jan 2007
Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1
More informationChapter 1 Recollections from Elementary Quantum Physics
Chapter 1 Recollections from Elementary Quantum Physics Abstract We recall the prerequisites that we assume the reader to be familiar with, namely the Schrödinger equation in its time dependent and time
More informationCHAPTER 5 Wave Properties of Matter and Quantum Mechanics I
CHAPTER 5 Wave Properties of Matter and Quantum Mechanics I 5.1 X-Ray Scattering 5.2 De Broglie Waves 5.3 Electron Scattering 5.4 Wave Motion 5.5 Waves or Particles? 5.6 Uncertainty Principle 5.7 Probability,
More information= k, (2) p = h λ. x o = f1/2 o a. +vt (4)
Traveling Functions, Traveling Waves, and the Uncertainty Principle R.M. Suter Department of Physics, Carnegie Mellon University Experimental observations have indicated that all quanta have a wave-like
More informationNotes 10: Public-key cryptography
MTH6115 Cryptography Notes 10: Public-key cryptography In this section we look at two other schemes that have been proposed for publickey ciphers. The first is interesting because it was the earliest such
More informationIntroduction to particle physics Lecture 2
Introduction to particle physics Lecture 2 Frank Krauss IPPP Durham U Durham, Epiphany term 2009 Outline 1 Quantum field theory Relativistic quantum mechanics Merging special relativity and quantum mechanics
More informationAll this was changed by PKC. The idea of PKC is for each user (eg Alice) to randomly choose a pair of mutually inverse transformations a scrambling tr
Quantum Cryptography: Uncertainty in the Service of Privacy Charles H. Bennett IBM Research Division, T. J. Watson Research Center Yorktown Heights, NY 10598, USA. June 1, 1992 In general, observing a
More informationAtkins & de Paula: Atkins Physical Chemistry 9e Checklist of key ideas. Chapter 7: Quantum Theory: Introduction and Principles
Atkins & de Paula: Atkins Physical Chemistry 9e Checklist of key ideas Chapter 7: Quantum Theory: Introduction and Principles classical mechanics, the laws of motion introduced in the seventeenth century
More informationCommunication Complexity
Communication Complexity Jaikumar Radhakrishnan School of Technology and Computer Science Tata Institute of Fundamental Research Mumbai 31 May 2012 J 31 May 2012 1 / 13 Plan 1 Examples, the model, the
More informationQUANTUM CRYPTOGRAPHY. BCS, Plymouth University, December 1, Professor Kurt Langfeld Centre for Mathematical Sciences, Plymouth University
QUANTUM CRYPTOGRAPHY BCS, Plymouth University, December 1, 2015 Professor Kurt Langfeld Centre for Mathematical Sciences, Plymouth University OUTLOOK: Quantum Physics Essentials: particles and light are
More information