Uncertainty Principle

Size: px
Start display at page:

Download "Uncertainty Principle"

Transcription

1 Uncertainty Principle n n A Fourier transform of f is a function of frequency v Let be Δv the frequency range n It can be proved that ΔtΔv 1/(4 π) n n If Δt is small, f corresponds to a small interval of the whole function n Lower frequencies are not represented For higher frequency range, a big interval of the function n Good frequency representation, bad time resolution, Δt is big 1

2 n One cannot know what spectral components exist at what instances of times n What one can know are the time intervals in which certain band of frequencies exist, which is a resolution problem n The problem has to do with the width of the window function that is used Narrow window è good time resolution, poor frequency resolution Wide window è good frequency resolution, poor time resolution Conjugate pairs n Another unexpected property of the nature: n Physical variables come in conjugate pairs n Position and momentum n Energy and time n Both of which cannot be simultaneously measured with accuracy 2

3 Uncertainty principle n If p and q are conjugate pairs n Position and momentum n Energy and time n Both cannot be simultaneously measured with arbitrarily high accuracy Uncertainty principle n A Fourier transform of f is a function of frequency v n Let be Δv the frequency range ΔtΔv 1/(4 π) n Planck: n Energy is bounded in discrete packets called quanta n Every energy quantum is associated with an oscillatory phenomenon, having a certain frequency 3

4 n The probability of observing θ i when the system is in state x i is x E( θ i )x n We can compute the expected value of an observable A in state x H n n The expected value E x (A) = θ 1 x E( θ 1 )x +!+ 1 θ m x E( θ m )x E x (A) = x θ 1 E( θ 1 ) +!+ x θ m E( θ m )x E x (A) = x Ax n Now if we measure a particular observable  of a quantum state ψ and always obtain the same answer, then must be eigenstate of  (It is sharp) n ψ is eigenvector of Â, a is real ψ ˆ A ψ = a ψ a R 4

5 n Now let us consider of measuring a different observable represented by the operator B ˆ, ψ for which is not an eigenstate of B ˆ n If we measure the observable B ˆ of the quantum system in state ψ we would typically obtain different answers each time we made the measurements ˆ A = ˆ A ψ = ψ Aψ n The notation refers to the average value that you would obtain if one puts repeatedly the system in the same state ψ and one would repeatedly measure the observable µ = E ψ (A) = ˆ A = ˆ A ψ = ψ Aψ 5

6 n The root mean square deviation of the observables is given by (standard deviation) Δ ˆ A = A ˆ 2 A ˆ 2 Δ ˆ B = B ˆ 2 B ˆ 2 Var ψ (A) = E ψ ((A µ) 2 ) = (A µ)ψ 2 n The quantities quantify the uncertainty with which the values of the observables are known n As ψ is an eigenstate of the observable Â, then because the same answer is obtained each time the observable  is measured Δ ˆ A = 0 Δ ˆ A and Δ ˆ B n However as ψ is not the eigenstate of B ˆ, Δ ˆ B 0 6

7 n The question arise as to what happens if we try to measure both observables n The answer depends on the order in which we make the measurements n If we measured observable  first, then the act of measurement would not perturb the state since is already eigenstate of  n If we measured the observable first, then as ψ is not eigenstate of B ˆ, the act of measuring ψ will perturb the state of the system n We look at the difference between measurements performed in each order n To do it we construct the commutator operator A ˆ, B ˆ A B ˆ B ˆ A ˆ [ ] = ˆ B ˆ 7

8 n It can be shown that if two observables are measured simultaneously, the uncertainty in their joint values must always obey the inequality (Heisenberg Uncertainty) ΔA ˆ ΔB ˆ 1 [ ˆ 2 A, B ˆ ] Δ ˆ A Δ ˆ B 1 2 x [ A ˆ, B ˆ ]x Var ψ (A)Var ψ (B) 1 4 x [ A ˆ, B ˆ ]x 2 n The inequality follows from Cauchy- Schwarz inequality 8

9 n Gives one form of the Robertson- Schroinger relation: Δ ˆ A Δ ˆ B 1 2 [ A ˆ, B ˆ ] Δ ˆ A Δ ˆ B 1 2 x [ A ˆ, B ˆ ]x Var ψ (A)Var ψ (B) 1 4 x [ A ˆ, B ˆ ]x 2 9

10 n Quantum annealing is a method for finding the global minimum of a function n Quantum annealing attempts to avoid local minima by means of a quantum fluctuation parameter that replaces a state by a randomly selected neighboring state. 10

11 n In quantum annealing, the quantum fluctuation parameter replaces a local minimum state with a randomly selected neighboring state in some fixed radius. n The neighborhood extends over the whole search space at the beginning, and then, it is slowly reduced until the neighborhood shrinks to those few states that differ minimally from the current states. n In a quantum system, the quantum fluctuation can be performed directly by an adiabatic process rather than needing to be simulated. n These processes are based on quantum tunneling 11

12 n The Heisenberg uncertainty principle means that some energy can be borrowed, to overcome some mountain and go out of a minimum as long as we repay it in the time interval n Quantum tunneling is based on the Heisenberg uncertainty principle and the wave-particle duality of matter represented by the wave propagation. 12

13 n Quantum annealing can speed up some machine learning tasks that are based on a gradient descent method, such as the back-propagation algorithm that is used in artificial neural networks. It is an alternative to the simulated annealing that is used in the learning and optimization tasks. 13

14 Polarization n Reduce a message to a sequence of bits and then create a stream of photons placed in a certain quantum state corresponding to these bits n The photon property we are interested is called polarization 14

15 n It is possible to create photons with its electric fields oscillating in any desired plane n Polarized photons whose electric fields oscillate in a plane either 0º or 90º to some line rectilinear n Polarized photons whose electric fields oscillate in a plane either 45º or 135º diagonal n Binary 0 represented by 0º and 45º n Binary 1 represented by 90º and 135º 15

16 Measuring the polarization n It is necessary to measure the polarization n We perform the measurements with calcium carbonate crystal n It has the property of bifrigence n Electrons are not bound with equal strength n Photon passing through the crystal will feel a different electromagnetic force depending on the orientation of its electric field n Polarized photons whose electric fields oscillate in a plane either 0º or 90º to some line rectilinear n If the polarization axis is aligned so that vertical 90º polarized photons pass through it n A photon with horizontal polarization 0º will also pass through the crystal but it will emerge shifted 16

17 n Polarized photons whose electric fields oscillate in a plane either 45º or 135º diagonal n Uncertainty principle says that the polarizer provides no information about the original polarization n The calcite crystal has to be aligned in diagonal n It is impossible to measure both rectilinear and diagonal polarization exactly n Any attempt to measure rectilinear polarization perturbs the diagonal polarization and vice verse n Why? The commutator describing both measurements does not vanish 17

18 n We can design a secret protocol for exchanging a secret key n It can be guaranteed, that nobody interferes with the message n An eavesdropping can be detected n Alice makes to encode bits as polarized photons (first row) n Then each bit she chose to encode it either rectilinear (+) or in the diagonal polarization (x), the choice is made randomly n Alice then sends the photons she created to bob (third row) 18

19 n Bob receipts the photons (first row) n He chooses a polarizer orientation with which he measures the direction of polarization (randomly) n He reconstructs the bits (third row) n Detection of eavesdropping n Alice and Bob compare a subset of bits which were generated with same polarization n The must be equal! n 19

20 n If they are not equal, it means that some one other has measured them, there was an eavesdropping! n Once Alice and Bob decided that the channel is secure, Alice tells Bob what polarization she used for each of her bits n Bob compares his polarization and read the bits, tells Alice about his polarization n These bits are now only known to Bob and Alice! 20

21 IBM s Watson Research Center

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Physics is becoming too difficult for physicists. David Hilbert (mathematician) Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving

More information

Introduction to Quantum Cryptography

Introduction to Quantum Cryptography Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics

More information

Physical Measurement. Uncertainty Principle for Measurement

Physical Measurement. Uncertainty Principle for Measurement Physical Measurement Uncertainty Principle for Measurement Measuring rod is marked in equispaced intervals of which there are N of one unit of measurement size of the interval is 1/N The measuring variable

More information

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance. 9. Distance measures 9.1 Classical information measures How similar/close are two probability distributions? Trace distance Fidelity Example: Flipping two coins, one fair one biased Head Tail Trace distance

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski 1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every

More information

2. Introduction to quantum mechanics

2. Introduction to quantum mechanics 2. Introduction to quantum mechanics 2.1 Linear algebra Dirac notation Complex conjugate Vector/ket Dual vector/bra Inner product/bracket Tensor product Complex conj. matrix Transpose of matrix Hermitian

More information

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding. CS 94- Bell States Bell Inequalities 9//04 Fall 004 Lecture Hilbert Space Entanglement Quantum Gates Bell States Superdense Coding 1 One qubit: Recall that the state of a single qubit can be written as

More information

Quantum Mechanics is Linear Algebra. Noah Graham Middlebury College February 25, 2014

Quantum Mechanics is Linear Algebra. Noah Graham Middlebury College February 25, 2014 Quantum Mechanics is Linear Algebra Noah Graham Middlebury College February 25, 24 Linear Algebra Cheat Sheet Column vector quantum state: v = v v 2. Row vector dual state: w = w w 2... Inner product:

More information

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech + Quantum Entanglement and Cryptography Deepthi Gopal, Caltech + Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts

More information

Entanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017

Entanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017 Entanglement Michelle Victora Advisor: Paul G. Kwiat Physics 403 talk: March 13, 2017 Introduction to entanglement Making entanglement in the lab Applications Quantum states describing more than one system

More information

Continuous quantum states, Particle on a line and Uncertainty relations

Continuous quantum states, Particle on a line and Uncertainty relations Continuous quantum states, Particle on a line and Uncertainty relations So far we have considered k-level (discrete) quantum systems. Now we turn our attention to continuous quantum systems, such as a

More information

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices Global Journal of Computer Science and Technology Volume 11 Issue 12 Version 1.0 July Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:

More information

A probabilistic quantum key transfer protocol

A probabilistic quantum key transfer protocol SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

quantum distribution of a sudoku key Sian K. Jones University of South Wales

quantum distribution of a sudoku key Sian K. Jones University of South Wales Games and Puzzles quantum distribution of a sudoku key Sian K. Jones University of South Wales sian-kathryn.jones@southwales.ac.uk Abstract: Sudoku grids are often cited as being useful in cryptography

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

Section 6: Measurements, Uncertainty and Spherical Symmetry Solutions

Section 6: Measurements, Uncertainty and Spherical Symmetry Solutions Physics 143a: Quantum Mechanics I Spring 015, Harvard Section 6: Measurements, Uncertainty and Spherical Symmetry Solutions Here is a summary of the most important points from the recent lectures, relevant

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

Fundamental of Spectroscopy for Optical Remote Sensing Xinzhao Chu I 10 3.4. Principle of Uncertainty Indeterminacy 0. Expression of Heisenberg s Principle of Uncertainty It is worth to point out that

More information

Quantum cryptography -the final battle?

Quantum cryptography -the final battle? Quantum cryptography -the final battle? CS4236 Principles of Computer Security National University of Singapore Jonas Rundberg, NT030157A This presentation Quantum mechanics Introduction Notation Polarized

More information

Lecture 4 (Sep. 18, 2017)

Lecture 4 (Sep. 18, 2017) Lecture 4 8.3 Quantum Theory I, Fall 07 Lecture 4 (Sep. 8, 07) 4. Measurement 4.. Spin- Systems Last time, we said that a general state in a spin- system can be written as ψ = c + + + c, (4.) where +,

More information

10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem.

10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem. 10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem. Clifton, Bub, Halvorson (2003) Motivation: Can quantum physics be reduced to information-theoretic principles? CBH Theorem:

More information

Quantum Dense Coding and Quantum Teleportation

Quantum Dense Coding and Quantum Teleportation Lecture Note 3 Quantum Dense Coding and Quantum Teleportation Jian-Wei Pan Bell states maximally entangled states: ˆ Φ Ψ Φ x σ Dense Coding Theory: [C.. Bennett & S. J. Wiesner, Phys. Rev. Lett. 69, 88

More information

Electron in a Box. A wave packet in a square well (an electron in a box) changing with time.

Electron in a Box. A wave packet in a square well (an electron in a box) changing with time. Electron in a Box A wave packet in a square well (an electron in a box) changing with time. Last Time: Light Wave model: Interference pattern is in terms of wave intensity Photon model: Interference in

More information

Secrecy and the Quantum

Secrecy and the Quantum Secrecy and the Quantum Benjamin Schumacher Department of Physics Kenyon College Bright Horizons 35 (July, 2018) Keeping secrets Communication Alice sound waves, photons, electrical signals, paper and

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

arxiv:quant-ph/ v1 13 Jan 2003

arxiv:quant-ph/ v1 13 Jan 2003 Deterministic Secure Direct Communication Using Ping-pong protocol without public channel Qing-yu Cai Laboratory of Magentic Resonance and Atom and Molecular Physics, Wuhan Institute of Mathematics, The

More information

EPR paradox, Bell inequality, etc.

EPR paradox, Bell inequality, etc. EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project

More information

Ph 219/CS 219. Exercises Due: Friday 3 November 2006

Ph 219/CS 219. Exercises Due: Friday 3 November 2006 Ph 9/CS 9 Exercises Due: Friday 3 November 006. Fidelity We saw in Exercise. that the trace norm ρ ρ tr provides a useful measure of the distinguishability of the states ρ and ρ. Another useful measure

More information

Alternative Approaches Quantum Cryptography and Bounded Storage Model

Alternative Approaches Quantum Cryptography and Bounded Storage Model JASS 05 - Course 1 Alternative Approaches Quantum Cryptography and Bounded Storage Model Andreas Würfl 28th March 2005 Abstract Several encryption algorithms have been discussed in the course of this seminar.

More information

Bits. Chapter 1. Information can be learned through observation, experiment, or measurement.

Bits. Chapter 1. Information can be learned through observation, experiment, or measurement. Chapter 1 Bits Information is measured in bits, just as length is measured in meters and time is measured in seconds. Of course knowing the amount of information is not the same as knowing the information

More information

Problem Set: TT Quantum Information

Problem Set: TT Quantum Information Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C

More information

The Relativistic Quantum World

The Relativistic Quantum World The Relativistic Quantum World A lecture series on Relativity Theory and Quantum Mechanics Marcel Merk University of Maastricht, Sept 24 Oct 15, 2014 Relativity Quantum Mechanics The Relativistic Quantum

More information

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract Research Proposal for Secure Double slit experiment Sandeep Cheema Security Analyst, Vichara Technologies Abstract The key objective of this research proposal is to resolve or advance with the measurement

More information

Lecture: Quantum Information

Lecture: Quantum Information Lecture: Quantum Information Transcribed by: Crystal Noel and Da An (Chi Chi) November 10, 016 1 Final Proect Information Find an issue related to class you are interested in and either: read some papers

More information

CS/Ph120 Homework 8 Solutions

CS/Ph120 Homework 8 Solutions CS/Ph0 Homework 8 Solutions December, 06 Problem : Thinking adversarially. Solution: (Due to De Huang) Attack to portocol : Assume that Eve has a quantum machine that can store arbitrary amount of quantum

More information

Introduction to particle physics Lecture 3: Quantum Mechanics

Introduction to particle physics Lecture 3: Quantum Mechanics Introduction to particle physics Lecture 3: Quantum Mechanics Frank Krauss IPPP Durham U Durham, Epiphany term 2010 Outline 1 Planck s hypothesis 2 Substantiating Planck s claim 3 More quantisation: Bohr

More information

A Matlab Realization of Shor s Quantum Factoring Algorithm

A Matlab Realization of Shor s Quantum Factoring Algorithm 1 A Matlab Realization of Shor s Quantum Factoring Algorithm S. Jha, P. Chatterjee, A.Falor and M. Chakraborty, Member IEEE Department of Information Technology Institute of Engineering & Management Kolkata,

More information

Lecture 18: Quantum Information Theory and Holevo s Bound

Lecture 18: Quantum Information Theory and Holevo s Bound Quantum Computation (CMU 1-59BB, Fall 2015) Lecture 1: Quantum Information Theory and Holevo s Bound November 10, 2015 Lecturer: John Wright Scribe: Nicolas Resch 1 Question In today s lecture, we will

More information

Physics ; CS 4812 Problem Set 4

Physics ; CS 4812 Problem Set 4 Physics 4481-7681; CS 4812 Problem Set 4 Six problems (six pages), all short, covers lectures 11 15, due in class 25 Oct 2018 Problem 1: 1-qubit state tomography Consider a 1-qubit state ψ cos θ 2 0 +

More information

Quantum Gates, Circuits & Teleportation

Quantum Gates, Circuits & Teleportation Chapter 3 Quantum Gates, Circuits & Teleportation Unitary Operators The third postulate of quantum physics states that the evolution of a quantum system is necessarily unitary. Geometrically, a unitary

More information

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels JOURNAL OF CHEMISTRY 57 VOLUME NUMBER DECEMBER 8 005 A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels Miri Shlomi

More information

Lecture 6: Quantum error correction and quantum capacity

Lecture 6: Quantum error correction and quantum capacity Lecture 6: Quantum error correction and quantum capacity Mark M. Wilde The quantum capacity theorem is one of the most important theorems in quantum hannon theory. It is a fundamentally quantum theorem

More information

A Simple Model of Quantum Trajectories. Todd A. Brun University of Southern California

A Simple Model of Quantum Trajectories. Todd A. Brun University of Southern California A Simple Model of Quantum Trajectories Todd A. Brun University of Southern California Outline 1. Review projective and generalized measurements. 2. A simple model of indirect measurement. 3. Weak measurements--jump-like

More information

1 Mathematical preliminaries

1 Mathematical preliminaries 1 Mathematical preliminaries The mathematical language of quantum mechanics is that of vector spaces and linear algebra. In this preliminary section, we will collect the various definitions and mathematical

More information

Communication Complexity. The dialogues of Alice and Bob...

Communication Complexity. The dialogues of Alice and Bob... Communication Complexity The dialogues of Alice and Bob... Alice and Bob make a date Alice and Bob make a date Are you free on Friday? Alice and Bob make a date Are you free on Friday? No, have to work

More information

Experiments testing macroscopic quantum superpositions must be slow

Experiments testing macroscopic quantum superpositions must be slow Experiments testing macroscopic quantum superpositions must be slow spatial (Scientic Reports (2016) - arxiv:1509.02408) Andrea Mari, Giacomo De Palma, Vittorio Giovannetti NEST - Scuola Normale Superiore

More information

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution

Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution CS 70 Discrete Mathematics and Probability Theory Spring 2016 Rao and Walrand Discussion 6A Solution 1. Polynomial intersections Find (and prove) an upper-bound on the number of times two distinct degree

More information

AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013

AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013 AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013 Lecturer: Dr. Mark Tame Introduction With the emergence of new types of information, in this case

More information

Introduction to Quantum Key Distribution

Introduction to Quantum Key Distribution Fakultät für Physik Ludwig-Maximilians-Universität München January 2010 Overview Introduction Security Proof Introduction What is information? A mathematical concept describing knowledge. Basic unit is

More information

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security Hacking Quantum Cryptography Marina von Steinkirch ~ Yelp Security Agenda 1. Quantum Mechanics in 10 mins 2. Quantum Computing in 11 mins 3. Quantum Key Exchange in 100 mins (or more minutes) Some disclaimers

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

APPLICATIONS. Quantum Communications

APPLICATIONS. Quantum Communications SOFT PROCESSING TECHNIQUES FOR QUANTUM KEY DISTRIBUTION APPLICATIONS Marina Mondin January 27, 2012 Quantum Communications In the past decades, the key to improving computer performance has been the reduction

More information

Entanglement and Quantum Teleportation

Entanglement and Quantum Teleportation Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,

More information

Quantum Physics in the Nanoworld

Quantum Physics in the Nanoworld Hans Lüth Quantum Physics in the Nanoworld Schrödinger's Cat and the Dwarfs 4) Springer Contents 1 Introduction 1 1.1 General and Historical Remarks 1 1.2 Importance for Science and Technology 3 1.3 Philosophical

More information

Single and Entangled photons. Edward Pei

Single and Entangled photons. Edward Pei Single and Entangled photons Edward Pei War is most commonly thought of as men fighting with their fist, and power is determined by physical strength. Behind the lines, however, knowledge is power. For

More information

Quantum Measurement and Bell s Theorem

Quantum Measurement and Bell s Theorem Chapter 7 Quantum Measurement and Bell s Theorem The combination of the facts that there is a probability amplitude that superimposes states a from adding of all paths, a wavelike property, and the interactions

More information

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation

More information

Semiconductor Physics and Devices

Semiconductor Physics and Devices Introduction to Quantum Mechanics In order to understand the current-voltage characteristics, we need some knowledge of electron behavior in semiconductor when the electron is subjected to various potential

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

Introduction to Quantum Mechanics

Introduction to Quantum Mechanics Introduction to Quantum Mechanics R. J. Renka Department of Computer Science & Engineering University of North Texas 03/19/2018 Postulates of Quantum Mechanics The postulates (axioms) of quantum mechanics

More information

Physics 217 Problem Set 1 Due: Friday, Aug 29th, 2008

Physics 217 Problem Set 1 Due: Friday, Aug 29th, 2008 Problem Set 1 Due: Friday, Aug 29th, 2008 Course page: http://www.physics.wustl.edu/~alford/p217/ Review of complex numbers. See appendix K of the textbook. 1. Consider complex numbers z = 1.5 + 0.5i and

More information

Quantum decoherence. Éric Oliver Paquette (U. Montréal) -Traces Worshop [Ottawa]- April 29 th, Quantum decoherence p. 1/2

Quantum decoherence. Éric Oliver Paquette (U. Montréal) -Traces Worshop [Ottawa]- April 29 th, Quantum decoherence p. 1/2 Quantum decoherence p. 1/2 Quantum decoherence Éric Oliver Paquette (U. Montréal) -Traces Worshop [Ottawa]- April 29 th, 2007 Quantum decoherence p. 2/2 Outline Quantum decoherence: 1. Basics of quantum

More information

Revision Guide for Chapter 7

Revision Guide for Chapter 7 Revision Guide for Chapter 7 Contents Student s Checklist Revision Notes Path of least time... 4 Interference of photons... 5 Quantum behaviour... 5 Photons... 6 Electron diffraction... 7 Probability...

More information

PLEASE LET ME KNOW IF YOU FIND TYPOS (send to

PLEASE LET ME KNOW IF YOU FIND TYPOS (send  to Teoretisk Fysik KTH Advanced QM (SI2380), Lecture 2 (Summary of concepts) 1 PLEASE LET ME KNOW IF YOU FIND TYPOS (send email to langmann@kth.se) The laws of QM 1. I now discuss the laws of QM and their

More information

Quantum Mechanics C (130C) Winter 2014 Final exam

Quantum Mechanics C (130C) Winter 2014 Final exam University of California at San Diego Department of Physics Prof. John McGreevy Quantum Mechanics C (130C Winter 014 Final exam Please remember to put your name on your exam booklet. This is a closed-book

More information

Number theory (Chapter 4)

Number theory (Chapter 4) EECS 203 Spring 2016 Lecture 12 Page 1 of 8 Number theory (Chapter 4) Review Compute 6 11 mod 13 in an efficient way What is the prime factorization of 100? 138? What is gcd(100, 138)? What is lcm(100,138)?

More information

INTRODUCTORY NOTES ON QUANTUM COMPUTATION

INTRODUCTORY NOTES ON QUANTUM COMPUTATION INTRODUCTORY NOTES ON QUANTUM COMPUTATION Keith Hannabuss Balliol College, Oxford Hilary Term 2009 Notation. In these notes we shall often use the physicists bra-ket notation, writing ψ for a vector ψ

More information

The Electron Cloud. Here is what we know about the electron cloud:

The Electron Cloud. Here is what we know about the electron cloud: The Electron Cloud Here is what we know about the electron cloud: It contains the subatomic particles called electrons This area accounts for most of the volume of the atom ( empty space) These electrons

More information

Quantum Communication. Serge Massar Université Libre de Bruxelles

Quantum Communication. Serge Massar Université Libre de Bruxelles Quantum Communication Serge Massar Université Libre de Bruxelles Plan Why Quantum Communication? Prepare and Measure schemes QKD Using Entanglement Teleportation Communication Complexity And now what?

More information

Quantum sampling of mixed states

Quantum sampling of mixed states Quantum sampling of mixed states Philippe Lamontagne January 7th Philippe Lamontagne Quantum sampling of mixed states January 7th 1 / 9 The setup Philippe Lamontagne Quantum sampling of mixed states January

More information

Richard Feynman: Electron waves are probability waves in the ocean of uncertainty.

Richard Feynman: Electron waves are probability waves in the ocean of uncertainty. Richard Feynman: Electron waves are probability waves in the ocean of uncertainty. Last Time We Solved some of the Problems with Classical Physics Discrete Spectra? Bohr Model but not complete. Blackbody

More information

Notes on wavefunctions II: momentum wavefunctions

Notes on wavefunctions II: momentum wavefunctions Notes on wavefunctions II: momentum wavefunctions and uncertainty Te state of a particle at any time is described by a wavefunction ψ(x). Tese wavefunction must cange wit time, since we know tat particles

More information

Chapter 38 Quantum Mechanics

Chapter 38 Quantum Mechanics Chapter 38 Quantum Mechanics Units of Chapter 38 38-1 Quantum Mechanics A New Theory 37-2 The Wave Function and Its Interpretation; the Double-Slit Experiment 38-3 The Heisenberg Uncertainty Principle

More information

Quantum secret sharing based on quantum error-correcting codes

Quantum secret sharing based on quantum error-correcting codes Quantum secret sharing based on quantum error-correcting codes Zhang Zu-Rong( ), Liu Wei-Tao( ), and Li Cheng-Zu( ) Department of Physics, School of Science, National University of Defense Technology,

More information

C/CS/Phys C191 Quantum Mechanics in a Nutshell 10/06/07 Fall 2009 Lecture 12

C/CS/Phys C191 Quantum Mechanics in a Nutshell 10/06/07 Fall 2009 Lecture 12 C/CS/Phys C191 Quantum Mechanics in a Nutshell 10/06/07 Fall 2009 Lecture 12 In this lecture we summarize the essential physical and mathematical aspects of quantum mechanics relevant to this course. Topics

More information

A single quantum cannot be teleported

A single quantum cannot be teleported 1 quant-ph/010060 A single quantum cannot be teleported Daniele Tommasini Departamento de Física Aplicada, Universidad de Vigo, 3004 Ourense, Spain Due to the Heisemberg uncertainty principle, it is impossible

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 11 February 21, 2013 CPSC 467b, Lecture 11 1/27 Discrete Logarithm Diffie-Hellman Key Exchange ElGamal Key Agreement Primitive Roots

More information

Quantum Physics Lecture 9

Quantum Physics Lecture 9 Quantum Physics Lecture 9 Potential barriers and tunnelling Examples E < U o Scanning Tunelling Microscope E > U o Ramsauer-Townsend Effect Angular Momentum - Orbital - Spin Pauli exclusion principle potential

More information

arxiv:quant-ph/ v2 2 Jan 2007

arxiv:quant-ph/ v2 2 Jan 2007 Revisiting controlled quantum secure direct communication using a non-symmetric quantum channel with quantum superdense coding arxiv:quant-ph/06106v Jan 007 Jun Liu 1, Yan Xia and Zhan-jun Zhang 1,, 1

More information

Chapter 1 Recollections from Elementary Quantum Physics

Chapter 1 Recollections from Elementary Quantum Physics Chapter 1 Recollections from Elementary Quantum Physics Abstract We recall the prerequisites that we assume the reader to be familiar with, namely the Schrödinger equation in its time dependent and time

More information

CHAPTER 5 Wave Properties of Matter and Quantum Mechanics I

CHAPTER 5 Wave Properties of Matter and Quantum Mechanics I CHAPTER 5 Wave Properties of Matter and Quantum Mechanics I 5.1 X-Ray Scattering 5.2 De Broglie Waves 5.3 Electron Scattering 5.4 Wave Motion 5.5 Waves or Particles? 5.6 Uncertainty Principle 5.7 Probability,

More information

= k, (2) p = h λ. x o = f1/2 o a. +vt (4)

= k, (2) p = h λ. x o = f1/2 o a. +vt (4) Traveling Functions, Traveling Waves, and the Uncertainty Principle R.M. Suter Department of Physics, Carnegie Mellon University Experimental observations have indicated that all quanta have a wave-like

More information

Notes 10: Public-key cryptography

Notes 10: Public-key cryptography MTH6115 Cryptography Notes 10: Public-key cryptography In this section we look at two other schemes that have been proposed for publickey ciphers. The first is interesting because it was the earliest such

More information

Introduction to particle physics Lecture 2

Introduction to particle physics Lecture 2 Introduction to particle physics Lecture 2 Frank Krauss IPPP Durham U Durham, Epiphany term 2009 Outline 1 Quantum field theory Relativistic quantum mechanics Merging special relativity and quantum mechanics

More information

All this was changed by PKC. The idea of PKC is for each user (eg Alice) to randomly choose a pair of mutually inverse transformations a scrambling tr

All this was changed by PKC. The idea of PKC is for each user (eg Alice) to randomly choose a pair of mutually inverse transformations a scrambling tr Quantum Cryptography: Uncertainty in the Service of Privacy Charles H. Bennett IBM Research Division, T. J. Watson Research Center Yorktown Heights, NY 10598, USA. June 1, 1992 In general, observing a

More information

Atkins & de Paula: Atkins Physical Chemistry 9e Checklist of key ideas. Chapter 7: Quantum Theory: Introduction and Principles

Atkins & de Paula: Atkins Physical Chemistry 9e Checklist of key ideas. Chapter 7: Quantum Theory: Introduction and Principles Atkins & de Paula: Atkins Physical Chemistry 9e Checklist of key ideas Chapter 7: Quantum Theory: Introduction and Principles classical mechanics, the laws of motion introduced in the seventeenth century

More information

Communication Complexity

Communication Complexity Communication Complexity Jaikumar Radhakrishnan School of Technology and Computer Science Tata Institute of Fundamental Research Mumbai 31 May 2012 J 31 May 2012 1 / 13 Plan 1 Examples, the model, the

More information

QUANTUM CRYPTOGRAPHY. BCS, Plymouth University, December 1, Professor Kurt Langfeld Centre for Mathematical Sciences, Plymouth University

QUANTUM CRYPTOGRAPHY. BCS, Plymouth University, December 1, Professor Kurt Langfeld Centre for Mathematical Sciences, Plymouth University QUANTUM CRYPTOGRAPHY BCS, Plymouth University, December 1, 2015 Professor Kurt Langfeld Centre for Mathematical Sciences, Plymouth University OUTLOOK: Quantum Physics Essentials: particles and light are

More information