Algorithms in the Quantum Computing Framework

Size: px
Start display at page:

Download "Algorithms in the Quantum Computing Framework"

Transcription

1 Algorithms in the Quantum Computing Framework Juanjo Rué, Sebastià Xambó Laboratoire d Informatique, École Polytechnique (Palaiseau, Paris), ExploreMaps ERC Project Seminar on Quantum Processing: Mathematics, Physics and Technology, IEC, 25th February 2010

2 Summary of the talk Explain the phase estimate framework. Explain the order finding q-algorithm. Explain the factoring q-algorithm. Scope of these techniques Open problems and conclusions

3 Shor s algorithm: order finding and factoring

4 The work of Peter Shor Combinatorics, bin packing, quantum computing,... Nevalinna prize (1998), Gödel prize (1999) Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer SIAM Journal of Computing 26, pp (1997) Laudatio ICM 1998: To read our , how mean of the spies and their quantum machine; Be comforted though, they do not yet know how to factorize twelve or fifteen.

5 Quantum Fourier Transform revisited Appereance of periodic phenomenon: change of basis The quantum context provides optimal realizations of the Fourier Transform: F k = 1 2 n 1 kj 2πi e 2 n j 2 n j=0 Exponential order in the classical framework (FFT) vs quadratic in the quantum framework (QFT).

6 The phase estimate: a general algorithm The quantum Fourier transform can be used to get eigenvalues of an unitary operator: Uu = e 2πiϕ u The general procedure starts in the following way: z = 1 2 t ( 0 +e2πi2t 1ϕ 1 ) t)... ( 0 +e 2πi21ϕ 1 )( 0 +e 2πi20ϕ 1 ) u

7 Phase estimate (2) z can be written in the form 1 2 t 2 t 1 j=0 e2πiϕj j u. We proceed with F I : 2 1 t 1 2 t j=0 Two cases: e 2πiϕj j u = 1 2 t 1 2 t j=0 ϕ 2πi e 2 t j j u F I = ϕ u. If ϕ could be written with exactly t bits, then ϕ = ϕ. In the other case, ϕ is a superposition. What do we do in the second case?

8 Phase estimate (and 3) Let ε > 0, 0 < ϕ = 1 2 ϕ < 1 and k a natural integer. Let t be t the number of bits used. Then, if ( t = k + log ) 2ε with probability 1 ε the value ϕ measured after applying F I satisfies ϕ ϕ < 2 k. 2 t Roughly speaking, taking a large value for the number of bits the algorithm gives, with high probability, a value which is closed to the real one. Get good implementations for U How do we construct u? Can we recover the real ϕ from a good estimate ϕ?

9 Searching the order of an element We solve a different problem: given an integer a such that (a, n) = 1, which is the order of a in (Z/nZ)? This problem can be stated in terms of an spectral one: Definition of a convenient unitary operator: U(a, n)u j = u ja (mod n), 0 j n Construction of a family of eigenvectors (reminiscent of representation theory): v s = A nice eigenvalue: U(a, n)v s = ord(a) 1 k=0 ord(a) 1 k=0 e 2πi e 2πi sk ord(a) u a k (mod n) sk ord(a) u a k+1 (mod n) = e 2πi s ord(a) v s

10 Analysis: looking at U(a, n), v s Operator U(a, n): classical modular exponenciation Complexity O ( log(n) 3). Eigenvectors v s ord(a) 1 1 ord(a) s=0 e 2πij s ord(a) v s = a j (mod n) 2 1 t 1 j t 1 j a j (mod n) 2 t 2 t j=0 j=0 1 2 t ord(a) ord(a) 1 s=0 2 t 1 j=0 e 2πij s ord(a) j v s

11 Last step: what we do which a bad estimate? Applying F I we get ord(a) 1 1 s ord(a) v s ord(a) s=0 At the end, we measure the first component: s ord(a) Can we extract information from the real value using this estimate?

12 Intermezzo: continued fractions Let p q be a rational number. Then, p q representation of the form admits a finite We write p q = [p 0, p 1,..., p k ]. p q = p p p The numbers [p 0,..., p r ], r < k are the convergents of p q. Main result: Let p q a rational number. If x satisfies the property p q x < 1 2q 2, then p q is a convergent of x.

13 Continued fractions and estimates Taking a number of bits equal to 2 log 2 (n) log ( ε ) we assure that, with probability 1 ε 1 s 2 t ord(a) s ord(a) < log 2 (n) +1 < 1 2 ord(a) 2 Hence, Two cases: s ord(a) is a convergent of s ord(a). (s, ord(a)) = 1, all works fine! (s, ord(a)) = r 1, we get ord(a) r. Repeat ALL with a ord(a) r

14 ...And now, Factoring! Let N be an integer. We want to find a proper divisor of N. The strategy is the following: let x (Z/NZ) x ord(x) 1 0(N) ord(x) 0(2) ) ) (x ord(x) 2 1 (x ord(x) (N) Not possible that ) ) ) ) ((x ord(x) 2 1, N = ((x ord(x) 2 + 1, N = 1 Hence, we need to find and element x in (Z/NZ) with even order, such that x ord(x) 2 is not 1(N). Can the choice be done uniformly at random?

15 ...And now, Factoring! (2) Let N = m i=1 pα i i its decomposition in prime factors. Let x be a uniformly distributed random element in (Z/NZ). Then ) P (ord(x) 0(2), x ord(x) 2 1(N) 1 2 m. Hence, for N = p 1 p 2 we have a probability greater than 0.75 to get a nice generator!

16 Shor s algorithm INPUT: an integer N which can be written with L bits. OUTPUT: a proper divisor of N. 1. If N 0(2), we return 2, and that s all! 2. We determine if N = a b. This can be done classically with L 3 operations. If this is the case, return a, and that s all! 3. Choose x in {1, 2,..., N 1} uniformly at random. If (x, N) > 1, return (x, N) and that s all! 4. If (x, N) = 1 ord(x) using the order searching algorithm with complexity O(L 3 ). 5. If ord(x) 1(2) or x ord(x) 2 1 (mod N), we return to point 3. Good cases have a high probability to happen! 6. Compute (x ord(x) 2 1, N), (x ord(x) 2 + 1, N), return the bigger, and that s all! A more detailed analysis of point 5 could be done O(log(L)).

17 Scope and open problems

18 Beyond the spectral techniques Order-finding is a problem in which periodicities appear: discrete logarithm problem, period finding,... All these problems can be generalized (in some sense) to finite Abelian groups...but more difficult is to do this for non-abelian groups. (Hallner, 2003) Connections with computacional and algebraic number theory: structure of the units of Z[ D] Pell s Equation: ( x ) ( Dy x ) Dy = 1 x 2 Dy 2 = 1 Deal with other algebraic parameters?

19 (Quantum) Random walks and problems on graphs Grover s search can be generalized to more complex structures: graphs Classically, to search on a graph we can perform a random walk. Do the same, but in the quantum framework Could be this ideas taken to deal with more general graph (and hypergraphs, and oriented graphs, and weighted graphs) problems? Strong connections with Complexity and P=NP in theoretical Computer Science.

20 Some philosophical questions The output of the problems treated so far can be tested The results for testing primality, finding optimal parameters on large graphs cannot be tested! Can we create frameworks to assure categorical algorithms or there is an unavoidable limitation on the language? Are problems that cannot be codified using the rules of the quantum formalism? Are there unavoidable limitations in order to simulate quantum phenomena? (Inherent to nature)

21 Conclusions

22 Conclusions We have presented the phase estimate general framework, and its connection with the QFT. Reduction of order-finding to a linear algebra problem We have reduced the problem of factoring to the problem of order-finding. Spectral techniques can be applied to more difficult problems.

23 Thank you 15 = 3 5

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871 Introduction to Quantum Information Processing QIC 71 / CS 768 / PH 767 / CO 681 / AM 871 Lecture 8 (217) Jon Yard QNC 3126 jyard@uwaterloo.ca http://math.uwaterloo.ca/~jyard/qic71 1 Recap of: Eigenvalue

More information

Shor s Algorithm. Elisa Bäumer, Jan-Grimo Sobez, Stefan Tessarini May 15, 2015

Shor s Algorithm. Elisa Bäumer, Jan-Grimo Sobez, Stefan Tessarini May 15, 2015 Shor s Algorithm Elisa Bäumer, Jan-Grimo Sobez, Stefan Tessarini May 15, 2015 Integer factorization n = p q (where p, q are prime numbers) is a cryptographic one-way function Classical algorithm with best

More information

Shor s Prime Factorization Algorithm

Shor s Prime Factorization Algorithm Shor s Prime Factorization Algorithm Bay Area Quantum Computing Meetup - 08/17/2017 Harley Patton Outline Why is factorization important? Shor s Algorithm Reduction to Order Finding Order Finding Algorithm

More information

Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681

Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 48 / C&O 68 Lecture (2) Richard Cleve DC 27 cleve@cs.uwaterloo.ca Order-finding via eigenvalue estimation 2 Order-finding

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing The lecture notes were prepared according to Peter Shor s papers Quantum Computing and Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a

More information

Phase estimation. p. 1/24

Phase estimation. p. 1/24 p. 1/24 Phase estimation Last time we saw how the quantum Fourier transform made it possible to find the period of a function by repeated measurements and the greatest common divisor (GCD) algorithm. We

More information

QUANTUM PHASE ESTIMATION WITH ARBITRARY CONSTANT-PRECISION PHASE SHIFT OPERATORS

QUANTUM PHASE ESTIMATION WITH ARBITRARY CONSTANT-PRECISION PHASE SHIFT OPERATORS Quantum Information and Computation, Vol., No. 9&0 (0) 0864 0875 c Rinton Press QUANTUM PHASE ESTIMATION WITH ARBITRARY CONSTANT-PRECISION PHASE SHIFT OPERATORS HAMED AHMADI Department of Mathematics,

More information

Quantum Computers. Peter Shor MIT

Quantum Computers. Peter Shor MIT Quantum Computers Peter Shor MIT 1 What is the difference between a computer and a physics experiment? 2 One answer: A computer answers mathematical questions. A physics experiment answers physical questions.

More information

Advanced Cryptography Quantum Algorithms Christophe Petit

Advanced Cryptography Quantum Algorithms Christophe Petit The threat of quantum computers Advanced Cryptography Quantum Algorithms Christophe Petit University of Oxford Christophe Petit -Advanced Cryptography 1 Christophe Petit -Advanced Cryptography 2 The threat

More information

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT Quantum algorithms (CO 78, Winter 008) Prof. Andrew Childs, University of Waterloo LECTURE : Quantum circuits and the abelian QFT This is a course on quantum algorithms. It is intended for graduate students

More information

Quantum Phase Estimation using Multivalued Logic

Quantum Phase Estimation using Multivalued Logic Quantum Phase Estimation using Multivalued Logic Agenda Importance of Quantum Phase Estimation (QPE) QPE using binary logic QPE using MVL Performance Requirements Salient features Conclusion Introduction

More information

Quantum Computing. Thorsten Altenkirch

Quantum Computing. Thorsten Altenkirch Quantum Computing Thorsten Altenkirch Is Computation universal? Alonzo Church - calculus Alan Turing Turing machines computable functions The Church-Turing thesis All computational formalisms define the

More information

An Architectural Framework For Quantum Algorithms Processing Unit (QAPU)

An Architectural Framework For Quantum Algorithms Processing Unit (QAPU) An Architectural Framework For Quantum s Processing Unit (QAPU) Mohammad Reza Soltan Aghaei, Zuriati Ahmad Zukarnain, Ali Mamat, and ishamuddin Zainuddin Abstract- The focus of this study is developing

More information

An Introduction to Proof-based Mathematics Harvard/MIT ESP: Summer HSSP Isabel Vogt

An Introduction to Proof-based Mathematics Harvard/MIT ESP: Summer HSSP Isabel Vogt An Introduction to Proof-based Mathematics Harvard/MIT ESP: Summer HSSP Isabel Vogt Class Objectives Field Axioms Finite Fields Field Extensions Class 5: Fields and Field Extensions 1 1. Axioms for a field

More information

Quantum algorithms for computing short discrete logarithms and factoring RSA integers

Quantum algorithms for computing short discrete logarithms and factoring RSA integers Quantum algorithms for computing short discrete logarithms and factoring RSA integers Martin Ekerå, Johan Håstad February, 07 Abstract In this paper we generalize the quantum algorithm for computing short

More information

Lecture note 8: Quantum Algorithms

Lecture note 8: Quantum Algorithms Lecture note 8: Quantum Algorithms Jian-Wei Pan Physikalisches Institut der Universität Heidelberg Philosophenweg 12, 69120 Heidelberg, Germany Outline Quantum Parallelism Shor s quantum factoring algorithm

More information

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate

More information

2 A Fourier Transform for Bivariate Functions

2 A Fourier Transform for Bivariate Functions Stanford University CS59Q: Quantum Computing Handout 0 Luca Trevisan October 5, 0 Lecture 0 In which we present a polynomial time quantum algorithm for the discrete logarithm problem. The Discrete Log

More information

)j > Riley Tipton Perry University of New South Wales, Australia. World Scientific CHENNAI

)j > Riley Tipton Perry University of New South Wales, Australia. World Scientific CHENNAI Riley Tipton Perry University of New South Wales, Australia )j > World Scientific NEW JERSEY LONDON. SINGAPORE BEIJING SHANSHAI HONG K0N6 TAIPEI» CHENNAI Contents Acknowledgments xi 1. Introduction 1 1.1

More information

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem Quantum Computing Lecture Notes, Extra Chapter Hidden Subgroup Problem Ronald de Wolf 1 Hidden Subgroup Problem 1.1 Group theory reminder A group G consists of a set of elements (which is usually denoted

More information

Factoring on a Quantum Computer

Factoring on a Quantum Computer Factoring on a Quantum Computer The Essence Shor s Algorithm Wolfgang Polak wp@pocs.com Thanks to: Eleanor Rieffel Fuji Xerox Palo Alto Laboratory Wolfgang Polak San Jose State University, 4-14-010 - p.

More information

Factoring integers with a quantum computer

Factoring integers with a quantum computer Factoring integers with a quantum computer Andrew Childs Department of Combinatorics and Optimization and Institute for Quantum Computing University of Waterloo Eighth Canadian Summer School on Quantum

More information

Quantum algorithms for hidden nonlinear structures

Quantum algorithms for hidden nonlinear structures Quantum algorithms for hidden nonlinear structures Andrew Childs Waterloo Leonard Schulman Caltech Umesh Vazirani Berkeley Shor s algorithm finds hidden linear structures [Shor 94]: Efficient quantum algorithms

More information

Theoretical Cryptography, Lecture 13

Theoretical Cryptography, Lecture 13 Theoretical Cryptography, Lecture 13 Instructor: Manuel Blum Scribe: Ryan Williams March 1, 2006 1 Today Proof that Z p has a generator Overview of Integer Factoring Discrete Logarithm and Quadratic Residues

More information

A Glimpse of Quantum Computation

A Glimpse of Quantum Computation A Glimpse of Quantum Computation Zhengfeng Ji (UTS:QSI) QCSS 2018, UTS 1. 1 Introduction What is quantum computation? Where does the power come from? Superposition Incompatible states can coexist Transformation

More information

Quantum NP - Cont. Classical and Quantum Computation A.Yu Kitaev, A. Shen, M. N. Vyalyi 2002

Quantum NP - Cont. Classical and Quantum Computation A.Yu Kitaev, A. Shen, M. N. Vyalyi 2002 Quantum NP - Cont. Classical and Quantum Computation A.Yu Kitaev, A. Shen, M. N. Vyalyi 2002 1 QMA - the quantum analog to MA (and NP). Definition 1 QMA. The complexity class QMA is the class of all languages

More information

Lecture 14. Outline. 1. Finish Polynomials and Secrets. 2. Finite Fields: Abstract Algebra 3. Erasure Coding

Lecture 14. Outline. 1. Finish Polynomials and Secrets. 2. Finite Fields: Abstract Algebra 3. Erasure Coding Lecture 14. Outline. 1. Finish Polynomials and Secrets. 2. Finite Fields: Abstract Algebra 3. Erasure Coding Modular Arithmetic Fact and Secrets Modular Arithmetic Fact: There is exactly 1 polynomial of

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Toni Bluher Math Research Group, NSA 2018 Women and Mathematics Program Disclaimer: The opinions expressed are those of the writer and not necessarily those of NSA/CSS,

More information

Exponential algorithmic speedup by quantum walk

Exponential algorithmic speedup by quantum walk Exponential algorithmic speedup by quantum walk Andrew Childs MIT Center for Theoretical Physics joint work with Richard Cleve Enrico Deotto Eddie Farhi Sam Gutmann Dan Spielman quant-ph/0209131 Motivation

More information

D-MATH Algebra II FS18 Prof. Marc Burger. Solution 26. Cyclotomic extensions.

D-MATH Algebra II FS18 Prof. Marc Burger. Solution 26. Cyclotomic extensions. D-MAH Algebra II FS18 Prof. Marc Burger Solution 26 Cyclotomic extensions. In the following, ϕ : Z 1 Z 0 is the Euler function ϕ(n = card ((Z/nZ. For each integer n 1, we consider the n-th cyclotomic polynomial

More information

How behavior of systems with sparse spectrum can be predicted on a quantum computer

How behavior of systems with sparse spectrum can be predicted on a quantum computer How behavior of systems with sparse spectrum can be predicted on a quantum computer arxiv:quant-ph/0004021v2 26 Jun 2000 Yuri Ozhigov Abstract Call a spectrum of Hamiltonian sparse if each eigenvalue can

More information

An Improved Quantum Fourier Transform Algorithm and Applications

An Improved Quantum Fourier Transform Algorithm and Applications An Improved Quantum Fourier Transform Algorithm and Applications Lisa Hales Group in Logic and the Methodology of Science University of California at Berkeley hales@cs.berkeley.edu Sean Hallgren Ý Computer

More information

Lecture 15: The Hidden Subgroup Problem

Lecture 15: The Hidden Subgroup Problem CS 880: Quantum Information Processing 10/7/2010 Lecture 15: The Hidden Subgroup Problem Instructor: Dieter van Melkebeek Scribe: Hesam Dashti The Hidden Subgroup Problem is a particular type of symmetry

More information

Shor Factorization Algorithm

Shor Factorization Algorithm qitd52 Shor Factorization Algorithm Robert B. Griffiths Version of 7 March 202 References: Mermin = N. D. Mermin, Quantum Computer Science (Cambridge University Press, 2007), Ch. 3 QCQI = M. A. Nielsen

More information

Super-strong Approximation I

Super-strong Approximation I Super-strong Approximation I Emmanuel Breuillard Université Paris-Sud, Orsay, France IPAM, February 9th, 2015 Strong Approximation G = connected, simply connected, semisimple algebraic group defined over

More information

C/CS/Phys 191 Shor s order (period) finding algorithm and factoring 11/01/05 Fall 2005 Lecture 19

C/CS/Phys 191 Shor s order (period) finding algorithm and factoring 11/01/05 Fall 2005 Lecture 19 C/CS/Phys 9 Shor s order (period) finding algorithm and factoring /0/05 Fall 2005 Lecture 9 Readings Benenti et al., Ch. 3.2-3.4 Stolze and Suter, uantum Computing, Ch. 8.3 Nielsen and Chuang, uantum Computation

More information

Euler s, Fermat s and Wilson s Theorems

Euler s, Fermat s and Wilson s Theorems Euler s, Fermat s and Wilson s Theorems R. C. Daileda February 17, 2018 1 Euler s Theorem Consider the following example. Example 1. Find the remainder when 3 103 is divided by 14. We begin by computing

More information

Quantum computing. Shor s factoring algorithm. Dimitri Petritis. UFR de mathématiques Université de Rennes CNRS (UMR 6625) Rennes, 30 novembre 2018

Quantum computing. Shor s factoring algorithm. Dimitri Petritis. UFR de mathématiques Université de Rennes CNRS (UMR 6625) Rennes, 30 novembre 2018 Shor s factoring algorithm Dimitri Petritis UFR de mathématiques Université de Rennes CNRS (UMR 6625) Rennes, 30 novembre 2018 Classical Turing machines Theoretical model of classical computer = classical

More information

arxiv:quant-ph/ v3 21 Feb 2003

arxiv:quant-ph/ v3 21 Feb 2003 Circuit for Shor s algorithm using 2n+3 qubits arxiv:quant-ph/2595v3 21 Feb 23 Stéphane Beauregard Abstract We try to minimize the number of qubits needed to factor an integer of n bits using Shor s algorithm

More information

Bjorn Poonen. MSRI Introductory Workshop on Rational and Integral Points on Higher-dimensional Varieties. January 18, 2006

Bjorn Poonen. MSRI Introductory Workshop on Rational and Integral Points on Higher-dimensional Varieties. January 18, 2006 University of California at Berkeley MSRI Introductory Workshop on Rational and Integral Points on Higher-dimensional Varieties January 18, 2006 The original problem H10: Find an algorithm that solves

More information

QIP Note: On the Quantum Fourier Transform and Applications

QIP Note: On the Quantum Fourier Transform and Applications QIP ote: On the Quantum Fourier Transform and Applications Ivan Damgård 1 Introduction This note introduces Fourier transforms over finite Abelian groups, and shows how this can be used to find the period

More information

Algebraic Constructions of Graphs

Algebraic Constructions of Graphs Spectral Graph Theory Lecture 15 Algebraic Constructions of Graphs Daniel A. Spielman October 17, 2012 15.1 Overview In this lecture, I will explain how to make graphs from linear error-correcting codes.

More information

Figure 1: Circuit for Simon s Algorithm. The above circuit corresponds to the following sequence of transformations.

Figure 1: Circuit for Simon s Algorithm. The above circuit corresponds to the following sequence of transformations. CS 94 //09 Fourier Transform, Period Finding and Factoring in BQP Spring 009 Lecture 4 Recap: Simon s Algorithm Recall that in the Simon s problem, we are given a function f : Z n Zn (i.e. from n-bit strings

More information

Classifying classes of structures in model theory

Classifying classes of structures in model theory Classifying classes of structures in model theory Saharon Shelah The Hebrew University of Jerusalem, Israel, and Rutgers University, NJ, USA ECM 2012 Saharon Shelah (HUJI and Rutgers) Classifying classes

More information

Discrete quantum random walks

Discrete quantum random walks Quantum Information and Computation: Report Edin Husić edin.husic@ens-lyon.fr Discrete quantum random walks Abstract In this report, we present the ideas behind the notion of quantum random walks. We further

More information

Elliptic Curves Spring 2013 Lecture #12 03/19/2013

Elliptic Curves Spring 2013 Lecture #12 03/19/2013 18.783 Elliptic Curves Spring 2013 Lecture #12 03/19/2013 We now consider our first practical application of elliptic curves: factoring integers. Before presenting the elliptic curve method (ECM) for factoring

More information

Quantum Computer Simulation Using CUDA (Quantum Fourier Transform Algorithm)

Quantum Computer Simulation Using CUDA (Quantum Fourier Transform Algorithm) Quantum Computer Simulation Using CUDA (Quantum Fourier Transform Algorithm) Alexander Smith & Khashayar Khavari Department of Electrical and Computer Engineering University of Toronto April 15, 2009 Alexander

More information

No Laplacian Perfect State Transfer in Trees

No Laplacian Perfect State Transfer in Trees No Laplacian Perfect State Transfer in Trees arxiv:1408.2935v1 [math.co] 13 Aug 2014 Gabriel Coutinho Henry Liu October 15, 2018 Abstract We consider a system of qubits coupled via nearest-neighbour interaction

More information

Short Course in Quantum Information Lecture 5

Short Course in Quantum Information Lecture 5 Short Course in Quantum Information Lecture 5 Quantum Algorithms Prof. Andrew Landahl University of New Mexico Course Info All materials downloadable @ website http://info.phys.unm.edu/~deutschgroup/deutschclasses.html

More information

Quantum Complexity Theory. Wim van Dam HP Labs MSRI UC Berkeley SQUINT 3 June 16, 2003

Quantum Complexity Theory. Wim van Dam HP Labs MSRI UC Berkeley SQUINT 3 June 16, 2003 Quantum Complexity Theory Wim van Dam HP Labs MSRI UC Berkeley SQUINT 3 June 16, 2003 Complexity Theory Complexity theory investigates what resources (time, space, randomness, etc.) are required to solve

More information

Ph 219b/CS 219b. Exercises Due: Wednesday 11 February 2009

Ph 219b/CS 219b. Exercises Due: Wednesday 11 February 2009 1 Ph 219b/CS 219b Exercises Due: Wednesday 11 February 2009 5.1 The peak in the Fourier transform In the period finding algorithm we prepared the periodic state A 1 1 x 0 + jr, (1) A j=0 where A is the

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Part II Emma Strubell http://cs.umaine.edu/~ema/quantum_tutorial.pdf April 13, 2011 Overview Outline Grover s Algorithm Quantum search A worked example Simon s algorithm

More information

Mathematics of Public Key Cryptography

Mathematics of Public Key Cryptography Mathematics of Public Key Cryptography Eric Baxter April 12, 2014 Overview Brief review of public-key cryptography Mathematics behind public-key cryptography algorithms What is Public-Key Cryptography?

More information

Quantum Computation and Communication

Quantum Computation and Communication Tom Lake tswsl1989@sucs.org 16/02/2012 quan tum me chan ics: The branch of mechanics that deals with the mathematical description of the motion and interaction of subatomic particles - OED quan tum me

More information

Some Introductory Notes on Quantum Computing

Some Introductory Notes on Quantum Computing Some Introductory Notes on Quantum Computing Markus G. Kuhn http://www.cl.cam.ac.uk/~mgk25/ Computer Laboratory University of Cambridge 2000-04-07 1 Quantum Computing Notation Quantum Computing is best

More information

ZEROS OF POLYNOMIAL FUNCTIONS ALL I HAVE TO KNOW ABOUT POLYNOMIAL FUNCTIONS

ZEROS OF POLYNOMIAL FUNCTIONS ALL I HAVE TO KNOW ABOUT POLYNOMIAL FUNCTIONS ZEROS OF POLYNOMIAL FUNCTIONS ALL I HAVE TO KNOW ABOUT POLYNOMIAL FUNCTIONS TOOLS IN FINDING ZEROS OF POLYNOMIAL FUNCTIONS Synthetic Division and Remainder Theorem (Compressed Synthetic Division) Fundamental

More information

Endomorphism algebras of semistable abelian varieties over Q of GL(2)-type

Endomorphism algebras of semistable abelian varieties over Q of GL(2)-type of semistable abelian varieties over Q of GL(2)-type UC Berkeley Tatefest May 2, 2008 The abelian varieties in the title are now synonymous with certain types of modular forms. (This is true because we

More information

QUANTUM CRYPTOGRAPHY QUANTUM COMPUTING. Philippe Grangier, Institut d'optique, Orsay. from basic principles to practical realizations.

QUANTUM CRYPTOGRAPHY QUANTUM COMPUTING. Philippe Grangier, Institut d'optique, Orsay. from basic principles to practical realizations. QUANTUM CRYPTOGRAPHY QUANTUM COMPUTING Philippe Grangier, Institut d'optique, Orsay 1. Quantum cryptography : from basic principles to practical realizations. 2. Quantum computing : a conceptual revolution

More information

Quantum Algorithms. 1. Definition of the Subject and Its Importance. 4. Factoring, Discrete Logarithms, and the Abelian Hidden Subgroup Problem

Quantum Algorithms. 1. Definition of the Subject and Its Importance. 4. Factoring, Discrete Logarithms, and the Abelian Hidden Subgroup Problem Quantum Algorithms Michele Mosca Institute for Quantum Computing and Dept. of Combinatorics & Optimization University of Waterloo and St. Jerome s University, and Perimeter Institute for Theoretical Physics

More information

The existence of designs - after Peter Keevash

The existence of designs - after Peter Keevash The existence of designs - after Peter Keevash Bourbaki seminar, IHP, Paris, June 27, 2015 Introduction: Designs and Steiner systems A set S of q-subsets of an n-set X is a design with parameters (n, q,

More information

Fast, twist-secure elliptic curve cryptography from Q-curves

Fast, twist-secure elliptic curve cryptography from Q-curves Fast, twist-secure elliptic curve cryptography from Q-curves Benjamin Smith Team GRACE INRIA Saclay Île-de-France Laboratoire d Informatique de l École polytechnique (LIX) ECC #17, Leuven September 16,

More information

From Adversaries to Algorithms. Troy Lee Rutgers University

From Adversaries to Algorithms. Troy Lee Rutgers University From Adversaries to Algorithms Troy Lee Rutgers University Quantum Query Complexity As in classical complexity, it is difficult to show lower bounds on the time or number of gates required to solve a problem

More information

Questionnaire for CSET Mathematics subset 1

Questionnaire for CSET Mathematics subset 1 Questionnaire for CSET Mathematics subset 1 Below is a preliminary questionnaire aimed at finding out your current readiness for the CSET Math subset 1 exam. This will serve as a baseline indicator for

More information

In fact, 3 2. It is not known whether 3 1. All three problems seem hard, although Shor showed that one can solve 3 quickly on a quantum computer.

In fact, 3 2. It is not known whether 3 1. All three problems seem hard, although Shor showed that one can solve 3 quickly on a quantum computer. Attacks on RSA, some using LLL Recall RSA: N = pq hard to factor. Choose e with gcd(e,φ(n)) = 1, where φ(n) = (p 1)(q 1). Via extended Euclid, find d with ed 1 (mod φ(n)). Discard p and q. Public key is

More information

COMPUTATIONAL COMPLEXITY

COMPUTATIONAL COMPLEXITY COMPUTATIONAL COMPLEXITY A Modern Approach SANJEEV ARORA Princeton University BOAZ BARAK Princeton University {Щ CAMBRIDGE Щ0 UNIVERSITY PRESS Contents About this book Acknowledgments Introduction page

More information

Shor s Quantum Factorization Algorithm

Shor s Quantum Factorization Algorithm Shor s Quantum Factorization Algorithm Tayeb Aïssiou Department of Mathematics and Statistics McGill University, Montreal, Quebec Canada H3A K6 e-mail: tayeb.aissiou@mail.mcgill.ca November, 5 Abstract

More information

On the polynomial x(x + 1)(x + 2)(x + 3)

On the polynomial x(x + 1)(x + 2)(x + 3) On the polynomial x(x + 1)(x + 2)(x + 3) Warren Sinnott, Steven J Miller, Cosmin Roman February 27th, 2004 Abstract We show that x(x + 1)(x + 2)(x + 3) is never a perfect square or cube for x a positive

More information

COMS W4995 Introduction to Cryptography September 29, Lecture 8: Number Theory

COMS W4995 Introduction to Cryptography September 29, Lecture 8: Number Theory COMS W4995 Introduction to Cryptography September 29, 2005 Lecture 8: Number Theory Lecturer: Tal Malkin Scribes: Elli Androulaki, Mohit Vazirani Summary This lecture focuses on some basic Number Theory.

More information

An Introduction to Quantum Information and Applications

An Introduction to Quantum Information and Applications An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded

More information

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. ) Quantum Computing 101 ( Everything you wanted to know about quantum computers but were afraid to ask. ) Copyright Chris Lomont, 2004 2 67 1 = 193707721 761838257287 Took American Mathematician Frank Nelson

More information

Quantum wires, orthogonal polynomials and Diophantine approximation

Quantum wires, orthogonal polynomials and Diophantine approximation Quantum wires, orthogonal polynomials and Diophantine approximation Introduction Quantum Mechanics (QM) is a linear theory Main idea behind Quantum Information (QI): use the superposition principle of

More information

Lecture 10: Eigenvalue Estimation

Lecture 10: Eigenvalue Estimation CS 880: Quantum Information Processing 9/7/010 Lecture 10: Eigenvalue Estimation Instructor: Dieter van Melkebeek Scribe: Dalibor Zelený Last time we discussed the quantum Fourier transform, and introduced

More information

Primes and Factorization

Primes and Factorization Primes and Factorization 1 A prime number is an integer greater than 1 with no proper divisors. The list begins 2, 3, 5, 7, 11, 13, 19,... See http://primes.utm.edu/ for a wealth of information about primes.

More information

5.4 ElGamal - definition

5.4 ElGamal - definition 5.4 ElGamal - definition In this section we define the ElGamal encryption scheme. Next to RSA it is the most important asymmetric encryption scheme. Recall that for a cyclic group G, an element g G is

More information

arxiv:quant-ph/ Nov 2000

arxiv:quant-ph/ Nov 2000 Basic concepts in quantum computation Artur Ekert, Patrick Hayden and Hitoshi Inamori Centre for Quantum Computation, University of Oxford, Oxford OX1 3PU, United Kingdom arxiv:quant-ph/0011013 Nov 000

More information

Computing the modular equation

Computing the modular equation Computing the modular equation Andrew V. Sutherland (MIT) Barcelona-Boston-Tokyo Number Theory Seminar in Memory of Fumiyuki Momose Andrew V. Sutherland (MIT) Computing the modular equation 1 of 8 The

More information

Math 319 Problem Set #2 Solution 14 February 2002

Math 319 Problem Set #2 Solution 14 February 2002 Math 39 Problem Set # Solution 4 February 00. (.3, problem 8) Let n be a positive integer, and let r be the integer obtained by removing the last digit from n and then subtracting two times the digit ust

More information

Model-theoretic distality and incidence combinatorics

Model-theoretic distality and incidence combinatorics Model-theoretic distality and incidence combinatorics Artem Chernikov UCLA Model Theory and Combinatorics workshop IHP, Paris, France Jan 29, 2018 Intro I will discuss generalizations of various results

More information

The Quantum Query Complexity of Algebraic Properties

The Quantum Query Complexity of Algebraic Properties The Quantum Query Complexity of Algebraic Properties Sebastian Dörn Institut für Theoretische Informatik Universität Ulm 89069 Ulm, Germany Thomas Thierauf Fak. Elektronik und Informatik HTW Aalen 73430

More information

A Gentle Introduction to Quantum Computing

A Gentle Introduction to Quantum Computing A Gentle Introduction to Quantum Computing Abdullah Khalid 01-10-0168 School of Science and Engineering Lahore University of Management Sciences Friday 3 rd June, 011 Contents 1 Introduction to Quantum

More information

Numerical Methods. Equations and Partial Fractions. Jaesung Lee

Numerical Methods. Equations and Partial Fractions. Jaesung Lee Numerical Methods Equations and Partial Fractions Jaesung Lee Solving linear equations Solving linear equations Introduction Many problems in engineering reduce to the solution of an equation or a set

More information

Quantum Computation, NP-Completeness and physical reality [1] [2] [3]

Quantum Computation, NP-Completeness and physical reality [1] [2] [3] Quantum Computation, NP-Completeness and physical reality [1] [2] [3] Compiled by Saman Zarandioon samanz@rutgers.edu 1 Introduction The NP versus P question is one of the most fundamental questions in

More information

arxiv:quant-ph/ v1 17 Jul 1997

arxiv:quant-ph/ v1 17 Jul 1997 Submitted to Proc. Roy. Soc. Lond. A for the Proceedings of the Santa Barbara Conference on Quantum Coherence and Decoherence held in December 1996, edited by E. Knill, R. LaFlamme and W. Zurek. Quantum

More information

New Quantum Algorithm Solving the NP Complete Problem

New Quantum Algorithm Solving the NP Complete Problem ISSN 070-0466, p-adic Numbers, Ultrametric Analysis and Applications, 01, Vol. 4, No., pp. 161 165. c Pleiades Publishing, Ltd., 01. SHORT COMMUNICATIONS New Quantum Algorithm Solving the NP Complete Problem

More information

Periodicity & State Transfer Some Results Some Questions. Periodic Graphs. Chris Godsil. St John s, June 7, Chris Godsil Periodic Graphs

Periodicity & State Transfer Some Results Some Questions. Periodic Graphs. Chris Godsil. St John s, June 7, Chris Godsil Periodic Graphs St John s, June 7, 2009 Outline 1 Periodicity & State Transfer 2 Some Results 3 Some Questions Unitary Operators Suppose X is a graph with adjacency matrix A. Definition We define the operator H X (t)

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Einar Pius University of Edinburgh Why this Course To raise interest in quantum computing To show how quantum computers could be useful To talk about concepts not found

More information

Algorithms for quantum computers. Andrew Childs Department of Combinatorics & Optimization and Institute for Quantum Computing University of Waterloo

Algorithms for quantum computers. Andrew Childs Department of Combinatorics & Optimization and Institute for Quantum Computing University of Waterloo Algorithms for quantum computers Andrew Childs Department of Combinatorics & Optimization and Institute for Quantum Computing University of Waterloo What is a computer? A means for performing calculations

More information

Chapter 2 The Group U(1) and its Representations

Chapter 2 The Group U(1) and its Representations Chapter 2 The Group U(1) and its Representations The simplest example of a Lie group is the group of rotations of the plane, with elements parametrized by a single number, the angle of rotation θ. It is

More information

Implementing Competitive Learning in a Quantum System

Implementing Competitive Learning in a Quantum System Implementing Competitive Learning in a Quantum System Dan Ventura fonix corporation dventura@fonix.com http://axon.cs.byu.edu/dan Abstract Ideas from quantum computation are applied to the field of neural

More information

Input Decidable Language -- Program Halts on all Input Encoding of Input -- Natural Numbers Encoded in Binary or Decimal, Not Unary

Input Decidable Language -- Program Halts on all Input Encoding of Input -- Natural Numbers Encoded in Binary or Decimal, Not Unary Complexity Analysis Complexity Theory Input Decidable Language -- Program Halts on all Input Encoding of Input -- Natural Numbers Encoded in Binary or Decimal, Not Unary Output TRUE or FALSE Time and Space

More information

IBM Research Report. arxiv:quant-ph/ v1 16 Jan An Approximate Fourier Transform Useful in Quantum Factoring

IBM Research Report. arxiv:quant-ph/ v1 16 Jan An Approximate Fourier Transform Useful in Quantum Factoring RC 964 (07//94) Mathematics IBM Research Report arxiv:quant-ph/00067v 6 Jan 00 An Approximate Fourier Transform Useful in Quantum Factoring D. Coppersmith IBM Research Division T.J. Watson Research Center

More information

Definition For a set F, a polynomial over F with variable x is of the form

Definition For a set F, a polynomial over F with variable x is of the form *6. Polynomials Definition For a set F, a polynomial over F with variable x is of the form a n x n + a n 1 x n 1 + a n 2 x n 2 +... + a 1 x + a 0, where a n, a n 1,..., a 1, a 0 F. The a i, 0 i n are the

More information

Quantum Computing. 6. Quantum Computer Architecture 7. Quantum Computers and Complexity

Quantum Computing. 6. Quantum Computer Architecture 7. Quantum Computers and Complexity Quantum Computing 1. Quantum States and Quantum Gates 2. Multiple Qubits and Entangled States 3. Quantum Gate Arrays 4. Quantum Parallelism 5. Examples of Quantum Algorithms 1. Grover s Unstructured Search

More information

Mahler measure as special values of L-functions

Mahler measure as special values of L-functions Mahler measure as special values of L-functions Matilde N. Laĺın Université de Montréal mlalin@dms.umontreal.ca http://www.dms.umontreal.ca/~mlalin CRM-ISM Colloquium February 4, 2011 Diophantine equations

More information

300-Level Math Courses

300-Level Math Courses 300-Level Math Courses Math 250: Elementary Differential Equations A differential equation is an equation relating an unknown function to one or more of its derivatives; for instance, f = f is a differential

More information

1 The Fundamental Theorem of Arithmetic. A positive integer N has a unique prime power decomposition. Primality Testing. and. Integer Factorisation

1 The Fundamental Theorem of Arithmetic. A positive integer N has a unique prime power decomposition. Primality Testing. and. Integer Factorisation 1 The Fundamental Theorem of Arithmetic A positive integer N has a unique prime power decomposition 2 Primality Testing Integer Factorisation (Gauss 1801, but probably known to Euclid) The Computational

More information

Quantum Computing and the Possible Effects on Modern Security Practices

Quantum Computing and the Possible Effects on Modern Security Practices Quantum Computing and the Possible Effects on Modern Security Practices SE 4C03 Winter 2005 Kartik Sivaramakrishnan Researched by: Jeffery Lindner, 9904294 Due: April 04, 2005 Table of Contents Introduction...

More information

On the query complexity of counterfeiting quantum money

On the query complexity of counterfeiting quantum money On the query complexity of counterfeiting quantum money Andrew Lutomirski December 14, 2010 Abstract Quantum money is a quantum cryptographic protocol in which a mint can produce a state (called a quantum

More information

arxiv:quant-ph/ v2 22 Jan 2004

arxiv:quant-ph/ v2 22 Jan 2004 Shor s discrete logarithm quantum algorithm for elliptic curves arxiv:quant-ph/0301141v2 22 Jan 2004 John Proos and Christof Zalka Department of Combinatorics and Optimization University of Waterloo, Waterloo,

More information

Graph Non-Isomorphism Has a Succinct Quantum Certificate

Graph Non-Isomorphism Has a Succinct Quantum Certificate Graph Non-Isomorphism Has a Succinct Quantum Certificate Tatsuaki Okamoto Keisuke Tanaka Summary This paper presents the first quantum computational characterization of the Graph Non-Isomorphism problem

More information