Entanglement Reduces Complexity

Size: px
Start display at page:

Download "Entanglement Reduces Complexity"

Transcription

1 Physics 52 Quantum Physics (Townsend) April 27, 2000 Entanglement Reduces Complexity The Physical Nature of Computing and the Advent of Quantum Computation...Nature isn t classical, dammit, and if you want to make a simulation of Nature, you d better make it quantum mechanical, and by golly it s a wonderful problem, because it doesn t look so easy. Richard P. Feynman [?] 1 Two Problems Nearly every student in recent history has had occasion to take a multiple-choice test. In answering any one question on the test, the student is faced with a finite number of choices and charged with the (relatively) simple task of selecting the correct answer from among these choices. Assuming that a student is able to recognize the correct answer when it is presented to him or her (perhaps the student attends Harvey Mudd), the problem then reduces to finding this correct answer as quickly as possible. With respect to the time it takes for the student to find the correct answer ( the running time of the student s thought process) one needs to asks the question of how many operations this process takes. This question is answered in the form of it takes x operations to find the correct answer, where an operation is some action which can be performed more or less using the same amount of resources 1 on all input. Clearly, x could be one if the first answer that the student examines is the correct answer, or x could be N where N is the number of answers to be examined. Luckily for the aforementioned student, a standard multiple-choice test typically contains at most 4 or 5 answers to be examined. However, if the maximum number of answers for each question were 100, a student would find completing the exam in a timely manner a challenging task to say the least. Thus, one observes the importance of knowing the worst-case running time, i.e. the maximum possible number of operations required for a computation to complete. The multiple-choice search outlined above is a specific case of a problem which computer science has dubed the unordered search problem. The unordered search problem supplies an 1 Usually time and space are the resources which are considered in such an analysis. 1

2 unsorted collection of data and a key value, and asks as output the unique element which corresponds to the given key value. Clearly, since the examination of an element of the collection yields no information which allows one to discard other unexamined data, finding the element corresponding to a given key can take at most N operations. Classically, there is no way around this worst case. Now consider a second problem. Given a set of m cities each with a distance defined between them, is there a path which goes through every city and ends in the city in which it began with a total combined path length of D or less (where total combined path length refers to the sum of the distances traversed to visit each city). This is referred to as the traveling salesperson problem[?]. This problem is referred to as an NP-Complete problem, which means that computer scientists have yet to find a solution that does not require an exponential number of operations in the number of cities, nor do they expect to find such a solution. In computing this problem then, if we assume that it requires 2 n operations in the worst case, a reasonable input size of 100 requires operations. For a computer capable of operations per second, this computation still requires seconds to compute, a quantity much larger than the estimated age of the universe, seconds [?]. Thus, this exponential limit is a serious barrier in computation. 2 Classical Physics, Complexity Theory, and Massive Parallelism 2.1 Computation is Physical At its core, all computation is inherently physical. Whether computation exists as marks on paper or neurons firing in the cortex of a mathematician s - physicist s brain, computation exists in some physical form. In the previous section the importance of worst-case running time was introduced with the idea of minimizing some physical resources. Without this restriction, the physical mechanism of computation would be of little importance and one could simply use some mechanism and be guaranteed an answer given some infinitude of resources. However, in the practical world we desire to minimize a limited number of resources through the mechanism of computation, and thus the physics of this mechanism becomes of paramount importance. Computation until very recently has operated on classical physics, obeying the equations of Newton and Maxwell. Reexamining the problems introduced in the opening of this paper, one 2

3 finds that the solutions to these problems are very dependent on classical physics. Specifically, in the unordered search problem classical physics dictates we must examine each element individually, and thus places an strict limit on the worst-case number of computations to be performed. Fortunately, the world as we currently know it is not strictly classical; the world behaves according to quantum mechanics. In the quantum mechanical world entities need not be unique and fixed, rather, entities can exist as a coherent superposition of states. Herein lies an important difference between quantum mechanics and the classical world:multiple states can be treated as one entity [?]. Whether this difference may be exploited to fundamentally change computation is explored in the remainder of this paper. 2.2 Classical Models of Computation Modern complexity theory, the study of resource consumption in computation, is based on both the Universal Turing Machine and the Church-Turing Thesis. A turing machine is a theoretical construct consisting of an infinitely long tape Γ, subdivided into cells on which a single symbol from the set Σ may be written. A read/write head rests at some cell on the tape and exists in some state q n out of a finite set of possible states Q. This machine is governed by a set of transition rules known as finite state controls which examine the current symbol under the read/write head, determine whether to overwrite this symbol with another in Σ, and move the head to the right or left if desired [?]. According to the quasimathematical hypothesis proposed by Alonzo Church and Alan Turing (known as the Church- Turing Thesis), the Turing Machine has the same ability to compute as any other means of computation. Formally, this means that there exists some function f that reformulates a problem computable by some computer M 1 to one computable by a Turing Machine, M T. This concept of a maximally powerful computational device is referred to as a Universal Turing Machine (UTM). According to Turing s formulation of the Church-Turing Thesis, Every function which would naturally be regarded as computable can be computed by the universal Turing machine. [?] Work has been done to show certain systems of computation equivalent to UTM s. The most important of these is the class of computations performable by Random Access Machines and High-level Programming languages, the modern method of computation [?]. As a result, if we desire to compute more efficiently we must demonstrate the existence of more powerful model of computation and perhaps alter the Church-Turing Thesis. 3

4 Figure 1: A visual representation of a Turing Machine. Note the tape Γ at the top, the finite set of states Q, and the read/write head (currently in state q 1 ). A finite state control may change the state in the read/write head to some other in Q, rewrite the symbol on the tape (currently 0), and move the head either to the left or the right. 2.3 Classical Enhancements to the Turing Machine One method popularly employed to solve computationally intensive problems is that of parallel computation, in which more than one processing device is employed to simultaneously solve different elements of the same problem. For especially difficult problems, the recent rise of massive parallel processing environments in which hundreds and thousands of processing units are employed has allowed for tenable solutions 2 [?]. However, parallelism introduces no fundamental change in the UTM. Rather, parallel computation relies on the simultaneous use of more than one UTM. Unless the number of UTMs scales with the number of computations to be performed, however, parallelism offers no more than a constant decrease in resource usage. Moreover, scaling with the size of the number of computations is not physically reasonable, even if the number of operations grows like a small polynomial with the input. Thus, parallelism offers no fundamental change in computation. The probabilistic Turing Machine (PTM), in which more than one finite state control may exist for a certain state, each governed by a probability, actually created a fundamental change in the Turing Machine model as well as a strengthening of the Church-Turing Thesis [?]. However, many classes of problems 3 still remain intractable in that they take a number of operations which is exponential in the size of the input. Moreover, in 1982 Richard Feynman demonstrated that PTMs were incapable of simulating quantum physical systems without 2 For instance, the Accelerated Strategic Computing Initiative (ASCI) project based in Sandia National Laboratory allows the US government to test nuclear detonations computationally. 3 Most notably, the NP complete problems. 4

5 an exponential number of operations. This suggested to Feynman that a new model of computation, one based on quantum physics and quantum probabilities, would prove to be more powerful than all classical computational models [?]. 3 Entanglement and Complexity: Quantum Mechanics Improves the Situation? 3.1 Entanglement, Superposition, and Interference Methods of encoding information quantum mechanically are readily found. Quantum mechanics demonstrates numerous particles with observable characteristics that can exist in mutually exclusive binary states. For example, the spin operator S z when applied to the state for an electron in hydrogen, Ψ e 4, yields S z Ψ e = m s ħ Ψ e (m s = ±1/2)[?] (1) The existence of these binary states in nature gives rise to the ability to code information in a sort of quantum bit, or qubit. We designate the two states of the qubit as 0 and 1, corresponding to some physical observable. These states form an orthonormal space for two-dimensional Hilbert 5 space in which this qubit exists, such that [?] 0 0 = 1 1 = = 1 0 = 0 (2) Regarded as a new means to label classical bits, qubits offer no real advance in computation. The phenomenon of entanglement, however, is the key to using qubits to a computational advantage. Imagine two electrons, one spin up and one spin down, meeting and interacting 4 Here we introduce Dirac bracket notation. ψ n (pronounced ket or ket vector ) is an alternative representation to the wavefunction of a quantum state denoted ψ n. ψ n is a complete description of a quantum state denoted by the quantum numbers referred to as a collection as n. We interpret ψ n in the same manner as a wavefunction, that is, as a probability amplitude. The complex conjugate of ψ n is ψ n (pronounced bra ). We further represent ψ na op ψ n dτ = ψ n A op ψ n and ψ nψ n dτ = ψ n ψ n [?]. 5 Hilbert space is a possibly infinitely dimensional space in which each quantum number of a state ψ is a dimension. This space is a mathematical construct that behaves much like Cartesian space but is not limited to three real, continuous dimensions [?]. 5

6 outside of our observation and then separating from one another. Due to quantum mechanics, one will emerge spin up while the other spin down. However, due to the particles being identical we cannot know how they interacted and thus cannot predict which state we will measure a given particle in. Thus, we regard an entangled electron as being a superposition of states. In general, we represent this superposition of states as [?] Ψ = cos(θ/2) 0 ie iφ sin(θ/2) 1 (3) As a superposition of states, the 0 and 1 states can be acted upon simultaneously. This is an obvious advantage over classical computation, and proves to be the basis of quantum complexity reduction. Finally, note that quantum mechanics assigns complex coefficients to the eigenstates. This allows for interference effects, and cleverly applied interference can be used to remove or reduce the modulus the coefficients of some eigenstates and thus amplify others. This phenomenon is the basis of the quantum Fourier transform, which shall be shown to be of great importance in many quantum algorithms. 3.2 Quantum Turing Machines As previously established, the classically understood limits of computation cannot be broken (assuming the Church-Turing Thesis) without a fundamental change in the universal model of computation. In 1985, motivated by quantum theory, David Deutsch proposed a strengthening of the Church-Turing Thesis which he stated as [?] Every finitely realizable physical system can be perfectly simulated by a universal model computing machine operating by finite means. 6 Deutsch notes in his paper that Turing s conception of computation as a Turing Machine actually falls short of the computational power inherent in this stronger version of the thesis [?]. Clearly, a new model of computation which fulfills the strong version of this thesis is needed to discover the computational power allowed in a quantum mechanical world. Bernstein and Vazirani in a 1993 paper entitled Quantum Complexity Theory formalized a new, quantum model of computation built on the foundation laid out by Deutsch [?]. They proposed and formalized a quantum Turing Machine (QTM). This QTM differed from 6 Deutsch justifies this strengthening in a complex argument which essentially posits the physical reasonability of this thesis. 6

7 its classical counterpart the PTM through the use of quantum finite state controls. These quantum finite state controls consisted of δ such that δ(p, σ, τ, q, d) gives the probability amplitude of a machine in state in p reading the current symbol σ writing a symbol τ, transitioning to state q and moving a direction d. Thus, δ is a function such that δ : Q Σ Σ Q {L, R} C 7 (4) Note that the only difference between a QTM and a PTM is the mapping into C as opposed to [0, 1]. The effect of this change is to allow interference effects in quantum computation. To see such interference, assume a QTM in configurations c 1 and c 2 both may transition to state c with amplitude p. Clearly, starting the machine in one of these configurations and observing after a time step yields c with probability p. However, a QTM may be started in a superposition of states, α 1 c 1 + α 2 c 2. If we observe after a time step, we will observe c with a probability ( pα 1 ) + ( pα 2 ) 2 = p α 1 + α 2 2. Thus, interference results due to observation of this state can occur, even to the extent of making such a transition impossible (α 1 = α 2 ) [?]. A final result from Bernstein and Vazirani s paper is the construction of a universal QTM, thus providing for a new model of computation. This established a new, quantum limit on computational power. Knowing this, one is free to establish useful computational mechanism which are equivalent to the universal QTM [?]. 3.3 Elements of a Quantum Circuit Classical boolean logic tells us that any boolean operation can be composed of only two operations, AND and NOT. A result of the Schrödinger equation requires that any time evolution operator acting on Ψ must be unitary, that is, it must be reversible 8 [?]. This result requires that all quantum boolean operations be time reversible. The requirement of reversibility disallows the choice use of AND in a quantum logic circuit (AND is fed two bits of information and returns only one.). Happily, with the use of a two qubit controlled-not operator and a unitary rotation operator, a quantum computer retains this ability to impose any boolean operation on a qubit or set of qubits [?] 9. 7 Recall Q is the finite set of states, Σ is the finite alphabet of symbols used in writing to the tape Γ, and L and R represent left and right head moves, respectively. 8 In fact, a unitary time evolution operator is an equivalent form of the well-formedness condition on a QTM [?] 9 This is not a statement that quantum algorithms only use these two operations. Rather, this result states that all possible boolean operations we desire to use are available to us in that we can build them out of a 7

8 The controlled-not operation is typical of all quantum operators. For the reversibility requirement it returns the same number of arguments as it accepts 10. Its function is to flip the value of the target bit if and only if the control bit is 1. It is implemented as [?] ( denotes addition mod 2) CNOT c,t : a c b t a c a b, a, b = 0, 1 (5) Since quantum computing derives its power from the ability to represent states as a superposition of eigenstates, another important (unitary) quantum operator is [?] V (θ, φ) : 0 cos(θ/2) 0 ie iφ sin(θ/2) 1 1 cos(θ/2) 1 ie iφ sin(θ/2) 0 (6) To generalize, a quantum circuit takes as input an array of qubits a (called a register) and an output register with all bits in the 0 state 11. The quantum computation F is then computed such that the process yields [?] a 0 a F (a). (7) Observe that if the register a is composed of qubits in a superposition of 0 and 1, and a is a register of size L qubits, then this process yields every 2 L output in a superposition. This is the power of quantum computation that separates it from its classical subset. 4 Quantum Algorithms 4.1 Two Problems Redux The beginning of this paper introduced two computational problems, the first of which was the unordered search problem. This problem was examined in a paper by L. Grover in 1996 in which he proposed a quantum algorithm that required less than the classically required N steps in the worst case. This algorithm works by letting some state ψ 0 be a superposition of all states to be searched. Then, a function which negates the amplitude of the desired state (the state associated to a given key) can be applied to this state ψ 0. However, before a measurement can be made another operation is required to amplify the amplitude of the composition of operations that we know how to build already. 10 Feynman demonstrated that the number of extra arguments that needed to be carried through a quantum boolean operation is in general never more than the input itself [?] 11 Hughes demonstrates that such a system is readily created. 8

9 keyed state. For this operation, Grover applied an inversion around the mean defined to take the superposition Σ k α k k to the state Σ k β k k where β k = α k + α and α represents the mean of α 12 k. Grover showed that π N/4 repetitions of these two steps were required to find the arbitrary element [?]. This quantum algorithm illustrates the clear computational advantage of a quantum computer over its classical analog, demonstrating an asymptotically faster 13 implementation of the same algorithm. The second problem introduced in the beginning of the paper was that of the Traveling Salesperson. While the quantum algorithm for this problem is outside the scope of this paper, the result of this algorithm is pertinent to the discussion of quantum computational power. In a 1998 paper Daniel S. Abrams and Seth Lloyd constructed a set of two qubit unitary quantum operators which demonstrated that the class of problems equivalent to the Traveling Salesperson problem 14 was solvable in a polynomial, and in fact a linear number of operations in the input (i.e the number of cities in the Salesperson problem) [?]. While this result is produces an asymptotically faster algorithm in much the same manner as the unordered search problem, this result is of greater importance to computer science because the reduction in the number of steps is exponential and thus opens the possibility of the computation of useful but previously intractable problems. Thus, for this important class of problems the ability to compute a superposition of answers proves to be an incredible increase to the power of computation. 4.2 Quantum Cryptography Keeping data secret in a world of information requires cryptography, or message encoding. Classical methods of two-way, public-key cryptography rely on the intractability (computational difficulty) of factoring two large prime numbers. While given someone s public key (a number available freely which anyone may use to encrypt a message to this person) it is theoretically feasible to calculate that person s private key (a number held privately by this person which allows him or her to decrypt messages encrypted with his or her public key), the difficulty of factoring large primes makes this task almost impossible given a large enough key value. Specifically, factoring requires N operations, where N is the number to be factored. 12 As an exercise to the reader, consider the algorithm acting on N = 4, i.e. using the set x = {0, 1, 2, 3}, where the chosen element x 0 = 3 and ψ 0 = ( )/2. One application of the flip and inversion operations will yield exactly the state ψ 1 = Saying that f(n) is asymptotically faster than g(n) implies that lim N f(n)/g(n) = 0, where f(n) and g(n) represent the number of steps required to perform a computation. 14 Referred to as NP-Complete problems. 9

10 For a 100 digit number (N ), this is not a tractable problem. Number theory offers an alternate and efficient method of factoring large numbers. Given r where r is the period of F (x) N = a x (mod N) (that is, the smallest r for which a = a r (mod N)), one can use the Euclidean algorithm to find the greatest common divisor of a r/2 ± 1 and N [?]. While these mathematical details are of only ancillary interest, one should appreciate that given r this method very efficiently (in a polynomial number of steps in l where 10 l 1 N 10 l ) factors large numbers. Why this is not the classically employed solution rests on the fact that finding r is classically as difficult as brute force factoring[?]. Quantum computing provides a efficient method for finding this r, known as Shor s algorithm. Shor s algorithm operates by letting ψ 0 be a superposition of the sequence who s period is in question. Through a fairly technical series of operations known as the Quantum Fourier Transform (QTF), ψ 0 evolves into ψ 1 such that when ψ 1 is observed after this time evolution interference effects allow only those states which are multiples of 1/r to be observed. This allows the ready computation of r, and thus the factorization of N. As a result, the implementation of large scale quantum computers will quickly destroy modern cryptography. One does not, however, need to give up neither hope nor security. Quantum physics offers a solution to this cryptographic dilemma by allowing for cryptographic protocols which cannot be violated without first violating the laws of quantum mechanics. The mechanism of such protocols is the transmission of entangled pairs between two parties such that the pairs are correlated. Due to the nature of quantum mechanics, if some observer measures a transmitted member of this pair and retransmits it in an attempt to eavesdrop this observation will destroy the pair s correlation. Thus, the key to quantum cryptographic protocols is to publicly share the result of a random sample of the transmitted data. If any pair of this set of shared pairs fails to show a correlation, then the communication line can be declared insecure and a new method found. Hence, the inability to make measurements and preserve the measured system in quantum mechanics allows for the discovery of secure lines of communication which cannot be eavesdropped on without the knowledge of the communicating parties. 5 Modeling Reality: Quantum Computers May Pass the Turing Test In computer science there exists a famous test, dubbed the Turing Test, which stands as the accepted criteria for making the claim that a computer system simulates some physical 10

11 phenomenon. The conditions of the test require that an impartial observer interacts, through computer communication or some other means of communications which prevents this user from knowing with whom he or she is interacting, with both a human and another computer. The Turing Test states that if the impartial observer cannot differentiate between the human and the computer if allowed to ask some set of questions, then the computer is said to simulate the phenomena in question 15. While this paper looks at the question of how one can use physics to do computation, one might imagine asking the converse, that is, whether computation can be used to do physics. Through the Turing Test that was just introduced, we have a criterion by which to measure the answer to this question. Feynman, in a 1982 speech, showed that any attempt to model an N particle quantum system on a classical computer resulted in a computation requiring approximately N N computations [?]. While this computation can be made, the intractability of such a computation on even a modest input size would cause the impartial observer in the Turing Test to quickly tell apart the computation from physical measurement. Clearly, classical computation cannot simulate the physical world (at least, it cannot simulate the quantum mechanical world). Feynman also noted that individual quantum phenomena cannot be simulated at all since individual particles are subject to probabilities and thus their path cannot be predetermined. Thus, the question of the ability to do physics with computation becomes the question of whether one may use quantum computers to simulate macroscopic quantum phenomena. The answer to this problem, however, has yet to be resolved. 6 The Promise and the Reality Quantum computing is a fascinating, interdisciplinary exploration that seeks to answer the question of what human beings have in their power to know. However, like any exploration in physics, quantum computation only finds importance if it proves to be physically realizable. The principles which enable the theoretical concept of quantum computation have been shown in experiment, i.e. one can do experiments on the effects of entanglement. Moreover, small quantum algorithms have begun to be implemented. For example, the unordered search problem mentioned in this paper was solved for a n = 7 system in 35 milliseconds using techniques of nuclear magnetic resonance spectroscopy [?]. However, systems of the size needed to implement Shor s algorithm have yet to appear and it is not at all clear whether 15 This criterion is the standard by which computer scientists judge artificial intelligence. So far, no general artificial intelligence has passed this test. 11

12 they will. Finally, questions of our ability to simulate physics on a quantum computer have yet to be resolved. All of these questions rest on our understanding of the new form of the Church-Turing Thesis. Whether this thesis correctly describes the power of computation one may obtain, however, will remain an open question. References [1] Abrams, D.S. and S. Lloyd. Computational Complexity and Physical Law. Lecture Notes in Computer Science 1509: Quantum Computing and Quantum Communications: First NASA International Conference, QCQC 98 Palm Springs, CA USA, Feb 17-20, 1998 Selected Papers. Berlin: Springer, [2] Accelerated Strategic Computing Initiative (ASCI). < [3] Atallah, Mikhail J. ed. Algorithms and Theory of Computation Handbook. London: CRC Press LLC, [4] Baggot, Jim. The Meaning of Quantum Theory. Oxford: Oxford University Press, [5] Bennett, Charle H. Quantum Information Theory. Feynman and Computation: Exploring the Limits of Computers. Anthony J.G. Hey. ed. Reading, Mass.: Perseus Books, [6] Bernstien, Ethan and Umesh Vazirani. Quantum Complexity Theory. Proceedings of the twenty-fifth annual ACM symposium on Theory of Computing, May 16-18, 1993, San Diego, CA USA. < bernstein/> [7] Chuang, Isaac L. et al. Experimental Implementation of Fast Quantum Searching. Physical Review Letters, Volume 80, Issue 15. April 13, pp [8] Deutsch, David. Quantum theory, the Church-Turing principle, and the universal quantum computer. Proceedings of the Royal Society of London., Vol A400, 1985, pp [9] Eisberg, Robert and Robert Resnick. Quantum Physics: Of Atoms, Molecules, Solids, Nuclei, and Particles. 2 nd Ed.. New York: John Wiley & Sons,

13 [10] Feynman, Richard P. Simulating Physics with Computers. Feynman and Computation: Exploring the Limits of Computers. Anthony J.G. Hey. ed. Reading, Mass.: Perseus Books, [11] Hughes, Richard J. Quantum Computation. Feynman and Computation: Exploring the Limits of Computers. Anthony J.G. Hey. ed. Reading, Mass.: Perseus Books, [12] Landauer, Rolf. Information is Inevitably Physical. Feynman and Computation: Exploring the Limits of Computers. Anthony J.G. Hey. ed. Reading, Mass.: Perseus Books,

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Part I Emma Strubell http://cs.umaine.edu/~ema/quantum_tutorial.pdf April 12, 2011 Overview Outline What is quantum computing? Background Caveats Fundamental differences

More information

Unitary evolution: this axiom governs how the state of the quantum system evolves in time.

Unitary evolution: this axiom governs how the state of the quantum system evolves in time. CS 94- Introduction Axioms Bell Inequalities /7/7 Spring 7 Lecture Why Quantum Computation? Quantum computers are the only model of computation that escape the limitations on computation imposed by the

More information

Quantum Information Processing with Liquid-State NMR

Quantum Information Processing with Liquid-State NMR Quantum Information Processing with Liquid-State NMR Pranjal Vachaspati, Sabrina Pasterski MIT Department of Physics (Dated: May 8, 23) We demonstrate the use of a Bruker Avance 2 NMR Spectrometer for

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

COMPARATIVE ANALYSIS ON TURING MACHINE AND QUANTUM TURING MACHINE

COMPARATIVE ANALYSIS ON TURING MACHINE AND QUANTUM TURING MACHINE Volume 3, No. 5, May 2012 Journal of Global Research in Computer Science REVIEW ARTICLE Available Online at www.jgrcs.info COMPARATIVE ANALYSIS ON TURING MACHINE AND QUANTUM TURING MACHINE Tirtharaj Dash

More information

Introduction to Quantum Computing for Folks

Introduction to Quantum Computing for Folks Introduction to Quantum Computing for Folks Joint Advanced Student School 2009 Ing. Javier Enciso encisomo@in.tum.de Technische Universität München April 2, 2009 Table of Contents 1 Introduction 2 Quantum

More information

Quantum Computing. Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract HISTORY OF QUANTUM COMPUTING-

Quantum Computing. Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract HISTORY OF QUANTUM COMPUTING- Quantum Computing Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract Formerly, Turing Machines were the exemplar by which computability and efficiency

More information

Quantum Computation, NP-Completeness and physical reality [1] [2] [3]

Quantum Computation, NP-Completeness and physical reality [1] [2] [3] Quantum Computation, NP-Completeness and physical reality [1] [2] [3] Compiled by Saman Zarandioon samanz@rutgers.edu 1 Introduction The NP versus P question is one of the most fundamental questions in

More information

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. ) Quantum Computing 101 ( Everything you wanted to know about quantum computers but were afraid to ask. ) Copyright Chris Lomont, 2004 2 67 1 = 193707721 761838257287 Took American Mathematician Frank Nelson

More information

Lecture 1: Introduction to Quantum Computing

Lecture 1: Introduction to Quantum Computing Lecture : Introduction to Quantum Computing Rajat Mittal IIT Kanpur What is quantum computing? This course is about the theory of quantum computation, i.e., to do computation using quantum systems. These

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing The lecture notes were prepared according to Peter Shor s papers Quantum Computing and Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a

More information

Quantum Computers. Peter Shor MIT

Quantum Computers. Peter Shor MIT Quantum Computers Peter Shor MIT 1 What is the difference between a computer and a physics experiment? 2 One answer: A computer answers mathematical questions. A physics experiment answers physical questions.

More information

Implementing Competitive Learning in a Quantum System

Implementing Competitive Learning in a Quantum System Implementing Competitive Learning in a Quantum System Dan Ventura fonix corporation dventura@fonix.com http://axon.cs.byu.edu/dan Abstract Ideas from quantum computation are applied to the field of neural

More information

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Quantum Computers. Todd A. Brun Communication Sciences Institute USC Quantum Computers Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose components are individual

More information

Quantum Information & Quantum Computation

Quantum Information & Quantum Computation CS290A, Spring 2005: Quantum Information & Quantum Computation Wim van Dam Engineering 1, Room 5109 vandam@cs http://www.cs.ucsb.edu/~vandam/teaching/cs290/ Administrivia Required book: M.A. Nielsen and

More information

A Quantum Associative Memory Based on Grover s Algorithm

A Quantum Associative Memory Based on Grover s Algorithm A Quantum Associative Memory Based on Grover s Algorithm Dan Ventura and Tony Martinez Neural Networks and Machine Learning Laboratory (http://axon.cs.byu.edu) Department of Computer Science Brigham Young

More information

Quantum Computing: A Future Trends in Computing

Quantum Computing: A Future Trends in Computing Volume 3, No. 3, May-June 2012 International Journal of Advanced Research in Computer Science RESEARCH PAPER Available Online at www.ijarcs.info Quantum Computing: A Future Trends in Computing Amit V.Pandhare

More information

Quantum Computing. Thorsten Altenkirch

Quantum Computing. Thorsten Altenkirch Quantum Computing Thorsten Altenkirch Is Computation universal? Alonzo Church - calculus Alan Turing Turing machines computable functions The Church-Turing thesis All computational formalisms define the

More information

Secrets of Quantum Information Science

Secrets of Quantum Information Science Secrets of Quantum Information Science Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose

More information

Basics on quantum information

Basics on quantum information Basics on quantum information Mika Hirvensalo Department of Mathematics and Statistics University of Turku mikhirve@utu.fi Thessaloniki, May 2014 Mika Hirvensalo Basics on quantum information 1 of 49 Brief

More information

Basics on quantum information

Basics on quantum information Basics on quantum information Mika Hirvensalo Department of Mathematics and Statistics University of Turku mikhirve@utu.fi Thessaloniki, May 2016 Mika Hirvensalo Basics on quantum information 1 of 52 Brief

More information

Lecture 1: Introduction to Quantum Computing

Lecture 1: Introduction to Quantum Computing Lecture 1: Introduction to Quantum Computing Rajat Mittal IIT Kanpur Whenever the word Quantum Computing is uttered in public, there are many reactions. The first one is of surprise, mostly pleasant, and

More information

Concepts and Algorithms of Scientific and Visual Computing Advanced Computation Models. CS448J, Autumn 2015, Stanford University Dominik L.

Concepts and Algorithms of Scientific and Visual Computing Advanced Computation Models. CS448J, Autumn 2015, Stanford University Dominik L. Concepts and Algorithms of Scientific and Visual Computing Advanced Computation Models CS448J, Autumn 2015, Stanford University Dominik L. Michels Advanced Computation Models There is a variety of advanced

More information

INTRODUCTORY NOTES ON QUANTUM COMPUTATION

INTRODUCTORY NOTES ON QUANTUM COMPUTATION INTRODUCTORY NOTES ON QUANTUM COMPUTATION Keith Hannabuss Balliol College, Oxford Hilary Term 2009 Notation. In these notes we shall often use the physicists bra-ket notation, writing ψ for a vector ψ

More information

Chapter 10. Quantum algorithms

Chapter 10. Quantum algorithms Chapter 10. Quantum algorithms Complex numbers: a quick review Definition: C = { a + b i : a, b R } where i = 1. Polar form of z = a + b i is z = re iθ, where r = z = a 2 + b 2 and θ = tan 1 y x Alternatively,

More information

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate

More information

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Compute the Fourier transform on the first register to get x {0,1} n x 0. CS 94 Recursive Fourier Sampling, Simon s Algorithm /5/009 Spring 009 Lecture 3 1 Review Recall that we can write any classical circuit x f(x) as a reversible circuit R f. We can view R f as a unitary

More information

10 Quantum Complexity Theory I

10 Quantum Complexity Theory I 10 Quantum Complexity Theory I Just as the theory of computability had its foundations in the Church-Turing thesis, computational complexity theory rests upon a modern strengthening of this thesis, which

More information

Quantum computing for beginners

Quantum computing for beginners Quantum computing for beginners Ajit Narayanan Department of Computer Science Old Library University of Exeter Exeter EX4 4PT UK Abstract The paper introduces the basic concepts and principles behind quantum

More information

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding. CS 94- Bell States Bell Inequalities 9//04 Fall 004 Lecture Hilbert Space Entanglement Quantum Gates Bell States Superdense Coding 1 One qubit: Recall that the state of a single qubit can be written as

More information

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles Quantum Computation 650 Spring 2009 Lectures 1-21 The World of Quantum Information Marianna Safronova Department of Physics and Astronomy February 10, 2009 Outline Quantum Information: fundamental principles

More information

Reversible and Quantum computing. Fisica dell Energia - a.a. 2015/2016

Reversible and Quantum computing. Fisica dell Energia - a.a. 2015/2016 Reversible and Quantum computing Fisica dell Energia - a.a. 2015/2016 Reversible computing A process is said to be logically reversible if the transition function that maps old computational states to

More information

Introduction to Quantum Computation

Introduction to Quantum Computation Introduction to Quantum Computation Ioan Burda Introduction to Quantum Computation Copyright 2005 Ioan Burda All rights reserved. Universal Publishers Boca Raton, Florida USA 2005 ISBN: 1-58112- 466-X

More information

Errata list, Nielsen & Chuang. rrata/errata.html

Errata list, Nielsen & Chuang.  rrata/errata.html Errata list, Nielsen & Chuang http://www.michaelnielsen.org/qcqi/errata/e rrata/errata.html Part II, Nielsen & Chuang Quantum circuits (Ch 4) SK Quantum algorithms (Ch 5 & 6) Göran Johansson Physical realisation

More information

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech + Quantum Entanglement and Cryptography Deepthi Gopal, Caltech + Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts

More information

Complex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where

Complex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where Chapter 0 Quantum algorithms Complex numbers: a quick review / 4 / 4 Definition: C = { a + b i : a, b R } where i = Polar form of z = a + b i is z = re iθ, where r = z = a + b and θ = tan y x Alternatively,

More information

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation QSIT09.V01 Page 1 1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation What is quantum mechanics good for? traditional historical perspective: beginning of 20th century: classical

More information

QUANTUM COMPUTER SIMULATION

QUANTUM COMPUTER SIMULATION Chapter 2 QUANTUM COMPUTER SIMULATION Chapter 1 discussed quantum computing in non-technical terms and in reference to simple, idealized physical models. In this chapter we make the underlying mathematics

More information

Introduction to Quantum Computing

Introduction to Quantum Computing Introduction to Quantum Computing Petros Wallden Lecture 1: Introduction 18th September 2017 School of Informatics, University of Edinburgh Resources 1. Quantum Computation and Quantum Information by Michael

More information

Number theory (Chapter 4)

Number theory (Chapter 4) EECS 203 Spring 2016 Lecture 12 Page 1 of 8 Number theory (Chapter 4) Review Compute 6 11 mod 13 in an efficient way What is the prime factorization of 100? 138? What is gcd(100, 138)? What is lcm(100,138)?

More information

Computational Complexity

Computational Complexity p. 1/24 Computational Complexity The most sharp distinction in the theory of computation is between computable and noncomputable functions; that is, between possible and impossible. From the example of

More information

1 Computational problems

1 Computational problems 80240233: Computational Complexity Lecture 1 ITCS, Tsinghua Univesity, Fall 2007 9 October 2007 Instructor: Andrej Bogdanov Notes by: Andrej Bogdanov The aim of computational complexity theory is to study

More information

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1 1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation What is quantum mechanics good for? traditional historical perspective: beginning of 20th century: classical physics fails

More information

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley Challenges in Quantum Information Science Umesh V. Vazirani U. C. Berkeley 1 st quantum revolution - Understanding physical world: periodic table, chemical reactions electronic wavefunctions underlying

More information

INTRODUCTION TO QUANTUM COMPUTING

INTRODUCTION TO QUANTUM COMPUTING INTRODUCTION TO QUANTUM COMPUTING Writen by: Eleanor Rieffel and Wolfgang Polak Presented by: Anthony Luaders OUTLINE: Introduction Notation Experiment Quantum Bit Quantum Key Distribution Multiple Qubits

More information

Quantum Information Processing and Diagrams of States

Quantum Information Processing and Diagrams of States Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University

More information

Vector Spaces in Quantum Mechanics

Vector Spaces in Quantum Mechanics Chapter 8 Vector Spaces in Quantum Mechanics We have seen in the previous Chapter that there is a sense in which the state of a quantum system can be thought of as being made up of other possible states.

More information

Quantum Computation and Communication

Quantum Computation and Communication Tom Lake tswsl1989@sucs.org 16/02/2012 quan tum me chan ics: The branch of mechanics that deals with the mathematical description of the motion and interaction of subatomic particles - OED quan tum me

More information

Quantum Computing Lecture 1. Bits and Qubits

Quantum Computing Lecture 1. Bits and Qubits Quantum Computing Lecture 1 Bits and Qubits Maris Ozols What is Quantum Computing? Aim: use quantum mechanical phenomena that have no counterpart in classical physics for computational purposes. (Classical

More information

Lecture 11 September 30, 2015

Lecture 11 September 30, 2015 PHYS 7895: Quantum Information Theory Fall 015 Lecture 11 September 30, 015 Prof. Mark M. Wilde Scribe: Mark M. Wilde This document is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike

More information

A Thermodynamic Turing Machine: Artificial Molecular Computing Using Classical Reversible Logic Switching Networks [1]

A Thermodynamic Turing Machine: Artificial Molecular Computing Using Classical Reversible Logic Switching Networks [1] 1 arxiv:0904.3273v2 [cs.cc] 14 May 2009 A Thermodynamic Turing Machine: Artificial Molecular Computing Using Classical Reversible Logic Switching Networks [1] Abstract A Thermodynamic Turing Machine (TTM)

More information

Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan

Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography D. J. Guan Abstract The development of quantum algorithms and quantum information theory, as well as the design

More information

6.080/6.089 GITCS May 6-8, Lecture 22/23. α 0 + β 1. α 2 + β 2 = 1

6.080/6.089 GITCS May 6-8, Lecture 22/23. α 0 + β 1. α 2 + β 2 = 1 6.080/6.089 GITCS May 6-8, 2008 Lecturer: Scott Aaronson Lecture 22/23 Scribe: Chris Granade 1 Quantum Mechanics 1.1 Quantum states of n qubits If you have an object that can be in two perfectly distinguishable

More information

Lecture 4. QUANTUM MECHANICS FOR MULTIPLE QUBIT SYSTEMS

Lecture 4. QUANTUM MECHANICS FOR MULTIPLE QUBIT SYSTEMS Lecture 4. QUANTUM MECHANICS FOR MULTIPLE QUBIT SYSTEMS 4.1 Multiple Qubits Next we consider a system of two qubits. If these were two classical bits, then there would be four possible states,, 1, 1, and

More information

Cryptographic Protocols Notes 2

Cryptographic Protocols Notes 2 ETH Zurich, Department of Computer Science SS 2018 Prof. Ueli Maurer Dr. Martin Hirt Chen-Da Liu Zhang Cryptographic Protocols Notes 2 Scribe: Sandro Coretti (modified by Chen-Da Liu Zhang) About the notes:

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

Harvard CS 121 and CSCI E-121 Lecture 22: The P vs. NP Question and NP-completeness

Harvard CS 121 and CSCI E-121 Lecture 22: The P vs. NP Question and NP-completeness Harvard CS 121 and CSCI E-121 Lecture 22: The P vs. NP Question and NP-completeness Harry Lewis November 19, 2013 Reading: Sipser 7.4, 7.5. For culture : Computers and Intractability: A Guide to the Theory

More information

MAA509: Quantum Computing and Information Introduction

MAA509: Quantum Computing and Information Introduction MAA509: Quantum Computing and Information Introduction November 7, 2016 November 7, 2016 1 / 19 Why make computers? Computation by hand is difficult and not very stimulating. Why not make a machine do

More information

QLang: Qubit Language

QLang: Qubit Language QLang: Qubit Language Christopher Campbell Clément Canonne Sankalpa Khadka Winnie Narang Jonathan Wong September 24, 24 Introduction In 965, Gordon Moore predicted that the number of transistors in integrated

More information

Quantum Gates, Circuits & Teleportation

Quantum Gates, Circuits & Teleportation Chapter 3 Quantum Gates, Circuits & Teleportation Unitary Operators The third postulate of quantum physics states that the evolution of a quantum system is necessarily unitary. Geometrically, a unitary

More information

Discrete Quantum Theories

Discrete Quantum Theories Discrete Quantum Theories Andrew J. Hanson 1 Gerardo Ortiz 2 Amr Sabry 1 Yu-Tsung Tai 3 (1) School of Informatics and Computing (2) Department of Physics (3) Mathematics Department Indiana University July

More information

An Introduction to Quantum Information and Applications

An Introduction to Quantum Information and Applications An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot Quantum information and computation Quantum information and computation How is information encoded

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information

Universal quantum computers

Universal quantum computers 146 CHAPTER III. QUANTUM COMPUTATION E Universal quantum computers 1. Power: A natural question is: What is the power of a quantum computer? Is it super-turing or sub-turing? 2. E ciency: Another question

More information

The P versus NP Problem in Quantum Physics

The P versus NP Problem in Quantum Physics NeuroQuantology December 04 Volume Issue 4 Page 350-354 350 The P versus NP Problem in Quantum Physics Daegene Song ABSTRACT Motivated by the fact that information is encoded and processed by physical

More information

Hugh Everett III s Many Worlds

Hugh Everett III s Many Worlds 236 My God, He Plays Dice! Hugh Everett III s Many Worlds Many Worlds 237 Hugh Everett III s Many Worlds Hugh Everett III was one of John Wheeler s most famous graduate students. Others included Richard

More information

. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i.

. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i. CS 94- Hilbert Spaces, Tensor Products, Quantum Gates, Bell States 1//07 Spring 007 Lecture 01 Hilbert Spaces Consider a discrete quantum system that has k distinguishable states (eg k distinct energy

More information

Quantum Computing: Foundations to Frontier Fall Lecture 3

Quantum Computing: Foundations to Frontier Fall Lecture 3 Quantum Computing: Foundations to Frontier Fall 018 Lecturer: Henry Yuen Lecture 3 Scribes: Seyed Sajjad Nezhadi, Angad Kalra Nora Hahn, David Wandler 1 Overview In Lecture 3, we started off talking about

More information

CPSC 467b: Cryptography and Computer Security

CPSC 467b: Cryptography and Computer Security CPSC 467b: Cryptography and Computer Security Michael J. Fischer Lecture 10 February 19, 2013 CPSC 467b, Lecture 10 1/45 Primality Tests Strong primality tests Weak tests of compositeness Reformulation

More information

Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo

Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo CS 497 Frontiers of Computer Science Introduction to Quantum Computing Lecture of http://www.cs.uwaterloo.ca/~cleve/cs497-f7 Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum

More information

Lecture 1: Overview of quantum information

Lecture 1: Overview of quantum information CPSC 59/69: Quantum Computation John Watrous, University of Calgary References Lecture : Overview of quantum information January 0, 006 Most of the material in these lecture notes is discussed in greater

More information

Quantum algorithms for computing short discrete logarithms and factoring RSA integers

Quantum algorithms for computing short discrete logarithms and factoring RSA integers Quantum algorithms for computing short discrete logarithms and factoring RSA integers Martin Ekerå, Johan Håstad February, 07 Abstract In this paper we generalize the quantum algorithm for computing short

More information

Adiabatic quantum computation a tutorial for computer scientists

Adiabatic quantum computation a tutorial for computer scientists Adiabatic quantum computation a tutorial for computer scientists Itay Hen Dept. of Physics, UCSC Advanced Machine Learning class UCSC June 6 th 2012 Outline introduction I: what is a quantum computer?

More information

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009 An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen Entanglement arnoldzwicky.org Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen PHYS403, July 26, 2017 Entanglement A quantum object can

More information

Universal quantum computers

Universal quantum computers F. UNIVERSAL QUANTUM COMPUTERS 169 F Universal quantum computers Hitherto we have used a practical definition of universality: since conventional digital computers are implemented in terms of binary digital

More information

Chapter 1. Introduction

Chapter 1. Introduction Chapter 1 Introduction Symbolical artificial intelligence is a field of computer science that is highly related to quantum computation. At first glance, this statement appears to be a contradiction. However,

More information

Seminar 1. Introduction to Quantum Computing

Seminar 1. Introduction to Quantum Computing Seminar 1 Introduction to Quantum Computing Before going in I am also a beginner in this field If you are interested, you can search more using: Quantum Computing since Democritus (Scott Aaronson) Quantum

More information

)j > Riley Tipton Perry University of New South Wales, Australia. World Scientific CHENNAI

)j > Riley Tipton Perry University of New South Wales, Australia. World Scientific CHENNAI Riley Tipton Perry University of New South Wales, Australia )j > World Scientific NEW JERSEY LONDON. SINGAPORE BEIJING SHANSHAI HONG K0N6 TAIPEI» CHENNAI Contents Acknowledgments xi 1. Introduction 1 1.1

More information

Shor s Prime Factorization Algorithm

Shor s Prime Factorization Algorithm Shor s Prime Factorization Algorithm Bay Area Quantum Computing Meetup - 08/17/2017 Harley Patton Outline Why is factorization important? Shor s Algorithm Reduction to Order Finding Order Finding Algorithm

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

Lecture 22: Quantum computational complexity

Lecture 22: Quantum computational complexity CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 22: Quantum computational complexity April 11, 2006 This will be the last lecture of the course I hope you have enjoyed the

More information

Short Course in Quantum Information Lecture 2

Short Course in Quantum Information Lecture 2 Short Course in Quantum Information Lecture Formal Structure of Quantum Mechanics Course Info All materials downloadable @ website http://info.phys.unm.edu/~deutschgroup/deutschclasses.html Syllabus Lecture

More information

A short and personal introduction to the formalism of Quantum Mechanics

A short and personal introduction to the formalism of Quantum Mechanics A short and personal introduction to the formalism of Quantum Mechanics Roy Freeman version: August 17, 2009 1 QM Intro 2 1 Quantum Mechanics The word quantum is Latin for how great or how much. In quantum

More information

CS257 Discrete Quantum Computation

CS257 Discrete Quantum Computation CS57 Discrete Quantum Computation John E Savage April 30, 007 Lect 11 Quantum Computing c John E Savage Classical Computation State is a vector of reals; e.g. Booleans, positions, velocities, or momenta.

More information

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm Part I: Quantum Gates and Simon s Algorithm Martin Rötteler NEC Laboratories America, Inc. 4 Independence Way, Suite 00 Princeton, NJ 08540, U.S.A. International Summer School on Quantum Information, Max-Planck-Institut

More information

Some Introductory Notes on Quantum Computing

Some Introductory Notes on Quantum Computing Some Introductory Notes on Quantum Computing Markus G. Kuhn http://www.cl.cam.ac.uk/~mgk25/ Computer Laboratory University of Cambridge 2000-04-07 1 Quantum Computing Notation Quantum Computing is best

More information

Quantum Complexity Theory and Adiabatic Computation

Quantum Complexity Theory and Adiabatic Computation Chapter 9 Quantum Complexity Theory and Adiabatic Computation 9.1 Defining Quantum Complexity We are familiar with complexity theory in classical computer science: how quickly can a computer (or Turing

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145

More information

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871 Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871 Lecture 1 (2017) Jon Yard QNC 3126 jyard@uwaterloo.ca TAs Nitica Sakharwade nsakharwade@perimeterinstitute.ca

More information

QUANTUM CRYPTOGRAPHY QUANTUM COMPUTING. Philippe Grangier, Institut d'optique, Orsay. from basic principles to practical realizations.

QUANTUM CRYPTOGRAPHY QUANTUM COMPUTING. Philippe Grangier, Institut d'optique, Orsay. from basic principles to practical realizations. QUANTUM CRYPTOGRAPHY QUANTUM COMPUTING Philippe Grangier, Institut d'optique, Orsay 1. Quantum cryptography : from basic principles to practical realizations. 2. Quantum computing : a conceptual revolution

More information

Lecture 1: Introduction to Public key cryptography

Lecture 1: Introduction to Public key cryptography Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means

More information

Classical Verification of Quantum Computations

Classical Verification of Quantum Computations Classical Verification of Quantum Computations Urmila Mahadev UC Berkeley September 12, 2018 Classical versus Quantum Computers Can a classical computer verify a quantum computation? Classical output (decision

More information

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií České vysoké učení technické v Praze Fakulta informačních technologií Katedra teoretické informatiky Evropský sociální fond Praha & EU: Investujeme do vaší budoucnosti MI-MVI Methods of Computational Intelligence(2010/2011)

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

Lecture 6: QUANTUM CIRCUITS

Lecture 6: QUANTUM CIRCUITS 1. Simple Quantum Circuits Lecture 6: QUANTUM CIRCUITS We ve already mentioned the term quantum circuit. Now it is the time to provide a detailed look at quantum circuits because the term quantum computer

More information

Short introduction to Quantum Computing

Short introduction to Quantum Computing November 7, 2017 Short introduction to Quantum Computing Joris Kattemölle QuSoft, CWI, Science Park 123, Amsterdam, The Netherlands Institute for Theoretical Physics, University of Amsterdam, Science Park

More information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Physics is becoming too difficult for physicists. David Hilbert (mathematician) Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving

More information

Simple Math: Cryptography

Simple Math: Cryptography 1 Introduction Simple Math: Cryptography This section develops some mathematics before getting to the application. The mathematics that I use involves simple facts from number theory. Number theory is

More information