7. Some Modern Applications of Quantum Mechanics

Size: px
Start display at page:

Download "7. Some Modern Applications of Quantum Mechanics"

Transcription

1 7. Some Modern Applications of Quantum Mechanics What is particularly curious about quantum theory is that there can be actual physical effects arising from what philosophers refer to as counterfactuals-that is, things that might have happened, although they did not in fact happen [Penrose, 2005, p. 240]. 7.1 Introduction The rather strange nature of quantum mechanics is not only a question of ontological importance but can also be applied to various technological situations as well. To that end EPR s contributions cannot be overestimated. Quantum cryptography, quantum computing, quantum dense coding, quantum currency, Elitzur-Vaidman bomb detection and the like are some of potential application areas that are being fast developed into separate major fields. Quantum cryptography is truly a single particle application. Other applications make use of EPR type entanglements and Bell type state measurements. The phenomena like quantum Zeno effect, quantum teleportation, and quantum erasing, have at present only experimental consequences but may in future have potential applications. Some of these are discussed in this chapter. 7.2 Quantum Computing Certain computational capabilities that cannot be even imagined by conventional methods may be made possible in the not so far away future. For instance, Shor quantum algorithm [Shor,1997] would make an unparalleled and unheard of quantum leap as far as factoring is concerned. As an illustration, say one wants to 104

2 factor a very large integer (say, having 250 digits) what the existing fastest super computers is estimated to take a time of the order of the age of the Universe ( 13.6 billion years!). But it would only be a matter of few seconds or at the maximum a few minutes for a quantum computer equipped with quantum polynomial algorithm for factoring, like that of Shor [Julian Brown,2001]. Similarly the Grover s new efficient quantum search algorithms also would speed up searching phenomenally [Grover,1996]. If there are N number of the possible keys, then Grover s quantum search algorithm can speed up the time from O(N) to O(N 1/2 ). That means searching could be speeded up millions fold for very large value of N. What is impossible at present day might quite possible in future due to the developments in the field of quantum computing and computational algorithms. The technical difficulty in producing a quantum computer is the problem of decoherence, which is a big huddle to be surmounted. Yet the prototype quantum computers were developed with limited functions. These have lot of experimental value. According to David Deutsch the working of Quantum computer would prove the existence of many worlds of QM (chapter-6) and hence provide proof for this interpretation. David Deutsch, a great advocate of MWI says that the speed with which a quantum computer would work could be considered as a good demostration of the existence of the myriads of worlds. Deutsch arguments goes as follows. There are approximately atoms in the universe. The parallesim of quatum computing would require ways of computing in some cases. Therefore he argues that the existence of extra resources means more parallel ways of computing than can be afforded by the only resources of our universe proving the existence of parallel universes [Julian Brown, 2001]. Of course, we feel that recourse to consciousness might very well explain the above cited problem. 7.3 Quantum Cryptography Though cryptology is not really new, only in 1970 s the research in cryptology, crypto-analysis and related areas has gained observable impetus. Cryptography has precious applications in information communication. Cryptology includes a) 105

3 Cryptography, the art of encrypting /sending a message and b) crypto analysis, the art of decrypting. In order to do this, an algorithm (also called a cryptosystem or cipher) is utilized for jumbling up a message with what is known as the key to produce a cryptogram indecipherable and, therefore, unintelligible to any unauthorized party. In order to have a secure cryptosystem, it should be impossible to unlock the cryptogram without the key. The whole exercise is to safeguard the crucial secrecy of the original information of the message from any intrusion, technically called eavesdropping. Confidentiality was the traditional application of cryptogram. But, it has wider objectives now such as digital signatures, authentication, non-repudiation and so on [R-08]. Apart from several standard aspects of the field of number theory, there are its modern computational features and applications to cryptography. Any breakthrough in mathematics or in the field of computer science would, indeed, render the conventional cryptography not only useless and even having disastrous consequences. The potential power of quantum computing, as mentioned in the earlier section, would render the classical cryptography almost superfluous. For example, Shor algorithm of factorizing in quantum computing would render the classical RSA (Ronald Rivest, Adi Shamir and Leonard Adleman) type cryptography that relies on the computational complexity of factorization almost ineffective [Nicolas Gisin et al, 2009]. The speed with which a number can be factorized becomes phenomenal in quantum computing. Therefore any algorithm that relies on factorization like RSA type would become too inadequate. One of the main problems of cryptography is that of the key distribution (here after KD). Both public and private KD are employed. In conventional classical cryptography the private KD of RSA type algorithms are employed. Modern conventional classic cryptography makes use of a trap door algorithm for its public key. The assumption is on the complexity of computation, that it is difficult to factor a very large number by present computers. But any break-through in mathematics or leap in computation would invalidate such an assumption. Even private key or symmetric key distribution can be jeopardized by the eavesdropper. 106

4 So, any cryptography scheme based on the assumption of complexity of algorithm has a very high degree chance of letting down. Private KD runs the risk of being intercepted which cannot simply be wished away. More importantly, one is never sure if someone had eavesdropped or not, be it public or private KD scheme of the conventional classic cryptography [Reid et.al,2009]. Additionally as stated above, quantum crypto-analysis poses extremely high degree of potential threat to the present classical encryption systems. The necessity of the situation becomes acute and urgent when one considers the possibility of quantum retro-crypto analysis (or retroactive decryption) [Nicolas Gisin et al, 2009]. The evil eve might copy the existing public keys and information and create a bank of it, for potential quantum retro-analysis of the future. Hence, even the present state-of-the-art cryptology methods are neither fool proof nor future proof. For the above reasons, change over to the quantum cryptography would be compelling. Quantum cryptography is supposed to be tamper proof, fool proof and future proof. This is one of the applications where quantum weirdness has a positive, potential application. The EPR protocol and its connection to Bell-type measurement are important here. Quantum cryptography is of immense importance and value in the context of fast scientific developments, especially in the field of quantum computing as mentioned above. Ironically quantum cryptography provides a solution for the same. A future resistant way of crypto schemes is what is aimed at by Quantum cryptography. Quantum Cryptology is quite different from the classical one. It makes use of the features of quantum physics rather than depending on some kind of specific mathematical algorithm, as a key feature of its security to develop an undefeatable cryptosystem, one that is completely secure and safe against eavesdropping without the knowledge of the concerned sender or receiver of the messages. That is, quantum cryptography offers an ideally secure encryption of the data and transfer. 107

5 Quantum cryptology is based on fundamental quantum character of the individual elementary particle, like the photon. The following properties are basic and unique to quantum systems: a) Linearity, b) Superposition, c) Unitarity of evolution, d) No-cloning theorem [Wooters and Zurek, 1982]. Whereas it is possible to distinguish between two orthogonal quantum states any attempt to distinguish between two non-orthogonal states would irrevocably destroy the original state. This is called the irreversibility of measurement w. To see this from a closer stand point, consider the following facts. A state may be represented by a vector in a complex Hilbert space. Then measurement on a quantum system can be thought of as nothing but a projection operator acting on this vector in Hilbert space. Thus the projected state loses track of its original state giving rise to irreversibility. The memory of the past state is erased from the history of the universe itself. Thus any information on the past of the system is lost for good - a property when suitably manipulated gives rise to the phenomenon of quantum erasing. The last property mentioned above, namely the impossibility of cloning an unknown quantum state (no-cloning theorem) is mainly exploited in the quantum cryptography which in fact is only a corollary of the other three conditions. An infringement on no-cloning theorem would be a breach of linearity, causality and unitarity, or all put together. If cloning of an unknown quantum state were possible, it would amount to superluminal transmission of information. This property makes the passive listening by Eve impossible. Any elementary quantum particles can be used in cryptography but the best suited ones are of course photons, since they are reliable information carriers in the optical fiber cables. The polarizations of a set of the photons sent from Alice (sender) to Bob (receiver) form the coded information of the key. The actual encrypted message is transmitted via a public classic channel. Any attempt to measure the states of the w This fact is related with the infamous measurement problem. What is considered a bane in one context can possibly be a boon in another. Yet demonstration of these applications would confirm that the quantum weirdness can give more impetus to the study from a totally different perspective other than the usual ontological point of view. 108

6 photons would invariably disturb the state and hence will be noticed by the parties concerned. The sender and the receiver would compare their measurements of the polarizations of the photons to check for any potential eavesdropping. The quantum key distribution cannot prevent eavesdropping but can surely be detected with 100% efficiency. The key can then be discarded. Quantum cryptology works according to different models, a famous one being due to Bennett and Brassard [Bennett, and Brassard,1984]. Detection of intrusion by eavesdropper is vital to quantum cryptography. It is a way to combine the relative convenience and ease of key exchange in public key cryptography (PKC) with the ultimate security of a one time pad. Heisenberg s Uncertainty Principle of QM plays a dominant role in actual practice here. Historically Quantum Cryptology was first proposed by Stephen Wiesner in early 1970 s introducing the concept of quantum conjugate coding. In 1990 Arthur Ekert developed a different approach to quantum cryptology that was based on the quantum correlation due to quantum entanglement [Ekert,1991]. Quantum cryptology has the ability to detect any interception of the key, whereas with classical ones the key security cannot be proved. Quantum Key Distribution (QKD) would mean secure communication though not guaranteed against jamming. It enables two parties to produce a shared random bit string known only to them, which can be used as a key to encrypt and decrypt messages. QKD systems are automatic with greater reliability factor. The Bennett and Brassard scheme of 1984 for quantum key distribution is known as BB84 scheme. It is a procedure utilizing a set of individual photons. BB84 solves the QKD problem but safe storage of the key is still a problem. Therefore Ekert proposed EPR-based protocol for key distribution [Bennett, Brassard and Ekert,1992]. The photons of EPR pair have undefined polarizations (chapter-5). These two properties together are mysterious yet it is the basis of many modern quantum applications. 109

7 Quantum cryptography is one of the useful modern applications of EPR and Bell states which assume now greater significance in several other technological contexts as well. What was started as pure philosophical debate between Einstein and Bohr several decades ago is likely to give efficient technological spin-offs in the modern times. Some noted physicists had considered the interpretational aspects only to be of academic interest with very little experimental content. Bell s theorem did change the whole situation so considerably. The bottom line is not to neglect the true understanding of science [R-05]. It will definitely pay off well, even as technological spin offs, quantum cryptology being a glaring example for it, not to talk about various other applications. 7.4 Quantum Teleportation Quantum teleportation is one of the modern applications that exploit the concept of Quantum entanglement. The experimental confirmation of teleportation [Zeilinger,2005a] is the proof of the quantum nature of entanglement and hence it becomes very important from the point of understanding of QM. To see how exactly it is done, let us suppose that Alice and Bob share a pair of photons prepared in an entangled Bell state of polarization. That is, each of them possesses one of the entangled photons. Also suppose that Alice has an additional photon in an unknown state of polarization, u. Alice now performs measuremts on both the photons in her possession. There are four possible random outcomes. Bob's photon will be transformed into any one of the four states, depending on the four possible outcomes of Alice's measurement: either the state u, or a state that is related to u in a definite way. This operation of Alice entangles the two photons of her and disentangles that of Bob, forcing it into a state u*. Once Alice communicates the outcome of her operation to Bob, Bob knows either that u* = u, or how to transform u* to u by a local operation. Now the photon in Alice s possession can be considered as teleported to Bob as the quantum state of a photon is transferred from Alice to Bob. This phenomenon clearly demonstrates the non-local quantum correlation. Here again, 110

8 the no-cloning prevents superluminal transmission as in quantum cryptography which is why it does not defy SRT. 7.5 Elitzur Vaidman Bomb-Tester Avshalom Elitzur and Lev Vaidman in 1993 proposed [Elitzur and Vaidman,1993] the following bomb testing problem which was constructed and tested with success by Anton Zeilinger, et al. in 1994 using Mach-Zehnder interferometer. This is referred to as interaction free measurement. The bomb-testing problem can be described as follows. Say, in a collection of bombs some are duds. The bombs can be detonated by a single photon. Dud bombs will not absorb the photon but good ones will absorb and explode. We can use the counterfactual phenomenon of QM to separate the usable bombs from the duds. If we try to test by detonating the usable ones, then it will destroy all the usable bombs. (The alternate version of the problem would be to detect a bomb without detonating at least some of them). A very sensitive mirror attached to the plunger activates the detonator when a photon that impinges on it is pushing the plunger. The plungers of the duds are stuck, so that they do not get pushed and therefore no detonation occurs. It means a dud one effectively reflects the photons. The fact that the photon did not actually hit the bomb's mirror is enough to know that the photon went through the other path (a "null" measurement). The experimental set-up consisting of Mach-Zehnder interferometer is arranged as shown in the figure 7.1. The light source is of very low intensity that it emits only single photon at a time. A photon reaching the beam splitter BS1 has equal chances of passing through or of getting reflected by it. Say, on path 1, a bomb is placed with the triggering mechanism by photon as described above. If the bomb is usable, then the photon is absorbed triggering the bomb. If the bomb is dud one, the photon will pass through unaffected. Let us consider the two cases separately in what follows. 111

9 Case 1 - The bomb is a dud one: The photon either gets reflected by the first beam splitter, BS1 and takes path-2 or after passing through BS1, is reflected by the mirror on the trigger of the bomb along path-1. The plunger will not get pushed as it is dud. The system is now like the basic Mach-Zehnder apparatus in which constructive interference occurs along the horizontal path along D1 and destructive along the vertical path towards D2. Therefore, the detector D1 will click, and the detector at D2 will not. Figure 7.1 Elitzur-Vaidman Bomb-Tester Case 2-The bomb is usable: As in the above case the two different possibilities are that the photon can take either path-1 or path-2 after encountering the beam splitter BS1. If it takes path-1 it surely gets reflected and by the plunger mirror and the bomb will definitely explode. Since the bomb acts like a detector, the wave function collapses and therefore cannot be in superposition. If the photon takes the upper route path-2 the bomb will not explode yet there will be no interference effect. The photon now either passes through the BS2 or is reflected. The photon must be in either of the detectors D1 or D2. Hence, on the whole, there are only three outcomes: a) The bomb explodes, b) The bomb does not explode and only detector D2 detects the 112

10 photon. In this case we are sure that the bomb is live though it has not exploded and the photon has not interacted with it, c) The bomb does not explode and only detector D1 detects photon. It is possible that the bomb is usable or that it is a dud. In the last case, the test has to be repeated to see if the bomb will explode or if D2 will click. Usually this is sufficient to recognize all of the dud ones. The tests will identify the one third of the usable bombs without detonating but detonate two thirds of the remaining good ones. Kwiat et al in 1996 devised a technique, using a series of polarizing devices to yield a rate arbitrarily close to one. Here the answer to the query what would happen is determined without the bomb going off. This provides an example of an experimental method to answer a counterfactual question. 7.6 Discussions While there are several potential applications that can directly exploit the quantum entanglement, quantum cryptography is the most potential one developed so far. The quantum teleportation proves that the quantum state identifies a particle (which has no other identity) as the particles cannot be associated with their history. Conveying the polarization state of photon is amounting to transmitting infinite amount of classical information as to specify an angle to arbitary acurracy. The outcome of Alice's operation can be communicated to Bob by two classical bits of information since it has only four possible outcomes with equal a priori probabilities, which is remarkable. Bob can now reconstruct the state u on the basis of just two bits of classical information. The entangled state is exploited as a quantum communication channel for the transfer of rest of the information. The no-cloning theorem is also sort of verified indirectly by these phenomena. The uniqueness of a quantum state and the almost infinite amount of classical information that it contains qualify these to be connected with the mental state. For example, when we look at an ordinary scene in life, it contains infinite classical bits of information. In a man s life such infinite amount of information can be stored in the memory. The instant pattern 113

11 recognition capability of the brain is the demostration of tremendous (parrallel) computation capability. Otherwise the resources of the brain in terms of number of nerve synapses or even the number of states that the atoms in it have would be pretty very much limited. There were attempts to explain this phenomenon by holographic theory of memory by the Magellan of brain science Karl Pribram. Some people may think that the proposal to explian the brain using basic quantum phenomena, though in the right direction, is far-fetched at the moment as is reflected in the following quote, The recent proposal by Penrose and Hameroff exceeds the domain of present-day quantum theory by far and is the most speculative example [Atmanspacher, Harald,2008]. But we do feel that the powerful quantum phenomena and the emerging revolutionanary ideas can really revolutionise this new field in due course of time. Elitzur-Vaidman bomb tester is another example that demonstrates a further strange aspect of QM. The laboratory version of it has already been successfully demonstrated. The interaction free measurement (IFM) emphasizes the counterfactual phenomena are important in QM. That is, in a quantum interaction the possible events and situations that could have happened but not really taken place are important. This is an important non-classical property that has direct bearing on the quantum reality. The omniscience of the elementary particles has now tangible effects and potential applications. A variation of this quantum property is made use of in quantum computing where parallelism is achieved by the counterfactual way in what is called computation without computation. When a photon interacts with the beam splitter its state is non-deterministically altered only to go into quantum superposition state until an observer interacts with it causing the state vector reduction forcing the photon to a deterministic state. We relate this phenomenon of counterfactual phenomenon and IFM with the Feynman s formalism mentioned in chapter-2. Equations (2.30) and (2.33) depict this feature (see also fig 2.1). The many histories take into account not the classical paths but the non-classical ones as well. The quantum particles can sniff the surroundings paths. The above facts demonstrate three facets of QM: 114

12 1) Non-locality, 2) Counter factuality and 3) Strange quantum reality. This formulation even considers amplitudes for speeds greater than the velocity of light as well as that for particle traversing backward in time as well. The triumphs of QED and Feynman graphs justify these counter intuitive, non-classical histories. 115

Quantum Cryptography and Security of Information Systems

Quantum Cryptography and Security of Information Systems Quantum Cryptography and Security of Information Systems Dalibor Hrg University of Zagreb, Faculty of Electrical Engineering and Computing, Zagreb dalix@fly.srk.fer.hr Leo Budin University of Zagreb, Faculty

More information

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen Entanglement arnoldzwicky.org Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen PHYS403, July 26, 2017 Entanglement A quantum object can

More information

10 - February, 2010 Jordan Myronuk

10 - February, 2010 Jordan Myronuk 10 - February, 2010 Jordan Myronuk Classical Cryptography EPR Paradox] The need for QKD Quantum Bits and Entanglement No Cloning Theorem Polarization of Photons BB84 Protocol Probability of Qubit States

More information

1 Mach-Zehder Interferometer 1. 2 Elitzur-Vaidman Bombs 6

1 Mach-Zehder Interferometer 1. 2 Elitzur-Vaidman Bombs 6 Chapter : Experiments with photons B. Zwiebach February 9, 6 Contents Mach-Zehder Interferometer Elitzur-Vaidman Bombs 6 Mach-Zehder Interferometer We have discussed before the Mach-Zehnder interferometer,

More information

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski 1 Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski What is the problem with classical cryptography? Secret key cryptography Requires secure channel for key distribution In principle every

More information

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Physics is becoming too difficult for physicists. David Hilbert (mathematician) Physics is becoming too difficult for physicists. David Hilbert (mathematician) Simple Harmonic Oscillator Credit: R. Nave (HyperPhysics) Particle 2 X 2-Particle wave functions 2 Particles, each moving

More information

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech + Quantum Entanglement and Cryptography Deepthi Gopal, Caltech + Cryptography Concisely: to make information unreadable by anyone other than the intended recipient. The sender of a message scrambles/encrypts

More information

Single and Entangled photons. Edward Pei

Single and Entangled photons. Edward Pei Single and Entangled photons Edward Pei War is most commonly thought of as men fighting with their fist, and power is determined by physical strength. Behind the lines, however, knowledge is power. For

More information

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009 An Dr Nick Papanikolaou Research Fellow, e-security Group International Digital Laboratory University of Warwick http://go.warwick.ac.uk/nikos Seminar on The Future of Cryptography The British Computer

More information

The Relativistic Quantum World

The Relativistic Quantum World The Relativistic Quantum World A lecture series on Relativity Theory and Quantum Mechanics Marcel Merk University of Maastricht, Sept 24 Oct 15, 2014 Relativity Quantum Mechanics The Relativistic Quantum

More information

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security Hacking Quantum Cryptography Marina von Steinkirch ~ Yelp Security Agenda 1. Quantum Mechanics in 10 mins 2. Quantum Computing in 11 mins 3. Quantum Key Exchange in 100 mins (or more minutes) Some disclaimers

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 1 1D Schrödinger equation: Particle in an infinite box Consider a particle of mass m confined to an infinite one-dimensional well of width L. The potential is given by V (x) = V 0 x L/2, V (x) =

More information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC) Majid Alshammari and Khaled Elleithy Department of Computer Science and Engineering University of Bridgeport

More information

Security Implications of Quantum Technologies

Security Implications of Quantum Technologies Security Implications of Quantum Technologies Jim Alves-Foss Center for Secure and Dependable Software Department of Computer Science University of Idaho Moscow, ID 83844-1010 email: jimaf@cs.uidaho.edu

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography (Notes for Course on Quantum Computation and Information Theory. Sec. 13) Robert B. Griffiths Version of 26 March 2003 References: Gisin = N. Gisin et al., Rev. Mod. Phys. 74, 145

More information

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels JOURNAL OF CHEMISTRY 57 VOLUME NUMBER DECEMBER 8 005 A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels Miri Shlomi

More information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes 5th March 2004 Unconditional Security of Quantum Key Distribution With Practical Devices Hermen Jan Hupkes The setting Alice wants to send a message to Bob. Channel is dangerous and vulnerable to attack.

More information

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security Areas for Discussion Joseph Spring Department of Computer Science MSc Distributed Systems and Security Introduction Photons Quantum Key Distribution Protocols BB84 A 4 state QKD Protocol B9 A state QKD

More information

LECTURE NOTES ON Quantum Cryptography

LECTURE NOTES ON Quantum Cryptography Department of Software The University of Babylon LECTURE NOTES ON Quantum Cryptography By Dr. Samaher Hussein Ali College of Information Technology, University of Babylon, Iraq Samaher@itnet.uobabylon.edu.iq

More information

1 1D Schrödinger equation: Particle in an infinite box

1 1D Schrödinger equation: Particle in an infinite box 1 OF 5 NOTE: This problem set is to be handed in to my mail slot (SMITH) located in the Clarendon Laboratory by 5:00 PM (noon) Tuesday, 24 May. 1 1D Schrödinger equation: Particle in an infinite box Consider

More information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction Tutorial on Quantum Computing Vwani P. Roychowdhury Lecture 1: Introduction 1 & ) &! # Fundamentals Qubits A single qubit is a two state system, such as a two level atom we denote two orthogonal states

More information

quantum distribution of a sudoku key Sian K. Jones University of South Wales

quantum distribution of a sudoku key Sian K. Jones University of South Wales Games and Puzzles quantum distribution of a sudoku key Sian K. Jones University of South Wales sian-kathryn.jones@southwales.ac.uk Abstract: Sudoku grids are often cited as being useful in cryptography

More information

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract Research Proposal for Secure Double slit experiment Sandeep Cheema Security Analyst, Vichara Technologies Abstract The key objective of this research proposal is to resolve or advance with the measurement

More information

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation Quantum logic gates Logic gates Classical NOT gate Quantum NOT gate (X gate) A NOT A α 0 + β 1 X α 1 + β 0 A N O T A 0 1 1 0 Matrix form representation 0 1 X = 1 0 The only non-trivial single bit gate

More information

IDLER DCC SIGNAL SHUTTER

IDLER DCC SIGNAL SHUTTER 1 Interaction-Free Measurements Lev Vaidman School of Physics and Astronomy, Raymond and Beverly Sackler Faculty of Exact Sciences, Tel-Aviv University, Tel-Aviv 69978, Israel 1 The Penrose bomb testing

More information

The Weird World of Quantum Mechanics

The Weird World of Quantum Mechanics The Weird World of Quantum Mechanics Libor Nentvich: QC 16 April 2007: The Weird World of QM 1/30 How to fing a good bomb (Elitzur-Vaidman) In 1993 Avshalom Elitzur and Lev Vaidman proposed the following

More information

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution Chapter 13: Photons for quantum information Quantum only tasks Teleportation Superdense coding Quantum key distribution Quantum teleportation (Theory: Bennett et al. 1993; Experiments: many, by now) Teleportation

More information

A Wheeler-Feynman Electromagnetic Transaction

A Wheeler-Feynman Electromagnetic Transaction overview of talk quick review of TI review of IFM ( interaction free measurements ) The QLE (quantum liar experiment) as a kind of IFM How TI resolves paradoxical aspects of the QLE paradigm-busting aspects

More information

Counterfactual quantum protocols

Counterfactual quantum protocols Counterfactual quantum protocols L. Vaidman Raymond and Beverly Sackler School of Physics and Astronomy Tel-Aviv University, Tel-Aviv 69978, Israel The counterfactuality of recently proposed protocols

More information

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Information Transfer and Processing Miloslav Dušek Quantum Information Transfer and Processing Miloslav Dušek Department of Optics, Faculty of Science Palacký University, Olomouc Quantum theory Quantum theory At the beginning of 20 th century about the

More information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata 1. Introduction Quantum information is physical information that is held in the state of

More information

Similarities and Differences Between Two-Particle and Three-Particle Interference

Similarities and Differences Between Two-Particle and Three-Particle Interference Fortschr. Phys. 48 (000) 4, 4 ±5 Similarities and Differences Between Two-Particle and Three-Particle Interference Daniel M. Greenberger, City College of the City University of New York New York, New York

More information

Secrets of Quantum Information Science

Secrets of Quantum Information Science Secrets of Quantum Information Science Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose

More information

Introduction to Quantum Cryptography

Introduction to Quantum Cryptography Università degli Studi di Perugia September, 12th, 2011 BunnyTN 2011, Trento, Italy This work is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike 3.0 Unported License. Quantum Mechanics

More information

Quantum Information Processing and Diagrams of States

Quantum Information Processing and Diagrams of States Quantum Information and Diagrams of States September 17th 2009, AFSecurity Sara Felloni sara@unik.no / sara.felloni@iet.ntnu.no Quantum Hacking Group: http://www.iet.ntnu.no/groups/optics/qcr/ UNIK University

More information

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1 Quantum Cryptography Quantum Cryptography Presented by: Shubhra Mittal Instructor: Dr. Stefan Robila Intranet & Internet Security (CMPT-585-) Fall 28 Montclair State University, New Jersey Introduction

More information

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. ) Quantum Computing 101 ( Everything you wanted to know about quantum computers but were afraid to ask. ) Copyright Chris Lomont, 2004 2 67 1 = 193707721 761838257287 Took American Mathematician Frank Nelson

More information

Cryptography in a quantum world

Cryptography in a quantum world T School of Informatics, University of Edinburgh 25th October 2016 E H U N I V E R S I T Y O H F R G E D I N B U Outline What is quantum computation Why should we care if quantum computers are constructed?

More information

arxiv:quant-ph/ v2 3 Oct 2000

arxiv:quant-ph/ v2 3 Oct 2000 Quantum key distribution without alternative measurements Adán Cabello Departamento de Física Aplicada, Universidad de Sevilla, 0 Sevilla, Spain January, 0 arxiv:quant-ph/990v Oct 000 Entanglement swapping

More information

THE DELAYED CHOICE QUANTUM EXPERIMENT

THE DELAYED CHOICE QUANTUM EXPERIMENT Project optic physics 2008 Professor: Andres La Rosa THE DELAYED CHOICE QUANTUM EXPERIMENT by THOMAS BENJAMIN 1 st of June, 2008 1 Introduction The delayed choice quantum experiment, and electron coupling.

More information

Transmitting and Hiding Quantum Information

Transmitting and Hiding Quantum Information 2018/12/20 @ 4th KIAS WORKSHOP on Quantum Information and Thermodynamics Transmitting and Hiding Quantum Information Seung-Woo Lee Quantum Universe Center Korea Institute for Advanced Study (KIAS) Contents

More information

Introduction to Quantum Computing for Folks

Introduction to Quantum Computing for Folks Introduction to Quantum Computing for Folks Joint Advanced Student School 2009 Ing. Javier Enciso encisomo@in.tum.de Technische Universität München April 2, 2009 Table of Contents 1 Introduction 2 Quantum

More information

Quantum technology popular science description

Quantum technology popular science description Quantum technology popular science description 1 Quantum physics, from theory to ongoing revolution In the early 1900s observations were made that were not consistent with traditional, classical physics.

More information

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139 Quantum Error Correcting Codes and Quantum Cryptography Peter Shor M.I.T. Cambridge, MA 02139 1 We start out with two processes which are fundamentally quantum: superdense coding and teleportation. Superdense

More information

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations David Gaharia Joel Wibron under the direction of Prof. Mohamed Bourennane Quantum Information & Quantum

More information

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Quantum Computers. Todd A. Brun Communication Sciences Institute USC Quantum Computers Todd A. Brun Communication Sciences Institute USC Quantum computers are in the news Quantum computers represent a new paradigm for computing devices: computers whose components are individual

More information

C. QUANTUM INFORMATION 99

C. QUANTUM INFORMATION 99 C. QUANTUM INFORMATION 99 C Quantum information C.1 Qubits C.1.a Single qubits Just as the bits 0 and 1 are represented by distinct physical states in a conventional computer, so the quantum bits (or qubits)

More information

Odd Things about Quantum Mechanics: Abandoning Determinism In Newtonian physics, Maxwell theory, Einstein's special or general relativity, if an initi

Odd Things about Quantum Mechanics: Abandoning Determinism In Newtonian physics, Maxwell theory, Einstein's special or general relativity, if an initi Odd Things about Quantum Mechanics: Abandoning Determinism In Newtonian physics, Maxwell theory, Einstein's special or general relativity, if an initial state is completely known, the future can be predicted.

More information

Realization of B92 QKD protocol using id3100 Clavis 2 system

Realization of B92 QKD protocol using id3100 Clavis 2 system Realization of B92 QKD protocol using id3100 Clavis 2 system Makhamisa Senekane 1, Abdul Mirza 1, Mhlambululi Mafu 1 and Francesco Petruccione 1,2 1 Centre for Quantum Technology, School of Chemistry and

More information

Entanglement and information

Entanglement and information Ph95a lecture notes for 0/29/0 Entanglement and information Lately we ve spent a lot of time examining properties of entangled states such as ab è 2 0 a b è Ý a 0 b è. We have learned that they exhibit

More information

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií České vysoké učení technické v Praze Fakulta informačních technologií Katedra teoretické informatiky Evropský sociální fond Praha & EU: Investujeme do vaší budoucnosti MI-MVI Methods of Computational Intelligence(2010/2011)

More information

Is Faster-Than-Light Communication Possible?

Is Faster-Than-Light Communication Possible? Is Faster-Than-Light Communication Possible? Raymond W. Jensen Department of Mathematics, University of Notre Dame, Notre Dame IN 46556 rwjst4@alumni.nd.edu Abstract. It is shown here using elementary

More information

Quantum Measurements: some technical background

Quantum Measurements: some technical background Quantum Measurements: some technical background [From the projection postulate to density matrices & (introduction to) von Neumann measurements] (AKA: the boring lecture) First: One more example I wanted

More information

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA QUANTUM COMPUTING: I CAN SUM IT UP IN ONE SLIDE Pure Magic! 2 SERIOUSLY: HOW DOES IT WORK? That s simple: Even

More information

Quantum Teleportation

Quantum Teleportation Fortschr. Phys. 50 (2002) 5 7, 608 613 Quantum Teleportation Samuel L. Braunstein Informatics, Bangor University, Bangor LL57 1UT, UK schmuel@sees.bangor.ac.uk Abstract Given a single copy of an unknown

More information

Quantum Mechanics: Interpretation and Philosophy

Quantum Mechanics: Interpretation and Philosophy Quantum Mechanics: Interpretation and Philosophy Significant content from: Quantum Mechanics and Experience by David Z. Albert, Harvard University Press (1992). Main Concepts: -- complementarity -- the

More information

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Quantum Computing Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge Physics and Computation A key question: what is computation....fundamentally? What makes it

More information

Quantum Computing. Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract HISTORY OF QUANTUM COMPUTING-

Quantum Computing. Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract HISTORY OF QUANTUM COMPUTING- Quantum Computing Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract Formerly, Turing Machines were the exemplar by which computability and efficiency

More information

Delayed Choice Paradox

Delayed Choice Paradox Chapter 20 Delayed Choice Paradox 20.1 Statement of the Paradox Consider the Mach-Zehnder interferometer shown in Fig. 20.1. The second beam splitter can either be at its regular position B in where the

More information

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Seminar Report On QUANTUM CRYPTOGRAPHY Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of Master of Technology in Computer and Information Science DEPARTMENT OF COMPUTER

More information

Quantum Key Distribution and the Future of Encryption

Quantum Key Distribution and the Future of Encryption Quantum Key Distribution and the Future of Encryption Konstantinos Karagiannis Global Technical Lead, Ethical Hacking BT Security Amsterdam, October 16 th, 2014 Understanding QM? I think I can safely say

More information

Public Key Cryptography

Public Key Cryptography T H E U N I V E R S I T Y O F B R I T I S H C O L U M B I A Public Key Cryptography EECE 412 1 What is it? Two keys Sender uses recipient s public key to encrypt Receiver uses his private key to decrypt

More information

Secrecy and the Quantum

Secrecy and the Quantum Secrecy and the Quantum Benjamin Schumacher Department of Physics Kenyon College Bright Horizons 35 (July, 2018) Keeping secrets Communication Alice sound waves, photons, electrical signals, paper and

More information

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices

Network Security Based on Quantum Cryptography Multi-qubit Hadamard Matrices Global Journal of Computer Science and Technology Volume 11 Issue 12 Version 1.0 July Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals Inc. (USA) Online ISSN:

More information

A Matlab Realization of Shor s Quantum Factoring Algorithm

A Matlab Realization of Shor s Quantum Factoring Algorithm 1 A Matlab Realization of Shor s Quantum Factoring Algorithm S. Jha, P. Chatterjee, A.Falor and M. Chakraborty, Member IEEE Department of Information Technology Institute of Engineering & Management Kolkata,

More information

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley Challenges in Quantum Information Science Umesh V. Vazirani U. C. Berkeley 1 st quantum revolution - Understanding physical world: periodic table, chemical reactions electronic wavefunctions underlying

More information

C. QUANTUM INFORMATION 111

C. QUANTUM INFORMATION 111 C. QUANTUM INFORMATION 111 C Quantum information C.1 Qubits C.1.a Single qubits 1. Qubit: Just as the bits 0 and 1 are represented by distinct physical states, so the quantum bits (or qubits) 0i and 1i

More information

Quantum Entanglement Assisted Key Distribution

Quantum Entanglement Assisted Key Distribution Quantum Entanglement Assisted Key Distribution Ke Tang *, Ping Ji *+, Xiaowen Zhang * Graduate Center, City University of New York, ke.tang@qc.cuny.edu + John Jay College of Criminal Justice, City University

More information

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Cryptography. Marshall Roth March 9, 2007 Quantum Cryptography Marshall Roth March 9, 2007 Overview Current Cryptography Methods Quantum Solutions Quantum Cryptography Commercial Implementation Cryptography algorithms: Symmetric encrypting and

More information

Quantum Cryptography

Quantum Cryptography http://tph.tuwien.ac.at/ svozil/publ/2005-qcrypt-pres.pdf Institut für Theoretische Physik, University of Technology Vienna, Wiedner Hauptstraße 8-10/136, A-1040 Vienna, Austria svozil@tuwien.ac.at 16.

More information

MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY

MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY MEETING 6 - MODULAR ARITHMETIC AND INTRODUCTORY CRYPTOGRAPHY In this meeting we go through the foundations of modular arithmetic. Before the meeting it is assumed that you have watched the videos and worked

More information

Hardy s Paradox. Chapter Introduction

Hardy s Paradox. Chapter Introduction Chapter 25 Hardy s Paradox 25.1 Introduction Hardy s paradox resembles the Bohm version of the Einstein-Podolsky-Rosen paradox, discussed in Chs. 23 and 24, in that it involves two correlated particles,

More information

Lecture 1: Introduction to Public key cryptography

Lecture 1: Introduction to Public key cryptography Lecture 1: Introduction to Public key cryptography Thomas Johansson T. Johansson (Lund University) 1 / 44 Key distribution Symmetric key cryptography: Alice and Bob share a common secret key. Some means

More information

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1 Cryptography CS 555 Topic 25: Quantum Crpytography CS555 Topic 25 1 Outline and Readings Outline: What is Identity Based Encryption Quantum cryptography Readings: CS555 Topic 25 2 Identity Based Encryption

More information

The information content of a quantum

The information content of a quantum The information content of a quantum A few words about quantum computing Bell-state measurement Quantum dense coding Teleportation (polarisation states) Quantum error correction Teleportation (continuous

More information

Entanglement and Quantum Teleportation

Entanglement and Quantum Teleportation Entanglement and Quantum Teleportation Stephen Bartlett Centre for Advanced Computing Algorithms and Cryptography Australian Centre of Excellence in Quantum Computer Technology Macquarie University, Sydney,

More information

Experimental quantum teleportation. Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger

Experimental quantum teleportation. Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger Experimental quantum teleportation Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger NATURE VOL 390 11 DECEMBER 1997 Overview Motivation General theory behind

More information

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications

Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications Eavesdropping or Disrupting a Communication On the Weakness of Quantum Communications Zhengjun Cao Abstract What is the behavior of an adversary to launch attacks against a communication? The good choice

More information

A probabilistic quantum key transfer protocol

A probabilistic quantum key transfer protocol SECURITY AND COMMUNICATION NETWORKS Security Comm. Networks 013; 6:1389 1395 Published online 13 March 013 in Wiley Online Library (wileyonlinelibrary.com)..736 RESEARCH ARTICLE Abhishek Parakh* Nebraska

More information

CRYPTOGRAPHY AND LARGE PRIMES *

CRYPTOGRAPHY AND LARGE PRIMES * CRYPTOGRAPHY AND LARGE PRIMES * B. Hartley University of Manchester, England, and National University of Singapore The word "cryptography" derives from Greek and means "secret writing". Since ancient times,

More information

Quantum Entanglement. Chapter Introduction. 8.2 Entangled Two-Particle States

Quantum Entanglement. Chapter Introduction. 8.2 Entangled Two-Particle States Chapter 8 Quantum Entanglement 8.1 Introduction In our final chapter on quantum mechanics we introduce the concept of entanglement. This is a feature of two-particle states (or multi-particle states) in

More information

The BB84 cryptologic protocol

The BB84 cryptologic protocol The cryptologic protocol of quantum key distribution Dimitri Petritis Institut de recherche mathématique de Rennes Université de Rennes 1 et CNRS (UMR 6625) Vernam s ciphering Principles of coding and

More information

A NOVEL APPROACH FOR SECURE MULTI-PARTY SECRET SHARING SCHEME VIA QUANTUM CRYPTOGRAPHY

A NOVEL APPROACH FOR SECURE MULTI-PARTY SECRET SHARING SCHEME VIA QUANTUM CRYPTOGRAPHY A NOVEL APPROACH FOR SECURE MULI-PARY SECRE SHARING SCHEME VIA QUANUM CRYPOGRAPHY Noor Ul Ain Dept. of Computing, SEECS National University of Sciences and echnology H-1 Islamabad, Pakistan 13msccsnaain@seecs.edu.pk

More information

EPR paradox, Bell inequality, etc.

EPR paradox, Bell inequality, etc. EPR paradox, Bell inequality, etc. Compatible and incompatible observables AA, BB = 0, then compatible, can measure simultaneously, can diagonalize in one basis commutator, AA, BB AAAA BBBB If we project

More information

Simple Math: Cryptography

Simple Math: Cryptography 1 Introduction Simple Math: Cryptography This section develops some mathematics before getting to the application. The mathematics that I use involves simple facts from number theory. Number theory is

More information

37-6 Watching the electrons (matter waves)

37-6 Watching the electrons (matter waves) 37-6 Watching the electrons (matter waves) 1 testing our proposition: the electrons go either through hole 1 or hole 2 add a very strong light source behind walls between two holes, electrons will scatter

More information

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1 1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation What is quantum mechanics good for? traditional historical perspective: beginning of 20th century: classical physics fails

More information

Using Quantum Effects for Computer Security

Using Quantum Effects for Computer Security Using Quantum Effects for Computer Security Arran Hartgroves, James Harvey, Kiran Parmar Thomas Prosser, Michael Tucker December 3, 2004 1 Introduction Computer security is a rapidly changing field. New

More information

Quantum Interference. Andrew M. Sessler Lawrence Berkeley Laboratory

Quantum Interference. Andrew M. Sessler Lawrence Berkeley Laboratory Quantum Interference Andrew M. Sessler Lawrence Berkeley Laboratory Some Remarks It is a delight to be here once again-- I have fond memories of my first visit to Novosibirsk in 1965 and of subsequent

More information

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation QSIT09.V01 Page 1 1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation What is quantum mechanics good for? traditional historical perspective: beginning of 20th century: classical

More information

Quantum Cryptography

Quantum Cryptography Quantum Cryptography Umesh V. Vazirani CS 161/194-1 November 28, 2005 Why Quantum Cryptography? Unconditional security - Quantum computers can solve certain tasks exponentially faster; including quantum

More information

Ping Pong Protocol & Auto-compensation

Ping Pong Protocol & Auto-compensation Ping Pong Protocol & Auto-compensation Adam de la Zerda For QIP seminar Spring 2004 02.06.04 Outline Introduction to QKD protocols + motivation Ping-Pong protocol Security Analysis for Ping-Pong Protocol

More information

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science 6.453 Quantum Optical Communication Date: Thursday, November 3, 016 Lecture Number 16 Fall 016 Jeffrey H.

More information

Device-Independent Quantum Information Processing

Device-Independent Quantum Information Processing Device-Independent Quantum Information Processing Antonio Acín ICREA Professor at ICFO-Institut de Ciencies Fotoniques, Barcelona Chist-Era kick-off seminar, March 2012, Warsaw, Poland Quantum Information

More information

ON THE POSSIBILITY OF NONLINEAR QUANTUM EVOLUTION AND SUPERLUMINAL COMMUNICATION

ON THE POSSIBILITY OF NONLINEAR QUANTUM EVOLUTION AND SUPERLUMINAL COMMUNICATION ON THE POSSIBILITY OF NONLINEAR QUANTUM EVOLUTION AND SUPERLUMINAL COMMUNICATION Shan Gao Institute for the History of Natural Sciences, Chinese Academy of Sciences Beijing 100190, People's Republic of

More information

(ii) The search for knowledge is a cooperative enterprise;

(ii) The search for knowledge is a cooperative enterprise; Chapter 1 Introduction Modern physics is founded on two very important discoveries of the last century: quantum physics and relativity. Both of these were developed to deal with major failings of Newtonian

More information

John Preskill, Caltech Biedenharn Lecture 2 8 September The security of quantum cryptography

John Preskill, Caltech Biedenharn Lecture 2 8 September The security of quantum cryptography John Preskill, Caltech Biedenharn Lecture 2 8 September 2005 The security of quantum cryptography The Quantum Century Though quantum theory is more than 100 years old, there are profound aspects of the

More information

Quantum Information & Quantum Computation

Quantum Information & Quantum Computation CS90A, Spring 005: Quantum Information & Quantum Computation Wim van Dam Engineering, Room 509 vandam@cs http://www.cs.ucsb.edu/~vandam/teaching/cs90/ Administrative The Final Examination will be: Monday

More information

On a proposal for Quantum Signalling

On a proposal for Quantum Signalling On a proposal for Quantum Signalling Padmanabhan Murali Pune, India pmurali1000@gmail.com Ver1 : 21st Nov 2015 Abstract Present understanding of non-possibility of Quantum communication rests on analysis

More information

Other Topics in Quantum Information

Other Topics in Quantum Information p. 1/23 Other Topics in Quantum Information In a course like this there is only a limited time, and only a limited number of topics can be covered. Some additional topics will be covered in the class projects.

More information