Quantum Computation and Communication

Similar documents
Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Simon s algorithm (1994)

Shor s Algorithm. Polynomial-time Prime Factorization with Quantum Computing. Sourabh Kulkarni October 13th, 2017

QUANTUM CRYPTOGRAPHY QUANTUM COMPUTING. Philippe Grangier, Institut d'optique, Orsay. from basic principles to practical realizations.

Shor s Prime Factorization Algorithm

Lecture note 8: Quantum Algorithms

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

Factoring on a Quantum Computer

Secrets of Quantum Information Science

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles

Introduction to Quantum Computing

Introduction The Search Algorithm Grovers Algorithm References. Grovers Algorithm. Quantum Parallelism. Joseph Spring.

Gates for Adiabatic Quantum Computing

Chapter 10. Quantum algorithms

Introduction to Quantum Computing for Folks

Logical AND. Logical XOR

Experimental Realization of Shor s Quantum Factoring Algorithm

Reversible and Quantum computing. Fisica dell Energia - a.a. 2015/2016

Physics ; CS 4812 Problem Set 4

Complex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace

Quantum Computing. Vraj Parikh B.E.-G.H.Patel College of Engineering & Technology, Anand (Affiliated with GTU) Abstract HISTORY OF QUANTUM COMPUTING-

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Quantum Computing Lecture 6. Quantum Search

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p.

CS257 Discrete Quantum Computation

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT

Quantum Computing. Thorsten Altenkirch

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

IBM Q: building the first universal quantum computers for business and science. Federico Mattei Banking and Insurance Technical Leader, IBM Italy

Introduction to Quantum Computing

Fourier Sampling & Simon s Algorithm

arxiv:quant-ph/ v1 24 Jun 1998

Some Introductory Notes on Quantum Computing

Semiconductors: Applications in spintronics and quantum computation. Tatiana G. Rappoport Advanced Summer School Cinvestav 2005

Quantum Wireless Sensor Networks

Lecture 7: Quantum Fourier Transform over Z N

Deleting a marked state in quantum database in a duality computing mode

Classical RSA algorithm

Introduction to Quantum Computing

Security Implications of Quantum Technologies

Quantum Phase Estimation using Multivalued Logic

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

)j > Riley Tipton Perry University of New South Wales, Australia. World Scientific CHENNAI

Concepts and Algorithms of Scientific and Visual Computing Advanced Computation Models. CS448J, Autumn 2015, Stanford University Dominik L.

Quantum Cryptography. Marshall Roth March 9, 2007

Quantum Circuits and Algorithms

INTRODUCTORY NOTES ON QUANTUM COMPUTATION

1500 AMD Opteron processor (2.2 GHz with 2 GB RAM)

Ma/CS 6a Class 4: Primality Testing

Algorithms, Logic and Complexity. Quantum computation. basic explanations! &! survey of progress

Figure 1: Circuit for Simon s Algorithm. The above circuit corresponds to the following sequence of transformations.

Compute the Fourier transform on the first register to get x {0,1} n x 0.

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1

arxiv: v2 [quant-ph] 1 Aug 2017

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation

Let's Build a Quantum Computer!

6.080/6.089 GITCS May 6-8, Lecture 22/23. α 0 + β 1. α 2 + β 2 = 1

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Quantum computing for beginners

Quantum computing! quantum gates! Fisica dell Energia!

Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií

Qubit Recycling. Ran Chu. May 4, 2016

Mind the gap Solving optimization problems with a quantum computer

Implementation Tutorial on RSA

C/CS/Phys C191 Grover s Quantum Search Algorithm 11/06/07 Fall 2007 Lecture 21

Quantum Information Processing with Liquid-State NMR

Shor s Algorithm. Elisa Bäumer, Jan-Grimo Sobez, Stefan Tessarini May 15, 2015

basics of security/cryptography

MAA509: Quantum Computing and Information Introduction

A High Level Programming Language for Quantum Computing

Grover s algorithm. We want to find aa. Search in an unordered database. QC oracle (as usual) Usual trick

arxiv:quant-ph/ v1 15 Jan 2006

Quantum Computing. 6. Quantum Computer Architecture 7. Quantum Computers and Complexity

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Log-mod-finding: A New Idea for Implementation of Shor's Algorithm

Extended Superposed Quantum State Initialization Using Disjoint Prime Implicants

Mind the gap Solving optimization problems with a quantum computer

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

APPLYING QUANTUM SEARCH TO A KNOWN- PLAINTEXT ATTACK ON TWO-KEY TRIPLE ENCRYPTION

Advanced Cryptography Quantum Algorithms Christophe Petit

Quantum computation and quantum information

Lecture 4: Elementary Quantum Algorithms

Measuring progress in Shor s factoring algorithm

Quantum Computing ~ Algorithms. HIO) 0 HIO) 010) = ~(l000) ) ) ))

Introduction to quantum algorithms

Promise of Quantum Computation

Quantum Information Processing and Diagrams of States

Quantum Computation. Dr Austin Fowler Centre for Quantum Computer Technology. New Scientist, 10/11/07

QFT, Period Finding & Shor s Algorithm

M.L. Dalla Chiara, R. Giuntini, R. Leporini, G. Sergioli. Qudit Spaces and a Many-valued Approach to Quantum Comp

Introduction to Superconductivity. Superconductivity was discovered in 1911 by Kamerlingh Onnes. Zero electrical resistance

QUANTUM COMPUTING. Part II. Jean V. Bellissard. Georgia Institute of Technology & Institut Universitaire de France

Quantum Computing Submitted in partial fulfillment of the requirement for the award of degree of Bachelor of Technology in Computer Science

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Part 1. Grover s s Algorithm. Quantum Computing. The Grover, Shor,, and Deutsch-Jozsa. Algorithms. This work is supported by: Samuel J. Lomonaco, Jr.

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Experimental Quantum Computing: A technology overview

Transcription:

Tom Lake tswsl1989@sucs.org 16/02/2012

quan tum me chan ics: The branch of mechanics that deals with the mathematical description of the motion and interaction of subatomic particles - OED

quan tum me chan ics: The branch of mechanics that deals with the mathematical description of the motion and interaction of subatomic particles - OED I think I can safely say that nobody understands quantum mechanics - Richard Feynman, in The Character of Physical Law (1965)

Quantum Mechanics Under the Copenhagen Interpretation, quantum mechanics allows us to compute the probability of obtaining a given result from a given measurement

Quantum Mechanics Under the Copenhagen Interpretation, quantum mechanics allows us to compute the probability of obtaining a given result from a given measurement A quantum system can exist in a superposition of states, each with a different probability

Quantum Mechanics Under the Copenhagen Interpretation, quantum mechanics allows us to compute the probability of obtaining a given result from a given measurement A quantum system can exist in a superposition of states, each with a different probability We cannot say for certain which of these states the system is in, until we measure it

Quantum Mechanics Under the Copenhagen Interpretation, quantum mechanics allows us to compute the probability of obtaining a given result from a given measurement A quantum system can exist in a superposition of states, each with a different probability We cannot say for certain which of these states the system is in, until we measure it These properties yield some interesting possibilities for computation and communication

Some conventions: a - Quantum state a a = ( a ) - Complex conjugate of state a ψ = α a + β b + γ c State ψ, which can measured to be a with probability α 2, b with probability β 2 or c with probability γ 2 Once measured, we get ψ = a or ψ = b or ψ = c a ψ - The probability of measuring ψ to be in state a a a = 1, b a = 0, a ψ = α 2 a b = ab I intend to avoid getting too mathematical, but using this notation is much more convenient than lengthy descriptions.

For the computational side of things, we need a couple more definitions: 0 - Can be represented as a vector ( 1 0 ) 1 - Can be represented as ( 0 1 ) ψ = α 0 + β 1 unless otherwise stated Can be represented as ( α β) ψ is a qubit, or quantum bit. In order to maintain a valid quantum state, we have to impose α 2 + β 2 = 1. This ensures that the maths works out correctly and provides us with sensible probabilities (This applies to quantum mechanics generally, not just quantum computing)

Quantum Computing Introduction Concepts Physical Realisations The idea of superimposed states is key to understanding the advantages of quantum computing

Concepts Physical Realisations Quantum Computing The idea of superimposed states is key to understanding the advantages of quantum computing We can act on qubits with a set of quantum gates and measure the result

Concepts Physical Realisations Quantum Computing The idea of superimposed states is key to understanding the advantages of quantum computing We can act on qubits with a set of quantum gates and measure the result Carefully thought out, this can provide a much faster way to perform calculations than a classical method

Concepts Physical Realisations Quantum Computing The idea of superimposed states is key to understanding the advantages of quantum computing We can act on qubits with a set of quantum gates and measure the result Carefully thought out, this can provide a much faster way to perform calculations than a classical method We can work on multiple values at once by abusing the superposition

Concepts Physical Realisations Quantum Computing The idea of superimposed states is key to understanding the advantages of quantum computing We can act on qubits with a set of quantum gates and measure the result Carefully thought out, this can provide a much faster way to perform calculations than a classical method We can work on multiple values at once by abusing the superposition Qubits also have phase information associated with them

Concepts Physical Realisations Quantum Circuits We can work with circuits made of quantum gates to plan a quantum computer Quantum gates are unitary transformations that act on qubits

Concepts Physical Realisations Quantum Circuits We can work with circuits made of quantum gates to plan a quantum computer Quantum gates are unitary transformations that act on qubits A property called Universality states that any complex gate can be approximated using a small number of simple, single cubit gates and controlled NOT (CNOT) gates

Concepts Physical Realisations Quantum Circuits We can work with circuits made of quantum gates to plan a quantum computer Quantum gates are unitary transformations that act on qubits A property called Universality states that any complex gate can be approximated using a small number of simple, single cubit gates and controlled NOT (CNOT) gates A CNOT gate has 2 inputs - data and control If the control qubit is 1 then the output is NOT data

What can we use for qubits? Concepts Physical Realisations There are a few methods that have been tested: Trapped ions

What can we use for qubits? Concepts Physical Realisations There are a few methods that have been tested: Trapped ions Hard to prepare Tricky to interact multiple qubits Reasonably simple to read results Nuclear Magnetic Resonance

What can we use for qubits? Concepts Physical Realisations There are a few methods that have been tested: Trapped ions Hard to prepare Tricky to interact multiple qubits Reasonably simple to read results Nuclear Magnetic Resonance Very low signal to noise ratio Very difficult to prepare an initial stated Easier for qubits to interact (compared to ion traps) Has been used to factorise numbers

Concepts Physical Realisations Non linear optics

Concepts Physical Realisations Non linear optics Easy to encode and prepare states (polarisation) Most single qubit gates created from phase shifters and beam splitters CNOT gates are created using Kerr materials

Concepts Physical Realisations Non linear optics Easy to encode and prepare states (polarisation) Most single qubit gates created from phase shifters and beam splitters CNOT gates are created using Kerr materials The downside is that these materials have only a weak effect or are very absorbant Quantum Dots Diamonds

Fast searches Introduction Grover s Algorithm Encryption Take an unsorted database of N items { x }

Grover s Algorithm Encryption Fast searches Take an unsorted database of N items { x } Each entry consists of multiple qubits - e.g 00110101010010 The entry contains multiple fields, we re looking for a match in one of those fields - e.g 0011xxxxxxxxxx

Grover s Algorithm Encryption Start with a state is a superposition of the whole database: N s = 1 N x i i=0 Check if it matches what we re searching for - the gate for this returns 1 if the entry matches, and 1 otherwise O = 1 2 ω ω Apply a quantum gate U = 2 s s 1 Applying these two gates successively moves us closer towards the desired answer

Grover s Algorithm Encryption Start with a state is a superposition of the whole database: N s = 1 N x i i=0 Check if it matches what we re searching for - the gate for this returns 1 if the entry matches, and 1 otherwise O = 1 2 ω ω Apply a quantum gate U = 2 s s 1 Applying these two gates successively moves us closer towards the desired answer UO s = (2 s s 1)(1 2 ω ω ) s UO s = (2 s s s +2 ω ω s s 4 s s ω ω s ) UO s = 2 N ω + ( 1 4 N ) s

Grover s Algorithm Encryption What does that all mean? Every iteration moves us closer to the answer At any given time, if we measure the system we have a chance, ω s of measuring the correct answer

What does that all mean? Grover s Algorithm Encryption Every iteration moves us closer to the answer At any given time, if we measure the system we have a chance, ω s of measuring the correct answer N iterations gives us the best chance of measuring the right result But as we can easily check for the right result, we can run the search again in the rare case that we get the wrong result

What does that all mean? Grover s Algorithm Encryption Every iteration moves us closer to the answer At any given time, if we measure the system we have a chance, ω s of measuring the correct answer N iterations gives us the best chance of measuring the right result But as we can easily check for the right result, we can run the search again in the rare case that we get the wrong result The probability of measuring the wrong answer decreases as the size of the database increases ( N ) So we now have an O algorithm for an unsorted database

Grover s Algorithm Encryption All your RSA are belong to us RSA uses two large prime numbers (p, q) to generate part of the private key (N) The fact that N has only these two factors is important!

Grover s Algorithm Encryption All your RSA are belong to us RSA uses two large prime numbers (p, q) to generate part of the private key (N) The fact that N has only these two factors is important! A message encrypted with RSA (by using the public key) can be decrypted with the corresponding private key Without the private key, the unencrypted message can be recovered by either:

All your RSA are belong to us Grover s Algorithm Encryption RSA uses two large prime numbers (p, q) to generate part of the private key (N) The fact that N has only these two factors is important! A message encrypted with RSA (by using the public key) can be decrypted with the corresponding private key Without the private key, the unencrypted message can be recovered by either: Brute force - encrypt every possible message using the public key until you find a match

All your RSA are belong to us Grover s Algorithm Encryption RSA uses two large prime numbers (p, q) to generate part of the private key (N) The fact that N has only these two factors is important! A message encrypted with RSA (by using the public key) can be decrypted with the corresponding private key Without the private key, the unencrypted message can be recovered by either: Brute force - encrypt every possible message using the public key until you find a match Factorise N into it s two factors, enabling you to calculate the private key

All your RSA are belong to us Grover s Algorithm Encryption RSA uses two large prime numbers (p, q) to generate part of the private key (N) The fact that N has only these two factors is important! A message encrypted with RSA (by using the public key) can be decrypted with the corresponding private key Without the private key, the unencrypted message can be recovered by either: Brute force - encrypt every possible message using the public key until you find a match Factorise N into it s two factors, enabling you to calculate the private key Factorising large numbers takes classical computers a long time!

Grover s Algorithm Encryption Shor s Algorithm Shor s algorithm reduces the factorisation of a large number N to the problem of finding the period of a function f (x) = a x mod N a < N and gcd (a, N) = 1

Shor s Algorithm Introduction Grover s Algorithm Encryption Shor s algorithm reduces the factorisation of a large number N to the problem of finding the period of a function f (x) = a x mod N a < N and gcd (a, N) = 1 Use a quantum Fourier Transform to find the period r of f ( ) The two prime factors of N are then given by gcd a r 2 ± 1, N This runs in O((log N) 3 ), rather than the exponential time required classically

Any questions? Introduction Grover s Algorithm Encryption Slides will be available via talks section of the SUCS website, or at http://sucs.org/~tswsl1989/talks/