An Introduction to Quantum Information and Applications

Similar documents
Quantum Communication Complexity

Quantum Communication

Introduction to Quantum Information, Quantum Computation, and Its Application to Cryptography. D. J. Guan

Introduction to Quantum Computing

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Security Implications of Quantum Technologies

Quantum Information Processing

Quantum Information & Quantum Computation

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm

Lecture 21: Quantum communication complexity

Quantum Computing. Quantum Computing. Sushain Cherivirala. Bits and Qubits

Advanced Cryptography Quantum Algorithms Christophe Petit

Cryptography in a quantum world

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Lecture 4: Elementary Quantum Algorithms

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Lecture 4: Postulates of quantum mechanics

Quantum Information Processing and Diagrams of States

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

The one-way communication complexity of the Boolean Hidden Matching Problem

Lecture 2: Quantum bit commitment and authentication

EPR paradox, Bell inequality, etc.

Introduction to Quantum Computing

Quantum Cryptography

Entanglement and Quantum Teleportation

Quantum Communication. Serge Massar Université Libre de Bruxelles

Bit-Commitment and Coin Flipping in a Device-Independent Setting

arxiv: v7 [quant-ph] 20 Mar 2017

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem

QUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2

Universal Blind Quantum Computing

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

CS 282A/MATH 209A: Foundations of Cryptography Prof. Rafail Ostrovsky. Lecture 10

Quantum Information Transfer and Processing Miloslav Dušek

Entanglement and information

Introduction to Quantum Computing

Quantum Gates, Circuits & Teleportation

Lecture 1: Overview of quantum information

arxiv:quant-ph/ v1 13 Mar 2007

Fourier Sampling & Simon s Algorithm

Introduction to Quantum Computing

Practical Quantum Coin Flipping

Other Topics in Quantum Information

A Genetic Algorithm to Analyze the Security of Quantum Cryptographic Protocols

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

LECTURE NOTES ON Quantum Cryptography

Lecture: Quantum Information

Quantum Pseudo-Telepathy

Introduction to Quantum Computing for Folks

Quantum Teleportation Pt. 1

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Quantum Information Theory and Cryptography

Quantum Cryptography

Lecture 3: Superdense coding, quantum circuits, and partial measurements

Quantum key distribution with 2-bit quantum codes

Simulation of quantum computers with probabilistic models

arxiv:quant-ph/ v2 17 Sep 2002

CS257 Discrete Quantum Computation

Optimal bounds for quantum bit commitment

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

RIVF 2006 Tutorial. Prof. Patrick Bellot PhD. Dang Minh Dung. ENST (Paris) & IFI (Hanoi) RIVF 2006 Tutorial. "Quantum Communications"

Quantum Computing: Foundations to Frontier Fall Lecture 3

Entanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017

Quantum Algorithms. 1. Definition of the Subject and Its Importance. 4. Factoring, Discrete Logarithms, and the Abelian Hidden Subgroup Problem

Introduction to Quantum Cryptography

Discrete Quantum Theories

Quantum key distribution for the lazy and careless

Report on Conceptual Foundations and Foils for QIP at the Perimeter Institute, May 9 May

INTRODUCTION TO QUANTUM COMPUTING

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT

Short Course in Quantum Information Lecture 5

Introduction to Quantum Key Distribution

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

A. Quantum Key Distribution

Quantum information and quantum computing

On Quantum vs. Classical Communication Complexity

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií

Multiparty Quantum Secret Sharing Using Quantum Fourier Transform

SUPERDENSE CODING AND QUANTUM TELEPORTATION

Physics ; CS 4812 Problem Set 4

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles

Quantum Computing. 6. Quantum Computer Architecture 7. Quantum Computers and Complexity

Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G.

Single qubit + CNOT gates

Ping Pong Protocol & Auto-compensation

Quantum Cryptography. Marshall Roth March 9, 2007

C. QUANTUM INFORMATION 111

Research Article Novel Quantum Encryption Algorithm Based on Multiqubit Quantum Shift Register and Hill Cipher

Lower bounds for Quantum Computation and Communication. Ashwin V. Nayak. B.Tech. (Indian Institute of Technology, Kanpur) 1995

Quantum Technologies for Cryptography

Zero-Knowledge Against Quantum Attacks

Transcription:

An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot

Quantum information and computation Quantum information and computation How is information encoded in nature? What is nature s computational power? Moore s law: quantum phenomena will appear by 2020 Rich Mathematical Theory Advances in Classical Computer Science Advances in Theoretical & Experimental Physics Advances in Information Theory

Quantum information and computation The power of Quantum Computing Quantum algorithm for Factoring and Discrete Logarithm [Shor 93] Unconditionally Secure Key Distribution [Bennett-Brassard 84] Quantum computers unlikely to solve NP-complete problems [Bernstein Bennett Brassard Vazirani 94]

Outline ) Introduction to the model Superdense Coding Teleportation 2) Basic algorithms Deutsch-Jozsa Ideas for Factoring 3) Cryptography Key Distribution 4) Communication Complexity Quantum fingerprints Exponential Separations

Quantum States Quantum bit is a unit vector in a 2-dim. Hilbert space " 0 = $ % # 0& ', = " $ 0% # ', & 2 0 + ( ) = 2 " $ % ', # & 2 0 ( ) = 2 " % $ ' # & A quantum state on logn qubits is a unit vector in Inner product:

Measurements on Quantum States A measurement of in an orthonormal basis is a projection onto the basis vectors and Pr[outcome is b i ] = Examples

Measurements on Quantum States A measurement of in an orthonormal basis is a projection onto the basis vectors and Pr[outcome is b i ] = Examples φ = a 0 0 + a, { ( 2 0 + ), 2 0 ( )} Prob[outcome ( 2 0 + )] = 2 a 0 0 0 + 2 a Prob[outcome ( 2 0 )] = 2 a 0 0 0 2 a 2 2 = 2 + a 0a = 2 a 0a

Measurements on Quantum States A measurement of in an orthonormal basis is a projection onto the basis vectors and Pr[outcome is b i ] = Examples Note that

Measurements on Quantum States A measurement of in an orthonormal basis is a projection onto the basis vectors and Pr[outcome is b i ] = IMPORTANT REMARK What is the final state after the measurement? The state changes to the basis state Hence, no more information in it about the a i s. If I repeat the measurement I always get the same basis vector.

Unitary Evolution Unitary matrix: inner product/length preserving, linear NOT gate X Phase Flip gate Z

Unitary Evolution cont. Hadamard Gate 0 H " 2 0 + ( ), H H " 2 0 ( ) Control NOT gate Example H 0 0 H on st ### 2 0 + ( ) 0 CNOT ## 2 0 0 + ( )

Superdense Coding Transmitting 2 bits with qubit Alice and Bob share the above state 2 0 0 + Alice wants to transmit the bits b b 2 to Bob ( ) Alice Z b X b2 Bob Let b b 2 =0 H M M 2 0 0 + ( ) CNOT "" Z if b= """ 2 0 0 ( ) 2 0 0 0 ( ) 2 0 ( ) 0 X if b 2= "" " H on st """ 0 2 0 0 ( )

Teleportation Teleporting a qubit with 2 bits Alice and Bob share the state ( ) Alice wants to transmit an unknown qubit to Bob M Alice b 2 H 2 0 0 + M b Bob Z b X b2 ( a 0 0 + a ) ( 2 0 0 + CNOT ) ## ( 2 a 0 000 + a 0 + a 0 0 + a 0 ) H # 2 00 ( a 0 0 + a ) + 2 0 ( a 0 + a 0 ) + 2 0 ( a 0 0 a ) + 2 ( a 0 a 0 ) Z b X b 2 ### ( a 0 0 + a )

Outline ) Introduction to the model Superdense Coding Teleportation 2) Basic algorithms Deutsch-Jozsa Ideas for Factoring 3) Cryptography Key Distribution 4) Communication Complexity Quantum fingerprints Exponential Separations

Quantum Queries Let f: X -> Y Goal: Does f have a certain property? Classical Query: "What is the value of f(x)?" x O "" f f (x) Example: Is f linear or far from linear? 3 Queries u.a.r.: f(x),f(y),f(x+y). Check f(x)+f(y)=f(x+y) Quantum Query x b O "" f x b f (x) But, quantum operations are linear! 0...0 0 H " x 2 n / 2 x {0,} n 0 O "" f x 2 n / 2 x {0,} n f (x)

Deutsch-Jozsa Algorithm Let f: {0,} n -> {0,} Goal: Is f identically zero or balanced? O Classical Query: x "" f f (x) deterministic: 2 n- + randomized: k queries, error probability 2 -k Quantum x b O "" f x b f (x) 0...0 0 Z on 2nd """ H " H " x 0 2 n / 2 x {0,} n O "" f ( ) f (x) x f (x) 2 n / 2 x {0,} n ' 0...0 if f = 0 ) ( a y y,with a 0 = 0, ) * y {0,} n x f (x) 2 n / 2 x {0,} n O "" f if f balanced ( ) f (x ) x 0 2 n / 2 x {0,} n

More Algorithms - Simon's problem Let f: {0,} n -> {0,} n Promise: f(x)=f(x+a) and f(x) f(y), y x+a (2-periodic) Goal: Find a Randomized: 2 n/2 Quantum: O(n), by finding each time a random y, st. y.a=0 - Period Finding [Shor94] Let f: Z N -> C Promise: f is periodic Goal: Find period Quantum: Easy algorithm, based on Fourier Transform Factoring = Period Finding! - Seach an unordered list: O( n) queries [Grover97]

2)Algorithms: Open Problems Find New Algorithms Graph Isomorphism? Lattice Problems? Hidden Subgroup Problems? other... Exponential speedup (possibly) Factoring, Discrete Log, Pell's Equality,... Quadratic speedup (provably) Grover's Search, Quantum walk-based algorithms,...

Outline ) Introduction to the model Superdense Coding Teleportation 2) Basic algorithms Deutsch-Jozsa Ideas for Unordered search and Factoring 3) Cryptography Key Distribution 4) Communication Complexity Quantum fingerprints Exponential Separations

3) Cryptography Current cryptography based on computational assumptions (e.g. hardness of factoring) Many such problems become insecure against a quantum adversary Can we use quantum interaction to achieve unconditionally secure cryptography?

Unconditional Key Distribution. Alice picks a secret key. She encodes each bit in one of two possible quantum ways and sends it to Bob. 2. Bob guesses the encoding and decodes each bit accordingly Remarks: - If Bob guesses correctly the encoding, then the decoding is perfect. If not, Bob gets a random bit. - Bob guesses correctly half the times.

Unconditional Key Distribution. Alice picks a secret key. She encodes each bit in one of two possible quantum ways and sends it to Bob. 2. Bob guesses the encoding and decodes each bit accordingly 3. Alice and Bob reveal publicly the encodings and keep only the bits on which they agree. (~ half) Remarks: - If there is no Eve, then they agree on the value of all these bits. - If Eve has got information about the key, then with high probability Alice and Bob will disagree on some bits.

Unconditional Key Distribution. Alice picks a secret key. She encodes each bit in one of two possible quantum ways and sends it to Bob. 2. Bob guesses the encoding and decodes each bit accordingly 3. Alice and Bob reveal publicly the encodings and keep only the bits on which they agree. (~ half) 4. Alice and Bob reveal publicly the values of half of the bits (/4 of the initial). - If they agree, they use the rest as the key (~ /4) - If they disagree in many bits, they throw it away

Unconditional Key Distribution Ψ 00 = 0, Ψ 0 =, Ψ 0 = ( 2 0 + ), Ψ = ( 2 0 ). Pick a,b {0,} n ( a: key b : encoding) Send each 2. Pick b {0,} n If b i =0 measure in If b i = measure in Denote outcome a i 3. Alice and Bob reveal publicly the encodings b,b. Keep the bits for which b i = b i (~ half) 4. Alice and Bob reveal publicly the values of a i = a i for half of the bits for which b i = b i - If they agree, they use the rest as the key (~ /4) - If they disagree in many bits, they throw it away

Unconditional Key Distribution Ψ 00 = 0, Ψ 0 =, Ψ 0 = ( 2 0 + ), Ψ = ( 2 0 ) Proof of Security (idea) Eve gets information, she disturbs the state (Heisenberg) Possible strategy: Eve picks encoding b E u.a.r and measures Alice's qubit. Let be the result. She sends it to Bob. Ψ a be If b A b B, Bob does not check, so Eve is not detected cheating If b A = b B and b E = b A, then Ψ a b E = Ψ a b A, so Eve is not detected If b A = b B and b E b A, then Alice Eve : measure in { 0, } Bob: measure in ( ) Ψ 0 = 2 0 + outcome 0, w.p./2, w.p./2 outcome { ( 2 0 ± )} +, w.p./2, w.p./2

Unconditional Key Distribution Ψ 00 = 0, Ψ 0 =, Ψ 0 = ( 2 0 + ), Ψ = ( 2 0 ) Proof of Security (idea) Eve gets information, she disturbs the state (Heisenberg) Possible strategy: Eve picks encoding b E u.a.r and measures Alice's qubit. Let be the result. She sends it to Bob. Ψ a be If b A b B, Bob does not check, so Eve is not detected cheating If b A = b B and b E = b A, then Ψ a b E = Ψ a b A, so Eve is not detected If b A = b B and b E b A and Alice and Bob check, then Alice Eve : measure in { 0, } Bob: measure in ( ) Ψ 0 = 2 0 + outcome 0, w.p./2, w.p./2 Overall, Pr[Eve is detected cheating]=/6 outcome { ( 2 0 ± )} +, w.p./2, w.p./2

Unconditional Key Distribution Ψ 00 = 0, Ψ 0 =, Ψ 0 = ( 2 0 + ), Ψ = ( 2 0 ) Proof of Security (continued) The optimal strategy of Eve is not much better than the one we described. (individual vs coherent attacks) The key is almost secure. We can distill a much stronger key by classical privacy amplification No assumptions on Eve s computational power!

3) Cryptography: Open Problems Other Cryptographic Primitives Oblivious Transfer Coin Flipping Bit Commitment Practical Quantum Cryptography Commercial systems for QKD Classical cryptography secure against quantum

Outline ) Introduction to the model Superdense Coding Teleportation 2) Basic algorithms Deutsch-Jozsa 3) Cryptography Key Distribution 4) Communication Complexity Quantum fingerprints Exponential Separations

4) Communication Complexity Input x Goal: Output P(x,y) (minimum communication) Input y Examples: Is x=y?, Find an i such that x i y i Applications of Communication Complexity VLSI design, Boolean circuits, Data structures, Automata, Formula size, Data streams, Secure Computation

Quantum Communication Complexity Classical vs. Quantum Input x Goal: Output P(x,y) (minimum communication) Input y Examples: Is x=y?, Find an i such that x i y i Applications of Communication Complexity VLSI design, Boolean circuits, Data structures, Automata, Formula size, Data streams, Secure Computation

Encoding Information with Quantum states We can encode a string with logn qubits. Holevo s bound We cannot compress information by using qubits. We need n qubits to transmit n classical bits. Quantum communication can still be useful since in many communication problems the information that needs to be transmitted is small. (e.g. Equality)

Equality in Simultaneous Messages Input x Referee Is x=y? Input y Randomized algorithm (Complexity ) Alice and Bob use an error correcting code C with constant distance and size O(n). They each send bits of their strings C(x), C(y) Referee outputs Yes if C(x) i = C(y) i

Equality in Simultaneous Messages Quantum algorithm : (Complexity O(log n)) [BCWdW0] Alice and Bob use an error correcting code C with constant distance. They send the states Referee measures the state in the symmetric and alternating subspace of If x=y, then the states are equal. If x y, then the states are almost orthogonal.

Exponential Separations Two-way communication [BCW98]: exponential separation for zero error. [Raz99]: exponential separation for bounded error. [Gav07, RK]: between q. One-way and rand. Two-way One-way communication [BJK04]: exponential separation for a relation [GKKRdW07]: exponential separation for a partial function Simultaneous Messages [BCWdW0]: equality via fingerprints [BJK04]: exponential separation for a relation

The Hidden Matching Problem Input: x {0,} 2n Output: Input: a matching M on [2n] eg. {(,5),(2,6),(3,7),(4,8)} 2 3 4 5 6 7 8 Theorem There exists a one-way quantum protocol with compl. O(logn) Any randomized one-way protocol has complexity Ω( n) %

Quantum algorithm for HM 4 Let M = {(,3),(2,4)} be Bob s matching. Alice sends the state 2 (( )x + ( )x 2 2 + ( )x 3 3 + ( ) x 4 4 ) Bob measures in the basis B = { + 3, 3, 2 + 4, 2 4 } and outputs ((,3),0) if he measures ((,3),) " ((2,4),0) " ((2,4),) " + 3 3 2 + 4 2 4

Quantum algorithm for HM 4 Alice sends the state 2 4 i= ( ) x i i = 2 (( )x + ( )x 3 3 ) + 2 (( )x 2 2 + ( )x 4 4 ) Bob measures in the basis B = { + 3, 3, 2 + 4, 2 4 } Pr[outcome + 3 ] = 8 (( )x + ( )x 3 )2 Pr[outcome 3 ] = 8 (( )x ( )x 3 )2 Bob can compute the XOR of a pair of the matching with probability.

4) Communication Complexity Open Problems Quantum communication complexity of total functions Power of entanglement in communication complexity Communication Complexity with super-quantum resources.

Conclusions Quantum Information can be very powerful Algorithms Factoring, Unordered Search Quantum Walks, etc Communication Complexity Many exponential separations Total Functions Cryptography Unconditional Key Distribution Impossibility of Bit Commitment, OT Interactions with Complexity Theory & Physics Ronald's talk

Why is Quantum Computation important? Further Conclusions Quantum Information and Computation Computational power of nature Quantum Mechanics as an theory of information Advances in classical Computer Science Practical Quantum Cryptography Advances in Experimental Physics

Simon's Algorithm Let f: {0,} n -> {0,} n Promise: f(x)=f(x+a) and f(x) f(y), y x+a (2-periodic) Goal: Find a Randomized: 2 n/2 Quantum: O(n), by finding each time a random y, st. y.a=0 0...0 0...0 measure f (x) """" amplitude of H onst """ x 0...0 2 n/2 x {0,} n 2 x + 2 x + a H " O " f x f (x) 2 n/2 x {0,} n ( ) x y y + 2 n+/2 y {0,} n + ( ) (x+a) y y 2 n+/2 Hence, we only measure y, s.t. a.y=0 Repeat O(n) times to get n linear independent y's. y {0,} n y = 2 n+/2 ( )x y + 2 n+/2 ( )(x+a) y = 2 n+/2 ( )x y [+ ( ) a y ]

Period Finding Algorithm Let f:z N -> C Let f: Z N -> C Promise: f is periodic Goal: Find period Tool: Quantum Fourier Transform: x QFT " " N N ω x y y, ω = e y {0,} n 2π i /N 0...0 0...0 measure f (x) """" QFT N onst """ N /r N /r j=0 N x Z N j r + l measure """ k N /r, k [ 0,r ] x 0...0 QFT " " N O " f r r i=0 N x Z N i N /r x f (x) If gcd(k,r)=, then gcd(kn/r,n)=n/r REMARK: Factoring reduces classically to period finding!!!