Quantum Fourier Transforms

Similar documents
Lecture 9: Phase Estimation

Shor Factorization Algorithm

Quantum Algorithms. Andreas Klappenecker Texas A&M University. Lecture notes of a course given in Spring Preliminary draft.

QLang: Qubit Language

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

SUPERDENSE CODING AND QUANTUM TELEPORTATION

Quantum NP - Cont. Classical and Quantum Computation A.Yu Kitaev, A. Shen, M. N. Vyalyi 2002

Quantum Information & Quantum Computation

Lecture 3: Hilbert spaces, tensor products

Quantum Computing 1. Multi-Qubit System. Goutam Biswas. Lect 2

Lecture 7: Quantum Fourier Transform over Z N

Shor s Prime Factorization Algorithm

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT

Introduction to quantum algorithms

2 A Fourier Transform for Bivariate Functions

QUANTUM PHASE ESTIMATION WITH ARBITRARY CONSTANT-PRECISION PHASE SHIFT OPERATORS

Figure 1: Circuit for Simon s Algorithm. The above circuit corresponds to the following sequence of transformations.

C/CS/Phys 191 Shor s order (period) finding algorithm and factoring 11/01/05 Fall 2005 Lecture 19

Graph Non-Isomorphism Has a Succinct Quantum Certificate

Lecture 1: Introduction to Quantum Computing

Introduction into Quantum Computations Alexei Ashikhmin Bell Labs

Boolean State Transformation

2.0 Basic Elements of a Quantum Information Processor. 2.1 Classical information processing The carrier of information

Quantum Computing. 6. Quantum Computer Architecture 7. Quantum Computers and Complexity

Quantum gate. Contents. Commonly used gates

Unitary Dynamics and Quantum Circuits

Quantum algorithms for computing short discrete logarithms and factoring RSA integers

Quantum Computation CMU BB, Fall Week 6 work: Oct. 11 Oct hour week Obligatory problems are marked with [ ]

Introduction to Quantum Computing

Factoring on a Quantum Computer

Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo

. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i.

arxiv: v2 [quant-ph] 1 Aug 2017

Lecture 2: Linear operators

Advanced Cryptography Quantum Algorithms Christophe Petit

C/CS/Phys 191 Quantum Gates and Universality 9/22/05 Fall 2005 Lecture 8. a b b d. w. Therefore, U preserves norms and angles (up to sign).

1 Readings. 2 Unitary Operators. C/CS/Phys C191 Unitaries and Quantum Gates 9/22/09 Fall 2009 Lecture 8

QFT, Period Finding & Shor s Algorithm

Phase estimation. p. 1/24

The Solovay-Kitaev theorem

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

arxiv:quant-ph/ v2 20 Dec 2010

Chapter 2. Basic Principles of Quantum mechanics

Ergodic Theory and Topological Groups

CS257 Discrete Quantum Computation

Deutsch Algorithm on Classical Circuits

Lecture 4: Elementary Quantum Algorithms

Introduction to Group Theory

International Journal of Scientific & Engineering Research, Volume 6, Issue 7, July ISSN

Introduction to Quantum Computing

QIP Note: On the Quantum Fourier Transform and Applications

On the origin of the dimensional forms of the laws of physics

Ph 219b/CS 219b. Exercises Due: Wednesday 11 February 2009

Quantum Gates, Circuits & Teleportation

Quantum Computing: Foundations to Frontier Fall Lecture 3

Errata list, Nielsen & Chuang. rrata/errata.html

Lecture 10: A (Brief) Introduction to Group Theory (See Chapter 3.13 in Boas, 3rd Edition)

Ph 219b/CS 219b. Exercises Due: Wednesday 20 November 2013

Some Introductory Notes on Quantum Computing

Quantum Computing based on Tensor Products Overview and Introduction

Lecture 4: Postulates of quantum mechanics

5 Irreducible representations

Fourier Sampling & Simon s Algorithm

FINITE FOURIER ANALYSIS. 1. The group Z N

An Introduction to Quantum Computation and Quantum Information

Quantum Algorithms via Linear Algebra

Simon s algorithm (1994)

C/CS/Phys C191 Quantum Gates, Universality and Solovay-Kitaev 9/25/07 Fall 2007 Lecture 9

Quantum computing. Shor s factoring algorithm. Dimitri Petritis. UFR de mathématiques Université de Rennes CNRS (UMR 6625) Rennes, 30 novembre 2018

Imitating quantum mechanics: Qubit-based model for simulation

The Classification of Clifford Gates over Qubits

1 Measurements, Tensor Products, and Entanglement

Quantum Computing Lecture 2. Review of Linear Algebra

Quantum Mechanics- I Prof. Dr. S. Lakshmi Bala Department of Physics Indian Institute of Technology, Madras

Ma/CS 6a Class 4: Primality Testing

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem

Quantum Information & Quantum Computing

D.5 Quantum error correction

Fourier Bases on the Skewed Sierpinski Gasket

THE HIDDEN SUBGROUP PROBLEM - REVIEW AND OPEN PROBLEMS

CHARACTERS OF FINITE GROUPS.

A Gentle Introduction to Quantum Computing

MATH 320, WEEK 7: Matrices, Matrix Operations

Extended Superposed Quantum State Initialization Using Disjoint Prime Implicants

Lecture 10: Eigenvalue Estimation

Lecture 1: Overview of quantum information

b) (5 points) Give a simple quantum circuit that transforms the state

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Quantum Computer Simulation Using CUDA (Quantum Fourier Transform Algorithm)

Lecture 2: Introduction to Quantum Mechanics

Quantum Phase Estimation using Multivalued Logic

Quantum Computation. Alessandra Di Pierro Computational models (Circuits, QTM) Algorithms (QFT, Quantum search)

Adversary-Based Parity Lower Bounds with Small Probability Bias

Assignment 3. A tutorial on the applications of discrete groups.

Seminar 1. Introduction to Quantum Computing

QUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2

First, let's review classical factoring algorithm (again, we will factor N=15 but pick different number)

arxiv:quant-ph/ v1 15 Jan 2006

Transcription:

Quantum Fourier Transforms Burton Rosenberg November 10, 2003 Fundamental notions First, review and maybe introduce some notation. It s all about functions from G to C. A vector is consider a function by the transform, (c ) c e where the e, rather than standard unit vectors, are considered as functions, { 1 = k e (k) = 0 else The Fourier coefficients ĉ are then the complex numbers for which, c e = ĉ χ / n where χ are the characters of G and n is the number of elements in G (this is also the number of distinct characters). The scale factor 1/ n is needed make the characters unit length and thereby insure that the Fourier transform is unitary. A small amount of thought and it is clear that for G = Z n the image of a character must be an n-th root of unity, and the map is determined by which n-th root of unity is the image of 1. We also have the short proof, χ i (g) = χ i (g + a) = χ i (a) χ i (g). g g g So if χ i is not identically 1, the sum is 0. This can be used to show the orthogonality of characters, since χ i χ = χ i χ = g χ k(g), and χ k is trivial if and only if i =. Taking inner products against χ k / n in the two representations of the vector, (χ k / n) ĉ χ / n = ĉ (χ k χ )/n = ĉ k 1

which equals (χ k / n) c e = c (χ k e )/ n = (1/ n) c χ k () Using matrix notation, (ĉ k ) = (1/ n)[χ k () ](c ) that is, row k gives value of χ k () in column. We derive the inverse transform by taking inner products against e k, e k c e = c (e k e ) = c k and e k ĉ χ / n = ĉ (e k χ )/ n = (1/ n) ĉ χ (k) written as a matrix, (c k ) = (1/ n)[χ (k)](ĉ ) Noting the reversal of the indices and k, we have also shown that the inverse transform is the Hermetian transpose of the forward transform. So the transformation matrix is unitary. This fast and loose claim of invertibility might need a bit more ustification. Consider (c ) transformed to (ĉ ) and then back to (c ), for which we claim c = c. Recall, that (c ) and (ĉ ) describe exactly the same vector, so that we can immediately claim (c ) and (c ) at least describe the same vector. That c = c really depends upon the linear independence of the e. The reader is encouraged to review the linear algebra confirming this. An example As an example of the Fourier transform, the characters of Z 4 are χ k () = e 2πik/4. Allowing that our matrix be written out starting the indexing at zero, the transformation matrix is, 1 1 1 1 [χ k () ] = 1 1 i 1 i 2 1 1 1 1 1 i 1 i and the reverse transformation (ĉ ) (c ) is the Hermetian transpose of this matrix. For instance, the function (1, 1, 1, 1) has Fourier transform (0, 1 i, 0, 1 + i). The reader should check that the function (1/2)((1 i)χ 1 + (1 + i)χ 3 ) has the proper values. 2

Periodicity and the Fourier transform A function f : Z n C is periodic if there exists a period r such that f(k + r) = f(k). Note that r must divide n. Periodic functions have limited amounts of information and the Fourier transform reflects this by having many zero coefficients. Precisely, ĉ is non-zero only if is a multiple of n/r. Here s the proof. n 1 n ˆf() = e 2πik/n f(k) = = k=0 r 1 n/r 1 k =0 k =0 r 1 k =0 e 2πi(k +rk )/n f(k + rk ) n/r 1 f(k )e 2πik /n k =0 e 2πirk /n Consider the second sum. By the assumption of divisibility, let d = n/r. The sum is therefore over all powers of the -th power of the d-th roots of unity. If /d is not an integer, this sum is zero. Else each term is 1 and the sum is n/r. Therefore, ˆf() = { ( n/r) r 1 k=0 f(k)e 2πik/n = 0, n/r, 2n/r,... 0 else An example For an easy example of periodicity, take a function f periodic with period 2, f(k + 2) = f(k). There are essentially only two values for this function f(k) when k is even, and when k is odd. The non-zero fourier coefficients are at = 0 and = n/2. The only two characters involved are the trivial character and the character which alternates between 1 and 1. It is easy to see how to adust their weights so as to combine these characters to equal the function f. In general, when the periodicity of f implies that there are only d independent values for f then only d Fourier coefficients will be possibly non-zero. Another way to look at this, the periodicity of the characters with non-zero coefficients must be compatible to the periodicity of the function. It seems that this might give a better proof: take the fourier transform in Z r of the r-periodic function and then transfer the coefficients using the embedding of the r-th roots of unity into the n-th roots of unity, when r divides n. Quantum Fourier transform Given the Fourier transform, we derive a quantum circuit. This essentially mean we give a bunch of two qubit unitary transformations laid out so as to perform the Fourier transformation. It turns 3

out that superposition lets us evaluate the Fourier transform using exponentially less circuitry than if done classically. Since the Fourier transform is linear, we need only discuss the circuit for inputs of the form x. General inputs of the form c i x are obtained by the superposition of basis states. F x = 1 n 1 e 2πixy/n y n y=0 We write this in a product form. Assume n = 2 m and that we represent x and y as the tensor of qubits. Any y is of the form y 0 or y 1. We write the sums separately and factor over the tensor, F x = 1 2m 1 1 e πix(2y )/2 m 1 y 0 + 1 2m 1 1 e πix(2y +1)/2 m 1 y 1 n n Continuing in this manner, = 1 2m 1 1 e πixy /2 m 2 ( 0 + e πix/2m 1 1 ) n F x = 1 2m 2 1 e πixy /2 m 3 ( 0 + e πix/2m 2 1 ) ( 0 + e πix/2m 1 1 ) n. = 1 n ( 0 + e πix 1 ) ( 0 + e πix/2 1 )... ( 0 + e πix/2m 1 1 ) To express this as the tensor of qubits y m 1 y m 2... y 0 we set, y l = 1 2 ( 0 + e πix/2m l 1 1 ) The coefficient of the 1 in y l factors by expanding x = x k 2 k, e πi P x k 2 k /2 m l 1 = m 1 k=0 e πix k/2 m l k 1 = ( 1) x m l 1 m l 1 κ=1 e πix m l 1 κ/2 κ The quantum fourier recipe 1. Let l = m l 1. Apply the Hadamard transform to x l, giving (1/ 2)( 0 + ( 1) x l 1 ). 2. For κ = 1, 2,..., l, if x l κ is 1, apply the phase shift e πi/2κ to the 1 component of the qubit. 3. Assign the result to qubit y l. Note that after collecting all m factors of 1/ 2 we will have the required scale factor 1/ 2 m. 4

An example For the 2 qubit transform the circuit is, x1 ---- H ----- S ---------- y0 x0 -------------*---- H ---- y1 Where H is the Hadamard transform, and S is a controlled phase shift by i. That is, if its two inputs are 1, it outputs i, else it outputs the first input. Also, by careful experiment, the controlled gate S should be, 1 0 0 0 [ ] S = 0 1 0 0 I 0 0 0 1 0 = 0 S 0 0 0 i Note the reversal of the order of the bits of y. We can put the bits in the usual order by applying the matrix, 1 0 0 0 R = 0 0 1 0 0 1 0 0 0 0 0 1 So we need multiply, R(I H)S(H I) = (1/ [ ] [ ] [ ] H 0 I 0 I I 2)R 0 H 0 S I I = (1/ [ ] H H 2)R HS HS 1 0 0 0 1 1 1 1 = 1 0 0 1 0 1 1 1 1 2 0 1 0 0 1 i 1 i 0 0 0 1 1 i 1 i = 1 2 Which is indeed the Fourier transform on Z 4. 1 1 1 1 1 i 1 i 1 1 1 1 1 i 1 i References 1. Mika Hirvensalo, Quantum Computing, Springer. 2001. 3 540 66783 0. 5

2. Michale Nielsen, Issac Chuang, Quantum Computing and Quantum Information, Cambridge. 2000. 0 521 63503 9. 3. Arthur Pittenger, An Introduction to Quamtum Computing Algorithms, Birkhauser. 2001. 3 7643 4127 0. 4. A. Kitaev, A. Shen, M. Vyalyi, Classical and Quantum Computing, AMS GSM Vol. 47. 2002. 0 8218 2161 X. 6