Lecture 12: Grover s Algorithm

Similar documents
Quantum Computing Lecture 6. Quantum Search

Lecture 21: Quantum communication complexity

C/CS/Phys C191 Grover s Quantum Search Algorithm 11/06/07 Fall 2007 Lecture 21

Introduction to Quantum Computing

Representation theory of SU(2), density operators, purification Michael Walter, University of Amsterdam

Lecture 1: Overview of quantum information

Lecture 4: Elementary Quantum Algorithms

Quantum algorithms (CO 781/CS 867/QIC 823, Winter 2013) Andrew Childs, University of Waterloo LECTURE 13: Query complexity and the polynomial method

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Introduction to Quantum Computing

Modifying Shor s algorithm to compute short discrete logarithms

6.896 Quantum Complexity Theory October 2, Lecture 9

α x x 0 α x x f(x) α x x α x ( 1) f(x) x f(x) x f(x) α x = α x x 2

1 Caveats of Parallel Algorithms

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT

Lecture 22: Quantum computational complexity

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 11: From random walk to quantum walk

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013

Quantum Computing: Foundations to Frontier Fall Lecture 3

CS 4120 Lecture 3 Automating lexical analysis 29 August 2011 Lecturer: Andrew Myers. 1 DFAs

Expansion formula using properties of dot product (analogous to FOIL in algebra): u v 2 u v u v u u 2u v v v u 2 2u v v 2

Logic Effort Revisited

Lecture 3: Superdense coding, quantum circuits, and partial measurements

An Introduction to Quantum Information and Applications

QUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2

Quantum Communication Complexity

Each element of this set is assigned a probability. There are three basic rules for probabilities:

QUANTUM COMPUTATION. Lecture notes. Ashley Montanaro, University of Bristol 1 Introduction 2

Minimizing a convex separable exponential function subject to linear equality constraint and bounded variables

Instantaneous Measurement of Nonlocal Variables

Luis Manuel Santana Gallego 100 Investigation and simulation of the clock skew in modern integrated circuits. Clock Skew Model

Computational Complexity

LECTURE NOTES ON QUANTUM COMPUTATION. Cornell University, Physics , CS 483; Spring, 2005 c 2006, N. David Mermin

Simulation of quantum computers with probabilistic models

An Architectural Framework For Quantum Algorithms Processing Unit (QAPU)

3.5 Solving Quadratic Equations by the

Quantum Algorithms. 1. Definition of the Subject and Its Importance. 4. Factoring, Discrete Logarithms, and the Abelian Hidden Subgroup Problem

Quantum Searching. Robert-Jan Slager and Thomas Beuman. 24 november 2009

CHAPTER 5. Linear Operators, Span, Linear Independence, Basis Sets, and Dimension

Bounded Queries, Approximations and the Boolean Hierarchy

10 Lorentz Group and Special Relativity

Solving Systems of Linear Equations Symbolically

1 Hoeffding s Inequality

Quantum Algorithms Lecture #2. Stephen Jordan

Fourier Sampling & Simon s Algorithm

Nothing Here. Fast Quantum Algorithms

arxiv: v1 [quant-ph] 6 Feb 2013

Ph 219b/CS 219b. Exercises Due: Wednesday 22 February 2006

6.080/6.089 GITCS May 13, Lecture 24

arxiv:quant-ph/ v3 13 Sep 2004

Figure 3: A cartoon plot of how a database of annotated proteins is used to identify a novel sequence

Lecture 14: Quantum information revisited

Depth versus Breadth in Convolutional Polar Codes

6.080/6.089 GITCS May 6-8, Lecture 22/23. α 0 + β 1. α 2 + β 2 = 1

Motivation: Can the equations of physics be derived from information-theoretic principles?

Application of Pareto Distribution in Wage Models

Math 216 Second Midterm 28 March, 2013

Appendix lecture 9: Extra terms.

arxiv: v4 [quant-ph] 25 Sep 2017

QLang: Qubit Language

The Mean Version One way to write the One True Regression Line is: Equation 1 - The One True Line

Introduction to Quantum Information Processing

Cryptography in the Quantum Era. Tomas Rosa and Jiri Pavlu Cryptology and Biometrics Competence Centre, Raiffeisen BANK International

ROM-BASED COMPUTATION: QUANTUM VERSUS CLASSICAL

A template model for multidimensional inter-transactional association rules

Section 8.5. z(t) = be ix(t). (8.5.1) Figure A pendulum. ż = ibẋe ix (8.5.2) (8.5.3) = ( bẋ 2 cos(x) bẍ sin(x)) + i( bẋ 2 sin(x) + bẍ cos(x)).

arxiv:quant-ph/ v1 23 May 1996

6.896 Quantum Complexity Theory Oct. 28, Lecture 16

Module 9: Further Numbers and Equations. Numbers and Indices. The aim of this lesson is to enable you to: work with rational and irrational numbers

Ph 219b/CS 219b. Exercises Due: Wednesday 11 February 2009

ADVANCED QUANTUM INFORMATION THEORY

Polynomial Degree and Finite Differences

Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo

Quantum Computation, NP-Completeness and physical reality [1] [2] [3]

Lecture 10: Eigenvalue Estimation

Logarithms. For example:

Let N > 0, let A, B, and C be constants, and let f and g be any functions. Then: S2: separate summed terms. S7: sum of k2^(k-1)

8.04 Spring 2013 March 12, 2013 Problem 1. (10 points) The Probability Current

Problem 3 Solution Page 1. 1A. Assuming as outlined in the text that the orbit is circular, and relating the radial acceleration

Lecture 13: Lower Bounds using the Adversary Method. 2 The Super-Basic Adversary Method [Amb02]

Smooth Projective Hashing and Two-Message Oblivious Transfer

138. Last Latexed: April 25, 2017 at 9:45 Joel A. Shapiro. so 2. iψ α j x j

Lecture 6 January 15, 2014

Quantum Circuits and Algorithms

Quantum Counting. 1 Introduction. Gilles Brassard 1, Peter Høyer 2, and Alain Tapp 1

ChemActivity L4: Proton ( 1 H) NMR

Quantum Information Processing and Diagrams of States

Exploring Lucas s Theorem. Abstract: Lucas s Theorem is used to express the remainder of the binomial coefficient of any two

The Structure of Quantum Computation from Physical Principles

Quantum Communication

Introduction to Quantum Computing

Answers to the Exercises -- Chapter 1

AMS 147 Computational Methods and Applications Lecture 13 Copyright by Hongyun Wang, UCSC

Design Variable Concepts 19 Mar 09 Lab 7 Lecture Notes

Math Analysis CP WS 4.X- Section Review A

Superluminal Hidden Communication as the Underlying Mechanism for Quantum Correlations: Constraining Models

Quantum algorithms for testing Boolean functions

MCS 115 Exam 2 Solutions Apr 26, 2018

Plan for Today and Beginning Next week (Lexical Analysis)

Transcription:

CPSC 519/619: Quantum Computation John Watrous, University of Calgary Lecture 12: Grover s Algorithm March 7, 2006 We have completed our study of Shor s factoring algorithm. The asic technique ehind Shor s algorithm, which we descried in terms of phase estimation, can also e used to solve some other numer-theoretic and group-theoretic prolems as well (such as computing discrete logarithms and calculating orders of aelian groups). This family of prolems represents one of the main reasons why there is such great interest in uilding quantum computers, as the associated quantum algorithms give an exponential advantage over the est known classical algorithms for these prolems. We will now study a different quantum algorithmic technique. It does not give as impressive an advantage over classical algorithms as we have for Shor s algorithm, ut the technique is applicale to a much roader class of prolems. The simplest general prolem to which this technique can e applied is search; and although there are other applications of the technique, this will e the focus of our investigation. The technique was first considered y Lov Grover, and is known as Grover s Algorithm in the context of search. Unstructured search We will e returning to the lack-ox context that was used to descrie Deutsch s algorithm, the Deutsch-Jozsa algorithm, and Simon s algorithm. (The fact that Grover s algorithm works in this very general context represents one of its strengths, ecause in general there will not need to e any promises on the lack ox.) Suppose that we have a function f : {0, 1} n {0, 1} that is implemented y a reversile transformation B f in the usual way: B f x a = x a f(x) for all x {0, 1} n and a {0, 1} The prolem of search is simply to find a string x {0, 1} n such that f(x) = 1, or to conclude that no such x exists if f is identically 0). It is important to note that this searching prolem is completely unstructured. There are no promises on the function f, so it is not possile to use inary search or any other fast searching method to efficiently solve the prolem classically. What is the est classical algorithm for solving the aove search prolem? As we have noted efore, it is more complicated than one might initially think to rigorously prove lower ounds on algorithms. In this particular case it is not too hard, ut ecause our focus is on the quantum algorithm for the prolem we will only discuss informally the issue of classical complexity. 1

It is not hard to see that a deterministic algorithm would need to make 2 n queries to the lackox in the worst case (to distinguish the case where f is identically 0 from any of the cases where there is a single x for which f(x) = 1, for instance). Proailistically, a est strategy for an algorithm that makes k queries is to simply choose k distinct values of x and to query the lack-ox at these k values. In the case that there is a single value of x for which f(x) = 1, and we require that our algorithm succeeds in finding this x with proaility at least 1 ε, then we must have 1 k ε. This implies k (1 ε)2 n, so for 2 n constant error we therefore need k = Ω(2 ) queries to solve the prolem. In contrast, Grovers algorithm will solve the prolem using O( 2 n ) queries. Description of Grover s algorithm Grover s algorithm is remarkaly simple to descrie. We will need to use the following two unitary transformations on n quits: Z f x = ( 1) f(x) x and Z 0 x = { x if x = 0 n x if x 0 n for each x {0, 1} n. Given the lack-ox transformation B f, we can implement Z f using a single ancillary quit using the phase kick-ack phenomenon: x B f 0 H H 0 ( 1) f(x) x Just one query to B f is therefore required to implement Z f. The Z 0 transformation can e implemented in precisely the same way, except replacing the B f transformation y a reversile circuit (possily using additional ancillary quits) for computing the transformation x a x a ( x 1 x n ). Such a circuit can e implemented using a classical Boolean circuit for computing x 1 x n, along with the method we studied in Lecture 7 for constructing reversile circuits. Oviously no queries to B f are required to do this: Z 0 has nothing to do with f. 2

ow we are ready to descrie the quantum part of the algorithm. Similar to Shor s algorithm and Simon s algorithm, we can view that there will e some classical post-processing after this algorithm is run, possily several times. Grover s Algorithm 1. Let X e an n-quit quantum register (i.e., a collection of n quits to which we assign the name X). Let the starting state of X e 0 n and perform H n on X. 2. Apply to the register X the transformation k times (where k will e specified later). 3. Measure X and output the result. Analysis of Grover s algorithm G = H n Z 0 H n Z f As you would imagine, analyzing Grover s algorithm is more difficult than descriing it. When analyzing it, it will help to think aout reflections and rotations in the plane. Here is a reflection of a vector ψ aout the line L: ψ L ψ Rotations are aout the origin, y some angle: ψ θ ψ 3

The effect of a given reflection and rotation might e the same for a particular vector ψ, ut they are always different transformations (e.g., reflections have determinant 1 while rotations have determinant 1). ow, suppose we have two lines L 1 and L 2, and the angle etween them is θ. Then for any choice of ψ if you first reflect ψ aout L 1 and then reflect aout L 2, the effect will e the same as rotating y an angle 2θ: ψ L 2 ψ a θ L 1 a ψ Why do we care aout rotations and reflections? The answer is that may e viewed as reflections, so H n Z 0 H n and Z f G = H n Z 0 H n Z f is a rotation y a particular angle. This rotation will happen in the plane defined y two vectors that we will see shortly. Define sets of strings A and B as follows: A = {x {0, 1} n : f(x) = 1} B = {x {0, 1} n : f(x) = 0}. 4

We will think if the set A as the set of good strings x {0, 1} n ; the goal of the algorithm is to find one of these strings. The set B contains all of the ad strings x {0, 1} n that do not satisfy the search criterion. Let a = A and = B. The case where either a or is zero will e handled as an easy special case, so assume for now that a 0 and 0. Although the analysis will e completely general, you might imagine that an interesting case of the prolem is where a is very small (perhaps a = 1) and therefore is large (close to = 2 n ). ext, define A = 1 x a B = x A 1 x. otice that A and B are orthogonal unit vectors. What we will show is that the rotation mentioned aove will occur in the space spanned y A and B. This will simplify the analysis greatly ecause immediately efore and after each application of G in the algorithm, the state of X will have the form α A + β B for α and β that will happen to e real numers. The state of the register X immediately after step 1 in the algorithm is given y We can write x B h = def H n 0 n = 1 2 n h = x {0,1} n x. a A + B, so the state of X efore step 2 is a vector in the suspace spanned y { A, B }. ext let us see how G affects states in the span of A and B. In order to do this it will help to express Z 0 as follows: Z 0 = I 2 0 n 0 n. (If you forgot what vectors that look like ψ mean, please refer ack to the first couple of lectures of the course.) This means that H n Z 0 H n = H n (I 2 0 n 0 n )H n = I 2 h h. Here we are using two facts: (i) that H = H, and (ii) that if ψ = U φ then ψ = φ U. ow the action of G on elements in the space spanned y { A, B } can e determined y 5

examining its effect on A and B : and G A = H n Z 0 H n Z f A = (I 2 h h )( Z f ) A = (I 2 h h ) A = A 2 h A h a = A 2 ( = 1 2a ( a A + ) A 2 a B G B = H n Z 0 H n Z f B = (I 2 h h )Z f B = (I 2 h h ) B = B + 2 h B h ( a = B + 2 A + = 2 ( a A 1 2 ) B. ) B ) B Indeed, we have that G maps the suspace spanned y { A, B } to itself. We will determine in the next lecture that this action is in fact a rotation y some angle as we have speculated, and determine exactly what the angle is. Once this is done, the analysis of the algorithm will e fairly simple. 6