Lecture 2: From Classical to Quantum Model of Computation

Similar documents
Lecture 3: Constructing a Quantum Model

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm

Introduction to Quantum Information Processing

Randomized Complexity Classes; RP

Chapter 10. Quantum algorithms

Ph 219b/CS 219b. Exercises Due: Wednesday 20 November 2013

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Lecture 4: Elementary Quantum Algorithms

Complex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where

6.080/6.089 GITCS May 6-8, Lecture 22/23. α 0 + β 1. α 2 + β 2 = 1

1 Quantum Circuits. CS Quantum Complexity theory 1/31/07 Spring 2007 Lecture Class P - Polynomial Time

Introduction to Quantum Computing

Quantum Computation. Michael A. Nielsen. University of Queensland

Quantum Algorithms. Andreas Klappenecker Texas A&M University. Lecture notes of a course given in Spring Preliminary draft.

By allowing randomization in the verification process, we obtain a class known as MA.

Lecture 3: Reductions and Completeness

Lecture 10: Eigenvalue Estimation

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT

Simulating classical circuits with quantum circuits. The complexity class Reversible-P. Universal gate set for reversible circuits P = Reversible-P

Universal quantum computers

Lecture Examples of problems which have randomized algorithms

Lecture 22: Quantum computational complexity

Quantum Gates, Circuits & Teleportation

Introduction to Quantum Computing

Universal quantum computers

Notes for Lecture 3... x 4

CS257 Discrete Quantum Computation

Lecture 12: Randomness Continued

1 Measurements, Tensor Products, and Entanglement

Quantum Computing. Winter Quarter, 2011 and Spring Quarter, 2013

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

Lecture 1: Introduction to Quantum Computing

6.895 Randomness and Computation March 19, Lecture Last Lecture: Boosting Weak Learners Into Strong Learners

Unitary Dynamics and Quantum Circuits

6.896 Quantum Complexity Theory September 18, Lecture 5

1 Randomized Computation

Simulation of quantum computers with probabilistic models

C/CS/Phys 191 Quantum Gates and Universality 9/22/05 Fall 2005 Lecture 8. a b b d. w. Therefore, U preserves norms and angles (up to sign).

C/CS/Phys C191 Quantum Gates, Universality and Solovay-Kitaev 9/25/07 Fall 2007 Lecture 9

20.1 2SAT. CS125 Lecture 20 Fall 2016

Concepts and Algorithms of Scientific and Visual Computing Advanced Computation Models. CS448J, Autumn 2015, Stanford University Dominik L.

CS294: Pseudorandomness and Combinatorial Constructions September 13, Notes for Lecture 5

Fourier Sampling & Simon s Algorithm

. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i.

Lecture 4: Postulates of quantum mechanics

CSCI 2570 Introduction to Nanocomputing. Discrete Quantum Computation

Lecture 3: Hilbert spaces, tensor products

Lecture 11 September 30, 2015

CS151 Complexity Theory. Lecture 1 April 3, 2017

Lecture 23: Introduction to Quantum Complexity Theory 1 REVIEW: CLASSICAL COMPLEXITY THEORY

Short Course in Quantum Information Lecture 2

Lecture 7: Passive Learning

Quantum Complexity Theory and Adiabatic Computation

Quantum NP - Cont. Classical and Quantum Computation A.Yu Kitaev, A. Shen, M. N. Vyalyi 2002

Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum Computing University of Waterloo

Lecture 15: Expanders

Seminar 1. Introduction to Quantum Computing

Ph 219b/CS 219b. Exercises Due: Wednesday 22 February 2006

1 Readings. 2 Unitary Operators. C/CS/Phys C191 Unitaries and Quantum Gates 9/22/09 Fall 2009 Lecture 8

1 Randomized complexity

CS120, Quantum Cryptography, Fall 2016

2.0 Basic Elements of a Quantum Information Processor. 2.1 Classical information processing The carrier of information

Randomized Algorithms

Discrete quantum random walks

Lecture 26: Arthur-Merlin Games

Lecture 9: Phase Estimation

arxiv:quant-ph/ v5 6 Apr 2005

CSC 5170: Theory of Computational Complexity Lecture 5 The Chinese University of Hong Kong 8 February 2010

Lecture 2: Introduction to Quantum Mechanics

10 Quantum Complexity Theory I

Notes for Lecture 3... x 4

Tracking Quantum Circuits By Polynomials

1 Lecture 6-7, Scribe: Willy Quach

Notes on Complexity Theory Last updated: November, Lecture 10

Quantum computing! quantum gates! Fisica dell Energia!

Tensor network simulations of strongly correlated quantum systems

U.C. Berkeley CS278: Computational Complexity Professor Luca Trevisan 1/29/2002. Notes for Lecture 3

Lecture 22: Counting

Single qubit + CNOT gates

Great Ideas in Theoretical Computer Science. Lecture 28: A Gentle Introduction to Quantum Computation

Computational Complexity: A Modern Approach

Quantum Computing. Thorsten Altenkirch

Lecture 1: Overview of quantum information

Ph 219b/CS 219b. Exercises Due: Wednesday 21 November 2018 H = 1 ( ) 1 1. in quantum circuit notation, we denote the Hadamard gate as

Quantum Computing: Foundations to Frontier Fall Lecture 3

Lecture 1: January 16

Physics ; CS 4812 Problem Set 4

Discrete Quantum Theories

: On the P vs. BPP problem. 30/12/2016 Lecture 12

Lecture 1: Introduction to Quantum Computing

Lecture 29: Computational Learning Theory

6.896 Quantum Complexity Theory September 9, Lecture 2

QUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2

Lecture 8: Alternatation. 1 Alternate Characterizations of the Polynomial Hierarchy

Deutsch s Algorithm. Dimitrios I. Myrisiotis. MPLA CoReLab. April 26, / 70

Pr[X = s Y = t] = Pr[X = s] Pr[Y = t]

Lecture: Quantum Information

Factoring on a Quantum Computer

Computational Complexity: A Modern Approach. Draft of a book: Dated January 2007 Comments welcome!

Transcription:

CS 880: Quantum Information Processing 9/7/10 Lecture : From Classical to Quantum Model of Computation Instructor: Dieter van Melkebeek Scribe: Tyson Williams Last class we introduced two models for deterministic computation. We discussed Turing Machines, which are models of sequential computation, and then families of uniform circuits, which are models of parallel computation. In both models, we required the operators to be physically realizable and imposed a uniformity condition; namely, that the state transitions could be described by a finite set of rules independent of the input. In this lecture, we shall develop a model for probabilistic computation, from which our model for quantum computation will follow. 1 Model for Probabilistic Computation 1.1 Overview Probabilistic computers can use randomness to determine which operations to perform on their inputs. Thus, the state at any given moment and the final output of a computation are both random variables. One way to represent a state ψ of dimension m is as a probability distribution over base states, s for s {0, 1} m, ψ = p s s 0 p s 1, p s = 1 s {0,1} m s {0,1} m where p s denotes the probability of observing base state s. These state vectors have an L 1 norm of 1. Since the output is now a random variable, we require a computation to provide the correct answer with high probability. That is, given relation R, input x, and output y, ( x) Pr [(x, y) R] 1 ɛ where ɛ denotes the probability of err. If ɛ were smaller than another bad event, such as the computer crashing during the computation, then we are satisfied. In contrast, ɛ = 1/ is no good for decision problems, because the algorithm can just flip a fair coin and return the result. If R is a function, then ɛ = 1/3 is good enough because we can rerun the algorithm a polynomial number of times, take the majority answer, and achieve exponentially small error via the Chernoff bound. In fact, any ɛ bounded away from 1/ will suffice. 1. Local Operations In the probabilistic setting, a transition operator can depend on probabilistic outcomes (i.e., coin flips). Thus, the local effect of a transition operator can be described as the multiplication of a (left) stochastic matrix T with a state vector ψ, ( j) i T ij = 1 0 T ij 1. 1

We interpret T ij as the probability of entering state i after applying T to state j. As before, the state after an operation is T ψ because ( ψ after ) i = (T ψ before ) i = j T ij ( ψ before ) j. The matrix for a deterministic operator, which is an all zeros matrix except for a single 1 per column, is just a special case of a stochastic matrix. See Figure 1 for examples of stochastic matrices for a fair coin flip and a biased coin flip. [ 1 ] [ ] 1 C = p p 1 1 C p = 1 p 1 p (a) Fair coin flip (b) Biased coin flip Figure 1: Coin flip gates The following exercise shows that, in a strong sense, coin flips are the only genuinely probabilistic operations we need. Exercise 1. Given a probabilistic circuit, C, of size t and depth d, there is an equivalent probabilistic circuit C of size O(t) and depth O(d) such that the first level of C consists only of biased coin flips and all other levels of C are deterministic. Here, equivalent means that for any input x the distribution of outputs y is the same for C and C. 1.3 Uniformity Condition We can think of a deterministic Turing Machine as having a Boolean measure of validity associated with every possible transition between configurations. A 1 signifies a completely valid transition, while a 0 denotes a completely invalid transition: δ : (Q\{q halt } Γ) (Q Γ {L, P, R}) {0, 1} A probabilistic TM will have a probability of validity associated with every transition: δ p : (Q\{q halt } Γ) (Q Γ {L, P, R}) [0, 1] It is important to note that, in order to satisfy the uniformity condition, these probabilities must be easily definable. In particular, we require the n th bit of any bias be computable in time poly(n). If we did not impose this constraint, we could use the probabilities to encode information, such as 0. followed by the characteristic sequence of the halting language. To decide if the n th Turing machine halts, we could repeatedly sample from such a biased coin flip gate in order to estimate p. After we are confident in the value of the n th bit, we return that bit, thereby solving the halting language. This uniformity condition allows for an infinite number of basic operations. If this is a problem, then we can also consider having just the fair coin flip gate as the only source of randomness. In this case, we would use this gate to get good estimates for any biased coin flips gates that we need. However, we would also have to relax the universality condition. Instead of being required to sample exactly from the distribution of any probabilistic circuit, we would only be required to sample approximately. We will discuss this notion of universality in the next lecture.

1.4 A More Abstract View We define a pure state, ψ, as a convex combination of base states, s. That is, ψ = s p s s, where p s is the probability of being in base state s, s p s = 1, and 0 p s 1. A mixed state, is a discrete probability distribution over pure states. We can think of the probabilistic model as allowing two operations on any pure state ψ. 1. Local, stochastic transformations, as specified by probabilistic transition matrices. These are L 1 preserving.. A terminal observation, which is a probabilistic process that transforms a mixed state into a base state after all transformations have been applied. That is, ψ s, where the probability of achieving s is p s. Exercise. What happens if we allow observations at any point in time? That is, in between transitions? A motivation, consider the problem of composing two procedures, both of which observe their respective states after their transformations are complete? Model for Quantum Computation.1 Overview As with the probabilistic model, the state of a system is described by a super-position of base states, but here: 1. the coefficients are complex numbers (usually denoted by α because it stands for an amplitude). vectors have an L norm of 1 (i.e., s α s = 1) A qubit is the quantum analog of a classical bit and satisfies the above two conditions. The interpretation is that Pr[observing s ] = α s. Note, this is a valid interpretation because the above defines a valid probability distribution.. Local Operations For consistency of interpretation, global operations have to preserve the -norm. It is necessary and sufficient that local operations are unitary transformations. That is, T T = I = T T, where T is the conjugate transpose 1 of T. Unitary matrices have a full basis of eigenvectors with eigenvalues λ = 1. Since the determinant is the product of the eigenvalues, det = 1 as well. Example: Does the classical coin-flip transformation describe a valid quantum gate? No, because its transistion matrix is not unitary. It does not even have full rank. 1 The notation T for the conjugate transpose is more common in linear algebra while T is more common in quantum mechanics. 3

The quantum analog of a fair coin flip is the Hadamard gate. It is described by the following matrix, which is unitary: H = 1 [ ] 1 1 1 1 If we apply the Hadamard gate to base states, we get the intuitive fair coin result. That is, regardless of which base state we are in, we end up with 50% probability of being in base state 0 and 50% probability of being in base state 1 : H( 0 ) = 1 0 + 1 1 H( 1 ) = 1 0 1 1 What if we apply the Hadamard gate to a super-position of base states? ( 1 H 0 + 1 ) 1 = 1 ( 0 + 1 ) + 1 ( 0 1 ) = 0 ( 1 H 0 1 ) 1 = 1 ( 0 + 1 ) 1 ( 0 1 ) = 1 Unlike in the probabilistic setting, we do not necessarily get a fair coin result. The above is an example of destructive interference, the key ingredient of quantum algorithm design. Quantum algorithms that run faster than their classical counterparts make constructive use of destructive interference, effectively canceling out wrong computation paths. The tranformation matrix for the quantum analog of a biased coin flip is [ p p 1 p 1 p ]. Another prevalent quantum gate is the rotation R θ = [ ] 1 0 0 e iθ, which effectively adds θ to the phase of the 1-component. Example: Can we use deterministic gates in the quantum setting? Consider the NAND gate. The matrix associated with the NAND gate s transformation is not unitary, as both 00 and 10 map to the same output state, 10. In general, deterministic gates are unitary if and only if they are permutations of base states. That is, if they are reversible. An important gate is the CNOT gate, which is shown schematically in Figure. The matrix b 1 b 1 b b b Figure : CNOT gate 4

associated with this transformation is given below: 1 0 0 1 T = 0 0 0 0 0 0 1 0 0 1 0 0 This gate flips its first input bit if the second bit, also known as the control bit, is a 1; otherwise it leaves the first input bit unchanged. Note that if b 1 = 0, then the CNOT gate effectively copies b..3 Simulating classical gates Even though classical gates, such as the NAND gate, do not translate directly into the quantum setting, they can be simulated. Given a transformation we can define a new transformation f : {0, 1} {0, 1}, f : {0, 1} {0, 1} {0, 1} {0, 1} : (x, b) (x, b f(x)). Essentially, f maintains a copy of its input in order to make the transformation reversible. One can perform this transformation on all classical gates. Example: A reversible NAND gate is shown schematically in Figure 3. The additional third bit, which we need to simulate the classical gate, is called an ancilla bit. b 1 b 1 b R-NAND b b 3 b 3 b 1 b Figure 3: Reversible NAND gate We can apply the above idea to an entire classical circuit. Sometimes, the garbage output due to the ancilla bits is problematic, as it is not defined by the original classical transformation. Specifically, this garbage output will prevent the destructive interference from happening as desired. We can circumvent this difficulty by copying the output of the circuit and then running the circuit in reverse as illustrated in Figure 4. Theorem 1. If f can be computed by a deterministic circuit of size t and depth d, then f can be computed by a reversible circuit of size O(t) and depth O(d) using O(t) ancilla bits. There are more efficient space usage transformations than specified by the above theorem, but this efficiency comes at the expense of time efficiency. It is an open question whether one can simulate a classical circuit in constant time and constant space relative to the original circuit. 5

0 / t C g / t 0 / i z / i 0 C 1 x / n y / k x 0 / k 0 y Figure 4: Computation of f for arbitrary classical circuit C. 6