Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Similar documents
Secrets of Quantum Information Science

Quantum Information Processing

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles

A central problem in cryptography: the key distribution problem.

IBM quantum experience: Experimental implementations, scope, and limitations

Introduction to Quantum Computing for Folks

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

phys4.20 Page 1 - the ac Josephson effect relates the voltage V across a Junction to the temporal change of the phase difference

Other Topics in Quantum Information

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Experimental Quantum Computing: A technology overview

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

1 1D Schrödinger equation: Particle in an infinite box

Quantum Money, Teleportation and Computation. Steven Girvin Yale University

Security Implications of Quantum Technologies

The Future. Currently state of the art chips have gates of length 35 nanometers.

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií

QUANTUM CRYPTOGRAPHY QUANTUM COMPUTING. Philippe Grangier, Institut d'optique, Orsay. from basic principles to practical realizations.

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace

Quantum Computing ~ Algorithms. HIO) 0 HIO) 010) = ~(l000) ) ) ))

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

1 1D Schrödinger equation: Particle in an infinite box

Quantum computing and mathematical research. Chi-Kwong Li The College of William and Mary

10 - February, 2010 Jordan Myronuk

What is a quantum computer? Quantum Architecture. Quantum Mechanics. Quantum Superposition. Quantum Entanglement. What is a Quantum Computer (contd.

Entanglement and Quantum Teleportation

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Quantum Computer. Jaewan Kim School of Computational Sciences Korea Institute for Advanced Study

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Quantum Information Transfer and Processing Miloslav Dušek

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1

Lecture 3: Superdense coding, quantum circuits, and partial measurements

Short introduction to Quantum Computing

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation

*WILEY- Quantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co.

Simple scheme for efficient linear optics quantum gates

Advanced Cryptography Quantum Algorithms Christophe Petit

Experimental Realization of Shor s Quantum Factoring Algorithm

Cryptography in a quantum world

Quantum Information Processing and Diagrams of States

Problem Set: TT Quantum Information

Introduction to Quantum Cryptography

CS257 Discrete Quantum Computation

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Quantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co. KGaA

INTRODUCTION TO QUANTUM COMPUTING

Quantum Communication. Serge Massar Université Libre de Bruxelles

6.080/6.089 GITCS May 6-8, Lecture 22/23. α 0 + β 1. α 2 + β 2 = 1

Introduction to Quantum Computing

Quantum theory has opened to us the microscopic world of particles, atoms and photons..and has given us the keys of modern technologies

Complexity of the quantum adiabatic algorithm

INTRODUCTORY NOTES ON QUANTUM COMPUTATION

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

Entanglement and information

QUANTUM ENTANGLEMENT AND ITS ASPECTS. Dileep Dhakal Masters of Science in Nanomolecular Sciences

Quantum Gates, Circuits & Teleportation

Measuring Quantum Teleportation. Team 10: Pranav Rao, Minhui Zhu, Marcus Rosales, Marc Robbins, Shawn Rosofsky

Requirements for scaleable QIP

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Quantum Optics. Manipulation of «simple» quantum systems

An Introduction to Quantum Information and Applications

Labs 3-4: Single-photon Source

QUANTUM COMPUTING. Part II. Jean V. Bellissard. Georgia Institute of Technology & Institut Universitaire de France

Quantum Cryptography. Marshall Roth March 9, 2007

SUPERDENSE CODING AND QUANTUM TELEPORTATION

simulations of the Polarization dependence of the light Potential equation in quantum ComPUting

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

2.0 Basic Elements of a Quantum Information Processor. 2.1 Classical information processing The carrier of information

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Quantum Computers. Peter Shor MIT

Quantum Cryptography

Quantum Effect or HPC without FLOPS. Lugano March 23, 2016

The Relativistic Quantum World

Semiconductors: Applications in spintronics and quantum computation. Tatiana G. Rappoport Advanced Summer School Cinvestav 2005

LECTURE NOTES ON Quantum Cryptography

C. QUANTUM INFORMATION 99

Introduction. An Introduction to Quantum Computation and Quantum Communication. Why would we care? What approximation do we remove?

Quantum Computation and Communication

Some Introductory Notes on Quantum Computing

Quantum Teleportation Pt. 1

Quantum Information Science (QIS)

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Introduction to Cavity QED: fundamental tests and application to quantum information Serge Haroche July 2004

An Introduction to Quantum Computing for Non-Physicists

Lecture 1: Overview of quantum information

arxiv:quant-ph/ v2 19 Jan 2000

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Magnetic semiconductors. (Dilute) Magnetic semiconductors

Seminar 1. Introduction to Quantum Computing

Quantum Information Processing with Liquid-State NMR

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

The Weird World of Quantum Mechanics

2 Quantum Mechanics. 2.1 The Strange Lives of Electrons

Ph 12b. Homework Assignment No. 3 Due: 5pm, Thursday, 28 January 2010

b) (5 points) Give a simple quantum circuit that transforms the state

C. QUANTUM INFORMATION 111

Transcription:

Quantum Computers Todd A. Brun Communication Sciences Institute USC

Quantum computers are in the news

Quantum computers represent a new paradigm for computing devices: computers whose components are individual quantum systems, and which exploit the properties of quantum mechanics to make possible new algorithms and new ways of processing information.

Quantum Mechanics Quantum mechanics is the theory that describes the behavior of microscopic systems, such as atoms, molecules, and photons This theory, which has been extensively tested by experiments, is probabilistic in nature. The outcomes of measurements on quantum systems are random. Between measurements, quantum systems evolve according to linear equations (the Schrödinger equation). This means that solutions to the equations obey a superposition principle: linear combinations of solutions are still solutions.

Superpositions The classic example of superposition is Schrödinger s Cat. Since both a living and dead cat are obviously valid solutions to the laws of quantum mechanics, a superposition of the two should also be valid. Schrödinger described a thought experiment that could give rise to such a state. α + β If this state is measured, we see only one or the other state (live or dead) with some probability.

Schrödinger s Photons A polarizing beam splitter is a device which reflects all light of one polarization (say H) and transmits all light of the other polarization (say V). If light polarized 45 to H and V arrives, half of it is reflected and half transmitted. If a single photon at 45 arrives, it will be reflected or transmitted with 50/50 probability. We describe such a photon as a superposition of H and V: ( H>+ V>)/sqrt(2).

Interference However, it is not just a simple matter of a photon going one way or the other with equal probability. If we pass the two beams through a pair of beamsplitters, we find that the photon can recombine in such a way that the probability to go in one direction cancels out. This is interference.

Q-bits A physical system of this type, with two distinguishable states, is called a quantum bit or q-bit (or qubit). We label the two distinct states 0> and 1>. Unlike a classical bit, though, a q- bit can be in any linear combination of these states: Ψ> = α 0> + β 1> where α and β are complex numbers. (For photons, these would represent not only linear polarizations, but also circular and elliptical.) If the q-bit is measured it will be found in state 0 or 1 with probabilities α 2 or β 2, and the system will then be left in the state 0> or 1>. The act of measurement disturbs the state.

Quantum Cryptography Alice and Bob wish to establish a secret key, but the communication lines between them may be compromised. Alice sends random q-bits to Bob. For each one, she picks either basis { 0>, 1>} or { 0>± 1>}. Bob randomly chooses a basis to measure the bit in. If he guesses wrong, he gets a random bit. If an eavesdropper Eve tries to intercept the q-bits, she doesn t know (any more than Bob) the basis in which they were prepared. If she guesses wrong, the bit she passes on to Bob will have been disturbed. After N bits have been sent, Alice and Bob compare notes as to which bases they used. All bits where their bases didn t match are discarded. The remainder should be perfectly correlated.

This is what the actual device looks like. The coil is of ordinary optical fiber.

Multiple Q-bits What can be done with single q-bits is very limited. For more ambitious information processing and communication protocols, multiple bits must be used and manipulated. If we have n q-bits, we can think of them as representing the binary expression for an n-bit integer between 0 and 2 n -1. The most general state of n q- bits can be written 2 n $1 % " = # x x x= 0 We can think of the states x> as being basis vectors in a 2 n - dimensional complex vector space. Sets of n q-bits are often called quantum registers or quantum codewords.

Entanglement Some states of multiple q-bits can be written as products of states of individual q-bits: (α 1 0> + β 1 1>) (α 2 0> + β 2 1>) (α n 0> + β n 1>) However, most states can t be written this way. We call such states entangled. α 00> + β 11> Measurements on such entangled states are correlated.

Quantum teleportation

Many implementations of q-bits have been proposed: Spins of electrons in quantum dots Polarization of photons ( flying Spins of nuclei in molecules qubits ) (molecules) Occupation level of an optical Spins of electrons floating over microcavity liquid helium Spins of impurity nuclei Electronic states of atoms or ions Dual-rail photon qubits in traps Ions in optical lattices Excitonic states of nanocrystals Collective spins of atom clusters All of these proposals have their own advantages (and disadvantages), and are being actively experimentally pursued.

Evolution of quantum systems Quantum states evolve in time according to the Schrödinger equation: which implies that time evolution is described by unitary (linear) transformations:

Quantum Circuits Quantum circuits are a way of representing unitary transformations as a composition of simple unitaries acting on one or two q-bits at a time. These simple unitaries, by analogy with classical logic gates like AND, OR and NOT, are called quantum gates.

Some Examples of Quantum Circuits

Quantum Algorithms With unitary gates (such as those described above), we can construct new algorithms that operate on fundamentally new principles. The most famous of these are Shor s Factoring Algorithm (Shor, 1994), which is O(L 3 ) in the length of the number to be factored; and Grover s Unstructured Search Algorithm (Grover, 1996), which is O(N 1/2 ) in the number of locations to be searched. Many problems with related structures have also been solved. All quantum algorithms involve producing superpositions of all possible values of a function, and using interference to reinforce the probability of desired solutions, while suppressing incorrect answers. Finding new algorithms is a very difficult open problem in the field.

This kind of evolution is simple in theory... This is a schematic picture of a quantum information experiment...

...but the reality can be messy...while this is a photo of an actual laboratory.

The DiVincenzo Criteria In order to function as a quantum computer, a physical system must satisfy a number of stringent requirements. These were summarized by David DiVincenzo of IBM in a highly influential 1996 paper. Existence of qubits (division into subsystems) One- and two-bit unitary gates Initializable into a standard starting state Measurable bits Low intrinsic decoherence

The Ion Trap

Solid State Quantum Dots

Magnetic Resonance Force Microscopy (MRFM) MRFM is an experimental technique for measuring the spin of a single electron on a solid surface.

Liquid-State NMR

Other models of quantum computation In cluster state quantum computing, the q-bits are prepared in a massive entangled state, and the computation is done by a sequence of one-bit measurements. In adiabatic quantum computing, the q-bits are prepared in the (known) ground state of a Hamiltonian, and the Hamiltonian is then slowly and continuously altered to become a new Hamiltonian, whose ground state represents the solution to a problem. Both of these are equivalent in power to the circuit model, but give new ways of looking for algorithms.

Quantum Walks Quantum walks are unitary analogues of classical random walks, in which a quantum system moves in a superposition of all directions! Interference can then reinforce the probability of arriving at a desired location, while reducing the probability to arrive at undesired locations. Many classical probabilistic algorithms are built around random walks (such as the algorithm for 3-SAT). It is hoped that quantum walks will lead to new, faster algorithms as well. At least one such algorithm has already been demonstrated, for element distinctness, with a polynomial speed-up over the best classical algorithm (Ambainis, 2004).

The Future Quantum computing technology will only continue to improve. At the moment we are at the dawn of the vacuum-tube era. It is impossible even to predict what technology will win out in the long term. This is still science--but it may become technology sooner than we expect. Theory also continues to advance. Various researchers are actively looking for new algorithms and communication protocols to exploit the properties of quantum systems. Quantum computers can also be used to efficiently simulate other quantum systems. Perhaps some day quantum computers will be used to design the next generation of classical computers.