Quantum Information. and Communication

Similar documents
Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

LECTURE NOTES ON Quantum Cryptography

10 - February, 2010 Jordan Myronuk

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Quantum Cryptography. Marshall Roth March 9, 2007

CIS 6930/4930 Computer and Network Security. Topic 5.2 Public Key Cryptography

QUANTUM ENTANGLEMENT AND ITS ASPECTS. Dileep Dhakal Masters of Science in Nanomolecular Sciences

Quantum Cryptography

Ping Pong Protocol & Auto-compensation

Security Implications of Quantum Technologies

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

1 1D Schrödinger equation: Particle in an infinite box

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

Secrets of Quantum Information Science

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Applications of Quantum Key Distribution (QKD)

1 1D Schrödinger equation: Particle in an infinite box

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Double slit questions

Quantum threat...and quantum solutions

Notes for Lecture 17

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Lecture 19: Public-key Cryptography (Diffie-Hellman Key Exchange & ElGamal Encryption) Public-key Cryptography

Introduction to Quantum Cryptography

Introduction to Quantum Computing

Discrete Mathematics GCD, LCM, RSA Algorithm

A Matlab Realization of Shor s Quantum Factoring Algorithm

CHAPTER 12 CRYPTOGRAPHY OF A GRAY LEVEL IMAGE USING A MODIFIED HILL CIPHER

Quantum Mechanics: Interpretation and Philosophy

9 Knapsack Cryptography

Deterministic secure communications using two-mode squeezed states

Ma/CS 6a Class 3: The RSA Algorithm

2 Quantum Mechanics. 2.1 The Strange Lives of Electrons

C. QUANTUM INFORMATION 111

during transmission safeguard information Cryptography: used to CRYPTOGRAPHY BACKGROUND OF THE MATHEMATICAL

Univ.-Prof. Dr. rer. nat. Rudolf Mathar. Written Examination. Cryptography. Tuesday, August 29, 2017, 01:30 p.m.

L7. Diffie-Hellman (Key Exchange) Protocol. Rocky K. C. Chang, 5 March 2015

Definition: For a positive integer n, if 0<a<n and gcd(a,n)=1, a is relatively prime to n. Ahmet Burak Can Hacettepe University

No Fine theorem for macroscopic realism

Cryptosystem. Traditional Cryptosystems: The two parties agree on a secret (one to one) function f. To send a message M, thesendersendsthemessage

No Fine Theorem for Macrorealism

10. Physics from Quantum Information. I. The Clifton-Bub-Halvorson (CBH) Theorem.

Final Exam Math 105: Topics in Mathematics Cryptology, the Science of Secret Writing Rhodes College Tuesday, 30 April :30 11:00 a.m.

RSA-256bit 數位電路實驗 TA: 吳柏辰. Author: Trumen

Philosophy of QM Eighth lecture, 23 February 2005

Particle-Wave Duality and Which-Way Information

Cosc 412: Cryptography and complexity Lecture 7 (22/8/2018) Knapsacks and attacks

Quantum Information Transfer and Processing Miloslav Dušek

Lecture 5: Arithmetic Modulo m, Primes and Greatest Common Divisors Lecturer: Lale Özkahya

Introduction to Modern Cryptography. Benny Chor

Chapter 8 Public-key Cryptography and Digital Signatures

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Lecture Notes 15 : Voting, Homomorphic Encryption

Other Topics in Quantum Information

Schemes to generate entangled photon pairs via spontaneous parametric down conversion

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Basics on quantum information

Identical Particles in Quantum Mechanics

Using Quantum Effects for Computer Security

Quantum cryptography -the final battle?

Testing Heisenberg s Uncertainty Principle with Polarized Single Photons

MITOCW watch?v=0usje5vtiks

Multiparty Computation

8 Elliptic Curve Cryptography

THE DELAYED CHOICE QUANTUM EXPERIMENT

Week 11: April 9, The Enigma of Measurement: Detecting the Quantum World

and their applications Andrea Fiore Photonics and Semiconductor Nanophysics Department t of Applied Physics

Public Key 9/17/2018. Symmetric Cryptography Review. Symmetric Cryptography: Shortcomings (1) Symmetric Cryptography: Analogy

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

QUANTUM CRYPTOGRAPHY. BCS, Plymouth University, December 1, Professor Kurt Langfeld Centre for Mathematical Sciences, Plymouth University

Public-Key Cryptography. Lecture 9 Public-Key Encryption Diffie-Hellman Key-Exchange

Ground-Satellite QKD Through Free Space. Steven Taylor

University of Tokyo: Advanced Algorithms Summer Lecture 6 27 May. Let s keep in mind definitions from the previous lecture:

Introduction to Modern Cryptography. Lecture RSA Public Key CryptoSystem 2. One way Trapdoor Functions

Carmen s Core Concepts (Math 135)

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Entanglement and Quantum Teleportation

Interference Between Distinguishable States. Thomas Alexander Meyer

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Lecture 11: Key Agreement

The Relativistic Quantum World

Quantum entanglement and macroscopic quantum superpositions

Basics on quantum information

Experiment O-2. The Michelson Interferometer

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií

C. QUANTUM INFORMATION 99

Intrinsic-Stabilization Uni-Directional Quantum Key Distribution. Between Beijing and Tianjin

Chapter 1. Quantum interference 1.1 Single photon interference

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

Number Theory & Modern Cryptography

Device-Independent Quantum Information Processing

An Introduction. Dr Nick Papanikolaou. Seminar on The Future of Cryptography The British Computer Society 17 September 2009

Quantum computing for beginners

Quantum information processing. Two become one

Transcription:

Quantum Information 2015.7.22 and Communication quantum mechanics uncertainty principle wave function superposition state information/communication cryptography signal processing Quantum Information/Communication quantum cryptography quantum computation

Quantum mechanical superposition state - Schrödinger s cat -? or determined Q: What is the cat s state in the box? A1:The cat is either alive or dead. It is determinative though not observed A2:The cat may be alive and dead. We do not know which, thus it can be alive and dead. Both is possible. classical quantum

Quantum mechanics employs A2; the cat in the box is alive and dead. Quantum mechanical superposition state A superposition state is mathematically expressed as: alive (cat in the box)= a + b dead Parameters a and b are coefficients representing the probabilities. When the box is opened, the cat state is instantly determined to be dead or alive. a + b opening = observation or

To be a superposition state, whether dead or alive is unknown in principle. with a timer (The cat necessarily dies when the time comes) Dead or alive is known in principle, even when the box is sealed. before the set time after the set time not superposition state

by the way Anything is composed of minimum units that cannot be further divided. A material is composed of nuclei and electrons electron nucleus Light energy is composed of photons attenuator detector signal Detection signal is discrete photon time

Superposition state of a photon Ex.1) A beam-split photon half mirror attenuation Ex.2)A photon split and recombined output photon=a (transmitted photon) +b (reflected photon) output photon=a (photon@{a, fast}) +b (photon@{b, slow}) attenuation half mirror B A +c (photon@{a, fast}) +d (photon@{b, slow})

Coefficients in superposition are regarded as wave Ex.3)A photon split and recombined (2) B The output state should be different from that in Ex.2. glass plate A output photon=a (photon@{a, fast}) +b (photon@{b, fast}) +c (photon@{a, slow}) +d (photon@{b, slow}) change due to the glass plate Here are postulates; - A coefficient has a fine structure like wave. The change due to the glass plate is expressed by a shift in the wave-like structure - The probability is given by its height. The probability is the same for c and c. c c prob.

Coefficients in superposition behave like wave Ex.3)A photon split and recombined (2) L1 L2 indistinguishable B A output photon @A = c 1 (photon via L1) + c 2 (photon via L2) = (c 1 + c 2 ) (photon@a) c 1 c 2 +

Total of coefficients depends on relative undulation + + ==enhanced canceled

photon probability @A thickness of glass plate interference fringe attenuation A B The coefficient of photon via A and that via B are recombined on the screen.

Which slit a photon passes through must be unknown for interference to occur A photon@slit=a (photon@a) + b (photon@b) B observation A B photon@slit= (photon@a) or (photon@b)

Applications to information/communication technologies Utilizing superposition states for cryptography Quantum cryptography (quantum key distribution) Utilizing superposition states for computation Quantum computer

Quantum cryptography Alice Bob encrypt decrypt

present cryptosystem Public key cryptosystem Alice Bob encrypting key (public) decrypting key (closed) public key 367 521 =? :easy(answer is191207 )?? = 191207 :difficult Deciphering is possible in principle

Secret key cryptosystem Alice Bob secret key (random bit sequence) secret key (random bit sequence) Quantum key distribution system (providing secure keys) Quantum Cryptography (Quantum Key Distribution) purpose To provide secret keys to distant parties selling point The security of the keys is guaranteed by quantum mechanics

Quantum Cryptography (Quantum Key Distribution) Cryptosystem utilizing quantum superposition states normal condition superposition state correct signal Key data are transmitted utilizing interference of a photon. eavesdropping?! state change due to observation Eavesdropping is revealed from the state change

Configuration of QKD system (example) Superposition states on temporal position are transmitted light source Alice modulator attenuation Bob detector B detector A long path short path time A photon is detected by detector A or B, according to the relative undulation of coefficients

Quantum Computing -computing utilizing superposition states- Plural data are simultaneously expressed by a superposition state Ultra parallel processing utilizing quantum interference

Quantum Bit photon s polarization state a (horizontal state) + b (vertical state) electron s spin state - Fundamental element for quantum processinga (up-spin) + b (down-spin) atom s energy state a (upper state) + b (lower state) E 2 superconducting current state a (right direction) + b (left direction) E 1

Plural data are simultaneously expressed by a superposition Two quantum bits a b 1 2 3 4 a b a b a b a b Each Q bit is a superposition of and, thus the whole state is; > = c 1 > + c 2 > + c 3 > + c 4 > a b a b a b a b a b = c 1 1 + c 2 2 + c 3 3 + c 4 4 4 digits are expressed N quantum bits 2 n digits can be simultaneously expressed

Parallel processing utilizing a superposition Problem: To find x satisfying the following equation f(x)=c classical way ex) prime decomposition 367 521 = 191207 191207 = x y quantum way x 1 x 2 x 3 x n φ> = x 1 > + x 2 > + x 3 > + + x n > f(x 1 ) f(x 2 ) f(x 3 ) f(x n ) U φ> = U x 1 > + U x 2 > + U x 3 > + + U x n > a b c z φ out > = 0 x 1 > + 0 x 2 > + 1 x 3 > + + 0 x n > Examining all candidates one by one Conducting one operation

Image of parallel processing Simultaneous operation based on interference prepared state 1 mod N m 1 mod N m 2 1 mod N m q -1 mod N interference

Unfortunately, implementation is quit difficult Quantum bits are very fragile. They easily collapse due to disturbances. 2 準位系 E 2 E 1

quantum mechanics uncertainty principle wave function superposition state information/communication cryptography signal processing Quantum Information/Communication quantum cryptography quantum computation