C/CS/Phys C191 Amplitude Amplification, Quantum Zeno, Vaidman s bomb 11/10/09 Fall 2009 Lecture 22

Similar documents
C/CS/Phys C191 Grover s Quantum Search Algorithm 11/06/07 Fall 2007 Lecture 21

α x x 0 α x x f(x) α x x α x ( 1) f(x) x f(x) x f(x) α x = α x x 2

Quantum Measurements: some technical background

Ph 12b. Homework Assignment No. 3 Due: 5pm, Thursday, 28 January 2010

Philosophy of QM Eighth lecture, 23 February 2005

Ph 219b/CS 219b. Exercises Due: Wednesday 4 December 2013

Grover s Algorithm + Quantum Zeno Effect + Vaidman

1 Mach-Zehder Interferometer 1. 2 Elitzur-Vaidman Bombs 6

Compute the Fourier transform on the first register to get x {0,1} n x 0.

Quantum Gates, Circuits & Teleportation

b) (5 points) Give a simple quantum circuit that transforms the state

QUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2

Lecture 4: Elementary Quantum Algorithms

C/CS/Phy191 Problem Set 6 Solutions 3/23/05

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles

D.5 Quantum error correction

Quantum Computing Lecture 6. Quantum Search

The Stern-Gerlach experiment and spin

Quantum Searching. Robert-Jan Slager and Thomas Beuman. 24 november 2009

Similarities and Differences Between Two-Particle and Three-Particle Interference

The Elitzur-Vaidman Interaction-Free Measurements

Introduction to Quantum Computing

Delayed Choice Paradox

LECTURE NOTES ON QUANTUM COMPUTATION. Cornell University, Physics , CS 483; Spring, 2005 c 2006, N. David Mermin

Lecture 1: Introduction to Quantum Computing

Quantum Mechanics - I Prof. Dr. S. Lakshmi Bala Department of Physics Indian Institute of Technology, Madras. Lecture - 16 The Quantum Beam Splitter

1 Readings. 2 Unitary Operators. C/CS/Phys C191 Unitaries and Quantum Gates 9/22/09 Fall 2009 Lecture 8

Quantum Mechanics C (130C) Winter 2014 Final exam

1 Recall what is Spin

Quantum Information: Homework 2


6.896 Quantum Complexity Theory October 2, Lecture 9

Short introduction to Quantum Computing

Quantum algorithms for testing Boolean functions

IDLER DCC SIGNAL SHUTTER

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

1.1.1 Bell Inequality - Spin correlation

1 1D Schrödinger equation: Particle in an infinite box

Quantum Information Processing and Diagrams of States

An Improved Phase Error Tolerance in a Quantum Search Algorithm

Chapter 10. Quantum algorithms

Quantum Circuits and Algorithms

Lecture 10: Eigenvalue Estimation

Notes on x-ray scattering - M. Le Tacon, B. Keimer (06/2015)

Upper bounds for query complexity inspired by the Elitzur-Vaidman bomb tester

6.896 Quantum Complexity Theory September 18, Lecture 5

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

Quantum Computing: Foundations to Frontier Fall Lecture 3

Complex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where

Coins and Counterfactuals

Is Quantum Search Practical?

C/CS/Phys 191 Quantum Gates and Universality 9/22/05 Fall 2005 Lecture 8. a b b d. w. Therefore, U preserves norms and angles (up to sign).

Homework assignment 3: due Thursday, 10/26/2017

Introduction The Search Algorithm Grovers Algorithm References. Grovers Algorithm. Quantum Parallelism. Joseph Spring.

Bounds for Error Reduction with Few Quantum Queries

C/CS/Phys 191 Uncertainty principle, Spin Algebra 10/11/05 Fall 2005 Lecture 13

An improved phase error tolerance in quantum search algorithm

arxiv:quant-ph/ v1 15 Mar 2006

Introduction to Quantum Computing

arxiv: v3 [quant-ph] 9 Feb 2018

Hardy s Paradox. Chapter Introduction

Coherent states, beam splitters and photons

Superposition - World of Color and Hardness

The information content of a quantum

PH 425 Quantum Measurement and Spin Winter SPINS Lab 2

The Weird World of Quantum Mechanics

INTRIQ. Coherent Manipulation of single nuclear spin

Lecture 3: Superdense coding, quantum circuits, and partial measurements

Fourier Sampling & Simon s Algorithm

Review of the Formalism of Quantum Mechanics

PHY305: Notes on Entanglement and the Density Matrix

FIG. 16: A Mach Zehnder interferometer consists of two symmetric beam splitters BS1 and BS2

4. Two-level systems. 4.1 Generalities

1 1D Schrödinger equation: Particle in an infinite box

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT

1 Measurement and expectation values

SUPERDENSE CODING AND QUANTUM TELEPORTATION

Counterfactual quantum protocols

Simple scheme for efficient linear optics quantum gates

Quantum Error Correction and Fault Tolerance. Classical Repetition Code. Quantum Errors. Barriers to Quantum Error Correction

Introduction to Quantum Algorithms Part I: Quantum Gates and Simon s Algorithm

Algorithms for quantum computers. Andrew Childs Department of Combinatorics & Optimization and Institute for Quantum Computing University of Waterloo

ARTUR EKERT. z = z 1 + z 2

Entanglement and Quantum Teleportation

Single-photon quantum error rejection and correction with linear optics

Quantum Measurement and Bell s Theorem

Experimental quantum teleportation. Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger

Secrets of Quantum Information Science

A Wheeler-Feynman Electromagnetic Transaction

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

1 Algebra of State Vectors

1 Polarization of Light

arxiv: v1 [quant-ph] 11 Jul 2014

Chapter 2. Basic Principles of Quantum mechanics

Singlet State Correlations

PHYS 215C: Quantum Mechanics (Spring 2016) Problem Set 1 Solutions

Deleting a marked state in quantum database in a duality computing mode

Introduction to Quantum Computing

A Holevo-type bound for a Hilbert Schmidt distance measure

Quantum Mechanical Interaction-Free Measurements

Transcription:

C/CS/Phys C191 Amplitude Amplification, Quantum Zeno, Vaidman s bomb 11/10/09 Fall 2009 Lecture 22 1 Readings Kaye et al, Ch 83 Nielsen and Chuang: Ch 63-65 Grover s algorithm and amplitude amplification: quant-ph/9605043 Diffusion transform and other motivations from physics: Grover, quant-ph/0109116 Quantum bomb detection: Elitzur and Vaidman, Vistas in Astronomy 37, 253 (1993); Found of Physics 23, 987 (1993); Vaidman, Found of Physics 33, 491 (2003); Kwiat et al PRL 74, 4763 (1995); Rudolph and Grover, quant-ph/0206066 2 Amplitude amplification in Grover search The Diffusion operator D has two properties: 1 It is unitary and can be efficiently realized 2 It can be seen as an inversion about the mean We discussed the first property above We now analyze the second property For N = 2 n, we can explicitly evaluate D = I + 2 ψ 0 ψ0 = (H n ) [ I + 2 0 0 ]H n as: C/CS/Phys C191, Fall 2009, Lecture 22 1

D +1 0 0 0 1 0 = H N H N 0 0 1 +2 0 0 0 0 0 = H N I H N 0 0 0 +2 0 0 0 0 0 = H N H N I 0 0 0 +2/N +2/N +2/N +2/N +2/N +2/N = I +2/N +2/N +2/N +2/N 1 +2/N +2/N +2/N +2/N 1 +2/N = +2/N +2/N +2/N 1 The indexing here is such that the first state (top left hand corner of the matrices) is the target state a Recall that the central matrix in D is a conditional phase shift matrix, ie, it puts a phase shift in front of all states except the target Now for large N, the matrix D has diagonal elements approx equal to (1 2/N) and very small, positive and constant off-diagonal elements (2/N) So in each step the amplitude of every basis state contributes by a small amount to all other basis states This is a generalization of the phenomenon of diffusion on a lattice See the discussion of motivation and form of matrix D by Grover in his article quant-ph/0109116 Consider the action of D on a vector α to generate another vector β : D α 1 α i α N = β 1 β i β N C/CS/Phys C191, Fall 2009, Lecture 22 2

Figure 1: Inversion of amplitudes α i about their mean value µ Define µ = i α i /N as the mean amplitude Then β i = 2 N j α j α i = 2(µ α i ) = µ +(µ α i ) which corresponds to a reflection of α i about the mean value µ This is illustrated in Figure 1 above (note that if we start from the uniform superposition, the non-target states will have equal amplitude, we have just illustrated the principle for a general state here) Thus, the amplitude of β i = 2 N j α j α i = 2µ α i can be considered an inversion about the mean with respect to α i Now if we first change the sign of the amplitude of the target state, by applying the oracle as in the previous lecture, the target state is now significantly further away from the mean The inversion about the mean further amplifies this, as shown in Figure 2 below This shows how quantum search algorithm iteratively improves the probability of measuring a solution by increasing the component of the target state at each iteration The overall procedure is summarized as follows (see Figure 3 below): 1 Start state is ψ 0 = x 1 N x 2 Invert the phase of a using f 3 Then invert about the mean using D 4 Repeat steps 2 and 3 O( N) times, so in each iteration α a increases by 2 N Suppose we just want to find a with probability 1 2 Until this point, the rest of the basis vectors will have 1 amplitude at least 2 2N In each iteration of the algorithm, α a increases by at least 2 2N = N Eventually, α a = 1 2 The number of iterations to get to this α a is N C/CS/Phys C191, Fall 2009, Lecture 22 3

Figure 2: Application of oracle to invert sign of target state followed by inversion of amplitudes α i about their mean value µ gives rise to amplification of the target component C/CS/Phys C191, Fall 2009, Lecture 22 4

Figure 3: The first three steps of Grover s algorithm We start with a uniform superposition of all basis vectors in the top panel In the middle panel we have used the function f to invert the phase of α k After running the diffusion operator D in the bottom panel, we have amplified α k while decreasing all other amplitudes C/CS/Phys C191, Fall 2009, Lecture 22 5

21 Applications of quantum search Grover s algorithm is often called a database search algorithm, where you can query in superposition Requirements for this are discussed in Nielsen and Chuang, Ch 6/5 and discussed in Zalka, quant-ph/9901068 Other things you can do with a similar approach: 1 Find the minimum 2 Approximately count elements, or generate random ones Kaye et al, Ch 83, Nielsen/Chuang Ch 63 3 Speed up the collision problem 4 Speed up the test for matrix multiplication In this problem we are given three matrices, A, B, and C, and are told that the product of the first two equals the third We wish to verify that this is indeed true An efficient (randomized) way of doing this is picking a random array r, and checking to see whether Cr = ABr = A(Br) Classically, we can do the check in O(n 2 ) time, but using a similar approach to Grover s algorithm we can speed it up to O(n 175 ) time 5 Speedup exhaustive search in NP-complete problems, although this alone is not enough to provide efficient solution See Ambainis, quant-ph/0504012 for a review of applications to NP-complete problems, and also an example in Nielsen/Chuang Ch 64 3 Quantum bomb detection To illustrate some of the concepts behind Grover s algorithm, we can consider a problem known as Vaidman s bomb In this problem, we have a package that may or may not contain a bomb However, the bomb is so sensitive that simply looking to see if the bomb exists will cause it to explode So, can we determine whether the package contains a bomb without setting it off? Paradoxically, quantum mechanics says that we can This is achieved by combining a technique referred to in the physics literature as interaction free measurement, which relies on interferometry, with amplitude amplfication By making an iterative amplitude amplification, we can arrive at a sequence of N cycles of single qubit operations such that if the package contains a bomb, we will look (ie, interact with it and blow up) with probability only 1/N, while the rest of the time we have two distinct outcomes for the qubit state which tell us whether or not the bomb is present 31 The Quantum Zeno Effect We will make use of a phenomenon known as the Quantum Zeno Effect (also referred to as the watched pot or the watchdog effect, or the hare and tortoise syndrome ) Consider a quantum state consisting of a single qubit This qubit starts at 0, and at every step we will rotate it toward by θ = π/2n After one rotation, we have φ = α 0 + β, where where β = sinθ 1/N After 2 steps, we have φ = cos(2θ) 0 + sin(2θ), etc so that after N steps we have φ = cos(nθ) 0 + sin(nθ) Now since β = sinθ 1/N, then this final state after N steps will be 1, or very close to this, so that any measurement will then return with high probability Now what if we decide to measure the state after each rotation? After the first rotation, we will measure 0 with high probability, but this measurement collapses the state back to 0 Thus, each measurement has a high probability of yielding 0 ; the probability of getting by the end is approximately N 1 N 2 = 1 N, as opposed to the extremely high probability in the previous case C/CS/Phys C191, Fall 2009, Lecture 22 6

Figure 4: Interaction free detection of a single bomb Essentially, the Quantum Zeno Effect says that if we have a quantum state that is in transition toward a different state, making frequent measurements can delay that transition by repeatedly collapsing the qubit back to its original state This is another kind of amplitude amplification - in Grover s algorithm our amplification was unitary, but this is not 32 Looking for the Bomb To determine whether Vaidman s bomb exists without actually looking at it, we want to take advantage of the Quantum Zeno Effect Figure 4 shows a scheme for the interaction free detection with photonic qubits, labelled by their polarization states 0 H and 1 V (taken from Rudolph and Grover, quantph/00206066) Let us follow the action of this circuit The initial input is 0, which is then rotated by the lens (denoted θ) to the state cos θ 0 + sinθ, with θ = π/2n and N large so that sinθ π/2n This state is then input into a beam splitter (for spin qubits, a Stern-Gerlach magnet would be used) which sends 0 along the lower path and along the upper path These two paths are completely independent and can go, for instance, through different rooms in a building Our protocol will be set up to establish whether there is or is not a bomb in the upper path - so one will always use the apparatus in a configuration that the upper path traverses the suspect region and the lower path goes through a known safe (no bomb) region First, suppose that there is no bomb present Then the second beamsplitter combines the amplitudes from the two paths coherently and the final state is cosθ 0 + sinθ If we send this back to the lens and rotate by θ again, then input into the beam splitter, etc we get the final state cos 2θ 0 + sin2θ So repeating the cycle N times will give the final state 1 as described above So if there is no bomb and we cycle N times before measuring the qubit, we will find 1 to certainty or a very high probability Now, suppose that there is a bomb present on the upper path Then in the first cycle there are two possible outcomes With probability sin 2 θ the qubit passes the bomb and causes an explosion With probability cos 2 θ the qubit goes through the lower path, does not see the bomb, and emerges as 0 Thus the presence of the bomb is like a quantum tortoise, which forces a quantum Zeno effect - but note that in this inter- C/CS/Phys C191, Fall 2009, Lecture 22 7

ferometric situation the bomb does not need to actually be measured hence the name interaction free measurement Now the probability that the qubit emerges unscathed as 0 from the second cycle is then cos 2 θ cos 2 θ, while the probability that the bomb explodes on the second cycle if cos 2 θsin 2 θ You can thus see how to continue this to get the distribution of probabilities for all possible results after N cycles: the probability for no explosion in any cycle is cos 2N θ and the qubit emerges as 0, and the probability for having the bomb explode in any one cycle between 1 and N is 1 cos 2N θ In the latter case there is no qubit So we have three possible outcomes after making N cycles with our single qubit starting as 0 : 1 no bomb: final state is 1 with (near) certainty 2 bomb present: no explosion, final state is 0 with probability cos 2N θ 3 bomb present: explosion happened, no final state, probability 1 cos 2N θ What are these probabilities? For θ = π/2n and N large, we have cos 2N θ 1 π 2 /4N 1 and 1 cos 2N θ π 2 /4N So we have very effectively reduced the probability of exploding the bomb to 1/N by this combination of quantum Zeno and cycling with a qubit interferometer The approach can also be modified to the particularly unfortunate case where we have N packages, N 1 of which contain bombs We want to find the one package that does not contain a bomb, though we don t mind setting off a few of the bombs in the process This can be done by a modification of the above interferometric scheme, as described in quant-ph/0206066 Note that here the amplitude amplification occurs by the implicit (deferred) measurement in the interferometer In contrast, in Grover s algorithm the amplitude of one target basis vector is amplified while all others are constantly diminished or reset in a unitary manner One important thing that the N bomb example illustrates about quantum search is that it s highly counterintuitive to be able to search in N steps By querying in superposition, we manage to search using fewer steps than there are locations to search! But note, one needs the hardware to be able to query in superposition C/CS/Phys C191, Fall 2009, Lecture 22 8