Quantum Information Processing

Similar documents
Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Secrets of Quantum Information Science

A central problem in cryptography: the key distribution problem.

10 - February, 2010 Jordan Myronuk

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles

INTRODUCTION TO QUANTUM COMPUTING

EPR paradox, Bell inequality, etc.

Quantum Cryptography

Introduction to Quantum Computing for Folks

QUANTUM TECHNOLOGIES: THE SECOND QUANTUM REVOLUTION* Jonathan P. Dowling

Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií

Quantum Information Transfer and Processing Miloslav Dušek

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1

Bell s inequalities and their uses

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation

Lecture 4. QUANTUM MECHANICS FOR MULTIPLE QUBIT SYSTEMS

*WILEY- Quantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co.

The Relativistic Quantum World

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

Problem Set: TT Quantum Information

AP/P387 Note2 Single- and entangled-photon sources

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

D. Bouwmeester et. al. Nature (1997) Joep Jongen. 21th june 2007

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Quantum Computing. Joachim Stolze and Dieter Suter. A Short Course from Theory to Experiment. WILEY-VCH Verlag GmbH & Co. KGaA

Quantum Optics. Manipulation of «simple» quantum systems

Entanglement and information

An Introduction to Quantum Computing for Non-Physicists

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

arxiv:quant-ph/ v2 19 Jan 2000

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Introduction to Quantum Computation

Introduction to Quantum Computing

Quantum Computing. Quantum Computing. Sushain Cherivirala. Bits and Qubits

1 1D Schrödinger equation: Particle in an infinite box

Introduction to Quantum Cryptography

QUANTUM CRYPTOGRAPHY QUANTUM COMPUTING. Philippe Grangier, Institut d'optique, Orsay. from basic principles to practical realizations.

Ping Pong Protocol & Auto-compensation

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Quantum Cryptography

Measuring Quantum Teleportation. Team 10: Pranav Rao, Minhui Zhu, Marcus Rosales, Marc Robbins, Shawn Rosofsky

A single quantum cannot be teleported

Bose-Einstein condensates (Fock states): classical or quantum?

The Reality of Quantum Computing

Post Von Neumann Computing

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

INTRODUCTORY NOTES ON QUANTUM COMPUTATION

Basics on quantum information

Quantum Information Processing

Quantum Information Science (QIS)

Cryptography in a quantum world

Introduction to Quantum Key Distribution

1 1D Schrödinger equation: Particle in an infinite box

QUANTUM TECHNOLOGIES: THE SECOND QUANTUM REVOLUTION* Jonathan P. Dowling

6.2 Introduction to quantum information processing

Quantum Computing. Thorsten Altenkirch

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Secrecy and the Quantum

Basics on quantum information

Quantum computation with trapped ions

P 3/2 P 1/2 F = -1.5 F S 1/2. n=3. n=3. n=0. optical dipole force is state dependent. n=0

Security Implications of Quantum Technologies

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Seminar 1. Introduction to Quantum Computing

Lecture 32: The Periodic Table

QUANTUM ENTANGLEMENT, ITS NATURE AND MANIFESTATIONS. Peter Kohut Maly Saris 478, Presov, Slovakia

Quantum Money, Teleportation and Computation. Steven Girvin Yale University

Bose Einstein Condensation

Quantum Dense Coding and Quantum Teleportation

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Introduction. An Introduction to Quantum Computation and Quantum Communication. Why would we care? What approximation do we remove?

Quantum technology popular science description

PHYS598 AQG Introduction to the course

Quantum Optics and Quantum Informatics 7.5hp (FKA173) Introductory Lecture

Quantum Communication. Serge Massar Université Libre de Bruxelles

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

A Superluminal communication solution based on Four-photon entanglement

10.2 Introduction to quantum information processing

Experimental Quantum Computing: A technology overview

Quantum Computing. Separating the 'hope' from the 'hype' Suzanne Gildert (D-Wave Systems, Inc) 4th September :00am PST, Teleplace

Quantum Computing Professor Andrew M. Steane Oxford University

Quantum information and quantum computing

Quantum computing and quantum communication with atoms. 1 Introduction. 2 Universal Quantum Simulator with Cold Atoms in Optical Lattices

A Matlab Realization of Shor s Quantum Factoring Algorithm

Let's Build a Quantum Computer!

A trip to Quantum Physics

Quantum Cryptography

Chapter 10. Superconducting Quantum Circuits

Locality NIMS. The Principle of. Made Simpler but Harder. Man-Duen Choi.

Modern Physics notes Spring 2007 Paul Fendley Lecture 27

Entanglement and Quantum Teleportation

Experimental quantum teleportation. Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger

Quantum Computation with Neutral Atoms Lectures 14-15

Using Quantum Effects for Computer Security

10.2 Introduction to quantum information processing

Quantum Computers. Peter Shor MIT

What are we going to talk about: BEC and Nonlinear Atom Optics

Transcription:

Quantum Information Processing Jonathan Jones http://nmr.physics.ox.ac.uk/teaching

The Information Age Communication Shannon Computation Turing Current approaches are essentially classical which is wrong because Nature isn t classical dammit! (Feynman)

Classical Information Classical information is made up of bits, which can be in either of two states, 0 and 1 Bits can (in principle) be measured perfectly Bits can be measured without disturbance Bits can be copied without restriction Local manipulations cannot affect other distant bits

Qubits Bits can be mapped to the eigenstates 0 and 1 of a two state quantum system (a qubit) If a qubit is confined to its eigenstates then it behaves much like a classical bit But qubits are not confined to eigenstates: they can exist in superpositions of these states opening up entirely new forms of information processing!

Quantum Information Qubits can be superpositions of two different states at the same time Qubits cannot be measured perfectly Qubits cannot be measured without disturbance Qubits cannot be copied Local manipulations on one qubit can affect other distant qubits

Quantum technologies Quantum Communication: quantum dense coding, quantum cryptography, quantum teleportation (Hilary) Quantum Computing: surpassing the classical limits (Trinity) Quantum Mechanics: insights into the foundations of quantum theory

Qubits & quantum registers Classical Bit Quantum Bit 0 or 1 0 or 1 or 0 1 Classical register Quantum register 101 000 001 010 011 100 101 110 111

Quantum parallel processing 000 001 010 011 100 101 110 111 Quantum F (x) Processor F(000) F(001) F(010) F(011) F(100) F(101) F(110) F(111) INPUT Quantum logic gates OUTPUT

Exponential power Qubits 1 2 4 8 16 32 64 128 Computations 2 4 16 256 65536 4.29 10 9 1.84 10 19 3.40 10 38

Power of quantum computing A quantum computer with 400 qubits could in principle perform more calculations in one step than could have been performed by a classical computer made from the entire visible universe In practice you need to use extra qubits to make the calculations work properly» A quantum computer with 4000 qubits could easily outperform any conceivable classical computer» These speed gains are only achievable for some calculations

Getting the answer out Quantum computers could perform vast numbers of computations in parallel But we can t access all that power directly! At the end of the day we can only read out a single result Quantum algorithms are all about extracting small pieces of useful information which are hard to compute in other ways

What could we do with one? Simulate quantum mechanics in complex systems: from astrophysics to zoology Factorise big numbers with Shor s algorithm: the end of classical cryptography? Speed up searches: Grover s algorithm Quantum computing is not the answer to everything

How might we build one? To build a quantum computer you need Quantum objects (to act as qubits), Interacting strongly with one another (to build logic gates), Isolated from the environment (stable), but Accessible from the outside world for input, output and control Small quantum computers (2 7 qubits) already exist!

Shift Drop Technologies Lift 000 001 010 011 Quantum computer 100 011 110 011 optical lattices NMR cavity QED superconductors quantum dots ion traps

ARDA Roadmap 2004

NMR experiments

Trapped atom/ion methods 1. quantum memory: single atoms 3. two qubit gate 0i 1i qubit in long lived internal states 2. single qubit gate Concepts:» controlled interactions based on the Coulomb force between ions» use a collective mode as data bus (ion traps) laser addressing a single qubit 0i 1i laser V(R) qubits

Ion experiments

The NIST trap small trap electrode dimensions pros: -tight confinement -better for scaling up cons: - surface quality essential impurities lead to ion heating

Bose-Einstein condensates trap ultra cold atoms Nobel prize 2001: Cornell, Ketterle and Wieman Bose Einstein condensate (BEC): A macroscopic number of particles occupy the same one particle state, i.e.,t 0 Source of ultra cold atoms Quantum control over these atoms

Cold neutral atoms laser laser optical lattice as micro trap array (egg box for atoms!)

laser laser Theory: Innsbruck Experiment: München, NIST deeper trap The atoms repel each other and do not want to occupy the same site random filling after loading with a BEC Regular filling by increasing the interaction in a deep trap

Munich: I. Bloch, T. Haensch et al.

The EPR paradox Generate a pair of spin-1/2 particles in a singlet state (no total angular momentum)» Generate a pair of photons by parametric down conversion Measure the spin of each particle along some randomly chosen basis» If the measurement bases are the same for the two particles then the measurement results will be perfectly anti-correlated

Bell & Aspect Bell analysed this problem and showed that the predictions of quantum mechanics were inconsistent with any local realistic model Aspect et al. have performed a range of experiments which show that reality appears to agree with quantum mechanics» Nuts to Einstein, Podolsky & Rosen! Effects used in quantum communication

EPR cryptography 1 Alice generates many EPR pairs and sends one half of each pair to Bob Alice and Bob measure their own particles along randomly chosen bases Alice and Bob announce the bases they used (but not the results they got) For those measurements where they used the same basis they know each others result!

EPR cryptography 2 Alice and Bob can use their own local results to create a random number which can be used as a cryptography key Because they built this number using EPR correlations they both have the same number Because they never announced any of their results, nobody else can know it A shared secret!

EPR cryptography 3 What s to stop an eavesdropper (Eve) from intercepting the particles which Alice sent to Bob? If Eve doesn t measure the particles she doesn t learn anything If Eve does measure the particles she irreparably alters their state Alice and Bob can always detect this

Photon experiments

Photon experiments

An ideal gift

Summary Quantum mechanics gives an entirely new way of looking at information (technologies) Quantum computers could transform much of science» Assuming we ever manage to build them Quantum cryptography for ultimate security» Commercially available! Lots of lovely physics!