Quantum computing. Jan Černý, FIT, Czech Technical University in Prague. České vysoké učení technické v Praze. Fakulta informačních technologií

Similar documents
Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

10 - February, 2010 Jordan Myronuk

Quantum Information Processing and Diagrams of States

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Entanglement and Quantum Teleportation

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

The Future. Currently state of the art chips have gates of length 35 nanometers.

Markovské řetězce se spojitým parametrem

Secrets of Quantum Information Science

Quantum Communication. Serge Massar Université Libre de Bruxelles

Quantum Information Processing

Some Introductory Notes on Quantum Computing

Security Implications of Quantum Technologies

Bootstrap metody II Kernelové Odhady Hustot

Quantum Computation 650 Spring 2009 Lectures The World of Quantum Information. Quantum Information: fundamental principles

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

Základy teorie front II

EPR paradox, Bell inequality, etc.

Example: sending one bit of information across noisy channel. Effects of the noise: flip the bit with probability p.

quantum mechanics is a hugely successful theory... QSIT08.V01 Page 1

1.0 Introduction to Quantum Systems for Information Technology 1.1 Motivation

1 1D Schrödinger equation: Particle in an infinite box

An Introduction to Quantum Information and Applications

1 1D Schrödinger equation: Particle in an infinite box

Short introduction to Quantum Computing

Computational intelligence methods

Quantum Computer Architecture

Introduction to Quantum Computing for Folks

Cryptography in a quantum world

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Quantum Computing. Quantum Computing. Sushain Cherivirala. Bits and Qubits

QUANTUM CRYPTOGRAPHY QUANTUM COMPUTING. Philippe Grangier, Institut d'optique, Orsay. from basic principles to practical realizations.

Computational Intelligence Methods

LECTURE NOTES ON Quantum Cryptography

The Relativistic Quantum World

Quantum Computing. Richard Jozsa Centre for Quantum Information and Foundations DAMTP University of Cambridge

Week 11: April 9, The Enigma of Measurement: Detecting the Quantum World

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Introduction to Quantum Computing

Hacking Quantum Cryptography. Marina von Steinkirch ~ Yelp Security

Promise of Quantum Computation

Quantum Technology 101: Overview of Quantum Computing and Quantum Cybersecurity

Compute the Fourier transform on the first register to get x {0,1} n x 0.

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Quantum Communication

Quantum Communication Complexity

Using Quantum Effects for Computer Security

Quantum Gates, Circuits & Teleportation

Quantum Circuits and Algorithms

Problem Set: TT Quantum Information

A central problem in cryptography: the key distribution problem.

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

The Reality of Quantum Computing

Concepts and Algorithms of Scientific and Visual Computing Advanced Computation Models. CS448J, Autumn 2015, Stanford University Dominik L.

INTRODUCTION TO QUANTUM COMPUTING

Introduction. An Introduction to Quantum Computation and Quantum Communication. Why would we care? What approximation do we remove?

Základy teorie front

Quantum Computing: Foundations to Frontier Fall Lecture 3

Quantum Computing 101. ( Everything you wanted to know about quantum computers but were afraid to ask. )

Experimental quantum teleportation. Dirk Bouwmeester, Jian Wei Pan, Klaus Mattle, Manfred Eibl, Harald Weinfurter & Anton Zeilinger

Introduction The Search Algorithm Grovers Algorithm References. Grovers Algorithm. Quantum Parallelism. Joseph Spring.

Quantum sampling of mixed states

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

5. Communication resources

1.1 The Boolean Bit. Note some important things about information, some of which are illustrated in this example:

phys4.20 Page 1 - the ac Josephson effect relates the voltage V across a Junction to the temporal change of the phase difference

Information quantique, calcul quantique :

Quantum Computing. Thorsten Altenkirch

The information content of a quantum

Quantum Computing Professor Andrew M. Steane Oxford University

QUANTUM ENTANGLEMENT AND ITS ASPECTS. Dileep Dhakal Masters of Science in Nanomolecular Sciences

D. Bouwmeester et. al. Nature (1997) Joep Jongen. 21th june 2007

Secrecy and the Quantum

The Three Upcoming Revolutions in Physics and Astronomy that will Affect Everyone. Quantum Information Nov. 12, 2002

Quantum Information Transfer and Processing Miloslav Dušek

Quantum Wireless Sensor Networks

Quantum Information & Quantum Computation

INTRODUCTORY NOTES ON QUANTUM COMPUTATION

Adiabatic quantum computation a tutorial for computer scientists

Quantum Computation and Communication

QUANTUM COMPUTING & CRYPTO: HYPE VS. REALITY ABHISHEK PARAKH UNIVERSITY OF NEBRASKA AT OMAHA

Lecture 11 September 30, 2015

Bits. Chapter 1. Information can be learned through observation, experiment, or measurement.

Quantum Information Types

Seminar 1. Introduction to Quantum Computing

Linear-optical quantum information processing: A few experiments

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Introduction to Quantum Cryptography

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

Statistika pro informatiku

Challenges in Quantum Information Science. Umesh V. Vazirani U. C. Berkeley

C. QUANTUM INFORMATION 99

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

Quantum Mechanics C (130C) Winter 2014 Final exam

Quantum Computers. Peter Shor MIT

6.896 Quantum Complexity Theory September 9, Lecture 2

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Semiconductors: Applications in spintronics and quantum computation. Tatiana G. Rappoport Advanced Summer School Cinvestav 2005

Transcription:

České vysoké učení technické v Praze Fakulta informačních technologií Katedra teoretické informatiky Evropský sociální fond Praha & EU: Investujeme do vaší budoucnosti MI-MVI Methods of Computational Intelligence(2010/2011) Quantum computing Jan Černý, FIT, Czech Technical University in Prague 1

Quantum mechanics Describes 3 of the main interactions (Electromagnetic, Strong and Weak nuclear) in the micro-world. Gravity does not play role in the standard cases in micro-world (for example Elecromagneticinteraction is 10 36 stronger). Border between micro and macro world is not a static boundary, but depends on interactions between given object and surroundings. If there is no interaction (no light, no heat emitted, no particles in the surrounding air) object will behave according to quantum mechanics. Theoretically you can put human into vacuum, cool him to absolute zero and he will start behaving as a wave of light. Largest object so-far showing quantum behavior had tens of carbon atoms. 2

Differences of micro-world Discrete values of some variables (energy, momentum..) Wave-particle dualism (objects may behave as particle in some situations and as wave in other situations) Born rule: wave intensity = particle probability Act of measurement affects measured object (ie. state of object changes after measurement) Uncertainty principle (more precisely we measure one dynamic variable, the less precision we get measuring the other one) Complementarity of variables Non-determinism (Two exactly same experiments may end up differently quantum mechanics can tell us probabilities of an outcome, but can t tell us what the outcome will be) 3

QM in informatics - Quantum tunneling Situation when particle tunnels through barrier that should normally be impenetrable. With minimizing our electronics we see this behavior more and more often and it stands as a limit to minimize things even further without accounting for quantum mechanics. 4

Quantum tunneling Flash memory Erasing a flash-memory cell (resetting to a logical 1) is achieved by applying a voltage across the source and control gate. Electrons are pulled by quantum tunneling through the barrier of the Si0 2 insulator layer surrounding the floating gate. 5

Qubit Is unit of quantum information derived from standard bit. It contains not only 2 logical values of single bit, but also all superpositions of these 2 states. ψ = a 0 + b 1 Quantum state a and b are complex numbers which meets the equation: a 2 + b 2 = 1 Measuring a qubit will give us always 0 or 1, but at probabilities determined by a and b. Probability of measuring 0 is a 2 and probability measuring 1 is b 2 6

Update rules No measurement update rule When there is no measurement on the system, the state changes in a definite way that maintains any superposition (no randomness involved) Measurement update rule When there is a measurement on the system, the result determines the new state. The state is updated randomly depending on the outcome of the measurement. 7

Quantum entanglement Entangled objects cannot be fully described without considering the other(s). They remain in a quantum superposition and share a single quantum state. Measuring one particle determines value of the other particle. For example: We have total spin zero state (sum of all spins must be 0) with 2 particles. Before measurement none of the particles have definite spin, but by measuring one of them, the other instantly gains the opposite spin state. Particles need to interact with each other in order to get entangled. Ebit = Qbits of entanglement shared between communicating sides. Ebits itself cannot be used to send any information. 8

No cloning theorem Quantum state cannot be perfectly copied. Consequences We cannot use classical error correction (by using redundancy) during quantum computation, however it is possible to spread the information of one qubit onto a highly-entangled state of several (physical) qubits-> quantum error correction codes. no-teleportation theorem - quantum information cannot be measured with complete accuracy We cannot measure system in quantum state S, then prepare system according to the measurement. The prepared system will not be in the state S. Complete quantum information cannot be converted to classical information. 9

Bennets laws 1. qubit > bit 2. qubit > ebit = can do the job of 3. Dense coding qubit + ebit > 2 bits We can use 1 qubit and 1 ebit to send 2 bits of information. Only 1 qubit is transmitted between Alice and Bob. 4 possible rotations (no rotation, along X, Y, Z axis) = encoding 2 bits Bells measurement measures the type of entanglement of the spins can tell which rotation was made. Alice Bob 10

Bennets laws 4. Quantum teleportation ebit + 2 bits > qubit Transmission of quantum state by sending only 2 classical bits. Qubitoriginal state is destroyed during the Bells measurement Qubitin same quantum state as Alice had Qubit in uknown quantum state Alice Bob 11

Quantum cryptography If we distribute key any usual way using any algorithm it can be copied without us knowing, because classical information can be copied in principle (meaning no classical method of key distribution cannot be 100% secure). Quantum information cannot be copied in principle, thus it can be used to make unbreakable key distribution. 12

Quantum key distribution algorithm BB84 1. Alice sends Bob qubitswith random spin( )with equal likelihood. Noone can read whole sequence of the spins (because you can measure spins in Z axis or in X axis, but not both X and Z are complementary variables). 2. Bob randomly measures X or Z axis. 3. Bob publicly sends Alice which axis he measured. 4. Alice publicly replies which measurements are good and which are bad (good measurement = measuring the appropriate axis). 5. Alice and Bob discards the bad measurements and the good measurements become the key. 6. Alice and Bob publicly compare some bits of their key (which are then not used) and if they do not match, it tells them that someone measured their key during step 1) and key is discarded and will not be used. 13

BB84 - Example Alice sends: Bob measures: Z Z X Z X X Z Bob s results: 0.5-0.5-0.5 0.5 0.5-0.5-0.5 Bob sends: Z Z X Z X X Z Alice sends: Key: 1 0 1 0 Real quantum states of qubits stays private with Alice. Measurements stays private with Bob. 14

Quantum computers Computer where memory elements are qubits. Qubits can be any particle that has 2 states that are distinguishable. During a computation, quantum computer operates without any measurement -> computer must be well isolated from outside world (any interaction with surroundings counts as a measurement). Quantum register of 14 calcium atoms 15

Quantum computers Computer follows multiple computational paths at the same time (same as photon can follow more than one path in interferometer). During computer operation no physical record is made which of these computation is done. At the end it combines all results of computational paths and using interference we get our measurement. 16

Quantum algorithms In principle quantum computer cannot solve anything that classical computer can t, but there are algorithms that use quantum mechanics to run computation asymptoticaly faster. Deutsch Jozsaproblem First problem that showed quantum computers can be more powerful than ordinary computers. We have a function that takes number from 1-M. Output of this function is either constant (same 0 or 1) or balanced (returns 1 for half inputs and 0 for other half). Classical algorithm has to examine M/2 +1 function values in order to determine if its constant or balanced. Quantum computer can calculate that by calculating the function only once using superposition of all possible inputs. In this process we don t know anything about individual values of the function, but we find out property of all the values taken together. 17

Deutsch Jozsa problem Another way to explain how this works is via two slit experiment involving electrons, with a electromagnet in the middle. We now wish to determine if the electromagnet is turned on or off. This can be determined by looking at the interference pattern without any need of measuring the individual electrons -> superposition state is like interference pattern. Electromagnet 18

Quantum algorithms Integer factorizationhas exponential complexity and you cannot have faster algorithm on standard computer. But using Shor s algorithm we can solve the same problem on quantum computer with polynomial complexity. 10 18 log 10 (time) General number field sieve Lots of modern cryptography is based on difficulty of factoring numbers. 10 8 10 6 10 4 Shor s algorithm 10 2 Length of factored integer [bits] 19

Quantum algorithms Shor s algorithm The first part of the algorithm turns the factoring problem into the problem of finding the period of a function, and may be implemented classically. The second part finds the period using the quantum Fourier transform, and is responsible for the quantum speedup. The speedup is hidden within quantum superposition and ability to evaluate function at all points simultaneously. Grover's algorithm Algorithm searches unsorted database with N entries in O(N 1/2 ) time and using log(n) storage space. Classical algorithm must search every item -> linear complexity. 20