Problem Set: TT Quantum Information

Similar documents
Quantum Communication. Serge Massar Université Libre de Bruxelles

Ping Pong Protocol & Auto-compensation

Lecture: Quantum Information

1 1D Schrödinger equation: Particle in an infinite box

Quantum Dense Coding and Quantum Teleportation

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

1 1D Schrödinger equation: Particle in an infinite box

Entanglement and Quantum Teleportation

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Lecture 11: Quantum Information III - Source Coding

Quantum Teleportation with Photons. Bouwmeester, D; Pan, J-W; Mattle, K; et al. "Experimental quantum teleportation". Nature 390, 575 (1997).

EXPERIMENTAL DEMONSTRATION OF QUANTUM KEY

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

Entanglement and information

Quantum Teleportation Pt. 1

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

Entropies & Information Theory

Answers to exercises. Part I: Quantum information. 1. Quantum bits and quantum gates

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Security and implementation of differential phase shift quantum key distribution systems

10 - February, 2010 Jordan Myronuk

arxiv:quant-ph/ v1 21 Apr 2004

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

EPR paradox, Bell inequality, etc.

AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013

A Superluminal communication solution based on Four-photon entanglement

Entanglement Manipulation

Quantum information and quantum computing

to mere bit flips) may affect the transmission.

D. Bouwmeester et. al. Nature (1997) Joep Jongen. 21th june 2007

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Introduction to Quantum Cryptography

Single-photon quantum error rejection and correction with linear optics

Quantum Information Types

New schemes for manipulating quantum states using a Kerr cell. Istituto Elettrotecnico Nazionale Galileo Ferraris, Str. delle Cacce 91, I Torino

Lecture 6: Quantum error correction and quantum capacity

Detection of Eavesdropping in Quantum Key Distribution using Bell s Theorem and Error Rate Calculations

Experimental demonstrations of teleportation of photons. Manuel Chinotti and Nikola Đorđević

Lecture 20: Bell inequalities and nonlocality

On some special cases of the Entropy Photon-Number Inequality

Lecture 21: Quantum Communication

Quantum Gates, Circuits & Teleportation

Erwin Schrödinger and his cat

Introduction to Quantum Information Hermann Kampermann

Lecture 11 September 30, 2015

Entanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017

Entanglement. arnoldzwicky.org. Presented by: Joseph Chapman. Created by: Gina Lorenz with adapted PHYS403 content from Paul Kwiat, Brad Christensen

Quantum non-demolition measurements:

Analysis of the Influenceof the Rate of Spies Measure on the Quantum Transmission

Quantum Entanglement, Quantum Cryptography, Beyond Quantum Mechanics, and Why Quantum Mechanics Brad Christensen Advisor: Paul G.

Quantum Information Transfer and Processing Miloslav Dušek

Lecture 18: Quantum Information Theory and Holevo s Bound

Quantum Optics and Quantum Information Laboratory

ISSN Review. Quantum Entanglement Concentration Based on Nonlinear Optics for Quantum Communications

Lecture 3: Superdense coding, quantum circuits, and partial measurements

Quantum Measurements: some technical background

PERFECT SECRECY AND ADVERSARIAL INDISTINGUISHABILITY

Measuring Quantum Teleportation. Team 10: Pranav Rao, Minhui Zhu, Marcus Rosales, Marc Robbins, Shawn Rosofsky

Quantum Communication

Exemple of Hilbert spaces with dimension equal to two. *Spin1/2particle

Quantum Data Compression

Quantum Cryptography in Full Daylight Ilja Gerhardt, Matthew P. Peloso, Caleb Ho, Antía Ilja Gerhardt Lamas-Linares and Christian Kurtsiefer

Differential Phase Shift Quantum Key Distribution and Beyond

SUPPLEMENTARY INFORMATION

Multi-Particle Entanglement & It s Application in Quantum Networks

Quantum Information Processing

Security Proofs for Quantum Key Distribution Protocols by Numerical Approaches

QUANTUM INFORMATION with light and atoms. Lecture 2. Alex Lvovsky

LECTURE NOTES ON Quantum Cryptography

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Compression and entanglement, entanglement transformations

arxiv: v7 [quant-ph] 20 Mar 2017

Bell s inequalities and their uses

Experimental realization of quantum cryptography communication in free space

Transmitting and Hiding Quantum Information

Single qubit + CNOT gates

Practical aspects of QKD security

Lecture 21: Quantum communication complexity

BB84 Quantum Key Distribution System based on Silica-Based Planar Lightwave Circuits

Quantum Teleportation Pt. 3

An Introduction to Quantum Computation and Quantum Information

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Quantum Memory with Atomic Ensembles

arxiv:quant-ph/ v3 5 Feb 2004

Quantum key distribution for the lazy and careless

Chapter 1. Quantum interference 1.1 Single photon interference

Physics 239/139 Spring 2018 Assignment 2 Solutions

SECOND PUBLIC EXAMINATION. Honour School of Physics Part C: 4 Year Course. Honour School of Physics and Philosophy Part C

Quantum Interference of Unpolarized Single Photons

AP/P387 Note2 Single- and entangled-photon sources

Ph 219/CS 219. Exercises Due: Friday 3 November 2006

Jian-Wei Pan

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

arxiv:quant-ph/ v1 13 Jan 2003

Quantum Information Theory

Security Implications of Quantum Technologies

Transcription:

Problem Set: TT Quantum Information Basics of Information Theory 1. Alice can send four messages A, B, C, and D over a classical channel. She chooses A with probability 1/, B with probability 1/4 and C and D with probability 1/8. How much information is contained in one of her messages? Find an optimal bit-code for encoding these messages and show that in this code each bit has equal probability of having values 0 or 1. Now imagine that Alice uses trits (with values 0,1,) instead of bits to encode her messages and chooses to send A, B, C, D, and E with probabilities 1/3, 1/3, 1/9, 1/9, 1/9, respectively. What is an optimal code in this case? Show that in this code each trit has equal probability of having values 0, 1, and.. Show that the reduced density operator of each qubit of a Bell pair is the maximally mixed state. This result is independent of which Bell state is used. Why? Use this result to calculate the von Neumann entropy of a two qubit system in a Bell state as well as the reduced entropies of each of the qubits separately. 3. The density operator of two qubits A and B is given by ρ AB = ( Ψ Ψ + Φ + Φ + + Ψ + Ψ + + Φ Φ )/4. Calculate the von Neumann entropy S(ρ AB ) and the entropies of the reduced systems S(ρ A ) and S(ρ B ). Is the state ρ AB entangled? If it is not entangled find the density operator ρ AB in the form ρ AB = j p j ρ (j) A ρ(j) B. (1) Repeat the above calculations for the state ρ AB = ( Ψ Ψ + Φ + Φ + )/. 3 Photon techniques 4. Consider the optical setup shown in Fig. 1. Find the state of the output qubit as a function of φ and γ for two 50/50 beam splitters. What changes if the beam splitters reflect a photon with 75% probability? e iφ e iγ Figure 1: Interferometer setup 5. A laser with an intensity of I = 5µW/cm, wavelength λ = 500nm, and a bandwidth of 1GHz is attenuated by sending it through a small pinhole of area A. For which area A does the attenuated laser beam contain 1 photon per 10ns on average? What is the 1

probability that the attenuated laser beam contains a second photon within the coherence length of one photon? 6. Consider a momentum entanglement interferometer experiment as shown in the lecture notes. Calculate the dependence of coincident detections given the state Ψ = 1 [ e iφ b a 1 b + e iφa a b 1 ] before the beam splitters. 4 Testing EPR 7. Work out the quantum mechanical expectation values for the combination of observables Q, R at Alice s site and S, T at Bob s site (as defined in the lecute notes) which lead to a violation of the CHSH inequality for the Bell state Ψ. Which observables should Alice and Bob measure if a CHSH type inequality should be violated for the state φ. 8. Consider the rare events where the UV pulse in Fig. creates two indistinguishable Bell pairs each in the state Ψ = 1 [ H a V b + e iφ V a H b ]. and determine all possible paths for one and only one photon to arrive at the detectors D1, D and D3 given that one photon triggers the detector T. Deduce that (up to the relative phase between the two terms) the conditional state of these photons at detectors D1, D, and D3 given a click occurred at detector T is given by GHZ = 1 ( HHV + V V H ). How can this state GHZ be transformed into the state GHZ? 5 Quantum communication 9. Explain the quantum dense coding protocol and determine the states which are received by Bob if Alice and Bob start from the joint Bell state φ + and Alice uses the operations 1, σ 1 x, σ 1 z, and σ 1 zσ 1 x for encoding 00, 01, 10, and 11, respectively. Show that if Bob could only carry out measurements on one of the two particles he would not gain any information about the message sent by Alice. 10. Work out the quantum teleportation protocol if the qubits and 3 are created in the Bell state Φ + 3. Show that without classical communication no information about the state of qubit 1 is transferred to qubit 3. Explain why it is impossible to transmit the quantum state of a qubit from Alice to Bob by classical communication only. 11. Entanglement swapping: The state of qubit 1 which is entangled with a system 4 can be written as Ψ = ( 0 1 Φ 0 4 + 1 1 Φ 1 4 )/. Show that if the teleportation protocol is applied to qubit 1 the entanglement with system 4 is swapped to qubit 3.

Figure : GHZ state creation Additional worked examples Please do not hand in answers to the following problems. These examples will not be discussed in class unless you have queries about them. Some of these examples contain detailed calculations which may be of interest to you, others are on topics which go slightly beyond the core syllabus of C. 1. The 6 letters of the alphabet appear with percentages given below in common English texts. What is the average information content of an English text with 100 letters? What is the maximum information that a text with 100 letters could contain? Which percentage of letters in an English text can be transmitted wrongly without (on average) destroying the information contained in the text? E 11.1607% A 8.4966% R 7.5809% I 7.5448% O 7.1635% T 6.9509% N 6.6544% S 5.7351% L 5.4893% C 4.5388% U 3.6308% D 3.3844% P 3.1671% M 3.019% H 3.0034% G.4705% B.070% F 1.811% Y 1.7779% W 1.899% K 1.1016% V 1.0074% X 0.90% Z 0.7% J 0.1965% Q 0.196% Solution: The average Shannon entropy of one letter in the English language is S English = j=a Z p j log (p j ) = 4.468 while the maximum Shannon entropy of one out of 6 letters is Smax = log (6) = 4.7004. Therefore an English text with 100 letters contains 3

45 bits of information while the maximum is 470 bits. The 45 bits of information could in principle be transmitted with 91 letters. About 9% of the sent letters are redundant (ignoring the frequency of words) and can be transmitted wrongly without affecting the message. 13. The density operator of a two qubit system is given by ρ = ρ A ρ B. Show that the von Neumann entropy of this system is given by S(ρ AB ) = S(ρ A ) + S(ρ B ). Solution: The density operators can be written as ρ A = j pa j ψ j ψ j and ρ B = n pb n φ n φ n. The eigenvectors of the density operator are thus ψ j φ j with a probability of p A j pb n where p A j are the eigenvalues (probabilities) of the density operator ρ A and p B n are the eigenvalues of ρ B. We can thus write S(ρ) = j,n pa j pb n log (p A j pb n ) = j,n pa j pb n log (p B n ) j,n pa j pb n log (p A j ) = n pb n log (p B n ) j pa j log (p A j ) = S(ρ A)+ S(ρ B ). 14. Show that the classical conditional Shannon entropy H(Y X) is always larger or equal zero, while the conditional von Neumann entropy S(ρ A ρ B ) is larger or equal to zero for a pure state ρ AB if and only if ρ AB is not entangled, i.e. if it can be written as ρ = ρ A ρ B and is smaller than zero for entangled states. Solution: The probability of having values x for X and y for Y is given by p(x, y) = p(x)p(y x). Furthermore H(X, Y ) = x,y p(x, y) log (p(x)p(y x)) = x p(x) log (p(x)) x,y p(x, y) log (p(y x)) = H(x) x,y p(x, y) log (p(y x)), and therefore H(Y X) = x,y p(x, y) log (p(y x)) 0, since p(x, y) 0 and log (p(y x)) 0. H(Y X) is only equal to zero if Y is a deterministic function of X. If ρ = Ψ A Ψ A Ψ B Ψ B then S(ρ) = 0, S(ρ A ) = 0 and also S(ρ B ) = 0. S(ρ A ρ B ) = 0. If S(ρ A ρ B ) 0 then 0 S(ρ A ρ B ) = S(ρ) S(ρ B ) = S(ρ B ) 0, Thus since S(ρ) = 0 for any pure state. Therefore 0 S(ρ B ) 0 and so S(ρ B ) = 0 and therefore ρ B is a pure state. This means that ρ = ρ A ρ B and since ρ is pure we also have a pure ρ A. 15. Consider a two photon Franson interferometer as shown in the lecture notes. Under which condition on the coherence length of the photons created in the EPR source will there be no interference in each of the two arms? However, SS and LL detections are 4

still coincident and can be selected by time gating. How do coincidence clicks between detections in the two arms change as a function of the sum of the two path differences α and β. Solution: If the coherence length of a photon cτ c (with c the speed of light) is much shorter than the path difference between the long and the short arm L j = L j S j with j = (1, ) there will be no interference in each arm. By suitable time gating the contributions SS and LL can be selected. If the coherence length of the pump cτ pump is much longer than the path differences L j the paths SS and LL can interfere. Also, it is important that the two photon coherence length cτ tpc (which is usually similar to cτ c ) is much longer than the difference between the two long paths L = L 1 L. With α = L 1 and β = L the phase difference between SS and LL is given by φ = ω p (α + β), c where ω p is the pump laser frequency. The part of the state selected by time gating is Ψ = 1 ) ( SS + e i φ LL which yields a dependence of the rate of true coincidence clicks on the phase difference φ given by 1 1 + ei φ = 1 + 1 cos( φ). Typical experimental parameters are L j 63cm, cτ pump 6m and cτ p cτ tpc 36µm and yield a visibility of 90%. 16. Using the symmetry properties of photons explain how the Bell states Ψ ± can be distinguished in a partial Bell state analyzer for polarization encoded photons. Why can the other two states not be distinguished? Imagine that photons were fermions (which is not true!). How would the partial Bell state analyzer work in this case? Solution: For bosonic photons the overall wave function symmetric. Ψ = ( HV V H )/ has an asymmetric polarization wave function the photons need to go into two different arms to preserve overall symmetry causing correlated clicks at two detectors in different arms. Ψ + = ( HV + V H )/ has a symmetric polarization wave function the photons need to go into the same arm causing correlated clicks at two detectors in the same arm. The same symmetry arguments lead to two clicks in one detector for the states Φ ± which can thus not be distinguished. In the case of fermionic particles the arguments are based on overall asymmetry of the wave function. Again the states Φ ± are not distinguishable (they cause the same type of correlated clicks in the two different arms). 17. Explain why the BB84 protocol cannot be directly used for securely transmitting a message but allows establishing a random key between Alice and Bob. In the BB84 protocol with n = 500 how large do Alice and Bob have to choose the parameter δ if they want to be left with at least n key bits with a probability of p = 99.9% after Bob has performed his measurements? How likely will Alice and Bob detect an 5

eavesdropper who is using the intercept/resend strategy on each second qubit on an otherwise perfect channel when comparing n bits of their established key? Solution: BB84 cannot be used for sending messages directly since it is not know which qubits will result in a transmission of information from Alice to Bob. However, after the qubits have been sent Alice and Bob can find out which of their measurements are perfectly correlated without revealing the results. Thus they can use those measurement results to establish a secret key. The probability of getting a useless measurement result is 1/. Thus the probability of getting y useful measurements out of x is given by ( ) x p(x, y) = x y and we approximate this by the normal distribution with mean value x/ and variance of x/4. Thus the probability of n or more successes is given by the error function (using the appropriate continuity correction) [ ( )] x p = p(x, y) 1 n 1/ x/ 1 erf x/ y=n For p = 99.9% this equation has the solution x 14 and thus δ = x/n 4 = 8%. This result agrees excellently with exactly summing up the probabilities according to the binomial distribution. The probability that measurements of Alice and Bob in the same basis yield disagreement is 1/4 for each qubit which Eve intercepted. Thus by comparing n = 500 bits of which n/ have been intercepted results in a probability of not detecting the eavesdropper p nd = ( 3 4 )50 6 10 3. This does not take into account that Eve could randomly choose which qubits to intercept and thus assumes that exactly 50 qubits were intercepted by Eve. 6