An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Similar documents
Introduction to Quantum Cryptography

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Research Proposal for Secure Double slit experiment. Sandeep Cheema Security Analyst, Vichara Technologies. Abstract

Quantum Cryptography

Lecture 4: Postulates of quantum mechanics

2. Introduction to quantum mechanics

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

EPR paradox, Bell inequality, etc.

Transmitting and Hiding Quantum Information

A New Wireless Quantum Key Distribution Protocol based on Authentication And Bases Center (AABC)

Quantum Cryptography. Areas for Discussion. Quantum Cryptography. Photons. Photons. Photons. MSc Distributed Systems and Security

9. Distance measures. 9.1 Classical information measures. Head Tail. How similar/close are two probability distributions? Trace distance.

Cryptography CS 555. Topic 25: Quantum Crpytography. CS555 Topic 25 1

10 - February, 2010 Jordan Myronuk

INTRODUCTION TO QUANTUM COMPUTING

LECTURE NOTES ON Quantum Cryptography

Security Implications of Quantum Technologies

Entanglement and Quantum Teleportation

arxiv:quant-ph/ v2 2 Jan 2007

Ping Pong Protocol & Auto-compensation

Introduction to Quantum Mechanics

Quantum Gates, Circuits & Teleportation

Ph 219/CS 219. Exercises Due: Friday 3 November 2006

+ = OTP + QKD = QC. ψ = a. OTP One-Time Pad QKD Quantum Key Distribution QC Quantum Cryptography. θ = 135 o state 1

A probabilistic quantum key transfer protocol

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

Lecture: Quantum Information

Lecture 20: Bell inequalities and nonlocality

Quantum Teleportation Pt. 1

Problem Set: TT Quantum Information

5th March Unconditional Security of Quantum Key Distribution With Practical Devices. Hermen Jan Hupkes

Quantum Information & Quantum Computation

arxiv:quant-ph/ v2 3 Oct 2000

1. Basic rules of quantum mechanics

C. QUANTUM INFORMATION 99

arxiv:quant-ph/ v1 27 Dec 2004

SUPERDENSE CODING AND QUANTUM TELEPORTATION

5. Communication resources

Entanglement and information

1 1D Schrödinger equation: Particle in an infinite box

An Introduction to Quantum Information and Applications

Entanglement Manipulation

C. QUANTUM INFORMATION 111

Quantum secret sharing based on quantum error-correcting codes

1 1D Schrödinger equation: Particle in an infinite box

APPLICATIONS. Quantum Communications

Massachusetts Institute of Technology Department of Electrical Engineering and Computer Science Quantum Optical Communication

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

Cryptography in a quantum world

Quantum cryptography. Quantum cryptography has a potential to be cryptography of 21 st century. Part XIII

arxiv:quant-ph/ v2 17 Sep 2002

Unconditional Security of the Bennett 1992 quantum key-distribution protocol over a lossy and noisy channel

Introduction to Quantum Information Hermann Kampermann

Lecture 6: Quantum error correction and quantum capacity

Quantum information and quantum computing

Lecture 11 September 30, 2015

Quantum Information Types

Security of Quantum Cryptography using Photons for Quantum Key Distribution. Karisa Daniels & Chris Marcellino Physics C191C

Teleportation of Quantum States (1993; Bennett, Brassard, Crepeau, Jozsa, Peres, Wootters)

Quantum Communication. Serge Massar Université Libre de Bruxelles

Lecture 21: Quantum communication complexity

Quantum Cryptography and Security of Information Systems

CS/Ph120 Homework 1 Solutions

Instantaneous Nonlocal Measurements

arxiv:quant-ph/ v1 13 Mar 2007

Seminar 1. Introduction to Quantum Computing

Ph 219/CS 219. Exercises Due: Friday 20 October 2006

High Fidelity to Low Weight. Daniel Gottesman Perimeter Institute

Seminar Report On QUANTUM CRYPTOGRAPHY. Submitted by SANTHIMOL A. K. In the partial fulfillment of requirements in degree of

Quantum Entanglement and Cryptography. Deepthi Gopal, Caltech

Entanglement. Michelle Victora Advisor: Paul G. Kwiat. Physics 403 talk: March 13, 2017

Mobile Free Space Quantum Key Distribution for short distance secure communication

Probabilistic exact cloning and probabilistic no-signalling. Abstract

arxiv:quant-ph/ v1 13 Jan 2003

Attacks against a Simplified Experimentally Feasible Semiquantum Key Distribution Protocol

Quantum Teleportation Pt. 3

Quantum Computers. Todd A. Brun Communication Sciences Institute USC

Realization of B92 QKD protocol using id3100 Clavis 2 system

Quantum Cryptography applied to Electronic-Voting Protocols

Uncertainty Principle

Ground-Satellite QKD Through Free Space. Steven Taylor

Device-Independent Quantum Information Processing (DIQIP)

Perfect quantum teleportation and dense coding protocols via the 2N-qubit W state

A Matlab Realization of Shor s Quantum Factoring Algorithm

Security Proofs for Quantum Key Distribution Protocols by Numerical Approaches

Single and Entangled photons. Edward Pei

Enigma Marian Rejewski, Jerzy Róz ycki, Henryk Zygalski

Device-Independent Quantum Information Processing

arxiv:quant-ph/ v1 6 Dec 2005

Universal Single Server Blind Quantum Computation Revisited

Quantum Information Transfer and Processing Miloslav Dušek

Security of quantum-key-distribution protocols using two-way classical communication or weak coherent pulses

CS120, Quantum Cryptography, Fall 2016

The Framework of Quantum Mechanics

Secrets of Quantum Information Science

quantum distribution of a sudoku key Sian K. Jones University of South Wales

DEVELOPMENT OF MECHANISM FOR ENHANCING DATA SECURITY IN QUANTUM CRYPTOGRAPHY.

6.896 Quantum Complexity Theory September 9, Lecture 2

Transcription:

An Introduction to Quantum Information By Aditya Jain Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

1. Introduction Quantum information is physical information that is held in the state of a quantum system. The theory of quantum information is a result of the effort to generalize classical information theory to the quantum world. Computation and information processing follows the axioms of quantum mechanics which are: Every system is associated with a Hilbert Space (A vector space where inner product is defined). A state is a complete description of a system. It is the maximum information provided by nature so that future measurements can be performed. It is a unit vector in Hilbert Space of the system. An observable is a property of a physical system that in principle can be measured. In QM these are self-adjoint operators. The observables have a spectral decomposition and represented as A = Σa n n n, where n is eigenbasis of A and a n are the corresponding eigenvalues. A measurement is a process in which information about the state of the physical system is acquired by an observer by the use of an observable. In QM, the measurement of an observable A lead the system to collapse onto one of the observables eigenstate. If the state prior to measurement is, Ψ then outcome a n is obtained with probability Ψ n 2, and the state collapses to. n Composite Systems: If the Hilbert space for system A is H A and that of system B is H B, then the Hilbert space for the composite system AB is the tensor product H A H B. If system A is prepared in state Ψ A and system B is prepared in Φ B, then the composite systems state is Ψ A Φ B.

2. The Qubit The indivisible unit of classical information is the bit, which takes one of the two possible values {0, 1}. The corresponding unit of quantum information is called the quantum bit or qubit. The smallest non-trivial Hilbert space is two-dimensional. We may denote an orthonormal basis for a 2-D vector space as, 0 }.{ 1 Then the most general normalized state can be expressed as ǀΨ = 0 a +, 1 b where a, b are complex numbers Satisfying, a 2 + b 2 = 1. a 2 is the probability of finding ǀΨ in state 0 whereas b 2 is the probability of finding ǀΨ in state 1 upon measurement in the computational basis. 3. Pauli Operators In 2-D Hilbert space the Pauli operators are σ z, σ x, σ y and I. They have following matrix representations: σ z = σ x = σ y = Eigenvalues for all of them are 1 and -1. But eigenvectors are not the same. For σ z, the eigenvectors are and with eigenvalues 1 and -1 respectively. Now for convenience, eigenvector with eigenvalue 1 is denoted by 0 and that of -1 by. 1 Similarly for σ x, the eigenvectors are 0 x and 1 x for eigenvalues 1-0 ) ½ - = x 1 and ( 1 + 0 ) ½ = + = x 0 and -1 respectively, where.( 1

4. The No-Cloning Theorem A routine task performed in information processing is making copies of data. In classical scenario copying bits is quite an easy process; but the same is not true in quantum world. We can never make an exact copy of an arbitrary qubit (quantum bit). Consider two arbitrary states Φ and. Ψ Let us take another state (blank paper for Xerox) ǀB on which we want to copy Φ and. Ψ Suppose that there exists an unitary operator U such that; U ǀΦ ǀB = ǀΦ ǀΦ (i) U ǀΨ ǀB = ǀΨ ǀΨ... (ii) Now taking inner products of the left side of the above eq ns, we have Ψ B U U Φ B = Ψ Φ {U U = UU = I} Now for the right hand side; Ψ Ψ Φ Φ = Ψ Φ 2 Equating these two results we have the following equation, Ψ Φ = Ψ Φ 2 { B B = 1} So this is only true if Ψ Φ =0 i.e. they are orthogonal or Ψ Φ =1 i.e.. Φ = Ψ So this shows that there is no unitary operator U that can be used to clone arbitrary quantum states. If we can copy a state, then we can also distinguish the state easily.

5. Quantum Teleportation Teleportation is the task of transferring an unknown qubit from one party to another using classical communication channel and a shared entangled pair as the only resources. The task is that Alice wants to transmit an unknown state to Bob (they are physically separated), let the state be a qubit Χ = 1 0 +β α (state is normalized) Now let them share an entangled pair which is 2 )/ B 1 1 + A 0 B 0 ) A = + Φ Here the first member of the pair (kets subscripted with A) belongs to Alice while the second belongs to Bob. Alice and Bob have no interaction whatsoever, except the entangled pair. So as we notice that Alice now has two qubits X and one from the entangled pair, she has complete independency to do whatever she likes with these two particles. Now, let us write the combined state including the three particle, we name it as 2) )/ B ((0 A 0 B +1 A 1 ( 1 0 +β α Ψ 123 = 2 /( 111 011 +β α + 100 000 +β α ) = Alice decides to make measurements on her two particles in the bell s basis which has eigenvectors Φ ) + Φ - Ψ + Ψ - ). So we rearrange the state manner: Ψ 123 in the following B 1 ) - Ψ + + α( Ψ 1 B + ) - Φ - + β( Φ 0 B + ) - Φ + + α( Φ Ψ 123 = ½( + β( Ψ + Ψ - - ) 0 B ) ( 0 1 +β α ) Ψ + + ( 1 0 -β α ) Φ - + ( 1 0 +β α ) Φ )½ + = (( 0 1 -β α ) Ψ - + So if after measurement Alice collapses on Φ + Bob collapses on 1 0 +β α (which Alice is supposed to teleport). Similarly, for the other bell states Alice - Φ + Ψ - Ψ Bob 1 0 -β α 0 1 +β α 0 1 -β α

So if now Bob applies Pauli operators he will get the required qubit we are needed to teleport. Before Operation Operators After Operation 1 0 +β α I 1 0 +β α 1 0 -β α σ z 1 0 +β α 0 1 +β α σ x 1 0 +β α 0 1 -β α σ z σ x 1 0 +β α Alice informs Bob her measurement outcome via the classical communication channel using two classical bits ( since four possibilities are there) and Bob performs the corresponding operator to obtain the unknown qubit Χ = 1 0 +β α. In this way teleportation is achieved. It must be noted that the protocol involves classical communication at the end which cannot be achieved faster than the light and hence it is concluded that Teleportation does not violate the No-signaling principle. 6. Quantum Dense Coding Let us suppose that Alice needs to convey the results of two matches (A vs B and C vs D) (mutually exclusive events) to Bob using classical channel only.it can be shown easily that she would require at least two classical bits. Quantum Dese coding achieves the same task using 1 qubit. The resources used in this protocol include an entangled pair and a quantum channel. Let them share an entangled pair, say Φ +. Now after the matches are over, Alice depending on the results she applies unitary operations on her qubit as follows: Match Results Operators Entangled pair after operation A and C wins I Φ + A and D wins σ z Φ - B and C wins σ x Ψ + B and D wins σ z σ x Ψ - Now, after unitary transformation she sends her qubit to Bob via a quantum channel. The mapping from match results to the four states is predecided and known to both of them. Alice has transformed Φ + to one of the four states, which are orthogonal to one another, so Bob performs a measurement in the bell basis and would be able to retrieve the results of both the matches using the mapping. It must be noted that had the states not been

orthogonal they could not have been distinguished reliably ( No Cloning Theorem). The protocol is quite intriguing as it achieves the same task using one qubit instead of two classical bits and hence the name Superdense Coding. 7. Quantum Cryptography Cryptography involves transferring information between sender and receiver through a public (unsecure) channel in the presence of eavesdropper. Various classical algorithms exist to make this task possible. However the loophole in all classical algorithms is that they rely on computational hardness of some problems. For example, RSA relies on the NP-hardness of Factoring problem. However, Quantum Key Distribution (QKD) does not rely on the computational hardness of any problem. Famous QKD protocols include BB84, B92, E91 and similar variants. It is to be noted that these protocols also take into consideration certain assumptions are not completely free of attacks but are better than classical key distribution protocols since they use inherent indeterminism of Quantum Mechanics rather than the computational hardness. BB84 protocol In the first phase, Alice communicates to Bob over a quantum channel. Alice begins by choosing a random string of bits and for each bit, Alice randomly chooses a basis, rectilinear or diagonal, by which to encode the bit. She transmits a photon for each bit with the corresponding polarization, as just described, to Bob. For every photon Bob receives, he measures the photon's polarization by a randomly chosen basis. If, for a particular photon, Bob chose the same basis as Alice, then in principle, Bob should measure the same polarization and thus he can correctly infer the bit that Alice intended to send. If he chose the wrong basis, his result, and thus the bit he reads, will be random. In the second phase, Bob notifies Alice over any insecure channel what basis he used to measure each photon. Alice reports back to Bob whether he chose the correct basis for each photon. At this point Alice and Bob discard the bits corresponding to the photons which Bob measured with a different basis. Provided no errors occurred or no one manipulated the photons, Bob and Alice now both have an identical string of bits which is called a sifted key. Before they are finished however, Alice and Bob agree upon a random subset of the bits to compare to ensure consistency. If the bits agree, they are discarded and the remaining bits form the shared secret key. In the absence of noise or any other measurement error, a disagreement in any of the bits compared would

indicate the presence of an eavesdropper on the quantum channel. This is because the eavesdropper, Eve, were attempting to determine the key, she would have no choice but to measure the photons sent by Alice before sending them on to Bob. This is true because the no cloning theorem assures that she cannot replicate a particle of unknown state. Since Eve will not know what bases Alice used to encoded the bit until after Alice and Bob discuss their measurements, Eve will be forced to guess. If she measures on the incorrect bases, the Heisenberg Uncertainty Principle ensures that the information encoded on the other bases is now lost. Thus when the photon reaches Bob, his measurement will now be random and he will read a bit incorrectly 50% of the time. Given that Eve will choose the measurement basis incorrectly on average 50% of the time, 25% of Bob's measured bits will differ from Alice. If Eve has eavesdropped on all the bits then after n bit comparisons by Alice and Bob, they will reduce the probability that Eve will go undetected to (¾) n. The chance that an eavesdropper learned the secret is thus negligible if a sufficiently long sequence of the bits are compared. One of the major attacks possible in the BB84 protocol is the photon number splitting attack. In practice implementations use laser pulses attenuated to a very low level to send the quantum states. If the pulse contains more than one photon, then Eve can split off the extra photons and transmit the remaining single photon to Bob. This is the basis of the photon number splitting attack. This is resolved in the Decoy State Quantum Key Distribution ( Ref : Practical Decoy State for Quantum Key Distribution, arxiv:quant-ph/0503005).