CS/Ph120 Homework 1 Solutions

Similar documents
Quantum Gates, Circuits & Teleportation

Hilbert Space, Entanglement, Quantum Gates, Bell States, Superdense Coding.

CS/Ph120 Homework 8 Solutions

CS120, Quantum Cryptography, Fall 2016

Ph 219/CS 219. Exercises Due: Friday 3 November 2006

Lecture 20: Bell inequalities and nonlocality

Quantum information and quantum computing

b) (5 points) Give a simple quantum circuit that transforms the state

SUPERDENSE CODING AND QUANTUM TELEPORTATION

Quantum Error Correcting Codes and Quantum Cryptography. Peter Shor M.I.T. Cambridge, MA 02139

Homework 3 - Solutions

Lecture 11 September 30, 2015

Entanglement and information

An Introduction to Quantum Information. By Aditya Jain. Under the Guidance of Dr. Guruprasad Kar PAMU, ISI Kolkata

Unitary evolution: this axiom governs how the state of the quantum system evolves in time.

Quantum Teleportation Pt. 1

. Here we are using the standard inner-product over C k to define orthogonality. Recall that the inner-product of two vectors φ = i α i.

Tutorial on Quantum Computing. Vwani P. Roychowdhury. Lecture 1: Introduction

Quantum Information & Quantum Computation

Single qubit + CNOT gates

Lecture 4: Postulates of quantum mechanics

6.896 Quantum Complexity Theory September 9, Lecture 2

Seminar 1. Introduction to Quantum Computing

Instantaneous Nonlocal Measurements

Short introduction to Quantum Computing

1. Basic rules of quantum mechanics

Introduction to Quantum Computation

Introduction to Quantum Cryptography

Lecture 6: Quantum error correction and quantum capacity

Lecture 3: Superdense coding, quantum circuits, and partial measurements

Ph 219/CS 219. Exercises Due: Friday 20 October 2006

Physics ; CS 4812 Problem Set 4

Lecture 18: Quantum Information Theory and Holevo s Bound

Quantum sampling of mixed states

The controlled-not (CNOT) gate exors the first qubit into the second qubit ( a,b. a,a + b mod 2 ). Thus it permutes the four basis states as follows:

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

Quantum Teleportation Pt. 3

ECE 501b Homework #4 Due: 10/22/2012

CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games

CS286.2 Lecture 15: Tsirelson s characterization of XOR games

AQI: Advanced Quantum Information Lecture 6 (Module 2): Distinguishing Quantum States January 28, 2013

CS/Ph120 Homework 4 Solutions

Quantum Computing. Quantum Computing. Sushain Cherivirala. Bits and Qubits

Introduction to Quantum Information Hermann Kampermann

Lecture 21: Quantum communication complexity

Quantum Computing 1. Multi-Qubit System. Goutam Biswas. Lect 2

Quantum decoherence. Éric Oliver Paquette (U. Montréal) -Traces Worshop [Ottawa]- April 29 th, Quantum decoherence p. 1/2

Chapter 13: Photons for quantum information. Quantum only tasks. Teleportation. Superdense coding. Quantum key distribution

Baby's First Diagrammatic Calculus for Quantum Information Processing

Lecture 8: Semidefinite programs for fidelity and optimal measurements

2. Introduction to quantum mechanics

Quantum Teleportation with Photons. Bouwmeester, D; Pan, J-W; Mattle, K; et al. "Experimental quantum teleportation". Nature 390, 575 (1997).

Entanglement and Quantum Teleportation

Quantum Dense Coding and Quantum Teleportation

Quantum Computing: Foundations to Frontier Fall Lecture 3

Quantum Computing Lecture 2. Review of Linear Algebra

QUANTUM INFORMATION -THE NO-HIDING THEOREM p.1/36

Lecture 3: Hilbert spaces, tensor products

arxiv: v2 [quant-ph] 9 Oct 2018

A review on quantum teleportation based on: Teleporting an unknown quantum state via dual classical and Einstein- Podolsky-Rosen channels

Physics 239/139 Spring 2018 Assignment 6

Quantum Information Processing and Diagrams of States

Lecture: Quantum Information

Introduction to Quantum Computing for Folks

Lecture 1: Overview of quantum information

Quantum Information Types

Universal Blind Quantum Computing

Is Entanglement Sufficient to Enable Quantum Speedup?

Quantum Information & Quantum Computing

Lecture 3: Constructing a Quantum Model

Qubits vs. bits: a naive account A bit: admits two values 0 and 1, admits arbitrary transformations. is freely readable,

Quantum Entanglement and Error Correction

Quantum Nonlocality Pt. 4: More on the CHSH Inequality

Probabilistic exact cloning and probabilistic no-signalling. Abstract

Concepts and Algorithms of Scientific and Visual Computing Advanced Computation Models. CS448J, Autumn 2015, Stanford University Dominik L.

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

C/CS/Phy191 Problem Set 6 Solutions 3/23/05

Quantum Computing Lecture 3. Principles of Quantum Mechanics. Anuj Dawar

10 quantum games Quantum Game 1: Bell Quantum Game 2: CHSH Quantum Game 3: GHZ 6 11 why quantum mechanics? Recap 9 11.

Chapter 5. Density matrix formalism

Quantum state discrimination with post-measurement information!

DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS

1 Matrices and matrix algebra

Lecture 11: Quantum Information III - Source Coding

arxiv:quant-ph/ Oct 2002

C/CS/Phys 191 Quantum Gates and Universality 9/22/05 Fall 2005 Lecture 8. a b b d. w. Therefore, U preserves norms and angles (up to sign).

Lecture Notes. Quantum Cryptography Week 2: The Power of Entanglement

The Bloch Sphere. Ian Glendinning. February 16, QIA Meeting, TechGate 1 Ian Glendinning / February 16, 2005

{0,1} = B versus a 0 +b 1 C 2

Compression and entanglement, entanglement transformations

Physics is becoming too difficult for physicists. David Hilbert (mathematician)

A single quantum cannot be teleported

1 Indistinguishability for multiple encryptions

Ph 12b. Homework Assignment No. 3 Due: 5pm, Thursday, 28 January 2010

Quantum Mechanics II: Examples

arxiv:quant-ph/ v1 27 Dec 2004

Problem Set: TT Quantum Information

Section 6: Measurements, Uncertainty and Spherical Symmetry Solutions

Introduction to quantum information processing

Lecture 2: Introduction to Quantum Mechanics

Transcription:

CS/Ph0 Homework Solutions October, 06 Problem : State discrimination Suppose you are given two distinct states of a single qubit, ψ and ψ. a) Argue that if there is a ϕ such that ψ = e iϕ ψ then no measurement will distinguish between the two states: for any choice of a basis, the probabilities of obtaining either outcome will be the same when performing the measurement on ψ or on ψ. Assuming ψ and ψ can be distinguished, we are interested in finding the optimal measurement to tell them apart. Here we need to make precise our notion of optimal. We would like to find a basis { b, b } of C such that the expression is maximized. Pr b ψ ) + Pr b ψ ) = b ψ + b ψ ) b) Show that for the purposes of this problem we can assume without loss of generality that ψ = 0 and ψ = cos θ 0 + sin θ, for some θ [0, π). That is, given any ψ, ψ, determine an angle θ such that, given a basis { b, b } which maximizes ) for the pair ψ, ψ ), lets you recover a basis { b, b } which achieves the same value in ) when ψ, ψ ) is being measured. Say explicitly how to determine θ from ψ, ψ ) and how to recover { b, b } from { b, b }. c) Show that the optimal basis { b, b } will always be of the form b = cos ϕ 0 + sin ϕ, b = sin ϕ 0 cos ϕ for some angle ϕ [0, π). The reason this may not be immediate is that in general the coefficients of b and b in the standard basis may involve complex numbers.) d) Determine the optimal ϕ as a function of θ. e) Conclude: what is the maximum value of ), as a function of the original states ψ and ψ? What is the basis which achieves the optimum? Solution: Due to De Huang)

a) For any basis b, b, we have Pr b ψ ) = b ψ = b e iϕ ψ = e iϕ b ψ = b ψ = Pr b ψ ), Pr b ψ ) = b ψ = b e iϕ ψ = e iϕ b ψ = b ψ = Pr b ψ ), thus no measurement will distinguish between these two states. b) Given a distinguishable pair ψ, ψ ), aussume that ψ ψ = e iφ cos θ for some θ 0, π). We may also assume that φ = 0 since adding a phase e iφ to ψ won t change the optimal solution. Let ψ be a state such that ψ ψ = 0, then it s obvious that ψ ψ = sin θ, since { ψ, ψ } is a basis. By adding a proper phase to ψ we may further assume that ψ ψ = sin θ. Now consider the operator then it s easy to check that U is unitary and U = 0 ψ + ψ, U ψ = 0 ψ, U ψ = cos θ 0 + sin θ ψ. Provided that { b, b } is a basis that maximizes ) for the pair ψ, ψ ), we may recover { b, b } as b = U b, b = U b. It s easy to check that { b, b } is a basis, and we have Pr b ψ ) + Pr b ψ ) = b ψ + b ψ And for any basis { b, b }, we have = b UU ψ + b UU ψ = b ψ + b ψ = Pr b ψ ) + Pr b ψ ). Pr b ψ ) + Pr b ψ ) = b ψ + b ψ = b U ψ + b U ψ = PrU b ψ ) + PrU b ψ ) Pr b ψ ) + Pr b ψ ) = Pr b ψ ) + Pr b ψ ). Therefore the basis { b, b } maximizes value ) for the pair ψ, ψ ). c) Let b, b ba a basis that maximizes ) for the pair ψ, ψ ). It s easy to check that applying any phases to b or b will not change value ). Thus without loss of generality, we may assume that b = cos ϕ 0 + e iα sin ϕ, b = sin ϕ 0 e iα cos ϕ,

for some ϕ [0, π) and α [0, π) such that cos θ sin θ cos ϕ sin ϕ) 0 otherwise we may take ϕ π ϕ, α α + π). Then we have Pr b ψ ) + Pr b ψ ) = b ψ + b ψ = cos ϕ + cos θ sin ϕ e iϕ sin θ cos ϕ = cos ϕ + cos θ sin ϕ + sin θ cos ϕ cos θ sin θ cos ϕ sin ϕe iα + e iα ) cos ϕ + cos θ sin ϕ + sin θ cos ϕ cos θ sin θ cos ϕ sin ϕ. Since we assume that cos θ sin θ cos ϕ sin ϕ) 0, we should always take α = 0 so that the value is maximized. Then we have then wanted form d) Using the result of c), we have b = cos ϕ 0 + sin ϕ, b = sin ϕ 0 cos ϕ. Pr b ψ ) + Pr b ψ ) = b ψ + b ψ = cos ϕ + cos θ sin ϕ sin θ cos ϕ) = cos ϕ + sin ϕ θ) = + [cosϕ) cosϕ θ)] = + sinθ ϕ) sin θ + sin θ. Recall that we assume cos θ sin θ cos ϕ sin ϕ) 0, to make the inequality to become equality, we can take Then the basis ϕ = θ + 3π 4, θ 0, π). { b, b } = {cos ϕ 0 + sin ϕ, sin ϕ 0 cos ϕ } maximizes value ) for the pair ψ, ψ ), and the maximum is + sin θ. e) Since cos θ = ψ ψ, the previous results conclude that the maximum of value ) is and the basis that achieves the optimum is + sin θ = + ψ ψ, { b, b } = {U b, U b }, where U is defined in a) and { b, b } is defined in d). 3

Problem : Improving Wiesner s Quantum Money Consider the following six single-qubit states: { ψ = 0, ψ =, ψ 3 = +, ψ 4 =, ψ 5 = 0 + i, ψ 6 = 0 i }. Suppose we create a money scheme in which each bit of a bill s serial number is encoded into one of these six states, chosen uniformly at random so with probability /6 each) by the bank. a) Consider the attack on this scheme which attempts to copy the bill in the standard basis, using the unitary U : 0 0 0 0, U : 0. What is its success probability? Recall that the success probability is defined as 6 k= ψ k ψ k ) U ψ k 0 ). 6 What if we choose U to copy in the Hadamard basis instead? a) Can you improve on the attack described in the previous question? Give any attack that does better. [Bonus points: describe an attack with success probability /3.] b) Find a quantum money scheme which uses only four possible single-qubit states but is better than Wiesner s scheme i.e. the scheme which uses the four states { ψ = 0, ψ =, ψ 3 = +, ψ 4 = }), in the sense that the optimal attack has success probability < 3/4. You do not need to prove completely formally that your scheme is better than Wiesner s, but describe the four states you would use, and argue why you think it would be better than Wiesner s.) [Hint: Think about the Bloch sphere use all the available space!] Solution: Due to the TAs) a) By linearity, we can compute the action of U on all 6 quantum money states. U : ψ 0 0 0 ; U : ψ 0 U : + 0 0 0 + ) ; U : 0 0 0 ) U : ψ 5 0 0 0 + i ) ; U : ψ 6 0 0 0 i ) It is instructive to carry out each of the inner products in the sum by hand in full detail 0 0 U 0 0 U = 0 0 U 0 0 ) = U ) = 0 0 ) 0 0 ) = ) ) = 0 0 0 0 = = = ψ ψ U ψ 0 = ψ ψ U ψ 0 = 4

+ + U + 0 U 0 = + + ) 0 0 + ) = ) 0 0 ) = + 0 + 0 + + + ) = 0 0 ) = ) ) ) + = = ) ) ) = 0 ψ 3 ψ 3 U ψ 3 0 = ψ 4 ψ 4 U ψ 4 0 = 0 ψ 5 ψ 5 U ψ 5 0 ψ 6 ψ 6 U ψ 6 0 = ψ 5 ψ 5 ) 0 0 + i ) = ψ 6 ψ 6 ) 0 0 ) = ψ 5 0 ψ 5 0 + i ψ 5 ψ 5 ) = ψ 6 0 ψ 6 0 i ψ 6 ψ 6 ) = ) ) ) i + i = i = ) ) ) i i = + i ψ 5 ψ 5 U ψ 5 0 = 4 ψ 6 ψ 6 U ψ 6 0 = 4 The overall success probability is + + 6 + 0 + 4 + ) = 4. ) WHat if we copy in the Hadamard basis instead? First, we define the copying map: U : + + + + U : + We see that this definition is symmetric with respect to switching 0 with + and with. This symmetry is given concretely by the Hadamard change of basis. Let s examine the action of H on our money states H ψ = ψ 3 H ψ = ψ 4 H ψ 5 = ψ 5 H ψ 6 = ψ 6 3) To see these identities visually, recall that H is the rotation by π about the X + Z axis on the Bloch sphere. Note that since H = H, the corresponding identities for bras hold. ψ H = ψ 3 ψ H = ψ 4 ψ 5 H = ψ 5 ψ 6 H = ψ 6 5

All of this suggests that we should be able to express U in terms of U and H. Let s rewrite with the equations defining U in terms of H and the standard basis. U 0 0 = 0 0 = UH H) + + = H H) + + 4) Multiplying both sides of this equation by H H) gives us that H H)UH H) acts on + + in the same way as U. In fact, these two maps also have the same action on 0. Now we can apply this symmetry term-by-term: ψ k ψ k U ψ k + = ψ k ψ k H H)UH H) ψ k + = ψ k ψ k U ψ k 0 The map k k is the permutation given in 3). Therefore, we can derive the below equality by rearranging terms. 6 6 ψ k ψ k U ψ k 0 = 6 k= 6 ψ k ψ k U ψ k 0 =. 5) k= b) For a scheme achieving, see []. 3 c) Suppose that ψ and φ have an angle of θ between them when considered as points on the Bloch sphere. Then ψ φ = cos θ. The spatial distance between the points is sin θ. Therefore, any configuration which maximizes the sum of squares of pairwise distance between points on the Bloch sphere also minimizes the sum of pairwise overlaps of the corresponding qubits. In other words, this choice maximizes the distinguishability of the states. For four points, this arrangement is achieved by the tetrahedron. For any attack scheme, say given by a cptp map T, the distinguishability of the ψ k gives an upper bound on the distinguishability of the copied states T ψ k ψ k ). Problem 3: Quantum Teleportation In class we saw that the no-cloning theorem forbids us from copying arbitrary quantum states, i.e. implementing a unitary U that takes ψ 0 ψ ψ for any state ψ. a) In general show that if there exists a unitary U taking Ψ Φ, there must exist another unitary V independent of Ψ and Φ that takes Φ Ψ. In other words, no information is lost when applying a unitary to a quantum state. b) Suppose Alice holds a qubit in the state ψ = a 0 + b and wants Bob to have that state as well. Why doesn t the following work? Alice measures her qubit in some basis of her choice, then prepares another qubit in the state she obtains and sends that to Bob. Please answer without making explicit use of the no-cloning theorem.) We now introduce a scheme by which Alice can prepare ψ on Bob s side without sending him her qubit in fact, without sending any quantum information at all! provided they share a Bell 6

state. To be precise, the initial setup is as follows: Alice holds ψ S, and Alice and Bob each have a qubit of φ + = ) 0 A 0 AB B + A B, so that the joint state of all three qubits is Ψ SAB = ψ S φ + AB = a 0 S + b S ) 00 AB + AB ). 6) c) As with a single qubit, any state of a two-qubit system can be written in terms of an orthonormal basis, and also measured in such a basis. One example is the computational basis { 00, 0, 0, }. Find a state ψ that, together with the following three states, φ + = 00 AB + AB ), ψ + = 0 AB + 0 AB ), φ = 00 AB AB ) ψ forms an orthonormal basis of the two-qubit space C 4. This basis is called the Bell basis. d) Rewrite the joint state 6) as a linear combination of the form 4 i= α i SA β i B, where α ranges over the four possible Bell states on Alice s two qubits S and A, and β is a single-qubit state on Bob s qubit. e) Suppose Alice measures her two qubits SA in the Bell basis and sends the result to Bob. Show that for each of the four possible outcomes, Bob can use this classical!) information to determine a unitary, independent of ψ S, on his qubit that will map it, in all cases, to the original state ψ B that Alice had. Solution: Due to Mandy Huang) a) Suppose there exists a unitary U mapping Ψ Φ. Since U is unitary, we have U = U is unitary, so the operator V := U is a unitary operator which maps Φ Ψ. b) If Alice measures ψ in a basis of her choice, then ψ will collapse to some eigenstate of the basis so if she reproduces this state and sends it to Bob, Bob will have a state that is different than the original state unless ψ happens to be an element of the basis in which Alice is measuring. c) Let ψ = 0 0 ). Then ψ ± ψ ± = + ) = φ± φ ± = + ) = ψ ψ ± = ) = 0 φ φ ± = ) = 0 ψ + φ ± = 0 φ + ψ ± = 0 7

d) Note Ψ SAB = a 0 S + b S ) ) 00 AB + AB ) = a 000 SAB + b 00 SAB + a 0 SAB + b SAB ) and φ + + φ ) = 00 ψ + + ψ ) = 0 φ + φ ) = ψ + ψ ) = 0 Then we have Ψ SAB = a φ + + φ ) 0 + b ψ + ψ ) 0 + a ψ + + ψ ) + b φ + φ ) ) = φ + a 0 + b ) + φ a 0 b ) + ψ + b 0 + a ) + ψ b 0 + a ) ) e) From part d) The possible outcomes are φ +, φ, ψ +, and ψ in which case Bob s qubit is a 0 + b, a 0 b, b 0 + a, and b 0 + a, respectively. If Alice measures φ + then Bob should apply the identity. ) 0 If Alice measures φ then Bob should apply Z =. 0 ) 0 If Alice measures φ then Bob should apply X =. 0 ) 0 If Alice measures φ then Bob should apply ZX =. 0 References [] Abel Molina, Thomas Vidick, and John Watrous. Optimal counterfeiting attacks and generalizations for Wiesner s quantum money. In: Conference on Quantum Computation, Communication, and Cryptography. Springer. 0, pp. 45 64. 8