* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Download Introduction to Quantum Computation
Bra–ket notation wikipedia , lookup
Ensemble interpretation wikipedia , lookup
Renormalization wikipedia , lookup
Wave–particle duality wikipedia , lookup
Renormalization group wikipedia , lookup
Topological quantum field theory wikipedia , lookup
Basil Hiley wikipedia , lookup
Scalar field theory wikipedia , lookup
Relativistic quantum mechanics wikipedia , lookup
Bohr–Einstein debates wikipedia , lookup
Double-slit experiment wikipedia , lookup
Particle in a box wikipedia , lookup
Theoretical and experimental justification for the Schrödinger equation wikipedia , lookup
Delayed choice quantum eraser wikipedia , lookup
Quantum field theory wikipedia , lookup
Quantum decoherence wikipedia , lookup
Path integral formulation wikipedia , lookup
Quantum dot wikipedia , lookup
Coherent states wikipedia , lookup
Bell test experiments wikipedia , lookup
Density matrix wikipedia , lookup
Copenhagen interpretation wikipedia , lookup
Hydrogen atom wikipedia , lookup
Quantum fiction wikipedia , lookup
Measurement in quantum mechanics wikipedia , lookup
Many-worlds interpretation wikipedia , lookup
Orchestrated objective reduction wikipedia , lookup
Quantum electrodynamics wikipedia , lookup
Symmetry in quantum mechanics wikipedia , lookup
Quantum entanglement wikipedia , lookup
History of quantum field theory wikipedia , lookup
Probability amplitude wikipedia , lookup
Quantum group wikipedia , lookup
Quantum computing wikipedia , lookup
Quantum machine learning wikipedia , lookup
Interpretations of quantum mechanics wikipedia , lookup
Canonical quantization wikipedia , lookup
Bell's theorem wikipedia , lookup
Quantum cognition wikipedia , lookup
Quantum state wikipedia , lookup
EPR paradox wikipedia , lookup
Hidden variable theory wikipedia , lookup
Introduction to Quantum Computation Andris Ambainis University of Latvia What is quantum computation? New model of computing based on quantum mechanics. Quantum circuits, quantum Turing machines More powerful than conventional models. Quantum algorithms Factoring: given N=pq, find p and q. 1/3) O(n Best algorithm 2 , n -number of digits. Many cryptosystems based on hardness of factoring. O(n2) time quantum algorithm [Shor, 1994] Similar quantum algorithm solves discrete log. Quantum algorithms 0 1 0 ... 0 x1 x2 x3 xn Find if there exists i for which xi=1. Queries: input i, output xi. Classically, n queries. Quantum, O(n) queries [Grover, 1996]. Speeds up exhaustive search. Quantum cryptography Key distribution: two parties want to create a secret shared key by using a channel that can be eavesdropped. Classically: secure if discrete log hard. Quantum: secure if quantum mechanics valid [Bennett, Brassard, 1984]. No extra assumptions needed. Quantum communication Dense coding: 1 quantum bit can encode 2 classical bits. Teleportation: quantum states can be transmitted by sending classical information. Quantum protocols that send exponentially less bits than classical. Experiments ~10 different ideas how to implement QC. NMR, ion traps, optical, semiconductor, etc. 7 quantum bit QC [Knill et.al., 2000]. QKD has been implemented. Outline Today: basic notions, quantum key distribution. Tomorrow: quantum algorithms, factoring. Friday: current research in quantum cryptography, coin flipping. Model Quantum states Unitary transformations Measurements Quantum bit |1> |0> 2-dimensional vector of length 1. Basis states |0>, |1>. Arbitrary state: |0>+|1>, , complex, ||2+ ||2=1. Physical quantum bits Nuclear spin = orientation of atom’s nucleus in magnetic field. = |0>, = |1>. Photons in a cavity. No photon = |0>, one photon = |1> Physical quantum bits (2) Energy states of an atom |0> ground state |1> excited state Polarization of photon Many others. General quantum states k-dimensional quantum system. Basis |1>, |2>, …, |k>. General state 1|1>+2|2>+…+k|k>, |1|^2+…+ |k|^2=1 2k dimensional system can be constructed as a tensor product of k quantum bits. Unitary transformations Linear transformations that preserve vector norm. In 2 dimensions, linear transformations that preserve unit circle (rotations and reflections). Examples Bit flip | 0 | 1 | 1 | 0 Hamamard transform 1 | 0 2 | 0 1 | 1 |0 2 1 2 1 2 |1 |1 Linearity Bit flip |0>|1> |1>|0> By linearity, |0>+|1> |1>+|0> Sufficient to specify U|0>, U|1>. Examples |1> 1 2 1 |0 2 |1 |0> 1 2 |0 1 2 |1 Measurements Measuring |0>+|1> in basis |0>, |1> gives: 0 with probability | |2, 1 with probability | |2. Measurement changes the state: it becomes |0> or |1>. Repeating measurement gives the same outcome. Measurements |0> Probability 1/2 1 2 |0 1 |1> Probability 1/2 2 |1 General measurements Let |0>, | 1> be two orthogonal one-qubit states. Then, |> = 0|0> + 1|1>. Measuring | > gives | i> with probability |i|2. This is equivalent to mapping |0>, | 1> to |0>, |1> and then measuring. Measurements 1 2 1 2 |0 1 2 |1 Probability 1 |0 1 2 |1 Measurements |1> 1 1 2 |0 1 |1 2 Probability 1/2 2 |0 Probability 1/2 1 2 |1 Measurements Measuring 1|1>+2|2>+…+k|k> in the basis |1>, |2>, …, |k> gives |i> with probability |i|2. Any orthogonal basis can be used. Partial measurements Example: two quantum bits, measure first. 1 1 1 2 00 2 2 | 00 2 10 Result 1 Result 0 1 01 1 2 | 01 | 10 Classical vs. Quantum Classical bits: can be measured completely, are not changed by measurement, can be copied, can be erased. Quantum bits: can be measured partially, are changed by measurement, cannot be copied, cannot be erased. Copying One nuclear spin Two spins ? Impossible! Related to impossiblity of measuring a state perfectly. No-cloning theorem Imagine we could copy quantum states. | 0 | 0 | 0 | 1 | 1 | 1 Then, by linearity 1 2 |0 1 2 | 1 1 2 | 0 | 0 1 2 | 1 | 1 Not the same as two copies of |0>+|1>. Key distribution Alice and Bob want to create a shared secret key by communicating over an insecure channel. Needed for symmetric encryption (onetime pad, DES etc.). Key distribution Can be done classically. Needs hardness assumptions. Impossible classically if adversary has unlimited computational power. Quantum protocols can be secure against any adversary. The only assumption: quantum mechanics. BB84 states |> = |1> 1 2 | >= | >= |0 1 2 1 2 |0 |1 |> = |0> 1 2 |1 BB84 QKD Alice ... Bob ... No Yes Yes ... Yes ... 0 0 1 BB84 QKD Alice sends n qubits. Bob chooses the same basis n/2 times. If there is no eavesdropping/transmission errors, they share the same n/2 bits. Eavesdropping Assume that Eve measures some qubits in , | basis and resends them. If the qubit she measures is |> or |>, Eve resends a different state ( or | ). If Bob chooses |>, |> basis, he gets each answer with probability 1/2. With probability 1/2, Alice and Bob have different bits. Eavesdropping Theorem: Impossible to obtain information about non-orthogonal states without disturbing them. In this protocol: Check for eavesdropping Alice randomly chooses a fraction of the final string and announces it. Bob counts the number of different bits. If too many different bits, reject (eavesdropper found). If Eve measured many qubits, she gets caught. Next step Alice and Bob share a string most of which is unknown to Eve. Eve might know a few bits. There could be differences due to transmission errors. Classical post-processing Information reconciliation: Alice and Bob apply error correcting code to correct transmission errors. They now have the same string but small number of bits might be known to Eve. Privacy amplification: apply a hash function to the string. QKD summary Alice and Bob generate a shared bit string by sending qubits and measuring them. Eavesdropping results in different bits. That allows to detect Eve. Error correction. Privacy amplification (hashing). Eavesdropping models Simplest: Eve measures individual qubits. Most general: coherent measurements. Eve gathers all qubits, performs a joint measurement, resends. Security proofs Mayers, 1998. Lo, Chau, 1999. Preskill, Shor, 2000. Boykin et.al., 2000. Ben-Or, 2000. EPR state 1 2 1 | 0 | 0 2 | | 1 2 1 | 1 | 1 2 | | • First qubit to Alice, second to Bob. • If they measure, same answers. • Same for infinitely many bases. Bell’s theorem Alice’s basis: |1> cos x 0 sin x 1 sin x 0 cos x 1 Bob’s basis: y instead of x. |0> Bell’s theorem Pr[b=0] Pr[b=1] Pr[a=0] 1 cos 2 x y 2 1 sin 2 x y 2 Pr[a=1] 1 2 sin x y 2 1 cos 2 x y 2 Classical simulation Alice and Bob share random variables. Someone gives to them x and y. Can they produce the right distribution without communication? Bell’s theorem Classical simulation impossible: 3 x , , 4 4 3 y , 4 4 Bell’s inequality: constraint satisfied by any result produced by classical randomness. Ekert’s QKD Alice generates n states 1 2 | 0 | 0 1 2 | 1 | 1 sends 2nd qubits to Bob. They use half of states for Bell’s test. If test passed, they error-correct/amplify the rest and measure. Equivalence In BB84 protocol, Alice could prepare the state 1 1 1 1 0 1 2 3 2 2 2 2 keep the first register and send the second to Bob. Ekert and BB84 states UI BB E 1 2 | 0 | 0 1 | 1 | 1 2 1 1 1 1 0 1 2 3 2 2 2 2 1 1 1 U | 0 2 0 2 2 2 3 1 1 1 U | 1 1 2 3 2 2 2 QKD summary Key distribution requires hardness assumptions classically. QKD based on quantum mechanics. Higher degree of security. Showed two protocols for QKD. QKD implementations First: Bennett et.al., 1992. Currently: 67km, 1000 bits/second. Commercially available: Id Quantique, 2002. Next lectures Tomorrow: quantum algorithms for factoring. Friday: quantum coin flipping.