Title: Quanum computing
1Quanum computing
2What is quantum computation?
- New model of computing based on quantum
mechanics. - Quantum circuits, quantum Turing machines
- More powerful than conventional models.
3Quantum algorithms
- Factoring given Npq, find p and q.
- Best algorithm 2O(n1/3), n -number of digits.
- Many cryptosystems based on hardness of
factoring. - O(n2) time quantum algorithm Shor, 1994
- Similar quantum algorithm solves discrete log.
4Quantum algorithms
...
0
1
0
0
x1
x2
xn
x3
- Find if there exists i for which xi1.
- Queries input i, output xi.
- Classically, n queries.
- Quantum, O(?n) queries Grover, 1996.
- Speeds up exhaustive search.
5Quantum cryptography
- Key distribution two parties want to create a
secret shared key by using a channel that can be
eavesdropped. - Classically secure if discrete log hard.
- Quantum secure if quantum mechanics valid
Bennett, Brassard, 1984. - No extra assumptions needed.
6Quantum communication
- Dense coding 1 quantum bit can encode 2
classical bits. - Teleportation quantum states can be transmitted
by sending classical information. - Quantum protocols that send exponentially less
bits than classical.
7Experiments
- 10 different ideas how to implement QC.
- NMR, ion traps, optical, semiconductor, etc.
- 7 quantum bit QC Knill et.al., 2000.
- QKD has been implemented.
8Outline
- Today basic notions, quantum key distribution.
- Tomorrow quantum algorithms, factoring.
- Friday current research in quantum cryptography,
coin flipping.
9Model
- Quantum states
- Unitary transformations
- Measurements
10Quantum bit
- 2-dimensional vector of length 1.
- Basis states 0gt, 1gt.
- Arbitrary state ?0gt?1gt, ?, ?
complex, ?2 ?21.
1gt
0gt
11Physical quantum bits
- Nuclear spin orientation of atoms nucleus in
magnetic field. - ? 0gt, ? 1gt.
- Photons in a cavity.
- No photon 0gt, one photon 1gt
12Physical quantum bits (2)
- Energy states of an atom
- Polarization of photon
- Many others.
0gt
1gt
ground state
excited state
13General quantum states
- k-dimensional quantum system.
- Basis 1gt, 2gt, , kgt.
- General state
- ?11gt?22gt?kkgt,
- ?12 ?k21
- 2k dimensional system can be constructed as a
tensor product of k quantum bits.
14Unitary transformations
- Linear transformations that preserve vector norm.
- In 2 dimensions, linear transformations that
preserve unit circle (rotations and reflections).
15Examples
- Bit flip
- Hamamard transform
16Linearity
- By linearity,
- ?0gt?1gt? ?1gt?0gt
- Sufficient to specify U0gt, U1gt.
17Examples
1gt
0gt
18Measurements
- Measuring ?0gt?1gt in basis 0gt, 1gt gives
- 0 with probability ?2,
- 1 with probability ? 2.
- Measurement changes the state it becomes 0gt or
1gt. - Repeating measurement gives the same outcome.
19Measurements
0gt
1gt
20General measurements
- Let ?0gt, ?1gt be two orthogonal one-qubit
- states.
- Then,
- ?gt ?0?0gt ?1?1gt.
- Measuring ?gt gives ?igt with probability
?i2. - This is equivalent to mapping ?0gt, ?1gt to 0gt,
1gt and then measuring.
21Measurements
Probability 1
22Measurements
1gt
23Measurements
- Measuring
- ?11gt?22gt?kkgt
- in the basis 1gt, 2gt, , kgt gives igt with
probability ?i2. - Any orthogonal basis can be used.
24Partial measurements
- Example two quantum bits, measure first.
25Classical vs. Quantum
- Classical bits
- can be measured completely,
- are not changed by measurement,
- can be copied,
- can be erased.
- Quantum bits
- can be measured partially,
- are changed by measurement,
- cannot be copied,
- cannot be erased.
26Copying
One nuclear spin ? Two spins
?
Impossible!
Related to impossiblity of measuring a state
perfectly.
27No-cloning theorem
- Imagine we could copy quantum states.
- Then, by linearity
- Not the same as two copies of 0gt1gt.
28Key distribution
- Alice and Bob want to create a shared secret key
by communicating over an insecure channel. - Needed for symmetric encryption (one-time pad,
DES etc.).
29Key distribution
- Can be done classically.
- Needs hardness assumptions.
- Impossible classically if adversary has unlimited
computational power. - Quantum protocols can be secure against any
adversary. - The only assumption quantum mechanics.
30BB84 states
?gt 1gt
? gt
? gt
?gt 0gt
31BB84 QKD
...
Alice
Bob
32BB84 QKD
- Alice sends n qubits.
- Bob chooses the same basis n/2 times.
- If there is no eavesdropping/transmission errors,
they share the same n/2 bits.
33Eavesdropping
- Assume that Eve measures some qubits in ???, ??
basis and resends them. - If the qubit she measures is ?gt or ?gt, Eve
resends a different state (??? or ?? ). - If Bob chooses ?gt, ?gt basis, he gets each
answer with probability 1/2. - With probability 1/2, Alice and Bob have
different bits.
34Eavesdropping
- Theorem Impossible to obtain information about
non-orthogonal states without disturbing them. - In this protocol
35Check for eavesdropping
- Alice randomly chooses a fraction of the final
string and announces it. - Bob counts the number of different bits.
- If too many different bits, reject (eavesdropper
found). - If Eve measured many qubits, she gets caught.
36Next step
- Alice and Bob share a string most of which is
unknown to Eve. - Eve might know a few bits.
- There could be differences due to transmission
errors.
37Classical post-processing
- Information reconciliation Alice and Bob apply
error correcting code to correct transmission
errors. - They now have the same string but small number of
bits might be known to Eve. - Privacy amplification apply a hash function to
the string.
38QKD summary
- Alice and Bob generate a shared bit string by
sending qubits and measuring them. - Eavesdropping results in different bits.
- That allows to detect Eve.
- Error correction.
- Privacy amplification (hashing).
39Eavesdropping models
- Simplest Eve measures individual qubits.
- Most general coherent measurements.
- Eve gathers all qubits, performs a joint
measurement, resends.
40Security proofs
- Mayers, 1998.
- Lo, Chau, 1999.
- Preskill, Shor, 2000.
- Boykin et.al., 2000.
- Ben-Or, 2000.
41EPR state
- First qubit to Alice, second to Bob.
- If they measure, same answers.
- Same for infinitely many bases.
42Bells theorem
- Alices basis
- Bobs basis y instead of x.
1gt
0gt
43Bells theorem
Prb0
Prb1
Pra0
Pra1
44Classical simulation
- Alice and Bob share random variables.
- Someone gives to them x and y.
- Can they produce the right distribution without
communication?
45Bells theorem
- Classical simulation impossible
- Bells inequality constraint satisfied by any
result produced by classical randomness.
46Ekerts QKD
- Alice generates n states
- sends 2nd qubits to Bob.
- They use half of states for Bells test.
- If test passed, they error-correct/amplify the
rest and measure.
47Equivalence
- In BB84 protocol, Alice could prepare the state
- keep the first register and send the second to
Bob.
?
?
?
?
48Ekert and BB84 states
?
?
?
?
49QKD summary
- Key distribution requires hardness assumptions
classically. - QKD based on quantum mechanics.
- Higher degree of security.
- Showed two protocols for QKD.
50QKD implementations
- First Bennett et.al., 1992.
- Currently 67km, 1000 bits/second.
- Commercially available Id Quantique, 2002.
51Quantum Factoring
52Quantum Algorithms
- Quantum Algorithms should exploit quantum
parallelism and quantum interference. - We have already seen some elementary algorithms.
53Quantum Algorithms
- These algorithms have been computing essentially
classical functions on quantum superpositions - This encoded information in the phases of the
basis states measuring basis states would
provide little useful information - But a simple quantum transformation translated
the phase information into information that was
measurable in the computational basis
54Extracting phase information with the Hadamard
operation
55Overview
- Quantum Phase Estimation
- Eigenvalue Kick-back
- Eigenvalue estimation and order-finding/factoring
- Shors approach
- Discrete Logarithm and Hidden Subgroup Problem
(if theres time)
56Quantum Phase Estimation
- Suppose we wish to estimate a number given
the quantum state
- Note that in binary we can express
57Quantum Phase Estimation
- Since for any integer k, we have
58Quantum Phase Estimation
- If then we can do the following
59Useful identity
60Quantum Phase Estimation
- So if then we can do the following
61Quantum Phase Estimation
- So if then we can do the following
62Quantum Phase Estimation
- Generalizing this network (and reversing the
order of the qubits at the end) gives us a
network with O(n2) gates that implements
63Discrete Fourier Transform
- The discrete Fourier transform maps vectors of
dimension N by transforming the elementary
vector according to
- The quantum Fourier transform maps vectors in a
Hilbert space of dimension N according to
64Discrete Fourier Transform
- Thus we have illustrated how to implement (the
inverse of) the quantum Fourier transform in a
Hilbert space of dimension 2n
65Estimating arbitrary
- What if is not necessarily of the form for
some integer x?
- The QFT will map to a superposition
where
66Quantum Phase Estimation
67Eigenvalue kick-back
68Eigenvalue kick-back
- Consider a unitary operation U with eigenvalue
and eigenvector
69Eigenvalue kick-back
70Eigenvalue kick-back
- As a relative phase, becomes measurable
71Eigenvalue kick-back
- If we exponentiate U, we get multiples of
72Eigenvalue kick-back
73Eigenvalue kick-back
74Phase estimation
75Eigenvalue estimation
76Eigenvalue estimation
77Eigenvalue estimation
- Given with eigenvector and eigenvalue we
thus have an algorithm that maps
78Eigenvalue kick-back
- Given with eigenvectors and respective
eigenvalues we thus have an algorithm that
maps
and therefore
79Eigenvalue kick-back
- Measuring the first register of
is equivalent to measuring with probability
80Example
- Suppose we have a group and we wish to find
the order of (I.e. the smallest
positive such that ) - If we can efficiently do arithmetic in the group,
then we can realize a unitary operator
that maps - Notice that
- This means that the eigenvalues of are of
the form where k is an integer
81(Aside more on reversible computing)
If we know how to efficiently compute and
then we can efficiently and reversibly map
82(Aside more on reversible computing)
And therefore we can efficiently map
83Example
- Let
- Then
- We can easily implement, for example,
- The eigenvectors of include
84Example
85Example
86Example
87Example
88Example
89Eigenvalue Kickback
90Eigenvalue Kickback
91Eigenvalue Kickback
92Eigenvalue Kickback
93Quantum Factoring
- The security of many public key cryptosystems
used in industry today relies on the difficulty
of factoring large numbers into smaller factors. - Factoring the integer N into smaller factors can
be reduced to the following task
Given integer a, find the smallest positive
integer r so that
94Example
- Let
- We can easily implement
- The eigenvectors of include
95Example
96Example
97Eigenvalue kick-back
- Given with eigenvectors and respective
eigenvalues we thus have an algorithm that
maps
and therefore
98Eigenvalue Estimation
99Eigenvalue kick-back
- Measuring the first register of
is equivalent to measuring with probability
100Finding r
For most integers k, a good estimate of (with
error at most ) allows us to determine r
(even if we dont know k). (using continued
fractions)
101(aside how does factoring reduce to
order-finding??)
- The most common approach for factoring integers
is the difference of squares technique - Randomly find two integers x and y satisfying
- So N divides
- Hope that is non-trivial
- If r is even, then let
- so that
102Shors approach
- This eigenvalue estimation approach is not the
original approach discovered by Shor - Kitaev developed an eigenvalue estimation
approach (to the more general Hidden Stabilizer
Problem) - Weve presented the CEMM version here
103Discrete Fourier Transform
- The discrete Fourier transform maps uniform
periodic states, say with period r dividing N,
and offset w, to a periodic state with period N/r.
104Discrete Fourier Transform
- The quantum Fourier transform maps vectors in a
Hilbert space of dimension N according to
105Shors Factoring Algorithm
106Network for Shors Factoring Algorithm
107Eigenvalue Estimation Factoring Algorithm
108Network for Eigenvalue Estimation Factoring
Algorithm
109Equivalence of ShorCEMM
- Shor analysis CEMM analysis
110Equivalence of ShorCEMM
- Shor analysis CEMM analysis
111 Discrete Logarithm Problem
Consider two elements from a group G
satisfying Find s.
112Discrete Logarithm Problem
We know has eigenvectors
113Discrete Logarithm Problem
Thus has the same eigenvectors but
with eigenvalues exponentiated to the power of s
114Discrete Logarithm Problem
115Discrete Logarithm Problem
Given k and ks, we can compute s mod r (provided
k and r are coprime)
116Abelian Hidden Subgroup Problem
Find generators for
117Network for AHS
118AHS Algorithm in standard basis
119AHS for in eigenbasis
(Simons Problem)
is an eigenvector of
120Other applications of Abelian HSP
- Any finite Abelian group G is the direct sum of
finite cyclic groups - But finding generators
satisfying is not always easy, e.g. for
its as hard as factoring N - Given any polynomial sized set of generators, we
can use the Abelian HSP algorithm to find new
generators that decompose G into a direct sum of
finite cyclic groups.
121Examples
Deutschs Problem
or
Order finding
any group
122Example
Discrete Log of to base
any group
123Examples
Self-shift equivalences
124What about non-Abelian HSP
- Consider the symmetric group
- Sn is the set of permutations of n elements
- Let G be an n-vertex graph
- Let
- Define
- Then
- where
125Graph automorphism problem
- So the hidden subgroup of is the
automorphism group of G - This is a difficult problem in NP that is
believed not to be in BPP and yet not
NP-complete. -
126Other
- Progress on the Hidden Subgroup Problem in
non-Abelian groups (not an exhaustive list) - Ettinger, Hoyer arxiv.gov/abs/quant-ph/9807029
- Roetteler,Beth quant-ph/9812070
- Ivanyos,Magniez,Santha arxiv.org/abs/quant-ph/0102
014 - Friedl,Ivanyos,Magniez,Santha,Sen
quant-ph/0211091 (Hidden Translation and Orbit
Coset in Quantum Computing) they show e.g. that
the HSP can be solved for solvable groups with
bounded exponent and of bounded derived series - Moore,Rockmore,Russell,Schulman, quant-ph/0211124
127(No Transcript)