An introduction to quantum computing gosn203 ai gosn204 os
This presentation is the property of its rightful owner.
Sponsored Links
1 / 116

An Introduction to Quantum Computing GOSN203 (AI); GOSN204 (OS) PowerPoint PPT Presentation


  • 38 Views
  • Uploaded on
  • Presentation posted in: General

An Introduction to Quantum Computing GOSN203 (AI); GOSN204 (OS). Professor John FULCHER Christopher Newport University April 2004. …the story so far:. References :

Download Presentation

An Introduction to Quantum Computing GOSN203 (AI); GOSN204 (OS)

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


An introduction to quantum computing gosn203 ai gosn204 os

An Introduction to Quantum ComputingGOSN203 (AI); GOSN204 (OS)

Professor John FULCHER

Christopher Newport University

April 2004


The story so far

…the story so far:

  • References:

    • * E. Riefel & W. Polak (2000) “An Introduction to Quantum Computing for Non-Physicists” ACM Computing Surveys22(3) 300-335 * HANDOUT#1

    • * J. Mullins (2002) “Making Unbreakable Code” IEEE Spectrum May 40-45. * HANDOUT#2

    • http://www.pcs.cnu.edu/~mzhang/PCS450_550/QuantumComp1(2).ppt (Lecture Notes: MS-PowerPoint)

    • C. Bennett, G. Brassad & A. Ekert (1992) “Quantum Cryptography” Scientific American267(4) 26-33

    • C. Williams & S. Clearwater (1998) Explorations in Quantum Computing Springer (+ CDROM – Mathematica)


Key quantum phenomena

Key Quantum Phenomena

  • Key Quantum Computing Phenomena:

    • 1. Superposition of all possible states simultaneously. Hence an n-Qubit memory register can exist in a superposition of all 2n possible configurations: |f> = a|0> + b|1>

      • i.e. a Quantum Computer = a massively parallel computer (however, it is impossible to observe these parallel computations individually).


Key quantum phenomena1

Key Quantum Phenomena

  • Key Quantum Computing Phenomena:

    • 2. Interference – since a QC can work on several classical inputs at once, they can interfere with/influence one another (either constructively or destructively):

    • |f> = |0 1> + |1 0>

      •  a net computational state that reveals a joint/collective property of all the computations i.e. quantum parallelism.


Key quantum phenomena2

Key Quantum Phenomena

  • Key Quantum Computing Phenomena:

    • 3. Entanglement – 2 or more Qubits emerge from an interaction in a definite joint quantum state that cannot be expected in terms of a product of definite individual quantum states: |f> = |0 1> + |1 0>

      • Moreover, they retain a lingering, instantaneous influence on each other, irrespective of their distance of separation  quantum teleportation(for which there is no classical counterpart!); quantum factoring relies on entanglement to create a repeating sequence of numbers whose period reveals the factors of a large integer.


Key quantum phenomena3

Key Quantum Phenomena

  • Key Quantum Computing Phenomena:

    • 4. Non-determinism = inability to predict the quantum state into which a superposed state will collapse upon being measured

      •  quantum key distribution, which relies on non-determinism to guarantee that any eavesdropping will be detected.


Key quantum phenomena4

Key Quantum Phenomena

  • Key Quantum Computing Phenomena:

    • 5. Non-clonability, since it is impossible to copy an unknown quantum state exactly (Heisenberg Uncertainty Principle).

      • It is impossible to measure pairs of quantities simultaneously (e.g. position & momentum)  quantum cryptography relies on non-clonability to guarantee security.


Key quantum phenomena5

Key Quantum Phenomena

  • Key Quantum Computing Phenomena:

    • 6. Non-locality: quantum teleportation relies on non-locality (as well as entanglement) to disassemble and re-assemble the quantum state to be teleported.


Key quantum phenomena6

Key Quantum Phenomena

  • Key Quantum Computing Phenomena:

    • 7. reversible: and thus no power dissipation:

    • H |in> = |out>; H -1 |out> = |in>

    • An operation is logically reversible if it can be undone (run backwards) – i.e. if its inputs can always be deduced from the outputs.

      • cf. classical computations, which are irreversible & thus dissipative.


Quantum spin states

Quantum Spin States

  • 2-state quantum system used to encode a Qubit:

    • The (solid) angle between the vector & the vertical axis (= phase) is determined by the relative contributions of the |y0> and |y1> (eigen)states


Q where s the power in qc s a superposition

Q: Where’s the power in QCs?A: Superposition

  • Superposition = simultaneous existence in many states, not just |0>and |1> but:

    • Qubit:phase = (solid) q magnitude = c0|0> + c1|1>

    • where probabilities |c0|2 + |c1|2 = 1 (i.e. 100%)

    • & |ci| = sqrt (xi2 + yi2) (i.e. complex numbers)

q


Quantum gates

Quantum Gates

  • Any quantum computation can be reduced to a sequence of 1 and 2 qubit operations:

    • H |in> = H1 H2 H3 .... Hn|in>

  • Conventional operations: NOT , AND

  • Quantum operations: qNOT , CNOT


  • Quantum gates1

    Quantum Gates

    • e.g. a root(NOT) gate:

    |input>

    |output> = NOT |input>

    rootNOT

    rootNOT

    superposition of bits

    (thus unlike any classical gate)


    W alsh h adamard gate

    Walsh-Hadamard Gate

    • e.g. if we apply the WH-gate to each of nqubits individually, we obtain the superposition of the 2n numbers that can be represented in n bits.

      • Thus we can effectively load exponentially many (2n) numbers into a quantum computer using only polynomial many (n) basic gate operations.


    Controlled not gate

    Controlled-NOT Gate

    • A particular 2-qubit gate is of paramount importance in quantum computing, & this is the controlled-NOT gate:

      • UCN|00> = |00>

      • UCN|01> = |01>

      • UCN|10> = |11>

      • UCN|11> = |10>

        • ie. apply NOT to (flip) second bit if firstqubit = 1.

    |x>

    |x>

    |y>

    |x xor y>


    Controlled not gate1

    Controlled-NOT Gate

    • NOTE that this operation involves no measurements whatsoever – i.e. we do not need to measurequbits in order to bring about “controlled” operations.

    |x>

    |x>

    xor:

    control

    10 1 not

    0 1 1

    |y>

    |x xor y>


    Universal quantum gates

    Universal Quantum Gates

    • Universal Gates: the (infinite) set of all 1-qubit rotations, together with the controlled-NOT gate, is enough to achieve any imaginable quantum computation.

    • i.e. we can perform anyquantum computation by connecting just 1-qubit rotation gates and controlled-NOT gates (cf. any classical computation can be realized using just AND and NOT gates)

      • Barenco (1995) and DiVincenzo (1995) independently showed that a 2-qubit gate is universal for quantum computation.


    Reversible computation

    Reversible Computation

    • Quantum realizations of sets of reversible gates which are universal for all Boolean circuits.

      • Recall that a quantum circuit is composed of quantum wires & elementary quantum gates; each wire represents a path of a single qubit & is described by a state in the 2D Hilbert SpaceC2.


    Quantum calculus

    Quantum Calculus

    • A Hilbert Space is a mathematical model for representing state space vectors.

    • The state of a quantum system can be described by a column vector (|y> “ket”) in a Hilbert Space of wave functions.

      • As the system evolves, its state vector rotates with its base anchored to the origin of the axes.


    Tensor products

    Tensor Products

    • Systems of more than onequbit need a Hilbert Space which captures the interaction (entanglement) of the qubits.

    • A 2-qubit system can be represented by a unit vector in the tensor product of 2 copies of C2 (i.e. the space C2C2).


    Quantum calculus1

    Quantum Calculus

    • In general, a system containing exactly n >= 2 qubits is represented by n copies of C2tensored together. Thus the state space is 2n-dimensional.

    • Now in contrast to a classical system, which can be completely defined by describing the state of each individual component, in a quantum system, the state cannot always be described by considering only the component pieces.


    Entangled states

    Entangled States

    • e.g. the state 1/root(2)(|00> + |11>) cannot be decomposed into separate states for each of the 2 qubits.

      • i.e. we cannot express this state as a tensor product of two single qubits.

    • A state that can’t be expressed as a tensor product is called an entangled state.


    Not covered in lectures

    Not covered in lectures…

    • Quantum Memory Registers

    • Quantum Error Correction

      • Symmetry, entanglement, “ancilla” qubits (Shor)

    • Fault tolerant (Quantum) Computers

    • [ref. Handout#1, references]


    This lecture

    This Lecture…

    • Quantum Algorithms

    • Quantum Key Distribution

    • (Teleportation)?

    • Quantum Computer Hardware

    • QC Applications (OS; AI)?


    Quantum parallelism

    Quantum Parallelism

    • The principal advantage of a quantum computer over a classical computer is that it can use a technique called quantum parallelism to compute certain joint properties of several superposed computations

      • (several answers to different classical computation) in the time it takes a classical computer to find just one of these answers…


    Quantum parallelism1

    Quantum Parallelism

    • …moreover, the quantum computer can do this without needing to reveal the answer to any one of those computations individually.

    • This gives the quantum computer the potential to be vastly more efficient than a classical computer at certain computational tasks.


    Quantum algorithms

    Quantum Algorithms

    • 1. The Deutsch-Jozsa problem: Is a boolean function f:{0,1}  {0,1} even(i.e. always gives the same output) and/or balanced(gives one output on half of the inputs, & another output on the other half)?

      • Exploits superpositionwithout need for measurement

    • 2. Simon (1994): a quantum memory register could be used to evolve into a superposition representing the Fourier Transform.

      • Measurement  sample  period (of sines, cosines)


    Quantum algorithms1

    Quantum Algorithms

    • 3. Shor (1994): factoring of large composite integers can be achieved by finding the period (= QC’s “killer app”lication)

      • exploits a technique similar to Simon’s Fourier Transform sampling.

    • 4. Grover (1996) showed that unstructured search can be solved with bounded probability in O(rootN) on a Quantum Computer.


    1 deutsch joza problem

    1. Deutsch-Joza Problem

    • The Deutsch-Jozsa problem: Consider a boolean function f :{0,1} -> {0,1}.

    • Is f(0) = f(1) or f(0) not= f(1)?

      • Classical test: 2 computations & 1 comparison.

      • Can we do better on a QC? Yes!

      • The key to a Quantum Computer solution is that we do not need to actually calculatef(x), simply determine whether they are the same.


    1 deutsch joza problem1

    1. Deutsch-Joza Problem

    • Suppose we possess a quantum “black box” which computes ‘f’ (a big if!)

      • Consider the transformation Uf which applies to 2 qubits |x> and |y> and produces |x>|y mod2f(x)).

      • This transformation flips the second bit if f acting on the first bit is 1, & does nothing if f acting on the first qubit is 0.


    1 deutsch joza problem2

    1. Deutsch-Joza Problem

    • Now since the black box is “quantum”, we can choose the input state to be a superposition of |0> and |1>, say 1/root2(|0>+|1>) and 1/root2(|0>-|1>)…

      • Perform a measurement that projects the first qubit onto the basis 1/root2(|0>+|1>), 1/root2(|0>-|1>)

      • we will obtain 1/root2(|0>+|1>) if the function is balanced, 1/root2(|0>-|1>) if not.


    1 deutsch joza problem3

    1. Deutsch-Joza Problem

    • We can achieve this because a quantum computer can be in a blend of states: we can compute f(0) and f(1), but more importantly, extract information about f which tells us whether f(0) is equal to f(1) or not.


    1 deutsch joza problem4

    1. Deutsch-Joza Problem

    • Solution of the Deutsch-Jozsa problem on a quantum computer:

      • Step#1. Initialize the 2-qubit register in the state |0>|1>.

      • Step#2. Apply the Walsh-Hadamard operation W to each qubit:|0>|1>  1/root2(|0> + |1>) superimposed with 1/root2(|0> - |1>)


    1 deutsch joza problem5

    1. Deutsch-Joza Problem

    • Solution of the Deutsch-Jozsa problem on a quantum computer:

      • Step#3. Apply the operation U(which requires f to be evaluated once only):1/root2(|0> + |1>) superimposed with 1/root2(|0> - |1>)  1/root2((-1)f(0)|0> + (-1)f(1)|1>) superimposed with 1/root2(|0> - |1>)


    1 deutsch joza problem6

    1. Deutsch-Joza Problem

    • Solution of the Deutsch-Jozsa problem on a quantum computer:

      • Step#4. Apply the operation V(which does not require f to be evaluated):1/root2((-1)f(0)|0> + (-1)f(1)|1>) superimposed with 1/root2(|0> - |1>)  1/root2((-1)f(0)+(-1)f(1)|0> + (-1)f(0)-(-1)f(1)|1>) superimposed with 1/root2(|0> - |1>)


    1 deutsch joza problem7

    1. Deutsch-Joza Problem

    • Solution of the Deutsch-Jozsa problem on a quantum computer:

      • Step#5. Measure the bit value in the first qubit:

        • If it is 0, f(0) = f(1);

        • If it is 1, f(0) not= f(1).


    1 deutsch joza problem8

    1. Deutsch-Joza Problem

    • NOTE: in essence, this quantum algorithm exploits superposition and interference to extract a joint property of both function values – f(0) and f(1) – without having to calculate either function value explicitly.


    2 fourier transform on qc

    2. Fourier Transform on QC

    • Any mathematical function can be described as a weighted sum of certain basis (elementary) functions such as sines & cosines (or real & imaginary exponential functions): sin(x), sin(2x), …cos(x), cos(2x)…(the more terms, the better the approximation) Fourier Series

      • recall eiq = cos q + i sin q (circle)


    2 fourier transform on qc1

    2. Fourier Transform on QC

    • Fourier series = (integral) representation of continuous (linear) functions  Discrete Fourier Transform for sampled functions  Fast Fourier Transform (= a more efficient algorithm – 2n terms)

      • In Digital Signal Processing, the FFT transforms a signal from the time-domain to the frequency domain (& Inverse FFT from f-domain to t-domain)


    2 fourier transform on qc2

    2. Fourier Transform on QC

    • Observation: if a time-varying signal is very spiky, this means it can be represented by just a few sines & cosines, with precisely defined periods.


    2 fourier transform on qc3

    2. Fourier Transform on QC

    • D. Simon (1994): a quantum computation could cause the state of a quantum memory register to evolve into a superposition representing the Fourier Transform.

      • By reading this memory register, we would most likely obtain a result corresponding to where the probability amplitude was most highly concentrated – i.e. where the Fourier Transform is most strongly spiked.


    2 fourier transform on qc4

    2. Fourier Transform on QC

    • Thus a quantum measurement returns a sample from the Fourier Transform, which provides us with some information about the periodic sine & cosine functions which make up our original function.


    3 shor s factoring algorithm

    3. Shor’s Factoring Algorithm

    • P. Shor (AT&T) was wanting to demonstrate that a quantum computer could be used to solve a real problem, as opposed to the contrived problems demonstrated up to that time (mid 1990s).

    • Shor: if you can relate the (real) problem of finding the factors of a large composite integer to that of finding the period, then you can exploit a technique similar to Simon’s sampling of a FT.


    3 shor s factoring algorithm1

    3. Shor’s Factoring Algorithm

    • Shor (1994) showed that a quantum computer could be used to factor a large integer super-efficiently.

      • This was big news, especially in security & banking circles (since all of a sudden RSA public cryptography is rendered eminently breakable)!


    3 shor s factoring algorithm2

    3. Shor’s Factoring Algorithm

    • Multiplying large prime numbers together is computationally easy: e.g. 127 * 229 = ?

    • By contrast, no conventional (classical) polynomial algorithm exists for factoring large prime numbers (exhaustive search only)

      • (in fact it is thought to be practically impossible)  hence used as the basis for (RSA) public key cryptography. e.g. ? * ? = 29,083

        • & this is only for five digits – imagine 400, say!


    3 shor s factoring algorithm3

    3. Shor’s Factoring Algorithm

    • Classical Factoring Algorithms:

      • The time required to find the factors is strongly believed (but has never been proved) to be superpolynomial in log(n); i.e. as n increases, the worst case time grows faster than any power of log(n).

      • Quadratic Sieve was the best known technique in 1997  (network of 1,000 workstations).


    3 shor s factoring algorithm4

    3. Shor’s Factoring Algorithm

    • Shor’s exciting new result was that a quantum computer could factor in polynomial time – O[(ln n)3]  factoring of a 400-digit number in under 3 years (cf. 1010 years on a classical computer)!


    3 shor s factoring algorithm5

    3. Shor’s Factoring Algorithm

    Public Key Cryptography (RSA)

    P1  P2  C [easy] : t = P(N)

    C  P1  P2 [hard] : t = exp(N)

    Eg: Factorization of a 129-digit number

    (RSA-129) ~2000 computers processing for 8 months

    Shor’s Algorithm - Finds prime factors

    Peter Shor (AT&T Bell Labs, 1994)

    C  P1  P2 [easy] : t = P(N)

    With a QC could solve RSA-129 in seconds!


    3 shor s factoring algorithm6

    3. Shor’s Factoring Algorithm

    • Shor’s quantum factoring algorithm relies on a result from number theory that relates the period of a particular periodic function to the factors of an integer:

      • Given a number n, choose a related function fn(a) = xa mod n, such that the Greatest Common Divisor of x and n = 1.

        • Both mod & GCD can be computed efficiently (even on a classical computer).


    3 shor s factoring algorithm7

    3. Shor’s Factoring Algorithm

    • Step-1: pick a number q such that 2n2 =< q =< 3n2.

    • Step-2: pick a random integer x whose Greatest Common Divisor with n is 1.


    3 shor s factoring algorithm8

    3. Shor’s Factoring Algorithm

    • Step-3: repeat the following steps (a) through (g) about log(q) times, using the same random number x each time:

      • (a) create a quantum memory register, & partition the qubits into two sets called register1 & register2,


    3 shor s factoring algorithm9

    3. Shor’s Factoring Algorithm

    • Step-3: repeat the following steps (a) through (g) about log(q) times, using the same random number x each time:

      • (a) create a quantum memory register, & partition the qubits into two sets called register1 & register2,

      • (b) load register1 with all integers in the range 0 to q-1, & load register2 with all zeroes,


    3 shor s factoring algorithm10

    3. Shor’s Factoring Algorithm

    • Step-3: repeat the following steps (a) through (g) about log(q) times, using the same random number x each time:

      • (a) create a quantum memory register, & partition the qubits into two sets called register1 & register2,

      • (b) load register1 with all integers in the range 0 to q-1, & load register2 with all zeroes,

      • (c) now compute, in quantum parallel, the function xa mod n of each number in register1, & place result in register2.


    3 shor s factoring algorithm11

    3. Shor’s Factoring Algorithm

    • Step-3: repeat the following steps (a) through (g) about log(q) times, using the same random number x each time:

      • (d) measure the state of register2, obtaining some result k. This has the effect of projecting out the state of register1 to be a superposition of just those values of a such that xa mod n = k,


    3 shor s factoring algorithm12

    3. Shor’s Factoring Algorithm

    • Step-3: repeat the following steps (a) through (g) about log(q) times, using the same random number x each time:

      • (d) measure the state of register2, obtaining some result k. This has the effect of projecting out the state of register1 to be a superposition of just those values of a such that xa mod n = k,

      • (e) next compute the Fourier Transform of the projected state in register1,


    3 shor s factoring algorithm13

    3. Shor’s Factoring Algorithm

    • Step-3: repeat the following steps (a) through (g) about log(q) times, using the same random number x each time:

      • (f) measure the state of register1. This effectively samples from the Fourier Transform and returns some number c’ that is some multiple l of q/r, where r is the desired period; i.e. c’/q ~ l/r for some positive integer l.


    3 shor s factoring algorithm14

    3. Shor’s Factoring Algorithm

    • Step-3: repeat the following steps (a) through (g) about log(q) times, using the same random number x each time:

      • (f) measure the state of register1. This effectively samples from the Fourier Transform and returns some number c’ that is some multiple l of q/r, where r is the desired period; i.e. c’/q ~ l/r for some positive integer l.

      • (g) to determine the periodr, we need to estimate l. This is accomplished using a continued fraction technique.


    3 shor s factoring algorithm15

    3. Shor’s Factoring Algorithm

    • Step-4: by repeating steps (a) through (g) we create a set of samples of the Discrete Fourier Transform in register1. This gives samples of multitudes of 1/r as l1/r, l2/r, l3/r…for various integers li.

      • After a few repetitions of the algorithm, we have enough samples of the contents of register1 to compute what li must be and hence to guess r.


    3 shor s factoring algorithm16

    3. Shor’s Factoring Algorithm

    • Step-5: when r is known the factors of n can be obtained from GCD(xr/2 – 1,n) and GCD(xr/2 + 1,n).

      • (Greatest Common Demoninator)


    4 grover s search algorithm

    4. Grover’s Search Algorithm

    • Generally speaking, a solution search space has no special structure, which prevents the development of efficient algorithms.

      • e.g. (structured): you know someone’s name - find their telephone number in the city’s directory.

      • e.g. (unstructured): you know someone’s telephone number – find their name!


    4 grover s search algorithm1

    4. Grover’s Search Algorithm

    • In order to search a simple unstructured file, a computer would have to run through, on average, half of the data to locate an x satisfying P(x).

      • No shortcuts are possible, thus randomly testing the predicate P is the best strategy that can be adopted on a conventional computer  O(N) for a search space = N (omitting time to test P)


    4 grover s search algorithm2

    4. Grover’s Search Algorithm

    • Now while no shortcuts are possible on a conventional computer, we can do much better on a quantum computer.

      • Grover (1996) showed that unstructured search can be solved with bounded probability in O(rootN) on a Quantum Computer.


    4 grover s search algorithm3

    4. Grover’s Search Algorithm

    • Now whilst the resulting speedup of our undirected search of a city’s telephone directory (i.e. O(N)  O(rootN)) is not particularly dramatic, it is in the case of data encryption.

      • Consider the Data Encryption Standard: enciphering & deciphering are both accomplished using a 56-bit key, known only to the legitimate sender & receiver.


    4 grover s search algorithm4

    4. Grover’s Search Algorithm

    • The goal of an eavesdropper, having intercepted matching pairs of plain and cipher text, is to find the key that maps one onto the other.

      • This problem can be described as a “virtual phone directory”, in which each possible key is a “name”, and the enciphered text the corresponding “phone number”.


    4 grover s search algorithm5

    4. Grover’s Search Algorithm

    • An exhaustive search would try 255 keys before hitting the correct one, which would take over a year even if 1 billion keys are checked every second (on a conventional computer)!

    • By comparison, Grover’s algorithm can solve the problem, after quantum-DES enciphering the known clear text in just 185 million times.

      • Thus in principle, Grover’s algorithm can be used to break classical cryptographic systems such as DES!


    4 grover s search algorithm6

    4. Grover’s Search Algorithm

    • Grover’s algorithm searches an unstructured list of size N to find one item satisfying a given condition.

    • Let n be such that 2n >= N.

    • Assume the predicateP is implemented by a quantum gateUP|x,0> -> |x,P(x)>, where “true” is encoded as 1.


    4 grover s search algorithm7

    4. Grover’s Search Algorithm

    • Step-1: start with an equally weighted superposition of all N = 2n possible indices.

      • Any one of which could be the target entry in the quantum “telephone directory”.


    4 grover s search algorithm8

    4. Grover’s Search Algorithm

    • Step-1: start with an equally weighted superposition of all N = 2n possible indices.

      • Any one of which could be the target entry in the quantum “telephone directory”.

    • Step-2: Pick an (almost) arbitrary unitary operator. The operator has to have some non-zero overlap between the starting state and the target.

      • The easiest way to ensure this is to pick an operator with no zero entries in its unitary matrix.


    4 grover s search algorithm9

    4. Grover’s Search Algorithm

    • Step-3: construct a special amplitude-amplification operator Q from the quantum “telephone directory” oracle and the arbitrary unitary operator.


    4 grover s search algorithm10

    4. Grover’s Search Algorithm

    • Step-3: construct a special amplitude-amplification operator Q from the quantum “telephone directory” oracle and the arbitrary unitary operator.

    • Step-4: Iterate Qabout (p/4)rootN times starting with the state U|s> and then measure.

      • The measurement outcome is the target index, with probability ~1 (i.e. near certainty).


    4 grover s search algorithm11

    4. Grover’s Search Algorithm

    • Grover’s algorithm is optimal up to a constant factor; no quantum algorithm can perform an unstructured search faster.


    4 grover s search algorithm12

    4. Grover’s Search Algorithm

    • If there is only a unique xo such that P(xo) is true, then after (p/8)2n/2 iterations of steps 2 through 4 the failure rate is ½.

      • After iterating (p/4)2n/2 times the failure rate drops to 2-n.

      • However additional iterations will increase the failure rate!

      • e.g. after (p/2)2n/2 iterations, the failure rate is close to 1.


    4 grover s search algorithm13

    4. Grover’s Search Algorithm

    • This is an important feature of many quantum algorithms, & has little counterpart in conventional computers.

    • ie. repeating quantum procedures may improve results for a while, but after some repetitions the results will get worse again!


    4 grover s search algorithm14

    4. Grover’s Search Algorithm

    • Quantum procedures are unitary transformations, which are rotations of complex space; repeated applications of a quantum transform may rotate the state closer & closer to the desired state for a while, but eventually it will rotate past the desired state & get further & further away from it.

      • Thus to obtain useful results from a repeated application of a quantum transformation, it is paramount to know when to stop!


    Quantum key distribution

    Quantum Key Distribution

    • Relies on Quantum Mechanical effects:

      • Heisenberg Uncertainty Principle precludes exact, simultaneous measurements.

      • Polarization: according to Quantum Theory, a single photon passing through a polarizer will either emerge with its electric field oscillating in the desired plane, or not at all.

      • NOTE: here quantum states = light (photon) polarizations, rather than spin states.


    Quantum key distribution1

    Quantum Key Distribution

    • Encoding a (0 01 …) bit stream within a stream of polarized photons:

    Vertically polarized photons

    Horizontally polarized photons

    Calcite (birefringent) Crystal


    Quantum key distribution2

    Quantum Key Distribution

    • But what happens when diagonally polarized light passes through vertically-oriented calcite, say?

      • The Heisenberg Uncertainty Principle says that some photons will have their polarizations shifted and some won’t, depending on the angle of their axis relative to the calcite crystal’s.


    Quantum key distribution3

    Quantum Key Distribution

    • In order to read the encoded bit stream, we need to measure the polarization of each photon.

      • However if we choose the wrong orientation (axis) with our calcite crystal detector, then we only have a 50:50 chance of getting the correct answer.


    Quantum key distribution4

    Quantum Key Distribution

    • But can we measureboth the rectilinear (0o/90o) and the diagonal (45o/135o) polarizations (say) simultaneously?

      • NO! because any attempt to measure one polarization necessarilyperturbs (in fact randomizes) the other polarization (Heisenberg)

      • i.e. attempted eavesdropping will disturb the encoded bit pattern & become immediately obvious to both sender & receiver.


    Quantum key distribution5

    Quantum Key Distribution

    • Alice & Bob want to establish a secret key

    • A chooses a random sequence of bits out of which she & B will construct a key.

      • Initially neither A nor B has a particular key in mind; it will emerge out of the communication protocol they use.

      • Thus the exactbit sequence is not important – all that matters is that they & only they come to learn the common (private) bit subset = key.


    Quantum key distribution6

    Quantum Key Distribution

    • Quantum Key Distribution in the absence of eavesdropping:

      • Alice & Bob need to first agree on (a) the probability of detecting eavesdropping & (b) the number of key bits  #photons - e.g. 75% & 4-bits A:

        • 1 1 1 1 1 0 0 1 0 1 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 1 1

        • x + x x x x x + x x + + + + x x + + x ++ x x + + x x + x x

        • \ - \ \ \ / / - / \ | | | | \ / | | / - | / / | | / \ | \ \

    row#2: + rectilinear x diagonal polarizationsrow#3: open communications channel


    Quantum key distribution7

    Quantum Key Distribution

    • Quantum Key Distribution in the absence of eavesdropping:

      • Upon receipt of the photons, Bob chooses an orientation for his calcite crystal (row#2) with which he measures their polarization B:

        • \ - \ \ \ / / - / \ | | | | \ / | | / - | / / | | / \ | \ \

        • + + x + x x +x+ x + + xx+ x x + x + x++ + x+ x + x +

        • 0 1 1 1 1 0 0 01 1 0 0 0 10 0 0 0 0 1 111 0 11 1 0 1 0

    row#3: reconstructed bit stream


    Quantum key distribution8

    Quantum Key Distribution

    • Quantum Key Distribution in the absence of eavesdropping:

      • Now Alice & Bob enter into a public (insecure) communication in which A divulges to B the polarizer orientation of a subset of bits; likewise B divulges to A the calcite orientations he used to decode the same set of bits


    Quantum key distribution9

    Quantum Key Distribution

    • Quantum Key Distribution in the presence of eavesdropping:

      • (i) Alice encodes her bits into a stream of polarized photons (as previously)

      • (ii) Eve(sdropper) intercepts/measures these photons, just as Bob did previously:

        • row#1 = (polarized) photons;

        • row#2 = calcite orientations;

        • row#3 = (encoded) bits


    Quantum key distribution10

    Quantum Key Distribution

    • Quantum Key Distribution in the presence of eavesdropping:

      • (iii) Eve retransmits photons to Bob, using any polarizer orientations

        • (but most likely the same sequence she used during decoding)

      • (iv) B, unaware of E’s presence, decodes the polarized photon stream in the usual manner.


    Quantum key distribution11

    Quantum Key Distribution

    • Quantum Key Distribution in the presence of eavesdropping:

      • (iv) B, unaware of E’s presence, decodes the polarized photon stream in the usual manner.

      • (v) A & B now compare orientations of their polarizer & calcite crystals with measured (decoded) bit values, on a subset of the photon/bit stream:

        • where they agree on polarizer orientation, they should also agree on the measured/decoded bit; where they don’t agree, then this reflects the presence of (an) E!


    Teleportation

    Teleportation

    • The fictional version of teleportation(= a 3-stage process):

    • (i) dissociation

    • (ii) information transmission

    • (iii) reconstitution


    Teleportation1

    Teleportation

    • In contrast with a fax transmission, where the original object remains intact at the transmitter location & only a replica (facsimile) is constructed at the receiver location,

    • with teleportation, the original object is destroyed once the necessary information is extracted,

    • & moreover an exact replica is reconstructed at the receiver destination!


    Teleportation2

    Teleportation

    • Quantum teleportation is the transmission of quantum information to a distant location.

    • The objective is to transmit the quantum state of a particle using classical bits, then reconstruct the quantum state at the receiver.

      • i.e. is it possible to send qubits without sending qubits?!


    Teleportation3

    Teleportation

    • Let’s assume that Alice wishes to communicate (through classical channels) with Bob a single qubit of unknown state j = a|0> + b|1>

    • A can neithermeasure this quantum state norclone it.

      • It would appear the only way to send B the qubit would be to either send him the physical qubit, or to swap the state into another quantum system, then send this system to B.


    Teleportation4

    Teleportation

    • Alice & Bob use an entangled pair:

    • y0 = 1/root(2)(|00> + |11>);

    • A controls the first half of the pair & B the second.


    Teleportation5

    Teleportation

    • The input state is jy0 =

      • = (a|0> + b|1>) 1/root(2)(|00> + |11>)

      • = 1/root(2)(a|0> |00> + a|0> |11> …

      • = 1/root(2)(a|000> + a|011> + b|100> + b|111>)


    Teleportation6

    Teleportation

    • Alice now applies the transformation:(H I I)*(CNOT I)

    • to this state (i.e. jy0)

    • The third bit is left unchanged; only the first two bits belong to A – the rightmost bit belongs to B.


    Teleportation7

    Teleportation

    • Applying (H I I) we have:

      • 1/root(2)H I I(a|000>+a|011>+b|110>+b|101>)

      • ½(a(|000> + |110> + |011> + |111>) + b(|010> - |110> + |001> - |101>))

        • & by regrouping terms

      • ½(|0>(a(|0> + b|1>) + |01>(a|1> + b|0>) + |10>(a|0> - b|1>) + |11(a|1> - b|0>)))


    Teleportation8

    Teleportation

    • Alice then measures her qubits, obtaining four possible results: |00>, |01>, |10> or |11>, with equal probability (¼).

    • Depending on the result of the measurement, the quantum state of Bob’s qubit is projected to a|0>+b|1>, a|1>+b|0>, a|0>-b|1>, a|1>-b|0>, respectively.


    Teleportation9

    Teleportation

    • Bob will know what has happened, & can apply the decoding transformation T e {I,X,Y,Z} to fix his qubit.

    • The final output state is j = a|0> + b|1>, which is the unknown qubit that Alice wanted to send.


    Teleportation10

    Teleportation

    • e.g.

    • received bitsstatetransformationresult

    • 00a|0> + b|1>Ia|0> + b|1>

    • 01 a|1> + b|0>Xa|0> + b|1>

    • 10a|0> - b|1>Za|0> + b|1>

    • 11a|1> - b|0>Ya|0> + b|1>


    Hardware quantum computers

    Hardware Quantum Computers?

    • Dreaming up a quantum computer proposal is relatively easy; proposing a quantum computer that can be easily constructed is hard!

    • 2 inherent difficulties:

      • 1. is Quantum Mechanics correct?

      • 2. what about decoherence & quantum noise? (Quantum Error Correction?)


    Requirements for quantum computation

    Requirements for Quantum Computation

    • (DiVincenzo criteria):

  • 1. robustly represent quantum information

    • a scalable physical system with well-characterized qubits

  • 2. prepare an initial state

  • 3. decoherence times >> logic gate times

  • 4. a universal set of logic operations

  • 5. high probability readout

    • strong (projective) measurements


  • 1 ion traps

    1. Ion Traps

    Fluorescence from trapped Be Ions

    Hyperfine states and vibrational modes of an atom form qubits

    Manipulated by laser pulses

    NIST

    OXFORD

    LOS ALAMOS

    Main drawback: weakness of phonon mediated spin-spin

    Coupling, susceptible to decoherence.


    2 n uclear m agnetic r esonance nmr

    2. Nuclear Magnetic Resonance (NMR)

    • Qubits are Spin of nuclei

    • rf pulse perform arbitary rotations

    • Coupling between spins is dipolar and hyperfine

    • Read-out: ensemble average induction.

    Main drawback: Not scalable. Why?

    MIT

    IBM

    LOS ALAMOS


    3 optical qc

    3. Optical QC

    • Qubits formed from location between

    • two modes, or polarisation.

    • Single photons are manipulated by

    • beam splitters, mirrors, phase shifters

    • and non-linear Kerr media.

    • Read-out: Photomultipler.

    • Main drawback: Coupling is difficult!

    CQCT (UNSW et.al.)

    LOS ALAMOS


    4 superconductors

    4. Superconductors

    • Charge Qubits

    • Flux (SQUID) Qubits.

    • Phase Qubits.

    NEC

    DELFT

    Chalmers

    Yale et.al.


    An introduction to quantum computing gosn203 ai gosn204 os

    Metal Electrodes

    Insulator

    Silicon

    Substrate

    20 nanometres

    5. Solid State QCs

    • Benefits

    • Clearly scalable

    • Compatible with Si MOS - integrated control electronics

    • Can borrow Si MOS technology- material quality- gate technology- interconnect architectures

    • Challenges

    • Single spin readout is difficult

    • Completely new nanofabrication technologies must be developed- single donor positioning never done before

    CQCT = UNSW

    UQ

    UMelb

    Maryland

    Los Alamos


    The state of the art 2002

    The State of the Art (2002)


    Quantum computing applications

    Quantum Computing Applications

    • A quantum computer can complete calculations, such as factorizing large numbers, much faster than even the most powerful existing supercomputer, while other potential applications include determining the properties of proteins and molecules, and solving biochemical, biological, environmental, and climatology problems.

    • Quantum computers could also decode practically any encrypted message, though quantum cryptography itself promises to be unbreakable.


    Quantum computing applications1

    Quantum Computing Applications

    • Shor’s prime factorization: encryption

    • Grover’s Exhaustive Search has many potential applications, including genomics.

    • Quantum Simulation: Quantum Chemistry, drug design, fundamental physics

    • …etc.

      • but recall Amdahl’s Law (%Serial + %Parallel)! i.e. not every problem will benefit from (or even be suited to) Quantum Parallelism!


    Quantum computing

    Quantum Computing

    • Relevance to Operating Systems/Artificial Intelligence??

      • OS – security…

      • AI – quantum parallel search; QNNs…


    Quantum computers

    Quantum Computers

    • 2003/4 news items courtesy of ACM TechNews weekly postings


    Quantum mp3 10 09 03

    Quantum MP3 (10/09/03)

    • Shepelyansky et.al. (France) believe that a quantum computer could be capable of storing far more information than all modern supercomputers by employing 50 qubits. And it would only take 18 qubits to encode the voice of HAL 9000, the autonomous computer from the film "2001: A Space Odyssey," in a quantum computer's wave function, according to the researchers.

    • Real-time audio communications require the reduction or compression of sound signals, and one form of audio compression - MP3 - can quickly access the audio-signal spectrum using a Fast Fourier Transform. Audio signals could be transmitted even more rapidly through the Quantum Fourier Transform, the quantum equivalent of MP3.


    Quantum gate 12 09 03

    Quantum Gate (12/09/03)

    • Japanese scientists at NEC and the Institute of Physical and Chemical Research have successfully built a fundamental element of a quantum computer--a "quantum gate" that could be a component of the quantum equivalent of a computer chip. NEC research fellow Tsai Jaw-Shen reports that the gate can only function in extremely low temperatures because it relies on superconductivity, though he hopes that the operating temperature can be raised to a level more comparable to that of conventional computers.

    • He wages that a considerable amount of time must pass before quantum computers become a reality, and estimates that only 10 percent of the job has been accomplished thus far. "The single Qubit [quantum bit] was completed in 1999 and the two Qubit operation has been completed this year," Nakamura notes. "But we have to integrate these two components."


    Quantum cryptography 1 28 03

    Quantum Cryptography (1/28/03)

    • Experts believe even the best existing digital security system will ultimately be defeated by hackers, and the only unbeatable solution is quantum cryptography, in which the keys used to encrypt and decrypt data are encoded within light particles so sensitive that even the slightest attempt to monitor their transmission will change their encoded state and alert users to the intrusion. Researchers are hopeful that the encoding of binary bits on photons, electrons, and other quantum particles will be a reality before 2020, thus enabling computers to carry out multiple calculations concurrently.

    • Commercial quantum cryptography products were recently introduced by Geneva-based id Quantique and New York-based MagiQ Technologies, while NEC, Hewlett-Packard, Toshiba, and other large companies are planning to roll out products of their own. Such products' commercial appeal will be restricted until certain challenges are met: For one thing, quantum encrypted data sent over fiber-optic cable has a limited range, and requires computers directly connected to each other. Quantum repeaters are also required to expand transmission range and make quantum encryption workable in a networking environment, and both NEC and Hewlett-Packard are pursuing this goal. Wireless quantum key transmission is also being developed in Europe and the US.


    Quantum hacking 11 29 03

    Quantum Hacking (11/29/03)

    • Quantum communication has long been publicized as completely hack-proof, but quantum hacking is an area of research that engineers are exploring in parallel with the development of true quantum networks--and they are uncovering possible exploits that quantum encryption designers never anticipated. "The models that tell us quantum cryptography is hot stuff are drastically simplified," explains Harvard University's John Myers. Quantum communication encryption's basic incarnation is the BB84 scheme devised by IBM's Charles Bennett and the University of Montreal's Gilles Brassard, in which a message sender (Alice) and receiver (Bob) use both a public link and a quantum communication link to set up a secret quantum key used to encrypt messages that an eavesdropper (Eve) cannot guess without being detected, since Eve's measurement of Alice's photons disturbs their quantum state. However, engineers have found several practical techniques that eavesdroppers could use to correctly guess the key: In a photon number-splitting attack designed by Nicolas Gisin of the University of Geneva, Alice's laser accidentally releases two or three photons instead of just one, and Eve diverts and measures these extra photons without Alice and Bob knowing. In another quantum hack, known as a frying attack, Eve sends an intense pulse of laser light into Bob's 1 photon detector, rendering it inoperative and making Bob capable of only receiving 0s; Alice and Bob's key will therefore be all 0s, which means that their data will be unencrypted without their realizing it. "In general, I do not think that a real quantum cryptography system will ever be 100 percent secure, because a real system will always implement an approximation of the theorist's system," states Gisin. Military and intelligence agencies as well as financial firms are employing commercial quantum communication products, but establishing secure quantum communication in a public Internet is a more complex proposition, especially since there is such a wide variety of quantum communication schemes.


    Topological qcs 1 24 04

    Topological QCs (1/24/04)

    • A quantum computer carries such promised capabilities as ultrafast database searches and a "virtual lab" where the behavior of materials can be predicted without actually fabricating them, but a practical quantum computer must be immune to decoherence, in which computations are undone because even the slightest disturbance results in data leakage. Microsoft Research's Alexei Kitaev and Michael Freedman, along with Zhenghan Wang and Michael Larson of Indiana University, may have solved the problem with their outline of a topological quantum computer that could be constructed out of existing technology. The operating principle of the device is the manipulation of quantum particles--non-Abelian anyons--into braids that exist in both time and space. These anyons' "world lines" can be weaved around each other into knots that encode information; this braiding could be accomplished with an instrument similar to a scanning tunneling microscope. "The state of the quantum computer is stored in the conserved charges that the anyons carry," notes Caltech's John Preskill. "Even if you hit an anyon with a hammer, you can't change that charge, so the state stored in the computer is quite robust." Bringing the anyons together in pairs allows topological charges to be read off: Those with equal and opposite charges annihilate each other, creating a "0" output, and those with unbalanced charges merge into a new anyon, resulting in a "1" output. The topological quantum computer is still speculative, since the existence of non-Abelian anyons has yet to be proved(sic!).


    Qc hardware feb 04

    QC Hardware? (Feb’04)

    • Start-ups MagiQ Technologies and ID Quantique announced quantum cryptography hardware late last year, but most enterprise networks will not be able to take advantage of the technology. However, the continued development of quantum cryptography over the next few years is expected to make the advancement more beneficial to enterprise networks. Quantum cryptography uses objects that are in different places at one time to create the same random numbers in two locations, enabling the two identical sets of random numbers to be used as symmetric encryption keys or one-time pads. The problem of creating and distributing encryption would be solved because the keys would never be used again. Nonetheless, dedicated fiber cable is needed for quantum key distribution through a network, and fully optical switches for multiplexing entangled photons with ordinary data remain a few years away. Moreover, repeaters can not be used, prompting MagiQ to experiment with using Free Space Optics lasers to send photons through a wireless link. Existing key distribution systems are unable to distribute a one-time pad, which makes them susceptible to outright mathematical attacks. A quantum computer could break encryption that reuses keys, but a working computer will not be here for decades!!!


  • Login