Alice and Bob in the Quantum Wonderland. Two Easy Sums 7873 x 6761 = ? 7873 x 6761 = ? ? x ? = 26 292 671 ? x ? = 26 292 671.

Slides:



Advertisements
Similar presentations
Pretty-Good Tomography Scott Aaronson MIT. Theres a problem… To do tomography on an entangled state of n qubits, we need exp(n) measurements Does this.
Advertisements

Quantum Computation and Quantum Information – Lecture 2
1 Introduction to Quantum Computation and Quantum Information Dr. Raja Nagarajan University of Warwick.
Quantum Computing Uf H Nick Bonesteel
Week three!.  8 groups of 2  6 rounds  Ancient cryptosystems  Newer cryptosystems  Modern cryptosystems  Encryption and decryptions  Math  Security.
1 quantum teleportation David Riethmiller 28 May 2007.
Code-Breaking with a Quantum Computer Credit for ideas and examples: Prof. N. D. Mermin’s class Phys 681 / Comp Sci 483 “Quantum Computation” (A good class)
Quantum Mechanics 103 Quantum Implications for Computing.
David Evans CS150: Computer Science University of Virginia Computer Science Lecture 40: Computing with Glue and Photons.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
A lecture series on Relativity Theory and Quantum Mechanics The Relativistic Quantum World University of Maastricht, Sept 24 – Oct 15, 2014 Marcel Merk.
Shor’s Algorithm Osama Awwad Department of Computer Science Western Michigan University July 12, 2015.
Quantum Computers Todd A. Brun Communication Sciences Institute USC.
Quantum Encryption Cryptography’s Holy Grail by Samantha Matthews.
Quantum Computation and Quantum Information – Lecture 2 Part 1 of CS406 – Research Directions in Computing Dr. Rajagopal Nagarajan Assistant: Nick Papanikolaou.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Copyright 2001 S.D. Personick, All rights reserved Quantum Information Science and Technology Dr. Stewart (“Stu”) Personick Professor, Drexel University.
SCHRODINGER’S CAT Group 1: Sudheer, Venkatesh, Hrudil, Praveen.
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
Quantum Error Correction Jian-Wei Pan Lecture Note 9.
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Institute of Technical Physics Entanglement – Beamen – Quantum cryptography The weird quantum world Bernd Hüttner CPhys FInstP DLR Stuttgart.
Strange ! Here is a small mathematical exercise, that will certainly Give everyone a surprise! Press [enter] to see next slide.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Great Theoretical Ideas in Computer Science.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Cryptography Lecture 7: RSA Primality Testing Piotr Faliszewski.
PRESENTED BY MIDHUN.T - EC 3 - S 61 TOPIC – QUANTUM TELEPORTATION Presented by - MIDHUN T EC 3, S 6 ROLL NO. 20 Reg no
Quantum Computing Basic Concepts and Applications.
David Evans CS150: Computer Science University of Virginia Computer Science Class 33: Computing with Photons From The.
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
Borsós, K.; Benedict, M. G. University of Szeged, Szeged, Hungary Animation of experiments in modern quantum physics Animation of experiments in modern.
Dan Boneh Basic key exchange Merkle Puzzles Online Cryptography Course Dan Boneh.
Physics of Computing and the Promise and Limitations of Quantum Computing Charles H. Bennett IBM Research Yorktown Santa Cruz, 24 Oct 2005.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Quantum Mechanics1 Schrodinger’s Cat. Quantum Mechanics2 A particular quantum state, completely described by enough quantum numbers, is called a state.
Quantum Computers By Andreas Stanescu Jay Shaffstall.
Nawaf M Albadia
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Quantum Computing and Quantum Programming Language
BINOMIALEXPANSION REFLECTION Ibrahim Almana 8D. Engineers were calculating the area of a square figure 100 years back by squaring the length of a side.
CSEP 590tv: Quantum Computing Dave Bacon July 20, 2005 Today’s Menu n Qubit registers Begin Quantum Algorithms Administrivia Superdense Coding Finish Teleportation.
28 April 2005 CS588 Spring 2005 David Evans Phun with Photons.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Computing: An Introduction Khalid Muhammad 1 History of Quantum Computing Bits and Qubits Problems with the Quantum Machine.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
Great Theoretical Ideas in Computer Science.
Copyright © Zeph Grunschlag, RSA Encryption Zeph Grunschlag.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Quantum Computing: An Introduction
15-853Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” Including Quantum Communication Quantum Computing.
Prabhas Chongstitvatana Chulalongkorn University
COMPSCI 290.2: Computer Security
Paul M. Dooley Tamer Tayea Wenlin Zhou Ian M. Johson Joshua Tarlow
Quantum Circuit Visualization
Quantum Information Promises new insights Anthony J
Quantum Cryptography Quantum Computing
Quantum Physics Comes of Age I incident II transmitted reflected.
Quantum Cryptography Alok.T.J EC 11.
Wave-Particle Duality
Lecture 24: Metalinguistics CS200: Computer Science
Quantum Computer Science: A Very Short Introduction (3)
Quantum Cryptography Quantum Computing
Presentation transcript:

Alice and Bob in the Quantum Wonderland

Two Easy Sums 7873 x 6761 = ? 7873 x 6761 = ? ? x ? = ? x ? =

Superposition The mystery of +

How can a particle be a wave?

Polarisation

Three obstacles are easier than two

Addition of polarised light =+ += 

The individual photon MEASUREMENT PREPARATION Yes No

How it looks to the photon in the stream (2) MEASUREMENT PREPARATION MAYBE!

States of being |N  |N  |NE  |NW  |NE  |N  |N  |E  =+ +=

Alive Dead = ? Quantum addition = + = +

Schrödinger’s Cat |CAT  = |ALIVE  + |DEAD 

Entanglement Observing either side breaks the entanglement +

Entanglement killed the cat According to quantum theory, if a cat can be in a state |ALIVE  and a state |DEAD , it can also be in a state |ALIVE  + |DEAD . Why don’t we see cats in such superposition states ? +

Entanglement killed the cat + ANSWER: because the theory actually predicts….. [ + ]][ [] ? ? ?

Entangled every which way + + =

Einstein-Podolsky-Rosen argument If one photon passes through the polaroid, so does the other one. Therefore each photon must already have instructions on what to do at the polaroid.

The no-signalling theorem I know what message Bob is getting right now Quantum entanglement can never be used to send information that could not be sent by conventional means. But I can’t make it be my message!

Quantum cryptography Alice and Bob now share a secret key which didn’t exist until they were ready to use it.

Quantum information θ 1 qubit Θ= … Yet a photon does this calculation! 1 bit 0 or 1 Yes No To calculate the behaviour of a photon, infinitely many bits of information are required – but only one bit can be extracted.

Available information: one qubit 1 qubit bit y x or

Available information: two qubits qubits  2 bits W Z Y X or

Teleportation Measurement Reconstruction TransmissionReception ?

Quantum Teleportation Measure W,X,Y,Z?

Dan Dare, Pilot of the Future. Frank Hampson, Eagle (1950)

Nature 362, (15 Apr 1993)

Computing INPUT N digits COMPUTATION Running time T OUTPUT How fast does T grow as you increase N?

Quantum Computing But you can choose your question ++ In 1 unit of time, many calculations can be done but only one answer can be seen E.g. Are all the answers the same? 6+420/3100

Two Easy Sums 7873 x 6761 = ? 7873 x 6761 = ? ? x ? = ? x ? =

Not so easy. N T for multiplying two N-digits T for factorising a 2N-digit number , ,048, ,073,741, ,099,511,627, ,125,899,906,842,620 T ≈ N 2 T ≈ 2 N But on a quantum computer, factorisation can be done in roughly the same time as multiplication T ≈ N 2 (Peter Shor, 1994)

No cats were harmed in the preparation of this lecture Key Grip Lieven Clarisse Visual Effects Bill Hall Focus Puller Paul Butterley Best Boy Jeremy Coe Alice Sarah Page Bob Tim Olive-Besly