Quantum Mechanics 103 Quantum Implications for Computing.

Slides:



Advertisements
Similar presentations
The photon, the quantum of light
Advertisements

Unit 12: Part 3 Quantum Mechanics and Atomic Physics.
QUANTUM MECHANICS Probability & Uncertainty 1.Probability 2.Uncertainty 3.Double-slit photons.
Hands-On Quantum Uncertainty. Quantum uncertainty is present in the diffraction, polarization and interference of light.
Quantum Control of Wave- Particle Duality Robert Mann D. Terno, R. Ionicioiu, T. Jennewein.
郭劼 Schrodinger’s cat 1, It is a paradox Paradox is a statement that when you assume it wrong, you can launch it right ; on the contrary, assume.
Review of Models  Continuous  Molecular  Thompson  Nuclear Solar System  Bohr Model The problems with the Bohr/solar-system model of the atom: Why.
Lecture 4 - Feynmans thought experiments Things on a very small scale behave like nothing we have direct experience about. Even the experts do not uderstand.
David Evans CS150: Computer Science University of Virginia Computer Science Lecture 40: Computing with Glue and Photons.
Quantum Mechanics 102 Tunneling and its Applications.
Quantum Mechanics 101 Waves? or Particles? Interference of Waves and the Double Slit Experiment  Waves spreading out from two points, such as waves.
Quantum Computation and Error Correction Ali Soleimani.
Cryptography & Complexity An amazing blend of Mathematics, Computer Science, Physics and achieving “the impossible”.
Quantum Computing Joseph Stelmach.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
A lecture series on Relativity Theory and Quantum Mechanics The Relativistic Quantum World University of Maastricht, Sept 24 – Oct 15, 2014 Marcel Merk.
Quantum Information Processing
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Modern Physics lecture 3. Louis de Broglie
6. Atomic and Nuclear Physics Chapter 6.5 Quantum theory and the uncertainty principle.
SCHRODINGER’S CAT Group 1: Sudheer, Venkatesh, Hrudil, Praveen.
1 Waves, Light & Quanta Tim Freegarde Web Gallery of Art; National Gallery, London.
Philosophical Interpretations of
In 1887,when Photoelectric Effect was first introduced by Heinrich Hertz, the experiment was not able to be explained using classical principles.
Quantum Physics Study Questions PHYS 252 Dr. Varriano.
Physics 361 Principles of Modern Physics Lecture 8.
1 Waves and Particles Topics Light as a wave; Light as a particle; Particle-wave duality; The wave-like nature of matter; Motivation Learn about the particle-wave.
Quantum Computing BCS Belgium Branch.
Quantum Mechanics: Interpretation and Philosophy Significant content from: “Quantum Mechanics and Experience” by David Z. Albert, Harvard University Press.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
 The Bohr model describes definite electron energy levels within atoms  Bohr’s model only applied to hydrogen – it has been replaced by more sophisticated.
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
Quantum Cryptography. Cryptography  Art of writing messages so that no one other than intended receiver can read it.  Encryption – Performing mathematical.
Atomic Particles  Atoms are made of protons, neutrons and electrons  % of the atom is empty space  Electrons have locations described.
It’s all done with Mirrors Many of the predictions of quantum mechanics are verified with ordinary matter particles (like electrons), but these experiments.
Quantum Cryptoanalysis and Quantum Cryptography (An introduction)
Blake Morell Daniel Bowser Trenton Wood. Contents Background Experimental Design & Outcome Implications Future Applications.
مدرس المادة الدكتور :…………………………
Physics 2170 – Spring Review 1 Last homework is due tomorrow at 12:50pm Final exam is on Saturday from.
Topic 13 Quantum and Nuclear physics Atomic spectra and atomic energy states.
Quantum Physics II.
Decoherence Demo (with 2-slit interference demo) Scott Johnson Intel Press Play to begin.
Almost There! Interference and Review for 3 rd Hour Exam.
Quantum Computing by Mathew Ross Jared Davis - Group L -
DUALITY PARTICLE WAVE PARTICLE DUALITY WAVE © John Parkinson.
Quantum Mechanics1 Schrodinger’s Cat. Quantum Mechanics2 A particular quantum state, completely described by enough quantum numbers, is called a state.
Quantum Computers By Andreas Stanescu Jay Shaffstall.
Physics 2170 – Spring Some interesting aspects of quantum mechanics The last homework is due at 12:50pm.
Quantum Mechanics: QuarkNet Lecture. 2 “Blackbody” = Idealized physical body that absorbs all incident electromagnetic radiation. Early theoretical models.
Quantum Corby Ziesman Computing. Future of Computing? Transistor-based Computing –Move towards parallel architectures Biological Computing –DNA computing.
Main Topics from : A Shortcut Through Time. Supercomputers.
Waves and Particles Motivation Topics Light as a wave;
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Modern Physics lecture X. Louis de Broglie
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
The Transactional Interpretation: an introduction ©2012 R. E. Kastner.
A1 “BASIC QUANTUM MECHANICS, AND SOME SURPRISING CONSEQUENCES” Anthony J. Leggett Department of Physics University of Illinois at Urbana-Champaign.
Quantum Mechanics 102 Tunneling and its Applications.
Atomic Theory Vocabulary, Models, and Scientists The Discovery of the Atom 440 B. C. to the present.
Norman Littlejohn COSC480.  Quantum Computing  History  How it works  Usage.
Phy107 Fall From Last Time… Today Superposition of wave functions Indistinguishability Electron spin: a new quantum effect The Hydrogen atom and.
Entangled Electrons.
COMPSCI 290.2: Computer Security
Wave-Particle Duality
Double Slit Experiment
Account given by quantum mechanics: Each possible process is represented by a probability amplitude A which can be positive or negative Total amplitude.
Heisenberg Uncertainty
Quantum Technology programme
Quantum Computing Hakem Alazmi Jhilakshi Sharma Linda Vu.
Presentation transcript:

Quantum Mechanics 103 Quantum Implications for Computing

Schrödinger and Uncertainty  Going back to Taylor’s experiment, we see that the wavefunction of the photon extends through both slits  Therefore the photon has “traveled” through both openings simultaneously  The wavefunction of a “particle” will contain every possible path the particle could take until the particle is “detected” by scattering or being absorbed  These paths can interfere with each other to produce diffraction-like probability patterns  BUT, Schrödinger took this explanation to an extreme

Schrödinger’s Famous Cat  Suppose a radioactive substance is put in a box with a cat for a period of time If the Geiger Counter triggers, a gun is discharged and the cat is killed During that time, there is a 50% chance that one of the nuclei will decay and trigger a Geiger Counter

Schrödinger’s Famous Cat  Until an observer opens the box to make a “measurement” of the system, The nucleus remains both decayed The Geiger counter remains both triggered and undecayed and untriggered The gun has both fired and not fired The cat is both dead and alive Disclaimer: To be truly indeterministic, this experiment must be performed in a sound-proof room with no window

Paradox?  Paradoxical as it may seem, the concept of “superposition of states” is borne out well in experiment  Like superposition of waves producing interference effects  Quantum Mechanics is one of the most-tested and best- verified theories of all time  But it seems counter-intuitive since we live in a macroscopic world where uncertainty on the order of  is not noticeable

Quantum paradox #2  Einstein-Podolsky-Rosen (EPR) paradox  Consider two electrons emitted from a system at rest; measurements must yield opposite spins if spin of the system does not change  We say that the electrons exist in an “entangled state”

More EPR  If measurement is not done, can have interference effect since each electron is superposition of both spin possibilities  But, measuring spin of one electron destroys interference effects for both it and the other electron;  It also determines the spin of the other electron  How does second electron “know” what its spin is and even that the spin has been determined

Interpreting EPR  Measuring one electron affects the other electron!  For the other electron to “know” about the measurement, a signal must be sent faster than the speed of light!  Such an effect has been experimentally verified, but it is still a topic of much debate

Interference effects  Remember this Mach-Zender Interferometer?  Can adjust paths so that light is split evenly between top U detector and lower D detector, all reaches U, or all reaches D – due to interference effects  Placing a detector (either bomb or non-destructive) on one of the paths means 50% goes to each detector ALL THE TIME

Interpretation  Wave theory does not explain why bomb detonates half the time  Particle probability theory does not explain why changing position of mirrors affects detection  Neither explains why presence of bomb destroys interference  Quantum theory explains both!  Amplitudes, not probabilities add - interference  Measurement yields probability, not amplitude - bomb detonates half the time  Once path determined, wavefunction reflects only that possibility - presence of bomb destroys interference

Quantum Theory meets Bomb  Four possible paths: RR and TT hit upper detector, TR and RT hit lower detector (R=reflected, T=transmitted)  Classically, 4 equally-likely paths, so prob of each is 1/4, so prob at each detector is 1/4 + 1/4 = ½, independent of path length difference  Quantum mechanically, square of amplitudes must each be 1/4 (prob for particular path), but amplitudes can be imaginary or complex!  This allows interference effects

What wave function would give 50% at each detector?  Must have |a| 2 = |b| 2 = |c| 2 = |d| 2 = 1/4  Need |a + b| 2 = |c+d| 2 = 1/2

If Path Lengths Differ, Might Have  Lower detector:  Upper detector: Voila, Interference!

When Measure Which Path,  Lower detector:  Upper detector: Voila, No Interference!

Quantum Storage  Consider a quantum dot capacitor, with sides 1 nm in length and microns between “plates”  How much energy required to place a single electron on those plates?  Can make confinement of dot dependent upon voltage  Lower the voltage, let an electron on –> 1  Lower voltage on other side, let the electron off -> 0

What must a computer do? Deterministic Turing Machine still good model  Two pieces:  Read/write head in some internal state  “Infinite” tape with series of 1s, 0s, or blanks  Follows algorithms by performing 3 steps:  Read value of tape at head’s location  Write some value based on internal state and value read  Move to next value on tape

Can we improve this model?  Probabilistic Turing Machine sometimes better  Multiple choices for internal state change  Not 100% accurate, but accuracy increases with number of steps  Can solve some types of problems to sufficient accuracy much more quickly than deterministic TM can  Similar concept to Monte Carlo integration

Limits on Turing Machines  Some problems are solvable in theory but take too long in practice  e.g., factoring large numbers  Can label problems by how the number of steps to compute grows as the size of the numbers used grows  addition grows linearly  multiplication grows as the square of digits  Fourier transform grows faster than square  factoring grows almost exponentially

Examples of factoring time  MIP-year = 1 year of 1 million processes per second  Factoring 20-digit decimal number done in 1964, requiring only MIP-years  45-digit decimal number (1974) needs MIP- years  71-digit decimal number (1984) needs 0.1 MIP- years  129-digit decimal number (1994) needs 5000 MIP-years

Quantum Cryptography  Current best encryption uses public key for encoding  Need private key (factors of large integer in public key) to decode  Really safe unless  Someone can access your private key  Quantum computers become prevalent

Quantum Cryptography II  Quantum Computers can factor large numbers near-instantly, making public key encryption passe  But, can send quantum information and know whether it has been intercepted

What problems face QC?  Decoherence: if measurement made, superposition collapses  Even if measurement not intentional!  i.e., if box moves, cat becomes alive or dead, not both  Quantum error correction  No trail of path taken (or else no superposition)  Proven to be possible; that doesn’t mean it’s easy!  HUGE Technical challenges  electronic states in ion traps (slow, leakage)  photons in cavity (spontaneous emission)  nuclear spins in molecule (small signal in large noise)