Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.

Slides:



Advertisements
Similar presentations
Quantum Computation and Quantum Information – Lecture 2
Advertisements

The mysterious quantum world and why Einstein was probably wrong.
Quantum Computing MAS 725 Hartmut Klauck NTU
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
1 quantum teleportation David Riethmiller 28 May 2007.
Separable States can be Used to Distribute Entanglement Toby Cubitt 1, Frank Verstraete 1, Wolfgang Dür 2, and Ignacio Cirac 1 1 Max Planck Institüt für.
Bell’s inequalities and their uses Mark Williamson The Quantum Theory of Information and Computation
Quantum Computing MAS 725 Hartmut Klauck NTU
Backward Evolving Quantum State Lev Vaidman 2 March 2006.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
QUANTUM CRYPTOGRAPHY Narayana D Kashyap Security through Uncertainty CS 265 Spring 2003.
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
A Brief Introduction to Quantum Computation 1 Melanie Mitchell Portland State University 1 This talk is based on the following paper: E. Rieffel & W. Polak,
Avraham Ben-Aroya (Tel Aviv University) Oded Regev (Tel Aviv University) Ronald de Wolf (CWI, Amsterdam) A Hypercontractive Inequality for Matrix-Valued.
Quantum information: the new frontier Karl Svozil TU Wien/Theoretical Physics
Quantum Entanglement David Badger Danah Albaum. Some thoughts on entanglement... “Spooky action at a distance.” -Albert Einstein “It is a problem that.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
Interactive Proofs For Quantum Computations Dorit Aharonov, Michael Ben-Or, Elad Eban School of Computer Science and Engineering The Hebrew University.
CSEP 590tv: Quantum Computing
Quantum Key Establishment Wade Trappe. Talk Overview Quantum Demo Quantum Key Establishment.
Princeton University COS 433 Cryptography Fall 2005 Boaz Barak COS 433: Cryptography Princeton University Fall 2005 Boaz Barak Lecture 12: Idiot’s Guide.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Quantum Computing Lecture 1 Michele Mosca. l Course Outline
Quantum Computation and Quantum Information – Lecture 2 Part 1 of CS406 – Research Directions in Computing Dr. Rajagopal Nagarajan Assistant: Nick Papanikolaou.
Teleportation. 2 bits Teleportation BELL MEASUREMENT.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum information and the monogamy of entanglement Aram Harrow (MIT) Brown SUMS March 9, 2013.
CS4600/5600 Biometrics and Cryptography UTC/CSE
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
QUANTUM ENTANGLEMENT AND IMPLICATIONS IN INFORMATION PROCESSING: Quantum TELEPORTATION K. Mangala Sunder Department of Chemistry IIT Madras.
Alice and Bob’s Excellent Adventure
Institute of Technical Physics Entanglement – Beamen – Quantum cryptography The weird quantum world Bernd Hüttner CPhys FInstP DLR Stuttgart.
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
PRESENTED BY MIDHUN.T - EC 3 - S 61 TOPIC – QUANTUM TELEPORTATION Presented by - MIDHUN T EC 3, S 6 ROLL NO. 20 Reg no
IIS 2004, CroatiaSeptember 22, 2004 Quantum Cryptography and Security of Information Systems 1 2
Quantum Cryptography Zelam Ngo, David McGrogan. Motivation Age of Information Information is valuable Protecting that Information.
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Bell Measurements and Teleportation. Overview Entanglement Bell states and Bell measurements Limitations on Bell measurements using linear devices Teleportation.
Quantum mechanical phenomena. The study between quanta and elementary particles. Quanta – an indivisible entity of a quantity that has the same value.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Wednesday, October 31 Ford Final Chapter (10). Agenda Announce: –Test Wednesday –Office Hours probably busy…better book appt. –Read Chs. 1-3 of Vilekin.
1 entanglement-quantum teleportation entanglement-quantum teleportation entanglement (what is it?) quantum teleportation (intuitive & mathematical) ‘ quantum.
Nawaf M Albadia
Quantum and classical computing Dalibor HRG EECS FER
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
The EPR Paradox, Bell’s inequalities, and its significance By: Miles H. Taylor.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Antonio Acín
IPQI-2010-Anu Venugopalan 1 qubits, quantum registers and gates Anu Venugopalan Guru Gobind Singh Indraprastha Univeristy Delhi _______________________________________________.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Teleportation What does the future hold?.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
COMPSCI 290.2: Computer Security
Quantum Information Promises new insights Anthony J
Quantum Cryptography Quantum Computing
Quantum Cryptography Arjun Vinod S3 EC Roll No:17.
Invitation to Quantum Information III
Quantum Key Distribution
Quantum Cryptography Alok.T.J EC 11.
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 24 (2009) Richard.
Presentation transcript:

Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics and applied mathematics

Quantum Information, Communication and Computing Information Theory: Information Theory:does not care about the physical realization of signals Quantum: Quantum: description of the carriers of information

Resources: Taksu Cheon Kochi University of Technology, Japan Private communication in Reinhard F. Werner Technical University of Braunschweig, Germany Course „Conceptual and mathematical foundations of quantum information “ given at Bressanone (Italy) in

When will we have a quantum computer? pessimists: NEVER! optimists: within next 30 years IBM (in 1998): Probably in the next millenium R.F.Werner: “Even if the Quantum Computer proper were never to be built, the effort of building one, or at least deciding the feasibility of this project, will turn up many new results, likely to have applications of their own.”

Preliminaries Hilbert Space: Hilbert Space: we associate a Hilbert space  to each quantum system  is a vector space over   has a sesquilinear scalar product , for z , satisfying the positivity condition  is complete, i.e.

Outline 1.Story on the quantum witch 2.Entangled states 3.Quantum teleportation 4.Quantum cryptography 5.Quantum computing 6.Quantum game theory QI contains more sexy topics than boring mathematical description…

Prerequisity Quantum mechanics, version 0.5 Starring Alice Bob

On the quantum witch Two ways of bark analysis: to dissolveto burn

On the quantum witch

100% 0%0% 70%30% 0%0% 100% 30%70%

On the quantum witch 70% 30%30% 17%83% 30%30% 70%70% 17%

On the quantum witch 100% 0%0% 70%30% 0%0% 100% 30%70%

On the quantum witch 1.There is a “symmetry” in reddish and greenish property !

100% 0%0% 70%30% 0%0% 100% 30%70% 30%30% 17%83%

On the quantum witch 30%30% 70%70% 83%17% 0%0% 100% 30%70%

On the quantum witch 1.There is a “symmetry” in reddish and greenish property ! 2.There is no “symmetry” in ways of analysis, i.e. Bob’s result d dd depends on the Alice’s choice of analysis!

On the quantum witch

70%70% 30% 0%0% 0%

On the quantum witch 0%0% 0% 30%30% 70%

On the quantum witch 11% 59% 5% 25%

On the quantum witch 25% 5% 59% 11%

On the quantum witch 70% 30% 36% 64% same colour different colours same colour different colours

On the quantum witch Alice can send a signals to Bob by encoding her message in her choice of the way of analysis. same colour 67% different colours 67% Bob’s guesses are better than chance! We have proper transmission of information (although in a “noisy channel”)

On the quantum witch However, Alice (in Amsterdam) and Bob (in Boston) can carry out their experiments at the same time (or even Bob can do his measurements sooner than Alice). CONTRADICTION with Einstein causality Transmission of information in infinite velocity!

On the quantum witch CONTRADICTION with Einstein causality Transmission of information in infinite velocity! This may happen in the story, where the crucial roles are played by … By the way, nobody can be forced to accept Einstien causality as a fundamental principle

Entangled states Experiment in quantum mechanics: Preparing device (produces particles) Measuring device (perfectly classical output, changes the state of particle) Object of QM: Object of QM: predict the probabilities of the outcomes Example: spin projection Preparing device q Measuring device 1 1,-1 11

Entangled states q (Arbitrary) state q can be thus interpreted as some mixture of states ↑ and ↓ SUPERPOSITION Such mixture in QM - SUPERPOSITION On the other hand: any (normalised) superposition of quantum states is again a legitimate quantum state

Entangled states Assume now the system of two particles, we have four possible combinations of basis states: Any superposition of these states is again a quantum state, which can be prepared in suitable preparing device, e.g.

Entangled states Spins in entangled state can be send to different places on the Earth, they still remain entangled… ? ? What does the measurement bring? Measuring device: ↑or↓

Entangled states Thus, we can “translate” the story on the quantum witch to QM… Quantum witch = a person (traditionally called Eve) who possesses a preparing device for the entangled state |W  Two pieces of “Magic bark” = = a couple of spins in entangled state Measuring device: projections to

Entangled states x

…really impossible machine However, the impossibility to construct it is not a consequence of Einstein causality breakdown. It follows from QM itself! (known as No Cloning Theorem)

Entangled states Albert Since this "instanteneous comunication" between faraway Alice and Bob is a direct result of the fundamental principle of quantum mechanics, and also this is against the local causality, it could only be that either quantum physics or the interpretation of the standard quantum state must be wrong. Einstein – Podolsky – Rosen Paradox (EPR paradox) Modern experiments go against Albert!

Quantum teleportation Alice wants to teleport a “spin” to Bob. Two-level system (spin, qubit photon polariazation, …) = qubit q A ? E ? B Preparing device Measuring device q B 123 Teleporting one qubit requires one entangled pair of qubits and two bits of classical information.

Quantum cryptography Alice wants to send a secret message to Bob… Eve is now a rival of Alice… Observes the signals of Alice and tries to send the identical signals to Bob. Has all quantum devices as Alice and Bob.

Quantum cryptography Preparing device ↑ Preparing device → Measuring device → Measuring device ↑ Top secret Preparing device ↑ Preparing device → Measuring device ↑ Measuring device →

Quantum cryptography ↑ ↑ → ↑ →→ → ↑ → ↑ ↑ → ↑ → ↑→→ ↑ ↑→ Top secret If these bits match 100%, OK. If not… In such a way Alice and Bob can obtain shared (random) secret sequence of numbers. They can use it to code messages classically. BB84 protocol BB84 protocol according to inventors Bennet, Brassard.

Quantum computing How does the quantum computer look like? Why? Why? We have perfectly good classical computers.

Quantum computing Why? Why? We have perfectly good classical computers. P. Shor converted a classical hard task into a tracktable one…