1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 19 (2009)

Slides:



Advertisements
Similar presentations
Quantum Computation and Quantum Information – Lecture 2
Advertisements

Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
Random non-local games Andris Ambainis, Artūrs Bačkurs, Kaspars Balodis, Dmitry Kravchenko, Juris Smotrovs, Madars Virza University of Latvia.
Quantum Computing MAS 725 Hartmut Klauck NTU
I NFORMATION CAUSALITY AND ITS TESTS FOR QUANTUM COMMUNICATIONS I- Ching Yu Host : Prof. Chi-Yee Cheung Collaborators: Prof. Feng-Li Lin (NTNU) Prof. Li-Yi.
Robust Randomness Expansion Upper and Lower Bounds Matthew Coudron, Thomas Vidick, Henry Yuen arXiv:
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Nonlocal Boxes And All That Daniel Rohrlich Atom Chip Group, Ben Gurion University, Beersheba, Israel 21 January 2010.
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 / RAC 2211 Lecture.
Some Limits on Non-Local Randomness Expansion Matt Coudron and Henry Yuen /12/12 God does not play dice. --Albert Einstein Einstein, stop telling.
Bell’s inequalities and their uses Mark Williamson The Quantum Theory of Information and Computation
Quantum Computing MAS 725 Hartmut Klauck NTU
6/9/2015Bell's Theorem1 Spooky Action at a Distance Bell’s Theorem and the Demise of Local Reality Natalia Parshina Peter Johnson Josh Robertson Denise.
Quantum Error Correction SOURCES: Michele Mosca Daniel Gottesman Richard Spillman Andrew Landahl.
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
Efficient many-party controlled teleportation of multi-qubit quantum information via entanglement Chui-Ping Yang, Shih-I Chu, Siyuan Han Physical Review.
CSEP 590tv: Quantum Computing
Quantum Computation and Quantum Information – Lecture 2 Part 1 of CS406 – Research Directions in Computing Dr. Rajagopal Nagarajan Assistant: Nick Papanikolaou.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum information and the monogamy of entanglement Aram Harrow (MIT) Brown SUMS March 9, 2013.
Study and characterisation of polarisation entanglement JABIR M V Photonic sciences laboratory, PRL.
1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 14 (2009)
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 16 (2011)
Feynman Festival, Olomouc, June 2009 Antonio Acín N. Brunner, N. Gisin, Ll. Masanes, S. Massar, M. Navascués, S. Pironio, V. Scarani Quantum correlations.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 2117 Lecture.
October 1 & 3, Introduction to Quantum Computing Lecture 1 of 2 Introduction to Quantum Computing Lecture 1 of 2
QCCC07, Aschau, October 2007 Miguel Navascués Stefano Pironio Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Cryptographic properties of.
What is being plotted?. Answer: Number of papers with “quantum entanglement” in title or abstract N. D. Mermin, Phys. Rev. Lett. (1990) Entanglement is.
Aug 2, Quantum Communication Complexity Richard Cleve Institute for Quantum Computing University of Waterloo.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
A limit on nonlocality in any world in which communication complexity is not trivial IFT6195 Alain Tapp.
Black-box Tomography Valerio Scarani Centre for Quantum Technologies & Dept of Physics National University of Singapore.
Quantum mechanical phenomena. The study between quanta and elementary particles. Quanta – an indivisible entity of a quantity that has the same value.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Bell tests with Photons Henry Clausen. Outline:  Bell‘s theorem  Photon Bell Test by Aspect  Loopholes  Photon Bell Test by Weihs  Outlook Photon.
Violation of local realism with freedom of choice Faculty of Physics, University of Vienna, Austria Institute for Quantum Optics and Quantum Information.
Worst case analysis of non-local games
1 entanglement-quantum teleportation entanglement-quantum teleportation entanglement (what is it?) quantum teleportation (intuitive & mathematical) ‘ quantum.
Nawaf M Albadia
CSEP 590tv: Quantum Computing Dave Bacon July 20, 2005 Today’s Menu n Qubit registers Begin Quantum Algorithms Administrivia Superdense Coding Finish Teleportation.
Umans Complexity Theory Lectures Lecture 7b: Randomization in Communication Complexity.
1 Introduction to Quantum Information Processing CS 667 / Phys 767 / C&O 681 Richard Cleve DC 2117 Lecture 15 (2008)
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 2117 Lecture.
Secret keys and random numbers from quantum non locality Serge Massar.
Non-locality and quantum games Dmitry Kravchenko University of Latvia Theory days at Jõulumäe, 2008.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 16 (2009) Richard.
Introduction to Quantum Computing Lecture 1 of 2
Tsuyoshi Ito National Institute of Informatics (NII), Japan
CS 154, Lecture 6: Communication Complexity
Quantum Information Theory Introduction
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 24 (2009) Richard.
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 18 (2009) Richard.
Sequential sharing of nonlocal correlations
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Lecture 16 (2009) Richard.
Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Lecture 17 (2005) Richard Cleve DC 3524
Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Lecture 4 (2005) Richard Cleve DC 653
Richard Cleve DC 3524 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Lecture.
Presentation transcript:

1 Introduction to Quantum Information Processing CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 19 (2009)

2 Preliminary remarks about quantum communication

3 How does quantum information affect the communication costs of information processing tasks? Quantum information can apparently be used to substantially reduce computation costs for a number of interesting problems We explore this issue...

4 Entanglement and signaling Recall that Entangled states, such as, Any operation performed on one system has no affect on the state of the other system (its reduced density matrix) qubit can be used to perform some intriguing feats, such as teleportation and superdense coding —but they cannot be used to “signal instantaneously”

5 AliceBob Basic communication scenario Resources x 1 x 2  x n Goal: convey n bits from Alice to Bob x 1 x 2  x n

6 Basic communication scenario Bit communication: Cost: n Qubit communication: Cost: n [Holevo’s Theorem, 1973] Bit communication & prior entanglement: Cost: n (can be deduced)Cost: n / 2 superdense coding [Bennett & Wiesner, 1992] Qubit communication & prior entanglement:

7 The GHZ “paradox”

8 GHZ scenario AliceBobCarol Input: r ts Output: acb Rules of the game: 1.It is promised that r  s  t = 0 2.No communication after inputs received 3.They win if a  b  c = r  s  t rstabcabc ← r ← ¬s← ¬s ← 1← 1 abc [Greenberger, Horne, Zeilinger, 1980]

9 No perfect strategy for GHZ Input: r ts Output: acb rstabcabc General deterministic strategy: a 0, a 1, b 0, b 1, c 0, c 1 Winning conditions: a 0  b 0  c 0 = 0 a 0  b 1  c 1 = 1 a 1  b 0  c 1 = 1 a 1  b 1  c 0 = 1 Has no solution, thus no perfect strategy exists

10 GHZ : preventing communication Input: r ts Output: acb Input and output events can be space-like separated: so signals at the speed of light are not fast enough for cheating What if Alice, Bob, and Carol still keep on winning?

11 “ GHZ Paradox” explained r ts acb Prior entanglement:    =  000  –  011  –  101  –  110  Alice’s strategy: 1. if r = 1 then apply H to qubit 2. measure qubit and set a to result Bob’s & Carol’s strategies: similar Case 1 ( rst = 000 ): state is measured directly … Cases 3 & 4 ( rst = 101 & 110 ): similar by symmetry new state  001  +  010  –  100  +  111  Case 2 ( rst = 011 ):

12 GHZ : conclusions For the GHZ game, any classical team succeeds with probability at most ¾ Allowing the players to communicate would enable them to succeed with probability 1 Entanglement cannot be used to communicate Nevertheless, allowing the players to have entanglement enables them to succeed with probability 1 Thus, entanglement is a useful resource for the task of winning the GHZ game

13 The Bell inequality and its violation – Physicist’s perspective

14 Bell’s Inequality and its violation Part I: physicist’s view: Can a quantum state have pre-determined outcomes for each possible measurement that can be applied to it? if {  0 ,  1  } measurement then output 0 if {  + ,  −  } measurement then output 1 if... (etc) qubit: where the “manuscript” is something like this: called hidden variables [Bell, 1964] [Clauser, Horne, Shimony, Holt, 1969] table could be implicitly given by some formula

15 Bell Inequality Imagine a two-qubit system, where one of two measurements, called M 0 and M 1, will be applied to each qubit: M 0 : a 0 M 1 : a 1 M 0 : b 0 M 1 : b 1 Define: A 0 = (  1) a 0 A 1 = (  1) a 1 B 0 = (  1) b 0 B 1 = (  1) b 1 Claim: A 0 B 0 + A 0 B 1 + A 1 B 0  A 1 B 1  2 Proof: A 0 (B 0 + B 1 ) + A 1 (B 0  B 1 )  2 one is  2 and the other is 0 space-like separated, so no cross-coordination

16 Bell Inequality Question: could one, in principle, design an experiment to check if this Bell Inequality holds for a particular system? Answer 1: no, not directly, because A 0, A 1, B 0, B 1 cannot all be measured (only one A s B t term can be measured) Answer 2: yes, indirectly, by making many runs of this experiment: pick a random st  {00, 01, 10, 11} and then measure with M s and M t to get the value of A s B t The average of A 0 B 0, A 0 B 1, A 1 B 0,  A 1 B 1 should be  ½ A 0 B 0 + A 0 B 1 + A 1 B 0  A 1 B 1  2 is called a Bell Inequality* * also called CHSH Inequality

17 Violating the Bell Inequality Two-qubit system in state    =  00  –  11  Define M 0 : rotate by   / 16 then measure M 1 : rotate by +3  / 16 then measure st = 01 or 10  /8 3  /8 -  /8 st = 11 st = 00 Applying rotations  A and  B yields: cos (  A +  B ) (  00  –  11  ) + sin (  A +  B ) (  01  +  10  ) A B = +1 A B =  1 Then A 0 B 0, A 0 B 1, A 1 B 0,  A 1 B 1 all have expected value ½√2, which contradicts the upper bound of ½ cos 2 (  / 8) = ½ + ¼√2

18 Bell Inequality violation: summary Assuming that quantum systems are governed by local hidden variables leads to the Bell inequality A 0 B 0 + A 0 B 1 + A 1 B 0  A 1 B 1  2 But this is violated in the case of Bell states (by a factor of √2 ) Therefore, no such hidden variables exist This is, in principle, experimentally verifiable, and experiments along these lines have actually been conducted

19 The Bell inequality and its violation – Computer Scientist’s perspective

20 Bell’s Inequality and its violation b st a input: output: With classical resources, Pr[ a  b = s  t ] ≤ 0.75 But, with prior entanglement state  00  –  11 , Pr[ a  b = s  t ] = cos 2 (  / 8) = ½ + ¼√2 = 0.853… Rules:1.No communication after inputs received 2.They win if a  b = s  t stabab Part II: computer scientist’s view:

21 The quantum strategy Alice and Bob start with entanglement    =  00  –  11  Alice: if s = 0 then rotate by  A =   / 16 else rotate by  A = + 3  / 16 and measure Bob: if t = 0 then rotate by  B =   / 16 else rotate by  B = + 3  / 16 and measure st = 01 or 10  /8 3  /8 -  /8 st = 11 st = 00 cos (  A –  B ) (  00  –  11  ) + sin (  A –  B ) (  01  +  10  ) Success probability: Pr[ a  b = s  t ] = cos 2 (  / 8) = ½ + ¼√2 = 0.853…

22 Nonlocality in operational terms information processing task quantum entanglement ! classically, communication is needed

23 The magic square game

24 Magic square game a 11 a 12 a 13 a 21 a 22 a 23 a 31 a 32 a 33 Problem: fill in the matrix with bits such that each row has even parity and each column has odd parity even odd even IMPOSSIBLE Game: ask Alice to fill in one row and Bob to fill in one column They win iff parities are correct and bits agree at intersection Success probabilities: classical and 1 quantum 8/98/9 [Aravind, 2002] (details omitted here)