QUANTUM INFORMATION INTRODUCTION The quantum-classical border:

Slides:



Advertisements
Similar presentations
Quantum Computation and Quantum Information – Lecture 3
Advertisements

University of Strathclyde
Quantum Information Processing with Semiconductors Martin Eberl, TU Munich JASS 2008, St. Petersburg.
Quantum Computing and Qbit Cryptography
Quantum Computing MAS 725 Hartmut Klauck NTU
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
Quantum Computing Paul McGuirk 21 April Motivation: Factorization An important problem in computing is finding the prime factorization of an integer.
Universal Optical Operations in Quantum Information Processing Wei-Min Zhang ( Physics Dept, NCKU )
Quantum Computing Ambarish Roy Presentation Flow.
1 Quantum Computing: What’s It Good For? Scott Aaronson Computer Science Department, UC Berkeley January 10,  John.
Quantum Computation and Error Correction Ali Soleimani.
Quantum Cryptography Marshall Roth March 9, 2007.
The Integration Algorithm A quantum computer could integrate a function in less computational time then a classical computer... The integral of a one dimensional.
UNIVERSITY OF NOTRE DAME Xiangning Luo EE 698A Department of Electrical Engineering, University of Notre Dame Superconducting Devices for Quantum Computation.
Memory Hierarchies for Quantum Data Dean Copsey, Mark Oskin, Frederic T. Chong, Isaac Chaung and Khaled Abdel-Ghaffar Presented by Greg Gerou.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Computers Todd A. Brun Communication Sciences Institute USC.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum Communication, Quantum Entanglement and All That Jazz Mark M. Wilde Communication Sciences Institute, Ming Hsieh Department of Electrical Engineering,
Quantum Information Processing
Quantum computing Alex Karassev. Quantum Computer Quantum computer uses properties of elementary particle that are predicted by quantum mechanics Usual.
Quantum Devices (or, How to Build Your Own Quantum Computer)
Physics is becoming too difficult for physicists. — David Hilbert (mathematician)
Quantum Error Correction Jian-Wei Pan Lecture Note 9.
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
From Flipping Qubits to Programmable Quantum Processors Drinking party Budmerice, 1 st May 2003 Vladimír Bužek, Mário Ziman, Mark Hillery, Reinhard Werner,
From Bits to Qubits Wayne Viers and Josh Lamkins
QUANTUM COMPUTING an introduction Jean V. Bellissard Georgia Institute of Technology & Institut Universitaire de France.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
Quantum Network Coding Harumichi Nishimura 西村治道 Graduate School of Science, Osaka Prefecture University 大阪府立大学理学系研究科 March 30, 2011, Institute of Network.
Lecture note 8: Quantum Algorithms
Quantum computation: Why, what, and how I.Qubitology and quantum circuits II.Quantum algorithms III. Physical implementations Carlton M. Caves University.
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
CHAPTER 15: Quantum cryptography
Quantum Computing Paola Cappellaro
Physics of Computing and the Promise and Limitations of Quantum Computing Charles H. Bennett IBM Research Yorktown Santa Cruz, 24 Oct 2005.
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Bell Measurements and Teleportation. Overview Entanglement Bell states and Bell measurements Limitations on Bell measurements using linear devices Teleportation.
QUANTUM COMPUTING What is it ? Jean V. Bellissard Georgia Institute of Technology & Institut Universitaire de France.
What is Qu antum In formation and T echnology? Prof. Ivan H. Deutsch Dept. of Physics and Astronomy University of New Mexico Second Biannual Student Summer.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
QUANTUM COMPUTING Part II Jean V. Bellissard
Nawaf M Albadia
Matteo G A Paris Quantum Optics & Information Group Universit à di Milano qinf.fisica.unimi.it/~paris Informatica Quantistica: Introduzione Milano, 30.
Quantum and classical computing Dalibor HRG EECS FER
Quantum Computing and Nuclear Magnetic Resonance Jonathan Jones EPS-12, Budapest, August Oxford Centre for Quantum Computation
Quanum computing. What is quantum computation? New model of computing based on quantum mechanics. Quantum circuits, quantum Turing machines More powerful.
Quantum Convolutional Coding Techniques Mark M. Wilde Communication Sciences Institute, Ming Hsieh Department of Electrical Engineering, University of.
Gang Shu  Basic concepts  QC with Optical Driven Excitens  Spin-based QDQC with Optical Methods  Conclusions.
Mesoscopic Physics Introduction Prof. I.V.Krive lecture presentation Address: Svobody Sq. 4, 61022, Kharkiv, Ukraine, Rooms. 5-46, 7-36, Phone: +38(057)707.
Multipartite Entanglement and its Role in Quantum Algorithms Special Seminar: Ph.D. Lecture by Yishai Shimoni.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
As if computers weren’t fast enough already…
IPQI-2010-Anu Venugopalan 1 qubits, quantum registers and gates Anu Venugopalan Guru Gobind Singh Indraprastha Univeristy Delhi _______________________________________________.
Can small quantum systems learn? NATHAN WIEBE & CHRISTOPHER GRANADE, DEC
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Suggestion for Optical Implementation of Hadamard Gate Amir Feizpour Physics Department Sharif University of Technology.
Christopher Monroe Joint Quantum Institute and Department of Physics NIST and University of Maryland Quantum Computation and Simulation.
1 An Introduction to Quantum Computing Sabeen Faridi Ph 70 October 23, 2007.
Purdue University Spring 2016 Prof. Yong P. Chen Lecture 18 (3/24/2016) Slide Introduction to Quantum Photonics.
Quantum Bits (qubit) 1 qubit probabilistically represents 2 states
COMPSCI 290.2: Computer Security
Quantum Information Promises new insights Anthony J
Quantum Cryptography Quantum Computing
Quantum Computing Dorca Lee.
A Ridiculously Brief Overview
OSU Quantum Information Seminar
Quantum Computing Hakem Alazmi Jhilakshi Sharma Linda Vu.
Quantum Cryptography Quantum Computing
Quantum Cryptography Quantum Computing
Presentation transcript:

QUANTUM INFORMATION INTRODUCTION The quantum-classical border: you can’t go two ways in the same time; an electron can: that is called a SUPERPOSITION.

theory experiment Quantum computer – a fairy tale device, with existing small (~10 bit) models theory experiment QUBIT = superposition of YES and NO coherent (~analog computation) MANY QUBITS = a common, ENTANGLED quantum state , and still coherent!! 3-state superposition: QUTRIT d-state superposition: QUDIT

coherent readable The physical carriers are MESOSCOPIC systems The main difficulty: strong interaction inside ( speed of operation) weak interaction with the environment ( to preserve coherence) WAY OUT: error-correcting algorithms, environment control etc ...

SCALING-UP? war against decoherence Which coherent mesoscopic systems? 2-level systems, manipulated by resonant radiation: out of more than 2 levels, 2 can be selectively manipulated and read out by very sharp resonances, i.e. very long-lived states spontaneous emission is a source of noise; a way out is slow adiabatic population transfer QUANTUM OPTICAL SYSTEMS: trapped cold ions and atoms + lasers flying atoms + visible-to-microwave photons in a resonator “pure” optics: photon polarization + spatial modes NUCLEAR MAGNETIC RESONANCE macroscopic, room-temperature samples complicated protocols of manipulation and readout promising for few (<100) qubits, impossible for more SCALING-UP? war against decoherence SOLID-STATE SYSTEMS are scalable in principle, hard to make coherent in practice. However, very promising starts… semiconductors: quantum dots, single impurities; charge and spin superconductors: charge qubits, flux qubits MICROTRAPS: quantum optics on CHIPS!

FEYNMANN 1982: efficient simulation of quantum systems WHY QUANTUM COMPUTING? FEYNMANN 1982: efficient simulation of quantum systems DEUTSCH 1985: quantum computer more efficient in tackling hard problems SHOR 1994: factoring prime numbers „discrete logarithm” GROVER 1997: database search (1969)1984: QUANTUM CRYPTOGRAPHY! simulation of Q – systems: trapped atoms!

THE BASIC STRATEGIES: ALTERNATIVE STRATEGIES: QUANTUM LOGICAL GATES THE BASIC STRATEGIES: compute by approximate UNITARY EVOLUTION as long as you can, then read the result by QUANTUM MEASUREMENT; repeat many times to get GOOD STATISTICS ALTERNATIVE STRATEGIES: interrupt unitary evolution by quantum measurements Linear Optics Quantum Computing Cluster State Quantum Computing WHAT ARE THE ADVANTAGES? qubit-qubit coupling in unitary evolution needs strong NONLINEARITIES in the Hamiltonian; with quantum measurements WHILE COMPUTING, you get strong nonlinearities FREE!

Bob Alice Distributing a secret key 01110100110… encoded into polarizations of single photons: observing them is a quantum measurement that would leave a trace on photon statistics glass fibre Bob Alice OR POLARIZERS 1 0 1 0 Alice sends a bit sequence through her randomly chosen polarizers Bob observes it through his randomly chosen polarizers Through public phone, they select the cases of equal polarizer setting Register the corresponding bits and use them as the code 1 1 0 Sacrifice part of the code to detect corruption by eavesdropping

OPTICAL FIBRES: FREE SPACE: How to send qubits (photons)? advantages, disadvantages? 1) through optical fibres, 2) through free space. >>>What is needed? photon sources, transmission, detectors FREE SPACE: Transmission disturbed by bad weather and/or geometric obstacles Good transmission AND good detectors around 780 nm Stable polarization, good for qubit encoding OPTICAL FIBRES: Good transmission around 1300 or 1550 nm BUT poor detectors there Existing telecom networks: no direct visibility needed Polarization diffusion: DIFFERENT QUBIT ENCODING NEEDED! polarized starlight, following 6000 yrs space travel… TIME-BIN QUBIT ENCODING

OTHER ISSUES OF PRIVACY AMPLIFICATION quantum money secret sharing in the form of entangled quantum systems, to handle limited confidence EXAMPLES: 1) police detect if my car is stolen, but cannot find it until I give them access to my part of information 2) Alice and Bob are both shy and afraid of being refused. To decide if they should have a date: if they both send a YES, they will learn it; if not, the one who says no, does not learn what the other has said

qubit orthography 1-qubit basis: a 1-qubit superposition: 2-qubit basis: the rule:

A B U M CLONING, NON-CLONING TELEPORTATION it is not unitary It is a PROJECTOR: it is not unitary It does not clone a superposition The no-cloning theorem TELEPORTATION M A U B LOCC: Local Operation with Classical Communication – an early, evergreen example of Unitarity interrupted by Quantum Measurement

2 -1 y=0 1 2 2 /r SHOR’S FACTORIZING ALGORITHM To factorize integer N, choose another integer a, relative prime to N, and introduce This function is periodic in x. Let its period length be r , then two divisors of N are Rev. Mod. Phys. 68, 733 (’96) HOW TO MEASURE r ? by QUANTUM FOURIER TRANSFORM (using 1- and 2-qubit gates) F.F.T. L: length of integer N; 2L long quantum register needed 2L 2 /r 2L 2 -1 y=0 1 2 measurement statistics of y

IMPORTANT: HADAMARD gate H CNOT (controlled-NOT) quantum logical gates = elementary unitary transforms, building blocks of algorithms 1-QUBIT GATES The „Pauli gates”, X is the NOT gate! HADAMARD gate H 2-QUBIT GATES CNOT (controlled-NOT) SWAP („controlled phase”) gate to initialize a computation IMPORTANT: WHY?

Ioncsapdákról további részletek: arXiv:0805.2450 Csapdázott ion qubit: két hiperfinom alapállapot lenullázás: stimulált Raman leolvasás: az alapállapot fluoreszcens detektálása a két qubitet logikai kapuvá összekapcsoló BUSZ: AZ IONOK KOLLEKTÍV REZGÉSEI!!! Cirac és Zoller: PRL 74 (1994) 4091 lineáris csapda élesen célzott lézerek Ioncsapdákról további részletek: arXiv:0805.2450 nagyobb integrált elrendezések (felületi csapdán!): Q-CCD (kapacitív csatolás) ionok átemelése Hibajavítás, dekoherencia-mentes altér keresése Hibrid szerkezetek, buszok stb: arXiv:0911.3835

GROVER’S SEARCH ALGORITHM computer chess: which move is best? search for satisfying condition Encode bit strings into qubit strings ; Initialize q-computer as above; do working cycle many times, to enforce evolution of : QUANTUM PARALLELISM AT WORK: SIMULTANEOUS PROCESSING OF ALL TERMS OF THE SUPERPOSITION Do for the winner amplitude, leaving the rest untouched; Do for ALL amplitudes, with: Repeat as long as appropriate (!); Measure the quantum state obtained to find largest amplitude reaches maximum size O(1) in  N steps, then gradually sinks back to nothing proof of step 2. based on Hadamard gates

Finally, back from + and - to 0 and 1, and correct bit error ERROR-CORRECTING ALGORITHMS necessary, because of decoherence quantum phase errors bit errors are easy to correct: use MULTIPLE ENCODING the “ANCILLAS” the “true bit” Errors in the true bit can be easily corrected: 2 2) TOFFOLI 1 3 2 1) CNOT 1 3 = doubly-CNOT the tough thing: phase errors can be tamed by PROTECTIVE CODING, using the HADAMARD gate which converts phase errors into bit errors: Finally, back from + and - to 0 and 1, and correct bit error

SUMMARY Quantum information took a promising start Cryptography and other privacy amplification procedures keep it alive and prosperous Useful quantum computers are still a dream Nevertheless, developing parts for the still non-existing quantum computers is great fun, in physics and technology, in theory and experiment Quantum information theory is beautiful, offering unexpected insight to Quantum Physics of Nature