1 Modeling Quantum Information Systems Paul E. Black National Institute of Standards and Technology Andrew W. Lane University of Kentucky.

Slides:



Advertisements
Similar presentations
Quantum Computation and Quantum Information – Lecture 2
Advertisements

Quantum Computation and Quantum Information – Lecture 3
Efficient Discrete-Time Simulations of Continuous- Time Quantum Query Algorithms QIP 2009 January 14, 2009 Santa Fe, NM Rolando D. Somma Joint work with.
Quantum Computing MAS 725 Hartmut Klauck NTU
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Computers Gates, circuits and programming.
Quantum Error Correction SOURCES: Michele Mosca Daniel Gottesman Richard Spillman Andrew Landahl.
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Department of Computer Science & Engineering University of Washington
1 EPR Pairs and Quantum Teleportation 2005/08/11.
1 Welcome to the presentation on Computational Capabilities with Quantum Computer By Anil Kumar Javali.
An Algebraic Foundation for Quantum Programming Languages Andrew Petersen & Mark Oskin Department of Computer Science The University of Washington.
EPR – pair usage in the quantum teleportation The Question was: Is the Quantum Mechanical Description of Reality Actually Complete?
Superposition, Entanglement, and Quantum Computation Aditya Prasad 3/31/02.
Review from last lecture: A Simple Quantum (3,1) Repetition Code
Quantum Automata Formalism. These are general questions related to complexity of quantum algorithms, combinational and sequential.
The Integration Algorithm A quantum computer could integrate a function in less computational time then a classical computer... The integral of a one dimensional.
CSEP 590tv: Quantum Computing
Quantum Computing Joseph Stelmach.
BB84 Quantum Key Distribution 1.Alice chooses (4+  )n random bitstrings a and b, 2.Alice encodes each bit a i as {|0>,|1>} if b i =0 and as {|+>,|->}
Quantum Mechanics from Classical Statistics. what is an atom ? quantum mechanics : isolated object quantum mechanics : isolated object quantum field theory.
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Lo-Chau Quantum Key Distribution 1.Alice creates 2n EPR pairs in state each in state |  00 >, and picks a random 2n bitstring b, 2.Alice randomly selects.
Quantum Computation and Quantum Information – Lecture 2 Part 1 of CS406 – Research Directions in Computing Dr. Rajagopal Nagarajan Assistant: Nick Papanikolaou.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Quantum Algorithms Preliminaria Artur Ekert. Computation INPUT OUTPUT Physics Inside (and outside) THIS IS WHAT OUR LECTURES WILL.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum Communication, Quantum Entanglement and All That Jazz Mark M. Wilde Communication Sciences Institute, Ming Hsieh Department of Electrical Engineering,
Classical Versus Quantum. Goal: Fast, low-cost implementation of useful algorithms using standard components (gates) and design techniques Classical Logic.
Alice and Bob’s Excellent Adventure
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Chapter 14 Monte Carlo Simulation Introduction Find several parameters Parameter follow the specific probability distribution Generate parameter.
Randomized Turing Machines
October 1 & 3, Introduction to Quantum Computing Lecture 1 of 2 Introduction to Quantum Computing Lecture 1 of 2
Quantum Convolutional Coding for Distillation and Error Correction Mark M. Wilde Communication Sciences Institute, Ming Hsieh Department of Electrical.
Quantum Teleportation and Bit Commitment Chi-Yee Cheung Chung Yuan Christian University June 9, 2009.
National Institute of Standards and Technology Technology Administration, U.S. Department of Commerce Quantum Computing for Programmers Paul E. Black
Michele Mosca Canada Research Chair in Quantum Computation 27 May 2006 Introduction to quantum technologies: quantum computers, quantum teleporters & cryptography.
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
Introduction to Quantum Key Distribution
What is Qu antum In formation and T echnology? Prof. Ivan H. Deutsch Dept. of Physics and Astronomy University of New Mexico Second Biannual Student Summer.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
September 12, 2014 Martin Suchara Andrew Cross Jay Gambetta Supported by ARO W911NF S IMULATING AND C ORRECTING Q UBIT L EAKAGE.
Nawaf M Albadia
Quantum Convolutional Coding Techniques Mark M. Wilde Communication Sciences Institute, Ming Hsieh Department of Electrical Engineering, University of.
CSEP 590tv: Quantum Computing Dave Bacon July 20, 2005 Today’s Menu n Qubit registers Begin Quantum Algorithms Administrivia Superdense Coding Finish Teleportation.
1 Conference key-agreement and secret sharing through noisy GHZ states Kai Chen and Hoi-Kwong Lo Center for Quantum Information and Quantum Control, Dept.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
IPQI-2010-Anu Venugopalan 1 qubits, quantum registers and gates Anu Venugopalan Guru Gobind Singh Indraprastha Univeristy Delhi _______________________________________________.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Presented By, Mohammad Anees SSE, Mukka. Contents Cryptography Photon Polarization Quantum Key Distribution BB84 Protocol Security of Quantum Cryptography.
Density matrix and its application. Density matrix An alternative of state-vector (ket) representation for a certain set of state-vectors appearing with.
Beginner’s Guide to Quantum Computing Graduate Seminar Presentation Oct. 5, 2007.
Simulation and Design of Stabilizer Quantum Circuits Scott Aaronson and Boriska Toth CS252 Project December 10, X X +Z Z +ZI +IX
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Attendance Syllabus Textbook (hardcopy or electronics) Groups s First-time meeting.
Quantum gates SALEEL AHAMMAD SALEEL. Introduction.
Richard Cleve DC 3524 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Lecture.
Homomorphic encryption of quantum data
COMPSCI 290.2: Computer Security
Quantum Computation and Information Chap 1 Intro and Overview: p 1-28
Quantum Computing Dorca Lee.
Quantum Information Theory Introduction
Introduction to Quantum logic (2)
Homework 2 This homework is the first use of quantum gates. In lectures we learned about the following gates: inverter, Feynman (controlled NOT), Toffoli.
Bayesian Deep Learning on a Quantum Computer
Quantum computation with classical bits
Quantum Computing Joseph Stelmach.
Presentation transcript:

1 Modeling Quantum Information Systems Paul E. Black National Institute of Standards and Technology Andrew W. Lane University of Kentucky

2 Quantum Computation Simulator Model QCSim: simulator “engine” results Inputs Gate behavior analysis Physical system

3 Simulator vs. Custom Program SimulatorCustom Fixed, general code Many inputs Specific code Few inputs

4 Simulation Taxonomy Detail –Classical –Dirac ket (pure states) –Density matrix (mixed states) Time –Discrete –Continuous State –Discrete (n-level) –Continuous (finite) –Infinite Time DiscreteContinuous Mixed State Pure State Classical QCSim Detail

5 Simulation Taxonomy (cont.) Values –Concrete (e.g., ) –Symbolic (e.g., ) Simulation –Randomized (Monte Carlo or quantum trajectories) –Branching (one run; explore all choices) –Complete state (one run)

6 Trick 1: Carry Extra Information Extra information –qubit (rep1) so original is unchanged by noise –ancilla to correct replicas Extra gates to compute net error rate Figure 2. [3,1] Hamming code XX original rep2 rep3 noise XX original rep1 rep2 rep3 noise current state: original e-05

7 Reliability with & w/o Inversion Inverting one qubit increases reliability in the presence of generalized amplitude damping With Inversion no inversion

8 Trick 2: Use Existing Primitives H H H H H H H H Figure 3. BB84 Shared Secret Key Alice’s info photon Eve’s basis Alice’s basis Bob’s basis Classical choice: Hadamard & measurement ● Measurement in other bases: Hadamard

9 Trick 3: Trade-off Complexity Complex input, simple model = 2|000> + 2|011> + i|100> + i|111>; or Figure 4. Quantum teleportation |>|> EPR pair Z H { H ● Simple input, complex model = 2|000> + i|100>;

10Conclusions Tune physical implementations to actual noise. Add extra stuff to the model to process results. Use Hadamard and measurement for classical random choice. Model physical effects with existing. Trade-off complexity between model and inputs. Simulator code available at