an introduction to quantum information and applicationsges/enseignement/calculq/... · 2017. 5....

43
An Introduction to Quantum Information and Applications Iordanis Kerenidis CNRS LIAFA-Univ Paris-Diderot

Upload: others

Post on 03-Feb-2021

2 views

Category:

Documents


0 download

TRANSCRIPT

  • An Introduction to Quantum Information and

    Applications

    Iordanis Kerenidis CNRS

    LIAFA-Univ Paris-Diderot

  • Quantum information and computation

    •  Quantum information and computation –  How is information encoded in nature? –  What is nature’s computational power?

    •  Moore’s law: quantum phenomena will appear by 2020

    •  Rich Mathematical Theory

    –  Advances in Classical Computer Science –  Advances in Theoretical & Experimental Physics –  Advances in Information Theory

  • Quantum information and computation

    The power of Quantum Computing

    •  Quantum algorithm for Factoring and Discrete Logarithm [Shor 93]

    •  Unconditionally Secure Key Distribution [Bennett-Brassard 84]

    •  Quantum computers unlikely to solve NP-complete problems [Bernstein Bennett Brassard Vazirani 94]

  • Outline

    1)  Introduction to the model •  Superdense Coding •  Teleportation

    2)  Basic algorithms •  Deutsch-Jozsa •  Ideas for Factoring

    3)  Cryptography •  Key Distribution

    4)  Communication Complexity •  Quantum fingerprints •  Exponential Separations

  • Quantum States

    •  Quantum bit is a unit vector in a 2-dim. Hilbert space

    •  A quantum state on logn qubits is a unit vector in

    •  Inner product:

    0 =10"

    # $ %

    & ' , 1 =

    01"

    # $ %

    & ' ,

    120 + 1( ) = 1

    211"

    # $ %

    & ' ,120 − 1( ) = 1

    21−1"

    # $

    %

    & '

  • Measurements on Quantum States

    •  A measurement of in an orthonormal basis is a projection onto the basis vectors and

    Pr[outcome is bi ] =

    •  Examples

  • Measurements on Quantum States

    •  A measurement of in an orthonormal basis is a projection onto the basis vectors and

    Pr[outcome is bi ] =

    •  Examples

    φ = a0 0 + a1 1 , {120 + 1( ), 1

    20 − 1( )}

    Prob[outcome 120 + 1( )] = 1

    2a0 0 0 +

    12a1 11

    2

    =12

    + a0a1

    Prob[outcome 120 − 1( )] = 1

    2a0 0 0 −

    12a1 11

    2

    =12− a0a1

  • Measurements on Quantum States

    •  A measurement of in an orthonormal basis is a projection onto the basis vectors and

    Pr[outcome is bi ] =

    •  Examples

    •  Note that

  • Measurements on Quantum States

    •  A measurement of in an orthonormal basis is a projection onto the basis vectors and

    Pr[outcome is bi ] =

    •  IMPORTANT REMARK

    –  What is the final state after the measurement?

    –  The state changes to the basis state

    –  Hence, no more information in it about the ai‘s. –  If I repeat the measurement I always get the same basis

    vector.

  • Unitary Evolution

    •  Unitary matrix: inner product/length preserving, linear

    •  NOT gate

    •  Phase Flip gate

    X

    Z

  • Unitary Evolution cont.

    •  Hadamard Gate

    •  Control NOT gate

    •  Example

    H

    H

    0 ⊗ 0 H on1st# → # # 120 + 1( )⊗ 0 CNOT# → # # 1

    20 ⊗ 0 + 1 ⊗ 1( )

    0 H" → " 120 + 1( ) , 1 H" → " 1

    20 − 1( )

  • Superdense Coding

    •  Transmitting 2 bits with 1 qubit –  Alice and Bob share the above state –  Alice wants to transmit the bits b1b2 to Bob

    Alice

    Bob

    –  Let b1b2=10

    Xb2

    H

    Zb1

    120 0 + 1 1( ) Z if b1=1" → " " 1

    20 0 − 1 1( ) X if b2=1" → " " " 1

    20 0 − 1 1( )

    CNOT" → " " 120 0 − 1 0( ) ≡ 1

    20 − 1( ) 0 H on1st" → " " 1 0

    120 0 + 1 1( )

    M

    M

  • Teleportation

    •  Teleporting a qubit with 2 bits –  Alice and Bob share the state –  Alice wants to transmit an unknown qubit to Bob

    b1

    Alice b2

    Bob Xb2

    H

    Zb1

    M

    M €

    120 0 + 1 1( )

    a0 0 + a1 1( )⊗120 0 + 1 1( ) CNOT# → # # 1

    2a0 000 + a1 110 + a0 011 + a1 101( )

    H# → # 1200 a0 0 + a1 1( ) +

    1201 a0 1 + a1 0( ) +

    1210 a0 0 − a1 1( ) +

    1211 a0 1 − a1 0( )

    Z b1X b2# → # # a0 0 + a1 1( )

  • Outline

    1)  Introduction to the model •  Superdense Coding •  Teleportation

    2)  Basic algorithms •  Deutsch-Jozsa •  Ideas for Factoring

    3)  Cryptography •  Key Distribution

    4)  Communication Complexity •  Quantum fingerprints •  Exponential Separations

  • Quantum Queries

    Let f: X -> Y Goal: Does f have a certain property? Classical Query: "What is the value of f(x)?"

    Example: Is f linear or far from linear? 3 Queries u.a.r.: f(x),f(y),f(x+y). Check f(x)+f(y)=f(x+y)

    Quantum Query

    But, quantum operations are linear!

    x b O f" → " x b⊕ f (x)

    x O f" → " f (x)

    0...0 0 H" → " 12n / 2

    xx∈{0,1}n∑ ⊗ 0 O f" → " 12n / 2 xx∈{0,1}n

    ∑ f (x)

  • Deutsch-Jozsa Algorithm

    Let f: {0,1}n -> {0,1} Goal: Is f identically zero or balanced? Classical Query:

    deterministic: 2n-1+1 randomized: k queries, error probability 2-k

    Quantum

    x O f" → " f (x)

    0...0 0 H" → " 12n / 2

    x 0 O f" → " x∈{0,1}n∑ 12n / 2 x f (x)x∈{0,1}n

    Z on 2nd" → " " 12n / 2

    (−1) f (x ) x f (x) O f" → " x∈{0,1}n∑ 12n / 2 (−1)

    f (x ) x 0x∈{0,1}n∑

    H" → " 0...0 if f = 0

    ay y ,with a0 = 0, if f balancedy∈{0,1}n∑

    '

    ( )

    * )

    x b O f" → " x b⊕ f (x)

  • More Algorithms

    - Simon's problem Let f: {0,1}n -> {0,1}n Promise: f(x)=f(x+a) and f(x) ≠ f(y), y≠x+a (2-periodic) Goal: Find a Randomized: 2n/2 Quantum: O(n), by finding each time a random y, st. y.a=0

    - Period Finding [Shor94] Let f: ZN -> C Promise: f is periodic Goal: Find period Quantum: Easy algorithm, based on Fourier Transform

    Factoring = Period Finding !

    - Seach an unordered list: O(√n) queries [Grover97]

  • 2)Algorithms: Open Problems

    •  Find New Algorithms –  Graph Isomorphism? –  Lattice Problems? –  Hidden Subgroup Problems? –  other...

    •  Exponential speedup (possibly) –  Factoring, Discrete Log, Pell's Equality,...

    •  Quadratic speedup (provably) –  Grover's Search, Quantum walk-based algorithms,...

  • Outline

    1)  Introduction to the model •  Superdense Coding •  Teleportation

    2)  Basic algorithms •  Deutsch-Jozsa •  Ideas for Unordered search and Factoring

    3)  Cryptography •  Key Distribution

    4)  Communication Complexity •  Quantum fingerprints •  Exponential Separations

  • 3) Cryptography

    •  Current cryptography based on computational assumptions (e.g. hardness of factoring)

    •  Many such problems become insecure against a quantum adversary

    •  Can we use quantum interaction to achieve unconditionally secure cryptography?

  • Unconditional Key Distribution

    1.  Alice picks a secret key. She encodes each bit in one of two possible quantum ways and sends it to Bob.

    Remarks: - If Bob guesses correctly the encoding, then the decoding is perfect. If not, Bob gets a random bit.

    - Bob guesses correctly half the times.

    2. Bob guesses the encoding and decodes each bit accordingly

  • Unconditional Key Distribution

    1.  Alice picks a secret key. She encodes each bit in one of two possible quantum ways and sends it to Bob.

    3. Alice and Bob reveal publicly the encodings and keep only the bits on which they agree. (~ half)

    Remarks: - If there is no Eve, then they agree on the value of all these bits.

    - If Eve has got information about the key, then with high probability Alice and Bob will disagree on some bits.

    2. Bob guesses the encoding and decodes each bit accordingly

  • Unconditional Key Distribution

    1.  Alice picks a secret key. She encodes each bit in one of two possible quantum ways and sends it to Bob.

    3. Alice and Bob reveal publicly the encodings and keep only the bits on which they agree. (~ half)

    4. Alice and Bob reveal publicly the values of half of the bits (1/4 of the initial). - If they agree, they use the rest as the key (~ 1/4) - If they disagree in many bits, they throw it away

    2. Bob guesses the encoding and decodes each bit accordingly

  • Unconditional Key Distribution

    1.  Pick a,b ∈{0,1}n ( a: key | b : encoding) Send each

    3. Alice and Bob reveal publicly the encodings b,b’. Keep the bits for which bi = b’i (~ half)

    4. Alice and Bob reveal publicly the values of ai = a’i for half of the bits for which bi = b’i - If they agree, they use the rest as the key (~ 1/4) - If they disagree in many bits, they throw it away

    2. Pick b’∈{0,1}n If bi=0 measure in If bi=1 measure in Denote outcome ai €

    Ψ00 = 0 , Ψ10 = 1 , Ψ01 =120 + 1( ), Ψ11 =

    120 − 1( )

  • Unconditional Key Distribution

    Proof of Security (idea) –  Eve gets information, she disturbs the state (Heisenberg)

    Possible strategy: Eve picks encoding bE u.a.r and measures Alice's qubit. Let be the result. She sends it to Bob.

    –  If bA ≠ bB, Bob does not check, so Eve is not detected cheating –  If bA = bB and bE = bA, then , so Eve is not detected –  If bA = bB and bE ≠ bA, then

    Alice Eve : measure in Bob: measure in outcome outcome

    ΨabE

    Ψab E = Ψab A

    Ψ00 = 0 , Ψ10 = 1 , Ψ01 =120 + 1( ), Ψ11 =

    120 − 1( )

    Ψ01 =120 + 1( )

    { 0 , 1 }

    0 , w.p.1/21 , w.p.1/2

    { 120 ± 1( )}

    + , w.p.1/2− , w.p.1/2

  • Unconditional Key Distribution

    Proof of Security (idea) –  Eve gets information, she disturbs the state (Heisenberg)

    Possible strategy: Eve picks encoding bE u.a.r and measures Alice's qubit. Let be the result. She sends it to Bob.

    –  If bA ≠ bB, Bob does not check, so Eve is not detected cheating –  If bA = bB and bE = bA, then , so Eve is not detected –  If bA = bB and bE ≠ bA and Alice and Bob check, then

    Alice Eve : measure in Bob: measure in outcome outcome

    Overall, Pr[Eve is detected cheating]=1/16

    ΨabE

    Ψab E = Ψab A

    Ψ00 = 0 , Ψ10 = 1 , Ψ01 =120 + 1( ), Ψ11 =

    120 − 1( )

    Ψ01 =120 + 1( )

    { 0 , 1 }

    0 , w.p.1/21 , w.p.1/2

    { 120 ± 1( )}

    + , w.p.1/2− , w.p.1/2

  • Unconditional Key Distribution

    Proof of Security (continued)

    –  The optimal strategy of Eve is not much better than the one we described. (individual vs coherent attacks)

    –  The key is almost secure. We can distill a much stronger key by classical privacy amplification

    –  No assumptions on Eve’s computational power!

    Ψ00 = 0 , Ψ10 = 1 , Ψ01 =120 + 1( ), Ψ11 =

    120 − 1( )

  • 3) Cryptography: Open Problems

    •  Other Cryptographic Primitives –  Oblivious Transfer –  Coin Flipping –  Bit Commitment

    •  Practical Quantum Cryptography

    •  Commercial systems for QKD

    •  Classical cryptography secure against quantum

  • Outline

    1)  Introduction to the model •  Superdense Coding •  Teleportation

    2)  Basic algorithms •  Deutsch-Jozsa

    3)  Cryptography •  Key Distribution

    4)  Communication Complexity •  Quantum fingerprints •  Exponential Separations

  • 4) Communication Complexity

    •  Examples: Is x=y?, Find an i such that xi ≠ yi

    •  Applications of Communication Complexity VLSI design, Boolean circuits, Data structures, Automata, Formula size, Data streams, Secure Computation

    Input x Input y

    Goal: Output P(x,y) (minimum communication)

  • Quantum Communication Complexity

    •  Examples: Is x=y?, Find an i such that xi ≠ yi

    •  Applications of Communication Complexity VLSI design, Boolean circuits, Data structures, Automata, Formula size, Data streams, Secure Computation

    Input x Input y

    Goal: Output P(x,y) (minimum communication)

    Classical vs.

    Quantum

  • Encoding Information with Quantum states

    •  We can encode a string with logn qubits.

    •  Holevo’s bound –  We cannot compress information by using qubits. We need n qubits to transmit n classical bits.

    •  Quantum communication can still be useful since in many communication problems the information that needs to be transmitted is small. (e.g. Equality)

  • Equality in Simultaneous Messages

    Referee Is x=y?

    Randomized algorithm (Complexity )

    Alice and Bob use an error correcting code C with constant distance and size O(n).

    They each send bits of their strings C(x),C(y)

    Referee outputs Yes if C(x)i = C(y)i

    Input x Input y

  • Equality in Simultaneous Messages

    Quantum algorithm : (Complexity O(log n)) [BCWdW01]

    •  Alice and Bob use an error correcting code C with constant distance.

    •  They send the states

    •  Referee measures the state

    in the symmetric and alternating subspace of

    •  If x=y, then the states are equal. •  If x≠y, then the states are almost orthogonal.

  • Exponential Separations

    •  Two-way communication –  [BCW98]: exponential separation for zero error. –  [Raz99]: exponential separation for bounded error. –  [Gav07, RK11]: between q. One-way and rand. Two-way

    •  One-way communication –  [BJK04]: exponential separation for a relation –  [GKKRdW07]: exponential separation for a partial

    function

    •  Simultaneous Messages –  [BCWdW01]: equality via fingerprints –  [BJK04]: exponential separation for a relation

  • Input: x {0,1}2n

    Output:

    Input: a matching M on [2n]

    eg. {(1,5),(2,6),(3,7),(4,8)}

    2

    1 6

    5

    4 7 3 8

    Theorem

    •  There exists a one-way quantum protocol with compl. O(logn) •  Any randomized one-way protocol has complexity Ω(√n) %

    The Hidden Matching Problem

  • Quantum algorithm for HM4

    Let be Bob’s matching.

    •  Alice sends the state

    •  Bob measures in the basis

    and outputs ((1,3),0) if he measures ((1,3),1) " ((2,4),0) " ((2,4),1) "

    M = {(1,3),(2,4)}

    12((−1)x1 1 + (−1)x2 2 + (−1)x3 3 + (−1)x4 4 )

    B = {1 + 3 , 1 − 3 , 2 + 4 , 2 − 4 }

    1 + 3

    1 − 3

    2 + 4

    2 − 4

  • Quantum algorithm for HM4

    •  Alice sends the state

    •  Bob measures in the basis

    • 

    •  Bob can compute the XOR of a pair of the matching with probability 1.

    12

    (−1)xi i =i=1

    4

    ∑ 12 ((−1)x1 1 + (−1)x3 3 ) + 1

    2((−1)x2 2 + (−1)x4 4 )

    B = {1 + 3 , 1 − 3 , 2 + 4 , 2 − 4 }

    Pr[outcome 1 + 3 ] = 18((−1)x1 + (−1)x3 )2

    Pr[outcome 1 − 3 ] = 18((−1)x1 − (−1)x3 )2

  • 4) Communication Complexity Open Problems

    •  Quantum communication complexity of total functions

    •  Power of entanglement in communication complexity

    •  Communication Complexity with super-quantum resources.

  • Conclusions

    Quantum Information can be very powerful

    –  Algorithms •  Factoring, Unordered Search •  Quantum Walks, etc

    –  Communication Complexity •  Many exponential separations •  Total Functions

    –  Cryptography •  Unconditional Key Distribution •  Impossibility of Bit Commitment, OT

    –  Interactions with Complexity Theory & Physics •  Ronald's talk

  • Further Conclusions

    •  Quantum Information and Computation

    –  Computational power of nature

    –  Quantum Mechanics as an theory of information

    –  Advances in classical Computer Science

    –  Practical Quantum Cryptography

    –  Advances in Experimental Physics

    Why is Quantum Computation important?

  • Simon's Algorithm

    Let f: {0,1}n -> {0,1}n Promise: f(x)=f(x+a) and f(x) ≠ f(y), y≠x+a (2-periodic) Goal: Find a Randomized: 2n/2 Quantum: O(n), by finding each time a random y, st. y.a=0

    amplitude of

    Hence, we only measure y, s.t. a.y=0 Repeat O(n) times to get n linear independent y's.

    0...0 0...0 H on1st" → " " 12n/2

    x 0...0 Of" → " x∈{0,1}n∑ 12n/2 x f (x)x∈{0,1}n

    measure f (x)" → " " " 12x + 1

    2x + a H" → " 1

    2n+1/2(−1)x⋅y y +

    y∈{0,1}n∑ + 12n+1/2 (−1)

    (x+a )⋅y yy∈{0,1}n∑

    y =1

    2n+1/2(−1)x⋅y + 1

    2n+1/2(−1)(x+a )⋅y = 1

    2n+1/2(−1)x⋅y[1+ (−1)a⋅y ]

  • Period Finding Algorithm

    Let f:ZN -> C Let f: ZN -> C Promise: f is periodic Goal: Find period

    Tool: Quantum Fourier Transform:

    If gcd(k,r)=1, then gcd(kN/r,N)=N/r

    REMARK: Factoring reduces classically to period finding!!!

    0...0 0...0 QFTN on1st" → " " " 1N

    x 0...0 Of" → " x∈ZN

    ∑ 1N

    x f (x)x∈ZN

    measure f (x)" → " " " 1N /r

    j⋅ r + lj=0

    N /r−1

    ∑ QFTN" → " " 1r

    i⋅ N /ri=0

    r−1

    ∑measure" → " " k⋅ N /r , k∈[ 0,r −1]

    x QFTN" → " " 1N

    ω x⋅y yy∈{0,1}n∑ , ω = e2π i /N