Lectures 1,2,3

Total Page:16

File Type:pdf, Size:1020Kb

Lectures 1,2,3 Classical and Quantum Information Theory from Discrete to Continuous Variables Nicolas J. Cerf Centre for Quantum Information and Communication (QuIC), Ecole Polytechnique, Universit´e Libre de Bruxelles, Belgium QUANTUM INFORMATION, COMPUTATION, AND COMPLEXITY Institut Henri Poincar´e (IHP) Paris, January 4 -- April 7, 2006 0 Shannon's information theory Claude E. Shannon 1916{2001 A mathematical theory of communication, Bell System Technical Journal 27 (1948) 379-423 and 623-656. Communication theory of secrecy systems, Bell System Technical Journal 28 (1949) 656-715. This work has laid out the entire foundation of today's information technology era. 1. Every kind of information { text, image, sound { can be associated with an information content, which quantifies how efficiently it can be represented with 0's and 1's. 2. Any imperfect communication channel { telephone line, radio channel, satellite link { has a capacity, which quantifies how much information can be transmitted reliably over the channel. 1 Source coding theorem (noiseless coding) Q: What is the highest possible data compres- sion rate? A: Shannon's entropy H = f(source statistics). 0 1 1 0 1 0 0 1 1 1 0 1 0 0 1 0 1 0 1 0 1 1 0 0 1 −! ... suppressing redundancy: \source code" Channel coding theorem (noisy channel coding) Q: What is the highest possible transmission rate? A: Shannon's capacity C = f(noise statistics). 0 1 0 1 0 1 1 0 0 1 0 1 1 0 1 0 0 1 1 1 0 1 0 0 1 −! ... adding redundancy: \error correcting code" 2 Example of source coding Source: random variable X distributed as p(x) S Entropy: H(X) p(x) log2 p(x) ≡ −x=1 where S is the alphabXet size 1=2 if x = "A" 1=4 if x = "B" p(x) = 8 > 1 8 if = "C" > = x < 1=8 if x = "D" > :> "A" 00 "B" ! 01 Simple code: L = 2 bits/symbol "C" ! 10 "D" ! 11 ! Average code length L H(X) ≥ 1 2 3 3 7 H(X) = 2 + 4 + 8 + 8 = 4 bits < 2 bits "A" 0 "B" ! 10 Clever code: L = 7 bits/symbol "C" ! 110 4 "D" ! 111 ! 3 Typical sequences Entropy H(X) is thus the average length of the shortest description of X. But can we always reach this irreducible compression? YES, using \typical" sequences of size n . ! 1 Sequence (X1; : : : Xn) of independent random variables distributed each as p(x) n n 1 1 1 log p(x1; : : : xn) = log p(x ) = log p(x ) −n 2 −n 2 i −n 2 i i=1 i=1 Y X log2 p(X) X p(x) H(X) ' h− i ∼ ≡ nH(X) p(x ; : : : xn) 2 for typical sequences. ) 1 ' − nH(X) Normalization: p(x¯) 1 Styp 2 x¯ S ' ) j j ' 2Xtyp About nH(X) bits are sufficient, on average, to code a typical n-symbol sequence, so that L H(X) bits/symbol. ' 4 Example: binary source p(0) = 1 p = 3=4 00001010000100110000 p(1) = p =− 1=4 n=20 bits | {z } Typical n-bit sequence contains n(1 p) = 15 0's ∼ − × np = 5 1's. ∼ × Probability of emission nr. of 0's nr. of 1's p(x1; : : : xn) = (1 p) p − (1 ) (1 ) log (1 )+ log (1 p)n p pnp = 2n p 2 p np 2 p 2 nH(X) ' − − − − ≡ − Number of typical sequences n n! n n log n Styp = use n! n = 2 2 j j ' np (np)!(n(1 p))! ' − log n+log p log n+log (1 p) 2 2 2 2 − 2n log2 n np log2(np) n(1 p)log2(n(1 p)) 2nH(X) ' − − − − ≡ z }| { z }| { Probability of emitting any typical sequences 2 nH(X) 2nH(X) 1 ∼ − × ∼ Note: most frequent sequence 00000000000000000000 is generally not typical ! 5 Remarkably, Styp is only an exponentially small part of the set of all sequences, while it has arbitrarily large probability. Since 0 H(X) log S ≤ ≤ 2 generally S 2nH(X) 2n log2 S = Sn j typj ' Typical set is sufficiently large to contain • most of the probability > 0; δ > 0; n and S : 8 9 typ n[H(X) + δ] Styp < 2 and p(x¯) > 1 j j x¯ S − 2Xtyp Typical set is the smallest set that contains • most of the probability > 0; δ > 0; n : 8 8 n[H(X) δ] S < 2 − p(x¯) < j j ) x¯ S X2 6 Instantaneous (variable-length) codes Code C: symbol x codeword C(x) of length l(x) ! C is instantaneous code if no C(x) is a prefix of another C(x ) with x = x 0 0 6 "A" 0 "B" ! 10 10; 0; 0; 110; 0; 111; 10; : : : "C" ! 110 "D" ! 111 ! S l(x) Kraft inequality 2− 1 x=1 ≤ 0 X 0 1 0 0 1 1 0 1 0 1 0 1 1 1 "A" uses 2− = 1=2 of the decoding tree 2 "B" 2− = 1=4 3 "C" 2− = 1=8 3 "D" 2− = 1=8 Necessary and sufficient condition for the existence of instantaneous code 7 Optimal instantaneous code S S l(x) min p(x)l(x) with constraint 2− = 1 l(x) x=1 x=1 X using Lagrange multiplier X = p(x)l(x) + λ 2 l(x) L x x − P P =1 =1 @ l(x) l(x) p(x) x; = 0 p(x) λ 2 ln 2 = 0 2− = P 8 @l(Lx) ) − − ) P λ ln 2 z }| { z}|{ lopt(x) = log p(x) (assuming it is an integer) ) − 2 Lopt = p(x)lopt(x) = p(x) log p(x) H(X) ) x − x 2 ≡ P P Bloc coding: typical size-n sequences become nH(X) almost equiprobable p(x ; : : : xn) 2 1 ' − l (x ; : : : xn) nH(X) integer opt 1 ' ' L nH(X) bits/bloc opt ' 8 No further compression? Relative entropy (Kullback \distance") S p(x) D(p q) = p(x) log2 jj q(x) xX=1 with p(x); q(x) probability distributions. q(x) D(p q) = log2 X p(x) jj h− p(x)i ∼ q(x) log2 X p(x) concavity of log ≥ − hp(x)i ∼ q(x) = log2 p(x) − x p(x) = log q(x) = 0 − 2 Px P D(p q) 0 jj ≥ D(p q) = 0 iff x; p(x) = q(x) jj 8 9 L H(X) = p(x)l(x) + p(x) log p(x) − x x 2 P Pl(x) = x p(x) log2 2 p(x) P l(y) 2− p(x) = p(x) log y x 2 2 l(x) × 2 l(y) "P − y − # P 2 l(x) P Let q(x) = − normalized probability distribution l(y) y 2− P p(x) 1 L H(X) = p(x) log x 2 l(y) − "q(x) × y 2− # P l(Py) = D(p q) log 2− jj − 2 0 y ≥ X 1 Kraft | {z } ≤ 0 | {z } ≥ The average length L of any instantaneous code cannot be lower than H(X) 10 Noisy channel coding X Y p(y|x) X = input symbol Y = output symbol p(y x) = transition probability j Naive picture: to reduce the error probability Pe - either increase signal power S - or decrease noise power N Shannon theory: as soon as the rate R C, an arbitrarily low Pe ≤ is achievable in the limit of large blocs n . ! 1 capacity C = B log2(1+S=N) (B = bandwidth) X 1 ... X n Y1 ... Y n ENC CHANNEL DEC 11 Conditional and mutual entropy H(X) p(x) log p(x) = uncertainty of X ≡ − x 2 H(X Y ) P p(y) H(X Y = y) = unc. of X if Y known j ≡ y j p(x y) log2 p(x y) P − x j j | {z } P p(x; y) H(X Y ) = p(y)p(x y) log2 ) j − x;y j p(y) = P p(x; y) log p(x; y) + p(y) log p(y) − 2 2 x;y y X X H(X;Y ) H(Y ) − | X {z } |Y {z } p(y|x) H(X Y ) = H(X; Y ) H(Y ) = loss of information j − perfect channel H(X Y ) = 0 random channel H(Xj Y ) = H(X) j I(X:Y ) H(X) H(X Y ) = mutual information ≡ − j = H(X) + H(Y ) H(X; Y ) − H(X) H(Y) H(X|Y) I(X:Y) H(Y|X) ( : ) = ( ) log p(x;y) I X Y x;y p x; y 2 p(x)p(y) = PD p(x; y) p(x)p(y) 0 jj ≥ 12 ( : ) = ( ) log p(x;y) I X Y x;y p x; y 2 p(x)p(y) =PD p(x; y) p(x)p(y) 0 jj ≥ X and Y independent I(X:Y ) = 0 , I(X:Y ) measures the statistical dependence between X and Y Subadditivity of entropies I(X:Y ) = H(X) + H(Y ) H(X; Y ) 0 − ≥ thus H(X; Y ) H(X) + H(Y ) ≤ Strong subadditivity of entropies I(X:Y Z) = p(z) I(X:Y Z = z) 0 j z j ≥ p(x;y z) P p(x;y z) log j x;y j 2 p(x z)p(y z) | {z j } j = P( ) log p(x;y;z)p(z) x;y;z p x; y; z 2 p(x;z)p(y;z) = HP(X; Z) + H(Y; Z) H(X; Y; Z) H(Z) − − thus H(X; Y; Z) + H(Z) H(X; Z) + H(Y; Z) ≤ 13 Interpretation of strong subadditivity H(X; Y; Z) + H(Z) H(X; Z) + H(Y; Z) ≤ +H(X) +H(X) H(X) + H(Z) H(X; Z) − H(X) + H(Y; Z) H(X; Y; Z) ≤ − I(X:Z) I(X:Y; Z) ) ≤ Discarding the variable Y can only decrease the mutual information with X 14 Shannon capacity C = max I(X:Y ) for given channel p(y x) p(x) j Binary symmetric channel 1−p 0 0 p p p=bit-flip probability 1 1 1−p I(X:Y ) = H(Y ) H(Y X) − j = H(Y ) p(x)H(Y X = x) − x j = H(Y ) p(x)H2[p] − Px = H(Y ) H2[p] − P with H2[p] = (1 p) log (1 p) p log p − − 2 − − 2 p(x) = 1=2; 1=2 p(y) = 1=2; 1=2 H(Y ) = 1 f g ) f g ) C = 1 H2[p] bits per use of the channel − 1 0.9 0.8 0.7 0.6 C (bits) 0.5 0.4 0.3 0.2 0.1 0 0 0.1 0.2 0.3 0.4 0.5 0.6 0.7 0.8 0.9 1 p 15 Quantum information theory What if information is encoded into quantum states ? Bits b 0; 1 Quantum bits 0 ; 1 2 f g −! j i 2 fj i j ig Quantum state in a 2-d Hilbert space, regardless the physical support (e.g., spin 1/2, photon polarization) Unique properties (compared to classical info): Superposition principle: • α 0 + β 1 with α 2 + β 2 = 1 j i j i j j j j Computational basis 0 ; 1 (convention) fj i j ig Dual basis = 1 ( 0 1 ) |i p2 j i j i Non-orthogonal states • are not perfectly distinguishable quantum data compression, accessible ) information, no-cloning principle Non-classical correlations (entanglement) • EPR = 1 ( 0 0 + 1 1 ) j i p2 j ij i j ij i = 1 ( + + + ) p2 j ij i |−i|−i 16 Distinguishing quantum states prob.
Recommended publications
  • Introduction to Quantum Information Theory
    Introduction to Quantum Information Theory Carlos Palazuelos Instituto de Ciencias Matemáticas (ICMAT) [email protected] Madrid, Spain March 2013 Contents Chapter 1. A comment on these notes 3 Chapter 2. Postulates of quantum mechanics 5 1. Postulate I and Postulate II 5 2. Postulate III 7 3. Postulate IV 9 Chapter 3. Some basic results 13 1. No-cloning theorem 13 2. Quantum teleportation 14 3. Superdense coding 15 Chapter 4. The density operators formalism 17 1. Postulates of quantum mechanics: The density operators formalism 17 2. Partial trace 19 3. The Schmidt decomposition and purifications 20 4. Definition of quantum channel and its classical capacity 21 Chapter 5. Quantum nonlocality 25 1. Bell’s result: Correlations in EPR 25 2. Tsirelson’s theorem and Grothendieck’s theorem 27 Chapter 6. Some notions about classical information theory 33 1. Shannon’s noiseless channel coding theorem 33 2. Conditional entropy and Fano’s inequality 35 3. Shannon’s noisy channel coding theorem: Random coding 38 Chapter 7. Quantum Shannon Theory 45 1. Von Neumann entropy 45 2. Schumacher’s compression theorem 48 3. Accessible Information and Holevo bound 55 4. Classical capacity of a quantum channel 58 5. A final comment about the regularization 61 Bibliography 63 1 CHAPTER 1 A comment on these notes These notes were elaborated during the first semester of 2013, while I was preparing a course on quantum information theory as a subject for the PhD programme: Investigación Matemática at Universidad Complutense de Madrid. The aim of this work is to present an accessible introduction to some topics in the field of quantum information theory for those people who do not have any background on the field.
    [Show full text]
  • Efficient and Exact Quantum Compression
    Efficient and Exact Quantum Compression a; ;1 b;2 John H. Reif ∗ , Sukhendu Chakraborty aDepartment of Computer Science, Duke University, Durham, NC 27708-0129 bDepartment of Computer Science, Duke University, Durham, NC 27708-0129 Abstract We present a divide and conquer based algorithm for optimal quantum compression / de- compression, using O(n(log4 n) log log n) elementary quantum operations . Our result pro- vides the first quasi-linear time algorithm for asymptotically optimal (in size and fidelity) quantum compression and decompression. We also outline the quantum gate array model to bring about this compression in a quantum computer. Our method uses various classical algorithmic tools to significantly improve the bound from the previous best known bound of O(n3)(R. Cleve, D. P. DiVincenzo, Schumacher's quantum data compression as a quantum computation, Phys. Rev. A, 54, 1996, 2636-2650) for this operation. Key words: Quantum computing, quantum compression, algorithm 1 Introduction 1.1 Quantum Computation Quantum Computation (QC) is a computing model that applies quantum me- chanics to do computation. (Computations and methods not making use of quantum mechanics will be termed classical). A single molecule (or collection of .particles and/or atoms) may have n degrees of freedom known as qubits. Associated with each fixed setting X of the n qubits to boolean values is a basis state denoted a . Quantum mechanics allows for a linear superposition of these basis states to j i ∗ Corresponding author. Email addresses: [email protected] ( John H. Reif), [email protected] (Sukhendu Chakraborty). 1 The work is supported by NSF EMT Grants CCF-0523555 and CCF-0432038.
    [Show full text]
  • Unitary Decomposition Implemented in the Openql Programming Language for Quantum Computation A.M
    Unitary Decomposition Implemented in the OpenQL programming language for quantum computation A.M. Krol September 13th 36 Electrical Engineering, Mathematics and Computer Sciences LB 01.010 Snijderszaal Unitary Decomposition Implemented in the OpenQL programming language for quantum computation by A.M. Krol to obtain the degree of Master of Science at the Delft University of Technology, to be defended publicly on Friday September 13, 2019 at 15:00. Student number: 4292391 Project duration: November 20, 2018 – September 13, 2019 Thesis committee: Prof. dr. ir. K. Bertels, TU Delft, supervisor Dr. I. Ashraf, TU Delft Dr. M. Möller, TU Delft Dr. Z. Al-Ars TU Delft An electronic version of this thesis is available at http://repository.tudelft.nl/. Preface In this thesis, I explain my implementation of Unitary Decomposition in OpenQL. Unitary Decomposition is an algorithm for translating a unitary matrix into many small unitary matrices, which correspond to a circuit that can be executed on a quantum computer. It is implemented in the quantum programming framework of the QCA-group at TU Delft: OpenQL, a library for Python and C++. Unitary Decomposition is a necessary part in Quantum Associative Memory, an algorithm used in Quantum Genome Sequenc- ing. The implementation is faster than other known implementations, and generates 3 ∗ 2 ∗ (2 − 1) rotation gates for an n-qubit input gate. This is not the least-known nor the theoretical minimum amount, and there are some optimizations that can still be done to make it closer to these numbers. I would like to thank my supervisor, Prof. Koen Bertels, for the great supervision and insightful feedback.
    [Show full text]
  • Quantum Computing
    John H. Reif, Quantum Computing. Published in book “Bio-inspired and Nanoscale Integrated Computing”, Chapter 3, pp. 67-110 (edited by Mary Mehrnoosh Eshaghian-Wilner), Publisher: Wiley, Hoboken, NJ, USA, (February 2009). Chapter 3: Quantum Computing John H. Reif Department of Computer Science Duke University ‡ 3.0 Summary Quantum Computation (QC) is a type of computation where unitary and measurement operations are executed on linear superpositions of basis states. This paper provides a brief introduction to QC. We begin with a discussion of basic models for QC such as quantum TMs, quantum gates and circuits and related complexity results. We then discuss a number of topics in quan- tum information theory, including bounds for quantum communication and I/O complexity, methods for quantum data compression. and quantum er- ‡Surface address: Department of Computer Science, Duke University, Durham, NC 27708-0129. E-mail: [email protected]. This work has been supported by grants from NSF CCF-0432038 and CCF-0523555. A postscript preprint of this Chapter is available online at URL: http://www.cs.duke.edu/∼reif/paper/qsurvey/qsurvey.chapter.pdf. ror correction (that is, techniques for decreasing decoherence errors in QC), Furthermore, we enumerate a number of methodologies and technologies for doing QC. Finally, we discuss resource bounds for QC including bonds for processing time, energy and volume, particularly emphasizing challenges in determining volume bounds for observation apperatus. 3.1 Introduction 3.1.1 Reversible Computations Reversible Computations are computations where each state transformation is a reversible function, so that any computation can be reversed without loss of information.
    [Show full text]
  • Supercomputer Simulations of Transmon Quantum Computers Quantum Simulations of Transmon Supercomputer
    IAS Series IAS Supercomputer simulations of transmon quantum computers quantum simulations of transmon Supercomputer 45 Supercomputer simulations of transmon quantum computers Dennis Willsch IAS Series IAS Series Band / Volume 45 Band / Volume 45 ISBN 978-3-95806-505-5 ISBN 978-3-95806-505-5 Dennis Willsch Schriften des Forschungszentrums Jülich IAS Series Band / Volume 45 Forschungszentrum Jülich GmbH Institute for Advanced Simulation (IAS) Jülich Supercomputing Centre (JSC) Supercomputer simulations of transmon quantum computers Dennis Willsch Schriften des Forschungszentrums Jülich IAS Series Band / Volume 45 ISSN 1868-8489 ISBN 978-3-95806-505-5 Bibliografsche Information der Deutschen Nationalbibliothek. Die Deutsche Nationalbibliothek verzeichnet diese Publikation in der Deutschen Nationalbibliografe; detaillierte Bibliografsche Daten sind im Internet über http://dnb.d-nb.de abrufbar. Herausgeber Forschungszentrum Jülich GmbH und Vertrieb: Zentralbibliothek, Verlag 52425 Jülich Tel.: +49 2461 61-5368 Fax: +49 2461 61-6103 [email protected] www.fz-juelich.de/zb Umschlaggestaltung: Grafsche Medien, Forschungszentrum Jülich GmbH Titelbild: Quantum Flagship/H.Ritsch Druck: Grafsche Medien, Forschungszentrum Jülich GmbH Copyright: Forschungszentrum Jülich 2020 Schriften des Forschungszentrums Jülich IAS Series, Band / Volume 45 D 82 (Diss. RWTH Aachen University, 2020) ISSN 1868-8489 ISBN 978-3-95806-505-5 Vollständig frei verfügbar über das Publikationsportal des Forschungszentrums Jülich (JuSER) unter www.fz-juelich.de/zb/openaccess. This is an Open Access publication distributed under the terms of the Creative Commons Attribution License 4.0, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. Abstract We develop a simulator for quantum computers composed of superconducting transmon qubits.
    [Show full text]
  • Quantum Information Processing with Superconducting Circuits: a Review
    Quantum Information Processing with Superconducting Circuits: a Review G. Wendin Department of Microtechnology and Nanoscience - MC2, Chalmers University of Technology, SE-41296 Gothenburg, Sweden Abstract. During the last ten years, superconducting circuits have passed from being interesting physical devices to becoming contenders for near-future useful and scalable quantum information processing (QIP). Advanced quantum simulation experiments have been shown with up to nine qubits, while a demonstration of Quantum Supremacy with fifty qubits is anticipated in just a few years. Quantum Supremacy means that the quantum system can no longer be simulated by the most powerful classical supercomputers. Integrated classical-quantum computing systems are already emerging that can be used for software development and experimentation, even via web interfaces. Therefore, the time is ripe for describing some of the recent development of super- conducting devices, systems and applications. As such, the discussion of superconduct- ing qubits and circuits is limited to devices that are proven useful for current or near future applications. Consequently, the centre of interest is the practical applications of QIP, such as computation and simulation in Physics and Chemistry. Keywords: superconducting circuits, microwave resonators, Josephson junctions, qubits, quantum computing, simulation, quantum control, quantum error correction, superposition, entanglement arXiv:1610.02208v2 [quant-ph] 8 Oct 2017 Contents 1 Introduction 6 2 Easy and hard problems 8 2.1 Computational complexity . .9 2.2 Hard problems . .9 2.3 Quantum speedup . 10 2.4 Quantum Supremacy . 11 3 Superconducting circuits and systems 12 3.1 The DiVincenzo criteria (DV1-DV7) . 12 3.2 Josephson quantum circuits . 12 3.3 Qubits (DV1) .
    [Show full text]
  • Chapter 5 Quantum Information Theory
    Chapter 5 Quantum Information Theory Quantum information theory is a rich subject that could easily have occupied us all term. But because we are short of time (I’m anxious to move on to quantum computation), I won’t be able to cover this subject in as much depth as I would have liked. We will settle for a brisk introduction to some of the main ideas and results. The lectures will perhaps be sketchier than in the first term, with more hand waving and more details to be filled in through homework exercises. Perhaps this chapter should have been called “quantum information theory for the impatient.” Quantum information theory deals with four main topics: (1) Transmission of classical information over quantum channels (which we will discuss). (2) The tradeoff between acquisition of information about a quantum state and disturbance of the state (briefly discussed in Chapter 4 in connec- tion with quantum cryptography, but given short shrift here). (3) Quantifying quantum entanglement (which we will touch on briefly). (4) Transmission of quantum information over quantum channels. (We will discuss the case of a noiseless channel, but we will postpone discus- sion of the noisy channel until later, when we come to quantum error- correcting codes.) These topics are united by a common recurring theme: the interpretation and applications of the Von Neumann entropy. 1 2 CHAPTER 5. QUANTUM INFORMATION THEORY 5.1 Shannon for Dummies Before we can understand Von Neumann entropy and its relevance to quan- tum information, we must discuss Shannon entropy and its relevance to clas- sical information.
    [Show full text]
  • Quantum Information Theory
    Quantum Information Theory Jun-Ting Hsieh Bingbin Liu Stanford University Stanford University [email protected] [email protected] 1 Introduction In our current digital world, everything, from computing devices to communication channels, is represented as 0s and 1s. The “information” that these bits can present has been well studied in the field of classical information theory. For example, we know the capacity and limits of data compression and the rate of reliable communication over noisy channels. Recently, perhaps due to the excitement of quantum computation, these ideas in information theory have been extended to the quantum world, leading to the field of quantum information theory. In this paper, we would like to introduce the quantum counterparts of some of the key ideas we studied in the course, including the quantum entropy measure, quantum source encoding, and touch briefly on quantum channels. 1.1 How is quantum different than classical? Compared to the classical world, quantum mechanics has several “weird” properties that make things much more convoluted. Thus, we first introduce some major differences between quantum and classical information, which are the reasons that quantum information is so interesting yet harder to analyze. Refer to Section 2 for a more detailed introduction of quantum mechanics. Qubit. The quantum version of the classical bit is the qubit. A classical bit is either 0 or 1, while a qubit can be superposition of 0 and 1. This means that it is both 0 and 1, and if we perform a measurement we will get 0 and 1 with certain probabilities. Imagine that every bit in our computer is both 0 and 1 at the same time, and if we even try to read from it, we not only get a probabilistic answer but also collapse that qubit state! Entanglement.
    [Show full text]
  • The Transmon Qubit
    The Transmon Qubit Sam Bader December 14, 2013 Contents 1 Introduction 2 2 Qubit Architecture 4 2.1 Cooper Pair Box . .4 2.1.1 Classical Hamiltonian . .4 2.1.2 Quantized Hamiltonian . .5 2.2 Capacitively-shunted CPB . .7 2.2.1 The ratio EJ =Ec .....................................7 3 Circuit QED 9 3.1 Vocabulary of Cavity QED . .9 3.1.1 Jaynes-Cummings Hamiltonian . 10 3.1.2 Effects of the coupling: resonant and dispersive limits . 10 3.1.3 Purcell Effect . 11 3.2 Translating into Circuit QED . 12 3.2.1 Why Circuit QED is easier than Cavity QED . 12 3.2.2 Circuit QED Hamiltonian . 13 4 Control and Readout Protocol 15 4.1 Measurement . 15 4.2 Single qubit gates . 16 4.2.1 Modeling drives . 16 4.2.2 Applying gates . 16 4.3 Multi-qubit gates and entanglement . 17 5 Conclusion 19 A Derivation of Classical Hamiltonians for Qubit Systems 20 A.1 Cooper Pair Box . 20 A.2 Transmon with transmission line . 21 B Quantum Circuits 23 B.1 Charge basis . 23 B.2 Phase basis . 24 C Perturbation Theory for the Transmon 25 C.1 Periodic Potentials . 25 C.2 Transforming away the offset charge . 26 C.3 Duffing Oscillator . 26 C.3.1 Relative Anharmonicity . 26 C.3.2 Number operator matrix elements . 27 1 Chapter 1 Introduction Quantum information processing is one of the most thrilling prospects to emerge from the interaction of physics and computer science. In recent decades, scientists have transitioned from merely observing microscopic systems to actually controlling those same systems on the scale of individual quanta, and the future of information processing based on these techniques will revolutionize the computing industry.
    [Show full text]
  • Entanglement Manipulation
    Entanglement Manipulation Steven T. Flammia1 1Perimeter Institute for Theoretical Physics, Waterloo, Ontario, N2L 2Y5 Canada (Dated: 22 March 2010) These are notes for my RIT tutorial lecture at the University of Maryland math department. I. INTRODUCTION Entanglement serves as a resource which we can use to perform novel information processing tasks, in particular communication tasks. For example, superdense coding and teleportation are two such tasks which are impossible classically; they make essential use of entanglement. In this lecture I’m going to cover dense coding and teleportation and then show how we can manipulate entanglement into a standard “currency” which will allow us to quantify how useful different states are for these tasks. Based on an operational definition, we will define a way to measure the amount of entanglement in a quantum state. We will consider the following scenario. We have two parties, Alice and Bob (labeled A and B), and they wish to communicate through a quantum or classical channel. In the literature, channel does have a technical meaning: it is a completely positive linear map, i.e. a linear map that takes density operators to density operators (and it is not necessarily surjective). We call these CP maps for short. We can consider that the channel is noisy, or we can consider a perfect channel (the identity map), but we have noisy quantum states. We will always assume that any classical channel is perfect. A and B would like to communicate classical and quantum information in the most efficient way possible using the classical and quantum channels (respectively) that they share.
    [Show full text]
  • Perturbative Analysis of Two-Qubit Gates on Transmon Qubits
    Perturbative analysis of two-qubit gates on transmon qubits von Susanne Richer Masterarbeit in Physik vorgelegt der Fakult¨atf¨urMathematik, Informatik und Naturwissenschaften der RWTH Aachen im September 2013 angefertigt im Institut f¨urQuanteninformation bei Prof. Dr. Barbara M. Terhal, Prof. Dr. David P. DiVincenzo Abstract This thesis treats different schemes for two-qubit gates on transmon qubits and their per- turbative analysis. The transmon qubit is a superconducting qubit that stands out due to its very low sensitivity to charge noise, leading to high coherence times. However, it is also characterized by its low anharmonicity, making it impossible to neglect the higher transmon levels. Coupled systems of superconducting qubits and resonators can be treated in cavity QED. In the dispersive regime, where qubit and resonator are far detuned from each other, per- turbative methods can be used for the derivation of effective Hamiltonians. Several such methods are presented here, among which the Schrieffer-Wolff transformation results to be the most adequate. As the anharmonicity of the transmon qubit is low, higher transmon levels play a signifi- cant role in two-qubit gate schemes. These gates can be driven using microwave pulses, where certain resonance conditions between the transmon levels are used to tune up the desired two-transmon interaction effects. The Schrieffer-Wolff transformation will be used to see how these effects arise. Contents 1. Introduction 1 2. Transmon qubits in cavity QED 3 2.1. Cavity QED and Jaynes-Cummings model . .3 2.1.1. Dispersive regime . .4 2.2. Circuit QED . .5 2.2.1. The Transmon qubit .
    [Show full text]
  • Afonso Rodrigues Validation of Quantum Simulations
    Universidade do Minho Escola de Engenharia Departamento de Informática Afonso Rodrigues Validation of quantum simulations Assessing efficiency and reliability in experimental implementations November 2018 Universidade do Minho Escola de Engenharia Departamento de Informática Afonso Rodrigues Validation of quantum simulations Assessing efficiency and reliability in experimental implementations Master dissertation Master Degree in Engineering Physics Dissertation supervised by Luís Barbosa Carlos Tavares November 2018 ACKNOWLEDGEMENTS This work was only possible thanks to the contribution of several people to which I want to express my gratitude. To my supervisor prof. Luís Barbosa, for giving me the opportunity to undertake this project, and for his constant support, availability and patience; also to my co-supervisor Carlos Tavares, for his early insight. In no particular order of importance, to Miguel Nogueira, Ricardo Alves, Rui Costa, João Fonseca, Miguel Sanches, Joaquim Santos, and José Bruno, my friends and colleagues who accompanied me in this course and provided invaluable help. To my parents and sister, and Maria Coelho, André Souto and Gil Pimentel for their unconditional encouragement on the difficult days. Finally, I wish to thank University of Minho for these five years of learning, INESC TEC and specifically the HASLab team for supporting me in my first steps as a researcher. I acknowledge use of the IBM Q for this work. i ABSTRACT Quantum simulation is one of the most relevant applications of quantum computation for the near future, due to its scientific impact and also because quantum simulation algorithms are typically less demanding than generalized quantum computations. Ultimately, the success of a quantum simulation depends on the amount and reliability of information one is able to extract from the results.
    [Show full text]