Quantum Information Processing Protocols
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
Security of Quantum Key Distribution with Entangled Qutrits
View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CERN Document Server Security of Quantum Key Distribution with Entangled Qutrits. Thomas Durt,1 Nicolas J. Cerf,2 Nicolas Gisin,3 and Marek Zukowski˙ 4 1 Toegepaste Natuurkunde en Fotonica, Theoeretische Natuurkunde, Vrije Universiteit Brussel, Pleinlaan 2, 1050 Brussels, Belgium 2 Ecole Polytechnique, CP 165, Universit´e Libre de Bruxelles, 1050 Brussels, Belgium 3 Group of Applied Physics - Optique, Universit´e de Gen`eve, 20 rue de l’Ecole de M´edecine, Gen`eve 4, Switzerland, 4Instytut Fizyki Teoretycznej i Astrofizyki Uniwersytet, Gda´nski, PL-80-952 Gda´nsk, Poland July 2002 Abstract The study of quantum cryptography and quantum non-locality have traditionnally been based on two-level quantum systems (qubits). In this paper we consider a general- isation of Ekert's cryptographic protocol[20] where qubits are replaced by qutrits. The security of this protocol is related to non-locality, in analogy with Ekert's protocol. In order to study its robustness against the optimal individual attacks, we derive the infor- mation gained by a potential eavesdropper applying a cloning-based attack. Introduction Quantum cryptography aims at transmitting a random key in such a way that the presence of an eavesdropper that monitors the communication is revealed by disturbances in the transmission of the key (for a review, see e.g. [21]). Practically, it is enough in order to realize a crypto- graphic protocol that the key signal is encoded into quantum states that belong to incompatible bases, as in the original protocol of Bennett and Brassard[4]. -
A Tutorial Introduction to Quantum Circuit Programming in Dependently Typed Proto-Quipper
A tutorial introduction to quantum circuit programming in dependently typed Proto-Quipper Peng Fu1, Kohei Kishida2, Neil J. Ross1, and Peter Selinger1 1 Dalhousie University, Halifax, NS, Canada ffrank-fu,neil.jr.ross,[email protected] 2 University of Illinois, Urbana-Champaign, IL, U.S.A. [email protected] Abstract. We introduce dependently typed Proto-Quipper, or Proto- Quipper-D for short, an experimental quantum circuit programming lan- guage with linear dependent types. We give several examples to illustrate how linear dependent types can help in the construction of correct quan- tum circuits. Specifically, we show how dependent types enable program- ming families of circuits, and how dependent types solve the problem of type-safe uncomputation of garbage qubits. We also discuss other lan- guage features along the way. Keywords: Quantum programming languages · Linear dependent types · Proto-Quipper-D 1 Introduction Quantum computers can in principle outperform conventional computers at cer- tain crucial tasks that underlie modern computing infrastructures. Experimental quantum computing is in its early stages and existing devices are not yet suitable for practical computing. However, several groups of researchers, in both academia and industry, are now building quantum computers (see, e.g., [2,11,16]). Quan- tum computing also raises many challenging questions for the programming lan- guage community [17]: How should we design programming languages for quan- tum computation? How should we compile and optimize quantum programs? How should we test and verify quantum programs? How should we understand the semantics of quantum programming languages? In this paper, we focus on quantum circuit programming using the linear dependently typed functional language Proto-Quipper-D. -
Superdense Teleportation and Quantum Key Distribution for Space Applications
2015 IEEE International Conference on Space Optical Systems and Applications (ICSOS) Superdense Teleportation and Quantum Key Distribution for Space Applications Trent Graham, Christopher Zeitler, Joseph Chapman, Hamid Javadi Paul Kwiat Submillimeter Wave Advanced Technology Group Department of Physics Jet Propulsion Laboratory, University of Illinois at Urbana-Champaign California Institute of Technology Urbana, USA Pasadena, USA tgraham2@illinois. edu Herbert Bernstein Institute for Science & Interdisciplinary Studies & School of Natural Sciences Hampshire College Amherst, USA Abstract—The transfer of quantum information over long for long periods of time (as would be needed for large scale distances has long been a goal of quantum information science quantum repeaters) and cannot be amplified without and is required for many important quantum communication introducing error [ 6 ] and thus can be very difficult to and computing protocols. When these channels are lossy and distribute over large distances using conventional noisy, it is often impossible to directly transmit quantum states communication techniques. Despite current limitations, some between two distant parties. We use a new technique called quantum communication protocols have already been superdense teleportation to communicate quantum demonstrated over long-distances in terrestrial experiments. information deterministically with greatly reduced resources, Notably, quantum teleportation (a remote quantum state simplified measurements, and decreased classical transfer protocol), -
Introduction to Quantum Information and Computation
Introduction to Quantum Information and Computation Steven M. Girvin ⃝c 2019, 2020 [Compiled: May 2, 2020] Contents 1 Introduction 1 1.1 Two-Slit Experiment, Interference and Measurements . 2 1.2 Bits and Qubits . 3 1.3 Stern-Gerlach experiment: the first qubit . 8 2 Introduction to Hilbert Space 16 2.1 Linear Operators on Hilbert Space . 18 2.2 Dirac Notation for Operators . 24 2.3 Orthonormal bases for electron spin states . 25 2.4 Rotations in Hilbert Space . 29 2.5 Hilbert Space and Operators for Multiple Spins . 38 3 Two-Qubit Gates and Entanglement 43 3.1 Introduction . 43 3.2 The CNOT Gate . 44 3.3 Bell Inequalities . 51 3.4 Quantum Dense Coding . 55 3.5 No-Cloning Theorem Revisited . 59 3.6 Quantum Teleportation . 60 3.7 YET TO DO: . 61 4 Quantum Error Correction 63 4.1 An advanced topic for the experts . 68 5 Yet To Do 71 i Chapter 1 Introduction By 1895 there seemed to be nothing left to do in physics except fill out a few details. Maxwell had unified electriciy, magnetism and optics with his theory of electromagnetic waves. Thermodynamics was hugely successful well before there was any deep understanding about the properties of atoms (or even certainty about their existence!) could make accurate predictions about the efficiency of the steam engines powering the industrial revolution. By 1895, statistical mechanics was well on its way to providing a microscopic basis in terms of the random motions of atoms to explain the macroscopic predictions of thermodynamics. However over the next decade, a few careful observers (e.g. -
Arxiv:Quant-Ph/0504183V1 25 Apr 2005 † ∗ Elsae 1,1,1] Oee,I H Rcs Fmea- Is of Above the Process the Vandalized
Deterministic Bell State Discrimination Manu Gupta1∗ and Prasanta K. Panigrahi2† 1 Jaypee Institute of Information Technology, Noida, 201 307, India 2 Physical Research Laboratory, Navrangpura, Ahmedabad, 380 009, India We make use of local operations with two ancilla bits to deterministically distinguish all the four Bell states, without affecting the quantum channel containing these Bell states. Entangled states play a key role in the transmission and processing of quantum information [1, 2]. Using en- tangled channel, an unknown state can be teleported [3] with local unitary operations, appropriate measurement and classical communication; one can achieve entangle- ment swapping through joint measurement on two en- tangled pairs [4]. Entanglement leads to increase in the capacity of the quantum information channel, known as quantum dense coding [5]. The bipartite, maximally en- FIG. 1: Diagram depicting the circuit for Bell state discrimi- tangled Bell states provide the most transparent illustra- nator. tion of these aspects, although three particle entangled states like GHZ and W states are beginning to be em- ployed for various purposes [6, 7]. satisfactory, where the Bell state is not required further Making use of single qubit operations and the in the quantum network. Controlled-NOT gates, one can produce various entan- We present in this letter, a scheme which discriminates gled states in a quantum network [1]. It may be of inter- all the four Bell states deterministically and is able to pre- est to know the type of entangled state that is present in serve these states for further use. As LOCC alone is in- a quantum network, at various stages of quantum compu- sufficient for this purpose, we will make use of two ancilla tation and cryptographic operations, without disturbing bits, along with the entangled channels. -
Timelike Curves Can Increase Entanglement with LOCC Subhayan Roy Moulick & Prasanta K
www.nature.com/scientificreports OPEN Timelike curves can increase entanglement with LOCC Subhayan Roy Moulick & Prasanta K. Panigrahi We study the nature of entanglement in presence of Deutschian closed timelike curves (D-CTCs) and Received: 10 March 2016 open timelike curves (OTCs) and find that existence of such physical systems in nature would allow us to Accepted: 05 October 2016 increase entanglement using local operations and classical communication (LOCC). This is otherwise in Published: 29 November 2016 direct contradiction with the fundamental definition of entanglement. We study this problem from the perspective of Bell state discrimination, and show how D-CTCs and OTCs can unambiguously distinguish between four Bell states with LOCC, that is otherwise known to be impossible. Entanglement and Closed Timelike Curves (CTC) are perhaps the most exclusive features in quantum mechanics and general theory of relativity (GTR) respectively. Interestingly, both theories, advocate nonlocality through them. While the existence of CTCs1 is still debated upon, there is no reason for them, to not exist according to GTR2,3. CTCs come as a solution to Einstein’s field equations, which is a classical theory itself. Seminal works due to Deutsch4, Lloyd et al.5, and Allen6 have successfully ported these solutions into the framework of quantum mechanics. The formulation due to Lloyd et al., through post-selected teleportation (P-CTCs) have been also experimentally verified7. The existence of CTCs has been disturbing to some physicists, due to the paradoxes, like the grandfather par- adox or the unproven theorem paradox, that arise due to them. Deutsch resolved such paradoxes by presenting a method for finding self-consistent solutions of CTC interactions. -
Superdense Coding Ch.4.4 No Cloning Ch.4.2
C/CS/PhysC191 SuperdenseCoding,NoCloning 9/15/07 Fall 2009 Lecture 6 1 Readings Benenti, Casati, and Strini: Superdense Coding Ch.4.4 No Cloning Ch.4.2 2 Superdense Coding Super dense coding is the less popular sibling of teleportation. It can actually be viewed as the process in reverse. The idea is to transmit two classical bits of information by only sending one quantum bit. The process starts out with an EPR pair that is shared between the sender (Alice) and receiver (Bob). ψ = 1 00 + 11 √2 The first qubit is Alice’s, the second is Bob’s. Alice wants to send a two bit message to Bob, e.g., 00, 01, 10, or 11. She first performs a single qubit operation on her qubit which transforms the EPR pair according to which message she wants to send: • for a message 00: Alice applies I (i.e., does nothing) • for a message 01: Alice applies X • for a message 10: Alice applies Z • for a message 11: Alice applies iY (i.e. both X and Z) + + + This transforms the EPR pair φ into the four Bell (EPR) states φ , φ − , ψ , and ψ− , respec- tively: 1 1 0 0 • 00: 1 00 + 11 1 00 + 11 = 1 0 1 √2 −→ √2 √2 0 1 0 0 1 1 • 01: 1 00 + 11 1 10 + 01 = 1 1 0 √2 −→ √2 √2 1 0 1 1 0 0 • 10: 1 00 + 11 1 00 11 = 1 0 1 √2 −→ √2 − √2 0 − 1 − C/CS/Phys C191, Fall 2009, Lecture 6 1 0 0 i 1 • 11: i − 1 00 + 11 1 01 10 = 1 i 0 √2 −→ √2 − √2 1 − 0 The key to super-dense coding is that these four Bell states are orthonormal and are hence distinguishable by a quantum measurement, in this case a two-qubit measurement made by Bob. -
Progress in Satellite Quantum Key Distribution
www.nature.com/npjqi REVIEW ARTICLE OPEN Progress in satellite quantum key distribution Robert Bedington 1, Juan Miguel Arrazola1 and Alexander Ling1,2 Quantum key distribution (QKD) is a family of protocols for growing a private encryption key between two parties. Despite much progress, all ground-based QKD approaches have a distance limit due to atmospheric losses or in-fibre attenuation. These limitations make purely ground-based systems impractical for a global distribution network. However, the range of communication may be extended by employing satellites equipped with high-quality optical links. This manuscript summarizes research and development which is beginning to enable QKD with satellites. It includes a discussion of protocols, infrastructure, and the technical challenges involved with implementing such systems, as well as a top level summary of on-going satellite QKD initiatives around the world. npj Quantum Information (2017) 3:30 ; doi:10.1038/s41534-017-0031-5 INTRODUCTION losses that increase exponentially with distance, greatly limiting Quantum key distribution (QKD) is a relatively new cryptographic the secure key rates that can be achieved over long ranges. primitive for establishing a private encryption key between two For any pure-loss channel with transmittance η, it has been parties. The concept has rapidly matured into a commercial shown that the secure key rate per mode of any QKD protocol 5, 6, 7 technology since the first proposal emerged in 1984,1 largely scales linearly with η for small η. This places a fundamental because of a very attractive proposition: the security of QKD is not limit to the maximum distance attainable by QKD protocols based on the computational hardness of solving mathematical relying on direct transmission. -
A Principle Explanation of Bell State Entanglement: Conservation Per No Preferred Reference Frame
A Principle Explanation of Bell State Entanglement: Conservation per No Preferred Reference Frame W.M. Stuckey∗ and Michael Silbersteiny z 26 September 2020 Abstract Many in quantum foundations seek a principle explanation of Bell state entanglement. While reconstructions of quantum mechanics (QM) have been produced, the community does not find them compelling. Herein we offer a principle explanation for Bell state entanglement, i.e., conser- vation per no preferred reference frame (NPRF), such that NPRF unifies Bell state entanglement with length contraction and time dilation from special relativity (SR). What makes this a principle explanation is that it's grounded directly in phenomenology, it is an adynamical and acausal explanation that involves adynamical global constraints as opposed to dy- namical laws or causal mechanisms, and it's unifying with respect to QM and SR. 1 Introduction Many physicists in quantum information theory (QIT) are calling for \clear physical principles" [Fuchs and Stacey, 2016] to account for quantum mechanics (QM). As [Hardy, 2016] points out, \The standard axioms of [quantum theory] are rather ad hoc. Where does this structure come from?" Fuchs points to the postulates of special relativity (SR) as an example of what QIT seeks for QM [Fuchs and Stacey, 2016] and SR is a principle theory [Felline, 2011]. That is, the postulates of SR are constraints offered without a corresponding constructive explanation. In what follows, [Einstein, 1919] explains the difference between the two: We can distinguish various kinds of theories in physics. Most of them are constructive. They attempt to build up a picture of the more complex phenomena out of the materials of a relatively simple ∗Department of Physics, Elizabethtown College, Elizabethtown, PA 17022, USA yDepartment of Philosophy, Elizabethtown College, Elizabethtown, PA 17022, USA zDepartment of Philosophy, University of Maryland, College Park, MD 20742, USA 1 formal scheme from which they start out. -
The Statistical Interpretation of Entangled States B
The Statistical Interpretation of Entangled States B. C. Sanctuary Department of Chemistry, McGill University 801 Sherbrooke Street W Montreal, PQ, H3A 2K6, Canada Abstract Entangled EPR spin pairs can be treated using the statistical ensemble interpretation of quantum mechanics. As such the singlet state results from an ensemble of spin pairs each with an arbitrary axis of quantization. This axis acts as a quantum mechanical hidden variable. If the spins lose coherence they disentangle into a mixed state. Whether or not the EPR spin pairs retain entanglement or disentangle, however, the statistical ensemble interpretation resolves the EPR paradox and gives a mechanism for quantum “teleportation” without the need for instantaneous action-at-a-distance. Keywords: Statistical ensemble, entanglement, disentanglement, quantum correlations, EPR paradox, Bell’s inequalities, quantum non-locality and locality, coincidence detection 1. Introduction The fundamental questions of quantum mechanics (QM) are rooted in the philosophical interpretation of the wave function1. At the time these were first debated, covering the fifty or so years following the formulation of QM, the arguments were based primarily on gedanken experiments2. Today the situation has changed with numerous experiments now possible that can guide us in our search for the true nature of the microscopic world, and how The Infamous Boundary3 to the macroscopic world is breached. The current view is based upon pivotal experiments, performed by Aspect4 showing that quantum mechanics is correct and Bell’s inequalities5 are violated. From this the non-local nature of QM became firmly entrenched in physics leading to other experiments, notably those demonstrating that non-locally is fundamental to quantum “teleportation”. -
Practical Quantum Key Distribution Based on the BB84 Protocol
Practical Quantum Key Distribution based on the BB84 protocol A. Ruiz-Alba, D. Calvo, V. Garcia-Muñoz, A. Martinez, W. Amaya, J.G. Rozo, J. Mora, J. Capmany Instituto de Telecomunicaciones y Aplicaciones Multimedia, Universitat Politècnica de València, 8G Building-access D-Camino de Vera s/n-46022 Valencia (Spain) Corresponding author: [email protected] Abstract relies on photon sources and the so-called pho- ton guns are far from ready. An alternative and This paper provides a review of the most impor- also a complementary approach to increase the tant and widely used Quantum Key Distribution bit rate is to make QKD systems work in paral- systems and then describes our recently pro- lel. This simple engineering approach becomes a posed scheme based on Subcarrier Multiplexing challenge when working with quantum systems: that opens the possibility of parallel Quantum The system should work in parallel but still rely Key Distribution. We report the first-ever ex- on just one source and its security should still be perimental implementation of parallel quantum guaranteed by the principles of quantum me- key distribution using this technique showing a chanics both when Alice prepares the photons maximum multiplexing gain. and when Bob “measures” the incoming states. At the same time the multiplexing technique Keywords: Optical fiber communications, quan- should be safe to Eve gaining any information. tum information, quantum key distribution, sub- carrier multiplexing. In this context, recent progress in the literature [4] remarks that photonics is a key enabling technology for implementing commercial QKD 1. Introduction systems to become a competitive technology in Information Security. -
Quantum Key Distribution Protocols and Applications
Quantum Key Distribution Protocols and Applications Sheila Cobourne Technical Report RHUL{MA{2011{05 8th March 2011 Department of Mathematics Royal Holloway, University of London Egham, Surrey TW20 0EX, England http://www.rhul.ac.uk/mathematics/techreports Title: Quantum Key Distribution – Protocols and Applications Name: Sheila Cobourne Student Number: 100627811 Supervisor: Carlos Cid Submitted as part of the requirements for the award of the MSc in Information Security at Royal Holloway, University of London. I declare that this assignment is all my own work and that I have acknowledged all quotations from the published or unpublished works of other people. I declare that I have also read the statements on plagiarism in Section 1 of the Regulations Governing Examination and Assessment Offences and in accordance with it I submit this project report as my own work. Signature: Date: Acknowledgements I would like to thank Carlos Cid for his helpful suggestions and guidance during this project. Also, I would like to express my appreciation to the lecturers at Royal Holloway who have increased my understanding of Information Security immensely over the course of the MSc, without which this project would not have been possible. Contents Table of Figures ................................................................................................... 6 Executive Summary ............................................................................................. 7 Chapter 1 Introduction ...................................................................................