Quantum Algorithms

Total Page:16

File Type:pdf, Size:1020Kb

Quantum Algorithms Quantum algorithms Andrew Childs Pawel Wocjan University of Waterloo University of Central Florida 10th Canadian Summer School on Quantum Information 17{19 July 2010 Outline I. Quantum circuits II. Elementary quantum algorithms III. The QFT and phase estimation IV. Factoring V. Quantum search VI. Quantum walk Part I Quantum circuits Quantum circuit model Quantum circuits are generalizations of Boolean circuits input transformation output (probabilistic) 1 U1 0 j i U3 U6 1 U5 1 j i U2 NM 0 0 j i U6 NM 1 U4 1 j i U3 U7 NM 0 1 j i NM NM Classical bit Classical bit (bit): B := 0; 1 f g I Basis state: either 0 or 1 I General state: a probability distribution p = (p0; p1) on B Classical register n Classical register: B := B B ::: B × × × | {zn } n I Basis state: a binary string x B 2 n I General state: a probability distribution p = (px : x B ) on n 2 B (written as a column vector) Remark: Note that p is a vector with positive entries that is normalized with respect to the `1-norm (the sum of the absolute values of the entries) Classical transformation Transformations on the classical register B are described by stochastic matrices Stochastic matrices preserve the `1-norm, i.e., probability distributions are mapped on probability distributions Let p be the state of the register. The state after the transformation P is given by the matrix-vector-product Pp Qubit 2 Quantum bit (qubit): two-dimensional complex Hilbert space C I Computational basis states (classical states): 1 0 0 := and 1 := j i 0 j i 1 I General states: superpositions α0 2 2 = = α0 0 + α1 1 ; α0 + α1 = 1 j i α1 j i j i j j j j the coefficients α0; α1 C are called probability amplitudes 2 Quantum register n 2 ⊗n Quantum register: 2 -dimensional complex Hilbert space (C ) with tensor product structure 2 ⊗n 2 2 2 (C ) := C C C ⊗ ⊗ · · · ⊗ | {zn } I Computational basis states (classical states): n x = x1 x2 xn ; x B j i j i ⊗ j i ⊗ · · · ⊗ j i 2 I General state: X X 2 = αx x ; αx = 1 j i j i j j x2Bn x Remark: Note that is a column vector (ket) that is j i normalized with respect to the `2-norm (Euclidean norm) Quantum transformations 2 ⊗n Transformations on the quantum register := (C ) are described by unitary matrices U ( ) H 2 U H Unitary matrices preserve the `2-norm Let be the state of the quantum register; the state after the transformationj i 2 H U is given by the matrix-vector product U j i Quantum circuit Each transformations U has to be implemented by a quantum circuit, i.e., a sequence of elementary gates Quantum circuit model = Quantum mechanics + Notion of complexity Single qubit gate on two qubits U single-qubit gate U on first qubit 0 0 (U 0 ) 0 j i ⊗ j i 7! j i ⊗ j i 2 2 0 1 (U 0 ) 1 action on basis states of C C j i ⊗ j i 7! j i ⊗ j i ⊗ 1 0 (U 1 ) 0 j1i ⊗ j1i 7! (Uj1i) ⊗ j1i j i ⊗ j i 7! j i ⊗ j i corresponding matrix 0 1 u00 0 u01 0 u00 I u01 I B 0 u00 0 u01 C U I = · · = B C ⊗ u10 I u11 I @ u10 0 u11 0 A · · 0 u10 0 u11 Single qubit gate on two qubits single-qubit gate U on second qubit U 0 0 0 U 0 j i ⊗ j i 7! j i ⊗ j i 2 2 0 1 0 U 1 action on basis states of C C j i ⊗ j i 7! j i ⊗ j i ⊗ 1 0 1 U 0 j1i ⊗ j1i 7! j1i ⊗ Uj1i j i ⊗ j i 7! j i ⊗ j i corresponding matrix 0 1 u00 u01 0 0 1 U 0 U B u10 u11 0 0 C I U = · · = B C ⊗ 0 U 1 U @ 0 0 u00 u01 A · · 0 0 u10 u11 Controlled-NOT gate control: first qubit; target: second qubit • 2 2 action on basis states of C C ⊗ c t c c t j i ⊗ j i 7! j i ⊗ j ⊕ i corresponding matrix 0 1 0 0 0 1 B 0 1 0 0 C B C = 0 0 I2 + 1 1 X @ 0 0 01 A j ih j ⊗ j ih j ⊗ 0 0 10 where I2 = 0 0 + 1 1 and X = 0 1 + 1 0 j ih j j ih j j ih j j ih j Controlled U gate control: qubit; target: m-qubit register • = U let U be a unitary acting on the m-qubit register 2 2 ⊗m action on basis states of C (C ) ⊗ c m c t c U t where b B; t B j i ⊗ j i 7! j i ⊗ j i 2 2 corresponding matrix I 0 = 0 0 I + 1 1 U 0 U j ih j ⊗ j ih j ⊗ Toffoli gate control: first and second qubits; target: third qubit • • 2 2 2 action on basis states of C C C ⊗ ⊗ c1 c2 t c1 c2 (c1 c2) t j i ⊗ j i ⊗ j i 7! j i ⊗ j i ⊗ j ^ ⊕ i corresponding matrix 0 1 0 0 0 0 0 0 0 1 B 0 1 0 0 0 0 0 0 C B C B 0 0 1 0 0 0 0 0 C B C B 0 0 0 1 0 0 0 0 C B C = (I4 11 11 ) I2 + 11 11 X B 0 0 0 0 1 0 0 0 C −j ih j ⊗ j ih j⊗ B C B 0 0 0 0 0 1 0 0 C B C @ 0 0 0 0 0 0 01 A 0 0 0 0 0 0 10 Simulating irreversible gates with Toffoli gate The classical AND gate is irreversible because if the output is 0 then we cannot determine which of the three possible pairs was the actual input x1 x2 x1 x2 ^ 0 0 0 0 1 0 1 0 0 1 1 1 But it is easy to simulate the AND gate with one Toffoli gate x1 x1 jx2i • jx2i j i • j i 0 x1 x2 j i j ^ i Problem of garbage To simulate irreversible circuits with Toffoli gates, we keep the input and intermediary results to make everything reversible Consider the function y = x1 x2 x3 ^ ^ x1 x1 jx2i • jx2i jx3i • jx3i j i • j i 0 x1 x2 x3 j i j ^ ^ i 0 x1 x2 garbage j i • j ^ i It is important to not leave any garbage; otherwise, we could not make use of quantum parallelism and constructive interference effects Reversible garbage removal It is always possible to reversibly remove (uncompute) the garbage In the case y = x1 x2 x3, this can be done with the circuit ^ ^ x1 x1 jx2i • • jx2i jx3i • • jx3i j i • j i 0 x1 x2 x3 j i j ^ ^ i 0 0 garbage uncomputed j i • j i Simulating irreversible circuits with Toffoli gates Let f : 0; 1 n 0; 1 be any boolean function f g ! f g Assume this function can be computed classically using only t classical elementary gates such as AND, OR, NAND 2 ⊗n 2 2 ⊗w We can implement a unitary Uf on (C ) C (C ) such that ⊗ ⊗ ⊗w ⊗w Uf x in y out 0 = x y f (x) 0 j i ⊗ j i ⊗ j iwork j i ⊗ j ⊕ i ⊗ j i Uf is built from polynomially many in t Toffoli gates and the size w of the workspace register is polynomial in t During the computation the qubits of the workspace register are changed, but at the end they reversibly reset to 0 ⊗w j i Universal gate set { exact implementation Each unitary U ( ) can be implemented exactly by quantum circuits using only:2 U H I CNOT gates (acting on adjacent qubits) I arbitrary single qubit gates Gate complexity of unitaries { exact implementation The gate complexity κ(U) of a unitary U ( ) is minimal number of elementary gates needed to implement2 U H U For example, quantum Fourier Transform has complexity O(n2) = Shor's factorization algorithm ) Universal gate set { approximate implementation For each (0; 1) and each unitary U ( ), there is a unitary V such that2 2 U H U V where U V = sup (U V ) k − k ≤ k − k j i k − j ik and V is implemented by quantum circuits using only: I CNOT gates (acting on adjacent qubits) I the single qubit gates 1 1 1 1 0 π H = R(θ) = ; with θ = p2 1 1 0 eiθ 4 − There are other universal gate sets Gate complexity of unitaries { approximate implementation The gate complexity κ(U) of a unitary U is the minimal number of gates (from a universal gate set) need to implement a unitary V with U V k − k ≤ The Solovay-Kitaev theorem implies that c κ(U) = O κ(U) log κ(U)/ · for some small constant c Counting arguments show that most n-qubit unitaries have gate complexity exponential in n. Quantum measurement A general measurement is described by a collection P0,. ,Pm−1 of orthogonal projectors such that m−1 X Pi = IH where denotes the identity on H H i=0 Let be the state of the quantum register. The probability of obtainingj i the outcome i is given by 2 Pr(i) = Pi k j ik The post-measurement state (collapse of the wavefunction) is Pi j i Pi k j ik Elementary quantum measurements A measurement has to be realized by first applying a suitable quantum circuit followed by an elementary measurement An elementary measurement on the n-qubit quantum register consists of measuring the first (w.l.o.g.) m qubits (m n) withH respect to the computational basis ≤ m The 2 orthogonal projectors Pb are labeled by m-bit strings m b B and are defined by 2 Pb = b1 b1 b2 b2 bm bm I n−m j ih j ⊗ j ih j ⊗ · · · ⊗ j ih j ⊗ 2 The probability of obtaining outcome b is given by 2 X 2 Pr(b) = Pb = αb ;:::;b ;x ;:::;x k j ik j 1 m m+1 n j xm+1;:::;xn2B Structure of quantum algorithms A quantum algorithm consists of n I preparing the initial state x with x B , j i 2 I applying a quantum circuit of polynomially many in n gates from some universal gate set, and I performing an elementary measurement These steps are repeated polynomially many times to collect enough samples and followed by classical post-processing = solution of the problem ) Hadamard test 0 H H j i • = U j i NM The probabilities of obtaining the outcomes 0 and 1 are: 1 1 Pr(0) = (1 + Re U ) Pr(1) = (1 Re U ) 2 h j j i 2 − h j j i Hadamard test 0 H H j i • = U j i NM 0 j i ⊗ j i 1 ( 0 + 1 ) 7! p2 j i j i ⊗ j i 1 1 = 0 + 1 p2j i ⊗ j i p2j i ⊗ j i 1 1 0 + 1 U 7! p2j i ⊗ j i p2j i ⊗ j i 1 1 ( 0 + 1 ) + ( 0 1 ) U 7! 2 j i j i ⊗ j i 2 j i − j i ⊗ j i 1 1 = 0 ( + U ) + 1 ( U ) 2j i ⊗ j i j i 2j i ⊗ j i − j i =: Φ j i Hadamard test Pr(0) = P Φ 2 with P = 0 0 I k j ik j ih j ⊗ 1 1 = 0 0 I 0 ( + U ) + 1 ( U ) 2 k j ih j⊗ 2j i⊗ j i j i 2j i⊗ j i − j i k 1 = 0 ( + U ) 2 k2j i ⊗ j i j i k 1 = 0 2 + U 2 4 kj ik · kj i j ik 1 = + Uy + U 4 h j h j j i j i 1 = + U + Uy + UyU 4 h j i h j j i h j j i h j j i 1 = 2 + U + U 4 h j j i h j j i 1 = 1 + Re U 2 h j j i Hadamard test { Figure it out yourself How can you estimate the imaginary part of U ? h j j i Hint: Add a simple gate on the control register before the measurement.
Recommended publications
  • An Introduction Quantum Computing
    An Introduction to Quantum Computing Michal Charemza University of Warwick March 2005 Acknowledgments Special thanks are given to Steve Flammia and Bryan Eastin, authors of the LATEX package, Qcircuit, used to draw all the quantum circuits in this document. This package is available online at http://info.phys.unm.edu/Qcircuit/. Also thanks are given to Mika Hirvensalo, author of [11], who took the time to respond to some questions. 1 Contents 1 Introduction 4 2 Quantum States 6 2.1 CompoundStates........................... 8 2.2 Observation.............................. 9 2.3 Entanglement............................. 11 2.4 RepresentingGroups . 11 3 Operations on Quantum States 13 3.1 TimeEvolution............................ 13 3.2 UnaryQuantumGates. 14 3.3 BinaryQuantumGates . 15 3.4 QuantumCircuits .......................... 17 4 Boolean Circuits 19 4.1 BooleanCircuits ........................... 19 5 Superdense Coding 24 6 Quantum Teleportation 26 7 Quantum Fourier Transform 29 7.1 DiscreteFourierTransform . 29 7.1.1 CharactersofFiniteAbelianGroups . 29 7.1.2 DiscreteFourierTransform . 30 7.2 QuantumFourierTransform. 32 m 7.2.1 Quantum Fourier Transform in F2 ............. 33 7.2.2 Quantum Fourier Transform in Zn ............. 35 8 Random Numbers 38 9 Factoring 39 9.1 OneWayFunctions.......................... 39 9.2 FactorsfromOrder.......................... 40 9.3 Shor’sAlgorithm ........................... 42 2 CONTENTS 3 10 Searching 46 10.1 BlackboxFunctions. 46 10.2 HowNotToSearch.......................... 47 10.3 Single Query Without (Grover’s) Amplification . ... 48 10.4 AmplitudeAmplification. 50 10.4.1 SingleQuery,SingleSolution . 52 10.4.2 KnownNumberofSolutions. 53 10.4.3 UnknownNumberofSolutions . 55 11 Conclusion 57 Bibliography 59 Chapter 1 Introduction The classical computer was originally a largely theoretical concept usually at- tributed to Alan Turing, called the Turing Machine.
    [Show full text]
  • Introductory Topics in Quantum Paradigm
    Introductory Topics in Quantum Paradigm Subhamoy Maitra Indian Statistical Institute [[email protected]] 21 May, 2016 Subhamoy Maitra Quantum Information Outline of the talk Preliminaries of Quantum Paradigm What is a Qubit? Entanglement Quantum Gates No Cloning Indistinguishability of quantum states Details of BB84 Quantum Key Distribution Algorithm Description Eavesdropping State of the art: News and Industries Walsh Transform in Deutsch-Jozsa (DJ) Algorithm Deutsch-Jozsa Algorithm Walsh Transform Relating the above two Some implications Subhamoy Maitra Quantum Information Qubit and Measurement A qubit: αj0i + βj1i; 2 2 α; β 2 C, jαj + jβj = 1. Measurement in fj0i; j1ig basis: we will get j0i with probability jαj2, j1i with probability jβj2. The original state gets destroyed. Example: 1 + i 1 j0i + p j1i: 2 2 After measurement: we will get 1 j0i with probability 2 , 1 j1i with probability 2 . Subhamoy Maitra Quantum Information Basic Algebra Basic algebra: (α1j0i + β1j1i) ⊗ (α2j0i + β2j1i) = α1α2j00i + α1β2j01i + β1α2j10i + β1β2j11i, can be seen as tensor product. Any 2-qubit state may not be decomposed as above. Consider the state γ1j00i + γ2j11i with γ1 6= 0; γ2 6= 0. This cannot be written as (α1j0i + β1j1i) ⊗ (α2j0i + β2j1i). This is called entanglement. Known as Bell states or EPR pairs. An example of maximally entangled state is j00i + j11i p : 2 Subhamoy Maitra Quantum Information Quantum Gates n inputs, n outputs. Can be seen as 2n × 2n unitary matrices where the elements are complex numbers. Single input single output quantum gates. Quantum input Quantum gate Quantum Output αj0i + βj1i X βj0i + αj1i αj0i + βj1i Z αj0i − βj1i j0i+j1i j0i−|1i αj0i + βj1i H α p + β p 2 2 Subhamoy Maitra Quantum Information Quantum Gates (contd.) 1 input, 1 output.
    [Show full text]
  • A Gentle Introduction to Quantum Computing Algorithms With
    A Gentle Introduction to Quantum Computing Algorithms with Applications to Universal Prediction Elliot Catt1 Marcus Hutter1,2 1Australian National University, 2Deepmind {elliot.carpentercatt,marcus.hutter}@anu.edu.au May 8, 2020 Abstract In this technical report we give an elementary introduction to Quantum Computing for non- physicists. In this introduction we describe in detail some of the foundational Quantum Algorithms including: the Deutsch-Jozsa Algorithm, Shor’s Algorithm, Grocer Search, and Quantum Count- ing Algorithm and briefly the Harrow-Lloyd Algorithm. Additionally we give an introduction to Solomonoff Induction, a theoretically optimal method for prediction. We then attempt to use Quan- tum computing to find better algorithms for the approximation of Solomonoff Induction. This is done by using techniques from other Quantum computing algorithms to achieve a speedup in com- puting the speed prior, which is an approximation of Solomonoff’s prior, a key part of Solomonoff Induction. The major limiting factors are that the probabilities being computed are often so small that without a sufficient (often large) amount of trials, the error may be larger than the result. If a substantial speedup in the computation of an approximation of Solomonoff Induction can be achieved through quantum computing, then this can be applied to the field of intelligent agents as a key part of an approximation of the agent AIXI. arXiv:2005.03137v1 [quant-ph] 29 Apr 2020 1 Contents 1 Introduction 3 2 Preliminaries 4 2.1 Probability ......................................... 4 2.2 Computability ....................................... 5 2.3 ComplexityTheory................................... .. 7 3 Quantum Computing 8 3.1 Introduction...................................... ... 8 3.2 QuantumTuringMachines .............................. .. 9 3.2.1 Church-TuringThesis ..............................
    [Show full text]
  • Encryption of Binary and Non-Binary Data Using Chained Hadamard Transforms
    Encryption of Binary and Non-Binary Data Using Chained Hadamard Transforms Rohith Singi Reddy Computer Science Department Oklahoma State University, Stillwater, OK 74078 ABSTRACT This paper presents a new chaining technique for the use of Hadamard transforms for encryption of both binary and non-binary data. The lengths of the input and output sequence need not be identical. The method may be used also for hashing. INTRODUCTION The Hadamard transform is an example of generalized class of Fourier transforms [4], and it may be defined either recursively, or by using binary representation. Its symmetric form lends itself to applications ranging across many technical fields such as data encryption [1], signal processing [2], data compression algorithms [3], randomness measures [6], and so on. Here we consider an application of the Hadamard matrix to non-binary numbers. To do so, Hadamard transform is generalized such that all the values in the matrix are non negative. Each negative number is replaced with corresponding modulo number; for example while performing modulo 7 operations -1 is replaced with 6 to make the matrix non-binary. Only prime modulo operations are performed because non prime numbers can be divisible with numbers other than 1 and itself. The use of modulo operation along with generalized Hadamard matrix limits the output range and decreases computation complexity. In the method proposed in this paper, the input sequence is split into certain group of bits such that each group bit count is a prime number. As we are dealing with non-binary numbers, for each group of binary bits their corresponding decimal value is calculated.
    [Show full text]
  • Dominant Strategies of Quantum Games on Quantum Periodic Automata
    Computation 2015, 3, 586-599; doi:10.3390/computation3040586 OPEN ACCESS computation ISSN 2079-3197 www.mdpi.com/journal/computation Article Dominant Strategies of Quantum Games on Quantum Periodic Automata Konstantinos Giannakis y;*, Christos Papalitsas y, Kalliopi Kastampolidou y, Alexandros Singh y and Theodore Andronikos y Department of Informatics, Ionian University, 7 Tsirigoti Square, Corfu 49100, Greece; E-Mails: [email protected] (C.P.); [email protected] (K.K.); [email protected] (A.S.); [email protected] (T.A.) y These authors contributed equally to this work. * Author to whom correspondence should be addressed; E-Mail: [email protected]; Tel.: +30-266-108-7712. Academic Editor: Demos T. Tsahalis Received: 29 August 2015 / Accepted: 16 November 2015 / Published: 20 November 2015 Abstract: Game theory and its quantum extension apply in numerous fields that affect people’s social, political, and economical life. Physical limits imposed by the current technology used in computing architectures (e.g., circuit size) give rise to the need for novel mechanisms, such as quantum inspired computation. Elements from quantum computation and mechanics combined with game-theoretic aspects of computing could open new pathways towards the future technological era. This paper associates dominant strategies of repeated quantum games with quantum automata that recognize infinite periodic inputs. As a reference, we used the PQ-PENNY quantum game where the quantum strategy outplays the choice of pure or mixed strategy with probability 1 and therefore the associated quantum automaton accepts with probability 1. We also propose a novel game played on the evolution of an automaton, where players’ actions and strategies are also associated with periodic quantum automata.
    [Show full text]
  • Hadamard Phylogenetic Methods and the N-Taxon Process
    Bulletin of Mathematical Biology (2009) 71: 339–351 DOI 10.1007/s11538-008-9364-8 ORIGINAL ARTICLE Hadamard Phylogenetic Methods and the n-taxon Process David Bryant Department of Mathematics, University of Auckland, Auckland, New Zealand Received: 11 December 2007 / Accepted: 18 September 2008 / Published online: 10 October 2008 © Society for Mathematical Biology 2008 Abstract The Hadamard transform (Hendy and Penny, Syst. Zool. 38(4):297–309, 1989; Hendy, Syst. Zool. 38(4):310–321, 1989) provides a way to work with stochastic mod- els for sequence evolution without having to deal with the complications of tree space and the graphical structure of trees. Here we demonstrate that the transform can be ex- pressed in terms of the familiar P[τ]=eQ[τ] formula for Markov chains. The key idea is to study the evolution of vectors of states, one vector entry for each taxa; we call this the n-taxon process. We derive transition probabilities for the process. Significantly, the find- ings show that tree-based models are indeed in the family of (multi-variate) exponential distributions. Keywords Phylogenetics · Stochastic models · Hadamard conjugation · Spectral decomposition 1. Introduction 1.1. Stochastic models and the Hadamard transform Stochastic models for sequence evolution now play a part in most phylogenetic analyses. Given a tree, and a set of branch lengths, the models determine a probability distribution for the patterns of nucleotides/amino acids observed at a site in the alignment (the site patterns). The real difficulty of these tree-based models is that they are, indeed, based on a tree. The graphical structure of the tree is intrinsic to the probability formulas.
    [Show full text]
  • Quantum Computing: Lecture Notes
    Quantum Computing: Lecture Notes Ronald de Wolf Preface These lecture notes were formed in small chunks during my “Quantum computing” course at the University of Amsterdam, Feb-May 2011, and compiled into one text thereafter. Each chapter was covered in a lecture of 2 45 minutes, with an additional 45-minute lecture for exercises and × homework. The first half of the course (Chapters 1–7) covers quantum algorithms, the second half covers quantum complexity (Chapters 8–9), stuff involving Alice and Bob (Chapters 10–13), and error-correction (Chapter 14). A 15th lecture about physical implementations and general outlook was more sketchy, and I didn’t write lecture notes for it. These chapters may also be read as a general introduction to the area of quantum computation and information from the perspective of a theoretical computer scientist. While I made an effort to make the text self-contained and consistent, it may still be somewhat rough around the edges; I hope to continue polishing and adding to it. Comments & constructive criticism are very welcome, and can be sent to [email protected] Attribution and acknowledgements Most of the material in Chapters 1–6 comes from the first chapter of my PhD thesis [71], with a number of additions: the lower bound for Simon, the Fourier transform, the geometric explanation of Grover. Chapter 7 is newly written for these notes, inspired by Santha’s survey [62]. Chapters 8 and 9 are largely new as well. Section 3 of Chapter 8, and most of Chapter 10 are taken (with many changes) from my “quantum proofs” survey paper with Andy Drucker [28].
    [Show full text]
  • Experimental Demonstration of a Hadamard Gate for Coherent State Qubits
    Downloaded from orbit.dtu.dk on: Sep 24, 2021 Experimental demonstration of a Hadamard gate for coherent state qubits Tipsmark, Anders; Dong, Ruifang; Laghaout, Amine; Marek, Petr; Jezek, Miroslav; Andersen, Ulrik Lund Published in: Physical Review A Link to article, DOI: 10.1103/PhysRevA.84.050301 Publication date: 2011 Document Version Publisher's PDF, also known as Version of record Link back to DTU Orbit Citation (APA): Tipsmark, A., Dong, R., Laghaout, A., Marek, P., Jezek, M., & Andersen, U. L. (2011). Experimental demonstration of a Hadamard gate for coherent state qubits. Physical Review A, 84(5), -. https://doi.org/10.1103/PhysRevA.84.050301 General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. RAPID COMMUNICATIONS PHYSICAL REVIEW A 84, 050301(R) (2011) Experimental demonstration of a Hadamard gate for coherent state qubits Anders Tipsmark,1,* Ruifang Dong,2,1 Amine Laghaout,1 Petr Marek,3 Miroslav Jezek,ˇ 3,1 and Ulrik L.
    [Show full text]
  • On Quantum Algorithms
    Contribution to Complexity On quantum algorithms Richard Cleve, Artur Ekert, Leah Henderson, Chiara Macchiavello and Michele Mosca Centre for Quantum Computation Clarendon Laboratory, University of Oxford, Oxford OX1 3PU, U.K. Department of Computer Science University of Calgary, Calgary, Alberta, Canada T2N 1N4 Theoretical Quantum Optics Group Dipartimento di Fisica “A. Volta” and I.N.F.M. - Unit`adi Pavia Via Bassi 6, I-27100 Pavia, Italy Abstract Quantum computers use the quantum interference of different computational paths to en- hance correct outcomes and suppress erroneous outcomes of computations. In effect, they follow the same logical paradigm as (multi-particle) interferometers. We show how most known quan- tum algorithms, including quantum algorithms for factorising and counting, may be cast in this manner. Quantum searching is described as inducing a desired relative phase between two eigen- vectors to yield constructive interference on the sought elements and destructive interference on the remaining terms. 1 From Interferometers to Computers Richard Feynman [1] in his talk during the First Conference on the Physics of Computation held at MIT in 1981 observed that it appears to be impossible to simulate a general quantum evolution on a classical probabilistic computer in an efficient way. He pointed out that any classical simulation of quantum evolution appears to involve an exponential slowdown in time as compared to the natural evolution since the amount of information required to describe the evolving quantum state in classical terms generally grows exponentially in time. However, instead of viewing this as an obstacle, Feynman regarded it as an opportunity. If it requires so much computation to work out what will happen in a arXiv:quant-ph/9903061v1 17 Mar 1999 complicated multiparticle interference experiment then, he argued, the very act of setting up such an experiment and measuring the outcome is tantamount to performing a complex computation.
    [Show full text]
  • Efficient Classical Simulation of Random Shallow 2D Quantum Circuits
    Efficient classical simulation of random shallow 2D quantum circuits John Napp* Rolando L. La Placa† Alexander M. Dalzell‡ Fernando G. S. L. Brandao˜ § Aram W. Harrow¶ February 13, 2020 Abstract Random quantum circuits are commonly viewed as hard to simulate classically. In some regimes this has been formally conjectured — in the context of deep 2D circuits, this is the basis for Google’s recent announcement of “quantum computational supremacy” — and there had been no evidence against the more general possibility that for circuits with uniformly ran- dom gates, approximate simulation of typical instances is almost as hard as exact simulation. We prove that this is not the case by exhibiting a shallow random circuit family that cannot be efficiently classically simulated exactly under standard hardness assumptions, but can be simulated approximately for all but a superpolynomially small fraction of circuit instances in time linear in the number of qubits and gates; this example limits the robustness of re- cent worst-case-to-average-case reductions for random circuit simulation. While our proof is based on a contrived random circuit family, we furthermore conjecture that sufficiently shal- low constant-depth random circuits are efficiently simulable more generally. To this end, we propose and analyze two simulation algorithms. Implementing one of our algorithms for the depth-3 “brickwork” architecture, for which exact simulation is hard, we found that a laptop could simulate typical instances on a 409 409 grid with variational distance error less than 0:01 in approximately one minute per sample,× a task intractable for previously known cir- cuit simulation algorithms.
    [Show full text]
  • Quantum Algorithms Via Linear Algebra: a Primer / Richard J
    QUANTUM ALGORITHMS VIA LINEAR ALGEBRA A Primer Richard J. Lipton Kenneth W. Regan The MIT Press Cambridge, Massachusetts London, England c 2014 Massachusetts Institute of Technology All rights reserved. No part of this book may be reproduced in any form or by any electronic or mechanical means (including photocopying, recording, or information storage and retrieval) without permission in writing from the publisher. MIT Press books may be purchased at special quantity discounts for business or sales promotional use. For information, please email special [email protected]. This book was set in Times Roman and Mathtime Pro 2 by the authors, and was printed and bound in the United States of America. Library of Congress Cataloging-in-Publication Data Lipton, Richard J., 1946– Quantum algorithms via linear algebra: a primer / Richard J. Lipton and Kenneth W. Regan. p. cm. Includes bibliographical references and index. ISBN 978-0-262-02839-4 (hardcover : alk. paper) 1. Quantum computers. 2. Computer algorithms. 3. Algebra, Linear. I. Regan, Kenneth W., 1959– II. Title QA76.889.L57 2014 005.1–dc23 2014016946 10987654321 We dedicate this book to all those who helped create and nourish the beautiful area of quantum algorithms, and to our families who helped create and nourish us. RJL and KWR Contents Preface xi Acknowledgements xiii 1 Introduction 1 1.1 The Model 2 1.2 The Space and the States 3 1.3 The Operations 5 1.4 Where Is the Input? 6 1.5 What Exactly Is the Output? 7 1.6 Summary and Notes 8 2 Numbers and Strings 9 2.1 Asymptotic Notation
    [Show full text]
  • A Robust Chaotic and Fast Walsh Transform Encryption for Gray Scale Biomedical Image Transmission
    Signal & Image Processing : An International Journal (SIPIJ) Vol.6, No.3, June 2015 A R OBUST CHAOTIC AND FAST WALSH TRANSFORM ENCRYPTION FOR GRAY SCALE BIOMEDICAL IMAGE TRANSMISSION Adélaïde Nicole Kengnou Telem 1, Daniel Tchiotsop 1, Thomas Kanaa 2, Hilaire B. Fotsin 3, Didier Wolf 4 1Laboratoire d’Automatique et d’Informatique Appliquée (LAIA), Department of Electrical Engineering, IUT FV, University of Dschang, P.O. Box 134 Bandjoun – Cameroon. 2Laboratoire d’Electronique, Electrotechnique, Automatique et Télécommunications, Université de Douala, B.P. 1872 Douala. 3Laboratory of Electronics and Signal Processing, Faculty of Science, University of Dschang, P.O Box. 067 Dschang, Cameroon. 4Centre de Recherche en Automatique de Nancy (CRAN) UMR CNRS 7039, ENSEM Université de Lorraine, Nancy, France. ABSTRACT In this work, a new scheme of image encryption based on chaos and Fast Walsh Transform (FWT) has been proposed. We used two chaotic logistic maps and combined chaotic encryption methods to the two-dimensional FWT of images. The encryption process involves two steps: firstly, chaotic sequences generated by the chaotic logistic maps are used to permute and mask the intermediate results or array of FWT, the next step consist in changing the chaotic sequences or the initial conditions of chaotic logistic maps among two intermediate results of the same row or column. Changing the encryption key several times on the same row or column makes the cipher more robust against any attack. We tested our algorithms on many biomedical images. We also used images from data bases to compare our algorithm to those in literature. It comes out from statistical analysis and key sensitivity tests that our proposed image encryption scheme provides an efficient and secure way for real-time encryption and transmission biomedical images.
    [Show full text]