Advanced Complexity Theory: Quantum Computing and #P
Total Page:16
File Type:pdf, Size:1020Kb
Load more
Recommended publications
-
An Introduction Quantum Computing
An Introduction to Quantum Computing Michal Charemza University of Warwick March 2005 Acknowledgments Special thanks are given to Steve Flammia and Bryan Eastin, authors of the LATEX package, Qcircuit, used to draw all the quantum circuits in this document. This package is available online at http://info.phys.unm.edu/Qcircuit/. Also thanks are given to Mika Hirvensalo, author of [11], who took the time to respond to some questions. 1 Contents 1 Introduction 4 2 Quantum States 6 2.1 CompoundStates........................... 8 2.2 Observation.............................. 9 2.3 Entanglement............................. 11 2.4 RepresentingGroups . 11 3 Operations on Quantum States 13 3.1 TimeEvolution............................ 13 3.2 UnaryQuantumGates. 14 3.3 BinaryQuantumGates . 15 3.4 QuantumCircuits .......................... 17 4 Boolean Circuits 19 4.1 BooleanCircuits ........................... 19 5 Superdense Coding 24 6 Quantum Teleportation 26 7 Quantum Fourier Transform 29 7.1 DiscreteFourierTransform . 29 7.1.1 CharactersofFiniteAbelianGroups . 29 7.1.2 DiscreteFourierTransform . 30 7.2 QuantumFourierTransform. 32 m 7.2.1 Quantum Fourier Transform in F2 ............. 33 7.2.2 Quantum Fourier Transform in Zn ............. 35 8 Random Numbers 38 9 Factoring 39 9.1 OneWayFunctions.......................... 39 9.2 FactorsfromOrder.......................... 40 9.3 Shor’sAlgorithm ........................... 42 2 CONTENTS 3 10 Searching 46 10.1 BlackboxFunctions. 46 10.2 HowNotToSearch.......................... 47 10.3 Single Query Without (Grover’s) Amplification . ... 48 10.4 AmplitudeAmplification. 50 10.4.1 SingleQuery,SingleSolution . 52 10.4.2 KnownNumberofSolutions. 53 10.4.3 UnknownNumberofSolutions . 55 11 Conclusion 57 Bibliography 59 Chapter 1 Introduction The classical computer was originally a largely theoretical concept usually at- tributed to Alan Turing, called the Turing Machine. -
Introductory Topics in Quantum Paradigm
Introductory Topics in Quantum Paradigm Subhamoy Maitra Indian Statistical Institute [[email protected]] 21 May, 2016 Subhamoy Maitra Quantum Information Outline of the talk Preliminaries of Quantum Paradigm What is a Qubit? Entanglement Quantum Gates No Cloning Indistinguishability of quantum states Details of BB84 Quantum Key Distribution Algorithm Description Eavesdropping State of the art: News and Industries Walsh Transform in Deutsch-Jozsa (DJ) Algorithm Deutsch-Jozsa Algorithm Walsh Transform Relating the above two Some implications Subhamoy Maitra Quantum Information Qubit and Measurement A qubit: αj0i + βj1i; 2 2 α; β 2 C, jαj + jβj = 1. Measurement in fj0i; j1ig basis: we will get j0i with probability jαj2, j1i with probability jβj2. The original state gets destroyed. Example: 1 + i 1 j0i + p j1i: 2 2 After measurement: we will get 1 j0i with probability 2 , 1 j1i with probability 2 . Subhamoy Maitra Quantum Information Basic Algebra Basic algebra: (α1j0i + β1j1i) ⊗ (α2j0i + β2j1i) = α1α2j00i + α1β2j01i + β1α2j10i + β1β2j11i, can be seen as tensor product. Any 2-qubit state may not be decomposed as above. Consider the state γ1j00i + γ2j11i with γ1 6= 0; γ2 6= 0. This cannot be written as (α1j0i + β1j1i) ⊗ (α2j0i + β2j1i). This is called entanglement. Known as Bell states or EPR pairs. An example of maximally entangled state is j00i + j11i p : 2 Subhamoy Maitra Quantum Information Quantum Gates n inputs, n outputs. Can be seen as 2n × 2n unitary matrices where the elements are complex numbers. Single input single output quantum gates. Quantum input Quantum gate Quantum Output αj0i + βj1i X βj0i + αj1i αj0i + βj1i Z αj0i − βj1i j0i+j1i j0i−|1i αj0i + βj1i H α p + β p 2 2 Subhamoy Maitra Quantum Information Quantum Gates (contd.) 1 input, 1 output. -
A Gentle Introduction to Quantum Computing Algorithms With
A Gentle Introduction to Quantum Computing Algorithms with Applications to Universal Prediction Elliot Catt1 Marcus Hutter1,2 1Australian National University, 2Deepmind {elliot.carpentercatt,marcus.hutter}@anu.edu.au May 8, 2020 Abstract In this technical report we give an elementary introduction to Quantum Computing for non- physicists. In this introduction we describe in detail some of the foundational Quantum Algorithms including: the Deutsch-Jozsa Algorithm, Shor’s Algorithm, Grocer Search, and Quantum Count- ing Algorithm and briefly the Harrow-Lloyd Algorithm. Additionally we give an introduction to Solomonoff Induction, a theoretically optimal method for prediction. We then attempt to use Quan- tum computing to find better algorithms for the approximation of Solomonoff Induction. This is done by using techniques from other Quantum computing algorithms to achieve a speedup in com- puting the speed prior, which is an approximation of Solomonoff’s prior, a key part of Solomonoff Induction. The major limiting factors are that the probabilities being computed are often so small that without a sufficient (often large) amount of trials, the error may be larger than the result. If a substantial speedup in the computation of an approximation of Solomonoff Induction can be achieved through quantum computing, then this can be applied to the field of intelligent agents as a key part of an approximation of the agent AIXI. arXiv:2005.03137v1 [quant-ph] 29 Apr 2020 1 Contents 1 Introduction 3 2 Preliminaries 4 2.1 Probability ......................................... 4 2.2 Computability ....................................... 5 2.3 ComplexityTheory................................... .. 7 3 Quantum Computing 8 3.1 Introduction...................................... ... 8 3.2 QuantumTuringMachines .............................. .. 9 3.2.1 Church-TuringThesis .............................. -
Encryption of Binary and Non-Binary Data Using Chained Hadamard Transforms
Encryption of Binary and Non-Binary Data Using Chained Hadamard Transforms Rohith Singi Reddy Computer Science Department Oklahoma State University, Stillwater, OK 74078 ABSTRACT This paper presents a new chaining technique for the use of Hadamard transforms for encryption of both binary and non-binary data. The lengths of the input and output sequence need not be identical. The method may be used also for hashing. INTRODUCTION The Hadamard transform is an example of generalized class of Fourier transforms [4], and it may be defined either recursively, or by using binary representation. Its symmetric form lends itself to applications ranging across many technical fields such as data encryption [1], signal processing [2], data compression algorithms [3], randomness measures [6], and so on. Here we consider an application of the Hadamard matrix to non-binary numbers. To do so, Hadamard transform is generalized such that all the values in the matrix are non negative. Each negative number is replaced with corresponding modulo number; for example while performing modulo 7 operations -1 is replaced with 6 to make the matrix non-binary. Only prime modulo operations are performed because non prime numbers can be divisible with numbers other than 1 and itself. The use of modulo operation along with generalized Hadamard matrix limits the output range and decreases computation complexity. In the method proposed in this paper, the input sequence is split into certain group of bits such that each group bit count is a prime number. As we are dealing with non-binary numbers, for each group of binary bits their corresponding decimal value is calculated. -
Quantum Supremacy
Quantum Supremacy Practical QS: perform some computational task on a well-controlled quantum device, which cannot be simulated in a reasonable time by the best-known classical algorithms and hardware. Theoretical QS: perform a computational task efficiently on a quantum device, and prove that task cannot be efficiently classically simulated. Since proving seems to be beyond the capabilities of our current civilization, we lower the standards for theoretical QS. One seeks to provide formal evidence that classical simulation is unlikely. For example: 3-SAT is NP-complete, so it cannot be efficiently classical solved unless P = NP. Theoretical QS: perform a computational task efficiently on a quantum device, and prove that task cannot be efficiently classically simulated unless “the polynomial Heierarchy collapses to the 3nd level.” Quantum Supremacy A common feature of QS arguments is that they consider sampling problems, rather than decision problems. They allow us to characterize the complexity of sampling measurements of quantum states. Which is more difficult: Task A: deciding if a circuit outputs 1 with probability at least 2/3s, or at most 1/3s Task B: sampling from the output of an n-qubit circuit in the computational basis Sampling from distributions is generically more difficult than approximating observables, since we can use samples to estimate observables, but not the other way around. One can imagine quantum systems whose local observables are easy to classically compute, but for which sampling the full state is computationally complex. By moving from decision problems to sampling problems, we make the task of classical simulation much more difficult. -
Dominant Strategies of Quantum Games on Quantum Periodic Automata
Computation 2015, 3, 586-599; doi:10.3390/computation3040586 OPEN ACCESS computation ISSN 2079-3197 www.mdpi.com/journal/computation Article Dominant Strategies of Quantum Games on Quantum Periodic Automata Konstantinos Giannakis y;*, Christos Papalitsas y, Kalliopi Kastampolidou y, Alexandros Singh y and Theodore Andronikos y Department of Informatics, Ionian University, 7 Tsirigoti Square, Corfu 49100, Greece; E-Mails: [email protected] (C.P.); [email protected] (K.K.); [email protected] (A.S.); [email protected] (T.A.) y These authors contributed equally to this work. * Author to whom correspondence should be addressed; E-Mail: [email protected]; Tel.: +30-266-108-7712. Academic Editor: Demos T. Tsahalis Received: 29 August 2015 / Accepted: 16 November 2015 / Published: 20 November 2015 Abstract: Game theory and its quantum extension apply in numerous fields that affect people’s social, political, and economical life. Physical limits imposed by the current technology used in computing architectures (e.g., circuit size) give rise to the need for novel mechanisms, such as quantum inspired computation. Elements from quantum computation and mechanics combined with game-theoretic aspects of computing could open new pathways towards the future technological era. This paper associates dominant strategies of repeated quantum games with quantum automata that recognize infinite periodic inputs. As a reference, we used the PQ-PENNY quantum game where the quantum strategy outplays the choice of pure or mixed strategy with probability 1 and therefore the associated quantum automaton accepts with probability 1. We also propose a novel game played on the evolution of an automaton, where players’ actions and strategies are also associated with periodic quantum automata. -
The Weakness of CTC Qubits and the Power of Approximate Counting
The weakness of CTC qubits and the power of approximate counting Ryan O'Donnell∗ A. C. Cem Sayy April 7, 2015 Abstract We present results in structural complexity theory concerned with the following interre- lated topics: computation with postselection/restarting, closed timelike curves (CTCs), and approximate counting. The first result is a new characterization of the lesser known complexity class BPPpath in terms of more familiar concepts. Precisely, BPPpath is the class of problems that can be efficiently solved with a nonadaptive oracle for the Approximate Counting problem. Similarly, PP equals the class of problems that can be solved efficiently with nonadaptive queries for the related Approximate Difference problem. Another result is concerned with the compu- tational power conferred by CTCs; or equivalently, the computational complexity of finding stationary distributions for quantum channels. Using the above-mentioned characterization of PP, we show that any poly(n)-time quantum computation using a CTC of O(log n) qubits may as well just use a CTC of 1 classical bit. This result essentially amounts to showing that one can find a stationary distribution for a poly(n)-dimensional quantum channel in PP. ∗Department of Computer Science, Carnegie Mellon University. Work performed while the author was at the Bo˘gazi¸ciUniversity Computer Engineering Department, supported by Marie Curie International Incoming Fellowship project number 626373. yBo˘gazi¸ciUniversity Computer Engineering Department. 1 Introduction It is well known that studying \non-realistic" augmentations of computational models can shed a great deal of light on the power of more standard models. The study of nondeterminism and the study of relativization (i.e., oracle computation) are famous examples of this phenomenon. -
Hadamard Phylogenetic Methods and the N-Taxon Process
Bulletin of Mathematical Biology (2009) 71: 339–351 DOI 10.1007/s11538-008-9364-8 ORIGINAL ARTICLE Hadamard Phylogenetic Methods and the n-taxon Process David Bryant Department of Mathematics, University of Auckland, Auckland, New Zealand Received: 11 December 2007 / Accepted: 18 September 2008 / Published online: 10 October 2008 © Society for Mathematical Biology 2008 Abstract The Hadamard transform (Hendy and Penny, Syst. Zool. 38(4):297–309, 1989; Hendy, Syst. Zool. 38(4):310–321, 1989) provides a way to work with stochastic mod- els for sequence evolution without having to deal with the complications of tree space and the graphical structure of trees. Here we demonstrate that the transform can be ex- pressed in terms of the familiar P[τ]=eQ[τ] formula for Markov chains. The key idea is to study the evolution of vectors of states, one vector entry for each taxa; we call this the n-taxon process. We derive transition probabilities for the process. Significantly, the find- ings show that tree-based models are indeed in the family of (multi-variate) exponential distributions. Keywords Phylogenetics · Stochastic models · Hadamard conjugation · Spectral decomposition 1. Introduction 1.1. Stochastic models and the Hadamard transform Stochastic models for sequence evolution now play a part in most phylogenetic analyses. Given a tree, and a set of branch lengths, the models determine a probability distribution for the patterns of nucleotides/amino acids observed at a site in the alignment (the site patterns). The real difficulty of these tree-based models is that they are, indeed, based on a tree. The graphical structure of the tree is intrinsic to the probability formulas. -
Quantum Computing: Lecture Notes
Quantum Computing: Lecture Notes Ronald de Wolf Preface These lecture notes were formed in small chunks during my “Quantum computing” course at the University of Amsterdam, Feb-May 2011, and compiled into one text thereafter. Each chapter was covered in a lecture of 2 45 minutes, with an additional 45-minute lecture for exercises and × homework. The first half of the course (Chapters 1–7) covers quantum algorithms, the second half covers quantum complexity (Chapters 8–9), stuff involving Alice and Bob (Chapters 10–13), and error-correction (Chapter 14). A 15th lecture about physical implementations and general outlook was more sketchy, and I didn’t write lecture notes for it. These chapters may also be read as a general introduction to the area of quantum computation and information from the perspective of a theoretical computer scientist. While I made an effort to make the text self-contained and consistent, it may still be somewhat rough around the edges; I hope to continue polishing and adding to it. Comments & constructive criticism are very welcome, and can be sent to [email protected] Attribution and acknowledgements Most of the material in Chapters 1–6 comes from the first chapter of my PhD thesis [71], with a number of additions: the lower bound for Simon, the Fourier transform, the geometric explanation of Grover. Chapter 7 is newly written for these notes, inspired by Santha’s survey [62]. Chapters 8 and 9 are largely new as well. Section 3 of Chapter 8, and most of Chapter 10 are taken (with many changes) from my “quantum proofs” survey paper with Andy Drucker [28]. -
Experimental Demonstration of a Hadamard Gate for Coherent State Qubits
Downloaded from orbit.dtu.dk on: Sep 24, 2021 Experimental demonstration of a Hadamard gate for coherent state qubits Tipsmark, Anders; Dong, Ruifang; Laghaout, Amine; Marek, Petr; Jezek, Miroslav; Andersen, Ulrik Lund Published in: Physical Review A Link to article, DOI: 10.1103/PhysRevA.84.050301 Publication date: 2011 Document Version Publisher's PDF, also known as Version of record Link back to DTU Orbit Citation (APA): Tipsmark, A., Dong, R., Laghaout, A., Marek, P., Jezek, M., & Andersen, U. L. (2011). Experimental demonstration of a Hadamard gate for coherent state qubits. Physical Review A, 84(5), -. https://doi.org/10.1103/PhysRevA.84.050301 General rights Copyright and moral rights for the publications made accessible in the public portal are retained by the authors and/or other copyright owners and it is a condition of accessing publications that users recognise and abide by the legal requirements associated with these rights. Users may download and print one copy of any publication from the public portal for the purpose of private study or research. You may not further distribute the material or use it for any profit-making activity or commercial gain You may freely distribute the URL identifying the publication in the public portal If you believe that this document breaches copyright please contact us providing details, and we will remove access to the work immediately and investigate your claim. RAPID COMMUNICATIONS PHYSICAL REVIEW A 84, 050301(R) (2011) Experimental demonstration of a Hadamard gate for coherent state qubits Anders Tipsmark,1,* Ruifang Dong,2,1 Amine Laghaout,1 Petr Marek,3 Miroslav Jezek,ˇ 3,1 and Ulrik L. -
On Quantum Algorithms
Contribution to Complexity On quantum algorithms Richard Cleve, Artur Ekert, Leah Henderson, Chiara Macchiavello and Michele Mosca Centre for Quantum Computation Clarendon Laboratory, University of Oxford, Oxford OX1 3PU, U.K. Department of Computer Science University of Calgary, Calgary, Alberta, Canada T2N 1N4 Theoretical Quantum Optics Group Dipartimento di Fisica “A. Volta” and I.N.F.M. - Unit`adi Pavia Via Bassi 6, I-27100 Pavia, Italy Abstract Quantum computers use the quantum interference of different computational paths to en- hance correct outcomes and suppress erroneous outcomes of computations. In effect, they follow the same logical paradigm as (multi-particle) interferometers. We show how most known quan- tum algorithms, including quantum algorithms for factorising and counting, may be cast in this manner. Quantum searching is described as inducing a desired relative phase between two eigen- vectors to yield constructive interference on the sought elements and destructive interference on the remaining terms. 1 From Interferometers to Computers Richard Feynman [1] in his talk during the First Conference on the Physics of Computation held at MIT in 1981 observed that it appears to be impossible to simulate a general quantum evolution on a classical probabilistic computer in an efficient way. He pointed out that any classical simulation of quantum evolution appears to involve an exponential slowdown in time as compared to the natural evolution since the amount of information required to describe the evolving quantum state in classical terms generally grows exponentially in time. However, instead of viewing this as an obstacle, Feynman regarded it as an opportunity. If it requires so much computation to work out what will happen in a arXiv:quant-ph/9903061v1 17 Mar 1999 complicated multiparticle interference experiment then, he argued, the very act of setting up such an experiment and measuring the outcome is tantamount to performing a complex computation. -
Complexity Theory and Its Applications in Linear Quantum
Louisiana State University LSU Digital Commons LSU Doctoral Dissertations Graduate School 2016 Complexity Theory and its Applications in Linear Quantum Optics Jonathan Olson Louisiana State University and Agricultural and Mechanical College, [email protected] Follow this and additional works at: https://digitalcommons.lsu.edu/gradschool_dissertations Part of the Physical Sciences and Mathematics Commons Recommended Citation Olson, Jonathan, "Complexity Theory and its Applications in Linear Quantum Optics" (2016). LSU Doctoral Dissertations. 2302. https://digitalcommons.lsu.edu/gradschool_dissertations/2302 This Dissertation is brought to you for free and open access by the Graduate School at LSU Digital Commons. It has been accepted for inclusion in LSU Doctoral Dissertations by an authorized graduate school editor of LSU Digital Commons. For more information, please [email protected]. COMPLEXITY THEORY AND ITS APPLICATIONS IN LINEAR QUANTUM OPTICS A Dissertation Submitted to the Graduate Faculty of the Louisiana State University and Agricultural and Mechanical College in partial fulfillment of the requirements for the degree of Doctor of Philosophy in The Department of Physics and Astronomy by Jonathan P. Olson M.S., University of Idaho, 2012 August 2016 Acknowledgments My advisor, Jonathan Dowling, is apt to say, \those who take my take my advice do well, and those who don't do less well." I always took his advice (sometimes even against my own judgement) and I find myself doing well. He talked me out of a high-paying, boring career, and for that I owe him a debt I will never be able to adequately repay. My mentor, Mark Wilde, inspired me to work hard without saying a word about what I \should" be doing, and instead leading by example.