Quantum Computing Lecture 1 Bits and Qubits What Is Quantum

Total Page:16

File Type:pdf, Size:1020Kb

Quantum Computing Lecture 1 Bits and Qubits What Is Quantum 1 2 What is Quantum Computing? Quantum Computing Lecture 1 Aim to use quantum mechanical phenomena that have no classical counterpart for computational purposes. Anuj Dawar Central research tasks include: Building devices — with a specified behaviour. • Designing algorithms — to use the behaviour. Bits and Qubits • Mediating these two are models of computation. 3 4 Bird’s eye view Why look at Quantum Computing? A computer scientist looks at Quantum Computing: The world is quantum • – classical models of computation provide a level of Algorithmic Languages abstraction – discrete state systems Theory/complexity Devices are getting smaller • System Architecture – Moore’s law – Specified Behaviour the only descriptions that work on the very small scale are quantum Physics Exploit quantum phenomena • – using quantum phenomena may allow us to perform Dragons computational tasks that are not otherwise possible/efficient – understand capabilities/resources 5 6 Course Outline Useful Information A total of eight lecturers. Some useful books: 1. Bits and Qubits (this lecture). Nielsen, M.A. and Chuang, I.L. (2000). Quantum Computation • and Quantum Information. Cambridge University Press. 2. Linear Algebra Mermin, N.D. (2007). Quantum Computer Science. CUP. 3. Quantum Mechanics • Kitaev, A.Y., Shen, A.H. and Vyalyi, M.N. (2002). Classical 4. Models of Computation • and Quantum Computation. AMS. 5. Some Applications Hirvensalo, M. (2004). Quantum Computing. Springer. 6. Search Algorithms • Course website: 7. Factorisation http://www.cl.cam.ac.uk/teaching/0910/QuantComp/ 8. Complexity 7 8 Bits Qubits A building block of classical computational devices is a two-state Quantum mechanics tells us that any such system can exist in a system. superposition of states. 0 1 In general, the state of a quantum bit (or qubit for short) is ←→ described by: α 0 + β 1 | i | i Indeed, any system with a finite set of discrete, stable states, with where, α and β are complex numbers, satisfying controlled transitions between them will do. α 2 + β 2 = 1 | | | | 9 10 Qubits Measurement Any attempt to measure the state A qubit may be visu- α 0 + β 1 1 alised as a unit vector | i | i | i β α 0 + β 1 on the plane. results in 0 with probability α 2, and 1 with probability β 2. | i | i | i | | | i | | In general, however, After the measurement, the system is in the measured state! 0 α and β are complex α | i numbers. That is, further measurements will always yield the same value. We can only extract one bit of information from the state of a qubit. 11 12 Measurement Vectors Formally, the state of a qubit is a unit vector in C2—the 1 2-dimensional complex vector space. | i β α 0 + β 1 α 0 + β 1 and α 0 β 1 have | i | i α | i | i | i− | i The vector can be written as the same probabilities for their β measurement 0 α | i α 0 + β 1 | i | i However, they are distinct states α 0 β 1 1 0 which behave differently in terms | i− | i where, 0 = and 1 = . of how they evolve. | i 0 | i 1 φ — a ket, Dirac notation for vectors. | i 13 14 Basis Example Any pair of vectors φ , ψ C2 that are linearly independent 1 | i | i∈ The vector √2 measured in the computational basis gives could serve as a basis. 1 " √2 # either outcome with probability 1/2. α 0 + β 1 = α′ φ + β′ ψ | i | i | i | i Measured in the basis 1 1 The basis is determined by the measurement process or device. √2 , √2 1 1 √2 √−2 Most of the time, we assume a standard (orthonormal) basis 0 | i it gives the first outcome with probability 1. and 1 is given. | i This will be called the computational basis 15 16 Entanglement Entanglement An n-qubit system can exist in any superposition of the 2n basis Compare the two (2-qubit) states: states. 1 1 ( 00 + 01 ) and ( 00 + 11 ) √ | i | i √ | i | i α0 000000 + α1 000001 + + α2n 1 111111 2 2 | i | i ··· − | i 2n 1 2 with i=0− αi = 1 | | If we measure the first qubit in the first case, we see 0 with | i P probability 1 and the state remains unchanged. Sometimes such a state can be decomposed into the states of individual bits In the second case (an EPR pair), measuring the first bit gives 0 1 1 1 | i ( 00 + 01 + 10 + 11 )= ( 0 + 1 ) ( 0 + 1 ) or 1 with equal probability. After this, the second qubit is also 2 | i | i | i | i √2 | i | i ⊗ √2 | i | i | i determined. 1 2 Linear Algebra Quantum Computing Lecture 2 The state space of a quantum system is described in terms of a vector space. Anuj Dawar Vector spaces are the object of study in Linear Algebra. In this lecture we review definitions from linear algebra that we Review of Linear Algebra need in the rest of the course. We are mainly interested in vector spaces over the complex number field – C. We use the Dirac notation—|vi, |φi (read as ket) for vectors. 3 4 Vector Spaces Cn A vector space over C is a set V with α1 Cn . • a commutative, associative addition operation + that has is the vector space of n-tuples of complex numbers: . – 0 0 αn an identity : |vi + = |vi – inverses: |vi +(−|vi)= 0 α1 β1 α1 + β1 . • an operation of multiplication by a scalar α ∈ C such that: with addition . + . = . – α(β|vi)=(αβ)|vi αn βn αn + βn – (α + β)|vi = α|vi + β|vi and α(|ui + |vi)= α|ui + α|vi α1 zα1 – 1|vi = |vi. and scalar multiplication z . = . αn zαn 5 6 Basis Bases for Cn A basis of a vector space V is a minimal collection of vectors 1 0 0 |v1i,..., |vni such that every vector |vi∈ V can be expressed as a 0 1 0 The standard basis for Cn is , ,..., linear combination of these: . . . . |vi = α1|v1i + ··· + αn|vni. 0 0 1 (written |0i,..., |n − 1i). 3 4 2 n—the size of the basis—is uniquely determined by V and is called But other bases are possible: , is a basis for C . 2 −i the dimension of V. " # " # We’ll be interested in orthonormal bases. That is bases of vectors Given a basis, every vector |vi can be represented as an n-tuple of of unit length that are mutually orthogonal. Examples are |0i, |1i scalars. 1 1 and √2 (|0i + |1i), √2 (|0i−|1i). 7 8 Linear Operators Matrices A linear operator A from one vector space V to another W is a Given a choice of bases |v1i,..., |vni and |w1i,..., |wmi, let function such that: m A|vj i = αij|wii A(α|ui + β|vi)= α(A|ui)+ β(A|vi) i=1 X Then, the matrix representation of A is given by the entries αij. If V is of dimension n and W is of dimension m, then the operator A can be represented as an m × n-matrix. Multiplying this matrix by the representation of a vector |vi in the basis |v1i,..., |vni gives the representation of A|vi in the basis |w1i,..., |w i. The matrix representation depends on the choice of bases for V m and W. 9 10 Examples Inner Products 1 1 An inner product on V is an operation that associates to each pair A 45 rotation of the real plane that takes to √2 and ◦ 1 |ui, |vi of vectors a complex number " 0 # " √2 # − 1 0 √2 hu|vi. to 1 is represented, in the standard basis by the " 1 # " √2 # matrix The operation satisfies 1 1 √2 − √2 • hu|αv + βwi = αhu|vi + βhu|wi 1 1 √2 √2 • hu|vi = hv|ui∗ where the ∗ denotes the complex conjugate. • hv|vi≥ 0 (note: hv|vi is a real number) and hv|vi = 0 iff 0 −i The operator does not correspond to a transformation |vi = 0. i 0 of the real plane. 11 12 Inner Product on Cn Norms The standard inner product on Cn is obtained by taking, for The norm of a vector |vi (written |||vi||) is the non-negative, real number: |ui = ui|ii and |vi = vi|ii v v v . i i ||| i|| = h | i X X p A unit vector is a vector with norm 1. hu|vi = ui∗vi i X Two vectors |ui and |vi are orthogonal if hu|vi = 0. Note: hu| is a bra, which together with |vi forms the bra-ket hu|vi. An orthonormal basis for an inner product space V is a basis made up of pairwise orthogonal, unit vectors. the term Hilbert space is also used for an inner product space 13 14 Outer Product Eigenvalues With a pair of vectors |ui∈ U, |vi∈ V we associate a linear An eigenvector of a linear operator A : V → V is a non-zero vector operator |uihv| : V → U, known as the outer product of |ui and |vi. |vi such that A|vi = λ|vi (|uihv|)|v′i = hv|v′i|ui for some complex number λ λ is the eigenvalue corresponding to the eigenvector v. |vihv| is the projection on the one-dimensional space generated by |vi. The eigenvalues of A are obtained as solutions of the characteristic equation: Any linear operator can be expressed as a linear combination of det(A − λI) = 0 outer products: A = Aij|iihj|. Each operator has at least one eigenvalue. ij X 15 16 Diagonal Representation Adjoints A linear operator A is diagonalisable if Associated with any linear operator A is its adjoint A† which satisfies A = λi|viihvi| i hv|Awi = hA†v|wi X where the |vii are an orthonormal set of eigenvectors of A with T corresponding eigenvalues λi.
Recommended publications
  • What Is Quantum Information?
    What Is Quantum Information? Robert B. Griffiths Carnegie-Mellon University Pittsburgh, Pennsylvania Research supported by the National Science Foundation References (work by R. B. Griffiths) • \Nature and location of quantum information." Ph◦ys. Rev. A 66 (2002) 012311; quant-ph/0203058 \Channel kets, entangled states, and the location of quan◦ tum information," Phys. Rev. A 71 (2005) 042337; quant-ph/0409106 Consistent Quantum Theory (Cambridge 2002) http://quan◦ tum.phys.cmu.edu/ What Is Quantum Information? 01. 100.01.tex Introduction What is quantum information? Precede by: • What is information? ◦ What is classical information theory? ◦ What is information? Example, newspaper • Symbolic representation of some situation ◦ Symbols in newspaper correlated with situation ◦ Information is about that situation ◦ What Is Quantum Information? 04. 100.04.tex Classical Information Theory Shannon: • \Mathematical Theory of Communication" (1948) ◦ One of major scientific developments of 20th century ◦ Proposed quantitative measure of information ◦ Information entropy • H(X) = p log p − X i i i Logarithmic measure of missing information ◦ Probabilistic model: pi are probabilities ◦ Applies to classical (macroscopic)f g signals ◦ Coding theorem: Bound on rate of transmission of information• through noisy channel What Is Quantum Information? 05. 100.05.tex Quantum Information Theory (QIT) Goal of QIT: \Quantize Shannon" • Extend Shannon's ideas to domain where quantum effects◦ are important Find quantum counterpart of H(X) ◦ We live in a quantum world, so • QIT should be the fundamental info theory ◦ Classical theory should emerge from QIT ◦ Analogy: relativity theory Newton for v c ◦ ! What Is Quantum Information? 06. 100.06.tex QIT: Current Status Enormous number of published papers • Does activity = understanding? ◦ Some topics of current interest: • Entanglement ◦ Quantum channels ◦ Error correction ◦ Quantum computation ◦ Decoherence ◦ Unifying principles have yet to emerge • At least, they are not yet widely recognized ◦ What Is Quantum Information? 07.
    [Show full text]
  • Security of Quantum Key Distribution with Entangled Qutrits
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by CERN Document Server Security of Quantum Key Distribution with Entangled Qutrits. Thomas Durt,1 Nicolas J. Cerf,2 Nicolas Gisin,3 and Marek Zukowski˙ 4 1 Toegepaste Natuurkunde en Fotonica, Theoeretische Natuurkunde, Vrije Universiteit Brussel, Pleinlaan 2, 1050 Brussels, Belgium 2 Ecole Polytechnique, CP 165, Universit´e Libre de Bruxelles, 1050 Brussels, Belgium 3 Group of Applied Physics - Optique, Universit´e de Gen`eve, 20 rue de l’Ecole de M´edecine, Gen`eve 4, Switzerland, 4Instytut Fizyki Teoretycznej i Astrofizyki Uniwersytet, Gda´nski, PL-80-952 Gda´nsk, Poland July 2002 Abstract The study of quantum cryptography and quantum non-locality have traditionnally been based on two-level quantum systems (qubits). In this paper we consider a general- isation of Ekert's cryptographic protocol[20] where qubits are replaced by qutrits. The security of this protocol is related to non-locality, in analogy with Ekert's protocol. In order to study its robustness against the optimal individual attacks, we derive the infor- mation gained by a potential eavesdropper applying a cloning-based attack. Introduction Quantum cryptography aims at transmitting a random key in such a way that the presence of an eavesdropper that monitors the communication is revealed by disturbances in the transmission of the key (for a review, see e.g. [21]). Practically, it is enough in order to realize a crypto- graphic protocol that the key signal is encoded into quantum states that belong to incompatible bases, as in the original protocol of Bennett and Brassard[4].
    [Show full text]
  • Key Concepts for Future QIS Learners Workshop Output Published Online May 13, 2020
    Key Concepts for Future QIS Learners Workshop output published online May 13, 2020 Background and Overview On behalf of the Interagency Working Group on Workforce, Industry and Infrastructure, under the NSTC Subcommittee on Quantum Information Science (QIS), the National Science Foundation invited 25 researchers and educators to come together to deliberate on defining a core set of key concepts for future QIS learners that could provide a starting point for further curricular and educator development activities. The deliberative group included university and industry researchers, secondary school and college educators, and representatives from educational and professional organizations. The workshop participants focused on identifying concepts that could, with additional supporting resources, help prepare secondary school students to engage with QIS and provide possible pathways for broader public engagement. This workshop report identifies a set of nine Key Concepts. Each Concept is introduced with a concise overall statement, followed by a few important fundamentals. Connections to current and future technologies are included, providing relevance and context. The first Key Concept defines the field as a whole. Concepts 2-6 introduce ideas that are necessary for building an understanding of quantum information science and its applications. Concepts 7-9 provide short explanations of critical areas of study within QIS: quantum computing, quantum communication and quantum sensing. The Key Concepts are not intended to be an introductory guide to quantum information science, but rather provide a framework for future expansion and adaptation for students at different levels in computer science, mathematics, physics, and chemistry courses. As such, it is expected that educators and other community stakeholders may not yet have a working knowledge of content covered in the Key Concepts.
    [Show full text]
  • Free-Electron Qubits
    Free-Electron Qubits Ori Reinhardt†, Chen Mechel†, Morgan Lynch, and Ido Kaminer Department of Electrical Engineering and Solid State Institute, Technion - Israel Institute of Technology, 32000 Haifa, Israel † equal contributors Free-electron interactions with laser-driven nanophotonic nearfields can quantize the electrons’ energy spectrum and provide control over this quantized degree of freedom. We propose to use such interactions to promote free electrons as carriers of quantum information and find how to create a qubit on a free electron. We find how to implement the qubit’s non-commutative spin-algebra, then control and measure the qubit state with a universal set of 1-qubit gates. These gates are within the current capabilities of femtosecond-pulsed laser-driven transmission electron microscopy. Pulsed laser driving promise configurability by the laser intensity, polarizability, pulse duration, and arrival times. Most platforms for quantum computation today rely on light-matter interactions of bound electrons such as in ion traps [1], superconducting circuits [2], and electron spin systems [3,4]. These form a natural choice for implementing 2-level systems with spin algebra. Instead of using bound electrons for quantum information processing, in this letter we propose using free electrons and manipulating them with femtosecond laser pulses in optical frequencies. Compared to bound electrons, free electron systems enable accessing high energy scales and short time scales. Moreover, they possess quantized degrees of freedom that can take unbounded values, such as orbital angular momentum (OAM), which has also been proposed for information encoding [5-10]. Analogously, photons also have the capability to encode information in their OAM [11,12].
    [Show full text]
  • Design of a Qubit and a Decoder in Quantum Computing Based on a Spin Field Effect
    Design of a Qubit and a Decoder in Quantum Computing Based on a Spin Field Effect A. A. Suratgar1, S. Rafiei*2, A. A. Taherpour3, A. Babaei4 1 Assistant Professor, Electrical Engineering Department, Faculty of Engineering, Arak University, Arak, Iran. 1 Assistant Professor, Electrical Engineering Department, Amirkabir University of Technology, Tehran, Iran. 2 Young Researchers Club, Aligudarz Branch, Islamic Azad University, Aligudarz, Iran. *[email protected] 3 Professor, Chemistry Department, Faculty of Science, Islamic Azad University, Arak Branch, Arak, Iran. 4 faculty member of Islamic Azad University, Khomein Branch, Khomein, ABSTRACT In this paper we present a new method for designing a qubit and decoder in quantum computing based on the field effect in nuclear spin. In this method, the position of hydrogen has been studied in different external fields. The more we have different external field effects and electromagnetic radiation, the more we have different distribution ratios. Consequently, the quality of different distribution ratios has been applied to the suggested qubit and decoder model. We use the nuclear property of hydrogen in order to find a logical truth value. Computational results demonstrate the accuracy and efficiency that can be obtained with the use of these models. Keywords: quantum computing, qubit, decoder, gyromagnetic ratio, spin. 1. Introduction different hydrogen atoms in compound applied for the qubit and decoder designing. Up to now many papers deal with the possibility to realize a reversible computer based on the laws of 2. An overview on quantum concepts quantum mechanics [1]. In this chapter a short introduction is presented Modern quantum chemical methods provide into the interesting field of quantum in physics, powerful tools for theoretical modeling and Moore´s law and a summary of the quantum analysis of molecular electronic structures.
    [Show full text]
  • Progress in Satellite Quantum Key Distribution
    www.nature.com/npjqi REVIEW ARTICLE OPEN Progress in satellite quantum key distribution Robert Bedington 1, Juan Miguel Arrazola1 and Alexander Ling1,2 Quantum key distribution (QKD) is a family of protocols for growing a private encryption key between two parties. Despite much progress, all ground-based QKD approaches have a distance limit due to atmospheric losses or in-fibre attenuation. These limitations make purely ground-based systems impractical for a global distribution network. However, the range of communication may be extended by employing satellites equipped with high-quality optical links. This manuscript summarizes research and development which is beginning to enable QKD with satellites. It includes a discussion of protocols, infrastructure, and the technical challenges involved with implementing such systems, as well as a top level summary of on-going satellite QKD initiatives around the world. npj Quantum Information (2017) 3:30 ; doi:10.1038/s41534-017-0031-5 INTRODUCTION losses that increase exponentially with distance, greatly limiting Quantum key distribution (QKD) is a relatively new cryptographic the secure key rates that can be achieved over long ranges. primitive for establishing a private encryption key between two For any pure-loss channel with transmittance η, it has been parties. The concept has rapidly matured into a commercial shown that the secure key rate per mode of any QKD protocol 5, 6, 7 technology since the first proposal emerged in 1984,1 largely scales linearly with η for small η. This places a fundamental because of a very attractive proposition: the security of QKD is not limit to the maximum distance attainable by QKD protocols based on the computational hardness of solving mathematical relying on direct transmission.
    [Show full text]
  • Quantum Information Science, NIST, and Future Technological Implications National Institute of Standards & Technology Http
    Quantum Information Science, NIST, and Future Technological Implications Carl J. Williams, Chief Atomic Physics Division National Institute of Standards & Technology http://qubit.nist.gov NIST – Atomic Physics Division Carl J. Williams, Chief What is Quantum Information? “Quantum information is a radical departure in information technology, more fundamentally different from current technology than the digital computer is from the abacus.” W. D. Phillips, 1997 Nobel Prize Winner in Physics A convergence of two of the 20th Century’s great revolutions A new science! Quantum Mechanics Information Science (i.e. computer science, (i.e. atoms, photons, JJ’s, communications, physics of computation) cryptology) The second quantum revolution NIST – Atomic Physics Division Carl J. Williams, Chief Second Quantum Revolution We are witnessing the second quantum revolution • First quantum revolution (1920’s - 1980’s) – Described how nature works at the quantum level – Weirdness of QM discovered and debated – Wave-particle duality -> Wavefunctions – Spooky action at a distance -> Entanglement – Technology uses semiclassical properties – quantization & wave properties • Second quantum revolution (starts ~1980’s - ) – Exploits how nature works at the quantum level – Interactions are how Nature computes! – Weirdness of QM exploited – Information storage capacity of superposed wavefunctions – Information transmittal accomplished by entanglement, teleportation – Information exchange accomplished by interactions – Technology uses the weird properties of quantum mechanics NIST – Atomic Physics Division Carl J. Williams, Chief Classical Bits vs. Quantum Bits • Classical Bits: two-state systems Classical bits: 0 (off) or 1 (on) (switch) • Quantum Bits are also two-level(state) systems ⎜↑〉 ⎜1〉 Atom ⎜0〉 ⎜↓〉 Internal State Motional State Ö But: Quantum Superpositions are possible Ψ= α|↓〉 + β|↑〉 = α|0〉 + β|1〉 NIST – Atomic Physics Division Carl J.
    [Show full text]
  • A Theoretical Study of Quantum Memories in Ensemble-Based Media
    A theoretical study of quantum memories in ensemble-based media Karl Bruno Surmacz St. Hugh's College, Oxford A thesis submitted to the Mathematical and Physical Sciences Division for the degree of Doctor of Philosophy in the University of Oxford Michaelmas Term, 2007 Atomic and Laser Physics, University of Oxford i A theoretical study of quantum memories in ensemble-based media Karl Bruno Surmacz, St. Hugh's College, Oxford Michaelmas Term 2007 Abstract The transfer of information from flying qubits to stationary qubits is a fundamental component of many quantum information processing and quantum communication schemes. The use of photons, which provide a fast and robust platform for encoding qubits, in such schemes relies on a quantum memory in which to store the photons, and retrieve them on-demand. Such a memory can consist of either a single absorber, or an ensemble of absorbers, with a ¤-type level structure, as well as other control ¯elds that a®ect the transfer of the quantum signal ¯eld to a material storage state. Ensembles have the advantage that the coupling of the signal ¯eld to the medium scales with the square root of the number of absorbers. In this thesis we theoretically study the use of ensembles of absorbers for a quantum memory. We characterize a general quantum memory in terms of its interaction with the signal and control ¯elds, and propose a ¯gure of merit that measures how well such a memory preserves entanglement. We derive an analytical expression for the entanglement ¯delity in terms of fluctuations in the stochastic Hamiltonian parameters, and show how this ¯gure could be measured experimentally.
    [Show full text]
  • Quantum Computation and Complexity Theory
    Quantum computation and complexity theory Course given at the Institut fÈurInformationssysteme, Abteilung fÈurDatenbanken und Expertensysteme, University of Technology Vienna, Wintersemester 1994/95 K. Svozil Institut fÈur Theoretische Physik University of Technology Vienna Wiedner Hauptstraûe 8-10/136 A-1040 Vienna, Austria e-mail: [email protected] December 5, 1994 qct.tex Abstract The Hilbert space formalism of quantum mechanics is reviewed with emphasis on applicationsto quantum computing. Standardinterferomeric techniques are used to construct a physical device capable of universal quantum computation. Some consequences for recursion theory and complexity theory are discussed. hep-th/9412047 06 Dec 94 1 Contents 1 The Quantum of action 3 2 Quantum mechanics for the computer scientist 7 2.1 Hilbert space quantum mechanics ..................... 7 2.2 From single to multiple quanta Ð ªsecondº ®eld quantization ...... 15 2.3 Quantum interference ............................ 17 2.4 Hilbert lattices and quantum logic ..................... 22 2.5 Partial algebras ............................... 24 3 Quantum information theory 25 3.1 Information is physical ........................... 25 3.2 Copying and cloning of qbits ........................ 25 3.3 Context dependence of qbits ........................ 26 3.4 Classical versus quantum tautologies .................... 27 4 Elements of quantum computatability and complexity theory 28 4.1 Universal quantum computers ....................... 30 4.2 Universal quantum networks ........................ 31 4.3 Quantum recursion theory ......................... 35 4.4 Factoring .................................. 36 4.5 Travelling salesman ............................. 36 4.6 Will the strong Church-Turing thesis survive? ............... 37 Appendix 39 A Hilbert space 39 B Fundamental constants of physics and their relations 42 B.1 Fundamental constants of physics ..................... 42 B.2 Conversion tables .............................. 43 B.3 Electromagnetic radiation and other wave phenomena .........
    [Show full text]
  • Practical Quantum Key Distribution Based on the BB84 Protocol
    Practical Quantum Key Distribution based on the BB84 protocol A. Ruiz-Alba, D. Calvo, V. Garcia-Muñoz, A. Martinez, W. Amaya, J.G. Rozo, J. Mora, J. Capmany Instituto de Telecomunicaciones y Aplicaciones Multimedia, Universitat Politècnica de València, 8G Building-access D-Camino de Vera s/n-46022 Valencia (Spain) Corresponding author: [email protected] Abstract relies on photon sources and the so-called pho- ton guns are far from ready. An alternative and This paper provides a review of the most impor- also a complementary approach to increase the tant and widely used Quantum Key Distribution bit rate is to make QKD systems work in paral- systems and then describes our recently pro- lel. This simple engineering approach becomes a posed scheme based on Subcarrier Multiplexing challenge when working with quantum systems: that opens the possibility of parallel Quantum The system should work in parallel but still rely Key Distribution. We report the first-ever ex- on just one source and its security should still be perimental implementation of parallel quantum guaranteed by the principles of quantum me- key distribution using this technique showing a chanics both when Alice prepares the photons maximum multiplexing gain. and when Bob “measures” the incoming states. At the same time the multiplexing technique Keywords: Optical fiber communications, quan- should be safe to Eve gaining any information. tum information, quantum key distribution, sub- carrier multiplexing. In this context, recent progress in the literature [4] remarks that photonics is a key enabling technology for implementing commercial QKD 1. Introduction systems to become a competitive technology in Information Security.
    [Show full text]
  • Models of Quantum Complexity Growth
    Models of quantum complexity growth Fernando G.S.L. Brand~ao,a;b;c;d Wissam Chemissany,b Nicholas Hunter-Jones,* e;b Richard Kueng,* b;c John Preskillb;c;d aAmazon Web Services, AWS Center for Quantum Computing, Pasadena, CA bInstitute for Quantum Information and Matter, California Institute of Technology, Pasadena, CA 91125 cDepartment of Computing and Mathematical Sciences, California Institute of Technology, Pasadena, CA 91125 dWalter Burke Institute for Theoretical Physics, California Institute of Technology, Pasadena, CA 91125 ePerimeter Institute for Theoretical Physics, Waterloo, ON N2L 2Y5 *Corresponding authors: [email protected] and [email protected] Abstract: The concept of quantum complexity has far-reaching implications spanning theoretical computer science, quantum many-body physics, and high energy physics. The quantum complexity of a unitary transformation or quantum state is defined as the size of the shortest quantum computation that executes the unitary or prepares the state. It is reasonable to expect that the complexity of a quantum state governed by a chaotic many- body Hamiltonian grows linearly with time for a time that is exponential in the system size; however, because it is hard to rule out a short-cut that improves the efficiency of a computation, it is notoriously difficult to derive lower bounds on quantum complexity for particular unitaries or states without making additional assumptions. To go further, one may study more generic models of complexity growth. We provide a rigorous connection between complexity growth and unitary k-designs, ensembles which capture the randomness of the unitary group. This connection allows us to leverage existing results about design growth to draw conclusions about the growth of complexity.
    [Show full text]
  • Lecture 6: Quantum Error Correction and Quantum Capacity
    Lecture 6: Quantum error correction and quantum capacity Mark M. Wilde∗ The quantum capacity theorem is one of the most important theorems in quantum Shannon theory. It is a fundamentally \quantum" theorem in that it demonstrates that a fundamentally quantum information quantity, the coherent information, is an achievable rate for quantum com- munication over a quantum channel. The fact that the coherent information does not have a strong analog in classical Shannon theory truly separates the quantum and classical theories of information. The no-cloning theorem provides the intuition behind quantum error correction. The goal of any quantum communication protocol is for Alice to establish quantum correlations with the receiver Bob. We know well now that every quantum channel has an isometric extension, so that we can think of another receiver, the environment Eve, who is at a second output port of a larger unitary evolution. Were Eve able to learn anything about the quantum information that Alice is attempting to transmit to Bob, then Bob could not be retrieving this information|otherwise, they would violate the no-cloning theorem. Thus, Alice should figure out some subspace of the channel input where she can place her quantum information such that only Bob has access to it, while Eve does not. That the dimensionality of this subspace is exponential in the coherent information is perhaps then unsurprising in light of the above no-cloning reasoning. The coherent information is an entropy difference H(B) − H(E)|a measure of the amount of quantum correlations that Alice can establish with Bob less the amount that Eve can gain.
    [Show full text]