Introduction to Quantum Computation

Introduction to Quantum Computation

Introduction to Quantum Computation Sevag Gharibian July 2020 Department of Computer Science Paderborn University Germany Contents 1 Introduction and Linear Algebra Review 1 1.1 Introduction . 1 1.2 Linear Algebra . 2 2 Introduction to Quantum Mechanics 8 2.1 The four postulates of quantum mechanics . 8 2.1.1 Postulate 1: Individual quantum systems . 8 2.1.2 Postulate 2: Quantum operations . 9 2.1.3 Postulate 3: Composite quantum systems . 11 3 Measurement and Quantum Teleportation 16 3.1 Postulate 4: Measurement . 16 3.2 Quantum teleportation . 19 3.3 Simulating arbitrary measurements via standard basis measurements . 21 3.4 Revisiting Schr¨odinger'scat . 23 4 No Cloning, Entanglement, and Density Matrices 24 4.1 No cloning theorem . 24 4.2 Quantum entanglement . 25 4.3 Density matrices . 26 4.3.1 The partial trace operation . 29 4.3.2 Using partial trace to detect entanglement . 31 4.3.3 How the postulates of quantum mechanics apply to density operators . 32 5 Non-Local Games 33 5.1 Background . 33 5.2 Does entanglement allow superluminal signalling? . 34 5.3 Non-local games . 35 5.3.1 The CHSH game . 35 5.3.2 The magic square game . 39 5.3.3 Closing thoughts . 41 6 Entropy and Entanglement Distillation 43 6.1 Entropy . 43 6.1.1 Shannon entropy . 43 6.1.2 Von Neumann Entropy . 45 6.2 Quantifying entanglement in composite quantum systems . 47 6.3 Entanglement distillation . 49 7 The Deutsch-Josza and Berstein-Vazirani algorithms 52 7.1 The setup: Functions as oracles . 52 7.2 The problem: Is f constant or balanced? . 53 i 7.3 The algorithm . 53 7.3.1 A naive idea . 53 7.3.2 Deutsch's algorithm . 54 7.3.3 The phase kickback trick . 55 7.4 The Deutsch-Josza algorithm . 57 7.5 The Berstein-Vazirani algorithm . 61 8 Simon's algorithm and applications to cryptography 63 8.1 Simon's algorithm . 63 8.1.1 Birthdays and a naive classical algorithm . 63 8.1.2 Simon's algorithm . 64 8.2 Application to cryptography . 66 9 The Quantum Fourier Transform 70 9.1 From Vandermonde matrices to the Discrete Fourier Transform . 70 9.2 The Quantum Fourier Transform (QFT) . 73 9.3 Quantum Phase Estimation (QPE) . 76 9.3.1 Applications of QPE . 77 9.3.2 Quantum algorithms for QPE . 78 10 Shor's quantum factoring algorithm 80 10.1 The integer factorization problem . 80 10.2 The factoring algorithm . 82 10.2.1 Reducing FACTOR to order-finding . 82 10.2.2 Sampling via QPE . 85 10.2.3 Postprocessing via continued fractions . 89 10.3 Application: Breaking RSA . 90 11 Grover search and approximate counting 92 11.1 The unstructured search problem . 92 11.2 Grover's algorithm . 93 11.3 Approximate counting . 96 11.3.1 A brief history of counting . 96 11.3.2 Quantum approximate counting via Grover search . 97 12 Independent reading - Quantum money 102 12.1 Quantum money . 102 12.2 What next? . 103 Bibliography 104 ii 1 Introduction and Linear Algebra Review I recall that during one walk Einstein suddenly stopped, turned to me and asked whether I really believed that the moon exists only when I look at it. | Abraham Pais. 1.1 Introduction Welcome to Introduction to Quantum Computation! In this course, we shall explore the subject of quantum computation from a theoretical computer science perspective. As the quote by Abraham Pais above foreshadows, our story will involve surprising twists and turns, which will seem completely at odds with your perception of the world around you. Indeed, in a quantum world, a single particle can be in two places simultaneously; two particles can be so strongly \bound" that they can appear to communicate instantaneously even if they are light-years apart; and the very act of "looking" at a quantum system can irreversibly alter the system itself! It is precisely these quirks of quantum mechanics which we shall aim to exploit in our study of computation. The basic premise of quantum computing is \simple": To build a computer whose bits are not represented by transistors, but by subatomic particles such as electrons or photons. In this subatomic world, the pertinent laws of physics are no longer Newton's classical mechanics, but rather the laws of quantum mechanics. Hence, the name \quantum computing". Why would we ever want to build such a computer? There are a number of reasons. From an engineering standpoint, microchip components have become so small that they encounter quantum effects which impede their functionality. To a physicist, the study of quantum computing is a natural approach for simulating and studying quantum systems in nature. And to a computer scientist, quantum computers are remarkable in that they can solve problems which are believed to be intractable on a classical computer! The field of quantum computing, which arguably started with famed physicist Richard Feyn- man's ideas (1982) for efficiently simulating physical systems (although it should be noted that ideas for crytography based on quantum mechanics date back to Stephen Wiesner around 1970), is nowadays far too large to be captured in a single course. Here, we shall focus on a broad introduction which aims to cover topics such as: What is quantum mechanics, and how can it be harnessed to build a computer? What kind of computational problems can such a computer solve? Are there problems which are hard even for a quantum computer? And finally, what does the study of quantum computing tell us about nature itself? Even if this course is the last time you encounter the topic of quantum computing, the experience should hopefully leave you with an appreciation for the fine interplay between the limits of physics and computing, as well as strengthen your background in Linear Algebra, which is useful in many other areas of computer science. The entire course will take place in the mathematical framework of Linear Algebra, which we now review. It is crucial that you familiarize yourself with these concepts before proceeding with the course. These notes contain many exercises intended to help the reader; it is strongly recommended for you to work on these as you read along. 1 1.2 Linear Algebra This course assumes a basic background in Linear Algebra. Thus, much of what is covered in this section is intended to be a refresher (although some of the later concepts here may be new to you); we thus cover this section briskly. Throughout this course, the symbols C, R, Z, and N denote the sets of complex, real, integer, and natural numbers, respectively. For m a positive integer, the notation [m] indicates the set 1; : : : ; m . f g The basic objects we shall work with are complex vectors Cd, i.e. j i 2 0 1 1 = B . C ; (1.1) j i @ . A d for i C. Recall here that a complex number c C can be written in two equivalent ways: 2 2 Either as c = a+bi for a; b R and i2 = 1, or in its polar form as c = reiθ for r; θ R. One of 2 − 2 the advantages of the polar form is that it can directly be visualized on the 2D complex plane: imaginary axis (cos θ, sin θ) r θ real axis Here, the x and y axes correspond to real and imaginary axes, and r denotes the length of the vector (cos θ; sin θ). For example, observe that 1 can be written in polar form with r = 1 and θ = 0, i.e. 1 is represented in the 2D plane as vector (1; 0). In this course, the polar form will be used repeatedly. Recall also that the complex conjugate of c, denoted c , is defined as a bi ∗ − or re iθ, respectively. Finally, the notation is called Dirac notation, named after physicist − |·i Paul Dirac, and is simply a useful convention for referring to column vectors. The term is j i read \ket ". Exercise 1.1. The magnitude or \length" of c C is given by c = pcc∗. What is the 2 j j magnitude of eiθ for any θ R? How about the magnitude of reiθ? 2 Complex vectors shall be crucial to us for a single reason: They represent quantum states (more details in subsequent lectures). It is thus important to establish some further basic properties of vectors. First, the conjugate transpose of is given by j i = ( ∗; ∗; : : : ; ∗) ; (1.2) h j 1 2 d where is a row vector. The term is pronounced \bra ". This allows us to define how h j h j much two vectors \overlap" via the inner product function, defined as d X φ = ∗φ : (1.3) h j i i i i=1 The inner product satisfies ( φ )∗ = φ . The \length" of a vector can now be quantified h j i h j i j i p by measuring the overlap of with itself, which yields the Euclidean norm, = . j i k j i k2 h j i 2 Exercise 1.2. Let = 1 (1; i)T C2, where T denotes the transpose. What is ? How j i p2 2 h j about ? k j i k2 With a norm in hand, we can define a notion of distance between vectors ; φ , called the j i j i Euclidean distance: φ . This distance will play the important role of quantifying k j i − j i k2 how well two quantum states and φ can be \distinguished" via measurements. Two useful j i j i properties of the Euclidean norm are: 1.

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    108 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us