Proceedings of Student-Faculty Research Day, CSIS, Pace University, May 8th, 2020 SuperDense Coding Beyond the Pauli Gates Lewis Westfall Pace University, Pleasantville NY, 10570, USA, [email protected] Abstract—Superdense coding is the quantum ability to trans- she will use to encode this message information to her qubit. mit two classical bits, four states, via one quantum bit (qubit) of These states are can be used to convey any four states. a pair of entangled qubits. This is almost always demonstrated + 1 using the Φ Bell state, p (j00i + j11i) and the Pauli gates to Because of the entanglement, the single qubit operation, 2 encode the data. This paper investigates the feasibility of using the represented by a 2x2 matrix, is insufficient to describe the u3 gate to encode a fifth state, first by analyzing the linear algebra effects the gate has on the two entangled qubits, since the that describes the process and then by running the process on operation also affects the second qubit. To understand the full the IBM Quantum Experience quantum computer. It is shown effects of her operation, the gate that Alice applies must be the that this does indeed work, making it possible to communicate tensor product of her gate and the identity (I) gate to generate more than four states using a single entangled qubit. a 4x4 operational matrix . A single qubit is represented by a Keywords—Superdense Coding; Quantum Computing; Classical 1x2 column matrix. Because the two qubits are entangled, they Bits; QuBits; Quantum Coding; Entanglement; IBM; Q Experi- must be represented by a 1x4 column matrix and this requires ence; H Gate; CNot, Quantum Channel; Bell State a 4x4 matrix to describe the operation. For instance, if we were to apply a Pauli X (X) gate we would take the tensor product I. INTRODUCTION of the X gate and the identity (I) gate as described below. Superdense coding is the ability for one of an entangled pair of qubits to carry 2 bits of information which is more 2 0 0 1 0 3 than a single classical bit allows [1]. This is possible because 0 1 1 0 0 0 0 1 ⊗ = 6 7 of quantum entanglement, which connects the quantum state 1 0 0 1 4 1 0 0 0 5 of one qubit with the quantum state of another qubit [2]. The 0 1 0 0 use of superdense coding by entanglement is a quantum cryp- tography method of great promise to defeat any eavesdropper Although the qubits are entangled, while the qubits are in [3]. Frequently the example is of one person, Alice is the usual the possession of their original owner, only Alice can perform person given, sending two classical bits of information in one gate operations on her qubit, and only Bob can perform gate qubit to another person, usually Bob. Frequently the example operations on his qubit. Remembering that any operation on is of Alice telling Bob that the weather is at her location, but either of the qubits affect the pair. Once Alice’s qubit has been actually the definition of the four states can be anything Alice encoded by operations of the quantum gates, it is transmitted and Bob agree to ahead of time. The process starts when a to Bob. third party, call him Oscar for originator, starting with two separate qubits, entangles the pair by applying a Hadamard Bob, with Alice’s qubit now in his possession, as well as (H) gate to the first qubit and then a Controlled Not (CNOT) his own qubit, can perform quantum gate operations on Alice’s gate to both qubits, where the first qubit is the control and qubit to decode the message in it. Bob first applies a CNOT the second qubit is the target. This entanglement produces the operation to both entangled qubits, where Alice’s qubit is the jΦ+i Bell state [4], p1 (j00i + j11i). It is important in this control and Bob’s qubit is the target. Applying the CNOT to an 2 exercise to remember that quantum gates are reversible, unlike entangled pair of qubits causes them to become disentangled classical gates. Whatever a CNOT gate does a second CNOT and break into two independent qubits. Bob measures the gate undoes. The CNOT can entangle, and disentangle. One second qubit, the formerly target qubit that was Bob’s qubit. of the pair of entangled qubit is given to Alice while the other This measurement ends the qubit’s active quantum life, but it is given to Bob. The qubits of Alice and Bob will remain reveals half of the state encoded in the pair. entangled, even though they are physically separated and one Bob then applies an H gate to Alice’s original qubit, the of the qubits is subjected to more gates than the other qubit. first qubit, the former control qubit of the now disentangled State Quantum Gate pair. The H gate operation extracts the second bit of informa- 00 I tion in the message specifying the state. When the qubit is 01 Z measured the binary code that reveals the message that Alice 10 X 11 ZX encoded in her qubit is displayed. The measurements end the process [5]. TABLE I: Alice’s States and Quantum Gates to Encode the States Circuit 1 shows the complete quantum circuit diagram for Alice using the X gate to encode the 10 state. We see the Hadamard and CNOT gates used by Oscar to entangle, Table I shows the options Alice has to send the message to the X gate used by Alice to encode the message, and finally Bob, the binary code for that message, and the quantum gates the CNOT and Hadamard gates used by Bob to extract the 1 message. researchers did not use a real quantum computer or a quantum simulator to test their ideas [8] • • (1) H X H Even when the researchers on a government funded study visited the engineers on the site of the real IBM quantum computers and made note of that in their paper, they still did not conduct a real experiment to test their ideas about Alice The goal is to show that by using the U3 gate, instead and Bob [9]. We did find a real experiment, using mirrors, of one of the Pauli gate, a fifth state can be encoded and photon detectors, and other optic equipment, of sending a communicated by the single entangled qubit. The encoding single photon on a two-way journey from Alice to Bob and decoding operations will first be done using linear algebra. carrying two classical bits [10]. However, although real, they Once the mathematics have been demonstrated, the process did not use a real quantum computer. Best in our review was will be run on the IBM Quantum Experience quantum simula- cryptography research that used Alice and Bob, joined by Eve tor and finally on the IBM Quantum Experience functional the eavesdropper and Charlie the observer, in quantum key quantum computer. Each step will be explained in careful distribution that used quantum optics simulations that show detail so nothing is assumed other than linear algebra and basic real results that could be practical [11]. quantum code notation [6]. To run the experiment on the IBM Quantum Experience will also require familiarity with Qiskit We determined at that point that we must try to match Notebooks. quantum theory to its test in real quantum computer output with this simple example of Bob and Alice. We then quickly Section 2 gives a review of the literature on explaining experienced chaos as we attempted to execute that plan. It superdense coding using Bob and Alice. became obvious that this new ability to test linear equations of Section 3 details the requirements to duplicate the experi- gates on real quantum computers did not have firm sequential ment. steps for newcomers. Real quantum computer programming is raw, new, full of phenomena not well defined. We found Section 4 describes the process using linear algebra. in that chaos the second objective of this study: making our findings clear enough that they could be easy for our readers Section 5 explains the details of the quantum program to duplicate and follow in the real environment of quantum that was run on the IBM Quantum Experience simulator and computing. functional computer. Although some cryptographers dislike using the terms Section 6 presents the results. ”Alice” and ”Bob”, or, in fact, any human name, in quantum Section 7 gives the conclusion and describes possible future computing mathematics, and ask that researchers instead use work. symbols such as ”A” or ”B” [12], the 1978 seminal paper establishing RSA famously created Alice and Bob, and they II. LITERATURE REVIEW remain enduring tools to understand complex security commu- nications protocols [13] including superdense coding, which is In the middle of 2017 came a great divide, as in that a purely quantum action - there is no classical equivalent. Alice time frame, IBM made available to the public real quantum and Bob are arguably as ubiquitous as Schrodinger’s cat [14]. computers over the Internet. IBM has continued this service, and the real quantum computers they are offering to the In 2018, Alice and Bob continue to appear in new quantum free service are in a state of continuously increasing qubit computer articles in publications from Russia [15] to China capacity. Research published before that time did not have the [16]. Alice and Bob are universal. We determined to use them, opportunity to test their equations on a commonly available as they are the standard.
Details
-
File Typepdf
-
Upload Time-
-
Content LanguagesEnglish
-
Upload UserAnonymous/Not logged-in
-
File Pages5 Page
-
File Size-