Umesh V. Vazirani U. C. Berkeley Quantum Algorithms: a survey.

Slides:



Advertisements
Similar presentations
Multilinear Formulas and Skepticism of Quantum Computing Scott Aaronson UC Berkeley IAS.
Advertisements

University of Strathclyde
University of Queensland
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
The Hidden Subgroup Problem. Problem of great importance in Quantum Computation Most Q.A. that run exponentially faster than their classical counterparts.
New Lattice Based Cryptographic Constructions
March 11, 2015CS21 Lecture 271 CS21 Decidability and Tractability Lecture 27 March 11, 2015.
CNS2009handout 21 :: quantum cryptography1 ELEC5616 computer and network security matt barrie
1 Quantum Computing: What’s It Good For? Scott Aaronson Computer Science Department, UC Berkeley January 10,  John.
University of Queensland
Superposition, Entanglement, and Quantum Computation Aditya Prasad 3/31/02.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
Quantum Computing Joseph Stelmach.
1 Recap (I) n -qubit quantum state: 2 n -dimensional unit vector Unitary op: 2 n  2 n linear operation U such that U † U = I (where U † denotes the conjugate.
Shor’s Algorithm Osama Awwad Department of Computer Science Western Michigan University July 12, 2015.
Quantum Computing Lecture 1 Michele Mosca. l Course Outline
CSEP 590tv: Quantum Computing Dave Bacon Aug 3, 2005 Today’s Menu Public Key Cryptography Shor’s Algorithm Grover’s Algorithm Administrivia Quantum Mysteries:
ROM-based computations: quantum versus classical B.C. Travaglione, M.A.Nielsen, H.M. Wiseman, and A. Ambainis.
Topic 18: RSA Implementation and Security
Quantum Computing MAS 725 Hartmut Klauck NTU
Cryptography Lecture 6 Stefan Dziembowski
Debasis Sadhukhan M.Sc. Physics, IIT Bombay. 1. Basics of Quantum Computation. 2. Quantum Circuits 3. Quantum Fourier Transform and it’s applications.
1 Introduction to Quantum Information Processing QIC 710 / CS 678 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 / QNC 3129 Lectures.
Quantum Computation for Dummies Dan Simon Microsoft Research UW students.
October 1 & 3, Introduction to Quantum Computing Lecture 2 of 2 Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
Small-Depth Quantum Circuits Frederic Green Department of Math/CS Clark University Worcester, MA.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 653 Course.
Lecture note 8: Quantum Algorithms
Algorithms Artur Ekert. Our golden sequence H H Circuit complexity n QUBITS B A A B B B B A # of gates (n) = size of the circuit (n) # of parallel units.
October 1 & 3, Introduction to Quantum Computing Lecture 1 of 2 Introduction to Quantum Computing Lecture 1 of 2
Quantum Computing MAS 725 Hartmut Klauck NTU
Short course on quantum computing Andris Ambainis University of Latvia.
Quantum Factoring Michele Mosca The Fifth Canadian Summer School on Quantum Information August 3, 2005.
Michele Mosca Canada Research Chair in Quantum Computation 27 May 2006 Introduction to quantum technologies: quantum computers, quantum teleporters & cryptography.
Quantum random walks – new method for designing quantum algorithms Andris Ambainis University of Latvia.
Quantum Algorithms & Complexity
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Nawaf M Albadia
Quanum computing. What is quantum computation? New model of computing based on quantum mechanics. Quantum circuits, quantum Turing machines More powerful.
Shor’s Factoring Algorithm
Quantum Computing Michael Larson. The Quantum Computer Quantum computers, like all computers, are machines that perform calculations upon data. Quantum.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 653 Lecture.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Computation Stephen Jordan. Church-Turing Thesis ● Weak Form: Anything we would regard as “computable” can be computed by a Turing machine. ●
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 2117 Lecture.
1 Diffie-Hellman (Key Exchange) Protocol Rocky K. C. Chang 9 February 2007.
1 An Introduction to Quantum Computing Sabeen Faridi Ph 70 October 23, 2007.
Quantum Computing: An Introduction
Beginner’s Guide to Quantum Computing Graduate Seminar Presentation Oct. 5, 2007.
Quantum Bits (qubit) 1 qubit probabilistically represents 2 states
Optimization by Quantum Computers
D. Cheung – IQC/UWaterloo, Canada D. K. Pradhan – UBristol, UK
COMPSCI 290.2: Computer Security
Introduction to Quantum Computing Lecture 1 of 2
Quantum Cryptography Quantum Computing
Background: Lattices and the Learning-with-Errors problem
Four approaches to Shor
For computer scientists
A Ridiculously Brief Overview
3rd Lecture: QMA & The local Hamiltonian problem (CNT’D)
Qubit Recycling in Quantum Computation
OSU Quantum Information Seminar
Quantum Computing Joseph Stelmach.
Quantum Cryptography Quantum Computing
Presentation transcript:

Umesh V. Vazirani U. C. Berkeley Quantum Algorithms: a survey

Exponential Superposition  Superposition of all 2 n classical states:  Measurement: See |x i with probability |  x | Quantum Algorithms: tension between these two phenomena all n-bit strings

Why limit computers to electronics implemented on silicon? Extended Church-Turing thesis - Any “reasonable” model of computation can be efficiently simulated by a probabilistic Turing Machine. - Circuits, Random access machines, cellular automata. - “Reasonable” = physically realizable in principle Quantum computers only model that violate this thesis

Shor’s quantum factoring algorithm. Breaks modern cryptography. Simulating quantum mechanics. Symmetry - Discrete logarithm - Pell’s equation - Shifted Legendre Symbol - Gauss sums - Elliptic curve cryptography Quantum Algorithms – Exponential Speedups

Young’s Double slit experiment P 1 (x) = |  1 (x)| 2 P 2 (x) = |  2 (x)| 2  1,2 =  1 (x) +  2 (x) P 1,2 (x) = |  1,2 (x)| 2

n-slits Etch n slits in a pattern based on the input. Send photon through and measure. Location at which photon detected gives provides information about solution to input. Input-based slit pattern photon screen

Quantum Circuits - Each Wire Carries a qubit of information - Controlled Not: aa b a © b - Single Bit Gates (Rotations)  |1 i |0 i |1’ i |0’ i |0 i ! cos  |0 i + sin  |1 i |1 i ! sin  |0 i - cos  |1 i..\..\clipart\atomphoton\index1.html

Quantum Fourier Transform Quantum: Input: |  i =  j=0 m  j |ji O(logm) qubits Fourier transform: F|  i =  j=0 m-1  j |ji O(log 2 m) gates Limited Access: Measure: see |ji with probability |  j | 2 Classical : FFT O(m logm)

Quantum Fourier Transform One Qubit or Z 2  |1 i |0 i |1’ i |0’ i |0 i ! |0 i + |1 i |1 i ! |0 i - |1 i Two Qubits or Z 2 2   |00 i ! (|0 i + |1 i ) ­ (|0 i + |1 i ) = 1/2(|00 i + |01 i + |10 i + |11 i ) |01 i ! (|0 i + |1 i ) ­ (|0 i - |1 i ) = 1/2(|00 i - |01 i + |10 i - |11 i ) |10 i ! (|0 i - |1 i ) ­ (|0 i + |1 i ) = 1/2(|00 i + |01 i - |10 i - |11 i ) |11 i ! (|0 i - |1 i ) ­ (|0 i - |1 i ) = 1/2(|00 i - |01 i - |10 i + |11 i )

n Qubits or Z 2 n     |u i x1x1 xnxn

Outline of Shor’s Factoring Algorithm N ! exponential superposition  x  x |x i Factors of N encoded in global property of superposition – its period. quantum fourier transform and measure to extract period. Reconstruct factors of N from the period. 0 q0q

Outline of Shor’s Factoring Algorithm (Example) 0 q0q N = 15 = p ¢ q Randomly choose a = 7 (mod 15) Consider sequence a x (mod 15) for x =0,1,2,… 1, 7, 4, 13, 1, 7, 4, 13, 1, 7, 4, 13, … Period r = 4. N | (a r -1)=(a r/2 +1)(a r/2 -1) = (7 2 +1)(7 2 -1) = 50 ¢ 48 p = gcd(15, 50), q = gcd(15, 48). Create superposition  x |x i |a x i

Outline of Shor’s Factoring Algorithm (Example) N = 15 = p ¢ q Randomly choose a = 7 (mod 15) Consider sequence a x (mod 15) for x =0,1,2,… 1, 7, 4, 13, 1, 7, 4, 13, 1, 7, 4, 13, … Period r = 4. N | (r+1)(r-1) = (4+1)(4-1) = 5 ¢ 3 p = gcd(15, 5), q = gcd(15, 3). Create superposition  x |x i |a x i 0 q0q

The Hidden Subgroup Problem Given f : G ! S, constant and distinct on cosets of subgroup H. Find H. Examples Factoring N: G = Discrete log: G = G:G:

1. State Preparation G:G: Given f : G ! S, constant and distinct on cosets of subgroup H. Find H. FGFG f Measure 1. Create Random Coset state  h 2 H |g + h i :

2. Fourier Sampling G:G: F.T. G:G: Measure a random element of H ?. 3) (Classically) reconstruct H from polynomialy many samples.

Example: Factoring To factorize N = P ¢ Q, sufficient to compute order of randomly chosen x mod N. i.e. smallest positive r: x r = 1 mod N. Let f: a ! x a mod N. Underlying group = Z M, where M =  (N) = (P-1) ¢ (Q- 1) Hidden subgroup = H = h r i = {0,r, 2r, …, M/r} H ? = h M/r i = {0,M/r, 2M/r, …, M} Fourier sampling gives kM/r for random k: 0 · k · r-1 gcd(M, kM/r) = M/r if k,r relatively prime.

Given a positive non-square integer d, find integer solutions x,y of x 2 – d ¢ y 2 = 1. Pell’s Equation [Hallgren 2002]: 1) Quantum algorithm for Pell’s Equation 2) Breaks Buchman-Williams cyptosystem One of the oldest studied problem in algorithmic number theory. Appears harder than factoring [1989] Buchman-Williams cryptosystem Abelian Hidden subgroup problem – but the group is not finitely generated

Two Challenges Basis v 1, …, v n vectors in R n. The lattice is a 1 v 1 + … + a n v n for all integers a 1, … a n. Find shortest vector in lattice. Short vector in Lattice:

Two Challenges Finding short vector not easy! 1. Short vector in Lattice: Regev: D N Dihedral group 2. Graph Isomorphism S N Symmetric group

Ajtai-Dwork Cryptosystem.

[GSVV] For random choice of basis, for sufficiently non-abelian groups (e.g. S_n), exponentially many samples necessary to distinguish |H|=2 from |H| =1.

Dihedral HSP Dihedral Group D N : Group of symmetries of a regular N-gon. Generated by x, y: x N = 1, y 2 =1, xyxy = 1. Assume N = 2 n. D N has 4 1-d irreps and (N-1)/2 2-d irreps. [Kuperberg ’03] algorithm for dihedral HSP.

Dihedral HSP algorithm Assume wlog H = {1, x h y} Set up random coset state, fourier transform and sample irrep to get random j, Can sample column superposition and do phase estimation to get coin flip of bias O(log N) samples sufficient to determine h, but reconstruction problem hard. Would like to sample particular irreps j.

Dihedral HSP algorithm Claim:  i ­  j =  i+j ©  i-j Algorithm: Start with registers in random coset states, FT, sample irreps. Sort irrep names, pair up successive registers Apply above transformation, and retain iff i,j ! i-j Number of bits reduced by per iteration. iterations Number of irreps reduced by 4 per iteration.

Non-abelian Hidden Subgroup Problem Abelian quantum algorithm doesn’t generalize - Prepare random coset state - Measure in Fourier basis Ettinger, Hoyer, Knill ’98: - Prepare several registers with random coset states - Perform appropriate joint measurement Ip ’03: - Fourier transform & Measure irrep (character) for each register - Perform appropriate joint measurement on residual state.

Adiabatic Quantum State Generation Aharonov, Ta-Shma ‘02 AharonovvanDamKempeLandauLloydRegev’03 Adiabatic Computation ≈ Quantum Computation

Classical Simulation of Quantum Systems Vidal ’03 Polynomial time simulation of one dimensional spin chains with O(log n) entanglement length. ABC  AC =  A ­  C  ABC =  AB1 ­  B2C 1 2

Summary Quantum computation only model that violates extended Church-Turing thesis. Exponential superposition vs limited access. Exponential speedups appear to require symmetry. Fast quantum algorithm for abelian hidden subgroup problem Non-abelian case open.