CSEP 590tv: Quantum Computing Dave Bacon Aug 3, 2005 Today’s Menu Public Key Cryptography Shor’s Algorithm Grover’s Algorithm Administrivia Quantum Mysteries:

Slides:



Advertisements
Similar presentations
Quantum Computing: Whats It Good For? Scott Aaronson Computer Science Department, UC Berkeley January 10,
Advertisements

University of Queensland
Puzzle Twin primes are two prime numbers whose difference is two.
Integer Factorization By: Josh Tuggle & Kyle Johnson.
Umesh V. Vazirani U. C. Berkeley Quantum Algorithms: a survey.
Great Theoretical Ideas in Computer Science.
Session 5 Hash functions and digital signatures. Contents Hash functions – Definition – Requirements – Construction – Security – Applications 2/44.
Tractable and intractable problems for parallel computers
Department of Computer Science & Engineering University of Washington
1 Quantum Computing: What’s It Good For? Scott Aaronson Computer Science Department, UC Berkeley January 10,  John.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
CSEP 590tv: Quantum Computing
Quantum Computing Joseph Stelmach.
Anuj Dawar.
CSE 321 Discrete Structures Winter 2008 Lecture 8 Number Theory: Modular Arithmetic.
1 Recap (I) n -qubit quantum state: 2 n -dimensional unit vector Unitary op: 2 n  2 n linear operation U such that U † U = I (where U † denotes the conjugate.
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Shor’s Algorithm Osama Awwad Department of Computer Science Western Michigan University July 12, 2015.
CSCI 172/283 Fall 2010 Public Key Cryptography. New paradigm introduced by Diffie and Hellman The mailbox analogy: Bob has a locked mailbox Alice can.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Public Key Model 8. Cryptography part 2.
One Complexity Theorist’s View of Quantum Computing Lance Fortnow NEC Research Institute.
1 Introduction to Quantum Information Processing QIC 710 / CS 678 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 / QNC 3129 Lectures.
Great Theoretical Ideas in Computer Science.
RSA Ramki Thurimella.
Quantum Computation for Dummies Dan Simon Microsoft Research UW students.
October 1 & 3, Introduction to Quantum Computing Lecture 2 of 2 Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum.
1 Lecture 9 Public Key Cryptography Public Key Algorithms CIS CIS 5357 Network Security.
Lecture note 8: Quantum Algorithms
Algorithms Artur Ekert. Our golden sequence H H Circuit complexity n QUBITS B A A B B B B A # of gates (n) = size of the circuit (n) # of parallel units.
Cryptography Lecture 7: RSA Primality Testing Piotr Faliszewski.
Quantum Computing MAS 725 Hartmut Klauck NTU
Short course on quantum computing Andris Ambainis University of Latvia.
Quantum Factoring Michele Mosca The Fifth Canadian Summer School on Quantum Information August 3, 2005.
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
CS461/ECE422 Spring 2012 Nikita Borisov — UIUC1.  Text Chapters 2 and 21  Handbook of Applied Cryptography, Chapter 8 
Quantum Computing MAS 725 Hartmut Klauck NTU
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
Public Key Cryptosystems RSA Diffie-Hellman Department of Computer Engineering Sharif University of Technology 3/8/2006.
Nawaf M Albadia
The Computational Complexity of Satisfiability Lance Fortnow NEC Laboratories America.
CSEP 590tv: Quantum Computing Dave Bacon July 20, 2005 Today’s Menu n Qubit registers Begin Quantum Algorithms Administrivia Superdense Coding Finish Teleportation.
CS Modular Division and RSA1 RSA Public Key Encryption To do RSA we need fast Modular Exponentiation and Primality generation which we have shown.
1/22 Quantum Algorithms Deutsch-Josza Algorithm: quantum computers are more powerful than classical ones. b f(b) b f(b) b f(b) 0 1 b f(b) 0.
Ch1 - Algorithms with numbers Basic arithmetic Basic arithmetic Addition Addition Multiplication Multiplication Division Division Modular arithmetic Modular.
Quantum Computing Michael Larson. The Quantum Computer Quantum computers, like all computers, are machines that perform calculations upon data. Quantum.
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 653 Lecture.
Quantum Computing MAS 725 Hartmut Klauck NTU
Capabilities and limitations of quantum computers Michele Mosca 1 November 1999 ECC ’99.
Multipartite Entanglement and its Role in Quantum Algorithms Special Seminar: Ph.D. Lecture by Yishai Shimoni.
Week 4 - Wednesday.  What did we talk about last time?  Finished DES  AES.
Quantum Computation Stephen Jordan. Church-Turing Thesis ● Weak Form: Anything we would regard as “computable” can be computed by a Turing machine. ●
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lectures
Beginner’s Guide to Quantum Computing Graduate Seminar Presentation Oct. 5, 2007.
Shor's Factorization Algorithm Keith Kelley, CS 6800.
Attendance Syllabus Textbook (hardcopy or electronics) Groups s First-time meeting.
Quantum Algorithms Oracles
Public Key Cryptography
Richard Cleve DC 2117 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Lecture.
Probabilistic Algorithms
For computer scientists
Quantum Computing: What’s It Good For?
A Ridiculously Brief Overview
3rd Lecture: QMA & The local Hamiltonian problem (CNT’D)
Appendix 5: Cryptography p
Quantum Computation and Information Chap 1 Intro and Overview: p 28-58
Quantum Computing Joseph Stelmach.
Presentation transcript:

CSEP 590tv: Quantum Computing Dave Bacon Aug 3, 2005 Today’s Menu Public Key Cryptography Shor’s Algorithm Grover’s Algorithm Administrivia Quantum Mysteries: Entanglement

Administrivia Hand in HW #5. Pick up HW solutions. Pick up the Take Home Final! Two weeks to complete. No collaboration. Extra credit problem based on next week’s lecture on entanglement.

Review David Deutsch Richard Jozsa 1992: Deutsch-Jozsa Algorithm Exact classical q. complexity: Bounded error classical q. complexity: Exact quantum q. complexity: 1993: Bernstein-Vazirani Algorithm (non-recursive) Umesh Vazirani Ethan Bernstein Exact classical q. complexity: Bounded error classical q. complexity: Exact quantum q. complexity:

Review n qubits Deutsch-Jozsa Algorithm Bernsetein-Vazirani Algorithm

Review Dan Simon 1994: Simon’s Algorithm Bounded error classical q. complexity: Bounded error quantum q. complexity: (first exponential separation) Given: A function with n bit strings as input and one bit as output Promise: The function is guaranteed to satisfy Problem: Find the n bit string

Review n qubits Simon’s algorithm Multiple runs to find s

Today: Factoring

One Time Pads Alice Bob Random n bit string Alice’s message secret key secret key Eve cannot learn message

Public Key Cryptography Interesting history: 1 st schemes “known in public” where put forth by Diffie and Hellman in 1976 (key exchange) and Rivest, Shamir and Adleman in 1978 (encryption algorithm) (based on work by Merkle in 1974, published 1978) However, it now appears that the British researchers working for British intelligence (GCHQ) were actually the first to discover these protocols, but their work was classified at the time! Clifford Cooks in 1973 (encryption algorithm) Malcolm Williamson in ~1973 (key exchange) (based on work by James Ellis in the late 1960s.)

Computational Complexity P : decision problems which can be solved without error in polynomial time on a deterministic classical Turing machine. Decision problems: problem with a yes/no answer. Polynomial time: worst case bounded by a polynomial in the size of the problem. Examples of problems in P: Perfect matching: does a given graph have a perfect matching? Primes: is a given number a prime number? Linear Equalities: Given an integer n x d matrix A and an integer n x 1 vector b, does there exists a rational d x 1 vector x>0 such that Ax=b?

Computational Complexity NP : decision problems which can be solved without error in a polynomial time on a classical nondeterministic Turing machine. Shorthand, decision problems which, given a solution, you can verify this solution in polynomial time on a deterministic classical Turing machine. Examples of problems in NP: Perfect matching: does a given graph have a perfect matching? Satisfaction: does a given boolean function have a satisfying assignment? Given f(x 1,x 2,…,x n ), does there exist x={0,1} n such that f(x)=1? Minesweeper: Given a partially solved Minesweeper board, does there exist an assignment of mines which can give rise to this board?

One Million Dollars NP P NP=POR NP – Hard: Problems which have the property that for every problem in NP there is a polynomial time reduction to this problem. NP – Complete (NPC): NP – Hard and in NP. NPC P NP=NPC=POR NP

Public Key Cryptography 1. There probably exist computational problems that are HARD. 2. Can we use these to perform secure cryptography by basing the security of the problem on the difficulty of the hard problem? If we make the hard problem big enough, baring a breakthrough in the computational complexity of the problem, or in computer hardware technology, the cryptography will be secure

Public Key Cryptography Roughly Alice Bob Instructions for how to make her lock. Bob’s secret documents This is (very roughly) what happens in public key cryptography Assume: very hard to design key from instructions to make lock

Public Key Encryption RSA Alice Bob 1.Alice generates two random large primes, and 2. Alice chooses a number which is coprime with. 3. Alice computes such that Public Key: Private Key:

Public Key Encryption: RSA Alice Bob Public Key: Private Key: Public Key: Bob’s message: (FLT) (CRT)

Public Key Encryption: RSA Alice Bob Public Key: Private Key: Bob’s message: Bob, using public key can encrypt message. But decrypting without the private key is (thought) to be computationally hard Alice, using private key, can decrypt the message

Public Key Encryption: RSA Alice Bob Public Key: Private Key: Bob’s message: If we could factor, then we could compute from which you could use to find Then we just use the standard decryption: Factoring can be used to break RSA

Factoring NPC P NP Factoring: Is one of the factors less than k? Difficulty? Probably: P NP coNP NPC coNPC coNP: efficiently verifiable that NO solution to problem exists.

Shor’s Algorithm Best classical algorithm takes time Shor’s quantum algorithm takes time Peter Shor 1994

Shor’s Algorithm What were the key insights which Shor used? Simon’s problem work’s because the function has a symmetry: In this case the symmetry is a symmetry Shor became interested in different symmetries and in particular symmetries of “the place where we do addition modulo N”

Period Finding Given: A function from 0,1,…,N-1 to some n bit numbers Promise: The function is guaranteed to satisfy Problem: Find the hidden period period

Shor’s Algorithm What were the key insights which Shor used? 1. Period finding 2. Period finding can be perform efficiently on a quantum computer. 3. Period finding can be used to factor integers

Order-Finding and Factoring Factor N choose x coprime to N (Euclid’s algorithm for gcd) Order finding: find smallest r such that If r is even then compute as factor! divides But Use order finding to factor: suppose is even, must share a common factor not equal to with More tricky: is even happens with high probability

Order-Finding and Period-Finding Order finding: find r such that Find the period of What were the key insights which Shor used? 1. Period finding 2. Period finding can be perform efficiently on a quantum computer. 3. Period finding can be used to factor integers To understand period finding, we need to understand Fourier transforms

Fourier Transforms Function of a single bit: We could equally well deal with Because we can “invert”: “Look” familiar?

Fourier Transforms Output: The Hadmard is performing this transform (up to a constant) on the AMPLITUDES of our wave function!

Fourier Transforms Function on N different inputs: We can the define the following N new numbers to represent the function: Slow down there egghead…. Nth root of unity:

Nth Root Of Unity Unit modulus: Nth root of unity: Re Im

Nth Root Of Unity The big sum: for Unless and then

Nth Root Of Unity The sum of all sums: Re Im

Fourier Transforms Function on N different inputs: We can the define the following N new numbers to represent the function: Now we can see how to go from the hats back to the non hats!

Fourier Transforms It works!....

Fourier Transforms Example:

Fourier Transforms Example: Fourier transformed coefficients:

Unitarity & Fourier Transforms Output: New amplitudes are Fourier transform of old amplitudes!

Quantum Fourier Transform The quantum Fourier transform: See it in action:

Quantum Fourier Transform The quantum Fourier transform: But is it unitary?

Quantum Fourier Transform And about that inverse QFT: It performs the inverse Fourier transform on the amplitudes!

In Class Problem #1

Period Finding quantum oracle Problem: find in as few queries as possible Period Finding Problem ….in as few uses of the quantum oracle as possible a symmetric problem!

Fourier to the Rescue probability

Shor’s Algorithm To Factor N on a quantum computer: Select x coprime to N Use the quantum computer to find the period of Use order of x to compute possible factors of N. Check if they work. If not rerun. Running time? How many quantum gates?

QFT over 2 n This circuit requires O(n 2 ) “elementary” gates QFTs for all other Ns can similarly be implemented.

Fourier to the Rescue O(n 3 ) “elementary” gates modular exponentiation

Shor’s Algorithm To Factor N on a quantum computer: Select x coprime to N Use the quantum computer to find the period of Use order of x to compute possible factors of N. Check if they work. If not rerun. Running time: O(n 3 )

Shor’s Algorithm Best classical algorithm takes time Shor’s quantum algorithm takes time Peter Shor 1994

Grover’s Problem n qubit 1qubit Suppose we have a black box with the property Problem: find with as few queries as possible.

Grover’s Algorithm n qubit Use the black box in a particular way Grover oracle: How to use Grover oracle to find ?

The Grover Iterate n qubits

The Grover Iterate n qubits Grover’s iterate

The Grover Iterate in 2D Two orthonormal vectors: Express the equal superposition in terms of these: The Grover iterate will preserve this two dimensional subspace

The Grover Iterate in 2D Expressed over the two dimensional subspace: Grover’s iterate is just a rotation in this 2D space

Repeatedly Bang Your Head Repeated application of the Grover iterate Grover’s algorithm: 1. start with 2. repeatedly apply Grover’s iterate to rotate to near

Repeatedly Bang Your Head Large amplitude in “bad” part of Hilbert space physicist: implies Application of the repeated iterate to initial state rotates it to nearly all amplitude in

Gover’s Algorithm We have identified marked item using only queries!

Quantum Complexity Theory BPP (Bounded-error Probabilistic Polynomial time): Error probability less than some fixed constant < ½ BQP (Bounded-error Quantum Polynomial time): Error probability less than some fixed constant < ½ P BPP NP BQP PSPACE

Quantum Algorithms What else can quantum computers do? Factoring, discrete log [Shor 94] Unstructured search [Grover 96] Various hidden subgroup problems [Long List] Pell’s equation [Hallgren 02] Hidden shift problems [van Dam, Hallgren, Ip 03] Graph traversal [CCDFGS 03] Spatial search [AA 03, CG 03/04, AKR 04] Element distinctness [Ambainis 03] Various graph problems [DHHM 04, MSS 03,…] Testing matrix multiplication [Buhrman,Špalek 04] hidden subgroup problem [Bacon, Childs, van Dam 05] Certain hidden shift problems [Childs, van Dam 05]

Quantum Algorithms What else might quantum computer be able to do? NPC P NP BQP Not likely: Interesting problems not NPC but possibly in BQP? Graph isomorphism Restricted shortest vector in a lattice problems Finding Nash equilibrium …

Quantum Simulation Perhaps the least well studied and understood. Simulating quantum many body systems is often computationally very difficult Quantum computers allow one to perform these simulation without having to engineer entirely new physical systems. Quantum materials? Understanding High-T Superconductors?