Lecture note 8: Quantum Algorithms

Slides:



Advertisements
Similar presentations
University of Strathclyde
Advertisements

Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
Primality Testing Patrick Lee 12 July 2003 (updated on 13 July 2003)
Notation Intro. Number Theory Online Cryptography Course Dan Boneh
Great Theoretical Ideas in Computer Science.
Quantum Speedups DoRon Motter August 14, Introduction Two main approaches are known which produce fast Quantum Algorithms The first, and main approach.
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Spring, 2009 Tuesday, 28 April Number-Theoretic Algorithms Chapter 31.
Department of Computer Science & Engineering University of Washington
UMass Lowell Computer Science Analysis of Algorithms Prof. Karen Daniels Fall, 2002 Tuesday, 26 November Number-Theoretic Algorithms Chapter 31.
Shor Algorithm (continued) Anuj Dawar Use of number theory and reductions.
Factoring 1 Factoring Factoring 2 Factoring  Security of RSA algorithm depends on (presumed) difficulty of factoring o Given N = pq, find p or q and.
1 Quantum Computing: What’s It Good For? Scott Aaronson Computer Science Department, UC Berkeley January 10,  John.
Quantum Computation and Error Correction Ali Soleimani.
Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.
Matthew Guidry. The Fundamentals of Cryptography  One of the fundamentals of cryptography is that keys selected for various protocols that are computationally.
Quantum Computing Joseph Stelmach.
Theory I Algorithm Design and Analysis (9 – Randomized algorithms) Prof. Dr. Th. Ottmann.
Quantum Algorithms II Andrew C. Yao Tsinghua University & Chinese U. of Hong Kong.
Shor’s Algorithm Osama Awwad Department of Computer Science Western Michigan University July 12, 2015.
Tallinn University of Technology Quantum computer impact on public key cryptography Roman Stepanenko.

1 Network Security Lecture 6 Public Key Algorithms Waleed Ejaz
Quantum Algorithms for Neural Networks Daniel Shumow.
1 Introduction to Quantum Information Processing QIC 710 / CS 678 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 / QNC 3129 Lectures.
October 1 & 3, Introduction to Quantum Computing Lecture 2 of 2 Richard Cleve David R. Cheriton School of Computer Science Institute for Quantum.
Cove: A Practical Quantum Computer Programming Framework Matt Purkeypile Doctorate of Computer Science Dissertation Defense June 26, 2009.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
Small-Depth Quantum Circuits Frederic Green Department of Math/CS Clark University Worcester, MA.
Algorithms Artur Ekert. Our golden sequence H H Circuit complexity n QUBITS B A A B B B B A # of gates (n) = size of the circuit (n) # of parallel units.
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
The Road to Quantum Computing: Boson Sampling Nate Kinsey ECE 695 Quantum Photonics Spring 2014.
Introduction to Algorithms Second Edition by Cormen, Leiserson, Rivest & Stein Chapter 31.
Quantum Computing MAS 725 Hartmut Klauck NTU
Short course on quantum computing Andris Ambainis University of Latvia.
Quantum Factoring Michele Mosca The Fifth Canadian Summer School on Quantum Information August 3, 2005.
RSA Prepared by: SITI ZAINAH ADNAN
Shor’s Algorithm -basic introduction –. The main goal for Shor’s Alg. Find the factors of a certain integer – Why?... Long story short: prime factors,
1 Database Searching in Quantum and Natural Computing Michael Heather & Nick Rossiter, Northumbria University, England
Quantum signal processing Aram Harrow UW Computer Science & Engineering
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
CSE 311: Foundations of Computing Fall 2014 Lecture 12: Primes, GCD.
Quantum Computing and Quantum Programming Language
Cove: A Practical Quantum Computer Programming Framework Matt Purkeypile (DCS3) Winter 2009.
1/22 Quantum Algorithms Deutsch-Josza Algorithm: quantum computers are more powerful than classical ones. b f(b) b f(b) b f(b) 0 1 b f(b) 0.
Quantum Computing Michael Larson. The Quantum Computer Quantum computers, like all computers, are machines that perform calculations upon data. Quantum.
Quantum Computing & Algorithms
Quantum Computing MAS 725 Hartmut Klauck NTU
Multipartite Entanglement and its Role in Quantum Algorithms Special Seminar: Ph.D. Lecture by Yishai Shimoni.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Computation Stephen Jordan. Church-Turing Thesis ● Weak Form: Anything we would regard as “computable” can be computed by a Turing machine. ●
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 667 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 2117 Lecture.
Beginner’s Guide to Quantum Computing Graduate Seminar Presentation Oct. 5, 2007.
Shor's Factorization Algorithm Keith Kelley, CS 6800.
Quantum Computing Keith Kelley CS 6800, Theory of Computation.
Quantum Bits (qubit) 1 qubit probabilistically represents 2 states
Public Key Encryption Major topics The RSA scheme was devised in 1978
COMPSCI 290.2: Computer Security
A low cost quantum factoring algorithm
Quantum Cryptography Quantum Computing
Four approaches to Shor
A Ridiculously Brief Overview
Tuesday, 27 April Number-Theoretic Algorithms Chapter 31
Qubit Recycling in Quantum Computation
OSU Quantum Information Seminar
Quantum Computation and Information Chap 1 Intro and Overview: p 28-58
Quantum Computing Joseph Stelmach.
Quantum Cryptography Quantum Computing
Presentation transcript:

Lecture note 8: Quantum Algorithms Jian-Wei Pan

Outline Quantum Parallelism Shor’s quantum factoring algorithm Grover’s quantum search algorithm

Quantum Algorithm - Fundamental feature of many quantum algorithms Quantum Parallelism - Fundamental feature of many quantum algorithms - it allows a quantum computer to evaluate a function f(x) for many different values of x simultaneously. - This is what makes famous quantum algorithms, such as Shor’s algorithm for factoring, or Grover’s algorithm for searching.

RSA encryption and factoring RSA is named after Riverst, Shamir and Adleman, who came up with the scheme m1×m2 = N, (with m1 and m2 primes) Based on the ease with which N can be calculated from m1 and m2. And the difficulty of calculating m1 and m2 from N. N is made public available and is used to encrypt data. m1 and m2 are the secret keys which enable one to decrypt the data. To crack a code, a code breaker needs to factor N.

RSA encryption and factoring Problem: given a number, what are its prime factors ? e.g. a 129-digit odd number which is the product of two large primes, 114381625757888867669235779976146612010218296721242362562561842935706935245733897830597123 63958705058989075147599290026879543541 =3490529510847650949147849619903898133417764638493387843990820577 x 32769132993266709549961988190834461413177642967992942539798288533 Best factoring algorithm requires sources that grow exponentially in the size of the number - , with n the length of N Difficulty of factoring is the basis of security for the RSA encryption scheme used.

Shor’s algorithm Algorithms for quantum computation: discrete logarithms and factoring Foundations of Computer Science, 1994 Proceedings., 35th Annual Symposium on Publication Date: 20-22 Nov 1994. On pages: 124-134 Shor, P.W. AT&T Bell Labs., Murray Hill, NJ;

Shor’s algorithm - steps - 150,000 years Shor’s code-breaking Quantum Algorithm -How fast can you factor a number? - Quantum computer advantage E.g. factor a 300-digit number Classical THz computer - steps - 150,000 years Quantum THz computer - steps - 1 second Code-breaking can be done in minutes, not in millennia Public key encryption, based on factoring, will be vulnerable!!!

How to factor an odd number – a little number theory Modular Arithmetic simply means where k is an integer. Consider - where x and N are co-primes, i.e. greatest common divisor gcd(a,N)=1. No factors in common. It will be demonstrated in the following that finding r is equivalent to factoring N

A little number theory Consider the equations then we have

A little number theory We acquire a trivial solution and the desired solution Note that gcd can be calculated efficiently. If we can find r, and r is even Then provided we don’t get trivial solutions. If r is an odd number, change x, try again.

A little number theory Finding r is equivalent to factoring N - It takes operations to find r using classical computer. (n the digits of N) An important result from number theory, is a periodic function. E.g. N=15, x=7. period r= 4 Factoring reduces to period finding. r 1 2 3 4 7 13

Shor algorithm Using quantum computer to find the period r. The algorithm is dependent on Modular Arithmetic Quantum Parallelism Quantum Fourier Transform Illustration To factor an odd integer, N=15 Choose a random integer x satisfying gcd(x,N)=1, x=7 in our case.

Shor’s algorithm Create two quantum registers, - input registers: contain enough qubits to represent r , ( 8 qubits up to 255) - output registers: contain enough qubits to represent (we need 4 qubits ) Load the input registers an equally weighted superposition state of all integers (0-255) . The output registers are zero.

Shor’s algorithm a – input register, 0- output register Apply a controlled unitary transformation to the input register , storing the results in the output registers. From quantum Parallelism, this unitary transformation can be implemented on all the states simultaneously.

Shor’s algorithm The unitary transformation U consists of a series of elementary quantum gates, single-, two-qubit... The sequence of these quantum gates that are applied to the quantum input depends on the classical variables x and N complicatedly. We need a classical computer processes the classical variables and produces an output that is a program for the quantum computer, i.e. the number and sequence of elementary quantum operations. This can be performed efficiently on a classical computer. (see details, PRA, 54, 1034, (1996);

Shor’s algorithm Assume we applied U on the quantum registers. in 1 2 3 4 5 6 7 8 9 10 11 12 … out 13 Now we measure the output registers, this will collapse the superposition state to one of the outputs |1>,|7>|4>,|13>, for example |1>.

Shor’s algorithm Measure the output register will collapse the input register into an equal superposition state. which is a periodic function of period r=4. We now apply a quantum Fourier transform on the collapsed input register to increase the probability of some states.

Shor’s algorithm Here f(k) can be easily calculated For simplicity, we have assumed M/r is an integer

Shor’s algorithm The QFT essentially peaks the probability amplitudes at integer multiples of M/r. When we measure the input registers, we randomly get c=jM/r, with . If gcd(j,r)=1, we can determine r by canceling to an irreducible fraction. From number theory, the probability that a number chosen randomly from 1…r is coprime to r is greater than 1/logr. Thus we repeat the computation O(logr)<O(logN) times , we will find the period r with probability close to 1. This gives an efficient determination of r. (see more details in Rev. Mod. Phys., 68, 733 (1996)

Shor’s algorithm In our case, c=0, 64, 128,192, M=256; then c/M=0, ¼, ½, ¾. We can obtain the correct period r=4 from ¼ and ¾ and incorrect period r=2 from ½ . The results can be easily checked from Now that we have the period r=4, the factors of N=15 can be determined. This computation will be done on a classical computer.

Shor’s algorithm Generate random x{1, …, N-1}; Check if gcd(x, N)=1; r = period(x); (The period can be evaluated in polynomial time on a quantum computer.) - Prime factors are calculated by classical computer

Shor’s algorithm N=15=5×3, the simplest meaningful instance of Shor’s algorithm Input register 3 qubits output register 4 qubits (Nature 414, 883, 2001)

Grover’s algorithm Classical search - sequentially try all N possibilities - average search takes N/2 steps Quantum search - simultaneously try all possibilities - refining process reveals answer - average search takes steps How quickly can you find a needle in a haystack

Grover’s search algorithm L.K. Grover, Phys. Rev. Lett., 79,325, (1997)

Grover’s search algorithm Problem : given a Quantum oracle, try to find one specific state , satisfying R is a N×N diagonal matrix, satisfying Rii=-1, if i=x; Rii =1, other diagonal elements. To find x is equivalent to find which diagonal element of R is -1, i.e. x . Classically, we have to go through every diagonal element. We expect to find the -1 term after N/2 queries to all the diagonal elements.

Grover’s algorithm Take a m-qubit register, assume Prepare the registers in an equal superposition state of all the states. Iterations of Rotate Phase and Diffusion operator Measure the register to get the specific state

Grover’s algorithm e.g. In fact, R is a phase rotate operator 1 2 3 4 1 2 3 4 5 1 2 3 4 5

Grover’s algorithm Diffusion operator The successive operation of Rotate phase and Diffusion operator will increase the probability amplitude of the desired state. 1 2 3 4

Grover’s algorithm Initial state After n iteration, we have Considering

Grover’s algorithm Finally, we get The probability to collapse into the x We choose iteration steps the probability of failure

Grover’s algorithm Can we do better than a quadratic speed up for Quantum Searches. No! Grover algorithm is optimal. Any quantum algorithm, with respect to an Oracle, can not do better that Quadratic time. Good and Bad Good: Grover’s is Optimal Bad: No logarithmic time algorithm :Limits of “Black-Box” quantum computing

Grover’s algorithm Experiment realization - Nuclear magnetic resonance I. L .Chuang et. al. PRL, 80, 3408 (1998). - Linear optics P.G. Kwait et. al. J. Mod. Opt. 47, 257 (2000). - individual atom J. Ahn et. al. Science, 287, 463 (2000). - trapped ion M. Feng, PRA, 63, 052308 (2001).