Michele Mosca Canada Research Chair in Quantum Computation 27 May 2006 Introduction to quantum technologies: quantum computers, quantum teleporters & cryptography.

Slides:



Advertisements
Similar presentations
How Much Information Is In Entangled Quantum States? Scott Aaronson MIT |
Advertisements

Quantum t-designs: t-wise independence in the quantum world Andris Ambainis, Joseph Emerson IQC, University of Waterloo.
How Much Information Is In A Quantum State? Scott Aaronson MIT |
Quantum Computation and Quantum Information – Lecture 2
Quantum Computation and Quantum Information
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
Quantum Cryptography ( EECS 598 Presentation) by Amit Marathe.
Cove: A Practical Quantum Computer Programming Framework Matt Purkeypile Fall 2008.
Quantum Packet Switching A. Yavuz Oruç Department of Electrical and Computer Engineering University of Maryland, College Park.
Quantum Computing MAS 725 Hartmut Klauck NTU
Umesh V. Vazirani U. C. Berkeley Quantum Algorithms: a survey.
Quantum Computing Osama Awwad Department of Computer Science
Quantum Cryptography Qingqing Yuan. Outline No-Cloning Theorem BB84 Cryptography Protocol Quantum Digital Signature.
Superdense coding. How much classical information in n qubits? Observe that 2 n  1 complex numbers apparently needed to describe an arbitrary n -qubit.
A Brief Introduction to Quantum Computation 1 Melanie Mitchell Portland State University 1 This talk is based on the following paper: E. Rieffel & W. Polak,
An Algebraic Foundation for Quantum Programming Languages Andrew Petersen & Mark Oskin Department of Computer Science The University of Washington.
Quantum information: the new frontier Karl Svozil TU Wien/Theoretical Physics
CSEP 590tv: Quantum Computing
Quantum Cryptography Prafulla Basavaraja CS 265 – Spring 2005.
Quantum Computing Marek Perkowski Part of Computational Intelligence Course 2007.
Quantum Computers Todd A. Brun Communication Sciences Institute USC.
Quantum Computing Lecture 1 Michele Mosca. l Course Outline
Quantum Computation and Quantum Information – Lecture 2 Part 1 of CS406 – Research Directions in Computing Dr. Rajagopal Nagarajan Assistant: Nick Papanikolaou.
EECS 598 Fall ’01 Quantum Cryptography Presentation By George Mathew.
Paraty, Quantum Information School, August 2007 Antonio Acín ICFO-Institut de Ciències Fotòniques (Barcelona) Quantum Cryptography.
Quantum Information Processing
Foundations of Cryptography Lecture 2 Lecturer: Moni Naor.
Quantum Algorithms for Neural Networks Daniel Shumow.
Quantum Error Correction Jian-Wei Pan Lecture Note 9.
Alice and Bob’s Excellent Adventure
Quantum Information, Communication and Computing Jan Kříž Department of physics, University of Hradec Králové Doppler Institute for mathematical physics.
Quantum Computing David Dvorak CIS 492. Quantum Computing Overview What is it? How does it work? –The basics –Clarifying with examples Factoring Quantum.
A Few Simple Applications to Cryptography Louis Salvail BRICS, Aarhus University.
Neural Key Exchange Presented by: Jessica Lowell 10 December 2009 CS 6750.
Cove: A Practical Quantum Computer Programming Framework Matt Purkeypile Doctorate of Computer Science Dissertation Defense June 26, 2009.
Quantum Information Jan Guzowski. Universal Quantum Computers are Only Years Away From David’s Deutsch weblog: „For a long time my standard answer to.
October 1 & 3, Introduction to Quantum Computing Lecture 1 of 2 Introduction to Quantum Computing Lecture 1 of 2
An Introduction to Quantum Phenomena and their Effect on Computing Peter Shoemaker MSCS Candidate March 7 th, 2003.
Quantum Factoring Michele Mosca The Fifth Canadian Summer School on Quantum Information August 3, 2005.
Cryptography and Network Security (CS435) Part Eight (Key Management)
Cryptography and Network Security Chapter 10 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Device-independent security in quantum key distribution Lluis Masanes ICFO-The Institute of Photonic Sciences arXiv:
Michele Mosca Canada Research Chair in Quantum Computation 28 October 2004 Quantum Computation and the Future 13th CACR Information Security Workshop &
You Did Not Just Read This or did you?. Quantum Computing Dave Bacon Department of Computer Science & Engineering University of Washington Lecture 3:
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Quantum Computing Paola Cappellaro
Introduction to Quantum Key Distribution
CS555Topic 251 Cryptography CS 555 Topic 25: Quantum Crpytography.
Quantum Cryptography Slides based in part on “A talk on quantum cryptography or how Alice outwits Eve,” by Samuel Lomonaco Jr. and “Quantum Computing”
Nawaf M Albadia
Quantum computing, teleportation, cryptography Computing Teleportation Cryptography.
Quantum Computing and Quantum Programming Language
Introduction to Quantum Computing
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Capabilities and limitations of quantum computers Michele Mosca 1 November 1999 ECC ’99.
Page 1 COMPSCI 290.2: Computer Security “Quantum Cryptography” including Quantum Communication Quantum Computing.
Quantum Cryptography Antonio Acín
IPQI-2010-Anu Venugopalan 1 qubits, quantum registers and gates Anu Venugopalan Guru Gobind Singh Indraprastha Univeristy Delhi _______________________________________________.
Quantum Cryptography Christian Schaffner Research Center for Quantum Software Institute for Logic, Language and Computation (ILLC) University of Amsterdam.
Quantum Cryptography and Quantum Computing. Cryptography is about a)manipulating information b)transmitting information c)storing information.
An Introduction to Quantum Computation Sandy Irani Department of Computer Science University of California, Irvine.
Quantum Computation Stephen Jordan. Church-Turing Thesis ● Weak Form: Anything we would regard as “computable” can be computed by a Turing machine. ●
1 Introduction to Quantum Information Processing CS 467 / CS 667 Phys 467 / Phys 767 C&O 481 / C&O 681 Richard Cleve DC 3524 Course.
COMPSCI 290.2: Computer Security
Introduction to Quantum Computing Lecture 1 of 2
A Ridiculously Brief Overview
OSU Quantum Information Seminar
Quantum Computing and the Quest for Quantum Computational Supremacy
Quantum Computation and Information Chap 1 Intro and Overview: p 28-58
Quantum computation with classical bits
Presentation transcript:

Michele Mosca Canada Research Chair in Quantum Computation 27 May 2006 Introduction to quantum technologies: quantum computers, quantum teleporters & cryptography OAPT

Physics and Computation Information is stored in a physical medium, and manipulated by physical processes. The laws of physics dictate the capabilities of any information processing device. Designs of “classical” computers are implicitly based in the classical framework for physics Classical physics is known to be wrong or incomplete… and has been replaced by a more powerful framework: quantum mechanics.

Computer technology is making devices smaller and smaller… …reaching a point where classical physics is no longer a suitable model for the laws of physics.

The design of devices on such a small scale will require engineers to control quantum mechanical effects. Allowing computers to take advantage of quantum mechanical behaviour allows us to do more than cram increasingly many microscopic components onto a silicon chip… … it gives us a whole new framework in which information can be processed in fundamentally new ways.

…consider a setup involving a photon source, a half-silvered mirror (beamsplitter), and a pair of photon detectors. photon source beamsplitter detectors A simple experiment in optics

50% Simplest explanation: beam-splitter acts as a classical coin-flip, randomly sending each photon one way or the other. Now consider what happens when we fire a single photon into the device…

… consider a modification of the experiment… 100% The simplest explanation is wrong! The simplest explanation for the modified setup would still predict a distribution… full mirror The “weirdness” of quantum mechanics…

Classical probabilities… Consider a computation tree for a simple two-step (classical) probabilistic algorithm, which makes a coin-flip at each step, and whose output is 0 or 1: The probability of the computation following a given path is obtained by multiplying the probabilities along all branches of that path… in the example the probability the computation follows the red path is The probability of the computation giving the answer 0 is obtained by adding the probabilities of all paths resulting in 0:

…vs quantum probabilities … In quantum physics, we have probability amplitudes, which can have complex phase factors associated with them. The probability amplitude associated with a path in the computation tree is obtained by multiplying the probability amplitudes on that path. In the example, the red path has amplitude 1/2, and the green path has amplitude –1/2. |0  |1  |0  |1  The probability amplitude for getting the answer |1  is obtained by adding the probability amplitudes… notice that the phase factors can lead to cancellations! The probability of obtaining |1  is obtained by squaring the total probability amplitude. In the example the probability of getting |1  is

Beamsplitter described by quantum probability rules…

… consider a modification of the experiment… The simplest explanation for the modified setup would still predict a distribution… full mirror Explanation of experiment 100%

Another physical example

A new mathematical framework The discovery of quantum mechanics was a revolution in our fundamental understanding of Nature. (analogy)

Quantum mechanics and information Any physical medium capable of representing 0 and 1 is in principle capable of storing any linear combination What does really mean?? It’s a “mystery”. THE mystery. We don’t understand it, but we can tell you how it works. (Feynman)

In a nutshell… A system that can exist in 2 or more distinguishable states can exist in all those states at the same time.

Over the last century, scientists had moved from observing quantum phenomena to controlling them. (Chemical & Engineering News, 2000 )

Why is controlling quantum systems interesting? Storing and manipulating information according to the laws of quantum theory, allows us to perform tasks previously thought to be impossible or infeasible. (contradicting the classical Church-Turing thesis)

Quantum parallelism (cannot be feasibly simulated on a classical computer)

A quantum circuit provides an visual representation of a quantum algorithm. time quantum gates initial state measurement

Quantum Parallelism Since quantum states can exist in exponential superposition, a computation of a function being performed on quantum states can process an exponential number of possible inputs in a single evaluation of f : By exploiting a phenomenon known as quantum interference, some global properties of f can be deduced from the output. f

Applications Simulating quantum mechanical systems Factoring and Discrete Logs Hidden subgroup problems Amplitude amplification and more…

Quantum Algorithms a,b  G, a k = b, find k Integer Factorization (basis of RSA cryptography): Discrete logarithms (basis of DH crypto, including ECC): Given N=pq, find p and q.

Computational Complexity Comparison ClassicalQuantum Factoring Elliptic Curve Discrete Logarithms (in terms of number of group multiplications, for n-bit inputs)

Amplitude Amplification Find x satisfying f(x)=1. Suppose algorithm A succeeds with probability p. With classical methods, we expect to repeat A a total of time before finding a solution, since each application of A “boosts” the probability of finding a solution by roughly Consider any function f : X  {0,1}.

Amplitude Amplification A quantum mechanical implementation of A succeeds with probability amplitude. With quantum methods, each application of A “boosts” the probability amplitude of finding a solution by roughly i.e. we get a square-root speedup!

A fundamental property of quantum mechanics: entanglement

Mathematically… If we combine two qubits and We describe the joint system as

If the two qubits interact, their joint state can evolve into a superposition that cannot be factorized into two independent one-qubit states e.g. “EPR pair” or “Bell pair”

A simple application of entanglement: quantum teleportation

Mathematically… A simple computation will verify that So what??

with probability 25%

Original conception

Actual implementations

Quantum Cryptography

Quantum Information Security Quantum mechanics provides intrinsic eavesdropper detection. e.g. no-cloning theorem: there is no transformation that will copy an unknown quantum state, i.e. is not possible.

Quantum Information Security More generally, any procedure that extracts information about an unknown quantum state, MUST disturb the state (on average) There is a fundamental quantifiable tradeoff between information extraction and disturbance.

Quantum Key Distribution (general idea) quantum bits Alice and Bob measure their qubits Authenticated public channel

Quantum Key Distribution (general idea) Authenticated public channel Alice and Bob publicly discuss the information they measured to assess how much information Eve could have obtained. If Eve’s information is very likely to be below a certain constant threshold, they can communicate further and distill out a very private shared key (“privacy amplification”). Otherwise they abandon the key.

Quantum Key Distribution Implementations around the world

Quantum Information Security We must continually reassess the security of our existing information security infrastructure in light of the capabilities of quantum computers. We can exploit the eavesdropper detection that is intrinsic to quantum systems in order to derive new “unconditionally secure” information security protocols. The security depends only on the laws of physics, and not on computational assumptions.

What technologies will be implemented and when? Quantum random number generators: now. Quantum key distribution: <10 years; some prototypes already available Small scale quantum computers (e.g. needed for long distance quantum communication): medium term Large scale quantum computers: medium -long term Precise times are hard to predict since we are in the early stages and still trying a very broad range of approaches. Once we focus on technologies that show problem, expect progress to be very fast.

Wireless Sensor Networks Injectable Tissue Engineering Nano Solar Cells Mechatronics Grid Computing Molecular Imaging Nanoimprint Lithography Software Assurance Glycomics Quantum Cryptography

Conclusions l Quantum mechanics is for real l Quantum mechanics redefines information and information processing l Large scale quantum information processors seems possible, though technologically very challenging to realize l Serious prototypes for quantum communication and cryptography already exist l Some of the basics accessible to HS students