Presentation is loading. Please wait.

Presentation is loading. Please wait.

NEAR-FUTURE APPLICATIONS of QUANTUM INFORMATION PROCESSING Dr. Tal Mor Department of Computer Science Technion- Israel Institute of Technology.

Similar presentations


Presentation on theme: "NEAR-FUTURE APPLICATIONS of QUANTUM INFORMATION PROCESSING Dr. Tal Mor Department of Computer Science Technion- Israel Institute of Technology."— Presentation transcript:

1 NEAR-FUTURE APPLICATIONS of QUANTUM INFORMATION PROCESSING Dr. Tal Mor Department of Computer Science Technion- Israel Institute of Technology

2 Quantum Information Processing is very promising

3 Do we need to wait 20-30 years for an application?

4 Do we really need to wait 20-30 years for an application? Quantum Cryptography Unconditionally secure quantum key distribution (QKD) Many experimental groups implementing QKD, and obtaining a “secure” key… But is the key truly secure also in practice? Quantum Computation Algorithmic Cooling of Spins Short-term application: improved NMR spectroscopy [Long-term result: scalable NMR Quantum Computers]

5 Quantum Key Distribution ● Non-orthogonal quantum states ● No-cloning of such quantum states ● Information versus disturbance (Peres-Fuchs) →Unconditionally secure “practical” quantum key distribution (in theory) Biham, Boyer, Boykin, Mor and Roychowdhury (STOC’00) Mayers (J.ACM) ; Shor and Preskill (PRL)

6 Practical QKD But is the key truly secure also in practice??? Worldwide interest: various groups running practical QKD, performing amazing experiments Experimental Groups: J. Franson; N. Gisin; R. Hughes; P. Kwiat; E.Polzik; J. Rarity; A. Sergienko; A. Zeilinger… Companies: MAGIQ; BBN technologies; IBM; MITRE; NEC; MITSUBISHI; Idquantique; Qinetiq… Our (Technion) QKD team: Prof. Eli Biham, Prof. Meir Orenstein, Dr. Matty Katz, Mr. Oleg Izmerly

7 Attacks on QKD Far-future Attacks (require Quant. Comp) “Near”-future Attacks Photon Number Splitting (PNS) attacks G. Brassard, N. Lutkenhaus, T. Mor, and B. Sanders, (PRL, 2000) Ffffffffffffffffff Collective attacks C. Bennett, T. Mor, and J. Smolin (PRA, 1996) E. Biham and T. Mor (PRL, 1997) E. Biham, M. Boyer, G. Brassard, J. van-de-Graaf, and T. Mor (Algorithmica, 2002)

8 Attacking QKD protocols (1) Photons are sent from Alice to Bob; The final secret key is created from the transmitted key (the raw data) via error correction and privacy amplification; ● Collective attacks: Eve attaches a quantum probe to each transmitted photon (say, another photon, via a coupler), and measures these ancillary photons together, after learning all classical data, to learn optimal information on the final secret key.

9 Attacking QKD protocols (2) The transmitted data sometimes contains two photons per pulse; ● Photon Number Splitting (PNS) attacks: In PNS attacks, Eve keeps a photon from these two-photon pulses, and blocks most (or even all) single-photon pulses; If channel loss-rate is high, the legitimate users will not even notice… and Eve will get a lot (or even full) information.

10 Worldwide Status of Security Analysis of Practical QKD None of the practical protocols is proven secure. In particular, in November 2003: ● No practical scheme proven secure against Collective Attacks! ● No practical scheme proven secure against Photon Number Splitting Attacks! Are these attacks realistic in the near future?

11 Algorithmic Cooling of Spins Computer Science viewpoint Novel entropy manipulations techniques Nuclear Magnetic Resonance Enhanced Spin Polarization  Rapidly Increased Signal-to-Noise Ratio  Many potential applications Physics viewpoint A novel cooling mechanism

12 Potential Future Applications Enhanced Polarization  Improved Signal-to-Noise ratio Applications: ● Medical applications ● Monitoring brain activity (for instance, a lie detector) ● Identifying explosive materials ● Identifying narcotics ● Checking stability of materials exposed to severe conditions

13 Nuclear Magnetic Resonance Nuclei’s spins in a magnetic field Spin-half nucleus: a quantum bit

14 A Simple Logic Gate 1 C S A molecule with two spins  2-bit computer Manipulations of spins  a gate operating on bits Implementation of a gate: via a set of NMR pulses on a regular NMR machine

15 Magnetic Resonance: Polarization-Bias and Temperature

16 ● Data compression: some spins can be cooled quite a lot (L. Schulman & U. Vazirani) using simple logical gates, while the rest of the spins get hotter ● The cold spins are pushed spatially to the edge of the molecule Polarization Enhancement (Cooling) ● Limited by Shannon’s bound on data compression ● Therefore impractical

17 Algorithmic Cooling 2. In addition to the computer bits, there are reset bits, namely spins that rapidly interact with the environment 3. Hot computer spins are “thermalized” via a SWAP with the reset spins (that can be re-used soon after) 4. The hot computer bits become colder. 5. The entire system is cooled 1. Data compression steps: ● This way Shannon’s bound is bypassed! Environment

18 Thermalization Reset bits “Algorithmic Cooling and Scalable NMR Quantum Computers” P. O. Boykin, T. Mor, V. Roychowdhury, F. Vatan, R. Vrijen (Proceedings of the National Academy of Science, 2002); Algorithmic Cooling is patent pending SWAP Wait Environment

19 We succeeded to cool down 2 Carbons to a low temperature of ~ 150 K 1 C 13 1 C H Before After Cooling by Thermalization G. Brassard, J. Fernandez, R. Laflamme, T. Mor, & Y. Weinstein (on preparation) Future goals: a full algorithmic cooling (with J. Fernandez)! Much lower temperatures!! Conceptual bounds on cooling (with L. Schulman)!!! Our (Technion) research team: Prof. H. Gilboa, Dr. Matty Katz, Dr. Yael Balazs, Mr. Yossi Weinstein TCE molecule

20 1 1 Summary 1. Practical QKD is not yet proven secure 2.Algorithmic Cooling is the first short-term application of quantum computing devices


Download ppt "NEAR-FUTURE APPLICATIONS of QUANTUM INFORMATION PROCESSING Dr. Tal Mor Department of Computer Science Technion- Israel Institute of Technology."

Similar presentations


Ads by Google