Presentation is loading. Please wait.

Presentation is loading. Please wait.

Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong.

Similar presentations


Presentation on theme: "Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong."— Presentation transcript:

1 Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong

2 Quantum Computing: Confluence of deep ideas Physics Chemistry Computer Science Mathematics Also, Material Science, Engineering,...

3 Quantum Information Processing Research Underway on Many Fronts: u Build quantum computers, quantum sources u Develop quantum information theory, error correction methods u Develop quantum algorithms, comm. protocols (cryptography, teleportation, etc.)

4 Quantum Preliminaries: In the simplest case u A quantum state is a unit vector u in C 2 u A measurement is an orthogonal base {e 1, e 2 }. u = u 1 +u 2 will be measured as u 1 with prob |u 1 | 2 as u 2 with prob |u 2 | 2 u Features: If u is not known, then -- The result of a measurement cannot be predicted. -- A measurement can disturb the system. u In any physical process: -- U has to be a unitary operator (ie, a “rotation”)

5

6 Quantum Preliminaries: More generally u An n-qbit quantum state is a unit vector u in the Hilbert space u A measurement is a family of orthogonal linear subspaces decomposing H u A state will, upon meaurement M, become u i with prob |u i | 2 u Notation: Quantum states u often are written as |x> u Any physical process: where U is unitary

7 Outline of Talk I. What is a quantum computer ? II. Fast quantum algorithms -- Simon’s Problem III. Quantum cryptography -- Key distribution IV. Outlook

8 I. What is a quantum computer ? classical computer Q X=011001 f(x)=110101 Q’s state transition q0q0 q1q1 q T after time T... 2 m possible states each q i specified with m bits Can be implemented with m flip-flops 1 0 0 0 1 1

9 Classical Computer (continued) u Turing, Church (1930’s): formulate the models u von Neumann (1950’s): circuit-based architecture u Example: parity function x = 01110110, p(x) = 1 iff x has even number of 1’s 0 1 1 1 0 1 1 0 moves from left to right, keeping track of current parity. q0q0

10 Quantum computer m spin- 1/2 particles represented by a Hilbert space of dimension 2 m, with a natural base |x>, x in { 0,1 } m x=011001 v1v1... v0v0 vtvt after T steps perform a measurement on v t to get f(x)=1100101 determined by x

11 Quantum Computer (continued) u Benioff (1980) version of quantum Turing machine u Feymann (1985) version of quantum circuits u Deutsch (1985, 89) QTM, circuits, universal QTM u Bernstein, Vazirani (1993) efficient universal QTM for restricted classes u Solovay, Yao (1993) efficient universal QTM, equivalence of QTM & circuits

12 For our purpose: an array of m spin- 1/2 particles are processed left-to-right in each step. control unit with fixed number of bits m

13 Implementation of Quantum Computer: Quantum circuits can be built using Hadamard gates, pi/8-gates, and CNOT.

14 A Typical Quantum Circuit

15 II. Fast Quantum Algorithms - Simon’s Problem A black-box 2 to 1 mapping: there exists a secret with f(x) = f(x+s) Problem: determine s Note: classical algorithms must make an exponential number of queries f(x)=?

16

17 u Each hole x illuminates points (y, f(x)) on the screen with amplitudes u Write For any (y,z), the only amplitude contributions come from and, and is equal to 0 if since u Thus, all bright spots (y,z) satisfy. Finding n such columns y’s is sufficient to determine s

18

19 Hadmard’s Transform u For 1 bit u For n bits

20 Simon’s Algorithm

21 Now, Thus, Make a measurement on v, one sees only those |y>|z> satisfying. Repeat n times to solve for s as in the optical case. to Bob.

22 A very important result: Shor (1994) developed an efficient quantum algorithm for factoring large integers. His method uses an approach similar to Simon’s algorithm.t to Bob.

23 III. Quantum Cryptography -- key distribution Conjugate Coding (S. Wiesner 1970) u Two bases for a 2-state quantum system u A bit b can be stored as |b> p, where p is randomly chosen from {+, x} |1> + |0> + |1> x |0> x

24 Quantum Bank Note Method: An n-bit serial number b 1 b 2 …b n is stored on the bank note by conjugate coding each b i as a quantum object B i. The bank records what bases are used. When cashed, the bank measures B i by using the recorded bases to see if there is any discrepancy. Advantages: u cannot be copied u hard to counterfeit u tampering destroys the bank note But it’s not practical...

25 Key Distribution Problem Alice and Bob want a confidential communication. Is it possible to generate a key K by public discussions ? In the classical case … impossible information-theoretically; but feasible if assuming Eve cannot factor large integers. Alice Bob xy KK Eve

26 Observation : u It suffices to generate K A for Alice, K B for Bob that differ in at most 10% of the bits. It is possible to then use error correcting code to obtain a common K for both.

27 Quantum Key distribution (Bennett &Brassard 84) u Alice makes a random quantum bank note, and sends it to Bob. u Alice reveals all the n bases used on the bank note. u Then Bob can measure the B i using these bases to get the original bits b i.

28 Quantum Key distribution (Bennett &Brassard 84) u Alice makes a random quantum bank note, and sends it to Bob. Bob measures randomly n/2 of the B i ’s, each with a random base; then he checks with Alice for any inconsistency. u Alice reveals all the n bases used on the bank note. u Then Bob can measure the B i using these bases to get the original bits b i.

29 Heuristic Proof of Security: u After the test Alice and Bob have n/2-bit keys K A and K B u If Eve tampered with less than 5% of the original B i ’s, then K A and K B differ in at most 10% of their bits. This then gives a common key K. u If Eve tampered with more than 5% of the original B i ’s, then the test step would have caught it.

30 Remarks: Rigorous proof of security for quantum key distribution is often hard. Some strong results were first given by D. Mayers (1995). Also see Chau & Lo, Preskill & Shor.ee

31 IV. Outlook u Need more instances of fast quantum algorithms -- Graph isomorphism problem ? u Need more applications in quantum cryptography. Coin flipping with bounded bias can be done (Aharonov, Ta-Shma, Vazirani, Yao ‘ 00) -- What else can be accomplished ? u Beginning of a new interdisciplinary science between Physics and Computer Science.


Download ppt "Quantum Algorithms I Andrew Chi-Chih Yao Tsinghua University & Chinese U. of Hong Kong."

Similar presentations


Ads by Google