RSA public-key system

43  Download (0)

Full text

(1)

An introduction to quantum cryptography, computation and error correction.

Colloquium of the Physics Department, ENS-Paris October 23, 2018

Pierre Rouchon

Centre Automatique et Systèmes, Mines ParisTech, PSL Research University Quantic Research Team (ENS, Inria, Mines)

1 / 43

(2)

Outline

Quantum cryptography and computation RSA public-key system

Quantum mechanics from scratch BB84 quantum key distribution protocol

Shor’s factorization algorithm based on quantum Fourier transform Quantum error correction (QEC)

Classical error correction QEC in discrete-time

Continuous-time QEC and measurement-based feedback Autonomous QEC and coherent feedback

Appendix: two key quantum systems Qubit (half-spin)

Harmonic oscillator (spring)

2 / 43

(3)

Outline

Quantum cryptography and computation RSA public-key system

Quantum mechanics from scratch BB84 quantum key distribution protocol

Shor’s factorization algorithm based on quantum Fourier transform

Quantum error correction (QEC) Classical error correction QEC in discrete-time

Continuous-time QEC and measurement-based feedback Autonomous QEC and coherent feedback

Appendix: two key quantum systems Qubit (half-spin)

Harmonic oscillator (spring)

3 / 43

(4)

RSA public-key system

•Invented by Rivest, Shamir and Adleman in 1977, this protocole relies on the factorization difficulty of RSA integern=pq withpandqlarge prime numbers (typically log2(n)∼2048).

•3-step protocol based on thepublic key(n,e),witheinvertible modulo (p−1)(q−1)and thesecrete keyd, inverse ofemodulo(p−1)(q−1):

1. Encryption ofM by Alice: M7→A=Me mod (n)(efficient exponentiation by squaring ≤log2(e)multiplications mod(n)) 2. Alice sendsAto Bob on a public classical communication channel

(possibly spied by the bad Oscar)

3. Decryption ofAby Bob: M =Adwhered is known only by Bob1

1Euler-Fermat theorem combined with Chinese-remainder theorem ensures that for arbitrary integersM andk,Mkϕ(n)+1=M mod(n)where

ϕ(n) =ϕ(pq) = (p−1)(q−1)is the Euler’s totient function (useed=1+rϕ(n)for some integerr).

4 / 43

(5)

RSA problem and integer factorization

I To recoverM from knowingA,e andn, the bad Oscar has to solve A=Me mod(n). Specialists conjecture that there do-not existC andk >0 and an algorithm starting with input(n,e,A)providing M with less thatC lognk

evaluations of universal classical gates AND,XORandNOT(RSA problem conjectured outside

complexity classP).

I If one has access to the factorizationpq=n, one recovers the secret keyd as the inverse ofemodulo (p−1)(q−1)(Euclidean polynomial algorithm providing the greatest common divisor).

I Factorization, which is in the complexity classNP, is guessed to be outside complexity class P: conjectureP$NP.

Issues around quantum cryptography and computation:

1. unconditionally secure key distribution: BB84 quantum protocol (commercially available, see https://www.idquantique.com/).

2. factorization in " polynomial time"via Shor algorithm (success probabilityO(1)withO

(logn)3

operations)

(quantum computer with 3 log2n+c logical qubits, far from being available yet for 2048-bit RSA numbersn).

5 / 43

(6)

Outline

Quantum cryptography and computation RSA public-key system

Quantum mechanics from scratch BB84 quantum key distribution protocol

Shor’s factorization algorithm based on quantum Fourier transform

Quantum error correction (QEC) Classical error correction QEC in discrete-time

Continuous-time QEC and measurement-based feedback Autonomous QEC and coherent feedback

Appendix: two key quantum systems Qubit (half-spin)

Harmonic oscillator (spring)

6 / 43

(7)

The LKB Photon box

The first experimental realization of a quantum-state feedback:

microwave photons (10 GHz)

Theory: I. Dotsenko,. . . : Quantum feedback by discrete quantum non-demolition measurements: towards on-demand generation of photon-number states. Physical Review A,2009, 80: 013805-013813.

Experiment: C. Sayrin, . . . ,S. Haroche:

Real-time quantum feedback prepares and stabilizes photon number states. Nature,2011, 477, 73-77.

7 / 43

(8)

Three quantum features emphasized by the LKB photon box

2 1. Schrödinger: wave funct. |ψi ∈ H,

d

dt|ψi=−~iH|ψi, H=H0+uH1,

2. Origin of dissipation: collapse of the wave packetinduced by the measurement of observableO with spectral decomp. P

µλµPµ:

I measurement outcomeµwith proba. Pµ=hψ|Pµ|ψi depending on|ψi, just before the measurement

I measurement back-action if outcomeµ=y:

|ψi 7→ |ψi+= Py|ψi phψ|Py|ψi

3. Tensor product for the description of composite systems (S,M):

I Hilbert spaceH=HS⊗ HM

I HamiltonianH=HS⊗IM+Hint+IS⊗HM I observable on sub-systemM only: O=IS⊗OM.

2S. Haroche and J.M. Raimond. Exploring the Quantum: Atoms, Cavities and Photons.Oxford Graduate Texts, 2006.

8 / 43

(9)

Composite system

(S,M): harmonic oscillator⊗

qubit.

I SystemS corresponds to a quantized harmonic oscillator:

HS = (

X

n=0

ψn |ni

n)n=0∈l2(C) )

, where |niis the photon-number state withnphotons (hn1|n2i=δn1,n2).

I MeterM is a qubit, a 2-level system:

HM =

ψg |gi+ψe|ei

ψg, ψe ∈C

, where |gi(resp. |ei) is the ground (resp. excited) state (hg|gi=he|ei=1 andhg|ei=0)

I State of the composite system |Ψi∈ HS⊗ HM:

|Ψi=X

n≥0

Ψng |ni ⊗ |gi+ Ψne |ni ⊗ |ei

=

 X

n≥0

Ψng |ni

⊗ |gi+

 X

n≥0

Ψne |ni

⊗ |ei, Ψneng ∈C. Ortho-normal basis: |ni ⊗ |gi,|ni ⊗ |ei

n∈N. 9 / 43

(10)

Quantum trajectories (1)

C

B

D R

1

R

2

B R

2

I When atom comes outB, the quantum state |ΨiB of the composite system is separable: |ΨiB =|ψi ⊗ |gi.

I Just before the measurement in D, the state is in generalentangled (not separable):

|ΨiR

2 =USM |ψi ⊗ |gi

= Mg|ψi

⊗ |gi+ Me|ψi

⊗ |ei where USM =UR2UCUR1 is a unitary transformation (Schrödinger propagator) defining the measurement operatorsMg andMe on HS. SinceUSM is unitary, MgMg+MeMe =I.

10 / 43

(11)

Quantum trajectories (2)

Just beforedetectorD the quantum state isentangled:

|ΨiR

2= (Mg|ψi)⊗ |gi+ (Me|ψi)⊗ |ei Just afteroutcomey, the state becomesseparable3:

|ΨiD=

My rD

ψ|MyMyE|ψi

⊗ |yi.

Outcomey obtained with probabilityPy =

ψ|MyMy|ψ ..

Quantum trajectories(Markov chain, stochastic dynamics):

k+1i=





Mg rD

ψk|MgMgkEki, yk=g with probability

ψk|MgMgk

;

Me rD

ψk|MeMekEki, yk=ewith probability

ψk|MeMek

;

with state|ψkiand measurement outcomeyk∈ {g,e}at time-stepk:

3Measurement operatorO=IS⊗(|ei he| − |gi hg|).

11 / 43

(12)

Quantum Non Demolition (QND) measurement of photons

4

|ΨiR2 =UR2UCUR1 |ψi ⊗ |gi

C

B

D R1

R2

B R2

UR1=IS|gi+|ei

2

hg|+−|gi+|ei

2

he| UC =e−i

φ0

2N

⊗ |gi hg|+ei

φ0

2N

⊗ |ei he| UR2=UR1

UR1 |ψi ⊗ |gi

= 12(|ψi ⊗ |gi+|ψi ⊗ |ei) UCUR1 |ψi ⊗ |gi

= 1

2

e−iφ20N|ψi

⊗ |gi+

eiφ20N|ψi

⊗ |ei

|ΨiR2=12

e−i

φ0 2 N

|ψi

⊗(|gi+|ei) +

ei

φ0 2N

|ψi

⊗(− |gi+|ei)

=

−isin(φ20N)|ψi

⊗ |gi+

cos(φ20N)|ψi

⊗ |ei

ThusMg=−isin(φ20N)andMe =cos(φ20N).

Quantum Monte-Carlo simulations with MATLAB: QNDphoton.m

4M. Brune, . . . : Manipulation of photons in a cavity by dispersive atom-field coupling: quantum non-demolition measurements and generation of "Schrödinger cat"

states . Physical Review A, 45:5193-5214, 1992.

12 / 43

(13)

Outline

Quantum cryptography and computation RSA public-key system

Quantum mechanics from scratch BB84 quantum key distribution protocol

Shor’s factorization algorithm based on quantum Fourier transform

Quantum error correction (QEC) Classical error correction QEC in discrete-time

Continuous-time QEC and measurement-based feedback Autonomous QEC and coherent feedback

Appendix: two key quantum systems Qubit (half-spin)

Harmonic oscillator (spring)

13 / 43

(14)

An idea due to Bennet and Brassard in 1984 (BB84)

GAP Optique 17

Geneva University

Alice's Bit Sequence

0 1 0 - 0 1 1 1 1 - 1 0 - 1 - - 0 1 - - 1 - 1 0 Bob's Bases

Bob's Results Key Alice

Bob

Polarizers Horizontal - Vertical Diagonal (-45 , +45 )° °

H/V Basis

45 Basis°

BB84 protocol

14 / 43

(15)

BB84

A first quantum sequence via a quantum communication channel:

1. Alice sends to Bob a large numberNof linearly polarized photons (i.e. qubits

|ψi=a0|0i+a1|1i) along 4 possible directions:

I horizontal (|0i) or vertical (|1i).

I +π/4 (|0i+|1i

2 ) or−π/4 (|0i−|1i

2 ).

2. For each photon received from Alice, Bob chooses a measurement

I H/V:Z=|0i h0| − |1i h1|

I ±π/4:X =|1i h0|+|0i h1|=|0i+|1i

2

h0|+h1| 2

|0i−|1i

2

h0|−h1| 2

A second classical sequence via a public communication channel:

1. For each photon, Alice and Bob exchange the type of chosen polarizationZ or X (but not its value).

2. For 50% of the photons sharing the same polarization (aroundN/4), Alice and Bob exchange their values (H/V or±π/4).

3. For 50% of the photons with same polarization (aroundN/4), Alice and Bob keep secret their values

If the exchanged values (H/V or±π/4) coincide, Alice and Bob are convinced that the quantum communication was not spied by the bad Oscar. The remaining values (around N/4 and kept secret) will then form a coding key exploited by Alice and Bob in a classical cryptographic protocol.

Security: Oscar cannot clone the photon emitted by Alice.

15 / 43

(16)

Impossibility of quantum cloning (Wootters and Zurek 1982)

Assume that exists a quantum machine copying the original qubit onto a second clone qubit. The initial wave function of the composite system (original qubit, clone qubit, quantum machine) reads

|Ξit=0=|ψi ⊗ |bi ⊗ |fbi.

where|ψi ∈C2 is the original state,|bithe initial state of the clone (b for blank) and|fbithe initial state of the cloning machine.

The cloning process is associated to a unitary transformationUT independent of|Ξit=0 and satisfying

∀ |ψi, |ψi ⊗ |ψi ⊗ f|ψi

=UT |ψi ⊗ |bi ⊗ |fbi . In particular

|0i ⊗ |0i ⊗ f|0i

=UT(|0i ⊗ |bi ⊗ |fbi) |0i+|1i

2

|0i+|1i

2

f|0i+|1i 2

=UT

|0i+|1i

2

⊗ |bi ⊗ |fbi

Impossible with|Ξi=|0i ⊗ |bi ⊗ |fbiand|Λi=|0i+|1i

2

⊗ |bi ⊗ |fbi

1 2 =

hΞ|Λi

> 12

hΞ|UTUT|Λi sinceUT preserves Hermitian product:

16 / 43

(17)

Outline

Quantum cryptography and computation RSA public-key system

Quantum mechanics from scratch BB84 quantum key distribution protocol

Shor’s factorization algorithm based on quantum Fourier transform Quantum error correction (QEC)

Classical error correction QEC in discrete-time

Continuous-time QEC and measurement-based feedback Autonomous QEC and coherent feedback

Appendix: two key quantum systems Qubit (half-spin)

Harmonic oscillator (spring)

17 / 43

(18)

Factoring algorithm and its reduction to order finding (Shor 1994)

•Input: composite odd numbern.

•Output: a non trivial factoraofnin O (logn)2(log logn)(log log logn)

universal classical/quantum operations.

•Algorithm:

1. Check whethern=ab witha,b>1 (polynomial classical algorithm); possible return ofa and stop.

2. Otherwise,choose randomlyx∈ {2, . . . ,n−1}. If a=gcd(x,n)>1 (Euclidian division), returna and stop.

3. Otherwisedetermine with a quantum computer the order r of x modulo n(the smallestr >1 such thatxr =1 mod(n))5

I Ifr even and 1<gcd(xr/2±1,n)<n, then return a=gcd(xr/2±1,n)and stop.

I Otherwise (probability≤η <1 independent of n) goto step 2.

5Shor’s algorithm is detailed in Chapter 5 of M.A. Nielsen, I.L. Chuang:

Quantum Computation and Quantum Information. Cambridge University Press, 2000.

18 / 43

(19)

A quantum gate appearing in Shor’s order-finding algorithm.

•The canonical`-qubit basis (basis ofC2

` ≡(C2)`) is labelled by {0, . . .2`−1} 3j≡(j1, . . . ,j`)∈ {0,1}` with

|ji=|j1j2. . .j`i=|j1i ⊗ |j2i ⊗. . .⊗ |j`i andj=P`

s=1js2`−s.

•To the data 1<x<n<2` with gcd(x,n) =1 is associated U a unitary transformationon`-qubits (permutationbetween vectors|ji)

ify≤n−1, U|yi=|xy mod(n)i, otherwiseU|yi=|yi.

•Forr the order ofxmod(n) and anys∈ {0, . . . ,r−1}the`-qubit state

|usi= 1r

r−1

X

k=0

e−2iπr sk

xk mod(n)

satisfiesU|usi=e−2iπr s |usi

and 1rPr−1

s=0|usi=|1i.

•Modular exponentiation algorithm to computeU withO(`3)1-qubit gates6andCNOT2-qubit gates7 (non trivial quantum algorithm...)

6Unitaryeıθe−ıαZ/2e−ıβX/2e−ıγZ/2with(θ, α, β, γ)∈[0,2π].

7CNOT|y1y2i=|y1z2iwhere{0,1} 3z2=y1+y2 mod(2).

19 / 43

(20)

The quantum Fourier transform

•Computations of the usual discrete Fourier transform C2

` 3(x0, . . . ,x2`−1)7→(y0, . . . ,y2`−1)∈C2

`

yj=2`/21

2`−1

X

j=0

e

2iπjk

2` xk; xk= 2`/21

2`−1

X

j=0

e

−2iπjk 2` yj

requiresO(`2`)additions and multiplications (FFT).

•It is also a unitary transformation ofC2

` ≡(C2)`, the quantum Fourier transform (QFT)

|j1i. . .|j`i=|ji 7→

P2`−1

k=0 e2iπ2`jk |ki 2`/2 with the binary decompositionj=P`

s=1js2`−s.

•The identity underlying thequantum circuit implementing the QFT with O(`2)1-qubit gates and 2-qubit gates:

P2`−1

k=0 e2iπ2`jk|ki

2`/2 = |0i+e2iπ0.j`|1i

|0i+e2iπ0.j`−1j`|1i

. . . |0i+e2iπ0.j1...j`|1i 2`/2

with binary fraction notations 0.jsjs+1jm=js/2+js+1/4+. . .+jm/2m−s+1.

20 / 43

(21)

Efficient Circuit for the quantum Fourier transform

With Hadamard gate,H =|0i+|1i

2

h0|+|0i−|1i

2

h1|, and Controlled-Rk gate (2-qubit) where Rk =|0i h0|+e2iπ/2k|1i h1|, the circuit

followed by a simple swap circuit reversing the order of the`qubits, one gets the QFT:

|j1. . .j`i 7→ |0i+e2iπ0.j`|1i

|0i+e2iπ0.j`−1j`|1i

. . . |0i+e2iπ0.j1...j`|1i 2`/2

21 / 43

(22)

Outline

Quantum cryptography and computation RSA public-key system

Quantum mechanics from scratch BB84 quantum key distribution protocol

Shor’s factorization algorithm based on quantum Fourier transform

Quantum error correction (QEC) Classical error correction QEC in discrete-time

Continuous-time QEC and measurement-based feedback Autonomous QEC and coherent feedback

Appendix: two key quantum systems Qubit (half-spin)

Harmonic oscillator (spring)

22 / 43

(23)

The simplest classical error correction code

•Single bit error model: the bitb∈ {0,1} flips with probabilityp<1/2 during∆t (for usual DRAM:p/∆t ≤10−14 s−1).

•Multi-bit error model: each bitbk ∈ {0,1} flips with probability p<1/2 during∆t;no correlation between the bit flips.

•Useredundancyto construct with several physical bitsbk of flip probabilityp, a logical bitbL with a flip probabilitypL<p.

•The simplest solution, the3-bit code(sampling time∆t):

t=0: bL= [bbb]withb∈ {0,1}

t = ∆t: measure the three physical bits ofbL= [b1b2b3] (instantaneous) :

1. if all 3 bits coincide, nothing to do.

2. if one bit differs from the two other ones, flip this bit (instantaneous);

•Since the flip probability laws of the physical bits are independent, the probability that the logical bitbL (protected with the above error correction code) flips during∆t ispL =3p2−2p3<p sincep<1/2.

23 / 43

(24)

Outline

Quantum cryptography and computation RSA public-key system

Quantum mechanics from scratch BB84 quantum key distribution protocol

Shor’s factorization algorithm based on quantum Fourier transform

Quantum error correction (QEC) Classical error correction QEC in discrete-time

Continuous-time QEC and measurement-based feedback Autonomous QEC and coherent feedback

Appendix: two key quantum systems Qubit (half-spin)

Harmonic oscillator (spring)

24 / 43

(25)

The 3-qubit bit flip code

Local bit-flip errors: each physical qubit|ψi=α|0i+β|1ibecomes X|ψi=α|1i+β|0i8with probabilityp<1/2 during∆t.

(for actual super-conducting qubitp/∆t>103s−1).

t=0: Li=α|0Li+β|1Li ∈C8with|0Li=|000iand|1Li=|111i.

t= ∆t: Libecomes with

1 flip:

α|100i+β|011i α|010i+β|101i α|001i+β|110i

;2 flips:

α|110i+β|001i α|101i+β|010i α|011i+β|100i

;3 flips:α|111i+β|000i.

Key fact: 4 orthogonal planesPc=span(|000i,|111i),P1=span(|100i,|011i), P2=span(|010i,|101i)andP3=span(|001i,|110i).

Error syndromes: 3 commuting observablesS1=IZZ,S2=ZIZ and S3=ZZI with spectrum{−1,+1}and outcomes(s1,s2,s3)∈ {−1,+1}.

-1-s1=s2=s3:Pc 3 |ψLi=

α|000i+β|111i 0 flip

β|000i+α|111i 3 flips ; no correction -2-s16=s2=s3:P13 |ψLi=

α|100i+β|011i 1 flip

β|100i+α|011i 2 flips ;(XII)Li ∈Pc. -3-s26=s3=s1:P23 |ψLi=

α|010i+β|101i 1 flip

β|010i+α|101i 2 flips ;(IXI)Li ∈Pc. -4-s36=s1=s2:P33 |ψLi=

α|001i+β|110i 1 flip

β|001i+α|110i 2 flips ;(IIX)Li ∈Pc.

8X=|1i h0|+|0i h1|andZ=|0i h0| − |1i h1|.

25 / 43

(26)

The 3-qubit phase flip code

Local phase-flip error: each physical qubit|ψi=α|0i+β|1ibecomes Z|ψi=α|0i −β|0i9with probabilityp<1/2 during∆t.

SinceX =HZHandZ=HXH(H2=I), use the3-qubit bit flip code in the frame defined byH:

|0i 7→ |0i+|1i

2 ,|+i, |1i 7→|0i − |1i

2 ,|−i, X7→HX H=Z=|+ih+|+|−ih−|.

t= +:Li=α|+Li+β|−Liwith|+Li=|+ + +iand|−Li=|− − −i.

t= ∆t:Libecomes with

1 flip:

α|−+ +i+β|+− −i α|++i+β|−+−i α|+ +−i+β|− −+i

;2 flips:

α|− −+i+β|+ +−i α|−+−i+β|++i α|+− −i+β|−+ +i

;3 flips:α|− − −i+β|+ + +i.

Key fact:4 orthogonal planesPc=span(|+ + +i,|− − −i),P1=span(|−+ +i,|+− −i, P2=span(|++i,|−+−i)andP3=span(|+ +−i,|− −+i).

Error syndromes: 3 commuting observablesS1=IXX,S2=XIXandS3=XXI with spectrum{−1,+1}and outcomes(s1,s2,s3)∈ {−1,+1}.

-1-s1=s2=s3:Pc3 |ψLi=

α|+ + +i+β|− − −i0 flip

β|+ + +i+α|− − −i3 flips ; no correction -2-s16=s2=s3:P13 |ψLi=

α|−+ +i+β|+− −i 1 flip

β|−+ +i+α|+− −i 2 flips ;(ZII)Li ∈Pc. -3-s26=s3=s1:P23 |ψLi=

α|++i+β|−+−i 1 flip

β|++i+α|−+−i 2 flips ;(IZI)Li ∈Pc. -4-s36=s1=s2:P33 |ψLi=

α|+ +−i+β|− −+i1 flip

β|+ +−i+α|− −+i2 flips ;(IIZ)Li ∈Pc. 9X=|1i h0|+|0i h1|,Z=|0i h0| − |1i h1|andH=|0i+|1i

2

h0|+|0i−|1i

2

h1|.

26 / 43

(27)

The Shor code (1995): combination of bit-flip and phase flip codes

Take the phase flip code|+ + +iand|− − −i. Replace each|+i(resp.|−i) by

|000i+|111i

2 (resp.|000i−|111i

2 ). New logical qubit Li=α|0Li+β|1Li ∈C2

9:

|0Li= |000i+|111i

|000i+|111i

|000i+|111i

2

2 ,|1Li= |000i−|111i

|000i−|111i

|000i−|111i

2 2

Local errors: each of the 9 physical qubits can have a bit-flipX, a phase flipZ or a bit flip followed by a phase flipZ X=iY 10with probabilitypduring∆t.

Denote byXk (resp.Yk andZk), the local operatorX (resp.Y andZ) acting on physical qubit nok∈ {1, . . . ,9}. Denote byPc =span(|0Li,|1Li)the code space.

One get a family of the 1+3×9=28 orthogonal planes:

Pc,

XkPc

k=1,...,9,

YkPc

k=1,...,9,

ZkPc

k=1,...,9.

One can always constructerror syndromesto obtain, when there is only one error among the 9 qubits during∆t,the numberkof the qubit and the error type it has undergone(X,Y orZ). These 28 planes are then eigen-planes by the syndromes.

If the physical qubitk is subject toany kind of local errorsassociated to arbitrary operatorM=gI+aX+bY+cZ (g,a,b,cC),Li 7→ q MkLi

L|M

kMkLi, the syndrome measurements will project the corrupted logical qubit on one of the 4 planes Pc,XkPc,YkPc orZkPc.It is then simple by using eitherI,Xk,YkorZk, to recover up to a global phase the original logical qubitLi.

10X=|1i h0|+|0i h1|,Z=|0i h0| − |1i h1|andY=i|1i |0i −i|0i |1i.

27 / 43

(28)

Many open issues connected to QEC

•For a logical qubit relying onnphysical qubits, the dimension of the Hilbert has to be larger than 2(1+3n)to recover an arbitrary single-qubit error: 2n≥2(1+3n)imposingn≥5.

•Efficient constructions of quantum error-correcting codes: stabilizer codes, surface codes where the physical qubits are located on a 2D-lattice, topological codes, . . .

•Fault tolerant computations: computing on encoded quantum states;

fault-tolerant operations to avoid propagations of errors during encoding, gates and measurement; concatenation and threshold theorem, . . .

•Error rates for a DRAM bit≤10−14 s−1and for a superconducting qubit≥103 s−1: high order error-correcting codes; important overhead (around 1000 physical qubits to encode a logical one11); scalability issues;

. . .

11A.G. Fowler, M. Mariantoni, J.M. Martinis, A.N. Cleland: Surface codes:

Towards practical large-scale quantum computation. Phys. Rev.

A,86(3):032324, 2012.

28 / 43

(29)

Outline

Quantum cryptography and computation RSA public-key system

Quantum mechanics from scratch BB84 quantum key distribution protocol

Shor’s factorization algorithm based on quantum Fourier transform

Quantum error correction (QEC) Classical error correction QEC in discrete-time

Continuous-time QEC and measurement-based feedback Autonomous QEC and coherent feedback

Appendix: two key quantum systems Qubit (half-spin)

Harmonic oscillator (spring)

29 / 43

(30)

Continuous-time QEC and feedback

•Quantum error correction is afeedback scheme: at each sampling time a measurement is performed and a correction depending only on the measurement outcome is applied.

•From a control engineering view point, QEC is based on astatic output feedbackscheme (feedback without memory) (called alsoMarkovian feedback).

•In usual discrete-time setting, measurement (sensor) and correction (actuator) processes are assumed instantaneous.

•Natural question: how to take into account thefinite band-width of the measurement and correction processes.

•Interest of continuous-time formulations for QEC:

1. measurement and correction are faster than the error rates but not infinitely faster;

2. qubit errors can occur during the measurement and the correction processes (fault-tolerance issues).

|ψireplaced byρ(density operator) obeying to a stochastic master equation (SME).

30 / 43

(31)

Flashback to the LKB photon box

C

B

D R

1

R

2

B R

2

|ΨiR

2=USM|ΨiB =USM |ψi ⊗ |gi

= Mg|ψi

⊗ |gi+ Me|ψi

⊗ |ei

withMgMg+MeMe =I.

•Quantum trajectories(Markov chain, stochastic dynamics):

k+1i=





Mg rD

ψk|MgMgkEki, yk=g with probability

ψk|MgMgk

;

Me r

D

ψk|MeMekEki, yk=ewith probability

ψk|MeMek

;

with state|ψkiand measurement outcomeyk∈ {g,e}at time-stepk:

31 / 43

(32)

Continuous-time quantum trajectories (diffusive case)

12

•The measurement outcomeyk at discrete-time stepk, is replaced by the small among of measurement signaldyt∈Robtained during an infinitesimal time interval[t,t+dt].

•Themeasurement operatorMyk becomesMdyt close to identity:

Mdyt =I+

i

~H−12 LL

dt+dytL

where operatorL(not necessarily Hermitian) describes the measurement process andH is the Hamiltonian corresponding to the coherent evolution.

•The measurement backaction reads

|ψit+dt =r Mdyt|ψit hψ|tM

dytMdyt|ψit

•Probability density ofdy∈Rknowing|ψit: e

dy2

2dt

2πdt hψ|tMdyMdy|ψit. Coincides up to orderO(dt3/2)terms tody=hψ|t(L+L)|ψit dt+dW wheredW is a Wiener process (Gaussian of zero mean and variancedt).

Quantum Monte-Carlo simulations with MATLAB: QNDqubit.m(L=σz,H =0)

12For a mathematical exposure: A. Barchielli, M. Gregoratti: Quantum Trajectories and Measurements in Continuous Time: the Diffusive Case. Springer Verlag,2009.

32 / 43

(33)

Why density operators ρ instead of wave functions |ψi

Consider once again the LKB photon-box:

k+1i=





Mg rD

ψk|MgMgkEki, yk=g with probability

ψk|MgMgk

;

Me rD

ψk|MeMekEki, yk=ewith probability

ψk|MeMek

;

Assume known|ψ0ianddetector out of order(y =∅): what about|ψ1i? I Expectation value of|ψ1i hψ1|knowing|ψ0i:13

E

1i hψ1| 0i=Mg0i hψ0|Mg+Me0i hψ0|Me.

I SetK(ρ),MgρMg+MeρMe for any operatorρ.

I ρk expectation of|ψki hψk|knowing|ψ0i:

ρk+1=K(ρk)andρ0=|ψ0i hψ0|.

Linear mapK: trace preserving Kraus map (quantum channel).

Density operatorsρ: convex space of Hermitian non-negative operators of trace one.

13|ψi hψ|: orthogonal projector on line spanned by unitary vector|ψi.

33 / 43

(34)

Quantum trajectories for the density operator

ρ Detector efficiencyη∈[0,1]. Outputy∈ {g,e,∅}:

ρk+1=

















Kgk)

Tr(Kgk)),yk =g with probability Tr(Kgk));

Kek)

Tr(Kek)),yk =e with probability Tr(Kek));

Kk)

Tr(Kk)),yk =∅with probability Tr(Kk));

with Kraus maps

Kg(ρ) =ηMgρMg, Ke(ρ) =ηMeρMe K(ρ) = (1−η)

MgρMg+MeρMe .

We still have:

E

ρk+1 ρk,Kk) =MgρkMg+MeρkMe =X

y

Kyk).

34 / 43

(35)

Discrete-time quantum trajectories for open quantum systems

Four features:

1. Bayes law: P(µ/y) =P(y/µ)P(µ)/ P

µ0P(y/µ0)P(µ0) , 2. Schrödinger equationsdefining unitary transformations.

3. Partial collapse of the wave packet: irreversibility and dissipation are induced by the measurement of observables withdegeneratespectra.

4. Tensor product for the description of composite systems.

VDiscrete-time Q. traj. : Markov processesof state ρ, (density op.):

ρk+1=

Pm

µ=1ηy,µMµρkMµ

Tr(Pmµ=1ηy,µMµρkMµ), with proba. Pyk) =Pm

µ=1ηy,µTr

MµρkMµ associated toKraus maps14(ensemble average, quantum channel)

E

k+1|ρk) =Kk) =X

µ

MµρkMµ with X

µ

MµMµ=I

and left stochastic matrices (imperfections, decoherences)(ηy,µ).

14M.A. Nielsen, I.L. Chuang: Quantum Computation and Quantum Information. Cambridge University Press, 2000.

35 / 43

(36)

Continuous/discrete-time Stochastic Master Equation (SME)

Discrete-time models: Markov chains

ρk+1=

Pm

µ=1ηy,µMµρkMµ

Tr(Pmµ=1ηy,µMµρkMµ), with proba. Pyk) =Pm

µ=1ηy,µTr

MµρkMµ with ensemble averages corresponding toKraus linear maps

E

k+1|ρk) =Kk) =X

µ

MµρkMµ with X

µ

MµMµ=I

Continuous-time models: stochastic differential systems15t =

~i[H, ρt] +X

ν

LνρtLν12(LνLνρttLνLν) dt

+X

ν

√ην

LνρttLν− Tr

(Lν+Lνt ρt

dWν,t driven byWiener processesdWν,t, with measurements yν,t,

dyν,t=√ην Tr

(Lν+Lνt

dt+dWν,t, detection efficiencies ην ∈[0,1]andLindblad-Kossakowski master equations (ην≡0):

d

dtρ=−~i[H, ρ] +X

ν

LνρLν12(LνLνρ+ρLνLν)

15A. Barchielli, M. Gregoratti: Quantum Trajectories and Measurements in Continuous Time: the Diffusive Case. Springer Verlag, 2009. 36 / 43

(37)

Positivity-preserving formulation of diffusive SME

16

With a single imperfect measurementdyt=√

ηTr (L+Lt

dt+dWt and detection efficiencyη∈[0,1], the quantum stateρt is usually mixed and obeys to

t =

i

~[H, ρt] +LρtL1

2(LttLL) dt +√

η

ttL− Tr

(L+Lt

ρt

dWt

driven by the Wiener processdWt

WithIt¯o rules, it can be written as the following "discrete-time" Markov model

ρt+dt = MdytρtMdy

t+ (1−η)LρtLdt Tr

MdytρtMdy

t+ (1−η)LρtLdt withMdyt =I+ −i

~H−12 LL dt+√

ηdytL.

ρ0density operator7→for allt>0,ρt density operator

16Such SME precisely describe cutting-edge experiments with superconducting qubits under homodyne and heterodyne continuous-time measurements. See, e.g., the group of Benjamin Huard at ENS-Lyon:http://www.physinfo.fr/index.html.

37 / 43

(38)

Quantum error correction in the diffusive case

QUANTUM WORLD decoherence quantum state

Hilbert space (dissipation) CLASSICAL WORLD

classical input u classical

reference

classical controller

classical output dy

•How to achieve QEC with the above measurement-based feedback scheme where the controller admits a memory (a dynamical system, possibly stochastic).

•In17QEC is implicitly formulated as feedbackstabilization of the code space Pc underquantum non demolition measurement. Numerical closed-loop simulations indicate promising convergence properties but a precise mathematical convergence analysis is missing. Many open issues such as precise estimates of convergence rates in closed-loop18

17C. Ahn, A. C. Doherty, and A. J. Landahl. Continuous quantum error correction via quantum feedback control. Phys. Rev. A, 65:042301, March 2002.

18Preliminary results in, e.g., G. Cardona, A. Sarlette, and PR. Exponential stochastic stabilization of a two-level quantum system via strict Lyapunov control.

arXiv:1803.07542.

38 / 43

(39)

Outline

Quantum cryptography and computation RSA public-key system

Quantum mechanics from scratch BB84 quantum key distribution protocol

Shor’s factorization algorithm based on quantum Fourier transform

Quantum error correction (QEC) Classical error correction QEC in discrete-time

Continuous-time QEC and measurement-based feedback Autonomous QEC and coherent feedback

Appendix: two key quantum systems Qubit (half-spin)

Harmonic oscillator (spring)

39 / 43

(40)

Coherent feedback (with measurement-based feedback)

•Quantum analogue of Watt speed governor where adissipative mechanical system controls another mechanical system19

•Coherent feedback where the controller is another quantum systems20:

QUANTUM WORLD CLASSICAL WORLD Hilbert space

classical controller

quantum controller Hilbert space Hilbert space

system S

dissipation

errors

classical input

classical output

quantum measurement classical

reference

quantum interaction

dy

dy

19J.C. Maxwell: On governors. Proc. of the Royal Society, No.100, 1868.

20Optical pumping (Kastler1950), coherent population trapping (Arimondo 1996), dissipation engineering, autonomous feedback: (Zoller, Cirac, Wolf, Verstraete, Devoret, Siddiqi, Lloyd, Viola, Ticozzi, Mirrahimi, Sarlette, ...)

40 / 43

Figure

Updating...

References

Related subjects :