• Aucun résultat trouvé

An Introduction to Quantum Information and Applications

N/A
N/A
Protected

Academic year: 2022

Partager "An Introduction to Quantum Information and Applications"

Copied!
43
0
0

Texte intégral

(1)

An Introduction to

Quantum Information and Applications

Iordanis Kerenidis

CNRS

LIAFA-Univ Paris-Diderot

(2)

Quantum information and computation

•   Quantum information and computation

–  How is information encoded in nature?

–  What is nature’s computational power?

•   Moore s law : quantum phenomena will appear by 2020

•   Rich Mathematical Theory

–  Advances in Classical Computer Science

–  Advances in Theoretical & Experimental Physics

–  Advances in Information Theory

(3)

Quantum information and computation

The power of Quantum Computing

•   Quantum algorithm for Factoring and Discrete Logarithm [Shor 93]

•  Unconditionally Secure Key Distribution

[Bennett-Brassard 84]

•  Quantum computers unlikely to solve NP-complete

problems [Bernstein Bennett Brassard Vazira ni 94]

(4)

Outline

1)   Introduction to the model

•  Superdense Coding

•  Teleportation

2)   Basic algorithms

•  Deutsch-Jozsa

•  Ideas for Factoring

3)   Cryptography

•  Key Distribution

4)   Communication Complexity

•  Quantum fingerprints

•  Exponential Separations

(5)

Quantum States

•  Quantum bit is a unit vector in a 2-dim. Hilbert space

•  A quantum state on logn qubits is a unit vector in

•  Inner product:

0 = 1 0

"

# $ %

&

' , 1 = 0

1

"

# $ %

&

' , 1

2 ( 0 + 1 ) = 1 2 " 1 1

# $ %

&

' , 1

2 ( 0 − 1 ) = 1 2 " 1 1

# $ %

&

'

(6)

Measurements on Quantum States

•  A measurement of in an orthonormal basis is a projection onto the basis vectors and

Pr[outcome is b i ] =

•  Examples

(7)

Measurements on Quantum States

•  A measurement of in an orthonormal basis is a projection onto the basis vectors and

Pr[outcome is b i ] =

•  Examples

φ = a 0 0 + a 1 1 , { 1

2 ( 0 + 1 ) , 1 2 ( 0 1 ) }

Pr ob[outcome 1

2 ( 0 + 1 ) ] = 1 2 a 0 0 0 + 1 2 a 1 11

2

= 1

2 + a 0 a 1

Pr ob[outcome 1

2 ( 0 − 1 ) ] = 1 2 a 0 0 0 1 2 a 1 11

2

= 1

2 − a 0 a 1

(8)

Measurements on Quantum States

•  A measurement of in an orthonormal basis is a projection onto the basis vectors and

Pr[outcome is b i ] =

•  Examples

•  Note that

(9)

Measurements on Quantum States

•  A measurement of in an orthonormal basis is a projection onto the basis vectors and

Pr[outcome is b i ] =

•  IMPORTANT REMARK

–  What is the final state after the measurement?

–  The state changes to the basis state

–  Hence, no more information in it about the a i ‘s.

–  If I repeat the measurement I always get the same basis

vector.

(10)

Unitary Evolution

•  Unitary matrix: inner product/length preserving, linear

•  NOT gate

•  Phase Flip gate

X

Z

(11)

Unitary Evolution cont.

•  Hadamard Gate

•  Control NOT gate

•  Example

H

H

0 ⊗ 0 # H on # # 1st → 1

2 ( 0 + 1 ) 0 # CNOT # # 1 2 ( 0 0 + 1 1 )

0 " " H → 1

2 ( 0 + 1 ) , 1 " " H 1 2 ( 0 1 )

(12)

Superdense Coding

•  Transmitting 2 bits with 1 qubit

–  Alice and Bob share the above state

–  Alice wants to transmit the bits b 1 b 2 to Bob

Alice Bob

–  Let b 1 b 2 =10

X b2

H

Z b1

1

2 ( 0 0 + 1 1 ) " Z if b1=1 " " 1 2 ( 0 0 1 1 ) " X if b " " 2=1 " 1 2 ( 0 0 1 1 )

" CNOT " " → 1

2 ( 0 0 − 1 0 ) 1 2 ( 0 1 ) 0 " H on " " 1st 1 0

1

2 ( 0 0 + 1 1 )

M

M

(13)

Teleportation

•  Teleporting a qubit with 2 bits

–  Alice and Bob share the state

–  Alice wants to transmit an unknown qubit to Bob

b 1

Alice b 2

Bob X b2

H

Z b1

M

€ M

1

2 ( 0 0 + 1 1 )

a 0 0 + a 1 1

( ) 1 2 ( 0 0 + 1 1 ) # CNOT # # 1 2 ( a 0 000 + a 1 110 + a 0 011 + a 1 101 )

# # H → 1

2 00 ( a 0 0 + a 1 1 ) + 1 2 01 ( a 0 1 + a 1 0 ) + 1 2 10 ( a 0 0 a 1 1 ) + 1 2 11 ( a 0 1 a 1 0 )

Z

b1

X

b2

# # # → ( a 0 0 + a 1 1 )

(14)

Outline

1)   Introduction to the model

•  Superdense Coding

•  Teleportation

2)   Basic algorithms

•  Deutsch-Jozsa

•  Ideas for Factoring

3)   Cryptography

•  Key Distribution

4)   Communication Complexity

•  Quantum fingerprints

•  Exponential Separations

(15)

Quantum Queries

Let f : X -> Y

Goal: Does f have a certain property?

Classical Query: "What is the value of f(x)?"

Example: Is f linear or far from linear?

3 Queries u.a.r.: f(x),f(y),f(x+y). Check f(x)+f(y)=f(x+y) Quantum Query

But, quantum operations are linear!

x b " " O

f

x bf ( x)

x " " O

f

f ( x )

0...0 0 " " H → 1

2 n / 2 x

x∈{0,1}

n

0 " " O

f

2 1 n / 2 x

x∈{0,1}

n

f ( x )

(16)

Deutsch-Jozsa Algorithm

Let f : {0,1} n -> {0,1}

Goal: Is f identically zero or balanced?

Classical Query:

deterministic: 2 n-1 +1

randomized: k queries, error probability 2 -k Quantum

x " " O

f

f ( x )

0...0 0 " " H → 1

2 n / 2 x 0 " " O

f

x∈{0,1}

n

2 1 n / 2 x f ( x )

x∈{0,1}

n

Z on 2nd

" " " → 1

2 n / 2 (−1) f ( x ) x f ( x) " " O

f

x ∈ {0,1}

n

2 1 n / 2 (−1) f ( x ) x 0

x∈ {0,1}

n

" " H

0...0 if f = 0

a y y , with a 0 = 0, if f balanced

y∈{0,1}

n

' ( )

* )

x b " " O

f

x bf ( x)

(17)

More Algorithms

- Simon's problem

Let f: {0,1} n -> {0,1} n

Promise: f(x)=f(x+a) and f(x) ≠ f(y), y≠x+a (2-periodic) Goal: Find a

Randomized: 2 n/2

Quantum: O(n), by finding each time a random y, st. y.a=0

- Period Finding [Shor94]

Let f: Z N -> C

Promise: f is periodic Goal: Find period

Quantum: Easy algorithm, based on Fourier Transform

Factoring = Period Finding !

- Seach an unordered list: O(√n) queries [Grover97]

(18)

2)Algorithms: Open Problems

•  Find New Algorithms

–  Graph Isomorphism?

–  Lattice Problems?

–  Hidden Subgroup Problems?

–  other...

•  Exponential speedup (possibly)

–  Factoring, Discrete Log, Pell's Equality,...

•  Quadratic speedup (provably)

–  Grover's Search, Quantum walk-based algorithms,...

(19)

Outline

1)   Introduction to the model

•  Superdense Coding

•  Teleportation

2)   Basic algorithms

•  Deutsch-Jozsa

•  Ideas for Unordered search and Factoring

3)   Cryptography

•  Key Distribution

4)   Communication Complexity

•  Quantum fingerprints

•  Exponential Separations

(20)

3) Cryptography

•  Current cryptography based on computational assumptions (e.g. hardness of factoring)

•  Many such problems become insecure against a quantum adversary

•  Can we use quantum interaction to achieve

unconditionally secure cryptography?

(21)

Unconditional Key Distribution

1.   Alice picks a secret key.

She encodes each bit in one of two possible quantum ways and sends it to Bob.

Remarks: - If Bob guesses correctly the encoding, then the

decoding is perfect. If not, Bob gets a random bit.

- Bob guesses correctly half the times.

2. Bob guesses the encoding and

decodes each bit accordingly

(22)

Unconditional Key Distribution

1.   Alice picks a secret key.

She encodes each bit in one of two possible quantum ways and sends it to Bob.

3. Alice and Bob reveal publicly the encodings

and keep only the bits on which they agree. (~ half) Remarks: - If there is no Eve, then they agree on the value

of all these bits.

- If Eve has got information about the key, then with high probability Alice and Bob will disagree on some bits.

2. Bob guesses the encoding and

decodes each bit accordingly

(23)

Unconditional Key Distribution

1.   Alice picks a secret key.

She encodes each bit in one of two possible quantum ways and sends it to Bob.

3. Alice and Bob reveal publicly the encodings

and keep only the bits on which they agree. (~ half)

4. Alice and Bob reveal publicly the values of half of the bits (1/4 of the initial).

- If they agree, they use the rest as the key (~ 1/4) - If they disagree in many bits, they throw it away

2. Bob guesses the encoding and

decodes each bit accordingly

(24)

Unconditional Key Distribution

1.  Pick a,b ∈{0,1} n

( a: key | b : encoding) Send each

3. Alice and Bob reveal publicly the encodings b,b’.

Keep the bits for which b i = b’ i (~ half)

4. Alice and Bob reveal publicly the values of a i = a’ i for half of the bits for which b i = b’ i

- If they agree, they use the rest as the key (~ 1/4) - If they disagree in many bits, they throw it away

2. Pick b’∈{0,1} n

If b i =0 measure in If b i =1 measure in

Denote outcome a i

Ψ 00 = 0 , Ψ 10 = 1 , Ψ 01 = 1

2 ( 0 + 1 ) , Ψ 11 = 1

2 ( 0 − 1 )

(25)

Unconditional Key Distribution

Proof of Security (idea)

–  Eve gets information, she disturbs the state (Heisenberg)

Possible strategy: Eve picks encoding b E u.a.r and measures Alice's qubit. Let be the result. She sends it to Bob.

–  If b A ≠ b B , Bob does not check, so Eve is not detected cheating –  If b A = b B and b E = b A , then , so Eve is not detected –  If b A = b B and b E ≠ b A , then

Alice Eve : measure in Bob: measure in outcome outcome

Ψ a b

E

Ψ a b

E

= Ψ a b

A

Ψ

00

= 0 , Ψ

10

= 1 , Ψ

01

= 1

2 ( 0 + 1 ) , Ψ

11

= 1 2 ( 0 1 )

Ψ

01

= 1

2 ( 0 + 1 )

{ 0 , 1 }

0 , w.p.1/2 1 , w .p.1/2

{ 1

2 ( 0 ± 1 ) }

+ , w.p.1/2

− , w.p.1/2

(26)

Unconditional Key Distribution

Proof of Security (idea)

–  Eve gets information, she disturbs the state (Heisenberg)

Possible strategy: Eve picks encoding b E u.a.r and measures Alice's qubit. Let be the result. She sends it to Bob.

–  If b A ≠ b B , Bob does not check, so Eve is not detected cheating –  If b A = b B and b E = b A , then , so Eve is not detected –  If b A = b B and b E ≠ b A and Alice and Bob check, then

Alice Eve : measure in Bob: measure in outcome outcome

Overall, Pr[Eve is detected cheating]=1/16

Ψ a b

E

Ψ a b

E

= Ψ a b

A

Ψ

00

= 0 , Ψ

10

= 1 , Ψ

01

= 1

2 ( 0 + 1 ) , Ψ

11

= 1 2 ( 0 1 )

Ψ

01

= 1

2 ( 0 + 1 )

{ 0 , 1 }

0 , w.p.1/2 1 , w .p.1/2

{ 1

2 ( 0 ± 1 ) }

+ , w.p.1/2

− , w.p.1/2

(27)

Unconditional Key Distribution

Proof of Security (continued)

–  The optimal strategy of Eve is not much better than the one we described. (individual vs coherent attacks)

–  The key is almost secure. We can distill a much stronger key by classical privacy amplification –  No assumptions on Eve’s computational power!

Ψ

00

= 0 , Ψ

10

= 1 , Ψ

01

= 1

2 ( 0 + 1 ) , Ψ

11

= 1 2 ( 0 1 )

(28)

3) Cryptography: Open Problems

•  Other Cryptographic Primitives

–  Oblivious Transfer –  Coin Flipping

–  Bit Commitment

•  Practical Quantum Cryptography

•  Commercial systems for QKD

•  Classical cryptography secure against quantum

(29)

Outline

1)   Introduction to the model

•  Superdense Coding

•  Teleportation

2)   Basic algorithms

•  Deutsch-Jozsa

3)   Cryptography

•  Key Distribution

4)   Communication Complexity

•  Quantum fingerprints

•  Exponential Separations

(30)

4) Communication Complexity

•  Examples: Is x=y?, Find an i such that x i ≠ y i

•  Applications of Communication Complexity

VLSI design, Boolean circuits, Data structures,

Automata, Formula size, Data streams, Secure Computation

Input x Input y

Goal: Output P(x,y)

(minimum communication)

(31)

Quantum Communication Complexity

•  Examples: Is x=y?, Find an i such that x i ≠ y i

•  Applications of Communication Complexity

VLSI design, Boolean circuits, Data structures,

Automata, Formula size, Data streams, Secure Computation

Input x Input y

Goal: Output P(x,y)

(minimum communication)

Classical vs.

Quantum

(32)

Encoding Information with Quantum states

•  We can encode a string with logn qubits.

•  Holevo’s bound

–  We cannot compress information by using qubits.

We need n qubits to transmit n classical bits.

•  Quantum communication can still be useful since in

many communication problems the information that

needs to be transmitted is small. (e.g. Equality)

(33)

Equality in Simultaneous Messages

Referee

Is x=y?

Randomized algorithm (Complexity )

Alice and Bob use an error correcting code C with constant distance and size O(n).

They each send bits of their strings C(x) , C(y)

Referee outputs Yes if C(x) i = C(y) i

Input x Input y

(34)

Equality in Simultaneous Messages

Quantum algorithm : (Complexity O(log n)) [BCWdW01]

•  Alice and Bob use an error correcting code C with constant distance.

•  They send the states

•  Referee measures the state

in the symmetric and alternating subspace of

•  If x=y, then the states are equal.

•  If x≠y, then the states are almost orthogonal.

(35)

Exponential Separations

•  Two-way communication

–  [BCW98]: exponential separation for zero error.

–  [Raz99]: exponential separation for bounded error.

–  [Gav07, RK11]: between q. One-way and rand. Two-way

•  One-way communication

–  [BJK04]: exponential separation for a relation –  [GKKRdW07]: exponential separation for a partial

function

•  Simultaneous Messages

–  [BCWdW01]: equality via fingerprints

–  [BJK04]: exponential separation for a relation

(36)

Input: x {0,1} 2n

Output:

Input: a matching M on [2n]

eg. {(1,5),(2,6),(3,7),(4,8)}

2 1

6 5

4

7 3

8

Theorem

•  There exists a one-way quantum protocol with compl. O(logn)

•  Any randomized one-way protocol has complexity Ω(√n) %

The Hidden Matching Problem

(37)

Quantum algorithm for HM 4

Let be Bob’s matching.

•  Alice sends the state

•  Bob measures in the basis

and outputs ((1,3),0) if he measures ((1,3),1) "

((2,4),0) "

((2,4),1) "

M = {(1,3),(2,4)}

1

2 ((−1) x

1

1 + ( −1) x

2

2 + (−1) x

3

3 + ( −1) x

4

4 )

B = {1 + 3 , 1 − 3 , 2 + 4 , 2 − 4 }

1 + 3

1 − 3

2 + 4

2 − 4

(38)

Quantum algorithm for HM 4

•  Alice sends the state

•  Bob measures in the basis

• 

•  Bob can compute the XOR of a pair of the matching with probability 1.

1

2 (−1) x

i

i =

i=1 4

1 2 ((−1) x

1

1 + (−1) x

3

3 ) + 1 2 ((−1) x

2

2 + (−1) x

4

4 )

B = {1 + 3 , 1 − 3 , 2 + 4 , 2 − 4 }

Pr[outcome 1 + 3 ] = 1

8 (( − 1) x 1 + ( − 1) x 3 ) 2

Pr[outcome 1 − 3 ] = 1

8 (( − 1) x 1 − ( − 1) x 3 ) 2

(39)

4) Communication Complexity Open Problems

•  Quantum communication complexity of total functions

•  Power of entanglement in communication complexity

•  Communication Complexity with super-quantum

resources.

(40)

Conclusions

Quantum Information can be very powerful

–  Algorithms

•  Factoring, Unordered Search

•  Quantum Walks, etc

–  Communication Complexity

•  Many exponential separations

•  Total Functions

–  Cryptography

•  Unconditional Key Distribution

•  Impossibility of Bit Commitment, OT

–  Interactions with Complexity Theory & Physics

•  Ronald's talk

(41)

Further Conclusions

•  Quantum Information and Computation

–  Computational power of nature

–  Quantum Mechanics as an theory of information –  Advances in classical Computer Science

–  Practical Quantum Cryptography –  Advances in Experimental Physics

Why is Quantum Computation

important?

(42)

Simon's Algorithm

Let f: {0,1} n -> {0,1} n

Promise: f(x)=f(x+a) and f(x) ≠ f(y), y≠x+a (2-periodic) Goal: Find a

Randomized: 2 n/2

Quantum: O(n), by finding each time a random y, st. y.a=0

amplitude of

Hence, we only measure y, s.t. a.y=0

Repeat O(n) times to get n linear independent y's.

0...0 0...0 " H on1st " " → 1

2 n/2 x 0...0 " " O

f

x∈ {0,1}

n

2 1 n/2 x f ( x )

x∈ {0,1}

n

measure f ( x)

" " " " → 1

2 x + 1

2 x + a " " H → 1

2 n+1/2 (−1) x⋅y y +

y∈ {0,1}

n

+ 2 n+1/2 1 (−1) ( x+a)⋅y y

y∈ {0,1}

n

y = 1

2 n+1/2 ( − 1) x⋅y + 1

2 n+ 1/2 ( − 1) ( x+a )⋅y = 1

2 n+ 1/2 ( − 1) x⋅y [1 + ( − 1) a⋅y ]

(43)

Period Finding Algorithm

Let f:Z N -> C

Let f: Z N -> C

Promise: f is periodic Goal: Find period

Tool: Quantum Fourier Transform:

If gcd(k,r)=1, then gcd(kN/r,N)=N/r

REMARK: Factoring reduces classically to period finding!!!

0...0 0...0 " QFT "

N

" on1st " → 1

N x 0...0 " " O

f

x∈Z

N

1 N x f ( x )

x∈Z

N

measure f ( x)

" " " " → 1

N / r j⋅ r + l

j=0 N /r − 1

" QFT " "

N

1 r i⋅ N / r

i=0 r −1

measure

" " " → k⋅ N / r , k ∈[ 0, r − 1]

x " QFT " "

N

→ 1

N ω x⋅y y

y∈ {0,1}

n

, ω = e 2 π i /N

Références

Documents relatifs

The superlattice studies in the past were limited to systems involving two host semiconductors or their pseudobinary alloys. We are now considering the

To assess the antiviral activity of the three fermented papaya pulps against ZIKV, A549 cells were infected with ZIKV GFP and continuously treated with different concentrations of

in classical and quantum statistical mechanics it suffices to postulate the grandcanonical distributions and that the other two, the canonical and the.. microcanonical, can

En effet à partir des contributions du chapitre 5 dénommé « la détermination du statut et du niveau de vulnérabilité d’un individu à travers les Réseaux Bayésiens dans

Unit´e de recherche INRIA Rennes, Irisa, Campus universitaire de Beaulieu, 35042 RENNES Cedex Unit´e de recherche INRIA Rhˆone-Alpes, 655, avenue de l’Europe, 38330 MONTBONNOT ST

Combination of Hydroxychloroquine Plus Azithromycin As Potential Treatment for COVID-19 Patients: Safety Profile, Drug Interactions, and Management of Toxicity...

Les résultats de notre étude confortent les données de la littérature ce qui montre que la grossesse chez la femme obèses est une grossesse à haut risque et doit

For instance, let us suppose that a given live node n has a successor list of size 3, and that all three successors of n fail before any stabilisation and rectification occur, then