Quantum Information

Introduction

Quantum Cryptography

Classical: use binary bits.

Quantum: Encode information through superpositions, entaglement, and wavefunction collapse (measurement).

No-cloning Theorem

No guarantee to make an exact replica of an arbitrary quantum state.

  • Example - Two Level System

    Why do we stop at a two level system for Quantum Computing. {Ψa,Ψb}.

    Given an initial two particle state: |Ψa1|Ψs2 Let |Ψs denote the starting state.

    Let say we have U|Ψa1|Ψs2=Ψa1|Ψa2.

    Then, lets say that also does U|Ψb1|Ψs2=Ψb1|Ψb2.

    So, let |Ψ1=12(|Ψa1+|Ψb1)

    Then, U12(|Ψa1+|Ψb1)|Ψs2=12[|Ψa1|Ψa2+|Ψb1|Ψb2] But we wanted, 12(|Ψa1+|Ψb1)12(|Ψa2+|Ψb2).

Example Encryption Scheme (Bennett and Brassard in 1984)

Using single photons, over 48km of Optical Fiber and 1.6km of free space (shown in 2000).

Alice: |V=1 and |H=0.

Bob: |V=1 and |H=0.

Assume Eve is inserted in the middle with another polarizer.

If Alice and Bob rotates their polarizers by 45 degrees, 12(|H±|V), then Eve’s polarizer would make the transmittance be reduced.

Simple scheme would be that Alice and Bob exchange ahead of time which bits should be recorded and which are junk.

  • Are there Security Risks associated with different Implementations

    Different implementations to change states:

    • Electrons use magnetic field
    • Photons use optical components
    • Atoms use E+M waves

Aside

  • Shor’s Algorithm

Post Quantum Cryptography

  • Lattice, CRYSTALS-KYBER, CRYSTALS-DILITHIUM

Quantum Computing

Classical: input bits |Black box| output bits

QM: input qubits |Oracle (With an additional clock input for trigger operations)| output bits (measurements) (Note the Blackbox is called an oracle, and the input qubits are any QM two-level system)

Question: How is this clock any different from the clock in a classical black box.

|Ψ=αα2+β2|0+βα2+β2|1

Hadamard gate: UH=12(1111),Uz=(1001),UNOTX=(0110).

Bloch Sphere Represenatation. |0=|+ is along +z and |1=| is along z. So, |s=cosθ/2|++eiφsinθ/2|.

2-qubit states. |ψ=C0,0|0control|0target+C0,1|0control|1target+C1,0|1control|0target+C1,1|1control|1target=(C0,0C0,1C1,0C1,1) UCNOT=(1000010000010010).

Quantum Teleportation

Transfer of a quantum state.

Bell states

Also called entangled states or EPR pairs.

|Φ±=12(|H1|H2±|V1|V2)

|Ψ±=12(|H1|V2±|V1|H2)

Using a nonlinear crystal crystal so that: ω=ω1+ω2 and $\vec{k}=\vec{k}1+\vec{k}2, the energy and momentum are conserved.

Suppose we have Alice and Bob. Alice recieves |Ψ1=CH|H1+CV|V1. Goal: Bob needs to output same photon.

Exchange EPR pair, |Ψ23=12(|H2|V3|V2|H3). Photon 2 goes to Alice and Photon 3 goes to Bob. Alice sees |Ψ123=|Ψ|Ψ. We can show: |Ψ123=12[|Φ+12(CH|V3CH|H3)+|Φ12(CH|V3+CV|H3)+|Ψ+12(CV|V3CH|H3)|Ψ12(CH|H3+CV|V3)] Alice then measures Bell state. Say she gets |φ12 so she gets |Φ12(CH|V3+CV|H3). She then communicates over classical phone and says that she got the result she got. So Bob knows the state of his third state is similar to Alice’s original state |Ψ1. Then Bob applies the unitary transformation that swaps the vertical and horizontal polarizations to recover the original |Ψ1 in |Ψ3.

EPR

The product of EPR gave rose to multiple interpretations: Copenhagen (Spearheaded by Bohr), Hidden Variables (John Bell 1964, testable inequality, no hidden variables), Subjective Theories.

Subjective Theories

  • E.P. Wigner: Wavefunction collapse happens at human brain
  • Everett: Multiverse - Each measurement creates universes of all possible universes, but we only exist in one of them (Where does the energy required come from, is this equivalent to hidden variables)

Author: Christian Cunningham

Created: 2024-05-30 Thu 21:16

Validate