Quantum Computing: Exercise Sheet 2: Steven Herbert and Anuj Dawar
Quantum Computing: Exercise Sheet 2: Steven Herbert and Anuj Dawar
1. Let j i = j00i + j01i +
j10i + j11i. Show by explicitly expressing the tensor product
that:
(X
I )j
i = j10i + j11i +
j00i + j01i
2. Let A and B be 2 2 matrices, and j i and ji be single qubit states (i.e., 2 1 element
vectors). Show that:
(A
B )(j i
ji) = (Aj i)
(B ji)
3. Show that a swap gate can be constructed from three CNOT gates.
4. Give the matrix form of the controlled-Hadamard gate. That is a two-qubit gate { let the
rst qubit be the control and the second be the target { if the rst (control) qubit equals
zero, then the second (target) qubit is unchanged; if the rst (control) qubit equals one, then
a Hadamard gate is performed on the second (target) qubit.
Hint: Look at the matrix form of the CNOT gate, in which the rst qubit controls a Pauli-X
(not) gate on the second qubit.
5. Show how the controlled-Not gate can be constructed from Hadamard gates and the controlled-
Z. Demonstrate that the construction is correct by multiplying the corresponding matrices.
6. Verify that the four Bell states ( p12 (j00i + j11i); p12 (j00i j11i); p12 (j01i + j10i); p12 (j01i j10i))
form an orthonormal basis for C4 .
7. Suppose that Eve intercepts the qubit transmitted by Alice in the superdense coding protocol.
Can she infer which of the four pairs of bits 00; 01; 10, or 11 Alice was trying to transmit? If
so, how? If not, why not?
8. Let Alice and Bob each have one qubit of a Bell pair ( p12 (j00i + j11i)); let Bob and Charlie
also each have one half of another Bell pair. If Bob uses the Bell pair he shares with Charlie,
to teleport his qubit from the Bell pair he (Bob) shares with Alice, show that the result is
that Alice and Charlie now share a Bell pair.
9. Alice and Bob are using the BB84 protocol, and Eve attempts the intercept, measure and
retransmit attach described in the lectures. If Alice and Bob compare a bit-string of length
n (i.e., from their shared channel) to determine whether they are being eavesdropped, what
is the probability that Eve's actions remain undetected?
10. Regarding the statements on Slides 14 and 15 of lecture 7, show that:
(a) The Unitary in the Deutsch-Jozsa algorithm indeed transforms:
j i=
X p1 jxi (j0i j1i) :
1
2f0 1gn 2
n
x ;
1
to:
j i=
X p1 ( 1) f (x)
jxi (j0i j1i) :
2
x2f0;1gn
2 n
(b) H
j0i
= p12n
P
2f0 1gn jxi,
P
n n
x ;
(c) H
jxi = p12n
n
z ;
2f0 1gn ( 1) jz i.
x z
12. In Lecture 8 it was claimed that C 1 X (that is, a Pauli-X gate controlled by the \And" of
n
n 1 qubits) could be implemented eciently using Tooli gates and some extra workspace
qubits. Show how C 1 X can be constructed from n 2 Tooli gates and n 3 workspace
n