Qcqi Seminarquantum Computations
Qcqi Seminarquantum Computations
May 7, 2006
Contents
1
4 A Thermodynamic Approach To The Measure of Entangle-
ment 24
4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
4.2 Entanglement of a Pure State . . . . . . . . . . . . . . . . . . 25
4.3 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27
2
9 Interferometry Using Large Matter Particles 47
9.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 47
9.1.1 Decoherence . . . . . . . . . . . . . . . . . . . . . . . . 48
9.2 Main Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . 49
9.2.1 Test particle . . . . . . . . . . . . . . . . . . . . . . . 49
9.2.2 Experimental Set-Up . . . . . . . . . . . . . . . . . . . 49
9.3 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 50
9.4 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 52
3
13.2.1 The Classical Random Walk . . . . . . . . . . . . . . . 71
13.2.2 The Quantum Random walk . . . . . . . . . . . . . . 71
13.2.3 Random Walks in Computer Science . . . . . . . . . . 72
13.2.4 Decoherence . . . . . . . . . . . . . . . . . . . . . . . . 75
13.2.5 Open questions . . . . . . . . . . . . . . . . . . . . . . 75
13.3 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75
13.4 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 76
15 RSA Cryptography 82
15.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 82
15.2 Main Study . . . . . . . . . . . . . . . . . . . . . . . . . . . . 83
15.2.1 Motivation and Procedure . . . . . . . . . . . . . . . . 83
15.2.2 Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . 83
15.2.3 Attacks on RSA . . . . . . . . . . . . . . . . . . . . . 84
15.3 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
15.4 References . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 85
4
18.2.4 putting the concepts together . . . . . . . . . . . . . . 99
18.3 Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99
5
Chapter 1
R.Bharath, AE02B005
Abstract
In the field of quantum measurement theory, there is a seemingly paradoxi-
cal result obtained due to continuous measurements. This result is called as
Quantum Zeno effect. In this discussion we shall look at this in the light of
classical zeno’s paradox. Following this we shall go through an example in a
single qubit system to realise the notion in the light of this simple example.
Following this we shall look at the first discussion of the zeno’s paradox by the
authors B.Misra et al.
1.1 Introduction
We shall start the discussion on Quantum Zeno Effect by looking at the
classical zeno paradox which forms the logical basis for the Quantum Zeno
Paradox. Zeno’s set of paradoxes were put forth by Zeno of Elea to support
the doctrine of his teacher Paramenides, on the doctrine of plurality and
the very idea that ’All is one’ and our very intutional notion of change and
dynamics is mistaken and is nothing more than an illusion. There are many
paradoxes put forth by Zeno but the three most famous ones are - Achilles
and the Tortoise, the Dichotomy Argument and the Arrow in Flight. For
our discussion here the Paradox of an Arrow in Flight is the most relevant
one. We shall try to have a better understanding of the Arrow Paradox.
6
occurs in an instant, then one may very well conclude that no motion occurs
at all in any given instant. This argument can very well be extended to the
context of continuous motion, wherein in any single slice of time there is no
physical difference between a moving and a non-moving arrow. Here Zeno
suggests that if all time is composed of instants (or ’nows’) may it be con-
tinuous or discrete, and if motion cannot exist in any instant, then motion
cannot exist at all. This argument against motion rests on the assumption
that time is composed of indivisible instants and nothing can move in this
instant. There are counterarguments to solve the Zeno’s Arrow paradox,
but we shall not get into it as it has very little relevance to Quantum Zeno
Effect. The bottomline is that our act of determining the exact position of
the arrow causes the arrow to freeze in time and the whole idea of velocity
makes no sense since an instant is of 0 seconds and according to the argu-
ment by zeno the arrow travels 0 distance,hence the very notion of velocity
and hence motion is compromised for the act of determing the position of
the arrow.
On similar lines is the quantum zeno paradox wherein we get a seemingly
paradoxical result due to continuous measurements on a temporally evolving
quantum system, wherein it is observed that the system does not evolve at
all in the light of the continuous measurements.
7
shall be discussed here.
We get the probabilities of obtaining state |0i as |x|2 = sin2 (kdt) and state
|1i as |1 − x|2 = cos2 (kdt). we now branch from each of the eigenstates and
in turn let the states evolve for dt and we measure the states in Z basis.
Continuing the branching in this fashion we evaluate the probabilities and
sum up all the probabilities. The series expression for the probability of
obtaining |1i after N measurements is as follows :
2N
sin2 (kdt) (1−sin (kdt))
cos2 (kdt) − cos2 (kdt) sin2 (kdt)(1 − sin2N −2 (kdt))
2N−2
+cos4 (kd ∗ t)( 1−(2sin(kd∗t))
cos(2kd∗t) )
In the context of the first ever discussion on QZE by Misra et al, we find
that we must first seek to understand the operational meanings of continu-
ous measurements. For this sake the authors have defined the probabilities
P,Q,R for determining the outcomes of continuously ongoing measurements
in a given interval of time, and go on to say that we may consider the pro-
cess of continuous measurements to be the limiting case of successions of
practically instantaneous measurements. Here Q represents the probability
that the system prepared in an initial undecayed state at time 0 is found
to decay during a given interval. Through a series of rigorous mathematical
arguments the authors prove that Q = 0, and hence the Quantum Zeno
Paradox from the formalisms of Quantum mechanics. The authors finally
make the following conclusions of which they speculate that either of them
might hold true in the light of the Zeno’s Paradox in Quantum theory they
evoked through the formalisms of Quantum mechanics and mathematics.
8
measurements
2. Measurements in real life are non-ideal, whereas zeno’s paradox is
based on the assumpt ion that measurements are ideal. And this very fact
might render the mathematical for malisms put forth to realize the effects
of the paradox might become invalid.
3. It may be wrong to assume the temporal evolution of a quantum
system can be described as a linear operator in time evolution. It might be
best described only in terms of persist ent interactions between the quantum
system and the classical measurement apparatus. when this is attempted
then the paradox might disappear.
4. Quantum mechanics is incomplete since it is not able to satisfactorily
explain the Paradox completely.
1.3 Conclusions
In the light of research done by quantum theorists in the recent past, the
conclusion is that there is no paradox in the phenomenon of QZE since
the quantum system is overwhelmed and in a way paralysed due to the
continual interactions of the measurement apparatus with the system, thus
not allowing the system to temporally evolve. Thus the quantum system
remains in its initial state in the light of continuous observations.
1.4 References
”Zeno’s Paradox in Quantum Theory” , Journal of Mathematical Physics,
Vol. 18, No. 4, April 1977
9
Chapter 2
Aravindan, CS03B002
Abstract
The Bit Commitment and Coin Flipping problems are first introduced and
examined their relation is also discussed. Then the Quantum variants of the
problems are discussed with an example. Then, perfect Quantum Bit Com-
mitment are individually proved to be impossible. A sample Quantum Bit
Commitment protocol is introduced and finally,some difficulties and general
observations are made regarding the two problems.
2.1 Introduction
Quantum Cryptography is an applied field of theoretical Computer Sci-
ence, where Quantum Mechanics is used to arrive at solutions for various
problems in Cryptogrpahy, dealing with security and privacy. Most of Clas-
sical Cryptography that is practised today are based on assumptions re-
garding the computational difficulty of cerrtain problems like the Discrete
Log Problem, Prime Factorization and the Quadratic Residuosity problem.
Classical Cryptogrpahy has been surviving for the last forty years or so only
because there weren’t any good algorithms to solve these problems. But
with the advent of efficient Quantum Algorithms for Factorization [1] and
all Hidden Subgroup Problems, there is now serious cause for concern among
Cryptographists. However, without the advent of the Quantum Key Disri-
bution protocol [2] people have also started coming up with protocols and
10
methods to perform Cryptography.
The Quantum Coin Flipping and Bit Commitment problem are such prob-
lems, with the the classical Coin Flipping having been first introduced by
Blum[3]. In this problem, two parties try to agree on a particular value(bit),
without any prior information, and with no direct communication. These
problems find a number in of applications like Oblivious Transfer and Secure
Mutliparty Computation(eg. e-voting) , in which more than one party try
to communicate and compute some particular function securely without any
of their individual data getting revealed. In this paper, in the first section,
we will look at a detailed description of the Bit Commitment and the Coin
Flipping problems and also look at how they are related. The second section
contains a study of the Quantum variants of the problem and we will also
look at some sample protocols for these problems.In the next section we will
go on to show the Impossibility of Unconditional Bit Commitment. In the
last we will take one of the Weak Coin Flipping protocols as a case study
and we will finally look at a few concerns and difficulties in this field.
11
Perfect Concealment:
Protocols having the perfect concealment property guarantee that even with
the iknowledge of cb , Bob gets no idea about b. Mathematically, if b’ is the
bit Bob guesses,
P rob(b′ = b|cb ) = P rob(b = b′ )
For Computational Concealment, we relax the requirement by stating that
any machine which has computationally (polynomially) bounded resources
should not be able to guess b any better.
Perfect Binding:
Protocols having perfect binding property guarantee that once Alice has
committed to a bit b, she can’t alter it. If b′A is the bit revealed by Alice
finally,
P rob(b′A 6= b) = 0
Protocols having Computational only dictate that computationally bounded
participants should satisfy the specified conditions.
It has been proved that protocols that are both Perfectly Binding and
Perfectly Concealing are impossible classically. We will show in the next
section that Perfectly Secure Bit Commitment is impossible Quantum me-
chanically too. Classically, perfectly binding and computationally hiding or
concealing have been realised using the RSA assumption and the Discrete
Log Assumption. Using Quantum mechanics it is easier to realize Conceal-
ment than Hiding.
12
2.2.3 Realizing Coin Flipping using Bit Commitment
A secure Bit Commitment protocol can be used as a black box to realize a
secure Coin Flipping protocol as shown below. Let the Commitment phase
be represented by Commit and the revealing phase by Reveal.
13
• Alice announces b and wi and Bob verifies if ∀i
Qi = Qwhenwi = Wi
This model proposed by Lo and Chau [5] covers almost all the protocols
that can be devised. Further the proof for impossibility presented below
can be easily extended to a very general model [8]. For example, in the
BB-84 based protocol,
1
| 0i = √ (| 0i⊗ |→i+ | 1i⊗ |↑i)
2
14
1
| 1i = √ (| 0i⊗ |րi+ | 1i⊗ |տi)
2
. Further, the measurement is performed before the commitment is opened
which makes the adversary weaker and hence this does more than enough.
Hence this model suffices for BB-84 model.
Perfect Concealment
Assume that perfect concealment exists. Hence Bob does not know whether
Alice sent qubits corresponding to b=0 or b=1 at commit stage. Therefore,
ρB B
0 ρ1 . i.e
T rA | 0ih0 |= T rA | 1ih1 |
By Schmidt decomposition,
p
| 0i = σk λk | sk iA ⊗ | θk iB
p
| 1i = σk λk | s′k iA ⊗ | θk′ iB
Since the system is different only in HB , a local Unitary operation on system
B, UB s.t UB | 0i =| 1i can be used to transform between the two qubits
and hence cheat by delaying her commitment from the Step 2 to Step 4.
Therefore Binding property is not satisfied.
15
Cheating Strategy:
2.5 Conclusions
Here in this article, we have introduced the twin problems of Bit Commit-
ment and Coin Flipping and their Quantum counterparts as well. We then
gave a construction for Quantum Bit Commitment protocols and also dealt
with the Impossibility proofs. In Quantum Bit Commitment, Concealing
property is easier while Binding becomes tougher because of Entanglement.
This is just the opposite for Coin Flipping protocols. Further, even if the re-
quired Quantum protocols do exist, security is not fully guaranteed by their
use, since a public verifiable certificate or proof is not available to the out-
side world. Whereas in clasical cryptography, the classical communication
is available for all to seeand verify , this is not the case with Quantum Cryp-
tography since by No Cloning theorem copies can’t be created. In this case,
the defeated party can always claim that the interaction never took place.
Hence the protocol should guarantee that sufficient classical communication
should take place so that is avoided .
16
Bibliography
[4] Lo, Hoi-Kwong, and H. F. Chau, ”Is quantum bit commitment really p
ossible?”, Phys. Rev. Lett. 78, (1997) 3410-3413.
[6] D. Mayers, following Letter, Phys. Rev. Lett. 78, 3414 (1997).
17
Chapter 3
Harshavardhan S, CS03B021
Abstract
No abstract has been provided!
3.1 Definitions
According to the third postulate ofP
Quantum Mechanics, a measure-
†
ment is a set of operators {Mm } (where m Mm Mm = I, m indicating the
output of the experiment), which when used to ”measure” a state |ψi would
†
yield an outcome m with a probability pm = hψ|Mm Mm |ψi, and produce a
Mm |ψi
resultant state pm . From the definition, it follows that pm = 1.
√
18
E(|ψi, M ) = hψ|m|ψi (3.2)
†
Suppose we replace Mm Mm term in the generalized measurement no-
†
tion with Em = Mm Mm (Note P that by definition {Em } is a set of pos-
itive operators such that m Em = I). Now, if we are not concerned
much with the output states of the measurement, we can do away with
the set {Mm } and instead use the set {Em } for obtaining the outcome
probabilities of measurements, pm = hψ|Em |ψi. This set {Em } consti-
tutes a POVM. In general any set of positive operators {Em } such that
P
m Em = I is a POVM, whose measurement outcomes have probabilities
hψ|Em |ψi. Also, given a set of POVMs {Em }, one can always define an
equivalent set of measurement operators such that the outcome probabil-
ities of both the sets of√ measurements
pP are same. Infact
P √ the measurement
operators set {Mm = Em = ξ |ψ
k k k ihψk | = k ξk |ψk ihψk |} is one
such construction.
√ Infact, any general measurement {Mk } can be expressed
as {Mk = U Ek } where {Ek } is a POVM and U is some unitary operator.
Coming to the relation between projective measurements and POVMs, the
effect of a projective measurement in a higher dimensional space is a POVM
in the lower dimensional space as shall be illustrated in section 2.2.
3.2 Applications
We now describe 2 applications of POVMs:
19
Consider the set S = {| ψ1 i, | ψ2 i}. The POVM {E1 = I−|ψ 1 ihψ1 |
norm. , E2 =
I−|ψ2 ihψ2 |
norm. , E3 = 1 − E1 − E2 } accomplishes the UQSD task for the set S. If
one makes a measurement of a state that is a member of set S and gets the
output 1, one can be sure that the state was | ψ2 i. On the other hand, if
the output was 2, then the initial state was | ψ2 i without any doubt. But
on the other hand, if the output is 3, then one cannot ascertain the identity
of the given state.
where X
(Ak )mn = (Pk )mr,ns (ρaux )sr . (3.4)
rs
20
P P P
Ak =
k ( k Pk )mr,ns (ρaux )sr
rsP
= P rs Imr,ns (ρaux )sr (3.5)
= rs Imr,ns (ρaux )sr δsr
= I.
P
Therefore, {Pk } = { r s(Pk )mr,ns (ρaux )sr } forms a POVM.
Here, the projective measurements in the extended space translated into
POVMs of the space of interest – which in general – is the case. A projective
measurement in a higher dimensional space appears in a lower dimensional
space as a POVM.
21
Pn ∗
PN ∗
i.e., if l=1 ψil ψjl + k=n+1 cik cjk = δij .
ψ11 ψ12 ... ψ1n c1,n+1 c1,n+2 ... c1N
ψ21 ψ22 ... ψ2n c2,n+1 c2,n+2 ... c2N
⇐⇒ M =
.. .. .. ..
. . . .
ψN 1 ψN 2 . . . ψN n cN,n+1 cN,n+2 . . . cN N
(3.6)
is such that M M † = I.
22
3.5 Information gain from a measurement
Given a set of states {ρi } with apriori probabilities {pi } and a measurement
strategy which yields the output µ with probability Pµi if the initial state is
ρi , the probability Qiµ that the initial state was ρi , provided that the output
is µ is
Piµ pi
Qiµ = P (3.9)
j Pjµ pj
3.6 References
[1] Asher Peres, Quantum Theory - Concepts and Methods.
[2] Nielsen, Chuang - Quantum Computation and Quantum Information.
[3] Preskill, Lecture notes for the Quantum Computation Course, Caltech.
23
Chapter 4
A Thermodynamic Approach
To The Measure of
Entanglement
Abstract
Here we present arguments inspired from Thermodynamic principles to show
that the von Neumann entropy is a measure of entanglement for a bipartite
system in a pure state.
4.1 Introduction
Quantum Entanlement is a remarkable phenomenon which finds applications
in quantum information processing. A good understanding of entanglement
is vital for the growth of the field of quantum information theory. A signif-
icant problem without conclusive answers is the question of what measure
of entanglement to associate with a given state of a system. Many ad-hoc
measures have been suggested for different cases but no conclusive mea-
sure for the most general state has been agreed upon. Here we look at a
pure state and present arguments to show that the von-Neumann entropy
of the reduced density matrix is the measure of entanglement for a bipartite
system.
24
4.2 Entanglement of a Pure State
There is a lot of similarity between the principles of Thermodynamics and
Entanglement. This is because of inherent similarities in the way the quan-
tities are defined in the two fields. Also there is an inherent similarity at
a more formal level. There is a principle that Entanglement obeys which
is the analogue of the second law of Thermodynamics. The second Law of
Thermodynamics says that it is impossible to construct a perpetual motion
machine. This directly implies that two reversible engines operating between
the same temperatures are equally efficient. The formal correspondence with
entanglement is as follows: The laws of nature are such that it is impossible
to increase the entanglement between remote systems by local operations
alone. Here local operations include unitary operations, measurement and
classical communication between the two remote systems. The analogue of
a reversible engine here is a reversible transformation. Suppose Alice and
Bob are two experimenters who are separated in space. Suppose they carry
between them k entangled pairs of qubits, with one member of each pair
with Alice and the other with Bob. Additionally, let us also suppose that
there are further pairs of qubits at the disposal of our experimenters. Also
each of the k pairs that are entangled are identical in the state of entan-
glement. Now suppose Alice and Bob perform local reversible operations to
transfer the entanglement to n pairs. Even if n ≥ k there is no violation of
the above law because the amount of entanglement in each of the n pairs
may now be less than what was there before. Now, we put forth the ques-
tion: Is it possible to that in the process entanglement has got destroyed? In
′
other words, is there is superior transformation, which would require only k
′
pairs, where k ≤ k to finally give the final state of the n pairs obtained by
the previous transformation? We can invoke our principle here to show that
′
this is not possible. For, if such a k did exist, then we could perform an
′
initial transformation from the k pairs to the n pairs and then, use the other
transformation (since it is reversible) to arrive at k pairs. So effectively, by
the end of this procedure we have succeded in increasing the entanglement
′
from k entangled pairs to k pairs finally, thus violating the principle stated
′
above. Therefore, k = k . So, from the discussion above, we have shown
that the entanglement content of the k pairs is equivalent to the entangl-
ment content of the n pairs obtained by local reversible transformations.
The reversible transformations we have considered are in fact, consistent
with quantum mechanics. Bennett, Bernstein, Popescu and Schumacher [2]
have shown that it is possible, with local operations only to transform k
25
′
E
systems in an entangled state ψAB into n systems in a different entangled
state |ψAB i. The transformation is reversible when the number of systems
becomes arbitrarily large. That is, the ratio, n/k is a constant in the limit
k → ∞. And without loss of generality, we may choose the final n pairs to
be the singlet states which are all maximally entangled. So, our problem
effectively reduces to finding the entanglent content of n pairs of singlets.
Next, we ask the question: what function of n would be a suitable measure
of the entanglement content of the n singlets. Again we appeal to thermo-
dynamic principles for the answer. Reversibility requires us to go to the
limit of infinite n, and for infinite n, there is no way we can define the en-
tanglement content. So we will have to define the entanglement per system.
We borrow the formal principle from thermodynamics: the thermodynamic
limit requires us to define intensive quantities. Therefore we must have en-
tanglement of n singlets proportional to n. Therefore, we can say that the
entanglement of the k systems in the state |ψAB i is equal to the entan-
glement content in n systems in the singlet state |SAB i. That is, we have
kE(|ψAB i) = nE(|SAB i), where E denotes the entanglement measure. Thus
n
E(|ψAB i) = lim E(|SAB i) (4.1)
n,k→∞ k
The proportionality constant E(|SAB i) simply defines a conventional limit
and we set it to 1. We have shown that the measure of entanglement for
pure states is got from the limit above. Now it remains to compute the
limit. Bennet, Bernstein, Popescu and Schumacher [2] have computed this
limit: E(|ψAB i) equals the entropy of entanglement of the state |ψAB i. The
entropy of entanglement is the von Neumann entropy of the reduced den-
sity matrix seem by either Alice or Bob, and equals the Shannon entropy
of the squares of the coefficients of the entangled state in the Schmidt de-
compostion[2]. The entropy of entanglement is zero for a pair of systems in
a product state and it is one for a pair of systems in the singlet state; it is
never negative. Also the measure is intensive as required from arguments
above. A qualitative understanding of this result may be obtained as fol-
lows. It is clear that both entanglement and entropy are very closely related
concepts because, each of these quantities, in a sense, is a measure of the
lack of information we have of the system. Now, from the point of view of
either Alice or Bob, the only information they have of their own subsystem
is contained completely in their respective reduced density matrix. This
reduced density matrix may be interpreted as a mixed state with different
probabilities for the different states in which the respective subsystem can
exist. The measure of entropy that may be obtained from this set of prob-
26
abities is the Shannon entropy and this can be reasonably taken to be a
measure of the entanglement of the system, because it is the measure of the
lack of information of the exact state of either sub-system. This is also the
von-Neumann entropy by definition.
4.3 Conclusions
We have first established, using arguments taken from the related field of
thermodynamics, a limit equation to obtain the entanglement of a pure
state. We have then provided qualitative arguments for the result that the
calculation of the limit leads to von-Neumann entropy as the measure of
entanglement for a bipartite entangled system.
References
1. S. Popescu, D. Rohrlich, arXiv: quant-phy/9610044
27
Chapter 5
Abstract
A Seminar Report done as a part of the Course on Quantum Computation and
Quantum Information Theory
5.1 Introduction
Bell’s pioneering paper showed that, when measurements are performed on
two quantum systems separated in space then their results are correlated in
a manner, which is not explained by a local hidden variables model. The
main problem, that has not been answered even today is the classification
of Quantum states into local and non local ones. The case for pure states is
fully solved, but for mixed states only partial results are known. In the paper
that I reviewed, Sandy Popescu gives strong arguments for his contention
that we have to rethink the usual way we think about Bell’s Inequalities
when we talk of mixed states.
28
QS + RS + RT − QT = (Q + R)S + (R − Q)T = ±2.
−Z√
2 −X2 Z2√
−X2
Let, Q = Z1 , R = X1 , S = 2
, T = 2
, then
√
E(QS) + E(RS) + E(RT ) − E(QT ) = 2 2
The above state violates the inequality. The basic question of which pure
states are classical and which are not can be answered without going be-
yond the usual scheme. Every entangled pure state violates some usual Bell
inequality and hence is non local. The only pure states which do not yield
non local correlations when a single ideal measurement is performed are the
Direct Product states for which no further analysis is required.
29
are subjected to single ideal measurements, the corresponding results are
classical but when subjected to more general measurements the correspond-
ing correlations are non classical. In our case the more general measurement
is just two successive single ideal measurements.
30
eigenstates belong to the subspaces {|1i1 , |2i1 } and {|1i2 , |2i2 }, respectively.
The eigenvalue 0 is highly degenerate and corresponds to the rest of the
Hilbert space. The nondegenerate part of these operators are choosen in
such a way that they yield maximum violation of the CHSH inquality for
the singlet state |S12 i. That is,
√
hS12 |AB + AB ′ + A′ B − A′ B ′ |S12 i = 2 2.
Now let us what happens if we subject an ensemble of pairs of particles in
the Werner state to the measurements described above. According to the
results obtained in the measurements of P and Q the original ensemble splits
into four sub ensembles given by {0,0}, {0,1}, {1,0}, {1,1}. The important
point we have to note here is, if the initial ensemble was classical, behaving
according to a hidden variable model, then each of the subensembles is
classical. But then we get a contradiction with the Quantum mechanical
predictions. The ensemble corresponding to P = 1 and Q = 1 is given by,
P QW QP 2d I (2x2)
W′ = = ( + |S12 ihS12 |)
N 2d + 4 2d
Where N is a normalization factor. In this state the CHSH inequality is
violated.
2d √
T rW ′ (AB + AB ′ + A′ B − A′ B ′ ) = 2 2 ≥ 2, f ord ≥ 5.
2d + 4
5.5 Conclusions
In conclusion, although a local hidden variable model can simulate all the
correlations which arise when only a single ideal measurement is performed
on each of the two particles, such a model cannot account for the correla-
tions which arise when two consecutive measurements are performed on each
particle. So when we have to talk of entanglement and locality for mixed
states then we also have to talk in terms of more general measurements.
This example clearly shows that a Bell inequality type of an approach is
inadequate to talk of entanglement properties of Mixed states.
5.6 References
1. Bell’s Inequalities and Density Matrices: Revealing ”Hidden” Nonlocality
- Sandy Popescu, PRL-2619-1995.
2. R.F.Werner - Phys Rev A 40, 4277(1989).
3. Nielson and Chaung - Quantum Computing and Quantum Information.
31
Chapter 6
Approximate Quantum
Cloning
Abstract
Vinoth has not supplied any abstract!
6.1 Introduction
Lets consider a quantum state |S >a in a two-level space with the basis
denoted by |0 >a and |1 >a , to be made copy of. The subscript ’a’ just
denotes that the state corresponds to original system which is to be copied.
|S >a is a linear combination of |0 >a and |1 >a which when fed into a
quantum-copying machine(QCM) in addition to |S >a , will give copy |S >b
identical to original state— Qualitatively a QCM can be understood as
Here subscript ’b’ denotes the copy state, |K >b can be any state which acts
like a blank paper in a copying machine for practical purposes it may be
assumed as |0 >b . To simplify the notation we can eliminate this |K >b . So
QCM can be simply written as
Now the question arises, will quantum mechanics allow such kind of QCM,
answer is ”NO” thus no-cloning theorem comes into picture.
32
6.1.1 No-Cloning Theorem
This tells us that quantum states cannot be cloned ideally for a arbitrary
input state, its later extended to even mixed states. It was shown that if
a arbitrary mixed state is sent through a QCM the two states which result
out whose reduced density operators are not identical. Now question arises
if we cannot make exact copy how close a copy can we come up with.
Approximate copying is important in fields like quantum cryptography and
quantum computing, where if we can have a measure of how similar the
copy is, we can actually copy the required information in that fraction of
the copy, in other words we will take in the part of the information which
was copied and eliminate the rest of it, for our given practical purpose.
We now try to look into three different QCMs.
Then we will try to see about the entanglement of the copy state and the
original sate i.e. |S >b and |S >a . this is important because any measure-
ments made on the state |S >b would effect the original state |S >a
x< Q|Q >x = x < Q0 |Q0 >x = x < Q1 |Q1 >x = 1 (6.5)
x< Q0 |Q1 >x = x < Q1 |Q0 >x = 0 (6.6)
take a input state |S >a = α|0 >a + β|1 >a then,
|S >a |Q >x −→ α|0 >a |0 >b |Q0 >x + β|1 >a |1 >b |Q1 >x (6.7)
33
Where Hilbert-Schmidt norm of a operator A is defined as ||A|| = T r(A ∗ A)
This can be used as a measure of similarity between to density matrices.
Better measure of similarity is given by fidelity measure, which is defined as
ρ(id) a = α2 |0 >a < 0| + αβ|0 >a < 1| + βα|1 >a < 0| + β 2 |1 >a < 1| (6.11)
To complete the the picture we define the third distance measure between
the ideal density operator and the product of independent density operators.
(3) 2
Dab = T r[ρ(id) ab − ρ(out) a ∗ ρ(out) b ] (6.15)
Where,
ρ(id) ab = ρ(id) a ∗ ρ(id) b (6.16)
34
ρ(out) ab = T rx [(ρ(out) abx )] (6.17)
ρ(out) a = T r[b (ρ(out) ab )ρ(out) b ] = T r[a (ρ(out) ab )] (6.18)
by simple mathematics it can be shown that
D1 ab = Da ∗ Db (6.19)
D(2) ab = Da + Db (6.20)
(3)
Dab = Da + Db − D (1) ab (6.21)
Da maximum at |S >a = |+ >a or|− >a This copying would be worst for
those states.
35
we will solve for e and n such that this distance D (2) ab is independent of
input state i.e the value of D (2) ab does not contain the term α. by
mathematical simplification we can find e = 1/6 and n = 2/3 D (2) ab would
be then input state independent and is equal to 2/9
Using this information we can also fine the states as
√ √
|Y0 >x = [ (1/6), 0] |Y1 >x = [0, (1/6)]
√ √
|Q0 >x = [0, (2/3)] |Q1 >x = [ (2/3), 0]
We can find that |Y0 >x = (1/2)|Q1 >x & |Y1 >x = (1/2)|Q0 >x Then
the QCM simplifies to
√ √
|0 >a |Q >x −→ (2/3)|00 > | ↑> + (1/3)|+ > | ↓> (6.30)
√ √
|1 >a |Q >x −→ (2/3)|00 > | ↓> + (1/3)|+ > | ↑> (6.31)
|0 >a |Q >x −→ [|0 >a |1 >b + |1 >a |0 >b )|Q1 >x (6.33)
|Q >x and |Q1 >x are initial and final states of the copying machine.
This QCM duplicate one basis completely and other is completely changed,
in fact |0 >a is transformed to a state which doesnot have overlap with its
perfect copy state,|0 >a |0 >b to the matter of fact it creates copies of the
states in the neighborhood of |1 >a Now lets try find the efficiency of copy
in the given neighborhood, consider the state
36
√
|1 >a |Q >x −→ (1/2)[|11 > |Q1 >x + |00 > |Q0 >x ] (6.37)
√
|0 >a /Q > x −→ (1/2)[|01 > +|10 >]|Q1 >x (6.38)
6.5 Conclusions
No-cloning theorem prohibits the idea of a arbitrary quantum state to be
completely duplicated. But if one relaxes on the idea of complete replication,
we can define different Quantum Copying Machine which can perform the
work of copying the given states to the required accuracy. Thus we defined
few QCMs and tried to estimate the quality of the copy by using the distance
measure. Main problem with these QCMs is that the resulting copy and the
original are entangled hence they cant be treated independently i.e. in any
measurement is made on either element other gets effected automatically.
6.6 REFENENCES
V. Buzek & M.Hillery, Quantum copying: beyond no-cloning theorem; Phys-
ical Review Volume 54,Number 3: September 1996
37
Chapter 7
J. Karthik MT02B011
Abstract
The single qubit and CNOT gates are shown to be universal for quantum
computation Here we explicitly construct the solution and prove that CNOT
and single qubit gates are enough to approximate any unitary operator to
arbitrary accuracy.
7.1 Introduction
A set of gates is said to be universal for quantum computation if any unitary
operation can be approximated to arbitrary accuracy by using a circuit
involving these gates only Here, we prove by construction that single qubit
and CNOT gates are universal.
The first construction shows that any unitary operator can be expressed
as the product of unitary operators each of which acts on a subspace spanned
by two computational basis states. The second construction proves that
any 2-level unitary operator can be approximated using a circuit containing
single qubit and CNOT gates. This completes the proof.
38
unitary operator U can be decomposed into a product of two-level unitaries.
Considering a 3x3 unitary U
a b c
U= d e f
g h j
where, U1 U = ′ ′ ′
a d g
′ ′
U1 U = 0 e h
′ ′ ′
c f j
√ √
p = a2 + b2 and q = a′ 2 + c′ 2
Now we find that
′′ ′′
1 d g
′′ ′′
U2 U1 U = 0 e h
′′ ′′
0 f j
Since U2 , U1 and U are unitary it follows that their product is also unitary.
′′ ′′
Therefore g and d are 0. Finally, if we set U3 to be equal to
1 0 0
′′ ′′
U2 U1 U = 0 e ∗ h ∗
′′ ′′
0 f ∗ j ∗
39
If U acts on a d dimensional space we find two-level unitary matrices U1 ,
U2 . . . Ud−1 such that Ud−1 Ud−2 . . . U1 has a 1 in the top left hand corner
that zeroes everywhere else in the first row and column. We then repeat the
procedure for the d − 1 by d − 1 submatrix and so on. We finally obtain
matrices V1 , V2 etc such that U = V1 V2 . . . Vk where k is at the most equal
to (d − 1) + (d − 2) + . . . + 1.
Thus, by construction it is proved that any unitary matrix can be written
as a product of two-level unitaries.
Bibliography
1. Michael A. Nielsen and Isaac Chuang, Quantum Computation and
Quantum Information, Cambrige University Press, Cambridge, 2000
40
2. K. R. Parthasarathy, Lectures on Quantum Computation and Quan-
tum Error Correcting Codes, Indian Statistical Institute, 2001
41
Chapter 8
Realization of Physical
Quantum Computer
Abstract
In my present study I am going to give difference between classical computer
and Quantum computer,Requirements to make quantum computers, Different
ways to to get these requirements, difficulties to implement it and some details
of making it by CQED (one atom and one photon method) and Quantum Dot.
8.1 Introduction
Present is the age of computer.We can not imagine our daily life without
computer.The decrease in size as well as the increase in speed of classical
computer has its limitation due to quantum confinement effect,switching
speed (due to saturation current) and leakage current.To improve the speed
further and decrease the size we have to think new ways to implement
computer which are the Quantum Mechanical ideas(superposition princi-
ple).These Quantum Mechanical ideas give the effective parallelism called
Feynman Quantum Parallelism i.e. inputs are processed (transformed)
to outputs in one step via a unitary operation which increase the speed dras-
tically and size also.The challenge is to implement or design Hamiltonian
interaction which evolve the system such that the states are transformed as
our will.The statement ”design Hamiltonian interaction and the operation
(Unitary) that transform inputs into outputs”is the core problem to make
a Quantum Computer.
42
8.2 Difference between Classical and Quantum Com-
puter
Computation is the process which transforms inputs to output.
(1)In case of classical computers or presently existing computers the number
of input may be one or more but output is only one while in case of quantum
computer the number of inputs and outputs are same.
(2)In classical computer output is come from multiple steps while in quan-
tum computer output is come from only one step.All the results are there
in in the output with certain finite probability.
(3)In classical computer the fundamental unit of information are binary
number or Bit while in quantum computer fundamental unit is Qubit not a
binary but more Quaternary in nature.
(4)In classical computer information is encoded in a series of bits, and these
bits are manipulated via Boolean logic gates arranged in succession to pro-
duce an end result while a quantum computer manipulates qubits by exe-
cuting a series of quantum gates, each a unitary transformation acting on a
single qubit or pair of qubits and the succession of gates perform a unitary
transformation to a set of qubit with some initial states.The qubit can then
be measured which gives the output computational result.
43
device”.The interaction may be considered as quantum measurement.The
measuring device or environment can entangled with the system.Both sys-
tem and environment must evolve in same state but if environment has many
degree of freedom then it not happens so i.e.system behaves like classical sta-
tistical ens emble rather than superposition state.Decoherence is extremely
fast process in macroscopic objects.It is difficult to maintain superposition
state of many particle system in which each particle may separated from all
other.
8.3.3 Detection
This process requires the interaction between measurement apparatus in an
irreversible way which gives whether each qubit is either in 0 or 1 state.
8.3.4 Scalability
The difficulty for performing gates, measurements, etc. should not grow
(exponentially) as the number of qubits increases otherwise, the gain in
quantum algorithms would be lost.
8.3.5 Erase
We must able to prepare the initial state of the system e.g 0 state in com-
putational basis.
The most important problem is the necessity of finding quantum system with
sufficient isolation and a controlled interaction.There are very few systems
which fulfills the above requirement of making Quantum Computer.
44
Ion Trap (In+ ): DT is 10−3 , OT is 10−7
Optical Cavity QED: DT is 10−5 and OT is 1014
Quantum Dot: DT is 10−6 and OT is 10−9
Electron Spin: DT is 10−3 and OT is 10−7
Electro GaAs: DT is 10−10 and OT is 10−13
45
| gi | n + 1i or | gi | n − 1i gives‘ the general solution as
√ √
| ψ(t)i = cos(λt n + 1) | ei | ni − i sin(λt n + 1) | gi | n + 1i (8.4)
√
Rabbi frequency is define defined as Ω = 2λ n + 1
If Ωt = π/2 then we can get entangled state for no photon in excited sate
and one photon in ground state
√
| ψπ /2i = 1/ 2(| e, 0i − i | g, 1i) (8.5)
and for all other Ω t it can be used for different type of operations on
the qubit.
8.5 Conclusions
Using two level atom interact with radiation field we are able to make qubits
which is first requirement and we can realize phase gate as well as Hadamard
gate.Two atom trapped in optical lattice can able to manipulate second atom
conditionally by the first atom i.e. we can treat it as Controlled Phase gate
(C-NOT gate).Science Quantum Dots can be assumed as artificial atom
embedded on a surface can also be used for the same purpose which can be
handled easily.
To make a physical quantum computer we need well isolated qubits which
can be manipulated in controled way and must maintain its superposition
state (less Decoherence) for a long time to extract informatin from that.
8.6 Reference
Books
Experimental Quantum Computation and Information Course CXLVIII
Pub:Societa Italiana De Ficica Bolona-Italy
Introductory Quantum Optics by C.Gerry and P.Knight Pub:Cambridge
University.
Paper
T.Radke and S Fritzsche Computer Physics Communications 173(2005Aug)91-
113
M.G Tanner D.G Haske D.A Williams Microelectronics Engineering xxx(2006)xxx
xxx
46
Chapter 9
Abstract
In 1999 Anton Zeilinger and his colleague at the university of Vienna demon-
strated the wave nature of C60 molecules[1]. An obvious motivation for doing
experiements with such large particles is the everyday experience that particle
don‘t spread like wave,rather they have a well defined position whenever they
are observed.While microscopic objects like electron,nuetron etc. shows wave
like behaviour in some situations.How to understand this quantum to classical
transition;linking to incompatible description of reality? It turns out to that
macroscopic C60 molecules also show wave like behaviour if all the sources of
decoherence are eliminated from the experimental set up.This strenghen wave
particle daulity as one of the fundamental principle of nature.
9.1 Introduction
Albert Einstien one of the great thinker of 20th century proposed the idea
of duality of light in order to explain photo-electric effect in 1905. Carrying
further his idea Louis-Victor de broglie proposed the idea of wave particle
daulity in 1924. He gave a relationship between momentum of particle and
wavelength associated with it. The idea was this if light can behave in some
situations as wave and in some other situations as particle than matter
particles should also behave like that. This idea is one of the corner stones
of quantum mechanics.
It was 1927 when first experiemental proof of wave particle daulity was
47
given by Davision and Germon for microscopic particles.They observed the
diffraction of electron on Ni crystal. After that in 1930, Esterman andStem
made a beam of healium atom diffracted on the surface of a Nacl crystal.
Ater that many more experiements were performed using microscopic small
particles like to show wave particle daulity.
In 1999 Zeilinger and his group has shown that C60 molecule shows wave
like nature. It provides solid proof of the idea of wave particle daulity as a
fundamental princile of nature.It is now well stablished fact that decoher-
ence is the process which destroy this wave nature and make our everyday
experiencce classical.
9.1.1 Decoherence
Decoherence is the process which makes a quantum system behave like a
classical system. It arises because of interaction of system with environment
and measuring instrument.Because of this system gets entangled with the
wavefunction of environment and we loose phase infromation. Processes
which cause decoherence are following
1.Emission of radiation
2.Absorption of radiation
3.Collision
4.scattering
There are mathematical models by which decoherence can be explained[2].
Let us assume that system is in state
| Ψi = a | 0i + b | 1i (9.1)
with aa∗ +bb∗ =1 at time t=0. So at time t=0 we have density operator
aa∗ ab∗
ρ= (9.2)
a∗ b bb∗
Now suppose that system can evolve with probability p by the unitary trans-
formation U1 and by probability (1-p) by the uniary transformation U2 .
Then at time t=t we have the density operator
48
λ and centred at zero.Then at time t=t the state of the system is gven by
Z∞
aa∗ ab∗ e−λ
−θ 2
†
ρ= R(θ)ρR (θ)e 2λ2 dθ = ∗ −λ (9.4)
a be bb∗
−∞
Here off diagonal elements of the density matrix depend uopn the variance of
guassian distributation of the random variable angle. Off diagonal elements
of the density dies exponentially as variance increases and so as the phase
coherence between two states dies exponentially. if the diagonal elements
are zero then the system will behave like a classical system.
49
Figure 9.2: Experimental Set-Up
9.3 Conclusions
The interference pattern produced by C60 molecules clearly shows a cen-
trel maxima and first order maxima and minima which can be fitted using
kirchoff diffracton theory. This is a clear manifestation of the wave nature
of C60 molecules like other microscopic particle. Position of the maxima
depends on the temperature of molecules, grating period, distance between
grating and detector.The most probable velocity of C60 molecules is 220 m/s
at 900K.Debroglie wavelength of molecules at this velocity is 2.5pm which
has been calculated using λ = h/M v,here M is mass of a C60 molecule.This
50
Figure 9.3: a,diffraction pattern of C60 molecules and b,pattern without
grating
shows that a single molecule as a whole travels in the path and don‘t get de-
composed into fragments in the path.Now to destroy interefernce we need to
have some means by which we can have path information of the molecule.But
to have path information we need λ ≪ d. So the wavelength 418 nm of the
laser is not sufficient to induce decoherence by single photon scattering but
multiple photon can induce decoherence that is why we have to use as low as
possible photons for detecting molecules. Other processes which can cause
decoherence is emission of photon due to vibrational energy and rotationalal
energy,scattering due to air molecules. At T=900 K, as in their experiment,
each C60 molecule has on average a total vibrational energy of Ev = 7 eV
[3] stored in 174 vibrational modes, four of which may emit infrared radia-
tion at λvib = 719 m [4] each with an Einstein coefficient of Ak 100 s−1 [3].
During its time of flight from the grating towards the detector (τ ≈ 6ms) a
C60 molecule may thus emit on average 23 such photons.
In addition, hot C60 has been observed[5] to emit continuous blackbody
radiation, in agreement with Planck’s law, with a measured integrated emis-
sivity ofǫ = 4.5(±2.0) × 10−5 [3]. For a typical value of T 900 K, the average
energy emitted during the time of flight can then be estimated as only Ebb
= 0.1 eV. This corresponds to the emission of (for example) a single photon
at lambda 10 m. Absorption of blackbody radiation has an even smaller in-
fluence as the environment is at a lower temperature than the molecule.And
in last mean free path of molecules at pressure 5 × 107 mbar and 900K is
51
100 m so colossion with background air molecules can be neglected.So all
the source of decoherence has been eliminated in the experiment and as a
result diffraction pattern formed.
Observation of quantum interference with fullerenes also shows that for
obserbing interference high symmetry of molecule is not necessary. fullerenes
are found as a 50-50%mixture of highly symmetric 12 C60 and less symmetric
12 C 13 C and 12 C 13 C isotopomeric variants.Interesting thing is that all
59 58 2
the fillerenes contribute to interefence because if this was not the case then
the background count would be very high.
So finally I can conclude that if all the sourece of decoherence can be
eliminated then we will be able to see wave nature of particles in our day to
day life.
9.4 References
1. Markus Arndt, Olaf Nairz, Julian Vos-Andreae, Claudia Keller, Gerbrand
van der Zouw, Anton Zeilinger. Nature 401, 680-682 (14 Oct 1999) Letters
to Editor
2. Quantum Computation and Quantum Information.Michael A.Nielsen &
Isaac L.Chuang. Edition 2000.
3. Kolodney,E., Budrevich,A. & Tsipinyuk B. Unimolecular rate constants
and cooling mechanisms of superhot C6 0 molecules. Phys. Rev. Lett. 74,
510-513 (1995).
4. Krtschmer,W., Lamb,L. D., Fostiropoulos,K. & Huffman,D. R. A new
form of carbon. Nature 347, 354-358 (1990).
5. Mitzner,R. & Campbell,E. E. B. Optical emission studies of laser des-
orbed C6 0. J. Chem. Phys. 103, 2445-2453 (1995).
52
Chapter 10
Experimental test of
quantum non-locality in
three photon GHZ
entanglement
Dileep.M, PH04C021
Abstract
Bells theorem finds a conflict between quantum physics and local realism. Sim-
ilarly when we observe the three photon GHZ states the same conflict remains
out aim is study these quantum physical and local realisms to get the proof of
the conflict.
10.1 Introduction
Bells theorem states that certain statistical correlation predicted by quan-
tum physics for measurements on two particle systems can not be understood
within a realistic picture based on local properties of each individual particle
even if they are separated by large distances.
It was discovered that there is a conflict between quantum mechanical
and local realistic predictions. But verifying this is very difficult as it requires
entanglement between at least three particles.
Here in this article, we are reporting an experimental confirmation of
this conflict using a method to observe three photon entanglement or GHZ
states.
53
Figure 10.1: Experimental set-up for GHZ tests of quantum nonlocality
54
last PBS or HH and transmitted. The photon at D3 was therefore H or V,
respectively. Both possibilities are made indistinguishable by having equal
path lengths via ~a and ~b to D1 (D2) and by using narrow bandwidth filters
(F ≈ 4 nm) to stretch the coherence time to about 500 fs, substantially
larger than the pulse length. This effectively erases the prior correlation
information and, owing to indistinguishability,the three photons registered
at D1, D2 and D3 exhibit the desired GHZ correlations predicted by the
state of equation [10.1], where for simplicity we assume the polarizations at
D3 to be defined at right angles relative to the others. Polarizers oriented
at 45deg and l/4 plates in front of the detectors allow measurement of linear
H ′ /V ′ (circular R/L) polarization from which we can compare the results
with the prediction made by quantum physical and local realism. Let us
take the entangled three particle state
1
|ψi = √ (|Hi1 |Hi2 |Hi3 + |V i1 |V i2 |V i3 ) (10.1)
2
Where H and V denote horizontal and vertical linear polarization resp. If
we do the measurements of linear polarization along direction H/V rotated
by 45 degrees with respect to H/V or of circular polarization L/R. these
new polarization can be expressed in terms of original one as
1
|H′i = √ (|Hi + |V i)
2
1
|V ′i = √ (|Hi − |V i)
2
1
|R′i = √ (|Hi + i|V i)
2
1
|L′i = √ (|Hi − i|V i)
2
For our convenience we use the notation one of H/V as x measurement and
one of R/L as y measurement.One obtains quantum prediction for measure-
ments of these new polarizations. For example, measurements of circular
polarization on say photon 1,2 and linear polarization on photon 3 denoted
by yyx experiment The state will become as
1
|ψi = (|Ri1 |Li2 |H ′ i3 + |Li1 |Ri2 |H ′ i3 + |Ri1 |Ri2 |V ′ i3 + |Li1 |Li2 |V ′ i3 )
2
(10.2)
From the expression we can say that
1. the result obtained is maximally random
55
Figure 10.2: A typical experimental used in the GHZ argument
56
Figure 10.3: Predictions of quantum mechanics and of local realism
From this the local realistic possible result for XXX is given by the wave
function.
1
|ψi = (|H ′ i1 |H ′ i2 |H ′ i3 +|H ′ i1 |V ′ i2 |V ′ i3 +|V ′ i1 |H ′ i2 |V ′ i3 +|V ′ i1 |V ′ i2 |V ′ i3 .
2
(10.3)
From these things we can conclude that none of the local realistic model
predicts none of the terms that was previously predicted by quantum ap-
proach. This is the GHZ contradiction between local realisms and quantum
physics.
From the above fig we can see that experimental results are more in
agreement with the quantum physics.
In Bells inequalities for two photons, the conflict between local realism
and quantum physics arises because of statistical prediction. But in case of
GHZ states the conflict arises even for the case of definite prediction.
57
There are some doubts weather such a experimental setup can be used for
local realisms But this has been disproved recently. The procedure permits
valid GHZ test for local realism In essence both Bell and GHZ argument
exhibit a conflict between detection events and the ideas of local realism.
Here what we did was, we first conducted three spatially separated po-
larization measurements. If the results obtained are in agreement with the
prediction for a GHZ state.Then for an XXX experiment, our consequent
experiment using a local realistic theory is exactly the opposite of our ex-
pectation using quantum physics.
10.3 Conclusion
From the experiment we proved the conflict between quantum physics and
local realisms. We observed that the experimental results are in agreement
with the quantum physics and but in conflict with the local realisms.
10.4 Reference
Zeilinger et. al, NATURE, VOL 403, 3 FEBRUARY 2000.
58
Chapter 11
Abstract
No abstract was provided
11.1 Introduction
The Bell inequality is given by
We find that this inequality does not hold for the maximally entangled state,
| ψi = |01i−|10i
√
2
and for the operators, √ √
Q = Z1 , R = X1 , S = (−Z2 − X2 )/ 2 and T = (Z2 − X2 )/ 2
We find that the Bell inequality√is violated for the case presented, the
sum of average values is less than 2 2 and not 2. Hence, there should have
crept into the derivation some flaw. The flawed argument is that of ’locality’
and ’realism’ which we define as below.
Realism is the assumption that physical properties PQ , PR , PS , PT have
definite values Q, R, S, T independent of any observation. It means that
the Moon exists even when nobody is looking at it.
Locality is the assumption that Alice performing her measurement does
not influence result of Bob’s measurement and vice versa. Therefore, both
can carry out their measurements without any effect on each other.
59
11.2 The Basis Sets and The Operators
In this report I have given a proof that quantum mechanics is essentially
nonlocal if we assume realism. It is a general proof, it however comes with
a caveat; it fails for states which are maximally entangled.
Consider basis set for two particles comprising of orthogonal states |
+ii and | −ii We can write any two particle general entangled state as a
Schmidt decomposition as,
| −ii = ia | ui ii + b∗ | vi i (11.5)
with the inverse relations easily obtainable as,
For reasons that will be subsequently explained, we equate first term of the
above equation to zero i.e. a2 /α = −b2 /β = k2 , say. This implies,
√ p
a = k αandb = ik β (11.9)
60
Having got so far writing the equations, we will introduce another basis
set which is
| ci i = A | ui i + B | vi i (11.13)
| di i = −B ∗ | ui i + A∗ | vi i (11.14)
whose inverse relations cen be obtained as,
| ui i = A∗ | ci i − B | di i (11.15)
| vi i = B ∗ | ci i + A | di i (11.16)
where we have defined coefficients A and B as,
√
αβ |α| − |β|
A= p and B = p (11.17)
1 − |αβ| 1 − |αβ|
| Ψi = N (| c1 i | c2 i − A2 | u1 i | u2 i) (11.18)
where
1 − |αβ|
N= (11.19)
|α| − |β|
Substituting equations (13) and (15) in equation (18), we have the two-
particle entangled states written in following four equivalent forms. In short,
what we are doing here is generating basis sets such that in the 4 forms given,
we have in 1st form both the particles in | ui i, | vi i basis, in 2nd form, particle
one in | c1 i, | d1 i basis and particle two in | u2 i, | v2 i basis and so on.
| Ψi = N (AB | u1 i | v2 i + AB | v1 i | u2 i + B 2 | v1 i | v2 i) (11.20)
61
(23). We measure U1 and U2 on (20), since there is no term of the form
| u1 i | u2 i , we have,
U1 U2 = 0. (11.24)
We also measure D1 and U2 on (21), U1 and D2 on (22) and D1 and D2 on
(23). In (21), only | d1 i | u2 i term contains | d1 i, therefore, we have,
if D1 = 1 then U2 = 1. (11.25)
if D2 = 1 then U1 = 1 (11.26)
D1 = 1 and D2 = 1 (11.27)
62
11.4 The Caveat
This proof, although good enough for any general two-particle entangled
state, fails for maximally entangled state. It is mentioned earlier that the
probability of getting outcome (25) is |N A2 B 2 |2 . Using values of A, B in
equation (17) we write denoting the probability by γ,
2
γ = (|α| − |β|)2 |αβ|
(11.28)
(1 − |αβ|)2
11.5 References
1. L. Hardy, Phys. Rev. Lett., vol. 71, no. 11, pg. 1665 (1993).
2. Quantum Computation and Quantum Information, M. A. Nielsen and I.
L. Chang, Cambridge Univ. Press, 1st edition, 2002.
63
Chapter 12
Abstract
In 1998 Agrawal et al worked on the isomorphisms of complete sets.And the
main theorem they used there is Isomorphism theorem[1]. This theorem states
that all sets that are complete under(non-uniform) AC0 reductions are isomor-
phic under isomorphisms computable and invertible via(non-uniform) depth-
three AC0 circuits. In that paper some questions were left open. Later in
2001[2] he proposed some theorem to give the answer of all those question.
And in my work I have described the questions left open at that paper and
try to realize the theorem proposed by him to understand the answer of those
question.
12.1 Introduction
The computational problems are devided according to the difficulty to solve
the problem. Now there exist some suitable complexity classes[3] under
which many of the computational problem can turn out to be complete,
even under very restrictive notions of reducibility. Now in our present case
we will first try to realize the complexity classes(Section 2), and different
kind of problems under the complexity classes. In this present work to un-
derstand the theorem proposed by Agrawal we should have some knowledge
about reduction(section 3) process.So for that I will give some descriptions
about the differnt kind of reductions(section 5), and to understan the com-
plexity classes well I will give some idea about circuit family(section 4) and
64
differnt properties of circuit family which will also be helpful to understand
the proposed theorems by agrawal.And at the end we have discussed the
questions and the proposed theorem to understand the answer(section 6).
12.2 Complexity
Computational complexity is the study of the space and time resource re-
quired to solve the computational problem. Complexity classes are the group
of problem that can be solved with same resource. Suppose we are having
n bit input and we want to know wheather the number corrosponding to
input is prime or not? Now the chief distinction made in computational
complexity is between problems which can be solved using resources which
are bounded by a polynomial in n or which requires sources which grows
faster than any polynomial in n.In this case the resources required expo-
nential in size. Thus the entire computational problem is devided into two
parts.
Many computational problems are most clearly formulated as decision
problem, problems with answer yes or no for example if a number m is prime
or not. This is primality decision problem.Although most decision problem
can easily be stated in simple,familiar language but discussion of the general
properties of decision problems is greatly helped by the terminology called
language.
There are different types of complexity classes.Which are the following
1)P-The problems belong to this class can be solved in polynomial time.
2)NP- This stands for ”nondeterministic polynomial time”. Where the
term ”nondeterministic” is just a fancy way of talking about guessing a
solution. A problem is in NP if we can quickly test wheather a solution is
correct.
3)PSPACE- This class consists of those problem which can be solved
using resources which are few in sptial size, but not necessarily in time.
4)BPP- This is the class of problems that can be solved using randomized
algorithms in polynomial time, if a bounded probability of error is allowed
in the solution to the problem.
Among these classes only P and NP are very importent and we will
consider only those complexity classes for our consideration.
12.2.1 NP-completeness
In complexity classes the NP- complete problems are the most difficult prob-
lems in NP in the sense that they are the ones most likely not to be in P.
65
The reason is that if we could find a way to solve any NP-complete problem
quickly,then we can use to solve all the NP problem quickly.
A decision problem C is NP-complete if it is complete for NP, meaning
that
1)It is in NP.
2)It is NP-hard, that is every other problem in NP is reducible to it.
12.3 Reduction
The equivalance between the factoring decision problem and the factoring
problem proper is a special instance of one of the most importent idea in
computer science, an idea known as reduction. We know that some problems
can be viewed as special instances of other problem. A less trivial example of
reduction is the reduction of Hamiltonian Circuit problem to the Travelling
salesman decision problem.
66
can determine all of the desired information about g.
Now there are different kinds of uniformity, among which the two uni-
formity we are using here are
1)DLOGTIME Uniformity- It is one kind of uniformity that when the
input of the uniformity machine has length O(log n), then this notion of
uniformity is usually called ”DLOGTIME Uniformity”.
2)P-Uniformity- For instance if one is trying to model what can be com-
puted efficiency by circuits that are feasible to construct, then polynomial
time would seem to be the right notion of uniformity.
67
2)The sets complete for C(complexity classes) under P-uniform AC0 re-
ductions are all isomorphic under isomorphisms computable and invertible
by P-uniform AC0 circuits of depth-three.
3)There are sets complete for C under Dlogtime-uniform AC0 reductions
that are not isomorphic under any isomorphisms computed by AC0 circuits
of depth-two.
12.7 conclusion
The conclusions we can draw by seeing the theorems. Now from the first
theorem we are getting negetive answer of the first question. That is the first
theorem telling us that sets will not complete under AC0 reduction even if
it is complete for any other polynomial time reduction. The second theorem
is giving answer of the second question. From the second theorem we can
conclude that the uniform version of Isomorphism theorem holds. And the
third theorem is also giving the negetive answer of the thired question,i.e
according to this theorem depth-circuit is optimal.
12.8 References
[1]M. Agrawal, E. Allender and S. Rudich Reducing the circuit complex-
ity: an isomorphism theorem and a gap theorem. J. Coumpt.System(1998)
Sci.57, 127-143.
[2]Manindra Agrawal,Eric Allender,Russel Impagliazzo,Toniann Pitassi,
and Steven Rudich.
Reducing the complexity of reductions
comput.complex.10(2001), 117-138
[3]Michel A. Nielsen and Issac L. Chuang
Quantum Computation and Quantum Information
Cambridge University Press (2000)
68
Chapter 13
Abstract
This article will give some physical intution about random walk which will pro-
vide a general flavor about the phenomena. It will followed by more rigorous
definition along with some necessary termiologies to give an introduction about
the two main models of quantum random walk. Afterthat some computer sci-
ence and probability background in this matter. Some important algorithimic
results obtained from quantum random walk will be discussed.Here we can see
some differences of classical random walk and quantum random walk on the
basis os results obtained from the walk on the circle. Finally some philosoph-
ical aspects will be discussed with the view point of decoherence. Also some
open questions and future possibilities will be mentioned.
13.1 Introduction
In 1993 Y. Aharanov, L.Davidovich and N.Zagury first time used the term
”Quantum Random Walk”. Let us assume that a particle is on a line and its
position is described by a wave packet | ψx0 i localized around a position x.
The function of the corresponding wavepacket centered around x0 in given
by hx | ψx0 i. The translation of a particle corresponding to the step length l
can be expressed as the unitary operator Ul = exp(−iP l/h̄) where P is the
momentum operator. So that Ul =| ψx0 i=| ψx0−l i.
Let The particle has a spin 12 dof and Sz represents the operator corre-
sponding to the Z-component of the spin. The eigenstates are given by |↑i,
69
|↓i where
h̄ 1
Sz |↑i = |↑i ⇒ |↑i (13.1)
2 2
h̄ 1
Sz |↓i = − |↓i ⇒ − |↓i (13.2)
2 2
Here the matrix representations of this two spin states are given be |↑i =
(1 0)† and for |↓i = (0 1)† . The z-component of the spin is given by
1 1 0 1
Sz = = (|↑ih↑| − |↑ih↑|) (13.3)
2 0 −1 2
Then the reduced translation operator of the particle depending on its in-
ternal spin degree of freedom can be given by U = exp(−2iSz ⊗ P l). If the
spin of the particle is |↑i at the initial state . Then the wavefunction is in
the form |↑i⊗ | ψx↑0 i. Then after the operation of the translation operator it
will become |↑i⊗ | ψx↑0 −l i. Similarly for |↓i it will become |↓i⊗ | ψx↓0 −l i But
in reality the spion states appear in superposition states which is given by
R(θ)U | Ψin i = [(α↑ cosθe−iP l −α↓ sinθeiP l ) |↑i+(α↑ sinθe−iP l +α↓ cosθeiP l ) |↓i]⊗ | ψx0 i
(13.8)
Now we are doing measurement Mz to establish the state of the particle.
|↑i ⊗ (I − iP lδ↑ ) | ψx0 i
Mz R(θ) U| Ψin i = (13.9)
|↓i ⊗ (I − iP lδ↓ ) | ψx0 i
The probabilities of |↑iand |↓i are given by
2
p↑ = | α↑ cosθ − α↓ sinθ | (13.10)
2
p↓ = | α↑ sinθ + α↓ cosθ | (13.11)
70
and the displacements are given by
α↑ cosθ + α↓ sinθ
lδ↑ = l (13.12)
α↑ cosθ − α↓ sinθ
α↑ sinθ − α↓ cosθ
lδ↓ = l ↑ (13.13)
α sinθ + α↓ cosθ
Here in these two cases the values of displacements can be much larger
than the value of l. If we choose for |↑i case tanθ =| α↑ /α↓ | (1 + ǫ)
with l/∆x ≪| ǫ |≪ 1 then the value of lδ↑ ≈ −2l/ǫ will be larger than l in
several orders of magnitude. This is significantly different from the Classical
phenomena. This exception may be useful in modern quantum information
processing.
71
1.Discrete time quantum random walk.
2.contineous time quantum random walk.
The mixing time is related to the gap between the largest eigenvalue λ1
= 1 of the stochastic matrix M, and the second largest eigenvalue λ2 can be
72
expressed in the following way
λ2 1
≤ Mǫ ≤ (maxi logπ~i −1 + logǫ− 1) (13.17)
(1 − λ2 )log2ǫ 1 − λ2
this relation provides very useful connectionbetween mixing time and the
seconed largest eigenvalue λ2 of the transition matrix M. It actually says
that λ2 is the only eigenvalue of M which matters in the mixing behaviour
of the walk. This is not same in case of quantum case.
Circle: For the case of random walk in the N-circle the mixing time is
quadratic, Mǫ ∼ N 2 l̇og(1/ǫ) The probability of hitting jth point close to 1
is T ∼ N 2 .
Hypercube: For the d-dimensional hypercube the mixing time scales
with d as Mǫ ∼ dlogdlog(1/ǫ). The probability of hitting from one corner
000. . .00 to opposite corner 111. . .11 depends on the dimentionality d as
T ∼ 2d .
73
Results from quantum Random Walk
The calssical random walk is independent of initial states - i.e. it looses its
memory. that is not true for quantum random walk. There all transfor-
mations are unitary thus reversible, there it willnot loose its memory and
it is able to recollect its previous state. Thus it does not converge to a
stationary distribution. To give the proper explanation of mixing we have
to introduce some parameter for forgetting. It is called Cesaro limit. The
probability distribution c−t is an average distribution over the measurement
result between 1 and t:
t
−t 1X s
c = p~ (13.19)
t
s=1
With this definition we can see that c~t converge to a stationary distribution.
For the analysis of quantum random walk behaviour we have to follow the
wave nature of the unitary evolution Ut . To observe the classical wave vector
at time t, | Ψt i = U t | Ψ0 i, to a probability vector p~ti . The probability of
measurement of the particle in the position i at time t, p~ti = | h↑, i | Ψt i |2 +
| h↑, i | Ψt i |2 where we write |↑, ii short for |↑i⊗ | ii. Let {(λk , | vk i) :
1 . . . 2N } be the eigenvalues andPeigenvectors of U. The initial state can be
expanded as | Ψt i = Ut | Ψ0 i = 2N t
k=1 ak λk | vk i. Putting all values together
we can get for the ith component
t 2N
1X X X
c~ti = ak al ∗ (λk λl ∗ )s hα, i | vk ihvl | α, ii. (13.20)
t s=1
α=↑,↓ k,l=1
When t → ∞ we get
t
1
X
∗ s 1 λk = λl
(λk λl ) → (13.21)
t limt→∞ t(1−(λ1k λl ∗ )) = 0 λk =
6 λl
s=1
hence
2N
c~ti →
X X
ak al ∗ hα, i | vk ihvl | α, ii = π~i (13.22)
α=↑,↓ k,l=1
λk =λl
74
Another thing is that in classical case the mixing time is dependent on
the seconed largest eigenvalue of the transition matrix M. But in quantum
case the rate of convergence to ~π is dependent on the following terms.
t
1X 1 − (λk λl ∗ )s 1
(λk λl ∗ )s = ∗ ≤ (13.23)
t t(1 − (λk λl )) t | λ k − λl |
s=1
13.2.4 Decoherence
The crucial difference between the quantum and the classical walk are the
quantum coherence which is only available in quantum case. If any one want
to go to quantum to classical one then he has to remove the decoherence
part from quantum one.
13.3 Conclusions
A beautiful framework for quantum random walk is done here. Several
differences of the quantum random walk with its classical counterpart is
given. The quantum random walk can be utilised in constructing new and
faster algorithm.
75
13.4 References
J. Kempe Quantum Random Walk - an introductory overview; arxiv:quant-
ph/0303081, 09 Dec 2005.
M.D.Prabha, Dr. Arul Lakshminarayanan Quantum Random Walk in one
dimension in one dimension (A Project Report), Physics Department, IIT
Madras, April 2005.
76
Chapter 14
Optimality of Grover’s
algorithm
Abstract
In this my
√ study report, we discuss about a new method for proving lower boun-
nds (O( N ) quantum queries) on quantum unordered search of N-elelments list
which was most famous Grover’s algorihtm. Thus we show Grover’s algorithm
is optimal.
14.1 Introduction
Before we discuss about ”quantum querymodel”, i will give a breif explaina-
tion about ”query model”. In this model the algorithm calls the input
element (or) elements, each call is known as query. Here the number of
queries that algorithm makes is crucial and it tells about the complexity of
algorithm. Examples for query model are
1. Grover’s Algorithm for quantum unordered search.
2. Period finding problem. etc
Classical query model runs the algorithm with one input each time and
after that it modifies input. Using classical query model desired element
is found with O(N ) queries on average in unorered search of N-element
list. On the other hand quantum query model runs the algorithm with a
superposition of inputs. Constructing quantum query algorithm with out
proving lower bounds on the number of queries that algorithm needs does not
make any sense. Here we discuss about proving lower bounds on quantum
77
unordered search using the method suggested by Andris Ambainis. This
implies that Grover’s algorithm is optimal.
U0 → O → U1 → O → . . . → UT −1 → O → UT .
on the starting state. Where Uj ’s are unitary transformations that does not
depend on the input bits x1 , x2 , . . . , xN . O’s are query transformations that
are also unitary. In each query oracle O operation on superposition of inputs
changes the phase on the |ji component of |ψi.Therefore after a query |ψi
becomes X
|ψ′i = |0i ⊗ { αxi |xi i − αxj |xj i}.
xi 6=xj
Suppose xk be the marked element such that f (xk ) = z, After T queris the
final state will be X
|ψend i = αxi ,z |φxi i ⊗ |xk i.
xi ∈S
Which is an entangled state, |φxi i are algorithm work bits and total number
of qubits in ensillar space is remains the same. Consider reduced density
matrix ( after tracing out by HA ) before a query
ρ = |ψihψ|
becomes
ρ′ = |ψ′ihψ′|
after the query. The diagonal elements of the reduced density matrix doesn’t
change after any query. Only off diagonal elements in j th row and j th column
78
get modified. So summation over off-diagonal elements of ρ changes after
each query. Let’s define sum of absolute values of ρt (reduced density matrix
after t queries) X
St = |(ρt )mn |.
m6=n
√
Let’s choose |αx | = 1/ N
Number of off-diagonal elements in N ×N matrix is N ×(N −1).Therefore
for starting state
N
X
S0 = |(ρ0 )mn |
m,n=1,m6=n
N
X
= 1/N
m,n=1,m6=n
= N (N − 1) × 1/N
= (N − 1).
Let’s find out ST assuming algorithm gives correct answer with probability
at least 1 − ǫ. Let |φxi i and |φxk i be the final algorithm work bits for the
inputs xi and xk . Let {|νi} be the basis for algorithm work bits.Then
X
|φxi i = aν,z |νi,
ν
X
|φxk i = bν,z |νi.
ν
79
Consider
X X
| a∗ν,z bν,z | ≤ |aν,z ||bν,z |
ν,z ν,z
X X
≤ |aν,z ||bν,z | + |aν,z ||bν,z |
ν,z:z=f (xi ) ν,z:z6=f (xi )
s X s X s X s X
≤ |aν,z |2 |bν,z |2 + |aν,z |2 |bν,z |2
ν,z:z=f (xi ) ν,z:z=f (xi ) ν,z:z6=f (xi ) ν,z:z6=f (xi )
p p
≤ ǫ × (1 − ǫ) + ǫ × (1 − ǫ)
p
≤ 2 × ǫ × (1 − ǫ).
Therefore ,
p
|(ρend )mn | ≤ |αm ||αn | × 2 ǫ(1 − ǫ)
p
≤ 1/N × 2 ǫ(1 − ǫ)
p
ST ≤ 1/N × 2 ǫ(1 − ǫ) × N (N − 1)
p
≤ 2 ǫ(1 − ǫ)(N − 1).
As we discussed earlier only elements in nth row and nth column are differ
80
in phase, those are α∗m αn in ρ and −α∗m αn in ρ′.There fore,
X X
|(ρt−1 )mn − (ρt )mn | = 4|α∗m αn |
m6=n m6=n
X
≤ 4|αn | |αm |
m6=n
√ sX
≤ 4 N − 1|αn | |αm |2
m6=n
√ p
≤ 4 N − 1|αn | 1 − |αn |2
√
≤ 2 N −1
√
St−1 − St ≤ 2 N −1
Minimum value of T is
(S0 − ST )min
Tmin =
(St−1 − St )max
p
(1 − 2 ǫ(1 − ǫ)) × (N − 1)
= √
2 N −1
p √
= (1 − 2 ǫ(1 − ǫ)) N − 1/2.
14.3 Conclusions
√
Using quantum query model optimality of Grover’s algorithm ( O( N )
quantum queries for searching unordered list of N-elements) is proved.
14.4 Reference
Andris Ambainis, arXiv:quant-ph/0002066 v1 24 Feb 2000.
81
Chapter 15
RSA Cryptography
Abstract
RSA is a trusted cryptographic metyhod to send encrypted data through a
public channel. It assures that Eve the eavesdropper can never be able to get
the message provided used prime numbers have been selected wisely.
15.1 Introduction
RSA way of cryptography was introduced by three great minds Rivest,
Shamir and Aldeman in the year 1977. It was so great that even now
three and half decade later people are using it offcourse with trust. Method
envolves the selection of two prime numbers with some restictions depend-
ing on factorization methods known. Idea lies on the fact that it is quiet
impossible to find the factors of the product of two using classical computer
in limited time. For instance a challenge put in 1978 to factorize
RSA-129 =
Decimal Digits= 129
Decimal Digit Sum=105443
1143816257578888676692357799761466120102182967212423625625
6184293570693524573389783059712356395870505898907514759929
0026879543541
82
butnowstillsomechallengese.gonewith:
DecimalDigits : 309
13506641086599522334960321627 88059699388814756056670275244
85143851526510604859533833940 28715057190944179820728216447
15513736804197039641917430464 96589274256239341020864383202
11037295872576235850964311056 40735015081875106765946292055
63685529475213500852879416377 32853390610975054433499981115
0056977236890927563
15.2.2 Algorithm
Example:
83
3. Evaluates e= 9007 such that e and V are coprime.
Bob sends e, n to Alice through public channel.
So roots are p and q. Now Eve can follow same procedure as Bob to find d
and thus can decrypt the message.
84
Time Attack by Kocher 1995
Kocher says if Eve knows the hardware of Bob’s computer by that he means
time required for computing a calculation. She assumes message has to
converted to binary form and she formulates a algorithm necessarily used
by Bob for decryption. According to her :
3. Let t1i = time(extra) taken to decode a bit ie. for bk =1. t2i =usual
processing time taken by computer i.e for bk =0 and bk =1. Ti = t1i
+t2i = total time used to process a bit.
So, if Eve knows every Ti then she can estimate the status of bk and so
the message.
15.3 Conclusion
RSA is a promising method being used for cryptography. It’s beauty lies
in selection of of prime numbers which offcorse should be choosen with pre-
cautions as p,q don’t have smaller prime factors, p-q shouldn’t be small etc.
These conditions comes from the known factrozation methods.
Although it is not perfect and security can be breached by any of the men-
tioned methods. But still it is the most reliable cryptographic method.
15.4 References
1. www.rsa.com.
2. www.wikipedia.org.
85
Chapter 16
Abstract
A review is presented regarding the experimental verification of the Bell’s in-
equality and thereby the implication of it to locally realistic theories. We have The
essentially described the Aspect-Grangier-Dalibard-Roger Experiments using
single photons.
famous Bell’s inequality was derived by Clauser - Shimony in the popular
form in terms of the ensemble averages of the properties which are intrinsic
to a quantum system.It’s mathematical form is as follows.
Here Q,R,S and T denote the objective properties of the system which can
assume any form depending on the physical system under consideration and
E denotes the ensemble averages of those obective properties.
When these ensemble averages are calculated for a specific physical sys-
tem we find that the Bell’s inequality is violated.
The point to be noted here is that,the main inputs which went for de-
riving the Bell’s inequality are
1. The assumption that the physical properties of the objective param-
eters exist independent of observation which is nothing but the assumption
of realism
86
parameter, Meaurement is local. This is the assumption of locality
R++ (a, b) − R+− (a, b) − R−+ (ab) + R−− (a, b) = E(a, b)expt (16.2)
Where the R’s Refers to the coincidence rates of the photons in the coun-
ters and + corresponds to the vertically polarized photon and - corresponds
to horizontally polarized photon.
So the Bell’s inequality in the case of one photon experiments as de-
scribed above will have the form in terms of E as
Now these analysers will make the circularly polarized photon into ver-
tical polarization state and horizontal polarization state. the transmitted
87
being the vertical polarization state and the reflected being the horizontal
polarization state for P A1 and the same for P A2
The vertically polarized photon state and the horizontally polarized pho-
ton state as described above are made to fall on 2 photomultipliers and the
coincidence singles from four photo multipliers, two for each analyser and
the coincidence rates are counted.
These analysers are mounting on a platform which can be rotated about
an optical axis, so that the orientation of these analysers can be changed as
per will. The coincidencence circuit is to look for coincidences in arrival and
detection of photons A and B within 20 nanosecond time window.
If a and b are the two orientations of polarising analyser, then the angle
between them is b − a and the ensemble average
The experiment was done for four orientations of the analysers, two
orientations for each. The values a and c correspond to P A1 and b and d
for polariser P A2 . The angle between the P A1 and P A2 were calculated
for each experiment involving two orientation. When the LHS of Bell’s
Inequalities are calculated for these parameters we get the value as 2.828.
This clearly disproves the Bell’s Inequality which implies Quantum The-
ory is inconsistent with Local Reality.
Aspect measures the coincidence rates for the specific arrangement when
P A1 is in orientation a, and P A2 is in orientation b. Now the coincidence
rates were calculated for the combination of horizontally and vertically po-
larised states of the photons and E(a,b) was calculated from the coincidence
rates using Eq(2).
In this case the LHS of the Bell’s inequality was found to be 2.697±0.015.
This clearly proves that the results are in favour of Quantum Theory
aginst the Locally Realistic theories like hidden variable theories.
It is a possibility that the photons were influenced before the experiment
was setup to avoid the photon from knowing before which path it will take.
Two acousto-optical Raman Nath cells were kept before the photons were
incident on the analysers. Even in this case the LHS of Bell’s inequality was
calculated to be equal to 2.404 ± 0.080 which is again a very clear violation
of Bell’s inequality.
88
Figure 16.1: Diagram
16.1 Conclusion
1. Quantum Theory is saved.
2. Either Reality or Spooky Action at a distance with super luminal com-
munication.
3. Hidden variable theories not possible because they are locally realistic.
4. However the truth in the Aspect’s experiment cannot be taken as 100
percetn certain as the photons involved in the experiment can be emitted
with right physical characteristics as per hidden variable theories so as to
reproduce the quantum theory predictions.
16.2 References
• Quantum Theory and measurement : J.A.Wheeler , Zurek (princeton
Univ press)
89
Chapter 17
Quantum computation by
anyons
Abstract
A two dimensional system with anyonic excitations can be considered as a
quantum computer. Unitary transformations can be performed by moving
excitations around each other.
17.1 Introduction
Start with a class of stabilizer codes associated with lattice on a torus.Qubits
live on the edges of the lattice whereas stabilizer operators correspond to the
vertices and faces. These operators can put together to make up a hamil-
tonian with local interaction.The ground state of this hamiltonian coinsides
with the protected space of the code.
Excitations in this model are anyons, means that the global wavefunction
acqires some globalphase factor when one excitation moves around the other.
One can operate on the ground state space by creating an excitation pair,
moving one of the excitations around the torus and anihilating with the
other one.
90
each vertex S and face P consider operators of the following form.
Y Y
As = σjx , Bp = σjz (17.1)
j∈S j∈P
91
contribute to a vector from the protected space. Such a basis is charectarised
by two topological nummbers:sums of zj along the loops cz1 and cz2 .Thus
for each of the4 possible combinations of the 4 possible combinations of the
topological numbers v1 , v2 there is one vector from the protected subspace,
2 −1)/2
X X X
|ζv1 ,v2 i = 2−(k |z1 , ....., zn i : zj = v1 , zj = v2 ,
z1 ,....,zn j∈cz 1 j∈cz 2
(17.5)
One can always create linear combination of these vectors.
One can always classify low energy excitations of the Hamiltonian. Eigen
vector of H0 is is also eigen vectors of As andBp . An elementary particle is
Q As |ζi = |ζi Bp |ǫi = |ǫi is violated because
created if one ofQthe constraints
of the relations s As = 1, p Bp = 1
So it is imposiible to create a single particle. However, it is possible to
create two particle state of the form |ψ x (t′ )i = S x (t′ )|ǫi |ψ z (t)i = S z (t)|ǫi
where|ǫi is an arbitrary ground state.
In the first case two particle are created at the end points of the string
t such particles live on the vertices of the lattice, called Z-type particles.
Correspondingly X-type particle live on the phases .S z (t), S x (t′ ) are called
string operators. They commute with everyAs and Bp except a few ones.
Let us see what happens if the particles move around the torus. Mov-
ing Z-type partilces alone a path czi or cz2 is equivalent to applying the
operatorZ1 orZ2 . Thus we can operate on the ground state space by creat-
ing a particle pair, moving one of the particle along the torus and anihiliting
it with the other one. Thus we can realize quantum gates. In the presence
of perturbation two particle state will not be an eigen-state anymore. The
propagation process is described by Schrodinger equation with some effec-
tive mass m − z. In the non-perturbed modelmz = mx = inf there are no
particle in the ground state but they can be created and anhilated particle
virtually. A virtual particle can tunnel through a torus before anihilating
with each other. Such processes contribute termsbz1 Z1 , bz2 Z2 , bx3 X1 , bx2 X2 |
to the ground state of effective Hamiltonian.
92
If we move partilce around each other(for this we don’nt need a torus.
We can work on the plane). Moving X-particle around Z-particle gives a
and
|ψf inal i = S x (c)S z (t)|ψ x (q)i = −|ψinitial i (17.8)
Global wavefunctios acquires a phase factor -1. It is not like usual particle
boson and fermions which do not change sign in such a processes. Particles
with this unusual particles called abelion anyons. Abelion anyons are one-
dimensional representaion of braid groups. Note that anyons exist in real
solid state systems(eg. fractional quantum hall effect).
The operators Z1 , Z2 , X1 , X2 can be realized by moving particles along
the loops cz1 , cz2 Z2 , cx1 , cx2 |.These loops only exist on the torus, not on the
plane. Consider, however the process in which an x type and z type particle
go around the torus and trace their path backward. This corresponds to an
operator on the plane. Indeed, we can deform particles trajectories so that
one particle stays at rest and other going around it. Due to the anyonic
nature of the particles,We see that the X1 and Z1 anti commute.
17.4 Conclusion
It has shown that anyons can arise from a hamiltonian with local interac-
tions. these anyons can be used to perform universal quantum computation.
17.5 Reference
• Fault tolerent quantum computation by anyons,A.Yu. Kitaev.
93
Chapter 18
Privacy Amplification by
Public Discussion
Abstract
We are going to be discussing how a public (void of privacy) channel with per-
fect authenticity can be used to remove the defects of a channel with imperfect
privacy and no authenticity. We discuss about the protocols Bob and Alice
can carry out to decide with a high probability 1) the communication between
them has been corrupted by Eve’s tampering and channel noise; and 2) if these
errors introduced are not too severe, to correct the errors introduced in the
transmitted sequence giving out minimum information to Eve. We show that
this information leaked to Eve is less than 1 bit.
18.1 Introduction
Alice intends on sending a secret sequence of bits (called the key) to Bob over
an imperfect channel in the presence of a third party, Eve, trying to gain as
much information about the secret key as possible. The channel is imperfect
in the sense that 1) transmission errors can occur, 2) Eve gains partial infor-
mation by eavesdropping over the channel and also 3) Eve has the capacity
to tamper with the transmission by modifying, injecting new information,
jumbling up the order of the transmission, replacing the transmitted bits
with bits of her choice and/or completely suppress the communication be-
tween Alice and Bob. The only limitation that we impose on Eve is that
Alice and Bob know exactly about the maximum amount of information
that Eve can gain by tampering and eavesdropping.
94
We intend to look at a series of protocols followed by Bob and Alice over
this given imperfect private channel without authentication and a public
channel with authentication to agree upon a bit string (key) about which
Eve has nearly (less than 1 bit) or exactly no information except for the
length of the final key. All this is done at the cost of reducing the length of
the sequence, sometimes, dramatically.
Authentication is the property of the channel which enables one to iden-
tify the person from whom he/she has received a message over the channel.
It is some kind of a unique address which identifies the sender and it cannot
be tampered with in anyway by a third party.
Tampering and eavesdropping are two different operations. By tamper-
ing with the transmitted bits Eve doesn’t gain any information directly.
Visualize this situation like Eve has an inverter in her possession and she
blindly applies this inverter to the incoming bit sequence which she has no
information about. She has tampered with the bit sequence and since she
had no clue to what the inputs were she now has no clue to what the outputs
are.
The amount of computing power granted to Eve is unlimited, even
though no channel performs quite this badly, is because if it works for this
case then it must work for practically all cases. However Eve can disrupt
communication between the two parties but she can never fool(except for
a very small probability) both of them into making them believe that they
have a 100% correlated sequence.
95
One way of implementing this function is for Alice to perform a random
permutation on the string x i.e jumble up the order of the bits in x and
then reveal the last K bits of the permuted N bit string. Bob does the same
operations on his string and checks if the last K bits of his permuted string
and Alice’s K bits are identical.
Note that Alice must send the description of the permutation or in gen-
eral the function f and the K bits i.e the value f(x) only after Bob confirms
the reception of the N bit string y. This is because Eve can modify (N-K)
bits in x based on the permutation and can get away undetected. Moreover
after the transmission of the string x over the private channel all subsequent
talks between Alice and Bob must take place over the public channel as the
scheme presented here and the schemes that are presented in sections ahead
rely heavily on authentication.
18.2.2 Reconciliation
Alice and Bob have detected that there are errors and x 6= y. So now their
task is to correct those errors. How do they achieve this?
If the number of errors are less i.e. around two then Bob can compute
all strings Z that differs in 2 places from y and then calculates f(z). A match
f(z)=f(y) indicates that Z is the actual string x sent by Alice to Bob. This
process is called bit twiddling.
When the number of errors are larger Alice can randomly choose an
error correcting code C and then she computes the parity bits C(x) and
sends C(x) and the description of C over the public channel. This implies
eve has full knowledge of the parity bits and effectively has at most C(x)
amount of information. Thus effectively Alice sends xC(x) to Bob receives
yC(x). Bob can now find x successfully. Another variation of this method
is for Alice and Bob to agree on a permutation which transforms x and y to
x0 and y0 .
96
Elimination of eavesdroppers information over the public channel
Let us assume for the time being that Eve can only eavesdrop over the public
channel. Now in the error detection protocol Alice announced f(x) of length
K bits over the public channel. Thus, we can say that Eve gains K bits of
information (Shannon sense. Don’t confuse be K bits of information to be
K physical bits of x.). So if Alice can select a function g : {0, 1}N → {0, 1}R
where R ≤ N − K and send its description to Bob over the public channel
then they can agree on the final string to be g(x) of length R bits. Then
from the below 2 theorems we can say that Eve has nearly or exactly no
information about the final string. Thus from the second idea we can see
that by chopping of any K+S physical bits the information about the final
−S
string know to Eve is reduced to 2ln2 .
97
Theorem 3: Let e be any function , let S < N − K be a safety parameter,
and let R = N − K − S. If g is chosen randomly, the expected amount of
−S
information on g(x) given by knowledge of e, g, and e(x) is less than 2ln2
bits.
18.3 Conclusions
If no eavesdropping occurred over the private channel, it is possible for Alice
and Bob to publicly verify that no transmission errors or tampering occurred
either, with a 2−K error probability, and end up with an entirely secret final
string that is only K bits shorter than the original private transmission.
This is optimal.
If a partial eavesdropping occurred over the private channel, leaking
upto K bits of information to Eve, in Shannon’s sense, it is still possible for
Alice and Bob to publicly verify that no transmission errors or tampering
occurred, with a 2−L error probability, and end up with a final string that
is K + L + S bits shorter original private transmission, on which eve has less
−S
than 2ln2 bits information on the average.
98
Bibliography
99