0% found this document useful (0 votes)
13 views16 pages

Borrador TFG

The document provides an overview of quantum computation and its foundational concepts, merging fields such as computer science, quantum mechanics, and cryptography. It discusses the historical development of computation, the significance of quantum phenomena like superposition and entanglement, and the potential applications of quantum computing, including quantum cryptography and simulation. Additionally, it outlines the basics of classical information storage and manipulation, setting the stage for a deeper understanding of quantum computing principles.

Uploaded by

jp7wcjwmjh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
13 views16 pages

Borrador TFG

The document provides an overview of quantum computation and its foundational concepts, merging fields such as computer science, quantum mechanics, and cryptography. It discusses the historical development of computation, the significance of quantum phenomena like superposition and entanglement, and the potential applications of quantum computing, including quantum cryptography and simulation. Additionally, it outlines the basics of classical information storage and manipulation, setting the stage for a deeper understanding of quantum computing principles.

Uploaded by

jp7wcjwmjh
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 16

1.

Introduction
Quantum computation and quantum information are defined as the study of information
processing tasks that can be accomplished using quantum mechanical systems [1]. Their
birth cannot be understood as the evolution of just one field, but as the merging of several
branches of science, such as computer science, quantum mechanics, information theory
and cryptography.

It uses phenomena such as superposition, which establishes that if a physical system may
be in one of many configurations—arrangements of particles or fields—then the most
general state is a combination of all of these possibilities [2]; or entanglement, that occurs
when a pair or group of particles interact in such way that the quantum state of each
particle cannot be described independently of the state of the others. [3]

Although quantum computers are mostly theoretical constructs at the present time, it has
been proved that quantum computing will eventually outperform classical computing in
many purposes [4]. A good example of this is quantum cryptography, which has the
potential to encrypt data for longer periods of time than classical cryptography [5].
Quantum simulation is also one of the most relevant potential applications, since
simulations of quantum systems that are carried out numerically on classical computers
are subject to the exponential growth of required resources as the size of the quantum
system increases. And it has been claimed that quantum computers will be able to mimic
these systems efficiently in the polynomial scale [6].
As a result, interest and investment in the field of quantum computing has increased
dramatically in recent years. The market of quantum computing is projected to reach
$64.980,0 million by 2030 from just $507,1 million in 2019. In the public sector, China
has remained at the forefront of technological advances, launching the first quantum
satellite in 2016. In the U.S., the Trump administration authorized in 2018 $1.200,0
million to be spent on the quantum science over the next five years, while in 2020 India
set a budget of $1.120,0 million for the same period. Europe, on the other hand, has a
total initiative of €1.000,0 million providing funding for the next ten years. [7]

The history of computation possibly begins with the appearance of the abacus in 500-300
BC, but its main development did not come until the 19th and 20th centuries, with
Boolean algebra (1854), the theory of computation (Turing, 1936) and information theory
(Shannon and Weaver, 1940s). It was in that 40s decade that John Eckert and John
Mauchly developed the ENIAC (Electronic Numerical Integrator and Calculator), the
first fully electronic computer, in 1946.

Parallel to the development of computation, in the early 20th century, the world of physics
took a plot twist. The inadequacy of classical physics to the microscopic domain became
increasingly evident due to various empirical facts, such as blackbody radiation and the
photoelectric effect. Thus was born the theory of quantum mechanics, which differs from
classical physics in that energy, momentum, angular momentum, and other quantities of
a bound system are restricted to discrete values(quantization), objects have characteristics
of both particles and waves (wave-particle duality), and there are limits to how accurately
the value of a physical quantity can be predicted prior to its measurement, given a
complete set of initial conditions (Heisenberg's uncertainty principle, 1927). [2]
Computing and the quantum world did not come together until well into the 20th century.
In the 1970s, Paul Benioff began to research the theoretical feasibility of quantum
computing. His research culminated in a paper, published in 1980, that described a
quantum mechanical model of Turing Machines [8]. Shortly thereafter, Richard Feynman
and Yuri Manin suggested that quantum computing has the potential to simulate things
that classical computing cannot. [9] [10]

The origin of this idea can be found in the decision problem, posed by David Hilbert and
Wilhelm Ackerman in 1928:

“Given a statement of a first-order logic 1defined by a finite set of axioms, is there an


algorithm that can decide whether the statement is true or false? “ [11]

In 1936, Alonzo Church and Alan Turing both independently demonstrated that the
existence of such an algorithm was impossible [12] [13]. The concept of the Turing
machine, an abstract notion of what we know as a programmable computer, appeared for
the first time. And further work led to the Church-Turing thesis.

“Any algorithmic process can be simulated efficiently using a probabilistic Turing


machine.” [14]

In 1994, Peter Shor demonstrated that the problem of finding the prime factors of an
integer could be solved efficiently on a quantum computer – a problem that takes classical
computers an exponentially long time to solve for large numbers [15]. His algorithm
launched a huge interest in the field of quantum computing. And the Church-Turing
quantum thesis was formulated:

“A quantum Turing machine can efficiently simulate any realistic model of computation.”
[16]

Decoherence (loss of entanglement due to interactions of a quantum system with external


factors) is a major obstacle for the development of robust quantum computers. However,
the physical realization of quantum computing became significantly more tenable in
1995, when Quantum Error Correction (QEC) emerged from several groups around the
world. This theory makes it possible to protect quantum information from errors due to
decoherence and other quantum noise [17]. But the first correcting code did not appear
until 1997, when Alexei Kitaev proposed the surface code , a topological quantum error
correcting code that is currently considered the most promising platform for realizing a
scalable, fault-tolerant quantum computer. [18]

Many companies have ventured into the quantum computing race since Paul Benioff
began his research. But among these companies, IBM and Google are the ones that have
achieved the best results. IBM launched in 2017 the first industry initiative to build
commercially available universal quantum computing systems [19]. The project, named
as IBM Quantum, is pioneer in providing quantum computing service, and it has led to

1
First-order logic is a particular formal system of logics, whose syntax consists only of finite expressions
as well-formed formulas (WFF) - a finite sequence of symbols of a given alphabet that is part of a formal
language -, while its semantics are characterized by the limitation of all quantified variables to a given
domain of discourse. In logic, the domain of discourse is the set of entities over which the variables range.
[25]
the design and construction in 2019 of the first integrated quantum computing system for
commercial use [20]. That same year, Google AI, in collaboration with NASA, claimed
they had realized a quantum computation that would be unfeasible on any classical
computer [21]

Although the history of quantum computing is still short and there are still many
discoveries to be made, there are already several quantum algorithms of great relevance.
One of the best known, apart from Shor's, is Grover's algorithm, invented by Lov K.
Grover in 1996 [22]. It is described as a database search algorithm which requires fewer
function evaluations than a normal search, thus substantially reducing the search time.
Inverting a function can be related to searching in a sequence, if we consider that this
function produces the value of y as the position occupied by the value x in this sequence.
Thus, if we have the function y=f (x), which can be evaluated in a quantum computer,
Grover’s algorithm allows us to calculate the value of x given the value of y as input.

In this context of increasing awareness of the potential of quantum computation for the
society, we have devised this Bachelor’s Thesis Report as an attempt to provide the reader
with a basic overview of the fundamentals of quantum computing from the point of view
of an undergraduate student in Chemistry.
To this end, this work starts by introducing ideas from classical information and classical
computing such as bit, byte, number encoding and the like. Logic gates will be described,
with a review of the operators on which most current computational algorithms rely. In
the next chapter, we will provide the backgrounds of quantum mechanics, emphasizing
the phenomena of superposition and entanglement. And we will also study why the wave
function collapses into a single (non-entangled) state when measuring, being that
normally in quantum mechanics it evolves deterministically according to the Schrödinger
equation as a linear superposition of different states. We call this the measurement
problem. Based on these ideas, we will be able to introduce the basics in quantum
information and quantum computing and to explose its fundamental differences with
classical computing. For this purpose, we will explain the qubit and the difficulties of its
physical implementation, review the quantum computing protocol and briefly describe
the usual quantum gates. In a last stage, we will provide a few examples of routines and
computational codes aimed for quantum computers, programmed with Mathematica,
which altogether constitute a complete, student-made implementation of Grover’s
algorithm. The latter exercise is probably the most challenging and self-instructing part
of this work.
2. Classical information and classical computing
2. 1 Information storage and encoding

This chapter introduces the basic concepts required to understand how classical
information is stored and manipulated, as well as its physical implementation in today's
computers. With the information contained in this chapter we intend to provide the reader
with some background on classical computing concepts that will be revisited in chapter
4 once we introduce quantum computing. In this way, hopefully, we will be able to
capture the conceptual breakthrough that quantum computation entails.

The smallest unit of classical information is the bit (binary digit). It is a binary variable,
generally represented as 0 or 1, where the number indicates one of two possible values or
states, such as true or false, open or closed, north or south, and so on. We can store one
bit in any electronic device or any other physical system that exists in either of two
possible distinct states. These two states can be, for example, two positions of an electrical
switch, two different directions of magnetisation or polarisation, or two voltage levels
allowed by a circuit. Generally, in today's digital equipment (PCs, smartphones, game
consoles, etc.) bits are implemented by using transistors. [23]

A transistor is an electronic device that regulates the flow of current or


voltage in a circuit, acting as a switch and/or amplifier for electrical or
electronic signals. As shown in figure 2.1, it has three terminals: base,
collector and emitter. If the input signal is 1 (current through the base),
the output signal is 1 (current between the collector and emitter). If the
Figure 2. 1.
input signal is 0 (no current through the base), the output signal is also 0. Transistor symbol

Bits are extremely useful because any discrete value such as numbers, words and images
can be encoded using sequences of bits. With a single bit, there are only two (21) possible
patterns to store information in, 0 or 1, which is of limited usefulness. However, every bit
we add double the possibilities. For example, with two bits, we have four (22) possible
patterns: 00, 01, 10 and 11. With three bits, we have eight (23) possible patterns: 000, 001,
010, 011, 100, 101, 110 and 111. In general, n bit yields 2n different patterns for storing
information, so we find that the number of messages (m) that can be delivered by n bits
is:
𝑚 = 2! (2.1)

Of course, human beings do not handle information as sequences of bits, so in order to


be able to interact and exchange further information between computers and humans,
there are rules that have been developed that associate sequences of ones and zeros with
letters and decimal numbering. The basic unit of information used in classical computing
is the byte, which consists of a group of 8 bits with a storage capacity of up to m=256
values, enough to store any of the most usual characters or alphabetic letters.

ASCII, for example, is an encoding convention that represents each typed character by a
number. The code uses 8-bit sequences, so the numbers range from 0 to 255 and each is
stored in one byte to represent the upper and lower case letters of the English alphabet,
plus punctuation marks, digits 0 to 9 and some control information. Thus, if we insert a
message such as “Hello” in a computer that uses this code, it would be stored as follows:
Character H e l l o
Code 72 101 108 108 111
Byte 01001000 01100101 01101100 01101100 01101111
Table 2. 1. Example of correspondence between alphabetic letters and ASCII

However, the number of patterns available in the ASCII code is insufficient to represent
the alphabet of many Asian and some Eastern European languages, so Unicode had to be
designed. This encoding typically stores each character in 2 bytes, so it uses 16-bit
sequences, with which 65536 different patterns can be composed. Enough to be able to
write texts in languages such as Chinese, Japanese and Hebrew.

A byte works well for characters, but for computational purposes we are very much
interested in number manipulation too. Integer numbers can be easily encoded with bits
by writing them in binary (rather than decimal) base. As an example, the table below
shows the correspondence for numbers from 0 to 7, for which we need 3 bits, which offer
8 (23) different patterns to encode each digit.

000 0 100 4
001 1 101 5
010 2 110 6
011 3 111 7
Table 2. 2. example of correspondence between binary and decimal numbers

In general, to encode integers in binary notation, each position is associated with a weight,
just as in the decimal system (ones, tens, hundreds, etc.). In the case of binary notation,
the most right-hand digit is associated with 20, the next position to the left with 21, the
next with 22, and so on up to 2n, where n is the number of bits. To obtain the corresponding
value, as in base ten, we multiply the value of each digit by the weight associated with its
position and then sum the results. The following tables show an example, comparing
decimal and binary notation (with 8 bits).

Decimal pattern
2 3 3 Weight Result Sum
x1 3
x 10 30 233
x 100 200

Binary pattern
1 1 1 0 1 0 0 1 Weight Result Sum
x 1 (20) 1
x 2 (21) 0
x 4 (22) 0
x 8 (23) 8
233
x 16 (24) 0
x 32 (25) 32
x 64 (26) 64
x 128 (27) 128
As we have seen previously, with 8 bits we can only store 256 different numbers, so to
achieve a larger range, integers are usually stored in 8 bytes, that can store numbers
between -9223372036854775808 and 9223372036854775807.

2. 2 Information manipulation

With all of the above, we can now understand the basis of classical information, but how
are the individual bits manipulated in a computer?

We can understand bit manipulation as handling of true/false values, if we imagine that


bit 0 represents the false value and bit 1 represents the true value. To manipulate these
values, functions belonging to Boolean algebra are used. Given one or more binary
arguments (true/false or 0/1), these functions produce a single binary output, applying a
logical operation such as conjunction (and), disjunction (or) or negation (not). The
electronic device that generates the output of a Boolean operation when given the input
values of that operation is called a logic gate. In today's computers, they are often
implemented with small electronic circuits in which the digits 0 and 1 represent voltage
levels. [23]

To understand how they work, we provide a review of the eight most commonly used
logic gates, along with their symbol and their logic table or truth table.

GATE SYMBOL TRUTH TABLE


INPUT OUTPUT
Buffer: acts as an identity function, A Q
generating no voltage or a voltage that is the
0 0
same as the input.
1 1

INPUT OUTPUT
A Q
NOT: Its output is the opposite of the input. 0 1
1 0

INPUT OUTPUT
A B Q
AND: Both input values must be true to 0 0 0
obtain a true output. 0 1 0
1 0 0
1 1 1
INPUT OUTPUT
A B Q
OR: If one of the input values is true, we will 0 0 0
get a true output. 0 1 1
1 0 1
1 1 1
INPUT OUTPUT
A B Q
NAND: if one or both of the values are false, 0 0 1
it generates a true output. 0 1 1
1 0 1
1 1 0
INPUT OUTPUT
NOR: if one or both of the values are true, it A B Q
generates a false output. 0 0 1
0 1 0
1 0 0
1 1 0
INPUT OUTPUT
XOR: only generates a true output if the A B Q
values of the inputs are different. That is, 0 0 0
equal inputs generate a false output. 0 1 1
1 0 1
1 1 0
INPUT OUTPUT
XNOR: opposite to XOR, only generates a A B Q
true output if the inputs are the same. 0 0 1
0 1 0
1 0 0
1 1 1
Table 2. 3. List of logic gates

A good example to understand how logic gates work is their use for integer addition. Now
that we know how to encode integer numbers with bits, their sum in binary notation will
not be so different from the sum in base ten.

0 1 0 0 1 1 1 0
+ 0 1 0 0 1 0 1 1
Carry 1 0 0 1 1 1 0
1 0 0 1 1 0 0 1

We add the bits in the same position, starting from the right, and if the base value is
reached, we restart the addition from zero and carry one to the next bit. Therefore we will
need, for each pair of bits, an output for the sum and an output for the carried value. One
can check from the truth tables of the logic gates, that the XOR gate allows us to obtain
the result of the addition, while the AND gate determines whether or not we carry one to
the next position. The circuit formed by these two gates is called a half-adder.

Figure 2. 2. Different inputs and outputs for a half-adder circuit


With an additional half-adder, we can add the carry output in the following position. The
next carry output is generated with an OR gate, using the outputs of the AND gates of
both half-adders as input. All these together form a full-adder circuit.

Figure 2. 3. Example of full-adder circuit

By connecting a hall-adder circuit with 7 full-adder circuits, we can add 8-bit binary
numbers, see Fig.2.3. This is precisely the kind of computational circuit that enables your
ordinary calculator or computer to carry out simple additions. [23]

Figure 2. 4. Basic circuit for addition


3. Quantum mechanics

The aim of this chapter is to illustrate the reader with some of the key concepts and
phenomena on which quantum computing is based. We will introduce the concepts of
superposition and entanglement, discuss the probabilistic nature of quantum physics and
also the so-called measurement problem. Rather than providing a self-contained
introduction to quantum mechanics, which the reader can find in several textbooks (e.g.
Refs. [24], [25]), we will address these concepts by drawing analogies of classical physics
in the quantum limit and simple examples.

Some of these ideas may be difficult to understand, as they are suited to the microscopic
domain and are not applicable to our experience in everyday life. That is why we will
start this chapter by discussing the Dirac polariser experiment [2]. This is a good example
to introduce some quantum concepts because photons, being bosonic particles, can
accumulate to provide macroscopic effects we can observe directly.

The polarisation of light is defined as the angle formed by the electric


field vector of electromagnetic radiation and the axis perpendicular to
its displacement (Fig 3.1). Generally, conventional light sources, such
as the sun, emit unpolarized light, whose electric field oscillates equally
in all directions. We can filter it using a polarizer, which is a grating
that only allows light that oscillates in the plane parallel to the filter
gratings to pass through. Light transmitted on the other side is
considered polarized light, since its electric field oscillates in only one Figure 3. 1.
direction. Polarisation angle

Imagine shining a beam of unpolarised light through a vertical polariser. The intensity of
light observed on the other side will be lower, since only the fraction of light polarised
parallel to the filter will pass through it. If we then add a horizontally polarised filter, no
light would reach the other side at all, as all of it is vertically polarized.

If the light beam is not able to pass through two filters, it would be logical to think that
the addition of a third filter cannot change this fact. But, surprisingly, if between the two
aforementioned filters we place a polariser with an angle of 45º, we will see that part of
the light is able to pass through all three filters (Fig. 3.2).

Figure 3. 2. Polariser at 45º between two parallel polarisers

In terms of classical physics (electromagnetism), this behavior can be described by the


classic principle of superposition and by the vector character of the incident radiation.
The vector decomposition of the electric field of the incident radiation is as follows:

𝐸%⃗" = 𝐸# 𝚤⃗ + 𝐸$# 𝚥⃗ (3.1)


Where 𝐸# is the x-axis component of the electric field and 𝐸$# is the y-axis component.

The intensity is proportional to the emergent amplitude, and the squares of the
components at 0 and 90 are related to each other:

|𝐸# |% = 𝑐𝑜𝑠 % 𝜃|𝐸" |% ; |𝐸$# |% = 𝑠𝑖𝑛% 𝜃|𝐸" |% (3.2)

|𝐸# |% + |𝐸$# |% = |𝐸" |% (𝑐𝑜𝑠 % 𝜃 + 𝑠𝑖𝑛% 𝜃) = |𝐸" |% (3.3)

The fraction of light passing through the first polariser is only the vertical component
(𝐸%⃗" ′ = 𝐸" 𝑠𝑖𝑛𝜃 ). As there is no component with projection on the x-axis, no light reaches
the other side if a horizontal polarizer is added (𝐸%⃗"&& = 0).

Using this classical electromagnetism approach we can estimate what proportion of the
radiation passes through each polarizer. But if only vertically polarized light pass through
the first filter, how is it possible that it can also pass through two other filters with
different polarization? We need to approach the problem from the point of view of
quantum physics. To this end we keep in mind that, as revealed by the photoelectric effect
[24], light is make of collection of photons, each with its own frequency and polarization.

The photon is the indivisible unit of light and, therefore, it is not possible for only a
fraction of it to pass through the filter. There are only two possible outcomes: to pass or
not to pass. We can deduce that there will be a certain probability that a photon will be
polarised in one direction or the other. Thus, when a beam of light passes through a
polarizer, some photons pass and others do not, and therefore the intensity of the emerging
light is lower.

The quantum state of a photon with any polarisation can be written as:

|𝜓' ⟩ = 𝑐( |𝑥⟩ + 𝑐) |𝑦: (3.4)

In our case |𝑥⟩ would be the state fully polarized along the x-axis and |𝑦⟩ would be the
state polarized along the y-axis. So the photon state is a superposition of two orthogonal
states ( ⟨𝑥|𝑦⟩ = 0 ). Necessarily, the probability that the photon is polarised in any
direction must be 100%. Therefore, the wave function will be normalized,

⟨𝜓' |𝜓' ⟩ = 𝑐( % + 𝑐) % = 1 (3.5)

The square of the coefficients 𝑐( and 𝑐) are related to the probability that the photon is
polarised in one direction or the other.

It is important to note that the measurement changes the state of


the system. In our case the measuring device is the polarizer. The
photons that manage to pass through the first filter must be
polarized along the y-axis, so their state has changed to:
Figure 3. 3. polarization axes
|𝜓'% ⟩ = |𝑦⟩ + 0|𝑥⟩ (3.6) after passing through the
filter at 45º (x’, y’)
Since now 𝑐( % = 0 , these photons will not be able to pass through a second horizontal
polarizer. But if we add in between a polarizer which is not orthogonal (e.g. 45º), the
projection of the photon polarized along |𝑦⟩ over |𝑦′⟩ is finite (Fig.3.3). We could rewrite
the wave function with the new axes:

|𝜓'% ⟩ = |𝑦⟩ = 𝑐( ′|𝑥′⟩ + 𝑐) ′|𝑦′: (3.7)

Where both 𝑐( ′ and 𝑐) ′ are finite. Now the photons can pass through the second polarizer
with probability 𝑐) % and collapse to |𝜓'* ⟩ = |𝑦′⟩ . (Fig. 3.4 (b))

As we can see, |𝑦′⟩ is no longer orthogonal to |𝑥⟩, or to |𝑦′′⟩ if we rewrite the axes for the
horizontal polarizer (Fig. 3.4 (c)). Consequently, photons will be able to pass through the
third filter with a finite probability.

Figure 3. 4. Polarization direction and new axes for the three filters

So far we have managed to introduce the concept of superposition and some other basic
ideas of quantum physics. Thus, let's leave aside Dirac's experiment and move on to
another important phenomenon: entanglement.

Mathematically, entanglement is defined as the state of a composite system that cannot


be expressed as a direct product of its individual states. In this state, one constituent
cannot be fully described without considering the others.

Consider a system consisting of two indistinguishable particles. It is a fundamental


property of quantum physics that they must be symmetric or antisymmetric with respect
to the exchange of particles. If the particles are indistinguishable, the Hamiltonian must
remain unaffected by exchanging their coordinates:

𝑃>+, 𝐻
@ =𝐻
@ 𝑃>+, ; A𝑃>+, , 𝐻
@C = 0 (3.8)

That is, the Hamiltonian (𝐻@ ) and the permutation operator (𝑃>+, ) commute. This in turn
implies that they share a complete set of eigenfunctions. Therefore, when applying the
operator on a wave function, we obtain the same function, multiplied by its eigenvalue,
𝜆.

𝑃>+, 𝜓(𝑘, 𝑙) = 𝜓(𝑙, 𝑘) = 𝜆 𝜓(𝑘, 𝑙) (3.9)

Since 𝑃>+, is a hermitic operator, 𝜆 must be a real number. If we apply the operator twice:

𝑃>+, 𝑃>+, 𝜓(𝑘, 𝑙) = 𝑃>+, 𝜆 𝜓(𝑙, 𝑘) = 𝜆% 𝜓(𝑘, 𝑙) (3.10)

But if we permute twice the coordinates of a wave function, it remains unchanged, then
𝜆% = 1. From this we can deduce that 𝜆 = ±1. Particles with 𝜆 = +1 are called bosons
(e.g., photons) and we say that they are symmetric with respect to the permutation. On
the other hand, particles with 𝜆 = −1 are called fermions (e.g., electrons) and these are
antisymmetric with respect to the permutation.

Let us imagine now that we have a system formed by two particles that do not interact
(perhaps because they are far apart in space). The Hamiltonian of the system could be
written as
@ = ∑- ℎ>- (3.11)
𝐻

where ℎ>- is the Hamiltonian acting on the i-th single particle. We could think that, since
there is separation of variables, the wave function could be written as the product of the
independent particles.

𝜓(𝜏. , 𝜏% ) = 𝜙/ (𝜏. ) 𝜙0 (𝜏% ) (3.12)

where 𝜙/ would be the orbital of particle 1 and 𝜙0 the orbital of particle 2.

However, the wave function (3.12) does not have the required symmetry properties
because it does not fulfill Eq. (3.9). As we have seen above, for indistinguishable particles
it must be symmetric or antisymmetric with respect to the permutation. If our system
consists of two bosons, the required wave function would be:

𝜓 = 𝑁[𝜙/ (𝜏. ) 𝜙0 (𝜏% ) + 𝜙/ (𝜏% ) 𝜙0 (𝜏. )] (3.13)

While in case of electrons, which are fermions, the function

𝜙/ (𝜏. ) 𝜙/ (𝜏% )
𝜓 = 𝑁[𝜙/ (𝜏. ) 𝜙0 (𝜏% ) − 𝜙/ (𝜏% ) 𝜙0 (𝜏. )] = P Q (3.14)
𝜙0 (𝜏. ) 𝜙0 (𝜏% )

is the function to be considered (a Slater determinant). If the composite system is in this


state, it is impossible to attribute to either electron 1 or electron 2 a definite pure state.
We say then that it is in an entangled state.

Incidentally, we note from Eq. (3.14) that if 𝜙/ = 𝜙0 , the wave function vanishes. This
is a manifestation of the Pauli principle, which states that there cannot be in a system two
identical fermions occupying the same spinorbital.
One last fundamental aspect of quantum mechanics, which we will rely on in future
chapters when discussing quantum computing, is that of time-dependent perturbations in
a quantum system.

The evolution of the state of a system in time is given by the time-dependent Schrodinger
equation [26]:

ℏ 23
−- @ (𝑞, 𝑡) 𝜓
=𝐻 (3.15)
24

@ (𝑞, 𝑡) is the
where ℏ is the reduced Planck constant, 𝜓 the system's eigenfunction and 𝐻
Hamiltonian operator.

Up to this time and throughout the degree, when studying this equation we have focused
on systems described by time-independent Hamiltonians. Then, it is reasonable to make
a separation of variables and writte 𝜓- as a product of a function of space coordinates (𝑞)
and a function of time (𝑡):

𝜓- (𝑞, 𝑡) = 𝑓- (𝑞) · 𝜒- (𝑡) = 𝑓- (𝑞) · 𝑒 56-4/ℏ (3.16)

@ (𝑞) 𝜓- (𝑞, 𝑡) = 𝐻
𝐻 @ (𝑞) 𝑓- (𝑞) · 𝜒- (𝑡) = 𝜒- (𝑡) 𝐻
@ (𝑞) 𝑓- (𝑞) (3.17)

This corresponds to a stationary state, since the probability distribution is independent of


time, ⟨𝜓- |𝜓- ⟩ = ⟨𝑓- |𝑓- ⟩ .

In the case that we would need to manipulate the state of a quantum system, the
Hamiltonian becomes time-dependent, and the solutions are no longer stationary states,
but combinations of stationary states.

𝜓- (𝑞, 𝑡) = ∑- 𝑓- (𝑞) · 𝑒 56-4/ℏ (3.18)

To illustrate how this changes the behavior of quantum systems,, we will use one of the
simplest examples: the particle in a 1D box [26].
! !
@ 𝜓 = 89 𝜓 = − ℏ ; ! 𝜓 = 𝐸 𝜓
𝐻 (3.19)
%: %: ;(

If we apply a time-independent Hamiltonian as in (3.17), the eigenfunctions obtained are:

% !>(
𝜓! (𝑥) = Y = 𝑠𝑖𝑛 =
(3.20)

and the corresponding probability density is:

2 𝑛𝜋𝑥
|𝜓(𝑥)|% = sin%
𝐿 𝐿

Fig. (3.5) shows the functions and probability densities of the states corresponding to the
two lowest suffices needed to study the time-dependent example we want.
Figure 3. 5. Plots for ψ(x) and |ψ(x)|2 using Mathematica

As we can see, in any of both stationary states, there is a finite probability of finding the
particle on either side of the box at any time. This is not the case for non-stationary states.
Let suppose as an example that we induce a spectroscopic transition between the
fundamental state and the first excited state of the particle in the box.

A good approximation to this non-stationary state would be a 50% combination of the


first two stationary states
. ( (
𝜓(𝑥, 𝑡) = (sin 𝜋 · 𝑒 5-6" 4/ℏ + sin 2𝜋 · 𝑒 5-6! 4/ℏ ). (3.22)
√= = =

. >( %>( >( %>(


|𝜓(𝑥, 𝑡)|% = _sin% + sin% + 2 sin sin cos 𝜔𝑡c (3.23)
√= = = = =

If we compare (3.23) with (3.20) we see that, unlike in stationary states, the probability
density in non-stationary states depends on time. Plotting the evolution of |𝜓(𝑥, 𝑡)|% with
time, we can see that the location of the particle changes and it bounces from wall to wall.
Therefore, it is impossible to find the particle on either side of the box at certain times.

Figure 3. 6. Plots for |ψ(x)|2 with evolution of time using Mathematica


Trabajos citados

[1] M. A. Nielsen and I. Chuang, Quantum computation and quantum information,


2002.
[2] P. Dirac, The Principles of Quantum Mechanics (2ª ed.), Clarendon Press, 1947.
[3] E. Schrödinger, "Discussion of probability relations between separated systems,"
Mathematical Proceedings of the Cambridge Philosophical Society, vol. 4, no. 31,
pp. 555-563, 1935.
[4] D. Deutsch and R. Jozsa, "Rapid solution of problems by quantum computation,"
Proceedings of the Royal Society , vol. A, no. 439, pp. 553-558, 1992.
[5] D. Stebila, M. Mosca and N. Lütkenhaus, "The Case for Quantum Key
Distribution," Quantum Communication and Quantum Networking, no. 36, pp.
283-296, 2010.
[6] T. ohnson, S. Clark and D. Jaksch, "What is a quantum simulator," EPJ Quantum
Technology, vol. 1, no. 10, 2014.
[7] P. Bajpai, "Quantum computing: how to invest in it, and which companies are
leading the way?," Nasdaq, 2020.
[8] P. Benioff, "The Computer as a Physical System: A Microscopic Quantum
Mechanical Hamiltonian Model of Computers as Represented by Turing
Machines," Journal of Statistical Physics, vol. 5, no. 22, pp. 563-591, 1980.
[9] R. Feynman, "Simulating Physics with Computers," International Journal of
Theoretical Physics, vol. 6/7, no. 21, pp. 467-488, 1982.
[10] Y. I. Manin, Vychislimoe i nevychislimoe [Computable and Noncomputable] (in
Russian), Movska: Sovetskoe Radio, 1980.
[11] D. Hilbert and W. Ackermann, Grundzüge der theoretischen Logik (Principles of
Mathematical Logic), Berlín: Springer, 1928.
[12] A. Church, "An unsolvable problem of elementary number theory," American
Journal of Mathematics, no. 58, pp. 345-363, 1936.
[13] A. Turing, "On Computable Numvers, with an Application to the
Entscheidungsproblem," Proceedings of the London Mathematical Society, vol. 2,
no. 42, pp. 230-265, 1936.
[14] S. C. Kleene, Introduction to Metamathematics, North-Holland, 1952.
[15] S. P. W., "Algorithms for quantum computation: discrete logarithms and
factoring," in Proceedings 35th Annual Symposium on Foundations of Computer
Science, 1994.
[16] P. Kaye, R. Laflamme and M. Mosca, An introduction to quantum computing,
Oxford University Press., 2007.
[17] E. Knill, R. Laflamme and L. Viola, "Theory of Quantum Error Correction for
General Noise," Physical Review Letters, vol. 11, no. 84, pp. 2525-2528, 2000.
[18] A. S. Holevo, C. M. Caves, H. P. Yuen and L. Accardi, Quantum Communication,
Computing, and Measurement, Springer US, 1997.
[19] "IBM Building First Universal Quantum Computers for Business and Science," IBM
News Room, 06 March 2017.
[20] "IBM Unveil's World's First Integrated Quantum Computing System for
Commercial Use," IBM News Room, 8 January 2019.
[21] F. Tavares, "Google and NASA Achieve Quantum Supremacy," NASA's Ames
Research Center, 23 October 2019.
[22] L. K. Grover, "A fast quantum mechanical algorithm for database search," in
Proceedings of the 28th Annual ACM Symposium of the Theory of Computing,
1996.
[23] J. C. Amengual and V. R. Tomás, Informática básica. Conceptos básicos de
informática, Castelló de la Plana: Publicacions de la Universitat Jaume I. Servei de
Comunicació i Publicacions .
[24] J. Planelles, Noves notes de Química Quàntica, Castelló de la Plana: Publicacions
de la Universitat Jaume I. Servei de Comunicació i Publicacions, 2010.
[25] D. J. P. E. Hodgson, First Order Logic, Philadelphia: Saint Joseph's University,
1995.
[26] F. Schwabl, Quantum Mechanics, Springer-Verlag Berlin Heidelberg, 2007.

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy