Quantum Computing: Applications of Quantum Information
Quantum Computing: Applications of Quantum Information
Quantum Computing
Lecture 5
Anuj Dawar
Deutsch-Jozsa Problem
|0i H H
Uf
√1 (|0i − |1i)
2
Final result is [(−1)f (0) + (−1)f (1) ]|0i + [(−1)f (0) − (−1)f (1) ]|1i
which is |0i if f is constant and |1i if f is balanced.
4
Some Applications
Eve
qubit channel The protocol does not pro-
Alice Bob vide the means of transmit-
classical channel ting an arbitrary message.
Assumptions
The Protocol
The Protocol–contd.
• For each qubit, Bob randomly chooses either the basis |0i, |1i
or the basis H|0i, H|1i and measures the qubit in the chosen
basis.
• Bob announces (over the classical channel) which basis he used
for each measurement.
• Alice tells Bob which measurements were made in the correct
basis.
• The qubits which were measured in the wrong basis are
discarded, while the rest form a shared key.
9
Attacks
Why not announce the bases for all qubits before transmission,
thus avoiding the loss of half the bits?
This allows Eve to intercept, measure and re-transmit the
bits.
Why not wait until Bob has received all the qubits, then have Alice
announce the basis for each one before Bob measures them?
• Requires Bob to store the qubits—currently technically
difficult.
• If Bob can store the qubits, then Eve can too and then she can
retransmit after measurement.
If we could fix the basis before hand, this could be used to transmit
a fixed (rather than random) message.
10
Attack 2
For half of the bits that are shared between Alice and Bob, Eve will
have measured them in the wrong basis.
Moreover, these bits will have changed state, and so for approx. 14
of the shared bits, the value measured by Bob will be different to
the one encoded by Alice.
Alice and Bob can choose a random sample of their shared bits and
publically check their values against each other and detect the
presence of an eavesdropper.
11
Attack 3
No Cloning Theorem:
There is no unitary operation U which for an arbitrary
state ψ gives
U |ψ0i = |ψψi.
Key Distribution
Bell States
1 1
√ (|00i − |11i), √ (|01i − |10i)
2 2
√1 (|00i + |10i)
2
15
Superdense Coding
Then Alice can perform an operation solely on her own qubit, and
then send it to Bob to convey two bits of information.
16
Superdense Coding 2
1 1
(X ⊗ I) √ (|00i + |11i) = √ (|01i + |10i)
2 2
1 1
(Z ⊗ I) √ (|00i + |11i) = √ (|00i − |11i)
2 2
1 1
((XZ) ⊗ I) √ (|00i + |11i) = √ (|01i − |10i)
2 2
17
Superdense Coding 3
Quantum Teleportation
Quantum Teleportation 2
Alice has a state |φi that she wishes to transmit to Bob. The two
already share a pair of qubits in state √12 (|00i + |11i).
|φi H
M
Entangled Pair
20
Quantum Teleportation 3
Alice conveys to Bob the result of her measurement. Say the qubit
in Bob’s possession is in state |θi, then:
• If Alice measures |00i, then |φi = |θi.
• If Alice measures |01i, then |φi = X|θi.
• If Alice measures |10i, then |φi = Z|θi.
• If Alice measures |11i, then |φi = XZ|θi.
Thus, Bob performs the appropriate operation and now has a qubit
whose state is exactly |φi.