Wang QuantumComputationQuantum 2012
Wang QuantumComputationQuantum 2012
REFERENCES
Linked references are available on JSTOR for this article:
https://www.jstor.org/stable/41714771?seq=1&cid=pdf-
reference#references_tab_contents
You may need to log in to JSTOR to access the linked references.
JSTOR is a not-for-profit service that helps scholars, researchers, and students discover, use, and build upon a wide
range of content in a trusted digital archive. We use information technology and tools to increase productivity and
facilitate new forms of scholarship. For more information about JSTOR, please contact [email protected].
Your use of the JSTOR archive indicates your acceptance of the Terms & Conditions of Use, available at
https://about.jstor.org/terms
Key words and phrases: Quantum algorithm, quantum bit (qubit), quan-
tum Fourier transform, quantum information, quantum mechanics, quantum
Monte Carlo, quantum probability, quantum simulation, quantum statistics.
373
can be measured
is motivated from the fact that the precisely
eigenvalues of self-
chanics is adjoint operators are real. Assume that an observable
intrinsically sto
only make X has a discrete spectrum with the following diagonal
probabilistic p
the form
measurements perfor
p
Quantum mechanics is m
a Hilbert (3) X=J^xaQ H
space a, and se
a= 1
A quantum system is com
state and the time evolution of the state. A state is where xa are real eigenvalues of X and Qa are
defined to be a unit vector in H. Let IVKO) be the corresponding one-dimensional projections onto
state of the quantum system at time t, which is also orthogonal eigenvectors of X. Consider such a
referred to as a wave function. The states 'ý(t')) andservable in the quantum system prepared in sta
Measure space (Í2, JF) is used to describe pos
I tyto)) at t' and t2 are connected through 'ir{h)) =
measurement outcomes of the observable, and th
U(/i, t2)'Ý(h)), where U(fi, ¿2) is a unitary operator
sult of the measurement is a random variable on (£2
depending only on time t' and t2- In fact, there exists a
with probability distribution Pp. We denote by X
self-adjoint operator H, which is known as the Hamil-
result of the measurement of observable X give
tonian of the quantum system, such that U(fi , ti) =
(3). Then X is a random variable taking value
exp[- í'H(í2 - íi)]. With Hamiltonian H, we may de-
{x',x2, . . . and under pure state | ý ), the prob
scribe the continuous time evolution of | ý(t)) by the
ity that measurement outcome xa occurs is defin
Schrödinger equation be
/"i' . 9IVK0) ni ; . / - 7
/"i' (1) i . - - - = H|VK0), ni ; i=v- . / 7 1.P(a) = Pp{X = xa)
Ot
= {t'QaW)=Tma't)m, a = 1,2,....
Alternatively a quantum system can be described by
With the probability we derive the expectation unde
a density operator (or density matrix). A density oper-
pure state 'ý),
ator p is an operator on 7i which (1) is self-adjoint;
(2) is semi-positive definite; (3) has unit trace [i.e., E^(X) = ^xaP(a) = ^xa{f IQalf )
a a
Tr(/o) = 1]. Following the convention in quantum in-
formation science, we reserve notation p for state, den- = (Ý'X'f)=Tr(X'Ý)(f').
sity operator or density matrix. A state is often classi- Note the difference between an observable X which is a
fied as a pure state or an ensemble of pure states. A pure Hermitian matrix and its measurement result X which
state is a unit vector ''fr) in H, which corresponds to a is a real- valued random variable.
density operator p = IVf)(1AK and an ensemble of pure Measuring observable X will alter the state of the
states corresponds to the case that the quantum system quantum system (Kiefer, 2004; von Neumann, 1955).
is in one of states 'ýj), j = 1, J, with probability If the quantum system is prepared with initial state 'ý),
Pj being in state |i (rj), and the corresponding density the state of the system after the measurement result xa
operator is defined to be
J
(4) %!ŽL
(2) p = J^pj'Ýj)(Ýj'-
j= 1 For an ensemble state with density operator
by (2), if the quantum state is | ýj), the probabil
See Griffiths (2004), Sakurai and Napolitano (2010)
result xa occurs is
and Shankar (1994).
P(a'j) = (Ýj'Qa'Ýj)=Tr(Qa'Ýj)(Ýj').
2.3 Quantum Probability
Applying the law of total probability, we obtain that
We can test the theory of quantum mechanics by under state p, the probability that xa occurs is equal to
checking its predictions with experiments of perform- j
ing measurements on quantum systems in the labora- P(a) = P„(X = xa) = J2 PjP(a'j)
tory. The usual quantum measurements are on observ- j= 1
ables such as position, momentum, spin, and so on, J
orthonormal basis
where amplitudes ax are complexfor the
numbers satisfying
to as computational
l«ool2 + |«oil2 + l«iol2 + |«n|2 = 1. As in basis
the single
can examine it to determine whether it is in the state qubit case, when two qubits are measured we get result
0 or 1 . However, for a qubit we cannot determine its x being one of 00,01, 10, 11, with probability |ax|2.
state and find the values of «o and ai by examining it. Moreover, we may measure just the first qubit of the
The stochastic nature of quantum theory shows that we two-qubit system and obtain either the result 0, with
can measure a qubit and obtain either the result 0, with probability |aool2 + |«oi I2» or the result 1, with proba-
probability |ccol2> or the result 1, with probability 'a' '2. bility |ofiol2 + |of 1 1 12. As quantum measuring changes
Physical experiments have realized qubits as physical the quantum state, if the measurement result on the first
objects in different physical systems, such as the two qubit is 0, after the measurement the qubits are in the
states of an electron orbiting a single atom, the two dif- state
ferent polarizations of a photon, or the alignment of a
aoo|00) +aoi|01)
nuclear spin in a uniform magnetic field. Consider the P/ j •
case of atom model by corresponding |0) and |1) with y l«ool2
the so-called "ground" and "excited" states of the elec-
tron, respectively. As the atom is shined by light with A qubit is t
suitable energy and for a proper amount of time, the tum system
electron can be moved from the |0) state to the 1 1) state al complex v
and vice versa. Furthermore, by shortening the length specified by
of time shining the light on the atom, we may move the tially in b, i
electron initially in the state |0) to "halfway" between an enormou
|0) and 1 1), say, into a state (|0) + |1))/V2. with even a
Note that for qubit state | 'jf) the only measurable sources of e
quantities are the probabilities |aol2 and |ai|2; since a quantum s
'e'eax' 2 = la* I2, where x = 0, 1, i = V- Ï, and 0 is amplitudes a
a real number, from the viewpoint of the qubit mea- With 128 bit
surements, states eie''¡r) and 'ý) are identical. That is, 32 thousand
multiplying a qubit state by a global phase factor eld complex am
bears no observational consequence. available in f
Note the distinction between superposition states tem with b
and probability mixtures (or ensemble of pure states plex amplitu
defined in Section 2.1). Consider superposition (|0) + store all 250
|l»/>/2as a pure state. Its density matrix is given by puters. In pr
5CIO) + |1»«0| + (1|) hundred atom
of data and e
= 5 (|0) <0| + |1)(1|) + |(|0)(1| + |1)(0|), Quantum com
while the first term on the right-hand side of the above find ways to
equation corresponds to the ensemble of pure states |0) tional power
and 1 1), that is, a probabilistic mixture of states |0) and
3.2 Quantum Circuit Model
|1) with equal probability.
Similar to classic bits, we can define multiple As a classical computer is built from an electri-
qubits. The states of b qubits are unit vectors in a 2b- cal circuit consisting of wires for carrying informa-
dimensional complex vector space with 2b computa- tion around the circuit and logic gates for perform-
tional basis states of the form 'x'x2 - ■ -Xb), Xj = 0 or ing simple computational tasks, a quantum computer
1, j = 1, . . . , b. For example, the states of two qubits can be created from a quantum circuit with quantum
are unit vectors in a four-dimensional complex vec- gates to perform quantum computation and manipulate
tor space, with four computational basis states labeled quantum information. A number of physical systems
by 1 00), |01), 1 10) and |11). The computational ba- are being investigated for building quantum comput-
sis states 1 00), |01), 1 10) and 1 1 1) generate the four- ers. These include optical photon, optical cavity quan-
dimensional complex vector space, and the superposi- tum electrodynamics, ion traps, nuclear magnetic res-
tion states are all unit vector in the space with the forms
onance with molecules, quantum dots, and supercon-
IVO =aoo|00) +«01 101) +aio|10> +an|ll), ductors (Nielsen and Chuang, 2000). In fact, prim-
3.3 been
itive solid-state quantum processors have Entanglement
cre-
ated in research laboratories to run quantum algorithms
Quantum entanglement is one of the most
(DiCarlo et al., 2009; Johnson et al., 201 1; Mariantoni
bending creatures known to science. It is refe
et al., 2011; Sayrin et al., 2011). The circuit model
as the phenomenon that two qubits behave lik
is particularly important in quantum computation and
that are connected by an invisible wave to sha
quantum information, and a quantum computer is often
other's properties.
synonymous with the quantum circuit model. A quan-
tum circuit operates on b qubits for some3.3.1integer
Bellb.
states. Consider a quantum gate on
The state takes a form of |xi • • -Xb), with state
qubit space
basis states |00), |01), 1 10) and 1 1 1 ) that
being a 2b -dimensional complex Hilbert posed
space.ofWhen
a Hadamard gate on the first qubit and
x¡ = 0 or 1, states 'x'---xb) are the computational
followed ba-by a control-NOT gate. The output st
the
sis states of the quantum computer and often gate are
written as as follows:
|x), where x is the integer with binary representation
100) H- 111) |01) + 110)
i°°) ^ - vi - • |01>^- 7|- ' •
X' •■■Xb-
small overhead of classical communication.in the statea |00) and Bob's qubit in state |f ). There-
Recently
breakthrough in quantum teleportation hasfore,
beenifmade
Alice's measurement result on her qubits is 00,
thendata
by successfully transferring complex quantum Bob's qubit will be in state |f ). Below is a list of
in-
Bob's four
stantaneously from one place to another, paving thepost-measurement states corresponding to
way for real-world applications of quantumthe results of Alice's measurements:
communi-
cations (Lee et al., 201 1).
00 - >■ ofo |0) - I- of 1 1 1 ) , 01 -> atoll) +t*i|0),
Here is how it works. Alice interacts the qubit 't¡r) to
10 -then
be teleported with her half of the Bell state, and > a0|0) - «i 1 1 ) , ll-»ao|l)-ai|0).
performs a measurement on the two interacted qubits
As Alice's measurement outcome on her qubits is one
to obtain one of four possible two-classical-bit results:
of 00, 01, 10 and 11, depending on her measurement
00, 01, 10 and 11. She sends the two-bit information
outcome Bob's qubit will be one of the above four pos-
via classical communication to Bob. Depending on Al-
sible states. Once Alice sends to Bob her two-classical-
ice's classical message, Bob performs one of bitfour op-
measurement outcome through a classical chan-
erations on his half of the Bell state. Surprisingly, the
nel, he applies appropriate quantum gates to his state
described procedure allows Bob to recover the original|f ). For example, if her measurement is
and recovers
state |f). 00, Bob's state is If), and he does not need to apply
Specifically assume that the state to be teleported is any quantum gate. If her measurement is 01, then Bob
If) = ao|0) + of 1 1 1 > , where ao and a' are unknown needs to apply a a x gate to his state aol 1) + a' |0) and
amplitudes. First, consider a three-qubit state yields |f ). If her measurement is 10, then applying a
a z gate to his state ao|0) - «i 1 1) Bob recovers |f ). If
, X ,,J00) + |11>
, l<Po) X = If) her measurement is 11, then Bob can fix up his state
V2
ao|l) - <*i|0) to recover | f ) by applying first a a x
gate and then a az gate. Here the a x and az gates are
= -Uao|0>(|00) + 111» +«i|l>(|00>
V2 defined by Pauli matrices ax and <rz given by (7). In
summary, according to Alice's measurement outcome,
where the first two qubits (on the left) belong to Alice,
applying some appropriate quantum gates to his qubit
and the third qubit to Bob. Note that Alice's second
Bob will recover the state |f ).
qubit and Bob's third qubit are from the entangled Bell
A few important remarks about quantum teleporta-
state. Second, Alice applies a control-NOT gate to her
tion are in the line. First, quantum teleportation does
qubits in |<po) and obtains
not involve any transfer of matter or energy. Alice's
particle has not been physically moved to Bob; only
'n) = ^[«0|0)(|00) + |ii)) + «i|i>(|io) + |oi»]. its state has been transferred. Second, after the tele-
Third, she applies a Hadamard gate to the first qubit in portation Bob's qubit will be on the teleported state,
'<p') and gets while Alice's qubit will become some undefined part
of an entangled state. In other words, what the telepor-
'<Pi) = 2t«o(|0) + |1))(|00) + |11>) tation does is that a qubit was destroyed in one place
+ ai(|0)-|l»(|10) + |01»]. but instantaneously resurrected in another. Teleporta-
tion does not copy any qubits, and hence is consistent
We regroup the terms of 'q>2) and rewrite it as follows:
with the no-cloning theorem (which forbids the cre-
ation of identical copies of an arbitrary unknown quan-
'n) = j[|00)(ao|0) +ai|l>) + |01)(ao|l) +ai|0))
tum state; see Wootters and Zurek, 1982). Third, in or-
+ |10)(a0|0)-ai|l)) der to teleportate a qubit, Alice has to inform Bob of
+ |ll)(a0|l>- ai|0»]. her measurement by sending him two classical bits of
information. These two classical bits do not carry com-
The new expression has four terms, and each term pletehas
information about the qubit being teleported. If
Alice's qubits in one of four possible states |00),the|01),
two bits are intercepted by an eavesdropper, he or
1 10) and 1 11), and Bob's qubit is in the state related to know exactly what Bob needs to do in order to
she may
recover the desired state. However, this information is
the original state IVO - If Alice performs a measurement
on her qubits and informs Bob of the measurement re-if the eavesdropper cannot interact with the en-
useless
sult, then his post-measurement state is completelytangled
de- particle in Bob's possession. Also the require-
ment of sending two bits of information via classical
termined. For example, the first term has Alice's qubits
Alice takes the first qubit of IVO while Bob gets its where the sum is over all possible 2b va
second qubit. Define four observables with eigenvalues ond, apply quantum circuit U/ defined
±1, obtained b + 1 qubit state to yield
Xi=(Tz, X2=Ox,
on the first qubit and ¿ E «!/«>•
oz + ox az - ax The quantum circuit with b Hadamard gates is ex-
= 7T~" X4=~vl~'
tremely efficient in producing an equal superposition
4.2 Phase Estimation O.771 í?2 ■■•rib is the first b bit representation in the bi-
nary expansion of (p , which satisfies 0 <<p - t]/2b <
Quantum algorithms are of random nature in
2-bthe
sense that they are able to produce correct answers only
Perform the inverse quantum Fourier transform on
with some probabilities. Consider quantum phase esti-
the first register given by (1 1), which is obtained in the
mation which provides the key to many quantum algo-
first stage results, and get
rithms. Assume that a unitary operator U has an eigen-
vector 'x) with eigenvalue e2ni<p . The phase <p of the
eigenvalue is unknown and the goal of the phase es- 1 £ e-2mUI2»e2ni^g)=2Y^ M¿h
timation algorithm is to estimate <p based on the as- M=o e=o
First, we apply Hadamard transform to the first reg- phase estimation is ij and dividing the result by 2b gives
ister and then controlled-U operations on the second <p = ř)/2b. Let Ç be the specified accuracy for the phase
register, with U raised to successive powers of 2, to ob- estimation procedure. By adding up Ijö^l2 with I being
tain the final state with the second register unchanged within Ç2b, we bound the probability that the obtained
and the first register given by <p is within Ç from <p:
p('v-<p'<o>p('n-ri'<ab-v
¿(|0>+*2*i2*-,«'|l>)
(11) • (|0) + e2ni2b~2<e'')) • • • (|0) + e2jti20,fi'l)) - 1 ~ 2(ç2b - 2) '
For € > 0, set
= 255k=0
S«2"**!«-
(13) i,= [l„g2(i)] + [log2(2+i)].
If <p is expressed exactly in b bits as <p = 0.<pi ■■■(pb,
(11) becomes Then P{'ip - <p' < Ç) > 1 - e, that is, with probabil-
ity at least 1 - e the phase estimation procedure can
J_(|0 )+e2^b'')) successfully produce čp within Ç from the true (p. See
Nielsen and Chuang (2000).
(12) ■('0) + e2ni()(('b-m''))--- 4.3 Statistical Analysis
. ('Q) + e2ni°4'm "(pb'l)),
The phase estimation algorithm requires b qubits for
which is the quantum Fourier transform of the product the first register to achieve [- log2 £] bit accuracy and
state '(pi<p2---<pb)- success probability 1 - e. With accuracy fixed, to in-
The second stage of phase estimation is to take the crease the success probability the required qubits
inverse quantum Fourier transform on the first register.
For <p = 0.<pi ■■■<pb, the output state from the second
stage is '<p'cp2 • • • <Pb), and a measurement in the com-
t~1-log2f+47ib-
putational basis yields (p'---(pb and dividing the mea- which grows at a very fast rate. For example, an in-
surement by 2b gives <p' - ■ ■ (pb/ 2b = 0.<p' ■ ■ ■ <pb = (p. crease in success probability from 90% to 99% re-
We obtain a perfect estimate of cp. quires eighteen times of qubit increase compared to the
Now we consider the case that <p cannot be expressed change from 80% to 90%.
exactly with a b bit binary expansion. Take 0 < t] < Quantum algorithms are of random nature in the
2b to be the integer that its binary fraction r¡/2b = sense that they often produce correct answers only with
reminder 1
difficult,(Shor, 1997
though not impossible, to invert the encryp-
The quantum algorithm
tion transformation. When publishing the public key
quantum Bob keeps a matched secret key for for
algorithm easy inversion of
o
gorithm for order-findin
the encryption transformation and decryption of the re-
tion algorithm to
ceived information. the
One of unit
the most widely used pub-
lic key cryptosystems is the RSA cryptosystem, which
U|y) = |xy(modJV)).
is named after its creator Rivest, Shamir and Adleman
The (Menezes, van Oorschot and
eigenvectors ofVanstone,U 1996; Rivest
ar
Shamir and Adleman, 1978). RSA is built on the math-
, , 1 v-i ( ~2 7tisk' k ematical asymmetry of factoring: it is easy to multi-
, l"i) , = -7= 2^exP(
v ¡ r k=0 ' r / ply large prime numbers and obtain their product as
composite number but hard to find the prime factors
s = 0, 1 , . . . , r - 1 , i = '/- I,
of a given large composite number. RSA encryption
keeps
with corresponding eigenvalues exp(2nis/r). the large primes as a secret key and uses their
Using
the phase estimation algorithm we can obtain the to make a "public key." Because of its expo-
product
eigenvalues exp(27ns/r) with high accuracy and nential
thus complexity, tremendous efforts tried to break
find the order r with certain probability. the RSA system so far have resulted in vain, and there
While the quantum factoring algorithm canisaccom- a widespread belief that the RSA system is secure
plish the task of factoring an «-bit integer with op-any classical computer based attacks. As the
against
erations of order n2 log n log log n, the currentfactoring
best problem can be efficiently solved by Shor's
known classical algorithm requires operations quantum
of order factoring algorithm, a quantum computer can
exp (w1/3 log2/3 n) to factor an n-bit composite break
number the RSA system easily. Fortunately, while quan-
(Crandall and Pomeranče, 2001). Note that thetum num-mechanics takes away with one hand, it gives back
ber of operations required in the best classical with
algo-the other. A quantum procedure known as quan-
rithm grows exponentially in the size of the tum cryptography or quantum key distribution can do
number
key distribution so that the communication security
being factored. Because of the exponential complex-
ity, the factoring problem is generally regarded cannot
as anbe compromised. The idea is based on the quan-
intractable problem on classical computers. tum principle that observing a quantum system will
The factoring problem plays an important role disturb
in the system being observed. If there is an eaves-
cryptography. Cryptography is to enable two dropper
parties,during the transmission of the quantum key be-
Alice and Bob, to communicate privately, whiletween it
Alice and Bob, eavesdropping will disturb the
quantum communication channel that is used to estab-
is very difficult for the third parties to "eavesdrop"
on the contents of the communications. Examples in-key, and the disturbance will make eavesdrop-
lish the
ping
clude ATM cards, computer passwords, internet com- visible. Alice and Bob will throw away the com-
promised key and keep only the secured key for their
mences, clandestine meetings and military communi-
communication.
cations. Two cryptographic protocols used in the com-
munications are private key cryptosystem and public
4.5 Quantum Search Algorithm
key cryptosystem. A private key cryptosystem requires
the two communicating parties to share a privateSuppose
key.that you would like to find the name corre-
Alice uses the key to encrypt the information, sends
sponding to a given phone number in a telephone direc-
the encrypted information to Bob who uses thetory;key
or suppose that there are some locations in a given
to decrypt the received information. The severe
city draw-
you would like to visit and wish to find the shortest
back of the private key cryptosystem is that route passing through all the locations. If there are N
the par-
names
ties have to safeguard the key transmission from in the telephone directory or N possible routes
being
eavesdropped. A public key cryptosystem invented in
to pass through all the locations, search algorithms by
the 1970s requires no sharing secret key in advance.
classical computers usually require operations of or-
Bob publishes a "public key" available to the gen-
der N. One such simple classical algorithm is to check
eral public, and Alice uses the public key to encrypt
exhaustively all names to find a name matching with
information and sends the encrypted information
the giventophone number or to search all possible routes
Bob. The encryption transformation is specially cre-find the shortest route among all routes. How-
and then
ever, Grover (1996, 1997) developed a quantum search
ated such that with only the public key, it is extremely
= + /!>>•
and Whaley, 2003 and Szegedy, 2004). In Section 5 we
show that the quantum search algorithm can also be
viewed as a quantum simulation procedure.
The Grover operator is to perform two reflections, one
about the vector '<f>) and another about the vector 'ý). 5. QUANTUM SIMULATION
The two reflections together are a rotation with angle 9
in the two-dimensional space spanned by '<f>) and '<p), Quantum simulation is to intentionally and artifi-
where cially mimic a natural quantum dynamics, which is
hard to access, and analyze, by a computer-generated
In- m
cos(0/2) = J - - - . quantum system, which is easy to manipulate and in-
vestigate. It provides scientific means for simulating
After the rotation, the initial state | '¡r) = cos(0/2)|</>) + complex biological, chemical or physical systems in
%in(9/2)'<p) becomes state order to study and understand certain scientific phe-
nomena and evaluate hard-to-obtain quantities in the
cos(30/2)| </>) + sin(36>/2)|^).
systems. Examples in modern scientific studies include
Thus each application of the Grover operator is a ro- the estimation of dielectric constant, proton mass, and
tation with angle 9. The initial state | 'fr) has angle precise energy of molecular hydrogen, the study of su-
n ¡2 - 6/2 with I (p)' after the first rotation, the resulted perconductivity, the test of novel nano-materials, and
state has angle n/2 - 39/2 with '<p) ; and in general af- the design of new biomolecules.
ter the rth rotation, the resulted state has angle n/2 - To simulate a quantum system we need to solve the
(2 r + 1)9/2 with | <p). Repeatedly applying the Grover Schrödinger equation (1) which governs the dynamic
operator, we rotate the state vector near | <p). With the evolution of the system. For a typical Hamiltonian with
initial state 'ý) = cos(ö/2)|</>) + ûn(9 /2)'<p) , we need real particles the Schrödinger equation usually consists
to rotate through arceos -JM/N radians to transform of elliptical differential equations, each of which can
the state vector to 'tp). After R = arccos ( ^/M/N) / 9 = be easily simulated by a classical computer. However,
Oi+JN/M) times of applications of the Grover opera- the real challenge in simulating a quantum system is
tor, we rotate the state vector | ý ) to within an angle 9 ¡2 to solve the exponential number of such differential
of '(p). Performing measurements of the state yields a equations. For a quantum system of b qubits, its states
Nielsen and an
Chuang,
error 2000
syndr
type of resource
what that
error,diff
if
tional observable
resources in has
classical
far from sponding
having a proje
general
tum entanglement but enc
Qo = |000)(0
far reveals the amazing pro
ture of Qi
entangled = |100)
states <10
an
between noisybit
quantum
flip on th
c
transformation. Consider q
reliable Q2
quantum = |010)(0
computat
tion processing.
bitQuantum
flip on the
in quantum computation
tion to Q3
protect = |001)
quantum <0
in
to quantum noise
bit and on
flip othe
th
tum gates. Classical inform
If one of three
achieve error-correction, b
syndrome wi
presents an obstacle to cop
responding to
and formulating a theory o
the first, secon
based on simple redundan
ample, if the f
glement comes to the resc
is IV) =ao|10
qubits but we can spread th
(ÝiQjiif) = 0
onto a highly entangled st
drome is 1. Al
(1995) first discovered the
ally causes cha
quantum error-correction c
of the constru
tion of one qubit onto a hig
surement does n
qubits. Over time several
to check that th
codes are proposed (Calderb
syndrome mea
et al., 1998;information
Steane, 1996
abo
error-correction codes can
not contain an
tion against quantum noise
tected, that is,
likely poses no fundamenta
about the amp
of large-scale quantum
erty is the com
gene
mation processing.
Step 2. The er
Here is how drome
quantum can erro
info
We consider thethe original
single qub
st
qubit ao|0) + a' | 1)
dicates is apassed
bit f
which flips the state
first of
qubit a qub
again
|1) to |0), each with +
ao|000) probab
oři 1
states |0) and 1 1)
error untouche
and doin
describe a bit
3 flip code
correspondtha t
quantum noise from
third the
qubit,bit
res
We encode states |0)
original and
state 1 w
encoded as |000)
one and
bit 1 1) in
flip as t
ao|0) + a' 1 1) is
that encoded
more thi
«i 1 1 1 1 ) . We
3 pass
p2 - 2each
p3, of
wh
independent ability
copy ofp the
of mb
that at mostflip
one channel.
qubit is f
T
ple two-step makes
error-correcti
the stor
recover the reliable. quantum
correct
Step 1. Perform
Nextawe measure
consi
structed observable
channel: and
a cal
pha
random numbers
the physical
are ge
tum the
computers quantum
are able
numbers isolated
and performin ort
It is at
exciting the
to same
design t
number sible
generatorso that
and s
computations
simulation. Perhaps w
Monte posing
Carlo requir
simulation
sical coupling
computers. of th
2. It is The coupling
interesting to inv
ence refers to the loss of coherence between the com-
tum computation and
computationalponents of a quantum system or quantum superposi-
statistics
computers tion from
may the interaction of the quantum
be system with
muc its
puters forenvironment. It is
computing very crucial but challenging to con-
Moreover, trolquantum
a quantum system of qubits and correct the effectscom
out some of decoherence
computation in quantum computation and quantum
prohibitive information.by Quantum computing
classicalhas witnessed great
ples are asadvances in
follows:recent years, and quantum computers of a
(a) W
of Grover's handful of qubits
search and basic quantum communication
algo
tum
devices have been built in research
algorithms for
laboratories (seeim
Barz et al., 2012; Clarke and Wilhelm, 2008; DiCarlo
procedures. For exampl
et al., 2009; Johnson et al., 2011; Lee et al., 2011;
huge data set is to searc
Neumann et al., 2008), but there are technological hur-
separates the top and bo
dles in the development of a quantum computer of large
quantum algorithms ca
capacity. History shows that scientific innovations and
for calculating median a
technological surprises are a never-ending saga. It is
genuine random numbe
anticipated that quantum computers with a few dozen
evaluation, quantum co
of qubits will be built in near future. As we have dis-
cant advantages over cla
cussed in Section 3.1, such a quantum computer has
Carlo integration. For e
capacity of a classical supercomputer. We are very op-
gration in high dimens
timistic that someday quantum computers will be avail-
or quadratically faster
able for statisticians to crunch numbers. For the time o
on classical computers,
being, instead of waiting in the sidelines for that to
quantum computers to
happen, statisticians should get into the field of play.
statistical It is
computing
time for us to dive into this frontier research and ta
putation discussed in Se
work with scientists and engineers to speed up the ar-
research along these lin
rival of practical quantum computers. As a last note,
and Wu (1999) and Hei
in 2011 a Canadian company called D-Wave has sold
3. As quantum computat
the claimed first commercial quantum computer of 128
are ideal for simulating
qubits to the Lockheed-Martin corporation, despite the
like the Ising
D- Wave's quantummodel,
system being criticized as a black it
interplay between
box. Large scale quantum computers mayquan be years
chain Monte Carlo
away, but quantum computing is already here meth
as a sci-
potential entific
to speed
endeavor to provoke deep thoughts and integrateup
rithms. In fact,
profound it
questions in physics has
and computer science. be
based algorithms can of
certain Markov ACKNOWLEDGMENTS chain b
al., 201 1 ; Richter, 2007
Wang's research was supported in part by NSF Grant
and Abeyesinghe, 2008)
DMS-10-05635. He thanks editor David Madigan and
Finally we point
two anonymous out
referees for helpful comments and t
wonderful suggestions which
but it led to is
significant improvements in
diffic
with present technology
both substance and the presentation of the paper.
of nonclassical wave packets of light. Science 332 330-333. Shankar, R. (1994). Principles of Quantum Mechanics , 2nd ed.
Lloyd, S. (1996). Universal quantum simulators. Science 273 Plenum Press, New York. MR1 343488
1073-1078. MR 1407944 Shenvi, N., Kempe, J. and Whaley, K. B. (2003). Quantum
Magniez, F., Nayak, A., Roland, J. and Santha, M. (2011). random- walk search algorithm. Phys. Rev. A 67 052307.
Search via quantum walk. SIAM J. Comput. 40 142-164. Shor, P. W. (1994). Algorithms for quantum computation: Dis-
MR2783206 crete logarithms and factoring. In 35 th Annual Symposium on
Mariantoni, M., Wang, H., Yamamoto, T., Neeley, M., Foundations of Computer Science ( Santa Fe , NM, 1994) 124 -
BialczakI, R. C., Chen, Y., Lenander, M., Lucero, E., 134. IEEE Comput. Soc. Press, Los Alamitos, CA. MR1489242
O'Connell, A. D., Sank, D., Weides, M., Wenner, J., Shor, P. W. (1995). Scheme for reducing decoherence in quantum
Yin, Y, Zhao, J., Korotkov, A. N., Cleland, A. N. computer memory. Phys. Rev. A 52 2493-2496.
and Martinis, J. M. (2011). Implementing the quantum Shor,
von P. W. (1997). Polynomial-time algorithms for prime factor-
Neumann architecture with superconducting circuits. Science 7ization and discrete logarithms on a quantum computer. SIAM
1208517. J. Comput. 26 1484-1509. MR1471990
Menezes, A., van Oorschot, P. C. and Vanstone, S. A. Steane, A.M. (1996a). Error correcting codes in quantum theory.
(1996). Handbook of Applied Cryptography. CRC Press, NewPhys. Rev. Lett. 11 793-797. MR1398854
York. Steane, A. (1996b). Multiple-particle interference and quantum
error correction. Proc. R. Soc. Lond. Ser. A 452 2551-2577.
Nayak, A. and Wu, F. (1999). The quantum query complexity
MR 142 1749
of approximating the median and related statistics. In Annual
Szegedy, M. (2004). Quantum speed-up of Markov chain based
ACM Symposium on Theory of Computing ( Atlanta , GA, 1999)
384-393. ACM, New York (electronic). MR1798059 algorithms. In Proc. 45th IEEE Symposium on Foundations of
Neumann, P., Mizuochi, N., Rempp, F., Hemmer, P., Computer Science 32-41. IEEE Computer Society Press, Los
Watanabe, H., Yamasaki, S., Jacques, V., Gaebel, T., Alamitos, CA.
Jelezko, F. and Wrachtrup, J. (2008). Multipartite entan-Trotter, H. F. (1959). On the product of semi-groups of opera-
glement among single spins in diamond. Science 320 1326-tors. Proc. Amer. Math. Soc. 10 545-551. MR0108732
1329. TSIRELSON, B. S. (1980). Quantum generalizations of Bell's in-
Nielsen, M. A. and Chuang, I. L. (2000). Quantum Computa- equality. Lett. Math. Phys. 4 93-100. MR0577178
tion and Quantum Information. Cambridge Univ. Press, Cam-Tulsi, A. (2008). Faster quantum- walk algorithm for the two-
bridge. MR 1796805 dimensional spatial search. Phys. Rev. A 78 012310.
Nightingale, M. P. and Umrigar, C. J., eds. (1999). Quan- VlDAKOVlC, B. (1999). Statistical Modeling by Wavelets. Wiley,
tum Monte Carlo Methods in Physics and Chemistry. NATO New York. MR1681904
Science Series C: Mathematical and Physical Sciences 525. VON Neumann, J. (1955). Mathematical Foundations of Quan-
Kluwer Academic, Dordrecht. MR 17 12250 tum Mechanics. Princeton Univ. Press, Princeton, NJ. Trans-
NUSSBAUM, M. and Szkola, A. (2009). The Chernoff lower lated by Robert T. Beyer. MR0066944
bound for symmetric quantum hypothesis testing. Ann. Statist. Wang, Y. Z. (1994). Quantum Gaussian processes. Acta Math.
37 1040-1057. MR2502660 Appl. Sin. {Engl. Ser.) 10 315-327. MR1310171
PARTHASARATHY, K. R. (1992). An Introduction to Quan- Wang, Y. (2011). Quantum Monte Carlo simulation. Ann. Appl.
tum Stochastic Calculus. Monographs in Mathematics 85. Stat. 5 669-683. MR2840170
Birkhäuser, Basel. MR 1164866 WOCJAN, P. and Abeyesinghe, A. (2008). Speed-up via quan-
Richter, P. C. (2007). Quantum speedup of classical mixing pro- tum sampling. arXiv:0804.4259v3[quant-ph].
cesses. Phys. Rev. A 76 042306. Wootters, W. K. and Zurek, W. H. (1982). A single quantum
Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method cannot be cloned. Nature 299 802-803.
for obtaining digital signatures and public-key cryptosystems. Yu, A. B. (2001). Campbell-Hausdorff formula. In Encyclopae-
Comm. ACM 21 120-126. MR0700103 dia of Mathematics (M. Hazewinkel, ed.). Kluwer Academic,
Rousseau, V. G. (2008). Stochastic Green function algorithm. Dordrecht.
Phys. Rev. E (3) 77 056705. MR2495497 Zalka, C. (1998). Simulating a quantum systems on a quantum
Sakurai, J. J. and Napolitano, J. (2010). Modern Quantum computer. R. Soc. Lond. Philos. Trans. Ser. A Math. Phys. Eng.
Mechanics , 2nd ed. Addison- Wesley, Reading, MA. Sci. 454 313-322.