0% found this document useful (0 votes)
6 views18 pages

lecture5

It is educational

Uploaded by

ROWNITA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
6 views18 pages

lecture5

It is educational

Uploaded by

ROWNITA
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

Quantum Computing

Lecture 5

Applications of Quantum Information

Anuj Dawar
Some Applications

We look at some applications of the encoding of information in quantum


states.
• Quantum Cryptography, or more accurately Quantum Key
Distribution.
• Superdense Coding.
• Quantum Teleportation

These do not rely on quantum computation as such, but the properties of


information encoded in quantum states: superposition and entanglement.
Quantum Key Distribution

A protocol for quantum key distribution was described by Bennett and


Brassard in 1984 (and is known as BB84).

Eve
qubit channel The protocol does not provide
Alice Bob the means of transmitting an
classical channel arbitrary message.

At the end of the protocol, there is a random sequence of bits that is


shared between Alice and Bob but unknown to any third party.
Assumptions

The BB84 protocol relies on the following assumptions:


• Alice has a source of random (classical) bits.
• Alice can produce qubits in states |0i and |1i.
• Alice can apply a Hadamard operator H to the qubits.
• Bob can measure incoming qubits
• either in the basis |0i, |1i;
• or in the basis √1 (|0i + |1i), √1 (|0i − |1i).
2 2

These conditions are satisfied, for instance, by a system based on


polarised photons.
The Protocol

Alice sends Bob a stream of qubits.

For each qubit, before sending it, she


• randomly chooses a bit |0i or |1i;
• randomly either applies H to the qubit or not; and
• sends it to Bob.

So, Bob receives a random sequence of qubits, each of which is in one of


the four states:
|0i, |1i, H|0i, H|1i
The Protocol–contd.

• For each qubit, Bob randomly chooses either the basis |0i, |1i or the
basis H|0i, H|1i and measures the qubit in the chosen basis.
• Bob announces (over the classical channel) which basis he used for
each measurement.
• Alice tells Bob which measurements were made in the correct basis.
• The qubits which were measured in the wrong basis are discarded,
while the rest form a shared key.
Attacks

Why not announce the bases for all qubits before transmission, thus
avoiding the loss of half the bits?
This allows Eve to intercept, measure and re-transmit the bits.
Why not wait until Bob has received all the qubits, then have Alice
announce the basis for each one before Bob measures them?
• Requires Bob to store the qubits—currently technically difficult.
• If Bob can store the qubits, then Eve can too and then she can
retransmit after measurement.
If we could fix the basis before hand, this could be used to transmit a
fixed (rather than random) message.
Attack 2

What happens if Eve intercepts the qubits, measures each one randomly
in either the basis |0i, |1i or the basis H|0i, H|1i and then retransmits it?

For half of the bits that are shared between Alice and Bob, Eve will have
measured them in the wrong basis.
Moreover, these bits will have changed state, and so for approx. 14 of the
shared bits, the value measured by Bob will be different to the one
encoded by Alice.
Alice and Bob can choose a random sample of their shared bits and
publically check their values against each other and detect the presence
of an eavesdropper.
Attack 3

Could Eve intercept the qubits, make a copy without measuring them
and re-transmit to Bob and then wait for the basis to be announced?

No Cloning Theorem:
There is no unitary operation U which for an arbitrary state ψ
gives
U|ψ0i = |ψψi.

Exercise: Prove the no-cloning theorem.


Key Distribution

Quantum key distribution relies on nothing more than


• linear superposition of states; and
• change of basis.

In particular, it does not rely on entanglement.


We next look at some applications of entanglement.
Bell States

Entanglement based protocols generally rely on using the following four


states of a two-qubit system, known as the Bell states.
1 1
√ (|00i + |11i), √ (|01i + |10i)
2 2

1 1
√ (|00i − |11i), √ (|01i − |10i)
2 2

These form an orthonormal basis for C4 , known as the Bell basis.

Note that, in each of the states, measuring either qubit in the


computational basis yields |0i or |1i with equal probability, but after the
measurement, the other bit is determined.
Generating Bell States

We can generate the Bell states from the computational basis


|00i, |01i, |10i, |11i using the following circuit:

|00i √1 (|00i + |11i)


2

√1 (|00i + |10i)
2
Superdense Coding

In general, it is impossible to extract more than one classical bit of


information from a single qubit.

However, if Alice and Bob is each in possession of one qubit of a pair in a


known Bell state
1
√ (|00i + |11i)
2

Then Alice can perform an operation solely on her own qubit, and then
send it to Bob to convey two bits of information.
Superdense Coding 2

Generating Bell states from √1 (|00i + |11i) with only operations on the
2
first qubit.
1 1
(X ⊗ I ) √ (|00i + |11i) = √ (|01i + |10i)
2 2

1 1
(Z ⊗ I ) √ (|00i + |11i) = √ (|00i − |11i)
2 2

1 1
((ZX ) ⊗ I ) √ (|00i + |11i) = √ (|01i − |10i)
2 2
Superdense Coding 3

Once he has both qubits, Bob can convert back to the computational
basis using the circuit.

After this, a measurement in the computational basis yields the two bits
that Alice intended to convey.
Quantum Teleportation

The superdense coding protocol allows Alice to send Bob two classical
bits by transmitting a single qubit, provided they already share an
entangled pair.

Conversely, the quantum teleportation protocol allows Alice to send Bob


a qubit, by sending just two classical bits along a classical channel,
provided they already share an entangled pair.

Contrast this with the no-cloning theorem, which tells us that we cannot
make a copy of a qubit.
Quantum Teleportation 2

Alice has a state |φi that she wishes to transmit to Bob. The two already
share a pair of qubits in state √12 (|00i + |11i).

|φi H

 M

Entangled Pair

Quantum Teleportation 3

Alice conveys to Bob the result of her measurement. Say the qubit in
Bob’s possession is in state |θi, then:
• If Alice measures |00i, then |φi = |θi.
• If Alice measures |01i, then |φi = X |θi.
• If Alice measures |10i, then |φi = Z |θi.
• If Alice measures |11i, then |φi = XZ |θi.

Thus, Bob performs the appropriate operation and now has a qubit
whose state is exactly |φi.

You might also like