lecture5
lecture5
Lecture 5
Anuj Dawar
Some Applications
Eve
qubit channel The protocol does not provide
Alice Bob the means of transmitting an
classical channel arbitrary message.
• For each qubit, Bob randomly chooses either the basis |0i, |1i or the
basis H|0i, H|1i and measures the qubit in the chosen basis.
• Bob announces (over the classical channel) which basis he used for
each measurement.
• Alice tells Bob which measurements were made in the correct basis.
• The qubits which were measured in the wrong basis are discarded,
while the rest form a shared key.
Attacks
Why not announce the bases for all qubits before transmission, thus
avoiding the loss of half the bits?
This allows Eve to intercept, measure and re-transmit the bits.
Why not wait until Bob has received all the qubits, then have Alice
announce the basis for each one before Bob measures them?
• Requires Bob to store the qubits—currently technically difficult.
• If Bob can store the qubits, then Eve can too and then she can
retransmit after measurement.
If we could fix the basis before hand, this could be used to transmit a
fixed (rather than random) message.
Attack 2
What happens if Eve intercepts the qubits, measures each one randomly
in either the basis |0i, |1i or the basis H|0i, H|1i and then retransmits it?
For half of the bits that are shared between Alice and Bob, Eve will have
measured them in the wrong basis.
Moreover, these bits will have changed state, and so for approx. 14 of the
shared bits, the value measured by Bob will be different to the one
encoded by Alice.
Alice and Bob can choose a random sample of their shared bits and
publically check their values against each other and detect the presence
of an eavesdropper.
Attack 3
Could Eve intercept the qubits, make a copy without measuring them
and re-transmit to Bob and then wait for the basis to be announced?
No Cloning Theorem:
There is no unitary operation U which for an arbitrary state ψ
gives
U|ψ0i = |ψψi.
1 1
√ (|00i − |11i), √ (|01i − |10i)
2 2
√1 (|00i + |10i)
2
Superdense Coding
Then Alice can perform an operation solely on her own qubit, and then
send it to Bob to convey two bits of information.
Superdense Coding 2
Generating Bell states from √1 (|00i + |11i) with only operations on the
2
first qubit.
1 1
(X ⊗ I ) √ (|00i + |11i) = √ (|01i + |10i)
2 2
1 1
(Z ⊗ I ) √ (|00i + |11i) = √ (|00i − |11i)
2 2
1 1
((ZX ) ⊗ I ) √ (|00i + |11i) = √ (|01i − |10i)
2 2
Superdense Coding 3
Once he has both qubits, Bob can convert back to the computational
basis using the circuit.
After this, a measurement in the computational basis yields the two bits
that Alice intended to convey.
Quantum Teleportation
The superdense coding protocol allows Alice to send Bob two classical
bits by transmitting a single qubit, provided they already share an
entangled pair.
Contrast this with the no-cloning theorem, which tells us that we cannot
make a copy of a qubit.
Quantum Teleportation 2
Alice has a state |φi that she wishes to transmit to Bob. The two already
share a pair of qubits in state √12 (|00i + |11i).
|φi H
M
Entangled Pair
Quantum Teleportation 3
Alice conveys to Bob the result of her measurement. Say the qubit in
Bob’s possession is in state |θi, then:
• If Alice measures |00i, then |φi = |θi.
• If Alice measures |01i, then |φi = X |θi.
• If Alice measures |10i, then |φi = Z |θi.
• If Alice measures |11i, then |φi = XZ |θi.
Thus, Bob performs the appropriate operation and now has a qubit
whose state is exactly |φi.