Quantum_Computer_Science_course_lecture (1)
Quantum_Computer_Science_course_lecture (1)
• In 1905 Albert Einstein explained the photoelectric ef- (non-local) Entanglement. There are states, e.g. EPR-
fect by postulating that light is also quantized and comes states and Bell-states, which yield statistical correlations be-
in packets which he called photons. tween systems separated by a large physical distance, and
these correlations ‘must travel faster than the speed of light’,
• In 1913 Niels Bohr explained the spectral lines of the in fact, they are instantaneous. Surprisingly however, these
hydrogen atom emission spetra by a new model for the correlations cannot be used to send information faster than
atom which, a priori, involved discrete (i.e. quantized) light, and hence special relativity is not violated. These cor-
energy levels. relations have been experimentally observed many times dur-
ing the past 30 years, and are typically referred to as quantum
• In 1924 Louis de Broglie suggested that, dually to the
entanglement.
discrete ‘particle’ nature of light, matter should also be
thought of as having ‘wave’-like behavior.
Intrinsic probabilities. When we perform a quantum mea-
• Around 1925 Werner Heisenberg constructed matrix
surement, i.e. verify some physical property of a superposi-
mechanics and Erwin Schrödinger constructed wave me-
tion state, then the outcome will occur in a probabilistic man-
chanics including the Schrödinger equation.
ner. E.g. if we verify whether the cat is either dead or alive, or,
• John von Neumann developed the mathematically rig- whether the bit is either 0 or 1, then if we are in a superposi-
orous Hilbert space formalism for quantum mechanics tion state — both outcomes can occur with some probability.
which is now still in use — first published in 1932 [2]. There are mathematical theorems which state that by assign-
Also, Paul Dirac’s bra-ket notation, which appeared in ing additional statistical variables to the quantum system we
his 1930 book, remains in popular use today [5]. cannot get rid of these probabilities [6, 7].
Superposition. When a system (e.g. a particle) admits 2. It has many important applications such as:
some distinct properties e.g. ‘being either here or there’, ‘be- • The description of individual particles such as
ing either 1, 2, 3, ..., or 111 years old’, ‘being either dead molecules, atoms, photons, electrons, protons and
or alive’, ‘being either 0 or 1’, (etc.) then a superposition neutrons, and hence all the obvious applications
state stands for a situation — where a kind of combination in many fields ranging from chemistry, nuclear
of these alternatives applies with is different than a probabil- physics, and in the future possibly high-energy
ity distribution over the states. In the case of the so-called physics.
Schrödinger’s cat paradox the cat is neither dead or alive,
but somewhere in between, and in computer science terms a • New technologies such as the laser and the elec-
quantum bit (qubit) can take both the values 0 and 1 concur- tron microscope, and in particular, the transistor
rently. In a sense, while the utterance ‘quantum’ indicates ‘a as a replacement for valves, enabling the scale at
passage from the continuous to the discrete’, from an infor- which micro-electronics (including computer hard-
matic perspective it is rather ‘a passage from the discrete to ware) can currently be built.
the continuous’. But unfortunately, that continuous space is • Important medical tools such as magnetic reso-
not evidently accessible, due to the nature of quantum mea- nance imaging techniques.
surement. • Actual quantum informatic devices such as quan-
tum communication systems and quantum proces-
Uncertainty. A physical quantum system cannot admit sors?
both a sharp (= not in superposition) position and sharp mo-
mentum at the same time, a principle known as Heisenberg’s 3. Big conceptual and philosophical questions, initially
uncertainty principle. An analogous principle arises often in raised by Einstein, remained unanswered. The biggest
2
of these is the so-called measurement problem: it is con- The first algorithm of that kind was the Deutch-Jozsa al-
ceptually not clear at all what causes ‘a measurement gorithm which exploits quantum parallelism—computing a
to take place’. But most of the physics community has function for several values at once, but uses this to solve a
moved forward — ignoring most conceptual problems problem of little practical interest. What is often considered
and accepting quantum mechanics as a cook-book which to be the start of quantum algorithmics was Peter Shor’s 1994
provides ‘weird’ recipes on how to handle and interpret factoring algorithm [13] which provided exponential speed-
matter, and more recently information. up as compared to all known classical factoring methods. An-
other well known quantum algorithm is Lov Grover’s 1995
4. The formalism is still mathematically unsatisfactory for search algorithm [14] for unstructured data of size N which
many reasons: it contains redundancies such as global reduces the search-time from N to O(√N ).
phases, yields re-normalization problems in quantum
field theory, lacks high-levelness etc. The formalism But quantum informatics is not only about algorithmics.
in fact hasn’t changed since it’s creation by John von There are several intriguing quantum protocols which expose
Neumann, who actually denounced it three years after fascinating physical phenomena, some of which turn out to
creating it! This lead to so-called quantum logic — a have applications which are most likely to be the first real-
field of study launched by Birkhoff and von Neumann in life incarnations of a quantum informatic revolution. Among
1936 [4], but there are serious doubts that this has given these conceptually intriguing protocols are quantum telepor-
much insights either in quantum theory or in logic, and tation and entanglement swapping. At the practical side there
in no way did it have the capabilities to replace von Neu- are the many variants of quantum key-distribution, within the
mann’s quantum mechanical formalism. field of protocol security. This is a nice example of how quan-
tum informatics constitutes both a danger and provides the
corresponding solution to the security of communication pro-
tocols: An actual quantum computer runing Shor’s algorithm
1.3 The birth of quantum informatics
would provide a danger to many cryptographic protocols cur-
Most of the scientific activity on ‘pure quantum mechanics’ rently in use which typically rely on hardness of factoring. On
which took place in the second half of the 20th century was the other hand, quantum key-distribution provides a solution
either on its experimental confirmation, on its philosophi- to any such attack!
cal justification, or on generalizing/modifying its formalism.
The passage to quantum informatics can be seen as a mat-
ter of change of attitude towards the so-called ‘quantum- 1.4 The status of quantum informatics
weirdness’:
1. Many different experimental devices of a small number
It’s a feature, not a bug! of qubits (< 10) are operational but scalability is still a
major problem. This problem is due mainly to the de-
The first to mention quantum computing was Paul Benioff in coherence of quantum data due to interaction with the
1980 who studied how particular kinds of quantum evolutions environment, but (at least) theoretical solutions do exist.
could simulate classical Turing machines. Richard Feynman
on the other hand asked the dual question i.e. whether clas- 2. The search for new kinds of algorithms and applications
sical computers can simulate quantum evolution, and conjec- continues including resent efforts to use quantum pro-
tured that such a simulation came with an exponential slow- cessors to simulate chemical reactions at the quantum
down, while, in principle, quantum systems could simulate mechanical level!
themselves without this exponential slow-down by simply re-
lying on the natural quantum evolution they are already gov- 3. It is commonly accepted that information security will
erned by. Hence, the first advantage of considering a quan- likely be the first practicable application of quantum
tum mechanical system as a computational device had been informatics, and quantum communication devices are
exposed. The key to this speed-up is that quantum evolu- available from commercial companies (MagiQ and ID
tion physically computes a function for several inputs at the Quantique). An actual quantum key distribution proto-
same time, which are in superposition. But the nature of the col has taken place between a Swiss bank and Geneva
quantum measurement process doesn’t allow the state of the City Hall [21]. However, while the quantum component
quantum system to be read without actually altering it, and of the experiment worked perfectly, the authentication
converting this potential of intrinsic parallelism within quan- protocol failed to be secure due to flaws in the analysis
tum evolution into concrete examples of algorithmic speed- of its classical component (e.g. [22]). The irony here is
up of quantum computers as compared to classical computers that a true danger to classical security protocols is posed
turned out to be a highly non-trivial matter. by Shor’s algorithm, i.e. by quantum informatics, while
3
|1i |e1 i
it is again quantum informatics which provides the solu- |ψi
tion.
θ1
2 Qubits vs. bits θ0
2.1 Acting on qubits
A bit:
Pe1 : Q \ {| e0 i} → Q :: |ψi 7→ | e1 i to make a connection with bits. Ignoring the global redun-
dancy of the non-zero complex number z, a qubit state is a
capturing the dynamics of measurement, which can be used as complex linear combination of two reference states |0i and
a dynamic resource when designing algorithms and protocols |1i.
— as we shall see further, for so-called degenerate measure-
ments these maps are not always constant. In fact, restricting When representing the complex numbers in the 2D com-
to states and measurements which are such that measurements plex plane, passing from cartesian to polar coordinates yields
behave deterministically and don’t change the state is equiv- the amplitude and phase of a complex number, respectively
alent to doing classical reversible computing! Hence: p y
r = x2 + y 2 , tan(θ) = ,
x
• bad: quantum measurements destroy most data
and conversely, the real and complex parts re-emerge as
• good: quantum measurements expose some data
x = r · cos(θ) , y = r · sin(θ) .
• good: quantum measurements act on data
Hence a complex number can also be written as
Conclusively, designing quantum algorithms and protocols
boils down to exploiting the enlarged state space by acting z = r · eiθ since eiθ := cos(θ) + i sin(θ) .
on quantum data either with:
Hence, when representing a qubit by a pair of complex num-
bers (z1 , z2 ) there is both a redundant global phase and global
• a particular kind of reversible operations — which for
amplitude. Concerning the redundant global amplitude, one
example do not admit cloning as well as deleting, or,
usually only considers normalized vectors i.e.
• irreversible measurements, for which we have to per-
form acrobatics between ‘the good’ and ‘the bad’. z1
(z̄1 z̄2 ) ◦ = z̄1 · z1 + z̄2 · z2 = x21 + x22 + y12 + y22 = 1 ,
z2
since those are the ones which occur in the expressions for
2.2 Describing a qubit with complex numbers calculating the probabilities. Note here in particular that a
pair of complex numbers has four ‘real degrees of freedom’,
Let R denote the real numbers and C denote the complex
and hence that a pair of complex numbers up to a non-zero
numbers i.e. numbers z = x + i y where x, y ∈ R and i
complex multiple has two ‘real degrees of freedom’, what in-
is implicitly
√ defined within i · i = −1 so i can be thought of
deed corresponds with points on a sphere. More generally,
as −1. Hence for addition and multiplication of complex
‘n-tuples of complex numbers up to a non-zero complex mul-
numbers z1 = x1 + i y1 and z2 = x2 + i y2 we have
tiple’ have 2n − 2 ‘real degrees of freedom’.
z1 + z2 = (x1 + y1 ) + i (y1 + y2 )
Exercise 2.1 If we take ‘all pairs of real numbers up to a non-
z1 · z2 = (x1 x2 − y1 y2 ) + i (x2 y1 + y2 x1 ) . zero real multiple’ to be the states of some system, which
geometric object do we obtain as the state space? How would
The complex conjugate of z = x + i y is z̄ = x − i y hence you define opposite states? Representing real number pairs in
the XY -plane, when do two such pairs yield opposite states?
z̄ + z = 2x and z̄ · z = x2 + y 2 .
5
1 which induce a change of state
Special examples of states are |0i := and |1i :=
0
0 1 0 z1 z1 1
which constitute the so-called computational basis |ψi 7→ P0 (|ψi) = = ∼
1 0 0 z2 0 0
corresponding to the classical bit values 0 and 1. The states
of the computational basis are indeed opposite 0 0 z1 0 0
states,
which |ψi 7→ P1 (|ψi) =
0 1 z2
=
z2
∼
1
z1′
z1
in terms of pairs of complex numbers and
z2 z2′ i.e. the possible outcome states indeed constitute the compu-
requires tational basis. All the other measurements on a qubit can be
z̄1 · z1′ + z̄2 · z2′ = 0 , obtained by rotations of the sphere using the same transfor-
or equivalently, in terms of an inner or matrix product, mations which characterize the logic gates, resulting in
′
z1 U ◦ Pβ ◦ U −1
(z̄1 z̄2 ) ◦ = 0.
z2′ i.e. using U −1 we first rotate ‘backwards’ to the computa-
tional basis, then preform the measurement in the computa-
In practice however, calculations can be performed within tional basis, and then using U to rotate forward again. From
standard linear algebra, ignoring these redundancies. For ex- the above requirements on U we obtain for
ample, quantum logic gates are 2 × 2-matrices of complex
numbers U11 U12 −1 Ū11 Ū21
U11 U12
U= and U := ,
U= , U21 U22 Ū12 Ū22
U21 U22
that they are indeed inverses i.e. both
and induce a change of the state „ «„ « „ «„ «
Ū11 Ū21 U11 U12 U11 U12 Ū11 Ū21
and
z1 U11 U12 z1 Ū12 Ū22 U21 U22 U21 U22 Ū12 Ū22
|ψi = 7→ U (|ψi) =
z2 U21 U22 z2 yield the identity
1 0
U11 · z1 + U12 · z2
= , .
U21 · z1 + U22 · z2 0 1
h− | −i : H × H → C ,
|ψi
satisfying
Uα hψ|c1 · ψ1 + c2 · ψ2 i = c1 hψ|ψ1 i + c2 hψ|ψ2 i
{Pα }α hc1 · ψ1 + c2 · ψ2 |ψi = c̄1 hψ1 |ψi + c̄2 hψ2 |ψi
hψ|φi = hφ|ψi hψ|ψi ∈ R+ hψ|ψi = 0 ⇔ ψ = 0
for all c1 , c2 ∈ C and all φ, ψ, ψ1 , ψ2 ∈ H.
|Ψi
A linear operator between Hilbert spaces H1 and H2 is a map
|ψi f : H1 → H2 which satisfies
8
so we obtain the usual formula for application of the matrix
Exercise 3.9 Show that, equivalently, we could have set of f to the column of vector coordinates of ψ i.e.
some basis for H1 and some basis for H2 show that (mji )ij We would like to know what the matrix of f is for basis
is the matrix of its adjoint f † with respect to those basis. {U (ek )}k of H1 and {U ′ (e′j )}j of H2 . Let
X X
So when we have agreed on a fixed basis for each Hilbert U (el ) = ukl · ek and e′j = u′ji · U ′ (e′i )
space, by Exercise 3.11.i the matrix corresponding to the ad- k i
joint of the linear operator with matrix where (ukl )kl is the matrix of U for the basis {ei }i and (u′ij )ij
is the matrix of U ′ for the basis {e′i }i , and hence (ūji )ij the
m11 · · · m1j · · · m1m
..
.
.. .. matrix of U −1 = U † in that basis. We obtain
. .
X
mi1 · · · mij · · · mim f (U (e l )) = f u kl · ek
.. .. .. k
. . . X
mn1 · · · mnj · · · mnm = ukl · f (ek )
k
is its conjugate transposed X X
= ukl · mjk · e′j
m11 · · · mi1 · · · mn1 k j
.. .. .. X X X
.
. .
= ukl · mjk · u′ji · U ′ (e′i )
m1j · · · mij · · · mnj , k j l
.. .. .. X X
. . . = u′ji mjk ukl · U ′ (e′i )
m1m · · · mim · · · mnm i jk
10
so the resulting matrix for f in the basis {U (ek )}k of H1 and for P := 1 0
0 iv. Give the probabilities for the input
{U ′ (e′j )}k of H2 is the matrix product 0 0
states e− , e+ , eθ and e⊥
θ for the measurements
′ †
(uij )ij (mjk )jk (ukl )kl .
{P+ , P⊥−} and {Pθ , P⊥θ }.
′
When denoting the matrices of f , U and U when expressed
in the basis {ei }i and {e′i }i (slightly abusively) also as f , U
and U ′ this expression simplifies to
†
Quantum mechanics in matrix terms. We provided both
U′ ◦ f ◦ U . unitary operators and quantum measurements (as families of
mutually orthogonal projectors arising from a self-adjoint op-
Proposition 3.13 For each self-adjoint operator H : H → H erator through the spectral decomposition theorem) with an
there exists an orthonormal basis in which its matrix is ‘diag- easy matrix representation, given a fixed basis {e } :
i i
onal ’ i.e. all its non-diagonal elements become 0.
• Unitary operators are in one-to-one correspondence with
Fixing an orhonormal basis {ei }i in which we express all ma- ONBs, and represent in matrix terms as the ONB
trices let {U (ei )}i be the basis in which the matrix of H is di- {U (ei )}i written as a list of column vectors
agonal i.e., continuing our abuse of notation for the matrices
of f and U in {ei }i , U (e1 ) · · · U (en ) .
12
vectors as linear functions of type C → H (cf. the discussion H there exists a unique linear map h : H1 ⊗ H2 → H such
above), for the corresponding matrices we have that ζ = h ◦ ξ i.e. in a commutative diagram:
ξ :: (ψ, φ) 7→ ψ ◦ φT ξ
H1 ⊕ H2 ✲ H1 ⊗ H2
where (−)T denotes the transpose. One easily verifies that
H1 ⊗ H2 is a Hilbert space for the inner-product ∃!h
ζ
❄
X
h(cij )ij | (c′ij )ij i := cij c′ij .
✲
ij
H
together with the map This seems to allow us to think of ‘pairs of states’ as possible
i=k i=k
states of compound systems, but one still needs to be a bit
cautious as is demonstrated by the following exercise.
M O
ξ: Hi → Hi :: (ψ1 , . . . , ψk ) 7→ (ci1 . . . cik )i1 ...ik
i=1 i=1
P P Exercise 3.20 Show that ξ is not injective, and in particular,
where ψ1 = i1 ci1 · ei1 , . . . , and ψk = ik cik · eik . which ψ 6= φ are equalized under the action of ξ.
Exercise 3.19 i. Show that ξ is not linear. ii. Show that ξ is On the other hand, besides pairs of states there are many other
bilinear i.e. linear when conceived as a two-variable function ones too, the so-called entangled states, which are superposi-
where one variable takes its values in H1 and the other one in tions (= sums) of the pairs of states.
H2 . iii. Show that for any other bilinear map ζ : H1 ⊕ H2 →
Exercise 3.21 Show that not all elements of H1 ⊗ H2 can be
which becomes
written as (ψ, φ) for some ψ ∈ H1 and some φ ∈ H2 .
c′1 c′1
00 1 0 11 0 1
c1
BB . C B . CC B . C` ´
ξ :: @ @ .. A , @ .. A A 7→ @ .. A c1 ... cn .
Usually the pairs (ψ, φ) ∈ H1 ⊗ H2 are denoted by ψ ⊗ φ to
cn c′m c′m indicate that we ‘live in the tensor product’ — and not in the
But the true ‘natural’ structural connection between the tensor product and directsum/cartesian product. Hence we obtain
linear maps is actually far more subtile than either of these two matricial
candidates, as we will see in Section 11.2. ξ : H1 ⊕ H2 → H1 ⊗ H2 :: (ψ, φ) 7→ ψ ⊗ φ,
13
so ξ = − ⊗ −, for which we moreover have where all summations are finitary. Next we introduce a con-
X X X gruence (= equivalence relation) on Ω, namely
ci · ei ⊗ c′i · e′i := ci c′j · ei ⊗ e′j . X X X
i i ij
αi · βj · ψi,j ⊗ φi ∼ αi βj · ψi,j ⊗ φi
i j ij
We can actually think of ψ ⊗ φ as a special case of the tensor X X X
of two linear maps, where we define the tensor of two linear αi · ψi ⊗ βj · φi,j ∼ αi βj · ψi ⊗ φi,j
i j ij
maps f : H1 → H1′ and g : H2 → H2′ as the linear map
— which is clearly basis-independent. Expressing this con-
f ⊗ g : H1 ⊗ H2 → ⊗H1′ H2′
:: ψ ⊗ φ 7→ f (ψ) ⊗ g(φ) . gruence in respective basis for H1 and H2 yields
X X
Hence you should be aware of the triple use of −⊗−, namely αi · ψi ⊗ φi ∼ α̃i · ψ̃i ⊗ φ̃i
i i
Pi = ei ◦ e†i . { | i i | 0 ≤ i ≤ n − 1}
Hence, for a general projector for each Hilbert space of dimension n. Mathematically speak-
ing, such an n-dimensional Hilbert space which comes with a
Pψ = U ◦ Pi ◦ U † with ψ = U ◦ ei privileged basis can be produced as in Exercise 3.17, that is,
φ† ◦ f ◦ ψ ′
hφ|f |ψi
P
... = ij ci mij cj ∈C and finally using these two facts to infer the above claim.
H := Q ⊗ . . . ⊗ Q From now on, we will use the same notation for a linear op-
erator and its matrix in the computational basis except when
then, using the notation it is explicitly stated to be otherwise. Consider for example
arbitrary qubit measurementwith as set of projectors
|i1 . . . in i with i1 . . . in ∈ {0, 1} n o
PU0 := U | 0ih0 |U †
, PU
1 := U | 1ih1 |U †
for the basis, this is actually nothing more then writing
{|0i , |1i} {|00i , |01i , |10i , |11i} Non-local correlations in Dirac Notation. To illustrate
Dirac notation in action we now redo this calculation. Mea-
with corresponding measurement projectors
surement in the computational basis of the first qubit of a
{|0ih0| , |1ih1|} {|00ih00| , |01ih01| , |10ih10| , |11ih11|} . qubit pair in the Bell-state either yields
General self-adjoint operators take the form2 (P0 ⊗ 1Q )(| 00i + | 11i)
i=n
X i=n = (| 0ih0 | ⊗ 1Q )(| 00i + | 11i)
X
†
H=U αi · | iihi | U = αi · U | iihi |U † = (| 0ih0 | ⊗ 1Q )| 00i + (| 0ih0 | ⊗ 1Q )| 11i
i=n i=n = (| 0ih0 | 0i) ⊗ | 0i + (| 0ih0 | 1i) ⊗ | 1i = | 00i
and for projectors we have ai ∈ {0, 1}, hence they are
X X or
P=U | iihi | U † = U | iihi |U † (P1 ⊗ 1Q )(| 00i + | 11i) = | 11i
i∈I i∈I
which indeed yields a certain answer for a measurement on
for I ⊆ {0, . . . , n}, so quantum measurements take the shape the second qubit, hence a non-local correlation.
nX X o
U | iihi |U † , . . . , U | iihi |U †
i∈I1 i∈Ik 4 Protocols from entanglement
2
Note that, of course, in general
˛ X ED X ˛ X With the machinery of tensor products and Dirac notation
ψi ψi ˛ 6= |ψi ihψi |
˛ ˛
˛ at hand we are now able to expose certain protocols, which
i i i
surprisingly have only been recently discovered, and lift the
e.g. for qubits (|0i + |1i)(h0| + h1|) is a projector on the state |0i + |1i,
while |0ih0| + |1ih1| is the identity! Hence the sum seems to play two
‘weirdness’ of non-local correlations one level higher — to
roles, and this will enable us to accomodate so-called mixed states to be outer space if you wish, where they meet the crew abord Star
introduced and studied in Section 11.4. Trek’s USS Enterprise.
17
4.1 Bell-basis and Bell-matrices for which we have (note the above matrix factors into a prod-
uct H ⊗ I of and the CNOT gate)
While the standard 2-qubit quantum measurement is with re-
spect to the computational basis |ΨBell-basis i = UBell-basis |Ψcomputational basis i
0 0 1 0
how would you perform a Bell-basis measurement? ii. When
performing such a Bell-basis measurement involving a mea-
surement in the computational basis, let boolean b1 ∈ B be
the outcome of measuring the first qubit, and let boolean to
b2 ∈ B be the outcome of measuring the second qubit. Let
U1 : B → U and U2 : B → U be functions with U the four
element set consisting of the Pauli-matrices and the identity.
Can you choose U1 and U2 such that U1 (b1 ) ◦ U2 (b2 ) pro-
vides the required correction of the third qubit in the tele-
portation protocol? (i.e. depending on the outcome b2 of the
measurement of the second qubit we perform unitary U2 (b2 ), Exercise 4.2 i. Verify the entanglement swapping protocol.
and then, depending on the outcome b1 of the measurement ii. If in the entanglement swapping protocol we start with two
of the first qubit we perform unitary U1 (b1 )) EPR-states rather than with two Bell-states, do we obtain the
same result, i.e. do we still obtain two Bell-states, or, do we
This implementation of the teleportation protocol is the one
instead obtain two EPR-states, or something else? iii. Can
you’ll find in most textbooks.
you modify the measurement dependent ‘unitary corrections’
such that we do end up with two Bell-states, with two EPR-
Entanglement swapping [12]. We start with four qubits, to states, or instead with one EPR-state and one Bell-state?
which we refer as a, b, c, d, where a and b are in a Bell-state,
and also c and d are in a Bell-state. Then we perform a Bell- When analyzing this protocol (and its proof) we can see that
basis measurement on c and d, and depending on the mea- it includes two crucial components:
surement outcome, analogously to what we did in the telepor-
tation protocol, we apply the transpose of the corresponding 1. The measurement destroys correlations between pairs
Bell-matrix both to qubit c and d. and creates new ones between other pairs.
We already saw that we can obtain the Bell-basis by acting We invite the reader to make a picture of this. Another useful
with the Bell-matrices on the second qubit on a Bell-state. property follows from
But actually we have much more.
(f1 ⊗ f2 ) ◦ (g1 ⊗ g2 ) = (f1 ◦ g1 ) ⊗ (f2 ◦ g2 )
Acting on the second qubit of a Bell-state with any linear op- (f ⊗ id) ◦ (id ⊗ g) = (f ◦ id) ⊗ (id ◦ g)
erator f exactly yields the bipartite state encoded by the trans-
= (id ◦ f ) ⊗ (g ◦ id)
posed to the matrix of that operator in our matricial definition
of the tensor product, providing the linear map-bipartite state = (id ⊗ g) ◦ (f ⊗ id).
correspondence with a true (pseudo-)operational significance
— we say pseudo-operational since in general f is not unitary Again we invite the reader to make a picture of this.
20
Logic-gate teleportation [15]. So what happens if in the This procedure is called logic-gate teleportation and turns
teleportation protocol we decide not to start with a Bell-state out to be a universal quantum computational primitive. Of
but with some other entangled state Ψf with matrix f T ? Ex- course, logic gates rarely commute, but in fact it suffices to
plicitly, since for ordinary teleportation the input state was find unitary operations {Ũi }i such that
| ψi ⊗ |ΨBell i Ũi ◦ f = f ◦ Ui
now the input state is for each Bell-matrix, then applying Ũi† to the last qubit we
| ψi ⊗ Ψf = | ψi ⊗ ((1Q ⊗ f )|ΨBell i) do obtain f |ψi. In fact, with some appropriate acrobatics one
can even go beyond the above considered situation [15].
= (1Q | ψi) ⊗ ((1Q ⊗ f )|ΨBell i)
= (1Q ⊗ 1Q ⊗ f ) | ψi ⊗ |ΨBell i
Swapping from teleportation. In fact, entanglement swap-
= (1Q⊗Q ⊗ f ) | ψi ⊗ |ΨBell i ping can be seen as a consequence of teleportation. For tele-
portation we have
For ordinary teleportation the four ‘cases’ corresponding to
the possible outcome states of the Bell-basis measurement we (|Ψ i ihΨi |) ⊗ 1Q | ψi ⊗ |ΨBell i = |Ψi i ⊗ Ui |ψi
needed to concider were
hence in particular, (i) considering |ψi := | ji, (ii) apply-
(|Ψi ihΨi |) ⊗ 1Q | ψi ⊗ |ΨBell i ing | ji ⊗ − to both sides of the equation, and (iii) using the
(◦, ⊗)-exchange properties, we obtain
for each Bell-basis vector |Ψi i, so now we have
1Q ⊗ (|Ψi ihΨi |) ⊗ 1Q | jji ⊗ |ΨBell i
(|Ψi ihΨi |) ⊗ 1Q (1Q⊗Q ⊗ f ) | ψi ⊗ |ΨBell i
= | ji ⊗ |Ψi i ⊗ Ui | ji,
= (1Q⊗Q ⊗ f ) (|Ψi ihΨi |) ⊗ 1Q | ψi ⊗ |ΨBell i .
hence adding for j = 0, 1 yields
But we know from our study of teleportation that
X
1Q ⊗ (|Ψi ihΨi |) ⊗ 1Q | jji ⊗ |ΨBell i
(1Q⊗Q ⊗ Ui† ) (|Ψi ihΨi |) ⊗ 1Q | ψi ⊗ |ΨBell i , j=0,1
X
where Ui is the ith Bell-matrix, yields the state |ψi for that = | ji ⊗ |Ψi i ⊗ Ui | ji
third qubit, hence j=0,1
(|Ψi ihΨi |) ⊗ 1Q | ψi ⊗ |ΨBell i
P
and by linearity and |ΨBell i = j=0,1 | jji we indeed ob-
tain entanglement swapping. Again, analyzing this calcula-
yields Ui |ψi for the third qubit and hence tion in a picture can be very instructive. Compositionality
in computer science means breaking a big problem down in
(1Q⊗Q ⊗ f ) (|Ψi ihΨi |) ⊗ 1Q | ψi ⊗ |ΨBell i
smaller, hopefully already known ones. Above we did this:
yields f Ui |ψi for the third qubit. Assuming that f and Ui we derived logic-gate teleportation and entanglement swap-
ping from the teleportation protocol. On the other hand, the
would commute, it then suffices to apply Ui† to the last qubit
following protocol which is sometimes (wrongly?) referred
to obtain f |ψi i.e. we teleported the state and at the same time
to as some kind of converse to teleportation does have a nice
applied a (possibly unknown) operation f to this state |ψi.
conceptual derivation in terms of map-state duality.
Ψf
then sent to the other party. The other party then performs a
Bell-measurement on the pair of qubits and the outcome to
that measurement reveals the encoded two bits.
21
discussed protocols.
(hΨf | ⊗ 1Q )(1Q ⊗ |Ψg i)
nXo
P i nXo
= ((hΨBell |(1Q ⊗ f † )) ⊗ 1Q )(1Q ⊗ ((1Q ⊗ g)|ΨBell i))
Ψg
nXo
= (f T ⊗ 1Q )|ΨBell ihΨBell |(1Q ⊗ f † )
=
And again, to get a feel for what this actually stands for, you
Ψf Ψh Ψh o go f
want to represent these formulae in a picture. In fact, we
can now formulate the structural crux behind all of the above
22
which moreover provides a straightforward extension of the
Exercise 5.2 [BA exam 2006] Four qubits are such that the proof of logic-gate teleportation (and hence teleportation it-
first and second are in the joint state a · |00i + b · |11i and the self) beyond the case of qubits. We proceed in two steps:
third and fourth are also in the joint state a · |00i + b · |11i.
Then we perform a Bell-basis measurement on the second and 1. First we show that we have
third qubits. i. For each of the possible outcomes of the mea-
surement, assuming a, b ∈]0, 1[, what is the resulting state of (hΨBell | ⊗ 1H )(1H ⊗ |ΨBell i) = 1H (2)
the qubits? (Write these states in Dirac notation in the com-
putational basis.) ii. Can you find values for a and b such where ΨBell stands for the state corresponding to the
that after applying some well-chosen unitary corrections the identity matrix on H i.e.
states of the qubits do not depend on the measurement out- X
come anymore? (Explicitly give these corrections.) iii. What ΨBell := | iii.
is the probability for the second and the third qubit to end up i
in a Bell-state (when doing no corrections)? for any dimension of the underlying Hilbert space.
{|ΨUi i : C → H}i
We can push all this a bit further within the domain of the
that is, using a different geometry, from absurd, as is illustrated by the following exercise.
|ψi ⊗ |Ψf1 i .
Can you come up with a protocol which does that? • first Pf2 takes place on the first two qubits,
23
5.3 Quantifying entanglement Since we know that bipartite states are in bijective correspon-
dence with linear maps we can now use the above result to
Clearly, the Bell-state is more entangled than any (separable) classify and quantify entanglement. For any bipartite state
tensor |ψi⊗|φi. But what exactly do we mean by ‘being more we have
entangled’? There are many different proposals for a precise
conception of this, but consensus has yet to be reached in the |Ψf i = (1H ⊗ f )|ΨBell i = (1H ⊗ (U ◦ g))|ΨBell i.
research community. One way to attack this problem is to ask
†
to which extent an entangled state enables typical quantum Applying U to the last qubit we obtain
phenomena, such as non-local correlations and teleportation
(1H ⊗ U † )|Ψf i = (1H ⊗ g)|ΨBell i
and how ‘efficient’ we can do that. For example, given a Bell-
state we can do full teleportation, with as crux i.e. we can always undo the effect of the unitary component,
(hΨBell | ⊗ 1Q )(1Q ⊗ |ΨBell i) = 1Q . and we can do that in a reversible manner. Hence it is the
(unique) positive component g which determines the ‘degree
On the other hand of entanglement’. But since g is itself self-adjoint it admits
(hΨBell | ⊗ 1Q )(1Q ⊗ |ψ ⊗ φi) diagonalization i.e. can be written as
= (hΨBell |(1Q ⊗ |ψi)) ⊗ |φi
. = |φihψ̄| g = U′ ◦ h ◦ U′
†
i.e. the third qubit will end up in the state |φi independent with h diagonal, so using Subsection 5.2 we obtain
of what the initial state of the first qubit was. In general we
would end up somewhere between these two extremes of ‘full (U ′T ⊗ (U ◦ U ′ )† )|Ψf i = (1H ⊗ h)|ΨBell i
teleportation’ and ‘no teleportation’. To understand this better
we need some more linear algebra. so we can again reversibly undo the effect of the unitaries,
so the ‘degree of entanglement’ for bipartite states is now re-
A linear operator f : H → H is positive iff
duced to diagonal positive matrices i.e. a list of n positive
†
a. it can be written as f = g ◦ g for some other linear reals. Again using map-state duality, but now in the converse
operator g : H → H′ . direction, we straightforwardly obtain the following.
Each positive operator is obviously always self-adjoint, hence Proposition 5.8 Each bipartite state Ψ ∈ H ⊗ H′ admits a
its eigenvalues will always be real. But we have more: ‘Schmidt decomposition’ i.e. it can be written as
X
Proposition 5.5 A linear operator f : H → H is positive if Ψ= ri · ei ⊗ e′i with {ri }i ⊆ R+
and only if, equivalently, i
b. for all ψ ∈ H we have that hψ|f |ψi ∈ R+ ; for some well-chosen ONBs {ei }i of H and {e′i }i of H′ .
c. f admits a self-adjoint square-root i.e. f can be decom- So for the qubit case the problem is reduced to comparing a
posed as f = g ◦ g with g self-adjoint. pair of real numbers ‘up to a real number’ (cf. normalization)
i.e. a one-dimensional problem. Extreme cases are (1, 0) (and
Exercise 5.6 Prove Proposition 5.5 — you can proceed by equivalently (0, 1)) which corresponds to pure tensors ψ ⊗ φ
respectively showing that a ⇒ b, a&b ⇒ c, c ⇒ a where while (1, 1) captures for example both the EPR-state and the
for proving a&b ⇒ c you can use the fact that positive oper- Bell-state. In general, we will say that (a, b) for a ≥ b capture
ators are self-adjoint and hence all diagonalize in some basis. ‘more entanglement’ than (c, d) for c ≥ d iff
a c
Next we show that each linear opertor factors into a unitary ≤ .
b d
one and a positive one, something which is known as the po-
lar decomposition of linear operators. For normalized coefficients a2 + b2 = c2 + d2 = 1 this boils
down to a ≤ c or equivalently d ≤ b, or again equivalently
Theorem 5.7 Each linear operator f can be written as a2 ≤ c2 or d2 ≤ b2 . So we can now assign a quantitative
f = U ◦ g = g′ ◦ U measure to bipartite qubit states by setting
All this is restricted to bipartite states. Understanding multi- trHH1 ,H2 (f ) := (hΨBell | ⊗ 1H2 )(1H ⊗ f )(|ΨBell i ⊗ 1H1 )
partite entanglement is still very much an open problem both
with respect to quantitative and qualitative understanding. i.e., in a picture,
25
6.1 Special gates
σ
Exercise 5.12 [BA exam 2006] Let PGHZ : Q⊗Q → Q⊗Q Exercise 6.1 Define CNOT as the gate obtained by ex-
be the projector which projects on the ray spanned by the state changing the role played by the first and the second qubit.
What is the effect of first applying CNOT, then CNOTσ , and
ΨGHZ := |000i + |111i ∈ Q ⊗ Q ⊗ Q then again CNOT to a pair of qubits?
i. Compute
Exercise 6.2 Consider the following eight equations:
f := trQ
Q⊗Q,Q⊗Q (PGHZ ) : Q ⊗ Q → Q ⊗ Q .
CNOT ◦ (Ui ⊗ 1Q ) = (ξ ⊗ ξ ′ ) ◦ CNOT
i.e. provide the matrix of f in the computational basis. ii. As- CNOT ◦ (1Q ⊗ Ui ) = (ξ ⊗ ξ ′ ) ◦ CNOT
sume now that in the above we substitute ΨGHZ ∈ Q⊗Q⊗Q
by any arbitray state Ψ ∈ Q ⊗ H. Prove positivity of where Ui can be any of the four Bell-matrices. Verify for each
of these eight equations whether there exist operations ξ and
Q
f := trH,H (P) : H → H ξ ′ such that it holds. What can you conclude from this for
logic-gate teleportation of a CNOT-gate?
by showing that it always factors as f = g † ◦g for some linear
operator g : H → Q. Proposition 6.3 Each n-qubit gate can be obtained by com-
postion, tensor, 1-qubit gates and the CNOT-gate.
In the standard literature, rather than the Bell-matrices, the Uf (−, | 0i) :: | 0i + | 1i 7→ | 0 f (0)i + | 1 f (1)i
Pauli-matrices occur, that is
i.e. with one execution of Uf we actually obtain the image
0 1 under f both for 0 and 1. This idea moreover easily extends
X := U2 =
1 0 to functions f : Bn → B, setting
0 −i Uf : Q⊗n ⊗ Q → Q⊗n ⊗ Q :: | i ji 7→ | i (j + f (i) mod 2)i ,
Y := i U3 =
i 0
and then considering
1 0
Z := U1 =
0 −1 X X
Uf (−, | 0i) :: | ii 7→ | i f (i)i .
which of course do not have exactly same the ‘nice’ corre- i∈B n i∈Bn
6.2 The Deutch-Jozsa algorithm then the outcome states with non-zero probability are
n o
The aim of this ‘pedagogical’ example is to illustrate how | i f (i)i
easy it is try to exploit quantum parallelism, but how hard it is i∈Bn
But besides enabling bijectivity, the second input seems to be we will be able to verify with certainty which of the two it is.
of no use at all, but as we will see further it will turn out to Let us consider
play a crucial role. Next we consider the by f˜ induced unitary
permutation of basis vectors Uf (−, | 0i − | 1i) : Qn → Qn ⊗ Q
27
(so we exploit the 2nd input!) that is5
P
• If f is constant we obtain i | ii
with certainty.
P
| ii 7→ | i (0 + f (i) mod 2)i − | i (1 + f (i) mod 2)i • If f is balanced we cannot obtain i | ii.
| ii 7→ | ii ⊗ (|0i − |1i) and | ii 7→ | ii ⊗ (|1i − |0i) , The text book version of the facts. Typically e.g. [17] one
extends the presentation by making also the preparation of
in short, states explicit, as well as the generation of arbitrary measure-
| ii 7→ (−1)f (i) | ii ⊗ (|0i − |1i) . ments using some ‘standard’ logic gates and measurement in
For the simple f : B → B case this becomes the computational basis. For creating superpositions within
the computational basis we apply the so-called Hadamard
| 0i + | 1i 7→ (−1)f (0) | 0i + (−1)f (1) | 1i ⊗ (|0i − |1i) . gate
1 1
H :=
In this case constant means f (0) = f (1) yielding 1 −1
to first basis vector yielding
Uf (| 0i + | 1i) ⊗ (| 0i − | 1i) = ±(| 0i + | 1i) ⊗ (| 0i − | 1i)
H✲
while balanced means f (0) 6= f (1) yielding | 0i | 0i + | 1i
Uf | 0i + | 1i) ⊗ (| 0i − | 1i) = ±(| 0i − | 1i) ⊗ (| 0i − | 1i). which we can generalize to
H ⊗n
✲
X
Hence it suffices to measure the first qubit in the basis | 0i⊗n (| 0i + | 1i)⊗n = | ii .
i∈Bn
{| 0i + | 1i , | 0i − | 1i}
To get the input which induces inference we set
to achieve our goal. Crucial is the fact that we obtained two
mutually orthogonal states | 0i + | 1i and | 0i − | 1i, each rep- H✲
| 1i | 0i − | 1i .
resenting one of the two alternatives we wish to distinguish.
In the general case we obtain Measuring in the basis
X X
| ii 7→ (−1)f (i) | ii ⊗ (|0i − |1i) {| 0i + | 1i , | 0i − | 1i}
i i
is achieved by first applying a Hadamard gate and then mea-
that is, for f constant, suring inPthe computational basis, while a measurement in-
X X cluding i∈Bn | ii as an outcome state is achieved by apply-
Uf | ii ⊗ (| 0i − | 1i) = ± | ii ⊗ (| 0i − | 1i) .
ing H ⊗n before a measurement in the computational basis.
i i
Consider the plane spanned by |ωi and |ǫi and let |ωi⊥ be the performed on the first n qubits, which can shown both to ad-
orthocomplement to |ωi in this plane. When restricting to this mit an inverse and to be unitary. Hence our state now becomes
plane one easily verifies that: X X n
ei2παβ/2 · | β f (α)i ∈ Bn ⊗ Bm .
α∈Bn β∈Bn
• Uf ∼ refection against ray(|ωi⊥ )
• Uǫ ∼ refection against ray(|ǫi) Remarkably, we are now done and it suffices to measure the
state of the first n qubits to ‘with a high probability’ find the
• Uǫ ◦ Uf ∼ 2θ rotation towards |ωi for period of the function! Indeed, suppose that f has period ω
so we have for all α that
1
sinθ = hǫ|ωi = √
2n f (α + ω) = f (α) .
Hence for r rounds with Now fix a value for β and we are interested in the probability
π
π θ −2 of obtaining this outcome in a measurement of the first qubit,
− θ = 2θr i.e. r =
2 4 so we are interested in the weight of the term
the vectors |ωi and (Uǫ ◦ Uf )n (|ǫi) become ‘almost’ aligned. X n
X n
ei2παβ/2 · | β f (α)i = | βi ⊗ ei2παβ/2 · | f (α)i
Hence the protocol: n n
α∈B α∈B
2n
6.4 Shor’s factoring algorithm β =k· for k∈N
ω
This was the first quantum algorithm, which, if it could be then the components contributing to the same term have
efficiently implemented on a quantum computer, would have
unavoidably an important impact. ei2kπα/ω , ei2kπ ei2kπα/ω , ei2·2kπ ei2kπα/ω , ei3·2kπ ei2kπα/ω , . . .
29
as coefficients, which by eil·2kπ = 1 for l ∈ N are in fact all period finding algorithm, while the ‘classical part’ of his al-
n
the same. That is, for β = k · 2ω we get constructive interfer- gorithm relates period-finding to factoring, more specifically,
ence, hence will have a very high probability, and in principle to finding a single factor.
we could then compute ω if it wasn’t for the presence of k. So we wish to factor a number N0 := N . First choose
To find the actual period with high probability it turns out that
a number N1 < N0 and we use Euclid’s algorithm to
that it suffices to repeat the above roughly log log ωn times. look for common factors i.e. we perform a number of divi-
The bad thing is that we only obtain a probabilistic result. sions Ni /Ni+1 yielding quotients q1 , q2 , . . . qx and remain-
The good thing is that with a growing number of qubits (i.e. n) ders N2 , N3 , . . . , Nx−1 , 0 i.e.
the number of computations (i.e. for each of the possible input
values α ∈ 2n of f ) and the corresponding stored data grows N 0 = q1 · N1 + N2
exponentially, and it turns out that for a ‘small computer’ with N1 = q2 · N2 + N3
only 270 qubits we would actually have performed more com- ..
.
putations and stored more results than the estimated number
of particles in the universe. Nx−2 = qx−1 · Nx−1 + Nx
Nx−1 = qx · Nx (+0)
6.4.2 Factoring and code-breaking
with the greatest common divisor being Nx . To see that
To quantify ‘how long’ it takes a certain algorithm to do a Nx is indeed a common divisor of N0 and N1 it suffices
task, it is natural to ask how the needed time increases with to substitute the last equation in the one just before yield-
the size of the input e.g. if we want to factor a large number ing Nx−2 = (. . . q . . .) · Nx , next substituting the two last
N , how does the required time grows when we let N grow. in the one before that yielding Nx−3 = (. . . q . . .) · Nx , etc.
Alternatively, we can measure the input in the number of re- So ultimately we will both obtain N1 = (. . . q . . .) · Nx and
quired (qu)bits, i.e. n = log2 N , enabling a direct comparison N0 = (. . . q . . .) · Nx . If this procedure yield a non-trivial
between classical and quantum algorithms. On conventional common devisor, we have our desired factor of N = N0 . On
computers the best known factoring algorithm runs in the other hand, if the greatest common devisor is 1 we have
established that N0 and N1 are co-prime.
1 !!
64 3 1 2 Consider the sequence of N1 -powers modulo N0 i.e.
O exp (lnN ) 3 (lnlnN ) 3
9
f (0), f (1), f (2), . . . for f (α) = N1α mod N0 .
time, so the required time grows exponentially with the num-
ber of digits n = log2 N of the number we wish to factor. For ω the smallest number such that N1ω mod N0 = 1 this
As an example, in 1994 a 129 digit number was success- series becomes
fully factored on 1600 workstations in parallel in a period of
1, N1 , N12 , . . . , N1ω−1 , 1, N1 , N12 , . . . , N1ω−1 , . . .
8 months. The same computer setup would however require
800.000 years to factor a 250 digit number, and significantly Indeed, if
longer than the age of the universe to factor a 1000 digit num-
ber. Of course, computers do become faster, but everytime the N1ω mod N0 = 1 then N1ω − k · N0 = 1
speed doubles ‘we can just add a digit’ to maintain the above
mentioned ‘absurdly long’ required computation times. for some k ∈ N, so we have N1ω = 1 + k · N0 and hence
The hardness of factoring large numbers is crucial for pub- N1ω+l = N1l ·(1+k ·N0 ) = N1l +(k ·N1l )·N0 = N1l mod N0 .
lic key crypto-systems, e.g. those used in banks, of which the
secrecy typically relies on the assumed difficulty (not to say Thus, the sequence which we obtain is periodic, and we will
impossibility) to factor a number of approximately 250 dig- use a quantum computer to find this period ω in the way it
its. But in 1994 Peter Shor of AT&T proposed an algorithm was described in the previous subsection. If ω is even we
for factoring which on a gate-array-type quantum computer proceed as discussed below. If ω is odd we need to start over
would run in again and pick another number N1 — this only happens in
O (log2 N )3 50% of the cases so not to many runs are needed in general.
Rewriting N1ω mod N0 = 1 as
time, which means that it is only polynomial in the number of
ω
qubits, and factoring a 250 bit number turns out to only take (N12 )2 − 1 = 0 mod N0
a few billion computational steps — e.g. Microsoft’s Xbox
360 game console does about a hundred billion in a second. we obtain ω ω
The ‘quantum part’ of his algorithm is the above discussed (N12 − 1)(N12 + 1) = k · N0
30
ω
for some k ∈ N i.e. we obtain two factors (N12 − 1) and and Bob at its turn tells Alice in which basis he measured
ω
(N 2 + 1) of which the product is equal to some multiple them. They only retain the outcome-digits
1 ω ω
of N0 , so if N0 is not prime either (N12 − 1) or (N12 + 1) 0 ∼ | 0i 1 ∼ | 1i 0 ∼ | 0i + | 1i 1 ∼ | 0i − | 1i
should have a non-trivial factor in common with it. We can
extract this common factor using Euclid’s algorithm. So from for those states of which their basis match, and the resulting
two numbers N0 and N1 with no common factor we have string of bits is a secret shared only by the two of them.
build a pair N1′ and N1′′ of which at least one has a non-trivial The safety of this protocol follows from the fact that an
common factor with N0 whenever the latter is not prime, and eavesdropper intercepting the states cannot measure them
this procedure involved period-finding for which we can use without in 50% of the cases altering them, causing a very
a quantum computer. If this non-trivial common factor ends high number of mismatches in the key shared by Alice and
up being N0 itself we start over again with a different N1 — Bob, which can easily be detected by them if they compare
but there are more optimal ways to deal with this issue. a small number of their key-digits. So the crucial quantum-
feature which guarantees secrecy in this protocol is the fact
6.5 Quantum key distribution that measurements in general alter the states, in the case of
the protocol being in 50% of the cases.
So bye-bye to all our money in the banks? In fact, for the A mild variant of this scheme is the Ekert91 quantum key
positive-minded who beliefs that someday quantum comput- distribution protocol in which Alice and Bob now share Bell-
ers will be fact, there already is a solution available to the states. Each measures their Bell-states in a basis of their
above stated problem, a solution somewhat ironically also choice, and after having measured all their qubits they again
provided by quantum informatics as it was the case for the compare their basis, only retaining those outcome-digits for
problem itself, and in fact, you can already buy it online ei- which their basis match. In fact, the difference between BB84
ther at MagiQ: and Ekert91 essentially boils down to interpreting the ‘iden-
tity’ 1Q : QAlice → QBob either as:
http://www.magiqtech.com/
• effectively sending a qubit;
or at the Swiss basisd ID quantique:
• sharing a Bell-pair.
http://www.idquantique.com/
The BB84 quantum key distribution protocol is a simple pro- 7 Mixed states
tocol which goes as follows. There are two parties, namely
Alice and Bob. Alice prepares her qubits in either of the states Thus far we defined a state to be a ray in a Hilbert space. It
turs out to be useful to have a more general notion of state
| 0i | 1i | 0i + | 1i | 0i − | 1i which will enable us to describe:
in a randomly distributed manner, and sends them one by one 1. Situations where there is a (probabilistic) lack of com-
to Bob. Bob, in order to know their content has to choose plete knowledge on the actual state of a quantum system.
between measuring them in either of the basis
2. Large statistical ensembles of quantum systems.
{| 0i , | 1i} or {| 0i + | 1i , | 0i − | 1i} .
3. Subsystems of a bigger (entangled) quantum system.
Choosing ‘the wrong’ basis for measuring a qubit would of 4. Non-isolated (=open) quantum systems; decoherence.
course destroy its data and yield an outcome unrelated to its
actual initial state, and there is no way for Bob to know (with- All of these can be represented by the same mathematical ob-
out Alice’s help) whether an outcome reflects the true initial ject, namely a density operator, also referred to as a mixed
state or not. So Bob can’t do anything else but measuring the state. As compared to a pure state which is a ray in a Hilbert
qubits in a randomly picked basis of his choice and records space H, a density operator is defined to be a linear operator
for each of the qubits which basis he used and what the out- ρ : H → H which is:
come was. After all this is done, Alice tells Bob publicly for
all of the qubits she has send whether they either belonged to • positive (and hence self-adjoint);
Pi ◦ ρ ◦ Pi 1
0
ρ 7→ 2
Tr(Pi ◦ ρ) 0 1
2
and this transition happens with probability Tr(Pi ◦ ρ). as density matrix. Can you find an example of (φ1 , φ2 , φ3 )
with ω1 = ω2 = ω3 = 13 which again is described by the
same density matrix? Repeat this question but now for
Exercise 7.2 Show that when setting ρ := |ψihψ| these pos- 1
tulates boil down to those for pure states. 4 0 1 0
3 and .
0 4 0 0
These postulates can in fact be derived from those for pure
states given the above heuristics. Consider a probabilistic
lack of knowledge on a set of states i.e. we have a fam- Now consider the situation that we have |Φi ∈ K ⊗ H. A
ily of pure states {ψi }i together with respective probabilis- measurement of H ‘alone’ is formally realised by considering
tic weights {ωi }i of the system actually being in that state. {1K ⊗ Pi }i where {Pi : H → H}i a measurement of H.
The probability for a certain outcome in a measurement is the Hence the respective probabilities are given by
weighted sum of the individual probabilities i.e.
X X hΦ|(1K ⊗ Pi )|Φi = hΨBell |(1K ⊗ (f † ◦ Pi ◦ f ))|ΨBell i
ωj hψj |Pi |ψj i = ωj Tr (Pi ◦ |ψj ihψj |) = Tr(f † ◦ Pi ◦ f )
j j
X = Tr(Pi ◦ f ◦ f † )
= Tr Pi ◦ ωj |ψj ihψj | = Tr(Pi ◦ ρ)
j
= Tr(Pi ◦ ρ) . — this can again easily be seen in a picture. We claim that
P f ◦ f † is indeed a density matrix:
We claim that j ωj |ψj ihψj | is indeed a density matrix:
• It is positive by Proposition 5.5.
• For all |φi we have that hφ|ψj ihψj |φi = |hφ|ψj i|2 is
positive and hence so is • We have
X X Tr(f ◦ f † ) = hΦ|Φi = 1
ωj hφ|ψj ihψj |φi = hφ| ωj |ψj ihψj | |φi
j j whenever |Φi is normalised.
what completes the claim. i.e. we consider the density matrix of the pure state of the
6
Recall that this is the same thing as saying that these projectors arise large system and trace out the component we are not inter-
as the spectral decomposition of a self-adjoint operator. ested in. In a picture we have:
32
Decoherence. As a result of interaction between a quantum
f system andP the environment the state of a system decoheres.
Ψf = = f Let |ψi = i ci |ii be the state of the quantum system and let
Ψf f† |ǫi be the state of the environment. We have
f†
decohere
X X
|ǫi ⊗ |ψi = |ǫi ⊗ ci |ii ❀ ci |ǫi i ⊗ |ii
i i
The result of the converse derivation, i.e. finding |Φi given ρ,
is called a purification of ρ. ⇒ the system becomes entangled with the environment
⇒ the system becomes part of a bigger system
Exercise 7.4 Are purifications always unique? If not, can
you characterise all possible purifications of type H⊗H given ⇒ the system’s state becomes a mixed state
a density matrix ρ : H → H. ⇒ we loose lack of knowledge on the state
⇒ the state becomes less informative.
Comparing degrees of mixedness. We can use the majori- Ultimately the state could become the maximally mixed state
sation order to compare the mixedness of mixed states. This i.e. the system could be in any state with equal probability.
can be done in two ways: Obviously this is extremely bad for computational purposes.
Decoherence is a major problem in the experimental realisa-
• Compare respective purifications in majorisation order. tion of quantum informatic devices. Avoiding decoherence
requires error-correction [17].
• Diagonalise the density matrices and compare the lists
of ordered diagonal elements in majorisation order.
8 Quantum logic and Gleason’s theorem
These two are easily seen to be equivalent. Pure states are
minimal elements in this order while there is a unique top In 1932 von Neumann published the current quantum me-
element, namely the maximally mixed state chanical formalism [2], but already in 1935 he wrote in a
1 letter to G. Birkhoff [3]:
0
N
1 ..
⊥N := · 1H = .. “I would like to make a confession which may seem
.
N
0 1 immoral: I do not believe absolutely in Hilbert
N
space no more.” [von Neumann, 1935]
This state represents a situation where there is no information
on the actual state of the system. Its classical counterpart is This resulted in a joint paper entitled ‘The logic of quantum
the uniform probability distribution since it behaves as such mechanics’ [4], in which the order-theoretic structure which
w.r.t. to any possible basis (cf. it’s an identity up to a scalar). exists on the subspaces of a Hilbert space is taken to be the
logical/structural feature which provides the key difference
Exercise 7.5 For a maximally mixed state ⊥N : H → H between classical and quantum behavior. The subspaces of a
what are the possible purifications? What can you tell about Hilbert space indeed come with order structure:
their degree of entanglement?
A≤B⇔A⊆B
What makes this partial order special is the fact that not all
Exercise 7.6 What is the mixed state describing a single subsets of H are subspaces, nor are the subsets of the set
qubit within the GHZ-state? What is the mixed state describ-
Σ = {| ψi | ψ ∈ H}
ing a pair of qubits within the GHZ-state?
of all rays.
Exercise 7.7 Assume we perform the teleportation protocol Birkhoff-von Neumann quantum logic. Classically, the
but Alice does not communicate the measurement outcome to algebra of (observable) properties that can be attributed to a
Bob. Hence Bob cannot perform the unitary correction. What physical or computational system consists of the subsets of
is the resulting state at Bob’s end? the state space i.e. it is the powerset P(Σ) . Any proposition
on truth of an observable can be expressed in terms of such
33
a subset. Indeed, let f : Σ → R be a physical observable in L(H) e.g. in Q for | +i := | 0i + | 1i we have
e.g. energy values, color, location, speed, etc. Then
| +i ∩ (| 0i ∨ | 1i) = | +i =
6 0 = (| +i ∩ | 0i) ∨ (| +i ∩ | 1i).
f −1 [E] ∈ P(Σ)
This example also shows that the suprema are not disjunctive
expresses the property due te fact that there are superposition states. This turns out
to have dramatic consequences for its logical status e.g. there
“the value of f is within E ⊆ R”. is notion of deduction, nor of modus ponense (etc.) i.e. we do
not have
The basic idea in Birkhoff and von Neumann (1936) is the
same thing. All statements of the form A∧B ⊢C A⊢B ∧ B⇒C
.
A⊢B⇒C A⊢C
“the value of H is within E ⊆ R”
People have played around with with the Sasaki hook
for a self-adjoint operator H can be represented by the pro-
A ⇒ B := A⊥ ∨ (B ∧ A)
jector PH E in the spectral decomposition, or the subspace A H
E
of its fixed points. Conversely, each subspace A ⊆ H is the
but this requires replacing ∧ by the non-commutative and
eigenspace for some projector. Hence the algebra of observ-
non-associative binary connective
able properties of a quantum system seems to be
PA (B) := A ∧ (B ∨ A⊥ ) ,
L(H) := {A ⊂ H | A is a subspace} .
Since L(H) ⊆ P(H) set-theoretic inclusion provides a which cannot be interpreted as a conjunction — an interpre-
partial order and set-theoretic intersection provides greatest tation for this which does seem to make sense is one in terms
lower bounds. We also have least upper bounds, namely the of a Hoare-style weakest precondition/ strongest postcondi-
linear span, which is definable as tion semantics. Therefore it makes more sense to call this an
algebra. There are some important results of this setting.
_ \
Ai = {A ∈ L(H) | ∀i : Ai ⊆ A} ,
i Theorem 8.1 (Gleason 1957) Let dim(H) ≥ 3. For each
state | ψi there exists exactly one function
and orthocomlements
ω| ψi : L(H) → [0, 1]
A⊥ = {ψ ∈ H | ∀φ ∈ A : hψ|φi = 0} .
such that
which satisfies
ω| ψi (A) = 1 ⇔ | ψi ⊆ A
A ≤ B ⇒ B ⊥ ≤ A⊥ A⊥⊥ = A X _
ω| ψi (Ai ) = ω| ψi ( Ai )
A ∧ A⊥ = 0 A ∨ A⊥ = H i i
Hence one obtains a structure where we assume all {Ai }i to be always mutually orthogonal.
⊥
L(H) , ∩ , ∨ , , H, 0 Existence is not a surprise since we know such a map, namely
we have
This result shows that all possible probabilistic behaviors, for X X
whatever kind of system including both classical and quantum hii| ⊗ 1Ha ◦ (1Hb ⊗ f ⊗ 1Ha ) ◦ 1Hb ⊗ |jji
uncertainty, can always be described by a density operator. i j
X
However, this order-theoretic approach dramatically failed = hi|f |ji|jihi|
in capturing the Hilbert space tensor product at any alge- ij
braic or conceptual level. That is, any attempt to axiomatize
X X
= fij |jihi| = fji |iihj| = f T
it essentially requires the full-blown Hilbert space structure. ij ij
So we have good reasons to abandon the order-theoretic ap-
proach, but is there any other candidate mathematical struc- that is, in a picture
ture which would enable us to capture the tensor product at a
higher level of abstraction/conceptualization.
fT
= f
9 Mixed operations
This can also be purely graphically derived by ‘sliding the
This is a very involved topic which has its roots in C ∗ -algebra f -box’. Although we have (f ◦ f † )T = f ◦ f T , graphically
[23]. We will mainly mention the key concepts and results.
Similarly as density operators describe a more general notion f = f
of state there are more general notions of operation (contra † T
f f
unitaries) and of measurement.
Denote the set of all mixed states of type H → H as Σ(H).
The type of a generalised notion of operation is i.e. the transposed of something positive is always positive,
F : Σ(H) → Σ(H) ((−)T ⊗ 1Σ(Q) )(|ΨBell ihΨBell |) is not positive:
we have that F is indeed completely positive. This again can hΨBell | (F ⊗ 1H→H ) (|ΨBell ihΨBell |)) |ΨBell i ∈ R+
be immediately seen in a picture:
g g Note that this expression is quite hard to read.
f = f
Exercise 9.6 Show that channel fidelity is a positive number.
f† f†
g† g† In a picture it becomes:
Ek ◦ ρ ◦ Ek† .
X
F : Σ(H) → Σ(H) :: ρ 7→ The following exercise is closely related to ex.10.1 ii but puts
k it in a ‘less decorated’ formal context.
A generalised measurement is described by a family of lin-
Exercise 10.2 [MSc mini-project 2006] We study maps be-
ear maps {Ek : H → H}k and induces a transition
tween a Hilbert space H and H ⊗ H. Is the map
ρ 7→ Ek ◦ ρ ◦ Ek†
γ : H → H ⊗ H :: | ψi 7→ | ψi ⊗ | ψi
with probability Tr(Ek ◦ ρ ◦ Ek† )
= Tr(Ek†
◦ Ek ◦ ρ). A
POVM is described by a family of positive linear operators linear, and for which arguments does the linear map
{Mk : H → H}k and produces outcomes with probability
Tr(Mk ◦ ρ). No change of state is associated with a POVM. ∆ : H → H ⊗ H :: | ii 7→ | iii
Theorem 9.8 (Naimark) Each POVM can be realised by ap- coincide with γ?
plying some projective measurement to an extended system
and then tracing this extended system out. The following exercise investigates the structure of the pure
tensors within the whole tensor product of two qubits.
Exercise 10.1 [BA exam 2006] i. We modify the setting in Next, find a basis BQ for the subspace of Q ⊗ Q spanned
which we proved the no-cloning theorem by introducing a by PT, and prove that this is indeed a basis. (Hint: You can
state of the “environment” i.e. we start with a system in state pick Φ and BQ from the union of the elements of the com-
ψ ⊗ φ0 ⊗ Φ0 and we wish to find a unitary operator Uclone putational basis and the Bell-basis.) Is PT itself a subspace
such that for any “unknown” state ψ we have of Q ⊗ Q? ii. We will now generalize the above to a Hilbert
Uclone (ψ ⊗ φ0 ⊗ Φ0 ) = ψ ⊗ ψ ⊗ Φψ space H of arbitrary dimension. Provide a basis BH for the
subspace of H ⊗ H spanned by the set
where Φψ is allowed to depend on ψ while φ0 and Φ0 are n o
constants, but you are allowed to choose φ0 , Φ0 and Φψ . Does PTH := |ψi ⊗ |ψi |ψi ∈ H .
such a unitary operator Uclone exist? ii. Why is the operation
Next, find a set A of vectors which are all orthogonal to PTH
δ : H ⊗ H → H ⊗ H :: | iji 7→ | iii
and such that A ∪ BH is a basis of H ⊗ H. (Hint: Are
not a copying operation? More specifically, characterize the there some obvious ways in which you can embed each of
initial states for which δ does not map the input state |ψi ⊗ the vectors included in the Bell-basis for Q ⊗ Q in the higher-
|φ0 i to the output state |ψi ⊗ |ψi. iii. We reverse this cloning dimensional space H ⊗ H?)
setting into some “pseudo-deleting” setting by starting with a
37
Compositionality with relations. We now present a sur- what boils down to exactly being the cartesian product i.e.
prising analogue to the compositionality result which enabled “pairs of pairs” R1 × R2 =
us to derive several quantum protocols. Let’s move from the
world of Hilbert space to sets, ... {((x1 , y1 ), (x2 , y2 )) ∈ (X1 ×Y1 )×(X2 ×Y2 ) |
(x1 , y1 ) ∈ R1 , (x2 , y2 ) ∈ R2 }
Hilbert space ❀ set
For two relations R ⊆ X ×Y and S ⊆ Y ×Z their sequential
linear map ❀ relation
composition is defined as
tensor product ❀ cartesian product
x(R; S)z ′′ ⇔ ∃y ∈ Y : xRy & ySz
f unction composition ❀ relational composition
Where do we end up in this way: something classical-like that is
or something quantum-like? The obvious guess would be to
R; S := {(x, z) ∈ X × Z | y ∈ Y : xRy , ySz} .
think that we obtain something classical-like. However!
A relation ‘from X to Y ’ is some R ⊆ X × Y . Hence We can now calculate what a ket-bra is. Since r : {∗} → X
it is a family of pairs (x, y) ∈ R. When we write xRy for is some ({∗} × A) ⊆ {∗} × X we obtain
(x, y) ∈ R we can write:
rc ; r = (A × {∗}); ({∗} × A) = A × A
R = {(x, y) | x ∈ X, y ∈ Y, xRy} .
where rc stands for the converse relation so
We have an analogue to scalars:
adjoint ❀ converse.
H ⊗ C ≃ H ❀ X × {∗} ≃ X
By the trivial map state duality bipartite ket-bras are:
and hence an analogue to state:
PR = R × R ⊆ (X × Y ) × (X × Y )
|ψi : C → H ❀ r : {∗} → X
in analogy with Pf := |Ψf ihΨf |. We wish to study
so the ‘relational states’ are the subsets of X, i.e. elements of
the powerset P(X). A notion of Superposition emerges: (1X × PS ); (PR × 1Z )
✻
where R ⊆ X × Y and S ⊆ Y × Z. We have
{3} {1,3}
and we have
where so
(x, y, z)(1X × PS ))(PR × 1Z )(x′′ , y ′′ , z ′′ )
• lefthandside are the states of the space X × Y
if there exists (x′ , y ′ , z ′ ) such that x = x′ Ry ′ Sz ′ = z ′′ i.e.
• righthandside are all relations ‘from X to Y ’
x(R; S)z
For two relations R1 ⊆ X1 × Y1 and R2 ⊆ X2 × Y2 their
which exactly yields our well-known compositionality result
parallel composition (cf. tensor) is defined as
for Hilbert spaces with corresponding ‘seemingly backward
(x , x )(R “×”R )(y , y ) ⇔ x R y & x R y in time information flow’.
1 2 1 2 1 2 1 1 1 2 2 2
38
11.1 Symmetric monoidal categories
Exercise 10.4 i. What is a Bell-state in the world of rela-
tions? ii. Show that in the world of relations there also exists This Section is available as §1,2,3,4,5 in a paper at
an analogue to Exercise 5.1. iii. Can you come up with a
web.comlab.ox.ac.uk/internal/courses/
notion of full and partial trace for the world of relations? iv.
materials05-06/qcs/Cats.pdf
Using this notion of trace prove an analogue to Exercise 5.11
on partial traces in the world of relations. In the symmetric monoidal category (Rel, ×) with
There are two ways to pass from Hilbert space to the purely • sets as objects;
quantitative level of relations namely via • relations as morphisms;
• the cartesian product as its monoidal bifunctor with the
• matrix calculus where the Boolean semiring B (i.e. 1 +
singleton set {∗} as its unit;
1 = 1 and not Z2 ) replaces the complex field C.
and the symmetric monoidal category (FdHilb, ⊗) with
• Dirac notation where the singleton set {∗} replaces C in
the definition of bras and kets. • finite dimensional Hilbert spaces as objects;
• linear maps as morphisms;
Can you figure out why in one case we have a two-element
set while in the other case we have a singleton set — this is • the tensor product as its monoidal bifunctor with the
quite a hard one to solve! one-dimensional Hilbert space C as its unit;
What do sets, relations and cartesian product on-the-one- there is no natural diagonal i.e. no family of morphisms
hand and Hilbert spaces, linear maps and tensor product on-
the-other-hand have in common? Their category-theoretic {∆A : A → A ⊗ A}A
structure are very similar! The fact that we picked sets wasn’t such that for all f : A → B we have commutation of
important, but it was crucial to pick relations and not func-
f ✲
tions, and to pick cartesian product and not disjoint union. A B
We can take each Ui : Hi → Hi′ to be a change of basis. In fact, we have a ‘degenerate’ so-called Linear Logic in
Hence we obtain that naturality implies basis-independency. which conjunction and disjunction coincide.
This then also immediately makes clear why ∆{| ii}i : H →
H × H couldn’t have been natural.
11.3 †-compact categories
Exercise 11.1 Show that ∆{| ii}i indeed depends on the We define a †-compact category as a symmetric monoidal cat-
choice of basis i.e. there exists a basis {| ei i}i such that egory which comes with the following additional data
∆{| ei i}i : H → H × H :: |ei i 7→ |ei i ⊗ |ei i • involution dual A 7→ A∗ ;
does not coincide with ∆{| ii}i . Can you find the necessary †
• contravariant ⊗-involution7 adjoint fA→B 7→ fB→A ;
condition on {| ei i}i such that ∆{| ii}i and ∆{| ei i}i coincide? 7
I.e. the ‘abstract’ adjoint has to preserve the tensor-structure.
40
• Bell-states ηA : I → A∗ ⊗ A; Both f∗ and f ∗ admit a nice purely diagrammatic characteri-
zation, respectively:
for which we have ηA∗ = σA∗,A ◦ ηA and
≃ η † ⊗ 1A
A✛ I ⊗ A ✛A
∗
(A ⊗ A∗ ) ⊗ A =:
✻ ✻ f f†
*
1A ≃
A ✲ A⊗I ✲ A ⊗ (A∗ ⊗ A)
≃ 1A ⊗ ηA
As discussed in =:
f* f
http://arxiv.org/abs/quant-ph/0510032
= (f )*
*
= f†
= f†
43