0% found this document useful (0 votes)
4 views5 pages

Assignment1 QuantumReview

This document outlines Assignment 1 for a Quantum Aspects of Cryptography course, detailing instructions for submission, collaboration, and grading. It includes a series of exercises ranging from elementary to less elementary, covering various quantum mechanics concepts and proving properties of quantum states and operations. The assignment is due on February 6, 2025, and encourages students to seek clarification and engage in peer review.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
4 views5 pages

Assignment1 QuantumReview

This document outlines Assignment 1 for a Quantum Aspects of Cryptography course, detailing instructions for submission, collaboration, and grading. It includes a series of exercises ranging from elementary to less elementary, covering various quantum mechanics concepts and proving properties of quantum states and operations. The assignment is due on February 6, 2025, and encourages students to seek clarification and engage in peer review.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Quantum Aspects of Cryptography

Assignment 1—Quantum Review


(For lectures 1, 2 and 3)
Assigned: Thursday, Jan 23, 2025
Due (2 weeks): Thursday, Feb 6, 2025

Instructions.
1. You are encouraged to write to me to setup a meeting should something not be clear.
2. Medium
(a) If you prefer to type your answers:
i. Please record your screen showing your work (ensure there is a video feed that clearly shows your face).
ii. Upload this recording Google Drive/YouTube etc. with appropriate privacy settings, and obtain a shareable
link.
iii. Include this link in the final PDF.
(b) If you handwrite your answers, the aforementioned steps are not needed. However, you must submit a scanned
PDF of your answers before the deadline. Please use a dedicated scanning app or a scanner if you have access to
one—but do not submit photos as they are hard to print.
In both cases:
(a) Please include the assignment number, together with your name, email and enrolment number in the PDF.
(b) If your name is Alice and you’re submitting answers to Assignment 1, use Alice1.pdf as your filename when
submitting.
(c) Submit your assignment using this OneDrive link for Assignment 1.
3. You can cooperate among yourselves but understand and write the answers yourself. If two (or more) submissions
have identical answers, both submissions will lose all points for that answer.
4. At most one late submission (by one week), at most once a month (once in January, once in February and so on) is
allowed without penality—granted an extension was sought before the deadline. For instance if an extension is sought
for an assignment that was assigned on Jan 23, then this is counted towards a late submission in January.
5. Grading: We will hold a long tutorial session, once before the mid-semester, and once before the final exam. Each of
these long tutorials will consist of three parts.
(a) Final clarification. To answer any questions you may have regarding the assignments or the upcoming exam.
(b) Peer review part. You will receive a link to the answers submitted by one of your peers. You will also get a
printed score card where you have to award points from 0 to 5 to each item in each exercise (E.g. If Exercise 1
has three sub-exercises, each sub-exercise gets 5 points.).
Guideline for grading:
i. A score of 5 should mean that the question was answered correctly and explained well.
ii. A score of 3 could mean that a partial answer was given or that even though the answer looks like it could
be correct, it is hard to gauge with confidence due to lack of details/poor presentation.
iii. A score of 0 should mean that no relevant progress was made at answering the question.
iv. Flag any question that looks like it was copied without understanding.
(c) Viva voce: We will have a viva voce exam where I’ll ask you to present a random (not necessarily uniformly
random) subset of your assignment answers. The goal is to make sure you actually understood what you wrote
and give you a chance to increase your score if you can answer a question you got wrong in your submission.

1
Elementary exercises.
Exercise 1. Prove the following to ensure the notation is clear:
1. For a matrix H ∈ Cd×d and a ket |ψ⟩ ∈ Cd ,

(H |ψ⟩) = ⟨ψ| H † .

2. The vector
|1⟩ + |2⟩ + . . . |d⟩
|ψ⟩ = √
d
Pd |i⟩⟨j|
is normalised. The matrix Π = i,j=1 d can be expressed in a very simple form in terms of |ψ⟩. Finally, Π satisfies
Π2 = Π and has rank 1.
3. For any two orthonormal basis {|u1 ⟩ . . . |ud ⟩} and {|v1 ⟩ . . . |vd ⟩}, there is a (unique) unitary matrix U such that
U |ui ⟩ = |vi ⟩ for all i ∈ {1 . . . d}.
Exercise 2. Prove the following.
1. Every Hermitian matrix H has real eigenvalues.
2. If λ is an eigenvalue of a unitary matrix U , then |λ| = 1.
3. If λ is an eigenvalue of a projector Π (i.e. a matrix satisfying Π2 = Π), then λ is either 1 or 0.
Exercise 3. Verify that the expected result of measuring O when the system is in the state |ψ⟩ is ⟨ψ| O |ψ⟩ which is some-
times briefly written as ⟨O⟩.
Exercise 4. Let σx , σy and σz be Pauli matrices (use the convention from class). Then, show that

[σz , σx ] = 2iσy
[σy , σz ] = 2iσx
[σx , σy ] = 2iσz

Also, verify that for all τ ∈ {σx , σy , σz },


1. τ 2 = I and so [τ, τ ] = 0,
2. det(τ ) = −1 and tr(τ ) = 0.
Exercise 5. Let O1 , O2 be as above and let |ψ⟩ ∈ Cd denote any quantum state. Consider the following experiments:
1. Measure O1 first, to obtain o1 and then measure O2 to obtain o2
2. Measure O2 first, to obtain o2 and then measure O1 to obtain o1
Prove that the probability one obtains o1 = a and o2 = b is the same in both cases, i.e.

Pr [(o1 , o2 ) = (a, b) : Experiment 1] = Pr[(o1 , o2 ) = (a, b) : Experiment 2]

for all a ∈ spectrum(O1 ) and all b ∈ spectrum(O2 ).


Exercise 6. Understand what the Mach-Zhander interferometer is. Can one view it as a simplification of the Double-Slit
experiment (as discussed in class)? Explain the observations made using a Mach-Zhander interferometer starting from the
postulates of quantum mechanics.
Exercise 7. If {|xi ⟩}i∈I and {|yj ⟩}j∈J are orthonormal bases for vector spaces X and Y respectively, then {|xi ⟩ ⊗ |yj ⟩}i∈I,j∈J
spans the vector space X ⊗ Y.
Exercise 8. Explicitly write down the tensor products assuming systems A and B are both two-dimensional:

1. IA ⊗ IB
2. IA ⊗ (σx )B

2
Figure 1: Bloch Sphere (taken from Wikipedia)

3. (σx )A ⊗ (σx )B

4. (σx )A ⊗ (σz )B

Exercise 9. Prove that for any state |ψ⟩ ∈ Cd and any matrix O ∈ Cd×d , ⟨ψ| O |ψ⟩ = tr(O |ψ⟩ ⟨ψ|).
p p
Exercise 10. Let ρ := 34 |0⟩ ⟨0| + 14 |1⟩ ⟨1| and σ := 12 |u⟩ ⟨u| + 12 |v⟩ ⟨v| where |u⟩ := 3/4 |0⟩ + 1/4 |1⟩ and |v⟩ :=
p p
3/4 |0⟩ − 1/4 |1⟩. If ρ = σ, show this explicitly. If ρ ̸= σ, prove it.
Exercise 11. Prove that ρS is indeed a density matrix, if ρSE is a density matrix where SE are two registers.
Exercise 12. Let AB be registers with A and B both C2 . Write down the density matrix ρAB and the reduced density matrix
ρB corresponding to the following pure states.

1. |ψ⟩A ⊗ |ϕ⟩B
√ √
2. p0 |0⟩A ⊗ |ψ0 ⟩B + p1 |1⟩A ⊗ |ψ1 ⟩B where p0 ≤ 1 and p1 = 1 − p0 .

3. (|00⟩ + |11⟩)AB / 2.
P
Exercise 13 (Purification). Let ρA = i∈I λi |ui ⟩ ⟨ui |A be the spectral decomposition of a density matrix ρA ∈ A. Then,
P √
verify that |ψ⟩AB = i∈I λi |ui ⟩A |i⟩B satisfies trB (|ψ⟩ ⟨ψ|AB ) = ρA . Is there any other state satisfying this property?
Give an example.
Exercise 14 (Simple facts about the Bloch sphere). Show the following simple facts about the Bloch sphere.

1. Warmup:
(a) Show that a qubit in an arbitrary pure state |ψ⟩ can be written as |ψ⟩ = cos(θ/2) |0⟩ + eiϕ sin(θ/2) |1⟩. How
did you decide the range of θ and ϕ? Recall this is what we called the Bloch Sphere representation.
(b) Find the normalised eigenvectors of σx , σy , σz .

(c) Represent the state 12 |0⟩ + eiπ/4 3 |1⟩ on the Bloch sphere.


(d) Show that opposite points on the Bloch sphere correspond to orthogonal states.
2. Consider the observable n̂ · ⃗σ where n̂ = (nx , ny , nz ) is a normalised vector and ⃗σ := (σx , σy , σz ) is an ordered pair
of Pauli matrices.
(a) Show that n̂ · ⃗σ has eigenvalues ±1 and that the projectors on the corresponding eigenspaces are P± := (I ± n̂ ·
⃗σ )/2.
(b) Compute the probability to get the outcome +1 for a measurement of n̂ · ⃗σ on the state |0⟩.
(c) Where does the post measurement state lie on the Bloch sphere?
Exercise 15 (No cloning). Show that there cannot exist a unitary U acting on H ⊗ H that maps |ψ⟩ ⊗ |0⟩ to |ψ⟩ ⊗ |ψ⟩.

3
Less elementary exercises. Try to think about the problem yourself before looking up solutions, if you must.
Exercise 16 (Uniqueness of partial trace). Consider two registers AB and suppose M is a (projective) measurement on
system A and M̃ denotes the same measurement applied to the joint system AB.
1. Prove that M̃ = M ⊗ IB . Argue by considering projectors and taking the system to be in the state |m⟩A ⊗ |ψ⟩B
where |m⟩ is an eigenstate of M .
2. Show that for any ρAB ∈ A ⊗ B, it holds that

tr(M ρA ) = tr(M̃ ρAB ) = tr((M ⊗ IB )ρAB ) (1)

where ρA := trB ρAB .


3. Let f be any map that takes density matrices in A ⊗ B to density matrices in A. Prove that if tr(M f (ρAB )) =
tr(M̃ ρAB ) for all ρAB , then f uniquely specifies the partial trace, i.e. trB (·).
Hint: use an orthonormal basis of operators Mi for the space of Hermitian operators, with respect to the Hilbert-
Schmidt inner product, (X, Y ) := tr(XY ) and Equation (1).

Bit commitment. Here is semi-formal description of (a variant of) bit-commitment, in the classical setting. A bit-commitment
protocol involves two parties Alice and Bob and it has two phases: the commit phase and the reveal phase.
In the commit phase, Alice chooses a bit a ∈ {0, 1} and ‘commits’ to it by producing a string sa and sending it to Bob.
(Think of sa as locking the answer in a safe and giving the safe—but not the combination—to Bob.)
In the reveal phase, Alice reveals the ‘opening’ r to the commitment sa . Using (r, sa ) Bob can recover a (or output ⊥ if
the pair (r, sa ) is invalid). (Think of r as the combination to the safe.)
A bit commitment protocol must satisfy two properties:
1. Binding.
Suppose both Alice and Bob follow the protocol honestly but Alice becomes malicious in the reveal phase.
Alice should not be able to produce an opening r that opens to both a = 0 and a = 1.
2. Hiding.
Suppose Alice follows the protocol honestly, but Bob is malicious.
Bob should not be able to learn anything about the bit a from the commitment string sa before the reveal phase starts.
Exercise 17. Suppose Alice and Bob have no bounds on their computational resources. Consider the following two cases:
1. Show that bit-commitment is impossible if both Alice and Bob are classical, i.e. both binding and hiding cannot
simultaneously hold. You may argue as follows.
(a) Suppose the scheme satisfies the binding property. Then for a given sa , can there be any r that reveals ¬a
(instead of a)?
What can you say about the relation between the set of possible strings sent by Alice when a = 0 and a = 1, i.e.
{s0 } and {s1 } resp.?
(b) Using your answer above, can you show that Bob can always learn b from sb .
2. Show the same when they are both quantum by proceeding as follows.
(a) Suppose Alice prepares a state |ϕb ⟩ on registers AB and sends register B to Bob. Denote by ρb the reduced state
on register B.
(b) What does the hiding property say about the relation between ρ0 and ρ1 ?
(c) What does Uhlman’s theorem say about transforming purifications of a density matrix ρ? How are they related?
(d) What does this observation say about the binding property of the commitment scheme?
Exercise 18 (‘Data processing’). Let E be any completely positive trace preserving map from H to H′ and suppose ρ and σ
are density operators in Pos(H). Then, prove that1

TD(E(ρ), E(σ)) ≤ TD(ρ, σ) (2)


1
where recall that TD(X, Y ) := 2 ∥X − Y ∥1 . What connection do you see between Equation (2) and Figure 2?
1 This is Theorem 9.2 in Neilsen and Chuang, 10th edition.

4
Figure 2: Data processing inequality (taken from Neilsen and Chuang).

p√ √ 
Exercise 19 (Fidelity). Recall that the fidelity between ρ and σ is defined as F (ρ, σ) = tr ρσ ρ .
p
1. Prove that F (ρ, σ) = F (σ, ρ) and that F (|ψ⟩ , ρ) = ⟨ψ| ρ |ψ⟩.
2. Understand and write down the proof of Uhlmann’s theorem (about fidelities), i.e. F (ρ, σ) = max|ψ⟩,|ϕ⟩ |⟨ψ|ϕ⟩| where
|ψ⟩ , |ϕ⟩ are purifications of ρ, σ respectively, e.g. from Neilsen Chuang, Theorem 9.4, 10th edition (prove the inter-
mediate lemmas and exercises if you use them in the proof).
p
3. Show that for pure states, TD(|ψ⟩ , |ϕ⟩) = 1 − F (|ψ⟩ , |ϕ⟩)2 .
p
4. Using Equation (2) with E as the partial trace and the points above2 show that TD(ρ, σ) ≤ 1 − F (ρ, σ)2 .

2 Specifically that there exist purifications |ψ⟩ , |ϕ⟩ such that F (ρ, σ) = |⟨ψ|ϕ⟩| = F (|ψ⟩ , |ϕ⟩).

You might also like