Introduction to Quantum Computing
|
|
|
- Audra Oliver
- 10 years ago
- Views:
Transcription
1 The genesis Coenhagen School (Bohr, eisenberg, ) Introduction to Quantum Comuting Frédéric Magniez The state of a quantum articule is only fied after a measurement Bennett, Brassard 84: erfectly secure quantum encrytion that can be used in ractice! Paradoe of Einstein, Podolsky, Rosen 35 INF554 Lectures 8 & 9 Quantum boes 3 Very distant articules remain linked!? Asect, Grangier, Roger, Dalibard 8: yes! Quantum encrytion of Ekert 9 can be certifiable Quantum key distribution 4 Classical information is encoded using bit (0/) Preskill The measure describes the state of the system A random bit is a hidden bit Quantum information is encoded using quantumbit Several ossible measures Outcome is determined during the measurement Problem Setting No rior shared secret information between Alice and Bob Authenticated classical channel Goal: Get a rivate key between Alice and Bob Alication: Onetime ad (Miller 88Shanon 945) Classical results Imossible: all the information is in the canal Possible (using randomized techniques): Amlify the rivacy of an imerfect rivate key WashingtonMoscow hotline (963)
2 The rotocol BB84 [BennettBrassard 84] 5 Qubit 6 Protocol: quantum art Key: Encoding: State dimensional unit vector i = cos +sin i i Decoding: Key: Protocol: classical art Reconciliation: Alice and Bob ublicly announce their coding choices A&B only kee key bits with same choices Security: Interceting and oening a bo errors A&B check few key bits at random ositions Privacy amlification: Perfect key using with few other more key bits Conclusion Secrete key generation using an authenticated classical channel Small initial rivate key large rivate key, with no authenticated channel general case (comle amlitudes): i = = + i, + = Randomized orthogonal rojection Evolution + i Unitary transformation G U() ( reversible) Definition: G C s.t. G G = Id i i G 0 i = G i 0 i = G i G i Eamles of transformations 7 Polarization of hotons 8 Reversible classical transformation Identity Negation adamard transformation Definition: halfwave blade at,5 Id Proerties: quantum coin fliing bi ( + i) = ( + ( ) b i) i does not commute! State Polarization: dimensional vector i = cos!i + sin "i Calcite crystal searates horizontal and vertical olarizations A measure modifies the system Transformation Well known transformation: halfwave blade orthogonal symmetry around its ais Any rotations (ossibly with comle angles) cos sin
3 Eercice : Quantum key distribution Imlementation Elain how to realize the boes of slide 3 Imlement the rotocol of slide 4 using random bits, adamard transformations, and measurements Analysis of a secific attack Assume a third arty Eves intercets a hoton with robability /0, observes it, and forwards the rojected hoton to Bob Assume furthermore that Alice & Bob check each bit of their key with robability /0 Comute The robability Eve learns a bit of the secret key The robability Eve is detected 9 Entanglement Princile: distant boes which remain entangled Outcomes are random but correlated if boes are oened similarly and uncorrelated otherwise Bell 64 inequality Cooerative random game Classical 75% of victory Quantum > 85% of victoiry Eerimental verification at Orsay in 98 Alication: quantum certification 0 BellCS inequality as a classical game Eercice : CS inequality Game Alice and Bob share random bits but cannot communicate Alice receives a random bit, Bob y Alice returns a bit a, Bob b a Goal: maimize shared random bits = Pr(a b = ^ y),y CS inequality [969] The best robabilistic strategy achieves =3/ y b Deterministic strategy Provide a deterministic strategy achieving =3/4 Show that no deterministic strategy can achieve = Conclude that 3/4 for every deterministic strategies Randomized strategy We assume that both layers have access to a shared source of randomness, called λ Note: Physicists call λ a hidden variable Justify why this is the most owerful model of random ressource Let λ be the winning robability when λ is fied Show that there must be some λ such that λ Conclude that the best robabilistic strategy achieves =3/4
4 nqubit 3 Mathematical background: Tensor roduct 4 State ic {0,}n such that k ik = i = {0,} n Eamles Searated qubit: 00i + = ( + i) Entangled qubit: 00i + i 6= i i EPR state Randomized orthogonal rojection {0,} n Evolution Unitary transformation G U( n ) with i G 0 i = G i {0,} n = ( G C n n s.t. G G = Id) Vector saces V, W: vector saces V W is the free vector sace San ( v w : v V, w W ) with equivalence relations (v+v) w = v w + v w v (w+w) = v w + v w (c v) w = v (c w) = c (v w) Linear mas S: V, T: W Y : linear mas S T : V W Y is the linear ma satisfying S T (v w) = S(v) T(w) (and etended by linearity) Alications Joint robability distributions on saces V, W D( VW) = D(V) D(W) D(V)D(W) (: roduct distributions) Transformation c 5 Partial measure: qubit case 6 Definition c 0bi = 0bi c = i ( c abi = ai a Reresentation control bit target bit Bell basis change yi b)i bi yi c = B A i = ( 00i + i) 0i = ( + ) 0i = ( 00i i = ( i) ) of first qubit Projectors of first qubit = a 00 + b 0 + c 0 + d P 0 = = 0 0 I P = = I P 0? P = Id P 0 i = a + b P0 i P 0 i = 0 P i P i P i = = c + d Generalization Partial measure roject to a subsace comatible with the observation Probability = square norm of the rojection Outcome = renormalization of the rojection a 0 + b a + b c 0 + d c + d
5 Eercice 3 7 BellCS inequality as a quantum game 8 Partial vs comlete measurement Consider any twoqubit state, and measure its first qubit and then its second qubit Comute the robability distribution of the outcome Conclude that observing the two qubits is equivalent to measuring each qubit individually in any order Note: This can be generalized to any number of qubits Noncloning Assume there is a unitary ma U such that, for every qubit i: U( i) = i i Comute U( i) for i = ( + i) using the definition of U using the linearity of U and then again the definition of U Get a contradiction and conclude Reminder Goal: maimize Quantumly Alain and Bob share an EPR state a = Pr(a b = ^ y),y Bob erforms a rotation of angle 8 If =, Alice erforms a rotation of angle 4 If y =, Bob erforms a rotation of angle 4 Alice et Bob observe their qubit and send their resective outcomes Theorem: = cos ( 8 ) 0.85 / / y b Realization: [AsectGrangierRogerDalibard: Orsay 8] Eercice 4: EPR state 9 Suerdense coding [99] 0 Entangles boes Imlement the entangled boes of slide 0 using EPR states Proerties Show that alying a unitary U on the first qubit of an EPR state is equivalent to alying the transosed matri of U on its second qubit Quantum game Prove the theorem of revious slide Problem Alice & Bob share an EPR state: Alice wants to send two bits y to Bob But Alice can only send one qubit to Bob Bell basis change yi 00i = ( 00i + i) 0 0 / + qubit / y y? yi 00i = ( 00i + i) 0i = ( + ) 0i = ( 00i i = ( i) ) Protocol Alice alies to its qubit, if y=; and FLIP, if = Alice sends its qubit to Bob Bob erforms the inverse of the Bell basis change, and observes y FLIP = 0 0
6 Quantum teleortation Realization of teleortation Problem Alice wants to transmit a qubit i to Bob Bob: far and unknown osition to Alice Circuit i = + i yi Realization Alice 0 0 Bob ψ Interaction quantique i i Interaction interne Interaction classique The quantum communication does not reveal anything on i! Alice ψ Bob Analysis P Final state with yi = () y (FLIP),y yi yi i By measuring,y, third qubit is rojected to yi After learning,y, Bob can correct yi to i Realizations hoton [Zeilinger et al : Innsbruck 97] hoton, 6 km [Gisin et al : Genève 0] atom [Blatt et al : Innsbruck 04] Today: over 00km yi Coin fliing 3 EPR based coin fliing 4 Problem Alice and Bob are fare away They want to fli a coin in a fair way but they don t trust each other Classically Solutions based on harness assumtions of combinatorial roblems No unconditionally secure solution Quantumly There eists a rotocol with maimal bias 0,5 [00] There is no rotocol with bias better than 0,07 [00] There eists a rotocol with maimal bias 0,07 [009] Weak version: election Alice wants head Bob wants tail There eists a rotocol with arbitrarily small bias [007] Main idea Assume Alice & Bob share an EPR state 0 0 / + / Alice & Bob observe their qubit and get bit a,b Fact a=b with robability a (res. b) is a uniform random bit Problems Who create the EPR state? If Alice does, Bob needs to check that is an EPR state: And for instance not 00i a=b=0 with robability In ordert o check the EPR state, Bob needs the qubits Then Alice needs to check that Bob gives back the correct qubit
7 Google and NASA sna u quantum comuter : Nature News & Comment 0//03 :09 NATURE NEWS EPR based coin fliing Protocol 0 0 / Google and NASA sna u quantum comuter / DWave machine to work on artificialintelligence roblems. / / Initialization + Alice reares EPR states Alice send the corresonding first qubits to Bob Selection Bob select the EPR state that will be use for fliing The other EPR state will be use for checking the honesty of Alice Alice and Bob observe their resective qubit of the fliing EPR state Checking Alice sends to Bob her qubit of the checking EPR state Bob measures the checking EPR state Nicola Jones 6 May 03 DWave, the small comany that sells the world s only commercial quantum comuter, has just bagged an imressive new customer: a collaboration between Google, NASA and the nonrofit Universities Sace Research Association. The three organizations have joined forces to install a DWave Two, collaboration the Quantum Artificial Intelligence Lab at NASA's Theorem Sign In My Account Ames Research Center in Moffett Field, California. The lab will elore areas such as machine learning making comuters sort If both articiant are honest, the outcome is a erfect random bit If one of the articiants is dishonest, the maimal bias is /4 Attacks Print the comuter comany's latest model, in a facility launched by the If the measure outcomes is correct, Bob accets coin Otherwise, Bob declares that Alice has cheated 6 and analyse data on the basis of revious eerience. This is useful for functions such as language translation, image searches and Goal: increase the robability to get 0 voicecommand recognition. We actually think quantum machine may rovide the most creative roblemsolving rocess SUBSCRIBE: omemeasure Delivery Digital Subscritions Estate Rentals Service Alley Bob s attack: its Gift qubits, and select the EPRRealair giving 0 (ifcars any)today's Paer Going Out Guide Find&Save learning under the known laws of hysics, says a blog ost from Google 00 EPR state + EPR state 00 PostTV Politics Oinions Local Sorts National World Business Tech Lifestyle Entertainment Jobs More Alice s attack: 3 3 National Security The DWave Two quantum comuter has a 5qubit rocessor (ictured) that can do some calculations thousands of times faster than conventional comuters. DWAVE describing the deal. The Googleled collaboration is only the second customer to buy a comuter from DWave, which is based in Burnaby, Canada. Aerosace giant Lockheed Martin, headquartered in Bethesda, Maryland, was the first. Lockheed urchased a In the News Barack Obama Drones American Airlines Benghazi American Idol DWave quantum comuter in 0 and installed it in a new Quantum Comutation Center at the University of Southern 7 Safari Power Saver Click to Start Flash Plugin Suercomuter 8 California (USC) in Los Angeles. DWave declines to disclose the rice of their comuters. Both quantumcomuting centres the one at USC and the one at Ames have reserved 0% of their comuter time Feynman 8 for access by outside researchers. Judging by the thirdarty requests we've had, I'd say there should be lenty of Can systems besays robabilistically simulated demand robably more thanquantum can be accommodated, Daniel Lidar, director of the USCby centre. So far, eole Senate reort: Benghazi attack was reventable VIDEO To Sringsteen olitical moments NSA seeks to build quantum comuter that could crack most tyes of encrytion MAP The United States (of Pizza) a classical comuter? [...] the answer is certainly, No! Ferris wheel to join have mostly used these machines to elore ossible alications of quantum comuting and to investigate how the D.C. area skyline comuter behaves, rather than to solve reviously unanswered roblems. Deutsch 85 Alternative model The DWave comuterquantum is unusual because uses quantum bits (qubits) bits that Turingit Machine can eist in two states, on and off, simultaneously to seed u calculations, and Eistence of a universal Turing Machine By Steven Rich and Barton Gellman, Published: January the writers because it does not oerate on the normal 'gate' model of comuting, whereby logic In roomsize metal boes secure against electromagnetic leaks, the National Security Agency is racing to build a comuter that could break nearly every kind of encrytion used to rotect banking, medical, business and government records around the world. gates are used to maniulate those bits. Instead, it is an 'adiabatic' comuter, which reads out the ground state of its qubits to find a solution. The academic community Simon, Shor 94 Quantum algorithms with eonential seedu Quantum attack of ublickey crytosystems htt:// According to documents rovided by former NSA contractor Edward Snowden, the effort to build a crytologically useful quantum comuter a machine eonentially faster than classical comuters is art of a $79.7 million research rogram titled Penetrating ard Targets. Much of the work is hosted under classified contracts at a laboratory in College Park, Md. Vous Vendez Un Bien? 7 Vendez 00% Entre Particuliers Vendez Sans Commission à la Vente Related stories Quantum comuter asses seed test Further roof for Page of 4
8 Quantum arallelism 9 Logical comuting 30 nqubit Suerosition of all ossible values n ossible values Parallel comutation In one ste, n comutations But only one outcome can be (randomly) observed! Strategy Nb of articules in the Universe 300 Combine cleverly those values before measuring them 4 bits can take 4 =6 values Gates A gate C is a function on at most 3 qubits Eamle: AND, OR,,... Circuit A circuit is a sequence of gates The size of C is its number L of gates C comutes a function f if for all inut : C = C L...C C C(, 0 k )=(f(),z) { f() OR } 0 0 AND Theorem Any function can be comuted by a circuit using only, OR, AND gates Quantum gates and circuits Gates U U( k ), k =,, 3 A quantum gate is a unitary ma that acts uon at most 3 qubits Tensor roduct of gates Circuit A quantum circuit is a sequence of gates (etended by Id) G G i i (G G ) i i =(G i)(g i) G R 4 Theorem Any unitary can be realized eactly by a circuit and aroimated using only gates c and 3 Reversible comuting Reversible circuit A logical circuit is reversible if each gate is reversible A reversible circuit is also a quantum circuit (since it ermutes logical states) Embedding f where: 0 = 0 = 0 0 = = 0 u v=(u v,u v,...) Theorem If a function f can be comuted by a logical circuit of size L, then f can also be comuted by a reversible circuit of size O(L) Universality f : {0, } n! {0, } m : {0, } n+m! {0, } n+m f (, y) =(, y f()) The Toffoli gate (cc) is universal for reversible comutating T (a, b, c) =(a, b, c (a ^ b)) 3
9 Quantum imlementation of classical functions 33 A first quantum algorithm [99] 34 Normal form Function: f : {0, } n! {0, } m Circuit: U f : 7! f()i yi 7! y f()i Alternative form Sf Boolean function: Circuit: i = ( Conclusion: 8 < : i) f : {0, } n! {0, } Uf U f ( i) =S f () i 8 < : ( f()i f()i) = ( )f() ( i) DeutschJozsa roblem Oracle inut: f : {0, } n {0, } a blackbo function such that f is either constant or balanced Outut: 0 iff f is constant Query comleity Deterministic: n + Quantum: f(3) =? f(3) = Secial case n= No restriction on f Deterministic vs quantum: queries vs query Quantum solution ( n= ) 35 Analysis ( n= ) 36 7! f() can be nonreversible! Reversible imlementation of f Initialization: S f f constant? f balanced i S f + i ( ( ) ) f(b) f(0) + ( ) f() i Parallelization: ( + i) adamard gate: halfwave blade at,5 Quantum circuit ( + ( ) b i) S f? Query to f: (( ) f(0) + ( ) f() i) Interferences: ( )f(0) ( + i) +( ) f() ( i) Final state: (( )f(0) + ( ) f() ) +(( ) f(0) ( ) f() ) i
10 General solution for DeutshJozsa 37 Analysis 38 Reversible imlementation of f S f ( ) f() ( ) f() {0,} n {0,} n Quantum Fourier transform QFT n QFT n = Quantum circuit n/ ( ) y yi y S f ( + ( y = where i y i mod i QFT QFT? ) b i) QFT S f QFT Initialization: Query to f: i Parallelization: n/ {0,} n Interferences: Final state: n/ ( ) f() {0,} n n ( ) f()+ y yi,y{0,} n n {0,} n ( ) f constant f() i +? f balanced y6= i yi, y6= y yi BernsteinVazirani 39 Eercice: Analysis 40 Problem Oracle inut: f : {0, } n {0, } a blackbo function such that f() =a for some fied a {0, } n Outut: a Query comleity Randomized: n Query f(0 i 0 ni )=ai, for i=,,...,n Quantum: QFT S f QFT Initialization: Parallelization: Query to f: Interferences: ai Quantum circuit S f QFT QFT ai Final state:
11 On the difficulty of factorization 4 Asymmetric encrytion 4 RSA Challenges htt:// Oneway functions Eamle: multilication / factorization Bases of modern encrytion (Rivest, Shamir, Adleman 77) RSA640 (93 digits) : = RSA Algorithm (allows rivate communication) security based on the difficulty of factorizing RSA challenges (99007) RSA00, $,000, 99 RSA640, $0,000, =? 667 =?? =?? Quantum algorithm for factorization 43 From eriod finding to factorization 44 Classical reduction Factorization can be reduced to eriod finding (of some arithmetic function) Quantum tool: Fourier Transform FT reveals the eriod of a signal FT is (very) fast on a quantum suerosition Shor = Theorem [SimonShor 94] Finding the eriod of any function on an abelian grou can be done in quantum time oly (log G ) Order finding Inut: integers n and a such that gcd(a,n)= Outut: the smallest integer q 0 such that a q = mod n Reduction to eriod finding: the eriod of a mod n is q Factorization Inut: integer n Outut: a nontrivial divisor of n Reduction: Factorization R Order finding Check that gcd(a,n)= Comute the order q of a mod n Restart if q is odd or a q/ mod n Otherwise (a q/ ) (a q/ + ) = 0 mod n Return gcd(a q/ ±, n)
12 Simon s roblem 45 Quantum solution 46 Problem Oracle inut: f : {0, } n!{0, } n a blackbo function such that 9s 6= 0 n : 8 6= y, f() =f(y) () y = Outut: the eriod s Comleity Randomly: (n) queries Quantumly: O(n) queries and time O(n 3 ) Idea Use a Fourier transformation: QFT n = y = where i y i mod i Realization of QFTn using adamard gates: 0 f() U f ( + ( ) b i) n/ ( ) y yi y QFT n U f wi w f()i s 0 n i QFT n U f 0 n i Initialization: Parallelization: Query to f: Filter: 0 n i 0 n i n/ n/ 0 n i QFT n Partial measure: roject to a subsace comatible (( ) y with + ( ) ( the s) y observation ) yi f()i Probability = square norm of the rojection Outcome = renormalization of ( ) y the rojection ( + ( ) s y ) yi f()i Interferences: f()i ( + (n+)/ y (n+)/ y (n )/ y:s y=0 f()i si) f()i yi f()i yi : y s? Finding the eriod 47 More difficult Construction of a linear system After n + k iterations: y,y,...,y n+k s s 0 n is solution of the linear system in t: y t = 0 y t = 0. y n+k t = 0 The y i are of rank n with roba / k+ System solutions: 0 n and s Comleity Constructing the system: O(n) queries, time O(n ) Solving the system: no query, time O(n 3 ) y t + y t y n t n =0 y t + y t y n t n =0. y n+k t + y n+k t yn n+k t n =0 Period Finding(G) Oracle inut: function f on G such that f is strictly eriodic for some unknown G: f() =f(y) () y Outut: generator set for Eamles Simon Problem: Factorization : Discrete logarithm: Pell s equations: Grah Isomorhism: Quantum olynomial time algorithms (in log G ) Abelian grous G: QFTbased algorithm [995] Normal eriod grous : QFTbased algorithm [000] Solvable grous G of constant eonent and constant length [003]... G a a t G =(Z ) n,= {0,s} G = Z, = rz G = Z,= {(r, ) : Z} G = R G = S n f
13 ard instances 49 Grover search algorithm 50 Shift roblem Z N oz Dihedral grou : subeonential time O( log N) [003] f(, 0) shift = 3 f(, ) Grah Isomorhism A : B : Instance of Period Finding on the symmetric grou where we just know how to imlement QFT... [997] General case Polynomial number of queries to f, but eonential ostrocessing time [999] A B a b 6 c 8 d 3 e 5 f g 4 h 7 Grover roblem Oracle inut : f : {0, } n!{0, } such that Outut : 0 Constraint : f is a blackbo Query comleity Randomized: ( n ) Quantum: ( n ) n = =) query 9! 0 : f( 0 )= Preliminary remarks 5 Quantum solution ( n =) 5 Imlementation of S f f ( ) f() = 0 0 i S f S 0 0 i Double adamard gate i i = i with ( + ( ( + ( y ) i) ) i) ( ) y yi y = y + y mod Initialization: 00i Parallelization: ( 00i i) Query to : Interferences: Final state: f Query to : _ 0 00i 00i 0 i y 0 i ( ) 0 y yi ( ) 0 y yi 00i = 0 i y
14 Geometrical analysis 53 Geometrical analysis, general case 54 Grover oerator Grover oerator G def = S f S 0 G def = S f S 0 Vect R ( 0 i, unifi) 0 i Vect R ( 0 i, unifi) 0 i S f = S = S? S f = S = S? S 0 = S 00i S 0 = S 00i S 00i = S unifi G = S unifi S? = R unifi S 00i = S unifi G = S unifi S? = R unifi 0i? with sin = hunif 0 i = 0i? with sin = hunif 0 i = n After iteration unifi 7! G unifi = 0 i After T = /π ( n ) iterations unifi 7! G T unifi 0 i ow many quantum algorithms eist? Unstructured roblems Grover algorithm [996] Algebraic roblems SimonShor algorithm [994] Well structured roblems Classical algorithms are otimal! Problems with few structures Quantum walk based algorithms [003] quantum analogy of random walks Eamles Element Distinctness, Commutativity: N /3 [004] Triangle Finding: N 9/7 (lower bound N) [03] Square Finding: N.5 (lower bound N) [00] Matri Multilication: N 5/3 (lower bound N 3/ ) [006] ANDOR Tree evaluation: N [007] 55 To continue An Introduction to Quantum Comuting Authors: Philli Kaye, Raymond Laflamme, Michele Mosca Editor: Oford University Press Quantum Comutation and Quantum Information Authors: Michael A. Nielsen, Isaac L. Chuang Editor: Cambridge University Press Classical and Quantum Comutation Authors: A. Yu. Kitaev, A.. Shen, M. N. Vyalyi Editor: American Mathematical Society Collection: Graduate Studies in Mathematics Lecture Notes for Quantum Comutation Author: John Preskill Website: htt:// Quantum roofs for classical theorems Author: Andrew Drucker, Ronald de Wolf Website: htt://ariv.org/abs/
15 Where does the quantum sueriority come from? 57 Entanglement? No: they can be simulated using only real amlitude Yes: they can induce destructive interferences 0 0 / + / Negative amlitudes? Unfalsifiable money, artificial intelligence, Quantum comuting For a better understanding of quantum henomenon New mathematical tool for roving results in classical comuting! Technology ardness of amlitudes? No: amlitudes must be easily comutable for being hysically realizable Some quantum centers in the world CQC IQIS 59 RQC IQC PCQC QIS IQI 58 Alications Classical entanglement eists: shared randomness But quantum entanglement is stronger BellCS inequality and alications Comle amlitudes? Future QISC CQI CQT CQCT Comuter, intermediate models: boson samling Certification : encrytion, random generator, comutation 60
Introduction to Quantum Computing
Introduction to Quantum Computing Frédéric Magniez LIAFA & PCQC, Université Paris Diderot The genesis 2 Copenhagen School (Bohr, Heisenberg, ) - The state of a quantum particule is only fixed after a measurement
Shor s algorithm and secret sharing
Shor s algorithm and secret sharing Libor Nentvich: QC 23 April 2007: Shor s algorithm and secret sharing 1/41 Goals: 1 To explain why the factoring is important. 2 To describe the oldest and most successful
Introduction to Quantum Computing
Introduction to Quantum Computing Javier Enciso [email protected] Joint Advanced Student School 009 Technische Universität München April, 009 Abstract In this paper, a gentle introduction to Quantum Computing
Quantum Computing. Robert Sizemore
Quantum Computing Robert Sizemore Outline Introduction: What is quantum computing? What use is quantum computing? Overview of Quantum Systems Dirac notation & wave functions Two level systems Classical
Open Problems in Quantum Information Processing. John Watrous Department of Computer Science University of Calgary
Open Problems in Quantum Information Processing John Watrous Department of Computer Science University of Calgary #1 Open Problem Find new quantum algorithms. Existing algorithms: Shor s Algorithm (+ extensions)
Introduction to NP-Completeness Written and copyright c by Jie Wang 1
91.502 Foundations of Comuter Science 1 Introduction to Written and coyright c by Jie Wang 1 We use time-bounded (deterministic and nondeterministic) Turing machines to study comutational comlexity of
Factoring by Quantum Computers
Factoring by Quantum Computers Ragesh Jaiswal University of California, San Diego A Quantum computer is a device that uses uantum phenomenon to perform a computation. A classical system follows a single
6.042/18.062J Mathematics for Computer Science December 12, 2006 Tom Leighton and Ronitt Rubinfeld. Random Walks
6.042/8.062J Mathematics for Comuter Science December 2, 2006 Tom Leighton and Ronitt Rubinfeld Lecture Notes Random Walks Gambler s Ruin Today we re going to talk about one-dimensional random walks. In
Quantum Computing Lecture 7. Quantum Factoring. Anuj Dawar
Quantum Computing Lecture 7 Quantum Factoring Anuj Dawar Quantum Factoring A polynomial time quantum algorithm for factoring numbers was published by Peter Shor in 1994. polynomial time here means that
FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES
Document: MRM-1004-GAPCFR11 (0005) Page: 1 / 18 FDA CFR PART 11 ELECTRONIC RECORDS, ELECTRONIC SIGNATURES AUDIT TRAIL ECO # Version Change Descrition MATRIX- 449 A Ga Analysis after adding controlled documents
Quantum Computing Architectures
Quantum Computing Architectures 1:-2: Fred Chong (UCD) - Intro, quantum algorithms, and error correction 2:-2:3 Break and discussion 2:3-3:3 Ike Chuang (MIT) - Device technology and implementation issues
QUANTUM COMPUTERS AND CRYPTOGRAPHY. Mark Zhandry Stanford University
QUANTUM COMPUTERS AND CRYPTOGRAPHY Mark Zhandry Stanford University Classical Encryption pk m c = E(pk,m) sk m = D(sk,c) m??? Quantum Computing Attack pk m aka Post-quantum Crypto c = E(pk,m) sk m = D(sk,c)
Safety evaluation of digital post-release environment sensor data interface for distributed fuzing systems
Safety evaluation of digital ost-release environment sensor data interface for distributed fuzing systems 57 th Fuze Conference, Newark, NJ Wednesday, July 30 th, 2014 Oen Session IIIA, 3:20 PM S. Ebenhöch,
Lecture 13: Factoring Integers
CS 880: Quantum Information Processing 0/4/0 Lecture 3: Factoring Integers Instructor: Dieter van Melkebeek Scribe: Mark Wellons In this lecture, we review order finding and use this to develop a method
Quantum Computing: Lecture Notes. Ronald de Wolf
Quantum Computing: Lecture Notes Ronald de Wolf Preface These lecture notes were formed in small chunks during my Quantum computing course at the University of Amsterdam, Feb-May 2011, and compiled into
Multistage Human Resource Allocation for Software Development by Multiobjective Genetic Algorithm
The Oen Alied Mathematics Journal, 2008, 2, 95-03 95 Oen Access Multistage Human Resource Allocation for Software Develoment by Multiobjective Genetic Algorithm Feng Wen a,b and Chi-Ming Lin*,a,c a Graduate
A Probabilistic Quantum Key Transfer Protocol
A Probabilistic Quantum Key Transfer Protocol Abhishek Parakh Nebraska University Center for Information Assurance University of Nebraska at Omaha Omaha, NE 6818 Email: [email protected] August 9, 01
Point Location. Preprocess a planar, polygonal subdivision for point location queries. p = (18, 11)
Point Location Prerocess a lanar, olygonal subdivision for oint location ueries. = (18, 11) Inut is a subdivision S of comlexity n, say, number of edges. uild a data structure on S so that for a uery oint
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS
ENFORCING SAFETY PROPERTIES IN WEB APPLICATIONS USING PETRI NETS Liviu Grigore Comuter Science Deartment University of Illinois at Chicago Chicago, IL, 60607 [email protected] Ugo Buy Comuter Science
0.1 Phase Estimation Technique
Phase Estimation In this lecture we will describe Kitaev s phase estimation algorithm, and use it to obtain an alternate derivation of a quantum factoring algorithm We will also use this technique to design
United Arab Emirates University College of Sciences Department of Mathematical Sciences HOMEWORK 1 SOLUTION. Section 10.1 Vectors in the Plane
United Arab Emirates University College of Sciences Deartment of Mathematical Sciences HOMEWORK 1 SOLUTION Section 10.1 Vectors in the Plane Calculus II for Engineering MATH 110 SECTION 0 CRN 510 :00 :00
Assignment 9; Due Friday, March 17
Assignment 9; Due Friday, March 17 24.4b: A icture of this set is shown below. Note that the set only contains oints on the lines; internal oints are missing. Below are choices for U and V. Notice that
Keywords Quantum logic gates, Quantum computing, Logic gate, Quantum computer
Volume 3 Issue 10 October 2013 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Introduction
One-Chip Linear Control IPS, F5106H
One-Chi Linear Control IPS, F5106H NAKAGAWA Sho OE Takatoshi IWAMOTO Motomitsu ABSTRACT In the fi eld of vehicle electrical comonents, the increasing demands for miniaturization, reliability imrovement
Quantum Computers vs. Computers Security. @veorq http://aumasson.jp
Quantum Computers vs. Computers Security @veorq http://aumasson.jp Schrodinger equation Entanglement Bell states EPR pairs Wave functions Uncertainty principle Tensor products Unitary matrices Hilbert
COMPSCI 111/111G. Quantum Computing. Term 1, 2015. Prepared using LATEX Beamer by Cristian S.Calude 1 / 26
COMPSCI 111/111G Quantum Computing Prepared using LATEX Beamer by Cristian S.Calude Term 1, 2015 1 / 26 Classical vs. Quantum Computers Quantum computing was first introduced by Yuri Manin in 1980 and
arxiv:quant-ph/9809016 v2 19 Jan 2000
An Introduction to Quantum Computing for Non-Physicists arxiv:quant-ph/9809016 v 19 Jan 000 Eleanor Rieffel FX Palo Alto Labratory and Wolfgang Polak Consultant FX Palo Alto Laboratory, 3400 Hillview Avenue,
Quantum Computing and Grover s Algorithm
Quantum Computing and Grover s Algorithm Matthew Hayward January 14, 2015 1 Contents 1 Motivation for Study of Quantum Computing 3 1.1 A Killer App for Quantum Computing.............. 3 2 The Quantum Computer
The New Approach of Quantum Cryptography in Network Security
The New Approach of Quantum Cryptography in Network Security Avanindra Kumar Lal 1, Anju Rani 2, Dr. Shalini Sharma 3 (Avanindra kumar) Abstract There are multiple encryption techniques at present time
Quantum computing in practice
Quantum computing in practice & applications to cryptography Renaud Lifchitz OPPIDA NoSuchCon, November 19-21, 2014 Renaud Lifchitz NoSuchCon, November 19-21, 2014 1 / 68 Speaker s bio French senior security
More Properties of Limits: Order of Operations
math 30 day 5: calculating its 6 More Proerties of Limits: Order of Oerations THEOREM 45 (Order of Oerations, Continued) Assume that!a f () L and that m and n are ositive integers Then 5 (Power)!a [ f
1 Gambler s Ruin Problem
Coyright c 2009 by Karl Sigman 1 Gambler s Ruin Problem Let N 2 be an integer and let 1 i N 1. Consider a gambler who starts with an initial fortune of $i and then on each successive gamble either wins
Stat 134 Fall 2011: Gambler s ruin
Stat 134 Fall 2011: Gambler s ruin Michael Lugo Setember 12, 2011 In class today I talked about the roblem of gambler s ruin but there wasn t enough time to do it roerly. I fear I may have confused some
SECTION 6: FIBER BUNDLES
SECTION 6: FIBER BUNDLES In this section we will introduce the interesting class o ibrations given by iber bundles. Fiber bundles lay an imortant role in many geometric contexts. For examle, the Grassmaniann
SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q. 1. Quadratic Extensions
SOME PROPERTIES OF EXTENSIONS OF SMALL DEGREE OVER Q TREVOR ARNOLD Abstract This aer demonstrates a few characteristics of finite extensions of small degree over the rational numbers Q It comrises attemts
230483 - QOT - Quantum Optical Technologies
Coordinating unit: Teaching unit: Academic year: Degree: ECTS credits: 2015 230 - ETSETB - Barcelona School of Telecommunications Engineering 739 - TSC - Department of Signal Theory and Communications
Memory management. Chapter 4: Memory Management. Memory hierarchy. In an ideal world. Basic memory management. Fixed partitions: multiple programs
Memory management Chater : Memory Management Part : Mechanisms for Managing Memory asic management Swaing Virtual Page relacement algorithms Modeling age relacement algorithms Design issues for aging systems
What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm
What Has Quantum Mechanics to Do With Factoring? Things I wish they had told me about Peter Shor s algorithm 1 Question: What has quantum mechanics to do with factoring? Answer: Nothing! 2 Question: What
Quantum Key Distribution as a Next-Generation Cryptographic Protocol. Andrew Campbell
Quantum Key Distribution as a Next-Generation Cryptographic Protocol Andrew Campbell Abstract Promising advances in the field of quantum computing indicate a growing threat to cryptographic protocols based
How To Solve An Npa-Complete Problems With Quantum Computing And Chaotic Dynamics
CDMTCS Research Report Series A New Quantum Algorithm for NP-complete Problems Masanori Ohya Igor V. Volovich Science University of Tokyo Steklov Mathematical Institute CDMTCS-194 September 00 Centre for
Enhanced Security Key Management Scheme for MANETS
Enhanced Security Key Management Scheme for MANETS EDNA ELIZABETH.N, SUBASREE.S, and S.RADHA Electronics and Communication Engineering Deartment Sri Sivasubramaniya Nadar College of Engineering Kalavakkam,
QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION
Arun K. Pati Theoretical Physics Division QUANTUM INFORMATION, COMPUTATION AND FUNDAMENTAL LIMITATION Introduction Quantum information theory is a marriage between two scientific pillars of the twentieth
Quantum Algorithms Lecture Notes Summer School on Theory and Technology in Quantum Information, Communication, Computation and Cryptography
Quantum Algorithms Lecture Notes Summer School on Theory and Technology in Quantum Information, Communication, Computation and Cryptography Julia Kempe CNRS & LRI, Université de Paris-Sud 9405 Orsay, France
Sage Timberline Office
Sage Timberline Office Get Started Document Management 9.8 NOTICE This document and the Sage Timberline Office software may be used only in accordance with the accomanying Sage Timberline Office End User
Breaking The Code. Ryan Lowe. Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and
Breaking The Code Ryan Lowe Ryan Lowe is currently a Ball State senior with a double major in Computer Science and Mathematics and a minor in Applied Physics. As a sophomore, he took an independent study
Stochastic Derivation of an Integral Equation for Probability Generating Functions
Journal of Informatics and Mathematical Sciences Volume 5 (2013), Number 3,. 157 163 RGN Publications htt://www.rgnublications.com Stochastic Derivation of an Integral Equation for Probability Generating
An important observation in supply chain management, known as the bullwhip effect,
Quantifying the Bullwhi Effect in a Simle Suly Chain: The Imact of Forecasting, Lead Times, and Information Frank Chen Zvi Drezner Jennifer K. Ryan David Simchi-Levi Decision Sciences Deartment, National
Quantum Computers. And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015. Quantum Computers
Quantum Computers And How Does Nature Compute? Kenneth W. Regan 1 University at Buffalo (SUNY) 21 May, 2015 1 Includes joint work with Amlan Chakrabarti, U. Calcutta If you were designing Nature, how would
Lecture 1 Version: 14/08/28. Frontiers of Condensed Matter San Sebastian, Aug. 28-30, 2014. Dr. Leo DiCarlo [email protected] dicarlolab.tudelft.
Introduction to quantum computing (with superconducting circuits) Lecture 1 Version: 14/08/28 Frontiers of Condensed Matter San Sebastian, Aug. 28-30, 2014 Dr. Leo DiCarlo [email protected] dicarlolab.tudelft.nl
CSI:FLORIDA. Section 4.4: Logistic Regression
SI:FLORIDA Section 4.4: Logistic Regression SI:FLORIDA Reisit Masked lass Problem.5.5 2 -.5 - -.5 -.5 - -.5.5.5 We can generalize this roblem to two class roblem as well! SI:FLORIDA Reisit Masked lass
24 th IEEE Annual Computer Communications Workshop (CCW)
24 th IEEE Annual Computer Communications Workshop (CCW) Exploration of Quantum Cryptography in Network Security Presented by Mehrdad S. Sharbaf Sharbaf & Associates Loyola Marymount University California
Bits Superposition Quantum Parallelism
7-Qubit Quantum Computer Typical Ion Oscillations in a Trap Bits Qubits vs Each qubit can represent both a or at the same time! This phenomenon is known as Superposition. It leads to Quantum Parallelism
Local Connectivity Tests to Identify Wormholes in Wireless Networks
Local Connectivity Tests to Identify Wormholes in Wireless Networks Xiaomeng Ban Comuter Science Stony Brook University [email protected] Rik Sarkar Comuter Science Freie Universität Berlin [email protected]
A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing
A Recent Improvements in Quantum Model and Counter Measures in Quantum Computing J.Senthil Murugan 1, V.Parthasarathy 2, S.Sathya 3, M.Anand 4 Assistant Professor, VelTech HighTech Dr.Rangarajan Dr.Sakunthala
Basic Algorithms In Computer Algebra
Basic Algorithms In Computer Algebra Kaiserslautern SS 2011 Prof. Dr. Wolfram Decker 2. Mai 2011 References Cohen, H.: A Course in Computational Algebraic Number Theory. Springer, 1993. Cox, D.; Little,
Application of Quantum Cryptography to an Eavesdropping Detectable Data Transmission
Title Application of Quantum Cryptography Detectable Data Transmission Author(s) Kudo, Takamitsu; Usuda, Tsuyoshi Sa Masayasu IEICE Transactions on Fundamentals Citation Communications and Computer Science
Coin ToGa: A Coin-Tossing Game
Coin ToGa: A Coin-Tossing Game Osvaldo Marrero and Paul C Pasles Osvaldo Marrero OsvaldoMarrero@villanovaedu studied mathematics at the University of Miami, and biometry and statistics at Yale University
CIS 6930 Emerging Topics in Network Security. Topic 2. Network Security Primitives
CIS 6930 Emerging Topics in Network Security Topic 2. Network Security Primitives 1 Outline Absolute basics Encryption/Decryption; Digital signatures; D-H key exchange; Hash functions; Application of hash
Load Balancing Mechanism in Agent-based Grid
Communications on Advanced Comutational Science with Alications 2016 No. 1 (2016) 57-62 Available online at www.isacs.com/cacsa Volume 2016, Issue 1, Year 2016 Article ID cacsa-00042, 6 Pages doi:10.5899/2016/cacsa-00042
The Online Freeze-tag Problem
The Online Freeze-tag Problem Mikael Hammar, Bengt J. Nilsson, and Mia Persson Atus Technologies AB, IDEON, SE-3 70 Lund, Sweden [email protected] School of Technology and Society, Malmö University,
Web Application Scalability: A Model-Based Approach
Coyright 24, Software Engineering Research and Performance Engineering Services. All rights reserved. Web Alication Scalability: A Model-Based Aroach Lloyd G. Williams, Ph.D. Software Engineering Research
"in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it
1 2 "in recognition of the services he rendered to the advancement of Physics by his discovery of energy quanta". h is the Planck constant he called it the quantum of action 3 Newton believed in the corpuscular
Elements of Applied Cryptography Public key encryption
Network Security Elements of Applied Cryptography Public key encryption Public key cryptosystem RSA and the factorization problem RSA in practice Other asymmetric ciphers Asymmetric Encryption Scheme Let
PRIME NUMBERS AND THE RIEMANN HYPOTHESIS
PRIME NUMBERS AND THE RIEMANN HYPOTHESIS CARL ERICKSON This minicourse has two main goals. The first is to carefully define the Riemann zeta function and exlain how it is connected with the rime numbers.
Synopsys RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Development FRANCE
RURAL ELECTRICATION PLANNING SOFTWARE (LAPER) Rainer Fronius Marc Gratton Electricité de France Research and Develoment FRANCE Synosys There is no doubt left about the benefit of electrication and subsequently
arxiv:quant-ph/9508027v2 25 Jan 1996
Polynomial-Time Algorithms for Prime Factorization and Discrete Logarithms on a Quantum Computer arxiv:quant-ph/9508027v2 25 Jan 1996 Peter W. Shor Abstract A digital computer is generally believed to
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Public Key Cryptogrophy 1 Roadmap Introduction RSA Diffie-Hellman Key Exchange Public key and
A Simple Model of Pricing, Markups and Market. Power Under Demand Fluctuations
A Simle Model of Pricing, Markus and Market Power Under Demand Fluctuations Stanley S. Reynolds Deartment of Economics; University of Arizona; Tucson, AZ 85721 Bart J. Wilson Economic Science Laboratory;
X How to Schedule a Cascade in an Arbitrary Graph
X How to Schedule a Cascade in an Arbitrary Grah Flavio Chierichetti, Cornell University Jon Kleinberg, Cornell University Alessandro Panconesi, Saienza University When individuals in a social network
Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range
THEORY OF COMPUTING, Volume 1 (2005), pp. 37 46 http://theoryofcomputing.org Polynomial Degree and Lower Bounds in Quantum Complexity: Collision and Element Distinctness with Small Range Andris Ambainis
A Certification Authority for Elliptic Curve X.509v3 Certificates
A Certification Authority for Ellitic Curve X509v3 Certificates Maria-Dolores Cano, Ruben Toledo-Valera, Fernando Cerdan Det of Information Technologies & Communications Technical University of Cartagena
Machine Learning with Operational Costs
Journal of Machine Learning Research 14 (2013) 1989-2028 Submitted 12/11; Revised 8/12; Published 7/13 Machine Learning with Oerational Costs Theja Tulabandhula Deartment of Electrical Engineering and
Sage HRMS I Planning Guide. The Complete Buyer s Guide for Payroll Software
I Planning Guide The Comlete Buyer s Guide for Payroll Software Table of Contents Introduction... 1 Recent Payroll Trends... 2 Payroll Automation With Emloyee Self-Service... 2 Analyzing Your Current Payroll
Quantum Computability and Complexity and the Limits of Quantum Computation
Quantum Computability and Complexity and the Limits of Quantum Computation Eric Benjamin, Kenny Huang, Amir Kamil, Jimmy Kittiyachavalit University of California, Berkeley December 7, 2003 This paper will
Sage Document Management. User's Guide Version 13.1
Sage Document Management User's Guide Version 13.1 This is a ublication of Sage Software, Inc. Version 13.1 Last udated: June 19, 2013 Coyright 2013. Sage Software, Inc. All rights reserved. Sage, the
The impact of metadata implementation on webpage visibility in search engine results (Part II) q
Information Processing and Management 41 (2005) 691 715 www.elsevier.com/locate/inforoman The imact of metadata imlementation on webage visibility in search engine results (Part II) q Jin Zhang *, Alexandra
1 Message Authentication
Theoretical Foundations of Cryptography Lecture Georgia Tech, Spring 200 Message Authentication Message Authentication Instructor: Chris Peikert Scribe: Daniel Dadush We start with some simple questions
A New Generic Digital Signature Algorithm
Groups Complex. Cryptol.? (????), 1 16 DOI 10.1515/GCC.????.??? de Gruyter???? A New Generic Digital Signature Algorithm Jennifer Seberry, Vinhbuu To and Dongvu Tonien Abstract. In this paper, we study
As we have seen, there is a close connection between Legendre symbols of the form
Gauss Sums As we have seen, there is a close connection between Legendre symbols of the form 3 and cube roots of unity. Secifically, if is a rimitive cube root of unity, then 2 ± i 3 and hence 2 2 3 In
A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
9 th ASCE Secialty Conference on Probabilistic Mechanics and Structural Reliability PMC2004 Abstract A MOST PROBABLE POINT-BASED METHOD FOR RELIABILITY ANALYSIS, SENSITIVITY ANALYSIS AND DESIGN OPTIMIZATION
Sage Document Management. User's Guide Version 12.1
Sage Document Management User's Guide Version 12.1 NOTICE This is a ublication of Sage Software, Inc. Version 12.1. November, 2012 Coyright 2012. Sage Software, Inc. All rights reserved. Sage, the Sage
Complex Conjugation and Polynomial Factorization
Comlex Conjugation and Polynomial Factorization Dave L. Renfro Summer 2004 Central Michigan University I. The Remainder Theorem Let P (x) be a olynomial with comlex coe cients 1 and r be a comlex number.
