SlideShare a Scribd company logo
1 of 162
Introduction to
Quantum
Computing
Giannicola Scarpa
Facultad de Matemáticas UCM
Overview
Part I: What is Quantum
Computing?
• Qubits, quantum operations,
measurements
Part II: Are quantum computers
more powerful?
• Simple example, main algorithms,
complexity classes
Part III: Some quantum
cryptography
• Non-locality (certified randomness),
quantum key distribution,
quantum position verification
Part I:
What is Quantum
Computation?
Computation powered by
Schrödinger's cat
Computation powered by
Schrödinger's cat
Some History
• First quantum paper: Max Planck, 1900
• The field developed strongly during the 1920s
• A Turing Machine (1936) is a classical object
• 1980s: Quantum Computing “updates” the model
to the latest physics
• Uses some non-intuitive concepts:
Superposition, collapse of the wave function,
interference, entanglement, no-cloning...
• You will know about all of these in a hour or so.
Classical bit
Classical bit
• Quantity that is either 0 or 1
Classical bit
• Quantity that is either 0 or 1
Classical bit
• Quantity that is either 0 or 1
Classical bit
• Quantity that is either 0 or 1
Quantum bit
Quantum bit
Quantum bit
10
Quantum bit
• Associate 0 and 1 with orthogonal vectors:
0 =
1
0
1 =
0
1
• Quantum bit is a superposition:
𝛼 𝑜 0 + 𝛼1 1 =
𝛼0
𝛼1
• Unit vector in ℂ2: 𝛼0
2 + 𝛼1
2 = 1
Wait, you’re cheating!
Wait, you’re cheating!
𝛼 𝑜 0 + 𝛼1 1
Wait, you’re cheating!
𝛼 𝑜 0 + 𝛼1 1
0.0001000101011101100110011…..
Wait, you’re cheating!
𝛼 𝑜 0 + ( 1− ) 1
Wait, you’re cheating!
𝛼 𝑜 0 + ( 1− ) 1
• Valid unit vector, because 𝛼0
2
+ 𝛼1
2
= 1
Wait, you’re cheating!
𝛼 𝑜 0 + ( 1− ) 1
• Valid unit vector, because 𝛼0
2
+ 𝛼1
2
= 1
• Where’s the catch here?
Measurement
0
Measurement
0
• Measurement collapses the qubit
• Observe 0 with probability 𝛼0
2
• Observe 1 with probability 𝛼1
2
• QC is the art of using this hidden information
Operations on classical bits
• What can we do with one bit?
• Either we leave it alone, or we flip it! (NOT gate)
• What can we do with many bits?
• Many things, but AND, OR, NOT are a sufficient set of
gates to represent any function as a circuit.
Operations on one qubit
• Quantum mechanics allows to do linear operations
on qubits before observing them
• Norm-preserving matrices in ℂ2×2
:
𝑈
𝛼0
𝛼1
=
𝛼0
′
𝛼1
′ such that 𝛼0
′ 2 + 𝛼1
′ 2 = 1
• NOT gate: 𝑋 =
0 1
1 0
0 1
1 0
𝛼0
𝛼1
=
𝛼1
𝛼0
• Hadamard gate: 𝐻 =
1
2
1 1
1 −1
Hadamard gate
𝐻 =
1
2
1 1
1 −1
Hadamard gate
𝐻 =
1
2
1 1
1 −1
𝐻 0 =
1
2
1 1
1 −1
1
0
=
1
2
1
1
=
1
2
( 0 + |1⟩): = |+⟩
Hadamard gate
𝐻 =
1
2
1 1
1 −1
𝐻 0 =
1
2
1 1
1 −1
1
0
=
1
2
1
1
=
1
2
( 0 + |1⟩): = |+⟩
Hadamard gate
𝐻 =
1
2
1 1
1 −1
𝐻 0 =
1
2
1 1
1 −1
1
0
=
1
2
1
1
=
1
2
( 0 + |1⟩): = |+⟩
Hadamard gate
𝐻 =
1
2
1 1
1 −1
𝐻 0 =
1
2
1 1
1 −1
1
0
=
1
2
1
1
=
1
2
( 0 + |1⟩): = |+⟩
Hadamard gate
𝐻 =
1
2
1 1
1 −1
𝐻 0 =
1
2
1 1
1 −1
1
0
=
1
2
1
1
=
1
2
( 0 + |1⟩): = |+⟩
Hadamard gate
𝐻 =
1
2
1 1
1 −1
𝐻 0 =
1
2
1 1
1 −1
1
0
=
1
2
1
1
=
1
2
( 0 + |1⟩): = |+⟩
𝐻 1 =
1
2
1 1
1 −1
0
1
=
1
2
1
−1
=
1
2
( 0 − |1⟩): = |−⟩
Hadamard gate
𝐻 =
1
2
1 1
1 −1
𝐻 0 =
1
2
1 1
1 −1
1
0
=
1
2
1
1
=
1
2
( 0 + |1⟩): = |+⟩
𝐻 1 =
1
2
1 1
1 −1
0
1
=
1
2
1
−1
=
1
2
( 0 − |1⟩): = |−⟩
Hadamard gate
𝐻 =
1
2
1 1
1 −1
𝐻 0 =
1
2
1 1
1 −1
1
0
=
1
2
1
1
=
1
2
( 0 + |1⟩): = |+⟩
𝐻 1 =
1
2
1 1
1 −1
0
1
=
1
2
1
−1
=
1
2
( 0 − |1⟩): = |−⟩
Hadamard gate
𝐻 =
1
2
1 1
1 −1
𝐻 0 =
1
2
1 1
1 −1
1
0
=
1
2
1
1
=
1
2
( 0 + |1⟩): = |+⟩
𝐻 1 =
1
2
1 1
1 −1
0
1
=
1
2
1
−1
=
1
2
( 0 − |1⟩): = |−⟩
Hadamard gate
𝐻 =
1
2
1 1
1 −1
𝐻 0 =
1
2
1 1
1 −1
1
0
=
1
2
1
1
=
1
2
( 0 + |1⟩): = |+⟩
𝐻 1 =
1
2
1 1
1 −1
0
1
=
1
2
1
−1
=
1
2
( 0 − |1⟩): = |−⟩
Hadamard gate
𝐻 =
1
2
1 1
1 −1
𝐻 0 =
1
2
1 1
1 −1
1
0
=
1
2
1
1
=
1
2
( 0 + |1⟩): = |+⟩
𝐻 1 =
1
2
1 1
1 −1
0
1
=
1
2
1
−1
=
1
2
( 0 − |1⟩): = |−⟩
Are these two states distinguishable?
Distinguishing |+⟩ from |−⟩
1
2
( 0 + |1⟩) vs
1
2
( 0 − |1⟩)
• Let us try then to apply Hadamard again!
𝐻
1
2
( 0 + |1⟩) =
1
2
(𝐻 0 + 𝐻|1⟩) = |0⟩
𝐻
1
2
( 0 − |1⟩) =
1
2
(𝐻 0 − 𝐻|1⟩) = |1⟩
INTERFERENCE!
Distinguishing |+⟩ from |−⟩
1
2
( 0 + |1⟩) vs
1
2
( 0 − |1⟩)
• Let us try then to apply Hadamard again!
𝐻
1
2
( 0 + |1⟩) =
1
2
(𝐻 0 + 𝐻|1⟩) = |0⟩
𝐻
1
2
( 0 − |1⟩) =
1
2
(𝐻 0 − 𝐻|1⟩) = |1⟩
INTERFERENCE!
Distinguishing |+⟩ from |−⟩
1
2
( 0 + |1⟩) vs
1
2
( 0 − |1⟩)
• Let us try then to apply Hadamard again!
𝐻
1
2
( 0 + |1⟩) =
1
2
(𝐻 0 + 𝐻|1⟩) = |0⟩
𝐻
1
2
( 0 − |1⟩) =
1
2
(𝐻 0 − 𝐻|1⟩) = |1⟩
INTERFERENCE!
Distinguishing |+⟩ from |−⟩
1
2
( 0 + |1⟩) vs
1
2
( 0 − |1⟩)
• Let us try then to apply Hadamard again!
𝐻
1
2
( 0 + |1⟩) =
1
2
(𝐻 0 + 𝐻|1⟩) = |0⟩
𝐻
1
2
( 0 − |1⟩) =
1
2
(𝐻 0 − 𝐻|1⟩) = |1⟩
INTERFERENCE!
More qubits
• How to model n qubits?
• Unit vector in larger space (dimension 2 𝑛)
• Norm-preserving operations and measurements in
this exponentially large space
• This is why QC is expensive to simulate on classical
computers “in the obvious way”.
𝛼00 00 + 𝛼01 01 + 𝛼10 10 +𝛼11 11
Quantum circuit model
Part II:
Are Quantum Computers
more powerful?
Computing Parity
• Parity function:
𝑓 𝑥0, 𝑥1 = 𝑥0 𝑋𝑂𝑅 𝑥1
• Query complexity: count the number of
times we need to access the memory.
• In the classical case: 2 queries needed.
• Why? After we read the first bit, the function
value is unknown: 𝑓 𝑥0, 𝑥1 = 0 ⇔ 𝑥0 = 𝑥1
𝑓 0,0 = 0
𝑓 0,1 = 1
𝑓 1,0 = 1
𝑓 1,1 = 0
Computing parity with quantum
Computing parity with quantum
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
Computing parity with quantum
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩
Computing parity with quantum
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩ H
Computing parity with quantum
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩ H O
Computing parity with quantum
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩ H O H
Computing parity with quantum
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩ H O H
Computing parity with quantum
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩ H O H
𝑥0 = 0
𝑥1 = 0
Computing parity with quantum
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩ H O H
𝑥0 = 0
𝑥1 = 0
1
2
( 0 + |1⟩)
Computing parity with quantum
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩ H O H
𝑥0 = 0
𝑥1 = 0
1
2
( 0 + |1⟩)
1
2
( 0 + |1⟩)
Computing parity with quantum
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩ H O H
𝑥0 = 0
𝑥1 = 0
1
2
( 0 + |1⟩)
1
2
( 0 + |1⟩) |0⟩
Computing parity with quantum
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩ H O H
𝑥0 = 0
𝑥1 = 1
Computing parity with quantum
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩ H O H
𝑥0 = 0
𝑥1 = 1
1
2
( 0 + |1⟩)
Computing parity with quantum
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩ H O H
𝑥0 = 0
𝑥1 = 1
1
2
( 0 + |1⟩)
1
2
( 0 − |1⟩)
Computing parity with quantum
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩ H O H
𝑥0 = 0
𝑥1 = 1
1
2
( 0 + |1⟩)
1
2
( 0 − |1⟩) |1⟩
Wait a second, you’re cheating!
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩ H O H
𝑥0 = 0
𝑥1 = 1
1
2
( 0 + |1⟩)
1
2
( 0 − |1⟩) |1⟩
Yeah, what about THIS???
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩ H O H
𝑥0 = 0
𝑥1 = 1
1
2
( 0 + |1⟩)
1
2
( 0 − |1⟩) |1⟩
Well, fair enough. Please continue.
• A quantum query has the form
𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
• As a circuit, we compute parity:
|0⟩ H O H
𝑥0 = 0
𝑥1 = 1
1
2
( 0 + |1⟩)
1
2
( 0 − |1⟩) |1⟩
Quantum parallelism
• Quantum computers are able to calculate an
exponential number of computations at once.
• Any classical program can be encoded in a quantum
circuit 𝐶 that maps 𝑥 0 ↦ 𝑥 |𝑓 𝑥 ⟩
• Many inputs cane be given in superposition:
𝐶
𝑥
𝛼 𝑥 𝑥 |0⟩ =
𝑥
𝛼 𝑥 𝑥 |𝑓(𝑥)⟩
• Problem: measure collapses to a random 𝑥, 𝑓 𝑥 …
Quantum parallelism
• Quantum computers are able to calculate an
exponential number of computations at once.
• Any classical program can be encoded in a quantum
circuit 𝐶 that maps 𝑥 0 ↦ 𝑥 |𝑓 𝑥 ⟩
• Many inputs cane be given in superposition:
𝐶
𝑥
𝛼 𝑥 𝑥 |0⟩ =
𝑥
𝛼 𝑥 𝑥 |𝑓(𝑥)⟩
• Problem: measure collapses to a random 𝑥, 𝑓 𝑥 …
• Again: QC is the art of using this hidden information
Recipe for a quantum algorithm
1. Put the input in superposition
2. Apply a circuit 𝐶 to everything
3. Do something clever to put more “weight” on the
pairs 𝑥, 𝑓(𝑥) of interest
4. Repeat (2) and (3) a certain number of times
• (How many? Good luck figuring that out)
5. Measure and enjoy your output
Recipe for a quantum algorithm
1. Put the input in superposition
2. Apply a circuit 𝐶 to everything
3. Do something clever to put more “weight” on the
pairs 𝑥, 𝑓(𝑥) of interest
4. Repeat (2) and (3) a certain number of times
• (How many? Good luck figuring that out)
5. Measure and enjoy your output
H O H|0⟩
Famous quantum speedups
Deutsch-Jozsa (’92)
n/2 classical queries vs 1 quantum query
“Is this string constant or balanced?”
Famous quantum speedups
Deutsch-Jozsa (’92)
n/2 classical queries vs 1 quantum query
“Is this string constant or balanced?”
Grover’s search (’96)
𝑛 classical queries vs 𝑛 quantum queries
“Does this string contain a 1?”
Famous quantum speedups
Deutsch-Jozsa (’92)
n/2 classical queries vs 1 quantum query
“Is this string constant or balanced?”
Grover’s search (’96)
𝑛 classical queries vs 𝑛 quantum queries
“Does this string contain a 1?”
Shor’s Factoring (’94)
exp(𝑛) classical running time (best known!)
vs 𝑝𝑜𝑙𝑦(𝑛) quantum running time
“Find the prime factors of 𝑥”
Conjectured complexity classes
Change the Church-Turing thesis?
• Church-Turing thesis:
“A Turing machine can simulate all realistic
models of computation”
• Complexity-Theoretical Church-Turing thesis:
“A Turing machine can efficiently simulate all
realistic models of computation”
Change the Church-Turing thesis?
• Church-Turing thesis:
“A Turing machine can simulate all realistic
models of computation”
• Complexity-Theoretical Church-Turing thesis:
“A quantum Turing machine can efficiently
simulate all realistic models of computation”
Part III:
Some Quantum
Cryptograhy
Results in cryptography
Three previously impossible tasks that can be done
via simple manipulation of quantum information
1. Generation of certified randomness
2. Detection of a spy
3. Certification of GPS coordinates
Non-Locality
Can the microscopic have macroscopic
consequences?
• Non-Local game: challenge for collaborating but
non-communicating players
(like when the police cross-checks suspects)
• Bell inequality: upper bound on winning probability
• Quantum players can perform better than the
classical players: they violate the Bell inequality
• An implementation disproves classical physics
• (They have done it, classical physics is officially false)
CHSH game
CHSH game
𝑥 𝑦
CHSH game
𝑥 𝑦
𝑎 𝑏
CHSH game
𝑥 𝑦
𝑎 𝑏
The players win if
𝑎 ⊕ 𝑏 = 𝑥 ⋅ 𝑦
CHSH game
𝑥 𝑦
𝑎 𝑏
The players win if
𝑎 ⊕ 𝑏 = 𝑥 ⋅ 𝑦
Input Winning output
00 same thing
01 same thing
10 same thing
11 different things
⇔
CHSH game
𝑥 𝑦
𝑎 𝑏
The players win if
𝑎 ⊕ 𝑏 = 𝑥 ⋅ 𝑦
Input Winning output
00 same thing
01 same thing
10 same thing
11 different things
⇔ Pr 𝑤𝑖𝑛
≤ 0.75
How do quantum players play?
• We need some technical details…
Measurement in other bases
Measurement in other bases
1
0
Measurement in other bases
1
0
+
Measurement in other bases
1
0
+
1
2
1
2
Measurement in other bases
1
0
−
1
2
1
2
Measurement in other bases
−
0
+
1
2
1
2
Measurement in other bases
𝑎
0
𝑏
cos(𝛽)
cos(𝛼) α
𝛽
Entanglement
00 + |11⟩
2
Wait, how’s this different from
having two correlated coins?
00 + |11⟩
2
Wait, how’s this different from
having two correlated coins?
Wait, how’s this different from
having two correlated coins?
Wait, how’s this different from
having two correlated coins?
Wait, how’s this different from
having two correlated coins?
00 + |11⟩
2
00
00 + |11⟩
2𝑎
𝑏
𝑎
𝑎
𝑏
𝑎𝑎
𝑎
𝑎𝑎
𝑎
𝑏
𝑎
𝑎𝑎
𝑎
𝑏
But how does this happen?
CHSH quantum strategy
𝑥 𝑦
𝑎 𝑏
CHSH quantum strategy
𝑥 𝑦
𝑎 𝑏
00 + |11⟩
2
CHSH quantum strategy
𝑥 𝑦
𝑎 𝑏
00 + |11⟩
2
On input 0,1
CHSH quantum strategy
𝑥 𝑦
𝑎 𝑏
00 + |11⟩
2
On input 0,1
CHSH quantum strategy
They want: a ⊕ 𝑏 = 𝑥 ⋅ 𝑦
On input 0,1
0
0
1
1
0 0
1
1
On input 0,1
CHSH quantum strategy
They want: a ⊕ 𝑏 = 𝑥 ⋅ 𝑦
On input 0
0
1
0 0
1
1
On input 0,1
CHSH quantum strategy
They want: a ⊕ 𝑏 = 𝑥 ⋅ 𝑦
On input 0
0
1
0 0
1
1
On input 0,1
CHSH quantum strategy
They want: a ⊕ 𝑏 = 𝑥 ⋅ 𝑦
On input 0
0
1
0 0
1
1
On input 0,1
Pr 𝑤𝑖𝑛 = cos2
𝜋
8
≈ 0.85
CHSH quantum strategy
They want: a ⊕ 𝑏 = 𝑥 ⋅ 𝑦
On input 1
0
0
1
1
0
1
On input 0,1
Pr 𝑤𝑖𝑛 = cos2
𝜋
8
≈ 0.85
Bell inequality violation
• Classical players win with at most 75% probability
• Quantum players win with probability ~ 85% !
• This is the most famous Bell inequlity violation...
• but there are also unbounded ones!
• The CHSH game is used in protocols for
randomness certification
(e.g Vazirani-Vidick 2011)
Quantum key distribution [BB’84]
• Alice & Bob want to establish a secret key
• They communicate through a public quantum
channel
• They make use of the following 2 facts:
• No-cloning theorem: one cannot perfectly copy an
unknown quantum state.
• Information disturbance: if one does not know the
encoding basis, one cannot decode a qubit perfectly
without perturbing (collapsing) it.
No-cloning theorem
• There is no quantum operation such that, ∀ 𝑎
𝑈 𝑎 0 = 𝑎 |𝑎⟩
No-cloning theorem
• There is no quantum operation such that, ∀ 𝑎
𝑈 𝑎 0 = 𝑎 |𝑎⟩
Proof
No-cloning theorem
• There is no quantum operation such that, ∀ 𝑎
𝑈 𝑎 0 = 𝑎 |𝑎⟩
Proof
• Take two arbitrary states 𝑎 and 𝑏
No-cloning theorem
• There is no quantum operation such that, ∀ 𝑎
𝑈 𝑎 0 = 𝑎 |𝑎⟩
Proof
• Take two arbitrary states 𝑎 and 𝑏
• Then we must have (since 𝑈 is norm-preserving)
( 𝑎 |0⟩) 𝑇 𝑏 0
No-cloning theorem
• There is no quantum operation such that, ∀ 𝑎
𝑈 𝑎 0 = 𝑎 |𝑎⟩
Proof
• Take two arbitrary states 𝑎 and 𝑏
• Then we must have (since 𝑈 is norm-preserving)
( 𝑎 |0⟩) 𝑇 𝑏 0 = (𝑈 𝑎 0 )) 𝑇 𝑈( 𝑏 |0⟩)
No-cloning theorem
• There is no quantum operation such that, ∀ 𝑎
𝑈 𝑎 0 = 𝑎 |𝑎⟩
Proof
• Take two arbitrary states 𝑎 and 𝑏
• Then we must have (since 𝑈 is norm-preserving)
( 𝑎 |0⟩) 𝑇 𝑏 0 = (𝑈 𝑎 0 )) 𝑇 𝑈( 𝑏 |0⟩)
= ( 𝑎 |𝑎⟩) 𝑇 𝑏 𝑏
No-cloning theorem
• There is no quantum operation such that, ∀ 𝑎
𝑈 𝑎 0 = 𝑎 |𝑎⟩
Proof
• Take two arbitrary states 𝑎 and 𝑏
• Then we must have (since 𝑈 is norm-preserving)
( 𝑎 |0⟩) 𝑇 𝑏 0 = (𝑈 𝑎 0 )) 𝑇 𝑈( 𝑏 |0⟩)
= ( 𝑎 |𝑎⟩) 𝑇 𝑏 𝑏
• But this implies ( 𝑎 𝑇|𝑏⟩) = ( 𝑎 𝑇|𝑏⟩)2
No-cloning theorem
• There is no quantum operation such that, ∀ 𝑎
𝑈 𝑎 0 = 𝑎 |𝑎⟩
Proof
• Take two arbitrary states 𝑎 and 𝑏
• Then we must have (since 𝑈 is norm-preserving)
( 𝑎 |0⟩) 𝑇 𝑏 0 = (𝑈 𝑎 0 )) 𝑇 𝑈( 𝑏 |0⟩)
= ( 𝑎 |𝑎⟩) 𝑇 𝑏 𝑏
• But this implies ( 𝑎 𝑇|𝑏⟩) = ( 𝑎 𝑇|𝑏⟩)2
and this happens when 𝑎, 𝑏 are equal or orthogonal
Quantum Key distribution (part 1)
Quantum Key distribution (part 1)
Quantum Key distribution (part 1)
Random
string:
0111001101
Quantum Key distribution (part 1)
Random
string:
0111001101
Her random bases:
+x+xx++x+x
His random bases:
x++x++xx+x
Quantum Key distribution (part 1)
Random
string:
0111001101
Her random bases:
+x+xx++x+x
His random bases:
x++x++xx+x
ENCODE & SEND
Quantum Key distribution (part 1)
Random
string:
0111001101
Her random bases:
+x+xx++x+x
His random bases:
x++x++xx+x
ENCODE & SEND DECODE
1111000101
Quantum Key distribution (part 1)
Random
string:
0111001101
Her random bases:
+x+xx++x+x
His random bases:
x++x++xx+x
ENCODE & SEND DECODE
1111000101
Quantum Key distribution (part 2)
Random
string:
0111001101
+x+xx++x+x x++x++xx+x
ENCODE & SEND DECODE
1111000101
Over a public channel:
• Inform each other of the choice of bases
• Randomly test equality for half of the red positions
• (Spy detection - no-cloning, disturbance)
• If pass previous point, other half is the shared key!
Position verification
Position verification
Position verification
p
Position verification
p
Position verification
p
x y
Position verification
p
x y
x+y x+y
Position verification
p
Position verification
p
Blah blah
blah blah
Position verification
p
Blah blah
speed of light
Position verification
p
Blah blah 20
milliseconds
Position verification
p
She was at P! She was at P!
Position verification: attack
p
Position verification: attack
x y
Position verification: attack
p
x yx
y
Position verification: attack
p
x yx
y
x+y x+y
Position verification: attack
p
x y
x+y x+y
x
y
Position verification: attack
p
x y
x+y x+y
x
y
She was at P! She was at P!
Quantum position verification
p
Quantum position verification
p
Basis: × or +
Quantum position verification
p
Basis: × or + qubit
Quantum position verification
p
Basis: × or + qubit
outcome outcome
Quantum position verification
p
Basis: × or + qubit
outcome outcome
She was at P! She was at P!
Quantum position verification
p
Quantum position verification
p
qubitBasis: × or +
Quantum position verification
p
qubitBasis: × or +
Quantum position verification
p
qubitBasis: × or +
• No cloning theorem:
Bob cannot keep a copy of the
qubit.
Quantum position verification
p
qubitBasis: × or +
• No cloning theorem:
Bob cannot keep a copy of the
qubit.
• Information disturbance:
Bob cannot attempt to measure, as
he doesn’t know the basis!
Quantum position verification
p
qubitBasis: × or +
• No cloning theorem:
Bob cannot keep a copy of the
qubit.
• Information disturbance:
Bob cannot attempt to measure, as
he doesn’t know the basis!
But wait!!!
But wait!!!
p
But wait!!!
p
Open problem: actually prove
the security of this protocol!
[Buhrman et al, 2011]
What to bring home?
• Quantum computing is a model of computation
based on the latest physics
• You do not need deep knowledge of physics to work
with it!
• There are many tasks that do not require a full
quantum computer that are doable today
• QC’s full power is still unknown, but it looks like it
can give some meaningful speedups
• Proving quantum advantage is tricky.
• Careful about big advertisement claims!
FAQs
• Is quantum computing a reality now?
• Will we have a quantum computer in our pockets?
• Do quantum computers solve useful problems?
• Does entanglement allow for faster-than-light
communication? My cousin told me so.

More Related Content

What's hot

OS Process Synchronization, semaphore and Monitors
OS Process Synchronization, semaphore and MonitorsOS Process Synchronization, semaphore and Monitors
OS Process Synchronization, semaphore and Monitorssgpraju
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting PresentationTouhidul Fahim
 
Parallel sorting Algorithms
Parallel  sorting AlgorithmsParallel  sorting Algorithms
Parallel sorting AlgorithmsGARIMA SHAKYA
 
Physical and Logical Clocks
Physical and Logical ClocksPhysical and Logical Clocks
Physical and Logical ClocksDilum Bandara
 
Clock Synchronization (Distributed computing)
Clock Synchronization (Distributed computing)Clock Synchronization (Distributed computing)
Clock Synchronization (Distributed computing)Sri Prasanna
 
What is quantum computing
What is quantum computingWhat is quantum computing
What is quantum computingMariyum Khan
 
Quantum Computers_Superposition Interference Entanglement and Quantum Error C...
Quantum Computers_Superposition Interference Entanglement and Quantum Error C...Quantum Computers_Superposition Interference Entanglement and Quantum Error C...
Quantum Computers_Superposition Interference Entanglement and Quantum Error C...Professor Lili Saghafi
 
Online Shopping Agent in AI
Online Shopping Agent in AIOnline Shopping Agent in AI
Online Shopping Agent in AIFazle Rabbi Ador
 
8 queens problem using back tracking
8 queens problem using back tracking8 queens problem using back tracking
8 queens problem using back trackingTech_MX
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesAbdelkhalik Mosa
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network securitybabak danyal
 
Cisco packet tracer router
Cisco packet tracer  routerCisco packet tracer  router
Cisco packet tracer routerrishi ram khanal
 

What's hot (20)

OS Process Synchronization, semaphore and Monitors
OS Process Synchronization, semaphore and MonitorsOS Process Synchronization, semaphore and Monitors
OS Process Synchronization, semaphore and Monitors
 
Dhcp ppt
Dhcp pptDhcp ppt
Dhcp ppt
 
The structure of agents
The structure of agentsThe structure of agents
The structure of agents
 
Subnetting Presentation
Subnetting PresentationSubnetting Presentation
Subnetting Presentation
 
Parallel sorting Algorithms
Parallel  sorting AlgorithmsParallel  sorting Algorithms
Parallel sorting Algorithms
 
Physical and Logical Clocks
Physical and Logical ClocksPhysical and Logical Clocks
Physical and Logical Clocks
 
Ip address and subnetting
Ip address and subnettingIp address and subnetting
Ip address and subnetting
 
Clock Synchronization (Distributed computing)
Clock Synchronization (Distributed computing)Clock Synchronization (Distributed computing)
Clock Synchronization (Distributed computing)
 
What is quantum computing
What is quantum computingWhat is quantum computing
What is quantum computing
 
Quantum Computers_Superposition Interference Entanglement and Quantum Error C...
Quantum Computers_Superposition Interference Entanglement and Quantum Error C...Quantum Computers_Superposition Interference Entanglement and Quantum Error C...
Quantum Computers_Superposition Interference Entanglement and Quantum Error C...
 
Online Shopping Agent in AI
Online Shopping Agent in AIOnline Shopping Agent in AI
Online Shopping Agent in AI
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
8 queens problem using back tracking
8 queens problem using back tracking8 queens problem using back tracking
8 queens problem using back tracking
 
Cloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling TechnologiesCloud computing and Cloud Enabling Technologies
Cloud computing and Cloud Enabling Technologies
 
Greedy Algorihm
Greedy AlgorihmGreedy Algorihm
Greedy Algorihm
 
key distribution in network security
key distribution in network securitykey distribution in network security
key distribution in network security
 
Cisco packet tracer router
Cisco packet tracer  routerCisco packet tracer  router
Cisco packet tracer router
 
9_Network.ppt
9_Network.ppt9_Network.ppt
9_Network.ppt
 
Approximation Algorithms
Approximation AlgorithmsApproximation Algorithms
Approximation Algorithms
 

Similar to A short introduction to Quantum Computing and Quantum Cryptography

Quantum Computing Fundamentals via OO
Quantum Computing Fundamentals via OOQuantum Computing Fundamentals via OO
Quantum Computing Fundamentals via OOCarl Belle
 
HiPEAC'19 Tutorial on Quantum algorithms using QX - 2019-01-23
HiPEAC'19 Tutorial on Quantum algorithms using QX - 2019-01-23HiPEAC'19 Tutorial on Quantum algorithms using QX - 2019-01-23
HiPEAC'19 Tutorial on Quantum algorithms using QX - 2019-01-23Aritra Sarkar
 
Quantum Computing 101, Part 1 - Hello Quantum World
Quantum Computing 101, Part 1 - Hello Quantum WorldQuantum Computing 101, Part 1 - Hello Quantum World
Quantum Computing 101, Part 1 - Hello Quantum WorldAaronTurner9
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingNicolo Musmeci
 
Shor’s algorithm the ppt
Shor’s algorithm the pptShor’s algorithm the ppt
Shor’s algorithm the pptMrinal Mondal
 
Max flows via electrical flows (long talk)
Max flows via electrical flows (long talk)Max flows via electrical flows (long talk)
Max flows via electrical flows (long talk)Thatchaphol Saranurak
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.pptAbhayGill3
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.pptRaja Shekar
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.pptAjayRaj912848
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.pptraju980973
 
quantumComputers (1).ppt
quantumComputers (1).pptquantumComputers (1).ppt
quantumComputers (1).pptharithasahasra
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.pptTrushaKyada
 
quantumComputers.pptICICI-An HR perspective
quantumComputers.pptICICI-An HR perspectivequantumComputers.pptICICI-An HR perspective
quantumComputers.pptICICI-An HR perspectiveBenjinkumarNimmala
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.pptAdnan kHAN
 
hddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdh
hddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdhhddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdh
hddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdhzoobiarana76
 
Ahsan 10X Engineering Talk (Quantum Computing).pptx
Ahsan 10X Engineering Talk (Quantum Computing).pptxAhsan 10X Engineering Talk (Quantum Computing).pptx
Ahsan 10X Engineering Talk (Quantum Computing).pptxMuhammad Ahsan
 
Quantum Computation 101 (Almost)
Quantum Computation 101 (Almost)Quantum Computation 101 (Almost)
Quantum Computation 101 (Almost)Ping Sheng Kao
 

Similar to A short introduction to Quantum Computing and Quantum Cryptography (20)

Quantum Computing Fundamentals via OO
Quantum Computing Fundamentals via OOQuantum Computing Fundamentals via OO
Quantum Computing Fundamentals via OO
 
HiPEAC'19 Tutorial on Quantum algorithms using QX - 2019-01-23
HiPEAC'19 Tutorial on Quantum algorithms using QX - 2019-01-23HiPEAC'19 Tutorial on Quantum algorithms using QX - 2019-01-23
HiPEAC'19 Tutorial on Quantum algorithms using QX - 2019-01-23
 
Quantum Computing 101, Part 1 - Hello Quantum World
Quantum Computing 101, Part 1 - Hello Quantum WorldQuantum Computing 101, Part 1 - Hello Quantum World
Quantum Computing 101, Part 1 - Hello Quantum World
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
Quantum Computation For AI
Quantum Computation For AIQuantum Computation For AI
Quantum Computation For AI
 
Shor’s algorithm the ppt
Shor’s algorithm the pptShor’s algorithm the ppt
Shor’s algorithm the ppt
 
Max flows via electrical flows (long talk)
Max flows via electrical flows (long talk)Max flows via electrical flows (long talk)
Max flows via electrical flows (long talk)
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
quantumComputers (1).ppt
quantumComputers (1).pptquantumComputers (1).ppt
quantumComputers (1).ppt
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
quantumComputers.pptICICI-An HR perspective
quantumComputers.pptICICI-An HR perspectivequantumComputers.pptICICI-An HR perspective
quantumComputers.pptICICI-An HR perspective
 
quantumComputers.ppt
quantumComputers.pptquantumComputers.ppt
quantumComputers.ppt
 
hddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdh
hddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdhhddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdh
hddhdhdhdhdhdhdhdhdhddhddhdhdhdhddhdhdddhdhdh
 
Ahsan 10X Engineering Talk (Quantum Computing).pptx
Ahsan 10X Engineering Talk (Quantum Computing).pptxAhsan 10X Engineering Talk (Quantum Computing).pptx
Ahsan 10X Engineering Talk (Quantum Computing).pptx
 
Quantum Computation 101 (Almost)
Quantum Computation 101 (Almost)Quantum Computation 101 (Almost)
Quantum Computation 101 (Almost)
 

More from Facultad de Informática UCM

¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?Facultad de Informática UCM
 
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...Facultad de Informática UCM
 
DRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation ComputersDRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation ComputersFacultad de Informática UCM
 
Tendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura ArmTendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura ArmFacultad de Informática UCM
 
Introduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented ComputingIntroduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented ComputingFacultad de Informática UCM
 
Inteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuroInteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuroFacultad de Informática UCM
 
Design Automation Approaches for Real-Time Edge Computing for Science Applic...
 Design Automation Approaches for Real-Time Edge Computing for Science Applic... Design Automation Approaches for Real-Time Edge Computing for Science Applic...
Design Automation Approaches for Real-Time Edge Computing for Science Applic...Facultad de Informática UCM
 
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...Facultad de Informática UCM
 
Fault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error CorrectionFault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error CorrectionFacultad de Informática UCM
 
Cómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intentoCómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intentoFacultad de Informática UCM
 
Automatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPCAutomatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPCFacultad de Informática UCM
 
Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...Facultad de Informática UCM
 
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...Facultad de Informática UCM
 
Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.Facultad de Informática UCM
 
Challenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore windChallenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore windFacultad de Informática UCM
 

More from Facultad de Informática UCM (20)

¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?¿Por qué debemos seguir trabajando en álgebra lineal?
¿Por qué debemos seguir trabajando en álgebra lineal?
 
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
TECNOPOLÍTICA Y ACTIVISMO DE DATOS: EL MAPEO COMO FORMA DE RESILIENCIA ANTE L...
 
DRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation ComputersDRAC: Designing RISC-V-based Accelerators for next generation Computers
DRAC: Designing RISC-V-based Accelerators for next generation Computers
 
uElectronics ongoing activities at ESA
uElectronics ongoing activities at ESAuElectronics ongoing activities at ESA
uElectronics ongoing activities at ESA
 
Tendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura ArmTendencias en el diseño de procesadores con arquitectura Arm
Tendencias en el diseño de procesadores con arquitectura Arm
 
Formalizing Mathematics in Lean
Formalizing Mathematics in LeanFormalizing Mathematics in Lean
Formalizing Mathematics in Lean
 
Introduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented ComputingIntroduction to Quantum Computing and Quantum Service Oriented Computing
Introduction to Quantum Computing and Quantum Service Oriented Computing
 
Computer Design Concepts for Machine Learning
Computer Design Concepts for Machine LearningComputer Design Concepts for Machine Learning
Computer Design Concepts for Machine Learning
 
Inteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuroInteligencia Artificial en la atención sanitaria del futuro
Inteligencia Artificial en la atención sanitaria del futuro
 
Design Automation Approaches for Real-Time Edge Computing for Science Applic...
 Design Automation Approaches for Real-Time Edge Computing for Science Applic... Design Automation Approaches for Real-Time Edge Computing for Science Applic...
Design Automation Approaches for Real-Time Edge Computing for Science Applic...
 
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
Estrategias de navegación para robótica móvil de campo: caso de estudio proye...
 
Fault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error CorrectionFault-tolerance Quantum computation and Quantum Error Correction
Fault-tolerance Quantum computation and Quantum Error Correction
 
Cómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intentoCómo construir un chatbot inteligente sin morir en el intento
Cómo construir un chatbot inteligente sin morir en el intento
 
Automatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPCAutomatic generation of hardware memory architectures for HPC
Automatic generation of hardware memory architectures for HPC
 
Type and proof structures for concurrency
Type and proof structures for concurrencyType and proof structures for concurrency
Type and proof structures for concurrency
 
Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...Hardware/software security contracts: Principled foundations for building sec...
Hardware/software security contracts: Principled foundations for building sec...
 
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
Jose carlossancho slidesLa seguridad en el desarrollo de software implementad...
 
Do you trust your artificial intelligence system?
Do you trust your artificial intelligence system?Do you trust your artificial intelligence system?
Do you trust your artificial intelligence system?
 
Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.Redes neuronales y reinforcement learning. Aplicación en energía eólica.
Redes neuronales y reinforcement learning. Aplicación en energía eólica.
 
Challenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore windChallenges and Opportunities for AI and Data analytics in Offshore wind
Challenges and Opportunities for AI and Data analytics in Offshore wind
 

Recently uploaded

Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxStephen Sitton
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communicationpanditadesh123
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdfHafizMudaserAhmad
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionMebane Rash
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.elesangwon
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfShreyas Pandit
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Erbil Polytechnic University
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONjhunlian
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdfsahilsajad201
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical trainingGladiatorsKasper
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating SystemRashmi Bhat
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Sumanth A
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTSneha Padhiar
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 

Recently uploaded (20)

Turn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptxTurn leadership mistakes into a better future.pptx
Turn leadership mistakes into a better future.pptx
 
multiple access in wireless communication
multiple access in wireless communicationmultiple access in wireless communication
multiple access in wireless communication
 
11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf11. Properties of Liquid Fuels in Energy Engineering.pdf
11. Properties of Liquid Fuels in Energy Engineering.pdf
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
US Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of ActionUS Department of Education FAFSA Week of Action
US Department of Education FAFSA Week of Action
 
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
2022 AWS DNA Hackathon 장애 대응 솔루션 jarvis.
 
Theory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdfTheory of Machine Notes / Lecture Material .pdf
Theory of Machine Notes / Lecture Material .pdf
 
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
Comparative study of High-rise Building Using ETABS,SAP200 and SAFE., SAFE an...
 
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTIONTHE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
THE SENDAI FRAMEWORK FOR DISASTER RISK REDUCTION
 
Robotics Group 10 (Control Schemes) cse.pdf
Robotics Group 10  (Control Schemes) cse.pdfRobotics Group 10  (Control Schemes) cse.pdf
Robotics Group 10 (Control Schemes) cse.pdf
 
70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training70 POWER PLANT IAE V2500 technical training
70 POWER PLANT IAE V2500 technical training
 
Input Output Management in Operating System
Input Output Management in Operating SystemInput Output Management in Operating System
Input Output Management in Operating System
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
Robotics-Asimov's Laws, Mechanical Subsystems, Robot Kinematics, Robot Dynami...
 
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENTFUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
FUNCTIONAL AND NON FUNCTIONAL REQUIREMENT
 
Designing pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptxDesigning pile caps according to ACI 318-19.pptx
Designing pile caps according to ACI 318-19.pptx
 
Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 

A short introduction to Quantum Computing and Quantum Cryptography

  • 2. Overview Part I: What is Quantum Computing? • Qubits, quantum operations, measurements Part II: Are quantum computers more powerful? • Simple example, main algorithms, complexity classes Part III: Some quantum cryptography • Non-locality (certified randomness), quantum key distribution, quantum position verification
  • 3. Part I: What is Quantum Computation?
  • 6. Some History • First quantum paper: Max Planck, 1900 • The field developed strongly during the 1920s • A Turing Machine (1936) is a classical object • 1980s: Quantum Computing “updates” the model to the latest physics • Uses some non-intuitive concepts: Superposition, collapse of the wave function, interference, entanglement, no-cloning... • You will know about all of these in a hour or so.
  • 8. Classical bit • Quantity that is either 0 or 1
  • 9. Classical bit • Quantity that is either 0 or 1
  • 10. Classical bit • Quantity that is either 0 or 1
  • 11. Classical bit • Quantity that is either 0 or 1
  • 15. Quantum bit • Associate 0 and 1 with orthogonal vectors: 0 = 1 0 1 = 0 1 • Quantum bit is a superposition: 𝛼 𝑜 0 + 𝛼1 1 = 𝛼0 𝛼1 • Unit vector in ℂ2: 𝛼0 2 + 𝛼1 2 = 1
  • 17. Wait, you’re cheating! 𝛼 𝑜 0 + 𝛼1 1
  • 18. Wait, you’re cheating! 𝛼 𝑜 0 + 𝛼1 1 0.0001000101011101100110011…..
  • 19. Wait, you’re cheating! 𝛼 𝑜 0 + ( 1− ) 1
  • 20. Wait, you’re cheating! 𝛼 𝑜 0 + ( 1− ) 1 • Valid unit vector, because 𝛼0 2 + 𝛼1 2 = 1
  • 21. Wait, you’re cheating! 𝛼 𝑜 0 + ( 1− ) 1 • Valid unit vector, because 𝛼0 2 + 𝛼1 2 = 1 • Where’s the catch here?
  • 23. Measurement 0 • Measurement collapses the qubit • Observe 0 with probability 𝛼0 2 • Observe 1 with probability 𝛼1 2 • QC is the art of using this hidden information
  • 24. Operations on classical bits • What can we do with one bit? • Either we leave it alone, or we flip it! (NOT gate) • What can we do with many bits? • Many things, but AND, OR, NOT are a sufficient set of gates to represent any function as a circuit.
  • 25. Operations on one qubit • Quantum mechanics allows to do linear operations on qubits before observing them • Norm-preserving matrices in ℂ2×2 : 𝑈 𝛼0 𝛼1 = 𝛼0 ′ 𝛼1 ′ such that 𝛼0 ′ 2 + 𝛼1 ′ 2 = 1 • NOT gate: 𝑋 = 0 1 1 0 0 1 1 0 𝛼0 𝛼1 = 𝛼1 𝛼0 • Hadamard gate: 𝐻 = 1 2 1 1 1 −1
  • 27. Hadamard gate 𝐻 = 1 2 1 1 1 −1 𝐻 0 = 1 2 1 1 1 −1 1 0 = 1 2 1 1 = 1 2 ( 0 + |1⟩): = |+⟩
  • 28. Hadamard gate 𝐻 = 1 2 1 1 1 −1 𝐻 0 = 1 2 1 1 1 −1 1 0 = 1 2 1 1 = 1 2 ( 0 + |1⟩): = |+⟩
  • 29. Hadamard gate 𝐻 = 1 2 1 1 1 −1 𝐻 0 = 1 2 1 1 1 −1 1 0 = 1 2 1 1 = 1 2 ( 0 + |1⟩): = |+⟩
  • 30. Hadamard gate 𝐻 = 1 2 1 1 1 −1 𝐻 0 = 1 2 1 1 1 −1 1 0 = 1 2 1 1 = 1 2 ( 0 + |1⟩): = |+⟩
  • 31. Hadamard gate 𝐻 = 1 2 1 1 1 −1 𝐻 0 = 1 2 1 1 1 −1 1 0 = 1 2 1 1 = 1 2 ( 0 + |1⟩): = |+⟩
  • 32. Hadamard gate 𝐻 = 1 2 1 1 1 −1 𝐻 0 = 1 2 1 1 1 −1 1 0 = 1 2 1 1 = 1 2 ( 0 + |1⟩): = |+⟩ 𝐻 1 = 1 2 1 1 1 −1 0 1 = 1 2 1 −1 = 1 2 ( 0 − |1⟩): = |−⟩
  • 33. Hadamard gate 𝐻 = 1 2 1 1 1 −1 𝐻 0 = 1 2 1 1 1 −1 1 0 = 1 2 1 1 = 1 2 ( 0 + |1⟩): = |+⟩ 𝐻 1 = 1 2 1 1 1 −1 0 1 = 1 2 1 −1 = 1 2 ( 0 − |1⟩): = |−⟩
  • 34. Hadamard gate 𝐻 = 1 2 1 1 1 −1 𝐻 0 = 1 2 1 1 1 −1 1 0 = 1 2 1 1 = 1 2 ( 0 + |1⟩): = |+⟩ 𝐻 1 = 1 2 1 1 1 −1 0 1 = 1 2 1 −1 = 1 2 ( 0 − |1⟩): = |−⟩
  • 35. Hadamard gate 𝐻 = 1 2 1 1 1 −1 𝐻 0 = 1 2 1 1 1 −1 1 0 = 1 2 1 1 = 1 2 ( 0 + |1⟩): = |+⟩ 𝐻 1 = 1 2 1 1 1 −1 0 1 = 1 2 1 −1 = 1 2 ( 0 − |1⟩): = |−⟩
  • 36. Hadamard gate 𝐻 = 1 2 1 1 1 −1 𝐻 0 = 1 2 1 1 1 −1 1 0 = 1 2 1 1 = 1 2 ( 0 + |1⟩): = |+⟩ 𝐻 1 = 1 2 1 1 1 −1 0 1 = 1 2 1 −1 = 1 2 ( 0 − |1⟩): = |−⟩
  • 37. Hadamard gate 𝐻 = 1 2 1 1 1 −1 𝐻 0 = 1 2 1 1 1 −1 1 0 = 1 2 1 1 = 1 2 ( 0 + |1⟩): = |+⟩ 𝐻 1 = 1 2 1 1 1 −1 0 1 = 1 2 1 −1 = 1 2 ( 0 − |1⟩): = |−⟩ Are these two states distinguishable?
  • 38. Distinguishing |+⟩ from |−⟩ 1 2 ( 0 + |1⟩) vs 1 2 ( 0 − |1⟩) • Let us try then to apply Hadamard again! 𝐻 1 2 ( 0 + |1⟩) = 1 2 (𝐻 0 + 𝐻|1⟩) = |0⟩ 𝐻 1 2 ( 0 − |1⟩) = 1 2 (𝐻 0 − 𝐻|1⟩) = |1⟩ INTERFERENCE!
  • 39. Distinguishing |+⟩ from |−⟩ 1 2 ( 0 + |1⟩) vs 1 2 ( 0 − |1⟩) • Let us try then to apply Hadamard again! 𝐻 1 2 ( 0 + |1⟩) = 1 2 (𝐻 0 + 𝐻|1⟩) = |0⟩ 𝐻 1 2 ( 0 − |1⟩) = 1 2 (𝐻 0 − 𝐻|1⟩) = |1⟩ INTERFERENCE!
  • 40. Distinguishing |+⟩ from |−⟩ 1 2 ( 0 + |1⟩) vs 1 2 ( 0 − |1⟩) • Let us try then to apply Hadamard again! 𝐻 1 2 ( 0 + |1⟩) = 1 2 (𝐻 0 + 𝐻|1⟩) = |0⟩ 𝐻 1 2 ( 0 − |1⟩) = 1 2 (𝐻 0 − 𝐻|1⟩) = |1⟩ INTERFERENCE!
  • 41. Distinguishing |+⟩ from |−⟩ 1 2 ( 0 + |1⟩) vs 1 2 ( 0 − |1⟩) • Let us try then to apply Hadamard again! 𝐻 1 2 ( 0 + |1⟩) = 1 2 (𝐻 0 + 𝐻|1⟩) = |0⟩ 𝐻 1 2 ( 0 − |1⟩) = 1 2 (𝐻 0 − 𝐻|1⟩) = |1⟩ INTERFERENCE!
  • 42. More qubits • How to model n qubits? • Unit vector in larger space (dimension 2 𝑛) • Norm-preserving operations and measurements in this exponentially large space • This is why QC is expensive to simulate on classical computers “in the obvious way”. 𝛼00 00 + 𝛼01 01 + 𝛼10 10 +𝛼11 11
  • 44. Part II: Are Quantum Computers more powerful?
  • 45. Computing Parity • Parity function: 𝑓 𝑥0, 𝑥1 = 𝑥0 𝑋𝑂𝑅 𝑥1 • Query complexity: count the number of times we need to access the memory. • In the classical case: 2 queries needed. • Why? After we read the first bit, the function value is unknown: 𝑓 𝑥0, 𝑥1 = 0 ⇔ 𝑥0 = 𝑥1 𝑓 0,0 = 0 𝑓 0,1 = 1 𝑓 1,0 = 1 𝑓 1,1 = 0
  • 47. Computing parity with quantum • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩
  • 48. Computing parity with quantum • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩
  • 49. Computing parity with quantum • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩ H
  • 50. Computing parity with quantum • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩ H O
  • 51. Computing parity with quantum • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩ H O H
  • 52. Computing parity with quantum • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩ H O H
  • 53. Computing parity with quantum • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩ H O H 𝑥0 = 0 𝑥1 = 0
  • 54. Computing parity with quantum • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩ H O H 𝑥0 = 0 𝑥1 = 0 1 2 ( 0 + |1⟩)
  • 55. Computing parity with quantum • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩ H O H 𝑥0 = 0 𝑥1 = 0 1 2 ( 0 + |1⟩) 1 2 ( 0 + |1⟩)
  • 56. Computing parity with quantum • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩ H O H 𝑥0 = 0 𝑥1 = 0 1 2 ( 0 + |1⟩) 1 2 ( 0 + |1⟩) |0⟩
  • 57. Computing parity with quantum • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩ H O H 𝑥0 = 0 𝑥1 = 1
  • 58. Computing parity with quantum • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩ H O H 𝑥0 = 0 𝑥1 = 1 1 2 ( 0 + |1⟩)
  • 59. Computing parity with quantum • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩ H O H 𝑥0 = 0 𝑥1 = 1 1 2 ( 0 + |1⟩) 1 2 ( 0 − |1⟩)
  • 60. Computing parity with quantum • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩ H O H 𝑥0 = 0 𝑥1 = 1 1 2 ( 0 + |1⟩) 1 2 ( 0 − |1⟩) |1⟩
  • 61. Wait a second, you’re cheating! • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩ H O H 𝑥0 = 0 𝑥1 = 1 1 2 ( 0 + |1⟩) 1 2 ( 0 − |1⟩) |1⟩
  • 62. Yeah, what about THIS??? • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩ H O H 𝑥0 = 0 𝑥1 = 1 1 2 ( 0 + |1⟩) 1 2 ( 0 − |1⟩) |1⟩
  • 63. Well, fair enough. Please continue. • A quantum query has the form 𝑂 𝑖 = −1 𝑥 𝑖|𝑖⟩ • As a circuit, we compute parity: |0⟩ H O H 𝑥0 = 0 𝑥1 = 1 1 2 ( 0 + |1⟩) 1 2 ( 0 − |1⟩) |1⟩
  • 64. Quantum parallelism • Quantum computers are able to calculate an exponential number of computations at once. • Any classical program can be encoded in a quantum circuit 𝐶 that maps 𝑥 0 ↦ 𝑥 |𝑓 𝑥 ⟩ • Many inputs cane be given in superposition: 𝐶 𝑥 𝛼 𝑥 𝑥 |0⟩ = 𝑥 𝛼 𝑥 𝑥 |𝑓(𝑥)⟩ • Problem: measure collapses to a random 𝑥, 𝑓 𝑥 …
  • 65. Quantum parallelism • Quantum computers are able to calculate an exponential number of computations at once. • Any classical program can be encoded in a quantum circuit 𝐶 that maps 𝑥 0 ↦ 𝑥 |𝑓 𝑥 ⟩ • Many inputs cane be given in superposition: 𝐶 𝑥 𝛼 𝑥 𝑥 |0⟩ = 𝑥 𝛼 𝑥 𝑥 |𝑓(𝑥)⟩ • Problem: measure collapses to a random 𝑥, 𝑓 𝑥 … • Again: QC is the art of using this hidden information
  • 66. Recipe for a quantum algorithm 1. Put the input in superposition 2. Apply a circuit 𝐶 to everything 3. Do something clever to put more “weight” on the pairs 𝑥, 𝑓(𝑥) of interest 4. Repeat (2) and (3) a certain number of times • (How many? Good luck figuring that out) 5. Measure and enjoy your output
  • 67. Recipe for a quantum algorithm 1. Put the input in superposition 2. Apply a circuit 𝐶 to everything 3. Do something clever to put more “weight” on the pairs 𝑥, 𝑓(𝑥) of interest 4. Repeat (2) and (3) a certain number of times • (How many? Good luck figuring that out) 5. Measure and enjoy your output H O H|0⟩
  • 68. Famous quantum speedups Deutsch-Jozsa (’92) n/2 classical queries vs 1 quantum query “Is this string constant or balanced?”
  • 69. Famous quantum speedups Deutsch-Jozsa (’92) n/2 classical queries vs 1 quantum query “Is this string constant or balanced?” Grover’s search (’96) 𝑛 classical queries vs 𝑛 quantum queries “Does this string contain a 1?”
  • 70. Famous quantum speedups Deutsch-Jozsa (’92) n/2 classical queries vs 1 quantum query “Is this string constant or balanced?” Grover’s search (’96) 𝑛 classical queries vs 𝑛 quantum queries “Does this string contain a 1?” Shor’s Factoring (’94) exp(𝑛) classical running time (best known!) vs 𝑝𝑜𝑙𝑦(𝑛) quantum running time “Find the prime factors of 𝑥”
  • 72. Change the Church-Turing thesis? • Church-Turing thesis: “A Turing machine can simulate all realistic models of computation” • Complexity-Theoretical Church-Turing thesis: “A Turing machine can efficiently simulate all realistic models of computation”
  • 73. Change the Church-Turing thesis? • Church-Turing thesis: “A Turing machine can simulate all realistic models of computation” • Complexity-Theoretical Church-Turing thesis: “A quantum Turing machine can efficiently simulate all realistic models of computation”
  • 75. Results in cryptography Three previously impossible tasks that can be done via simple manipulation of quantum information 1. Generation of certified randomness 2. Detection of a spy 3. Certification of GPS coordinates
  • 76. Non-Locality Can the microscopic have macroscopic consequences? • Non-Local game: challenge for collaborating but non-communicating players (like when the police cross-checks suspects) • Bell inequality: upper bound on winning probability • Quantum players can perform better than the classical players: they violate the Bell inequality • An implementation disproves classical physics • (They have done it, classical physics is officially false)
  • 80. CHSH game 𝑥 𝑦 𝑎 𝑏 The players win if 𝑎 ⊕ 𝑏 = 𝑥 ⋅ 𝑦
  • 81. CHSH game 𝑥 𝑦 𝑎 𝑏 The players win if 𝑎 ⊕ 𝑏 = 𝑥 ⋅ 𝑦 Input Winning output 00 same thing 01 same thing 10 same thing 11 different things ⇔
  • 82. CHSH game 𝑥 𝑦 𝑎 𝑏 The players win if 𝑎 ⊕ 𝑏 = 𝑥 ⋅ 𝑦 Input Winning output 00 same thing 01 same thing 10 same thing 11 different things ⇔ Pr 𝑤𝑖𝑛 ≤ 0.75
  • 83. How do quantum players play? • We need some technical details…
  • 85. Measurement in other bases 1 0
  • 86. Measurement in other bases 1 0 +
  • 87. Measurement in other bases 1 0 + 1 2 1 2
  • 88. Measurement in other bases 1 0 − 1 2 1 2
  • 89. Measurement in other bases − 0 + 1 2 1 2
  • 90. Measurement in other bases 𝑎 0 𝑏 cos(𝛽) cos(𝛼) α 𝛽
  • 92. Wait, how’s this different from having two correlated coins? 00 + |11⟩ 2
  • 93. Wait, how’s this different from having two correlated coins?
  • 94. Wait, how’s this different from having two correlated coins?
  • 95. Wait, how’s this different from having two correlated coins?
  • 96. Wait, how’s this different from having two correlated coins?
  • 98. 00
  • 103. CHSH quantum strategy 𝑥 𝑦 𝑎 𝑏
  • 104. CHSH quantum strategy 𝑥 𝑦 𝑎 𝑏 00 + |11⟩ 2
  • 105. CHSH quantum strategy 𝑥 𝑦 𝑎 𝑏 00 + |11⟩ 2 On input 0,1
  • 106. CHSH quantum strategy 𝑥 𝑦 𝑎 𝑏 00 + |11⟩ 2 On input 0,1
  • 107. CHSH quantum strategy They want: a ⊕ 𝑏 = 𝑥 ⋅ 𝑦 On input 0,1 0 0 1 1 0 0 1 1 On input 0,1
  • 108. CHSH quantum strategy They want: a ⊕ 𝑏 = 𝑥 ⋅ 𝑦 On input 0 0 1 0 0 1 1 On input 0,1
  • 109. CHSH quantum strategy They want: a ⊕ 𝑏 = 𝑥 ⋅ 𝑦 On input 0 0 1 0 0 1 1 On input 0,1
  • 110. CHSH quantum strategy They want: a ⊕ 𝑏 = 𝑥 ⋅ 𝑦 On input 0 0 1 0 0 1 1 On input 0,1 Pr 𝑤𝑖𝑛 = cos2 𝜋 8 ≈ 0.85
  • 111. CHSH quantum strategy They want: a ⊕ 𝑏 = 𝑥 ⋅ 𝑦 On input 1 0 0 1 1 0 1 On input 0,1 Pr 𝑤𝑖𝑛 = cos2 𝜋 8 ≈ 0.85
  • 112. Bell inequality violation • Classical players win with at most 75% probability • Quantum players win with probability ~ 85% ! • This is the most famous Bell inequlity violation... • but there are also unbounded ones! • The CHSH game is used in protocols for randomness certification (e.g Vazirani-Vidick 2011)
  • 113. Quantum key distribution [BB’84] • Alice & Bob want to establish a secret key • They communicate through a public quantum channel • They make use of the following 2 facts: • No-cloning theorem: one cannot perfectly copy an unknown quantum state. • Information disturbance: if one does not know the encoding basis, one cannot decode a qubit perfectly without perturbing (collapsing) it.
  • 114. No-cloning theorem • There is no quantum operation such that, ∀ 𝑎 𝑈 𝑎 0 = 𝑎 |𝑎⟩
  • 115. No-cloning theorem • There is no quantum operation such that, ∀ 𝑎 𝑈 𝑎 0 = 𝑎 |𝑎⟩ Proof
  • 116. No-cloning theorem • There is no quantum operation such that, ∀ 𝑎 𝑈 𝑎 0 = 𝑎 |𝑎⟩ Proof • Take two arbitrary states 𝑎 and 𝑏
  • 117. No-cloning theorem • There is no quantum operation such that, ∀ 𝑎 𝑈 𝑎 0 = 𝑎 |𝑎⟩ Proof • Take two arbitrary states 𝑎 and 𝑏 • Then we must have (since 𝑈 is norm-preserving) ( 𝑎 |0⟩) 𝑇 𝑏 0
  • 118. No-cloning theorem • There is no quantum operation such that, ∀ 𝑎 𝑈 𝑎 0 = 𝑎 |𝑎⟩ Proof • Take two arbitrary states 𝑎 and 𝑏 • Then we must have (since 𝑈 is norm-preserving) ( 𝑎 |0⟩) 𝑇 𝑏 0 = (𝑈 𝑎 0 )) 𝑇 𝑈( 𝑏 |0⟩)
  • 119. No-cloning theorem • There is no quantum operation such that, ∀ 𝑎 𝑈 𝑎 0 = 𝑎 |𝑎⟩ Proof • Take two arbitrary states 𝑎 and 𝑏 • Then we must have (since 𝑈 is norm-preserving) ( 𝑎 |0⟩) 𝑇 𝑏 0 = (𝑈 𝑎 0 )) 𝑇 𝑈( 𝑏 |0⟩) = ( 𝑎 |𝑎⟩) 𝑇 𝑏 𝑏
  • 120. No-cloning theorem • There is no quantum operation such that, ∀ 𝑎 𝑈 𝑎 0 = 𝑎 |𝑎⟩ Proof • Take two arbitrary states 𝑎 and 𝑏 • Then we must have (since 𝑈 is norm-preserving) ( 𝑎 |0⟩) 𝑇 𝑏 0 = (𝑈 𝑎 0 )) 𝑇 𝑈( 𝑏 |0⟩) = ( 𝑎 |𝑎⟩) 𝑇 𝑏 𝑏 • But this implies ( 𝑎 𝑇|𝑏⟩) = ( 𝑎 𝑇|𝑏⟩)2
  • 121. No-cloning theorem • There is no quantum operation such that, ∀ 𝑎 𝑈 𝑎 0 = 𝑎 |𝑎⟩ Proof • Take two arbitrary states 𝑎 and 𝑏 • Then we must have (since 𝑈 is norm-preserving) ( 𝑎 |0⟩) 𝑇 𝑏 0 = (𝑈 𝑎 0 )) 𝑇 𝑈( 𝑏 |0⟩) = ( 𝑎 |𝑎⟩) 𝑇 𝑏 𝑏 • But this implies ( 𝑎 𝑇|𝑏⟩) = ( 𝑎 𝑇|𝑏⟩)2 and this happens when 𝑎, 𝑏 are equal or orthogonal
  • 124. Quantum Key distribution (part 1) Random string: 0111001101
  • 125. Quantum Key distribution (part 1) Random string: 0111001101 Her random bases: +x+xx++x+x His random bases: x++x++xx+x
  • 126. Quantum Key distribution (part 1) Random string: 0111001101 Her random bases: +x+xx++x+x His random bases: x++x++xx+x ENCODE & SEND
  • 127. Quantum Key distribution (part 1) Random string: 0111001101 Her random bases: +x+xx++x+x His random bases: x++x++xx+x ENCODE & SEND DECODE 1111000101
  • 128. Quantum Key distribution (part 1) Random string: 0111001101 Her random bases: +x+xx++x+x His random bases: x++x++xx+x ENCODE & SEND DECODE 1111000101
  • 129. Quantum Key distribution (part 2) Random string: 0111001101 +x+xx++x+x x++x++xx+x ENCODE & SEND DECODE 1111000101 Over a public channel: • Inform each other of the choice of bases • Randomly test equality for half of the red positions • (Spy detection - no-cloning, disturbance) • If pass previous point, other half is the shared key!
  • 140. Position verification p She was at P! She was at P!
  • 146. Position verification: attack p x y x+y x+y x y She was at P! She was at P!
  • 150. Quantum position verification p Basis: × or + qubit outcome outcome
  • 151. Quantum position verification p Basis: × or + qubit outcome outcome She was at P! She was at P!
  • 155. Quantum position verification p qubitBasis: × or + • No cloning theorem: Bob cannot keep a copy of the qubit.
  • 156. Quantum position verification p qubitBasis: × or + • No cloning theorem: Bob cannot keep a copy of the qubit. • Information disturbance: Bob cannot attempt to measure, as he doesn’t know the basis!
  • 157. Quantum position verification p qubitBasis: × or + • No cloning theorem: Bob cannot keep a copy of the qubit. • Information disturbance: Bob cannot attempt to measure, as he doesn’t know the basis!
  • 160. But wait!!! p Open problem: actually prove the security of this protocol! [Buhrman et al, 2011]
  • 161. What to bring home? • Quantum computing is a model of computation based on the latest physics • You do not need deep knowledge of physics to work with it! • There are many tasks that do not require a full quantum computer that are doable today • QC’s full power is still unknown, but it looks like it can give some meaningful speedups • Proving quantum advantage is tricky. • Careful about big advertisement claims!
  • 162. FAQs • Is quantum computing a reality now? • Will we have a quantum computer in our pockets? • Do quantum computers solve useful problems? • Does entanglement allow for faster-than-light communication? My cousin told me so.