mile gu
play

Mile Gu IPS Meeting 2-23-2012 8/9/2017 FWS-01 Mile Gu C OMPLEX S - PowerPoint PPT Presentation

Mile Gu IPS Meeting 2-23-2012 8/9/2017 FWS-01 Mile Gu C OMPLEX S OCIETY Q UANTUM M ECHANICS IPS Meeting 2-23-2012 Davisson, C. J.; Germer, L. H. Proceedings of the National Academy of Sciences, 1928 Tonomura, Akira, et al. American Journal of


  1. Mile Gu IPS Meeting 2-23-2012 8/9/2017 FWS-01

  2. Mile Gu C OMPLEX S OCIETY Q UANTUM M ECHANICS IPS Meeting 2-23-2012

  3. Davisson, C. J.; Germer, L. H. Proceedings of the National Academy of Sciences, 1928 Tonomura, Akira, et al. American Journal of Physics 57.2, 1989

  4. |0⟩ |1⟩ |%⟩ = |0⟩ + |1⟩ A particle can go through a superposition of both slits!

  5. Measuring the particle position causes |0⟩ + |1⟩ → |0⟩ Its quantum state to collapse

  6. We have a stockpile of Single-Photon activated bombs – but some of them are duds. Good Bombs have photo-detectors Bad bombs do not interact with that, when seeing a photon, explodes. photons Elitzur, Avshalom C.; Lev Vaidman, Foundations of Physics . 23 (7): 987–997, 1993

  7. We have a stockpile of Single-Photon activated bombs – but some of them are duds. How do we make sure every bomb works without blowing all of them in the process?

  8. Photons cannot emerge on the top path due to destructive interference Mirror Single Photon Source 50/50 Beamsplitter Mirror Interference forces photon emerge from lower path

  9. Detector here sees nothing A Dud will not affect this interference.

  10. 50% chance of detecting photon A real bomb can detect photons, and thus destroys the interference pattern.

  11. Detecting a photon here will allow us to verify a Bomb works, without activating the bomb! S eeing without Looking - This interference pattern is still destroyed, even when the Bomb never interacts with the photon! (experimentally verified 1995) Kwiat, Paul, et al. Annals of the New York Academy of Sciences 383-393 (1995):

  12. “Everything we call real is made of things that cannot be regarded as real. If quantum mechanics hasn’t profoundly shocked you, you haven’t understood it yet.” - Niels Bohr Quantum theory is not locally realistic A system can exist in a superposition of different configurations.

  13. “Everything we call real is made of things that cannot be regarded as real. If quantum mechanics hasn’t profoundly shocked you, you haven’t understood it yet.” - Niels Bohr Schrodinger’s Cat |"#$%⟩ + |()*+#⟩

  14. % E NTROPY = 0 |0⟩ (C ERTAINTY ) & E NTROPY = 0 |1⟩ (C ERTAINTY )

  15. ' , = 0.5 ' ( = 0.5 % E NTROPY = 0 |0⟩ (C ERTAINTY ) E NTROPY = 1 (U NCERTAINTY ) & E NTROPY = 0 |1⟩ (C ERTAINTY )

  16. |0⟩ $ = 0 $ = 1

  17. $ = 1 |1⟩

  18. We can reliably encode one bit of information (i.e., value of $ ), by setting our system in |0⟩ or |1⟩ state. $ = 1 |1⟩

  19. |+⟩ = % & (|0⟩ + 1⟩

  20. |−⟩ = % & (|0⟩ - 1⟩

  21. |+⟩ state: Photon is always absent here. |+⟩ = % & (|0⟩ + 1⟩

  22. |+⟩ state: Photon is always present % |−⟩ = & (|0⟩ - 1⟩

  23. We can also reliably encode and retrieve the a bit of information (i.e., value of + ), by setting our system in |+⟩ or |−⟩ state. + = 0 + = 1 |+⟩ = % & (|0⟩ + 1⟩ % |−⟩ = & (|0⟩ - 1⟩

  24. % |0⟩ & |1⟩

  25. % |0⟩ |+⟩ = ) * (|0⟩ + 1⟩ ) |−⟩ = * (|0⟩ - 1⟩ & |1⟩

  26. % |0⟩ -./ |+⟩ = ) * (|0⟩ + 1⟩ ) |−⟩ = * (|0⟩ - 1⟩ & -./ |1⟩

  27. ! A NY POINT ON SURFACE OF F OR STATES ON X-Z P LANE : SPHERE REPRESENTS A VALID * * QUANTUM STATE OF ZERO |$⟩ = cos + |0⟩ + sin + |1⟩ ENTROPY . 0 " Use a non 50/50 beamsplitter

  28. | ⟩ z = 0 ! = 0 ! = 1 z = 1 Measuring ! requires we find out nothing about which arm the photon pass though

  29. z = 0 |0⟩ ! = 0 ! = 1 z = 1 |1⟩ Measuring z would collapse the wave function and thus erase any Information we know about x

  30. We cannot retrieve information about x and z at the same time! ! " = 1 ! $ = 0 ! $ = 0 ! " = 1 ! " + ! $ ≥ 1 Uncertainty of Z Uncertainty of x

  31. Quantum Sensing Quantum Modelling Quantum Cryptography Quantum Computing

  32. Quantum Sensing Quantum Modelling Quantum Cryptography Quantum Computing

  33. % = 1 Quantum Cryptography ? ! = 0 ! = 1 % = 1 The uncertainty principle implies that no one – no matter how powerful – can ever reliably know both x and z.

  34. % = 1 ? ! = 0 ! = 1 % = 1 No-Cloning Theorem An unknown quantum bit cannot be cloned.

  35. Alice Bob Quantum Channel

  36. Alice Bob Quantum Channel

  37. Quantum Computing |1⟩|1⟩ |0⟩|0⟩

  38. NOT |0⟩|0⟩ + |1⟩|1⟩ &'()'*+,- |0⟩|+⟩ A STATE WITH CORRELATIONS THAT HAS ZERO ENTROPY ! ⟩ ⟩

  39. -1 2 -1 S(B|A) S(A|B) I(A,B) M UTUAL I NFORMATION : I(A,B) = - . + - 0 − - ., 0 = 2 |0⟩|0⟩ + |1⟩|1⟩ C ONDITIONAL E NTROPY : - .|0 = - . − 5 ., 0 = −1 %&'(&)*+, A quantum system B can contain more information about a Quantum system A that what system A contains about itself ⟩ ⟩

  40. 2 Parameters a|0⟩ + b| 1⟩ 4 Parameters a 00⟩ + b 01⟩ + )|10⟩ + d|11⟩ 8 Parameters a 000⟩ + b 001⟩ + )|010⟩ + d|011⟩ + e 100⟩ + f 101⟩ + -|010⟩ + h|111⟩ ⟩ ⟩

  41. T HE A MOUNT OF I NFORMATION R EQUIRED TO T RACK N Q UBITS GROWS EXPONENTIALLY WITH N ! ⟩ ⟩

  42. Control ! "($) Target Flips target bit depending on the value of the control bit

  43. ! Initialize in ! ∈ {0,1} " #(%) '(!) Initialize in 0 This logic circuit will write down answer to '(!) on the target bit.

  44. ! Initialize in ! ∈ {0,1} " #(%) '(!) Initialize in 0 This logic circuit will write down answer to '(!) on the target bit.

  45. ! " (|0⟩ + |1⟩ ) ( )(*) |0⟩ ! " (|0⟩|,(0)⟩ + |1⟩|,(1)⟩ ) A QUANTUM SYSTEM CAN TAKE A SUPERPOSITION OF INPUTS AND COMPUTE BOTH ANSWERS SIMULTANEOUSLY !

  46. 1 2 34 1 2 - . |/⟩ 564 % &(') |0⟩ 1 2 34 1 2 - . |/⟩|0(/)⟩ 564 W E CAN EVALUATE A SUPERPOSITION !(#) ON AN EXPONENTIAL NUMBER OF POSSIBLE INPUTS USING A POLYNOMIAL NUMBER OF QUBITS !

  47. C AN WE ACTUALLY ACCESS THIS INFORMATION ? 1 2 34 1 2 - . |/⟩ 567 % &(') |0⟩ 1 2 34 1 2 - . |/⟩|0(/)⟩ 567 W E CAN EVALUATE A SUPERPOSITION !(#) ON AN EXPONENTIAL NUMBER OF POSSIBLE INPUTS USING A POLYNOMIAL NUMBER OF QUBITS !

  48. F ACTORING CAN BE DONE IN P OLYNOMIAL TIME USING Q UANTUM COMPUTERS !- N O EFFICIENT CLASSICAL ALGORITHM K NOWN ! ⟩ ⟩

  49. Michelle Simmons - Australian of the Year 2018 Director of the Centre for Quantum Computation and Communication Technology

  50. Science June 2018

  51. Quantum Cryptography

  52. Quantum Cryptography

  53. Big Open Question: What can quantum technologies do?

  54. Aggarwal, Divesh, et al. "Quantum attacks on Bitcoin, and how to protect against them." arXiv preprint arXiv:1710.10377 (2017).

  55. J AYNE T HOMPSON Y ANG C HENGRAN S UN W HEI C ARLO D I L IU Q ING M ILE G U F ELIX Y EAP F RANCO B INDER V ARUN A NDREW N ARASIMHACHAR G ARNER

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend