Mile Gu IPS Meeting 2-23-2012 8/9/2017 FWS-01 Mile Gu C OMPLEX S - - PowerPoint PPT Presentation

mile gu
SMART_READER_LITE
LIVE PREVIEW

Mile Gu IPS Meeting 2-23-2012 8/9/2017 FWS-01 Mile Gu C OMPLEX S - - PowerPoint PPT Presentation

Mile Gu IPS Meeting 2-23-2012 8/9/2017 FWS-01 Mile Gu C OMPLEX S OCIETY Q UANTUM M ECHANICS IPS Meeting 2-23-2012 Davisson, C. J.; Germer, L. H. Proceedings of the National Academy of Sciences, 1928 Tonomura, Akira, et al. American Journal of


slide-1
SLIDE 1

IPS Meeting 2-23-2012

8/9/2017 FWS-01

Mile Gu

slide-2
SLIDE 2

IPS Meeting 2-23-2012

Mile Gu

COMPLEX SOCIETY QUANTUM MECHANICS

slide-3
SLIDE 3
slide-4
SLIDE 4
slide-5
SLIDE 5

Tonomura, Akira, et al. American Journal of Physics 57.2, 1989 Davisson, C. J.; Germer, L. H. Proceedings of the National Academy of Sciences, 1928

slide-6
SLIDE 6
slide-7
SLIDE 7
slide-8
SLIDE 8

A particle can go through a superposition of both slits! |0⟩ |1⟩ |%⟩ = |0⟩ + |1⟩

slide-9
SLIDE 9

Measuring the particle position causes Its quantum state to collapse |0⟩ + |1⟩ → |0⟩

slide-10
SLIDE 10

Good Bombs have photo-detectors that, when seeing a photon, explodes. Bad bombs do not interact with photons

We have a stockpile of Single-Photon activated bombs – but some of them are duds.

Elitzur, Avshalom C.; Lev Vaidman, Foundations of Physics. 23 (7): 987–997, 1993

slide-11
SLIDE 11

We have a stockpile of Single-Photon activated bombs – but some of them are duds. How do we make sure every bomb works without blowing all of them in the process?

slide-12
SLIDE 12

Interference forces photon emerge from lower path Photons cannot emerge on the top path due to destructive interference

Mirror Mirror Single Photon Source 50/50 Beamsplitter

slide-13
SLIDE 13

A Dud will not affect this interference. Detector here sees nothing

slide-14
SLIDE 14

A real bomb can detect photons, and thus destroys the interference pattern. 50% chance of detecting photon

slide-15
SLIDE 15

Detecting a photon here will allow us to verify a Bomb works, without activating the bomb! Seeing without Looking - This interference pattern is still destroyed, even when the Bomb never interacts with the photon! (experimentally verified 1995)

Kwiat, Paul, et al. Annals of the New York Academy of Sciences 383-393 (1995):

slide-16
SLIDE 16

“Everything we call real is made of things that cannot be regarded as real. If quantum mechanics hasn’t profoundly shocked you, you haven’t understood it yet.”

  • Niels Bohr

Quantum theory is not locally realistic A system can exist in a superposition of different configurations.

slide-17
SLIDE 17

“Everything we call real is made of things that cannot be regarded as real. If quantum mechanics hasn’t profoundly shocked you, you haven’t understood it yet.” Schrodinger’s Cat |"#$%⟩ + |()*+#⟩

  • Niels Bohr
slide-18
SLIDE 18

|0⟩ |1⟩ % &

ENTROPY = 0 (CERTAINTY) ENTROPY = 0 (CERTAINTY)

slide-19
SLIDE 19

|0⟩ |1⟩ % &

ENTROPY = 1 '( = 0.5 ', = 0.5 ENTROPY = 0 (CERTAINTY) ENTROPY = 0 (CERTAINTY) (UNCERTAINTY)

slide-20
SLIDE 20

|0⟩ $ = 0 $ = 1

slide-21
SLIDE 21

|1⟩ $ = 1

slide-22
SLIDE 22

|1⟩ $ = 1 We can reliably encode one bit of information (i.e., value of $), by setting our system in |0⟩ or |1⟩ state.

slide-23
SLIDE 23

|+⟩ = %

& (|0⟩ + 1⟩

slide-24
SLIDE 24

|−⟩ = %

& (|0⟩ - 1⟩

slide-25
SLIDE 25

|+⟩ = %

& (|0⟩ + 1⟩

Photon is always absent here. |+⟩ state:

slide-26
SLIDE 26

|−⟩ =

% & (|0⟩ - 1⟩

Photon is always present |+⟩ state:

slide-27
SLIDE 27

|−⟩ =

% & (|0⟩ - 1⟩

|+⟩ = %

& (|0⟩ + 1⟩

+ = 0 + = 1 We can also reliably encode and retrieve the a bit of information (i.e., value of +), by setting our system in |+⟩ or |−⟩ state.

slide-28
SLIDE 28

|0⟩ |1⟩ % &

slide-29
SLIDE 29

|0⟩ |1⟩ % & |−⟩ =

) * (|0⟩ - 1⟩

|+⟩ = )

* (|0⟩ + 1⟩

slide-30
SLIDE 30

|0⟩ |1⟩ % & |−⟩ =

) * (|0⟩ - 1⟩

|+⟩ = )

* (|0⟩ + 1⟩

  • ./
  • ./
slide-31
SLIDE 31

! "

ANY POINT ON SURFACE OF

SPHERE REPRESENTS A VALID QUANTUM STATE OF ZERO ENTROPY.

|$⟩ = cos

* + |0⟩ + sin * + |1⟩

FOR STATES ON X-Z PLANE:

Use a non 50/50 beamsplitter

slide-32
SLIDE 32

! = 0 ! = 1 z = 0 z = 1 Measuring ! requires we find out nothing about which arm the photon pass though | ⟩

slide-33
SLIDE 33

! = 0 ! = 1 z = 0 z = 1 Measuring z would collapse the wave function and thus erase any Information we know about x |1⟩ |0⟩

slide-34
SLIDE 34

Uncertainty of x

! " + ! $ ≥ 1

! " = 1 ! $ = 0 ! $ = 0 ! " = 1

We cannot retrieve information about x and z at the same time! Uncertainty of Z

slide-35
SLIDE 35
slide-36
SLIDE 36

Quantum Cryptography Quantum Sensing Quantum Modelling Quantum Computing

slide-37
SLIDE 37

Quantum Cryptography Quantum Sensing Quantum Modelling Quantum Computing

slide-38
SLIDE 38

Quantum Cryptography

The uncertainty principle implies that no

  • ne – no matter how powerful – can ever

reliably know both x and z.

?

! = 0 ! = 1 % = 1 % = 1

slide-39
SLIDE 39

?

! = 0 ! = 1 % = 1 % = 1

No-Cloning Theorem An unknown quantum bit cannot be cloned.

slide-40
SLIDE 40

Alice Bob Quantum Channel

slide-41
SLIDE 41

Alice Bob Quantum Channel

slide-42
SLIDE 42

|0⟩|0⟩ |1⟩|1⟩ Quantum Computing

slide-43
SLIDE 43

|0⟩|+⟩ ⟩ ⟩

NOT

|0⟩|0⟩ + |1⟩|1⟩ &'()'*+,-

A STATE WITH CORRELATIONS

THAT HAS ZERO ENTROPY!

slide-44
SLIDE 44

⟩ ⟩ |0⟩|0⟩ + |1⟩|1⟩ %&'(&)*+,

MUTUAL INFORMATION:

I(A,B) = - . + - 0 − - ., 0 = 2

CONDITIONAL ENTROPY:

  • .|0 = - . − 5 ., 0 = −1
  • 1
  • 1

2 I(A,B) S(A|B) S(B|A) A quantum system B can contain more information about a Quantum system A that what system A contains about itself

slide-45
SLIDE 45

⟩ ⟩

a|0⟩ + b|1⟩

2 Parameters

a 00⟩ + b 01⟩ + )|10⟩+d|11⟩

4 Parameters 8 Parameters

a 000⟩ + b 001⟩ + )|010⟩+d|011⟩+ e 100⟩ + f 101⟩ + -|010⟩+h|111⟩

slide-46
SLIDE 46

⟩ ⟩ THE AMOUNT OF INFORMATION REQUIRED TO TRACK N QUBITS GROWS

EXPONENTIALLY WITH N!

slide-47
SLIDE 47

!"($)

Control Flips target bit depending on the value of the control bit Target

slide-48
SLIDE 48

!

"#(%)

'(!)

Initialize in ! ∈ {0,1} This logic circuit will write down answer to '(!)

  • n the target bit.

Initialize in 0

slide-49
SLIDE 49

!

"#(%)

'(!)

Initialize in ! ∈ {0,1} This logic circuit will write down answer to '(!)

  • n the target bit.

Initialize in 0

slide-50
SLIDE 50

A QUANTUM SYSTEM CAN TAKE A SUPERPOSITION OF INPUTS AND COMPUTE BOTH

ANSWERS SIMULTANEOUSLY!

! " (|0⟩+|1⟩)

()(*)

|0⟩

! " (|0⟩|,(0)⟩ +|1⟩|,(1)⟩)

slide-51
SLIDE 51

WE CAN EVALUATE A SUPERPOSITION !(#) ON AN EXPONENTIAL NUMBER OF

POSSIBLE INPUTS USING A POLYNOMIAL NUMBER OF QUBITS!

%&(')

|0⟩ 1 2- . |/⟩|0(/)⟩

1234 564

1 2- . |/⟩

1234 564

slide-52
SLIDE 52

WE CAN EVALUATE A SUPERPOSITION !(#) ON AN EXPONENTIAL NUMBER OF

POSSIBLE INPUTS USING A POLYNOMIAL NUMBER OF QUBITS!

%&(')

|0⟩ 1 2- . |/⟩|0(/)⟩

1234 567

1 2- . |/⟩

1234 567

CAN WE ACTUALLY ACCESS

THIS INFORMATION?

slide-53
SLIDE 53

⟩ ⟩ FACTORING CAN BE DONE IN POLYNOMIAL TIME USING QUANTUM COMPUTERS!- NO EFFICIENT CLASSICAL

ALGORITHM KNOWN!

slide-54
SLIDE 54
slide-55
SLIDE 55

Michelle Simmons - Australian of the Year 2018 Director of the Centre for Quantum Computation and Communication Technology

slide-56
SLIDE 56
slide-57
SLIDE 57

Science June 2018

slide-58
SLIDE 58

Quantum Cryptography

slide-59
SLIDE 59

Quantum Cryptography

slide-60
SLIDE 60

Big Open Question: What can quantum technologies do?

slide-61
SLIDE 61

Aggarwal, Divesh, et al. "Quantum attacks on Bitcoin, and how to protect against them." arXiv preprint arXiv:1710.10377(2017).

slide-62
SLIDE 62
slide-63
SLIDE 63

FELIX BINDER VARUN NARASIMHACHAR LIU QING CARLO DI FRANCO ANDREW GARNER SUN WHEI YEAP JAYNE THOMPSON MILE GU YANG CHENGRAN