quantum computing
play

Quantum Computing Jim Royer CIS 675 Algorithms April 24, 2019 . - PowerPoint PPT Presentation

Quantum Computing Jim Royer CIS 675 Algorithms April 24, 2019 . . . Crypto (CIS 675) Quantum Computing April 24, 2019 1 / 1 References A Physics-Free Introduction to the Quantum Computation Model by Stephen A. Fenner.


  1. Quantum Computing Jim Royer CIS 675 Algorithms April 24, 2019 . . . Crypto (CIS 675) Quantum Computing April 24, 2019 1 / 1

  2. References A Physics-Free Introduction to the Quantum Computation Model by Stephen A. Fenner. https://arxiv.org/abs/cs/0304008 (. . . more importantly, it is complex analysis free) The Talk by Scott Aaronson and Zach Weinersmith, http://www.smbc-comics.com/comic/the-talk-3 (There is tons of misleading hype about quantum computing. This is a good, double-entendre-filled, dehyping.) Quantum Computing Since Democritus by Scott Aaronson https://www.scottaaronson.com/democritus/ (This connects quantum computing to the wider world while being rather goofy.) Crypto (CIS 675) Quantum Computing April 24, 2019 2 / 1

  3. Quantum Computing and Cryptography Given RSA with key size k , it can be broken by a computer with quantum register size ≈ k . ⋆ Similarly with discrete-log-based cryptosystems. There are latticed-based and other post-quantum cryptosystems that quantum computers seemingly cannot break better than classical computers. We will cover enough about quantum computing give you a glimpse of what is behind all the fuss. This is based on A Physics-Free Introduction to the Quantum Computation Model by Stephen A. Fenner. https://arxiv.org/abs/cs/0304008 . ⋆ Assuming that you can build a reliable quantum computer of that size. Crypto (CIS 675) Quantum Computing April 24, 2019 3 / 1

  4. Classical Boolean Circuits, I We view them as naming maps { 0, 1 } n → { 0, 1 } n a • a control a ∧ b b target ∧ ✐ ⇛ current flow ⇛ Consider • ¬ a a ¬ ✐ ( a ∧ b ) ∨ c b ∧ ✐ ∨ ✐ c • c We can describe this by either of: b ← a ∧ b ; a ← ¬ a ; b ← b ∨ c | x , y , z � = state vector | a , b , c � �→ | a , a ∧ b , c � �→ |¬ a , a ∧ b , c � �→ |¬ a , ( a ∧ b ) ∨ c , c � Crypto (CIS 675) Quantum Computing April 24, 2019 4 / 1

  5. Classical Boolean Circuits, II Input/Output Conventions The first k registers are input 0 ≤ k ≤ n The first ℓ registers are output 0 ≤ ℓ ≤ n Each non-input register is assigned 0 or 1 a • a a �→ ( a , a ) 0 ❣ a ∨ Crypto (CIS 675) Quantum Computing April 24, 2019 5 / 1

  6. Uniform Computation A circuit family , C , is a sequence of circuits C 0 , C 1 , C 2 , . . . ∋ for each i , C i has i -inputs and 1-output. L ( C ) = def { w | w | = n & C n ( w ) = 1 } , L ( C ) is the language defined by C . A circuit family is ptime uniform ⇐ ⇒ ∃ a poly-time alg D ∋ for all i , D ( 1 . . . 1 ) = a description of C i . � �� � i many FACT: P = the languages accepted by ptime uniform circuit families. Crypto (CIS 675) Quantum Computing April 24, 2019 6 / 1

  7. Reversible Circuits, I Reversible circuits have inverses. The controlled not gate (CNOT) • a a ⊕ a ⊕ b b Toffoli Gate where ⊙ ( x , y , z ) = z ⊕ ( x ∧ y ) • a a • b b c ⊕ ( a ∧ b ) c ⊙ Reversible circuits do not collapse states. (Why?) Crypto (CIS 675) Quantum Computing April 24, 2019 7 / 1

  8. Reversible Circuits, II Toffoli Gate input output CNOT Gate 0 0 0 0 0 0 input output 0 0 1 0 0 1 0 0 0 0 0 1 0 0 1 0 0 1 0 1 0 1 1 0 1 1 1 0 0 1 0 0 1 0 1 1 1 0 1 1 0 1 1 1 1 0 1 1 0 1 1 1 1 1 1 1 1 0 0 and 1 are the interesting bits. Crypto (CIS 675) Quantum Computing April 24, 2019 8 / 1

  9. Probabilistic Circuits, I The Biased Coin-Flip Gate — p , q — input output 1: ( 1 − p ) 0 0: p 1: ( 1 − q ) 1 0: q v � : 2 n basis vectors Our new state space: H , a 2 n -dim. real vector space | � ( H for Hilbert space) x 1 . . . p , q x i . . . x n | x 1.. i − 1 , 0, x i + 1.. n � �→ p · | x 1.. i − 1 , 0, x i + 1.. n � + ( 1 − p ) · | x 1.. i − 1 , 1, x i + 1.. n � | x 1.. i − 1 , 1, x i + 1.. n � �→ q · | x 1.. i − 1 , 0, x i + 1.. n � + ( 1 − q ) · | x 1.. i − 1 , 1, x i + 1.. n � Crypto (CIS 675) Quantum Computing April 24, 2019 9 / 1

  10. Probabilistic Circuits, II Consider the subspace spanned by | 0 � and | 1 � . | 1 � ❅ q | 0 � + ( 1 − q ) | 1 � The gate p , q always maps the line segment ❅ ✁ p | 0 � + ( 1 − p ) | 1 � ✁ ❅ ✟ from (1,0) to (0,1) to itself. ✟✟ ✁ ❅ | 0 � We can also represent the p , q gate by the matrix: � � p q 1 − p 1 − q This is a stochastic matrix : all entries ≥ 0, all columns sum to 1. Crypto (CIS 675) Quantum Computing April 24, 2019 10 / 1

  11. Probabilistic Circuits: Gates as Linear Maps The irreversible AND gate is: a ∧ b a b a a b 00 01 10 11 0 0 0 0 00 1 1 0 0 ◮ All entries are 0–1 0 1 0 0 01 0 0 0 0 ◮ One 1 in each col ◮ ∴ Stochastic 1 0 1 0 10 0 0 1 0 1 1 1 1 11 0 0 0 1 Reversible gates are permutation matrices! (Why?) Definition A probabilistic circuit is a circuit built from Boolean & p , q gates, where The input state is a basis state. The output state is of the form: ∑ x ∈{ 0,1 } n p x | x � ∋ (i) each p x ≥ 0 and (ii) ∑ p x = 1. p x = the probability that the output will be | x � . Crypto (CIS 675) Quantum Computing April 24, 2019 11 / 1

  12. “Majority Coin Flips” Circuit 2 , 1 1 0 ∧ ∨ ∨ 2 1 2 , 1 0 ∧ 2 2 , 1 1 0 ∧ 2 1 ∧ 1 2 , 1 2 = flip of a fair coin Crypto (CIS 675) Quantum Computing April 24, 2019 12 / 1

  13. A Complexity-Theoretic Aside � C = C 0 , C 1 , C 2 , . . . : a ptime uniform probablistic circuit family ( R , A ) is an acceptance criterion when R , A ⊂ [ 0, 1 ] with R ∩ A = ∅ . (R for reject, A for accept) � C computes L with acceptance criterion ( R , A ) when for each n and each x ∈ { 0 , 1 } n : x ∈ L = ⇒ Prob [ C n ( x ) = 1 ] ∈ A ∈ L = ⇒ Prob [ C n ( x ) = 1 ] ∈ R x / Class Acceptance Criterion ( { 0 } , { 1 } ) P ( { 0 } , ( 0, 1 ]) NP ( { 0 } , ( 1 RP 2 , 1 ]) where 0 < q < 1 BPP ([ 0, q ] , [ 1 − q , 1 ]) 2 ([ 0, 1 2 ] , ( 1 PP 2 , 1 ]) Crypto (CIS 675) Quantum Computing April 24, 2019 13 / 1

  14. Quantum Circuits (´ a la Fenner), I states = vectors in H gates = matrices Now allow negative entries in matrices. (But all real numbers) Now require: � Mv � 2 = � v � 2 for all v . � a 2 1 + · · · + a 2 Note: � � a � 2 = def n This forces the matrices to be orthonormal , i.e., its columns form an orthogonal basis of H . Registers are now called qubits (quantum bits) instead of bits. � � 1 1 1 The Hadamard gate , – H –, has the matrix: √ 1 − 1 2 See the Note: H 2 = I . 1 1 H | 0 � = 2 ( | 0 � + | 1 � ) . H | 1 � = 2 ( | 0 � − | 1 � ) . √ √ next slide Fact: { H , Toffoli gates } are a universal collection of quantum gates. The p , q gates now correspond to measurements . Crypto (CIS 675) Quantum Computing April 24, 2019 14 / 1

  15. Hadamard Gate Geometrically | 1 � √ ( | 0 � + | 1 � ) / 2 Transpose around the 1 x-axis: ( x , y ) � → ( x , − y ) | 0 � Then do a +45 o rotation. 2 √ ( | 0 � − | 1 � ) / 2 1 1 H | 0 � = 2 ( | 0 � + | 1 � ) . H | 1 � = 2 ( | 0 � − | 1 � ) . √ √ Crypto (CIS 675) Quantum Computing April 24, 2019 15 / 1

  16. Quantum Circuits (´ a la Fenner), II QCF (Quantum Coin Flip) This is a variation on Hadamard gate. � 1 1 − 1 � QCF = √ 1 1 2 � 0 √ � 1 Note that ( QCF ) 2 = = the not gate. So, QCF = NOT, the square root of not . 1 0 Quantum I/O Input: basis states Note: ∑ a 2 Output: ∑ x ∈{ 0,1 } n a x | x � x = 1 a 2 x = the probability associated with | x � a x = the probability amplitude for | x � Crypto (CIS 675) Quantum Computing April 24, 2019 16 / 1

  17. Another Complexity-Theoretic Aside If we use quantum circuits, then Class Description Acceptance Criterion ( { 0 } , { 1 } ) EQP Exact quantum polynomial time ( { 0 } , ( 0, 1 ]) C � = P Co-Exact-Counting Polynomial-Time ( { 0 } , ( 1 2 , 1 ]) RQP One-sided Error Extension of EQP ([ 0, 1 n ) , ( n − 1 BQP n , 1 ]) Bounded-Error Quantum Polynomial-Time [ 0, 1 2 ] , ( 1 PP 2 , 1 ]) Probabilistic Polynomial-Time See: https://complexityzoo.uwaterloo.ca/Complexity_Zoo Crypto (CIS 675) Quantum Computing April 24, 2019 17 / 1

  18. “Traditional” Quantum Circuits In place of vector spaces over R , we use vector spaces over C . In place of orthonormal matrices, we use unitary matrices. Etc., etc. See § 6 of Fenner for details. Past this point, we shall be even sketchier than before. . . . so, we won’t digress into complex linear algebra. Crypto (CIS 675) Quantum Computing April 24, 2019 18 / 1

  19. Towards Shor’s Algorithm: Number Theory Facts, I Suppose we want to factor N (assuming N isn’t prime). If we find an x ∈ { 2, . . . , N − 2 } with x 2 ∼ = 1 ( mod N ) a then we can factor N . (Why?) If we can find an a and an even r with: b gcd ( a , N ) = 1, i a r ∼ = 1 ( mod N ) , and ii a r /2 �∼ = ± 1 ( mod N ) , iii then we can factor N . (Why?) Crypto (CIS 675) Quantum Computing April 24, 2019 19 / 1

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend