Professional Documents
Culture Documents
An Elementary Introduction To Quantum Entanglementand - 19-02-22 - Cances
An Elementary Introduction To Quantum Entanglementand - 19-02-22 - Cances
An Elementary Introduction To Quantum Entanglementand - 19-02-22 - Cances
Eric CANCES
Aspect’s experiment (’82) 143 km quantum teleportation (’12) D-Wave 2000Q (’17)
Quantum communication and quantum computing 2
.
Hot topic with massive investment decisions made in 2018
Europe: Quantum Flagship was launched as one of the largest and most ambi-
tious research initiatives of the European Union. With a budget of 1 billion eu-
ros and a duration of 10 years, the flagship brings together research institutions,
academia, industry, enterprises, and policy makers, in a joint and collaborative
initiative on an unprecedented scale.
USA: National Quantum Initiative Act (H.R. 6227) authorizes $1.2 billion over
five years for federal activities aimed at boosting investment in quantum infor-
mation science, or QIS, and supporting a quantum-smart workforce
2. Qubits
Examples:
– particle of spin s in the position representation: H = L2(R3; C2s+1)
|ψ(t; x)|2: probability density of observing the particle at point x ∈ R3
at time t
– 1 qubit: H = C2
2 2 2n
– n qubits H = C
| ⊗ · ·
{z · ⊗ C} ≡ C
n times
1 - Basics of quantum mechanics 5
.
Fundamental postulates of quantum mechanics
• 3rd postulate. Between two measures, the dynamics of the system is given by
Ψ(t) = U (t; t0)Ψ(t0)
where (U (t; t0))t,t0∈R is a strongly continuous family of unitary operators
on H called the propagator. For an isolated system, U (t; t0) = e−i(t−t0)H/~,
where H is the Hamiltonian of the system, i.e. the observable associated
with the energy.
1 - Basics of quantum mechanics 6
.
• 5th postulate. If at time t0 − 0, the system is in the state Ψ(t0 − 0), the
probability that the result of the measure of Ae lays in the Borel set B is
kΠAB Ψ(t0 − 0)k2
, where ΠA
• is the spectral measure associated with A.
• 5th postulate. If at time t0 − 0, the system is in the state Ψ(t0 − 0), the
probability that the result of the measure of Ae lays in the Borel set B is
kΠAB Ψ(t0 − 0)k2
, where ΠA
• is the spectral measure associated with A.
sin θ cos φ
Proof. To any ~n = sin θ sin φ ∈ S2, we can associate the normalized
cos θ
vector of C2 defined by
−iφ/2
e cos(θ/2)
ψ~n := .
eiφ/2 sin(θ/2)
It is easily checked that
2 2 2
∗
S → P (C) := C \ {0} /C
~n 7→ C∗ψ~n
is a smooth diffeomorphism.
2 - Qubits 12
.
Single qubit observables
|kin = |binary exp. of ki, i.e. |0in = |0 · · · 000i, |1in = |0 · · · 001i, |2in = |0 · · · 010i, ...
⊗n n −1
2X
1 1
Uniform state: |ψ0i = √ (|0i + |1i) =√ |kin.
2 2n k=0
2 - Qubits 15
.
Acting on (systems of) qubits:
• reversible transformations by means of unitary operators ;
• irreversible transformations by measurement.
Controlled 2-qubit gate = unitary operator acting on two qubits, one qubit
being the control, the second qubit being the target, i.e. for u unitary of C2
Ciju (|kin−1−j ⊗ |φi ⊗ |lij−i−1 ⊗ |0i ⊗ |mii) = |kin−1−j ⊗ |φi ⊗ |lij−i−1 ⊗ |0i ⊗ |mii
Ciju (|kin−1−j ⊗ |φi ⊗ |lij−i−1 ⊗ |1i ⊗ |mii) = |kin−1−j ⊗ (u|φi) ⊗ |lij−i−1 ⊗ |1i ⊗ |mii.
2 - Qubits 17
.
Graphical representation of 1-qubit and controlled 2-qubit logic gates
j u j u j (cNOT gate)
1
0 i i
1 1
0 0
X
Controlled NOT (cNOT) gate C13 := C13 on H4:
C13|0x20x0i := |0x20x0i, C13|1x20x0i := |1x20x0i,
C13|0x21x0i := |1x21x0i, C13|1x21x0i := |0x21x0i.
• Quantum communication:
– teleportation (Bennett et al., PRL ’83)
– dense coding (Bennett and Wiesner, PRL ’92)
On the other hand, if Alice and Bob share a 2-qubit in the entangled state
1
φ+
AB = √ (|00i + |11i) ,
2
then Alice can send to Bob two bits of information safe from eavesdroppers.
• Step 1: depending on whether she wants to send 00, 10, 01 or 11, she
applies 1C2 , X, Z or XZ to her qubit. The 2-qubit system then is in state
+ 1 + 1
(1C2 ⊗ 1C2 )φAB = √ (|00i + |11i) , (X ⊗ 1C2 )φAB = √ (|10i + |01i)
2 2
+ 1 + 1
(Z⊗1C2 )φAB = √ (|00i − |11i) , or ((XZ)⊗1C2 )φAB = √ (|10i − |01i) .
2 2
• Step 2: Alice sends her qubit to Bob;
• Step 3: Bob applies the unitary transform U := (H ⊗ 1C2 )C10 and gets
|00i, |10i, |01i, or |11i.
3.2 - Using entanglement: quantum teleportation 20
.
No-cloning theorem: there is no unitary transform U on C2 ⊗ C2 satisfying
∀ψ ∈ C2, U (|ψi ⊗ |0i) = |ψi ⊗ |ψi.
It seems that applying Uf a single time, we have computed all the 2n values
f (k) at once → quantum parallelism.
However, this information is hidden in the state |Ψi. The only way to ex-
tract information from |Ψi is to make a measurement on it (which will
destroy it). Only a tiny bit of information can be extracted in this way .
3.3 - Using entanglement: quantum computing 25
.
Deutsch problem (’85) (extracting relational information)
Suppose that we have at hand a black box Uf (a unitary operator on C2 ⊗ C2)
corresponding to an (unknown) function f : X1 → X1 (with X1 = {0, 1}).
The question we want to answer is: are f (0) and f (1) equal?
⊗n 1 X
Let |φi = H |0in = √ |kin, V = 1 − 2|k0innhk0|, W = 1 − 2|φihφ|.
N k∈Xn
We have
1
|φi = sin(θ)|k0in + cos(θ)|ψi, with |ψi ∈ |k0i⊥
n and sin(θ) = √
N
and
(W V )j |φi = sin((2j + 1)θ)|k0in + cos((2j + 1)θ)|ψi.
3.3 - Using entanglement: quantum computing 27
.
Grover’s algorithm:
1. prepare the state |0in and construct |φi = H ⊗n|0in;
h √ i
2. apply j = π4 N times the unitary operator W V ;
3. measure the n observables 1⊗(n−1−i) ⊗ Z ⊗ 1⊗i.
The results will give the binary expansion of k0 with probability
√
h
π i 1 1
pn = 1 − sin2 N + 1 arcsin √ = 1 − O n/2 .
2 N 2
https://quantumcomputingreport.com/news/
Conclusion 30
.
Quantum communication
• break widely used public key inscriptions (not so interesting though)
RSA-2048 with 4100 qubits, EEC (bitcoins) with 2330 qubits
• entanglement-based secure communication (very interesting)