Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page:  1  2  3  4  5  (Next)
  ALL

A

Picture of Yee Wei Law

Abstract algebra

by Yee Wei Law - Monday, 11 September 2023, 3:23 PM
 

See 👇 attachment or the latest source on Overleaf, on the topics of groups and Galois fields (pending).

Tags:

Picture of Yee Wei Law

Ancilla

by Yee Wei Law - Wednesday, 7 June 2023, 1:01 PM
 

An ancilla (system) is an auxiliary quantum-mechanical system [ETS18].

Think of ancilla as something extra that is used to achieve some goal [Pre18].

References

[ETS18] ETSI, Quantum Key Distribution (QKD); Vocabulary, Group Report ETSI GR QKD 007 v1.1.1, December 2018. Available at https://www.etsi.org/deliver/etsi_gr/QKD/001_099/007/01.01.01_60/gr_qkd007v010101p.pdf.
[Pre18] J. Preskill, Lecture Notes for Ph219/CS219: Quantum Information Chapter 3, 2018. Available at http://theory.caltech.edu/~preskill/ph219/chap2_15.pdf.
Tags:

Picture of Yee Wei Law

Axiomatic approach to quantum operations

by Yee Wei Law - Wednesday, 7 June 2023, 1:02 PM
 

In quantum information theory, the foundation of quantum cryptography, the concepts of general/generalised measurements and quantum channels are rooted in the concept of quantum operation [Pre18, Sec. 3.2.4].

  • A general measurement can be realised by entangling a system with a meter and performing a projective measurement on the meter.
  • A quantum channel arises if we measure the meter but completely forget the measurement outcome.

While the time evolution of a closed quantum system can be expressed using a single unitary operator, the time evolution of an open quantum system is much less straightforward [HXK20], and this is where the theory of quantum operations come in.

Here, the axiomatic approach in [NC10, Sec. 8.2.4] to defining quantum operations is discussed, starting with Definition 1.

Definition 1: Quantum operation [NC10, p. 367]

A quantum operation is a map from the set of density operators for the input space to the set of density operators for the output space , that satisfies these axioms:

Axiom 1

, with value between 0 and 1 inclusive, is the probability that the process represented by occurs, when is the initial state.

💡 Recall Eq. (1) in the discussion of density operator.

Axiom 2

is a convex-linear map on the set of density operators, i.e., for probabilities ,

Axiom 3

is a completely positive map, i.e., if maps density operators of system to density operators of system , then must be positive for any positive operator .

Furthermore, if we introduce an extra system of arbitrary dimensionality, then , where denotes the identity map on system , is positive for any positive operator on the combined system .

Justification of Axiom 1: In the absence of measurement, by itself completely describes the quantum operation, and Axiom 1 reduces to the requirement that ; in this case, the quantum operation is trace-preserving.

  • If does not completely describe the operation, then there exists such that , and is so-called non-trace-preserving.
  • Every physical quantum operation on satisfies the requirement that .

Justification of Axiom 2: Let , then

where is a normalisation factor.

By Bayes’ rule,

Justification of Axiom 3: A quantum operation maps a density operator to a density operator — by itself or as part of a larger system — and density operators are always positive, so must be a completely positive map.

Example 1 [Pre18, p. 19]

This example is meant to show that the transpose operation is not a completely positive map and hence not a quantum operation.

We first observe that is positive if is positive because the quadratic form

However, the transpose operation is not completely positive due to the following.

Suppose system contains entangled subsystems and , and has state , ignoring the normalisation constant.

The density matrix of is

Above, we applied the identity .

Now consider the composite map , where is the transpose operation, which transforms to .

Applying the composite map to , we get

Applying the composite map to the above, we get back

Therefore, if we represent the map with a square matrix, the matrix is involutory (square = identity), and it is trivial to show that the eigenvalues of an involutory matrix are (see below), implying the composite map is not positive.

Note: For involutory , .

In other words, the transpose operation is not a completely positive map, and hence not a quantum operation.

Axioms 1-3 lead to the following important theorem.

Theorem 1 [NC10, Theorem 8.1]

The map satisfies Axioms 1-3 if and only if

(1)

for some set of operators that map the input Hilbert space to the output Hilbert space, and .

In Theorem 1,

  • The statement is equivalent to the statement is positive-semidefinite.
  • are so-called Kraus operators or operation elements [Pre18, Sec. 3.2.1], and Eq. (1) is called an operator-sum representation of [MM12, Sec. 2.14].
    • Operator-sum representations are not unique because of the unitary freedom in these representations [NC10, Theorem 8.2]; see Example 2.
  • If , then form a POVM [WN17, Definition 1.5.2], and we have a nonunique Kraus decomposition of .
    • A Kraus decomposition always exists for POVM by simply setting , the positive square root of (Python function scipy.lingalg.sqrtm, MATLAB function sqrtm).
    • If is a projector, then and we can set .
Example 2 [MM12, p. 176]

Consider the Kraus operators or operation elements: and , where .

An equivalent operator-sum representation can be provided by and , because

The freedom in the operator-sum representation is especially useful for studying quantum error correction.

Theorem 2 [NC10, Theorem 8.3]

Any quantum operation on a system of -dimensional Hilbert space can be generated by an operator-sum representation containing at most elements:

where .

Watch lectures on Kraus representations by Artur Ekert, inventor of the E91 QKD protocol:

References

[HXK20] Z. Hu, R. Xia, and S. Kais, A quantum algorithm for evolving open quantum dynamics on quantum computing devices, Sci Rep 10 (2020), 3301. https://doi.org/10.1038/s41598-020-60321-x.
[MM12] D. C. Marinescu and G. M. Marinescu, Classical and Quantum Information, Elsevier, 2012. https://doi.org/10.1016/C2009-0-64195-7.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
[Pre18] J. Preskill, Lecture Notes for Ph219/CS219: Quantum Information Chapter 3, 2018. Available at http://theory.caltech.edu/~preskill/ph219/chap2_15.pdf.
[WN17] S. Wehner and N. Ng, Lecture Notes: edX Quantum Cryptography, CaltechDelftX: QuCryptox, 2017. Available at https://courses.edx.org/courses/course-v1:CaltechDelftX+QuCryptox+3T2018/pdfbook/0/.
Tags:

B

Picture of Yee Wei Law

BB84: Overview

by Yee Wei Law - Thursday, 26 October 2023, 2:27 PM
 

Quantum key distribution (QKD) is a method for generating and distributing symmetric cryptographic keys with information-theoretic security based on quantum information theory [ETS18].

A QKD protocol establishes a secret key between two parties — let us call them 👩 Alice and 🧔 Bob as per tradition — connected by 1️⃣ an insecure quantum channel and 2️⃣ an authenticated classical channel [Gra21, Sec. 3.1].

  • The established key can be however long as required so that it can serve as the key in a one-time pad.
  • “Authenticated” does not imply “confidential” and does not necessarily require the use of cryptography. Alice and Bob can physically meet and verify each other’s identity.
  • In practice, the authenticated classical channel can be established using 1️⃣ a pre-shared symmetric key, or 2️⃣ public-key cryptography [PAB+20, Sec. F].

A QKD protocol typically proceeds in two phases [Wol21, Ch. 4]:

  1. the quantum transmission phase, in which 👩 Alice and 🧔 Bob send and/or measure quantum states;
  2. the classical post-processing phase, where the bitstrings generated in the previous phase are converted into a pair of secret keys.

The security of QKD hinges on the principles of quantum mechanics, rather than the hardness of any computational problem, and hence does not get threatened by advances in computing technologies.

  • During the quantum transmission phase, any adversary — let us call it 😈 Eve as per tradition — eavesdropping on the quantum channel inherently disturbs the channel and interrupts the key establishment process.
  • Eve cannot make a copy of any transmitted state (that contributes to the key to be established) thanks to the no-cloning theorem.
Theorem 1: No-cloning theorem [WZ82]

It is not possible to perfectly clone an unknown quantum state.

The earliest QKD protocol is due to Bennett and Brassad [BB84] and is called BB84, named after the authors and the year it was proposed.

QKD leverages physical mechanisms, so unavoidably we need to discuss the physical mechanisms that underlie/enable BB84, which are based primarily on the polarisation of photons [Wol21, Sec. 1.3.1].

Polarisation

The polarisation of photons specifies the geometrical orientation of the oscillation of its electromagnetic field.

  • Polarisation is linear if the field only oscillates in one direction.
  • Polarisation is circular if the field rotates in a plane as the wave propagates.

We only consider linear polarisation here. For linear polarisation, we distinguish between two bases:

  • rectilinear basis, which includes horizontal and vertical orientations; and
  • diagonal basis, which is essentially the rectilinear basis rotated by ; as shown in Fig. 1.
Fig. 1: Polarisation bases and filters [Wol21, Fig. 1.4].

Consider the effect of polarisation filters depicted in Fig. 1:

  • When a ↕ vertically polarised photon passes through a rectilinear polarisation filter, it is deflected to the right (➡).
  • When a ↔ horizontally polarised photon passes through a rectilinear polarisation filter, it is deflected to the left (⬅).
  • When a diagonally polarised photon passes through a rectilinear polarisation filter, it is equally likely to be deflected to the left and right.

Thus, measuring a diagonally polarised photon in the rectilinear basis, and similarly measuring a vertically/horizontally polarised photon in the diagonal basis, give a random result.

  • We call the rectilinear and diagonal bases mutually conjugate (see Definition 1).

    Definition 1: Conjugate bases

    Two bases are mutually conjugate [BB84; FGG+97] or unbiased [Wol21, p. 9] if each vector of one basis has equal-length projections onto all vectors of the other basis.

  • The Heisenberg uncertainty principle ensures that when making two sequential measurements using conjugate bases, the system is disturbed in such a way that the uncertainty of the measurement outcome is maximised [Woj22, p. 42].

With knowledge of polarisation in mind, let us now discuss the quantum transmission phase of BB84, which involves encoding of classical bits into quantum states, communication over a quantum channel, and decoding of quantum states into classical bits.

Quantum transmission phase

This phase of the protocol involving 👩 Alice and 🧔 Bob goes like this [Wol21, Sec. 1.3.2]:

  1. 👩 Alice chooses a string of random classical bits: .
  2. 👩 Alice chooses a random sequence of rectilinear (Z) bases and diagonal (X) bases; these are called the canonical bases [Dua14, p. 295].
  3. 👩 Alice encodes her bitstring into a collection of photons with basis-dependent polarisation.

    In the rectilinear basis, 0 and 1 are encoded as → and ↑ respectively.

    In the diagonal basis, 0 and 1 are encoded as ↗ and ↖ respectively.

  4. When 🧔 Bob receives the photons, he randomly (and independently of Alice) decides for each photon whether to measure/decode it in the rectilinear or diagonal basis to retrieve the classical bit.
  5. At the end of this quantum transmission phase, 👩 Alice and 🧔 Bob each holds a classical bit string, denoted for Alice and for Bob. and form the raw key pair.

An illustration of the process above can be found Fig. 1.

Fig. 1: In steps 1-3, 👩 Alice and 🧔 Bob engage in the quantum transmission phase, while 😈 Eve eavesdrops on the transmission and attempts to recover the raw key bits. ⚠ The mapping of 0 and 1 in the diagonal basis illustrated here is different from that in the earlier discussion, which follows the original paper [BB84]. In steps 4-5, 👩 Alice and 🧔 Bob engage in the sifting step, discussed in the next section. Diagram from [LCPP22, Fig. 2a].

Since the polarisation state of each photon is a discrete variable, BB84 is an example of a discrete-variable quantum key distribution (DV-QKD) scheme.

BB84 is also an example of a prepare-and-measure protocol, because of the preparation action of 👩 Alice and the measurement action of 🧔 Bob.

Classical post-processing phase

This phase of the protocol involves 👩 Alice and 🧔 Bob exchanging a sequence of classical information in the classical channel to transform their raw key pair into a shared secret key [Wol21, Sec. 1.3.3]:

  1. This is the sifting step (steps 4-5 in Fig. 1):
    • 🧔 Bob publicly announces the bases he has chosen to measure the photons Alice has sent.
    • 👩 Alice compares Bob’s bases to the ones she used and confirms which bases Bob has chosen correctly.
    • 👩 Alice and 🧔 Bob discard all the bits for which the encoding and measurement bases are not the same.
  2. This is the parameter estimation step:
    • 👩 Alice and 🧔 Bob want to compute an estimate of the quantum bit error rate (QBER) in the quantum channel, i.e., the fraction of bits where and differ in the Z and X bases [Gra21, p. 38].
    • For this, 🧔 Bob reveals a random subset of his key bits.
    • In case of no eavesdropping, these bits should be the same as Alice’s bits and 👩 she confirms them.
    • If the QBER is too high, 👩 Alice and 🧔 Bob suspect eavesdropping and abort the protocol.
    • The bits that have been revealed during this step are discarded as their information is now public to eavesdroppers.
  3. Computation of the final key if the error rate is not too high:
    • 👩 Alice and 🧔 Bob perform steps, which were later additions to the original BB84 [BBR88], to correct errors in their keys and increase the secrecy of their key.
    • The first step is error correction (also called information reconciliation), where they erase all errors in their bit strings. After this step, they hold identical strings.

      Direct vs reverse reconciliation [GG02; Djo19, p. 7; PAB+20, Sec. B]

      ▶ Direct reconciliation: 👩 Alice sends correction information and 🧔 Bob corrects his key elements to have the same values as Alice’s.

      • For example, 👩 Alice performs low-density parity check (LDPC) encoding and sends the parity bits to 🧔 Bob, who in turn performs LDPC decoding.
      • Error correction fails when quantum channel loss exceeds 50%.

      ◀ Reverse reconciliation: 🧔 Bob sends correction information and 👩 Alice corrects her key elements to have the same values as Bob’s.

      • For example, 🧔 Bob performs LDPC encoding and sends the parity bits to 👩 Alice, who in turn performs LDPC decoding.
      • Preferred option to direct reconciliation.
      • Provides a usable key when the mutual information of Alice () and Bob () exceeds the mutual information of Bob and Eve (), i.e., ; the difference between these two terms gives the asymptotic secret key rate.
    • The second step is privacy amplification, which is a procedure that minimises Eve’s knowledge of the key.

Table 1 shows an example of an exchange between 👩 Alice and 🧔 Bob in the absence of eavesdropping.

Table 1: An example of an exchange between 👩 Alice and 🧔 Bob in BB84 in the absence of eavesdropping [Wol21, Table 1.2].

For discussion of physical realisations of BB84, follow this knowledge base entry.

Performance and security evaluation

In terms of performance, a basic figure of merit of every QKD protocol is the secret key rate, i.e. the fraction of secure key bits produced per protocol round.

For security, follow this overview of QKD security.

References

[BB84] C. H. Bennett and G. Brassard, Quantum cryptography: Public key distribution and coin tossing, in Proceedings of the International Conference on Computers, Systems & Signal Processing, December 1984, pp. 175–179. Available at https://arxiv.org/abs/2003.06557.
[BBR88] C. H. Bennett, G. Brassard, and J.-M. Robert, Privacy amplification by public discussion, SIAM Journal on Computing 17 no. 2 (1988), 210–229. Available at https://www.proquest.com/docview/919828123.
[Djo19] I. B. Djordjevic, Physical-Layer Security and Quantum Key Distribution, Springer Cham, 2019. https://doi.org/10.1007/978-3-030-27565-5.
[Dua14] F. Duarte, Quantum Optics for Engineers, CRC Press, 2014. https://doi.org/10.1201/b16055.
[ETS18] ETSI, Quantum Key Distribution (QKD); Vocabulary, Group Report ETSI GR QKD 007 v1.1.1, December 2018. Available at https://www.etsi.org/deliver/etsi_gr/QKD/001_099/007/01.01.01_60/gr_qkd007v010101p.pdf.
[FGG+97] C. A. Fuchs, N. Gisin, R. B. Griffiths, C.-S. Niu, and A. Peres, Optimal eavesdropping in quantum cryptography. i. information bound and optimal strategy, Phys. Rev. A 56 no. 2 (1997), 1163–1172. https://doi.org/10.1103/PhysRevA.56.1163.
[Gra21] F. Grasselli, Quantum Cryptography: From Key Distribution to Conference Key Agreement, Quantum Science and Technology, Springer Cham, 2021. https://doi.org/10.1007/978-3-030-64360-7.
[GG02] F. Grosshans and P. Grangier, Reverse reconciliation protocols for quantum cryptography with continuous variables, arXiv preprint quant-ph/0204127, 2002. https://doi.org/10.48550/arXiv.quant-ph/0204127.
[LCPP22] C.-Y. Lu, Y. Cao, C.-Z. Peng, and J.-W. Pan, Micius quantum experiments in space, Rev. Mod. Phys. 94 no. 3 (2022), 035001. https://doi.org/10.1103/RevModPhys.94.035001.
[PAB+20] S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, J. L. Pereira, M. Razavi, J. Shamsul Shaari, M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi, and P. Wallden, Advances in quantum cryptography, Advances in Optics and Photonics 12 no. 4 (2020), 1012–1236. https://doi.org/10.1364/AOP.361502.
[Woj22] F. Wojcieszyn, Introduction to Quantum Computing with Q# and QDK, Quantum Science and Technology, Springer Cham, 2022. https://doi.org/10.1007/978-3-030-99379-5.
[Wol21] R. Wolf, Quantum Key Distribution: An Introduction with Exercises, Springer, Cham, 2021. https://doi.org/10.1007/978-3-030-73991-1.
[WZ82] W. K. Wootters and W. H. Zurek, A single quantum cannot be cloned, Nature 299 no. 5886 (1982), 802–803. https://doi.org/10.1038/299802a0.
Tags:

Picture of Yee Wei Law

BB84: Physical realisations

by Yee Wei Law - Thursday, 26 October 2023, 5:47 PM
 
Acknowledgement: Andrew Edwards contributed some explanation.

Continuing from an overview of BB84, this entry discusses several ways in which BB84 can be realised.

Fig. 1 shows an experimental setup built by IBM [NC10, Box 12.7], where

  • 🧔 Bob generates strong coherent states using a 1.3 μm (near infrared wavelength) diode laser and transmits the states to 👩 Alice 10 km away via an optical fibre.
  • 👩 Alice attenuates the states to generate approximately a single photon, and subsequently polarises the photon to one of , , and .
  • 👩 Alice returns the photon to 🧔 Bob, who measures it using a polarisation analyser in a random basis (either rectilinear or diagonal).
Fig. 1: An experimental setup for BB84 built by IBM [NC10, Box 12.7]. The setup achieved a key bit rate of several hundred bits per second, which is far from practical but it was a start.

For the setup in Fig. 1,

  • The reason for making the photons traverse the optical fibre twice (from Bob to Alice then back to Bob) is to automatically compensate for asymmetry and fluctuations of the medium.
  • The polarisation controller (“Pol Cont” in Fig. 1) is for correcting polarisation drifts in the quantum channel [Sud10, p. 111].
  • The Faraday rotator (“Faraday Rot” in Fig. 1) effects polarisation through the Faraday (rotation) effect; watch demonstration on YouTube.
  • The classical channel of wavelength 1.55 μm is carried over the same optical fibre. Multiplexing of the quantum and classical channels is achieved through the wavelength (division) multiplexers (“WM” in Fig. 1).
  • The polarising beamsplitter (also called polarization beamsplitter, or “PBS” in Fig. 1) plays a crucial role, but let us first look at Thorlabs’ Quantum Cryptography Analogy Demonstration Kit (part number EDU-QCRY1), because the accompanying manual [Tho20] is rich with practical information rarely found elsewhere.

Fig. 2 shows a minimalist block diagram for EDU-QCRY1, while Fig. 3 shows a photo of a physical setup realising the block diagram.

Fig. 2: A minimalist block diagram for Thorlab’s EDU-QCRY1.
Fig. 3: A photo of a physical setup implementing the block diagram in Fig. 2. The silver boxes with a red button are laser electronics. The silver boxes with a green button are sensor electronics. The silver boxes with no button are photon detectors. In EDU-QCRY1, pulsed light sources are used to approximate single-photon sources; see the risk of this approximation in terms of the photon number splitting attack.

Let us study the functions of the PBS in this context:

  • For Alice to send a to Bob, a half-wave plate (HWP, also called λ/2 plate, labelled as “Polarization Rotator” in Fig. 4) is physically rotated to 0°.

    Fig. 4: Transmission from Alice to Bob in the rectilinear basis [Tho20, Figure 2].

    To send a , the HWP is physically rotated by 45° to achieve a polarisation rotation of 90°.

    In general, for linearly polarised light, polarisation is rotated by a value twice as large as the rotation of the HWP.

  • On Bob’s side, a horizontally polarised photon () passes through the PBS, while a vertically polarised photon () gets reflected, as shown:

    Fig. 5: The effect of a PBS cube [Tho20, p. 21].

    Thus, a single-photon detector is needed to detect each state.

  • To support both the rectilinear basis (0° and 90°) and diagonal basis (-45° and 45°), the setup in Fig. 4 is extended to the setup in Fig. 6, where Alice’s polarisation rotator now support four angles in total (, , , ), and Bob gets a polarisation rotator that supports two angles (one for each basis).

    Fig. 6: Transmission from Alice to Bob in two bases (0° and 90°, -45° and 45°) [Tho20, Figure 3].

    Note Bob still needs only two photon detectors, one for each basis state of the selected basis.

  • Eve can be emulated by simply 1️⃣ duplicating the setup for Bob (for intercepting Alice’s photons), and 2️⃣ duplicating the setup for Alice (for “replaying” measured states to Bob); as shown in Fig. 2.

In recent years, satellite-based experiments on BB84 and extensions of BB84 (e.g., decoy-state BB84) had been conducted [LCPP22].

Compared to free space, polarisation is harder to preserve over commercial optical fibres [GK05, Fig. 11.7]. An alternative approach to polarisation is using an interferometer, such as a Mach-Zehnder interferometer; see Fig. 7 and [HIP+21, Sec. 3.2].

Fig. 7: Realising BB84 using an interferometer [GK05, Fig. 11.7]. The shorter and longer paths through the interferometer define the 0 and 1 states. Phase modulators (PM) are positioned within the upper arms of both Bob’s and Alice’s interferometer.

References

[GK05] C. Gerry and P. Knight, Introductory Quantum Optics, Cambridge University Press, 2005. https://doi.org/10.1017/CBO9780511791239.
[HIP+21] C. Hughes, J. Isaacson, A. Perry, R. F. Sun, and J. Turner, Quantum Computing for the Quantum Curious, Springer Cham, 2021. https://doi.org/10.1007/978-3-030-61601-4.
[LCPP22] C.-Y. Lu, Y. Cao, C.-Z. Peng, and J.-W. Pan, Micius quantum experiments in space, Rev. Mod. Phys. 94 no. 3 (2022), 035001. https://doi.org/10.1103/RevModPhys.94.035001.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
[Sud10] M. Suda, QKD Systems, in Applied Quantum Cryptography (C. Kollmitzer and M. Pivk, eds.), Lect. Notes Phys. 797, Springer Berlin Heidelberg, 2010, pp. 71–95. https://doi.org/10.1007/978-3-642-04831-96.
[Tho20] Thorlabs, EDU-QCRY1 EDU-QCRY1/M: Quantum Cryptography Demonstration Kit: Manual, December 2020. Available at https://www.thorlabs.com/_sd.cfm?fileName=MTN005660-D02.pdf&partNumber=EDU-QCRY1.
Tags:

Picture of Yee Wei Law

Bell states

by Yee Wei Law - Thursday, 8 June 2023, 11:31 PM
 

Consider the circuit below, where a Hadamard gate is connected to qubit and a controlled-NOT (CNOT) gate is connected to after the Hadamard gate:

Fig. 1: Quantum circuit for generating Bell states.

The Hadamard gate in Fig. 1 effects the transformations: and .

The CNOT gate in Fig. 1 has its control qubit connected to the line, and its target qubit connected to the line.

The unitary matrix representing the CNOT gate is

If the input to the CNOT gate is the state , then the output is

Thus, as an example, if the input is , then the Hadamard gate transforms it to , and the CNOT gate further transforms it to

Table 1 is the truth table summarising the outputs corresponding to basis-state inputs.

Table 1: Truth table for quantum circuit in Fig. 1.
Input Output

The output states in Table 1 are called the Bell states or Einstein-Podolsky-Rosen (EPR) pairs [KLM07, p. 75; NC10, Sec. 1.3.6], and can be represented concisely as

When the Bell states are used as an orthonormal basis, they are called the Bell basis [Wil17, pp. 91-93].

References

[KLM07] P. Kaye, R. Laflamme, and M. Mosca, An Introduction to Quantum Computing, Oxford University Press, 2007. Available at https://ebookcentral.proquest.com/lib/ unisa/reader.action?docID=415080.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
[Wil17] M. M. Wilde, Quantum Information Theory, 2nd ed., Cambridge University Press, 2017. https://doi.org/10.1017/9781316809976.
Tags:

Picture of Yee Wei Law

Bloch sphere

by Yee Wei Law - Thursday, 24 August 2023, 12:24 PM
 

Consider the ket vector , where and are complex-valued probability amplitudes, and are the computational bases.

We can express and in the exponential form [Wil17, (3.6)]:

we can rewrite as

where is related to and by:

Thus, given , we can rewrite it in the physically equivalent form:

where , , . Note:

💡 Above, is used instead of because for visualisation using a Bloch sphere (more on this later), as ranges from 0 to , the values of and are confined within to ensure the qubit representation is unique [Wil17, p. 57].

So what is a Bloch sphere?

Named after physicist Felix Bloch, a Bloch sphere is a unit-radius sphere for visualising a qubit relative to the computational basis states.

Fig. 1: Ket-vector visualised in a Bloch sphere featuring computational basis states and [Wil17, Figure 3.2].

As shown in Fig. 1,

  • The north and south poles are typically chosen to represent and respectively, or the spin-up and spin-down states of an electron respectively.
  • Orthogonal states like and do not appear to be geometrically orthogonal in a Bloch sphere.
  • The angles and represent the polar and azimuthal angles respectively [Le 06, Sec. 3.1].
  • The , and coordinates of a ket vector on the Bloch sphere are not as meaningful.
  • Every point on the equator represents an equally weighted superposition of and .

As explained in Fig. 2, a sphere provides the necessary number of degrees of freedom to represent a ket vector.

Fig. 2: Why Bloch sphere?

The equator of a Bloch sphere enables the representation of complementary bases. For example, in Fig. 3,

  • (, undetermined) and (, undetermined) represent the basis states for linear polarisations along two perpendicular axes [Le 06, p. 12].
  • (, ) and (, ) represent the basis states for circular polarisation, [Le 06, p. 33].
  • and are complementary bases, which play a crucial role in quantum key distribution.
Fig. 3: A Bloch sphere featuring photon polarisation bases , and [Le 06, Figure 3.1]

References

[Le 06] M. Le Bellac, A Short Introduction to Quantum Information and Quantum Computation, Cambridge University Press, 2006. https://doi.org/10.1017/CBO9780511755361.
[Wil17] M. M. Wilde, Quantum information theory, 2nd ed., Cambridge University Press, 2017. https://doi.org/10.1017/9781316809976.
Tags:

C

Picture of Yee Wei Law

Coherent attack

by Yee Wei Law - Tuesday, 29 August 2023, 5:25 PM
 

The discussion here follows from the discussion of collective attacks.

Tags:

Picture of Yee Wei Law

Coherent state

by Yee Wei Law - Thursday, 26 October 2023, 4:16 PM
 

A coherent state is a special quantum state that a coherent laser ideally emits [Wil07, p. 19].

That 👆 does not say much, but there is no straightforward way to define “coherent state”, a concept introduced by Schrödinger [SZ97, p. 46].

Mathematically and in short, a coherent state is the eigenstate of the positive frequency part of the electric field operator [SZ97, p. 46], but this requires definition of the electric field operator, which in turn requires discussion of the quantization of electromagnetic fields.

Classically, an electromagnetic field consists of waves with well-defined amplitude and phase, but in quantum mechanics, this is no longer true.

More precisely, there are fluctuations in both the amplitude and phase of the field [SZ97, Ch. 2].

coherent state is a state that has the same fluctuations of quadrature amplitudes as the vacuum state but which possibly has nonzero average quadrature amplitudes [Van06, Sec. 4.6.1].

References

[GK05] C. Gerry and P. Knight, Introductory Quantum Optics, Cambridge University Press, 2005. https://doi.org/10.1017/CBO9780511791239.
[SZ97] M. O. Scully and M. S. Zubairy, Quantum Optics, Cambridge University Press, 1997. https://doi.org/10.1017/CBO9780511813993.
[Van06] G. Van Assche, Quantum Cryptography and Secret-Key Distillation, Cambridge University Press, 2006. https://doi.org/10.1017/CBO978051161.
[Wil07] M. M. Wilde, Quantum Information Theory, 2nd ed., Cambridge University Press, 2017. https://doi.org/10.1017/9781316809976.
Tags:

Picture of Yee Wei Law

Collective attack

by Yee Wei Law - Tuesday, 29 August 2023, 5:24 PM
 

The discussion here follows from the discussion of individual attacks.

In a collective attack [Sch10],

  • Eve prepares an ancilla state for each signal coming from Alice and lets it interact with the signal.

  • Eve passes Alice’s signal on to Bob.

References

[ETS18] ETSI, Quantum Key Distribution (QKD); Vocabulary, Group Report ETSI GR QKD 007 v1.1.1, December 2018. Available at https://www.etsi.org/deliver/etsi_gr/QKD/001_099/007/01.01.01_60/gr_qkd007v010101p.pdf.
[Sch10] S. Schauer, Attack Strategies on QKD Protocols, in Applied Quantum Cryptography (C. Kollmitzer and M. Pivk, eds.), Lect. Notes Phys. 797, Springer Berlin Heidelberg, 2010, pp. 71–95. https://doi.org/10.1007/978-3-642-04831-9_5.
[Wol21] R. Wolf, Quantum Key Distribution: An Introduction with Exercises, Springer, Cham, 2021. https://doi.org/10.1007/978-3-030-73991-1.
Tags:

Picture of Yee Wei Law

Composite quantum systems

by Yee Wei Law - Tuesday, 10 October 2023, 9:36 AM
 

Consider a multi-qubit system consisting of two qubits. There are four possible final states: ; and it makes sense to express the quantum state of this two-qubit system as the linear combination:

where the normalisation rule still applies:

An alternative representation of is

where the subscript indicates the order of the system.

Some authors call the set , and equivalently , the tensor base [Des09, p. 316].

Watch Microsoft Research’s presentation on “Quantum Computing for Computer Scientists”:

In the vector representation, given two separated qubits:

their collective state can be expressed using the Kronecker product (also called the matrix direct product and tensor product):

Multiple shorthands exist for : 1️⃣ , 2️⃣ , 3️⃣ [Mer07, p. 6; NC10, Sec. 2.1.7]; we have used the third shorthand earlier.

In general, we can compose the Hilbert space of a multi-qubit system using the vector space direct product (also called tensor direct product) of lower-dimensional Hilbert spaces [NC10, Sec. 2.1.7]:

  • The vector space direct product is a specialisation of the direct product, and should be differentiated from Kronecker product because the latter operates on vectors and matrices.
  • Suppose and are Hilbert spaces of dimensions and respectively, then (read “ tensor ”) is an -dimensional Hilbert space.
  • Suppose and are othonormal bases for and respectively, then is a basis for .
  • Thus the elements of are linear combinations of the tensor products of the orthonormal bases for and . For example, suppose is a two-dimensional Hilbert space with basis vectors and , then every element of is a linear combination of , , and .
  • Suppose and is a linear operator on . Similarly, suppose and is a linear operator on . Then we can define the composite linear operator on by:

    The above implies

    Some authors write to differentiate (representing a Kronecker product) from (representing a direct product) [Zyg18, p. 16].

  • Inner product in is defined as

Classical-quantum state

In quantum cryptography, we often encounter states that are partially classical and partially quantum.

A classical state (c-state for short) is a state defined by a density matrix that is diagonal in the standard basis of the -dimensional state space of , i.e., has the form:

where .

Suppose we prepare the following states for Alice and Bob: with probability 1/2, we prepare and with probability 1/2, we prepare . Then, the joint state is the so-called classical-quantum state (cq-state for short):

In quantum-cryptographic convention,

  • typically denotes some (partially secret) classical string that Alice creates during a quantum protocol,
  • denotes a classical register (in fact, the symbols are reserved for classical registers),
  • denotes a quantum register, and
  • denotes some quantum information that an adversary may have gathered during the protocol, and which may be correlated with the string .

Formally,

Definition 1: Classical-quantum state (cq-state) [WN17, Definition 1.4.2]

A classical-quantum state (cq-state) takes the form

If is absent, then is simply a classical state.

References

[Des09] E. Desurvire, Classical and Quantum Information Theory: An Introduction for the Telecom Scientist, Cambridge University Press, 2009. https://doi.org/10.1017/CBO9780511803758.
[Mer07] N. D. Mermin, Quantum Computer Science: An Introduction, Cambridge University Press, 2007. https://doi.org/10.1017/CBO9780511813870.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
[WN17] S. Wehner and N. Ng, Lecture Notes: edX Quantum Cryptography, CaltechDelftX: QuCryptox, 2017. Available at https://courses.edx.org/courses/course-v1:CaltechDelftX+QuCryptox+3T2018/pdfbook/0/.
[Zyg18] B. Zygelman, A First Introduction to Quantum Computing and Information, Springer Cham, 2018. https://doi.org/10.1007/978-3-319-91629-3.

E

Picture of Yee Wei Law

Entropy

by Yee Wei Law - Monday, 27 March 2023, 3:15 PM
 

The following introduces Shannon entropy before von Neumann entropy.

Shannon entropy

The Shannon entropy of a random variable, say , measures the uncertainty of .

Intuition:

  • Minimum entropy occurs when takes on a specific value at probability 1. Let us say entropy is 0 in this case.
  • Maximum entropy occurs when takes on one of different values at equal probability. Let us say entropy is bits in this case, because we need bits to represent all possible outcomes in binary.

The following definition of entropy, denoted by , measured in number of bits, can reflect the two extreme cases above [MC12, Definition 5.4]:

where denotes the probability of taking on the th value.

Note: 1️⃣ ; 2️⃣ number of bits is discrete in practice but as a metric of comparison, we need entropy to be a continuous-valued metric.

If has possible values, and has , the joint entropy of and is defined as [MC12, Definition 6.2]:

The conditional entropy of given is defined as [MC12, (6.53)]:

The chain rule for entropy states [MC12, p. 151; Gra21, (2.48)]:

or more generally,

Von Neumann entropy

The Shannon entropy measures the uncertainty associated with a classical probability distribution.

Quantum states are described in a similar fashion, with density operators replacing probability distributions.

The von Neumann entropy of a quantum state, , is defined as [NC10, Sec. 11.3]:

where denotes the base-2 logarithm of and not the element-wise application of base-2 logarithm to .

Watch an introduction to the matrix logarithm on YouTube:

If are the eigenvalues of , then

References

[Gra21] F. Grasselli, Quantum Cryptography: From Key Distribution to Conference Key Agreement, Quantum Science and Technology, Springer Cham, 2021. https://doi.org/10.1007/978-3-030-64360-7.
[MC12] S. M. Moser and P.-N. Chen, A Student’s Guide to Coding and Information Theory, Cambridge University Press, 2012. Available at https://ebookcentral.proquest.com/lib/unisa/reader.action?docID=833494.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.

F

Picture of Yee Wei Law

Fidelity

by Yee Wei Law - Sunday, 3 September 2023, 8:55 AM
 

This entry continues from discussion of trace distance.

[Des09, (22.8)].

[Hay17, Sec. 3.1.2 and Sec. 8.2].

[Le 06, (7.20)].

[Dio11, (6.19)].

[NC10, (9.2)].

[BS98, Sec. II].

References

[BS98] C. Bennett and P. Shor, Quantum information theory, IEEE Transactions on Information Theory 44 no. 6 (1998), 2724–2742. https://doi.org/10.1109/18.720553.
[Des09] E. Desurvire, Classical and Quantum Information Theory: An Introduction for the Telecom Scientist, Cambridge University Press, 2009. https://doi.org/10.1017/CBO9780511803758.
[Dio11] L. Diosi, A Short Course in Quantum Information Theory: An Approach From Theoretical Physics, second ed., Springer Berlin, Heidelberg, 2011. https://doi.org/10.1007/978-3-642-16117-9.
[Hay17] M. Hayashi, Quantum Information Theory: Mathematical Foundation, second ed., Springer Berlin, Heidelberg, 2017. https://doi.org/10.1007/978-3-662-49725-8.
[Le 06] M. Le Bellac, A Short Introduction to Quantum Information and Quantum Computation, Cambridge University Press, 2006. https://doi.org/10.1017/CBO9780511755361.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
Tags:

G

Picture of Yee Wei Law

Galois field / finite field

by Yee Wei Law - Sunday, 20 August 2023, 4:11 PM
 
Tags:

Picture of Yee Wei Law

Group theory

by Yee Wei Law - Sunday, 20 August 2023, 4:05 PM
 
Tags:

I

Picture of Yee Wei Law

Idempotence

by Yee Wei Law - Wednesday, 22 March 2023, 10:45 PM
 

A square matrix, , is idempotent if it is equal to its square, i.e., [Ber18, Definition 4.1.1].

Notable properties:

  • Every idempotent matrix is necessarily a projector [Mey00, (5.9.13)].
  • is idempotent [Ber18, Proposition 8.1.7].
  • is idempotent eigenvalues of are either 0 or 1 [Loc08].

References

[Ber18] D. S. Bernstein, Scalar, Vector, and Matrix Mathematics: Theory, Facts, and Formulas - Revised and Expanded Edition, Princeton University Press, 2018. https://doi.org/10.1515/9781400888252.
[Loc08] R. Lockhart, General theory, STATISTICS 350: Linear Models in Applied Statistics, 2008. Available at https://www.sfu.ca/~lockhart/richard/350/08_2/lectures/Theory/web.pdf.
[Mey00] C. Meyer, Matrix Analysis and Applied Linear Algebra, SIAM, 2000. Available at http://portal.igpublish.com.eu1.proxy.openathens.net/iglibrary/obj/SIAMB0000114.

Picture of Yee Wei Law

Individual attack

by Yee Wei Law - Tuesday, 29 August 2023, 11:25 PM
 

The discussion here continues from the discussion of security of quantum key distribution (QKD).

QKD is a method for generating and distributing symmetric cryptographic keys with information-theoretic security based on quantum information theory [ETS18].

In a QKD protocol,

  • 👩 Alice and 🧔 Bob attempt to establish a secret symmetric key between themselves.
  • 😈 Eve attempts to find out about this secret key.

😈 Eve’s attempt to discover the secret key can be classified into 1️⃣ individual attack (discussed below), 2️⃣ collective attack, and 3️⃣ coherent attack; in 🔼 increasing order of power given to Eve.

Individual attacks are the simplest and most studied class of attacks.

When conducting an individual attack, Eve interacts with each signal (i.e., quantum state) from Alice individually, and is restricted to the same interaction for all Alice’s signals [Sch10, Wol21].

  • Some strategies rely on the fact that Eve is able to postpone her interaction with Alice’s signal until after sifting and error correction, or as long as she wants, to obtain the maximum amount of information from Alice’s and Bob’s public interaction.
  • In some other strategies, Eve measures the state instantly and uses the information from sifting and error correction later on.

Regardless, Eve has the freedom to choose which unitary operation she applies to a composite system (“composite” because more than one qubit is involved).

Of interest is the amount of information about a single state that Eve gains with an attack. A standard measure of amount of information is mutual information.

Perhaps the most intuitive example of an individual attack is the intercept and resend (I&R) attack [Sch10, Sec. 5.2.1].

References

[ETS18] ETSI, Quantum Key Distribution (QKD); Vocabulary, Group Report ETSI GR QKD 007 v1.1.1, December 2018. Available at https://www.etsi.org/deliver/etsi_gr/QKD/001_099/007/01.01.01_60/gr_qkd007v010101p.pdf.
[Sch10] S. Schauer, Attack Strategies on QKD Protocols, in Applied Quantum Cryptography (C. Kollmitzer and M. Pivk, eds.), Lect. Notes Phys. 797, Springer Berlin Heidelberg, 2010, pp. 71–95. https://doi.org/10.1007/978-3-642-04831-9_5.
[Wol21] R. Wolf, Quantum Key Distribution: An Introduction with Exercises, Springer, Cham, 2021. https://doi.org/10.1007/978-3-030-73991-1.
Tags:

K

Picture of Yee Wei Law

Kraus operator and Kraus representation

by Yee Wei Law - Tuesday, 18 April 2023, 9:17 AM
 

L

Picture of Yee Wei Law

Linear operator

by Yee Wei Law - Wednesday, 23 August 2023, 11:11 PM
 

Let and be vector spaces. The mapping is called a linear transformation if and only if

for every choice of and scalar .

When , is called a linear operator [DG09, p. 202].

References

[DG09] J. DeFranza and D. Gagliardi, Introduction to Linear Algebra with Applications, Waveland Press, Inc., 2009.

Picture of Yee Wei Law

Lipschitzness, Lipschitz condition

by Yee Wei Law - Wednesday, 21 June 2023, 8:57 AM
 

Mathematical programming (theory-based optimisation methods as opposed to heuristics) works best with differentiable cost/loss functions.

Mathematical programming also works with continuous loss functions [Byr15].

Differentiability implies continuity but the converse is not true, so continuity is a weaker condition than differentiability. For example, piecewise continuous functions are not differentiable at all points.

Lipschitzness is a particular form of continuity. Strictly speaking, Lipschitzness is a form of uniform continuity:

Definition 1: Lipschitzness [SSBD14, Definition 12.6]

Let . A function (in general, a mapping from one normed vector space to another) is -Lipschitz (continuous) over if for every , we have that

The preceding equation expresses the Lipschitzness or the Lipschitz condition of function .

It follows from the definition above that if the derivative of is everywhere bounded in absolute value by , then is -Lipschitz.

Example 1 [SSBD14, Example 12.4]

The function is 1-Lipschitz over because for every , the triangular inequality tells us

and similarly,

The two preceding equations combined give us .

References

[Byr15] C. L. Byrne, A First Course in Optimization, CRC Press, 2015. https://doi.org/10.1201/b17264.
[SSBD14] S. Shalev-Shwartz and S. Ben-David, Understanding Machine Learning: From Theory to Algorithms, Cambridge University Press, 2014. https://doi.org/10.1017/CBO9781107298019.

M

Picture of Yee Wei Law

Mutual information

by Yee Wei Law - Monday, 27 March 2023, 3:18 PM
 

The following introduces classical mutual information before quantum mutual information.

Classical mutual information

Consider the channel model of a transmission system in Fig. 1.

Fig. 1: Channel model of a transmission system [MC12, Figure 6.3]. The input has possible values from the set . The output has possible values from the set .

Since the input takes a certain value at a certain probability, the input is a discrete random variable, which we denote by .

Suppose the sender transmits the th input symbol as at a probability of , this probability is called the prior probability of .

“Prior probability” is often written in Latin as “a priori probability”.

Suppose the receiver receives as the th output symbol, the probability of this output conditioned on the th input being is the likelihood of : .

However in most cases, we are more interested in the posterior probability of : , i.e., what is the probability that the th input is given the th output is .

“Posterior probability” is often written in Latin as “a posteriori probability”.

The posterior probability helps us determine the amount of information that can be inferred about the input when the output takes a certain value.

The information gain or uncertainty loss about input upon receiving output is the mutual information of and , denoted by [MC12, pp. 126-127].

  • is thus the uncertainty in before receiving minus the uncertainty in after receiving .
  • The uncertainty in before receiving , measured in number of bits, is .
  • The uncertainty in after receiving , measured in number of bits, is .
  • Thus,

  • By Bayes’ Theorem, , so

    i.e., provides as much information about as does about .

If the events and are independent, what is ?

Extending the result above from to and from to , we define the system/average mutual information of and , denoted by , as the information gain or uncertainty loss about random variable by observing random variable [MC12, Definition 6.7]:

It is trivial to show that 1️⃣ , 2️⃣ , 3️⃣ iff and are independent.

Omitting the derivation in [MC12, p. 129],

where denotes the Shannon entropy of .

Fig. 1 depicts the relation between mutual information and different entropies.

Fig. 1: Relation among entropy, joint entropy, conditional entropy and mutual information [MC12, Figure 6.5].

Quantum mutual information

Quantum mutual information is mutual information where the entropy is von Neumann entropy instead of Shannon entropy.

References

[MC12] S. M. Moser and P.-N. Chen, A Student’s Guide to Coding and Information Theory, Cambridge University Press, 2012. Available at https://ebookcentral.proquest.com/lib/unisa/reader.action?docID=833494.

P

Picture of Yee Wei Law

Photon number splitting attack

by Yee Wei Law - Sunday, 11 February 2024, 4:09 PM
 

References

[BLMS00] G. Brassard, N. Lütkenhaus, T. Mor, and B. C. Sanders, Limitations on practical quantum cryptography, Phys. Rev. Lett. 85 no. 6 (2000), 1330–1333. https://doi.org/10.1103/PhysRevLett.85.1330.
[L00] N. Lütkenhaus, Security against individual attacks for realistic quantum key distribution, Phys. Rev. A 61 no. 5 (2000), 052304. https://doi.org/10.1103/PhysRevA. 61.052304.

Picture of Yee Wei Law

Positive operator-valued measure (POVM)

by Yee Wei Law - Sunday, 24 December 2023, 11:35 AM
 

The positive operator-valued measure (POVM) is a mathematical formalism/tool representing a measurement operation [NC10, Sec. 2.2.6; WN17, Sec. 1.5.1] that satisfies Postulate 3.

Suppose a measurement described by measurement operators , where takes value from a finite set, is performed on a quantum system in the state , then the probability of outcome is given by

Suppose we define

then satisfies 1️⃣ the completeness relation and 2️⃣ is positive-semidefinite.

  • The general equality for some density matrix is known as the POVM version of the Born rule.
  • The operators are called the POVM elements associated with the measurement.
  • The complete set is known as a POVM.
Example 1 [NC10, p. 92]

Suppose Alice gives Bob a qubit prepared in one of two states:

Here is a measurement strategy for Bob to determine unequivocally whether he receives or . Define:

Clearly satisfy the completeness relation, and by checking the definition of positive semidefiniteness, we can verify to be positive operators, so form a POVM.

Let us now see how Bob can use to distinquish between and :

  • Since whereas , getting a measurement outcome associated with implies Bob must have received .
  • Since whereas , getting a measurement outcome associated with implies Bob must have received .
  • Receiving a measurement outcome associated with however precludes Bob from inferring anything about the identity of the state he receives.

Using , Bob never mistakes for and vice versa, but Bob sometimes cannot determine which state he receives.

Example 2 [WN17, Example 1.5.1]

Denote by an orthonormal basis.

Define (a projector), and , then for each ,

where is a matrix with the basis vectors as columns. The linear independence of the basis vectors implies is nonsingular, and

In other words, satisfies the completeness relation.

Given a quantum state , we should expect , and indeed

At this point, we can call a POVM.

When the POVM elements are projectors, such as in the preceding example, the POVM is called a projection-valued measure (PVM) [Hay17, p. 7].

Watch edX Lecture 1.6 “Generalized measurements” of Quantum Cryptography by CaltechDelftX QuCryptox.

References

[Hay17] M. Hayashi, Quantum Information Theory: Mathematical Foundation, second ed., Springer Berlin, Heidelberg, 2017. https://doi.org/10.1007/978-3-662-49725-8.
[KLM07] P. Kaye, R. Laflamme, and M. Mosca, An Introduction to Quantum Computing, Oxford University Press, 2007. Available at https://ebookcentral.proquest.com/lib/unisa/reader.action?docID=415080.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
[Qis21] Qiskit, The density matrix and mixed states, Qiskit textbook, June 2021. Available at https://learn.qiskit.org/course/quantum-hardware/density-matrix.
[WN17] S. Wehner and N. Ng, Lecture Notes: edX Quantum Cryptography, CaltechDelftX: QuCryptox, 2017. Available at https://courses.edx.org/courses/course-v1:CaltechDelftX+QuCryptox+3T2018/pdfbook/0/.

Picture of Yee Wei Law

Positive semidefiniteness and positive definiteness

by Yee Wei Law - Monday, 17 April 2023, 3:51 PM
 

For Hermitian matrix , the following statements are equivalent, and any one can serve as the definition of the positive definiteness of [Mey00, Sec. 7.6; Woe16, Sec. 7.4]:

  • , for all . Note is called a quadratic form.

    In Dirac notation, , for all . Note .

  • The eigenvalues of are all positive.
  • can be put in the form or , where is a nonsingular matrix.

Similarly, the following statements are equivalent, and any one can serve as the definition of the positive semidefiniteness of :

  • , for all .

    In Dirac notation, , for all .

  • The eigenvalues of are all nonnegative.

References

[Woe16] H. Woerdeman, Advanced Linear Algebra, CRC Press, 2016. https://doi.org/10.1201/b18994.
[Mey00] C. Meyer, Matrix Analysis and Applied Linear Algebra, SIAM, 2000. Available at http://portal.igpublish.com.eu1.proxy.openathens.net/iglibrary/obj/SIAMB0000114.

Picture of Yee Wei Law

Projective measurement

by Yee Wei Law - Sunday, 4 June 2023, 12:31 PM
 

The discussion here follows from the discussion of the positive operator-valued measure (POVM).

The POVM cannot be used to determine the post-measurement state because the post-measurement state may not be pure [WN17, p. 13]. Instead, a Kraus operator representation of the POVM, known as projective measurement, is necessary to specify the post-measurement state.

Projective measurements are repeatable, and the outcome observed as a result of projective measurement is deterministic [MM12, Sec. 2.7], as explained below.

This repeatability implies many important measurements in quantum mechanics are not projective measurements; for instance, if we use a silvered screen to measure the position of a photon, we destroy the photon in the process, and obviously this measurement cannot be repeated.

Projective measurements are often discussed in terms of an observable, which is defined as a Hermitian operator acting on the state space of a system.

Every observable has a spectral decomposition [Mey00, p. 517]:

where are the eigenvalues of , and are so-called spectral/orthogonal projectors onto the null space of . More precisely, 1️⃣ are Hermitian and idempotent, 2️⃣ , and 3️⃣ are mutually orthogonal.

Clearly, are valid POVM elements.

A (non-unique) Kraus operator representation or Kraus decomposition of is defined as [WN17, Definition 1.5.2]:

where .

  • If we define , then .
  • If we define , where is any unitary matrix, then .
  • Thus, there is no unique Kraus representation/decomposition.

With Kraus operators, we can now define projective measurement:

Definition 1: Projective measurement [WN17, Definition 1.5.4; MM12, p. 153]

A projective measurement is given by a set of orthogonal projectors  such that . By default, the Kraus operator is chosen to be .

The probability of observing measurement outcome given initial state is

The post-measurement state is

For pure state , the post-measurement state is

Most authors equate the term “von Neumann measurement” to “projective measurement”, but some consider the former to be a special case of the latter [KLM07, p.50].

Since the default Kraus operators are the same as the orthogonal projectors, most authors skip discussion of Kraus operators altogether 🤷‍♂️.

Measuring the observable is equivalent to performing a projective measurement with respect to the decomposition , where the measurement outcome corresponds to eigenvalue .

Example 1 [KLM07, Example 3.4.1]

Consider the Pauli observable , i.e., the Pauli-Z operator/matrix:

which does not change an input of , but flips to (which is equivalent to with a phase change).

The Pauli-Z operator acts as a NOT operator in the Hadamard basis.

has eigenpairs and , where the eigenvectors and are also called eigenstates [MM12, p. 338].

Thus, has spectral decomposition:

with orthogonal projectors

Interpreting the above, a projective measurement of is a measurement in the standard basis with eigenvalue corresponding to final state and eigenvalue corresponding to final state .

Example 2 [WN17, Example 1.5.3]

Given a two-qubit state , suppose we want to measure the parity of the two qubits in the standard basis.

One method is to measure in the (-dimensional) standard basis, obtain two classical bits, and take their parity.

In this case, the probability of obtaining outcome “even” is

and the post-measurement state is

Another method is to measure the parity using projective measurement which directly projects onto the relevant subspaces, without measuring the qubits individually. Define projectors:

which we can quickly verify to be orthogonal and conformant with the completeness relation:

In this case, the probability of getting outcome “even” is

which is the same as before; and the post-measurement state is

The preceding two methods produce different outcomes on the EPR state , or in density-matrix representation,

By measurement in the standard basis, the probability of getting outcome “even” is

while the post-measurement state is

By projective measurement, is the same as before, but the post-measurement state is different:

Thus, projective measurement with does not change the EPR state.

This is one of the main advantages of using projective measurement as opposed to basis measurement: the former enables simple computation (e.g., parity) on multi-qubit states without fully “destroying” the state, as basis measurement does.

In Example 2, the observation that the projective measurement preserves the quantum state is not a coincidence. In fact, building on Definition 1, applying measurement to , i.e., applying to twice gives us [MM12, p. 153]:

where .

References

[KLM07] P. Kaye, R. Laflamme, and M. Mosca, An Introduction to Quantum Computing, Oxford University Press, 2007. Available at https://ebookcentral.proquest.com/lib/unisa/reader.action?docID=415080.
[MM12] D. C. Marinescu and G. M. Marinescu, Classical and Quantum Information, Elsevier, 2012. https://doi.org/10.1016/C2009-0-64195-7.
[Mey00] C. Meyer, Matrix Analysis and Applied Linear Algebra, SIAM, 2000. Available at http://portal.igpublish.com.eu1.proxy.openathens.net/iglibrary/obj/SIAMB0000114.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
[WN17] S. Wehner and N. Ng, Lecture Notes: edX Quantum Cryptography, CaltechDelftX: QuCryptox, 2017. Available at https://courses.edx.org/courses/course-v1:CaltechDelftX+QuCryptox+3T2018/pdfbook/0/.

Picture of Yee Wei Law

Projector

by Yee Wei Law - Sunday, 24 December 2023, 11:33 AM
 

A matrix is a projector if it is 1️⃣ Hermitian and 2️⃣ idempotent [Ber18, Definition 4.1.1].

References

[Ber18] D. S. Bernstein, Scalar, Vector, and Matrix Mathematics: Theory, Facts, and Formulas - Revised and Expanded Edition, Princeton University Press, 2018. https://doi.org/10.1515/9781400888252.

Picture of Yee Wei Law

Pure state, mixed state, density operator/matrix

by Yee Wei Law - Sunday, 11 February 2024, 5:51 PM
 

As defined in Practical 1 of COMP 5074, a qubit is a quantum state with two possible outcomes. Mathematically, a qubit is a two-dimensional Hilbert space.

A pure state is the quantum state of a qubit that we can precisely define at any point in time [Qis21, Sec. 1].

  • For example, a qubit, say , that started out as becomes when it passes through a Hadamard gate.
  • When we measure in the computational basis (Z-basis), we get at a probability of 0.5, or at the same probability.
  • Regardless of our measurement, in the ideal condition, we can say with absolute certainty that has quantum state , and is an example of a pure state.

In non-ideal conditions, a qubit can assume a certain quantum state at a certain probability, and other quantum states at other probabilities, regardless of measurements.

  • For example, consider the two-qubit entangled state in Fig. 1:

    where the subscripts and label the qubits associated with registers and respectively.

    Fig. 1: A two-qubit entangled state [Qis21, Sec. 2].
  • Since the qubits of and are entangled, measuring a in causes to be measured in . Similarly, measuring a in causes to be measured in .
  • Equivalently, the qubit of , namely , assumes values and at equal probability.
  • However, this is NOT to say is a superposition of and , i.e., we CANNOT express as .
  • is a mixture or ensemble of the states and [KLM07, Sec. 3.5].
  • is an example of a mixed state, i.e., a statistical ensemble of quantum states [Qis21, Sec. 2].

A direct but rather clunky representation of a mixed state is the set of pairs:

where each pair means the pure state appears at probability , for . Note .

A more compact and useful representation of a mixed state can be obtained from the type of Hilbert-space operators called density operators [KLM07, Sec. 3.5.1].

  • The matrix representation of a density operator is a density matrix.
  • The density matrix representing the pure state is defined as the outer product

  • The density matrix representing the mixed state is defined as the weighted sum of outer products:

    Note do not need to be basis states.

    Example 1

    Revisiting the example in Fig. 1, the density matrix of is thus

  • It is important to know the effect of measuring a mixed state.

    Suppose the pure state , where , is measured in the computational (Z) basis, then the probability of getting as the measurement outcome is [WN17, Sec. 1.2.1]:

    Similarly, the probability of getting as the measurement outcome is .

    Now suppose we are measuring the mixed state . By the law of total probability, the probability of getting is now 

    Similarly, the probability of getting is .

    Thus in general, the probability of measuring mixed state and getting basis vector is

    Example 2

    Continuing from Example 1, let us find out the probability of getting when is measured in the Hadamard (X) basis.

    The probability of getting is

    Similarly, the probability of getting is .

    In case there is any confusion that mixed state is equivalent to , consider what happens when is measured in the X basis: the measurement outcome is simply at a probability of 1.

    Example 3
    [Leo10, Sec. 1.2]
  • A quick way to test whether a density matrix represents a pure state or a mixed state is to use the trace operator [Gra21, p. 11; NC10, Theorem 2.5]:

    represents a pure state if .

    represents a mixed state if .

    is positive-semidefinite (i.e., is a positive operator) and for any density matrix .

    A useful property of is available through the observation that since is a scalar,

    for matrix and ket . Applying the cyclic property of , we get , and consequently [WN17, Exercise 1.2.3]:

    (1)

If the explanation above is hard to grasp, see if edX Lecture 1.2 “The density matrix” of Quantum Cryptography by CaltechDelftX QuCryptox helps.

When applied with unitary operator , state evolves into . Accordingly, the density matrix of the mixed state evolves into

Our adventure with the trace operator continues because an important application of the trace operator is determining the probability of getting result when applying measurement operator to mixed state .

By definition, the probability of getting result given initial state is [NC10, p. 99]:

The last equality is due to Eq. (1). By the law of total probability,

Omitting the derivation in [NC10, pp. 99-100], the density matrix of the system after making measurement and obtaining result is:

By the law of total probability,

implying

which is called the completeness equation. ⚠ Note is unitary if and only if has one value.

Postulates of quantum mechanics

Using the language of the density operator, we can phrase the fundamental postulates of quantum mechanics as [NC10, pp. 98-102; Gra21, p. 11-12]:

Postulate 1: Associated with any isolated physical system is a complex-valued Hilbert space known as the state space of the system. The system is completely described by its density operator, which is a positive operator with trace one, acting on the state space of the system. If a quantum system is in the state (in density-matrix, not ket notation) with probability , then the density operator for the system is .

Postulate 2: The evolution of a closed quantum system is described by a unitary transformation. That is, the state of the system at time is related to the state of the system at time by a unitary operator , which depends only on the times and : .

Postulate 3 (aka Measurement Postulate): Quantum measurements are described by a collection of measurement operators. These are operators acting on the state space of the system being measured. The index refers to the measurement outcomes that may occur in the experiment. If the state of the quantum system is immediately before the measurement then the probability that result occurs is given by

and the state of the system after the measurement is

The measurement operators satisfy the completeness equation:

Postulate 4: The state space of a composite physical system is the tensor product of the state spaces of the component physical systems. Moreover, if we have systems numbered 1 through , and system number is prepared in the state , then the joint state of the total system is .

Postulate 3 defines general/generalised measurement [NC10, Box 2.5], which consists of 1️⃣ a rule describing the probabilities of different measurement outcomes, and 2️⃣ a rule describing the post-measurement state.

  • For applications where measurement is made once at the conclusion of some experiment, the main items of interest are the probabilities rather than the post-measurement state. For these applications, the mathematical tool of positive operator-valued measure (POVM) is applicable.
  • To determine the post-measurement state but in a way that the measurement is repeatable and the outcome is deterministic, we use projective measurement.

References

[Gra21] F. Grasselli, Quantum Cryptography: From Key Distribution to Conference Key Agreement, Quantum Science and Technology, Springer Cham, 2021. https://doi.org/10.1007/978-3-030-64360-7.
[KLM07] P. Kaye, R. Laflamme, and M. Mosca, An Introduction to Quantum Computing, Oxford University Press, 2007. Available at https://ebookcentral.proquest.com/lib/unisa/reader.action?docID=415080.
[Leo10] U. Leonhardt, Essential Quantum Optics: From Quantum Measurements to Black Holes, Cambridge University Press, 2010. https://doi.org/10.1017/CBO9780511806117.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
[Qis21] Qiskit, The density matrix and mixed states, Qiskit textbook, June 2021. Available at https://learn.qiskit.org/course/quantum-hardware/density-matrix.
[WN17] S. Wehner and N. Ng, Lecture Notes: edX Quantum Cryptography, CaltechDelftX: QuCryptox, 2017. Available at https://courses.edx.org/courses/course-v1:CaltechDelftX+QuCryptox+3T2018/pdfbook/0/.

Q

Picture of Yee Wei Law

Qiskit: setup

by Yee Wei Law - Monday, 18 March 2024, 2:12 PM
 

This entry continues from installation of QuTiP.

  1. Assuming the relevant conda environment is activated, as per official documentation, in the Conda command prompt, install qiskit and galois:

    pip install qiskit[visualization] qiskit-ibm-runtime galois

    galois is not necessary for qiskit but necessary for our courses.

    Qiskit usually uses NumPy of a lower version than what QuTiP uses, so expect existing NumPy to be downgraded.

  2. Subsequently, as per official documentation, install the qiskit_textbook package:

    pip install git+https://github.com/qiskit-community/qiskit-textbook.git#subdirectory=qiskit-textbook-src

    Qiskit Textbook is a community project offering learning resources that will be useful to us.

  3. Test Qiskit in a Python shell:

    Fig: 1: Testing Qiskit in a Python shell.

    The two commands in the screenshot above ☝ should not trigger any error.

  4. Next, test Qiskit in JupyterLab. To launch JupyterLab, as per official documentation, open a Conda prompt (not Python shell) and type:

    jupyter lab

    Expect a web browser window to be launched, where you can create a new “Python 3 (ipykernel)” notebook:

    Fig: 2: JupyterLab landing page.

    Note ipykernel is an interactive Python kernel for Jupyter.

    Copying the first piece of code from the “Introduction to Qiskit” tutorial and pasting it into the newly created “Python 3 (ipykernel)” notebook should produce the circuit diagram at the bottom of this screenshot:

    Fig: 3: Sample Qiskit code running in Jupyter notebook.

Qiskit comes with a super-quick introduction to Python and Jupyter notebooks.

Visual Studio Code is a popular alternative to a web browser for hosting Jupyter notebooks, but to minimise the number of software components that can go wrong, we shall stick with a web browser (for which Mozilla Firefox is recommended).

Tags:

Picture of Yee Wei Law

Quantum bit error rate (QBER)

by Yee Wei Law - Monday, 13 March 2023, 4:25 PM
 

The quantum bit error rate (QBER) is the error rate affecting two bitstrings obtained as a result of the same quantum measurement performed on two different sets of quantum systems [Gra21, p. xvi].

See BB84 to put this definition in context.

References

[Gra21] F. Grasselli, Quantum Cryptography: From Key Distribution to Conference Key Agreement, Quantum Science and Technology, Springer Cham, 2021. https://doi.org/10.1007/978-3-030-64360-7.

Picture of Yee Wei Law

Quantum supremacy

by Yee Wei Law - Monday, 20 November 2023, 10:26 PM
 

Picture of Yee Wei Law

Qubit: physical realisation

by Yee Wei Law - Thursday, 10 August 2023, 9:14 AM
 

Creating a low voltage to represent a logical “0” and a high voltage to represent a logical “1” is straightforward.

🤷‍♂️ Creating a superposition of low and high voltages however is not.

A quantum computer is commonly envisioned to be a machine that exploits the full complexity of a many-particle quantum wavefunction to solve computational problems [LJL+10].

  • The current state of quantum computing technologies is summarised by the keywords Noisy Intermediate-Scale Quantum (NISQ).
  • NISQ computers are subject to substantial error rates and has a limited number of qubits [LLSK22, Sec. 1].

For the construction of quantum computers, laser serves as an inspiration because it is quantum mechanics that enables laser waves to be generated in phase [LJL+10].

Just as there are many possible materials for lasers (e.g., crystals, organic dye molecules, semiconductors, free electrons), there are many materials under consideration for quantum computers; see [LJL+10] and [MM12, Ch. 6].

Quantum bits are often imagined to be constructed from the smallest form of matter, e.g., an isolated atom, through ion traps and optical lattices, but they can also be made in components far larger than consumer electronics, e.g., a superconducting system [LJL+10].

Below we discuss three main technologies [LLSK22, Sec. 6]: 1️⃣ trapped ions, 2️⃣ photonics, and 3️⃣ superconducting qubits.

Trapped ions: Main idea is to use the two different internal states of a trapped atomic ion as a two-level system (i.e., qubit) [LLSK22, Sec. 6.2].

An ion trap uses electromagnetic fields and laser cooling to control the spatial position of an ion in vacuum and reduce the temperature of the ion [LLSK22, Sec. 6.2; BCSH21, Sec. 2].

Watch an introduction to the ion trap:

Lasers or microwaves are used to control the internal states of an ion [BCSH21, Figure 1].

The internal control plus the Coulomb repulsion between ions combine to form conditional logic gates [BCSH21, Figure 1].

👍: State preparation, qubit measurement, single-qubit and two-qubit gates can be performed with fidelities (> 99%) higher than what is required for quantum error correction [LLSK22, Sec. 6.2].

👎: A large array of bulk optical components are necessary and these are difficult to address and measure, challenging scalability [LLSK22, Sec. 6.2].

Trapped-ion quantum computers (e.g., IonQ) are enjoying a reasonable level of commercial success [LLSK22, Sec. 6.2].

Photonics: Photonics has always been a prominent candidate for realising qubits [LLSK22].

For generating qubits, photonics offers the following advantages [SP19, PAB+20, LLSK22]:

  • Photons are clean and decoherence-free quantum systems for which single-qubit operations can be easily performed with high fidelity, making photons a flagship system for studying quantum mechanics and developing quantum technologies.
  • Quantum entanglement, teleportation, QKD, and early quantum computing demonstrations were pioneered in photonics because photons represent a naturally mobile and low-noise system with quantum-limited detection readily available.
  • The quantum states of individual photons can be manipulated with high precision using interferometry, an experimental staple that has been under continuous development since the 19th century.
  • The ability to generate large numbers of photons and the development of integrated platforms, improved sources and detectors, novel noise-tolerant theoretical approaches render photonics a leading contender for both quantum information processing and quantum networking.
  • Nowadays, photonic quantum computing represents a promising path to medium- and large-scale processing.
  • Photonics is the primary technology for realising quantum communications.

Superconducting qubits: They are currently the leading contenders in the race for large-scale quantum computing [LLSK22]. Superconducting qubits are the technology big-tech companies like Google and IBM have been focusing on.

Fig. 1: The Sycamore processor [ABB+19, Fig. 1]: (Left) Processor layout comprising a rectangular array of 54 qubits (grey), each of which is connected to four neighbours through couplers (blue). The inoperable qubit is outlined. (Right) Photograph of the Sycamore chip.

In 2019, a large research team consisting of Google and multiple American and European universities demonstrated “quantum supremacy” on a programmable superconducting quantum processor called “Sycamore”, which consists of a two-dimensional array of 54 transmon qubits [AAB+19]:

  • In the superconducting circuit of Sycamore, conduction electrons condense into a macroscopic quantum state, such that currents and voltages behave quantum-mechanically.
  • Transmon is short for “transmission-line shunted plasma oscillation”.
  • The employed transmon qubits can be thought of as nonlinear superconducting resonators at 5-7 GHz, and each qubit encodes the two lowest quantum eigenstates of the resonant circuit.
  • Each qubit is connected to its four neighbouring qubits using an adjustable coupler for tuning inter-qubit coupling. 💡 Coupling qubits is essential for implementing two-qubit gates.
  • Each qubit is also connected to a linear resonator used to read out the qubit state.
  • Sycamore’s record might have been broken by China’s Zuchongzi in 2021 [Cho21].
  • In 2023, Google demonstrated quantum supremacy again with an increased qubit count of 70 [MVM+23].
  • IBM is slated to launch its 1121-bit NISQ computer called Condor.

References

[AAB+19] F. Arute, K. Arya, R. Babbush, D. Bacon, J. C. Bardin, R. Barends, R. Biswas, S. Boixo, F. G. S. L. Brandao, D. A. Buell, B. Burkett, Y. Chen, Z. Chen, B. Chiaro, R. Collins, W. Courtney, A. Dunsworth, E. Farhi, B. Foxen, A. Fowler, C. Gidney, M. Giustina, R. Graff, K. Guerin, S. Habegger, M. P. Harrigan, M. J. Hartmann, A. Ho, M. Hoffmann, T. Huang, T. S. Humble, S. V. Isakov, E. Jeffrey, Z. Jiang, D. Kafri, K. Kechedzhi, J. Kelly, P. V. Klimov, S. Knysh, A. Korotkov, F. Kostritsa, D. Landhuis, M. Lindmark, E. Lucero, D. Lyakh, S. Mandrà, J. R. McClean, M. McEwen, A. Megrant, X. Mi, K. Michielsen, M. Mohseni, J. Mutus, O. Naaman, M. Neeley, C. Neill, M. Y. Niu, E. Ostby, A. Petukhov, J. C. Platt, C. Quintana, E. G. Rieffel, P. Roushan, N. C. Rubin, D. Sank, K. J. Satzinger, V. Smelyanskiy, K. J. Sung, M. D. Trevithick, A. Vainsencher, B. Villalonga, T. White, Z. J. Yao, P. Yeh, A. Zalcman, H. Neven, and J. M. Martinis, Quantum supremacy using a programmable superconducting processor, Nature 574 no. 7779 (2019), 505–510. https://doi.org/10.1038/s41586-019-1666-5.
[BCSH21] K. R. Brown, J. Chiaverini, J. M. Sage, and H. Häffner, Materials challenges for trapped-ion quantum computers, Nature Reviews Materials 6 no. 10 (2021), 892–905. https://doi.org/10.1038/s41578-021-00292-1.
[Cho21] C. Q. Choi, Two of World’s Biggest Quantum Computers Made in China > Quantum computers Zuchongzi and Jiuzhang 2.0 may both display "quantum primacy" over classical computers, IEEE Spectrum Computing news, 2021. https://spectrum.ieee.org/quantum-computing-china.
[LJL+10] T. D. Ladd, F. Jelezko, R. Laflamme, Y. Nakamura, C. Monroe, and J. L. O’Brien, Quantum computers, Nature 464 no. 7285 (2010), 45–53. https://doi.org/10.1038/nature08812.
[LLSK22] J. W. Z. Lau, K. H. Lim, H. Shrotriya, and L. C. Kwek, NISQ computing: where are we and where do we go?, AAPPS Bulletin 32 no. 1 (2022), 27. https://doi.org/10.1007/s43673-022-00058-z.
[MM12] D. C. Marinescu and G. M. Marinescu, Classical and Quantum Information, Elsevier, 2012. https://doi.org/10.1016/C2009-0-64195-7.
[MVM+23] A. Morvan, B. Villalonga, X. Mi, S. Mandrà, A. Bengtsson, P. V. Klimov, Z. Chen, S. Hong, C. Erickson, I. K. Drozdov, J. Chau, G. Laun, R. Movassagh, A. Asfaw, L. T. A. N. Brandão, R. Peralta, D. Abanin, R. Acharya, R. Allen, T. I. Andersen, K. Anderson, M. Ansmann, F. Arute, K. Arya, J. Atalaya, J. C. Bardin, A. Bilmes, G. Bortoli, A. Bourassa, J. Bovaird, L. Brill, M. Broughton, B. B. Buckley, D. A. Buell, T. Burger, B. Burkett, N. Bushnell, J. Campero, H. S. Chang, B. Chiaro, D. Chik, C. Chou, J. Cogan, R. Collins, P. Conner, W. Courtney, A. L. Crook, B. Curtin, D. M. Debroy, A. D. T. Barba, S. Demura, A. D. Paolo, A. Dunsworth, L. Faoro, E. Farhi, R. Fatemi, V. S. Ferreira, L. F. Burgos, E. Forati, A. G. Fowler, B. Foxen, G. Garcia, E. Genois, W. Giang, C. Gidney, D. Gilboa, M. Giustina, R. Gosula, A. G. Dau, J. A. Gross, S. Habegger, M. C. Hamilton, M. Hansen, M. P. Harrigan, S. D. Harrington, P. Heu, M. R. Hoffmann, T. Huang, A. Huff, W. J. Huggins, L. B. Ioffe, S. V. Isakov, J. Iveland, E. Jeffrey, Z. Jiang, C. Jones, P. Juhas, D. Kafri, T. Khattar, M. Khezri, M. Kieferová, S. Kim, A. Kitaev, A. R. Klots, A. N. Korotkov, F. Kostritsa, J. M. Kreikebaum, D. Landhuis, P. Laptev, K. M. Lau, L. Laws, J. Lee, K. W. Lee, Y. D. Lensky, B. J. Lester, A. T. Lill, W. Liu, A. Locharla, F. D. Malone, O. Martin, S. Martin, J. R. McClean, M. McEwen, K. C. Miao, A. Mieszala, S. Montazeri, W. Mruczkiewicz, O. Naaman, M. Neeley, C. Neill, A. Nersisyan, M. Newman, J. H. Ng, A. Nguyen, M. Nguyen, M. Y. Niu, T. E. O’Brien, S. Omonije, A. Opremcak, A. Petukhov, R. Potter, L. P. Pryadko, C. Quintana, D. M. Rhodes, C. Rocque, P. Roushan, N. C. Rubin, N. Saei, D. Sank, K. Sankaragomathi, K. J. Satzinger, H. F. Schurkus, C. Schuster, M. J. Shearn, A. Shorter, N. Shutty, V. Shvarts, V. Sivak, J. Skruzny, W. C. Smith, R. D. Somma, G. Sterling, D. Strain, M. Szalay, D. Thor, A. Torres, G. Vidal, C. V. Heidweiller, T. White, B. W. K. Woo, C. Xing, Z. J. Yao, P. Yeh, J. Yoo, G. Young, A. Zalcman, Y. Zhang, N. Zhu, N. Zobrist, E. G. Rieffel, R. Biswas, R. Babbush, D. Bacon, J. Hilton, E. Lucero, H. Neven, A. Megrant, J. Kelly, I. Aleiner, V. Smelyanskiy, K. Kechedzhi, Y. Chen, and S. Boixo, Phase 3 transition in random circuit sampling, arXiv preprint arXiv:2304.11119, 2023. https: //doi.org/10.48550/arXiv.2304.11119.
[SP19] S. Slussarenko and G. J. Pryde, Photonic quantum information processing: A concise review, Applied Physics Reviews 6 no. 4 (2019), 041303. https://doi.org/10.1063/1.5115814.
Tags:

Picture of Yee Wei Law

QuTiP (Quantum Toolbox in Python): setup

by Yee Wei Law - Thursday, 7 December 2023, 5:03 PM
 

There is no shortage of quantum computing frameworks/toolkits, including Google’s Cirq, Rigetti’s Forest SDK (including pyQuil), Microsoft’s Q#-based Quantum Development Kit, IBM’s Qiskit, Quipper, QuTiP, ETHZ’s Silq, Cambridge Quantum Computing’s tket.

We shall use Qiskit because 1️⃣ it is among the most well-established, and 2️⃣ it comes with rich learning resources.

  • Qiskit is an open-source Python-based SDK created by IBM for working with quantum computers at the level of pulses, circuits, and application modules.

We shall also use QuTiP, because while Qiskit is popular for quantum computing, QuTiP offers more features for quantum-dynamical simulations.

  • Simplistically speaking, Qiskit is more for computer scientists, whereas QuTiP is more for physicists.
  • Unlike Qiskit, which uses quantum circuits (QuantumCircuit) as the main building blocks, QuTiP uses “quantum objects” (QObj).

Watch an introduction to QuTiP:

Using Qiskit and QuTiP means we are using Python but there are so many resources for learning Python it should not be an issue for a Bachelor/Master student to pick it up along the way.

Even though the relevant computer pools will provide you with the required software, you need to install the software on your own computer(s) anyway, because you will not be able to finish any of the practicals within the allocated time.

The allocated time is only for you to get enough supervision so that you can complete the remainder of the practical on your own.

Our strategy here is to first install QuTiP, then Qiskit.

The operating system of choice for many computer scientists and cryptograhers is Linux, but the setup guide here is only applicable to Windows, because UniSA computer pools have only Windows.

Follow the instructions below (derived from the official instructions) to set up QuTiP:

  1. Install the Python distribution Miniconda, or Anaconda if you prefer installing more packages upfront.

    Upon successful installation of 64-bit Conda (short for “Miniconda/Anaconda”), you will see folder “Anaconda3 (64-bit)” on your Start menu, and under the folder, menu item “Anaconda Prompt (miniconda3)” 👈 Click this menu item to get a Conda command prompt.

    In the command prompt, run command to update Conda to the latest version:

    conda update conda
  2. Upon successful update of conda, in command line, create a conda environment called cyber (which can otherwise be any name you fancy):

    conda create -n cyber

    Environment is an essential feature of Conda for creating sandboxes for prototyping, development and experimentation. Read this guide to get a better understanding of Conda environments, including how to create/activate/list/deactivate/remove environments.

    Upon successful creation of the environment cyber, activate it:

    conda activate cyber
  3. Add the channel conda-forge to the list of channels (to be sure, keeping defaults at the highest priority) and install the necessary packages:

    conda config --append channels conda-forge
    conda install qutip pytest jupyterlab jupyterlab-git ipywidgets jupyterlab_widgets nodejs `
    seaborn numba numexpr pandas pandoc sympy
  4. Above, the backtick (`) is the line continuation character in PowerShell.

    Among the packages just installed,

    • pytest is for automating testing of Python code (e.g., of QuTiP).
    • jupyterlab is the JupyterLab package that will provide our graphical user interface (GUI).
    • jupyterlab-git is for version-controlling Jupyter notebooks.
    • ipywidgets and jupyterlab_widgets are libraries of Jupyter widgets.
    • nodejs is cross-platform Javascript runtime environment useful for JupyterLab.
    • seaborn is a Python data visualization library based on matplotlib.
    • numpy is not shown above, but is automatically installed with qutip. This is the fundamental package for scientific computing with Python.
    • numba is a just-in-time compiler that translates a subset of Python and NumPy code into fast machine code.
    • numexpr is for accelerating numerical evaluation of expressions in NumPy.
    • scipy is not shown above, but is automatically installed with qutip. This complements numpy for scientific computing with Python.
    • pandas is a data analysis library.
    • pandoc is a versatile document converter.
    • sympy is a versatile computer algebra system for symbolic computing.
    • pip is not shown above, but is a common dependency that is automatically installed by many other packages. It is a package installer for Python.

    Official Conda documentation discourages using pip and conda together, but we need pip for Qiskit later.

  5. Optional: Test your setup by running the official unit tests in a Python shell:

    import qutip.testing
    qutip.testing.run()

    These tests are computationally intensive and can slow down your computer dramatically. For reference, on a Intel Core i9-9880H CPU with 32 GB RAM, the tests take between 35 and 40 minutes.

  6. Continue to installation of Qiskit.
Tags:

R

Picture of Yee Wei Law

Reduced density operator/matrix and partial trace

by Yee Wei Law - Wednesday, 7 June 2023, 9:37 AM
 

The reduced density operator is an application of the density operator.

The reduced density operator is so useful it is indispensable in the analysis of composite quantum systems [NC10, Sec. 2.4.3].

Consider a composite system, with density matrix , consisting of Alice’s system and Bob’s system, there is often a need to express the state of Alice’s or Bob’s system in terms of .

The operation that takes us from to (denoting Alice’s density matrix) or (denoting Bob’s density matrix) is called the reduced density operator.

The reduced density operator for Alice’s system is defined by

where is a map of operators known as the partial trace over Bob’s system.

Suppose and are any two vectors in Alice’s state space, and furthermore, and are any two vectors in Bob’s state space, then the partial trace is defined by the operation [NC10, (2.178)]:

(1)

Above, the notation is equivalent to

To see why the definition above makes sense, suppose a quantum system is in the product state , where and are the density matrices for subsystems and respectively, then

since the trace of any density matrix is 1. Similarly,

In general, if

where is an orthonormal basis of , and is an orthonormal basis of , then the partial trace over is [WN17, Definition 1.6.1]:

For a quick summary of discussion up to this point, watch edX Lecture 1.7 “The partial trace” of Quantum Cryptography by CaltechDelftX QuCryptox.

Example 1 [KLM07, Sec. 3.5.2; NC10, p. 106; Qis21, Sec. 4]

Consider the pure (entangled) Bell state: .

The system comprises 1️⃣ single-qubit subsystem with basis vectors and , and 2️⃣ single-qubit subsystem with basis vectors and .

This system is entangled (i.e., not separable) because , but using the reduced density operator, we can find a full description for subsystem and for subsystem .

The density matrix for the system is:

Applying Eq. (1), the reduced density operator for subsystem is:

Similarly, .

Since , both and are mixed states.

🤔 How do we reconcile the preceding observation ☝ with the fact that is a pure state?

  • The result of calculating the reduced density operator for is equivalent to the representation we obtain for when measurements were taken over the qubit of .
  • When measuring ’s qubit in the standard basis, the outcome is or at equal probabilities.
  • Due to entanglement, ’s qubit is or at equal probabilities.
  • Similarly for the reduced density operator for . Hence the mixed states.
  • We can say the reduced density operator is a way of describing the statistical outcomes of a subsystem when the measurement outcome of the other subsystem (in a bipartite system) is averaged out — this is in fact what “tracing out” the other subsystem means.

The strange property, that the joint state of a system can be pure (completely known) yet a subsystem be in mixed states, is a hallmark of quantum entanglement.

⚠ Caution [KLM07, Exercise 3.5.5]

The partial trace contains all the relevant information about subsystem if subsystem is discarded.

Similarly, contains all the relevant information about subsystem if subsystem is discarded.

These local descriptions do not in general contain enough information to reconstruct the state of the whole system.

Expressing a bipartite vector in the Schmidt basis makes it much easier to compute the partial trace of either subsystem. For this reason, let us discuss Schmidt decomposition.

References

[Gra21] F. Grasselli, Quantum Cryptography: From Key Distribution to Conference Key Agreement, Quantum Science and Technology, Springer Cham, 2021. https://doi.org/10.1007/978-3-030-64360-7.
[KLM07] P. Kaye, R. Laflamme, and M. Mosca, An Introduction to Quantum Computing, Oxford University Press, 2007. Available at https://ebookcentral.proquest.com/lib/unisa/reader.action?docID=415080.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
[Qis21] Qiskit, The density matrix and mixed states, Qiskit textbook, June 2021. Available at https://learn.qiskit.org/course/quantum-hardware/density-matrix.
[WN17] S. Wehner and N. Ng, Lecture Notes: edX Quantum Cryptography, CaltechDelftX: QuCryptox, 2017. Available at https://courses.edx.org/courses/course-v1:CaltechDelftX+QuCryptox+3T2018/pdfbook/0/.

S

Picture of Yee Wei Law

Schatten norm

by Yee Wei Law - Sunday, 19 March 2023, 9:47 PM
 

For , suppose its singular values are .

Then, the Schatten -norm of , where , is defined as [Ber09, Proposition 9.2.3]:

When , we have the Schatten 1-norm, which is also called the trace norm or nuclear norm [Ber09, p. 549]:

When , we have the Frobenius norm:

When , we have the spectral norm:

References

[Ber09] D. R. Bernstein, Matrix Mathematics: Theory, Facts, and Formulas, 2nd ed., Princeton University Press, 2009.

Picture of Yee Wei Law

Schmidt decomposition

by Yee Wei Law - Wednesday, 14 June 2023, 10:11 PM
 

References

[Cho22] M.-S. Choi, A Quantum Computation Workbook, Springer Cham, 2022. https://doi.org/10.1007/978-3-030-91214-7.

Picture of Yee Wei Law

Secret key rate

by Yee Wei Law - Thursday, 23 March 2023, 12:44 PM
 

The secret key rate is the fraction of secure key bits produced per protocol round, where a round is the transmission of a quantum state through the quantum channel [Gra21, p. 38].

The secret key rate generally depends on the total number of rounds performed.

The asymptotic secret key rate (often just asymptotic key rate) is the secret key rate when is assumed to simplify analysis.

  • Assuming direct reconciliation, the asymptotic key rate of any quantum key distribution (QKD) protocol with one-way error correction is lower-bounded by the Devetak-Winter rate [DW05]:

    where denotes quantum mutual information, , and are the random variables representing Alice’s, Bob’s and Eve’s raw key bits.

  • An intuitive interpretation of the Devetak-Winter rate: the fraction of secret bits generated per round of using the protocol is equal to the amount of information shared by Alice and Bob, , minus the amount of information that Eve has on Alice’s part of the key, [Wol21, p.145].

Assuming is not realistic, and the security of a QKD protocol has to be analysed assuming a finite and generally finite resources.

Analysis of the secret key rate and associated security properties of a QKD protocol is called finite-key analysis [TLGR12], to be covered in the future.

References

[DW05] I. Devetak and A. Winter, Distillation of secret key and entanglement from quantum states, Proceedings: Mathematical, Physical and Engineering Sciences 461 no. 2053 (2005), 207–235.
[Gra21] F. Grasselli, Quantum Cryptography: From Key Distribution to Conference Key Agreement, Quantum Science and Technology, Springer Cham, 2021. https://doi.org/10.1007/978-3-030-64360-7.
[TLGR12] M. Tomamichel, C. C. W. Lim, N. Gisin, and R. Renner, Tight finite-key analysis for quantum cryptography, Nat Commun 3 no. 634 (2012). https://doi.org/10.1038/ncomms1631.
[Wol21] R. Wolf, Quantum Key Distribution: An Introduction with Exercises, Springer, Cham, 2021. https://doi.org/10.1007/978-3-030-73991-1.

Picture of Yee Wei Law

Security of quantum key distribution (QKD): overview

by Yee Wei Law - Tuesday, 29 August 2023, 5:25 PM
 

Methods for analysing the security of quantum key distribution (QKD) schemes/protocols are still being developed [PAB+20, PR22].

  • These methods combine existing cryptographic notions and techniques with quantum information theory.
  • Depending on the implementation of the QKD scheme, physical laws governing the implementation (e.g., quantum-optical laws) also play a role.
  • Compared to computational security, which can be reduced to complexity-theoretic reasoning based on the Turing machine, methods for analysing the security of QKD schemes are thus more involved and, in terms of the transdisciplinary effort required, more challenging.

The security of a QKD scheme is typically analysed in terms of the level of success of 1️⃣ individual attacks, 2️⃣ collective attacks and 3️⃣ coherent attacks; in 🔼 increasing order of power given to the adversary [Wol21, Sec. 5.3.1].

  • Individual and collective attacks are usually considered in order to simplify the security analysis, but it is necessary to also consider coherent attacks in order to prove the security of a QKD scheme.
  • We can analyse the different types of attacks by the way 😈 Eve interacts with 👩 Alice’s signals and how Eve processes the information she gets in this way.
  • General procedure for extracting information from a quantum system:

    1. 😈 Eve attaches an ancilla system in the predefined state to the quantum state transmitted by 👩 Alice; and are density-matrix representations of quantum states.

      Please spend time understanding pure state, mixed state and density matrix.

    2. 😈 Eve then performs a unitary operation on the composite system, which leaves the state of the ancilla system in the form:

      where is the Kronecker operator and denotes partial trace.

      Please spend time understanding reduced density matrix and partial trace.

The security of a QKD scheme is also often analysed in terms of composability, short for universally composable security.

  • Informally, we say a QKD scheme is composable if the key it produces is almost as good as if it were distributed with an ideal key distribution protocol [Van06, Sec. 12.2.6].
  • A cryptographic primitive, which is secure when used with an ideally secret key, must still be secure if used with a QKD-distributed key.
  • Composability is critical since QKD-derived secret keys are used in other applications, e.g., data encryption [JCM+22].

TODO: Trace distance criterion [PR22], security = correctness + secrecy [Gra21]. Asymptotic vs finite-key security analysis.

Security evaluation of practical QKD implementations involves evaluating the level of success of “quantum hacking” (i.e., side-channel attacks on QKD).

References

[Gra21] F. Grasselli, Quantum Cryptography: From Key Distribution to Conference Key Agreement, Quantum Science and Technology, Springer Cham, 2021. https://doi.org/10.1007/978-3-030-64360-7.
[JCM+22] N. Jain, H.-M. Chin, H. Mani, C. Lupo, D. S. Nikolic, A. Kordts, S. Pirandola, T. B. Pedersen, M. Kolb, B. Ömer, C. Pacher, T. Gehring, and U. L. Andersen, Practical continuous-variable quantum key distribution with composable security, Nature Communications 13 no. 1 (2022), 4740. https://doi.org/10.1038/s41467-022-32161-y.
[PAB+20] S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, J. L. Pereira, M. Razavi, J. Shamsul Shaari, M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi, and P. Wallden, Advances in quantum cryptography, Advances in Optics and Photonics 12 no. 4 (2020), 1012–1236. https://doi.org/10.1364/AOP.361502.
[PR22] C. Portmann and R. Renner, Security in quantum cryptography, Rev. Mod. Phys. 94 no. 2 (2022), 025008. https://doi.org/10.1103/RevModPhys.94.025008.
[Sch10] S. Schauer, Attack Strategies on QKD Protocols, in Applied Quantum Cryptography (C. Kollmitzer and M. Pivk, eds.), Lect. Notes Phys. 797, Springer Berlin Heidelberg, 2010, pp. 71–95. https://doi.org/10.1007/978-3-642-04831-9_5.
[TL17] M. Tomamichel and A. Leverrier, A largely self-contained and complete security proof for quantum key distribution, Quantum 1 (2017), 14. https://doi.org/10.22331/q-2017-07-14-14.
[Van06] G. Van Assche, Quantum Cryptography and Secret-Key Distillation, Cambridge University Press, 2006. https://doi.org/10.1017/CBO9780511617744.
[Wol21] R. Wolf, Quantum Key Distribution: An Introduction with Exercises, Springer, Cham, 2021. https://doi.org/10.1007/978-3-030-73991-1.

Picture of Yee Wei Law

Separable vs entangled

by Yee Wei Law - Friday, 9 June 2023, 10:13 AM
 

The joint state, , of two quantum systems and is separable [WN17, Definition 2.1.1] if there exists a probability distribution , and sets of density matrices and such that

(1)

If such an expression for does not exist, is entangled [WN17, Definition 2.1.1].

Specifically, if is a pure state, then is separable if and only there exists and such that

Example 1: [WN17, Example 2.1.3]

The density matrix

is separable because it takes the form of Eq. (1).

Subsystems and are not entangled, but they are (classically) correlated.

Example 2: [WN17, Example 2.1.2]

The state is separable because

Example 3: [WN17, Example 2.1.1]
The Einstein-Podolsky-Rosen (EPR) pair is entangled because it cannot be expressed in the form of Eq. (1).
Example 4: [WN17, Example 2.1.4]

This example is meant to highlight the difference between the following two states:

where . is separable whereas is not.

Consider the outcomes of measuring subsystem in and in the standard basis and in the Hadamard basis.

Measuring subsystem of in the Hadamard basis:

Define the measurement operators to be and , where and . Clearly, and .

Using projective measurement, the post-measurement state conditioned on measurement outcome is

Let us work out the numerator and the denominator separately, starting with the numerator:

The preceding equality follows from these identities, which you will derive in the practical:

The denominator is:

The preceding computation is tedious but straightforward given the right tool (e.g., NumPy). Combining the results for the numerator and denominator, we get

Thus, upon measuring a on subsystem , subsystem can be in either or at equal probabilities; we say the reduced state on is maximally mixed.

Measuring subsystem of in the Hadamard basis:

The pair of and can be re-expressed as and , because ‘’ is orthogonal to ‘’ just as ‘’ is orthogonal to ‘’.

The preceding statement implies when is measured on subsystem , subsystem is in state as well.

Correlations in are thus stronger than those in .

References

[WN17] S. Wehner and N. Ng, Lecture Notes: edX Quantum Cryptography, CaltechDelftX: QuCryptox, 2017. Available at https://courses.edx.org/courses/course-v1:CaltechDelftX+QuCryptox+3T2018/pdfbook/0/.

Picture of Yee Wei Law

Singular value

by Yee Wei Law - Saturday, 11 March 2023, 3:16 PM
 

Singular values, like eigenvalues, are an intrinsic property of a matrix. Unsurprisingly, they can be defined in terms of eigenvalues:

Definition 1: Singular value [Ber09, Definition 5.6.1]

Suppose matrix has eigenvalues , where . Then, the singular values of are the nonnegative numbers:

Singular values can also be defined through the operation called singular value decomposition:

Definition 2: Singular value decomposition and singular values [Hog13, Sec. 5.6]

A singular value decomposition (SVD) of a matrix is the factorisation:

where , and are unitary.

The diagonal entries of , namely , are the singular values of .

The columns of are the left singular vectors of .

The columns of are the right singular vectors of .

References

[Ber09] D. R. Bernstein, Matrix Mathematics: Theory, Facts, and Formulas, 2nd ed., Princeton University Press, 2009.
[Hog13] L. Hogben (ed.), Handbook of Linear Algebra, 2nd ed., CRC Press, 2013. https://doi.org/10.1201/b16113.

Picture of Yee Wei Law

Spectral theorem and spectral decomposition

by Yee Wei Law - Tuesday, 29 August 2023, 10:00 AM
 

Spectral theorem is one of the fundamental theorems of linear algebra [ABH09, Sec. 3.6].

Based on the spectral theorem, spectral decomposition is an essential tool in quantum theory [NC10, Box 2.2].

Multiple equivalent interpretations of the spectral theorem exist, e.g., [ABH09, Theorems 3.6.4 and 3.6.12].

The interpretation in Theorem 1 directly defines spectral decomposition, and is hence also called the spectral decomposition theorem.

Theorem 1: Spectral (decomposition) theorem [Hol13, Theorem 8.23; Zha11, Theorem 3.4; KLM07, Theorem 2.4.3]

An -square complex matrix is normal iff it is orthogonally diagonalisable or unitarily diagonalisable, i.e., there exists a unitary matrix such that

where

  • are the eigenvalues of ;
  • consists of the orthonormal eigenvectors of in its columns in the same order as .

In particular,

  • is positive semidefinite .
  • is Hermitian are real.
  • is unitary .

Any normal operator, , has an outer product representation [KLM07, Sec. 2.4; Mey00, p. 517]:

where

  • are the eigenpairs of ;
  • form an orthormal basis of the Hilbert space in which is defined.

The outer products are projectors that satisfy

  • the completeness relation: ; and
  • the orthonormality relation: , where is the Kronecker delta.
Example 1 [KLM07, Theorem 2.4.2, Example 2.4.4]

The Pauli-X matrix is a normal operator:

Manually or using NumPy, we can determine the eigenpairs of to be and . Thus,

References

[ABH09] M. A. Akcoglu, P. F. A. Bartha, and D. M. Ha, Analysis in Vector Spaces: A Course in Advanced Calculus, John Wiley & Sons, 2009. https://doi.org/10.1002/9781118164587.
[Hol13] J. Holt, Linear Algebra with Applications, W. H. Freeman and Company, 2013.
[KLM07] P. Kaye, R. Laflamme, and M. Mosca, An Introduction to Quantum Computing, Oxford University Press, 2007. Available at https://ebookcentral.proquest.com/lib/unisa/reader.action?docID=415080.
[Mey00] C. Meyer, Matrix Analysis and Applied Linear Algebra, SIAM, 2000. Available at http://portal.igpublish.com.eu1.proxy.openathens.net/iglibrary/obj/SIAMB0000114.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
[Zha11] F. Zhang, Matrix Theory: Basic Results and Techniques, 2nd ed., Universitext, Springer New York, NY, 2011. https://doi.org/10.1007/978-1-4614-1099-7.

Picture of Yee Wei Law

SymPy

by Yee Wei Law - Wednesday, 2 August 2023, 3:21 PM
 

SymPy is a Python library for symbolic computing. In symbolic computing, we reason with symbols rather than numeric values.

When running SymPy in Google Colab, make sure you are using a WebKit-based browser such as Chrome or Edge.

The first thing to do when using SymPy is creating symbols.

There are seven ways to create a symbol.

Right from the beginning, it is crucial to know how to make assumptions in SymPy.

  • A really useful method for making assumptions is refine.

T

Picture of Yee Wei Law

Time evolution of quantum systems

by Yee Wei Law - Tuesday, 29 August 2023, 9:50 AM
 

At the highest level, the time-evolution postulate of quantum theory [KLM07, p. 44] states

The time-evolution of the state of a closed quantum system is described by a unitary operator. That is, for any evolution of the closed system, there exists a unitary operator such that if the initial state of the system is , then after the evolution, the state of the system will be .

But how do we arrive at the understanding of the role of the unitary operator?

Consider the evolution of one quantum state:

to another quantum state:

where are basis state vectors. Suppose there exists a linear operator that captures this evolution:

such that . Besides linearity and conservation of overlaps (overlap of a vector with itself = norm squared), there are other properties that must satisfy.

Define as a time-dependent map of one quantum state to another: , then the additional properties that must satisfy are [Hir04, Sec. 8.3.1]:

  1. Decomposability: .
  2. Continuity/smoothness: .

To satisfy 1️⃣ linearity, 2️⃣ conservation of overlaps and 3️⃣ decomposability, must be unitary; see proof in [Hir04, Lemma 8.3.1].

Think of a unitary operator as a matrix transformation using a unitary matrix. A unitary matrix is a matrix whose Hermitian conjugate / Hermitian adjoint / conjugate transpose is also its inverse:

where is the identity matrix of the appropriate dimensions.

About the notation, many quantum physicists prefer to use 1️⃣ instead of to denote Hermitian conjugate, and 2️⃣ instead of to denote the identity matrix.

The unitarity of quantum evolution implies reversibility since .

Unlike classical logic gates, quantum gates are governed by unitary matrices and are thus reversible.

However, measurements are not reversible; this is known as the measurement paradox of quantum physics [Hir04, p. 23].

A unitary operator is a normal operator because it commutes with its Hermitian conjugate, i.e., [KLM07, Definition 2.4.1]. 👈 This property enables the spectral decomposition of a unitary operator.

To additionally satisfy continuity, Stone’s theorem [Par92, Sec. I.13] necessitates the existence of a Hermitian / self-adjoint operator such that

where is called the (quantum) Hamiltonian or Hamilton operator representing the total energy of the closed quantum system [Hir04, Theorem 8.3.1].

The exponential in Eq. (1) is a matrix exponential:

More info about the matrix exponential is available in the knowledge base entry on state-space equations.

Sometimes, Eq. (1) is written as , where is the Planck’s constant whose value must be experimentally determined [NC10, p. 82].

Thus, , implying

which is usually written in the following form:

The linear differential equation above is called the general version of the time-dependent Schrödinger equation [Wei15, p. 82], which is sometimes called the abstract Schrödinger equation [Hir04, p. 131].

Summarising the discussion so far, the time-evolution postulate can be rephrased in more precise mathematical terms [NC10, Postulate 2']:

The time evolution of the state of a closed quantum system is described by the Schrödinger equation:

References

[Hir04] M. Hirvensalo, Quantum Computing, 2nd ed., Natural Computing Series, Springer Berlin, Heidelberg, 2004. https://doi.org/10.1007/978-3-662-09636-9.
[KLM07] P. Kaye, R. Laflamme, and M. Mosca, An Introduction to Quantum Computing, Oxford University Press, 2007. Available at https://ebookcentral.proquest.com/lib/unisa/reader.action?docID=415080.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
[Par92] K. Parthasarathy, An Introduction to Quantum Stochastic Calculus, Birkhäuser Basel, 1992. https://doi.org/10.1007/978-3-0348-0566-7.
[SF15] L. Susskind and A. Friedman, Quantum Mechanics: The Theoretical Minimum, Penguin Press, 2015.
[Wei15] S. Weinberg, Lectures on Quantum Mechanics, 2nd ed., Cambridge University Press, 2015. https://doi.org/10.1017/CBO9781316276105.
Tags:

Picture of Yee Wei Law

Trace distance

by Yee Wei Law - Saturday, 2 September 2023, 7:44 PM
 

Measurement of information is crucial to cybersecurity. One of these measures is distance measure between two quantum states.

  • Static measures quantify how close two quantum states are [NC10, p. 399].
  • Dynamic measures quantify how well information is preserved during a dynamic process [NC10, p. 399]. Dynamic measures can be derived from static measures.

Distance measures are defined in a way that makes sense to the analysis they are applied to, hence more than one distance measure exist in the literature, but two of these measures are in particularly wide use, namely trace distance and fidelity.

The focus here is trace distance, which for probability density functions and index set is defined to be [NC10, Eq. (9.1)]:

Trace distance is also called distance and Kolmogorov distance.

Trace distance satisfies the mathematical definition of metric, because it satisfies [NC10, p. 400]:

  • Symmetry, i.e., .
  • Non-negativity, i.e.,
  • Triangle inequality, i.e., .

Extending the earlier definition to quantum states, the trace distance between density matrices and is defined as [MM12, Sec. 3.11]:

If

References

[Cho22] M.-S. Choi, A Quantum Computation Workbook, Springer Cham, 2022. https://doi.org/10.1007/978-3-030-91214-7.
[MM12] D. C. Marinescu and G. M. Marinescu, Classical and Quantum Information, Elsevier, 2012. https://doi.org/10.1016/C2009-0-64195-7.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
Tags:

Picture of Yee Wei Law

Trace norm

by Yee Wei Law - Saturday, 11 March 2023, 3:17 PM
 

The trace norm is an example of a unitarily invariant norm and is equivalent to the Schatten 1-norm.

References

[Ber09] D. R. Bernstein, Matrix Mathematics: Theory, Facts, and Formulas, 2nd ed., Princeton University Press, 2009.
[Hog13] L. Hogben (ed.), Handbook of Linear Algebra, 2nd ed., CRC Press, 2013. https://doi.org/10.1201/b16113.

Picture of Yee Wei Law

Trace operator

by Yee Wei Law - Tuesday, 14 March 2023, 5:34 PM
 

The trace of a square matrix , denoted by tr or tr, is a linear map that maps the matrix to a complex number, and is specifically the sum of the diagonal elements of the matrix.

Obvious properties:

  • [Ber18, p. 287].
  • If and are square matrices, then the cyclic property applies: [Ber18, p. 287].

Useful property involving brakets:

  • If is an matrix, then , where is any orthonormal basis of [WN17, Definition 1.2.4].

References

[Ber18] D. S. Bernstein, Scalar, Vector, and Matrix Mathematics: Theory, Facts, and Formulas - Revised and Expanded Edition, Princeton University Press, 2018. https://doi.org/10.1515/9781400888252.
[WN17] S. Wehner and N. Ng, Lecture Notes: edX Quantum Cryptography, 2017. Available at https://courses.edx.org/courses/course-v1:CaltechDelftX+QuCryptox+ 3T2018/pdfbook/0/.

U

Picture of Yee Wei Law

Unitarily invariant norm

by Yee Wei Law - Sunday, 12 February 2023, 2:48 PM
 

A vector norm on is unitarily invariant if for any and unitary matrices of appropriate dimensions and , we have [Hog13, Sec. 24.3].

References

[Hog13] L. Hogben (ed.), Handbook of Linear Algebra, 2nd ed., CRC Press, 2013. https://doi.org/10.1201/b16113.


Page:  1  2  3  4  5  (Next)
  ALL