Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page: (Previous)   1  2  3  4  5  (Next)
  ALL

C

Picture of Yee Wei Law

Composite quantum systems

by Yee Wei Law - Tuesday, 10 October 2023, 9:36 AM
 

Consider a multi-qubit system consisting of two qubits. There are four possible final states: ; and it makes sense to express the quantum state of this two-qubit system as the linear combination:

where the normalisation rule still applies:

An alternative representation of is

where the subscript indicates the order of the system.

Some authors call the set , and equivalently , the tensor base [Des09, p. 316].

Watch Microsoft Research’s presentation on “Quantum Computing for Computer Scientists”:

In the vector representation, given two separated qubits:

their collective state can be expressed using the Kronecker product (also called the matrix direct product and tensor product):

Multiple shorthands exist for : 1️⃣ , 2️⃣ , 3️⃣ [Mer07, p. 6; NC10, Sec. 2.1.7]; we have used the third shorthand earlier.

In general, we can compose the Hilbert space of a multi-qubit system using the vector space direct product (also called tensor direct product) of lower-dimensional Hilbert spaces [NC10, Sec. 2.1.7]:

  • The vector space direct product is a specialisation of the direct product, and should be differentiated from Kronecker product because the latter operates on vectors and matrices.
  • Suppose and are Hilbert spaces of dimensions and respectively, then (read “ tensor ”) is an -dimensional Hilbert space.
  • Suppose and are othonormal bases for and respectively, then is a basis for .
  • Thus the elements of are linear combinations of the tensor products of the orthonormal bases for and . For example, suppose is a two-dimensional Hilbert space with basis vectors and , then every element of is a linear combination of , , and .
  • Suppose and is a linear operator on . Similarly, suppose and is a linear operator on . Then we can define the composite linear operator on by:

    The above implies

    Some authors write to differentiate (representing a Kronecker product) from (representing a direct product) [Zyg18, p. 16].

  • Inner product in is defined as

Classical-quantum state

In quantum cryptography, we often encounter states that are partially classical and partially quantum.

A classical state (c-state for short) is a state defined by a density matrix that is diagonal in the standard basis of the -dimensional state space of , i.e., has the form:

where .

Suppose we prepare the following states for Alice and Bob: with probability 1/2, we prepare and with probability 1/2, we prepare . Then, the joint state is the so-called classical-quantum state (cq-state for short):

In quantum-cryptographic convention,

  • typically denotes some (partially secret) classical string that Alice creates during a quantum protocol,
  • denotes a classical register (in fact, the symbols are reserved for classical registers),
  • denotes a quantum register, and
  • denotes some quantum information that an adversary may have gathered during the protocol, and which may be correlated with the string .

Formally,

Definition 1: Classical-quantum state (cq-state) [WN17, Definition 1.4.2]

A classical-quantum state (cq-state) takes the form

If is absent, then is simply a classical state.

References

[Des09] E. Desurvire, Classical and Quantum Information Theory: An Introduction for the Telecom Scientist, Cambridge University Press, 2009. https://doi.org/10.1017/CBO9780511803758.
[Mer07] N. D. Mermin, Quantum Computer Science: An Introduction, Cambridge University Press, 2007. https://doi.org/10.1017/CBO9780511813870.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
[WN17] S. Wehner and N. Ng, Lecture Notes: edX Quantum Cryptography, CaltechDelftX: QuCryptox, 2017. Available at https://courses.edx.org/courses/course-v1:CaltechDelftX+QuCryptox+3T2018/pdfbook/0/.
[Zyg18] B. Zygelman, A First Introduction to Quantum Computing and Information, Springer Cham, 2018. https://doi.org/10.1007/978-3-319-91629-3.

E

Picture of Yee Wei Law

Entropy

by Yee Wei Law - Monday, 27 March 2023, 3:15 PM
 

The following introduces Shannon entropy before von Neumann entropy.

Shannon entropy

The Shannon entropy of a random variable, say , measures the uncertainty of .

Intuition:

  • Minimum entropy occurs when takes on a specific value at probability 1. Let us say entropy is 0 in this case.
  • Maximum entropy occurs when takes on one of different values at equal probability. Let us say entropy is bits in this case, because we need bits to represent all possible outcomes in binary.

The following definition of entropy, denoted by , measured in number of bits, can reflect the two extreme cases above [MC12, Definition 5.4]:

where denotes the probability of taking on the th value.

Note: 1️⃣ ; 2️⃣ number of bits is discrete in practice but as a metric of comparison, we need entropy to be a continuous-valued metric.

If has possible values, and has , the joint entropy of and is defined as [MC12, Definition 6.2]:

The conditional entropy of given is defined as [MC12, (6.53)]:

The chain rule for entropy states [MC12, p. 151; Gra21, (2.48)]:

or more generally,

Von Neumann entropy

The Shannon entropy measures the uncertainty associated with a classical probability distribution.

Quantum states are described in a similar fashion, with density operators replacing probability distributions.

The von Neumann entropy of a quantum state, , is defined as [NC10, Sec. 11.3]:

where denotes the base-2 logarithm of and not the element-wise application of base-2 logarithm to .

Watch an introduction to the matrix logarithm on YouTube:

If are the eigenvalues of , then

References

[Gra21] F. Grasselli, Quantum Cryptography: From Key Distribution to Conference Key Agreement, Quantum Science and Technology, Springer Cham, 2021. https://doi.org/10.1007/978-3-030-64360-7.
[MC12] S. M. Moser and P.-N. Chen, A Student’s Guide to Coding and Information Theory, Cambridge University Press, 2012. Available at https://ebookcentral.proquest.com/lib/unisa/reader.action?docID=833494.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.

F

Picture of Yee Wei Law

Fidelity

by Yee Wei Law - Sunday, 3 September 2023, 8:55 AM
 

This entry continues from discussion of trace distance.

[Des09, (22.8)].

[Hay17, Sec. 3.1.2 and Sec. 8.2].

[Le 06, (7.20)].

[Dio11, (6.19)].

[NC10, (9.2)].

[BS98, Sec. II].

References

[BS98] C. Bennett and P. Shor, Quantum information theory, IEEE Transactions on Information Theory 44 no. 6 (1998), 2724–2742. https://doi.org/10.1109/18.720553.
[Des09] E. Desurvire, Classical and Quantum Information Theory: An Introduction for the Telecom Scientist, Cambridge University Press, 2009. https://doi.org/10.1017/CBO9780511803758.
[Dio11] L. Diosi, A Short Course in Quantum Information Theory: An Approach From Theoretical Physics, second ed., Springer Berlin, Heidelberg, 2011. https://doi.org/10.1007/978-3-642-16117-9.
[Hay17] M. Hayashi, Quantum Information Theory: Mathematical Foundation, second ed., Springer Berlin, Heidelberg, 2017. https://doi.org/10.1007/978-3-662-49725-8.
[Le 06] M. Le Bellac, A Short Introduction to Quantum Information and Quantum Computation, Cambridge University Press, 2006. https://doi.org/10.1017/CBO9780511755361.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
Tags:

G

Picture of Yee Wei Law

Galois field / finite field

by Yee Wei Law - Sunday, 20 August 2023, 4:11 PM
 
Tags:

Picture of Yee Wei Law

Group theory

by Yee Wei Law - Sunday, 20 August 2023, 4:05 PM
 
Tags:

I

Picture of Yee Wei Law

Idempotence

by Yee Wei Law - Wednesday, 22 March 2023, 10:45 PM
 

A square matrix, , is idempotent if it is equal to its square, i.e., [Ber18, Definition 4.1.1].

Notable properties:

  • Every idempotent matrix is necessarily a projector [Mey00, (5.9.13)].
  • is idempotent [Ber18, Proposition 8.1.7].
  • is idempotent eigenvalues of are either 0 or 1 [Loc08].

References

[Ber18] D. S. Bernstein, Scalar, Vector, and Matrix Mathematics: Theory, Facts, and Formulas - Revised and Expanded Edition, Princeton University Press, 2018. https://doi.org/10.1515/9781400888252.
[Loc08] R. Lockhart, General theory, STATISTICS 350: Linear Models in Applied Statistics, 2008. Available at https://www.sfu.ca/~lockhart/richard/350/08_2/lectures/Theory/web.pdf.
[Mey00] C. Meyer, Matrix Analysis and Applied Linear Algebra, SIAM, 2000. Available at http://portal.igpublish.com.eu1.proxy.openathens.net/iglibrary/obj/SIAMB0000114.

Picture of Yee Wei Law

Individual attack

by Yee Wei Law - Tuesday, 29 August 2023, 11:25 PM
 

The discussion here continues from the discussion of security of quantum key distribution (QKD).

QKD is a method for generating and distributing symmetric cryptographic keys with information-theoretic security based on quantum information theory [ETS18].

In a QKD protocol,

  • 👩 Alice and 🧔 Bob attempt to establish a secret symmetric key between themselves.
  • 😈 Eve attempts to find out about this secret key.

😈 Eve’s attempt to discover the secret key can be classified into 1️⃣ individual attack (discussed below), 2️⃣ collective attack, and 3️⃣ coherent attack; in 🔼 increasing order of power given to Eve.

Individual attacks are the simplest and most studied class of attacks.

When conducting an individual attack, Eve interacts with each signal (i.e., quantum state) from Alice individually, and is restricted to the same interaction for all Alice’s signals [Sch10, Wol21].

  • Some strategies rely on the fact that Eve is able to postpone her interaction with Alice’s signal until after sifting and error correction, or as long as she wants, to obtain the maximum amount of information from Alice’s and Bob’s public interaction.
  • In some other strategies, Eve measures the state instantly and uses the information from sifting and error correction later on.

Regardless, Eve has the freedom to choose which unitary operation she applies to a composite system (“composite” because more than one qubit is involved).

Of interest is the amount of information about a single state that Eve gains with an attack. A standard measure of amount of information is mutual information.

Perhaps the most intuitive example of an individual attack is the intercept and resend (I&R) attack [Sch10, Sec. 5.2.1].

References

[ETS18] ETSI, Quantum Key Distribution (QKD); Vocabulary, Group Report ETSI GR QKD 007 v1.1.1, December 2018. Available at https://www.etsi.org/deliver/etsi_gr/QKD/001_099/007/01.01.01_60/gr_qkd007v010101p.pdf.
[Sch10] S. Schauer, Attack Strategies on QKD Protocols, in Applied Quantum Cryptography (C. Kollmitzer and M. Pivk, eds.), Lect. Notes Phys. 797, Springer Berlin Heidelberg, 2010, pp. 71–95. https://doi.org/10.1007/978-3-642-04831-9_5.
[Wol21] R. Wolf, Quantum Key Distribution: An Introduction with Exercises, Springer, Cham, 2021. https://doi.org/10.1007/978-3-030-73991-1.
Tags:

K

Picture of Yee Wei Law

Kraus operator and Kraus representation

by Yee Wei Law - Tuesday, 18 April 2023, 9:17 AM
 

L

Picture of Yee Wei Law

Linear operator

by Yee Wei Law - Wednesday, 23 August 2023, 11:11 PM
 

Let and be vector spaces. The mapping is called a linear transformation if and only if

for every choice of and scalar .

When , is called a linear operator [DG09, p. 202].

References

[DG09] J. DeFranza and D. Gagliardi, Introduction to Linear Algebra with Applications, Waveland Press, Inc., 2009.

Picture of Yee Wei Law

Lipschitzness, Lipschitz condition

by Yee Wei Law - Wednesday, 21 June 2023, 8:57 AM
 

Mathematical programming (theory-based optimisation methods as opposed to heuristics) works best with differentiable cost/loss functions.

Mathematical programming also works with continuous loss functions [Byr15].

Differentiability implies continuity but the converse is not true, so continuity is a weaker condition than differentiability. For example, piecewise continuous functions are not differentiable at all points.

Lipschitzness is a particular form of continuity. Strictly speaking, Lipschitzness is a form of uniform continuity:

Definition 1: Lipschitzness [SSBD14, Definition 12.6]

Let . A function (in general, a mapping from one normed vector space to another) is -Lipschitz (continuous) over if for every , we have that

The preceding equation expresses the Lipschitzness or the Lipschitz condition of function .

It follows from the definition above that if the derivative of is everywhere bounded in absolute value by , then is -Lipschitz.

Example 1 [SSBD14, Example 12.4]

The function is 1-Lipschitz over because for every , the triangular inequality tells us

and similarly,

The two preceding equations combined give us .

References

[Byr15] C. L. Byrne, A First Course in Optimization, CRC Press, 2015. https://doi.org/10.1201/b17264.
[SSBD14] S. Shalev-Shwartz and S. Ben-David, Understanding Machine Learning: From Theory to Algorithms, Cambridge University Press, 2014. https://doi.org/10.1017/CBO9781107298019.


Page: (Previous)   1  2  3  4  5  (Next)
  ALL