Browse the glossary using this index

Special | A | B | C | D | E | F | G | H | I | J | K | L | M | N | O | P | Q | R | S | T | U | V | W | X | Y | Z | ALL

Page: (Previous)   1  2  3  4  5  (Next)
  ALL

Q

Picture of Yee Wei Law

Qubit: physical realisation

by Yee Wei Law - Thursday, 10 August 2023, 9:14 AM
 

Creating a low voltage to represent a logical “0” and a high voltage to represent a logical “1” is straightforward.

🤷‍♂️ Creating a superposition of low and high voltages however is not.

A quantum computer is commonly envisioned to be a machine that exploits the full complexity of a many-particle quantum wavefunction to solve computational problems [LJL+10].

  • The current state of quantum computing technologies is summarised by the keywords Noisy Intermediate-Scale Quantum (NISQ).
  • NISQ computers are subject to substantial error rates and has a limited number of qubits [LLSK22, Sec. 1].

For the construction of quantum computers, laser serves as an inspiration because it is quantum mechanics that enables laser waves to be generated in phase [LJL+10].

Just as there are many possible materials for lasers (e.g., crystals, organic dye molecules, semiconductors, free electrons), there are many materials under consideration for quantum computers; see [LJL+10] and [MM12, Ch. 6].

Quantum bits are often imagined to be constructed from the smallest form of matter, e.g., an isolated atom, through ion traps and optical lattices, but they can also be made in components far larger than consumer electronics, e.g., a superconducting system [LJL+10].

Below we discuss three main technologies [LLSK22, Sec. 6]: 1️⃣ trapped ions, 2️⃣ photonics, and 3️⃣ superconducting qubits.

Trapped ions: Main idea is to use the two different internal states of a trapped atomic ion as a two-level system (i.e., qubit) [LLSK22, Sec. 6.2].

An ion trap uses electromagnetic fields and laser cooling to control the spatial position of an ion in vacuum and reduce the temperature of the ion [LLSK22, Sec. 6.2; BCSH21, Sec. 2].

Watch an introduction to the ion trap:

Lasers or microwaves are used to control the internal states of an ion [BCSH21, Figure 1].

The internal control plus the Coulomb repulsion between ions combine to form conditional logic gates [BCSH21, Figure 1].

👍: State preparation, qubit measurement, single-qubit and two-qubit gates can be performed with fidelities (> 99%) higher than what is required for quantum error correction [LLSK22, Sec. 6.2].

👎: A large array of bulk optical components are necessary and these are difficult to address and measure, challenging scalability [LLSK22, Sec. 6.2].

Trapped-ion quantum computers (e.g., IonQ) are enjoying a reasonable level of commercial success [LLSK22, Sec. 6.2].

Photonics: Photonics has always been a prominent candidate for realising qubits [LLSK22].

For generating qubits, photonics offers the following advantages [SP19, PAB+20, LLSK22]:

  • Photons are clean and decoherence-free quantum systems for which single-qubit operations can be easily performed with high fidelity, making photons a flagship system for studying quantum mechanics and developing quantum technologies.
  • Quantum entanglement, teleportation, QKD, and early quantum computing demonstrations were pioneered in photonics because photons represent a naturally mobile and low-noise system with quantum-limited detection readily available.
  • The quantum states of individual photons can be manipulated with high precision using interferometry, an experimental staple that has been under continuous development since the 19th century.
  • The ability to generate large numbers of photons and the development of integrated platforms, improved sources and detectors, novel noise-tolerant theoretical approaches render photonics a leading contender for both quantum information processing and quantum networking.
  • Nowadays, photonic quantum computing represents a promising path to medium- and large-scale processing.
  • Photonics is the primary technology for realising quantum communications.

Superconducting qubits: They are currently the leading contenders in the race for large-scale quantum computing [LLSK22]. Superconducting qubits are the technology big-tech companies like Google and IBM have been focusing on.

Fig. 1: The Sycamore processor [ABB+19, Fig. 1]: (Left) Processor layout comprising a rectangular array of 54 qubits (grey), each of which is connected to four neighbours through couplers (blue). The inoperable qubit is outlined. (Right) Photograph of the Sycamore chip.

In 2019, a large research team consisting of Google and multiple American and European universities demonstrated “quantum supremacy” on a programmable superconducting quantum processor called “Sycamore”, which consists of a two-dimensional array of 54 transmon qubits [AAB+19]:

  • In the superconducting circuit of Sycamore, conduction electrons condense into a macroscopic quantum state, such that currents and voltages behave quantum-mechanically.
  • Transmon is short for “transmission-line shunted plasma oscillation”.
  • The employed transmon qubits can be thought of as nonlinear superconducting resonators at 5-7 GHz, and each qubit encodes the two lowest quantum eigenstates of the resonant circuit.
  • Each qubit is connected to its four neighbouring qubits using an adjustable coupler for tuning inter-qubit coupling. 💡 Coupling qubits is essential for implementing two-qubit gates.
  • Each qubit is also connected to a linear resonator used to read out the qubit state.
  • Sycamore’s record might have been broken by China’s Zuchongzi in 2021 [Cho21].
  • In 2023, Google demonstrated quantum supremacy again with an increased qubit count of 70 [MVM+23].
  • IBM is slated to launch its 1121-bit NISQ computer called Condor.

References

[AAB+19] F. Arute, K. Arya, R. Babbush, D. Bacon, J. C. Bardin, R. Barends, R. Biswas, S. Boixo, F. G. S. L. Brandao, D. A. Buell, B. Burkett, Y. Chen, Z. Chen, B. Chiaro, R. Collins, W. Courtney, A. Dunsworth, E. Farhi, B. Foxen, A. Fowler, C. Gidney, M. Giustina, R. Graff, K. Guerin, S. Habegger, M. P. Harrigan, M. J. Hartmann, A. Ho, M. Hoffmann, T. Huang, T. S. Humble, S. V. Isakov, E. Jeffrey, Z. Jiang, D. Kafri, K. Kechedzhi, J. Kelly, P. V. Klimov, S. Knysh, A. Korotkov, F. Kostritsa, D. Landhuis, M. Lindmark, E. Lucero, D. Lyakh, S. Mandrà, J. R. McClean, M. McEwen, A. Megrant, X. Mi, K. Michielsen, M. Mohseni, J. Mutus, O. Naaman, M. Neeley, C. Neill, M. Y. Niu, E. Ostby, A. Petukhov, J. C. Platt, C. Quintana, E. G. Rieffel, P. Roushan, N. C. Rubin, D. Sank, K. J. Satzinger, V. Smelyanskiy, K. J. Sung, M. D. Trevithick, A. Vainsencher, B. Villalonga, T. White, Z. J. Yao, P. Yeh, A. Zalcman, H. Neven, and J. M. Martinis, Quantum supremacy using a programmable superconducting processor, Nature 574 no. 7779 (2019), 505–510. https://doi.org/10.1038/s41586-019-1666-5.
[BCSH21] K. R. Brown, J. Chiaverini, J. M. Sage, and H. Häffner, Materials challenges for trapped-ion quantum computers, Nature Reviews Materials 6 no. 10 (2021), 892–905. https://doi.org/10.1038/s41578-021-00292-1.
[Cho21] C. Q. Choi, Two of World’s Biggest Quantum Computers Made in China > Quantum computers Zuchongzi and Jiuzhang 2.0 may both display "quantum primacy" over classical computers, IEEE Spectrum Computing news, 2021. https://spectrum.ieee.org/quantum-computing-china.
[LJL+10] T. D. Ladd, F. Jelezko, R. Laflamme, Y. Nakamura, C. Monroe, and J. L. O’Brien, Quantum computers, Nature 464 no. 7285 (2010), 45–53. https://doi.org/10.1038/nature08812.
[LLSK22] J. W. Z. Lau, K. H. Lim, H. Shrotriya, and L. C. Kwek, NISQ computing: where are we and where do we go?, AAPPS Bulletin 32 no. 1 (2022), 27. https://doi.org/10.1007/s43673-022-00058-z.
[MM12] D. C. Marinescu and G. M. Marinescu, Classical and Quantum Information, Elsevier, 2012. https://doi.org/10.1016/C2009-0-64195-7.
[MVM+23] A. Morvan, B. Villalonga, X. Mi, S. Mandrà, A. Bengtsson, P. V. Klimov, Z. Chen, S. Hong, C. Erickson, I. K. Drozdov, J. Chau, G. Laun, R. Movassagh, A. Asfaw, L. T. A. N. Brandão, R. Peralta, D. Abanin, R. Acharya, R. Allen, T. I. Andersen, K. Anderson, M. Ansmann, F. Arute, K. Arya, J. Atalaya, J. C. Bardin, A. Bilmes, G. Bortoli, A. Bourassa, J. Bovaird, L. Brill, M. Broughton, B. B. Buckley, D. A. Buell, T. Burger, B. Burkett, N. Bushnell, J. Campero, H. S. Chang, B. Chiaro, D. Chik, C. Chou, J. Cogan, R. Collins, P. Conner, W. Courtney, A. L. Crook, B. Curtin, D. M. Debroy, A. D. T. Barba, S. Demura, A. D. Paolo, A. Dunsworth, L. Faoro, E. Farhi, R. Fatemi, V. S. Ferreira, L. F. Burgos, E. Forati, A. G. Fowler, B. Foxen, G. Garcia, E. Genois, W. Giang, C. Gidney, D. Gilboa, M. Giustina, R. Gosula, A. G. Dau, J. A. Gross, S. Habegger, M. C. Hamilton, M. Hansen, M. P. Harrigan, S. D. Harrington, P. Heu, M. R. Hoffmann, T. Huang, A. Huff, W. J. Huggins, L. B. Ioffe, S. V. Isakov, J. Iveland, E. Jeffrey, Z. Jiang, C. Jones, P. Juhas, D. Kafri, T. Khattar, M. Khezri, M. Kieferová, S. Kim, A. Kitaev, A. R. Klots, A. N. Korotkov, F. Kostritsa, J. M. Kreikebaum, D. Landhuis, P. Laptev, K. M. Lau, L. Laws, J. Lee, K. W. Lee, Y. D. Lensky, B. J. Lester, A. T. Lill, W. Liu, A. Locharla, F. D. Malone, O. Martin, S. Martin, J. R. McClean, M. McEwen, K. C. Miao, A. Mieszala, S. Montazeri, W. Mruczkiewicz, O. Naaman, M. Neeley, C. Neill, A. Nersisyan, M. Newman, J. H. Ng, A. Nguyen, M. Nguyen, M. Y. Niu, T. E. O’Brien, S. Omonije, A. Opremcak, A. Petukhov, R. Potter, L. P. Pryadko, C. Quintana, D. M. Rhodes, C. Rocque, P. Roushan, N. C. Rubin, N. Saei, D. Sank, K. Sankaragomathi, K. J. Satzinger, H. F. Schurkus, C. Schuster, M. J. Shearn, A. Shorter, N. Shutty, V. Shvarts, V. Sivak, J. Skruzny, W. C. Smith, R. D. Somma, G. Sterling, D. Strain, M. Szalay, D. Thor, A. Torres, G. Vidal, C. V. Heidweiller, T. White, B. W. K. Woo, C. Xing, Z. J. Yao, P. Yeh, J. Yoo, G. Young, A. Zalcman, Y. Zhang, N. Zhu, N. Zobrist, E. G. Rieffel, R. Biswas, R. Babbush, D. Bacon, J. Hilton, E. Lucero, H. Neven, A. Megrant, J. Kelly, I. Aleiner, V. Smelyanskiy, K. Kechedzhi, Y. Chen, and S. Boixo, Phase 3 transition in random circuit sampling, arXiv preprint arXiv:2304.11119, 2023. https: //doi.org/10.48550/arXiv.2304.11119.
[SP19] S. Slussarenko and G. J. Pryde, Photonic quantum information processing: A concise review, Applied Physics Reviews 6 no. 4 (2019), 041303. https://doi.org/10.1063/1.5115814.
Tags:

Picture of Yee Wei Law

QuTiP (Quantum Toolbox in Python): setup

by Yee Wei Law - Thursday, 7 December 2023, 5:03 PM
 

There is no shortage of quantum computing frameworks/toolkits, including Google’s Cirq, Rigetti’s Forest SDK (including pyQuil), Microsoft’s Q#-based Quantum Development Kit, IBM’s Qiskit, Quipper, QuTiP, ETHZ’s Silq, Cambridge Quantum Computing’s tket.

We shall use Qiskit because 1️⃣ it is among the most well-established, and 2️⃣ it comes with rich learning resources.

  • Qiskit is an open-source Python-based SDK created by IBM for working with quantum computers at the level of pulses, circuits, and application modules.

We shall also use QuTiP, because while Qiskit is popular for quantum computing, QuTiP offers more features for quantum-dynamical simulations.

  • Simplistically speaking, Qiskit is more for computer scientists, whereas QuTiP is more for physicists.
  • Unlike Qiskit, which uses quantum circuits (QuantumCircuit) as the main building blocks, QuTiP uses “quantum objects” (QObj).

Watch an introduction to QuTiP:

Using Qiskit and QuTiP means we are using Python but there are so many resources for learning Python it should not be an issue for a Bachelor/Master student to pick it up along the way.

Even though the relevant computer pools will provide you with the required software, you need to install the software on your own computer(s) anyway, because you will not be able to finish any of the practicals within the allocated time.

The allocated time is only for you to get enough supervision so that you can complete the remainder of the practical on your own.

Our strategy here is to first install QuTiP, then Qiskit.

The operating system of choice for many computer scientists and cryptograhers is Linux, but the setup guide here is only applicable to Windows, because UniSA computer pools have only Windows.

Follow the instructions below (derived from the official instructions) to set up QuTiP:

  1. Install the Python distribution Miniconda, or Anaconda if you prefer installing more packages upfront.

    Upon successful installation of 64-bit Conda (short for “Miniconda/Anaconda”), you will see folder “Anaconda3 (64-bit)” on your Start menu, and under the folder, menu item “Anaconda Prompt (miniconda3)” 👈 Click this menu item to get a Conda command prompt.

    In the command prompt, run command to update Conda to the latest version:

    conda update conda
  2. Upon successful update of conda, in command line, create a conda environment called cyber (which can otherwise be any name you fancy):

    conda create -n cyber

    Environment is an essential feature of Conda for creating sandboxes for prototyping, development and experimentation. Read this guide to get a better understanding of Conda environments, including how to create/activate/list/deactivate/remove environments.

    Upon successful creation of the environment cyber, activate it:

    conda activate cyber
  3. Add the channel conda-forge to the list of channels (to be sure, keeping defaults at the highest priority) and install the necessary packages:

    conda config --append channels conda-forge
    conda install qutip pytest jupyterlab jupyterlab-git ipywidgets jupyterlab_widgets nodejs `
    seaborn numba numexpr pandas pandoc sympy
  4. Above, the backtick (`) is the line continuation character in PowerShell.

    Among the packages just installed,

    • pytest is for automating testing of Python code (e.g., of QuTiP).
    • jupyterlab is the JupyterLab package that will provide our graphical user interface (GUI).
    • jupyterlab-git is for version-controlling Jupyter notebooks.
    • ipywidgets and jupyterlab_widgets are libraries of Jupyter widgets.
    • nodejs is cross-platform Javascript runtime environment useful for JupyterLab.
    • seaborn is a Python data visualization library based on matplotlib.
    • numpy is not shown above, but is automatically installed with qutip. This is the fundamental package for scientific computing with Python.
    • numba is a just-in-time compiler that translates a subset of Python and NumPy code into fast machine code.
    • numexpr is for accelerating numerical evaluation of expressions in NumPy.
    • scipy is not shown above, but is automatically installed with qutip. This complements numpy for scientific computing with Python.
    • pandas is a data analysis library.
    • pandoc is a versatile document converter.
    • sympy is a versatile computer algebra system for symbolic computing.
    • pip is not shown above, but is a common dependency that is automatically installed by many other packages. It is a package installer for Python.

    Official Conda documentation discourages using pip and conda together, but we need pip for Qiskit later.

  5. Optional: Test your setup by running the official unit tests in a Python shell:

    import qutip.testing
    qutip.testing.run()

    These tests are computationally intensive and can slow down your computer dramatically. For reference, on a Intel Core i9-9880H CPU with 32 GB RAM, the tests take between 35 and 40 minutes.

  6. Continue to installation of Qiskit.
Tags:

R

Picture of Yee Wei Law

Reduced density operator/matrix and partial trace

by Yee Wei Law - Wednesday, 7 June 2023, 9:37 AM
 

The reduced density operator is an application of the density operator.

The reduced density operator is so useful it is indispensable in the analysis of composite quantum systems [NC10, Sec. 2.4.3].

Consider a composite system, with density matrix , consisting of Alice’s system and Bob’s system, there is often a need to express the state of Alice’s or Bob’s system in terms of .

The operation that takes us from to (denoting Alice’s density matrix) or (denoting Bob’s density matrix) is called the reduced density operator.

The reduced density operator for Alice’s system is defined by

where is a map of operators known as the partial trace over Bob’s system.

Suppose and are any two vectors in Alice’s state space, and furthermore, and are any two vectors in Bob’s state space, then the partial trace is defined by the operation [NC10, (2.178)]:

(1)

Above, the notation is equivalent to

To see why the definition above makes sense, suppose a quantum system is in the product state , where and are the density matrices for subsystems and respectively, then

since the trace of any density matrix is 1. Similarly,

In general, if

where is an orthonormal basis of , and is an orthonormal basis of , then the partial trace over is [WN17, Definition 1.6.1]:

For a quick summary of discussion up to this point, watch edX Lecture 1.7 “The partial trace” of Quantum Cryptography by CaltechDelftX QuCryptox.

Example 1 [KLM07, Sec. 3.5.2; NC10, p. 106; Qis21, Sec. 4]

Consider the pure (entangled) Bell state: .

The system comprises 1️⃣ single-qubit subsystem with basis vectors and , and 2️⃣ single-qubit subsystem with basis vectors and .

This system is entangled (i.e., not separable) because , but using the reduced density operator, we can find a full description for subsystem and for subsystem .

The density matrix for the system is:

Applying Eq. (1), the reduced density operator for subsystem is:

Similarly, .

Since , both and are mixed states.

🤔 How do we reconcile the preceding observation ☝ with the fact that is a pure state?

  • The result of calculating the reduced density operator for is equivalent to the representation we obtain for when measurements were taken over the qubit of .
  • When measuring ’s qubit in the standard basis, the outcome is or at equal probabilities.
  • Due to entanglement, ’s qubit is or at equal probabilities.
  • Similarly for the reduced density operator for . Hence the mixed states.
  • We can say the reduced density operator is a way of describing the statistical outcomes of a subsystem when the measurement outcome of the other subsystem (in a bipartite system) is averaged out — this is in fact what “tracing out” the other subsystem means.

The strange property, that the joint state of a system can be pure (completely known) yet a subsystem be in mixed states, is a hallmark of quantum entanglement.

⚠ Caution [KLM07, Exercise 3.5.5]

The partial trace contains all the relevant information about subsystem if subsystem is discarded.

Similarly, contains all the relevant information about subsystem if subsystem is discarded.

These local descriptions do not in general contain enough information to reconstruct the state of the whole system.

Expressing a bipartite vector in the Schmidt basis makes it much easier to compute the partial trace of either subsystem. For this reason, let us discuss Schmidt decomposition.

References

[Gra21] F. Grasselli, Quantum Cryptography: From Key Distribution to Conference Key Agreement, Quantum Science and Technology, Springer Cham, 2021. https://doi.org/10.1007/978-3-030-64360-7.
[KLM07] P. Kaye, R. Laflamme, and M. Mosca, An Introduction to Quantum Computing, Oxford University Press, 2007. Available at https://ebookcentral.proquest.com/lib/unisa/reader.action?docID=415080.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
[Qis21] Qiskit, The density matrix and mixed states, Qiskit textbook, June 2021. Available at https://learn.qiskit.org/course/quantum-hardware/density-matrix.
[WN17] S. Wehner and N. Ng, Lecture Notes: edX Quantum Cryptography, CaltechDelftX: QuCryptox, 2017. Available at https://courses.edx.org/courses/course-v1:CaltechDelftX+QuCryptox+3T2018/pdfbook/0/.

S

Picture of Yee Wei Law

Schatten norm

by Yee Wei Law - Sunday, 19 March 2023, 9:47 PM
 

For , suppose its singular values are .

Then, the Schatten -norm of , where , is defined as [Ber09, Proposition 9.2.3]:

When , we have the Schatten 1-norm, which is also called the trace norm or nuclear norm [Ber09, p. 549]:

When , we have the Frobenius norm:

When , we have the spectral norm:

References

[Ber09] D. R. Bernstein, Matrix Mathematics: Theory, Facts, and Formulas, 2nd ed., Princeton University Press, 2009.

Picture of Yee Wei Law

Schmidt decomposition

by Yee Wei Law - Wednesday, 14 June 2023, 10:11 PM
 

References

[Cho22] M.-S. Choi, A Quantum Computation Workbook, Springer Cham, 2022. https://doi.org/10.1007/978-3-030-91214-7.

Picture of Yee Wei Law

Secret key rate

by Yee Wei Law - Thursday, 23 March 2023, 12:44 PM
 

The secret key rate is the fraction of secure key bits produced per protocol round, where a round is the transmission of a quantum state through the quantum channel [Gra21, p. 38].

The secret key rate generally depends on the total number of rounds performed.

The asymptotic secret key rate (often just asymptotic key rate) is the secret key rate when is assumed to simplify analysis.

  • Assuming direct reconciliation, the asymptotic key rate of any quantum key distribution (QKD) protocol with one-way error correction is lower-bounded by the Devetak-Winter rate [DW05]:

    where denotes quantum mutual information, , and are the random variables representing Alice’s, Bob’s and Eve’s raw key bits.

  • An intuitive interpretation of the Devetak-Winter rate: the fraction of secret bits generated per round of using the protocol is equal to the amount of information shared by Alice and Bob, , minus the amount of information that Eve has on Alice’s part of the key, [Wol21, p.145].

Assuming is not realistic, and the security of a QKD protocol has to be analysed assuming a finite and generally finite resources.

Analysis of the secret key rate and associated security properties of a QKD protocol is called finite-key analysis [TLGR12], to be covered in the future.

References

[DW05] I. Devetak and A. Winter, Distillation of secret key and entanglement from quantum states, Proceedings: Mathematical, Physical and Engineering Sciences 461 no. 2053 (2005), 207–235.
[Gra21] F. Grasselli, Quantum Cryptography: From Key Distribution to Conference Key Agreement, Quantum Science and Technology, Springer Cham, 2021. https://doi.org/10.1007/978-3-030-64360-7.
[TLGR12] M. Tomamichel, C. C. W. Lim, N. Gisin, and R. Renner, Tight finite-key analysis for quantum cryptography, Nat Commun 3 no. 634 (2012). https://doi.org/10.1038/ncomms1631.
[Wol21] R. Wolf, Quantum Key Distribution: An Introduction with Exercises, Springer, Cham, 2021. https://doi.org/10.1007/978-3-030-73991-1.

Picture of Yee Wei Law

Security of quantum key distribution (QKD): overview

by Yee Wei Law - Tuesday, 29 August 2023, 5:25 PM
 

Methods for analysing the security of quantum key distribution (QKD) schemes/protocols are still being developed [PAB+20, PR22].

  • These methods combine existing cryptographic notions and techniques with quantum information theory.
  • Depending on the implementation of the QKD scheme, physical laws governing the implementation (e.g., quantum-optical laws) also play a role.
  • Compared to computational security, which can be reduced to complexity-theoretic reasoning based on the Turing machine, methods for analysing the security of QKD schemes are thus more involved and, in terms of the transdisciplinary effort required, more challenging.

The security of a QKD scheme is typically analysed in terms of the level of success of 1️⃣ individual attacks, 2️⃣ collective attacks and 3️⃣ coherent attacks; in 🔼 increasing order of power given to the adversary [Wol21, Sec. 5.3.1].

  • Individual and collective attacks are usually considered in order to simplify the security analysis, but it is necessary to also consider coherent attacks in order to prove the security of a QKD scheme.
  • We can analyse the different types of attacks by the way 😈 Eve interacts with 👩 Alice’s signals and how Eve processes the information she gets in this way.
  • General procedure for extracting information from a quantum system:

    1. 😈 Eve attaches an ancilla system in the predefined state to the quantum state transmitted by 👩 Alice; and are density-matrix representations of quantum states.

      Please spend time understanding pure state, mixed state and density matrix.

    2. 😈 Eve then performs a unitary operation on the composite system, which leaves the state of the ancilla system in the form:

      where is the Kronecker operator and denotes partial trace.

      Please spend time understanding reduced density matrix and partial trace.

The security of a QKD scheme is also often analysed in terms of composability, short for universally composable security.

  • Informally, we say a QKD scheme is composable if the key it produces is almost as good as if it were distributed with an ideal key distribution protocol [Van06, Sec. 12.2.6].
  • A cryptographic primitive, which is secure when used with an ideally secret key, must still be secure if used with a QKD-distributed key.
  • Composability is critical since QKD-derived secret keys are used in other applications, e.g., data encryption [JCM+22].

TODO: Trace distance criterion [PR22], security = correctness + secrecy [Gra21]. Asymptotic vs finite-key security analysis.

Security evaluation of practical QKD implementations involves evaluating the level of success of “quantum hacking” (i.e., side-channel attacks on QKD).

References

[Gra21] F. Grasselli, Quantum Cryptography: From Key Distribution to Conference Key Agreement, Quantum Science and Technology, Springer Cham, 2021. https://doi.org/10.1007/978-3-030-64360-7.
[JCM+22] N. Jain, H.-M. Chin, H. Mani, C. Lupo, D. S. Nikolic, A. Kordts, S. Pirandola, T. B. Pedersen, M. Kolb, B. Ömer, C. Pacher, T. Gehring, and U. L. Andersen, Practical continuous-variable quantum key distribution with composable security, Nature Communications 13 no. 1 (2022), 4740. https://doi.org/10.1038/s41467-022-32161-y.
[PAB+20] S. Pirandola, U. L. Andersen, L. Banchi, M. Berta, D. Bunandar, R. Colbeck, D. Englund, T. Gehring, C. Lupo, C. Ottaviani, J. L. Pereira, M. Razavi, J. Shamsul Shaari, M. Tomamichel, V. C. Usenko, G. Vallone, P. Villoresi, and P. Wallden, Advances in quantum cryptography, Advances in Optics and Photonics 12 no. 4 (2020), 1012–1236. https://doi.org/10.1364/AOP.361502.
[PR22] C. Portmann and R. Renner, Security in quantum cryptography, Rev. Mod. Phys. 94 no. 2 (2022), 025008. https://doi.org/10.1103/RevModPhys.94.025008.
[Sch10] S. Schauer, Attack Strategies on QKD Protocols, in Applied Quantum Cryptography (C. Kollmitzer and M. Pivk, eds.), Lect. Notes Phys. 797, Springer Berlin Heidelberg, 2010, pp. 71–95. https://doi.org/10.1007/978-3-642-04831-9_5.
[TL17] M. Tomamichel and A. Leverrier, A largely self-contained and complete security proof for quantum key distribution, Quantum 1 (2017), 14. https://doi.org/10.22331/q-2017-07-14-14.
[Van06] G. Van Assche, Quantum Cryptography and Secret-Key Distillation, Cambridge University Press, 2006. https://doi.org/10.1017/CBO9780511617744.
[Wol21] R. Wolf, Quantum Key Distribution: An Introduction with Exercises, Springer, Cham, 2021. https://doi.org/10.1007/978-3-030-73991-1.

Picture of Yee Wei Law

Separable vs entangled

by Yee Wei Law - Friday, 9 June 2023, 10:13 AM
 

The joint state, , of two quantum systems and is separable [WN17, Definition 2.1.1] if there exists a probability distribution , and sets of density matrices and such that

(1)

If such an expression for does not exist, is entangled [WN17, Definition 2.1.1].

Specifically, if is a pure state, then is separable if and only there exists and such that

Example 1: [WN17, Example 2.1.3]

The density matrix

is separable because it takes the form of Eq. (1).

Subsystems and are not entangled, but they are (classically) correlated.

Example 2: [WN17, Example 2.1.2]

The state is separable because

Example 3: [WN17, Example 2.1.1]
The Einstein-Podolsky-Rosen (EPR) pair is entangled because it cannot be expressed in the form of Eq. (1).
Example 4: [WN17, Example 2.1.4]

This example is meant to highlight the difference between the following two states:

where . is separable whereas is not.

Consider the outcomes of measuring subsystem in and in the standard basis and in the Hadamard basis.

Measuring subsystem of in the Hadamard basis:

Define the measurement operators to be and , where and . Clearly, and .

Using projective measurement, the post-measurement state conditioned on measurement outcome is

Let us work out the numerator and the denominator separately, starting with the numerator:

The preceding equality follows from these identities, which you will derive in the practical:

The denominator is:

The preceding computation is tedious but straightforward given the right tool (e.g., NumPy). Combining the results for the numerator and denominator, we get

Thus, upon measuring a on subsystem , subsystem can be in either or at equal probabilities; we say the reduced state on is maximally mixed.

Measuring subsystem of in the Hadamard basis:

The pair of and can be re-expressed as and , because ‘’ is orthogonal to ‘’ just as ‘’ is orthogonal to ‘’.

The preceding statement implies when is measured on subsystem , subsystem is in state as well.

Correlations in are thus stronger than those in .

References

[WN17] S. Wehner and N. Ng, Lecture Notes: edX Quantum Cryptography, CaltechDelftX: QuCryptox, 2017. Available at https://courses.edx.org/courses/course-v1:CaltechDelftX+QuCryptox+3T2018/pdfbook/0/.

Picture of Yee Wei Law

Singular value

by Yee Wei Law - Saturday, 11 March 2023, 3:16 PM
 

Singular values, like eigenvalues, are an intrinsic property of a matrix. Unsurprisingly, they can be defined in terms of eigenvalues:

Definition 1: Singular value [Ber09, Definition 5.6.1]

Suppose matrix has eigenvalues , where . Then, the singular values of are the nonnegative numbers:

Singular values can also be defined through the operation called singular value decomposition:

Definition 2: Singular value decomposition and singular values [Hog13, Sec. 5.6]

A singular value decomposition (SVD) of a matrix is the factorisation:

where , and are unitary.

The diagonal entries of , namely , are the singular values of .

The columns of are the left singular vectors of .

The columns of are the right singular vectors of .

References

[Ber09] D. R. Bernstein, Matrix Mathematics: Theory, Facts, and Formulas, 2nd ed., Princeton University Press, 2009.
[Hog13] L. Hogben (ed.), Handbook of Linear Algebra, 2nd ed., CRC Press, 2013. https://doi.org/10.1201/b16113.

Picture of Yee Wei Law

Spectral theorem and spectral decomposition

by Yee Wei Law - Tuesday, 29 August 2023, 10:00 AM
 

Spectral theorem is one of the fundamental theorems of linear algebra [ABH09, Sec. 3.6].

Based on the spectral theorem, spectral decomposition is an essential tool in quantum theory [NC10, Box 2.2].

Multiple equivalent interpretations of the spectral theorem exist, e.g., [ABH09, Theorems 3.6.4 and 3.6.12].

The interpretation in Theorem 1 directly defines spectral decomposition, and is hence also called the spectral decomposition theorem.

Theorem 1: Spectral (decomposition) theorem [Hol13, Theorem 8.23; Zha11, Theorem 3.4; KLM07, Theorem 2.4.3]

An -square complex matrix is normal iff it is orthogonally diagonalisable or unitarily diagonalisable, i.e., there exists a unitary matrix such that

where

  • are the eigenvalues of ;
  • consists of the orthonormal eigenvectors of in its columns in the same order as .

In particular,

  • is positive semidefinite .
  • is Hermitian are real.
  • is unitary .

Any normal operator, , has an outer product representation [KLM07, Sec. 2.4; Mey00, p. 517]:

where

  • are the eigenpairs of ;
  • form an orthormal basis of the Hilbert space in which is defined.

The outer products are projectors that satisfy

  • the completeness relation: ; and
  • the orthonormality relation: , where is the Kronecker delta.
Example 1 [KLM07, Theorem 2.4.2, Example 2.4.4]

The Pauli-X matrix is a normal operator:

Manually or using NumPy, we can determine the eigenpairs of to be and . Thus,

References

[ABH09] M. A. Akcoglu, P. F. A. Bartha, and D. M. Ha, Analysis in Vector Spaces: A Course in Advanced Calculus, John Wiley & Sons, 2009. https://doi.org/10.1002/9781118164587.
[Hol13] J. Holt, Linear Algebra with Applications, W. H. Freeman and Company, 2013.
[KLM07] P. Kaye, R. Laflamme, and M. Mosca, An Introduction to Quantum Computing, Oxford University Press, 2007. Available at https://ebookcentral.proquest.com/lib/unisa/reader.action?docID=415080.
[Mey00] C. Meyer, Matrix Analysis and Applied Linear Algebra, SIAM, 2000. Available at http://portal.igpublish.com.eu1.proxy.openathens.net/iglibrary/obj/SIAMB0000114.
[NC10] M. A. Nielsen and I. L. Chuang, Quantum computation and quantum information, 10th anniversary ed., Cambridge University Press, 2010. Available at http://mmrc.amss.cas.cn/tlb/201702/W020170224608149940643.pdf.
[Zha11] F. Zhang, Matrix Theory: Basic Results and Techniques, 2nd ed., Universitext, Springer New York, NY, 2011. https://doi.org/10.1007/978-1-4614-1099-7.


Page: (Previous)   1  2  3  4  5  (Next)
  ALL