QuantumComputationandQuantumInformation Michael A. Nielsen& Isaac L. Chuang PUBLISHED BY THE PRESS SYNDICATE OF THE UNIVERSITY OF CAMBRIDGE ThePitt Building,TrumpingtonStreet,Cambridge, UnitedKingdom CAMBRIDGE UNIVERSITY PRESS TheEdinburghBuilding,Cambridge CB22RU,UK www.cup.cam.ac.uk 40West 20th Street,NewYork, NY 10011-4211, USA www.cup.org 10StamfordRoad,Oakleigh, Melbourne3166, Australia RuizdeAlarcon ? 13,28014 Madrid,Spain c Cambridge UniversityPress 2000 Thisbook isin copyright.Subjectto statutory exception andtotheprovisions ofrelevantcollectivelicensingagreements, noreproductionofanypartmaytakeplacewithout thewrittenpermission of Cambridge UniversityPress. First published2000 PrintedintheUnitedKingdom attheUniversityPress, Cambridge 1 A TypefaceMonotypeEhrhardt10 /13pt SystemLTX2" [EPC] E 2 Acataloguerecordofthisbook isavailablefromtheBritishLibrary LibraryofCongressCataloguinginPublicationdata Nielsen,MichaelA., andChuang,IsaacL. QuantumComputationandQuantumInformation/MichaelA.NielsenandIsaacL.Chuang. p. cm. Includesbibliographical referencesandindex. ISBN0-521-63503-9 1. Physics. I. Title. QA401.G47 2000 0 511 .8{dc21 98-22029 CIP ISBN052163235 8hardback ISBN052163503 9paperbackContents Preface pagexv Acknowledgements xxi Nomenclatureandnotation xxiii PartI Fundamentalconcepts 1 1 Introductionandoverview 1 1.1 Globalperspectives 1 1.1.1 Historyof quantum computation and quantum information 2 1.1.2 Future directions 12 1.2 Quantum bits 13 1.2.1 Multiplequbits 16 1.3 Quantum computation 17 1.3.1 Singlequbit gates 17 1.3.2 Multiplequbit gates 20 1.3.3 Measurements inbases other than the computational basis 22 1.3.4 Quantum circuits 22 1.3.5 Qubitcopyingcircuit? 24 1.3.6 Example:Bellstates 25 1.3.7 Example: quantum teleportation 26 1.4 Quantum algorithms 28 1.4.1 Classical computations ona quantum computer 29 1.4.2 Quantum parallelism 30 1.4.3 Deutsch’s algorithm 32 1.4.4 TheDeutsch{Jozsa algorithm 34 1.4.5 Quantum algorithms summarized 36 1.5 Experimental quantum information processing 42 1.5.1 TheStern{Gerlach experiment 43 1.5.2 Prospects forpractical quantum informationprocessing 46 1.6 Quantum information 50 1.6.1 Quantum information theory: example problems 52 1.6.2 Quantum information inawider context 58 2 Introductiontoquantummechanics 60 2.1 Linear algebra 61 2.1.1 Bases and linear independence 62 2.1.2 Linear operators andmatrices 63viii Contents 2.1.3 ThePaulimatrices 65 2.1.4 Inner products 65 2.1.5 Eigenvectors andeigenvalues 68 2.1.6 Adjoints and Hermitian operators 69 2.1.7 Tensorproducts 71 2.1.8 Operator functions 75 2.1.9 The commutator and anti-commutator 76 2.1.10 Thepolarand singularvaluedecompositions 78 2.2 The postulates of quantum mechanics 80 2.2.1 State space 80 2.2.2 Evolution 81 2.2.3 Quantum measurement 84 2.2.4 Distinguishing quantum states 86 2.2.5 Projective measurements 87 2.2.6 POVMmeasurements 90 2.2.7 Phase 93 2.2.8 Composite systems 93 2.2.9 Quantum mechanics: aglobal view 96 2.3 Application: superdense coding 97 2.4 The density operator 98 2.4.1 Ensemblesof quantum states 99 2.4.2 General properties ofthe density operator 101 2.4.3 The reduced density operator 105 2.5 The Schmidt decomposition and puri?cations 109 2.6 EPRand theBellinequality 111 3 Introductiontocomputerscience 120 3.1 Modelsforcomputation 122 3.1.1 Turingmachines 122 3.1.2 Circuits 129 3.2 Theanalysisofcomputational problems 135 3.2.1 How toquantify computational resources 136 3.2.2 Computational complexity 138 3.2.3 Decisionproblemsandthe complexity classesP andNP 141 3.2.4 A plethora ofcomplexity classes 150 3.2.5 Energy and computation 153 3.3 Perspectives on computer science 161 PartII Quantumcomputation 171 4 Quantumcircuits 171 4.1 Quantum algorithms 172 4.2 Singlequbitoperations 174 4.3 Controlledoperations 177 4.4 Measurement 185 4.5 Universalquantum gates 188 Contents ix 4.5.1 Two-levelunitary gates are universal 189 4.5.2 Singlequbitand gates areuniversal 191 4.5.3 Adiscreteset ofuniversal operations 194 4.5.4 Approximating arbitraryunitary gates isgenerically hard 198 4.5.5 Quantum computational complexity 200 4.6 Summary ofthe quantum circuitmodel ofcomputation 202 4.7 Simulationof quantum systems 204 4.7.1 Simulationinaction 204 4.7.2 Thequantum simulationalgorithm 206 4.7.3 Anillustrativeexample 209 4.7.4 Perspectives onquantum simulation 211 5 ThequantumFouriertransformanditsapplications 216 5.1 Thequantum Fouriertransform 217 5.2 Phase estimation 221 5.2.1 Performance and requirements 223 5.3 Applications: order-?nding and factoring 226 5.3.1 Application: order-?nding 226 5.3.2 Application: factoring 232 5.4 General applications of the quantum Fourier transform 234 5.4.1 Period-?nding 236 5.4.2 Discrete logarithms 238 5.4.3 Thehidden subgroupproblem 240 5.4.4 Otherquantum algorithms? 242 6 Quantumsearchalgorithms 248 6.1 Thequantum search algorithm 248 6.1.1 Theoracle 248 6.1.2 Theprocedure 250 6.1.3 Geometric visualization 252 6.1.4 Performance 253 6.2 Quantum search as a quantum simulation 255 6.3 Quantum counting 261 6.4 Speeding upthe solutionofNP-complete problems 263 6.5 Quantum search ofan unstructured database 265 6.6 Optimalityofthe search algorithm 269 6.7 Black boxalgorithmlimits 271 7 Quantumcomputers:physicalrealization 277 7.1 Guiding principles 277 7.2 Conditionsforquantum computation 279 7.2.1 Representation ofquantum information 279 7.2.2 Performance ofunitary transformations 281 7.2.3 Preparation of ?ducial initialstates 281 7.2.4 Measurement ofoutput result 282 7.3 Harmonicoscillatorquantum computer 283 7.3.1 Physicalapparatus 283x Contents 7.3.2 TheHamiltonian 284 7.3.3 Quantum computation 286 7.3.4 Drawbacks 286 7.4 Optical photon quantum computer 287 7.4.1 Physical apparatus 287 7.4.2 Quantum computation 290 7.4.3 Drawbacks 296 7.5 Optical cavity quantum electrodynamics 297 7.5.1 Physical apparatus 298 7.5.2 TheHamiltonian 300 7.5.3 Single-photon single-atomabsorptionand refraction 303 7.5.4 Quantum computation 306 7.6 Ion traps 309 7.6.1 Physical apparatus 309 7.6.2 TheHamiltonian 317 7.6.3 Quantum computation 319 7.6.4 Experiment 321 7.7 Nuclear magnetic resonance 324 7.7.1 Physical apparatus 325 7.7.2 TheHamiltonian 326 7.7.3 Quantum computation 331 7.7.4 Experiment 336 7.8 Other implementation schemes 343 PartIII Quantuminformation 353 8 Quantumnoiseandquantumoperations 353 8.1 Classicalnoiseand Markovprocesses 354 8.2 Quantum operations 356 8.2.1 Overview 356 8.2.2 Environments and quantum operations 357 8.2.3 Operator-sum representation 360 8.2.4 Axiomatic approach toquantum operations 366 8.3 Examples ofquantum noiseand quantum operations 373 8.3.1 Trace and partial trace 374 8.3.2 Geometric picture ofsinglequbit quantum operations 374 8.3.3 Bit ip and phase ipchannels 376 8.3.4 Depolarizing channel 378 8.3.5 Amplitude damping 380 8.3.6 Phase damping 383 8.4 Applications of quantum operations 386 8.4.1 Master equations 386 8.4.2 Quantum process tomography 389 8.5 Limitations ofthequantum operations formalism 394 Contents xi 9 Distancemeasuresforquantuminformation 399 9.1 Distance measures for classicalinformation 399 9.2 Howcloseare twoquantum states? 403 9.2.1 Tracedistance 403 9.2.2 Fidelity 409 9.2.3 Relationships between distance measures 415 9.3 How well does a quantum channel preserve information? 416 10 Quantumerror-correction 425 10.1 Introduction 426 10.1.1 Thethree qubitbitipcode 427 10.1.2 Threequbitphase ipcode 430 10.2 TheShorcode 432 10.3 Theoryofquantum error-correction 435 10.3.1 Discretizationofthe errors 438 10.3.2 Independent error models 441 10.3.3 Degenerate codes 444 10.3.4 Thequantum Hamming bound 444 10.4 Constructing quantum codes 445 10.4.1 Classicallinearcodes 445 10.4.2 Calderbank{Shor{Steane codes 450 10.5 Stabilizercodes 453 10.5.1 Thestabilizerformalism 454 10.5.2 Unitary gatesand the stabilizerformalism 459 10.5.3 Measurement inthe stabilizerformalism 463 10.5.4 TheGottesman{Knill theorem 464 10.5.5 Stabilizercode constructions 464 10.5.6 Examples 467 10.5.7 Standard formfor astabilizercode 470 10.5.8 Quantum circuits for encoding, decoding, and correction 472 10.6 Fault-tolerant quantum computation 474 10.6.1 Fault-tolerance: the bigpicture 475 10.6.2 Fault-tolerant quantum logic 482 10.6.3 Fault-tolerant measurement 489 10.6.4 Elements ofresilientquantum computation 493 11 Entropyandinformation 500 11.1 Shannon entropy 500 11.2 Basic properties ofentropy 502 11.2.1 Thebinaryentropy 502 11.2.2 Therelativeentropy 504 11.2.3 Conditional entropy and mutual information 505 11.2.4 Thedata processing inequality 509 11.3 VonNeumann entropy 510 11.3.1 Quantum relativeentropy 511 11.3.2 Basic properties ofentropy 513 11.3.3 Measurements and entropy 514xii Contents 11.3.4 Subadditivity 515 11.3.5 Concavity of the entropy 516 11.3.6 The entropy ofa mixture ofquantum states 518 11.4 Strong subadditivity 519 11.4.1 Proofof strongsubadditivity 519 11.4.2 Strong subadditivity:elementary applications 522 12 Quantuminformationtheory 528 12.1 Distinguishing quantum states and the accessibleinformation 529 12.1.1 TheHolevobound 531 12.1.2 Example applications of the Holevobound 534 12.2 Data compression 536 12.2.1 Shannon’s noiselesschannel coding theorem 537 12.2.2 Schumacher’s quantum noiseless channel coding theorem 542 12.3 Classicalinformationovernoisyquantum channels 546 12.3.1 Communication overnoisyclassicalchannels 548 12.3.2 Communication overnoisyquantum channels 554 12.4 Quantum information over noisy quantum channels 561 12.4.1 Entropy exchange and the quantum Fano inequality 561 12.4.2 The quantum dataprocessing inequality 564 12.4.3 Quantum Singleton bound 568 12.4.4 Quantum error-correction,refrigerationandMaxwell’sdemon 569 12.5 Entanglement asaphysical resource 571 12.5.1 Transforming bi-partitepure state entanglement 573 12.5.2 Entanglement distillationanddilution 578 12.5.3 Entanglement distillationandquantum error-correction 580 12.6 Quantum cryptography 582 12.6.1 Private keycryptography 582 12.6.2 Privacy ampli?cationand informationreconciliation 584 12.6.3 Quantum keydistribution 586 12.6.4 Privacy andcoherent information 592 12.6.5 The security ofquantum keydistribution 593 Appendices 608 Appendix1: Notesonbasicprobability theory 608 Appendix2: Grouptheory 610 A2.1 Basic de?nitions 610 A2.1.1 Generators 611 A2.1.2 Cyclicgroups 611 A2.1.3 Cosets 612 A2.2 Representations 612 A2.2.1 Equivalence and reducibility 612 A2.2.2 Orthogonality 613 A2.2.3 The regular representation 614Contents xiii A2.3 Fouriertransforms 615 Appendix3: TheSolovay{Kitaev theorem 617 Appendix4: Numbertheory 625 A4.1 Fundamentals 625 A4.2 Modulararithmetic andEuclid’salgorithm 626 A4.3 Reduction offactoring to order-?nding 633 A4.4 Continued fractions 635 Appendix5: Publickeycryptography andtheRSAcryptosystem 640 Appendix6: ProofofLieb’stheorem 645 Bibliography 649 Index 665I Fundamentalconcepts 1 Introduction andoverview Science offers the boldest metaphysics of the age. It is a thoroughly human construct,drivenbythefaiththatifwedream,presstodiscover,explain,and dreamagain,therebyplungingrepeatedlyintonewterrain,theworldwillsome- how come clearer and we will grasp the true strangeness of the universe. And thestrangenesswillallprovetobeconnected,andmakesense. {EdwardO.Wilson Informationisphysical. { Rolf Landauer Whatarethefundamental concepts ofquantum computationandquantum information? Howdidtheseconcepts develop? Towhat usesmay they beput? Howwillthey bepre- sentedinthisbook?Thepurposeofthisintroductorychapteristoanswerthesequestions by developing in broad brushstrokes a picture of the ?eld of quantum computation and quantum information.Theintentistocommunicateabasicunderstanding ofthecentral concepts of the ?eld, perspective on how they have been developed, and to help you decide howto approach the rest ofthe book. Our story begins in Section 1.1 with an account of the historical context in which quantum computation and quantum information has developed. Each remaining section in the chapter gives a brief introduction to one or more fundamental concepts from the ?eld: quantum bits(Section 1.2),quantum computers, quantum gates and quantum cir- cuits(Section1.3),quantumalgorithms(Section1.4),experimentalquantuminformation processing (Section 1.5), and quantum information and communication (Section 1.6). Along the way, illustrative and easily accessible developments such as quantum tele- portation and some simple quantum algorithms are given, using the basic mathematics taught in this chapter. The presentation is self-contained, and designed to be accessible even without a background in computer science or physics. As we move along, we give pointerstomorein-depthdiscussionsinlaterchapters,wherereferencesandsuggestions for further reading may alsobe found. If as you read you’re ?nding the going rough, skip on to a spot where you feel more comfortable. Atpoints wehaven’t been ableto avoid using alittle technical lingowhich won’tbecompletelyexplaineduntillaterinthebook.Simplyacceptitfornow,andcome backlaterwhenyouunderstand alltheterminologyinmoredetail.Theemphasisinthis ?rstchapter isonthebigpicture, withthedetails tobe?lledinlater. 1.1 Globalperspectives Quantumcomputationandquantuminformationisthestudyoftheinformationprocess- ing tasks that can be accomplished using quantum mechanical systems. Sounds pretty2 Introductionandoverview simpleand obvious,doesn’t it?Likemany simplebutprofound ideas it wasalongtime beforeanybodythoughtofdoinginformationprocessingusingquantum mechanicalsys- tems. To see why this is the case, we must go back in time and look in turn at each of the ?elds which have contributed fundamental ideas to quantum computation and quantum information { quantum mechanics, computer science, information theory, and cryptography. As we take our short historical tour of these ?elds, think of yourself ?rst as a physicist, then as a computer scientist, then as an information theorist, and ?nally as a cryptographer, in order to get some feel for the disparate perspectives which have come together inquantum computation and quantum information. 1.1.1 Historyofquantumcomputationandquantuminformation Ourstorybeginsatthe turnofthetwentieth century when aunheralded revolutionwas underway in science. A series of crises had arisen in physics. The problem was that the theoriesofphysicsatthattime(nowdubbedclassicalphysics)werepredictingabsurdities suchastheexistenceofan‘ultravioletcatastrophe’involvingin?niteenergies,orelectrons spiraling inexorably into the atomic nucleus. At ?rst such problems were resolved with the addition of ad hoc hypotheses to classical physics, but as a better understanding of atoms and radiation was gained these attempted explanations became more and more convoluted.Thecrisiscametoaheadintheearly1920safteraquartercenturyofturmoil, and resulted in the creation of the modern theory of quantum mechanics. Quantum mechanics has been an indispensable part of science ever since, and has been applied with enormous success to everything under and inside the Sun, including the structure of the atom, nuclear fusion in stars, superconductors, the structure of DNA, and the elementary particles of Nature. Whatisquantummechanics?Quantummechanicsisamathematicalframeworkorset ofrulesfortheconstructionofphysicaltheories.Forexample,thereisaphysicaltheory knownasquantumelectrodynamics whichdescribeswithfantasticaccuracy theinterac- tion of atoms and light. Quantum electrodynamics is built up within the framework of quantummechanics,butitcontainsspeci?crulesnotdeterminedbyquantummechanics. The relationship of quantum mechanics to speci?c physical theories like quantum elec- trodynamics is rather like the relationship of a computer’s operating system to speci?c applications software { the operating system sets certain basicparameters and modes of operation, butleaves open how speci?c tasks are accomplished by the applications. The rules of quantum mechanics are simple but even experts ?nd them counter- intuitive,andtheearliestantecedentsofquantumcomputationandquantuminformation may be found in the long-standing desire of physicists to better understand quantum mechanics. The best known critic of quantum mechanics, Albert Einstein, went to his graveunreconciledwiththetheoryhehelpedinvent.Generationsofphysicistssincehave wrestled with quantum mechanics in an effort to make its predictions more palatable. One of the goals of quantum computation and quantum information is to develop tools which sharpen our intuition about quantum mechanics, and make its predictions more transparent to human minds. For example, inthe early 1980s,interest aroseinwhether it might bepossibleto use quantumeffectstosignalfasterthanlight{abigno-noaccordingtoEinstein’stheoryof relativity.Theresolutionof thisproblemturns out to hingeonwhether itispossibleto clone anunknownquantum state,thatis,constructacopyofaquantum state.Ifcloning werepossible,thenitwouldbepossibletosignalfasterthanlightusingquantumeffects.Globalperspectives 3 However,cloning{soeasytoaccomplishwithclassicalinformation(considerthewords in frontof you, and where they came from!){ turns out not to bepossibleingeneral in quantum mechanics. This no-cloning theorem, discovered in the early 1980s, is one of theearliestresultsofquantumcomputationandquantuminformation.Manyre?nements oftheno-cloningtheoremhavesincebeendeveloped,andwenowhaveconceptual tools whichallowustounderstandhowwella(necessarilyimperfect)quantum cloningdevice might work. These tools, in turn, have been applied to understand other aspects of quantum mechanics. A related historical strand contributing to the development of quantum computation andquantuminformationistheinterest,datingtothe1970s,ofobtainingcompletecon- troloversinglequantumsystems.Applicationsofquantummechanicspriortothe1970s typically involved a gross level of control over a bulk sample containing an enormous number ofquantum mechanical systems,noneofthem directly accessible.Forexample, superconductivityhasasuperbquantummechanicalexplanation.However,becauseasu- perconductorinvolvesahuge(comparedtotheatomicscale)sampleofconductingmetal, we can only probe a few aspects of its quantum mechanical nature, with the individual quantum systems constituting the superconductor remaining inaccessible. Systems such as particle accelerators do allowlimitedaccess to individual quantum systems,butagain provide littlecontroloverthe constituent systems. Since the 1970s many techniques for controlling single quantum systems have been developed. For example, methods have been developed for trapping a single atom in an ‘atomtrap’,isolatingitfromtherestoftheworldandallowingustoprobemanydifferent aspects of its behavior with incredible precision. The scanning tunneling microscope has been used to move single atoms around, creating designer arrays of atoms at will. Electronic devices whose operation involves the transfer of only single electrons have been demonstrated. Why all this effort to attain complete control over single quantum systems? Setting aside the many technological reasons and concentrating on pure science, the principal answer is that researchers have done this on a hunch. Often the most profound insights in science come when we develop a method for probing a new regime of Nature. For example, the invention of radio astronomy in the 1930s and 1940s led to a spectacular sequenceofdiscoveries,includingthegalacticcoreoftheMilkyWaygalaxy,pulsars,and quasars. Lowtemperature physicshas achieveditsamazing successes by?nding waysto lower the temperatures of different systems. In a similar way, by obtaining complete control over single quantum systems, we are exploring untouched regimes of Nature in thehopeofdiscoveringnewandunexpectedphenomena.Wearejustnowtakingour?rst steps along these lines, and already a few interesting surprises have been discovered in this regime.What else shallwediscoveras weobtainmore complete controloversingle quantum systems, and extend ittomore complex systems? Quantumcomputationandquantuminformation?tnaturallyintothisprogram.They provide a useful series of challenges at varied levels of dif?culty for people devising methodstobettermanipulatesinglequantumsystems,andstimulatethedevelopmentof new experimental techniques and provide guidance as to the mostinteresting directions in which to take experiment. Conversely, the ability to control single quantum systems is essential if we are to harness the power of quantum mechanics for applications to quantum computation and quantum information. Despitethisintenseinterest,effortstobuildquantuminformationprocessingsystems4 Introductionandoverview have resulted in modest success to date. Small quantum computers, capable of doing dozensofoperationsonafewqubitsrepresentthestateoftheartinquantumcomputation. Experimentalprototypesfordoingquantumcryptography {awayofcommunicating in secretacrosslongdistances{havebeendemonstrated,andareevenatthelevelwherethey may be useful for some real-world applications. However, it remains a great challenge to physicists and engineers of the future to develop techniques for making large-scale quantum information processing areality. Letusturnourattentionfromquantummechanics toanotherofthegreatintellectual triumphs of the twentieth century, computer science. The origins of computer science arelostinthedepthsofhistory.Forexample,cuneiformtabletsindicatethatbythetime ofHammurabi(circa1750B.C.)theBabylonianshaddevelopedsomefairlysophisticated algorithmicideas, anditislikelythatmany ofthoseideasdate toevenearlier times. Themodernincarnationofcomputer sciencewasannounced bythegreatmathemati- cian Alan Turing in a remarkable 1936 paper. Turing developed in detail an abstract notion of what we would now call a programmable computer, a model for computation nowknownastheTuringmachine,inhishonor.TuringshowedthatthereisaUniversal TuringMachine that can beused tosimulate any other Turingmachine. Furthermore, heclaimedthattheUniversalTuringMachinecompletelycaptureswhatitmeanstoper- formataskbyalgorithmicmeans.Thatis,ifanalgorithmcanbeperformedonanypiece of hardware (say, a modern personal computer), then there is an equivalent algorithm for a Universal Turing Machine which performs exactly the same task as the algorithm running on the personal computer. This assertion, known as theChurch{Turing thesis inhonorofTuringandanotherpioneerofcomputerscience,AlonzoChurch,assertsthe equivalence between the physical concept of what class of algorithms can be performed onsomephysical device with the rigorous mathematical concept of a Universal Turing Machine.Thebroadacceptance ofthisthesislaidthefoundationforthedevelopmentof arich theory ofcomputer science. Not long after Turing’s paper, the ?rst computers constructed from electronic com- ponents were developed. John von Neumann developed a simple theoretical model for how to put together in a practical fashion all the components necessary for a computer tobefullyascapableasaUniversalTuringMachine. Hardwaredevelopment trulytook off,though,in1947,whenJohnBardeen, WalterBrattain, andWillShockleydeveloped thetransistor.Computerhardwarehasgrowninpoweratanamazingpaceeversince,so muchsothatthegrowthwascodi?edbyGordonMoorein1965inwhathascometobe known asMoore’slaw, which states that computer power will double for constant cost roughly once every two years. Amazingly enough, Moore’s law has approximately held true in the decades since the 1960s. Nevertheless, most observers expect that this dream run will end some time during the ?rst two decades of the twenty-?rst century. Conventional approaches to the fabrication of computer technology are beginning to run up against fundamental dif?culties of size. Quantum effects are beginning to interfere in the functioning of electronic devices as they aremade smaller and smaller. One possible solution to the problem posed by the eventual failure of Moore’s law is to move to a different computing paradigm. One such paradigm is provided by the theoryofquantumcomputation,whichisbasedontheideaofusingquantummechanics toperformcomputations, insteadofclassicalphysics.Itturnsoutthatwhileanordinary computer can be used to simulate a quantum computer, it appears to be impossible toGlobalperspectives 5 performthesimulationinanef?cientfashion.Thusquantumcomputersofferanessential speedadvantageoverclassicalcomputers.Thisspeedadvantageissosigni?cantthatmany researchersbelievethatnoconceivableamountofprogressinclassicalcomputationwould beabletoovercomethegapbetweenthepowerofaclassicalcomputerandthepowerof a quantum computer. Whatdowemeanby‘ef?cient’versus‘inef?cient’simulationsofaquantumcomputer? Many of the key notions needed to answer this question were actually invented before the notion of a quantum computer had even arisen. In particular, the idea of ef?cient andinef?cientalgorithmswasmademathematicallyprecisebythe?eldofcomputational complexity.Roughlyspeaking,anef?cientalgorithmisonewhichrunsintimepolynomial in the size of the problem solved. In contrast, an inef?cient algorithm requires super- polynomial (typically exponential) time. What was noticed in the late 1960s and early 1970s was that it seemed as though the Turing machine model of computation was at least as powerful as any other model of computation, in the sense that a problem which couldbesolvedef?ciently insomemodelofcomputation couldalsobesolvedef?ciently intheTuringmachinemodel,byusingtheTuringmachinetosimulatetheothermodel ofcomputation.Thisobservationwascodi?edintoastrengthenedversionoftheChurch{ Turingthesis: Anyalgorithmic processcanbesimulated ef?ciently usingaTuring machine. The key strengthening in the strong Church{Turing thesis is the word ef?ciently.If the strong Church{Turing thesis is correct, then it implies that no matter what type of machine we use to perform our algorithms, that machine can be simulated ef?ciently using a standard Turing machine. This is an important strengthening, as it implies that for the purposes of analyzing whether a given computational task can be accomplished ef?ciently, we may restrict ourselves to the analysis of the Turing machine model of computation. One class of challenges to the strong Church{Turing thesis comes from the ?eld of analogcomputation.IntheyearssinceTuring,manydifferentteamsofresearchershave noticed that certain types ofanalog computers can ef?ciently solveproblemsbelievedto have no ef?cient solution on a Turing machine. At ?rst glance these analog computers appear toviolatethestrongformoftheChurch{Turingthesis.Unfortunately foranalog computation, itturns outthat whenrealisticassumptions about thepresence ofnoisein analog computers are made, their power disappears in all known instances; they cannot ef?ciently solve problems which are not ef?ciently solvable on a Turing machine. This lesson { that the effects of realistic noise must be taken into account in evaluating the ef?ciency of a computational model { was one of the great early challenges of quantum computationandquantum information,achallengesuccessfullymetbythedevelopment ofatheoryofquantumerror-correctingcodesandfault-tolerantquantumcomputation. Thus,unlikeanalogcomputation,quantum computationcaninprincipletoleratea?nite amount ofnoise and stillretain its computational advantages. The?rstmajorchallengetothestrongChurch{Turingthesisaroseinthemid1970s, whenRobertSolovayandVolkerStrassenshowedthatitispossibletotestwhetheranin- tegerisprimeorcompositeusingarandomizedalgorithm.Thatis,theSolovay{Strassen test for primality used randomness as anessential part of the algorithm. The algorithm didnotdeterminewhetheragivenintegerwasprimeorcompositewithcertainty.Instead, thealgorithmcoulddeterminethatanumberwasprobablyprimeorelsecompositewith6 Introductionandoverview certainty. By repeating the Solovay{Strassentestafewtimesitispossibletodetermine with near certainty whether a number is prime or composite. Of especial interest at the time the Solovay{Strassen test was proposed was that no ef?cient deterministic test for primality was known. Thus, it seemed as though computers with access to a random number generator would beableto ef?ciently performcomputational tasks with no ef?- cient solution on a conventional deterministic Turing machine. This discovery inspired a search for other randomized algorithms which has paid off handsomely, with the ?eld blossomingintoathrivingareaofresearch. RandomizedalgorithmsposeachallengetothestrongChurch{Turingthesis,suggest- ing that there are ef?ciently soluble problems which, nevertheless, cannot be ef?ciently solved on a deterministic Turing machine. This challenge appears to be easily resolved bya simplemodi?cation ofthe strong Church{Turing thesis: Anyalgorithmic processcanbesimulated ef?ciently usinga probabilistic Turingmachine. This ad hoc modi?cation of the strong Church{Turing thesis should leave you feeling ratherqueasy.Mightitnotturnoutatsomelaterdatethatyetanothermodelofcomputa- tionallowsonetoef?cientlysolveproblemsthatarenotef?cientlysolublewithinTuring’s modelofcomputation?Isthereanywaywecan?ndasinglemodelofcomputationwhich isguaranteed to beabletoef?ciently simulateany other modelofcomputation? Motivatedbythisquestion,in1985DavidDeutschaskedwhetherthelawsofphysics couldbeusetoderive anevenstrongerversionoftheChurch{Turingthesis.Insteadof adoptingadhoc hypotheses, Deutsch looked tophysical theory to provide a foundation fortheChurch{Turingthesisthatwouldbeassecureasthestatusofthatphysicaltheory. Inparticular,Deutschattempted tode?neacomputational devicethatwouldbecapable of ef?ciently simulating an arbitrary physical system. Because the laws of physics are ultimatelyquantummechanical,Deutschwasnaturallyledtoconsidercomputingdevices based upon the principles of quantum mechanics. These devices, quantum analogues of the machines de?ned forty-nine years earlier by Turing, led ultimately to the modern conception ofa quantum computer usedinthisbook. At the time of writing it is not clear whether Deutsch’s notion of a Universal Quan- tum Computer is suf?cient to ef?ciently simulate an arbitrary physical system. Proving or refuting this conjecture is one of the great open problems of the ?eld of quantum computation and quantum information. It is possible, for example, that some effect of quantum ?eld theory or an even more esoteric effect based in string theory, quantum gravity or some other physical theory may take us beyond Deutsch’s Universal Quan- tumComputer,givingusastillmorepowerfulmodelforcomputation. Atthisstage,we simplydon’t know. WhatDeutsch’smodelofaquantumcomputerdidenablewasachallengetothestrong form of the Church{Turing thesis. Deutsch asked whether it is possible for a quantum computertoef?cientlysolvecomputationalproblemswhichhavenoef?cientsolutionon aclassicalcomputer,evenaprobabilisticTuringmachine.Hethenconstructed asimple example suggesting that, indeed, quantum computers mighthave computational powers exceeding those ofclassical computers. This remarkable ?rst step taken by Deutsch was improved in the subsequent decade by many people, culminating in Peter Shor’s 1994 demonstration that two enormously importantproblems{theproblemof?ndingtheprimefactorsofaninteger,andtheso-Globalperspectives 7 called‘discretelogarithm’problem{couldbesolvedef?cientlyonaquantumcomputer. This attracted widespread interest because these two problems were and still are widely believedtohavenoef?cientsolutiononaclassicalcomputer.Shor’sresultsareapower- ful indication that quantum computers are more powerful than Turing machines, even probabilistic Turing machines. Further evidence for the power of quantum computers camein1995whenLovGrovershowedthatanotherimportantproblem{theproblemof conducting asearchthroughsomeunstructured searchspace{couldalsobespedupon a quantum computer. WhileGrover’s algorithm did not provide as spectacular a speed- upasShor’salgorithms,thewidespreadapplicabilityofsearch-basedmethodologies has excited considerable interest inGrover’salgorithm. At about the same time as Shor’s and Grover’s algorithms were discovered, many people were developing anideaRichardFeynman hadsuggestedin1982.Feynman had pointedoutthatthereseemedtobeessentialdif?cultiesinsimulatingquantum mechan- ical systems on classical computers, and suggested that building computers based on the principles of quantum mechanics would allow us to avoid those dif?culties. In the 1990sseveralteamsofresearchers beganeshing thisideaout,showingthat itisindeed possible to use quantum computers to ef?ciently simulate systems that have no known ef?cientsimulationonaclassicalcomputer.Itislikelythatoneofthemajorapplications ofquantumcomputersinthefuturewillbeperformingsimulationsofquantummechan- ical systems too dif?cult to simulate on a classical computer, a problem with profound scienti?c andtechnological implications. Whatother problemscan quantum computers solvemorequicklythan classicalcom- puters? The short answer is that we don’t know. Coming up with good quantum algo- rithmsseemstobehard.Apessimistmightthinkthat’sbecausethere’snothingquantum computers aregoodforotherthan theapplicationsalreadydiscovered!Wetakeadiffer- ent view. Algorithm design for quantum computers is hard because designers face two dif?cult problems not faced in the construction of algorithms for classical computers. First,our human intuitionisrootedintheclassicalworld.Ifweusethat intuitionasan aid to the construction of algorithms, then the algorithmic ideas we come up with will beclassicalideas.Todesigngoodquantumalgorithmsonemust‘turnoff’one’sclassical intuition for at least part of the design process, using truly quantum effects to achieve thedesiredalgorithmicend.Second,tobetrulyinterestingitisnotenoughtodesignan algorithm that is merely quantum mechanical. The algorithm must be better than any existing classical algorithm! Thus, it is possible that one may ?nd an algorithm which makes use of truly quantum aspects of quantum mechanics, that is nevertheless not of widespread interest because classical algorithms with comparable performance charac- teristics exist. The combination of these two problems makes the construction of new quantum algorithmsachallenging problemforthefuture. Evenmorebroadly,wecanaskifthereareanygeneralizationswecanmakeaboutthe powerofquantum computersversusclassicalcomputers.Whatisitthatmakesquantum computers more powerful than classical computers { assuming that this is indeed the case? Whatclassofproblemscanbesolvedef?ciently onaquantum computer, andhow doesthatclasscomparetotheclassofproblemsthatcanbesolvedef?cientlyonaclassical computer? One of the most exciting things about quantum computation and quantum information is how little is known about the answers to these questions! It is a great challenge for the future to understand these questions better. Having come up to the frontier of quantum computation, let’s switch to the history8 Introductionandoverview of another strand of thought contributing to quantum computation and quantum infor- mation: information theory. At the same time computer science was exploding in the 1940s, another revolution was taking place in our understanding of communication.In 1948 Claude Shannon published a remarkable pair of papers laying the foundations for the modern theory ofinformation and communication. Perhaps the key steptaken byShannon wastomathematically de?netheconceptof information.Inmanymathematicalsciencesthereisconsiderableexibilityinthechoice of fundamental de?nitions. Try thinking naively for a few minutes about the following question:howwouldyougoaboutmathematically de?ningthenotionofaninformation source? Severaldifferent answers to this problem have found widespread use; however, the de?nition Shannon came up with seems to be far and away the most fruitful in terms of increased understanding, leading to a plethora of deep results and a theory with a rich structure which seems to accurately reect many (though not all) real-world communications problems. Shannon was interested in two key questions related to the communication of in- formation over a communications channel. First, what resources are required to send information over a communications channel? For example, telephone companies need to know how much information they can reliablytransmit over a given telephone cable. Second, can information be transmitted in such a way that it is protected against noise inthe communications channel? Shannon answered these two questions by proving the two fundamental theorems of information theory. The ?rst, Shannon’s noiseless channel coding theorem, quanti?es the physical resources required to store the output from an information source. Shan- non’s second fundamental theorem, the noisy channel coding theorem, quanti?es how much information it is possible to reliably transmit through a noisy communications channel. Toachievereliabletransmissioninthepresenceofnoise,Shannonshowedthat error-correcting codes could be used to protect the information being sent. Shannon’s noisy channel coding theorem gives an upper limit on the protection afforded by error- correctingcodes.Unfortunately,Shannon’stheoremdoesnotexplicitlygiveapractically usefulsetoferror-correctingcodestoachievethatlimit.FromthetimeofShannon’spa- persuntiltoday,researchershaveconstructedmoreandbetterclassesoferror-correcting codesintheirattemptstocomeclosertothelimitsetbyShannon’stheorem.Asophisti- cated theory of error-correcting codes now exists offering the user aplethora of choices intheirquesttodesignagooderror-correctingcode.Suchcodesareusedinamultitude of places including, for example, compact disc players, computer modems, and satellite communications systems. Quantum information theory has followed with similar developments. In 1995, Ben Schumacher provided an analogue to Shannon’s noiseless coding theorem, and in the process de?ned the ‘quantum bit’ or ‘qubit’ as a tangible physical resource. However, no analogue to Shannon’s noisy channel coding theorem is yet known for quantum in- formation. Nevertheless, in analogy to their classical counterparts, a theory of quantum error-correctionhas beendeveloped which, asalready mentioned, allowsquantum com- puters to compute effectively in the presence of noise, and also allows communication overnoisyquantum channels to take place reliably. Indeed, classical ideas of error-correction have proved to be enormously important in developing and understanding quantum error-correcting codes. In 1996, two groups workingindependently, RobertCalderbankandPeterShor,andAndrewSteane,discov-Globalperspectives 9 ered an important class of quantum codes now known as CSS codes after their initials. Thisworkhassincebeensubsumedbythestabilizercodes,independentlydiscoveredby Robert Calderbank, Eric Rains, Peter Shor and Neil Sloane, and by Daniel Gottesman. Bybuildinguponthebasicideasofclassicallinearcodingtheory,thesediscoveriesgreatly facilitatedarapidunderstandingofquantumerror-correctingcodesandtheirapplication to quantum computation and quantum information. Thetheoryofquantumerror-correctingcodeswasdevelopedtoprotectquantumstates against noise. What about transmitting ordinary classical information using a quantum channel? How ef?ciently can this bedone? A few surprises have been discovered inthis arena. In 1992 Charles Bennett and Stephen Wiesner explained how to transmit two classical bits of information, while only transmitting one quantum bit from sender to receiver, aresult dubbedsuperdense coding. Even more interesting are the results indistributed quantum computation.Imagine you have two computers networked, trying to solve a particular problem. How much communication isrequired to solvethe problem?Recently ithas beenshownthat quan- tum computers can requireexponentially less communication to solvecertain problems thanwouldberequiredifthenetworkedcomputers wereclassical!Unfortunately, asyet these problems are not especially important ina practical setting, and suffer from some undesirable technical restrictions. A major challenge for the future of quantum compu- tation and quantum information is to ?nd problems of real-world importance for which distributedquantumcomputationoffersasubstantialadvantageoverdistributedclassical computation. Let’sreturntoinformationtheoryproper.Thestudyofinformationtheorybeginswith the properties of a single communications channel. In applications we often do not deal withasinglecommunications channel, butrather withnetworks ofmany channels. The subjectofnetworkedinformationtheory deals withtheinformationcarryingproperties of such networks of communications channels, and has been developed into a rich and intricate subject. By contrast, the study of networked quantum information theory is very much in its infancy.Evenforverybasicquestionsweknowlittleabouttheinformationcarryingabil- ities of networks of quantum channels. Several rather striking preliminary results have beenfoundinthepastfewyears;however,nounifyingtheoryofnetworkedinformation theory exists for quantum channels. One example of networked quantum information theory should suf?ce to convince you of the value such a general theory would have. ImaginethatweareattemptingtosendquantuminformationfromAlicetoBobthrough a noisy quantum channel. If that channel has zero capacity for quantum information, thenitisimpossibletoreliablysendanyinformationfromAlicetoBob.Imagineinstead thatweconsidertwocopiesofthechannel,operatinginsynchrony.Intuitivelyitisclear (and canberigorouslyjusti?ed)thatsuchachannel alsohaszerocapacity tosendquan- tuminformation. However,ifweinsteadreverse the directionofoneofthechannels, as illustrated in Figure 1.1, it turns out that sometimes we can obtain a non-zero capacity for the transmissionof informationfrom Aliceto Bob! Counter-intuitive properties like this illustrate the strange nature of quantum information. Better understanding the in- formationcarryingpropertiesofnetworksofquantum channels isamajoropenproblem of quantum computation and quantum information. Let’sswitch?eldsonelasttime,movingtothe venerableoldartandscience ofcryp- tography. Broadly speaking, cryptography is the problem of doing communication or10 Introductionandoverview Figure1.1.Classically, ifwehavetwoverynoisychannelsofzerocapacityrunningsidebyside,thenthecombined channelhaszerocapacitytosendinformation.Notsurprisingly, ifwereversethedirectionofoneofthechannels, westill havezerocapacitytosendinformation.Quantummechanically,reversingoneofthezerocapacitychannels canactuallyallow ustosendinformation! computation involving two or more parties who may not trust one another.Thebest knowncryptographicproblemisthetransmissionofsecretmessages.Supposetwoparties wishtocommunicateinsecret.Forexample,youmaywishtogiveyourcreditcardnum- ber to a merchant in exchange for goods, hopefully without any malevolent third party intercepting your credit card number. The way this is done is to use a cryptographic protocol.We’lldescribeindetailhowcryptographicprotocolsworklaterinthebook,but fornowitwillsuf?cetomakeafewsimpledistinctions.Themostimportantdistinction isbetweenprivate keycryptosystems andpublickeycryptosystems. Thewayaprivatekeycryptosystemworksisthat twoparties,‘Alice’and‘Bob’,wish tocommunicate bysharingaprivatekey,whichonlytheyknow.Theexactformofthe key doesn’t matter at this point { think ofa string of zeroes and ones. Thepoint is that this key is used by Alice to encrypt the information she wishes to send to Bob. After Alice encrypts she sends the encrypted information to Bob, who must now recover the originalinformation.ExactlyhowAliceencrypts themessagedependsupontheprivate key, sothat to recover theoriginalmessageBob needs to know theprivate key,inorder to undo the transformation Aliceapplied. Unfortunately,privatekeycryptosystemshavesomesevereproblemsinmanycontexts. Themostbasicproblemishowtodistributethekeys?Inmanyways,thekeydistribution problem is just as dif?cult as the original problem of communicating in private { a malevolent third party may be eavesdropping on the key distribution, and then use the intercepted keytodecrypt someof the message transmission. Oneoftheearliestdiscoveriesinquantumcomputationandquantuminformationwas thatquantum mechanics canbeusedtodokeydistributioninsuchawaythatAliceand Bob’ssecurity can not becompromised. Thisprocedure is knownasquantumcryptog- raphyorquantumkeydistribution.Thebasicideaistoexploitthequantummechanical principlethatobservationingeneraldisturbsthesystembeingobserved.Thus,ifthereis aneavesdropperlisteninginasAliceandBobattempttotransmittheirkey,thepresence oftheeavesdropper willbevisibleasadisturbanceofthecommunications channel Alice and Bob are using to establish the key. Alice and Bob can then throw out the key bits established while the eavesdropper was listening in, and start over. The ?rst quantum cryptographic ideas were proposed by Stephen Wiesner in the late 1960s, but unfortu-Globalperspectives 11 nately were not accepted for publication! In 1984 Charles Bennett and Gilles Brassard, building on Wiesner’s earlier work, proposed a protocol using quantum mechanics to distribute keys between Alice and Bob, without any possibility of a compromise. Since then numerous quantum cryptographicprotocolshave beenproposed, andexperimental prototypesdeveloped.Atthetimeofthiswriting,theexperimentalprototypesarenearing thestagewherethey maybeuseful inlimited-scalereal-worldapplications. The second major type of cryptosystem is the public key cryptosystem. Public key cryptosystems don’trelyonAliceandBob sharingasecret keyinadvance. Instead, Bob simply publishes a ‘public key’, which is made available to the general public. Alice can make use of this public key to encrypt a message which she sends to Bob. What is interesting is that a third party cannot use Bob’s public key to decrypt the message! Strictly speaking, we shouldn’t say cannot. Rather, the encryption transformation is chosen in a very clever and non-trivial way so that it isextremely dif?cult (though not impossible)toinvert,givenonlyknowledgeofthepublickey.Tomakeinversioneasy,Bob has asecretkeymatchedtohispublickey,whichtogetherenablehimtoeasily perform thedecryption.ThissecretkeyisnotknowntoanybodyotherthanBob,whocantherefore becon?dentthatonlyhecanreadthecontentsofAlice’stransmission,totheextentthat it is unlikely that anybody else has the computational power to invert the encryption, given only the public key. Public key cryptosystems solve the key distribution problem bymakingitunnecessaryforAliceandBobtoshareaprivatekeybeforecommunicating. Rather remarkably,publickey cryptography didnotachieve widespread useuntil the mid-1970s,whenitwasproposedindependentlybyWhit?eldDif?eandMartinHellman, and by Ralph Merkle, revolutionizing the ?eld of cryptography. A little later, Ronald Rivest, Adi Shamir, and Leonard Adleman developed the RSA cryptosystem,which at the time of writing is the most widely deployed public key cryptosystem, believed to offera?nebalanceofsecurityandpracticalusability.In1997itwasdisclosedthatthese ideas { public key cryptography, the Dif?e{Hellman and RSA cryptosystems { were actually invented inthe late 1960sandearly1970sbyresearchers workingat the British intelligence agency GCHQ. The key to the security of public key cryptosystems is that it should be dif?cult to invert the encryption stage if only the public key is available. For example, it turns out that inverting the encryption stage of RSA is a problem closely related to factoring. MuchofthepresumedsecurityofRSAcomesfromthebeliefthatfactoringisaproblem hard to solve on a classical computer. However, Shor’s fast algorithm for factoring on a quantum computer could be used to break RSA! Similarly,there are other public key cryptosystems whichcan bebrokenifafast algorithmforsolvingthe discrete logarithm problem { like Shor’s quantum algorithm for discrete logarithm { were known. This practical application of quantum computers to the breaking of cryptographic codes has excited much ofthe interest inquantum computation and quantum information. We have been looking at the historical antecedents for quantum computation and quantum information. Of course, as the ?eld has grown and matured, it has sprouted itsownsub?eldsofresearch,whoseantecedents liemainlywithinquantumcomputation and quantum information. Perhaps the most striking of these is the study ofquantum entanglement.Entangle- ment is a uniquely quantum mechanical resource that plays a key role in many of the most interesting applications of quantum computation and quantum information; en- tanglement is iron to the classical world’s bronze age. In recent years there has been a12 Introductionandoverview tremendousefforttryingtobetterunderstandthepropertiesofentanglementconsidered as a fundamental resource of Nature, of comparable importance to energy, information, entropy,oranyotherfundamental resource.Althoughthereisasyetnocompletetheory ofentanglement,someprogresshasbeenmadeinunderstanding thisstrangepropertyof quantummechanics.Itishopedbymanyresearchersthatfurtherstudyoftheproperties ofentanglement willyieldinsightsthatfacilitatethedevelopmentofnewapplications in quantum computation and quantum information. 1.1.2 Futuredirections We’ve looked at some at the history and present status of quantum computation and quantum information. What of the future? What can quantum computation and quan- tum information offer to science, to technology, and to humanity? What bene?ts does quantumcomputationandquantuminformationconferuponitsparent?eldsofcomputer science, information theory, and physics? What are the key open problems of quantum computation and quantum information? We will make a few very brief remarks about these overarching questions before movingontomore detailed investigations. Quantum computation and quantum information has taught us to think physically about computation, and we have discovered that this approach yields many new and excitingcapabilitiesforinformationprocessingandcommunication.Computerscientists and information theorists have been gifted with a new and rich paradigm for explo- ration.Indeed,inthebroadesttermswehavelearnedthatanyphysicaltheory,notjust quantum mechanics, may be used as the basis for a theory of information processing and communication. The fruits of these explorations may one day result in information processing devices with capabilities far beyond today’s computing and communications systems, withconcomitant bene?ts and drawbacks for society as awhole. Quantum computation and quantum information certainly offer challenges aplenty to physicists, but it is perhaps a little subtle what quantum computation and quantum informationofferstophysicsinthelongterm.Webelievethatjustaswehavelearnedto think physically about computation, we can also learn to think computationally about physics. Whereas physics has traditionally been a discipline focused on understanding ‘elementary’ objects and simple systems, many interesting aspects of Nature arise only whenthings becomelarger andmorecomplicated. Chemistry andengineering deal with such complexity to some extent, but most often in a rather ad hoc fashion. One of the messages of quantum computation and information is that new tools are available for traversing the gulf between the small and the relatively complex: computation and algorithms provide systematic means for constructing and understanding such systems. Applying ideas from these ?elds is already beginning to yield new insights into physics. It is our hope that this perspective will blossom in years to come into a fruitful way of understanding all aspects ofphysics. We’ve briey examined some of the key motivations and ideas underlying quantum computation and quantum information. Over the remaining sections of this chapter we giveamoretechnicalbutstillaccessibleintroductiontothesemotivationsandideas,with thehopeof givingyouabird’s-eyeview ofthe ?eldasit ispresently poised.Quantumbits 13 1.2 Quantumbits The bit is the fundamental concept of classical computation and classical information. Quantum computation and quantum information are built upon an analogous concept, thequantumbit,orqubitforshort.Inthissectionweintroducetheproperties ofsingle andmultiplequbits,comparingandcontrastingtheirpropertiestothoseofclassicalbits. Whatisaqubit? We’regoingtodescribequbitsasmathematical objects withcertain speci?c properties. ‘But hang on’, you say, ‘I thought qubits were physical objects.’ It’s truethat qubits,likebits,arerealizedasactual physicalsystems,andinSection1.5and Chapter 7 we describe in detail how this connection between the abstract mathematical point of view and real systems is made. However, for the most part we treat qubits as abstractmathematical objects.Thebeautyoftreatingqubitsasabstractentities isthatit givesusthefreedomtoconstructageneraltheoryofquantumcomputationandquantum information which does not depend upon a speci?c system for its realization. What then is a qubit? Just as a classical bit has a state{either0or1{aqubitalso hasastate.Twopossiblestatesforaqubitarethestatesj0iandj1i,whichasyoumight guess correspond to the states 0 and 1 for a classical bit. Notation like‘ji’ is called the Dirac notation, and we’ll be seeing it often, as it’s the standard notation for states in quantum mechanics. The difference between bits and qubits is that a qubit can be in a stateotherthanj0iorj1i.Itisalsopossibletoformlinearcombinations ofstates,often calledsuperpositions: j?i= ?j0i+?j1i: (1.1) The numbers ? and ? are complex numbers, although for many purposes not much is lostbythinkingofthemasrealnumbers.Putanotherway,thestateofaqubitisavector in a two-dimensional complex vector space. The special statesj0i andj1i are known as computational basisstates, and forman orthonormal basisfor thisvector space. We can examine a bit to determine whether it is in the state 0 or 1. For example, computers do this all the time when they retrieve the contents of their memory. Rather remarkably, we cannot examine a qubit to determine its quantum state, that is, the values of ? and ?. Instead, quantum mechanics tells us that we can only acquire much more restricted information about the quantum state. When we measure a qubit we get 2 2 eithertheresult0,withprobabilityj?j ,ortheresult1,withprobabilityj?j .Naturally, 2 2 j?j +j?j =1,sincetheprobabilitiesmustsumtoone.Geometrically,wecaninterpret this as the condition that the qubit’s state be normalized to length 1. Thus, ingeneral a qubit’s state isa unit vector in atwo-dimensional complex vector space. This dichotomy between the unobservable state of a qubit and the observations we can make lies at the heart of quantum computation and quantum information. In most of our abstract models of the world, there is a direct correspondence between elements of the abstraction and the real world, just as an architect’s plans for a building are in correspondencewiththe?nalbuilding.Thelackofthisdirectcorrespondenceinquantum mechanics makes it dif?cult to intuit the behavior of quantum systems; however, there is an indirect correspondence, for qubit states can be manipulated and transformed in ways which lead to measurement outcomes which depend distinctly on the different properties of the state. Thus, these quantum states have real, experimentally veri?able consequences,whichweshallseeareessentialtothepowerofquantumcomputationand quantum information. 14 Introductionandoverview Theabilityofaqubittobeinasuperpositionstaterunscountertoour‘commonsense’ understanding ofthephysicalworldaroundus.Aclassicalbitislikeacoin:eitherheads ortailsup. For imperfect coins,there maybeintermediate states likehaving itbalanced onanedge,butthosecanbedisregardedintheidealcase.Bycontrast,aqubitcanexist in a continuum of states between j0i and j1i { until it is observed. Let us emphasize again that when a qubit is measured, it only ever gives ‘0’ or ‘1’ as the measurement result{probabilistically.For example, aqubitcanbeinthe state 1 1 p j0i+p j1i; (1.2) 2 2 p 2 which, when measured, gives the result 0 ?fty percent (j1= 2j)ofthetime,andthe result 1 ?fty percent of the time. We will return often to this state, which is sometimes denotedj+i. Despite this strangeness, qubits are decidedly real, their existence and behavior ex- tensively validated by experiments (discussed in Section 1.5 and Chapter 7), and many different physicalsystemscan beusedto realizequbits.Togetaconcrete feel forhowa qubitcanberealizeditmaybehelpfultolistsomeofthewaysthisrealizationmayoccur: as the two different polarizations of a photon; as the alignment of a nuclear spin in a uniformmagnetic?eld;astwostatesofanelectronorbitingasingleatomsuchasshown in Figure 1.2. In the atom model, the electron can exist in either the so-called ‘ground’ or‘excited’states,whichwe’llcallj0iandj1i,respectively.Byshininglightontheatom, with appropriate energy and for an appropriate length of time, it is possible to move theelectronfromthej0istatetothej1istateandviceversa.Butmoreinterestingly,by reducing the time we shine the light, an electron initially in the statej0i can be moved ‘halfway’ betweenj0iandj1i, into thej+istate. Figure1.2. Qubitrepresentedbytwoelectroniclevelsinanatom. Naturally, agreatdeal ofattention has beengivento the‘meaning’ or‘interpretation’ thatmightbeattachedtosuperpositionstates,andoftheinherentlyprobabilisticnatureof observationsonquantumsystems.However,byandlarge,weshallnotconcernourselves with such discussions in this book. Instead, our intent will be to develop mathematical and conceptual pictures which are predictive. Onepictureuseful inthinkingaboutqubitsisthefollowinggeometricrepresentation. Quantumbits 15 2 2 Becausej?j +j?j =1,we may rewrite Equation (1.1)as ? i i’ j?i= e cos j0i+e sin j1i ; (1.3) 2 2 where ;’ and arerealnumbers.InChapter2wewillseethatwecanignorethefactor i of e out the front, because it has no observable effects, and for that reason we can effectively write i’ j?i=cos j0i+e sin j1i: (1.4) 2 2 The numbers and ’de?ne a point on the unit three-dimensional sphere, as shown in Figure 1.3. This sphere is often called the Bloch sphere; it provides a useful means of visualizing the state of a single qubit, and often serves as an excellent testbed for ideas aboutquantumcomputationandquantuminformation.Manyoftheoperationsonsingle qubitswhichwedescribelaterinthischapterareneatlydescribedwithintheBlochsphere picture. However, itmust bekept inmind that this intuitionis limitedbecause there is no simplegeneralization oftheBlochsphereknownformultiplequbits. |0? z j i y x ’ |1? Figure 1.3. Blochsphererepresentationof a qubit. How much information is represented by a qubit? Paradoxically, there are an in?nite number of points on the unit sphere, so that in principle one could store an entire text of Shakespeare in the in?nite binary expansion of . However, this conclusion turns out to be misleading, because of the behavior of a qubit when observed. Recall that measurement ofaqubitwillgiveonlyeither0or1.Furthermore, measurementchanges thestateofaqubit,collapsingitfromitssuperpositionofj0iandj1itothespeci?cstate consistent with the measurement result. For example, if measurement of j+i gives 0, then the post-measurement stateofthequbitwillbej0i.Whydoes this typeofcollapse occur? Nobody knows. As discussed in Chapter 2, this behavior is simply one of the fundamentalpostulatesofquantummechanics.Whatisrelevantforourpurposesisthat fromasinglemeasurementoneobtainsonlyasinglebitofinformationaboutthestateof the qubit, thus resolving the apparent paradox. It turns out that only if in?nitely many16 Introductionandoverview identically prepared qubits were measured would one be able to determine ? and ? for aqubit inthe state giveninEquation (1.1). But an even more interesting question to ask might be: how much information is represented by a qubit if we do not measure it? This is a trick question, because how canonequantify informationifitcannot bemeasured? Nevertheless, thereissomething conceptually important here, because when Nature evolves a closed quantum system of qubits, not performing any ‘measurements’, she apparently does keep track of all the continuousvariablesdescribingthestate,like ?and ?.Inasense,inthestateofaqubit, Natureconcealsagreatdealof‘hiddeninformation’.Andevenmoreinterestingly,wewill seeshortlythatthepotentialamountofthisextra‘information’growsexponentiallywith the number of qubits. Understanding this hidden quantum information is a question that we grapple with for much of this book, and which lies at the heart of what makes quantum mechanics a powerful tool for information processing. 1.2.1 Multiplequbits Hilbertspaceisabigplace. {CarltonCaves Suppose we have two qubits. If these were two classical bits, then there would be four possible states, 00, 01, 10, and 11. Correspondingly, a two qubit system has four com- putational basis states denoted j00i;j01i;j10i;j11i. A pair of qubits can also exist in superpositionsofthesefourstates,sothequantumstateoftwoqubitsinvolvesassociating a complex coef?cient { sometimes called an amplitude { with each computational basis state, such that the state vector describing the two qubits is j?i= ? j00i+? j01i+? j10i+? j11i: (1.5) 00 01 10 11 Similartothecaseforasinglequbit,themeasurementresultx(=00;01;10or11)occurs 2 withprobabilityj? j ,withthestateofthequbitsafterthemeasurementbeingjxi.The x condition that probabilities sum to one is therefore expressed by the normalization P 2 2 conditionthat j? j =1,wherethenotation‘f0;1g ’means ‘thesetofstrings 2 x x2f0;1g oflengthtwowitheachletterbeingeitherzeroorone’.Foratwoqubitsystem,wecould measure justasubset of the qubits,say the ?rst qubit,and youcan probablyguess how 2 2 thisworks:measuringthe?rstqubitalonegives0withprobabilityj? j +j? j,leaving 00 01 the post-measurement state ? j00i+? j01i 00 01 0 j?i= p : (1.6) 2 2 j? j +j? j 00 01 p 2 2 Note how the post-measurement state is re-normalized by the factor j? j +j? j 00 01 so that it still satis?es the normalization condition, just as we expect for a legitimate quantum state. An important two qubitstate is theBellstateorEPRpair, j00i+j11i p : (1.7) 2 Thisinnocuous-lookingstateisresponsibleformanysurprisesinquantum computation Quantumcomputation 17 and quantum information. It is the key ingredient in quantum teleportation and super- dense coding, which we’ll come to in Section 1.3.7 and Section 2.3, respectively, and theprototypeformanyotherinterestingquantum states.TheBellstatehastheproperty that upon measuring the ?rst qubit, one obtains two possibleresults: 0 withprobability 0 1=2,leavingthepost-measurement statej’i=j00i,and1withprobability1=2,leaving 0 j’i=j11i.Asaresult,ameasurement ofthesecond qubitalwaysgivesthesameresult asthemeasurementofthe?rstqubit.Thatis,themeasurementoutcomesarecorrelated. Indeed, it turns out that other types of measurements can be performed on the Bell state, by ?rst applying some operations to the ?rst or second qubit, and that interesting correlationsstillexistbetweentheresultofameasurementonthe?rstandsecondqubit. These correlations have been the subject of intense interest ever since a famous paper by Einstein, Podolsky and Rosen, in which they ?rst pointed out the strange properties of states likethe Bell state. EPR’sinsights weretaken upand greatly improvedby John Bell, who proved an amazing result: the measurement correlations in the Bell state are strongerthancouldeverexistbetweenclassicalsystems.Theseresults,describedinde- tail inSection 2.6,werethe ?rstintimationthat quantum mechanics allowsinformation processing beyondwhatispossibleintheclassical world. Moregenerally,wemayconsiderasystemof nqubits.Thecomputationalbasisstates of this system are of the form jx x :::x i, and so a quantum state of such a system 1 2 n n is speci?ed by 2 amplitudes. For n = 500 this number is larger than the estimated number ofatoms inthe Universe!Tryingtostoreallthese complex numbers wouldnot be possible on any conceivable classical computer. Hilbert space is indeed a big place. In principle, however, Nature manipulates such enormous quantities of data, even for 500 systemscontainingonlyafewhundredatoms.ItisasifNaturewerekeeping2 hidden piecesofscratchpaperontheside,onwhichsheperformshercalculationsasthesystem evolves.Thisenormouspotentialcomputationalpowerissomethingwewouldverymuch liketo take advantage of. But how can we think of quantum mechanics as computation? 1.3 Quantumcomputation Changes occurring to a quantum state can be described using the language ofquantum computation.Analogoustothewayaclassicalcomputerisbuiltfromanelectricalcircuit containing wires and logic gates, a quantum computer is built from a quantum circuit containing wires and elementary quantum gates to carry around and manipulate the quantuminformation.Inthissectionwedescribesomesimplequantumgates,andpresent several examplecircuitsillustratingtheir application, including acircuitwhichteleports qubits! 1.3.1 Singlequbitgates Classical computer circuits consist ofwires andlogicgates.Thewiresareusedto carry informationaroundthecircuit,whilethelogicgatesperformmanipulationsoftheinfor- mation,convertingitfromoneformtoanother.Consider,forexample,classicalsinglebit logic gates. The only non-trivial member of this class is the gate, whose operation is de?ned by itstruth table,inwhich0!1and1! 0, that is, the 0 and 1 states are interchanged. Can an analogous quantum gate for qubits be de?ned? Imagine that we had some process which took the state j0i to the state j1i, and vice versa. Such a process
18 Introductionandoverview wouldobviouslybeagoodcandidateforaquantumanaloguetothe gate.However, specifyingtheactionofthegateonthestatesj0iandj1idoesnottelluswhathappensto superpositions of the statesj0i andj1i, without further knowledge about the properties ofquantum gates. In fact, the quantum gate actslinearly, that is, ittakes the state ?j0i+?j1i (1.8) tothecorresponding stateinwhichtheroleofj0iandj1ihave beeninterchanged, ?j1i+?j0i: (1.9) Why the quantum gate acts linearly and not in some nonlinear fashion is a very interesting question, and the answer is not at all obvious. It turns out that this linear behaviorisageneralpropertyofquantummechanics,andverywellmotivatedempirically; moreover,nonlinear behaviorcan lead to apparent paradoxes suchas timetravel, faster- than-light communication, and violations of the second laws of thermodynamics. We’ll explorethispointinmoredepthinlaterchapters,butfornowwe’lljusttakeitasgiven. There is a convenient way of representing the quantum gate in matrix form, which follows directly from the linearity of quantum gates. Suppose we de?ne a matrix X to represent the quantum gate asfollows: ? ? 01 X · : (1.10) 10 (The notation X for the quantum is used for historical reasons.) If the quantum state ?j0i+?j1iiswritten ina vector notation as ? ? ? ; (1.11) ? with the top entry corresponding to the amplitude for j0i and the bottom entry the amplitude forj1i, then the corresponding output from the quantum gate is ? ? ? ? ? ? X = : (1.12) ? ? Notice that the action of the gate is to take the statej0i and replace it by the state correspondingtothe?rstcolumnofthematrix X.Similarly,thestatej1iisreplacedby the state corresponding to the second column of the matrix X. Soquantumgatesonasinglequbitcanbedescribedbytwobytwomatrices.Arethere any constraints on what matrices may be used as quantum gates? It turns out that there 2 2 are.Recall that thenormalizationconditionrequiresj?j +j?j =1 for a quantum state 0 0 0 ?j0i+ ?j1i. This must also be true of the quantum statej?i = ?j0i+ ?j1i after the gatehasacted. Itturnsoutthattheappropriateconditiononthematrixrepresenting the y gate is that the matrix U describing the single qubit gate beunitary,thatisU U = I, y where U is the adjoint of U (obtained by transposing and then complex conjugating U),and I is thetwo bytwo identity matrix.For example, for the gateitiseasy to y verify that X X = I. Amazingly, this unitarity constraint is the only constraint on quantum gates. Any unitary matrix speci?es a valid quantum gate! The interesting implication is that in contrast to the classical case, where onlyone non-trivialsinglebitgate exists {the
Quantumcomputation 19 |0? z z z y y y x x x 01 + 2 |1? p Figure1.4. VisualizationoftheHadamardgateontheBlochsphere,actingontheinputstate(j0i+j1i)= 2. gate{therearemanynon-trivialsinglequbitgates.Twoimportantoneswhichweshall use later arethe Z gate: ? ? 10 Z · ; (1.13) 0 ?1 which leavesj0i unchanged, and ips the sign of j1i to give?j1i,andtheHadamard gate, ? ? 1 11 p H · : (1.14) 1 ?1 2 Thisgateissometimesdescribedasbeinglikea‘square-rootof ’gate,inthatitturns p a j0i into (j0i+j1i)= 2 (?rst column of H), ‘halfway’ between j0i and j1i,andturns p j1i into (j0i?j1i)= 2 (second column of H), which is also ‘halfway’ between j0i and 2 2 j1i.Note,however,thatH isnota gate,assimplealgebrashowsthat H = I,and thus applying Htwicetoastatedoesnothingtoit. TheHadamardgateisoneofthemostusefulquantumgates,anditisworthtryingto visualize its operation by considering the Bloch sphere picture. In this picture, it turns out that single qubit gates correspond to rotations and reections of the sphere. The – Hadamard operation isjustarotationofthesphereaboutthe y^ axisby90 ,followedby a reection through the x^-y^ plane, as illustrated in Figure 1.4. Some important single qubit gates areshown inFigure 1.5,and contrasted withthe classical case. xx
Figure1.5. Single bit (left)andqubit (right)logic gates. Therearein?nitelymanytwobytwounitarymatrices,andthusin?nitelymanysingle
20 Introductionandoverview qubit gates. However, it turns out that the properties of the complete set can beunder- stood from the properties of a much smaller set. For example, as explained in Box 1.1, an arbitrary singlequbitunitary gate can be decomposed as a product of rotations ? ? cos ?sin 2 2 ; (1.15) sin cos 2 2 and a gate which we’lllater understand as being a rotation aboutthe z^ axis, ? ? ?i?=2 e 0 ; (1.16) i?=2 0 e i? togetherwitha(global)phaseshift{aconstantmultiplieroftheform e .Thesegates can be broken down further { we don’t need to be able to do these gates for arbitrary ?;?and ,butcanbuildarbitrarilygoodapproximationstosuchgatesusingonlycertain special?xedvaluesof ?;?and .Inthiswayitispossibletobuildupanarbitrarysingle qubit gate using a ?nite set of quantum gates. More generally, an arbitrary quantum computationonanynumberofqubitscanbegeneratedbya?nitesetofgatesthatissaid to be universal for quantum computation. To obtain such a universal set we ?rst need to introduce somequantum gates involvingmultiple qubits. Box1.1:Decomposingsinglequbitoperations InSection 4.2starting on page 174we prove that an arbitrary2£2 unitary matrix may bedecomposed as ? ?? ? ? ? ?i?=2 ?i–=2 e 0 cos ?sin e 0 i? 2 2 U = e ; ; (1.17) i?=2 i–=2 0 e sin cos 0 e 2 2 where ?, ?, ,and– are real-valued. Notice that the second matrix is just an ordinaryrotation.Itturnsoutthatthe?rstandlastmatricescanalsobeunderstood as rotations in a different plane. This decomposition can be used to give an exact prescription for performing anarbitrary singlequbit quantum logicgate. 1.3.2 Multiplequbitgates Nowletusgeneralizefromonetomultiplequbits.Figure1.6shows?venotablemultiple bitclassicalgates,the , , (exclusive- ), and gates.Animportant theoretical result is that any function on bits can be computed from the composition of gatesalone,whichisthusknownasauniversalgate.Bycontrast,the aloneor even together with is notuniversal. Oneway ofseeing this is to note that applying an gatedoesnotchangethetotalparityofthebits.Asaresult,anycircuitinvolving only and gates will, if two inputs x and y have the same parity, give outputs withthesameparity,restrictingtheclassoffunctionswhichmaybecomputed,andthus precluding universality. Theprototypicalmulti-qubitquantumlogicgateisthecontrolled- or gate. Thisgatehastwoinputqubits,knownasthecontrolqubitandthetargetqubit,respec- tively. The circuit representation for the is shown in the top right of Figure 1.6; the top line represents the control qubit, while the bottom line represents the target
|
|