Luecke W. - Quantum Information Processing (2005)
Luecke W. - Quantum Information Processing (2005)
W. Lücke
SS 2005
E
Institute for Physics and Physical Technologies
Clausthal University Of Technology
Leibnizstraße 4
D-38678 Clausthal–Zellerfeld
3
Preface
Quantum information processing is one of the most fascinating and active fields
of contemporary physics. Its central topic is the coherent control of quantum states
in order to perform tasks — like quantum teleportation, absolutely secure data trans-
mission and efficient factorization of large integers — that do not seem possible by
means of classical systems alone. The vast possibilities of physical implementations
are currently being extensively studied and evaluated. Various proof-of-principle
experiments have already been performed. However, in the present note only some
possiblities can be indicated. Main emphasis will be on quantum optical methods,
indispensable for transmission of quantum information.
For more complete information on achivements and latest proposals concerning
quantum information processing the Los Alamos preprint server
http://xxx.lanl.gov/archive/quant-ph
is highly recommended.
Recommended Literature: (Alber et al., 2001; Bowmeester et al., 2000; Ekert et al., 2000;
Nielsen and Chuang, 2001; Preskill, 01; Shannon, 1949; Bertlmann and Zeilinger, 2002;
Audretsch, 2002; Bruß, 2003)
4
Contents
2 Quantum Algorithms 33
2.1 Quantum Data Base Search . . . . . . . . . . . . . . . . . . . . . . . 33
2.1.1 Grover’s Algorithm . . . . . . . . . . . . . . . . . . . . . . . . 33
2.1.2 Network for Grover’s Algorithm . . . . . . . . . . . . . . . . . 34
2.1.3 Details and Generalization . . . . . . . . . . . . . . . . . . . . 35
2.2 Factoring Large Integers . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.2.1 Basics . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 37
2.2.2 The Quantum Fourier Transform . . . . . . . . . . . . . . . . 40
2.2.3 Quantum Order Finding . . . . . . . . . . . . . . . . . . . . . 44
5
6 CONTENTS
A 165
A.1 Turing’s Halting Problem . . . . . . . . . . . . . . . . . . . . . . . . 165
A.2 Some Remarks on Quantum Teleportation . . . . . . . . . . . . . . . 166
A.3 Quantum Phase Estimation and Order Finding . . . . . . . . . . . . 167
A.4 Finite-Dimensional Quantum Kinematics . . . . . . . . . . . . . . . . 171
A.4.1 General Description . . . . . . . . . . . . . . . . . . . . . . . . 171
CONTENTS 7
Bibliography 183
Index 199
8 CONTENTS
Part I
9
Chapter 1
Every element of Fn1 ,n2 can be implemented by some assembly of gates listed in
Table 1.1:
Lemma 1.1.1 For arbitrary positive integer n1 , n2 all elements of Fn1 ,n2 can be
represented as compositions of tensor products of functions from Tabular 1.1.
Proof: See below.
DRAFT, October 17, 2007
1
An important consequence of this fact is the halting problem (see Appendix A.1).
2
For simple hardware implementations see (Pütz, 1971, pp. 244–252).
11
12 CHAPTER 1. BASICS OF QUANTUM COMPUTATION
ID F1,1 b 7→ b
FANOUT r F1,2 b 7→ (b, b)
H
Hb
NOT
F1,1 b 7→ 1−b
&
AND F2,1 (b1 , b2 ) 7→ b1 b2
≥1
OR F2,1 (b1 , b2 ) 7→ b1 + b2 − b1 b2
Thus every classical logic circuit corresponds to a graph consisting of symbols from
Tabular 1.1. For instance, the graph
.......
..........
&
.. .
..........
.......
u ≥1
&
u &
.......
& ..........
.. .
..........
.......
u ≥1
u &
corresponding to
def
◦ (AND ⊗ AND) ◦ (ID ⊗
XOR = OR FANOUT ⊗ ID)
◦ ID ⊗ (NOT ◦ AND) ⊗ ID ◦ (FANOUT ⊗ FANOUT)
and acting as
def NOT(b2 ) if b1 = 1
(b1 , b2 ) 7−→ b1 ⊕ b2 =
b2 if b1 = 0
= b1 + b2 − 2b1 b2
= b1 + b2 mod 2 .
1.1. CLASSICAL LOGIC CIRCUITS 13
s
CNOT F2,2 (b1 , b2 ) 7→ (b1 , b1 ⊕ b2 )
h
h
TCNOT F2,2 (b1 , b2 ) 7→ (b1 ⊕ b2 , b2 )
s
s
(0, b1 , b2 ) 7→ (0, b1 , b2 )
CSWAP3 F3,3
\
\ (1, b1 , b2 ) 7→ (1, b2 , b1 )
Of course, also for the gates listed in Table 1.2 there are equivalent networks, e.g.:5
≡ h s h (1.4)
\
\ s h s
and their compositions with NOT (applied last). Now, assume that the statement of
the lemma has already been proved for n1 = n and consider an arbitrary f ∈ Fn+1,1 .
Then both f0 and f1 , where
def
fs (b1 , . . . , bn ) = f (b1 , . . . , bn , s) ,
is universal in the sense that it can replace NOT, AND, and OR as elementary
gates:7
NOT = NAND ◦ FANOUT ,
AND = NOT ◦ NAND ,
OR = NAND ◦ (NOT ⊗ NOT) .
In the same sense
def
NOR = NOT ◦ OR
is universal:
NOT = NOR ◦ FANOUT ,
AND = NOR ◦ (NOT ⊗ NOT) ,
OR = NOT ◦ NOR .
Alternatively, in order to minimize dissipation of energy (Landauer, 1961; Landauer, 1998;
Plenio and Vitelli, 2001; Bub, 2001; Parker and Walker, 2003), one may execute all
calculations using only reversible networks8 (Toffoli, 1980a):
Since9
CCNOT3 (b1 , b2 , 1) = NAND(b1 , b2 ) ∀ b1 , b2 ∈ {0, 1}
and
CCNOT1 (b, 1, 0)
= FANOUT(b) ∀ b ∈ {0, 1} ,
CCNOT3 (b, 1, 0)
the CCNOT gate is universal for reversible classical computation in the following
sense:
For every mapping φ ∈ Fn1 ,n2 there is a reversible n-bit network com-
posed of only CCNOT gates,10 SWAP gates, and ID gates (wires) im-
plementing a mapping f ∈ Fn,n (n ≥ n1 , n2 ) fulfilling
f1 (b1 , . . . , bn1 , cn1 +1 , . . . , cn )
..
. = φ(b1 , . . . , bn1 ) ∀ b1 , . . . , bn1 ∈ {0, 1}
fn2 (b1 , . . . , bn1 , cn1 +1 , . . . , cn )
Theorem1.1.2 (Toffoli) For all n1 , n2 ∈ IN and for every φ ∈ Fn1 ,n2 there is
some n ∈ max {n1 , n2 } , . . . , n1 + n2 and some bijection f ∈ Fn,n with
f1 (b1 , . . . , bn1 , 0, . . . , 0)
..
∀ b1 , . . . , bn1 ∈ {0, 1} .
. = φ(b1 , . . . , bn1 )
fn2 (b1 , . . . , bn1 , 0, . . . , 0)
Exercise 1 Show that CSWAP acts as indicated and, therefore, is universal for
classical reversible computation:
b1 s b s b s b
b2 1 1⊕b 0 b
\ \ \
0 \ b1 b2 0 \ 1 \
0 ··· c0
a1 ··· a1
+
b1 ··· b1
0 ··· c1 a1 ⊕ b1 ⊕ c1
.. .. ..
. . .
.. .. ..
. . .
0 cn−2 ··· an−2 ⊕ bn−2 ⊕ cn−2
an−1 ··· an−1
+
bn−1 ··· bn−1
n
X n
X n
X
aν 2n−ν + bν 2n−ν = c0 2n + (aν ⊕ bν ⊕ cν ) 2n−ν .
ν=1 ν=1 ν=1
| {z } | {z } | {z }
x y x+y
Exercise 3 Show that for every reversible classical 2-bit network there is an equiv-
alent one composed only of CNOTs, TCNOTs and NOTs.14
where f ∈ Fn,n is the mapping corresponding to the classical action of the gate.
This means that, in a way, the gate is able to perform all the 2n transitions
|bi 7−→ |f (b)i , b ∈ {0, 1}n ,
simultaneously — thanks to quantum mechanical evolution. Of course, one would
like to exploit this massive quantum parallelism for more efficient computation.
Unfortunately quantum mechanics imposes severe restrictions:
1. Unknown coherent superpositions cannot be copied with arbitrary precision
(Wootters and Zurek, 1982; Peres, 2002). Otherwise a device for superluminal
communication could be constructed (Werner, 2001, Chapter 3).
2. Every measurement of an unknown state destroys most of the information
carried by that state (quantum state collapse).
3. It is extremely difficult to correct errors caused by unwanted interaction with
the environment.
Nevertheless quantum computational networks can be devised, at least in principle,
which are much more efficient, for certain tasks, than classical computational net-
works. Their general structure is as follows:
• The information is usually processed on one and the same quantum register16
realized as an array of qubits,17 i.e. quantum mechanical systems with a
preselected simple quantum alternative corresponding to orthonormal state
vectors, usually denoted |0i and |1i .
DRAFT, October 17, 2007
15
See (Long and Sun, 2001) for an efficient preparation of these superpositions.
16
Thanks to the SWAP gate this is not a necessity but this point of view simplifies the treatment.
17
Usually qubits are treated as distinguishable, due to their localization in (essentially) disjoint
regions; see (Eckert et al., 2002) for a refined description.
1.2. QUANTUM COMPUTATIONAL NETWORKS 19
• The possible (pure) states of such an n-qubit register correspond to the (nor-
malized) complex linear combinations of the elements (1.5) of the computa-
tional basis.
• The whole network itself is a (more complicated) n-qubit quantum gate acting
corresponding to some unitary operator Ûnet .
• The action of this operator on the initial state vector |b1 , . . . , bn i representing
the task (encoded in the bit sequence (b1 , . . . , bn )) has to be checked — i.e. the
output state Ûnet |b1 , . . . , bn i has to be measured — to yield a result.
Remarks:
Table 1.3: General one-qubit gate u1j u1k + u2j u2k = δjk
It is relative to this ordering that the actions of quantum gates are usually repre-
sented by unitary matrices as in Tables 1.3–1.5.
Note that a quantum gate may be used for classical computation iff the entries of
its matrix take only values from {0, 1} . Whenever this is the case we use the same
symbol and name for the quantum gate as for its classical analog. In this sense we
have, e.g.,
V s s
¬)
1 (ˆ = CNOT : = ,
¬
ˆ h
1.2. QUANTUM COMPUTATIONAL NETWORKS 21
s
.. |b1 , . . . , bn , ci
V . 1l2n 0 (
n Û gate
s 0 Û |b1 , . . . bn i ⊗ Û |ci if b1 = . . . = bn = 1
7→
|b1 , . . . , bn , ci else
Û
s s
V s s
¬)
2 (ˆ = CCNOT : = , (1.7)
¬
ˆ h
i.e.
h = ¬
ˆ . (1.8)
Obviously, the phase shift gate (for δ 6= 0 mod π) and the Hadamard gate have no
classical analog.
|b1 i |b1 i
.. f ..
. .
|bn i |bn i
|ci h |c ⊕ f (b)i
Exercise 4
a) For arbitrary a ∈ {0, 1}n , n ∈ IN , show that
22 CHAPTER 1. BASICS OF QUANTUM COMPUTATION
N̂a1 s N̂a1
.. fa .. .. .. ..
. . ≡ . . .
N̂an s N̂an
h h ,
where
def
fa (b) = δa,b ∀ b ∈ {0, 1}n
and
def ¬
ˆ if b = 0 ,
N̂b =
1̂ else .
b) Show for arbitrary f, g ∈ Fn,1 that
.. h .. .. f .. g ..
h=f ⊕g =⇒ . . ≡ . . .
h h h .
you may have to ask the Deutsch-Jozsa oracle 2n−1 + 1 times (in the worst case)
to find the answer. Already for n = 60 that would take more than
259
years > 18 years
60 · 60 · 24 · 365 · 109
1.2. QUANTUM COMPUTATIONAL NETWORKS 23
to get the answer if the oracle is asked at a frequency of 1 GHz. In quantum com-
putation, however, we may take advantage of coherent superpositions:
Since
ÛH |bi = √1
2
|0i + (−1)b |1i
1 X ′
= √ (−1)b b |b′ i ∀ b ∈ {0, 1}
2 b′ ∈{0,1}
and hence
X ′
ÛH⊗n |bi = 2−n/2 (−1)b ·b |b′ i ∀ b ∈ {0, 1}n (1.9)
′ n
b ∈{0,1}
we have
X ′
(−1)f (b)+b ·b |b′ , 1i .
⊗(n+1) ⊗(n+1)
ÛH ◦ f -CNOT ◦ ÛH |0, . . . , 0, 1i = 2−n
b,b′ ∈{0,1}n
(1.10)
For the Deutsch-Jozsa oracle this means
⊗(n+1) ⊗(n+1) ∼ |0, . . . , 0, 1i if f is constant,
ÛH ◦ f -CNOT ◦ ÛH |0, . . . , 0, 1i =
⊥ |0, . . . , 0, 1i else.
Therefore, the following quantum gate has to be used only19 once in order to solve
the Deutsch-Jozsa problem (Cleve et al., 1998, Sect. 3):
|0i
H H
∼ |0, . . . , 0i if f is constant,
.. .. f .. Ψ=
. . . ⊥ |0, . . . , 0i else.
|0i H H
|1i H h H |1i
Remark: (1.10) holds for every f ∈ F2,1 and can therefore be applied
also to the Bernstein-Vazirani oracle, i.e. the f -CNOT gate with
f (b) = a · b for some a ∈ {0, 1}n . Then Ψ becomes
X ′
2−n (−1)(a+b )·b |b′ i = |ai .
b,b′ ∈{0,1}n
DRAFT, October 17, 2007
19
Actually, since there is always some tiny probability for getting the wrong answer, the
quantum test should be repeated a few times. For a physical realization of the algorithm see
(Gulde et al., 2003).
24 CHAPTER 1. BASICS OF QUANTUM COMPUTATION
H s
h
|0, 0i + |1, 1i
def def
|0, 0i 7−→ Ψ0,0 = Φ+ = √ = Û0,0 ⊗ 1̂ Ψ0,0 ,
2
def def |0, 1i + |1, 0i
|0, 1i 7−→ Ψ0,1 = Ψ+ = √ = Û0,1 ⊗ 1̂ Ψ0,0 ,
2
def def |0, 0i − |1, 1i
|1, 0i 7−→ Ψ1,0 = Φ− = √ = Û1,0 ⊗ 1̂ Ψ0,0 ,
2
def def |0, 1i − |1, 0i
|1, 1i 7−→ Ψ1,1 = Ψ− = √ = Û1,1 ⊗ 1̂ Ψ0,0 ,
2
where
def
Û0,0 = + |0ih0| + |1ih1| = 1̂ ,
def
Û0,1 = + |1ih0| + |0ih1| = ¬
ˆ,
def
Û1,0 = + |0ih0| − |1ih1| = Ŝπ ,
def
Û1,1 = − |1ih0| + |0ih1| = Ŝπ ¬ˆ.
Bob prepares the entangled 22 state Ψ0,0 by applying the Bell network
to the easily available state |0, 0i and sends his first qubit to Alice (ar-
bitrarily far away). Now Alice may transfer a 2-bit message to Bob by
applying one of the operators Û0,0 , Û0,1 , Û1,0 , Û1,1 to this single qubit
and sending it back to Bob. Bob can ‘read’ this message by performing
DRAFT, October 17, 2007
20
The states on the r.h.s are usually called Bell
states.
They exhibit maximal correlation
α def −β
between the two qubits. We use the notation = . Thus
β ⊥ +α
1 Ψ Ψ⊥ Ψ⊥ Ψ
Ψ− = √ ⊗ − ⊗ ∀ Ψ ∈ C2 \ {0} .
2 kΨk kΨ⊥ k kΨ⊥ k kΨk
21
See (Mermin, 2002) for an interesting discussion of dense coding.
22
Entanglement of vector states Ψ means
i.g.
hΨ| Â ⊗ B̂ |Ψi 6= hΨ| Â ⊗ 1̂ |Ψi hΨ| 1̂ ⊗ B̂ |Ψi ,
i.e. (non-classical) correlations between the subsystems. See (Brukner et al., 2001) in this context.
1.2. QUANTUM COMPUTATIONAL NETWORKS 25
|b1 i s |b1 i
|b2 i s |b2 i
|0i H s h π s H |b1 i
|0i h h |b2 i .
Remarks:
s s
s s s
≡
H h s h π s H h
h h h
— although unsuitable for dense coding — has the same effect on the considered
special input.
2. We use abbreviations like
s
\ \
for \ s \
 Â
Moreover, checking the special cases Ψ ∈ {|0i , |1i}, we see that the teleportation
network
s H
H s h
h
(for every one-qubit state vector ψ). This indicates the possibility of quantum
teleportation:23
Qubits 2 and 3 are prepared in the state Φ0,0 (indicated by the Bell
subnetwork on the left acting on |0, 0i). Then qubit 2 is sent to Alice
and qubit 3 to Bob (far apart). Since, now, Alice and Bob share an
entangled pair of qubits, Alice may teleport the unknown state ψ of
qubit 1 to Bob in the following way:
Alice performs a Bell measurement on the system formed by
qubits 1 and 2 and sends Bob the classical 2-bit information
b if the result is Ψb (corresponding to the output |bi of the
teleportation network for qubits 1 and 2). After receiving this
information Bob transforms the (collapsed) state of qubit 3
into ψ by applying Ûb .
Note that the actions taken by Alice and Bob, sharing the entangled pair, have the
same effect on qubits 1–3 as the following post selection scheme:24
s H s ⌢
/
h s ⌢
/
¬
ˆ π
In this sense the following scheme describes teleportation of entanglement, also called
entanglement swapping:25
|0i H s
|0i h s H s ⌢
/
|0i H s h s ⌢
/
|0i h ¬
ˆ π
This possibility is very important for creating entanglement for teleportation over
very large distances.
Exercise 5 Show that the entanglement swapping scheme prepares the subsystem
formed by qubits 1 and 4 (arbitrarily far apart) in the state Ψ0,0 .
1.2.3 Universality
A 2-qubit gate corresponding to the unitary operator Û (2) is called universal if for
every quantum network there is an equivalent one composed only of one-qubit gates
and 2-qubit gates corresponding to Û (2) .
Ordering the computational basis vectors
def
|I(b)in = |bi ∀ b ∈ {0, 1}n (1.11)
as |0in , |1in , . . . |2n − 1in then λn−1 (ˆ
¬) just interchanges the last two of these vec-
tors, the latter being |1, . . . , 1, 0i and |1, . . . , 1, 1i . Also cyclic permutations of the
computational basis vectors can be achieved by suitable composition of Λν (ˆ ¬) gates,
as the following exercise shows.
h ···
s h ···
.. .. ..
. . .
s s ···
s s ··· h
s s ··· s h
s s ··· s s ¬
ˆ
acts according to
|xin 7−→ |(x + 1) mod 2n in ∀ x ∈ {0, . . . , 2n − 1} ,
where +
n
X def
bν 2 ν−1
= |bi ∀ b ∈ {0, 1}n . (1.12)
ν=1 n
Therefore:
For every quantum gate that has a classical analogue there is an equiv-
alent quantum network composed only of Λν (ˆ ¬) (and ID) gates.
This together with the following theorem shows that the CNOT gate is universal if
the following holds for every ν ∈ IN :
For every Û ∈ U (2) there is a network composed only of single qubit
gates and CNOT gates (and ID gates) that is equivalent to the Λν (Û ) (1.13)
gate.
28 CHAPTER 1. BASICS OF QUANTUM COMPUTATION
we have
0 0
.. ..
. .
0 0
′
(N ′ ) 0 ζ
ÛN ′ = N′
ζ′ z ′
N +1 N +1
z z
. .
.. ..
zN zN
′
for suitable Û (N ) ∈ U (2) and ζ ′ ∈ C . Thus, by iteration, we see that there are
Û (N ) , . . . , Û (2) ∈ U (2) with
(2) (N )
z = Û2 · · · ÛN eN
and hence −1 −1
(N ) (2)
ÛN · · · Û2 z = eN .
ˆ
Identifying z with the last column of an arbitrarily given unitary N × N -matrix Û
we get −1 −1
(N ) (2) ˆ
ÛN · · · Û2 Û = δν,N .
ν,N
Thanks to unitarity, the latter also implies
−1 −1
(N ) (2) ˆ
ÛN · · · Û2 Û = δN,ν .
N,ν
Lemma 1.2.2 For every 27 Û ∈ SU(2) there are Â, B̂, Ĉ ∈ SU(2) with
ÂB̂ Ĉ = 1̂ , ¬B̂ ¬
ˆ ˆ Ĉ = Û .
Proof: Let Û ∈SU(2) . Then one may easily show (see Exercise 28 of (Lücke, eine))
that there are angles ψ, θ, φ with
where
+ cos θ2 + sin θ2
ψ
def e+i 2 0 def
R̂3 (ψ) = ψ , R̂2 (θ) = .
0 e−i 2 − sin θ2 + cos θ2
With the definitions
def θ def θ ψ+φ def φ−ψ
 = R̂3 (ψ) R̂2 , B̂ = R̂2 − R̂3 − , Ĉ = R3
2 2 2 2
this gives
 B̂ Ĉ = R̂3 (ψ) R̂2 θ
2 R̂2 − θ2 R̂3 − ψ+φ
2 R3 φ−ψ
2
= R̂3 (ψ) R̂3 (−ψ)
= 1̂
and
¬B̂ ¬
ˆ ˆ Ĉ = R̂3 (ψ) R̂2 θ
2 ¬ˆ R̂2 − θ2 R̂3 − ψ+φ
2 ˆ R3 φ−ψ
¬ 2
= R̂3 (ψ) R̂2 θ
2 ˆ R̂2 − θ2 ¬
¬ ˆ ¬ ˆ R̂3 − ψ+φ2 ˆ R3 φ−ψ
¬ 2
θ
θ
ψ+φ
φ−ψ
= R̂3 (ψ) R̂2 2 ˆR̂ 2 2 R̂ 3 2 R 3 2
Because of
|0i s s |0i
|bi Ĉ h B̂ h  ÂB̂ Ĉ |bi
and
DRAFT, October 17, 2007
27
As usual, we denote by U(2) the set of all (complex) unitary 2 × 2-matrices and by SU(2) the
set of all Û ∈U(2) with det Û = 1 .
30 CHAPTER 1. BASICS OF QUANTUM COMPUTATION
|1i s s |1i
|bi Ĉ h B̂ h  ¬B̂ ¬
ˆ ˆ Ĉ |bi
Corollary 1.2.3 For Â, B̂, Ĉ, Û according to Lemma 1.2.2 we have:
s s s
≡ .
Û Ĉ h B̂ h Â
s δ s
≡ , Â′ = eiδ Â ,
′
 Â
h H s H
≡
s H h H
and28
s H s H s
\ ≡
\ h H h H h .
Moreover, because of
|0i s s s |0i
|0i s h s h |0i
|bi Ĉ B̂ Â |bi
|0i s s s |0i
|1i s h s h |1i
|bi Ĉ B̂ Â B̂ Ĉ |bi
DRAFT, October 17, 2007
28
Recall (1.3).
1.2. QUANTUM COMPUTATIONAL NETWORKS 31
|1i s s s |1i
|0i s h s h |0i
|bi Ĉ B̂ Â ÂB̂ |bi
|1i s s s |1i
|1i s h s h |1i
|bi Ĉ B̂ Â ÂĈ |bi
s s s s
s ≡ s h s h
V̂ 2 V̂ V̂ ∗ V̂
V 2
This Sleator-Weinfurter construction may be generalized for n (V̂ ) with
arbitrary n ∈ IN :29
s s s s
s s h s h
s s s s
..
≡ .. .. ..
. . . .
s s s s
V̂ 2 V̂ V̂ ∗ V̂
Since n o
U (2) = V̂ 2 : V̂ ∈ U(2)
this that (1.13) holds for every ν ∈ IN , hence:
s s
≡
h H π H
and that
s π
≡
π s
acts according to
|j, ki 7−→ (−1)δj,1 δk,1 |j, ki .
Quantum Algorithms1
So far, we have only discovered a few techniques which can produce speed up versus
classical algorithms. It is not clear yet whether the reason for this is that we do
not have enough intuition to discover more techniques, or that there are only a few
problems for which quantum computers can significantly speed up the solution.
(Shor, 2000)
3
See (Aaronson and Gottesman, 2004), however.
33
34 CHAPTER 2. QUANTUM ALGORITHMS
|ai
.
.....
..........
..
....
..
...
...
..
.
... (n)
...
pppppppppp
pppppp pppp Ĝa Φ0
.
... .
.... p p p .
.. pp p p p . .
pppp pppp
... .
.... . .
pppppp pp
... ... ..
. .
.
....
.
p p p p p p ... .
pppppp 2θ . ..
pp pppppp
.. ... .
...
pppp pppp
. .
... pppppppppppp (n) . .
................
..................... pp Φ .. ....
.... .
.
.
0
....... .............
.......
.......
.......
.............
.............
.............
θ ... .. ..
............... .... ..
.
....... .................
.......
.......
.......
.......
.......
...........
. ..
..
..
⊥ |ai
....... .
.......... ....
.....................
(n)
Figure 2.1: Action of Ĝ on Φ0 .
where
def
R̂Ψ = 1̂ − 2 P̂Ψ ∀ Ψ ∈ Hn .
(n)
Since both reflections R̂|ai and R̂Φ(n) leave the |ai-Φ0 -plane invariant, Ĝa acts as
0
a rotation in this plane. To determine this rotation it suffices to check its effect on
(n)
Φ0 .
As explained in Figure 2.1 this action is a rotation by the angle 2 θ towards |ai ,
(n)
where π/2 − θ is the angle between Φ0 and |ai . Therefore:
(n)
Applying Ĝa an appropriate number of times to Φ0 and testing the
result with respect to the computational basis solves the posed problem.
Ψ .. fa .. δ0b Ψ + δ1b R̂|ai Ψ
. .
|bi H h H |bi ,
H H
Ψ .. f0 .. δ0b Ψ − δ1b R̂Φ(n) Ψ
. . 0
H H
|bi H h H π |bi .
V
Using the obvious notation and generalization of 1 (Û ) for n-qubit unitary operators
Û , we get from Exercise 10
H H
.. Ĝ .. .. fa .. f0 ..
. a . . . .
≡
H H
s H h h H π
and therefore:
|0i H ···
.. .. .. .. Ĝ µ (n)
. . Ĝa . . a Ĝ Φ
a 0
|0i H ···
|1i s ··· s |1i .
| {z }
µ-times
where !
def 1
θ = arcsin √ n . (2.4)
2
Since
θ ≈ 2−n/2 for 2−n/2 ≪ 1
DRAFT, October 17, 2007
5
Formula (2.3) was presented first in (Boyer et al., 1998).
36 CHAPTER 2. QUANTUM ALGORITHMS
we have √
µ (n) π
Ga Φ0 ≈ |ai for µ = 2n and 2n ≫ 1 .
4
In this sense Grover’s algorithm provides a quadratic speedup compared to clas-
sical computation.
Let us now consider the case that there are exactly t data base entries,6 indexed
by a1 , . . . , at ∈ {0, 1}n , meeting the search criteria and that the search engine,
therefore, provides an implementation of the (fa1 + . . . fat )-CNOT gate. In order to
find at least one of these aν we just have to replace Ĝa by
def
Ĝa1 ,...,at = −R̂Φ(n) R̂|a1 i · · · R̂|at i ,
0
which may be implemented as described in 2.1.2 with the fa -CNOT gate replaced
by the (fa1 + . . . fat )-CNOT gate. Correspondingly, (2.3)/(2.4) have to be replaced
by
|a i + . . . |a i 1 X
(n) 1 t
Ĝµa1 ,...,at Φ0 = sin (2µ + 1) θt √ +cos (2µ + 1) θt √ |bi
t 2n − t b6∈{a1 ,...,at }
(2.5)
and !
def t
θt = arcsin √ n . (2.6)
2
Choosing µ such that sin2 (2µ + 1) θt is close to 1 we get a state that is essential
a superposition of only those states of the computational basis which correspond
to data base entries meeting the search criteria. Performing a test we select one
solution at random.
Unfortunately, we only know how to choose qµ nif we
know t . If t is unknown we
2 −1
find a solution after an expected number of O t
applications of the described
′
procedure with suitably chosen µ s (Boyer et al., 1998, Sect. 4).
For interesting modifications of Grover’s algorithm see (Ambainis, 2005; Korepin and Grover, 2
Tulsi et al., 2005) and references given there. For a few-qubit experimental imple-
mentation of the algorithm see (Walther et al., 2005) and references given there.
For application to robots see (Dong et al., 2005).
The most popular public-key encryption algorithm8 is RSA, named after its three
inventors Ron Rivest, Adi Shamir, and Leonhard Adleman. It works as follows
(Rivest et al., 1978):
C = M e mod N ,
where N > M and e are two public keys created in the following way:
1. Two large prime numbers p and q of comparable size are ran-
domly chosen9 and kept secret. Only their product
N =p·q
is publicly announced.
2. e is chosen as a large random number having 1 as largest com-
mon divisor with (p − 1) · (q − 1) — to be checked by Euclid’s
algorithm.
DRAFT, October 17, 2007
7
As usual, we use the notation
def
⌊x⌋ = sup {n ∈ ZZ : n ≤ x} ∀ x ∈ IR .
Thus, for nν+1 6= 0 , nν+2 is the remainder of the integer division of nν by nν+1 . For details
concerning Euclid’s algorithm see Section 2.2.3.
8
See (Singh, 2002; Kahn, 1967) for the history of classical cryptography and (Schneier, 1996)
for applications.
9
See (Rivest et al., 1978, Section VII.B) how to find large prime numbers without testing pri-
mality by factorization.
38 CHAPTER 2. QUANTUM ALGORITHMS
M = C d mod N .
Of course, d has to be kept secret as well as the prime numbers p, q which then may
be forgotten.
n+ · n− = 0 (modN ) (2.9)
n± 6= 0 (modN ) (2.10)
Then11
gcd (n± , N ) ∈ {2, . . . , N − 1} (2.11)
and these factors may be efficiently determined using Euclid’s algorithm.
Outline of proof for (2.11): Obviously, every prime factor of N must be a factor
of either n+ or n− (or both) and neither n+ nor n− can be the product of all these
(not necessarily pairwise different) factors.
Proof: See, e.g., (Schroeder, 1997, Sect. 8.3) or (Nielsen and Chuang, 2001, Theo-
rem A4.9).
the function
def
f (ν) = xν ∀ν ∈ ZZ (2.13)
has a minimal period
def
r = inf {a ∈ IN : xa = 1 (modN )} , (2.14)
n± = xr/2 ± 1 .
xr/2 6= +1 (modN )
implied by (2.14).
Thanks to the following theorem (and Euler’s algorithm) the efficiency of this
factoring algorithm depends solely on the available techniques for determining (2.14).
Theorem 2.2.2 Let m be the number of different prime factors of the positive
integer N and let x ∈ {1, . . . , N − 1} be randomly chosen. If gcd(x, N ) = 1 , then
the (conditional) probability for (2.14) being even and xr/2 6= −1 (modN ) is not
smaller than 1 − 2−m .
where n o
def
L = min l ∈ IN : N ≤ 2l ,
into the state14
2L
1 2 X−1
|ai2L ⊗ |xa (modN )iL
2L a=0
(exploiting quantum parallelism) and evaluate the latter by means of the
quantum Fourier transform applied to the first 2L qubits..
1 Z T0
fe(ω) = √ f (t) ei ω t dt
2π 0
where
def
X T0
∆T0 /N (t) = δ t−ν
N
ν∈ZZ
15
and hence
√ N X 2N
e T /N (ω) =
∆ 2π δ ω − µπ .
0
T0 T0
µ∈ZZ |{z}
Nyquist-frequency
we get
e 2π T0 2π
f k ≈√ xek( mod N ) if k ≤Ω
T0 2π N T0
for the sampling values
T0
xj = f j , j ∈ {0, . . . , N − 1} .
N
Since
N −1
X 2π 1 − ei 2π m
ei k N
m
= 2π = 0 ∀ m ∈ {1, . . . , N − 1} , (2.17)
k=0 1 − ei N m
where16
def
x(b) = xI(b)
def ∀ b ∈ {0, 1}n .
xe(b) = xeI(b)
n
Obviously, F̂n is a linear operator on C2 and, therefore,
!
1 2π
x(a) = δa,b ∀ a ∈ {0, 1} n
=⇒ xe(a) = √ n ei I(a) 2n I(b) ∀ a ∈ {0, 1} n
(2.16) 2
implies17
√ X 2π
2n F̂n |bi = ei I(a) 2n I(b) |ai (2.20)
n
a∈{0,1}
X O n
2π
n−ν a I(b)
= ei 2 ν 2n
|aν i ∀ b ∈ {0, 1}n .
a∈{0,1}n ν=1
18
An import special case is F̂n |0i = ÛH⊗n |0i .
2.2. FACTORING LARGE INTEGERS 43
with
|b1 i |bn i
def 1 0 .. ..
ŝν = i 2π/2ν , . m
. ,
0 e
|bn i |b1 i
ŝν Ĉν h Ĉ −1 h
ν
≡
s s s δν
Remarks:
1. If the crossings are ignored then the above implementation of the quan-
tum Fourier transform uses n/2 SWAP gates, n Hadamard gates and n2 /2
Λ1 (ŝν ) gates.
2. Since
X D E
x
eI(a) = xI(b) a F̂n b
(2.19)
b∈{0,1}n D E
X n
= xI(b) F̂n−1 a b ∀ a ∈ {0, 1} ,
b∈{0,1}n
the above network implementation for F̂n yields a nice factorization of the
matrix corresponding to the discrete Fourier transformation. This factoriza-
tion is the core of the radix-2 version of the fast Fourier transform (FFT)
algorithm.20
′
xa (modN ) = xa (modN ) ⇐⇒ a′ = a mod r .
Therefore,
D E 2
def
p(a, c) = |ci2L ⊗ |xa (modN )iL ΨShor
2
1 X 2π n o
i a′ c
= e 22L ∀ a, c ∈ 0, . . . , 22L − 1 ,
24L a′ ∈Ma
22
See also (Coppersmith, 1994), in this connection.
2.2. FACTORING LARGE INTEGERS 45
where n o
def ′ 2L ′
Ma = a ∈ 0, . . . , 2 − 1 : a = a mod r ,
c d 1
− ≤ , gcd(d, r) = 1 (2.24)
22L r 2 r2
being fulfilled for integer d .
If we have found a fraction c/22L fulfilling (2.24) for some (unknown) integer d
with gcd(c, d) = 1 , then r may be efficiently determined using the continued fraction
algorithm:25
n0 1
= + jn k
n1 1
+ j k1
n2 n2 1
+
n3
( nn43 )
etc.,
hence the continued fraction expansion26
ν−2
n0 n0 X 1 | 1 |
= + j
nµ
k +
nν−1
∀ ν ∈ {1, . . . , s} (2.25)
n1 n1 µ=1 nµ+1 nν
Due to
nν+1 6= 0 =⇒ nν+2 < nν+2 < nν+1
(2.7)
j k
ns−1 ns−1
s must be finite and fulfill the equation ns
= ns
. Since
gcd (nν−1 , nν ) 6= 0 ⇐⇒ gcd (nν+1 , nν )
we see that gcd(n0 , n1 ) divides ns and that ns , dividing ns−1 , also divides n0 and
n1 . Hence (2.8) holds, indeed.
d
Given c, L ∈ IN fulfilling (2.24), the set of possible fractions c
is strongly re-
stricted by the following lemma.
DRAFT, October 17, 2007
26
Note that the continued fraction expansion does not change if n0 and n1 are replaced by
n′0 = p n0 and n′1 = p n1 , where p ∈ IN .
27
See, e.g., (Perron, 1954; Perron, 1957) or (Brezinski, 1991) for the general theory of continued
fractions. See also (Baladi and Vallee, 2003).
2.2. FACTORING LARGE INTEGERS 47
n0 d 1
− < ,
n1 r 2 r2
we have
r = Bt for some t ≤ s .
Also these At , Bt can be efficiently determined via Euclid’s algorithm:
If
a1 | a2 | an |
b0 + + + ... + ,
| b1 | b2 | bn
is well-defined then
ν+1 ν−1
X aµ | X aµ | aν bν+1 |
b0 + = b0 + + ∀ ν = 1, . . . , n − 1
µ=1 | bµ µ=1 | bµ | bν bν+1 + aν+1
and, therefore,
a1 | a2 | aν | Aν (a1 , . . . , aν ; b0 , . . . , bν )
b0 + + + ... + = ∀ ν = 1, . . . , n ,
| b1 | b2 | bν Bν (a1 , . . . , aν ; b0 , . . . , bν )
DRAFT, October 17, 2007
28
Note, however, that
Xt t−1
1 | X 1 | 1 |
at = 1 =⇒ = + ∀ a0 , . . . , at ∈ IN .
µ=1
| aµ µ=1
| aµ | at−1 + 1
48 CHAPTER 2. QUANTUM ALGORITHMS
where
def def def def
A−1 = 1 , A0 = b 0 , B−1 = 0 , B0 = 1 .
Fortunately, these definitions also imply
)
aµ = 1 ∀ µ ∈ {1, . . . , n}
=⇒ gcd (Aν , Bν ) = 1 ∀ ν ∈ {1, . . . , n} .
bµ ∈ IN ∀ µ ∈ {0, . . . , n}
Outline of proof:
A0 B−1 − B0 A−1 = −1 ,
this gives
ν+1
Aν Bν−1 − Bν Aν−1 = (−1) ∀ ν ∈ {0, . . . , n} . (2.26)
In case
Aν = dν cν , Bν = eν cν
the positive integer cν would divide the l.h.s. of (2.26), hence also the r.h.s. The
latter, however, is only possible for cν = 1 .
c d 1
− ≤
22L r 2 r2
(but not gcd(d, r) = 1) is fulfilled (with d = 321) r = 420 will presumably not be
detected and the whole procedure will be repeated, maybe with a different random
value for x .
• It must be possible to convert static qubits into flying qubits (typically photons).
• It must be possible to protect flying qubits against decoherence.
51
52 CHAPTER 3. PHYSICAL REALIZATIONS OF QUANTUM GATES
3.1.1 Photons
In the Coulomb gauge the free electromagnetic field E(x, t) , B(x, t) is given in
the form
∂
B(x, t) = curl A(x, t) , E(x, t) = − A(x, t) ,
∂t
∗
A(x, t) = A(+) (x, t) + A(+) (x, t)
by some complex vector potential
Z 2
X dk
A(+) (x, t) = ǫj (k) fˇj (k) e−i(c|k|t−k·x) q ,
j=1 2 |k|
In the Heisenberg picture of the quantized theory the classical fields E(x, t) and
B(x, t) have to be replaced by corresponding observables on the state space Hfield ,
i.e. by operator-valued (generalized) functions Ê(x, t) and B̂(x, t) to be interpreted
in the following way:
where4
q Z 2
X
(+) dk
ǫj (k) âj (k) e−i(c|k|t−k·x) q
def
 (x, t) = (2π)−3/2 µ0 h̄c (3.1)
j=1 2 |k|
and the âj (k) are annihilation operators5 fulfilling the commutation relations6
†
[âj (k), âj ′ (k′ )]− = 0 , [âj (k), âj ′ (k′ ) ]− = δjj ′ δ(k − k′ ) (3.2)
on a suitable dense subspace D0 of the Hilbert space H containing a cyclic nor-
malized vacuum state vector Ω characterized (up to a constant phase factor) by
âj (k) Ω = 0 (3.3)
(in the distributional sense). This also fixes the inner product on H .
with7 h i
â , ↠= 1̂ (3.5)
−
characterize modes of the quantized electromagnetic field corresponding to the clas-
sical complex vector potentials
* † +
(+) (+) †
A (x, t) = Â (x, t) Ω â Ω
* +
(+)
= Ω Â (x, t) , ↠Ω
−
q Z 2
X dk
= (2π)−3/2 µ0 h̄c ǫj (k) fˇj (k) e−i(c|k|t−k·x) q .
(3.4),(3.1),(3.2) j=1 2 |k|
(3.6)
DRAFT, October 17, 2007
4
Thanks to the special choice of the factor in front of the integral we get the desired expression
Z
1 1
Ĥ = ǫ0 : Ê(x, t) · Ê(x, t) : + : B̂(x, t) · B̂(x, t) : dx
2 µ0
for the Hamilton operator, characterized (up to an additive constant) by
∂ (+) i h (+)
i
 (x, t) = Ĥ ,  (x, t) .
∂t h̄ −
5
See (Mizrahi and Dodonov, 2002), however.
6
Of course, the notation † includes the requirement
†
hΦ | âj (k) Φ′ i = âj (k) Φ Φ′ .
7
Condition (3.5) is equivalent to â† Ω = 1 .
54 CHAPTER 3. PHYSICAL REALIZATIONS OF QUANTUM GATES
With these modes the subspaces H(n) ⊂ H of n-photon state vectors may be defined
recursively by
def
H(0) = {λ Ω : λ ∈ C}
and n o
def
H(n+1) = ↠Φ(n) : Φ(n) ∈ H(n) , â mode for n = 0, 1, 2, . . . .
Modes âν , âµ are called orthogonal, iff the states â†ν Ω , ↵ Ω are orthogonal, i.e. iff
[âν , âµ ]− = 0 .
Remarks:
1. Since the single qubits of the 1-photon realization cannot exist independently
from each other we should better call the system a qu2n it system.
DRAFT, October 17, 2007
8
For the special case n = 3 an example is illustrated in Figure 3.1.
3.1. QUANTUM OPTICAL IMPLEMENTATION 55
qqqqqqqqq
.....
.. ..........
. √1 |0, 0, 0i
..... 8
.....
. . .......
..... ........... .
.... ........
..... .....
..... qqqqqqqqqq √1
.....
.....
................. ..... ..........
.
8
|0, 0, 1i
... .
.
. ..
.................... .
..... .........
..... .....
.....
qqqqqqqqq √1
.....
........ .
.
.
....
... .....
.....
.....
.....
.....
...
..........
.
8
|0, 1, 0i
..
..... .....
..... ........
......
. .
.. . . ..
..... ..... .......... .
..... .....
..... .....
..... .....
qqqqqqqqqq
.....
.....
....... . .....
. . .
.....
. .....
.. ..........
. √1 |0, 1, 1i
.........
..... .
......
. 8
..... ........
..... ............ .
.....
.....
.....
qqqqqqqqqq √1
.....
.....
.....
..... .....
.....
..........
.
8
|1, 0, 0i
..... .....
.....
..... .. .......
..... .................. .
..... .. ...
..... ..... .........
..... ..... .....
.....
.....
.............. qqqqqqqqqq
.....
. ..........
. √1 |1, 0, 1i
..... ..
..... ....... 8
..... ..
..... ........
..... ............. .
.....
.....
.....
.....
.....
..... qqqqqqqqqq
....
........... √1 |1, 1, 0i
..... ..... 8
..... .....
..... .........
.
..... ............. .
.....
.....
.....
qqqqqqqqqq
.....
... ..........
. √1 |1, 1, 1i
8
(3)
Figure 3.1: Preparation of Φ0 in a single-photon realization.
For such a choice of computational bases all unitary transformations can be (essen-
tially) effected by linear optical components. Thanks to Theorem 1.2.1 it is sufficient
to show this for n = 1 :
Assume, for instance, that that |0i and |1i describe horizontally polarized (almost
monochromatic) photons. Then the 1-qubit gates may be implemented by linear
optical elements corresponding to Jones matrices Û in the following way:
ppppp p
λ1 |0i ppppp pp pp λ′1 |0i
ppppp p p ppp p
..... ........................... ..... .....
D̂ ....
π ..... ....................... ..... ..... ....... ppppp p ppp
p ............
......... D̂− 2 ....
π ..... ..... ..................... .....
2 ppp ppppp
..
.
...
.
...
.
.. ..
....... ......
......... ... ...
...
...
.
...
.
ppppp
...
′ p ppp
λ |1i 2...... ppppp
.
... χ χ pp pp λ′2 |1i
ppppp ..p..p. ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ....................... .....
. ...... .......
..... ..................... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... .....
ppppp .............. Û ..
........... p p
ppp
ppp pp ppp
All unitary transformations of the polarization state of a photon (with almost sharp
momentum) can be (almost accurately) performed by proper use of only λ/2-blades
DRAFT, October 17, 2007
9
See (Bartlett et al., 2002) for details. See also (Haderka et al., 2003; Waks et al., 2003).
56 CHAPTER 3. PHYSICAL REALIZATIONS OF QUANTUM GATES
a) Show that the CNOT gate may be implemented by placing a 90◦ polarization
rotator into the lower path.
Multi-Photon Realization
For given n ∈ IN we may choose a fixed10 set
n o
âν,j : ν ∈ {1, . . . , n} , j ∈ {0, 1}
Here, while the 1-qubit gates may still be easily implemented by linear optical
components, the physical realization of universal 2-qubit gates is quite a technolog-
ical challenge.12
Fock Realization
Another possibility is to choose some fixed set {â1 , . . . , ân } of pairwise orthogonal
modes and consider the states
where
1 ν 1 ν n
def
|ν1 , . . . , νn iF = √ â†1 · · · â†n Ω ∀ ν1 , . . . , νn ∈ ZZ+ , (3.8)
ν1 ! · · · ν n !
as elements of the computational basis of the n-qubit system.
The states â†b Ω of the single-photon realization for n-qubit systems form the
subset n o
|biF : b1 + . . . + bn = 1
of the computational basis of the Fock realization for 2n -qubit systems using the
2n modes
âI(b)+1 = âb , b ∈ {0, 1}n .
Obviously, for n=1 the Fock realization does not coincide with the single-photon
realization. Actually, 1-qubit gates like the Hadamard gate cannot be implemented
by linear optical components, since |0iF represents the vacuum state. Nevertheless,
the Fock realization has certain advantages as, e.g., those to be discussed in 3.1.4.
DRAFT, October 17, 2007
10
Recall the above general remark, however.
11
Of course, for n = 1 the n-photon realization coincides with the single-photon realization.
12
Concerning recent progress in detector technologies see (Rosenberg et al., 2005).
58 CHAPTER 3. PHYSICAL REALIZATIONS OF QUANTUM GATES
s s
≡
π H h H
is nonlinear in the sense that — contrary to the action of linear optics components
— the modes are are not transformed independently of each other.
then the CPHASE gate can be easily implemented by proper use of linear optical
components like the Hadamard beam splitters (with deflecting mirrors) charac-
terized in Figure 3.2.
One would like to realize the necessary NS gates by means of optical nonlinear-
ities. Unfortunately, sufficiently strong nonlinearities of crystals are accompanied
DRAFT, October 17, 2007
13
See (Sanaka et al., 2003) for an experimental realization.
14
The gate is non-linear in the sense that its action cannot be reduced to a linear transformation
of the modes â .
15
The modes âν,µ are assumed to differ only by vertical translation and to describe photons with
(almost) sharp momenta.
3.1. QUANTUM OPTICAL IMPLEMENTATION 59
â.....1,0
.................... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ...................
......... .........
â1,1
.. ....
..... .......... ...... ..... ..... ..........
..... ....
.........
......... ..... ..... ............ ...... ..... NS ..... ..... ........................ ..... ..........
..... ....
.........
.......... ..... ..... ................ .....
..... ..... . ..... ..... .
..
.......................................
.......................................
....................................... ..
.......................................
.......................................
.......................................
..... ..... . ..... ..... .
â 2,1
.......................................
.......................................
.......................................
..... ....
.......................................
.......................................
.......................................
..... ....
. . ..
..
..... .......... ..... ..... ..... ..... ..... .......... ..... ..... ................... .....
........ NS ........
.. .
..... ..... ............. ..... .......
.. .......... ..... ..... ................. .....
........
â2,0
..... .................... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... .........................
..........
α |0i
......
α |0i
..... ............... ...... ..... ........ ...... ..
. .......... ..... .....
..... .....
..... ....
.......
............ .....
.....
........
. ..... .....
..... .....
..... . .....
.... .....
..... .....
..... .....
..... ..... ..... .....
..........................
.......................... .. ..........................
......................... ..
..........................
.......................... .... .... .... ....
..........................
.........................
. ..... . .....
.... ....
..... .....
..... .....
.
..
. ..... ..
.. .....
. .
........... .....
.....
.........
β |1i
...... ...
.....
.....
.......
.....
......
.... β |1i
......... ................ ..
..... ............... .. ...
by too strong absorption and therefore are not suitable. A way out may eventu-
ally be provided by electromagnetically induced transparency16 (EIT), discussed in
Section 8.3.2 of (Lücke, nlqo).
NSx
..... ......................... ..... ..... ..... ...
ϕ4 ..... ..... ..... .............................. ..... ..... . ..... . .....
..
....... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ...................... ..
.... .....
.....
..... .....
.....
....... ....
.........
...... ............
..... ..... .
.
..... ....
.
.... .
′ † .....
..... .....
.....
(â ...)....... Ω . .........
......... .
.....
..................
.......... .....
.....
.....
ϑ .
2 . ..... ..... ..
...
ϕ 2 ..... ..
. ...
....
D
.
1
..... .... .
...... ..... ......
................. ..... . ...............
..... .
.... ..
.. .
.....
..... ....
.
................ .....
..... .......... ..... .....
.....
..... ....... ..
..... .....
.
.....
..... .... ..... .....
.
..... .... ..... .....
..... .
..... . .... ..... .....
ϑ 1
........
...
.....
ϕ 1 ϑ .
3 ..... .... ..... ... ϕ
3
..... . ..
.... .....
..... ..... .....
..... ...
. ...... .....
............... ............... .....
...... .
.. ..... ........
..... .
.... ........
...... .
..... ..... ..... ....
..... .....
.
..................
..... 2
.....
D
.....
..
if successful, can be implemented18 as sketched in Figure 3.5. According to (Knill et al., 2001,
Fig. 1) these gates act successfully iff a single-photon state is detected by D1 and
the vacuum state is detected by D2 . For
◦
ϕ1 0
ϑ1 +22.5 ϕ 0
2
ϑ2 = 65.5302◦ and =
ϕ3 0
ϑ3 −22.5◦
ϕ4 180◦
we have x=-1 and the probability of success is 0.25. For
◦
ϕ1 88, 24◦
ϑ1 +36, 53 ϕ −66, 52◦
2
ϑ2 = 62.25◦ and =
◦ ϕ3 −11, 25◦
ϑ3 −36.53
ϕ4 102, 24◦
we have x=i and the probability of success is 0.18082.
The essential observation, due to (Gottesman and Chuang, 1999), is the equivalence
s ⌢
/
B
s ⌢
/
Φ+
h π s s
≡ ,
(3.9)
h π π π
Φ+
s ⌢
/
B s ⌢
/
where
s H
B ≡
h
is the inverse of the Bell network and Φ+ the state defined in 1.2.2. This equivalence
is obvious from the discussion of quantum teleportation in 1.2.2 and, thanks to
s s
h s ≡ s h
π π π
s ⌢
/
B
s ⌢
/
Φ+
s π h π s
≡
π h π π π .
Φ+
s ⌢
/
B s ⌢
/
Therefore:
If the auxiliary 4-qubit state
(4) def
ΦB = 1̂ ⊗ CPHASE ⊗ 1̂ (Φ+ ⊗ Φ+ )
is available then the (deterministic) CNOT gate can be replaced by ap-
propriately modified double quantum teleportation.
DRAFT, October 17, 2007
20
See also (Brukner et al., 2003) in this connection.
62 CHAPTER 3. PHYSICAL REALIZATIONS OF QUANTUM GATES
(4)
If ΦB can be stored for later use21 then it is sufficient to have a nondeter-
(4)
ministic gate producing ΦB with nonzero probability from standard input. One
such possibility, obviously, is to replace the deterministic CNOT gates in the above
(4)
characterization of ΦB by nondeterministic ones, if the latter are available.
......
..... ........................ ..... ..... ..... ..... ................. ..... . .....
.
..... ..... ......
.
..... ....
..... .....
...
..... .. ..
.
........
.................................
..................................
.................................
... ...
..................................
.................................
..... ..
.....
..... .....
.
...
. ......
. .....
..... ........................ ..... .... ..... ..... ................. ..... . ....
......
Exercise 14 Consider a Hadamard beam splitter for the orthogonal modes â1 â2 ,
i.a a beam splitter acting as
1 1
â1 7→ √ (â1 + â2 ) , â2 7→ √ (â1 − â2 ) .
2 2
Show that the beam splitter, applied to the Bell states
1 1
Φ± = √ Ω ± â†1 â†2 Ω , Ψ± = √ â†1 ± â†2 Ω
2 2
in the corresponding Fock representation as sketched in Figure 3.6, acts as follows:
1 1
Φ± 7−→ √ |0, 0iF ± |2, 0iF − |0, 2iF ,
2 2
F
Ψ01 = Ψ+ 7−→ |1, 0i ,
Ψ11 = Ψ− 7−→ |0, 1iF .
..... ..... ........................ ..... ..... ..... ..... ..... ..... ..... .....
.......D1
..
...... .... .... .... .... .... .... .... ..................... . ....
..... .... ......
..... ...
.
....
..... ....
..... ...
..
...........
.......................................
.......................................
...
...
.. ...
.......................................
.......................................
.......................................
.......................................
..... ..
...
..... ....
....
.
..
..
( ..... .......................... π ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... ..... .....
π ..... ..... ..... ..... ..... ..... ........................ .....
.
.
Ψ01 .
.
resolving) detectors D1 , . . . , D2′ indicate that the common state of the first two qubits
as well as that of the last two qubits is a single-photon state.22 The ancillary states
Let â0 , . . . , â2n be pairwise orthonormal modes describing photons with (almost)
sharp momenta and prepare the first 2n ancillary qubits in the state
Xn j
Y Y2n
(n) def 1
Φtele = √ â†ν ↵ Ω ,
n + 1 j=0 ν=1 µ=n+j+1
(instead of Ψ01 ). Let F̂(n) be the linear operator on Hâ0 ,...,â2n characterized by
F̂(n) Ω = Ω and
(
−1
â for â ⊥ {â0 , . . . , ân } ,
F̂(n) â F̂(n) = √1
Pn −i k 2π
j (3.10)
n+1 j=0 e n+1 âj for â = âk , k ∈ {0, . . . , n} ,
where — as in Section 1.2.3 of (Lücke, nlqo) — we denote by Hâ0 ,...,â2n the smallest
closed subspace of Hfield that contains Ω and is invariant under â†0 , . . . , â†2n . Then,
as explained in connection with the single-photon simulation of n-qubit systems, the
transformation
−1
âν 7→ F̂(n) âν F̂(n) ∀ ν ∈ {0, . . . , 2n} (3.11)
can be implemented using by linear optics.
Since
j
Y j
Y n
X 2π
−1
F̂(n) âν F̂(n) = e+i ν l
n+1 ν â†lν
ν=1 (3.10) ν=1 lν =0
Xn Yj
2π
= e+i ν n+1 lν â†lν ∀ j ∈ {1, . . . , n}
l1 ,...,lj =0 ν=1
and
j
Y n
X j
Y 2π
−1
F̂(n) âν F̂(n) = e+i ν n+1 lν â†lν
ν=0 l0 ,...,lj =0 ν=0
X n j+1
Y 2π 2π
= e−i n+1 lν e+i ν n+1 lν â†lν ∀ j ∈ {0, . . . , n − 1}
l1 ,...,lj+1 =0 ν=1
X n j+1
Y −i 2π ′ 2π ′
= e l
n+1 ν e+i ν n+1 lν â†lν′ ∀ j ∈ {0, . . . , n − 1} ,
l0′ ,...,lj′ =0 ν=1
we get
(n)
F̂(n) α 1̂ + β â†0 Φtele
Y
2n Y
n
1
= √ α â†ν Ω + β F̂(n) â†ν Ω
n+1 ν=n+1 ν=0
n
X n
Y N j 2n
Y
+α λN0 ,...,Nn â†j â†ν Ω (3.13)
N0 ,...,Nn =0 j=0 ν=n+1+N0 +...+Nn
0<N0 +...+Nn ≤n
n
X n
Y N j 2n
Y
2π
j †
+β λN0 ,...,Nn e−i n+1 âj â†ν Ω
N0 ,...,Nn =0 j=0 ν=n+N0 +...+Nn
0<N0 +...+Nn ≤n
• If
0 < N0 + . . . + N n ≤ n (3.14)
then the state is projected onto
Y
n
2π
ÂN0 ,...,Nn α 1̂ + β e−i n+1
j Nj
â†n+N0 +...+Nn B̂N0 ,...,Nn Ω,
j=1
66 CHAPTER 3. PHYSICAL REALIZATIONS OF QUANTUM GATES
where n
Y N ν
def
ÂN0 ,...,Nn = λN0 ,...,Nn â†ν ,
ν=0
2n
Y
def
B̂N0 ,...,Nn = â†ν .
ν=n+1+N0 +...+Nn
n
• The probability for (3.14) — thanks to unitarity of F̂(n) — is .
n+1
Qn 2π
Since the phase factor j=1 e−i n+1 j Nj is fixed by the measurement result, this shows:
With probability arbitrarily close to 1 the state α 1̂ + β â†0 Ω with un-
known α , β ∈ C can be teleported27 into α 1̂ + β â†n+N0 +...+Nn Ω with
random N0 , . . . , Nn fulfilling (3.14) resulting from — typically destruc-
tive — measurement of the corresponding photon numbers in the state
(n)
F̂(n) α 1̂ + β â†0 F(n) Φtele .
(n) (n)
where Ψtele is defined similarly to Φtele with modes âν replaced by modes b̂ν and
Ŝπ(ν,µ) means action of the CPHASE gate on the pair of Fock qubits corresponding
′
to the modes âν , b̂µ . Defining F̂(n) resp. Â′N0 ,...,Nn resp. B̂N
′
0 ,...,Nn
similarly to F̂(n)
resp. ÂN0 ,...,Nn resp. B̂N0 ,...,Nn with â-modes replaced by b̂-modes and
Y
n
def 2π
t̂α,β (N) = α 1̂ + β e−i n+1
j Nj
â†n+N0 +...+Nn ,
j=1
(3.15)
Yn
def 2π
t̂′α,β (N) = α 1̂ + β e−i n+1
j Nj
b̂†n+N0 +...+Nn
j=1
we get
′
F̂(n) F̂(n) α 1̂ + β â†0 α′ 1̂ + β ′ b̂†0 Ψ̌(n)
anc
2n
Y
(n) (n)
= Ŝπ(ν,µ) F̂(n) α 1̂ + β â†0 Φtele ⊗ ′
F̂(n) ′
α 1̂ + β ′ b̂†0 Ψtele
ν,µ=n+1
Therefore, if the numbers N0 , . . . , Nn , N0′ , . .. , Nn′ of photons in the modes â
0 , . . . , ân ,
′
b̂0 , . . . , b̂n are checked for the state F̂(n) F̂(n) α 1̂ + β â†0 α′ 1̂ + β ′ b̂†0 Ψ̌(n)
anc by pro-
jective measurement then:
• If
0 < N0 + . . . + Nn ≤ n and 0 < N0′ + . . . + Nn′ ≤ n (3.16)
then the state is projected onto a state with the factor
2n
Y
def
Ψout = Ŝπ(ν,µ) tα,β (N) t′α′ ,β ′ (N′ ) Ω
ν,µ=n+1
′ ′
= Ŝπ(n+N0 +...+Nn ,n+N0 +...+Nn ) tα,β (N) t′α′ ,β ′ (N′ ) Ω
which may be easily transformed, using only linear optical components, into
the desired output
Ŝπ(0,0) α 1̂ + β ↠α′ 1̂ + β ′ b̂† Ω .
â†1 ...Ω
........ ..... ...... ..... ..... ..... ..... ..... ..... ..... ..... ..... .................... ..... ..... ..... ..... ..... ..... ..... ..... ..... ......
1
...... ..... ..... ..... ..... ..... ................ .
... .....
..... ..... ..... .....
..... ..... .. ....
.
...... ... .
............... .. ............. ...
..... ......... .. .........
..... ...... .... ......
..... ..... ..... .....
.....
.....
..... ..... ..... .....
.. .... . ....
◦............... . ◦ ◦.... ........... . ◦
+45 90
.....
..... .
..... NS
...... ..................... ..
i
..... ..................... .......
..... −45 .
..... ..... 90 2
.... ..... .... .....
.....
....
. .
............. ....
. ..... ..... ..... ..... ..... .................... .
..... .....
............... .............
..
.... ............. ..... ....
.
..... ... . . . .
.. .. ..... . . .
.......
.....
..... ..... ..... ..... .....
..... .... ....
. ..... .....
◦ .............. . ◦ ◦.... ........... . ◦
+45 0
..... ..... −45 ..... ..... 0 .
.
........
.......
.. .....
.....
..... ..... ..... ..... ..... .....
..... ..... ..... ..... . ..... .....
...
........... . . .
.. .
...............
..... ...
.
............
.. .. . .
.........
..........
...
.. .....
3
.....
..... .................... ..
..... ..... ..... ..... .....
..... ..... ..... ....
. .....
ϑ . ◦ .
.
.
......
..... .. ...
.....
0..
. .
NS
...... .................... .. . .
..... ................. ....
i ...
..
.....
..... .....
.....
..... ..... .....
........ .....
.
.
..
.. .
... .....
.
.
.. ...............
......
. ..... ...
. .....
.
. .
................. ....... .............. .....
â†4 ...Ω
.. ........ .... .....
.....
........ ....
.
.........
. ....
.....
...... ..... ..... ..... ..... ..... ..... ..... ................... ..... ..... ..... ..... ..... ..... ..... ...... .
.. .
.. ..... 4
....... ..... ..... ..... ..... ................... .
... .
(2)
Figure 3.8: Preparation of Φtele
• The total state of all the qubits is suitably prepared using easily implementable
deterministic gates and indeterministic gates, the latter acting only on the
ancillary qubits.
• Then the desired output state can be transported onto the output-qubits using
only (photon number) measurements and applying some easily performable
final correction depending on the measurement results.
Meanwhile it turned out that for every n-qubit gate (n ∈ IN) and standard input
state the corresponding output state can be efficiently produced,29 e.g., as follows
(Childs et al., 2005; Walther et al., 2005; Nielsen, 2005):
1. Prepare a n×m-qubit cluster state30 with sufficiently large m in the following
way:
DRAFT, October 17, 2007
28
See also (Browne and Rudolph, 2004; Rudolph and Virmani, 2005; Varnava et al., 2005;
Raussendorf, 2005) and (Lim et al., 2004).
29
Concerning the preparation of explitly known states see (Kaye and Mosca, 2004).
30
We use the notion cluster state in a more general sense than originally introduced in
(Raussendorf and Briegel, 2001; Raussendorf, 2003).
3.2. MEASUREMENT-BASED QUANTUM COMPUTATION 69
(b) Join all horizontally neighbouring qubit states and certain vertically neigh-
bouring qubit states, depending on the effective network action desired,
by lines respecting the rule that every state attached to a vertical line
should have only one neighbour attached to a vertical line. Writing
l
νµ instead of |+iνµ
as an example for n = 3 , m = 5 .
(c) For every (horizontal or vertical) line (bond) apply a CPHASE gate to
the pair of qubits connected by the line.
2. Once the cluster state is prepared certain projective single qubit measurements
are performed on the qubits corresponding to the first row (qubits 11, . . . , n1).
3. Once the qubits of the ν-th column have been tested certain projective sin-
gle qubit measurements, depending on the outcome of the previous measure-
ments31 (and the final output desired), are performed on the qubits corre-
sponding to the (ν + 1)-th column.
4. When the measurements on the m − 1-th column are performed the n-qubit
system corresponding to the m-th column is left in the desired output state up
to known single-qubit transformations depending on the results of the previous
measurements.
5. The deviation from the desired output state may be either corrected or may
be taken account of by appropriate change of the computational basis.
DRAFT, October 17, 2007
31
Measurements the outcome of which determine the choice of subsequent measurements are
called feed-forwardable.
70 CHAPTER 3. PHYSICAL REALIZATIONS OF QUANTUM GATES
I. Single-bond operations: E.g. for the case sketched in Figure 3.9 the
two teleportations (measurements of N0 , N1 , N2 resp. N0′ , N1′ , N2′ ) are at-
tempted one after the other.
.................. .................. .................. .................. ......
...... .........
... ... ... .. ... ... ... ... ..
..... ..... ..... ..... .... ..
... .. ... ... ... .. ... ... ..
.................. .................. .................. .................. ....
.................
.. .. .. .........
........ .......... ........ .......... ........ .......... ..... .......
... ... ... ...
....
...
..
..
..................
....
...
..
..
..................
....
A
...
..
....... ..........
..................
C ..
..
..................
.
The teleportation that does not affect A is tried first. If it does not suc-
ceed one has to restart with a newly prepared qubit C . If it does succeed
then the second teleportation is tried. If the latter also succeeds C is
added with a bond to A . If it does not succeed then a projective single-
qubit measurement w.r.t. the computational basis has been performed
on A and this qubit has to be removed from the cluster and single-qubit
correction have to be performed on the qubits connected to A (for the
sketched special case only one) depending on the measurement result
indicated by the corresponding detectors. As soon as the size of the
cluster has been changed by this procedure we say that a single-bond
operation has been performed. Thus:
A single-bond operation adds resp. removes a qubit with prob-
ability 2/3 resp. 1/3.
II. Double-bond operations: E.g. for the case sketched in Figure 3.10 one
first try to connect D to C by a single-bond operation. If this adds D
to the cluster we apply CZ4 /9 to the pair B, D . If the corresponding
teleportation not affecting B fails then D has to be removed from the
cluster and we have to restart with a newly prepared qubit D . If the
first teleportation succeeds also the second teleportation is tried. If the
DRAFT, October 17, 2007
32
Moreover, such schemes circumvent the problem of programmable deterministic quantum gate
arrays (Nielsen and Chuang, 1997).
3.3. COLD TRAPPED IONS 71
.................. .................. .................. .................. ..................
... ... ... ... ... ... ... ... ... ...
.... .... .... ..... .....
... ... ... ... ... ... ... .. ...
.
.................. .................. .................. .................. ....
................
In order to create the cluster, after every double-bond operation that removed a
qubit a single-bond operation can be applied. Then:
1. • Qubits are identified with ions of some specified kind being in a superposi-
tion of two specified (at least) metastable energy eigenstates |gi resp. |ei
representing the computational basis states |0i resp. |1i . Typically, |gi
is the ground state.
• The ions are bound to specified places inside an ion trap and their col-
lective oscillation is cooled to the quantum mechanical ground state.
3. The decoherence time is of the order 10−1 seconds while the duration of gate
operations is of the order 10−14 seconds.36
|gj1 i|0iosc −
7 → |gj1 i|0iosc ,
(3.17)
|ej1 i|0iosc −7 → −i |gj1 i|1iosc .
(ii) A second laser pulse on the target qubit (Ion j2 ) — tuned to the
transition of |gi into an exited energy eigenstate |ěi different from
|ei — acts for b ∈ {0, 1} according to
(iii) A third pulse of the same type as used in (i) acts according to
|gj1 i|0iosc −
7 → |gj1 i|0iosc ,
(3.19)
|gj1 i|1iosc −7 → −i |ej1 i|0iosc .
These laser pulses have no effect if the control qubit (Ion j1 ) is originally
in the state |gj1 i. On the other hand, if the control qubit (Ion j1 ) is
originally in the state |ej1 i then the action is as follows:
DRAFT, October 17, 2007
36
See, e.g. (Nielsen and Chuang, 2001, Fig. 7.1) for a comparison with other implementations.
3.3. COLD TRAPPED IONS 73
...
. ...... .....
....... ..................... ...............
z
....
.. ... ............
.......................... .. ....................
... .... . ...... ........... .........
.... .... .... .... ..... . .
.....
.....
. . ... ..
..... ........................................................................................................................................................................................................................................................................................... ........ .......... ....... ....
. . .. ...
...
. .... ... ..
................................ ... ...
.... .
.............................................................................................................................................................................................................................................................................................. ... ...
...
...
.. ..
. ... ... .. . ...
. . . . .. .. . ..
... .... ... ..
. .
. ..
..
.
.......
.
. ..
. ..
. ... ..
.. ... ..... .. ..
.
....
..
..
.
....
..
.
..
. ..
..
...
..
...
...
.. ....
......
.. .
.....
.
y ..
.
.
.
.
..
.
.
.
.
...
...
. .. ...
...
..
..
..
..
.. . . ..
... ... .. .
..
.
..
... .. ..
..... .
.. . . .
.. .. ....
....... ..... ...
...
...
.. . . ..... ... ...
. .
. . ... . .. . .. . . . . . .......................
... .. .... . .. .. . .
.... ....
... ... ... ..
..
. .
. .
.
.. .... ..... .. . .. ..
..... ....
.. ..
..
...
..
..
...... ..
.
. ............................................................................................................
.
... ..
. .. .. .. ..... .. ... ..
... ..
..
..... ...
.. .
. ..
......
. ..
.
. ..... . ..
.. .. .. .. .. ..
. .. .. ... ..... ..
..
... ..
.... ... .. . ...
...... .
. .. ..
..
.. .. .. . ..
..... ..
. ...
..
..
. ..
.
... .. ..
.....
. . . ...
.......... .
.. ..
.
.... ...
..
...
...
...
... .
..
.
..
.
.
..
.
..
..
..
.
....
.
..
.
....
.
..
.
.
..
.
..
.
.
...
...
..
x .
.
.
.
.
.
.
.
.
.
.
..
..
..
... ...
..
.
... .... ... .. ...
... ... ..... . .. ..
... ......................................................................................................................................................................................................................................................................................... .... ..............
.. .. .. .. ..
..
.. ... .. .. .. .. ...
..
... .. ..
..
.. .
. .. .. ..
. . . ...
. .
.
... ... ... ...............
.. ... ..... .. ... ...
..
.. ... .
.. .. ........ ..
.. .. ... ...
... ... .. ... . ... ..
.. .. ...
.. .
. ..
. ..
. ... .
. ... ..
.
.. ... . . .. ... . .
.. ..
.
... .
.. ... ..
...
.. ... ...
..
... ... .. ..
... .. ... ..
... .. .. .. .. ..
...
... ... .. .. ...
.
.. .................
. .. . ... ..
. ...
.
... ... ... .
. ... .. .
..
...
.... ... .... ... .... ... ... ...
.... ...
.... .... ....
......................... ... ....
.... .... ... ...
..... ....
..
. . ..
.... . .. .... .....
..
....
. . ... .... . .......
...... . . .
. ...... .. . .
....... .............................. ............. ....... ................................................
.. ....... ..
– The first pulse transfers this information into the data bus by exciting
it to |1iosc and applies −i σ̂1 to the control qubit.
– Then the second pulse multiplies the |gj2 i-component of the target
qubit’s state by −1.
– Finally, the third pulse returns the data bus into its ground state and
acts on the |gj2 i-component of the control qubit’s state by −i σ̂1 , once
more.
Obviously, the resulting action is that of a Λ1 Ŝπ gate.
All this will be explained in more detail — for the special case37 of 40
Ca+ ions in a
linear Paul trap — in the subsequent sections.
and two ring electrodes (end caps). The electric potential of the rod electrodes
along C1 and C3 is38 Φ(t) while the rod electrodes C2 and C4 are grounded. Both ring
electrodes have the constant electric potential Φring > 0 .
since this fulfills the Laplace equation as well as the boundary conditions along
the rods. If
q Φ0
ÿ(t) + cos(Ω t) y(t) = 0 , (3.21)
m r02
q Φ0
z̈(t) − cos(Ω t) z(t) = 0 , (3.22)
m r02
ẍ(t) = 0 .
DRAFT, October 17, 2007
38
Note that static electric potentials cannot have minima in regions free of electric charge.
39 Ω
In the Innsbruck experiment: Φ0 ≈ 300 − 800 V , , r0 ≈ 1.2 mm .
2π
3.3. COLD TRAPPED IONS 75
With
def 2 q Φ0 def Ωt
b= , ζ = (3.23)
m r02 Ω2 2
equations (3.21) and (3.22) become equivalent to the special cases
!2
d
y(ζ) + 2 b cos(2 ζ) y(ζ) = 0 , (3.24)
dζ
!2
d
z(ζ) − 2 b cos(2 ζ) z(ζ) = 0 (3.25)
dζ
with general integration constants λ± (to be adapted to the initial conditions) and
certain constants C2n and µ depending an a, b . We are interested in stable solutions,
only, and therefore have to require
µ = iβ , β ∈ IR .
Then X
y(ζ) = C2n λ1 cos (2n + β) ζ + λ2 sin (2n + β) ζ , (3.27)
n∈ZZ
where
def
λ1 = λ+ + λ− , λ2 = i (λ+ − λ− ) .
Inserting this into (3.26) gives the recursion formula
a − (2n + β)
C2n+2 − C2n + C2n−2 = 0 . (3.28)
b
Defining
def C2n def def
G2n = , A = λ1 C0 , B = λ2 C0
C0
and exploiting the well-known theorems for sin and cos we can rewrite (3.27) in the
equivalent form
y(ζ) = Y + (ζ) + δy (ζ) ,
DRAFT, October 17, 2007
40
See (Ghosh, 1995, Section 2.3).
76 CHAPTER 3. PHYSICAL REALIZATIONS OF QUANTUM GATES
where:
def
Y ± (ζ) = A cos(β ζ) ± B sin(β ζ) ,
∞
X
def
δy (ζ) = Y + (ζ) (G2n + G−2n ) cos(2nβζ) − Y − (ζ) (G2n − G−2n ) sin(2nβζ) .
n=1
where42 !1
def def q2 3
Xj = x̌j /γ , γ = . (3.33)
4πǫ0 m ωx2
For N ≤ 3 the solutions are easily determined:
N = 1 : X1 = 0 ,
q q
1
N = 2 : X1 = − 3 4
, X2 = + 3 14 ,
q q
5
N = 3 : X1 = − 3 4
, X2 = 0 , X3 = + 3 54 .
Of course, the distance between the ions is minimal at the center of the trap.
Numerical calculations show that
2.018
∆x̌min ≈ γ
N 0.559
(James, 1998). Therefore, in the Innsbruck experiment, the overlap of the ions’ wave
functions is negligible43 and the ions are individually addressable by laser beams.
DRAFT, October 17, 2007
42
For 40 Ca+ and ω2πx ≈ 700 kHz: γ ≈ 4.85 µm .
43
Recall Footnote 17 of Chapter 1.
78 CHAPTER 3. PHYSICAL REALIZATIONS OF QUANTUM GATES
Collective Oscillations
Near its minimum the potential (3.29) may be approximated as
N
def m 2 X
V̌ (x1 , . . . , xN ) ≈ V (q1 , . . . , qN ) = ωx Vjk qj qk ,
2 j,k=1
where
def
qj = xj − x̌j ∀ j ∈ {1, . . . , N } , (3.34)
!
def 1 ∂ ∂
Vjk = V (x1 , . . . , xN ) ∀ j, k ∈ {1, . . . , N } .
m ωx2 ∂xj ∂xk |x=x̌
Since the matrix (Vjk ) is positive and symmetric, there is an orthonormal system of
eigenvectors
Cl1
.
Cl = .. , l ∈ {1, . . . , N } ,
ClN
of this matrix in IRN with positive eigenvalues:
V11 ... V1N Cl1 Cl1
.. .. .. ω̌l 2 ..
. . . = . l ∈ {1, . . . , N } . (3.37)
ωx
vN 1 . . . VN N ClN ClN
PN
Proof: (3.35) directly implies k=1 Vjk = 1 and, therefore, (3.37) for l = 1 with
ω̌1 = ωx . On the other hand, we have
N
X N
X N
X
2 Xl 2 Xj
Vjk Xk = Xj + 3 − 3
(3.35) |Xl − Xj | |Xl − Xj |
k=1 j6=l=1 j6=l=1
XN
Xj − Xl
= Xj + 2 3
j6=l=1
|Xl − Xj |
N
X N
X
2 2
= Xj + 2 − 2
(3.31) |Xl − Xj | |Xl − Xj |
l=1 l=1
l<j l>j
= 3 Xj .
(3.32)
√
The latter implies (3.37) for l = 2 with ω̌2 = 3 ωx .
(1) (1) (2) (2)
Then q1 , . . . , qN is called the center of mass mode and q1 , . . . , qN the
breathing mode.
Of course, a more detailed description of the ions’ motion would require inclusion
of the modes describing radial oscillations.
Laser-Ion Interaction
In the following we assume that all the ions are 40 Ca+ ions. Moreover we select a
special mode âˇl (typically l = 1 or 2) as data bus. All other modes are assumed
0
cooled into their ground state and will not be included in the description. The
Hamiltonian describing the collective motion of all ions the the internal state of the
j-th ion not interacting with an external electromagnetic field then is
ˇ† â
h̄ ω̌l0 â ˇ 1
Eej |ej ihej | + Egj |gj ihgj |
l0 l0 + 2
+ ,
| {z }
Eej −Egj Eej +Egj
= 2
(|ej ihej |−|gj ihgj |)+ 2
(|ej ihej | + |gj ihgj |)
| {z }
=1̂int
where Eej resp. Egj is the energy level of the qubit state |ej i resp. |gj i . This
Hamiltonian describes the same time evolution as
def h̄ ω0j ˇ† âˇ
Ĥ0j = − σ̂3j + h̄ ω̌l0 â l0 l0 , (3.51)
2
where
Eej − Egj
def def
ω0j = , σ̂3j = |gj ihgj | − |ej ihej | . (3.52)
2 h̄
(3.52) will be used in the following. We assume the laser radiation to be strong
enough for the exterior field formalism to be adequate (see, e.g., Sections 7.1.1
and 7.2.1 of (Lücke, nlqo) in this connection). Interaction with the classical laser
radiation will be described in the dipole approximation 45 by adding
def
V̂j = −qel r̂j · E (x̂j , 0, 0) t ,
where
def
qel = ( electric charge of the valence electron ,
def observable of the valence electron’s
r̂j =
position relative to the center of the ion ,
def
E(x, t) = external electric field at position x and time t .
We assume that the exterior field is of the form
E(x, t) = E0 e−i(ωL t−kL ·x+φ̌) + e+i(ωL t−kL ·x+φ̌) . (3.53)
DRAFT, October 17, 2007
45
In the quadrupole approximation we would have to add
′ def ′
V̂j = −qel r̂j · (r̂j · ∇r′ ) E(x , t) .
|r′ =(x̂
j ,0,0)
82 CHAPTER 3. PHYSICAL REALIZATIONS OF QUANTUM GATES
Replacing r̂j by
1̂int r̂j 1̂int = (|gj ihgj | + |ej ihej |) r̂j (|gj ihgj | + |ej ihej |)
def − def
σ̂j− = reg,j =
def
σ̂j =
z }| { z }| { z }| {
= hgj | r̂j ej i |gj ihej | + hgj | r̂j ej i |gj ihej |
we get
ˇ†
ˇl +â
−i ωL t−ηl0 j â +φj
†
reg,j σ̂j+ σ̂j− 0 l
V̂j = −qel + (reg,j ) · E0 e 0
+i ωL t−ηl0 j â ˇ†
ˇl +â +φj
0 l
+e 0
,
where s
def h̄ def
η l0 j = kL1 , φj = φ̌ − kL1 x̌j .
2m ω̌l0
In the interaction picture (see, e.g., Section 7.1.1 of (Lücke, nlqo))the time evolution
is determined by
i i
V̂jI = e+ h̄ Ĥ0j t V̂j e− h̄ Ĥ0j t
instead of Ĥ0j + V̂j . Using the Campbell-Hausdorff formula,46 here in the form
i i
e+ h̄ Ĥ0j t V̂j e− h̄ Ĥ0j t = exp ad i Ĥ0j t V̂j ,
h̄
and
ˇ† ]− = +h̄ ω̌l â
[Ĥ0j , â ˇ† ,
l0 0 l0
ˇl ]− = −h̄ ω̌l â
[Ĥ0j , â ˇl ,
0 0 0
h̄ ω 0j
[Ĥ0j , σ̂j± ]− = [σ̂3j , σ̂j± ]−
2
= ±h̄ ω0j σ̂j± ,
we get47
!
ˇl e−i ω̌l0 t +H.c. +φj
−i ΩL t−ηl0 j â
V̂jI = −qel reg,j · E0 σ̂j+ e+i ω0j t + H.c. e 0
+ H.c. .
where49
def 2
λj = − qel reg,j · E0 e−i φj . (3.54)
h̄
Using the Baker-Hausdorff formula 50
h i h i 1
Â, [Â, B̂]− = B̂, [Â, B̂]− = 0 =⇒ eÂ+B̂ = e− 2 [Â,B̂]− e eB̂ (3.55)
− −
Therefore, if
ωL − ω0j = k ω̌l0 , k ∈ ZZ , (3.56)
then the rotating wave approximation becomes
µ
ν
ˇ†
â ˇl
h̄ − 1 η2 X∞ l0 â 0
V̂jI ≈ λj σ̂j+ e 2 l0 j (i ηl0 j )µ+ν e+i (µ−ν−k) ω0j t + H.c.
2 µ,ν=0 µ! ν!
For sufficiently small λj non-resonant transitions and hence terms with µ−ν −k 6= 0
may be neglected. Then we may use
h̄ + ˇ† |k| ˇ ˇ† ˇ
λj σ̂j âl0 F̂ k (âl0 âl0 ) + H.c. for k ≥ 0 ,
V̂jI = 2 (3.57)
h̄ ˇ ˇ† ˇ ˇ |k|
λj σ̂ + F̂ k (â âl ) âl
j l0 + H.c.
0 0 for k ≥ 0 ,
2
where ν ν
∞ ν ˇ†
â ˇl
â
ˇ ˇ† ˇ def − 21 ηl20 j X l0 0
F̂ k (â l0 âl0 ) = e (i ηl0 j )|k| −ηl20 j . (3.58)
ν=0 ν! (ν + |k|)!
DRAFT, October 17, 2007
49
In the quadrupole approximation (recall Footnote 45) we have to add
2 D E
def
λ′j = − qel ej (r̂j · E0 )(r̂j · kL ) gj .
h̄
50
For operators in finite dimensional vector spaces (3.55) may be proved as follows: Since
λÂ
e B̂ e−λ and exp adλ B̂ fulfill the same first order differential equation and initial condition
(for λ = 0), the Campbell-Hausdorff formula (3.12) holds for arbitrary  , B̂ . Therefore, also
def
f1 (λ) = eλ Â eλ B̂
and 2
f2 (λ) = e (
def λ Â+B̂ )+ λ2 [Â,B̂ ]
−
fulfill the same first order differential equation and initial condition (for λ = 0), if the l.h.s. of
(3.55) holds, and hence f1 = f2 .
84 CHAPTER 3. PHYSICAL REALIZATIONS OF QUANTUM GATES
and inserting
σ̂j+ = |ej ihgj |
finally yields
∞
h̄ X n,k n,k †
V̂jI = Ωn,k n,k
j Âj + Ωj Âj , (3.59)
2 n=0
with (
def |ej ihgj | ⊗ |n + |k|iosc oschn| for k ≥ 0 ,
Ân,k
j = (3.60)
|ej ihgj | ⊗ |niosc oschn + |k|| for k ≤ 0 ,
and
s
n!
def − 21 ηl2 |k|
Ωn,k
j = λj e 0j (i ηl0 j ) L|k| η 2
, (3.61)
(n + |k|)! n l0 j
!
def
n
X (−x)ν n+α
Lαn (x) = (generalized Laguerre polynomials) .
ν=0 ν! n−ν
and
ν ν+|k| s
∞
X ˇ†
â ˇl
â
ν l0 0 n!
(−c) |n + |k|iosc oschn + |k|| = L|k| (x) |niosc oschn + |k|| .
ν=0
ν! (ν + |k|)! (n + |k|)! n
Since ν ν † † †
ˇ† ˇl ˇ â ˇ ˇ ⡠ˇ ˇ
âl0 â 0
= â l0 l0 âl0 l0 − 1 . . . âl0 âl0 − (n − 1)
(see Equation 1.63 of (Lücke, nlqo)), the first of these equations follows from
ν+|k| ν |k|
ˇ†
â ˇl
â |niosc = ˇ†
â n (n − 1) . . . n − (ν − 1) |niosc
l0 0 l0
q (n+|k|)!
= n (n − 1) . . . n − (ν − 1) n! |n + |k|iosc
(3.48)
s
n! (n + |k|)!
|n + |k|iosc for n ≥ ν
= (n + |k|)! (n − ν)!
0 else ,
3.3. COLD TRAPPED IONS 85
† ν+|k| !†
ν
= n + |k| â ˇ ˇl
â n |ni
osc l0 0 osc
s osc
n! (n + |k|)!
|niosc for n ≥ ν
= (n + |k|)! (n − ν)!
0 else .
where
e def n,k π
Φ k,j = arg Ωj = φj − |k| (3.63)
(3.61),(3.54) 2
and (
def |ej ihej | ⊗ |n + |k|iosc oschn + |k|| for k ≥ 0 ,
B̂jn,k =
|ej ihej | ⊗ |niosc oschn| for k ≤ 0 ,
(
def |gj ihgj | ⊗ |niosc oschn| for k ≥ 0 ,
Ĉjn,k =
|gj ihgj | ⊗ |n + |k|iosc oschn + |k|| for k ≤ 0 ,
|k|−1
X
|ej ihej | ⊗ |niosc oschn| for k ≥ 0 ,
def
D̂jn,k = n=0
|k|−1
X
|gj ihgj | ⊗ |niosc oschn| for k ≤ 0 .
n=0
51
Usually Ωn,k
j is called the Rabi frequency for the transition
|gj i ⊗ |n + |k|iosc ⇀
↽ |ej i ⊗ |niosc if k ≤ 0 ,
resp.
|gj i ⊗ |niosc ⇀
↽ |ej i ⊗ |n + |k|iosc if k ≥ 0 .
86 CHAPTER 3. PHYSICAL REALIZATIONS OF QUANTUM GATES
and therefore
Ânj 1 ,k Ânj 2 ,k = 0,
†
Ânj 1 ,k Ânj 2 ,k = δn1 n2 B̂jn1 ,k , (3.64)
†
Ânj 1 ,k Ânj 2 ,k = δn1 n2 Ĉjn1 ,k
and hence
t n,k n,k
n,k t
exp −i Ωj Âj + H.c. = 1̂ + 1 − cos Ωj B̂jn,k + Ĉjn,k
2 2
n,k t
−i sin Ωj Ân,k
j e−i φej + H.c. .
2
Inserting this into (3.65) yields (3.62).
Especially, we have
i I
e− h̄ V̂j t
∞
X t
= cos Ωn,0
j |ej ihej | ⊗ |niosc oschn| + |gj ihgj | ⊗ |niosc oschn| (3.66)
n=0 2
!
t
− i sin Ωn,0
j |ej ihgj | ⊗ |niosc oschn| e−i φj + H.c. for k = 0
2
and
i I
e− h̄ V̂j t
∞
X t
= cos Ωn,1
j|ej ihej | ⊗ |niosc oschn| + |gj ihgj | ⊗ |n + 1iosc oschn + 1|
n=0 2
!
n,1 t −i (φj −π/2)
− i sin Ωj |ej ihgj | ⊗ |niosc oschn + 1| e + H.c.
2
+ |gj ihgj | ⊗ |0iosc osch0| for k = −1 .
(3.67)
3.3. COLD TRAPPED IONS 87
This shows that a sufficiently large class of quantum gates may be implemented,
provided that the oscillatory modes can be cooled to their ground state.
a) The matrices ei σ̂1 ϕ and ei σ̂2 ϕ correspond to special 1-qubit rotations, for all
ϕ ∈ IR .
π π
b) e−i σ̂1 4 σ̂2 e+i σ̂1 4 = σ̂3 .
Fault Tolerant
Quantum Information Processing
89
Chapter 4
An open system is nothing more than one which has interactions with
some other environment system, whose dynamics we wish to neglect, or
average over.
4.1 Introduction
Quantum information theory deals with transmission and quantification of quantum
information. Roughly speaking, quantum information is the information carried
by n-qubit systems (n ∈ IN). Of the utmost importance for quantum information
— as opposed to classical information,1 — are:
2. The no-cloning theorem (Dieks, 1982; Wootters and Zurek, 1982; Peres, 2002):
There cannot exist any recipe for preparing any two or more systems
such that each of them carries the same quantum information as a
given quantum system — unless the state of the latter is completely
known, of course.
91
92 CHAPTER 4. GENERAL ASPECTS OF QUANTUM INFORMATION
Remark: There are several justifications for the no-cloning theorem,3 e.g.:
to all of H ⊗ H .
• Cloning would allow measurement of incommensurable quantum observables
— impossible according to quantum mechanics.
• Cloning would, by proper use of one of the available Bell sources, allow for
superluminal communication4 — impossible according to special relativity.
In the following, unless stated otherwise, we will always work in the interaction
picture and make extensive use of Dirac’s bra-ket notation.8 For simplicity, we
consider only finite-dimensional Hilbert spaces. This is sufficient for clarify-
ing the main points.
DRAFT, October 17, 2007
3
See (Werner, 2001, Section 2.3) for a detailed discussion.
4
See (Herbert, 1982). Similarly, joint measurability (without cloning) of non-commuting ob-
servables would enable superluminal communication.
5
On the other hand, the non-cloning theorem constitutes the basis for secure quantum cryp-
tography (see http://www.idquantique.com) and quantum passwords (Gu and Weedbrook, 2005).
6
We tacitly identify states with their density matrices or wave functions (if pure).
7
We have to consider open quantum systems since quantum information is prone to quantum
noise caused by interaction with the environment.
8
See, e.g., (Lücke, eine).
4.2. QUANTUM CHANNELS 93
n2
X †
= K̂α,β ρ̂′ K̂α,β ∀ ρ̂′ ∈ S(H1 ) (4.6)
α,β=1
If, from an ensemble in the state (4.2), those individuals are selected (by projective
ED
measurement of the environment) for which S2 is in the partial state ψα(2) ψα(2)
then (4.6) has to be replaced by12
n2
X †
C(ρ̂′ ) = K̂α,β ρ̂′ K̂α,β ∀ ρ̂′ ∈ S(H1 )
β=1
and
trace C(ρ̂) ≤ 1
is the relative number of individuals selected. In either case E is just a special
quantum operation:13
The elements of Q(H, H′ ) are called quantum operations and the K̂k in (4.7) are
called Kraus operators for C .
Remarks:
1. Note that15
0 ≤ trace C(ρ̂) ≤ 1 ∀ ρ̂ ∈ S(H1 )
| {z }
≥0
and that
N
X
K̂k† K̂k = 1̂ ⇐⇒ trace C(ρ̂) = 1 ∀ ρ̂ ∈ S(H1 ) .
k=1
1.
trace C(ρ̂) ≤ 1 ∀ ρ̂ ∈ S(H1 ) .
2.
C λ ρ̂1 + (1 − λ) ρ̂2 = λ C(ρ̂1 ) + (1 − λ) C(ρ̂2 ) ∀ λ ∈ [0, 1] , ρ̂1 , ρ̂2 ∈ S(H1 ) .
3.
(1 ⊗ C̄) |ΨihΨ| ≥ 0 ∀ Ψ ∈ H1 ⊗ H1 ,
where C̄ denotes the unique linear extension18 of C to all of L(H1 ) .
Outline of
n proof: Assume o that C fulfills the requirements 1–3. Choose an orthonor-
(1) (1)
mal basis φ1 , . . . , φn1 of H1 and defining
n1 D
X E
def
ψ∗ = ψ φ(1)
ν φ(1)
ν ∀ ψ ∈ H1 (4.9)
ν=1
we get D E D E
ψ ∗ φ(1)
ν = φ(1)
ν ψ ∀ ψ ∈ H1 , ν ∈ {1, . . . , n1 }
and hence19
n1 D
X ED E ED
C |ψihψ| = φ(1) ψ ψ φ(1) ¯ φ(1) φ(1)
C
ν µ ν µ
2. req.
ν,µ=1
Xn1 ED ED
= hψ |∗
φ(1) φ(1) ¯
⊗ C φν(1) (1)
φµ |ψ ∗ i
ν µ
ν,µ=1
= hψ ∗ | Â |ψ ∗ i ∀ ψ ∈ H1 , kψk = 1 , (4.10)
where
n1
X ED ED
Â
def
= φ(1) φ(1) ¯ φ(1) φ(1)
⊗C
ν µ ν µ
ν,µ=1 !
n1
X ED ED
= ¯
1⊗C φ(1) φ(1) ⊗ φ (1)
φ(1)
ν µ ν µ
ν,µ=1
| {z }
Pn1 (1) (1)
Pn 1 (1) (1)
= φν ⊗φν φν ⊗φν ≥0
ν=1 ν=1
Linear mappings from L(H1 ) into L(H2 ) are also called superoperators.
19
We use the notation explained in Footnote 11, with the roles of the tensor factors H1 , H2
interchanged.
4.2. QUANTUM CHANNELS 97
and hence
0 ≤ Â ∈ L(H1 ⊗ H2 ) .
3. req.
N
X
¯ |ψihψ| =
C hψ ∗ | |Ψk ihΨk | |ψ ∗ i ∀ ψ ∈ H1 .
k=1
XN
C |ψihψ| = K̂k |ψihψ| K̂k† ∀ ψ ∈ H1 , kψk = 1 .
k=1
By condition 2 this gives (4.7). The latter together with condition 1, finally, gives21
(4.8).
Conversely, conditions 1–3 are easily seen to be fulfilled for C ∈ Q(H1 , H2 ) .
Definition 4.2.1 and Lemma 4.2.1 describe the most general quantum operations.
Simple versions are, among others:
DRAFT, October 17, 2007
20
Here, we use the notation
′ + N D ′
N
X X E
(1) (2) def (1) (2)
hψ| ψj ⊗ ψj = ψ ψj ψj
j=1 j=1
1. Unitary transformations
Û = V̂ × V̂ ′ , V̂ unitary .
(2)
given, e.g., by (4.4) if there are ρ̂1 , . . . , ρ̂(2)
n1 ∈ S(H2 ) with pairwise orthogonal
23
supports and such that
(2)
Û P̂φ(1) ⊗ ρ̂(2) Û † = P̂φ(1) ⊗ ρ̂j ∀ j ∈ {1, . . . , n1 } .
j j
Example:24
Û = action of CNOT ,
S1 = control qubit ,
S2 = target qubit ,
ρ̂(2) = |0ih0| or |1ih1| .
where
K̂(j1 ,...,jr ) = P̂r,jr · · · P̂1,j1 ∀ (j1 , . . . , jr ) ∈ {1, . . . , n1 }r
with P̂k,1 , . . . , P̂k,n1 being the projectors of the k-th projective measurement.
Remark: Note that
n1
X †
K̂(j1 ,...,jr )
K̂(j1 ,...,jr ) = 1
j1 ,...,jr =1
but that, in general, the K̂(j1 ,...,jr ) are no longer projection operators.
Theorem 4.2.3 Let H1 and H2 be Hilbert-spaces and let K̂1 , . . . , K̂N , K̂1′ , . . . ,
K̂N ∈ L(H1 , H2 ) . Then
N
X N
X
K̂k ρ̂ (K̂k )† = K̂k′ ρ̂ (K̂k′ )† ∀ ρ̂ ∈ S(H1 ) (4.11)
k=1 k=1
iff there is a unitary N × N -matrix U jk with
N
X
K̂j′ = U jk K̂k ∀ j ∈ {1, . . . , N } . (4.12)
k=1
N
X
Ψk = Uk j Ψ′j ∀ k ∈ {1, . . . , N } ,
j=1
i.e. with
n
X n
X N
X
φν ⊗ K̂k φν = φν ⊗ Uk j K̂j′ φν ∀ k ∈ {1, . . . , N } .
ν=1 ν=1 j=1
This implies
N
X
K̂k φν = Uk j K̂j′ φν ∀ ν ∈ {1, . . . , n} , k ∈ {1, . . . , N }
j=1
The standard example, in case n1 > 1 , for a mapping C of S(H1 ) into S(H1 )
fulfilling conditions 1 and 2, but not 3, of Lemma 4.2.2 is the transposition 25
n1
X ED n1
X ED
(1) (1) def (1) (1)
ρ̂′ = ρj k φj φk 7−→ C(ρ̂′ ) = T(ρ̂′ ) = ρj k φk φj . (4.13)
j,k=1 j,k=1
n o
(1)
depending on the basis φ1 , . . . , φ(1)
n1 of H1 .
26
Recall (4.9).
27
These states are distinguished by their invariance property
†
Û ⊗ Û Ŵλ Û ⊗ Û = Ŵλ for all unitary Û ∈ L(H)
Outline of proof: Assume the first statement to be true. Then, using the polar
decomposition
q
+ †
K̂j P̂C = Ûj P̂C K̂j K̂j P̂C
√
= + aj Ûj P̂C (4.19)
and hence
P̂Ûj C P̂Ûk C = δjk P̂Ûj C . (4.21)
For
N
X †
R(ρ̂) def
= Ûj† P̂Ûj C ρ̂ Ûj† P̂Ûj C + P̂0 ρ̂ P̂0 ∀ ρ̂ ∈ S(H) , (4.22)
j=1
where
N
X
def
P̂0 = 1̂ − P̂Ûj C (4.23)
j=1
and thus
N
X
P̂0 C P̂C ρ̂ P̂C P̂0 = aj P̂0 Ûj P̂C ρ̂ P̂C Ûj† P̂0
(4.19)
j=1
= 0 ∀ ρ̂ ∈ S(H) ,
(4.21)
102 CHAPTER 4. GENERAL ASPECTS OF QUANTUM INFORMATION
this gives28
N
X †
(R ◦ C) |ψihψ| = P̂C Ûj† P̂Ûj C K̂k |ψi hψ| K̂k P̂Ûj C Ûj P̂C (4.24)
| {z }
j,k=1 √
= + ak Ûk |ψi
4.19)
(
| {z }
+
√
= δjk ak Ûk |ψi
( 4.21)
XN
= aj |ψihψ| ∀ψ ∈ C .
(4.20)
j=1
Since
N
X †
Ûj† P̂Ûj C Ûj† P̂Ûj C + P̂0† P̂0 = 1̂ ,
(4.21)
j=1
Finally, assume the third statement to be true. Then, by the spectral theorem,
there are a unitary matrix (ujk ) and real numbers a1 , . . . , aN with
N
X
u∗j ′ j aj ′ k′ uk′ k = aj δj,k ∀ j, k ∈ {1, . . . , N } .
j ′ ,k′ =1
31 √
We may add N − 1 zeros as Kraus operators to γ P̂C .
4.3. ERROR CORRECTING CODES 103
Remark: (4.19), (4.21), and (4.22) show how errors produced by C can
be corrected for the code C :
Perform a projective measurement w.r.t. the orthogonal sub-
spaces Ûj C and apply Ûj† according to the result of this ‘mea-
surement’.
Corollary 4.2.5 Let C be a linear subspace of the Hilbert space H and let K̂1 , . . . ,
K̂N resp. K̂1′ , . . . , K̂N′ be Kraus operators for C ∈ Q(H, H) resp. C′ ∈ Q(H, H) . If
(4.16) holds and if the K̂j′ are complex linear combinations of the K̂j then, with R
as constructed in the proof of Theorem 4.2.4, (4.17) holds also for C replaced by C′ .
hχ′ | Â ⊗ 1̂ |χ′ i = |α|2 h0| Â |0i + |β|2 h1| Â |1i if 35 hEj,k | Elm i = δjl δk0 δm0 .
In other words:
Now, for arbitrary vectors |Er i from the state space of the environment we have
3
X
σ̂r |0i ⊗ |Er i = |0i ⊗ |E0 i + |E3 i + |1i ⊗ |E1 i + i |E2 i (4.27)
r=0
and
3
X
σ̂r |1i ⊗ |Er i = |0i ⊗ |E1 i − i |E2 i + |1i ⊗ |E0 i − |E3 i , (4.28)
r=0
if
|E0,0 i = |E0 i + |E3 i , |E0,1 i = |E1 i + i |E2 i ,
|E1,0 i = |E1 i − i |E2 i , |E1,1 i = |E0 i − |E3 i ,
i.e. if
|E0,0 i + |E1,1 i |E0,1 i + |E1,0 i
|E0 i = , |E1 i = ,
2 2
|E0,1 i − |E1,0 i |E0,0 i − |E1,1 i
|E2 i = , |E3 i = .
2i 2
DRAFT, October 17, 2007
33 2 2
We assume that |α| + |β| = 1 and hE | Ei = 1 .
34
This is why open quantum quantum mechanical systems (Davies, 1976) do not evolve unitarily.
35
Consider, e.g., the simple example |Ei = |0i , |χ′ i = CNOT |χi.
36
Hence σ̂0 = 1̂ , σ̂1 = ¬
ˆ , σ̂3 = Ŝπ , σ̂2 = i σ̂1 σ̂3 .
4.3. ERROR CORRECTING CODES 105
(4.30) tells us that there are only three types of errors to be corrected, corresponding
to37 σ̂1 , σ̂2 , σ̂3 . In this sense the set of possible errors for single-qubit systems is
discrete.
More generally, a unitary operation of the state space of an n-qubit system and
its environment acts according to38
X X X E
λb |bi ⊗ |Ei 7−→ λb |b′ i ⊗ Eb,b′ , (4.31)
b∈{0,1}n b∈{0,1}n b′ ∈{0,1}n
E
where the Eb,b′ are suitable state vectors of the environment depending on |Ei
(and b, b′ , of course), but not on the λb . Now, from (4.27)/(4.28) we see that for
arbitrary states |Eb,b′ i of the environment there are vectors |Er i with
3
X X
σ̂r |bi ⊗ |Er i = |b′ i ⊗ |Eb,b′ i ∀ b ∈ {0, 1} .
r=0 b′ ∈{0,1}
E
Straightforward induction shows that for arbitrary state vectors Eb,b′ there are
corresponding state vectors |Er (b)i ; r ∈ {0, . . . , 3}n ; with
X X E
σ̂r |bi ⊗ |Er (b)i = |b′ i ⊗ Eb,b′ ∀ b ∈ {0, 1}n ,
n
r∈{0,1,2,3} b′ ∈{0,1}n
where
def
σ̂r = σ̂r1 ⊗ . . . ⊗ σ̂rn ∀ r ∈ {0, . . . , 3}n .
Together with (4.31) this shows that every unitary action on an n-qubit system39
and its environment is of the form
X X X
λb |bi ⊗ |Ei 7−→ λb σ̂r |bi ⊗ |Er (b)i , ∀ b ∈ {0, 1}n .
b∈{0,1}n b∈{0,1}n r∈{0,1,2,3}n
38
This is a simple consequence of linearity and the fact that the |bi form a basis of the n-qubit
state space.
39
We assume that the qubits are not destroyed. For instance, if a qubit is identified with an
atom in a superposition of its ground state and its first excited state, then exciting a higher level
destroys this qubit.
106 CHAPTER 4. GENERAL ASPECTS OF QUANTUM INFORMATION
and error correction for such quantum noise should be possible along the lines
indicated below.
where:
def
X̂b = (δ0b1 + δ1b1 σ̂1 ) ⊗ . . . ⊗ (δ0bn + δ1bn σ̂1 ) ,
def (4.34)
Ẑb = (δ0b1 + δ1b1 σ̂3 ) ⊗ . . . ⊗ (δ0bn + δ1bn σ̂3 ) .
To explain the essential idea of quantum error correction, let us assume that also
for multi-qubits systems only one-qubit errors corresponding to σ̂3 (phase errors)
occur. In order to conserve an unknown one-qubit state (disentangled from the
environment) we first of all encode
Ψ = α |0i + β |1i
Ψ̂ = α |ŵ0 i + β |ŵ1 i ,
where
def 1
|ŵ0 i = √ |0, 0, 0i + |0, 1, 1i + |1, 0, 1i + |1, 1, 0i (even parity)
4
(4.35)
def 1
|ŵ1 i = √ |1, 1, 1i + |1, 0, 0i + |0, 1, 0i + |0, 0, 1i (odd parity) .
4
This may be done in the following way:
α |0i + β |1i h
|0i H s h α |ŵ0 i + β |ŵ1 i .
|0i H s
h
α |0i + β |1i
α |ŵ0 i + β |ŵ1 i h s H |0i
s H |0i .
If the Estate vector of the total system (three-qubit system plus environment) is
Ψ̂⊗ Ê then, according to our assumption, the interaction between both subsystems
can cause only transitions of the form
E 3
X E
Ψ̂ ⊗ Ê 7−→ ˆ (ν) Ψ̂ ⊗ Ê3(ν)
σ̂ 3
ν=0
E
(ν)
with suitable state vectors Ê3 of the environment, where
ˆ (ν) |b1 , b2 , b3 i def |b1 , b2 , b3 i if ν = 0
σ̂ 3 = bν ∀ b ∈ {0, 1}3 .
(−1) |b1 , b2 , b3 i else
are pairwise orthogonal. Therefore, to restore the original encoded state vector
α |0i + β |1i, it suffices to perform an optimal test (measurement of first kind ) to
(ν)
which of the four subspaces Hν this state vector belongs and apply σ̂3 according
to the outcome.
s s ··· s
h ···
h ···
.. ..
. .
h
transforms λ0 |0i + λ1 |1i ⊗ |0, . . . , 0i into λ0 |0, . . . , 0i + λ1 |1, . . . , 1i and discuss
its possible use for error correction.
108 CHAPTER 4. GENERAL ASPECTS OF QUANTUM INFORMATION
Especially convenient are the [n, k] linear classical codes, for which a set C ⊂ {0, 1}n
of 2k code words — the code — is selected by means of an (n − k) × n-matrix Ĥ
as42 n o
def
C = ker(Ĥ) = b ∈ {0, 1}n : Ĥ b = 0 .
Of course, the n − k rows of the so-called parity check 43 matrix Ĥ have to be
independent in order to have
dim ker(Ĥ) = k .
Warning: The code C may contain transposed row vectors of the parity
check matrix Ĥ .
Exercise 18 The rows of the r × (2r − 1) parity check matrix characterizing the
so-called binary Hamming code Ham[r, 2] are the nonzero elements of {0, 1}r ,
ordered46 according to the value of the corresponding binary numbers.47
a) Show for every r ≥ 2 that Ham[r, 2] is suitable for correcting errors on single
bits.
b) Discuss Ham[2, 2] in detail.
Exercise 19 Let C be a [n, k] linear classical code with parity check matrix Ĥ and
generator Ĝ . Show the following:48
DRAFT, October 17, 2007
45
Note that, thanks to 1lk , the rows of Ĝ are all independent.
46
Actually, different orderings give rise to equivalent codes.
47
See (4.53) for r = 3 .
48
As usual, we denote the number of elements of a finite set C by |C| .
110 CHAPTER 4. GENERAL ASPECTS OF QUANTUM INFORMATION
b)
⊥
C⊥ =C.
c) (
X b·b′ |C| if b ∈ C ⊥ ,
(−1) =
0 if b ∈ {0, 1}n \ C ⊥ .
b′ ∈C
• The n-qubit state space H containing the quantum code words is a direct sum
of specified subspaces Hd .
• If σ̂, σ̂ ′ ∈ E are of the same type d then σ̂ |wi ∼ σ̂ ′ |wi holds for all quantum
code words |wi (but not necessarily for other state vectors).
• Since the ‘collapsed’ state is just the sent code word distorted by an error of
type d we only have to apply the inverse of some unitary error operation of
type d to reconstruct the correct code word.
Exercise 20
a) Show that for Shor’s 9-qubit code words
E
ˆ0 def
ŵ = 2−3/2 |0, 0, 0i + |1, 1, 1i ⊗ |0, 0, 0i + |1, 1, 1i ⊗ |0, 0, 0i + |1, 1, 1i ,
E
ˆ1 def
ŵ = 2−3/2 |0, 0, 0i − |1, 1, 1i ⊗ |0, 0, 0i − |1, 1, 1i ⊗ |0, 0, 0i − |1, 1, 1i
Recall that, according to (4.33), for every n ∈ IN the possible error n-qubit error
operations are elements of the Pauli group 52
n o
def
Sn = i ν X̂b1 Ẑb3 : ν ∈ {0, . . . , 3} , b1 , b3 ∈ {0, 1}n (4.36)
That the latter is a group w.r.t. operator multiplication follows immediately from
the algebra of Pauli matrices:
σ̂ν σ̂ν = 1̂ ∀ ν ∈ {0, 1, 2, 3} ,
σ̂j σ̂k = − σ̂k σ̂j ∀ j, k ∈ {1, 2, 3} , j 6= k ,
σ̂1 σ̂2 = i σ̂3 , (4.37)
σ̂2 σ̂3 = i σ̂1 ,
σ̂3 σ̂1 = i σ̂2 .
DRAFT, October 17, 2007
52
The X̂b and Ẑb were defined by (4.34) and (4.29).
112 CHAPTER 4. GENERAL ASPECTS OF QUANTUM INFORMATION
Moreover, assume
σ̂ ∗ σ̂ ′ ∈
/ N(SW ) \ SW ∀ σ̂, σ̂ ′ ∈ E , (4.43)
where N(SW ) denotes the normalizer of SW :
N(SW ) = {σ̂ ∈ Sn : σ̂ ĝ σ̂ ∗ = ĝ ∀ ĝ ∈ SW } .
Then there is a unique mapping dσ̂ from SW into {+1, −1} such that:
ĝ σ̂ Ψ̂ = dσ̂ (ĝ) σ̂ Ψ̂ ∀ ĝ ∈ SW , σ̂ ∈ E , Ψ̂ ∈ HW , (4.44)
n o
def
σ̂ HW ⊂ Hdσ̂ = Φ̂ ∈ H : ĝ Φ̂ = dσ̂ (ĝ) Φ̂ ∀σ̂ ∈ E , (4.45)
′
dσ̂ 6= dσ̂′ =⇒ Hdσ̂ ⊥ Hdσ̂′ ∀σ̂, σ̂ ∈ E , (4.46)
dσ̂ = dσ̂′ =⇒ σ̂ Ψ̂ = σ̂ ′ Ψ̂ ∀σ̂, σ̂ ′ ∈ E , Ψ̂ ∈ HW . (4.47)
Outline of proof: (4.44) is a direct consequence of (4.41) and (4.42). (4.44) directly
implies (4.45). Since53
ĝ = ĝ ∗ ∀ ĝ ∈ SW (4.48)
— and since eigenvectors corresponding to different eigenvalues of a self-adjoint op-
erator are always orthogonal — (4.44) also implies (4.46). Finally, (4.44) and (4.41)
imply
ĝ σ̂ (∗) = dσ̂ (ĝ) σ̂ (∗) ĝ ∀ ĝ ∈ SW , σ̂ ∈ E
and hence
∗ ∗
(σ̂ ∗ σ̂ ′ ) ĝ (σ̂ ∗ σ̂ ′ ) = dσ̂ (ĝ) dσ̂′ (ĝ) ĝ (σ̂ ∗ σ̂ ′ ) (σ̂ ∗ σ̂ ′ )
= dσ̂ (ĝ) dσ̂′ (ĝ) ĝ ∀ ĝ ∈ SW , σ̂, σ̂ ′ ∈ E .
(4.38)
Remarks:
σ̂ 6= σ̂ ′ =⇒ σ̂ ∗ σ̂ ′ ∈
/ SW ∀ σ̂, σ̂ ′ ∈ E .
Lemma 4.3.2 For j ∈ {1, 2} , let the Cj be a [n, kj ] linear classical codes with
C2 ⊂ C1 6= C2 , and define
1 X
def def
W = CSS (C1 , C2 ) = |ŵb i = q |b + b′ i : b ∈ C1 . (4.49)
|C2 | b′ ∈C2
where H denotes the n-qubit state space. Then (4.42) holds for
n o
SW = X̂a Ẑb : a ∈ C2 , b ∈ C1⊥ . (4.50)
114 CHAPTER 4. GENERAL ASPECTS OF QUANTUM INFORMATION
Then X X
1
Ψ̂ = Ẑ ′ λb |bi
(4.50) C1⊥ ′ ⊥ b
b ∈C1 b∈{0,1}n
X 1 X ′
= λb ⊥ (−1)b·b |bi
C1
bX
∈{0,1}n b′ ∈C1⊥
= λb |bi
Ex. 19
b∈C1
1 X X
= X̂b′ λb |bi
(4.50) |C2 | ′
X b ∈C 2 b ∈C 1
= λb ŵb .
b∈C1
Since, obviously,
Remarks:
σ̂ 6= σ̂ ′ =⇒ σ̂ ∗ σ̂ ′ ∈
/ N(SW ) ∀ σ̂, σ̂ ′ ∈ E (4.51)
holds for ( )
n n
X o
n ν
E = X̂e1 Ẑe3 : e1 , e3 ∈ b ∈ {0, 1} : |b | ≤ t . (4.52)
ν=1
with54
{e1 + e′1 , e3 + e′3 } 6= {0}
and ∗
σ̂ ∗ σ̂ ′ = X̂e1 Ẑe3 X̂e′1 Ẑe′3
= Ẑe3 X̂e1 +e′1 Ẑe′3
If e3 + e′3 =
6 0 then (e3 + e′3 ) · a 6= 0 mod 2 and, consequently,
∗
(σ̂ ∗ σ̂ ′ ) X̂a (σ̂ ∗ σ̂ ′ ) = −X̂a
for some a ∈ C2 since the generator of C2 is the parity check matrix of C2⊥ . On the
other hand, if e1 + e′1 6= 0 then b · (e1 + e′1 ) 6= 0 mod 2 and, consequently,
∗
(σ̂ ∗ σ̂ ′ ) Ẑb (σ̂ ∗ σ̂ ′ ) = −Ẑb
for some b ∈ C1⊥ . Thus σ̂ ∗ σ̂ ′ ∈
/ N (SW ).
55
In general, the number of operations
!
σ̂r affecting at most t ∈ {0, . . . , n} qubits
t
X n
of an n-qubit system is56 3j . Therefore, in order to correct all corresponding
j=0 j
errors for a nondegenerate n-qubit code according to the scheme described above,
that many subspaces Hd are needed. Moreover, the dimension of each of these
subspaces must not be smaller than the number of code words. Therefore:
Correction of all errors on at most t qubits of a nondegenerate n-
qubit code spanned by 2k orthogonal code words is not possible if the
quantum Hamming bound
t
!
X n j k
3 2 ≤ 2n
j=0 j
is violated.
Note that for k = t = 1 the quantum Hamming bound becomes 2 + 6n ≤ 2n , hence
n ≥ 5.
For further details on quantum codes see (Preskill, 01, Chapter 7), and (Schlingemann and Werner, 20
Schlingemann, 2001; Keyl and Werner, 2002).
DRAFT, October 17, 2007
54
Recall Footnote 42.
55
Recall (4.32).
56
The index j = 0 corresponds to the trivial error operation (unit operator).
116 CHAPTER 4. GENERAL ASPECTS OF QUANTUM INFORMATION
Exercise 21
a) Show that the code words corresponding to the parity check matrix Ĥ3 are
the same as those corresponding to the parity check matrix
0 1 1 1 1 0 0
Ĥ3′ =
def
1 0 1 1 0 1 0 .
1 1 0 1 0 0 1
b) Show that57
1 0 0 0 0 1 1
0 1 0 0 1 0 1
Ĥ4 =
def
0 0 1 0 1 1 0
0 0 0 1 1 1 1
is a parity matrix for Ham[3, 2]⊥ .
c) Show that
n o
Ham[3, 2]⊥ = b ∈ {0, 1}7 : Ĥ3 b = 0 , (−1)b1 +...+b7 = 1 .
According to Exercise 21, the quantum code words of the Steane code are
1
|ŵ0 i = √ |0000000i + |1101001i + |1011010i + |0111100i
8
+ |0110011i + |1100110i + |1010101i + |0001111i ,
(4.54)
1
|ŵ1 i = √ + |1111111i + |0010110i + |0100101i + |1000011i
8
+ |1001100i + |0011001i + |0101010i + |1110000i ,
Exercise 22 Show for (4.54) that the following network acts as indicated:
α |0i + β |1i h s
|0i H s h s
|0i H s s
|0i H s α |ŵ0 i + β |ŵ1 i .
h h h
|0i
h h h
|0i
h h h
|0i
|b1 i s |b1 i
|b2 i s |b2 i
|b3 i s |b3 i
|b4 i s |b4 i
|b5 i s |b5 i
|b6 i s |b6 i
|b7 i s |b7 i
|0i h h h h
E
|0i h h h h Ĥ3 b ,
|0i h h h h
where, e.g.,
s s s
.. def
.. ..
. ≡ . .
h h
h h .
The network of Exercise 23 may be used to reduce single-qubit errors of type σ̂1
or/and σ̂2 to those of type σ̂0 or/and σ̂3 :
118 CHAPTER 4. GENERAL ASPECTS OF QUANTUM INFORMATION
An ideal test for the computational basis of the last 3 (ancillary) qubits
causes the 10-qubit state to collapse into some state being the direct
product of
X
3
Exercise 24 Show that the following 10-qubit network flips the ej 23−j -th
j=1
qubit for input of the specified type with |e1 , e2 , e3 i =
6 |0, 0, 0i and, therefore, may
be used to avoid testing the error syndrome for single-qubit errors of type σ̂1 or/and
σ̂2 :
h
h
h
h
h
h
h
|e1 i c c c s s s s |e1 i
|e2 i c s s c c s s |e2 i
|e3 i s c s c s c s |e3 i
where
def def
c ≡ ¬
ˆ s ¬
ˆ , c ≡ ¬
ˆ s ¬
ˆ .
4.3. ERROR CORRECTING CODES 119
The eventually remaining single-qubit errors of only type σ̂0 or/and σ̂3 . may be
converted into errors of type σ̂0 or/and σ̂1 by applying ÛH⊗n . Correction these errors
as just described and applying ÛH⊗n once more restores the original message.
Up to now we tacitly assumed that all devices used for error correction work
perfectly error free. Of course this is unrealistic and, actually, special care has to be
taken to prevent these devices from making things worse.
For instance, if a phase error appears for the first ancillary qubit of the error
syndrome network presented in Exercise 23 then according to Exercise this error
may propagate into all of the last four data qubits. To prevent this one could use
s
s
s
s
|0i h h h h
|0i h s
|0i h s
|0i h s
instead of
s
s
s
s
|0i h h h h
def 1
Φ+ = √ (|0, 0i + |1, 1i) ,
2
def 1
Φ− = √ (|0, 0i − |1, 1i) ,
2
(4.55)
+ def 1
Ψ = √ (|0, 1i + |1, 0i) ,
2
def 1
Ψ− = √ (|0, 1i − |1, 0i)
2
form an orthonormal basis of H ⊗ H and may be locally transformed into each
other:63
Φ∓ = σ̂3 ⊗ 1̂ Φ± ,
Ψ∓ = σ̂3 ⊗ 1̂ Ψ± , (4.56)
Ψ+ = σ̂1 ⊗ 1̂ Φ+ .
Obviously, 2 classical bits of information may be encoded via the Bell states, e.g.:
b Φ+ ,
(0, 0) = b Φ− ,
(0, 1) = b Ψ+ ,
(1, 0) = b Φ− .
(1, 1) =
DRAFT, October 17, 2007
59
See (Lücke, 2002, Section 1.2.2) for the network models of dense coding, teleportation, and
entanglement swapping. See also (Devetak and Winter, 2003; Devetak et al., 2004) for related
protocols.
60
http://qpip-server.tcs.tifr.res.in/ qpip/HTML/Courses/Bennett/TIFR2.pdf
61
See also (Mermin, 2002).
62
See Appendix A.4.3.
63
As usual, we denote by σ̂1 , . . . , σ̂3 the Pauli operators, i.e. w.r.t. (|0i , |1i) :
0 1 0 −i 1 0
σ̂1 =
b , σ̂2 = b , σ̂3 = b .
1 0 +i 0 0 −1
4.4. ENTANGLEMENT ASSISTED CHANNELS 121
Thus, if Alice and Bob (situated arbitrarily far apart) initially share a pair of qubits
forming S1 ⊕ S2 in a Bell state,64 say Ψ− , then Alice may communicate 2 bits of
information by sending Bob her single qubit (system S1 ) after acting on it in an
appropriate way:
After receiving Alice’s qubit Bob just has to perform a projective measurement
w.r.t. the Bell basis65 {Φ+ , Φ− , Ψ+ , Ψ− } in order to decode the 2-bit information.
Needless to say, without entanglement Alice would not have any chance to trans-
mit more than a single bit by sending just a single qubit. Therefore, the described
procedure to communicate 2 bits by sending just 1 qubit is called quantum dense
coding (of classical information). Of course, the crucial point is that Alice has to
be given one partner of an entangled pair of qubits first. Note, however, that Alice
and Bob may store their qubits for some time in suitable quantum memory66 before
starting to communicate. Then the information carried by the sent qubit is of no
use for any potential eavesdropper.
1
Ψ0 = ψ ⊗ √ (φ0 ⊗ φ1 − φ1 ⊗ φ0 ) . (4.57)
2
In order to determine the effect of a projective measurement on the subsystem S1 ⊕S2
w.r.t. its Bell basis we rewrite this state in the form
Ψ0 = Φ+ ⊗ χ0 + Φ− ⊗ χ1 + Ψ+ ⊗ χ2 + Ψ− ⊗ χ3 . (4.58)
Writing
ψ = α |0i + β |1i
DRAFT, October 17, 2007
64
For the creation of photon pairs in Bell states via parametric down conversion see, e.g.,
(Gatti et al., 2003) and references given there.
65
For the implementation of such measurements see, e.g., (Paris et al., 2000; Tomita, 2000;
Kim et al., 2001).
66
For the possibility of storing optical qubits see (Gingrich et al., 2003).
67
Obviously, then, the subsystem S2 ⊕ S3 is in the Bell state corresponding to Ψ− .
122 CHAPTER 4. GENERAL ASPECTS OF QUANTUM INFORMATION
and comparing
√
2ψ ⊗ √1 (φ0 ⊗ φ1 − φ1 ⊗ φ0 )
2
= α |0, 0, 1i − α |0, 1, 0i − β |1, 1, 0i + β |1, 0, 1i
with
√
2 Φ+ ⊗ χ0 + Φ− ⊗ χ1 + Ψ+ ⊗ χ2 + Ψ− ⊗ χ3
1
= |0, 0i ⊗ χ0 + |1, 1i ⊗ χ0 + |0, 0i ⊗ χ1 − |1, 1i ⊗ χ1
2
+ |0, 1i ⊗ χ2 + |1, 0i ⊗ χ2 + |0, 1i ⊗ χ3 − |1, 0i ⊗ χ3
χ0 + χ1 χ2 + χ3 χ2 − χ3 χ0 − χ1
= |0, 0i ⊗ + |0, 1i ⊗ + |1, 0i ⊗ + |1, 1i ⊗
2 2 2 2
we get
χ0 + χ1 = +α |1i ,
χ2 + χ3 = −α |0i ,
χ2 − χ3 = +β |1i ,
χ0 − χ1 = −β |0i
and hence
χ0 = α |1i − β |0i ,
= σ̂1 σ̂3 ψ
χ1 = α |1i + β |0i ,
= σ̂1 ψ
(4.59)
χ2 = β |1i − α |0i ,
= −σ̂3 ψ
χ3 = −α |0i − β |1i ,
= −ψ .
(4.57)–(4.59) show the possibility of quantum teleportation (of quantum infor-
mation):68
If Alice and Bob (situated arbitrarily far apart) initially share a pair of
qubits forming S2 ⊕ S3 in the Bell state √12 (φ0 ⊗ φ1 − φ1 ⊗ φ0 ) then
Alice may communicate to Bob the quantum information contained in
the unknown state ψ in the following way:
Alice performs a projective measurement on S1 ⊕ S2 w.r.t. the Bell
basis {Φ+ , Φ− , Ψ+ , Ψ− } and tells Bob her result via classical commu-
nication. Bob just has to perform one of the operations σ̂1 σ̂3 , σ̂1 , σ̂3
or none — according to the outcome of Alice’s measurement — on his
DRAFT, October 17, 2007
68
See (Sanctuary et al., 2003) for critical remarks on corresponding experiments.
4.4. ENTANGLEMENT ASSISTED CHANNELS 123
Note that the classical information sent by Alice would be of no use to an eaves-
dropper and that sending classical information avoids the decoherence problems
connected with sending qubits.
e = (b1 ⊕ c1 , . . . , bn ⊕ cn )
b = (e1 ⊕ c1 , . . . , en ⊕ cn )
If Victor and Bob share enough (nearly) maximally entangled pairs of qubits72 they
may establish a secret key in the following way:
DRAFT, October 17, 2007
69
See (Bowmeester et al., 2000, Chapter 2) for a nice introduction and (Elliott et al., 2005) for
actual implementation. A commercial quantum cryptosystem is offered at: www.idquantique.com
70
Developed by Gilbert Vernam at AT&T in 1917 (first published in 1926).
71
Note that
def
b ⊕ b′ = b + b′ mod 2 ∀ b, b′ ∈ {0, 1} .
72
If the entanglement is not good enough even if it is fairly bad they may perform entanglement
distillation resulting in a smaller number of nearly perfectly entangled pairs; see Section 6.2.3.
4.4. ENTANGLEMENT ASSISTED CHANNELS 125
For every tested pair the momenta of the partners are directed
parallel or antiparallel e2 and a check for linear polarization is
performed, but Victor and Bob independently and randomly
between two possibilities: Either they test whether the linear
polarization of their photon is parallel or orthogonal to e1 or
check whether the linear polarization is parallel or orthogonal
1
to e′1 = √ (e1 + e3 ).
2
As long as their choices are different their results for the corresponding
pairs are completely uncorrelated. Whenever they choose the same type
of measurement their results are (nearly) perfectly correlated. Thus
they may agree via public communication on a random secret key in the
following way:
This cryptosystem can only be attacked by manipulating the entangled pairs before
Victor’s and Bob’s measurements. But such attack will be detected by Victor and
Bob, who can eventually discard the current key and create another one.
where
p(z) = probability for drawing z ∀z ∈ Z .
127
128 CHAPTER 5. QUANTIFYING QUANTUM INFORMATION
1.
|Wδ,n | ≤ 2n(H(Z,p)+δ) ∀ n ∈ IN .
In other words:
Remarks:
1. As to be expected, we have:
Z = Z 1 ∪ Z2 , Z1 6= ∅ = Z1 ∩ Z2 6= Z2
=⇒ H(Z, p) = H {Z1 , Z2 } , p + p(Z1 ) H(Z1 , p1 ) + p(Z2 ) H(Z2 , p2 ) ,
(5.4)
DRAFT, October 17, 2007
2
See (Shannon, 1949, Appendix 3).
3
The typical words have to include essentially all those containing the letter x approximately
⌈n p(z)⌉-times for every z ∈ Z . For large n the number of such words is of the order
n! n H(Z,p) −N N
Q ≈ 2 since N ! ≈ e N for large N .
Stirling
z n p(z) !
4
Obviously, such coding can be used for data compression, if H(Z, p) < log2 |Z| .
5
(5.4) together with (5.5) and continuity in the p(z) fixes H uniquely (Shannon, 1949, Theorem
2).
5.1. SHANNON THEORY FOR PEDESTRIANS 129
where
def X
p(Zj ) = p(z)
z∈Zj
∀ j ∈ {1, 2} .
def
pj (z) = p(z)/p(Zj ) ∀ z ∈ Zj
Now assume
Z =X ×Y
and define
def X
p1 (x) = p(x, y) ∀ x ∈ X , (5.6)
y∈Y
def X
p2 (y) = p(x, y) ∀ y ∈ Y , (5.7)
x∈X
p(x, y)/p2 (y)
def if p2 (y) > 0
p1 (x|y) = ∀ (x, y) ∈ Z , (5.8)
1/ |X| else
def p(x, y)/p1 (x) if p1 (x) > 0
p2 (y|x) = ∀ (x, y) ∈ Z . (5.9)
1/ |Y | else
Outline of proof:
H(X|Y )
X X
= − p2 (y) p1 (x|y) log2 p1 (x|y)
(5.13) | {z }
y∈Y x∈X
=p(x,y)/p2 (y)
X X X
= − p2 (y) p1 (x|y) log2 p(x, y) + p2 (y) p1 (x|y) log2 p2 (y) .
| {z }
(x,y)∈Z y∈Y x∈X
=p(x,y) | {z }
=1
Similarly we have
H(X × Y, p) = H(X, p1 ) + H(Y |X)
for X
def
H2 (Y |X) = p1 (x) H Y, p2 (.|x) .
x∈X
If n
X 1 for α = β ,
ρ̂ = λν |φν ihφν | , hφα | φβ i =
ν=1
|{z} 0 else ,
≥0
then
S1 (ρ̂) = H(X, p1 ) (5.18)
holds for n o
def
X = |φ1 ihφ1 | , . . . , |φn ihφn | (5.19)
def
p1 |φν ihφν | = λν ∀ ν ∈ {1, . . . , n} . (5.20)
0 ≤ Â 6= B̂ ≥ 0 , ker(B̂) ⊂ ker(Â)
=⇒ trace  ln  − ln B̂ > trace ( − B̂) .
Outline of proof: Thanks to the spectral theorem there are orthonormal systems
{φ1 , . . . , φn } and {φ′1 , . . . , φ′n } of H with
n
X n
X
 = aν |φν ihφν | , B̂ = bν |φ′ν ihφ′ν |
|{z} |{z}
ν=1 ≥0 ν=1 ≥0
and
n
* n n
+
X X X
trace (Â ln B̂) = φα aβ |φβ ihφβ | ln bγ |φγ ihφγ | φα
α=1 β=1 γ=1
Xn
2
= aα ln(bγ ) φα | φ′γ ,
α,γ=1
hence
n n
!
X X 2
trace (Â ln Â) − trace (Â ln B̂) = aα ln aν − ln(bγ ) φα | φ′γ .
α=1 γ=1
Since, for x > 0 , ln(x) is a strictly concave function,13 the latter implies
In (5.22) equality holds only if, for every α ∈ {1, . . . , n} , at most one of products
aα bγ φα | φ′γ is different from zero. Then, with suitable relabelling of the φ′γ , we
Xn
2
have bγ φα | φ′γ = bα and equality in (5.23) holds only if aα = bα for all
γ=1
α ∈ {1, . . . , n} , i.e. if  = B̂ .
for all states ρ̂, ρ̂′ ∈ S(H) with ker(ρ̂′ ) ⊂ ker(ρ̂) and ρ̂ 6= ρ̂′ .
and
S1 (ρ̂) = S1 trace 2 (ρ̂) + S1 trace 1 (ρ̂) ⇐⇒ ρ̂ = trace 2 (ρ̂) ⊗ trace 1 (ρ̂) .
gives
0 = trace (Â − B̂)
≤ −S1 (ρ̂) − trace (Â log2 B̂)
P̂1 + . . . + P̂l = 1̂
and define
l
X
def
ρ̂′0 = P̂k ρ̂0 P̂k .
k=1
Then
ρ̂0 6= ρ̂′0 =⇒ S1 (ρ̂0 ) < S1 (ρ̂′0 ) .
Proof: Since
X
l
trace (ρ̂ log2 ρ̂′ ) = trace P̂k P̂k ρ̂ log2 ρ̂′
k=1
| {z }
=1̂
X
l
= trace P̂k ρ̂ log2 (ρ̂′ ) P̂k
k=1
X
l
′
= trace P̂k ρ̂ P̂k log2 (ρ̂ )
[ρ̂′ ,P̂k ]− =0
k=1
= −S1 (ρ̂′ ) ,
The best one can do, in order to acquire information about an drawn letter,
o is
perform a POV measurement15 corresponding to some set Y = Ê1 , . . . , ÊN2 of
events Ê represented by positive bounded operators on H with16
Ê1 + . . . + ÊN2 = 1̂ .
According to quantum mechanical rules, the probability for Ê is trace (ρ̂ Ê) , if ρ̂
was drawn. Hence, the probability for ρ̂ being drawn and Ê being detected is17
def
p(ρ̂, Ê) = p1 (ρ̂) trace (ρ̂ Ê) . (5.24)
where
N1
X
def
ρ̂0 = p1 (ρ̂j )ρ̂j
j=1
is the state of the source providing the letters. Of course,18 ρ̂0 does not uniquely
determine (X, p1 ) . Nevertheless, the von Neumann entropy fulfills the Holevo
bound
N1
X
I(X : Y ) ≤ S1 (ρ̂0 ) − p1 (ρ̂j ) S1 (ρ̂j ) (5.25)
j=1
are the Kraus operator of the quantum operation C acting on a qubit system we have C(1̂/2) =
|0ih0| and hence
S1 (1̂/2) > S1 C(1̂/2) = 0 .
15
If the elements of X are linearly independent, then the best result can be achieved by projective
measurement, i.e. with Ê1 , . . . , ÊN2 being projection operators (Eldar, 2003). For the importance
of considering also linearly dependent Êν ’s see, e.g., (Kaszlikowski et al., 2003).
16
Recall Corollary A.4.3, in this connection.
17
Obviously, (5.24) is consistent with (5.6).
18
Recall Corollary A.4.3.
136 CHAPTER 5. QUANTIFYING QUANTUM INFORMATION
(Nielsen and Chuang, 2001, Theorem 11.10). A direct consequence of (5.25) and
(5.26) is the upper bound
Hence:
On the other hand, (5.27) (together with continuity of the entropies) implies the
bound
A(X, p) ≤ S1 (ρ̂0 ) . (5.29)
Â Ψ 6= 0 ⇐⇒ 0 6= Ψ ∈ ÂH
for such  .
5.2. ADAPTION TO QUANTUM COMMUNICATION 137
for trace class operators  on a Hilbert space H . Especially for qubits we have
1 1
ρ̂ = 1̂ + ρ · τ̂ , ρ̂′ = 1̂ + ρ′ · τ̂
2 2
24
and hence q
D(ρ̂, ρ̂′ ) = 14 trace + (ρ · τ̂ − ρ′ · τ̂ )2
q
1 +
= trace |ρ − ρ′ | 1̂
4
1
= |ρ − ρ′ | ,
2
i.e.:
For qubit states ρ̂ , ρ̂′ the trace distance is half the Euclidean distance
of the corresponding Bloch vectors ρ , ρ′ .
For general mixed states we have the following:
Lemma 5.2.4 Let H be a finite-dimensional Hilbert space and ρ̂, ρ̂′ ∈ S(H) .
Then25
D(ρ̂, ρ̂′ ) = max trace (P̂ ρ̂) − trace (P̂ ρ̂′ ) , (5.32)
P̂ ∈P
25
This formula holds also with P replaced by the set of all events; i.e. of all positive operators
with trace ≤ 1 .
138 CHAPTER 5. QUANTIFYING QUANTUM INFORMATION
Outline of proof: The spectral theorem tells us that there are an orthonormal basis
{φν }ν∈IN of H and real numbers λ1 , . . . , λn with
n
X
ρ̂ − ρ̂′ = λ ν φν (5.33)
ν=1
and
n
X
λν = 0 . (5.34)
ν=1
Then q n
X
+ 2
(ρ̂ − ρ̂′ ) = |λν | φν
ν=1
and, therefore,
n
1X
D(ρ̂, ρ̂′ ) = |λν |
2 ν=1
X
= λν
(5.34)
ν∈{1,...,n}
λν >0
X
= trace λ ν φν
ν∈{1,...,n}
λν >0
X X
≥ trace P̂ λ ν φν + trace P̂ λ ν φν ∀ P̂ ∈ P
ν∈{1,...,n} ν∈{1,...,n}
λν >0 λν ≤0
Now it is obvious that the trace distance is a metric on the set of states:26
D(ρ̂1 , ρ̂2 ) ≥ 0 ,
D(ρ̂1 , ρ̂2 ) = 0 ⇐⇒ ρ̂1 = ρ̂2 ,
D(ρ̂1 , ρ̂2 ) = D(ρ̂2 , ρ̂1 ) ,
D(ρ̂1 , ρ̂3 ) ≤ D(ρ̂1 , ρ̂2 ) + D(ρ̂2 , ρ̂3 ) .
!
λν >0
X
= ¯
trace C λ ν φν
ν∈{1,...,n}
! !
λν >0
X X
¯
≥ trace P̂ C λ ν φν ¯
+ trace P̂ C λ ν φν
ν∈{1,...,n} ν∈{1,...,n}
λν >0 λν ≤0
′
= trace P̂ C(ρ̂) − ĉ(ρ̂ ) ∀ P̂ ∈ P .
Then
N N
! N N
X X 1X X
D pν ρ̂ν , p′ν ρ̂′ν ≤ |pν − p′ν | + pν D(ρ̂ν , ρ̂′ν ) . (5.36)
ν=1 ν=1 2 ν=1 ν=1
Together with
X N
1X
(pν − p′ν ) = |pν − p′ν |
(5.35) 2
ν∈{1,...,N } ν=1
pν −p′ν >0
Another important measure for the distance of states is the Bures fidelity:28
s 2
q q † q q
def +
F (ρ̂, ρ̂′ ) = trace +
ρ̂′ +
ρ̂ +
ρ̂′ +
ρ̂ .
q
Since +
|ψihψ| = |ψihψ| and hence
rq q q
+ +
|ψihψ| ρ̂′ +
|ψihψ| = +
|ψihψ| ρ̂′ |ψihψ|
q
= +
hψ | ρ̂′ ψi |ψihψ|
Symmetry of the fidelity in general is not evident from its definition but follows
directly from Uhlmann’s theorem (Uhlman, 1976):
DRAFT, October 17, 2007
28
For commuting ρ̂, ρ̂′ the Bures fidelity has a simple geometrical interpretation, since
X
ρ̂ = pν |φν ihφν | , !2
Xp
Xν ′
=⇒ F (ρ̂, ρ̂ ) = pν p′ν .
ρ̂′ = p′ν |φν ihφν |
ν
ν
See (Chen et al., 2002) for a geometrical interpretation of the Bures fidelity of general qubit states.
5.2. ADAPTION TO QUANTUM COMMUNICATION 141
where29 n o
def
Tρ̂ = Ψ ∈ H ⊗ H : ρ̂ = trace 2 |ΨihΨ| ∀ ρ̂ ∈ S(H) .
Outline of proof:nLet j ∈ {1, 2}oand Ψj ∈ Tρ̂j . By the spectral theorem, there is are
(j) (j) (j) (j)
orthonormal basis φ1 , . . . , φn of H , some n′ ∈ {1, . . . , n} , and s1 , . . . , sn′ > 0
with ′
n
X 2
ρ̂j = s(j)
ν φ(j)
ν .
ν=1
Therefore, the Schmidt-decomposition of Ψj has to be of the form
′
n
X
Ψj = s(j) (j) (j)
ν φν ⊗ ψ ν
ν=1
Xn
p
= +
ρ̂j φ(j)
ν ⊗ ψν(j)
ν=1
n o
(j) (j)
with some orthonormal basis ψ1 , . . . , ψn of H . Considering j = 1 and j = 2
together we thus get
n′ D p
X p ED E
hΨ2 | Ψ1 i = +
ρ̂2 φ(2)
ν
+
ρ̂1 φ(1)
µ ψν(2) ψµ(1) . (5.40)
ν,µ=1
In order to rewrite the r.h.s. of (5.40) as a trace we use the unitary operators V̂ and
V̂ ′ characterized by
V̂ φ(2)
µ = φµ
(1)
∀ µ ∈ {1, . . . , n}
and D E D E
φ(2)
µ V̂ ′ φ(2)
ν = ψν(2) ψµ(1) ∀ ν, µ ∈ {1, . . . , n} .
Then
n′ D p
X p ED E
hΨ2 | Ψ1 i = +
ρ̂2 φ(2)
ν
+
ρ̂1 V̂ φ(2)
µ φ(2)
µ V̂ ′ φ(2)
ν
(5.40)
ν,µ=1
Xn′ D p p E
= φ(2)
ν
+
ρ̂2 + ρ̂1 V̂ V̂ ′ φ(2)
ν
ν=1
√ √
= trace + ρ̂2 + ρ̂1 V̂ V̂ ′
√ √
= trace V̂ V̂ ′ + ρ̂2 + ρ̂1
= F (ρ̂1 , ρ̂1 ) .
(j)
Obviously, by appropriate choice of the ψν we get equality.
Then
n
X
trace (B̂ ρ̂) = pν trace B̂ |φν ihφν |
ν=1
Xn D E
= pν φν | B̂ φν
ν=1
n
X D E
≤ pν φν | B̂ φν
ν=1 | {z }
≤kB̂ k
≤ B̂ .
Relevant for quantum sources producing ρ̂j with probability pj and disturbed by C
is the ensemble average fidelity
X
def
F = pj F ρ̂j , C(ρ̂j ) .
j
and33
(n)
2n(S1 (ρ̂0 )+δ) ≥ dim Λ̂ρ̂0 ,δ H⊗n ≥ 2n(S1 (ρ̂0 )−δ) ∀ n ∈ IN ,
(n)
where, for n ∈ IN , Λ̂ρ̂0 ,δ denotes
h
the projector onto i
the subspace of all eigenvectors
⊗n n(S1 (ρ̂0 )−δ) n(S1 (ρ̂0 )+δ)
of ρ̂0 with eigenvalues in 2 ,2 .
Lemma 5.2.10
Let H be a Hilbert space and  a self-adjoint operator on H . The for arbitrary
ψ1 , . . . , ψN ∈ H and p1 , . . . , pN > 0 we have
N N
! N
X D E 2 X X
pν ψν  ψν ≥ 2 trace  pν |ψν ihψν | − pν .
ν=1 ν=1 ν=1
x2 ≥ 2 x − 1 ∀ x ∈ IR
D E
to x = ψν Â ψν .
..
.
DRAFT, October 17, 2007
33
See (Mitchison and Jozsa, 2003) in this connection.
5.2. ADAPTION TO QUANTUM COMMUNICATION 145
5.2.5 A la Nielsen/Chuang
Klein inequality (Nielsen and Chuang, 2001, Theorem 11.7):34
trace ρ̂ log(ρ̂) ≥ trace ρ̂ log(ρ̂′ ) ∀ ρ̂, ρ̂′ ∈ S(H) . (5.47)
def
Hbin (p) = H {p, 1 − p} ∀ p ∈ [0, 1] .
..
.
PPT criterion
Cat states implemented for Josephson junctions or coherent states (entangle-
ment laser)
5.2.6 Entropy35
Classically, every message can be encoded in a string of bits. But can
quantum information always be encoded in a string of qubits?!
Handling Entanglement1
We have seen in 4.4 that perfect entanglement may be used for implementing noiseless
quantum communication. Therefore, quantification and handling (e.g., distillation)
of entanglement is important. Here, for simplicity, we consider only bipartite sys-
tems. One might expect, then, that separability is equivalent to the existence of
corresponding (local) hidden variable models, hence to the validity of all (general-
ized) Bell inequalities.2 However, as shown in (Werner, 1989), that this is not the
case.
147
148 CHAPTER 6. HANDLING ENTANGLEMENT
1.
trace (ρ̂ Ŵ ) < 0 .
2.
ρ̂′ separable =⇒ trace (ρ̂ Ŵ ) ≥ 0 ∀ ρ̂′ ∈ S(H1 ⊗ H2 ) .
Outline of proof: The statement follows from the known fact5 that for every point
X outside a convex set K there is a hyperplane separating X from K .
n o
(j)
Lemma 6.1.2 (Jamiolkowski) For j ∈ {1, 2} , let φ1 , . . . , φ(j)
nj be a MONS of
the Hilbert space Hj . Then for every Ŵ ∈ L(H1 ⊗ H2 ) there is a unique linear
mapping LŴ : L(H1 ) −→ L(H2 ) with
LŴ fulfills
ED n2
X D E ED
LŴ φ(1)
ν1 φ(1)
µ1 = φ(1) (2) (1) (2)
ν1 ⊗ φν2 | Ŵ φµ1 ⊗ φµ2 φ(2)
ν2 φ(2)
µ2 (6.3)
ν2 ,µ2 =1
positivity of LŴ implies nonnegativity of trace (Ŵ ρ̂) for separable7 ρ̂ . Conversely
the latter implies positivity of LŴ , since
D ED E D E
φ(2) LŴ φ(1) φ(1) φ(2) = Ψφ(1) ,φ(2) Ŵ Ψφ(1) ,φ(2) ∀ φ(1) ∈ H1 , φ(2) ∈ H2 ,
(6.3)
where
dim(H1 ) D E
def
X
Ψφ(1) ,φ(2) = φ(1) φ(1)
ν1 φ(1)
ν1
⊗ φ(2) .
ν1 =1
n o
(j)
Corollary 6.1.3 For j ∈ {1, 2} , let φ1 , . . . , φ(j)
nj be a MONS of the Hilbert
space Hj . Then for every Ŵ ∈ L(H1 ⊗ H2 ) we have8
trace (ρ̂ Ŵ ) < 0 =⇒ 1 ⊗ L†Ŵ (ρ̂) 6≥ 0 ∀ ρ̂ ∈ S(H1 ⊗ H2 ) (6.6)
and
where L†Ŵ denotes the Hilbert-Schmidt adjoint of the linear mapping LŴ that is
characterized by (6.3), i.e.:
trace L†Ŵ (Â2 ) Â1 = trace Â2 LŴ (Â1 ) ∀ Â1 ∈ L(H1 ) , Â2 ∈ L(H2 ) .
We may conclude:
1. If Ŵ is an entanglement witness for ρ̂ then 1 ⊗ L†Ŵ (ρ̂) 6≥ 0 and, there-
fore, the positive map L†Ŵ cannot be completely positive.
(1 ⊗ L′ )(ρ̂) 6≥ 0 =⇒ ρ̂ ∈
/ Ssep (H1 ⊗ H2 ) .
6.1.2 Examples
Lemma 6.1.4 The flip operator of the bipartite system S with state space H⊗H ,
i.e. the linear Operator F̂ on H ⊗ H characterized by
def
F̂ (ψ1 ⊗ ψ2 ) = ψ2 ⊗ ψ1 ∀ ψ1 , ψ2 ∈ H , (6.8)
has the following properties:10
1.
F̂ = F̂ † , F̂ 2 = 1̂ .
2.
F̂ = P̂+ − P̂− ,
where the
1
def
1̂ ± F̂
P̂± =
2
are the projectors onto the symmetric resp. anti-symmetric pure states of S :
Ψ ∈ P̂± (H ⊗ H) ⇐⇒ F̂ Ψ = ±Ψ̂ ∀Ψ ∈ H ⊗ H.
3. For all β ∈ IR :
1̂ + β F̂ ≥ 0 ⇐⇒ β ∈ [−1, +1] .
4.
trace (F̂ ) = − dim(H) .
Outline of proof: The first four statements are more or less obvious and the last
one follows from
trace F̂ |ψ1 ihψ1 | ⊗ |ψ2 ihψ2 | = trace F̂ |ψ1 ⊗ ψ2 ihψ1 ⊗ ψ2 |
= trace |ψ2 ⊗ ψ1 ihψ1 ⊗ ψ2 |
= hψ1 ⊗ ψ2 | ψ2 ⊗ ψ1 i
2
= |hψ1 | ψ2 i| .
While the flip operator cannot be an entanglement witness for, e.g., the F̂ -invariant
pure states,13 a two-qubit state ρ̂ is separable iff its partial transpose (1 ⊗ T) (ρ̂) is
positive. Slightly more generally we have:
n o
(j)
Theorem 6.1.5 For j ∈ {1, 2} , let φ1 , . . . , φ(j)nj be a MONS of the Hilbert
space Hj . If n1 + n2 ∈ {4, 5} then an arbitrarily given state
n1
X n2
X ED
ρ̂ = ρν1 ν2 ,µ1 µ2 φ(1) (2)
ν1 ⊗ φν2 φ(1) (2)
µ1 ⊗ φµ2 ∈ S(H1 ⊗ H2 )
ν1 ,µ=1 ν2 ,µ2 =1
n o
(1)
Another example for H1 = H2 = H and {φ1 , . . . , φn } = φ1 , . . . , φ(1)
n1 =
n o
(2)
φ1 , . . . , φ(2)
n1 is
Ŵ = 1̂H⊗H − n P̂H+
n
X
= |φν ihφµ | ⊗ δνµ 1̂ − |φν ihφµ |
ν, µ=1
+
= m 1 ⊗ LD
H (P̂H ) ,
where
LŴ (B̂) = LD
H (B̂) (6.11)
(6.1)
def
= trace (B̂) − B̂ ∀ B̂ ∈ L(H) , (6.12)
Obviously, LD
H is positive and
1 ⊗ LD
H (ρ̂) = trace 2 (ρ̂) ⊗ 1̂ − ρ̂ ∀ ρ̂ ∈ L(H) .
Therefore,16
trace 2 (ρ̂) ⊗ 1̂ 6≥ ρ̂ =⇒ ρ̂ ∈
/ Ssep (H ⊗ H) . (6.13)
(1 ⊗ |{z}
L )(ρ̂) 6≥ 0 =⇒ ρ̂ ∈
/ Ss (H1 ⊗ H1 ) . (6.14)
≥0
only for positive maps L : L(H2 ) −→ L(H1 ) . But, of course, (6.14) also holds for
positive maps L : L(H2 ) −→ L(H2 ) . Typical examples are
1. L = T :
2. L = LD
H :
ρ̂ ∈ Ssep (H1 ⊗ H2 ) =⇒ trace 2 (ρ̂) ⊗ 1̂ ≥ ρ̂ . (6.15)
Remarks:
1. Since18
†
(1 ⊗ T)(ρ̂) = (1 ⊗ T)(ρ̂) ∀ ρ̂ ∈ S(H1 ⊗ H2 )
and
trace (1 ⊗ T)(ρ̂) = 1 ∀ ρ̂ ∈ S(H1 ⊗ H2 ) ,
we have19
19
Recall (5.31).
20
Recall (A.22)
21
Compare (Altafini, 2003, Sect. II.B., Corollary 1).
154 CHAPTER 6. HANDLING ENTANGLEMENT
λ Ψ 6= 0
(1 ⊗ T)(ρ̂) Ψ = |{z}
( <0
(1 ⊗ T) |ΨihΨ| entanglement witness for ρ̂ ,
=⇒
Ψ non-separable .
where n2 D
X E
(2) ∗
ψ = ψ (2) | φ(2)
ν φ(2)
ν
(4.9) ν=1
n o
(2)
depends on the MONS φ1 , . . . , φ(2)
n2 of H2 .
also ∗
(1) (2)
ψk ⊗ ψk ∈ range (1 ⊗ T)(ρ̂) ∀ k ∈ {1, . . . , N } .
2. Entropic inequalities:24
)
ρ̂ ∈ Ssep (H1 ⊗ H2 )
=⇒ Sα trace j (ρ̂) ≤ Sα (ρ̂) ∀ j ∈ {1, 2} , (6.17)
α ∈ {0, 1, 2, ∞}
(more information for the total state than for the partial states), where25
def
log2 trace (ρ̂α )
Sα (ρ̂) = ∀ α ∈ (0, 1) ∪ (1, ∞) (6.18)
1−α
and26
def
Sk (ρ̂) = lim Sα (ρ̂) ∀ k ∈ {0, ∞} .
α→k
where
X
N N
X
def (1) (2) (1) (2)
 = inf Âk Âk : Âk ⊗ Âk =  , N ∈ IN (6.20)
γ 1 1 | {z } | {z }
k=1 k=1
∈L(H1 ) ∈L(H2 )
for  ∈ L(H1 ⊗ H2 ) .
4. Computable cross norm criterion27 (Rudolph, 2002, Prop. 19):
for the so-called Renỳi quantum entropies Sα ; see also (Lavenda and Dunning-Davies, 2003).
26
Note also that
S1 (ρ̂) = lim Sα (ρ̂) .
1<α→1
27
Note that for dim(H) ≥ dim(H1 ), dim(H2 ) there is a canonical mapping of S(H1 ⊗ H2 ) into
S(H ⊗ H) respecting separability. Therefore, it is sufficient to consider the case H1 = H2 .
28
See (Hiroshima, 2003), in this connection.
156 CHAPTER 6. HANDLING ENTANGLEMENT
(1) (2)
and the Ck resp. Ck are trace preserving elements of Q(H1 , H1 ) resp. Q(H2 , H2 ) .
Obviously,
ψ (1) ∈ H1 , ψ (2) ∈ H2
=⇒ SLOCC ψ (1) ⊗ ψ (2) = Ssep (H1 ⊗ H2 ) , (6.25)
ψ (1) = ψ (2) = 1
where
def
SLOCC (ρ̂) = {states ρ̂′ of the form (6.24)} .
Definition 6.2.1 Let Ĥ, Ĥ ′ be Hermitian operators on the Hilbert space H with
spectral decompositions
n
X n
X
Ĥ = Eν |ψν ihψν | , Ĥ ′ = Eν′ |ψν′ ihψν′ | .
ν=1 ν=1
Theorem 6.2.2 Let Ĥ, Ĥ ′ be Hermitian operators on the Hilbert space H . Then
Ĥ Ĥ ′ iff there are p1 , . . . , pn ≥ 0 and unitary Operators Û1 , . . . , Ûn on H with
n
X n
X
Ĥ = pν Ûν Ĥ ′ Ûν† , pν = 1 .
ν=1 ν=1
For pure states and H1 = H2 , concerning LOCC, nothing is lost if the operations
on one side are restricted to be unitary:
Then, writing
n
X ED
M̂ = Mνµ φ(2)
ν φ(2)
µ
ν,µ=1
and defining
n
X ED
def
N̂ ′ = Mνµ φ(1)
ν φ(1)
µ
ν,µ=1
we get
Ŝ N̂ ′ ⊗ 1̂ Ψ = 1̂ ⊗ M̂ Ψ ,
def
Defining N̂ = V̂ N̂ ′ we get the statement of the lemma.
(1) (2)
The state LLOCC (ρ̂) in (6.24) can be pure only if it coincides with Ck ⊗ Ck (ρ̂)
for all k ∈ {1, . . . , N } with pk 6= 0 . This, together with Theorem 6.2.2 allows us to
prove the following:
158 CHAPTER 6. HANDLING ENTANGLEMENT
Outline of proof: Assume that (6.24) holds. Then, by Lemma 6.2.3, LLOCC can
be chosen such that
XN′
′
ρ̂ = M̂j ⊗ Ûj ρ̂ M̂j† ⊗ Ûj†
j=1 | {z }
∝ρ̂′
This implies
M̂j trace 2 (ρ̂) M̂j† = p′j trace 2 (ρ̂′ ) ∀ j ∈ {1, . . . , N ′ } , (6.27)
where
def
p′j = trace M̂j trace 2 (ρ̂) M̂j† ∀ j ∈ {1, . . . , N ′ } . (6.28)
Using the polar decomposition
r † p
p p
trace 2 (ρ̂) M̂j† trace 2 (ρ̂) M̂j† trace 2 (ρ̂) M̂j†
+ + + +
= Ûj
q
= Ûj +
M̂j trace 2 (ρ̂) M̂j†
q
= Ûj +
p′j trace 2 (ρ̂′ )
(6.27)
and hence trace 2 (ρ̂) trace 2 (ρ̂′ ) , by Theorem 6.2.2, since (6.26) and (6.28) imply
′
N
X
p′j = 1 . (6.30)
j=1
|{z}
≥0
and
trace 2 M̂j ⊗ 1̂ ρ̂ M̂j† ⊗ 1̂ = p′j trace 2 (ρ̂′ ) ∀ j ∈ {1, . . . , N ′ } , (6.32)
Since
(
trace 2 (ρ̂′′ ) = trace 2 (ρ̂′ ) 1̂ ⊗ Û ρ̂′′ 1̂ ⊗ Û † = ρ̂′
=⇒
ρ̂′ , ρ̂′′ ∈ Spure (H ⊗ H) TheoremA.4.7 for some unitary Û ∈ L(H) ,
(6.32) shows that there are unitary V̂1 , . . . V̂N ′ ∈ L(H) with
M̂j ⊗ V̂j ρ̂ M̂j† ⊗ V̂j† = p′j ρ̂′ ∀ j ∈ {1, . . . , N ′ } .
This, together with (6.30) and (6.31), shows that ρ̂ can be transformed into ρ̂′ by
LOCC.
Lemma 6.2.5 Let Ĥ, Ĥ ′ be Hermitian operators on the Hilbert space H with
spectral decompositions
n
X n
X
Ĥ = Eν |ψν ihψν | , Ĥ ′ = Eν′ |ψν′ ihψν′ | .
ν=1 ν=1
and ′ ′
n
X n
X
′
max Eπ(ν) ≤ max Eπ(ν) ∀ n′ ∈ {1, . . . , n − 1} (6.34)
π∈Sn π∈Sn
ν=1 ν=1
are fulfilled.
Remarks:
1. Obviously,
1
1̂ ρ̂1 ∀ ρ̂1 ∈ S(H) .
dim H
2. According to Theorem 6.2.4, therefore,31
Spure (H ⊗ H) ⊂ SLOCC P̂H+ .
DRAFT, October 17, 2007
31
Recall (6.2).
160 CHAPTER 6. HANDLING ENTANGLEMENT
3. For qubit states ρ̂, ρ̂′ we always have either ρ̂ ρ̂′ or ρ̂′ ρ̂ or both.
4. However, for higher dimensional H neither ρ̂ ρ̂′ nor ρ̂′ ρ̂ need
be true for ρ̂, ρ̂′ ∈ S(H) as application of Lemma 6.2.5 to, e.g., the
case
1 1
ρ̂ = (7 φ1 + 7 φ2 + φ3 ) , ρ̂ = (11 φ1 + 2 φ2 + 2 φ3 )
15 15
shows if {φ1 , φ2 , φ3 } is a MONS of H .
Note that LOCC would be much more powerful if intermediate use of nonlocally
entangled ancillary pairs, restoring their original states, could be made:
n o
(j)
For j = 1 resp. j = 2 let φ1 , . . . , φ(j)
nj be a MONS of the Hilbert
space Hj , let
n1
X n1
X
Ψ= λνµ φ(1) (1)
ν ⊗ φµ , Ψ′ = λ′νµ φ(1) (1)
ν ⊗ φµ
νµ=1 ν,µ1
be pure states of the bipartite system with state space H1 ⊗ H1 and let
n1 X
X n2
(2)
Φ= λνµ λanc (1) (2)
αβ φν ⊗ φα ⊗ φ(1)
µ ⊗ φβ ,
ν1 α,β=1
Xn1 Xn2
(2)
Φ′ = λ′νµ λanc (1) (2)
αβ φν ⊗ φα ⊗ φ(1)
µ ⊗ φβ
ν1 α,β=1
Finally, given ρ̂, ρ̂′ ∈ Spure (H ⊗ H) , let us note that ρ̂ can be transformed into ρ̂′ by
local operations without communication iff
Hence n o
max E |ΨihΨ| = log2 min dim(H1 ), dim(H2 ) (6.37)
Ψ∈H1 ⊗H2
kΨk=1
1.
E(ρ̂) ≥ 0 ∀ ρ̂ ∈ S(H1 ⊗ H2 ) .
2.
E(ρ̂) = 0 ∀ ρ̂ ∈ Ssep (H1 ⊗ H2 ) .
3.
E(ρ̂) = 0 =⇒ ρ̂ ∈ Ssep (H1 ⊗ H2 ) ∀ ρ̂ ∈ S(H1 ⊗ H2 )
(could be relexed by cosideration of additional entanglement measures).
4.
ρ̂′ ∈ SLOCC (ρ̂) =⇒ E(ρ̂′ ) ≤ E(ρ̂) ∀ ρ̂, ρ′ ∈ S(H1 ⊗ H2 ) .
1.
E(ρ̂) ≥ E(ρ̂′ ) =⇒ ρ̂′ ∈ SLOCC (ρ̂) ∀ρ̂, ρ̂′ ∈ S(H1 ⊗ H2 )
(not possible).
2. Continuity
3. Additivity
4. Subadditivity
5. Convexity
• In general, Werner states are not maximally entangled, i.e. their entangle-
ment of formation (tangle) is not maximal for given a fixed degree of mixedness
(linear entropy) (White et al., 2001).
• Compare with (Eckert et al., 2002). (see also quant-ph/0210107)
• What about local superselection rules? (Verstraete and Cirac, 2003;
Bartlett and Wiseman, 2003)
• Exploit the notion of truncated expectation values. (Lee et al., 2003)
• What is the generalization of the latter for mixed states?
• Existiert ein Abstandsmaß a la (Lee et al., 2003)?
• Warum verwendet man nicht den Hilbert-Schmidt-Abstand von
Zuständen, der sich leicht mithilfe von Erwartungswerten von (Pro-
dukten von) Pauli-Operatoren ausdrücken läßt?
• Besteht ein Zusammenhang mit (Lee et al., 2003)? Der Abstand
zur Menge der separablen Zustände sollte doch ein Maß für Ver-
schränktheit sein...
Remarks:
1. For (dim(H1 ), dim(H1 )) either (2,2) or (3,2) PPT w.r.t. the second
factor is necessary and sufficient for separability (Horodecki et al., 1996).
2. Otherwise states with bound entanglement, i.e. entangled PPT
states, exist (Horodecki et al., 1996, Appendix).
3. In the 2-qubit case every entangled mixed state can be represented
as a convex combination of a separable (in general mixed) state
with a pure entangled state (Lewenstein and Sanpera, 1998). The
representation with minimal norm of the pure state is unique.
4. Also this shows that, for the 2-qubit case, separability is equivalent
to PPT.
DRAFT, October 17, 2007
37
For pairs of qubits the entanglement of formation coincides with the concurrence
(Wootters, 2001, Section 3.1).
164 CHAPTER 6. HANDLING ENTANGLEMENT
Appendix A
There is no algorithm by which one may decide for every program and
every finite input to the program whether the program will halt or loop
forever.
There are uncountably many possibilities for infinite loops which, there-
fore, cannot be checked in a systematic way. But we cannot be sure
whether a given program will halt on a given input or not unless
Let us finally note that the halting problem is a solution to Hilbert’s 23rd
problem (see http://aleph0.clarku.edu/ djoyce/hilbert/).
165
166 APPENDIX A.
In order to test for the Bell relations it seems necessary to get the qubits into
contact1 — not necessarily into interaction (Resch et al., 2002; Hofmann and Takeuchi, 2002).
This way they loose their identity – a natural reason for the change of the total (in-
ternal) state through measurement.
It seems that the Bell relations may be taken as elements of reality, but they
can be applied to only one (freely chosen) set of 1-particle ‘properties’.2
DRAFT, October 17, 2007
1
See (Lloyd, 2000), however.
2
More generally, see (Griffiths, 2002).
A.3. QUANTUM PHASE ESTIMATION AND ORDER FINDING 167
m
|0i H ··· s √1 |0i + ei 2 ϕ
|1i
2
.. .. .. .. ..
. . . . .
1
|0i H s ··· √1 |0i + ei 2 ϕ
|1i
2
0
|0i H s ··· √1 |0i + ei 2 ϕ
|1i
2
···
Ψ̆ϕ .. 0 .. 1 .. m .. Ψ̆ϕ .
. Û 2 . Û 2 . Û 2 .
···
I(b)
ϕ = 2π for some b ∈ {0, 1}m+1 . (A.1)
2m+1
Since
m+1
X
i 2(m+1)−ν ϕ (m+1)−ν−µ
(A.1) =⇒ e = exp i 2π bµ 2 ,
µ=(m+1)−ν+1
of the first m + 1 qubits of the output produced by the described network and
measuring the result — if (A.1) holds exactly and everything works perfectly.
168 APPENDIX A.
1 X−1
2m+1
i2π ( 2π
ϕ
j
= e − k
2m+1
) |kim+1
2m+1 j,k=0
1 − ei2π(2 2π −k)
m+1 ϕ
2m+1
X−1
1
= |kim+1
1 − ei2π( 2π − 2m+1 )
ϕ
2m+1 k=0
k
2m+1
X−1
m+1
1 1 − ei 2 ϕ
= |kim+1 . (A.4)
1 − ei2π( 2π − 2m+1 )
ϕ
2m+1 k=0
k
Then (A.4) implies that the probability p(k) for finding |kim+1 when testing F̂ −1 Φ̆ϕ
fulfills the inequality
1 −2
1 − ei2π( 2π − 2m+1 )
ϕ k
p(k) ≤ . (A.5)
22m
Let us define
defϕ
D(k) = min 2m+1− ν − k ∀ k ∈ ZZ .
ν∈ZZ 2π
Then, given d ∈ {3, . . . , 2m − 1} , the probability pd for getting any state |kim+1
with D(k) > d when testing F̂ −1 Φ̆ϕ fulfills the inequality
1
pd ≤ . (A.6)
2 (d − 2)
Proof: Choosing k0 ∈ 0, . . . , 2m+1 − 1 such that
def ϕ
∆ = 2m+1 − k0 ∈ (0, 1)
2π
we get
X
pd = p(k)
k∈{0,...,2m+1 −1}
D(k)>d
1 X ∆ k−k0 −2
≤ 1 − ei2π 2m+1 e−i2π 2m+1
(A.5) 22m
k∈{0,...,2m+1 −1}
minν∈ZZ |k0 −k−ν 2m+1 |≥d
1 X ∆ j −2
= 1 − ei2π 2m+1 e−i2π 2m+1
22m
j∈{−2m +1,...,2m }
minν∈ZZ |j−ν 2m+1 |≥d
1 X ∆ j −2
≤ 1 − ei2π 2m+1 e−i2π 2m+1 .
22m
j∈{−2m +1,...,2m }
j ∈{−d+1,...,d−1}
/
A.3. QUANTUM PHASE ESTIMATION AND ORDER FINDING 169
By (A.6), therefore3
X −2
1 2 ∆−j
pd ≤ 2π m+1
22m π 2
j∈{−2m +1,...,2m }
j ∈{−d+1,...,d−1}
/
−d 2m
1 X −2
X −2
= (∆ − j) + (∆ − j)
4 j=−2m +1
j=d
m
−d 2
1 X X −2
≤ j −2 + (1 − j)
4 j=−2m +1
j=d
m
2X −1
1
≤ j −2
2
j=d−1
Z ∞
1 dx
≤
2 d−2 x2
1
= .
2 (d − 2)
(A.6) tells us that, with probability ≥ 1 − (d − 2)−1 /2 , testing F̂ −1 Φ̆ϕ w.r.t. the
computational (m + 1)-qubit base gives a state |bi for which
I(b) d
min ϕ − 2π ν − 2π ≤ 2π .
ν∈ZZ 2m+1 2m+1
Now, let x and N be arbitrarily given coprime positive integers. Then the order
finding problem is to determine
n o
def ′
r = min r′ ∈ IN : xr = 1 mod N ,
Defining n o
def
L = min l ∈ IN : N ≤ 2l
and
def
[j mod N ] = min {k ∈ ZZ+ : k = j mod N } ∀ j ∈ ZZ ,
DRAFT, October 17, 2007
3
Note that
1 θ |θ| |θ|
1 − eiθ = sin ≥ √ ≥ ∀ θ ∈ [−π, +π] ,
2 2 2 2 π
since
d θ θ 1 θ 1
sin − √ = cos − √ ≥ 0 ∀ θ ∈ [0, +π] .
dθ 2 2 2 2 2 2 2
170 APPENDIX A.
we have4 ( )
h iE
j
r= x mod N : j ∈ IN
L
and Dh i h iE
xj mod N xk mod N = δjk ∀ j, k ∈ {0, 1, . . . , r − 1} .
L
Therefore the states
r−1 h iE
def 1 X −i 2π s j
Ψs = √ e r xj mod N ∀ s ∈ {0, . . . , r − 1} (A.7)
r j=0 L
1 r−1
X s
h iE
√ e+i 2π r j Ψs = xj mod N ∀ j ∈ {0, . . . , r − 1} .
r s=0 L
1 r−1
X
|1iL = √ Ψs . (A.8)
r s=0
We do not yet know the states Ψs explicitly since we do not yet know r . But we
know that these states exist and have the nice property that they are eigenstates of
the unitary5 L-qubit operator Û characterized by
n o
def |[x y mod N ]iL if y ∈ {0, . . . , N − 1}
Û |yiL = ∀y ∈ 0, . . . , 2L − 1 .
|yi else
More precisely, we have
s
Û Ψs = ei 2π r Ψs ∀ s ∈ {0, . . . , r − 1} .
Therefore, replacing n by L and Ψ̆ϕ by |1iL , in Exercise 25 we get the total output
state6
1 r−1
X
√ Φ̆2π rs ⊗ Ψs .
r s=0
Since the Ψs form an orthonormal subset of the L-qubit state space, we may assume
that the partial state of the system of the first m + 1 qubits is one of the vector
states Φ̆2π rs with equal probability and the results concerning phase estimation show:
y1 6= y2 mod N =⇒ x y1 6= x y2 mod N .
6
Recall (A.3).
A.4. FINITE-DIMENSIONAL QUANTUM KINEMATICS 171
11
Such ensembles arise, e.g., from projective measurements on pure states if the individuals are
not selected according to the ‘measurement’ results.
12
From now on we identify states with their density matrices. Note that
Outline of proof: Thanks to the spectral theorem there are an orthonormal basis
{φ1 , . . . , φn } of H and λ1 , . . . , λn ≥ 0 with
n
X
ρ̂1 = λν |φν ihφν |
ν=1
and hence
n
X
trace (ρ̂1 ρ̂2 ) = λν hφµ | φν ihφν | ρ̂2 φµ i
ν,µ=1
Xn
= λν hφν | ρ̂2 φν i .
ν=1
Therefore, 0 ≤ trace (ρ̂1 ρ̂2 ) ≤ 1 and
trace (ρ̂1 ρ̂2 ) = 1 ⇐⇒ 0 < λν < 1 =⇒ hφν | ρ̂2 φν i = 1 ∀ µ ∈ {1, . . . , n}
⇐⇒ ∃ ν0 ∈ {1, . . . , n} : ρ̂1 = ρ̂2 = |φν0 ihφν0 | .
Outline of proof: Thanks to the spectral theorem there is an ONS {φ1 , . . . , φn′ } ⊂
H with
XN n′
X
|ψk ihψk | = λν |φν ihφν | (A.15)
k=1 ν=1
for suitable λ1 , . . . , λn′ > 0 and, consequently,
N
! N
!
X [
|ψk ihψk | H = span {φk } . (A.16)
k=1 k=1
Then
N
X N
X
2
|hχ | ψk i| = hχ | ψk ihψk | χi
k=1 k=1
Xn′
= λν hχ | φν ihφν | χi
(A.15) ν=1
Xn′
2
= λν |hχ | φν i| ∀χ ∈ H
ν=1
and, consequently,
χ ⊥ ψk ∀ k ∈ {1, . . . , N } ⇐⇒ χ ⊥ φν ∀ ν ∈ {1, . . . , n} ,
i.e. !
′
N
[ n
[
span {ψk } = span {φν } .
k=1 ν=1
N
X
ψk = Uk j ψj′ ∀ k ∈ {1, . . . , N } . (A.18)
j=1
Proof: Assume that (A.17) holds and, as in the proof of Lemma A.4.2, let us choose
an orthonormal basis {φ1 , . . . , φn } ⊂ H and λ1 , . . . , λn′ > 0 for which (A.15) holds.
Then Lemma A.4.2 implies
! ′
[N [n
span {ψk } = span {φν } .
k=1 ν=1
Since the |φν ihφµ | form an ONS w.r.t. the Hilbert-Schmidt scalar product
D E
def
 B̂ = trace († B̂) ∀ Â, B̂ ∈ S(H) , (A.19)
this implies
N
X ∗
ckν ckµ = δνµ ∀ µ, ν ∈ {1, . . . , n′ } ,
k=1
i.e. the
c1ν
cν = ... , ν ∈ {1, . . . , n′ } ,
cN ν
form an orthonormal system in CN . Extending this to an orthonormal basis of CN
we get a unitary N × N -matrix ckν with
N
X p
ψk = ckν +
λ ν φν ∀ k ∈ {1, . . . , N } , (A.20)
ν=1
where
def
λν = 0 for ν > n′ .
ν
Similarly, we get a unitary N × N -matrix c′k with
N
X p
ν
ψk′ = c′k +
λ ν φν ∀ k ∈ {1, . . . , N }
ν=1
and hence
p N
X ν ∗
+
λ ν φν = c′l ψl′ ∀ ν ∈ {1, . . . , N } . (A.21)
l=1
Combining (A.20) with (A.21) we get (A.18) for the unitary matrix with components
N
X
def ν ∗
Uk l = ckν c′l ∀ k, l ∈ {1, . . . , N } .
ν=1
A.4.2 Qubits
Qubits are 2-dimensional quantum systems for which some orthonormal computa-
tional basis {|0i , |1i} of their state space H is chosen. According to the standard
convention
α
ψ= w.r.t. |0i , |1i
β ∀ α, β ∈ C
def
⇐⇒ ψ = α |0i + β |1i
we have
1 0
|0i = , |1i = .
0 1
A11 A12
All  ∈ L(H) may be identified with their matrix w.r.t. the computa-
A21 A22
tional basis:
α A11 A12 α
ψ= =⇒ Â ψ = w.r.t. |0i , |1i .
β A21 A22 β
176 APPENDIX A.
n √ √ o
Here an orthonormal basis w.r.t. the scalar product (A.19) is τ̂ 0 / 2, . . . , τ̂ 3 / 2 ,
where
0 1 0 1 0 1 2 0 −i 3 1 0
τ̂ = τ̂ = τ̂ = τ̂ = (A.22)
0 1 1 0 i 0 0 −1
are the well-known Pauli matrices. Therefore we have
3
1X
 = trace (Âτ̂ ν ) τ̂ ν ∀  ∈ L(H) ,
2 ν=0
especially
1
ρ̂ = 1̂ + ρ · τ̂ ∀ ρ̂ ∈ S(H) ,
2
where the vector15
def
ρ = trace (ρ̂ τ̂ )
fulfills16
|ρ| ≤ 1 , ρ̂2 = ρ̂ ⇐⇒ |ρ| = 1 .
Note that the components of ρ are just expectation values of observables which are
sufficient for quantum state tomography.
Remark: Since
(eϑ,ϕ · τ̂ ) χϑ,ϕ = χϑ,ϕ
holds for
sin ϑ cos ϕ ϑ −i ϕ
def def
e cos 2
If one is only interested in the subsystem S1 of the total system S in state ρ̂ then
it is sufficient to know its partial state 17
n2 D
X E
def def
ρ̂1 = trace 2 (ρ̂) = φ(2) (2)
µ ρ̂ φµ , (A.24)
µ=1
since:
trace ρ̂ Â1 ⊗ 1̂ = trace (ρ̂1 Â1 ) ∀ Â1 ∈ L(H1 ) .
Note that
i.g.
ρ̂ pure 6=⇒ ρ̂1 pure .
Example: If S1 and S2 are qubit systems then for the the Bell state
def 1 1 0 0 1
Ψ− = √ ⊗ − ⊗
2 0 1 1 0
we have ED
1
trace 2 Ψ− 1̂ , Ψ− =
2
i.e. the partial states give no information at all:
ED
1
trace Ψ− Ψ− |ψihψ| ⊗ 1̂ = kψk2 ∀ ψ ∈ C2 .
2
But there are strong (non-classical) correlations between the subsystems,
since
1
Ψ− = √ (ψ ⊗ ψ⊥ − ψ⊥ ⊗ ψ)
2
DRAFT, October 17, 2007
17
The so-called partial trace trace 2 w.r.t. the second factor is the linear mapping of L(H1 ⊗H2 )
into L(H1 ) characterized by
trace 2 |ψ1 ⊗ ψ2 ihψ1′ ⊗ ψ2′ | = hψ2′ | ψ2 i |ψ1 ihψ1′ | ∀ ψ1 , ψ1′ ∈ H1 , ψ2 , ψ2′ ∈ H2 .
| {z }
=trace |ψ2 ihψ2′ |
The partial trace w.r.t. the first factor, written trace 1 , is defined similarly.
178 APPENDIX A.
and hence
ED 1
trace Ψ −
Ψ −
|ψihψ| ⊗ |φihφ| = |hφ | ψ⊥ i|2
2
holds for all normalized ψ, φ ∈ C2 .
with 18
lim kρ̂ − ρ̂N k1 = 0 .
N →∞
N ≤ (dim(H1 ⊗ H2 ))2 .
and, therefore,
trace H1 (ρ̂(1) (1) (2) (2)
ν ρ̂µ ) = trace H2 (ρ̂ν ρ̂µ ) = 1 ∀ ν, µ ∈ {1, . . . , N } .
By by Lemma A.4.1, again, the latter is equivalent to the existence of normed φ(1) ∈
H1 and φ(2) ∈ H2 with
ED
ρ̂(j)
ν = φ
(j)
φ(j) ∀ ν ∈ {1, . . . , N } , j ∈ {1, 2}
implies
|ΨihΨ| = ρ̂(1) ⊗ ρ̂(2)
and hence separability of |ΨihΨ| .
and, therefore,
n1
X ED
trace 2 |ΨihΨ| = hψµ | ψν i φ(1)
ν φ(1)
µ .
ν,µ=1
Thus, with
ψν
def
φ(2)
ν = ∀ ν ∈ {1, . . . , n′ } ,
sν
(A.29) becomes equivalent to (A.27). Since, conversely, (A.27) implies (A.28) the
stated uniqueness properties are obvious.
Remarks:
1. Note that the Bell states (4.55) have Schmidt number 2 and
hence, by Lemma A.4.6, be separable.
2. The vector state
1
|0, 0i + |0, 1i + |1, 0i + |1, 1i ,
2
however, is separable since equal to Ĥ |0i ⊗ Ĥ |0i , where
def 1 def 1
Ĥ |0i = √ |0i + |1i , Ĥ |1i = √ |0i − |1i
2 2
characterizes the unitary Hadamard operator, strongly used in
quantum computing.
3. For mixed states ρ̂ ∈ S(H1 ⊗ H2 ) there is a Schmidt-like decom-
position of the Form
n ′
X
ρ̂ = s ν
|{z}
Â(1) (2)
ν ⊗ Âν
ν=1
>0
Pure states are non-separable iff their partial states are mixed.20 Therefore, the
correlations in non-separable pure states are non-classical.21 Obviously, the partial
DRAFT, October 17, 2007
20
Usually, non-separable states are called entangled; see (Verstraete and Cirac, 2003), however.
21
In a way, also the mixed non-separable states are non-classically correlated (Werner, 1989).
A.4. FINITE-DIMENSIONAL QUANTUM KINEMATICS 181
transpose
n1
X n2
X ED
1 ⊗ T̄ λν1 µ1 ν2 µ2 φ(1) (2)
ν1 ⊗ φν2 φ(1) (2)
µ1 ⊗ φµ2
ν1 ,µ1 =1 ν2 ,µ2 =1
n2
X ED
= λν1 µ1 ν2 µ2 φ(1) (2)
ν1 ⊗ φµ2 φ(1) (2)
µ1 ⊗ φν2
(4.13) ν2 ,µ2 =1
n o
(2)
w.r.t. the orthonormal basis φ1 , . . . , φ(2)
n2 of H2 must be positive for separable
states: !
N T2 N
X X
(1 ⊗ T) λν ρ̂(1)
ν ⊗ ρ̂(2)
ν = λν ρ̂(1) (2)
ν ⊗ T(ρ̂ν ) ≥ 0 .
ν=1 ν=1
Therefore, the mixed Werner states Ŵλ with λ > 1/3 , considered at the end of
Section 4.2.1, are non-separable.22
Outline
n of proof:
o Thanks to the spectral theorem there are an orthonormal basis
(1) (1)
φ1 , . . . , φn of H and λ1 , . . . , λn ≥ 0 with
n
X ED n
X
ρ̂ = λν φ(1)
ν φ(1)
ν , λν = 1 . (A.31)
ν=1 ν=1
Aho, A. V. and Svore, K. M. (2003). Compiling quantum circuits using the Palin-
drome transform. quant-ph/0311008, (1–17). 31
Alber, G., Beth, T., Horodecki, M., Horodecki, P., Horodecki, R., Rötteler, M.,
Weinfurter, H., Werner, R., and Zeilinger, A. (2001). Quantum Information,
volume 173 of Springer Tracts in Modern Physics. Springer. An Introduction
to Basic Theoretical Concepts and Experiments. 3
Aniello, P., Man’ko, V., Marmo, G., A., Porzio, , and Zaccaria, S. S. F. (2003).
Trapped ions interacting with laser fields: a perturbative analysis without ro-
tating wave approximation. quant-ph/0301138, pages 1–26. 82
Barenco, A., Bennet, C., Cleve, R., DiVincenzo, D., Margolus, N., Shor, P., Sleator,
T., Smolin, J., and Weinfurter, H. (1995). Elementary gates for quantum com-
putation. Phys. Rev. A, 52:3457–3467. quant-ph/9503016. 29
Bartlett, S. D., Diamanti, E., Sanders, B. C., and Yamamoto, Y. (2002). Photon
counting schemes and performance of non-deterministic nonlinear gates in linear
optics. quant-ph/0204073, pages 1–9. 19, 55
183
184 BIBLIOGRAPHY
Bennet, C. H., Brassard, G., Crépeau, C., Jozsa, R., Peres, A., and Wootters, W. K.
(1993). Teleporting an unknown quantum state via dual classical and Einstein-
Podolsky-Rosen channels. Phys. Rev. Lett., 70:1895–1899. 26
Bettelli, S., Serafini, L., and Calarco, T. (2001). Toward an architecture for quantum
programming. cs.PL/0103009, pages 1–23.
(http://sra.itc.it/people/serafini/qlang/). 19
Bowmeester, D., Ekert, A., and Zeilinger, A., editors (2000). The Physics of Quan-
tum Information. Springer-Verlag. 3, 26, 124, 161
Boyer, M., Brassard, G., Høyer, P., and Tapp, A. (1998). Tight bounds on quantum
searching. Fortschr. Phys., 46(493–506). quant-ph/9605034. 35, 36
Brukner, C., Pan, J.-W., Simon, C., Weihs, G., and Zeilinger, A. (2003). Proba-
bilistic instantaneous quantum computation. Phys. Rev. A, 67:034304. quant-
ph/0109022. 19, 61
Brukner, C., Zukowski, M., and Zeilinger, A. (2001). The essence of entanglement.
quant-ph/0106119, pages 1–10. 24
Bužek, V. and Šašura, M. (2002). Cold trapped ions as quantum information pro-
cessors. J. Mod. Opt. quant-ph/0112041. 71
Cerf, N. J., Adami, C., and Kwiat, P. G. (1998). Optical simulation of quantum
logic. Phys. Rev. A, 57:R1477–R1480. quant-ph/9706022. 56
Chefles, A., Jozsa, R., and Winter, A. (2003). On the existence of physical trans-
formations between sets of quantum states. quant-ph/0307227, pages 1–8. 142
Chen, J.-L., Fu, L., Ungar, A. A., and Zhao, X.-G. (2002). Geometric observation
for the Bures fidelity between two states of a qubit. Phys. Rev. A, 65:024303.
quant-ph/0112169. 140
Chen, Q., Cheng, J., Wang, K.-L., and Du, J. (2005). Efficient construction of 2-D
cluster states with probabilistic quantum gates. quant-ph/0507066, pages 1–4.
70
Cheng, K.-W. and Tseng, C.-C. (2002). Quantum plain and carry look-ahead adders.
quant-ph/0206028, pages 1–16. 16
Cleve, R., Ekert, A., Macchiavello, C., and Mosca, M. (1998). Quantum algorithms
revisited. Proc. R. Soc. Lond. A, 454:339–354. quant-ph/9708016. 23
Collins, D. and Gisin, N. (2003). A relevant two qubit Bell inequality inequivalent
to the CHSH inequality. quant-ph/0306129, pages 1–3. 147
Davies, E. B. (1976). Quantum Theory of Open Systems. Academic Press. 95, 104
186 BIBLIOGRAPHY
Fattal, D., Diamanti, E., Inoue, K., and Yamamoto, Y. (2003). Quantum telepor-
tation with a quantum dot single photon source. quant-ph/0307105, pages 1–4.
66
Gasparoni, S., Pan, J.-W., Walther, P., Rudolph, T., and Zeilinger, A. (2004). Re-
alization of a photonic CNOT gate sufficient for quantum computation. quant-
ph/0404107, pages 1–4. 71
Gatti, A., Zambrini, R., Miguel, M. S., and Lugiato, L. A. (2003). Multi-photon,
multi-mode polarization entanglement in parametric down-conversion. quant-
ph/0306133, pages 1–22. 121
Giacomini, S., Sciarrino, F., Lombardi, E., and Martini, F. D. (2002). “Active”
teleportation of a quantum bit. Phys. Rev. A, 66:030302. quant-ph/0204158.
26
Gingrich, R. M., Ko, P., Lee, H., Vatan, F., and Dowling, J. P. (2003). An all linear
optical quantum memory based on quantum error correction. Phys. Rev. Lett.,
91:217901. quant-ph/0306098. 121
Gisin, N. and Gisin, B. (2002). A local variable model for entanglement swapping
exploiting the detection loophole. quant-ph/0201077, pages 1–5. 26
Gühne, O., Hyllus, P., Bruß, D., Ekert, A., Lewenstein, M., Macchiavello, C., and
Sanpera, A. (2002). Detection of entanglement with few local measurements.
Phys. Rev. A, 66:062305. quant-ph/020508. 150
Gulde, S., Riebe, M., Lancaster, G. P. T., Becher, C., Eschner, J., Häffner, H.,
Schmidt-Kaler, F., Chuang, I. L., and Blatt, R. (2003). Implementation of the
Deutsch-Jozsa algorithm on an ion-trap quantum computer. Nature, 421:48–50.
23
Gurvits, L. (2002). Quantum matching theory (with new complexity theoretic, com-
binatorial and topological insights on the nature of the quantum entanglement).
quant-ph/0201022, pages 1–10. 147
Ha, K.-C., Kye, S.-H., and Park, Y. S. (2003). Entangled states with positive
partial transpose arising from indecomposable positive linear maps. Phys. Lett.
A, 313:163–174. quant-ph/0305005. 152
Hamming, R. W. (1950). Error detecting and error correcting codes. The Bell System
Technical Journal, 26:147–160. http://www.engelschall.com/u/sb/hamming/.
108
Hayden, P., Jozsa, R., Petz, D., and Winter, A. (2004). Structure of states which
satisfy strong subadditivity of quantum entropy with equality. Commun. Math.
Phys., pages 359–374. quant-ph/0304007.
Hofmann, H. F. and Takeuchi, S. (2002). Quantum phase gate for photonic qubits
using only beab splitters and post-selection. Phys. Rev. A, 66:024308. quant-
ph/0204045. 60, 166
Horodecki, M., Oppenheim, J., and Winter, A. (2005). Quantum information can
be negative. quant-ph/0505062, pages 1–8. 130
Horodecki, P. (1997). Separability criterion and inseparable mixed states with pos-
itive partial transposition. Phys.Lett. A, 232:333–339. quant-ph/9703004. 178
James, D. F. V. (2000). Quantum computation with hot and cold ions: An as-
sessment of proposed schemes. Fortschritte der Physik, 48:811–821. quant-
ph/0003122. 71
Kahn, D. (1967). The Codebreakers: The Story of Secret Writing. Macmillan, New
York. 37
190 BIBLIOGRAPHY
Kaszlikowski, D., Gopinathan, A., Liang, Y. C., Kwek, L. C., and Englert, B.-G.
(2003). How well can you know the edge of a quantum pyramid? quant-
ph/0307086, pages 1–3. 135
Kaye, P. and Mosca, M. (2004). Quantum networks for generating arbitrary quan-
tum states. quant-ph/0407102, pages 1–3. 68
Keyl, M. and Werner, R. F. (2002). How to correct small quantum errors. Lecture
Notes in Physics, 611:263. quant-ph/0206086. 115
Kim, Y.-H., Kulik, S. P., and Shih, Y. (2001). Quantum teleportation with a com-
plete Bell state measurement. Phys. Rev. Lett., 86:1370. quant-ph/0010046.
62, 121
Knill, E., Laflamme, R., and Milburn, G. (2000). Efficient linear optics quantum
computation. Nature, 409:46. quant-ph/0006088. 63
Knill, E., Laflamme, R., and Milburn, G. J. (2001). A scheme for efficient quantum
computation with linear optics. Nature, 409:46–52. 51, 60, 63, 67
Knill, E., Laflamme, R., and Viola, L. (1999). Theory of quantum error correction
for general noise. quant-ph/9908066, pages 1–6. 106
Landauer, R. (1998). Energy needed to send a bit. Proc. R. Soc. Lond. A, 454:305–
311. 15
BIBLIOGRAPHY 191
Metcalf, H. J. and van der Straten, P. (1999). Laser Cooling and Trapping. Springer-
Verlag. 88
Morikoshi, F., Santos, M. F., and Vedral, V. (2003). Accessibility of physical states
and non-uniqueness of entanglement measure. J. Phys. A, 37:5887. quant-
ph/0306032. 162
Munro, W., Nemoto, K., Spiller, T., Barrett, S., Kok, P., and Beausoleil, R. (2005a).
Efficient optical quantum information processing. quant-ph/0506116, pages 1–
10. 59
Munro, W. J., Nemoto, K., and Spiller, T. P. (2005b). Weak nonlinearities: A new
route to optical quantum computation. quant-ph/0507084, pages 1–7. 59
BIBLIOGRAPHY 193
Ohya, M. and Petz, D. (1993). Quantum Entropy and Its Use. Springer-Verlag. 131,
145
Ottaviani, C., Rebic, S., Vitali, D., and Tombesi, P. (2005). Quantum phase gate
operation based on nonlinear optics: Full quantum analysis. quant-ph/0507137,
pages 1–4. 59
Paris, M., Plenio, M., Jonathan, D., Bose, S., and D’Ariano, G. (2000). Optical
Bell measurement by Fock filtering. Physics Letters A, 273:153–158. quant-
ph/9911036. 121
Patel, A. (2001). Quantum algorithms and the genetic code. Pramana, 56:367–381.
quant-ph/0002037.
Peres, A. (2002). How the no-cloning theorem got its name. quant-ph/0205076,
pages 1–4. 18, 91
Perron, O. (1954). Die Lehre von den Kettenbrüchen, volume I: Elementare Ket-
tenbrüche. B.G. Teubner Verlagsgesellschaft, Stuttgart. 46
Petz, D. (2001). Entropy, von Neumann and the von Neumann entropy. math-
ph/0102013, pages 1–10. 131, 145
Pütz, J., editor (1971). Einführung in die Elektronik. Bücher des Wissens. Fischer
Taschenbuch Verlag GmBH, Frankfurt am Main. 11
Ralph, T. C., White, A. G., Munro, W. J., and Milburn, G. J. (2002). Simple
scheme for efficient linear optics quantum gates. Phys. Rev., A65:012314. quant-
ph/0108049. 19, 58, 60
Raussendorf, R., Browne, D. E., and Briegel, H. J. (2002). The one-way quan-
tum computer - a non-network model of quantum computation. J. Mod. Opt.,
49:1299–1306. quant-ph/0108118. 19
Reck, M., Zeilinger, A., Bernstein, H. J., and Bertani, P. (1994). Experimental
realization of any discrete unitary operator. Phys. Rev. Lett., 73:58–61. 28
BIBLIOGRAPHY 195
Shende, V. V., Markov, I. L., and Bullock, S. S. (2004b). On universal gate libraries
and generic minimal two-qubit quantum circuits. Phys. Rev. A, 69:062321.
quant-ph/0308033. 31
Shende, V. V., Prasad, A. K., Markov, I. L., and Hayes, J. P. (2003). Reversible
logic circuit synthesis. IEEE Trans. on CAD, 22:710–722. quant-ph/0207001.
14, 16
Singh, S. (2002). Code Book: The Science of Secrecy from Ancient Egypt to Quantum
Cryptography. Random House Children’s Publishing. 37
Walther, P., Resch, K., Rudolph, T., Schenck, E., Weinfurter, H., Vedral, V., As-
pelmeyer, M., and Zeilinger, A. (2005). Experimental one-way quantum com-
puting. Nature, 434:169–176. quant-ph/0503126. 36, 68
White, A. G., James, D. F. V., Munro, W. J., and Kwiat, P. G. (2001). Exploring
Hilbert space: accurate characterisation of quantum information. Phys. Rev.
A, 64:R030302. quant-ph/0108088. 163
Younes, A. and Miller, J. (2003). Automated method for building CNOT based
quantum circuits for Boolean functions. quant-ph/0304099, pages 1–18. 16
Zhao, Z., Zhang, A.-N., Chen, Y.-A., Zhang, H., Du, J.-F., Yang, T., and Pan, J.-
W. (2005). Experimental demonstration of a non-destructive controlled-NOT
quantum gate for two independent photon-qubits. Phys. Rev. Lett., 94:030501.
quant-ph/0404129. 71
Index
199
200 INDEX
Sleator-Weinfurter construction,
31
stabilizer, 113
codes, 113
state
Bell, 24
mixed, 104
pure, 171
quantum
entangled, 24, 26, 103
separable, 151, 178
Werner, 151
state space, 171
Steane code, 116
Stokes
vector, 176
superoperator, 96
superposition
coherent, 23
teleportation, 26
network, 25
of entanglement, 26
tensor product
formalism of quantum mechanics,
19
Toffoli gate, 14
tomography
quantum state, 176
trace