SlideShare ist ein Scribd-Unternehmen logo
1 von 22
Downloaden Sie, um offline zu lesen
Calcutta University
Computer Science and Engineering

AJ
UM
DA

R

Term Paper - I

IT
AJ
I

T

M

No Cloning Theorem

Ritajit Majumdar

IG
HT

-R

Roll No: 91/CSE/111006
Registration No: 0029169 of 2008-09

Supervisor:

Supervisor:

Guruprasad Kar

Department of Computer
Science and Engineering

CO

PY
R

Physics and Applied
Mathematics Unit

Pritha Banerjee

Indian Statistical Institute,
Kolkata

February 12, 2014

Calcutta University
R
AJ
UM
DA

Abstract

CO

PY
R

IG
HT

-R

IT
AJ
I

T

M

In this report, I present the idea of No Cloning Theorem, which
was proposed by Wootters and Zurek. This theorem essentially
states that non-orthogonal states of a closed quantum system
cannot be reliably distinguished, and hence cannot be copied.
The linearity of quantum mechanics prohibits the presence of a
perfect cloning device. Hence, generally speaking, it is not possible to develop a universal cloning apparatus which can clone
any arbitrary quantum state.
AJ
UM
DA

R

Contents
1 Introduction

3

IG
HT

-R

IT
AJ
I

T

M

2 Introductory Mathematics for Quantum Computation
5
2.1 Hilbert Space . . . . . . . . . . . . . . . . . . . . 5
2.1.1 Linear Vector Space . . . . . . . . . . . . 5
2.1.2 Inner Product Space . . . . . . . . . . . . 6
2.2 Observables and Tensor Product . . . . . . . . . . 8
2.2.1 Observables . . . . . . . . . . . . . . . . . 8
2.2.2 Tensor Products . . . . . . . . . . . . . . 8

CO

PY
R

3 Introductory Quantum Mechanics
3.1 Postulates of Quantum Mechanics
3.1.1 State Space . . . . . . . .
3.1.2 Evolution . . . . . . . . .
3.1.3 Measurement . . . . . . .
3.1.4 Composite System . . . .
3.2 Distinguising Quantum States . .
3.2.1 Orthogonal States . . . . .
3.2.2 Non Orthogonal States . .

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

.
.
.
.
.
.
.
.

10
10
10
11
12
13
13
13
14

4 No Cloning Theorem
15
4.1 No Cloning Theorem . . . . . . . . . . . . . . . . 15
1
4.1.1
4.1.2
4.1.3

Photon Emission . . . . . . . . . . . . . . 15
Linearity of Quantum Mechanics . . . . . 16
A single quantum cannot be cloned . . . . 17
19

CO

PY
R

IG
HT

-R

IT
AJ
I

T

M

AJ
UM
DA

R

5 Conclusion

2
AJ
UM
DA

R

Chapter 1
Introduction

-R

IT
AJ
I

T

M

The modern incarnation of computer science was announced by
the great mathematician Alan Turing. He developed a model
of computation known as Turing Machine. He claimed that if
an algorithm can be performed in a computer, then there is an
equivalent algorithm for the Universal Turing Machine.

CO

PY
R

IG
HT

Furthermore, Moore’s law stated that computer power will
double for constant cost roughly once in every two years. In
spite of dramatic miniaturization in computer technology in last
few decades, our basic understanding of how a computer works is
still the same (i.e. the Turing Machine). However, conventional
approaches to the fabrication of computer technology are beginning to run up against fundamental difficulties of size. Quantum
effects are beginning to interfere in the functioning of electronic
devices as they are made smaller and smaller [1].
One possible solution to the problem posed by the eventual failure of Moore’s law is to move to a different computing paradigm. Richard Feynman first proposed the concept of
a computer which exploits quantum laws. He said “Atoms on
3
small scale behave like nothing on a large scale, for they satisfy
the laws of quantum mechanics. So, as we go down and fiddle
around with the atoms there, we are working with different laws,
and we can expect to do different things”

AJ
UM
DA

R

A quantum computer is not just a computer following quantum laws. Rather it is a machine which can make explicit use
of certain quantum phenomena which are not present in the
classical realm - e.g. - Superposition [3.1.1 State Space], Entanglement [2] etc.

IG
HT

-R

IT
AJ
I

T

M

Recent studies have shown that quantum algorithms are usually faster than classical ones. Quantum Algorithms are essentially parallel. Polynomial time quantum algorithms for some
NP problems (e.g. prime factorization) have been developed.
Quantum Cryptography holds the promise of better (nearly perfect) secrecy than classical cryptography. And information processing using quantum laws are also more efficient than their
classical counterparts.

CO

PY
R

In this report, a basic introductory topic of quantum computation, namely No Cloning Theorem, has been described.
The report starts with the necessary mathematical and physical background and then enters the theorem.

4
AJ
UM
DA

R

Chapter 2

2.1.1

T

Hilbert Space

IT
AJ
I

2.1

M

Introductory Mathematics for
Quantum Computation

Linear Vector Space

CO

PY
R

IG
HT

-R

For Quantum Computation, the vector space of interest is Cn ,
which is the complex vector space of n dimension. The elements
of the space are called vectors, and are represented by the
column matrix
 
v1
v 
 2
.
.
.
vn
The vectors are written as |v , while their complex conjugate
(i.e. the row matrix) is written as v|.
Let |v , |w and |z be three vectors in a space V and α and β
are two scalars (usually complex numbers). Then V is a Linear
Vector Space if the following conditions are satisfied 5
1. Closure: |v + |w ∈ V .
2. Closure: α |v ∈ V .
3. Commutative: |v + |w = |w + |v .

R

4. Associative: α(β |v ) = (αβ) |v

AJ
UM
DA

5. Associative: |v + (|w + |z ) = (|v + |w ) + |z .
6. There is a zero vector such that |v + 0 = |v .

M

7. There is an additive inverse which maps a vector to the zero
vector |v + |−v = 0

IT
AJ
I

T

8. Distributive: α(|v + |w ) = α |v + α |w
9. Distributive: (α + β) |v = α |v + β |v
Inner Product Space

-R

2.1.2

PY
R

IG
HT

An inner product is a linear function which takes as input two
vectors and outputs a complex number. So mathematically inner product is a function that maps from V × V −→ C.

CO

Inner product between two vectors  and |w is computed
|v 
 
v1
w1
v 
w 
 2
 2
as w|v . So if |v =  .  and |w =  . 
.
 . 
.
.
vn
wn
then the inner product

6
AJ
UM
DA

∗
where wi is the complex conjugate of wi .

R

∗
∗
w|v = w1 w2

 
v1
v 
∗  2
· · · wn . . 
.
.
vn

Again, let |v and |w be two vectors and λ is a scalar. A
Linear Vector Space is an Inner Product Space if the following
conditions are satisfied -

M

1. v|λw = λ v|w

IT
AJ
I

T

2. v|w = ( w|v )∗

3. v|v ≥ 0, the value is 0 iff |v = 0

-R

The length of a vector is defined as v =

IG
HT

v|v

PY
R

And the length is called norm. A vector is said to be unit vector or normalised if its norm is 1.

CO

Two vectors whose inner product is zero are said to be orthogonal. A collection of mutually orthogonal, normalised
vectors is called an orthonormal set.
αi |αj = δij ,

where δij

= 0, i = j
= 0, i = j

A linear vector space with inner product is called
a Hilbert Space.
7
2.2
2.2.1

Observables and Tensor Product
Observables

U †U = U U † = I

AJ
UM
DA

R

A quantum state is defined as a vector in Hilbert Space. The operators (e.g time evolution operator, quantum gates) are called
observables. Observables in Quantum mechanics are unitary
matrices. A matrix U is said to unitary if
where U † = (U ∗ )T and I is the identity matrix.

IT
AJ
I

T

M

If a state vector is of dimension n, then the observable operating on it is of dimension n × n.

-R

Operators in quantum mechanics are Hermitian Matrices. A
matrix H is said to be hermitian if
H = H†

Tensor Products

CO

2.2.2

PY
R

IG
HT

Thus, unlike classical gates, quantum gates are reversible.
Operating the same gate twice on the state returns the original
state.

Tensor product is a way of putting vector spaces together to
form a larger vector space. Let V and W be two vector spaces
of dimensions m and n respectively. Then the tensor product
V
W is a vector space of mn dimension [1].
Let A =

a11 a12
a21 a22

and B =

8

b11 b12
b21 b22
T
IT
AJ
I
-R
IG
HT
PY
R
CO

9

R

AJ
UM
DA


b12
b22 

b12 
b22

a12 b12
a12 b22 

a22 b12 
a22 b12

M

Then the tensor product A B is

b11 b12
b11
a11 b21 b22 a12 b21


b b
b
a21 11 12 a22 11
b21 b22
b21

a11 b11 a11 b12 a12 b11
a11 b21 a11 b22 a12 b21
=
a21 b11 a21 b12 a22 b11
a21 b21 a21 b22 a22 b11
AJ
UM
DA

R

Chapter 3

3.1.1

T

Postulates of Quantum Mechanics

IT
AJ
I

3.1

M

Introductory Quantum
Mechanics

State Space

IG
HT

-R

Postulate 1: Associated to any isolated system is a
Hilbert Space called the state space. The system is
completely defined by the state vector, which is a
unit vector in the state space [1].

CO

PY
R

In classical computer, a bit can be either 0 or 1. In quantum
mechanics, the quantum bit or qubit is a vector in the state
space. And a qubit can be in any linear superposition of |0 or
|1 . In general, a qubit is mathematically represented as |ψ = α0 |0 + α1 |1
where α0 and α1 are complex numbers. α0 and α1 are called
the amplitudes of |0 and |1 respectively. The square of the
amplitude, |αi |2 , gives the probability that the system collapses

10
to state |i (this will be further elaborated in the 3rd postulate).
Since the total probability is always 1, hence
|α0 |2 + |α1 |2 = 1

3.1.2

AJ
UM
DA

R

This is called the normalisation condition. Hence, a qubit is
a unit vector in the state space.
Evolution

M

Postulate 2: The evolution of a closed quantum system is described by a unitary transformation [1].

IT
AJ
I

T

If |ψ(t1 ) is the state of the quantum system at time t1 and
|ψ(t2 ) is the state of the system at time t2 , then

-R

|ψ(t2 ) = U (t1 , t2 ) |ψ(t1 )

IG
HT

where U (t1 , t2 ) is a unitary matrix.
Schr¨dinger Equation
o

CO

PY
R

The time evolution of a closed quantum system is given by the
Schr¨dinger equation o
i

d|ψ
dt

= H |ψ

where H is the total enery (kinetic + potential) of the system
and is called the Hamiltonian.
Integrating the equation within the time limits t1 and t2 , we
have |ψ2 = exp −i
11

(t2 −t1 )
H

|ψ1
Now taking U ≡ exp −i
picture of time evolution.

we get back the unitary matrix

Measurement

R

3.1.3

(t2 −t1 )
H

IT
AJ
I

T

M

AJ
UM
DA

Unlike classical physics, measurement in quantum mechanics is
not deterministic. Even if we have the complete knowledge of
a system, we can at most predict the probability of a certain
outcome from a set of possible outcomes. If we have a quantum
state |ψ = α |0 + β |1 , then the probability of getting outcome
|0 is |α|2 and that of |1 is |β|2 . After measurement, the state of
the system collapses to either |0 or |1 with the said probability.

†
p(m) = ψ| Mm Mm |ψ

CO

PY
R

IG
HT

-R

Postulate 3: Quantum measurements are described
by a collection of measurement operators {Mm }.
These are operators acting on the state space of
the system being measured. The index m refers to
the measurement outcomes that may occur in the experiment. If the state of the quantum system is |ψ
immediately before the measurement then the probability that result m occurs is [1]

and the state of the system after measurement is
Mm |ψ
†
ψ| Mm Mm |ψ

The measurement operators satisfy the completeness relation
†
m Mm Mm

12

=I
3.1.4

Composite System

Postulate 4: The state space of a composite physical
system is the tensor product of the state spaces of
the component physical systems [1].

|ψ2

···

|ψn

M

|ψ1

AJ
UM
DA

R

If we have n systems, numbered 1 through n, and the ith
system is prepared in state |ψi , then the composite state of the
total system is

3.2.1

Distinguising Quantum States
Orthogonal States

PY
R

3.2

IG
HT

-R

IT
AJ
I

T

In a classical computer, if we have a RAM of size m and
add another RAM of size n, then the composite size is m + n.
However, from this postulate, it is obvious that in a quantum
computer, if we have a qubit of dimension m and another qubit
of dimension n, then the dimension of the composite system is
mn.

CO

An observable M can be written in the form |m m|. This is
called Spectral Decomposition 1 .
Consider a set of projectors Mi = |ψi ψi | for i = 1, · · · , n
and M0 = I −
1

i=0 |ψi

ψi | (from Completeness Relation)

For further information, see Nielsen, Chuang Page 72

13
So if an orthonormal state |ψi is prepared, then
p(i) = ψi | Mi |ψi = ψi |ψi ψi |ψi = 1

3.2.2

AJ
UM
DA

R

Thus result i occurs with certainty and hence it is possible
to reliably distinguish orthonormal states |ψi .
Non Orthogonal States

M

Consider two quantum states

T

IT
AJ
I

|ψ2

|ψ1 = |0
= α |0 + β |1

-R

If a measurement is performed, then |ψ1 is projected to |0
with probability 1. However, |ψ2 is also projected to |0 with
probability |α|2 .

IG
HT

So, if the outcome is |0 , then it is not possible to say whether
the state was |ψ1 or |ψ2 .

CO

PY
R

Hence, non orthogonal states cannot be reliably distinguished.

14
AJ
UM
DA

R

Chapter 4

4.1

No Cloning Theorem

M

No Cloning Theorem

Photon Emission

IG
HT

4.1.1

-R

IT
AJ
I

T

Possibly the most prominent feature that distinguishes between
classical and quantum information theory is the “no cloning theorem” which prevents in producing perfect copies of an arbitrary
quantum mechanical state [4].

CO

PY
R

When a photon having a definite polarization encounters an excited atom, there is some probability that the atom will emit a
photon due to stimulation. If there is such an emission, then the
second photon is guaranteed to have the same polarization as
the original photon [3].

15
R
AJ
UM
DA

M

img : en.wikipedia.org/wiki/Stimulated emission

Linearity of Quantum Mechanics

-R

4.1.2

IT
AJ
I

T

This phenomena gave rise to the question whether using this
method (or any other method), it is possible to clone a quantum
state.

IG
HT

From the 2nd postulate of quantum mechanics, we have
|ψ(t2 ) = U (t1 , t2 ) |ψ(t1 )

CO

PY
R

Now, from Schr¨dinger equation, it is evident that quantum
o
laws are linear. So if we have any arbitrary quantum state,
|ψ = α |ψ1 + β |ψ2 , and if we take,
U |ψ1 = |φ1 and U |ψ2 = |φ2

then operating U on the state |ψ U |ψ = U (α |ψ1 + β |ψ2 )
= αU |ψ1 + βU |ψ2
= α |φ1 + β |φ2
16
4.1.3

A single quantum cannot be cloned

The proof of this theorem is indirect, i.e. proof by contradiction.
Let us consider |A is a universal quantum cloner. Let |s be
the state of the incident photon. So we should have -

AJ
UM
DA

R

|A |s = |As |ss

M

where |As is the state of the apparatus after operation (we
are not much interested in the state of the apparatus) and |ss
represents the state of the two photons, one original and the
other its copy.

T

Now, let us consider two orthogonal states |0 and |1 . So,

IT
AJ
I

|A |0 = |A0 |00
|A |1 = |A1 |11

IG
HT

-R

So for an arbitrary quantum state |ψ = α |0 + β |1 , we
expect = |Aψ

|A |ψ = |Aψ |ψψ
(α |0 + β |1 )(α |0 + β |1 )

PY
R

= |Aψ (α2 |00 + αβ |01 + αβ |10 + β 2 |11 )

(4.1)

CO

However, from linearity of quantum mechanics, it is evident
that
|A |ψ = |A (α |0 + β |1 )
= α |A |0 + β |A |1
= α |00 + β |11

17

(4.2)
Equations (4.1) and (4.2) will be equal only if αβ = 0. However, for αβ to be 0, either α = 0 or β = 0.

AJ
UM
DA

R

But if α = 0, then the term |00 vanishes in equation (4.1)
and if β = 0, then the term |11 vanishes. Thus the linearity of
quantum mechanics prohibits a perfect copy. Hence, A single
quantum cannot be cloned.

T

M

However, the above argument does not prohibit the copying of orthogonal states. This is because orthogonal states are
distinguishable. Since non-orthogonal states are not reliably distinguishable, we cannot make a perfect copy of them.

CO

PY
R

IG
HT

-R

IT
AJ
I

Hence, in general, the theorem states that it is not possible to
have a universal quantum cloner that can create perfect clones
of any arbitrary quantum state.

18
AJ
UM
DA

R

Chapter 5
Conclusion

IG
HT

-R

IT
AJ
I

T

M

The linearity of quantum mechanics prohibits the existance of a
universal quantum copy machine. This has both advantages and
disadvantages. The disadvantages are immediately prominent.
Unlike classical gates, fan out is not possible in quantum gates.
If a quantum computer is made, copying, at least perfect copying, will not be possible so easily. However, a huge advantage
is observable in quantum cryptography. Hackers cannot make a
copy of the data being sent.

CO

PY
R

An immediate consequence of no-cloning theorem is that information cannot be copied. So for information sending, a protocol named quantum teleportation [5] has been proposed which
states that to send an information, the information at the sender’s
end must be destroyed. Studies are being pursued on performing
partial cloning of a quantum state [4][6][7][8].

19
AJ
UM
DA

R

Bibliography
[1] Quantum Computation and Quantum Information
Nielsen, Chuang

T

M

[2] Einstein, Podolsky, Rosen
PRL Vol 47, May 15, 1935

-R

IT
AJ
I

[3] A single quantum cannot be cloned
Wootters, Zurek
Nature, Vol 299, 1982

IG
HT

[4] S. Bandyopadhyay, G. Kar
arXiv:quant-ph/9902073v3

PY
R

[5] Bennett et. al
PRL Vol 70, number 13, March 1993

CO

[6] R. F. Werner
PRA Vol 58, number 3, September 1998
[7] Buzek, Hillery
PRA Vol 54, number 3, September 1996
[8] Buzek et. al
PRA vol 55, number 5, May 1997

20

Weitere ähnliche Inhalte

Was ist angesagt? (20)

An Introduction to Quantum computing
An Introduction to Quantum computingAn Introduction to Quantum computing
An Introduction to Quantum computing
 
Quantum computers
Quantum computersQuantum computers
Quantum computers
 
Quantum Computing: Welcome to the Future
Quantum Computing: Welcome to the FutureQuantum Computing: Welcome to the Future
Quantum Computing: Welcome to the Future
 
Quantum Cryptography
Quantum CryptographyQuantum Cryptography
Quantum Cryptography
 
Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)Quantam cryptogrphy ppt (1)
Quantam cryptogrphy ppt (1)
 
Quantum Computers
Quantum ComputersQuantum Computers
Quantum Computers
 
Presentation quantum computers
Presentation quantum computersPresentation quantum computers
Presentation quantum computers
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Kristoffer Columbus
Kristoffer ColumbusKristoffer Columbus
Kristoffer Columbus
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum Computing: The Why and How
Quantum Computing: The Why and HowQuantum Computing: The Why and How
Quantum Computing: The Why and How
 
Quantum computer
Quantum computerQuantum computer
Quantum computer
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
What is quantum computing
What is quantum computingWhat is quantum computing
What is quantum computing
 
Quantum Computing
Quantum ComputingQuantum Computing
Quantum Computing
 
Quantum cryptography
Quantum cryptographyQuantum cryptography
Quantum cryptography
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computation - Introduction
Quantum computation - IntroductionQuantum computation - Introduction
Quantum computation - Introduction
 
Ibm quantum computing
Ibm quantum computingIbm quantum computing
Ibm quantum computing
 
quantum computing
quantum computingquantum computing
quantum computing
 

Ähnlich wie No Cloning Theorem with essential Mathematics and Physics

Quantum computing notes_DN_30 1 2023.pdf
Quantum computing notes_DN_30 1 2023.pdfQuantum computing notes_DN_30 1 2023.pdf
Quantum computing notes_DN_30 1 2023.pdfmithilashegaji
 
osama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applicationsosama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applicationsRachitdas2
 
QC - UNIT 1.ppt
QC - UNIT 1.pptQC - UNIT 1.ppt
QC - UNIT 1.pptkhan188474
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum ComputingGDSC PJATK
 
A Stochastic Limit Approach To The SAT Problem
A Stochastic Limit Approach To The SAT ProblemA Stochastic Limit Approach To The SAT Problem
A Stochastic Limit Approach To The SAT ProblemValerie Felton
 
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHMCOMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHMcsitconf
 
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHMCOMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHMcscpconf
 
THE RESEARCH OF QUANTUM PHASE ESTIMATION ALGORITHM
THE RESEARCH OF QUANTUM PHASE ESTIMATION ALGORITHMTHE RESEARCH OF QUANTUM PHASE ESTIMATION ALGORITHM
THE RESEARCH OF QUANTUM PHASE ESTIMATION ALGORITHMIJCSEA Journal
 
Basics of Quantum Mechanics-II.pptx
Basics of Quantum Mechanics-II.pptxBasics of Quantum Mechanics-II.pptx
Basics of Quantum Mechanics-II.pptxGulshan Kumar
 
A Survey Paper on Different Encoding Techniques Based on Quantum Computing
A Survey Paper on Different Encoding Techniques Based on Quantum ComputingA Survey Paper on Different Encoding Techniques Based on Quantum Computing
A Survey Paper on Different Encoding Techniques Based on Quantum ComputingIRJET Journal
 
Quantum computing
Quantum computingQuantum computing
Quantum computingRitwik MG
 
Fundamentals of quantum computing part i rev
Fundamentals of quantum computing   part i revFundamentals of quantum computing   part i rev
Fundamentals of quantum computing part i revPRADOSH K. ROY
 
MMath Paper, Canlin Zhang
MMath Paper, Canlin ZhangMMath Paper, Canlin Zhang
MMath Paper, Canlin Zhangcanlin zhang
 
Semi-Classical Transport Theory.ppt
Semi-Classical Transport Theory.pptSemi-Classical Transport Theory.ppt
Semi-Classical Transport Theory.pptVivekDixit100
 
Quantum Computation simplified.pptx
Quantum Computation simplified.pptxQuantum Computation simplified.pptx
Quantum Computation simplified.pptxSundarappanKathiresa
 
Quantum Computing 101, Part 1 - Hello Quantum World
Quantum Computing 101, Part 1 - Hello Quantum WorldQuantum Computing 101, Part 1 - Hello Quantum World
Quantum Computing 101, Part 1 - Hello Quantum WorldAaronTurner9
 

Ähnlich wie No Cloning Theorem with essential Mathematics and Physics (20)

Quantum computing notes_DN_30 1 2023.pdf
Quantum computing notes_DN_30 1 2023.pdfQuantum computing notes_DN_30 1 2023.pdf
Quantum computing notes_DN_30 1 2023.pdf
 
osama-quantum-computing.ppt
osama-quantum-computing.pptosama-quantum-computing.ppt
osama-quantum-computing.ppt
 
osama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applicationsosama-quantum-computing and its uses and applications
osama-quantum-computing and its uses and applications
 
QC - UNIT 1.ppt
QC - UNIT 1.pptQC - UNIT 1.ppt
QC - UNIT 1.ppt
 
MASTER_THESIS-libre
MASTER_THESIS-libreMASTER_THESIS-libre
MASTER_THESIS-libre
 
Introduction to Quantum Computing
Introduction to Quantum ComputingIntroduction to Quantum Computing
Introduction to Quantum Computing
 
A Stochastic Limit Approach To The SAT Problem
A Stochastic Limit Approach To The SAT ProblemA Stochastic Limit Approach To The SAT Problem
A Stochastic Limit Approach To The SAT Problem
 
quantum-computing.ppt
quantum-computing.pptquantum-computing.ppt
quantum-computing.ppt
 
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHMCOMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
 
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHMCOMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
COMPUTATIONAL PERFORMANCE OF QUANTUM PHASE ESTIMATION ALGORITHM
 
THE RESEARCH OF QUANTUM PHASE ESTIMATION ALGORITHM
THE RESEARCH OF QUANTUM PHASE ESTIMATION ALGORITHMTHE RESEARCH OF QUANTUM PHASE ESTIMATION ALGORITHM
THE RESEARCH OF QUANTUM PHASE ESTIMATION ALGORITHM
 
Basics of Quantum Mechanics-II.pptx
Basics of Quantum Mechanics-II.pptxBasics of Quantum Mechanics-II.pptx
Basics of Quantum Mechanics-II.pptx
 
A Survey Paper on Different Encoding Techniques Based on Quantum Computing
A Survey Paper on Different Encoding Techniques Based on Quantum ComputingA Survey Paper on Different Encoding Techniques Based on Quantum Computing
A Survey Paper on Different Encoding Techniques Based on Quantum Computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Quantum computing
Quantum computingQuantum computing
Quantum computing
 
Fundamentals of quantum computing part i rev
Fundamentals of quantum computing   part i revFundamentals of quantum computing   part i rev
Fundamentals of quantum computing part i rev
 
MMath Paper, Canlin Zhang
MMath Paper, Canlin ZhangMMath Paper, Canlin Zhang
MMath Paper, Canlin Zhang
 
Semi-Classical Transport Theory.ppt
Semi-Classical Transport Theory.pptSemi-Classical Transport Theory.ppt
Semi-Classical Transport Theory.ppt
 
Quantum Computation simplified.pptx
Quantum Computation simplified.pptxQuantum Computation simplified.pptx
Quantum Computation simplified.pptx
 
Quantum Computing 101, Part 1 - Hello Quantum World
Quantum Computing 101, Part 1 - Hello Quantum WorldQuantum Computing 101, Part 1 - Hello Quantum World
Quantum Computing 101, Part 1 - Hello Quantum World
 

Kürzlich hochgeladen

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...Postal Advocate Inc.
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPCeline George
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxCarlos105
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfSpandanaRallapalli
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceSamikshaHamane
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Celine George
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONHumphrey A Beña
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfphamnguyenenglishnb
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptxSherlyMaeNeri
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTiammrhaywood
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parentsnavabharathschool99
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 

Kürzlich hochgeladen (20)

USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
USPS® Forced Meter Migration - How to Know if Your Postage Meter Will Soon be...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
What is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERPWhat is Model Inheritance in Odoo 17 ERP
What is Model Inheritance in Odoo 17 ERP
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptxBarangay Council for the Protection of Children (BCPC) Orientation.pptx
Barangay Council for the Protection of Children (BCPC) Orientation.pptx
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
ACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdfACC 2024 Chronicles. Cardiology. Exam.pdf
ACC 2024 Chronicles. Cardiology. Exam.pdf
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Roles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in PharmacovigilanceRoles & Responsibilities in Pharmacovigilance
Roles & Responsibilities in Pharmacovigilance
 
Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17Field Attribute Index Feature in Odoo 17
Field Attribute Index Feature in Odoo 17
 
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATIONTHEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
THEORIES OF ORGANIZATION-PUBLIC ADMINISTRATION
 
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdfAMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
AMERICAN LANGUAGE HUB_Level2_Student'sBook_Answerkey.pdf
 
Judging the Relevance and worth of ideas part 2.pptx
Judging the Relevance  and worth of ideas part 2.pptxJudging the Relevance  and worth of ideas part 2.pptx
Judging the Relevance and worth of ideas part 2.pptx
 
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPTECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
ECONOMIC CONTEXT - LONG FORM TV DRAMA - PPT
 
Choosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for ParentsChoosing the Right CBSE School A Comprehensive Guide for Parents
Choosing the Right CBSE School A Comprehensive Guide for Parents
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 

No Cloning Theorem with essential Mathematics and Physics

  • 1. Calcutta University Computer Science and Engineering AJ UM DA R Term Paper - I IT AJ I T M No Cloning Theorem Ritajit Majumdar IG HT -R Roll No: 91/CSE/111006 Registration No: 0029169 of 2008-09 Supervisor: Supervisor: Guruprasad Kar Department of Computer Science and Engineering CO PY R Physics and Applied Mathematics Unit Pritha Banerjee Indian Statistical Institute, Kolkata February 12, 2014 Calcutta University
  • 2. R AJ UM DA Abstract CO PY R IG HT -R IT AJ I T M In this report, I present the idea of No Cloning Theorem, which was proposed by Wootters and Zurek. This theorem essentially states that non-orthogonal states of a closed quantum system cannot be reliably distinguished, and hence cannot be copied. The linearity of quantum mechanics prohibits the presence of a perfect cloning device. Hence, generally speaking, it is not possible to develop a universal cloning apparatus which can clone any arbitrary quantum state.
  • 3. AJ UM DA R Contents 1 Introduction 3 IG HT -R IT AJ I T M 2 Introductory Mathematics for Quantum Computation 5 2.1 Hilbert Space . . . . . . . . . . . . . . . . . . . . 5 2.1.1 Linear Vector Space . . . . . . . . . . . . 5 2.1.2 Inner Product Space . . . . . . . . . . . . 6 2.2 Observables and Tensor Product . . . . . . . . . . 8 2.2.1 Observables . . . . . . . . . . . . . . . . . 8 2.2.2 Tensor Products . . . . . . . . . . . . . . 8 CO PY R 3 Introductory Quantum Mechanics 3.1 Postulates of Quantum Mechanics 3.1.1 State Space . . . . . . . . 3.1.2 Evolution . . . . . . . . . 3.1.3 Measurement . . . . . . . 3.1.4 Composite System . . . . 3.2 Distinguising Quantum States . . 3.2.1 Orthogonal States . . . . . 3.2.2 Non Orthogonal States . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 10 10 11 12 13 13 13 14 4 No Cloning Theorem 15 4.1 No Cloning Theorem . . . . . . . . . . . . . . . . 15 1
  • 4. 4.1.1 4.1.2 4.1.3 Photon Emission . . . . . . . . . . . . . . 15 Linearity of Quantum Mechanics . . . . . 16 A single quantum cannot be cloned . . . . 17 19 CO PY R IG HT -R IT AJ I T M AJ UM DA R 5 Conclusion 2
  • 5. AJ UM DA R Chapter 1 Introduction -R IT AJ I T M The modern incarnation of computer science was announced by the great mathematician Alan Turing. He developed a model of computation known as Turing Machine. He claimed that if an algorithm can be performed in a computer, then there is an equivalent algorithm for the Universal Turing Machine. CO PY R IG HT Furthermore, Moore’s law stated that computer power will double for constant cost roughly once in every two years. In spite of dramatic miniaturization in computer technology in last few decades, our basic understanding of how a computer works is still the same (i.e. the Turing Machine). However, conventional approaches to the fabrication of computer technology are beginning to run up against fundamental difficulties of size. Quantum effects are beginning to interfere in the functioning of electronic devices as they are made smaller and smaller [1]. One possible solution to the problem posed by the eventual failure of Moore’s law is to move to a different computing paradigm. Richard Feynman first proposed the concept of a computer which exploits quantum laws. He said “Atoms on 3
  • 6. small scale behave like nothing on a large scale, for they satisfy the laws of quantum mechanics. So, as we go down and fiddle around with the atoms there, we are working with different laws, and we can expect to do different things” AJ UM DA R A quantum computer is not just a computer following quantum laws. Rather it is a machine which can make explicit use of certain quantum phenomena which are not present in the classical realm - e.g. - Superposition [3.1.1 State Space], Entanglement [2] etc. IG HT -R IT AJ I T M Recent studies have shown that quantum algorithms are usually faster than classical ones. Quantum Algorithms are essentially parallel. Polynomial time quantum algorithms for some NP problems (e.g. prime factorization) have been developed. Quantum Cryptography holds the promise of better (nearly perfect) secrecy than classical cryptography. And information processing using quantum laws are also more efficient than their classical counterparts. CO PY R In this report, a basic introductory topic of quantum computation, namely No Cloning Theorem, has been described. The report starts with the necessary mathematical and physical background and then enters the theorem. 4
  • 7. AJ UM DA R Chapter 2 2.1.1 T Hilbert Space IT AJ I 2.1 M Introductory Mathematics for Quantum Computation Linear Vector Space CO PY R IG HT -R For Quantum Computation, the vector space of interest is Cn , which is the complex vector space of n dimension. The elements of the space are called vectors, and are represented by the column matrix   v1 v   2 . . . vn The vectors are written as |v , while their complex conjugate (i.e. the row matrix) is written as v|. Let |v , |w and |z be three vectors in a space V and α and β are two scalars (usually complex numbers). Then V is a Linear Vector Space if the following conditions are satisfied 5
  • 8. 1. Closure: |v + |w ∈ V . 2. Closure: α |v ∈ V . 3. Commutative: |v + |w = |w + |v . R 4. Associative: α(β |v ) = (αβ) |v AJ UM DA 5. Associative: |v + (|w + |z ) = (|v + |w ) + |z . 6. There is a zero vector such that |v + 0 = |v . M 7. There is an additive inverse which maps a vector to the zero vector |v + |−v = 0 IT AJ I T 8. Distributive: α(|v + |w ) = α |v + α |w 9. Distributive: (α + β) |v = α |v + β |v Inner Product Space -R 2.1.2 PY R IG HT An inner product is a linear function which takes as input two vectors and outputs a complex number. So mathematically inner product is a function that maps from V × V −→ C. CO Inner product between two vectors  and |w is computed |v    v1 w1 v  w   2  2 as w|v . So if |v =  .  and |w =  .  .  .  . . vn wn then the inner product 6
  • 9. AJ UM DA ∗ where wi is the complex conjugate of wi . R ∗ ∗ w|v = w1 w2   v1 v  ∗  2 · · · wn . .  . . vn Again, let |v and |w be two vectors and λ is a scalar. A Linear Vector Space is an Inner Product Space if the following conditions are satisfied - M 1. v|λw = λ v|w IT AJ I T 2. v|w = ( w|v )∗ 3. v|v ≥ 0, the value is 0 iff |v = 0 -R The length of a vector is defined as v = IG HT v|v PY R And the length is called norm. A vector is said to be unit vector or normalised if its norm is 1. CO Two vectors whose inner product is zero are said to be orthogonal. A collection of mutually orthogonal, normalised vectors is called an orthonormal set. αi |αj = δij , where δij = 0, i = j = 0, i = j A linear vector space with inner product is called a Hilbert Space. 7
  • 10. 2.2 2.2.1 Observables and Tensor Product Observables U †U = U U † = I AJ UM DA R A quantum state is defined as a vector in Hilbert Space. The operators (e.g time evolution operator, quantum gates) are called observables. Observables in Quantum mechanics are unitary matrices. A matrix U is said to unitary if where U † = (U ∗ )T and I is the identity matrix. IT AJ I T M If a state vector is of dimension n, then the observable operating on it is of dimension n × n. -R Operators in quantum mechanics are Hermitian Matrices. A matrix H is said to be hermitian if H = H† Tensor Products CO 2.2.2 PY R IG HT Thus, unlike classical gates, quantum gates are reversible. Operating the same gate twice on the state returns the original state. Tensor product is a way of putting vector spaces together to form a larger vector space. Let V and W be two vector spaces of dimensions m and n respectively. Then the tensor product V W is a vector space of mn dimension [1]. Let A = a11 a12 a21 a22 and B = 8 b11 b12 b21 b22
  • 11. T IT AJ I -R IG HT PY R CO 9 R AJ UM DA  b12 b22   b12  b22  a12 b12 a12 b22   a22 b12  a22 b12 M Then the tensor product A B is  b11 b12 b11 a11 b21 b22 a12 b21   b b b a21 11 12 a22 11 b21 b22 b21  a11 b11 a11 b12 a12 b11 a11 b21 a11 b22 a12 b21 = a21 b11 a21 b12 a22 b11 a21 b21 a21 b22 a22 b11
  • 12. AJ UM DA R Chapter 3 3.1.1 T Postulates of Quantum Mechanics IT AJ I 3.1 M Introductory Quantum Mechanics State Space IG HT -R Postulate 1: Associated to any isolated system is a Hilbert Space called the state space. The system is completely defined by the state vector, which is a unit vector in the state space [1]. CO PY R In classical computer, a bit can be either 0 or 1. In quantum mechanics, the quantum bit or qubit is a vector in the state space. And a qubit can be in any linear superposition of |0 or |1 . In general, a qubit is mathematically represented as |ψ = α0 |0 + α1 |1 where α0 and α1 are complex numbers. α0 and α1 are called the amplitudes of |0 and |1 respectively. The square of the amplitude, |αi |2 , gives the probability that the system collapses 10
  • 13. to state |i (this will be further elaborated in the 3rd postulate). Since the total probability is always 1, hence |α0 |2 + |α1 |2 = 1 3.1.2 AJ UM DA R This is called the normalisation condition. Hence, a qubit is a unit vector in the state space. Evolution M Postulate 2: The evolution of a closed quantum system is described by a unitary transformation [1]. IT AJ I T If |ψ(t1 ) is the state of the quantum system at time t1 and |ψ(t2 ) is the state of the system at time t2 , then -R |ψ(t2 ) = U (t1 , t2 ) |ψ(t1 ) IG HT where U (t1 , t2 ) is a unitary matrix. Schr¨dinger Equation o CO PY R The time evolution of a closed quantum system is given by the Schr¨dinger equation o i d|ψ dt = H |ψ where H is the total enery (kinetic + potential) of the system and is called the Hamiltonian. Integrating the equation within the time limits t1 and t2 , we have |ψ2 = exp −i 11 (t2 −t1 ) H |ψ1
  • 14. Now taking U ≡ exp −i picture of time evolution. we get back the unitary matrix Measurement R 3.1.3 (t2 −t1 ) H IT AJ I T M AJ UM DA Unlike classical physics, measurement in quantum mechanics is not deterministic. Even if we have the complete knowledge of a system, we can at most predict the probability of a certain outcome from a set of possible outcomes. If we have a quantum state |ψ = α |0 + β |1 , then the probability of getting outcome |0 is |α|2 and that of |1 is |β|2 . After measurement, the state of the system collapses to either |0 or |1 with the said probability. † p(m) = ψ| Mm Mm |ψ CO PY R IG HT -R Postulate 3: Quantum measurements are described by a collection of measurement operators {Mm }. These are operators acting on the state space of the system being measured. The index m refers to the measurement outcomes that may occur in the experiment. If the state of the quantum system is |ψ immediately before the measurement then the probability that result m occurs is [1] and the state of the system after measurement is Mm |ψ † ψ| Mm Mm |ψ The measurement operators satisfy the completeness relation † m Mm Mm 12 =I
  • 15. 3.1.4 Composite System Postulate 4: The state space of a composite physical system is the tensor product of the state spaces of the component physical systems [1]. |ψ2 ··· |ψn M |ψ1 AJ UM DA R If we have n systems, numbered 1 through n, and the ith system is prepared in state |ψi , then the composite state of the total system is 3.2.1 Distinguising Quantum States Orthogonal States PY R 3.2 IG HT -R IT AJ I T In a classical computer, if we have a RAM of size m and add another RAM of size n, then the composite size is m + n. However, from this postulate, it is obvious that in a quantum computer, if we have a qubit of dimension m and another qubit of dimension n, then the dimension of the composite system is mn. CO An observable M can be written in the form |m m|. This is called Spectral Decomposition 1 . Consider a set of projectors Mi = |ψi ψi | for i = 1, · · · , n and M0 = I − 1 i=0 |ψi ψi | (from Completeness Relation) For further information, see Nielsen, Chuang Page 72 13
  • 16. So if an orthonormal state |ψi is prepared, then p(i) = ψi | Mi |ψi = ψi |ψi ψi |ψi = 1 3.2.2 AJ UM DA R Thus result i occurs with certainty and hence it is possible to reliably distinguish orthonormal states |ψi . Non Orthogonal States M Consider two quantum states T IT AJ I |ψ2 |ψ1 = |0 = α |0 + β |1 -R If a measurement is performed, then |ψ1 is projected to |0 with probability 1. However, |ψ2 is also projected to |0 with probability |α|2 . IG HT So, if the outcome is |0 , then it is not possible to say whether the state was |ψ1 or |ψ2 . CO PY R Hence, non orthogonal states cannot be reliably distinguished. 14
  • 17. AJ UM DA R Chapter 4 4.1 No Cloning Theorem M No Cloning Theorem Photon Emission IG HT 4.1.1 -R IT AJ I T Possibly the most prominent feature that distinguishes between classical and quantum information theory is the “no cloning theorem” which prevents in producing perfect copies of an arbitrary quantum mechanical state [4]. CO PY R When a photon having a definite polarization encounters an excited atom, there is some probability that the atom will emit a photon due to stimulation. If there is such an emission, then the second photon is guaranteed to have the same polarization as the original photon [3]. 15
  • 18. R AJ UM DA M img : en.wikipedia.org/wiki/Stimulated emission Linearity of Quantum Mechanics -R 4.1.2 IT AJ I T This phenomena gave rise to the question whether using this method (or any other method), it is possible to clone a quantum state. IG HT From the 2nd postulate of quantum mechanics, we have |ψ(t2 ) = U (t1 , t2 ) |ψ(t1 ) CO PY R Now, from Schr¨dinger equation, it is evident that quantum o laws are linear. So if we have any arbitrary quantum state, |ψ = α |ψ1 + β |ψ2 , and if we take, U |ψ1 = |φ1 and U |ψ2 = |φ2 then operating U on the state |ψ U |ψ = U (α |ψ1 + β |ψ2 ) = αU |ψ1 + βU |ψ2 = α |φ1 + β |φ2 16
  • 19. 4.1.3 A single quantum cannot be cloned The proof of this theorem is indirect, i.e. proof by contradiction. Let us consider |A is a universal quantum cloner. Let |s be the state of the incident photon. So we should have - AJ UM DA R |A |s = |As |ss M where |As is the state of the apparatus after operation (we are not much interested in the state of the apparatus) and |ss represents the state of the two photons, one original and the other its copy. T Now, let us consider two orthogonal states |0 and |1 . So, IT AJ I |A |0 = |A0 |00 |A |1 = |A1 |11 IG HT -R So for an arbitrary quantum state |ψ = α |0 + β |1 , we expect = |Aψ |A |ψ = |Aψ |ψψ (α |0 + β |1 )(α |0 + β |1 ) PY R = |Aψ (α2 |00 + αβ |01 + αβ |10 + β 2 |11 ) (4.1) CO However, from linearity of quantum mechanics, it is evident that |A |ψ = |A (α |0 + β |1 ) = α |A |0 + β |A |1 = α |00 + β |11 17 (4.2)
  • 20. Equations (4.1) and (4.2) will be equal only if αβ = 0. However, for αβ to be 0, either α = 0 or β = 0. AJ UM DA R But if α = 0, then the term |00 vanishes in equation (4.1) and if β = 0, then the term |11 vanishes. Thus the linearity of quantum mechanics prohibits a perfect copy. Hence, A single quantum cannot be cloned. T M However, the above argument does not prohibit the copying of orthogonal states. This is because orthogonal states are distinguishable. Since non-orthogonal states are not reliably distinguishable, we cannot make a perfect copy of them. CO PY R IG HT -R IT AJ I Hence, in general, the theorem states that it is not possible to have a universal quantum cloner that can create perfect clones of any arbitrary quantum state. 18
  • 21. AJ UM DA R Chapter 5 Conclusion IG HT -R IT AJ I T M The linearity of quantum mechanics prohibits the existance of a universal quantum copy machine. This has both advantages and disadvantages. The disadvantages are immediately prominent. Unlike classical gates, fan out is not possible in quantum gates. If a quantum computer is made, copying, at least perfect copying, will not be possible so easily. However, a huge advantage is observable in quantum cryptography. Hackers cannot make a copy of the data being sent. CO PY R An immediate consequence of no-cloning theorem is that information cannot be copied. So for information sending, a protocol named quantum teleportation [5] has been proposed which states that to send an information, the information at the sender’s end must be destroyed. Studies are being pursued on performing partial cloning of a quantum state [4][6][7][8]. 19
  • 22. AJ UM DA R Bibliography [1] Quantum Computation and Quantum Information Nielsen, Chuang T M [2] Einstein, Podolsky, Rosen PRL Vol 47, May 15, 1935 -R IT AJ I [3] A single quantum cannot be cloned Wootters, Zurek Nature, Vol 299, 1982 IG HT [4] S. Bandyopadhyay, G. Kar arXiv:quant-ph/9902073v3 PY R [5] Bennett et. al PRL Vol 70, number 13, March 1993 CO [6] R. F. Werner PRA Vol 58, number 3, September 1998 [7] Buzek, Hillery PRA Vol 54, number 3, September 1996 [8] Buzek et. al PRA vol 55, number 5, May 1997 20