You are on page 1of 326
ee eee Experimental demonstration of the breathing mode (left) and the centre-of-mass motion (right) of a string of 7 ions which form an array of 7 qubits. The figures are compilations of a sequence of snapshots taken of the string of ions (see Chapter 5). Figures by J. Eschner, F Schmidt-Kaler, R. Blatt, Institut fiir Experimentalphysik, Universitit Innsbruck. Dirk Bouwmeester Artur Ekert Anton Zeilinger (Eds.) The Physics of Quantum Information Quantum Cryptography Quantum Teleportation & Quantum Computation & o S With 195 Figures SQ © £ 2 909 6 Springer Inventar-Nr.: 2¢04— BLY Dr. Dirk Bouwmeester Prof. Artur Ekert Centre for Quantum Computation Clarendon Laboratory University of Oxford Parks Road Oxford OX: 3PU United Kingdom Prof. Anton Zeilinger Institut flr Experimentalphysik University of Vienna Boltzmanngasse 5 1090 Vienna Austria Cover picture: Photo by P. Kwiat and M. Reck, © Institut fiir sande University of Vienna OS we Library of Congress Cataloging-in-Publication Data applied for. S Die Deutsche Bibliothek - CIP-Einheitsaufnahme “The physics of quantum information : quantum cryptograp! teleportation, quantum computation / Dirk Bouwmeester Berlin s Heidelberg s New York ; Barcelona ; Hong Kong 5 Milan ; Paris ; Singapore ; Tokyo : Springer, 2000 ISBN 3-540-66778-4 ISBN 3-540-66778-4 Springer-Verlag Berli First Edition 2000. Second Printing 2 This work is subject to copyright. All ri reserved, whether the whole or part of the material is concerned, specifically the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfilm or in any other way, and storage in data banks. Duplication of this publication or parts thereof is permitted only under the provisions of the German Copyright Law of September 9, 1965, in its current version, and permission for use must always be obtained from Springer-Verlag, Violations are liable for prosecution under the German Copyright Law. Springer-Verlag Berlin Heidelberg New York a member of BertelsmannSpringer Science+Business Media GmbH © Springer-Verlag Berlin Heidelberg 2000 Printed in Germany ‘The use of general descriptive names, registered names, trademarks, etc. in this publication does not imply, even in the absence of a specific statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Camera-ready Cover desig y by the editors using a Springer TX macro package. rich Kirchner, Heidelberg SPIN: 10793524 56/311 - 5 4 3 2 1 Printed onacid-free paper Preface Information is stored, transmitted and processed by physical means. Thus, the concept of information and computation can be formulated in the con- text of a physical theory and the study of information requires ultimately experimentation. This sentence, innocuous at first glance, leads to non-trivial consequences. Following Moore's law, about every 18 months microprocessors double their speed and, it seems, the only way to make them signifieantly faster is to make them smaller. In the not too distant future they h the point where the logic gates are so small that they con: only a few atoms each. Then quantum-mechanical effects will becomé ortant. Thus, if computers are to continue to become faster (and thdfetdye smaller), new, quantim technology must replace or supplement, f&hat/we have now. But it turns out that such technology can offer mudifiore than smaller and faster microprocessors. Several recent theoretica ilts have shown that quantum effects may be harnessed to providelGusitatively new modes of communication and computation, in some caeSstiuch more powerful than their classical counterparts. ‘This new quantum technology is being ) two decades have witnessed experiments\i different kinds were controlled and m; sion. Many “gedanken” experiments mechanics, have been carried o my in many laboratories. The last which single quantum particles of ited with an unprecedented preci- mous in the early days of quantum experimental techniques now make it possible to store and procesyitformation encoded in individual quantum systems. As a result we haveawew, fledgling field of quantum information processing that represents a highly fertile synthesis of the principles of quan- tum physics with those of computer and information science. Its scope ranges from providing a new perspective on fundamental issues about the nature of physical law to investigating the potential commercial exploitation by the computing and communications industries. As part of the worldwide effort in the field, the European Commission, within the framework of the TMR (Training and Mobility of Researchers) programme, is supporting a network entitled “The Physics of Quantum In- formation”. The chapters in this book are mainly written by various members of the network in different forms of collaboration, and they are all intended VI Preface to give a didactic introduction to essential, new areas. In addition, several sections present important achievements by researchers outside the TMR net- work. However, it was not our aim to write a monograph giving a complete overview of the field. Research in this field has become very active, and any comprehensive review of the field would be obsolete in a short time. The topics that are covered by this book include theoretical and experimental aspects of quantum entanglement, quantum cryptography, quantum telepor- tation, quantum computation, quantum algorithms, quantum-state decoher- ence, quantum error correction, and quantum communication. We hope that this book will be a valuable contribution to the literature for all those who have a modest background in quantum mechanics and a genuine interest in the fascinating possibilities that it is offering us. We are very grateful to Thomas Jennewein for the numerous figures that he drew for this book Oxford, Vienna, March 2000 Dirk ruwmeester tur Ekert n Zeilinger a & ° Contents 2.6 1. The Physics of Quantum Information: Basic Concepts 1 LL Quantum Superposition . 1 12 Qubits .. S L3. Single-Qubit ‘Transformations . 4 14 Entanglement ............. 7 1.5 Entanglement and Quantum Indistinguishability. 9 1.6 The Controlled NOT Gate. ....... 1 1.7 The EPR Argument and Bell’s Soe 12 1.8 Comment se is 14 2. Quantum Cryptography : we 15 2.1 What is Wrong with Clas ey : 15 2.1.1 From SCYTALE to ENIGMA, : 15 2.1.2 Keys and Their Distribution 16 Public Keys and Quantum Cryptography . 19 2.1.4 Authentication: How to R ‘ise Cinderella ? 2.2 Quantum Key Distribution . 2.2.L Preliminaria ...... s Security in Non-ort 2.3 24 Security Criteria Quantum Eavesdropping - arror Correction . VII Contents 2.6.2. Phase Encoding ...-.-- 2.6.3 Entanglement-Based Quantum Cryptography . 07 Conchading Remit 3. Quantum Dense Coding and Quantum Teleportation 3.1 Introduction 3.2 Quantum Dense Coding Protocol 3.3 Quantum Teleportation Protocol . 3.4 Sources of Entangled Photons ...... 3.4.1 Parametric Down-Conversion . 3.4.2 Time Entanglement...... 3.4.3 Momentum Entanglement 3.4.4 Polarisation Entanglement 3.5 Bell-State Analyser 3.5.1. Photon Statistics at a Beamsplitter . 3.6 Experimental Dense Coding with Qubits . 3.7 Experimental Quantum Teleportation of Qubits 3.7.1 Experimental Results .............-+ 3.7.2 Teleportation of Entanglement 3.7.3 Concluding Remarks and Prospects 3.8 A Two-Particle Scheme for Quantum Tel 3.9 Teleportation of Continuous Quantum 3.9.1 Employing Position and Mom Entanglement ... 3.9.2. Quantum Optical ImplementafionS. ......... 3.10 Entanglement Swapping: Teleport of Entanglement . 3.11 Applications of Entanglement S: coos 3.11.1 Quantum Telephone Exthange 3.11.2 Speeding up the Dis 2 of Entanglement 3.11.3 Correction of Ampli rors Developed due to Propagati@a >... 6.2.0... ee. 3.11.4 Entangled Stat 4, Concepts of Quantum Computation . 4.1 Introduction to Quantum Computation .. 4.1.1 A New Way of Harnessing Nature 4.1.2 From Bits to Qubits cen 4.1.3. Quantum Algorithms .... 4.1.4 Building Quantum Computers 4.1.5 Deeper Implications : 4.1.6 Concluding Remarks 4.2 Quantum Algorithms ..... 4.2.1 Introduction ......... 4.2.2. Quantum Parallel Computation if 4.2.3 The Principle of Local Operations increasing Numbers of Particles .. - 100 101 103 - 104 104 105 107 4.3 Contents IX Oracles and Deutsch’s Algorithm «+. 109 The Fourier Transform and Periodicities. . . . .1il4 Shor’s Quantum Algorithm for Factorisation 119 Quantum Searching and NP . ‘ 121 Quantum Gates and Quantum Computation with Trapped Ions . 126 43.1. Introduction .... 4.3.2. Quantum Gates with Trapped Ions . . 126 43.3 N Cold Ions Interacting with Laser Light. .........-. 128 4.3.4 Quantum Gates at Non-zero Temperature ......... 130 126 Experiments Leading Towards Quantum Computation .... 5.1 5.2 5.3 5.4 133 133 Introduction . Cavity QED-Experiments: Atoms in Cavities and Trapped Ions . 5.2.1 A Two-Level System Coupled to a Quantui 5.2.2 Cavity QED with Atoms and Cavities. . 5.2.3 Resonant Coupling: Rabi Oscillations and Entangled Atoms . 5.2.4 Dispersive Coupling: Schrddinger and Decoherence : 5.2.5 Trapped-Ion Experiments 147 5.2.6 Choice of Ions and Doppler G ceceeevereeees 148 5.2.7 Sideband Cooling........ 150 .8 Blectron Shelving and D 153 .9 Coherent States of Motio 154 .10 Wigner Function of t 157 .11 Squeezed States an 159 .12 Quantum Logic wi 160 5.2.13 Comparison an 161 Linear Ion Traps for 163 5.3.1 Introduction “> . 163, 5.3.2 Ion Confinement in a Linear Paul Trap. .. 164 5.3.3 Laser Cooling and Quantum Motion . . 167 134 134 - 135 137 143 "tum Computation 5.3.4 Ion Strings and Normal Modes . . . 169 5.3.5 Tons as Quantum Register .... . 171 5.3.6 Single-Qubit Preparation and Manipulation. 172 5.3.7 Vibrational Mode as a Quantum Data Bus .......... 173 5.3.8 Two-Bit Gates in an Ion-Trap Quantum Computer ... 174 5.3.9 Readout of the Qubits . : seseeee 175 5.3.10 Conclusion .. 15 Nuclear Magnetic Resonance Experiments . clge: 5.4.1 Introduction . . . care 5.4.2 The NMR Hamiltonian air Contents .179 181 184 185 188 188 5.4.3 Building an NMR Quantum Computer - 5.44 Deutsch’s Problem -.-- : 5.4.5 Quantum Searching and ‘Other ‘Algorithms ae 5.4.6 Prospects for the Future «-... 5.47 Entanglement and Mixed States : 5A8 The Next Few Years - a Quantum Networks and Multi-Particle Entanglement . 6.1 Introduction . werent 62 Quantum Networks Entangling Particles at Separate Locations . 6.2.1 Interfacing Atoms and Photons 6.2.2 Model of Quantum State Transrnission - 6.23 Laser Pulses for Ideal ‘Transmission . 6.2.4 Imperfect Operations and Error Gatien 6.3 Multi-Particle Entanglement - i Groenberger-Horne-Zeilinger states . The Conflict with Local Realisrma ‘A Source for Three-Photon GHZ Entan, Experimental Proof of GHZ Entangl Experimental Test of Local Realisi Versus Quantum Mechanics... . . Ae : 64 Entanglement Quantification...--.-. 64.1 Schmidt Decomposition and vom 210 G43: Puricuion Procedures gti cay cco 2. 212 Conditions for Entanglement exe cee 214 ‘Two Measures of Distance Betwyeen Density Matrices . 216 Numerics for Two Spin 1/2: Ricieteeeeedsesseegeseiutstsesaeeets . 217 Statistical Basis of Entan, ent Measure.....-...-. 219 ... 191 . 191 192 192 193 . 195 197 197 er 198 200 204 - 206 210 + 221 «. 221 = 222 Decoherence and Quantum E: orrection . 7.1. Introduction . 7.2 Decoherence . 7.2.1 Decoherenc Qubits and Environment i 7.2.2 Collective Interaction and Scaling 7.2.3. Subspace Decoupled From Environment . 724 Other Find of Couplings .... 7.3. Limits to Quantum Computation Due fle 0 Decoherence 7.4 Error Correction and Fault-Tolerant Computation 7.4.1 Symmetrisation Procedures 232 74.2 Classical Error Correction . 234 74.3 General Aspects of Quantum Error Correcting Codes | 236 744 The Three Qubit Code . Peed Sie aeeiiseeittiu dius ual Entanglement Bet-ween . 222 224 225 225 227 232 Contents XI 74.5 The Quantum Hamming Bound 7.4.6 The Seven Qubit Code.......... 7.4.7 Fault-Tolerant Computation ..... 7.5 General Theory of Quantum Error Correction and Fault Tolerance . 242 7.5.1 Digitisation of Noise . 242 75.2 Error Operators, Stabiliser, and Syndrome Extraction . 243 7.5.3 Code Construction ... : : : 246 7.5.4 The Physics of Noise. 238 239 241 248 7.5.5 Fault-Tolerant Quantum Computation . e250 7.6 Frequency Standards . 252 8. Entanglement Purification . «261 8.1 Introduction ............ - 261 8.2 Principles of Entanglement Purification . 261 8.3. Local Filtering . 8.4 Quantum Privacy Amplification ... 8.5 Generalisation of Purification to Multi-Particle 8.6 Quantum Networks II: & Communication over Noisy Channels » 281 S.6leainmoduction 281 8.6.2 Ideal Communication ...... ros beeeeeeeees 282 8.6.3 Correction of Transfer Brror The Photonic Channel ... Q: eee eee 2 288 8.6.4 Purification with Finite Meads ee 5 8.7 Quantum Repeaters ........., © i 288 269 iuaen slement 275 References... . 294 Index ........ 6... cece eee eee QE Pe cece cere eee ee 31l XVI List of Contributors F. Schmidt-Kaler H. Weinfurter Sects. 5.2, 5.8 Chap. 2, Sects. §.1-3.8, 3.5-3.7, Institut fiir Experimentalphysik 9.10, 6.3 Universitat Innsbruck Sektion Physik Technikerstrasse 25 Ludwig-Maximilians-Universitat, 6020 Innsbruck, Austria Miinchen Schellingstr. 4/11 segane 80799 Miinchen, Germany Centre for Quantum Computation Clarendon Laboratory H. Walther University of Oxford Sect, 5.8 OX1 3PU Oxford, England Max~Planck-Institut fiir Quantenoptik K-A. Suominen Hans-Kopfermann—Str. 1 Sect. 7.2 n Helsinki Institute of Physics 85748 Garching, Germany PL 9, FIN-00014 Helsingin a Yliopisto, Finland A. Zeilinger Chap. 1, Sects. 3, 8.5-3.7, V. Vedral ee cated Sects. 8.11, 6.4, 8.5 Centre for Quantum Computation Clarendon Laboratory University of Oxford OX1 3PU Oxford, England G. Weihs Sect. 3.4 - : SewE4.8, 6.2, 8.6, 8.7 Institut fiir Experimentalphysik stitut fiir Theoretische Physik Universitat Wien iniversitat Innsbruck Boltzmanngasse 5 Technikerstrasse 25 1090 Wien, Austria 6020 Innsbruck, Austria 1. The Physics of Quantum Information: Basic Concepts D. Bouwmeester, A. Zeilinger 1.1 Quantum Superposition ‘The superposition principle plays the most central role in all considerations of quantum information, and in most of the “gedanken” experi: and even the paradoxes of quantum mechanics. Instead of studying i defining it abstractly, we will discuss here the quintessenti quantum superposition, the double-slit experiment (Fi Feynman (1], the double-slit “has in it the heart of quan essential ingredients of the experiment are a sourgé’a and an observation screen on which we observe inert interference fringes may easily be understood on thWba property of the particles emerging from the sof here that the double-slit experiment has bee: a kinds of particles ranging from photons (2| bi According to \echanics”. The dguble-slit assembly, ence fringes. These is of assuming a wave It might be mentioned ed with many different lectrons [3], to neutrons [4] and atoms [5]. Quantum mechanically, the Statl is the coherent superposition & 1 Ww) = (|e) + |), LL Me) = Falla) + Mo)) (1.1) where |%q) and |W) describe th ‘um state with only slit @ or slit b open. The interesting feature in #] intum double-slit experiment is the obser- vation that, as confirmed by all experiments to date, the interference pattern can be collected one by one, that is, by having such a low intensity that only one particle interferes with itself. If this happens, we might be tempted to ask ourselves which of the two slits a particle “really” takes in the experiment. ‘The answer from standard quantum mechanics is that it is not possible to make any sensible statement about the question “which slit does the parti- cle pass through?” without using the appropriate set-up able to answer that question. In fact, if we were to perform any kind of experiment determining through which of the two slits the particle passes, we would have to somehow interact with the particle and this would lead to decoherence, that is, loss of interference. Only when there is no way of knowing, not even in principle, 2 1, Basic Concepts ———— ° | eae 4 Leo HM | ' | rT AI ‘POSITION Fig. 1.1. Principle of the double-slit in an observation plane behind a dou! source is so low that there is only o interference pattern shown here is experiments with neutrons [4]. ent. An interference pattern arises it assembly, even if the intensity of the fe at a time in the apparatus. The actual through which slit the particle passes, do we observe interference. As a small warning we might mention that it is not even possible to say that the particle passes through both slits at the same time, although this is a position often held. The problem here is that, on the one hand, this is a contradictory sen- tence because a particle is a localised entity, and, on the other hand, there is no operational meaning in such a statement. We also note that one can have partial knowledge of the slit the particle passes at the expense of partial decoherence. 1.2 Qubits 3 1.2 Qubits The most fundamental entity in information science is the bit. This is a system which carries two possible values, “0” and “1”. In its classical reali- sation the bit, which, for example could be imagined to be just a mechanical switch, is a system which is designed to have two distinguishable states; there should be a sufficiently large energy barrier between them that no sponta- neous transition, which would evidently be detrimental, can occur between the two states. ‘The quantum analog of a bit, the Qubit [6], therefore also has to be a two-state system where the two states are simply called |0) and |1). Basically any quantum system which has at least two states can serve as a qubit, and there are a great variety possible, many of which have already been realised experimentally. The most essential property of quantum states when used to encode bits is the possibility of coherence and superposition, the general state being 1Q) = a0) + 6|1) , (1.2) with |a|?-+|8|? = 1. What this means is not that the valle gf 2 qubit is some- where between “0” and “1”, but rather that the igin a superposition of both states and, if we measure the qubit we wyi (0) = |1))- (1.5) 4 1. Basic Concepts Applying this to the qubit |Q’) above, results in HQ’) = |0) (1.6) that is, a well-defined value of the qubit. This is never possible with an incoherent mixture. 1.3 Single-Qubit Transformations Insight in some of the most basic experimental procedures in quantum infor- mation physics can be gained by investigating the action of a simaple 50/50 beamsplitter. Such beamsplitters have been realised for many different types of particles, not only for photons. For a general beamsplitter, as shown in Fig. 1.2, let us investigate the case of just two incoming modes and two outgoing modes which are arranged as shown in the figure. For a 50/50 beamsplitter, a particle incident either from below has the same probability of 50% of emerging in eithe above or below. Then quantum unitarity, that is, the req particles are lost if the beamsplitter is non-absorbing, i conditions on the action of the beamsplitter [7] with,oné fertain phase phase. A very simple way to describe the action of a beamsplitter is the phase relations such that the beamsplitter is described by the Hi transformation of (1.5). Let us again assume that the incident state, general qubit [Q)in = @10)in + 5[L)in - For a single incident particle this means to find the particle incident from above (1.7) hati is the probability amplitude s the probability amplitude for a Se. > Fig. 1.2. The 50/50 beamsplitter (top) and the corresponding diagram. usil Hadamard transform H (below). ee 1.3 Single-Qubit Transformations 5 finding the particle incident from below. Then the action of the beamsplitter results in the final state |Q)out = HIQ)in = =z (e+ B)|0)our + (@ — 8)|1)our) » (1.8) v2 where (c+ 8) is now the probability amplitude for finding the particle in the outgoing upper beam and (a — 8) is the probability amplitude for finding it in the outgoing lower beam. For the specific case of either a = 0 or 8 = 0, we find that the particle will be found with equal probability in either of the outgoing beams. For another specific case, a = 6, we find that the particle will definitely be found in the upper beam and never in the lower beam. It is interesting and instructive to consider sequences of such beamsplit- ters because they realise sequences of Hadamard transformations. For two successive transformations the Mach-Zehnder interferometer (Fig. 1.3) with two identical beamsplitters results Furthermore, the mirrors shown only serve to redirect ; they are assumed to have identical action on the two beams arid ilerefore can be omitted in the analysis. The full action of the inter! com eter can now simply be described as two successive Hadamard tran: foi ms acting on the general incoming state of (1.7): [Q)out = HH|Q)in = |Q)in- Ss (1.9) This results from the simple fact that doubl bodes of the Hadamard transformation of (1.5) is the identity opera means that the Mach- Zehnder interferometer as sketched in Fig(H3, with beamsplitters realising the Hadamard transformation at its outpit=teproduces a state identical to the input. Let us consider again the erffe case where the input consists of one beam only, that is, without generality, let us assume a the lower beam being empty. Ther=2bcording to (1.9), the particle will def [0 exe 1), | out Hw H > Fig. 1.3. A Mach-Zehnder interferometer (top) is a sequence of two Hadamard transformations (bottom). 6 1. Basic Concepts initely be found in the upper output. Most interestingly, this is because be- tween the two beamsplitters the particle would have been found (with the correct relative phase) with equal probability in both beam paths. It is the interference of the two amplitudes incident on the final beamsplitter which results in the particle ending up with certainty in one of the outgoing beams and never in the other. In quantum information language, the output qubit of the empty Mach~ Zehnder interferometer will have a definite value if the input qubit also has a definite value, and this only because between the two Hadamard transfor- mations the value of the qubit was maximally undefined. Another important quantum gate besides the Hadamard gate is the phase shifter, which is introduced additionally in Fig. 1.4 into the Mach-Zehnder interferometer. Its operation is simply to introduce a phase change to the amplitude of one of the two beams (without loss of generality we can assume this to be the upper beam because only relative phases are relevant). In our notation, the action of the phase shifter can be described b unitary transformation |0) = e|0), #1) =[1). © (1.10) Graererire tne Gn GbE ca be a ica otal proper transformations to the input qubit: S [Q)out = HPH|Q)in. We leave it to the reader to calculate the gen input qubits. We will restrict our discussion only one input namely a = 1 and B = 0, i then becomes (1.11) dkpression for arbitrary #0 he case where we have in = |0). The final state 1 o HOH) = 5 ((e¥” +1)]0) +(e (1.12) 0)in f O bout Vn De u|+ol a}. Fig. 1.4. Top: Mach-Zehnder interferometer including a phase shifter y in one of the two beams. This completely changes the output. Bottom: The equivalent representation with Hadamard transformations and a phase shifter gate. 1.4 Entanglement 7 This has a very simple interpretation. First we observe by inspection of (1.12) that for y = 0 the value of the qubit is definitely “0”. On the other hand, for (p = 7 the value of the qubit is definitely “I”. This indicates that the phase shift ¢ is able to switch the output qubit between 0 and 1. In general, the probability that the output qubit has the value “0” is Py = cos*(ip/2), and the probability that the qubit carries the value “1” is P, = sin*(p/2). In the present section we have discussed some of the basic notions of linear transformation of qubits. We will now turn to entangled qubits. 1.4 Entanglement Consider a source which emits a pair of particles such that one particle emerges to the left and the other one to the right (see source $ in Fig. 1.5) The source is such that the particles are emitted with opposite momenta. If the particle emerging to the left, which we call particle 1, is foffi’n the up- per beam, then particle 2 travelling to the right is always f the lower beam. Conversely, if particle 1 is found in the lower cage particle 2 is always found in the upper beam. In our qubit languas jould say that the two particles carry different bit values. Either carries “0” and then particle 2 definitely carries “1”, or vice = mechanically this is two-particle superposition state of the fo! a ((0)a}1)2 + e%|1).10)2) « Q (1.13) ‘The phase x is just determined by the in properties of the source and we assume for simplicity ~ = 0. Equatign (4-13) describes what is called an entangled state [8] !. The interesting ty is that neither of the two qubits carries a definite value, but what j n from the quantum state is that as soon as one of the two qubits,i ject to a measurement, the result of this measurement being completely random, the other one will immediately be found to carry the opposit fe. In a nutshell this is the conundrum of quantum non-locality, since the two qubits could be separated by arbitrary distances at, the time of the measurement. A most interesting situation arises when both qubits are subject to a phase shift and to a Hadamard transformation as shown in Fig. 1.5. Then, for detection events after both Hadamard transformations, that is, for the case of the two-particle interferometer verification [10] for detections behind the beamsplitters, interesting non-local correlations result which violate Bell’s inequalities [11]. Without going into the theoretical and formal details here (for more information see Sect. 1.7), the essence of such a violation is that T The word Entanglement is a (free) translation of the word Verschrinkung that was introduced in 1935 by Schrédinger to characterise this special feature of composite quantum systems [9]. . 1. Basic Concepts o}| 1 + Fig. 1.5. A source emits two qubits in an extangled state. Top: A two-particle interferometer verification. Bottom: The principle in terms of one-photon gates wo sides on orrelations between the two sides cannot be understood by assumin| the specific detector on une given side which registers the particle is n C3} luenced by the parameter setting, that i There are many ways to express precisely the mi tho. there are many formal presentations. SORE be presented in Sect, 1.7, and for the remainder ie Jpler the reader to the appropriate literature (eg.. Ref. [12) and referee therein). A very interesting. and for quantum computitdon quite relevant gener- alisation follows if entanglement is studied fowmiore than two qubits. For example, consider the simple case of entalag}pment between three qubits, as shown i Fig. L6, We assume that asqiitce emits three particles, one into each of the apparatuses shown, in tie specific superposition, a so-called Greenberger-Home-Zeilinger (GHZ) s€@>[13] (see also Sect. 6.3), there is uw pussibilty to explain the corelations between the '0)1\0)2!0)3 + [L/L )e|1}3, (1.14) This quantutn state has some very peculiar properties. Again, as in two- particle entanglement, none of the three qubits carries any information on iis uwn, none of them has a defined bit value. But, as soon as one of the three is measured. the other two will assume a well-defined value as long as the measurement is performed in the chosen. 0-1 basis. This conclusion holds independent of the spatial separation between the three measurements. Most interestingly. if one looks at the relations predicted by the GHZ state (1.14) between the three measurements after passing the phase shifters and the Hadamard transforms. a number of perfect correlations still result for certain joint settings of the three parameters [14], the interesting property now being that it is not possible to understand even the perfect correlations with a local model. This shows that quantum mechanics is at variance with 1.5 Entanglement and Quantum Indistinguishability 9 tL ee | a ® 0 Y © Fig. 1.6. Three-particle entanglement in a so-called GHZ state. Here we show only the representation in terms of our elementary gates, it will be stry rward for the reader to consider the physical realisation in a three-particle daterferometer. a classical local world view not only for the sector of aes predictions of the theory but also for predictions which can be ith certainty. 1.5 Entanglement and Quantum a In order to understand both the nature of eee and ways of pro- ducing it, one has to realise that in a general form (1.13) and (1.14), we have a superposition betweer\praduct states. We recall from the discussion of the double-slit diffracti nomenon (Sect. 1.1) that super- position means that there is no way\fovtell which of the two possibilities forming the superposition actuall tains. This rule must also be applied to the understanding of quantu ttanglement. For example, in the state |Whe (|0)1|1)2 + |1)110)2) (1.15) v2 there is no way of telling whether qubit 1 carries the value “0” or “1”, and likewise whether qubit 2 carries the value “0” or “1”. Yet, if one qubit is measured the other one immediately assumes a well-defined quantum state. These observations lead us directly to the conditions of how to produce and observe entangled quantum states. To produce entangled quantum states, one has various possibilities. Firstly, one can create a source which, through its physical construction, is such that the quantum states emerging already have the indistinguishabil- ity feature discussed above. This is realised, for example, by the decay of a spin-0 particle into two spin-1/2 particles under conservation of the internal 10 1, Basic Concepts angular momentum [15]. In this case, the two spins of the emerging particles have to be opposite, and, if no further mechanisms exist which permit us to distinguish the possibilities right at the source, the emerging quantum state is 1 Lae where, e.g. | t): means particle 1 with spin up. The state (1.16) has the remarkable property that it is rotationally invariant, i.e., the two spins are anti-parallel along whichever direction we choose to measure. A second possibility is that a source might actually produce quantum states of the form of the individual components in the superposition of (1.15), but the states might still be distinguishable in some way. This happens, for example, in type-II parametric down-conversion [16] (Sect. 3.4.4), where along a certain chosen direction the two emerging photon states are |H)\|V)2 and |V):|H)2- (1.17) photon 2 is (thal 2-1 Hal the), (1.16) That means that either photon 1 is horizontally polarise vertically polarised, or photon 1 is vertically polarised afd izontally polarised. Yet because of the different sp; and V polarised photons inside the down-conversi lation between the two photons is different in the two terms in (1.17) can be distinguished by a ti surement and no en- tangled state results because of this potential tinguish the two cases. However, in this case too one can still produ jiglement by shifting the two photon-wave packets after their prod relative to each other such that they become indistinguishable on is of their positions in time. What this means is the application of um eraser technique [17] where a marker, in this case the relative time@rdering, is erased such that we obtain quantum indistinguishability resulti the state 1, the time corre- ases. Therefore, the (1.18) which is entangled. A third means of producing entangled states is to project a non-entangled state onto an entangled one. We remark, for example, that an entangled state is never orthogonal to any of its components. Specifically, consider a source producing the non-entangled state [0)1|1)2. (1.19) Suppose this state is now sent through a filter described by the projection operator P=|¥)2(Wli2, (1.20) 1.6 The Controlled NOT Gate 11 where |/)i2 is the state of (1.15). Then the following entangled state results: 5(l0)s11)2 + |1)x10)2)((O}a (12 + (fa (l2)10)x 11) a = 5(I0)a11)2 + {1)x10)2)5 (1.21) it is no longer normalised to unity because the projection procedure implies a loss of qubits. While each of the three methods discussed above can in principle be used to produce outgoing entangled states, a further possibility exists to produce entanglement upon observation of a state. In general, this means that we have an unentangled or partially entangled state of some form and the mea- surement procedure itself is such that it projects onto an entangled state, in much the same way as discussed just above. This procedure was used, for example, in the first experimental demonstration of GHZ entanglement of three photons (see Sect. 6.3) [18]. & 1.6 The Controlled NOT Gate © Thus far, we have discussed only single-qubit entte is, gates which involve one qubit only. Of greatest importance for "m computation ap- plications are two-qubit gates, where the evolution Ff dive qubit is conditional upon the state of the other qubit. The simplest df these qates is the quantum controlled NOT gate illustrated in Fig. 1.7, Khe [L)el1)e > [L)el0)e (1.22) where |0)¢ and |1)¢ refer to th8Xpntrol qubit and |0); and |1); refer to the target qubit. Together with the single-qubit transformations described in. \@) |@) b) la+b) Fig. 1.7. The controlled NOT gate is a transformation involving two qubits. The value of the control qubit (the upper one in the figure) influences the lower one, whose value is flipped if the upper qubit carries “1”, and not flipped if the upper qubit carries “0”. This is equivalent to addition modulo 2. 121. Basie Concepts Sect. 1.3 the quantum controlled NOT gate can be used to realise quantum computation networks, One interesting explicit application is the production of two-qubit or multi-qubit entangled states using these gates [19]. 1.7 The EPR Argument and Bell’s Inequality Immediately after the discovery of modern quantum mechanics, it was re- alised that it contains novel, counterintuitive features, as witnessed most remarkably in the famous dialogue between Niels Bohr and Albert Einstein 20]. While Einstein initially tried to argue that quantum mechanics is in- consistent, he later reformulated his argument towards demonstrating that quantum mechanics is incomplete. In the seminal paper [21], Einstein, Podol- sky and Rosen (EPR) consider quantum systems consisting of two particles such that, while neither position nor momentum of either particle is well defined, the sum of their positions, that is their centre of dee the dif. ference of their momenta, that is their individual momen the center of mass system, are both precisely defined. It: then follow: measurement of either position or momentum performed on, say, 1 immediately implies a precise position or momentum, respectively, larticle 2, without interacting with that particle. Assuming that thetwe particles can be sepa- rated by arbitrary distances, EPR suggest that a¢méastrement on particle 1 cannot have any actual influence on particle 2 Adeaiity condition); thus the property of particle 2 must be independent of{th) measurement performed on particle 1. To them, it then follows that be ition and momentum can simultaneously be well defined properties (f@uantum system. In his famous reply [22], Niels Bohr that the two particles in the EPR case are always parts of one quant S¥stem and thus measurement on one particle changes the possible predie#ioiis that can be made for the whole system and therefore for the other While the EPR-Bobr discussi as considered for a loug time to be merely philosophical, in 1951 Bohm [15] introduced spin-entangled systems and in 1964 John Bell showed that, for such entangled systems, measurements of correlated quantities should yield different results in the quantum mechanical case to those expected if one assumes that the prop- erties of the system measured are present prior to, and independent of, the observation. Even though a number of experiments have now confirmed the quantum predictions [24]-[26], from a strictly logical point of view the prob- lem is not closed yet as some loopholes in the existing experiments still make it logically possible, at least in principle, to uphold a local realist. world view 27]. Let us briefly present the line of reasoning that leads to an inequality equivalent to the original Bell inequality. Consider a source emitting two qubits (Fig. 1.8) in the entangled state 1.7 The EPR Argument and Bell's Inequality 13 |e") Ye. JAN ie no PBS PBS an D, EPR Source Dy Fig. 1.8. Correlation measurements between Alice’s and Bob’s detection events for different choices for the detection bases (indicated by the angles a and f for the orientation of their polarising beamsplitters, PBS) lead to the violation of Bell's inequalities, _ a / V2 One qubit is sent to Alice (to the left in Fig. 1.8), the other [®*)i2 (\H)i|H)2 + |V)1|V)2). (1.23) to Bob (to the right). Alice and Bob will perform polarisation measuy using a polarising beamsplitter with two single-photon detectors ix uutput ports. Alice will obtain the measurement result “0” or “1”, corr; ing to the de- tection of a qubit by detector 1 or 2 respectively, each ‘This statement is valid in whatever polarisation basjs,sh h fqual probability. fecides to perform the measurement, the actual results being compl andom. Yet, if Bob chooses the same basis, he will always obtain the s ‘esult. Thus, following the first step of the EPR reasoning, Alice c ict with certainty what Bob's result will be. The second step empl locality hypothesis, that is, the assumption that no physical influey instantly go from Alice’s apparatus to Bob’s and therefore Bob’s masijfed result should only depend on the properties of his qubit and on thecapparatus he chose. Combining the two steps, John Bell investigate ible correlations for the case that Alice and Bob choose detection baséswhich are at oblique angles. For three arbitrary angular orientations a, > one can see [28] that the following inequality must be fulfilled: N(les 1a) $ N(las by) + where 1 0-) (1.24) N(las 1g) = * cos*(a — 8) (1.25) is the quantum-mechanical prediction for the number of cases where Alice obtains “1” with her apparatus at orientation @ and Bob achieves “1” with orientation 8, and No is the number of pairs emitted by the source. The inequality is violated by the quantum-mechanical prediction if we choose, for example, the angles (a ~ 8) = (@ — 7) = 30°. The violation implies that at least one of the assumptions entering Bell’s inequality must be in conflict with quantum mechanics. This is usually viewed as evidence for non-locality, though that is by no means the only possible explanation. 14 1. Basic Concepts 1.8 Comments As recently as a decade ago, the issues discussed here were mainly considered to be of a philosophical nature, though very relevant ones in our attempts to understand the world around us and our role in it. In the last few years, very much to the surprise of most of the early researchers in the field, the basic concepts of superposition and quantum entanglement have turned out to be key ingredients in novel quantum communication and quantum com- putation schemes. Here we have given only a condensed introduction. More details are contained in the various chapters of this book. Further informa- tion can also be found on the world wide web, for example at www.qubit.org or www.quantum.at with many links to other relevant site: S S ea 2. Quantum Cryptography A. Ekert, N. Gisin, B. Hutiner, H. Inamori, H. Weinfurter 2.1 What is Wrong with Classical Cryptography? 2.1.1 From SCYTALE to ENIGMA Human desire to communicate secretly is at least as old ee ing itself s and goes back to the beginnings of our civilisation. Meth; secret, com- munication were developed by many ancient societies, Jding those of Mesopotamia, Egypt, India, and China, but details regérdjng the origins of cryptology! remain unknown [29]. = We know that it was the Spartans, the most of the Greeks, who pioneered military cryptography in Europe. Arot 10 BG they employed a device known as the SCYTALE. The device, for communication be- tween military commanders, consisted of a t ‘aton around which was wrapped a spiral strip of parchment or leat! ntaining the message. Words were then written lengthwise along the mayen letter on each revolution of the strip. When unwrapped, the letter§of¢he message appeared scrambled and the parchment was sent on its wz receiver wrapped the parchment around another baton of the same s) id the original message reappeared as shown in Fig. 2.1. Julius Caesar allegedly use his correspondence, a simple letter sub- stitution method. Each letter psar's message was replaced by the letter that followed it alphabetically by three places. The letter A was replaced by D, the letter B by E, and so on. For example, the English word COLD after the Caesar substitution appears as FROG. This method is still called the Caesar cipher, regardless the size of the shift used for the substitution. These two simple examples already contain the two basic methods of encryption which are still employed by cryptographers today namely trans- position and substitution. In transposition (e.g. scytale) the letters of the ' The science of secure communication is called cryptology from Greek kryptos hidden and logos word. Cryptology embodies eryptography, the art of code- making, and cryptanalysis, the art of code-breaking, 16 2. Quantum Cryptography Fig. 2.1. The first cryptographic machine ~ a Scytale. & plaintezt, the technical term for the message to ismitted, are rear- ranged by a special permutation. In substitution Caesar’s cipher) the letters of the plaintext are replaced by other | numbers or arbitrary ined By was restricted primarily icient resources to produce oy famous ENIGMA which was I or its American counterpart fore the war in Poland and dur- The Bletchley Park team, which symbols. In general the two techniques can be Until some years ago, sophisticated crypt to the military world. Only the military hi sophisticated mechanical devices, such widely used by Germans during World the M-209. ENIGMA ciphers were br: ing the war at Bletchley Park in Ey included Alan Turing, had to deyslop~the electromechanical tools to break these ciphers, which resulted ding the first digital computer called COLOSSUS. Thus modern cryptdlogy (for an introduction see, for cxam- ple, [30]-[32]) was born together with computer science. As expressed by R.L. Rivest (codiscoverer of the popular RSA public key system), cryptanalysis was “the midwife of computer science”. 2.1.2 Keys and Their Distribution Originally the security of a cryptotext depended on the secrecy of the en- tire encrypting and decrypting procedures; however, today we use ciphers for which the algorithm for encrypting and decrypting could be revealed to any- body without compromising the security of a particular cryptogram. In such ciphers a set of specific parameters, called a key, is supplied together with

You might also like