Lecture 7
Lecture 7
Dave Bacon
Aug 3, 2005
Today’s Menu
Administrivia
Shor’s Algorithm
Grover’s Algorithm
Pick up HW solutions.
n
qubits
Deutsch-Jozsa Algorithm
Bernsetein-Vazirani Algorithm
Review
1994: Simon’s Algorithm
Bounded error classical q. complexity:
Dan
Simon Bounded error quantum q. complexity:
(first exponential separation)
n qubits
n qubits
Simon’s algorithm
Alice Bob
Alice’s message
0110110011100101
secret secret
key key
0100011100110100
Eve 0110110011100101
cannot learn message
Public Key Cryptography
Interesting history:
Examples of problems in P:
P NP OR NP=P
P NPC OR NP=NPC=P
NP
Public Key Cryptography
1. There probably exist computational problems that are HARD.
Bob’s secret
documents
Alice Bob
Alice Bob
1. Alice generates two random large primes, and
Public Key:
Alice Bob
Public Key: Bob’s message:
Private Key:
(FLT)
(CRT)
Public Key Encryption: RSA
Alice Bob
Public Key: Bob’s message:
Private Key:
Bob, using public key can encrypt
message.
Alice, using private key, can
decrypt the message
But decrypting without the private
key is (thought) to be
computationally hard
Public Key Encryption: RSA
Public Key:
Private Key:
Alice Bob
Bob’s message:
3980750864240649373971 4727721461074353025362
2550055038649119906436 2307197304822463291469
2342526708406385189575 5302097116459852171130
946388957261768583317 520711256363590397527
period
Shor’s Algorithm
What were the key insights which Shor used?
1. Period finding
2. Period finding can be perform efficiently on a quantum
computer.
3. Period finding can be used to factor integers
Order-Finding and Factoring
Factor N
choose x coprime to N (Euclid’s algorithm for gcd)
Order finding: find smallest r such that
1. Period finding
2. Period finding can be perform efficiently on a quantum
computer.
3. Period finding can be used to factor integers
“Look” familiar?
Fourier Transforms
Output:
Unit modulus:
Im
Re
Nth Root Of Unity
for
for
Im
Re
Fourier Transforms
Function on N different inputs:
Now we can see how to go from the hats back to the non hats!
Fourier Transforms
It works!....
Fourier Transforms
Example:
Fourier Transforms
Example:
Output:
See it in action:
Quantum Fourier Transform
The quantum Fourier transform:
But is it unitary?
Quantum Fourier Transform
And about that inverse QFT:
probability
Shor’s Algorithm
To Factor N on a quantum computer:
Select x coprime to N
3980750864240649373971 4727721461074353025362
2550055038649119906436 2307197304822463291469
2342526708406385189575 5302097116459852171130
946388957261768583317 520711256363590397527
n qubit
1qubit
with the property
n qubit
Grover oracle:
n qubits
The Grover Iterate
n qubits
Grover’s iterate
The Grover Iterate in 2D
Two orthonormal vectors:
Grover’s algorithm:
1. start with
physicist:
implies
NP
P
PSPACE
BPP
BQP
Quantum Algorithms
What else can quantum computers do?
• Factoring, discrete log [Shor 94]
• Unstructured search [Grover 96]
• Various hidden subgroup problems [Long List]
• Pell’s equation [Hallgren 02]
• Hidden shift problems [van Dam, Hallgren, Ip 03]
• Graph traversal [CCDFGS 03]
• Spatial search [AA 03, CG 03/04, AKR 04]
• Element distinctness [Ambainis 03]
• Various graph problems [DHHM 04, MSS 03,…]
• Testing matrix multiplication [Buhrman,Špalek 04]
• hidden subgroup problem [Bacon, Childs, van Dam 05]
• Certain hidden shift problems [Childs, van Dam 05]
Quantum Algorithms
What else might quantum computer be able to do?
Not likely:
BQP P NPC
NP
Graph isomorphism
Restricted shortest vector in a lattice problems
Finding Nash equilibrium
…
Quantum Simulation
Perhaps the least well studied and understood.