UNIVERSAL QUANTUM COMPUTATION IN A HIDDEN BASIS

被引:0
|
作者
Ioannou, Lawrence M. [1 ]
Mosca, Michele [1 ,2 ]
机构
[1] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
[2] Perimeter Inst Theoret Phys, Waterloo, ON N2L 2Y5, Canada
基金
加拿大自然科学与工程研究理事会; 英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Let vertical bar 0 > and vertical bar 1 > be two states that are promised to come from known subsets of orthogonal subspaces, but are otherwise unknown. Our paper probes the question of what can be achieved with respect to the basis {vertical bar 0 >(circle times n) of n logical qubits, given only a few copies of the unknown states vertical bar 0 > and 11). A phase-invariant operator is one that is unchanged under the relative phase-shift vertical bar 1 > -> e(i theta) vertical bar 1 >, for any theta, of all of the n qubits. We show that phase-invariant unitary operators can be implemented exactly with no copies and that phase-invariant states can be prepared exactly with at most n copies each of 10) and vertical bar 1 >; we give an explicit algorithm for state preparation that is efficient for some classes of states (e.g. symmetric states). We conjecture that certain non-phase-invariant operations are impossible to perform accurately without many copies. Motivated by optical implementations of quantum computers, we define "quantum computation in a hidden basis" to mean executing a quantum algorithm with respect to the phase-shifted hidden basis {vertical bar 0 >, e(i theta) vertical bar 1 >}, for some potentially unknown theta; we give an efficient approximation algorithm for this task, for which we introduce an analogue of a coherent state of light, which serves as a bounded quantum phase reference frame encoding theta. Our motivation was quantum-public-key cryptography, however the techniques are general. We apply our results to quantum-public-key authentication protocols, by showing that a natural class of digital signature schemes for classical messages is insecure. We also give a protocol for identification that uses many of the ideas discussed and whose security relates to our conjecture (but we do not know if it is secure).
引用
收藏
页码:541 / 561
页数:21
相关论文
共 50 条
  • [1] Hidden Variable Model for Universal Quantum Computation with Magic States on Qubits
    Zurel, Michael
    Okay, Cihan
    Raussendorf, Robert
    PHYSICAL REVIEW LETTERS, 2020, 125 (26)
  • [2] Qudit-Basis Universal Quantum Computation Using χ(2) Interactions
    Niu, Murphy Yuezhen
    Chuang, Isaac L.
    Shapiro, Jeffrey H.
    PHYSICAL REVIEW LETTERS, 2018, 120 (16)
  • [3] Quantum computation and hidden variables
    Aristov, V. V.
    Nikulov, A. V.
    QUANTUM INFORMATICS 2007, 2008, 7023
  • [4] Universal computation with quantum fields
    Ikeda, Kazuki
    QUANTUM INFORMATION PROCESSING, 2020, 19 (09)
  • [5] Universal quantum computation with qudits
    LUO MingXing
    WANG XiaoJun
    Science China(Physics,Mechanics & Astronomy), 2014, (09) : 1712 - 1717
  • [6] Universal quantum computation with qudits
    Luo MingXing
    Wang XiaoJun
    SCIENCE CHINA-PHYSICS MECHANICS & ASTRONOMY, 2014, 57 (09) : 1712 - 1717
  • [7] Counterfactual universal quantum computation
    Cao, Zhu
    PHYSICAL REVIEW A, 2020, 102 (05)
  • [8] Universal variational quantum computation
    Biamonte, Jacob
    PHYSICAL REVIEW A, 2021, 103 (03)
  • [9] Universal Computation by Quantum Walk
    Childs, Andrew M.
    PHYSICAL REVIEW LETTERS, 2009, 102 (18)
  • [10] Universal Blind Quantum Computation
    Broadbent, Anne
    Fitzsimons, Joseph
    Kashefi, Elham
    2009 50TH ANNUAL IEEE SYMPOSIUM ON FOUNDATIONS OF COMPUTER SCIENCE: FOCS 2009, PROCEEDINGS, 2009, : 517 - 526