UNIVERSAL QUANTUM COMPUTATION IN A HIDDEN BASIS

被引:0
|
作者
Ioannou, Lawrence M. [1 ]
Mosca, Michele [1 ,2 ]
机构
[1] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
[2] Perimeter Inst Theoret Phys, Waterloo, ON N2L 2Y5, Canada
基金
加拿大自然科学与工程研究理事会; 英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Let vertical bar 0 > and vertical bar 1 > be two states that are promised to come from known subsets of orthogonal subspaces, but are otherwise unknown. Our paper probes the question of what can be achieved with respect to the basis {vertical bar 0 >(circle times n) of n logical qubits, given only a few copies of the unknown states vertical bar 0 > and 11). A phase-invariant operator is one that is unchanged under the relative phase-shift vertical bar 1 > -> e(i theta) vertical bar 1 >, for any theta, of all of the n qubits. We show that phase-invariant unitary operators can be implemented exactly with no copies and that phase-invariant states can be prepared exactly with at most n copies each of 10) and vertical bar 1 >; we give an explicit algorithm for state preparation that is efficient for some classes of states (e.g. symmetric states). We conjecture that certain non-phase-invariant operations are impossible to perform accurately without many copies. Motivated by optical implementations of quantum computers, we define "quantum computation in a hidden basis" to mean executing a quantum algorithm with respect to the phase-shifted hidden basis {vertical bar 0 >, e(i theta) vertical bar 1 >}, for some potentially unknown theta; we give an efficient approximation algorithm for this task, for which we introduce an analogue of a coherent state of light, which serves as a bounded quantum phase reference frame encoding theta. Our motivation was quantum-public-key cryptography, however the techniques are general. We apply our results to quantum-public-key authentication protocols, by showing that a natural class of digital signature schemes for classical messages is insecure. We also give a protocol for identification that uses many of the ideas discussed and whose security relates to our conjecture (but we do not know if it is secure).
引用
收藏
页码:541 / 561
页数:21
相关论文
共 50 条
  • [11] Universal quantum computation with qudits
    MingXing Luo
    XiaoJun Wang
    Science China Physics, Mechanics & Astronomy, 2014, 57 : 1712 - 1717
  • [12] Universal computation with quantum fields
    Kazuki Ikeda
    Quantum Information Processing, 2020, 19
  • [13] Universal quantum computation by discontinuous quantum walk
    Underwood, Michael S.
    Feder, David L.
    PHYSICAL REVIEW A, 2010, 82 (04):
  • [14] Quantum cellular automaton for universal quantum computation
    Raussendorf, R
    PHYSICAL REVIEW A, 2005, 72 (02)
  • [15] Universal Quantum Computation with Gapped Boundaries
    Cong, Iris
    Cheng, Meng
    Wang, Zhenghan
    PHYSICAL REVIEW LETTERS, 2017, 119 (17)
  • [16] Universal Quantum Computation with Little Entanglement
    Van den Nest, Maarten
    PHYSICAL REVIEW LETTERS, 2013, 110 (06)
  • [17] Universal quantum computation with the exchange interaction
    D. P. DiVincenzo
    D. Bacon
    J. Kempe
    G. Burkard
    K. B. Whaley
    Nature, 2000, 408 : 339 - 342
  • [18] Universal quantum computation with metaplectic anyons
    Cui, Shawn X.
    Wang, Zhenghan
    JOURNAL OF MATHEMATICAL PHYSICS, 2015, 56 (03)
  • [19] Universal quantum computation with the exchange interaction
    DiVincenzo, DP
    Bacon, D
    Kempe, J
    Burkard, G
    Whaley, KB
    NATURE, 2000, 408 (6810) : 339 - 342
  • [20] Universal quantum computation with unlabelled qubits
    Severini, Simone
    JOURNAL OF PHYSICS A-MATHEMATICAL AND GENERAL, 2006, 39 (26): : 8507 - 8513