UNIVERSAL QUANTUM COMPUTATION IN A HIDDEN BASIS

被引:0
|
作者
Ioannou, Lawrence M. [1 ]
Mosca, Michele [1 ,2 ]
机构
[1] Univ Waterloo, Inst Quantum Comp, Waterloo, ON N2L 3G1, Canada
[2] Perimeter Inst Theoret Phys, Waterloo, ON N2L 2Y5, Canada
基金
加拿大自然科学与工程研究理事会; 英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Let vertical bar 0 > and vertical bar 1 > be two states that are promised to come from known subsets of orthogonal subspaces, but are otherwise unknown. Our paper probes the question of what can be achieved with respect to the basis {vertical bar 0 >(circle times n) of n logical qubits, given only a few copies of the unknown states vertical bar 0 > and 11). A phase-invariant operator is one that is unchanged under the relative phase-shift vertical bar 1 > -> e(i theta) vertical bar 1 >, for any theta, of all of the n qubits. We show that phase-invariant unitary operators can be implemented exactly with no copies and that phase-invariant states can be prepared exactly with at most n copies each of 10) and vertical bar 1 >; we give an explicit algorithm for state preparation that is efficient for some classes of states (e.g. symmetric states). We conjecture that certain non-phase-invariant operations are impossible to perform accurately without many copies. Motivated by optical implementations of quantum computers, we define "quantum computation in a hidden basis" to mean executing a quantum algorithm with respect to the phase-shifted hidden basis {vertical bar 0 >, e(i theta) vertical bar 1 >}, for some potentially unknown theta; we give an efficient approximation algorithm for this task, for which we introduce an analogue of a coherent state of light, which serves as a bounded quantum phase reference frame encoding theta. Our motivation was quantum-public-key cryptography, however the techniques are general. We apply our results to quantum-public-key authentication protocols, by showing that a natural class of digital signature schemes for classical messages is insecure. We also give a protocol for identification that uses many of the ideas discussed and whose security relates to our conjecture (but we do not know if it is secure).
引用
收藏
页码:541 / 561
页数:21
相关论文
共 50 条
  • [31] Universal quantum computation in a semiconductor quantum wire network
    Sau, Jay D.
    Tewari, Sumanta
    Das Sarma, S.
    PHYSICAL REVIEW A, 2010, 82 (05):
  • [32] Physical basis of quantum computation and cryptography
    Calixto, Manuel
    BIO-INSPIRED MODELING OF COGNITIVE TASKS, PT 1, PROCEEDINGS, 2007, 4527 : 21 - 30
  • [33] Universal quantum computation based on nanoelectromechanical systems
    Ezawa, Motohiko
    Yasunaga, Shun
    Higo, Akio
    Iizuka, Tetsuya
    Mita, Yoshio
    PHYSICAL REVIEW RESEARCH, 2023, 5 (02):
  • [34] Universal Continuous Variable Quantum Computation in the Micromaser
    Wagner, Rob C.
    Everitt, Mark S.
    Kendon, Viv M.
    Jones, Martin L.
    UNCONVENTIONAL COMPUTATION, PROCEEDINGS, 2010, 6079 : 152 - +
  • [35] Universal half-blind quantum computation
    Tan, Xiaoqing
    Zhou, Xu
    ANNALS OF TELECOMMUNICATIONS, 2017, 72 (9-10) : 589 - 595
  • [36] A modular functor which is universal for quantum computation
    Freedman, MH
    Larsen, M
    Wang, ZH
    COMMUNICATIONS IN MATHEMATICAL PHYSICS, 2002, 227 (03) : 605 - 622
  • [37] Universal half-blind quantum computation
    Xiaoqing Tan
    Xu Zhou
    Annals of Telecommunications, 2017, 72 : 589 - 595
  • [38] Universal quantum computation with weakly integral anyons
    Cui, Shawn X.
    Hong, Seung-Moon
    Wang, Zhenghan
    QUANTUM INFORMATION PROCESSING, 2015, 14 (08) : 2687 - 2727
  • [39] Superadiabatic Controlled Evolutions and Universal Quantum Computation
    Santos, Alan C.
    Sarandy, Marcelo S.
    SCIENTIFIC REPORTS, 2015, 5
  • [40] Ancilla-driven universal quantum computation
    Anders, Janet
    Oi, Daniel K. L.
    Kashefi, Elham
    Browne, Dan E.
    Andersson, Erika
    PHYSICAL REVIEW A, 2010, 82 (02):