-
Resource-efficient utilization of quantum computers
Authors:
Ijaz Ahamed Mohammad,
Matej Pivoluska,
Martin Plesch
Abstract:
The current state of quantum computing is commonly described as the Noisy Intermediate-Scale Quantum era. Available computers contain a few dozens of qubits and can perform a few dozens of operations before the inevitable noise erases all information encoded in the calculation. Even if the technology advances fast within the next years, any use of quantum computers will be limited to short and sim…
▽ More
The current state of quantum computing is commonly described as the Noisy Intermediate-Scale Quantum era. Available computers contain a few dozens of qubits and can perform a few dozens of operations before the inevitable noise erases all information encoded in the calculation. Even if the technology advances fast within the next years, any use of quantum computers will be limited to short and simple tasks, serving as subroutines of more complex classical procedures. Even for these applications the resource efficiency, measured in the number of quantum computer runs, will be a key parameter. Here we suggest a general optimization procedure for hybrid quantum-classical algorithms that allows finding the optimal approach with limited quantum resources. We demonstrate this procedure on a specific example of variational quantum algorithm used to find the ground state energy of a hydrogen molecule.
△ Less
Submitted 15 May, 2023;
originally announced May 2023.
-
Development of Scientific Skills via IYPT -- How does YPT participation lead to hard-skill development?
Authors:
Boyka Aneva,
Sergej Faletič,
Mihály Hömöstrei,
Péter Jenei,
Isza Éva,
František Kundracik,
Assen Kyuldjiev,
Thomas Lindner,
Hynek Němec,
Harald Puhr,
Martin Plesch
Abstract:
The Young Physicists' Tournament (YPT) inspires high-school students to immerse themselves into an inquiry process closely resembling the real physics research. Using questionnaires' replies from the students and their teachers engaged in YPT, we investigated how the preparation for YPT contributes to the development of hard - scientific - skills of the students, and how it compares to regular cla…
▽ More
The Young Physicists' Tournament (YPT) inspires high-school students to immerse themselves into an inquiry process closely resembling the real physics research. Using questionnaires' replies from the students and their teachers engaged in YPT, we investigated how the preparation for YPT contributes to the development of hard - scientific - skills of the students, and how it compares to regular classes and other activities.
△ Less
Submitted 18 December, 2022;
originally announced December 2022.
-
Development of Soft Skills via IYPT
Authors:
Boyka Aneva,
Sergej Faletič,
Mihály Hömöstrei,
Péter Jenei,
František Kundracik,
Assen Kyuldjiev,
Thomas Lindner,
Hynek Němec,
Harald Puhr,
Martin Plesch
Abstract:
We investigated how students perceive the role of IYPT (www.iypt.org) participation in their development of soft skills. We also investigated how students teachers assess the contribution of YPT participation to students soft skills development. Third, we link self-reported soft-skill development to performance in research tasks, as assessed by international panels of experts in the context of a p…
▽ More
We investigated how students perceive the role of IYPT (www.iypt.org) participation in their development of soft skills. We also investigated how students teachers assess the contribution of YPT participation to students soft skills development. Third, we link self-reported soft-skill development to performance in research tasks, as assessed by international panels of experts in the context of a physics competition. Taken together, the three steps, by triangulating the relationship between inquiry-based learning and soft-skill development, allow building inference about how inquiry-based learning helps students build soft skills, and how these soft skills influence student performance in research tasks. The data for the three stages includes 308 student responses for stage one, 33 teacher responses for stage two, and 794 expert (teachers, researchers, and university professors) assessments of student performance for stage three. Condensing the detailed findings from our analysis, we suggest thirteen guidelines for develo** soft skills in students below.
△ Less
Submitted 26 October, 2022; v1 submitted 18 October, 2022;
originally announced October 2022.
-
Implementation of quantum compression on IBM quantum computers
Authors:
Matej Pivoluska,
Martin Plesch
Abstract:
Advances in development of quantum computing processors brought ample opportunities to test the performance of various quantum algorithms with practical implementations. In this paper we report on implementations of quantum compression algorithm that can efficiently compress unknown quantum information. We restricted ourselves to compression of three pure qubits into two qubits, as the complexity…
▽ More
Advances in development of quantum computing processors brought ample opportunities to test the performance of various quantum algorithms with practical implementations. In this paper we report on implementations of quantum compression algorithm that can efficiently compress unknown quantum information. We restricted ourselves to compression of three pure qubits into two qubits, as the complexity of even such a simple implementation is barely within the reach of today's quantum processors. We implemented the algorithm on IBM quantum processors with two different topological layouts - a fully connected triangle processor and a partially connected line processor. It turns out that the incomplete connectivity of the line processor affects the performance only minimally. On the other hand, it turns out that the transpilation, i.e. compilation of the circuit into gates physically available to the quantum processor, crucially influences the result. We also have seen that the compression followed by immediate decompression is, even for such a simple case, on the edge or even beyond the capabilities of currently available quantum processors.
△ Less
Submitted 26 January, 2022;
originally announced January 2022.
-
Self-testing quantum states via nonmaximal violation in Hardy's test of nonlocality
Authors:
Ashutosh Rai,
Matej Pivoluska,
Souradeep Sasmal,
Manik Banik,
Sibasish Ghosh,
Martin Plesch
Abstract:
Self-testing protocols enable certification of quantum devices without demanding full knowledge about their inner workings. A typical approach in designing such protocols is based on observing nonlocal correlations which exhibit maximum violation in a Bell test. We show that in Bell experiment known as Hardy's test of nonlocality not only the maximally nonlocal correlation self-tests a quantum sta…
▽ More
Self-testing protocols enable certification of quantum devices without demanding full knowledge about their inner workings. A typical approach in designing such protocols is based on observing nonlocal correlations which exhibit maximum violation in a Bell test. We show that in Bell experiment known as Hardy's test of nonlocality not only the maximally nonlocal correlation self-tests a quantum state, rather a non-maximal nonlocal behavior can serve the same purpose. We, in fact, completely characterize all such behaviors leading to self-test of every pure two qubit entangled state except the maximally entangled ones. Apart from originating a novel self-testing protocol, our method provides a powerful tool towards characterizing the complex boundary of the set of quantum correlations.
△ Less
Submitted 30 May, 2022; v1 submitted 13 December, 2021;
originally announced December 2021.
-
Best-practice aspects of quantum-computer calculations: A case study of hydrogen molecule
Authors:
Ivana Miháliková,
Martin Friák,
Matej Pivoluska,
Martin Plesch,
Martin Saip,
Mojmír Šob
Abstract:
Quantum computers are reaching one crucial milestone after another. Motivated by their progress in quantum chemistry, we have performed an extensive series of simulations of quantum-computer runs that were aimed at inspecting best-practice aspects of these calculations. In order to compare the performance of different set-ups, the ground-state energy of hydrogen molecule has been chosen as a bench…
▽ More
Quantum computers are reaching one crucial milestone after another. Motivated by their progress in quantum chemistry, we have performed an extensive series of simulations of quantum-computer runs that were aimed at inspecting best-practice aspects of these calculations. In order to compare the performance of different set-ups, the ground-state energy of hydrogen molecule has been chosen as a benchmark for which the exact solution exists in literature. Applying variational quantum eigensolver (VQE) to a qubit Hamiltonian obtained by the Bravyi-Kitaev transformation we have analyzed the impact of various computational technicalities. These include (i) the choice of optimization methods, (ii) the architecture of quantum circuits, as well as (iii) different types of noise when simulating real quantum processors. On these we eventually performed a series of experimental runs as a complement to our simulations. The SPSA and COBYLA optimization methods have clearly outperformed the Nelder-Mead and Powell methods. The results obtained when using the $R_{\mathrm{y}}$ variational form were better than those obtained when the $R_{\mathrm{y}}R_{\mathrm{z}}$ form was used. The choice of an optimum {entangling layer} was sensitively interlinked with the choice of the optimization method. The circular {entangling layer} has been found to worsen the performance of the COBYLA method while the full {entangling layer} improved it. All four optimization methods sometimes lead to an energy that corresponds to an excited state rather than the ground state. We also show that a similarity analysis of measured probabilities can provide a useful insight.
△ Less
Submitted 2 December, 2021;
originally announced December 2021.
-
The Cost of Improving the Precision of the Variational Quantum Eigensolver for Quantum Chemistry
Authors:
Ivana Miháliková,
Matej Pivoluska,
Martin Plesch,
Martin Friák,
Daniel Nagaj,
Mojmír Šob
Abstract:
Quantum computing brings a promise of new approaches into computational quantum chemistry. While universal, fault-tolerant quantum computers are still not available, we want to utilize today's noisy quantum processors. One of their flagship applications is the variational quantum eigensolver (VQE) -- an algorithm to calculate the minimum energy of a physical Hamiltonian. In this study, we investig…
▽ More
Quantum computing brings a promise of new approaches into computational quantum chemistry. While universal, fault-tolerant quantum computers are still not available, we want to utilize today's noisy quantum processors. One of their flagship applications is the variational quantum eigensolver (VQE) -- an algorithm to calculate the minimum energy of a physical Hamiltonian. In this study, we investigate how various types of errors affect the VQE, and how to efficiently use the available resources to produce precise computational results. We utilize a simulator of a noisy quantum device, an exact statevector simulator, as well as physical quantum hardware to study the VQE algorithm for molecular hydrogen. We find that the optimal way of running the hybrid classical-quantum optimization is to (i) allow some noise in intermediate energy evaluations, using fewer shots per step and fewer optimization iterations, but require high final readout precision, (ii) emphasize efficient problem encoding and ansatz parametrization, and (iii) run all experiments within a short time-frame, avoiding parameter drift with time. Nevertheless, current publicly available quantum resources are still very noisy and scarce/expensive, and even when using them efficiently it is quite difficult to obtain trustworthy calculations of molecular energies.
△ Less
Submitted 9 November, 2021;
originally announced November 2021.
-
Device-independent bounds from Cabello's nonlocality argument
Authors:
Ashutosh Rai,
Matej Pivoluska,
Martin Plesch,
Souradeep Sasmal,
Manik Banik,
Sibasish Ghosh
Abstract:
Hardy-type arguments manifest Bell nonlocality in one of the simplest possible ways. Except for demonstrating nonclassical signature of entangled states in question, they can also serve for device-independent self-testing of states, as shown, e.g., in Phys. Rev. Lett. 109, 180401 (2012). Here we develop and broaden these results to an extended version of Hardy's argument, often referred to as Cabe…
▽ More
Hardy-type arguments manifest Bell nonlocality in one of the simplest possible ways. Except for demonstrating nonclassical signature of entangled states in question, they can also serve for device-independent self-testing of states, as shown, e.g., in Phys. Rev. Lett. 109, 180401 (2012). Here we develop and broaden these results to an extended version of Hardy's argument, often referred to as Cabello's nonlocality argument. We show that, as in the simpler case of Hardy's nonlocality argument, the maximum quantum value for Cabello's nonlocality is achieved by a pure two-qubit state and projective measurements that are unique up to local isometries. We also examine the properties of a more realistic case when small errors in the ideal constraints are accepted within the probabilities obtained and prove that also in this case the two-qubit state and measurements are sufficient for obtaining the maximum quantum violation of the classical bound.
△ Less
Submitted 26 June, 2021; v1 submitted 17 March, 2021;
originally announced March 2021.
-
Choice of mutually unbiased bases and outcome labelling affects measurement outcome secrecy
Authors:
Mirdit Doda,
Matej Pivoluska,
Martin Plesch
Abstract:
Mutually unbiased bases (MUBs) are a crucial ingredient for many protocols in quantum information processing. Measurements performed in these bases are unbiased to the maximally possible extent, which is used to prove randomness or secrecy of measurement results. In this work we show that certain properties of sets of MUBs crucially depend on their specific choice, including, somewhat surprisingly…
▽ More
Mutually unbiased bases (MUBs) are a crucial ingredient for many protocols in quantum information processing. Measurements performed in these bases are unbiased to the maximally possible extent, which is used to prove randomness or secrecy of measurement results. In this work we show that certain properties of sets of MUBs crucially depend on their specific choice, including, somewhat surprisingly, measurement outcome labelling. If measurements are chosen in a coherent way, the secrecy of the result can be completely lost for specific sets of MUB measurements, while partially retained for others. This can potentially impact a broad spectrum of applications, where MUBs are utilized.
△ Less
Submitted 10 March, 2021; v1 submitted 15 June, 2020;
originally announced June 2020.
-
Quantum key distribution overcoming extreme noise: simultaneous subspace coding using high-dimensional entanglement
Authors:
Mirdit Doda,
Marcus Huber,
Gláucia Murta,
Matej Pivoluska,
Martin Plesch,
Chrysoula Vlachou
Abstract:
High-dimensional entanglement promises to increase the information capacity of photons and is now routinely generated exploiting spatio-temporal degrees of freedom of single photons. A curious feature of these systems is the possibility to certify entanglement despite strong noise in the data. We show that it is also possible to exploit this noisy high-dimensional entanglement for quantum key dist…
▽ More
High-dimensional entanglement promises to increase the information capacity of photons and is now routinely generated exploiting spatio-temporal degrees of freedom of single photons. A curious feature of these systems is the possibility to certify entanglement despite strong noise in the data. We show that it is also possible to exploit this noisy high-dimensional entanglement for quantum key distribution by introducing a protocol that uses mutliple subspaces of the high-dimensional system simultaneously. Our protocol can be used to establish a secret key even in extremely noisy experimental conditions, where qubit protocols fail. To show that, we analyze the performance of our protocol for noise models that apply to the two most commonly used sources of high-dimensional entanglement: time bins and spatial modes.
△ Less
Submitted 10 March, 2021; v1 submitted 27 April, 2020;
originally announced April 2020.
-
Semi-Device-Independent Random Number Generation with Flexible Assumptions
Authors:
Matej Pivoluska,
Martin Plesch,
Máté Farkas,
Natália Ružičková,
Clara Flegel,
Natalia Herrera Valencia,
Will McCutcheon,
Mehul Malik,
Edgar A. Aguilar
Abstract:
Our ability to trust that a random number is truly random is essential for fields as diverse as cryptography and fundamental tests of quantum mechanics. Existing solutions both come with drawbacks -- device-independent quantum random number generators (QRNGs) are highly impractical and standard semi-device-independent QRNGs are limited to a specific physical implementation and level of trust. Here…
▽ More
Our ability to trust that a random number is truly random is essential for fields as diverse as cryptography and fundamental tests of quantum mechanics. Existing solutions both come with drawbacks -- device-independent quantum random number generators (QRNGs) are highly impractical and standard semi-device-independent QRNGs are limited to a specific physical implementation and level of trust. Here we propose a new framework for semi-device-independent randomness certification, using a source of trusted vacuum in the form of a signal shutter. It employs a flexible set of assumptions and levels of trust, allowing it to be applied in a wide range of physical scenarios involving both quantum and classical entropy sources. We experimentally demonstrate our protocol with a photonic setup and generate secure random bits under three different assumptions with varying degrees of security and resulting data rates.
△ Less
Submitted 19 March, 2021; v1 submitted 27 February, 2020;
originally announced February 2020.
-
The IYPT and the Ring Oiler Problem
Authors:
Martin Plesch,
Samuel Plesník,
Natália Ružičková
Abstract:
The International Young Physicists' Tournament (IYPT) continued in 2018 in Bei**g, China and 2019 in Warsaw, Poland with its 31\ts{st} and 32\ts{nd} editions. IYPT is a modern scientific competition for teams of high school students, also known as the Physics World Cup. It involves long time theoretical and experimental work focused on solving 17 publicly announced open ended problems in a teams…
▽ More
The International Young Physicists' Tournament (IYPT) continued in 2018 in Bei**g, China and 2019 in Warsaw, Poland with its 31\ts{st} and 32\ts{nd} editions. IYPT is a modern scientific competition for teams of high school students, also known as the Physics World Cup. It involves long time theoretical and experimental work focused on solving 17 publicly announced open ended problems in a teams of five. On top of that, teams have to present their solutions in front of other teams and scientific jury and get opposed and reviewed by their peers. Here we present a brief information about the competition with a specific focus on one of the IYPT 2018 tasks - the Ring Oiler. This seemingly simple mechanical problem appeared to be of such a complexity that even the dozens of participating teams and jurying scientists were not able to solve all of its subtleties.
△ Less
Submitted 8 October, 2019;
originally announced October 2019.
-
Influence of Physical Properties of Hockey Stick Blade on Shots
Authors:
Martin Plesch,
Samuel Ján Plesník,
Natália Ružičková
Abstract:
Parameters of a shot of an ice hockey player are mostly determined by the capabilities of the player and the physical properties of the stick used. To reach better performance, every hockey player uses also a hockey tape for an adjustment of the stick blade, that changes both the dam** properties as well as the friction coefficient of the blade surface. To show the unexpected extent to which the…
▽ More
Parameters of a shot of an ice hockey player are mostly determined by the capabilities of the player and the physical properties of the stick used. To reach better performance, every hockey player uses also a hockey tape for an adjustment of the stick blade, that changes both the dam** properties as well as the friction coefficient of the blade surface. To show the unexpected extent to which these physical properties of the blade affect the shot, we compared two types of blade cover: traditional tape (rolled onto the blade) and a blade sticker that adheres to both sides of the hockey stick blade. We analysed high-speed recordings of two types of shots by 13 players, ranging from amateurs and junior players to NHL superstars. The two covers differ greatly in friction coefficient and stiffness, which results in significantly (more than $99\%$ confidence) greater speed, rotation and energy when using the stiffer and rougher sticker.
△ Less
Submitted 1 August, 2019; v1 submitted 20 February, 2019;
originally announced March 2019.
-
The International Young Physicists' Tournament 2017
Authors:
Martin Plesch,
Matej Badin,
Natália Ružicková
Abstract:
In July 2017, National University of Singapore hosted the 30th International Young Physicists' Tournament (IYPT) with symbolic participation of $30$ competing teams. IYPT is a modern scientific competition for teams of high school students, also known as Physics World Cup. Here we present a brief report from this years competition with a concise list of problems solved by participating teams. For…
▽ More
In July 2017, National University of Singapore hosted the 30th International Young Physicists' Tournament (IYPT) with symbolic participation of $30$ competing teams. IYPT is a modern scientific competition for teams of high school students, also known as Physics World Cup. Here we present a brief report from this years competition with a concise list of problems solved by participating teams. For one of the problems, Torsion gyroscope, we also bring a glimpse into its theoretical and experimental solution.
△ Less
Submitted 18 December, 2017;
originally announced December 2017.
-
Loss of Information in Quantum Guessing Game
Authors:
Martin Plesch,
Matej Pivoluska
Abstract:
Incompatibility of certain measurements -- impossibility of obtaining deterministic outcomes simultaneously -- is a well known property of quantum mechanics. This feature can be utilized in many contexts, ranging from Bell inequalities to device dependent QKD protocols. Typically, in these applications the measurements are chosen from a predetermined set based on a classical random variable. One c…
▽ More
Incompatibility of certain measurements -- impossibility of obtaining deterministic outcomes simultaneously -- is a well known property of quantum mechanics. This feature can be utilized in many contexts, ranging from Bell inequalities to device dependent QKD protocols. Typically, in these applications the measurements are chosen from a predetermined set based on a classical random variable. One can naturally ask, whether the non-determinism of the outcomes is due to intrinsic hiding property of quantum mechanics, or rather by the fact that classical, incoherent information entered the system via the choice of the measurement. Authors of [NJP 19, 023038 (2017)] examined this question for a specific case of two mutually unbiased measurements on systems of different dimensions. They have somewhat surprisingly shown that in case of qubits, if the measurements are chosen coherently with the use of a controlled unitary, outcomes of both measurements can be guessed deterministically. Here we extend their analysis and show that specifically for qubits, measurement result for any set of measurements with any a-priori probability distribution can be faithfully guessed by a suitable state preparation and measurement. We also show that up to a small set of specific cases, this is not possible for higher dimensions. This result manifests a deep difference in properties of qubits and higher dimensional systems and suggests that these systems might offer higher security in specific cryptographic protocols. More fundamentally, the results show that the impossibility of predicting a result of a measurement is not caused solely by a loss of coherence between the choice of the measurement and the guessing procedure.
△ Less
Submitted 4 September, 2017;
originally announced September 2017.
-
Gee-Haw Whammy Diddle
Authors:
Martin Marek,
Matej Badin,
Martin Plesch
Abstract:
Gee-Haw Whammy Diddle is a seemingly simple mechanical toy consisting of a wooden stick and a second stick that is made up of a series of notches with a propeller at its end. When the wooden stick is pulled over the notches, the propeller starts to rotate. In spite of its simplicity, physical principles governing the motion of the stick and the propeller are rather complicated and interesting. Her…
▽ More
Gee-Haw Whammy Diddle is a seemingly simple mechanical toy consisting of a wooden stick and a second stick that is made up of a series of notches with a propeller at its end. When the wooden stick is pulled over the notches, the propeller starts to rotate. In spite of its simplicity, physical principles governing the motion of the stick and the propeller are rather complicated and interesting. Here we provide a thorough analysis of the system and parameters influencing the motion. We show that contrary to the results published on this topic so far, neither elliptic motion of the stick nor frequency synchronization is needed for starting the motion of the propeller.
△ Less
Submitted 4 July, 2017;
originally announced July 2017.
-
1-out-of-2 Oblivious transfer using flawed Bit-string quantum protocol
Authors:
Martin Plesch,
Marcin Pawlowski,
Matej Pivoluska
Abstract:
Oblivious transfer (OT) is an important tool in cryptography. It serves as a subroutine to other complex procedures of both theoretical and practical significance. Common attribute of OT protocols is that one party (Alice) has to send a message to another party (Bob) and has to stay oblivious on whether Bob did receive the message. Specific (OT) protocols vary by exact definition of the task - in…
▽ More
Oblivious transfer (OT) is an important tool in cryptography. It serves as a subroutine to other complex procedures of both theoretical and practical significance. Common attribute of OT protocols is that one party (Alice) has to send a message to another party (Bob) and has to stay oblivious on whether Bob did receive the message. Specific (OT) protocols vary by exact definition of the task - in the all-or-nothing protocol Alice sends a single bit-string message, which Bob is able to read only with 50% probability, whereas in 1-out-of-2 OT protocol Bob reads one out of two messages sent by Alice. These two flavours of protocol are known to be equivalent. Recently a computationally secure all-or-nothing OT protocol based on quantum states was developed in [A. Souto et. al., PRA 91, 042306], which however cannot be reduced to 1-out-of-2 OT protocol by standard means. Here we present an elaborated reduction of this protocol which retains the security of the original.
△ Less
Submitted 30 November, 2016;
originally announced November 2016.
-
Tight bound on the classical value of generalized Clauser-Horne-Shimony-Holt games
Authors:
Matej Pivoluska,
Marcin Pawlowski,
Martin Plesch
Abstract:
Non-local games are an important part of quantum information processing. Recently there has been an increased interest in generalizing non-local games beyond the basic setup by considering games with multiple parties and/or with large alphabet inputs and outputs. In this paper we consider another interesting generalization -- games with non-uniform inputs. Here we derive a tight upper bound for th…
▽ More
Non-local games are an important part of quantum information processing. Recently there has been an increased interest in generalizing non-local games beyond the basic setup by considering games with multiple parties and/or with large alphabet inputs and outputs. In this paper we consider another interesting generalization -- games with non-uniform inputs. Here we derive a tight upper bound for the classical winning probability for a specific family of non-local games with non-uniform input distribution, known as $\mathrm{CHSH}_q(p)$ which was introduced recently in the context of relativistic bit-commitment protocols by [Chakraborty et. al., PRL 115, 250501, 2015].
△ Less
Submitted 8 September, 2016; v1 submitted 29 January, 2016;
originally announced January 2016.
-
An explicit classical strategy for winning a $\mathrm{CHSH}_{q}$ game
Authors:
Matej Pivoluska,
Martin Plesch
Abstract:
A $\mathrm{CHSH}_{q}$ game is a generalization of the standard two player $\mathrm{CHSH}$ game, having $q$ different input and output options. In contrast to the binary game, the best classical and quantum winning strategies are not known exactly. In this paper we provide a constructive classical strategy for winning a $\mathrm{CHSH}_{q}$ game, with $q$ being a prime. Our construction achieves a w…
▽ More
A $\mathrm{CHSH}_{q}$ game is a generalization of the standard two player $\mathrm{CHSH}$ game, having $q$ different input and output options. In contrast to the binary game, the best classical and quantum winning strategies are not known exactly. In this paper we provide a constructive classical strategy for winning a $\mathrm{CHSH}_{q}$ game, with $q$ being a prime. Our construction achieves a winning probability better than $\frac{1}{22}q^{-\frac{2}{3}}$, which is in contrast with the previously known constructive strategies achieving only the winning probability of $O(q^{-1})$.
△ Less
Submitted 26 October, 2015;
originally announced October 2015.
-
Device Independent Random Number Generation
Authors:
Mataj Pivoluska,
Martin Plesch
Abstract:
Randomness is an invaluable resource in today's life with a broad use reaching from numerical simulations through randomized algorithms to cryptography. However, on the classical level no true randomness is available and even the use of simple quantum devices in a prepare-measure setting suffers from lack of stability and controllability. This gave rise to a group of quantum protocols that provide…
▽ More
Randomness is an invaluable resource in today's life with a broad use reaching from numerical simulations through randomized algorithms to cryptography. However, on the classical level no true randomness is available and even the use of simple quantum devices in a prepare-measure setting suffers from lack of stability and controllability. This gave rise to a group of quantum protocols that provide randomness certified by classical statistical tests -- Device Independent Quantum Random Number Generators. In this paper we review the most relevant results in this field, which allow the production of almost perfect randomness with help of quantum devices, supplemented with an arbitrary weak source of additional randomness. This is in fact the best one could hope for to achieve, as with no starting randomness (corresponding to no free will in a different concept) even a quantum world would have a fully deterministic description.
△ Less
Submitted 23 February, 2015;
originally announced February 2015.
-
Device-independent randomness extraction for arbitrarily weak min-entropy source
Authors:
Jan Bouda,
Marcin Pawlowski,
Matej Pivoluska,
Martin Plesch
Abstract:
Expansion and amplification of weak randomness plays a crucial role in many security protocols. Using quantum devices, such procedure is possible even without trusting the devices used, by utilizing correlations between outcomes of parts of the devices. We show here how to extract random bits with an arbitrarily low bias from a single arbitrarily weak min-entropy source in a device independent set…
▽ More
Expansion and amplification of weak randomness plays a crucial role in many security protocols. Using quantum devices, such procedure is possible even without trusting the devices used, by utilizing correlations between outcomes of parts of the devices. We show here how to extract random bits with an arbitrarily low bias from a single arbitrarily weak min-entropy source in a device independent setting. To do this we use Mermin devices that exhibit super-classical correlations. Number of devices used scales polynomially in the length of the random sequence $n$. Our protocol is robust, it can tolerate devices that malfunction with a probability drop** polynomially in $n$ at the cost of a minor increase of the number of devices used.
△ Less
Submitted 14 March, 2014; v1 submitted 5 February, 2014;
originally announced February 2014.
-
Comment on "Quantum Szilard Engine"
Authors:
Martin Plesch,
Oscar Dahlsten,
John Goold,
Vlatko Vedral
Abstract:
In a recently published letter [S. W. Kim, T. Sagawa, S. DeLiberato, and M. Ueda, PRL 106, 070401 (2011)] the influence of particle statistics on extractable work in the Szilard engine was discussed. We point out that the expressions given there suggest no work extraction is possible in the low temperature limit if more than two particles are used and thus are not optimal. We argue that the optima…
▽ More
In a recently published letter [S. W. Kim, T. Sagawa, S. DeLiberato, and M. Ueda, PRL 106, 070401 (2011)] the influence of particle statistics on extractable work in the Szilard engine was discussed. We point out that the expressions given there suggest no work extraction is possible in the low temperature limit if more than two particles are used and thus are not optimal. We argue that the optimal extractable work is in general higher and in particular non-decreasing in the number of particles.
△ Less
Submitted 17 September, 2013;
originally announced September 2013.
-
Device-independent randomness amplification with a single device
Authors:
Martin Plesch,
Matej Pivoluska
Abstract:
Expansion and amplification of weak randomness with untrusted quantum devices has recently become a very fruitful topic of research. Here we contribute with a procedure for amplifying a single weak random source using tri-partite GHZ-type entangled states. If the quality of the source reaches a fixed threshold $R=\frac{1}{4}\log_{2}(10)$, perfect random bits can be produced. This technique can be…
▽ More
Expansion and amplification of weak randomness with untrusted quantum devices has recently become a very fruitful topic of research. Here we contribute with a procedure for amplifying a single weak random source using tri-partite GHZ-type entangled states. If the quality of the source reaches a fixed threshold $R=\frac{1}{4}\log_{2}(10)$, perfect random bits can be produced. This technique can be used to extract randomness from sources that can't be extracted neither classically, nor by existing procedures developed for Santha-Vazirani sources. Our protocol works with a single fault-free device decomposable into three non-communicating parts, that is repeatedly reused throughout the amplification process.
△ Less
Submitted 6 August, 2014; v1 submitted 5 May, 2013;
originally announced May 2013.
-
Weak randomness completely trounces the security of QKD
Authors:
Jan Bouda,
Matej Pivoluska,
Martin Plesch,
Colin Wilmott
Abstract:
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel im…
▽ More
In usual security proofs of quantum protocols the adversary (Eve) is expected to have full control over any quantum communication between any communicating parties (Alice and Bob). Eve is also expected to have full access to an authenticated classical channel between Alice and Bob. Unconditional security against any attack by Eve can be proved even in the realistic setting of device and channel imperfection. In this Letter we show that the security of QKD protocols is ruined if one allows Eve to possess a very limited access to the random sources used by Alice. Such knowledge should always be expected in realistic experimental conditions via different side channels.
△ Less
Submitted 9 June, 2012; v1 submitted 6 June, 2012;
originally announced June 2012.
-
Measurement and Particle Statistics in the Szilard Engine
Authors:
Martin Plesch,
Oscar Dahlsten,
John Goold,
Vlatko Vedral
Abstract:
A Szilard Engine is a hypothetical device which is able to extract work from a single thermal reservoir by measuring the position of particles within the engine. We derive the amount of work that can be extracted from such a device in the low temperature limit. Interestingly, we show this work is determined by the information gain of the initial measurement rather than by the number and type of pa…
▽ More
A Szilard Engine is a hypothetical device which is able to extract work from a single thermal reservoir by measuring the position of particles within the engine. We derive the amount of work that can be extracted from such a device in the low temperature limit. Interestingly, we show this work is determined by the information gain of the initial measurement rather than by the number and type of particles which constitute the working substance. Our work provides another clear connection between information gain and extractable work in thermodynamical processes.
△ Less
Submitted 2 March, 2012;
originally announced March 2012.
-
Encryption with Weakly Random Keys Using Quantum Ciphertext
Authors:
J. Bouda,
M. Pivoluska,
M. Plesch
Abstract:
The lack of perfect randomness can cause significant problems in securing communication between two parties. McInnes and Pinkas proved that unconditionally secure encryption is impossible when the key is sampled from a weak random source. The adversary can always gain some information about the plaintext, regardless of the cryptosystem design. Most notably, the adversary can obtain full informatio…
▽ More
The lack of perfect randomness can cause significant problems in securing communication between two parties. McInnes and Pinkas proved that unconditionally secure encryption is impossible when the key is sampled from a weak random source. The adversary can always gain some information about the plaintext, regardless of the cryptosystem design. Most notably, the adversary can obtain full information about the plaintext if he has access to just two bits of information about the source (irrespective on length of the key). In this paper we show that for every weak random source there is a cryptosystem with a classical plaintext, a classical key, and a quantum ciphertext that bounds the adversary's probability p to guess correctly the plaintext strictly under the McInnes-Pinkas bound, except for a single case, where it coincides with the bound. In addition, regardless of the source of randomness, the adversary's probability p is strictly smaller than 1 as long as there is some uncertainty in the key (Shannon/min-entropy is non-zero). These results are another demonstration that quantum information processing can solve cryptographic tasks with strictly higher security than classical information processing.
△ Less
Submitted 17 February, 2012; v1 submitted 9 September, 2011;
originally announced September 2011.
-
Purification of genuine multipartite entanglement
Authors:
Marcus Huber,
Martin Plesch
Abstract:
In tasks, where multipartite entanglement plays a central role, state purification is, due to inevitable noise, a crucial part of the procedure. We consider a scenario exploiting the multipartite entanglement in a straightforward multipartite purification algorithm and compare it to bipartite purification procedures combined with state teleportation. While complete purification requires an infinit…
▽ More
In tasks, where multipartite entanglement plays a central role, state purification is, due to inevitable noise, a crucial part of the procedure. We consider a scenario exploiting the multipartite entanglement in a straightforward multipartite purification algorithm and compare it to bipartite purification procedures combined with state teleportation. While complete purification requires an infinite amount of input states in both cases, we show that for an imperfect output fidelity the multipartite procedure exhibits a major advantage in terms of input states used.
△ Less
Submitted 16 June, 2011; v1 submitted 22 March, 2011;
originally announced March 2011.
-
Quantum-state preparation with universal gate decompositions
Authors:
Martin Plesch,
Časlav Brukner
Abstract:
In quantum computation every unitary operation can be decomposed into quantum circuits-a series of single-qubit rotations and a single type entangling two-qubit gates, such as controlled-NOT (CNOT) gates. Two measures are important when judging the complexity of the circuit: the total number of CNOT gates needed to implement it and the depth of the circuit, measured by the minimal number of comput…
▽ More
In quantum computation every unitary operation can be decomposed into quantum circuits-a series of single-qubit rotations and a single type entangling two-qubit gates, such as controlled-NOT (CNOT) gates. Two measures are important when judging the complexity of the circuit: the total number of CNOT gates needed to implement it and the depth of the circuit, measured by the minimal number of computation steps needed to perform it. Here we give an explicit and simple quantum circuit scheme for preparation of arbitrary quantum states, which can directly utilize any decomposition scheme for arbitrary full quantum gates, thus connecting the two problems. Our circuit reduces the depth of the best currently known circuit by a factor of 2. It also reduces the total number of CNOT gates from 2^n to 23/24 2^n in the leading order for even number of qubits. Specifically, the scheme allows us to decrease the upper bound from 11 CNOT gates to 9 and the depth from 11 to 5 steps for four qubits. Our results are expected to help in designing and building small-scale quantum circuits using present technologies.
△ Less
Submitted 4 March, 2011; v1 submitted 30 March, 2010;
originally announced March 2010.
-
Efficient compression of quantum information
Authors:
Martin Plesch,
Vladimir Buzek
Abstract:
We propose a scheme for an exact efficient transformation of a tensor product state of many identically prepared qubits into a state of a logarithmically small number of qubits. Using a quadratic number of elementary quantum gates we transform N identically prepared qubits into a state, which is nontrivial only on the first log(N+1) qubits. This procedure might be useful for quantum memories, as…
▽ More
We propose a scheme for an exact efficient transformation of a tensor product state of many identically prepared qubits into a state of a logarithmically small number of qubits. Using a quadratic number of elementary quantum gates we transform N identically prepared qubits into a state, which is nontrivial only on the first log(N+1) qubits. This procedure might be useful for quantum memories, as only a small portion of the original qubits has to be stored. Another possible application is in communicating a direction encoded in a set of quantum states, as the compressed state provides a high-effective method for such an encoding.
△ Less
Submitted 2 February, 2010; v1 submitted 10 July, 2009;
originally announced July 2009.
-
Scrutinizing single-qubit quantum channels: Theory and experiment with trapped ions
Authors:
Thilo Hannemann,
Christof Wunderlich,
Martin Plesch,
Mario Ziman,
Vladimir Buzek
Abstract:
We report experimental implementation of various types of qubit channels using an individual trapped ion. We analyzed experimental data and we performed tomographic reconstruction of quantum channels based on these data. Specifically, we studied phase dam** channels, where the dam** acts either in the xy-plane of the Bloch sphere or in an arbitrary plane that includes the origin of the Bloch…
▽ More
We report experimental implementation of various types of qubit channels using an individual trapped ion. We analyzed experimental data and we performed tomographic reconstruction of quantum channels based on these data. Specifically, we studied phase dam** channels, where the dam** acts either in the xy-plane of the Bloch sphere or in an arbitrary plane that includes the origin of the Bloch sphere. We also experimentally realized and consequently analyzed quantum channels that in addition to phase dam** affect also a polarization rotation. We used three reconstruction schemes for estimation of quantum channels from experimental data: (1) a linear inverse method, (2) a maximum likelihood estimation, and (3) a constrained maximum likelihood estimation. We took into account realistic experimental conditions where imperfect test-state preparations and biased measurements are incorporated into the estimation schemes. As a result we found that imperfections present in the process of preparation of test states and as well as in measurements of the considered ion trap system do not limit the control of the implementation of the desired channel. Even imperfect preparation of test state and subsequent measurements still provide sufficient resources for the complete quantum-channel tomography.
△ Less
Submitted 6 April, 2009;
originally announced April 2009.
-
Towards optimization of quantum circuits
Authors:
Michal Sedlak,
Martin Plesch
Abstract:
Any unitary operation in quantum information processing can be implemented via a sequence of simpler steps - quantum gates. However, actual implementation of a quantum gate is always imperfect and takes a finite time. Therefore, seeking for a short sequence of gates - efficient quantum circuit for a given operation, is an important task. We contribute to this issue by proposing optimization of t…
▽ More
Any unitary operation in quantum information processing can be implemented via a sequence of simpler steps - quantum gates. However, actual implementation of a quantum gate is always imperfect and takes a finite time. Therefore, seeking for a short sequence of gates - efficient quantum circuit for a given operation, is an important task. We contribute to this issue by proposing optimization of the well-known universal procedure proposed by Barenco et.al [1]. We also created a computer program which realizes both Barenco's decomposition and the proposed optimization. Furthermore, our optimization can be applied to any quantum circuit containing generalized Toffoli gates, including basic quantum gate circuits.
△ Less
Submitted 8 November, 2006; v1 submitted 18 July, 2006;
originally announced July 2006.
-
Process reconstruction: From unphysical to physical maps via maximum likelihood
Authors:
Mario Ziman,
Martin Plesch,
Vladimir Buzek,
Peter Stelmachovic
Abstract:
We show that the method of maximum likelihood (MML) provides us with an efficient scheme for reconstruction of quantum channels from incomplete measurement data. By construction this scheme always results in estimations of channels that are completely positive. Using this property we use the MML for a derivation of physical approximations of un-physical operations. In particular, we analyze the…
▽ More
We show that the method of maximum likelihood (MML) provides us with an efficient scheme for reconstruction of quantum channels from incomplete measurement data. By construction this scheme always results in estimations of channels that are completely positive. Using this property we use the MML for a derivation of physical approximations of un-physical operations. In particular, we analyze the optimal approximation of the universal NOT gate as well as a physical approximation of a quantum nonlinear polarization rotation.
△ Less
Submitted 19 January, 2005;
originally announced January 2005.
-
Process reconstruction from incomplete and/or inconsistent data
Authors:
Mario Ziman,
Martin Plesch,
Vladimir Buzek
Abstract:
We analyze how an action of a qubit channel (map) can be estimated from the measured data that are incomplete or even inconsistent. That is, we consider situations when measurement statistics is insufficient to determine consistent probability distributions. As a consequence either the estimation (reconstruction) of the channel completely fails or it results in an unphysical channel (i.e., the c…
▽ More
We analyze how an action of a qubit channel (map) can be estimated from the measured data that are incomplete or even inconsistent. That is, we consider situations when measurement statistics is insufficient to determine consistent probability distributions. As a consequence either the estimation (reconstruction) of the channel completely fails or it results in an unphysical channel (i.e., the corresponding map is not completely positive). We present a regularization procedure that allows us to derive physically reasonable estimates (approximations) of quantum channels. We illustrate our procedure on specific examples and we show that the procedure can be also used for a derivation of optimal approximations of operations that are forbidden by the laws of quantum mechanics (e.g., the universal NOT gate).
△ Less
Submitted 16 December, 2004;
originally announced December 2004.
-
Reconstruction of superoperators from incomplete measurements
Authors:
Mario Ziman,
Martin Plesch,
Vladimir Buzek
Abstract:
We present strategies how to reconstruct (estimate) properties of a quantum channel described by the map E based on incomplete measurements. In a particular case of a qubit channel a complete reconstruction of the map E can be performed via complete tomography of four output states E[rho_j ] that originate from a set of four linearly independent test states j (j = 1, 2, 3, 4) at the input of the…
▽ More
We present strategies how to reconstruct (estimate) properties of a quantum channel described by the map E based on incomplete measurements. In a particular case of a qubit channel a complete reconstruction of the map E can be performed via complete tomography of four output states E[rho_j ] that originate from a set of four linearly independent test states j (j = 1, 2, 3, 4) at the input of the channel. We study the situation when less than four linearly independent states are transmitted via the channel and measured at the output. We present strategies how to reconstruct the channel when just one, two or three states are transmitted via the channel. In particular, we show that if just one state is transmitted via the channel then the best reconstruction can be achieved when this state is a total mixture described by the density operator rho = I/2. To improve the reconstruction procedure one has to send via the channel more states. The best strategy is to complement the total mixture with pure states that are mutually orthogonal in the sense of the Bloch-sphere representation. We show that unitary transformations (channels) can be uniquely reconstructed (determined) based on the information of how three properly chosen input states are transformed under the action of the channel.
△ Less
Submitted 14 June, 2004;
originally announced June 2004.
-
Controlling bi-partite entanglement in multi-qubit systems
Authors:
Martin Plesch,
Jaroslav Novotny,
Zuzana Dzurakova,
Vladimir Buzek
Abstract:
Bi-partite entanglement in multi-qubit systems cannot be shared freely. The rules of quantum mechanics impose bounds on how multi-qubit systems can be correlated. In this paper we utilize a concept of entangled graphs with weighted edges in order to analyze pure quantum states of multi-qubit systems. Here qubits are represented by vertexes of the graph while the presence of bi-partite entangleme…
▽ More
Bi-partite entanglement in multi-qubit systems cannot be shared freely. The rules of quantum mechanics impose bounds on how multi-qubit systems can be correlated. In this paper we utilize a concept of entangled graphs with weighted edges in order to analyze pure quantum states of multi-qubit systems. Here qubits are represented by vertexes of the graph while the presence of bi-partite entanglement is represented by an edge between corresponding vertexes. The weight of each edge is defined to be the entanglement between the two qubits connected by the edge, as measured by the concurrence. We prove that each entangled graph with entanglement bounded by a specific value of the concurrence can be represented by a pure multi-qubit state. In addition we present a logic network with O(N2) elementary gates that can be used for preparation of the weighted entangled graphs of N qubits.
△ Less
Submitted 11 November, 2003;
originally announced November 2003.
-
Entangled graphs II: Classical correlations in multi-qubit entangled systems
Authors:
Martin Plesch,
Vladimir Buzek
Abstract:
Bipartite correlations in multi-qubit systems cannot be shared freely. The presence of entanglement or classical correlation on certain pairs of qubits may imply correlations on other pairs. We present a method of characterization of bi-partite correlations in multi-qubit systems using a concept of entangled graphs that has been introduced in our earlier work [M.Plesch and V.Buzek, Phys. Rev. A…
▽ More
Bipartite correlations in multi-qubit systems cannot be shared freely. The presence of entanglement or classical correlation on certain pairs of qubits may imply correlations on other pairs. We present a method of characterization of bi-partite correlations in multi-qubit systems using a concept of entangled graphs that has been introduced in our earlier work [M.Plesch and V.Buzek, Phys. Rev. A 67, 012322 (2003)]. In entangled graphs each qubit is represented by a vertex while the entanglement and classical correlations are represented by two types of edges. We prove by construction that any entangled graph with classical correlations can be represented by a mixed state of N qubits. However, not all entangled graphs with classical correlations can be represented by a pure state.
△ Less
Submitted 2 June, 2003;
originally announced June 2003.
-
Entangled graphs: Bipartite entanglement in multi-qubit systems
Authors:
Martin Plesch,
Vladimir Buzek
Abstract:
Quantum entanglement in multipartite systems cannot be shared freely. In order to illuminate basic rules of entanglement sharing between qubits we introduce a concept of an entangled structure (graph) such that each qubit of a multipartite system is associated with a point (vertex) while a bi-partite entanglement between two specific qubits is represented by a connection (edge) between these poi…
▽ More
Quantum entanglement in multipartite systems cannot be shared freely. In order to illuminate basic rules of entanglement sharing between qubits we introduce a concept of an entangled structure (graph) such that each qubit of a multipartite system is associated with a point (vertex) while a bi-partite entanglement between two specific qubits is represented by a connection (edge) between these points. We prove that any such entangled structure can be associated with a pure state of a multi-qubit system. Moreover, we show that a pure state corresponding to a given entangled structure is a superposition of vectors from a subspace of the $2^N$-dimensional Hilbert space, whose dimension grows linearly with the number of entangled pairs.
△ Less
Submitted 5 November, 2002;
originally announced November 2002.