1,860 research outputs found
Qdensity - a Mathematica Quantum Computer Simulation
This Mathematica 5.2 package~\footnote{QDENSITY is available at
http://www.pitt.edu/~tabakin/QDENSITY} is a simulation of a Quantum Computer.
The program provides a modular, instructive approach for generating the basic
elements that make up a quantum circuit. The main emphasis is on using the
density matrix, although an approach using state vectors is also implemented in
the package. The package commands are defined in {\it Qdensity.m} which
contains the tools needed in quantum circuits, e.g. multiqubit kets,
projectors, gates, etc. Selected examples of the basic commands are presented
here and a tutorial notebook, {\it Tutorial.nb} is provided with the package
(available on our website) that serves as a full guide to the package. Finally,
application is made to a variety of relevant cases, including Teleportation,
Quantum Fourier transform, Grover's search and Shor's algorithm, in separate
notebooks: {\it QFT.nb}, {\it Teleportation.nb}, {\it Grover.nb} and {\it
Shor.nb} where each algorithm is explained in detail. Finally, two examples of
the construction and manipulation of cluster states, which are part of ``one
way computing" ideas, are included as an additional tool in the notebook {\it
Cluster.nb}. A Mathematica palette containing most commands in QDENSITY is also
included: {\it QDENSpalette.nb} .Comment: The Mathematica 5+ package is available at:
http://www.pitt.edu/~tabakin/QDENSITY/QDENSITY.htm Minor corrections,
accepted in Computer Physics Communication
Absolutely Maximally Entangled states, combinatorial designs and multi-unitary matrices
Absolutely Maximally Entangled (AME) states are those multipartite quantum
states that carry absolute maximum entanglement in all possible partitions. AME
states are known to play a relevant role in multipartite teleportation, in
quantum secret sharing and they provide the basis novel tensor networks related
to holography. We present alternative constructions of AME states and show
their link with combinatorial designs. We also analyze a key property of AME,
namely their relation to tensors that can be understood as unitary
transformations in every of its bi-partitions. We call this property
multi-unitarity.Comment: 18 pages, 2 figures. Comments are very welcom
Genuinely multipartite entangled states and orthogonal arrays
A pure quantum state of N subsystems with d levels each is called
k-multipartite maximally entangled state, written k-uniform, if all its
reductions to k qudits are maximally mixed. These states form a natural
generalization of N-qudits GHZ states which belong to the class 1-uniform
states. We establish a link between the combinatorial notion of orthogonal
arrays and k-uniform states and prove the existence of several new classes of
such states for N-qudit systems. In particular, known Hadamard matrices allow
us to explicitly construct 2-uniform states for an arbitrary number of N>5
qubits. We show that finding a different class of 2-uniform states would imply
the Hadamard conjecture, so the full classification of 2-uniform states seems
to be currently out of reach. Additionally, single vectors of another class of
2-uniform states are one-to-one related to maximal sets of mutually unbiased
bases. Furthermore, we establish links between existence of k-uniform states,
classical and quantum error correction codes and provide a novel graph
representation for such states.Comment: 24 pages, 7 figures. Comments are very welcome
Gate-Level Simulation of Quantum Circuits
While thousands of experimental physicists and chemists are currently trying
to build scalable quantum computers, it appears that simulation of quantum
computation will be at least as critical as circuit simulation in classical
VLSI design. However, since the work of Richard Feynman in the early 1980s
little progress was made in practical quantum simulation. Most researchers
focused on polynomial-time simulation of restricted types of quantum circuits
that fall short of the full power of quantum computation. Simulating quantum
computing devices and useful quantum algorithms on classical hardware now
requires excessive computational resources, making many important simulation
tasks infeasible. In this work we propose a new technique for gate-level
simulation of quantum circuits which greatly reduces the difficulty and cost of
such simulations. The proposed technique is implemented in a simulation tool
called the Quantum Information Decision Diagram (QuIDD) and evaluated by
simulating Grover's quantum search algorithm. The back-end of our package,
QuIDD Pro, is based on Binary Decision Diagrams, well-known for their ability
to efficiently represent many seemingly intractable combinatorial structures.
This reliance on a well-established area of research allows us to take
advantage of existing software for BDD manipulation and achieve unparalleled
empirical results for quantum simulation
An All-But-One Entropic Uncertainty Relation, and Application to Password-based Identification
Entropic uncertainty relations are quantitative characterizations of
Heisenberg's uncertainty principle, which make use of an entropy measure to
quantify uncertainty. In quantum cryptography, they are often used as
convenient tools in security proofs. We propose a new entropic uncertainty
relation. It is the first such uncertainty relation that lower bounds the
uncertainty in the measurement outcome for all but one choice for the
measurement from an arbitrarily large (but specifically chosen) set of possible
measurements, and, at the same time, uses the min-entropy as entropy measure,
rather than the Shannon entropy. This makes it especially suited for quantum
cryptography. As application, we propose a new quantum identification scheme in
the bounded quantum storage model. It makes use of our new uncertainty relation
at the core of its security proof. In contrast to the original quantum
identification scheme proposed by Damg{\aa}rd et al., our new scheme also
offers some security in case the bounded quantum storage assumption fails hold.
Specifically, our scheme remains secure against an adversary that has unbounded
storage capabilities but is restricted to non-adaptive single-qubit operations.
The scheme by Damg{\aa}rd et al., on the other hand, completely breaks down
under such an attack.Comment: 33 pages, v
- …