653 research outputs found

    Quantum walks can find a marked element on any graph

    Full text link
    We solve an open problem by constructing quantum walks that not only detect but also find marked vertices in a graph. In the case when the marked set MM consists of a single vertex, the number of steps of the quantum walk is quadratically smaller than the classical hitting time HT(P,M)HT(P,M) of any reversible random walk PP on the graph. In the case of multiple marked elements, the number of steps is given in terms of a related quantity HT+(P,M)HT^+(\mathit{P,M}) which we call extended hitting time. Our approach is new, simpler and more general than previous ones. We introduce a notion of interpolation between the random walk PP and the absorbing walk PP', whose marked states are absorbing. Then our quantum walk is simply the quantum analogue of this interpolation. Contrary to previous approaches, our results remain valid when the random walk PP is not state-transitive. We also provide algorithms in the cases when only approximations or bounds on parameters pMp_M (the probability of picking a marked vertex from the stationary distribution) and HT+(P,M)HT^+(\mathit{P,M}) are known.Comment: 50 page

    Quantum Computing with Very Noisy Devices

    Full text link
    In theory, quantum computers can efficiently simulate quantum physics, factor large numbers and estimate integrals, thus solving otherwise intractable computational problems. In practice, quantum computers must operate with noisy devices called ``gates'' that tend to destroy the fragile quantum states needed for computation. The goal of fault-tolerant quantum computing is to compute accurately even when gates have a high probability of error each time they are used. Here we give evidence that accurate quantum computing is possible with error probabilities above 3% per gate, which is significantly higher than what was previously thought possible. However, the resources required for computing at such high error probabilities are excessive. Fortunately, they decrease rapidly with decreasing error probabilities. If we had quantum resources comparable to the considerable resources available in today's digital computers, we could implement non-trivial quantum computations at error probabilities as high as 1% per gate.Comment: 47 page

    Delegating Quantum Computation in the Quantum Random Oracle Model

    Full text link
    A delegation scheme allows a computationally weak client to use a server's resources to help it evaluate a complex circuit without leaking any information about the input (other than its length) to the server. In this paper, we consider delegation schemes for quantum circuits, where we try to minimize the quantum operations needed by the client. We construct a new scheme for delegating a large circuit family, which we call "C+P circuits". "C+P" circuits are the circuits composed of Toffoli gates and diagonal gates. Our scheme is non-interactive, requires very little quantum computation from the client (proportional to input length but independent of the circuit size), and can be proved secure in the quantum random oracle model, without relying on additional assumptions, such as the existence of fully homomorphic encryption. In practice the random oracle can be replaced by an appropriate hash function or block cipher, for example, SHA-3, AES. This protocol allows a client to delegate the most expensive part of some quantum algorithms, for example, Shor's algorithm. The previous protocols that are powerful enough to delegate Shor's algorithm require either many rounds of interactions or the existence of FHE. The protocol requires asymptotically fewer quantum gates on the client side compared to running Shor's algorithm locally. To hide the inputs, our scheme uses an encoding that maps one input qubit to multiple qubits. We then provide a novel generalization of classical garbled circuits ("reversible garbled circuits") to allow the computation of Toffoli circuits on this encoding. We also give a technique that can support the computation of phase gates on this encoding. To prove the security of this protocol, we study key dependent message(KDM) security in the quantum random oracle model. KDM security was not previously studied in quantum settings.Comment: 41 pages, 1 figures. Update to be consistent with the proceeding versio

    Decision problems with quantum black boxes

    Get PDF
    We examine how to distinguish between unitary operators, when the exact form of the possible operators is not known. Instead we are supplied with "programs" in the form of unitary transforms, which can be used as references for identifying the unknown unitary transform. All unitary transforms should be used as few times as possible. This situation is analoguous to programmable state discrimination. One difference, however, is that the quantum state to which we apply the unitary transforms may be entangled, leading to a richer variety of possible strategies. By suitable selection of an input state and generalized measurement of the output state, both unambiguous and minimum-error discrimination can be achieved. Pairwise comparison of operators, comparing each transform to be identified with a program transform, is often a useful strategy. There are, however, situations in which more complicated strategies perform better. This is the case especially when the number of allowed applications of program operations is different from the number of the transforms to be identified

    Quantum Algorithm for Dynamic Programming Approach for DAGs. Applications for Zhegalkin Polynomial Evaluation and Some Problems on DAGs

    Full text link
    In this paper, we present a quantum algorithm for dynamic programming approach for problems on directed acyclic graphs (DAGs). The running time of the algorithm is O(n^mlogn^)O(\sqrt{\hat{n}m}\log \hat{n}), and the running time of the best known deterministic algorithm is O(n+m)O(n+m), where nn is the number of vertices, n^\hat{n} is the number of vertices with at least one outgoing edge; mm is the number of edges. We show that we can solve problems that use OR, AND, NAND, MAX and MIN functions as the main transition steps. The approach is useful for a couple of problems. One of them is computing a Boolean formula that is represented by Zhegalkin polynomial, a Boolean circuit with shared input and non-constant depth evaluating. Another two are the single source longest paths search for weighted DAGs and the diameter search problem for unweighted DAGs.Comment: UCNC2019 Conference pape

    Decoherence induced deformation of the ground state in adiabatic quantum computation

    Full text link
    Despite more than a decade of research on adiabatic quantum computation (AQC), its decoherence properties are still poorly understood. Many theoretical works have suggested that AQC is more robust against decoherence, but a quantitative relation between its performance and the qubits' coherence properties, such as decoherence time, is still lacking. While the thermal excitations are known to be important sources of errors, they are predominantly dependent on temperature but rather insensitive to the qubits' coherence. Less understood is the role of virtual excitations, which can also reduce the ground state probability even at zero temperature. Here, we introduce normalized ground state fidelity as a measure of the decoherence-induced deformation of the ground state due to virtual transitions. We calculate the normalized fidelity perturbatively at finite temperatures and discuss its relation to the qubits' relaxation and dephasing times, as well as its projected scaling properties.Comment: 10 pages, 3 figure

    Operational approach to open dynamics and quantifying initial correlations

    Get PDF
    A central aim of physics is to describe the dynamics of physical systems. Schrodinger's equation does this for isolated quantum systems. Describing the time evolution of a quantum system that interacts with its environment, in its most general form, has proved to be difficult because the dynamics is dependent on the state of the environment and the correlations with it. For discrete processes, such as quantum gates or chemical reactions, quantum process tomography provides the complete description of the dynamics, provided that the initial states of the system and the environment are independent of each other. However, many physical systems are correlated with the environment at the beginning of the experiment. Here, we give a prescription of quantum process tomography that yields the complete description of the dynamics of the system even when the initial correlations are present. Surprisingly, our method also gives quantitative expressions for the initial correlation.Comment: Completely re-written for clarity of presentation. 15 pages and 2 figure

    Spatial search using the discrete time quantum walk

    Get PDF
    We study the quantum walk search algorithm of Shenvi et al. (Phys Rev A 67:052307, 2003) on data structures of one to two spatial dimensions, on which the algorithm is thought to be less efficient than in three or more spatial dimensions. Our aim is to understand why the quantum algorithm is dimension dependent whereas the best classical algorithm is not, and to show in more detail how the efficiency of the quantum algorithm varies with spatial dimension or accessibility of the data. Our numerical results agree with the expected scaling in 2D of O(√N log N}) , and show how the prefactors display significant dependence on both the degree and symmetry of the graph. Specifically, we see, as expected, the prefactor of the time complexity dropping as the degree (connectivity) of the structure is increased

    Trophic Garnishes: Cat–Rat Interactions in an Urban Environment

    Get PDF
    BACKGROUND:Community interactions can produce complex dynamics with counterintuitive responses. Synanthropic community members are of increasing practical interest for their effects on biodiversity and public health. Most studies incorporating introduced species have been performed on islands where they may pose a risk to the native fauna. Few have examined their interactions in urban environments where they represent the majority of species. We characterized house cat (Felis catus) predation on wild Norway rats (Rattus norvegicus), and its population effects in an urban area as a model system. Three aspects of predation likely to influence population dynamics were examined; the stratum of the prey population killed by predators, the intensity of the predation, and the size of the predator population. METHODOLOGY/PRINCIPAL FINDINGS:Predation pressure was estimated from the sizes of the rat and cat populations, and the characteristics of rats killed in 20 alleys. Short and long term responses of rat population to perturbations were examined by removal trapping. Perturbations removed an average of 56% of the rats/alley but had no negative long-term impact on the size of the rat population (49.6+/-12.5 rats/alley and 123.8+/-42.2 rats/alley over two years). The sizes of the cat population during two years (3.5 animals/alley and 2.7 animals/alley) also were unaffected by rat population perturbations. Predation by cats occurred in 9/20 alleys. Predated rats were predominantly juveniles and significantly smaller (144.6 g+/-17.8 g) than the trapped rats (385.0 g+/-135.6 g). Cats rarely preyed on the larger, older portion of the rat population. CONCLUSIONS/SIGNIFICANCE:The rat population appears resilient to perturbation from even substantial population reduction using targeted removal. In this area there is a relatively low population density of cats and they only occasionally prey on the rat population. This occasional predation primarily removes the juvenile proportion of the rat population. The top predator in this urban ecosystem appears to have little impact on the size of the prey population, and similarly, reduction in rat populations doesn't impact the size of the cat population. However, the selected targeting of small rats may locally influence the size structure of the population which may have consequences for patterns of pathogen transmission
    corecore