Menu principal

Conférenciers

Resumes

Horaire

Formulaires

Comité de coordination




English

Printer friendly page


Aspects mathématiques de l'informatique quantique
Org: Daniel Gottesman (Perimeter Inst.), Achim Kempf (Waterloo), David Kribs (Guelph) et Michele Mosca (Waterloo; Perimeter Inst.)
[PDF]


ANDRIS AMBAINIS, University of Waterloo, 200 University Avenue West, Waterloo, ON N2L 2T2
A new proof of quantum adiabatic theorem
[PDF]

Adiabatic quantum algorithms are a new approach to quantum computation. While being equivalent to standard quantum circuit model, they present a completely different way of thinking about quantum algorithms.

Adiabatic algorithms are based on the adiabatic theorem of quantum mechanics. Informally, this theorem says that, when a Hamiltonian of a physical system is slowly transformed to a different Hamiltonian, the lowest energy state of the first Hamiltonian is transformed to the lowest energy state of the second Hamiltonian.

We present a new proof of quantum adiabatic theorem, in terms of discrete mathematics.

ARVID BESSEN, Department of Computer Science, Columbia University, New York, NY  10027, USA
A Lower Bound for the Sturm-Liouville Eigenvalue Problem on a Quantum Computer
[PDF]

We study the complexity of approximating the lowest eigenvalue of a Sturm-Liouville differential equation on a quantum computer. Our main focus is on the special case of computing the ground state energy of a quantum system for a given potential.

Recently Papageorgiou and Wo\'zniakowski proved that quantum computers could achieve exponential speedups compared to classical computers for certain potentials. Papageorgiou's and Wo\'zniakowski's method uses the (discretized) unitary propagator exp(i Lq) as a query; here Lq is the differential operator for the Sturm-Liouville problem. If the operator exp(i p Lq) (a "power query") is computable in cost comparable to exp(i Lq) for any integer p, one can solve the Sturm-Liouville problem with O(loge-1) power queries.

In this paper we will prove a matching lower bound of W(loge-1) power queries, therefore showing that Q(loge-1) power queries are sufficient and necessary. Our proof is based on a frequency analysis technique, which examines the probability distribution of the final state of a quantum algorithm and the dependence of its Fourier transform on the input. This method was first used to give a lower bound for the number of power queries in the phase estimation problem on quantum computers.

HILARY CARTERET, Université de Montréal, C.P. 6128 succ. Centre-ville, Montréal, Québec H3C 3J7
Noiseless quantum circuits for measuring entanglement
[PDF]

The non-local properties of a density matrix are often defined in terms of the effects of unphysical maps, such as the Partial Transpose on the spectrum of the density matrix (PT-spectrum). Is it possible to measure these functions efficiently, or must we use full state tomography?

Previously proposed methods for measuring these quantities directly relied on the Structural Physical Approximation, which typically produce output states with visibilities that scale poorly with the system size. The moments of the resulting modified density operator must then be measured in a separate procedure, which can be done using a set of generalized Mach-Zehnder interferometers. The spectrum can then be obtained using a little algebra.

I will show how to construct a family of simple quantum circuits that can determine the PT-spectrum for any bipartite state, without incurring any loss of visibility. These circuits measure the minimum amount of information required to determine the PT-spectrum completely. They depend only on the dimension of the state and they will be exact up to the statistical uncertainties inherent in any experimental data. The analysis of the output of these circuits for general bipartite states also raises an interesting eigenspectrum reconstruction problem.

ANDREW CHILDS, California Institute of Technology, Pasadena, CA, USA
The limitations of nice mutually unbiased bases
[PDF]

Mutually unbiased bases of a Hilbert space can be constructed by partitioning a unitary error basis. We consider this construction when the unitary error basis is a nice error basis. We show that the number of resulting mutually unbiased bases can be at most one plus the smallest prime power contained in the dimension, and therefore that this construction cannot improve upon previous approaches. We prove this by establishing a correspondence between nice mutually unbiased bases and abelian subgroups of the index group of a nice error basis and then bounding the number of such subgroups. This bound also has implications for the construction of certain combinatorial objects called nets.

Joint work with Michael Aschbacher and Pawel Wocjan.

J. IGNACIO CIRAC, Max-Planck Institute for Quantum Optics, Hans-Kopferemannstr. 1, D-85748 Garching, Germany
Simulating quantum systems
[PDF]

Many-body quantum systems are very hard to simulate since the dimension of the corresponding Hilbert space scales exponentially with the number of particles N. In practice, however, the quantum states that typically appear in nature may be described with fewer parameters. In this talk I will review a novel description of quantum states which was introduced by F. Verstraete and myself, and it is based on projecting two-particle entangled states of a given dimension D onto subspaces of dimension d, which is the one of the Hilbert spaces corresponding to the original particles. The complexity of these states scales polynomially in d, D and N. Moreover, most of the states that appear in Quantum Information Theory, like cluster, GHZ, W, graphs, etc., have D=2. We have also developed (classical) numerical algorithms based on this description which allow us to simulate quantum many-body systems in 1 and higher spatial dimensions.

RICHARD CLEVE, Universiy of Waterloo
Nonlocality and limits of fault-tolerant computation
[PDF]

We present various results concerning nonlocal behavior in an abstract setting, and then show how to use them to establish upper bounds on the error-threshold below which computations can be made fault-tolerant.

This is joint work with Harry Buhrman, Noah Linden, and Falk Unger.

PATRICK HAYDEN, McGill University, Montreal
On private communication using a shared reference frame
[PDF]

A private shared Cartesian frame is a novel form of private shared correlation that allows for both private classical and quantum communication. Cryptography using a private shared Cartesian frame has the remarkable property that, if perfect security is demanded, the private classical capacity is roughly three times the private quantum capacity. I'll present work done with Stephen Bartlett and Rob Spekkens demonstrating that if the requirement for perfect security is relaxed, then it is possible to use the properties of random subspaces to nearly triple the private quantum capacity.

MARK HILLERY, Hunter College of the City University of New York, Department of Physics, 695 Park Avenue, New York, NY 10020, USA
Programmable quantum circuits
[PDF]

Many quantum circuits are designed to accomplish a single task, such as approximate cloning or teleportation.  It is often useful to have more versatile circuits that can perform many tasks.  Such a circuit has two inputs, data and a program, both of which are quantum states. The data has an operation performed on it, and the program controls what the operation is.  If the circuit is to be able to perform an infinite number of operations with a finite-dimensional program space, it must be either probabilistic or approximate.  That is, it either succeeds only part of the time, or the operations are performed to some level of approximation, and not exactly.  The operation of probabilistic and approximate programmable circuits will be discussed.

PETER HØ YER, Calgary

LOUIS KAUFFMAN, University of Illinois at Chicago
Topological Quantum Computation
[PDF]

This talk will survey joint work with Sam Lomonaco on the use of topology in relation to quantum computation. We begin by a discussion of universal gates based on unitary solutions to the Yang-Baxter equation. We then discuss models based on topological quantum field theory and show, in particular, how to construct the Fibonacci model of Freedman, Kitaev and Wang by using knot theoretic methods based on q-deformations of Penrose spin networks (Temperley Lieb recoupling theory). These methods provide a very direct way to construct representations of the Artin Braid groups that are dense in the unitary groups. Many questions will be discussed in the light of these constructions.

CHRISTOPHER KING, Northeastern University, Boston
Matrix inequalities and multiplicativity results
[PDF]

The multiplicativity of the q ® p norm of a completely positive qubit channel for q < 2 < p follows from some Hanner-type inequalities involving p-norms of positive semidefinite matrices. These inequalities are reviewed, together with their application to the multiplicativity question. Some extensions of the inequalities are described, and some open problems for qubit and higher dimensional channels are also discussed.

GREG KUPERBERG, University of California, Davis
Hybrid quantum memory and its capacity
[PDF]

What is the most general possible kind of memory consistent with quantum mechanics? The only commonly considered kinds are qudits and classical digits, but a hybrid modelled by an arbitrary C*-algebra is more generally possible. The important Choi-Effros theorem implies that it is the most general possible quantum memory model modulo certain (debatable) assumptions. In particular it generalizes the theory of "decoherence-free subspaces".

Assuming this model, when is one hybrid memory worth more than another? I will give a characterization of when many copies of a memory A embed (or blindly encode with perfect fidelity) into slightly more copies of another memory B. In particular, either there is such an embedding, or A admits a state that does not visibly encode into B with high fidelity. The second half of this alternative depends on a Holder inequality for hybrid memories that generalizes the classical pigeonhole principle.

Reference: quant-ph/0203105.

MAIA LESOSKY, University of Guelph
On Generalized Noiseless Subsystems
[PDF]

A generalized notion of noiseless subsystems was recently introduced by Kribs, Laflamme and Poulin as part of a unified and generalized approach to quantum error correction called operator quantum error correction. One advantage to generalized noiseless subsystems is that they are not restricted to unital channels. In this talk I will present some simple examples and outline necessary and sufficient conditions that describe the existence of generalized noiseless subsystems.

DEBBIE LEUNG, University of Waterloo and Caltech
Composition of randomization maps
[PDF]

Recently, various quantum communication tasks have been related to the ability to randomize the state of a quantum system. In this talk, we will see how to obtain communication protocols for multiple receivers by understanding the composition of randomization maps.

ROBERT MARTIN, University of Waterloo, Waterloo, ON N2L 3G1
On the relationship between discrete and continuous representations of quantum information
[PDF]

In classical information theory, sampling theory provides the connection between discrete and continuous representations of information. Here we present a generalization to quantum field theory in which the bandwidth is provided by an ultra-violet cutoff. We investigate, in particular, the role of quantum fluctations as noise and implications for the channel capacity.

ASHWIN NAYAK, University of Waterloo, 200 University Ave. W., Waterloo, ON N2L 3G1
A quantum test for group commutativity
[PDF]

We consider the computational problem of testing whether an implicitly specified group is commutative. The group is defined by its k generators, and a procedure that implements group operations. The computational complexity (in terms of k) of this problem was first considered by Pak (2000). We construct a quite optimal quantum algorithm for this problem whose complexity is in [(O)\tilde](k2/3). The algorithm uses and highlights the power of the quantization method of Szegedy (2004). For the lower bound W(k2/3), we introduce a new technique of reduction for quantum query complexity. We also prove an W(k) lower bound for classical algorithms, which shows that the algorithm of Pak is optimal.

This is joint work with Frédéric Magniez (CNRS-LRI, France).

JONATHAN OPPENHEIM, University of Cambridge
Quantum information can be negative
[PDF]

Even the most ignorant among us cannot know less than nothing. What could negative knowledge mean? In the everyday world we are accustomed to, negative knowledge makes no sense. But in the world where the laws of quantum mechanics hold sway, knowledge can be negative. In essence, one can have situations where someone knows more than everything, and it is in these situations where one finds negative knowledge. This negative knowledge turns out to be precisely the right amount to cancel the fact that we can know too much. Negative knowledge is due to exotic features of quantum information theory and by understanding that quantum knowledge can be negative, we gain deeper insights into such phenomena as quantum networks, quantum teleportation, quantum computation, and the very structure of the quantum world.

In more detail, given part of an unknown quantum state, we determine how much quantum communication is needed to obtain the full state. This is the partial information we need conditional on our previous information. It turns out to be given by an extremely simple formula, the conditional entropy. In the classical case, partial information must always be positive, but we find that in the quantum world this physical quantity can be negative. If the partial information is positive, the sender of the partial information needs to communicate this number of quantum bits to the receiver; if it is negative, they instead gain the corresponding potential for quantum communication in the future. The primitive that is introduced-quantum state merging-enables a systematic understanding of quantum network theory, and several such applications will be discussed.

CARLOS PEREZ, University of Waterloo, 200 University Ave. West, Waterloo, ON N2L 3G1
Models of Quantum Cellular Automata
[PDF]

In this talk we present a systematic view of Quantum Cellular Automata (QCA), a mathematical formalism of quantum computation. We present four QCA models, and compare them. One model we discuss is the traditional QCA, similar to those introduced by Shumacher and Werner, Watrous, and Van Dam. We discuss also Margolus QCA, also discussed by Schumacher and Werner. We introduce two new models, Coloured QCA, and Continuous QCA. We also compare our models with the established models. We give proofs of computational equivalence for several of these models. We show the strengths of each model, and provide examples of how our models can be useful to come up with algorithms, and implement them in real-world physical devices.

MARTIN ROETTELER, NEC Laboratories America, Inc.
On the Power of Random Bases in Fourier Sampling: Hidden Subgroup Problem in the Heisenberg Group
[PDF]

The hidden subgroup problem (HSP) provides a unified framework to study problems of group-theoretical nature in quantum computing such as order finding and the discrete logarithm problem. While it is known that Fourier sampling provides an efficient solution in the abelian case, not much is known for general non-abelian groups. Recently, some authors raised the question as to whether post-processing the Fourier spectrum by measuring in a random orthonormal basis helps for solving the HSP. Several negative results on the shortcomings of this random strong method are known. In this talk I will show that the random strong method can be quite powerful under certain conditions on the group G. In particular the HSP for finite Heisenberg groups can be solved using polynomially many random strong Fourier samplings followed by a possibly exponential classical post-processing without further queries.

Joint work with Jaikumar Radhakrishnan and Pranab Sen.

MARY BETH RUSKAI, Tufts University, Medford, MA  02155, USA
Completely bounded p-norms in quantum information theory
[PDF]

Proof of the multiplicativity of maximal p-norms of noisy quantum channels has been conjectured and is known to imply additivity of minimal entropy and several equivalent conjectures. The concept of a completely bounded norm has been defined in the context of operator spaces. A channel is a completely positive, trace-preserving (CPT) map F acting on the d ×d matrices, which can be regarded as forming a Banach space associated with the Schatten p-norm. The completely bounded norm of F is defined in terms of the action of Im ÄF on tensor products of matrices, which generate a non-commutative vector-valued Lp space. The completely bounded norm of a tensor product of CPT maps is multiplicative. This implies that a certain type of minimal conditional entropy is additive.

This talk is based on joint work with I. Devetak, M. Junge and C. King. It is intended to be accessible to both operator algebraists and quantum information theorists.

ANDREAS WINTER, University of Bristol, Department of Mathematics, Bristol BS8 1TW, UK
Random coding for quantum information
[PDF]

In this talk, the conceptual and mathematical ideas in a Lloyd-Shor type proof of the quantum channel capacity theorem will be presented.

To be precise, we will look at a general quantum channel N, i.e., a completely positive and trace preserving linear map on density operators, and study block coding of quantum information for n instances NÄn of the channel, for large n. After introducing these concepts in mathematical terms, we will study a specific random coding procedure, which we call Haar-random codes. These are akin to P. Shor's proposal [MSRI talk, Nov. 2002; lecture notes online at
http://www.msri.org/publications/ln/msri/2002/quantumcrypto/shor/1/]: the code is (essentially) a subspace of the sender's typical space, chosen according to the unitarily invariant measure.

The "standard" approach to analysing the performance of quantum codes [see S. Lloyd, PRA 1997; I. Devetak, IEEE IT 2005] proceeds by showing


    (i) that a basis of the code subspace can be distinguished reliably by the receiver;
    (ii) that the channel environment has almost no information about this basis;
    (iii) finally, how these two elements imply that superpositions of the basis vectors can be error-corrected with high fidelity.

After highlighting this strategy and some of its technical difficulties, we will demonstrate a new strategy which has the advantage of leading to the result with minimal technical effort, and which is also conceptually nice. It entirely avoids the difficult step (ii), the privacy of the code against the environment, which comes out automatically. Instead, we show


    (a) that a basis and its Fourier conjugate basis of the code subspace each can be distinguished reliably by the receiver;
    (b) how a recently discovered information uncertainty relation [M. Christandl and AW, quant-ph/0501090] then implies that the quantum mutual information between sender and receiver is close to maximum-and the quantum mutual information between sender and environment is close to 0;
    (c) finally, a simple algebraic reasoning [B. Schumacher and M. Westmoreland, Quantum Inf. Proc. 2002] shows the existence of a decoding procedure.

Time permitting, variations and other applications of the Haar-random coding will be shown.

 


top of page
Copyright © Canadian Mathematical Society - Société mathématique du Canada.
Any comments or suggestions should be sent to - Commentaires ou suggestions envoyé à: eo@cms.math.ca.