quantum algorithms beyond
TRANSCRIPT
1
QuantumQuantumComputing ?Computing ?
OverviewOverviewFour TalksFour Talks
•• A Rosetta Stone for Quantum ComputationA Rosetta Stone for Quantum Computation
•• Quantum Algorithms & BeyondQuantum Algorithms & Beyond
•• Distributive Quantum ComputingDistributive Quantum Computing
•• Topological quantum Computing and theTopological quantum Computing and theJones PolynomialJones Polynomial
•• A Quantum Computing Knot Theoretic MysteryA Quantum Computing Knot Theoretic Mystery---- Can be found on my webpage.Can be found on my webpage.
Samuel J. Lomonaco, Jr.Samuel J. Lomonaco, Jr.Dept. of Comp. Dept. of Comp. SciSci. & Electrical Engineering. & Electrical Engineering
University of Maryland Baltimore CountyUniversity of Maryland Baltimore CountyBaltimore, MD 21250Baltimore, MD 21250
Email: Email: [email protected]@UMBC.EDUWebPageWebPage: : http://http://www.csee.umbc.edu/~lomonacowww.csee.umbc.edu/~lomonaco
LL--OO--OO--PP
Quantum AlgorithmsQuantum Algorithms&&
BeyondBeyond
• The Defense Advance Research ProjectsAgency (DARPA) & Air Force Research
Laboratory (AFRL), Air Force Materiel Command,USAF Agreement Number F30602-01-2-0522.
• The National Institute for Standards and Technology (NIST)• The Mathematical Sciences Research Institute (MSRI).• The L-O-O-P Fund.
• The Institute of Scientific Interchange
LL--OO--OO--PP
This work is supported by:This work is supported by:QuantumQuantum WorldWorld
Quantum StatesQuantum States
SuperpositionSuperposition
UnitaryUnitaryEvolutionEvolution
MeasurementMeasurement
EntanglementEntanglement
Quantum AlgorithmsQuantum Algorithms
2
SimonSimon’’ss
ShorShor’’ss
Q. HiddenQ. HiddenSubgroup Subgroup AlgsAlgs..
AmplitudeAmplitudeAmplifAmplif..AlgsAlgs.. TraceTrace
EstimationEstimation
QuantumQuantumSimulationSimulation
of Q. of Q. SystemsSystems
DeutschDeutsch--JozsaJozsaGroverGrover’’ss JonesJones
Poly. Poly. AlgAlg..
Q. RandomQ. RandomWalksWalks AdiabaticAdiabatic
AlgsAlgs
Exponential Exponential SpeedupSpeedup
Quadratic Quadratic SpeedupSpeedup
NonNon--ClassicalClassicalBehaviorBehavior ??????
OtherOtherAlgsAlgs..
NewNew
RelatedRelated??????
Quantum Algorithms ZooQuantum Algorithms Zoo The Promise of Quantum Computing ?The Promise of Quantum Computing ?
We are trying to leap to what appears to We are trying to leap to what appears to be an exponentially faster computing be an exponentially faster computing domain.domain.
ComputingComputingPowerPower
Time in Time in YearsYears
QuantumQuantumExponentialExponential
SpeedupSpeedup
MooreMoore’’ssLawLaw
Leap to a much faster Leap to a much faster computing domain ?computing domain ?
The Promise of Exponential Speedup ?The Promise of Exponential Speedup ?
•• Break Break ““unbreakableunbreakable”” crypto systemscrypto systems
•• More accurate weather simulation and More accurate weather simulation and predictionprediction
•• Quantum computer simulations of virusesQuantum computer simulations of viruses
•• Much moreMuch more
But on the other hand But on the other hand ……
Fundamental Questions ???Fundamental Questions ???
Will future quantum computers be general Will future quantum computers be general purpose or special purpose devices ???purpose or special purpose devices ???
What are the limits and boundaries What are the limits and boundaries of Quantum Computation ???of Quantum Computation ???
ShorShor’’ssAlgorithm ?Algorithm ?
ShorShor’’ssFactoringFactoring
AlgorithmAlgorithm
3
•• Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Subgroup Quantum Hidden Subgroup Algorithms:Algorithms: A Mathematical Perspective,A Mathematical Perspective, AMS, AMS, CONM/305, (2002), 139CONM/305, (2002), 139--202.202.http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0201095ph/0201095
•• Lomonaco & Kauffman,Lomonaco & Kauffman, Shor'sShor's Quantum Factoring Quantum Factoring AlgorithmAlgorithm,, AMS PSAPM, 58, (2002), 161AMS PSAPM, 58, (2002), 161--179. 179. http://arxiv.org/abs/quanthttp://arxiv.org/abs/quant--ph/0010034ph/0010034
Based on the Following Two PapersBased on the Following Two Papers A A CrytanalystCrytanalyst’’ss Dream Dream
II’’m going to crack the m going to crack the RSA RSA CrytoCryto System by System by finding a finding a SuperfastSuperfast
Factoring Algorithm !!Factoring Algorithm !!II’’ll be rich & famous !!!ll be rich & famous !!!
ProblemProblem.. Given an integer Given an integer NN which is which is the product of two unknown primes the product of two unknown primes pp & & qq, i.e., , i.e., N=N=pqpq , find , find pp and and qq, , i.e., factor i.e., factor NN. .
CodeCodeBreakerBreaker
SimplifiedSimplified ShorShor’’ss Algorithm Algorithm
Step 1Step 1.. Choose an integer Choose an integer s.ts.t. . a ( )gcd , 1a N =
Step 3Step 3.. If is not even, then If is not even, then gotogoto Step 1Step 1..P
If is even, then If is even, then Step 4Step 4.. P( ) ( )/ 2 /21 1 1 modP P Pa a a N− = − +
( ) ( )/ 2 / 2angcd 1, gd cd 1,P Pa N a N− +
So use the Euclidean algorithm to computeSo use the Euclidean algorithm to compute
Step 2Step 2.. Use a Use a Quantum ComputerQuantum Computer to determine the to determine the period of the function:period of the function:P
( ) modxNf x a N=
Step 5Step 5..
SimplifiedSimplified ShorShor’’ss Algorithm (Cont.)Algorithm (Cont.)
If the above If the above gcdgcd’’ss are & orare & or& , then we have factored . & , then we have factored .
If not, If not, gotogoto
pp
qq N
Step 1Step 1..
SimplifiedSimplified ShorShor’’ss Algorithm Algorithm
Step 1Step 1.. Choose an integer Choose an integer s.ts.t. . a ( )gcd , 1a N =
Step 3Step 3.. If is not even, then If is not even, then gotogoto Step 1Step 1..PIf is even, then If is even, then Step 4Step 4.. P
( ) ( )/ 2 /21 1 1 modP P Pa a a N− = − +
( ) ( )/ 2 / 2angcd 1, gd cd 1,P Pa N a N− +
So use the Euclidean algorithm to computeSo use the Euclidean algorithm to compute
Step 2Step 2.. Use a Use a Quantum ComputerQuantum Computer to determine the to determine the period of the function:period of the function:P
( ) modxNf x a N=
Quantum PartQuantum Partof Algorithmof Algorithm
0, 1, 2,= ± ±¢ … The IntegersThe Integers
:f →¢ ¢P f
ProblemProblem.. Given a periodic function Given a periodic function
Find the period of .Find the period of .,,
ChooseChoose a sufficiently large positive integer , a sufficiently large positive integer , and restrict to the setand restrict to the set
Qf
0,1,2, , 1QS Q= −…and focus on the restricted functionand focus on the restricted function
: Qf S → ¢SimplificationSimplification.. To avoid minor technicalities, To avoid minor technicalities, we assume that is a multiple of , i.e.,we assume that is a multiple of , i.e.,PQ |P Q
4
ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)
•• Choose an integer Choose an integer nn s.ts.t. . Q<2Q<2nn & & Max(fMax(f)<2)<2nn
•• Construct two Construct two nn--qubitqubit registers, i.e., registers, i.e., Reg1Reg1and and Reg2Reg2 ..
1 2 0 1 2 0Reg1 Reg2 n n n na a a b b b− − − −= L L
ArgumentsArgumentsof of ff
ValuesValuesof of ff
ConventionConvention.. 2 11 2 0 0
2n
jn n jj
a a a a−
− − == ∑L
For example, For example, 10111 23=
The QThe Q--Point Fourier TransformPoint Fourier Transform
ωω = Primitive = Primitive QQ--thth root of unity, e.g., root of unity, e.g., ee22ππi/Qi/Q
0,1,2, , 1QS Q= −L
The Fourier Transform is:The Fourier Transform is:
where where
µ: :Q Qf S f S → → F
£ £aµ ( ) ( ) xy
x Qf y f x ω
∈= ∑
RemarkRemark.. We will implement as a unitaryWe will implement as a unitarytransformation.transformation.
F
ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)
Step 2.0Step 2.0.. InitializeInitialize 0 0 00 0 00 0= … …Step 2.1Step 2.1.. Apply to Apply to Reg1Reg1F
1 100 0
0 0 0 0I
Q Qjj j
j jω⊗
− −
= == =∑ ∑
Fia
Step 2.2Step 2.2.. Let be a unitary transformation Let be a unitary transformation that takes to . that takes to . Apply .Apply .
fU0j ( )j f j
fU
1 1
0 00 ( )
fUQ Q
j jj x f x
− −
= =∑ ∑a
Hence, Hence, Reg1Reg1 now holds all the integersnow holds all the integers0,1,2, 0,1,2, …… , Q, Q--11
in superpositionin superposition
ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)
0 1
0 1
0 1
1
0
11
1 0 1 00 0
11
1 0 00 0
11
1 0 00 0
( )
( )
(
Reg1 Re
)
2
(
g
)
Q
j
QP P
j j
QP P
j j
QP P
j j
j f j
Pj j f Pj j
Pj j f j
Pj j f j
−
=
−−
= =
−−
= =
−−
= =
=
= + +
= +
= +
∑
∑ ∑
∑ ∑
∑ ∑
0 1
11
1 0 00 0
Reg1 Re 2 ( )g
QP P
j j
Pj j f j−−
= =
= +
∑ ∑
ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)
Step 2.3Step 2.3.. Measure Measure Reg2Reg2
Whoosh !
Whoosh !
Prob
(j
Prob
(j00=r
=r 00
)=1/
P)=
1/P
1
1
1 0 00
( )Reg1 Reg2
QP
j
Pj r f r−
=
= + ∑
0 0,1,2, , 1r P∈ −…
ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)
Step 2.4Step 2.4.. Apply to Apply to Reg1Reg1F
( )
( )
( )
1 0
1 1
1 0
1
10
1
1 1 1
1 0 0 00 0 0
11
00 0
11
00 0
( ) ( )
( )
( )
Q QQIP P
Pj r k
j j k
QQ P
Pj r k
k j
QQ P jr k Pk
k j
Pj r f r k f r
k f r
k f r
ω
ω
ω ω
− − −⊗+
= = =
−−+
= =
−−
= =
+
=
=
∑ ∑ ∑
∑ ∑
∑ ∑
F
a
But !But !
5
ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)
But !But ! ( ) 1
1
1
0
/ 0mod /if0
QP jPk
j
Q P y Q Potherwise
ω−
=
==
∑
Hence, Hence,
0
0
1
0
: 0,1, , 1
1
00
Reg1 Re (
(
g2 )
)
Pr k
Qk PP
QP rP
k f r
Qf r
P
λ λ
λ
λ
ω
ω λ
−
∈ = −
−
=
=
=
∑
∑
…
ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)
01
00
Reg1 ( )Reg2QP rP Q
f rP
λ
λ
ω λ −
=
=
∑
Step 2.4Step 2.4.. Measure Measure Reg1Reg1
Prob
(Pr
ob(
λλ=λ=λ00)=
1/P
)=1/
PWh
oosh !
Whoosh !
0 0Reg1 Reg2 ( )Q
f rP
λ =
Hence, we have obtained Hence, we have obtained
for somefor some0
QP
λ 0 0,1, , 1Pλ ∈ −…
ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)
Repeat steps 1 through 5 until there are Repeat steps 1 through 5 until there are enough multiples of to recover , enough multiples of to recover , and hence . and hence .
/Q P /Q PP
RemarkRemark.. We should remind the We should remind the everyone that the above description everyone that the above description is a simplification of is a simplification of ShorShor’’ss factoring factoring algorithm which contains most of the algorithm which contains most of the key features of the actual algorithm. key features of the actual algorithm.
The The UnsimplifiedUnsimplified ShorShor’’ss AlgorithmAlgorithm
which is to a rational of which is to a rational of the form the form m/P mod1m/P mod1..
ShorShor’’ss algorithm selects a random rational of the algorithm selects a random rational of the form form k/Q mod 1k/Q mod 1
It then uses the It then uses the continued continued fraction algorithmfraction algorithm to to findfind m/P mod 1m/P mod 1. .
““closestclosest””
FoundFound
FoundFound
FoundFound
Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Quantum Hidden Subgroup Algorithms:Subgroup Algorithms: A Mathematical A Mathematical Perspective,Perspective, AMS, CONM/305, (2002), AMS, CONM/305, (2002), 139139--202.202. http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0201095ph/0201095
Lomonaco,Lomonaco, ShorShor’’ss Quantum Factoring Quantum Factoring AlgorithmAlgorithm,, AMS, PSAPM/58, (2002), AMS, PSAPM/58, (2002), 161161--179.179. http://arxiv.org/abs/quanthttp://arxiv.org/abs/quant--ph/0010034ph/0010034
More thorough and detailed descriptions of More thorough and detailed descriptions of ShorShor’’ssalgorithm can be found in the following two papers:algorithm can be found in the following two papers:
6
GroverGrover’’ssAlgorithm ?Algorithm ?
GroverGrover’’s Algorithms Algorithm
Searching for a Needle in a HaystackSearching for a Needle in a Haystack
Skip to long versionSkip to long versionShort VersionShort Version
The ProblemThe Problem
We wish to search an unordered listWe wish to search an unordered list
0,1 ,2 ,3 , , 2 1 1n N− = −…
for the label for the label 0j
6,2,23,9,L = …
of labels from the set of labels from the set N = 2N = 2nn elementselements
The ProblemThe Problem
We represent the list We represent the list LL as a quantum as a quantum superpositionsuperposition
( )0 0
1 0 1 2 1j NN
ψ = + + + + + + −… …
and proceed to amplify the amplitudeand proceed to amplify the amplitudeof the label by applying a sequence of of the label by applying a sequence of unitary transformations, unitary transformations,
01/ j
0j
2β
1ψ
ItIt’’s All About this Pictures All About this Picture
β
0j
0j⊥
0ψ2β
2ψ……kψ
MeasureMeasure
MeasureMeasure kψ
Observer
Whoosh
!!!
0j
Prob
~ 1
( ) 01 1 1 1k j Nψ ε ε ε ε= + + + − + + −… …
AmplitudeAmplitudelarge as large as possiblepossible
7
•• Lomonaco,Lomonaco, Grover's quantum search algorithmGrover's quantum search algorithm,,AMS PSAPM, vol. 58, (2002), 181 AMS PSAPM, vol. 58, (2002), 181 -- 192 192 http://arxiv.org/abs/quanthttp://arxiv.org/abs/quant--ph/0010040ph/0010040
More details can be found More details can be found in on the following Paperin on the following Paper
Skip to QHSASkip to QHSA
GroverGrover’’s Algorithms Algorithm
Searching for a Needle in a HaystackSearching for a Needle in a Haystack
Skip QHS Skip QHS AlgsAlgsLong VersionLong Version
•• Lomonaco,Lomonaco, Grover's quantum search algorithmGrover's quantum search algorithm,,AMS PSAPM, vol. 58, (2002), 181 AMS PSAPM, vol. 58, (2002), 181 -- 192 192 http://arxiv.org/abs/quanthttp://arxiv.org/abs/quant--ph/0010040ph/0010040
This part of the talk is based This part of the talk is based on the following Paperon the following Paper
GroverGrover’’s Algorithm s Algorithm Finding a Needle in a HaystackFinding a Needle in a Haystack
Consider a large unstructured database consisting of Consider a large unstructured database consisting of records labeled in random order by the records labeled in random order by the
integers integers 0,1,2, , 1N −…2nN =
E.g., the database could be stored as a linked listE.g., the database could be stored as a linked list
RecordRecord%#*!#*%#*!#*
RecordRecord*!#%*#*!#%*#
953953HeadHead 1025610256 2345723457 ......RecordRecord#%*!*##%*!*#
On average, we have to retrieve labels before On average, we have to retrieve labels before finding the label . finding the label .
/ 2N0x
Hence, the average computational work isHence, the average computational work iscomputational stepscomputational steps
( )O N
This is a practical problem thatThis is a practical problem thatappears in many guisesappears in many guises
Searching Searching a Phone Booka Phone Book
For example, consider a city phone book For example, consider a city phone book containing phone numbers. Find the name containing phone numbers. Find the name associated with the phone numberassociated with the phone number
N
0 (123)456 7890x = −The best classical algorithm for finding the The best classical algorithm for finding the associated name, say associated name, say Jane DoeJane Doe, would , would search through phone numbers on search through phone numbers on average before finding the name average before finding the name Jane DoeJane Doe. . In other words, it would take on average In other words, it would take on average
computational steps.computational steps.
/ 2N
( )O N
called an called an OracleOracle, such that , such that
we are given a function we are given a function : 0,1,2, , 1 0,1f N − →…
( ) 01
0
if x xf x
Otherwise
==
((““YESYES””))((““NONO””))
By calling it an By calling it an OracleOracle, we mean that we do , we mean that we do not have immediate access to all argumentnot have immediate access to all argument--function pairs . The function pairs . The Oracle Oracle is simply a is simply a blackboxblackbox, which we can query as , which we can query as many times as we like by inputting a number many times as we like by inputting a number
, and then observing the resulting output , and then observing the resulting output . . ButBut each such query comes with an each such query comes with an
associated computational associated computational $$cost$$$$cost$$..
( )( ),x f x ( )f x
x( )f x
More formally,More formally,
8
The The SearchSearch ProblemProblemforfor anan
UnstructuredUnstructured DatabaseDatabaseis:is:
To find the record labeled as To find the record labeled as with the minimum amount of with the minimum amount of
computational computational $$work$$$$work$$ , i.e., , i.e., with the minimum number of with the minimum number of queries of the oracle .queries of the oracle .f
0x
Another ExampleAnother Example
Consider a Consider a plaintext/plaintext/ciphertextciphertext attack by brute force attack by brute force key searchkey search on a message encrypted with the on a message encrypted with the Data Data Encryption StandardEncryption Standard ((DESDES), where the key ), where the key KK is a 56 is a 56 bit numberbit number
Given the Given the plaintext/plaintext/ciphertextciphertext pairpair
xjepPWvZideRkqldievMsFkxjepPWvZideRkqldievMsFkCiphertextCiphertextTheStolenGoldIsHiddenAtTheStolenGoldIsHiddenAtPlaintextPlaintext
crack the entire cipher by encrypting the crack the entire cipher by encrypting the plaintextplaintext
TheStolenGoldIsHiddenAtTheStolenGoldIsHiddenAtwith each of the keys with each of the keys 0,1,2, 0,1,2, …… . 2. 25656--11 , in turn, , in turn, until the key until the key KK00 is found that produces the is found that produces the ciphertextciphertext
xjepPWvZideRkqldievMsFkxjepPWvZideRkqldievMsFk
if if ( ),P C
denotes the available denotes the available plaintext/plaintext/ciphertextciphertextpairpair
then the then the OracleOracle isis
( ) 01
0
if K Kf K
Otherwise
==
0Kdenotes the denotes the keykey such thatsuch that
( )0,DES P K C=
, and if, and if
In other words,In other words, Mission Impossible AssignmentMission Impossible Assignment
Your Your ““Mission ImpossibleMission Impossible”” assignment, should assignment, should you choose to accept it, is to devise an you choose to accept it, is to devise an algorithm which finds the label in algorithm which finds the label in
( )O N
0x
steps. steps.
As always, should you fail, your lecturer will As always, should you fail, your lecturer will disavow any association with your activities.disavow any association with your activities.
Mission Impossible AssignmentMission Impossible Assignment
LovLov GroverGrover has accepted this has accepted this ““Mission Mission ImpossibleImpossible”” challenge, and has successfully challenge, and has successfully created an algorithm which finds the label created an algorithm which finds the label in in
0x
( )O N
steps, with a total computational work ofsteps, with a total computational work of
( )logO N N
The Quantum Mechanical PerspectiveThe Quantum Mechanical Perspective
22--D Hilbert space D Hilbert space with orthonormal basiswith orthonormal basis
2H 0 , 1
22nn--D Hilbert space D Hilbert space with orthonormal basiswith orthonormal basis
1
20
n−
= ⊗H H
0 , 1 , 2 , , 1N −…
Oracle is given as a Oracle is given as a blackboxblackbox unitary unitary transformation transformation
ffU
2 2
( )x y x f x y⊗ → ⊗⊗ ⊗ −
H H H Ha
fU
9
The Quantum Mechanical PerspectiveThe Quantum Mechanical Perspective
2 2
( )x y x f x y⊗ → ⊗⊗ ⊗ −
H H H Ha
fUFrom the Oracle From the Oracle
( ) ( )0
( ) 0 01 f xx
x if x xI x x
x otherwise
− == − =
as follows as follows
x0 1
2− 0 1
2−
( )( 1) f x x−fU
we construct the unitary transformation we construct the unitary transformation 0xI
is an Inversionis an Inversion0xI
Note thatNote that0 0 02xI I x x= − , since, since
( )0 0 02 2 |I x x x x x x− = − 0 0x if x xx otherwise
− ==
Also please note that for any unit length Also please note that for any unit length ketket ψ2I Iψ ψ ψ= −
is an is an inversioninversion about the about the hyperplanehyperplane to ,to ,⊥ ψ
““A Mirror Image TransformationA Mirror Image Transformation””
i.e.,i.e.,
““A Mirror ReflectionA Mirror Reflection””
ψLeftLeft
RightRightRightRight
LeftLeft
Inversion by Inversion by I ψ
HyperplaneHyperplaneMirrorMirror
HilbertHilbertSpaceSpace
Properties of Properties of I ψ
DefinitionDefinition.. Let , be unit length Let , be unit length ketskets in in s.ts.t. . . .
χψH |χ ψ ∈ ¡ ThenThen
( ) , | ,Span a b a bψ χ ψ χ= = + ∈S¡ ¡ ¡is a vector space over lying in with is a vector space over lying in with a real inner product induced by the bracketa real inner product induced by the bracket
in . Hence, if , are in . Hence, if , are linearly independent, then is a 2linearly independent, then is a 2--D D Euclidean plane lying in . Euclidean plane lying in .
ψ χ
¡ H
H|− −
HS¡
Properties of Properties of I ψ
PropositionProposition.. The plane is invariant under The plane is invariant under the transformations , the transformations ,
S¡I ψ I χ
( )( )
I
Iψ
χ
S = S
S = S¡ ¡
¡ ¡
( ) , | ,Span a b a bψ χ ψ χ= = + ∈S¡ ¡ ¡
, i.e.,, i.e.,
H& leave the plane invariant& leave the plane invariantI ψ I χ S¡
I ψI χ
S¡
ψ
χ
10
Let be a Let be a ketket in perpendicular to ,in perpendicular to ,and let denote the line in passing and let denote the line in passing through the origin and to . through the origin and to .
ψ ⊥S¡
ψL
ψ ⊥ S¡⊥
ψ
Line Line Lψ⊥
ψ ⊥ψ
I ψ
Reflection in lineReflection in lineL
ψ ⊥
:I ψ →S S¡ ¡S¡
ThenThen
if is a unit length vector inif is a unit length vector inwhich is to , which is to ,
ψ ⊥
S¡ ⊥ ψ
I Iψ ψ ⊥− =S¡ S¡
thenthenAnd moreover, And moreover,
And finally, if is a unit length And finally, if is a unit length ketket in , in , and if is a unitary and if is a unitary transformation, transformation,
ψ H:U →H H
†UUI U Iψ ψ=
thenthen
SummarySummary
there is a 2there is a 2--D plane (i.e., 2D plane (i.e., 2--D D inner product space over ) inner product space over ) ““livingliving”” in spanned in spanned by and by and s.ts.t..ψ χ
Given two unit Given two unit ketskets and and ““ livingliving”” in with in with real, real,
ψ χ|χ ψ
H
HS¡¡
•• andand( )Iψ =S S¡ ¡ ( )I χ =S S¡ ¡
•• is the lineis the lineI ψS ¡
a reflection ina reflection inoror
an inversion aboutan inversion aboutL
ψ ⊥
•• I Iψ ψ ⊥− =S ¡ S ¡
•• for all unitary for all unitary transfstransfs†
UUI U Iψ ψ= U
Overview of GroverOverview of Grover’’s Algorithms Algorithm
Step 0Step 0.. 1
0
10
N
j
H jN
ψ−
=
← = ∑0k ←
((InitializationInitialization))
( )( )1/ 4sin 1/4
k N Nππ − = ≈ LoopLoop until until Step 1.Step 1.
00 xQ HI HIψ ψ ψ← = −
1k k← +
Step 2.Step 2. Measure with respect to the standard Measure with respect to the standard basis basis to obtain the marked unknown state to obtain the marked unknown state with probability with probability
ψ0 , 1 , , 1N −…
0x( )1 1/ N≥ −
WhatWhat’’s Going On ?s Going On ?
Let Let
be the be the HadamardHadamard transform given bytransform given by
wherewhere
:H →H H
1( 2 )
0
n
H H−
=⊗
(2) 1 111 12
H
= −
The Method in The Method in LovLov’’ss MadnessMadness
ItIt’’s All About this Pictures All About this Picture
α α
β
β
2β
0x
0x ⊥
0ψ
0ψ ⊥
0xL ⊥
0Lψ
11
Thus, we now have Thus, we now have ““livingliving”” in the 2in the 2--D planeD planeH
S ¡H
0ψ0x
( )0 0,S Span xψ=¡
(Initialization)(Initialization)Step 0Step 0..
This step creates a superposition of all states, This step creates a superposition of all states, i.e., i.e., 1
00
10 0
N
j
H jN
ψ−
=
= =∑a
The Iteration LoopThe Iteration LoopStep 1Step 1..
Each iteration rotates (in ) closer to .Each iteration rotates (in ) closer to .S¡ 0x0ψ
( )0 0,Angle xβ ψ⊥=
Let and be unit length Let and be unit length ketskets in in which are to and , respectively. which are to and , respectively.
0ψ0ψ ⊥
0x0x ⊥
⊥S¡
α α
β
β
2β
0x ⊥
0ψ
0ψ ⊥
0xL ⊥
0L ψ
0x
LetLet
•••••• S¡
(Cont.)(Cont.)Step 1Step 1..
α α
β
β
2 β
0x ⊥
0ψ
0ψ ⊥
0xL ⊥
0Lψ
0x
With each iterationWith each iteration1k kQψ ψ+ =
where where ( )0 0
0 0 0 00
† †0 0
0
x x
H x x x
Q HI H I HI H I
I I I I I Iψ ψ ⊥
= − = −
= − = − =
is the is the product ofproduct of two inversionstwo inversions..
S¡ α α
β
β
2 β
0x ⊥
0ψ
0ψ ⊥
0xL ⊥
0Lψ
0x
S¡
TheoremTheorem
( )2 1
21 2
1 2 2
1 2
&
,L L
L L LinesinL L pointO Ref Ref Rot
Angle L Lβ
β
= ⇒ ==
¡∩ o
But, But, 0 0 0cos sinx xψ β β⊥= +
So, So, ( )[ ] ( )[ ]0 0 0cos 2 1 sin 2 1kQ k x k xψ β β⊥= + + +
( )[ ] ( )[ ]0 0 0cos 2 1 sin 2 1kQ k x k xψ β β⊥= + + +
But what is ?But what is ?β
We seek to iterate until is as large as We seek to iterate until is as large as possible.possible.
( )[ ]sin 2 1k β+••In other words, we seek the smallest positive integerIn other words, we seek the smallest positive integer
such that is as close as possible tosuch that is as close as possible to..
( )2 1k β+k K=/ 2π
••
( )/ 2k K π β= = This turns out to be This turns out to be ••
But what is ? But what is ? β
α α
β
β
2β
0x ⊥
0ψ
0ψ ⊥
0xL ⊥
0Lψ
0x
S¡
Recall thatRecall that ( )0 0,Angle xβ ψ⊥=
( )0 0,Angle xα ψ=We find by noting that the angleWe find by noting that the angleβ
/ 2α β π+ =is is complementarycomplementary to , i.e., to , i.e., β
12
SinceSince ( )0 01 0 1 1x NN
ψ π= + + + + + −… …
we havewe have 0 0
1| cos cos sin
2x
N
πψ α β β = = = − =
Hence, Hence, ( )1sin 1/ 1/N Nβ −= ≈
andand ( )1/ 4 s in 1 /4
k K N Nπ
π − = = ≈
Hence, the number of iterations in isHence, the number of iterations in isStep 1Step 1..
( )O N
But each iteration uses the But each iteration uses the HadamardHadamard transformtransform1
(2)
0
n
H H−
= ⊗at the computational cost of at the computational cost of
( )lgO N
Since is the Since is the computationalycomputationaly dominant part of dominant part of GroverGrover’’s algorithm, it follows that the computational s algorithm, it follows that the computational time complexity of this algorithm istime complexity of this algorithm is
( )lgO N N
Step 1Step 1..
( )[ ]2 2 1Prob sin 2 1 cos 1Success K
Nβ β= + ≥ = −
The probability that the measurement The probability that the measurement performed in of Groverperformed in of Grover’’s algorithm s algorithm will successfully retrieve the unknown label will successfully retrieve the unknown label
is given by is given by 0x
Step 2.Step 2.
The Probability of SuccessThe Probability of Success GroverGrover’’s Algorithms Algorithm
Step 0Step 0.. 1
0
10
N
j
H jN
ψ−
=
← = ∑0k ←
((InitializationInitialization))
( )( )1/ 4sin 1/4
k N Nππ − = ≈ LoopLoop until until Step 1.Step 1.
00 xQ HI HIψ ψ ψ← = −
1k k← +
Step 2.Step 2. Measure with respect to the standard Measure with respect to the standard basis basis to obtain the marked unknown state to obtain the marked unknown state with probability with probability
ψ0 , 1 , , 1N −…
0x( )1 1/ N≥ −
Hidden SubgroupHidden SubgroupAlgorithms ?Algorithms ? QuantumQuantum
HiddenHidden SubgroupSubgroupAlgorithmsAlgorithms
A Grand UnificationA Grand Unification
13
is commutative.is commutative.
HiddenHidden SubgroupSubgroupStructureStructure
Def.Def. A Map is said to haveA Map is said to haveif there exist if there exist
•• A subgroup of , andA subgroup of , andKϕ A•• An injectionAn injection : /A K Sϕ ϕι →
/
A S
A Kϕ
ϕ
ν ι→
↑
ϕ
AmbientAmbientGroupGroup
TargetTargetSetSet
HiddenHiddenSubgroupSubgroup
Set of RightSet of RightCosetsCosets
Hidden NaturalHidden NaturalSurjectionSurjection
s. t. the diagrams. t. the diagram
hiddenhiddensubgroupsubgroup structurestructure
: A Sϕ →
HiddenHidden SubgroupSubgroup StructureStructure (Cont.)(Cont.)
/
A S
A Kϕ
ϕ
ν ι→
↑
ϕ
, then , then
/H A Kϕ ϕ=and is an and is an
epimorphismepimorphism: /A A Kϕν →
Hidden QuotientHidden QuotientGroupGroup
HiddenHiddenEpimorphismEpimorphism
Kϕ AIf is an If is an invariantinvariant subgroupsubgroup ofof
is a group, is a group,
KitaevKitaev observed that finding the period observed that finding the period is equivalent to finding the subgroup , is equivalent to finding the subgroup , i.e., the kernel of .i.e., the kernel of .
P ⊂Z Z
modmodn
Nn a N
ϕ→a
Z Z
P
ϕ
ShorShor’’ss Quantum factoring algorithm Quantum factoring algorithm reduces the task of factoring an integer reduces the task of factoring an integer
to the task of finding the period to the task of finding the period of a function of a function
PN
Origins of QHS AlgorithmsOrigins of QHS Algorithms
ShorShor FactoringFactoring
SimonSimon
DeutschDeutsch--JozsaJozsa
HiddenHidden SubgpSubgpAmbientAmbient GpGpQuantumQuantum AlgorithmAlgorithmA
2
0K ϕ
=
¢
2 2 2⊕ ⊕ ⊕¢ ¢ L ¢
¢
2¢
K Pϕ = ¢2Kϕ ≅ ¢
Quantum Hidden Subgroup AlgorithmsQuantum Hidden Subgroup Algorithms
Kϕ
A Grand UnificationA Grand Unification
An algorithm solving this An algorithm solving this problem is called a problem is called a hiddenhidden subgroupsubgroupalgorithmalgorithm ((HSAHSA) )
The The HiddenHidden SubgroupSubgroup ProblemProblem ((HSPHSP))
Given a mapGiven a map
: A Sϕ →
determine determine the the hiddenhidden subgroup of the ambient subgroup of the ambient group .group .
KϕA
with with hidden hidden subgroup structure, subgroup structure,
Some Existing Some Existing QHSAQHSA’’ss
•• Hidden subgroup algorithmsHidden subgroup algorithms
§§ DeutschDeutsch--JozsaJozsa
§§ SimonSimon
§§ ShorShor
§§ LegendreLegendre symbol symbol
§§ HallgenHallgen’’ss algorithm for solving Pellalgorithm for solving Pell’’s s eqeq. .
§§ Various NonVarious Non--abelabel. Algorithms. Algorithms
§§ OthersOthers
14
We will discuss the following Six We will discuss the following Six HSAHSA’’ss
§§ Continuous Continuous ShorShor on on §§ Wandering Wandering ShorShor
§§ Lift of Lift of ShorShor toto
§§ HSA on CircleHSA on Circle
§§ Dual Dual ShorShor HSAHSA
§§ HSA for Functional IntegralsHSA for Functional Integrals
¡
¢
•• Lomonaco & Kauffman,Lomonaco & Kauffman, Continuous Quantum Hidden Subgroup Continuous Quantum Hidden Subgroup Algorithms, Algorithms, SPIE, 2004,SPIE, 2004, http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0304084ph/0304084
•• Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Subgroup Algorithms:Quantum Hidden Subgroup Algorithms:A Mathematical Perspective,A Mathematical Perspective, AMS, CONM/305, (2002), 139AMS, CONM/305, (2002), 139--202.202. http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0201095ph/0201095
•• Lomonaco & Kauffman,Lomonaco & Kauffman, A Continuous Variable A Continuous Variable ShorShor AlgorithmAlgorithm,,AMS CONM/381, 2005, 97AMS CONM/381, 2005, 97--108. 108. http://arxiv.org/abs/quanthttp://arxiv.org/abs/quant--ph/0210141ph/0210141
These Six Algorithms Can Be Found These Six Algorithms Can Be Found in the Following Papersin the Following Papers
•• Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Subgroup Quantum Hidden Subgroup Algorithms: An Algorithmic Toolkit, Algorithms: An Algorithmic Toolkit, 2006,2006,http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0607047/ph/0607047/
•• Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Subgroup Quantum Hidden Subgroup Algorithms:Algorithms: A Mathematical Perspective,A Mathematical Perspective, AMS, AMS, CONM/305, (2002).CONM/305, (2002). http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0201095ph/0201095
The first of the these papers can be found inThe first of the these papers can be found in
Three Methods for Three Methods for Creating New Quantum Creating New Quantum
AlgorithmsAlgorithms
Two Ways to Create New Quantum AlgorithmsTwo Ways to Create New Quantum Algorithms
GivenGiven : A Sϕ →
PushPush
LiftLift
ι
µϕη
LLifted Lifted GpGp
ν
H°ϕ ϕ ι= oApprox Approx GpGp
SAmbAmb. . GpGp ϕTarget SetTarget SetA
Lifting and PushingLifting and PushingA 3rd Way to Create New Quantum AlgorithmsA 3rd Way to Create New Quantum Algorithms
DualityDuality
A S→ϕAmbAmb. . GpGp
µA S ′→ΦDual Dual GpGp DualDual
QHS QHS AlgAlg
QHS QHS AlgAlg
DualDual
15
SummarySummary3 Ways to create New Quantum Algorithms3 Ways to create New Quantum Algorithms
•• LiftingLifting
•• PushingPushing
•• DualityDuality
Some Past AlgorithmsSome Past AlgorithmsHidden Subgroup AlgorithmsHidden Subgroup Algorithms
•• Lomonaco & Kauffman,Lomonaco & Kauffman, A Continuous Variable A Continuous Variable ShorShor AlgorithmAlgorithm, , AMS CONM/381, 2005, 97AMS CONM/381, 2005, 97--108. 108. http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0210141ph/0210141
•• Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Quantum Hidden Subgroup Algorithms:Subgroup Algorithms: A Mathematical A Mathematical Perspective,Perspective, AMS, CONM/305, (2002).AMS, CONM/305, (2002).http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0201095ph/0201095
••Wandering Wandering ShorShor
•• Continuous Continuous ShorShor
QZ
ν ι
Approx.Approx.TransversalTransversal
f =
f = ινιν
NP Z Z Zν
⊂ →
Recall Recall ShorShor’’ss algorithm:algorithm:
AmbientAmbientGroupGroupHiddenHidden
SubgroupSubgroup
TargetTargetSetSet
×
Find Approx. Find Approx. PeriodicPeriodic
ObjObj.: Find Period.: Find Period Wandering Wandering ShorShor
Q
Sι ν
→↑↓¢
°ϕ ϕ ι= o
ϕ
Free AbelFree AbelFinite Finite RkRkAmbAmb GPGP
Approx Approx GpGp
ShorShorTransvTransv
ApproxApproxMapMap
TargetTargetSetSet
PushPushA⊕ ⊕¢ ¢ ¢⊕ ⊕¢ ¢ ¢⊕ ⊕¢ ¢ ¢⊕ ⊕¢ ¢ ¢⊕ ⊕¢ ¢ ¢⊕ ⊕¢ ¢ ¢
Continuous Continuous ShorShor
A S→ϕAmbient GroupAmbient Group
Key Idea: Key Idea: of discrete algorithms to of discrete algorithms to a continuous groupsa continuous groups
S→¡
LiftingLifting
Add. Add. GpGp of of RealsReals
• A highly speculative quantum algorithm for A highly speculative quantum algorithm for
Three Recent QHS AlgorithmsThree Recent QHS Algorithms
• A quantum algorithm on the A quantum algorithm on the
• A quantum algorithm to A quantum algorithm to ShorShor’’ss algorithmalgorithm
CircleCircle
dualdual
functional integralsfunctional integrals
Jeremy Jeremy BecnelBecnel has found ahas found afirm mathematical foundationfirm mathematical foundationfor this algorithm.for this algorithm.
16
Road MapRoad MapShorShor’’ss AlgAlg
QHS QHS AlgAlg forforFunctional Functional IntegralsIntegrals
PushingPushing
Dual of Dual of ShorShor’’ss AlgAlg
QHS QHS AlgAlg on on /¡ ¢DualityDuality
QHS QHS AlgAlg on on ¢LiftingLifting ¢ S
ϕ
Q¢
/¡ ¢
Q¢
ϕS
ϕ~
ϕ~
Lift of Lift of ShorShorAlgorithmAlgorithm
ShorShorAlgorithmAlgorithm
Dual LiftedDual LiftedAlgorithmAlgorithm
Dual Dual ShorShorAlgorithmAlgorithm
DualDual
LiftingLifting & & DualityDuality
A Lifting of A Lifting of ShorShor’’ssQuantum Factoring Quantum Factoring
Algorithm toAlgorithm toIntegers Integers ¢
Fourier AnalysisFourier Analysison theon the
CircleCircle
A Momentary DigressionA Momentary Digression
The Circle as a GroupThe Circle as a Group
TheThe circlecircle groupgroup can be viewed ascan be viewed as
•• AA multiplicativemultiplicative groupgroup, i.e., as the unit , i.e., as the unit circle in the complex planecircle in the complex plane £
2 :ixe xπ ∈¡( )22 2 i x yix iye e e ππ π +=i
where denotes the additive group of where denotes the additive group of realsreals..
¡
The Circle as a GroupThe Circle as a Group
TheThe circle groupcircle group cancan alsoalso be viewed asbe viewed as•• AnAn additiveadditive groupgroup, i.e., as, i.e., as
where denotes the additive group of where denotes the additive group of integers.integers.
¢
/ mod1reals=¡ ¢mod1x y+
17
The Character GroupThe Character Group
TheThe character groupcharacter group of an of an abelianabelian group group is defined asis defined as
µ ( ),A Hom A Circle= : :A Circle amorphismχ χ= →
with group operation (in multiplicative notation),with group operation (in multiplicative notation),
( )( ) ( ) ( )1 2 1 2a a aχ χ χ χ=i ior (in additive notation) asor (in additive notation) as
( )( ) ( ) ( )1 2 1 2a a aχ χ χ χ+ = +
µA A
The Character Groups of The Character Groups of andand¢• TheThe character groupcharacter group of isof is
•• TheThe character groupcharacter group of isof is
/¡ ¢¢
µ 2: : /inxx n e xπχ= ∈ =¢ a ¡ ¡ ¢
/¡ ¢·
2/ : :
: mod1:
inxn
n
x e n
x nx n
πχ
χ
≅ ∈
≅ ∈ =
¡ ¢ a ¢a ¢ ¢
/⇔¢ ¡ ¢DiscreteDiscrete
ContinuousContinuous
Fourier Analysis on the CircleFourier Analysis on the Circle /¡ ¢TheThe Fourier transformFourier transform of of is defined as the map is defined as the map
given by given by
TheThe inverse Fourier transforminverse Fourier transform is defined asis defined as
: /f →¡ ¢ £
µ :f →¢ £
µ 2( ) ( )inxf n dxe f xπ−= ∫Ñ
µ2( ) ( )inx
n
f x e f nπ
∈
= ∑¢
( )1
0
1 P
Pn
nx x
P Pδ δ
−
=
= −
∑
•• DiracDirac Delta function on Delta function on ( )xδ /¡ ¢•• For a nonFor a non--zero integer, we will zero integer, we will also need on the generalized also need on the generalized functionfunction
P/¡ ¢
Needed Mathematical MachineryNeeded Mathematical Machinery
•• The elements of are formal integrals The elements of are formal integrals of the formof the form
•• denotes the rigged Hilbert spacedenotes the rigged Hilbert spaceon with orthonormal basis on with orthonormal basis
, i.e.,, i.e.,
/¡ ¢H
( )dx f x x∫Ñ
/¡ ¢H
: /x x ∈ ¡ ¢ ( )x y x yδ= −/¡ ¢
Rigged Hilbert SpaceRigged Hilbert SpaceFinally, let denote the space of formal Finally, let denote the space of formal sums sums
with orthonormal basis with orthonormal basis
¢H
:n nn
a n a n∞
=−∞
∈ ∀ ∈
∑ £ ¢
:n n∈ ¢
18
We now lift We now lift ShorShor’’ss Quantum Quantum Factoring Algorithm to the Factoring Algorithm to the integers integers ¢
¢ Sϕ
Q¢ ϕ~Lift of Lift of ShorShorAlgorithmAlgorithm
ShorShorAlgorithmAlgorithm
LiftingLiftingLet be periodic function with hidden minimum period .
Objective:
Find
:ϕ →¢ £P
P
Periodic Functions onPeriodic Functions on ¢
2 01 0 0in
n n
e n nπψ∈ ∈
= = ∈ ⊗∑ ∑ H Hi¢ £
¢ ¢
0 /0 0ψ = ∈ ⊗ H¡ ¢ £H
• Step 1.Step 1. Apply 1-1 ⊗F
2 ( )n
n nψ ϕ∈
= ∑¢
• Step 0.Step 0. Initialize
: ( )U n u n u nϕ ϕ+a• Step 2.Step 2. Apply
• Step 3.Step 3. Apply 1⊗F( )
( ) ( )
( )
( ) ( )
( )
1 0
1 0
01
1 0
0
0
0
0
23 /
12
1 00
122
00
12
00
1 12
00 0
1
0
1
inx
n
Pi n P n x
n n
Pi n xinPx
n n
Pi n x
Pn
P Pi n x
n n
P
n
d x x e n
d x x e n P n
d x x e e n
d x x x e n
ne n
P P
n nP P
π
π
ππ
π
π
ψ ϕ
ϕ
ϕ
δ ϕ
ϕ
−
∈
−− +
∈ =
−−−
∈ =
−−
=
− −−
= =
−
=
= ∈ ⊗
= +
=
=
=
= Ω
∑∫
∑ ∑∫
∑ ∑∫
∑∫
∑ ∑
∑
H H¡ ¢ £¢
¢
¢
ÑÑ
ÑÑ
• Step 4.Step 4. Measure 1
30
P
n
n nP P
ψ−
=
= Ω ∑
Qydy y y
Q = ∫ÑO
and then proceed to find the corresponding using the continued fraction recursion. /n P
(We assume )22Q P≥
with respect to the observable
/m Qto produce a random eigenvalue
TheTheActualActual
ShorShorAlgorithmAlgorithm
UnUn--LiftedLifted
SkipSkip
19
The Actual (UnThe Actual (Un--Lifted) Lifted) ShorShor AlgorithmAlgorithm
Make the following approximations by selecting Make the following approximations by selecting a sufficiently large integer :a sufficiently large integer :Q
is only approximately periodic !is only approximately periodic !°ϕ
: 0Q k k Q≈ = ∈ ≤ <¢ ¢ ¢
/ mod1: 0,1, , 1Q
rr Q
Q ≈ = = −
¡ ¢ ¢ …
°: : Qϕ ϕ→ ≈ →¢ £ ¢ £
Run the algorithm inRun the algorithm in
Q S⊗¢H H
1
0
Q
r
r r rQ Q Q
−
=
= ∑O
and measure the observableand measure the observable
We have reconstructed theWe have reconstructed theoriginal original ShorShor Algorithm !!!Algorithm !!!
A Quantum Hidden A Quantum Hidden Subgroup Algorithm Subgroup Algorithm
on the on the
CircleCircle
The Dual AlgorithmThe Dual Algorithmon theon the
CircleCircle
¢ Sϕ
Q¢
/¡ ¢ Φ S
ϕ~Lift of Lift of ShorShorAlgorithmAlgorithm
ShorShorAlgorithmAlgorithm
Dual LiftedDual LiftedAlgorithmAlgorithm
DualDual
LiftingLifting & & DualityDuality
•• The elements of are formal The elements of are formal integrals of the form integrals of the form
•• denotes the rigged Hilbert spacedenotes the rigged Hilbert spaceon with orthonormal basis on with orthonormal basis
, i.e.,, i.e.,
/¡ ¢H
/¡ ¢H
: /x x ∈¡ ¢ ( )x y x yδ= −
( )dx f x x∫Ñ
/¡ ¢
Rigged Hilbert SpaceRigged Hilbert Space
20
Finally, let denote the space of formal Finally, let denote the space of formal sums sums
with orthonormal basiswith orthonormal basis
¢H
:n nn
a n a n∞
=−∞
∈ ∀ ∈
∑ £ ¢
:n n∈ ¢
Let be an admissible periodic function of minimum rational period
Proposition:Let (with ) be a period of . Then is also a period of .
Remark: Hence, the minimum rational period is always the reciprocal of an integer modulo 1 .
: /f →¡ ¢ £/α ∈ ¤ ¢
21/ af
f
Periodic Admissible Functions onPeriodic Admissible Functions on /¡ ¢
1 2/a aα = ( )1 2gcd , 1a a =
• Step 0.Step 0. Initialize
0 0 0ψ = ∈ ⊗¢ £H H
2 01 /0 0ixdxe x dx xπψ = = ∈ ⊗∫ ∫i
¡ ¢ £Ñ Ñ H H
2 ( )dx x xψ ϕ= ∫Ñ
1-1 ⊗F••Step 1.Step 1. Apply
: ( )U x u x u xϕ ϕ+a••Step 2.Step 2. Apply
• Step 3.Step 3. Apply 1⊗F
( )
( )
23
2
inx
n
inx
n
dxe n x
n dxe x
π
π
ψ ϕ
ϕ
−
∈
−
∈
=
= ∈ ⊗
∑∫
∑ ∫¢
¢ £¢
ÑÑ H H
Letting , we have m
mx x
a= −
( ) ( )
( )
11
2 2
0
11 2
0 0
121
2
0 0
m
maa
inx inx
m ma
maa in xa
m mm
inm aainxa
m
d x e x d x e x
mdx e x
a
e dxe x
π π
π
ππ
ϕ ϕ
ϕ
ϕ
+−
− −
=
− − +
=
− −−
=
=
= +
=
∑∫ ∫
∑ ∫
∑ ∫
Ñ
But But
Thus,Thus,
21
0mod0
0mof di
0
inmaa
n am
a
otherwse a
i
n
e
aπ
δ− −
==
== =
∑
( )
( )
( )
( )
23
1/2
0mod0
1/2
0
inx
n
ainx
n an
ai a x
n dxe x
n dxe x
a dxe x
a a
π
π
π
ψ ϕ
δ ϕ
ϕ
−
∈
−=
∈
−
∈
∈
=
=
=
= Ω
∑ ∫
∑ ∫
∑ ∫∑
¢
¢
l
l ¢
l ¢
l
l l
Ñ
21
• Step 4.Step 4. Measure
( )3 a aψ∈
= Ω∑l ¢
l l
n
n n n∈
= ∑¢
O
al
with respect to the observable
to produce a random eigenvalue
TheThe
correspondingcorresponding
algorithmalgorithm
discretediscrete
The Algorithmic Dual The Algorithmic Dual of of
ShorShor’’ss Quantum Quantum Factoring AlgorithmFactoring Algorithm
¢ Sϕ
Q¢
/¡ ¢
Q¢
Φ S
ϕ~
Φ~
Lift of Lift of ShorShorAlgorithmAlgorithm
ShorShorAlgorithmAlgorithm
Dual LiftedDual LiftedAlgorithmAlgorithm
Dual Dual ShorShorAlgorithmAlgorithm
DualDual
LiftingLifting & & DualityDuality
is only approximately periodic !is only approximately periodic !
We now create a corresponding We now create a corresponding discrete algorithmdiscrete algorithm
The approximations are:The approximations are:
°: : Qϕ ϕ→ ≈ →¢ £ ¢ £
/ mod1: 0,1, , 1Q
rr Q
Q ≈ = = −
¡ ¢ ¢ …
:0Q k k P≈ = ∈ ≤ <¢ ¢ ¢
°ϕ
Run the algorithm inRun the algorithm in
Q S⊗¢H H
1
0
Q
k
k k k−
=
= ∑O
and measure the observableand measure the observable
22
Quantum Algorithms based on Quantum Algorithms based on Feynman Functional integrals Feynman Functional integrals
The following algorithm is The following algorithm is highly speculativehighly speculative. . In the spirit of Feynman, the following In the spirit of Feynman, the following quantum algorithm is quantum algorithm is based on functional based on functional integrals whose existence is difficult to integrals whose existence is difficult to determinedetermine, let alone approximate., let alone approximate.
CaveatCaveat EmptorEmptor
Recently, Recently, Jeremy Jeremy BecnelBecnel has succeeded in has succeeded in creating a rigorous mathematical foundation creating a rigorous mathematical foundation for this algorithm !for this algorithm ! SkipSkip
The SpaceThe Space PathsPaths
PathsPaths = all continuous paths= all continuous pathswhich are with respect to the inner which are with respect to the inner productproduct
PathsPaths is a vector space over with is a vector space over with respect torespect to
[ ]: 0,1 nx → ¡2L
1
0( ) ( )x y d s x s y s= ∫i i
¡
( )( )
( ) ( )( ) ( ) ( )
x s x sx y s x s y sλ λ=
+ = +
The Problem to be SolvedThe Problem to be Solved
Let be a functional with a Let be a functional with a hiddenhidden subspacesubspace of such thatof such that
: Pathsϕ → £V Paths
( ) ( )x v x v Vϕ ϕ+ = ∀ ∈
Objective. Create a quantum algorithm Create a quantum algorithm that finds the hidden subspace .that finds the hidden subspace .V
The Ambient Rigged Hilbert SpaceThe Ambient Rigged Hilbert Space
Let be the rigged Hilbert space with Let be the rigged Hilbert space with orthonormal basis , orthonormal basis ,
and with bracket product and with bracket product
PathsH
:x x Paths∈
( )|x y x yδ= −
Parenthetical Remark
Please note that can be written as the Please note that can be written as the following disjoint union: following disjoint union:
( )v V
Paths v V ⊥
∈
= +∪
Paths
•• Step 0.Step 0. InitializeInitialize
•• Step 1.Step 1. Apply Apply
•• Step 2.Step 2. Apply Apply
0 0 0 Pathsψ = ∈ ⊗H H£
1-1 ⊗F
2 01 0 0ix
Paths Paths
x e x x xπψ = =∫ ∫iD D
: ( )U x u x u xϕ ϕ+a
2 ( )Paths
x x xψ ϕ= ∫ D
23
• Step 3. Apply 1⊗F
( )
( )
23
2
ix y
Paths Paths
ix y
Paths Paths
y x e y x
y y x e x
π
π
ψ ϕ
ϕ
−
−
=
=
∫ ∫
∫ ∫
i
i
D D
D D
ButBut
( ) ( )
( ) ( )
( )
2 2
2
2 2
ix y ix y
Paths V v V
i v x y
V V
i v y ix y
V V
xe x v xe x
v xe v x
ve xe x
π π
π
π π
ϕ ϕ
ϕ
ϕ
⊥
⊥
⊥
− −
+
− +
− −
=
= +
=
∫ ∫ ∫
∫ ∫
∫ ∫
i i
i
i i
D D D
D D
D D
However,However,
So, So,
( )2 iv y
V V
ve u y uπ δ⊥
− = −∫ ∫iD D
( )
( ) ( )
( )
( )
2 23
2
2
n
n
iv y ix y
Paths V V
ix y
Paths V V
i x u
V V
V
y y v e x e x
y y u y u x e x
u u x e x
u u u
π π
π
π
ψ ϕ
δ ϕ
ϕ
⊥
⊥ ⊥
⊥ ⊥
⊥
− −
−
−
=
= −
=
= Ω
∫ ∫ ∫
∫ ∫ ∫
∫ ∫
∫
i i
i
i
D D D
D D D
D D
D
••Step 4.Step 4. Measure Measure
with respect to the observable with respect to the observable
to produce a random element ofto produce a random element of
( )3
V
u u uψ⊥
= Ω∫ D
Paths
A w w w w= ∫ D
V ⊥
Can the above path integral quantum algorithm Can the above path integral quantum algorithm be modified in such a way as to create a be modified in such a way as to create a quantum algorithm for the Jones polynomial ?quantum algorithm for the Jones polynomial ?
I.e., can it be modified by replacing I.e., can it be modified by replacing by the by the space of gauge connectionsspace of gauge connections, and by , and by making suitable modifications?making suitable modifications?
QuestionQuestion
Paths
µ ( ) ( ) ( )KK A A Aψ ψ= ∫D W
where is the where is the Wilson loopWilson loop
( ) ( )( )expK KA tr P A= ∫ÑW
( )K AW
Is GroverIs Grover’’s Algorithm s Algorithm a Quantum Hiddena Quantum Hidden
Subgroup AlgorithmSubgroup Algorithm
??????
24
•• Lomonaco & Kauffman,Lomonaco & Kauffman, Is GroverIs Grover’’s Algorithm a s Algorithm a Quantum Hidden Subgroup Algorithm ? Quantum Hidden Subgroup Algorithm ? ,, (2006), (2006), http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0603140ph/0603140
This material can be found This material can be found in the following paperin the following paper
GroverGrover’’s s AlgAlg..:: Oh where is the Hidden Symmetry ???Oh where is the Hidden Symmetry ???
The problem is to find the unknown integer The problem is to find the unknown integer jj00 in in
given the oraclegiven the oracle
01( )
0ifotherwise
j jf j
==
00,1,2,3, , , , 1 2 1nj N − = −… …
is is inversion in the inversion in the hyperplanehyperplane orthogonal to orthogonal to j
GroverGrover’’s s AlgAlg..:: Oh where is the Hidden Symmetry ???Oh where is the Hidden Symmetry ???
Let Let HH be the Hilbert space with orthonormal be the Hilbert space with orthonormal basisbasis
0 , 1 , 2 , , 1N −…
Our oracle is essentially given as the unitary Our oracle is essentially given as the unitary transformationtransformation
( )0
( )
:
1
j
f j
I H H
j j
→
−a
wherewhere 2jI I j j= −
Let Let WW denote the denote the HadamardHadamard transformtransform on on HH
GroverGrover’’s s AlgAlg..:: Oh where is the Hidden Symmetry ???Oh where is the Hidden Symmetry ???
StepStep 0.0. (Initialization)(Initialization)1
0
10
0
N
jW j
Nk
ψ−
=← =
←
∑
StepStep 2.2. Meas. Meas. w.r.tw.r.t. standard basis. standard basis
to obtain unknown state withto obtain unknown state with
ψ
0j
0 , 1 , 2 , , 1N −…
Prob 1 1/ N≥ −
StepStep 1.1. Loop untilLoop until / 4k Nπ≈
00
1j
Q WI WI j
k k
ψ ψ← = −
← +
Where is
the h
idden
Where is
the h
idden
symmetry
???
symmetry
???
Let Let SSNN be the be the symmetric groupsymmetric group on the on the symbolssymbols
00,1,2,3, , , , 1j N −… …
Then GroverThen Grover’’s algorithm is invariant under s algorithm is invariant under thethe
( ) 0 0 0:j N NFix g S g j j S= ∈ = ⊂
If we know the If we know the hidden subgrouphidden subgroup FixFix jj0 0 ,,
then we know then we know jj00, and vice versa., and vice versa.
hiddenhidden subgroupsubgroup
Let denote the transposition , Let denote the transposition , i.e., the permutation that interchanges i.e., the permutation that interchanges iiand and jj , and leaves everything else fixed., and leaves everything else fixed.
( ) Nij S∈ i j↔
Then the set of Then the set of cosetscosets of the of the 0
/N jS Fixhidden subgroup ishidden subgroup is
0jFix
( ) ( ) ( ) ( )0 0 0 00 0 0 0/ 0 , 1 , 2 , , ( 1)
oN j j j j jS Fix j Fix j Fix j Fix N j Fix
= −
…
25
So GroverSo Grover’’s algorithm solves the following s algorithm solves the following hidden subgroup problem:hidden subgroup problem:
0
0 0/
j
j N N jFix S S Fixν
⊂ →
HiddenHiddenSubgroupSubgroup
AmbientAmbientGroupGroup
TargetTargetSetSet
QZ
ν ι
Approx.Approx.TransversalTransversal
f =
f = ινιν
ShorShor’’ss OracleOraclepops up herepops up here
NP Z Z Zν
⊂ →
Recall Recall ShorShor’’ss algorithm:algorithm:
AmbientAmbientGroupGroupHiddenHidden
SubgroupSubgroup
TargetTargetSetSet
×
( ) ( )0 0
0
: /
0 0N NS Fix S
j Fix j
ι →
a
So GroverSo Grover’’s algorithm solves the following s algorithm solves the following hidden subgroup problem:hidden subgroup problem:
0
0 0/
j
j jN NFix S FS ixν
⊂ →
HiddenHiddenSubgroupSubgroup
0/NS Fix
0ν
AmbientAmbientGroupGroup
TargetTargetSetSet
0ι
Approx.Approx.
f =
f = ιι 00
νν jj oo
Voila ! Voila ! GroverGrover’’s Oracles Oracle
pops uppops upTransversalTransversal
( ) ( )0
0
0
0
: / /
0 0N N j
j
f S Fix S Fix
j Fix j Fix
→
a
is Groveris Grover’’s oracle. s oracle. ( ) ( )
0
0
0
0
: / /
0 0N N j
j
f S Fix S Fix
j Fix j Fix
→
a
( )( )
0 00
0
0: 0
if
otherwisejj Fix j j
f j FixFix
=
a
0ifotherwi
:0 se1 j j
f j=
a
ClaimClaim:: The following The following
For this simplifies to:For this simplifies to:
which is which is informationallyinformationally the same as:the same as:
Hence, we can conclude that Hence, we can conclude that GroverGrover’’s algorithms algorithmis a is a Quantum algorithmQuantum algorithm which which solves a hidden solves a hidden subgroup problem.subgroup problem.
Is GroverIs Grover’’s Algorithm a QHS Algorithm s Algorithm a QHS Algorithm ??????
But !!!But !!!
But But ……
The The standardstandard nonnon--abelianabelian QHS algorithm QHS algorithm on on SSNN find the find the hidden subgrouphidden subgroupFixFix jj00
for the following two reasons:for the following two reasons:
•• The subgroups The subgroups FixFix jj are not normal are not normal subgroups of subgroups of ofof SSNN. More importantly, . More importantly, the largest normal subgroup of the largest normal subgroup of SSNN lying lying in in FixFix jj is the trivial subgroup. is the trivial subgroup.
•• The subgroups The subgroups FixFix00, , …… , Fix, FixNN--11 are are mutually conjugate subgroups of mutually conjugate subgroups of SSNN
cannotcannot
26
Moreover, Moreover, ……
Moreover, it is not possible for the standard Moreover, it is not possible for the standard nonnon--abelianabelian QHS algorithm on SQHS algorithm on SNN to find jto find j00. .
For if it did, it would find For if it did, it would find jj00 exponentially exponentially faster than Groverfaster than Grover’’s algorithm. But that is s algorithm. But that is impossible since impossible since ZalkaZalka has shown that Groverhas shown that Grover’’s s algorithm is optimal.algorithm is optimal.
The The ShorShor and Grover algorithms are very and Grover algorithms are very close relatives.close relatives.
ConjectureConjecture: : There is an extension of the There is an extension of the standard nonstandard non--abelianabelian hidden subgroup hidden subgroup algorithm onalgorithm on SSNN which is Groverwhich is Grover’’s algorithm.s algorithm.
Conclusion Conclusion ??????
Please note that, if such an extension exists, it Please note that, if such an extension exists, it would not be any faster than Groverwould not be any faster than Grover’’s algorithm. s algorithm. For For ZalkaZalka has shown that Groverhas shown that Grover’’s algorithm is s algorithm is optimal. But it would no doubt lead to a better optimal. But it would no doubt lead to a better understanding of quantum algorithms.understanding of quantum algorithms.
Simplifying theSimplifying theNonNon--AbelianAbelian
Quantum Hidden Quantum Hidden ProblemProblem
This material can be found This material can be found in the following papersin the following papers
•• Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Subgroup Quantum Hidden Subgroup Algorithms: An Algorithmic Toolkit, Algorithms: An Algorithmic Toolkit, 2006,2006,http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0607047/ph/0607047/
•• Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Subgroup Quantum Hidden Subgroup Algorithms on Free groupsAlgorithms on Free groups, in preparation, in preparation
A Simplification ofA Simplification ofNonNon--AbelianAbelian Quantum Hidden Subgroup Quantum Hidden Subgroup
ProbemsProbems & Algorithms& Algorithms
Simplification:Simplification:
We have shown that we need only study We have shown that we need only study nonnon--abelianabelian hidden subgroup problems hidden subgroup problems and algorithms on and algorithms on FreeFree GroupsGroups !!!!!!
Free GroupsFree Groups
( )0 1 1, , , :nF x x x −= …
A group A group FF is is freefree if the only relations if the only relations among its generators are those required among its generators are those required for for FF to be a group to be a group
1 1i ix x − =•• Allowed:Allowed:
,i j j ix x x x i j= ≠•• Not Allowed:Not Allowed:
3 1ix =•• Not Allowed:Not Allowed:
27
NonNon--AbelianAbelian Hidden Subgroup Problem (HSP)Hidden Subgroup Problem (HSP)
K G Sϕ→ →
We assume that the group We assume that the group G/KG/K is finite.is finite.
HiddenHiddenNormalNormalSubgpSubgp
f.gf.g. Non. Non--Abel.Abel.Ambient Ambient GpGp
Map with Map with Hidden SymmetryHidden Symmetry TargetTarget
SetSet
NonNon--abelianabelian Hidden Subgroup Problem (HSP)Hidden Subgroup Problem (HSP)
ResultResult 1.1. Every nonEvery non--abelianabelian HSP on a group HSP on a group GG can be can be lifted in lifted in polytimepolytime to a HSP on a to a HSP on a f.gf.g. free group . free group FF..
( )1 K F
K G Sϕ
ηη
− →↓ Φ
→ →
ResultResult 2.2. A solution to the above HSP on A solution to the above HSP on FF can can then be used to create a solution to the HSP on then be used to create a solution to the HSP on GGby applying the by applying the ReidemeisterReidemeister--SchreierSchreier theoremtheorem. . This is done in This is done in polytimepolytime..
ConclusionConclusion.. We need only consider the We need only consider the nonnon--abelianabelian HSP on HSP on f.gf.g. free groups.. free groups.
We have also shown that the best way We have also shown that the best way to lift an hidden subgroup algorithm is to to lift an hidden subgroup algorithm is to use a use a 22--sided sided SchreierSchreier TransversalTransversal..
NonNon--abelianabelian Hidden Subgroup Problem (HSP)Hidden Subgroup Problem (HSP)
Hence, we consider the HSG problems of the formHence, we consider the HSG problems of the form
( )0 1, , nF x x S
Qι ν
−= →↑↓
…ϕ
°ϕ ϕ ι= o
Approx.Approx.GroupGroup
22--sidedsidedSchreierSchreier
TransversalTransversal
AmbientAmbientFree GroupFree Group
ApproxApproxMapMap
TargetTargetSetSet
What is a What is a SchreierSchreier Transversal?Transversal?
•• Free GroupFree Group( )0 1, , :nF x x −= =…•• Examples of words inExamples of words in F
1 1 1 1 1 1 1 12 1 1 1 5 5 5 5 2 1 5 5x x x x x x x x x x x x− − − − − − − −=
WordWord Reduced Reduced WordWord
•• Typical wordTypical word
where where 1 2 kw a a a= L
1
jj ka x j±= ∀
1Ki ''w K'w K
TransversalsTransversals Given a group and a normal subgroup ,Given a group and a normal subgroup ,we can construct a new group , called the quotient of we can construct a new group , called the quotient of
F °K°/F K
( )0 1 1, , , nF F x x x−= …°K °'w K °''w K
5 7/ , ,G K K g K g K=
ι
TransversalTransversal
11 ww’’ ww’’’’
28
What is a What is a SchreierSchreier Transversal?Transversal?
A A 22--sided sided SchreierSchreier transversaltransversal for infor inis a transversal is a transversal
such that such that
°K F°: /F K Fι →° °( )wK wK wι =a
1)1) is a reduced word is a reduced word °( ) 1 2 kw K w a a aι = = L2) The word formed by removing2) The word formed by removing
the the rightmostrightmost symbol is a symbol is a cosetcoset representative.representative.1 2 1R tw a a a −= L
ta3) The word formed by removing3) The word formed by removing
the the leftmostleftmost symbol is a symbol is a cosetcoset representative.representative.2 1L t tw a a a−= L
1a
•• Free GroupFree Group
•• subgroup of subgroup of
( )0 1, , nF F x x −= …F°K
The EndThe End
Quantum Computation:Quantum Computation: A Grand Mathematical Challenge A Grand Mathematical Challenge for the Twentyfor the Twenty--First Century and the Millennium,First Century and the Millennium,Samuel J. Lomonaco, Jr.Samuel J. Lomonaco, Jr. (editor),(editor), AMS PSAPM/58, AMS PSAPM/58, (2002). (2002).
Quantum Computation and InformationQuantum Computation and Information,, Samuel J. Samuel J. Lomonaco, Jr. and Howard E. BrandtLomonaco, Jr. and Howard E. Brandt (editors),(editors), AMS AMS CONM/305, (2002). CONM/305, (2002).