quantum algorithms beyond

28
1 Quantum Quantum Computing ? Computing ? Overview Overview Four Talks Four Talks A Rosetta Stone for Quantum Computation A Rosetta Stone for Quantum Computation Quantum Algorithms & Beyond Quantum Algorithms & Beyond Distributive Quantum Computing Distributive Quantum Computing Topological quantum Computing and the Topological quantum Computing and the Jones Polynomial Jones Polynomial A Quantum Computing Knot Theoretic Mystery A Quantum Computing Knot Theoretic Mystery -- -- Can be found on my webpage. Can be found on my webpage. Samuel J. Lomonaco, Jr. Samuel J. Lomonaco, Jr. Dept. of Comp. Dept. of Comp. Sci Sci. & Electrical Engineering . & Electrical Engineering University of Maryland Baltimore County University of Maryland Baltimore County Baltimore, MD 21250 Baltimore, MD 21250 Email: Email: [email protected] [email protected] WebPage WebPage: : http:// http://www.csee.umbc.edu/~lomonaco www.csee.umbc.edu/~lomonaco L-O-O-P Quantum Algorithms Quantum Algorithms & Beyond Beyond The Defense Advance Research Projects Agency (DARPA) & Air Force Research Laboratory (AFRL), Air Force Materiel Command, USAF Agreement Number F30602-01-2-0522. The National Institute for Standards and Technology (NIST) The Mathematical Sciences Research Institute (MSRI). The L-O-O-P Fund. The Institute of Scientific Interchange L-O-O-P This work is supported by: This work is supported by: Quantum Quantum World World Quantum States Quantum States Superposition Superposition Unitary Unitary Evolution Evolution Measurement Measurement Entanglement Entanglement Quantum Algorithms Quantum Algorithms

Upload: others

Post on 03-Feb-2022

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Quantum Algorithms Beyond

1

QuantumQuantumComputing ?Computing ?

OverviewOverviewFour TalksFour Talks

•• A Rosetta Stone for Quantum ComputationA Rosetta Stone for Quantum Computation

•• Quantum Algorithms & BeyondQuantum Algorithms & Beyond

•• Distributive Quantum ComputingDistributive Quantum Computing

•• Topological quantum Computing and theTopological quantum Computing and theJones PolynomialJones Polynomial

•• A Quantum Computing Knot Theoretic MysteryA Quantum Computing Knot Theoretic Mystery---- Can be found on my webpage.Can be found on my webpage.

Samuel J. Lomonaco, Jr.Samuel J. Lomonaco, Jr.Dept. of Comp. Dept. of Comp. SciSci. & Electrical Engineering. & Electrical Engineering

University of Maryland Baltimore CountyUniversity of Maryland Baltimore CountyBaltimore, MD 21250Baltimore, MD 21250

Email: Email: [email protected]@UMBC.EDUWebPageWebPage: : http://http://www.csee.umbc.edu/~lomonacowww.csee.umbc.edu/~lomonaco

LL--OO--OO--PP

Quantum AlgorithmsQuantum Algorithms&&

BeyondBeyond

• The Defense Advance Research ProjectsAgency (DARPA) & Air Force Research

Laboratory (AFRL), Air Force Materiel Command,USAF Agreement Number F30602-01-2-0522.

• The National Institute for Standards and Technology (NIST)• The Mathematical Sciences Research Institute (MSRI).• The L-O-O-P Fund.

• The Institute of Scientific Interchange

LL--OO--OO--PP

This work is supported by:This work is supported by:QuantumQuantum WorldWorld

Quantum StatesQuantum States

SuperpositionSuperposition

UnitaryUnitaryEvolutionEvolution

MeasurementMeasurement

EntanglementEntanglement

Quantum AlgorithmsQuantum Algorithms

Page 2: Quantum Algorithms Beyond

2

SimonSimon’’ss

ShorShor’’ss

Q. HiddenQ. HiddenSubgroup Subgroup AlgsAlgs..

AmplitudeAmplitudeAmplifAmplif..AlgsAlgs.. TraceTrace

EstimationEstimation

QuantumQuantumSimulationSimulation

of Q. of Q. SystemsSystems

DeutschDeutsch--JozsaJozsaGroverGrover’’ss JonesJones

Poly. Poly. AlgAlg..

Q. RandomQ. RandomWalksWalks AdiabaticAdiabatic

AlgsAlgs

Exponential Exponential SpeedupSpeedup

Quadratic Quadratic SpeedupSpeedup

NonNon--ClassicalClassicalBehaviorBehavior ??????

OtherOtherAlgsAlgs..

NewNew

RelatedRelated??????

Quantum Algorithms ZooQuantum Algorithms Zoo The Promise of Quantum Computing ?The Promise of Quantum Computing ?

We are trying to leap to what appears to We are trying to leap to what appears to be an exponentially faster computing be an exponentially faster computing domain.domain.

ComputingComputingPowerPower

Time in Time in YearsYears

QuantumQuantumExponentialExponential

SpeedupSpeedup

MooreMoore’’ssLawLaw

Leap to a much faster Leap to a much faster computing domain ?computing domain ?

The Promise of Exponential Speedup ?The Promise of Exponential Speedup ?

•• Break Break ““unbreakableunbreakable”” crypto systemscrypto systems

•• More accurate weather simulation and More accurate weather simulation and predictionprediction

•• Quantum computer simulations of virusesQuantum computer simulations of viruses

•• Much moreMuch more

But on the other hand But on the other hand ……

Fundamental Questions ???Fundamental Questions ???

Will future quantum computers be general Will future quantum computers be general purpose or special purpose devices ???purpose or special purpose devices ???

What are the limits and boundaries What are the limits and boundaries of Quantum Computation ???of Quantum Computation ???

ShorShor’’ssAlgorithm ?Algorithm ?

ShorShor’’ssFactoringFactoring

AlgorithmAlgorithm

Page 3: Quantum Algorithms Beyond

3

•• Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Subgroup Quantum Hidden Subgroup Algorithms:Algorithms: A Mathematical Perspective,A Mathematical Perspective, AMS, AMS, CONM/305, (2002), 139CONM/305, (2002), 139--202.202.http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0201095ph/0201095

•• Lomonaco & Kauffman,Lomonaco & Kauffman, Shor'sShor's Quantum Factoring Quantum Factoring AlgorithmAlgorithm,, AMS PSAPM, 58, (2002), 161AMS PSAPM, 58, (2002), 161--179. 179. http://arxiv.org/abs/quanthttp://arxiv.org/abs/quant--ph/0010034ph/0010034

Based on the Following Two PapersBased on the Following Two Papers A A CrytanalystCrytanalyst’’ss Dream Dream

II’’m going to crack the m going to crack the RSA RSA CrytoCryto System by System by finding a finding a SuperfastSuperfast

Factoring Algorithm !!Factoring Algorithm !!II’’ll be rich & famous !!!ll be rich & famous !!!

ProblemProblem.. Given an integer Given an integer NN which is which is the product of two unknown primes the product of two unknown primes pp & & qq, i.e., , i.e., N=N=pqpq , find , find pp and and qq, , i.e., factor i.e., factor NN. .

CodeCodeBreakerBreaker

SimplifiedSimplified ShorShor’’ss Algorithm Algorithm

Step 1Step 1.. Choose an integer Choose an integer s.ts.t. . a ( )gcd , 1a N =

Step 3Step 3.. If is not even, then If is not even, then gotogoto Step 1Step 1..P

If is even, then If is even, then Step 4Step 4.. P( ) ( )/ 2 /21 1 1 modP P Pa a a N− = − +

( ) ( )/ 2 / 2angcd 1, gd cd 1,P Pa N a N− +

So use the Euclidean algorithm to computeSo use the Euclidean algorithm to compute

Step 2Step 2.. Use a Use a Quantum ComputerQuantum Computer to determine the to determine the period of the function:period of the function:P

( ) modxNf x a N=

Step 5Step 5..

SimplifiedSimplified ShorShor’’ss Algorithm (Cont.)Algorithm (Cont.)

If the above If the above gcdgcd’’ss are & orare & or& , then we have factored . & , then we have factored .

If not, If not, gotogoto

pp

qq N

Step 1Step 1..

SimplifiedSimplified ShorShor’’ss Algorithm Algorithm

Step 1Step 1.. Choose an integer Choose an integer s.ts.t. . a ( )gcd , 1a N =

Step 3Step 3.. If is not even, then If is not even, then gotogoto Step 1Step 1..PIf is even, then If is even, then Step 4Step 4.. P

( ) ( )/ 2 /21 1 1 modP P Pa a a N− = − +

( ) ( )/ 2 / 2angcd 1, gd cd 1,P Pa N a N− +

So use the Euclidean algorithm to computeSo use the Euclidean algorithm to compute

Step 2Step 2.. Use a Use a Quantum ComputerQuantum Computer to determine the to determine the period of the function:period of the function:P

( ) modxNf x a N=

Quantum PartQuantum Partof Algorithmof Algorithm

0, 1, 2,= ± ±¢ … The IntegersThe Integers

:f →¢ ¢P f

ProblemProblem.. Given a periodic function Given a periodic function

Find the period of .Find the period of .,,

ChooseChoose a sufficiently large positive integer , a sufficiently large positive integer , and restrict to the setand restrict to the set

Qf

0,1,2, , 1QS Q= −…and focus on the restricted functionand focus on the restricted function

: Qf S → ¢SimplificationSimplification.. To avoid minor technicalities, To avoid minor technicalities, we assume that is a multiple of , i.e.,we assume that is a multiple of , i.e.,PQ |P Q

Page 4: Quantum Algorithms Beyond

4

ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)

•• Choose an integer Choose an integer nn s.ts.t. . Q<2Q<2nn & & Max(fMax(f)<2)<2nn

•• Construct two Construct two nn--qubitqubit registers, i.e., registers, i.e., Reg1Reg1and and Reg2Reg2 ..

1 2 0 1 2 0Reg1 Reg2 n n n na a a b b b− − − −= L L

ArgumentsArgumentsof of ff

ValuesValuesof of ff

ConventionConvention.. 2 11 2 0 0

2n

jn n jj

a a a a−

− − == ∑L

For example, For example, 10111 23=

The QThe Q--Point Fourier TransformPoint Fourier Transform

ωω = Primitive = Primitive QQ--thth root of unity, e.g., root of unity, e.g., ee22ππi/Qi/Q

0,1,2, , 1QS Q= −L

The Fourier Transform is:The Fourier Transform is:

where where

µ: :Q Qf S f S → → F

£ £aµ ( ) ( ) xy

x Qf y f x ω

∈= ∑

RemarkRemark.. We will implement as a unitaryWe will implement as a unitarytransformation.transformation.

F

ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)

Step 2.0Step 2.0.. InitializeInitialize 0 0 00 0 00 0= … …Step 2.1Step 2.1.. Apply to Apply to Reg1Reg1F

1 100 0

0 0 0 0I

Q Qjj j

j jω⊗

− −

= == =∑ ∑

Fia

Step 2.2Step 2.2.. Let be a unitary transformation Let be a unitary transformation that takes to . that takes to . Apply .Apply .

fU0j ( )j f j

fU

1 1

0 00 ( )

fUQ Q

j jj x f x

− −

= =∑ ∑a

Hence, Hence, Reg1Reg1 now holds all the integersnow holds all the integers0,1,2, 0,1,2, …… , Q, Q--11

in superpositionin superposition

ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)

0 1

0 1

0 1

1

0

11

1 0 1 00 0

11

1 0 00 0

11

1 0 00 0

( )

( )

(

Reg1 Re

)

2

(

g

)

Q

j

QP P

j j

QP P

j j

QP P

j j

j f j

Pj j f Pj j

Pj j f j

Pj j f j

=

−−

= =

−−

= =

−−

= =

=

= + +

= +

= +

∑ ∑

∑ ∑

∑ ∑

0 1

11

1 0 00 0

Reg1 Re 2 ( )g

QP P

j j

Pj j f j−−

= =

= +

∑ ∑

ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)

Step 2.3Step 2.3.. Measure Measure Reg2Reg2

Whoosh !

Whoosh !

Prob

(j

Prob

(j00=r

=r 00

)=1/

P)=

1/P

1

1

1 0 00

( )Reg1 Reg2

QP

j

Pj r f r−

=

= + ∑

0 0,1,2, , 1r P∈ −…

ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)

Step 2.4Step 2.4.. Apply to Apply to Reg1Reg1F

( )

( )

( )

1 0

1 1

1 0

1

10

1

1 1 1

1 0 0 00 0 0

11

00 0

11

00 0

( ) ( )

( )

( )

Q QQIP P

Pj r k

j j k

QQ P

Pj r k

k j

QQ P jr k Pk

k j

Pj r f r k f r

k f r

k f r

ω

ω

ω ω

− − −⊗+

= = =

−−+

= =

−−

= =

+

=

=

∑ ∑ ∑

∑ ∑

∑ ∑

F

a

But !But !

Page 5: Quantum Algorithms Beyond

5

ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)

But !But ! ( ) 1

1

1

0

/ 0mod /if0

QP jPk

j

Q P y Q Potherwise

ω−

=

==

Hence, Hence,

0

0

1

0

: 0,1, , 1

1

00

Reg1 Re (

(

g2 )

)

Pr k

Qk PP

QP rP

k f r

Qf r

P

λ λ

λ

λ

ω

ω λ

∈ = −

=

=

=

ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)

01

00

Reg1 ( )Reg2QP rP Q

f rP

λ

λ

ω λ −

=

=

Step 2.4Step 2.4.. Measure Measure Reg1Reg1

Prob

(Pr

ob(

λλ=λ=λ00)=

1/P

)=1/

PWh

oosh !

Whoosh !

0 0Reg1 Reg2 ( )Q

f rP

λ =

Hence, we have obtained Hence, we have obtained

for somefor some0

QP

λ 0 0,1, , 1Pλ ∈ −…

ShorShor’’ss Algorithm (Cont.) Algorithm (Cont.)

Repeat steps 1 through 5 until there are Repeat steps 1 through 5 until there are enough multiples of to recover , enough multiples of to recover , and hence . and hence .

/Q P /Q PP

RemarkRemark.. We should remind the We should remind the everyone that the above description everyone that the above description is a simplification of is a simplification of ShorShor’’ss factoring factoring algorithm which contains most of the algorithm which contains most of the key features of the actual algorithm. key features of the actual algorithm.

The The UnsimplifiedUnsimplified ShorShor’’ss AlgorithmAlgorithm

which is to a rational of which is to a rational of the form the form m/P mod1m/P mod1..

ShorShor’’ss algorithm selects a random rational of the algorithm selects a random rational of the form form k/Q mod 1k/Q mod 1

It then uses the It then uses the continued continued fraction algorithmfraction algorithm to to findfind m/P mod 1m/P mod 1. .

““closestclosest””

FoundFound

FoundFound

FoundFound

Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Quantum Hidden Subgroup Algorithms:Subgroup Algorithms: A Mathematical A Mathematical Perspective,Perspective, AMS, CONM/305, (2002), AMS, CONM/305, (2002), 139139--202.202. http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0201095ph/0201095

Lomonaco,Lomonaco, ShorShor’’ss Quantum Factoring Quantum Factoring AlgorithmAlgorithm,, AMS, PSAPM/58, (2002), AMS, PSAPM/58, (2002), 161161--179.179. http://arxiv.org/abs/quanthttp://arxiv.org/abs/quant--ph/0010034ph/0010034

More thorough and detailed descriptions of More thorough and detailed descriptions of ShorShor’’ssalgorithm can be found in the following two papers:algorithm can be found in the following two papers:

Page 6: Quantum Algorithms Beyond

6

GroverGrover’’ssAlgorithm ?Algorithm ?

GroverGrover’’s Algorithms Algorithm

Searching for a Needle in a HaystackSearching for a Needle in a Haystack

Skip to long versionSkip to long versionShort VersionShort Version

The ProblemThe Problem

We wish to search an unordered listWe wish to search an unordered list

0,1 ,2 ,3 , , 2 1 1n N− = −…

for the label for the label 0j

6,2,23,9,L = …

of labels from the set of labels from the set N = 2N = 2nn elementselements

The ProblemThe Problem

We represent the list We represent the list LL as a quantum as a quantum superpositionsuperposition

( )0 0

1 0 1 2 1j NN

ψ = + + + + + + −… …

and proceed to amplify the amplitudeand proceed to amplify the amplitudeof the label by applying a sequence of of the label by applying a sequence of unitary transformations, unitary transformations,

01/ j

0j

ItIt’’s All About this Pictures All About this Picture

β

0j

0j⊥

0ψ2β

2ψ……kψ

MeasureMeasure

MeasureMeasure kψ

Observer

Whoosh

!!!

0j

Prob

~ 1

( ) 01 1 1 1k j Nψ ε ε ε ε= + + + − + + −… …

AmplitudeAmplitudelarge as large as possiblepossible

Page 7: Quantum Algorithms Beyond

7

•• Lomonaco,Lomonaco, Grover's quantum search algorithmGrover's quantum search algorithm,,AMS PSAPM, vol. 58, (2002), 181 AMS PSAPM, vol. 58, (2002), 181 -- 192 192 http://arxiv.org/abs/quanthttp://arxiv.org/abs/quant--ph/0010040ph/0010040

More details can be found More details can be found in on the following Paperin on the following Paper

Skip to QHSASkip to QHSA

GroverGrover’’s Algorithms Algorithm

Searching for a Needle in a HaystackSearching for a Needle in a Haystack

Skip QHS Skip QHS AlgsAlgsLong VersionLong Version

•• Lomonaco,Lomonaco, Grover's quantum search algorithmGrover's quantum search algorithm,,AMS PSAPM, vol. 58, (2002), 181 AMS PSAPM, vol. 58, (2002), 181 -- 192 192 http://arxiv.org/abs/quanthttp://arxiv.org/abs/quant--ph/0010040ph/0010040

This part of the talk is based This part of the talk is based on the following Paperon the following Paper

GroverGrover’’s Algorithm s Algorithm Finding a Needle in a HaystackFinding a Needle in a Haystack

Consider a large unstructured database consisting of Consider a large unstructured database consisting of records labeled in random order by the records labeled in random order by the

integers integers 0,1,2, , 1N −…2nN =

E.g., the database could be stored as a linked listE.g., the database could be stored as a linked list

RecordRecord%#*!#*%#*!#*

RecordRecord*!#%*#*!#%*#

953953HeadHead 1025610256 2345723457 ......RecordRecord#%*!*##%*!*#

On average, we have to retrieve labels before On average, we have to retrieve labels before finding the label . finding the label .

/ 2N0x

Hence, the average computational work isHence, the average computational work iscomputational stepscomputational steps

( )O N

This is a practical problem thatThis is a practical problem thatappears in many guisesappears in many guises

Searching Searching a Phone Booka Phone Book

For example, consider a city phone book For example, consider a city phone book containing phone numbers. Find the name containing phone numbers. Find the name associated with the phone numberassociated with the phone number

N

0 (123)456 7890x = −The best classical algorithm for finding the The best classical algorithm for finding the associated name, say associated name, say Jane DoeJane Doe, would , would search through phone numbers on search through phone numbers on average before finding the name average before finding the name Jane DoeJane Doe. . In other words, it would take on average In other words, it would take on average

computational steps.computational steps.

/ 2N

( )O N

called an called an OracleOracle, such that , such that

we are given a function we are given a function : 0,1,2, , 1 0,1f N − →…

( ) 01

0

if x xf x

Otherwise

==

((““YESYES””))((““NONO””))

By calling it an By calling it an OracleOracle, we mean that we do , we mean that we do not have immediate access to all argumentnot have immediate access to all argument--function pairs . The function pairs . The Oracle Oracle is simply a is simply a blackboxblackbox, which we can query as , which we can query as many times as we like by inputting a number many times as we like by inputting a number

, and then observing the resulting output , and then observing the resulting output . . ButBut each such query comes with an each such query comes with an

associated computational associated computational $$cost$$$$cost$$..

( )( ),x f x ( )f x

x( )f x

More formally,More formally,

Page 8: Quantum Algorithms Beyond

8

The The SearchSearch ProblemProblemforfor anan

UnstructuredUnstructured DatabaseDatabaseis:is:

To find the record labeled as To find the record labeled as with the minimum amount of with the minimum amount of

computational computational $$work$$$$work$$ , i.e., , i.e., with the minimum number of with the minimum number of queries of the oracle .queries of the oracle .f

0x

Another ExampleAnother Example

Consider a Consider a plaintext/plaintext/ciphertextciphertext attack by brute force attack by brute force key searchkey search on a message encrypted with the on a message encrypted with the Data Data Encryption StandardEncryption Standard ((DESDES), where the key ), where the key KK is a 56 is a 56 bit numberbit number

Given the Given the plaintext/plaintext/ciphertextciphertext pairpair

xjepPWvZideRkqldievMsFkxjepPWvZideRkqldievMsFkCiphertextCiphertextTheStolenGoldIsHiddenAtTheStolenGoldIsHiddenAtPlaintextPlaintext

crack the entire cipher by encrypting the crack the entire cipher by encrypting the plaintextplaintext

TheStolenGoldIsHiddenAtTheStolenGoldIsHiddenAtwith each of the keys with each of the keys 0,1,2, 0,1,2, …… . 2. 25656--11 , in turn, , in turn, until the key until the key KK00 is found that produces the is found that produces the ciphertextciphertext

xjepPWvZideRkqldievMsFkxjepPWvZideRkqldievMsFk

if if ( ),P C

denotes the available denotes the available plaintext/plaintext/ciphertextciphertextpairpair

then the then the OracleOracle isis

( ) 01

0

if K Kf K

Otherwise

==

0Kdenotes the denotes the keykey such thatsuch that

( )0,DES P K C=

, and if, and if

In other words,In other words, Mission Impossible AssignmentMission Impossible Assignment

Your Your ““Mission ImpossibleMission Impossible”” assignment, should assignment, should you choose to accept it, is to devise an you choose to accept it, is to devise an algorithm which finds the label in algorithm which finds the label in

( )O N

0x

steps. steps.

As always, should you fail, your lecturer will As always, should you fail, your lecturer will disavow any association with your activities.disavow any association with your activities.

Mission Impossible AssignmentMission Impossible Assignment

LovLov GroverGrover has accepted this has accepted this ““Mission Mission ImpossibleImpossible”” challenge, and has successfully challenge, and has successfully created an algorithm which finds the label created an algorithm which finds the label in in

0x

( )O N

steps, with a total computational work ofsteps, with a total computational work of

( )logO N N

The Quantum Mechanical PerspectiveThe Quantum Mechanical Perspective

22--D Hilbert space D Hilbert space with orthonormal basiswith orthonormal basis

2H 0 , 1

22nn--D Hilbert space D Hilbert space with orthonormal basiswith orthonormal basis

1

20

n−

= ⊗H H

0 , 1 , 2 , , 1N −…

Oracle is given as a Oracle is given as a blackboxblackbox unitary unitary transformation transformation

ffU

2 2

( )x y x f x y⊗ → ⊗⊗ ⊗ −

H H H Ha

fU

Page 9: Quantum Algorithms Beyond

9

The Quantum Mechanical PerspectiveThe Quantum Mechanical Perspective

2 2

( )x y x f x y⊗ → ⊗⊗ ⊗ −

H H H Ha

fUFrom the Oracle From the Oracle

( ) ( )0

( ) 0 01 f xx

x if x xI x x

x otherwise

− == − =

as follows as follows

x0 1

2− 0 1

2−

( )( 1) f x x−fU

we construct the unitary transformation we construct the unitary transformation 0xI

is an Inversionis an Inversion0xI

Note thatNote that0 0 02xI I x x= − , since, since

( )0 0 02 2 |I x x x x x x− = − 0 0x if x xx otherwise

− ==

Also please note that for any unit length Also please note that for any unit length ketket ψ2I Iψ ψ ψ= −

is an is an inversioninversion about the about the hyperplanehyperplane to ,to ,⊥ ψ

““A Mirror Image TransformationA Mirror Image Transformation””

i.e.,i.e.,

““A Mirror ReflectionA Mirror Reflection””

ψLeftLeft

RightRightRightRight

LeftLeft

Inversion by Inversion by I ψ

HyperplaneHyperplaneMirrorMirror

HilbertHilbertSpaceSpace

Properties of Properties of I ψ

DefinitionDefinition.. Let , be unit length Let , be unit length ketskets in in s.ts.t. . . .

χψH |χ ψ ∈ ¡ ThenThen

( ) , | ,Span a b a bψ χ ψ χ= = + ∈S¡ ¡ ¡is a vector space over lying in with is a vector space over lying in with a real inner product induced by the bracketa real inner product induced by the bracket

in . Hence, if , are in . Hence, if , are linearly independent, then is a 2linearly independent, then is a 2--D D Euclidean plane lying in . Euclidean plane lying in .

ψ χ

¡ H

H|− −

HS¡

Properties of Properties of I ψ

PropositionProposition.. The plane is invariant under The plane is invariant under the transformations , the transformations ,

S¡I ψ I χ

( )( )

I

χ

S = S

S = S¡ ¡

¡ ¡

( ) , | ,Span a b a bψ χ ψ χ= = + ∈S¡ ¡ ¡

, i.e.,, i.e.,

H& leave the plane invariant& leave the plane invariantI ψ I χ S¡

I ψI χ

ψ

χ

Page 10: Quantum Algorithms Beyond

10

Let be a Let be a ketket in perpendicular to ,in perpendicular to ,and let denote the line in passing and let denote the line in passing through the origin and to . through the origin and to .

ψ ⊥S¡

ψL

ψ ⊥ S¡⊥

ψ

Line Line Lψ⊥

ψ ⊥ψ

I ψ

Reflection in lineReflection in lineL

ψ ⊥

:I ψ →S S¡ ¡S¡

ThenThen

if is a unit length vector inif is a unit length vector inwhich is to , which is to ,

ψ ⊥

S¡ ⊥ ψ

I Iψ ψ ⊥− =S¡ S¡

thenthenAnd moreover, And moreover,

And finally, if is a unit length And finally, if is a unit length ketket in , in , and if is a unitary and if is a unitary transformation, transformation,

ψ H:U →H H

†UUI U Iψ ψ=

thenthen

SummarySummary

there is a 2there is a 2--D plane (i.e., 2D plane (i.e., 2--D D inner product space over ) inner product space over ) ““livingliving”” in spanned in spanned by and by and s.ts.t..ψ χ

Given two unit Given two unit ketskets and and ““ livingliving”” in with in with real, real,

ψ χ|χ ψ

H

HS¡¡

•• andand( )Iψ =S S¡ ¡ ( )I χ =S S¡ ¡

•• is the lineis the lineI ψS ¡

a reflection ina reflection inoror

an inversion aboutan inversion aboutL

ψ ⊥

•• I Iψ ψ ⊥− =S ¡ S ¡

•• for all unitary for all unitary transfstransfs†

UUI U Iψ ψ= U

Overview of GroverOverview of Grover’’s Algorithms Algorithm

Step 0Step 0.. 1

0

10

N

j

H jN

ψ−

=

← = ∑0k ←

((InitializationInitialization))

( )( )1/ 4sin 1/4

k N Nππ − = ≈ LoopLoop until until Step 1.Step 1.

00 xQ HI HIψ ψ ψ← = −

1k k← +

Step 2.Step 2. Measure with respect to the standard Measure with respect to the standard basis basis to obtain the marked unknown state to obtain the marked unknown state with probability with probability

ψ0 , 1 , , 1N −…

0x( )1 1/ N≥ −

WhatWhat’’s Going On ?s Going On ?

Let Let

be the be the HadamardHadamard transform given bytransform given by

wherewhere

:H →H H

1( 2 )

0

n

H H−

=⊗

(2) 1 111 12

H

= −

The Method in The Method in LovLov’’ss MadnessMadness

ItIt’’s All About this Pictures All About this Picture

α α

β

β

0x

0x ⊥

0ψ ⊥

0xL ⊥

0Lψ

Page 11: Quantum Algorithms Beyond

11

Thus, we now have Thus, we now have ““livingliving”” in the 2in the 2--D planeD planeH

S ¡H

0ψ0x

( )0 0,S Span xψ=¡

(Initialization)(Initialization)Step 0Step 0..

This step creates a superposition of all states, This step creates a superposition of all states, i.e., i.e., 1

00

10 0

N

j

H jN

ψ−

=

= =∑a

The Iteration LoopThe Iteration LoopStep 1Step 1..

Each iteration rotates (in ) closer to .Each iteration rotates (in ) closer to .S¡ 0x0ψ

( )0 0,Angle xβ ψ⊥=

Let and be unit length Let and be unit length ketskets in in which are to and , respectively. which are to and , respectively.

0ψ0ψ ⊥

0x0x ⊥

⊥S¡

α α

β

β

0x ⊥

0ψ ⊥

0xL ⊥

0L ψ

0x

LetLet

•••••• S¡

(Cont.)(Cont.)Step 1Step 1..

α α

β

β

2 β

0x ⊥

0ψ ⊥

0xL ⊥

0Lψ

0x

With each iterationWith each iteration1k kQψ ψ+ =

where where ( )0 0

0 0 0 00

† †0 0

0

x x

H x x x

Q HI H I HI H I

I I I I I Iψ ψ ⊥

= − = −

= − = − =

is the is the product ofproduct of two inversionstwo inversions..

S¡ α α

β

β

2 β

0x ⊥

0ψ ⊥

0xL ⊥

0Lψ

0x

TheoremTheorem

( )2 1

21 2

1 2 2

1 2

&

,L L

L L LinesinL L pointO Ref Ref Rot

Angle L Lβ

β

= ⇒ ==

¡∩ o

But, But, 0 0 0cos sinx xψ β β⊥= +

So, So, ( )[ ] ( )[ ]0 0 0cos 2 1 sin 2 1kQ k x k xψ β β⊥= + + +

( )[ ] ( )[ ]0 0 0cos 2 1 sin 2 1kQ k x k xψ β β⊥= + + +

But what is ?But what is ?β

We seek to iterate until is as large as We seek to iterate until is as large as possible.possible.

( )[ ]sin 2 1k β+••In other words, we seek the smallest positive integerIn other words, we seek the smallest positive integer

such that is as close as possible tosuch that is as close as possible to..

( )2 1k β+k K=/ 2π

••

( )/ 2k K π β= = This turns out to be This turns out to be ••

But what is ? But what is ? β

α α

β

β

0x ⊥

0ψ ⊥

0xL ⊥

0Lψ

0x

Recall thatRecall that ( )0 0,Angle xβ ψ⊥=

( )0 0,Angle xα ψ=We find by noting that the angleWe find by noting that the angleβ

/ 2α β π+ =is is complementarycomplementary to , i.e., to , i.e., β

Page 12: Quantum Algorithms Beyond

12

SinceSince ( )0 01 0 1 1x NN

ψ π= + + + + + −… …

we havewe have 0 0

1| cos cos sin

2x

N

πψ α β β = = = − =

Hence, Hence, ( )1sin 1/ 1/N Nβ −= ≈

andand ( )1/ 4 s in 1 /4

k K N Nπ

π − = = ≈

Hence, the number of iterations in isHence, the number of iterations in isStep 1Step 1..

( )O N

But each iteration uses the But each iteration uses the HadamardHadamard transformtransform1

(2)

0

n

H H−

= ⊗at the computational cost of at the computational cost of

( )lgO N

Since is the Since is the computationalycomputationaly dominant part of dominant part of GroverGrover’’s algorithm, it follows that the computational s algorithm, it follows that the computational time complexity of this algorithm istime complexity of this algorithm is

( )lgO N N

Step 1Step 1..

( )[ ]2 2 1Prob sin 2 1 cos 1Success K

Nβ β= + ≥ = −

The probability that the measurement The probability that the measurement performed in of Groverperformed in of Grover’’s algorithm s algorithm will successfully retrieve the unknown label will successfully retrieve the unknown label

is given by is given by 0x

Step 2.Step 2.

The Probability of SuccessThe Probability of Success GroverGrover’’s Algorithms Algorithm

Step 0Step 0.. 1

0

10

N

j

H jN

ψ−

=

← = ∑0k ←

((InitializationInitialization))

( )( )1/ 4sin 1/4

k N Nππ − = ≈ LoopLoop until until Step 1.Step 1.

00 xQ HI HIψ ψ ψ← = −

1k k← +

Step 2.Step 2. Measure with respect to the standard Measure with respect to the standard basis basis to obtain the marked unknown state to obtain the marked unknown state with probability with probability

ψ0 , 1 , , 1N −…

0x( )1 1/ N≥ −

Hidden SubgroupHidden SubgroupAlgorithms ?Algorithms ? QuantumQuantum

HiddenHidden SubgroupSubgroupAlgorithmsAlgorithms

A Grand UnificationA Grand Unification

Page 13: Quantum Algorithms Beyond

13

is commutative.is commutative.

HiddenHidden SubgroupSubgroupStructureStructure

Def.Def. A Map is said to haveA Map is said to haveif there exist if there exist

•• A subgroup of , andA subgroup of , andKϕ A•• An injectionAn injection : /A K Sϕ ϕι →

/

A S

A Kϕ

ϕ

ν ι→

ϕ

AmbientAmbientGroupGroup

TargetTargetSetSet

HiddenHiddenSubgroupSubgroup

Set of RightSet of RightCosetsCosets

Hidden NaturalHidden NaturalSurjectionSurjection

s. t. the diagrams. t. the diagram

hiddenhiddensubgroupsubgroup structurestructure

: A Sϕ →

HiddenHidden SubgroupSubgroup StructureStructure (Cont.)(Cont.)

/

A S

A Kϕ

ϕ

ν ι→

ϕ

, then , then

/H A Kϕ ϕ=and is an and is an

epimorphismepimorphism: /A A Kϕν →

Hidden QuotientHidden QuotientGroupGroup

HiddenHiddenEpimorphismEpimorphism

Kϕ AIf is an If is an invariantinvariant subgroupsubgroup ofof

is a group, is a group,

KitaevKitaev observed that finding the period observed that finding the period is equivalent to finding the subgroup , is equivalent to finding the subgroup , i.e., the kernel of .i.e., the kernel of .

P ⊂Z Z

modmodn

Nn a N

ϕ→a

Z Z

P

ϕ

ShorShor’’ss Quantum factoring algorithm Quantum factoring algorithm reduces the task of factoring an integer reduces the task of factoring an integer

to the task of finding the period to the task of finding the period of a function of a function

PN

Origins of QHS AlgorithmsOrigins of QHS Algorithms

ShorShor FactoringFactoring

SimonSimon

DeutschDeutsch--JozsaJozsa

HiddenHidden SubgpSubgpAmbientAmbient GpGpQuantumQuantum AlgorithmAlgorithmA

2

0K ϕ

=

¢

2 2 2⊕ ⊕ ⊕¢ ¢ L ¢

¢

K Pϕ = ¢2Kϕ ≅ ¢

Quantum Hidden Subgroup AlgorithmsQuantum Hidden Subgroup Algorithms

A Grand UnificationA Grand Unification

An algorithm solving this An algorithm solving this problem is called a problem is called a hiddenhidden subgroupsubgroupalgorithmalgorithm ((HSAHSA) )

The The HiddenHidden SubgroupSubgroup ProblemProblem ((HSPHSP))

Given a mapGiven a map

: A Sϕ →

determine determine the the hiddenhidden subgroup of the ambient subgroup of the ambient group .group .

KϕA

with with hidden hidden subgroup structure, subgroup structure,

Some Existing Some Existing QHSAQHSA’’ss

•• Hidden subgroup algorithmsHidden subgroup algorithms

§§ DeutschDeutsch--JozsaJozsa

§§ SimonSimon

§§ ShorShor

§§ LegendreLegendre symbol symbol

§§ HallgenHallgen’’ss algorithm for solving Pellalgorithm for solving Pell’’s s eqeq. .

§§ Various NonVarious Non--abelabel. Algorithms. Algorithms

§§ OthersOthers

Page 14: Quantum Algorithms Beyond

14

We will discuss the following Six We will discuss the following Six HSAHSA’’ss

§§ Continuous Continuous ShorShor on on §§ Wandering Wandering ShorShor

§§ Lift of Lift of ShorShor toto

§§ HSA on CircleHSA on Circle

§§ Dual Dual ShorShor HSAHSA

§§ HSA for Functional IntegralsHSA for Functional Integrals

¡

¢

•• Lomonaco & Kauffman,Lomonaco & Kauffman, Continuous Quantum Hidden Subgroup Continuous Quantum Hidden Subgroup Algorithms, Algorithms, SPIE, 2004,SPIE, 2004, http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0304084ph/0304084

•• Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Subgroup Algorithms:Quantum Hidden Subgroup Algorithms:A Mathematical Perspective,A Mathematical Perspective, AMS, CONM/305, (2002), 139AMS, CONM/305, (2002), 139--202.202. http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0201095ph/0201095

•• Lomonaco & Kauffman,Lomonaco & Kauffman, A Continuous Variable A Continuous Variable ShorShor AlgorithmAlgorithm,,AMS CONM/381, 2005, 97AMS CONM/381, 2005, 97--108. 108. http://arxiv.org/abs/quanthttp://arxiv.org/abs/quant--ph/0210141ph/0210141

These Six Algorithms Can Be Found These Six Algorithms Can Be Found in the Following Papersin the Following Papers

•• Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Subgroup Quantum Hidden Subgroup Algorithms: An Algorithmic Toolkit, Algorithms: An Algorithmic Toolkit, 2006,2006,http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0607047/ph/0607047/

•• Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Subgroup Quantum Hidden Subgroup Algorithms:Algorithms: A Mathematical Perspective,A Mathematical Perspective, AMS, AMS, CONM/305, (2002).CONM/305, (2002). http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0201095ph/0201095

The first of the these papers can be found inThe first of the these papers can be found in

Three Methods for Three Methods for Creating New Quantum Creating New Quantum

AlgorithmsAlgorithms

Two Ways to Create New Quantum AlgorithmsTwo Ways to Create New Quantum Algorithms

GivenGiven : A Sϕ →

PushPush

LiftLift

ι

µϕη

LLifted Lifted GpGp

ν

H°ϕ ϕ ι= oApprox Approx GpGp

SAmbAmb. . GpGp ϕTarget SetTarget SetA

Lifting and PushingLifting and PushingA 3rd Way to Create New Quantum AlgorithmsA 3rd Way to Create New Quantum Algorithms

DualityDuality

A S→ϕAmbAmb. . GpGp

µA S ′→ΦDual Dual GpGp DualDual

QHS QHS AlgAlg

QHS QHS AlgAlg

DualDual

Page 15: Quantum Algorithms Beyond

15

SummarySummary3 Ways to create New Quantum Algorithms3 Ways to create New Quantum Algorithms

•• LiftingLifting

•• PushingPushing

•• DualityDuality

Some Past AlgorithmsSome Past AlgorithmsHidden Subgroup AlgorithmsHidden Subgroup Algorithms

•• Lomonaco & Kauffman,Lomonaco & Kauffman, A Continuous Variable A Continuous Variable ShorShor AlgorithmAlgorithm, , AMS CONM/381, 2005, 97AMS CONM/381, 2005, 97--108. 108. http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0210141ph/0210141

•• Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Quantum Hidden Subgroup Algorithms:Subgroup Algorithms: A Mathematical A Mathematical Perspective,Perspective, AMS, CONM/305, (2002).AMS, CONM/305, (2002).http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0201095ph/0201095

••Wandering Wandering ShorShor

•• Continuous Continuous ShorShor

QZ

ν ι

Approx.Approx.TransversalTransversal

f =

f = ινιν

NP Z Z Zν

⊂ →

Recall Recall ShorShor’’ss algorithm:algorithm:

AmbientAmbientGroupGroupHiddenHidden

SubgroupSubgroup

TargetTargetSetSet

×

Find Approx. Find Approx. PeriodicPeriodic

ObjObj.: Find Period.: Find Period Wandering Wandering ShorShor

Q

Sι ν

→↑↓¢

°ϕ ϕ ι= o

ϕ

Free AbelFree AbelFinite Finite RkRkAmbAmb GPGP

Approx Approx GpGp

ShorShorTransvTransv

ApproxApproxMapMap

TargetTargetSetSet

PushPushA⊕ ⊕¢ ¢ ¢⊕ ⊕¢ ¢ ¢⊕ ⊕¢ ¢ ¢⊕ ⊕¢ ¢ ¢⊕ ⊕¢ ¢ ¢⊕ ⊕¢ ¢ ¢

Continuous Continuous ShorShor

A S→ϕAmbient GroupAmbient Group

Key Idea: Key Idea: of discrete algorithms to of discrete algorithms to a continuous groupsa continuous groups

S→¡

LiftingLifting

Add. Add. GpGp of of RealsReals

• A highly speculative quantum algorithm for A highly speculative quantum algorithm for

Three Recent QHS AlgorithmsThree Recent QHS Algorithms

• A quantum algorithm on the A quantum algorithm on the

• A quantum algorithm to A quantum algorithm to ShorShor’’ss algorithmalgorithm

CircleCircle

dualdual

functional integralsfunctional integrals

Jeremy Jeremy BecnelBecnel has found ahas found afirm mathematical foundationfirm mathematical foundationfor this algorithm.for this algorithm.

Page 16: Quantum Algorithms Beyond

16

Road MapRoad MapShorShor’’ss AlgAlg

QHS QHS AlgAlg forforFunctional Functional IntegralsIntegrals

PushingPushing

Dual of Dual of ShorShor’’ss AlgAlg

QHS QHS AlgAlg on on /¡ ¢DualityDuality

QHS QHS AlgAlg on on ¢LiftingLifting ¢ S

ϕ

/¡ ¢

ϕS

ϕ~

ϕ~

Lift of Lift of ShorShorAlgorithmAlgorithm

ShorShorAlgorithmAlgorithm

Dual LiftedDual LiftedAlgorithmAlgorithm

Dual Dual ShorShorAlgorithmAlgorithm

DualDual

LiftingLifting & & DualityDuality

A Lifting of A Lifting of ShorShor’’ssQuantum Factoring Quantum Factoring

Algorithm toAlgorithm toIntegers Integers ¢

Fourier AnalysisFourier Analysison theon the

CircleCircle

A Momentary DigressionA Momentary Digression

The Circle as a GroupThe Circle as a Group

TheThe circlecircle groupgroup can be viewed ascan be viewed as

•• AA multiplicativemultiplicative groupgroup, i.e., as the unit , i.e., as the unit circle in the complex planecircle in the complex plane £

2 :ixe xπ ∈¡( )22 2 i x yix iye e e ππ π +=i

where denotes the additive group of where denotes the additive group of realsreals..

¡

The Circle as a GroupThe Circle as a Group

TheThe circle groupcircle group cancan alsoalso be viewed asbe viewed as•• AnAn additiveadditive groupgroup, i.e., as, i.e., as

where denotes the additive group of where denotes the additive group of integers.integers.

¢

/ mod1reals=¡ ¢mod1x y+

Page 17: Quantum Algorithms Beyond

17

The Character GroupThe Character Group

TheThe character groupcharacter group of an of an abelianabelian group group is defined asis defined as

µ ( ),A Hom A Circle= : :A Circle amorphismχ χ= →

with group operation (in multiplicative notation),with group operation (in multiplicative notation),

( )( ) ( ) ( )1 2 1 2a a aχ χ χ χ=i ior (in additive notation) asor (in additive notation) as

( )( ) ( ) ( )1 2 1 2a a aχ χ χ χ+ = +

µA A

The Character Groups of The Character Groups of andand¢• TheThe character groupcharacter group of isof is

•• TheThe character groupcharacter group of isof is

/¡ ¢¢

µ 2: : /inxx n e xπχ= ∈ =¢ a ¡ ¡ ¢

/¡ ¢·

2/ : :

: mod1:

inxn

n

x e n

x nx n

πχ

χ

≅ ∈

≅ ∈ =

¡ ¢ a ¢a ¢ ¢

/⇔¢ ¡ ¢DiscreteDiscrete

ContinuousContinuous

Fourier Analysis on the CircleFourier Analysis on the Circle /¡ ¢TheThe Fourier transformFourier transform of of is defined as the map is defined as the map

given by given by

TheThe inverse Fourier transforminverse Fourier transform is defined asis defined as

: /f →¡ ¢ £

µ :f →¢ £

µ 2( ) ( )inxf n dxe f xπ−= ∫Ñ

µ2( ) ( )inx

n

f x e f nπ

= ∑¢

( )1

0

1 P

Pn

nx x

P Pδ δ

=

= −

•• DiracDirac Delta function on Delta function on ( )xδ /¡ ¢•• For a nonFor a non--zero integer, we will zero integer, we will also need on the generalized also need on the generalized functionfunction

P/¡ ¢

Needed Mathematical MachineryNeeded Mathematical Machinery

•• The elements of are formal integrals The elements of are formal integrals of the formof the form

•• denotes the rigged Hilbert spacedenotes the rigged Hilbert spaceon with orthonormal basis on with orthonormal basis

, i.e.,, i.e.,

/¡ ¢H

( )dx f x x∫Ñ

/¡ ¢H

: /x x ∈ ¡ ¢ ( )x y x yδ= −/¡ ¢

Rigged Hilbert SpaceRigged Hilbert SpaceFinally, let denote the space of formal Finally, let denote the space of formal sums sums

with orthonormal basis with orthonormal basis

¢H

:n nn

a n a n∞

=−∞

∈ ∀ ∈

∑ £ ¢

:n n∈ ¢

Page 18: Quantum Algorithms Beyond

18

We now lift We now lift ShorShor’’ss Quantum Quantum Factoring Algorithm to the Factoring Algorithm to the integers integers ¢

¢ Sϕ

Q¢ ϕ~Lift of Lift of ShorShorAlgorithmAlgorithm

ShorShorAlgorithmAlgorithm

LiftingLiftingLet be periodic function with hidden minimum period .

Objective:

Find

:ϕ →¢ £P

P

Periodic Functions onPeriodic Functions on ¢

2 01 0 0in

n n

e n nπψ∈ ∈

= = ∈ ⊗∑ ∑ H Hi¢ £

¢ ¢

0 /0 0ψ = ∈ ⊗ H¡ ¢ £H

• Step 1.Step 1. Apply 1-1 ⊗F

2 ( )n

n nψ ϕ∈

= ∑¢

• Step 0.Step 0. Initialize

: ( )U n u n u nϕ ϕ+a• Step 2.Step 2. Apply

• Step 3.Step 3. Apply 1⊗F( )

( ) ( )

( )

( ) ( )

( )

1 0

1 0

01

1 0

0

0

0

0

23 /

12

1 00

122

00

12

00

1 12

00 0

1

0

1

inx

n

Pi n P n x

n n

Pi n xinPx

n n

Pi n x

Pn

P Pi n x

n n

P

n

d x x e n

d x x e n P n

d x x e e n

d x x x e n

ne n

P P

n nP P

π

π

ππ

π

π

ψ ϕ

ϕ

ϕ

δ ϕ

ϕ

−− +

∈ =

−−−

∈ =

−−

=

− −−

= =

=

= ∈ ⊗

= +

=

=

=

= Ω

∑∫

∑ ∑∫

∑ ∑∫

∑∫

∑ ∑

H H¡ ¢ £¢

¢

¢

ÑÑ

ÑÑ

• Step 4.Step 4. Measure 1

30

P

n

n nP P

ψ−

=

= Ω ∑

Qydy y y

Q = ∫ÑO

and then proceed to find the corresponding using the continued fraction recursion. /n P

(We assume )22Q P≥

with respect to the observable

/m Qto produce a random eigenvalue

TheTheActualActual

ShorShorAlgorithmAlgorithm

UnUn--LiftedLifted

SkipSkip

Page 19: Quantum Algorithms Beyond

19

The Actual (UnThe Actual (Un--Lifted) Lifted) ShorShor AlgorithmAlgorithm

Make the following approximations by selecting Make the following approximations by selecting a sufficiently large integer :a sufficiently large integer :Q

is only approximately periodic !is only approximately periodic !°ϕ

: 0Q k k Q≈ = ∈ ≤ <¢ ¢ ¢

/ mod1: 0,1, , 1Q

rr Q

Q ≈ = = −

¡ ¢ ¢ …

°: : Qϕ ϕ→ ≈ →¢ £ ¢ £

Run the algorithm inRun the algorithm in

Q S⊗¢H H

1

0

Q

r

r r rQ Q Q

=

= ∑O

and measure the observableand measure the observable

We have reconstructed theWe have reconstructed theoriginal original ShorShor Algorithm !!!Algorithm !!!

A Quantum Hidden A Quantum Hidden Subgroup Algorithm Subgroup Algorithm

on the on the

CircleCircle

The Dual AlgorithmThe Dual Algorithmon theon the

CircleCircle

¢ Sϕ

/¡ ¢ Φ S

ϕ~Lift of Lift of ShorShorAlgorithmAlgorithm

ShorShorAlgorithmAlgorithm

Dual LiftedDual LiftedAlgorithmAlgorithm

DualDual

LiftingLifting & & DualityDuality

•• The elements of are formal The elements of are formal integrals of the form integrals of the form

•• denotes the rigged Hilbert spacedenotes the rigged Hilbert spaceon with orthonormal basis on with orthonormal basis

, i.e.,, i.e.,

/¡ ¢H

/¡ ¢H

: /x x ∈¡ ¢ ( )x y x yδ= −

( )dx f x x∫Ñ

/¡ ¢

Rigged Hilbert SpaceRigged Hilbert Space

Page 20: Quantum Algorithms Beyond

20

Finally, let denote the space of formal Finally, let denote the space of formal sums sums

with orthonormal basiswith orthonormal basis

¢H

:n nn

a n a n∞

=−∞

∈ ∀ ∈

∑ £ ¢

:n n∈ ¢

Let be an admissible periodic function of minimum rational period

Proposition:Let (with ) be a period of . Then is also a period of .

Remark: Hence, the minimum rational period is always the reciprocal of an integer modulo 1 .

: /f →¡ ¢ £/α ∈ ¤ ¢

21/ af

f

Periodic Admissible Functions onPeriodic Admissible Functions on /¡ ¢

1 2/a aα = ( )1 2gcd , 1a a =

• Step 0.Step 0. Initialize

0 0 0ψ = ∈ ⊗¢ £H H

2 01 /0 0ixdxe x dx xπψ = = ∈ ⊗∫ ∫i

¡ ¢ £Ñ Ñ H H

2 ( )dx x xψ ϕ= ∫Ñ

1-1 ⊗F••Step 1.Step 1. Apply

: ( )U x u x u xϕ ϕ+a••Step 2.Step 2. Apply

• Step 3.Step 3. Apply 1⊗F

( )

( )

23

2

inx

n

inx

n

dxe n x

n dxe x

π

π

ψ ϕ

ϕ

=

= ∈ ⊗

∑∫

∑ ∫¢

¢ £¢

ÑÑ H H

Letting , we have m

mx x

a= −

( ) ( )

( )

11

2 2

0

11 2

0 0

121

2

0 0

m

maa

inx inx

m ma

maa in xa

m mm

inm aainxa

m

d x e x d x e x

mdx e x

a

e dxe x

π π

π

ππ

ϕ ϕ

ϕ

ϕ

+−

− −

=

− − +

=

− −−

=

=

= +

=

∑∫ ∫

∑ ∫

∑ ∫

Ñ

But But

Thus,Thus,

21

0mod0

0mof di

0

inmaa

n am

a

otherwse a

i

n

e

δ− −

==

== =

( )

( )

( )

( )

23

1/2

0mod0

1/2

0

inx

n

ainx

n an

ai a x

n dxe x

n dxe x

a dxe x

a a

π

π

π

ψ ϕ

δ ϕ

ϕ

−=

=

=

=

= Ω

∑ ∫

∑ ∫

∑ ∫∑

¢

¢

l

l ¢

l ¢

l

l l

Ñ

Page 21: Quantum Algorithms Beyond

21

• Step 4.Step 4. Measure

( )3 a aψ∈

= Ω∑l ¢

l l

n

n n n∈

= ∑¢

O

al

with respect to the observable

to produce a random eigenvalue

TheThe

correspondingcorresponding

algorithmalgorithm

discretediscrete

The Algorithmic Dual The Algorithmic Dual of of

ShorShor’’ss Quantum Quantum Factoring AlgorithmFactoring Algorithm

¢ Sϕ

/¡ ¢

Φ S

ϕ~

Φ~

Lift of Lift of ShorShorAlgorithmAlgorithm

ShorShorAlgorithmAlgorithm

Dual LiftedDual LiftedAlgorithmAlgorithm

Dual Dual ShorShorAlgorithmAlgorithm

DualDual

LiftingLifting & & DualityDuality

is only approximately periodic !is only approximately periodic !

We now create a corresponding We now create a corresponding discrete algorithmdiscrete algorithm

The approximations are:The approximations are:

°: : Qϕ ϕ→ ≈ →¢ £ ¢ £

/ mod1: 0,1, , 1Q

rr Q

Q ≈ = = −

¡ ¢ ¢ …

:0Q k k P≈ = ∈ ≤ <¢ ¢ ¢

°ϕ

Run the algorithm inRun the algorithm in

Q S⊗¢H H

1

0

Q

k

k k k−

=

= ∑O

and measure the observableand measure the observable

Page 22: Quantum Algorithms Beyond

22

Quantum Algorithms based on Quantum Algorithms based on Feynman Functional integrals Feynman Functional integrals

The following algorithm is The following algorithm is highly speculativehighly speculative. . In the spirit of Feynman, the following In the spirit of Feynman, the following quantum algorithm is quantum algorithm is based on functional based on functional integrals whose existence is difficult to integrals whose existence is difficult to determinedetermine, let alone approximate., let alone approximate.

CaveatCaveat EmptorEmptor

Recently, Recently, Jeremy Jeremy BecnelBecnel has succeeded in has succeeded in creating a rigorous mathematical foundation creating a rigorous mathematical foundation for this algorithm !for this algorithm ! SkipSkip

The SpaceThe Space PathsPaths

PathsPaths = all continuous paths= all continuous pathswhich are with respect to the inner which are with respect to the inner productproduct

PathsPaths is a vector space over with is a vector space over with respect torespect to

[ ]: 0,1 nx → ¡2L

1

0( ) ( )x y d s x s y s= ∫i i

¡

( )( )

( ) ( )( ) ( ) ( )

x s x sx y s x s y sλ λ=

+ = +

The Problem to be SolvedThe Problem to be Solved

Let be a functional with a Let be a functional with a hiddenhidden subspacesubspace of such thatof such that

: Pathsϕ → £V Paths

( ) ( )x v x v Vϕ ϕ+ = ∀ ∈

Objective. Create a quantum algorithm Create a quantum algorithm that finds the hidden subspace .that finds the hidden subspace .V

The Ambient Rigged Hilbert SpaceThe Ambient Rigged Hilbert Space

Let be the rigged Hilbert space with Let be the rigged Hilbert space with orthonormal basis , orthonormal basis ,

and with bracket product and with bracket product

PathsH

:x x Paths∈

( )|x y x yδ= −

Parenthetical Remark

Please note that can be written as the Please note that can be written as the following disjoint union: following disjoint union:

( )v V

Paths v V ⊥

= +∪

Paths

•• Step 0.Step 0. InitializeInitialize

•• Step 1.Step 1. Apply Apply

•• Step 2.Step 2. Apply Apply

0 0 0 Pathsψ = ∈ ⊗H H£

1-1 ⊗F

2 01 0 0ix

Paths Paths

x e x x xπψ = =∫ ∫iD D

: ( )U x u x u xϕ ϕ+a

2 ( )Paths

x x xψ ϕ= ∫ D

Page 23: Quantum Algorithms Beyond

23

• Step 3. Apply 1⊗F

( )

( )

23

2

ix y

Paths Paths

ix y

Paths Paths

y x e y x

y y x e x

π

π

ψ ϕ

ϕ

=

=

∫ ∫

∫ ∫

i

i

D D

D D

ButBut

( ) ( )

( ) ( )

( )

2 2

2

2 2

ix y ix y

Paths V v V

i v x y

V V

i v y ix y

V V

xe x v xe x

v xe v x

ve xe x

π π

π

π π

ϕ ϕ

ϕ

ϕ

− −

+

− +

− −

=

= +

=

∫ ∫ ∫

∫ ∫

∫ ∫

i i

i

i i

D D D

D D

D D

However,However,

So, So,

( )2 iv y

V V

ve u y uπ δ⊥

− = −∫ ∫iD D

( )

( ) ( )

( )

( )

2 23

2

2

n

n

iv y ix y

Paths V V

ix y

Paths V V

i x u

V V

V

y y v e x e x

y y u y u x e x

u u x e x

u u u

π π

π

π

ψ ϕ

δ ϕ

ϕ

⊥ ⊥

⊥ ⊥

− −

=

= −

=

= Ω

∫ ∫ ∫

∫ ∫ ∫

∫ ∫

i i

i

i

D D D

D D D

D D

D

••Step 4.Step 4. Measure Measure

with respect to the observable with respect to the observable

to produce a random element ofto produce a random element of

( )3

V

u u uψ⊥

= Ω∫ D

Paths

A w w w w= ∫ D

V ⊥

Can the above path integral quantum algorithm Can the above path integral quantum algorithm be modified in such a way as to create a be modified in such a way as to create a quantum algorithm for the Jones polynomial ?quantum algorithm for the Jones polynomial ?

I.e., can it be modified by replacing I.e., can it be modified by replacing by the by the space of gauge connectionsspace of gauge connections, and by , and by making suitable modifications?making suitable modifications?

QuestionQuestion

Paths

µ ( ) ( ) ( )KK A A Aψ ψ= ∫D W

where is the where is the Wilson loopWilson loop

( ) ( )( )expK KA tr P A= ∫ÑW

( )K AW

Is GroverIs Grover’’s Algorithm s Algorithm a Quantum Hiddena Quantum Hidden

Subgroup AlgorithmSubgroup Algorithm

??????

Page 24: Quantum Algorithms Beyond

24

•• Lomonaco & Kauffman,Lomonaco & Kauffman, Is GroverIs Grover’’s Algorithm a s Algorithm a Quantum Hidden Subgroup Algorithm ? Quantum Hidden Subgroup Algorithm ? ,, (2006), (2006), http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0603140ph/0603140

This material can be found This material can be found in the following paperin the following paper

GroverGrover’’s s AlgAlg..:: Oh where is the Hidden Symmetry ???Oh where is the Hidden Symmetry ???

The problem is to find the unknown integer The problem is to find the unknown integer jj00 in in

given the oraclegiven the oracle

01( )

0ifotherwise

j jf j

==

00,1,2,3, , , , 1 2 1nj N − = −… …

is is inversion in the inversion in the hyperplanehyperplane orthogonal to orthogonal to j

GroverGrover’’s s AlgAlg..:: Oh where is the Hidden Symmetry ???Oh where is the Hidden Symmetry ???

Let Let HH be the Hilbert space with orthonormal be the Hilbert space with orthonormal basisbasis

0 , 1 , 2 , , 1N −…

Our oracle is essentially given as the unitary Our oracle is essentially given as the unitary transformationtransformation

( )0

( )

:

1

j

f j

I H H

j j

−a

wherewhere 2jI I j j= −

Let Let WW denote the denote the HadamardHadamard transformtransform on on HH

GroverGrover’’s s AlgAlg..:: Oh where is the Hidden Symmetry ???Oh where is the Hidden Symmetry ???

StepStep 0.0. (Initialization)(Initialization)1

0

10

0

N

jW j

Nk

ψ−

=← =

StepStep 2.2. Meas. Meas. w.r.tw.r.t. standard basis. standard basis

to obtain unknown state withto obtain unknown state with

ψ

0j

0 , 1 , 2 , , 1N −…

Prob 1 1/ N≥ −

StepStep 1.1. Loop untilLoop until / 4k Nπ≈

00

1j

Q WI WI j

k k

ψ ψ← = −

← +

Where is

the h

idden

Where is

the h

idden

symmetry

???

symmetry

???

Let Let SSNN be the be the symmetric groupsymmetric group on the on the symbolssymbols

00,1,2,3, , , , 1j N −… …

Then GroverThen Grover’’s algorithm is invariant under s algorithm is invariant under thethe

( ) 0 0 0:j N NFix g S g j j S= ∈ = ⊂

If we know the If we know the hidden subgrouphidden subgroup FixFix jj0 0 ,,

then we know then we know jj00, and vice versa., and vice versa.

hiddenhidden subgroupsubgroup

Let denote the transposition , Let denote the transposition , i.e., the permutation that interchanges i.e., the permutation that interchanges iiand and jj , and leaves everything else fixed., and leaves everything else fixed.

( ) Nij S∈ i j↔

Then the set of Then the set of cosetscosets of the of the 0

/N jS Fixhidden subgroup ishidden subgroup is

0jFix

( ) ( ) ( ) ( )0 0 0 00 0 0 0/ 0 , 1 , 2 , , ( 1)

oN j j j j jS Fix j Fix j Fix j Fix N j Fix

= −

Page 25: Quantum Algorithms Beyond

25

So GroverSo Grover’’s algorithm solves the following s algorithm solves the following hidden subgroup problem:hidden subgroup problem:

0

0 0/

j

j N N jFix S S Fixν

⊂ →

HiddenHiddenSubgroupSubgroup

AmbientAmbientGroupGroup

TargetTargetSetSet

QZ

ν ι

Approx.Approx.TransversalTransversal

f =

f = ινιν

ShorShor’’ss OracleOraclepops up herepops up here

NP Z Z Zν

⊂ →

Recall Recall ShorShor’’ss algorithm:algorithm:

AmbientAmbientGroupGroupHiddenHidden

SubgroupSubgroup

TargetTargetSetSet

×

( ) ( )0 0

0

: /

0 0N NS Fix S

j Fix j

ι →

a

So GroverSo Grover’’s algorithm solves the following s algorithm solves the following hidden subgroup problem:hidden subgroup problem:

0

0 0/

j

j jN NFix S FS ixν

⊂ →

HiddenHiddenSubgroupSubgroup

0/NS Fix

AmbientAmbientGroupGroup

TargetTargetSetSet

Approx.Approx.

f =

f = ιι 00

νν jj oo

Voila ! Voila ! GroverGrover’’s Oracles Oracle

pops uppops upTransversalTransversal

( ) ( )0

0

0

0

: / /

0 0N N j

j

f S Fix S Fix

j Fix j Fix

a

is Groveris Grover’’s oracle. s oracle. ( ) ( )

0

0

0

0

: / /

0 0N N j

j

f S Fix S Fix

j Fix j Fix

a

( )( )

0 00

0

0: 0

if

otherwisejj Fix j j

f j FixFix

=

a

0ifotherwi

:0 se1 j j

f j=

a

ClaimClaim:: The following The following

For this simplifies to:For this simplifies to:

which is which is informationallyinformationally the same as:the same as:

Hence, we can conclude that Hence, we can conclude that GroverGrover’’s algorithms algorithmis a is a Quantum algorithmQuantum algorithm which which solves a hidden solves a hidden subgroup problem.subgroup problem.

Is GroverIs Grover’’s Algorithm a QHS Algorithm s Algorithm a QHS Algorithm ??????

But !!!But !!!

But But ……

The The standardstandard nonnon--abelianabelian QHS algorithm QHS algorithm on on SSNN find the find the hidden subgrouphidden subgroupFixFix jj00

for the following two reasons:for the following two reasons:

•• The subgroups The subgroups FixFix jj are not normal are not normal subgroups of subgroups of ofof SSNN. More importantly, . More importantly, the largest normal subgroup of the largest normal subgroup of SSNN lying lying in in FixFix jj is the trivial subgroup. is the trivial subgroup.

•• The subgroups The subgroups FixFix00, , …… , Fix, FixNN--11 are are mutually conjugate subgroups of mutually conjugate subgroups of SSNN

cannotcannot

Page 26: Quantum Algorithms Beyond

26

Moreover, Moreover, ……

Moreover, it is not possible for the standard Moreover, it is not possible for the standard nonnon--abelianabelian QHS algorithm on SQHS algorithm on SNN to find jto find j00. .

For if it did, it would find For if it did, it would find jj00 exponentially exponentially faster than Groverfaster than Grover’’s algorithm. But that is s algorithm. But that is impossible since impossible since ZalkaZalka has shown that Groverhas shown that Grover’’s s algorithm is optimal.algorithm is optimal.

The The ShorShor and Grover algorithms are very and Grover algorithms are very close relatives.close relatives.

ConjectureConjecture: : There is an extension of the There is an extension of the standard nonstandard non--abelianabelian hidden subgroup hidden subgroup algorithm onalgorithm on SSNN which is Groverwhich is Grover’’s algorithm.s algorithm.

Conclusion Conclusion ??????

Please note that, if such an extension exists, it Please note that, if such an extension exists, it would not be any faster than Groverwould not be any faster than Grover’’s algorithm. s algorithm. For For ZalkaZalka has shown that Groverhas shown that Grover’’s algorithm is s algorithm is optimal. But it would no doubt lead to a better optimal. But it would no doubt lead to a better understanding of quantum algorithms.understanding of quantum algorithms.

Simplifying theSimplifying theNonNon--AbelianAbelian

Quantum Hidden Quantum Hidden ProblemProblem

This material can be found This material can be found in the following papersin the following papers

•• Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Subgroup Quantum Hidden Subgroup Algorithms: An Algorithmic Toolkit, Algorithms: An Algorithmic Toolkit, 2006,2006,http://xxx.lanl.gov/abs/quanthttp://xxx.lanl.gov/abs/quant--ph/0607047/ph/0607047/

•• Lomonaco & Kauffman,Lomonaco & Kauffman, Quantum Hidden Subgroup Quantum Hidden Subgroup Algorithms on Free groupsAlgorithms on Free groups, in preparation, in preparation

A Simplification ofA Simplification ofNonNon--AbelianAbelian Quantum Hidden Subgroup Quantum Hidden Subgroup

ProbemsProbems & Algorithms& Algorithms

Simplification:Simplification:

We have shown that we need only study We have shown that we need only study nonnon--abelianabelian hidden subgroup problems hidden subgroup problems and algorithms on and algorithms on FreeFree GroupsGroups !!!!!!

Free GroupsFree Groups

( )0 1 1, , , :nF x x x −= …

A group A group FF is is freefree if the only relations if the only relations among its generators are those required among its generators are those required for for FF to be a group to be a group

1 1i ix x − =•• Allowed:Allowed:

,i j j ix x x x i j= ≠•• Not Allowed:Not Allowed:

3 1ix =•• Not Allowed:Not Allowed:

Page 27: Quantum Algorithms Beyond

27

NonNon--AbelianAbelian Hidden Subgroup Problem (HSP)Hidden Subgroup Problem (HSP)

K G Sϕ→ →

We assume that the group We assume that the group G/KG/K is finite.is finite.

HiddenHiddenNormalNormalSubgpSubgp

f.gf.g. Non. Non--Abel.Abel.Ambient Ambient GpGp

Map with Map with Hidden SymmetryHidden Symmetry TargetTarget

SetSet

NonNon--abelianabelian Hidden Subgroup Problem (HSP)Hidden Subgroup Problem (HSP)

ResultResult 1.1. Every nonEvery non--abelianabelian HSP on a group HSP on a group GG can be can be lifted in lifted in polytimepolytime to a HSP on a to a HSP on a f.gf.g. free group . free group FF..

( )1 K F

K G Sϕ

ηη

− →↓ Φ

→ →

ResultResult 2.2. A solution to the above HSP on A solution to the above HSP on FF can can then be used to create a solution to the HSP on then be used to create a solution to the HSP on GGby applying the by applying the ReidemeisterReidemeister--SchreierSchreier theoremtheorem. . This is done in This is done in polytimepolytime..

ConclusionConclusion.. We need only consider the We need only consider the nonnon--abelianabelian HSP on HSP on f.gf.g. free groups.. free groups.

We have also shown that the best way We have also shown that the best way to lift an hidden subgroup algorithm is to to lift an hidden subgroup algorithm is to use a use a 22--sided sided SchreierSchreier TransversalTransversal..

NonNon--abelianabelian Hidden Subgroup Problem (HSP)Hidden Subgroup Problem (HSP)

Hence, we consider the HSG problems of the formHence, we consider the HSG problems of the form

( )0 1, , nF x x S

Qι ν

−= →↑↓

…ϕ

°ϕ ϕ ι= o

Approx.Approx.GroupGroup

22--sidedsidedSchreierSchreier

TransversalTransversal

AmbientAmbientFree GroupFree Group

ApproxApproxMapMap

TargetTargetSetSet

What is a What is a SchreierSchreier Transversal?Transversal?

•• Free GroupFree Group( )0 1, , :nF x x −= =…•• Examples of words inExamples of words in F

1 1 1 1 1 1 1 12 1 1 1 5 5 5 5 2 1 5 5x x x x x x x x x x x x− − − − − − − −=

WordWord Reduced Reduced WordWord

•• Typical wordTypical word

where where 1 2 kw a a a= L

1

jj ka x j±= ∀

1Ki ''w K'w K

TransversalsTransversals Given a group and a normal subgroup ,Given a group and a normal subgroup ,we can construct a new group , called the quotient of we can construct a new group , called the quotient of

F °K°/F K

( )0 1 1, , , nF F x x x−= …°K °'w K °''w K

5 7/ , ,G K K g K g K=

ι

TransversalTransversal

11 ww’’ ww’’’’

Page 28: Quantum Algorithms Beyond

28

What is a What is a SchreierSchreier Transversal?Transversal?

A A 22--sided sided SchreierSchreier transversaltransversal for infor inis a transversal is a transversal

such that such that

°K F°: /F K Fι →° °( )wK wK wι =a

1)1) is a reduced word is a reduced word °( ) 1 2 kw K w a a aι = = L2) The word formed by removing2) The word formed by removing

the the rightmostrightmost symbol is a symbol is a cosetcoset representative.representative.1 2 1R tw a a a −= L

ta3) The word formed by removing3) The word formed by removing

the the leftmostleftmost symbol is a symbol is a cosetcoset representative.representative.2 1L t tw a a a−= L

1a

•• Free GroupFree Group

•• subgroup of subgroup of

( )0 1, , nF F x x −= …F°K

The EndThe End

Quantum Computation:Quantum Computation: A Grand Mathematical Challenge A Grand Mathematical Challenge for the Twentyfor the Twenty--First Century and the Millennium,First Century and the Millennium,Samuel J. Lomonaco, Jr.Samuel J. Lomonaco, Jr. (editor),(editor), AMS PSAPM/58, AMS PSAPM/58, (2002). (2002).

Quantum Computation and InformationQuantum Computation and Information,, Samuel J. Samuel J. Lomonaco, Jr. and Howard E. BrandtLomonaco, Jr. and Howard E. Brandt (editors),(editors), AMS AMS CONM/305, (2002). CONM/305, (2002).