-
Notifications
You must be signed in to change notification settings - Fork 0
/
Copy pathqinfo.tex
1529 lines (1254 loc) · 125 KB
/
qinfo.tex
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
669
670
671
672
673
674
675
676
677
678
679
680
681
682
683
684
685
686
687
688
689
690
691
692
693
694
695
696
697
698
699
700
701
702
703
704
705
706
707
708
709
710
711
712
713
714
715
716
717
718
719
720
721
722
723
724
725
726
727
728
729
730
731
732
733
734
735
736
737
738
739
740
741
742
743
744
745
746
747
748
749
750
751
752
753
754
755
756
757
758
759
760
761
762
763
764
765
766
767
768
769
770
771
772
773
774
775
776
777
778
779
780
781
782
783
784
785
786
787
788
789
790
791
792
793
794
795
796
797
798
799
800
801
802
803
804
805
806
807
808
809
810
811
812
813
814
815
816
817
818
819
820
821
822
823
824
825
826
827
828
829
830
831
832
833
834
835
836
837
838
839
840
841
842
843
844
845
846
847
848
849
850
851
852
853
854
855
856
857
858
859
860
861
862
863
864
865
866
867
868
869
870
871
872
873
874
875
876
877
878
879
880
881
882
883
884
885
886
887
888
889
890
891
892
893
894
895
896
897
898
899
900
901
902
903
904
905
906
907
908
909
910
911
912
913
914
915
916
917
918
919
920
921
922
923
924
925
926
927
928
929
930
931
932
933
934
935
936
937
938
939
940
941
942
943
944
945
946
947
948
949
950
951
952
953
954
955
956
957
958
959
960
961
962
963
964
965
966
967
968
969
970
971
972
973
974
975
976
977
978
979
980
981
982
983
984
985
986
987
988
989
990
991
992
993
994
995
996
997
998
999
1000
\documentclass[oneside, letter, 12pt]{book}
\input{lib/packages}
\input{lib/commands}
% Content Starts Here
%\include{author}
\begin{document}
\include{cover_page}
% The asterisk excludes the chapter from the table of contents.
\addcontentsline{toc}{chapter}{Preface}
\chapter*{Preface}
Quantum computing and communication are hot topics. Software development kits (SDKs) including IBM Qiskit and Google Cirq have been made available to software engineers. But they are useless if engineers, including programmers, are not trained in quantum algorithms and protocols, which have been described as mysterious and incomprehensible. Can engineers be taught algorithms and protocols without studying quantum physics? After all, the Nobel Prize-winning physicist and one of the best educators, Richard Feynman, says 'I think I can safely say that nobody really understands quantum mechanics.'
This book says "Yes!" The only concept that one needs to learn about quantum physics is that all waves can be separated into discrete units that cannot be divided further. Beyond this concept, the rest of all quantum physics courses are about solving Schrödinger or Dirac equations for electron waves. Engineers do not need it. Everyone is already familiar with waves, especially from our daily use of Wi-Fi, cellular, cable, and optical fiber communications which use electromagnetic waves. Communication engineers can even design communication systems that include protocols without learning how to solve wave equations.
That is because communication scientists and engineers have developed a great wealth of knowledge starting from Shannon's information theory to modulation and multiplexing theory. Computer science has developed a great bundle of algorithms on how information can be efficiently processed. Physics, on the other hand, has studied the opposite of information, entropy or noise, in depth. That is why fancy terms such as entanglement are so incomprehensible. Quantum information is better studied on top of the knowledge developed by engineers. In this book, engineers should be able to invent new algorithms and protocols without physicists.
% Three-level Table of Contents
\setcounter{tocdepth}{3}
\tableofcontents
\mainmatter
\chapter{Introduction}\label{c-intro}
We are in the era of information explosion. The explosively growing AI technology depends on learning enormous amounts of information. It also produces information. The computing power in the whole world is not enough. All the GPU chips have been sold out. Nvidia's stocks are rocking higher and higher. Technologists and venture capitalists hope that quantum-processing units (QPUs), which have higher computing power than GPUs, can come to the rescue. It is anticipated that we will enter the era of quantum computing in 2030.
The hardware technologies of quantum computing are advancing fast. But what about the software? Where are the software engineers who can program QPUs? One may ask. The sad reality is that we have a great shortage. Quantum information is a hard subject and is only taught as a graduate course in some universities. This book takes a new approach and aims to teach this subject to undergraduate information engineering students, including computer science students. The goal is for them to understand how quantum computing algorithms and communication protocols work so that they can implement the algorithms and protocols as software programs. In our hope, better students may even go on designing their algorithms and protocols.
Quantum information is the subject about using quantum waves to carry, transmit, and process information. A quantum bquantum quantum wave is a qubit. physics seems to be a hard subject. Quantum phenomena mystery, puzzles, and paradoxes about. How can a Schrodinger cat be both dead and alive at the same time? How can a photon be a wave and a particle at the same time? A student has to wade through the confusing verbal descriptions and get to the math of quantum physics to understand the subject. This book takes a different approach. To cut through the particle-wave duality confusion, it describes a photon as a wave with one unit of energy. Based on established information theory and communication theory, the book focuses on teaching the 1-1 relation between information and wave parameters.
\section{Information technology}
\subsection{What is information}
What is information? It seems to be difficult to come up with a definition. We all know it when we see it because we use it every day. Usefulness must be one of its essential characteristics.
When we are in a doctor's office to have our blood pressure measured, for example, the nurse reads out a number in millimeters. Why is our vital information presented in millimeters? That is because, not very long ago, the height of the mercury in a glass column was used as the indicator of blood pressure. This fact suggests that information\index{information} can be represented as numbers and carried or displayed as values of some physical parameters such as the height of a mercury column.
Not all information is represented as numbers, some is spoken, and some is written. But for information technology, information equates to useful numbers. That is the definition through out the book.
\subsection{The three levels of information technology}
Shannon (Claude Shannon, 1916-2001) was born into an ordinary family in Michigan, USA. Most of his contributions resulted from his communication theory research at Bell Labs. Among these, information theory serves as the theoretical foundation for all information technologies, far surpassing its applications in communication. Shannon is rightfully called the father of information theory, and no one else deserves this title.
Communication theory divides the process of information processing and transmission into the following steps:
Encoding -> Modulation -> Transmission -> Demodulation -> Decoding.
Encoding converts information in whatever original format to numbers, which are called symbols or codes. Decoding reverses the process. Modulation is to map symbols to electromagnetic wave parameters, and the wave is transmitted to the remote receiver. The receiver measures the wave parameters and maps them back to symbols. That completes the demodulation process.
We see that information technology can be viewed from three levels as shown in Fig. \ref{3levels}
\begin{figure}\label{3levels}
\begin{flushleft}
\begin{tikzpicture}[
info/.style={rounded rectangle, draw=black, minimum size=30, align=center},
symbol/.style={chamfered rectangle, draw=black, very thick, minimum size=40, align=center},
carrier/.style={rounded corners, draw=black, very thick, minimum size=60, align=center},
]
% Define a grid using coordinates
\coordinate (grid1) at (0,0); % Top-left
\coordinate (grid2) at (5,0); % Top-center
\coordinate (grid3) at (10,0); % Top-right
\coordinate (grid4) at (0,-3); % Middle-left
\coordinate (grid5) at (5,-3); % Middle-center
\coordinate (grid6) at (10,-3); % Middle-right
\coordinate (grid7) at (0,-7); % Bottom-left
\coordinate (grid8) at (5,-7); % Bottom-center
\coordinate (grid9) at (10,-7); % Bottom-right
% Nodes at grid points
\node[info] (in) at (grid1) {Input\\information};
\node[info] (proc) at (grid2) {Information\\processing};
\node[info] (out) at (grid3) {Output\\information};
\node[symbol] (sym_in) at (grid4) {Input\\numbers};
\node[symbol] (sym_proc) at (grid5) {Algorithms and\\software code};
\node[symbol] (sym_out) at (grid6) {Output\\numbers};
\node[carrier] (qubit) at (grid7) {Carrier wave\\parameters};
\node[carrier] (gate) at (grid8) {Unitary\\transformation};
\node[carrier] (qubit_out) at (grid9) {Carrier wave\\parameters};
% Draw levels
\draw (in.west) node[text width=80, align=center, anchor=east] {Information\\level};
\draw (sym_in.west) node[text width=80, align=center, anchor=east] {Number-symbol\\level};
\draw (qubit.west) node[text width=80, align=center, anchor=east] {Carrier\\level};
% Draw connecting arrows
\draw[->, thick] (in) to (proc);
\draw[->, thick] (proc) to (out);
\draw[->, very thick] (in) to node[left, color=blue] {encoding} (sym_in);
\draw[->, thick] (sym_in) to (sym_proc);
\draw[->, thick] (sym_proc) to (sym_out);
\draw[->, thick] (proc) to node[right, align=left] {design\\programming} (sym_proc);
\draw[->, thick] (sym_out) to node[left, color=blue] {decoding} (out);
\draw[->, very thick] (sym_in) to node[left, color=blue] {modulation} (qubit);
\draw[->, thick] (qubit) to (gate);
\draw[->, thick] (gate) to (qubit_out);
\draw[->, thick] (sym_proc) to node[right] {execute} (gate);
\draw[->, thick] (qubit_out) to node[left, color=blue] {demodulation} (sym_out);
\end{tikzpicture}
\end{flushleft}
\caption{Information technology can be viewed on three level. The terms with blue font are standard communication terms.}
\end{figure}
Shannon discovered the relation between the abstract information and numbers on the number-symbol level. Communication theory calls useful numbers symbols, which may have different meanings in other fields. We will call it the number-symbol level to avoid confusion. At this level, Turing invented the hypothetical Turing machine to study and test algorithms. An algorithm is valid only when it can be run and tested on a Turing machine.
With Shannon's discovery, studies of information technology, including the study of quantum information technology, can concentrate on the number-symbol and the carrier levels without consideration at the abstract information level.
Relating numbers or symbols to carrier wave parameters is one of the focuses of communication theory called modulation. It is also the focus of quantum information. Demodulation is the reverse of modulation in communication systems. However, it is not the case with quantum systems. Read out from qubits encounters a bottleneck imposed by the fact that each qubit has one unit of energy for measurement.
\subsection{Measuring information}
The most important usage of Shannon's encoding theory is to design compression coding. JPEG, and MPEG encoding technologies have been invented for the storage and transmission of photo and video information using minimal numbers of bits or bytes. To measure the amount of information in a series of symbols or numbers, Shannon entropy takes into account the probability of each symbol or number being used. It is the yardstick of how compact a compression encoding can be.
The focus of this book is on the number-symbol and carrier levels. We assume all numbers on the number-symbol level are equally useful. And therefore, we equate the amount of information to the number of symbols or codes.
\subsection{Errors}
The height of the mercury column in a blood pressure meter is a real number. Apparently, not the entire range of real numbers is useful. Even within the useful range of 0-300mm, a read-out number may be tainted with errors. If we see the mercury column height is 120.5mm, is it accurate? The tilt of the column may produce what's called systematic error. Environmental factors like table vibrations may introduce random errors. Even 120.5mm is accurate, is it more useful to us than 121mm? If not, we may just take it easy and use only integer readings. Using only integers to represent information is called digital information. Using real numbers is called analog information.
AM and FM radios are probably the only analog communication we still use today. When listening to them, once in a while we hear noise, which is random errors. Therefore, random errors are also called noise in communication. Random errors cannot be corrected. Modern communication technologies all use digital information to avoid systematic errors and get around random errors.
In quantum technologies, the numbers carried by qubits are real numbers -- analog technology. But reading out from the qubits to conventional devices is an analog-digital conversion process, and quantization errors, which is a type of systematic error, may appear. Such quantization errors are rooted in quantum measurement and cannot be improved by equipment improvement. How to get around this fundamental limitation of qubit readout is the focal subject of quantum information.
\section{The quantum theory}
Quantum physics tells us that any wave has its lowest unit -- a quantum\index{quantum} -- when measured by its energy or mass. Plank was the first to toy with the idea. But Einstein was the first to hypothesize this nature of light and called the smallest unit light quantum. Before that, scientists had assumed the energy of light could be dimmed as low as one wishes. What Einstein called a light quantum is today called a photon by physicists. The nature of having the smallest unit is often called the particle nature of matter by physicists nowadays, although calling it the quantum nature is the most accurate.
Einstein's discovery might have something to do with his prior discovery, which equates mass with energy. Until then, all matter was believed to have mass and be composed of elementary particles such as electrons and nuclei. Einstein's revelation that light is also matter may be the precursor of the second revelation of quantum physics: all matter is fundamentally waves.
Bohr was the first to hypothesize electrons being waves. From Einstein and Bohr's hypothesis, the complete theory of quantum physics can be summarized by the particle and wave dual nature of matter:
- all matter is waves and
- each wave's energy or mass is an integer number of its smallest unit.
These two concepts are the essence of quantum physics.
Quantum physics has been successfully applied to the invention and advancement of many modern technologies, including lasers and semiconductors. However, lasers and semiconductor devices involve million to quadrillion photons or electrons. Even the tiniest transistor device in a modern semiconductor chip comprises at least thousands of electrons. However, the advance of making smaller and smaller transistors has gotten us close to the level of working with light or electrons at the individual quantum level.
The idea of using waves at the quantum level is not new. The publication of Deutsch's algorithm\index{Deutsch's algorithm}\cite{1985Deutsch} in 1985 did not garner much attention. But the publication of Shor's algorithm\index{Shor's algorithm} in 1997, which may be considered an extension of Deutsch's, shocked the world with its potential power of factoring large numbers and consequently breaking modern encryption technologies.
The idea of applying quantum technology to secure communication came in 1984 with the publication of BB84 protocol\cite{1997Shor}. The name BB84 is derived from the authors' names -- Bennett and Brassard. The idea is behind the example in introduced in Section-\ref{Sec-example-wifi} and will be discussed in detail in Section-\ref{S-BB84}.
\subsection{The wave nature}
\begin{figure}[h]\label{String}
%\includegraphics[width=6cm]{pic/wave-in-a-string.png}
\begin{tikzpicture}[line join=round, line cap=round]
% draw coordinate
\draw[->] (-1,0) -- (10,0) node[pos=1.02,below] {$x$};
% \draw[->] (0, -1) -- (0,2);
% Rope properties
\def\length{9} % Length of the rope
\def\thickness{1} % Thickness of the rope
\def\waveAmplitude{2} % Amplitude of the wave
\def\waveLength{3} % Wavelength
\def\segments{50} % Number of segments
% Draw the rope
\draw[decorate, decoration={waves, segment length=2.5}, line width=\thickness, red]
(0,0) -- plot[domain=0:\length, samples=\segments]
(\x, {\waveAmplitude*sin(\x*(360/\waveLength))}) -- (\length,0);
% label
%\draw[red, fill] (3.75,2) circle(0.05cm);
%\draw[red, fill] (6.75,2) circle(0.05cm);
%\draw[dashed] (2,2) -- (3.75,2);
\draw[<->|, dashed] (2.7,0) -- (2.7,2) node[pos=0.5, rotate = 90, above] {amplitude};
\draw[|<->|, dashed] (3.75,2.3) -- (6.75,2.3) node[pos=0.5, above] {wavelength - $\lambda$};
\end{tikzpicture}
\caption{Wave arose from shaking or vibrating a string.}
\end{figure}
When talking about waves, we often visualize ripples in a lake or the surges in oceans and seas. We observe water being pushed up and then pulled down by gravity. If we shake one end of a string, as shown in Fig. \ref{String}, we can observe that each section of the string vibrates, and the vibration propagates from close to far. Vibration\index{vibration} in time and propagation\index{propagation} in space are the fundamental features of all waves. We can use frequency to characterize the vibration speed of a wave and amplitude or intensity to characterize the strength. But can we consider the vibration of a guitar string as a wave? Indeed, we can. The reason why we do not perceive propagation is that the propagation gets reflected back and forth by the two fixed ends of the string. Therefore, propagation remains a defining feature of waves, even if their propagation is constrained in spatial dimensions.
Quantum computing and communication use only electromagnetic waves and electron waves. Electromagnetic waves are the vibration of electric and magnetic fields. We are already familiar with radio waves and light waves used in Wi-Fi, cellular, cable, and optical fiber communications, as they are part of our daily lives. The reason that we do not see the quantum nature of these waves is that their energy is typically quadrillions of a photon, and we only see the average effect. Getting down to the energy level of single photons, the wave parameters such as amplitude\index{amplitude}, phase\index{phase}, frequency\index{frequency}, etc, used in these technologies to represent or carry information may also be used in quantum computing and communication.
The wave nature of electrons is not obvious because they are trapped to small scales by atomic nuclei. J.J. Thomson discovered how they can be freed from the traps\cite{THOMSON} in a cathode ray tube (CRT). Freed electrons spread to an observable scale and demonstrate all the wave characteristics that physicists had associated with light waves. However, the vibration of an electron wave is not visible like that of a vibrating string or directly measurable like an electromagnetic wave. Physicists do find sufficient evidence of the vibration and have discovered it obeys the Schrödinger wave equation (Dirac equation if Einstein's special relativity is taken into account).
\subsection{Wave parameters}
In Fig. \ref{String}, the height of the rope at any location $x$ along its propagation direction and time $t$ may be described by a wave function $h(x,t)$. The simplest wave function is a sinusoidal function,
\begin{equation}\label{e-hWave}
h(x,t) = A sin[2\pi (\frac x \lambda - \frac t T) +\phi]
\end{equation}
where $A$ and $\lambda$ are, respectively, the amplitude and the wavelength, as shown in Fig. \ref{String}. $T$ and $\phi$ are the period\index{period} and phase\index{phase}. Shown but not labeled in Fig. \ref{String} is the polarization\index{polarization}, which refers the direction of the vibration. The example shown in the figure shows a polarization in the $y$ direction, but it can be in any direction as long as it is perpendicular to the propagation direction. Fig. \ref{Wave} plots the height of the string vibration in the time dimension and is characterized by period\index{period} and phase\index{phase}. All these parameters -- phase, wavelength\index{wavelength}, amplitude\index{amplitude}, period\index{period} and polarization\index{polarization} -- can be used to represent information. Worth noting, that period, wavelength, and frequency are proportional or inversely proportional to each other. Using one is the same as using the others.
\begin{figure}[h]\label{Wave}
\begin{tikzpicture}[scale=1.2]
\draw[->] (-3.8,0) -- (3.9, 0) node[pos=1.02,below] {$t$};
\draw[->] (0,-3.5) -- (0,3.5);
\draw[dotted, red] (-3.5,0) sin (-2.5,3) cos (-1.5,0) sin (-0.5,-3) cos (0.5,0) sin (1.5,3) cos (2.5,0) sin (3.5,-3);
\draw[red, fill] (-2.5,3) circle(0.05cm);
\draw[red, fill] (1.5,3) circle(0.05cm);
\draw[dashed] (-2.5,0) -- (-2.5,3) node[pos=0.5, rotate = 90, above] {amplitude};
\draw[dashed] (-2.5,3) -- (1.5,3) node[pos=0.3, above] {period - $T$};
\draw[red, fill] (0.5,0) circle(0.05cm);
\draw[dashed] (0.25,-0.1) -- (1,-2) node[below] {phase};
\end{tikzpicture}
\caption{Height of the string vibration in the time domain.}
\end{figure}
\subsection{The particle nature}
Electrons are called particles for historical reasons. When they are trapped to the small scale of nuclei, they fit the image of point-like particles with negligible sizes and observable locations. This image is certainly wrong if they are freed from the trapping like what J.J. Thomson did in a cathode ray tube. The word "photon" may also carry the annotation of being small in size. The size of a light wave is totally an independent parameter of its energy. The particle nature of matter should be called the quantum nature of matter to avoid misunderstanding. When possible, we shall call a photon a light quantum through the book as Einstein first proposed.
For quantum computing and communication, qubits\index{qubit} -- waves with one quantum of energy or mass in each -- are used to carry information. Appendix-\ref{A-qubit} describes several types of qubits including how they are separated and which wave parameters they use to carry information. The superconductor type is constructed by two superconductors with a thin layer of insulator sandwiched in between. It is not based on any of the fundamental particles, e.g. photons, electrons, and quarks. Physicists have found the energy of the electrons vibrating from one superconductor to another has discrete values. Physicists call such a vibrating wave a pseudo particle. Qubits are easier to make from pseudo particles. But for simplicity, the rest of the book assumes qubits use light or electromagnetic waves.
\section{Why quantum}
\subsection{The advantages of analog and digital technologies}
Information technologies have now mostly converted from analog to digital. Not long ago, we used blood pressure meters with columns of mercury. Probably some of us still listen to the AM and FM radios in cars. Analog technologies seem to be something old waiting to die out. The truth is that analog technologies have the advantage of carrying more information. We choose digital technologies only to rid of noise.
Analog technologies represent information as real numbers while digital ones as integers. That is the fundamental difference between the two types of technologies. In the digital world, a real number is rounded off and represented as two integers, the significant and the exponent. The round-off portion is information all lost during the analog-to-digital conversion. The real number $\pi$ may represented in a computer as the integer pair $(31415926, -7)$, which means $31415926*10^{-7}$. The rest $0.5358979...*10^{-7}$ is all lost.
The smallest information-carrying device of a digital computer is a bit, constructed by a pair of transistors. The device's voltage is used to represent information. Two voltage values are used to represent the binary numbers 0 and 1, which are also called a bit number. We could have added more voltage values between the chosen two to increase the numbers being represented. We even could have used all the values, the real numbers, between the chosen two and increased the amount of information represented to infinity -- the case of analog technology. But noise would have obscured the added values and made them useless. Digital technologies gain the advantage of accuracy by sacrificing the amount of information carried and processed.
Can we take advantage of the information-carrying capacity of analog technologies while avoid the noise problem? Physics tells us that noise is random energy bursts, thermal energy, in particular. But voltage is the potential energy of charged particles and is prone to noise. We should not use any parameter related to energy to represent information. Physics says, waves such as electromagnetic waves have many parameters such as phase and polarization, which are not related to energy.
Yes, that is the idea behind quantum computing:
- separate a wave into discrete elementary waves
- use two real-number parameters of each wave to carry information
- process or manipulate the parameters of all the elementary waves simultaneously to achieve parallel processing.
Why waves and not transistors? Noise! Just about all noise on earth for electronic and optical devices is of some form of thermal energy. If no energy exchange, noise is minimized. Altering a light wave's polarization angle is like changing the direction of a bowling ball's momentum and requires no energy injection. In physicists' words, the transformation of such parameters is unitary. Changing the direction of a bowling ball is a unitary transformation. Changing its speed is not and requires energy exchange.
Another good news is from quantum physics, which says that the energy (or mass) of each of the elementary waves is a fixed value -- a quantum. Adding energy to a wave means adding another elementary wave to it, and the energy increase must be exactly the value of a quantum. This is the so-called quantum nature of waves. It has added the phrase "quantum leap" into our everyday language.
To engineers, the energy parameter of a wave is an integer number and may carry only digital information. Each of the elementary waves that we use to carry analog information is called a quantum bit or qubit for short. The quantum nature determines that qubits are relatively immune to noise because noise injection requires a quantum leap. However, it also sets the limit of qubit readout. It requires energy exchange or transfer to an electronic readout device and is an analog-to-digital data conversion mechanism. Only a binary bit information can be read out from a qubit. This may be why "bit" is in the name of qubit.
The readout limitation narrows the scope that quantum computing has the advantage. But for communication, it can be an advantage for security. The following example shows how.
\subsection{The Wi-Fi security problems}\label{Sec-example-wifi}
Electromagnetic waves are used in almost all our communication systems. We see them as light if the wave frequency is in the visible range. The ones used for optical fiber communications are just below the visible frequency range, but we still call them light. The ones used for cable, cellular, and Wi-Fi communications are in the radio frequency range. They are certainly invisible to our naked eyes. But everyone uses them every day and is familiar with them.
Many parameters of electromagnetic waves can be used to carry information. Their parallel exploration ability is another advantage. Before the age of Wi-Fi and cellular communication, we have to find where the network connectors are in the walls to plug in our computers. With Wi-Fi, or computer finds the Wi-Fi router by receiving the radio wave sent in all directions. The radio wave explores all directions in parallel to reach the computer. The broadcasting feature of the communication is a bane, however, for security: the message sent from the Wi-Fi router to my cell phone can be received by an eavesdropping device outside the home. It was once a big concern about using Wi-Fi until encryption was added to the link layer, in the Open System Interconnection (OSI) 7-layer jargon, of the Wi-Fi protocols. Still, the solution has its limit. It would be desirable to have a physical layer solution to fend off eavesdropping.
One naive thinking is to reduce the power of the wave from the router so that only my cell phone can receive the message. But what if the eavesdropper's device is extremely sensitive and can receive the wave at any power level? Indeed, the eavesdropper can still receive the wave until the router lowers the power to contain only a quantum of energy. At this point, the eavesdropper has to capture the entire wave or nothing at all. The wave cannot be split for partial reception. But if the eavesdropper captures the entire wave, I am alerted of the absence of the wave and would suspect the presence of an eavesdropper. This is one of the ideas behind quantum communication and solves the eavesdropping problem halfway. But continuing with the quantum nature of waves, we can add encryption to the solution, for which we will leave the details to Section-\ref{S-BB84}.
\begin{figure}[h]\label{Room-WiFi}
\begin{tikzpicture}
\draw[green, very thick] (0,0) rectangle (8,5);
\draw (1,3) node(router) [rectangle, draw] {router};
\draw (6,3) node(phone) [rectangle, draw] {phone};
\draw (5,1) node(computer) [rectangle, draw] {computer};
\draw (10,2) node(eavesdropper) [rectangle, draw] {eavesdropper};
\end{tikzpicture}
\caption{Wi-Fi}
\end{figure}
\section{Application of quantum information}
We are in an information explosion world. In recent years, the rise of AI has further fueled the creation of even more information. ChatGPT’s responses have become quite powerful, yet no one is satisfied — we all expect even more advanced AI. However, the computational power of current computer chips is not sufficient. Major AI companies have already bought out the most powerful GPU chips, driving Nvidia’s stock higher every day. Even with the most powerful GPUs today, training a large language model can take months or even up to a year. So, is there anything more powerful than GPUs? The answer is QPUs—quantum processing units or quantum computers!
Quantum computing is the number one application of quantum information theory. Quantum communication is the second. It has the potential to make encryption key distribution more secure than existing technologies. However, many scientists doubt its importance when comparing the security improvement comparing over the cost.
As a third application, quantum information may be the foundation of studying future-generation devices for integrated circuits. Current chips of integrated circuits are built by transistors as the fundamental devices, whose sizes are now in the nanometers and have met their limits. Any smaller devices may not rely on accumulative physical parameters such as current or voltage to carry information and may need to use individual quantum waves to carry information.
\section{Constructing a quantum computer}
The core of a quantum computer may use quantum waves to store and process information. However, other components of the computer still uses conventional computer hardware and software. We interact with the computer just like with any other computer. We can even use most of the general-purpose programming languages such as Python to program the quantum computer. Only the portion of a program that needs the power of quantum computing invokes a quantum circuit.
As an example, the Python code below implements Deutsch's algorithm described in Section-\ref{S-Deutsch}.
\begin{lstlisting}
from qiskit import QuantumCircuit, Aer, execute
# Define the quantum circuit with 1 qubit and 0 classical bit
qc = QuantumCircuit(1, 0)
# Apply quantum gates to the qubit
qc.h(0)
qc.x(0)
qc.h(0)
# Measure the qubit and output a 0-or-1 answer
qc.measure([0, 1])
# Draw the circuit
print(qc.draw())
\end{lstlisting}
The code starts by importing the class "QuantumCircuit" from package "qiskit" provided by IBM before applying quantum gates to it. The "measure" gate reads out the computation result from the qubit.
In the standard von Neumann computer architecture, a register\index{register} is an information memory device; and a gate is an information processing device. A processing unit\index{processing unit} is a circuit comprised of two types of devices. A quantum processing unit also adheres to this von Neumann architecture. Fig. \ref{Circuit} is a quantum circuit diagram\index{quantum circuit diagram} invoked by the above program. Each line in the diagram is a quantum register -- a qubit. Information is represented in analog form. "H" and "CX" gates are drawn as rectangular boxes in the diagram. The gates, applied from left to right according to the sequence in the diagram, transform the wave parameters in the qubits they connect to and thus process the information represented. A double-line is a conventional register -- a bit. The "Measure" gate reads the parameters of the wave in a qubit and outputs the result in digital form to a conventional memory depicted as a double line.
Despite being in Python, a high-level language, the code still calls on registers and gates like code in an assembly language, which programmers worked with 50 years ago. To program, we need the circuit diagram. To design the circuit, we need the protocol or algorithm. This book starts with how information is stored and processed by quantum devices before describing the most popular algorithms and protocols, and their circuit diagrams.
\begin{figure}\label{Circuit}
\centering
\begin{quantikz}%[slice all, slice style={shorten <=8mm}, slice label style = {yshift=-38mm} ]
\lstick{qubit 0} & \gate{H} & \gate[2]{CX} & \meter{} & \cw \rstick{Output bit 0}\\
\lstick{qubit 1} & \qw & & \meter{} & \cw \rstick{Output bit 0}
\end{quantikz}
\caption{Quantum circuit}
\end{figure}
\chapter{Using waves to carry information}\label{c-modulation}
Computers use digital technologies at the very beginning of their invention. The ideas and theory behind slide rules, and calculators of analog form, are mostly lost in history. Communication systems, on the other hand, have gone through a long period of using analog technologies to mostly digital technologies today. Communication theory is well-developed in the study of information in both analog and digital forms. Further, modern communication systems use electromagnetic waves exclusively as information-carrying media. The wealth of knowledge accumulated in communication theory is most apt for the study of quantum computing and communication. The only addition needed is on the qubit readout mechanism, which will be discussed in the next chapter. This chapter reviews some of the key subjects in communication theory.
\section{Information, numbers and symbols}
In communication theory, the information-representing numbers are called symbols\index{symbol}. To transmit information, the numbers or symbols are mapped to carefully chosen parameters of electromagnetic waves. The information-carrying waves are called carrier waves or simply carriers\index{carrier}. Mapping information to numbers is called encoding\index{encoding}, and assigning numbers to wave parameters is called modulation\index{modulation}. The terms in the flow can be shown by this diagram.
\begin{tikzpicture}
\node[draw, rectangle, text width=50, minimum height=10] (b1) at (0, 0) {information};
\node[draw, rectangle, align=center, text width=40, minimum height=10] (b2) at (3, 0) {numbers, symbols};
\node[draw, rectangle, align=center, text width=50, minimum height=10] (b3) at (6, 0) {wave parameters};
\node[draw, rectangle, align=center, text width=50, minimum height=10] (b4) at (9.5, 0) {wave parameters};
\node[draw, rectangle, align=center, text width=40, minimum height=10] (b5) at (12.4, 0) {numbers, symbols};
\node[draw, rectangle, text width=50, minimum height=10] (b6) at (15.3, 0) {information};
\draw[->] (b1) -- (b2) node[midway, above, yshift=20] {encode};
\draw[->] (b2) -- (b3) node[midway, above, yshift=20] {modulate};
\draw[->] (b3) -- (b4) node[midway, above, align=center, text width=50, yshift=15] {transform, transmit};
\draw[->] (b4) -- (b5) node[midway, above, yshift=20] {demodulate};
\draw[->] (b5) -- (b6) node[midway, above, yshift=20] {decode};
\end{tikzpicture}
The wave parameters to be assigned need to be carefully chosen to avoid noise and errors while maximizing the number of possible parameter points. More modulation points allow more information transmitted and yield higher communication capacity. With the never-ending demand for increasing capacity, pursuing better and better modulation techniques is a never-ending field of study.
Radio broadcasts first used the amplitude of radio waves to represent the volume of one's voice. This is the so-called amplitude modulation (AM). The amplitude is the maximum of the vibrating electric field instead of the maximum height of the vibrating string shown in Fig. \ref{String}. Frequency modulation (FM) was later found less prone to noise than AM in the airways. To this day, we still have both AM and FM on the panels of our radios.
Modern radio communications, Wi-Fi, and cellular, mostly use quadrature amplitude modulation (QAM). Using two parameters, amplitude, and phase, allows QAM to carry more information than either AM or phase modulation (PM) alone can. Qubits may use any of the modulation schemes except amplitude modulation because each qubit has only one quantum of energy and its amplitude is not a variable.
\section{Phase modulation}
The phase of a wave reflects its relative time delay in propagation. Changing the phase value can be achieved by adding or subtracting the propagation path of the wave. Usually noted by $\phi$, phase can take up any real number in the range $[0, 2 \pi)$. Using it as real numbers to represent information is an analog modulation. Using selected values to represent information is a digital modulation. All qubits include phase modulation, which is always combined with polarization modulation (or equivalent) to carry information.
\subsection{Graphical depiction and mathematical notation}
In communication textbooks, amplitudes and phases of waves are paired as polar coordinates to plot the modulation points. Such a plot is called a constellation diagram. It gives us the most intuitive understanding of modulations. In phase modulation, the amplitude $A$ is a constant. The modulation points all fall on the circle of radius $A$ as shown in red in Fig. \ref{PM}.
\begin{figure}[h]\label{PM}
\begin{tikzpicture}
\draw[->] (-3.5,0) -- (3.5, 0);
\draw[->] (0,-3.5) -- (0,3.5);
\draw[dotted, red] (0,0) circle(3cm);
\draw[red, fill] (30:3) circle(0.05cm);
\draw[dashed] (1,0) arc (0:30:1) node[right, pos=0.6]{$\varphi$ - phase};
\draw[dashed] (30:0.1) -- (30:2.9) node[pos=0.5, rotate = 30, above] {amplitude};
\end{tikzpicture}
\caption{Phase modulation constellation diagram}
\end{figure}
The polar coordinate $(A, \phi)$ can also be written in Cartesian coordinates as $(A cos\phi, A sin\phi)$ or as a complex number $A e^{i\phi}$. The polar coordinate notation is easier for geographic understanding. The latter two notations are most useful for mathematical derivation.
From the constellation diagram and the Cartesian notation, we see that any modulation point can be regarded as a 2-dimensional vector, which can be decomposed into two vectors, one in the horizontal direction, and the other in the vertical direction. A wave with zero degrees of phase is a vector in the horizontal direction and is called a quadrature wave\index{quadrature wave} by communication engineers. One with $90^\circ$ of phase is a vector in the vertical direction and is called an in-phase wave\index{in-phase wave}.
In practice, any wave can be split into two waves, one in-phase, and the other quadrature whose amplitudes can be determined by the vector decomposition. And, any in-phase wave and quadrature wave can be combined into one whose amplitude and phase can be determined by vector addition of the component waves. or decomposition. Combining two or more waves is called superposition\index{superposition}, a term used by both engineers and physicists. The in-phase and quadrature waves are the vector basis of all waves when represented as vectors in the constellation diagram. We may call them the basis waves.
Worth noting, the selection of the waves with phases of zero and 90 degrees is arbitrary. A wave can be split into any pair of waves whose phases are $90^\circ$ apart. Mathematically, such a pair of waves forms the orthogonal basis of a Hilbert space. To engineers, the advantage of using two orthogonal waves is that they have zero overlap with each other and are maximally distinguishable during demodulation or information readout. This feature will be shown in depth in Section-\ref{Sec-demodulator}.
subsection{Digital modulation}
In the real world, each element in the communication channels and information processing devices can have noise and errors. We must select the modulation points sufficiently apart so that they are not obscured by noise and errors. Therefore, we can only use a finite number of modulation points to which only some integers can be mapped. Digital modulation gains accuracy while sacrificing information-carrying capacity.
All computers use digital technology if we ignore the history of using the slide rule calculators. Even abacuses are digital calculators. Communication systems, however, are slow to convert to digital technology. That is because, for a long time, communication was about transmitting voice -- radio broadcasts and telephones, for which noise and errors could be tolerated. For digital information, modulations often carry different names, e.g., amplitude-shift keying (ASK), frequency-shift keying (FSK), and phase-shift keying, respectively (PSK).
\subsection{Capacity and Hartley's law}
Into a communication channel, in each time slot, an electromagnetic wave is launched with parameters mapping to a symbol. The amount of information transmitted equals the number of possible symbols. However, analog modulation can represent an infinite number of symbols if not considering noise and errors. Its information-carrying capacity may be measured by the bandwidth of the channel.
Digital modulation can carry a countable amount of information to avoid noise and errors. The channel capacity in a digital communication channel is the maximum possible bits per second that can be transmitted. If there are $M$ modulation points, $M$ possible symbols at most can be transmitted per time slot. That is $ln M$ bits of information. If the communication protocol divides each second into $R$ transmission time slots and transmits one wave in each slot, the channel capacity is
\begin{equation}
C = R ln M.
\end{equation}
This is the so-called Hartley's law. The duration of a wave cannot be shorter than its period. Therefore, $R$ cannot be larger than the frequency of the carrier wave. The frequency is the maximum value of $R$.
\subsection{Quadrature phase-shift keying}
Quadrature phase-shift keying (QPSK) is a digital phase modulation. Its wide use includes several older flavors of Wi-Fi. The later Wi-Fi flavors add more modulation points than the four points in QPSK. QPSK uses modulation points of $\phi being $90 degrees apart from each other. A simple choice is to use $\phi = 0, 90, 180$, and $270$ degrees, which are mapped respectively to 2-bit symbols, 0, 1, 10, and 11 in binary. Fig-\ref{QPSK} is its constellation diagram.
\begin{figure}[h]\label{QPSK}
\begin{tikzpicture}
\draw[->] (-3.5,0) -- (3.5, 0);
\draw[->] (0,-3.5) -- (0,3.5);
\draw[dotted, red] (0,0) circle(3cm);
\draw[red, fill] (3,0) circle(0.05cm) node[below right] {0};
\draw[red, fill] (0,3) circle(0.05cm) node[above right] {1};
\draw[red, fill] (-3,0) circle(0.05cm) node[above left] {10};
\draw[red, fill] (0,-3) circle(0.05cm) node[below left] {11};
\end{tikzpicture}
%\includegraphics[width=6cm]{pic/4qpsk.pdf}
\caption{QPSK constellation diagram}
\end{figure}
The most popular variation of QPSK is the symmetric QPSK modulation, which is most practical because its modulation and demodulation circuits are the simplest. Its constellation diagram is shown in Fig. \ref{sQPSK}. The modulation points are $\phi = 45, 135, 225$ and $315$ degrees.
\begin{figure}[h]\label{sQPSK}
\begin{tikzpicture}
\draw[->] (-3.5,0) -- (3.5, 0);
\draw[->] (0,-3.5) -- (0,3.5);
\draw[dashed] (2.5,2.5) -- (0, 0);
\draw[dotted, red] (0,0) circle(3cm);
\draw[red, fill] (2.12,2.12) circle(0.05cm) node[right] {11};
\draw[red, fill] (-2.12,2.12) circle(0.05cm) node[above] {01};
\draw[red, fill] (2.12,-2.12) circle(0.05cm) node[below] {10};
\draw[red, fill] (-2.12,-2.12) circle(0.05cm) node[left] {00};
\draw[dashed] (1,0) arc (0:45:1) node[right, pos=0.6]{$\varphi=45\circ$};
\end{tikzpicture}
\caption{Symmetric QPSK constellation diagram}
\end{figure}
\subsection{Modulator and demodulator for symmetric QPSK}\label{Sec-demodulator}
A device that sets or alters a wave's parameter to represent information is called a modulator\index{modulator}. A device that reads out the information carried by a wave is called a demodulator\index{demodulator}. Fig. \ref{modulator} is the circuit block diagram of a symmetric QPSK modulator. Each block in the diagram is a chip or device with well-known functions. The single lines represent wave transmission lines. We may imagine it is the modulator in our Wi-Fi router. The wave output on the right feeds into an antenna to go into the air. The double lines are electronic data lines. A stream of data bits, probably from the Internet, comes in from the left as electrical current or voltage pulses.
The modulator can transmit two bits in each time slot: the odd bit modulates the quadrature wave, and the even bit modulates the in-phase wave. In each branch, an input bit of zero shifts the phase of the wave by $180^\circ$ while the bit of "1" causes no phase shift. The combined wave in the output has a phase of $45, 135, 225$ or $315$ degrees.
\begin{figure}[ht]\label{modulator}%modulator1
\begin{tikzpicture}
\path
(-2,-1) node[circle, draw=black] (lo) {$\sim$}
(0,-1) node[circle, draw=black] (splitter) {$\prec$}
(0,1) node[Gate] (p90) {$90^\circ$}
(0,3) node[Gate] (ta) {$180^\circ$}
(0,-3) node[Gate] (ba) {$180^\circ$}
(3,0) node[circle, draw=black] (coupler) {$\succ$}
(4,0) node[text width=60, align=center, anchor=west] (output) {signal wave output};
\path (-2,3) node[text width=50, align=left, anchor=east] (even) {data input - even bits}
(-2,-3) node [text width=50, align=left, anchor=east] (odd) {data input - odd bits};
\draw (lo.north) node[text width=80, align=center, anchor=east] {carrier wave generator};
\draw (splitter.south east) node[text width=40, align=center, anchor=west] {50:50 splitter};
\draw (p90.north west) node[text width=40, align=center, anchor=east] {phase shifter};
\draw (ta.north) node[anchor=south] {controlled phase shifter};
\draw (ba.south) node[anchor=north] {controlled phase shifter};
\draw (coupler.north west) node[text width=40, align=center, anchor=east] {coupler};
\draw (coupler) -- (output);
\draw (ba) -- (splitter) -- (p90) -- (ta) -| (coupler) |- (ba);
\draw (lo) -- (splitter);
\draw[double] (even) -- (ta);
\draw[double] (odd) -- (ba);
\end{tikzpicture}
\caption{QPSK modulator circuit}
\end{figure}
The demodulator circuit is basically a reverse of the modulator as shown in Fig. \ref{Demodulator}. The two outputs of the local wave generator have phases at zero and $90^\circ$. Each is mixed with 50\% of the signal wave to produce resonance. The mix of two waves with agreeing phases resonant positively and produces an electric current in the following detector. Two waves with $180^\circ$ phase difference resonant negatively and produce no current. The presence or absence of the current outputs the symbol "1" or "0."
\begin{figure}[h]\label{Demodulator}
\begin{tikzpicture}[scale=0.8]
\path
(0,-1) node[circle, draw=black] (lo) {$\sim$}
(0,1) node[Gate] (p90) {$90^\circ$}
(0,3) node[circle, draw=black] (ta) {X}
(0,-3) node[circle, draw=black] (ba) {X}
(2,3) node[Gate] (tm) {$\int$}
(2,-3) node[Gate] (bm) {$\int$}
(-3,0) node[circle, draw=black] (split) {$\prec$}
(-4,0) node[text width=60, align=center, anchor=east] (input) {signal wave input};
\path (3.5,3) node[text width=80, align=left, anchor=west] (even) {data output - even bits}
(3.5,-3) node [text width=80, align=left, anchor=west] (odd) {data output - odd bits};
\draw (lo.east) node[text width=80, align=center, anchor=west] {local wave generator};
\draw (p90.east) node[text width=40, align=center, anchor=west] {phase shifter};
\draw (tm.north) node[anchor=south] {detector};
\draw (bm.south) node[anchor=north] {detector};
\draw (ta.north) node[anchor=south] {mixer};
\draw (ba.south) node[anchor=north] {mixer};
\draw (bm) -- (ba) -- (lo) -- (p90) -- (ta) -- (tm);
\draw[double] (even) -- (tm);
\draw[double] (odd) -- (bm);
\draw (ba) -| (split) |- (ta);
\draw (split.south east) node[text width=40, align=center, anchor=west] {50:50 splitter};
\draw (split) -- (input);
\end{tikzpicture}
\caption{Symmetric QPSK demodulator.}
\end{figure}
\section{Polarization modulation}
The polarization of an electromagnetic wave is the direction of vibration of its electric field, which is always in the $x-y$ plane if assuming $z$ is the direction of propagation. If the polarization is consistently in one direction, it is called linear polarization and can be characterized by its angle to the $x$ axis $\theta$. The parameter $\theta$ can be used to represent information.
\subsection{Graphical depiction and mathematical notion}
As with phase modulation, a linearly polarized wave can be represented as a vector in the $x-y$ plane or as a point on a circle in a constellation diagram shown in Fig. \ref{PolarM}. The vector's length reflects the wave's amplitude. It can be represented in polar coordinates as $(A, \theta)$, or in Cartesian coordinates as $(A cos\theta, A sin\theta)$.
As with phase, a linearly polarized wave can be separated into two component waves whose polarizations are orthogonal, e.g. one in the horizontal and the other vertical direction. The selection of the $x$ and $y$ axes can be arbitrary as long as they are orthogonal and perpendicular to the propagation direction. Appendix-\ref{A-qubit} describes briefly how a polarization splitter can separate the component waves. Any textbook on optics can be referenced on this subject in detail.
As with phase, the superposition of two waves of horizontal and vertical polarizations is a wave of polarization whose angle $theta$ is determined by the ratio of the two waves: $A_y/A_x = tan\theta$. Mathematically, the two waves are the vector basis of all waves when represented as vectors in the constellation diagram shown in Fig. \ref{PolarM}. Physicists may call them the basis waves.
\begin{figure}[h]\label{PolarM}
\begin{tikzpicture}
\draw[->] (-3.5,0) -- (3.5, 0);
\draw[->] (0,-3.5) -- (0,3.5);
% \draw[dotted, red] (0,0) circle(3cm);
\draw[dotted, red] (3,0) arc(0:180:3);
\draw[red, fill] (30:3) circle(0.05cm);
\draw[dashed] (1,0) arc (0:30:1) node[right, pos=0.6]{$\theta$};
\draw[dashed] (30:0.1) -- (30:2.9) node[pos=0.5, rotate = 30, above] {amplitude};
\end{tikzpicture}
\caption{Polarization modulation constellation diagram}
\end{figure}
\subsection{Elliptical polarization}\label{s-elliptic}
In the above discussion, we see that the superposition of two orthogonal linearly polarized waves is another wave of linear polarization. But that is under the assumption that the two waves are of equal phase. What happens if the two waves have different phases? That is to say, the wave with polarization in the $x$ direction is $A cos\theta e^{i\phi_x}$, and the one in the $y$ direction is $A sin\theta e^{i\phi_y}$. Their superposition is a wave we call elliptical polarization because the electrical field (a vector) of such a wave changes throughout the vibration period in an elliptic pattern. The propagation of the electric field, on the other hand, is a helical pattern as shown in Fig-\ref{CircularP}.
Linear polarization is a special case of elliptical polarization when $\phi = \phi_y-\phi_x$ is zero or $180^\circ$. Another special case is circular polarization for which $\phi$ is $90^\circ$ or $270^\circ$.
\begin{figure}[h]\label{CircularP}
\includegraphics[width=10cm]{pic/CircularPolarization.eps}
\caption{The vector of the vibration of the electric field}
\end{figure}
Elliptical polarization modulation uses the three tuples $(A, \theta, \phi_x)$ to represent information. It has only been proposed for use in space-space communication by researchers\cite{Circular-Wang} without real deployment. But for quantum communication and computing, elliptical polarization modulation and the equivalent are used exclusively. The subject will be discussed in detail in the next chapter.
\subsection{Dual-polarization quadrature phase shift keying}
Modern optical fiber and free space communication use a digital form of elliptical polarization dual-polarization quadrature phase shift keying\index{dual-polarization quadrature phase shift keying} (DP-QPSK\index{DP-QPSK}), polarization modulation\index{polarization modulation} is not used alone but rather in combination with phase modulation. This is mostly used in particular. Optical fiber communication is the backbone of all our daily communication. Free-space communication, on the other hand, is mostly used in earth-satellite and satellite-satellite communication.
Assuming one wave has polarization of $\theta=45^circ$ and the other of $135^\circ$, Fig. \ref{PolarM} is a 3-D constellation depiction showing the 8 modulation points -- call on a 3-D sphere. Phase or polarization modulation alone can use a 2-D constellation diagram like Fig. \ref{PM} or Fig. \ref{PolarM} to depict. Graphically showing a modulation combining both parameters needs to use the polar coordinates $(A, \theta, \psi)$. It shows that the eight digital modulation points all lie on a sphere of radius that equals the amplitude $A$. Here $\theta$ is between $0-180\circ$ because the wave with $(A, \theta+180^\circ, \phi$ is the same as $(A, \theta, \phi+180^\circ$.
%\node [constellation_cir] at (0,0) {};
\begin{figure}[h]\label{DP-QPSK}
\tdplotsetmaincoords{75}{110}
\pgfmathsetmacro{\h}{3.53}
\pgfmathsetmacro{\hn}{-3.53}
\pgfmathsetmacro{\r}{5}
\pgfmathsetmacro{\rn}{-5}
\pgfmathsetmacro{\ang}{105}
\begin{tikzpicture}[tdplot_main_coords]
\tdplotsetcoord{P1}{\r}{45}{45}
\tdplotsetcoord{P2}{\r}{-45}{45}
\tdplotsetcoord{P3}{\r}{45}{-45}
\tdplotsetcoord{P4}{\r}{-45}{-45}
\tdplotsetcoord{P5}{\r}{135}{45}
\tdplotsetcoord{P6}{\r}{-135}{45}
\tdplotsetcoord{P7}{\r}{135}{-45}
\tdplotsetcoord{P8}{\r}{-135}{-45}
\shade[ball color=gray, tdplot_screen_coords, opacity=0.10] (0,0,0) circle [radius=\r];
% xy plane
\tdplotdrawarc[gray]{(0,0,0)}{5}{-75}{\ang}{};
\tdplotdrawarc[dashed, gray]{(0,0,0)}{\r}{\ang}{285}{};
% yz plane
\tdplotsetthetaplanecoords{90}
\tdplotdrawarc[tdplot_rotated_coords, gray!70]{(0,0,0)}{\r}{-38}{157}{};
\tdplotdrawarc[tdplot_rotated_coords,dashed, gray]{(0,0,0)}{\r}{150}{335}{};
% xyz axes
\draw[dashed, gray!50] (\rn,0,0) -- (0,0,0); \draw[gray!50] (0,0,0) -- (\r,0,0);
\draw[gray!55] (0,\rn,0) -- (0,\r,0);
\draw[gray!60] (0,0,\rn) -- (0,0,\r);
\draw[thick, -Stealth] (\r,0,0) -- (9,0,0) node[black, left] {$x$};
\draw[thick, -Stealth] (0,\r,0) -- (0,7,0) node[black, right] {$y$};
\draw[thick, -Stealth] (0,0,\r) -- (0,0,7) node[black, left] {$z$};
% points
\fill[red] (P1) circle (0.1); \fill[red!50] (P2) circle (0.1);
\fill[red] (P3) circle (0.1); \fill[red!50] (P4) circle (0.1);
\fill[red] (P5) circle (0.1); \fill[red!50] (P6) circle (0.1);
\fill[red] (P7) circle (0.1); \fill[red!50] (P8) circle (0.1);
\node[above] at (P1) {$(\frac \pi 4, \frac \pi 4)$};
\node[below] at (P2) {$(\frac \pi 4, \frac {5\pi} 4)$};
\node[above right] at (P4) {$(\frac \pi 4, \frac {3\pi} 4)$};
\node[below left] at (P3) {$(\frac \pi 4, \frac {7\pi} 4)$};
\node[above] at (P5) {$(\frac {3\pi} 4, \frac \pi 4)$};
\node[above] at (P6) {$(\frac {3\pi} 4, \frac {5\pi} 4)$};
\node[above right] at (P8) {$(\frac {3\pi} 4, \frac {3\pi} 4)$};
\node[below left] at (P7) {$(\frac {3\pi} 4, \frac {7\pi} 4$};
\draw[dashed, red!70] (0,0,0) -- (2.5, 2.5, 0) -- (P1) -- cycle;
\draw[dashed, red!30] (0,0,\h) circle (\h);
\draw[dashed, red!30] (0,0,\hn) circle (\h);
\tdplotsetthetaplanecoords{45}
\tdplotdrawarc[tdplot_rotated_coords, -Latex]{(0,0,0)}{2}{0}{45}{anchor=north east}{$\theta$}
\draw [thick, -Latex, canvas is xy plane at z=0] (2,0) arc [start angle=0, end angle=45, radius=2];
\node at (2,0.5,-0.3) {$\phi$};
\end{tikzpicture}
\caption{Modulation points of DP-QPSK}
\end{figure}
\subsection{DP-QPSK modulator and demodulator}
Fig. \ref{Modulator-DP-QPSK} shows a DP-QPSK modulator. It uses two waves of orthogonal linear polarization from the same source, and each is modulated with 2 bits using QPSK. The two waves are then combined to feed into one communication medium such as an optical fiber. A DP-QPSK modulator circuit diagram is shown in Fig. \ref{Modulator-DP-QPSK}. A demodulator is shown in Fig. \ref{Demodulator-DP-QPSK}.
\begin{figure}\label{Modulator-DP-QPSK}
\begin{tikzpicture}
\path
(-2,-1) node[circle, draw=black] (lo) {$\sim$}
(0,-1) node[circle, draw=black] (splitter) {$\prec$}
(0,1) node[Gate] (p90) {$90^\circ$}
(0,3) node[Gate] (ta) {$M$}
(0,-3) node[Gate] (ba) {$M$}
(3,0) node[circle, draw=black] (coupler) {$\succ$}
(4,0) node[text width=60, align=center, anchor=west] (output) {signal wave output};
\path (-2,3) node[text width=50, align=left, anchor=east] (even) {2-bit data input}
(-2,-3) node [text width=50, align=left, anchor=east] (odd) {2-bit data input};
\draw (lo.north) node[text width=80, align=center, anchor=east] {wave generator};
\draw (splitter.south east) node[text width=40, align=center, anchor=west] {50:50 splitter};
\draw (p90.east) node[text width=40, align=center, anchor=west] {polarizer};
\draw (ta.north east) node[anchor=south] {QPSK modulator};
\draw (coupler.west) node[text width=40, align=center, anchor=east] {coupler};
\draw (coupler) -- (output);
\draw (ba) -- (splitter) -- (p90) -- (ta) -| (coupler) |- (ba);
\draw (lo) -- (splitter);
\draw[double] (even) -- (ta);
\draw[double] (odd) -- (ba);
\end{tikzpicture}
\caption{DP-QPSK modulator circuit block diagram}
\end{figure}
\begin{figure}\label{Demodulator-DP-QPSK}
\begin{tikzpicture}[scale=1]
\path
(-3,0) node[text width=40, align=center, anchor=east] (input) {signal wave input}
(-2,0) node[circle, draw=black] (split) {$\prec$}
(0,2) node[Gate] (tsp) {$D$}
(0,-2) node[Gate] (bsp) {$D$};
\path
(-2,2) node [text width=60, align=center, anchor=east] (V) {vertical polarization}
(-2,-2) node [text width=60, align=center, anchor=east] (H) {horizontal polarization}
(1,2) node [anchor=west] (bit01) {data output - 2 bits}
(1,-2) node [anchor=west] (bit00) {data output - 2 bits};
\draw[double] (tsp) -- (bit01);
\draw[double] (bsp) -- (bit00);
\draw (input) -- (split) |- (tsp);
\draw (split) |- (bsp);
\draw (split.east) node[text width=60, align=center, anchor=west] {polarization splitter};
\draw (tsp.north east) node[anchor=south] {QPSK demodulator};
\end{tikzpicture}
\caption{DP-QPSK demodulator}
\end{figure}
\chapter{Qubit modulation}\label{c-qinfo}
In the previous chapter, we studied how information can be represented or carried by waves using different modulation schemes. All the modulation schemes, if not involving amplitude modulation, can be used by qubits. Amplitude modulation is excluded because each qubit has only one quantum of energy and its amplitude is fixed and cannot be used to represent different information values. For a qubit, we can assume the amplitude $A=1$.
As introduced in Section-\ref{s-elliptic}, the optical qubits used in quantum communication experiments all adopt the elliptical polarization modulation -- using the polarization angle $\theta$ and the relative phase $\phi$ to carry information. There are many different physical constructs of qubits for quantum computing. Appendix \ref{A-qubit} describes some of them. Instead of polarization, they may use parameters such as frequency, modal, or electron spin. But they are all equivalent to using an angle $\theta$ in combination with the relative phase $\phi$ to represent information. Therefore, we carry out the rest of the discussion as though all qubits use elliptical polarization modulation.
Using two real numbers $\theta$ and $\phi$ to carry information, qubit modulation is analog. However, at the readout, from all the possible real values of the qubit's wave parameters, the demodulator can only output two possible electronic values for reasons we shall explain. Therefore, a demodulator may lead to information loss. And we need to carefully design computation algorithms so that the resulting modulation points may be read out without loss. For communication, on the other hand, we may take advantage of unreadable modulations to conceal or encrypt information -- one of the ideas behind the BB84 protocol described in this chapter.
\section{Modulation and demodulation}\label{S-qModulation}
Modulating a qubit is no different from that described in the previous chapter. Fig. \ref{Modulator-qubit} shows an example modulation circuit. The top one is the conventional circuit block diagram. The polarizer changes the polarization angle $\theta$ for a $\Delta \theta$ amount whose value may be a constant or a variable controlled by a conventional data input or the parameters of other qubits. It shows up in the quantum circuit version in the diagram below as a polarization-altering gate. The phase shifter along with the polarization splitter and coupler in the top diagram form a phase $\phi$ altering gate in the quantum circuit version below. Again, the amount of phase shift may be a constant or a controlled variable.
\begin{figure}\label{Modulator-qubit}
\begin{tikzpicture}[scale=0.8]
\path
(-4,0) node[circle, draw=black] (lo) {$\sim$}
(-2,0) node[Gate] (p90) {$\Delta \theta$}
(0,0) node[circle, draw=black] (splitter) {$\prec$}
coordinate[] (H) at (0,-2)
(2,3) node[Gate] (ta) {$\Delta \phi$}
(4,0) node[circle, draw=black] (coupler) {$\succ$}
(5,0) node[text width=60, align=center, anchor=west] (output) {signal wave output};
\draw (lo.north) node[text width=80, align=left, anchor=south] {initial wave};
\draw (p90.south) node[text width=40, anchor=north] {polarizer};
\draw (splitter.east) node[text width=40, align=center, anchor=west] {polarization splitter};
\draw (ta.east) node[anchor=south west] {phase shifter};
\draw (coupler.south) node[text width=40, align=right, anchor=north east] {coupler};
\draw (output) -- (coupler) |- (ta) -| (splitter)
node[above=2.5, text width=65, align=center, anchor=north east] {vertical polarization};
\draw (lo) -- (p90) -- (splitter) -- (H) -| (coupler)
node[below=2, anchor=east] {horizontal polarization};
\end{tikzpicture}
\caption{Modulation circuit block diagram}
\begin{quantikz}
\lstick{initial qubit} & \gate{\Delta \theta} & \gate{\Delta \phi} & \qw \rstick{output wave}
\end{quantikz}
\caption{Quantum circuit diagram}
\end{figure}
\subsection{Demodulation and the readout limitation}
Demodulation is reading out the information from a wave. Physicists call it measurement. It involves energy transfer from a qubit to an electronic device, which is shown in the polarization demodulator circuit block diagram as a detector in Fig. \ref{Demodulator-qubit}. The circuitry is the same for a qubit and a conventional signal wave. For either one, the polarization splitter splits the wave into horizontal and vertical polarization components to resonate with the electrons in the detectors. To demodulate a conventional signal wave, the electric currents generated in the detectors should be proportional to $cos^2\theta$ and $sin^2\theta$ respectively. Therefore, the parameter $\theta$ can be obtained from the ratio of the currents from the two detectors.
The relative phase parameter in a qubit may carry information. But the demodulator does not contain the phase demodulators as the one for DP-QPSK shown in Fig. \ref{Demodulator-DP-QPSK} has because adding them requires adding two more (entangled) qubits as local reference waves and is impractical to have. Therefore phases of the wave components are not measured. And whatever information carried in the phases is lost.
The mechanism of demodulating a qubit is the same as for a conventional wave. But the outcome is different: only one of the detectors may have an electric current and never both. It appears that $\theta$ is either 0 or $\pi/2$ and never in between. Therefore, the readout or decoding of the qubit is limited to only "0" or "1" and nothing in between. That is because there is only one quantum of energy in the qubit, and only one lucky electron in one of the detectors gets a chance to resonate and induce a current. The chance or probability of luck is proportional to $cos^2\theta$ or $sin^2\theta$ depending on which detector it is in.
The phenomenon is very much like tossing a coin into the air, it always collapses to one of the two orientations although it may be in all different orientations in the air. Heisenberg calls the phenomenon wave-function collapse. This kind of phenomenon appears in all quantum measurements and is very puzzling or counterintuitive to physicists because they associate probability with noise and indeterministic. But to engineers, qubit readout is an analog-digital data conversion mechanism -- energy is a discrete number, and rounding off real numbers to integers is nothing strange or counterintuitive.
The qubit readout limitation puts a bound to the power of quantum computing. If at the end of a computation a qubit results in a $\theta$ value of neither 0 nor $\pi/2$, the result cannot be decoded accurately and is useless. We have to design the computation algorithm carefully, including choosing the modulation points at input carefully, so that the qubit results in a $\theta$ value of either 0 or $\pi /2$. The limitation puts a bound to usefulness of quantum computing because the data outcome is limited to one bit per qubit. It also makes designing algorithms hard or challenging. The example Deutsch's algorithm discussed in a later section in this chapter may shed some light on what an algorithm takes to work.
Quantum communication, however, can take advantage of the limitation to make qubits unreadable to eavesdroppers. We will describe how BB84 protocol achieves this in Section-\ref{S-BB84}. Quantum circuit diagrams are good ways to explain an algorithm or protocol. In a diagram, e.g. the bottom half of Fig. \ref{Demodulator-qubit}, a demodulator is shown as a measurement gate or a metering gate. It is called a quantum gate. However, it cannot be expressed as a unitary matrix and is not on the same footing as the other quantum gates.
\begin{figure}\label{Demodulator-qubit}
\begin{tikzpicture}
\path
(-3,0) node[text width=40, align=center, anchor=east] (input) {signal wave input}
(-2,0) node[circle, draw=black] (split) {$\prec$}
(0,2) node[Gate] (tsp) {$D$}
(0,-2) node[Gate] (bsp) {$D$};
\path
(-2,2) node [text width=65, align=center, anchor=east] (V) {vertical polarization}
(-2,-2) node [text width=70, align=center, anchor=east] (H) {horizontal polarization}
(1,2) node [anchor=west] (bit01) {output}
(1,-2) node [anchor=west] (bit00) {output};
\draw[double] (tsp) -- (bit01);
\draw[double] (bsp) -- (bit00);
\draw (input) -- (split) |- (tsp);
\draw (split) |- (bsp);
\draw (split.east) node[text width=40, align=center, anchor=west] {polarization splitter};
\draw (tsp.north east) node[anchor=south] {detector};
\end{tikzpicture}
\caption{Qubit demodulation circuit block diagram}
\begin{quantikz}
\lstick{input qubit} \qw & \meter{} & \cw \rstick{output bit}
\end{quantikz}
\caption{Qubit readout quantum circuit diagram}
\end{figure}
\section{Mathematical notation and graphic depiction}
Continuing from what we learn in previous chapter, an elliptically polarized wave can be noted in the spherical polar coordinates $(A, \theta, \phi_x)$, where $\psi$ is the relative phase, or by a Cartesian coordinate like tensor of complex numbers $(A cos\theta e^{i\phi_x}, A sin\theta e^{i\phi_y})$. The tensor can be written as $(x_0, x_1)$ in general subjected to the condition $|x_0|^2 + |x_1|^2 = 1$ and the assumption $A=1$ for qubits. We may call the complex number pair notation $(x_0, x_1)$ tensor notation. It is convenient when studying a quantum gate, which transforms a qubit from one modulation point to another. For example, if the qubit is transformed to the modulation point $(x'_0, x'_1)$, we can write the transformation as a matrix multiplying the transposed tensor of the original coordinate:
\begin{equation}
\begin{pmatrix}
x'_0 \\
x'_1
\end{pmatrix}
=
\begin{pmatrix}
t_{0,0} & t_{0,1} \\
t_{1,0} & t_{1,1}
\end{pmatrix}
\begin{pmatrix}
x_0 \\
x_1
\end{pmatrix}.
\end{equation}
Here, the matrix
\begin{equation}\label{e-T}
T
=
\begin{pmatrix}
t_{0,0} & t_{0,1} \\
t_{1,0} & t_{1,1}
\end{pmatrix}
\end{equation}
is the transformation matrix representing the quantum gate. All matrices transforming a qubit from one modulation point to another are unitary, which means the complex matrix $T^*$ is the inverse of $T$.
\subsection{Dirac ket notation}
Physicists favor what is called the ket notation, which is a vector notation. The unit vectors $\hat x_0$ and $\hat x_1$ are written as $\keta{0}$ and $\keta{1}$. Therefore, a modulation point can be written as $e^{i \phi_0}cos{\theta} \keta{0} + e^{i \phi+1} sin{\theta} \keta{1}$ or $x_0 \keta{0} + x_1 \keta{1}$. Here, the "$+$" is mathematically a vector addition. Physicists interpret the "$+$" as superposition -- mixing or addition of two waves.
The ket notation provides physicists with a brief notation along with associated physical mechanisms. In the ket notation, the transformation of a quantum gate is written as an abstract operator symbol. Therefore, the ket notation is usually used in theoretical derivation while the vector notation is used when numerical calculation is needed.
\subsection{Graphical depiction}
The information carried by a wave in a qubit is represented in the polarization angle $\theta$ and the relative phase $\phi = \phi_1 - \phi_0$ and thus can be described by the pair of real numbers $(\theta, \phi)$. If plotting all the modulation points in spherical polar coordinates, they take up a hemisphere shown in Fig. \ref{bloch-Elliptical} with $A=1$. It is a hemisphere because $\phi$ is a phase difference and the points with $\theta > \pi /2$ duplicate those with $\theta < \pi /2)$ with the reversed $\phi$ value.
The hemisphere is equivalent to the Bloch sphere that physicists use. In that depiction, the coordination $\theta$ is twice what we use and, therefore, it is an entire sphere. The equator in our hemisphere diagram would become the south pole on the Bloch sphere. The south pole depiction of the modulation points with $\theta=\pi /2$ is more accurate because the phase difference $\phi$ loses its meaning. However, using the polarization angle for the coordinate $\theta$ is consistent with engineers' practice.
\begin{figure}\label{bloch-Elliptical}
\tdplotsetmaincoords{75}{110}
\pgfmathsetmacro{\h}{3.53}
\pgfmathsetmacro{\hn}{-3.53}
\pgfmathsetmacro{\r}{5}
\pgfmathsetmacro{\rn}{-5}
\pgfmathsetmacro{\ang}{105}
\begin{tikzpicture}[tdplot_main_coords]
\tdplotsetcoord{P1}{\r}{45}{45}
\tdplotsetcoord{P2}{\r}{90}{45}
% xy plane
\tdplotdrawarc[black]{(0,0,0)}{\r}{-77}{\ang}{};
\tdplotdrawarc[dashed, gray]{(0,0,0)}{\r}{\ang}{285}{};
% yz plane
\tdplotsetthetaplanecoords{90}
\tdplotdrawarc[tdplot_rotated_coords, gray!30]{(0,0,0)}{\r}{0}{90}{};
\tdplotdrawarc[tdplot_rotated_coords, gray!35]{(0,0,0)}{\r}{-50}{0}{};
\tdplotdrawarc[tdplot_rotated_coords,dashed, gray!50]{(0,0,0)}{\r}{270}{305}{};
% apparent yz plane
\tdplotsetthetaplanecoords{\ang}
\tdplotdrawarc[tdplot_rotated_coords, gray]{(0,0,0)}{\r}{-90}{90}{};
% axes
\draw[dashed, gray!50] (\rn,0,0) -- (0,0,0); \draw[gray!50] (0,0,0) -- (\r,0,0); %x
\draw[gray!55] (0,\rn,0) -- (0,\r,0); %y
\draw[gray!60] (0,0,0) -- (0,0,\r); %z
\draw[thick, -Stealth] (\r,0,0) -- (9,0,0) node[black, left] {$x$};
\draw[thick, -Stealth] (0,\r,0) -- (0,7,0) node[black, right] {$y$};
\draw[thick, -Stealth] (0,0,\r) -- (0,0,7) node[black, left] {$z$};
% Coordination point
\fill[red] (P1) circle (0.1);
\draw[dashed, red!60] (0,0,0) -- (P1);
\draw[dashed, red!70] (0,0,0) -- (2.5, 2.5, 0) -- (P1);
\draw[dashed, red!70] (0,0,0) -- (P2);
\tdplotsetthetaplanecoords{45}
\tdplotdrawarc[tdplot_rotated_coords, -Latex]{(0,0,0)}{2}{0}{45}{anchor=north east}{$\theta$}
\tdplotdrawarc[tdplot_rotated_coords, dashed, red!45]{(0,0,0)}{\r}{0}{90}{};
\draw [thick, -Latex, canvas is xy plane at z=0] (2,0) arc [start angle=0, end angle=45, radius=2];
\node at (2,0.5,-0.3) {$\phi$};
\end{tikzpicture}
\caption{The modulation points of a qubit take up a hemisphere.}
\end{figure}
\section{Mostly used modulation points}\label{Sec-points-qubit}
\begin{figure}[h]\label{qQPSK}
\begin{tikzpicture}
\draw[->] (-3.5,0) -- (3.5, 0);
\draw[->] (0,-3.5) -- (0,3.5);
\draw[dashed] (2.5,2.5) -- (0,0);
\draw[dashed] (0,0) -- (2.5,-2.5);
\draw[dotted, red] (0,0) circle(3cm);
\draw[red, fill] (3,0) circle(0.05cm) node[below right] {\ket{0}};
\draw[red, fill] (0,3) circle(0.05cm) node[above right] {\ket{1}};
\draw[red, fill] (2.12,2.12) circle(0.05cm) node[right] {\ket{+}};
\draw[red, fill] (2.12,-2.12) circle(0.05cm) node[below] {\ket{-}};
\draw[dashed] (1,0) arc (0:45:1) node[right, pos=0.6]{$\theta=\pi/4$};
\end{tikzpicture}
\caption{Constenlation diagram of quantum $\theta$ shift keying}
\end{figure}
The most used modulation points all have $\phi=0$ as shown in the linear polarization modulation constellation diagram in Fig. \ref{qQPSK}. The significance of the $\keta{0}$ and $\keta{1}$ points is obvious. They represent the basis waves and are the only points that can be read out precisely. By convention, they always decoded to the binary numbers "0" and "1." Of course, "0" and "1" are always encoded to them at the input.
The $\keta{+}$ and $\keta{-}$ points have equal probabilities to be decoded into "0" and "1" and are, therefore, good for encryption as we will learn in the section on BB84 protocol. For computing, from the physicists' view, they are superpositions of equal shares of the basis waves, which encode the binary numbers "0" and "1," and can be used as the input to compute both values simultaneously. We will learn this use in the section on Deutsch's algorithm.
By convention, a qubit is always initiated to the $\keta{0}$ point. Transforming it to another point always takes one or more quantum gates. Table \ref{t-qubitPoints} lists the gates for the transformation. In it, $HX$ means applying the $X$ gate and $H$ gate in sequence. We will learn these standard gates in detail.
\begin{table}[]
\label{t-qubitPoints}
\caption{Mostly used qubit modulation points}
\centering
\begin{tabular}{lllll}
polar & tensor & ket & symbol & transform gate \\
(1, 0, 0) & (1, 0) & $\keta{0}$ & 0 & \\
$(1, \frac \pi 2, 0)$ & (0, 1) & $\keta{1}$ & 1 & $X$ \\
$(1, \frac \pi 4, 0)$ & $(\frac 1 {\sqrt{2}}, \frac 1 {\sqrt{2}})$ & $\keta{+}$ & & $H$ \\
$(1, - \frac \pi 4, 0)$ & $(\frac 1 {\sqrt{2}}, - \frac 1 {\sqrt{2}})$ & $\keta{-}$ & $HX$
\end{tabular}
\end{table}
\subsection{$X$, $Y$ and $Z$ gates}
In the constellation sphere in Fig. \ref{bloch-Elliptical}, an $X$ gate swaps the $x$ and $y$ axes or moves all points across the $(\theta=45^\circ, \phi=0)$ line to their reflection points. In tensor notation, the transformation matrix is
\begin{equation}
X = \begin{pmatrix}
0 & 1 \\
1 & 0
\end{pmatrix}.
\end{equation}
In ket notation, it is an operator by the symbol $X$. In a circuit diagram, an $X$ gate is the letter $X$ in a box. Therefore, the transformation from $\keta{0}$ to $\keta{1}$ can be drawn as
\begin{figure}[h]\label{X1}
\begin{quantikz}
\lstick{\ket{0}} & \gate{X} & \qw \rstick{\ket{1}}
\end{quantikz}
\caption{Use X gate to produce a $\keta{1}$ wave.}
\end{figure}
If implemented using the circuit block diagram shown in Fig. \ref{Modulator-qubit}, an $X$ gate is implemented with a $\Delta \theta = \pi /2$ polarizer and a $Delta \phi=\pi$ phase shifter.
An $X$ gate is written as $\bigoplus$ in some textbooks. However, this book does not use this notation. Many textbooks also talk about the Pauli $Y$ and $Z$ gates. Along with the $X$ gate, they transform a qubit according to the Pauli matrices\index{Pauli matrices} $X, Y, Z$, which may use symbols $\sigma_x, \sigma_y, \sigma_z$. The $Y$ and $Z$ gates are less used. Their matrices are
\begin{equation}
\begin{array}{rl}
Y & = \sigma_y = \begin{pmatrix}
0 & -i \\
i & 0
\end{pmatrix} \\
Z & = \sigma_z = \begin{pmatrix}
1 & 0 \\
0 & -1
\end{pmatrix}
\end{array}
\end{equation}
\subsection{Hadamard gate}
A Hadamard gate can transform a qubit from $\keta{0}$ to $\keta{+}$, and can also transform from $\keta{1}$ to $\keta{-}$. On the constellation hemisphere, it transforms any point across the $(1, \pi /8, 0)$ axis to its reflection point. In Dirac ket notation, it is a $H$ operator. In tensor notation,
\begin{equation}
H = \frac 1 {\sqrt{2}} \begin{pmatrix}
1 & 1 \\
1 & -1
\end{pmatrix}.
\end{equation}
In a quantum circuit, the transformation of a $\keta{0}$ qubit is drawn as
\begin{figure}[h]\label{H+}
\begin{quantikz}
\lstick{\ket{0}} & \gate{H} & \qw \rstick{\ket{+}}
\end{quantikz}
\caption{Use H gate to produce $\keta{+}$ wave.}
\end{figure}
And the transformation from $\keta{0}$ to $\keta{-}$ is drawn as
\begin{figure}[h]
\begin{quantikz}
\lstick{\ket{0}} & \gate{X} & \gate{H} & \qw \rstick{\ket{-}}
\end{quantikz}
\caption{Use H gate to produce $\keta{-}$ wave.}
\label{H-}
\end{figure}
\section{BB84 protocol}\label{S-BB84}
Charles Bennett and Gilles Brassard proposed in 1984 a quantum encryption protocol\cite{BB84}. Fundamentally, it is a realization of the classical one-time pad (OTP) protocol and is not practical for encryption. However, it may be used for cipher key distribution. Moreover, it is a good illustration of quantum communication principles.
\subsection{BB84 as an encryption protocol}
By tradition, all communication encryption protocols are narrated as a scenario in which Alice wants to transmit a series of data bits to Bob but fears Eve may eavesdrop on the communication channel\cite{Schneier}. BB84 protocol assumes:
- Alice has a series of data bits to be encrypted; she also has another series of encryption key bits, which are random;
- Bob has the same series of key bits but expects to receive the data bits encrypted from Alice.
In each time slot, the protocol goes through the following steps to transmit one data bit:
- Alice concatenates one bit from her key-bit series with one from the data-bit series to form a 2-bit symbol, 00, 01, 10 or 11;
- Alice moduates a qubit to the $\beta{0}$, $\beta{1}$, $\beta{-}$ or $\beta{+}$ point in respect to the 2-bit symbol, 00, 01, 10 or 11;
- Alice sends the qubit to Bob;
- Bob uses the corresponding bit from his key-bit series to vary his demodulator to read out the data bit.
In quantum circuit diagram, the protocol is shown as in Fig. \ref{BB84}. In this scheme, even the eavesdropper Eve captures the qubit, she does not have the decryption bit and cannot set up her demodulator correctly to reveal the data bit.
\begin{figure}[h]
\label{BB84}
\begin{quantikz} %[wire types={q,c}]
\lstick{Alice' data bits} & \cwbend{1} \\
\lstick{\ket{0}} & \gate{X} & \gate{H} &\qw & \qw & \gate{H} & \meter{} &\cw \rstick{data output} \\
\lstick{Alice' key bits} & \cw & \cwbend{-1} &\slice{Eve} & & \cwbend{-1} & \cw \rstick{Bob's key bits}
\end{quantikz}
\caption{BB84 circuit}
\end{figure}
From a communication engineer's perspective, the transmission channel uses one qubit per and transmits one data bit per time slot. But its efficiency is low from a cryptographer's perspective, and the protocol has a security hole:
- it is one-time-pad encryption, and the key length must be as long as the data bit length
- it is subjected to an intercept-resend attack by Eve.
If Eve intercepts a qubit from Alice and sends a random qubit to Bob, he cannot tell if the received qubit is from Aice or Eve. If Bob doubts the origin of every qubit, the communication channel is useless. The solution proposed by cryptographers to resolve the problem is to add authentication bits to the data bit series.
\subsection{Adding authentication to BB84 protocol}
Adding authentication bits is a standard cryptography solution. To every block of $n$ bits from the data bit series, $m$ (random) authentication bits known to both Alice and Bob are added. Alice encrypts the new data bit series $a_1 a_2 ... a_m d_1 d_2 ...d_n$ and sends them as qubits to Bob. If Bob finds all the authentication bits are what he expects, the data bits are good. Otherwise, he discards the block of $m+n$ bits. This scheme can go a bit fancier if Bob calculates the ratio of the bad authentication bits to obtain the probability of the data bits being bad.
\subsection{Key distribution}
The chicken-and-egg problem of one-time-pad encryption has no solution unless a key distribution or key exchange protocol is added. BB84 can be used for key distribution. Most of the quantum communication protocols invented so far are for key distribution.
For key distribution, the assumptions of the original protocol are revised
- Alice prepares the data-bit series using random bits; the data bits are candidate key bits;
- Bob prepares his own key-bit series without agreement with Alice.
The following steps are also added to the original protocol:
- Bob uses a conventional communication channel, which guarantees authenticity but not confidentiality, to compare their key bits;
- Bob and Alice agree that the "data" bit is good for future key use if the the key bits agree; otherwise, the bit is discarded.
\section{Deutsch's algorithm}\label{S-Deutsch}
A binary function $f$ that maps \{0,1\} -\> \{0,1\} may have 4 possible results, which are 2 bits of information. On the other hand, the function type, constant or balanced, is a 1-bit information. A constant function type means $f(1)=f(0)$, and a balanced type means $f(1)\neq f(0)$. But with a conventional computer, it still has the same complexity to determine the type as to calculating the results -- taking 2 bits of memory and 2 operations.
From a physicist's perspective, the $\keta{+}$ wave is a superposition of the $\keta{0}$ and $\keta{1}$ waves and can be used to calculate the results of the $f(x)$ function simultaneously. From an engineer's perspective, the $\keta{+}$ modulation point has an equal distance to those encoding 0 and 1, and may be used to encode the binary number pair (0,1).
The type can be determined by calculating $|f(1)-f(0)|$, which is either 0 or 1. But still, no algorithm based on conventional computers can determine the result in one operation. Deutsch proposed that a quantum algorithm\cite{1985Deutsch} could determine the result in one operation. It is the first that demonstrates the potential of quantum power.
In previous sections, we have talked about the value of the $\keta{+}$ and $\keta{-}$ modulation points. From a physicist's perspective, the $\keta{+}$ qubit is a superposition of $\keta{0}$ and $\keta{1} waves$, and feeding it as the input to a quantum gate $U_f$ implementing function $f(x)$ can calculate $f(0)$ and $f(1)$ in parallel:
\begin{equation}
\begin{array}{rl}
U_f(\keta{+}) = & \frac 1 {\sqrt 2} [(-1)^{f(0)} \keta{0}+ (-1)^{f(1)} \keta{1}] \\
= & \frac 1 {\sqrt 2} (-1)^{f(0)} [\keta{0}+ (-1)^{f(1)-f(0)} \keta{1}].
\end{array}
\end{equation}
The qubit is at either the $\keta{1}$ or $\keta{-}$ modulation point, and a Hadamard gate can be applied before the readout. The quantum circuit diagram is shown in Fig. \ref{Deutsch}
\begin{figure}[h]\label{Deutsch}
\begin{quantikz}
\lstick{\ket{+}} & \gate{U_f} & \gate{H} & \meter{} & \cw \rstick{output bit}
\end{quantikz}
\caption{Deutsch's algorithm quantum circuit diagram}
\end{figure}
The algorithm leaves the function $f(x)$ as a variable to be given at implementation time and gate $U_f$ to be determined. If we are given $f(x) = x \bigoplus 1$, the $U_f$ gate can be implemented using the $X$ gate.
\chapter{Qubit Multiplexing}\label{c-qubitMultiplexing}
The smallest information-carrying unit of a conventional computer is a bit stored in a pair of transistors. From there, 8, 16, 32, or 64 bits are used together as units like a byte, INT16, INT32, or FLOAT for processing. All these units are of fixed sizes. The advantage of graphics processing units (GPU)\index{GPU} lies in their capability to process units of multiple bits in parallel.
\section{Multiplexing techniques}
In communication, multiplexing is a technology that combines several carrier waves to transmit simultaneously to increase information transmission. The challenge is how to allocate and combine the waves so that the resources are fairly and efficiently used by all transmitting users.
\subsection{TDM and FDM}
One simple multiplexing technique, frequency-division multiplexing\index{frequency-division multiplexing} (FDM)\index{FDM}, divides up the bandwidth into narrow frequency bands called channels and assigns different channels to different users. Another simple technique, called time-division multiplexing\index{time-division multiplexing} (TDM)\index{TDM}, divides up a big time slot into smaller ones, which as called chips, and assign different chips to transmit different user data -- simultaneously within the big time slot although not simultaneously within each chip. From these simple schemes, advanced multiplexing techniques, such as orthogonal frequency-division multiplexing\index{orthogonal frequency-division multiplexing} (OFDM)\index{OFDM} and code-division multiple access\index{code-division multiple access} (CDMA)\index{CDMA}, and their variants have given power to modern wireless communication including Wi-Fi, and 4G and 5G cellular communication.
Similar multiplexing techniques are used in quantum computing and communication. For computing, multiplexing allows information carried by all the qubits processed simultaneously to increase computing power. For communication, multiplexing is often used for encryption.
In appearance, all the cellphones transmit simultaneously, and interference or cross-talk will result in the cellphone tower's receiver. In reality, the receiver sees zero cross-talk current. The total electrical current induced in the detector of the receiver is proportional to the intensity of the sum of the 4 waves integrated over the time slot $T$. A cross-talk current would arise from the integration of the multiplication of the waves from any two cellphones. In other words, the overlap of the waves from any two cellphones is zero. This fact is reflected in the matrix rows in Eq. \ref{e-CDMA}: the vector product of each pair of rows is zero. In other words, the vectors represented by the rows are orthogonal to each other.
CDMA can be considered a progression of TDM. In TDM, a bit is transmitted in time slot $T$ as a wave. The wave for value "1" is zero in phase, and the one for "0" has a $\pi$ phase. What happens if we have $N$ cellphones that need to transmit? TDM would shorten the time slot to $T/N$ and assign a smaller time slot, called a chip, to one cellphone. But this would require each cellphone's data bits to be represented by short voltage pulses (each of $T/N$ in duration) with a long idle period. Pulsed at $N$ times shorter duration, the electronics are costly yet less utilized. For this reason alone, simple TDM is not efficient for resource allocation.
\section{Mathematical notation}
\subsection{Basis waves and superposition}
The basis waves and readable modulation points of a single qubit are $\keta{0}$ and $\keta{1}$. Therefore, the multiplexes of the $n$ basis waves ${\keta{0}}_1 {\keta{0}}_2 ... {\keta{0}}_n$, ${\keta{1}}_1 {\keta{0}}_2 ... {\keta{0}}_n$, ... ${\keta{1}}_1 {\keta{1}}_2 ... {\keta{1}}_n$ are the basis waves of all $n$-qubit waves. Here, the subscript $i$ of a ket indicates the $i$-th qubit. Of course, they are the readable multiplexing points also.
All the basis waves can be written as $\keta{b_1, b_2, ..., b_n}$ where $b_i \in (0,1) and i=1, 2, ... n$. There are $N=2^n$ basis waves or basis-wave multiplexes. If we regard $b_1 b_2 ... b_n$ as a binary number, we can write the basis waves in the shortest form
\begin{equation}
\keta{B_j} = \keta{b_1, b_2, ..., b_n}
\end{equation}
where $j=0, 1, ... N-1$.
\subsection{Superposition of the basis waves and entanglement}
Simply putting $n$ qubits in a row as a multiplex is like using only the FDM or TDM techniques for communication. They have the qubits at their independently information-carrying points $(\theta_1, \phi_1; \theta_2, \phi_2; ... \theta_n, \phi_n)$ before being multiplexed. Although the multiplex can be processed or transformed in parallel as one wave, the information is limited to the multiplexing points defined by the $2n$ real parameters.
An advanced $n$-qubit multiplexing can be constructed by the superposition of the $N$ basis waves or basis-wave multiplexes. That is to multiplex the single-qubit basis waves to become the $N$ basis-wave multiplexes before superposition. Physicists note a multiplexing relation among qubits as the multiplication of kets and the superposition relation as an addition to reflect the operation sequence. The notation $(cos\theta \keta{0} + sin\theta \keta{1})_1 {\keta{1}}_2$, on the other hand, indicates the first qubit being in a superposition before being multiplexed with the second qubit.
In ket notation, the superposition can be written as
\begin{equation}
\sum_{j = 0, 1, ... N-1} x_j \keta{B_j}
\end{equation}
where the parameters satisfy the normalization condition,
\begin{equation}
\sum_{j = 0, 1, ... N-1} |x_j|^2 =1.
\end{equation}
Information carried by the multiplex is now in the $N$ complex parameters ${x_j, j=0, 1, ... N-1}$, among which $2N-2$ real numbers are independent information-carrying parameters. To a physicist, the absolute value $|x_j|$ may be considered the amplitude of the $j$-th component basis wave and reflects the polarization angle from the basis wave. If $|x_j| \neq 0$, $x_j / |x_j|$ reflects the phase.
Graphically, all the multiplexing points lie on a $N$-dimensional sphere with a radius if we don't consider duplication. Of course, we can't plot this sphere in a constellation diagram like that in Fig. \ref{bloch-Elliptical}. The majority of the points are not in simple multiplex and cannot be represented by $2n$ real parameters $(\theta_1, \phi_1; \theta_2, \phi_2; ... \theta_n, \phi_n)$ or the equivalent ket notation $\keta{s_1} \keta{s_2} ... \keta{s_n}$. To physicists, these points are entangled waves. To engineers, they are non-simple multiplexes.
\section{Bell waves}
finds use in quantum information. The matrix transforms the single-qubit basis waves into the $\keta{+}$ and $\keta{-}$ waves.
\subsection{Bell waves}
If we stack two 2-dimensional Hadamard matrices to become a 4-dimensional diagonal block matrix,
\begin{equation}
\frac 1 {\sqrt{2}}
\begin{pmatrix}
1 & 1 & 0 & 0 \\
1 & -1 & 0 & -0 \\
0 & 0 & -1 & 1 \\
0 & 0 & 1 & 1
\end{pmatrix}
\end{equation}
it transforms the 4 basis waves of 2 qubits into what are called the Bell states or Bell waves, named after John Bell. In ket notation, they are:
\begin{equation}
\begin{array}{rl}