Escolar Documentos
Profissional Documentos
Cultura Documentos
Mario Sracic
Last updated July 26, 2011
Contents
1 Denitions 1
2 Motivation 2
3 Quantum Circuits 4
3.1 General Multiplication for Z
+
0 . . . . . . . . . . . . . . . . . . . . . . . . 5
3.2 Row-Column Multiplier . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.3 Row Adder . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
3.4 General Matrix Multiplication . . . . . . . . . . . . . . . . . . . . . . . . . . 8
4 Complexity Analysis 8
5 Conclusions 10
1 of 14
List of Figures
1 NOT Gate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
2 Three-bit Tooli Gate, T
3
. . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
3 Controlled NOT Gate (XOR) . . . . . . . . . . . . . . . . . . . . . . . . . . 3
4 Multiplication Circuit for 4 3 mod 6 . . . . . . . . . . . . . . . . . . . . . . 6
5 General Multiplication Circuit . . . . . . . . . . . . . . . . . . . . . . . . . . 11
6 Row Adder Circuit . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
7 Row/Column Multiplier Circuit . . . . . . . . . . . . . . . . . . . . . . . . . 13
8 Circuit for General Matrix Multiplication . . . . . . . . . . . . . . . . . . . . 14
2 of 14
Abstract
In their paper Quantum Networks for Elementary Arithmetic Operations, Vedral, Barenco and
Ekert introduced several circuits for basic arithmetic operations like addition modulo N, controlled
multiplication and exponentiation. We would like to extend their multiplication circuit to perform
general integer multiplication modulo N. Then, new designs for quantum circuits will be introduced
that allow the construction of a quantum circuit that will implement general matrix multiplication.
The goal is to provide the necessary stepping stones for the eventual breaking of the Sakalauskas,
Tvarijonas, Raulynaitis Key Agreement Protocol (STR-KAP).
1 Denitions
Denition 1.0.1. Depth
The maximum length of any directed path from any input wire to any output wire
Denition 1.0.2. Entanglement
Quantum correlation between two observables [4]
Denition 1.0.3. NOT Quantum Gate expressed as a unitary matrix
U
NOT
=
0 1
1 0
[0`
[1`
a
1
a
1
NOT
Figure 1: NOT Gate
Denition 1.0.4. Quantum Circuit
Let H be a two-dimensional Hilbert Space. A Quantum circuit of width n in H is a unitary
operator U of size 2
n
2
n
working on joint systems composed of n qubits from H, which are initially
in some base state of H
n
. U thus realizes some function f : (base of H
n
) H
n
. If we identify the
base vectors of H, [0` and [1`, with logical 0 and 1, and the output with some probability distribution
by squaring the norms of amplitudes, we may say that for each bit string of length n, the circuit
outputs some probability distribution over all bit strings. We may also treat some subsystems as
auxiliary, in that case we forget about them when evaluating the output.[7]
Denition 1.0.5. Quantum Gate
The analogue of a logic gate in a classical computer. [5]
Denition 1.0.6. qubit
A 2-dimensional, normalized, complex vector in a Hilbert space with base vectors [0` and [1`.
Each qubit can be represented as
[` = a[0` +b[1`
with complex scalars a and b such that '[` = [a[
2
+[b[
2
= 1.
Denition 1.0.7. Superposition
A qubit can be a linear combination of [0` and [1`, or in general, a state of the form c
0
[0`+c
1
[1`
where c
0
, c
1
are complex coecients normalized to 1, i.e. [c
0
[
2
+[c
1
[
2
= 1.
Denition 1.0.8. Three-bit Tooli Gate/Controlled-Controlled-NOT (CC-NOT or T
3
)
1 of 14
T
3
'000` '001` '010` '011` '100` '101` '110` '111`
'000` 1 0 0 0 0 0 0 0
'001` 0 1 0 0 0 0 0 0
'010` 0 0 1 0 0 0 0 0
'011` 0 0 0 1 0 0 0 0
'100` 0 0 0 0 1 0 0 0
'101` 0 0 0 0 0 1 0 0
'110` 0 0 0 0 0 0 0 1
'111` 0 0 0 0 0 0 1 0
[4]
Figure 2: Three-bit Tooli Gate, T
3
Denition 1.0.9. Unitarity
The sum of all probabilities of all possible outcomes is one.
Denition 1.0.10. Unitary Operator
A linear transformation that is bijective and preserves length. [1]
Denition 1.0.11. Walsh-Hadamaard Transform:
U
WH
=
1
1 1
1 1
[0`
[1`
Denition 1.0.12. XOR Quantum Gate expressed as a unitary matrix:
U
XOR
=
1 0 0 0
0 1 0 0
0 0 1 0
0 0 0 1
[00`
[01`
[10`
[11`
2 Motivation
In [6], Sakalauskas, Tvarijonas and Raulynaitis introduce a new key agreement protocol based on
innite non-abelian group presentation and representation levels. A short explanation of the proto-
col will be provided, however, it is left to the reader to refer to [6] for a more detailed explanation.
2 of 14
a
1
a
2
a
1
a
1
a
2
Figure 3: Controlled NOT Gate (XOR)
Consider two communicators, Alice and Bob who wish to exchange sensitive information over an
unsecured line of communication. We will suppose that a third entity, named Eve, has managed to
compromise the communications between Alice and Bob. In order to secure communications, Alice
and Bob will create a key via the STR-KAP.
First, Alice and Bob agree on an innite, non-abelian group with a representation from
GL
d
(F
p
k) denoted by . Then they choose two mutually commuting subgroups /, B .
Alice selects an /, and r N and then forms
1
=
1
of which she maps to AQA
1
via
(
1
) = (
1
)
= ()()(
1
) since is a homomorphism
= AQA
1
(1)
Finally, Alice publishes AQ
r
A
1
. Meanwhile, Bob chooses an s N and B, computing
2
=
1
. After sending
2
through , he attains BQB
1
and nally publishes BQ
s
B
1
. Alice
takes Bobs result, raised to r and conjugates it by A, resulting in
A(BQ
s
B
1
)
r
A
1
= A(BQ
sr
B
1
)A
1
= (AB)Q
sr
(AB)
1
. (2)
Bob raises Alices result by s and conjugates it by B, reaching the same solution as in Eqn (),
this is then multiplied by an a M.
As mentioned earlier, the communication between Alice and Bob is not secure, there is the
sinister third party Eve who wants to crack the key between Alice and Bob. However, the only
information that Eve was able to intercept was Q, AQ
r
A
1
, and BQ
s
B
1
. Therefore, in order to
break the key, Eve must nd some X, Y GL
d
(F
p
k) and u, v N such that
(XY )Q
uv
(XY )
1
= (AB)Q
sr
(AB)
1
.
Since Eve is required to multiply two matrices, it would be benecial if she could check all
possible products of all pairs of matrices. Therefore, harnessing the power of quantum computing
to implement matrix multiplication would be imperative.
3 of 14
3 Quantum Circuits
The power of quantum computing is the ability to apply a quantum operation to a superposition
of all possible inputs with an output of all possible outputs, i.e. quantum parallelism. There are
specic properties that our quantum gates must satisfy, each gate must
Be a unitary operator,
reversible.
The simplest way to preserve unitarity in quantum gates is to build them from universal gates
such as NOT, XOR and Tooli or proven unitary transformations. Furthermore, we must abide by
the following theorem
Theorem 3.0.1. No Cloning Theorem
There cannot be a device that produces exact copies of a quantum state.
Theorem 3.0.1 means that a circuit cannot take the state in a register and copy that state to
another register as you would copy a le. Instead, values can be replicated in another register by
XORing the two registers.
A quantum circuit takes a two state quantum system called a qubit [2] which holds information
in manner similar to the classical bits 0 and 1. The size of a circuit can be determined by the number
of qubits necessary to perform the desired operation. For our purposes, we will dene the number
of qubits required by a number to be n = log p| when dealing with elements in F
p
and = klog p|
for elements in F
p
k. [3]
Vedral, Barenco and Ekert introduced quantum gates for elementary arithmetic operations like
addition modulo N and a controlled multiplication circuit which is represented by the function
f
a,N
(x) = ax mod N. The controlled multiplication gates enacted the state change
[c; , x, 0`
Number of Gates:
(d
3
d
2
)(2
2
+ 4 + 2)C
3
N +
(d
3
d
2
)(20
3
+ 50
2
+ 40 + 10) + [(2d
3
2d
2
)(20 + 10) +d
2
]
C
2
N +
(d
3
d
2
)(20
3
+ 64
2
+ 68 + 24) + (2d
3
2d
2
)(20 + 24)
CN +
(d
3
d
2
)(2
2
+ 4 + 2) + (4d
3
4d
2
)
N
Depth: 29d
2
+ 58d + 29d
9 of 14
5 Conclusions
We have taken the rst steps in the long process of nding a method to break the STR-KAP. The
General Matric Multiplication circuit could me used in a brute force attack on the Key Agreement
Protocol; however, in cite georges paper, it was proven that a brute force attack it not that ecient
at nding the order of a matrix. In the future, more research will been done to nd a method to
speed up the matric multiplication circuit, potentially through the use of the Quantum Fourier
Transform. Furthermore, we will look into the construction of quantum circuits to implement
other linear algebra operations like Cramers Rule and row operations, including a circuit for
determinants.
References
[1] A. Barenco, C. H. Bennett, R. Cleve, D. P. DiVincenzo, N. Margolus, P. Shor,
T. Sleator, J. A. Smolin, and H. Weinfurter, Elementary Gates for Quantum Compu-
tation, Phys. Rev. A, 52, pp. 34573467.
[2] A. Barenco, A. Ekert, and V. Vedral, Quantum Networks for Elementary Arithmetic
Ooerations, Phys. Rev. A, (1995).
[3] S. Beauregard, G. Brassard, and J. M. Fernandez, Quantum Arithmetic on Galois
Fields. April 2002.
[4] A. Muthukurishan, Classical and Quantum Logic Gates: An Introduction to Quantum Com-
puting, tech. rep., September 1999.
[5] A. O. Pittenger, An Introduction to Quantum Computing Algorithms, vol. 19 of Progress in
Computer Science and Applied Logic, Birkh auser Boston, 2000.
[6] A. Raulynaitis, E. Sakalauskas, and P. Tvarijonas, Key Agreement Protocol (KAP)
Using Conjugacy and Discrete Logarithm Problems in Group Rpresentation Level, Informatica,
18 (2007), pp. 115124.
[7] T. Tu sarov a, Quantum Complexity Classes, PhD thesis, Vrije Universiteit, August 2003.
10 of 14
C |
a
|
b
a
0
a
1
a
n
a
2
. . .
{
b
0
b
1
b
2
b
n
. . .
{
0
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
{ {
C
0
C
C
A D D
M O D
N
A D D
M O D
N
A D D
M O D
N
A D D
M O D
N
M U L T
2
0
1
2
1
2
2
2
n
0
0
0
0
>
>
|
0
>
|
a
>
|
b
>
|
a
x
b
(
m
o
d
N
)
>
|
0
>
|
a
>
|
a
>
|
b
>
|
b
>
|
a
x
b
(
m
o
d
N
)
>
Figure 5: General Multiplication Circuit
11 of 14
a
i1
b
1j
a
i2
b
2j
a
i3
b
3j
a
im
b
mj
{
.
.
.
c
|0
...
...
...
...
.
.
.
...
...
...
...
.
.
.
{
c
|c
ij
>
c
|0 |c
ij
c
R
O
W
A
D
D
A
D
D
M
O
D
N A
D
D
M
O
D
N
A
D
D
M
O
D
N
A
D
D
M
O
D
N
R
i
C
j
|
R
i
C
j
|
R
i
C
j
| R
i
C
j
|
>
>
>
>
>
>
>
Figure 6: Row Adder Circuit
12 of 14
a
i1
a
i2
a
i3
a
im
.
.
.
b
1j
b
2j
b
3j
b
mj
.
.
.
{
{
|0
{
0
0
0
0
.
.
.
...
...
...
...
...
...
...
...
...
...
...
...
{
{
{
|0
R
i
|
>
R
i
| R
i
|
C
j
|
C
j
| C
j
|
C
j
|
R
i
|
>
R
i
C
j
|
>
R
i
C
j
|
R
C
M
U
L
T
M
U
L
T
M
U
L
T
M
U
L
T
>
>
>
>
>
>
>
>
>
Figure 7: Row/Column Multiplier Circuit
13 of 14
} } } }
|
A
|
B |
A
x
B
(
m
o
d
N
)
} } } }
|
A
|
B
|
0
|
0
C
1
C
2
C
3
C
m
R
* 1
R
* 2
R
* 3
R
* m
R
*
*
1
R
*
*
2
R
*
*
3
R
*
*
m
C
1
C
m
R
i
C
j
|
|
A
|
B
|
0
|
0
|
A
|
B R
i
C
j
| |
A
x
B
(
m
o
d
N
)
>
> >
>
>
M A T R
I
X
M U L T
> > > >
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
. . .
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
.
R
1
R
2
R
3
R
m
. . .
{ { { {
. . .
{ { { {
. . .
R
1
R
m
. . . . . .
R
* 1
R
* 2
R
* 3
R
* m
{ { { {
. . .
R
*
*
1
R
*
*
2
R
*
*
3
R
*
*
m
{ { { {
. . .
R C M U L T
R C M U L T
R C M U L T
R C M U L T
R C M U L T
R C M U L T
R C M U L T
R C M U L T
R C M U L T
R C M U L T
R C M U L T
R C M U L T
R
o
w
A
d
d
e
r
. . .
. . .
> >
>
> >
> >
Figure 8: Circuit for General Matrix Multiplication
14 of 14