Ep. 5 Quantum State Tomography

แชร์
ฝัง
  • เผยแพร่เมื่อ 2 ม.ค. 2025

ความคิดเห็น • 9

  • @kwiatlab7974
    @kwiatlab7974  4 ปีที่แล้ว +2

    Hi Frank, everything in Ep. 5 can be found within the Altpeter chapter shown in the introduction, which is located on the Kwiat group tomography website: research.physics.illinois.edu/QI/Photonics/tomography/ . Nielsen and Chuang is mostly relevant to Ep. 6 (both episodes were originally recorded as a single talk), where chapter 8 contains a theoretical description of quantum processes and a brief discussion on process tomographies. Hope this helps! -Spencer

  • @royphilip3964
    @royphilip3964 4 ปีที่แล้ว +1

    I've worked on exactly the same thing and I know just how hard it to to explain it to someone else and keeping that in mind I'd say you've done a good job

  • @lifeoftomi_
    @lifeoftomi_ 4 ปีที่แล้ว +2

    Great presentation Spencer. Can this be used to counter quantum cryptography? By this I mean can a person listening to a network reconstruct the quantum states being sent and intercept the connection?

    • @kwiatlab7974
      @kwiatlab7974  4 ปีที่แล้ว +1

      Sorry for the delay in response. Spencer has been busy. This can not be used to counter quantum cryptography if you're trying to determine what the quantum state of the photon being sent during quantum key distribution is. Quantum state tomography needs many copies of the exact same state to determine what that state is using the different measurements of a tomography. It isn't possible to deterministically determine a general quantum state with a single measurement. Since quantum tomography depends on many copies of an IDENTICAL state and quantum key distribution randomly uses DIFFERENT states, it isn't possible to perfectly eavesdrop using quantum state tomography. It is possible to extract some information sometimes with eavesdropping on quantum key distribution but QKD has the novel feature that it can detect eavesdropping since that introduces errors into the key. See our animation: research.physics.illinois.edu/QI/Photonics/movies/bb84.swf

    • @magnuswootton6181
      @magnuswootton6181 3 ปีที่แล้ว

      RSA is linear to compute the key, the reverse process is exponential, if you have exponential power to break the key, then they will have double exponential to protect the key, So quantum RSA, automatically stops quantum breaking RSA.... but maybe the key now is so big, maybe the problem is they have trouble storing on even a huge hard disc, so I dont know exactly what happens, but maybe its in the form of continually refreshing the key, before the quantum breaker can get it, even tho they probably wished it was more qbits.

  • @RavindraKothari-mi1iq
    @RavindraKothari-mi1iq 2 ปีที่แล้ว

    thanks a lot for lecture and I have question can we the qiskit to perform the qunatum state tomography and how can we use it?

  • @ipeksaruhan9723
    @ipeksaruhan9723 3 ปีที่แล้ว +1

    I find this presentation very helpful, thanks a lot

  • @nik-ix2md
    @nik-ix2md 4 ปีที่แล้ว +1

    amazing explanation!