Documente Academic
Documente Profesional
Documente Cultură
Quantum mechanics (cf. [16]) is successful in explain- rithms with three qubits was also discussed in the recent
ing and predicting many physical phenomena. Therefore past [22]. The question whether or not quantum learning
there are reasons to be convinced of the correctness of is robust against noise is a subject of intense study [23].
quantum mechanics. One of the interesting applications A quantum algorithm for approximating the inu-
of quantum principles is the application to information ences of Boolean functions and its applications is re-
theory [6] leading to the quantum computer. cently studied [24]. In addition, quantum computation
Looking at studies of quantum computing, implemen- with coherent spin states and the close Hadamard prob-
tation of a quantum algorithm to solve Deutschs prob- lem [25] is reported. Transport implementation of the
lem [79] on a nuclear magnetic resonance quantum com- Bernstein-Vazirani algorithm with ion qubits is studied
puter is reported rstly [10]. An implementation of the [26]. Quantum Gauss-Jordan elimination and simulation
Deutsch-Jozsa algorithm on an ion-trap quantum com- of accounting principles on quantum computers are dis-
puter is also reported [11]. There are several attempts to cussed [27]. We mention that the dynamical analysis of
use single-photon two-qubit states for quantum comput- Grovers search algorithm in arbitrarily high-dimensional
ing. Oliveira et al. implements Deutschs algorithm with search spaces is studied [28]. A method of computing
polarization and transverse spatial modes of the electro- many functions simultaneously by using many parallel
magnetic eld as qubits [12]. In addition, single-photon quantum systems is reported [29].
Bell states are prepared and measured [13]. Also the On the other hand, we may wonder if we need all the
decoherence-free implementation of Deutschs algorithm previously mentioned studies to reach a good quantum
is introduced by using such single-photon and by using computer. In 2015, it was discussed that the Deutsch-
two logical qubits [14]. A one-way based experimental Jozsa algorithm can be used for quantum key distribution
implementation of Deutschs algorithm is reported [15]. [30]. In 2017, it was discussed that secure quantum key
For a number of recent algorithmic developments we distribution based on Deutschs algorithm using an en-
mention the following. In 1993, the Bernstein-Vazirani tangled state [31]. Subsequently, a highly speedy secure
algorithm was published [16, 17]. This work can be con- quantum cryptography based on the Deutsch-Jozsa algo-
sidered an extension of the Deutsch-Jozsa algorithm. In rithm is proposed [32]. The relation between quantum
1994, Simons algorithm [18] and Shors algorithm [19] computer and secret sharing with the use of quantum
were discussed. In 1996, Grover [20] provides the high- principles is discussed [33].
est motivation for exploring the computational possi- The Bernstein-Vazirani algorithm determines bit
bilities oered by quantum mechanics. Implementation strings. It is extended to determining the values of a
of a quantum algorithm to solve the Bernstein-Vazirani function [34]. By using many parallel quantum systems,
parity problem without entanglement in an ensemble we can discuss many functions [29]. However, the values
quantum computer can be mentioned as an important of the functions are restricted in {0, 1}. Here, by ex-
quantum algorithm [21]. Fiber-optics implementation of tending it more, we present an algorithm of determining
the Deutsch-Jozsa and Bernstein-Vazirani quantum algo- the values of a function that are extended to the natural
2
where |a0 | is the absolute value of the constant and |rm | where K = {0, 1, 2, ..., d 1}N and z is (z1 , z2 , ..., zN ).
is the largest absolute value of the roots. Here the prob- Hence, for completeness, zK is a shorthand to the
lem is of searching the roots of the function by a query. compound sum
We introduce a positive integer d(> S). Throughout the
paper, we consider the modulo d. Assume the following . (11)
z1 {0,1,..,d1} z2 {0,1,..,d1} zN {0,1,..,d1}
N
After the N + 1 Fourier transforms on the state (6)
|f (S)|, ..., |f (1)|, |f (1)|, ..., |f (S)| } d 1 (3)
N
where f (j) {0, 1, ..., d 1}, and we dene
F |0 F |0 ... F |0 F |d 1 (12)
f (N ) = (|f (S)|, ..., |f (1)|, |f (1)|, ..., |f (S)|) (4) we have
where each entry of f (N ) is a natural number in the |x
|1 = | . (13)
modulo d. Here f (N ) {0, 1, ..., d 1}N . dN
xK
We dene ff (N ) (x) as follows
We introduce SU Mff (N ) (x) gate
ff (N ) (x) = f (N ) x mod d
|x |j |x |(ff (N ) (x) + j) mod d . (14)
= |f (S)|x1 + |f (1 S)|x2 + + |f (S)|xN mod d
Here
(5)
ff (N ) (x) = f (N ) x mod d. (15)
where x {0, 1, ..., d 1}N .
Let us follow the quantum states through the algo- We have
rithm. The input state is SU Mf (N )x |x | = f (N )x |x | . (16)
N
|0 = |0 |d 1 (6) In what follows, we will discuss the reasonable behind
of the above relation (16).
N
Now consider applying the SU Mf (N )x gate to the
N
where |0 means |0, 0, ..., 0 . state |x | . Each term in | is of the form dj |j .
We discuss the Fourier transform of |0 We see
d1 d1
y0 |y |y SU Mf (N )x dj |x |j
|0 = (7)
y=0 d y=0 d dj |x |(j + f (N ) x) mod d . (17)
3