Editorial Board
Guidelines for Authors
QIC Online

Subscribers: to view the full text of a paper, click on the title of the paper. If you have any problem to access the full text, please check with your librarian or contact [email protected]   To subscribe to QIC, please click Here.

Quantum Information and Computation     ISSN: 1533-7146      published since 2001
Vol.10 No.7&8  July 2010 

Universal quantum computation in a hidden basis (pp0541-0561)
          
Lawrence M. Ioannou and Michele Mosca
         
doi: https://doi.org/10.26421/QIC10.7-8-1

Abstracts: Let |0> and |1> be two states that are promised to come from known subsets of orthogonal subspaces, but are otherwise unknown. Our paper probes the question of what can be achieved with respect to the basis {|0> , |1>}^{xn} of n logical qubits, given only a few copies of the unknown states |0> and |1>. A phase-invariant operator is one that is unchanged under the relative phase-shift |1> → e^{iθ} |1>, for any θ, of all of the n qubits. We show that phase-invariant unitary operators can be implemented exactly with no copies and that phase-invariant states can be prepared exactly with at most n copies each of |0> and |1>; we give an explicit algorithm for state preparation that is efficient for some classes of states (e.g. symmetric states). We conjecture that certain non-phase-invariant operations are impossible to perform accurately without many copies. Motivated by optical implementations of quantum computers, we define �quantum computation in a hidden basis� to mean executing a quantum algorithm with respect to the phaseshifted hidden basis {|0> , e^{iθ} |1>}, for some potentially unknown θ; we give an efficient approximation algorithm for this task, for which we introduce an analogue of a coherent state of light, which serves as a bounded quantum phase reference frame encoding θ. Our motivation was quantum-public-key cryptography, however the techniques are general. We apply our results to quantum-public-key authentication protocols, by showing that a natural class of digital signature schemes for classical messages is insecure. We also give a protocol for identification that uses many of the ideas discussed and whose security relates to our conjecture (but we do not know if it is secure).
Key words: quantum computation

��