Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
Wolfgang Dür∗
Institut für Theoretische Physik und Institut für Fachdidaktik, Bereich DINGIM,
Universität Innsbruck, Technikerstrasse 25, A-6020 Innsbruck, Austria
Stefan Heusler†
Institut für Didaktik der Physik, Universität Münster,
Wilhelm-Klemm Str. 10, D-48149 Münster, Germany
(Dated: December 6, 2013)
We present an approach for teaching quantum physics at high school level based on the sim-
plest quantum system - the single quantum bit (qubit). We show that many central concepts of
quantum mechanics, including the superposition principle, the stochastic behavior and state change
under measurements as well as the Heisenberg uncertainty principle can be understood using simple
mathematics, and can be illustrated using catchy visualizations. We discuss abstract features of a
qubit in general, and consider possible physical realizations as well as various applications, e.g. in
quantum cryptography.
arXiv:1312.1463v1 [physics.ed-ph] 5 Dec 2013
ϑ ϑ
|ψi = cos |0i + sin eiϕ |1i. (3)
2 2
The quantum state of a qubit can be visualized as a vec-
tor of length 1 on the Bloch sphere, see Fig. 2. The
angles ϑ, ϕ correspond to the polar and azimuthal angle
FIG. 1. Illustration of a classical bit. The two different states of spherical coordinates. The two basis states |0i and
0 and 1 are represented by the position of a ball (upper or |1i are represented by ϑ = 0 and ϑ = π, respectively,
lower shelf), or the orientation of a vector (up or down). pointing in +z [-z] direction (see Fig. 3). Notice that on
the Bloch sphere representation, orthogonal vectors are
antiparallel.
III. THE QUANTUM BIT (QUBIT)
A. States
Let us consider a second vector, |φi = γ|0i + δ|1i. Then, It is now straightforward to depict quantum superpo-
the scalar product in C2 is defined as hψ|Φi = α∗ γ + β ∗ δ, sition states. For ϑ = π/2 and ϕ = 0 [ϕ = π] one obtains
3
e.g. the states U |ψi. If one uses the bra-ket notation, one can write a
P1
1 unitary operation in the form U = i,j=0 uij |iihj|, where
|0x i = √ (|0i + |1i) (4) uij are the elements of the matrix.
2
A rotation with angle γ among an arbitrarily oriented
1
|1x i = √ (|0i − |1i), axis specified by a normalized vector a = (ax , ay , az )T is
2 given by
which point in ±x direction on the Bloch sphere (see Fig.
U = exp(iγσa ) = cos γ 1 + i sin γσa (5)
4).
where
σa = a · σ = ax σx + ay σy + az σz (6)
classical systems– not simply be determined or read out or |1x i (Eq. 4). Mathematically, this corresponds to
by a measurement. In case of a qubit, it is only pos- the measurement of the observable σx with eigenvectors
sible to determine one characteristic property with two |0x i, |1x i and eigenvalues +1, −1. If the initial state is
possible measurement values - for example whether the |0x i, then such a measurement yields the outcome +1
quantum system is in the state |0i or in the state |1i. In with probability 1, while now an initial state |0i leads to
general, the measurement result is random, and the the a probabilistic outcome. Again, the state of the system
measurement process will change the state of the system. after the measurement is given by |0x i for outcome +1,
Mathematically, such a measurement is described by and |1x i for outcome −1.
the observable σz , with possible measurement results In general, a measurement in an arbitrary basis is pos-
given by the eigenvalues +1 and −1 corresponding to the sible. The measurement is specified by two orthogonal
eigenvectors |0z i = |0i and |1z i = |1i. One of the two vectors |0a i, |1a i, the eigenvectors with eigenvalues +1
possible measurement results +1, −1 is obtained, i.e. one and −1 of an observable A. The observable is defined as
(classical) bit of information is learned. Notice that we
will sometimes denote the measurement result +1 also A = (+1)|0a ih0a | + (−1)|1a ih1a |, (11)
by 0 or |0i, and similarly the result −1 by 1 or |1i (re-
and we have A|0a i = |0a i, A|1a i = −|1a i. The probabil-
ferring to the associated state). The physical meaning of
ity to obtain the outcome +1 (corresponding to |0a i) or
the different measurement results depends on the physi-
−1 (corresponding to |1a i) is given by the scalar product
cal realization of the qubit (i.e. the basis states |0i, |1i),
with the initial state,
and will be specified in Sec. IV. If the initial state of the
system before the measurement is |0i [|1i], the measure- p0 = |h0a |ψi|2 , p1 = |h1a |ψi|2 . (12)
ment always yields the result +1 [−1] and the quantum
state remains unchanged. In this case, the qubit behaves From these formulaes it is immediately clear that states
like a classical bit. of the form eiγ |ψi are physically equivalent to the state
However, if the state of the qubit is initially given by |ψi, i.e. a global phase is unimportant for measurements.
the superposition state |ψi = α|0i + β|1i, upon measure- The state after the measurement either is given by |0a i,
ment, one obtains a random, unpredictable outcome of or by |1a i.
+1 (corresponding to the state |0i and labeled 0) or −1 We emphasize that since the measurement changes the
(corresponding to |1i, labeled 1). But quantum random- initial state to an eigenstate of the measured observable,
ness is not completely unpredictable: On the one hand, all information about the initial state are erased upon
for certain states the measurement result is deterministic. measurement. Therefore, subsequent measurements can-
For the z-measurement, this is the case for states |0i and not reveal additional information about the initial state.
|1i. On the other hand, even though we are not able to The total information gain for one qubit is hence re-
make any predictions on an individual event, the statisti- stricted to one classical bit of information.
cal behavior for repetitions of the experiment (i.e. state
preparation followed by measurement) can be predicted.
E. Visualization of the measurement process on the
The probability to obtain a certain measurement result
Bloch sphere
is given by
p0 = hψ|0ih0|ψi = |h0|ψi|2 = |α|2 , (10) The measurement process can be visualized using the
p1 = hψ|1ih1|ψi = |h1|ψi|2 = |β|2 . Bloch sphere picture. Notice that two orthogonal states
|0a i, |1a i lie on opposite points of the Bloch sphere, and
Notice that the probabilistic behavior of an individual together specify a direction a in space [? ]. For instance,
measurement is not due to limited information about the two states |0i, |1i lie on two opposite poles of the
the state as e.g. in classical statistical mechanics, but is Bloch sphere, pointing in ±z direction and specify the
an intrinsic feature of the quantum mechanical descrip- z-axis.
tion. Even if we knew the initial state, intrinsic random- We propose a slit oriented in some direction a for the
ness for individual events upon measurement emerges. illustration of the measurement axis, corresponding to
Thus, quantum mechanics can only provide statistical a measurement in the basis {|0a i, |1a i}. The standard
predictions, expressed in terms of probabilities for cer- measurement of σz corresponds to a slit in z-direction.
tain events when considering multiple repetitions of the If the initial state vector already points into the direc-
experiment. tion of the slit, it can simply pass through. We obtain
After the measurement, the state of the qubit has a deterministic outcome, and the state vector does not
changed and is no longer given by the initial superpo- change (see Fig. 6). If, however, the state vector is not
sition state. In particular, if the measurement result is parallel to the slit, it needs to be pushed through the slit
+1, then the state of the system after the measurement is and hence change orientation, pointing either in +z or −z
|0i. Similarly, if the measurement result is −1, the state direction afterwards. Hence the state of the system has
after the measurement is given by |1i. Again, this is in changed due to the measurement process. If the state is
sharp contrast to the behavior of classical systems. already close to +z direction, it is likely that it will point
in +z direction afterwards, i.e. the probability to obtain
the outcome +1 is close to 1. In turn, it is unlikely that
D. Measurements in a rotated basis the state is flipped all the way down to −z direction,
and hence the probability to obtain the outcome −1 is
It is also possible to measure alternative properties of small (see Fig. 7). For a state vector pointing e.g. in
the same initial state, e.g. whether it is in the state |0x i x-direction (|ψi = |0x i), it is equally likely to point in
5
tain the results |0i or |1i in approximately N/2 cases, alize these concepts and processes, a simple quantitative
analogous to the classical mixture and to the quantum description that only involves scalar products and two-
mixture discussed above. In fact, these ensembles are dimensional vectors can be introduced.
indistinguishable by z-measurements.
However, if we perform a x-measurement, we obtain
again a completely random outcome for each measure- IV. PHYSICAL REALIZATIONS OF A QUBIT
ment for the mixed quantum states (Fig. 9, third line).
The reason is that for both possible initial states |0i and A qubit is an abstract object, and we have treated it
|1i, the probability to obtain the results +1 and −1 when this way up to now to emphasize the quantum mechanical
performing an x-measurement is given by 1/2, i.e. the features, as compared to a classical bit. Many possible
outcomes are equally probable in both cases. This can physical realizations of a qubit exist, where we discuss
be easily visualized on the Bloch sphere representation, a number of examples in the following. For a treatment
where the slit is oriented along the x-direction, and the in class, we suggest to illustrate the abstract properties
state vector of both initial states |0i and |1i is perpen- of a qubit with help of several physical realizations. No-
dicular to the slit orientation. In contrast, for the pure tice that the different systems allow for a proper illustra-
state |0x i, we have a deterministic outcome, i.e. we ob- tion of certain aspects (states, measurement, operations),
tain with probability 1 the result |0x i (+1) (Fig. 9, fourth however none of the systems is free from possible mis-
line). The two situations are hence different: while for the conceptions or potential problems, which might occur in
classical mixture, we lack information about the ensem- classroom.
ble, leading to random outcomes for all measurements, in Qubits have been realized in the laboratory with many
the second situation the system is in a unique pure state. different systems, thereby experimentally confirming the
It posses the feature of pointing in +x direction (which strange quantum mechanical properties and the behav-
can be checked by a x-measurement). However, one can ior under measurements. Some of these systems show an
not assign the property to point in +z or −z direction to extraordinary controllability, and states, operations and
the quantum state before the measurement - when mea- measurements can be implemented with almost unit fi-
suring this property, one obtains a random outcome. We delity. In particular, experiments with single photons,
also remark that for classical bits, an x-measurement is atoms or ions are performed by various groups world-
not defined and hence impossible, as classical bits unlike wide, where the capability to manipulate light and matter
quantum bits do not show interference properties. at a microscopic level is clearly demonstrated [].
rors and an additional beam splitter to the set-up to form first proof of principle experiments are being pursued [23].
an interferometer. There, superposition and interference We remark that apart from using the polarization degree
play a central role, and in fact the superposition state is of freedom, there are a number of different ways to real-
restored at the output of the interferometer. ize a qubit with help of a single photon. This includes
When using polarization states to realize a qubit, one e.g. an encoding corresponding to time delays (time-bin
picks up a well-known concept from classical optics the photons), or the usage of different spatial modes (where
students are familiar with. On the one hand, this helps a photon in the left mode corresponds to state |0i, and in
to visualize not only basis states |Hi and |V i, but also the right mode to state |1i). Also the usage of microwave
superposition states such |0x i corresponding to 45◦ po- photons trapped in a cavity (cavity quantum electrody-
larized light or a 45◦ polarized photon. Furthermore, op- namics) should be mentioned [9, 10]. For the treatment in
erations and measurements are intuitive and transparent. class, nicely elaborated virtual experiments can be used
On the other hand, using the classical concept of polar- (see [6])
ization bears the danger that new quantum mechanical
features are not recognized and viewed as properties that
also classical objects (in this case a classical electromag-
netic wave) possess. In the classical case, however, one
deals not with single photons but with an electromag-
netic wave, where the typical quantum mechanical fea-
tures such us the behavior under measurements or the
quantization of the polarization degrees of freedom are
absent. Classical light described by an electromagnetic
wave is partly transmitted and partly deflected at a po-
larizing beam splitter, where only the amplitude of each
of the beams is decreased as compared to the incoming
beam. Only due to the quantization of light and the de-
scriptions in terms of single photons it is legitimate to
talk about a quantum object - a qubit, where one photon
is - before the measurement - transmitted and reflected
at the same time.
In addition, the Bloch sphere representation can be FIG. 10. Illustration of the measurement of the polarization
misleading and might easily lead to confusion when not degree of freedom of a single photon. The polarizing beam
properly discussed. On the Bloch sphere representation, splitter leads to a transmission of horizontally polarized pho-
tons, while vertically polarized photons are reflected by the
orthogonal vectors are antiparallel (e.g. horizontal and
beam splitter. Photons are detected at both branches with
vertical polarization correspond to a Bloch vector in pos- help of single-photon detectors, where only one of the two
itive or negative z-direction), while polarization vectors detectors will register a photon. This corresponds to a z-
corresponding to orthogonal states (e.g. horizontal and measurement. i.e. measurement of the observable σz .
vertical polarization) are orthogonal in the laboratory,
enclosing an angle of 90◦ . The origin of these difficul-
ties lies in the definition of the angle ϑ/2 in the abstract
Bloch sphere representation, which is perfectly suited to
describe other systems such as spins, and also allows for a
simple pictorial representation of the measurement pro-
cess with help of slits. Notice that all possible polar-
ization states of a single photon can be described on the
Bloch sphere representation, including e.g. circular polar-
ized photons described by |0y i = √12 (|0i ± i|1i) pointing
in ±y direction on the Bloch sphere (see Fig. 11).
Experiments with single photons are very advanced.
Production, manipulation and transmission of single pho-
tons can be achieved with high accuracy, thereby nicely
illustrating quantum mechanical features. The detection
of single photons has also been significantly improved in
recent years, however non-unit efficiency and dark counts
still pose a problem in certain experiments, e.g. for loop-
hole free tests to violate Bell inequalities. In quantum
communication and quantum cryptography, the realiza- FIG. 11. Comparison of Bloch sphere representation for spin
tion of qubits with the help of photons plays an impor- and photon. While the orientation of the spin is given by the
tant role, because they are perfectly suited for transmis- orientation of the Bloch vector, orthogonal polarization states
such as |Hi and |V i are antiparallel on the Bloch sphere rep-
sion of quantum information via optical fibers or even
resentation. A 45◦ polarized photons corresponds to a Bloch
free space. Experiments implementing quantum commu- vector in ±x direction, while circular polarized photons are
nication or establishing entangled photons over distances described by a Bloch vector in ±y direction.
of more than 100km have been performed, and proposals
for satellite-based quantum communication together with
8
B. Spin of a particle
possible.
However, it is possible to determine an unknown state
with arbitrary precision if an ensemble of N identically
prepared copies of the unknown quantum state |ψi is
available. If we perform a z-measurement on each of
the N independent copies, we obtain a sequence of N
independent measurement results corresponding to the
probability distribution {p0 , p1 }. From the statistics of
obtained measurement results, one can then determine
the parameter ϑ. To this aim, one calculates the relative
frequency of measurement results,
N0 (+1) + N1 (−1)
, (14)
N
where measurement results are specified by the eigenval-
FIG. 15. Realization of a qubit using electronic states of an
ion or atom (atomic level scheme). The state |0i corresponds
ues +1 (which was obtained N0 times) and −1 (which
to the occupation of the S1/2 level, while the state |1i corre- was obtained N1 times), and N = N0 + N1 . For large N ,
sponds to the occupation of the D5/2 level. A measurement is the relative frequency approaches the expectation value,
realized by scattering laser light on the S1/2 − P1/2 transition.
ϑ ϑ
hσz i|ψi = p0 (+1) + p1 (−1) = cos2 − sin2 = cos ϑ,
2 2
(15)
V. APPLICATIONS where the variance and thus the measurement precision
√
scales as 1/ N . By choosing N large enough, one can
In the following, we will discuss a number of applica- determine ϑ with desired (arbitrary) precision.
tions to illustrate the principles discussed in the previous To obtain information about the parameter ϕ, mea-
sections. Our focus of interest lies at the behavior of the surements on additional copies in a different basis, e.g.
system under measurements. We will consider fundamen- x-basis, are required. The probability to find the state
tal aspects, including the possibility to determine or copy |0x i (corresponding to measurement result +1) when per-
an unknown quantum state, as well as a (qualitative) dis- forming an x-measurement is given by
cussion of Heisenbergs uncertainty relation. Finally, we
describe an application in the context of quantum cryp- 1 ϑ ϑ
p0 = |hψ|0x i|2 = | cos + sin eiϕ |2 . (16)
tography, i.e. the secure transmission of secret messages. 2 2 2
It follows that the expectation value of the observable σx
is given by
A. State tomography
hσx i|ψi = p0 (+1) + p1 (−1) = cos ϕ sin ϑ. (17)
Due to the behavior of a quantum system under mea-
surements, it is impossible to determine the state of an If the value of ϑ is already known from previous measure-
(unknown) qubit completely. Any measurement does ments, one can then determine the value of ϕ from the
only yield one classical bit of information, the answer relative frequencies of x-measurements. Note, however,
to a single yes/no question. The state of the system is that ϕ is not uniquely determined (recall that ϕ ∈ [0, 2π),
changed due to the measurement, and hence no further where sin is not bijective). To completely determine ϕ
information about the initial state of the system can be and hence the quantum state, an additional measurement
obtained by subsequent measurements. To illustrate this, sequence is required, e.g. y-measurements.
we consider an unknown qubit in state (see Fig. 2) If we consider the problem to determine an unknown
quantum state on the Bloch sphere representation, one
ϑ ϑ needs to figure out the orientation of the state vector
|ψi = cos |0i + sin eiϕ |1i. (13)
2 2 in space. To this aim, it is sufficient to determine the
projections of the vector onto the x,y and z-axes. This
A z-measurement yields with probability p0 = cos2 ϑ2 the corresponds exactly to the expectation values of the ob-
result +1, and with probability p1 = sin2 ϑ2 the result servables σx , σy and σz , respectively. This can be verified
−1. After the measurement, the state of the qubit is by calculating the expressions for the expectation values
given by |0i or |1i respectively, and does no longer con- (see Eqs. (17) and (15)), and comparing them with the
tain any information on the parameters ϑ and ϕ (see Fig. length of the projections of the Bloch vector, i.e. the
7). In addition, the measurement result does not provide absolute values squared of the spherical coordinates.
us with the full knowledge about these parameters: On In Fig. 16 the complete measurement process for quan-
the one hand, the measurement result does not depend tum state tomography is illustrated. The orientation of
on the parameter ϕ, so no information about this param- the slit in z-direction corresponds to the measurement of
eter is obtained at all. On the other hand, the probability the observable σz . That is, if we observe the state vector,
to obtain a certain outcome depends on ϑ, however the our view is restricted to a single dimension - for example,
outcome is random, and can only guess about the ini- the z-axes. The measurement result +1 is visualized by
tial state. Only the state orthogonal to the measurement , the result −1 by . By counting the number of black
result can be excluded - all other states are in principle and white boxes, the projection of the Bloch vector on
11
single photons, one can talk about a quantum effect. At erty |0x i (+1 in x-direction) is completely determined.
this level, it is a purely classical wave effect (see also dis- A measurement of the observable σz in contrast yields
cussion in Sec. IV A). However, also here the interaction a completely random outcome - the state |0x i does not
with the filter (i.e. the "measurement") change the state possess the property |0i or |1i - this property is undeter-
of the system. mined and cannot be associated with the system. That
is, a qubit cannot have the properties |0i and |0x i at
the same time. On the Bloch sphere picture, this is ex-
pressed by the fact that if the state vector points in a
certain direction (e.g. along the positive x-axes), then
the property "pointing up" or "pointing down" are not
specified, and similarly for pointing in ±y-direction (cor-
responding to a σy measurement). Notice that after the
z-measurement, the state of the qubit has however the
(fixed) property of pointing in +1 or −1 z-direction, as
the measurement gives a random but fixed outcome, and
the state has changed. However, then the property of
pointing in +x direction is no longer present.
Formally, this is reflected in the expectation value and
variance of the state for the different measurements:
hσx i|0x i = 1; V (σx )|0x i = 0,
FIG. 18. A filter can be realized by blocking one branch of a hσz i|0x i = 0; V (σz )|0x i = 1. (20)
Stern-Gerlach measurement device. Blocking e.g. the upper
branch, only particles in state |1i after the measurements can We have used that
pass. A qubit prepared in |0i will never pass the filter.
V (σa )|ψi = h(σa − hσa i)2 i|ψi
= hσa2 i|ψi − hσa i2|ψi
= 1 − hσa i2|ψi (21)
The variance measures the fluctuations around the ex-
pectation value. No variance, V = 0, means that there
are no fluctuations and one can assign a fixed value to the
corresponding property. In turn, if the variance is large,
no fixed value can be assigned, and the observable is un-
determined prior to the measurement. This now implies
that if one can assign a fixed (”sharp”) value to one of
the observables (i.e. the variance is 0 and the property
with respect to this observable is fixed), the variance of
the second (complementary) observable is large, and its
value is not determined. For the observables σx and σz
this is not only true for the specific state |0x i, but for any
state |ψi: there exists no state |ψi such that the variance
FIG. 19. Sequence of measurements in different measurement with respect to both observables is small. In this sense,
bases. Adding an additional filter oriented in x-direction (i.e. the observables σx and σz (and also σy ) are complemen-
only states |1x i can pass) before the z-filter described in Fig. tary.
18, a qubit can pass the two filters with probability 1/4, even This corresponds to the same situation as in the fa-
though it can not pass without the additional filter. mous Heisenberg uncertainty relation for the variances
of position and momentum, which can be quantified by
∆x∆p ≥ ~/2, where ∆x = V (x). Also in this case,
p
Notice that the uncertainty relation also holds for other difficulty to compute certain functions or perform certain
complementary variables, where the above mentioned ex- tasks, e.g. calculating the prime factors of a large number
planation using Fourier transform is not applicable. (factoring problem). Notice that precisely this problem
can be solved efficiently with help of a quantum com-
puter, rendering classical cryptographic systems insecure
E. Random number generators once a quantum computer could be build.
In the BB84 protocol single qubits are transmitted
The generation of true randomness, i.e. sequences of from Alice to Bob, and subsequently measured. To this
(truly) random numbers- is of fundamental importance aim, Alice (randomly) selects a bit value j ∈ {0, 1},
for many technical and scientific applications, e.g. for nu- and also randomly a basis α ∈ {x, z}. She prepares
merical simulations. In many cases, so-called pseudo ran- the qubit in the state |jα i, i.e. one of the four states
dom number generators are used, which produce random {|0i, |1i, |0x i, |1x i}. Bob randomly selects a measurement
numbers following certain algorithms. This is, however, basis β ∈ {x, z} and performs a measurement in the
not sufficient for many applications. The measurement β-basis (observable σβ ) on the received qubit. If the
of a single qubit offers the possibility to obtain true ran- measurement basis coincides with the preparation ba-
dom bits and hence true random numbers. To this aim, sis, i.e. α = β, Bob obtains a deterministic outcome,
a qubit is prepared in the state |0x i and measured in the |jβ i, from which he can determine the bit value j. For
z-basis (observable σz ). This yields a completely random β 6= α, the measurement result is random. For example,
outcome. Such quantum random number generators can if α = x and j = 0, the state |0x i is transmitted, and a
be commercially purchased [20]. z-measurement (β=z) leads to outcome |0i and |1i with
probability p0 = p1 = 1/2.
Now a total of N random qubits are transmitted to
Bob, who measures each of the qubits. In each round,
F. Quantum cryptography - BB84 protocol
the bit value j and the preparation bases α are randomly
and independently selected by Alice, and also Bob ran-
In this section, we will discuss a modern practical appli- domly selects the measurement basis β in each round.
cation of single qubits in the context of quantum cryptog- Afterwards, the used bases α and β are revealed through
raphy [22]. The aim is the secure transmission of secret a public channel. That is, this information is available
messages from a sender (Alice) to a receiver (Bob). The to an eavesdropper. However, only the preparation and
transmission of single qubits across a quantum channel measurement bases are revealed - not the prepared or
is used to establish a secret key —a sequence of random measured bit value j. If α = β in a specific round, than we
bits that are only known to Alice and Bob, but not to know from above considerations that Bobs measurement
any adversary. Using these random bits, a message of result coincides with the prepared state, i.e. Alice and
the same length as the secret key can be securely trans- Bob share a random bit j. That is, after N rounds Alice
mitted using the so-called one time pad. The random and Bob share a sequence of approximately Ñ ≈ N/2
bits are first added to the message bits (modulo 2) at random bits. As a final check, Alice and Bob randomly
the sender, and after transmission the same random bits select M of theses bits and compares the bit values over
are subtracted by the receiver. Adding random numbers the public channel. If all of these M bits coincide, Alice
washes out any structure of the initial message, as the and Bob can deduce that an eavesdropper can only have
resulting bit sequence is still completely random. Hence gained an (exponentially) small amount of information on
decryption schemes that makes use of the structure in their sequence of random bits. The remaining Ñ −M bits
the message fail, and in fact it can be shown that such can then be used as a random bit string, i.e. as a key for
a transmission is provably secure if the parties share a cryptography and hence to securely transmit secret infor-
random key of the same length as the message. mation. If many of the selected bits do not coincide, one
To establish such a secret key, several schemes have has to assume that an eavesdropper has interfered with
been proposed whose security is based on physical prin- the transmission, and has potentially learned information
ciples of quantum mechanics. We will discuss the BB84 about the whole bit string. In this case, the protocol is
protocol, named after its inventors C. Bennett and G. aborted and no message is transmitted. Notice that only
Brassard. The security of the protocol is based on the fact the generation of the key failed, and the eavesdropper
that any attempt to reveal information about a transmit- does not possess parts of the message.
ted quantum system involves a measurement, and hence We now discuss the security of the protocol. To this
leads to change of the transmitted state (as long as the aim, we consider different eavesdropping strategies.
measurement direction does not coincide with the state The first (extremal) strategy for the eavesdropper Eve
of the qubit). This change of the state can be detected is to do nothing and simply guess the bit value. For
and allows one to detect the presence of an eavesdropper. each bit, the correct value is guessed with probability
In addition, it is impossible to clone the state of a single 1/2, while Alice and Bob clearly do not detect anything.
qubit, or to determine its unknown state if only a single However, the probability to correctly guess the correct
copy is available. These aspects can be used to design
value of the whole bit string is given by p = (1/2)Ñ , i.e.
a protocol where the security of the scheme is guaran-
is exponentially small.
teed by the laws of nature —more precisely by the be-
Another possible strategy is that Eve stores all trans-
havior of quantum systems under measurements. This is
mitted qubits until Alice and Bob reveal the used prepa-
in stark contrast to classical cryptographic schemes such
ration basis, and simply send different qubits in a (ran-
as the widely used RSA-encryption, whose security are
domly) selected state to Bob. In this case, Eve learns the
based on (unproven) assumptions on the complexity or
14
bit value of each qubit, and hence the whole bit string. fect measurement devices. In experimental realizations,
However, when Bob performs a measurement on the re- this is however not the case: laser diodes do not pro-
ceived qubit, the bit value he obtains will only with prob- duce single photon states, but with a certain probability
ability p = 1/2 correspond to the transmitted value by also multi-photon states following a Poissonian distribu-
Alice. That is, in the control step, many of the checked tion. This can be used for so-called Trojan-horse attacks,
bits will not coincide. In fact, the probability that all of where the additional degrees of freedom are used to un-
them coincide is given by p = (1/2)M , and hence Eve will dermine security. Furthermore, the current technologi-
be detected with probability 1 − (1/2)M . cal implementation of single photon detectors allows for
An intermediate strategy consists of performing a mea- eavesdropping strategies, where the detectors are effec-
surement in a randomly selected basis γ ∈ {x, z} on each tively controlled from the outside by strong light beams
of the qubits once it is transmitted - this is called an [21]. These technological problems can be solved in prin-
individual attack. The method resembles the scenario ciple. From a theoretical point of view, new strategies
described in Fig. 19. If Eve guesses correctly, i.e. γ = α, are developed that are known under the name of ”device
she learns the bit value and the measurement does not independent quantum cryptography” which aim at mini-
change the transmitted state. Hence in this case, Eve will mizing the requirements for the technological implemen-
also not be detected in the control step. However, if Eve tation. Its worth mentioning that quantum-cryptography
measures in the wrong basis, i.e. γ 6= α (which happens systems based on the BB84 protocol are already commer-
with probability 1/2), the transmitted state is changed. cially available and under use in financial industry [20].
For example, if |0x i was transmitted, and Eve measures
in the z-basis, the state after the measurement is given
by |0i or |1i. In both cases, Bob will obtain a random VI. SUMMARY AND CONCLUSIONS
outcome if he performs an x-measurement. That is, with
probability 1/2 he will obtain the correct bit value, how-
ever with probability 1/2 he will obtain the wrong value In this article, we discussed the simplest quantum me-
- which will subsequently be detected in the control step. chanical system -the qubit- in full detail. As shown in
In turn, since Eves measurement result is random, she the text, many of the central concepts and principles
will guess the correct bit value with probability 1/2. In of quantum mechanics can be illustrated using a single
total, if Eve uses this strategy, she will learn the correct qubit. This approach involves no complex mathematical
bit value with probability p = 3/4, while Bob will obtain descriptions or advanced mathematics –e.g. wavefunc-
the wrong bit value with probability perror = 1/4 (notice tions and Schrödinger equation, Hilbert spaces etc. It
that both branches, γ = α and γ 6= α occur with proba- suffices to consider simple vectors for a quantitative de-
bility 1/2). Thus Eve knows the correct bit string with scription. Perhaps more importantly, we put forward a
qualitative description based on simple visualizations on
probability (3/4)Ñ , while the probability that an error is the Bloch sphere. With this approach, not only the su-
detected in the control step is given by perposition principle, but also the strange behavior of
M quantum systems under measurements can be described
3 and illustrated. Furthermore, the differences to classical
M
1 − (1 − perror ) =1− . (22)
4 physics can be highlighted.
We do not restrict ourselves to a single, specific physical
If M is sufficiently large, the eavesdropping attempt will realization of a qubit. In our approach, we introduce the
be detected with almost certainty. qubit as an abstract object, and only later discuss differ-
Notice that the security cannot only be shown for above ent physical realizations. We have discussed advantages
mentioned strategies, but in fact for any strategy, includ- and potential problems which might occur in class, when
ing strategies that involve the storage and joint measure- the qubit is introduced as abstract object on the Bloch
ment of all qubits. Any information gain of Eve leads sphere. A careful analysis of the features of a qubit does
to a change of the transmitted states, i.e. an error in not only allows for a discussion of fundamental concepts
bit value obtained by Bob. This error can then be ex- such as Heisenbergs uncertainty principle, but also for
ponentially amplified and hence detected in the control the treatment of modern (technological) applications in
step by checking a sufficiently large number M of bits. quantum information theory and quantum communica-
In turn, one can conclude that if the number of errors is tion. We hope that we could illustrate with our approach
sufficiently small, (almost) no information of the overall the possibility to make students familiar with some of
bit string is known to Eve. A secure transmission of the the basic principles of one of the most important –but
message is hence possible. also most counter-intuitive– physical theories to date -
One should stress that we have considered a some- quantum mechanics, avoiding advanced mathematics or
what idealized scenario here. On the one hand, one as- mythical jargon.
sumes perfect quantum channels, which in reality will
however be noisy, and errors induced by channel noise are
indistinguishable from possible eavesdropping attempts.
There are however strategies —e.g. making use of classi- ACKNOWLEDGEMENTS:
cal privacy amplification—, which allow one to deal with
such situations if the channel noise is sufficiently small We thank Dipl. Des. Michael Tewiele for the pictures.
(≈ 10%). On the other hand, we have assumed in the Note added: A german version of this article was pub-
analysis that we are dealing with perfect qubits and per- lished in [25].
15
[1] R. Müller, H. Wiesner, “Teaching Quantum Mechan- clusters and molecules”, Rev. Mod. Phys. 84, 157 (2012).
ics on an Introductionary Level”, American Journal [15] H. Häffner, C.F. Roos and R. Blatt, “Quantum computing
of Physics 70, 200 (2002) . Links (websites in ger- with trapped ions”, Physics Reports 469, 155-203 (2008).
man): Münchener Internetprojekt zur Lehrerfortbildung [16] David J. Wineland, “Nobel Lecture: Superposition, en-
in Quantenmechanik, http://homepages.physik.uni- tanglement, and raising Schrödinger’s cat”, Rev. Mod.
muenchen.de/milq/ bzw. http://milq.tu-bs.de/ Phys. 85, 1103 (2013).
[2] G. Pospiech, “Teaching quantum theory - between the [17] DVD-ROM "Quantendimensionen - Doppelspalt, Ver-
photoelectric effect and quantum information”, Proced- schränkung, Quantencomputer", Klett Verlag & Science-
ding of the GIREP08 conference. motion, (2010). (german).
[3] L. D. Carr and S. B. McKagan, “Graduate quantum [18] W.K. Wootters and W.H. Zurek, “A Single Quantum
mechanics refor”, American Journal of Physics 77, 308 Cannot be Cloned”, Nature 299, 802-803 (1982).
(2009). [19] J. M. Taylor, H.-A. Engel, W. Dür , A. Yacoby, C. M.
[4] Art Hobson, “Teaching Quantum Physics Without Para- Marcus, P. Zoller, and M. D. Lukin, “ Fault-tolerant
doxe”, The Physics Teacher 45, 96 (2007). architecture for quantum computation using electrically
[5] C. Baily and N. D. Finkelstein, “Interpretation in Quan- controlled semiconductor spins", Nature Physics 1, 177
tum Physics as Hidden Curriculum”, AIP Conference (2005).
Proceedings 1289, 69 (2010). [20] see e.g. http://www.idquantique.com/ or
[6] Quantum Lab, www.quantumlab.de, Universität Erlan- http://www.magiqtech.com/
gen, Didaktik der Physik, AG J.-P. Meyn [21] L. Lydersen, C. Wiechers, C. Wittmann, D. Elser, J.
[7] M. A. Nielsen and I. L. Chuang, Quantum Computation Skaar, and V. Makarov, “Hacking commercial quantum
and Quantum Information (Cambridge University Press, cryptography systems by tailored bright illumination”,
2010). Nat. Photonics 4, 686 (2010); Valerio Scarani, Christian
[8] J. Mompart, K. Eckert, W. Ertmer, G. Birkl, and M. Kurtsiefer , “The black paper of quantum cryptography:
Lewenstein, “Quantum Computing with Spatially Delo- real implementation problems”, E-print: arXiv:0906.4547
calized Qubits”, Phys. Rev. Lett. 90, 147901 (2003), [22] N. Gisin and R. Thew, “Quantum communication”, Na-
[9] J.-M. Raimond, M. Brune and S. Haroche, “Manipulat- ture Photon. 1, 165-171 (2007); N. Gisin, G. Ribordy, W.
ing quantum entanglement with atoms and photons in a Tittel and H. Zbinden, “Quantum cryptography”, Rev.
cavity”, Rev. Mod. Phys. 73, 565-582 (2001). Mod. Phys. 74, 145-195 (2002).
[10] Serge Haroche, “Nobel Lecture: Controlling photons in a [23] T. Jennewein and B. Higgins, “The quantum space race”,
box and exploring the quantum to classical boundary”, Physics World March 2013, 52 (2013). I. Marcikic et al.,
Rev. Mod. Phys. 85, 1083 (2013). “Long-distance teleportation of qubits at telecommunica-
[11] D. Leibfried et. al, “Creation of a six-atom Schrödinger tion wavelengths”, Nature 421, 509-513 (2003); I. Mar-
cat state”, Nature 438, 639-642 (2005); T. Monz et cikic, A. Lamas-Linares and C. Kurtsiefer, “Free-space
al., “14-Qubit Entanglement: Creation and Coherence”, quantum key distribution with entangled photons”, Appl.
Phys. Rev. Lett. 106, 130506 (2011). Phys. Lett. 89, 101122 (2006); X.-M. Jin et al, “Exper-
[12] S. Gröblacher et al., “Demonstration of an ultracold imental free-space quantum teleportation”, Nature Pho-
micro-optomechanical oscillator in a cryogenic cavity”, ton. 4, 376-381 (2010); X.-S. Ma et al., “Quantum tele-
Nature Phys. 5, 485 (2009), D. O’Connell et. al, “Quan- portation over 143 kilometres using active feed-forward”,
tum ground state and single-phonon control of a mechan- Nature 489, 269-273 (2012); Y. Yin et al, “Experimen-
ical resonator”, Nature 464, 697 (2010); F. De Martini, tal Single-Photon Transmission from Satellite to Earth”,
F. Sciarrino, and C. Vitelli, “Entanglement Test on a E-print: arXiv:1306.0672;
Microscopic-Macroscopic System”, Phys. Rev. Lett. 100, [24] I. Bloch, “Quantum coherence and entanglement with ul-
253601 (2008); tracold atoms in optical lattices”, Nature 453, 1016-1022
[13] F. Fröwis and W. Dür, “Measures of macroscopicity for (2008).
quantum spin systems”, New J. Phys. 14, 093039 (2012). [25] Wolfgang Dür und Stefan Heusler, “Was man vom einzel-
[14] K. Hornberger, S. Gerlich, P. Haslinger, S. Nimmrichter nen Qubit über Quantenphysik lernen kann”, PhyDid A
and M. Arndt, “Colloquium: Quantum interference of - Physik und Didaktik in Schule und Hochschule, Nr. 11,
Band 1 (2012).