Quantum state restoration and single-copy tomography

Given a single copy of a quantum state |ψ〉, the no cloning theorem greatly limits the amount of information which can be extracted from it. On the other hand, given only a procedure which verifies the state, for example access to a measurementM = {I−|ψ〉〈ψ|, |ψ〉〈ψ|}, even distinguishing I−|ψ〉〈ψ| from the identity takes exponential time. In this paper, we consider the scenario in which we are given both a single copy of |ψ〉and the ability to verify it. We show that taken together, these primitives enable us to efficiently learn about |ψ〉. In particular, for any POVM (even with non commuting operators) we give an algorithm which estimates its statistics on |ψ〉, in time polynomial in the number of operators. We show how this algorithm puts severe limitations on possible quantum money shcemes.

[1]  Scott Aaronson,et al.  Quantum Copy-Protection and Quantum Money , 2009, 2009 24th Annual IEEE Conference on Computational Complexity.

[2]  Isaac L. Chuang,et al.  Quantum Information And Computation , 1996 .

[3]  Chris Marriott,et al.  Quantum Arthur–Merlin games , 2004, Proceedings. 19th IEEE Annual Conference on Computational Complexity, 2004..

[4]  Yong Zhang,et al.  Fast amplification of QMA , 2009, Quantum Inf. Comput..

[5]  D. Poulin,et al.  Preparing ground States of quantum many-body systems on a quantum computer. , 2008, Physical review letters.

[6]  Stephen Wiesner,et al.  Conjugate coding , 1983, SIGA.

[7]  W. Hoeffding Probability Inequalities for sums of Bounded Random Variables , 1963 .

[8]  Avinatan Hassidim,et al.  Breaking and Making Quantum Money: Toward a New Quantum Cryptographic Protocol , 2009, ICS.

[9]  Gilles Brassard,et al.  Quantum Cryptography, or Unforgeable Subway Tokens , 1982, CRYPTO.