Overview
Course Overview
This course offers an in-depth introduction to Quantum Information Science, intended for upper-level undergraduate and graduate students in computer science, physics, electrical and computer engineering, or related fields. Due to the advanced material, a solid understanding of linear algebra, calculus, and probability and statistics is necessary.
We begin by examining the fundamental concepts of quantum mechanics relevant to information science, such as qubits, superposition, entanglement, and quantum gates. Students will learn to represent and manipulate quantum information mathematically and understand its physical interpretations. The course then explores key quantum algorithms, including Grover's algorithm for database search and Shor's algorithm for integer factorization, with practical implementations using tools like Qiskit. Furthermore, we explore topics such as quantum error correction methods, quantum hardware platforms, and quantum complexity theory.
In the latter part of the course, we focus on applications. We study quantum communication protocols, quantum networks, and quantum cryptography, including quantum key distribution protocols like BB84. The course also addresses the vulnerabilities of classical cryptography in the quantum era and introduces post-quantum cryptographic algorithms. We conclude with an introduction to quantum machine learning and a discussion of contemporary quantum technologies and their potential impact.
Why Quantum Information Science (QIS)?
Quantum Information Science sits at the forefront of technological innovation, with the potential to fundamentally transform computing, communication, and cryptography. As classical computing nears its physical and theoretical limits, quantum computing offers a new paradigm by utilizing quantum mechanical phenomena to perform computations beyond classical capabilities. Gaining expertise in Quantum Information Science enables students to contribute to this rapidly advancing field.
Advancements in quantum algorithms promise breakthroughs in solving complex problems in cryptography, optimization, and materials science that are currently intractable for classical computers. Quantum communication facilitates secure information transfer, which is vital for future cybersecurity. Proficiency in quantum error correction and hardware development is essential for building practical and scalable quantum computers.
The demand for professionals skilled in quantum technologies is growing swiftly in both academia and industry. By studying Quantum Information Science, students position themselves at the cutting edge of research and development, prepared to address challenges and drive innovation in a field with significant societal and technological impact.
Course Objectives
- Understand fundamental quantum mechanics and mathematical foundations
- Grasp the basic principles of quantum mechanics relevant to information processing.
- Use mathematical tools such as linear algebra and density matrices to represent and manipulate quantum states.
- Analyze and implement quantum algorithms
- Study key quantum algorithms, including Grover's and Shor's algorithms, and understand their computational advantages over classical algorithms.
- Learn quantum error correction techniques and their importance in preserving quantum information.
- Gain insight into quantum hardware platforms and relevant computational complexity classes.
- Explore quantum communication and cryptography
- Examine quantum communication protocols and the fundamentals of quantum networks.
- Understand quantum cryptography, including the No-Cloning Theorem, and implement quantum cryptographic protocols.
- Investigate post-quantum cryptographic algorithms and assess the impact of quantum computing on classical cryptography.
- Engage with advanced topics in quantum information science
- Learn about quantum machine learning concepts and their potential applications.
- Discuss contemporary quantum technologies and their implications for science and industry.
- Develop practical skills through hands-on experience
- Participate in laboratory exercises and projects that apply theoretical concepts in practical settings.
- Collaborate on group projects to investigate specific topics in quantum information science, integrating theoretical and practical aspects.
Course Learning Outcomes
- Apply fundamental quantum principles and mathematical methods
- Represent and manipulate quantum information using the principles of quantum mechanics.
- Utilize linear algebra and density matrices to describe and analyze quantum states.
- Implement and analyze quantum algorithms
- Implement quantum gates and circuits using quantum computing frameworks.
- Develop and execute quantum algorithms, such as Grover's and Shor's algorithms, and compare their performance with classical algorithms.
- Explain quantum error correction codes and their role in preserving quantum information.
- Comprehend quantum hardware and computational complexity
- Describe various quantum hardware platforms.
- Understand computational complexity classes relevant to quantum computing.
- Explore quantum communication and cryptography
- Evaluate quantum communication protocols and discuss quantum networks.
- Implement quantum cryptographic protocols, including quantum key distribution schemes, and analyze their security features.
- Assess the impact of quantum computing on classical cryptography and explore post-quantum cryptographic solutions.
- Develop practical and collaborative skills
- Engage in laboratory exercises that apply theoretical knowledge in practical contexts.
- Collaborate effectively on group projects in quantum information science.
Prerequisites
Students are expected to have the following backgrounds or equivalents:
- Mathematics Pre-Requisites:
- Linear Algebra, Precalculus (MATH 1508), Calculus (MATH 1411 & MATH 1312), Discrete Mathematics (MATH 2300), Probability and Statistics (STAT 3320)
- Computer Science Pre-Requisites:
- Programming (CS 1101, CS 3331, CS 3360), Data Structures and Algorithms (CS 2302, CS 2401)
- Optional:
- Introduction to Cryptography, Introduction to Quantum Mechanics or Modern Physics, and Data Communication and Networking
Honor Code and Academic Integrity
Permissive but strict. If unsure, please ask the course staff!
- OK to search for information and ask questions publicly about the systems we’re studying.
- Always cite all resources you reference, including papers, online articles, and any information obtained from AI tools.
- When using AI tools, include a link to your tool's search history (e.g., share your ChatGPT workspace) and mention this in your reports, labs, and final projects.
- If you engage in public discussions, such as on Reddit, include the link to the discussion.
- NOT OK to copy solutions directly from AI tools or other sources.
- Solutions should be your original work, reflecting your understanding and analysis.
- NOT OK to ask someone else to complete your assignments, labs, or projects.
- Academic integrity requires that all submitted work is your own.
- OK to discuss questions and ideas with classmates.
- Collaborative learning is encouraged, but you must disclose your discussion partners in your submissions.
- NOT OK to copy solutions from classmates.
- While discussion is permitted, all submitted work must be completed independently.
- OK to incorporate existing solutions as part of your projects or assignments.
- Properly cite these solutions and clearly distinguish your contributions from those of others.
- NOT OK to present someone else’s solution as your own.
- Always attribute credit where it is due, and clearly identify your original work.
- OK to publish your final project after the course is over.
- We encourage you to share your work with the broader community, contributing to the field's body of knowledge.
- NOT OK to post your assignment solutions online during or after the course.
- This protects the integrity of the course for future students and maintains academic standards.
As an institution of higher learning, UTEP expects its students to uphold honesty and ethical behavior in all academic endeavors. This is especially important when submitting work for evaluation in any course or degree requirement. Students are strongly encouraged to adhere to the UTEP Standards of Student Conduct and Academic Integrity.
Audit Policy
We welcome auditing requests from UTEP students and staff. As an auditor, you will have access to all course lectures but will not receive grades for labs, homework, or final projects. Due to limited resources, we are unable to provide feedback on assignments or projects for auditors. If you are interested in auditing this course, please contact the Computer Science department to make the necessary arrangements.
Please note that external requests for auditing will not be considered, as the course is conducted in-person on campus.
All course materials, including lecture slides, detailed notes, assignments, and final project instructions, will be made publicly available on the course website for your reference.
Reference Resources
The course does not require any textbook but feel free to review these resources.