-
How Well Can Reasoning Models Identify and Recover from Unhelpful Thoughts?
Authors:
Sohee Yang,
Sang-Woo Lee,
Nora Kassner,
Daniela Gottesman,
Sebastian Riedel,
Mor Geva
Abstract:
Recent reasoning models show the ability to reflect, backtrack, and self-validate their reasoning, which is crucial in spotting mistakes and arriving at accurate solutions. A natural question that arises is how effectively models can perform such self-reevaluation. We tackle this question by investigating how well reasoning models identify and recover from four types of unhelpful thoughts: uninfor…
▽ More
Recent reasoning models show the ability to reflect, backtrack, and self-validate their reasoning, which is crucial in spotting mistakes and arriving at accurate solutions. A natural question that arises is how effectively models can perform such self-reevaluation. We tackle this question by investigating how well reasoning models identify and recover from four types of unhelpful thoughts: uninformative rambling thoughts, thoughts irrelevant to the question, thoughts misdirecting the question as a slightly different question, and thoughts that lead to incorrect answers. We show that models are effective at identifying most unhelpful thoughts but struggle to recover from the same thoughts when these are injected into their thinking process, causing significant performance drops. Models tend to naively continue the line of reasoning of the injected irrelevant thoughts, which showcases that their self-reevaluation abilities are far from a general "meta-cognitive" awareness. Moreover, we observe non/inverse-scaling trends, where larger models struggle more than smaller ones to recover from short irrelevant thoughts, even when instructed to reevaluate their reasoning. We demonstrate the implications of these findings with a jailbreak experiment using irrelevant thought injection, showing that the smallest models are the least distracted by harmful-response-triggering thoughts. Overall, our findings call for improvement in self-reevaluation of reasoning models to develop better reasoning and safer systems.
△ Less
Submitted 12 June, 2025;
originally announced June 2025.
-
Adaptive Syndrome Extraction
Authors:
Noah Berthusen,
Shi Jie Samuel Tan,
Eric Huang,
Daniel Gottesman
Abstract:
Device error rates on current quantum computers have improved enough to where demonstrations of error correction below break-even are now possible. Still, the circuits required for quantum error correction introduce significant overhead and sometimes inject more errors than they correct. In this work, we introduce adaptive syndrome extraction as a scheme to improve code performance and reduce the…
▽ More
Device error rates on current quantum computers have improved enough to where demonstrations of error correction below break-even are now possible. Still, the circuits required for quantum error correction introduce significant overhead and sometimes inject more errors than they correct. In this work, we introduce adaptive syndrome extraction as a scheme to improve code performance and reduce the quantum error correction cycle time by measuring only the stabilizer generators that are likely to provide useful syndrome information. We provide a concrete example of the scheme through the [[4,2,2]] code concatenated with a hypergraph product code and a syndrome extraction cycle that uses quantum error detection to modify the syndrome extraction circuits in real time. Compared to non-concatenated codes and non-adaptive syndrome extraction, we find that the adaptive scheme achieves over an order of magnitude lower logical error rates while requiring fewer CNOT gates and physical qubits. Furthermore, we show how to achieve fault-tolerant universal logical computation with [[4,2,2]]-concatenated hypergraph product codes.
△ Less
Submitted 20 February, 2025;
originally announced February 2025.
-
Performance Gap in Entity Knowledge Extraction Across Modalities in Vision Language Models
Authors:
Ido Cohen,
Daniela Gottesman,
Mor Geva,
Raja Giryes
Abstract:
Vision-language models (VLMs) excel at extracting and reasoning about information from images. Yet, their capacity to leverage internal knowledge about specific entities remains underexplored. This work investigates the disparity in model performance when answering factual questions about an entity described in text versus depicted in an image. Our results reveal a significant accuracy drop - reac…
▽ More
Vision-language models (VLMs) excel at extracting and reasoning about information from images. Yet, their capacity to leverage internal knowledge about specific entities remains underexplored. This work investigates the disparity in model performance when answering factual questions about an entity described in text versus depicted in an image. Our results reveal a significant accuracy drop - reaching 18% for some models - when the entity is presented visually instead of textually. To study this gap we present PopVQA, a dataset which allows separating entity recognition and question answering, and use it to benchmark several models. We hypothesize that this decline arises from limitations in how information flows from image tokens to query tokens. Thus, we use mechanistic interpretability tools to reveal that, although image tokens are preprocessed by the vision encoder, meaningful information flow from these tokens occurs only in the much deeper layers. Furthermore, critical image processing happens in the language model's middle layers, allowing few layers for consecutive reasoning, highlighting a potential inefficiency in how the model utilizes its layers for reasoning. These insights shed light on the internal mechanics of VLMs and offer pathways for enhancing their reasoning capabilities. PopVQA can be found at https://huggingface.co/datasets/idoco/PopVQA.
△ Less
Submitted 7 June, 2025; v1 submitted 18 December, 2024;
originally announced December 2024.
-
Low-depth quantum symmetrization
Authors:
Zhenning Liu,
Andrew M. Childs,
Daniel Gottesman
Abstract:
Quantum symmetrization is the task of transforming a non-strictly increasing list of $n$ integers into an equal superposition of all permutations of the list (or more generally, performing this operation coherently on a superposition of such lists). This task plays a key role in initial state preparation for first-quantized simulations. Motivated by an application to fermionic systems, various alg…
▽ More
Quantum symmetrization is the task of transforming a non-strictly increasing list of $n$ integers into an equal superposition of all permutations of the list (or more generally, performing this operation coherently on a superposition of such lists). This task plays a key role in initial state preparation for first-quantized simulations. Motivated by an application to fermionic systems, various algorithms have been proposed to solve a weaker version of symmetrization in which the input list is strictly increasing, but the general symmetrization problem with repetitions in the input list has not been well studied. We present the first efficient quantum algorithms for the general symmetrization problem. If $m$ is the greatest possible value of the input list, our first algorithm symmetrizes any single classical input list using $\tilde{O}(\log n)$ depth and $O(n\log n + \log m)$ ancilla qubits, and our second algorithm symmetrizes an arbitrary superposition of input lists using $\tilde{O}(\log^3 n)$ depth and $O(n\log n)$ ancilla qubits. Our algorithms enable efficient simulation of bosonic quantum systems in first quantization and can prepare (superpositions of) Dicke states of any Hamming weight in $\tilde{O}(\log n)$ depth (respectively, $\tilde{O}(\log^3 n)$ depth) using $O(n\log n)$ ancilla qubits. We also propose an $\tilde{O}(\log^3 n)$-depth quantum algorithm to transform second-quantized states to first-quantized states. Using this algorithm, QFT-based quantum telescope arrays can image brighter photon sources, extending quantum interferometric imaging systems to a new regime.
△ Less
Submitted 2 May, 2025; v1 submitted 6 November, 2024;
originally announced November 2024.
-
A Criterion for Quantum Advantage
Authors:
Chaitanya Karamchedu,
Matthew Fox,
Daniel Gottesman
Abstract:
Assuming the polynomial hierarchy is infinite, we prove a sufficient condition for determining if uniform and polynomial size quantum circuits over a non-universal gate set are not efficiently classically simulable in the weak multiplicative sense. Our criterion exploits the fact that subgroups of $\mathrm{SL}(2;\mathbb{C})$ are essentially either discrete or dense in $\mathrm{SL}(2;\mathbb{C})$.…
▽ More
Assuming the polynomial hierarchy is infinite, we prove a sufficient condition for determining if uniform and polynomial size quantum circuits over a non-universal gate set are not efficiently classically simulable in the weak multiplicative sense. Our criterion exploits the fact that subgroups of $\mathrm{SL}(2;\mathbb{C})$ are essentially either discrete or dense in $\mathrm{SL}(2;\mathbb{C})$. Using our criterion, we give a new proof that both instantaneous quantum polynomial (IQP) circuits and conjugated Clifford circuits (CCCs) afford a quantum advantage. We also prove that both commuting CCCs and CCCs over various fragments of the Clifford group afford a quantum advantage, which settles two questions of Bouland, Fitzsimons, and Koh. Our results imply that circuits over just $(U^\dagger \otimes U^\dagger) \mathrm{CZ} (U \otimes U)$ afford a quantum advantage for almost all $U \in \mathrm{U}(2)$.
△ Less
Submitted 4 November, 2024;
originally announced November 2024.
-
Eliciting Textual Descriptions from Representations of Continuous Prompts
Authors:
Dana Ramati,
Daniela Gottesman,
Mor Geva
Abstract:
Continuous prompts, or "soft prompts", are a widely-adopted parameter-efficient tuning strategy for large language models, but are often less favorable due to their opaque nature. Prior attempts to interpret continuous prompts relied on projecting individual prompt tokens onto the vocabulary space. However, this approach is problematic as performant prompts can yield arbitrary or contradictory tex…
▽ More
Continuous prompts, or "soft prompts", are a widely-adopted parameter-efficient tuning strategy for large language models, but are often less favorable due to their opaque nature. Prior attempts to interpret continuous prompts relied on projecting individual prompt tokens onto the vocabulary space. However, this approach is problematic as performant prompts can yield arbitrary or contradictory text, and it interprets prompt tokens individually. In this work, we propose a new approach to interpret continuous prompts that elicits textual descriptions from their representations during model inference. Using a Patchscopes variant (Ghandeharioun et al., 2024) called InSPEcT over various tasks, we show our method often yields accurate task descriptions which become more faithful as task performance increases. Moreover, an elaborated version of InSPEcT reveals biased features in continuous prompts, whose presence correlates with biased model predictions. Providing an effective interpretability solution, InSPEcT can be leveraged to debug unwanted properties in continuous prompts and inform developers on ways to mitigate them.
△ Less
Submitted 15 October, 2024;
originally announced October 2024.
-
Hopping Too Late: Exploring the Limitations of Large Language Models on Multi-Hop Queries
Authors:
Eden Biran,
Daniela Gottesman,
Sohee Yang,
Mor Geva,
Amir Globerson
Abstract:
Large language models (LLMs) can solve complex multi-step problems, but little is known about how these computations are implemented internally. Motivated by this, we study how LLMs answer multi-hop queries such as "The spouse of the performer of Imagine is". These queries require two information extraction steps: a latent one for resolving the first hop ("the performer of Imagine") into the bridg…
▽ More
Large language models (LLMs) can solve complex multi-step problems, but little is known about how these computations are implemented internally. Motivated by this, we study how LLMs answer multi-hop queries such as "The spouse of the performer of Imagine is". These queries require two information extraction steps: a latent one for resolving the first hop ("the performer of Imagine") into the bridge entity (John Lennon), and another for resolving the second hop ("the spouse of John Lennon") into the target entity (Yoko Ono). Understanding how the latent step is computed internally is key to understanding the overall computation. By carefully analyzing the internal computations of transformer-based LLMs, we discover that the bridge entity is resolved in the early layers of the model. Then, only after this resolution, the two-hop query is solved in the later layers. Because the second hop commences in later layers, there could be cases where these layers no longer encode the necessary knowledge for correctly predicting the answer. Motivated by this, we propose a novel "back-patching" analysis method whereby a hidden representation from a later layer is patched back to an earlier layer. We find that in up to 66% of previously incorrect cases there exists a back-patch that results in the correct generation of the answer, showing that the later layers indeed sometimes lack the needed functionality. Overall, our methods and findings open further opportunities for understanding and improving latent reasoning in transformer-based LLMs.
△ Less
Submitted 14 October, 2024; v1 submitted 18 June, 2024;
originally announced June 2024.
-
Estimating Knowledge in Large Language Models Without Generating a Single Token
Authors:
Daniela Gottesman,
Mor Geva
Abstract:
To evaluate knowledge in large language models (LLMs), current methods query the model and then evaluate its generated responses. In this work, we ask whether evaluation can be done before the model has generated any text. Concretely, is it possible to estimate how knowledgeable a model is about a certain entity, only from its internal computation? We study this question with two tasks: given a su…
▽ More
To evaluate knowledge in large language models (LLMs), current methods query the model and then evaluate its generated responses. In this work, we ask whether evaluation can be done before the model has generated any text. Concretely, is it possible to estimate how knowledgeable a model is about a certain entity, only from its internal computation? We study this question with two tasks: given a subject entity, the goal is to predict (a) the ability of the model to answer common questions about the entity, and (b) the factuality of open-ended responses generated by the model about the entity. Experiments with a variety of LLMs show that KEEN, a simple probe trained over internal subject representations, succeeds at both tasks - correlating with both the QA accuracy of the model per-subject and FActScore, a recent factuality metric in open-ended generation. Moreover, KEEN naturally aligns with the model's hedging behavior and faithfully reflects changes in the model's knowledge after fine-tuning. Lastly, we show a more interpretable yet equally performant variant of KEEN, which highlights a small set of tokens indicative of clusters and gaps in the model's knowledge. Being simple and lightweight, KEEN can be leveraged to guide decisions such as when it is appropriate to apply further training or augment queries with retrieval.
△ Less
Submitted 29 October, 2024; v1 submitted 18 June, 2024;
originally announced June 2024.
-
Toward a 2D Local Implementation of Quantum LDPC Codes
Authors:
Noah Berthusen,
Dhruv Devulapalli,
Eddie Schoute,
Andrew M. Childs,
Michael J. Gullans,
Alexey V. Gorshkov,
Daniel Gottesman
Abstract:
Geometric locality is an important theoretical and practical factor for quantum low-density parity-check (qLDPC) codes which affects code performance and ease of physical realization. For device architectures restricted to 2D local gates, naively implementing the high-rate codes suitable for low-overhead fault-tolerant quantum computing incurs prohibitive overhead. In this work, we present an erro…
▽ More
Geometric locality is an important theoretical and practical factor for quantum low-density parity-check (qLDPC) codes which affects code performance and ease of physical realization. For device architectures restricted to 2D local gates, naively implementing the high-rate codes suitable for low-overhead fault-tolerant quantum computing incurs prohibitive overhead. In this work, we present an error correction protocol built on a bilayer architecture that aims to reduce operational overheads when restricted to 2D local gates by measuring some generators less frequently than others. We investigate the family of bivariate bicycle qLDPC codes and show that they are well suited for a parallel syndrome measurement scheme using fast routing with local operations and classical communication (LOCC). Through circuit-level simulations, we find that in some parameter regimes bivariate bicycle codes implemented with this protocol have logical error rates comparable to the surface code while using fewer physical qubits.
△ Less
Submitted 9 January, 2025; v1 submitted 26 April, 2024;
originally announced April 2024.
-
Error Correction in Dynamical Codes
Authors:
Xiaozhen Fu,
Daniel Gottesman
Abstract:
We ask what is the general framework for a quantum error correcting code that is defined by a sequence of measurements. Recently, there has been much interest in Floquet codes and space-time codes. In this work, we define and study the distance of a dynamical code. This is a subtle concept and difficult to determine: At any given time, the system will be in a subspace which forms a quantum error-c…
▽ More
We ask what is the general framework for a quantum error correcting code that is defined by a sequence of measurements. Recently, there has been much interest in Floquet codes and space-time codes. In this work, we define and study the distance of a dynamical code. This is a subtle concept and difficult to determine: At any given time, the system will be in a subspace which forms a quantum error-correcting code with a given distance, but the full error correction capability of that code may not be available due to the schedule of measurements associated with the code. We address this challenge by developing an algorithm that tracks information we have learned about the error syndromes through the protocol and put that together to determine the distance of a dynamical code, in a non-fault-tolerant context. We use the tools developed for the algorithm to analyze the initialization and masking properties of a generic Floquet code. Further, we look at properties of dynamical codes under the constraint of geometric locality with a view to understand whether the fundamental limitations on logical gates and code parameters imposed by geometric locality for traditional codes can be surpassed in the dynamical paradigm. We find that codes with a limited number of long range connectivity will not allow non-Clifford gates to be implemented with finite depth circuits in the 2D setting.
△ Less
Submitted 6 March, 2024;
originally announced March 2024.
-
Encoding Majorana codes
Authors:
Maryam Mudassar,
Riley W. Chien,
Daniel Gottesman
Abstract:
To implement a quantum error correction protocol, we first need a scheme to prepare our state in the correct subspace of the code, and this can be done using a unitary encoding circuit. Majorana codes are special since any gates that transform such codes must preserve fermionic parity. In this paper, we present an algorithm that uses the stabilizer matrix to compute unitary encoding circuits for M…
▽ More
To implement a quantum error correction protocol, we first need a scheme to prepare our state in the correct subspace of the code, and this can be done using a unitary encoding circuit. Majorana codes are special since any gates that transform such codes must preserve fermionic parity. In this paper, we present an algorithm that uses the stabilizer matrix to compute unitary encoding circuits for Majorana codes. We present two approaches, both of which use a version of Gaussian elimination with row operations replaced with elementary fermionic Clifford operations. One approach uses an additional ancilla mode and works for all Majorana stabilizer codes, while the second approach does not use ancilla but does not work if the total parity is inside the stabilizer group.
△ Less
Submitted 14 February, 2024; v1 submitted 12 February, 2024;
originally announced February 2024.
-
Complexity and order in approximate quantum error-correcting codes
Authors:
Jinmin Yi,
Weicheng Ye,
Daniel Gottesman,
Zi-Wen Liu
Abstract:
We establish rigorous connections between quantum circuit complexity and approximate quantum error correction (AQEC) capability, two properties of fundamental importance to the physics and practical use of quantum many-body systems, covering systems with both all-to-all connectivity and geometric scenarios like lattice systems in finite spatial dimensions. To this end, we introduce a type of code…
▽ More
We establish rigorous connections between quantum circuit complexity and approximate quantum error correction (AQEC) capability, two properties of fundamental importance to the physics and practical use of quantum many-body systems, covering systems with both all-to-all connectivity and geometric scenarios like lattice systems in finite spatial dimensions. To this end, we introduce a type of code parameter that we call subsystem variance, which is closely related to the optimal AQEC precision. Our key finding is that, for a code encoding $k$ logical qubits in $n$ physical qubits, if the subsystem variance is below an $O(k/n)$ threshold, then any state in the code subspace must obey certain circuit complexity lower bounds, which identify nontrivial "phases" of codes. Based on our results, we propose $O(k/n)$ as a boundary between subspaces that should and should not count as AQEC codes. This theory of AQEC provides a versatile framework for understanding quantum complexity and order in many-body quantum systems, generating new insights for wide-ranging physical scenarios, in particular topological order and critical quantum systems which are of outstanding importance in many-body and high energy physics. We observe from various different perspectives that roughly $O(1/n)$ represents a common, physically significant "scaling threshold" of subsystem variance for features associated with nontrivial quantum order.
△ Less
Submitted 19 September, 2024; v1 submitted 7 October, 2023;
originally announced October 2023.
-
Partial Syndrome Measurement for Hypergraph Product Codes
Authors:
Noah Berthusen,
Daniel Gottesman
Abstract:
Hypergraph product codes are a promising avenue to achieving fault-tolerant quantum computation with constant overhead. When embedding these and other constant-rate qLDPC codes into 2D, a significant number of nonlocal connections are required, posing difficulties for some quantum computing architectures. In this work, we introduce a fault-tolerance scheme that aims to alleviate the effects of imp…
▽ More
Hypergraph product codes are a promising avenue to achieving fault-tolerant quantum computation with constant overhead. When embedding these and other constant-rate qLDPC codes into 2D, a significant number of nonlocal connections are required, posing difficulties for some quantum computing architectures. In this work, we introduce a fault-tolerance scheme that aims to alleviate the effects of implementing this nonlocality by measuring generators acting on spatially distant qubits less frequently than those which do not. We investigate the performance of a simplified version of this scheme, where the measured generators are randomly selected. When applied to hypergraph product codes and a modified small-set-flip decoding algorithm, we prove that for a sufficiently high percentage of generators being measured, a threshold still exists. We also find numerical evidence that the logical error rate is exponentially suppressed even when a large constant fraction of generators are not measured.
△ Less
Submitted 1 May, 2024; v1 submitted 29 June, 2023;
originally announced June 2023.
-
Opportunities and Challenges in Fault-Tolerant Quantum Computation
Authors:
Daniel Gottesman
Abstract:
I will give an overview of what I see as some of the most important future directions in the theory of fault-tolerant quantum computation. In particular, I will give a brief summary of the major problems that need to be solved in fault tolerance based on low-density parity check codes and in hardware-specific fault tolerance. I will then conclude with a discussion of a possible new paradigm for de…
▽ More
I will give an overview of what I see as some of the most important future directions in the theory of fault-tolerant quantum computation. In particular, I will give a brief summary of the major problems that need to be solved in fault tolerance based on low-density parity check codes and in hardware-specific fault tolerance. I will then conclude with a discussion of a possible new paradigm for designing fault-tolerant protocols based on a space-time picture of quantum circuits.
△ Less
Submitted 27 October, 2022;
originally announced October 2022.
-
Maximally Sensitive Sets of States
Authors:
Daniel Gottesman
Abstract:
Coherent errors in a quantum system can, in principle, build up much more rapidly than incoherent errors, accumulating as the square of the number of qubits in the system rather than linearly. I show that only channels dominated by a unitary rotation can display such behavior. A maximally sensitive set of states is a set such that if a channel is capable of quadratic error scaling, then it is pres…
▽ More
Coherent errors in a quantum system can, in principle, build up much more rapidly than incoherent errors, accumulating as the square of the number of qubits in the system rather than linearly. I show that only channels dominated by a unitary rotation can display such behavior. A maximally sensitive set of states is a set such that if a channel is capable of quadratic error scaling, then it is present for at least one sequence of states in the set. I show that the GHZ states in the X, Y, and Z bases form a maximally sensitive set of states, allowing a straightforward test to identify coherent errors in a system. This allows us to identify coherent errors in gates and measurements to within a constant fraction of the maximum possible sensitivity to such errors. A related protocol with simpler circuits but less sensitivity can also be used to test for coherent errors in state preparation or if the noise in a particular circuit is accumulating coherently or not.
△ Less
Submitted 12 July, 2019;
originally announced July 2019.
-
Using Discretization for Extending the Set of Predictive Features
Authors:
Avi Rosenfeld,
Ron Illuz,
Dovid Gottesman,
Mark Last
Abstract:
To date, attribute discretization is typically performed by replacing the original set of continuous features with a transposed set of discrete ones. This paper provides support for a new idea that discretized features should often be used in addition to existing features and as such, datasets should be extended, and not replaced, by discretization. We also claim that discretization algorithms sho…
▽ More
To date, attribute discretization is typically performed by replacing the original set of continuous features with a transposed set of discrete ones. This paper provides support for a new idea that discretized features should often be used in addition to existing features and as such, datasets should be extended, and not replaced, by discretization. We also claim that discretization algorithms should be developed with the explicit purpose of enriching a non-discretized dataset with discretized values. We present such an algorithm, D-MIAT, a supervised algorithm that discretizes data based on Minority Interesting Attribute Thresholds. D-MIAT only generates new features when strong indications exist for one of the target values needing to be learned and thus is intended to be used in addition to the original data. We present extensive empirical results demonstrating the success of using D-MIAT on $ 28 $ benchmark datasets. We also demonstrate that $ 10 $ other discretization algorithms can also be used to generate features that yield improved performance when used in combination with the original non-discretized data. Our results show that the best predictive performance is attained using a combination of the original dataset with added features from a "standard" supervised discretization algorithm and D-MIAT.
△ Less
Submitted 9 February, 2018;
originally announced February 2018.
-
Quantum fault tolerance in small experiments
Authors:
Daniel Gottesman
Abstract:
I discuss a variety of issues relating to near-future experiments demonstrating fault-tolerant quantum computation. I describe a family of fault-tolerant quantum circuits that can be performed with 5 qubits arranged on a ring with nearest-neighbor interactions. I also present a criterion whereby we can say that an experiment has succeeded in demonstrating fault tolerance. Finally, I discuss the po…
▽ More
I discuss a variety of issues relating to near-future experiments demonstrating fault-tolerant quantum computation. I describe a family of fault-tolerant quantum circuits that can be performed with 5 qubits arranged on a ring with nearest-neighbor interactions. I also present a criterion whereby we can say that an experiment has succeeded in demonstrating fault tolerance. Finally, I discuss the possibility of using future fault-tolerant experiments to answer important questions about the interaction of fault-tolerant protocols with real experimental errors.
△ Less
Submitted 14 October, 2016; v1 submitted 11 October, 2016;
originally announced October 2016.
-
Diagonal gates in the Clifford hierarchy
Authors:
Shawn X. Cui,
Daniel Gottesman,
Anirudh Krishna
Abstract:
The Clifford hierarchy is a set of gates that appears in the theory of fault-tolerant quantum computation, but its precise structure remains elusive. We give a complete characterization of the diagonal gates in the Clifford hierarchy for prime-dimensional qudits. They turn out to be $p^{m}$-th roots of unity raised to polynomial functions of the basis state to which they are applied, and we determ…
▽ More
The Clifford hierarchy is a set of gates that appears in the theory of fault-tolerant quantum computation, but its precise structure remains elusive. We give a complete characterization of the diagonal gates in the Clifford hierarchy for prime-dimensional qudits. They turn out to be $p^{m}$-th roots of unity raised to polynomial functions of the basis state to which they are applied, and we determine which level of the Clifford hierarchy a given gate sits in based on $m$ and the degree of the polynomial.
△ Less
Submitted 23 August, 2016;
originally announced August 2016.
-
Fault-Tolerant Quantum Computation with Constant Overhead
Authors:
Daniel Gottesman
Abstract:
What is the minimum number of extra qubits needed to perform a large fault-tolerant quantum circuit? Working in a common model of fault-tolerance, I show that in the asymptotic limit of large circuits, the ratio of physical qubits to logical qubits can be a constant. The construction makes use of quantum low-density parity check codes, and the asymptotic overhead of the protocol is equal to that o…
▽ More
What is the minimum number of extra qubits needed to perform a large fault-tolerant quantum circuit? Working in a common model of fault-tolerance, I show that in the asymptotic limit of large circuits, the ratio of physical qubits to logical qubits can be a constant. The construction makes use of quantum low-density parity check codes, and the asymptotic overhead of the protocol is equal to that of the family of quantum error-correcting codes underlying the fault-tolerant protocol.
△ Less
Submitted 22 July, 2014; v1 submitted 10 October, 2013;
originally announced October 2013.
-
Fibre bundle framework for unitary quantum fault tolerance
Authors:
Daniel Gottesman,
Lucy Liuxuan Zhang
Abstract:
We introduce a differential geometric framework for describing families of quantum error-correcting codes and for understanding quantum fault tolerance. This work unifies the notion of topological fault tolerance with fault tolerance in other kinds of quantum error-correcting codes. In particular, we use fibre bundles with a natural flat projective connection to study the transformation of codewor…
▽ More
We introduce a differential geometric framework for describing families of quantum error-correcting codes and for understanding quantum fault tolerance. This work unifies the notion of topological fault tolerance with fault tolerance in other kinds of quantum error-correcting codes. In particular, we use fibre bundles with a natural flat projective connection to study the transformation of codewords under unitary fault-tolerant evolutions. We show that the fault-tolerant logical operations are given by the monodromy group for either of two bundles, both of which have flat projective connections. As concrete realizations of the general framework, we construct the bundles explicitly for two examples of fault-tolerant families of operations, the qudit transversal gates and the string operators in the toric code.
△ Less
Submitted 25 April, 2017; v1 submitted 26 September, 2013;
originally announced September 2013.
-
The Resource Theory of Stabilizer Computation
Authors:
Victor Veitch,
Seyed Ali Hamed Mousavian,
Daniel Gottesman,
Joseph Emerson
Abstract:
Recent results on the non-universality of fault-tolerant gate sets underline the critical role of resource states, such as magic states, to power scalable, universal quantum computation. Here we develop a resource theory, analogous to the theory of entanglement, for resources for stabilizer codes. We introduce two quantitative measures - monotones - for the amount of non-stabilizer resource. As an…
▽ More
Recent results on the non-universality of fault-tolerant gate sets underline the critical role of resource states, such as magic states, to power scalable, universal quantum computation. Here we develop a resource theory, analogous to the theory of entanglement, for resources for stabilizer codes. We introduce two quantitative measures - monotones - for the amount of non-stabilizer resource. As an application we give absolute bounds on the efficiency of magic state distillation. One of these monotones is the sum of the negative entries of the discrete Wigner representation of a quantum state, thereby resolving a long-standing open question of whether the degree of negativity in a quasi-probability representation is an operationally meaningful indicator of quantum behaviour.
△ Less
Submitted 26 July, 2013;
originally announced July 2013.
-
Quantum Refrigerator
Authors:
Michael Ben-Or,
Daniel Gottesman,
Avinatan Hassidim
Abstract:
We consider fault-tolerant quantum computation in the context where there are no fresh ancilla qubits available during the computation, and where the noise is due to a general quantum channel. We show that there are three classes of noisy channels: In the first, typified by the depolarizing channel, computation is only possible for a logarithmic time. In the second class, of which the dephasing ch…
▽ More
We consider fault-tolerant quantum computation in the context where there are no fresh ancilla qubits available during the computation, and where the noise is due to a general quantum channel. We show that there are three classes of noisy channels: In the first, typified by the depolarizing channel, computation is only possible for a logarithmic time. In the second class, of which the dephasing channel is an example, computation is possible for polynomial time. The amplitude damping channel is an example of the third class, and for this class of channels, it is possible to compute for an exponential time in the number of qubits available.
△ Less
Submitted 9 January, 2013;
originally announced January 2013.
-
Longer-Baseline Telescopes Using Quantum Repeaters
Authors:
Daniel Gottesman,
Thomas Jennewein,
Sarah Croke
Abstract:
We present an approach to building interferometric telescopes using ideas of quantum information. Current optical interferometers have limited baseline lengths, and thus limited resolution, because of noise and loss of signal due to the transmission of photons between the telescopes. The technology of quantum repeaters has the potential to eliminate this limit, allowing in principle interferometer…
▽ More
We present an approach to building interferometric telescopes using ideas of quantum information. Current optical interferometers have limited baseline lengths, and thus limited resolution, because of noise and loss of signal due to the transmission of photons between the telescopes. The technology of quantum repeaters has the potential to eliminate this limit, allowing in principle interferometers with arbitrarily long baselines.
△ Less
Submitted 9 August, 2012; v1 submitted 14 July, 2011;
originally announced July 2011.
-
Spin Systems and Computational Complexity
Authors:
Daniel Gottesman
Abstract:
I give a very brief non-technical introduction to the intersection of the fields of spin systems and computational complexity. The focus is on spin glasses and their relationship to NP-complete problems.
I give a very brief non-technical introduction to the intersection of the fields of spin systems and computational complexity. The focus is on spin glasses and their relationship to NP-complete problems.
△ Less
Submitted 30 November, 2009;
originally announced November 2009.
-
Streaming universal distortion-free entanglement concentration
Authors:
Robin Blume-Kohout,
Sarah Croke,
Daniel Gottesman
Abstract:
This paper presents a streaming (sequential) protocol for universal entanglement concentration at the Shannon bound. Alice and Bob begin with N identical (but unknown) two-qubit pure states, each containing E ebits of entanglement. They each run a reversible algorithm on their qubits, and end up with Y perfect EPR pairs, where Y = NE +- O(\sqrt N). Our protocol is streaming, so the N input syste…
▽ More
This paper presents a streaming (sequential) protocol for universal entanglement concentration at the Shannon bound. Alice and Bob begin with N identical (but unknown) two-qubit pure states, each containing E ebits of entanglement. They each run a reversible algorithm on their qubits, and end up with Y perfect EPR pairs, where Y = NE +- O(\sqrt N). Our protocol is streaming, so the N input systems are fed in one at a time, and perfect EPR pairs start popping out almost immediately. It matches the optimal block protocol exactly at each stage, so the average yield after n inputs is <Y> = nE - O(log n). So, somewhat surprisingly, there is no tradeoff between yield and lag -- our protocol optimizes both. In contrast, the optimal N-qubit block protocol achieves the same yield, but since no EPR pairs are produced until the entire input block is read, its lag is O(N). Finally, our algorithm runs in O(log N) space, so a lot of entanglement can be efficiently concentrated using a very small (e.g., current or near-future technology) quantum processor. Along the way, we find an optimal streaming protocol for extracting randomness from classical i.i.d. sources and a more space-efficient implementation of the Schur transform.
△ Less
Submitted 30 October, 2009;
originally announced October 2009.
-
The Quantum and Classical Complexity of Translationally Invariant Tiling and Hamiltonian Problems
Authors:
Daniel Gottesman,
Sandy Irani
Abstract:
We study the complexity of a class of problems involving satisfying constraints which remain the same under translations in one or more spatial directions. In this paper, we show hardness of a classical tiling problem on an N x N 2-dimensional grid and a quantum problem involving finding the ground state energy of a 1-dimensional quantum system of N particles. In both cases, the only input is N, p…
▽ More
We study the complexity of a class of problems involving satisfying constraints which remain the same under translations in one or more spatial directions. In this paper, we show hardness of a classical tiling problem on an N x N 2-dimensional grid and a quantum problem involving finding the ground state energy of a 1-dimensional quantum system of N particles. In both cases, the only input is N, provided in binary. We show that the classical problem is NEXP-complete and the quantum problem is QMA_EXP-complete. Thus, an algorithm for these problems which runs in time polynomial in N (exponential in the input size) would imply that EXP = NEXP or BQEXP = QMA_EXP, respectively. Although tiling in general is already known to be NEXP-complete, to our knowledge, all previous reductions require that either the set of tiles and their constraints or some varying boundary conditions be given as part of the input. In the problem considered here, these are fixed, constant-sized parameters of the problem. Instead, the problem instance is encoded solely in the size of the system.
△ Less
Submitted 23 August, 2010; v1 submitted 14 May, 2009;
originally announced May 2009.
-
An Introduction to Quantum Error Correction and Fault-Tolerant Quantum Computation
Authors:
Daniel Gottesman
Abstract:
Quantum states are very delicate, so it is likely some sort of quantum error correction will be necessary to build reliable quantum computers. The theory of quantum error-correcting codes has some close ties to and some striking differences from the theory of classical error-correcting codes. Many quantum codes can be described in terms of the stabilizer of the codewords. The stabilizer is a fin…
▽ More
Quantum states are very delicate, so it is likely some sort of quantum error correction will be necessary to build reliable quantum computers. The theory of quantum error-correcting codes has some close ties to and some striking differences from the theory of classical error-correcting codes. Many quantum codes can be described in terms of the stabilizer of the codewords. The stabilizer is a finite Abelian group, and allows a straightforward characterization of the error-correcting properties of the code. The stabilizer formalism for quantum codes also illustrates the relationships to classical coding theory, particularly classical codes over GF(4), the finite field with four elements. To build a quantum computer which behaves correctly in the presence of errors, we also need a theory of fault-tolerant quantum computation, instructing us how to perform quantum gates on qubits which are encoded in a quantum error-correcting code. The threshold theorem states that it is possible to create a quantum computer to perform an arbitrary quantum computation provided the error rate per physical gate or time step is below some constant threshold value.
△ Less
Submitted 16 April, 2009;
originally announced April 2009.
-
Entanglement vs. gap for one-dimensional spin systems
Authors:
Daniel Gottesman,
M. B. Hastings
Abstract:
We study the relationship between entanglement and spectral gap for local Hamiltonians in one dimension. The area law for a one-dimensional system states that for the ground state, the entanglement of any interval is upper-bounded by a constant independent of the size of the interval. However, the possible dependence of the upper bound on the spectral gap Delta is not known, as the best known ge…
▽ More
We study the relationship between entanglement and spectral gap for local Hamiltonians in one dimension. The area law for a one-dimensional system states that for the ground state, the entanglement of any interval is upper-bounded by a constant independent of the size of the interval. However, the possible dependence of the upper bound on the spectral gap Delta is not known, as the best known general upper bound is asymptotically much larger than the largest possible entropy of any model system previously constructed for small Delta. To help resolve this asymptotic behavior, we construct a family of one-dimensional local systems for which some intervals have entanglement entropy which is polynomial in 1/Delta, whereas previously studied systems, such as free fermion systems or systems described by conformal field theory, had the entropy of all intervals bounded by a constant times log(1/Delta).
△ Less
Submitted 16 April, 2010; v1 submitted 8 January, 2009;
originally announced January 2009.
-
Efficient discrete-time simulations of continuous-time quantum query algorithms
Authors:
R. Cleve,
D. Gottesman,
M. Mosca,
R. D. Somma,
D. L. Yonge-Mallo
Abstract:
The continuous-time query model is a variant of the discrete query model in which queries can be interleaved with known operations (called "driving operations") continuously in time. Interesting algorithms have been discovered in this model, such as an algorithm for evaluating nand trees more efficiently than any classical algorithm. Subsequent work has shown that there also exists an efficient…
▽ More
The continuous-time query model is a variant of the discrete query model in which queries can be interleaved with known operations (called "driving operations") continuously in time. Interesting algorithms have been discovered in this model, such as an algorithm for evaluating nand trees more efficiently than any classical algorithm. Subsequent work has shown that there also exists an efficient algorithm for nand trees in the discrete query model; however, there is no efficient conversion known for continuous-time query algorithms for arbitrary problems.
We show that any quantum algorithm in the continuous-time query model whose total query time is T can be simulated by a quantum algorithm in the discrete query model that makes O[T log(T) / log(log(T))] queries. This is the first upper bound that is independent of the driving operations (i.e., it holds even if the norm of the driving Hamiltonian is very large). A corollary is that any lower bound of T queries for a problem in the discrete-time query model immediately carries over to a lower bound of Ω[T log(log(T))/log (T)] in the continuous-time query model.
△ Less
Submitted 26 November, 2008;
originally announced November 2008.
-
Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority
Authors:
Michael Ben-Or,
Claude Crépeau,
Daniel Gottesman,
Avinatan Hassidim,
Adam Smith
Abstract:
Secret sharing and multiparty computation (also called "secure function evaluation") are fundamental primitives in modern cryptography, allowing a group of mutually distrustful players to perform correct, distributed computations under the sole assumption that some number of them will follow the protocol honestly. This paper investigates how much trust is necessary -- that is, how many players m…
▽ More
Secret sharing and multiparty computation (also called "secure function evaluation") are fundamental primitives in modern cryptography, allowing a group of mutually distrustful players to perform correct, distributed computations under the sole assumption that some number of them will follow the protocol honestly. This paper investigates how much trust is necessary -- that is, how many players must remain honest -- in order for distributed quantum computations to be possible.
We present a verifiable quantum secret sharing (VQSS) protocol, and a general secure multiparty quantum computation (MPQC) protocol, which can tolerate any (n-1)/2 (rounded down) cheaters among n players. Previous protocols for these tasks tolerated (n-1)/4 (rounded down) and (n-1)/6 (rounded down) cheaters, respectively. The threshold we achieve is tight - even in the classical case, ``fair'' multiparty computation is not possible if any set of n/2 players can cheat.
Our protocols rely on approximate quantum error-correcting codes, which can tolerate a larger fraction of errors than traditional, exact codes. We introduce new families of authentication schemes and approximate codes tailored to the needs of our protocols, as well as new state purification techniques along the lines of those used in fault-tolerant quantum circuits.
△ Less
Submitted 9 January, 2008;
originally announced January 2008.
-
The power of quantum systems on a line
Authors:
Dorit Aharonov,
Daniel Gottesman,
Sandy Irani,
Julia Kempe
Abstract:
We study the computational strength of quantum particles (each of finite dimensionality) arranged on a line. First, we prove that it is possible to perform universal adiabatic quantum computation using a one-dimensional quantum system (with 9 states per particle). This might have practical implications for experimentalists interested in constructing an adiabatic quantum computer. Building on the…
▽ More
We study the computational strength of quantum particles (each of finite dimensionality) arranged on a line. First, we prove that it is possible to perform universal adiabatic quantum computation using a one-dimensional quantum system (with 9 states per particle). This might have practical implications for experimentalists interested in constructing an adiabatic quantum computer. Building on the same construction, but with some additional technical effort and 12 states per particle, we show that the problem of approximating the ground state energy of a system composed of a line of quantum particles is QMA-complete; QMA is a quantum analogue of NP. This is in striking contrast to the fact that the analogous classical problem, namely, one-dimensional MAX-2-SAT with nearest neighbor constraints, is in P. The proof of the QMA-completeness result requires an additional idea beyond the usual techniques in the area: Not all illegal configurations can be ruled out by local checks, so instead we rule out such illegal configurations because they would, in the future, evolve into a state which can be seen locally to be illegal. Our construction implies (assuming the quantum Church-Turing thesis and that quantum computers cannot efficiently solve QMA-complete problems) that there are one-dimensional systems which take an exponential time to relax to their ground states at any temperature, making them candidates for being one-dimensional spin glasses.
△ Less
Submitted 19 February, 2009; v1 submitted 28 May, 2007;
originally announced May 2007.
-
Accuracy threshold for postselected quantum computation
Authors:
Panos Aliferis,
Daniel Gottesman,
John Preskill
Abstract:
We prove an accuracy threshold theorem for fault-tolerant quantum computation based on error detection and postselection. Our proof provides a rigorous foundation for the scheme suggested by Knill, in which preparation circuits for ancilla states are protected by a concatenated error-detecting code and the preparation is aborted if an error is detected. The proof applies to independent stochasti…
▽ More
We prove an accuracy threshold theorem for fault-tolerant quantum computation based on error detection and postselection. Our proof provides a rigorous foundation for the scheme suggested by Knill, in which preparation circuits for ancilla states are protected by a concatenated error-detecting code and the preparation is aborted if an error is detected. The proof applies to independent stochastic noise but (in contrast to proofs of the quantum accuracy threshold theorem based on concatenated error-correcting codes) not to strongly-correlated adversarial noise. Our rigorously established lower bound on the accuracy threshold, 1.04 \times 10^{-3}, is well below Knill's numerical estimates.
△ Less
Submitted 17 September, 2007; v1 submitted 28 March, 2007;
originally announced March 2007.
-
Fault-Tolerant Quantum Computation
Authors:
Daniel Gottesman
Abstract:
I give a brief overview of fault-tolerant quantum computation, with an emphasis on recent work and open questions.
I give a brief overview of fault-tolerant quantum computation, with an emphasis on recent work and open questions.
△ Less
Submitted 30 August, 2007; v1 submitted 16 January, 2007;
originally announced January 2007.
-
Quantum Statistics with Classical Particles
Authors:
Daniel Gottesman
Abstract:
Indistinguishability of particles is normally considered to be an inherently quantum property which cannot be possessed by a classical theory. However, Saunders has argued that this is incorrect, and that classically indistinguishable particles are possible. I make this suggestion concrete by describing a class of microscopic classical theories involving indistinguishable particles hopping stoch…
▽ More
Indistinguishability of particles is normally considered to be an inherently quantum property which cannot be possessed by a classical theory. However, Saunders has argued that this is incorrect, and that classically indistinguishable particles are possible. I make this suggestion concrete by describing a class of microscopic classical theories involving indistinguishable particles hopping stochastically on a graph, and show that it should be possible to experimentally create a physical system realizing a simple model by continuously observing atoms trapped in an optical lattice. The indistinguishable classical particles obey Bose-Einstein statistics, display the associated clustering phenomena, and in appropriate models, can even undergo Bose-Einstein condensation.
△ Less
Submitted 29 December, 2005; v1 submitted 8 November, 2005;
originally announced November 2005.
-
Quantum Error Correction and Fault-Tolerance
Authors:
Daniel Gottesman
Abstract:
I give an overview of the basic concepts behind quantum error correction and quantum fault tolerance. This includes the quantum error correction conditions, stabilizer codes, CSS codes, transversal gates, fault-tolerant error correction, and the threshold theorem.
I give an overview of the basic concepts behind quantum error correction and quantum fault tolerance. This includes the quantum error correction conditions, stabilizer codes, CSS codes, transversal gates, fault-tolerant error correction, and the threshold theorem.
△ Less
Submitted 18 July, 2005;
originally announced July 2005.
-
Classicality in discrete Wigner functions
Authors:
Cecilia Cormick,
Ernesto F. Galvao,
Daniel Gottesman,
Juan Pablo Paz,
Arthur O. Pittenger
Abstract:
Gibbons et al. [Phys. Rev. A 70, 062101(2004)] have recently defined a class of discrete Wigner functions W to represent quantum states in a Hilbert space with finite dimension. We show that the only pure states having non-negative W for all such functions are stabilizer states, as conjectured by one of us [Phys. Rev. A 71, 042302 (2005)]. We also show that the unitaries preserving non-negativit…
▽ More
Gibbons et al. [Phys. Rev. A 70, 062101(2004)] have recently defined a class of discrete Wigner functions W to represent quantum states in a Hilbert space with finite dimension. We show that the only pure states having non-negative W for all such functions are stabilizer states, as conjectured by one of us [Phys. Rev. A 71, 042302 (2005)]. We also show that the unitaries preserving non-negativity of W for all definitions of W form a subgroup of the Clifford group. This means pure states with non-negative W and their associated unitary dynamics are classical in the sense of admitting an efficient classical simulation scheme using the stabilizer formalism.
△ Less
Submitted 27 June, 2005;
originally announced June 2005.
-
Quantum accuracy threshold for concatenated distance-3 codes
Authors:
Panos Aliferis,
Daniel Gottesman,
John Preskill
Abstract:
We prove a new version of the quantum threshold theorem that applies to concatenation of a quantum code that corrects only one error, and we use this theorem to derive a rigorous lower bound on the quantum accuracy threshold epsilon_0. Our proof also applies to concatenation of higher-distance codes, and to noise models that allow faults to be correlated in space and in time. The proof uses new…
▽ More
We prove a new version of the quantum threshold theorem that applies to concatenation of a quantum code that corrects only one error, and we use this theorem to derive a rigorous lower bound on the quantum accuracy threshold epsilon_0. Our proof also applies to concatenation of higher-distance codes, and to noise models that allow faults to be correlated in space and in time. The proof uses new criteria for assessing the accuracy of fault-tolerant circuits, which are particularly conducive to the inductive analysis of recursive simulations. Our lower bound on the threshold, epsilon_0 > 2.73 \times 10^{-5} for an adversarial independent stochastic noise model, is derived from a computer-assisted combinatorial analysis; it is the best lower bound that has been rigorously proven so far.
△ Less
Submitted 20 October, 2005; v1 submitted 28 April, 2005;
originally announced April 2005.
-
GHZ extraction yield for multipartite stabilizer states
Authors:
Sergey Bravyi,
David Fattal,
Daniel Gottesman
Abstract:
Let $|Ψ>$ be an arbitrary stabilizer state distributed between three remote parties, such that each party holds several qubits. Let $S$ be a stabilizer group of $|Ψ>$. We show that $|Ψ>$ can be converted by local unitaries into a collection of singlets, GHZ states, and local one-qubit states. The numbers of singlets and GHZs are determined by dimensions of certain subgroups of $S$. For an arbitr…
▽ More
Let $|Ψ>$ be an arbitrary stabilizer state distributed between three remote parties, such that each party holds several qubits. Let $S$ be a stabilizer group of $|Ψ>$. We show that $|Ψ>$ can be converted by local unitaries into a collection of singlets, GHZ states, and local one-qubit states. The numbers of singlets and GHZs are determined by dimensions of certain subgroups of $S$. For an arbitrary number of parties $m$ we find a formula for the maximal number of $m$-partite GHZ states that can be extracted from $|Ψ>$ by local unitaries. A connection with earlier introduced measures of multipartite correlations is made. An example of an undecomposable four-party stabilizer state with more than one qubit per party is given. These results are derived from a general theoretical framework that allows one to study interconversion of multipartite stabilizer states by local Clifford group operators. As a simple application, we study three-party entanglement in two-dimensional lattice models that can be exactly solved by the stabilizer formalism.
△ Less
Submitted 27 April, 2005;
originally announced April 2005.
-
Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes
Authors:
Claude Crepeau,
Daniel Gottesman,
Adam Smith
Abstract:
It is a standard result in the theory of quantum error-correcting codes that no code of length n can fix more than n/4 arbitrary errors, regardless of the dimension of the coding and encoded Hilbert spaces. However, this bound only applies to codes which recover the message exactly. Naively, one might expect that correcting errors to very high fidelity would only allow small violations of this b…
▽ More
It is a standard result in the theory of quantum error-correcting codes that no code of length n can fix more than n/4 arbitrary errors, regardless of the dimension of the coding and encoded Hilbert spaces. However, this bound only applies to codes which recover the message exactly. Naively, one might expect that correcting errors to very high fidelity would only allow small violations of this bound. This intuition is incorrect: in this paper we describe quantum error-correcting codes capable of correcting up to (n-1)/2 arbitrary errors with fidelity exponentially close to 1, at the price of increasing the size of the registers (i.e., the coding alphabet). This demonstrates a sharp distinction between exact and approximate quantum error correction. The codes have the property that any $t$ components reveal no information about the message, and so they can also be viewed as error-tolerant secret sharing schemes.
The construction has several interesting implications for cryptography and quantum information theory. First, it suggests that secret sharing is a better classical analogue to quantum error correction than is classical error correction. Second, it highlights an error in a purported proof that verifiable quantum secret sharing (VQSS) is impossible when the number of cheaters t is n/4. More generally, the construction illustrates a difference between exact and approximate requirements in quantum cryptography and (yet again) the delicacy of security proofs and impossibility results in the quantum model.
△ Less
Submitted 15 March, 2005;
originally announced March 2005.
-
Improved Simulation of Stabilizer Circuits
Authors:
Scott Aaronson,
Daniel Gottesman
Abstract:
The Gottesman-Knill theorem says that a stabilizer circuit -- that is, a quantum circuit consisting solely of CNOT, Hadamard, and phase gates -- can be simulated efficiently on a classical computer. This paper improves that theorem in several directions. First, by removing the need for Gaussian elimination, we make the simulation algorithm much faster at the cost of a factor-2 increase in the nu…
▽ More
The Gottesman-Knill theorem says that a stabilizer circuit -- that is, a quantum circuit consisting solely of CNOT, Hadamard, and phase gates -- can be simulated efficiently on a classical computer. This paper improves that theorem in several directions. First, by removing the need for Gaussian elimination, we make the simulation algorithm much faster at the cost of a factor-2 increase in the number of bits needed to represent a state. We have implemented the improved algorithm in a freely-available program called CHP (CNOT-Hadamard-Phase), which can handle thousands of qubits easily. Second, we show that the problem of simulating stabilizer circuits is complete for the classical complexity class ParityL, which means that stabilizer circuits are probably not even universal for classical computation. Third, we give efficient algorithms for computing the inner product between two stabilizer states, putting any n-qubit stabilizer circuit into a "canonical form" that requires at most O(n^2/log n) gates, and other useful tasks. Fourth, we extend our simulation algorithm to circuits acting on mixed states, circuits containing a limited number of non-stabilizer gates, and circuits acting on general tensor-product initial states but containing only a limited number of measurements.
△ Less
Submitted 18 June, 2008; v1 submitted 25 June, 2004;
originally announced June 2004.
-
Comment on "The black hole final state"
Authors:
Daniel Gottesman,
John Preskill
Abstract:
Horowitz and Maldacena have suggested that the unitarity of the black hole S-matrix can be reconciled with Hawking's semiclassical arguments if a final-state boundary condition is imposed at the spacelike singularity inside the black hole. We point out that, in this scenario, departures from unitarity can arise due to interactions between the collapsing body and the infalling Hawking radiation i…
▽ More
Horowitz and Maldacena have suggested that the unitarity of the black hole S-matrix can be reconciled with Hawking's semiclassical arguments if a final-state boundary condition is imposed at the spacelike singularity inside the black hole. We point out that, in this scenario, departures from unitarity can arise due to interactions between the collapsing body and the infalling Hawking radiation inside the event horizon. The amount of information lost when a black hole evaporates depends on the extent to which these interactions are entangling.
△ Less
Submitted 27 November, 2003;
originally announced November 2003.
-
The Minimum Distance Problem for Two-Way Entanglement Purification
Authors:
Andris Ambainis,
Daniel Gottesman
Abstract:
Entanglement purification takes a number of noisy EPR pairs and processes them to produce a smaller number of more reliable pairs. If this is done with only a forward classical side channel, the procedure is equivalent to using a quantum error-correcting code (QECC). We instead investigate entanglement purification protocols with two-way classical side channels (2-EPPs) for finite block sizes. I…
▽ More
Entanglement purification takes a number of noisy EPR pairs and processes them to produce a smaller number of more reliable pairs. If this is done with only a forward classical side channel, the procedure is equivalent to using a quantum error-correcting code (QECC). We instead investigate entanglement purification protocols with two-way classical side channels (2-EPPs) for finite block sizes. In particular, we consider the analog of the minimum distance problem for QECCs, and show that 2-EPPs can exceed the quantum Hamming bound and the quantum Singleton bound. We also show that 2-EPPs can achieve the rate k/n = 1 - (t/n) \log_2 3 - h(t/n) - O(1/n) (asymptotically reaching the quantum Hamming bound), where the EPP produces at least k good pairs out of n total pairs with up to t arbitrary errors, and h(x) = -x \log_2 x - (1-x) \log_2 (1-x) is the usual binary entropy. In contrast, the best known lower bound on the rate of QECCs is the quantum Gilbert-Varshamov bound k/n \geq 1 - (2t/n) \log_2 3 - h(2t/n). Indeed, in some regimes, the known upper bound on the asymptotic rate of good QECCs is strictly below our lower bound on the achievable rate of 2-EPPs.
△ Less
Submitted 13 October, 2005; v1 submitted 14 October, 2003;
originally announced October 2003.
-
Robust polarization-based quantum key distribution over collective-noise channel
Authors:
J. -C. Boileau,
D. Gottesman,
R. Laflamme,
D. Poulin,
R. W. Spekkens
Abstract:
We present two polarization-based protocols for quantum key distribution. The protocols encode key bits in noiseless subspaces or subsystems, and so can function over a quantum channel subjected to an arbitrary degree of collective noise, as occurs, for instance, due to rotation of polarizations in an optical fiber. These protocols can be implemented using only entangled photon-pair sources, sin…
▽ More
We present two polarization-based protocols for quantum key distribution. The protocols encode key bits in noiseless subspaces or subsystems, and so can function over a quantum channel subjected to an arbitrary degree of collective noise, as occurs, for instance, due to rotation of polarizations in an optical fiber. These protocols can be implemented using only entangled photon-pair sources, single-photon rotations, and single-photon detectors. Thus, our proposals offer practical and realistic alternatives to existing schemes for quantum key distribution over optical fibers without resorting to interferometry or two-way quantum communication, thereby circumventing, respectively, the need for high precision timing and the threat of Trojan horse attacks.
△ Less
Submitted 15 August, 2003; v1 submitted 30 June, 2003;
originally announced June 2003.
-
Security of quantum key distribution with imperfect devices
Authors:
Daniel Gottesman,
Hoi-Kwong Lo,
Norbert Lütkenhaus,
John Preskill
Abstract:
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. Our proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. We derive a general lower bound on the asymptotic key generation rate fo…
▽ More
We prove the security of the Bennett-Brassard (BB84) quantum key distribution protocol in the case where the source and detector are under the limited control of an adversary. Our proof applies when both the source and the detector have small basis-dependent flaws, as is typical in practical implementations of the protocol. We derive a general lower bound on the asymptotic key generation rate for weakly basis-dependent eavesdropping attacks, and also estimate the rate in some special cases: sources that emit weak coherent states with random phases, detectors with basis-dependent efficiency, and misaligned sources and detectors.
△ Less
Submitted 3 September, 2004; v1 submitted 10 December, 2002;
originally announced December 2002.
-
Uncloneable Encryption
Authors:
Daniel Gottesman
Abstract:
Quantum states cannot be cloned. I show how to extend this property to classical messages encoded using quantum states, a task I call "uncloneable encryption." An uncloneable encryption scheme has the property that an eavesdropper Eve not only cannot read the encrypted message, but she cannot copy it down for later decoding. She could steal it, but then the receiver Bob would not receive the mes…
▽ More
Quantum states cannot be cloned. I show how to extend this property to classical messages encoded using quantum states, a task I call "uncloneable encryption." An uncloneable encryption scheme has the property that an eavesdropper Eve not only cannot read the encrypted message, but she cannot copy it down for later decoding. She could steal it, but then the receiver Bob would not receive the message, and would thus be alerted that something was amiss. I prove that any authentication scheme for quantum states acts as a secure uncloneable encryption scheme. Uncloneable encryption is also closely related to quantum key distribution (QKD), demonstrating a close connection between cryptographic tasks for quantum states and for classical messages. Thus, studying uncloneable encryption and quantum authentication allows for some modest improvements in QKD protocols. While the main results apply to a one-time key with unconditional security, I also show uncloneable encryption remains secure with a pseudorandom key. In this case, to defeat the scheme, Eve must break the computational assumption behind the pseudorandom sequence before Bob receives the message, or her opportunity is lost. This means uncloneable encryption can be used in a non-interactive setting, where QKD is not available, allowing Alice and Bob to convert a temporary computational assumption into a permanently secure message.
△ Less
Submitted 3 September, 2004; v1 submitted 9 October, 2002;
originally announced October 2002.
-
Secure Multi-party Quantum Computing
Authors:
Claude Crepeau,
Daniel Gottesman,
Adam Smith
Abstract:
Secure multi-party computing, also called "secure function evaluation", has been extensively studied in classical cryptography. We consider the extension of this task to computation with quantum inputs and circuits. Our protocols are information-theoretically secure, i.e. no assumptions are made on the computational power of the adversary. For the weaker task of verifiable quantum secret sharing…
▽ More
Secure multi-party computing, also called "secure function evaluation", has been extensively studied in classical cryptography. We consider the extension of this task to computation with quantum inputs and circuits. Our protocols are information-theoretically secure, i.e. no assumptions are made on the computational power of the adversary. For the weaker task of verifiable quantum secret sharing, we give a protocol which tolerates any t < n/4 cheating parties (out of n). This is shown to be optimal. We use this new tool to show how to perform any multi-party quantum computation as long as the number of dishonest players is less than n/6.
△ Less
Submitted 20 June, 2002;
originally announced June 2002.
-
Authentication of Quantum Messages
Authors:
Howard Barnum,
Claude Crepeau,
Daniel Gottesman,
Adam Smith,
Alain Tapp
Abstract:
Authentication is a well-studied area of classical cryptography: a sender S and a receiver R sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified by any third party with control of the communication line. In this paper we define and investigate the authentication of messages composed of quantum states. Assuming S and R hav…
▽ More
Authentication is a well-studied area of classical cryptography: a sender S and a receiver R sharing a classical private key want to exchange a classical message with the guarantee that the message has not been modified by any third party with control of the communication line. In this paper we define and investigate the authentication of messages composed of quantum states. Assuming S and R have access to an insecure quantum channel and share a private, classical random key, we provide a non-interactive scheme that enables S both to encrypt and to authenticate (with unconditional security) an m qubit message by encoding it into m+s qubits, where the failure probability decreases exponentially in the security parameter s. The classical private key is 2m+O(s) bits. To achieve this, we give a highly efficient protocol for testing the purity of shared EPR pairs. We also show that any scheme to authenticate quantum messages must also encrypt them. (In contrast, one can authenticate a classical message while leaving it publicly readable.) This has two important consequences: On one hand, it allows us to give a lower bound of 2m key bits for authenticating m qubits, which makes our protocol asymptotically optimal. On the other hand, we use it to show that digitally signing quantum states is impossible, even with only computational security.
△ Less
Submitted 20 May, 2002;
originally announced May 2002.
-
From Quantum Cheating to Quantum Security
Authors:
Daniel Gottesman,
Hoi-Kwong Lo
Abstract:
For thousands of years, code-makers and code-breakers have been competing for supremacy. Their arsenals may soon include a powerful new weapon: quantum mechanics. We give an overview of quantum cryptology as of November 2000.
For thousands of years, code-makers and code-breakers have been competing for supremacy. Their arsenals may soon include a powerful new weapon: quantum mechanics. We give an overview of quantum cryptology as of November 2000.
△ Less
Submitted 19 November, 2001;
originally announced November 2001.
-
Measurability of Wilson loop operators
Authors:
David Beckman,
Daniel Gottesman,
Alexei Kitaev,
John Preskill
Abstract:
We show that the nondemolition measurement of a spacelike Wilson loop operator W(C) is impossible in a relativistic non-Abelian gauge theory. In particular, if two spacelike-separated magnetic flux tubes both link with the loop C, then a nondemolition measurement of W(C) would cause electric charge to be transferred from one flux tube to the other, a violation of relativistic causality. A destru…
▽ More
We show that the nondemolition measurement of a spacelike Wilson loop operator W(C) is impossible in a relativistic non-Abelian gauge theory. In particular, if two spacelike-separated magnetic flux tubes both link with the loop C, then a nondemolition measurement of W(C) would cause electric charge to be transferred from one flux tube to the other, a violation of relativistic causality. A destructive measurement of W(C) is possible in a non-Abelian gauge theory with suitable matter content. In an Abelian gauge theory, many cooperating parties distributed along the loop C can perform a nondemolition measurement of the Wilson loop operator if they are equipped with a shared entangled ancilla that has been prepared in advance. We also note that Abelian electric charge (but not non-Abelian charge) can be transported superluminally, without any accompanying transmission of information.
△ Less
Submitted 22 October, 2001;
originally announced October 2001.
-
Proof of security of quantum key distribution with two-way classical communications
Authors:
Daniel Gottesman,
Hoi-Kwong Lo
Abstract:
Shor and Preskill have provided a simple proof of security of the standard quantum key distribution scheme by Bennett and Brassard (BB84) by demonstrating a connection between key distribution and entanglement purification protocols with one-way communications. Here we provide proofs of security of standard quantum key distribution schemes, BB84 and the six-state scheme, against the most general…
▽ More
Shor and Preskill have provided a simple proof of security of the standard quantum key distribution scheme by Bennett and Brassard (BB84) by demonstrating a connection between key distribution and entanglement purification protocols with one-way communications. Here we provide proofs of security of standard quantum key distribution schemes, BB84 and the six-state scheme, against the most general attack, by using the techniques of *two*-way entanglement purification. We demonstrate clearly the advantage of classical post-processing with two-way classical communications over classical post-processing with only one-way classical communications in QKD. This is done by the explicit construction of a new protocol for (the error correction/detection and privacy amplification of) BB84 that can tolerate a bit error rate of up to 18.9%, which is higher than what any BB84 scheme with only one-way classical communications can possibly tolerate. Moreover, we demonstrate the advantage of the six-state scheme over BB84 by showing that the six-state scheme can strictly tolerate a higher bit error rate than BB84. In particular, our six-state protocol can tolerate a bit error rate of 26.4%, which is higher than the upper bound of 25% bit error rate for any secure BB84 protocol. Consequently, our protocols may allow higher key generation rate and remain secure over longer distances than previous protocols. Our investigation suggests that two-way entanglement purification is a useful tool in the study of advantage distillation, error correction, and privacy amplification protocols.
△ Less
Submitted 17 September, 2002; v1 submitted 23 May, 2001;
originally announced May 2001.