-
Using Cryogenic CMOS Control Electronics To Enable A Two-Qubit Cross-Resonance Gate
Authors:
Devin L. Underwood,
Joseph A. Glick,
Ken Inoue,
David J. Frank,
John Timmerwilke,
Emily Pritchett,
Sudipto Chakraborty,
Kevin Tien,
Mark Yeck,
John F. Bulzacchelli,
Chris Baks,
Pat Rosno,
Raphael Robertazzi,
Matthew Beck,
Rajiv V. Joshi,
Dorothy Wisnieff,
Daniel Ramirez,
Jeff Ruedinger,
Scott Lekuch,
Brian P. Gaucher,
Daniel J. Friedman
Abstract:
Qubit control electronics composed of CMOS circuits are of critical interest for next generation quantum computing systems. A CMOS-based application specific integrated circuit (ASIC) fabricated in 14nm FinFET technology was used to generate and sequence qubit control waveforms and demonstrate a two-qubit cross resonance gate between fixed frequency transmons. The controller was thermally anchored…
▽ More
Qubit control electronics composed of CMOS circuits are of critical interest for next generation quantum computing systems. A CMOS-based application specific integrated circuit (ASIC) fabricated in 14nm FinFET technology was used to generate and sequence qubit control waveforms and demonstrate a two-qubit cross resonance gate between fixed frequency transmons. The controller was thermally anchored to the T = 4K stage of a dilution refrigerator and the measured power was 23 mW per qubit under active control. The chip generated single--side banded output frequencies between 4.5 and 5.5 GHz with a maximum power output of -18 dBm. Randomized benchmarking (RB) experiments revealed an average number of 1.71 instructions per Clifford (IPC) for single-qubit gates, and 17.51 IPC for two-qubit gates. A single-qubit error per gate of $ε_{\text{1Q}}$=8e-4 and two-qubit error per gate of $ε_\text{2Q}$=1.4e-2 is shown. A drive-induced Z-rotation is observed by way of a rotary echo experiment; this observation is consistent with expected qubit behavior given measured excess local oscillator (LO) leakage from the CMOS chip. The effect of spurious drive induced Z-errors is numerically evaluated with a two-qubit model Hamiltonian, and shown to be in good agreement with measured RB data. The modeling results suggest the Z-error varies linearly with pulse amplitude.
△ Less
Submitted 8 December, 2023; v1 submitted 22 February, 2023;
originally announced February 2023.
-
Schwinger-Keldysh superspace in quantum mechanics
Authors:
Michael Geracie,
Felix M. Haehl,
R. Loganayagam,
Prithvi Narayan,
David M. Ramirez,
Mukund Rangamani
Abstract:
We examine, in a quantum mechanical setting, the Hilbert space representation of the BRST symmetry associated with Schwinger-Keldysh path integrals. This structure had been postulated to encode important constraints on influence functionals in coarse-grained systems with dissipation, or in open quantum systems. Operationally, this entails uplifting the standard Schwinger-Keldysh two-copy formalism…
▽ More
We examine, in a quantum mechanical setting, the Hilbert space representation of the BRST symmetry associated with Schwinger-Keldysh path integrals. This structure had been postulated to encode important constraints on influence functionals in coarse-grained systems with dissipation, or in open quantum systems. Operationally, this entails uplifting the standard Schwinger-Keldysh two-copy formalism into superspace by appending BRST ghost degrees of freedom. These statements were previously argued at the level of the correlation functions. We provide herein a complementary perspective by working out the Hilbert space structure explicitly. Our analysis clarifies two crucial issues not evident in earlier works: firstly, certain background ghost insertions necessary to reproduce the correct Schwinger-Keldysh correlators arise naturally. Secondly, the Schwinger-Keldysh difference operators are systematically dressed by the ghost bilinears, which turn out to be necessary to give rise to a consistent operator algebra. We also elaborate on the structure of the final state (which is BRST closed) and the future boundary condition of the ghost fields.
△ Less
Submitted 12 December, 2017;
originally announced December 2017.
-
Quantum teleportation and information splitting via four-qubit cluster state and a Bell state
Authors:
Marlon David Gonzalez Ramirez,
Babatunde James Falaye,
Guo-Hua Sun,
M. Cruz-Irisson,
Shi-Hai Dong
Abstract:
Quantum teleportation provides a `bodiless' way of transmitting the quantum state from one object to another, at a distant location, using a classical communication channel and a previously shared entangled state. In this paper, we present a tripartite scheme for probabilistic teleportation of an arbitrary single qubit state, without losing the information of the state being teleported, via a four…
▽ More
Quantum teleportation provides a `bodiless' way of transmitting the quantum state from one object to another, at a distant location, using a classical communication channel and a previously shared entangled state. In this paper, we present a tripartite scheme for probabilistic teleportation of an arbitrary single qubit state, without losing the information of the state being teleported, via a four-qubit cluster state of the form $\left.|φ\right\rangle_{1234}=\left.α|0000\right\rangle+\left.β|1010\right\rangle+\left.γ|0101\right\rangle-η\left.|1111\right\rangle$, as the quantum channel, where the nonzero real numbers $α$, $β$, $γ$, and $η$ satisfy the relation $|α|^2+|β|^2+|γ|^2+|η|^2=1$. With the introduction of an auxiliary qubit with state $\left|0\right\rangle$, using a suitable unitary transformation and a positive-operator valued measure (POVM), the receiver can recreate the state of the original qubit. An important advantage of the teleportation scheme demonstrated here is that, if the teleportation fails, it can be repeated without teleporting copies of the unknown quantum state, if the concerned parties share another pair of entangled qubit. We also present a protocol for quantum information splitting of an arbitrary two-particle system via the aforementioned cluster state and a Bell-state as the quantum channel. Problems related to security attacks were examined for both the cases and it was found that this protocol is secure. This protocol is highly efficient and easy to implement.
△ Less
Submitted 5 May, 2017; v1 submitted 5 March, 2017;
originally announced March 2017.