-
Quantum Advantage in Variational Bayes Inference
Authors:
Hideyuki Miyahara,
Vwani Roychowdhury
Abstract:
Variational Bayes (VB) inference algorithm is used widely to estimate both the parameters and the unobserved hidden variables in generative statistical models. The algorithm -- inspired by variational methods used in computational physics -- is iterative and can get easily stuck in local minima, even when classical techniques, such as deterministic annealing (DA), are used. We study a variational…
▽ More
Variational Bayes (VB) inference algorithm is used widely to estimate both the parameters and the unobserved hidden variables in generative statistical models. The algorithm -- inspired by variational methods used in computational physics -- is iterative and can get easily stuck in local minima, even when classical techniques, such as deterministic annealing (DA), are used. We study a variational Bayes (VB) inference algorithm based on a non-traditional quantum annealing approach -- referred to as quantum annealing variational Bayes (QAVB) inference -- and show that there is indeed a quantum advantage to QAVB over its classical counterparts. In particular, we show that such better performance is rooted in key concepts from quantum mechanics: (i) the ground state of the Hamiltonian of a quantum system -- defined from the given variational Bayes (VB) problem -- corresponds to an optimal solution for the minimization problem of the variational free energy at very low temperatures; (ii) such a ground state can be achieved by a technique paralleling the quantum annealing process; and (iii) starting from this ground state, the optimal solution to the VB problem can be achieved by increasing the heat bath temperature to unity, and thereby avoiding local minima introduced by spontaneous symmetry breaking observed in classical physics based VB algorithms. We also show that the update equations of QAVB can be potentially implemented using $\lceil \log K \rceil$ qubits and $\mathcal{O} (K)$ operations per step. Thus, QAVB can match the time complexity of existing VB algorithms, while delivering higher performance.
△ Less
Submitted 7 July, 2022;
originally announced July 2022.
-
Quantum Approximation of Normalized Schatten Norms and Applications to Learning
Authors:
Yiyou Chen,
Hideyuki Miyahara,
Louis-S. Bouchard,
Vwani Roychowdhury
Abstract:
Efficient measures to determine similarity of quantum states, such as the fidelity metric, have been widely studied. In this paper, we address the problem of defining a similarity measure for quantum operations that can be \textit{efficiently estimated}. Given two quantum operations, $U_1$ and $U_2$, represented in their circuit forms, we first develop a quantum sampling circuit to estimate the no…
▽ More
Efficient measures to determine similarity of quantum states, such as the fidelity metric, have been widely studied. In this paper, we address the problem of defining a similarity measure for quantum operations that can be \textit{efficiently estimated}. Given two quantum operations, $U_1$ and $U_2$, represented in their circuit forms, we first develop a quantum sampling circuit to estimate the normalized Schatten 2-norm of their difference ($\| U_1-U_2 \|_{S_2}$) with precision $ε$, using only one clean qubit and one classical random variable. We prove a Poly$(\frac{1}ε)$ upper bound on the sample complexity, which is independent of the size of the quantum system. We then show that such a similarity metric is directly related to a functional definition of similarity of unitary operations using the conventional fidelity metric of quantum states ($F$): If $\| U_1-U_2 \|_{S_2}$ is sufficiently small (e.g. $ \leq \fracε{1+\sqrt{2(1/δ- 1)}}$) then the fidelity of states obtained by processing the same randomly and uniformly picked pure state, $|ψ\rangle$, is as high as needed ($F({U}_1 |ψ\rangle, {U}_2 |ψ\rangle)\geq 1-ε$) with probability exceeding $1-δ$. We provide example applications of this efficient similarity metric estimation framework to quantum circuit learning tasks, such as finding the square root of a given unitary operation.
△ Less
Submitted 23 June, 2022;
originally announced June 2022.
-
Decoherence Mitigation by Embedding a Logical Qubit in a Qudit
Authors:
Hideyuki Miyahara,
Yiyou Chen,
Vwani Roychowdhury,
Louis-S. Bouchard
Abstract:
Quantum information stored in a qubit is rapidly lost to the environment. The realization of robust qubits is one of the most important challenges in quantum computing. Herein we propose to embed a logical qubit within the manifold of a qudit as a scheme to preserve quantum information over extended periods of time. Under identical conditions (e.g. decoherence channels) the submanifold of the logi…
▽ More
Quantum information stored in a qubit is rapidly lost to the environment. The realization of robust qubits is one of the most important challenges in quantum computing. Herein we propose to embed a logical qubit within the manifold of a qudit as a scheme to preserve quantum information over extended periods of time. Under identical conditions (e.g. decoherence channels) the submanifold of the logical qubit exhibits extended lifetimes compared to a pure two-level system (qubit). The retention of quantum information further improves with separation between the sublevels of the logical qubit. Lifetime enhancement can be understood in terms of entropy production of the encoding and non-encoding subspaces during evolution under a quantum map for a $d$-level system. The additional pathways for coherent evolution through intermediate sublevels within a $d$-level manifold provide an information-preserving mechanism: reversible alternative channels to the irreversible loss of information to the environment characteristic of open quantum systems.
△ Less
Submitted 1 May, 2022;
originally announced May 2022.
-
Ansatz-Independent Variational Quantum Classifier
Authors:
Hideyuki Miyahara,
Vwani Roychowdhury
Abstract:
The paradigm of variational quantum classifiers (VQCs) encodes \textit{classical information} as quantum states, followed by quantum processing and then measurements to generate classical predictions. VQCs are promising candidates for efficient utilization of a near-term quantum device: classifiers involving $M$-dimensional datasets can be implemented with only $\lceil \log_2 M \rceil$ qubits by u…
▽ More
The paradigm of variational quantum classifiers (VQCs) encodes \textit{classical information} as quantum states, followed by quantum processing and then measurements to generate classical predictions. VQCs are promising candidates for efficient utilization of a near-term quantum device: classifiers involving $M$-dimensional datasets can be implemented with only $\lceil \log_2 M \rceil$ qubits by using an amplitude encoding. A general framework for designing and training VQCs, however, has not been proposed, and a fundamental understanding of its power and analytical relationships with classical classifiers are not well understood. An encouraging specific embodiment of VQCs, quantum circuit learning (QCL), utilizes an ansatz: it expresses the quantum evolution operator as a circuit with a predetermined topology and parametrized gates; training involves learning the gate parameters through optimization. In this letter, we first address the open questions about VQCs and then show that they, including QCL, fit inside the well-known kernel method. Based on such correspondence, we devise a design framework of efficient ansatz-independent VQCs, which we call the unitary kernel method (UKM): it directly optimizes the unitary evolution operator in a VQC. Thus, we show that the performance of QCL is bounded from above by the UKM. Next, we propose a variational circuit realization (VCR) for designing efficient quantum circuits for a given unitary operator. By combining the UKM with the VCR, we establish an efficient framework for constructing high-performing circuits. We finally benchmark the relatively superior performance of the UKM and the VCR via extensive numerical simulations on multiple datasets.
△ Less
Submitted 2 February, 2021;
originally announced February 2021.
-
How much of quantum mechanics is really needed to defy Extended Church-Turing Thesis?
Authors:
Leonid Gurvits,
Vwani Roychowdhury,
Sudhir Kumar Singh,
Farrokh Vatan
Abstract:
This paper has been withdrawn by the author as one of the coauthors needs institutional permission.
This paper has been withdrawn by the author as one of the coauthors needs institutional permission.
△ Less
Submitted 15 March, 2011; v1 submitted 13 March, 2011;
originally announced March 2011.
-
Latency in local, two-dimensional, fault-tolerant quantum computing
Authors:
Federico M. Spedalieri,
Vwani P. Roychowdhury
Abstract:
We analyze the latency of fault-tolerant quantum computing based on the 9-qubit Bacon-Shor code using a local, two-dimensional architecture. We embed the data qubits in a 7 by 7 array of physical qubits, where the extra qubits are used for ancilla preparation and qubit transportation by means of a SWAP chain. The latency is reduced with respect to a similar implementation using Steane's 7-qubit…
▽ More
We analyze the latency of fault-tolerant quantum computing based on the 9-qubit Bacon-Shor code using a local, two-dimensional architecture. We embed the data qubits in a 7 by 7 array of physical qubits, where the extra qubits are used for ancilla preparation and qubit transportation by means of a SWAP chain. The latency is reduced with respect to a similar implementation using Steane's 7-qubit code (K. M. Svore, D. P. DiVincenzo, and B. M. Terhal, Quantum Information & Computation {\bf 7}, 297 (2007)). Furthermore, the error threshold is also improved to $2.02 \times 10^{-5}$, when memory errors are taken to be one tenth of the gate error rates.
△ Less
Submitted 27 May, 2008;
originally announced May 2008.
-
Robustness of entangled states that are positive under partial transposition
Authors:
Somshubhro Bandyopadhyay,
Sibasish Ghosh,
Vwani Roychowdhury
Abstract:
We study robustness of bipartite entangled states that are positive under partial transposition (PPT). It is shown that almost all PPT entangled states are unconditionally robust, in the sense, both inseparability and positivity are preserved under sufficiently small perturbations in its immediate neighborhood. Such unconditionally robust PPT entangled states lie inside an open PPT entangled bal…
▽ More
We study robustness of bipartite entangled states that are positive under partial transposition (PPT). It is shown that almost all PPT entangled states are unconditionally robust, in the sense, both inseparability and positivity are preserved under sufficiently small perturbations in its immediate neighborhood. Such unconditionally robust PPT entangled states lie inside an open PPT entangled ball. We construct examples of such balls whose radii are shown to be finite and can be explicitly calculated. This provides a lower bound on the volume of all PPT entangled states. Multipartite generalization of our constructions are also outlined.
△ Less
Submitted 10 June, 2008; v1 submitted 31 August, 2007;
originally announced September 2007.
-
Entangled multi-qubit states without higher-tangle
Authors:
Heng Fan,
Yong-Cheng Ou,
Vwani Roychowdhury
Abstract:
We analyze mixed multi-qubit states composed of a W class state and a product state with all qubit in |0>. We find the optimal pure state decomposition and convex roofs for higher-tangle with bipartite partition between one qubit and the rest qubits for those mixed states. The optimality of the decomposition is ensured by the Coffman-Kundu-Wootters (CKW) inequality which describes the monogamy o…
▽ More
We analyze mixed multi-qubit states composed of a W class state and a product state with all qubit in |0>. We find the optimal pure state decomposition and convex roofs for higher-tangle with bipartite partition between one qubit and the rest qubits for those mixed states. The optimality of the decomposition is ensured by the Coffman-Kundu-Wootters (CKW) inequality which describes the monogamy of quantum entanglement. The generalized monogamy inequality is found to be true for W class states with arbitrary partitions between one qubit and multi-qubit.
△ Less
Submitted 11 July, 2007;
originally announced July 2007.
-
Superadditivity of distillable entanglement From Quantum Teleportation
Authors:
Somshubhro Bandyopadhyay,
Vwani Roychowdhury
Abstract:
We show that the phenomenon of superadditivity of distillable entanglement observed in multipartite quantum systems results from the consideration of states created during the execution of the standard end-to-end quantum teleportation protocol (and a few additional local operations and classical communication (LOCC) steps) on a linear chain of singlets. Some of these intermediate states are tens…
▽ More
We show that the phenomenon of superadditivity of distillable entanglement observed in multipartite quantum systems results from the consideration of states created during the execution of the standard end-to-end quantum teleportation protocol (and a few additional local operations and classical communication (LOCC) steps) on a linear chain of singlets. Some of these intermediate states are tensor products of bound-entangled (BE) states, and hence, by construction possess distillable entanglement, which can be unlocked by simply completing the rest of the LOCC operations required by the underlying teleportation protocol. We use this systematic approach to construct both new and known examples of superactivation of bound entanglement, and first examples of activation of BE states using other BE states. A surprising outcome is the construction of noiseless quantum relay channels with no distillable entanglement between any two parties, except for that between the two end nodes.
△ Less
Submitted 7 November, 2006;
originally announced November 2006.
-
Boundary effects to the entanglement entropy and two-site entanglement of the spin-1 valence-bond solid
Authors:
Heng Fan,
Vladimir Korepin,
Vwani Roychowdhury,
Christopher Hadley,
Sougato Bose
Abstract:
We investigate the von Neumann entropy of a block of subsystem for the valence-bond solid (VBS) state with general open boundary conditions. We show that the effect of the boundary on the von Neumann entropy decays exponentially fast in the distance between the subsystem considered and the boundary sites.
Further, we show that as the size of the subsystem increases, its von Neumann entropy exp…
▽ More
We investigate the von Neumann entropy of a block of subsystem for the valence-bond solid (VBS) state with general open boundary conditions. We show that the effect of the boundary on the von Neumann entropy decays exponentially fast in the distance between the subsystem considered and the boundary sites.
Further, we show that as the size of the subsystem increases, its von Neumann entropy exponentially approaches the summation of the von Neumann entropies of the two ends, the exponent being related to the size. In contrast to critical systems, where boundary effects to the von Neumann entropy decay slowly, the boundary effects in a VBS, a non-critical system, decay very quickly. We also study the entanglement between two spins.
Curiously, while the boundary operators decrease the von Neumann entropy of L spins, they increase the entanglement between two spins.
△ Less
Submitted 23 July, 2007; v1 submitted 16 May, 2006;
originally announced May 2006.
-
A Proof of the Security of Quantum Key Distribution
Authors:
Eli Biham,
Michel Boyer,
P. Oscar Boykin,
Tal Mor,
Vwani Roychowdhury
Abstract:
We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages such that their security is also unaffected in the future.
We prove the security of theoretical quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages such that their security is also unaffected in the future.
△ Less
Submitted 17 November, 2005;
originally announced November 2005.
-
Valence-Bond-Solid state entanglement in a 2-D Cayley tree
Authors:
Heng Fan,
Vladimir Korepin,
Vwani Roychowdhury
Abstract:
The Valence-Bond-Solid (VBS) states are in general ground states for certain gapped models. We consider the entanglement of VBS states on a two-dimensional Cayley tree. We show that the entropy of the reduced density operator does not depend on the whole size of the Cayley tree. We also show that asymptotically, the entropy is liearly proportional to the number of singlet states cut by the reduc…
▽ More
The Valence-Bond-Solid (VBS) states are in general ground states for certain gapped models. We consider the entanglement of VBS states on a two-dimensional Cayley tree. We show that the entropy of the reduced density operator does not depend on the whole size of the Cayley tree. We also show that asymptotically, the entropy is liearly proportional to the number of singlet states cut by the reduced density operator of the VBS state.
△ Less
Submitted 17 November, 2005; v1 submitted 15 November, 2005;
originally announced November 2005.
-
Reversible Fault-Tolerant Logic
Authors:
P. Oscar Boykin,
Vwani P. Roychowdhury
Abstract:
It is now widely accepted that the CMOS technology implementing irreversible logic will hit a scaling limit beyond 2016, and that the increased power dissipation is a major limiting factor. Reversible computing can potentially require arbitrarily small amounts of energy. Recently several nano-scale devices which have the potential to scale, and which naturally perform reversible logic, have emer…
▽ More
It is now widely accepted that the CMOS technology implementing irreversible logic will hit a scaling limit beyond 2016, and that the increased power dissipation is a major limiting factor. Reversible computing can potentially require arbitrarily small amounts of energy. Recently several nano-scale devices which have the potential to scale, and which naturally perform reversible logic, have emerged. This paper addresses several fundamental issues that need to be addressed before any nano-scale reversible computing systems can be realized, including reliability and performance trade-offs and architecture optimization. Many nano-scale devices will be limited to only near neighbor interactions, requiring careful optimization of circuits. We provide efficient fault-tolerant (FT) circuits when restricted to both 2D and 1D. Finally, we compute bounds on the entropy (and hence, heat) generated by our FT circuits and provide quantitative estimates on how large can we make our circuits before we lose any advantage over irreversible computing.
△ Less
Submitted 4 April, 2005;
originally announced April 2005.
-
Exact Entanglement Cost of Multi-Qubit Bound Entangled States
Authors:
Somshubhro Bandyopadhyay,
Vwani P. Roychowdhury
Abstract:
We report the exact entanglement cost of a class of multiqubit bound entangled states, computed in the context of a universal model for multipartite state preparation. The exact amount of entanglement needed to prepare such states are determined by first obtaining lower bounds using a cut-set approach, and then providing explicit local protocols achieving the lower bound.
We report the exact entanglement cost of a class of multiqubit bound entangled states, computed in the context of a universal model for multipartite state preparation. The exact amount of entanglement needed to prepare such states are determined by first obtaining lower bounds using a cut-set approach, and then providing explicit local protocols achieving the lower bound.
△ Less
Submitted 4 September, 2005; v1 submitted 1 February, 2005;
originally announced February 2005.
-
Information vs. Disturbance in Dimension D
Authors:
P. Oscar Boykin,
Vwani P. Roychowdhury
Abstract:
We show that for Eve to get information in one basis about a state, she must cause errors in all bases that are mutually unbiased to that basis. Our result holds in any dimension. We also show that this result holds for all functions of messages that are encrypted with a key.
We show that for Eve to get information in one basis about a state, she must cause errors in all bases that are mutually unbiased to that basis. Our result holds in any dimension. We also show that this result holds for all functions of messages that are encrypted with a key.
△ Less
Submitted 3 December, 2004;
originally announced December 2004.
-
Threshold Error Penalty for Fault Tolerant Computation with Nearest Neighbour Communication
Authors:
T. Szkopek,
P. O. Boykin,
H. Fan,
V. Roychowdhury,
E. Yablonovitch,
G. Simms,
M. Gyure,
B. Fong
Abstract:
The error threshold for fault tolerant quantum computation with concatenated encoding of qubits is penalized by internal communication overhead. Many quantum computation proposals rely on nearest-neighbour communication, which requires excess gate operations. For a qubit stripe with a width of L+1 physical qubits implementing L levels of concatenation, we find that the error threshold of 2.1x10^…
▽ More
The error threshold for fault tolerant quantum computation with concatenated encoding of qubits is penalized by internal communication overhead. Many quantum computation proposals rely on nearest-neighbour communication, which requires excess gate operations. For a qubit stripe with a width of L+1 physical qubits implementing L levels of concatenation, we find that the error threshold of 2.1x10^-5 without any communication burden is reduced to 1.2x10^-7 when gate errors are the dominant source of error. This ~175X penalty in error threshold translates to an ~13X penalty in the amplitude and timing of gate operation control pulses.
△ Less
Submitted 8 September, 2005; v1 submitted 15 November, 2004;
originally announced November 2004.
-
Bell-Correlated Activable Bound Entanglement in Multiqubit Systems
Authors:
Somshubhro Bandyopadhyay,
Indrani Chattopadhyay,
Vwani P. Roychowdhury,
Debasis Sarkar
Abstract:
We show that the Hilbert space of even number ($\geq4$) of qubits can always be decomposed as a direct sum of four orthogonal subspaces such that the normalized projectors onto the subspaces are activable bound entangled (ABE) states. These states also show a surprising recursive relation in the sense that the states belonging to $2N+2$ qubits are Bell correlated to the states of $2N$ qubits; he…
▽ More
We show that the Hilbert space of even number ($\geq4$) of qubits can always be decomposed as a direct sum of four orthogonal subspaces such that the normalized projectors onto the subspaces are activable bound entangled (ABE) states. These states also show a surprising recursive relation in the sense that the states belonging to $2N+2$ qubits are Bell correlated to the states of $2N$ qubits; hence, we refer to these states as Bell-Correlated ABE (BCABE) states. We also study the properties of noisy BCABE states and show that they are very similar to that of two qubit Bell-diagonal states.
△ Less
Submitted 11 November, 2004;
originally announced November 2004.
-
Optimal two-qubit quantum circuits using exchange interactions
Authors:
Heng Fan,
Vwani Roychowdhury,
Thomas Szkopek
Abstract:
The Heisenberg exchange interaction is a natural method to implement non-local (i.e., multi-qubit) quantum gates in quantum information processing. We consider quantum circuits comprising of $(SWAP)^α$ gates, which are realized through the exchange interaction, and single-qubit gates. A universal two-qubit quantum circuit is constructed from only three $(SWAP)^α$ gates and six single-qubit gates…
▽ More
The Heisenberg exchange interaction is a natural method to implement non-local (i.e., multi-qubit) quantum gates in quantum information processing. We consider quantum circuits comprising of $(SWAP)^α$ gates, which are realized through the exchange interaction, and single-qubit gates. A universal two-qubit quantum circuit is constructed from only three $(SWAP)^α$ gates and six single-qubit gates. We further show that three $(SWAP)^α$ gates are not only sufficient, but necessary. Since six single-qubit gates are known to be necessary, our universal two-qubit circuit is optimal in terms of the number of {\em both} $(SWAP)^α$ and single-qubit gates.
△ Less
Submitted 15 July, 2005; v1 submitted 30 September, 2004;
originally announced October 2004.
-
Eigenvalue Estimation of Differential Operators
Authors:
Thomas Szkopek,
Vwani Roychowdhury,
Eli Yablonovitch,
Daniel S. Abrams
Abstract:
We demonstrate how linear differential operators could be emulated by a quantum processor, should one ever be built, using the Abrams-Lloyd algorithm. Given a linear differential operator of order 2S, acting on functions psi(x_1,x_2,...,x_D) with D arguments, the computational cost required to estimate a low order eigenvalue to accuracy Theta(1/N^2) is Theta((2(S+1)(1+1/nu)+D)log N) qubits and O…
▽ More
We demonstrate how linear differential operators could be emulated by a quantum processor, should one ever be built, using the Abrams-Lloyd algorithm. Given a linear differential operator of order 2S, acting on functions psi(x_1,x_2,...,x_D) with D arguments, the computational cost required to estimate a low order eigenvalue to accuracy Theta(1/N^2) is Theta((2(S+1)(1+1/nu)+D)log N) qubits and O(N^{2(S+1)(1+1/nu)} (D log N)^c) gate operations, where N is the number of points to which each argument is discretized, nu and c are implementation dependent constants of O(1). Optimal classical methods require Theta(N^D) bits and Omega(N^D) gate operations to perform the same eigenvalue estimation. The Abrams-Lloyd algorithm thereby leads to exponential reduction in memory and polynomial reduction in gate operations, provided the domain has sufficiently large dimension D > 2(S+1)(1+1/nu). In the case of Schrodinger's equation, ground state energy estimation of two or more particles can in principle be performed with fewer quantum mechanical gates than classical gates.
△ Less
Submitted 7 September, 2005; v1 submitted 20 August, 2004;
originally announced August 2004.
-
Entanglement in a Valence-Bond-Solid State
Authors:
Heng Fan,
Vladimir Korepin,
Vwani Roychowdhury
Abstract:
We study entanglement in Valence-Bond-Solid state. It describes the ground state of Affleck, Kennedy, Lieb and Tasaki quantum spin chain. The AKLT model has a gap and open boundary conditions. We calculate an entropy of a subsystem (continuous block of spins). It quantifies the entanglement of this block with the rest of the ground state. We prove that the entanglement approaches a constant valu…
▽ More
We study entanglement in Valence-Bond-Solid state. It describes the ground state of Affleck, Kennedy, Lieb and Tasaki quantum spin chain. The AKLT model has a gap and open boundary conditions. We calculate an entropy of a subsystem (continuous block of spins). It quantifies the entanglement of this block with the rest of the ground state. We prove that the entanglement approaches a constant value exponentially fast as the size of the subsystem increases. Actually we proved that the density matrix of the continuous block of spins depends only on the length of the block, but not on the total size of the chain [distance to the ends also not essential]. We also study reduced density matrices of two spins both in the bulk and on the boundary. We evaluated concurrencies.
△ Less
Submitted 17 September, 2004; v1 submitted 10 June, 2004;
originally announced June 2004.
-
Non-full rank bound entangled states satisfying the range criterion
Authors:
Somshubhro Bandyopadhyay,
Sibasish Ghosh,
Vwani Roychowdhury
Abstract:
A systematic method for generating bound entangled states in any bipartite system, with ranks ranging from five to full rank, is presented. These states are constructed by mixing separable states with UPB (Unextendible Product Basis) - generated PPT bound entangled states. A subset of this class of PPT bound entangled states, having less than full rank, is shown to satisfy the range criterion [P…
▽ More
A systematic method for generating bound entangled states in any bipartite system, with ranks ranging from five to full rank, is presented. These states are constructed by mixing separable states with UPB (Unextendible Product Basis) - generated PPT bound entangled states. A subset of this class of PPT bound entangled states, having less than full rank, is shown to satisfy the range criterion [Phys. Lett. A, vol. 232 (1997) 333].
△ Less
Submitted 10 November, 2004; v1 submitted 3 June, 2004;
originally announced June 2004.
-
Algorithmic Cooling of Spins: A Practicable Method for Increasing Polarization
Authors:
Jose M. Fernandez,
Seth Lloyd,
Tal Mor,
Vwani Roychowdhury
Abstract:
An efficient technique to generate ensembles of spins that are highly polarized by external magnetic fields is the Holy Grail in Nuclear Magnetic Resonance (NMR) spectroscopy. Since spin-half nuclei have steady-state polarization biases that increase inversely with temperature, spins exhibiting high polarization biases are considered cool, even when their environment is warm. Existing spin-cooli…
▽ More
An efficient technique to generate ensembles of spins that are highly polarized by external magnetic fields is the Holy Grail in Nuclear Magnetic Resonance (NMR) spectroscopy. Since spin-half nuclei have steady-state polarization biases that increase inversely with temperature, spins exhibiting high polarization biases are considered cool, even when their environment is warm. Existing spin-cooling techniques are highly limited in their efficiency and usefulness. Algorithmic cooling is a promising new spin-cooling approach that employs data compression methods in open systems. It reduces the entropy of spins on long molecules to a point far beyond Shannon's bound on reversible entropy manipulations (an information-theoretic version of the 2nd Law of Thermodynamics), thus increasing their polarization. Here we present an efficient and experimentally feasible algorithmic cooling technique that cools spins to very low temperatures even on short molecules. This practicable algorithmic cooling could lead to breakthroughs in high-sensitivity NMR spectroscopy in the near future, and to the development of scalable NMR quantum computers in the far future. Moreover, while the cooling algorithm itself is classical, it uses quantum gates in its implementation, thus representing the first short-term application of quantum computing devices.
△ Less
Submitted 23 January, 2004; v1 submitted 21 January, 2004;
originally announced January 2004.
-
New classes of n-copy undistillable quantum states with negative partial transposition
Authors:
Somshubhro Bandyopadhyay,
Vwani Roychowdhury
Abstract:
The discovery of entangled quantum states from which one cannot distill pure entanglement constitutes a fundamental recent advance in the field of quantum information. Such bipartite bound-entangled (BE) quantum states \emph{could} fall into two distinct categories: (1) Inseparable states with positive partial transposition (PPT), and (2) States with negative partial transposition (NPT). While t…
▽ More
The discovery of entangled quantum states from which one cannot distill pure entanglement constitutes a fundamental recent advance in the field of quantum information. Such bipartite bound-entangled (BE) quantum states \emph{could} fall into two distinct categories: (1) Inseparable states with positive partial transposition (PPT), and (2) States with negative partial transposition (NPT). While the existence of PPT BE states has been confirmed, \emph{only one} class of \emph{conjectured} NPT BE states has been discovered so far. We provide explicit constructions of a variety of multi-copy undistillable NPT states, and conjecture that they constitute families of NPT BE states. For example, we show that for every pure state of Schmidt rank greater than or equal to three, one can construct n-copy undistillable NPT states, for any $n\geq1$. The abundance of such conjectured NPT BE states, we believe, considerably strengthens the notion that being NPT is only a necessary condition for a state to be distillable.
△ Less
Submitted 11 February, 2003;
originally announced February 2003.
-
Maximally-Disordered Distillable Quantum States
Authors:
Somshubhro Bandyopadhyay,
Vwani Roychowdhury
Abstract:
We explore classical to quantum transition of correlations by studying the quantum states located just outside of the classically-correlated-states-only neighborhood of the maximally mixed state (the largest separable ball (LSB)). We show that a natural candidate for such states raises the possibility of a layered transition, i.e., an annular region comprising only classical and the classical-li…
▽ More
We explore classical to quantum transition of correlations by studying the quantum states located just outside of the classically-correlated-states-only neighborhood of the maximally mixed state (the largest separable ball (LSB)). We show that a natural candidate for such states raises the possibility of a layered transition, i.e., an annular region comprising only classical and the classical-like bound entangled states, followed by free or distillable entanglement. Surprisingly, we find the transition to be abrupt for bipartite systems: distillable states emerge arbitrarily close to the LSB. For multipartite systems, while the radius of the LSB remains unknown, we determine the radius of the largest undistillable ball. Our results also provide an upper bound on how noisy shared entangled states can be for executing quantum information processing protocols.
△ Less
Submitted 3 June, 2004; v1 submitted 5 February, 2003;
originally announced February 2003.
-
Supercatalysis
Authors:
Somshubhro Bandyopadhyay,
Vwani Roychowdhury
Abstract:
We show that entanglement-assisted transformations of bipartite entangled states can be more efficient than catalysis [D. Jonathan and M. B. Plenio, Phys. Rev. Lett. 83, 3566 (1999)}, i.e., given two incomparable bipartite states not only can the transformation be enabled by performing collective operations with an auxiliary entangled state, but the entanglement of the auxiliary state itself can…
▽ More
We show that entanglement-assisted transformations of bipartite entangled states can be more efficient than catalysis [D. Jonathan and M. B. Plenio, Phys. Rev. Lett. 83, 3566 (1999)}, i.e., given two incomparable bipartite states not only can the transformation be enabled by performing collective operations with an auxiliary entangled state, but the entanglement of the auxiliary state itself can be enhanced. We refer to this phenomenon as supercatalysis. We provide results on the properties of supercatalysis and its relationship with catalysis. In particular, we obtain a useful necessary and sufficient condition for catalysis, provide several sufficient conditions for supercatalysis and study the extent to which entanglement of the auxiliary state can be enhanced via supercatalysis.
△ Less
Submitted 19 July, 2001;
originally announced July 2001.
-
Algorithmic Cooling and Scalable NMR Quantum Computers
Authors:
P. Oscar Boykin,
Tal Mor,
Vwani Roychowdhury,
Farrokh Vatan,
Rutger Vrijen
Abstract:
We present here algorithmic cooling (via polarization-heat-bath)- a powerful method for obtaining a large number of highly polarized spins in liquid nuclear-spin systems at finite temperature. Given that spin-half states represent (quantum) bits, algorithmic cooling cleans dirty bits beyond the Shannon's bound on data compression, by employing a set of rapidly thermal-relaxing bits. Such auxilia…
▽ More
We present here algorithmic cooling (via polarization-heat-bath)- a powerful method for obtaining a large number of highly polarized spins in liquid nuclear-spin systems at finite temperature. Given that spin-half states represent (quantum) bits, algorithmic cooling cleans dirty bits beyond the Shannon's bound on data compression, by employing a set of rapidly thermal-relaxing bits. Such auxiliary bits could be implemented using spins that rapidly get into thermal equilibrium with the environment, e.g., electron spins.
Cooling spins to a very low temperature without cooling the environment could lead to a breakthrough in nuclear magnetic resonance experiments, and our ``spin-refrigerating'' method suggests that this is possible.
The scaling of NMR ensemble computers is probably the main obstacle to building useful quantum computing devices, and our spin-refrigerating method suggests that this problem can be resolved.
△ Less
Submitted 18 June, 2001;
originally announced June 2001.
-
Partial recovery of entanglement in bipartite entanglement transformations
Authors:
Somshubhro Bandyopadhyay,
Vwani Roychowdhury,
Farrokh Vatan
Abstract:
Any deterministic bipartite entanglement transformation involving finite copies of pure states and carried out using local operations and classical communication (LOCC) results in a net loss of entanglement. We show that for almost all such transformations, partial recovery of lost entanglement is achievable by using $2 \times 2$ auxiliary entangled states, no matter how large the dimensions of…
▽ More
Any deterministic bipartite entanglement transformation involving finite copies of pure states and carried out using local operations and classical communication (LOCC) results in a net loss of entanglement. We show that for almost all such transformations, partial recovery of lost entanglement is achievable by using $2 \times 2$ auxiliary entangled states, no matter how large the dimensions of the parent states are. For the rest of the special cases of deterministic LOCC transformations, we show that the dimension of the auxiliary entangled state depends on the presence of equalities in the majorization relations of the parent states. We show that genuine recovery is still possible using auxiliary states in dimensions less than that of the parent states for all patterns of majorization relations except only one special case.
△ Less
Submitted 2 April, 2002; v1 submitted 5 May, 2001;
originally announced May 2001.
-
Quantum Formulas: a Lower Bound and Simulation
Authors:
Vwani P. Roychowdhury,
Farrokh Vatan
Abstract:
We show that Nechiporuk's method for proving lower bounds for Boolean formulas can be extended to the quantum case. This leads to an $Ω(n^2 / \log^2 n)$ lower bound for quantum formulas computing an explicit function. The only known previous explicit lower bound for quantum formulas states that the majority function does not have a linear-size quantum formula. We also show that quantum formulas…
▽ More
We show that Nechiporuk's method for proving lower bounds for Boolean formulas can be extended to the quantum case. This leads to an $Ω(n^2 / \log^2 n)$ lower bound for quantum formulas computing an explicit function. The only known previous explicit lower bound for quantum formulas states that the majority function does not have a linear-size quantum formula. We also show that quantum formulas can be simulated by Boolean circuits of almost the same size.
△ Less
Submitted 10 April, 2001;
originally announced April 2001.
-
Bounds for weight distribution of weakly self-dual codes
Authors:
Vwani P. Roychowdhury,
Farrokh Vatan
Abstract:
Upper bounds are given for the weight distribution of binary weakly self-dual codes. To get these new bounds, we introduce a novel method of utilizing unitary operations on Hilbert spaces. This method is motivated by recent progress on quantum computing. This new approach leads to much simpler proofs for such genre of bounds on the weight distributions of certain classes of codes. Moreover, in s…
▽ More
Upper bounds are given for the weight distribution of binary weakly self-dual codes. To get these new bounds, we introduce a novel method of utilizing unitary operations on Hilbert spaces. This method is motivated by recent progress on quantum computing. This new approach leads to much simpler proofs for such genre of bounds on the weight distributions of certain classes of codes. Moreover, in some cases, our bounds are improvements on the earlier bounds. These improvements are achieved, either by extending the range of the weights over which the bounds apply, or by extending the class of codes subjected to these bounds.
△ Less
Submitted 2 April, 2001;
originally announced April 2001.
-
A new proof for the existence of mutually unbiased bases
Authors:
Somshubhro Bandyopadhyay,
P. Oscar Boykin,
Vwani Roychowdhury,
Farrokh Vatan
Abstract:
We develop a strong connection between maximally commuting bases of orthogonal unitary matrices and mutually unbiased bases. A necessary condition of the existence of mutually unbiased bases for any finite dimension is obtained. Then a constructive proof of the existence of mutually unbiased bases for dimensions which are power of a prime is presented. It is also proved that in any dimension d t…
▽ More
We develop a strong connection between maximally commuting bases of orthogonal unitary matrices and mutually unbiased bases. A necessary condition of the existence of mutually unbiased bases for any finite dimension is obtained. Then a constructive proof of the existence of mutually unbiased bases for dimensions which are power of a prime is presented. It is also proved that in any dimension d the number of mutually unbiased bases is at most d+1. An explicit representation of mutually unbiased observables in terms of Pauli matrices are provided for d=2^m.
△ Less
Submitted 7 September, 2001; v1 submitted 29 March, 2001;
originally announced March 2001.
-
A classification of incomparable states
Authors:
Spmshubhro Bandyopadhyay,
Vwani P. Roychowdhury,
Ujjwal Sen
Abstract:
Let (\{| ψ> ,| φ>}) be an incomparable pair of states ((| ψ\nleftrightarrow | φ>)), \emph, i.e., (| ψ>) and (| φ>) cannot be transformed to each other with probability one by local transformations and classical communication (LOCC). We show that incomparable states can be multiple-copy transformable, \emph, i.e., there can exist a \emph{k}, such that (| ψ> ^{\otimes k+1}\to | φ> ^{\otimes k+1}),…
▽ More
Let (\{| ψ> ,| φ>}) be an incomparable pair of states ((| ψ\nleftrightarrow | φ>)), \emph, i.e., (| ψ>) and (| φ>) cannot be transformed to each other with probability one by local transformations and classical communication (LOCC). We show that incomparable states can be multiple-copy transformable, \emph, i.e., there can exist a \emph{k}, such that (| ψ> ^{\otimes k+1}\to | φ> ^{\otimes k+1}), i.e., (k+1) copies of (| ψ>) can be transformed to (k+1) copies of (| φ>) with probability one by LOCC but (| ψ> ^{\otimes n}\nleftrightarrow | φ> ^{\otimes n} \forall n\leq k). We call such states \emph{k}-copy LOCC incomparable. We provide a necessary condition for a given pair of states to be \emph{k}-copy LOCC incomparable for some \emph{k}. We also show that there exist states that are neither \emph{k}-copy LOCC incomparable for any \emph{k} nor catalyzable even with multiple copies. We call such states strongly incomparable. We give a sufficient condition for strong incomparability.
We demonstrate that the optimal probability of a conclusive transformation involving many copies, (p_{max}(| ψ> ^{\otimes m}\to | φ> ^{\otimes m})) can decrease exponentially with the number of source states (m), even if the source state has \emph{more} entropy of entanglement.
△ Less
Submitted 23 March, 2001;
originally announced March 2001.
-
Optimal Encryption of Quantum Bits
Authors:
P. Oscar Boykin,
Vwani Roychowdhury
Abstract:
We characterize the complete set of protocols that may be used to securely encrypt n quantum bits using secret and random classical bits. In addition to the application of such quantum encryption protocols to quantum data security, our framework allows for generalizations of many classical cryptographic protocols to quantum data. We show that the encrypted state gives no information without the…
▽ More
We characterize the complete set of protocols that may be used to securely encrypt n quantum bits using secret and random classical bits. In addition to the application of such quantum encryption protocols to quantum data security, our framework allows for generalizations of many classical cryptographic protocols to quantum data. We show that the encrypted state gives no information without the secret classical data, and that 2n random classical bits are the minimum necessary for informationally secure quantum encryption. Moreover, the quantum operations are shown to have a surprising structure in a canonical inner product space. This quantum encryption protocol is a generalization of the classical one time pad concept. A connection is made between quantum encryption and quantum teleportation, and this allows for a new proof of optimality of teleportation.
△ Less
Submitted 20 March, 2000; v1 submitted 16 March, 2000;
originally announced March 2000.
-
A Proof of the Security of Quantum Key Distribution
Authors:
Eli Biham,
Michel Boyer,
P. Oscar Boykin,
Tal Mor,
Vwani Roychowdhury
Abstract:
We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages in a way that their security is also unaffected in the future.
We prove the security of quantum key distribution against the most general attacks which can be performed on the channel, by an eavesdropper who has unlimited computation abilities, and the full power allowed by the rules of classical and quantum physics. A key created that way can then be used to transmit secure messages in a way that their security is also unaffected in the future.
△ Less
Submitted 10 December, 1999;
originally announced December 1999.
-
Algorithms on Ensemble Quantum Computers
Authors:
P. Oscar Boykin,
Tal Mor,
Vwani Roychowdhury,
Farrokh Vatan
Abstract:
In ensemble (or bulk) quantum computation, measurements of qubits in an individual computer cannot be performed. Instead, only expectation values can be measured. As a result of this limitation on the model of computation, various important algorithms cannot be processed directly on such computers, and must be modified. We provide modifications of various existing protocols, including algorithms…
▽ More
In ensemble (or bulk) quantum computation, measurements of qubits in an individual computer cannot be performed. Instead, only expectation values can be measured. As a result of this limitation on the model of computation, various important algorithms cannot be processed directly on such computers, and must be modified. We provide modifications of various existing protocols, including algorithms for universal fault--tolerant computation, Shor's factorization algorithm (which can be extended to any algorithm computing an NP function), and some search algorithms to enable processing them on ensemble quantum computers.
△ Less
Submitted 21 July, 1999;
originally announced July 1999.
-
On Universal and Fault-Tolerant Quantum Computing
Authors:
P. Oscar Boykin,
Tal Mor,
Matthew Pulver,
Vwani Roychowdhury,
Farrokh Vatan
Abstract:
A novel universal and fault-tolerant basis (set of gates) for quantum computation is described. Such a set is necessary to perform quantum computation in a realistic noisy environment. The new basis consists of two single-qubit gates (Hadamard and ${σ_z}^{1/4}$), and one double-qubit gate (Controlled-NOT). Since the set consisting of Controlled-NOT and Hadamard gates is not universal, the new ba…
▽ More
A novel universal and fault-tolerant basis (set of gates) for quantum computation is described. Such a set is necessary to perform quantum computation in a realistic noisy environment. The new basis consists of two single-qubit gates (Hadamard and ${σ_z}^{1/4}$), and one double-qubit gate (Controlled-NOT). Since the set consisting of Controlled-NOT and Hadamard gates is not universal, the new basis achieves universality by including only one additional elementary (in the sense that it does not include angles that are irrational multiples of $π$) single-qubit gate, and hence, is potentially the simplest universal basis that one can construct. We also provide an alternative proof of universality for the only other known class of universal and fault-tolerant basis proposed by Shor and by Kitaev.
△ Less
Submitted 15 June, 1999;
originally announced June 1999.
-
Electron Spin Resonance Transistors for Quantum Computing in Silicon-Germanium Heterostructures
Authors:
Rutger Vrijen,
Eli Yablonovitch,
Kang Wang,
Hong Wen Jiang,
Alex Balandin,
Vwani Roychowdhury,
Tal Mor,
David DiVincenzo
Abstract:
We apply the full power of modern electronic band structure engineering and epitaxial heterostructures to design a transistor that can sense and control a single donor electron spin. Spin resonance transistors may form the technological basis for quantum information processing. One and two qubit operations are performed by applying a gate bias. The bias electric field pulls the electron wave fun…
▽ More
We apply the full power of modern electronic band structure engineering and epitaxial heterostructures to design a transistor that can sense and control a single donor electron spin. Spin resonance transistors may form the technological basis for quantum information processing. One and two qubit operations are performed by applying a gate bias. The bias electric field pulls the electron wave function away from the dopant ion into layers of different alloy composition. Owing to the variation of the g-factor (Si:g=1.995, Ge:g=1.563), this displacement changes the spin Zeeman energy, allowing single-qubit operations. By displacing the electron even further, the overlap with neighboring qubits is affected, which allows two-qubit operations. Certain Silicon-Germanium alloys allow a qubit spacing as large as 200 nm, which is well within the capabilities of current lithographic techniques. We discuss manufacturing limitations and issues regarding scaling up to a large size computer.
△ Less
Submitted 11 June, 1999; v1 submitted 27 May, 1999;
originally announced May 1999.
-
An Almost-Quadratic Lower Bound for Quantum Formula Size
Authors:
Vwani P. Roychowdhury,
Farrokh Vatan
Abstract:
We show that Nechiporuk's method for proving lower bound for Boolean formulas can be extended to the quantum case. This leads to an n^2 / log^2 n lower bound for quantum formulas computing an explicit function. The only known previous explicit lower bound for quantum formulas (by Yao) states that the majority function does not have a linear-size quantum formula.
We show that Nechiporuk's method for proving lower bound for Boolean formulas can be extended to the quantum case. This leads to an n^2 / log^2 n lower bound for quantum formulas computing an explicit function. The only known previous explicit lower bound for quantum formulas (by Yao) states that the majority function does not have a linear-size quantum formula.
△ Less
Submitted 11 March, 1999;
originally announced March 1999.
-
On the Structure of Additive Quantum Codes and the Existence of Nonadditive Codes
Authors:
Vwani P. Roychowdhury,
Farrokh Vatan
Abstract:
We first present a useful characterization of additive (stabilizer) quantum error-correcting codes. Then we present several examples of We first present a useful characterization of additive (stabilizer) quantum error--correcting codes. Then we present several examples of nonadditive codes. We show that there exist infinitely many non-trivial nonadditive codes with different minimum distances, a…
▽ More
We first present a useful characterization of additive (stabilizer) quantum error-correcting codes. Then we present several examples of We first present a useful characterization of additive (stabilizer) quantum error--correcting codes. Then we present several examples of nonadditive codes. We show that there exist infinitely many non-trivial nonadditive codes with different minimum distances, and high rates. In fact, we show that nonadditive codes that correct t errors can reach the asymptotic rate R=1-2H(2t/n), where H(x) is the binary entropy function. Finally, we introduce the notion of strongly nonadditive codes (i.e., quantum codes with the following property: the trivial code consisting of the entire Hilbert space is the only additive code that is equivalent to any code containing the given code), and provide a construction for an ((11,2,3)) strongly nonadditive code.
△ Less
Submitted 9 October, 1997;
originally announced October 1997.
-
Spatially Correlated Qubit Errors and Burst-Correcting Quantum Codes
Authors:
F. Vatan,
V. P. Roychowdhury,
M. P. Anantram
Abstract:
We explore the design of quantum error-correcting codes for cases where the decoherence events of qubits are correlated. In particular, we consider the case where only spatially contiguous qubits decohere, which is analogous to the case of burst errors in classical coding theory. We present several different efficient schemes for constructing families of such codes. For example, one can find one…
▽ More
We explore the design of quantum error-correcting codes for cases where the decoherence events of qubits are correlated. In particular, we consider the case where only spatially contiguous qubits decohere, which is analogous to the case of burst errors in classical coding theory. We present several different efficient schemes for constructing families of such codes. For example, one can find one-dimensional quantum codes of length n=13 and 15 that correct burst errors of width b < 4; as a comparison, a random-error correcting quantum code that corrects t=3 errors must have length n > 18. In general, we show that it is possible to build quantum burst-correcting codes that have near optimal dimension. For example, we show that for any constant b, there exist b-burst-correcting quantum codes with length n, and dimension k=n-log n -O(b); as a comparison, the Hamming bound for the case with t (constant) random errors yields k < n - t log n - O(1) .
△ Less
Submitted 16 May, 1997; v1 submitted 9 April, 1997;
originally announced April 1997.