26 research outputs found

    Quantum picturalism for topological cluster-state computing

    Full text link
    Topological quantum computing is a way of allowing precise quantum computations to run on noisy and imperfect hardware. One implementation uses surface codes created by forming defects in a highly-entangled cluster state. Such a method of computing is a leading candidate for large-scale quantum computing. However, there has been a lack of sufficiently powerful high-level languages to describe computing in this form without resorting to single-qubit operations, which quickly become prohibitively complex as the system size increases. In this paper we apply the category-theoretic work of Abramsky and Coecke to the topological cluster-state model of quantum computing to give a high-level graphical language that enables direct translation between quantum processes and physical patterns of measurement in a computer - a "compiler language". We give the equivalence between the graphical and topological information flows, and show the applicable rewrite algebra for this computing model. We show that this gives us a native graphical language for the design and analysis of topological quantum algorithms, and finish by discussing the possibilities for automating this process on a large scale.Comment: 18 pages, 21 figures. Published in New J. Phys. special issue on topological quantum computin

    Surface code quantum computing by lattice surgery

    Full text link
    In recent years, surface codes have become a leading method for quantum error correction in theoretical large scale computational and communications architecture designs. Their comparatively high fault-tolerant thresholds and their natural 2-dimensional nearest neighbour (2DNN) structure make them an obvious choice for large scale designs in experimentally realistic systems. While fundamentally based on the toric code of Kitaev, there are many variants, two of which are the planar- and defect- based codes. Planar codes require fewer qubits to implement (for the same strength of error correction), but are restricted to encoding a single qubit of information. Interactions between encoded qubits are achieved via transversal operations, thus destroying the inherent 2DNN nature of the code. In this paper we introduce a new technique enabling the coupling of two planar codes without transversal operations, maintaining the 2DNN of the encoded computer. Our lattice surgery technique comprises splitting and merging planar code surfaces, and enables us to perform universal quantum computation (including magic state injection) while removing the need for braided logic in a strictly 2DNN design, and hence reduces the overall qubit resources for logic operations. Those resources are further reduced by the use of a rotated lattice for the planar encoding. We show how lattice surgery allows us to distribute encoded GHZ states in a more direct (and overhead friendly) manner, and how a demonstration of an encoded CNOT between two distance 3 logical states is possible with 53 physical qubits, half of that required in any other known construction in 2D.Comment: Published version. 29 pages, 18 figure

    Finite temperature quantum simulation of stabilizer Hamiltonians

    Full text link
    We present a scheme for robust finite temperature quantum simulation of stabilizer Hamiltonians. The scheme is designed for realization in a physical system consisting of a finite set of neutral atoms trapped in an addressable optical lattice that are controllable via 1- and 2-body operations together with dissipative 1-body operations such as optical pumping. We show that these minimal physical constraints suffice for design of a quantum simulation scheme for any stabilizer Hamiltonian at either finite or zero temperature. We demonstrate the approach with application to the abelian and non-abelian toric codes.Comment: 13 pages, 2 figure

    Kitaev's quantum double model from a local quantum physics point of view

    Full text link
    A prominent example of a topologically ordered system is Kitaev's quantum double model D(G)\mathcal{D}(G) for finite groups GG (which in particular includes G=Z2G = \mathbb{Z}_2, the toric code). We will look at these models from the point of view of local quantum physics. In particular, we will review how in the abelian case, one can do a Doplicher-Haag-Roberts analysis to study the different superselection sectors of the model. In this way one finds that the charges are in one-to-one correspondence with the representations of D(G)\mathcal{D}(G), and that they are in fact anyons. Interchanging two of such anyons gives a non-trivial phase, not just a possible sign change. The case of non-abelian groups GG is more complicated. We outline how one could use amplimorphisms, that is, morphisms AMn(A)A \to M_n(A) to study the superselection structure in that case. Finally, we give a brief overview of applications of topologically ordered systems to the field of quantum computation.Comment: Chapter contributed to R. Brunetti, C. Dappiaggi, K. Fredenhagen, J. Yngvason (eds), Advances in Algebraic Quantum Field Theory (Springer 2015). Mainly revie

    Quantum Entanglement in Second-quantized Condensed Matter Systems

    Full text link
    The entanglement between occupation-numbers of different single particle basis states depends on coupling between different single particle basis states in the second-quantized Hamiltonian. Thus in principle, interaction is not necessary for occupation-number entanglement to appear. However, in order to characterize quantum correlation caused by interaction, we use the eigenstates of the single-particle Hamiltonian as the single particle basis upon which the occupation-number entanglement is defined. Using the proper single particle basis, we discuss occupation-number entanglement in important eigenstates, especially ground states, of systems of many identical particles. The discussions on Fermi systems start with Fermi gas, Hatree-Fock approximation, and the electron-hole entanglement in excitations. The entanglement in a quantum Hall state is quantified as -fln f-(1-f)ln(1-f), where f is the proper fractional part of the filling factor. For BCS superconductivity, the entanglement is a function of the relative momentum wavefunction of the Cooper pair, and is thus directly related to the superconducting energy gap. For a spinless Bose system, entanglement does not appear in the Hatree-Gross-Pitaevskii approximation, but becomes important in the Bogoliubov theory.Comment: 11 pages. Journal versio

    Tensor network states and geometry

    Full text link
    Tensor network states are used to approximate ground states of local Hamiltonians on a lattice in D spatial dimensions. Different types of tensor network states can be seen to generate different geometries. Matrix product states (MPS) in D=1 dimensions, as well as projected entangled pair states (PEPS) in D>1 dimensions, reproduce the D-dimensional physical geometry of the lattice model; in contrast, the multi-scale entanglement renormalization ansatz (MERA) generates a (D+1)-dimensional holographic geometry. Here we focus on homogeneous tensor networks, where all the tensors in the network are copies of the same tensor, and argue that certain structural properties of the resulting many-body states are preconditioned by the geometry of the tensor network and are therefore largely independent of the choice of variational parameters. Indeed, the asymptotic decay of correlations in homogeneous MPS and MERA for D=1 systems is seen to be determined by the structure of geodesics in the physical and holographic geometries, respectively; whereas the asymptotic scaling of entanglement entropy is seen to always obey a simple boundary law -- that is, again in the relevant geometry. This geometrical interpretation offers a simple and unifying framework to understand the structural properties of, and helps clarify the relation between, different tensor network states. In addition, it has recently motivated the branching MERA, a generalization of the MERA capable of reproducing violations of the entropic boundary law in D>1 dimensions.Comment: 18 pages, 18 figure

    Quantum cryptanalysis in the RAM model: Claw-finding attacks on SIKE

    Get PDF
    We introduce models of computation that enable direct comparisons between classical and quantum algorithms. Incorporating previous work on quantum computation and error correction, we justify the use of the gate-count and depth-times-width cost metrics for quantum circuits. We demonstrate the relevance of these models to cryptanalysis by revisiting, and increasing, the security estimates for the Supersingular Isogeny Diffie--Hellman (SIDH) and Supersingular Isogeny Key Encapsulation (SIKE) schemes. Our models, analyses, and physical justifications have applications to a number of memory intensive quantum algorithms
    corecore