-
Noise-induced shallow circuits and absence of barren plateaus
Authors:
Antonio Anna Mele,
Armando Angrisani,
Soumik Ghosh,
Sumeet Khatri,
Jens Eisert,
Daniel Stilck França,
Yihui Quek
Abstract:
Motivated by realistic hardware considerations of the pre-fault-tolerant era, we comprehensively study the impact of uncorrected noise on quantum circuits. We first show that any noise `truncates' most quantum circuits to effectively logarithmic depth, in the task of computing Pauli expectation values. We then prove that quantum circuits under any non-unital noise exhibit lack of barren plateaus f…
▽ More
Motivated by realistic hardware considerations of the pre-fault-tolerant era, we comprehensively study the impact of uncorrected noise on quantum circuits. We first show that any noise `truncates' most quantum circuits to effectively logarithmic depth, in the task of computing Pauli expectation values. We then prove that quantum circuits under any non-unital noise exhibit lack of barren plateaus for cost functions composed of local observables. But, by leveraging the effective shallowness, we also design a classical algorithm to estimate Pauli expectation values within inverse-polynomial additive error with high probability over the ensemble. Its runtime is independent of circuit depth and it operates in polynomial time in the number of qubits for one-dimensional architectures and quasi-polynomial time for higher-dimensional ones. Taken together, our results showcase that, unless we carefully engineer the circuits to take advantage of the noise, it is unlikely that noisy quantum circuits are preferable over shallow quantum circuits for algorithms that output Pauli expectation value estimates, like many variational quantum machine learning proposals. Moreover, we anticipate that our work could provide valuable insights into the fundamental open question about the complexity of sampling from (possibly non-unital) noisy random circuits.
△ Less
Submitted 20 March, 2024;
originally announced March 2024.
-
Policies for multiplexed quantum repeaters: theory and practical performance analysis
Authors:
Stav Haldar,
Pratik J. Barge,
Xiang Cheng,
Kai-Chi Chang,
Brian T. Kirby,
Sumeet Khatri,
Chee Wei Wong,
Hwang Lee
Abstract:
Future quantum networks will have nodes equipped with multiple quantum memories, providing the possibility to perform multiplexing and distillation strategies in order to increase fidelities and reduce waiting times for end-to-end entanglement distribution. In this paper, we introduce two policies that adapt the well-known swap-as-soon-as-possible (swap-asap) policy to multiplexed quantum repeater…
▽ More
Future quantum networks will have nodes equipped with multiple quantum memories, providing the possibility to perform multiplexing and distillation strategies in order to increase fidelities and reduce waiting times for end-to-end entanglement distribution. In this paper, we introduce two policies that adapt the well-known swap-as-soon-as-possible (swap-asap) policy to multiplexed quantum repeater chains. Unlike the usual, fully local swap-asap policy, these policies are ``quasi-local", making effective use of knowledge of the states of the repeaters along the chain to optimize waiting times and end-to-end fidelities. Our policies also make use of entanglement distillation. We demonstrate via simulations one of our key findings, which is that these policies can outperform the well-known and widely studied nested purification and doubling swapping policy in practically relevant parameter regimes. Our work also provides the tools to carefully examine the role of entanglement distillation. We identify the parameter regimes in which performing distillation makes sense and is useful. In these regimes, we also address the question: ``Should we distill before swapping, or vice versa?" We thus formalize the trade-off between the advantages of adding distillation capabilities to quantum networks against their technological and practical challenges. Finally, to provide further practical guidance, we propose an experimental implementation of a multiplexing-based linear network, and experimentally demonstrate the key element, a high-dimensional biphoton frequency comb (BFC). We then evaluate the anticipated performance of our multiplexing-based policies in such a real-world network through simulation results for two concrete memory platforms, namely rare-earth ions and diamond vacancies.
△ Less
Submitted 23 January, 2024;
originally announced January 2024.
-
Quantum metrology in the finite-sample regime
Authors:
Johannes Jakob Meyer,
Sumeet Khatri,
Daniel Stilck França,
Jens Eisert,
Philippe Faist
Abstract:
In quantum metrology, one of the major applications of quantum technologies, the ultimate precision of estimating an unknown parameter is often stated in terms of the Cramér-Rao bound. Yet, the latter is no longer guaranteed to carry an operational meaning in the regime where few measurement samples are obtained, which we illustrate through a simple example. We instead propose to quantify the qual…
▽ More
In quantum metrology, one of the major applications of quantum technologies, the ultimate precision of estimating an unknown parameter is often stated in terms of the Cramér-Rao bound. Yet, the latter is no longer guaranteed to carry an operational meaning in the regime where few measurement samples are obtained, which we illustrate through a simple example. We instead propose to quantify the quality of a metrology protocol by the probability of obtaining an estimate with a given accuracy. This approach, which we refer to as probably approximately correct (PAC) metrology, ensures operational significance in the finite-sample regime. The accuracy guarantees hold for any value of the unknown parameter, unlike the Cramér-Rao bound which assumes it is approximately known. We establish a strong connection to multi-hypothesis testing with quantum states, which allows us to derive an analogue of the Cramér-Rao bound which contains explicit corrections relevant to the finite-sample regime. We further study the asymptotic behavior of the success probability of the estimation procedure for many copies of the state and apply our framework to the example task of phase estimation with an ensemble of spin-1/2 particles. Overall, our operational approach allows the study of quantum metrology in the finite-sample regime and opens up a plethora of new avenues for research at the interface of quantum information theory and quantum metrology.
△ Less
Submitted 12 July, 2023;
originally announced July 2023.
-
Fast and reliable entanglement distribution with quantum repeaters: principles for improving protocols using reinforcement learning
Authors:
Stav Haldar,
Pratik J. Barge,
Sumeet Khatri,
Hwang Lee
Abstract:
Future quantum technologies such as quantum communication, quantum sensing, and distributed quantum computation, will rely on networks of shared entanglement between spatially separated nodes. In this work, we provide improved protocols/policies for entanglement distribution along a linear chain of nodes, both homogeneous and inhomogeneous, that take practical limitations such as photon losses, no…
▽ More
Future quantum technologies such as quantum communication, quantum sensing, and distributed quantum computation, will rely on networks of shared entanglement between spatially separated nodes. In this work, we provide improved protocols/policies for entanglement distribution along a linear chain of nodes, both homogeneous and inhomogeneous, that take practical limitations such as photon losses, non-ideal measurements, and quantum memories with short coherence times into account. For a wide range of parameters, our policies improve upon previously known policies, such as the "swap-as-soon-as-possible" policy, with respect to both the waiting time and the fidelity of the end-to-end entanglement. This improvement is greatest for the most practically relevant cases, namely, for short coherence times, high link losses, and highly asymmetric links. To obtain our results, we model entanglement distribution using a Markov decision process, and then we use the Q-learning reinforcement learning (RL) algorithm to discover new policies. These new policies are characterized by dynamic, state-dependent memory cutoffs and collaboration between the nodes. In particular, we quantify this collaboration between the nodes. Our quantifiers tell us how much "global" knowledge of the network every node has. Finally, our understanding of the performance of large quantum networks is currently limited by the computational inefficiency of simulating them using RL or other optimization methods. Thus, in this work, we present a method for nesting policies in order to obtain policies for large repeater chains. By nesting our RL-based policies for small repeater chains, we obtain policies for large repeater chains that improve upon the swap-as-soon-as-possible policy, and thus we pave the way for a scalable method for obtaining policies for long-distance entanglement distribution.
△ Less
Submitted 31 March, 2024; v1 submitted 1 March, 2023;
originally announced March 2023.
-
Exponentially tighter bounds on limitations of quantum error mitigation
Authors:
Yihui Quek,
Daniel Stilck França,
Sumeet Khatri,
Johannes Jakob Meyer,
Jens Eisert
Abstract:
Quantum error mitigation has been proposed as a means to combat unwanted and unavoidable errors in near-term quantum computing without the heavy resource overheads required by fault tolerant schemes. Recently, error mitigation has been successfully applied to reduce noise in near-term applications. In this work, however, we identify strong limitations to the degree to which quantum noise can be ef…
▽ More
Quantum error mitigation has been proposed as a means to combat unwanted and unavoidable errors in near-term quantum computing without the heavy resource overheads required by fault tolerant schemes. Recently, error mitigation has been successfully applied to reduce noise in near-term applications. In this work, however, we identify strong limitations to the degree to which quantum noise can be effectively `undone' for larger system sizes. Our framework rigorously captures large classes of error mitigation schemes in use today. By relating error mitigation to a statistical inference problem, we show that even at shallow circuit depths comparable to the current experiments, a superpolynomial number of samples is needed in the worst case to estimate the expectation values of noiseless observables, the principal task of error mitigation. Notably, our construction implies that scrambling due to noise can kick in at exponentially smaller depths than previously thought. They also impact other near-term applications, constraining kernel estimation in quantum machine learning, causing an earlier emergence of noise-induced barren plateaus in variational quantum algorithms and ruling out exponential quantum speed-ups in estimating expectation values in the presence of noise or preparing the ground state of a Hamiltonian.
△ Less
Submitted 29 March, 2024; v1 submitted 20 October, 2022;
originally announced October 2022.
-
Non-recursive perturbative gadgets without subspace restrictions and applications to variational quantum algorithms
Authors:
Simon Cichy,
Paul K. Faehrmann,
Sumeet Khatri,
Jens Eisert
Abstract:
Perturbative gadgets are a tool to encode part of a Hamiltonian, usually the low-energy subspace, into a different Hamiltonian with favorable properties, for instance, reduced locality. Many constructions of perturbative gadgets have been proposed over the years. Still, all of them are restricted in some ways: Either they apply to some specific classes of Hamiltonians, they involve recursion to re…
▽ More
Perturbative gadgets are a tool to encode part of a Hamiltonian, usually the low-energy subspace, into a different Hamiltonian with favorable properties, for instance, reduced locality. Many constructions of perturbative gadgets have been proposed over the years. Still, all of them are restricted in some ways: Either they apply to some specific classes of Hamiltonians, they involve recursion to reduce locality, or they are limited to studying time evolution under the gadget Hamiltonian, e.g., in the context of adiabatic quantum computing, and thus involve subspace restrictions. In this work, we fill the gap by introducing a versatile universal, non-recursive, non-adiabatic perturbative gadget construction, without subspace restrictions, that encodes an arbitrary many-body Hamiltonian into the low-energy subspace of a three-body Hamiltonian. Our construction requires $rk$ additional qubits for a $k$-body Hamiltonian comprising $r$ terms. Besides a specific gadget construction, we also provide a recipe for constructing similar gadgets, which can be tailored to different properties, which we discuss.
△ Less
Submitted 15 September, 2023; v1 submitted 6 October, 2022;
originally announced October 2022.
-
On the design and analysis of near-term quantum network protocols using Markov decision processes
Authors:
Sumeet Khatri
Abstract:
The quantum internet is one of the frontiers of quantum information science research. It will revolutionize the way we communicate and do other tasks, and it will allow for tasks that are not possible using the current, classical internet. The backbone of a quantum internet is entanglement distributed globally in order to allow for such novel applications to be performed over long distances. Exper…
▽ More
The quantum internet is one of the frontiers of quantum information science research. It will revolutionize the way we communicate and do other tasks, and it will allow for tasks that are not possible using the current, classical internet. The backbone of a quantum internet is entanglement distributed globally in order to allow for such novel applications to be performed over long distances. Experimental progress is currently being made to realize quantum networks on a small scale, but much theoretical work is still needed in order to understand how best to distribute entanglement, especially with the limitations of near-term quantum technologies taken into account. This work provides an initial step towards this goal. In this work, we lay out a theory of near-term quantum networks based on Markov decision processes (MDPs), and we show that MDPs provide a precise and systematic mathematical framework to model protocols for near-term quantum networks that is agnostic to the specific implementation platform. We start by simplifying the MDP for elementary links introduced in prior work, and by providing new results on policies for elementary links. In particular, we show that the well-known memory-cutoff policy is optimal. Then we show how the elementary link MDP can be used to analyze a quantum network protocol in which we wait for all elementary links to be active before creating end-to-end links. We then provide an extension of the MDP formalism to two elementary links, which is useful for analyzing more sophisticated quantum network protocols. Here, as new results, we derive linear programs that give us optimal steady-state policies with respect to the expected fidelity and waiting time of the end-to-end link.
△ Less
Submitted 16 November, 2023; v1 submitted 7 July, 2022;
originally announced July 2022.
-
Principles of Quantum Communication Theory: A Modern Approach
Authors:
Sumeet Khatri,
Mark M. Wilde
Abstract:
This is a preliminary version of a book in progress on the theory of quantum communication. We adopt an information-theoretic perspective throughout and give a comprehensive account of fundamental results in quantum communication theory from the past decade (and earlier), with an emphasis on the modern one-shot-to-asymptotic approach that underlies much of today's state-of-the-art research in this…
▽ More
This is a preliminary version of a book in progress on the theory of quantum communication. We adopt an information-theoretic perspective throughout and give a comprehensive account of fundamental results in quantum communication theory from the past decade (and earlier), with an emphasis on the modern one-shot-to-asymptotic approach that underlies much of today's state-of-the-art research in this field. In Part I, we cover mathematical preliminaries and provide a detailed study of quantum mechanics from an information-theoretic perspective. We also provide an extensive and thorough review of quantum entropies, and we devote an entire chapter to the study of entanglement measures. Equipped with these essential tools, in Part II we study classical communication (with and without entanglement assistance), entanglement distillation, quantum communication, secret key distillation, and private communication. In Part III, we cover the latest developments in feedback-assisted communication tasks, such as quantum and classical feedback-assisted communication, LOCC-assisted quantum communication, and secret key agreement.
△ Less
Submitted 11 February, 2024; v1 submitted 9 November, 2020;
originally announced November 2020.
-
Bounding the forward classical capacity of bipartite quantum channels
Authors:
Dawei Ding,
Sumeet Khatri,
Yihui Quek,
Peter W. Shor,
Xin Wang,
Mark M. Wilde
Abstract:
We introduce various measures of forward classical communication for bipartite quantum channels. Since a point-to-point channel is a special case of a bipartite channel, the measures reduce to measures of classical communication for point-to-point channels. As it turns out, these reduced measures have been reported in prior work of Wang et al. on bounding the classical capacity of a quantum channe…
▽ More
We introduce various measures of forward classical communication for bipartite quantum channels. Since a point-to-point channel is a special case of a bipartite channel, the measures reduce to measures of classical communication for point-to-point channels. As it turns out, these reduced measures have been reported in prior work of Wang et al. on bounding the classical capacity of a quantum channel. As applications, we show that the measures are upper bounds on the forward classical capacity of a bipartite channel. The reduced measures are upper bounds on the classical capacity of a point-to-point quantum channel assisted by a classical feedback channel. Some of the various measures can be computed by semi-definite programming.
△ Less
Submitted 6 January, 2023; v1 submitted 2 October, 2020;
originally announced October 2020.
-
Policies for elementary links in a quantum network
Authors:
Sumeet Khatri
Abstract:
Distributing entanglement over long distances is one of the central tasks in quantum networks. An important problem, especially for near-term quantum networks, is to develop optimal entanglement distribution protocols that take into account the limitations of current and near-term hardware, such as quantum memories with limited coherence time. We address this problem by initiating the study of qua…
▽ More
Distributing entanglement over long distances is one of the central tasks in quantum networks. An important problem, especially for near-term quantum networks, is to develop optimal entanglement distribution protocols that take into account the limitations of current and near-term hardware, such as quantum memories with limited coherence time. We address this problem by initiating the study of quantum network protocols for entanglement distribution using the theory of decision processes, such that optimal protocols (referred to as policies in the context of decision processes) can be found using dynamic programming or reinforcement learning algorithms. As a first step, in this work we focus exclusively on the elementary link level. We start by defining a quantum decision process for elementary links, along with figures of merit for evaluating policies. We then provide two algorithms for determining policies, one of which we prove to be optimal (with respect to fidelity and success probability) among all policies. Then we show that the previously-studied memory-cutoff protocol can be phrased as a policy within our decision process framework, allowing us to obtain several new fundamental results about it. The conceptual developments and results of this work pave the way for the systematic study of the fundamental limitations of near-term quantum networks, and the requirements for physically realizing them.
△ Less
Submitted 3 September, 2021; v1 submitted 7 July, 2020;
originally announced July 2020.
-
Spooky action at a global distance: analysis of space-based entanglement distribution for the quantum internet
Authors:
Sumeet Khatri,
Anthony J. Brady,
Renée A. Desporte,
Manon P. Bart,
Jonathan P. Dowling
Abstract:
Recent experimental breakthroughs in satellite quantum communications have opened up the possibility of creating a global quantum internet using satellite links. This approach appears to be particularly viable in the near term, due to the lower attenuation of optical signals from satellite to ground, and due to the currently short coherence times of quantum memories. The latter prevents ground-bas…
▽ More
Recent experimental breakthroughs in satellite quantum communications have opened up the possibility of creating a global quantum internet using satellite links. This approach appears to be particularly viable in the near term, due to the lower attenuation of optical signals from satellite to ground, and due to the currently short coherence times of quantum memories. The latter prevents ground-based entanglement distribution using atmospheric or optical-fiber links at high rates over long distances. In this work, we propose a global-scale quantum internet consisting of a constellation of orbiting satellites that provides a continuous, on-demand entanglement distribution service to ground stations. The satellites can also function as untrusted nodes for the purpose of long-distance quantum-key distribution. We develop a technique for determining optimal satellite configurations with continuous coverage that balances both the total number of satellites and entanglement-distribution rates. Using this technique, we determine various optimal satellite configurations for a polar-orbit constellation, and we analyze the resulting satellite-to-ground loss and achievable entanglement-distribution rates for multiple ground station configurations. We also provide a comparison between these entanglement-distribution rates and the rates of ground-based quantum repeater schemes. Overall, our work provides the theoretical tools and the experimental guidance needed to make a satellite-based global quantum internet a reality.
△ Less
Submitted 11 January, 2021; v1 submitted 13 December, 2019;
originally announced December 2019.
-
Second-order coding rates for key distillation in quantum key distribution
Authors:
Sumeet Khatri,
Eneet Kaur,
Saikat Guha,
Mark M. Wilde
Abstract:
The security of quantum key distribution has traditionally been analyzed in either the asymptotic or non-asymptotic regimes. In this paper, we provide a bridge between these two regimes, by determining second-order coding rates for key distillation in quantum key distribution under collective attacks. Our main result is a formula that characterizes the backoff from the known asymptotic formula for…
▽ More
The security of quantum key distribution has traditionally been analyzed in either the asymptotic or non-asymptotic regimes. In this paper, we provide a bridge between these two regimes, by determining second-order coding rates for key distillation in quantum key distribution under collective attacks. Our main result is a formula that characterizes the backoff from the known asymptotic formula for key distillation -- our formula incorporates the reliability and security of the protocol, as well as the mutual information variances to the legitimate receiver and the eavesdropper. In order to determine secure key rates against collective attacks, one should perform a joint optimization of the Holevo information and the Holevo information variance to the eavesdropper. We show how to do so by analyzing several examples, including the six-state, BB84, and continuous-variable quantum key distribution protocols (the last involving Gaussian modulation of coherent states along with heterodyne detection). The technical contributions of this paper include one-shot and second-order analyses of private communication over a compound quantum wiretap channel with fixed marginal and key distillation over a compound quantum wiretap source with fixed marginal. We also establish the second-order asymptotics of the smooth max-relative entropy of quantum states acting on a separable Hilbert space, and we derive a formula for the Holevo information variance of a Gaussian ensemble of Gaussian states.
△ Less
Submitted 26 July, 2021; v1 submitted 9 October, 2019;
originally announced October 2019.
-
Noise Resilience of Variational Quantum Compiling
Authors:
Kunal Sharma,
Sumeet Khatri,
M. Cerezo,
Patrick J. Coles
Abstract:
Variational hybrid quantum-classical algorithms (VHQCAs) are near-term algorithms that leverage classical optimization to minimize a cost function, which is efficiently evaluated on a quantum computer. Recently VHQCAs have been proposed for quantum compiling, where a target unitary $U$ is compiled into a short-depth gate sequence $V$. In this work, we report on a surprising form of noise resilienc…
▽ More
Variational hybrid quantum-classical algorithms (VHQCAs) are near-term algorithms that leverage classical optimization to minimize a cost function, which is efficiently evaluated on a quantum computer. Recently VHQCAs have been proposed for quantum compiling, where a target unitary $U$ is compiled into a short-depth gate sequence $V$. In this work, we report on a surprising form of noise resilience for these algorithms. Namely, we find one often learns the correct gate sequence $V$ (i.e., the correct variational parameters) despite various sources of incoherent noise acting during the cost-evaluation circuit. Our main results are rigorous theorems stating that the optimal variational parameters are unaffected by a broad class of noise models, such as measurement noise, gate noise, and Pauli channel noise. Furthermore, our numerical implementations on IBM's noisy simulator demonstrate resilience when compiling the quantum Fourier transform, Toffoli gate, and W-state preparation. Hence, variational quantum compiling, due to its robustness, could be practically useful for noisy intermediate-scale quantum devices. Finally, we speculate that this noise resilience may be a general phenomenon that applies to other VHQCAs such as the variational quantum eigensolver.
△ Less
Submitted 3 April, 2020; v1 submitted 12 August, 2019;
originally announced August 2019.
-
Practical figures of merit and thresholds for entanglement distribution in quantum networks
Authors:
Sumeet Khatri,
Corey T. Matyas,
Aliza U. Siddiqui,
Jonathan P. Dowling
Abstract:
Before global-scale quantum networks become operational, it is important to consider how to evaluate their performance so that they can be built to achieve the desired performance. We propose two practical figures of merit for the performance of a quantum network: the average connection time and the average largest entanglement cluster size. These quantities are based on the generation of elementa…
▽ More
Before global-scale quantum networks become operational, it is important to consider how to evaluate their performance so that they can be built to achieve the desired performance. We propose two practical figures of merit for the performance of a quantum network: the average connection time and the average largest entanglement cluster size. These quantities are based on the generation of elementary links in a quantum network, which is a crucial initial requirement that must be met before any long-range entanglement distribution can be achieved and is inherently probabilistic with current implementations. We obtain bounds on these figures of merit for a particular class of quantum repeater protocols consisting of repeat-until-success elementary link generation followed by joining measurements at intermediate nodes that extend the entanglement range. Our results lead to requirements on quantum memory coherence times, requirements on repeater chain lengths in order to surpass the repeaterless rate limit, and requirements on other aspects of quantum network implementations. These requirements are based solely on the inherently probabilistic nature of elementary link generation in quantum networks, and they apply to networks with arbitrary topology.
△ Less
Submitted 28 September, 2019; v1 submitted 16 May, 2019;
originally announced May 2019.
-
Extendibility of bosonic Gaussian states
Authors:
Ludovico Lami,
Sumeet Khatri,
Gerardo Adesso,
Mark M. Wilde
Abstract:
Extendibility of bosonic Gaussian states is a key issue in continuous-variable quantum information. We show that a bosonic Gaussian state is $k$-extendible if and only if it has a Gaussian $k$-extension, and we derive a simple semidefinite program, whose size scales linearly with the number of local modes, to efficiently decide $k$-extendibility of any given bosonic Gaussian state. When the system…
▽ More
Extendibility of bosonic Gaussian states is a key issue in continuous-variable quantum information. We show that a bosonic Gaussian state is $k$-extendible if and only if it has a Gaussian $k$-extension, and we derive a simple semidefinite program, whose size scales linearly with the number of local modes, to efficiently decide $k$-extendibility of any given bosonic Gaussian state. When the system to be extended comprises one mode only, we provide a closed-form solution. Implications of these results for the steerability of quantum states and for the extendibility of bosonic Gaussian channels are discussed. We then derive upper bounds on the distance of a $k$-extendible bosonic Gaussian state to the set of all separable states, in terms of trace norm and Rényi relative entropies. These bounds, which can be seen as "Gaussian de Finetti theorems," exhibit a universal scaling in the total number of modes, independently of the mean energy of the state. Finally, we establish an upper bound on the entanglement of formation of Gaussian $k$-extendible states, which has no analogue in the finite-dimensional setting.
△ Less
Submitted 10 August, 2019; v1 submitted 4 April, 2019;
originally announced April 2019.
-
Information-theoretic aspects of the generalized amplitude damping channel
Authors:
Sumeet Khatri,
Kunal Sharma,
Mark M. Wilde
Abstract:
The generalized amplitude damping channel (GADC) is one of the sources of noise in superconducting-circuit-based quantum computing. It can be viewed as the qubit analogue of the bosonic thermal channel, and it thus can be used to model lossy processes in the presence of background noise for low-temperature systems. In this work, we provide an information-theoretic study of the GADC. We first deter…
▽ More
The generalized amplitude damping channel (GADC) is one of the sources of noise in superconducting-circuit-based quantum computing. It can be viewed as the qubit analogue of the bosonic thermal channel, and it thus can be used to model lossy processes in the presence of background noise for low-temperature systems. In this work, we provide an information-theoretic study of the GADC. We first determine the parameter range for which the GADC is entanglement breaking and the range for which it is anti-degradable. We then establish several upper bounds on its classical, quantum, and private capacities. These bounds are based on data-processing inequalities and the uniform continuity of information-theoretic quantities, as well as other techniques. Our upper bounds on the quantum capacity of the GADC are tighter than the known upper bound reported recently in [Rosati et al., Nat. Commun. 9, 4339 (2018)] for the entire parameter range of the GADC, thus reducing the gap between the lower and upper bounds. We also establish upper bounds on the two-way assisted quantum and private capacities of the GADC. These bounds are based on the squashed entanglement, and they are established by constructing particular squashing channels. We compare these bounds with the max-Rains information bound, the mutual information bound, and another bound based on approximate covariance. For all capacities considered, we find that a large variety of techniques are useful in establishing bounds.
△ Less
Submitted 8 July, 2020; v1 submitted 18 March, 2019;
originally announced March 2019.
-
Quantum-assisted quantum compiling
Authors:
Sumeet Khatri,
Ryan LaRose,
Alexander Poremba,
Lukasz Cincio,
Andrew T. Sornborger,
Patrick J. Coles
Abstract:
Compiling quantum algorithms for near-term quantum computers (accounting for connectivity and native gate alphabets) is a major challenge that has received significant attention both by industry and academia. Avoiding the exponential overhead of classical simulation of quantum dynamics will allow compilation of larger algorithms, and a strategy for this is to evaluate an algorithm's cost on a quan…
▽ More
Compiling quantum algorithms for near-term quantum computers (accounting for connectivity and native gate alphabets) is a major challenge that has received significant attention both by industry and academia. Avoiding the exponential overhead of classical simulation of quantum dynamics will allow compilation of larger algorithms, and a strategy for this is to evaluate an algorithm's cost on a quantum computer. To this end, we propose a variational hybrid quantum-classical algorithm called quantum-assisted quantum compiling (QAQC). In QAQC, we use the overlap between a target unitary $U$ and a trainable unitary $V$ as the cost function to be evaluated on the quantum computer. More precisely, to ensure that QAQC scales well with problem size, our cost involves not only the global overlap ${\rm Tr} (V^\dagger U)$ but also the local overlaps with respect to individual qubits. We introduce novel short-depth quantum circuits to quantify the terms in our cost function, and we prove that our cost cannot be efficiently approximated with a classical algorithm under reasonable complexity assumptions. We present both gradient-free and gradient-based approaches to minimizing this cost. As a demonstration of QAQC, we compile various one-qubit gates on IBM's and Rigetti's quantum computers into their respective native gate alphabets. Furthermore, we successfully simulate QAQC up to a problem size of 9 qubits, and these simulations highlight both the scalability of our cost function as well as the noise resilience of QAQC. Future applications of QAQC include algorithm depth compression, black-box compiling, noise mitigation, and benchmarking.
△ Less
Submitted 7 May, 2019; v1 submitted 2 July, 2018;
originally announced July 2018.
-
Robust quantum network architectures and topologies for entanglement distribution
Authors:
Siddhartha Das,
Sumeet Khatri,
Jonathan P. Dowling
Abstract:
Entanglement distribution is a prerequisite for several important quantum information processing and computing tasks, such as quantum teleportation, quantum key distribution, and distributed quantum computing. In this work, we focus on two-dimensional quantum networks based on optical quantum technologies using dual-rail photonic qubits for the building of a fail-safe quantum internet. We lay out…
▽ More
Entanglement distribution is a prerequisite for several important quantum information processing and computing tasks, such as quantum teleportation, quantum key distribution, and distributed quantum computing. In this work, we focus on two-dimensional quantum networks based on optical quantum technologies using dual-rail photonic qubits for the building of a fail-safe quantum internet. We lay out a quantum network architecture for entanglement distribution between distant parties using a Bravais lattice topology, with the technological constraint that quantum repeaters equipped with quantum memories are not easily accessible. We provide a robust protocol for simultaneous entanglement distribution between two distant groups of parties on this network. We also discuss a memory-based quantum network architecture that can be implemented on networks with an arbitrary topology. We examine networks with bow-tie lattice and Archimedean lattice topologies and use percolation theory to quantify the robustness of the networks. In particular, we provide figures of merit on the loss parameter of the optical medium that depend only on the topology of the network and quantify the robustness of the network against intermittent photon loss and intermittent failure of nodes. These figures of merit can be used to compare the robustness of different network topologies in order to determine the best topology in a given real-world scenario, which is critical in the realization of the quantum internet.
△ Less
Submitted 31 January, 2018; v1 submitted 21 September, 2017;
originally announced September 2017.
-
Fundamental limits on quantum dynamics based on entropy change
Authors:
Siddhartha Das,
Sumeet Khatri,
George Siopsis,
Mark M. Wilde
Abstract:
It is well known in the realm of quantum mechanics and information theory that the entropy is non-decreasing for the class of unital physical processes. However, in general, the entropy does not exhibit monotonic behavior. This has restricted the use of entropy change in characterizing evolution processes. Recently, a lower bound on the entropy change was provided in the work of Buscemi, Das, and…
▽ More
It is well known in the realm of quantum mechanics and information theory that the entropy is non-decreasing for the class of unital physical processes. However, in general, the entropy does not exhibit monotonic behavior. This has restricted the use of entropy change in characterizing evolution processes. Recently, a lower bound on the entropy change was provided in the work of Buscemi, Das, and Wilde~[Phys.~Rev.~A~93(6),~062314~(2016)]. We explore the limit that this bound places on the physical evolution of a quantum system and discuss how these limits can be used as witnesses to characterize quantum dynamics. In particular, we derive a lower limit on the rate of entropy change for memoryless quantum dynamics, and we argue that it provides a witness of non-unitality. This limit on the rate of entropy change leads to definitions of several witnesses for testing memory effects in quantum dynamics. Furthermore, from the aforementioned lower bound on entropy change, we obtain a measure of non-unitarity for unital evolutions.
△ Less
Submitted 29 January, 2018; v1 submitted 20 July, 2017;
originally announced July 2017.
-
Numerical evidence for bound secrecy from two-way post-processing in quantum key distribution
Authors:
Sumeet Khatri,
Norbert Lütkenhaus
Abstract:
Bound secret information is classical information that contains secrecy but from which secrecy cannot be extracted. The existence of bound secrecy has been conjectured but is currently unproven, and in this work we provide analytical and numerical evidence for its existence. Specifically, we consider two-way post-processing protocols in prepare-and-measure quantum key distribution based on the wel…
▽ More
Bound secret information is classical information that contains secrecy but from which secrecy cannot be extracted. The existence of bound secrecy has been conjectured but is currently unproven, and in this work we provide analytical and numerical evidence for its existence. Specifically, we consider two-way post-processing protocols in prepare-and-measure quantum key distribution based on the well-known six-state signal states. In terms of the quantum bit-error rate $Q$ of the classical data, such protocols currently exist for $Q<\frac{5-\sqrt{5}}{10}\approx 27.6\%$. On the other hand, for $Q\geq\frac{1}{3}$ no such protocol can exist as the observed data is compatible with an intercept-resend attack. This leaves the interesting question of whether successful protocols exist in the interval $\frac{5-\sqrt{5}}{10}\leq Q<\frac{1}{3}$.
Previous work has shown that a necessary condition for the existence of two-way post-processing protocols for distilling secret key is breaking the symmetric extendability of the underlying quantum state shared by Alice and Bob. Using this result, it has been proven that symmetric extendability can be broken up to the $27.6\%$ lower bound using the advantage distillation protocol. In this work, we first show that to break symmetric extendability it is sufficient to consider a generalized form of advantage distillation consisting of one round of post-selection by Bob on a block of his data. We then provide evidence that such generalized protocols cannot break symmetric extendability beyond $27.6\%$. We thus have evidence to believe that $27.6\%$ is an upper bound on two-way post-processing and that the interval $\frac{5-\sqrt{5}}{10}\leq Q<\frac{1}{3}$ is a domain of bound secrecy.
△ Less
Submitted 14 April, 2017; v1 submitted 22 December, 2016;
originally announced December 2016.