Day 3 Selected Solutions

Similar documents
SUPERDENSE CODING AND QUANTUM TELEPORTATION

Relations for 2-qubit Clifford+T operator group

Short Course in Quantum Information Lecture 2

X row 1 X row 2, X row 2 X row 3, Z col 1 Z col 2, Z col 2 Z col 3,

Quantum Computing Lecture 2. Review of Linear Algebra

CSE 599d - Quantum Computing Stabilizer Quantum Error Correcting Codes

Vector Space Examples Math 203 Spring 2014 Myers. Example: S = set of all doubly infinite sequences of real numbers = {{y k } : k Z, y k R}

C/CS/Phys C191 Quantum Gates, Universality and Solovay-Kitaev 9/25/07 Fall 2007 Lecture 9

Principles of Quantum Mechanics Pt. 2

LOWELL. MICHIGAN. WEDNESDAY, FEBRUARY NUMllEE 33, Chicago. >::»«ad 0:30am, " 16.n«l w 00 ptn Jaekten,.'''4snd4:4(>a tii, ijilwopa

QUANTUM COMPUTATION. Exercise sheet 1. Ashley Montanaro, University of Bristol H Z U = 1 2

Quantum Computing Lecture 3. Principles of Quantum Mechanics. Anuj Dawar

Quantum Phase Estimation using Multivalued Logic

Kevin James. MTHSC 412 Section 3.1 Definition and Examples of Rings

Lecture notes on Quantum Computing. Chapter 1 Mathematical Background

Quantum Computing. 6. Quantum Computer Architecture 7. Quantum Computers and Complexity

2. Introduction to quantum mechanics

Quantum Information & Quantum Computing

Matrix & Linear Algebra

C/CS/Phys 191 Quantum Gates and Universality 9/22/05 Fall 2005 Lecture 8. a b b d. w. Therefore, U preserves norms and angles (up to sign).

Lecture 2: Linear operators

Single qubit + CNOT gates

Decay of the Singlet Conversion Probability in One Dimensional Quantum Networks

1 Readings. 2 Unitary Operators. C/CS/Phys C191 Unitaries and Quantum Gates 9/22/09 Fall 2009 Lecture 8

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

Quantum expanders from any classical Cayley graph expander

Deutsch s Algorithm. Dimitrios I. Myrisiotis. MPLA CoReLab. April 26, / 70

Quantum Algorithms. Andreas Klappenecker Texas A&M University. Lecture notes of a course given in Spring Preliminary draft.

Problem Set # 6 Solutions

Quantum Computing Lecture Notes, Extra Chapter. Hidden Subgroup Problem

Introduction to Quantum Error Correction

)j > Riley Tipton Perry University of New South Wales, Australia. World Scientific CHENNAI

The Solovay-Kitaev theorem

Semiconductors: Applications in spintronics and quantum computation. Tatiana G. Rappoport Advanced Summer School Cinvestav 2005

Lecture 2: Introduction to Quantum Mechanics

Optimal Realizations of Controlled Unitary Gates

Logic gates. Quantum logic gates. α β 0 1 X = 1 0. Quantum NOT gate (X gate) Classical NOT gate NOT A. Matrix form representation

Introduction to Quantum Information Processing

An Introduction to Quantum Computation and Quantum Information

Minimal-memory, non-catastrophic, polynomial-depth quantum convolutional encoders

Lecture: Quantum Information

Part III Symmetries, Fields and Particles

Chapter 2. Basic Principles of Quantum mechanics

Monoids. Definition: A binary operation on a set M is a function : M M M. Examples:

1. Introduction to commutative rings and fields

b) (5 points) Give a simple quantum circuit that transforms the state

Section 5.5: Matrices and Matrix Operations

Sparse-Graph Codes for Quantum Error-Correction

Matrix Arithmetic. a 11 a. A + B = + a m1 a mn. + b. a 11 + b 11 a 1n + b 1n = a m1. b m1 b mn. and scalar multiplication for matrices via.

Quantum Gates, Circuits & Teleportation

Quantum NP - Cont. Classical and Quantum Computation A.Yu Kitaev, A. Shen, M. N. Vyalyi 2002

4. Two-level systems. 4.1 Generalities

Lecture 20: Bell inequalities and nonlocality

Elementary maths for GMT

EXERCISES. a b = a + b l aq b = ab - (a + b) + 2. a b = a + b + 1 n0i) = oii + ii + fi. A. Examples of Rings. C. Ring of 2 x 2 Matrices

CS286.2 Lecture 13: Quantum de Finetti Theorems

6.080/6.089 GITCS May 6-8, Lecture 22/23. α 0 + β 1. α 2 + β 2 = 1

2.0 Basic Elements of a Quantum Information Processor. 2.1 Classical information processing The carrier of information

Quantum Mechanics II: Examples

6-2 Matrix Multiplication, Inverses and Determinants

Quantum Information & Quantum Computation

2 Application of Boolean Algebra Theorems (15 Points - graded for completion only)

Introduction to Quantum Mechanics

LOWELL WEEKI.Y JOURINAL

1 Quantum Circuits. CS Quantum Complexity theory 1/31/07 Spring 2007 Lecture Class P - Polynomial Time

Chapter 2. Matrix Arithmetic. Chapter 2

Quantum Entanglement and the Bell Matrix

CHAPTER 2 -idempotent matrices

Ph 219b/CS 219b. Exercises Due: Wednesday 22 February 2006

Matrix Dimensions(orders)

Quantum algorithms (CO 781, Winter 2008) Prof. Andrew Childs, University of Waterloo LECTURE 1: Quantum circuits and the abelian QFT

Lecture 2: From Classical to Quantum Model of Computation

Lecture 4: Elementary Quantum Algorithms

Diagonalization by a unitary similarity transformation

P = 1 F m(p ) = IP = P I = f(i) = QI = IQ = 1 F m(p ) = Q, so we are done.

CS286.2 Lecture 8: A variant of QPCP for multiplayer entangled games

Quantum LDPC Codes Derived from Combinatorial Objects and Latin Squares

QR FACTORIZATIONS USING A RESTRICTED SET OF ROTATIONS

D.5 Quantum error correction

Two matrices of the same size are added by adding their corresponding entries =.

Lecture 9: Phase Estimation

Baby's First Diagrammatic Calculus for Quantum Information Processing

Unitary t-designs. Artem Kaznatcheev. February 13, McGill University

Linear Algebra. Alvin Lin. August December 2017

By following steps analogous to those that led to (20.177), one may show (exercise 20.30) that in Feynman s gauge, = 1, the photon propagator is

Lecture 8 : Eigenvalues and Eigenvectors

6.896 Quantum Complexity Theory September 18, Lecture 5

Chapter 10. Quantum algorithms

sparse codes from quantum circuits

Structured Hadamard matrices and quantum information

D.1 Deutsch-Jozsa algorithm

Robust Quantum Error-Correction. via Convex Optimization

Section Summary. Sequences. Recurrence Relations. Summations Special Integer Sequences (optional)

Quantum computing and mathematical research. Chi-Kwong Li The College of William and Mary

Quantum Physics II (8.05) Fall 2002 Assignment 3

Theoretical Physics II B Quantum Mechanics. Lecture 5

DECAY OF SINGLET CONVERSION PROBABILITY IN ONE DIMENSIONAL QUANTUM NETWORKS

Quantum Fourier Transforms

CLASSIFICATION OF COMPLETELY POSITIVE MAPS 1. INTRODUCTION

Ph 219b/CS 219b. Exercises Due: Wednesday 20 November 2013

Transcription:

Solutions for Exercises 1 and 2

Exercise 1 Start with something simple: What is the stabilizer S such that is stabilized by S? G 1 = linspan ( 00, 11 )

Exercise 1 Start with something simple: What is the stabilizer S such that is stabilized by S? S = Z Z. G 1 = linspan ( 00, 11 )

Exercise 1 Start with something simple: What is the stabilizer S such that G 1 = linspan ( 00, 11 ) is stabilized by S? S = Z Z. Now what are the stabilizers S 1, S 2 such that G 2 = linspan ( 000, 111 ) is stabilized by S 1 and S 2?

Exercise 1 Start with something simple: What is the stabilizer S such that G 1 = linspan ( 00, 11 ) is stabilized by S? S = Z Z. Now what are the stabilizers S 1, S 2 such that G 2 = linspan ( 000, 111 ) is stabilized by S 1 and S 2? Ensure that qubits 1 and 2 are the same and also qubits 2 and 3 are the same. S 1 = Z Z I, S 2 = I Z Z, X = X X X

Exercise 1 Start with something simple: What is the stabilizer S such that G 1 = linspan ( 00, 11 ) is stabilized by S? S = Z Z. Now what are the stabilizers S 1, S 2 such that G 2 = linspan ( 000, 111 ) is stabilized by S 1 and S 2? Ensure that qubits 1 and 2 are the same and also qubits 2 and 3 are the same. S 1 = Z Z I, S 2 = I Z Z, X = X X X This is the 3 qubit code resistent to X errors.

Exercise 1 Similarly, the 3 qubit code resistent to Z errors will have stabilizers S 3, S 4 that stabilize the space Analagously, G 3 = linspan ( + + +, ). S 3 = X X I, S 4 = I X X, Z = Z Z Z We can see this by noticing G 3 = (H H H)G 2. So the stabilizer S 3 = (HHH)(ZZI )(HHH) = XXI

Exercise 1 This would also work if we worked with logical qubits instead of qubits. So, when we apply the 3 qubit Z-resistent code to the 3 qubit X -resistent code, S 3 =X X I = XXXXXXIII S 4 =I X X = IIIXXXXXX Z =ZZZ = ZZZZZZZZZ

Exercise 1 So now we need to add the stabilizers for each of the X -resistent codes to get the entire set of stabilizers. S 1 = ZZI III III S 2 = IZZ III III S 3 = III ZZI III S 4 = III IZZ III S 5 = III III ZZI S 6 = III III IZZ S 7 = XXX XXX III S 8 = III XXX XXX X = XXX XXX XXX Z = ZZZ ZZZ ZZZ

Exercise 2 Simulating one qubit measurements with constant size quantum circuit We have a depth-d quantum circuit, and we re interested in a measurement just on one qubit of the final state. How much of the circuit does this depend on? Idea: backward lightcone.

Exercise 2 Simulating one qubit measurements with constant size quantum circuit We have a depth-d quantum circuit, and we re interested in a measurement just on one qubit of the final state. How much of the circuit does this depend on? Idea: backward lightcone. x 0 x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8 x 9

Exercise 2 Simulating one qubit measurements with constant size quantum circuit We have a depth-d quantum circuit, and we re interested in a measurement just on one qubit of the final state. How much of the circuit does this depend on? Idea: backward lightcone. x 0 x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8 x 9

Exercise 2 Simulating one qubit measurements with constant size quantum circuit We have a depth-d quantum circuit, and we re interested in a measurement just on one qubit of the final state. How much of the circuit does this depend on? Idea: backward lightcone. x 0 x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8 x 9

Exercise 2 Simulating one qubit measurements with constant size quantum circuit x 0 x 1 x 2 x 3 x 4 x 5 x 6 x 7 x 8 x 9 We have a depth-d quantum circuit, and we re interested in a measurement just on one qubit of the final state. How much of the circuit does this depend on? Idea: backward lightcone. Answer: It depends on at most D = 2 d qubits.

Exercise 2 Simulating one qubit measurements with constant size quantum circuit x 0 x 1 x 2 x 3 x 4 x 5 We have a depth-d quantum circuit, and we re interested in a measurement just on one qubit of the final state. How much of the circuit does this depend on? Idea: backward lightcone. Answer: It depends on at most D = 2 d qubits. This circuit has depth d and acts on D qubits. It has size at most Dd. The measurement outcome has the same distribution as the same measurement in the original circuit.

Exercise 2 Characterizing a constant size quantum circuit with a constant depth classical circuit Our circuit of size Dd is fully described by a sequence of matrix multiplications, where each matrix has size 2 D 2 D. Notice that the depth of the new circuit 2 D = 2 2d is doubly exponential in the depth of the original circuit!

Exercise 2 Characterizing a constant size quantum circuit with a constant depth classical circuit Our circuit of size Dd is fully described by a sequence of matrix multiplications, where each matrix has size 2 D 2 D. Notice that the depth of the new circuit 2 D = 2 2d is doubly exponential in the depth of the original circuit! Let be the unitary describing the circuit. Then we can compute matrix entries of in constant time using the above.

Exercise 2 Characterizing a constant size quantum circuit with a constant depth classical circuit Our circuit of size Dd is fully described by a sequence of matrix multiplications, where each matrix has size 2 D 2 D. Notice that the depth of the new circuit 2 D = 2 2d is doubly exponential in the depth of the original circuit! Let be the unitary describing the circuit. Then we can compute matrix entries of in constant time using the above. We can compute the probabilities of the measurement outcome like so: ( 0 I )C x D 2 = 0z C x D 2. (1) z {0,1} D 1 Each complex number 0z C x D can be computed in constant time, and we need to compute only a constant number of them. So we can compute the probability of measuring 0.

Exercise 2 Classical constant depth circuits compute the same functions as quantum ones Suppose that computes f most of the time, in the sense that f (x) x 2 1 2.

Exercise 2 Classical constant depth circuits compute the same functions as quantum ones Suppose that computes f most of the time, in the sense that f (x) x 2 1 2. For the i th bit, the probability that measuring the i th bit of x gives the i th bit of f (x) is at least 1 2.

Exercise 2 Classical constant depth circuits compute the same functions as quantum ones Suppose that computes f most of the time, in the sense that f (x) x 2 1 2. For the i th bit, the probability that measuring the i th bit of x gives the i th bit of f (x) is at least 1 2. Therefore, we can extract each bit of the output of f.

Exercise 2 Classical constant depth circuits compute the same functions as quantum ones Suppose that computes f most of the time, in the sense that f (x) x 2 1 2. For the i th bit, the probability that measuring the i th bit of x gives the i th bit of f (x) is at least 1 2. Therefore, we can extract each bit of the output of f. Theorem If quantum circuit of constant depth computes f with probability 1 2, then there is a constant-depth classical circuit computing f.

Exercise 7 Computational lemmas Let φ D = D 1/2 i i i. φ D A B φ D = (D 1/2 i i i )A B(D 1/2 j j j )

Exercise 7 Computational lemmas Let φ D = D 1/2 i i i. φ D A B φ D = (D 1/2 i i i )A B(D 1/2 j j j ) = D 1 ij i i A B j j

Exercise 7 Computational lemmas Let φ D = D 1/2 i i i. φ D A B φ D = (D 1/2 i i i )A B(D 1/2 j j j ) = D 1 ij = D 1 ij i i A B j j i A j i B j

Exercise 7 Computational lemmas Let φ D = D 1/2 i i i. φ D A B φ D = (D 1/2 i i i )A B(D 1/2 j j j ) = D 1 ij = D 1 ij = D 1 ij i i A B j j i A j i B j i A j j B T i

Exercise 7 Computational lemmas Let φ D = D 1/2 i i i. φ D A B φ D = (D 1/2 i i i )A B(D 1/2 j j j ) = D 1 ij = D 1 ij = D 1 ij = D 1 i i i A B j j i A j i B j i A j j B T i i A j j B T i j

Exercise 7 Computational lemmas Let φ D = D 1/2 i i i. φ D A B φ D = (D 1/2 i i i )A B(D 1/2 j j j ) = D 1 ij = D 1 ij = D 1 ij = D 1 i i i A B j j i A j i B j i A j j B T i i A j j B T i j = D 1 i i AB T i = D 1 Tr AB T.

Exercise 7 Computational lemmas Suppose AB = BA. Then also AB T = B T A.

Exercise 7 Computational lemmas Suppose AB = BA. Then also AB T = B T A. By cyclicity, Tr AB = Tr BA. But by linearity, Tr AB = Tr BA. Therefore, Tr AB = 0.

Exercise 7 Computational lemmas Suppose AB = BA. Then also AB T = B T A. By cyclicity, Tr AB = Tr BA. But by linearity, Tr AB = Tr BA. Therefore, Tr AB = 0. We also note that AB = BA iff ABA 1 B 1 = I. The quantity ABA 1 B 1 is known as the group commutator of A and B.

Exercise 7 Computational lemmas Suppose AB = BA. Then also AB T = B T A. By cyclicity, Tr AB = Tr BA. But by linearity, Tr AB = Tr BA. Therefore, Tr AB = 0. We also note that AB = BA iff ABA 1 B 1 = I. The quantity ABA 1 B 1 is known as the group commutator of A and B. Notice that the group commutator factorizes across the tensor product. More precisely, suppose A = A 0 A 1, B = B 0 B 1. Then ABA 1 B 1 = A 0 B 0 A 1 0 B 1 0 A 1 B 1 A 1 1 B 1 1. (2)

Exercise 7 Constructing the operators Consider the matrices C 1 = Z I I I C 2 = X Z I I C 3 = X X Z I. C d = X X X Z

Exercise 7 Constructing the operators Consider the matrices C 1 = Z I I I C 2 = X Z I I C 3 = X X Z I. C d = X X X Z We claim that C i C j = C j C i when i j.

Exercise 7 Constructing the operators Consider the matrices C 1 = Z I I I C 2 = X Z I I C 3 = X X Z I. C d = X X X Z We claim that C i C j = C j C i when i j. To see this, consider the group commutator term-by-term in the tensor product.

Exercise 7 Constructing the operators Consider the matrices C 1 = Z I I I C 2 = X Z I I C 3 = X X Z I. C d = X X X Z We claim that C i C j = C j C i when i j. To see this, consider the group commutator term-by-term in the tensor product. Exactly one group commutator is between an X and Z. The rest are between X and X or between I and something.

Exercise 7 Constructing the operators Consider the matrices C 1 = Z I I I C 2 = X Z I I C 3 = X X Z I. C d = X X X Z We claim that C i C j = C j C i when i j. To see this, consider the group commutator term-by-term in the tensor product. Exactly one group commutator is between an X and Z. The rest are between X and X or between I and something. The commutators of the latter type are all equal to I. The X, Z commutator is equal to I.

Exercise 7 Constructing the operators Consider the matrices C 1 = Z I I I C 2 = X Z I I C 3 = X X Z I. C d = X X X Z We claim that C i C j = C j C i when i j. To see this, consider the group commutator term-by-term in the tensor product. Exactly one group commutator is between an X and Z. The rest are between X and X or between I and something. The commutators of the latter type are all equal to I. The X, Z commutator is equal to I. Therefore, the whole commutator is I.

Exercise 7 Analyzing the operators Given vector u R d, let C(u) = i u ic i. Let s compute φ d C(u) C(v) φ d.

Exercise 7 Analyzing the operators Given vector u R d, let C(u) = i u ic i. Let s compute φ d C(u) C(v) φ d. By our first computational lemma, this is equal to 1 D Tr C(u)C(v)T.

Exercise 7 Analyzing the operators Given vector u R d, let C(u) = i u ic i. Let s compute φ d C(u) C(v) φ d. By our first computational lemma, this is equal to 1 D Tr C(u)C(v)T. By linearity, this is equal to 1 D ij Tr u iv j C i Cj T.

Exercise 7 Analyzing the operators Given vector u R d, let C(u) = i u ic i. Let s compute φ d C(u) C(v) φ d. By our first computational lemma, this is equal to 1 D Tr C(u)C(v)T. By linearity, this is equal to 1 D ij Tr u iv j C i C T By our second computational lemma, Tr C i C T j also 1 D Tr C ic T i = 1. j. = 0 for i j. But

Exercise 7 Analyzing the operators Given vector u R d, let C(u) = i u ic i. Let s compute φ d C(u) C(v) φ d. By our first computational lemma, this is equal to 1 D Tr C(u)C(v)T. By linearity, this is equal to 1 D ij Tr u iv j C i C T By our second computational lemma, Tr C i C T j also 1 D Tr C ic T i = 1. Therefore, φ D C(u) C(v) φ D = i u iv i = u v. j. = 0 for i j. But

Exercise 7 Analyzing the operators Given vector u R d, let C(u) = i u ic i. Let s compute φ d C(u) C(v) φ d. By our first computational lemma, this is equal to 1 D Tr C(u)C(v)T. By linearity, this is equal to 1 D ij Tr u iv j C i C T By our second computational lemma, Tr C i Cj T = 0 for i j. But also 1 D Tr C ici T = 1. Therefore, φ D C(u) C(v) φ D = i u iv i = u v. To conclude: any correlation achieved by inner products of vectors is also achieved by making measurements on a state. j.