The Solovay-Kitaev theorem

Similar documents
Introduction to Group Theory

Universality of single quantum gates

Lecture 4: Postulates of quantum mechanics

Quantum NP - Cont. Classical and Quantum Computation A.Yu Kitaev, A. Shen, M. N. Vyalyi 2002

Lecture 2: Linear operators

Unitary rotations. October 28, 2014

Lecture 10: A (Brief) Introduction to Group Theory (See Chapter 3.13 in Boas, 3rd Edition)

Quantum gate. Contents. Commonly used gates

Math 350 Fall 2011 Notes about inner product spaces. In this notes we state and prove some important properties of inner product spaces.

The groups SO(3) and SU(2) and their representations

Quantum Computing Lecture 2. Review of Linear Algebra

Unitary Dynamics and Quantum Circuits

Physics 557 Lecture 5

Quantum Computing: Foundations to Frontier Fall Lecture 3

MATRICES ARE SIMILAR TO TRIANGULAR MATRICES

Grover s algorithm. We want to find aa. Search in an unordered database. QC oracle (as usual) Usual trick

Throughout these notes we assume V, W are finite dimensional inner product spaces over C.

THE INVERSE FUNCTION THEOREM

Problem Set 2: Solutions Math 201A: Fall 2016

Errata list, Nielsen & Chuang. rrata/errata.html

C/CS/Phys 191 Quantum Gates and Universality 9/22/05 Fall 2005 Lecture 8. a b b d. w. Therefore, U preserves norms and angles (up to sign).

Quantum Field Theory III

Algebra I Fall 2007

DS-GA 1002 Lecture notes 0 Fall Linear Algebra. These notes provide a review of basic concepts in linear algebra.

Representations of su(2)

MATH 583A REVIEW SESSION #1

Representations of Lorentz Group

08a. Operators on Hilbert spaces. 1. Boundedness, continuity, operator norms

1 Readings. 2 Unitary Operators. C/CS/Phys C191 Unitaries and Quantum Gates 9/22/09 Fall 2009 Lecture 8

17. Oktober QSIT-Course ETH Zürich. Universality of Quantum Gates. Markus Schmassmann. Basics and Definitions.

Quantum Computing with Non-Abelian Quasiparticles

1 Topology Definition of a topology Basis (Base) of a topology The subspace topology & the product topology on X Y 3

Symmetries, Groups, and Conservation Laws

The Problem of Constructing Efficient Universal Sets of Quantum Gates

Knowledge Discovery and Data Mining 1 (VO) ( )

CLASS NOTES FOR APRIL 14, 2000

Plan for the rest of the semester. ψ a

THE EULER CHARACTERISTIC OF A LIE GROUP

Quantum Information & Quantum Computing

MAT265 Mathematical Quantum Mechanics Brief Review of the Representations of SU(2)

ROTATIONS, ROTATION PATHS, AND QUANTUM SPIN

Lecture 2: From Classical to Quantum Model of Computation

A Field Extension as a Vector Space

Elementary linear algebra

Chapter 10. Quantum algorithms

C/CS/Phys C191 Quantum Gates, Universality and Solovay-Kitaev 9/25/07 Fall 2007 Lecture 9

1. Matrix multiplication and Pauli Matrices: Pauli matrices are the 2 2 matrices. 1 0 i 0. 0 i

Lecture Notes 1: Vector spaces

Inner products and Norms. Inner product of 2 vectors. Inner product of 2 vectors x and y in R n : x 1 y 1 + x 2 y x n y n in R n

Some Background Material

Quantum Algorithms. Andreas Klappenecker Texas A&M University. Lecture notes of a course given in Spring Preliminary draft.

Differential Topology Final Exam With Solutions

CHAPTER 3: THE INTEGERS Z

arxiv:quant-ph/ v2 20 Dec 2010

A Brief Introduction to Functional Analysis

Representations of moderate growth Paul Garrett 1. Constructing norms on groups

STAT 309: MATHEMATICAL COMPUTATIONS I FALL 2017 LECTURE 5

Finite-dimensional spaces. C n is the space of n-tuples x = (x 1,..., x n ) of complex numbers. It is a Hilbert space with the inner product

BMT 2013 The Algebra of Noncommutative Operators Power Round Time Limit: 60 mins. Maximum Score: 100 points. Instructions:

2.0 Basic Elements of a Quantum Information Processor. 2.1 Classical information processing The carrier of information

FUNCTIONAL ANALYSIS-NORMED SPACE

Chapter 2 The Density Matrix

Introduction to Quantum Computing

1. Introduction to commutative rings and fields

2 Metric Spaces Definitions Exotic Examples... 3

Notes 10: Consequences of Eli Cartan s theorem.

Linear Algebra Massoud Malek

Complex numbers: a quick review. Chapter 10. Quantum algorithms. Definition: where i = 1. Polar form of z = a + b i is z = re iθ, where

Introduction to Quantum Information Processing QIC 710 / CS 768 / PH 767 / CO 681 / AM 871

Magic States. Presented by Nathan Babcock

MA257: INTRODUCTION TO NUMBER THEORY LECTURE NOTES

1. Basic rules of quantum mechanics

Trace Class Operators and Lidskii s Theorem

Matrices A brief introduction

Representation theory and quantum mechanics tutorial Spin and the hydrogen atom

Continuous symmetries and conserved currents

Mathematical Methods wk 2: Linear Operators

1 Linear Algebra Problems

arxiv: v1 [quant-ph] 12 Aug 2013

Lecture 10: Eigenvalue Estimation

Appendix A. Vector addition: - The sum of two vectors is another vector that also lie in the space:

Math 489AB Exercises for Chapter 2 Fall Section 2.3

Notions such as convergent sequence and Cauchy sequence make sense for any metric space. Convergent Sequences are Cauchy

CLASSIFICATION OF COMPLETELY POSITIVE MAPS 1. INTRODUCTION

arxiv:quant-ph/ v5 6 Apr 2005

REPRESENTATION THEORY WEEK 7

Module 6 : Solving Ordinary Differential Equations - Initial Value Problems (ODE-IVPs) Section 1 : Introduction

Analysis-3 lecture schemes

X row 1 X row 2, X row 2 X row 3, Z col 1 Z col 2, Z col 2 Z col 3,

REVIEW. Quantum electrodynamics (QED) Quantum electrodynamics is a theory of photons interacting with the electrons and positrons of a Dirac field:

arxiv:quant-ph/ v3 10 Oct 2006

1 Basics of vector space

D.5 Quantum error correction

Lecture 8 : Eigenvalues and Eigenvectors

MATH 51H Section 4. October 16, Recall what it means for a function between metric spaces to be continuous:

On the complexity of stoquastic Hamiltonians

Wigner s semicircle law

Lecture notes for Mathematical Physics. Joseph A. Minahan 1 Department of Physics and Astronomy Box 516, SE Uppsala, Sweden

0 Real Analysis - MATH20111

G : Quantum Mechanics II

Transcription:

The Solovay-Kitaev theorem Maris Ozols December 10, 009 1 Introduction There are several accounts of the Solovay-Kitaev theorem available [K97, NC00, KSV0, DN05]. I chose to base my report on [NC00], since it involves the Bloch sphere representation of the qubit which I like a lot. The drawback of my choice is that the proof of the Solovay-Kitaev theorem in [NC00] is somewhat sketchy and there are lots of gaps (mostly provided as exercises left to be filled in. I tried to fill them in as much as I could and make my presentation self-contained and rigorous. However, there are still some details (indicated by gray notes on the margin of the page that are either missing or I am not certain about. 1.1 Universal gate sets Various sets of universal quantum gates are known. Among the most well known ones are: CNOT and all 1-qubit gates, CNOT, H, and T ( π 8 -gate, Toffoli and H (with ancillas can approximate any orthogonal matrix. In the first case one can implement any quantum circuit exactly. However, from a practical point of view it may be more advantageous to consider a discrete universal gate set (i.e., one that can be used to approximate any quantum circuit, since then one can hope for a fault-tolerant implementation. Since the number of gates required to perform a computation is used as a measure of complexity, it is a fundamental question whether one can translate a quantum circuit composed of gates from one universal set to another one without too much overhead. 1. Motivation Assume that we are given a family of quantum circuits (e.g., for Grover s algorithm consisting of CNOT gates and f(n 1-qubit gates, but we have to run it on a quantum computer, where CNOT is available, but instead of, say H and 1

T, another set G of 1-qubit is available. If we approximate each 1-qubit gate in the circuit with gates from G so that the error is at most ε/f(n, then the overall error will be bounded by ε. We need something like f(n/ε gates to do this for each 1-qubit gate, so in total we need roughly f(n /ε gates. However, the Solovay-Kitaev theorem states that we can get tolerance ε/f(n for 1-qubit gates only by using O ( log c (f(n/ε gates from G, so that the total cost of the algorithm is O ( f(n log c (f(n/ε. 1.3 Definitions 1.3.1 Topology of metric spaces Let X be a metric space and d(, be the corresponding metric. Definition. Let A, N X (N finite and ε > 0. N is called an ε-net for A if a A p N : d(a, p < ε. (1 Example. {0, 1,, 3} is a (/3-net for the interval [0, 3]. Definition. D X is said to be dense in X if Example. Q is dense in R. 1.3. Trace norm x X ε > 0 p D : d(x, p < ε. ( The only matrix norm that we will use throughout the paper is the trace norm. It is defined as follows: A := Tr A = Tr A A. (3 Alternatively, A is the sum of the singular values of A. If A is normal (A A = AA and {λ 1,..., λ n } are the eigenvalues of A, then A = n i=1 λ i. The metric induced by the trace norm is given by d(a, B := A B. Trace norm satisfies the following properties: unitary invariance: UAV = A for any unitaries U and V, triangle inequality: A + B A + B, submultiplicativity: AB A B. 1.3.3 Free groups Definition. The free group generated by a set G is the set G of all finite sequences of symbols from { g, g 1 g G } with concatenation of sequences (followed by cancellation as the group operation.

Example. Z is free ( G = 1. Notation. For any integer l 0 let G l := {g α1 1 gα... gα l l g i G, α i = ±1}. (4 Note that G = G 0 G 1 G..., where G 0 = {ε} and ε is the empty word. Remark. If the generating set G is a subset of some group, then expression g α1 1 gα... gα l l can naturally be interpreted in two ways. One can think of concatenation and inversion as formal operations on labels representing the elements of G. However, one can use the underlying group structure instead and perform multiplication and inversion, respectively, as defined in the group. We will extensively make use of this twofold meaning. Shrinking lemma Let SU( stand for the special unitary group of matrices, i.e., unitary matrices of determinant 1. From now on we will assume that the generating set G is a finite subset of SU( that is closed under inverses and G is dense in SU(. Notation. Let S ε := {U SU( : U I < ε} be an open ε-ball in SU( around the identity. Lemma ( Shrinking lemma. There exist constants ε and s, such that for any G and ε ε we have: G l is an ε -net for S ε = G 5l is an sε 3 -net for S sε 3. The essence of this lemma is that it allows to construct better approximations at the cost of requiring longer sequences of generators and covering a smaller neighborhood of the identity. We defer its proof to Section.3. To obtain approximations of desired accuracy, one has to apply this lemma several times. The following corollary just summarizes how the various parameters are affected by such iterative application. Corollary (Iterated shrinking lemma. There exist constants ε and s, such that for any G, ε 0 ε, and k Z + we have: G l0 is an ε 0-net for S ε0 = G l k is an ε k-net for S εk, where l k := 5 k l 0 and ε k := (sε 0 (3/k /s. Proof. Let us repeatedly apply the shrinking lemma. One application allows us to transform the parameters according to the following map: (l, ε, ε ( 5l, sε 3, sε 3. (5 3

Clearly, after k iterations the first parameter transforms according to l 0 5 k l 0, as required. The second parameter is always the square of the third, so it remains to understand only the last parameter. We check that ε k ( sε 3 k s = (sε0 (3/k s 3 = (sε 0 (3/k+1 s k = ε k+1, (6 as required. Thus, each application of the shrinking lemma increases k by 1. Hence, k applications gives us parameters (l k, ε k, ε k, as required. In the next two sections we will obtain some auxiliary results that will be used later (in Section.3 to prove the shrinking lemma..1 Lie algebra of SU( Let su(n denote the set of all n n traceless Hermitian matrices. Here are two important facts about su(n: If H su(n, then e ih SU(n, since det e ih = e i Tr H = 1 and e ih (e ih = e ih+ih = I. If A, B su(n, then i[a, B] su(n, since (i[a, B] = i(ba AB = i[a, B] and Tr(i[A, B] = i Tr(AB BA = 0. Notation. Let [A, B] := AB BA and U, V := UV U V be the additive (matrix and the multiplicative (group commutator, respectively. Claim 1. Let A, B su(n such that A, B ε for some sufficiently small ε. Then there is a constant d such that e [A,B] e ia, e ib dε 3. Proof. The Taylor expansion for the first term is To expand e ia, e ib, note that e [A,B] = I [A, B] + 1 [A, B].... (7 e ia = I ia A +..., (8 e +ia = I + ia A..., (9 which gives ( e ia e ib e ia e ib = (I ia A +... I ib B +... ( (I + ia A... I + ib B... (10 (11 = I + i (AB AB BA A B A B +... (1 = I AB + BA +... (13 = I [A, B].... (14 4

Note that expansions for both terms agree up to the second order. The claim follows by using the triangle inequality and submultiplicativity of the norm. Notation. We will use a formal inner product r σ to denote the linear combination of Pauli matrices σ x := ( 0 1 1 0, σy := ( 0 i i 0, and σz := ( 1 0 0 1 with coefficients given by the coordinates of r R 3, i.e., r σ := r x σ x + r y σ y + r z σ z. Claim. Let y, z R 3. Then [ y σ, z σ] = i( y z σ, where y z is the cross product of vectors y and z. Proof. Consider the commutation relations of Pauli matrices: [σ j, σ k ] l = iε jkl, and the definition of the cross product on the standard basis: ( e j e k l = ε jkl, where ε jkl is the totally antisymmetric Levi-Civita symbol. The claim follows by linearity. Notation. Let u : R 3 SU( be the map u( r := exp( i r σ. It provides a correspondence between the Lie algebra su( and the Lie group SU(. Claim 3. Let y, z R 3. Then exp ( [ 1 y σ, 1 z σ] = u( y z. Proof. From Claim we have: exp ( [ 1 y σ, 1 z σ] = exp ( i( 1 y 1 z = exp ( i ( y z = u( y z.. Distance relations In this section we will relate the distance of elements from SU( to the distance of the corresponding vectors in R 3. Claim 4. Let r R 3. Then u( r I = 4 sin r 4. Proof. Note that the eigenvalues of r σ are ± r, because the characteristic polynomial of r σ is det( r σ λi = r z λ r x ir y r x + ir y r z λ (15 = (r z λ(r z + λ (r x ir y (r x + ir y (16 = (r z λ (r x i r y (17 = λ r x r y r z = 0. (18 Thus, the eigenvalues of u( r I are e ± i r 1. A simple computation gives e ± i r 1 ( ( = cos r 1 + = ( cos r sin r cos r + 1 + = cos r 1 ( = 1 cos r hence u( r I = e + i r 1 + e i r 1 = 4 sin r 4. 5 (19 ( 1 cos r (0 = sin r 4, (1

Claim 5. Let r R 3. If u( r S ε then r < ε + O(ε 3. Proof. From Claim 4 we have: u( r I = 4 sin r 4 < ε. Thus, r < 4 arcsin ε 4. Result follows from the Taylor expansion arcsin z = z + 1 z3 3 + 1 3 4 z5 5 +.... Claim 6. If y, z R 3 and y, z < ε then u( y u( z = y z + O(ε 3. Proof. Using unitary invariance and triangle inequality we get: u( y u( z = u( yu( z I ( u( yu( z u( y z + u( y z I. (3 We have to make sure that the first term is small enough. Then applying Claim 4 to the second term we get u( y z I = 4 sin y z 4 and result follows from the Taylor expansion sin α = α α3 3! + α5 5!.... How to bound the 1st term?.3 Proof of the shrinking lemma Recall the statement of the shrinking lemma: Lemma ( Shrinking lemma. There exist constants ε and s, such that for any G and ε ε we have: G l is an ε -net for S ε = G 5l is an sε 3 -net for S sε 3. Proof. To prove this lemma, we have to transform the parameters of the net according to the map (l, ε, ε ( 5l, sε 3, sε 3. Let us first show how to obtain parameters ( 4l, sε 3, ε. Given U S ε pick x R 3 such that U = u( x, x < ε + O(ε 6, (4 where the inequality comes from Claim 5. Next, choose y, z R 3 such that x = y z, y, z < ε + O(ε 5. (5 (This is possible because x = y z y z. Let us approximate u( y and u( z by elements of G l. We use Claim 5 to make sure that u( y, u( z S ε. Since G l is an ε -net for S ε, we can choose y 0, z 0 R 3 such that u( y 0, u( z 0 G l S ε and they are good approximations of u( y and u( z, respectively: u( y 0 I < ε, u( y 0 u( y < ε + O(ε 5, (6 u( z 0 I < ε, u( z 0 u( z < ε + O(ε 5. (7 We apply Claims 5 and 6 to the first and second column, respectively: y 0 < ε + O(ε 3, y 0 y < ε + O(ε 3, (8 z 0 < ε + O(ε 3, z 0 z < ε + O(ε 3. (9 I don t think we need the O(ε 5 term. O(ε 3 in the nd column is just a guess. 6

We want to show that u( x u( y 0, u( z 0 < sε 3 for some constant s, i.e., U can be approximated well enough using a sequence of 4l elements from G (they are needed to implement the group commutator u( y 0, u( z 0. Let us use the triangle inequality u( x u( y 0, u( z 0 (30 u( x u( y 0 z 0 + u( y 0 z 0 u( y 0, u( z 0 (31 }{{}}{{} D 1 D and consider both terms separately. For the first term we use Claim 6 (note that y z < ε + O(ε 6 and y 0 z 0 < ε + O(ε 4 : D 1 = u( y z u( y 0 z 0 (3 = y z y 0 z 0 + O(ε 6 (33 = ( ( y y 0 + y 0 ( ( z z0 + z 0 y0 z 0 + O(ε 6 (34 = ( y y 0 ( z z 0 + y 0 ( z z 0 + ( y y 0 z 0 + O(ε 6 (35 ( y y 0 ( z z 0 + y 0 ( z z 0 + ( y y 0 z 0 + O(ε 6 (36 y y 0 z z 0 + y 0 z z 0 + y y 0 z 0 + O(ε 6 (37 < cε 3 + O(ε 4 (38 for some constant c. For the second term we use Claim 3 and then Claim 1 with a slightly larger constant d, since y 0 and z 0 can be larger than ε: D = exp ( [ 1 y 0 σ, 1 z 0 σ] exp( i y 0 σ, exp( i z 0 σ d ε 3. (39 When we put both terms together, we get U u( y 0, u( z 0 sε 3 for some constant s. It remains to increase the size of the neighborhood that is covered by using one ( more sequence of l generators, i.e., we want to transform the parameters 4l, sε 3, ε to ( 5l, sε 3, sε 3. Recall that the initial parameters were (l, ε, ε meaning that G l is an ε -net for S ε. Thus, for given U S sε we can find Why does 3 V G l such that U V = UV I < ε meaning that UV S ε. Since sε3 ε? G 4l is an sε 3 -net for S ε, we can use the first part to find y 0, z 0 R 3 such that UV u( y 0, u( z 0 sε 3, which completes the proof. 3 Solovay-Kitaev theorem Recall that G is a finite subset of SU( that is closed under inverses and G is dense in SU(. Theorem (Solovay-Kitaev theorem. There is a constant c such that for any G and ε > 0 one can choose l = O ( log c (1/ε so that G l is an ε-net for SU(. 7

The iterated shrinking lemma allows to obtain a good approximation for any element of SU( that is sufficiently close to identity. To prove the Solovay- Kitaev theorem, we have to obtain a good approximation for any element of SU(. This is done by starting with a rough approximation and then refining it by invoking the iterated shrinking lemma for different values of k (starting with smaller ones. Intuitively this corresponds to approaching the desired element by performing steps whose size decreases the closer we get. We adapt the step size, because larger steps can be implemented using shorter sequences of generators. In [KSV0] this procedure is referred to as zooming in. Proof (of the Solovay-Kitaev theorem. Let us choose the initial value ε 0 so that ε 0 < ε to be able to apply the iterated shrinking lemma. In addition we want sε 0 < 1 to make sure that ε k decreases as we increase k. Moreover, we also make sure that ε 0 is small enough so that ε k < ε k+1. Since G is dense in SU(, we can choose l 0 large enough 1 so that G l0 is an ε 0-net for SU( (and hence for S ε0 as well no matter how small ε 0 is. Thus, given any U SU(, we can choose U 0 G l0 such that U U 0 < ε 0. Let 1 := UU 0 be the difference of U and U 0. Then 1 I = (U U 0 U 0 = U U 0 < ε 0 < ε 1. (40 Hence, 1 S ε1. By invoking the iterated shrinking lemma with k = 1, there exists U 1 G l1 such that 1 U 1 = UU 0 U 1 = U U 1 U 0 < ε 1. Similarly, let := 1 U 1 = UU 0 U 1. Then I = (U U 1 U 0 U 0 U 1 = U U 1U 0 < ε 1 < ε. (41 Thus, S ε and we can invoke the iterated shrinking lemma (with k = this time to get U G l such that U = UU 0 U 1 U = U U U 1 U 0 < ε. If we continue in this way, after k steps we get U k G l k such that Thus, we have obtained a sequence of L = U U k U k 1 U 0 < ε k. (4 k l m = m=0 k m=0 5 m l 0 = 5k+1 1 l 0 < 5 4 4 5k l 0 (43 gates that approximates U to accuracy ε k. To determine the value of k, we set ε k = ( (sε 0 (3/k /s = ε and solve for k: ( k 3 = log(1/s ε log(1/sε 0. (44 1 Note that G is an ε 0 -net for SU( as it is dense in SU(. Thus, the ε 0 -neighborhoods of all elements from G form an open cover C of SU(. Since SU( is compact, C has a finite subcover C. Clearly, C G l 0 for some finite value of l 0 as C is finite. 8

Note that we can always choose ε 0 slightly smaller so that the obtained value of k is an integer. Let c = log 5/ log(3/ 3.97 so that 5 k = ( 3 kc. Then L < 5 4 5k l 0 = 5 4 ( kc 3 l 0 = 5 ( log(1/s c ε l 0. (45 4 log(1/sε 0 Hence, for any U SU( there is a sequence of L = O ( log c (1/ε gates that approximates U to accuracy ε. References [K97] [NC00] [KSV0] [DN05] Kitaev A.Yu., Quantum computations: algorithms and error correction, UMN, 5:6(318, pp. 53 11 (1997, http://mi.mathnet.ru/eng/umn/v5/i6/p53. Nielsen M.A., Chuang I.L., Quantum Computation and Quantum Information (Cambridge University Press, 000, Appendix 3, pp. 617 64. Kitaev A.Y., Shen A.H., Vyalyi M.N., Classical and quantum computation (AMS, 00, 8.3., pp. 75 8. Dawson C.M., Nielsen M.A., The Solovay-Kitaev algorithm, arxiv:quant-ph/0505030v. We want to have equality in equation (44 instead of inequality, since the sign in equation (A3.3 in [NC00] is wrong. 9