71

Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

  • Upload
    vongoc

  • View
    234

  • Download
    2

Embed Size (px)

Citation preview

Page 1: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

Physics of Quantum Computation

Dr. Javier Cerrillo

Sommersemester 2016, Technische Universität Berlin

Page 2: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

2

Page 3: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

Contents

1 Prelude: Quantum teleportation 9

1.1 Description of the protocol . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 91.2 Theoretical considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10

1.2.1 No-communication theorem . . . . . . . . . . . . . . . . . . . . . . . . . 111.2.2 No-cloning theorem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111.2.3 Entanglement swapping . . . . . . . . . . . . . . . . . . . . . . . . . . . 12

1.3 Experimental considerations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 121.3.1 How to perform a Bell-state measurement . . . . . . . . . . . . . . . . . 121.3.2 Fidelity . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 131.3.3 Platforms and variations . . . . . . . . . . . . . . . . . . . . . . . . . . . 14

2 Circuit model of quantum computation 15

2.1 Deutsch-Jozsa algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 152.1.1 Examples of circuit representations . . . . . . . . . . . . . . . . . . . . . 162.1.2 Experimental implementation . . . . . . . . . . . . . . . . . . . . . . . . 17

2.2 Universal quantum gates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 192.2.1 Two-level unitary gates are universal . . . . . . . . . . . . . . . . . . . . 192.2.2 Single qubit and CNOT gates are universal . . . . . . . . . . . . . . . . 202.2.3 Controlled-U gate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 212.2.4 Discrete sets of universal operations . . . . . . . . . . . . . . . . . . . . 21

3 Trapped ions 23

3.1 Paul traps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 233.2 Interaction Hamiltonian . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 243.3 Laser cooling techniques . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

3.3.1 Doppler cooling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 253.3.2 Sideband cooling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 263.3.3 Cooling by electromagnetically induced transparency . . . . . . . . . . . 263.3.4 Fano resonance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 27

3.4 Quantum gate operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 283.4.1 Cirac-Zoller gate . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303.4.2 Mølmer-Sørensen gate . . . . . . . . . . . . . . . . . . . . . . . . . . . . 303.4.3 Composite gates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 31

3

Page 4: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

4 CONTENTS

4 Quantum algorithms 33

4.1 Shor's factorization algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . 334.1.1 Quantum Fourier transform . . . . . . . . . . . . . . . . . . . . . . . . . 334.1.2 Phase estimation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 344.1.3 Order nding . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 35

4.2 Grover's search algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 354.2.1 Procedure . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 364.2.2 Interpretation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 374.2.3 Quantum counting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 38

5 Quantum simulations 39

5.1 Digital quantum simulation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 395.1.1 Grover's algorithm as a quantum simulation . . . . . . . . . . . . . . . . 395.1.2 Simulation of general non-local terms . . . . . . . . . . . . . . . . . . . . 415.1.3 Obtention of molecular energies . . . . . . . . . . . . . . . . . . . . . . . 42

5.2 Analog quantum simulators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435.2.1 Cold atoms . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 435.2.2 Trapped ions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 44

6 Alternative formulations of quantum computation 47

6.1 Adiabatic quantum computation . . . . . . . . . . . . . . . . . . . . . . . . . . 476.1.1 Adiabatic theorem . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 486.1.2 Equivalence with the circuit model of quantum computation . . . . . . . 48

6.2 Quantum annealing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 506.2.1 Classical vs quantum annealing . . . . . . . . . . . . . . . . . . . . . . . 50

6.3 Measurement based quantum computation . . . . . . . . . . . . . . . . . . . . . 516.3.1 Teleportation quantum computation . . . . . . . . . . . . . . . . . . . . 516.3.2 Cliord operations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 526.3.3 One way quantum computation . . . . . . . . . . . . . . . . . . . . . . . 53

6.4 Topological quantum computation . . . . . . . . . . . . . . . . . . . . . . . . . 536.4.1 Physical support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 536.4.2 Flux-charge systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 546.4.3 Non-Abelian topological transformations . . . . . . . . . . . . . . . . . . 546.4.4 Quantum Hall eect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 55

7 Environmental eects 57

7.1 Dynamical map . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 577.2 Nakajima-Zwanzig equation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 597.3 Master equation and Born-Markov approximation . . . . . . . . . . . . . . . . . 607.4 Decoherence free subspaces . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 637.5 Dynamical decoupling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65

A Summary of notation and important identities 67

Page 5: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

CONTENTS 5

B Solutions to the exercises 69

Page 6: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

6 CONTENTS

Page 7: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

This lecture presents an introduction to the eld of quantum computation and quantum in-formation together with theoretical considerations relevant to their physical implementation.Familiarity with concepts of quantum mechanics is required.

7

Page 8: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

8 CONTENTS

Page 9: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

1. Prelude: Quantum teleportation

Let us begin with a simple example that illustrates the counter-intuitive behavior of informa-tion in the quantum realm: quantum teleportation. The fundamental message of this protocolis that quantum information can be transferred without the need to send any quantum object,a bizarre statement that sets the scene for the kind of phenomena we would like to explore inthis lecture. This example allow us to introduce a methodology that we will follow in the restof the lecture.

1.1 Description of the protocol

Let us imagine Alice 1 in Auckland wants to send an unknown quantum state |ψ〉 = α |0〉+β |1〉to her friend Bob in Berlin. She can only communicate with Bob by classical means (phone,internet, postcard...). They do count on an additional resource: they have a qubit each whichis in an entangled state of the form

|Φ〉 =1√2

(|0〉A |0〉B + |1〉A |1〉B) .

How can Bob receive the state |ψ〉?

Exercise 1Show that |Φ〉 cannot be written as a separable state i.e., in the form |ζ〉A |ξ〉B.

The solution is pretty simple. Alice just needs to measure in which of four possible so-calledBell states her two qubits are, then send her measurement outcome (two bits of information)to Bob, so that he can transform his qubit into state |ψ〉.

1It is a tradition in the quantum information community to give the name Alice (party A) to the rst partyin a protocol and Bob (party B) to the second party. A C party may be called Charlie or Carol, whereas(mostly in the context of quantum cryptography) a third, ill-intentioned party is usually called Eve (fromeavesdropper).

9

Page 10: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

10 CHAPTER 1. PRELUDE: QUANTUM TELEPORTATION

Let us take a closer look at this protocol. First of all, let us dene the four Bell states

|β00〉 ≡1√2

(|00〉+ |11〉) ,

|β01〉 ≡1√2

(|01〉+ |10〉) ,

|β10〉 ≡1√2

(|00〉 − |11〉) ,

|β11〉 ≡1√2

(|01〉 − |10〉) ;

and rewrite the three-qubit setting of our problem in terms of these

|ψ〉 |Φ〉 = |ψ〉 1√2

(|0〉A |0〉B + |1〉A |1〉B) =1

2

ab

|βab〉 |ψab〉 , (1.1)

with

|ψ00〉 ≡ α |0〉+ β |1〉 ,|ψ01〉 ≡ α |1〉+ β |0〉 ,|ψ10〉 ≡ α |0〉 − β |1〉 ,|ψ11〉 ≡ α |1〉 − β |0〉 .

Exercise 2Show that Eq.1.1 holds.

Because the set of Bell states is an orthonormal basis, it is possible to distinguish themwith a measurement. The result of the measurement indicates the transformations requiredon Bob's side in order to recover |ψ〉:

|ψ〉 = |ψ00〉 ,|ψ〉 = X |ψ01〉 ,|ψ〉 = Z |ψ10〉 ,|ψ〉 = ZX |ψ11〉 .

In a more compact form |ψ〉 = ZaXb |ψab〉, where ab are the two bits of information obtainedin the Bell-state measurement.

1.2 Theoretical considerations

The seemingly unphysical consequences of this protocol may raise some concerns in the at-tentive reader. Here we consider three of them: isn't this against special relativity?, whydidn't Alice use the phone to tell Bob how to build the state? and so what, Alice did sendan entangled state to Bob in the rst place.

Page 11: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

1.2. THEORETICAL CONSIDERATIONS 11

1.2.1 No-communication theorem

The quantum teleportation protocol is often paired with a discussion on the possibility oftransferring quantum information faster than light. Indeed, once the Bell measurement hasbeen performed, Bob's state has instantaneously become one of the |ψab〉 states, which have apretty similiar form to the original state |ψ〉. Nevertheless, without the knowledge of the bitsab, Bob's state ρB is a mixture with probability 1

4 of each of the possible states, which can beshown to be a state of maximal uncertainty

ρB =∑

ab

1

4|ψab〉 〈ψab| =

1

2Id.

Furthermore, one can see that the state ρB has not varied in the slightest due to Alice'smeasurement.

Exercise 3

Show that∑

ab14 |ψab〉 〈ψab| = 1

2Id and that TrA |βab〉 〈βab| = 12Id.

No measurement performed on one partition of a system can be used to communicate infor-mation instantly to the other partition, and this is rigorously stated by the no-communicationtheorem, also known as no-signalling theorem. This is a great relief for quantum physics.

1.2.2 No-cloning theorem

One may wonder why Alice didn't measure the state and just tell Bob about the result sothat he could build |ψ〉 himself. The reason is that Alice cannot just learn the state |ψ〉 witharbitrary accuracy unless an innite amount of copies of the same state were available2. Theno-cloning theorem states, though, that it is impossible to transform an unknown state |ψ〉into two perfect copies of itself |ψ〉 |ψ〉.

Let us prove the theorem by contradiction. Let us imagine that there exists a unitaryoperation U that could transform a pair of states |ψ〉 |φ〉 into |ψ〉 |ψ〉. In general, for it to beconsidered a cloning device, the same should happen for another state |ξ〉 and we could write

U |ψ〉 |φ〉 = |ψ〉 |ψ〉 ,U |ξ〉 |φ〉 = |ξ〉 |ξ〉 .

Taking the inner product of both equations yields

〈ξ|ψ〉 = 〈ξ|ψ〉2 ,

which implies that this device would only work for a specic state |ψ〉 and its orthogonal.

2See Holevo bounds for a more rigorous study of this aspect.

Page 12: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

12 CHAPTER 1. PRELUDE: QUANTUM TELEPORTATION

Exercise 4Schein. Extend the proof to the case of an open quantum system. For this, consider a thirdstate representing the environment and assume the unitary operator acts on the three states.Reference: Nature 299, 802 (1982).

1.2.3 Entanglement swapping

One possible criticism to the quantum teleportation protocol may be that for the entanglementbetween Alice's and Bob's qubits to exist, they must have interacted at some point in the past,i.e., they must have been in close contact. This is not necessarily true, though. The same resultas shown in Eq.1.1 can be used to show that Alice and Bob may share an entangled pair ofqubits even if these qubits may have never met before. In essence, the transformation in Eq.1.1is one where entanglement is transferred between one pair of a tripartite system to anotherpair. Let us imagine it is Carol that Bob shares an entangled state with, |Φ〉BC = |β00〉. Alicehas a pair of entangled qubits, for instance in state |β00〉 as well, and gives one of them toCarol.

In order for Alice and Bob to share an entangled state, all Carol has to do is measureher two qubits in the computational basis. This way, Alice and Bob share an entangled statebetween two qubits that never met in the past.

Exercise 5Prove the entanglement swapping protocol.

1.3 Experimental considerations

1.3.1 How to perform a Bell-state measurement

The Bell basis is an orthonormal basis of the two-qubit Hilbert space. All its elements arenon-local, entangled states: performing a projective measurement in this basis in the lab mayseem impossible. Assuming that only local measurements may be performed in the lab, thepossibility exists to unitarily transform the Bell basis into a local basis before measuring. Thistransformation must have the form

U =∑

ab

|ab〉 〈βab| .

We will use this excuse to introduce the concept of gate operations and the circuit model ofquantum computation. One can see that the above unitary transformation may be split intoa Hadamard gate and a controlled-NOT or CNOT gate. A Hadamard gate is a single-qubitgate that performs the unitary transformation

H = |+〉 〈0|+ |−〉 〈1| ,

Page 13: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

1.3. EXPERIMENTAL CONSIDERATIONS 13

where we have dened the eigenstate of the X Pauli matrix as

|+〉 =1√2

(|0〉+ |1〉) ,

|−〉 =1√2

(|0〉 − |1〉) .

A CNOT gate is a two-qubit gate that inverts the value of the target bit when the control bitis true. It follows the truth table 1.1.

Control Target Control Target

0 0 0 00 1 0 11 0 1 11 1 1 0

Table 1.1: Truth table of the CNOT gate.

Exercise 6Schein. Show that the composition of a CNOT gate and a Hadamard gate on the control bityields the transformation

U =∑

ab

|ab〉 〈βab| .

After application of this transformation, measuring each qubit in the computational basiswill yield the outcomes a and b, which are univocally related to the original Bell states. Theglobal eect of the unitary transformation and the local measurement is that of a Bell-statemeasurement.

1.3.2 Fidelity

Success of an experiment needs to be measured in some form, and the usual gure of merit isthe delity (resemblance between the expected and measured states)

F = Tr

√ρ

12expectedρmeasuredρ

12expected

.

In this specic protocol, assuming pure states

F = |A 〈ψ| |ψ〉B| ,

with |ψ〉A the state to be teleported by Alice and |ψ〉B the state Bob receives, where an averageover possible inputs is usually included. If teleportation follows without error, it is clear F = 1.Otherwise F < 1. It is important to set up what constitutes the failure of the experiment.A value for the delity 0 is actually not necessarily a bad result. It actually is pretty good,

Page 14: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

14 CHAPTER 1. PRELUDE: QUANTUM TELEPORTATION

because it may mean that the obtained state is exactly orthogonal to the expected one, so itmay be the indication of a swap error in the Bell-state measurement that can be corrected.

In general, in quantum information technologies the real failure is the absence of a quantumadvantage. Because it is so dicult to generate quantum technology, it is important that itprovides an advantage with respect to the classical analog of the protocol. In this case, theclassical analog of quantum teleportation (classical teleportation) is to drop the entanglementresource: attempt to transfer the state by performing a one shot projective measurement onit and transferring the result in two bits of data to Bob so that he can reconstruct the state.In that case, Bob's state is one of either |+〉n or |−〉n, the eigenstates of the Pauli matrix σnin which the measurement has taken place, and the maximum delity that can be obtainedwith this strategy is F = 2/3.

Exercise 7Schein. Show that the delity of the classical scenario is 2/3 by following the considerationsin PRL 74, 1259 (1995).

1.3.3 Platforms and variations

Many experimental demonstrations of quantum teleportation have taken place in photonicsettings. The polarization degree of freedom of a photon can take one of two values: horizontalor vertical polarization. This can be used to store a qubit. Entangled photons can be obtainedby means of a process known as parametric down-conversion, which corresponds to the emissionof two photons in a single process.

The longest distance quantum teleportation achieved to date in a photonic setting tookplace between the islands of La Palma and Tenerife in Spain (Nature, 489(7415), 269, 2012).Other platforms involved nuclear magnetic resonance settings (molecules in solution), opticalmodes (continuous variable settings), atomic ensembles, trapped atoms, solid state...

Nevertheless, we have just seen that, rather than distance, delity is the most relevant gureof merit. Other considerations may involve whether the experiment was deterministic or not.In the case of photons it is usually impossible to distinguish more than two of the Bell states,so that only upon detection is it possible to nalize the protocol. These implementations areknown as probabilistic quantum teleportation. Some experiments avoid the feed-forward part,i.e. the classical communication of the measurement outcome, so that only upon detection ofthe rst Bell-state is it possible to assume teleportation. This is considered passive quantum

teleportation.3

3For a complete review on the subject: Nature Photonics 9, 641, (2015).

Page 15: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

2. Circuit model of quantum

computation

With quantum teleportation we have seen an example of a quantum protocol for which thereexists an algorithmic description in the form of quantum gates. Let us systematize this pro-cedure so that it allows us to dene a model for quantum computation, that is, a model thatis able to represent any quantum algorithm. Let us begin by learning our rst quantum algo-rithm, then represent it in terms of quantum gates. After this example, we will systematizethe approach and analyze it.

2.1 Deutsch-Jozsa algorithm

In the last lecture we got acquainted with a relevant protocol for the quantum informationprocessing (QIP) community: quantum teleportation. It is a protocol that performs somethingimpossible for the classical world (F=1 can never be reached with a classical protocol) and,as such, the only scrutiny that we have to put it under is checking whether it stays withinthe quantum boundaries (F > 2/3). Before we get started with the systematic formulation ofquantum computation, let us look at a simple algorithm that can be performed both in theclassical and the quantum version, but which shows an advantage in its quantum form. TheDeutsch-Jozsa algorithm is the best example of quantum parallelism and the rst quantumalgorithm ever proposed. For cases where a task can be performed equally well with a classicalor a quantum algorithm, the question is whether the quantum version allows us to do it fasteror with fewer resources. We will return to this question on a later lecture.

The question posed by the Deutsch-Jozsa algorithm is the following. Given a functionf (x) ∈ 0, 1 on an n bit input x that is either constant (same value for all inputs) or balanced(exactly half of times 0 and the other half 1), how fast is it possible to deterministically decidewhich of the two types of function f (x) belongs to? In the classical case, one needs 2n−1 + 1calls of the function. In the quantum case, only one. This represents an exponential saving!

The quantum version evaluates the function for all possible inputs x by computing it on asuperposition state

1√2n

2n−1∑

x=0

|x〉 ,

which is the result of applying the Hadamard gate on n qubits in the state |0〉.

15

Page 16: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

16 CHAPTER 2. CIRCUIT MODEL OF QUANTUM COMPUTATION

Exercise 8Schein. Show that

H⊗n |0〉⊗n =1√2n

2n−1∑

x=0

|x〉 ,

where the state |x〉 corresponds to the n qubit state labeled by the binary expression of integerx. (For instance, the three qubit representation of |3〉 is |0〉 |1〉 |1〉).

By using the output f (x) as the control of a CNOT gate on an ancilla state |−〉 one obtainsthe state

1√2n+1

2n−1∑

x=0

|x〉[(−1)f(x) |0〉 − (−1)f(x) |1〉

].

The nal step is to undo the balanced superposition of the |x〉 states by repeating the appli-cation of the Hadamard gate on the rst n qubits. This generates the confusing state

1

2n√

2

2n−1∑

x=0

2n−1∑

z=0

(−1)zx+f(x) |z〉 [|0〉 − |1〉] ,

but maybe expressing the phase factor in the following form would help

2n−1∑

x=0

(−1)zx+f(x) =∑

x

eiπ[zx+f(x)],

because it vaguely reminds of a representation of a Kronecker delta. With this idea, it becomesclear that, if f (x) is constant,

1

2n

x

eiπ[zx+f(x)] = ± 1

2n

x

eiπzx =

±1 (z = 0)

0 (z 6= 0)

which is 1 only for z = 0. For f (x) balanced and z = 0

x

eiπ[zx+f(x)] =∑

x

eiπf(x) = 0,

because half of the times eiπf(x) is +1 and half of the times −1. And this is it! Measuring therst n qubits will deterministically yield the state |0〉 if f (x) is constant and another state ifit is balanced.

2.1.1 Examples of circuit representations

Once we have understood the algorithm, let us look at its circuit representation and try tounderstand all elements therein.

Page 17: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

2.1. DEUTSCH-JOZSA ALGORITHM 17

Figure 2.1: Circuit representation of the Deutsch-Jozsa algorithm (Wikipedia).

In the circuit model, qubits are represented by horizontal lines and gates (in the case ofquantum computation, they must be unitary operations to preserve reversibility) are repre-sented by boxes. These boxes may have one incoming horizontal line and one outcominghorizontal line (single qubit gates) or more than one (multiple qubit gates). Another possibleoperation is measurement, which is represented with a dial box (last box in the rst row ofFig.2.1).

We are already acquainted with the Hadamard gate, since it was an ingredient in turning aBell-state measurement into a local one (1.3.1). In this case, we want to apply the Hadamardgate to n qubits. This is represented by a tensorial exponent H⊗n. The symbol right beforethat gate informs us that that particular horizontal line contains n qubits instead of a singleone.

The gate Uf is such that it computes the function f (x) on the rst n qubits and uses theoutcome to control a NOT gate on the last qubit.

|q0〉 • HLL ________

________

|q1〉 H • ⊕LL ________

________

|q2〉 ⊕ X Z

Figure 2.2: Circuit representation of the quantum teleportation protocol (I. Chuang).

Let us look at more elements that may appear in a quantum circuit. Figure 2.2 representsthe quantum teleportation protocol. The second and third elements represent a CNOT gate,which we encountered in 1.3.1 as well. The reason for this representation is that the outcomeon the second qubit corresponds in essence to a logical XOR operation (represented by ⊕) onboth qubits. After measurements, we see classical bits are represented by a double line andthey can operate on qubits as well. First, with an XOR ⊕ operation (corresponding to theapplication of the Pauli matrix X conditioned on the classical bit). Second, on a conditionedphase gate (Z Pauli matrix).

2.1.2 Experimental implementation

The Deutsch-Jozsa algorithm was not created to solve a specic task of relevance, but to showthat quantum computers can solve a task exponentially faster than classical computers.1 Forthis reason it has been implemented in a number of platforms. Let us have a look at thecase of trapped ions: Nature 421, 48 (2003). There, the simplest version of the Deutsch-Jozsaalgorithm (where the function has a single-bit input) was demonstrated. This simplied version

1It is important to stress that, although it is exponentially faster than a deterministic classical algorithm, theprobabilistic classical algorithm can settle the question very quickly and represents an important competitorto the quantum algorithm.

Page 18: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

18 CHAPTER 2. CIRCUIT MODEL OF QUANTUM COMPUTATION

of the algorithm is sometimes known as the Deutsch algorithm. For this, only two qubits arerequired and, in this experimental example, they were encoded in two degrees of freedom ofa single Ca+

40 ion: the two lowest lying Fock states of its vibration and two electronic levels.There only exist 4 possible functions, two constant and two balanced, and all 4 of them wereimplemented in this experiment. It was conrmed that the input state stays |0〉 for constantfunctions and becomes |1〉 for balanced functions.

Although we will look into the trapped-ion platform in more detail below, a trapped ionexperiment always contains the steps

1. Loading of the ion into a Paul trap.

2. Laser cooling to the motional ground state (Doppler + sideband cooling).

3. Algorithm performance by shining a train of laser pulses.

4. Measurement.

In order to implement gates on the electronic degrees of freedom, the ion is driven resonantlyby laser light for a short time t = θ

Ω , where Ω is the Rabi frequency, so that the Schrödingerevolution corresponds to the unitary transformation

R (θ, φ) = exp

[iθ

2

(eiφσ+ + e−iφσ−

)],

where σ+ = |1〉 〈0| and σ− = |0〉 〈1|. The initial phase of the laser φ determines whether arotation on the X or the Y axis is performed (or a desired combination of them).

Exercise 9Build a Hadamard gate with pulses of the type R (θ, φ).

Gates on both the electronic and vibrational degrees of freedom are performed by meansof detuned laser driving. By exactly matching the trap frequency with the detuning, themomentum exchange between the light and the atom can be controlled to the extent that theunitary transformation

R− (θ, φ) = exp

[iθ

2

(eiφσ+a+ e−iφσ−a†

)]

is performed, where a, a† are the annihilation and creation operators of the vibrational degreesof freedom of the ion respectively. This is an interaction operation between both qubits andwe will see below that it is a necessary ingredient to perform two-qubit gates in ion trapexperiments.

Exercise 10

Show that R− (π, 0) corresponds to a SWAP gate when only considering the lowest two statesof the vibrational manifold.

Page 19: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

2.2. UNIVERSAL QUANTUM GATES 19

The combination of the two types of pulses allows for the implementation of the 4 dierentfunctions in the form of 4 dierent pulse trains. The pulse trains corresponding to the constantfunctions always leave the electron on its ground state, whereas pulse trains corresponding tobalanced functions leave the electron on the excited level.

2.2 Universal quantum gates

As shown in the experimental implementation of the Deutsch-Jozsa algorithm, it is possible totransform an algorithm into a specic, realizable train of pulses. Let us show that, in principle,any algorithm can be expressed in terms of single- and two-qubit gates.

2.2.1 Two-level unitary gates are universal

This is a problem of linear algebra: given a d× d unitary matrix U , it is possible to transformit into the identity matrix by multiplying it with enough, judiciously chosen two-level unitarymatrices U1U2U3 . . . . The conjugate transpose of this set of two-level matrices corresponds tothe decomposition of U .

Two level unitary matrices are unitary matrices that act non-trivially only on two vectorcomponents. Let us be convinced of this idea by looking at an example with a 3× 3 matrix

U =

a d gb e hc f i

.

If b = 0 choose

U1 ≡

1 0 00 1 00 0 1

,

and otherwise choose

U1 ≡1√

|a|2 + |b|2

a∗ b∗ 0b −a 00 0 1

.

We have achieved to introduce a 0 in the matrix:

U1U =

a′ d′ g′

0 e′ h′

c′ f ′ i′

.

For the choice of U2 we follow a similar procedure. If c′ = 0 choose

U2 ≡

a′∗ 0 00 1 00 0 1

,

Page 20: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

20 CHAPTER 2. CIRCUIT MODEL OF QUANTUM COMPUTATION

and otherwise

U2 ≡1√

|a′|2 + |c′|2

a′∗ 0 c′∗

0 1 0c′ 0 −a′

.

Now we have

U2U1U =

1 d” g”0 e” h”0 f” i”

=

1 0 00 e” h”0 f” i”

,

where d” = g” = 0 because unitary matrix only contain normalized vectors as rows/columns.It is clear that this procedure can be continued until the product of unitaries yields the identity.

2.2.2 Single qubit and CNOT gates are universal

Two level unitary gates can be implemented with a succession of CNOT gates and the non-trivial part of the two-level gate, which is a single-qubit gate. We will look at an exampleagain.

Let us imagine a three qubit gate of the form

U =

a 0 0 0 0 0 0 b0 1 0 0 0 0 0 00 0 1 0 0 0 0 00 0 0 1 0 0 0 00 0 0 0 1 0 0 00 0 0 0 0 1 0 00 0 0 0 0 0 1 0c 0 0 0 0 0 0 d

.

The non-trivial part of the gate operates between the states |000〉 and |111〉 with the gate

U =

(a bc d

). In order to implement this operation, we need to resort to a so-called Gray

code between |000〉 and |111〉, which is a sequence of one bit transformations between theinitial and the nal states

A B C

0 0 00 0 10 1 11 1 1

In view of this code, all one has to do is perform one CNOT gate for each transition,the controlled-U gate for the last one and undoing the CNOT gates. For instance, for thetransition |000〉 ↔ |001〉 one needs to perform a CNOT gate acting on qubit C conditioned onA and B being 0. The list of the sequence of gates is then

1. CNOT on C, conditioned on A and B being 0,

Page 21: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

2.2. UNIVERSAL QUANTUM GATES 21

2. CNOT on B, conditioned on A being 0 and C being 1,

3. controlled-U on A, conditioned on B and C being 1,

4. CNOT on B, conditioned on A being 0 and C being 1,

5. CNOT on C, conditioned on A and B being 0.

This sequence of 5 gates implements U . It is possible to show that the controlled-U gate canbe implemented with CNOT and single qubit operations. Therefore, CNOT and single-qubitoperations are enough to represent any unitary transformation.

2.2.3 Controlled-U gate

A CNOT gate is sucient to build any controlled unitary gate. To see this, one can show thatthere exist unitary gates A, B and C such that ABC = I and U = eiαAXBXC. Given thedecomposition

U = eiαRz (β)Ry (γ)Rz (δ) ,

one may chooseA = Rz (β)Ry (γ/2) , B = Ry (−γ/2)Rz (− (δ + β) /2) and C = Rz ((δ − β) /2).These elements are sucient to dene a controlled-U circuit only with single-qubit gates andCNOT gates.

Exercise 11Schein: Show that a CNOT gate and arbitrary rotations in the z and y Bloch axes aresucient to build any controlled U gate.

2.2.4 Discrete sets of universal operations

Exercise 12Schein: Show that the gate series

(THTH)n1 H (THTH)n2 H (THTH)n3

for suitable positive integers n1, n2 and n3 can approximate up to an arbitrarily small errorbound any single-qubit unitary U .

CNOT and single qubit gates are universal. Single qubit gates are an innite set, though.If it is not possible to simulate any possible single qubit gate, it is possible to approximateit by a succession of a discrete set of single qubit gates. Hadamard and π/8 gates constitutesuch a set. It is possible to interpret the π/8 gate as a π/4 rotation on the z axis up to aglobal phase, whereas HTH may be interpreted as a π/4 rotation on the x axis up to a globalphase. The combination THTH is a rotation

Rn (θ) = e−iπ8Ze−i

π8X =

(cos

π

8− iZ sin

π

8

)(cos

π

8− iX sin

π

8

)

= cos2 π

8− i[(X + Z) cos

π

8+ Y sin

π

8

]sin

π

8

Page 22: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

22 CHAPTER 2. CIRCUIT MODEL OF QUANTUM COMPUTATION

around the non-normalized axis ~n =(cos π8 , sin

π8 , cos π8

)through an angle dened by cos θ2 =

cos2 π8 . This angle is a non-rational multiple of 2π.

Page 23: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

3. Trapped ions

In 1995, Peter Zoller and Ignacio Cirac 1 proposed to use electromagnetically trapped ionsfor the storage and manipulation of quantum information, so that control by localized laserbeams would permit the implementation of any logical operation. This was the birth of therst version of a quantum computer that was experimentally realizable. To understand theconcepts of this proposal we will analyze the quantum model of a system of trapped ions, wewill identify the elements associated with the interface of quantum bits (qubits) and the logiccontrol possibilities oered by the dipolar interaction with the laser. 2

3.1 Paul traps

The rst requirement for the implementation of the Cirac-Zoller proposal is a means to spatiallyconning individual ions. For this, one often uses strong electromagnetic elds that generatean eective attraction potential, a three-dimensional focalizing force. The electric eld thata singly charged calcium ion (Ca+

40) experiences corresponds to an acceleration of about 2 ×108m/s2. Although ions can not be trapped only by means of a static electric eld, the eldof a rapidly oscillating quadrupole geometry,

Φ (~x, t) = (U0 + V0 cos (ξt))x2 + y2 − 2z2

r20

generates an eective trapping potential under suitably chosen experimental parameters. Thefast alternating eld prevents the ion from reaching the trap electrodes 3 The entire trajectoryof a trapped ion is described by a stable solution of a Mathieu dierential equation (Ghosh,1995). It roughly overlaps a micro-motion of timescale χ and a secular harmonic motioncharacterized by a lower frequency ν. The three frequencies νx,y,z along the three main axes ofthe trap may be dierent. Typical individual ion traps are about 1 mm in size with a voltageV0 several hundred volts and a frequency ξ about 10 MHz, leading to a secular movementfrequency ν in the lower MHz range. The linear version of the Paul trap allows for theconnement of several ions, that crystallize in the axis of the trap.

1Cirac, J. I., & Zoller, P. , Physical Review Letters 74, 4091 (1995).2Some sections of this part are based on notes by F. Rohde and J. Eschner in Ultracold Gases and Quantum

Information, Les Houches 2009 Session XCI, Oxford University Press 2011.3Check http://youtu.be/XTJznUkAmIY for a mechanical instantiation of this idea.

23

Page 24: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

24 CHAPTER 3. TRAPPED IONS

3.2 Interaction Hamiltonian

Once the ion is spatially localized, it is possible to control its state with laser light. Laser-ioninteraction is usually accounted for by a dipolar term

V = −~d · ~E(t, x),

for a dipole ~d of a specic transition between a ground |g〉 and an excited state |e〉 and anelectric eld ~E. In the case of a dipole aligned with the coherent eld of a laser beam we canuse a semiclassical approach so that

V = −~Ω

2(|e〉 〈g|+ |g〉 〈e|)

(ei(ωlt−

~k~x) + e−i(ωlt−~k~x)), (3.1)

where Ω is the Rabi frequency (Ω = |d| |E|), ωl is the frequency of the laser, ~k its wavevec-tor and ~x is the operator of the ion position relative to the center of the trap. The totalHamiltonian becomes

H = H0 + V + Φ (~x) ,

with H0 = ~ω02 σz, ω0 is the frequency associated to the transition between |g〉 and |e〉 and

Φ (~x) is the time-averaged form of the Paul trap potential. Application of the rotating waveapproximation with respect to ~ωl

2 σz

V = −~Ω

2

(|e〉 〈g| e−ikx + |g〉 〈e| eikx

). (3.2)

Exercise 13Schein. Show that eq.(3.2) holds in the rotating wave approximation. For this, expressthe total Hamiltonian H in the interaction picture with respect to ~ωl

2 σz and average outfast-rotating terms, assuming ωl ' ω0. Undo the interaction picture for the remaining terms.

To rst approximation Φ (~x) is a harmonic potential in the trap axis x (let's just considerone dimension for simplicity) and can be approximated by

Φ (x) ' ~νb†b,

with b and b† annihilation and creation operators, x =√

~2mν

(b+ b†

). It is useful to introduce

the denition of the Lamb-Dicke parameter η

η ≡ kx0,

with x0 =√

~2mν the extension of the wave function of the ground state. The Lamb-Dicke

parameter has a very straightforward interpretation, since it can also be expressed as the squareroot of the ratio of the recoil energy associated with the process of absorption or emission ofa photon and the energy of the photon

η =

√ErecEph

,

Page 25: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

3.3. LASER COOLING TECHNIQUES 25

with Erec ≡ (~k)2

2m and Eph ≡ ~ν. For photons in the optical range, the recoil energy is usuallymuch lower than the photon energy. Alternatively, the photon wavelength is much greater thanthe extent of ground state ion vibration. Following any of the two interpretations, the Lamb-Dicke parameter in this regime is very small and it can be used as a perturbation parameterwhich denes the Lamb-Dicke expansion

eikx = eiη(b+b†) = 1 + iη(b+ b†)− η2(b+ b†)2 + . . .

and the linearized interaction takes the form

Vlin = ~Ω

2(|e〉 〈g|+ |g〉 〈e|) + i~

Ω

2η (|e〉 〈g| − |g〉 〈e|)

(b+ b†

).

Three parts can be recognized in this expression, corresponding to three relevant processeshereinbelow. The carrier wave interaction

Vcar = ~Ω

2(|e〉 〈g|+ |g〉 〈e|) ,

which modies the internal state of the ion without aecting the vibrational state; red sidebandinteraction (RSB)

VRSB = i~Ω

2η(|e〉 〈g| b− |g〉 〈e| b†

),

which excites the internal state of the ion while reducing the vibrations by one photon (andvice versa) state, and the blue sideband interaction (BSB)

VBSB = i~Ω

2η(|e〉 〈g| b† − |g〉 〈e| b

),

that excites both the internal and the vibrational states.

3.3 Laser cooling techniques

The initial preparation of the ground vibrational state is usually carried out by using lasercooling techniques. In this case, the light-matter interaction is used to extract energy fromthe vibrational modes of the ion. Let's consider three types of techniques.

3.3.1 Doppler cooling

For very hot ions quantum eects are irrelevant and classical arguments are sucient todesign an eective cooling mechanism. An ion that scatters light from a beam is subjected toa mechanical force in the beam direction. To achieve that this force is always directed awayfrom the ion's displacement (so that it has decelerating power) light must be detuned slightlybelow the frequency ω0 (red detuned). Thus, the ion enters into resonance with the light onlyif it moves towards the source. A red-detuned beam in all spatial directions slows the ion toa velocity below which it does not scatter light. This speed is proportional to the amplitudeγ of the absorption line of the chosen electronic transition. For this mechanism to be ecientit is necessary that several scattering events take place within a period of the harmonic trap1ν , ie the rate γ must be greater than the ν vibration frequency.

Page 26: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

26 CHAPTER 3. TRAPPED IONS

3.3.2 Sideband cooling

This mechanism is used after Doppler cooling to reach the ground state of the ions andinvolves applying a continuous sideband red-shifted beam (3.4), that is, laser light detunedby ∆ ≡ ωl − ω0 = −ν. Thus, an ion in the state |g, n〉 is preferentially excited to the state|e, n− 1〉. As the emission process does not change the ion vibrational state in average, themost likely state after emission is |g, n− 1〉. The constant repetition of this cycle due to thecontinuous beam ends up bringing the ion to the ground state |g, 0〉.

In order to use this technique it is required that the electronic transition is ne enough sothat the vibrational sidebands can identied, ie, the spacing between bands ν must be greaterthan the amplitude γ transition. This is the opposite regime to the one required in the methodof Doppler cooling and therefore dierent electronic transitions must be used in each case.

3.3.3 Cooling by electromagnetically induced transparency

Finally we consider the inuence of the use of dark states and Fano resonances in coolingeciency. For that we consider an additional ground electronic level and use a Raman setupto illuminate the double transition. This extension allows for the decoupling of the carrierwave transition from the red and blue sideband transitions.

Let's dene the lambda system consisting of the ground state |↓〉 the metastable state |↑〉and excited state |e〉 with dissipation rate γ. The lowest levels are coupled to the excited levelby two lasers propagating in opposite directions in Raman conguration (detuned equally tothe excited state by ∆). For simplicity, let us consider both provide the same Lamb-Dickeparameter η and have the same frequency Rabi Ω. In the rst term of the Lamb-Dickeexpansion the following dark state appears

|−〉 =1√2

(|↑〉 − |↓〉) .

In the interaction picture with respect to both laser frequencies, the zeroth order Hamil-tonian in the Lamb-Dicke expansion is

H(0)EIT = ~∆ |e〉 〈e|+ ~νb†b+ ~

Ω

2(|e〉 〈↑|+ |e〉 〈↓|+ h.c.) .

In terms of the dark state and the orthonormal state |+〉 = 1√2

(|↑〉+ |↓〉), the decoupling of|−〉 from the rest of the system becomes evident:

H(0)EIT = ~∆ |e〉 〈e|+ ~νb†b+ ~

Ω√2

(|e〉 〈+|+ h.c.) .

Since |e〉 decays both to |−〉 and |−〉 but the excitations in |+〉 are pumped out at a rate Ω itis clear that the steady state to zeroth order in η is |−〉.

The dark state |−〉 is coupled to the excited state by the rst order Hamiltonian

H(1)EIT = ~

Ω√2η (i |e〉 〈−|+ h.c.) (b+ b†).

Page 27: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

3.3. LASER COOLING TECHNIQUES 27

This coupling comprises both the red and the blue sideband. Analogously to the method ofsideband cooling it is now a matter of trying to promote the red sideband through properchoice of detuning. However, in this scheme the state |e〉 is coupled to the state |+〉, so ithelps to rst diagonalize the Hamiltonian H(0)

EIT into the dressed (diagonalized) states

|D1〉 = cos θ |e〉+ sin θ |+〉 ,|D2〉 = sin θ |e〉 − cos θ |+〉 ;

where the parameter θ is dened by

tan θ =∆ +

√∆2 + Ω2

Ω.

The energy eigenvalues are

ε1,2 =∆±

√∆2 + Ω2

2.

For realistic values of Ω the dressed state in a greater overlap with |e〉 is |D1〉. Therefore, thecondition that makes for the most ecient scheme is ε1 = −ν, which translates into settingthe values of detuning and laser intensity such that

Ω2 = 4ν(ν −∆).

3.3.4 Fano resonance

Another way of using the interference of quantum states for the cooling process control is thepossibility to decouple certain electronic states from dissipation.

Consider the single excitation manifold including the electronic states and the photon (notphonon) environment. We refer to |e, 0〉 as the state corresponding to the excited ion and nophoton in the environment. This state decays after a time γ−1 into one of the continua |+, 1〉or |−, 1〉, which correspond to the electronic state in one of the ground states and a photon inone of the innite modes of the electromagnetic bath.

The Hamiltonian Hk′ of the subspace |e, 0〉 , |+, 1〉, |−, 1〉 can be diagonalized by thecontinuum |k′〉. Through the laser driving present in the zeroth order Hamiltonian, |+, 0〉also couples to the continuum |k′〉, thus dening a new continuum |k〉. Let's see howthe excited state overlaps with continuum |k〉 that diagonalizes the Hamiltonian Hk for thesubspace |+, 0〉 , |k′〉. This Hamiltonian contains Hk′ , the coupling between |+, 0〉 and|e, 0〉 and the energy term ~ω+ |+, 0〉 〈+, 0|. So it is satised

Hk |k〉 =

[Hk′ + ~ω+ |+, 0〉 〈+, 0|+ ~

ΩA√2σ(+,e)x

]|k〉 = ~k |k〉 .

Projection on |+〉 (we drop the 0 photon index) produces

ω+ 〈+|k〉+ΩA√

2〈e|k〉 = k 〈+|k〉 .

Page 28: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

28 CHAPTER 3. TRAPPED IONS

Now the overlap 〈e|k〉 can be calculated

〈e|k〉 =

√2

ΩA(k − ω+) 〈+|k〉 .

This introduces a zero in the coupling between the state |e, 0〉 and the continuum, preventingthe system from emitting photons at a specic energy k = ω+. This is a phenomenon knownas Fano resonance and can be exploited to protect certain processes from dissipation.

3.4 Quantum gate operation

Several degrees of freedom of the trapped ion can be used as qubits. One usually distinguishesinternal qubits, such as two electronic levels, and external qubits, which refer to the ionvibrational states.

An electronic qubit requires two stable levels that allow laser driving at an intensity suchthat the Rabi frequency Ω is greater than the decay rate γ. Suitable conditions may be eithera ground state and an excited metastable state connected by a forbidden optical transition(optical qubit), or two hyperne sub-levels of the ground state of an ion with a nuclear spindierent from zero (hyperne qubit). Both cases can be treated as two-level atomic systemswith high accuracy |0〉 , |1〉. An optical qubit transition is operated with a single laser, whilea hyperne qubit requires two lasers highly detuned from an intermediate level in Ramanconguration. In the case of optical qubits, lack of hyperne structure in the electronic levelscheme makes levels sensitive to environmental magnetic elds and uctuations of the laserphase, which are sources of decoherence. However, eective qubits can be constructed ofmultiple quantum states of ions to form a decoherence-free subspace. For a hyperne qubit,the eect of laser phase noise is reduced because usually the two elds for Raman transitionare derived from the same source, and frequency dierence is stabilized with a microwaveoscillator. The magnetic eld sensitivity can also be reduced signicantly by using sub-levelswith no magnetic moment, or by applying a static magnetic eld in which the levels of qubitshave the same dierential Zeeman displacement.

External qubits are usually the two lowest levels |0〉 and |1〉 of the vibrational mode oflowest energy. In the next section we will discuss the laser cooling methods necessary to getrid of thermal uctuations that mask the quantum nature of this degree of freedom.

Considering rst a single trapped ion, the basis for quantum logic operations the compu-tational subspace (CS) is formed by the combination of internal and external qubits, ie bythe four states |g, 0〉 , |g, 1〉 , |e, 0〉 , |e, 1〉. The generalization of computational subspace tothe case of various ions is simple: it is the product of its internal space qubits and the selectedcommon mode of vibration.

Dierent interaction Hamiltonians induce dierent unitary dynamics in the CS. Dependingon the frequency detuning of the laser beam (ωl) with respect to the system frequency (ω0) itis possible to select via rotating wave approximation one of the interaction terms Vcar, VRSB

Page 29: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

3.4. QUANTUM GATE OPERATION 29

or VBSB. The relevant unitary dynamics are described by

UC(t) = exp

[−iΩt

2(|e〉 〈g|+ |g〉 〈e|)

], (3.3)

U−(t) = exp

[ηΩt

2

(|e〉 〈g| b− |g〉 〈e| b†

)], (3.4)

U+(t) = exp

[ηΩt

2

(|e〉 〈g| b† − |g〉 〈e| b

)]. (3.5)

By dening θ ≡ Ωt (θ ≡ ηΩt for the sidebands) as the angle of rotation of a pulse of durationt and including the inital laser phase φ, we may reinterpret the pulsed eect as the rotationsthat we encountered in 2.1.2

R(θ, φ) = exp

[−iθ

2

(|e〉 〈g| eiφ + |g〉 〈e| e−iφ

)], (3.6)

R−(θ, φ) = exp

2

(|e〉 〈g| beiφ − |g〉 〈e| b†e−iφ

)], (3.7)

R+(θ, φ) = exp

2

(|e〉 〈g| b†eiφ − |g〉 〈e| be−iφ

)]. (3.8)

Choosing the proper angle is possible to transform the state of the CS by successive appli-cation of pulses. For example, using the notation R+(θ, φ),

|g, 0〉R+(π2 ,0)−−−−−→ 1√

2(|g, 0〉+ |e, 1〉)

R+(π2 ,0)−−−−−→ |e, 1〉

|e, 1〉R+(π2 ,0)−−−−−→ 1√

2(− |g, 0〉+ |e, 1〉)

R+(π2 ,0)−−−−−→ − |g, 0〉 .

The key to building quantum gates with trapped ions is the common mode of vibration.Excitation of the sideband of an ion modies the state of movement of the chain and has aneect on the subsequent sideband interaction of all other ions, thereby providing the necessaryion-ion coupling. Because of the strong Coulomb coupling between the ions, the vibrationalmodes are separated and are spectrally distinguishable in energy, so that it is possible toaccurately tune the laser to the specic sidebands. The lowest frequency modeν, the center ofmass, is separated from the adjacent mode, stretch mode, by

(√3− 1

)ν.

Let us illustrate the role of the vibrational modes basic role by considering the entanglementof two trapped ions. Two laser pulses individually address each of the two ions. The pulses aredened analogously to equations (3.6-3.8) with additional superscript (1) or (2) indicating theaddressed ion. Thus, from the ground state |g, g, 0〉, the following sequence of pulses createsthe rst Bell state (|e, e〉+ |g, g〉) /

√2 and leaves the motional qubit in the ground state:

|g, g, 0〉R+(1)(π2 ,0)−−−−−−−→ 1√

2(|g, g, 0〉+ |e, g, 1〉) R−(2)(π,0)−−−−−−→ 1√

2(|g, g, 0〉+ |e, e, 0〉) .

Page 30: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

30 CHAPTER 3. TRAPPED IONS

3.4.1 Cirac-Zoller gate

There exist several specic protocols for two-qubit gates. The Cirac-Zoller phase gate proposalrequires an additional electronic state in the second ion as an auxiliary state |aux〉. Theimplementation consists of chaining the three pulses

R−(1) (π, 0)R−(2),aux (2π, 0)R−(1) (π, 0) ,

where R−(2),aux (2π, 0) refers to a gate involving electronic states |g〉 and |aux〉 instead of theusual |g〉 and |e〉. We can analyze the eect of each of the pulses with the truth table

Initial state R−(1) (π, 0) R−(2),aux (2π, 0) R−(1) (π, 0)|g, g, 0〉 |g, g, 0〉 |g, g, 0〉 |g, g, 0〉|g, e, 0〉 |g, e, 0〉 |g, e, 0〉 |g, e, 0〉|e, g, 0〉 − |g, g, 1〉 |g, g, 1〉 |e, g, 0〉|e, e, 0〉 − |g, e, 1〉 − |g, e, 1〉 − |e, e, 0〉

As we see the overall eect of the pulse sequence is the addition of a phase only if the initialstate is |e, e〉. From the perspective of the X basis

|±〉 =1√2

(|g〉 ± |e〉) ,

this can be interpreted as a CNOT gate! The set formed by the single-ion gates (3.6-3.8) andthe proposed Cirac-Zoller gate constitute a universal set, turning trapped ions into a quantumcomputer.

3.4.2 Mølmer-Sørensen gate

The Mølmer-Sørensen gate constitutes a successful attempt to relax the requirement forground-state cooling of the vibrational degrees of freedom and of individual addressing ofthe ions. Considering a setting for two ions, two laser beams, one detuned close to the redsideband and the other one detuned close to the blue sideband, are directed to both ions. Inthis situation virtual, two-photon transitions are the most likely, so that the state of both ionsis simultaneously and coherently modied. By choosing the interaction time appropriately thefollowing truth table is satised

Initial state Final state|g, g〉 1√

2(|g, g〉+ i |e, e〉)

|g, e〉 1√2

(|g, e〉+ i |e, g〉)|e, g〉 1√

2(|e, g〉+ i |g, e〉)

|e, e〉 1√2

(|e, e〉+ i |g, g〉)

From the perspective of basis |±〉 = 1√2

(|g〉 ± |e〉), this becomes

Initial state Final state|++〉 |++〉|+−〉 i |+−〉|−+〉 i |−+〉|−−〉 |−−〉

Page 31: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

3.4. QUANTUM GATE OPERATION 31

up to a phase factor 1+i√2. This is a conditional phase gate up to single-qubit phase shifts. This

once more reveals the connection between entangling gates and non-trivial two-qubit gates, aswe saw in 1.3.1. There exist a number of other proposals that attempt to circumvent otherexperimental limitations of ion-trap setups.

3.4.3 Composite gates

For eciency reasons it is sometimes useful to use a dierent structure for the experimentalimplementation of certain gates. This can solve problems like imperfect individual addressingof ions, populating Fock states out of the computational basis or time constraints. Let us havea look at some examples.

In situations where single ions cannot be addressed individually with sucient accuracy,single ion gates can be split into several terms so that the global eect in neighboring ions isless strong than the original gate. For instance

R (π, 0) = R(π

2, π)Rz (π)R

(π2, 0),

where Rz (π) = e−iπ2σz . One way to implement a Rz (π) gate is by applying an intense but

far detuned laser, so that an AC-Stark shift takes place. Assuming that a neighboring ion isinadvertently aected by the same beam with an intensity factor ε, the gate applied there is

R(επ

2, π)Rz(ε2π)R(επ

2, 0),

which is closer to unity than the eect of the non-composite gate eect R (επ, 0).An alternative to the Cirac-Zoller gate that does not involve an auxiliary electronic state

is

R−,aux (2π, 0) = R+(π

2,π

2

)R+

(π√2, 0

)R+(π

2,π

2

)R+

(π√2, 0

),

It is convenient to think of this gate in terms of the two levels that it involves for each input.The state |e, 0〉 is not aected, whereas both |g, 0〉 and |e, 1〉 experience a 2π rotation withinthat cycle and |g, 1〉 with |e, 2〉, which is a state out of the computational subspace.

Similarly, a SWAP gate between a motional and electronic qubit can be implemented with

R+

(π√2, 0

)R+

(2π√

2, arccos

[cot2 π√

2

])R+

(π√2, 0

).

Page 32: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

32 CHAPTER 3. TRAPPED IONS

Page 33: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

4. Quantum algorithms

The promises of quantum computation concretized after Shor demonstrated in 1994 that largenumbers could be factorized eciently. Given the fact that widely extended cryptographictools are based on the diculty to factorize large numbers with classical computers, thisdiscovery quickly gathered global attention. In addition to Shor's algorithm, Grover's searchalgorithm was shown to provide a quadratic improvement of exponentially complex problems,and also establishes the limitations of quantum computation. The following sections providea pragmatic overview of the most important aspects of these algorithms.

4.1 Shor's factorization algorithm

A crucial element in Shor's algorithm is the possibility to perform a quantum Fourier transformeciently. Let us quickly review the necessary elements to perform it.

4.1.1 Quantum Fourier transform

For a complex function xj dened on a discrete domain j ∈ 0, . . . , 2n − 1, we dene itsFourier transform yk as

yk =1√2n

2n−1∑

j=1

ei2π2njkxj (4.1)

and its quantum version as2n−1∑

j=1

xj |j〉 →2n−1∑

k=1

yk |k〉 , (4.2)

where yk is as dened in Eq.(4.1). By using the n-bit representation j1j2 . . . jn ≡ j12n−1 +j22n−2 + · · ·+ jn20 = j and the fractional representation 0.jljl+1 . . . jm ≡ jl/2 + jl+1/4 + · · ·+jm/2

m−l+1, it is possible to reduce the quantum Fourier transform Eq.(4.2) to the transfor-mation

|j〉 → 1

2n/2(|0〉+ ei2π0.jn |1〉

) (|0〉+ ei2π0.jn−1jn |1〉

). . .(|0〉+ ei2π0.j1j2...jn |1〉

), (4.3)

where the product contains n elements, corresponding each to a single of the n qubits requiredto represent indices j or k. This unitary transformation can be implemented as shown bythe circuit in gure 4.1. Starting with an arbitrary n-qubit computational eigenstate, action

33

Page 34: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

34 CHAPTER 4. QUANTUM ALGORITHMS

with a Hadamard gate on the rst qubit |j1〉 produces the superposition 1√2

(|0〉+ ei2π0.j1 |1〉

).

Accumulation of phase on the state |1〉 of the rst qubit conditioned on the states of theremaining qubits by the C (Rk) gates produces the superposition 1√

2

(|0〉+ ei2π0.j1j2...jn |1〉

).

Iterative application of this module on the remaining qubits and a nal SWAP operationnally amounts to the transformation Eq.(4.3).

Figure 4.1: Circuit for the Quantum Fourier Transform

Exercise 14Schein: Explain the steps involved in the quantum Fourier transform and give a denitionfor the required gates Rn.

4.1.2 Phase estimation

Building up on the quantum Fourier transform, one can devise a method to estimate a speciceigenvalue of a unitary transformation U . Let us dene the phase φ corresponding to theeigenvalue uφ ≡ eiφ associated to the eigenvector |uφ〉 of interest. Figure (4.2) shows thecorresponding quantum circuit.

|0〉 \t H⊗t j • FT †

|uφ〉 \ U j |uφ〉

1

Figure 4.2: Phase estimation protocol

By performing controlled-U j operations on the target, which encodes the eigenvector |uφ〉,one is performing a phase gate on the control qubits. For t the number of control qubits, oneobtains the Fourier transform of the state

∣∣∣φ⟩, where φ is the t-bit approximation of the phase

φ. Application of the inverse Fourier transform and measurement on the computational basisyields an approximation of the basis.

Page 35: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

4.2. GROVER'S SEARCH ALGORITHM 35

4.1.3 Order nding

Phase estimation can in turn be used to obtain the order r of an integer x modulo N , whichis the lowest integer r such that the remainder of the division of N by xr is 1. In the languageof modular arithmetic, the order of x is r such that xr = 1 ( mod N). By dening the unitary

U |y〉 = |xy ( mod N)〉

one can obtain the order of x from the eigenstate

|us〉 ≡1√r

r−1∑

k=0

exp

[−i2πskr

] ∣∣∣xk ( mod N)⟩.

|0〉 \t H⊗t j • FT †

|1〉 \L xj mod N |1〉

1

Figure 4.3: Order nding protocol

Notice that |1〉 = 1√r

∑r−1s |us〉. By preparing the correct circuit, one obtains an estimation

of sr . Continued fraction representation provides r, which in turn is related through a classicalalgorithm to the factorization of N .

4.2 Grover's search algorithm

This constitutes a second class of useful algorithms that provides a considerable speedup withrespect to their classical counterparts, albeit just a quadratic speedup. The common exampleto illustrate this algorithm is called the traveling salesman problem, and involves nding theshortest of N routes connecting a number of cities. Classically, it takes O (N) operations tond the solution. Quantum computation oers the possibility to solve the problem with justO(√

N)operations. It turns out that many problems can be expressed in terms of a search.

Let's take the the problem of factorizing a large number m, for instance, which is addressedby Shor's algorithm. The most naive (and inecient) approach is to check all numbers oneby one between 2 and m1/2 to see if they are factors of m. Classically, this would requireO(m1/2

)operations, whereas the quantum search algorithm would speed this up to O

(m1/4

).

Although this is not a useful case (even classical algorithms exist that do much better), itcomes to show that a quadratic improvement is always possible whenever a classical algorithmcan be expressed in terms of a search.

Page 36: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

36 CHAPTER 4. QUANTUM ALGORITHMS

4.2.1 Procedure

Let us reformulate the problem that we want to address in terms of a space of N = 2n elements,so that elements can be indexed with n bits. Let us assume a given problem is solved by M ofthese elements (in other words, M elements satisfy the conditions set by the problem). Thiscan be encoded in a function f (x) which takes n-bit indices x and outputs 1 if element x is asolution to the problem and 0 if it isn't. We encountered these n-bit to 1-bit functions in theDeutsch-Jozsa algorithm. Just as we did there, let us assume we are provided with a quantumcircuit O that we call oracle, which performs the following transformation on n+ 1 qubits

|x〉 |q〉 O→ |x〉 |q ⊕ f (x)〉 .

This gate is analogous to the gate Uf of Fig.(2.1). If we choose |q〉 = 1√2

(|0〉 − |1〉), let usrecall that the eect of O is

|x〉 1√2

(|0〉 − |1〉) O→ (−1)f(x) |x〉 1√2

(|0〉 − |1〉) ,

that is, a phase −1 is gained only if x is a solution of the problem.The algorithm consists in the repeated application of a module known as Grover iteration

or Grover operator, denoted G, on the input |ψ〉 = 1√2n

∑2n−1x=0 |x〉. This module works, just

as O, on n+ 1 qubits and has 4 steps:

G = H⊗n (2 |0〉 〈0| − I)H⊗nO (4.4)

1. application of the oracle O,

2. application of the Hadamard transform on the rst n qubits H⊗n,

3. application of the unitary transformation 2 |0〉 〈0| − I on the rst n qubits (addition ofa −1 phase to all computational states |x〉 except |0〉),

4. application of the Hadamard transform on the rst n qubits H⊗n.

Note that only O requires the extra qubit, so we may drop it and focus on the rst n qubitsfor the rest of the discussion.

Exercise 15

Schein: Show that, for |ψ〉 = 1√2n

∑2n−1x=0 |x〉

H⊗n (2 |0〉 〈0| − I)H⊗n = 2 |ψ〉 〈ψ| − I

and that(2 |ψ〉 〈ψ| − I)

k

ck |k〉 =∑

k

[2 〈c〉 − ck] |k〉 ,

with 〈c〉 = 12n∑

k ck.

Page 37: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

4.2. GROVER'S SEARCH ALGORITHM 37

4.2.2 Interpretation

Let us dene the equal superposition state of the M indices that satisfy the search problem

|β〉 ≡ 1√M

x′

∣∣x′⟩,

where x′ precisely indicates solution states (such that f (x′) = 1). Analogously, let us denethe equal superposition of all those states that are not a solution to the problem

|α〉 ≡ 1√N −M

x”

|x”〉 ,

where x” is now a sum over indices such that f (x”) = 0. It becomes clear that the fullsuperposition state can be expressed as a superposition of them

|ψ〉 =

√N −MN

|α〉+

√M

N|β〉 ≡ cos

θ

2|α〉+ sin

θ

2|β〉 .

Now, within this subspace, G = (2 |ψ〉 〈ψ| − I)O operates as a composition of a reectionabout |α〉 performed by O and a reection about |ψ〉 performed by (2 |ψ〉 〈ψ| − I). In partic-ular, one can show that

Gk |ψ〉 = cos

(2k + 1

)|α〉+ sin

(2k + 1

)|β〉 .

Therefore, repeated application of the Grover operator brings the state closer and closer tothe superposition of solutions |β〉 that we are looking for. In particular, in order to get closeto |β〉 with probability more than one half, one needs to operate G an amount of times

R = CI

(arccos

√M/N

θ

),

with CI (r) the closest integer below the real number r. With this result it becomes clear thatknowledge of M is required in order to maximize the probability to measure a solution. It ispossible to show that this is not the case with the help of the concepts discussed in the nextsubsection. At any rate, R gives an indication of the quadratic speedup associated to Grover'salgorithm. Under the condition that M ≤ N

2 ,

R ≤ CI( π

)≤ CI

4

√N

M

),

so that Grover's algorithm is O(√

N). In particular, it can be demonstrated that not only is

that an upper bound but also a lower bound. In this sense, it is impossible to improve searchalgorithms by means of the implementation of an oracle.

Page 38: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

38 CHAPTER 4. QUANTUM ALGORITHMS

4.2.3 Quantum counting

When the number of possible solutions M is not known, it is possible to derive a reasonableestimate by using the phase estimation procedure. Since G acts as a rotation in the |α〉 |β〉plane, it just contains two eigenvalues e±iθ. Irrespective of the input state, it is possible toobtain θ and therefore to infer M .

The consequences of this are quite interesting, since it allows to decide whether a specicsearch problem has a solution or not without checking all exponentially many candidates.

Page 39: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

5. Quantum simulations

The high degree of control of quantum systems has a straightforward application that hasseen a large surge in the past few years: the possibility to simulate the dynamics otherwiseinaccessible quantum systems. In general, classically simulating quantum systems requiresexponentially increasing resources with the number of particles, whereas quantum simulationallows for the realization of the same task with usually just a polynomial overhead. Mostrelevant advances in this eld have occurred in cold atom and trapped ion experiments.

One should distinguish between digital quantum simulations (DQS) and analog quantumsimulations (AQS). The former represents quantum evolution in a generic platform by meansof single and two-qubit gates, therefore remaining very close to the circuit model of quantumcomputation. The latter is based on a mapping of the quantum system of interest onto theexperimental platform, so that the proper evolution of the experimental platform directlyrepresents the dynamics of the quantum system of interest.

5.1 Digital quantum simulation

Representation of the evolution in terms of a polynomially large set of local gates is sometimespossible thanks to the Trotter formula

edt(A+B) ' edtAedtB,

for small enough dt. Higher order corrections to this formula are given by the Baker-Campbell-Hausdor formula. In general, this provides a connection between the evolution of a quantumsystem whose Hamiltonian has a number of terms of small support (few-particle interactions)and a series of unitary operation. In some sense, we have already seen a deployment of this ideain the ion trap case: the implementation of certain quantum gates by means of the control ofthe evolution of a quantum system. In order to gain further insight into the exibility oeredby this possibility, let us study in abstract terms the interpretation of the search algorithm asa quantum simulation.

5.1.1 Grover's algorithm as a quantum simulation

Let us postulate a system that is able to implement the Hamiltonian

H = |x〉 〈x|+ |ψ〉 〈ψ| ,

39

Page 40: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

40 CHAPTER 5. QUANTUM SIMULATIONS

where |ψ〉 is a starting state and |x〉 is a solution to the search. A decomposition |ψ〉 =α |x〉+β |y〉, where 〈x|y〉 = 0, is possible, so that the Hamiltonian in the basis |x〉 , |y〉 takesnow the form

H =

(1 00 0

)+

(α2 αβαβ β2

)= I + α (βX + αZ) ,

since α2 + β2 = 1. Thus, evolution of the initial state under this Hamiltonian takes the form

exp (−iHt) |ψ〉 = e−it [cos (αt) |ψ〉 − i sin (αt) (βX + αZ) |ψ〉]

where time is dimensionless or the energy scale of the Hamiltonian is assumed 1. One canshow

(βX + αZ) |ψ〉 = |x〉

and therefore the state evolves following

|ψ〉 (t) = cos (αt) |ψ〉 − i sin (αt) |x〉

By choosing the uniform superposition state as the initial state

Exercise 16Schein: Show that

H = |x〉 〈ψ|+ |ψ〉 〈x|reproduces a similar result.

|ψ〉 =1√2n

2n−1∑

j=0

|j〉

we have an exact prediction for the time that the Hamiltonian needs to be applied in orderto obtain the solution |x〉 with probability one: t = π

2 2n/2, which indicates the quadraticadvantage which is symptomatic of Grover's algorithm. Together with the quantum countingprotocol, one can generalize this approach to the case with an unknown number of solutions.

We have a Hamiltonian that is able to reproduce our algorithm. The Trotter decompositionallows us to decompose it into an alternate implementation of very small time-steps dt involvingthe operations exp (−i |x〉 〈x| dt) and exp (−i |ψ〉 〈ψ| dt). The eect of one of the cycles

U (dt) = exp (−i |ψ〉 〈ψ| dt) exp (−i |x〉 〈x| dt)

can be derived by using the Bloch vector representation

|x〉 〈x| = I + zσ

2,

|ψ〉 〈ψ| = I + ψσ

2,

Page 41: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

5.1. DIGITAL QUANTUM SIMULATION 41

with z = (0, 0, 1) and ψ =(2αβ, 0, α2 − β2

). It takes the form

U (dt) =

(cos2 dt

2− ψ · z sin2 dt

2

)I − i sin

dt

2

[(ψ + z

)cos

dt

2− ψ × z sin

dt

2

which corresponds to a rotation around the axis

~r =(ψ + z

)cos

dt

2− ψ × z sin

dt

2

and an angle

cosθ

2= cos2 dt

2− ψ · z sin2 dt

2= 1− 1

2n−1sin2 dt

2.

This shows that the choice dt = π maximizes the eect of the rotation, so that fewest appli-cations of U (dt) are needed. In that case

U (π) = exp (−i |ψ〉 〈ψ|π) exp (−i |x〉 〈x|π) = (I − 2 |ψ〉 〈ψ|) (I − 2 |x〉 〈x|)

which corresponds identically to the Grover operator dened in the last lecture in Eq.4.4.Because of the properties of qubit algebra and because our objective is to reach the state|x〉, it turns out to be more ecient to implement the decomposition using long time-stepsbut, in any rate, we now have a decomposition of the Hamiltonian H in a series of gates thatwere described in the last lecture. In this sense, we have proposed a digital simulation ofHamiltonian H.

5.1.2 Simulation of general non-local terms

In general, it is always possible to propose a simulation of a given Hamiltonian in terms oftwo-qubit and single-qubit gates, in a consequence of the discussion in 2.2.2. Nevertheless, itmay be more ecient to represent a unitary transformation in terms of non-local Hamiltonianterms. These generally take the form

Hn =n⊗

j=1

σkc(k)

where c (k) ∈ 0, 1, 2, 3 species the Pauli matrix and the superindex species the qubit uponwhich it acts. Hamiltonian terms of the form Hn can be viewed as a generalization of a parityoperator: the state upon which it acts acquires a global phase depending on whether theamount of qubits in up eigenstates of their corresponding Pauli matrix σkc(k) is odd or even.With this insight, non-local terms can easily be simulated by transferring the parity to anancilla qubit, introducing the state-conditioned phase in the ancilla qubit, and returning theacquired phase to the original qubits.

Let us look at an example for better understanding. We consider simulation of the Hamil-tonian

H = X1 ⊗ Y2 ⊗ Z3,

Page 42: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

42 CHAPTER 5. QUANTUM SIMULATIONS

for which an eigenstate of positive parity is

1

2(|0〉 − |1〉) (|0〉 − i |1〉) |0〉 ,

and one with negative parity is

1

2(|0〉+ |1〉) (|0〉+ i |1〉) |1〉 .

Parity may be accumulated on an ancilla qubit by means of a CNOT gate or modicationsthereof by means of single qubit rotations. The ancilla qubit may be operated on with arotation e−iZt and nally all CNOT gates must be undone. This is represented in Fig.5.1 forour example Hamiltonian.

Ry(π2

)• Ry

(−π2

)Ry(−π

2

)• Ry

(π2

)

Rx(−π

2

)• Rx

(π2

)Rx(π2

)• Rx

(−π2

)

• •|0〉 e−itZ

1

Figure 5.1: Implementation of a non-local Hamiltonian term.

5.1.3 Obtention of molecular energies

The phase estimation algorithm has a clear avor of quantum simulation. If one is able toprepare an eigenstate of a certain Hamiltonian, it is possible to learn its energy by lettingit evolve in time and by extracting the acquired phase. This idea was presented 1 in 2005together with an iterative version of the phase estimation procedure, so that even with a smallnumber of working qubits, it is possible to repeat the algorithm to increase the accuracy ofthe obtained phase. The circuit corresponding to this procedure is presented in Fig.5.2 andthe denition of Vk is

Vk =[e−i2πφk−1Vk−1

]2,

with V0 = exp iHτ and φk−1 the phase as known up to iteration k − 1. The factor e−i2πφk−1

acts as an oset that eliminates the already known bits of accuracy of the phase, and thesquared is required to increase the time of the evolution, so that the accumulated phase isdouble and accuracy can be increased.

1Aspuru-Guzik, A., Dutoi, A. D., Love, P. J., & Head-Gordon, M., Science, 309, 1704 (2005).

Page 43: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

5.2. ANALOG QUANTUM SIMULATORS 43

|0〉 H •

QFT †|0〉 H •

|0〉 H •

|0〉 H •

|Ψ〉 Vk V 2k V 4

k V 8k

1

Figure 5.2: Iterative circuit for the obtention of molecular energies.

5.2 Analog quantum simulators

Quantum simulations need not be formulated in terms of quantum circuits. An alternative ideainvolves a mapping between the Hamiltonians of two dierent systems: one which is dicult tocontrol and access, and another one which has an controllable experimental implementation.Many instances of this idea have appeared in the last two decades and it is currently the mostpromising and fastest growing eld in quantum computation. Let us review a few examples.

5.2.1 Cold atoms

The possibility to arrange cold neutral atoms in optical lattices allows for the accurate prepa-ration of condensed matter models. A particularly interesting one is the Hubbard model

H = −J∑

i,j

b†ibj +1

2U∑

i

ni (ni − 1) +∑

i

µini,

which can be seen as a lattice of anharmonic, bosonic wells. This is a minimal model for thedescription of superconducting systems and has been experimentally demonstrated in a cold-atom lattice implementation, where the Mott-insulating (MI) to superuid (SF) quantumphase transition was demonstrated. Quantum phase transitions are abrupt changes in theground state of a Hamiltonian as some parameters are changed, so they take place at zerotemperature. Assuming no lattice bias µi, the two phases are characterized by the two groundstates

|ΨSF〉|U=0 ∝(

M∑

i=1

b†i

)N|0〉 ,

|ΨMI〉|J=0 ∝M∏

i=1

(b†i

)n|0〉 ,

where N is the total number of atoms, M is the number of lattice sites and n = NM is

a commensurate lling factor. As the atom-atom repulsion U is increased, atoms tend to

Page 44: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

44 CHAPTER 5. QUANTUM SIMULATIONS

localize in the lattice, whereas for large tunneling rates J , the tendency is for all the atoms tobe completely delocalized in all lattice sites.

An optical lattice is generated with standing waves of lasers in the 3 spatial directionsturned on atop a Bose-Einstein condensate (BEC). The intensity of the lasers allows to controlthe quotient U

J , and this mechanism permitted experimental demonstration of the SF-MItransition2. A property of the MI state that distinguishes it from a fully incoherent state isthat it is possible to recover the SF state after elimination of the optical lattice. In addition, itpossesses a nite gap with respect to the rst excited state. In the case where the lling factorn = 1, it is clear that a hop of an atom to its neighboring site requires an energy U . This gapcan be explored by introducing a bias µi between neighboring sites. When µi−µi+1 = U , theSF phase cannot be recovered, and this situation is associated to the overlap generated withthe rst excited state in the MI phase.

This is an example of the many simulations of condensed matter systems that have beencarried out lately in lattices of cold atoms.

5.2.2 Trapped ions

The natural model to discuss in the case of trapped ions is the simulation of spin chains. Thishas indeed been explored, for instance, with the intention to explore the transition betweenparamagnetic and antiferromagnetic phases. A more exotic investigation was the simulationof the Dirac equation in a single trapped ion3.

The Dirac equation in 3+1 dimensions has the form

−i~ ddtψ =

(cαp+ βmc2

)ψ = HDψ,

with αi =

(0 σiσi 0

)and β =

(1 00 −1

). The spinor ψ has 4 components, which correspond

to the positive and negative relativistic energy values

E = ±√p2c2 +m2c4

and to the spin 12 degree of freedom.

The position of the particle can be derived on the Heisenberg picture

d

dtx =

i

~[HD,x] = cα

andd

dtα =

i

~[HD,α] = 2i (cp−αHD)

which provides the solution

x (t) = x (0) + c2pH−1D t+

i~c2H−1D

(α (0)− cpH−1

D

) (e−2iHDt/~ − 1

).

2Greiner, M., Mandel, O., Esslinger, T., Hänsch, T. W., & Bloch, I., Nature, 415(6867), (2002).3Lamata, L., León, J., Schätz, T., & Solano, E., Physical Review Letters, 98(25), 253005 (2007).Gerritsma, R., Kirchmair, G., Zähringer, F., Solano, E., Blatt, R., & Roos, C. F. , Nature, 463(7277), (2010).

Page 45: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

5.2. ANALOG QUANTUM SIMULATORS 45

Apart from the usual term that evolves linearly with time, we note the existence of an addi-tional, oscillatory term.

The form of the Dirac equation for the 1+1 dimensional case is

−i~ ddtψ =

(cpσx +mc2σz

)ψ,

which is a Hamiltonian that can be implemented in a trapped ion setting.The phenomenon of Zitterbewegung, the oscillating behavior of free particles consequence

of interference between the positive and negative energy wavefunctions, has not been observed:in the case of electrons, it has an amplitude RZB = 10−3Åand a frequency ωZB = 1021Hz,which makes it inaccessible. In an ion trap setting, one has to understand the positive andnegative energy part of the spinor as the two polarons associated to a spin-boson model. Ameasurement of the dipole provides access to the position x (t), which reproduces the expectedbehavior from simulations.

Page 46: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

46 CHAPTER 5. QUANTUM SIMULATIONS

Page 47: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

6. Alternative formulations of

quantum computation

The realization that systematic errors arising from environmental eects were the main limitingfactors for the scalability of quantum computers fueled interest in the formulation of alternativeproposals of quantum computation that would be naturally protected from decoherence.

6.1 Adiabatic quantum computation

The understanding of decoherence as a dynamical process favors the idea that encoding thesolutions of algorithms in the ground state of a system may constitute a more robust methodthan subsequent operation with quantum gates. This is the basis of adiabatic quantum com-putation.

The basic principle one has to follow in order to encode a solution to an algorithm in theground state of a Hamiltonian is to introduce energetic penalties to states that are known notto constitute a solution. The oracle operator of the Grover search algorithm is a clear examplethereof

O = (I − 2 |x〉 〈x|) .

If we understand O as a unitary transformation, it introduces a phase −1 for the solutionstates |x〉. But if we take it as a Hamiltonian, its ground state is the subspace describedprecisely by these very solution states. If one is able to build a system with Hamiltonian O,it is possible to extract the solution from the state of lowest energy.

The question is how to reach the ground state. A complicated Hamiltonian in isolationneed not populate that state easily1. Instead of preparing a complicated ground state, apossibility is to start with a much simpler initial Hamiltonian whose ground state is easy toreach and to prepare with high delity. One may then slowly drive the initial Hamiltonianthrough to reach the goal Hamiltonian. The speed of this transformation needs to be slowenough that excited states do not populate in the process. This idea is systematized in termsof the adiabatic theorem

1See, for instance, ground state laser cooling of trapped ions.

47

Page 48: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

48 CHAPTER 6. ALTERNATIVE FORMULATIONS OF QUANTUM COMPUTATION

6.1.1 Adiabatic theorem

Let us consider the evolution of a system under the eect of a time-dependent Hamiltonian

d

dt|Ψ (t)〉 =

−i~H (t) |Ψ (t)〉 .

We may dene the instantaneous basis

H (t) |φn (t)〉 = εn (t) |φn (t)〉 ,

with which we may express the formal solution of the Schrödinger equation

|Ψ (t)〉 =∑

n

cn (t) e−iθn |φn (t)〉 ,

with θn = 1~´ t

0 εn (s) ds. It is possible to derive the following equation for the rate of changeof the amplitudes

cn = −cn 〈φn|d

dt|φn〉 −

m6=ncm〈φn| H |φm〉Em − En

e−i(θm−θn). (6.1)

The rst term is the adiabatic term, which corresponds to an evolution where the probabilitydistribution over the instantaneous basis does not change. The second term is the one thatneeds to be negligible

m6=ncm〈φn| H |φm〉Em − En

e−i(θm−θn) 1.

For an initial distribution cn = δn0, this translates into the requirement that the rate ofchange of the form of the Hamiltonian H needs to be much smaller than the energy gapE1−E0 between the ground and the rst excited states. This is how the spectral gap becomesa measure of complexity of an adiabatic quantum algorithm.

Exercise 17Schein: Derive equation 6.1.

6.1.2 Equivalence with the circuit model of quantum computation

It is possible to show that there is no fundamental computational advantage in using thecircuit model of quantum computation or the adiabatic one, in the sense that one can mapone into the other with a polynomial overhead2. The transformation of an adiabatic algorithminto a circuit is possible through quantum simulation of the adiabatic process in a quantumcomputer. The less trivial aspect is how to represent a circuit operation in an adiabaticalgorithm.

2Charles Epstein's notes.

Page 49: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

6.1. ADIABATIC QUANTUM COMPUTATION 49

This is possible by attempting to represent the entire history of the quantum computationin a superposition

|η〉 ≡ 1√L+ 1

L∑

j=0

|α (j)〉∣∣1j0L−j

⟩c,

where L is the number of steps of the computation, |α (j)〉 is the state of the system afterthe gate j has been applied and

∣∣1j0L−j⟩c is the clock state, that represents the step that is

encoded in |α (j)〉. The algorithm requires n qubits, and therefore |α (j)〉 is registered equallyin n qubits, whereas the clock state requires L+ 1 qubits. Note that, by projecting the clockstate in one of its possible values, one recovers the state |α (j)〉, but otherwise this is just ahighly entangled state.

Now we need to nd a Hamiltonian whose ground state is |η〉. We will start with aHamiltonian

HI = Hclockinit +Hclock +Hinit

with

Hinit =

n∑

i=0

|1〉 〈1|i ⊗ |0〉 〈0|c1

which is a term that introduces an energy penalty to all states that do not start with |0〉⊗n.The subscript always indicates the qubit upon which the operator acts, superscript c refers tothe clock qubits. The clock term of the Hamiltonian ensures only valid clock states can bepart of the ground state

Hclock =

L∑

j=0

|01〉 〈01|cj,j+1 ,

since all clock states only contain ones followed by zeros. Finally, the Hamiltonian

Hclockinit = |1〉 〈1|c1

ensures that the initial clock state is |0〉⊗L+1. This Hamiltonian is adiabatically transformed

H (s) = (1− s)HI + sHF

into the Hamiltonian

HF =1

2

L∑

j=0

Hj +Hclock +Hinit.

The nal Hamiltonian contains the terms

Hj = I ⊗(|100〉 〈100|cj−1,j,j+1 + |110〉 〈110|cj−1,j,j+1

)−(Uj ⊗ |110〉 〈100|cj−1,j,j+1 + h.c

),

where Uj is the gate applied at time-step j.

Exercise 18Schein: Show that HF |η〉 = 0, and that it is its ground state.

Page 50: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

50 CHAPTER 6. ALTERNATIVE FORMULATIONS OF QUANTUM COMPUTATION

It was shown3 that this formulation requires an overhead of O(L5)and is therefore poly-

nomially equivalent to the circuit model of quantum computation.

6.2 Quantum annealing

The concept of adiabatic quantum computation tries to circumvent the pernicious eect ofenvironmental decoherence by remaining in an indestructible state: the ground state. Itnevertheless still has to pay the toll of ineciency in the form of a very long driving time thatis dictated by the spectral gap between ground and rst excited state. A natural considerationwould be to drop the necessity to approach the ground state by adiabatic means.

Clearly, a more natural representation of the dynamics of a system in contact with theenvironment is provided by thermodynamics. A possibility is to try to approach the groundstate by means of a cooling process. In order to increase the chance to reach the ground state, ahighly disordered state needs to be the starting point. Instead of using some external adiabaticdriving, it is the temperature that is driven in order to reach the algorithm result encodedin the ground state. This procedure has been the inspiration to the concept of simulatedannealing, which is a stochastic algorithm used in computer science.

The quantum counterpart, quantum annealing, exploits the uctuations generated by non-commuting terms in the Hamiltonian in order to generate the highly disordered initial state.This is the implementation that seeks to realize the D-Wave, a machine that has gatheredmuch attention since major companies began to invest eort in studying its capabilities. Itscentral processing unit is a network of superconducting circuits.

6.2.1 Classical vs quantum annealing

It is best to regard annealing as an optimization procedure that attempts to search for a fairlygood solution to a problem, without a guarantee to reach the best one. In classical annealing,this translates to reaching a favorable state of the system by means of free energy minimization

F [p (x)] = E [p (x)]− TS [p (x)] ,

where we picture the thermodynamic potentials (F, free energy; E, inner energy; S, entropy)as functionals of the probability distribution over the system states x. In a high temperaturesituation, the free energy F is minimized for maximum entropy, i.e. a maximally mixeddistribution p (x). As temperature decreases, the energy landscape E modies the singleminimum of the entropic term into a generally complex situation. Nevertheless, the highlyspread initial form of p (x) allows the system to explore a big range of possible minima andsettle in a fairly good solution to the optimization problem.

In the quantum case, uctuations are not only of thermal nature. Additional uctuationsmay be generated by the introduction of a non-commuting Hamiltonian part, so that

FQ [p (x)] = Tr [HFρ] +K (t)Tr [HIρ]− TS [ρ] ,

3D. Aharonov, W. van Dam, J. Kempe, et al., SIAM Review, 50(4):755787, (2008), arXiv:quant-ph/0405098v2.

Page 51: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

6.3. MEASUREMENT BASED QUANTUM COMPUTATION 51

where HF is the Hamiltonian where the solution is encoded and HI is a controllable Hamilto-nian whose strength we can drive by means ofK (t). The combination of quantum and thermaluctuations is believed to accelerate the search for an optimum, since quantum uctuationsallow to tunnel narrow barriers even if they are very high, whereas thermal uctuations do notallow that. Also, non-local transformations of the state are possible in quantum systems butare more unlikely in the classical case. Nevertheless, no general result exists in this directionand this is a matter of current research.

As is a matter of current research the ability by D-Wave processors to perform quantumannealing. An example Hamiltonian that may be implemented in a D-Wave is an Ising networkwith a transverse eld

H =

N∑

i=1

hiZi +N∑

i<j=2

JijZiZj +N∑

i=1

gi (t)Xi,

where quantum uctuations are introduced by means of the controls gi (t) and one may encodea specic energy landscape in the coecients hi and Jij . Nevertheless, the claims of quantumspeedup on these machines have been heavily contested.

6.3 Measurement based quantum computation

The rst protocol that we learnt about in this lecture series, quantum teleportation, may beextended to become a model for universal quantum computation. The central concept involvesa highly entangled state upon which measurements are adaptively performed. The nal resultof the computation is determined by the measurement outcomes. Two main versions exist:teleportation quantum computation (TQC) and one way quantum computation (1WQC). Itmay appear surprising that collapsing the wave function, thereby obtaining classical informa-tion, would be enough to expoit the promise of eciency of quantum computation. Let usexplore the possibilities oered by this perspective.4

6.3.1 Teleportation quantum computation

The teleportation protocol consists in a Bell state measurement in two qubits, an input |ψ〉1and one half of a Bell pair (qubit 2 in |β00〉23), in order to transfer the original input state tothe other half of the Bell pair (qubit 3 in |β00〉23) up to single qubit gates. For any single-qubit unitary U , let us dene the generalized Bell basis elements |βab (U)〉 ≡ U † ⊗ I |βab〉.Measurement on that basis with outcome ab will teleport the state ZaXbU |ψ〉 instead. Thiscentral idea of carefully choosing the measurement basis to obtain an applied gate on anotherqubit can be easily extended to higher dimensions, so that multi-qubit gates are also possible.

This can be easily generalized to a sequence of gates. What to do with the unwanted Paulioperators XaZb that depend on the measurement outcome? A possibility to get rid of themis by adaptive measurement, that is, adapting the form of subsequent measurements to the

4A good overview on the topic is oered by Jozsa, R. arxiv:quant-ph/0508124, (2005).

Page 52: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

52 CHAPTER 6. ALTERNATIVE FORMULATIONS OF QUANTUM COMPUTATION

Exercise 19Schein: Given the d−dimensional maximally entangled state of a two particle system

|φ〉 =1√d

d∑

i=1

|i〉 |i〉 ,

and a unitary U , dene a measurement protocol to teleport the state U |φ〉.

outcomes. Let us consider the single-qubit example to clarify this point. Rotations around xand z axes of the Bloch sphere are aected as follows by Pauli operators

Rx (θ)X = XRx (θ) ,

Rx (θ)Z = ZRx (−θ) ,Rz (θ)X = XRz (−θ) ,Rz (θ)Z = ZRz (θ) .

To perform the measurements correponding to the gate sequence Rz (α)Rx (β), one beginsby the application of the teleportation protocol for the rst gate, which will yield the stateZaXbRx (β) |ψ〉. The second step is to apply the teleportation protocol corresponding to the

adaptive gate Rz(

(−1)b α)so that the nal state is Za+cXb+dRz (α)Rx (β) |ψ〉.

A similar situation occurs for the CZ (controlled phase) gate, with the addition that thegate is not aected by the commutation

CZ (Z ⊗ I) = (Z ⊗ I)CZ,

CZ (X ⊗ I) = (X ⊗ Z)CZ.

The fact that CZ needs not be adapted to any previous measurement result introduces a newexibility in this model: the possibility to apply that gate on the required qubits at any pointin time.

6.3.2 Cliord operations

Operations that are not adapted to some previous measurment outcome are useful in the sensethat they allow us to parallelize the operation of the computation (there is no need to wait forany measurement result to perform that operation). Let us dene the Pauli group Pn as theset of nfold tensor products of Pauli matrices, as if they each operated on one of n separatequbits. A unitary C is a Cliord operation if CPnC† = Pn, which formally expresses that,for an element P of Pn, CP = P ′C, with P ′ another element of Pn. We have already notedthat CZ is a Cliord operation, and so is the Hadamard gate, the π/4-phase gate T 2 and Z.These are sucient to express any unitary operation to arbitrary accuracy. As opposed tothe circuit model of quantum computation, a set of Clliord operations does not need to beapplied one step after the other, but all in parallel, plus a classical computation to deduce theresidual Pauli matrices to the left of the desired quantum operation. This separation into aneasy quantum operation and a classical operation facilitates the characterization of the bareminimum quantum ressources required to preform a quantum operation.

Page 53: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

6.4. TOPOLOGICAL QUANTUM COMPUTATION 53

6.3.3 One way quantum computation

One way quantum computation (1WQC) requires a cluster state to operate on. A clusterstate is dened on top of a graph whose nodes are qubits in the |+〉 states and the edges arethe application of an entangling CZ gate. The computation proceeds with the appication ofmeasurements either in the Z or the X basis. Other measurment bases would do a similar job,but let us stick to the conventional choice.

Let us regard the example of teleportation in 1WQC. Given a state |ψ〉, adjoin |+〉, entanglewith CZ and X-measure the rst qubit, giving and outcome s and leaving the second qubitin state XsH |ψ〉. Performing the same steps with the second qubit and an additional thirdqubit would leave the third qubit in state XrHXsH |ψ〉 = XrZs |ψ〉, where r is the outcomeof measurement of qubit 2. We have an outcome that is very similar to the teleportationprotocol, where only CZ and local measurements took place. This is not a big surprise if onerealizes that the sequence of gates just described is a reordering of the quantum teleportationprotocol for local measurement (Fig.2.2). In general, one may reorder the CZ gates involved ina calculation to the beginning (creation of the cluster state) and perform local measurementsaccording to the required eects. An interesting aspect is the role of measurements in the Zbasis is to decouple that node from the rest of the graph.

6.4 Topological quantum computation

The use of physically protected degrees of freedom for the implementation of quantum informa-tion processing has its best example in the concept of topological quantum computation. Here,exchange statistics of particles are exploited in order to represent unitary transformations.

6.4.1 Physical support

In three dimensions, there exists only two types of exchange statistics: bosonic and fermionic.Two indistinguishable particles that are exchanged look exactly the same as before, but it isknown that their wavefunction acquires a phase −1 if the particles are fermions.

The Aharonov-Bohm eect is a related phenomenon. A particle of charge e that is connedin a plane gains an overall phase eiφe when it encircles a section with magnetic ux φ. Thisis a non-trivial exchange phase that does not correspond neither to bosons (trivial phase) orfermions (phase -1). For this reason, one may consider the set of ux and charged particle asa new particle with a special exchange statistics: an anyon. This phase is stable under thedeformation of the trajectory, so it is said to be topologically protected, and this is the reasonwhy it is thought to be an indicated degree of freedom. In three dimensions, trajectories maybe deformed topologically into a point, so none of these eects take place.

The classical quantum Hall eect involves the generation of a potential between two endsof a metallic slab that is in a magnetic eld. The quantum case involves fractional values ofcharge that can be used as topological degrees of freedom.

Page 54: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

54 CHAPTER 6. ALTERNATIVE FORMULATIONS OF QUANTUM COMPUTATION

6.4.2 Flux-charge systems

Let us consider a two-dimensional superconducting material that has a region where magneticux Φ is non-zero. This region is impenetrable to charges in the superconductor, and magneticux across a superconductor must be zero. By means of the Aharonov-Bohm eect, an electriccharge q transported around the ux acquires a topological phase

U (2π) = e−i2πJ = eiqΦ

where J is the angular momentum. The equality imposes the following possible eigenvalues ofangular momentum

J = m− qΦ

and we may dene the angular variable as the intrinsic spin of the ux-charge compositesystem θ = qΦ ( mod 2π) so that the topological phase is eiθ. This allows us to consider thissystem as an anyon: a particle that does not follow bosonic nor fermionic statistics.

Let us introduce the concept of braiding. Given a number n of these anyons, how can webest represent the eects of arbitrary exchanging of particles? We may represent the evolutionof the system as a world-line, where the position of the particle is followed and forms a line in a2+1 space. Exchanges of particles appear then like braiding of the several threads and can berepresented by permutation operators σj , that corresponds to the counterclockwise exchangeof particles j and j + 1. These operators form the Braid group and the algebra they follow isdened by

σjσk = σjσk,

for |j − k| ≥ 2, which states that exchanging two disjoint pairs commutes, and

σjσj+1σj = σj+1σjσj+1,

known as the Yang-Baxter relation.A one dimensional representation of this group corresponds to σj = eiθj . The Yang-Baxter

relation implies θj = θk = θ, which makes sense for indistinguishable particles.

Exercise 20Schein: Show graphically that the Yang-Baxter relation holds and justify that all exchangephases of the one-dimensional representation of the braid group are equal.

The more interesting non-abelian representations of this group will provide us with thepossibility to perform quantum computation.

6.4.3 Non-Abelian topological transformations

Let a non-abelian nite group G the group of values that ux can take and charges unitaryirreducible representations of this group. Let R a particular irreducible representation of G ofdimension |R| with an arbitrary orthonormal basis

|R, i〉 , i = 1, 2, . . . , |R| .

Page 55: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

6.4. TOPOLOGICAL QUANTUM COMPUTATION 55

When going around a ux a ∈ G, the charge transforms by means of a unitary matrix DR (a)in the form

|R, j〉 →|R|∑

i=1

|R, i〉DRij (a) .

Let us assume we have two uxes, each corresponding to an element in G. The transformationrule for ux exchange follows

|a, b〉 →∣∣b, b−1ab

⟩,

which one can be convinced about with the help of a test charge winding around each of thetwo uxes and the deformation the winding path suers due to the exchange of uxes.

Knowing how the braiding operator acts on uxes allows one to develop the whole algebraof a specic topological model. Specically, it is possible to associate charge to certain uxstates, which in turn is associated to fusion or annihilation rules.

The general scheme of a topological quantum computation involves the generation of uxpairs, their braiding as a means to eectively implement quantum gates and measurement ofthe outcome by fusioning the outcoming uxes.

6.4.4 Quantum Hall eect

The classical Hall eect consists in the build up of a potential across the direction of a currentin the presence of a strong magnetic eld. Its quantized form involves the free Hamiltonian

H =π2

2m∗ =(p + eA)2

2m∗,

wherem∗ is the eective mass of the electron in the conductor. For a two-dimensional geometryand a vector eld A = −Bxy (Landau gauge)

H =p2x

2m∗+

(py − eBx)2

2m∗.

Whereas the y part of the wavefunction (along the conduction axis) may be described withplane waves, the x part takes the form of a harmonic well centered at a point proportionalto the y momentum. These harmonic wells produce quantized levels, which are known as theLandau levels. Each eigenstate in the conduction direction y has an associated harmonic well.Assuming periodic boundary conditions for the py eigenstates and a length L of the conductor,the distance between two harmonic wells is

2π~LeB

and the associated ux2π~LeB

LB =h

e,

ie, a ux quantum. Each harmonic well is separated by a ux quantum, so that the number ofux quanta is associated to the number of orthogonal states in the sample. The lling factorν is the quotient between the carrier density and the number of ux quanta, or how many

Page 56: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

56 CHAPTER 6. ALTERNATIVE FORMULATIONS OF QUANTUM COMPUTATION

electrons there are per state. The phenomenon of edge states being the ones carrying currentis present in this system, and corresponds to integer lling factors.

For fractional lling factors, it is useful to use the symmetric gauge instead A = −Bxy +iByx. A ground state ansatz for a lling function is the Laughlin wavefunction, which makessure that electrons are as far apart as possible. This can be interpreted as associating electronsto ux quanta in such a way that composite particles with fractional charge arise.

Page 57: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

7. Environmental eects

The performance of quantum computers is strongly perturbed by the eects of the environ-ment. Let us formalize the study of these eects with the help of the theory of open quantumsystems.

7.1 Dynamical map

The reduced description of a system in contact with an environment is a useful tool for thestudy of detrimental eects on coherent operations. Its central object is the reduced densitymatrix of the system, and its evolution is dictated by the dynamical map, an object analogousto the evolution operator for wavefunctions. For separable initial conditions between thesystem and the environment, it is the map E between the initial state of the system ρ (0) andthe nal one ρ (t)

ρ (t) = Eρ (0) .

It inherits properties from the density matrices: it is a trace-preserving map and it is completelypositive. Complete positivity is a stronger property than positivity, and it requires that thesame map applied to any extension of the system is also positive.

Exercise 21Schein: show that the transpose map is not completely positive

The generation of the dynamical from a microscopic description of the environment is nottrivial, although it can be done for simple cases. Let us look at the example of the dephasingchannel, where the energy splitting between the two levels of a qubit is perturbed by couplingto an environment of harmonic oscillators. The Hamiltonian for this model has the form

H = HS +HSB +HB = σz

(ω +

k

gk

(ak + a†k

))+∑

k

νka†kak

and compute the dynamical map elements

Eij = TrσiUσj ⊗ ρBU †

,

where ρB = e−βHB/Z and σi ∈ |e〉 〈e| , |g〉 〈e| , |e〉 〈g| , |g〉 〈g| a basis in the system's operatorspace. The computation requires the evolution operator

U = e−it(ωσz+σzX+HB),

57

Page 58: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

58 CHAPTER 7. ENVIRONMENTAL EFFECTS

withX =∑

k gk

(ak + a†k

). It is clear from the form that U can only have diagonal elements in

the |e〉 , |g〉 basis, which propagates to a form of Eij in the σi basis with only 4 non-vanishingentries.

Let's dene the displacement operator as

D (αk) = exp

(∑

k

(αkak − α†ka

†k

)),

and use the shorthand notation for the polaron transformation

DP± = exp

(±σz

k

gkωk

(ak − a†k

)),

and

D± = exp

(±∑

k

gkωk

(ak − a†k

)),

such thatU = e−itωσzDP+e−itHBDP−,

up to a global phase that is not relevant for the dynamical map. The four non-vanishingelements of the dynamical map are

E11 = 1,

E23 = e−2itωTrD+e−itHBD−ρBD

−eitHBD+,

E32 = e2itωTrD−e−itHBD+ρBD

+eitHBD−,

E44 = 1.

As an example, let us compute one of the non-trivial explicitly. For a scalar dependence ofthe displacement operator

D (αk) = exp

(∑

k

(αkak − α∗ka†k

)),

it has the properties

D (αk)D (βk) = D (αk + βk) exp

−i∑

k

= [αkβ∗k]

,

and

〈D (αk)〉 = exp

−1

2

k

|αk|2 coth

[βωk

2

].

Page 59: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

7.2. NAKAJIMA-ZWANZIG EQUATION 59

Exercise 22Schein: Derive the properties of the displacement operator

The element looks

E23 = e−2itωTr

D

(− gkωk

)D

(2gkωke−iωkt

)D

(− gkωk

)ρB

,

= e−2itω exp

−4∑

k

g2k

ω2k

(1− cosωkt) coth

[βωk

2

]

so that

E32 = e2itω exp

−4∑

k

g2k

ω2k

(1− cosωkt) coth

[βωk

2

].

Let us dene the correlation function C2 (t) =∑

kg2kω2k

cosωkt coth[βωk

2

]so that

E32 = e2itω exp −4 [C2 (0)− C2 (t)] .

In general, the norm of E32 approaches a steady state value close to zero determined byC2 (0). Correlation functions that take negative values will see a norm that does not decaymonotonically to the steady state but rather take a low value that then slowly increases untilthe steady state.

7.2 Nakajima-Zwanzig equation

It is not always possible to derive an analytical form of the dynamical map. In general, itfollows a formal equation that can be derived with help of projection operators on the relevantHilbert subspace P and its complement Q = 1 +P. Let us start with a Schrödinger equationfor the system and the bath

d

dt|Ψ〉 = −i~H |Ψ〉

and its generalization for the density matrix σ = |Ψ〉 〈Ψ|

d

dtσ =

(d

dt|Ψ〉)〈Ψ|+ |Ψ〉

(d

dt〈Ψ|)

= − i~H |Ψ〉 〈Ψ|+ i

~|Ψ〉 〈Ψ|H = − i

~[H,σ] ,

which is known as the Liouville equation. In Liouville space it takes the form

d

dtσ = Lσ,

Page 60: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

60 CHAPTER 7. ENVIRONMENTAL EFFECTS

one has

d

dtPσ = PL (P +Q)σ,

d

dtQσ = QL (P +Q)σ.

Formal integration of the second equation

Qσ (t) = exp (QLt)Qσ (0) +

ˆ t

0exp

[QL

(t− t′

)]QLPσ

(t′)dt′

can be used to derive an integro-dierential equation for Pσ (t)

d

dtPσ = PLPσ + PLQ exp (QLt)Qσ (0) +

ˆ t

0PLQ exp

[QL

(t− t′

)]QLPσ

(t′)dt′,

In order to avoid the convolution term, we may connect the state of the system at two dierenttimes with help of the unitary inverse evolution exp [−L (t− t′)]

Pσ(t′)

= P exp[−L

(t− t′

)](P +Q)σ (t) .

Now we may dene

Σ (t) =

ˆ t

0exp

[QL

(t− t′

)]QLP exp

[−L

(t− t′

)],

and therefore[1 + Σ (t)]Qσ (t) = exp (QLt)Qσ (0) + Σ (t)Pσ (t) ,

so that introduction in the dierential equation for Pσ yields

d

dtPσ = PLPσ + [1 + Σ (t)]−1 [exp (QLt)Qσ (0) + Σ (t)Pσ (t)] ,

One usually takes the projector Pσ(t) = TrB [σ(t)]⊗ρB,eq, although the derivations so farwere fully general.

7.3 Master equation and Born-Markov approximation

Let us derive in a few steps a useful form of the master equation. Although it can be seen asa consequence of the Nakajima-Zwanzig equation, let us illustrate here another pathway forits derivation that is commonly used. Given the splitting of the Hamiltonian

H = HS +HB + V,

in system, bath (environment) and interaction terms, we may dene the interaction picturewith respect to the free part of the Hamiltonian HS +HB, and derive its associated Liouvilleequation

d

dtσI = − i

~[VI(t), σI ] ,

Page 61: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

7.3. MASTER EQUATION AND BORN-MARKOV APPROXIMATION 61

formal integration provides

σI(t) = σI(0)− i

~

ˆ t

0dt′[VI(t

′), σI(t′)].

We are interested in the system dynamics, so we dene the partial trace with respect to thebath degrees of freedom.

ρ = TrB[σ],

Interaction picture does not modify the elements within the trace, so that a second iterationof the formal solution provides

ρI(t) = ρI(0)− i

~

ˆ t

0dt′TrB

[VI(t

′), σI(0)]−(i

~

)2 ˆ t

0

ˆ t′

0dt′dt′′TrB

[VI(t

′),[VI(t

′′), σI(t′′)]].

So far, no approximation was used, but this is as intractable as the Nakajima-Zwanzig equation.It is necessary to apply the Born Markov approximations to obtain a manageable equation.

Assuming a small interaction strength V , it represents a small correction to the free evo-lution σf (t) = ρf (t) ⊗ ξf (t). For this reason, the bath is not aected by the evolution andremains in its initial state ξ = ξ (0), which is usually assumed to be the Boltzmann state andtherefore commutes withHB. To rst order, the correction contains terms of the form 〈Bξ (0)〉,which vanishes for harmonic baths with displacing interactions. The second correction is

d

dtρI(t) = −

(i

~

)2 ˆ t

0dt′TrB

[VI(t),

[VI(t

′), ρI(t′)⊗ ξ (0)

]],

and constitutes the Born approximation.The second approximation (Markov) has to do with the correlation time of the bath. The

most general form of the interaction Hamiltonian is V = ~∑

k SkBk, so that the partial traceis proportional to the correlation functions

Ckn(t, t′) = Tr[Bk,I(t)Bn,I(t

′)ξ],

which only depend on t−t′ because of the cyclic property of the trace and because ξ commuteswith HB. Therefore

d

dtρI(t) =

ˆ ∞0

dt′∑

k,n

Ckn(t− t′)

[Sk,I(t), Sn,I(t

′)ρI(t)]

+ Cnk(t′ − t)

[ρI(t)Sn,I(t

′), Sk,I(t)],

where the Markov approximation assumes Ckn(t) ' 0 for t < 0 and ρI(t′) ' ρI(t) due to thefast decay of Ckn(t). Therefore

d

dtρ = − i

~[HS , ρ] +

k

[Sk, Dkρ] + [ρEk, Sk] ,

where

Dk ≡ˆ ∞

0dτ∑

n

Ckn(τ)Sn,I(−τ),

Ek ≡ˆ ∞

0dτ∑

n

Cnk(−τ)Sn,I(−τ).

Page 62: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

62 CHAPTER 7. ENVIRONMENTAL EFFECTS

The exact form of Dk and Ek depends now exclusively on the microscopic details of theHamiltonian.

In the spin-boson model the bath takes the form of an innite collection of harmonicoscillators. Each one is associated to an annihilation operator ak, where k identies the mode.The system contains two levels and the interaction takes the form

VnRWA = ~(S + S†)∑

k

γk(ak + a†k),

with σx = S + S†. The interaction picture introduces rotating terms which can be neglectedin the appropriate limit (RWA), so that the interaction becomes

VRWA = ~S∑

k

γka†k + ~S†

k

γkak.

This particular interaction involves only two terms so that only four correlation functionsappear. Thus, taking ωk as the frequency of each mode, ρ(ω) ≡∑k γ

2kδ(ω − ωk) the spectral

density and nB(ωk) ≡ TrB[a†kakξ] equilibrium occupation of each mode,

C12(t) = TrB

k,k′

γkγk′ake−iωkta†k′ξ

=

k

γ2ke−iωkt(1+nB(ωk)) =

ˆ ∞0

dωρ(ω)e−iωt(1+nB(ω)),

and, analogously,

C21(t) =

ˆ ∞0

dωρ(ω)eiωtnB(ω).

The remaining correlations vanish C11(t) = C22(t) = 0.Now it is possible to compute

D1 =

ˆ ∞0

dτC12(τ)S2,I(−τ) =

ˆ ∞0

dτC12(τ)Seiντ = C12(−iν)S,

where ~ν is the energetic dierence between two levels in the system and f is the Laplacetransform of f . Similarly

D2 = C21(iν)S†

E1 = D†2,

E2 = D†1.

Distribution theory allows for the solution of the Laplace transform of the correlationfunctions, which can be split into an imaginary and a real parts. Imaginary part contributesto the coherent dynamics of the system and turns into a frequency shift of the system (Lambshift). The real part gives rise to dissipative terms of Lindblad form. In particular

C12(−iν) =

ˆ ∞0

dωρ(ω)(1 + nB(ω))

[πδ(ν − ω) + iP

(1

ν − ω

)],

Page 63: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

7.4. DECOHERENCE FREE SUBSPACES 63

so that

<C12(−iν) = πρ(ν)(1 + nB(ν)) ≡ γ

2(1 + nB),

=C12(−iν) = P

ˆ ∞0

dωρ(ω)1 + nB(ω)

ν − ω ≡ ∆1.

Analogously

<C21(iν) = πρ(ν)nB(ν) ≡ γ

2nB,

=C21(iν) = −Pˆ ∞

0dωρ(ω)

nB(ω)

ν − ω ≡ ∆2.

After redenition of the system frequency due to the Lamb shifts (ν ≡ ν + ∆1 + ∆2), thenal form of the equation is

d

dtρ = −i

[νS†S, ρ

]+γ

2(1 + nB)

(2SρS† − S†Sρ− ρS†S

)+γ

2nB

(2S†ρS − SS†ρ− ρSS†

)

(7.1)

= −i[νS†S, ρ

]+γ

2(1 + nB)D [S, ρ] +

γ

2nBD

[S†, ρ

].

In this master equation we can observe a coherent part, describing the dynamics of the systemas in the Liouville equation. Additionally, two dissipative terms have appeared. One of themrepresents heating of the system, whereas the other one represents cooling.

7.4 Decoherence free subspaces

Having the basic tools to model environmental eects, it is now the turn to come up withstrategies to ght them. There is a large class of methods and concepts that attempt totackle this issue, here we will present a few of them. First of all, the concept of decoherence-free subspaces constitutes a passive mechanism to avoid the action of the environment. Theunderlying idea is that, given a specic form of the system-environment coupling, very oftenthere exist some degrees of freedom of the system that are not aected by it.1

Let us consider a system-bath interaction of the form

HSB =∑

i,k

[gzi,kσ

zi ⊗

(bk + b†k

)+ g+

i,kσ+i ⊗ bk + g−i,kσ

−i ⊗ b

†k

],

which represents a collection of qubits undergoing dephasing and energy exchange with anenvironment of harmonic oscillators. Assuming all spins couple equally to the baths (gαi,k = gαk ),one may simplify the appearance of the interaction with

HSB =∑

α∈+,−,z

Sα ⊗Bα,

1Partly based on Lidar, DA, arXiv:1208.5791v2 (2012).

Page 64: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

64 CHAPTER 7. ENVIRONMENTAL EFFECTS

where Sα =∑

i σαi and Bz =

∑k g

zk

(bk + b†k

), B+ =

∑k g

+k bk and B− =

∑k g−k b†k. It can

be shown that the subspace spanned by the simultaneous eigenstates of all the Sα evolvesfollowing unitary dynamics. For this specic example, it corresponds to the vanishing total

spin subspace∣∣∣~S∣∣∣2

= 0, since that ensures that all operators Sα have vanishing eigenvalues.The size dN of this subspace increases with the number of spins in the form

dN =N !

(N/2)! (N/2 + 1)!

for N even. In particular, for 4 qubits, dN = 2 and the decoherence free subspace is spannedby the basis

|0〉 =1

2(|0101〉 − |0110〉 − |1001〉+ |1010〉) ,

|1〉 =1√3

(|0011〉+ |1100〉 − 1

2|1001〉 − 1

2|0110〉 − 1

2|1010〉 − 1

2|0101〉

).

Qubits encoded in this two-dimensional space are therefore protected from the environmentaleects dened above. It is now necessary to dene manners to operate on them. Let usconsider Eij the operation that exchanges the values of qubits i and j. It can be easily seenthat

−E12 |0〉 = |0〉 ,−E12 |1〉 = − |1〉 ,

so that −E12 can be seen as a Z operator on this subspace. Similarly, 1√3

(E23 − E13) acts asan X operator. This is enough to generate all single qubit operations to arbitrary accuracy.

In general, given a specic noise model or interaction with the environment, one would hopeto nd decoherence free subspaces where quantum operations are protected from environmentaleects. This is nevertheless not always possible, and a generalization of the idea reduces therestrictions to nd protected spaces: noiseless subsystems.

In this case, the Hilbert space is divided in subspaces which have the tensor product formof two subsystems, one of which is free from environmental eect. Given a general system-environment Hamiltonian HSB =

∑α Sα ⊗ Bα, the †-closed algebra generated by all system

operators A = Sα including the identity has the form

A '⊕

J

InJ ⊗MdJ (C) ,

so that the Hilbert space of the system can be decomposed in

HS =⊕

J

CnJ ⊗ CdJ ,

where nJ and dJ mark the dimensionality of the subsystems and CnJ is not aected by HSB.The decoherence free subspace arises when dJ = 1. That this constitutes a generalization canbe seen in the fact that this allows to encode a qubit in N = 3 physical qubits in the casestudied above for decoherence. Decoherence free subspaces would not have allowed it, sincethere is no S = 0 subspace.

Page 65: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

7.5. DYNAMICAL DECOUPLING 65

7.5 Dynamical decoupling

What we have explored so far is a passive scheme that looks for symmetries in the system-environment Hamiltonian to discover subspaces that are not aected by it. An alternative isto actively generate these symmetries by acting on the system with an external driving.

Let us rst consider the example of pure dephasing

HSB = σzBz

and the possibility to drive the system externally

HS = λ (t)σx.

In the impulsive limit where the system is driven very strongly with intensity λ for a veryshort period of time δ → 0 so that λδ = π

2 , it is possible to represent the evolution due tothe pulse as the eect of the system Hamiltonian alone. A sequence of pulses with a timeinterspacing τ can be represented as

XfτXfτ . . .

where fτ = e−iτHSB . Due to the rule XZX = −Z, the sequence above is equal to unity.Therefore, it is possible to stroboscopically do away with the eect of the environment.

This initial idea has been systematized for general coupling Hamiltonians.

Page 66: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

66 CHAPTER 7. ENVIRONMENTAL EFFECTS

Page 67: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

A. Summary of notation and

important identities

Pauli matrices

X ≡ σx ≡(

0 11 0

),

Y ≡ σy ≡(

0 −ii 0

),

Z ≡ σz ≡(

1 00 −1

).

Bell states

|β00〉 ≡1√2

(|00〉+ |11〉) ,

|β01〉 ≡1√2

(|01〉+ |10〉) ,

|β10〉 ≡1√2

(|00〉 − |11〉) ,

|β11〉 ≡1√2

(|01〉 − |10〉) .

Hadamard Gate

H = 1√2

(1 11 −1

)

π/8 Gate

T =

(1 0

0 eiπ/4

)

Bloch sphere: any two-level pure state may be expressed as a point on the surface of asphere described by the spherical coordinates θ and φ

|Ψ〉 = cosθ

2|0〉+ eiφ sin

θ

2|1〉 ,

67

Page 68: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

68 APPENDIX A. SUMMARY OF NOTATION AND IMPORTANT IDENTITIES

where |0〉 and |1〉 are the north and south poles of the sphere respectively.Any unitary operation on a two level system can be expressed as

Rn (θ) = einσθ2 = cos

θ

2+ inσ sin

θ

2

where n is a unit vector and σ = (σx, σy, σz).

Given two unit vectors n and m, there always exists a decomposition

U = eiαRn (β)Rm (γ)Rn (δ) .

Page 69: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

B. Solutions to the exercises

Exercise 1 A general state |ζ〉 may be written in terms of the computational basis as|ζ〉 = aζ |0〉+ bζ |1〉. Therefore

|ζ〉A |ξ〉B = (aζ |0〉A + bζ |1〉A) (aξ |0〉B + bξ |1〉B)

= aζaξ |0〉A |0〉B + aζbξ |0〉A |1〉B + bζaξ |1〉A |0〉B + bζbξ |1〉A |1〉B .

In order for |ζ〉A |ξ〉B = |Φ〉 = 1√2

(|0〉A |0〉B + |1〉A |1〉B) it must happen that

aζaξ =1√2, aζbξ= 0,

bζbξ =1√2, bζaξ= 0.

This system of equations cannot hold simultaneously and, therefore, |Φ〉 cannot be expressedin terms of a separable state.

Exercise 2 One just needs to develop the equations (let us drop the party labeling, sincethe order makes it implicit)

|ψ〉 |Φ〉 =1√2

(α |0〉+ β |1〉) (|0〉 |0〉+ |1〉 |1〉)

=2

2√

2(α |0〉 |0〉 |0〉+ α |0〉 |1〉 |1〉+ β |1〉 |0〉 |0〉+ β |1〉 |1〉 |1〉)

+1

2√

2(α |1〉 |1〉 |0〉+ α |1〉 |0〉 |1〉+ β |0〉 |1〉 |0〉+ β |0〉 |0〉 |1〉)

− 1

2√

2(α |1〉 |1〉 |0〉+ α |1〉 |0〉 |1〉+ β |0〉 |1〉 |0〉+ β |0〉 |0〉 |1〉)

69

Page 70: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

70 APPENDIX B. SOLUTIONS TO THE EXERCISES

=1

2√

2(|00〉+ |11〉) (α |0〉+ β |1〉)

+1

2√

2(|00〉 − |11〉) (α |0〉 − β |1〉)

+1

2√

2(|01〉+ |10〉) (α |1〉+ β |0〉)

+1

2√

2(|01〉 − |10〉) (α |1〉 − β |0〉)

=1

2

ab

|βab〉 |ψab〉 .

Alternatively, we may invert the denition of the Bell basis

|00〉 =1√2

(|β00〉+ |β10〉) ,

|01〉 =1√2

(|β01〉+ |β11〉) ,

|10〉 =1√2

(|β01〉 − |β11〉) ,

|11〉 =1√2

(|β00〉 − |β10〉) ;

and use it on the expansion

|ψ〉 |Φ〉 =1√2

(α |00〉 |0〉+ α |01〉 |1〉+ β |10〉 |0〉+ β |11〉 |1〉)

=1

2[α (|β00〉+ |β10〉) |0〉+ α (|β01〉+ |β11〉) |1〉

+β (|β01〉 − |β11〉) |0〉+ β (|β00〉 − |β10〉) |1〉]

=1

2

ab

|βab〉 |ψab〉 .

Exercise 3 One can easily show that |ψ00〉 , |ψ11〉 and |ψ01〉 , |ψ10〉 each constitute anorthonormal basis of the two-dimensional Hilbert space. A balanced mixture of an orthonormalbasis (a mixture of all elements of the basis with the same probability) yields in generalthe maximally mixed state 1

dId, with d the dimensionality of the Hilbert space. We canregard our case as the balanced mixture of two maximally mixed states, one coming from eachorthonormal basis. The result is, therefore, the maximally mixed state.

Page 71: Physics of Quantum Computation - itp.tu-berlin.de · Physics of Quantum Computation ... B Solutions to the exercises 69. ... is that quantum information can be transferred without

71

As for the partial trace of a Bell state, explicit computation yields

TrA |βab〉 〈βab| =1

2TrA

(|0a〉+ (−1)b |1a〉

)(〈0a|+ (−1)b 〈1a|

)

=1

2〈0|A

(|0a〉+ (−1)b |1a〉

)(〈0a|+ (−1)b 〈1a|

)|0〉A

+1

2〈1|A

(|0a〉+ (−1)b |1a〉

)(〈0a|+ (−1)b 〈1a|

)|1〉A

=1

2(|a〉 〈a|+ |a〉 〈a|) =

1

2Id.

Exercise 5 Let us carefully label the states and follow the same procedure as in exercise 2

|β00〉AC1 |β00〉C2B =1

2(|0〉A |0〉C1 + |1〉A |1〉C1) (|0〉C2 |0〉B + |1〉C2 |1〉B)

=2

4(|0〉A |0〉B |0〉C1 |0〉C2 + |1〉A |0〉B |1〉C1 |0〉C2 + |0〉A |1〉B |0〉C1 |1〉C2 + |1〉A |1〉B |1〉C1 |1〉C2)

+1

4(|0〉A |0〉B |1〉C1 |1〉C2 + |1〉A |0〉B |0〉C1 |1〉C2 + |0〉A |1〉B |1〉C1 |0〉C2 + |1〉A |1〉B |0〉C1 |0〉C2)

− 1

4(|0〉A |0〉B |1〉C1 |1〉C2 + |1〉A |0〉B |0〉C1 |1〉C2 + |0〉A |1〉B |1〉C1 |0〉C2 + |1〉A |1〉B |0〉C1 |0〉C2)

=1

4(|00〉AB + |11〉AB) (|00〉C1C2 + |11〉C1C2)

+1

4(|00〉AB − |11〉AB) (|00〉C1C2 − |11〉C1C2)

+1

4(|01〉AB + |10〉AB) (|01〉C1C2 + |10〉C1C2)

+1

4(|01〉AB − |10〉AB) (|01〉C1C2 − |10〉C1C2)

=1

2

ab

|βab〉AB |βab〉C1C2 .

As in the case of teleportation, a measurement by Carol on her qubit pair on the Bell basiswill collapse Alice's and Bob's qubits in a Bell state. After Carol's broadcasting of the results,Alice and Bob will know exactly which Bell state they share.