The words you are searching are inside this book. To get more targeted content, please make full-text search by clicking here.

IAS-ICTP School on Quantum Information Processing, Singapore, January 18-29, 2016 FQH-Based Topological Quantum Computer: Materials, Devices & Algorithms

Discover the best professional documents and content resources in AnyFlip Document Base.
Search
Published by , 2017-05-22 06:40:04

FQH-Based Topological Quantum Computer: Materials, Devices ...

IAS-ICTP School on Quantum Information Processing, Singapore, January 18-29, 2016 FQH-Based Topological Quantum Computer: Materials, Devices & Algorithms

Two-Qub

● Single-qubit gate: 3 free parameters

● Two-qubit gate: too many paramete

∣ 〉
∣ 〉

bit Gates

s [SU(2)]

ers 1?

∣ 〉 leakage
∣ ' 〉
1?

Decomposing Tw

● Idea proposed by Bonesteel et al. (20
● [Xu & Wan, 08] Reduces leakage er

● Inject the control pair into the targ

● Perform a single-qubit rotation U
● Extract the control pair use the in

D U

0
0

Two-Qubit Gates

005) – leakage error ~10-3
rror significantly, ~10-9

get qubit – exchange braid D

– implemented by a weave
nverse of the inverse of the exchange braid D-1

D-1 Generic
controlled-gates
with leakage error
~10-9.

Leakag

Create a pair of anyons out of
vacuum (so fuse to 0).

Note they could also be stray
anyons thermally excited.

ge Error

Computing basis
Non-computing basis

Leakage-Err

W

ror Analysis

What kind of braids (of a , a , a ) leave
456
the left qubit in state 0, after

exchanging a and a ?
45

101 = 1
10 0
    0

    ei 01 = ei 1
0 ei  0 0

Phase

• Let us look for diagonal matrices, ra
means we introduce a phase error

• For small b, g is irrelavent. Targeting

∣1∣=∣2∣= 1−

• But how do we use it? What about th

Gates

ather than the identity matrix; this
r.

g less parameter – higher accuracy!

−r2=1.56×10−10

he phase?

Exchang

• Apply the diagonal gate (with the irr

 ∣1∣= ∣2∣2∣3∣2=∣4∣= ∣5∣2∣6

ge Braid

relevant phase) to the leakage model

Low leakage! ∣1∣=1.56×10−10

6∣2=∣1∣= 1−r2≈1.56×10−10

5-Dimensional

• One calculate the braiding matrix in
computing bases.

Representation

an enlarged space, including non-

Improvement in the Bru


≈0.76 e−L/4.3

Leakage error reduction by se

rute-Force Performance

≈1.6 e−L/7.3

Search for one point
on the bloch sphere

Search for any point
on a circle on the
Bloch sphere

everal orders of magnitude

Single-Qubit Con

● Single-qubit construction hides an S
arbitrary axis l by an angle q on a B
rotating l to another direction l', then
finally rotating l' back to l.

|ψ⟩ G1 G2

● Implementation: Instead of search f
G and G , such that G ≈ G1 G 2 G 1+
12

onstruction Again

SU(2) symmetry. A rotation around an
Bloch sphere can be carried out by first
n rotating around l' by an angle q, and

U(1) symmetry

G1+ U |ψ⟩

SU (2)/U (1) ∼ S 2

for a gate G, we search a pair of gates

Geometric Redundancy

● We first rotate the axis of rotation,
finally rotate the axis back – physi
geometric redundancy in search, d

– We can search G and G separately
12

– Both searches are achievable in lowe

– i.e., we can fix

G up to a U(1) rotation, and
1

G up to SU(2) / U(1) ~ S2
2

● Outcome: Generic single-qubit gat
braids of ~300 exchanges (length)

– Hormozi et al. (07): 4 ×10-5 for a brai
algorithm

y for Single-qubit Gates

, then rotate around the axis, and
ically, this means that we have a
due to the SU(2) rotation symmetry.

er (than 3) dimensions

tes with error (distance) ~10-10 with
) – Xu & XW (2009).

id of length 220 with Solovay-Kitaev

#5: Messages on Topol

● Three or four Fibonacci anyons ca
● Quantum gates can be achieved by

moving one or one pair of anyons
gates.
● Braids for quantum gates can be co
elementary exchanges and their in
● The construction of two-qubit gate
qubit gates. But at least one high-p
eliminate leakage errors.
● In the brute-force search for braids
explored to boost the efficiency.

logical Quantum Gates

an encode one qubit of information.
y braiding anyons; in particular,
is enough to generate all quantum

ompiled into sequences of two
nverses.
es can be mapped to that of single-
precision phase gate is needed to

s geometrical redundancy can be

Renormalization G

1. Start from a collection of braids of
2. Find the cluster of braids that appr
3. Moving on to a collection of longe

the residual error
4. Repeat 2-3, and stop when the des

Group Like Scheme

f certain length
roximates the target best
er braids (finer in distance) matching

sired error scale is reached

Icosahedr

● The following Cartesian coordinat
the vertices of an icosahedron with
edge-length 2, centered at the orig

0,±1,± ,±1,± ,0 ,± , 0,±

● The icosahedral group is the larges
subgroup of SU(2). It is composed
60 rotations around the axes of sym
of the icosahedron.

● There are 6 axes of the 5th order, 1
I 60={ g 0, g1, g 2, ⋯

● We approximate all group element

ral Group

tes define
h
gin:

±1

st finite
d by the
mmetry

= 1 5

2

10 of the 3rd, and 15 of the 2nd.

⋯, g59 } g0=e
ts by braids of various length.

Braid Representatio

● L = 8, e = 0.236068

● L = 24, e = 0.0344419

● L = 44, e = 0.00191937

● L = 68, e = 0.0000304193

The braid representations can be c
Hence no additional cost to the sea

ons for the Identity e

g̃0 ( 8 )= σ−2 2 σ 2 σ−2 2 σ 12= g e i Δ (8 )
1 0

0

Δ (8) : a Hermitian matrix
0 characterizing error

computed and stored once for all.
arch later.

Connection to Rand

● Pseudogroup of braids (for small D

gi g j=g k , g̃ i g̃ j= gi ei Δ i g j ei Δ j≈

● To approximate gi g j⋯g n+ 1=e

g̃i g̃ j ⋯ gñ+ 1= gi ei Δi g j ei Δ j ⋯ g n+ 1 ei Δ n+ 1≡ei H n

H n= gi Δ i g−i 1+ gi g j Δ j g−j 1 g−i 1+ ⋯
+ gi g j ⋯ g n Δ n g−n 1⋯ g−j 1 g−i 1

+ Δ n+ 1+ O (Δ 2)

● We conjecture H is a random mat
n
in the Wigner-Dyson Gaussian

Unitary Ensemble (s for eigenvalu

( )P(s)= 32 2
π2 s
0 s −(4 / π)(s / s0)2
s e0

A single parameter s controls the flow of
0

dom Matrix Theory

Di )

i ( g−j 1 Δi g j + Δ j)k i Δk
k
≈ g e ≠ g̃ = g ek

n

trix
ue/error)

n = 3 is large enough
f the (distribution of) error.

Understanding Erro

● First approximate by gluing 3 shor

● Reduce the error (e1) by gluing
4 (= n + 1) longer (L = 24)
segments (1 out of 603 ).

● The resulting error (e2) follows
the Wigner-Dyson distribution.

● Average error reduction:

<e > / <e > ~ f = 60n/ 3
12
√ n+ 1

Initial approximation e1 Correction: a

or Renormalization

rt (L = 8) segments (1 out of 603 ).

distribution of e
2

approximation to e
2

Scaling A

● The number of iteration for a
given final error ≪1

● Choose suitable braid segment
length to match the residual error

● Each iteration increases the
length by 4 (= n + 1) segments

● Length of braid after q iterations

● Time

Analysis

… ln(f) ln(f) ln(error)

ln(e) ~ 0

Comparison with

● Compiling with the RG-like algori
● Brute-force search
● Solovay-Kitaev

Thanks to randomness in the building bloc

Other Algorithms

ithm tpIfIsotnoetIsIpfrotnoecetrtrreacteroctearelakocineaanlskEeinacdnisEesaoc6hdisoaro6hln8beaornln85beasnion5t0sasniofrt0asaafrtp37avhartp37rvyehraGxoryeranGxocgaHr1ncegagaHa10eszgatea0−esszte4−oes.4o.r r

U i1= Ai Bi A−i 1 B−i 1 U i

cks, we save time in search exponentially.

#6: Importance

● In a classical computer, one can bu
numbers using OR and NOT gates

● In a quantum computer, the set of
continuum, and it’s not necessarily
simulate another exactly. Instead, s
necessary.

● We explore an algorithm that guar
any quantum gate, to a very good a

– From a practical point of view, this is
algorithms (like Shor’s) into a form t

– From a more mathematical point of v
how quickly the group SU(d) is “fille

● This is also the importance of the t
Kitaev algorithm.

e of Algorithm

uild up a circuit, e.g., to add two
s.
possible quantum gates forms a
y possible to use one gate set to
some approximation may be

rantees the efficient construction of
approximation.

s important in compiling quantum
that can be implemented fault-tolerantly.
view, we give a general statement about
ed in” by a universal set of gates.

textbook example – the Solovay-

I Ching o

● I Ching (~1100 BC): Ancient peop
record, while people during later p

● 《易 · 系辞》载:“上古结绳而

纠缠 ↔ entanglem

of Knots

ple tied knots on cords to keep
periods replaced with writing
而治,后世圣人易之以书契”

ment

Stability in Chin

● Decimal system in China (over 30

一二三四五六七八九





nese Characters

000 years ago) Chinese characters

十 encode information,
in some sense, in

the topology of the
strokes.

Topological Quan

ntum Computation

Next: compute with Fibonacci anyons


Click to View FlipBook Version