scholarly journals Improved upper bounds on the stabilizer rank of magic states

Quantum ◽  
2021 ◽  
Vol 5 ◽  
pp. 606
Author(s):  
Hammam Qassim ◽  
Hakop Pashayan ◽  
David Gosset

In this work we improve the runtime of recent classical algorithms for strong simulation of quantum circuits composed of Clifford and T gates. The improvement is obtained by establishing a new upper bound on the stabilizer rank of m copies of the magic state |T⟩=2−1(|0⟩+eiπ/4|1⟩) in the limit of large m. In particular, we show that |T⟩⊗m can be exactly expressed as a superposition of at most O(2αm) stabilizer states, where α≤0.3963, improving on the best previously known bound α≤0.463. This furnishes, via known techniques, a classical algorithm which approximates output probabilities of an n-qubit Clifford + T circuit U with m uses of the T gate to within a given inverse polynomial relative error using a runtime poly(n,m)2αm. We also provide improved upper bounds on the stabilizer rank of symmetric product states |ψ⟩⊗m more generally; as a consequence we obtain a strong simulation algorithm for circuits consisting of Clifford gates and m instances of any (fixed) single-qubit Z-rotation gate with runtime poly(n,m)2m/2. We suggest a method to further improve the upper bounds by constructing linear codes with certain properties.

2009 ◽  
Vol 9 (11&12) ◽  
pp. 1030-1052
Author(s):  
B.W. Reichardt

Quantum universality can be achieved using classically controlled stabilizer operations and repeated preparation of certain ancilla states. Which ancilla states suffice for universality? This ``magic states distillation" question is closely related to quantum fault tolerance. Lower bounds on the noise tolerable on the ancilla help give lower bounds on the tolerable noise rate threshold for fault-tolerant computation. Upper bounds show the limits of threshold upper-bound arguments based on the Gottesman-Knill theorem. We extend the range of single-qubit mixed states that are known to give universality, by using a simple parity-checking operation. For applications to proving threshold lower bounds, certain practical stability characteristics are often required, and we also show a stable distillation procedure.}{No distillation upper bounds are known beyond those given by the Gottesman-Knill theorem. One might ask whether distillation upper bounds reduce to upper bounds for single-qubit ancilla states. For multi-qubit pure states and previously considered two-qubit ancilla states, the answer is yes. However, we exhibit two-qubit mixed states that are not mixtures of stabilizer states, but for which every postselected stabilizer reduction from two qubits to one outputs a mixture of stabilizer states. Distilling such states would require true multi-qubit state distillation methods.


2014 ◽  
Vol 14 (15&16) ◽  
pp. 1261-1276 ◽  
Author(s):  
David Gosset ◽  
Vadym Kliuchnikov ◽  
Michele Mosca ◽  
Vincent Russo

We consider quantum circuits composed of Clifford and $T$ gates. In this context the $T$ gate has a special status since it confers universal computation when added to the (classically simulable) Clifford gates. However it can be very expensive to implement fault-tolerantly. We therefore view this gate as a resource which should be used only when necessary. Given an $n$-qubit unitary $U$ we are interested in computing a circuit that implements it using the minimum possible number of $T$ gates (called the $T$-count of $U$). A related task is to decide if the $T$-count of $U$ is less than or equal to $m$; we consider this problem as a function of $N=2^n$ and $m$. We provide a classical algorithm which solves it using time and space both upper bounded as $\mathcal{O}(N^m \text{poly}(m,N))$. We implemented our algorithm and used it to show that any Clifford+T circuit for the Toffoli or the Fredkin gate requires at least 7 $T$ gates. This implies that the known 7 $T$ gate circuits for these gates are $T$-optimal. We also provide a simple expression for the $T$-count of single-qubit unitaries.


2002 ◽  
Vol 2 (1) ◽  
pp. 66-96
Author(s):  
R.W. Spekkens ◽  
T. Rudolph

It is well known that no quantum bit commitment protocol is unconditionally secure. Nonetheless, there can be non-trivial upper bounds on both Bob's probability of correctly estimating Alice's commitment and Alice's probability of successfully unveiling whatever bit she desires. In this paper, we seek to determine these bounds for generalizations of the BB84 bit commitment protocol. In such protocols, an honest Alice commits to a bit by randomly choosing a state from a specified set and submitting this to Bob, and later unveils the bit to Bob by announcing the chosen state, at which point Bob measures the projector onto the state. Bob's optimal cheating strategy can be easily deduced from well known results in the theory of quantum state estimation. We show how to understand Alice's most general cheating strategy, (which involves her submitting to Bob one half of an entangled state) in terms of a theorem of Hughston, Jozsa and Wootters. We also show how the problem of optimizing Alice's cheating strategy for a fixed submitted state can be mapped onto a problem of state estimation. Finally, using the Bloch ball representation of qubit states, we identify the optimal coherent attack for a class of protocols that can be implemented with just a single qubit. These results provide a tight upper bound on Alice's probability of successfully unveiling whatever bit she desires in the protocol proposed by Aharonov et al., and lead us to identify a qubit protocol with even greater security.


Author(s):  
Axel Dahlberg ◽  
Stephanie Wehner

Stabilizer states form an important class of states in quantum information, and are of central importance in quantum error correction. Here, we provide an algorithm for deciding whether one stabilizer (target) state can be obtained from another stabilizer (source) state by single-qubit Clifford operations (LC), single-qubit Pauli measurements (LPM) and classical communication (CC) between sites holding the individual qubits. What is more, we provide a recipe to obtain the sequence of LC+LPM+CC operations which prepare the desired target state from the source state, and show how these operations can be applied in parallel to reach the target state in constant time. Our algorithm has applications in quantum networks, quantum computing, and can also serve as a design tool—for example, to find transformations between quantum error correcting codes. We provide a software implementation of our algorithm that makes this tool easier to apply. A key insight leading to our algorithm is to show that the problem is equivalent to one in graph theory, which is to decide whether some graph G ′ is a vertex-minor of another graph G . The vertex-minor problem is, in general, -Complete, but can be solved efficiently on graphs which are not too complex. A measure of the complexity of a graph is the rank-width which equals the Schmidt-rank width of a subclass of stabilizer states called graph states, and thus intuitively is a measure of entanglement. Here, we show that the vertex-minor problem can be solved in time O (| G | 3 ), where | G | is the size of the graph G , whenever the rank-width of G and the size of G ′ are bounded. Our algorithm is based on techniques by Courcelle for solving fixed parameter tractable problems, where here the relevant fixed parameter is the rank width. The second half of this paper serves as an accessible but far from exhausting introduction to these concepts, that could be useful for many other problems in quantum information. This article is part of a discussion meeting issue ‘Foundations of quantum mechanics and their impact on contemporary society’.


2007 ◽  
Vol 7 (5&6) ◽  
pp. 551-558
Author(s):  
H. Fan ◽  
B.-Y. Liu ◽  
K.-J. Shi

Quantum cloning of two identical mixed qubits $\rho \otimes \rho$ is studied. We propose the quantum cloning transformations not only for the triplet (symmetric) states but also for the singlet (antisymmetric) state. We can copy these two identical mixed qubits to $M$ ($M\ge 2$) copies. This quantum cloning machine is optimal in the sense that the shrinking factor between the input and the output single qubit achieves the upper bound. The result shows that we can copy two identical mixed qubits with the same quality as that of two identical pure states.


2004 ◽  
Vol 4 (3) ◽  
pp. 222-228
Author(s):  
A.A. Razborov

Let $\eta_0$ be the supremum of those $\eta$ for which every poly-size quantum circuit can be simulated by another poly-size quantum circuit with gates of fan-in $\leq 2$ that tolerates random noise independently occurring on all wires at the constant rate $\eta$. Recent fundamental results showing the principal fact $\eta_0>0$ give estimates like $\eta_0\geq 10^{-6}\mbox{--}10^{-4}$, whereas the only upper bound known before is $\eta_0\leq 0.74$.}{In this note we improve the latter bound to $\eta_0\leq 1/2$, under the assumption ${\bf QP}\not\subseteq {\bf QNC^1}$. More generally, we show that if the decoherence rate $\eta$ is greater than 1/2, then we can not even store a single qubit for more than logarithmic time. Our bound also generalizes to the simulating circuits allowing gates of any (constant) fan-in $k$, in which case we have $\eta_0\leq 1-\frac 1k$.


1996 ◽  
Vol 321 ◽  
pp. 335-370 ◽  
Author(s):  
R. R. Kerswell

Rigorous upper bounds on the viscous dissipation rate are identified for two commonly studied precessing fluid-filled configurations: an oblate spheroid and a long cylinder. The latter represents an interesting new application of the upper-bounding techniques developed by Howard and Busse. A novel ‘background’ method recently introduced by Doering & Constantin is also used to deduce in both instances an upper bound which is independent of the fluid's viscosity and the forcing precession rate. Experimental data provide some evidence that the observed viscous dissipation rate mirrors this behaviour at sufficiently high precessional forcing. Implications are then discussed for the Earth's precessional response.


Author(s):  
Indranil Biswas ◽  
Ajneet Dhillon ◽  
Nicole Lemire

AbstractWe find upper bounds on the essential dimension of the moduli stack of parabolic vector bundles over a curve. When there is no parabolic structure, we improve the known upper bound on the essential dimension of the usual moduli stack. Our calculations also give lower bounds on the essential dimension of the semistable locus inside the moduli stack of vector bundles of rank r and degree d without parabolic structure.



2014 ◽  
Vol 14 (2) ◽  
pp. 31-37 ◽  
Author(s):  
P. K. Das

Abstract Coding theory has started with the intention of detection and correction of errors which have occurred during communication. Different types of errors are produced by different types of communication channels and accordingly codes are developed to deal with them. In 2013 Sharma and Gaur introduced a new kind of an error which will be termed “key error”. This paper obtains the lower and upper bounds on the number of parity-check digits required for linear codes capable for detecting such errors. Illustration of such a code is provided. Codes capable of simultaneous detection and correction of such errors have also been considered.


Sign in / Sign up

Export Citation Format

Share Document