The present disclosure generally relates to a method of performing computations in a quantum computing system, and more specifically, to a method of constructing two-qubit gate operations in a quantum computing system that includes a chain of trapped ions.
Among physical systems upon which it is proposed to build large-scale quantum computers, is a chain of ions (i.e., charged atoms), which are trapped and suspended in vacuum by electromagnetic fields. The ions have internal hyperfine states which are separated by frequencies in the several GHz range and can be used as the computational states of a qubit (referred to as “qubit states”). These hyperfine states can be controlled using radiation provided from a laser, or sometimes referred to herein as the interaction with laser beams. The ions can be cooled to near their motional ground states using such laser interactions. The ions can also be optically pumped to one of the two hyperfine states with high accuracy (preparation of qubits), manipulated between the two hyperfine states (single-qubit gate operations) by laser beams, and their internal hyperfine states detected by fluorescence upon application of a resonant laser beam (read-out of qubits). A pair of ions can be controllably entangled (two-qubit gate operations) by a qubit-state dependent force using laser pulses that couple the ions to the collective motional modes of a chain of trapped ions, which arise from the Coulombic interaction between the ions. In general, entanglement occurs when pairs or chains of ions (or particles) are generated, interact, or share spatial proximity in ways such that the quantum state of each ion cannot be described independently of the quantum state of the others, even when the ions are separated by a large distance.
Realistic fault-tolerant quantum computing at reasonable overhead requires two-qubit gates with the highest possible fidelity, typically an infidelity of ≤10−4. However, in a commonly used phase-sensitive architecture, even under noise-free ideal conditions, control pulses constructed by conventional methods do not provide Mølmer-Sørensen XX gates based on the Raman scheme with an infidelity of ≤10−4.
Therefore, there is a need for a method of constructing gate operations with respect to the parameter drifts or fluctuations within an acceptable error in quantum computation.
Embodiments of the present disclosure provide a method of performing a two-qubit gate operation. The method includes computing, by a classical computer, a control pulse to be applied to a pair of trapped ions in a plurality of trapped ions in a quantum processor, each of the plurality of trapped ions having two frequency-separated states defining a qubit, wherein computing the control pulse comprises computing a pulse function of the control pulse based on a phase-space closure condition and an auxiliary condition, and computing the pulse function of the control pulse further based on a gate angle condition, and applying, by a system controller, the control pulse, having the computed pulse function, to the pair of trapped ions.
Embodiments of the present disclosure also provide a quantum computing system. The quantum computing system includes a quantum processor comprising a plurality of trapped ions, wherein each of the trapped ions having two frequency-separated states defining a qubit, a classical computer configured to compute a control pulse to be applied to a pair of trapped ions in the quantum processor, wherein computing the control pulse comprises computing a pulse function of the control pulse based on a phase-space closure condition and an auxiliary condition, and computing the pulse function of the control pulse further based on a gate angle condition, and a system controller configured to apply the control pulse, having the computed pulse function, to the pair of trapped ions.
Embodiments of the present disclosure further provide a quantum computing system. The quantum computing system includes non-volatile memory having a number of instructions stored therein which, when executed by one or more processors, causes the quantum computing system to perform operations comprising computing, by a classical computer, a control pulse to be applied to a pair of trapped ions in a plurality of trapped ions in a quantum processor, each of the plurality of trapped ions having two frequency-separated states defining a qubit, wherein computing the control pulse comprises computing a pulse function of the control pulse based on a phase-space closure condition and an auxiliary condition, and computing the pulse function of the control pulse further based on a gate angle condition, and applying, by a system controller, the control pulse, having the computed pulse function, to the pair of trapped ions.
So that the manner in which the above-recited features of the present disclosure can be understood in detail, a more particular description of the disclosure, briefly summarized above, may be had by reference to embodiments, some of which are illustrated in the appended drawings. It is to be noted, however, that the appended drawings illustrate only typical embodiments of this disclosure and are therefore not to be considered limiting of its scope, for the disclosure may admit to other equally effective embodiments.
To facilitate understanding, identical reference numerals have been used, where possible, to designate identical elements that are common to the figures. In the figures and the following description, an orthogonal coordinate system including an X-axis, a Y-axis, and a Z-axis is used. The directions represented by the arrows in the drawing are assumed to be positive directions for convenience. It is contemplated that elements disclosed in some embodiments may be beneficially utilized on other implementations without specific recitation.
Embodiments described herein are generally related to a method of performing a computation in a quantum computing system, and more specifically, to a method of constructing control pulses that implement entangling gates in a quantum computing system that includes a chain of trapped ions. The method can include a process of constructing the control pulses that implement stabilized entangling gate operations used in the computational process performed by a quantum computing system.
Embodiments of the disclosure include a quantum computing system that is able to perform a quantum computation process by use of a classical computer, a system controller, and a quantum processor. The classical computer performs supporting tasks including selecting a quantum algorithm to be used, computing quantum circuits to run the quantum algorithm, and outputting results of the execution of the quantum circuits by use of a user interface. A software program for performing the tasks is stored in a non-volatile memory within the classical computer. The quantum processor includes trapped ions that are coupled with various hardware, including lasers to manipulate internal hyperfine states (qubit states) of the trapped ions and photomultiplier tubes (PMTs) to read-out the internal hyperfine states (qubit states) of the trapped ions. The system controller receives from the classical computer instructions for controlling the quantum processor, and controls various hardware associated with controlling any and all aspects used to run the instructions for controlling the quantum processor, and transmits a read-out of the quantum processor and thus output of results of the read-out to the classical computer. In some embodiments, the classical computer will then utilize the computational results based on the output of results of the read-out to form a results-set that is then provided to a user in the form of results displayed on a user interface, stored in a memory and/or transferred to another computational device for solving technical problems.
In Section III, various Hamiltonians used in gate construction and error analysis are shown. In Section IV, construction methods, focusing on the AMFM pulse-construction method that are used for generating test pulses are discussed. In Section V, a gate-simulation method is shown, which propagates an initial state |ψ(t=0)> into a final state |ψ(τ)>, where τ is the gate time, including the 2-qubit computational space and a portion of the phonon space large enough to obtain converged results. In Section VI, various fidelity measures are defined that are used to assess the quality of various Hamiltonians used to construct XX gates. In Section VII, numerical simulation results are shown. In Section VIII, a simple pulse-scaling method (calibration) is shown that may be used to eliminate coherent errors that result in XX gates that deviate from the target degree of entanglement. In Section IX, sources of errors that are incurred by a general pulse function g(t) are analyzed. This Method may be used in particular for a pulse function g(t) constructed on the basis of the standard Hamiltonian to control a quantum computer assumed to be governed by the full Mølmer-Sørensen Hamiltonian. The analysis is conducted analytically, and error integrals are evaluated numerically to assess error magnitudes. In Section X, a linear method of eliminating an important class of coherent errors are presented. It is this method, together with pulse calibration that allows us to suppress coherent XX gate errors to the level of ≤10−1. In Section XI, the scaling of the results to the case of chains consisting of 32 ions is discussed.
and the 2S1/2 hyperfine states. In some embodiments, all ions in the chain 106 of trapped ions are the same species and isotope (e.g., 171Yb+). In some other embodiments, the chain 106 of trapped ions includes one or more species or isotopes (e.g., some ions are 171Yb+ and some other ions are 133Ba+). In yet additional embodiments, the chain 106 of trapped ions may include various isotopes of the same species (e.g., different isotopes of Yb, different isotopes of Ba). The ions in the chain 106 of trapped ions are individually addressed with separate laser beams. The classical computer 102 includes a central processing unit (CPU), memory, and support circuits (or I/O). The memory is connected to the CPU, and may be one or more of a readily available memory, such as a read-only memory (ROM), a random-access memory (RAM), floppy disk, hard disk, or any other form of digital storage, local or remote. Software instructions, algorithms and data can be coded and stored within the memory for instructing the CPU. The support circuits (not shown) are also connected to the CPU for supporting the processor in a conventional manner. The support circuits may include conventional cache, power supplies, clock circuits, input/output circuitry, subsystems, and the like.
An imaging objective 108, such as an objective lens with a numerical aperture (NA), for example, of 0.37, collects fluorescence along the Y-axis from the ions and maps each ion onto a multi-channel photo-multiplier tube (PMT) 110 for measurement of individual ions. Non-copropagating Raman laser beams from a laser 112, which are provided along the X-axis, perform operations on the ions. A diffractive beam splitter 114 creates an array of static Raman beams 116 that are individually switched using a multi-channel acousto-optic modulator (AOM) 118 and is configured to selectively act on individual ions. A global Raman laser beam 120 is configured to illuminate all ions simultaneously. In some embodiments, individual Raman laser beams (not shown) each illuminate individual ions. The system controller (also referred to as a “RF controller”) 104 controls the AOM 118 and thus controls laser pulses to be applied to trapped ions in the chain 106 of trapped ions. The system controller 104 includes a central processing unit (CPU) 122, a read-only memory (ROM) 124, a random-access memory (RAM) 126, a storage unit 128, and the like. The CPU 122 is a processor of the system controller 104. The ROM 124 stores various programs and the RAM 126 is the working memory for various programs and data. The storage unit 128 includes a nonvolatile memory, such as a hard disk drive (HDD) or a flash memory, and stores various programs even if power is turned off. The CPU 122, the ROM 124, the RAM 126, and the storage unit 128 are interconnected via a bus 130. The system controller 104 executes a control program which is stored in the ROM 124 or the storage unit 128 and uses the RAM 126 as a working area. The control program will include software applications that include program code that may be executed by a processor in order to perform various functionalities associated with receiving and analyzing data and controlling any and all aspects of the methods and hardware used to create the ion trap quantum computer system 100 discussed herein.
During operation, a sinusoidal voltage V1 (with an amplitude VRF/2) is applied to an opposing pair of electrodes 202, 204 and a sinusoidal voltage V2 with a phase shift of 180° from the sinusoidal voltage V1 (and the amplitude VRF/2) is applied to the other opposing pair of electrodes 206, 208 at a driving frequency ωRF, generating a quadrupole potential. In some embodiments, a sinusoidal voltage is only applied to one opposing pair of electrodes 202, 204, and the other opposing pair 206, 208 is grounded. The quadrupole potential creates an effective confining force in the X-Y plane perpendicular to the Z-axis (also referred to as a “radial direction” or “transverse direction”) for each of the trapped ions, which is proportional to the distance from a saddle point (i.e., a position in the axial direction (Z-direction)) at which the RF electric field vanishes. The motion in the radial direction (i.e., direction in the X-Y plane) of each ion is approximated as a harmonic oscillation (referred to as secular motion) with a restoring force towards the saddle point in the radial direction and can be modeled by spring constants kx and ky, respectively. In some embodiments, the spring constants in the radial direction are modeled as equal when the quadrupole potential is symmetric in the radial direction. However, undesirably in some cases, the motion of the ions in the radial direction may be distorted due to some asymmetry in the physical trap configuration, a small DC patch potential due to inhomogeneity of a surface of the electrodes, or the like and due to these and other external sources of distortion the ions may lie off-center from the saddle points. The Paul trap described herein is just one example of the types of traps that can be used as the ion trap 200. Other types of traps, including surface traps, can also be used for this purpose although their operation may be somewhat different.
and the 2S1/2 hyperfine states (i.e., a multiplet of electronic states of which two are used as computational states) with an energy split corresponding to a frequency difference (referred to as a “carrier frequency”) of ω01/2π=12.642812 GHz. In other examples, each ion may be a positive barium ion 133Ba+, a positive cadmium ion 111Cd+ or 113Cd+, which all have a nuclear spin
and the 2S1/2 hyperfine states. A qubit is formed with two hyperfine states, denoted as |d and |1
, where the hyperfine ground state (i.e., the lowest energy state of the 2S1/2 hyperfine states) is chosen to represent |0
. Hereinafter, the terms “hyperfine states”, “internal hyperfine states”, and “qubit states” may be interchangeably used to represent |0
and |1
. Further, the terms “trapped ions,” “ions,” and “qubits” may be interchangeably used. Each ion may be cooled (i.e., the kinetic energy of the ion may be reduced) to near the motional ground state |0
p for any motional mode with no phonon excitation (i.e., nph=0) by known laser cooling methods, such as Doppler cooling or resolved sideband cooling, and then the qubit state prepared in the hyperfine ground state |0
by optical pumping. Here, |0
represents the individual qubit state of a trapped ion whereas |0
p with the subscript denotes the motional ground state for a motional mode p of a chain 106 of trapped ions.
An individual qubit state of each trapped ion may be manipulated by, for example, a mode-locked laser at 355 nanometers (nm) via the excited 2P1/2 level (denoted as |e). As shown in
and |e
, as illustrated in
and |1
. When the one-photon transition detuning frequency Δ is much larger than the two-photon transition detuning frequency (also referred to simply as “detuning frequency”) δ=ω1−ω2−ω01 (hereinafter denoted as ±μ, μ being a positive value), the single-photon Rabi frequencies Ω0e(t) and Ω1e(t) (which are time-dependent, and are determined by amplitudes and phases of the first and second laser beams), at which Rabi flopping between states |0
and |e
and between states |1
and |e
respectively occur, and the spontaneous emission rate from the excited state |e
, Rabi flopping between the two hyperfine states |0
and |1
(referred to as a “carrier transition”) is induced at the two-photon Rabi frequency Ω(t). The two-photon Rabi frequency Ω(t) has an intensity (i.e., absolute value of amplitude) that is proportional to Ω0eΩ1e/2Δ, where Ω0e and Ω1e are the single-photon Rabi frequencies due to the first and second laser beams, respectively. Hereinafter, this set of non-copropagating laser beams in the Raman A configuration to manipulate internal hyperfine states of qubits (qubit states) may be referred to as a “composite pulse” or simply as a “pulse,” described by a pulse function g(t) and the resulting time-dependent pattern of the two-photon Rabi frequency Ω(t) may be referred to as an “amplitude” of a pulse. The detuning frequency δ=ω1−ω2−ω01 may be referred to as the detuning frequency of the composite pulse or the detuning frequency of the pulse. The amplitude of the two-photon Rabi frequency Ω(t), which is determined by amplitudes of the first and second laser beams, may be referred to as an “amplitude” of the composite pulse, such that the pulse function g(t) is now represented as
where φ(t) is a “phase” of the composite pulse that may be time dependent.
It should be noted that the particular atomic species used in the discussion provided herein is just one example of atomic species which have stable and well-defined two-level energy structures when ionized and an excited state that is optically accessible, and thus is not intended to limit the possible configurations, specifications, or the like of an ion trap quantum computer according to the present disclosure. For example, other ion species include alkaline earth metal ions (Be+, Ca+, Sr+, Mg+, and Ba+) or transition metal ions (Zn+, Hg+, Cd+).
(represented as the north pole of the Bloch sphere) and |1
(the south pole of the Bloch sphere) to occur. Adjusting time duration and the composite pulse flips the qubit state from |0
to |1
(i.e., from the north pole to the south pole of the Bloch sphere), or the qubit state from |1
to |0
(i.e., from the south pole to the north pole of the Bloch sphere). This application of the composite pulse is referred to as a “π-pulse”, Further, by adjusting time duration and the composite pulse, the qubit state |0
may be transformed to a superposition state |0
+1
, where the two qubit-states |0
and |1
are added and equally-weighted in-phase (a normalization factor of the superposition state is omitted hereinafter for convenience) and the qubit state |1
to a superposition state |0
-|1
, where the two qubit-states |0
and |1
are added equally-weighted but out of phase. This application of the composite pulse is referred to as a “π/2-pulse”. More generally, a superposition of the two qubit-states |0
and |1
that are added and equally weighted is represented by a point that lies on the equator of the Bloch sphere. For example, the superposition states |0
±|1
correspond to points on the equator with the azimuthal angle ϕ being zero and π, respectively. The superposition states that correspond to points on the equator with the azimuthal angle ϕ are denoted as |0
+eiϕ|1
. Transformation between two points on the equator (i.e. a rotation about the Z-axis on the Bloch sphere) can be implemented by shifting phases of the composite pulse.
p, where nph denotes the number of motional quanta (in units of energy excitation, referred to as phonons) in the motional mode, and the number of motional modes P in a given transverse direction is equal to the number of trapped ions N in the chain 106.
P, all ions oscillate in phase in the transverse direction.
P-1 which has the second highest energy. In the tilt motional mode, ions on opposite ends move out of phase in the transverse direction (i.e., in opposite directions).
P-3 which has a lower energy than that of the tilt motional mode |nph
P-1, and in which the ions move in a more complicated mode pattern.
It should be noted that the particular configuration described above is just one among several possible examples of a trap for confining ions according to the present disclosure and does not limit the possible configurations, specifications, or the like of traps according to the present disclosure. For example, the geometry of the electrodes is not limited to the hyperbolic electrodes described above. In other examples, a trap that generates an effective electric field causing the motion of the ions in the radial direction as harmonic oscillations may be a multi-layer trap in which several electrode layers are stacked, and an RF voltage is applied to two diagonally opposite electrodes, or a surface trap in which all electrodes are located in a single plane on a chip. Furthermore, a trap may be divided into multiple segments, adjacent pairs of which may be linked by shuttling one or more ions or coupled by photon interconnects. A trap may also be an array of individual trapping regions arranged closely to each other on a micro-fabricated ion trap chip. In some embodiments, the quadrupole potential has a spatially varying DC component in addition to the RF component described above.
In an ion trap quantum computer, the motional modes may act as a data bus to mediate entanglement between two qubits and this entanglement is used to perform an XX gate operation. That is, each of the two qubits is entangled with the motional modes, and then the entanglement is transferred to an entanglement between the two qubits by using motional sideband excitations, as described below. p having frequency ωp according to one embodiment. As illustrated in
and |1
(carrier transition) occurs. When the detuning frequency of the composite pulse is positive (i.e., the frequency difference between the first and second laser beams is tuned higher than the carrier frequency, δ=μ>0, referred to as a blue sideband, by cop), Rabi flopping between combined qubit-motional states |0
|nph
p and |1
|nph+1
p occurs (i.e., a transition from the p-th motional mode with nph-phonon excitations denoted by |nph
p to the p-th motional mode with nph+1-phonon excitations denoted by |nph+1
p occurs while the qubit state |0
flips to |1
). When the detuning frequency of the composite pulse is negative (i.e., the frequency difference between the first and second laser beams is tuned lower than the carrier frequency by δ=−μ<0, referred to as a red sideband, by ωp), Rabi flopping between combined qubit-motional states |0
|nph
p and |1
|nph−1
p occurs (i.e., a transition from |nph
p to |nph−1
with one less phonon excitations occurs while the qubit state |0
flips to |1
). A π/2-pulse on the blue sideband applied to a qubit transforms the combined qubit-motional state |0
|nph)p into a superposition of |0
|nph)p and |1
|nph+1)p. A π/2-pulse on the red sideband applied to a qubit transforms the combined qubit-motional state |0
|nph
p into a superposition of |0
|nph
p and |1
|nph−1)p. When the two-photon Rabi frequency Ω(t) is smaller as compared to the detuning frequency δ=±μ, the blue sideband transition or the red sideband transition may be selectively driven. Thus, a qubit can be entangled with a desired motional mode by applying the right type of pulse, such as a π/2-pulse, which can be subsequently entangled with another qubit, leading to an entanglement between the two qubits that is needed to perform an XX-gate operation in an ion trap quantum computer.
By controlling and/or directing transformations of the combined qubit-motional states as described above, an XX-gate operation may be performed on two qubits (i-th and j-th qubits). In general, the XX-gate operation (with maximal entanglement) respectively transforms two-qubit states |0i|0
j, |0
i|1
j, |1
i|0
j, and |1
i|1
j as follows:
For example, when the two qubits (i-th and j-th qubits) are both initially in the hyperfine ground state |0 (denoted as |0
i|0
j) and subsequently a π/2-pulse on the blue sideband is applied to the i-th qubit, the combined state of the i-th qubit and the motional mode |0
i|nph
p is transformed into a superposition of |0
i|ph
p and |1
i|ph+1
, and thus the combined state of the two qubits and the motional mode is transformed into a superposition of |0
i|0
j|nph
p and |1
i|0
j|nph+1
p. When a π/2-pulse on the red sideband is applied to the j-th qubit, the combined state of the j-th qubit and the motional mode |0
j|nph
p is transformed to a superposition of |0
j|nph
p and |1
j|nph−1
p and the combined state |0
i|0
j|nph
p is transformed into a superposition of |0
i|0
j|nph
p and |0
i|1
j|nph−1
p.
Thus, applications of a π/2-pulse on the blue sideband on the i-th qubit and a π/2-pulse on the red sideband on the j-th qubit may transform the combined state of the two qubits and the motional mode |0i|0
j|nph
p into a superposition of |0
i|0
j|nph
p and |1
i|1
j|nph
P, the two qubits now being in an entangled state. For those of ordinary skill in the art, it should be clear that two-qubit states that are entangled with a motional mode having a different number of phonon excitations from the initial number of phonon excitations (i.e., |1
i|0
j|nph+1
p and |0
i|0
j|ph−1
) can be removed by a sufficiently complex pulse sequence, and thus the combined state of the two qubits and the motional mode after the XX-gate operation may be considered disentangled as the initial number of phonon excitations nph in the p-th motional mode stays unchanged at the end of the XX-gate operation. Thus, qubit states before and after the XX-gate operation will be described below generally without including the motional modes.
More generally, the combined state of i-th and j-th qubits, transformed by the application of control pulses described by pulse functions gi(t) and gj(t), respectively, for duration τ (referred to as the “gate time”), can be described in terms of a degree of entanglement (also referred to as a “gate angle”) χij as follows:
where
and ηpi is the Lamb-Dicke parameter that quantifies the coupling strength between the i-th qubit and the p-th motional mode having the frequency ωp, and P is the number of the motional modes (equal to the number N of ions in the chain 106).
The entanglement interaction between two qubits described above can be used to perform an XX-gate operation. The XX-gate operation (XX gate) along with single-qubit gate operations (R gates) forms a set of gates {R, XX} that can be used to build a quantum computer that is configured to perform desired computational processes. Among several known sets of logic gates by which any quantum algorithm can be decomposed, a set of logic gates, commonly denoted as {R, XX}, is native to a quantum computing system of trapped ions described herein. Here, the R gate corresponds to manipulation of individual qubit states of trapped ions, and the XX gate (also referred to as an “entangling gate”) corresponds to manipulation of the entanglement of two trapped ions.
The trapped-ion architecture, i.e., chains of trapped ions, coherently controlled via Raman hyperfine transitions, is one of the most promising routes to scalable quantum computing. This quantum computer architecture is used both in laboratory experiments and in the emerging quantum computing industry. For both the current era of noisy intermediate-scale quantum computing and the anticipated era of fault-tolerant, error-corrected quantum computing, two-qubit gates of the highest possible fidelity are essential. While fault-tolerant quantum computing and quantum error-correction may, in principle, be achieved with two-qubit gates of modest fidelity, the overhead, i.e., the number of physical qubits required for one error-corrected logical qubit depends on the native fidelity of the physical gates and may be enormous for physical two-qubit gates of only modest fidelity. A reasonable amount of overhead in fault-tolerant quantum computing can be achieved only if the physical two-qubit gates themselves have a high native fidelity. Typically, for realistic, tolerable overhead, a physical two-qubit infidelity of ≤10−4 is recommended. Two-qubit gate infidelities close to this target have indeed already been achieved. However, the experimental demonstrations of high-fidelity two-qubit gates are restricted to two-qubit gates in very short ion chains, i.e., chains consisting of up to four ions. Moreover, to date, even in these cases two-qubit gate infidelities of ≤10−4 have not yet been achieved experimentally. Two adversaries stand in the way of achieving two-qubit gate infidelities ≤10−4: Random noise and deterministic, coherent control errors. Even in the shortest chains (two to four ions stored simultaneously), the target of ≤10−4 infidelity may not be achieved if the Hamiltonian used to design the control pulses for two-qubit gate implementation does not accurately enough reflect the reality of the quantum computer's hardware implementation. What this means is illustrated in
One of the most basic tasks of a quantum computer is to construct two-qubit gates. In the embodiments described herein, two-qubit XX gates constructed according to the Mølmer-Sørensen scheme are considered. Ideally, given an input state, |ψin, the quantum computer, governed by ĤR, is expected to turn |ψin
into |ψout
=XX|ψin
, where XX is the ideal XX gate. However, since ĤR≠ĤC, this will not happen in practice. Therefore, |ψoutR
, i.e., the output state produced by ĤR, is different from XX|ψin
. However, assuming that ĤM is very close to ĤR, it is possible, at least approximately, to assess the quality of the control pulses by computing the model output state |ψoutM
and comparing it with the ideal output state XX|ψin
, for instance, by computing the overlap |
ψoutM|XX|ψin
|2. Only for HC=ĤM is it expected that this overlap equals 1. However, if ĤM is close to ĤR, but ĤC is chosen as the manageable standard Hamiltonian ĤS, it is expected that this overlap and other fidelity measures (see Section VI) differ from 1. In this case, because of the insufficient quality of the control pulses, the resulting two-qubit gates may not be accurate enough for the target infidelity (for instance, <10−4). To this end, constructing a realistic model Hamiltonian ĤM for Raman-controlled trapped ions, it is shown that currently employed control-pulse construction techniques based on the standard Hamiltonian ĤS, i.e., ĤC=ĤS are not accurate enough to achieve the ≤10−4 infidelity target for realistic fault-tolerant quantum computing. This is shown by constructing control pulses on the basis of ĤS, which are then used to compute two-qubit XX gates in a 7-ion chain governed by ĤM, assuming that ĤM is sufficiently close to ĤR. The XX gate simulations of the 7-ion chain are performed with a gate-simulator code that is accurate on the 10−7 level and takes both computational levels and phonon states explicitly into account. This way it is shown that even assuming ideal conditions, i.e., neglecting all incoherent noise sources, control-pulse construction needs to be improved to reach the ≤10−4 infidelity goal.
There are two principal methods of implementing a trapped-ion chain quantum computer using the stimulated Raman scheme: Phase sensitive and phase insensitive. Both schemes have advantages and disadvantages. The phase-sensitive scheme is focused since it is technically more straightforward to implement and is currently used by commercial quantum computing companies such as IonQ, Inc. Therefore, the focus is to isolate the leading coherent error sources in the phase-sensitive architecture and to construct methods that allow us to eliminate these error sources. It is shown that on the basis of a new linear scheme of pulse construction, and in the absence of all incoherent error sources, XX gate infidelities ≤10−4 can be reached.
The entangling gate can be constructed from the model Hamiltonian ĤM (referred to as the full Mølmer-Sørensen Hamiltonian) that governs a chain of ions in a linear Paul trap (e.g., the chain 106 of trapped ions, illuminated simultaneously by two laser beams, one red detuned and one blue detuned). The effective two-level Hamiltonian:
can be obtained via adiabatic elimination according to the Raman Λ scheme. Here, N is the number of ions in the chain,
is the phonon Hamiltonian with the phonon frequencies ωp and associated phonon creation and destruction operators {circumflex over (α)}p† and âp, respectively, the j sum is over the ions in the chain, Ωeff(t) is the time-dependent effective Rabi frequency, Δ{right arrow over (k)} is the wavenumber difference between the two Raman lasers, {right arrow over (r)}j is the position operator of ion number j in the chain, and Δφ is the phase difference between the two Raman lasers.
To construct a Mølmer-Sørensen (MS) gate, the ions are illuminated simultaneously with blue (+μ) and red (−μ) shifted light. In the interaction representation with respect to Ĥ0, the MS Hamiltonian is:
where μ is the detuning frequency, ηpj are the Lamb-Dicke parameters, and {circumflex over (σ)}x, {circumflex over (σ)}y, {circumflex over (σ)}z are the Pauli operators. The Hamiltonian (3) may be generalized according to:
where gj(t) may be any time-dependent pulse function, i.e., it includes amplitude-modulated (AM) pulses, frequency-modulated (FM) pulses, phase-modulated (PM) pulses, and simultaneously amplitude- and frequency-modulated (AMFM) pulses. Thus, written in terms of the most general pulse function gj(t), the MS Hamiltonian (3) becomes:
where, for later convenience, the Lamb-Dicke operators are defined as:
which satisfy
Expansion of the MS Hamiltonian ĤMS in powers of {circumflex over (V)} leads to a family of model Hamiltonians:
For later convenience, the standard Hamiltonian is also defined as:
which is frequently used as the basis for control-pulse construction. Here, the superscript Nc=−2 codes for the complete suppression (omission) of the cosine term in (8). The test pulses used in the example are also all constructed on the basis of the standard Hamiltonian ĤS (as discussed in detail below in Section IV). The expanded model Hamiltonians (8) are use in Section VII to assess the accuracy of expansions of the MS Hamiltonian ĤMS in powers of the Lamb-Dicke operators {circumflex over (V)}j(t).
Quantum computation can be performed in a quantum computing system, such as the ion trap quantum computing system 100, using a set of quantum gate operations including single-qubit gate operations (R gates) and two-qubit gate operations, such as XX-gate operations (XX gates). Although the methods for applying such basic building blocks of quantum computation have been established, there are errors, which result from experimental parameter drift or fluctuations, such as the vibrational mode frequencies of an ion chain, in the hardware of the quantum computing system. These errors are mainly due to the lack of knowledge about the changes in the computing environment and the properties of quantum computing hardware within the quantum computing system. Thus, stabilizing gate operations, i.e., the task of computing and implementing control pulses in the quantum computing system to be robust against the errors is needed to provide scalable and reliable quantum computation results.
While the pulse functions g(t) may be any pulse functions constructed by any of the known pulse construction schemes (e.g., AM, PM, FM, AMFM, etc.), to be specific, and for the purpose of illustrating the methods, but not restricting the generality of the methods in any way, in the embodiments described herein, the pulse functions g(t) of a control pulse are taken to be sine-AMFM pulses:
where the basis spans the states n∈{nmin, nmax}, the Fourier coefficients Bn are real amplitudes,
are the basis frequencies, and r is the gate time. The pulse functions (11) fulfill the “carrier condition”
which, as shown in Section IX, ensures that significant, first-order contributions to the gate infidelity due to the “carrier term”, i.e., the n=0 term in the expansion (8) of the MS Hamiltonian, are eliminated, and higher-order contributions to the gate infidelity are much reduced.
The phase-space closure condition requires:
such that the trapped ions that are displaced from their initial positions as the motional modes are excited by the delivery of the control pulse return to their initial motional states. This condition must be imposed for all motional modes (p=1,2, . . . , N) and all ions (j=1, . . . ,N) in the chain of trapped ions. The sine-AMFM pulses (11) are known to fulfill (14) exactly. The number of ions in the chain is chosen as N=7, as an example, because it is large enough to be realistic, yet small enough to enable direct numerical simulations of the quantum dynamics of the chain, explicitly including a large phonon space. In addition, in the embodiments described herein, gj(t)=g(t) (=1, . . . , N) is chosen for illustrative purposes but is not intended to be a restriction of generality. That is, here, whenever a two-qubit gate is constructed between two ions, it is assumed that each of the two ions is irradiated with laser light controlled by the same pulse function g(t). This is a common choice, used in laboratories and in commercial quantum computers.
Among the pulse functions g(t) that fulfill the phase-space closure condition and the carrier condition, the pulse function g(t) that satisfies the gate angle condition, which requires the pulse g(t) to produce the desired gate angle χ according to:
is selected. A maximally entangling gate is obtained for χ=π/4. The mode frequencies ωp, p=1, . . . ,7, and the Lamb-Dicke parameters ηpj, p,j=1, . . . ,7, are listed in Tables I and II, respectively.
For computing analytical infidelities the following identities that follow directly from (14) with the expansion (11) and hold for all p=1, . . . , N are used:
For later use in the following sections, the following functions are defined:
where (15) is used and
Given a Hamiltonian and enough computer power, the time evolution of the computational states including phonon excitations can always be solved to any desired accuracy. For a 7-ion chain, the complete state |ψ(t) can be expanded in the combined Hilbert space of computational states |a, b
, a, b∈{0,1}, and phonon states |m1m2 . . . m7
, mj=0,1, . . . , mjmax, j=1, . . . ,7, according to:
where mjmax≥0 is the maximal phonon occupation number included in the basis. The set {m1max, . . . , m7max} is referred to as the phonon scheme. With (29), the time-dependent Schrödinger equation results in the amplitude equations:
where Ĥ(t) may be any of the model Hamiltonians defined in Section III. The set of equations (30) are ordinary first-order differential equations that may be solved with any standard numerical differential equations solver. For simplicity and straightforward numerical error control, an elementary fourth-order Runge-Kutta solver with constant step size is chosen. With this simple integrator, the inventors have been able to obtain a relative accuracy of the numerical solution of better than 10−7. It should be noted that the gate simulator is not limited to 7 ions. It scales trivially to any number of ions.
Convergence in the phonon scheme is assessed by using the gate simulator to compute |ψ(τ) for the Hamiltonian Ĥ(t)=ĤS(t)=Ĥ−2,1)(t). In this case, full phase-
space closure is required, because the control pulses are constructed on the basis of the same Hamiltonian that governs the time evolution. Only if enough phonon states are included in the basis used by the gate-simulator, will the phase space be closed and thus the phonon-space truncation according to the phonon scheme will guarantee an accurate result.
The ideal XX gate propagator is:
where χ is the gate angle. For starting state |ψ0 this produces the ideal final state:
However, a given gate pulse g(t), in general, produces a gate propagator of the form:
where Ê is a Hermitian error operator and λ is its error strength. In this case, and for given initial state |ψ0, the state fidelity FS is defined as:
There are two types of error operators, i.e., those that commute with the product of the Pauli operators σx(1)σx(2) and those that do not. If only a single, commuting error operator Ê is present, the state fidelity FS, up to second order in the error strength λ, is:
This means that the state infidelity
up to second order in the error strength λ, is:
The state infidelity
In case the error operator Ê does not commute with the product of the Pauli operators σx1αx(2), the Baker-Hausdorff-Campbell formula can be used to obtain the state fidelity FS, up to second order in the error strength λ,
where Ĉ and {circumflex over (D)} are Hermitian operators that can be expressed as linear combinations of nested multi-commutators of the product of the Pauli operators σx(1)σx(2) and the error operator Ê. This implies that in this case, too, the state infidelity
Most of the error operators Ê that appear in the present context do not commute with the product of the Pauli operators σx(1)σx2. However, if the error operator Ê can be written in the form Ê=Â{circumflex over (Ω)}, where  is a Hermitian error operator in the computational space and {circumflex over (Ω)} is a Hermitian error operator in the phonon space, and if the error operator  in the computational space fulfills the anti-commutation relation:
the state infidelity
Since they act in different spaces, the following conditions are satisfied:
If (40) is fulfilled, Ûactual becomes:
Then, up to second order in the error strength λ, the state fidelity FS becomes:
Now, (40) and (42) lead to:
This means that ψ0|σx(1)σx(2)Â{circumflex over (Ω)}|ψ0
is purely imaginary, and thus:
With this result, the state fidelity FS can be written, up to second order in the error strength λ, as:
It should be noted that, because of (42), and since the error operator  in the computational space is assumed to fulfill (40), iσx(1)σx(2)Â{circumflex over (Ω)} is a Hermitian operator. So, Ĉ is Hermitian, as it should be, and Ĉ2=Ĉ†Ĉ. With this result, the state fidelity {circumflex over (F)}S can be explicitly written as:
The explicit form (48) of the state fidelity FS confirms the general result (39) in cases where the condition (40) is met. Many of the most important error operators occurring satisfy (40) and thus (50) is applicable.
In the case of a two-qubit gate, the error operator Ê takes the form Ê=Σj=1,2 Â(j){circumflex over (Ω)}(j). In this case (48), (49), and (50) may immediately be generalized using the substitution:
The output of the gate simulator code is the complete state |ψoutM(τ), which includes computational states and phonon states. This way, the complete state information is available, which can be used to compute the state fidelity defined in (34) with |ψactual
=|ψoutM(τ)
. In Section VII the state fidelity FS is used to assess the quality of the various model Hamiltonians ĤMN
The state fidelity FS, as defined in (34), depends on the initial state |ψ0. A more global measure of the fidelity of the quantum process that implements the two-qubit XX gate is the process fidelity
where Eexact is the exact XX gate process and Eactual is the actual two-qubit XX-gate process as computed with the gate simulator as described in Section V.
A related fidelity measure, also used in Section VII, is the average gate fidelity FG, which is defined as:
where Ûj, j=1, . . . ,16, is an operator basis in the computational space.
In addition to the state infidelity
For characterizing the quality of the various Hamiltonians, it is useful to define the gate angle error:
where χ is the actual gate angle computed by running the XX gate simulator (see Sections V and VII). A positive gate angle error Δχ corresponds to an over-rotated gate angle χ, while a negative Δχ corresponds to an under-rotated gate angle χ. The error operator associated with the gate angle error Δχ is Êχ=Δχ{circumflex over (σ)}(1){circumflex over (σ)}(2). Then, according to (35), for |ψ0=|00
|ph
, for instance, where |00
is the computational state and |ph
is any normalized phonon state, the state infidelity
As described in Section IV, the inventors have computed AMFM pulse functions g(t) for gate times ranging from τ=100 μs to τ=600 μs in steps of 100 μs, and used these pulse functions in the XX gate simulator (see Section V). As described in Section V, using the full Hamiltonian ĤMS defined in (5), the full state function |ψ(τ) that includes both the computational space and the phonon space were computed. From |ψ(τ)
, as described in Section VI, the state infidelity
S
G
P
S
c
G
c
P
c
S
Φ, c
G
Φ, c
P
Φ, c
Accepting ĤMS as a good approximation of ĤR, the most important result from Table III is that a gate infidelity
Next, the control pulse g(t) will be fixed using the 300 μs pulse from Table III and the quality of the various approximations ĤM(N
Looking at the infidelity results in Table IV for the Hamiltonians expanded to zeroth and second orders in the cos-term in (5), it can be seen that neglecting the zeroth-order term in (5) (the carrier term) is not justified. But it can also be seen that, apparently, expansion to second order of the cos-term of (5) is not necessary. This is shown analytically in more detail in Sections IX. B. and IX. C.
Turning now to the expansions of the sin-term of (5), Table IV shows that truncating this expansion at the first order of the sin function, i.e., linearizing the sin-term in the Lamb-Dicke parameters, is not accurate enough. As a consequence, the expansion of the sin term in (5) has to be carried to the third order in the Lamb-Dicke parameters, but expansion to the 5th order is not necessary.
As an overall result of the performance tests for different (Nc, Ns) model Hamiltonians, ĤM(0,3) is a good enough approximation of ĤMS on the ≤10−4 fidelity level. Conversely, the important result is that pulse construction on the basis of the standard Hamiltonian ĤS=ĤM(−2,1) does not yield infidelities <10−4. Thus, to improve control-pulse construction, at a minimum, the carrier term [zeroth-order cos term in (5)] and the third-order sin term in (5) needed to be included. In Sections IX. B. and IX. C., the effects of these two additional Hamiltonian terms are further explored. It can also be seen analytically that inclusion of the second- and fourth-order terms of the Hamiltonian (5) are not needed.
Table III shows that the gate angle error Δχ is quite large and may make a significant contribution to the infidelity. However, by slightly adjusting the amplitude of the control pulse g(t), the gate angle error Δχ can be completely eliminated and thus any contribution to the infidelity that otherwise would be due to the gate angle error Δχ can be eliminated. Adjusting the pulse function g(t) to result in Δχ=0 is called calibration. This procedure, extensively used in the laboratory, is an attractive way of reducing the infidelity, since the phase-space closure condition (14) linear in the amplitude of the control pulse g(t), is invariant under a change in the control-pulse amplitude. So, despite calibration of the pulse, phase-space closure is always guaranteed exactly, independent of the pulse amplitude.
The error operator for the gate angle error Δχ is Ê=Δχ{circumflex over (σ)}x(1){circumflex over (σ)}x(2), which trivially commutes with {circumflex over (σ)}x(1){circumflex over (σ)}x(2). Therefore, for all entries in Table III, the contribution of the gate angle error Δχ to the state infidelity FS may be estimated according to (35) and (36) as:
Based on this result, and for all pulse lengths listed in Table III,
The entries for the state infidelity for the results in Table III is |ψ0
=|00
|0
ph, a reduction by Δχ2 can be expected. This agrees well with the results in Table III. Since they can no longer be due to the gate angle error Δχ, the rest of the infidelities in Table III have to come from other sources. To look for these sources, the XX-gate propagator can be computed via a Magnus expansion as outlined in the following section.
Given the time-dependent Schrödinger equation:
the time evolution operator Û(τ) of (59) over the time interval τ may be constructed systematically and analytically, using a Magnus expansion, i.e., up to 3rd order in the Hamiltonian:
are Hermitian operators.
In this section, a consistent Magnus expansion up to 4th order in the Lamb-Dicke parameters ηpj is shown. Therefore, expanding the cosine-term in (5) up to fourth order in {circumflex over (V)}2 and the sine-term in (5) up to third order in {circumflex over (V)}j, the Hamiltonian:
is used in the Magnus expansion (61), where
It should be noted that ĥ0(t) is actually time independent, but the time argument is formally kept for notational convenience. Based on the results listed in Table IV, it is known that the zeroth order of cos[{circumflex over (V)}j(t)] contributes substantially to the infidelity, while the 2nd and higher orders of cos[{circumflex over (V)}j(t)] do not, and that the first and third orders of sin[{circumflex over (V)}j(t)] contribute substantially, while the 5th and higher orders do not. Thus, the Hamiltonian (62) covers all these important cases. According to Table IV, it may not be necessary to include the second- and fourth-order expansion terms of the cosine function in (5). However, for a consistent expansion up to fourth order in the Lamb-Dicke parameters, and also to show that these terms are negligible, they are included in the expansion (62) of (5).
In Section IX. A., Ŵ1(τ) is computed on the basis of (62). In Sections IX.B. and IX.C., Ŵ2(τ) and Ŵ3(τ), respectively are constructed. Many of the resulting error terms are found to be negligible. Further, the most significant terms that make significant contributions to the infidelity are identified.
With the operators defined in (63), the following Hermitian operators are defined:
In the following sections, these operators are used (i) to compute Ŵ1, Ŵ2, and Ŵ3 and (ii) to compute infidelity contributions to the gate evolution operator Û(τ) defined in (60).
With the definition in (64) Ŵ1(τ) becomes:
where the carrier condition (13) together with
is used to arrive at
where Q(w), defined in (22), is used, in particular, with the carrier condition (13), Q(0)=0.
While {circumflex over (T)}0(τ) and {circumflex over (T)}1(τ) vanish, {circumflex over (T)}2(τ), {circumflex over (T)}3(τ), and {circumflex over (T)}4(τ) need to be investigated further since they may produce undesirable contributions to the infidelity of the XX gate.
According to (71), the size of {circumflex over (T)}2(τ) is controlled by
Numerically, for the 300 μs test pulse,
was obtained. Since γ2 is significantly smaller than 10−4, {circumflex over (T)}2(τ) may be neglected. According to (72), the size of {circumflex over (T)}3(τ) is controlled by
For the 300 μs test pulse,
was obtained. Since {circumflex over (σ)}x(j) commutes with {circumflex over (σ)}x(1){circumflex over (σ)}x(2), (35) may be used to estimate the infidelity
According to (73), the size of {circumflex over (T)}4(τ) is controlled by
For the 300 μs test pulse,
was obtained. Therefore, {circumflex over (T)}4(τ) can be neglected.
As a result of this section it has been found that, on the 10−4 level, the first-order terms in the Magnus expansion do not contribute to the infidelity. However, it should be noted that this is only true if the pulse function g(t) satisfies the carrier condition (13). Thus, the carrier condition (13) is an important condition that needs to be required for high-fidelity XX gates.
Now, the second-order terms (65) are evaluated in the Magnus expansion, i.e., Ŵ2(τ) is computed analytically for Ĥ(t) defined in (62) up to fourth order in the Lamb-Dicke parameters η. With the definitions (65) of the operators {circumflex over (T)}αβ(τ), the definition (15) of the gate angle, making use of the carrier condition (13), and the functions defined in (16)-(28),
was obtained, where the operators {circumflex over (T)}αβ, listed only up to fourth order in η, are
The above explicit, analytical results are computed making explicit use of the carrier condition (13).
Since {circumflex over (χ)} in (88) is only a c-number, which causes only a global phase, {circumflex over (T)}11 generates the desired XX gate. All the other operators {circumflex over (T)}αβ in (82)-(96), if not identically zero, are unwanted error operators that generate infidelities. Because of symmetries and the operators that are identically zero, the sizes of only five remaining, non-zero error operators, i.e., {circumflex over (T)}01, {circumflex over (T)}03, {circumflex over (T)}12, {circumflex over (T)}13, and {circumflex over (T)}22 need to be investigated.
The size of {circumflex over (T)}01 is controlled by
For the 300 μs test pulse
was obtained. Thus, on the 10−4 level, {circumflex over (T)}01 can safely be neglected.
Next, {circumflex over (T)}03 is evaluated, which proceeds in analogy to the evaluation of {circumflex over (T)}3(τ) in Section IX. A. The size of {circumflex over (T)}03 is controlled by
For the 300 μs test pulse,
was obtained. Thus, {circumflex over (T)}03 is negligible.
According to (89), the operator {circumflex over (T)}12 consists of two parts, an anti-commutator part and a part that originated from a commutator. The size of the anti-commutator part of {circumflex over (T)}12 is controlled by
The commutator part is controlled by
For the 300 μs test pulse both turned out to be very small. Thus, {circumflex over (T)}12 can be neglected.
The operator {circumflex over (T)}13 in (90) can be split into a diagonal part
and an off-diagonal part
The size of {circumflex over (T)}3(d) is controlled by
For the 300 μs test pulse,
were obtained. Thus, compared to the target infidelity of <<10−4, {circumflex over (T)}13(d) cannot be dismissed outright. However, taking {circumflex over (T)}13(d) as the error operator and since {circumflex over (T)}13(d) commutes with σx(1)αx(2), the infidelity estimate (35) can be used, which involves the squares of {circumflex over (T)}13(d), i.e., the contribution of {circumflex over (T)}13(d) to the infidelity of Û(τ) is expected to be of the order of (γ13(d))2˜10−6. This means that the contribution of {circumflex over (T)}13(d) to the infidelity of Û(τ) can be neglected.
The term {circumflex over (T)}13(o) contains σx(1)σx(2) and thus contributes to over/under rotation of the XX gate, i.e., it contributes to Δχ (see Table III). The operator {circumflex over (T)}13(o) acts in the computational space but also produces phonon excitations. However, according to (105), the two-phonon excitation terms are proportional to Sp(ωq+ωr), which are nonresonant and very small. Assuming that the initial state starts out in the phonon ground state, |0>ph, the operator {circumflex over (T)}13(o) is, to an excellent approximation,
Now, with (15),
With this result,
The prefactor of the αx(1)σx(2) operator is a c-number. Therefore, {circumflex over (T)}13(o) produces a contribution to the gate angle χ. Since {circumflex over (T)}31={circumflex over (T)}13, the total contribution to the gate angle error Δχ is
Numerically, for the N=7 case (see Table II),
was obtained. For χ=π/4, this results in
According to the numerical simulations (see Table III), Δχ≈−0.011 is obtained. Thus, the analytical calculations predict the correct sign (under-rotation) of χ. In addition, the magnitude of the relative error of the analytical prediction is (0.011−9.62×10−3)/0.011≈0.13, i.e., the analytical prediction is only of the order of 10% off.
According to (111), Δχ depends only on the Lamb-Dicke parameters, and not on the gate duration τ. This is reflected in Table III and explains why Δχ in Table III is approximately constant, independent of τ.
Summarizing the results obtained in this Section, it is found that the second-order Magnus-expansion operators yield only two substantial contributions, i.e., the operator {circumflex over (T)}11, which generates the desired XX gate and the operator 2{circumflex over (T)}13 which explains the under-rotation of the gate angle, its approximate independence of the gate time τ, and, approximately, its size, as listed in Table Ill.
At the end of Section VIII, it is noted that Δχ explains a significant contribution to the infidelity of Û(τ), but cannot explain the entire infidelity contribution. Thus, the additional sources of infidelity in the various orders of the Magnus expansion were explored. In this section the Inventors have found that the second order explains only the origin of Δχ, but does not reveal any additional significant sources of infidelity. Since the second order of the Magnus expansion did not reveal these sources, the third order of the Magnus expansion is now investigated, which, indeed, reveals the remaining significant sources of infidelity. In addition, it will be found that this source of infidelity can be eliminated by the addition of a single linear equation to the control-pulse construction protocol.
In this section, Ŵ3(τ) is computed. With the definitions (66) stated at the end of the introduction to Section IX,
was obtained. All operators {circumflex over (T)}jkl up to fourth order in η are listed in Section XIII. There is only a single operator of zeroth order in η, i.e., {circumflex over (T)}000˜η0. It is trivially zero and does not contribute to the infidelity.
There are three operators of first order in η, i.e., {circumflex over (T)}001, {circumflex over (T)}010, {circumflex over (T)}100, where [see Section XIII]{circumflex over (T)}010=2{circumflex over (T)}001, and {circumflex over (T)}100=0. This means that only {circumflex over (T)}001's contribution to the infidelity has to be investigated. With (25), the infidelity caused by {circumflex over (T)}001 is controlled by
For the 300 μs control pulse,
was obtained. Therefore, {circumflex over (T)}001, and with it {circumflex over (T)}010, are negligible. Since {circumflex over (T)}100=0, all operators ˜η1 can be neglected.
There are six operators of second order in η, i.e., {circumflex over (T)}002, {circumflex over (T)}011, {circumflex over (T)}020, {circumflex over (T)}101, {circumflex over (T)}110, and {circumflex over (T)}200. Of these, according to Section XIII, only {circumflex over (T)}011, {circumflex over (T)}101, and {circumflex over (T)}110 are nonzero, and of those, only {circumflex over (T)}011 and {circumflex over (T)}110 are non-negligible. While {circumflex over (T)}011 acts only on the computational space, {circumflex over (T)}110 also has a part that produces phonon excitations. This part, however, is negligibly small. As an overall result of the operators ˜η2, it has been found that the effective error operator corresponding to the sum of the leading parts of {circumflex over (T)}011 and {circumflex over (T)}110 is:
The inventors have checked that all operators of order three and four in η are negligible. Thus, (117) is the only significant error operator that results from the third-order Magnus expansion. It should be noted that this operator acts only in the computational space, not in the phonon space. With (50) and λ=4Φ[η, g], the infidelity contribution of (117) for |ψ0=|00
|0
ph.
was obtained. For the 300 μs test pulse,
was obtained. Thus, with (118),
was obtained. Together with (113), an estimate for the total infidelity of the 300 μs test pulse is obtained according to:
According to Table III, this accounts for about 80% of the infidelity of the 300 μs test pulse. Since, via calibration, Δχ can always be set to zero, generating control pulses that zero out the Φ functional may go a long way to reduce the infidelity. How to generate such control pulses, and that this recipe actually works to suppress the infidelity below 10−4, is shown in the following section.
In Section VIII, it has been argued and proved numerically, that a significant portion of the infidelity can be removed by calibration of the control pulse. Here, it is shown that by eliminating the infidelity due to the Φ-functional (see Section IX. C.), the infidelity can be further suppressed below the level of 10−4. To eliminate Φ, the auxiliary condition:
is added to the AMFM pulse-solver code and obtain new pulses {tilde over (g)}(t) that zero out Φ[η, {tilde over (g)}], defined in (27). That the AMFM code with the condition (122) added produces control pulses {tilde over (g)}(t) with Φ[η, {tilde over (g)}]=0 was confirmed explicitly. As described in Section VIII, {tilde over (g)}(t) may be renormalized (calibrated) such that {tilde over (g)}(t) not only produces Φ[η, {tilde over (g)}]=0, but simultaneously produces Δχ=0. Running the gate-simulator code (see Section V) with the calibrated pulses {tilde over (g)}(t), the infidelities
So far the 7-ion case has been discussed, for which a complete analysis machinery is in place consisting of pulse construction, analytical formulas for error estimates, and a gate simulator that includes all the relevant phonon states (see Section V). The analytical results do not depend on the number of ions N in the chain, i.e., the analytical results are valid for any number of qubits. In particular, as soon as a control pulse is generated (it does not matter whether this is an AM pulse, FM pulse, AMFM pulse, or any other type of pulse), this pulse can immediately be inserted into the analytical formulas, which then may be used to obtain infidelity estimates for this particular N-ion control pulse. This method is illustrated for N=36 by computing the infidelity (118), i.e., the leading source of infidelity, for N=36 uncalibrated control pulses for 2-qubit XX gates between all possible gate combinations (i0, j0), j0=1, . . . , i0−1, i0=2, . . . ,36. This results in 630 gate combinations. The infidelities obtained are displayed in
The histogram in
In this section, the matrix elements of the full Hamiltonian ĤMS are presented as well as the ones of the model Hamiltonians Ĥ(N
The matrix elements of the cosine part of ĤMS are
It can be seen that Cn
are obtained. Now, define
and |ηpj|<<1, it can be seen that Cn
are obtained.
In this section, the results of some third-order commutators Tjkl as defined in (66) with η orders ηm, m≤4 are listed, grouped according to their η order m.
Commutators {circumflex over (T)}jkl˜η0:
Commutators {circumflex over (T)}jkl˜η1:
Commutators {circumflex over (T)}jkl˜η2:
Commutators {circumflex over (T)}jkl˜η3:
Commutators {circumflex over (T)}jkl˜η4:
This application claims priority to U.S. Provisional Application Ser. No. 63/601,783 filed Nov. 22, 2023, which is herein incorporated by reference in its entirety.
| Number | Date | Country | |
|---|---|---|---|
| 63601783 | Nov 2023 | US |