This disclosure relates to managing noise mitigation for quantum networks.
A variety of techniques for quantum error correction (QEC) are used in quantum computers, where a particular quantum computation that is to be performed may be known in advance. For example, error syndromes associated with a code (e.g., a stabilizer code) may be measured and used for error correction. In quantum networks, quantum error correction techniques may be more challenging for a variety of reasons (e.g., the stateful communications occurring between nodes may have associated delays that are not necessarily predetermined). For example, with two-way quantum repeater arrangements that use two-way classical communication for entanglement swap operations, quantum state constituents may be stored in quantum memories for relatively long and/or unknown period of time. Some quantum error management techniques may assume certain arrangements for quantum repeaters (e.g., one-way quantum repeater protocols that do not rely on two-way classical communication), which may reduce the demands on memory storage. The resources available at a node in a quantum network to perform quantum error correction may also change over time depending on the pattern of quantum communication through the network. Techniques other than quantum error correction, such as entanglement purification (also called entanglement distillation), may also be used in some quantum networks.
In one aspect, in general, a method for managing entangled quantum states in a network of nodes comprises: generating a first entangled quantum state characterized by a non-factorable quantum relationship among two or more quantum state constituents comprising (1) a first quantum state constituent stored at a first quantum element at a first node in the network and (2) a second quantum state constituent stored at a second quantum element at a second node in the network; determining a first estimated wait time over which the first quantum state constituent is estimated to be stored at the first quantum element while preserving a fidelity of the first entangled quantum state above a fidelity threshold; and determining a first schedule for performing one or more quantum error management operations over a portion of the first estimated wait time, where the one or more quantum error management operations affect the first quantum state constituent, and where the first schedule is based at least in part on (1) the first estimated wait time and (2) one or more estimated fidelities of the first entangled quantum state associated with one or more candidate quantum error management operations.
Aspects can include one or more of the following features.
The method further comprises updating the first schedule in response to received classical information.
The received classical information is from the first node.
The received classical information comprises at least one of (1) a noise strength or (2) a noise type, associated with a third quantum element at the first node.
The received classical information comprises at least one of (1) a noise strength or (2) a noise type, associated with the first quantum element at the first node.
The received classical information is from the second node.
The received classical information comprises information that an entanglement process in the network failed.
The received classical information is from a third node in the network.
The received classical information comprises information that an entanglement process in the network failed.
The received classical information is from a controller in the network that sends messages to each of a plurality of nodes in the network comprising at least a portion of scheduling information that specifies a procedure to be executed for scheduling entanglement swap operations associated with portions of a plurality of paths through nodes in the network.
The first node and the second node are spatially separated by at least one meter.
The first node and the second node are optically coupled in free space or by an optical fiber.
The estimated fidelity is based at least in part on an estimated noise associated with at least one quantum error management operation.
The first entangled quantum state further comprises a third quantum state constituent.
The third quantum state constituent is stored at a third quantum element at the first node.
The third quantum state constituent is stored at a third quantum element at a third node in the network.
The one or more quantum error management operations comprise a quantum gate operation.
A gate noise characteristic of the quantum gate operation is associated with a fidelity reduction.
The one or more quantum error management operations comprise one or more quantum error correction operations performed using the quantum gate operation in a quantum circuit.
A quantity of the one or more quantum error correction operations in the first schedule is two or more.
The quantity is determined based at least in part on the first estimated wait time.
A quantity of the one or more quantum error management operations in the first schedule is two or more.
The method further comprises determining a second estimated wait time over which the second quantum state constituent is estimated to be stored at the second quantum element while preserving the fidelity of the first entangled quantum state above the fidelity threshold; and determining a second schedule for performing one or more quantum error management operations over a portion of the second estimated wait time, where the one or more quantum error management operations affect the second quantum state constituent, and the second schedule is based at least in part on (1) the second estimated wait time and (2) an estimated fidelity of the first entangled quantum state after at least one of the one or more quantum error management operations.
The one or more quantum error management operations affecting the second quantum state constituent are performed independently from the one or more quantum error management operations affecting the first quantum state constituent.
Each of the quantum error management operations affecting the second quantum state constituent increases the estimated fidelity of the first entangled quantum state.
The one or more quantum error management operations affecting the second quantum state constituent are different from the one or more quantum error management operations affecting the first quantum state constituent.
The one or more quantum error management operations affecting the second quantum state constituent comprise one or more quantum error correction operations having a first code size, and the one or more quantum error management operations affecting the first quantum state constituent comprise one or more quantum error correction operations having a second code size different from the first code size.
The one or more quantum error management operations affecting the second quantum state constituent comprise one or more quantum error correction operations based on a first code, and the one or more quantum error management operations affecting the first quantum state constituent comprise one or more quantum error correction operations based on a second code different from the first code.
A quantity of the one or more quantum error management operations in the first schedule is different from a quantity of the one or more quantum error management operations in the second schedule.
The method further comprises selecting the one or more quantum error management operations from a plurality of types of quantum error management operations that are each configured to use a different quantity of quantum resources available at the first node, based at least in part on a quantity of quantum resources available at the first node before a start of the first estimated wait time.
The plurality of types of quantum error management operations include two or more of: a dynamical decoupling operation configured to use no redundancy quantum elements or ancilla quantum elements, a first decoherence-free subspace encoding operation configured to use no redundancy quantum elements or ancilla quantum elements, a second decoherence-free subspace encoding operation configured to use at least one redundancy qubit and no ancilla quantum elements, or a quantum error correction operation configured to use at least one redundancy qubit and at least one ancilla qubit.
The fidelity of the first entangled quantum state is preserved above the fidelity threshold before an entanglement swap operation is performed on the first entangled quantum state and a second entangled quantum state associated with the second node and a third node in the network.
The entanglement swap operation is performed during establishment of end-to-end entanglement between respective quantum elements in nodes at the ends of a path over a set of N nodes using a set of classical messages transmitted over one or more classical communication channels, where N>3.
The entanglement swap operation is one of a plurality of entanglement swap operations among different respective subsets of nodes in the set of N nodes using pairs of entangled quantum elements in respective pairs of nodes between which entanglement has been established.
Each entanglement swap operation of the plurality of entanglement swap operations comprises performing a joint measurement on a non-entangled pair of quantum elements in a node that is a member of two different pairs of nodes of the respective pairs of nodes.
The fidelity of the first entangled quantum state is preserved above the fidelity threshold before an entanglement purification operation is performed on the first entangled quantum state and a second entangled quantum state associated with the first node and the second node.
The method further comprises modifying a timer associated with an estimated time of decoherence of the first entangled quantum state based at least in part on the first schedule.
The first estimated wait time is based at least in part on an entanglement generation time associated with a second entangled quantum state characterized by a non-factorable quantum relationship among two or more quantum state constituents comprising (1) a third quantum state constituent stored at a third quantum element at the second node and (2) a fourth quantum state constituent stored at a fourth quantum element at a third node in the network. The method further comprises generating a third entangled quantum state characterized by a non-factorable quantum relationship among two or more quantum state constituents comprising (1) the first quantum state constituent and (2) the fourth quantum state constituent, the generating comprising performing a joint measurement of the second quantum state constituent and the third quantum state constituent.
The joint measurement is a Bell state measurement.
An initial estimated fidelity of the first entangled quantum state is determined based at least in part on a message received at the first node, where message comprises a first estimate of a fidelity of the first entangled quantum state, and a timestamp indicating a time associated with the first estimate.
An updated estimated fidelity of the first quantum state is determined based at least in part on a second estimate of the fidelity of the first entangled quantum state determined after the time indicated by the timestamp.
The first estimated wait time is determined after comparing the initial estimated fidelity of the first entangled quantum state to the fidelity threshold.
The first schedule is also based at least in part on the initial estimated fidelity of the first entangled quantum state.
The first schedule is also based at least in part on post-operation estimated fidelities associated with the first quantum state constituent after each of the one or more quantum error management operations.
At least one of the one or more quantum error management operations is a quantum error mitigation operation.
At least one of the one or more quantum error management operations is a quantum error correction operation.
The one or more estimated fidelities of the first entangled quantum state comprise a first estimated fidelity of the first entangled quantum state after a first candidate quantum error management operation associated with a first time, and a second estimated fidelity of the first entangled quantum state after a second candidate quantum error management operation associated with a second time.
The first and second candidate quantum error management operations are the same quantum error management operation associated with different times.
Determining the first schedule further comprises determining a first value based at least in part on the first estimated fidelity and the first time, and determining a second value based at least in part on the second estimated fidelity and the second time.
The first value and the second value are further based at least in part on an initial fidelity of the first entangled quantum state at the beginning of the first estimated wait time.
The first value depends at least in part on a first difference between the initial fidelity and the first estimated fidelity, and the second value depends at least in part on a second difference between the initial fidelity and the second estimated fidelity.
The first value is proportional to the first difference between the initial fidelity and the first estimated fidelity, and the second value is proportional to the second difference between the initial fidelity and the second estimated fidelity.
Determining the first schedule further comprises scheduling the first candidate quantum error management operation to be performed at the first time if the first value is smaller than the second value and if the first estimated fidelity is larger than a third estimated fidelity of the first entangled quantum state at the first time with no candidate quantum error management operation performed.
Determining the first schedule further comprises scheduling the second candidate quantum error management operation to be performed at the second time if the second value is smaller than the first value and if the second estimated fidelity is larger than a fourth estimated fidelity of the first entangled quantum state at the second time with no candidate quantum error management operation performed.
The method further comprises determining an objective function that depends at least in part on (1) the one or more estimated fidelities of the first entangled quantum state, and (2) one or more times associated with the one or more candidate quantum error management operations.
Determining the first schedule further comprises scheduling a candidate quantum error management operation to be performed based at least in part on the objective function.
The scheduled candidate quantum error management operation is associated with the at least one minimum value or the at least one maximum value of the objective function.
Determining the objective function comprises executing one or more machine learning algorithms.
At least one candidate quantum error management operation is not scheduled to be performed during the first estimated wait time.
In another aspect, in general, a method for managing entangled quantum states in a network of nodes comprises: generating a first entangled quantum state characterized by a non-factorable quantum relationship among two or more quantum state constituents comprising (1) a first quantum state constituent stored at a first quantum element at a first node in the network and (2) a second quantum state constituent stored at a second quantum element at a second node in the network; determining, for one or more errors associated with at least the first quantum state constituent, one or more probabilities of the errors occurring over a first time period; and determining a first schedule for performing one or more quantum error management operations over a second time period that starts after the first time period, where the one or more quantum error management operations affect the first quantum state constituent, and where the first schedule is based at least in part on (1) the first time period and (2) an estimated fidelity of the first entangled quantum state after at least one of the one or more quantum error management operations.
Aspects can include one or more of the following features.
The estimated fidelity is based at least in part on an estimated noise associated with at least one quantum error management operation.
The first schedule is also based at least in part on post-operation estimated fidelities associated with the first quantum state constituent after each of the one or more quantum error management operations.
The determining of one or more probabilities of the errors occurring over the first time period is based at least in part on one or more errors affecting at least the first quantum state constituent.
In another aspect, in general, a method for managing entangled quantum states in a network of nodes comprises: generating a first entangled quantum state characterized by a non-factorable quantum relationship among two or more quantum state constituents comprising (1) a first quantum state constituent stored at a first quantum element at a first node in the network and (2) a second quantum state constituent stored at a second quantum element at a second node in the network; selecting a type of one or more quantum error management operations from two or more different types of quantum error management operations, based at least in part on a number of resource quantum elements available at the first node after the first quantum state constituent is stored at the first quantum element; and applying one or more quantum error management operations of the selected type to affect the first quantum state constituent; where at least two of the different types of quantum error management operations use a different number of resource quantum elements.
Aspects can include one or more of the following features.
The set of two or more quantum error management operations comprises a first quantum error management operation that operates on a different number of resource quantum elements than a second quantum error management operation.
The resource quantum elements at the first node include at least one of (1) redundancy quantum elements that are entangled with the first quantum state constituent for a portion of the selected quantum error management operation, or (2) ancilla quantum elements that are not entangled with the first quantum state constituent for a portion of the selected quantum error management operation.
There are no resource quantum elements at the first node and a dynamical decoupling quantum error management operation is selected, the dynamical decoupling quantum error management operation comprising one or more quantum operations that only act on the first quantum state constituent.
The dynamical decoupling quantum error management operation reduces a coupling between the first quantum state constituent and a noise process.
There are no resource quantum elements at the first node and a first decoherence-free subspace encoding quantum error management operation is selected.
The first decoherence-free subspace encoding quantum error management operation comprises at least one of (1) transporting the first quantum state constituent or (2) converting the first quantum state constituent into a quantum element with a longer coherence time.
Transporting the first quantum state constituent comprises moving the first quantum state constituent into an optical cavity.
There is one resource quantum element at the first node and a second decoherence-free subspace encoding quantum error management operation is selected, the second decoherence-free subspace encoding quantum error management operation comprising configuring the one resource quantum element at the first node to be a redundancy quantum element, the configuring comprising applying one or more quantum operations that jointly act on both the first quantum state constituent and the one resource quantum element at the first node to entangle the first quantum state constituent and the one resource quantum element at the first node.
There are two or more resource quantum elements at the first node and a quantum error correction quantum error management operation is selected, the quantum error correction quantum error management operation comprising configuring a first resource quantum element at the first node to be a redundancy quantum element and a second resource quantum element at the first node to be an ancilla quantum element, the configuring comprising entangling the first quantum state constituent and the first resource quantum element at the first node, and applying one or more quantum operations that act on the first quantum state constituent and the redundancy quantum element, where the one or more quantum operations are based at least in part on the ancilla quantum element.
The one or more ancilla quantum elements are measured.
The measurements of the ancilla quantum elements provide information associated with errors in the first quantum state constituent.
The method further comprises applying one or more quantum operations that act on one or more redundancy quantum elements and the first quantum state constituent, where the one or more quantum operations are based at least in part on the information associated with errors in the first quantum state constituent.
The method further comprises, after measuring one or more ancilla quantum elements, configuring at least one of the measured ancilla quantum elements to be a reset ancilla quantum element prepared in a predetermined quantum state and applying one or more quantum operations that act on the first quantum state constituent and the redundancy quantum element, where the one or more quantum operations are based at least in part on the reset ancilla quantum element.
The information associated with errors in the first quantum state constituent includes information that an error has occurred.
The information that an error has occurred specifies one error.
The information that an error has occurred specifies two or more possible errors.
The measurements of the ancilla quantum elements provide information also associated with errors in one or more of the resource quantum elements.
At least one of the resource quantum elements at the first node are configured to be one or more redundancy quantum elements by being operated on by a set of encoding quantum operations and a set of decoding quantum operations that are the inverse to the set of encoding quantum operations.
The set of encoding quantum operations includes one or more controlled unitary quantum gates.
The redundancy quantum elements are entangled with the first quantum state constituent after being operated on by the set of encoding quantum operations.
The redundancy quantum elements are not entangled with the first quantum state constituent after being operated on by the set of decoding quantum operations.
The redundancy quantum elements are configured to be resource quantum elements after the set of decoding quantum operations.
The set of encoding quantum operations encode the first quantum state constituent into a decoherence-free subspace that reduces a coupling between the first quantum state constituent and a noise process.
Selecting a type of one or more quantum error management operations from two or more different types of quantum error management operations is also based at least in part on at least one of a set of quantum gate operations available at the first node, a type of quantum elements at the first node, a connectivity of quantum elements at the first node, or one or more classically conditioned resources at the first node.
Selecting a type of one or more quantum error management operations from two or more different types of quantum error management operations is also based at least in part on a connectivity of the resource quantum elements available at the first node.
In another aspect, in general, an apparatus at a first node in a network of nodes comprises: a quantum memory system comprising: an interface configured to receive an electromagnetic wave from a transmission medium, and a coupling component configured to couple one or more photons from the interface to a first quantum element at the first node configured to store a first quantum state constituent of a first entangled quantum state characterized by a non-factorable quantum relationship among two or more quantum state constituents, the quantum state constituents comprising (1) the first quantum state constituent and (2) a second quantum state constituent stored at a second quantum element at a second node in the network; a quantum processing system comprising: control circuitry configured to perform one or more quantum error management operations affecting the first quantum state constituent, and one or more resource quantum elements at the first node, where at least one of the quantum resource elements is configurable to be coupled to the first quantum element; and at least one processing unit, the processing unit configured to manage the one or more quantum error management operations, the managing comprising at least one of: providing a first schedule for one or more quantum error management operations affecting the first quantum state constituent, where the first schedule is based at least in part on (1) at least a portion of a time over which the first quantum state constituent is stored at the first quantum element and (2) an estimated fidelity of the first entangled quantum state after at least one of the one or more quantum error management operations, or providing a type of one or more quantum error management operations selected from two or more different types of quantum error management operations based at least in part on a number of the resource quantum elements available at the first node after the first quantum state constituent is stored at the first quantum element.
Aspects can include one or more of the following features.
One or more of the available resource quantum elements at the first node in the network are configured to be one or more redundancy quantum elements, the configuring comprising operating on at least one resource quantum element with a set of encoding quantum operations and a set of decoding quantum operations that are the inverse to the set of encoding quantum operations.
The set of encoding quantum operations includes one or more controlled unitary quantum gates.
The one or more redundancy quantum elements are entangled with the first quantum state constituent after being operated on by the set of encoding quantum operations.
The one or more redundancy quantum elements are not entangled with the first quantum state constituent after being operated on by the set of decoding quantum operations.
The one or more redundancy quantum elements are configured to be resource quantum elements after the set of decoding quantum operations.
The one or more redundancy quantum elements are used in a decoherence-free subspace encoding.
One or more of the available resource quantum elements at the first node in the network are configured to be one or more ancilla quantum elements that are measured.
The measurements of the one or more ancilla quantum elements provide information associated with errors in the first quantum state constituent.
The first schedule is also based at least in part on one or more measurements of one or more ancilla quantum elements.
The measurements provide information comprising at least one of (1) a noise strength or (2) a noise type associated with the first quantum state constituent.
The information provided by the measurements comprises a measured noise strength differing from an estimated noise strength prior to the measurements, and the estimated noise strength is updated based at least in part on the measured noise strength.
The control circuitry is also configured to perform one or more quantum error management operations affecting the first quantum state constituent based at least in part on classical information.
The electromagnetic wave comprises an optical wave.
The interface comprises one or more polarization elements.
The one or more polarization elements compensate for changes in a polarization of the electromagnetic wave.
The coupling component transduces one or more photons into one or more quantum elements in the network of nodes.
The interface is further configured to transmit a second electromagnetic wave, received from the coupler component, to the transmission medium.
Aspects can have one or more of the following advantages.
Techniques for noise mitigation in quantum systems (e.g., quantum computing systems, or quantum networking systems) in some cases involve reducing the impact of noise associated with certain quantum operations or certain quantum components, even when full quantum error correction is not being performed (e.g., quantum error correction that enables fault-tolerant quantum computing and communications). In addition to that type of quantum noise mitigation, the techniques described herein also support quantum error management that is able to adapt to dynamic conditions and changing availability of resources for mitigating and managing errors that can result from noise (e.g., gate noise, photon loss, and other sources of fidelity reduction, including long wait times in quantum memories). Such adaptive quantum error management is able to adapt to select different types of error management (e.g., different procedures, different modes of execution, and/or different degrees of correction). For example, some types of error management (e.g., procedures using dynamical decoupling) may not require use of any resource quantum elements. Some types of error management (e.g., procedures using decoherence-free subspace encoding) may use redundancy quantum element(s) but not ancillary quantum elements, as described in more detail below. Other types of error management (e.g., quantum error correction) may use both redundancy quantum element(s) and ancillary quantum element(s). Another example of the adaptive nature of the quantum error management described herein is adapting to apply different degrees of quantum error correction (e.g., different code lengths) depending on the quantity of available resource quantum elements, and/or other resources, at any given time.
Some of the example local QEC schemes, when used in the context of a quantum networking protocol, may: protect long-range entanglement with no additional protocol overhead, dynamically utilize available local quantum resources, detect local errors, report loss of coherence to the higher layers of the protocol, and/or be used with other mitigation strategies (such as dynamical decoupling) as an integral component of a broader quantum error management strategy.
Some of the disclosed schemes can significantly improve the overall performance of current generation quantum networks and could be used alongside future fault-tolerant quantum network protocols and to bridge the performance gap between current and future (e.g., Generation-2+) quantum repeaters.
Extending the effective coherence time of the shared quantum states may therefore reduce the performance overhead and improve protocol metrics. Other useful scenarios include providing buffering that can be used by the quantum network stack to fulfill requests from the application (such as teleportation).
Some of the example QEC circuits disclosed have roughly the same local resource requirements as purification circuits, which are assumed to be available in first generation networks, but have no additional channel and protocol overhead. Such approaches can be used to increase the effective quantum memory coherence time of the protected memories as well as to detect loss of coherence.
In some implementations of the techniques described herein, a quantum memory system is configured to apply various kinds of quantum error management techniques to ensure high fidelity of the potentially entangled quantum states associated with the quantum state constituent that may be stored in a quantum element of the quantum memory system (also referred to herein as simply a “quantum memory,” or a “memory”). For example, in addition to an interface that is configured to receive and/or transmit an electromagnetic wave from a transmission medium, and a coupling component configured to couple one or more photons between the interface and the quantum element, there may also be other components and circuitry for performing quantum operations. A quantum processing system may be integrated within the quantum memory system to provide additional quantum resource elements and control circuitry used to perform quantum error management operations affecting the quantum state constituent stored in the coupled quantum element and quantum states of the resource quantum element. Alternatively, the quantum memory system may be coupled to a separate quantum processing system that is able to provide the control circuitry and resource quantum elements used to perform the quantum error management operations. In some examples, the quantum state constituent stored in the quantum element of the quantum memory system may be transferred to one or more quantum elements in a quantum processing system and then acted upon by quantum operations by the quantum processing system.
In some examples, local errors may be mitigated without the need for distributed operations or other coordination between different nodes, which can be desirable in a quantum networking protocol.
Other features and advantages will become apparent from the following description, and from the figures and claims.
The disclosure is best understood from the following detailed description when read in conjunction with the accompanying drawings. It is emphasized that, according to common practice, the various features of the drawings are not to-scale. On the contrary, the dimensions of the various features are arbitrarily expanded or reduced for clarity.
One challenge in quantum networking is the mitigation of noise during entanglement distribution and subsequent data transmission. Herein, some of the methods and apparatuses disclosed perform quantum error correction (QEC) in the context of quantum networking. Some of the examples disclosed may be useful for noise management even in near term quantum nodes with a limited number of quantum memories which may not support general fault-tolerant operation. In some examples, efficient (i.e., short) QEC codes are tuned to the dominant noise of the quantum memories and adaptively scheduled as a noise management mechanism to protect the stored quantum state. Some of the example local QEC schemes fit well within a quantum networking protocol as they may: protect long-range entanglement with no additional protocol overhead, dynamically utilize local quantum resources, report loss of coherence to the higher layers of the protocol, and/or be used with other mitigation strategies (such as dynamical decoupling) as an integral component of a broader quantum error management strategy. In some examples, fidelity of a quantum state is used as an indication of how close that quantum state is to an associated ideal quantum state (e.g., with fidelity of 1 being the highest fidelity corresponding to the ideal quantum state, and a fidelity at or close to 0 being the lowest fidelity, which may correspond to a situation in which decoherence or other factors cause deviation from the ideal quantum state).
In some examples, common fluctuator dephasing (CFD) QEC codes for nitrogen-vacancy (NV) center memories (or other color center memories based on point defects in a lattice) may be utilized by adapting a logical state encoding to a distributed context. The efficacy of some example schemes are validated by prophetic simulations which show significant increases in the effective coherence times of protected quantum states. The disclosed schemes can therefore significantly improve the overall performance of current generation quantum networks and could be used alongside future fault-tolerant quantum network protocols and to bridge the performance gap between current and future (e.g., Generation-2+) quantum repeaters.
In some examples, a core requirement for the transmission of quantum data in a quantum network may be the establishment of end-to-end entanglement between a source and destination node prior to teleportation of the application data. Often, the end-to-end entanglement is established link-wise and then bound together using entanglement swapping operations.
There are several scenarios within a quantum networking protocol where the ability to buffer and protect distributed entanglement is useful. For example, a frequent scenario arises whereby entanglement has been established on one side (A) of a quantum repeater and the protocol must wait for entanglement to be established on the other side (B) before performing the entanglement swap. During this wait time, the A-side entanglement is experiencing decoherence, which may result in a need to either restart the protocol or perform a round of purification if the estimated fidelity drops too low. Purification generates (and sacrifices) additional entanglement to boost the primary entanglement fidelity, but at an additional quantum resource and protocol messaging cost which increases with entanglement distance. Extending the effective coherence time of the shared quantum states may therefore reduce the protocol overhead and improve performance metrics. In some examples, when an effective coherence time is extended, a timer associated with tracking coherence (e.g., the “decoherence timer” described in more detail below) can be modified based on least in part on the extending (e.g., a time delay associated with the timer can be extended and/or set to a time based on a determined schedule for performing one or more quantum error management operations). Other useful scenarios include providing buffering used by the quantum network stack to fulfill requests from the application (such as teleportation). Dynamical decoupling (DD) and decoherence-free subspace (DFS) encoding are also techniques for mitigating decoherence. An open system may experience decoherence corresponding to non-unitary evolution. But, an open system that is decoherence-free has purely unitary evolution, corresponding to a subspace of its Hilbert space that is decoupled from the environment. Encoding states based on such subspaces can be used for quantum error mitigation. With dynamical decoupling, sequences of operations can be used to suppress decoherence by approximately averaging coupling between the system and the environment to zero.
Quantum error correction (QEC) may be used to improve noise robustness by encoding physical qubits into logical qubits in a larger state space, thereby introducing redundancy and providing the ability to detect and potentially correct errors. QEC is considered to be an important aspect of fault-tolerant quantum computation and therefore typically considered in the context of future large-scale quantum computing platforms and future generations of quantum networks. In a deployed quantum networking scenario with connections being dynamically created and destroyed, there may be opportunities to leverage unallocated quantum resources for local QEC-based noise management, even if the error correcting codes are unable to correct general errors. Thus, some of the examples disclosed herein may use small QEC circuits in the current generation of memory-based quantum repeaters as a noise management mechanism for quantum memories which are holding distributed quantum data (e.g., shared Bell states) where the dominant class of noise is known. The performance advantages of such approaches and how they fit well within the context of a quantum networking protocol are also discussed. Some of the example QEC circuits have roughly the same local resource requirements as purification circuits, which are assumed to be available in first generation networks, but have no additional channel and protocol overhead. Such approaches can be used to increase the effective coherence time of the protected states as well as to detect errors.
The direct detection of errors can inform the higher-layer protocol to reset entanglement as opposed to operating under an assumption of coherence based on an analytic estimate of the coherence time. The active correction of errors allows the quantum memories holding shared entanglement to be periodically “refreshed” in a way loosely analogous to classical DRAM memories. The local QEC scheme can be used in many ways in a quantum networking protocol, such as protecting entanglement while waiting for application-level qubits to arrive for teleportation, slowing the decoherence of short-range entanglement waiting for purification, and can be used alongside other mitigation strategies (such as dynamical decoupling) as an integral component of a broader noise management strategy.
Stabilizer operations may be determined by encoding qubit states into a larger logical state space ψL and identifying stabilizer operators which stabilize the logical state Us|ψL=|ψL
, commute with each other, and anti-commute with the expected local errors (e.g., USE=−EUs). The local stabilizers may be applied to protect the associated logical encoded state from noise that is encountered while waiting for the protocol to retrieve the stored quantum state for swapping or other operations.
Referring to
Referring to
Consider a distributed Bell state such as
which is then locally encoded on each node (e.g., in a quantum memory in a quantum network), resulting in a restricted class of logical states of the form ψL=|ϕAϕB
+|ϕA′
|ϕB′
where
that define the logical qubit encoding on each side. By using local stabilizers US,A∈SA on node A and US,B∈SB on node B, such that
this allows the complete distributed state to be stabilized locally since
In some examples, the stabilizers in SA all commute with each other, and the stabilizers in SB all commute with each other, so that they can jointly stabilize a non-trivial code subspace. This local stabilization property means that local errors may be mitigated without the need for distributed operations or other coordination between nodes, which can be desirable in a quantum networking protocol. After entanglement generation, each node can perform local noise management to protect the shared state while waiting for subsequent stages of the entanglement distribution protocol. Note that US,A and US,B can in general detect different error types, which means the local QEC mitigation scheme can be used in scenarios with heterogeneous idle noise environments across the nodes.
For illustration purposes, consider bit flip and phase flip noise repetition codes. For a 3-qubit bit flip code, the encoded state can be written as
which has A-side stabilizers ZZIIII, IZZIII, ZIZIII and B-side stabilizers IIIZZI, IIIIZZ, IIIZIZ. The simultaneous application of an A-side and B-side stabilizer results in additional valid stabilizers, which means the nodes can act independently. Similarly for a 3-qubit phase flip code, the encoded state can be written as
with A-side stabilizers XXIIII, IXXIII, XIXIII and B-side stabilizers IIIXXI, IIIIXX, IIIXIX. Recall that
In each case, the stabilizer operations anti-commute with the expected local errors {Z, X}=ZX+XZ=0 and the local stabilizers are able to stabilize the complete logical distributed state.
where mi is associated with the ancillary qubits of the first node (controlling the stabilizers) and ni is associated with the ancillary qubits of the second node since the Hadamards generate a uniform superposition from the initial |00 . . . |00 . . .
state. The states in the superposition where the ancillary qubits are in the |1
state will enable the corresponding controlled stabilizer operation US,i or US′,i. After the controlled stabilizer operations, the state becomes:
Note that the stabilizer unitaries are only enabled where the corresponding mi or ni control qubits are |1—this is analogous to the two qubit code case discussed later. The application of a local stabilizer operation has implied identity (I) operations at other locations in the circuit but these are suppressed for clarity. Before writing the state after the final Hadamard operation in the stabilizer circuit, it is noted that: (1) after the final basis transformation, the amplitude from each original basis state |m0m1 . . . mi . . .
|n0n1 . . . ni . . .
will make a contribution to all output basis state amplitudes, and (2) amplitudes which are indexed by mi=1 or ni=1 (non-zero bitfields) in the original basis have the possibility of a negative contribution due to the action of the Hadamard gate, but the negative sign is only assured when the corresponding index ki=1 or li=1 because this is the portion of the output superposition where the sign change actually occurred in the new basis. The output state can be written as:
where m=Σi2imi, n=Σi2ini and m·k and n·l are the inner products of index bitstrings. Note this is analogous to the two qubit case. Local errors may be detected due to the anti-commutation of the error(s) with the local stabilizers—this results in sign changes/permutations in Eq. 3, causing all terms to vanish except the term where the ancillary registers |k)∥) measure the corresponding error syndrome. Since the restricted class of logical states can be stabilized locally and, in this example, only local errors are assumed, the local QEC scheme can detect and correct errors on both nodes independently/concurrently and the local QEC framework can incorporate any existing QEC code and define a distributed version of it for protecting shared Bell states.
In some scenarios it may be possible to reduce the number of ancillary qubits needed to control the stabilizer circuits by executing the stabilizer operations sequentially in time. Since the stabilizer operations do not collapse the protected state, they can be run sequentially in time instead of in parallel. The measurement result of the first stabilizer may be stored in a classical register and concatenated with the subsequent stabilizer measurement results. Once all measurements are collected the error syndrome is known and the correction circuit can be run. This represents a time/space trade off that can save on the number of required local quantum memories by incurring a longer time needed to execute the stabilizer circuit.
Common fluctuator dephasing (CFD) is a noise environment (i.e., model) that corresponds to phase noise experienced by storage qubits (e.g., nuclear spin qubits) by the action of spin defect communication qubits in an NV center quantum memory with error Hamiltonian HE=g1Z1+g2Z2. CFD is an example of a possible dominant noise environment of quantum memories, including in quantum memories not comprising NV centers, and hardware-efficient QEC codes may be chosen to address such noise in quantum memories. Let g1 and g2 be the coupling strengths and
with
and g+≡√{square root over (g1+g2)} and g−≡√{square root over (g1−g2)}. The logical states of this hardware-efficient code are |0L, =|χ0
|0
and |1
L=|χ1
|1
with stabilizer
where |χ0=c(g_eiθ
+g+eiθ
) and |χ1
=c(g+eiϕ
+g_eiϕ
χ0|χ1
=0 and sets up the expected stabilizer behavior US|0
L=Uz|χ0
⊗Z2|0
=|0
L and similarly US|1
L=Uz|χ1
⊗Z2|1
=−|χ1
⊗−|1
=|1
L. The error correction operation implements the unitary Ux=|χ0
χ1|+|χ1
χ0|.
The stabilizers and errors do not necessarily anti-commute over the entire Hilbert space but do over the logical code space. Let ψL=α|0L+β|1
L be an arbitrary logical qubit, then E|0
L=k|χ1
|0
and E|1
L=k|χ0
|1
where k is some proportionality constant. Error operations on the logical qubit result in EψL=αk|χ1
|0
+βk|χ0
|1
. Continuing. USEψL=[(|χ0
χ0|−|χ1
χ1|)⊗Z2](αk|χ1
|0
+βk|χ0
|1
)=−βk|χ0
1|−αk|χ1
0|. Therefore USEψL=−EψL=−EUSψL which shows the stabilizers and errors anti-commute over the code subspace.
In general, the CFD QEC code described above can be adapted to protect a Bell state shared across two network nodes (denoted A and B). Without loss of generality to other Bell states, for illustration purposes a ϕ+ Bell state is analyzed. In order to construct a distributed version of the code, an initial distributed state
is constructed. By defining a local mapping, UE:|χ0→|χ1
, by using controlled operation c-UE the logical distributed state can be constructed as:
herein referred to as the CFD encoded state. This CFD encoded state can be re-written as:
with qubit re-ordering and it can be shown that US,A⊗IB, IA⊗US,B, and US,A⊗US,B stabilize the logical state (i.e., the local, single-sided stabilizers can stabilize the distributed logical state).
The example CFD encoder and decoder circuits use an encoding unitary UE which maps |χ0→|χ1
. Using simplified expressions for these states:
|χ0=α0|0
+β0|
, |χ1
=α1|0
+β1|1
, and assuming UE is a unitary matrix of the form:
then the following matrix expression can be solved (analytically or via a solver) for a, b, and ¢ to get the desired mapping from |χ0→|χ1
:
Since UE†UE|χ0=UE†|χ1
, the decoder unitary is UE† because it performs the reverse mapping |χ1
→|χ0
. This encoding creates the distributed logical state
which can be stabilized locally on each node.
so there is an implicit unitary operation Uχ
→|χ0
, where
Local QEC operations may be used within a broader quantum error management strategy which, for example, optimizes the scheduling of actions appropriate for the noise environments of the quantum memories holding the entanglement and the available local resources available for encoding logical states for QEC. Consider a ϕ+ state distributed across two nodes A and B with each node experiencing an idle noise of type NA and NB respectively over a wait time of ΔtW. The scheduling algorithm may optimize the following:
where SA*={(A0, t0), (A1, t1), . . . , (AN-1, tN-1)} is a schedule of actions for node A (with an analogous schedule of actions SB* for node B) which are chosen (in some examples, optimized) to increase (in some examples, maximize) the fidelity F of the decoded state at the end of the wait time. The set of possible actions A may include the application of a QEC code circuit, a no-op (i.e., do-nothing), or some other noise management action(s) (e.g., A={no-op, QEC0, QEC1+M, . . . , M}, where M represents another mitigation strategy (such as dynamical decoupling) operating in tandem). The actions may be constrained by, for example, relevance to the noise type and/or if they are able to be executed with available quantum (and/or classical) resources on the node during the wait time. The node-dependent system parameters may be outside user control and can include parameters such as idle noise type, one and two qubit gate noise strengths and times: θ={idle,
G
G
In many cases it may be sufficient or beneficial to return a simplified version of the schedule switching between actions defined by a start time, repetition time, and maximum cutoff time, (e.g., SA*=(Ck*, δtqec, tstart, tmax) where Ck* is the selected QEC code). In some examples, a schedule (possibly optimized) may be computed by a network controller or locally by the nodes and may account for crossover points where one schedule outperforms another at specific noise thresholds. An example optimized schedule may, in some cases, achieve the convex hull of the fidelity curves associated with all valid schedules, thereby maximizing the fidelity at each point in time, since waiting times may be interrupted in a dynamic network protocol with stochastic operations. The scheduling may therefore be adaptive in two ways: (1) in the choice of the mitigation action, such as selection of a QEC code with specific size and execution mode (e.g., parallel or sequential), based on availability of local resources and (2) the generation of a time-varying schedule optimizing the expected benefit of QEC at each point in time during the wait interval while accounting for the gate noise cost.
In some examples (e.g., codes with a limited error correction capacity and therefore small code distance), the scheduling algorithm may take such limitations into account as errors accumulate during the idle wait time. Additionally, the impact of operational gate noise may be included in order to be applicable in realistic environments.
Consider an initial mixed state which has been encoded into a logical state ρL and has components which include the desired (logical) Bell state, a correctable subspace ρc, and an uncorrectable subspace ρu. This initial state has fidelity F=ΦL+|ρ|ΦL+
=ρϕ assuming the error subspaces are orthogonal to the Bell state. The logical state ρL can then be written as:
After some time delay τ the state evolves toward a new distribution ρτ. Note that pc(τ) represents the probability that the number of errors which occurred during the delay time τ does not exceed the number correctable by the code. Then ρτ can then be written as:
After the QEC circuit is executed, the state becomes ρqec=UρτU†, where U is the QEC circuit operation. Since the QEC circuit stabilizes the logical Bell state, the Bell state component will remain unchanged. The correctable subspace ρc will be transformed into the desired Bell state and the post-QEC state will be:
which can be re-written by combining terms as
where pϕ′(τ)=pϕ(τ)+pc(τ). The re-written form highlights that the post-QEC state comprises the Bell state and the uncorrectable subspaces. Therefore, a time delay may be implemented before the next QEC execution, thus allowing more correctable errors to accumulate in order to derive more benefit from QEC.
In some examples, the goal of QEC may be to optimize (e.g., increase or decrease) some metric associated with the post-QEC fidelity F(ρqec, |ΦL+ΦL+|). Assuming the error states are orthogonal to the target Bell state
where {tilde over (F)}qec(τ) is the idealized post-QEC fidelity which excludes the fidelity cost associated with the QEC circuit operations and F(·) is the fidelity operator.
After defining the idealized post-QEC fidelity, the expected negative impact of gate noise E{δFg(θ)} may be taken into account. The net post-QEC fidelity can be conservatively estimated as follows:
where δFg(θ) is the expected fidelity decrease due to gate noise which is parameterized by system parameters θ. In some examples, one or more machine learning algorithms can be used to improve the modeling of the impact of gate noise (e.g., the reduction in fidelity) of the QEC circuits. For example, modeling the expected negative impact of gate noise as a constant value can be a conservative approach that is more accurate when the input density state has a higher probability of being correctable, but such an approach can become less accurate as the probability of the input density state being uncorrectable increases. The modeling of the impact of gate noise may also be performed analytically or via a hybrid method (e.g., a machine learning algorithm determines the values of the parameters of an analytic model associated with the impact of gate noise).
In some examples, in order for a QEC operation to be scheduled, it is estimated that the QEC operation will provide a benefit over idle operation (i.e., no QEC operation being performed). In such examples, the following condition holds:
An optimal time delay, τopt, which optimizes a chosen metric (also referred to as an objective function) associated with the post-QEC fidelity, can be determined by finding or estimating the critical points (e.g., minima or maxima) of this metric as a function of the time delay, τ. For example, a metric which minimizes the rate of fidelity loss may exhibit local minima and may be defined as follows:
where F0 is in the initial fidelity (i.e., at the beginning of a cycle or estimated wait time), Fqec(τ) is the post-QEC fidelity that accounts for gate noise, and τopt is the optimal time delay, which is less than or equal to™ax. Other example metrics that are associated with the post-QEC fidelity can depend on one or more differences between (1) the initial fidelity and (2) one or more estimated fidelities associated with one or more candidate quantum error management operations. Some example metrics may depend on the one or more such differences raised to a power different than one (e.g., (F0−Fqec(τ))2) and/or may inversely depend explicitly on t raised to a power different than one (e.g., τ1/2). In some examples, the metric can depend on a sum of such differences raised to different powers and with different inverse dependencies on T
where α and β are constants). The inverse explicit dependence of some metrics on τ may be used to enforce an objective/goal for performing fewer quantum error management operations. For example, it may be undesirable to perform many quantum error management operations because of the computational resources needed or because of the delay imposed on future operations in the quantum network.
In general, determining two or more values associated with a metric (i.e., objective function) may comprise determining a first value based at least in part on a first estimated fidelity and a first time, and determining a second value based at least in part on a second estimated fidelity and a second time. Determining a schedule for one or more quantum error management operations can include scheduling a quantum error management operation to be performed based at least in part on the objective function. In some examples, the scheduled quantum error management operation is associated with at least one minimum value or at least one maximum value of the objective function.
In some examples, one or more machine learning algorithms may be utilized to determine or update a metric (i.e., an objective function) associated with selecting an optimal delay time, τopt, from a set of possible times for one or more QEC cycles. For example, a parameterized metric that includes scaling factors and/or polynomial powers could be optimized by a machine learning algorithm that determines values for the scaling factors and/or polynomial powers (e.g., based on current experimental conditions or other information). In some examples, the metric can be modified (i.e., adapted) for each QEC cycle. Inputs to the optimization may include initial fidelity, system parameters associated with idle and gate noise, or one or more probability distributions of overall wait time. The machine learning algorithms may be trained utilizing data associated with simulation results or from experimental data.
In some examples, the pϕ(τ), pc(τ), and pϕ(τ) curves may be analytically computed, pre-computed from previous simulations modeling the target environment, or estimated from simulated or actual state tomography information. One way to simulate these curves is to simulate the noise and, for each Δt timestep, project the noisy idle state ρτ onto the ϕL+, ρc, ρu basis. Alternatively, for specific codes and known idle noise generation rates, the probability the state is correctable may be computed and used for pc(τ). It is interesting to note that in some examples, if the initial state had a large enough bias toward correctable states, then it may be more advantageous to schedule the first QEC operation immediately.
Referring again to
Referring again to
Consider the three-qubit code with parameters [n, k, d]=(3,1,3) which can detect 2 errors but only correct a single error. The n parameter is the number of physical qubits used in the code for constructing the logical state, the k parameter is the number of logically encoded qubits (kin), and d is the code distance, which is related to the number of errors the code can detect (d-1) and the number of errors the code can correct (d-2). Also consider an idle noise source which produces errors with probability pe=1−e−αt. The probability that no errors occur is pϕ(τ)=e−ατ, and the probability of a single (correctable) error occurring can be calculated by considering all permutations of errors on the qubits comprising the logical state (i.e., [error, no error, no error], [no error, error, no error], and [no error, no error, error]), which results in a probability of pc(t)=3pe(1−pe)2=3 (1−e−ατ) e−2ατ. Using these probabilities, the scheduling of QEC operations may be performed using methods discussed above.
In some examples, a given idle and gate noise environment can be simulated or emulated and the corresponding fidelity decay curves (i.e., fidelity vs time) can be computed for later use in a deployed environment. In order to utilize these pre-computed curves in a deployed environment where the wait times are known, the schedule which exhibits the highest fidelity at the expected wait time is selected. When utilizing these pre-computed curves in a deployed environment where the wait times will be unknown, decay curves may be simulated in a dependent way, an example of which is discussed below.
First, the fidelity-vs-time curve may be simulated for the case where no action is taken (i.e., no QEC operations are performed within the wait duration), resulting in the F0(t) curve. Next, the F1(t) curve may be simulated (i.e., the curve associated with the execution of one QEC circuit during the wait time), followed by calculating the cross-over time τopt
In some cases, the local quantum memories at some nodes may be idle (i.e., not used for holding entanglement). In this case, these resources may used to estimate the noise error rate on the memories by placing the memories into a known state and using a short code to detect errors. By varying the wait time of the detection, an estimate of the noise error rate could be obtained. The node may then communicate with the agent if this rate goes outside the expected range, for example.
Referring to
Referring to
Referring to
Referring to
In some examples, the fidelity of a shared Bell state between Alice and Bob may also be degraded by adding additional gate operations, which add additional noise. Determining the threshold at which additional gate operations in a QEC code add more noise than they remediate may be important for creating a practical quantum error management scheme, where decisions can be made based in part on particular network and node parameters on which error mitigation protocols to run or not run. At a certain threshold, use of a QEC circuit may introduce more noise than it will mitigate.
QEC codes can be applied simultaneously to different quantum nodes sharing entanglement. This is possible even with different noise types and different QEC codes for each node.
Referring again to
Local QEC/noise management is well-suited for quantum networking protocols and can be applied for multiple use cases within this context. Protecting entanglement during swapping protocols and teleportation can significantly improve performance metrics. For illustration purposes, the results were shown for bipartite entanglement, however, the results generalize to the multipartite case, thus allowing the protection of n-party entanglement arising in applications such as quantum switches supporting all-to-all connectivity with heterogeneous noise types at each node. The ability of local QEC to protect long-range entanglement without additional protocol overhead is an advantage over purification methods, although it does not preclude the use of purification since they can be used in tandem. For example, local QEC could be used to slow decoherence of shared entanglement while waiting for purification to run allowing it to operate in the lower fidelity regime with a larger coherence time improvement.
The methods described herein may use algorithms for optimal scheduling of mitigation actions given the available resources and noise environment. This may include determining sequential and/or parallel stabilizer schedules, adaptive encoding, and crossover regimes where one mitigation method/schedule outperforms the others. Large scale quantum networks may use a variety of quantum error management tools in order to achieve sufficiently high fidelity Bell states via end-to-end entanglement generation for reliable quantum communication.
The following Examples show how the adapted CFD code exhibits properties that may allow it to operate as a valid QEC code for protecting Bell states shared between nodes A (Alice) and node B (Bob). Without loss of generality and for illustrative purposes, the shared state considered in the following examples is the ϕ+ Bell state.
Example 1: Let Uz≡(|χ0χ0|−|χ1
χ1|). The stabilizer Us=Uz⊗Z stabilizes
the encoded states |0≡|χ0
|0
and |1
L≡|χ1
|1
if
χ0|χ1
=0.
Example 2: A CFD encoded state of the form
can be constructed from an initial state of the form ψ0=|χ0A|χ0
Bϕ+=|χ0
A|χ0
B(|0
A|0
B+|1
A|1
B) using a controlled encoding operation UE which maps |χ0
→|χ1
.
Example 3: A CFD encoded state of the form
can be stabilized using local stabilizers US,A⊗IB, US,B⊗IA, and US,A⊗US,B where US,A=US,B=Uz⊗Z.
Example 4: Let |0L≡|χ0
|0
and |1
L≡|χ1
|1
represent logical states within the code subspace C0. Let HE represent the error Hamiltonian mapping code space states to error subspace C1 states: HE|0
L=k|χ1
|0
≡|0
E HE|1
L=k|χ0
|1
≡|1
E where k is a proportionality constant. The local stabilizers US=Uz⊗Z2 (applied to A and/or B sides) anti-commute with the local errors EA, EB over CFD logical states |ψL
:
Example 5: Let |0L≡|χ0
|0
and |1
L≡|χ1
|1
represent logical states within the code subspace C0. Let HE represent the error Hamiltonian mapping code space states to error subspace C1 states: HE|0
L∝|χ1
|0
≡|0
E HE|1
L∝|χ0
|
≡|1
E. The correction unitary Ux=|χ0
χ1|+|χ1
χ0| corrects errors by mapping Ux:|0
E→|0
L and Ux:|1
E→|1
L if
χ0|χ1
=0.
From these Examples, we can see that our adaptation of the CFD code for protecting distributed entanglement works in a similar way to a repetition code with respect to the stabilizer properties and ability to detect (and in this case correct) errors. This follows from the Examples above: in Example 1 the stabilization of logical qubits is established, whereas in Example 3 the ability to stabilize the full distributed/encoded state using local stabilizers is shown. The construction of the encoded state is established in Example 2 and the ability to correct local errors is shown via Example 4. The detection of local errors using local stabilizers has the same structure as Eq. 22.
The encoded state after the first CNOT operation on each endpoint is (suppressing normalization factors hereafter for clarity):
The logical state to protect is
and so then ψEnc=ψL|0A|0
A′. Also let {tilde over (ψ)}L≡EψL where E is some error(s) occurring on q0, qR, q1, and/or qR′ assuming no gate noise on the stabilizer operations. Note that ψL is decodable back to the usable ϕ+ state with additional CNOT operations on each side. After applying the first Hadamard of the stabilizer circuits on each side the state will become:
The terms where qA and qA′ are |1 will generate control signals to enable the stabilizer operations US in q0, qR, and US′ on q1, qR′ and so the state will become:
Finally, after applying the last Hadamard operation in the stabilizer circuits the state will be:
The two-qubit code results from the previous section can be applied to the special case of single qubit bit flip errors occurring during the idle time. Since the expected errors are bit flips corresponding to X operations, the stabilizers can utilize Z operations to satisfy the anti-commutation requirement, (i.e., ZX=−XZ) and the stabilizer operations operating on the VL state in this special case become: US=Z0ZRI1IR′, US′=I0IRZ1ZR′, and USUS′=Z0ZRZ1ZR′. The error syndromes can be determined as follows.
In the no-error case E=I0IRI1IR′ and {tilde over (ψ)}L=ψL. The one-sided stabilizers US and US′ stabilize the full (distributed) state since
Z0ZRI1IR′|ψL=I0IRZ1ZR′|ψL
=Z0ZAZ1ZR′|ψL
=|ψL
. This is a useful property of the bit flip channel. Based on this, the only non-vanishing term in Eq. 22 is the first one which means the no-error case is associated with syndrome S=|00
AA′. The other AA′ terms cancel due to equal sign parity and invariance of the logical state to the stabilizer operations.
In the case where there are errors on q0 or qR only, then E=X0IR or E=I0XR with {tilde over (ψ)}L=EψL and the syndrome is S=|10AA′. The anti-commutation of E with US (and so also with USUS′) results in all positive signs within the |10
AA′ term. The other AA′ terms have sign changes but maintain equal sign parity and so vanish.
In the case where there are errors on q1 or qR′ only, then E=X1IR′ or E=I1XR′ with {tilde over (ψ)}L=EψL and the syndrome is S=|01AA′. The anti-commutation of E with US′ (and so also with USUS′) results in all positive signs within the |01
AA′ term. The other AA′ terms have sign changes but maintain equal sign parity and so vanish.
In the case where there are errors on q0, qR and q1, qR′, then the X error occurs on (q0 or qR) and (q1 Or qR′). The degraded logical state will be {tilde over (ψ)}L=EψL and the syndrome will be S=|11AA′. The anti-commutation of E with US and US′ results in all positive signs within the |11
AA′ term. The other AA′ terms have sign changes but maintain equal sign parity and so vanish.
The above example analysis shows that it is possible to detect single bit flip errors in the distributed Bell state by using local one-sided stabilizers, but that it cannot be determined in which physical qubit the error occurred. This information can still be useful within a network protocol to inform the controller that the entanglement needs to be restarted. In the following description, multi-qubit codes are explored which will allow correction/recovery actions to be performed and therefore can effectively extend the coherence time of the quantum memories.
(with assumed qubit order |q0q1qR):
If each stabilizer US,0, US,1, US′,0, US′,1 stabilizes the distributed logical state and local stabilizers which potentially overlap also exhibit this property, then a valid 3-qubit distributed QEC code can be constructed. For example, if US,0=Z0ZR0 and US,1=ZR0ZR1 then US,0US,1=Z0ZR
Here an example Hadamard transform is considered. Consider an initial state given by:
By applying a Hadamard operation on each qubit (e.g., apply the operator H0⊗H1), the basis state will be transformed as:
Thus, each of the original basis states is transformed into a linear superposition of all basis states. This means that the amplitude of each original basis state will make a contribution to the amplitude of all of the new basis states, which is seen after combining terms:
Indexing the original basis states as |m0m1 and the new basis as |k0k1
, then the condition where the sign of each contribution becomes negative can be determined. Wherever mi=1 in the original basis there is the possibility of a negative sign due to the action of the Hadamard but the negative sign is only assured when the corresponding index ki=1 because this is the portion of the output superposition where the sign change actually occurred in the new basis. Therefore the output state can be expressed as:
Which can be written more compactly written as:
where m·k is the inner product of the index bitstrings. This result is generalizable to larger state spaces by summing over the additional dimensions while keeping the analogous sign logic.
The stabilizer state for the distributed three qubit code (i.e., the output of the stabilizer circuits) can be used to determine how the error syndromes map to the stabilizer operations. The ancilla qubit order is qA
Some implementations of the techniques described herein can be implemented in a layered quantum networking environment. The description below includes a variety of example implementations of features of a layered quantum networking environment.
For ease of reference, this portion of the Detailed Description includes various sections that together describe a variety of example implementations of aspects of a layered quantum networking environment. The division of this portion of the description into sections does not necessarily limit the applicability of the features described to those respective sections. The multiple layers of different example implementations of the quantum networking environment 1100 that are described throughout various sections enable various functions on and between the nodes of a quantum network, and on other devices that are part of the nodes or otherwise support the quantum networking environment 1100. For example, the multiple layers may include a swapping layer of a quantum network control plane. The swapping layer runs a swapping protocol, which performs a series of entanglement swap operations to stitch elementary entanglements together to produce end-to-end entanglements. Other layers in some implementations of the quantum networking environment 1100 may include an elementary entanglement generation layer, a distillation/purification layer, and a teleportation layer, for example.
One example of a swapping protocol disclosed herein produces a series of end-to-end entangled qubit pairs between a pair of quantum hosts, which we refer to as quantum host A and quantum host B.
In some examples, whenever an end-to-end entangled pair of qubits is produced, one qubit of the pair is delivered to quantum host A and the other qubit of the pair is delivered to quantum host B.
A quantum host is a device that hosts the quantum application which can utilize or store the produced end-to-end entanglement. Examples of quantum hosts include: quantum computers that perform a clustered or distributed quantum computation, devices that use quantum secure communications based on entanglement (e.g., the E91 protocol), and sensors in a distributed quantum sensing application. Quantum hosts are sometimes also referred to as quantum endpoints or quantum end-nodes.
For explanation purposes only, an embodiment of the system with bi-partite entanglement is considered herein, and hence there are two quantum hosts. In general, multi-partite entanglement (e.g., Greenberger-Horne-Zeilinger (GHZ) states) amongst three or more hosts may be generated by an appropriately configured quantum networking environment, assuming the quantum operational capabilities on the quantum repeater nodes and quantum router nodes are sufficient. In some examples of bi-partite entanglement, the two quantum hosts are not directly connected to each other. For example, they may be connected to each other indirectly with some number of quantum repeaters or quantum routers in between. The quantum repeaters and quantum routers are responsible for producing point-to-point elementary entanglements and for performing entanglement swapping to concatenate those point-to-point elementary entanglements together to form end-to-end entanglements. Examples of concatenating the point-to-point elementary entanglements together in this manner are described in more detail within various examples included herein, which may refer to a process of “stitching” together, or otherwise combining, the results of different entanglement operations at various intermediate stages until end-to-end entanglement is achieved between particular “end” nodes. One difference between a quantum repeater and a quantum router is that a quantum repeater has exactly two interfaces to quantum channels whereas a quantum router can have more than two interfaces.
In general, many of the swapping protocol procedures are exactly the same for quantum repeaters and quantum routers. In some implementations, the main difference is that a quantum repeater swaps entanglements associated with a fixed pair of interfaces, whereas a quantum router has to make a choice of which two interfaces' entanglements to perform a swap operation on. Unless specifically mentioned otherwise, the terms quantum repeater and quantum router are used interchangeably herein. In other implementations, in addition to selecting two interfaces for using or distributing bipartite entanglement, a quantum router is able to make use of any number of interfaces associated with using or distributing multi-partite entanglement (e.g., in a protocol among three or more nodes, as described in more detail below).
In some implementations, quantum repeaters and quantum routers are implicitly also quantum hosts. Herein, quantum nodes refer to quantum hosts, quantum repeaters, and quantum routers collectively. For explanation purposes only, the “quantum” adjective may be omitted herein (e.g., hosts, routers, repeaters, and nodes). As used herein, a quantum communication channel configured to carry quantum states encoded on quantum signals may be free of certain devices that may be part of a classical channel configured to carry classical messages. For example, devices such as optical amplifiers, or optical-to-electronic and electronic-to-optical conversion devices, which may be part of a classical communication channel, may be absent in a quantum communication channel. Some implementations of quantum communication channels consist essentially of one or more optical propagation media that are configured for all-optical propagation over a significant portion of the channel (e.g., optical waveguides on a chip, optical fibers, free space communication links through the atmosphere, or satellite links) and devices such as transmitters, receivers, transceivers, that are configured for optical signal generation and detection. A quantum signal encoded on an optical wave may have an electromagnetic wavelength spectrum with a peak wavelength that falls in a particular range (e.g., between about 100 nm to about 1 mm, or some subrange thereof). As used herein, a quantum device, element, or channel may have the ability to store or transmit a quantum state, or constituent of an entangled quantum state, and a classical device, element, or channel may lack the ability to store or transmit a quantum state, or constituent of an entangled quantum state.
The network of nodes within the quantum network can correspond to any of a variety of types of networks. For example, network of nodes can correspond to a network of quantum computers. Each quantum computer can include a quantum processor that has a set of quantum elements (also referred to as the qubits of the quantum processor, or as a quantum register), and other circuitry such as control circuitry that is used to perform quantum gate operations on the quantum elements. In such a quantum network, at least a first quantum processor in a first quantum computer is coupled to at least a second quantum processor in a second quantum computer over a quantum communication channel between at least the first processor and the second quantum processor. The quantum communication channels may extend over a long distance (e.g., 10s of kilometers over a regional network) or over short distances (e.g., over 10s of meters within a data center). Alternatively, the network of nodes can correspond to a network of quantum processors within a quantum computer (e.g., to scale the quantum computer to a larger number of quantum elements) in which a network of quantum processors comprises respective sets of quantum elements within the quantum processors, with at least a first quantum element in a first quantum processor coupled to at least a second quantum element in a second quantum processor over a quantum communication channel between at least the first quantum element and the second quantum element. Alternatively, the network of nodes can correspond to a network of quantum sensors (e.g., telescopes in an array of telescopes that are configured to implement long-baseline optical intensity interferometry that yields a larger effective aperture). Or, the network of nodes can correspond to a network of nodes that can include quantum modules that support certain quantum protocols, such as quantum key distribution (QKD) or other quantum cryptographic protocols such as quantum secure direct communication (QSDC).
Each quantum network node (i.e., each quantum host, each quantum router, and each quantum repeater) may runs software to implement functionality of the various layers within the quantum networking environment 100, also referred to as a “quantum network stack.” In some examples, there is also software that runs on a centralized controller, which is described in detail below. The qualifier “on-device” may be used to refer specifically to software that runs on the distributed quantum network nodes as opposed to the centralized controller. In classical networks, the term control plane software is sometimes used to refer to the on-device network stack software. As used herein, the terms control plane and data plane may be used to refer to certain features of the classical communication that occurs in the quantum network, in addition to features that are specific to quantum networks, which may have a variety of characteristics that are not present in strictly classical systems that do not include any quantum networking devices.
The controller subsystem 1234 can determine and install a set of rules and configurations for the quantum network protocols subsystem 1202 and the management subsystem 1220 to govern the behavior of network operations. An example rule set for the management subsystem 1220 programmatically describes a set of conditions and actions that govern how entanglement fidelity is estimated and tracked, and setting minimum fidelity thresholds to guarantee the requisite quality of service for the network application. Another example rule set for the management subsystem 1220 programmatically describes a set of conditions and actions that govern quantum resource provisioning between different virtual circuit requests and different protocols therein. In a resource-constrained network environment, quantum resources, such as quantum memories, are in great demand by several network protocols (e.g., elementary entanglement generation, purification protocol, swapping protocol) and potentially a multitude of virtual circuit requests. Rule sets, determined and installed by the controller subsystem 1234, may be useful for serving the demand placed on quantum resources. Another example rule set for the quantum network protocols subsystem 1202 programmatically describes a set of conditions and actions that determine which protocol variants to run, and govern when and how certain protocol instances are scheduled relative to each other, depending on network state (e.g., purify on elementary entanglements before swapping, set the scheduled sequence of swapping operations across repeaters in the determined path, regenerate entanglement once estimated fidelity falls below a certain threshold, wait for a confirmation message before attempting the next entanglement). The determination of such rule sets by the controller subsystem 1234 may optimize for some metric aggregating user fairness, network utility, and network performance, while taking into account factors such as network operational state, network demand, topology, resource availability, real-time telemetry, hardware characteristics, and quality of service parameters (i.e., requested end-to-end entanglement generation rate and fidelity).
In some examples, the swapping protocol disclosed herein consumes (i.e., utilizes and perhaps collapses parts of the quantum state) elementary entanglements that are generated by the elementary entanglement generation (EEG) protocol between neighboring nodes. The EEG protocol can be implemented using any of a variety of techniques (e.g., meet-in-the-middle, node-source, midpoint-source), depending on the capabilities of the hardware comprising each node participating in the point-to-point elementary entanglement.
The swapping protocol may also interact with a purification protocol which attempts to combine multiple pairs of entanglements into a smaller number of entanglements of higher fidelity. The purification protocol may run before or after the swapping protocol, or both. The purification protocol can be implemented using any of a variety of techniques.
Once the swapping protocol has finished producing an end-to-end entanglement (i.e., a pair of entangled quantum elements, one on each host), this end-to-end entanglement may be delivered to the next-higher layer. The next-higher layer is often teleportation. Or, if (additional) rounds of purification are desired before teleportation, then the next-higher layer may be purification and the layer on top of that may be teleportation. Or, if the application consumes entanglement directly without teleportation (e.g., a quantum key distribution [QKD] application), then the next-higher layer may be the application layer.
In general, the layering can differ from node to node. For example, the network may only perform the initial round of purification for some links (e.g., long links) and not for other links (e.g., short links).
Furthermore, there can be multiple rounds of purification as deemed necessary to correct for the effects of noise and decoherence.
In addition to interfacing with upper and lower layers, the entanglement swapping protocol may interact with a memory management module for managing the local qubit resources (e.g., quantum memories, or other quantum elements capable of storing qubits associated with various entangled quantum states or other quantum states, over some duration of time with potentially changing fidelity) that store entanglements used by the entanglement swapping protocol. For example, the controller can provide resource usage information to the nodes (e.g., in the form of a schedule, a ruleset, and/or conditional parameters) to indicate to the entanglement swapping protocol running on the nodes which quantum elements can and cannot be used, and/or when particular quantum elements can be used. The rules can be provided in association with virtual circuits connecting different entities (e.g., different user pairs). Proper servicing of all users may involve the controller, the entanglement swapping protocol, and the local memory management module to ensure correct and fair resource usage. The entanglement swapping protocol may also interact with a fidelity estimation unit for tracking the quality of entanglements consumed and produced by the protocol.
The details of the underlying quantum hardware that is accessed by the entanglement swapping protocol may be kept abstract through the use of a hardware abstraction layer.
The hardware abstraction subsystem 1602 can provide a north-bound application programming interface (API) for the quantum network stack software above it, which is referred to as a hardware abstraction API 1605. The hardware abstraction API 1605 operates together with a mapping of hardware abstraction API to driver 1606. The hardware abstraction API 1605 may be platform-independent (i.e., the same for all hardware platforms). For each supported abstract hardware device, the hardware abstraction API 1605 defines: (1) a set of operational attributes whose value can be read to retrieve some operational aspect of the abstract hardware device (e.g., the number of photons that a counting single photon detector has detected), (2) a set of configuration attributes whose value can be written to set some configuration aspect of the abstract hardware device (e.g., the target rate at which an entangled photon pair source should generate entangled photon pairs), (3) a set of notifications that the abstraction hardware device can generate to report that some event has occurred (e.g., to report a fault), and (4) a set of actions that can be invoked on the abstract hardware device to request it to perform some action (e.g., to trigger a quantum memory to emit a photon that is entangled with the qubit that is stored in the quantum memory). A formal data modeling language (e.g., YANG (RFC 6020 from Internet Engineering Task Force (IETF)), incorporated herein by reference) can be used to provide a formal description of the attributes, notifications, and actions listed above, and to automatically generate the hardware abstraction API 1605 from the formal description in one or more programming languages. A quantum memory at a given node can be implemented using any of a variety of types of quantum elements configured to store a quantum state or a constituent of a quantum state (e.g., potentially entangled with other constituents of a collective quantum state). A quantum element configured to store a quantum state or constituent of a quantum state corresponding to a single qubit may also be referred to herein as a “single qubit memory” or simply a “qubit memory.”
The functions provided by the hardware abstraction API 1605 may be divided into several classes, depending on the real-time nature of the function, including: hard real-time functions, soft real-time functions, and non-real-time functions. Hard real-time functions may be used by field programmable gate arrays (FPGAs) and application-specific integrated circuits (ASICs). Here, the exact timing of the function, possibly to nanosecond precision, is part of the function definition. Soft real-time functions may be used by software running on a controller with a real-time operating system. Here it is important that the functions are executed very fast and can be invoked at a very high rate (e.g., hundreds of thousands of invocations per second or more). Non-real-time functions may be used by software running on a general-purpose processor and a general-purpose operating system. These functions are invoked at a relatively low frequency, typically for management purposes.
Below the hardware abstraction API 1605 and the mapping of hardware abstraction API to driver 1606 is a driver API 1608 together with a driver 1610. The driver API 1608 is responsible for mapping the hardware abstraction API 1605 to concrete operation on the hardware 1603. Each hardware platform may have its own separate driver. While it is a goal for the quantum network stack 1604 software to be portable and platform-independent, it is not necessarily completely oblivious of the details of the underlying physical hardware 1603. For this reason, some implementations of the hardware abstraction API 1605 may include resource and capability discovery functions which allow the platform-independent quantum network stack 1604 software to dynamically discover various aspects of the underlying hardware 1603 and adjust its behavior accordingly. For example, some possible questions that may be relevant include:
In some examples, a connection-oriented model may be used, where before two hosts can start to produce entanglement, they first establish a virtual circuit (VC).
The mechanism for creating the virtual circuit can be implemented using any of a variety of techniques. For example, one approach is to use a distributed signaling protocol to install the virtual circuits and the FSM instances (e.g., using an east-west protocol as described below). Another approach is to use a logically centralized controller that installs the virtual circuits and the FSM instances on each visited node (e.g., using a north-south protocol as described below). The FSM instances are installed with appropriate parameters for configuring the protocols run by the FSM instances.
In some of the examples disclosed herein, it is assumed that the path for the virtual circuit has already been chosen and that the virtual circuit has already been created. Under such an assumption, the example protocols and the example state machines that each node on the already-created virtual circuit executes to produce end-to-end entanglement may be described.
The quantum network may also include a centralized controller (also referred to as simply “controller”) that is responsible for implementing high-level centralized functions.
9. East-West Protocols Used in Combination with North-South Protocols
In some examples, the quantum nodes (i.e., the quantum hosts, the quantum routers, and the quantum repeaters) may run east-west protocols with each other. These protocols can implement the various layers of the on-device quantum network stack (e.g., timing and calibration, elementary entanglement generation, purification, swapping, and teleportation).
In some examples, the controller may run north-south protocols with each of the quantum nodes in the network. The north-south protocols may include communication of information that is relevant for the east-west protocols. For example, the controller may provide to the quantum nodes (e.g., in a virtual circuit installation procedure) information identifying a virtual circuit, information specifying a path for the identified virtual circuit, and an FSM instance for an east-west protocol. The controller may provide this information to each quantum router node that is on the path associated with the virtual circuit, which enables the nodes to run the associated protocol (e.g., swapping or purification). The controller may also be responsible for configuring the high-level parameters of the FSM instances based on network-defined and/or user-defined metrics (e.g., requested fidelity or quality of service, network traffic demand). The configurations may determine what specific procedure the FSM will perform. For example, a particular version of a swapping protocol can be determined. The configurations may also determine whether purification will be performed, and if so, how and/or when purification protocol will be performed.
In classical networking and/or quantum networking, there are a variety of centralized and distributed architectures that can be used. In some examples of classical networking, most of the intelligence is in the centralized controller. Correspondingly, most of the complexity in such examples may be in the north-south protocols. For example, in some SONET/SDH time-division multiplexed networks, the controller is responsible for computing the route for each virtual circuit, installing the necessary configuration state for each virtual circuit on each network node. The east-west protocols between network nodes in such examples may be relatively simple and focused on fast recovery from failures.
Alternatively, the TCP/IP-based Internet uses a decentralized design where most of the complexity is in the east-west protocols. For example, traffic routing may be done using fully decentralized protocols such as BGP and OSPF.
In some networks, some level of centralized intelligence may be useful for certain use cases, including traffic engineering and data center networks. This can be facilitated by Software Defined Networking (SDN). Examples of north-south protocols that can be used between the SDN controller and the network nodes, include OpenFlow, P4, and PCEP.
Consider a virtual circuit with N nodes in the path. The number N includes the hosts on either side of the virtual circuit. Thus, there are two hosts and N−2 routers. For N=2 there are two directly connected hosts with no routers in between. In the case of a host setting up a virtual circuit to itself (N=1), creation of the “end-to-end” entangled pair boils down to using local gates to produce a pair of local qubits entangled with each other.
Each node in the virtual circuit may be assigned a node hop number (also referred to as a hop number, for short). The first node in the virtual circuit gets node hop number 1. The next one gets node hop number 2. The last node gets node hop number N. Hop numbers are only unique within the scope of a virtual circuit. For example, if two different virtual circuits go through the same node, that node may be node hop number 2 in one virtual circuit and node hop number 4 in the other virtual circuit. Nodes may also be assigned node identifiers, which are unique within the scope of the network. Node identifiers are different from node hop numbers. Node identifiers may not play an important role in the swapping protocol (but they can play an important role in other protocols, e.g., in some routing protocols). Herein, unless otherwise specified, node numbers or nodes labeled with numbers in diagrams are assumed to be node hop numbers.
Quantum virtual circuits are inherently directionless (i.e., there is no source or destination). In some examples, end-to-end entangled pairs of qubits are produced symmetrically, where one qubit of the pair is delivered to one host and the other qubit of the pair is delivered to the other host. Despite the directionless nature of quantum virtual circuits, one host can be arbitrarily designated as “host A” and the other host as “host B”. By convention, the node hop numbering starts at host A.
In some examples, a (preferably automated) mechanism may be used to decide which host is designated as host A and which host is designated as host B, and to assign node hop numbers. Such a mechanism could select the host with the highest system identifier as host A. In other examples, the controller could perform such selection, or the end-user could manually configure it.
On the routers the term A-side will refer to the direction towards host A and the term B-side will refer to the direction towards host B.
In some examples, before any swapping can take place the elementary entanglement generation (EEG) protocol produces elementary entanglements between each node and its directly connected neighbor(s) in a path over a set of nodes.
Each node runs one instance of the EEG FSM per interface (i.e., per directly connected neighbor). The hosts (e.g., Nodes 1 and 5 in
In some examples in which the swapping protocol is performed in a layer directly above a layer performing the EEG protocol, whenever the EEG protocol successfully generates an elementary entanglement, it may dispatch an Entanglement-Created event to the swapping protocol. Each instance of the EEG protocol may be associated with at least one qubit memory. For example, when attempting to create elementary entanglements between directly connected nodes X and Y, then there will be one EEG protocol instance and one associated qubit memory on node X, and there will be one EEG protocol instance and one associated qubit memory on node Y. If the EEG protocol for a given link is capable of supporting multiplexing, the EEG protocol instance may be associated with multiple qubit memories.
The EEG protocol instances on nodes X and Y cooperate to produce elementary entanglement by using, for example, a midpoint source or a midpoint Bell state analyzer. As far as the swapping protocol is concerned, the method used to produce elementary entanglement is not relevant, since the details are hidden inside the EEG protocol. Thus, different EEG protocols may be run on different hardware platforms. Regardless of which EEG protocol is running, the swapping protocol can be configured to receive Entanglement-Created events from the EEG protocol. Once the swapping protocol receives the Entanglement-Created event, the qubit on node X and the qubit on node Y are entangled with each other. Alternatively, in other examples, another layer may be between the EEG protocol layer and the swapping protocol layer, such as a purification layer, in which case the purification layer can be configured to receive the Entanglement-Created event.
Many EEG protocols involve a Bell state measurement and a subsequent Bell state correction (which uses classical messaging) to consistently produce a particular Bell state, for example |ϕ+>, by transforming a Bell state associated with a quantum element at the node to a different Bell state (using one of three operations that correspond to a change in Bell state) or confirm that the quantum element is associated with the particular Bell state (without performing any transformation operation, or by performing a transformation operation that corresponds to an identity operation). The Bell state correction can be performed as part of the EEG protocol. Optionally, the EEG protocols may have a feature that allows the swapping layer to request that the Bell state correction is deferred until after end-to-end entanglement is established. In that case, the Entanglement-Created event may also include information about what type of entanglement was actually created (i.e., which Bell pair: |ϕ+>, |ϕ−>, |ψ+>, or |ψ−>), where:
Information about the type of entanglement created may allow the swapping protocol to determine the final end-to-end state and perform the Bell state correction only once on either host A or B. Furthermore, such information may avoid the need for Bell state corrections on the routers, which reduces the number of applied operations, and hence improves latency and fidelity. For example, the Bell state measurement results may be tracked at each step along the way, and the Swap messages may contain information for performing Bell state correction operations that may be needed along with fidelity estimates and other metadata (e.g., identifiers, and timestamps). Bell state correction operations (i.e., operations that can convert between different states of the four Bell states) can be realized with quantum gates. The physical implementation of these correction operations depend on the method by which qubits are physically encoded, and the hardware platform that supports controlled quantum state manipulation. For example, one can implement Bell state corrections with nonlinear optics, superconducting circuits, trapped ions, atomic ensembles, vacancy centers in diamond, or a quantum memory unit coupled to a quantum processing unit.
In the case of deferred Bell state correction/conformation, in which Bell state measurement results from intermediate operations in the end-to-end entanglement distribution process are tracked and communicated, either host A or B can conduct any needed final Bell state correction to convert the generated entangled state to any of the desired Bell states. Such Bell state correction can be performed with one or more operations on only one of the two qubits in the distributed Bell state. However, to ensure correctness of the Bell state correction, hosts A and B receive sufficient information such that they agree as to which Bell state is to ultimately be produced, and agree as to which host is responsible for conducting any needed correction operation(s). In the case that the generated Bell state is already the “correct” Bell state that is intended, the host storing the qubit on which the correction operation would have been performed can simply forego any operations or apply a “no-op” operation that is essentially an identity operation that preserves the existing Bell state. To facilitate this agreement process, hosts A and B may use an east-west classical communication protocol prior to starting the entanglement generation and distribution processes. Alternatively, a centralized controller may use a north-south protocol to delegate non-conflicting Bell state correction roles to hosts A and B. In this case, the controller may use information pertaining to the host nodes' capabilities (e.g., if only host B has a quantum processor capable of performing the necessary operations), overall network state, virtual circuit request metadata, and/or quality-of-service parameters when determining Bell state correction roles for the relevant hosts. The controller may communicate and install these roles on the hosts in a static manner (i.e. fixed roles for the duration of a requested session) or in a dynamic manner, in which the hosts follow a set of rules for Bell state correction based at least in part on the type of received Bell state and other relevant metadata (e.g., timestamp information, estimated fidelity).
In some cases, instead of correcting the Bell state after entanglement is established, the Bell state measurement results can be used to notify the end nodes which Bell pair has been produced (e.g., 2 bits of information indicating one of four possible results of a Bell state measurement corresponding to one of four possible Bell pairs being established).
The Entanglement-Created event may also include information about the estimated fidelity of the entanglement. This estimate may be based on the known parameters of the hardware (e.g., the T1 (relaxation time) and T2 (dephasing time) decoherence times of the memory combined with observed storage times, the noise models for the optical fibers combined with observed fiber lengths, etc.) or it may be empirically determined (e.g., by performing quantum state tomography on a subset of the generated elementary entanglements).
Some hardware platforms distinguish between communication qubits and storage qubits. In some examples, a communication qubit can be directly coupled to a photonic interface, whereas a storage qubit cannot be directly coupled to a photonic interface, but only indirectly via a communication qubit (e.g., using a swap gate). In some implementations, only communication qubits can participate in the EEG protocol. Some platforms may have a very limited number of communication qubits. For example, the diamonds used in recent nitrogen-vacancy (NV) center repeater experiments have a single communication qubit and a small number of storage qubits. In such a scenario, a router may first generate elementary entanglement on the A-side, then move the communication qubit to the storage qubit, then generate elementary entanglement on the B-side, and finally perform a Bell state measurement on the storage plus communication qubit pair. Any logic that is used to move communication qubits to storage qubits may be the responsibility of the swapping protocol and not the responsibility of the EEG protocol, which can deliver elementary entanglements in communication qubits.
In the diagrams herein, a dashed black double-headed arrow is used to indicate the production of an elementary entanglement by the EEG protocol.
For the figures disclosed herein, although there may exist a finite time difference, for explanation purposes, the dashed black lines are drawn horizontally, unless the implications of non-simultaneous events are being actively considered.
The swapping protocol may also handle degenerate scenarios (i.e., where the time difference between the two events is unusually large) and failure scenarios (i.e., where the event is missing on one or both nodes).
There are several layers in the stack that can create an entanglement, such as the elementary entanglement layer. However, the elementary entanglement layer is not the only possible source of entanglements. The swapping layer can also produce an end-to-end entanglement by using entanglement swap operations to stitch multiple elementary entanglements together. Additionally, the purification layer may produce purified entanglement by combining multiple simultaneously existing entanglements together. By design, the layering in a quantum stack may be flexible. For example, purification may be performed before swapping or after swapping or there may not be any purification at all. The quantum stack may reuse the same Entanglement-Created event in each layer that can produce an entanglement, so that the next higher layer that consumes the entanglement does not need to information related to how the entanglement was produced.
A black ⊗ symbol is used to represent a swap operation, and a short-dashed black line is used to represent a non-elementary (multi-hop) entanglement that is produced by the swap operation.
On some platforms, the swap operation is a heralded, non-deterministic operation. On such platforms, there is a high probability (e.g., 50%) that the swap operation fails but the platform is able to determine and distribute information about whether it succeeded or failed (this is an example of a “heralded” swap operation).
Even on deterministic platforms, it is possible for low-probability non-heralded swap failures to occur.
Elementary entanglement generation may use two qubit memories: one qubit memory on one side of the point-to-point link, and one qubit memory on the other side of the point-to-point link. In some example swapping protocols, each qubit memory is assigned to a particular virtual circuit (i.e., a single qubit memory is not or cannot be shared between multiple virtual circuits at the same time).
In some examples, qubit ownership may be tracked through a node's Memory Management module. “Ownership” here refers to the allocation of a local qubit memory to an executing process (e.g., for management of actions associated with the qubit memory), such as the EEG protocol or the swapping protocol. By looking at one particular point-to-point link associated with a pair of qubits (one on each side), the following sequence associated with elementary entanglements being generated may be observed.
(1) The elementary entanglement generation protocol generates a point-to-point elementary entanglement. This typically takes many non-deterministic attempts, so it may not happen at a predictable regular interval. At this stage, the EEG protocol owns the qubit memory that will hold the generated entanglement and may have exclusive usage of the qubit. The entanglement swapping protocol may not be responsible for initializing the qubit for the EEG protocol.
(2) Once an elementary entanglement is generated, the ownership of the qubit storing the elementary entanglement is handed off to the higher layers (e.g., purification, swapping, teleportation, or application).
(3) The higher layers may hold on to the elementary entanglement for some amount of time. During that time, the elementary entanglement generation layer cannot use the associated qubits and cannot yet attempt to generate the next elementary entanglement. The local memory management unit will track that the qubit is not available and in use by the entanglement swapping protocol.
(4) Eventually, the higher layer will consume the entanglement. For example, purification may sacrifice an entanglement in an attempt to improve the fidelity of another entanglement. As another example, the swapping layer may swap two qubits, after which the swapped qubits are no longer needed by the swapping layer. In these scenarios, the higher layer releases the ownership of the qubit. The ownership may be returned back to the elementary entanglement layer, which can resume elementary entanglement generation attempts as soon as it owns both qubits again. This may be done by having the swapping layer free the qubit via the memory manager so that it may be allocated to the underlying EEG protocol for generating new entanglement. The entanglement swapping protocol may not be responsible for reinitializing the qubit on behalf of any other process.
(5) In some examples, it may be beneficial to track how the estimated fidelity of each entanglement evolves over time. The estimated fidelity may be updated to reflect: (A) spontaneous decoherence in qubit memories as a result of the passage of time (e.g., T1 and T2 decoherence times), (B) noise experienced as communication qubits are transmitted over a communication medium (e.g., noise associated with propagation over optical fibers) before being stored as a storage qubit, and (C) noise experienced as quantum gate operations and other local operations are applied to qubits.
When the estimated fidelity falls below a threshold, the end-to-end entanglement generation attempt may be given up, and the ownership of all involved qubit memories may be returned to the elementary entanglement generation layer (e.g., via the memory manager). Alternatively, the estimated fidelity falling below a threshold may trigger another set of protocol actions (e.g., trigger another round of purification).
As described previously, there can be a sequence of elementary entanglements on a given link between a given pair of qubits.
In some examples, it may be beneficial to distinguish one entanglement on the link from some other entanglement at a different point in time on the same link. The nodes in the network may use a method to uniquely identify one particular entanglement amongst the series of entanglements that are produced over time. One such method assigns an entanglement sequence number to each elementary entanglement that is produced on a given link, as shown in
As a practical matter, sequence numbers are stored in variables and message fields with a finite number of bits, such that the sequence number may roll-over to the initial value. One example of a technique to ensure that such a roll-over is acceptable is to ensure that the roll-over interval is longer than the longest potential lifetime of an entanglement (e.g., longer by a factor of 2, 10, 100, or 1000), and to ensure that the number comparison routines for ordering purposes take this roll-over into account. The longest potential lifetime may be determined, for example, as the longest time that the entanglement could be characterized by a high enough fidelity metric to be useful, which may depend on the characteristics of a particular quantum element being used as a quantum memory at a node (e.g., the longest time that a quantum element is configured to maintain at least a predetermined minimum fidelity of a stored quantum state.
There exist clear distinctions between qubit memories and qubit states. Herein, a qubit memory is the physical device that is used to store qubit states. In
Bipartite entanglements involving two qubit memories herein are denoted using the notation QA:EA˜QB:EB where QA:EA is the qubit state on the A-side of the entanglement and QB:EB is the qubit state on the B-side of the entanglement. For multipartite entanglement a different notation may be used.
Herein, swap operations may be denoted in a shorthand notation. For example, “23+34=24” means that node 3 performed a swap which consumed the entanglement between nodes 2 and 3, and the entanglement between nodes 3 and 4, to produce a new entanglement between nodes 2 and 4.
In the figures disclosed herein, a solid black single-headed arrow is used to indicate sending a real-time classical message from one node to another node. As used herein, a “real-time classical message” can refer to any message that is sent using a technique for communicating classical information in real-time (e.g., the transmission and/or arrival times of the classical messages may be relevant to the operations). For example, some techniques encode classical information on macroscopic signals that are not capable of encoding quantum states, which in some cases involves transmission over a separate classical communication channel or network. Other encoding schemes could be used, including schemes that encode classical information within quantum signals. For example, a multiplexing scheme can be used that multiplexes quantum signals sending encoded qubits with quantum signals sending encoded classical information. For example, a protocol such as a quantum secure direct communication (QSDC) protocol can be used to send classical information, where the quantum nature of the communication scheme may provide a benefit, such as enhanced security.
For real-time classical messages, some finite amount of time passes between sending a message and receiving a message. For example, it takes a finite amount of time to encode the bits onto the fiber (e.g., at 10 Gbps it takes 3 ns to encode a 3-byte message, assuming 8b/10b encoding). It also takes a finite amount of time for the message to propagate along the fiber at the speed of light (e.g., it takes 50 us to traverse a 50 km fiber link). Thus, slanted black arrows may be used to indicate the passage of time, as shown in
Such delays may be important when the protocol handles situations where messages “cross each other” on the fiber, as shown in
For simplicity, horizontal black arrows will be used herein unless a figure is specifically considering scenarios where the propagation delay or the possibility of crossing messages matters.
Elementary entanglement generation on a given link may start as soon as the qubit memories on either side of the link are available. Once elementary entanglement generation starts, it is a non-deterministic process (i.e., it is unknown how many attempts it will take to generate the elementary entanglement), and hence it is unknown how long it will take to generate elementary entanglement. As a result, it is unknown in which order the elementary entanglements will be created.
Nodes may perform entanglement swaps and exchange Swapped messages to create an end-to-end entanglement that is delivered to the next-higher layer. In this example, there may be two requirements for such a process. (1) With a high probability, either both hosts or neither host deliver an end-to-end to the next higher layer. It is not acceptable for one host to report an end-to-end entanglement but the other host not. Concretely, this means that an end-to-end entanglement is only delivered once all swaps across the entire path have been successfully completed. (2) When a host delivers an end-to-end entanglement to the higher layer, it reports both the local qubit state identifier and the remote qubit state identifier, in addition to other metadata associated with those identifiers. It is not sufficient to report what the local and remote qubit memories are. Those qubit memories will contain multiple different states over time, and those states are identified by qubit state identifiers which include a sequence number.
In the first case “with a high probability” is used because there may be low-probability failures that are not detected and that may be accounted for in the noise model.
Referring again to
Table 1 below shows some of the fields in an example Swapped message.
Simplified entanglement state identifiers (e.g., 35) may be used herein, instead of full entanglement state identifiers (e.g., 3B: 9˜5A: 2). The simplified swap notation “13+35=15” may also be used herein. Although the entanglement sequence numbers in the entanglement state identifiers may be omitted in the simplified notation, they often cannot be neglected in practice (e.g., when a host must report both the local qubit state identifier and the remote qubit state identifier, where the entanglement sequence numbers correspond to the respective qubit state identifiers).
Entanglement swap operations are non-deterministic in nature, and can either result in a successful swapping of the entanglement, or a failed operation which destroys the input entanglements in the process. As entanglement swap operations can be used in the process of generating end-to-end entanglement on a virtual circuit, the east-west protocols described herein communicate the information of the operational outcomes of entanglement swap operations to coordinate subsequent actions towards generating end-to-end entanglement(s). Thus, we can define Swap-Success and Swap-Failed messages.
The Swap-Success message refers to the Swapped message described above, with the fields of the message describing the successful swap operation detailed in Table 1: Swapped message fields. Herein, a “Swapped message” may also be referred to as a “Swap-Success message”.
The Swap-Failed message is a message to convey information to nodes in the network that an attempted entanglement swap operation was unsuccessful. In this case, the input entanglements are destroyed in the process and there is no resulting Bell state information, nor post-swap fidelity or post-swap density matrix included in the message. The Swap-Failed message may still include a virtual circuit identifier, a destination node identifier, the identifier of the entanglement that was attempted to be produced by the operation, and/or a timestamp of the attempted swap operation.
The swapping schedule determines in which order the swaps occur, and hence in which order the Swapped messages are sent.
There are many possible swapping schedules for a given number of nodes.
In general, some swapping schedules are better than other swapping schedules. In
In some examples, it may be the job of the quantum network controller to choose a swapping schedule for each node on a given virtual circuit. The chosen swapping schedule may be optimized with regards to one or more parameters and constraints. In some examples, the chosen swapping schedule may be optimal under the parameters of the quantum network. The quantum network takes many factors into consideration when computing a (possibly optimal) swapping schedule, including the characteristics of the qubit memories (e.g., T1 and T2 decoherence times), the characteristics of the fiber links (distance, loss), etc., as may be discovered through the hardware abstraction API.
In some figures (e.g.,
Note that, while there is some asynchronicity (i.e., some freedom in the exact relative timing of the various events) there is also some ordering imposed by the swapping schedule: the Swapped messages guarantee that certain swap actions in time step n are completed before any swap actions in time step n+1.
In some examples, regardless of the order in which the elementary entanglements are generated, or in which order the swaps occur, the sequence of swaps can follow the same “tree structure” imposed by the swapping schedule. As a result, it can be known in advance from which node to which node the Swapping messages will be sent. It can also be known in advance which event(s) a node must wait for before it can perform a swap.
Such information allows for the translation of the schedule into a finite-state machine (FSM) for each node in the virtual circuit. The finite-state machine may describe what events a node must wait for, when to perform a swap, and when to send a message and to which node a message is sent. Depending on the specific variation of swapping protocol and the schedule, the set of nodes to be sent a Swap-Success message may differ from the set of nodes to be sent a Swap-Failed message.
Referring again to
A “Send real-time classical” message, on the other hand, is technically not a state but rather an action. As such, it is not included in a box in
The translation from a schedule to a finite-state machine for each node may occur once the virtual circuit is established. The finite-state machines can be installed in the data plane of each node at virtual circuit establishment time. From then on, each node can efficiently perform its part of creating end-to-end entanglements by simply following the simple rules of its local finite-state machine.
On some platforms, notably platforms using linear optics, there may be a 50% upper bound probability that a swap operation fails in a heralded manner. Heralded means that the swapping node has enough information to notify one or more nodes whether an entanglement swap attempt succeeded or failed.
Referring again to
The heralded swap failure recovery procedure is reflected in the finite-state machine (FSM), as shown in
In addition to the heralded swap failures discussed in the previous section, there may also be a low probability that the swap fails in an unheralded manner.
By definition, unheralded means that the swapping node does not receive information that the swap failed. In some examples, the node does not recover from the swapped failure, since the node does not know that the swap failed in the first place. One way to deal with such swap failures is to account for it as a source of noise, and to include it in a model for estimating the fidelity of produced entanglements, and for the SDN controller when making routing/scheduling decisions based on these unheralded swap failure probabilities.
In some scenarios, it is possible that some nodes in the virtual circuit are already working on the next end-to-end entanglement while other nodes in the same virtual circuit are still working on the previous end-to-end entanglement.
We refer to this as concurrent end-to-end entanglement generation, and it is similar in concept to pipelining.
Referring again to
Each swapping FSM may keep track of one or two entanglements. For example, swapping FSMs for hosts may keep track of one entanglement and swapping FSMs for repeaters may keep track of two entanglements. The tracked state for each entanglement may include which of the four Bell states it is, as well as the local and remote qubit state identifiers and the estimated fidelity.
When the elementary entanglement generation layer dispatches an Entanglement-Created event to the swapping layer it may include which of the four possible Bell states was generated: |ϕ+>, |ϕ−>, |ψ+>, or |Ψ−>. The swapping FSM can store this information in the corresponding tracked entanglement. While the swapping FSM is waiting for the Entanglement-Created event, the qubit Bell state is marked as pending. In some examples, when a node performs an entanglement swap, the node measures a pair of qubits it holds locally (each qubit belonging to a different entanglement, and therefore are a non-entangled pair) using a joint measurement referred to as a Bell state measurement, and determines the resulting Bell state of the extended entanglement based on results of that Bell state measurement. For example, one example of such a joint measurement using linear optics is the combination of photons encoded with the respective qubit states in two input ports of a beamsplitter and determining the presence or absence of detected photons at the two output ports of the beamsplitter. The heralding of success or failure of the measurement, and the associated entanglement swap operation, may be related to the properties of the detectors used to detect the photons. Another example of such a joint measurement uses a gate-based Bell state measurement circuit, as described in more detail below. The heralding of success or failure of the measurement, and the associated entanglement swap operation, may be related to properties of the gate-based Bell state measurement circuit.
To determine the post-swap Bell state, let each Bell state, |ϕ+>, |ϕ−>, |Ψ+>, and |Ψ−>, be mapped to a tuple (s1, s2) as follows:
Mapping the A-side Bell state |ϕA> to a tuple (s1A, s2A) and the B-side Bell state |ϕB> to a tuple (s1B, S2B) allows the determination of a new tuple (s1new, s2new)=(s1A⊕s1B|m1, s2A⊕s2B⊕m2) where ‘⊕’ denotes the bitwise XOR operation. The resulting tuple maps back to the post-swap Bell state according to the table above. In the case of gate-based Bell state measurements (e.g., teleportation), the post-swap Bell state may also be determined via computation.
After the swap is complete and the Bell state of the new extended entanglement has been determined, the swapping node may perform the following:
Once host A and host B have completed end-to-end entanglement generation, the swapping FSMs of host A and host B contain the Bell state of the end-to-end entanglement. At this point, the entanglement may be delivered to higher layers along with its Bell state information or a correction may be applied so that a desired Bell state is delivered to higher layers.
A pending Bell state may also be used in other circumstances and protocols. In some examples, it may be unnecessary to store the Bell state for an entanglement if the FSM still expects to receive a Swapped message pertaining to that entanglement. This is because the Bell state can potentially change several times due to remote swaps. The local node will not know about those intermediate Bell state changes. It will only know the final state when the Swapped message is received. Thus, if the schedule indicates that a Swap message is still expected, the Bell state is marked as pending.
An example based on
The same is true for nodes 4 and 6.
Greedy swapping is also referred to as “as soon as possible” (ASAP) swapping. In contrast, some examples above performed swaps as late as possible, for example, just before sending the Swapped message(s). In many cases, it is possible to do the swap earlier, namely as soon as there is an elementary entanglement on both the left side and the right side. In some examples of greedy swapping, the protocol does not wait until it has received the Swapped message from any predecessor node.
Referring again to
One of the main advantages of greedy swapping is that the swaps occur earlier. This has two implications:
One possible disadvantage of greedy swapping is that the protocol may become more non-deterministic and more difficult to understand (but not necessarily incorrect). Examples of these complications may include:
Another possible disadvantage of greedy swapping is that the mechanism for recovering from heralded swap failures previously described no longer works. The previously described recovery mechanism can selectively restart a portion of the end-to-end entanglement after a heralded swap failure. With greedy entanglement swapping, the protocol may have to restart the entire end-to-end entanglement generation and abandon some or all elementary entanglements.
One more possible advantage of postponing the actual swap to as-late-as-possible (i.e., another advantage of late swapping) is that it may maximize the freedom of which qubit is swapped with which other qubit. In some examples such freedom is not needed, since the protocol may have pre-allocated each qubit memory to a particular virtual circuit, and who gets swapped with whom is predetermined. However, when considering sharing a qubit memory amongst multiple virtual circuits, the flexibility may be beneficial.
Unless otherwise stated, late swapping (i.e., not greedy swapping) is assumed in the examples disclosed herein. In general, translating late swapping examples into greedy swapping examples is possible. In the case of greedy swapping, the finite-state machines for the nodes can be adapted as shown in
The swapping FSMs, in coordination with a Fidelity Estimation Unit, may also be responsible for providing an estimate of the fidelity of the delivered entanglement. In some implementations, the estimated fidelity may need to account for:
Item (1) can be accounted for by the elementary entanglement generation protocol and the estimated fidelity provided in an Entanglement-Created event. As will be shown, in some examples the swapping protocol may be devised to handle items (2) and (3).
Each Entanglement-Created event may contain a timestamp at which the entanglement was created as well as an initial fidelity estimate of the entanglement at the time specified by the timestamp. When a network node performs an entanglement swap, it can use the timestamps, fidelity estimates, and knowledge of the two entanglements used for the entanglement swap to construct a new fidelity estimate for the entanglement produced by performing the swap.
To achieve this, the Fidelity Estimation Unit, which is configured to manage information associated with the noise characteristics of the quantum gates and measurements performed on local storage qubits, as well as the decoherence behavior of each storage qubit, may be utilized. For the swapping protocol, the decoherence behavior describes how an entanglement stored in the storage qubit decoheres as a function of time.
The Fidelity Estimation Unit may represent the decoherence behavior of each storage qubit in the form of a function F (t) (referred to as a fidelity curve) which computes the fidelity of an initially perfect (fidelity=1) entanglement that has been stored in the storage qubit for some time t. Each fidelity curve F (t) is associated with an inverse function F{−1}(F) (referred to as an inverse fidelity curve) which computes the amount of time an initially perfect entanglement has been stored for, given its current fidelity.
To compute the fidelity estimate of an entanglement produced by performing an entanglement swap, the network node first computes “pre-swap” estimates for the fidelity of each entanglement used in the entanglement swap. To compute a “pre-swap” fidelity estimate Fpre-swap, the network node determines the time delta t{store} between the creation timestamp t{create} of the entanglement and the time t{swap} at which the entanglement swap was performed. Using the initial fidelity estimate F{create} corresponding to the time t{create}, the pre-swap fidelity estimate of the entanglement may be computed as:
By using the appropriate choice of F (t) and F{−1}(F) based on the storage qubit holding the entanglement, as specified in the Entanglement-Created event.
The fidelity curve F (t) may be represented as an exponential function AeBt+C where A, B, and C are chosen to lower-bound and closely approximate the fidelity of an initially perfect entanglement that is stored for some amount of time t. For example, the fidelity curve for a storage qubit that experiences purely depolarizing noise may be modeled as
where T is the characteristic decay rate that describes the rate at which decoherence reduces the fidelity of the entanglement.
A fidelity curve F (t) of the form AeBt+C may be determined for a storage qubit by performing quantum state tomography on entanglement stored in the qubit for varying amounts of storage time and using software to determine A, B, and C that produce a curve which fits a plot of the empirically discovered fidelity as a function of time. In some implementations, the Fidelity Estimation Unit can be configured to perform repeated sets of quantum state tomography measurements performed at the node using the storage qubit to update the fidelity curve that characterizes the reduction in fidelity over time for that storage qubit. The parameters A, B, and C may then be modified based on these measurements to provide the corresponding lower-bounding behavior to be used until the next set of quantum state tomography measurements. Alternatively, a single set of quantum state tomography measurements can be taken and used for an arbitrary amount of time during operation of the network. Given a fidelity curve F (t)=AeBt+C the inverse fidelity curve is
Computing the “pre-swap” fidelity of each entanglement accounts for item (2), where reduction in fidelity occurs due to spontaneous decoherence in storage. We will refer to the “pre-swap” fidelity estimates of the A- and B-side entanglement as FpsA and FpsB respectively. The computed “pre-swap” estimates may then be updated to account for noise introduced due to quantum operations and measurements that realize the entanglement swap. Each (quantum gate, storage qubit) pair may be associated with a fidelity reduction function FR(Fe) which computes an estimate of the post-gate fidelity of an entanglement with initial fidelity Fe. Similarly, a measurement of a storage qubit is also associated with a fidelity reduction function FR(Fe) that computes an estimate of the fidelity of an entanglement that is measured which has had its fidelity reduced due to noise introduced during the measurement.
FpsA and FpsB can be updated. For example, suppose a gate-based entanglement swap is performed by performing a Bell state measurement that is implemented by a CNOT gate between the storage qubits holding the A- and B-side entanglements followed by a Hadamard gate on the A-side storage qubit and a measurement of both storage qubits.
Let the CNOT gate be associated with fidelity reduction curve FR,CNOT(Fe), the Hadamard gate associated with fidelity reduction curve FR,H(Fe), and the measurements associated with fidelity reduction curve FR,MEAS(Fe). FpsA and FpsB are updated in the following way:
In the case that the Bell state measurement is realized with optical components (e.g., beamsplitters and photon detectors), the operation performed may be viewed as a measurement which has a fidelity reduction function applied with no additional fidelity reduction functions corresponding to gates. The physical implementation of performing the entanglement swap may include periods of time where storage qubits decohere between the application of operations. In this case, one may apply the fidelity curves described above to account for decoherence between operations.
Fidelity reduction functions FR (Fe) may be determined empirically by performing quantum state tomography on an entanglement with varying fidelity that has had the quantum gate or measurement applied to it. Alternatively, the noise introduced by the quantum gate or measurement may be modeled by a fidelity curve F (t) and inverse fidelity curve F−1(F), in addition to a parameter top that describes the fidelity reduction introduced in applying the fidelity curve F (t). The fidelity reduction function may then be computed as:
The Fidelity Estimation Unit may provide a final function, F{SWAP}(FpsA′>FpsB′), which estimates the post-swap fidelity of an entanglement produced by swapping entanglement with fidelities FpsA′ and FpsB′. F{SWAP} (FpsA′>FpsB′) strictly accounts for the inherent loss in fidelity due to swapping imperfect entanglement and does not account for any noise introduced by quantum operations and measurements that are used on the storage qubits holding the entanglement. F{SWAP}(FpsA′, FpsB′) may be determined empirically using quantum state tomography as was the case for the fidelity curves and fidelity reduction curves described above or by using a function of the form
where A and B may be chosen to lower-bound and closely approximate the true behavior of the entanglement swap. One example approximation uses a formula:
which applies to the case that the entanglement used is of the Werner form corresponding to a worst-case noisy state.
When a network node performs an entanglement swap, it may include an estimate of the post-swap entanglement fidelity within the Swapped message that is sent to other nodes according to the schedule. Network nodes that originate a Swapped message (in some examples, such nodes do not wait for a Swapped message from any other node in the network before sending their own) may compute the post-swap fidelity estimates using the fidelity estimate of the elementary entanglement used in the swap. However, a network node that waits for a Swapped message on one (or both) of its sides before sending its own Swapped message may use the post-swap fidelity estimate in place of the fidelity estimate provided in the Entanglement-Created notification for the elementary entanglement on the side(s) the Swapped message(s) was received.
When the final Swapped message reaches the end nodes receiving the end-to-end entanglement, the post-swap fidelity estimate included in the Swapped message may be updated to account for the noise introduced due to storing the entanglement at the end node for the time duration until the final Swapped message is received, producing the final fidelity estimate for the end-to-end entanglement delivered to the end nodes. This may be performed using fidelity curves and inverse fidelity curves, as outlined previously for handling item (2) at the intermediate repeater nodes.
To provide end-to-end entanglement of sufficiently high fidelity, the entanglement swapping protocol may choose to discard elementary entanglement that has decohered for too long and its fidelity has fallen too low to satisfy the desired end-to-end entanglement fidelity. For example, in some implementations, the desired end-to-end entanglement fidelity may be determined based at least in part on a user application and may be used to determine fidelity threshold(s). This fidelity threshold information can be provided down the stack, and may originate from the controller (e.g., at the time of determining virtual channels). The fidelity curve above may also be used to determine how long an elementary entanglement may be stored for before it has fallen below an acceptable threshold FTh.
To achieve this, a network node may compute a time delta t{timer}=F−1(FTh)−F−1(Fcreate) and set a “decoherence timer” that notifies the swapping protocol at timestamp (t{discard}=t{create}+t{timer}) to discard the elementary entanglement if it is still stored. t{timer} corresponds to the amount of time it takes for an entanglement with fidelity Fcreate to decohere until it has a fidelity of FTh. If the timer triggers at t (discard) and the entanglement is still held within the quantum memory, then it is discarded and the qubit memory is freed back to the elementary entanglement generation protocol. The timer may also trigger emission of real-time classical Entanglement-Lost messages to recover from failure scenarios, which are addressed in a later section.
While a decoherence timer can be set to trigger a discard of the entanglement once its estimated fidelity falls below an acceptable threshold FTh, other fidelity thresholds and associated timers may be set to trigger other sets of actions (e.g., an error correction routine, a round of entanglement purification). More details on the establishment of and interaction between multiple fidelity thresholds and their associated timers are addressed in section 31.4.
It may be the case that performing operations on one (or more) other storage qubits (which are not managed by the swapping protocol) introduces noise and decoheres storage qubits in the underlying hardware that hold entanglement used by the swapping protocol (i.e., crosstalk noise). When such an operation is performed, the fidelity estimates and timers for entanglement in effected storage qubits may also be updated according to fidelity reduction functions and fidelity curves.
To achieve this, the Fidelity Estimation Unit may contain additional information on crosstalk noise from quantum gates and measurements. Crosstalk noise is noise introduced on local qubits that are not the direct target of a quantum gate or measurement. For example, a device may execute a Hadamard gate on one storage qubit, which introduces noise on a different storage qubit and reduces the fidelity of an entanglement stored therein. The Fidelity Estimation Unit may contain additional fidelity reduction functions which update the fidelity estimate of an entanglement to account for crosstalk. When such crosstalk noise is introduced, the decoherence timer may be updated. Suppose that a stored entanglement with initial fidelity F{create} at timestamp t{create} has a timer delay of t{timer} which notifies the swapping protocol at timestamp t{discard}=t{create}+t{timer}. Suppose further that a gate is applied to a storage qubit at some timestamp t{gate} which introduces crosstalk noise on the aforementioned stored entanglement while it was stored (that is, t{create}<t{gate}<t{create}+t{timer}). To update the decoherence timer, the node computes the “pre-crosstalk-noise” fidelity of the stored entanglement, applies the fidelity reduction function for the crosstalk noise, and then computes the remaining time on a new timer:
The new timer should then trigger at time t{new-discard}=(t{gate}+t{new-timer}). This technique may be used to additionally account for other sources of noise that the network node may identify, such as noise introduced during the elementary entanglement generation process.
In addition to setting timers which trigger the discarding of entanglement that has decohered too much to satisfy the desired end-to-end entanglement fidelity, timers may additionally be set to trigger the execution of purification to increase the fidelity. This may be done so that a stored entanglement may be kept in the quantum memory for a longer amount of time while waiting for the entanglement in the other quantum memory to become available for performing an entanglement swap.
For this, a network node may set a timer to trigger when the fidelity has reached a fidelity threshold FTh,purify and purification should be performed. Such fidelity thresholds for purification should be larger than the fidelity threshold for discarding an entanglement, as an entanglement cannot be purified if it is no longer located within the quantum memory. The timer may be calculated similarly to the previously described timer which triggers discarding of entanglement. This timer may also be updated to account for any crosstalk noise introduced.
If a timer triggers and there is an insufficient number of stored entanglements in order to perform purification, the network node may be configured to ignore purification or it may be configured to do so as soon as additional entanglements become available to enable purification. Upon performing purification, a new fidelity estimate for the now-purified entanglement may be calculated, and new timers that trigger purification or discarding of the entanglement may be computed based on the new fidelity estimate. In some implementations, it is the controller that configures the nodes to manage timers and perform associated actions (e.g., determining how timers trigger actions based on comparison of timers to thresholds, and determining what actions to perform based on predetermined rules).
In some implementations, the expiration of a timer may be mapped to trigger an action, or multiple actions, from a set of actions. The choice of triggered action(s) may depend on local state information, and/or a set of rules or instructions configured by the controller. The controller may install such rules or instructions based on user request information, network state, resource availability, network fairness or utility metrics, and/or observed telemetry from monitoring. For example, a timer can be set to expire when the estimated fidelity of an entanglement decoheres below a threshold of FTh,QEM. Upon expiration, that timer may trigger one or more quantum error mitigation routines from a larger family of appropriate quantum error mitigation circuits. If the controller has been routinely monitoring the performance of the associated physical link(s) or node(s) and observes a common error syndrome, the controller may configure the local node to trigger a quantum error mitigation circuit that is tailored to mitigate the effects of most detrimental observed error when its local timer expires.
A timer expiration may also trigger the transmission of classical messages, the setting of new thresholds and timers, and/or the adjustment of existing thresholds and timers. Certain actions may be triggered with the intention of improving the fidelity of an existing entanglement (e.g., via a purification routine), but are stochastic in nature and may actually result in a decrease in estimated fidelity if unsuccessful. In such a case with unsuccessful purification, another fidelity threshold for triggering purification may be increased or established with the intention of triggering another attempted round of purification before reaching the discard threshold. In cases where the purification or error mitigation routine is successful in improving the estimated fidelity of the entanglement, another fidelity threshold may be decreased to avoid running another round of resource-intensive purification or error mitigation.
The involvement of the controller in the dynamic installation and configuration of multiple fidelity thresholds, timers, and their associated actions is valuable for efficient operation and management of a robust quantum network system. As different actions may take different amounts of time or resources to run, the nodes, in conjunction with the controller, may use these timers and configurations effectively to preserve and improve overall network reliability, fairness, and performance (e.g., end-to-end entanglement fidelity, end-to-end entanglement generation rate).
During the process of creating end-to-end entanglement to meet the requests of the virtual circuit (VC) demand database, many elementary and non-elementary entanglements may be consumed by the swapping protocol in order to distribute long-range entanglement across the network. To create end-to-end entanglement between the hosts of an N-node path, the swapping protocol may need to consume Q (N) entanglement pairs. In the era of non-deterministic photon sources, diverse quantum hardware platforms with differing noise models, and varying link distances, as the network develops more complexity, it becomes rapidly more probable that at least one entangled pair of qubits will decohere beyond recovery as it is waiting to be consumed by a swapping protocol FSM instance. There are factors which negatively impact the entanglement fidelity other than the idle passage of time, such as gate noise. An analysis of the impact of these factors on entanglement fidelity has been disclosed herein, which may allow for the following assumptions to be achieved:
To adapt our swapping protocol to handle decohered entanglements, a new type of classical message may be used: the Entanglement-Lost (EL) message. The EL message may contain an entanglement identifier, signifying the entanglement link that was lost, as well as the entanglement sequence number and virtual circuit associated with that lost link. The following table shows some of the fields within an example EL message, with an indication of which fields are “required” or “optional” in this particular example message format:
Due to the probabilistic nature of quantum hardware, channel loss, and the quantum operations that underpin quantum network protocols, attempts at establishing end-to-end entanglement may often be unsuccessful. To recover from such system failures such as qubits being lost, entanglement swaps being unsuccessful, or qubits decohering below a useful fidelity threshold, the controller subsystem may configure the quantum network protocol stack to automatically reattempt elementary entanglement generation. As many subprocesses of quantum networking protocols rely on photon interference to establish and distribute entanglement, subsystems my require photons to be substantially indistinguishable and substantially synchronized. Thus, to generate high-fidelity end-to-end entanglement, it may be beneficial to synchronize the establishment (and re-establishment) of elementary entanglement on local links. Such synchronous establishment of entanglement may further improve photon interference, mitigate decoherence, enable higher-fidelity swapping operations, prevent throughput bottlenecks, and result in higher-fidelity end-to-end entangled pairs. One way to increase (or in some cases maximize) the probability of synchronous establishment of nearby elementary entanglements is to specify an entanglement regeneration delay value in the EL message, as described in Table 3. If appropriately configured and specified by the controller subsystem, a node receiving an EL message may intentionally delay the time to attempt generation of a new elementary entanglement with its respective neighboring node. It may be the responsibility of the controller subsystem to calculate, install, and update such delay values in the appropriate protocol subsystem(s). The controller subsystem may take into account network state, network information, topology, performance characteristics, hardware capabilities, and real-time telemetry/metrology to calculate and install delay values. The controller subsystem may use classical processing units, graphical processing units, and/or quantum processing units to calculate such values. The controller subsystem may run these calculations using mathematical, analytical, simulation, Bayesian, and/or machine learning algorithms to calculate entanglement regeneration delays. Such algorithms may use experimental telemetry/metrology data to iteratively adjust delays with the objective of maximizing aggregate network performance, utility, and/or fairness.
Other aspects of the techniques associated with a layered quantum networking environment can include the following.
In one aspect, in general, a method for managing entangled quantum states in a network of nodes comprises: sending, from a controller in the network, scheduling information to each of a plurality of nodes in the network, where the scheduling information specifies a procedure to be executed for scheduling entanglement swap operations associated with portions of a plurality of paths through nodes in the network; for each of two or more pairs of nodes on a first path over a set of N nodes in the network, establishing entanglement between pairs of quantum elements in the respective nodes of that pair of nodes based at least in part on one or more quantum signals transmitted over one or more quantum communication channels, where N≥3; performing a plurality of entanglement swap operations among different respective subsets of nodes in the set of N nodes using the pairs of entangled quantum elements; and managing the plurality of entanglement swap operations during establishment of end-to-end entanglement between respective quantum elements in the nodes at the ends of the first path over the set of N nodes based at least in part on: the scheduling information, identifiers that identify entanglement resulting from respective entanglement swap operations, and a plurality of estimates of fidelity of entanglement between a first quantum element at the first node in the network and a second quantum element at a second node in the network, where the plurality of estimates are generated at different respective times and/or at different respective nodes in the network.
In another aspect, in general, a method for managing entangled quantum states in a network of nodes, for a plurality of time periods, comprises: receiving, at a first node in the network, a first message indicating that a first quantum element at the first node is entangled with a quantum element at a second node in the network, where the first message comprises a first identifier that uniquely identifies one of a plurality of entanglement generation operations between the first and second nodes over a first time period of the plurality of time periods; receiving, at the first node, a second message indicating that a second quantum element at the first node is entangled with a quantum element at a third node in the network, where the second message comprises a second identifier that uniquely identifies one of a plurality of entanglement generation operations between the first and third nodes over the first time period; and generating, at the first node, a third identifier that identifies an entanglement resulting from an entanglement swap operation based on the entangled quantum elements at the first and second nodes and the entangled quantum elements at the first and third nodes. The generating comprises: including at least a portion of the first identifier in the third identifier, and including at least a portion of the second identifier in the third identifier.
Aspects can include one or more of the following features.
The generating further comprises: including in the third identifier one or more values that uniquely identify a link between the first and second nodes from all other links on a path through a series of nodes that includes the first, second, and third nodes, and including in the third identifier one or more values that uniquely identify a link between the first and third nodes from all other links on the path.
The one or more values that uniquely identify the link between the first and second nodes comprise a value that identifies the first node and a value that identifies the second node.
The first node receives the first message from the second node.
The first node receives the first message at a first layer executing on the first node from a second layer executing on the first node.
In another aspect, in general, a method for managing entangled quantum states in a network of nodes comprises: for each of two or more pairs of nodes on a path over a set of N nodes in the network, establishing entanglement between pairs of quantum elements in the respective nodes of that pair of nodes based at least in part on one or more quantum signals transmitted over one or more quantum communication channels, where N>3; performing a plurality of entanglement swap operations among different respective subsets of nodes in the set of N nodes using the pairs of entangled quantum elements, where each entanglement swap operation comprises: performing a joint measurement on a non-entangled pair of quantum elements in a node that is a member of two different pairs of nodes of the two or more pairs of nodes, resulting in a measurement result; and managing the plurality of entanglement swap operations during establishment of end-to-end entanglement between respective quantum elements in the nodes at the ends of the path over the set of N nodes using a set of classical messages transmitted over one or more classical communication channels, where each classical message in the set of classical messages comprises one or both of: information indicating success or failure of a particular entanglement swap operation, and information indicating the measurement result of the joint measurement performed for the particular entanglement swap operation. One or more of the classical messages in the set of classical messages are sent in a first direction between nodes on the path, and one or more of the classical messages in the set of classical messages are sent a second direction opposite to the first direction between nodes on the path. None of the classical messages in the set of classical messages or messages acknowledging success or failure of one or more of the plurality of entanglement swap operations are transmitted from one of the nodes at the ends of the path with a destination of the other of the nodes at the ends of the path.
Aspects can include one or more of the following features.
The joint measurement comprises a Bell state measurement.
The classical messages further comprise an estimate of a fidelity of an entanglement established using the particular entanglement swap operation.
The non-entangled pair of quantum elements comprise members of two different pairs entangled quantum elements.
The one or more quantum communication channels comprise at least a first transmission medium on links between nodes of the set of N nodes, and the one or more classical communication channels comprise at least a second transmission medium on the links different from the first transmission medium.
The one or more quantum communication channels comprise a first wavelength band on at least one optical transmission medium on links between nodes of the set of N nodes, and the one or more classical communication channels comprise a second wavelength band on the optical transmission medium on the links.
In another aspect, in general, a method for managing entangled quantum states in a network of nodes comprises: sending, from a first node in the network, a first message indicating that a first quantum element at the first node is entangled with a second quantum element at a second node in the network, where the first message comprises a first estimate of a fidelity of entanglement between the first and second quantum elements, and a timestamp indicating a time associated with the first estimate; generating, based at least in part on the first message, a second estimate of a fidelity of the entanglement between the first and second quantum elements, at a second time after the time indicated by the timestamp; comparing the second estimate to each of a plurality of thresholds; and performing a first action in response to a result of comparing the second estimate to a first threshold of the plurality of thresholds, and performing a second action different from the first action in response to a result of comparing the second estimate to a second threshold of the plurality of thresholds.
Aspects can include one or more of the following features.
At least one of the plurality of thresholds is adjusted between the first time and the second time based at least in part on information characterizing an event occurring on at least one of the first or second nodes.
The event comprises an operation that increases noise associated with the first or
second quantum element, and the threshold that is adjusted is reduced.
The event comprises an operation that reduces noise associated with the first or second quantum element or an operation that performs error correction or mitigation associated with the first or second quantum element, and the threshold that is adjusted is increased.
The event comprises an action that is performed based at least in part on a result of comparing a third estimate of a fidelity of the entanglement between the first and second quantum elements, generated at a third time between the first and second times, to one of the plurality of thresholds.
The second estimate is based at least in part on a value resulting from a function applied to the first estimate.
In another aspect, in general, a method for managing entangled quantum states in a network of nodes comprises: receiving, at a first node in the network, a first message indicating that a first quantum element at the first node is entangled with a second quantum element at a second node in the network, where the first message comprises a first estimate of a fidelity of entanglement between the first and second quantum elements; receiving, at the first node, storage information characterizing a reduction in fidelity due to storage of quantum states on at least one of the first or second quantum element, and swap information characterizing a reduction in fidelity due to one or more quantum operations associated with an entanglement swap operation based on the entangled quantum elements at the first and second nodes and entangled quantum elements at another pair of nodes; and generating, at the first node, a second estimate of a fidelity of a result of the entanglement swap operation based at least in part on: the storage information, and the swap information.
Aspects can include one or more of the following features.
The second estimate of the fidelity of the result of the entanglement swap operation is further generated based at least in part on purification information characterizing an increase in fidelity due to at least one entanglement purification operation.
The storage information comprises a time duration resulting from an inverse function applied to the first estimate.
The storage information characterizes the reduction in fidelity based at least in part on a plurality of measurements of previously stored quantum states on at least one of the first or second quantum elements for different durations of time.
The storage information characterizes the reduction in fidelity based at least in part on a computed model characterizing time dependence of quantum states stored on at least one of the first or second quantum elements.
The swap information characterizes the reduction in fidelity based at least in part on at least one previously performed entanglement swap operation associated with at least one of the first or second quantum element.
The swap information characterizes the reduction in fidelity based at least in part on a computed model of an entanglement swap operation associated with at least one of the first or second quantum element.
In another aspect, in general, a method for managing entangled quantum states in a network of nodes comprises: sending, from a controller in the network, a first message to a first node in the network, where the first message comprises scheduling information that specifies a procedure to be executed for scheduling entanglement swap operations associated with portions of a plurality of paths through nodes in the network; sending, from the controller, a second message to a second node in the network, where the second message comprises the scheduling information; executing at least a portion of the procedure at the first node based at least in part on the first message and based at least in part on information associated with one or more previous attempts to establish entanglement between nodes on a first path of the plurality of paths that includes the first node; and executing at least a portion of the procedure at the second node based at least in part on the second message and based at least in part on information associated with one or more previous attempts to establish entanglement between nodes on a second path of the plurality of paths that includes the second node.
Aspects can include one or more of the following features.
The information associated with one or more previous attempts to establish entanglement between nodes on the first path comprises information indicating success or failure of an entanglement swap operation.
The information associated with one or more previous attempts to establish entanglement between nodes on the first path comprises information indicating receipt of classical messages.
The information associated with one or more previous attempts to establish entanglement between nodes on the first path comprises an estimate of fidelity of entanglement established between a pair of nodes on the first path.
The information associated with one or more previous attempts to establish entanglement between nodes on the first path comprises information indicating that an estimate of fidelity of entanglement established between a pair of nodes on the first path is below a predetermined threshold.
The information associated with one or more previous attempts to establish entanglement between nodes on the first path comprises information indicating a result of a Bell state measurement performed in an entanglement swap operation.
Aspects can have one or more of the following advantages.
Techniques for managing entanglement swap operations may enable identifiers to be determined in an efficient manner that reduces the amount of overall communication that is needed.
Techniques for fidelity estimation can enable fidelity estimates to be efficiently updated and compared to multiple different thresholds to take into account a variety of factors that may impact fidelity.
Techniques for providing network control can allow for both centralized network management as well as dynamic local state transitions that enable responsiveness to local conditions associated with entanglement generation.
In another aspect, in general, a method for managing entangled quantum states in a network of nodes comprises: sending, from a controller in the network, scheduling information to each of a plurality of nodes in the network, where the scheduling information specifies a procedure to be executed for scheduling entanglement swap operations associated with portions of a plurality of paths through nodes in the network; for each of two or more pairs of nodes on a first path over a set of N nodes in the network, establishing entanglement between pairs of quantum elements in the respective nodes of that pair of nodes based at least in part on one or more quantum signals transmitted over one or more quantum communication channels, where N≥3; performing a plurality of entanglement swap operations among different respective subsets of nodes in the set of N nodes using the pairs of entangled quantum elements; and managing the plurality of entanglement swap operations during establishment of end-to-end entanglement between respective quantum elements in the nodes at the ends of the path over the set of N nodes based at least in part on: at each of a first node, a second node, and a third node on the first path, using the scheduling information to perform at least a portion of the procedure, and at the first node, generating a first identifier that identifies entanglement resulting from an entanglement swap operation based on (1) entangled quantum elements at the first and second nodes identified by a second identifier, and (2) entangled quantum elements at the first and third nodes identified by a third identifier, where the generating comprises: including at least a portion of the second identifier in the first identifier, and including at least a portion of the third identifier in the first identifier.
In another aspect, in general, a method for managing entangled quantum states in a network of nodes comprises: for each of two or more pairs of nodes on a first path over a set of N nodes in the network, establishing entanglement between pairs of quantum elements in the respective nodes of that pair of nodes based at least in part on one or more quantum signals transmitted over one or more quantum communication channels, where N≥3; performing a plurality of entanglement swap operations among different respective subsets of nodes in the set of N nodes using the pairs of entangled quantum elements; and managing the plurality of entanglement swap operations during establishment of end-to-end entanglement between respective quantum elements in the nodes at the ends of the first path over the set of N nodes based at least in part on: a plurality of messages sent between nodes in the network, including a first message indicating that a first quantum element at a first node in the network is entangled with a second quantum element at a second node in the network, where the first message comprises a first estimate of a fidelity of entanglement between the first and second quantum elements, and a plurality of estimates of fidelity of entanglement, including a second estimate of a fidelity of the entanglement between the first and second quantum elements, where the second estimate is generated at the second node based at least in part on at least one of (1) the first message, or (2) fidelity reduction information comprises at least one of (a) storage information characterizing a reduction in fidelity due to storage of quantum states on at least one of the first or second quantum element, or (b) swap information characterizing a reduction in fidelity due to one or more quantum operations associated with an entanglement swap operation based on the entangled quantum elements at the first and second nodes and entangled quantum elements at another pair of nodes.
In another aspect, in general, a method for managing entangled quantum states in a network of nodes comprises: sending, from a controller in the network, scheduling information to each of a plurality of nodes in the network, where the scheduling information specifies a procedure to be executed for scheduling entanglement swap operations associated with portions of a plurality of paths through nodes in the network; and managing the scheduled entanglement swap operations based at least in part on: at each of a first node, a second node, and a third node on the first path, using the scheduling information to perform at least a portion of the procedure, a plurality of messages sent between nodes in the network, including a first message indicating that a first quantum element at a first node in the network is entangled with a second quantum element at a second node in the network, where the first message comprises a first estimate of a fidelity of entanglement between the first and second quantum elements, and a plurality of estimates of fidelity of entanglement, including a second estimate of a fidelity of the entanglement between the first and second quantum elements, where the second estimate is generated at the second node based at least in part on at least one of (1) the first message, or (2) fidelity reduction information comprises at least one of (a) storage information characterizing a reduction in fidelity due to storage of quantum states on at least one of the first or second quantum element, or (b) swap information characterizing a reduction in fidelity due to one or more quantum operations associated with an entanglement swap operation based on the entangled quantum elements at the first and second nodes and entangled quantum elements at another pair of nodes.
The techniques described above, including techniques based on equations that describe physical states of devices and/or signals propagating into, between, or from various devices, can be implemented using one or more programs comprising instructions for execution on a device or module including one or more processors or other circuitry for executing the instructions. For example, the instructions can execute procedures of software or firmware that runs on one or more programmed or programmable computing devices or modules including at least one processor and at least one data storage system (e.g., including volatile and/or non-volatile memory or storage media). The programs may be provided on one or more non-transitory computer readable media, or delivered over a communication medium such as network to a device where is stored on one or more non-transitory computer readable media. The instructions of the program may be operable to cause one or more processors of computing devices or modules (e.g., within the nodes of a network) to perform various steps of the program individually or together. The term “non-transitory,” as used herein, is intended to exclude electromagnetic signals as they are propagating over a communication medium, but is not intended to otherwise limit the type of computer-readable medium that may store any portion of the programs. For example, a non-transitory computer readable medium may include a dynamic random-access memory (DRAM) or other medium that does not necessarily store information in a permanent or non-volatile manner.
While the disclosure has been described in connection with certain embodiments, it is to be understood that the disclosure is not to be limited to the disclosed embodiments but, on the contrary, is intended to cover various modifications and equivalent arrangements included within the scope of the appended claims, which scope is to be accorded the broadest interpretation so as to encompass all such modifications and equivalent structures as is permitted under the law.
This application claims priority to and the benefit of U.S. Provisional Application Ser. No. 63/536,998, entitled “MANAGING NOISE MITIGATION FOR QUANTUM NETWORKS,” filed Sep. 7, 2023, and U.S. Provisional Application Ser. No. 63/465,598, entitled “MANAGING NOISE MITIGATION FOR QUANTUM NETWORKS,” filed May 11, 2023, each of which is incorporated herein by reference.
Number | Date | Country | |
---|---|---|---|
63536998 | Sep 2023 | US | |
63465598 | May 2023 | US |