Here, example algorithms are disclosed to approximate complex-valued periodic functions ƒ(eiθ) as a matrix element of a product of SU(2)-valued functions, and analyze its numerical stability. In this disclosure, it is proven that the algorithm runs in time poly (n log(1/ϵ)) on a Turing machine where n is the degree of the polynomial that approximates ƒ with accuracy ϵ; previous efficiency claim assumed a strong arithmetic model of computation. This product decomposition forms the foundation of embodiments of the quantum signal processing schemes disclosed herein.
In some embodiments, one or more unitary-valued functions are generated by a classical computer generating using projectors with a predetermined number of significant bits. A quantum computing device is configured to implement the one or more unitary-valued functions.
In certain embodiments, a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions is generated by a classical computer, wherein the generating further includes representing approximate polynomials in a Fourier series with rational coefficients. A quantum computing device is configured to implement a quantum circuit defined by the quantum circuit description.
In particular embodiments, a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions is generated by a classical computer, wherein the generating further includes truncating terms in approximation polynomials with coefficients determined by a preset accuracy parameter. A quantum computing device is configured to implement a quantum circuit defined by Y the quantum circuit description.
In some embodiments, a quantum circuit description is generated, by a classical computer, for implementing quantum signal processing that decomposes complex-valued periodic functions, wherein the generating further includes expanding factorized polynomial using discrete fast Fourier transforms. A quantum computing device is configured to implement a quantum circuit defined by the quantum circuit description.
In certain embodiments, a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions is generated by a classical computer, wherein the generating further includes determining complementary polynomials by finding roots of Laurent polynomials to a preset accuracy. A quantum computing device is configured to implement a quantum circuit defined by the quantum circuit description.
Any of the disclosed embodiments can be implemented by one or more computer-readable media storing computer-executable instructions, which when executed by a computer cause the computer to perform any of the disclosed methods. Also disclosed herein are systems for performing embodiments of the disclosed embodiments comprising a classical computer configured to program, control, and/or measure a quantum computing device. The foregoing and other objects, features, and advantages of the disclosed technology will become more apparent from the following detailed description, which proceeds with reference to the accompanying figures.
Quantum signal processing refers to a scheme to construct an operator V from a more elementary unitary W where V=Σ0ƒeiθ)|θθ| and =eiθθ| share the eigenvectors but the eigenvalues of V are transformed by a function ƒ from those of W. The transformation typically uses only one ancilla qubit, and is achieved by implementing control-W and control-W†, interspersed by single-qubit rotations on the control, and final post-section on the control. This technique produces gate-efficient quantum algorithms for, e.g., Hamiltonian simulations, which is asymptotically optimal when the Hamiltonian is sparse and given as a blackbox, or as a linear combination of oracular unitaries. Furthermore, this technique with rigorous error bounds is useful and competitive, even for explicitly described, rather than oracular, local Hamiltonian simulation problems. It has also been promised for use in solving linear equations.
However, in quantum signal processing the classical preprocessing to find interspersing single-qubit rotations for a given transformation function ƒ has been so numerically unstable, that it is unclear whether it can be performed efficiently. For example, one paper reports that the computation time was “prohibitive” to obtain sequences of length ≥30 of interspersing unitaries for Jacobi-Anger expansions (which is explained later in Section V later). For some cases, the usefulness of the quantum signal processing approach hinges upon the ability to compute long sequences of interspersing single-qubit rotations.
It has been asserted that there exists a polynomial time classical algorithm, but this claim is based on an unusual computational model where any real arithmetic, including evaluation of radicals, trigonometric functions and polynomial root finding, can be performed with arbitrary precision in unit time. Such a computational model is too powerful to be realistic. Allowing arbitrary integer arithmetic at unit cost, one can not only factor integers in time that is linear in the number of digits, but also solve NP-hard problems in polynomial time. The basic idea in Arnold Schoenhage, “On the power of random access machines,” in Automata, Languages and Programming, ICALP 1979, Lecture Notes in Computer Science, Vol. 71, edited by Maurer H. A., pp. 520-529 (Springer, Berlin, Heidelberg, 1979) is to relate the expansion of a Boolean formula in a conjunctive form into a disjunctive form with the expansion of a polynomial from its factors. Then, the satisfiability translates to the positiveness of certain coefficients in the expansion. The variable in the polynomial is set to a sufficiently large number, effectively encoding the entire polynomial in a single big number. An important elementary fact that underlies the power of arithmetic model is that one only needs O(n) compositions of squaring operation x→x2 to reach a 2n-grit number. In a seemingly mundane problem involving real numbers, the number of required bits during the computation can be a priori very large. For example, it is still an open problem whether one can decide the larger between Σj=1k√{square root over (aj)} and Σj=1k√{square root over (bj)}, which are sums of square roots of positive integers aj, bj that are smaller than n, in time pal i(k log n) on a Turing machine.
The numerical instability of previous methods may be attributed to expansions of large degree polynomials that are found by roots of another polynomial. Crudely speaking, there are two problems in this approach. Fir the polynomial expansions can be regarded as the computation of convolutions, which, when naively iterated, suffers from numerical instability. Second, although the root finding is a well-studies problem, to use the roots to construct another polynomial one has to understand the distribution of the roots to keep track of the loss of precision. These problems were not addressed previously.
Here, numerous refinements are made to the algorithm to find interspersing single-qubit rotations and to bound the number of required bits in the computation for a desired accuracy to a final answer. It can be concluded that the classical preprocessing can indeed be done in polynomial time on a Turing machine. Here, the methods of Guang Han Low, Theodore J. Yoder, and Isaac L. Chuang, “Methodology of resonant equiangular composite quantum gates,” Phys. Rev. X 6, 041067 (2016), 1603.03996, are generally adopted, but simplified manipulations are introduced by avoiding trigonometric polynomials. Some generalizations are obtained with simpler calculations. For the numerical stability and analysis, embodiments of the disclosed algorithm avoid too small numbers by sacrificing approximation quality in the initial stage, and replacing polynomial expansions by a Fourier transform. These modifications enable one to handle the problems that are mentioned previously.
One can start by reviewing quantum signal processing in the next section, and then develop an algorithm and analyze it. In two short sections later, a exemplary self-contained treatment of polynomial approximations for Hamiltonian simulation problems and matrix inversion problems is provided. Throughout the disclosure, U(1) is used to denote the group of all complex numbers of unit modulus. Sometimes, reference will be made to U(1) as the unit circle. As usual, i=√{square root over (−1)}, and X, Y, Z are Pauli matrices.
To understand how the eigenvalue transformation (signal processing) works, it is convenient to consider the action of control-W restricted to an arbitrary but fixed eigenstate |θ of W. The eigenvalue eiθ associated with |θ is kicked back to the control qubit to induce a unitary |θ0|+eiθ|11| on the control qubit. Conjugating the control-W by a single qubit unitary on the control, one sees that |0 and |1 can be any orthonormal basis vectors |0′, |1′ of the control qubit. If one allow themselves to implement the inverse of the control-. W, which is reasonable, one can also implement
(|0′0′|+eiθ|1′1|)(|0″0″|+e−iθ|1″1″|)=(e−iθ/2|0″0″|+eiθ/2|1′1″|)(eiθ/2|0″0″|+e−iθ/2|1″1″|) (1)
where {|0′, |1′|1′} and {|0″,|1″} are arbitrary orthonormal bases. The square root function eiθ→eiθ/2 has a branch cut, but it hardly matters, as long as one is consistent that e−iθ/2 denotes the inverse of the square root. When one can alternate an even number of control-W and control-W†, this approach allows one to assume that an implementable unitary on the control qubit is a product of primitive matrices
EP(t)=tP+t−1Q (2)
where t=eiθ/2 and P,Q are projectors of rank 1 that sum to the identity. Thus, an even number n of control-W and control-W† induces F(t)=EP
A further question is then what F(t) is achievable in the form of
F(t)=E0EP
where one can insert an additional single-qubit unitary E0. Since UEP(t)U†=EUPU
Definition 1. For any integer n≥0, let n be the set of all Laurent polynomials F(t)=Σ−n≤j≤nCjtj in t with coefficients Cj in 2-by-2 complex matrices, such that F(η)∈SU(2) for all complex numbers η of unit modulus. One can say that its F(t)∈n has degree n if Cn0≠0 or C−n≠0. One can define εn to be the subset of n comprising F(t) where the exponents of t in F(t) belong to {−n, −n+2, −n+4, . . . , n−2, n}. Note that 0=ε0=SU(2), and for any orthogonal projector P one has EP(t)∈ε1. One can define F†(t) to be ΣjCj†tjIn a set-theoretic notation, the definitions are as the following.
Theorem 2. Any n-fold product EP
This completely characterizes polynomial functions U(1)→SU(2) and covers all previous results on “achievable function functions” in quantum signal processing. Embodiments of the disclosed technology are slightly more general since previous results assume that Tr(PjZ)=0.
Proof. The first statement is trivia definition. The proof of the converse is induction in n where the base case n=0 is trivial. The induction step is proved as follows. Here, it will be proven that hr any F(t)∈εn of degree n>0 there exists a EP(t) such that F(t)EP(t)∈εn−1. One might find it unusual that degree of a polynomial is decreasing under multiplication, but in the algebra of matrices two nonzero matrices may multiply to vanish. Such EP(t) is unique since F†(1/t)F(t)=I=EP†(1/t)F†(1/t)F(t)E′P(t) for two possible EP(t) and E′P(t). Also, the product F(t)EP(t) must have degree n−1; otherwise F(t) would have degree less than n.
The existence of the EP will now be shown. Consider F(t)=Σj=−nnCjtj as a 2-by-2 matrix of four Laurent polynomials. The defining property det F(t)=1 holds for infinitely many values of t, and therefore it should hold as a polynomial equation. Taking the leading term, one has t2n det Cn+(lower order terms)=1. Similarly, taking the leading term in t−1, one has t−2n det C−n+(higher order terms)=1. Hence,
det Cn=0=det C−n.
Similarly, from the equation F†(1/t)F(t)=I=F(t)F†(1/t) one has t2nC−n†Cn+(t2n−1)=I=t2nCnC−n†+(t2n−1) and hence
C−n†Cn=0=CnC−n† (7)
Suppose Cn≠0. Let P be a rank-1 projector such that CnP=0, and let Q=I−P. Such P is unique since C is a two-by-two matrix of rank one. Then, a claim is made that F(t)(tP+t−1Q)∈εn−1. Indeed, expanding the left-hand side one has
t−n−1C−nQ+t−n+1(C−nP+C−n+2Q)+ . . . +tn−1(CnQ+Cn−2P)+tn+1CnP. (8)
(This is the only place one uses ε instead of .) If C−n=0, this implies the claim. If C−n≠0, then P∝C−n†C−n and therefore C−nQ=0, implying the claim. The case C−n≠0 is completely parallel. (Actually, C−n≠0 if Cn≠0 as one will see later.)
Recall that under the standard representation of Pauli matrices, Z is diagonal, and X,Y are off-diagonal. Suppose an SU(2)-valued function θ→F(eiθ)=a(eiθ)I+b(eiθ)iX+c(eiθ)iY+d(eiθ)iZ has even functions (reciprocal in t=eiθ) in the diagonal and odd (anti-reciprocal in t=ei0) in the off-diagonal. It is claimed that if F(t) is an element of εn then the primitive matrix EP
It follows that 0=Tr(Z)=Tr(F(t)ZF†(t))=t2nTr(CnZCn†)+ . . . +t−2nTr(C−nZC−n†) as a polynomial in t, and hence Tr(Cn†CnZ)=0=Tr(C−n†C−nZ) when u>0. The matrix C±n†C±n is proportional to the projector Pn up to the identity in the construction of the factor EP
Moreover, it then follows that F(t)EP
Pj=eiZϕ
where ϕj∈ is some angle. In fact, Guang Hao Low, Theodore J. Yoder, and Isaac L. Chuang, “Methodology of resonant equiangular composite quantum gates,” Phys. Rev. X 6, 041067 (2016), 160103996 exclusively considered EP(t) of this form. This is contrasted to the general case where Pj is identified with a point on the Bloch sphere.
Note that E0, the residual SU(2) factor in the decomposition, has generally nonzero Z-component. Since EP(1)=I for any projector P, one knows that E0=F(1)=a(1)I+b(1)iX+c(1)iY+d(1)iZ, but b(1)=c(1)=0 due to their anti-reciprocity. This implies that E0=eiZϕ
Quantum signal processing does not use F(t) itself, but rather a certain matrix element of it. Hence, it is important to know what a matrix element can be. Observe that any member of SU (2) can be written as aI+biX+ciY+diZ where the real numbers a, b, c, d satisfy a2+b2+c2+d2=1, and this decomposition is unique. (The group SU(2) is identified with the group of all unit quaternions.) Thus, a member F(z) ϵ can be written uniquely as F(z)=a(z)I+b(z)iX+c(z)iY+d(z)iZ. Here, a(z), b(z), c(z), d(z) are Laurent polynomials such that a(z)2+b(z)2+c(z)2+d(z)2=1, and each takes real values on U(1).
Definition 3. A (Laurent) polynomial with real coefficients is called a real (Laurent) polynomial. The degree of a Laurent polynomial is the maximum absolute value of the exponent of the variable whose coefficient is nonzero. A Laurent polynomial ƒ(z) is reciprocal if ƒ(z)=ƒ(1/z), or anti-reciprocal if ƒ(z)=−ƒ(1/z). A Laurent polynomial function ƒ: x→ is real-on-circle if ƒ(z)∈ for all z∈ of unit modulus. A real-on-circle Laurent polynomial ƒ(z) is pure if ƒ(z) is real reciprocal or iƒ(z) is real anti-reciprocal.
The term “pure” is used because a Laurent polynomial ƒ(z) with complex coefficients is real-on-circle if and only if
are real Laurent polynomials. (Proof: Write ƒ(eiθ)=Σjajeijθ, with the complex conjugate being Σj
One is now ready to state a sufficient con, r under which a complex polynomial qualifies to be a matrix element of some F(t)▮n. One can think of a(z) and b(z) below as the real and imaginary part of a complex function, respectively.
Lemma 4. Let a(z) and b(z) be real-on-circle Laurent polynomials of degree at most n such that a(η)2+b(η)<1 for all η∈U(1). If a(z)2+b(z)2 is reciprocal (e.g., a(z) and b(z) are pure), then there exist pure real-on-circle Laurent polynomials c(z)=c+(z) and d(z)=id−(z) of degree at most n such that a(z)2+b(z)2+c(z)2+d(z)2=1.
Note that if a(z) is pure and a(z)2+b(Z)2 is reciprocal, then b(z) is also pure. (Proof: b(z)2=(b+(z)+ib−(z))2=(z)b+(z)2−b−(z)2+2ib+(z)b−(z) has to be real.)
Proof. The Laurent polynomial 1−a(z)2−b(z)2 is reciprocal real of degree n′ that is at most 2n; the leading terms of a(z)2 and b(z)2 might cancel each other so that n′<2n. Due to the reciprocity, any real root r comes in a pair (r, 1/r) where r≠±1 since no root exists on U(1). For the same reason, any nonreal complex root z comes in a quadruple (z,
=[r∈:1−a(r)2−b(r)2=0,(r)>0,|r|<1], (12)
=[r∈:1−a(r)2−b(r)2=0,|r|<1]. (13)
These are lists rather than sets, as one takes the multiplicities into account. So, 4||+2||=2n′. (A reciprocal Laurent polynomial of degree n′ has 2n″ roots.) If n′ is even, let =12 be a partition into sublists of equal lengths; if n′ is odd, let =12 be a partition into sublists of lengths differing by one. Consider factors of 1−a(z)2−b(z)2:
The factor e(z) is a real Laurent polynomial of degree ┌n′/2┐. Then, the product e(z)e(1/z) is real reciprocal and has degree 2||+|1|+|2|=n′. The degree of a Laurent polynomial in the definition is only subadditive under multiplication of two Laurent polynomials. For example, the product (z−1)(z−1−2) has degree one. Now the two Laurent polynomials e(z)e(1/z) and 1−a(z)2−b(z)2 are reciprocal real, and have the same roots, and therefore they differ by a constant factor
Evaluating this expression at z=1, one sees that α is positive. Thus, one finishes the proof by observing
Both the reciprocal (c(z)) and anti-reciprocal (d(z)) combinations have degree≤┌n′/2┐≤n.
As one can see in the proof, given a(z) and b(z), the “remainder” Laurent polynomials c(z), d(z) are not unique. At least, the partition 12 is arbitrary.
In this section, an example algorithm is considered to find interspersing single-qubit unitaries given a complex function A(φ)+iB(φ). The example algorithm, in this embodiment, comprises two main parts: first, one finds a SU(2)-valued function of φ such that a particular matrix element is the input function. It suffices to find a good approximation. Second, one has to decompose the SU(2)-valued function into a product of primitive matrices. Constructive proofs for both the steps have already been given, but the construction can be tailored so that numerical error is reduced and traceable. An example algorithm is outlined first, deferring certain details to the next subsection. The computational complexity will be analyzed subsequently.
Step 0. The complexity of this Step depends on the nature of the true target functions A(z) and B(z); the smoother the functions are, the lower the complexity is. An obvious approach is to expand the given function in Fourier series and truncate it at a certain degree to desired accuracy. See Sections V and VI for examples.
Step 1. Put ã(z)=(1−2ϵ)Ã(z)=ãkzk and {tilde over (b)}(z)=(1−2ϵ){tilde over (B)}(z)={tilde over (b)}kzk, where only finitely many ãk, {tilde over (b)}k are nonzero. Let n be the largest positive integer such that at least one of |ãn|, |ã−n|, |{tilde over (b)}|, |b−n| is ≥ϵ/n.
Approximate every coefficient of ã(z) and {tilde over (b)}(z) by rational numbers up to error ϵ/n to obtain a(z) and b(z); this can be done by continued fractions. The rational approximation should preserve reality and (anti-)reciprocity if exists. Any coefficient that are smaller than ϵ/n is made zero by the rational approximation. By the choice of r, the degrees of a(z) and b(z) are at most n, and one of them is indeed n. Then, one can easily show that a(z) and b(z) satisfies all four conditions. The number of bits to represent all the rational coefficients is (n log(n/ϵ)).
The reason to use rational Laurent polynomials is mainly for the convenience of analysis, as its evaluation can be made arbitrarily accurate and one does not need to worry about the precision of the coefficients of a(z) and b(z).
Step 2. There exists a root-finding algorithm with computational complexity (n3+n2R) under the assumption that all the roots have modulus at most 1. In this case, the rational Laurent polynomial p(z)=1−a(z)2−b(z)2 does not satisfy the modulus condition; however, this is a minor problem. Every coefficient of p(z) is the Fourier coefficient of the periodic function p(eiθ)<1, and hence is bounded by 1. By the condition (iv) of Step 1, the leading coefficient of p(z) is at least (ϵ/n)2 in magnitude. (The leading coefficients of a(z) and b(z) may cancel each other in p(z), yielding a much smaller leading coefficient in p(z), but some arbitrary perturbation of magnitude ϵ/n in the rational approximation can easily remove such fine-tuned cancellation. Consequently, one may assume that p(z) has degree 2n.) Converting p(z) into a monic polynomial q(z) (after multiplying z2n), one has q(z)=z4n+Σj=04n−1qjzj with |qj|≤(n/ϵ)2. If q(z0)=0 with |z0|>1, then
implying |z0|≤(n3/ϵ2). (If |z0|≤1, this is trivial.) One can use the algorithm of
V. Y. Pan, “Optimal and nearly optimal algorithms for approximating polynomial zeros,” Computers & Mathematics with Applications 31, 97 138 (1996), after rescaling z by a known factor. The loss of accuracy due to the rescaling is negligible since R=Ω(n log(n/ϵ)).
Step 3. One desirably evaluates e(s) that is defined by roots found in Step 2. For z∈U(1), the following Lemma 5 guarantees that any root of 1−a(z)2−b(z)2 is Ω(ϵ/n)-away (or Ω(1/n)-away if |1−A(z)2−B(z)2|=(ϵ)) from the unit circle. The number of significant bits that are lost is at most (log(n/ϵ)), which is negligible compared to R.
Lemma 5. If a Laurent polynomial ƒ(z) of degree d is such that 0<m≤ƒ(z)≤M for all z∈U(1), then every zero of ƒ is at least m/(6Md)-away from U(1).
Proof. Pick any root z0 and choose the closest point u∈U(1) so that ƒ(z0=u+η)=0. One will lower bound the magnitude of η. Assure
on the contrary to the claim; in particular, |η|<1/(2d). Since ƒ is analytic except at z=0, the Taylor series of ƒ at u converges at z=u+η.
Let one estimate the magnitude of derivatives at u. Observe that ƒ(k)(u)=(e−iθ∂0)kƒ(eiθ). Also, observe that ƒ(eiθ)=Σj=−ddajeijθwhere aj=(2π)∫02x dθƒ(eiθ)e−ijθi. Hence, |aj|≤M and thus |ƒ(k)(u)|≤2d·M·d(d+1) . . . (d+k−1); there are 2d terms and the maximum absolute value of the exponent increases by at most 1 every time one differentiates due to the negative degree term. Therefore,
where in the last inequality one can use the hypothesis that |η|<1/(2d). □
Step 4. This is essentially expanding the polynomials c(z) and d(z) found in the root finding step, but one can use the fast Fourier transform (FFT) for its better accuracy. It has been shown that the FFT on an N-component input F where each component is accurate to (relative) error δ gives Fourier coefficients {tilde over ({circumflex over (F)})}ω with error
where {circumflex over (F)} is the true Fourier spectrum. Since the input “vector” F in this Step is a list of unitary matrices, the root-mean-square factor is (1), and the distinction between relative and absolute error is immaterial. By the analysis of Step 3 above, δ is (log(n/ϵ)). Thus, the error in any Fourier coefficient C2k(2n) is δ2n=(δ√{square root over (n)}log n).
Step 5. This is an implementation of Theorem 2. One desirably bounds the error propagated through the loop over m. The error in E(m)(t) is of the same order as the error of Q(m) or P(m). Thanks to the condition (iv) of Step 1,
∥C±m(m)∥≥∥C±2(2n)∥≥ϵ/n, (25)
(where the first inequality is because C±m(m) is a product of one unitary and m projectors for any m≥0) and the error in Q(m) or P(m) is at most (δmn/ϵ). Since the projectors P(m) Q(m) or the Fourier coefficients Ck(m) of a unitary-valued function has norm at most 1, one sees that
δm−1≤(δmn/ϵ). (26)
Summarizing,
log2(1/δ2n)=R−(log(n/ϵ)), (27)
log2(1/δm−1)≥log2(1/δm)−(log(n/ϵ)), (28)
log2(1/δ0)≥R−C(n log(n/ϵ)). (29)
Since one wants δ0 to be sufficiently smaller than ϵ/n, it suffices to have R=Ω(n log(n/ϵ)).
Step 6. The correctness of the algorithm is clear from the construction and error analysis above.
All arithmetic in the algorithm above operates with at most R-bit numbers, where R is chosen to be Θ(n log(n/ϵ)). The number of elementary bit operations (AND, OR, NOT) to perform one basic arithmetic operation (+, −, ×, /) on u-bit numbers is upper bounded by (u polylog(u)). Let one count the number of arithmetic operations. Assuming that the coefficients of the true function A(z) and B(z) are given to accuracy (ϵ/n), it takes (n log(n/ϵ)) arithmetic operations to find rational approximations, since continued fraction converges exponentially. The root finding takes time (n3−n2R)=(n3 log(n/ϵ)); this count includes all the cost of bit operations for high precision arithmetic. The polynomial function evaluation involves (n) arithmetic operations. The FFT requires (n log n) operations given (log n) trigonometric function values, which can be computed by Taylor expansions of order R, invoking (R log n) arithmetic operations. These result in arithmetic complexity (n log(n) log(n/ϵ)) for the FFT. Updating the Fourier coefficient list Ck(m) involves (n) arithmetic operations, which one can do for (n) times, resulting in (n2) arithmetic operations. Overall, the computational complexity for any constant ϵ is (n3 polylog(n)).
Suppose one is given a unitary W whose eigenvalues e±i↓0
sin θλ=λ. (30)
The correspondence between W and H might seem contrived at this stage, but when H is represented as a linear combination of unitaries, it is possible to construct such W as a quantum circuit. The relation of Eq. (30) is in fact common whenever quantum walk is used. (See Section IX for some detail.) So, the desired transformation is
eiθ
where F(t) should be constructed by quantum signal processing. Since the product of n primitive matrices yields a Fourier component of frequency at most n/2, F(t) comprises, in some embodiments, of at least 2τ factors. (The factor of 2 is due to the half-angle in the argument of F.) Note that the success probability of the post-selection is close to 1 since |ƒ(eiθ
With eiφ=z, one can write
where Jk are the Bessel functions of the first kind. This is the Fourier series of exp(iτ sin φ), and one can see that Jk is an even function if k is even, and odd if k is odd. Also, J−k=(−1)kJk. One can take Eq. (32) as a definition of the Bessel functions. One can separate the reciprocal and anti-reciprocal parts of the expansion as
This expansion, called the Jacobi-Anger expansion, converges absolutely at a superexponential rate, as shown below by a steepest descent method.
Lemma 6. For any real number τ and any integer k≠0,
Proof. It suffices to consider the case where τ≥0 and k≥1.
where the contour Γ is the unit circle. Since the integrand has a pole only at z=0 and it vanishes on large z with (z)<r for any fixed r<∞, the contour may be replaced with a semi-circle with an infinite negative real together with a line z(y)=(2(k+1)/τ)+iy where y∈. The contribution from the semi-circle at infinity is zero. Therefore,
One can improve the second inequality by evaluating the integral explicitly, to give an extra factor of (k−1/2) in the bound.
A partial sum of the Jacobi-Anger expansion can be written as
This is ϵ-close to the full expansion if n=Ω(τ+log(1/ϵ)) by Lemma 6 for any z∈U(1). Numerical experiments suggest that the bound is quite tight and it suffices to choose
The Laurent polynomials Ã(z) and {tilde over (B)}(z) are pure real-on-circle. Applying the example algorithm, one obtains real-on-circle Laurent polynomials a(z)=a+(z), b(z)=ib−(z), c(z)=ic−(z), d(z)=d+(z). The pure Laurent polynomials c(z), d(z) are calculated by Lemma 4 where one chooses c(z) to be anti-reciprocal and d(z) reciprocal. (This choice is to have the results in the same convention as those of Guang Hao Low, Theodore J. Yoder. and Isaac L. Chuang, “Methodology of resonant equiangular composite quantum gates,” Phys. Rev. X 6, 041067 (2016), 1603.03996.) Note that every exponent of z of the polynomial 1−a(z)2−b(z)2 here, whose roots must be computed, is even since a(z) has only even exponents and b(z) has only odd exponents, so it is always better to feed a Laurent polynomial g of degree n, instead of 2n, where
g(z2)=1−a(z)2−b(z)2 (38)
into the root finding routine. Given the expanded form of 1−a(z)2−b(z)2, it takes no effort to find g. In this case, the intermediate polynomial c(z) of Lemma 4 is
While there are slightly more efficient implementations of matrix inversion problems (see, e.g., A. W. Harrow, A. Hassidim, and S. Lloyd, Quantum algorithm for solving linear systems of equations, Physical Review Letters 15, 150502 (2009)) using quantum signal processing, here the eigenvalue transformation perspective is considered. i
Suppose a hermnitian matrix H of norm at most 1 that one wishes to invert is block-encoded in a unitary W so that W has eigenvalues e±iθ
Lemma 7. Let b≥b′≥1 be any integers, and let z=eiφ∈U(1) be any complex number. Then.
Proof. The first claim is proved as
and then using Hoeffding's inequality on the tail of binomial probability distributions. The second claim is proved as (1−sin2φ)b≤e−b/κ
Thus, for large b, one sees that 1−((z+z−1)/2)2b vanishes when sin φ=0 (i.e., z=±1), but is close to 1 for |sin φ|≥1/κ. By the first statement of the lemma this function can be replaced with a lower degree polynomial function. Quantitatively, with z=eiφ one has an ϵ-approximation of the desired inversion function by Laurent polynomial of degree 2b′−1 for |sin φ|≥1/κ:
where b=κ2 log(2/ϵ) and b′=√{square root over (b log(4/ϵ))}=(κ log(1/ϵ)). The left-hand side is a genuine Laurent polynomial since the sum vanishes at z=±1. Feeding this polynomial, which is real-on-circle and anti-reciprocal, into the example algorithm, one obtains a desired eigenvalue inversion quantum algorithm. The success probability can be as small as Ω(1/κ2), and hence one can better amplify the amplitude for post-selection, enlarging the quantum gate complexity by a factor of (κ).
At 510, one or more unitary-valued functions are generated by a classical computer generating using projectors with a predetermined number of significant bits.
At 512, a quantum computing device is configured to implement the one or more unitary-valued functions.
In some implementations, the unitary-valued functions are iteratively decomposed.
In further implementations, the unitary-valued functions are applied to implement a Hamiltonian simulation. In certain implementations, the unitary-valued functions are applied to solve a linear equation.
At 610, a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions is generated by a classical computer, wherein the generating further includes representing approximate polynomials in a Fourier series with rational coefficients.
At 612, a quantum computing device is configured to implement a quantum circuit defined by the quantum circuit description.
In some implementations, the Fourier series with rational coefficients decreases numerical instability in the computation of decomposition. In further implementations, the quantum circuit description is configured to perform a Hamiltonian simulation. In certain implementations, the quantum circuit description is configured to solve a linear equation.
At 710, a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions is generated by a classical computer, wherein the generating further includes truncating terms in approximation polynomials with coefficients determined by a preset accuracy parameter.
At 712, a quantum computing device is configured to implement a quantum circuit defined by the quantum circuit description.
In some implementations, the truncating decreases numerical instability in the computation of decomposition. In further implementations, the quantum circuit description is configured to perform a Hamiltonian simulation. In certain implementations, the quantum circuit description is configured solve a linear equation.
At 810, a quantum circuit description is generated, by a classical computer, for implementing quantum signal processing that decomposes complex-valued periodic functions, wherein the generating further includes expanding factorized polynomial using discrete fast Fourier transforms.
At 812, a quantum computing device is configured to implement a quantum circuit defined by the quantum circuit description.
In some implementations, the expanding decreases numerical instability in the computation of decomposition. In certain implementations, the quantum circuit description is configured to perform a Hamiltonian simulation. In further implementations, the quantum circuit description is configured solve a linear equation.
At 910, a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions is generated by a classical computer, wherein the generating further includes determining complementary polynomials by finding roots of Laurent polynomials to a preset accuracy.
At 912, a quantum computing device is configured to implement a quantum circuit defined by the quantum circuit description.
In some implementations, the quantum circuit description is configured to perform a Hamiltonian simulation. In certain implementations, the quantum circuit description is configured solve a linear equation.
With reference to
The computing environment can have additional features. For example, the computing environment 100 includes storage 140, one or more input devices 150, one or more output devices 160, and one or more communication connections 170. An interconnection mechanism (not shown), such as a bus, controller, or network, interconnects the components of the computing environment 100. Typically, operating system software (not shown) provides an operating environment for other software executing in the computing environment 100, and coordinates activities of the components of the computing environment 100.
The storage 140 can be removable or non-removable, and includes one or more magnetic disks (e.g., hard drives), solid state drives (e.g., flash drives), magnetic tapes or cassettes, CD-ROMs, DVDs, or any other tangible non-volatile storage medium which can be used to store information and which can be accessed within the computing environment 100.
The storage 140 can also store instructions for the software 180 implementing any of the disclosed quantum signal processing techniques having numerical error controls. The storage 1-10 can also store instructions for the software 180 for generating and/or synthesizing any of the described techniques, systems, or reversible circuits.
The input device(s) 150 can be a touch input device such as a keyboard, touchscreen, mouse, pen, trackball, a voice input device, a scanning device, or another device that provides input to the computing environment 100. The output device(s) 160 can be a display device (e.g., a computer monitor, laptop display, smartphone display, tablet display, netbook display, or touchscreen), printer, speaker, or another device that provides output from the computing environment 100.
The communication connection(s) 170 enable communication over a communication medium to another computing entity. The communication medium conveys information such as computer-executable instructions or other data in a modulated data signal. A modulated data signal is a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media include wired or wireless techniques implemented with an electrical, optical, RF, infrared, acoustic, or other carrier.
As noted, the various methods, quantum signal processing techniques having numerical error controls, circuit design techniques, or compilation/synthesis techniques can be described in the general context of computer-readable instructions stored on one or more computer-readable media. Computer-readable media are any available media (e.g., memory or storage device) that can be accessed within or by a computing environment. Computer-readable media include tangible computer-readable memory or storage devices, such as memory 120 and/or storage 140, and do not include propagating carrier waves or signals per se (tangible computer-readable memory or storage devices do not include propagating carrier waves or signals per se).
Various embodiments of the methods disclosed herein can also be described in the general context of computer-executable instructions (such as those included in program modules) being executed in a computing environment by a processor. Generally, program modules include routines, programs, libraries, objects, classes, components, data structures, and so on, that perform particular tasks or implement particular abstract data types. The functionality of the program modules may be combined or split between program modules as desired in various embodiments. Computer-executable instructions for program modules may be executed within a local or distributed computing environment.
An example of a possible network topology 200 (e.g., a client-server network) for implementing a system according to the disclosed technology is depicted in
Another example of a possible network topology 300 (e.g., a distributed computing environment) for implementing a system according to the disclosed technology is depicted in
With reference to
The environment 400 includes one or more quantum processing units 402 and one or more readout device(s) 408. The quantum processing unit(s) execute quantum circuits that are precompiled and described by the quantum computer circuit description. The quantum processing unit(s) can be one or more of, but are not limited to: (a) a superconducting quantum computer; (b) an ion trap quantum computer; (c) a fault-tolerant architecture for quantum computing; and/or (d) a topological quantum architecture (e.g., a topological quantum computing device using Majorana zero modes). The precompiled quantum circuits (including any circuit resulting from and/or supported by any of the quantum signal processing techniques having numerical error control(s) as disclosed herein) can be sent into (or otherwise applied to) the quantum processing unit(s) via control lines 406 at the control of quantum processor controller 420. The quantum processor controller (QP controller) 420 can operate in conjunction with a classical processor 410 (e.g., having an architecture as described above with respect to
With reference to
In other embodiments, compilation and/or quantum program simulation can be performed remotely by a remote computer 460 (e.g., a computer having a computing environment as described above with respect to
In any of these scenarios. results from the computation performed by the quantum processor(s) can be communicated to the remote computer after and/or during the computation process. Still further, the remote computer can communicate with the QP controller(s) 420 such that the quantum computing process (including any compilation, simulation, and QP control procedures) can be remotely controlled by the remote computer 460. In general, the remote computer 460 communicates with the QP controller(s) 420, compiler/synthesizer 422, quantum program simulator 421. via communication connections 450.
In particular embodiments, the environment 400 can be a cloud computing environment, which provides the quantum processing resources of the environment 400 to one or more remote computers (such as remote computer 460) over a suitable network (which can include the internet).
Lemma 8. Let P and Q be arbitrary self-adjoint projectors on a finite dimensional complex vector space V. Then, V decomposes into orthogonal subspaces Vj invariant under P and Q, where each Vj has dimension 1 or 2.
For any hermitian operator H, let supp(H) denote the subspace support of H (the orthogonal complement of the kernel of H). Clearly, supp(H) is an invariant subspace of H, and H is invertible within supp(H).
Proof. Here, a subspace W of dimension at most 2 is found that is invariant under both P and Q. This is sufficient since the orthogonal complement of W is also invariant and the proof will be completed by induction in the dimension of V.
Put P′=I−P and Q′=I−Q, and consider the identities
PQP+PQ′P+P′QP′+P′Q′P′=I, (43)
supp(PQP)+supp(PQ′P)+supp(P′QP′)+supp(P′Q′P′)=V, (44)
where the second equality is because the intersection of the orthogonal complements of the four supports is zero. Therefore, at least one of four supports is nonzero, and without loss of generality assume S=supp(PQP)≠0. Let |ψ∈S be an eigenvector of PQP; PQP|ψ=a|ψ. The associated eigenvalue a is nonzero by definition of S. Now consider W=span{|ψ, Q|ψ}. Observe that a|ψ=PQP|ψ=PPQP|ψ=aP|ψ, and hence P|ψ=|ψ. Moreover, PQ|ψ=PQP|ψ=a|ψ. Therefore, W is a nonzero invariant subspace under both P and Q. □
This Jordan's lemma can be applied to two hermitian unitaries (reflections) U1, U2 as any hermitian unitary is 2P−I for some projector P. It immediately follows that there is a basis where U1 is diagonal and U1U2 is block-diagonal with at most two-dimensional blocks and each block belongs to U(1) or U(2). In any such two-dimensional block, one has
for some real number λ∈[−1, 1] and an angle ϕ∈, up to a permutation of rows and columns. Therefore, the product W=−iU1U2 is a rotation in a two-dimensional subspace that appears in Grover search algorithm (see L. K. Grover, “A fast quantum mechanical algorithm for database search,” in Proceedings, 28th Annual ACM Symposium on the Theory of Computing (STOC) (1996) pp. 212 219) and has eigenvalues e±iθ where sin θ=λ. This is relevant in a Hamiltonian simulation problem where U1=2|GG|−1 and the Hamiltonian is “block-encoded” as H=G|U2|G, which is the case if H is represented as, e.g., a linear combination of Pauli operators.
Having described and illustrated the principles of the disclosed technology with reference to the illustrated embodiments, it will be recognized that the illustrated embodiments can be modified in arrangement and detail without departing from such principles. For instance, elements of the illustrated embodiments shown in software may be implemented in hardware and vice-versa. Also, the technologies from any example can be combined with the technologies described in any one or more of the other examples. It will be appreciated that procedures and functions such as those described with reference to the illustrated examples can be implemented in a single hardware or software module, or separate modules can be provided. The particular arrangements above are provided for convenient illustration, and other arrangements can be used.
This application claims the benefit of U.S. Provisional Application No. 62/689,675 entitled “PRODUCT DECOMPOSITION OF PERIODIC FUNCTIONS IN QUANTUM SIGNAL PROCESSING” and filed on Jun. 25, 2018, which is hereby incorporated herein by reference in its entirety.
Number | Name | Date | Kind |
---|---|---|---|
20140187427 | Macready | Jul 2014 | A1 |
Entry |
---|
Haah, “Product Decomposition of Periodic Functions in Quantum Signal Processing,” arXiv:1806.10236v2, 20 pp. (Oct. 2018). |
Haah et al., “Quantum algorithm for simulating real time evolution of lattice Hamiltonians,” arXiv:1801.03922v2, 33 pp. (Apr. 2018). |
International Search Report and Written Opinion dated Oct. 1, 2019, from International Patent Application No. PCT/US2019/038758, 17 pp. |
Berry et al., “Black-Box Hamiltonian Simulation and Unitary Implementation,” Quantum Information and Computation, vol. 12, No. 1&2, pp. 29-62 (Jan. 2012). |
Berry et al., “Exponential Improvement in Precision for Simulating Sparse Hamiltonians,” Forum of Mathematics, Sigma, vol. 5, pp. 1-28 (Mar. 2017). |
Boyd, “The Rate of Convergence of Fourier Coefficients for Entire Functions of Infinite Order with Application to the Weideman-Cloot Sinh-Mapping for Pseudospectral Computations on an Infinite Interval,” Journal of Computational Physics, vol. 110, pp. 360-372 (Feb. 1994). |
Cheng et al., “Bounding the Sum of Square Roots via Lattice Reduction,” Mathematics of Computation, vol. 79, No. 270, pp. 1109-1122 (Apr. 2010). |
Childs et al., “Hamiltonian Simulation Using Linear Combinations of Unitary Operations,” Quantum Information and Computation, vol. 12, No. 11&12, pp. 901-924 (Jan. 2012). |
Childs, “On the relationship between continuous- and discrete-time quantum walk,” Communications in Mathematical Physics, vol. 294, Issue 2, pp. 1-22 (Mar. 2010). |
Childs et al., “Quantum algorithm for systems of linear equations with exponentially improved dependence on precision,” SIAM Journal of Computing, pp. 1-31 (2017). |
Childs et al., “Toward the first quantum simulation with quantum speedup,” Proc. National Academy of Sciences, vol. 115, Issue 38, pp. 9456-9461 (Sep. 2018). |
Gilyen et al., “Quantum singular value transformation and beyond: exponential improvements for quantum matrix arithmetics,” ACM SIGACT Symp. on Theory of Computing, pp. 1-67 (Jun. 2018). |
Grover, “A fast quantum mechanical algorithm for database search,” ACM Symp. on the Theory of Computing, pp. 212-219 (1996). |
Haah et al., “Quantum algorithm for simulating real time evolution of lattice Hamiltonians,” IEEE Symp. on Foundations of Computer Science, pp. 350-360 (Oct. 2018). |
Harrow et al., “Quantum algorithm for linear systems of equations,” Phys. Rev. Lett., vol. 103, pp. 1-24 (Oct. 2009). |
Harvey et al., “Faster Integer Multiplication Using Short Lattice Vectors,” arXiv:1802.07932v1, pp. 1-16 (Feb. 2018). |
Low et al., “Hamiltonian Simulation by Qubitization,” Quantum Physics, pp. 1-20 (Oct. 2016). |
Low et al., “Methodology of Resonant Equiangular Composite Quantum Gates,” Physical Review X, vol. 6, pp. 1-13 (Dec. 2016). |
Low et al., “Optimal Hamiltonian Simulation by Quantum Signal Processing,” Physical Review Letters, vol. 118, No. 1, pp. 1-5 (Jan. 2017). |
Low et al., “The methodology of resonant equiangular composite quantum gates,” arXiv:1603.03996v3, pp. 1-13 (Feb. 2018). |
Pan, “Optimal and nearly optimal algorithms for approximating polynomial zeros,” Computers & Mathematics with Applications, vol. 31, No. 12, pp. 97-138 (1996). |
Qian et al., “How much precision is needed to compare two sums of square roots of integers?,” Information Processing Letters, vol. 100, No. 5, pp. 194-198 (Dec. 2006). |
Ramos, “Roundoff Error Analysis of the Fast Fourier Transform,” Mathematics of Computation, vol. 25, No. 116, pp. 757-768 (Oct. 1971). |
Schonhage, “On the Power of Random Access Machines,” Int'l Colloquium on Automata, Languages, and Programming, pp. 520-529 (Jul. 1979). |
Shamir, “Factoring Nos. in O(log n) Arithmetic Steps,” Massachusetts Inst of Tech Cambridge Lab for Computer Science, 19 pp. (Nov. 1977). |
Number | Date | Country | |
---|---|---|---|
20190392343 A1 | Dec 2019 | US |
Number | Date | Country | |
---|---|---|---|
62689675 | Jun 2018 | US |