Product decomposition of periodic functions in quantum signal processing

Information

  • Patent Grant
  • 11568295
  • Patent Number
    11,568,295
  • Date Filed
    Monday, June 24, 2019
    5 years ago
  • Date Issued
    Tuesday, January 31, 2023
    a year ago
Abstract
In some embodiments, one or more unitary-valued functions are generated by a classical computer generating using projectors with a predetermined number of significant bits. A quantum computing device is then configured to implement the one or more unitary-valued functions. In further embodiments, a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions is generated by a classical computer, wherein the generating further includes representing approximate polynomials in a Fourier series with rational coefficients. A quantum computing device is then configured to implement a quantum circuit defined by the quantum circuit description.
Description
SUMMARY

Here, example algorithms are disclosed to approximate complex-valued periodic functions ƒ(e) as a matrix element of a product of SU(2)-valued functions, and analyze its numerical stability. In this disclosure, it is proven that the algorithm runs in time poly (n log(1/ϵ)) on a Turing machine where n is the degree of the polynomial that approximates ƒ with accuracy ϵ; previous efficiency claim assumed a strong arithmetic model of computation. This product decomposition forms the foundation of embodiments of the quantum signal processing schemes disclosed herein.


In some embodiments, one or more unitary-valued functions are generated by a classical computer generating using projectors with a predetermined number of significant bits. A quantum computing device is configured to implement the one or more unitary-valued functions.


In certain embodiments, a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions is generated by a classical computer, wherein the generating further includes representing approximate polynomials in a Fourier series with rational coefficients. A quantum computing device is configured to implement a quantum circuit defined by the quantum circuit description.


In particular embodiments, a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions is generated by a classical computer, wherein the generating further includes truncating terms in approximation polynomials with coefficients determined by a preset accuracy parameter. A quantum computing device is configured to implement a quantum circuit defined by Y the quantum circuit description.


In some embodiments, a quantum circuit description is generated, by a classical computer, for implementing quantum signal processing that decomposes complex-valued periodic functions, wherein the generating further includes expanding factorized polynomial using discrete fast Fourier transforms. A quantum computing device is configured to implement a quantum circuit defined by the quantum circuit description.


In certain embodiments, a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions is generated by a classical computer, wherein the generating further includes determining complementary polynomials by finding roots of Laurent polynomials to a preset accuracy. A quantum computing device is configured to implement a quantum circuit defined by the quantum circuit description.


Any of the disclosed embodiments can be implemented by one or more computer-readable media storing computer-executable instructions, which when executed by a computer cause the computer to perform any of the disclosed methods. Also disclosed herein are systems for performing embodiments of the disclosed embodiments comprising a classical computer configured to program, control, and/or measure a quantum computing device. The foregoing and other objects, features, and advantages of the disclosed technology will become more apparent from the following detailed description, which proceeds with reference to the accompanying figures.





BRIEF DESCRIPTION OF THE DRAWINGS


FIG. 1 illustrates a generalized example of a suitable classical computing environment in which several of the described embodiments can be implemented.



FIG. 2 is an example of a client-server network for implementing a system according to the disclosed technology.



FIG. 3 is an example of a distributed computing environment for implementing a system according to the disclosed technology.



FIG. 4 is an exemplary system for implementing embodiments of the disclosed technology.



FIG. 5 is a flowchart showing an example embodiment for implementing an embodiment of the disclosed technology.



FIG. 6 is a flowchart showing another example embodiment for implementing an embodiment of the disclosed technology.



FIG. 7 is a flowchart showing a further example embodiment for implementing an embodiment of the disclosed technology.



FIG. 8 is a flowchart showing another example embodiment for implementing an embodiment of the disclosed technology.



FIG. 9 is a flowchart showing a further example embodiment for implementing an embodiment of the disclosed technology.





DETAILED DESCRIPTION
I. Introduction

Quantum signal processing refers to a scheme to construct an operator V from a more elementary unitary W where V=Σ0ƒe)|θcustom charactercustom characterθ| and =ecustom charactercustom characterθ| share the eigenvectors but the eigenvalues of V are transformed by a function ƒ from those of W. The transformation typically uses only one ancilla qubit, and is achieved by implementing control-W and control-W, interspersed by single-qubit rotations on the control, and final post-section on the control. This technique produces gate-efficient quantum algorithms for, e.g., Hamiltonian simulations, which is asymptotically optimal when the Hamiltonian is sparse and given as a blackbox, or as a linear combination of oracular unitaries. Furthermore, this technique with rigorous error bounds is useful and competitive, even for explicitly described, rather than oracular, local Hamiltonian simulation problems. It has also been promised for use in solving linear equations.


However, in quantum signal processing the classical preprocessing to find interspersing single-qubit rotations for a given transformation function ƒ has been so numerically unstable, that it is unclear whether it can be performed efficiently. For example, one paper reports that the computation time was “prohibitive” to obtain sequences of length ≥30 of interspersing unitaries for Jacobi-Anger expansions (which is explained later in Section V later). For some cases, the usefulness of the quantum signal processing approach hinges upon the ability to compute long sequences of interspersing single-qubit rotations.


It has been asserted that there exists a polynomial time classical algorithm, but this claim is based on an unusual computational model where any real arithmetic, including evaluation of radicals, trigonometric functions and polynomial root finding, can be performed with arbitrary precision in unit time. Such a computational model is too powerful to be realistic. Allowing arbitrary integer arithmetic at unit cost, one can not only factor integers in time that is linear in the number of digits, but also solve NP-hard problems in polynomial time. The basic idea in Arnold Schoenhage, “On the power of random access machines,” in Automata, Languages and Programming, ICALP 1979, Lecture Notes in Computer Science, Vol. 71, edited by Maurer H. A., pp. 520-529 (Springer, Berlin, Heidelberg, 1979) is to relate the expansion of a Boolean formula in a conjunctive form into a disjunctive form with the expansion of a polynomial from its factors. Then, the satisfiability translates to the positiveness of certain coefficients in the expansion. The variable in the polynomial is set to a sufficiently large number, effectively encoding the entire polynomial in a single big number. An important elementary fact that underlies the power of arithmetic model is that one only needs O(n) compositions of squaring operation x→x2 to reach a 2n-grit number. In a seemingly mundane problem involving real numbers, the number of required bits during the computation can be a priori very large. For example, it is still an open problem whether one can decide the larger between Σj=1k√{square root over (aj)} and Σj=1k√{square root over (bj)}, which are sums of square roots of positive integers aj, bj that are smaller than n, in time pal i(k log n) on a Turing machine.


The numerical instability of previous methods may be attributed to expansions of large degree polynomials that are found by roots of another polynomial. Crudely speaking, there are two problems in this approach. Fir the polynomial expansions can be regarded as the computation of convolutions, which, when naively iterated, suffers from numerical instability. Second, although the root finding is a well-studies problem, to use the roots to construct another polynomial one has to understand the distribution of the roots to keep track of the loss of precision. These problems were not addressed previously.


Here, numerous refinements are made to the algorithm to find interspersing single-qubit rotations and to bound the number of required bits in the computation for a desired accuracy to a final answer. It can be concluded that the classical preprocessing can indeed be done in polynomial time on a Turing machine. Here, the methods of Guang Han Low, Theodore J. Yoder, and Isaac L. Chuang, “Methodology of resonant equiangular composite quantum gates,” Phys. Rev. X 6, 041067 (2016), 1603.03996, are generally adopted, but simplified manipulations are introduced by avoiding trigonometric polynomials. Some generalizations are obtained with simpler calculations. For the numerical stability and analysis, embodiments of the disclosed algorithm avoid too small numbers by sacrificing approximation quality in the initial stage, and replacing polynomial expansions by a Fourier transform. These modifications enable one to handle the problems that are mentioned previously.


One can start by reviewing quantum signal processing in the next section, and then develop an algorithm and analyze it. In two short sections later, a exemplary self-contained treatment of polynomial approximations for Hamiltonian simulation problems and matrix inversion problems is provided. Throughout the disclosure, U(1) is used to denote the group of all complex numbers of unit modulus. Sometimes, reference will be made to U(1) as the unit circle. As usual, i=√{square root over (−1)}, and X, Y, Z are Pauli matrices.


II. Quantum Signal Processing

To understand how the eigenvalue transformation (signal processing) works, it is convenient to consider the action of control-W restricted to an arbitrary but fixed eigenstate |θcustom character of W. The eigenvalue e associated with |θcustom character is kicked back to the control qubit to induce a unitary |θcustom charactercustom character0|+e|1custom charactercustom character1| on the control qubit. Conjugating the control-W by a single qubit unitary on the control, one sees that |0custom character and |1custom character can be any orthonormal basis vectors |0′custom character, |1′custom character of the control qubit. If one allow themselves to implement the inverse of the control-. W, which is reasonable, one can also implement

(|0′custom charactercustom character0′|+e|1′custom charactercustom character1|)(|0″custom charactercustom character0″|+e−iθ|1″custom charactercustom character1″|)=(e−iθ/2|0″custom charactercustom character0″|+eiθ/2|1′custom charactercustom character1″|)(eiθ/2|0″custom charactercustom character0″|+e−iθ/2|1″custom charactercustom character1″|)  (1)

where {|0′custom character, |1′custom character|1′custom character} and {|0″custom character,|1″custom character} are arbitrary orthonormal bases. The square root function e→eiθ/2 has a branch cut, but it hardly matters, as long as one is consistent that e−iθ/2 denotes the inverse of the square root. When one can alternate an even number of control-W and control-W, this approach allows one to assume that an implementable unitary on the control qubit is a product of primitive matrices

EP(t)=tP+t−1Q  (2)

where t=eiθ/2 and P,Q are projectors of rank 1 that sum to the identity. Thus, an even number n of control-W and control-W induces F(t)=EP1(t)EP2(t) . . . EPn(t) on the control qubit. The product F(t) can be thought of as an SU(2)-valued function over the unit circle in the complex plane. Bty the same formulas, one can define EP(t) and F(t) on the entire complex plane except the origin t=0. Now if custom character+|F(t)|+custom character is close to ƒ(t2=e) for all t∈U(1), then post-selection on |+custom character of the control qubit enacts V. Here, the choice of |+custom character is of course a convention. The success probability of the post-selection, of course, depends on the magnitude of ƒ(e).


A further question is then what F(t) is achievable in the form of

F(t)=E0EP1(t)EP2(t) . . . EPn(t)  (3)

where one can insert an additional single-qubit unitary E0. Since UEP(t)U=EUPU(t) for any unitary U, the product F(t) as in Eq. (3) captures any possible action on the control qubit. The answer to the achievability question is shown in the next section.)


III. Polynomial Functions U(1)→Su(2)

Definition 1. For any integer n≥0, let custom charactern be the set of all Laurent polynomials F(t)=Σ−n≤j≤nCjtj in t with coefficients Cj in 2-by-2 complex matrices, such that F(η)∈SU(2) for all complex numbers η of unit modulus. One can say that its F(t)∈custom charactern has degree n if Cn0≠0 or C−n≠0. One can define εn to be the subset of custom charactern comprising F(t) where the exponents of t in F(t) belong to {−n, −n+2, −n+4, . . . , n−2, n}. Note that custom character00=SU(2), and for any orthogonal projector P one has EP(t)∈ε1. One can define F(t) to be ΣjCjtjIn a set-theoretic notation, the definitions are as the following.










𝒫
n

=

{



F


(
t
)


=






j
=

-
n


n








C
j



t
j






Mat


(

2
;

)




[

t
,

t

-
1



]







η








,



η


=


1


F


(
η
)





SU


(
2
)





}





(
4
)












ɛ
n

=

{



F


(
t
)


=






j
=

-
n


n








C
j



t
j





𝒫
n






k



2


+
1





,


C


-
n

+
k


=
0


}






(
5
)







Theorem 2. Any n-fold product EP1(t) . . . EPn(t) belongs to εn. Conversely, every F(t)∈εn of degree n has a unique decomposition into primitive matrices and a unitary, as in Eq. (3).


This completely characterizes polynomial functions U(1)→SU(2) and covers all previous results on “achievable function functions” in quantum signal processing. Embodiments of the disclosed technology are slightly more general since previous results assume that Tr(PjZ)=0.


Proof. The first statement is trivia definition. The proof of the converse is induction in n where the base case n=0 is trivial. The induction step is proved as follows. Here, it will be proven that hr any F(t)∈εn of degree n>0 there exists a EP(t) such that F(t)EP(t)∈εn−1. One might find it unusual that degree of a polynomial is decreasing under multiplication, but in the algebra of matrices two nonzero matrices may multiply to vanish. Such EP(t) is unique since F(1/t)F(t)=I=EP(1/t)F(1/t)F(t)E′P(t) for two possible EP(t) and E′P(t). Also, the product F(t)EP(t) must have degree n−1; otherwise F(t) would have degree less than n.


The existence of the EP will now be shown. Consider F(t)=Σj=−nnCjtj as a 2-by-2 matrix of four Laurent polynomials. The defining property det F(t)=1 holds for infinitely many values of t, and therefore it should hold as a polynomial equation. Taking the leading term, one has t2n det Cn+(lower order terms)=1. Similarly, taking the leading term in t−1, one has t−2n det C−n+(higher order terms)=1. Hence,

det Cn=0=det C−n.

Similarly, from the equation F(1/t)F(t)=I=F(t)F(1/t) one has t2nC−nCn+custom character(t2n−1)=I=t2nCnC−n+custom character(t2n−1) and hence

C−nCn=0=CnC−n  (7)

Suppose Cn≠0. Let P be a rank-1 projector such that CnP=0, and let Q=I−P. Such P is unique since C is a two-by-two matrix of rank one. Then, a claim is made that F(t)(tP+t−1Q)∈εn−1. Indeed, expanding the left-hand side one has

t−n−1C−nQ+t−n+1(C−nP+C−n+2Q)+ . . . +tn−1(CnQ+Cn−2P)+tn+1CnP.  (8)

(This is the only place one uses ε instead of custom character.) If C−n=0, this implies the claim. If C−n≠0, then P∝C−nC−n and therefore C−nQ=0, implying the claim. The case C−n≠0 is completely parallel. (Actually, C−n≠0 if Cn≠0 as one will see later.) custom character


A. Parity Constraints

Recall that under the standard representation of Pauli matrices, Z is diagonal, and X,Y are off-diagonal. Suppose an SU(2)-valued function θ→F(e)=a(e)I+b(e)iX+c(e)iY+d(e)iZ has even functions (reciprocal in t=e) in the diagonal and odd (anti-reciprocal in t=ei0) in the off-diagonal. It is claimed that if F(t) is an element of εn then the primitive matrix EPn(t) factored from F(t) by Theorem 2 has a property that Tr(ZPn)=0. This implies EPn(t) has reciprocal diagonal and an i-reciprocal off-diagonal. To prove the claim, once can observe that












Z
=




F


(
t
)





F




(

1


/


t

)



Z







=




F


(
t
)




(


a


(

1


/


t

)


-


b


(

1


/


t

)



i





X

-


c


(

1


/


t

)



i





Y

-


d


(

1


/


t

)



i





Z


)


Z







=




F


(
t
)




(


a


(
t
)


+


b


(

1


/


t

)



i





X

+


c


(
t
)



i





Y

-


d


(
t
)



i





Z


)


Z







=




F


(
t
)




Z


(


a


(
t
)


-


b


(
t
)



i





X

-


c


(
t
)



i





Y

-


d


(
t
)



i





Z


)









=




F


(
t
)



Z








F




(
t
)


.









(
9
)








It follows that 0=Tr(Z)=Tr(F(t)ZF(t))=t2nTr(CnZCn)+ . . . +t−2nTr(C−nZC−n) as a polynomial in t, and hence Tr(CnCnZ)=0=Tr(C−nC−nZ) when u>0. The matrix C±nC±n is proportional to the projector Pn up to the identity in the construction of the factor EPn Theorem 2, and therefore one has Tr(ZPn)=0.


Moreover, it then follows that F(t)EPn(1/t) has reciprocal diagonal and anti-reciprocal off-diagonals. Therefore, the unique projectors P1, . . . , Pn in the decomposition, which defines the primitive matrices EPj(t), have zero Z-component. This means that all projectors Pj are of form

Pj=eiZϕj/2|+custom charactercustom character+|e−iZϕj/2  (10)

where ϕjcustom character is some angle. In fact, Guang Hao Low, Theodore J. Yoder, and Isaac L. Chuang, “Methodology of resonant equiangular composite quantum gates,” Phys. Rev. X 6, 041067 (2016), 160103996 exclusively considered EP(t) of this form. This is contrasted to the general case where Pj is identified with a point on the Bloch sphere.


Note that E0, the residual SU(2) factor in the decomposition, has generally nonzero Z-component. Since EP(1)=I for any projector P, one knows that E0=F(1)=a(1)I+b(1)iX+c(1)iY+d(1)iZ, but b(1)=c(1)=0 due to their anti-reciprocity. This implies that E0=eiZϕ0/2 for some angle ϕ0. Hence, under the parity constraint of this subsection, F(t)∈εn is uniquely specified by n+1 angles ϕ0, ϕ1, . . . , ϕn. Note that if d(1)2=1−a(1)2=custom character(ϵ), then d(1)=custom character(√{square root over (ϵ)}) and ∥E0−I∥=custom character(√{square root over (ϵ)}).


B. Complementing Polynomials

Quantum signal processing does not use F(t) itself, but rather a certain matrix element of it. Hence, it is important to know what a matrix element can be. Observe that any member of SU (2) can be written as aI+biX+ciY+diZ where the real numbers a, b, c, d satisfy a2+b2+c2+d2=1, and this decomposition is unique. (The group SU(2) is identified with the group of all unit quaternions.) Thus, a member F(z) ϵcustom character can be written uniquely as F(z)=a(z)I+b(z)iX+c(z)iY+d(z)iZ. Here, a(z), b(z), c(z), d(z) are Laurent polynomials such that a(z)2+b(z)2+c(z)2+d(z)2=1, and each takes real values on U(1).


Definition 3. A (Laurent) polynomial with real custom character coefficients is called a real (Laurent) polynomial. The degree of a Laurent polynomial is the maximum absolute value of the exponent of the variable whose coefficient is nonzero. A Laurent polynomial ƒ(z) is reciprocal if ƒ(z)=ƒ(1/z), or anti-reciprocal if ƒ(z)=−ƒ(1/z). A Laurent polynomial function ƒ: custom characterxcustom character is real-on-circle if ƒ(z)∈custom character for all z∈custom character of unit modulus. A real-on-circle Laurent polynomial ƒ(z) is pure if ƒ(z) is real reciprocal or iƒ(z) is real anti-reciprocal.


The term “pure” is used because a Laurent polynomial ƒ(z) with complex coefficients is real-on-circle if and only if











f
+



(
z
)


:=





f


(
z
)


+

f


(

1


/


z

)



2






and







f
-



(
z
)



:=



f


(
z
)


-

f


(

1


/


z

)




2

i







(
11
)








are real Laurent polynomials. (Proof: Write ƒ(e)=Σjajeijθ, with the complex conjugate being Σjaje−ijθja−jeijθ. Thus, aj=a−j, and the claim follows.) This simply rephrases the fact that a real-valued function θ→ƒ(e) has a trigonometric function series with real coefficients. Hence, for any real-on-circle Laurent polynomial ƒ(z), it is real if and only if it is reciprocal. In addition, a real and reciprocal Laurent polynomial is real-on-circle. That is, among the three properties, real, real-on-circle, and reciprocal, any two imply the third. Note that a real-on-circle Laurent polynomial is not necessarily real, and a real Laurent polynomial is not necessarily real-on-circle. Also, note that real-on-circle Laurent polynomials form an algebra over custom character.


One is now ready to state a sufficient con, r under which a complex polynomial qualifies to be a matrix element of some F(t)▮custom charactern. One can think of a(z) and b(z) below as the real and imaginary part of a complex function, respectively.


Lemma 4. Let a(z) and b(z) be real-on-circle Laurent polynomials of degree at most n such that a(η)2+b(η)<1 for all η∈U(1). If a(z)2+b(z)2 is reciprocal (e.g., a(z) and b(z) are pure), then there exist pure real-on-circle Laurent polynomials c(z)=c+(z) and d(z)=id(z) of degree at most n such that a(z)2+b(z)2+c(z)2+d(z)2=1.


Note that if a(z) is pure and a(z)2+b(Z)2 is reciprocal, then b(z) is also pure. (Proof: b(z)2=(b+(z)+ib(z))2=(z)b+(z)2−b(z)2+2ib+(z)b(z) has to be real.)


Proof. The Laurent polynomial 1−a(z)2−b(z)2 is reciprocal real of degree n′ that is at most 2n; the leading terms of a(z)2 and b(z)2 might cancel each other so that n′<2n. Due to the reciprocity, any real root r comes in a pair (r, 1/r) where r≠±1 since no root exists on U(1). For the same reason, any nonreal complex root z comes in a quadruple (z, z, 1/z, 1/z), and there is no degenerate quadruple. Enumerate representatives of the pairs and quadruples of the roots:

custom character=[r∈custom character:1−a(r)2−b(r)2=0,custom character(r)>0,|r|<1],  (12)
custom character=[r∈custom character:1−a(r)2−b(r)2=0,|r|<1].  (13)


These are lists rather than sets, as one takes the multiplicities into account. So, 4|custom character|+2|custom character|=2n′. (A reciprocal Laurent polynomial of degree n′ has 2n″ roots.) If n′ is even, let custom character=custom character1custom charactercustom character2 be a partition into sublists of equal lengths; if n′ is odd, let custom character=custom character1custom charactercustom character2 be a partition into sublists of lengths differing by one. Consider factors of 1−a(z)2−b(z)2:










e


(
z
)


=




(

z
-

2



(
r
)


+




r


2

z


)

·




(

z
-

r
1


)

·




(


1
z

-

r
2


)

.






(
14
)






or
=


z

-




n




/


2








(

z
-
a

)






(
15
)







The factor e(z) is a real Laurent polynomial of degree ┌n′/2┐. Then, the product e(z)e(1/z) is real reciprocal and has degree 2|custom character|+|custom character1|+|custom character2|=n′. The degree of a Laurent polynomial in the definition is only subadditive under multiplication of two Laurent polynomials. For example, the product (z−1)(z−1−2) has degree one. Now the two Laurent polynomials e(z)e(1/z) and 1−a(z)2−b(z)2 are reciprocal real, and have the same roots, and therefore they differ by a constant factor






α
=



1
-


a


(
z
)


2

-


b


(
z
)


2




e


(
z
)




e


(

1


/


z

)







.







Evaluating this expression at z=1, one sees that α is positive. Thus, one finishes the proof by observing










1
-


a


(
z
)


2

-


b


(
z
)


2


=


α






e


(
z
)




e


(

1


/


z

)



=



(




e


(
z
)


+

e


(

1


/


z

)



2



α


)

2

+



(




e


(
z
)


-

e


(

1


/


z

)




2

i




α


)

2

.







(
16
)







Both the reciprocal (c(z)) and anti-reciprocal (d(z)) combinations have degree≤┌n′/2┐≤n.custom character


As one can see in the proof, given a(z) and b(z), the “remainder” Laurent polynomials c(z), d(z) are not unique. At least, the partition custom character1custom charactercustom character2 is arbitrary.


IV. Efficient Implementation with Bounded Precision

In this section, an example algorithm is considered to find interspersing single-qubit unitaries given a complex function A(φ)+iB(φ). The example algorithm, in this embodiment, comprises two main parts: first, one finds a SU(2)-valued function of φ such that a particular matrix element is the input function. It suffices to find a good approximation. Second, one has to decompose the SU(2)-valued function into a product of primitive matrices. Constructive proofs for both the steps have already been given, but the construction can be tailored so that numerical error is reduced and traceable. An example algorithm is outlined first, deferring certain details to the next subsection. The computational complexity will be analyzed subsequently.


A. Algorithm





    • 0. An input is a complex-valued periodic function A(φ)+iB(φ) with period 2π where A and B are real-valued, such that A(φ)2+B(φ)2 is an even function of φ and is ≤1 for any real φ. Given ϵ>0, the order of error that is tolerated, analyze A(φ), B(φ) to obtain ϵ-close real-on-circle Laurent polynomials Ã(z), {tilde over (B)}(z) for z=e.

    • 1. Compute rational Laurent polynomials a(z) and b(z) of degree m such that (i) a(z)2+b(z)2 is real reciprocal (ii) they are 6ϵ-close to the true target functions on U(1), (iii) a(z)2+b(z)2≤1−ϵ for z∈U(1), and (iv) every coefficient in a(z) or b(z) has magnitude ≥ϵ/n.

    • 2. Find all roots of 1−a(z)2−b(z)2 to accuracy 2−R where R=Ω(n log (n/ϵ))

    • 3. Evaluate the complementary polynomials computed from the roots of 2 according to Lemma 4 at points of T where

      T:={e2πik/D|k=1, . . . ,D}

    • and D is a power of 2 that is larger than 2n+1. One should not expand c(z), d(z) before evaluation, but should substitute numerical values for z with accuracy 2−R in the factorized form of e(z), and then read off the real (c(z)) and imaginary (d(z)) parts.

    • 4. Compute the fast Fourier transform of the function value list to obtain














C

2





j


(

2





n

)


=



0

2





π






d





θ


2





π




e


-
i






j





θ




F


(

e

i





θ


)













(
18
)









    • for j=−n, −n+1, . . . , n−1, n. (In exact arithmetic, one would have F(z)=Σj=31 nnC2j(2n)zj.)

    • 5. For m=2n, 2n−1, . . . , 2, 1 sequentially in decreasing order, (i) obtain a primitive matrix E(m)(t) by















E

(
m
)




(
t
)


=



t


(

I
-

Q

(
m
)



)


+


t

-
1




Q

(
m
)




=


t






P

(
m
)



+


t

-
1




(

I
-

P

(
m
)



)













where






Q

(
m
)



=



C
m


(
m
)







C
m

(
m
)







C
m


(
m
)







C
m

(
m
)







,


P

(
m
)


=



C

-
m



(
m
)







C

-
m


(
m
)







C

-
m



(
m
)







C

-
m


(
m
)







,





(
19
)









    • and (ii) compute the coefficient list of F(m−1)(t)=F(m)(t)E(m)(t) by

      Ck(m−1)=Ck−1(m)P(m)+Ck+1(m)Q(m)  (20)

    • where k=−m+1, −m+3, . . . , m−3, m−1.

    • 6. Output E(2n)(t), . . . , E(1)(t) and E(0)=C0(0)Then, custom character+|E(0)E(1)†(1/t) . . . E(2n)†(1/t)|+custom characteris custom character(ϵ)-close to A(t2)+iB(t2) for all t∈U(1).





B. Further Details and Analysis

Step 0. The complexity of this Step depends on the nature of the true target functions A(z) and B(z); the smoother the functions are, the lower the complexity is. An obvious approach is to expand the given function in Fourier series and truncate it at a certain degree to desired accuracy. See Sections V and VI for examples.


Step 1. Put ã(z)=(1−2ϵ)Ã(z)=custom characterãkzk and {tilde over (b)}(z)=(1−2ϵ){tilde over (B)}(z)=custom character{tilde over (b)}kzk, where only finitely many ãk, {tilde over (b)}k are nonzero. Let n be the largest positive integer such that at least one of |ãn|, |ã−n|, |{tilde over (b)}|, |b−n| is ≥ϵ/n.


Approximate every coefficient of ã(z) and {tilde over (b)}(z) by rational numbers up to error ϵ/n to obtain a(z) and b(z); this can be done by continued fractions. The rational approximation should preserve reality and (anti-)reciprocity if exists. Any coefficient that are smaller than ϵ/n is made zero by the rational approximation. By the choice of r, the degrees of a(z) and b(z) are at most n, and one of them is indeed n. Then, one can easily show that a(z) and b(z) satisfies all four conditions. The number of bits to represent all the rational coefficients is custom character(n log(n/ϵ)).


The reason to use rational Laurent polynomials is mainly for the convenience of analysis, as its evaluation can be made arbitrarily accurate and one does not need to worry about the precision of the coefficients of a(z) and b(z).


Step 2. There exists a root-finding algorithm with computational complexity custom character(n3+n2R) under the assumption that all the roots have modulus at most 1. In this case, the rational Laurent polynomial p(z)=1−a(z)2−b(z)2 does not satisfy the modulus condition; however, this is a minor problem. Every coefficient of p(z) is the Fourier coefficient of the periodic function p(e)<1, and hence is bounded by 1. By the condition (iv) of Step 1, the leading coefficient of p(z) is at least (ϵ/n)2 in magnitude. (The leading coefficients of a(z) and b(z) may cancel each other in p(z), yielding a much smaller leading coefficient in p(z), but some arbitrary perturbation of magnitude ϵ/n in the rational approximation can easily remove such fine-tuned cancellation. Consequently, one may assume that p(z) has degree 2n.) Converting p(z) into a monic polynomial q(z) (after multiplying z2n), one has q(z)=z4nj=04n−1qjzj with |qj|≤(n/ϵ)2. If q(z0)=0 with |z0|>1, then













z
0




4





n







j
=
0



4





n

-
1











q
j








z
0



j





𝒪


(


n
3






z
0





4





n

-
1




/



ϵ
2


)






(
21
)








implying |z0|≤custom character(n32). (If |z0|≤1, this is trivial.) One can use the algorithm of


V. Y. Pan, “Optimal and nearly optimal algorithms for approximating polynomial zeros,” Computers & Mathematics with Applications 31, 97 138 (1996), after rescaling z by a known factor. The loss of accuracy due to the rescaling is negligible since R=Ω(n log(n/ϵ)).


Step 3. One desirably evaluates e(s) that is defined by roots found in Step 2. For z∈U(1), the following Lemma 5 guarantees that any root of 1−a(z)2−b(z)2 is Ω(ϵ/n)-away (or Ω(1/n)-away if |1−A(z)2−B(z)2|=custom character(ϵ)) from the unit circle. The number of significant bits that are lost is at most custom character(log(n/ϵ)), which is negligible compared to R.


Lemma 5. If a Laurent polynomial ƒ(z) of degree d is such that 0<m≤ƒ(z)≤M for all z∈U(1), then every zero of ƒ is at least m/(6Md)-away from U(1).


Proof. Pick any root z0 and choose the closest point u∈U(1) so that ƒ(z0=u+η)=0. One will lower bound the magnitude of η. Assure








η


<

m

6





M





d







on the contrary to the claim; in particular, |η|<1/(2d). Since ƒ is analytic except at z=0, the Taylor series of ƒ at u converges at z=u+η.









0
=


f


(

u
+
η

)


=




k

0











f

(
k
)




(
u
)



k
!





η
k

.








(
22
)







Let one estimate the magnitude of derivatives at u. Observe that ƒ(k)(u)=(e−iθ0)kƒ(e). Also, observe that ƒ(e)=Σj=−ddajeijθwhere aj=(2π)∫02x dθƒ(e)e−ijθi. Hence, |aj|≤M and thus |ƒ(k)(u)|≤2d·M·d(d+1) . . . (d+k−1); there are 2d terms and the maximum absolute value of the exponent increases by at most 1 every time one differentiates due to the negative degree term. Therefore,










m




f


(
u
)









k

1








2





d






M


(




d
+
k
-
1





k



)






η


k




=


2





d






M


(


1


(

1
-


η



)

d


-
1

)





2





d






M
·
3




η








(
23
)








where in the last inequality one can use the hypothesis that |η|<1/(2d). □


Step 4. This is essentially expanding the polynomials c(z) and d(z) found in the root finding step, but one can use the fast Fourier transform (FFT) for its better accuracy. It has been shown that the FFT on an N-component input F where each component is accurate to (relative) error δ gives Fourier coefficients {tilde over ({circumflex over (F)})}ω with error











max
ω








F
^

~

ω

-


F
^

ω









𝒪


(


N


log





N

)


·
δ





1
N





ω











F
^

ω



2









(
24
)








where {circumflex over (F)} is the true Fourier spectrum. Since the input “vector” F in this Step is a list of unitary matrices, the root-mean-square factor is custom character(1), and the distinction between relative and absolute error is immaterial. By the analysis of Step 3 above, δ is custom character(log(n/ϵ)). Thus, the error in any Fourier coefficient C2k(2n) is δ2n=custom character(δ√{square root over (n)}log n).


Step 5. This is an implementation of Theorem 2. One desirably bounds the error propagated through the loop over m. The error in E(m)(t) is of the same order as the error of Q(m) or P(m). Thanks to the condition (iv) of Step 1,

C±m(m)∥≥∥C±2(2n)∥≥ϵ/n,  (25)

(where the first inequality is because C±m(m) is a product of one unitary and m projectors for any m≥0) and the error in Q(m) or P(m) is at most custom charactermn/ϵ). Since the projectors P(m) Q(m) or the Fourier coefficients Ck(m) of a unitary-valued function has norm at most 1, one sees that

δm−1custom charactermn/ϵ).  (26)

Summarizing,

log2(1/δ2n)=Rcustom character(log(n/ϵ)),  (27)
log2(1/δm−1)≥log2(1/δm)−custom character(log(n/ϵ)),  (28)
log2(1/δ0)≥R−custom characterC(n log(n/ϵ)).  (29)

Since one wants δ0 to be sufficiently smaller than ϵ/n, it suffices to have R=Ω(n log(n/ϵ)).


Step 6. The correctness of the algorithm is clear from the construction and error analysis above.


C. Computational Complexity

All arithmetic in the algorithm above operates with at most R-bit numbers, where R is chosen to be Θ(n log(n/ϵ)). The number of elementary bit operations (AND, OR, NOT) to perform one basic arithmetic operation (+, −, ×, /) on u-bit numbers is upper bounded by custom character(u polylog(u)). Let one count the number of arithmetic operations. Assuming that the coefficients of the true function A(z) and B(z) are given to accuracy custom character(ϵ/n), it takes custom character(n log(n/ϵ)) arithmetic operations to find rational approximations, since continued fraction converges exponentially. The root finding takes time custom character(n3−n2R)=custom character(n3 log(n/ϵ)); this count includes all the cost of bit operations for high precision arithmetic. The polynomial function evaluation involves custom character(n) arithmetic operations. The FFT requires custom character(n log n) operations given custom character(log n) trigonometric function values, which can be computed by Taylor expansions of order R, invoking custom character(R log n) arithmetic operations. These result in arithmetic complexity custom character(n log(n) log(n/ϵ)) for the FFT. Updating the Fourier coefficient list Ck(m) involves custom character(n) arithmetic operations, which one can do for custom character(n) times, resulting in custom character(n2) arithmetic operations. Overall, the computational complexity for any constant ϵ is custom character(n3 polylog(n)).


V. Application to Hamiltonian Simulation

Suppose one is given a unitary W whose eigenvalues custom charactere±i↓0λ are associated with those λ of a Hermitian matrix II with ∥H∥≤1 as

sin θλ=λ.  (30)


The correspondence between W and H might seem contrived at this stage, but when H is represented as a linear combination of unitaries, it is possible to construct such W as a quantum circuit. The relation of Eq. (30) is in fact common whenever quantum walk is used. (See Section IX for some detail.) So, the desired transformation is

eλ→e−iτ sin θλcustom character+|F(eλ/2)|+custom character  (31)

where F(t) should be constructed by quantum signal processing. Since the product of n primitive matrices yields a Fourier component of frequency at most n/2, F(t) comprises, in some embodiments, of at least 2τ factors. (The factor of 2 is due to the half-angle in the argument of F.) Note that the success probability of the post-selection is close to 1 since |ƒ(eλ)|=1.


With e=z, one can write










exp


(

i





τ





sin





φ

)


=


exp


(

τ



z
-

z

-
1



2


)


=




k












J
k



(
τ
)




z
k








(
32
)








where Jk are the Bessel functions of the first kind. This is the Fourier series of exp(iτ sin φ), and one can see that Jk is an even function if k is even, and odd if k is odd. Also, J−k=(−1)kJk. One can take Eq. (32) as a definition of the Bessel functions. One can separate the reciprocal and anti-reciprocal parts of the expansion as










exp


(

τ



z
-

z

-
1



2


)


=






k


2













J
k



(
τ
)






z
k

+

z

-
k



2






A


(
z
)




+

i







k



2



+
1











J
k



(
τ
)






z
k

-

z

-
k




2





i







B


(
z
)




.







(
33
)







This expansion, called the Jacobi-Anger expansion, converges absolutely at a superexponential rate, as shown below by a steepest descent method.


Lemma 6. For any real number τ and any integer k≠0,













J
k



(
τ
)







e
2





(


e



τ




2


(



k


+
1

)



)



k



.






(
34
)







Proof. It suffices to consider the case where τ≥0 and k≥1.
















J
k



(
τ
)


=



1

2





π






0

2





π




d





φ






e

i





τ





sin





φ




e


-
i






k





φ





=






1

2





π





i






Γ





d





z

z



e


(

τ
/
2

)



(

z
-

z

-
1



)





z

-
k















(
35
)








where the contour Γ is the unit circle. Since the integrand has a pole only at z=0 and it vanishes on large z with custom character(z)<r for any fixed r<∞, the contour may be replaced with a semi-circle with an infinite negative real together with a line z(y)=(2(k+1)/τ)+iy where y∈custom character. The contribution from the semi-circle at infinity is zero. Therefore,













J
k



(
τ
)




<




1

2





π







-






d





y



e

k
+
1







(

2


(

k
+
1

)



/


τ

)

+

i





y





k
+
1












=




e

2





π





(


e





τ


2


(

k
+
1

)



)

k






-







d





y



(

1
+

y
2


)



(

k
+
1

)

/
2
















e

2





π





(


e





τ


2


(

k
+
1

)



)

k






-







d





y


1
+

y
2











=




e
2





(


e





τ


2


(

k
+
1

)



)

k

.









One can improve the second inequality by evaluating the integral explicitly, to give an extra factor of custom character(k−1/2) in the bound.


A partial sum of the Jacobi-Anger expansion can be written as














k


:




k




n










J
k



(
τ
)




z
k



=







even





k


:


0


k

n










J
k



(
τ
)






z
k

+

z

-
k



2







A
~



(
z
)




+

i








odd





k


:


0


k

n










J
k



(
τ
)






z
k

-

z

-
k




2

i








B
~



(
z
)




.







(
36
)







This is ϵ-close to the full expansion if n=Ω(τ+log(1/ϵ)) by Lemma 6 for any z∈U(1). Numerical experiments suggest that the bound is quite tight and it suffices to choose









n




e
2


τ

+

ln


(

1


/


ϵ

)






1.36





τ

+

2.30








log
10



(

1


/


ϵ

)


.







(
37
)







The Laurent polynomials Ã(z) and {tilde over (B)}(z) are pure real-on-circle. Applying the example algorithm, one obtains real-on-circle Laurent polynomials a(z)=a+(z), b(z)=ib(z), c(z)=ic(z), d(z)=d+(z). The pure Laurent polynomials c(z), d(z) are calculated by Lemma 4 where one chooses c(z) to be anti-reciprocal and d(z) reciprocal. (This choice is to have the results in the same convention as those of Guang Hao Low, Theodore J. Yoder. and Isaac L. Chuang, “Methodology of resonant equiangular composite quantum gates,” Phys. Rev. X 6, 041067 (2016), 1603.03996.) Note that every exponent of z of the polynomial 1−a(z)2−b(z)2 here, whose roots must be computed, is even since a(z) has only even exponents and b(z) has only odd exponents, so it is always better to feed a Laurent polynomial g of degree n, instead of 2n, where

g(z2)=1−a(z)2−b(z)2  (38)

into the root finding routine. Given the expanded form of 1−a(z)2−b(z)2, it takes no effort to find g. In this case, the intermediate polynomial c(z) of Lemma 4 is










e


(
z
)


=



(

z
-

r
z


)





(


z
2

-

(

c
+

c
_


)

+


c


c
_



z
2



)

.






(
39
)







VI. Application to Matrix Inversion

While there are slightly more efficient implementations of matrix inversion problems (see, e.g., A. W. Harrow, A. Hassidim, and S. Lloyd, Quantum algorithm for solving linear systems of equations, Physical Review Letters 15, 150502 (2009)) using quantum signal processing, here the eigenvalue transformation perspective is considered. i


Suppose a hermnitian matrix H of norm at most 1 that one wishes to invert is block-encoded in a unitary W so that W has eigenvalues custom charactere±iθλ associated with an eigenvalue A of H. This encoding is the same as in the Hamiltonian simulation above. The condition for H being hermitian is not too restrictive since, for any matrix M, an enlarged matrix |0custom charactercustom character1|⊗M+|1custom charactercustom character0|⊗M is always hermitian. Then, one wants an eigenvalue transformation custom charactere±iθλ→1/sin θλ. As one should not invert a singular matrix, one can assume that eigenvalues of H are bounded away from zero by 1/κ where κ≥1 is the condition number of H. (Strictly zero eigenvalues are fine if one is interested in a pseudo-inverse.) Thanks to the condition number assumption, one desirably finds a polynomial approximation to the function custom character=eλ→1/sin θλ that is good for values sin θλ away from zero by 1/κ. For this purpose, there is a useful polynomial (see A. M. Childs, R. Kothari, and R. D. Somma, “Quantum algorithm for systems of linear equations with exponentially improved dependence on precision.” SIAM Journal on Computing 46, 1920 1950 (2017)).


Lemma 7. Let b≥b′≥1 be any integers, and let z=e∈U(1) be any complex number. Then.
















(


z
+

z

-
1



2

)


2





b


-


1

2

2





b








k
=

-

b





b










(




2





b






b
+
k




)



z

2





k










2







e


-

b
′2




/


b


.





I

f











z
-

z

-
1




2





i






=




sin





φ





1


/


κ



,
then




(
40
)










(


z
+

z

-
1



2

)


2





b







e


-
b



/



κ
2



.





(
41
)







Proof. The first claim is proved as










2


-
2






b







k
:



k


>

b








(




2





b






b
+
k




)



z

2





k










2


-
2






b







k
:



k


>

b







(




2





b






b
+
k




)








and then using Hoeffding's inequality on the tail of binomial probability distributions. The second claim is proved as (1−sin2φ)b≤e−b/κ2 whenever |sin φ|≥1/κ. □


Thus, for large b, one sees that 1−((z+z−1)/2)2b vanishes when sin φ=0 (i.e., z=±1), but is close to 1 for |sin φ|≥1/κ. By the first statement of the lemma this function can be replaced with a lower degree polynomial function. Quantitatively, with z=eone has an ϵ-approximation of the desired inversion function by Laurent polynomial of degree 2b′−1 for |sin φ|≥1/κ:












2





i



2

2





b




κ


(

z
-

z

-
1



)









k
=

-

b





b










(




2





b






b
+
k




)



(

1
-

z

2





k



)







2





i


κ


(

z
-

z

-
1



)







(
42
)








where b=κ2 log(2/ϵ) and b′=√{square root over (b log(4/ϵ))}=custom character(κ log(1/ϵ)). The left-hand side is a genuine Laurent polynomial since the sum vanishes at z=±1. Feeding this polynomial, which is real-on-circle and anti-reciprocal, into the example algorithm, one obtains a desired eigenvalue inversion quantum algorithm. The success probability can be as small as Ω(1/κ2), and hence one can better amplify the amplitude for post-selection, enlarging the quantum gate complexity by a factor of custom character(κ).


VII. Example Embodiments


FIG. 5 is a flowchart 500 showing an example embodiment for implementing an embodiment of the disclosed technology. The particular operations and sequence of operations should not be construed as limiting, as they can be performed alone or in any combination, subcombination, and/or sequence with one another. Additionally, the illustrated operations can be performed together with one or more other operations. In particular, flowchart 500 illustrates a method for synthesizing a data-lookup oracle in accordance with the disclosed technology.


At 510, one or more unitary-valued functions are generated by a classical computer generating using projectors with a predetermined number of significant bits.


At 512, a quantum computing device is configured to implement the one or more unitary-valued functions.


In some implementations, the unitary-valued functions are iteratively decomposed.


In further implementations, the unitary-valued functions are applied to implement a Hamiltonian simulation. In certain implementations, the unitary-valued functions are applied to solve a linear equation.



FIG. 6 is a flowchart 600 showing an example embodiment for implementing an embodiment of the disclosed technology. The particular operations and sequence of operations should not be construed as limiting, as they can be performed alone or in any combination, subcombination, and/or sequence with one another. Additionally, the illustrated operations can be performed together with one or more other operations. In particular, flowchart 600 illustrates a method for synthesizing a data-lookup oracle in accordance with the disclosed technology.


At 610, a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions is generated by a classical computer, wherein the generating further includes representing approximate polynomials in a Fourier series with rational coefficients.


At 612, a quantum computing device is configured to implement a quantum circuit defined by the quantum circuit description.


In some implementations, the Fourier series with rational coefficients decreases numerical instability in the computation of decomposition. In further implementations, the quantum circuit description is configured to perform a Hamiltonian simulation. In certain implementations, the quantum circuit description is configured to solve a linear equation.



FIG. 7 is a flowchart 700 showing an example embodiment for implementing an embodiment of the disclosed technology. The particular operations and sequence of operations should not be construed as limiting, as they can be performed alone or in any combination, subcombination, and/or sequence with one another. Additionally, the illustrated operations can be performed together with one or more other operations. In particular, flowchart 700 illustrates a method for synthesizing a data-lookup oracle in accordance with the disclosed technology.


At 710, a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions is generated by a classical computer, wherein the generating further includes truncating terms in approximation polynomials with coefficients determined by a preset accuracy parameter.


At 712, a quantum computing device is configured to implement a quantum circuit defined by the quantum circuit description.


In some implementations, the truncating decreases numerical instability in the computation of decomposition. In further implementations, the quantum circuit description is configured to perform a Hamiltonian simulation. In certain implementations, the quantum circuit description is configured solve a linear equation.



FIG. 8 is a flowchart 800 showing an example embodiment for implementing an embodiment of the disclosed technology. The particular operations and sequence of operations should not be construed as limiting, as they can be performed alone or in any combination, subcombination, and/or sequence with one another. Additionally, the illustrated operations can be performed together with one or more other operations. In particular, flowchart 800 illustrates a method for synthesizing a data-lookup oracle in accordance with the disclosed technology.


At 810, a quantum circuit description is generated, by a classical computer, for implementing quantum signal processing that decomposes complex-valued periodic functions, wherein the generating further includes expanding factorized polynomial using discrete fast Fourier transforms.


At 812, a quantum computing device is configured to implement a quantum circuit defined by the quantum circuit description.


In some implementations, the expanding decreases numerical instability in the computation of decomposition. In certain implementations, the quantum circuit description is configured to perform a Hamiltonian simulation. In further implementations, the quantum circuit description is configured solve a linear equation.



FIG. 9 is a flowchart 900 showing an example embodiment for implementing an embodiment of the disclosed technology. The particular operations and sequence of operations should not be construed as limiting, as they can be performed alone or in any combination, subcombination, and/or sequence with one another. Additionally, the illustrated operations can be performed together with one or more other operations. In particular, flowchart 900 illustrates a method for synthesizing a data-lookup oracle in accordance with the disclosed technology.


At 910, a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions is generated by a classical computer, wherein the generating further includes determining complementary polynomials by finding roots of Laurent polynomials to a preset accuracy.


At 912, a quantum computing device is configured to implement a quantum circuit defined by the quantum circuit description.


In some implementations, the quantum circuit description is configured to perform a Hamiltonian simulation. In certain implementations, the quantum circuit description is configured solve a linear equation.


VIII. Example Computing Environments


FIG. 1 illustrates a generalized example of a suitable classical computing environment 100 in which several of the described embodiments can be implemented. The computing environment 100 is not intended to suggest any limitation as to the scope of use or functionality of the disclosed technology, as the techniques and tools described herein can be implemented in diverse general-purpose or special-purpose environments that have computing hardware.


With reference to FIG. 1, the computing environment 100 includes at least one processing device 110 and memory 120. In FIG. 1, this most basic configuration 130 is included within a dashed line. The processing device 110 (e.g., a CPU or microprocessor) executes computer-executable instructions. In a multi-processing system, multiple processing devices execute computer-executable instructions to increase processing power. The memory 120 may be volatile memory (e.g., registers, cache, RAM, DRAM, SRAM), non-volatile memory (e.g., ROM, EEPROM, flash memory), or some combination of the two. The memory 120 stores software 180 implementing tools for performing any of the quantum signal processing techniques having numerical error controls as described herein. The memory 120 can also store software 180 for performing any of the quantum signal processing techniques with numerical error controls as described herein, as well as software 180 for synthesizing, generating, or compiling quantum circuits resulting from the results of the quantum signal processing techniques.


The computing environment can have additional features. For example, the computing environment 100 includes storage 140, one or more input devices 150, one or more output devices 160, and one or more communication connections 170. An interconnection mechanism (not shown), such as a bus, controller, or network, interconnects the components of the computing environment 100. Typically, operating system software (not shown) provides an operating environment for other software executing in the computing environment 100, and coordinates activities of the components of the computing environment 100.


The storage 140 can be removable or non-removable, and includes one or more magnetic disks (e.g., hard drives), solid state drives (e.g., flash drives), magnetic tapes or cassettes, CD-ROMs, DVDs, or any other tangible non-volatile storage medium which can be used to store information and which can be accessed within the computing environment 100.


The storage 140 can also store instructions for the software 180 implementing any of the disclosed quantum signal processing techniques having numerical error controls. The storage 1-10 can also store instructions for the software 180 for generating and/or synthesizing any of the described techniques, systems, or reversible circuits.


The input device(s) 150 can be a touch input device such as a keyboard, touchscreen, mouse, pen, trackball, a voice input device, a scanning device, or another device that provides input to the computing environment 100. The output device(s) 160 can be a display device (e.g., a computer monitor, laptop display, smartphone display, tablet display, netbook display, or touchscreen), printer, speaker, or another device that provides output from the computing environment 100.


The communication connection(s) 170 enable communication over a communication medium to another computing entity. The communication medium conveys information such as computer-executable instructions or other data in a modulated data signal. A modulated data signal is a signal that has one or more of its characteristics set or changed in such a manner as to encode information in the signal. By way of example, and not limitation, communication media include wired or wireless techniques implemented with an electrical, optical, RF, infrared, acoustic, or other carrier.


As noted, the various methods, quantum signal processing techniques having numerical error controls, circuit design techniques, or compilation/synthesis techniques can be described in the general context of computer-readable instructions stored on one or more computer-readable media. Computer-readable media are any available media (e.g., memory or storage device) that can be accessed within or by a computing environment. Computer-readable media include tangible computer-readable memory or storage devices, such as memory 120 and/or storage 140, and do not include propagating carrier waves or signals per se (tangible computer-readable memory or storage devices do not include propagating carrier waves or signals per se).


Various embodiments of the methods disclosed herein can also be described in the general context of computer-executable instructions (such as those included in program modules) being executed in a computing environment by a processor. Generally, program modules include routines, programs, libraries, objects, classes, components, data structures, and so on, that perform particular tasks or implement particular abstract data types. The functionality of the program modules may be combined or split between program modules as desired in various embodiments. Computer-executable instructions for program modules may be executed within a local or distributed computing environment.


An example of a possible network topology 200 (e.g., a client-server network) for implementing a system according to the disclosed technology is depicted in FIG. 2. Networked computing device 220 can be, for example, a computer running a browser or other software connected to a network 212. The computing device 220 can have a computer architecture as shown in FIG. 2 and discussed above. The computing device 220 is not limited to a traditional personal computer but can comprise other computing hardware configured to connect to and communicate with a network 212 (e.g., smart phones, laptop computers, tablet computers, or other mobile computing devices, servers, network devices, dedicated devices, and the like). Further, the computing device 220 can comprise an FPGA or other programmable logic device. In the illustrated embodiment, the computing device 220 is configured to communicate with a computing device 230 (e.g., a remote server, such as a server in a cloud computing environment) via a network 212. In the illustrated embodiment, the computing device 220 is configured to transmit input data to the computing device 230, and the computing device 230 is configured to implement any of the quantum signal processing techniques having numerical error controls as disclosed herein and/or circuit generation or compilation/synthesis methods for generating quantum circuits based on or in conjunction with the quantum signal processing techniques disclosed herein. The computing device 230 can output results to the computing device 220. Any of the data received from the computing device 230 can be stored or displayed on the computing device 220 (e.g., displayed as data on a graphical user interface or web page at the computing devices 220). In the illustrated embodiment, the illustrated network 212 can be implemented as a Local Area Network (LAN) using wired networking (e.g., the Ethernet IEEE standard 802.3 or other appropriate standard) or wireless networking (e.g. one of the IEEE standards 802.11a, 802.11b, 802.11g, or 802.11n or other appropriate standard). Alternatively, at least part of the network 212 can be the Internet or a similar public network and operate using an appropriate protocol (e.g., the HTTP protocol).


Another example of a possible network topology 300 (e.g., a distributed computing environment) for implementing a system according to the disclosed technology is depicted in FIG. 3. Networked computing device 320 can be, for example, a computer running a browser or other software connected to a network 312. The computing device 320 can have a computer architecture as shown in FIG. 1 and discussed above. In the illustrated embodiment, the computing device 320 is configured to communicate with multiple computing devices 330, 331, 332 (e.g., remote servers or other distributed computing devices, such as one or more servers in a cloud computing environment) via the network 312. In the illustrated embodiment, each of the computing devices 330, 331, 332 in the computing environment 300 is used to perform at least a portion of a quantum signal processing technique having numerical error controls (as disclosed herein) and/or a synthesis/compilation process. In other words, the computing devices 330, 331, 332 form a distributed computing environment in which the quantum signal processing techniques having numerical error controls (as disclosed herein) and/or generation/compilation/synthesis processes are shared across multiple computing devices. The computing device 320 is configured to transmit input data to the computing devices 330, 331, 332, which are configured to distributively implement such as process, including performance of any of the disclosed methods or creation of any of the disclosed circuits, and to provide results to the computing device 320. Any of the data received from the computing devices 330, 331, 332 can be stored or displayed on the computing device 320 (e.g., displayed as data on a graphical user interface or web page at the computing devices 320). The illustrated network 312 can be any of the networks discussed above with respect to FIG. 2.


With reference to FIG. 4, an exemplary system for implementing the disclosed technology includes computing environment 400. In computing environment 400, a compiled quantum computer circuit description (including quantum circuits resulting from and/or supported by any of the quantum signal processing techniques having numerical error control(s) as disclosed herein) can be used to program (or configure) one or more quantum processing units such that the quantum processing unit(s) implement the circuit described by the quantum computer circuit description.


The environment 400 includes one or more quantum processing units 402 and one or more readout device(s) 408. The quantum processing unit(s) execute quantum circuits that are precompiled and described by the quantum computer circuit description. The quantum processing unit(s) can be one or more of, but are not limited to: (a) a superconducting quantum computer; (b) an ion trap quantum computer; (c) a fault-tolerant architecture for quantum computing; and/or (d) a topological quantum architecture (e.g., a topological quantum computing device using Majorana zero modes). The precompiled quantum circuits (including any circuit resulting from and/or supported by any of the quantum signal processing techniques having numerical error control(s) as disclosed herein) can be sent into (or otherwise applied to) the quantum processing unit(s) via control lines 406 at the control of quantum processor controller 420. The quantum processor controller (QP controller) 420 can operate in conjunction with a classical processor 410 (e.g., having an architecture as described above with respect to FIG. 1) to implement the desired quantum computing process. In the illustrated example, the QP controller 420 further implements the desired quantum computing process via one or more QP subcontrollers 404 that are specially adapted to control a corresponding one of the quantum processor(s) 402. For instance, in one example, the quantum controller 420 facilitates implementation of the compiled quantum circuit by sending instructions to one or more memories (e.g., lower-temperature memories), which then pass the instructions to low-temperature control unit(s) (e.g., QP subcontroller(s) 404) that transmit, for instance, pulse sequences representing the gates to the quantum processing unit(s) 402 for implementation. In other examples, the QP controller(s) 420 and QP subcontroller(s) 404 operate to provide appropriate magnetic fields, encoded operations, or other such control signals to the quantum processor(s) to implement the operations of the compiled quantum computer circuit description. The quantum controller(s) can further interact with readout devices 408 to help control and implement the desired quantum computing process (e.g., by reading or measuring out data results from the quantum processing units once available, etc.)


With reference to FIG. 4, compilation is the process of translating a high-level description of a quantum algorithm into a quantum computer circuit description comprising a sequence of quantum operations or gates, which can include the circuits as disclosed herein. The compilation can be performed by a compiler 422 using a classical processor 410 (e.g., as shown in FIG. 1) of the environment 400 which loads the high-level description from memory or storage devices 412 and stores the resulting quantum computer circuit description in the memory or storage devices 412.


In other embodiments, compilation and/or quantum program simulation can be performed remotely by a remote computer 460 (e.g., a computer having a computing environment as described above with respect to FIG. 1) which stores the resulting quantum computer circuit description in one or more memory or storage devices 462 and transmits the quantum computer circuit description to the computing environment 400 for implementation in the quantum processing unit(s) 402. For instance, with reference to FIG. 4, remote computer 460 includes a quantum program simulator 464 that can be perform any of the simulation techniques disclosed herein. Still further, the remote computer 400 can store the high-level description in the memory or storage devices 462 and transmit the high-level description to the computing environment 400 for compilation and use with the quantum processor(s).


In any of these scenarios. results from the computation performed by the quantum processor(s) can be communicated to the remote computer after and/or during the computation process. Still further, the remote computer can communicate with the QP controller(s) 420 such that the quantum computing process (including any compilation, simulation, and QP control procedures) can be remotely controlled by the remote computer 460. In general, the remote computer 460 communicates with the QP controller(s) 420, compiler/synthesizer 422, quantum program simulator 421. via communication connections 450.


In particular embodiments, the environment 400 can be a cloud computing environment, which provides the quantum processing resources of the environment 400 to one or more remote computers (such as remote computer 460) over a suitable network (which can include the internet).


IX. Appendix: Jordan's Lemma and Block Encoding of Hamiltonians

Lemma 8. Let P and Q be arbitrary self-adjoint projectors on a finite dimensional complex vector space V. Then, V decomposes into orthogonal subspaces Vj invariant under P and Q, where each Vj has dimension 1 or 2.


For any hermitian operator H, let supp(H) denote the subspace support of H (the orthogonal complement of the kernel of H). Clearly, supp(H) is an invariant subspace of H, and H is invertible within supp(H).


Proof. Here, a subspace W of dimension at most 2 is found that is invariant under both P and Q. This is sufficient since the orthogonal complement of W is also invariant and the proof will be completed by induction in the dimension of V.


Put P′=I−P and Q′=I−Q, and consider the identities

PQP+PQ′P+P′QP′+P′Q′P′=I,  (43)
supp(PQP)+supp(PQ′P)+supp(P′QP′)+supp(P′Q′P′)=V,  (44)

where the second equality is because the intersection of the orthogonal complements of the four supports is zero. Therefore, at least one of four supports is nonzero, and without loss of generality assume S=supp(PQP)≠0. Let |ψcustom character∈S be an eigenvector of PQP; PQP|ψcustom character=a|ψcustom character. The associated eigenvalue a is nonzero by definition of S. Now consider W=span{|ψcustom character, Q|ψcustom character}. Observe that a|ψcustom character=PQP|ψcustom character=PPQP|ψcustom character=aP|ψcustom character, and hence P|ψcustom character=|ψcustom character. Moreover, PQ|ψcustom character=PQP|ψcustom character=a|ψcustom character. Therefore, W is a nonzero invariant subspace under both P and Q. □


This Jordan's lemma can be applied to two hermitian unitaries (reflections) U1, U2 as any hermitian unitary is 2P−I for some projector P. It immediately follows that there is a basis where U1 is diagonal and U1U2 is block-diagonal with at most two-dimensional blocks and each block belongs to U(1) or U(2). In any such two-dimensional block, one has











U
1

=

(



1


0




0



-
1




)


,


U
2

=

(



λ




e

i





ϕ





1
-

λ
2










e


-
i






ϕ





1
-

λ
2







-
λ




)






(
45
)








for some real number λ∈[−1, 1] and an angle ϕ∈custom character, up to a permutation of rows and columns. Therefore, the product W=−iU1U2 is a rotation in a two-dimensional subspace that appears in Grover search algorithm (see L. K. Grover, “A fast quantum mechanical algorithm for database search,” in Proceedings, 28th Annual ACM Symposium on the Theory of Computing (STOC) (1996) pp. 212 219) and has eigenvalues custom charactere±iθ where sin θ=λ. This is relevant in a Hamiltonian simulation problem where U1=2|Gcustom charactercustom characterG|−1 and the Hamiltonian is “block-encoded” as H=custom characterG|U2|Gcustom character, which is the case if H is represented as, e.g., a linear combination of Pauli operators.


X. Concluding Remarks

Having described and illustrated the principles of the disclosed technology with reference to the illustrated embodiments, it will be recognized that the illustrated embodiments can be modified in arrangement and detail without departing from such principles. For instance, elements of the illustrated embodiments shown in software may be implemented in hardware and vice-versa. Also, the technologies from any example can be combined with the technologies described in any one or more of the other examples. It will be appreciated that procedures and functions such as those described with reference to the illustrated examples can be implemented in a single hardware or software module, or separate modules can be provided. The particular arrangements above are provided for convenient illustration, and other arrangements can be used.

Claims
  • 1. A method, comprising: by a classical computer, generating one or more unitary-valued functions using projectors with a predetermined number of significant bits; andconfiguring a quantum computing device to implement the one or more unitary-valued functions.
  • 2. The method of claim 1, wherein the unitary-valued functions are iteratively decomposed.
  • 3. A system, comprising: a quantum computing device; anda classical computing device in communication with the quantum computing device and adapted to perform the method of claim 1.
  • 4. A method, comprising: by a classical computer, generating one or more unitary-valued functions using projectors with a predetermined number of significant bits; andconfiguring a quantum computing device to implement the one or more unitary-valued functions, wherein the unitary-valued functions are applied to implement a Hamiltonian simulation.
  • 5. A method, comprising: by a classical computer, generating one or more unitary-valued functions using projectors with a predetermined number of significant bits; andconfiguring a quantum computing device to implement the one or more unitary-valued functions, wherein the unitary-valued functions are applied to solve a linear equation.
  • 6. A method, comprising: by a classical computer, generating a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions, wherein the generating further includes representing approximate polynomials in a Fourier series with rational coefficients; andconfiguring a quantum computing device to implement a quantum circuit defined by the quantum circuit description.
  • 7. The method of claim 6, wherein the Fourier series with rational coefficients decreases numerical instability in the computation of decomposition.
  • 8. The method of claim 6, wherein the quantum circuit description is configured to perform a Hamiltonian simulation.
  • 9. The method of claim 6, wherein the quantum circuit description is configured to solve a linear equation.
  • 10. A method, comprising: by a classical computer, generating a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions, wherein the generating further includes truncating terms in approximation polynomials with coefficients determined by a preset accuracy parameter; andconfiguring a quantum computing device to implement a quantum circuit defined by the quantum circuit description.
  • 11. The method of claim 10, wherein the truncating decreases numerical instability in the computation of decomposition.
  • 12. The method of claim 10, wherein the quantum circuit description is configured to perform a Hamiltonian simulation.
  • 13. The method of claim 10, wherein the quantum circuit description is configured to solve a linear equation.
  • 14. A method, comprising: by a classical computer, generating a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions, wherein the generating further includes expanding factorized polynomial using discrete fast Fourier transforms; andconfiguring a quantum computing device to implement a quantum circuit defined by the quantum circuit description.
  • 15. The method of claim 14, wherein the expanding decreases numerical instability in the computation of decomposition.
  • 16. The method of claim 14, wherein the quantum circuit description is configured to perform a Hamiltonian simulation.
  • 17. The method of claim 14, wherein the quantum circuit description is configured solve a linear equation.
  • 18. A method, comprising: by a classical computer, generating a quantum circuit description for implementing quantum signal processing that decomposes complex-valued periodic functions, wherein the generating further includes determining complementary polynomials by finding roots of Laurent polynomials to a preset accuracy; andconfiguring a quantum computing device to implement a quantum circuit defined by the quantum circuit description.
  • 19. The method of claim 18, wherein the quantum circuit description is configured to perform a Hamiltonian simulation.
  • 20. The method of claim 18, wherein the quantum circuit description is configured solve a linear equation.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of U.S. Provisional Application No. 62/689,675 entitled “PRODUCT DECOMPOSITION OF PERIODIC FUNCTIONS IN QUANTUM SIGNAL PROCESSING” and filed on Jun. 25, 2018, which is hereby incorporated herein by reference in its entirety.

US Referenced Citations (1)
Number Name Date Kind
20140187427 Macready Jul 2014 A1
Non-Patent Literature Citations (25)
Entry
Haah, “Product Decomposition of Periodic Functions in Quantum Signal Processing,” arXiv:1806.10236v2, 20 pp. (Oct. 2018).
Haah et al., “Quantum algorithm for simulating real time evolution of lattice Hamiltonians,” arXiv:1801.03922v2, 33 pp. (Apr. 2018).
International Search Report and Written Opinion dated Oct. 1, 2019, from International Patent Application No. PCT/US2019/038758, 17 pp.
Berry et al., “Black-Box Hamiltonian Simulation and Unitary Implementation,” Quantum Information and Computation, vol. 12, No. 1&2, pp. 29-62 (Jan. 2012).
Berry et al., “Exponential Improvement in Precision for Simulating Sparse Hamiltonians,” Forum of Mathematics, Sigma, vol. 5, pp. 1-28 (Mar. 2017).
Boyd, “The Rate of Convergence of Fourier Coefficients for Entire Functions of Infinite Order with Application to the Weideman-Cloot Sinh-Mapping for Pseudospectral Computations on an Infinite Interval,” Journal of Computational Physics, vol. 110, pp. 360-372 (Feb. 1994).
Cheng et al., “Bounding the Sum of Square Roots via Lattice Reduction,” Mathematics of Computation, vol. 79, No. 270, pp. 1109-1122 (Apr. 2010).
Childs et al., “Hamiltonian Simulation Using Linear Combinations of Unitary Operations,” Quantum Information and Computation, vol. 12, No. 11&12, pp. 901-924 (Jan. 2012).
Childs, “On the relationship between continuous- and discrete-time quantum walk,” Communications in Mathematical Physics, vol. 294, Issue 2, pp. 1-22 (Mar. 2010).
Childs et al., “Quantum algorithm for systems of linear equations with exponentially improved dependence on precision,” SIAM Journal of Computing, pp. 1-31 (2017).
Childs et al., “Toward the first quantum simulation with quantum speedup,” Proc. National Academy of Sciences, vol. 115, Issue 38, pp. 9456-9461 (Sep. 2018).
Gilyen et al., “Quantum singular value transformation and beyond: exponential improvements for quantum matrix arithmetics,” ACM SIGACT Symp. on Theory of Computing, pp. 1-67 (Jun. 2018).
Grover, “A fast quantum mechanical algorithm for database search,” ACM Symp. on the Theory of Computing, pp. 212-219 (1996).
Haah et al., “Quantum algorithm for simulating real time evolution of lattice Hamiltonians,” IEEE Symp. on Foundations of Computer Science, pp. 350-360 (Oct. 2018).
Harrow et al., “Quantum algorithm for linear systems of equations,” Phys. Rev. Lett., vol. 103, pp. 1-24 (Oct. 2009).
Harvey et al., “Faster Integer Multiplication Using Short Lattice Vectors,” arXiv:1802.07932v1, pp. 1-16 (Feb. 2018).
Low et al., “Hamiltonian Simulation by Qubitization,” Quantum Physics, pp. 1-20 (Oct. 2016).
Low et al., “Methodology of Resonant Equiangular Composite Quantum Gates,” Physical Review X, vol. 6, pp. 1-13 (Dec. 2016).
Low et al., “Optimal Hamiltonian Simulation by Quantum Signal Processing,” Physical Review Letters, vol. 118, No. 1, pp. 1-5 (Jan. 2017).
Low et al., “The methodology of resonant equiangular composite quantum gates,” arXiv:1603.03996v3, pp. 1-13 (Feb. 2018).
Pan, “Optimal and nearly optimal algorithms for approximating polynomial zeros,” Computers & Mathematics with Applications, vol. 31, No. 12, pp. 97-138 (1996).
Qian et al., “How much precision is needed to compare two sums of square roots of integers?,” Information Processing Letters, vol. 100, No. 5, pp. 194-198 (Dec. 2006).
Ramos, “Roundoff Error Analysis of the Fast Fourier Transform,” Mathematics of Computation, vol. 25, No. 116, pp. 757-768 (Oct. 1971).
Schonhage, “On the Power of Random Access Machines,” Int'l Colloquium on Automata, Languages, and Programming, pp. 520-529 (Jul. 1979).
Shamir, “Factoring Nos. in O(log n) Arithmetic Steps,” Massachusetts Inst of Tech Cambridge Lab for Computer Science, 19 pp. (Nov. 1977).
Related Publications (1)
Number Date Country
20190392343 A1 Dec 2019 US
Provisional Applications (1)
Number Date Country
62689675 Jun 2018 US