Quantum information science is currently a rapidly developing and highly valued research area with wide applications in computation [1-4], data science and machine learning [5-6], communication [7-13], and sensing [14-16]. Quantum computation may bring significant advantages to some specific algorithms. Quantum communication will strictly guarantee data security and privacy, boost transmission efficiency based on the laws of physics. Quantum sensing may boost the measurement precision significantly.
However, the application of quantum information science in the real world may generate large amounts of data. Quantum data (in qubits) will carry the information, so we need some special units to handle quantum data as well as efficient methods to make the quantum data interact with the classical world. At the same time, the scale of classical data is getting bigger and bigger, and one could naturally consider storing and processing classical data in quantum devices with large Hilbert space dimensions. The generation, processing, and application of quantum data, and the treatment of those data together with their classical counterparts, are currently challenging theoretical and experimental problems in quantum science.
Embodiments herein include a quantum data center (QDC), an architecture combining quantum random access memory (QRAM) and quantum networks. Potential applications of disclosed architectures include quantum computation, quantum communication, and quantum sensing, with a primary focus on QDC for T-gate resources, QDC for multi-party private quantum communication, and QDC for distributed sensing through data compression. The QDC provides efficient, private, and fast services as a future version of data centers.
In a first aspect, a quantum data center includes a quantum computer and a transceiver. The transceiver is in communication with the quantum computer and is operable to communicate with a remote user via a quantum communication network. The quantum computer (i) receives, via the transceiver, a quantum input state from the remote user, (ii) stores, in a quantum random access memory, a plurality of database states in a plurality of database qudits forming a database register, (iii) queries the quantum random access memory with the quantum input state to retrieve, from the database register, a quantum output state that is based on one or more of the plurality of database states, the quantum output state being disentangled from the quantum input state and the plurality of database states, and (iv) transmits, via the transceiver, the quantum output state to the remote user.
In a second aspect, a method for a quantum data center includes (i) receiving, via the transceiver of the quantum data center, a quantum input state from a remote user, (ii) storing a plurality of database states in a plurality of database qudits forming a database register, (iii) implementing, with the quantum computer of the quantum data center, a quantum random access memory with the database register, (iv) querying, with the quantum computer, the quantum random access memory with the quantum input state to retrieve, from the database register, a quantum output state that is based one or more of the plurality of database states, the quantum output state being disentangled from the quantum input state and the plurality of database states, and (v) transmitting, via the transceiver, the quantum output state to the remote user.
In a third aspect, a method for a quantum data center includes (i) sending, via a quantum communication network, a quantum input state to the quantum data center, and (ii) receiving, via the quantum communication network, a quantum output state from the quantum data center.
A quantum data center (QDC) is a unified concept referring to some specific quantum hardware that could efficiently deal with the quantum data and provides an efficient interface between classical data and quantum processors. The key component of a QDC is a quantum random access memory (QRAM) [17-25], which is a device that allows a user to access multiple different elements in superposition from a database (which can be either classical or quantum). At a minimum, a QDC includes a QRAM coupled to a quantum network.
To provide the services above, QDC 110 may include a quantum computer and a transceiver. The transceiver, in communication with the quantum computer, may communicate with a remote user via a quantum communication network. The quantum computer may operate to (i) receive, via the transceiver, a quantum input state from the remote user, (ii) store, in a QRAM, a plurality of database states in a plurality of database qudits forming a database register, (iii) query the QRAM with the quantum input state to retrieve, from the database register, a quantum output state that is based on one or more of the plurality of database states, the quantum output state being disentangled from the quantum input state and the plurality of database states, and (iv) transmit, via the transceiver, the quantum output state to the remote user.
About the role of QRAM, there are numerous quantum algorithms that claim potential advantages against their classical counterparts, but those algorithms often implicitly require an interface between classical data and the quantum processor. The advantages of the computational complexity are estimated usually from the query complexity where the oracle provides this interface (see, for instance, Ref. [5]). The QRAM (see Refs. [17, 25, 27]) is a general-purpose architecture that could serve as a realization of such oracles. For example, QRAM allows a user to perform a superposition of queries to different elements of a dataset stored in memory. The data itself may be either classical or quantum. In the case where the data is classical, the user provides an arbitrary superposition of addresses as input, and the QRAM returns an entangled state where the addresses are correlated with the corresponding data:
Here, the superscripts Q1 and Q2 denote respective input and output qubit registers, xi denotes the ith element of the classical dataset, ai are generic coefficients, and N is the size of the database. We emphasize the distinction between QRAM, defined in Eqn. 1, and so-called random-access quantum memories, where the latter do not allow for accessing a superposition of multiple different data elements and hence are not sufficient for our purposes. Indeed, the ability to perform a superposition of queries as in Eqn. 1 is important to the applications we describe below.
Alternatively, the QRAM may store quantum data. In this case, the user provides an arbitrary superposition of addresses as input, but the QRAM returns the quantum state that was stored in the memory location specified by the address. More precisely, if the QRAM holds an arbitrary product state, ⊗j=1N|ψjD
which, conditioned on register Q1 being in state |i, swaps the state of register Q2 and the ith cell of the quantum memory. Here, |
=|0
for i=j, and |
=|ψj
otherwise. By linearity, this also defines the query operation when the QRAM holds an entangled state. Note that, when the data is quantum, a QRAM query may leave the Q1 and Q2 registers entangled with the data. The difference between the classical and quantum operations will be evident when we try to “write” the data in QDSs, as described in Section 3 below.
As a formal definition, a QDC denoted ={
,
} includes a QRAM
coupled to a quantum communication network
. A query to the QDC may be performed in three steps: (i) a remote user uses
to send a quantum query to the QDC, (ii) the QDC executes query using
, as in either Eqns. 1 or 2, and (iii) the QDC uses
to send input and output qubit registers, Q1 and Q2, back to the user.
is characterized by four parameters: the size of the database N, the error in the query ϵ, the latency τ (time cost of a single query), and the throughput T (number of queries performed per unit time).
QRAM requires that different elements of the memory can be queried in superposition as in Eqns. 1 and 2. Moreover, there are extended parameters we could choose when we choose the circuit depth or the width of the QRAM implementation, see Refs. [22, 24, 25, 31-34], but for latter applications, we assume our QRAM circuits to be shallow. Further, we assume that QRAM has been built in the fault-tolerant way and has been error-corrected. Building a large-scale fault-tolerant QRAM is, in fact, a primary challenge in experiments.
Quantum networks may be realizable in the future due to the fast development of quantum communication technology in recent years. Here, we are considering the service provided by QDC is centralized and has some physical distances from users. Thus, quantum states are supposed to be teleported through the quantum network from the user to the QDC or vice versa, where quantum teleportation technology includes the technologies of quantum satellites [35-37] and quantum repeaters [10, 12, 13, 38-40].
In an example of a QDC applied for quantum computing, we show how a QDC may provide resource savings in a fault-tolerant cost model to users running query-based quantum algorithms. There are two aspects of resource savings induced by QDC: (i) hardware outsourcing and (ii) communication costs (see Section 3 below for a unification of space and time costs). The reason for the hardware outsourcing is simple. Imagine that we are doing fault-tolerant quantum computation with a significant amount of T-gates in the queries, which may be expensive and require the magic state distillation [41, 42]. Rather than preparing the requisite magic states themselves, the user could instead ask the QDC to prepare the magic states, thereby reducing the resources required of the user. This naive approach, however, has a high communication cost since each magic state would need to be sent over the quantum network from the QDC to the user.
In contrast to this naive approach, we propose that the user outsources entire oracle queries to the QDC. Outsourcing entire queries provides a particularly efficient way for users to offload large amounts of magic state distillation to the QDC with minimal communication cost. More specifically, without the aid of a QDC, a user would be required to distill at least (√{square root over (N)}) [32] magic states to query a data set of size N as in equation (1). In contrast, with a QDC, a user can outsource the query to the QDC: the QDC is responsible for implementing the query and distilling the associated magic states, while the user only incurs a
(log N) communication cost. This communication cost is due to the fact that the input and outputs of the query must be sent between the user and the QDC. The user also benefits in that they are no longer responsible for the potentially large amount of ancillary qubits needed to implement a query [22, 32, 33]; this hardware cost is paid by the QDC.
We emphasize that this approach of outsourcing full queries to the QDC is exponentially more efficient than naive the approach described previously in terms of communication cost. The native approach would incur a prohibitive (√{square root over (N)}) communication cost per query. In contrast, by outsourcing entire queries to the QDC, one effectively funnels a large amount of “magic” (the
(√{square root over (N)}) magic states required to implement a query) into a very small number of transmitted qubits (the
(log N) qubits comprising the query's output). This way, the user receives maximal assistance from the QDC at minimal communication cost.
Both the savings from the hardware and the communication costs could be quantifies this benefit by the following example. Suppose a user wishes to run a 100-qubit algorithm that requires 108 T-gates when decomposed into Clifford+T operations. Further, suppose that the user has a device with physical error rates of p=10−3 and that the target failure probability for the entire computation is <1%. To achieve this failure probability, we assume error correction is used, and that gates are implemented fault tolerantly. Non-Clifford gates are implemented fault-tolerantly with the aid of magic state distillation.
A resource estimate for exactly this situation is performed in Ref. [43] for surface codes (see Section 3 below). The outsourcing can enable resource savings for the user (potentially both in the overall algorithm runtime and hardware cost). To estimate these savings, we suppose that these queries are responsible for 99% of the algorithm's T-state consumption (this is not an unreasonable supposition; see, for instance, Ref. [33]). According to Ref. [43] and Section 3 below, we observe that the user can now use a 15-to-1 magic state distillation scheme, as the user need only produce ˜106 magic states, and the total probability that any such state is faulty is 106×35p3˜0.01, which is within the allowed error tolerance. As described in Ref. [43], the number of surface code tiles required for computation and distillation with the 15-to-1 scheme is 164. With the distillation scheme selected, we can now estimate the required code distance d and algorithm run time. The code distance must satisfy,
to guarantee that that the total error probability remains below 1%. Here pL is the logical error probability of a distance d surface code with physical error probability p, which is approximately given by Ref. [44]. The parameter #code cycles is the number of surface code cycles required to distill 106 magic states, i.e., the minimum number of cycles required to run the algorithm assuming instantaneous data center queries. In practice, however, the data center queries will not be instantaneous. Thus, we add a delay factor to the total number of cycles. This delay is related to the QDC's latency τ, and the exact amount of the delay depends not only on how the oracle is implemented by the QDC but also on the communication time overhead. Moreover, with the √{square root over (N)}→log N arguments from the communication cost, we could (use assumptions, delay factor ˜(√{square root over (N)}) or delay factor 18
(log N), respectively, referring to the protocols where oracle queries are implemented by the user (with magic states sent one-by-one from the QDC) or where full queries are implemented by the QDC.
Quantum private query (QPQ) [26], a protocol combining QRAM and quantum networks, could already serve as an important application of QDC for quantum communication. Furthermore, the application of QDCs could be much broader to provide the users with fast and secure service. Based on QPQ and Quantum Secret Sharing from Refs. [8, 9], we propose an original protocol, so-called multi-party private quantum communication, as an example of applications of QDCs. We provide discussions of QPQ and related concepts in Section 3 below.
Private quantum communication refers to the possibility of transmitting quantum information without revealing this information to eavesdroppers. If multiple parties are communicating over a quantum network, eavesdroppers may nevertheless be able to learn who has sent information and who has received it, even if they cannot determine what that information was. Multi-party private quantum communication refers to a stronger notion, where eavesdroppers can neither learn what information was communicated nor which users were communicating to which others. To our knowledge, this notion of multi party private quantum communication and the corresponding protocol is introduced for the first time in our paper.
In a use scenario of the protocol 400, each sending user 412(i) first takes his or her quantum message and decomposes it into several distinct parts using a quantum secret sharing protocol, such as described in Refs. [8, 9]. In isolation, each part of the secret message looks like a maximally mixed state, but when sufficiently many parts are assembled together, the original message can be perfectly recovered. Second, each sending user 412(i) sends parts of their secrets to the QDCs 410, where they are stored in QRAM at a publicly announced address. No one QDC(k) should receive enough parts of a secret to reconstruct the original message. Finally, the receiving users 414 interrogate the QDCs 410 using the quantum private queries protocol. Each receiving user 414(j) interrogates sufficiently many QDCs 410 to retrieve enough parts of the secret to reconstruct the original message from the sending user 412(i).
The protocol 400 constitutes a private multi-party quantum communication because (i) the use of secret sharing means that no QDC may learn what information is being communicated, and (ii) the use of Quantum Private Queries means that no QDC can learn which receiving user 414(j) is accessing the information transmitted by sending user 412(i). A crucial assumption in the protocol 400 is that the QDCs 410 are non-cooperating. If the QDCs 410 cooperate, they could work together to reconstruct the secret. To mitigate this problem, each secret may be divided into an increased number of parts (along with the increased number of QDCs 410). This way, revealing the secret would require cooperation between an increasingly large number of QDCs.
Note that our approach is different from the so-called covert quantum communication [47]. Covert quantum communication refers to a stronger notion, where eavesdroppers cannot even detect whether any information has been transmitted in the first place. In the protocol of Ref. [47], Alice and Bob are assumed to share a random, secret key, and the quantum information is sent via optical photons from Alice to Bob at one of N times specified by the key. The probability that an eavesdropper can distinguish between this situation and that where no information is communicated at all (i.e., when no photons are sent) is shown to decrease as 1/√{square root over (N)}. In the limit of large N, the eavesdropper cannot determine whether any information has been sent.
Note that the multi-party private quantum communication scheme is teleporting quantum states, not classical information. Those quantum states are naturally merged with quantum private queries where the security is guaranteed quantumly, making the usage of superposition of addresses in QRAM. Moreover, an important technicality regarding the last step of the protocol is that the QDCs store quantum data, and, in general, the act of accessing this data can perturb the quantum database (a consequence of the no-cloning theorem). The QDC may, in principle, detect this perturbation, and use this information to infer which receiving user 414(j) is accessing the information transmitted by sending user 412(i). To prevent this, we suppose that the quantum data is accessed as follows. In addition to sending a state |i specifying which element to access, each receiving user 414(j) also sends a quantum state ρj to the QDC 410. The QDC 410 then swaps ρj with the state stored at location i in the memory. If ρj is chosen to be a maximally mixed state, this data access procedure has no backreaction on the database; from the perspective of each QDC, the states stored in the database always look maximally mixed.
In the context of quantum sensing, QDCs can be used to compress quantum data and signals, enabling more efficient communication in distributed sensing tasks. We discuss this application in further detail below, but we begin by first describing the underlying capability that enables these applications—the ability of a QDC to compress quantum data.
We illustrate how QDCs can be used to compress quantum data through a simple example. Suppose that the quantum data held by the QDC is confined to the single-expectation subspace, spanned by states where only one of the N qubits in the QDC's quantum memory is in the |1 state and all others are in |0
. The state of the memory can then be written as
where Dj indicates the jth qubit in the N-qubit quantum memory, and δij is the Kronecker delta (δij=1 for i=j and δij=0 otherwise). Though the entire Hilbert space of the N-qubit quantum memory has the dimension 2N, the single-excitation subspace has only dimension N. Thus, one could equivalently represent the above state using only log N qubits, as
where Q1 denotes a log N-qubit register, and |iQ
and |ψboth
contain the same quantum information (the N complex coefficients αi) but encode this information in different ways. The mapping |ψunary
→|ψbinary
constitutes compression of this quantum information because the information is mapped from an N-qubit encoding to a log N-qubit encoding. The compressed state |ψbinary
can be more efficiently stored or transmitted.
A QDC can be used to realize the unary-to-binary compression described above. The compression proceeds in two steps: first, the QDC performs an operation U (defined below) that encodes the location of the single excitation into a log N-qubit address register, then a single QRAM query is performed in order to extract the excitation from the memory. In detail, the unitary U enacts the operation,
We note that the operation U is not equivalent to a QRAM query (see Eqn 2), so U falls outside the scope of operations that a QDC can perform per the minimal definition. As we describe below, however, the operation U can be straightforwardly implemented using only minor modifications to standard QRAM architectures. Next, a QRAM query extracts the single excitation from the quantum memory and stores it in an output register Q2,
After this step, the Q2 and Dj registers are disentangled from the Q1 register. The state of the Q1 register is |ψbinary, which constitutes the compressed representation of the quantum data that was originally stored in the QDC's memory. This compressed data may subsequently be stored, transmitted, or measured, depending on the application [48]. Thus, QDCs can be used to reduce the entanglement cost for distributed sensing applications.
Suppose that two or more physically separated users probe some system, such that a quantity of interest is encoded in an entangled state shared between them. If local operations do not suffice to measure this quantity, then quantum information must be transmitted between the users. If each user has N qubits of quantum data, then N entangled pairs will be required to transmit the information in general. In certain situations, this entanglement cost can be greatly reduced using a QDC. For example, if the N-qubit states are guaranteed to lie in the single-excitation subspace, then they can be transmitted using only log N entangled pairs using the unary-to-binary compression described above. This is the case for quantum-assisted telescope arrays [49], where quantum networks are used to enable optical interferometry. In this context, a single optical photon arrives at one of multiple telescopes in superposition, with its arrival time and frequency unknown. Supposing that the photon arrives at one of N unknown time-frequency bins, Refs. [50, 51] show that unary-to-binary compression enables the optical phase difference to be extracted using only log N entangled pairs. QDCs could be directly used to implement this compression. In fact, using a QDC to implement the compression is more hardware efficient than the approach proposed in Ref. [51]. In that work, the authors consider the case where a photon arrives at one of Tbin different time bins and in one of R different frequency bands, and they describe a procedure that uses (R log Tbin) qubits to compresses the photon's arrival time and frequency information.
The same compression can be achieved with a QDC using only (R)+
(log Tbin) qubits as follows. At each time step, any incoming photon is stored in one of R different memory qubits according to its frequency band. These R qubits constitute the QDC's quantum memory, and the QDC performs unary-to-binary compression scheme described above to compress this which-frequency information. If the photon arrived at the present time step, it is now stored at a definite location (namely, register Q2 in equation (7)). The presence of this photon can then be used to control the binary encoding of the which-time information, as in Ref. [50]. Altogether, this procedure requires
(R) qubits for the QDC and its quantum memory, plus an additional
(log Tbin) qubits to hold the compressed which-time information, hence the total hardware cost is
(R)+
(log Tbin) qubits. When counting the communication time cost, the savings will be more drastic. More sophisticated compression protocols can enable further reduction in entanglement cost. If each mode of an M-mode system is populated with a photon with probability p, then the quantum data can be transmitted as few as MH(p) qubits, where H(p) is the binary entropy, using a scheme for Schumacher coding [52]. Such schemes would further reduce the entanglement cost. Moreover, a QDC equipped with quantum sorting networks (a generalization of QRAM), can implement Schumacher coding in polylogarithmic time [53], enabling improved detector bandwidth.
This section provides some necessary information and related results about QDCs. In Section 3.1, several basic aspects of QDC are described, and more specifically, some perspectives on the writing function of QDCs. In Sections 3.2, 3.3 and 3.4, examples of QDC usage when applied in quantum computation, quantum communication, and quantum sensing, respectively, are presented.
Here we comment on some general perspectives about QDCs. We note also that some architectures without either QRAM or quantum networks could still be defined as QDCs. In Section 3.4, we describe an application in quantum sensing where QRAMs are not necessarily used, but one could still use QDC architectures to realize it.
QDCs are different from a generalized version of quantum computers. A universal quantum computing (UQC) device that is associated with QDC may be developed. However, it is not necessary, and the QDC construction may directly serve remote users with their own quantum computation architectures. In fact, some of our examples mentioned later do not require UQC power for QDC, for instance, QDCs for the T-gate counting that have been discussed in the main text. Moreover, QDCs may, in addition to the above minimal definition, function in a generalized form. For example; QDCs equipped with UQC may also perform quantum cloud computation.
While the QDC disclosed herein may seem closely related to the idea of disposable quantum software proposed in Ref. [59], the quantum software, as defined in Ref. [59], is a fragile quantum state that is difficult to maintain by users and is, therefore, preferably bought through the quantum network. An early quantum teleportation scheme based on Ref. [60] provides significant power for quantum devices by combining UQC and quantum communication, inspiring the observation in Ref. [59] for quantum software. Therefore, the embodiments of QDC described herein feature ingredients from QRAM that enable extra capabilities for computation, communication, and sensing.
For QDCs defined above, we estimate the cost of time, hardware with a given requirement of error and privacy. Here we establish a general theory to estimate the hardware-time cost for QDCs and determine optimal parameters according to the cost function.
In general, we define a cost function FcostQDC for a given QDC architecture. The cost function may be written as
Here, the cost function FcostQDC includes a time cost Tcost, space (hardware) cost Ncost, and a privacy cost Ptotal, where the privacy cost refers a quantity that represents a level of consumption for the QDC users. In an example, the above cost function may be linear in terms of each cost:
with fixed positive coefficients αT, αN and αP. In general, FcostQDC may be defined as a monotonic function of Tcost, Ncost and Ptotal. Moreover, Tcost, Ncost and Ptotal are given by one collection of throughput parameters, and the other collection of hyperparameters (latency) θ. The optimal hyperparameters may be determined by
for given requirements of hardware.
For comparison, a similar analysis may be carried out for their counterparts without involving a QDC, with a cost function Fcost
In this section, we more precisely define what it means to write data to QRAM. The definition of writing depends on whether the data being written are (i) classical or (ii) quantum, and also on whether the addressing scheme is (iii) classical or (iv) quantum. We elaborate on these four different situations below.
In this situation, the QRAM holds a classical data vector x, and the writing operation consists of specifying a classical address i and a new classical value yi, then overwriting the value ith cell of the QRAM's memory, xi→yi. This writing process is entirely classical; it can be implemented simply by performing classical operations on the classical data.
Even though this definition of writing to QRAM is completely classical, it is still useful in the context of quantum algorithms. In particular, after the writing operation, the modified classical data in the QRAM can subsequently be read in superposition (i.e., with quantum addressing). For example, if each element in the database is replaced as xi→yi, then reading the QRAM consists of the operation
cf. equation (1). Thus, the same QRAM can be re-used to perform a superposition of queries to a different data set. This is particularly useful in the context of QDCs, as multiple users may be running different algorithms that require access to different classical data sets. The QDC may cater to all of these users by overwriting the QRAM's classical data between queries from different users.
In contrast to the previous definition, writing to QRAM for the case of classical data and quantum addressing is not well defined. To illustrate this, we propose a possible definition for writing in this situation, then show that it ultimately reduces to a probabilistic version of the classical writing procedure described above.
When QRAM's classical data is stored in a quantum memory (i.e., each classical datum xi ∈{0,1} is encoded in a qubit as |xi), the full database includes the product state ⊗i|xi
D
Q
where yi∈{0,1}, and (iii) swapping this state with the ith cell of the memory,
In general, this operation leaves the data registers entangled with the Q1 and Q2 registers. As such, tracing out the Q1 and Q2 registers leaves the database in a mixed state, wherewith probability |αi|2 one finds that ith entry has been overwritten as; xi→yi. To achieve the same result, one may instead have randomly chosen to overwrite the ith element according to the distribution |αi|2. Therefore, the combination of quantum addressing and classical data may not be advantageous over using the combination of classical addressing and classical data.
In this situation, the QRAM holds quantum data (i.e., an N-qubit quantum state). The writing operation consists of specifying a classical address i and a new single-qubit state |ϕQ
D
Note that in the case where the quantum data consists of a product state, this operation does not entangle the Q2 and Di registers. For general quantum data, however, this operation may leave these registers entangled, such that the data can be left in a mixed state when the Q2 register is traced out.
In this situation; the QRAM holds quantum data (i.e., an N-qubit quantum state). The writing operation includes, first, specifying a quantum address Σi αi|i. Then; coherently conditioned on the state of the Q1 register, one prepares another register Q2 in the state |ϕi
, then swaps this state with the ith cell of the memory. In the case where the QRAM initially holds a product state ⊗j|ψj
D
We note that reading quantum data, Eqn. 2 is a special instance of the above process where |ϕi=|0
for all i. This operation generally leaves the Q1 and Q2 registers entangled with the data registers Di.
One of the most important applications of QDC is quantum computation (e.g., quantum computation 120 of
If we assume that a general quantum algorithm U, such as quantum algorithm 722, has a time cost and a qubit cost given by
Both costs depend on a problem size L, a precision ∈, collections of other hyperparameters θU, and problem parameters θ0. When the time cost of the algorithm itself is expressed by the query complexity, and the corresponding oracle is prepared by QRAM itself multiple times, the QRAM cost may be expressed as:
with a QRAM parameter θQ. Additionally, the quantum network cost may be expressed as:
The quantum network cost includes a total length Ltot and a quantum network parameter θI. The oracles may be prepared remotely with the total length Ltot, and transferred to the user via quantum network. The total cost then may be expressed as:
The time cost includes a query complexity TU for the quantum algorithm U. While the time cost is multiplicative, the qubit cost is additive. Thus, for given L, ∈, and θ0, an optimal choice of QDC may be determined by
The cost function Fcost is based on the architecture of QDC. This is a specific example of the cost function algorithm equation (8) for quantum computation.
While the quantum algorithm being discussed may be abstract, any quantum algorithms with the oracle required in the QRAM form may be adapted here. In the following section below, we discuss a specific quantum algorithm, quantum signal processing (QSP) for Hamiltonian simulation [54-56], where quantum oracles are needed to address the information of the Hamiltonian. Accordingly, if we use the qubitization algorithm with a number of Pauli terms L appearing in the Hamiltonian, we have
Here, we are comparing the hardware cost completely from the user side: in the
Similar advantage for a multiple user case is described in the following section. Additional potential saving of the hardware cost may come from savings in an entanglement cost of accessing an N-element data set with a QDC, which is only log N.
3.2.2 Quantum Simulation and Oracles from QDCs
A good example of running QDCs as oracle resources could be the quantum simulation algorithm, which has wide applications in quantum many-body physics, quantum field theory, and quantum computational chemistry with potential advantages compared to classical computers. Aside from the so-called Trotter simulation scheme [63-65], many quantum simulation algorithms are oracle-based, such as algorithms based on quantum walks [66, 67], multiproduct formula [68, 69], Taylor expansion [70, 71], fractional-query models [72], qubitization and quantum signal processing (QSP) [54-56]. Those oracles could naturally be implemented by the QRAM model (see, for instance, Ref. [25]).
We will give a short introduction to the qubitization and QSP algorithms here and discuss their costs. We will consider the linear combination of unitaries (LCU) decomposition as the input. We assume that the Hamiltonian is given by the following unitary strings
For simplicity, we will assume that αi>0. This is called the LCU model, and Πis are usually the Pauli matrices. We introduce the ancilla states |i: i=1, 2, . . . , L with the number of qubits log L. Furthermore, we implement the following state |G
One could show that
where Tn is the nth Chebychev polynomial. The Hamiltonian evolution e−iHt could be given by
Namely, one could separately add all terms together, and it requires
number of queries to the operation U and |G. Here, t is the Hamiltonian evolution time, and ∈ is the error. Here, implementing |G
is a quantum oracle operation, which may be operated by QRAM or QROM. For simplicity, here we mostly discuss the query complexity made by |G
, and U itself costs
(LC1) primitive gates, where C1 is the maximal complexity of implementing a single Pauli term Πi. In terms of gate counting, G itself would cost
(L) primitive gates. A more complicated construction, which is called the quantum signal processing (QSP) [73], could reduce the above product in query complexity to addition
Another ingredient of our analysis would combine the quantum network. Quantum network, based on hardware realizations of quantum teleportation and quantum cryptography, is expected to be efficient for transferring quantum states and their associated quantum data across long distances with guaranteed security [10]. Specifically, here we describe the quantum repeaters, architectures that could significantly overcome the loss errors and depolarization errors for quantum communication with photons (see, for instance, Ref [12]). For cost estimation, we follow the discussion in Ref. [13]. There are three different generations of quantum repeaters, and here we will, for simplicity, discuss them together. A universal measure of cost overhead for those quantum repeaters is the cost coefficient C2(C′ used in Ref. [12]), which could be understood as the qubit×time cost for the transmission of one Bell pair per unit length. Now, we will assume that for the quantum teleportation task of the data center, we use Ltot length. The characteristic time is given by tch (which is different from three different generations of quantum repeaters).
For our minimal definition of the quantum data center, with QDCs serving as the remote oracle resources, one could compute the total time cost Ttotal and the qubit cost Ntotal as the following
The total cost calculations above are explained with the following list:
is exactly the query complexity of QSP. Based on our minimal definition of the quantum data center, the cost of each query, including the quantum communication cost and the QRAM/QROM cost.
term comes in the second term.
comes from the definition of C2 in quantum repeaters, followed by the actual qubits and the corresponding maximal possible Bell pairs we are using when doing teleportation [13].
As long as we know the exact setups of QDCs, we could decide the resources easily based on our requirement as described by the general setup. Assuming a cost function Fcost, one could determine the set of hyperparameters both in quantum communication and quantum simulation by
We mention that QDCs could potentially provide transducers to transform different types of quantum data, for instance, from digital qubits to analog qubits. Since various different forms of qubits have their own advantages and challenges, it is necessary to consider hybrid quantum systems. For example, if we wish to combine quantum computation performed in the superconducting qubit systems, and quantum communication provided by transformations of optical photons across long distances in QDC and its users, quantum transducers might be necessary. See for instance Ref. [74]. Here in this example, since the quantum simulation algorithms could be performed by superconducting qubits, while the quantum network could be realized by optical photons, the quantum transducer is needed.
Finally, we consider the case where we only count the hardware cost from users. In the case where we do not have QDCs, each user may be required to implement a QRAM or a QROM in the quantum simulation algorithm. Thus, in the case where users have access to QDCs, we could subtract the hardware contribution from QDC. We could compute the hardware cost ratio between the case where we have QDCs, and the case where we do not have QDCs (
Here, we take the large L limit. Thus the L-dependent term will be dominant. We could see that, especially when M is not scaling with L, this will be an exponential saving of the hardware cost for QDC users.
In this section, we discuss a simple situation where QDC has multiple users and discuss its usage. Consider the case where multiple users want the same answer of a quantum algorithm. For simplicity, we assume the answer should be classical such that it is able to be copied to multiple users (the result may also be quantum, but approximate quantum cloning may then be used). We define the hardware cost of the quantum algorithm U for a single user as fU(θU, θU) where θ0 is the problem parameter, and θU is the hyperparameter of the algorithm. Say that we have k users, and for each user, the network cost of the hardware is fI(θU, θI) where θI is the hyperparameter of the algorithm. Thus, without QDC, calculations are performed independently from each user, and the total hardware cost scales as
With the QDC, the hardware cost scales as
Thus, the condition of the advantage of QDC may be
Thus, we may define the ratio
The smaller r is, the more useful QDC may become. The optimal r may be given by
The observation of comparing the communication cost and the computational cost is one of the original motivations of QDCs: using teleportation, one could save computational costs for multiple users. The r coefficient we defined here, and its possible variant, could serve as a generic measure for such observations. However, the task we described before is not using the full features of QDCs. If we teleport quantum states using the quantum network, the state itself is not copiable to multiple users (even though we may copy the state approximately, the error may be significant). One could use classical networks instead or encode the classical output to quantum repeaters and make use of quantum networks. Thus, in this case, the quantum network may not necessarily be needed. It could serve as a version of QDC where QRAM is used, but the quantum network is not (see another example where we use the quantum network but not QRAM in Section 3.4). Moreover, we expect that the above generic protocol may be improved and extended to more practical applications in the real science or business situation, and the simple analysis presented here may be a general guidance towards those applications.
Here, we give a brief review of the T-gate counting techniques described in Ref. [43] on surface-code quantum computation. Those techniques are based on a formalism of executions in a fault-tolerant surface-code architecture from a given quantum circuit (quantum algorithm). Estimations of hardware-time trade-off for given quantum algorithms, using this formalism, are based on the hardware and algorithm assumptions, which might be different compared to other protocols (e.g., see Ref. [75]).
The formalism is established from making assumptions about basic qubit manipulations. Simple operations such as qubit initializations and single-patch measurements may be regarded as easy, and they may cost zero time-unit. Herein, the term time-unit refers to an arbitrary cost unit and may be based on a real hardware. Operations such as two or multiple-qubit measurements and patch deformation may cost one time-unit.
The procedure of estimating the hardware-time cost for a given quantum circuit is the following. Firstly, we decompose the target unitary operation as Clifford+T-gates. Usually, we assume that the Clifford gates are cheap and T-gates are expensive. In fact, T-gates may be regarded as classical operations, but a given T-gate may require consumption of a single magic state, |0+ei#/4|1
. Magic state distillation described in Ref. [41] may be used to generate high-quality magic states in a large-scale quantum computation.
Further the treatment of a series of Clifford+T-gates may contain designing data blocks (blocks of tiles where the data qubits live), distillation blocks (blocks of tiles to distill magic states), and their combinations. In Ref. [43], several protocols are discussed for hardware-time costs. Finally, for a given large-scale quantum algorithm, precise designs are presented to minimize the hardware-time cost, especially the costs from T-gates and magic state distillation, and the costs may be pinned down to the number of qubits, gates, and even hours of time costs from assumptions of time-unit. In the T-gate example in Section 2 above, we point out that QDCs could serve as a T-gate factory and could reduce the T-gate counts significantly.
Based on the setup of qubit numbers and the required target failure probability, the main takeaways from this analysis are as follows. First, a 116-to-12 magic state distillation scheme is sufficient, as the probability of logical error in the distilled magic state is <10−10 hence the total probability that any of the 108 magic states is faulty is <1%. Once the distillation scheme is chosen, the total number of surface code tiles (210) and cycles (11d×108) required by the algorithm can be determined, and hence the minimum code distance can be calculated. For the above parameters, a distance d=27 is required to keep the total logical error probability below 1%. This translates into a cost of 306,000 physical qubits and a runtime of 7 hours (assuming each surface code cycle takes 1 μs). These costs constitute a baseline for our later comparisons.
The plot 810 may be used for a proper choice of magic state distillation schemes. For example, when the number of T-gates is 108, the 116-to-12 scheme 816 may be chosen for the total error to be below the threshold line 820.
Now, in the same situation of the main text, we make an analysis on the pure hardware savings depending on the delay factor and the delay time. (10 μs) for the delay time), the code distance may be set from d=27 to d=25. When the delay factor ≤1910 (≤
(1 ms) for the delay time), the QDC-assisted architecture may outperform a non-QDC architecture when measured in hardware overhead. When the delay factor ≤83 (≤
(100 μs) for the delay time), the QDC-assisted architecture may outperform a non-QDC architecture when measured in time overhead.
In the context of quantum communication, QDCs can be used to guarantee privacy, with a variety of potential applications. The essential feature of the QDC that enables this privacy is the ability of QRAM to perform queries to data in superposition. By secretly choosing to perform classical queries or superposed queries, then examining the results, users can determine whether other parties (including the QDC) may have tampered with the queries.
This basic idea is operationalized in the quantum private queries (QPQ) protocol of Ref. [26], which we describe below. This protocol allows users to access classical data with privacy guarantees, and this same idea can be applied to enable efficient blind quantum computation [57]. Both protocols may be directly implemented using a QDC.
A QDC can be directly used to implement the quantum private queries protocol of Ref. [26]. In the protocol, a user Alice (e.g., user 220,
The protocol of Ref. [26], quantum private query (QPQ), guarantees both user and database privacy by storing the data in QRAM. To access the ith element of a length-N database, Alice prepares a log N-qubit register in the state |i and transmits this state to Bob. Then, Bob uses this state as input to a QRAM query, so that the corresponding classical data, xi, is encoded in an output qubit register. Both the input and output registers are then returned to Alice. As such, database privacy is guaranteed because Bob must only transmit one element of the data back to Alice. To guarantee user privacy, Alice randomly chooses to either send initial state |i
or a lure state (|i
+|0
)/√{square root over (2)} to Bob (which she chooses is unknown to him). By performing measurements on the states Bob returns, Alice may ascertain whether or not Bob has attempted to learn the value of i. Thus, Alice maintains her privacy.
The implementation of this protocol with a QDC is not hard. The QDC consists of a QRAM, so the QDC simply plays the role of Bob in the protocol. Moreover, QDC provides an application of the QPQ protocol through the quantum network.
Now we quantify the protocol more precisely. In fact, instead of considering the states |i and (|i
+|0
)/2, we could consider more general states [26]. Bob needs to make choices in one of the two following scenarios:
where SA,B are made by the joint states of two queries: Q1 and Q2. All possible operations from Bob could be summarized by two unitaries: Ui and U2. U1 (U2) acts on the query space Qi (Q2), the associated register system Ri (R2), and Bob's ancillary system B (now we could understand it as Bob's QDC). If Bob is honest, the algorithm of Bob is to make use of QRAM, uploading the information from Q2 to registers, and the states in Q2 will not be changed. If not, Bob's remaining system Q2 will be entangled with the rest at the end. One could compute the final state of Alice:
where =A, B, and
Moreover, the final state of Q2 is given by
One could quantify the amount of information Bob could obtain from Alice by the mutual information IB. We will use the Holevo information associated with the ensemble {pj, σ(j)}, where pj=1/N is the probability for choosing j, and σ(j)=[σA(j)+σB(j)]/2 is the final state of Q2, since Alice has an equal probability to choose =A, B. Thus, one could obtain as in Ref. [76]
Here c is a constant, c≤631, and ∈p is the maximal probability where Alice finds that Bob is not cheating. Namely, if we use 1−(j) to denote the probability where Bob passes Alice's test, then
(j)≤∈p. As a summary, I is a measure of how honest Bob remains, and ∈p is a result of Alice's test. The above inequality is originated from the information-disturbance trade off, and the Holevo bound [27]. The ∈p1/4 dependence is coming from repetitively taking the square root between amplitudes and probabilities in quantum mechanics.
Now we relate ∈p by the number of queries appearing in the QPQ protocol. Let us assume that Alice has Q queries independently sent to Bob. Note that for multiple queries, if there is at least one time when Alice finds that Bob is cheating, Alice will know that privacy is not guaranteed. The probability of Alice not finding Bob cheating among QB times in all Q times, is given by (1−∈p)Q(1) number a where 1−a is not ignorable and we assume that QB<<1/∈p. In this case, we have
Thus, we see that for larger QB, if Alice does not find Bob is cheating, then Alice may be more confident that Bob has less mutual information. One can also assume that Bob picks a cheating strategy by QB˜Qα, where 0≤α≤1 will imply how many times Bob is cheating during the whole process. Then we have
When designing a QDC associated with QPQ, we could introduce a joint cost measurement among time, space, and privacy. Similar to the previous analysis on quantum signal processing, we write down the costs for the QDC when implementing QPQ as
Here, N is the number of qubits, Q is the total number of queries Alice has sent, M is the parameter in the hybrid QRAM/QROM construction, tch is the teleportation time per query, C2 is the teleportation qubit×time cost for the transmission of one Bell pair per unit length, and Ltot is the total length during teleportation. For the mutual information IB, one could understand IB as the privacy cost, by defining Ptotal as a monotonically decreasing function of IB, since the smaller IB, the larger privacy we are requiring. For simplicity, we could define Ptotal=1/IB. It does not matter how we choose the monotonic function, since a redefinition of the function could be absorbed to the definition of the cost function Fcost. Moreover, one could also understand IB as part of the hardware and the time cost, since we could write,
And if we demand a fixed value of IB, we could adapt Q into the hardware and the time cost. The larger Q is, the higher costs are required:
The total cost estimation of QDC associated with QPQ may be a joint measurement among Ttotal, Ntotal and Ptotal.
Note that in the main text, we discuss the combination of QPQ with the quantum secret sharing protocol. The original proposal on quantum secret sharing described in Ref. [9] is based on the entanglement property of the Greenberger-Horne-Zeilinger (GHZ) state, and it is a quantum scheme for sharing classical data since it relies on the measurement result. Moreover, in Ref. [8], a quantum scheme for sharing quantum data has been proposed, which is more suitable in our context. Ref. [8] constructs a ((k, n)) threshold scheme, where a quantum state is divided into n shares, while any k of them could completely reconstruct the state, but any k−1 of them cannot. It was shown that as long as n<2k, the construction is possible, and the explicit scheme has been constructed. In our case, a single Alice could divide the information to n QDCs. We could assume arbitrary k such that n<2k. Based on the practical purposes, a more specific setup of k may be used. A joint analysis of the multi-party quantum communication parameters may set a security standard for a given set of hardware.
There are studies on limitations and insecurity concerns in concepts that are related to QPQs. In fact, there are no-go theorems [77-79] on the imperfection of certain quantum computation and communication schemes. The QPQ protocol does not violate the no-go theorems [79] since the setup is different. And the QPQ protocol does not have a security requirement for the no-go theorem, where the user Alice cannot know the private key of QDCs, since QDCs do not have private keys. Those studies may potentially improve the capability of QDCs.
A QDC can be directly used to implement the efficient blind quantum computation protocol of Ref. [57]. In blind quantum computation, a user, Alice, wants to perform a quantum computation using Bob's quantum computer without revealing to Bob what computation has been performed. Ref. [57] shows how this is possible through a simple application of the QPQ protocol. Bob holds a length-N database stored in QRAM, where each entry in the database corresponds to a different unitary operation that he can perform on his quantum computer. Alice tells him which operation to perform by sending a log N-qubit quantum state |i, indicating that Bob should apply the ith unitary operation, Ui. Bob applies the operation without measuring the register (i.e., Bob applies a coherently-controlled operation UBob=Σi|
i|⊗Ui) then sends the state back to Alice. To protect her privacy, Alice periodically sends lure states and measures the states returned to her. If Bob attempts to cheat, Alice will be able to detect it.
The implementation of this protocol with a QDC is simple, as we have already shown that a QDC can implement the QPQ protocol. In this case, though, the QDC also requires a universal quantum computer in order to perform the computation. Thus, the efficient blind quantum computation protocol could be understood as an extension of QPQ with extra powers in quantum computation. When estimating the computational cost for QDC, one should include the computational complexity of the quantum operation Ui, while other analysis stay the same as QDC associated with QPQ.
In this section, we describe how QRAM architectures can be used to implement the unary-to-binary compression described above, which could be used for quantum sensing. In particular, we show that the compression operation can be implemented using a modified version of the bucket-brigade QRAM architecture [17, 18].
The compression scheme of →|ψbinary
. As a result, the state of N-mode memory (assumed to lie within the single-excitation subspace) may be compressed to log N qubits. Generalization to multi-excitation subspaces is straightforward; the procedure can be repeated to extract multiple excitations from the memory, such that the k-excitation subspace may be compressed into k log N qubits.
Additionally, the scheme in
where Q1, Q2, and Dj respectively denote the external log N-qubit register, an external qubit used to hold the extracted excitation (not shown in
Finally, the above procedure is run in reverse to return the excitation to its original location in memory
The Q1 and Q2 registers may subsequently be discarded.
While the above description describes unary-to-binary coding, it will be apparent to those trained in the art that the process can be reversed to perform binary-to-unary coding.
In previous sections, various aspects of QDC realizations with both QRAM and quantum communications are described. However, QDCs may still be made without either QRAM or quantum communications. Here we give a simple example from quantum sensing, where QRAM is not necessarily needed.
The estimation and discrimination of quantum channels are natural problems in quantum sensing (see Refs. [80-84]). Following Ref. [84], one of the simplest problems is the following channel discrimination problem: say that we have two distributions Θb with b=0,1. For a given b, we wish to find out the value of b by accessing the quantum channel
with minimal numbers of times (for the qubit setup in this paper, we could specify H as X. For higher dimensional channel discrimination, see Ref. [82]). One may define the channel discrimination protocol by the following circuits. The quantum (coherent) protocol corresponds to the following circuit
Here, N is the total number of queries, and corresponds to
th copy of the channel εb. A series of unitaries
will define the protocol (one could specify it by QSP angles, see Ref. [84]). Say that we define the input state to be |ψinput
and the output state to be |ψoutput
, the success probability is
For the incoherent (classical) protocol, we could perform N different measurement. Say that for th measurement, we expect the input |
and the output |
, we will have the
th probability
and the protocol could be specified by the majority vote [84]. Moreover, one may specify the ξ-hybrid protocol as performing a length-ι coherent protocol N/ξ times, and the result could be determined by the majority vote of N/ξ trials. It is shown that when the channel is noiseless (Θbs are Dirac function distributions), coherent protocols always have the advantage over incoherent protocols. However, when the channel is too noisy, incoherent protocols may be better [84]. Thus, the hybrid protocols might be useful when we increase N.
If the user wants the quantum sensing to have high precision, the user may be required to go to a large N regime. In the above example, precision δ is a difference between the mean of the distributions Θ1 and Θ2. In the noiseless case, the optimal N scales as 1/δ[84]. Moreover, the unitaries V={} may be difficult to construct and design. In those cases, QDC may be useful.
The protocol with QDC may be defined as the following. On the user side, the user may generate the channel εb,j, and the user may also send the information on the distribution Θb to a QDC. The QDC may generate a series of unitaries { } and design the optimal hybrid ξ-protocol. Each time when the state passes through the channel εb,j, the state may be teleported by the quantum network to the QDC, and the QDC applies
on the state and teleports it back. The measurement may be done either by the QDC or by the user. The majority vote may be done classically with
(N/ξ) complexity or quantumly by measuring
(N/ξ) times in the computational basis. The QDC-assisted channel discrimination protocols have advantages when it is difficult to design optimal circuits V={
}.
In addition to the applications of QDC described above for computing, communication, and sensing, QDC may be used for quantum simulation, delegated blind quantum computing, multiple users, and quantum sensing with channel discrimination. Recently, we have analyzed favorable error scaling of QRAM that only scales poly-log with the size of the database [24], which implies that QDC may be an intermediate-term application without the requirement of full error correction. QDC provides an example of application-specific efficient architectural design, taking full advantage of shallow QRAM circuits and small overhead in quantum communication. Given the tree-like structure of QRAM, it will be interesting to explore the future possibility of distributed QDC, so that we may de-centralize the QRAM and perform the entire QRAM over the distributed quantum networks.
Changes may be made in the above methods and systems without departing from the scope of the present embodiments. It should thus be noted that the matter contained in the above description or shown in the accompanying drawings should be interpreted as illustrative and not in a limiting sense. Herein, and unless otherwise indicated, the phrase “in embodiments” is equivalent to the phrase “in certain embodiments,” and does not refer to all embodiments. The following claims are intended to cover all generic and specific features described herein, as well as all statements of the scope of the present method and system, which, as a matter of language, might be said to fall therebetween.
This application claims priority to U.S. Provisional Patent Application No. 63/235,275, filed on Aug. 20, 2021, the entirety of which is incorporated herein by reference.
This invention was made with government support under grant numbers W911NF-18-1-0020, W911NF-18-1-0212, and W911NF-16-1-0349 awarded by the Office, Army Research grant numbers EFMA1640959, OMA1936118, and EEC1941583 awarded by the National Science Foundation, and grant numbers FA9550-19-1-0399 and FA9550-21-1-0209 awarded by the Air Force Office of Scientific Research. The government has certain rights in the invention.
Filing Document | Filing Date | Country | Kind |
---|---|---|---|
PCT/US2022/040951 | 8/19/2022 | WO |
Number | Date | Country | |
---|---|---|---|
63235275 | Aug 2021 | US |