Disclosed is a process for measuring a single linear function q(θ1, θ2, . .. , θd) of unknown parameters {θ1, θ2, . . . , θd} with a quantum sensor network while using the minimum amount of entanglement, the process comprising: providing a plurality of d quantum sensors, wherein each quantum sensor j is configured for measuring θj; preparing the plurality of quantum sensors in a probe quantum state |Ψ> with a minimum amount of entanglement, such that the amount of entanglement is the smallest amount of entanglement that gives the same optimal measurement of the linear function q(θ1, θ2, . . . , θd) as if the amount of entanglement was not restricted; exposing the plurality of quantum sensors to the set of unknown parameters; measuring the plurality of quantum sensors; and calculating the single linear function q(θ1, θ2, . . . , θd) from the measurements of the plurality of quantum sensors with robust phase estimation.
Disclosed is a quantum sensor network comprising: a plurality of d quantum sensors, each quantum sensor j is configured for measuring θj out of a set of unknown parameters {θ1, θ2, . . . , θd}, such that the plurality of quantum sensors is configured to be in a probe quantum state |Ψ> with a minimum amount of entanglement, such that the amount of entanglement is the smallest amount of entanglement that gives the same optimal measurement of the linear function q(θ1, θ2, . . . , θd) as if the amount of entanglement was not restricted; a network topology that connects the plurality of quantum sensors; and a controller that is configured to: prepare the plurality of quantum sensors in the probe quantum state |Ψ>; expose the plurality of quantum sensors to the unknown parameters {θ1, θ2, . . . , θd}; measure the plurality of quantum sensors; and use the measurements of the plurality of quantum sensors to calculate the function q(θ1, θ2, . . . , θd) of the set of unknown parameters.
Disclosed is a process for making a quantum sensor network that measures a single linear function q(θ1, θ2, . . . , θd), the process comprising: providing a plurality of d quantum sensors; arranging the plurality of quantum sensors in a network topology, such that each quantum sensor j is configured for measuring θj out of a set of unknown parameters {θ1, θ2, . . . , θd}; connecting the plurality of quantum sensors to a controller; preparing, by the controller, the plurality of quantum sensors in a probe quantum state |Ψ> with a minimum amount of entanglement, such that the amount of entanglement is the smallest amount of entanglement that gives the same optimal measurement of the linear function q(θ1, θ2, . . . , θd) as if the amount of entanglement was not restricted.
The following description cannot be considered limiting in any way. Various objectives, features, and advantages of the disclosed subject matter can be more fully appreciated with reference to the following detailed description of the disclosed subject matter when considered in connection with the following drawings, in which like reference numerals identify like elements.
A detailed description of one or more embodiments is presented herein by way of exemplification and not limitation.
It has been discovered that processes herein include quantum entanglement in a network of quantum sensors to optimally measure a smooth function of fields at the quantum sensors while using the minimum amount of entanglement. It is contemplated that in applications for geodesy, geophysics, biology, medicine, and the like, wherein sensors can be separated by a selected distance to measure temperature, a field (e.g., magnetic field, electric field, or a combination thereof), pressure, and the like, the processes apply when the fields at the sensors are different such as a sensor that measures electric field and another sensor that measures temperature. The processes can include an array of quantum sensors such as qubit sensors, interferometers, or field-quadrature displacement sensors, measuring functions of parameters some of which are measured by qubits, while others are measured by interferometers, while others are measured by field-quadrature displacement sensors, and the like.
For a Heisenberg scaler described in U.S. Pat. No. 11,562,049, the disclosure of which is incorporated herein by reference in its entirety, fields at individual sensors or phases of individual interferometers or field-quadrature displacements are first measured without entanglement between sensors, interferometers, or field-quadrature displacement sensors to a precision sufficient for linearization of the desired smooth (analytic) function that one wants to measure. Thereafter, as herein described, the resulting linearized function is measured by distributing selected entangled states across a network of qubit sensors, interferometers, field-quadrature displacement sensors and applying quantum gates on the sensors.
Quantum sensor networks have the potential to revolutionize the way we measure the world around us. By using the power of quantum mechanics, quantum sensor networks can achieve unprecedented levels of precision and sensitivity. It has been discovered that a quantum sensor network and a protocol for measuring a function with a quantum sensor network while using the minimum amount of entanglement provide optimal measurement of a smooth function while using the minimal amount of entanglement. This is a significant improvement over conventional technology that either measures only one parameter at a time or, as in U.S. Pat. No. 11,562,049, makes use of maximally entangled states without attempting to minimize the amount of entanglement used. The quantum sensor network and the protocol for measuring a function can be used for a range of applications such as medical imaging, environmental monitoring, and national security.
In an embodiment, a quantum sensor network is arranged such that a quantum sensor at a given position senses a field that depends on a known position and a set of unknown parameters. These unknown parameters can be, e.g., positions of charges producing an electric field. According to an embodiment, an entanglement-based protocol measures an analytic function of the unknown parameters while using the minimum amount of entanglement. The analytic function can be, e.g., a value of the field at a point without a sensor or the integral of the field over some region. The entanglement-based protocol can measure properties of spatially varying fields such as magnetic fields, electric fields, gravitational fields, and temperature and can be used in applications in chemistry, medicine, biology, materials science, physics, geodesy, geophysics, and the like. Advantageously, the entanglement-based protocol performs better than conventional protocols by providing smaller uncertainty given a fixed time or providing a desired uncertainty in a shorter time. The protocols described in U.S. patent application Ser. No. 17/978,420, the disclosure of which is incorporated by reference herein in their entirety, can be used to reduce the measurement problem described in this paragraph to a simpler problem where the unknown parameters are coupled directly to the sensors. We will therefore focus on this simpler problem below.
Various types of optimally measuring field properties using sensor networks are described in U.S. patent application Ser. Nos. 17/978,420, 16/677,922, and 15/650,216, the disclosures of which are incorporated by reference herein in their entirety. Entanglement-enhanced measurement of multiple functions with a quantum sensor network is described in U.S. patent application Ser. No. 18/136,257, which is incorporated by reference herein in its entirety. The protocol described herein for measuring a single linear function q(θ1, θ2, . . . , θd) of unknown parameters {θ1, θ2, . . . , θd} with a quantum sensor network while using the minimum amount of entanglement provides the same results as in these patent applications but using the minimum amount of entanglement.
Measuring a linear function of d unknown real field parameters θi coupled to d sensors involves the Hamiltonian here:
One wants to measure the function q(θ)=αθ, where θ is the d-dimensional vector containing the d field parameters θi, and α is the d-dimensional vector containing real coefficients specifying the linear function we are interested in. U.S. patent application Ser. No. 15/650,216 describes how to optimally measure q starting from the maximally entangled state of the d sensors. With respect to amount of entanglement, herein are described embodiments for measuring a function with a quantum sensor network while using the minimum amount of entanglement. Such embodiments provide the same optimal measurement result and use the minimum amount of entanglement.
In an embodiment, measuring a single linear function qθ1, θ2, . . . , θd) of unknown parameters {θ1, θ2, . . . , θd} with a quantum sensor network while using the minimum amount of entanglement, also referred to herein as the protocol, embeds single linear function q(θ1, θ2, . . . , θd) into the relative phase of probe quantum state |Ψ> as
After embedding single linear function q(θ1, θ2, . . . , θd) into the relative phase of probe quantum state |Ψ>, single linear function q(θ1, θ2, . . . , θd) can be measured using robust phase estimation.
For embedding single linear function q(θ1, θ2, . . . , θd) into the relative phase of probe quantum state |Ψ>, define fundamental probe state |ψ(τ; φ) as
φ∈ parameterizes individual states in the family, and τ1=1. One embeds τ into a d×N (N=3d−1) matrix T with matrix elements Tmn=m(n) for some ordering of the τ.
In an embodiment, with reference to
In an embodiment, the process for measuring a single linear function q(θ1, θ2, . . . , θd) of unknown parameters {θ1, θ2, . . . , θd} with a quantum sensor network while using the minimum amount of entanglement includes: normalizing α, for α∈d, such that ∥α∥∞=1 (step 201); determining a nonnegative solution p to Tp=α (step 202); restricting p to its
In an embodiment, embedding single linear function q(θ1, θ2, . . . , θd) includes: normalizing α, for α∈d, such that ∥α∥∞=1 (step 201); determining a nonnegative solution p to Tp=α (step 202); restricting p to its
In an embodiment, determining the nonnegative solution p (step 202) includes making the determination from experimental desiderata or optimization algorithm. With respect to experimental desiderata and optimization mentioned in step 202, Theorem 1 described below provides conditions on α under which the optimal measurement can be determined with k-partite entanglement, wherein k can be smaller than d. Once the minimum possible k is computed via Theorem 1, one keeps in matrix T only states that have at most k-partite entanglement. One then solves Tp=α for p.
Final state |ψ(τ(
In an embodiment, the process can include skipping step 209 and instead measuring the phase from final state |ψ(τ(
In addition to the size of the most-entangled state, one can minimize the average entanglement. The average entanglement can be given by weighting the size of each entangled state by the proportion of time that the state is used in the protocol. A proof that there exists a class of protocols that minimize this average entanglement is provided herein. These protocols are non-echoed, wherein the contribution to the relative phase proportional to ei is accumulated with the correct sign corresponding to sgn(αi) such that one need not echo away sensitivity. To obtain such a solution, one can further restrict T to include only columns such that sgn(Tij)=sgn(αi) for all i,j and then solve the corresponding system of linear equations.
It is contemplated that resources besides entanglement can be included in a cost function ε(p), which selects certain solutions to the system of linear equations T(k)p=α. In an embodiment, if certain pairs of quantum sensors are easier to entangle than other quantum sensors, e.g., because of their relative spatial location in quantum sensor network 200, such is encoded into ε(p).
Other optimizations take into consideration ordering of states used in the protocol. In an embodiment, because the protocol involves coherently applying CNOT gates to move between different families of entangled states, and these gates may be error-prone or costly resources, another protocol minimizes use of these gates, which is described below along with tradeoffs between minimizing entanglement and CNOT gates. In an embodiment, a greedy algorithm yields a favorable Θ(d) CNOT cost.
Without wishing to be bound by theory, it is believed that the quantum Cramér-Rao bound (QCRB) is a fundamental limit on the accuracy of unbiased parameter estimation in quantum systems. QCRB states that the variance of any unbiased estimator of a parameter is bounded below by the inverse of the quantum Fisher information (QFI). The QFI is a measure of how much information a quantum state contains about a parameter. QFI is the variance of the symmetric logarithmic derivative (SLD) of the state with respect to the parameter. SLD is an operator that measures how the state changes as the parameter is varied. QCRB can be used to set a lower bound on the uncertainty in any unbiased estimator of a parameter. QCRB has implications for quantum metrology, which is the field of study that deals with the use of quantum systems to make measurements. QCRB shows that quantum systems can be used to achieve higher precision measurements than classical systems because quantum states can contain more information about a parameter than classical states. It should be appreciated that QCRB has been used to develop new quantum sensing protocols, including protocols for measuring the phase of a light beam with unprecedented precision. QCRB is a powerful tool for understanding the limits of quantum parameter estimation ad for developing new quantum sensing protocols.
In an embodiment, quantum sensor network 200 includes: a plurality of quantum sensors, each quantum sensor j is configured for measuring θj out of a set of unknown parameters {θ1, θ2, . . . , θd}, such that the plurality of quantum sensors is configured to be in a probe quantum state |Ψ> with a minimum amount of entanglement, such that the amount of entanglement is the smallest amount of entanglement that gives the same optimal measurement of the linear function q(θ1, θ2, . . . , θd) as if the amount of entanglement was not restricted; a network topology that connects the plurality of quantum sensors; and a controller that is configured to: prepare the plurality of quantum sensors in the probe quantum state |Ψ>; expose the plurality of quantum sensors to the set of unknown parameters; measure the plurality of quantum sensors; and use the measurements of the plurality of quantum sensors to calculate the single linear function q(θ1, θ2, . . . , θd) of the set of unknown parameters. In an embodiment, the plurality of quantum sensors is arranged in a linear array. In an embodiment, the plurality of quantum sensors is arranged in a two-dimensional array. In an embodiment, the plurality of quantum sensors is arranged in a three-dimensional array. In an embodiment, the plurality of quantum sensors is qubits, interferometers, or field-quadrature displacement sensors. In an embodiment, the set of unknown parameters is a set of field amplitudes, a set of temperatures, a set of pressures, a set of strains, a set of forces, a set of magnetic fields, a set of electric fields, or a set of gravitational fields.
Quantum sensor network 200 can include a plurality of quantum sensors 215 that can include a two-level quantum system such as provided by qubits, a three-level quantum system such as provided by qutrits, a four-level quantum system, . . . , an m-level quantum system and the like, wherein m is an integer. It is contemplated that energy differences are measured between two levels so certain embodiments are described in the context of qubits. Exemplary quantum sensors 215 include a nuclear spin, an electronic spin, any two chosen levels of a neutral atom, an ion, a molecule, a solid-state defect, a superconducting qubit, and the like. In an embodiment, quantum sensors 215 include a neutral atom, an ion, a molecule, a solid-state defect (such as color center in diamond), a superconducting circuit, and the like, or a combination thereof. The energy differences between the two levels of each qubit quantum sensor can depend linearly on an observable of interest such as an electric field, a magnetic field, a gravitational field, temperature, strain, and the like. These observables of interest can be produced by an analyte that can include a planet, an organism (e.g., a human), an organ (e.g., a brain or a heart), a tissue (e.g., cardiac tissue), a laser, a molecule (e.g., including macromolecule such as a protein or a nucleic acid), an atom, and the like.
In an embodiment, quantum sensor 215 is an interferometer including a path that goes through the medium of interest and picks up a phase and a reference path that doesn't pick up a phase. The medium of interest can include a tissue, a cell, or any other medium that transmits light. In the case of field-quadrature displacement sensors, quantum sensors 215 can include a bosonic mode that undergoes a field-quadrature displacement and a homodyne detector used to measure this field quadrature. The bosonic mode can describe mechanical motion where the parameters coupled to mode can be proportional to a force. The bosonic mode can describe photons where the parameters coupled to the mode can be proportional to a magnetic field via Faraday-rotation after passing through the medium. The bosonic mode can describe low-energy excitations of a large number of two-level atoms where the parameters coupled to the mode can be proportional to an applied electric or magnetic field.
In an embodiment, a process for making quantum sensor network 200 that measures single linear function q(θ1, θ2, . . . , θd) includes: providing a plurality of quantum sensors 215; arranging the plurality of quantum sensors 215 in a network topology, such that each quantum sensor j is configured for measuring θj out of a set of unknown parameters θ={θ1, θ2, . . . , θd}; connecting the plurality of quantum sensors to a controller; and preparing, by the controller, the plurality of quantum sensors in a probe quantum state |Ψ> with a minimum amount of entanglement, such that the amount of entanglement is the smallest amount of entanglement that gives the same optimal measurement of the linear function q(θ) as if the amount of entanglement was not restricted. In an embodiment, the plurality of quantum sensors is arranged in a linear array. In an embodiment, the plurality of quantum sensors is arranged in a two-dimensional array. In an embodiment, the plurality of quantum sensors is arranged in a three-dimensional array. In an embodiment, the plurality of quantum sensors is qubits, interferometers, or field-quadrature displacement sensors. In an embodiment, the network topology is a star topology, a ring topology, or a mesh topology. In an embodiment, the controller is a classical computer.
It is contemplated that quantum sensor network 200 and measuring a single linear function q(θ1, θ2, . . . , θd) of unknown parameters {θ1, θ2, . . . , θd} with a quantum sensor network while using the minimum amount of entanglement can include the properties, functionality, hardware, and process steps described herein and embodied in any of the following non-exhaustive list:
Entanglement is a hallmark of quantum theory and plays an essential role in certain quantum technologies. In single-parameter metrology one seeks to determine an unknown phase θ that is independently and identically coupled to d sensors via a linear Hamiltonian Ĥ. Given a probe state {circumflex over (ρ)}, evolution under Ĥ encodes θ into {circumflex over (ρ)} where it can then be measured. If the sensors are classically correlated the ultimate attainable uncertainty is the standard quantum limit Δθ˜1/√{square root over (d)}, which can be surpassed only if the states are prepared in an entangled state. If O(d)-partite entanglement is used, the Heisenberg limit Δθ˜1/d can be achieved. Entanglement for optimal measurement has been explored in sequential measurement schemes, wherein one applies the encoding unitary multiple times in the presence of decoherence when the coupling Hamiltonian is non-linear or in reference to resource theories for metrology.
Consider the amount of entanglement required to saturate the quantum Cramér-Rao bound, which provides a lower bound of the variance of measuring an unknown quantity, in the prototypical multiparameter setting of a quantum sensor network, where d independent, unknown parameters θ (boldface denotes vectors) are each coupled to a unique quantum sensor. Specifically, consider optimally measuring a single linear function q(θ), which is an element of optimal protocols for more general quantum sensor network problems. It should be appreciated that the case of measuring one or multiple analytic functions and the case where the parameters θ are not independent reduce asymptotically to the linear problem considered here. Embodiments herein include measuring a single linear function of independent parameters.
Given the similarity of measuring a single linear function to the single-parameter case and the fact that such functions of local parameters are global properties of the system, provided all the local parameters non-trivially appear in q, one might intuit that d-partite entanglement is necessary. This intuition is reinforced by the fact that all existing optimal protocols for this problem do, in fact, make use of d-partite entanglement. However, such intuition is faulty and only holds in the case where q is approximately an average of the unknown parameters. In particular, a family of protocols can be used that saturate necessary and sufficient algebraic conditions to achieve optimal performance in this setting. Below is described via proof necessary and sufficient conditions on q for the existence of optimal protocols using at most (k<d)-partite entanglement. The more uniformly distributed q is amongst the unknown parameters, the more entanglement is required. Other resources of interest are considered, such as the number of entangling gates needed to perform these protocols and their optimization via the protocol. Note that certain probabilistic protocols fail to achieve the Heisenberg limit except for a narrow class of functions.
With regard to measuring a linear function of unknown parameters in a quantum sensor network, consider a network of d qubit quantum sensors coupled to d independent, unknown parameters θ∈d via a Hamiltonian of the form
where {circumflex over (σ)}ixyz are the Pauli operators acting on qubit i and Ĥc(s) for s∈[0,t] is any choice of time-dependent, θ-independent control Hamiltonian, potentially including coupling to an arbitrary number of ancilla. That is, Ĥc(s) accounts for any possible parameter-independent contributions to the Hamiltonian, including those acting on any extended Hilbert space with a (finite) dimension larger than that of the network of d qubit sensors directly coupled to the unknown parameters. Encode the parameters θ into a quantum state {circumflex over (ρ)} via the unitary evolution generated by a Hamiltonian of this form for a time t. Given some choices of initial probe state, control Ĥc(s), final measurement, and classical post-processing, we seek to construct an estimator for a linear combination q(θ)=α·θ of the unknown parameters, where α∈d is a set of known coefficients, and we assume without loss of generality that ∥α∥∞=|α1|. U.S. Pat. No. 10,007,885 is incorporated by reference herein in its entirety and describes a fundamental limit for the mean square error of an estimator for q is
wherein t is the total evolution time.
Eq. (2) is derived via the single-parameter quantum Cramér-Rao bound. This is surprising because, while one seeks to measure only a single quantity q(θ), d parameters control the evolution under Eq. (1), so it does not a priori satisfy conditions for use of the single-parameter quantum Cramér-Rao bound. However, one can justify its validity for our system such that one considers an infinite set of imaginary scenarios, wherein each corresponds to a choice of artificially fixing d−1 degrees of freedom and leaving only q(θ) free to vary. Under any such choice, our final quantum state depends on a single parameter q, and we can apply the single-parameter quantum Cramér-Rao bound. While this involves giving oneself information that one does not have, additional information can only reduce , and, therefore, any such choice provides a lower bound on when one does not have such information. To obtain the tightest possible bound there must be some choice of artificially fixing d−1 degrees of freedom that gives no (useful) information about q(θ). Algebraic conditions are derived that characterize such choices.
One applies the single-parameter quantum Cramér-Rao bound
wherein is the quantum Fisher information, ĝq=∂Ĥ/∂{circumflex over (q)} (the partial derivative fixes the other d−1 degrees of freedom), and the seminorm ∥ĝq∥s is the difference of the largest and smallest eigenvalues of ĝq. A choice of fixing extra degrees of freedom, yielding the tightest bound via Eq. (3), gives ∥ĝq∥s2=1/∥α∥∞2, yielding Eq. (2).
The above description justifies applying the single-parameter bound in the multiparameter scenario. The quantum Fisher information matrix (θ) provides an information-theoretic solution for constructing optimal protocols. When calculating (θ), restrict the construction to pure probe states, as the convexity of the quantum Fisher information matrix implies mixed states fail to produce optimal protocols. For pure probe states and unitary evolution for time t under the Hamiltonian in Eq. (1), it has matrix elements
where {⋅, ⋅} denotes the anti-commutator and
with ĝi=∂Ĥ/∂θi={circumflex over (σ)}iz, and Û the time-ordered exponential of Ĥ. The expectation values in Eq. (4) are taken with respect to the initial probe state.
Choosing d−1 degrees of freedom for using the single-parameter bound corresponds to a basis transformation θ→q, wherein take q1=q to be a quantity of interest, and the other arbitrary qj>1 are extra degrees of freedom. This basis transformation has a corresponding Jacobian J such that (q)=JT(θ)J. To obtain the bound in Eq. (2) and have no information about q(θ) from the extra degrees of freedom qj>1, (q) has the following properties:
Without loss of generality, |α1|=∥α∥∞. Via the inverse basis transformation q→θ, Eqs. (6)-(7) are satisfied if and only if
where assume that |α1|>|αj|∀j>1. Theorem 1 is unchanged by this assumption. The explicit derivation of Eq. (8), along with the generalization of results beyond this assumption, is described below.
The problem of function estimation is mathematically equivalent to nuisance parameters in classical and quantum estimation theory. However, embodiments of the protocols and especially their entanglement features are new.
In a family of protocols that achieve Eq. (8), a particular protocol includes preparing a pure initial state {circumflex over (ρ)}0=|Ψ(0)><Ψ(0)|, evolving po under the unitary generated by Ĥ(s) for time t, performing some positive operator-valued measurement, and computing an estimator for q from the measurement outcomes. Given {circumflex over (ρ)}0 and Ĥc(s), (θ) can be computed via Eq. (4).
Protocols use v(s) to coherently switch between probe states with different sensitivities to the unknown parameters θ and accumulate an overall sensitivity to the unknown function of interest q. In particular, consider a set of N=3d−1 one-parameter families of cat-like states:
where each family of states is labeled by a vector τ∈{0,±1}d such that
and φ∈ parameterizes individual states in the family. Here τ1=1, as any optimal protocol is sensitive to this parameter. Each probe state in Eqs. (9) and (10) is a superposition of exactly two states, referred to as branches. These states use no ancilla.
Protocols include starting in a state |Ψ(τ;0)> and using the control Hamiltonian to coherently switch between families of probe states such that the relative phase between the branches is preserved (that is, Ĥc(s) changes τ, but not φ). This can be done using finitely many CNOT and {circumflex over (σ)}x gates. Stay in the family of states |ψ(τ(n); φ) for time pnt, where pn∈[0,1] such that Σnpn=1. Here n indexes some enumeration of the families of states in T. There are three possibilities for the relative phase that qubit j induces between the two branches due to the time spent in family n. If τj(n)=0, then no relative phase is accrued because qubit j is disentangled. If τj(n)=1, the relative phase imprinted by {circumflex over (σ)}jz/2 is pnθjt, while if τj(n)=−1, the relative phase is −pnθjt. Thus, the j-th qubit always induces a relative phase of pnτ(n)θjt. Accounting for all qubits, being in family n for time pnt induces a relative phase
Given some time-dependent probe |Ψ(t)> which is in the family |ψ(τn); φ) for time pnt, the total phase ϕ accumulated between the branches is
where implicitly defined p=(p1, . . . ,pN)T, and d×N matrix T with matrix elements Tmn=m(n). If p is chosen such that Tp∝α this total phase is ∝qt. More formally, choosing p such that
achieves the saturability condition in Eq. (8), yielding a provably optimal protocol.
Any nonnegative solution (in the sense that pn≥0 ∀n) to Eq. (13) specifies a valid set of states and evolution times satisfying Eq. (8). Because the system in Eq. (13) is highly under constrained, such protocols do not necessarily use all 3d−1 families of states in .
From a solution to Eq. (13), provide a measurement scheme to extract information about q that includes: applying a sequence of {circumflex over (σ)}x and CNOT gates to the final state of a protocol to transform it into 1/√{square root over (2)}(|0>+eiqt/α1|1>)(|0 . . . 0>). Then, perform single qubit phase estimation to measure q.
Such phase estimation is not as simple as it might appear. Because one is interested in how the error scales in the t→∞ limit, a naive approach loses track of which 2π interval the phase is in. One could assume that this information is known a priori, but this is unjustified as the knowledge is of precision ˜|α1|/t, i.e., it is already within the Heisenberg limit. More realistically, starting with any t-independent prior knowledge of the unknown phase, use the phase estimation protocols to saturate Eq. (2) up to a modest constant factor.
Consider solutions from the family of protocols that involve the minimum amount of entanglement. Described is a necessary and sufficient condition on a for existence of a protocol that uses at most k-partite entanglement. The protocols above use a particular choice of controls that does not include ancilla qubits, and Theorem 1 applies to any protocol making use of a Hamiltonian described via Eq. (1).
Theorem 1. Let q(θ)=α·θ. Without loss of generality, let ∥α∥∞=|α1|. Let k∈+ so that
An optimal protocol to estimate q(θ), where the parameters θ are encoded into the probe state via unitary evolution under the Hamiltonian in Eq. (1) requires at least, but no more than, k-partite entanglement.
Theorem 1 justifies d-partite entanglement is not necessary unless |α|1 is large enough, i.e., in the case of measuring an average (αi=1/d−∀i). Using k-partite entangled states from the set of cat-like states considered above, there exists an optimal protocol, subject to the upper bound of Eq. (14). Subject to the conditions in the theorem statement, there exists no optimal protocol using at most (k−1)-partite entanglement, proving the lower bound of Eq. (14).
Part 1. Define T(k) to be the submatrix of T with all columns n such that Σm|Tmn|>k are eliminated, which enforces that any protocol derived from T(k) uses only states that are at most k-partite entangled. Define System A(k) as
Let α′=α/α1 and define System B(k) as
By the Farkas-Minkowski lemma, System A(k) has a solution if and only if System B(k) does not, so it is sufficient to show that System B(k) does not have a solution if Σj>1|αj′|≤k−1, where we used that α1′=1. This can be shown by contradiction.
Part 2. The probe state must always be maximally sensitive to the first sensor qubit, so (θ)1j only accumulates in magnitude when qubit j is entangled with the first qubit (Eq. (4) is similar to a connected correlator). Using this, satisfying the condition in Eq. (8) requires ∥α∥1/∥α∥∞>k−1.
Theorem 1 provides conditions for the existence of solutions to Eq. (13) with limited entanglement, but it is not constructive. To obtain an explicit protocol, solve the system of linear equations T(k)p=α. One might wish to minimize the size of the most-entangled state and the average entanglement used (given by weighting the size of each entangled state by the proportion of time that the state is used in the protocol). Below is shown that there exists a class of protocols that minimizes this average entanglement. These protocols are non-echoed in the sense that the contribution to the relative phase proportional to θi is always accumulated with the correct sign corresponding to sgn(αi) such that one need not echo away any sensitivity. To obtain such a solution, one can further restrict T to only include columns such that sgn(Tij)=sgn(αi) for all i,j and then solve the corresponding system of linear equations. Resources besides entanglement may be of interest and can included in a cost function ε(p), which selects certain solutions to the system of linear equations T(k)p=α. For example, if certain pairs of sensors are easier to entangle than others, due, for instance, to their relative spatial location in the network, that could be encoded into ε(p). Some optimizations can include ordering of the states used in the protocols. For example, because certain protocols involve coherently applying CNOT gates to move between different families of entangled states, and these gates may be error-prone or costly resources, one can find protocols that minimize the usage of these gates, which is described below along with potential tradeoffs between minimizing entanglement and CNOT gates.
Another approach to constructing optimal protocols is to use so-called probabilistic protocols. These protocols eschew optimal control and instead exploit the convexity of the quantum Fisher information to pick states from the families with frequencies specified by a solution to Eq. (13) in order to generate a Fisher information matrix satisfying Eq. (8). These protocols have the advantage of requiring no control but can suffer worse scaling with d than the above protocol for generic functions when the available resources are comparable. Consider a probabilistic protocol that makes use of
In view of the foregoing, it should be appreciated that maximally entangled states are not necessary for the optimal measurement of a linear function with a quantum sensor network unless the function is sufficiently uniformly supported on the unknown parameters. This result, combined with the general framework of optimizing protocols subject to practical constraints, can be used in quantum sensor networks, wherein creating large-scale entangled states may be challenging. These results are useful in more general settings, such as measurement of analytic functions, as these measurements reduce to certain embodiments herein.
With regard to being constrained to k-partite entanglement with k not sufficient to achieve optimality (for any protocol) via Theorem 1, a protocol for such a scenario includes: letting R be a partition of quantum sensors into independent sets and do not allow entanglement between sets and allow, at most, k-partite entanglement within each r∈R. Let α(r) denote a restricted to r. Pick the optimal R such that the condition of Theorem 1 is satisfied for all r; that is, ensure that within each independent set is obtained the optimal variance for the linear function restricted to that set. The result is a variance
The optimal R is a partition of the sensors into contiguous sets (assuming for simplicity that |αi|≥|αj| for i<j) such that for all r∈R, Σi∈r|αi|/maxi∈r|αi|≤k, satisfying Theorem 1. Conjecture that this protocol is optimal, and it is so if partitioning the problem into independent sets is optimal. However, one could imagine protocols that use different partitions for some fraction of the time. Intuitively, this should not improve the performance.
Finally, no optimal time-independent protocols for arbitrary linear functions exist in the literature.
Protocols include embedding the function q=α·θ into the relative phase of a probe quantum state |Ψ>:
The phase embedding algorithm is a subprotocol of the full protocol for function estimation, which involves embedding q into many copies of a quantum state to perform the robust phase estimation.
Probe states from Eqs. (9)-(10) are repeated here:
φ∈ parameterizes individual states in the family, and τ1=1. The form of these states is rigorously justified by Lemma S1 in Sec. S2. We embed the τ into a d×N (N=3d−1) matrix T with matrix elements Tmn=m(n) for some ordering of the τ.
The protocol proceeds as follows: given α∈d, normalize it such that ∥α∥∞=1; using any relevant experimental desiderata and optimization algorithm, find a nonnegative solution p to Tp=α; restrict p to its
This final state can then be measured according to the current stage of the robust phase estimation protocol, which eventually allows one to extract q with optimal scaling up to a constant factor.
Here is proved a lemma restricting the structure of the probe state for an optimal protocol.
Lemma S1. Any optimal protocol, independent of the choice of control, requires that <(t)>=0, where (t) is the time-evolved generator of the first parameter and the expectation value is taken with respect to the initial probe state. Further the probe state must be of the form
for all times s∈[0,t], where ϕ, |φ0>, |φ1> are arbitrary states on the d−1 remaining sensor qubits plus, perhaps, the arbitrary number of ancilla can be s-dependent.
Proof. Consider the expression for the matrix elements of the quantum Fisher information matrix at time t (Eq. (4)):
where the expectation values are taken with respect to the initial probe state |Ψ(0)>. Using the integral form of (t) (Eq. (5) of the main text),
wherein
and ĝ1=∝Ĥ/∝θ1 is the initial generator with respect to the first parameter. Once again, the covariance is with respect to the initial probe state |Ψ(0)>. The upper bound is
wherein the first inequality bounds the covariance as the square root of the product of the variances; the second inequality bounds the standard deviation of an operator by half the seminorm, and the final equality uses the fact that ĝ1={circumflex over (σ)}1z has seminorm 1.
Via Eq. (8), an optimal protocol has 11(θ)(t)=t2. Therefore, an optimal protocol must saturate the inequalities in Eq. (S10) and Eq. (S12). Eq. (S12) is saturated when Var[ĝ1(s)]=∥ĝ1(s)∥s=∥ĝ1∥s for all s. This holds if and only if
where |λmin> and |λmax> are the eigenstates corresponding to the minimum and maximum eigenvalues of ĝ1(s) for all s∈[0,t] and ϕ is an arbitrary phase. Given this condition, ĝ1(s) and ĝ1(s′) act identically on the state |Ψ(0)> and consequently are fully correlated when one considers the covariance of these operators with respect to the state. The Cauchy-Schwarz inequality in Eq. (S10) is immediately saturated as well.
Under this condition on the probe state, any operator in the one-parameter family ĝ1(s)=U†(s) ĝ1U(s) acts identically on |Ψ(0)>. The unitary does not change the eigenvalues, and the eigenstates are shared by all ĝ1(s). Thus, one can substitute any operator in the one-parameter family ĝ1(s)=U†(s) ĝ1U(s) for another. For such an optimal probe state,
because ĝ1∝{circumflex over (σ)}1z. Consequently, by replacing ĝ1by ĝ1(s) when acting on the probe state,
The statement of the lemma follows.
Lemma S1 holds for any optimal protocol, including those using cat-like states. It also justifies the choice of probe states and why one sets τ1=1 for all T, i.e., to maintain an equal superposition between |0> and |1> on the first qubit.
Optimality of the time-dependent protocols is proven. In particular, the Fisher information matrix condition for saturability in Eq. (8) is satisfied by solutions to Eq. (13) when protocols that use {circumflex over (σ)}x and CNOT controls to switch between families of cat-like states in . That is, the following mapping occurs between saturability conditions:
where one assumes that |α1|=|αj|∞>|aj| for all j. Text below generalizes beyond the assumption of a single maximum magnitude αj at the cost of some notational inconvenience.
Using Lemma S1, for any optimal protocol, i.e., in addition to cat-like states,
The third and fifth equalities are from the argument in the proof of Lemma S1 that one may replace ĝ1(s) with ĝ1 (and vice versa) when acting on optimal probe states. The penultimate equality is just a consequence of the commutativity of the initial generators.
Apply these general results to specific protocols. Saturating the initial Fisher information conditions in Eq. (S17) implies that one must show
Let the gates in our protocols be labeled as Ĝiwhere Ĝiis either a CNOT or {circumflex over (σ)}x gate. The gate Ĝiis applied at a time s=ti*. Then, for s∈(tk*, tk+1*), write the time-dependent state as
where |ψ(τ(0); 0) is the initial state of the protocol, φ is the relative phase between the two branches of the state that has accumulated up to time s, and, therefore, |ψ(τ(k); φ) is the state produced after applying the first k gates. Because the protocols explicitly use only {circumflex over (σ)}x and CNOT gates to move between families in , |ψ(τ(k); φ)=(|0)|χ0(k)+eiφ|1|χi(k))/√{square root over (2)}, and
time one is in the probe family |ψ(τ(i); φ), which in the protocols is pit. Thus, to satisfy the Fisher information conditions, one needs
This proves optimality of our time-dependent protocols that satisfy Tp=α/α1.
As derived above, any nonnegative solution (in the sense that pn≥0 ∀n) to the system of equations Tp=α/α1 (Eq. (13)) specifies a valid set of states and evolution times satisfying the saturability condition in Eq. (8). Because the system of equations is under constrained, such protocols do not necessarily use all 3d−1 families of states in . Here is explicitly consider two qubits. The available states are described by
By Eq. (13), an optimal protocol must satisfy
Solving in terms of p1 leads to the 1-parameter family of solutions
and pn∈[0,1] for all n. Without loss of generality, assume α1=1. Then non-negativity is achieved by
There are many solutions satisfying these constraints. There is a two-state protocol that does not require using exclusively maximally entangled states: for α2>0 (α2<0), let p1=α2 (0) so that p2=0 (−α2) and p3=1 α2 (1+α2).
Robust phase estimation protocols extract the quantity of interest q from the state
which is the final state obtained from the family of optimal protocols.
When the protocols are referred to as optimal, the protocols achieve the conditions on the quantum Fisher information matrix that allow the maximum possible quantum Fisher information with respect to the parameter q to be obtained. However, to completely specify the procedure by which one obtains the quantity q, an explicit phase estimation protocol is specified. Such a task involves that for large times or small α1=∥α∥∞, it is unclear what 2π interval the relative phase between the branches of Eq. (S33) is in. The phase estimation protocols demonstrate how to optimize resources to deal with this issue, while still saturating the single-shot bound in Eq. (2) up to a small d- and t-independent constant. In particular, such protocols reach a mean square error of
for some small (explicitly known) constant c. Prior work proves that this constant factor c2 in Eq. (2) can be reduced to, at best, π2.
Putting the final state into the form of Eq. (S33) reduces this problem to the single qubit, multipass version of the problem.
Consider dividing the total time t, which is the relevant resource in the problem, into K stages where is evolved for a time Mjδt in the j-th stage (δt is some small basic unit of time and Mj∈). Assume that there is (d,t)-independent, prior knowledge of q such that one can set ot to satisfy
In the j-th stage, using one of the protocols for a time Mjδt, prepare 2vj independent copies of the state
From now on, drop the d−1 qubit sensors in the state |0 . . . 0>, as they are irrelevant; however, it is worth noting that it is not necessary to put the state in this form before performing measurements. Then perform a single-qubit measurement on the first qubit sensor of each of these state copies, yielding 2vj measurement outcomes, which one can use to estimate q. The total time of this K stage protocol is consequently given by
Given this setup, choose single-qubit measurements and optimize the choice of vj, Mj per stage so that one can learn q bit by bit, stage by stage, in such a way that optimal scaling in d, t is still obtained (Eq. (S34)). In particular, consider making two measurements, each vj times per stage (thus explaining the factor of two introduced earlier): (i) a {circumflex over (σ)}x measurement and (ii) a {circumflex over (σ)}y measurement. These measurements each give outcomes that are Bernoulli variables (i.e., with values ∈{0,1}) with outcome probabilities
where the first two probabilities are for the {circumflex over (σ)}x measurement, and the latter two are for the {circumflex over (σ)}y measurement. Using both of these measurements allows one to resolve the two-fold degeneracy in the phase qMjδt/∥α∥∞ within a given [0,2π) interval that would arise from, e.g., a {circumflex over (σ)}x measurement alone. The observed probabilities of obtaining 0 for the {circumflex over (σ)}x and {circumflex over (σ)}y are independent random variables that converge in probability to their associated expectation values for vj→∞. These measurements are non-adaptive, which makes this particular phase estimation protocol especially appealing.
At each stage, extract an estimator {tilde over (ϕ)} of ϕ:=Mjqδt/∥α∥∞ as
where atan2 is the 2-argument arctangent with range [0,2π). In the limit vj→∞, this estimator indeed converges to ϕ, but an advantage of this phase estimation scheme lies in the correct reprocessing of data stage-by-stage so that vj can be kept (d,t)-independent. Picking Mj=2j−1 for j∈{1, . . . ,K} and optimizing over vj one can, at each stage, estimate q/∥α∥∞ with a confidence interval of size 2π/(3×2j−1) so that in each stage learn another bit of this quantity. The results of this optimization are vj that decrease linearly with the step j so that as the time spent in a stage grows, the statistics we employ shrink. It happens that one can scale K→∞ (i.e., take an asymptotic in t limit) while maintaining vK constant. The net result is a mean square error given by Eq. (S34) with c =24.26π, which is a factor of 24.26 greater than the theoretical optimal value, but with the convenient feature that the protocol uses non-adaptive measurements.
Other protocols are possible. For instance, in prior work, a similar two-step method is described for the estimation of global parameters (i.e., where the parameter is not restricted to a local neighborhood of parameter space). This protocol provides an explicit method to use some (ultimately negligible) fraction of the sensing time available to narrow down the location of the parameter q in parameter space, followed by an optimal local estimation. The explicit estimation scheme herein does not require adaptive measurements.
Theorem 1. Let q(θ)=α·θ. Without loss of generality, let ∥α∥∞=|α1|. Let k∈+ so that
An optimal protocol to estimate q(θ), where the parameters θ are encoded into the probe state via unitary evolution under the Hamiltonian in Eq. (1), involves at least, but no more than, k-partite entanglement.
Proof. The proof is divided in two parts. In Part 1, using k-partite entangled states from the set of cat-like states considered, the existence of an optimal protocol is shown, subject to the upper bound of Eq. (S40). Part 2 shows that there exists no optimal protocol using at most (k−1)-partite entanglement, proving the lower bound of Eq. (S40).
Part 1. Define T(k) as the submatrix of T with all columns n such that Σm|Tmn|>k are eliminated, which enforces that any protocol derived from T(k)uses only states that are at most k-partite entangled. Define System A(k) as
Let α′=α/α1 and define System B(k) as
By the Farkas-Minkowski lemma, System A(k) has a solution if and only if System B(k) does not. In particular, this lemma, which, geometrically, is an application of the hyperplane separation theorem is as follows:
Lemma S2 (Farkas-Minkowski). Consider the system
with A∈m×n, x∈n, and b∈m. The above system has a solution if and only if there is no solution y to
Therefore, to prove the result it is sufficient to show that System B(k) does not have a solution if Σj>1|αj′|≤k−1, where α′1=1. Assume that a solution y exists and arrive at a contradiction. Without loss of generality, assume that |yi|≥|yj+1| for all 1<j<d. Eq. (S44) implies Σj>1αj′yj<−y1. (T(k))T has a row n* given by τ(n+)=(1,0, . . . ,0), so by Eq. (S43) any solution y to System B has y1≥0. Therefore, |Σj>1αj′yj|>y1, which, by the triangle inequality, implies
Because |αj′|≤1 for all j, because Σj>1|αj′|≤k−1, and because |yj| for j>1 are ordered in descending order, the largest the left-hand-side of Eq. (S49) can be is Σj=2k|yj|, leading to
This directly contradicts Eq. (S43) for the row of T(k) given by τ=(1,−sgn(y2), . . . , −sgn(yk),0,0, . . . ).
Part 2. Using Eq. (S24), for any optimal protocol,
where recall |Ψ(s)>=Û(s)|Ψ(0)>. Because ψ(s′)|{circumflex over (τ)}1z|ψ(s′)=0 for all s′ (see Eq. (S16)), the integrand is non-zero if and only if |Ψ(s′)> is such that the first qubit is entangled with the jth. Define the indicator variable
for all j, including any possible ancilla qubits. Here, define E1=1 even though the first qubit is not entangled with itself. Further define
where E(s′) is the total number of sensor qubits entangled with the first qubit at time s′, and the upper bound comes from the assumption on the partite-ness of the probe states. Then,
Furthermore, for any optimal protocol using at most (k−1)-partite entanglement, require that
This is a contradiction, however, as the theorem statement assumed that
This concludes the proof that (k−1)-partite entanglement in any form (i.e., not just from cat-like probe states) is insufficient to generate an optimal protocol. □
The lower bound on the size of the least entangled state used in an optimal protocol is a lower bound on the average entanglement required to saturate the Fisher Information matrix conditions. Here, average entanglement refers to weighting the size of the entangled state by the proportion of time it is used in the protocol. This lower bound is simply ∥α∥1/∥α∥∞. The lower bound on the size of the most-entangled state, or the bound on instantaneous entanglement, comes from ensuring that this lower bound on average entanglement is achievable (i.e., if the instantaneous entanglement is too small at each stage, then the average entanglement required cannot be reached).
A subset of protocols, referred to as non-echoed, possess some beneficial features.
Definition S2 (Non-Echoed Protocols). Consider some α∈d encoding a linear function of interest. Let T be the matrix which describes the families of cat-like probe states described above, and let p specify a valid protocol such that p>0 and Tp=α/∥α∥∞. The protocol defined by p is non-echoed if ∀i such that pi is strictly greater than 0, sgn(Tij)∈{0,sgn(αj)}.
At any stage of a non-echoed protocol, letting the portion of the relative phase accumulated between the two branches of the probe state associated to the parameter θi be given by ciθi, two conditions must hold: (1) |ci|<|αi|; (2) sgn(ci)=sgn(αi). More intuitively, sensitivity to each parameter is accumulated “in the correct direction” at all times, such that one does not use any sort of spin echo to produce a sensitivity to the function of interest, hence the name non-echoed.
Lemma S3. Non-echoed protocols use minimum average entanglement.
Proof. Let Tp=α/∥α∥∞. Without loss of generality, assume that one has restricted p to its non-zero support and similarly deleted the columns of T that correspond to the zero support of p such that all remaining columns are actually used in the protocol for nonzero amount of time. Then
where wj=Σi|Tij| is the sum of the absolute value of the elements of the jth column of T. That is, wj represents how entangled the corresponding cat-like family of states is. But, then, clearly wTp is the average entanglement of the entire protocol. Furthermore, the second half of the proof of Theorem 1 shows that the minimum average entanglement of any optimal protocol is given by ∥α∥1/∥α∥∞ (as argued after the completion of the proof). □
The intuition behind this lemma is that if one always accumulates phase in the “correct direction,” then the total amount of entanglement used over the course of the protocol must be minimized, as any extra entanglement would lead to becoming overly sensitive to some parameter, which would involve some sort of echo in the protocol to correct.
Lemma S4. For any function encoding α, there exists a non-echoed protocol with minimum instantaneous entanglement.
Proof. Assume without loss of generality that α1=∥α∥∞=1. Also assume, for computational simplicity, that αi>1<1 (i.e., there is only a single maximal-magnitude element of α) and that αi>0∀i. These latter assumptions can easily be lifted, as described at the end of the proof.
Use the Farkas-Minkowski lemma to show that no vector y exists such that
proving the existence of a non-echoed protocol. Here, T+(k) is T restricted to non-echoed vectors (i.e., (T+(k))ijT∈{0,1}) with weight at most k, where k=┌∥α∥1┐. Assume a solution y exists. Noting that (T+(k))T has a row given by (1,0, . . . ,0), it must be that y1≥0. Further, for y to be a valid solution, we must have
Proceed with two cases. Suppose that at most k−1 elements of y are negative. Consider the row of (T+(k))T that has a 1 in the first index and exactly on the indices where yi<0 (which exists because we have sufficiently restricted the number of negative elements of y). Then (T+(k))Ty≥0 implies that
But because αi<1, this immediately implies that
which means that Eq. (S60) cannot be true, yielding a contradiction.
Now suppose that there are at least k elements of y that are negative. Let S be the set of indices corresponding to the k−1 largest, in magnitude, yi. Then the row of (T+(k))T with a 1 in the first index and precisely on the indices in S leads to the condition that
However, given the constraint that αi>1<1,
which is a contradiction.
With regard to lifting the two assumptions mentioned earlier, in the case where there exists multiple maximal elements, the same argument that generalizes the main theorem will generalize this argument. If αi<0, a protocol still exists; simply replace (T+(k))ij=1 with sgn(ai) (and leave 0s untouched).
□
Together, these lemmas prove that there exist protocols that can minimize both instantaneous entanglement (i.e., the maximum size of a cat-like state used in the protocol) and the average entanglement over the course of the entire protocol.
Another resource of potential interest is the number of entangling (CNOT) gates required to perform the protocols with a focus on the minimum entanglement protocols.
Assume ∥α∥∞=α1=1>|α2|≥|α3|≥. . . ≥|αd|. Furthermore, without loss of generality, adopt the convention that an optimal protocol specified by a p≥0 such that Tp=α begins by preparing the state described by the first column of T and evolving for time p1t, and then proceeds to the appropriate state (i.e., the one with phase p1t) in the family described by the second column, then evolving for time p2t, and so on, until eventually moving to the measurement state. If pi=0, the corresponding state is skipped and not prepared. By construction, the number of CNOT gates needed to perform this protocol is the number of gates required to generate the first state, plus the number needed to convert from the first state to the second state, and so on. Finally, one should add the number of gates needed to prepare the measurement state, which disentangles all qubits, from the final probe state. The number of gates required to move from state i to state i+1 corresponds to the number of indices of τi that are +1 but 0 in τi+1 and vice versa. In what follows, consider only the gates that are used to convert between probe states (i.e., do not consider the initial state preparation or final measurement preparation). This is physically motivated by the fact that these intermediate gates may be more difficult to perform or may be more susceptible to noise. Additionally, the main resource in which our protocols attempt to achieve Heisenberg scaling is the time that our probe states are coupled to the parameters of interest. Therefore, assuming one is interested in the value of these parameters at some given moment (and not, say, continuously), one might be free to prepare and purify the initial probe state in advance of the actual sensing task, which also justifies ignoring the initial CNOT cost.
Assume that
U.S. Pat. 10,007,885, which is incorporated by reference herein in its entirety, provides the echoing protocol that uses zero intermediate CNOT gates. It proceeds by using d exclusively maximally entangled states. Thereby, minimizing neither average nor instantaneous entanglement, but echoing away the extra sensitivity that this extra entanglement induces.
To illustrate these protocols, T and p (wherein T and p is restricted to the states that are used for a non-zero fraction of time) for the case d=8 and αi>0:
In the case of the disentangling protocol, the number of CNOTs involved depends on the ordering of the states. For example, consider instead ordering the states in the following way:
Here, the number of CNOTs involved is now (d−1)+(d−2)+. . . +1=Θ(d2). Thus, it is not only the choice of states that affects the CNOT cost of a protocol but also their ordering. Naively, finding an optimal set of states and their optimal ordering is a difficult problem, as if one finds a protocol using
While not finding a general solution to this optimization problem, numerics provide a pragmatic analysis of the cost. To begin, consider the naive approach of finding a random (non-echoed) minimum entanglement solution using d states for random problem instances and, then, using this solution set, brute-force search over all column orderings of this solution to find an optimal ordering in terms of CNOT cost. This was done for d∈[3,10] sensors with twenty random instances each. Without loss of generality, the random problem instances were taken to have all positive coefficients. Observe a CNOT cost scaling ˜d2, indicating that a random minimum entanglement solution, even with optimal ordering, does not have the linear in d scaling we would like. See
Other algorithms for finding a minimum entanglement solution with better CNOT costs may be desirable. To this end, a greedy algorithm yields a Θ(d) CNOT cost whenever it does not fail. The algorithm works by building up the full sensitivity to one parameter before switching coherently to a new state family (in this way, it is non-echoed). Consequently, each time one switches to a new state, one sensor qubit can be disentangled and never reentangled. In particular, one builds sensitivity to the parameters according to their weight in q, i.e., one builds sensitivity to parameters going from the smallest corresponding |αj| to the largest. The full algorithm is completed in at most d steps.
The greedy algorithm can fail to produce a valid protocol, as it does not enforce the condition that ∥p∥1=1. This condition can be violated for some functions, e.g., those with many coefficients with approximately equal magnitude. When it works, this algorithm succeeds in producing CNOT-efficient minimum entanglement protocols, as shown in
Independent of the algorithm used to minimize the CNOT count of an optimal protocol, there is a tradeoff between entanglement- and gate-based resources. The disentangling protocol minimizes average entanglement, but not necessarily instantaneous entanglement, and requires only O(d) intermediate entangling gates; the echoing protocol uses maximal entanglement and requires only single-particle intermediate gates. Protocols that minimize instantaneous entanglement do so at the cost of more intermediate entangling gates. Depending on the primary sources of error or the physical constraints on any given quantum sensor network implementation, one of these resources might be more important to minimize than the other.
If decoherence is more problematic than the number of entangling gates that one must perform, then minimum entanglement protocols will be preferred to the conventional protocols. Even in the case that intermediate entangling gates present more difficulties than decoherence, the protocol is useful from the perspective of understanding and appreciating the resource tradeoffs inherent to these metrological problems, as it is likely that any experimental implementation will require balancing entangling gate errors and decoherence.
Another resource-related constraint of protocols that relies on time-dependent control (whether in the form of {circumflex over (σ)}x gates, CNOT gates, or others) includes protocols that involve precise timing of the gate applications. Uncertainty in the timing leads directly to an error in the function being measured. The timing issue is a limitation of known optimal protocols for the linear function estimation.
Time-independent probabilistic protocols fail to achieve the saturability condition of Eq. (8). That is, when resources are properly accounted for, it is impossible to achieve a Fisher information matrix satisfying
for generic linear functions. Again, restrict consideration to a single maximal magnitude αj. The proof follows almost identically, with some notational overhead, when generalizing beyond this condition.
In particular, to fairly account for resources, fix a total time t to perform all stages of our protocol. Therefore, when considering a probabilistic protocol using multiple families from , assign a time tj for each state |Ψ(τj;0)> (because this does not switch between probe states using a control Hamiltonian, one does not consider an arbitrary phase) used in the protocol such that
where
One can bound the maximum of the Fisher information matrix element (θ)11 obtainable via such a probabilistic protocol as
where l(n)=1 for all n. The inequality arises due to the fact that the maximization problem on the right hand side of the inequality does not enforce that Tp=α/α1. This is not a necessary additional constraint.
Solving this optimization problem via Lagrange multipliers is straightforward. The Lagrangian is
where γ1, γ2 are Lagrange multipliers. Therefore, the system of equations includes
which can is solved to yield the solution
for pn=1/
which fails to achieve the saturability condition for j=1, unless
To generalize beyond the assumption that |α1|>|αj| for all j>1, the algebra varies. Generalizing Eq. (8), let
The assumption |α1|>|αj| for all j>1 is equivalent to assuming |L|=1. For arbitrary size L, conditions for the single-parameter bound on q(θ) to be saturable (Eqs. (6) and (7)) are:
Recall that (q)=JT(θ)J, where J is the Jacobian for the basis transformation from θ to q, q1=q is the linear function to measure, and the other qj are some other degrees of freedom we fix. Show that Eqs. (S76)-(S77) are satisfied if and only if
where λi≥0 such that Σiλi=1. If |L|=1, this reduces to Eq. (8).
Recounting how to obtain the single-parameter bound to saturate, referring to Eq. (3), a choice of basis that minimizes ∥ĝq∥2, yields the tightest possible bound on , the mean-square error of q. Our basis for d is {α(1), α(2), . . . , α(d)}, where α(1)=α. Now, J−1 has rows given by these vectors. Let {β(1), β(2), . . . , β(d)} be the basis dual to this one. That is, these vectors form the columns of J and satisfy α(i)·β(j)=δij such that
where {circumflex over (σ)}=({circumflex over (σ)}lz, . . . , {circumflex over (σ)}dz)T. Then
where β=β(1). Because the seminorm is time-independent, such that
and the tightest bound is
The first inequality is tight if either sgn(βi)=sgn(αi) or βi=0 for all i. The second is slightly more complicated to saturate. Recall L={i∥αi|=|α1|}. Then the second inequality is tight if and only if
Any solution β specifies the first column of the Jacobian J so that the conditions in Eq. (S76)-(S77) are
As α(i)·β(j)=δij, Eq. (S88) implies, vector (θ)β is proportional to α, and Eq. (S87) specifies the constant of proportionality. In particular,
Invoking Eqs. (S85)-(S86) and the condition that sgn(βi)=sgn(αi) for βi≠0, βi=λisgn(αi)/|α1|, where λi≥0 for i∈L and λi=0 for i≠L such that Σiλi=1. The individual components of Eq. (S89) imply
which, using |α1|=sgn(α1)α1 and that sgn(α1)sgn(αi)=sgn(α1)/sgn(αi) for i∈L, yields
which reduces to Eq. (8) of the main text, when |L|=1, as desired.
One can generalize the derivation of Eq. (13) to this setting of more than one maximum element of α. In particular, Lemma S1 is extended to Lemma S5.
Lemma S5. Any optimal protocol, independent of the choice of control, requires that <(t)>=0 for all j∈L and that the probe state be of the form
for all times s∈[0,t], where
and ϕ, |φ0>, |φ1> can be arbitrary and s-dependent. The addition inside the second ket of Eq. (S92) is mod 2.
Proof. Fact (1): Σi∈Lλi(sgn(αi)/sgn(αi))(θ)ij=t2 for all j∈L (by Eq. (S91)). Fact (2): |(θ)ij|≤(θ)jj for all i (by the fact that the Fisher information matrix is positive semidefinite). These facts imply that an optimal protocol must have (θ)jj=t2 for all j∈L. The fact that <(t)>=0 for all j∈L and the fact that all sensors in L must be in a cat-like state over computational basis states follows immediately via an identical calculation to the proof of Lemma S1 for each j∈L. From Eq. (S24) it follows directly that these cat-like states over the qubit sensors in L must take the form in the theorem statement in order to achieve the correct sign on the components of (θ). □
Using Lemma S5, restrict the set of states such that j(n)=sign(αj)/sgn(α1) for all j∈L and all τ(n). This is the generalization of the fact that that, when |L|=1, we require l(n)=1 for all τ(n).
In addition, given the required form of the optimal states, generalize Eq. (S25) to the condition that
which implies that, for protocols switching between states in the modified ,
where one assumes that one switches to the state labeled by T(l) at time τl*. As before, in our protocols tl+1*−tl*=plt. In addition, Σiλi=1. So an optimal protocol requires
recovering Eq. (13) for general L, with the addition that Tinj(n)=sgn(αj)/sgn(α1) for all j∈L and all n.
Generalizing the proof of Theorem 1.
The proof was provided in two parts, wherein it was shown the existence of an optimal protocol using k-partite entangled cat-like states, subject to the upper bound of the theorem statement. The second part showed that, subject to the lower bound of the theorem statement, there exists no optimal protocol using only (k−1)-partite entanglement.
The first part changes upon relaxing the assumption that |α1|>|αj| for all j>1. Given that j(n)=sgn(αj)/sgn(α1) for all j∈L and all τ(n), the first |L| rows of T(k) yield redundant equations in Eq. (19). Therefore, set {tilde over (T)}(k) as T(k) with all rows j∈L\{1} eliminated. Similarly, {tilde over (α)} is α with elements j∈L\{1} eliminated. Further, define the new system of equations, which are called System A{tilde over ( )}:
System A has a solution if and only if System à does. Proceed as in the proof above to show via the Farkas-Minkowski lemma that System à has a solution if ∥α|1/∥α∥∞≤k=⇒|α|1/∥{tilde over (α)}|∞≤k−|L|+1. The details of the proof of this part are completely identical with this substitution.
The second part of the proof can similarly be adjusted straightforwardly. In particular, to satisfy the condition of Eq. (S91), which is the generalization of Eq. (8), for j∈L we require
which implies
This in turn implies that for i,j∈L
Therefore, for all i∈L we require (θ)ii=t2. From here, arguments identical to those above apply to all i∈L, not just i=1. That is, all the probe states must always be fully entangled on the qubits in L and matrix elements (θ)ij for i∈L, j∉L can only accumulate magnitude if sensor j is also entangled with the qubits in L. Assuming the existence of an optimal protocol using (k−1)-partite entanglement, a contradiction arises in an identical way.
The processes described herein may be embodied in, and fully automated via, software code modules executed by a computing system that includes one or more general purpose computers or processors. The code modules may be stored in any type of non-transitory computer-readable medium or other computer storage device. Some or all the methods may alternatively be embodied in specialized computer hardware. In addition, the components referred to herein may be implemented in hardware, software, firmware, or a combination thereof.
Many other variations than those described herein will be apparent from this disclosure. For example, depending on the embodiment, certain acts, events, or functions of any of the algorithms described herein can be performed in a different sequence, can be added, merged, or left out altogether (e.g., not all described acts or events are necessary for the practice of the algorithms). Moreover, in certain embodiments, acts or events can be performed concurrently, e.g., through multi-threaded processing, interrupt processing, or multiple processors or processor cores or on other parallel architectures, rather than sequentially. In addition, different tasks or processes can be performed by different machines and/or computing systems that can function together.
Any logical blocks, modules, and algorithm elements described or used in connection with the embodiments disclosed herein can be implemented as electronic hardware, computer software, or combinations of both. To clearly illustrate this interchangeability of hardware and software, various illustrative components, blocks, modules, and elements have been described above generally in terms of their functionality. Whether such functionality is implemented as hardware or software depends upon the particular application and design constraints imposed on the overall system. The described functionality can be implemented in varying ways for each particular application, but such implementation decisions should not be interpreted as causing a departure from the scope of the disclosure.
The various illustrative logical blocks and modules described or used in connection with the embodiments disclosed herein can be implemented or performed by a machine, such as a processing unit or processor, a digital signal processor (DSP), an application specific integrated circuit (ASIC), a field programmable gate array (FPGA) or other programmable logic device, discrete gate or transistor logic, discrete hardware components, or any combination thereof designed to perform the functions described herein. A processor can be a microprocessor, but in the alternative, the processor can be a controller, microcontroller, or state machine, combinations of the same, or the like. A processor can include electrical circuitry configured to process computer-executable instructions. In another embodiment, a processor includes an FPGA or other programmable device that performs logic operations without processing computer-executable instructions. A processor can also be implemented as a combination of computing devices, e.g., a combination of a DSP and a microprocessor, a plurality of microprocessors, one or more microprocessors in conjunction with a DSP core, or any other such configuration. Although described herein primarily with respect to digital technology, a processor may also include primarily analog components. For example, some or all of the signal processing algorithms described herein may be implemented in analog circuitry or mixed analog and digital circuitry. A computing environment can include any type of computer system, including, but not limited to, a computer system based on a microprocessor, a mainframe computer, a digital signal processor, a portable computing device, a device controller, or a computational engine within an appliance, to name a few.
The elements of a method, process, or algorithm described in connection with the embodiments disclosed herein can be embodied directly in hardware, in a software module stored in one or more memory devices and executed by one or more processors, or in a combination of the two. A software module can reside in RAM memory, flash memory, ROM memory, EPROM memory, EEPROM memory, registers, hard disk, a removable disk, a CD-ROM, or any other form of non-transitory computer-readable storage medium, media, or physical computer storage known in the art. An example storage medium can be coupled to the processor such that the processor can read information from, and write information to, the storage medium. In the alternative, the storage medium can be integral to the processor. The storage medium can be volatile or nonvolatile.
While one or more embodiments have been shown and described, modifications and substitutions may be made thereto without departing from the spirit and scope of the invention. Accordingly, it is to be understood that the present invention has been described by way of illustrations and not limitation. Embodiments herein can be used independently or can be combined.
All ranges disclosed herein are inclusive of the endpoints, and the endpoints are independently combinable with each other. The ranges are continuous and thus contain every value and subset thereof in the range. Unless otherwise stated or contextually inapplicable, all percentages, when expressing a quantity, are weight percentages. The suffix (s) as used herein is intended to include both the singular and the plural of the term that it modifies, thereby including at least one of that term (e.g., the colorant(s) includes at least one colorants). Option, optional, or optionally means that the subsequently described event or circumstance can or cannot occur, and that the description includes instances where the event occurs and instances where it does not. As used herein, combination is inclusive of blends, mixtures, alloys, reaction products, collection of elements, and the like.
As used herein, a combination thereof refers to a combination comprising at least one of the named constituents, components, compounds, or elements, optionally together with one or more of the same class of constituents, components, compounds, or elements.
All references are incorporated herein by reference.
The use of the terms “a,” “an,” and “the” and similar referents in the context of describing the invention (especially in the context of the following claims) are to be construed to cover both the singular and the plural, unless otherwise indicated herein or clearly contradicted by context. It can further be noted that the terms first, second, primary, secondary, and the like herein do not denote any order, quantity, or importance, but rather are used to distinguish one element from another. It will also be understood that, although the terms first, second, etc. are, in some instances, used herein to describe various elements, these elements should not be limited by these terms. For example, a first current could be termed a second current, and, similarly, a second current could be termed a first current, without departing from the scope of the various described embodiments. The first current and the second current are both currents, but they are not the same condition unless explicitly stated as such.
The modifier about used in connection with a quantity is inclusive of the stated value and has the meaning dictated by the context (e.g., it includes the degree of error associated with measurement of the particular quantity). The conjunction or is used to link objects of a list or alternatives and is not disjunctive; rather the elements can be used separately or can be combined together under appropriate circumstances.
This application is a continuation-in-part and claims benefit of U.S. patent application Ser. No. 18/136,257 (filed Apr. 18, 2023), which claims priority to U.S. Provisional Patent Application Serial No. 63/363, 171 (filed Apr. 18, 2022), the disclosures of which are incorporated herein by reference in their entirety. The application claims priority to U.S. Provisional Patent Application Ser. No. 63/377,290 (filed Sep. 27, 2022) and U.S. Provisional Patent Application Ser. No.63/397,546 (filed Aug. 12, 2022), the disclosures of which are incorporated herein by reference in their entirety.
This invention was made with United States Government support from the National Institute of Standards and Technology (NIST), an agency of the United States Department of Commerce and under Agreement No. W911NF1520067 awarded by the Army Research Lab, Agreement No. W911NF1410599 awarded by the Army Research Office, and Agreement No. W911NF16-1-0082 awarded by the Intelligence Advanced Research Projects Activity (IARPA). The Government has certain rights in the invention.
Number | Date | Country | |
---|---|---|---|
63363171 | Apr 2022 | US | |
63377290 | Sep 2022 | US | |
63397546 | Aug 2022 | US |
Number | Date | Country | |
---|---|---|---|
Parent | 18136257 | Apr 2023 | US |
Child | 18232890 | US |