On the energy landscape of 3D spin Hamiltonians with topological order Sergey Bravyi (IBM Research) Jeongwan Haah (Caltech) QEC 2011 December 6, 2011 TexPoint.

Slides:



Advertisements
Similar presentations
Topological Subsystem Codes with Local Gauge Group Generators Martin Suchara in collaboration with: Sergey Bravyi and Barbara Terhal December 08, 2010.
Advertisements

Routing Complexity of Faulty Networks Omer Angel Itai Benjamini Eran Ofek Udi Wieder The Weizmann Institute of Science.
Local Hamiltonians in Quantum Computation Funding: Slovak Research and Development Agency, contract No. APVV , European Project QAP 2004-IST- FETPI-15848,
Sergey Bravyi, IBM Watson Center Robert Raussendorf, Perimeter Institute Perugia July 16, 2007 Exactly solvable models of statistical physics: applications.
Shortest Vector In A Lattice is NP-Hard to approximate
On Complexity, Sampling, and -Nets and -Samples. Range Spaces A range space is a pair, where is a ground set, it’s elements called points and is a family.
Minimum Clique Partition Problem with Constrained Weight for Interval Graphs Jianping Li Department of Mathematics Yunnan University Jointed by M.X. Chen.
Fast Algorithms For Hierarchical Range Histogram Constructions
Monte Carlo Methods and Statistical Physics
Preparing Topological States on a Quantum Computer Martin Schwarz (1), Kristan Temme (1), Frank Verstraete (1) Toby Cubitt (2), David Perez-Garcia (2)
Thermalization Algorithms: Digital vs Analogue Fernando G.S.L. Brandão University College London Joint work with Michael Kastoryano Freie Universität Berlin.
A (1+  )-Approximation Algorithm for 2-Line-Center P.K. Agarwal, C.M. Procopiuc, K.R. Varadarajan Computational Geometry 2003.
1 Finite-Length Scaling and Error Floors Abdelaziz Amraoui Andrea Montanari Ruediger Urbanke Tom Richardson.
Boris Altshuler Columbia University Anderson Localization against Adiabatic Quantum Computation Hari Krovi, Jérémie Roland NEC Laboratories America.
Andy Ferris International summer school on new trends in computational approaches for many-body systems Orford, Québec (June 2012) Multiscale Entanglement.
Quantum Error Correction Joshua Kretchmer Gautam Wilkins Eric Zhou.
CSE332: Data Abstractions Lecture 2: Math Review; Algorithm Analysis Tyler Robison Summer
Self-correcting quantum memories in 3 dimensions or (slightly) less
Chien Hsing James Wu David Gottesman Andrew Landahl.
Revealing anyonic statistics by multiphoton entanglement Jiannis K. Pachos Witlef Wieczorek Christian Schmid Nikolai Kiesel Reinhold Pohlner Harald Weinfurter.
Dept. of Computer Science Distributed Computing Group Asymptotically Optimal Mobile Ad-Hoc Routing Fabian Kuhn Roger Wattenhofer Aaron Zollinger.
On the energy landscape of 3D spin Hamiltonians with topological order Sergey Bravyi (IBM) Jeongwan Haah (Caltech) FRG Workshop, Cambridge, MA May 18,
Code and Decoder Design of LDPC Codes for Gbps Systems Jeremy Thorpe Presented to: Microsoft Research
Quantum Computing Lecture 22 Michele Mosca. Correcting Phase Errors l Suppose the environment effects error on our quantum computer, where This is a description.
Lattices for Distributed Source Coding - Reconstruction of a Linear function of Jointly Gaussian Sources -D. Krithivasan and S. Sandeep Pradhan - University.
Small Subgraphs in Random Graphs and the Power of Multiple Choices The Online Case Torsten Mütze, ETH Zürich Joint work with Reto Spöhel and Henning Thomas.
Fault-Tolerant Quantum Computation in Multi-Qubit Block Codes Todd A. Brun University of Southern California QEC 2014, Zurich, Switzerland With Ching-Yi.
Efficient Quantum State Tomography using the MERA in 1D critical system Presenter : Jong Yeon Lee (Undergraduate, Caltech)
In Search of a Magic Bottle of Error-Be-Gone Dave Bacon Caltech Department of Physics Institute for Quantum Information Decoherence errosol.
Chap.3 A Tour through Critical Phenomena Youjin Deng
Primal-Dual Meets Local Search: Approximating MST’s with Non-uniform Degree Bounds Author: Jochen Könemann R. Ravi From CMU CS 3150 Presentation by Dan.
Quantum Error Correction and Fault-Tolerance Todd A. Brun, Daniel A. Lidar, Ben Reichardt, Paolo Zanardi University of Southern California.
1 Introduction to Quantum Information Processing QIC 710 / CS 667 / PH 767 / CO 681 / AM 871 Richard Cleve DC 2117 Lecture 16 (2011)
Laying the Quantum and Classical Embedding Problems to Rest arXiv: Toby Cubitt 1, Jens Eisert 2, Michael Wolf 3 1 University of Bristol, 2 Potsdam.
Outline Review of extended ensemble methods (multi-canonical, Wang-Landau, flat-histogram, simulated tempering) Replica MC Connection to parallel tempering.
Quantum Gibbs Samplers
Thermodynamics and dynamics of systems with long range interactions David Mukamel S. Ruffo, J. Barre, A. Campa, A. Giansanti, N. Schreiber, P. de Buyl,
Uncorrectable Errors of Weight Half the Minimum Distance for Binary Linear Codes Kenji Yasunaga * Toru Fujiwara + * Kwansei Gakuin University, Japan +
The Integers. The Division Algorithms A high-school question: Compute 58/17. We can write 58 as 58 = 3 (17) + 7 This forms illustrates the answer: “3.
Introduction to Algorithms Jiafen Liu Sept
Tensor networks and the numerical study of quantum and classical systems on infinite lattices Román Orús School of Physical Sciences, The University of.
A Study of Error-Correcting Codes for Quantum Adiabatic Computing Omid Etesami Daniel Preda CS252 – Spring 2007.
Union Find ADT Data type for disjoint sets: makeSet(x): Given an element x create a singleton set that contains only this element. Return a locator/handle.
September 12, 2014 Martin Suchara Andrew Cross Jay Gambetta Supported by ARO W911NF S IMULATING AND C ORRECTING Q UBIT L EAKAGE.
InflationInflation Andrei Linde Lecture 2. Inflation as a theory of a harmonic oscillator Eternal Inflation.
A Monomial matrix formalism to describe quantum many-body states Maarten Van den Nest Max Planck Institute for Quantum Optics Montreal, October 19 th 2011.
A simple nearest-neighbour two-body Hamiltonian system for which the ground state is a universal resource for quantum computation Stephen Bartlett Terry.
Asymptotic Behavior Algorithm : Design & Analysis [2]
Fidelity of a Quantum ARQ Protocol Alexei Ashikhmin Bell Labs  Classical Automatic Repeat Request (ARQ) Protocol  Quantum Automatic Repeat Request (ARQ)
Fidelities of Quantum ARQ Protocol Alexei Ashikhmin Bell Labs  Classical Automatic Repeat Request (ARQ) Protocol  Qubits, von Neumann Measurement, Quantum.
Ground State Entanglement in 1-Dimensional Translationally-Invariant Quantum Systems Sandy Irani Computer Science Department University of California,
Approximation Algorithms based on linear programming.
Sketching complexity of graph cuts Alexandr Andoni joint work with: Robi Krauthgamer, David Woodruff.
Introduction Wireless Ad-Hoc Network  Set of transceivers communicating by radio.
Computational Physics (Lecture 10) PHY4370. Simulation Details To simulate Ising models First step is to choose a lattice. For example, we can us SC,
Ch 9.6: Liapunov’s Second Method In Section 9.3 we showed how the stability of a critical point of an almost linear system can usually be determined from.
Quantum Approximate Markov Chains and the Locality of Entanglement Spectrum Fernando G.S.L. Brandão Caltech Seefeld 2016 based on joint work with Kohtaro.
Computational Physics (Lecture 10)
sparse codes from quantum circuits
Ch9: Decision Trees 9.1 Introduction A decision tree:
Information-Theoretical Analysis of the Topological Entanglement Entropy and Multipartite correlations Kohtaro Kato (The University of Tokyo) based on.
Streaming & sampling.
Coarsening dynamics Harry Cheung 2 Nov 2017.
Stabilizer codes and a self-correcting quantum memory
3.3 Applications of Maximum Flow and Minimum Cut
Enumerating Distances Using Spanners of Bounded Degree
RS – Reed Solomon List Decoding.
Introduction Wireless Ad-Hoc Network
Adaptive Perturbation Theory: QM and Field Theory
Routing in Networks with Low Doubling Dimension
Presentation transcript:

On the energy landscape of 3D spin Hamiltonians with topological order Sergey Bravyi (IBM Research) Jeongwan Haah (Caltech) QEC 2011 December 6, 2011 TexPoint fonts used in EMF. Read the TexPoint manual before you delete this box.: A Phys.Rev.Lett. 107, (2011) and arXiv:1112.????

Main goal: Store a quantum state reliably for a macroscopic time in a presence of hardware imperfections and thermal noise without active error correction.

Towards topological self-correcting memories 2D toric code [Kitaev 97] Robust against small imperfections Constant threshold with active EC [Dennis et al 2001] No-go result for the thermal noise [Alicki, Fannes, Horodecki 2008] No-go result for all 2D stabilizer code [S.B. and Terhal 2008] No-go result for some 3D stabilizer codes [Yoshida 2011] ? Add one extra dimension to our space-time: [Alicki, Horodecki ] Most promising ideas: 2D + long range anyon-anyon interactions [Chesi et al 2009, Hamma et al 2009 ] 3D topological quantum spin glasses [Chamon 2005, Haah 2011, this work]

Encoding, storage, and decoding for memory Hamiltonians based on stabilizer codes Memory time of the 3D Cubic Code: rigorous lower bound and numerical simulation Topological quantum order, string-like logical operators, and the no-strings rule Logarithmic energy barrier for uncorrectable errors Outline

Qubits live at sites of a 2D or 3D lattice. O(1) qubits per site. Memory Hamiltonians based on stabilizer codes Hamiltonian = sum of local commuting Pauli stabilizers energy [N,k,d] error correcting code Distance d≈ L Excited states with m=1,2,3… defects

Example: 3D Cubic Code [Haah 2011 ] ZZZI IZ ZI IZ XI IX XI IX XX 2 qubits per site, 2 stabilizers per cube II Each stabilizer acts on 8 qubits

Stabilizer code Hamiltonians with TQO: previous work 2D toric code and surface codes [Kitaev 97] 2D surface codes with twists [Bombin 2010] 2D topological color codes [Bombin and Martin-Delgado 2006] 3D toric code [Castelnovo, Chamon 2007] 3D topological spin glass model [Chamon 2005] 3D models with membrane condensation [Hamma,Zanardi, Wen 2004] Bombin, Martin-Delgado 2007] 4D toric code [Alicki, Horodecki 3 ] The only example of quantum self-correction

Storage: Markovian master equation Must be local, trace preserving, completely positive Evolution starts from a ground state of H. Lindblad operators L k act on O(1) qubits and have norm O(1). Each qubit is acted on by O(1) Lindblad operators.

Davies weak coupling limit Lindblad operator transfers energy from the system to the bath (quantum jump). The spectral density obeys detailed balance: Heat bath Memory system

Decoding Syndrome measurement: perform non-destructive eigenvalue measurement for each stabilizer G a. Error correction algorithm Measured syndrome Correcting Pauli operator The net action of the decoder: is the projector onto the subspace with syndrome s A list of all measured eigenvalues is called a syndrome.

Defect = spatial location of a violated stabilizer, decoder’s task is to annihilate the defects in a way which is most likely to return the memory to its original state. Defect diagrams will be used to represent syndromes. Example: 2D surface code: Z Z X X 1 3 X-error Z-error Creates defects at squares 1,3 Creates defects at squares 2,4

Renormalization Group (RG) decoder* 1. Find connected defect clusters 2. For each connected cluster C Try to annihilate C by a Pauli operator acting inside b(C). Record the annihilation operator Increase unit of length by factor Go to the first step 3. Stop if no defects are left * J. Harrington, PhD thesis (2004), Duclos-Cianci and Poulin (2009) Measured syndrome Find the minimum enclosing box b(C).

1 2 RG decoder 1. Find connected defect clusters 2. For each connected cluster C Try to annihilate C by a Pauli operator acting inside b(C). Record the annihilation operator. 3. Stop if no defects are left. Find the minimum enclosing box b(C). Syndrome after the 1 st iteration

RG decoder Failure 1: decoder has reached the maximum unit of length, but some defects are left. The decoder stops whenever all defects have been annihilated, or when the unit of length reached the lattice size. The correcting operator is chosen as the product of all recorded annihilation operators. Failure 2: all defects have been annihilated but the correcting operator does not return the system to the original state. RG decoder can be implemented in time poly(L)

Main goal for this talk: Derive an upper bound on the worst-case storage error: Initial ground state Lindblad evolution RG decoder

Theorem 1 However, the lattice size cannot be too large: If we are willing to tolerate error ε then the memory time is at least Optimal memory time at a fixed temperature is exponential in β 2 The storage error of the 3D Cubic Code decays polynomially with the lattice size L. Degree of the polynomial is proportional to β :

The theorem only provides a lower bound on the memory time. Is this bound tight ? We observed the exponential decay: Numerical estimate the memory time: Monte-Carlo simulation probability of the successful decoding on the time-evolved state at time t.

Each data point = 400 Monte Carlo samples with fixed L and β β=5.25 β=5.1 β=4.9 β=4.7 β=4.5 β=4.3 Optimal lattice size: log(L*) as function of β Exponent in the power law as function of β log(memory time) vs linear lattice size for the 3D Cubic Code 1,000 CPU-days on Blue Gene P

Numerical test of the scaling

Main theorem: sketch of the proof

An error path implementing a Pauli operator P is a finite sequence of single-qubit Pauli errors whose combined action coincides with P. Energy cost = maximum number of defects along the path. vacuum P1P1 P2P2 PtPt Energy barrier of a Pauli operator P is the smallest integer m such that P can be implemented by an error path with energy cost m Some terminology

Errors with high energy barrier can potentially confuse the decoder. However, such errors are not likely to appear. The thermal noise is likely to generate only errors with a small energy barrier. Decoder must be able to correct them. Basic intuition behind self-correction: Lemma (storage error) Suppose the decoder corrects all errors whose energy barrier is smaller than m. Then for any constant 0<a<1 one has Boltzmann factor Entropy factor = # physical qubits = # logical qubits

Suppose we choose Then the entropy factor can be neglected: and In order to have a non-trivial bound, we need at least logarithmic energy barrier for all uncorrectable errors:

More terminology [Haah 2011] A logical string segment is a Pauli operator whose action on the vacuum creates two well-separated clusters of defects. vacuum The smallest cubic boxes enclosing the two clusters of defects are called anchors

More terminology A logical string segment is trivial iff its action on the vacuum can be reproduced by operators localized near the anchors: vacuum

No-strings rule: There exist a constant α such that any logical string segment with aspect ratio > α is trivial. Aspect ratio = Distance between the anchors Size of the acnhors 3D Cubic Code obeys the no-strings rule with α=15 [Haah 2011] No 2D stabilizer code obeys the no-strings rule [S.B., Terhal 09]

Theorem 2 Consider any topological stabilizer code Hamiltonian on a D- dimensional lattice of linear size L. Suppose the code has TQO and obeys the no-strings rule with some constant α. Then the RG decoder corrects any error with the energy barrier at most c log(L). The constant c depends only on α and D. Haah’s 3D Cubic Code: α=15. Recall that errors with energy barrier >clog(L) are exponentially suppressed due to the Boltzmann factor. We have shown that

Sketch of the proof: logarithmic lower bound on the energy barrier of logical operators

Idea 1: No-strings rule implies `localization’ of errors S E1E1 S1S1 E2E2 S2S2 E3E3 S’ E 100 A stream of single-qubit errors: Suppose however that all intermediate syndromes are sparse: the distance between any pair of defects is >>α. Accumulated error: E= E 1 E 2 · · · E 100 could be very non-local A stream of local errors cannot move isolated topologically charged defects more than distance α away (the no-strings rule). Localization: E=E loc · S where S is a stabilizer and E loc is supported on the α-neighborhood of S and S’ · · ·

Idea 1: No-strings rule implies `localization’ of errors S E1E1 S1S1 E2E2 S2S2 E3E3 S’ E 100 A stream of single-qubit errors: Accumulated error: E= E 1 E 2 · · · E 100 could be very non-local Localization: E=E loc · S where S is a stabilizer and E loc is supported on the α-neighborhood of S and S’ · · · In order for the accumulated error to have a large weight at least one of the intermediate syndromes must be non-sparse (dense)

Idea 2: scale invariance and RG methods A stream of local errors cannot move an isolated charged cluster of defects of size R by distance more than αR away. In order for the accumulated error to have a large weight at least one of the intermediate syndromes must be non-sparse (dense) 1.Define sparseness and denseness at different spatial scales. 2.Show that in order for the accumulated error to have a REALLY large weight (of order L), at least one intermediate syndrome must be dense at roughly log(L) spatial scales. 3.Show that a syndrome which is dense at all spatial scales must contain at least clog(L) defects.

Definition: a syndrome S is called sparse at level p if it can be partitioned into disjoint clusters of defects such that 1.Each cluster has diameter at most r(p)=(10 α) p, 2.Any pair of clusters merged together has diameter greater than r(p+1) Otherwise, a syndrome is called dense at level p.

Lemma (Dense syndromes are expensive) Suppose a syndrome S is dense at all levels 0,…,p. Then S contains at least p+2 defects. p e 0123 e e e e 4 sparse

Renormalization group method 0 = vacuum, S = sparse syndromes, D= dense syndromes time RG level Level-0 syndrome history. Consecutive syndromes are related by single-qubit errors. Some syndromes are sparse (S), some syndromes are dense (D). We are given an error path implementing a logical operator P which maps a ground state to an orthogonal ground state. Record intermediate syndrome after each step in the path. It defines level-0 syndrome history:

Renormalization group method 0 = vacuum, S = sparse syndromes, D= dense syndromes time RG level Level-1 syndrome history includes only dense syndromes at level-0. Level-1 errors connect consecutive syndromes at level-0.

Renormalization group method 0 = vacuum, S = sparse syndromes, D= dense syndromes time RG level Level-1 syndrome history includes only dense syndromes at level-0. Level-1 errors connect consecutive syndromes at level-0. Use level-1 sparsity to label level-1 syndromes as sparse and dense.

Renormalization group method 0 = vacuum, S = sparse states, D= dense states time RG level Level-2 syndrome history includes only dense syndromes at level-1. Level-2 errors connect consecutive syndromes at level-1.

Renormalization group method 0 = vacuum, S = sparse states, D= dense states time RG level Level-2 syndrome history includes only dense excited syndromes at level-1. Level-2 errors connect consecutive syndromes at level-1. Use level-2 sparsity to label level-2 syndromes as sparse and dense.

Renormalization group method 0 = vacuum, S = sparse syndromes, D= dense syndromes time RG level At the highest RG level the syndrome history has no intermediate syndromes. A single error at the level p max implements a logical operator p max

Key technical result: Localization of level-p errors time RG level No-strings rule can be used to `localize’ level-p errors by multiplying them by stabilizers. Localized level-p errors connecting syndromes S and S’ act on r(p)-neighborhood of S and S’. p max

Localization of level-p errors time RG level TQO implies that r(p max ) > L since any logical operator must be very non-local. Therefore p max is at least log(L). At least one syndrome must be dense at all levels. Such syndrome must contain at least log(L) defects. p max

Conclusions The 3D Cubic Code Hamiltonian provides the first example of a (partially) quantum self-correcting memory. Memory time of the encoded qubit(s) grows polynomially with the lattice size. The degree of the polynomial is proportional to the inverse temperature β. The lattice size cannot be too big: L< L* ≈ exp(β). For a fixed temperature the optimal memory time is roughly exp(β 2 )