-
Atomic diffraction by nanoholes in hexagonal boron nitride
Authors:
Eivind Kristen Osestad,
Ekaterina Zossimova,
Michael Walter,
Bodil Holst,
Johannes Fiedler
Abstract:
Fabricating patterned nanostructures with matter waves can help to realise new nanophotonic devices. However, due to dispersion effects, designing patterns with nanoscale features is challenging. Here, we consider the propagation of a helium matter wave through different holes in hexagonal boron nitride (h-BN) as a case study for the weakest dispersion interaction and the matter wave's diffraction…
▽ More
Fabricating patterned nanostructures with matter waves can help to realise new nanophotonic devices. However, due to dispersion effects, designing patterns with nanoscale features is challenging. Here, we consider the propagation of a helium matter wave through different holes in hexagonal boron nitride (h-BN) as a case study for the weakest dispersion interaction and the matter wave's diffraction as it passes through the holes. We use a quantum-mechanical model to calculate the polarisability of edge atoms around the holes, where we observe polarization ripples of enhanced and reduced polarisabilities around the holes. We use these values to calculate van der Waals dispersion coefficients for the scattered helium atoms. We find that the resulting diffraction patterns are affected by the shape and size of the holes, where the smallest holes have a radius of just $6$~Å. These results can be used to predict the resolution limits of nano-hole patterns on nanophotonic materials.
△ Less
Submitted 24 June, 2024;
originally announced June 2024.
-
Exponential Quantum One-Wayness and EFI Pairs
Authors:
Giulio Malavolta,
Tomoyuki Morimae,
Michael Walter,
Takashi Yamakawa
Abstract:
In classical cryptography, one-way functions are widely considered to be the minimal computational assumption. However, when taking quantum information into account, the situation is more nuanced. There are currently two major candidates for the minimal assumption: the search quantum generalization of one-way functions are one-way state generators (OWSG), whereas the decisional variant are EFI pai…
▽ More
In classical cryptography, one-way functions are widely considered to be the minimal computational assumption. However, when taking quantum information into account, the situation is more nuanced. There are currently two major candidates for the minimal assumption: the search quantum generalization of one-way functions are one-way state generators (OWSG), whereas the decisional variant are EFI pairs. A well-known open problem in quantum cryptography is to understand how these two primitives are related. A recent breakthrough result of Khurana and Tomer (STOC'24) shows that OWSGs imply EFI pairs, for the restricted case of pure states.
In this work, we make progress towards understanding the general case. To this end, we define the notion of inefficiently-verifiable one-way state generators (IV-OWSGs), where the verification algorithm is not required to be efficient, and show that these are precisely equivalent to EFI pairs, with an exponential loss in the reduction. Significantly, this equivalence holds also for mixed states. Thus our work establishes the following relations among these fundamental primitives of quantum cryptography: (mixed) OWSGs => (mixed) IV-OWSGs $\equiv_{\rm exp}$ EFI pairs, where $\equiv_{\rm exp}$ denotes equivalence up to exponential security of the primitives.
△ Less
Submitted 21 April, 2024;
originally announced April 2024.
-
A Computational Tsirelson's Theorem for the Value of Compiled XOR Games
Authors:
David Cui,
Giulio Malavolta,
Arthur Mehta,
Anand Natarajan,
Connor Paddock,
Simon Schmidt,
Michael Walter,
Tina Zhang
Abstract:
Nonlocal games are a foundational tool for understanding entanglement and constructing quantum protocols in settings with multiple spatially separated quantum devices. In this work, we continue the study initiated by Kalai et al. (STOC '23) of compiled nonlocal games, played between a classical verifier and a single cryptographically limited quantum device. Our main result is that the compiler pro…
▽ More
Nonlocal games are a foundational tool for understanding entanglement and constructing quantum protocols in settings with multiple spatially separated quantum devices. In this work, we continue the study initiated by Kalai et al. (STOC '23) of compiled nonlocal games, played between a classical verifier and a single cryptographically limited quantum device. Our main result is that the compiler proposed by Kalai et al. is sound for any two-player XOR game. A celebrated theorem of Tsirelson shows that for XOR games, the quantum value is exactly given by a semidefinite program, and we obtain our result by showing that the SDP upper bound holds for the compiled game up to a negligible error arising from the compilation. This answers a question raised by Natarajan and Zhang (FOCS '23), who showed soundness for the specific case of the CHSH game. Using our techniques, we obtain several additional results, including (1) tight bounds on the compiled value of parallel-repeated XOR games, (2) operator self-testing statements for any compiled XOR game, and (3) a ``nice" sum-of-squares certificate for any XOR game, from which operator rigidity is manifest.
△ Less
Submitted 27 February, 2024;
originally announced February 2024.
-
Atomic Defect-Aware Physical Design of Silicon Dangling Bond Logic on the H-Si(100)2x1 Surface
Authors:
Marcel Walter,
Jeremiah Croshaw,
Samuel Sze Hang Ng,
Konrad Walus,
Robert Wolkow,
Robert Wille
Abstract:
Although fabrication capabilities of Silicon Dangling Bonds have rapidly advanced from manual labor-driven laboratory work to automated manufacturing in just recent years, sub-nanometer substrate defects still pose a hindrance to production due to the need for atomic precision. In essence, unpassivated or missing surface atoms, contaminants, and structural deformations disturb the fabricated logic…
▽ More
Although fabrication capabilities of Silicon Dangling Bonds have rapidly advanced from manual labor-driven laboratory work to automated manufacturing in just recent years, sub-nanometer substrate defects still pose a hindrance to production due to the need for atomic precision. In essence, unpassivated or missing surface atoms, contaminants, and structural deformations disturb the fabricated logic or prevent its realization altogether. Moreover, design automation techniques in this domain have not yet adopted any defect-aware behavior to circumvent the present obstacles. In this paper, we derive a surface defect model for design automation from experimentally verified defect types that we apply to identify sensitivities in an established gate library in an effort to generate more robust designs. Furthermore, we present an automatic placement and routing algorithm that considers scanning tunneling microscope data obtained from physical experiments to lay out dot-accurate circuitry that is resilient against the presence of atomic surface defects. This culminates in a holistic evaluation on surface data of varying defect rates that enables us to quantify the severity of such defects. We project that fabrication capabilities must achieve defect rates of around 0.1 %, if charged defects can be completely eliminated, or < 0.1 %, otherwise. This realization sets the pace for future efforts to scale up this promising circuit technology.
△ Less
Submitted 17 November, 2023;
originally announced November 2023.
-
QbC: Quantum Correctness by Construction
Authors:
Anurudh Peduri,
Ina Schaefer,
Michael Walter
Abstract:
Thanks to the rapid progress and growing complexity of quantum algorithms, correctness of quantum programs has become a major concern. Pioneering research over the past years has proposed various approaches to formally verify quantum programs using proof systems such as quantum Hoare logic. All these prior approaches are post-hoc: one first implements a program and only then verifies its correctne…
▽ More
Thanks to the rapid progress and growing complexity of quantum algorithms, correctness of quantum programs has become a major concern. Pioneering research over the past years has proposed various approaches to formally verify quantum programs using proof systems such as quantum Hoare logic. All these prior approaches are post-hoc: one first implements a program and only then verifies its correctness. Here we propose Quantum Correctness by Construction (QbC): an approach to constructing quantum programs from their specification in a way that ensures correctness. We use pre- and postconditions to specify program properties, and propose sound and complete refinement rules for constructing programs in a quantum while language from their specification. We validate QbC by constructing quantum programs for idiomatic problems and patterns. We find that the approach naturally suggests how to derive program details, highlighting key design choices along the way. As such, we believe that QbC can play a role in supporting the design and taxonomization of quantum algorithms and software.
△ Less
Submitted 5 February, 2024; v1 submitted 28 July, 2023;
originally announced July 2023.
-
Public-Key Encryption with Quantum Keys
Authors:
Khashayar Barooti,
Alex B. Grilo,
Loïs Huguenin-Dumittan,
Giulio Malavolta,
Or Sattath,
Quoc-Huy Vu,
Michael Walter
Abstract:
In the framework of Impagliazzo's five worlds, a distinction is often made between two worlds, one where public-key encryption exists (Cryptomania), and one in which only one-way functions exist (MiniCrypt). However, the boundaries between these worlds can change when quantum information is taken into account. Recent work has shown that quantum variants of oblivious transfer and multi-party comput…
▽ More
In the framework of Impagliazzo's five worlds, a distinction is often made between two worlds, one where public-key encryption exists (Cryptomania), and one in which only one-way functions exist (MiniCrypt). However, the boundaries between these worlds can change when quantum information is taken into account. Recent work has shown that quantum variants of oblivious transfer and multi-party computation, both primitives that are classically in Cryptomania, can be constructed from one-way functions, placing them in the realm of quantum MiniCrypt (the so-called MiniQCrypt). This naturally raises the following question: Is it possible to construct a quantum variant of public-key encryption, which is at the heart of Cryptomania, from one-way functions or potentially weaker assumptions?
In this work, we initiate the formal study of the notion of quantum public-key encryption (qPKE), i.e., public-key encryption where keys are allowed to be quantum states. We propose new definitions of security and several constructions of qPKE based on the existence of one-way functions (OWF), or even weaker assumptions, such as pseudorandom function-like states (PRFS) and pseudorandom function-like states with proof of destruction (PRFSPD). Finally, to give a tight characterization of this primitive, we show that computational assumptions are necessary to build quantum public-key encryption. That is, we give a self-contained proof that no quantum public-key encryption scheme can provide information-theoretic security.
△ Less
Submitted 20 June, 2023; v1 submitted 13 June, 2023;
originally announced June 2023.
-
Weakening Assumptions for Publicly-Verifiable Deletion
Authors:
James Bartusek,
Dakshita Khurana,
Giulio Malavolta,
Alexander Poremba,
Michael Walter
Abstract:
We develop a simple compiler that generically adds publicly-verifiable deletion to a variety of cryptosystems. Our compiler only makes use of one-way functions (or one-way state generators, if we allow the public verification key to be quantum). Previously, similar compilers either relied on the use of indistinguishability obfuscation (Bartusek et. al., ePrint:2023/265) or almost-regular one-way f…
▽ More
We develop a simple compiler that generically adds publicly-verifiable deletion to a variety of cryptosystems. Our compiler only makes use of one-way functions (or one-way state generators, if we allow the public verification key to be quantum). Previously, similar compilers either relied on the use of indistinguishability obfuscation (Bartusek et. al., ePrint:2023/265) or almost-regular one-way functions (Bartusek, Khurana and Poremba, arXiv:2303.08676).
△ Less
Submitted 9 October, 2023; v1 submitted 19 April, 2023;
originally announced April 2023.
-
Robust Quantum Public-Key Encryption with Applications to Quantum Key Distribution
Authors:
Giulio Malavolta,
Michael Walter
Abstract:
Quantum key distribution (QKD) allows Alice and Bob to agree on a shared secret key, while communicating over a public (untrusted) quantum channel. Compared to classical key exchange, it has two main advantages: (i) The key is unconditionally hidden to the eyes of any attacker, and (ii) its security assumes only the existence of authenticated classical channels which, in practice, can be realized…
▽ More
Quantum key distribution (QKD) allows Alice and Bob to agree on a shared secret key, while communicating over a public (untrusted) quantum channel. Compared to classical key exchange, it has two main advantages: (i) The key is unconditionally hidden to the eyes of any attacker, and (ii) its security assumes only the existence of authenticated classical channels which, in practice, can be realized using Minicrypt assumptions, such as the existence of digital signatures. On the flip side, QKD protocols typically require multiple rounds of interactions, whereas classical key exchange can be realized with the minimal amount of two messages using public-key encryption. A long-standing open question is whether QKD requires more rounds of interaction than classical key exchange. In this work, we propose a two-message QKD protocol that satisfies everlasting security, assuming only the existence of quantum-secure one-way functions. That is, the shared key is unconditionally hidden, provided computational assumptions hold during the protocol execution. Our result follows from a new construction of quantum public-key encryption (QPKE) whose security, much like its classical counterpart, only relies on authenticated classical channels.
△ Less
Submitted 2 January, 2024; v1 submitted 6 April, 2023;
originally announced April 2023.
-
A Simple Construction of Quantum Public-Key Encryption from Quantum-Secure One-Way Functions
Authors:
Khashayar Barooti,
Giulio Malavolta,
Michael Walter
Abstract:
Quantum public-key encryption [Gottesman; Kawachi et al., Eurocrypt'05] generalizes public-key encryption (PKE) by allowing the public keys to be quantum states. Prior work indicated that quantum PKE can be constructed from assumptions that are potentially weaker than those needed to realize its classical counterpart. In this work, we show that quantum PKE can be constructed from any quantum-secur…
▽ More
Quantum public-key encryption [Gottesman; Kawachi et al., Eurocrypt'05] generalizes public-key encryption (PKE) by allowing the public keys to be quantum states. Prior work indicated that quantum PKE can be constructed from assumptions that are potentially weaker than those needed to realize its classical counterpart. In this work, we show that quantum PKE can be constructed from any quantum-secure one-way function. In contrast, classical PKE is believed to require more structured assumptions. Our construction is simple, uses only classical ciphertexts, and satisfies the strong notion of CCA security.
△ Less
Submitted 2 March, 2023;
originally announced March 2023.
-
Thrifty shadow estimation: re-using quantum circuits and bounding tails
Authors:
Jonas Helsen,
Michael Walter
Abstract:
Shadow estimation is a recent protocol that allows estimating exponentially many expectation values of a quantum state from ``classical shadows'', obtained by applying random quantum circuits and computational basis measurements. In this paper we study the statistical efficiency of this approach in light of near-term quantum computing. We propose a more practical variant of the protocol, thrifty s…
▽ More
Shadow estimation is a recent protocol that allows estimating exponentially many expectation values of a quantum state from ``classical shadows'', obtained by applying random quantum circuits and computational basis measurements. In this paper we study the statistical efficiency of this approach in light of near-term quantum computing. We propose a more practical variant of the protocol, thrifty shadow estimation, in which quantum circuits are reused many times instead of having to be freshly generated for each measurement. We show that reuse is maximally effective when sampling Haar random unitaries, and maximally ineffective when sampling from the Clifford group, i.e., one should not reuse circuits when performing shadow estimation with the Clifford group. We provide an efficiently simulable family of quantum circuits that interpolates between these extremes, which we believe should be used instead of the Clifford group. Finally, we consider tail bounds for shadow estimation and discuss when median-of-means estimation can be replaced with standard mean estimation.
△ Less
Submitted 24 December, 2023; v1 submitted 12 December, 2022;
originally announced December 2022.
-
(No) Quantum space-time tradeoff for USTCON
Authors:
Simon Apers,
Stacey Jeffery,
Galina Pass,
Michael Walter
Abstract:
Undirected $st$-connectivity is important both for its applications in network problems, and for its theoretical connections with logspace complexity. Classically, a long line of work led to a time-space tradeoff of $T=\tilde{O}(n^2/S)$ for any $S$ such that $S=Ω(\log (n))$ and $S=O(n^2/m)$. Surprisingly, we show that quantumly there is no nontrivial time-space tradeoff: there is a quantum algorit…
▽ More
Undirected $st$-connectivity is important both for its applications in network problems, and for its theoretical connections with logspace complexity. Classically, a long line of work led to a time-space tradeoff of $T=\tilde{O}(n^2/S)$ for any $S$ such that $S=Ω(\log (n))$ and $S=O(n^2/m)$. Surprisingly, we show that quantumly there is no nontrivial time-space tradeoff: there is a quantum algorithm that achieves both optimal time $\tilde{O}(n)$ and space $O(\log (n))$ simultaneously. This improves on previous results, which required either $O(\log (n))$ space and $\tilde{O}(n^{1.5})$ time, or $\tilde{O}(n)$ space and time. To complement this, we show that there is a nontrivial time-space tradeoff when given a lower bound on the spectral gap of a corresponding random walk.
△ Less
Submitted 30 November, 2022;
originally announced December 2022.
-
Fun with replicas: tripartitions in tensor networks and gravity
Authors:
Geoff Penington,
Michael Walter,
Freek Witteveen
Abstract:
We introduce a new correlation measure for tripartite pure states that we call $G(A:B:C)$. The quantity is symmetric with respect to the subsystems $A$, $B$, $C$, invariant under local unitaries, and is bounded from above by $\log d_A d_B$. For random tensor network states, we prove that $G(A:B:C)$ is equal to the size of the minimal tripartition of the tensor network, i.e., the logarithmic bond d…
▽ More
We introduce a new correlation measure for tripartite pure states that we call $G(A:B:C)$. The quantity is symmetric with respect to the subsystems $A$, $B$, $C$, invariant under local unitaries, and is bounded from above by $\log d_A d_B$. For random tensor network states, we prove that $G(A:B:C)$ is equal to the size of the minimal tripartition of the tensor network, i.e., the logarithmic bond dimension of the smallest cut that partitions the network into three components with $A$, $B$, and $C$. We argue that for holographic states with a fixed spatial geometry, $G(A:B:C)$ is similarly computed by the minimal area tripartition. For general holographic states, $G(A:B:C)$ is determined by the minimal area tripartition in a backreacted geometry, but a smoothed version is equal to the minimal tripartition in an unbackreacted geometry at leading order. We briefly discuss a natural family of quantities $G_n(A:B:C)$ for integer $n \geq 2$ that generalize $G=G_2$. In holography, the computation of $G_n(A:B:C)$ for $n>2$ spontaneously breaks part of a $\mathbb{Z}_n \times \mathbb{Z}_n$ replica symmetry. This prevents any naive application of the Lewkowycz-Maldacena trick in a hypothetical analytic continuation to $n=1$.
△ Less
Submitted 26 January, 2023; v1 submitted 29 November, 2022;
originally announced November 2022.
-
The minimal canonical form of a tensor network
Authors:
Arturo Acuaviva,
Visu Makam,
Harold Nieuwboer,
David Pérez-García,
Friedrich Sittner,
Michael Walter,
Freek Witteveen
Abstract:
Tensor networks have a gauge degree of freedom on the virtual degrees of freedom that are contracted. A canonical form is a choice of fixing this degree of freedom. For matrix product states, choosing a canonical form is a powerful tool, both for theoretical and numerical purposes. On the other hand, for tensor networks in dimension two or greater there is only limited understanding of the gauge s…
▽ More
Tensor networks have a gauge degree of freedom on the virtual degrees of freedom that are contracted. A canonical form is a choice of fixing this degree of freedom. For matrix product states, choosing a canonical form is a powerful tool, both for theoretical and numerical purposes. On the other hand, for tensor networks in dimension two or greater there is only limited understanding of the gauge symmetry. Here we introduce a new canonical form, the minimal canonical form, which applies to projected entangled pair states (PEPS) in any dimension, and prove a corresponding fundamental theorem. Already for matrix product states this gives a new canonical form, while in higher dimensions it is the first rigorous definition of a canonical form valid for any choice of tensor. We show that two tensors have the same minimal canonical forms if and only if they are gauge equivalent up to taking limits; moreover, this is the case if and only if they give the same quantum state for any geometry. In particular, this implies that the latter problem is decidable - in contrast to the well-known undecidability for PEPS on grids. We also provide rigorous algorithms for computing minimal canonical forms. To achieve this we draw on geometric invariant theory and recent progress in theoretical computer science in non-commutative group optimization.
△ Less
Submitted 28 September, 2022;
originally announced September 2022.
-
Random tensor networks with nontrivial links
Authors:
Newton Cheng,
Cécilia Lancien,
Geoff Penington,
Michael Walter,
Freek Witteveen
Abstract:
Random tensor networks are a powerful toy model for understanding the entanglement structure of holographic quantum gravity. However, unlike holographic quantum gravity, their entanglement spectra are flat. It has therefore been argued that a better model consists of random tensor networks with link states that are not maximally entangled, i.e., have nontrivial spectra. In this work, we initiate a…
▽ More
Random tensor networks are a powerful toy model for understanding the entanglement structure of holographic quantum gravity. However, unlike holographic quantum gravity, their entanglement spectra are flat. It has therefore been argued that a better model consists of random tensor networks with link states that are not maximally entangled, i.e., have nontrivial spectra. In this work, we initiate a systematic study of the entanglement properties of these networks. We employ tools from free probability, random matrix theory, and one-shot quantum information theory to study random tensor networks with bounded and unbounded variation in link spectra, and in cases where a subsystem has one or multiple minimal cuts. If the link states have bounded spectral variation, the limiting entanglement spectrum of a subsystem with two minimal cuts can be expressed as a free product of the entanglement spectra of each cut, along with a Marchenko-Pastur distribution. For a class of states with unbounded spectral variation, analogous to semiclassical states in quantum gravity, we relate the limiting entanglement spectrum of a subsystem with two minimal cuts to the distribution of the minimal entanglement across the two cuts. In doing so, we draw connections to previous work on split transfer protocols, entanglement negativity in random tensor networks, and Euclidean path integrals in quantum gravity.
△ Less
Submitted 21 June, 2022;
originally announced June 2022.
-
Near optimal sample complexity for matrix and tensor normal models via geodesic convexity
Authors:
Cole Franks,
Rafael Oliveira,
Akshay Ramachandran,
Michael Walter
Abstract:
The matrix normal model, the family of Gaussian matrix-variate distributions whose covariance matrix is the Kronecker product of two lower dimensional factors, is frequently used to model matrix-variate data. The tensor normal model generalizes this family to Kronecker products of three or more factors. We study the estimation of the Kronecker factors of the covariance matrix in the matrix and ten…
▽ More
The matrix normal model, the family of Gaussian matrix-variate distributions whose covariance matrix is the Kronecker product of two lower dimensional factors, is frequently used to model matrix-variate data. The tensor normal model generalizes this family to Kronecker products of three or more factors. We study the estimation of the Kronecker factors of the covariance matrix in the matrix and tensor models. We show nonasymptotic bounds for the error achieved by the maximum likelihood estimator (MLE) in several natural metrics. In contrast to existing bounds, our results do not rely on the factors being well-conditioned or sparse. For the matrix normal model, all our bounds are minimax optimal up to logarithmic factors, and for the tensor normal model our bound for the largest factor and overall covariance matrix are minimax optimal up to constant factors provided there are enough samples for any estimator to obtain constant Frobenius error. In the same regimes as our sample complexity bounds, we show that an iterative procedure to compute the MLE known as the flip-flop algorithm converges linearly with high probability. Our main tool is geodesic strong convexity in the geometry on positive-definite matrices induced by the Fisher information metric. This strong convexity is determined by the expansion of certain random quantum channels. We also provide numerical evidence that combining the flip-flop algorithm with a simple shrinkage estimator can improve performance in the undersampled regime.
△ Less
Submitted 11 November, 2021; v1 submitted 14 October, 2021;
originally announced October 2021.
-
Effective screening of medium-assisted Van der Waals interactions between embedded particles
Authors:
Johannes Fiedler,
Michael Walter,
Stefan Yoshi Buhmann
Abstract:
The effect of an implicit medium on dispersive interactions of particle pairs is discussed and simple expressions for the correction relative to vacuum are derived. We show that a single point Gauss quadrature leads to the intuitive result that the vacuum van der Waals $C_6$ coefficient is screened by the permittivity squared of the environment evaluated near to the resonance frequencies of the in…
▽ More
The effect of an implicit medium on dispersive interactions of particle pairs is discussed and simple expressions for the correction relative to vacuum are derived. We show that a single point Gauss quadrature leads to the intuitive result that the vacuum van der Waals $C_6$ coefficient is screened by the permittivity squared of the environment evaluated near to the resonance frequencies of the interacting particles. This approximation should be particularly relevant if the medium is transparent at these frequencies. In the manuscript, we provide simple models and sets of parameters for commonly used solvents, atoms and small molecules.
△ Less
Submitted 2 February, 2021;
originally announced February 2021.
-
Quantum Gravity in the Lab: Teleportation by Size and Traversable Wormholes, Part II
Authors:
Sepehr Nezami,
Henry W. Lin,
Adam R. Brown,
Hrant Gharibyan,
Stefan Leichenauer,
Grant Salton,
Leonard Susskind,
Brian Swingle,
Michael Walter
Abstract:
In [1] we discussed how quantum gravity may be simulated using quantum devices and gave a specific proposal -- teleportation by size and the phenomenon of size-winding. Here we elaborate on what it means to do 'Quantum Gravity in the Lab' and how size-winding connects to bulk gravitational physics and traversable wormholes. Perfect size-winding is a remarkable, fine-grained property of the size wa…
▽ More
In [1] we discussed how quantum gravity may be simulated using quantum devices and gave a specific proposal -- teleportation by size and the phenomenon of size-winding. Here we elaborate on what it means to do 'Quantum Gravity in the Lab' and how size-winding connects to bulk gravitational physics and traversable wormholes. Perfect size-winding is a remarkable, fine-grained property of the size wavefunction of an operator; we show from a bulk calculation that this property must hold for quantum systems with a nearly-AdS_2 bulk. We then examine in detail teleportation by size in three systems: the Sachdev-Ye-Kitaev model, random matrices, and spin chains, and discuss prospects for realizing these phenomena in near-term quantum devices.
△ Less
Submitted 1 February, 2021;
originally announced February 2021.
-
Holographic entanglement negativity and replica symmetry breaking
Authors:
Xi Dong,
Xiao-Liang Qi,
Michael Walter
Abstract:
Since the work of Ryu and Takayanagi, deep connections between quantum entanglement and spacetime geometry have been revealed. The negative eigenvalues of the partial transpose of a bipartite density operator is a useful diagnostic of entanglement. In this paper, we discuss the properties of the associated entanglement negativity and its Rényi generalizations in holographic duality. We first revie…
▽ More
Since the work of Ryu and Takayanagi, deep connections between quantum entanglement and spacetime geometry have been revealed. The negative eigenvalues of the partial transpose of a bipartite density operator is a useful diagnostic of entanglement. In this paper, we discuss the properties of the associated entanglement negativity and its Rényi generalizations in holographic duality. We first review the definition of the Rényi negativities, which contain the familiar logarithmic negativity as a special case. We then study these quantities in the random tensor network model and rigorously derive their large bond dimension asymptotics. Finally, we study entanglement negativity in holographic theories with a gravity dual, where we find that Rényi negativities are often dominated by bulk solutions that break the replica symmetry. From these replica symmetry breaking solutions, we derive general expressions for Rényi negativities and their special limits including the logarithmic negativity. In fixed-area states, these general expressions simplify dramatically and agree precisely with our results in the random tensor network model. This provides a concrete setting for further studying the implications of replica symmetry breaking in holography.
△ Less
Submitted 7 June, 2021; v1 submitted 26 January, 2021;
originally announced January 2021.
-
A converse to Lieb-Robinson bounds in one dimension using index theory
Authors:
Daniel Ranard,
Michael Walter,
Freek Witteveen
Abstract:
Unitary dynamics with a strict causal cone (or "light cone") have been studied extensively, under the name of quantum cellular automata (QCAs). In particular, QCAs in one dimension have been completely classified by an index theory. Physical systems often exhibit only approximate causal cones; Hamiltonian evolutions on the lattice satisfy Lieb-Robinson bounds rather than strict locality. This moti…
▽ More
Unitary dynamics with a strict causal cone (or "light cone") have been studied extensively, under the name of quantum cellular automata (QCAs). In particular, QCAs in one dimension have been completely classified by an index theory. Physical systems often exhibit only approximate causal cones; Hamiltonian evolutions on the lattice satisfy Lieb-Robinson bounds rather than strict locality. This motivates us to study approximately locality preserving unitaries (ALPUs). We show that the index theory is robust and completely extends to one-dimensional ALPUs. As a consequence, we achieve a converse to the Lieb-Robinson bounds: any ALPU of index zero can be exactly generated by some time-dependent, quasi-local Hamiltonian in constant time. For the special case of finite chains with open boundaries, any unitary satisfying the Lieb-Robinson bound may be generated by such a Hamiltonian. We also discuss some results on the stability of operator algebras which may be of independent interest.
△ Less
Submitted 15 March, 2022; v1 submitted 1 December, 2020;
originally announced December 2020.
-
Matchgate benchmarking: Scalable benchmarking of a continuous family of many-qubit gates
Authors:
Jonas Helsen,
Sepehr Nezami,
Matthew Reagor,
Michael Walter
Abstract:
We propose a method to reliably and efficiently extract the fidelity of many-qubit quantum circuits composed of continuously parametrized two-qubit gates called matchgates. This method, which we call matchgate benchmarking, relies on advanced techniques from randomized benchmarking as well as insights from the representation theory of matchgate circuits. We argue the formal correctness and scalabi…
▽ More
We propose a method to reliably and efficiently extract the fidelity of many-qubit quantum circuits composed of continuously parametrized two-qubit gates called matchgates. This method, which we call matchgate benchmarking, relies on advanced techniques from randomized benchmarking as well as insights from the representation theory of matchgate circuits. We argue the formal correctness and scalability of the protocol, and moreover deploy it to estimate the performance of matchgate circuits generated by two-qubit XY spin interactions on a quantum processor.
△ Less
Submitted 15 February, 2022; v1 submitted 25 November, 2020;
originally announced November 2020.
-
Quantum algorithms for matrix scaling and matrix balancing
Authors:
Joran van Apeldoorn,
Sander Gribling,
Yinan Li,
Harold Nieuwboer,
Michael Walter,
Ronald de Wolf
Abstract:
Matrix scaling and matrix balancing are two basic linear-algebraic problems with a wide variety of applications, such as approximating the permanent, and pre-conditioning linear systems to make them more numerically stable. We study the power and limitations of quantum algorithms for these problems.
We provide quantum implementations of two classical (in both senses of the word) methods: Sinkhor…
▽ More
Matrix scaling and matrix balancing are two basic linear-algebraic problems with a wide variety of applications, such as approximating the permanent, and pre-conditioning linear systems to make them more numerically stable. We study the power and limitations of quantum algorithms for these problems.
We provide quantum implementations of two classical (in both senses of the word) methods: Sinkhorn's algorithm for matrix scaling and Osborne's algorithm for matrix balancing. Using amplitude estimation as our main tool, our quantum implementations both run in time $\tilde O(\sqrt{mn}/\varepsilon^4)$ for scaling or balancing an $n \times n$ matrix (given by an oracle) with $m$ non-zero entries to within $\ell_1$-error $\varepsilon$. Their classical analogs use time $\tilde O(m/\varepsilon^2)$, and every classical algorithm for scaling or balancing with small constant $\varepsilon$ requires $Ω(m)$ queries to the entries of the input matrix. We thus achieve a polynomial speed-up in terms of $n$, at the expense of a worse polynomial dependence on the obtained $\ell_1$-error $\varepsilon$. We emphasize that even for constant $\varepsilon$ these problems are already non-trivial (and relevant in applications).
Along the way, we extend the classical analysis of Sinkhorn's and Osborne's algorithm to allow for errors in the computation of marginals. We also adapt an improved analysis of Sinkhorn's algorithm for entrywise-positive matrices to the $\ell_1$-setting, leading to an $\tilde O(n^{1.5}/\varepsilon^3)$-time quantum algorithm for $\varepsilon$-$\ell_1$-scaling in this case.
We also prove a lower bound, showing that our quantum algorithm for matrix scaling is essentially optimal for constant $\varepsilon$: every quantum algorithm for matrix scaling that achieves a constant $\ell_1$-error with respect to uniform marginals needs to make at least $Ω(\sqrt{mn})$ queries.
△ Less
Submitted 25 November, 2020;
originally announced November 2020.
-
Minimal length in an orbit closure as a semiclassical limit
Authors:
Cole Franks,
Michael Walter
Abstract:
Consider the action of a connected complex reductive group on a finite-dimensional vector space. A fundamental result in invariant theory states that the orbit closure of a vector v is separated from the origin if and only if some homogeneous invariant polynomial is nonzero on v, i.e. v is not in the null cone. Thus, efficiently finding the minimum distance between the orbit closure and the origin…
▽ More
Consider the action of a connected complex reductive group on a finite-dimensional vector space. A fundamental result in invariant theory states that the orbit closure of a vector v is separated from the origin if and only if some homogeneous invariant polynomial is nonzero on v, i.e. v is not in the null cone. Thus, efficiently finding the minimum distance between the orbit closure and the origin can lead to deterministic algorithms for null cone membership, an important polynomial identity testing problem including the non-commutative Edmonds problem. This connection to optimization has recently led to efficient algorithms for many problems in invariant theory.
Here we explore a refinement of the famous duality between orbit closures and invariant polynomials, which holds that the following two quantities coincide: (1) the logarithm of the Euclidean distance between the orbit closure and the origin and (2) the rate of exponential growth of the 'invariant part' of $v^{\otimes k}$ in the semiclassical limit as k tends to infinity. This result can be deduced from work of S. Zhang (Geometric reductivity at Archimedean places, 1994), which uses sophisticated tools in arithmetic geometry. We provide a new and independent elementary proof inspired by the Fourier-analytic proof of the local central limit theorem. We generalize the result to projections onto highest weight vectors and isotypical components, and explore connections between such semiclassical limits and the asymptotic behavior of multiplicities in representation theory, large deviations theory in classical and quantum statistics, and the Jacobian conjecture as reformulated by Mathieu. Our formulas imply that they can be computed, in many cases efficiently, to arbitrary precision.
△ Less
Submitted 24 October, 2022; v1 submitted 30 April, 2020;
originally announced April 2020.
-
Bosonic entanglement renormalization circuits from wavelet theory
Authors:
Freek Witteveen,
Michael Walter
Abstract:
Entanglement renormalization is a unitary real-space renormalization scheme. The corresponding quantum circuits or tensor networks are known as MERA, and they are particularly well-suited to describing quantum systems at criticality. In this work we show how to construct Gaussian bosonic quantum circuits that implement entanglement renormalization for ground states of arbitrary free bosonic chains…
▽ More
Entanglement renormalization is a unitary real-space renormalization scheme. The corresponding quantum circuits or tensor networks are known as MERA, and they are particularly well-suited to describing quantum systems at criticality. In this work we show how to construct Gaussian bosonic quantum circuits that implement entanglement renormalization for ground states of arbitrary free bosonic chains. The construction is based on wavelet theory, and the dispersion relation of the Hamiltonian is translated into a filter design problem. We give a general algorithm that approximately solves this design problem and provide an approximation theory that relates the properties of the filters to the accuracy of the corresponding quantum circuits. Finally, we explain how the continuum limit (a free bosonic quantum field) emerges naturally from the wavelet construction.
△ Less
Submitted 24 June, 2021; v1 submitted 24 April, 2020;
originally announced April 2020.
-
Witnessing Entanglement in Experiments with Correlated Noise
Authors:
Bas Dirkse,
Matteo Pompili,
Ronald Hanson,
Michael Walter,
Stephanie Wehner
Abstract:
The purpose of an entanglement witness experiment is to certify the creation of an entangled state from a finite number of trials. The statistical confidence of such an experiment is typically expressed as the number of observed standard deviations of witness violations. This method implicitly assumes that the noise is well-behaved so that the central limit theorem applies. In this work, we propos…
▽ More
The purpose of an entanglement witness experiment is to certify the creation of an entangled state from a finite number of trials. The statistical confidence of such an experiment is typically expressed as the number of observed standard deviations of witness violations. This method implicitly assumes that the noise is well-behaved so that the central limit theorem applies. In this work, we propose two methods to analyze witness experiments where the states can be subject to arbitrarily correlated noise. Our first method is a rejection experiment, in which we certify the creation of entanglement by rejecting the hypothesis that the experiment can only produce separable states. We quantify the statistical confidence by a p-value, which can be interpreted as the likelihood that the observed data is consistent with the hypothesis that only separable states can be produced. Hence a small p-value implies large confidence in the witnessed entanglement. The method applies to general witness experiments and can also be used to witness genuine multipartite entanglement. Our second method is an estimation experiment, in which we estimate and construct confidence intervals for the average witness value. This confidence interval is statistically rigorous in the presence of correlated noise. The method applies to general estimation problems, including fidelity estimation. To account for systematic measurement and random setting generation errors, our model takes into account device imperfections and we show how this affects both methods of statistical analysis. Finally, we illustrate the use of our methods with detailed examples based on a simulation of NV centers.
△ Less
Submitted 28 April, 2020; v1 submitted 27 February, 2020;
originally announced February 2020.
-
Hypergraph min-cuts from quantum entropies
Authors:
Michael Walter,
Freek Witteveen
Abstract:
The min-cut function of weighted hypergraphs and the von Neumann entropy of pure quantum states are both symmetric submodular functions. In this note, we explain this coincidence by proving that the min-cut function of any weighted hypergraph can be approximated (up to an overall rescaling) by the entropies of quantum states known as stabilizer states. This implies that the min-cuts of hypergraphs…
▽ More
The min-cut function of weighted hypergraphs and the von Neumann entropy of pure quantum states are both symmetric submodular functions. In this note, we explain this coincidence by proving that the min-cut function of any weighted hypergraph can be approximated (up to an overall rescaling) by the entropies of quantum states known as stabilizer states. This implies that the min-cuts of hypergraphs are constrained by quantum entropy inequalities, and it shows that the recently defined hypergraph cones are contained in the quantum stabilizer entropy cones, as has been conjectured in the recent literature.
△ Less
Submitted 6 September, 2021; v1 submitted 27 February, 2020;
originally announced February 2020.
-
Quantum Gravity in the Lab: Teleportation by Size and Traversable Wormholes
Authors:
Adam R. Brown,
Hrant Gharibyan,
Stefan Leichenauer,
Henry W. Lin,
Sepehr Nezami,
Grant Salton,
Leonard Susskind,
Brian Swingle,
Michael Walter
Abstract:
With the long-term goal of studying models of quantum gravity in the lab, we propose holographic teleportation protocols that can be readily executed in table-top experiments. These protocols exhibit similar behavior to that seen in the recent traversable wormhole constructions of [1,2]: information that is scrambled into one half of an entangled system will, following a weak coupling between the…
▽ More
With the long-term goal of studying models of quantum gravity in the lab, we propose holographic teleportation protocols that can be readily executed in table-top experiments. These protocols exhibit similar behavior to that seen in the recent traversable wormhole constructions of [1,2]: information that is scrambled into one half of an entangled system will, following a weak coupling between the two halves, unscramble into the other half. We introduce the concept of teleportation by size to capture how the physics of operator-size growth naturally leads to information transmission. The transmission of a signal through a semi-classical holographic wormhole corresponds to a rather special property of the operator-size distribution we call size winding. For more general systems (which may not have a clean emergent geometry), we argue that imperfect size winding is a generalization of the traversable wormhole phenomenon. In addition, a form of signalling continues to function at high temperature and at large times for generic chaotic systems, even though it does not correspond to a signal going through a geometrical wormhole, but rather to an interference effect involving macroscopically different emergent geometries. Finally, we outline implementations feasible with current technology in two experimental platforms: Rydberg atom arrays and trapped ions.
△ Less
Submitted 1 February, 2021; v1 submitted 14 November, 2019;
originally announced November 2019.
-
Quantum Brascamp-Lieb Dualities
Authors:
Mario Berta,
David Sutter,
Michael Walter
Abstract:
Brascamp-Lieb inequalities are entropy inequalities which have a dual formulation as generalized Young inequalities. In this work, we introduce a fully quantum version of this duality, relating quantum relative entropy inequalities to matrix exponential inequalities of Young type. We demonstrate this novel duality by means of examples from quantum information theory -- including entropic uncertain…
▽ More
Brascamp-Lieb inequalities are entropy inequalities which have a dual formulation as generalized Young inequalities. In this work, we introduce a fully quantum version of this duality, relating quantum relative entropy inequalities to matrix exponential inequalities of Young type. We demonstrate this novel duality by means of examples from quantum information theory -- including entropic uncertainty relations, strong data-processing inequalities, super-additivity inequalities, and many more. As an application we find novel uncertainty relations for Gaussian quantum operations that can be interpreted as quantum duals of the well-known family of `geometric' Brascamp-Lieb inequalities.
△ Less
Submitted 20 February, 2023; v1 submitted 5 September, 2019;
originally announced September 2019.
-
Dispersion forces in inhomogeneous planarly layered media: A one-dimensional model for effective polarisabilities
Authors:
Johannes Fiedler,
Fabian Spallek,
Priyadarshini Thiyam,
Clas Persson,
Mathias Boström,
Michael Walter,
Stefan Yoshi Buhmann
Abstract:
Dispersion forces such as van der Waals forces between two microscopic particles, the Casimir--Polder forces between a particle and a macroscopic object or the Casimir force between two dielectric objects are well studied in vacuum. However, in realistic situations the interacting objects are often embedded in an environmental medium. Such a solvent influences the induced dipole interaction. With…
▽ More
Dispersion forces such as van der Waals forces between two microscopic particles, the Casimir--Polder forces between a particle and a macroscopic object or the Casimir force between two dielectric objects are well studied in vacuum. However, in realistic situations the interacting objects are often embedded in an environmental medium. Such a solvent influences the induced dipole interaction. With the framework of macroscopic quantum electrodynamics, these interactions are mediated via an exchange of virtual photons. Via this method the impact of a homogeneous solvent medium can be expressed as local-field corrections leading to excess polarisabilities which have previously been derived for hard boundary conditions. In order to develop a more realistic description, we investigate on a one-dimensional analog system illustrating the influence of a continuous dielectric profile.
△ Less
Submitted 4 June, 2019;
originally announced June 2019.
-
Quantum circuit approximations and entanglement renormalization for the Dirac field in 1+1 dimensions
Authors:
Freek Witteveen,
Volkher Scholz,
Brian Swingle,
Michael Walter
Abstract:
The multiscale entanglement renormalization ansatz describes quantum many-body states by a hierarchical entanglement structure organized by length scale. Numerically, it has been demonstrated to capture critical lattice models and the data of the corresponding conformal field theories with high accuracy. However, a rigorous understanding of its success and precise relation to the continuum is stil…
▽ More
The multiscale entanglement renormalization ansatz describes quantum many-body states by a hierarchical entanglement structure organized by length scale. Numerically, it has been demonstrated to capture critical lattice models and the data of the corresponding conformal field theories with high accuracy. However, a rigorous understanding of its success and precise relation to the continuum is still lacking. To address this challenge, we provide an explicit construction of entanglement-renormalization quantum circuits that rigorously approximate correlation functions of the massless Dirac conformal field theory. We directly target the continuum theory: discreteness is introduced by our choice of how to probe the system, not by any underlying short-distance lattice regulator. To achieve this, we use multiresolution analysis from wavelet theory to obtain an approximation scheme and to implement entanglement renormalization in a natural way. This could be a starting point for constructing quantum circuit approximations for more general conformal field theories.
△ Less
Submitted 30 November, 2021; v1 submitted 21 May, 2019;
originally announced May 2019.
-
Asymptotic performance of port-based teleportation
Authors:
Matthias Christandl,
Felix Leditzky,
Christian Majenz,
Graeme Smith,
Florian Speelman,
Michael Walter
Abstract:
Quantum teleportation is one of the fundamental building blocks of quantum Shannon theory. While ordinary teleportation is simple and efficient, port-based teleportation (PBT) enables applications such as universal programmable quantum processors, instantaneous non-local quantum computation and attacks on position-based quantum cryptography. In this work, we determine the fundamental limit on the…
▽ More
Quantum teleportation is one of the fundamental building blocks of quantum Shannon theory. While ordinary teleportation is simple and efficient, port-based teleportation (PBT) enables applications such as universal programmable quantum processors, instantaneous non-local quantum computation and attacks on position-based quantum cryptography. In this work, we determine the fundamental limit on the performance of PBT: for arbitrary fixed input dimension and a large number $N$ of ports, the error of the optimal protocol is proportional to the inverse square of $N$. We prove this by deriving an achievability bound, obtained by relating the corresponding optimization problem to the lowest Dirichlet eigenvalue of the Laplacian on the ordered simplex. We also give an improved converse bound of matching order in the number of ports. In addition, we determine the leading-order asymptotics of PBT variants defined in terms of maximally entangled resource states. The proofs of these results rely on connecting recently-derived representation-theoretic formulas to random matrix theory. Along the way, we refine a convergence result for the fluctuations of the Schur-Weyl distribution by Johansson, which might be of independent interest.
△ Less
Submitted 10 December, 2019; v1 submitted 27 September, 2018;
originally announced September 2018.
-
A Quantum Multiparty Packing Lemma and the Relay Channel
Authors:
Dawei Ding,
Hrant Gharibyan,
Patrick Hayden,
Michael Walter
Abstract:
Optimally encoding classical information in a quantum system is one of the oldest and most fundamental challenges of quantum information theory. Holevo's bound places a hard upper limit on such encodings, while the Holevo-Schumacher-Westmoreland (HSW) theorem addresses the question of how many classical messages can be "packed" into a given quantum system. In this article, we use Sen's recent quan…
▽ More
Optimally encoding classical information in a quantum system is one of the oldest and most fundamental challenges of quantum information theory. Holevo's bound places a hard upper limit on such encodings, while the Holevo-Schumacher-Westmoreland (HSW) theorem addresses the question of how many classical messages can be "packed" into a given quantum system. In this article, we use Sen's recent quantum joint typicality results to prove a one-shot multiparty quantum packing lemma generalizing the HSW theorem. The lemma is designed to be easily applicable in many network communication scenarios. As an illustration, we use it to straightforwardly obtain quantum generalizations of well-known classical coding schemes for the relay channel: multihop, coherent multihop, decode-forward, and partial decode-forward. We provide both finite blocklength and asymptotic results, the latter matching existing classical formulas. Given the key role of the classical packing lemma in network information theory, our packing lemma should help open the field to direct quantum generalization.
△ Less
Submitted 26 May, 2020; v1 submitted 26 September, 2018;
originally announced September 2018.
-
Bit Threads and Holographic Monogamy
Authors:
Shawn X. Cui,
Patrick Hayden,
Temple He,
Matthew Headrick,
Bogdan Stoica,
Michael Walter
Abstract:
Bit threads provide an alternative description of holographic entanglement, replacing the Ryu-Takayanagi minimal surface with bulk curves connecting pairs of boundary points. We use bit threads to prove the monogamy of mutual information (MMI) property of holographic entanglement entropies. This is accomplished using the concept of a so-called multicommodity flow, adapted from the network setting,…
▽ More
Bit threads provide an alternative description of holographic entanglement, replacing the Ryu-Takayanagi minimal surface with bulk curves connecting pairs of boundary points. We use bit threads to prove the monogamy of mutual information (MMI) property of holographic entanglement entropies. This is accomplished using the concept of a so-called multicommodity flow, adapted from the network setting, and tools from the theory of convex optimization. Based on the bit thread picture, we conjecture a general ansatz for a holographic state, involving only bipartite and perfect-tensor type entanglement, for any decomposition of the boundary into four regions. We also give new proofs of analogous theorems on networks.
△ Less
Submitted 28 June, 2019; v1 submitted 15 August, 2018;
originally announced August 2018.
-
Ab-initio wave-length dependent Raman spectra: Placzek approximation and beyond
Authors:
Michael Walter,
Michael Moseler
Abstract:
We analyze how to obtain non-resonant and resonant Raman spectra within the Placzek as well as the Albrecht approximation. Both approximations are derived from the matrix element for light scattering by application of the Kramers, Heisenberg and Dirac formula. It is shown that the Placzek expression results from a semi-classical approximation of the combined electronic and vibrational transition e…
▽ More
We analyze how to obtain non-resonant and resonant Raman spectra within the Placzek as well as the Albrecht approximation. Both approximations are derived from the matrix element for light scattering by application of the Kramers, Heisenberg and Dirac formula. It is shown that the Placzek expression results from a semi-classical approximation of the combined electronic and vibrational transition energies. Molecular hydrogen, water and butadiene are studied as test cases. It turns out that the Placzek approximation agrees qualitatively with the more accurate Albrecht formulation even in the resonant regime for the excitations of single vibrational quanta. However, multiple vibrational excitations are absent in Placzek, but can be of similar intensities as single excitations under resonance conditions. The Albrecht approximation takes multiple vibrational excitations into account and the resulting simulated spectra exhibit good agreement with experimental Raman spectra in the resonance region as well.
△ Less
Submitted 13 June, 2019; v1 submitted 11 June, 2018;
originally announced June 2018.
-
Efficient algorithms for tensor scaling, quantum marginals and moment polytopes
Authors:
Peter Bürgisser,
Cole Franks,
Ankit Garg,
Rafael Oliveira,
Michael Walter,
Avi Wigderson
Abstract:
We present a polynomial time algorithm to approximately scale tensors of any format to arbitrary prescribed marginals (whenever possible). This unifies and generalizes a sequence of past works on matrix, operator and tensor scaling. Our algorithm provides an efficient weak membership oracle for the associated moment polytopes, an important family of implicitly-defined convex polytopes with exponen…
▽ More
We present a polynomial time algorithm to approximately scale tensors of any format to arbitrary prescribed marginals (whenever possible). This unifies and generalizes a sequence of past works on matrix, operator and tensor scaling. Our algorithm provides an efficient weak membership oracle for the associated moment polytopes, an important family of implicitly-defined convex polytopes with exponentially many facets and a wide range of applications. These include the entanglement polytopes from quantum information theory (in particular, we obtain an efficient solution to the notorious one-body quantum marginal problem) and the Kronecker polytopes from representation theory (which capture the asymptotic support of Kronecker coefficients). Our algorithm can be applied to succinct descriptions of the input tensor whenever the marginals can be efficiently computed, as in the important case of matrix product states or tensor-train decompositions, widely used in computational physics and numerical mathematics.
We strengthen and generalize the alternating minimization approach of previous papers by introducing the theory of highest weight vectors from representation theory into the numerical optimization framework. We show that highest weight vectors are natural potential functions for scaling algorithms and prove new bounds on their evaluations to obtain polynomial-time convergence. Our techniques are general and we believe that they will be instrumental to obtain efficient algorithms for moment polytopes beyond the ones consider here, and more broadly, for other optimization problems possessing natural symmetries.
△ Less
Submitted 15 April, 2018; v1 submitted 12 April, 2018;
originally announced April 2018.
-
Matrix product states and the quantum max-flow/min-cut conjectures
Authors:
Fulvio Gesmundo,
J. M. Landsberg,
Michael Walter
Abstract:
In this note we discuss the geometry of matrix product states with periodic boundary conditions and provide three infinite sequences of examples where the quantum max-flow is strictly less than the quantum min-cut. In the first we fix the underlying graph to be a 4-cycle and verify a prediction of Hastings that inequality occurs for infinitely many bond dimensions. In the second we generalize this…
▽ More
In this note we discuss the geometry of matrix product states with periodic boundary conditions and provide three infinite sequences of examples where the quantum max-flow is strictly less than the quantum min-cut. In the first we fix the underlying graph to be a 4-cycle and verify a prediction of Hastings that inequality occurs for infinitely many bond dimensions. In the second we generalize this result to a 2d-cycle. In the third we show that the 2d-cycle with periodic boundary conditions gives inequality for all d when all bond dimensions equal two, namely a gap of at least 2^{d-2} between the quantum max-flow and the quantum min-cut.
△ Less
Submitted 18 October, 2018; v1 submitted 27 January, 2018;
originally announced January 2018.
-
Schur-Weyl Duality for the Clifford Group with Applications: Property Testing, a Robust Hudson Theorem, and de Finetti Representations
Authors:
David Gross,
Sepehr Nezami,
Michael Walter
Abstract:
Schur-Weyl duality is a ubiquitous tool in quantum information. At its heart is the statement that the space of operators that commute with the tensor powers of all unitaries is spanned by the permutations of the tensor factors. In this work, we describe a similar duality theory for tensor powers of Clifford unitaries. The Clifford group is a central object in many subfields of quantum information…
▽ More
Schur-Weyl duality is a ubiquitous tool in quantum information. At its heart is the statement that the space of operators that commute with the tensor powers of all unitaries is spanned by the permutations of the tensor factors. In this work, we describe a similar duality theory for tensor powers of Clifford unitaries. The Clifford group is a central object in many subfields of quantum information, most prominently in the theory of fault-tolerance. The duality theory has a simple and clean description in terms of finite geometries. We demonstrate its effectiveness in several applications:
(1) We resolve an open problem in quantum property testing by showing that "stabilizerness" is efficiently testable: There is a protocol that, given access to six copies of an unknown state, can determine whether it is a stabilizer state, or whether it is far away from the set of stabilizer states. We give a related membership test for the Clifford group.
(2) We find that tensor powers of stabilizer states have an increased symmetry group. We provide corresponding de Finetti theorems, showing that the reductions of arbitrary states with this symmetry are well-approximated by mixtures of stabilizer tensor powers (in some cases, exponentially well).
(3) We show that the distance of a pure state to the set of stabilizers can be lower-bounded in terms of the sum-negativity of its Wigner function. This gives a new quantitative meaning to the sum-negativity (and the related mana) -- a measure relevant to fault-tolerant quantum computation. The result constitutes a robust generalization of the discrete Hudson theorem.
(4) We show that complex projective designs of arbitrary order can be obtained from a finite number (independent of the number of qudits) of Clifford orbits. To prove this result, we give explicit formulas for arbitrary moments of random stabilizer states.
△ Less
Submitted 16 January, 2021; v1 submitted 22 December, 2017;
originally announced December 2017.
-
Alternating minimization, scaling algorithms, and the null-cone problem from invariant theory
Authors:
Peter Bürgisser,
Ankit Garg,
Rafael Oliveira,
Michael Walter,
Avi Wigderson
Abstract:
Alternating minimization heuristics seek to solve a (difficult) global optimization task through iteratively solving a sequence of (much easier) local optimization tasks on different parts (or blocks) of the input parameters. While popular and widely applicable, very few examples of this heuristic are rigorously shown to converge to optimality, and even fewer to do so efficiently.
In this paper…
▽ More
Alternating minimization heuristics seek to solve a (difficult) global optimization task through iteratively solving a sequence of (much easier) local optimization tasks on different parts (or blocks) of the input parameters. While popular and widely applicable, very few examples of this heuristic are rigorously shown to converge to optimality, and even fewer to do so efficiently.
In this paper we present a general framework which is amenable to rigorous analysis, and expose its applicability. Its main feature is that the local optimization domains are each a group of invertible matrices, together naturally acting on tensors, and the optimization problem is minimizing the norm of an input tensor under this joint action. The solution of this optimization problem captures a basic problem in Invariant Theory, called the null-cone problem.
This algebraic framework turns out to encompass natural computational problems in combinatorial optimization, algebra, analysis, quantum information theory, and geometric complexity theory. It includes and extends to high dimensions the recent advances on (2-dimensional) operator scaling.
Our main result is a fully polynomial time approximation scheme for this general problem, which may be viewed as a multi-dimensional scaling algorithm. This directly leads to progress on some of the problems in the areas above, and a unified view of others. We explain how faster convergence of an algorithm for the same problem will allow resolving central open problems.
Our main techniques come from Invariant Theory, and include its rich non-commutative duality theory, and new bounds on the bitsizes of coefficients of invariant polynomials. They enrich the algorithmic toolbox of this very computational field of mathematics, and are directly related to some challenges in geometric complexity theory (GCT).
△ Less
Submitted 21 November, 2017;
originally announced November 2017.
-
Effective Polarisability Models
Authors:
Johannes Fiedler,
Priyadarshini Thiyam,
Anurag Kurumbail,
Friedrich Burger,
Michael Walter,
Clas Persson,
Iver Brevik,
Drew F. Parsons,
Mathias Boström,
Stefan Y. Buhmann
Abstract:
Theories for the effective polarisability of a small particle in a medium are presented using different levels of approximation: we consider the virtual cavity, real cavity and the hard-sphere models as well as a continuous interpolation of the latter two. We present the respective hard-sphere and cavity radii as obtained from density-functional simulations as well as the resulting effective polar…
▽ More
Theories for the effective polarisability of a small particle in a medium are presented using different levels of approximation: we consider the virtual cavity, real cavity and the hard-sphere models as well as a continuous interpolation of the latter two. We present the respective hard-sphere and cavity radii as obtained from density-functional simulations as well as the resulting effective polarisabilities at discrete Matsubara frequencies. This enables us to account for macroscopic media in van der Waals interactions between molecules in water and their Casimir-Polder interaction with an interface.
△ Less
Submitted 13 October, 2017;
originally announced October 2017.
-
Rigorous free fermion entanglement renormalization from wavelet theory
Authors:
Jutho Haegeman,
Brian Swingle,
Michael Walter,
Jordan Cotler,
Glen Evenbly,
Volkher B. Scholz
Abstract:
We construct entanglement renormalization schemes which provably approximate the ground states of non-interacting fermion nearest-neighbor hop** Hamiltonians on the one-dimensional discrete line and the two-dimensional square lattice. These schemes give hierarchical quantum circuits which build up the states from unentangled degrees of freedom. The circuits are based on pairs of discrete wavelet…
▽ More
We construct entanglement renormalization schemes which provably approximate the ground states of non-interacting fermion nearest-neighbor hop** Hamiltonians on the one-dimensional discrete line and the two-dimensional square lattice. These schemes give hierarchical quantum circuits which build up the states from unentangled degrees of freedom. The circuits are based on pairs of discrete wavelet transforms which are approximately related by a "half-shift": translation by half a unit cell. The presence of the Fermi surface in the two-dimensional model requires a special kind of circuit architecture to properly capture the entanglement in the ground state. We show how the error in the approximation can be controlled without ever performing a variational optimization.
△ Less
Submitted 19 July, 2017;
originally announced July 2017.
-
Entanglement Wedge Reconstruction via Universal Recovery Channels
Authors:
Jordan Cotler,
Patrick Hayden,
Geoffrey Penington,
Grant Salton,
Brian Swingle,
Michael Walter
Abstract:
We apply and extend the theory of universal recovery channels from quantum information theory to address the problem of entanglement wedge reconstruction in AdS/CFT. It has recently been proposed that any low-energy local bulk operators in a CFT boundary region's entanglement wedge can be reconstructed on that boundary region itself. Existing work arguing for this proposal relies on algebraic cons…
▽ More
We apply and extend the theory of universal recovery channels from quantum information theory to address the problem of entanglement wedge reconstruction in AdS/CFT. It has recently been proposed that any low-energy local bulk operators in a CFT boundary region's entanglement wedge can be reconstructed on that boundary region itself. Existing work arguing for this proposal relies on algebraic consequences of the exact equivalence between bulk and boundary relative entropies, namely the theory of operator algebra quantum error correction. However, bulk and boundary relative entropies are only approximately equal in bulk effective field theory, and in similar situations it is known that predictions from exact entropic equalities can be qualitatively incorrect. The framework of universal recovery channels provides a robust demonstration of the entanglement wedge reconstruction conjecture in addition to new physical insights. Most notably, we find that a bulk operator acting in a given boundary region's entanglement wedge can be expressed as the response of the boundary region's modular Hamiltonian to a perturbation of the bulk state in the direction of the bulk operator. This formula can be interpreted as a noncommutative version of Bayes' rule that attempts to undo the noise induced by restricting to only a portion of the boundary, and has an integral representation in terms of modular flows. To reach these conclusions, we extend the theory of universal recovery channels to finite-dimensional operator algebras and demonstrate that recovery channels approximately preserve the multiplicative structure of the operator algebra.
△ Less
Submitted 4 September, 2018; v1 submitted 19 April, 2017;
originally announced April 2017.
-
Multi-partite entanglement
Authors:
Michael Walter,
David Gross,
Jens Eisert
Abstract:
We give an introduction to the theory of multi-partite entanglement. We begin by describing the "coordinate system" of the field: Are we dealing with pure or mixed states, with single or multiple copies, what notion of "locality" is being used, do we aim to classify states according to their "type of entanglement" or to quantify it? Building on the general theory of multi-partite entanglement - to…
▽ More
We give an introduction to the theory of multi-partite entanglement. We begin by describing the "coordinate system" of the field: Are we dealing with pure or mixed states, with single or multiple copies, what notion of "locality" is being used, do we aim to classify states according to their "type of entanglement" or to quantify it? Building on the general theory of multi-partite entanglement - to the extent that it has been achieved - we turn to explaining important classes of multi-partite entangled states, including matrix product states, stabilizer and graph states, bosonic and fermionic Gaussian states, addressing applications in condensed matter theory. We end with a brief discussion of various applications that rely on multi-partite entangled states: quantum networks, measurement-based quantum computing, non-locality, and quantum metrology.
△ Less
Submitted 5 February, 2017; v1 submitted 7 December, 2016;
originally announced December 2016.
-
The Horn inequalities from a geometric point of view
Authors:
Nicole Berline,
Michèle Vergne,
Michael Walter
Abstract:
We give an exposition of the Horn inequalities and their triple role characterizing tensor product invariants, eigenvalues of sums of Hermitian matrices, and intersections of Schubert varieties. We follow Belkale's geometric method, but assume only basic representation theory and algebraic geometry, aiming for self-contained, concrete proofs. In particular, we do not assume the Littlewood-Richards…
▽ More
We give an exposition of the Horn inequalities and their triple role characterizing tensor product invariants, eigenvalues of sums of Hermitian matrices, and intersections of Schubert varieties. We follow Belkale's geometric method, but assume only basic representation theory and algebraic geometry, aiming for self-contained, concrete proofs. In particular, we do not assume the Littlewood-Richardson rule nor an a priori relation between intersections of Schubert cells and tensor product invariants. Our motivation is largely pedagogical, but the desire for concrete approaches is also motivated by current research in computational complexity theory and effective algorithms.
△ Less
Submitted 15 November, 2017; v1 submitted 21 November, 2016;
originally announced November 2016.
-
Entanglement from Topology in Chern-Simons Theory
Authors:
Grant Salton,
Brian Swingle,
Michael Walter
Abstract:
The way in which geometry encodes entanglement is a topic of much recent interest in quantum many-body physics and the AdS/CFT duality. This relation is particularly pronounced in the case of topological quantum field theories, where topology alone determines the quantum states of the theory. In this work, we study the set of quantum states that can be prepared by the Euclidean path integral in th…
▽ More
The way in which geometry encodes entanglement is a topic of much recent interest in quantum many-body physics and the AdS/CFT duality. This relation is particularly pronounced in the case of topological quantum field theories, where topology alone determines the quantum states of the theory. In this work, we study the set of quantum states that can be prepared by the Euclidean path integral in three-dimensional Chern-Simons theory. Specifically, we consider arbitrary 3-manifolds with a fixed number of torus boundaries in both abelian U(1) and non-abelian SO(3) Chern-Simons theory. For the abelian theory, we find that the states that can be prepared coincide precisely with the set of stabilizer states from quantum information theory. This constrains the multipartite entanglement present in this theory, but it also reveals that stabilizer states can be described by topology. In particular, we find an explicit expression for the entanglement entropy of a many-torus subsystem using only a single replica, as well as a concrete formula for the number of GHZ states that can be distilled from a tripartite state prepared through path integration. For the nonabelian theory, we find a notion of "state universality", namely that any state can be prepared to an arbitrarily good approximation. The manifolds we consider can also be viewed as toy models of multi-boundary wormholes in AdS/CFT.
△ Less
Submitted 17 November, 2016; v1 submitted 4 November, 2016;
originally announced November 2016.
-
Conditional Mutual Information of Bipartite Unitaries and Scrambling
Authors:
Dawei Ding,
Patrick Hayden,
Michael Walter
Abstract:
One way to diagnose chaos in bipartite unitary channels is via the tripartite information of the corresponding Choi state, which for certain choices of the subsystems reduces to the negative conditional mutual information (CMI). We study this quantity from a quantum information-theoretic perspective to clarify its role in diagnosing scrambling. When the CMI is zero, we find that the channel has a…
▽ More
One way to diagnose chaos in bipartite unitary channels is via the tripartite information of the corresponding Choi state, which for certain choices of the subsystems reduces to the negative conditional mutual information (CMI). We study this quantity from a quantum information-theoretic perspective to clarify its role in diagnosing scrambling. When the CMI is zero, we find that the channel has a special normal form consisting of local channels between individual inputs and outputs. However, we find that arbitrarily low CMI does not imply arbitrary proximity to a channel of this form, although it does imply a type of approximate recoverability of one of the inputs. When the CMI is maximal, we find that the residual channel from an individual input to an individual output is completely depolarizing when the other input is maximally mixed. However, we again find that this result is not robust. We also extend some of these results to the multipartite case and to the case of Haar-random pure input states. Finally, we look at the relationship between tripartite information and its Renyi-2 version which is directly related to out-of-time-order correlation functions. In particular, we demonstrate an arbitrarily large gap between the two quantities.
△ Less
Submitted 13 December, 2016; v1 submitted 16 August, 2016;
originally announced August 2016.
-
Multipartite Entanglement in Stabilizer Tensor Networks
Authors:
Sepehr Nezami,
Michael Walter
Abstract:
Despite the fundamental importance of quantum entanglement in many-body systems, our understanding is mostly limited to bipartite situations. Indeed, even defining appropriate notions of multipartite entanglement is a significant challenge for general quantum systems. In this work, we initiate the study of multipartite entanglement in a rich, yet tractable class of quantum states called stabilizer…
▽ More
Despite the fundamental importance of quantum entanglement in many-body systems, our understanding is mostly limited to bipartite situations. Indeed, even defining appropriate notions of multipartite entanglement is a significant challenge for general quantum systems. In this work, we initiate the study of multipartite entanglement in a rich, yet tractable class of quantum states called stabilizer tensor networks. We demonstrate that, for generic stabilizer tensor networks, the geometry of the tensor network informs the multipartite entanglement structure of the state. In particular, we show that the average number of Greenberger-Horne-Zeilinger (GHZ) triples that can be extracted from a stabilizer tensor network is small, implying that tripartite entanglement is scarce. This, in turn, restricts the higher-partite entanglement structure of the states. Recent research in quantum gravity found that stabilizer tensor networks reproduce important structural features of the AdS/CFT correspondence, including the Ryu-Takayanagi formula for the entanglement entropy and certain quantum error correction properties. Our results imply a new operational interpretation of the monogamy of the Ryu-Takayanagi mutual information and an entropic diagnostic for higher-partite entanglement. Our technical contributions include a spin model for evaluating the average GHZ content of stabilizer tensor networks, as well as a novel formula for the third moment of random stabilizer states, which we expect to find further applications in quantum information.
△ Less
Submitted 13 January, 2021; v1 submitted 8 August, 2016;
originally announced August 2016.
-
The Mathematics of Entanglement
Authors:
Fernando G. S. L. Brandao,
Matthias Christandl,
Aram W. Harrow,
Michael Walter
Abstract:
These notes are from a series of lectures given at the Universidad de Los Andes in Bogotá, Colombia on some topics of current interest in quantum information. While they aim to be self-contained, they are necessarily incomplete and idiosyncratic in their coverage. For a more thorough introduction to the subject, we recommend one of the textbooks by Nielsen and Chuang or by Wilde, or the lecture no…
▽ More
These notes are from a series of lectures given at the Universidad de Los Andes in Bogotá, Colombia on some topics of current interest in quantum information. While they aim to be self-contained, they are necessarily incomplete and idiosyncratic in their coverage. For a more thorough introduction to the subject, we recommend one of the textbooks by Nielsen and Chuang or by Wilde, or the lecture notes of Mermin, Preskill or Watrous. Our notes by contrast are meant to be a relatively rapid introduction into some more contemporary topics in this fast-moving field. They are meant to be accessible to advanced undergraduates or starting graduate students.
△ Less
Submitted 6 April, 2016;
originally announced April 2016.
-
Entanglement-assisted capacities of compound quantum channels
Authors:
Mario Berta,
Hrant Gharibyan,
Michael Walter
Abstract:
We study universal quantum codes for entanglement-assisted quantum communication over compound quantum channels. In this setting, sender and receiver do not know the specific channel that will be used for communication, but only know the set that the channel is selected from. We investigate different variations of the problem: uninformed users, informed receiver, informed sender, and feedback assi…
▽ More
We study universal quantum codes for entanglement-assisted quantum communication over compound quantum channels. In this setting, sender and receiver do not know the specific channel that will be used for communication, but only know the set that the channel is selected from. We investigate different variations of the problem: uninformed users, informed receiver, informed sender, and feedback assistance. We derive single-letter formulas for all corresponding channel capacities. Our proofs are based on one-shot decoupling bounds and properties of smooth entropies.
△ Less
Submitted 6 March, 2017; v1 submitted 7 March, 2016;
originally announced March 2016.
-
Holographic duality from random tensor networks
Authors:
Patrick Hayden,
Sepehr Nezami,
Xiao-Liang Qi,
Nathaniel Thomas,
Michael Walter,
Zhao Yang
Abstract:
Tensor networks provide a natural framework for exploring holographic duality because they obey entanglement area laws. They have been used to construct explicit toy models realizing many interesting structural features of the AdS/CFT correspondence, including the non-uniqueness of bulk operator reconstruction in the boundary theory. In this article, we explore the holographic properties of networ…
▽ More
Tensor networks provide a natural framework for exploring holographic duality because they obey entanglement area laws. They have been used to construct explicit toy models realizing many interesting structural features of the AdS/CFT correspondence, including the non-uniqueness of bulk operator reconstruction in the boundary theory. In this article, we explore the holographic properties of networks of random tensors. We find that our models naturally incorporate many features that are analogous to those of the AdS/CFT correspondence. When the bond dimension of the tensors is large, we show that the entanglement entropy of boundary regions, whether connected or not, obey the Ryu-Takayanagi entropy formula, a fact closely related to known properties of the multipartite entanglement of assistance. Moreover, we find that each boundary region faithfully encodes the physics of the entire bulk entanglement wedge. Our method is to interpret the average over random tensors as the partition function of a classical ferromagnetic Ising model, so that the minimal surfaces of Ryu-Takayanagi appear as domain walls. Upon including the analog of a bulk field, we find that our model reproduces the expected corrections to the Ryu-Takayanagi formula: the minimal surface is displaced and the entropy is augmented by the entanglement of the bulk field. Increasing the entanglement of the bulk field ultimately changes the minimal surface topologically in a way similar to creation of a black hole. Extrapolating bulk correlation functions to the boundary permits the calculation of the scaling dimensions of boundary operators, which exhibit a large gap between a small number of low-dimension operators and the rest. While we are primarily motivated by AdS/CFT duality, our main results define a more general form of bulk-boundary correspondence which could be useful for extending holography to other spacetimes.
△ Less
Submitted 17 October, 2016; v1 submitted 7 January, 2016;
originally announced January 2016.
-
Membership in moment polytopes is in NP and coNP
Authors:
Peter Bürgisser,
Matthias Christandl,
Ketan D. Mulmuley,
Michael Walter
Abstract:
We show that the problem of deciding membership in the moment polytope associated with a finite-dimensional unitary representation of a compact, connected Lie group is in NP and coNP. This is the first non-trivial result on the computational complexity of this problem, which naively amounts to a quadratically-constrained program. Our result applies in particular to the Kronecker polytopes, and the…
▽ More
We show that the problem of deciding membership in the moment polytope associated with a finite-dimensional unitary representation of a compact, connected Lie group is in NP and coNP. This is the first non-trivial result on the computational complexity of this problem, which naively amounts to a quadratically-constrained program. Our result applies in particular to the Kronecker polytopes, and therefore to the problem of deciding positivity of the stretched Kronecker coefficients. In contrast, it has recently been shown that deciding positivity of a single Kronecker coefficient is NP-hard in general [Ikenmeyer, Mulmuley and Walter, arXiv:1507.02955]. We discuss the consequences of our work in the context of complexity theory and the quantum marginal problem.
△ Less
Submitted 24 June, 2017; v1 submitted 11 November, 2015;
originally announced November 2015.
-
Holographic entropy inequalities and gapped phases of matter
Authors:
Ning Bao,
ChunJun Cao,
Michael Walter,
Zitao Wang
Abstract:
We extend our studies of holographic entropy inequalities to gapped phases of matter. For any number of regions, we determine the linear entropy inequalities satisfied by systems in which the entanglement entropy satisfies an exact area law. In particular, we find that all holographic entropy inequalities are valid in such systems. In gapped systems with topological order, the "cyclic inequalities…
▽ More
We extend our studies of holographic entropy inequalities to gapped phases of matter. For any number of regions, we determine the linear entropy inequalities satisfied by systems in which the entanglement entropy satisfies an exact area law. In particular, we find that all holographic entropy inequalities are valid in such systems. In gapped systems with topological order, the "cyclic inequalities" derived recently for the holographic entanglement entropy generalize the Kitaev-Preskill formula for the topological entanglement entropy. Finally, we propose a candidate linear inequality for general 4-party quantum states.
△ Less
Submitted 26 July, 2015; v1 submitted 20 July, 2015;
originally announced July 2015.