scispace - formally typeset
Search or ask a question
Posted Content

Near-optimal covariant quantum error-correcting codes from random unitaries with symmetries.

TL;DR: In this paper, the authors consider the quantum error correction capability of uniformly random covariant codes, and analytically study the most essential cases of U(1) and SU(d) symmetries, and show that for both symmetry groups the error of the covariant code generated by Haar-random symmetric unitaries, i.e. unitaries that commute with the group actions, typically scale as O(n^(-1)) in terms of both the average and worst-case purified distances against erasure noise.
Abstract: Quantum error correction and symmetries play central roles in quantum information science and physics. It is known that quantum error-correcting codes that obey (covariant with respect to) continuous symmetries cannot correct erasure errors perfectly (a well-known result in this regard being the Eastin-Knill theorem in the context of fault-tolerant quantum computing), in contrast to the case without symmetry constraints. Furthermore, several quantitative fundamental limits on the accuracy of such covariant codes for approximate quantum error correction are known. Here, we consider the quantum error correction capability of uniformly random covariant codes. In particular, we analytically study the most essential cases of U(1) and SU(d) symmetries, and show that for both symmetry groups the error of the covariant codes generated by Haar-random symmetric unitaries, i.e. unitaries that commute with the group actions, typically scale as O(n^(-1)) in terms of both the average- and worst-case purified distances against erasure noise, saturating the fundamental limits to leading order. We note that the results hold for symmetric variants of unitary 2-designs, and comment on the convergence problem of symmetric random circuits. Our results not only indicate (potentially efficient) randomized constructions of optimal U(1)- and SU(d)-covariant codes, but also reveal fundamental properties of random symmetric unitaries, which underlie important models of complex quantum systems in wide-ranging physical scenarios with symmetries, such as black holes and many-body spin systems. Our study and techniques may have broad relevance for both physics and quantum computing.
Citations
More filters
Journal ArticleDOI
TL;DR: In this paper , the authors consider monitored quantum systems with a global conserved charge, and ask how efficiently an eavesdropper can learn the global charge of such systems from local projective measurements.
Abstract: We consider monitored quantum systems with a global conserved charge, and ask how efficiently an observer ("eavesdropper") can learn the global charge of such systems from local projective measurements. We find phase transitions as a function of the measurement rate, depending on how much information about the quantum dynamics the eavesdropper has access to. For random unitary circuits with U(1) symmetry, we present an optimal classical classifier to reconstruct the global charge from local measurement outcomes only. We demonstrate the existence of phase transitions in the performance of this classifier in the thermodynamic limit. We also study numerically improved classifiers by including some knowledge about the unitary gates pattern.

8 citations

Journal ArticleDOI
TL;DR: In this article , two distance measures based on sub-and superfidelities were proposed to bound error approximations, which in turn require a lower computational cost, and they were shown to be equivalent to the action of a single dephasing channel.
Abstract: The Eastin-Knill theorem is a central result of quantum error correction theory and states that a quantum code cannot correct errors exactly, possess continuous symmetries, and implement a universal set of gates transversely. As a way to circumvent this result, there are several approaches in which one gives up on either exact error correction or continuous symmetries. In this context, it is common to employ a complementary measure of fidelity as a way to quantify quantum state distinguishability and benchmark approximations in error correction. Despite having useful properties, evaluating fidelity measures stands as a challenging task for quantum states with a large number of entangled qubits. With that in mind, we address two distance measures based on the sub- and superfidelities as a way to bound error approximations, which in turn require a lower computational cost. We model the lack of exact error correction to be equivalent to the action of a single dephasing channel, evaluate the proposed fidelity-based distances both analytically and numerically, and obtain a closed-form expression for a general $N$-qubit quantum state. We illustrate our bounds with two paradigmatic examples, an $N$-qubit mixed GHZ state and an $N$-qubit mixed $W$ state.
Journal ArticleDOI
21 Feb 2023-Quantum
TL;DR: In this paper , the authors extend the Hayden-Preskill protocol to the case where the system has symmetry and investigate how the symmetry affects the leakage of information, especially focusing on the conservation of the number of up-spins.
Abstract: The Hayden-Preskill protocol is a qubit-toy model of the black hole information paradox. Based on the assumption of scrambling, it was revealed that quantum information is instantly leaked out from the quantum many-body system that models a black hole. In this paper, we extend the protocol to the case where the system has symmetry and investigate how the symmetry affects the leakage of information. We especially focus on the conservation of the number of up-spins. Developing a partial decoupling approach, we first show that the symmetry induces a delay of leakage and an information remnant. We then clarify the physics behind them: the delay is characterized by thermodynamic properties of the system associated with the symmetry, and the information remnant is closely related to the symmetry-breaking of the initial state. These relations bridge the information leakage problem to macroscopic physics of quantum many-body systems and allow us to investigate the information leakage only in terms of physical properties of the system.
References
More filters
01 Dec 2010
TL;DR: This chapter discusses quantum information theory, public-key cryptography and the RSA cryptosystem, and the proof of Lieb's theorem.
Abstract: Part I. Fundamental Concepts: 1. Introduction and overview 2. Introduction to quantum mechanics 3. Introduction to computer science Part II. Quantum Computation: 4. Quantum circuits 5. The quantum Fourier transform and its application 6. Quantum search algorithms 7. Quantum computers: physical realization Part III. Quantum Information: 8. Quantum noise and quantum operations 9. Distance measures for quantum information 10. Quantum error-correction 11. Entropy and information 12. Quantum information theory Appendices References Index.

14,825 citations

Journal ArticleDOI
TL;DR: A two-dimensional quantum system with anyonic excitations can be considered as a quantum computer Unitary transformations can be performed by moving the excitations around each other Unitary transformation can be done by joining excitations in pairs and observing the result of fusion.

4,920 citations

Journal ArticleDOI
Peter W. Shor1
TL;DR: In the mid-1990s, theorists devised methods to preserve the integrity of quantum bits\char22{}techniques that may become the key to practical quantum computing on a large scale.
Abstract: In the mid-1990s, theorists devised methods to preserve the integrity of quantum bits---techniques that may become the key to practical quantum computing on a large scale.

3,668 citations

Journal ArticleDOI
TL;DR: In this paper, an upper bound on the strength of gravity relative to gauge forces in quantum gravity was given, motivated by arguments involving holography and absence of remnants, the stability of black holes as well as the non-existence of global symmetries in string theory.
Abstract: We conjecture a general upper bound on the strength of gravity relative to gauge forces in quantum gravity. This implies, in particular, that in a four-dimensional theory with gravity and a U(1) gauge field with gauge coupling g, there is a new ultraviolet scale Λ = gMPl, invisible to the low-energy effective field theorist, which sets a cutoff on the validity of the effective theory. Moreover, there is some light charged particle with mass smaller than or equal to Λ. The bound is motivated by arguments involving holography and absence of remnants, the (in) stability of black holes as well as the non-existence of global symmetries in string theory. A sharp form of the conjecture is that there are always light ``elementary'' electric and magnetic objects with a mass/charge ratio smaller than the corresponding ratio for macroscopic extremal black holes, allowing extremal black holes to decay. This conjecture is supported by a number of non-trivial examples in string theory. It implies the necessary presence of new physics beneath the Planck scale, not far from the GUT scale, and explains why some apparently natural models of inflation resist an embedding in string theory.

1,424 citations

Journal ArticleDOI
TL;DR: In this paper, the information retrieval from evaporating black holes is studied under the assumption that the internal dynamics of a black hole is unitary and rapidly mixing, and assuming that the retriever has unlimited control over the emitted Hawking radiation.
Abstract: We study information retrieval from evaporating black holes, assuming that the internal dynamics of a black hole is unitary and rapidly mixing, and assuming that the retriever has unlimited control over the emitted Hawking radiation. If the evaporation of the black hole has already proceeded past the ``half-way'' point, where half of the initial entropy has been radiated away, then additional quantum information deposited in the black hole is revealed in the Hawking radiation very rapidly. Information deposited prior to the half-way point remains concealed until the half-way point, and then emerges quickly. These conclusions hold because typical local quantum circuits are efficient encoders for quantum error-correcting codes that nearly achieve the capacity of the quantum erasure channel. Our estimate of a black hole's information retention time, based on speculative dynamical assumptions, is just barely compatible with the black hole complementarity hypothesis.

1,077 citations