Bounds on the survival probability in periodically driven quantum systems
←
→
Page content transcription
If your browser does not render page correctly, please read the page content below
Bounds on the survival probability in periodically driven quantum systems Tanmoy Pandit1 , Alaina M. Green2 , C. Huerta Alderete2 , Norbert M. Linke2 , and Raam Uzdin1 1 Fritz Haber Research Center for Molecular Dynamics, Hebrew University of Jerusalem, Jerusalem 9190401, Israel and 2 Joint Quantum Institute and Department of Physics, University of Maryland, College Park, MD 20742 USA∗ Periodically driven systems are ubiquitous in science and technology. In quantum dynamics, even a small number of periodically-driven spins lead to complicated dynamics. By applying the global passivity principle from quantum thermodynamics to periodically driven quantum systems, we obtain a set of constraints for each number of cycles. For pure initial states, the observable being constrained is the survival probability. We use our constraints to detect undesired coupling to unaccounted environments in quantum circuits as well as for detecting deviations from perfect arXiv:2105.11685v1 [quant-ph] 25 May 2021 periodic driving. To illustrate the applicability of these results to modern quantum systems we demonstrate our findings experimentally on on a trapped ion quantum computer, and on various IBM quantum computers. Specifically, we provide two experimental examples where these constraints surpass fundamental bounds on leakage detection based on the standard “one cycle” detection scheme (including the second law of thermodynamics). The derived constraints treat the driven circuit as a “black box” and make no assumptions about it. Thus, by running the same circuit several times sequentially, this scheme can be used as a diagnostic tool for quantum circuits that cannot be classically √ simulated. Finally, we show that , in practice, testing an n-cycle constraint requires only O( n) cycles. INTRODUCTION of the objects are initially at zero temperature - a sce- nario where the second law in microscopic systems and Recent developments in stochastic and quantum ther- other constraints provide trivial information that cannot modynamics of microscopic systems provide a plethora be exploited. What is common to all these methods is of “second-law-like” constraints: from various fluctuation that they provide no information when all the elements theorems [1–3], to thermodynamic uncertainty relations in the setup are at zero temperature. That is, when the [4–7], resource theory [8, 9], global passivity [10], and setup is initially in a pure state. passivity deformation [11]. Presently, the utility of these Several studies provide the aforementioned constraints additional constraints is to a large extent unclear. Among with some operational meaning by applying them to other things, these theories differ in the level of difficulty presently available quantum computers. In [14] and [15] in measuring the quantities they constrain. Resource the- the goal was to diagnose the operation of the device and ory requires full tomography of the energy populations in in [16] to understand which type of heat machine de- the beginning and at the end of the evolution. Fluc- scribes the interaction of the quantum computer with tuation theorems require trajectory information which the environment. amounts to process tomography at the population level. If the quantum computer is well isolated from the en- That is, the output distribution is recorded for each pos- vironment and the initial condition fits the studied ther- sible input in the computational basis, which means the modynamic constraints (e.g. the qubits are initially in method is not scalable with system size. Fluctuation some thermal state), the constraints mentioned above theorems provide equalities rather than inequalities, but hold. Indeed, all these constraints require some form they are difficult to measure and not scalable as the sys- of isolation. While some permit only interactions with tem size grows. Global passivity inequalities [10] involve an implicit bath at a well-known temperature, others re- expectation values of higher order moments of the en- quire unital evolution, which can be thought of as the ergy. Since theses expectation values are local, the num- operation of a random unitary on the setup. For exam- ber of experiments needed to obtain the desired statis- ple, decoherence is a unital map that can be described tical uncertainty grows only polynomially in the system using a statistical mixture of unitaries. Since fluctuation size (see [12, 13] and in particular the appendix of [14] theorems, global passivity, and passivity deformation re- in the context of global passivity). Unfortunately, these quire unital maps to hold, a deviation from this type of expectation values presently do not have a clear opera- map will indicate the presence of a coupling to the en- tional meaning in terms of energy flows. Passivity defor- vironment which is more severe than decoherence inter- mation [11] addresses a wider range of observables and action, e.g. an actual heat leak that reduces the entropy produces tighter bounds compared to global passivity. of the setup, like spontaneous emission. Thus, an inter- In particular, it can also handle the case where some esting application for modern microscopic theory is the detection of coupling to the environment via violation of various bounds. Notably, no information on the circuit ∗ tanmoy.pandit@huji.ac.il, raam@mail.huji.ac.il is needed, and therefore these thermodynamic methods
2 produce “black box” tests that do not depend on the com- bounds that are tighter and hence more predictive than plexity of the circuit. other constraints that are based on just two time points: Presently the most common method for diagnosing the beginning and the end of the evolution. In par- quantum computers is randomized benchmarking [17– ticular, we show that this approach circumvents the 20]. In this method, a random unitary and its inverse zero-temperature problem and the previously mentioned are sequentially implemented. In a perfect device, this bound on the detectability of hot environments. construction yields the identity operator and the sur- After a short review of the global passivity principle vival probability, i.e. the probability to remain in the we proceed to derive our main finding: the periodicity initial state, is one. Unlike the aforementioned thermo- inequalities. For each number of cycles there is a continu- dynamic methods, this methods requires information on ous set of constraints. A recipe is presented for obtaining the circuits since the inverse transformation has to be the optimal bound for the detection of non unital errors constructed as well. Crucially, randomized benchmark- in a given number of cycles. Next, we study an interest- ing methods cannot distinguish between coherent errors ing features of a family of bounds which are economical (or unitary errors) and errors created by coupling to an in terms of resources. In the next part we present ex- environment (see Appendix I). A coherent error means perimental results obtained from various IBM quantum that a unitary has been successfully implemented but it processors and a trapped ion quantum computer (TIQC). is different from the target unitary. These errors can be Each example shows other aspects of these bounds. fixed by tuning, calibration, or by adding additional uni- The first experiment shows that it is possible to detect tary operations. In contrast, errors generated by the en- incoherent errors with pure states. In this specific exper- vironment are much more difficult to address and require iment, the environment is small and artificially-made (a a different set of solutions that includes changes in the qubit). The added value of this artificial environment for fabrication process of the device. Thus, it is appealing to the purpose of our demonstration is that it can be cou- have complementary methods that can indicate the con- pled or decoupled from the system. Interestingly, in this tribution of the environment in the error observed in the specific example we find that a quantum initial condition randomized benchmarking method. has an advantage over classical inputs. Our constraints differ from thermodynamic (or ther- In the second experiment we aim to detect intrinsic modynamically inspired) constraints in that they do not heat leaks of the processors. Now the environment is require a mixed state. Such states are often difficult to realistic, but not controllable. In some of the processors, create in a system that is rather well isolated from the we observe directly a violation of the bounds. In other environment. Additionally, most quantum algorithms re- cases, we observe violations by employing extrapolation quire pure initial state. Hence, the default input state based on the resource efficiency of our inequalities. in quantum computers is pure. To use the thermody- The third experiment deals with thermal initial condi- namic methods mentioned above the mixed state has tions and a hot environment. We demonstrate that since to be artificially created by pre-processing circuits (see the periodicity inequalities use more than two points they [21] for two different methods of creating a mixed state). can circumvent the bounds imposed by the passivity de- A purification-based approach for creating Gibbs states formation framework on the detectability of a hot envi- is described in [22]). The creation of the initial state ronment. The experiment is three-cycle long and shows ensemble consumes a lot of resources and scales expo- that the optimized 4-point bound is essential for detect- nentially with the number of qubits. Furthermore, the ing the environment. use of mixed states can degrade the capability to detect Finally, in our forth example we compare the perfor- hot environments. In [11] a bound on the maximal de- mance of a TIQC to the IBM superconducting quantum tectable temperature using passivity-based methods was computer. The test is done on a specific class of circuits obtained. For these two reasons, a method that works where the Sn inequalities take a very simple form. with pure states can be quite useful. On top of the poten- tial practical applications, finding nontrivial constraints GLOBAL PASSIVITY IN A MORE GENERAL on the dynamics of pure states is interesting from a foun- SETTING dational point of view. Finally, note that these bounds are expressed in terms of observables that do not depend on the complexity of the studied circuit or unitary, mak- Our periodicity inequalities follow from the global pas- ing it a scalable and widely applicable black box test. sivity inequalities that were first introduced in [23] and rediscovered and further explored in [10]. For an initial Finding non-trivial and general constraints on observ- density matrix ρ0 and a final density matrix ρf that is ables undergoing unitary evolution without knowing any- unitarily related to the initial state (ρf = U ρ0 U † ), the thing about the dynamics is very difficult. Our method global passivity bound is circumvents this difficulty by exploiting periodicity. We run the circuit of interest multiple times and study the tr[F (ρ0 )(ρ0 − ρf )] ≥ 0, (1) survival probability as a function of the number of cy- cles. The information obtained from survival proba- for any unitary map U , and any function F (x) which bilities at different time points can be used to derive satisfies dFdx(x) ≥ 0 for 0 ≤ x ≤ 1. It is instructive to
3 re-derive the following simpler version: cycles. Furthermore, using the tr[ρ20 ] ≥ tr[ρ2n ] (unitality) it holds that tr[ρ0 (ρ0 − ρf )] ≥ 0. (2) 3R0 − 3R1 − tr[ρ1 ρ2 ] + R2 ≥ 0. (9) This specific form can be proven without a passivity ar- However, −tr[ρ1 ρ2 ] is presently in an inconvenient form gument by using the L2 norm and the unitality of the as both ρ1 and ρ2 are unknown. To overcome this we re- dynamics (unitary dynamics maps the identity matrix to strict ourselves to periodic unitary operations for which itself). Starting with it holds that tr[ρ1 ρ2 ] = tr[ρ1 U ρ1 U † ] = tr[U † ρ1 U ρ1 ] = tr[(ρ0 − ρf )2 ] ≥ 0, tr[ρ0 ρ1 ] = R1 . More generally for periodic unitary oper- ations tr[ρ20 ] + tr[ρ2f ] − 2tr[ρ0 ρf ] ≥ 0, (3) tr[ρn ρn+m ] = tr[ρn U n ρm U †n ] = tr[U †n ρn U n ρm ] = Rm (10) from unitality tr[ρ20 ] ≥ tr[ρ2f ], and therefore we obtain The same holds for the following unital maps: Eq. (2). tr[ρ20 ] ≥ tr[ρ2f ] follows from the fact that for Ib unital maps denoted by ρf = M(ρ0 ), ρ0 majorizes ρf ρ0n = trb U n (ρ0 ⊗ )U n† , (11) (Schur concavity) [24]. Nb Next we show that tr[ρ20 ] ≥ tr[ρ2f ] holds also for the where Ib is the identity operator of some ancilla and Nb is traceless version of ρ. Writing ρ0 = a0 I + ai Zi where the dimension of that ancilla’s Hilbert space. For readers P Zi is some traceless orthogonal basis tr(Zi Zj6P =i ) = 0 and that are familiar with “noisy operation” [25] we point out applying unitality we get M(ρ0 ) = a0 I + a0i Zi (i.e. here we do not take the partial trace at the end of the a0 = a0 ). Using this in tr[ρ0 ] ≥ tr[ρf ] we get 0 2 2 operation. One can verify that: X X 2 tr[ρ0n ρ0n+m ] = tr[ρ0 ρm ] = Rm . (12) 2 a20 + |ai | ≥ a20 + |a0i | (4) Applying eq. (10) to eq. (9) we get i=1 i=1 R2 − 4R1 + 3R0 ≥ 0, (13) and therefore: X 2 X 2 which is the simplest inequality in our approach since |ai | ≥ |a0i | . (5) it contains only three time points. Note that the coef- i=1 i=1 ficients sum up to zero (1 − 4 + 3). This is compatible with yielding 0 ≥ 0 when the evolution is the identity This implies that ≥ tr[ρ2f ] also holds for traceless tr[ρ20 ] operator and R2 = R1 = R0 . Operationally, this in- (and Hermitian) matrices. Consequently, (2) holds for equality is evaluated in the following way: in one set of any trace. That is, if r is some Hermitian operator (po- measurements R0 is measured (no evolution, the system tentially traceless) and rf = M(r0 ) then is in the initial state). In a different set of measurements tr[r0 (r0 − rf )] ≥ 0. (6) the initial state is propagated for one cycle and then R1 is measured (the survival probability for pure sate). Fi- nally, in a third set of measurements R2 is measured. In I. PERIODICITY INEQUALITIES contrast to the two-point measurement protocol ([26] and references therein), here there is no evolution whatsoever after the measurement is taken. Thus, there is no issue Next we consider a periodically driven system where with wavefunction collapse and in fact, the measurements the density matrix after each cycle satisfies ρn+1 = PN could be fully destructive (e.g. ionization) and inequality M(ρn ) from linearity the objectPr0 = i=0 αi ρi , αi ∈ R (13) would still be valid. We have used the periodicity of also satisfies M(rn ) = rn+1 = αi ρi+1 . Note that rn the driving and nothing was assumed on the evolution of is Hermitian but its trace can take any value. In the fol- the density matrix. A random initial state will populate lowing, we will use the term ’stencil’ for r. Since r0 is several Floquet modes so although each mode is periodic, Hermitian and evolves by a unital map it holds that their superposition is in general not periodic due to the tr[r0 (r0 − rM )] ≥ 0. (7) quasi-energy phase accumulation and the interference of the modes. Before we continue to more general bounds Consider the simple case where r0 = ρ1 − ρ0 , and rM = and to experimental demonstrations, it is worth taking a r1 = ρ2 − ρ1 , eq. (7) leads to closer look at this three-point inequality. 0 ≤ tr[(ρ1 − ρ0 )(−ρ0 + 2ρ1 − ρ2 )] = tr[ρ20 ] + 2tr[ρ21 ] − 3tr[ρ0 ρ1 ] Comparison to the analog of the second law of thermodynamics: −tr[ρ1 ρ2 ] + tr[ρ0 ρ2 ]. (8) We note that the quantities Rn = tr[ρ0 ρn ] can be in- As a basis for comparison, the usual two-point global terpreted as the expectation of the observable ρ0 after n passivity inequality, eq. (2), yields R0 ≥ R1 and R0 ≥ R2
4 which for pure state is trivial since R0 = 1 and R0 , R1 ≤ include negative indices. For rM we choose r1 . Here are 1. The inequality (13) can be assigned with different the first few inequalities, S3 − S5 : interpretations via different rearrangements: 1 (R2 − 4R1 + 3R0 ) ≥ 0, (17) R2 ≥ 4R1 − 3R0 , (14) 8 1 1 (R2 + 3R0 ) ≥ R1 , (15) (−R3 + 6R2 − 15R1 + 10R0 ≥ 0, (18) 4 32 1 1 (R0 − R1 ) ≥ (R0 − R2 ) ≥ 0. (16) (R4 − 8R3 + 28R2 − 56R1 + 35R0 ) ≥ 0, (19) 4 128 ... Inequality (14) provides a lower bound on R2 (the two- We denote these inequalities by Sn where n is the number point bound yields an upper bound R2 ≤ R0 ), while of time points used (cycle number +1). The Sn inequali- (15) offers a refined upper bound on R1 . Since R0 ≥ Pn (n) ties can be written as Sn = k=0 wk Rk ≥ 0 where the 4 (R2 + 3R0 ) this bound is always tighter than the two- 1 (n) point bound R0 ≥ R1 . Interestingly this bounds is using coefficients wk alternate sign as k increases, and they information on R2 , so the two endpoints are used for (n) (n) Pn Pn satisfy k=0 wk = 0 and k=0 wk = 1. As shown bounding the midpoint. Inequality (16) compares the later, when n is sufficiently large the coefficients take the change in the survival probability in the first half to the (n) k k2 cumulative change R0 − R2 . It suggests that the change form: wk → (−1) √ πn e− n Rk . cannot occur just in the second half of the evolution; at least a quarter must take place in the first half. Similarly one can write 3(R0 −R1 ) ≥ R1 −R2 and directly compare 1. More general and optimized bounds the two halves. Note however that in this form the right hand side might become negative. Another added value The Sn is just one family in a continuum of inequali- of the form (16) is that it makes it easier to compare ties. While the Sn inequalities have simple form and ap- with the two-point inequalities R0 ≥ R1 and R0 ≥ R2 . pealing analytical properties that will not be discussed The inequality (16) shows that R0 − R1 is not just non- in this paper, presently we make no claim of optimality negative but also larger than another non-negative num- according to some metric. In the following, we explore ber, 14 (R0 − R2 ). Thus, it is tighter than the two-point the continuum of four-point inequalities. Consider the prediction R0 − R1 ≥ 0. stencil with M = 1, We emphasize again that pure states in two-point schemes lead to trivial and not useful results. Here, we r0 = ρ0 + aρ1 + bρ2 . (20) obtain non-trivial bounds that involve pure states. This is an intrinsic feature of our framework, which plays im- A slightly more general form would be r0 = ±ρ0 + aρ1 + portant role when studying quantum processors. bρ2 however both options lead to the same final result. Using the recipe above we get the following inequality: −bR3 + (−a + 2b + ab)R2 + (−1 + 2a − b − (a − b)2 )R1 A. Multi-time-point inequalities + (1 − a + a2 + b2 + ab)R0 ≥0 (21) The following recipe can be used to obtain more gen- eral periodicity bounds: We notice that the left hand side, which we denote by PN L(a, b), is a second order polynomial in a and b, where • Choose a stencil of the form r0 = i=0 αi ρi (αi are the coefficients of a, b, ab, a2 , b2 , 1 depend on {Rn }N n=0 . +1 real numbers) • Choose the value of M in rM B. Optimization for incoherent error detection • Expand the parenthesis in tr[r0 (r0 − rM )] ≥ 0 In the absence of a heat leak L(a, b) ≥ 0, but in the • Replace tr[ρ2n ] → R0 = tr[ρ20 ] presence of a heat leak L(a, b) might be positive for some choices of a and b and negative for others. It is also • Replace tr[ρn ρn+m ] → Rm = tr[ρ0 ρm ] possible that L(a, b) is not negative for any choice of a and b. In that case, the heat leak is not detectable with This will generate an inequality with M + N time points four-point periodicity inequalities. One option to find (including the initial state). the best values of a and b for heat leak detection, is to In the following we make the specific choice r0 = scan their values and look for negative values of L(a, b). ( 12 )N DN , where DN is the shifted discrete derivative Fortunately, this can be avoided by studying the explicit D1 = ρ1 − ρ0 , D2 = ρ2 − 2ρ1 + ρ0 , ... The shift of the expression of L(a, b). In a given physical scenario (initial center point is chosen such that the derivative will not condition+driving protocol) {Rn }N n=0 are just constant +1
5 positive numbers and L(a, b) is a second order polynomial The expression ( 21 − 14 A− − 14 A+ )n−1 describes an n − 1 with known and fixed coefficients. Next we check which random walk steps with probability of 1/4 to move one type of paraboloid L(a, b) is. In the limits a → ±∞ and step forward, 1/4 to step backward and 1/2 to stay in b → ±∞ we get L(a, b) → (a2 + b2 )(R0 − R1 ). Since for place. From the central limit theorem the probability for pure states R0 = 1, R1 ≤ 1 (even in the presence of a heat moving moving k steps forward is: leak) it follows that the paraboloid has a minimum rather k2 than a maximum or a saddle point. For mixed-state ini- 1 e − 2 (n−1) 2σ0 =p 1 k2 e− (n−1) , (27) tial condition, it can be shown that R0 − R1 < 0 but p 2πσ02 (n − 1) π(n − 1) this already indicates a heat leak and there is no need to study (21), which involves 3 cycles. We conclude that the where we used: σ02 = 1 2 ·0+2· 1 4 · 1 = 21 . Applying this most negative value of L(a, b) occurs when ∂a L(a, b) = 0 to eq. (26) we find and ∂b L(a, b) = 0, we denote by amin and bmin the so- n−1 lution to these two equations. Finding amin , bmin we get X 1 k2 Sn = (−1)k p e− n−1 R|k| that L(amin , bmin ) ≥ 0 is equal to π(n − 1) k=−n+1 (2R0 − R1 − 2R2 + R3 ) (n−1) × 1 X 1 k2 (R0 − R2 )(3R0 − 4R1 + R2 ) =p R0 + 2 (−1)k p e− n−1 Rk . π(n − 1) π(n − 1) R02 − R0 (R1 + R3 ) − (R1 − R2 )2 + R1 R3 ≥ 0 k=1 (22) (28) This bound is nonlinear in the expectation value Rn Next, we set a bound on the sum from L to n − 1. since the expectation values are being used to choose the n−1 n optimal stencil for detection. If the inequalities that in- (−1)k k2 1 k2 e− (n−1) Rk ≤ e− (n−1) X X p p volves R0 , R1 , R2 , i.e. R0 −R2 ≥ 0 and 3R0 −4R1 +R2 ≥ k=L π(n − 1) k=L π(n − 1) 0 (S3 and S2 ), hold, then the nonlinear bound (22) sim- ∞ 1 k2 plifies to X ≤ p e− n−1 k=L π(n − 1) R02 − R0 (R1 + R3 ) − (R1 − R2 )2 + R1 R3 ≥ 0. (23) 1 L ' erfc( √ ) Just for clarity we point out that the nonlinearity in this 2 n−1 inequality is entirely different from the density matrix 1 L2 nonlinearity usually considered in quantum information + p e− (n−1) . (29) 2 π(n − 1) and quantum thermodynamics (e.g. the von Neumann √ entropy Svn = −tr[ρ ln ρ]). Here the nonlinearity appears For convenience we set L = ξ n − 1 and get outside the trace. n−1 X 1 k2 1 2 2 p e− n−1 ' erfc(ξ) + p e−ξ . k=L π(n − 1) π(n − 1) C. Low cost evaluation of the Sn periodicity inequalities (30) From (28) and (30) we finally obtain We introduce the notation A± ρn = ρn±1 , and use M = √ L−1 1 and r0 = ( 12 )N DN in the recipe in Sec. I A to get: X Sn(L=ξ n−1) = wk Rk Sn+1 = 21n tr[ρ0 (1−A− )n [(1−A+ )n −A+ (1−A+ )n ρ0 ] ≥ 0 k=0 where after the expansion we substitute Aj± ρn = ρ|n±j| . n−1 X 1 k2 ≥ −2 (−1)k p e− n−1 Rk 1 π(n − 1) Sn+1 = tr[ρ0 (1 − A− )n (1 − A+ )n (1 − A+ )ρ0 ]. k=L 2n 1 2 (24) ≥ −erfc(ξ) − p e−ξ . (31) π(n − 1) Next, we use A+ ⇐⇒ A− to obtain another expression For example, to get an error of 5×10−3 in the calculation for Sn of S1000 (1000 cycles), only 64 cycles need to be measured Sn+1 = 1 tr[ρ0 (1 − A+ )n (1 − A− )n (1 − A− )ρ0 ]. (ξ = 2). For an accuracy of 10−5 , 100 cycles are needed 2n (ξ = π), and 126 measured cycles already yield an accu- (25) racy of 2 × 10−8 . We emphasize that in practice the ac- curacy is limited by statistical noise. For example in the Taking the mean of the two expressions and using (1 − experiment in section II B the truncation error is 1/65 of A− )n (1 − A+ )n = (2 − A− − A+ )n yields the 3σ-width when taking 24 points (ξ = 2.1). For thirty 1 1 1 points (ξ = 2.63), the truncation error is already 1/1000 Sn = tr[ρ0 ( − A− − A+ )n−1 ρ0 ] (26) of the 3σ width. 2 4 4
6 D. Reduction of the measured subspace by using mixed states In this section we point out that a combination of pure states and mixed states can be useful. If only a subsystem of the whole system is of interest, it is possible to use the following initial state ρ̃0 = |ψsubsys i hψsubsys | ⊗ Irest /Nrest , (32) Figure 1. (a) a circuit for demonstrating heat leak detection with pure initial state. The initial condition is |ψ0 i hψ0 | in where |ψsubsys i hψsubsys | is a pure state in the space of the upper two qubits which constitute the system and the the subsystem, and Irest /Nrest is a fully mixed state and bottom environment qubit is initially in |0i h0|. The survival Nrest = tr(Irest ). The observable Nrest ρ̃0 leads to the probability of the two upper spins is measured after one cycle expectation value in one experiment, and after two cycles in a different exper- iment. (b) The experimental values of S3 for various input Rnsubsys = Nrest tr[ρ̃0 ρn ] = tr[|ψsubsys i hψsubsys | ρsubsys n ], states carried out on the IBM London processor. The neg- (33) ative value for |ψ0 i = |+a 0b i indicates the detection of the which is the survival probability in the measurable sub- environment. This illustrates detection of environment using system. This can be used in systems where some degrees pure state which is impossible in alternative thermodynami- of freedom, e.g. translational or internal, cannot be easily cally inspired frameworks. Interestingly, only quantum initial condition leads to detection in this setup (superposition is measured. required). II. EXPERIMENTAL DEMONSTRATIONS state heat leak detection. We present a proof-of-principle We present experimental results carried out on the experiment for heat leak detection using pure states. Our IBM superconducting quantum processors and a TIQC. setup, shown in Figure 1(a), is composed of a two-qubit Each example illustrates different features of the new system (the visible system) coupled to one environment bounds. qubit. The initial state is created by the single qubit gates which are not shown in the Figure. The single cnot gate between the upper two qubits constitutes the A. Heat leak detection with a pure initial condition periodic unitary, i.e. the “cycle”. The experiment is composed of three sub-experiments In some setups such as digital quantum computers, for measuring R0 , R1 and R2 . Since the detector mea- pure state initial condition are more natural to use com- sures in the computational basis, the inverse of the prepa- pared to mixed states which require some dedicated ration circuit is applied before the detector. As a result preparation protocol (e.g. see [14] and [22]). It is natu- the probability of measuring the state |00i in the detec- ral, then, to ask if pure states can be used to detect heat tor corresponds to the survival probability. We tested leaks. several different input states: |00i , |01i , |10i , |11i, and One of the key assumptions behind the second law in |1+i. Our goal is to observe a violation of S3 when the quantum microscopic systems [27] is that the von Neu- environment is connected, and no violation when it is mann entropy of the overall system (including baths) disconnected. Figure 1(b) shows that states in the com- does not decrease with respect to its initial value, Sftot − putational basis cannot detect the violation but the su- S0tot ≥ 0. The equality is obtained for unitary maps perposition state |1+i can. The uncertainty values show while the inequality is associated with more general uni- that the average value is greater than the 3σ statistical tal maps, e.g., dynamics that include decoherence. A uncertainty. heat leak can be detected by the second law only if it Interestingly, the circuit is completely classical for decreases the total entropy, e.g. due to unaccounted “classical” binary input, i.e. diagonal states in the com- spontaneous emission. If the initial state is pure, the putational basis. The positive values for the computation initial entropy is zero S0tot = 0 and it is not possible to basis input [Fig. 1(b)] imply that in this circuit no classi- decrease it any further. Hence pure states can not be cal binary input (including stochastic inputs) can lead to used to detect heat leaks using the second law. A sim- heat leak detection. Yet quantum superposition of two ilar problem appears in global passivity and in resource “classical” binary states can detect the coupling to the theory. As an example, in the present approach S2 yields environment. This shows a quantum aspect of heat leak R0 ≥ R1 . Noting that pure states satisfy R0 = trρ20 = 1, detection. While this example does not involve a strong and R1 ≤ 1, it follows that the two-point inequality S2 quantum feature such as entanglement it is still inter- cannot detect heat leaks when the initial state is pure. esting and it naturally raises the question if entangled Surprisingly, the periodicity inequalities studied here states can lead to detection of heat leaks that cannot be are free from this limitation which paves the way to pure detected using classically correlated states.
7 B. Detection of realistic heat leaks The question that naturally arises is whether this method can detect the real physical environment of the quantum processors. The following experiment shows that the real environment is indeed detectable when ex- ploring larger numbers of cycles. The one-cycle circuit we use is shown in the inset of Fig. 2 where θ = 1. Qubits 1 and 2 of the IBM Santiago processor are initialized in Figure 2. Inset: the circuit used for evaluating the Sn inequal- the state |00i. Figure 2(a) shows the values of Sn as a ities under the intrinsic noise of the IBM processors. The function of the number of points (cycles +1). The width initial condition is the ground state. Ry is a single qubit ro- tation around the y axis. (a) For qubits 2 & 3 of the Santiago of the line corresponds ±3σ uncertainty. Hence, starting processor and θ = 1.0, the environment leads to a violation from 17 points, one can see a violation beyond the 3σ after 17 cycles. (b) Running the same experiment on qubits 5 uncertainty. & 6 of the Casablanca processor and θ = 0.1, no violation is Figure 2 shown the results of a similar experiment car- observed for the number of cycle we were able to run in this ried out on the IBM Casablanca processor, for 65 cycles experiment. (c) Using the√ extrapolation described in Sec. I C (66 time points) and θ = 0.1. The value of θ was modi- based on the favorable n scaling, a violation is observed af- fied from the previous experiment as we want to demon- ter 130 cycles. The extrapolation can be used to detect a heat strate a different phenomenon. Crucially, as explained leak using the first 65 cycles (blue) or even just the first 28 in Sec. I C the number √ of physical cycles for evaluating cycles (red). Sn can be M = ξ n, where ξ depends on the needed accuracy. Setting ξ = π and M = 66, we extrapolate up to (66/π)2 = 440 with an error of 10−5 , which is a fully mixed state it will still be hard to detect. In [11] a not observable on the scale of the Figure. The bound bound was derived on the environment temperature Tenv given in eq. (30) on the tail of Sn is rather loose since for the detection of heat leaks using observables in the (n) energy basis: it assumes that the signs of the coefficients wk do not alternate as a function of k, and that all survival proba- max(Eenv ) − min(Eenv ) bilities are one. In practice the contribution of the tail to Tenv ≤ Tundet = , (34) min(Bnvis − Bn−1 vis ) the sum can, therefore, be much smaller. The red band shows extrapolation based on only 28 points. Accord- where Bnvis is the n-th eigenvalue of − ln ρsys (sorted in ing to eq. (30) at n = 150 the error should be smaller an increasing order of their size). Hence, if the tempera- than 1.5 × 10−3 , which is too big to confirm a violation. ture of the environment exceeds Tundet , then no passivity- Yet, in practice, at n = 150 the extrapolation based on based inequality can detect the presence of the environ- 28 points is indistinguishable from the one exploiting 65 ment. However, this bound is based on the “one-cycle points. In general, it is possible to start with a small scheme”, in contrast to the multi-cycle approach pre- number of cycles, and then add more cycles until conver- sented in this paper that combines information taken gence is achieved at the extrapolated point. from different numbers of cycles. Thus, the periodic- Up to about 170 cycles the right hand side of eq. (31) ity inequalities have the potential to detect this type is negligible, which means that a violation corresponds of environments. In the following experiment we used to values below zero. Thus, we observe that with only 28 the circuits shown in Figure 3(a). To generate thermal cycles, and the same number of shots (i.e. without using qubits for the environment and the system, an ensemble more data to reduce the uncertainty) the IBM heat leak of pure states is used (see [14]). The inverse tempera- is detectable with this simple circuit. Note, that other tures βh = 0.6, βc = 3.5 and βe = 0.5 were chosen so circuits can detect the leakage much faster, but the goal√ that the condition give in eq. (34) guarantees that the of this example is to illustrate the advantage of the n environment is too hot to be detected using one-cycle in- scaling. Once can also choose the value of ξ according to equalities on observables. As indicated by the negative the desired accuracy. value of the 3rd bar in Figure 3(b), by evaluating the op- timized four-point inequality (23) the heat leak becomes detectable. C. Heat leak detection beyond the hot-environment limit D. A three-qubit gate in trapped ions and Heat leaks created by hot environments deserve special superconducting circuits attention. In the extreme case where the environment is fully mixed, the observed system experiences unital Next, we show a specific yet important scenario where dynamics and therefore cannot be detected using second- in the absence of heat leaks, the Sn inequalities have law-like inequalities or global passivity inequalities. One simple outputs. Consider a gate U such as cnot, Toffoli can expect that if the environment is slightly less hot than (ccnot), Fredkin (cswap), etc. that satisfies U |ψA i =
8 Figure 4. When a circuit changes the initial state to an or- thogonal state, and in the next cycle returns to the initial state it holds that Sn = 1/2. (a) Sn values for various quan- tum processors where the circuit contains a single Toffoli gate. Figure 3. An experiment that confirms the capability of the The plot shows that the TIQC exceeds the performance of periodicity inequalities to detect hot environments which can- various IBM processors which are further away from 1/2. (b) not be detected using two-point passivity-based bounds [see The comparison of the theoretical and experimental values of eq. (34)]. Running the circuit (a) for two and three cycles, exp the survival probabilities, |Rn − Rn |, seems like a reasonable we observe in (b) that the S3 and S4 inequalities are not vio- choice for comparing different processors. Yet, this quantity lated but the optimized four-point inequality is violated and strongly fluctuates and in this case there is no processor that therefore confirms the coupling to the hot qubit ’e’. The ex- is consistently better at all time points. In contrast, the Sn periment was done on the Ourense IBM processor. See text shows a clear and consistent difference between the various for details. processors. (c) Same as (a), but this time the cycle contains two consecutive Toffoli gate. In this case, the ideal evolution yields Sn = 0. Here as well, the TIQC performs better than |ψB i , U |ψB i = |ψA i i.e. U is a two-state permuta- the tested IBM superconducting quantum processors. tion, i.e. U 2 is the identity operator. If the initial condition is ρ0 = |ψA i hψA | or ρ0 = |ψB i hψB | then the ideal output is Rn = {1, 0, 1, 0, 1, ...}. As a result In our next test, we grouped pairs of Toffoli gates as a Pbn/2c Sn = k=0 w2k = 1/2. When the predicted Rn is so single cycle. The survival probability for this two-Toffoli simple, there are many ways to quantify the deviation (n) Pn cycle is Rn0 = R2n = {1, 1, 1...}. Since k=0 wk = 0 it of the device from its expected behavior. For example, n (n) follows that for an ideal evolution Sn0 = k=0 wk R2k = P one can use|Rnexp − Rn |. However, this quantity is always Pn (n) positive and a large value of |Rnexp − Rn | can appear due k=0 wk = 0 for all n. Figure 4(c), shows the experi- to coherent error and is, therefore, not directly associated mental values of Sn0 for the various quantum processors. with a heat leak. In contrast, negative values of Sn are a clear indication of a heat leak. In our last experiment we run sequentially the Tof- CONCLUDING REMARKS foli gate with the initial state |1A 1B 0C i where A and B are the controlling qubits. The experiment was car- We have presented a set of multi-cycle inequalities valid ried out both on the IBMQ superconducting processors for periodically driven quantum systems. The measured and on a TIQC. The TIQC results were obtained on the quantity is the survival probability and the initial state University of Maryland Trapped Ion (UMDTI) quantum can be pure. These two features are very appealing for computer which is described in [28]. This experiment isolated quantum systems such as quantum computers was performed using a linear chain of five 171 Yb+ ions in and simulators. Our first experiment demonstrates heat a room-temperature Paul trap under ultrahigh vacuum leak detection when the visible system starts in a pure with the qubit encoded in two hyperfine ground states of state, and the environment was simulated by a qubit Yb+ . We re-analyze raw data from results reported in that can be either coupled or decoupled. To the best [29], where three of the five ions treated as qubits while of our knowledge, heat leak detection with pure states the others remained idle. For more information on the is presently unique to the presented periodicity bounds. UMDTI hardware, see Appendix II. Furthermore, we have demonstrated a certain quantum Figure 4(a) shows the Sn plots for various IBM proces- advantage when the input state is quantum. While this sors and the UMDTI as a function of the number of cycles advantage is not claimed to be a generic effect, it moti- n. The |Rnexp − Rn | deviation with respect to the ideal vates further study. Specifically, it is interesting to check output is depicted in Figure 4(b). While the |Rnexp − Rn | if entangled states can assist in heat leak detection. fluctuates, the Sn curves are monotonically decreasing. In the second experiment we put our bounds to the The deviation from 1/2 can arise from a coherent error challenge of detecting the intrinsic heat leak of the IBM in the implementation. It appears that the TIQC data is machine. We were able to detect the heat leak and the closest to the predicted 1/2 value. Using tools which demonstrate a scaling law that makes our bounds effi- are beyond the present paper one can prove[30] that the cient: when the number of cycles exceed√a few dozen, Sn series must monotonically decrease if the evolution is then n-cycle inequalities require only O( n) measured unitary and periodic. Thus, an increase in the Sn plot is data points. For example, for the inequality S1000 that an indication for a heat leak, which is not observed here. formally needs measurements of 1000 data points, it is
9 enough to measure the first 65 − 126 points and the error and therefore the system will return to its initial state will be smaller than 10−5 . Our third experiment demon- i.e. |ψf i = |ψi i . As a result, the survival probability strates that our bounds can circumvent the fundamental 2 |hψi |ψf i| = 1 for an ideal device. limitation in detecting very hot environments using one- In a realistic device, the implemented unitary V will cycle bounds based on observables only, i.e. without re- be different from U . Similarly, the implemented inverse sorting to non observable information measures such as circuit denoted by V 0 will be different from U −1 . When entropy. Our final experiment exploits our inequalities the errors are incoherent, .i.e., originate in some cou- and a circuit based on the Toffoli gate to quantify the pling to the environment, it is expected that the error performance difference between a TIQC and supercon- in both circuits will not cancel each other and therefore ducting processors. 2 |hψi |ψf i| < 1. Potentially, coherent errors in both cir- Presently, we do not claim or suggest that these bounds cuits could compensate each other. The following exam- will necessarily mature into a practical method for diag- ple shows that this does not happen in general. In Figure nosing quantum circuits. First, a clear meaning of the 5 the given circuit is a simple cnot (dashed box). The im- amount of violation is still missing. Second, it is yet plemented unitary V (solid red line) contains a coherent unclear if any type of heat leak or malfunction can be error in the form of a single qubit rotation on the upper detected using these bounds or some variants of it. In qubit. Not knowing about the coherent error, the inverse particular, it is unclear whether a system that passes all of a cnot is a cnot and the computer is instructed to im- possible periodicity tests is indeed flawless. That being plement another cnot as the inverse. Thus since V 2 6= I said, this method has three appealing features that make the survival probability is smaller than one it worth exploring. The first is the operational advan- tage: it uses pure states and only the survival probability 2 2 |hψi |ψf i| = |hψi |V 0 V | ψi i| = ψi V 2 ψi 2
10 the qubits disentangled from these motional degrees of freedom at the end of the gate operation [34, 35]. [1] RJ Harris and GM Schütz. Fluctuation theorems for [18] Easwar Magesan, Jay M Gambetta, and Joseph Emerson. stochastic dynamics. Journal of Statistical Mechanics: Characterizing quantum gates via randomized bench- Theory and Experiment, 2007(07):P07020, 2007. marking. Physical Review A, 85(4):042311, 2012. [2] Udo Seifert. Stochastic thermodynamics, fluctuation the- [19] Timothy Proctor, Kenneth Rudinger, Kevin Young, Mo- orems and molecular machines. Reports on Progress in han Sarovar, and Robin Blume-Kohout. What random- Physics, 75(12):126001, 2012. ized benchmarking actually measures. Physical review [3] Christopher Jarzynski. Equalities and inequalities: irre- letters, 119(13):130502, 2017. versibility and the second law of thermodynamics at the [20] David C McKay, Sarah Sheldon, John A Smolin, Jerry M nanoscale. Annu. Rev. Condens. Matter Phys., 2(1):329– Chow, and Jay M Gambetta. Three-qubit randomized 351, 2011. benchmarking. Physical review letters, 122(20):200502, [4] Matteo Polettini, Alexandre Lazarescu, and Massimil- 2019. iano Esposito. Tightening the uncertainty principle for [21] Raam Uzdin and Nadav Katz. Experimental detection of stochastic currents. Physical Review E, 94(5):052104, microscopic environments using thermodynamic observ- 2016. ables. arXiv preprint arXiv:1908.08968, 2019. [5] André M. Timpanaro, Giacomo Guarnieri, John Goold, [22] D Zhu, S Johri, NM Linke, KA Landsman, C Huerta and Gabriel T. Landi. Thermodynamic uncertainty re- Alderete, NH Nguyen, AY Matsuura, TH Hsieh, and lations from exchange fluctuation theorems. Phys. Rev. C Monroe. Generation of thermofield double states and Lett., 123:090604, Aug 2019. critical ground states with a quantum computer. Proceed- [6] Timur Koyuk, Udo Seifert, and Patrick Pietzonka. A ings of the National Academy of Sciences, 117(41):25402, generalization of the thermodynamic uncertainty relation 2020. to periodically driven systems. Journal of Physics A: [23] IM Bassett. Alternative derivation of the classical second Mathematical and Theoretical, 52(2):02LT02, 2018. law of thermodynamics. Physical Review A, 18(5):2356, [7] Andre C. Barato and Udo Seifert. Thermodynamic un- 1978. certainty relation for biomolecular processes. Phys. Rev. [24] Albert W Marshall, Ingram Olkin, and Barry C Arnold. Lett., 114:158101, Apr 2015. Inequalities: theory of majorization and its applications, [8] Michał Horodecki and Jonathan Oppenheim. Fundamen- volume 143. Springer, 1979. tal limitations for quantum and nanoscale thermodynam- [25] Michał Horodecki, Paweł Horodecki, and Jonathan Op- ics. Nature communications, 4:2059, 2013. penheim. Reversible transformations from pure to mixed [9] Fernando Brandão, Michał Horodecki, Nelly Ng, states and the unique measure of information. Physical Jonathan Oppenheim, and Stephanie Wehner. The sec- Review A, 67(6):062104, 2003. ond laws of quantum thermodynamics. Proceedings of the [26] Martí Perarnau-Llobet, Elisa Bäumer, Karen V Hovhan- National Academy of Sciences, 112(11):3275–3279, 2015. nisyan, Marcus Huber, and Antonio Acin. No-go theorem [10] Raam Uzdin and Saar Rahav. Global passivity in micro- for the characterization of work fluctuations in coherent scopic thermodynamics. Phys. Rev. X, 8:021064, 2018. quantum systems. Physical review letters, 118(7):070601, [11] Raam Uzdin and Saar Rahav. The passivity deformation 2017. approach for the thermodynamics of isolated quantum [27] Raam Uzdin. The second law and beyond in micro- setups. Phys. Rev. X Quantum, 2:010336, 2021. scopic quantum setups. As a chapter of: F. Binder, [12] Hsin-Yuan Huang, Richard Kueng, and John Preskill. L. A. Correa, C. Gogolin, J. Anders, and G. Adesso Predicting many properties of a quantum system from (eds.), "Thermodynamics in the quantum regime - Recent very few measurements. Nature Physics, 16(10):1050– Progress and Outlook", (Springer International Publish- 1057, 2020. ing). arXiv: 1805.02065, 2018. [13] Marco Paini, Amir Kalev, Dan Padilha, and Brendan [28] Norbert M Linke, Dmitri Maslov, Martin Roetteler, Ruck. Estimating expectation values using approximate Shantanu Debnath, Caroline Figgatt, Kevin A Lands- quantum states. arXiv preprint arXiv:2011.04754, 2020. man, Kenneth Wright, and Christopher Monroe. Exper- [14] Ivan Henao, Raam Uzdin, and Nadav Katz. Experimen- imental comparison of two quantum computing architec- tal detection of microscopic environments using thermo- tures. Proceedings of the National Academy of Sciences, dynamic observables. arXiv preprint arXiv:1908.08968, 114(13):3305–3310, 2017. 2019. [29] Prakash Murali, Norbert Matthias Linke, Margaret [15] Bartłomiej Gardas and Sebastian Deffner. Quantum fluc- Martonosi, Ali Javadi Abhari, Nhung Hong Nguyen, and tuation theorem for error diagnostics in quantum anneal- Cinthia Huerta Alderete. Full-stack, real-system quan- ers. Scientific reports, 8(1):17191, 2018. tum computer studies: Architectural comparisons and [16] Lorenzo Buffoni and Michele Campisi. Thermodynamics design insights. In 2019 ACM/IEEE 46th Annual Inter- of a quantum annealer. Quantum Science and Technol- national Symposium on Computer Architecture (ISCA), ogy, 2020. pages 527–540. IEEE, 2019. [17] Joseph Emerson, Robert Alicki, and Karol Życzkowski. [30] Manuscript in preparation. Scalable noise estimation with random unitary operators. [31] Klaus Mølmer and Anders Sørensen. Multiparticle en- Journal of Optics B: Quantum and Semiclassical Optics, tanglement of hot trapped ions. Physical Review Letters, 7(10):S347, 2005. 82(9):1835, 1999.
11 [32] Enrique Solano, Ruynet Lima de Matos Filho, and Nicim [34] Shi-Liang Zhu, Christopher Monroe, and L-M Duan. Zagury. Deterministic bell states and measurement of the Arbitrary-speed quantum gates within large ion crystals motional state of two trapped ions. Physical Review A, through minimum control of laser beams. EPL (Euro- 59(4):R2539, 1999. physics Letters), 73(4):485, 2006. [33] GJ Milburn, S Schneider, and DFV James. Ion trap [35] Taeyoung Choi, Shantanu Debnath, TA Manning, Car- quantum computing with warm ions. Fortschritte der oline Figgatt, Z-X Gong, L-M Duan, and Christopher Physik: Progress of Physics, 48(9-11):801–810, 2000. Monroe. Optimal quantum control of multimode cou- plings between trapped ion qubits for scalable entangle- ment. Physical review letters, 112(19):190502, 2014.
You can also read