<<

arXiv:2011.00127v1 [quant-ph] 30 Oct 2020 fpriua neeti:frwihpis( pairs which for is: interest particular of yCiodgts natpclqatmcmuain hs savings these computation, quantum typical a In required. gates. Clifford by oicuetoewihare pr which resour teleportation those efficient ancillary these the include admitting half to gates using hierarchy gates, Clifford t hierarchy of enables Clifford that diagonal protocol teleportation e.g. one-bit the introduced [15] ihrlvl a eipeetdvaarcrieprocedure. recursive a via implemented be can levels higher o xdnumber fixed a For n eodlvl epciey ae ftetidlvlcnb implem be can level third the of Gates respectively. levels second and ae;tepstv integers positive the gates; hagas nrdcdthe introduced also Chuang vrqatmsses rtcino ihysniieqatmdat quantum sensitive of highly field of the Protection surmountin motivates requires systems. practice quantum in over realisation their However, devices. unu optto.T civ unu nvraiy hs sch pr su these to a universality, 4) form gates. quantum not (Definition non-Clifford achieve do perform gates To however, Clifford gates, computation. Clifford of quantum of set error- set related classical The of the computations. generalisations and [5]: 3) codes (Definition stabiliser com on Most based schemes. are redundancy-based naive forbids thereby and eeotto,ta nbe efrigcrannnCiodgates state non-Clifford certain magic performing enables that teleportation, ∗ [email protected] h motneo h aiiso lffr n eiCiodgtsmotiva gates semi-Clifford and Clifford of families the of importance The ihtega frdcn h eoreoeha ot ffault-t of costs overhead resource the reducing of goal the With unu optr odgetpoiea ol o ovn problems solving for tools as promise great hold computers Quantum unu ro orcini opiae ytefc htteno-c the that fact the by complicated is correction error Quantum otsa-hag[]itoue h ehiu of technique the introduced [6] Gottesman-Chuang ai ttsaeqatmrsucsta a epeae nadv in prepared be can that resources quantum are states Magic . h ojcueta ihrlvlgtscnb mlmne e implemented be can gates th higher-level prim via that any gathered conjecture (of evidence qudit the one Numerical of gate efficiently. level implemented third every that prove th and th for of (2016) Cui-Gottesman-Krishna proof to concise due a hierarchy gates and hierarchy Clifford gates, the semi-Clifford of diagonalising manner. gates uniform all a enumerating in dimensions recursively higher to extending (2010) towards Beigi-Shor mechanics stabiliser qudit of setting formalism qudit higher-dimensional questions the many in gates, true of resourc especially sets efficie quantum is these admit ancillary of fewer they importance with practical gates important: these particularly implement Cliffor are the gates of gates Clifford Diagonal computation. quantum tolerant egnrls h ffiin aetlprainpoooso s of protocols teleportation gate efficient the generalise We Neum Stone-von discrete the leverage to is contribution Our quantum of sets of sequence nested a is hierarchy Clifford The ffiin unu aetlpraini ihrdimensions higher in teleportation gate quantum Efficient n al-oeatqatmcomputation quantum fault-tolerant fqbt,teCiodheacy(ento )frsanse seque nested a forms 5) (Definition hierarchy Clifford the , of k eiCiodgates semi-Clifford lffr hierarchy Clifford eateto ple ahmtc n hoeia Physics Theoretical and Mathematics Applied of Department eoe the denotes etefrQatmIfrainadFoundations, and Information Quantum for Centre nvriyo abig,Cmrde UK Cambridge, Cambridge, of University ,k n, level r all are ) .INTRODUCTION I. eso ae htamtfuttlrn aetlprainprot teleportation gate fault-tolerant admit that gates of sets : fteCiodheacy h al n lffr ae omtefirst the form gates Clifford and Pauli The hierarchy. Clifford the of Dfiiin6.Ta s hs hc r,i es,diagonalisable sense, a in are, which those is, That 6). (Definition aihd Silva de Nadish n unu aeteleportation gate quantum -, . k eipeetto fcranCiodheacygates, hierarchy Clifford certain of implementation he t ee ae semi-Clifford?. gates level -th o cee o al-oeatqatmcomputation quantum fault-tolerant for schemes mon na nu tt negvnacs oa appropriate an to access given once state input an on . lrn unu optto,Zhou-Leung-Chuang computation, quantum olerant orcigcdsta mlyPuisi operations Pauli employ that codes correcting eut fZn-hn-hag(08 and (2008) Zeng-Cheng-Chuang of results oigtermfristecpigo unu data quantum of copying the forbids theorem loning ∗ h hlegspsdb h edfrfiecontrol fine for need the by posed challenges the g ipeagrtmfrrcgiigand recognising for algorithm simple a , cetyrc e fgtst efr narbitrary an perform to gates of set rich fficiently tcl a xaddb egCe-hag[14] Zeng-Chen-Chuang by expanded was otocols bu hi tutr eanoe;this open; remain structure their about fficiently. Clifford diagonal the of classification e gis rosidcdb niomna noise environmental by induced errors against a msms esplmne ihteaiiyto ability the with supplemented be must emes irrh n nal ignl semi- diagonal’ ‘nearly and hierarchy d igeqdtcase. single-qudit e r utpidb h aytmssc aeis gate a such times many the by multiplied are frmnindagrtm supports algorithms aforementioned e m-lffr ae oteqdtsetting qudit the to gates emi-Clifford ieso)ado w urt a be can qutrits two of and dimension) e for algorithm simple a give further We e eurdi h rgnlpooo.Teclass The protocol. original the in required ces ssc smgcsae.Dsiethe Despite states. magic as such es ne ihmgcsae f2 of states magic with ented tgt eeotto rtcl that protocols teleportation gate nt tc h nert fqatmdt during data quantum of integrity the otect n hoe n h symplectic the and theorem ann eodtecpblte feitn classical existing of capabilities the beyond e h td ftersrcue question A structure. their of study the ted ae rtclt civn fault- achieving to critical gates neo optto.Gottesman- computation. a of ance aito nsadr quantum standard on variation a , nce C k n n fst of sets of uis ae of Gates qubits. n -qubit ocols. 2

• In the case of one- or two-qubit gates, all gates of the Clifford hierarchy are semi-Clifford [14]. • In the case of three-qubit gates, all gates of the third level of the Clifford hierarchy are semi-Clifford [14]. • In the case of n> 2,k> 3, there exist n-qubit gates that are in the k-th level of the Clifford hierarchy but are not semi-Clifford [14]. • In the case of n> 3, k = 3, there exist n-qubit gates that are in the k-th level of the Clifford hierarchy but are not semi-Clifford (Gottesman-Mochon, 2009).

In this work, we will extend the study of semi-Clifford gates and their efficient gate teleportation protocols to the higher-dimensional qudit setting by raising the question: for which triples (d, n, k), where d is a prime dimension, are all n-qudit, k-th level gates semi-Clifford?. Cui-Gottesman-Krishna [4] recently characterised the diagonal gates of the qudit Clifford hierarchy. No prior work exists on qudit semi-Clifford gates, to the best of our knowledge. We further give an algorithm for constructing all gates of the Clifford hierarchy. The procedure for generating magic states is more efficient for qudits than in the qubit case [3]. It is not unreasonable that practically realisable quantum computers will one day be based on qudits rather than qubits. In any case, the mathematical and algorithmic techniques, as well as conjectures we propose with supporting numerical evidence, should benefit the wider project of elucidating the complete structure of the Clifford hierarchy and the semi-Clifford gates. The unifying theme of the results below is the application of the discrete Stone-von Neumann theorem towards studying the Clifford hierarchy. The Stone-von Neumann theorem [12, 13] asserts the essential equivalence of all representations of the fundamental quantum commutation relations and was originally motivated by the problem of unifying the matrix and wave mechanics pictures of early quantum theory [11]. This generalises a technique implicitly employed by Beigi-Shor [2] in studying case of qubit third level gates. We argue that this perspective is useful in understanding all levels of the Clifford hierarchy and in higher dimensions.

A. Summary of main results

• A streamlined proof of the discrete Stone-von Neumann theorem (Lemma 7) and a compact expression for the unitary that carries the basic Pauli gates to prescribed, admissible targets: any unitary representation of the Heisenberg group (Theorem 3). • A simple algorithm for recursively enumerating all gates of the Clifford hierarchy (Algorithm 1). • A simplified statement and elementary proof of Cui-Gottesman-Krishna’s classification of diagonal gates of the Clifford hierarchy (Theorem 6) in the single-qudit case. • A generalisation of the efficient gate teleportation protocol of Zhou-Leung-Chuang for qubit semi-Clifford gates to the qudit case (Section V A). • A novel strengthening of a characterisation of semi-Clifford gates (Theorem 7) and an algorithm for recognising and diagonalising semi-Clifford gates (Algorithm 2). • A proof that all third level gates of one-qudit (of any prime dimension) or two-qutrits are semi-Clifford (Theorem 8) and numerical evidence suggesting that this extends to other (d, n, k).

II. MATHEMATICAL BACKGROUND

A. Notation

We shall denote the imaginary unit by i to distinguish it from our use of i as an indexing variable. i 2π/d Zn Suppose d is prime, n ≥ 1, and let ω = e . The set {1, ..., n} is denoted by [n]. Forz ˆ ∈ d , the ket |zˆi = |zn...z1i. Zn C C Definition 1. For any n ≥ 1 and function f : d → , the diagonal matrix D[f] ∈ Mdn ( ) is defined by

D[f] |zˆi = f(z) |zˆi .

Identity matrices are denoted by I; its dimension is given by context. The set of dn ×dn unitary complex matrices is n pˆ p1 pn denoted by U(d ). Given n unitaries U1, ..., Un and a vectorp ˆ of n integers, we denote by U the product U1 ··· Un . 3

B. The Heisenberg group and the Stone-von Neumann theorem

The Heisenberg canonical commutation relations are the mathematical branch point at which quantum theory diverges from classical theory. They lead to the idea that observable quantities are no longer modelled by scalar- valued functions on phase space but by noncommuting linear operators. Ignoring constants, with P representing momentum and Q representing displacement of a system with one continuous degree of freedom:

[P,Q]= i.

Systems with multiple degrees of freedom are represented by tuples {(Pi,Qi)}i [n] satisfying [Pi,Qi]= i and, for i 6= j, ∈ [Pi,Qj ] = [Pi, Pj ] = [Qi,Qj] = 0. As noted by Weyl, this equation has no solutions with P or Q a bounded operator. To sidestep this technical issue, he introduced his exponentiated form. Let U(s) = ei sP and V (t) = ei tQ be two groups of unitaries indexed by the parameters s,t ∈ R. They obey:

i s t U(s)V (t)= e · V (t)U(s).

These are similarly generalised to multiple degrees of freedom: for i 6= j,[Ui(s), Vj (t)] = [Ui(s),Uj (t)] = [Vi(s), Vj (t)] = 0. This relation is instantiated both by Heisenberg’s infinite-dimensional matrices and by Schr¨odinger’s multiplication 2 R 2 R ∂ and differentiation operators on L ( ) (which act on functions f ∈ L ( ) by X(f)(x)= xf(x) and P (f)(x)= ∂x f(x) respectively). The motivation of the Stone-von Neumann theorem was to assure the equivalence of the matrix mechanics picture and the wave mechanics picture of quantum theory. It asserts that all manifestations of the Weyl commutation relations are unitarily equivalent. The following modern statement of the theorem is found in e.g. [8].

Theorem 1 (Stone-von Neumann [12, 13] , 1930). Suppose {Ai}i [n], {Bi}i [n] are self-adjoint operators that act ∈ ∈ irreducibly on a Hilbert space H, i.e. the only closed subspaces of H invariant under every ei sA and ei tB are trivial, and satisfy the Weyl commutation relations. Then there exists a unitary map G : H → L2(R), unique up to phase, such that:

i sAj 1 i sXj i tBj 1 i tPj Ge G− = e and Ge G− = e .

The Weyl relations are most conveniently encapsulated in terms of the Heisenberg group.

Definition 2. For any n ≥ 1 and field F, the n-Heisenberg group Hn(F) is

1 p1 ··· pn c 1 q1    .. . ∈ M (F) | p , ..., p , q , ..., q ,c ∈ F .  . . n+2 1 n 1 n      1 qn   1         ic  Unitary representations of Hn(R) with the specified central character c 7→ e give 2n one-parameter groups of unitaries satisfying the Weyl relations.

C. Higher-dimensional Pauli gates

In , we are typically more interested in finite-dimensional systems. The Heisenberg group can be defined over finite fields for prime d. The canonical representation of Hn(Zd) gives the generalised Pauli gates. For the n = 1 case: 1 p c 1 q 7→ ωcZpXq  1   d where, in the standard orthonormal basis {|zi | z ∈ Zd} of C :

Z |zi = ωz |zi X |zi = |z + 1 (mod d)i . 4

For n > 1 and i ∈ [n], define Zi ∈ Mdn (C) to be a tensor product of n − 1 identity matrices of size d × d with Z in the i-th factor: I ⊗ ... ⊗ Z ⊗ ... ⊗ I; Xi is defined similarly. The Zi,Xi are the basic Pauli gates and satisfy the commutation relation

ZiXi = ωXiZi with basic gates associated to different factors commuting. These give a representation of Hn(Zd):

1 p1 ··· pn c 1 q1  . .  c pi qi .. . 7→ ω Zi Xi .   i [n]  1 qn Y∈    1    n c pˆ qˆ Z Z2n Definition 3. The group of Pauli gates is denoted C1 = {ω Z X | c ∈ d, (ˆp, qˆ) ∈ d } A discrete analogue of the Stone-von Neumann theorem, a corollary of Mackey’s vast generalisation [9] of the original version, asserts the unitary equivalence of different representations of Hn(Zd) that agree on the centre. Due to its importance to the remainder of this paper, we defer an elementary, self-contained proof to the following section (Lemma 7). We will later require the two following simple lemmas. Zn C Lemma 1. For n ≥ 1 and a function f : d → ,

XiD[f]= D[Tif]Xi where Tif(ˆz)= f(z1, ..., zi − 1, ..., zn) denotes a translation in the i-th component of f.

Proof. Both sides map |zˆi to f(z) |z1, ..., zi +1, ..., zni.

Lemma 2. For n ≥ 1, a matrix M ∈ Mdn (C) is diagonal if and only if it commutes with Zi for all i ∈ [n].

Proof. If M is diagonal, it commutes with the diagonal Zi. Conversely, if M commutes with each Zi, it commutes n pˆ zˆ pˆ with each rank-1 projector onto a standard basis vector |zˆi hzˆ| = d− pˆ Zn ω− · Z and is therefore diagonal. ∈ d P D. The Clifford group and the symplectic phase space formalism

The Pauli gates form the basis of the error-correcting codes necessary for making quantum computation a practical reality. The set of Clifford gates can be performed fault-tolerantly on data encoded using these stabiliser codes. Definition 4. The Clifford gates are those unitaries that preserve the group of Pauli gates under conjugation: n n n n C2 = {G ∈U(d ) | GC1 G∗ ⊂C1 }. Being the normaliser of a subgroup of the unitaries, the set of Clifford gates form a group. When d is an odd prime, the Pauli and Clifford groups admit a rich phase space formalism in terms of a discrete symplectic vector space [7]. We limit our presentation of this topic to those elements required below. Z2n The phase space is d and a typical phase point is usually denoted (ˆp, qˆ). The symplectic inner product [·, ·]: Z2n Z2n Z d × d → d is defined by [(p ˆ1, qˆ1), (ˆp2, qˆ2)] = i [n] p1q2 − p2q1 (mod d). To each phase point, we associate −1 ∈ 2 pˆ qˆ pˆ qˆ 1 the Pauli gate W (ˆp, qˆ) = ω− · Z X where 2− denotes the multiplicative inverse of 2 in Zd. They obey the −1 P 2 [(p ˆ1,qˆ1),(p ˆ2,qˆ2)] multiplication law: W (ˆp1, qˆ1)W (ˆp2, qˆ2)= ω W (ˆp1 +p ˆ2, qˆ1 +q ˆ2). ci pˆi qˆi A set of m Pauli gates {ω Z X }i [m] is independent if no nontrivial product of them equals the identity. This ∈ Z2n is equivalent to the set {(ˆpi, qˆi)}i [m] being a linearly independent subset of d . The Clifford gates, up to phase,∈ are in correspondence with affine symplectic transformations of the phase space. n n T First, we define the group of projective Cliffords as the quotient group of Cliffords modulo phase: [C2 ]= C2 / . The Z ⋉ Z2n Z2n group Sp(n, d) d of affine symplectic transformations of d is are pairings of 2n × 2n symplectic matrices and Z2n translations in d with the composition law: (S, v) ◦ (T, w) = (ST,Sw + v). Z ⋉ Z2n n There is a (Weil or metaplectic) projective representation ρ : Sp(n, d) d → [C2 ] that is an isomorphism between the groups of affine symplectic transformations and projective Cliffords. 5

E. The Clifford hierarchy

While Clifford gates can be implemented fault-tolerantly, they are not a sufficiently rich gate set to perform arbitrary quantum computations. Motivated by the need to implement non-Clifford gates fault-tolerantly, Gottesman-Chuang introduced the Clifford hierarchy.

Definition 5. The Clifford hierarchy is an inductively defined sequence of sets of gates. For k> 1, the k-th level of the Clifford hierarchy is the set:

n n n n Ck = {G ∈U(d ) | GC1 G∗ ⊂Ck 1}. − n n The levels of the Clifford hierarchy are nested: Ck ⊂ Ck+1. While the first two levels form groups, higher levels n n do not. However the sets {G ∈ Ck | G is diagonal} do form groups. The sets Ck are closed under left or right n n n n multiplication by Clifford gates: for k> 1, C2 Ck C2 = Ck [14]. n n Gates G ∈C3 \C2 in the strict third level of the Clifford hierarchy can be fault-tolerantly implemented via quantum gate teleportation to achieve universality when given access to an appropriate resource magic state of 2n qudits. The problem of implementing a non-Clifford gate is thus reduced to the problem of preparing a magic state; a task which can be done offline and in advance of a computation. Higher-level gates can be implemented via a recursive procedure requiring additional ancillary resources.

F. Semi-Clifford gates and one-bit teleportation

Zhou-Leung-Chuang introduced a simplified gate teleportation protocol, based on Bennett-Gottesman’s one-bit teleportation, capable of implementing certain qubit Clifford hierarchy gates using half the ancillary resources required in the original Gottesman-Chuang protocol. This class of gates includes the diagonal Clifford hierarchy gates. Zeng- Chen-Chuang introduced the notion of semi-Clifford gates which are ‘nearly diagonal’ in the sense of being within Clifford corrections of diagonal Clifford hierarchy gates:

n n Definition 6. A gate G ∈U(d ) is semi-Clifford if G = C1DC2 where C1, C2 ∈C2 and D is diagonal. Definition 7. For k ≥ 1 the k-th level semi-Clifford gates are:

n n n n SCk = {G ∈Ck | G = C1DC2 where C1, C2 ∈C2 ,D ∈Ck is diagonal}.

They gave a protocol that expands the class of gates that can be implemented efficiently via one-bit gate teleportation to include the semi-Clifford gates. We generalise this protocol to the qudit case in Section V A.

III. THE DISCRETE STONE-VON NEUMANN THEOREM

Definition 8. An ordered pair of unitaries (U, V ) ∈U(dn) ×U(dn) is a conjugate pair if

1. U d = I and V d = I, 2. UV = ωVU.

A. Single qudits

p q Z2 Lemma 3. Suppose U, V ∈U(d) satisfy UV = ωVU. Then U V are traceless for (p, q) ∈ d with (p, q) 6= (0, 0). Proof. Suppose first that q 6= 0.

p q p 1 q q p 1 q q p q Tr(U V ) = Tr(U − UV )= ω Tr(U − V U)= ω Tr(U V )

Since, ωq 6= 1, the above expression vanishes. It similarly vanishes if p 6= 0.

C p q Z2 Lemma 4. Suppose U, V ∈ GLd( ) form a conjugate pair. Then the matrices {U V | (p, q) ∈ d} are orthogonal in Md(C) with the Hilbert-Schmidt inner product hA, BiHS = Tr(A∗B) and hence form a basis of Md(C). 6

p1 q1 p2 q2 q1 p1 p2 q2 p2 p1 q2 q1 Proof. hU V ,U V iHS = Tr(V − U − U V ) ∝ Tr(U − V − ) as all terms can be commuted freely by 1 possibly introducing factors of ω or ω− . This vanishes unless p1 ≡ p2 and q1 ≡ q2 (mod d). Since U, V are unitary, their products are nonzero. An orthogonal set of nonzero matrices is linearly independent. Lemma 5 (Discrete Stone-von Neumann theorem, single-qudit version). Suppose (U, V ) and (U,˜ V˜ ) are two conjugate pairs. There is a unitary G, unique up to phase, such that U˜ = GUG∗ and V˜ = GV G∗.

Proof. We define φ(U)= U˜ and φ(V )= V˜ and prove that this extends to a unique ∗-automorphism of Md(C). The ∗-automorphisms of simple matrix algebras are in correspondence with unitaries up to phase (as a consequence of e.g. the Skolem-Noether theorem). We first define φ(U i V j ) = U˜ i V˜ j . As the matrices U i V j and U˜ i V˜ j form two bases by Lemma 4, this is a well- defined vector space automorphism via its unique linear extension to all of Md(C). It is easy to check that it respects ∗ and matrix multiplication. Thus, φ is an inner automorphism induced by a unitary G. Theorem 2. The unitary G that carries (Z,X) to (U, V ) under conjugation is given by:

z G |zi = V |u0i where |u0i = G |0i is an eigenvector of U with eigenvalue 1. Proof. Apply G to both sides of the equation: |zi = Xz |0i.

B. Multiple qudits

Essentially the same proofs work to establish the multiqudit generalisations of the above results.

Definition 9. A conjugate tuple {(U1, V2), ..., (Un, Vn)} is a set of n conjugate pairs such that any two elements of distinct pairs commute. pˆ qˆ Z2n Lemma 6. Suppose {(Ui, Vi)}i [n] is a conjugate tuple. Then the matrices {U V | (ˆp, qˆ) ∈ d } are orthogonal in ∈ Mdn (C) with the Hilbert-Schmidt inner product and hence form a basis of Mdn (C). ˜ ˜ Lemma 7 (Discrete Stone-von Neumann theorem). Suppose {(Ui, Vi)}i [n] and {(Ui, Vi)}i [n] are two conjugate ∈ ∈ tuples. There is a unitary G, unique up to phase, such that, for all i ∈ [n], U˜i = GUiG∗ and V˜i = GViG∗.

Theorem 3. The unitary G that carries {(Zi,Xi)}i [n] to {(Ui, Vi)}i [n] under conjugation is given by: ∈ ∈ zˆ G |zˆi = V |u0i Zn where zˆ ∈ d and |u0i = G |0i is a simultaneous eigenvector of the U1, ..., Un with eigenvalue 1. The simplest way to construct |u i is to first compute the projectors P = d 1 U p onto the 1-eigenspaces of 0 i − p Zd i U and to then compute an eigenvector |u i with eigenvalue 1 of the rank-1 projector∈ U ··· U . i 0 P 1 n

C. An algorithm for enumerating the Clifford hierarchy gates

Definition 10. A conjugate tuple is k-closed if it generates a group of k-th level gates: pˆ qˆ Z2n n {U V | (ˆp, qˆ) ∈ d }⊂Ck . Theorem 4. Gates of the k +1-th level of the Clifford hierarchy, up to phase, are in bijective correspondence with k-closed conjugate tuples.

n Proof. The correspondence is given by the map that sends G ∈ [Ck+1] to the tuple {(Ui = GZiG∗, Vi = GXiG∗)}i [n]. Conjugation by G preserves the order of all matrices and the commutation relations between them, so,∈ as Z2n pi qi {(Zi,Xi)}i [n] is a conjugate tuple, so is {(Ui, Vi)}i [n]. For any (ˆp, qˆ) ∈ d , the product i [n] Ui Vi = ∈ ∈ pi qi n n ∈ G( i [n] Zi Xi )G∗ ∈Ck as it is the conjugation of a Pauli gate by a Ck+1 gate. ∈ Q Conversely, given a k-closed conjugate tuple {(Ui, Vi)}i [n], we can apply Lemma 7 to find a unitary G, unique up Q ∈ to phase, such that Ui = GZiG∗, Vi = GXiG∗. The definition of k-closedness ensures that the conjugation of any n n Pauli gate by G is in Ck and thus, that, G ∈Ck+1. 7

Since the Clifford gates form a group, the condition of 2-closedness is automatically fulfilled by any conjugate tuple of Cliffords.

Theorem 5. Gates of the third level of the Clifford hierarchy, up to phase, are in bijective correspondence with conjugate tuples of Clifford gates.

n The question of whether the assumption of k-closedness in Theorem 4 for k > 2 (those k for which Ck are not groups) is actually a necessary one remains open. Numerical investigations suggest that the assumption of k-closedness is not necessary for (d, n, k) with n = 1. We are therefore led to the following conjecture:

Conjecture 1. Gates of the k +1-th level of the Clifford hierarchy, up to phase, are in bijective correspondence with conjugate tuples of k-th level gates.

An equivalent reformulation is:

Conjecture 1. All conjugate tuples of k-th level gates are k-closed.

n That is, while Ck may not be a group, does it contain a copy of the Heisenberg group whenever it contains its generators? While the conjecture may not hold in general, it certainly holds for some triples (d, n, k) and it is worth asking: for which ones?. We can use Theorem 4 to describe a simple algorithm for recursively enumerating all gates of the Clifford hierarchy that works for any dimension and number of qudits.

n Algorithm 1: Recursively enumerate the Ck gates (up to phase) n 2n 1. Generate [C1 ]: the d Pauli gates without phase. 2. For k =2 to ∞:

n (a) Select those elements of [Ck−1] with order d for some choice of phase (b) From all pairs of these elements, select the conjugate pairs (c) From n-tuples of conjugate pairs, select the conjugate tuples (d) From the conjugate tuples, select the k-closed conjugate tuples n (e) From the k-closed conjugate tuples, generate the [Ck ] gates using Theorem 4

n In step 2-a, the elements of [Ck 1] we are interested in are those for which raising any representative to the d-th power gives a diagonal matrix with− constant diagonal element. A choice of phase to correct that representative yielding one with order d is easily extracted from this constant. Note that the list of k-closed conjugate tuples generated by step 2-d is not complete. That is because the conjugate pairs selected in step 2-b are selected from an enumeration n Z p q of Ck 1 that ignores phase. An ordered pair (U, V ) is a conjugate pair if and only if, for any p, q ∈ d, (ω U,ω V ) is a conjugate− pair. Therefore, in executing step 2-e, every k-closed conjugate tuple found by step 2-d generates d2n n gates of [Ck ] by introducing an arbitrary choice of discrete phase factors into the elements of the conjugate tuple. 1 We computed [Ck] in the n = 1 case for small d and k. In the d = 3 case, the sizes found were: 9, 216, 1944, 7128, 22680, 69336. In the d = 5 case, the sizes found were: 25, 3000, 7500, 435000, 2235000. In the d = 7 case, the sizes found were: 49, 16464, 806736, 6338640. n In order to check k-closure in step 2-d, one must implement a function to determine whether a gate is in Ck . This n can be defined recursively by conjugating all Pauli gates and checking if they are in Ck 1. Deeper understanding of the structure of the Clifford hierarchy can lead to efficiency gains− in the practical execution of this algorithm. For example, establishing Conjecture 1 would eliminate the need for step 2-d. A better grip on the lifting of the projective Weil representation to the ordinary representation could aid in optimising 2-b.

IV. DIAGONAL GATES OF THE CLIFFORD HIERARCHY

In this section, we give an concise, elementary proof of Cui-Gottesman-Krishna’s characterisation of diagonal gates of the qudit Clifford hierarchy in the single-qudit case. Thus, d is hereafter restricted to denoting an odd, prime dimension. For convenience, in this section, we drop superscripts n indicating the number of qudits. 8

A. Preliminaries definitions

Definition 11. For k ≥ 1 let

Dk = {D ∈Ck | D is diagonal and D |0i = |0i}.

The second condition ensures that Dk contains precisely one gate up to a global phase factor. Any integer k ≥ 1 can be uniquely expressed as

k = (mk − 1)(d − 1) + ak with ak ∈{1, ..., d − 1}. We will suppress subscripts; call m ≥ 1 the precision of k and a the degree of k.

Definition 12. Denote by Rk the set of rank-k polynomials:

φ : Zdm → Zdm φ has degree at most d − 1, φ(0) = 0 Rk = d 1 j . ( φ(z)= j=1− φj z φa+1, ..., φd 1 ≡ 0 (mod d) ) −

P Z Note that Rk is an additive subgroup of the group of polynomials over dm and thus

a (d 1) a Z Z − 1 − Rk ≃ dm × dm− .

Each copy of Zdm tracks the coefficient for the terms of degree 1, ..., a while each copy of Zdm−1 tracks the coefficients k of the terms of degree a+1, ..., d−1 after having divided out by a factor of d. We can see immediately that |Rk| = d .

Remark. We will also require the notion of a polynomial ξ being of rank k up to a constant, i.e. there exists C ∈ Zdm such that ξ + C ∈ Rk. If φ ∈ Rk and ψ : Zdm → Zdm is a polynomial of degree at most d − 1, then φ + dψ is rank k up to a constant with C = −dψ(0). For an integer m ≥ 1, denote the dm-th primitive root of unity:

i 2π/dm ωm = e .

We now define the sets of gates that we will prove are the diagonal k-th level gates.

φ Definition 13. ∆k = {D[ωm ] | φ ∈ Rk}.

Remark. Recall that we defined the construction of diagonal gates D[f] for f : Zd → C whereas the polynomials φ in the definition above take elements of Zdm as their inputs. Thus, when interpreting φ acting on Zd, we are implicitly . precomposing with the natural inclusion Zd ֒−→ Zdm To appreciate the significance of this seemingly trivial point, consider the action of the translation operator T : Zd Zd q φ C → C defined by Tf(z)= f(z − 1 (mod d)). To apply T to a polynomial φ, and thus to ωm , we can simply q substitute each instance of z with (T 1)(z) where 1(z) = z. If this expression is interpreted over Zd, this would be z − q. However, as we are considering polynomials over Zdm , we require a correction term in our substitution:

z 7→ (z − q)+ dχq(z) where χq is the characteristic function of [0, q). We have thus established:

q φ φ((z q)+d χq (z)) Lemma 8. Suppose φ : Zdm → Zdm and q ∈ Zd. Then T (ωm )(z)= ωm − .

B. A simple proof of CGK’s characterisation of Dk

Lemma 9 (Zeng-Chen-Chuang, 2008). Suppose Dk+1 ∈ Dk+1. There exist Dk ∈ Dk and θ ∈ [0, 2π) such that

i θ Dk+1XDk∗+1 = e DkX.

Proof. Let Dk = Dk+1XDk∗+1X∗. It is diagonal as it commutes with Z: the phase acquired as a Z passes through X is cancelled by the one acquired as it passes through X∗. Thus, DkZDk∗ = Z ∈ Ck. Further, DkXDk∗ = (Dk+1XDk∗+1)X(Dk+1XDk+1)∗ ∈Ck. Dk can be corrected by a phase factor to ensure that Dk |0i = |0i.

+ Theorem 6 (Cui-Gottesman-Krishna, 2016). Dk = ∆k for all k ∈ Z . 9

Proof. We proceed by induction on k. The k = 1 case is straightforward as

p φp D1 = {Z | p ∈ Zd} = {D[ω ] | p ∈ Zd, φp(z)= pz} = ∆1.

So, let us assume that Dk = ∆k and prove that Dk+1 = ∆k+1. This will require two steps. First, we will count the elements of Dk+1 and find that |Dk+1| = |∆k+1|. Then, we will show that ∆k+1 ⊂ Dk+1. As |Dk+1| and |∆k+1| are finite sets, this will establish their equality and complete our proof.

Step 1: |Dk+1| = |∆k+1|. Recall that Dk+1 ∈ Dk+1 is determined by its conjugate pair and, by the preceding lemma,

iθ (Dk+1ZDk∗+1,Dk+1XDk∗+1) = (Z,e DkX).

k There are d possible choices for Dk and as we shall now show, for each one, d possible choices of θ such that iθ φ e DkX has order d. Suppose Dk = D[ωm ]. By repeatedly applying Lemma 1,

d 1 − d j φ d Pj∈Z φ(j) (DkX) = ( D[T (ωm )])X = D[ωm d ]. j=0 Y iθ d Thus, (e DkX) = I for precisely

i θ iθα φ¯ α e = e := ωm− ω with φ¯ = 1 φ(j), the average value of φ over Z , and for any α ∈ Z . d j Zd d d ∈ Each choice of (Dk,θα) yields a distinct conjugate pair with Z and hence an element of Dk+1. This will follow from i i P θα p θα q Z2 Theorem 4 once we establish that (Z,e DkX) is k-closed: i.e. Z (e DkX) ∈Ck for all (p, q) ∈ d. As

q 1 − p iθα q iqθα p j φ q Z (e DkX) = e Z ( D[T (ωm )]) X j=0 Y and given that Ck is closed under multiplication by Pauli gates and phase factors, it is sufficient to show that q 1 j φ j φ j φ j j=0− D[T (ωm )] ∈Ck. Each term is the group {G ∈Ck | G is diagonal} as D[T (ωm )] = X D[ωm ]X− ∈Ck and our conclusion follows. Q k k+1 Thus, |Dk+1| = d · d = d = |Rk+1| = |∆k+1|.

Step 2: ∆k+1 ⊂ Dk+1. For this step, m,a denote the precision and degree of k + 1, not that of k. φ d 1 j Suppose D[ωm] ∈ ∆k+1 with φ ∈ Rk+1, i.e. φ(z)= − φj z with φa+1, ..., φp 1 ≡ 0 (mod d). We will show that j=1 − D[ωφ ] ∈ D . It is sufficient to show that D[ω φ](XqZp)D[ω φ] ∈ C for p, q ∈ Z as every Pauli gate is of the m k+1 m P m− k d form XqZp up to phase. As

φ q p φ φ q φ p φ q φ q p D[ωm ](X Z )D[ωm− ]= D[ωm ]X D[ωm− ]Z = D[ωm ]D[T (ωm− )](X Z ),

φ q φ it is sufficient to prove that D[ωm · T (ωm− )] ∈Ck for any q ∈ Zd. ξ φ q φ By Lemma 8, D[ωm ]= D[ωm · T (ωm− )] with

d 1 d 1 j − j j − j j j β β β ξ(z)= φ (z − [(z − q)+ dχ (z)] )= φ [z − (z − q) − d χ (z) ]. j q j β q j=1 j=1 X X βX=0   We now separate out the β = 1 and higher terms of the latter inner sum and divide by their common factor of d. Noting that a polynomial with d prescribed values can be constructed with degree at most d − 1, let ψ : Zdm → Zdm be a polynomial of degree at most d − 1 that, on inputs in Zd ⊂ Zdm , coincides with the resulting expression:

d 1 j − j j β β 1 β ψ|Z (z)= φ [ (z − q) − d − χ (z) ]. d j β q j=1 X βX=1   We define

d 1 − j j ξ′(z)= φj [z − (z − q) ] − d ψ(z) j=1 X 10

ξ′ ξ and note that ξ′|Zd (z)= ξ|Zd (z) and thus that D[ωm ]= D[ωm ]. It is therefore sufficient for us to prove that ξ′ is a rank-k polynomial up to a constant. By the Remark following Definition 12, we may add dψ to ξ′ whilst preserving its rank up to a constant. We may similarly drop all terms for j>a as these φj ≡ 0 mod d. The coefficient for the za term in the resulting expression,

a j j φj (z − (z − q) ), j=1 X vanishes, and so what remains has rank k up to a constant. This implies that there exists C ∈ Zdm such that φ q φ ξ′ C ξ′ ξ′ + C ∈ Rk and, thus, D[ωm · T (ωm− )] = D[ωm ] ∈Ck as ωm− D[ωm ] ∈ Dk.

V. SEMI-CLIFFORD OPERATORS AND EFFICIENT GATE TELEPORTATION

A. Efficient qudit gate teleportation

We will now construct a circuit gadget that implements a semi-Clifford third level gate using half the ancillary quan- tum resources as required in the original gate teleportation protocol due to Gottesman-Chuang. It is a generalisation to the qudit case of the qubit circuit due to Zhou-Leung-Chuang [15]. Suppose G ∈ SC3, i.e. G = C1DC2 for C1, C2 ∈C2, D ∈ D3. If given access to a magic state |Mi = D |+i we can perform G on an input state |ψi with the following circuit:

MAGIC STATE: |Mi = D |+i

|0i H D C1 C1DX∗D∗C1∗ G |ψi

2 |ψi C2 H

Crucially, the elements of the gadget are Clifford operations meaning that they can be implemented fault-tolerantly. Preparing the magic state can be done fault-tolerantly and with greater efficiency than in the qubit case [3]. There are three key differences that manifest only in the qudit case. First, the need for the H2 gate with the action H2 |zi = |−zi which is simply the identity in the qubit case. Second, the qubit CNOT gate is generalised to the CX (alternatively, CSUM) gate with the action CX |z1i |z2i = |z1i |z1 + z2 (mod d)i. Finally, the need for X∗ in the final gate which is simply X in the qubit case. The validity of this circuit is most easily demonstrated by first considering the single-qudit X-teleportation circuit:

|0i H X∗ |ψi

|ψi H2

2 1 Consider the action of this circuit on an input state ψ = j ψj |0i |ji. It is mapped by H ⊗ H to √p i,j ψj |ii |−ji which is then mapped by CX to 1 ψ |ii |i − ji. A measurement outcome of J on the second qudit collapses √p i,j j P P J the state to j ψj |j + Ji |Ji. ApplyingP the classically-controlled correction X− to the first qudit and discarding the second qudit yields |ψi. P For any gate G that commutes with CX, we can apply G at the end of the circuit to yield an output of G |ψi and commute the gate G backwards in time until it is absorbed into the stage of preparation of a magic state:

MAGIC STATE: |Mi = G |+i

|0i H G GX∗G∗ G |ψi

|ψi H2 11

This construction is particularly useful for G ∈ D3 as GX∗G∗ is guaranteed to be Clifford and diagonal gates commute with the control of a controlled gate. From this, we can generalise to implement G ∈ SC3 and obtain our first circuit: teleport the state C2 |ψi and apply C1D at the end of the circuit. The above arguments are straightforwardly parallelised for n-qudit gates. Zhou-Leung-Chuang show, in the qubit case, how a recursive construction can implement higher-level semi-Clifford gates with savings on ancillary resources.

1 B. All C3 gates admit efficient gate teleportation

Before proving our main theorem, we will give an alternative characterisation of semi-Clifford gates in terms of their action on elementary Pauli gates. This characterisation is a mild strengthening of Proposition 5 of [14] that enables more efficient computations and simpler analytic proofs. Note that Zeng-Chen-Chuang’s proofs that, in the 1 1 2 2 qubit case, Ck = SCk and Ck = SCk make use of exhaustive computations.

Definition 14. A Lagrangian semibasis of a symplectic vector space of dimension 2n is a linearly independent set of n vectors {v1, ..., vn} satisfying [vi, vj ]=0 for all i, j ∈ [n].

Z2n n Lemma 10. For any Lagrangian semibasis {(ˆpi, qˆi)}i [n] = {(p1, q1), ..., (pn, qn)} ⊂ d , there is a Clifford C ∈ C2 ∈ such that CZiC∗ = W (ˆpi, qˆi) for all i ∈ [n].

Z2n Proof. A Lagrangian semibasis can be extended to a symplectic basis of d . The Clifford C arising from the symplectic transformation that maps the standard basis to this symplectic basis yields the desired action.

n Lemma 11. For any set {P1, ..., Pn} of n independent, commuting Pauli gates, there is a Clifford C ∈C2 such that CZiC∗ = Pi for all i ∈ [n].

xi Proof. There exists a Lagrangian semibasis {(ˆpi, qˆi)}i [n] and xi ∈ Zd such that each Pauli Pi = ω W (ˆpi, qˆi). Find ∈ x1 xn C ∈ C2 from the previous lemma such that CZiC∗ = W (ˆpi, qˆi). Then, C′ = CX1 ··· Xn yields the desired action.

n n Theorem 7. Suppose G ∈Ck and denote by Ui = GZiG∗, Vi = GXiG∗ elements of Ck 1. G is semi-Clifford if and − Z2n pˆi qˆi only if there exists a Lagrangian semibasis {(ˆpi, qˆi)}i [n] ⊂ d such that, for each i ∈ [n], U V is a Pauli gate. ∈ n n n Proof. For notational simplicity, Ck , Dk , SCk shall be denoted by Ck, Dk, SCk.

(1) G ∈ SCk ⇐⇒ ∃ C1, C2 ∈C2,D ∈ Dk s.t. G = C1DC2 (2) ⇐⇒ ∃ C1, C2 ∈C2 s.t. C1GC2 ∈ Dk (3) ⇐⇒ ∃ C1, C2 ∈C2 s.t. ∀ i ∈ [n], C1GC2ZiC2∗G∗C1∗ = Zi (4) ⇐⇒ ∃ C2 ∈C2 s.t. {GC2ZiC2∗G∗}i [n] are n independent, commuting Pauli gates ∈ (5) Z2n pˆi qˆi ⇐⇒ ∃ a Lagrangian semibasis {(ˆpi, qˆi)}i [n] ⊂ p s.t. ∀ i ∈ [n],U V is a Pauli gate. ∈ The first two equivalences are straightforward and the third equivalence follows from Lemma 2: the fact that a matrix is diagonal if and only if it commutes with Zi for all i ∈ [n]. (4) For the direction =⇒ , we note that as the Zi are independent and commuting Paulis, so are C1∗ZiC1. The converse follows by applying Lemma 11 to construct C1∗ and hence C1. (5) xi For the direction =⇒ , the Lagrangian semibasis arises from the images C2ZiC2∗ = ω W (ˆpi, qˆi). Conversely, we again apply Lemma 11 to construct C2.

In addition to providing a useful technical characterisation, employed below, it can be used to algorithmically find the Cliffords that diagonalise a given semi-Clifford gate in a relatively efficient manner. 12

Algorithm 2: Recognise and diagonalise semi-Clifford gates n ∗ ∗ 1. Check if the given gate G is in Ck ; terminate if it is not. Otherwise, store Ui = GZiG , Vi = GXiG . 2n 2. For each Lagrangian subspace L of Zd :

(a) Choose a Lagrangian semibasis {(p ˆi, qˆi)}i∈[n] of L (b) For each i ∈ [n]: i. Check if U pˆi V qˆi is a Pauli gate; return to step 2 if it is not. (c) If a Lagrangian semibasis satisfies the criterion of Theorem 7 store it and go to step 4.

3. If no Lagrangian semibasis satisfies the criterion of Theorem 7, terminate.

∗ pˆi qˆi 4. Construct C2 as a Clifford satisfying C2ZiC2 = Z X using Lemma 11.

∗ ∗ pˆi qˆi 5. Construct C1 as a Clifford satisfying C1 ZiC1 = U V using Lemma 11.

6. Return C1 and C2.

One simple way of generating a list of Lagrangian semibases, one for each Lagrangian subspace, is to first construct Z2n the list of vectors in d with leading nonzero component equal to 1 and to select from this list those subsets of size n with pairwise vanishing symplectic product. 1 1 Theorem 8. Every third level gate of one qudit (of any prime dimension) is semi-Clifford: SC3 = C3 . 1 Proof. Suppose G ∈ C3 is a one-qudit third level gate and let U = GZG∗, V = GXG∗ be its conjugate pair of Z ⋉ Z2 Cliffords. Let (S, v), (T, w) ∈ Sp(1, d) d be such that µ(S, v) = [U] and µ(T, w) = [V ].

As UV = ωVU, it follows that [U][V ] = [V ][U] and thus that S,T commute in Sp(1, Zd). We can thus define a group homomorphism: Z2 Z p q φG : d → Sp(1, d) := (p, q) 7→ S T . Z 2 Z2 2 The order of Sp(1, d) is d(d − 1) and, as this is not divisible by | d| = d , φG cannot be injective. Therefore, there Z2 p q exists a nonzero vector (p, q), i.e. a Lagrangian semibasis for d, such that S T is the identity from which we can p q 1 conclude that U V is a Pauli gate. By the previous theorem, G ∈ SC3. Numerical evidence supports the following conjecture: 1 1 Conjecture 2. Every k-th level gate of one qudit (of any prime dimension) is semi-Clifford: SCk = Ck.

2 C. All two-qutrit C3 gates admit efficient gate teleportation

We now show that all third level gates of two-qutrits are semi-Clifford. First, we establish general lemmas enabling αˆ 2 Z2 reduction to the case of gates whose conjugate tuples consist of Cliffords of the form DX for D ∈ D3,α ˆ ∈ d up to phase. I 0 Denote by Q ⊂ Sp(n, Z ) the abelian subgroup of symplectic matrices of the form for n × n symmetric d b I   matrices b. Note that by counting the symmetric matrices, |Q| = dn(n+1)/2. Under the explicit representation of φ Sp(n, Zd) of [10], the image of Q is a subgroup of diagonal Cliffords; each one is, up to phase, of the form D[ω ] for Zn Z φ : d → d a homogeneous quadratic polynomial. d Lemma 12. Suppose that B ⊂ Sp(n, Zd) is a set of commuting symplectic matrices such that S = I for all S ∈ B. 1 There exists R ∈ Sp(n, Zd) such that RhBiR− ⊂ Q. Proof. The subgroup hBi generated by B is either trivial (in which case, the lemma follows immediately) or it is a d-subgroup of Sp(n, Zd). Therefore, hBi ⊂ A ⊂ J where J is a Sylow d-subgroup of Sp(n, Zd) and A is a maximal abelian subgroup of G. By Theorem 2.5 of [1], the Sylow d-subgroups of Sp(n, Zd) contain a unique maximal abelian subgroup of order dn(n+1)/2. Note that non-identity every element of Q has order d and so Q is contained in a Sylow d-subgroup K 1 ofSp(n, Zd). As all Sylow d-subgroups are conjugate, there exists R ∈ Sp(n, Zd) such that RJR− = K. As Q has order dn(n+1)/2, it is the maximal abelian subgroup of K. Conjugation by R must carry the unique 1 maximal abelian subgroup of J to that of K and so RAR− ⊂ Q implying the lemma. 13

n Lemma 13. Suppose that G ∈C3 is a third level gate with the corresponding conjugate tuple {(Ui, Vi)}i [n] of Clifford Z ⋉ Z2n ∈ gates. Suppose further that (Si, vi), (Ti, wi) ∈ Sp(n, d) d are such that ρ(Si, vi) = [Ui] and ρ(Ti, wi) = [Vi] as n n xi αˆi yi βˆi elements of [C2 ]. There exists a Clifford gate C ∈C2 such that CGC∗ has conjugate tuple {(ω DiX ,ω EiX )}i [n] ∈ n Z ˆ Zn where Di, Ei ∈ D3 ; xi,yi ∈ d; αˆi, βi ∈ d .

Proof. Apply the preceeding lemma to E = {S1,T1, ..., Sn,Tn} and take C = ρ(R, 0) (with any phase). The situation where the conjugate tuples are diagonal Cliffords multiplied by a Pauli is easier to tackle as we can characterise them in a simpler combinatorial fashion.

x αˆ y βˆ 2 Z ˆ Z2 Lemma 14. Suppose U = ω DX , V = ω EX , for D, E ∈ D3; x, y ∈ d; and α,ˆ β ∈ d. Suppose further that φ aˆ ψ ˆb 2 2 2 2 ˆ Z2 D = D[ω ]Z and E = E[ω ]Z where φ(ˆz)= d1z1 + d2z2 + d3z1z2; ψ(ˆz)= e1z1 + e2z2 + e3z1z2; and a,ˆ b ∈ d. c Then UV = ω VU for c ∈ Zd if and only if, modulo d:

2d1β1 + d3β2 − 2e1α1 − e3α2 ≡ 0

d3β1 +2d2β2 − e3α1 − 2e2α2 ≡ 0 ψ(ˆα)+ˆa · βˆ − φ(βˆ) − ˆb · αˆ ≡ c.

c Proof. Simplify the expression UVU ∗V ∗ = ω I by commuting X1,X2 terms to the right by repeatedly applying Lemma 1. The effect of translating the polynomials defining U and V is to multiply by a Pauli correction; the above equations ensure that this correction is simply the desired phase factor ωc. These lemmas can be applied towards computationally verifying that each two-qutrit third level gate is semi-Clifford. Computations would be intractable without them. We then indicate how the proof might be analytically generalised to higher dimensions. Theorem 9. Every third level gate of two qutrits is semi-Clifford. Proof. Let G be a two-qutrit gate of the third level of the Clifford hierarchy. By Lemma 13, we can assume that x1 αˆ1 y1 βˆ1 x2 αˆ2 y2 βˆ2 without loss of generality that G has a conjugate tuple of the form {(ω D1X ,ω E1X ), (ω D2X ,ω E2X )} 2 Z ˆ Z2 where Di, Ei ∈ D3; xi,yi ∈ d; andα ˆi, βi ∈ d. We can ignore the discrete phases as doing so results in another conjugate tuple whose corresponding gate is, by Theorem 7, semi-Clifford if and only if the original one is. Thus, U = GZ1G∗, V = GX1G∗,S = GZ2G∗,T = GX2G∗ are characterised by four septuples of elements of Zd that satisfy the eighteen equations of Lemma 14 describing the commutation relations UV = ωVU, ST = ωTS, US = SU, UT = TU, VS = SV , VT = T V . One can exhaustively compute all such quadruples of septuples by first computing the conjugate pairs and then by finding the pairs of these which give conjugate tuples; we find there to be 4199040 such conjugate tuples. One can then apply Theorem 7 to verify that each conjugate tuple arises from a semi-Clifford gate. It is sufficient to verify that the kernel of the matrix

u1 v1 s1 t1 u2 v2 s2 t2   u3 v3 s3 t3   contains a Lagrangian semibasis, where ui, vi,si,ti are the coefficients of the homogeneous quadratic polynomial of U,V,S,T respectively. This is because for any Pauli P1 and homogeneous quadratic φ, there is a Pauli P2 such that φ φ P1D[ω ]= D[ω ]P2. One path to generalising this result to higher dimensions would be to analytically derive from the eighteen equations of Lemma 14 characterising conjugate tuples a Lagrangian semibasis in the kernel of the above matrix.

n n Conjecture 3. Every k-th level gate of two qudits (of any prime dimension) is semi-Clifford: SCk = Ck for n =1, 2.

VI. CONCLUSIONS AND OPEN PROBLEMS

Understanding the structure of the Clifford hierarchy and the semi-Clifford gates, i.e. those admitting efficient implementation via the one-dit gate teleportation protocol described above, in the qudit case is essential for bolstering the viability of qudit fault-tolerant quantum computation. 14

We have developed a perspective on studying the qudit Clifford hierarchy via the discrete Stone-von Neumann theorem. This focus on studying Clifford gates via their actions by conjugation on basic Pauli gates, first employed by Beigi-Shor in the qubit, third level case, is fruitfully extended to the widest possible generality. Technically, this perspective enables a simple proof of Cui-Gottesman-Krishna’s classification of diagonal Clifford hierarchy gates (in the single-qudit case) which raises the question: might it more easily admit generalisation to a classification of all Clifford hierarchy gates? It further enables a novel characterisation of semi-Clifford gates that serves as the basis for proving that all third level gates of one-qudit and two-qutrits are semi-Clifford. These technical developments lead to simple algorithms for recursively enumerating all members of the Clifford hierarchy that works for any (d, n, k) and for recognising and diagonalising semi-Clifford gates. We have employed these algorithms to find numerical evidence that support a number of conjectures. Establishing these conjectures promise to stimulate development of the stabiliser formalism and of the Clifford hierarchy as well as further bolster the viability of qudit fault-tolerant quantum computation.

Conjecture 1. Gates of the k +1-th level of the Clifford hierarchy, up to phase, are in bijective correspondence with conjugate tuples of k-th level gates.

1 1 Conjecture 2. Every k-th level gate of one qudit (of any prime dimension) is semi-Clifford: SCk = Ck.

2 2 Conjecture 3. Every third level gate of two qudits (of any prime dimension) is semi-Clifford: SC3 = C3 . In analogy with the result of Zeng-Chen-Chuang that all two-qubit gates of any level are semi-Clifford, one might 2 2 even conjecture that every k-th level gate of two qudits (of any prime dimension) is semi-Clifford: SCk = Ck. While these conjectures may not hold for all (d, n, k), they do hold for some such triples and almost certainly for some beyond what has already been established rigorously. They may therefore be reformulated as questions: for which (d, n, k) do they hold? A future direction of research is to give a complete classification of the Clifford hierarchy. One might begin by classifying the third level gates which, by Theorem 5, correspond to conjugate tuples of Clifford gates. Using the explicit metaplectic representation of Neuhauser [10] could be useful in characterising these tuples.

ACKNOWLEDGMENTS

We wish to thank Mark Howard and Michael J.J. Barry for helpful conversations and Richard Jozsa for encourage- ment and support during this project. We acknowledge support from the QuantERA ERA-NET Cofund in Quantum Technologies implemented within the European Union’s Horizon 2020 Programme (QuantAlgo project), and administered through the EPSRC grant no. EP/R043957/1: Quantum algorithms and applications.

[1] M. J. J. Barry. Large abelian subgroups of Chevalley groups. Journal of the Australian Mathematical Society, 27(1):59–87, 1979. [2] S. Beigi and P. W. Shor. C3, semi-Clifford and generalized semi-Clifford operations. and Computation, 10(1):41–59, 2010. [3] E. T. Campbell, H. Anwar, and D. E. Browne. Magic-state distillation in all prime dimensions using quantum Reed-Muller codes. Physical Review X, 2:041021, 2012. [4] S. X. Cui, D. Gottesman, and A. Krishna. Diagonal gates in the Clifford hierarchy. Physical Review A, 95(1):012329, 2017. [5] D. Gottesman. Stabilizer Codes and . PhD thesis, Pasadena, CA, USA, 1997. [6] D. Gottesman and I. L. Chuang. Demonstrating the viability of universal quantum computation using teleportation and single-qubit operations. Nature, 402(6760):390–393, 1999. [7] D. Gross. Hudson’s theorem for finite-dimensional quantum systems. Journal of Mathematical Physics, 47(12):122107, 2006. [8] B. C. Hall. Quantum Theory for Mathematicians, volume 267 of Graduate Texts in Mathematics. Springer-Verlag, 2013. [9] G. W. Mackey. A theorem of Stone and von Neumann. Duke Mathematical Journal, 16(2):313–326, 1949. [10] M. Neuhauser. An explicit construction of the metaplectic representation over a finite field. Journal of Lie Theory, 12(1):15–30, 2002. [11] J. Rosenberg. A selective history of the Stone-von Neumann theorem. In Operator Algebras, Quantization, and Noncom- mutative Geometry, volume 365 of Contemporary Mathematics, pages 331–354, 2004. [12] M. H. Stone. Linear transformations in Hilbert space: III. Operational methods and group theory. Proceedings of the National Academy of Sciences of the United States of America, 16(2):172, 1930. 15

[13] J. von Neumann. Die eindeutigkeit der Schr¨odingerschen operatoren. Mathematische Annalen, 104(1):570–578, 1931. [14] B. Zeng, X. Chen, and I. L. Chuang. Semi-Clifford operations, structure of Ck hierarchy, and gate complexity for fault- tolerant quantum computation. Physical Review A, 77(4):042313, 2008. [15] X. Zhou, D. W. Leung, and I. L. Chuang. Methodology for construction. Physical Review A, 62(5):052316, 2000.