Arxiv:Quant-Ph/0509051V1 7 Sep 2005 Iiyapiue Satisfying Amplitudes Bility Ie Hs Ttscnb Ne-Orltdsc Htasingl a That Such Inter-Correlated Be Can States These Time

Total Page:16

File Type:pdf, Size:1020Kb

Arxiv:Quant-Ph/0509051V1 7 Sep 2005 Iiyapiue Satisfying Amplitudes Bility Ie Hs Ttscnb Ne-Orltdsc Htasingl a That Such Inter-Correlated Be Can States These Time To appear in the 2005 International Symposium on Microarchitecture (MICRO-38) A Quantum Logic Array Microarchitecture: Scalable Quantum Data Movement and Computation Tzvetan S. Metodi†, Darshan D. Thaker†, Andrew W. Cross‡ Frederic T. Chong§ and Isaac L. Chuang‡ †University Of California at Davis, {tsmetodiev, ddthaker}@ucdavis.edu §University Of California at Santa Barbara, [email protected] ‡Massachusetts Institute of Technology, {awcross, ichuang}@mit.edu Abstract logic gate can act on all possible 2N states. The exponen- tial speedup offered by quantum computing, based on the ability to process quantum information through gate ma- Recent experimental advances have demonstrated tech- nipulation [2], has led to several quantum algorithms with nologies capable of supporting scalable quantum computa- substantial advantages over known algorithms with tradi- tion. A critical next step is how to put those technologies to- tional computation. The most significant is Shor’s algo- gether into a scalable, fault-tolerant system that is also fea- rithm for factoring the product of two large primes in poly- sible. We propose a Quantum Logic Array (QLA) microar- nomial time. Additional algorithms include Grover’s fast chitecture that forms the foundation of such a system. The database search [3]; adiabatic solution of optimization prob- QLA focuses on the communication resources necessary to lems [4]; precise clock synchronization [5]; quantum key efficiently support fault-tolerant computations. We leverage distribution [6]; and recently, Gauss sums [7] and Pell’s the extensive groundwork in quantum error correction the- equation [8]. ory and provide analysis that shows that our system is both asymptotically and empirically fault tolerant. Specifically, A relevant large-scale quantum system must be capable we use the QLA to implement a hierarchical, array-based of reaching a system size of S = KQ ≥ 1012, where K de- design and a logarithmic expense quantum-teleportation notes the number of computational steps and Q denotes the communication protocol. Our goal is to overcome the pri- number of computational units. Quantum data is inherently mary scalability challenges of reliability, communication, very unstable, which leads to a lack of reliable operations and quantum resource distribution that plague current pro- that can be performed on it. Also if left idle, this quan- posals for large-scale quantum computing. Our work com- tum data will interact with its environment and lose state, a plements recent work by Balenseifer et al [1], which studies process called decoherence. Finally, there is the difficulty arXiv:quant-ph/0509051v1 7 Sep 2005 the software tool chain necessary to simplify development of transmitting quantum data between computational units of quantum applications; here we focus on modeling a full- without losing state. This implies that the greatest chal- scale optimized microarchitecture for scalable computing. lenge towards a large, practically useful quantum computer, is designing an architecture that incorporates the required amount of fault-tolerance while minimizing overhead. Previous work in large-scale quantum architecture [9, 10, 1. Introduction 11] has led to the consideration of several main scalability issues that must be taken into account: reliable and realis- Quantum computation exploits the ability for a single tic implementation technology; robust error correction and quantum bit, a qubit, which can be implemented by the po- fault-tolerant structures; efficient quantum resource distri- larization states of a photon or the spin of a single atom, bution. to exist in a superposition of the binary “0” and “1” states 1. Reliable and realistic implementation technology: (simply denoted as α|0i + β|1i, where α and β are proba- There are multiple approaches from very diverse fields of bility amplitudes satisfying |α|2 + |β|2 = 1). With N qubits science for the realization of a full-scale quantum infor- a quantum computer can be in 2N unique states at any given mation processor. Solid state technologies, trapped ions, time. These states can be inter-correlated such that a single and superconducting quantum computation are just a small tween two points without actually sending any quantum number of many physical implementations currently being data, but rather two bits of classical information for each studied. No matter the choice, any technology used to im- qubit on both ends. plement a quantum information processor must adhere to four main requirements [12]: 1) It must allow the initial- Classical Control ization of an arbitrary n-qubit quantum system to a known state. 2) A universal set of quantum operations must be available to manipulate the initialized system and bring it Q Q Q Q to a desired correlated state. 3) The technology must have R RR R the ability to reliably measure the quantum system. 4) It Sea of must allow much longer qubit lifetimes than the time of a Q Q Q Q Lower quantum logic gate. The second requirement encompasses Level R R R R multi-qubit operations; thus, it implies that a quantum ar- Qubits Channel chitecture must also allow for sufficient and reliable com- Classical Control Q QQ Q munication between physical qubits. Channel R R R R R 2. Robust error correction and fault tolerant struc- tures: Due to the high volatility of quantum data, ac- Figure 1. High-Level quantum computer structure, where a tively stabilizing the system’s state through error correc- full-size computer consists of interconnected logical qubits tion will be one of the most vital operations through the connected with programmable communication network. The course of a quantum algorithm. Fault tolerance and quan- letters R denote an integrated switch islands for redirecting tum error correction constitute a significant field of research quantum data coming from nearby logical qubits or other [13, 14, 15, 16, 17, 18] that has produced some very pow- repeater islands. erful quantum error correcting codes analogous, but fun- damentally different from their classical counterparts. The most important result, for our purposes, is the Threshold This paper introduces and evaluates the design of the Theorem [17], which says that an arbitrarily reliable quan- Quantum Logic Array (QLA) architecture which takes the tum gate can be implemented using only imperfect gates, following approach to leveraging the three architecture re- provided the imperfect gates have failure probability be- quirements described above: low a certain threshold. This remarkable result is achieved through four steps: using quantum error-correction codes; 1 At the lowest level QLA is based on the trapped ion- performing all computations on encoded data; using fault technology [24, 25, 26], which uses a single trapped tolerant procedures; and recursively encoding until the de- atomic ion as a storage for a single unit of quantum data. sired reliability is obtained. A successful architecture must In particular QLA is based on the highly scalable model be carefully designed to minimize the overhead of recursive of (CCD) style ion-trap quantum information processing error correction and be able to accommodate some of the architecture proposed by Kielpinski et al [27, 25]. This most efficient error correcting codes. model consists of ions trapped in interconnected trap ar- 3. Efficient quantum resource distribution: The quantum rays and moved from trap to trap to interact [23, 22]. no-cloning theorem [19] (i.e. the inability to copy quantum 2 We have designed the architecture as a block structure data) prevents the ability to place quantum information on (Figure 1), which fits naturally to quantum error correc- a wire, duplicate, and transmit it to another location. Each tion, where each building block/tile reflects the error- qubit must be physically transported from the source to the correction algorithm used. QLA itself is built by tiling destination. This makes each qubit a physical transmitter these building blocks to form the hierarchies required for of quantum information, a restriction which places great larger and more reliable encodings. In addition, QLA constraints on quantum data distribution. Particularly trou- invests area in communication channels to allow move- blesome is moving the qubits over large distances where it ment of ions without hindering the parallelism required must be constantly ensured the data is safe from corrup- by fault tolerant structures. tion. One method is to repeatedly error correct along the channel at a cost of additional error correction resources. 3 By structuring the large-scale model as a datapath ori- Another solution is to use a purely quantum concept to im- ented block architecture of independent, tightly compact plement a long-range wire [10]: teleportation [20], which computational units QLA allows us to limit direct ion has been experimentally demonstrated on a very small scale movement to shorter, local distances within each com- [21, 22, 23]. Teleportation transmits a quantum state be- putational unit. At larger distances (i.e. between com- putational units) we employ teleportation to avoid mov- ing data directly over the long channels. Furthermore Electrodes we couple teleportation with the concept of quantum re- V1 V2 V3 V4 peaters [28] to avoid the exponential resource overhead. Ballistic Channel Data Ion The Contributions of this Paper are: 1) We propose the QLA micro-architecture, which is designed for efficient V1V2 V3 V4 quantum error-correction and error-free long range commu- nication of quantum states. 2) While teleportation has been Cooling Ion proposedas a means of communication,we show the limita- tions of a simplistic approach using teleportation. We then Figure 2. A simple schematic of the basic elements neces- show how the QLA micro-architecture can be effectively sary for trapped ion quantum computing. used to overcome these limitations. 3) To model QLA, we developed ARQ: a scalable quantum architectures simula- tor that maps quantum applications to fault-tolerant layouts executing Shor’s algorithm. Finally, we offer discussion of for simulation. ARQ’s input is based on the circuit model future work and conclusions in Sections 6 and 7.
Recommended publications
  • A Coordinated Approach to Quantum Networking Research
    A COORDINATED APPROACH TO QUANTUM NETWORKING RESEARCH A Report by the SUBCOMMITTEE ON QUANTUM INFORMATION SCIENCE COMMITTEE ON SCIENCE of the NATIONAL SCIENCE & TECHNOLOGY COUNCIL January 2021 – 0 – A COORDINATED APPROACH TO QUANTUM NETWORKING RESEARCH About the National Science and Technology Council The National Science and Technology Council (NSTC) is the principal means by which the Executive Branch coordinates science and technology policy across the diverse entities that make up the Federal research and development enterprise. A primary objective of the NSTC is to ensure science and technology policy decisions and programs are consistent with the President's stated goals. The NSTC prepares research and development strategies that are coordinated across Federal agencies aimed at accomplishing multiple national goals. The work of the NSTC is organized under committees that oversee subcommittees and working groups focused on different aspects of science and technology. More information is available at https://www.whitehouse.gov/ostp/nstc. About the Office of Science and Technology Policy The Office of Science and Technology Policy (OSTP) was established by the National Science and Technology Policy, Organization, and Priorities Act of 1976 to provide the President and others within the Executive Office of the President with advice on the scientific, engineering, and technological aspects of the economy, national security, homeland security, health, foreign relations, the environment, and the technological recovery and use of resources, among other topics. OSTP leads interagency science and technology policy coordination efforts, assists the Office of Management and Budget with an annual review and analysis of Federal research and development in budgets, and serves as a source of scientific and technological analysis and judgment for the President with respect to major policies, plans, and programs of the Federal Government.
    [Show full text]
  • Synthesis of Quantum-Logic Circuits Vivek V
    1000 IEEE TRANSACTIONS ON COMPUTER-AIDED DESIGN OF INTEGRATED CIRCUITS AND SYSTEMS, VOL. 25, NO. 6, 2006 Synthesis of Quantum-Logic Circuits Vivek V. Shende, Stephen S. Bullock, and Igor L. Markov, Senior Member, IEEE Abstract—The pressure of fundamental limits on classical com- I. INTRODUCTION putation and the promise of exponential speedups from quantum effects have recently brought quantum circuits (Proc. R. Soc. S THE ever-shrinking transistor approaches atomic pro- Lond. A, Math. Phys. Sci., vol. 425, p. 73, 1989) to the atten- A portions, Moore’s law must confront the small-scale tion of the electronic design automation community (Proc. 40th granularity of the world: We cannot build wires thinner than ACM/IEEE Design Automation Conf., 2003), (Phys.Rev.A,At.Mol. atoms. Worse still, at atomic dimensions, we must contend with Opt. Phy., vol. 68, p. 012318, 2003), (Proc. 41st Design Automation Conf., 2004), (Proc. 39th Design Automation Conf., 2002), (Proc. the laws of quantum mechanics. For example, suppose 1 bit Design, Automation, and Test Eur., 2004), (Phys. Rev. A, At. Mol. is encoded as the presence or the absence of an electron in a Opt. Phy., vol. 69, p. 062321, 2004), (IEEE Trans. Comput.-Aided small region.1 Since we know very precisely where the electron Des. Integr. Circuits Syst., vol. 22, p. 710, 2003). Efficient quantum– is located, the Heisenberg uncertainty principle dictates that logic circuits that perform two tasks are discussed: 1) implement- we cannot know its momentum with high accuracy. Without ing generic quantum computations, and 2) initializing quantum registers. In contrast to conventional computing, the latter task a reasonable upper bound on the electron’s momentum, there is nontrivial because the state space of an n-qubit register is not is no alternative but to use a large potential to keep it in place, finite and contains exponential superpositions of classical bit- and expend significant energy during logic switching.
    [Show full text]
  • PMG Phd Thesis FINAL
    Practical Free-Space Quantum Key Distribution Philip Michael Gorman B.Sc. (Hons), MInstP. Thesis submitted for the degree of Doctor of Philosophy Department of Physics Heriot-Watt University December 2010 The copyright in this thesis is owned by the author. Any quotation from the thesis or use of any of the information contained in it must acknowledge this thesis as the source of the quotation or information. ABSTRACT Within the last two decades, the world has seen an exponential increase in the quantity of data traffic exchanged electronically. Currently, the widespread use of classical encryption technology provides tolerable levels of security for data in day to day life. However, with one somewhat impractical exception these technologies are based on mathematical complexity and have never been proven to be secure. Significant advances in mathematics or new computer architectures could render these technologies obsolete in a very short timescale. By contrast, Quantum Key Distribution (or Quantum Cryptography as it is sometimes called) offers a theoretically secure method of cryptographic key generation and exchange which is guaranteed by physical laws. Moreover, the technique is capable of eavesdropper detection during the key exchange process. Much research and development work has been undertaken but most of this work has concentrated on the use of optical fibres as the transmission medium for the quantum channel. This thesis discusses the requirements, theoretical basis and practical development of a compact, free-space transmission quantum key distribution system from inception to system tests. Experiments conducted over several distances are outlined which verify the feasibility of quantum key distribution operating continuously over ranges from metres to intercity distances and finally to global reach via the use of satellites.
    [Show full text]
  • Applications of Quantum Algorithms to Partially Observable Markov Decision Processes
    Applications of Quantum Algorithms to Partially Observable Markov Decision Processes R. D. Rosenwald*, D. A. Meyer✝, and H. A. Schmitt* * Raytheon Missile Systems P.O. Box 11337 Tucson, AZ 85734-1337, USA e-mail: [email protected] ✝ Project in Geometry and Physics, Department of Mathematics University of California/San Diego La Jolla, CA 92093-0112, USA e-mail: [email protected] Abstract faster than the best algorithms on a classical (conventional) computer. This discovery produced a firestorm of Due to the enormous processing gains that are theoretically controversy and activity that continues to this day. achievable by using quantum algorithms instead of classical algorithms to solve rather generic classes of numerical In some quarters it produced great consternation. It was problems, it makes sense that one should evaluate their correctly noted that if a working quantum computer with a potential applicability, appropriateness, and efficiency for sufficiently large number (~hundreds) of quantum bits solving virtually any computationally intensive task. Since could indeed be built, then the security of modern public- many types of control and optimization problems may be key cryptographic systems would be seriously threatened. couched in terms of partially observable Markov decision Basically, the reasoning goes as follows: cryptographic processes (POMDPs), and since solutions to these types of codes are hard to break because finding the prime problems are invariably extremely difficult to obtain, the factorization of a large composite number is an extremely use of quantum algorithms to help solve POMDP problems difficult and time-consuming task for classical computers is investigated here. Quantum algorithms are indeed found (despite using the latest, most efficient algorithms on likely to provide significant efficiency improvements in massively parallel systems).
    [Show full text]
  • Gate-Level Simulation of Quantum Circuits
    Gate-Level Simulation of Quantum Circuits∗ George F. Viamontes, Manoj Rajagopalan, Igor L. Markov and John P. Hayes University of Michigan, Advanced Computer Architecture Laboratory, Ann Arbor, MI 48109-2122 gviamont,rmanoj,imarkov,jhayes @eecs.umich.edu { } February 1, 2008 Abstract While thousands of experimental physicists and chemists are currently trying to build scalable quantum computers, it appears that simulation of quantum computation will be at least as critical as circuit simulation in classical VLSI design. However, since the work of Richard Feynman in the early 1980s little progress was made in practical quantum simulation. Most researchers focused on polynomial-time simulation of restricted types of quantum circuits that fall short of the full power of quantum computation [7]. Simulating quantum computing devices and useful quantum algorithms on classical hardware now requires excessive computational resources, making many important simulation tasks infea- sible. In this work we propose a new technique for gate-level simulation of quantum circuits which greatly reduces the difficulty and cost of such simulations. The proposed technique is im- plemented in a simulation tool called the Quantum Information Decision Diagram (QuIDD) and evaluated by simulating Grover’s quantum search algorithm [8]. The back-end of our package, QuIDD Pro, is based on Binary Decision Diagrams, well-known for their ability to efficiently rep- resent many seemingly intractable combinatorial structures. This reliance on a well-established arXiv:quant-ph/0208003v1 1 Aug 2002 area of research allows us to take advantage of existing software for BDD manipulation and achieve unparalleled empirical results for quantum simulation. 1 Introduction In the last decade, a revolutionary computing paradigm has emerged that, unlike conventional ones such as the von Neumann model, is based on quantum mechanics rather than classical physics [13].
    [Show full text]
  • The Impact of Quantum Technologies on the EU's
    THE IMPACT OF QUANTUM TECHNOLOGIES ON THE EU’S FUTURE POLICIES PART 2 Quantum communications: from science to policies Adam M. Lewis, AML Martino Travagnin, MT 2018 EUR 29017 EN This publication is a Science for Policy report by the Joint Research Centre (JRC), the European Commission’s science and knowledge service. It aims to provide evidence-based scientific support to the European policymaking process. The scientific output expressed does not imply a policy position of the European Commission. Neither the European Commission nor any person acting on behalf of the Commission is responsible for the use which might be made of this publication. Contact information Name: Adam Lewis Address: TP 186 Centro Comune di Ricerca, Via E. Fermi 2749, 21027 Ispra (VA), ITALY Email: [email protected] JRC Science Hub https://ec.europa.eu/jrc JRC107386 EUR 29017 EN PDF ISBN 978-92-79-77314-3 ISSN 1831-9424 doi:10.2760/881896 Ispra, Italy: European Commission, 2018 © European Union, 2018 Reproduction is authorised provided the source is acknowledged. How to cite: Author(s); title; EUR; doi All images © European Union 2018 Quantum communications: from science to policies Abstract Quantum physics yields cryptographic applications which are expected to contribute to communications security, in particular by providing protection against attacks by future quantum computers. Technology development programmes in quantum communications, including the deployment of quantum networks, are therefore being funded worldwide. Europe should accelerate the industrial uptake of its scientific knowledge in the field. Contents Acknowledgements ................................................................................................ 1 Executive summary ............................................................................................... 2 1. Introduction ................................................................................................. 4 2. Scientific background .................................................................................... 6 2.1.
    [Show full text]
  • Part 2: Quantum Cryptography Report of the Quantum Cryptography Technology Experts Panel
    LA-UR-04-4085 A Quantum Information Science and Technology Roadmap Part 2: Quantum Cryptography Report of the Quantum Cryptography Technology Experts Panel “When elementary quantum systems…are used to transmit digital information, the uncertainty principle gives rise to novel cryptographic phenomena unachievable with traditional transmission media.” Charles H. Bennett and Gilles Brassard (1984) Disclaimer: The opinions expressed in this document are those of the Technology Experts Panel members and are subject to change. They should not to be taken to indicate in any way an official position of U.S. Government sponsors of this research. July 19, 2004 Version 1.0 This document is available electronically at: http://qist.lanl.gov Technology Experts Panel (TEP) Membership: Charles Bennett – IBM: Thomas J. Watson Research Center Donald Bethune – IBM: Almaden Research Center Gilles Brassard – University of Montréal Nicholas Donnangelo – The MITRE Corporation Artur Ekert – Cambridge University Chip Elliott – BBN Corporation James Franson – Johns Hopkins University, Applied Physics Laboratory Christopher Fuchs – Bell Labs, Lucent Technologies Matthew Goodman – Telcordia Technologies Chair: Richard Hughes – Los Alamos National Laboratory Paul Kwiat – University of Illinois at Urbana-Champaign Alan Migdall – National Institute of Standards & Technology: Gaithersburg Sae-Woo Nam – National Institute of Standards and Technology: Boulder Jane Nordholt – Los Alamos National Laboratory John Preskill – California Institute of Technology John Rarity
    [Show full text]
  • High Speed Quantum Key Distribution Over Optical Fiber Network System1
    High Speed Quantum Key Distribution over Optical Fiber Network System1 Lijun Ma, Alan Mink and Xiao Tang* Information Technology Laboratory National Institute of Standards and Technology 100 Bureau Dr., Gaithersburg, MD 20899 Abstract NIST has developed a number of complete fiber-based high-speed quantum key distribution (QKD) systems that includes an 850 nm QKD system for a local area network (LAN), a 1310 nm QKD system for a metropolitan area network (MAN), and a 3-node quantum network controlled by a network manager. This paper discusses the key techniques used to implement these systems, which include polarization recovery, noise reduction, frequency up- conversion detection based on PPLN waveguide, custom high-speed data handling boards, and quantum network management. Using our quantum network, a QKD secured video surveillance application has been demonstrated. Our intention is to show the feasibility and sophistication of QKD systems under current technology development. Keywords: Quantum Key Distribution, Fiber network, BB84, B92, Detection Time Bin Shift, Frequency Up- conversion detection. 1. Introduction A quantum key distribution (QKD) system does not transmit secure messages, it creates a shared secret cryptographic key between users over unsecured communication links. The keys are then used to encrypt the data creating secure messages that can subsequently be transmitted via normal IP protocols. QKD systems use quantum states, such as polarization, to encode information on single photons. An initial random key is establishes by randomly encoding state information on these photons, sending the photons and recovering that information on the other end of the link. After three additional conventional processing/communication stages, this initial (raw) key is transformed into a secure key.
    [Show full text]