<<

Investigating the optimality of ancilla-assisted linear optical Bell measurements

Andrea Olivo1, 2, ∗ and Frédéric Grosshans2, † 1Inria, Paris, France 2Laboratoire Aimé Cotton, CNRS, Université Paris-Sud, ENS Cachan, Université Paris-Saclay, 91405 Orsay Cedex, France (Dated: September 5, 2018) In the last decade Grice [1] and Ewert and van Loock [2] found linear optical networks achieving near-unit efficiency unambiguous Bell state discrimination, when fed with increasingly complex ancillary states. However, except for the vacuum ancilla case [3], the optimality of these schemes is unknown. Here, the optimality of these networks is investigated through analytical and numerical means. We show an analytical upper bound to the success probability for interferometers that preserve the polarization of the input photons, saturated by both Grice’s and Evert-van Loock’s strategies. Furthermore, such an upper bound links the complexity of their ancilla states with the scaling of their performance. We also show a computer-aided approach to the optimization of such measurement schemes for generic interferometers, by simulating an optical network supplied with various kinds of ancillary input states. We numerically confirms the optimality of known small schemes. We use both methods to investigate other ancilla states, some of them never studied before.

I. INTRODUCTION their implementation. For linear optics the difficulties are concentrated in the preparation of complex ancillary Due to its experimental and theoretical simplicity, linear states; this is partly compensated by the simplicity of quantum optics has proved to be a promising route for the interferometers. early implementation of important quantum communica- Our main motivation in this work is to investigate the tion protocols [4]—including quantum teleportation [5–7], optimality of ancilla-assisted linear optical schemes: what dense coding [8, 9] and entanglement swapping [10, 11]. is the highest possible Psucc for a given ancilla? Which are An essential step in these protocols is the Bell measure- the “simplest” states to achieve a given value for Psucc? ment (BM), a projective measurement onto a basis of Very recently, and independently from us, Smith and two-qubit maximally entangled states, the Bell states. In Kaplan [19] tackled a similar problem, optimizing the order to enable the common scenario where losses can be mutual information of a Bell measurement using single tolerated but not errors, in the following we will be con- photon ancillæ. cerned with unambiguous BM, i.e. a measurement whose In SectionII, we first present an analytical upper outcome is never wrong, but is sometimes inconclusive. bound to the success probability of ancilla-assisted BM for Lütkenhaus et al. [12] showed long ago the impossibility polarization-preserving interferometers. Specifically, this of a linear optical perfect Bell measurement for dual-rail bound is saturated by the Grice scheme [1]. In SectionIII, photonic qubits. In a following result, Calsamglia and we expose a linear optical network optimizer based on Lütkenhaus bound the success probability Psucc of the symbolic and numerical computations, built in order to no-ancilla case to 50% [3], thus proving the optimality maximize the success probability of unambiguous BM for of the already known Braunstein–Mann scheme [4]. Re- a given ancillary state and to argue about its optimality. cently, Grice [1], followed by Ewert and van Loock [2] This program is available as supplementary material to showed how to overcome this bound by supplying the this article [20]. In SectionIV, we discuss the results network with ancillary states. They showed how to at- obtained with the two approaches above with different tain a success probability of Psucc = 3/4 with reasonable kinds of ancillæ and compare them to previously known ancillary states, and how to increase this probability to results [1–4, 19]. To our knowledge, some ancillæ studied arXiv:1806.01243v2 [quant-ph] 3 Sep 2018 values arbitrarily close to 1, by using increasingly complex here were never employed for this task. We also discuss and entangled ancillæ. Other ways around the 50% bar- some of the hidden symmetries of the problem at hand, rier include feed-forward techniques from linear optical some of which we exploit in order to lessen the amount quantum computation [13, 14], squeezing operations [15], of computation needed. Finally, we conclude this work in Kerr nonlinearities [16], entangled coherent states, hy- SectionV. brid entanglement [6, 17] or encoded qubits [18]. While some of the above techniques may in principle be used to realize a perfect BM, each one has its own disadvan- II. ANALYTICAL UPPER BOUND FOR tages and present different experimental challenges in POLARIZATION-PRESERVING INTERFEROMETERS

A desirable goal is to find an unambiguous Bell mea- ∗ [email protected] surement using linear optics with the best possible success † [email protected] probability Psucc and the simplest possible ancillary state. 2

In this section, we present an analytical upper bound for horizontally polarized photons and (k + 2) − λ vertically the success probability Psucc of such unambiguous discrim- polarized ones, forgetting about the linear optics restric- ination schemes using ancillary states and polarization tion. One can easily see in the above equations that, for preserving linear optics. This restriction to polarization each λ, the term corresponding to the states |Ψ+i, |Ψ−i, preserving interferometers—i.e. networks described by a and |Φ±i are in three orthogonal subspaces, with the only + block-diagonal unitary U = diag(Uh,Uv), with Uh (resp. possible remaining ambiguity being between the |Φ i and − Uv) acting on the horizontally (resp. vertically) polarized |Φ i states. Let us now look at the distinguishability of modes—is not motivated by experimental realities but is those states. an artificial consequence of the proof technique. Specifi- For an arbitrary ancillary state, the unambiguous dis- cally, this restriction will not be enforced in the computer crimination has to be performed between the following aided optimization of SectionIII. However, the previously unnormalized states: known schemes [1, 2, 4] are all polarization independent, ± υλ−2 υλ Λ = √ |HHi |Υ, λ − 2i ± √ |VV i |Υ, λi . i.e. polarization preserving with Uh = Uv, so this restric- 2 2 tion still allows to achieve non trivial discrimination. The Unambiguous discrimination of such a pair of pure states common polarization independence of these schemes was is possible with an optimal success probability [21–23] of motivated by the symmetry of the Bell states set. We kΛk − |hΛ+|Λ−i|, with kΛk = hΛ+|Λ+i = hΛ−|Λ−i. This conjecture that the optimal interferometer presents the optimal success probability is an upper bound to what is same symmetry, and is polarization independent, except achievable with linear optics and photon counting, leading for an initial preprocessing step of the ancillæ, as for the to single-photon schemes of [2].  1 2 1 2 We present this polarization preserving upper bound Psucc,λ ≤ 2 min 2 |υλ−2| , 2 |υλ| . for a generic ancilla in SectionIIA, and bound it itself by a simple photon number dependent expression in Sec- The total success probability—assuming an equal input tionIIB. probability of 1/4 for each Bell state, and perfect discrim- ination of |Ψ±i—is then

k+2   A. Generic upper bound 1 1 X 2 2 Psucc ≤ 2 + 2 min |υλ−2| , |υλ| λ=0 The ability of an interferometer to perform a BM is its X  2 2 = 1 + 1 min |υ | , |υ | ability to discriminate between the four Bell states when 2 2 λ−2 λ they are supplied as its input, each with equal probability λ even 1 X  2 2 1/4. We consider, w.l.o.g., a pure k-photon additional + 2 min |υλ−2| , |υλ| . Pk λ odd resource state |Υi = λ=0 υλ |Υ, λi, where |Υ, λi is a pure state with λ photons polarized horizontally and k−λ Since the minimum is taken every two value of λ, even photons polarized vertically. Since our interferometer is and odd indices have to be considered separately. It is polarization preserving, the total number of horizontally then easy to notice that, among even (resp. odd) values 2 (or vertically) polarized photons is unchanged, and this of λ, all values of |υλ| are counted once except the local number can be easily deduced from the observed detection , which are omitted, and the local minima, which event. Therefore, the measurement would be the same if are counted twice, leading to one had performed a projective measurement of of these 1 X 2 1 X 2 polarized photon numbers on the global input state, before Psucc ≤ 1− 2 |υλ| + 2 |υλ| λ even λ even feeding the projected state into the interferometer. 2 2 Let us rewrite the input state according to this projec- |υλ| loc max |υλ| loc min 1 X 2 1 X 2 tion: − 2 |υλ| + 2 |υλ| . (2) λ odd λ odd k+1 |υ |2 loc max |υ |2 loc min ± X υλ−1 λ λ Ψ |Υi = √ (|HV i ± |VHi) |Υ, λ − 1i This bound can then be simplified to the following looser λ=1 2 bound on the failure probability k+2 ± X υλ−2 υλ   Φ |Υi = √ |HHi |Υ, λ − 2i ± √ |VV i |Υ, λi , 1  2  2 2 2 Pfail ≥ max |υλ| + max |υλ| , (3) λ=0 2 λ even λ odd (1) 2 the latter being equivalent to (2) iff |υλ| has a single where we have set υλ = 0 for λ < 0 and λ > k, in order local maximum over even values of λ and a single local to include the edge cases in the formula. Each term of maximum over odd values of λ. the above sums corresponds to a term with λ horizontally In SectionIV, we will compute this bound for different polarized photons. ancillary states |Υi. But for now, we can already use the To obtain an upper bound, we assume the measurement above equations to compute a bound depending only on to be perfect after the projection onto the state with λ |Υi’s photon number k. 3

B. Photon-number based upper bound two parts. As explained in SectionIIIB, for each ancilla we want to analyze, and for each input Bell state, we Let us now work out a bound that is independent of generate a symbolic expression for the probability ampli- the specific form of |Υi. If the number of photons k in tudes of all output events in terms of U. Those functions, the ancilla is odd, there are k+1 possible odd values for λ along with their gradient with respect to the U entries, 2 are heuristically optimized in order to reduce the number for which υλ 6= 0, and as many even values. Eq. (2) then leads to the bound of operations needed. The optimized functions are then translated into a low-level language and compiled. Then, 1 as exposed in SectionIIIC, a constrained numerical op- Pfail ≥ , k odd k + 1 timization using a nonlinear method is performed. Due to the heavy non-smooth character of P , we construct which can only be achieved by ancillary states where all succ a meaningful figure of merit, function of the previously even values of λ are equiprobable, and all odd values of obtained probability amplitudes. λ are equiprobable. Similarly, if k is even, there are k 2 While this can seem at first glance an overkill brute- possible odd values for λ such that υ =6 0, and k + 1 λ 2 force approach, both steps present important symmetries even ones. This leads to the bound that we can exploit, gaining up to two orders of magnitude 1 in computation time in some cases, and reducing function Pfail ≥ , k even k + 2 complexity. which can only be achieved by ancillary states where all values of λ for which υλ 6= 0 are even and equiprobable. A. representation of the network Both limits above can be expressed by the formula We can represent the input (output) state to a n-modes 1 Pfail ≥ , (4) linear optical network through a polynomial in the input dk + 1eeven (output) modes creation operators [25] where d·e is the smallest even greater or equal † † even |ψini = Pin(a , . . . , a ) |0i , to its argument. For the trivial case k = 0, this result is 1 n † † a special case of the Calsamiglia–Lütkenhaus theorem [3]. |ψouti = Pout(c1, . . . , cn) |0i . For k = 1, we find that a single extra photon does not help, The effect of the network can be represented by a unitary at least with a polarization preserving interferometer. transformation U := (u ) connecting the input and the A non-trivial example of state achieving the limit for ij N+1 output modes: even k is the {2 − 2}-photon ancillary state |Υ1i ··· G n |ΥN iG defined by Grice in [1]. Note that, except for the † X † + ai = uij cj . (5) 2-photon state |Υ1iG = |Φ i, the Grice scheme needs to use GHZ-like states [24] of up to 2N dual-rail qubits. =1 The |ΥniEvL states defined Ewert and van Loock in [2] Notice that this only implements a subset of all the trans- can be written in the same form of the |ΥniG states formations of the modes allowed by quantum mechanics, of [1] with respect to the distribution of horizontally namely photon interferences. polarized photons; however, at variance with them, in At variance with the previous section, we represent order to attain the same Psucc two copies of each one are dual rail encoding with distinct spatial modes instead of required. The photon-number dependent upper bound (4) orthogonal polarization modes [14]. The Bell states are is therefore not tight for them, even if the generic bound represented by: (3) is. However, the schemes by Ewert and van Loock 1   start by independently interfering each of the output of an ± † † † † Φ = √ a1a3 ± a2a4 |0i , (6) initial 50:50 beamsplitter with half of the ancillary state. 2 This additional restriction changes the photon dependent ± 1  † † † † Ψ = √ a a ± a a |0i . (7) bound, which is then achieved by the Ewert–van Loock 2 1 4 2 3 schemes. † † Let Bβ(a1, . . . , a4), β = 1,..., 4 be the polynomial as- sociated with the above states; the generic input to the III. LINEAR OPTICAL NETWORK network is then represented by the polynomial OPTIMIZER † † † † (Pin)β = Bβ(a1, . . . , a4) Q(a5, . . . , an), (8) We present here our linear optical network optimizer, where Q describes the ancillary state |Υi. a program looking for the optical network maximizing At the output of the network, an array of polarizing Psucc for a given ancillary state. We first restate our beamsplitters followed by photon number resolving de- problem in terms of second quantization in SectionIIIA tectors (PNRD) carries out a measurement in the com- before detailing our approach, which can be divided into putational basis. A detection event is described by the 4 number of photons detected in each output mode, e.g. Let U be the unitary matrix representing the network, 1020 is the event in which three photons are detected, one the output polynomial is obtained upon performing the in the first mode and two in the third mode. This event substitution in eq. (5): corresponds to the output state 1  X  X  † †2 † †2 P =√ u † u c† c c c c out 1j1 j1 3j2 j2 √ 1 3 √1 3 2 |1020iout = |0i = |0i , (9) j1 j2 1!0!2!0! 2 (12) 1  X †  X †  and its probability can therefore be computed form the the + √ u2j c u4j c . 2 3 j3 4 j4 squared norm of the corresponding coefficient j3 j4 in the polynomial (8). A Bell measurement is unambiguous when at least one After expanding all the products, we obtain a polynomial † † output event occurs with nonzero probability for only one in c1, . . . , c4 with N = 10 terms of degree k + 2 = 2. The † † of the four input Bell states (plus ancilla); events meeting coefficient of the monomial c1c3 is, for example, the ampli- this condition are said to be discriminating. By writing tude of the detection event 1010. For an arbitrary event, e p for the square modulus of the amplitude associated with ki photons in mode i, a bosonic correction factor β pQ with the detection event e when the input is the Bell state i ki! has to be applied, as in eq. (9). Expanding (12), β, the total probability of successful discrimination is: all the output event amplitudes read: 1 X P = pe with S = {e, β˜ : ∀β 6= β,˜ pe = 0}. 2000 −→ u u + u u succ 4 β˜ β 11 31 21 41 ˜ e,β∈S 0200 −→ u12u32 + u22u42 (10) 0020 −→ u13u33 + u23u43

0002 −→ u14u34 + u24u44 √ B. Symbolic computation 1100 −→ (u11u32 + u12u31 + u21u42 + u22u41)/ 2 √ 1010 −→ (u11u33 + u13u31 + u21u43 + u23u41)/ 2 The purpose of the method presented here is to provide √ the optimum-finding algorithm described in the next sub- 1001 −→ (u11u34 + u14u31 + u21u44 + u24u41)/ 2 section with a fast, optimized function returning all the √ 0110 −→ (u12u33 + u13u32 + u22u43 + u23u42)/ 2 detection event probabilities, along with their gradients √ with respect to the entries of U, from which a figure of 0101 −→ (u12u34 + u14u32 + u22u44 + u24u42)/ 2 √ merit f(U) will be constructed. Working on this sepa- 0011 −→ (u u + u u + u u + u u )/ 2 . rately, instead of directly using sums of permanents of 13 34 14 33 23 44 24 43 submatrices of U [26], enables us to carefully analyze the e The probabilities pβ are then obtained by taking the problem and implement some analytical shortcuts that square moduli of those amplitudes. All the above steps will ultimately speed up the search for optima. are automated in our program, by exploiting polynomial We use SymPy [27], an open-source symbolic computa- manipulation routines contained in SymPy; we just have tion library for Python. The main procedure is as follows: to ‘manually’ feed as input the ancillary polynomial Q. given an input polynomial in the form (8), we implement The numerical optimization routine also needs the Ja- the transformation (5) by direct substitution. We then re- cobian of the figure of merit, and the above approach † † group the resulting multivariate polynomial in c1, . . . , cn allows us to compute it symbolically in order to speed up and we extract the coefficient of each monomial; they the optimization. This computation is done through the correspond to the amplitudes of all possible detection e symbolic of pβ with respect to the real and events, and they are complex functions of the entries of e the imaginary part of uij. The pβ are the square modu- U. A straightforward combinatorial argument shows that lus of a complex holomorphic function (more precisely, a there are polynomial) and, for any such function g(u11, . . . , unn), n + k + 1 we have N = (11) k + 2 ∂|g|2  ∂g∗  = 2 Re g possible detection events for each input state, where k ∂ Re{u } ∂u is the number of photons in the ancillary state—making ij ij k + 2 the total number of photons entering the network. and an analogous expression for the with re- In the following, we will always assume n ≥ k + 4. spect to the imaginary part. This allows for a simple As a simple example of what the algorithm does, con- symbolic computation of the relevant derivatives. If the sider a network with n = 4 modes, with the Bell state optimization algorithm were not provided with a Jacobian + |Φ i = B1 |0i as input state and no ancillary state (k = 0), function, it would have had to estimate it by evaluating with the figure of merit at nearby points. Using the finite 2 1 † † † † differences method, this amounts to at least 2n addi- B1 = √ (a a + a a ). 2 1 3 2 4 tional evaluations of f(U) per iteration—to be compared 5 with evaluating n2 symbolic derivatives, each of which is a strictly simpler function (i.e. a polynomial with less terms) TABLE I. Specifications of the two computers used in this ar- ticle. The frequency is the nominal frequency of the processor. than the corresponding probability amplitude. Further- The cluster is the gmpcs-206 branch of the computing center more the Jacobian would only be calculated to some fixed MésoLUM of the LUMAT research federation [32], and the accuracy, which adds noise to the optimization algorithm specifications refer to a single node. and worsen its convergence. As the output of this computation, we need 4N expres- Name Processor # of Freq. RAM sions for the probabilities, each one with n2 expressions for model cores (GHz) (GB) Intel Core the derivatives. But there is no need to actually compute Laptop 4 2.5 16 the symbolic form of all the 4N events for each ancilla. i7-4710MQ Intel Xeon Two main simplifications help to drastically reduce the Cluster 12 2.3 256 number of symbolic computations: E5-2670 1. The detection events divide into equivalence classes under of the output modes, correspond- ing to a permutation of the columns of U. It is easy seconds using 100 MB of RAM; the second iteration of to check that, of all the events in the above exam- Grice’s scheme—the largest calculation we managed to ple, it is only necessary to obtain 2000 and 1100. complete, with n = 16 and k = 6—took instead 10 days of For example, 1010 can be obtained from 1100 by single-core CPU time on the cluster described in TableI, swapping the second and the third column of U, requiring a large portion of the 256 GB of RAM at our at a negligible computational cost. The number of disposal. The resulting (already heavily optimized) prob- independent events does not depend on n and is ability functions for this case consist of a grand total of 1 about 1.8 million addition and multiplication operations, equal to Pk+2, the number of integer partitions [28] of the total number of photons. This also reduces and the Jacobian of about 17 million. the number of gradients to calculate, from n2 to at We use Theano [31], a numerical computation library most n(k + 2). for Python, as our backend in order to translate each function into C and compile it to a fast numerical version. 2. As it is clear from eqs. (6) and (7) , knowing an event’s amplitudes for a single Bell state allows one to compute its amplitudes for all of them, just by C. Numerical optimization swapping two rows of U and/or changing their sign. This reduces the number of functions to compute The second part of the procedure takes care of finding by a further factor of 4. the optimal value of Psucc in eq. (10) for each input ancil- With these expedients, we reduce the problem to the lary state. Naively, we could straightforwardly calculate P (U) from the numerical evaluation of the probabil- computation of just Pk+2 probability functions along with succ their gradients. For example, when n = 8, k = 2 as in ity functions obtained in the previous section; however, the first scheme of Grice’s paper (using a |Φ+i ancillary Psucc(U) = 0 almost everywhere in the domain U(n), and state), we end up decreasing the number of function to it is neither continuous nor differentiable in the region of interest, where P (U) 6= 0. This obviously makes most compute from 4N = 1320 to only P4 = 5, each with at succ most 32 derivatives instead of 64. optimization methods highly ineffective. As SymPy is written in pure Python, we can accelerate As a workaround, we devise a figure of merit as a this section of the program using PyPy [29], an imple- continuous alternative to Psucc(U). We thus search for mentation of the Python interpreter with a Just-In-Time local minima of: compiler. For large networks (n ≥ 8, k ≥ 2) we obtain X  X e e  f(U) = pβ − 2 max pα , (13) a tenfold speedup over plain Python, at the cost of in- α creased memory usage2. Even with all these optimizations e β in place, however, the problem still scales exponentially3. of which the addends of the outer sum are equal to the For comparison, we obtain the functions for the first Grice ones of −P (U), when the latter happen to be nonzero. iteration (“one extra Bell pair” in TableII) in about 6 succ Ideally, we want the figure of merit to closely mimic the

1 I.e. the number of positive integer sums equal to k + 2. 2 As an example, first iteration of the Ewert–van Loock scheme to Hardy and Ramanujan [30]: (|1i⊗4 = |Υ i⊗2 ) takes 7 minutes and 30 seconds on our laptop 1 EvL ( ) (see TableI) using the standard Python interpreter and about 1 2k Pk ∼ √ exp π , 150 MB of RAM. Using PyPy the time is cut down to 45 seconds, k→∞ 4k 3 3 with a memory consumption of 250 MB. 3 We nonetheless get an exponential advantage over the naive to be compared with the coefficient in eq. (11), lower k+2 approach, as we can see from the asymptotic formula for Pk due bounded by 2 . 6 behavior of Psucc around the optima. In particular it about ten thousand successful iterations of the optimiza- would be useful to have the following holding for each tion algorithm. In the table the maximum value achieved pair of locally optimal unitaries U1 and U2: for each input is shown; it can be noted that, for the cases already known in the literature, we find the same maximal f(U1) < f(U2) iff Psucc(U1) > Psucc(U2). discrimination probability. Furthermore, we were able to work with other types of ancillæ. Unfortunately, the mutual relation between f(U) and Psucc(U) is not simple. While it seems reasonable to conjecture the set of local minima of f(U) to include the A. Vacuum extra modes set of Psucc(U)’s maxima, we find that, for some U1 and U2: By virtue of the Calsamiglia–Lütkenhaus theorem [3], f(U1) < f(U2) while Psucc(U1) < Psucc(U2). (14) the analytical upper bound of Psucc ≤ 1/2 is known to hold for general interferometers, equipped with an ancilla This forces us to conduct a search among all local op- consisting of an unlimited number of extra modes in the tima of f(U), rather than taking advantage of global vacuum state. We can work out different version of this optimization methods like simulated annealing. bound (for photon-number- and polarization-preserving The optimization itself is implemented using SciPy’s measurements) following the reasoning laid out in Sec- Sequential Least-Square Programming (SLSQP) optimiza- tionII, looking at the distinguishability of the states in tion method [33, 34]. As this method supports equality eq. (1) after a projection onto the basis of the number-of- constraints, we represent U through 2n2 real variables horizontally-polarized-photons operator. If the ancillary describing its entries’ real and imaginary parts, along state is the vacuum, or any other state with a fixed num- with n2 equations enforcing orthonormality of the rows. ber λ of horizontally polarized photons, υλ is the only In order to improve convergence speed, the method is value of λ for which υλ 6= 0. This leads to just two distinct allowed some leniency on the constraints, in that they terms: only have to be satisfied at the local optimum. In order + − to ensure uniform sampling of the starting points of each |HHi |Υi for both Φ and Φ , (15) optimization, we choose them by picking a random ma- ± |VV i |Υi respectively for Φ+ , Φ− . (16) trix from the Haar measure on the unitary group U(n). This is accomplished using the QR decomposition method The term (15) is identical for both inputs, while the (16) described in [35]. differs by a global phase. Thus, these terms are not We compared the performance of the constrained distinguishable at all: in this case the ancillary state method above to the Broyden-Fletcher-Goldfarb-Shanno cannot help to discriminate between the two different (BFGS) algorithm [36], a popular unconstrained quasi- inputs, and P ≤ 1/2. Newton method. While the latter uses no constraints succ Indeed, without extra photons the maximum discrim- and has to work with independent variables4, the relation ination probability that we find through our numerical between those and the entries of U is non-trivial and optimization is 1/2, for any value of n we tried. We this therefore hinders our ability to input the analytical quickly achieve this maximum on our laptop (see TableI), form of the gradient. Thus the performances are com- and we collect a thousand successful iterations in a matter parable with SLSQP, if not worse in some cases, even if of minutes for different values of n ≤ 14. The n = 14 the number of variables is cut by half. Furthermore, the case still takes less than an hour on the laptop, and a few convergence accuracy and precision seems unaffected by minutes of the cluster. the choice of one method over the other.

IV. RESULTS B. Extra Bell pairs

Below, we work out the analytical upper bound for One of the simplest linear optical network schemes with 1 polarization-preserving interferometers in SectionII for ancilla achieving more-than- 2 Bell state discrimination the states we used, and we compare them to the numerical probability is arguably the first iteration of Grice’s strat- results we obtained for generic interferometers. egy [1]. He shows that adding one extra |Φ+i as ancilla Some of the optimization results for different input an- helps cutting the degeneracy of |Φ±i by half, achieving † † Psucc = 3/4. However, the states used by Grice to increase cillæ |Υi = Q(a5, . . . , an) |0i are summarized in TableII. For each one of them, we collected the local optima from its success probability past 3/4 become more complex at each iteration, since each additional ancillary state |ΥN iG is a 2N -photon GHZ state. It would be experimentally much simpler to use multiple Bell pairs |Φ+i⊗k/2 as a 4 We encoded the n2 unconstrained degrees of freedom of U(n) k-photon ancilla, which motivate our research of schemes into an Hermitian matrix H, using U(n) = eiH . using such resources. 7 TABLE II. Summary of known analytical and numerical results for different ancillæ. Q is the input polynomial, n the number num of modes and k the number of photons. Psucc is the optimum obtained through our optical network optimizer; the fraction ana upp upp given is exact up to our numerical precision (9 decimals). Psucc is the best known explicit analytical result. Psucc and Psucc(k) are our analytical upper bounds for polarization-preserving networks (sectionII), for the ancilla and for arbitrary ancillæ with same k. They are in bold font when matching the best known result.

num ana upp upp State Q n k Psucc Psucc Psucc Psucc(k)

Vacuum Ancilla |0i 1 4–14 0 1/2 1/2[3] 1/2a[3] 1/2

k/2 Extra Bell Pairs k/2 (bk/4c) c (a†a†+a†a†)...(a† a† +a† a† ) 1 − + ⊗k/2 5 7 6 8 2k+1 2k+3 2k+2 2k+4 b 2k/2+1 k + 1 Φ k/4 2k + 4 even — 2 ' 1 − √1 k + 2 πk † † † † + (a a +a a ) Φ = |Υ i 5 7√ 6 8 8 2 3/4 3/4[1] 3/4 3/4 1 G 2 † † † † † † † † + ⊗2 (a5a7+a6a8)(a9a11+a10a12) d Φ 2 12 4 3/4 3/4 5/6 † † † † † † † † + ⊗3 (a a +a a )...(a a +a a ) ed Φ 5 7 6 8 √ 13 15 14 16 16 6 13/16 7/8 8 k Extra Photons ( k/2 ) 1 − bk/4c c ⊗k † † b 2k/2+1 k + 1 |1i a5 . . . a k + 4 even — k+4 ' 1 − √1 k + 2 πk ⊗k † † b |1i a5 . . . ak+4 k + 4 odd — same as above, for k − 1

† dd |1i a5 5 1 1/2 1/2 1/2

⊗2 † † c f |1i a5a6 6 2 5/8 5/8 3/4 (5/8) 3/4

⊗3 † † † d c f |1i a5a6a7 7 3 5/8 3/4 (5/8) 3/4

⊗4 ⊗2 † † † † c |1i = |Υ1iEvL a5a6a7a8 8 4 3/4 3/4[2] 3/4 5/6

⊗6 † † d c |1i a5 . . . a10 10 6 3/4 13/16 7/8

⊗8 † † e c f |1i a5 . . . a12 12 8 49/64 13/16 (25/32) 9/10

⊗12 † † e c f |1i a5 . . . a16 16 12 25/32[2] 27/32 (13/16) 13/14

+ Grice Schemes [1] (first iteration is Φ = |Υ1iG above) k + 1 k + 1 k + 1 |Υ i · · · |Υ i Straightforward, but long expression 2k + 4 2N+1− 2 — 1 G N G k + 2 k + 2 k + 2 † † † † † † † † † † † † (a5a7+a6a8)(a9a11a13a15+a10a12a14a16) gh |Υ1iG |Υ2iG 2 16 6 9/16 7/8 7/8 7/8

⊗4 ⊗2 Ewert–van Loock Schemes [2] (first iteration is |1i = |Υ1iEvL above) k + 2 k + 2 k + 1  k + 2 f (|Υ i · · ·|Υ i )⊗2 Straightforward, but long expression k + 4 2N+2− 4 — 1 EvL N EvL k + 4 k + 4 k + 2 k + 4 GHZ states † † † † a5···a2k+3+a6···a2k+4 i c 1 |GHZki √ 2k + 4 k — 3/4 3/4 1− 2 dk+1eeven a†a†a†+a†a†a† |GHZ i 5 7 9√ 6 8 10 10 3 3/4 3/4i 3/4c 3/4 3 2 a†a†a†a† +a†a†a† a† |GHZ i = |Υ i 5 7 9 11√ 6 8 10 12 12 4 3/4 3/4i 3/4c 5/6 4 2 G 2 W State h † † † † † † † † † 10–11 5/9 a6a7a9+a5a8a9+a5a7a10 c j |W3i √ 3 7/12 2/3 (3/4) 3/4 3 12–14 0.5785508(2)h

a Also holds for polarization non-preserving interferometers. b No generic scheme is known. c π Polarization-preserving bound obtained after rotating the polarization of some or all modes by 4 . d The best known interferometer correspond to a smaller ancilla, together with ignoring extra modes. e Computation out of reach for our program. f For networks which start by interfering the two bell states on a 50:50 beamsplitter, analyzing each half separately. g Computation at the borderline of our computing capacity: this result is the best of just 12 optimizations over the course of three weeks. h Numerical result worse than the best known analytical scheme. i Success probability achieved by measuring all photons of the ancilla and using the remaining in a “one extra Bell pair” scheme. j Obtained through a more complex transformation of the input, exposed in the main text. 8

We start by working out the polarization-preserving takes about 48 hours on the cluster for each starting point bound of SectionII. We restrict ourselves to a product to converge to a local optimum. We collected just 12 of k/2 states of the form |Υ i = √1 (|2Hi + |2V i), where optimizations, obtaining P = 9/16; unfortunately this 1 2 succ |2Hi (resp. |2V i) is any state of two horizontally (resp. result is well below the known Grice’s 7/8 scheme. vertically) polarized photons. Bell pairs are a special case of the latter, as well as the |Υ1iEvL defined in [2]. We have C. Extra single photons

|Υ i⊗k/2 = 2−k/4(|2Hi + |2V i)⊗k/2 1 The possibility of improving the discrimination proba- k/2 s X k/2 bility through the use of unentangled extra single photons = 2−k/4 |Υ, 2λi , λ is of great experimental interest, especially with the recent λ=0 development of high-efficiency single photon sources with near ideal indistinguishability [38]: such ancillary states where |Υ, 2λi is the uniform superposition of the terms would be among the simplest types of input states for a with 2λ horizontally polarized photons present in the ⊗k/2 real-world implementation of linear optical Bell measure- expansion of |Υ1i . Equation (2) then only have even ments. nonzero terms, and this leads to Ewert and van Loock explore the use of pairs of sin-  k/2  gle photon per auxiliary dual-rail mode [2, Section D of P ≥ 2−k/2−1 (17) fail supp. mat.] as substitutes of their ancillary state |Υ1iEvL. + ⊗k/2 bk/4c |Φ i While the initial transformation they apply to the input 1 photons is polarization dependent, we can still use the ≥ 2−k/2−1 √ 2 k/2+1e−2/3k πk formalism of our polarization-preserving upper bound of 1 SectionII, restricted to the case in which each photon = √ e−2/3k, (18) π enters the network polarized along the ± 4 direction. In πk the horizontal-vertical basis, this ancilla is described by the Hong-Ou-Mandel state [39] |Υ i = √1 (|20i + |02i) where we have supposed k to be a multiple of 4 and applied 1 EvL 2 a second-order version of Stirling’s approximation [37] in each mode pair. The υλ coefficients in the case of the k-photon state (with k even) |Υ i⊗k/2 correspond to the √ nn √ nn 1 EvL 2πn ≤ n! ≤ 2πn e1/12n + ⊗k/2 e e ones of k/2 Bell states |Φ i . We can therefore apply the same reasoning laid out in SectionIVB, obtaining When k is even, but not a multiple of 4, the inequality (18) the bound in eq. (17). is invalid, but we still have With this restriction in place, we get for k ≥ 4 a slightly    tighter lower bound to Pfail, compared to the photon- 1 1 number based bound (4). For example, with 4 single Pfail ≥ √ 1 + O . (19) + ⊗k/2 k |Φ i πk photons the latter gives Pfail ≥ 1/6, while eq. (17) gives P ≥ 2−32 = 1/4. In fact, the bound is saturated by √ fail 1 The 1/ k scaling of Pfail allowed by the above bound is the 4-single-photon variant of the first iteration of Ewert- worse than the 1/k scaling achieved by Grice schemes. van Loock strategy. They also consider the 12-single- ⊗12 ⊗6 Nevertheless, it does not rule out strategies approaching photon state |1i → |Υ1i . In this case, a direct ap- −76 success probabilities arbitrarily close to 1 by using as plication of equation (17) leads to Pfail ≥ 2 3 = 5/32, inputs much simpler states, i.e. k/2 Bell pairs. which is indeed smaller than the actual 7/32 failure rate Our numerical search, which is not restricted to found by the authors. However a look into the detailed polarization-preserving schemes, converges in just about symmetry of the strategy, as per the same reasoning used a minute to the Psucc = 3/4 scheme on our laptop, using at the end of SectionIIB, leads to the better (but more −43 300 MB of RAM. Unfortunately, the use of two extra Bell restricted) bound Pfail ≥ 2 1 = 3/16, which is closer, pairs shows no improvement over a single extra Bell pair, but still below 7/32. and its optimization uses significantly more resources: The aforementioned 4-photon scheme discriminates about 4 hours with 20 parallel threads on the cluster |Ψ+i and |Ψ−i with certainty, and |Φ±i only half of (see TableI), each using 3 GB of RAM, for the collec- the times. Our numerical algorithm indeed finds this 1 1 tion of a thousand optimizations. For three extra-bell (1, 1, 2 , 2 ) scheme when initialized with a 4 single photon pairs, the polarization-preserving bound of eq. (17) gives ancilla, and does not manage to improve its probabil- Psucc ≤ 13/16 = .8125 for the latter, allowing in principle ity of success—an evidence of its optimality even in the for a scheme beyond 3/4. However, this dimensionality is polarization-dependent case. Furthermore, we find other barely out of reach for our program, even using the clus- schemes achieving the same total success probability with ter. For comparison with a similar-sized case, the second a different discrimination pattern among the Bell states: 3 3 1 iteration of Grice’s strategy (the symbolic function’s sheer (1, 4 , 4 , 2 ). size of which we discussed at the end of SectionIIIB) Interestingly, with just two extra photons, we find two 9

D. GHZ and W states FIG. 1. The first “half” Ewert–van Loock single-photons scheme. It performs a Bell measurement with Psucc = 5/8 on the state |βi using two unentangled extra photons |1i, We also checked the possible use of multipartite en- two polarization-independent beamsplitters, four polarizing tangled states and ancillæ. A three-photon GHZ state beamsplitters, two phase shifters and six photocounters. ancilla, 1   |GHZ3i = √ |000i + |111i , 2 does not seem to help with respect to a simple Bell pair, as we still attain 3/4 discrimination probability as op- timum. So does a GHZ4 state, at the expense of more computational power; we wrongly expected the latter to

λ/2 be useful, given its use (along with a Bell pair) in the second iteration of Grice’s scheme [1]. The analytical polarization-preserving bound predicts Psucc ≤ 1/2 for λ/2 all |GHZki when k ≥ 3. However, for odd k, the rotation π of the polarization of a single photon by an angle of ± 4 raises this bound to 3/4. This value can be achieved by |1i |1i π |βi a trivial network applying a simple 4 rotation on k − 2 spatial modes of the ancilla, which leaves the remaining two photons in the |Φ±i states, which can be used as described above5 to achieve a 3/4 success probability. 1 1 3 1 1 schemes, (1, 1, 4 , 4 ) and (1, 4 , 2 , 4 ), achieving a discrimi- Another interesting state to investigate is the three- nation probability of Psucc = 5/8 = 0.625. The first can photon W state, be easily described as half of the 4-photon Ewert–van Loock scheme [2] mentioned above and is described in 1   |W3i = √ |100i + |010i + |001i . (20) Figure1. It is especially relevant experimentally, since 3 it is the simplest scheme achieving a success rate above 1/2. It was independently obtained by Ewert and van Like GHZ3, it is a genuinely 3-party entangled state but, Loock [40]. By “halving” in the same way the Ewert–van unlike all other states studied above, it is not a graph Loock 12-photon scheme that uses 4 + 8 single photons state, not even a stabilizer state. Its specific symmetry and achieves a probability of 25/32, we find a similar is likely the source of the interesting results we find (end “intermediate” scheme with 4+4=8 extra photons, achiev- of TableII). Having the same number of horizontally ing Psucc = 49/64. Unfortunately, even using the cluster, polarized photons in each term, this state is as useful numerically testing this scheme (n = 12, k = 8) proved to as the vacuum for polarization-preserving interferome- be unfeasible. ters, as showed in Section IVA. However, the rotation π of the polarization of two photons by 4 gives the higher We notice (as in [19]) that using an odd number k + 1 bound Psucc ≤ 2/3, and further manipulation (see below) of single photons in the ancilla does not improve the raises this bound to Psucc ≤ 3/4. The best optimum we discrimination probability over the case with k photons. find numerically, when we use a network with no extra This is in line with the analytically-derived behavior for vacuum modes (n = 10), is Psucc = 5/9, significantly polarization-preserving interferometers of SectionIIB. lower than the 3/4 achieved with a simpler two-photon Bell pair. This optimum is extremely rare (once in more Very recently, Smith and Kaplan [19] tackled a simi- than 20 000 optimizations), and we observe the figure lar problem, numerically optimizing linear optical Bell of merit in this case to suffer heavily from the problem measurements with single photons ancillæ. Their mea- described in eq. (14) about the relationship between f(U) surement were allowed to be ambiguous, and the chosen and Psucc(U). figure of merit was the classical mutual information be- However, in this case we could find a better scheme by tween state preparation and measurement. Remarkably, manipulating the state “by hand”. By measuring the last despite this difference, we find corresponding results for two spatial modes we can apply a transformation such that ancillæ up to five single-photons; with six photons, they the remaining modes can be, depending on the result of find a slight improvement of their mutual information, the measurement, either in the state √1 (|2H, 0i − |0, 2V i) 2 but the corresponding measurement is ambiguous [41]. Even if with six photons (TableII) we could not find any scheme beyond Psucc = 3/4—we collected more than 10 000 optimizations—the polarization-preserving bound 5 The phase of the Bell pair is determined by the parity of the mea- allows for a scheme with Psucc ≤ 13/16; an improvement surement of the k − 2 photons, and its effect is simply exchanges + − over 3/4 is therefore not excluded. the photon patterns for the detection of Φ and Φ . 10 or |Φ+i. Applying to these modes the same unitary of the have also shown that employing many copies of a Bell pair one-Bell-pair Psucc = 3/4 Grice strategy gives a scheme for leads to a different (and worse) scaling than using Grice’s |W3i with Psucc = 7/12. While our optimization program states, giving interesting insights into the reason why the correctly identifies this scheme as a local optimum when big GHZ-like states that appear in the schemes of [1, 2] put in as starting point, an added Gaussian noise of are needed. Of course, eq. (17) being only a bound, more average magnitude well below the requested convergence research is needed to investigate its tightness, and whether accuracy is sufficient for the optimization to diverge from near unity success can indeed be achieved. it. This numerical fragility may be the reason why we As pointed out in the paper, some interesting cases could not find this optimum through the optimization. lie beyond the computational capabilities at our disposal. Applying the analytical bound to such transformed ancilla While there is still room for improvement, e.g. by further gives us Psucc ≤ 3/4. Interestingly, adding at least two optimization of the code and/or by employing more CPU vacuum modes (n ≥ 12) allows the program to reach the time, our numerical approach is at least as hard as comput- better discrimination probability of 0.5785508(2). Still, ing permanents of k × k submatrices of a unitary matrix. this is slightly below the manually-found 7/12. As proved by Valiant [42] and more recently pointed out by Arkhipov and Aaronson [43] in the context of linear optics, this task pertains to the complexity class #P-hard and is not believed to be solvable in polynomial time on V. CONCLUSION a classical computer. However the symmetry of the Bell states and the unambiguity constraints, which enforce In this work we have investigated the optimal success a structure on the matrix entries—by imposing many probability of a linear optical Bell measurement assisted null probabilities—may enable significant speedups (even by different kinds of input ancillary states |Υi. In Sec- exponential ones), even if the overall scaling could stay tionII, we showed how to obtain an upper bound from exponential. Recent works in [44, Appendix B] and [45, the input photon polarization distribution in |Υi, when Appendix D] suggest optimized algorithms for computing the network is restricted to polarization-preserving inter- the permanent of matrices with repeated columns/rows; ferometers; we noticed that the bound is tight for some they may help to improve our computation. published schemes. With the aim of exploring the pa- We conclude by noting that our simulator might be rameter space of generic interferometers, we developed in useful in exploring the power of linear optics in solving SectionIII a linear optical network simulator, capable of other types of problems. Due to the flexibility of Python evolving a generic input state through the network and and of the separation between symbolic computation and computing the analytical expression of the probabilities of numerical optimization, the program only requires minor each detection event in the output. We then conducted a modifications in order to be adapted to new tasks. As a numerical search for the optimal value of Psucc in for fixed matter of fact, it has already been used during discussions |Υi, and we discussed how to reduce the overall computa- with Chabaud et al. in order to gain insight on the effect tional cost by exploiting some symmetries of the problem of Hadamard networks, helping in the design of linear at hand. We presented the results of both analytical and optical swap-test [46]. estimated numerical bounds in SectionIV, and we recall them in TableII. Through both the analytical study and the numerical ACKNOWLEDGMENTS optimization we find evidences (but no proofs) for the optimality of known small schemes. Some of them seem We warmly thank the Quantum Information team of the achievable experimentally in the short term, as they re- LIP6 for their hospitality, and especially Ulysse Chabaud quire as ancilla either a small number of photons or an for stimulating discussions. We acknowledge the use of additional Bell pair. While restricted to the polarization- the computing center MésoLUM of the LUMAT research preserving case, the photon-number based analytical up- federation (FR LUMAT 2764). AO acknowledges finan- per bound, saturated by Grice’s schemes, is evidence for cial support from ANR project ANR-16-CE39-0001 and their optimality if resources are measured in terms of the the Erasmus+ Traineeship Programme of the European number of extra ancillary photons. In this setting, we Union.

[1] W. P. Grice, Physical Review A 84, 042331 (2011). [5] C. H. Bennett, G. Brassard, C. Crépeau, R. Jozsa, [2] F. Ewert and P. van Loock, Physical Review Letters 113, A. Peres, and W. K. Wootters, Physical Review Let- 140403 (2014). ters 70, 1895 (1993). [3] J. Calsamiglia and N. Lütkenhaus, Applied Physics B 72, [6] S.-W. Lee and H. Jeong, in proceedings of the First Inter- 67 (2001). national Conference on Entangled Coherent State and Its [4] S. L. Braunstein and A. Mann, Physical Review A 51, Application to Quantum Information Science (Tamagawa R1727 (1995). University, Tokyo, 2012) pp. 41–46. 11

[7] D. Bouwmeester, J.-W. Pan, K. Mattle, M. Eibl, H. We- [27] A. Meurer, C. P. Smith, M. Paprocki, O. Čertík, S. B. infurter, and A. Zeilinger, Nature 390, 575 (1997). Kirpichev, M. Rocklin, A. Kumar, S. Ivanov, J. K. Moore, [8] C. H. Bennett and S. J. Wiesner, Physical Review Letters S. Singh, T. Rathnayake, S. Vig, B. E. Granger, R. P. 69, 2881 (1992). Muller, F. Bonazzi, H. Gupta, S. Vats, F. Johansson, [9] K. Mattle, H. Weinfurter, P. G. Kwiat, and A. Zeilinger, F. Pedregosa, M. J. Curry, A. R. Terrel, S. Roučka, A. Sa- Physical Review Letters 76, 4656 (1996). boo, I. Fernando, S. Kulal, R. Cimrman, and A. Scopatz, [10] M. Żukowski, A. Zeilinger, M. A. Horne, and A. K. Ekert, PeerJ Computer Science 3, 27 (2017). Physical Review Letters 71, 4287 (1993). [28] M. Abramowitz, I. A. Stegun, and R. H. Romer, American [11] J.-W. Pan, D. Bouwmeester, H. Weinfurter, and Journal of Physics 56, 958 (1988). A. Zeilinger, Physical Review Letters 80, 3891 (1998). [29] S. Pedroni, “Goals and Architecture Overview — PyPy [12] N. Lütkenhaus, J. Calsamiglia, and K.-A. Suominen, documentation,”. Physical Review A 59, 3295 (1999). [30] G. H. Hardy and S. Ramanujan, Proceedings of the Lon- [13] E. Knill, R. Laflamme, and G. J. Milburn, Nature 409, don Mathematical Society s2-17, 75 (1918). 46 (2001). [31] Theano Development Team, arXiv:1605.02688 [cs.SC] [14] P. Kok, W. J. Munro, K. Nemoto, T. C. Ralph, J. P. (2016). Dowling, and G. J. Milburn, Reviews of Modern Physics [32] http://www.mesolum.lumat.u-psud.fr (Mésocentre LU- 79, 135 (2007). mière Matière – MésoLUM). [15] H. A. Zaidi and P. van Loock, Physical Review Letters [33] T. E. Oliphant, Computing in Science and Engineering 110, 260501 (2013). (2007), 10.1109/MCSE.2007.58. [16] D. Vitali, M. Fortunato, and P. Tombesi, Physical Review [34] D. Kraft, A software package for sequential quadratic Letters 85, 445 (2000). programming, Forschungsbericht. Deutsche Forschungs- [17] S.-W. Lee and H. Jeong, Physical Review A 87, 022326 und Versuchsanstalt für Luft- und Raumfahrt, DFVLR (2013). (DFVLR, Braunschweig, 1988). [18] S.-W. Lee, K. Park, T. C. Ralph, and H. Jeong, Physical [35] M. Ozols, “How to generate a random unitary matrix,” Review Letters 114, 113603 (2015). (2009). [19] J. A. Smith and L. Kaplan, arXiv:1802.10527 [quant-ph] [36] J. Nocedal and S. J. Wright, Numerical optimization (2018). (Springer, 2006) p. 664. [20] A. Olivo and F. Grosshans, arxiv.org/src/1806.01243/anc [37] H. Robbins, The American Mathematical Monthly 62, 26 (supplementary information of this paper, 2018). (1955). [21] I. Ivanovic, Physics Letters A 123, 257 (1987). [38] P. Senellart, G. Solomon, and A. White, Nature Nan- [22] D. Dieks, Physics Letters A 126, 303 (1988). otechnology 12, 1026 (2017). [23] A. Peres, Physics Letters A 128, 19 (1988). [39] C. K. Hong, Z. Y. Ou, and L. Mandel, Physical Review [24] D. M. Greenberger, M. A. Horne, and A. Zeilinger, in Letters 59, 2044 (1987). Bell’s Theorem, Quantum Theory and Conceptions of [40] P. van Loock, in presentation at “Secure Communication the Universe (Springer Netherlands, Dordrecht, 1989) pp. via Quantum Channels” (Bielefeld, Germany, 2017). 69–72. [41] J. A. Smith, private communication (2017). [25] V. Fock, Zeitschrift für Physik 75, 622 (1932); english [42] L. Valiant, Theoretical Computer Science 8, 189 (1979). translation in L. D. Faddeev, L. A. Khalfin, and I. V. [43] S. Aaronson and A. Arkhipov, Theory of Computing 9, Komarov, V.A. Fock–selected works : quantum mechanics 143 (2013). and quantum field theory (Chapman & Hall/CRC, 2004) [44] M. C. Tichy, Entanglement and interference of identical p. 567. particles, Ph.D. thesis, Freiburg University (2011). [26] S. Scheel, in Quantum Information Processing (Wiley- [45] V. S. Shchesnovich, International Journal of Quantum VCH Verlag GmbH & Co. KGaA, Weinheim, FRG, 2005) Information 11, 1350045 (2013). pp. 382–392. [46] U. Chabaud, E. Diamanti, D. Markham, E. Kashefi, and A. Joux, arXiv:1805.02546 [quant-ph] (2018).