Chapter 8 - Decoherence-Free/Noiseless Subsystems

From Qunet
Revision as of 21:47, 7 March 2011 by Mbyrd (talk | contribs) (Phase-Protected DFS)
Jump to: navigation, search

Introduction

In the last chapter we saw that it is possible, at least in principle, to detect and correct errors in quantum systems. In this chapter a different method for protecting against errors is explored. This method encodes information into quantum states such that the information avoids errors. The information is encoded in such a way that it is invariant under the errors produced by the system-bath Hamiltonian. This requires the identification of a symmetry and then subsequently taking advantage of that symmetry. It turns out that there is one main advantage to this method of encoding against errors which was not initially a motivation for their study. In some important examples, the states can be used to enable universal quantum computing on a set of encoded states even when it is not possible on the set of physical states. This will be explored in Section 8.6 below, and further applications will be discussed in Chapter 10.

The initial work to find error-avoiding codes involved what are called decoherence-free subspaces. They were later generalized to subsystems. These terms are defined below and reviews may be found in Whaley/Lidar and Byrd/Wu/Lidar. Although there are alternative descriptions of decoherence-free subspaces and the subsystem generalization in terms of master equations (see Whaley/Lidar and references therein), in this chapter the Hamiltonian description is used. This aids in the intuition behind these constructions and, as an introduction, this preferred here.

General Considerations

In what follows, a general quantum system will be assumed to be coupled non-trivially to a bath such that the entire system-bath Hamiltonian is given by


(8.1)

where acts only on the system, acts only on the bath, and


(8.2)

is the interaction Hamiltonian with the acting only on the system and the acting only on the bath. The "error algebra" is denoted and is the algebra generated by the set . (In the words of Paulo Zanardi, these are all the bad things that can happen to the system.) The obviously cause errors because they describe the interaction between the system and the bath. The reason the error algebra contains other terms is that when the system and bath together evolve unitarily, the exponential of the Hamiltonian gives products of the with each other and also with , and will be present in the unitary evolution. In the case that is identically zero, or we can remove it by changing basis (to a rotating frame), the problem simplifies to the consideration only of the algebra of the or the modified ( in the rotating frame) need be considered, respectively.

At this point, the objective is to find a set of states which will be immune to the errors which are present. Such states are identified using the error algebra. The way this is done is to put the algebra in a form which is block-diagonal. This type of algebra is said to be "reducible" which means that one may always block-diagonalize it. (See Appendix D.) Suppose that each element of the algebra can be put into the same block-diagonal form using a particular unitary transformation . Then for any element of the error algebra, , is block-diagonal. If the information is stored in states which are acted upon by these blocks, and only these blocks, then the information is protected because the information stays in the states which are defined by these blocks. If the blocks are blocks, i.e., submatrices, which are just numbers, then the states which make up such a system are called decoherence-free "subspaces". If the blocks are larger, then they are called decoherence-free subsystems, or noiseless subsystems.

In the next few sections, the examples will illustrate this construction and how the states are protected.

DNS Examples

The formal description for a DNS is quite useful for finding a suitable DNS given a particular set of errors. However, several examples are know which not only illustrate how one would use the general methods, but also provide examples of importance to experimental physics for reasons which will become clear later in this chapter. Familiarity with the addition of angular momenta will help understand the examples and then also the general formalism. References are Griffiths' book (introductory) and Arno Bohm's book (more advanced) and Appendix D which provides a basic introduction to group theory. However, the objective here is to provide the ideas and examples that will aid in understanding the key points of the theory.

Phase-Protected Two-Qubit Decoherence-Free Subspace

One of the simplest example of a decoherence-free subspace is a method for using two physical qubits to encode one logical qubit in such a way that the logical qubit is protected against phase errors which operate on both physical qubits in the same way. This is called a collective phase error.

Let us begin by assuming there is no system Hamiltonian and that the two physical qubits in the system are acted upon by the Hamiltonian


(8.3)

where is a phase operator which acts on the th qubit. This Hamiltonian acts the same on each of the two qubits to produce the same phase error on each. If we now choose our logical states two be


(8.4)

then our logical states will be given by


(8.5)

If we now suppose that the system and bath are initially uncoupled, then the states, acted upon by the Hamiltonian gives


(8.6)

which gives a decoupled system and bath. This is clear since the exponential of this Hamiltonian gives the unitary evolution of the state. Thus


(8.7)

where . This Hamiltonian acts as the identity on the logical states of the system. To be even more explicit, when one can trace out the bath degrees of freedom to find that the state of the system remains unchanged by this Hamiltonian. Thus the system has been encoded in such a way that this type of error does not adversely affect the state of the system. This allows for perfect storage.

It is perhaps worth emphasizing that this is a simple model of a particular type of decoherence which would ordinarily lead to collective phase errors on the system states. Such noise has also been called "weak decoherence." However, because the information is encoded, it is protected against these types of errors. In the language of a quantum error correcting codes, this is an infinite distance code since the error does not lead to an error no matter how long, or to what extent the error acts. In the next subsection we will see how this can be extended to collective errors acting on a number of qubits in an arbitrary way, not just codes that will protect against phase errors.

Four-Qubit Decoherence-Free Subspace

Consider a Hamiltonian which causes arbitrary collective errors on a collection of four qubits,


(8.8)

where are arbitrary constants. The standard procedure would be to find irreducible representations of the algebra of errors which is generated by the three collective errors


(8.9)

Here again we are supposing that there is no system Hamiltonian, .

The standard procedure would be to block-diagonalize the set of , which can be done. However, there are at least two other methods for identifying the decoherence-free subspace of states. One is to use the condition that we found in the last subsection that acting on the states will give zero thus ensuring their invariance. This can be done by noticing that collective errors are angular momentum operators and that we could try to identify states which give zero when acted upon by these operators. A little thought would lead one to the conclusion that singlet states do not transform under the angular momentum operators since they have total angular momentum zero as well as the z-component of their angular momenta zero. Another way is to know from previous experience that the addition of angular momenta of four spin-1/2 particles will produce two singlet states. More generally, for collective errors, one may simply note that degeneracies in the representations may be used for the storage and manipulation of information. This allows one to use other techniques, such as the Young Tableaux, to identify such degeneracies. Still, this is a bit unsatisfying to those who are not familiar with any of these methods. For that reason, and also for generalizations, there does exist an algorithm for the identification of these systems which will be discussed later. For now, it will be shown that it is possible to construct states which are immune to this type of noise.

As stated, there are two singlet states in the tensor product of three two-state systems. These can be obtained by using the Wigner-Clebsch-Gordan coefficients for the addition of angular momenta. (There are many good reference for this in standard texts including Griffiths book (introductory) and Arno Bohm's book (more advanced).) The objective is to find linear combinations of the states of the two-state systems which will give singlet states. In standard spin notation the states of the two-state systems include the following basis elements:


(8.10)

which correspond to the computational basis states


(8.11)

In the language of angular momentum, the objective is to change basis to obtain states of a given total angular momentum given by the standard angular momentum addition rules. For our purposes here, the transformation which takes these states to the new basis will be denoted and is a unitary transformation corresponding to the collection of Wigner-Clebsch-Gordan coefficients. This is the matrix which will block-diagonalize all of the collective operators . Explicitly, the singlet states are


(8.12)

One can show by explicit computation that


(8.13)

for and . The two states and can now be used as logical zero and logical one for a logical qubit state which is immune to any collective error on the four physical qubits.


Three-Qubit Noiseless Subsystem

As stated in Section 8.2, subsystems have a more complex structure than subspaces which are, by definition, one-dimensional. The simplest DNS which protects against collective errors is comprised of three qubits. In this case there is a set of two states which represent the logical zero state and a set of two states which represent the logical one state as will be shown below.

The error operators have the same form as Eq.(8.9), but with only three particles not four. In the language of the addition of angular momentum, total angular momentum states consist of two two-dimensional subsystems and one four-dimensional. The Wigner-Clebsch-Gordan coefficients can again be used as the DNS transformation to put the states into the DNS basis. After block-diagonalization the errors take the form


(8.14)

where the zeroes represent matrices of zeroes,


(8.15)

and the form of is not relevant since it acts on the subspace orthogonal to the code space. The DNS transformation takes the vector of computational basis states


(8.16)

to the new basis states


(8.17)

Under collective noise the two states representing the logical zero, which are the first two states in the column, can be mixed together, as well as the two which represent the logical one in the next two entries in the column. However, the two sets, in other words the logical zero states and logical one states do not get mixed with each other. The last four states in the column are often referred to as the orthogonal subspace (to the code) which is denoted . In this case the states are not annihilated by the Hamiltonian as was the case in the first two examples above. However, the information is still able to be reliably stored in the subsystems without loss of information.

The next question which one might naturally ask is, how can one perform quantum computing on these states?

Quantum Computing on a DNS

It is perhaps surprising that one of the most intriguing and promising uses of a DNS encoding is for universal quantum computing rather than for avoiding noise. In some important cases, executing a complete set of universal quantum gates on physical qubits is impractical. However a DNS encoding can be used to enable universal quantum computing on the logical subsystem even when it is practical, or even not possible, on the physical qubits. In this section a general criterion and several examples are given to show exactly how this works.

Before proceeding, it is important to note that another use for DNS is as part of a comprehensive treatment of noise which involves other error prevention methods as well. Thus the DNS is not used as a method for the complete elimination of noise since noises are not often only collective and designing a DNS for noise which is not collective is difficult. Thus a DNS may be used to eliminate noise, and/or for encoded universality, while other noises are treated with other error prevention methods. (This is discussed more thoroughly in Chapter 10.) When quantum computing on a DNS, it is important to preserve the subsystem structure. Gating operations which preserve the subsystem structure do not take the states out of the protected subsystem during computation. Such operations are called compatible transformations. Before presenting explicit examples, a general criterion for how to construct gating operations on a DNS is given. (This result is from Kempe, et al.)

Let us consider an encoded state . If this state is in the DNS code space, then a stabilizer of the code, can be defined for the subspace. This is the set of operations which leave a state unchanged. In the case of an encoded subsystem, the set of elements which leave the state unchanged is exactly the noise operators. This is due to the fact that the encoded states are chosen to avoid exactly that noise. Let a basis for the noise operators be . The a stabilizer element can be parametrized using


(8.18)

for some parameters . Since the stabilizer elements fix the code words, then


(8.19)

For a unitary transformation to be compatible with the code, the unitary must not take the state out of the code space, which implies, for any ,


(8.20)

so that acting before or after the transformation with any element of the stabilizer should give another state in the code space. For this to be true for all times , a sufficient, but not necessary condition is given by


(8.21)

for all . Though this is only a sufficient condition and therefore not the most general case, it is surprisingly useful as will be shown in the following examples.

QC Examples

In quantum dot quantum computing proposals, single qubit rotations are much slower than two-qubit operations which use the Heisenberg exchange interaction. Therefore any quantum computing proposal which could use only exchange and forgo the much slower single physical qubit rotations would be a great advantage. Here, several examples are given which do just this, therefore saving a great deal of time by enabling operations which are much faster than would otherwise be required.


Phase-Protected DFS

Recall the phase-protected DNS which was discussed in Section 3.1,

Logical operations on this subspace can be performed using


(8.22)

where is the Pauli x-operation on the first qubit and similarly for the other operators. The logical operation, denoted , is given by


(8.23)

A logical is given by


(8.24)

which is a Zeeman splitting which can be always on and is due to an external magnetic field.

Four-Qubit DFS

The Heisenberg exchange interaction Hamiltonian is


(8.25)

where, again is the Pauli x-operation on the first qubit and similarly for the other operators.


Three-Qubit NS