A Quantum Walk Control Plane For Distributed Quantum Computing in Quantum Networks
A Quantum Walk Control Plane For Distributed Quantum Computing in Quantum Networks
Matheus Guedes de Andrade1 , Wenhan Dai1, 2 , Saikat Guha3 , and Don Towsley1
1
College of Information and Computer Science, University of Massachusetts Amherst
2
Quantum Photonics Laboratory, Massachusetts Institute of Technology
3
College of Optical Sciences, University of Arizona
Abstract—Quantum networks are complex systems alone [3]–[5]. Distributed quantum computing becomes
formed by the interaction among quantum processors even more interesting in the noise intermediate scale
through quantum channels. Analogous to classical com- quantum machines (NISQ) scenario where there is a
puter networks, quantum networks allow for the distribu-
tion of quantum computation among quantum comput- clear tradeoff between the size of quantum comput-
ers. In this work, we describe a quantum walk protocol ers, in terms of number of qubits, and the fidelity
to perform distributed quantum computing in a quantum of quantum operations, given the fact that physical
network. The protocol uses a quantum walk as a quantum separation directly reduces cross talk among qubits [6].
control signal to perform distributed quantum operations. When the quantum network scenario is considered, the
We consider a generalization of the discrete-time coined
quantum walk model that accounts for the interaction complexity of distributed quantum computing extends
between a quantum walker system in the network graph in at least two dimensions. First, physical quantum
with quantum registers inside the network nodes. The channels have a well known depleting effect in the
protocol logically captures distributed quantum com- exchange of quantum data, e.g the exponential decrease
puting, abstracting hardware implementation and the in channel entanglement rate with distance [7]. Second,
transmission of quantum information through channels.
Control signal transmission is mapped to the propagation there is a demand for a quantum network protocol
of the walker system across the network, while interac- capable of performing a desired distributed quantum
tions between the control layer and the quantum registers operation while accounting for network connectivity.
are embedded into the application of coin operators. Generic quantum computation with qubits in distinct
We demonstrate how to use the quantum walker system quantum processors demands either the application of
to perform a distributed CNOT operation, which shows
the universality of the protocol for distributed quantum remote controlled gates [8] or the continuous exchange
computing. Furthermore, we apply the protocol to the of quantum information. For both cases, a network
task of entanglement distribution in a quantum network. protocol is necessary to orchestrate the communication
between nodes that are not directly connected with one
another.
I. I NTRODUCTION
One challenge in the design of a control protocol is
Quantum networking is an innovative, multidisci- the need for it to be agnostic to hardware implementa-
plinary field of research that promises revolutionary tions. There is a plethora of physical systems suited for
improvements in communications, enabling tasks and quantum computation under investigation, supercon-
applications that are impossible to achieve with the ducting qubits [9], trapped ions [10], [11] and Silicon-
exclusive exchange of classical information [1], [2]. vacancy color centers in diamond [12], [13] to name a
Similar to a classical computer network, a quantum few. In addition, there is a diverse investigation in the
network is a distributed system composed of quantum architectural description of quantum interconnecting
computers and quantum repeaters that exchange quan- devices capable of exchanging quantum information
tum information across physical channels. Among ap- encoded in distinct quantum physical quantities [14].
plications supported by quantum networks, distributed This diverse ecosystem of quantum network tech-
quantum computing is of particular interest as it lever- nologies indicates that distributed quantum computing
ages the power of interconnected quantum computers network protocols need to abstract physical implemen-
to create a virtual quantum machine with process- tations of quantum switches and network connectivity
ing capabilities that surpass its physical constituents while maintaining universality requirements.
|A, cp
D. Separating data and control
|v, cuA A
A
The state prescribed in (15) is an entangled state
|A, cA between control and data. This implies that a partial
(a) Path p connecting A and B. (b) Map trace operation in the walker system does not leave the
between edges state of a and b as it should be if the operation was
and vectors.
performed without the walker. In order to overcome
Fig. 1: Notation for edges exemplified in a grid graph. this problem, the walker evolution is reversed after
Consider that A and B are two nodes connected in a the controlled operation takes place by applying the
2D grid network. (a) p is a minimum path connecting A inverses of the unitary operators used for propagation.
and B with hop-distance 4 traversed by the walker. (b) Since the coin and shift operators considered are per-
Each edge on the path corresponds to a vector in HW , mutation operators, they are Hermitian unitaries and,
which appear in the walker wavefunction throughout thus, are their own inverses. It takes Δ(A, B) time
movement. The degrees of freedom are defined such steps to reverse the walker back to A and to transform
that |x, cxy represents edge (x, y). As an example, the joint state of the system to the form
the flip-flop operator specified in (6) maps |v, cvu →
|u, cuv , while the operator Cu defined in terms of (18) α |A, cA , 0a , Ψb + β |A, cA , 1a , Ψb . (19)
maps |u, cuA → |u, cuv .
It should be clear that an extended coin operator with
interaction of the form given in (7) and a measurement
minimum path p chosen. All operators Cv in (7) have on the walker produces one of the following separable
the form states
Cvp = |c1 c2 | + |c2 c1 | + |cc| (18) |A, cA ⊗ (α |0a , Ψb + β |1a , Ψb ),
(20)
c∈Cv |A, cA ⊗ (α |0a , Ψb − β |1a , Ψb ),
c=c1 ,c2
where c1 and c2 refer to the degrees of freedom that with equal probability. It is straightforward from the
represent the edges incident to v in p. Thus, we define separability between the walker system and the qubits
Cvp specifying c1 and c2 for the vertices of interest. a and b that the state after a partial trace operation
The unitary CA has c1 = cA and c2 = cpA . Let u and in the walker system is now equivalent to a CNOT
w be the neighbors of v ∈ p \ {A, B} on the path. Cv gate, up to a single-qubit Z gate conditioned on the
has c1 = cvu and c2 = cvw , representing a permutation measurement outcome.
between the edges (v, u) and (v, w) in p. Finally, the Note that moving the walker backwards is only one
operator CB has c1 = cpB and c2 = cB . It suffices to set of several ways to achieve a separable state between the
Kv (t) = IMv in (8) to perform the desired controlled walker and the qubits a and b. In a nutshell, any walker
operation between a and b, although it is possible to dynamics that concentrates the walker’s part of the
perform operations controlled by a on the qubits in the wavefunction into a single network node suffices for
intermediate nodes as the walker moves by choosing this purpose, e.g propagating the walker wavefunction
Kv (t) accordingly. from both A and B to an intermediate node. Under the
The overall behavior of the walker is straightforward assumption of quantum error correction, this backward
and is illustrated in Figure 2. It is assumed that the propagation can occur simultaneously with any further
operator O defined in (13) is applied to the system at quantum operation that nodes A and B may perform
the beginning of execution. The first application of the on the qubits and does not impact the latency of the
coin operator in A creates a superposition between the protocol.
B B B B B
|B, cp
B
w w w w w
u u u u u
|v, cvu
v v v v v
|A, cA
p |v, cvA
|A, cA
z A A A A A
|A, cA |A, cA |A, cA |A, cA |A, cA
(a) Initial state. (b) Coin in A. (c) Flip-flop shift (d) Coins in path. (e) Final state.
Fig. 2: Protocol execution in a 5-by-5 grid with a quantum walk through a single path. Dark edges depict
vectors which have non-zero wavefunction component in a given step. (a) The initial state of execution is the
state generated by the application of the controlled operation demonstrated in (13). The node z is shown for
illustration purposes and is not for propagation. (b) The first coin flip permutes the wavefunction into edges
(A, A) and (A, v). (c) The flip-flop shift exchanges edge (A, u) with edge (u, A), moving the walker while
mapping the self-loop edge to itself. (d) After the first coin flip, all subsequent coin operators work as shift
operators inside a node, mapping degrees of freedom in order to propel the walker towards B. (e) After Δ(A, B)
steps, the final wavefunction is a uniform superposition between edges (A, A) and (B, w), which can be used
to perform an operation controlled by qubit a located in A with target qubit b located in B.
IV. P ROPAGATION OF MULTIPLE CONTROL SIGNALS Since the memories affected by walker j are unique,
for every j ∈ {0, . . . , T − 1}, each walker can be
We demonstrated in the previous section how the
seen as a parallel control signal working on distinct
quantum walk can propagate through a particular path
qubits. Note that, even though the walker evolution is
of the network connecting nodes A and B. This is
performed by separable extended coin operators and
easily extended to the traversal of multiple paths as we
shifts, the application of the controlled operation O
will show next. In this setting, k walkers can be used
described in (10) before propagation implies that the
to simultaneously perform operations controlled by a
walkers are maximally entangled with each other and
with k target qubits bj located in nodes Bj , for j ∈
with qubit a. Furthermore, the flip-flop shift operator
{0, . . . , k−1}. This protocol execution translates to the
for each walker does not depend on a particular path
parallel application of k + 1 1-qubit gates controlled
and the joint operator for all walkers is described by
by a in terms of distributed quantum computation.
The analysis carried for a single walker system
extends to this case by considering a set of paths P k−1
such that, for every j, the path pj ∈ P connects A and S P
= S, (22)
Bj . The path pj defines extended coin operators for the j=0
j-th walker following (18). By carefully choosing the
qubits controlled by each walker, so that each walker
interacts with a unique set of qubits, it is possible with S given in (17).
to route k = |P| walkers concurrently. This is a
In addition to simultaneous 2-qubit control opera-
trivial extension to the single walker case because the
tions, it is trivial to use multiple walkers departing
separability of individual coins for each walker yield
from A to perform controlled operations in the nodes
the k-walker coin operator for the set of paths P to be
Bj , where the target qubit bj in Bj is controlled by
of the form
qubit aj in A. The fundamental difference for this case
k−1
is that the O operator described in (13) is controlled by
C P (t) = C pj (t). (21) qubit aj when applied to the j-th walker, generating a
j=0 separable state among the walkers.
V. Q UANTUM WALK PROPAGATION AND the protocol assumes a network model where every
ENTANGLEMENT DISTRIBUTION quantum channel in the network is mapped in a 1-to-
As described previously, the operators defined in 1 fashion with pairs of qubits in the nodes incident
(7) and (10) allow for universal distributed quantum to that channel. The logical behavior of this protocol
computation among nodes of the network. In this sense, is recovered by sending one quantum walk from A
the movement of the walker introduces entanglement through each path pj such that, once it arrives at B,
across nodes. Given this is the case, it is suitable to every qubit incident to the quantum channels in the
consider entanglement distribution protocols in terms path are in the same GHZ state. Thus, consider that
of the quantum walk control plane. In this section, we all qubits in the network start in the |0 state. Initialize
j
apply the quantum walk control protocol to recover the k walkers in state |A, cA . The operator CA (0) for the
behavior of two entanglement distribution protocols. In j-th walker can be chosen as any unitary that maps
particular, the recovered protocols distribute maximally 1 p
entangled Greenberger-Horne-Zeillinger (GHZ) states |A, cA → √ (|A, cA + A, cAj ), (25)
2
across network nodes. We demonstrate, for both pro- j
tocols, how the entanglement introduced by the walker while the interaction operator KA (0) is taken to be
can be used to produce the same entangled states. the identity operator. The state of the system after the
Superposition of the walker wavefunction allows for application of the extended operator C(0) is
the creation of a Bell state between a and b as follows. 1 p
C(0) |Ψ(0) = √ ( |A, cA + |A, cAj ). (26)
Assume that the joint state of the system is at time t 2
j
described by
1 Protocol execution is performed by the operators de-
|Ψ(t) = √ (|A, cA , 0a , 0b + |B, cB , 0a , 0b ), (23) fined in (22) and (21) as specified in the previous
2 section, although the operators Kv are now defined
which is a separable state between the walker and the to generate entanglement in the nodes as the walker
qubits a and b. By setting UV = Xv ⊗I and CV (t) = I passes by. Let qvj0 and qvj1 denote the pair of qubits
for V ∈ {A, B} in (7), the extended coin operator C(t) inside node v ∈ pj \ {A, B} that need to be entangled
is together by walker j. The operator Uvj in equation (8)
1 is defined for walker j by specifying
C(t) |Ψ(t) = √ (|A, cA , 1a , 0b + |B, cB , 0a , 1b ),
2
(24) Kv (t) = Xqj0 ⊗ Xqj1 Iq (27)
q=qvj0 ,qvj1
which is an entangled state between a and b. The j j
entanglement between a, b and the walker system can for all t, performing an X gate on qubits qv0 and qv1
be removed by transmitting the walker back to A as controlled by the position of the j-th walker. Since
explained in Section III-D. Note that only operators of paths are all edge disjoint, every qubit in the graph
the form prescribed in (7) are needed because there is spanned by P interacts with exactly one walker under
no control dependent on the state of either a or b. the application of the generalized coin operator. For
A GHZ generalizes Bell states to multiple qubits. walker j, the interaction operator with qubit aj is given
A k-qubit GHZ projection is a von-Neumann mea- by
surement operation in the GHZ basis and a Bell state Xaj ⊗ I, when t = 1,
KA (t) = (28)
measurement (BSM) is a 2-qubit GHZ projection. Iaj ⊗ I, when t = 0,
A. Multi-path entanglement distribution with BSMs where the identity operator after the tensor product
We start with the multi-path protocol defined in [25]. symbol acts on all qubits in A except aj . Considering
Assuming global link state knowledge, it suffices to that uj is the first neighbor of A in the path pj , the
choose the same paths that a complete round of the application of the evolution operator S(0)C(0) gives
protocol uses to propagate entanglement. Consider that, 1
for such round, the set of paths P = {p0 , . . . , pk−1 } is |Ψ(1) = √ ( |A, cA + |uj , cuj A ), (29)
j
2
used. In this protocol, every path pj used to distribute
entanglement yields a set of 2(|pj |−1) qubits in a GHZ where the data qubits are omitted for simplicity.
state, which comes from the net effect of performing S(1)C(1) generates an entangled state between aj and
|pj | − 2 BSMs in the intermediate nodes. Moreover, the qubits quj0 and quj1 and moves the walker to
the neighbors that are 2 hops away from A. Every
application of S(t)C(t) for t > 1 increases by two the
number of qubits entangled with walker j such that,
when t = Δ(A, B), the walker j is in an entangled
state with the qubits in pj , aj and bj . Figure 3(a)
depicts protocol execution for a 5-by-5 grid network.
In this case, P is formed by two shortest-paths in the
B
grid, i.e K = 2, and the entire evolution of the walkers
takes 4 steps.
B. Distributing GHZ states across network nodes
GHZ projectors are used in [26] to improve the
multi-path BSM protocol described in [25]. The logical A
behavior of the GHZ distribution protocol can be
recovered in the quantum walk protocol by slightly
modifying the description presented for the multi-path
BSM protocol. In this protocol, every qubit in a node (a) Multi-path propagation.
used to distribute entanglement is part of the final
GHZ state achieved. This is in clear contrast with the
BSM multi-path protocol, where each path defines an
independent GHZ state. The first modification is that, B
instead of preparing separable walkers with coins that
maps states following the form given in (25), the k u2
walkers need to be entangled in the state
1 p
√ (|A, cA , . . . , A, cA + A, cpA0 , . . . , A, cAj ). (30)
2 A