Skip to main content

PyTheus, a highly-efficient inverse-design algorithm for quantum optical experiments

Project description

PyTheus

PyTheus, a highly-efficient discovery framework for quantum optics experiments

Digital Discovery of 100 diverse Quantum Experiments with PyTheus
Carlos Ruiz-Gonzalez, Sören Arlt, Jan Petermann, Sharareh Sayyad, Tareq Jaouni, Ebrahim Karimi, Nora Tischler, Xuemei Gu, Mario Krenn
Quantum 7, 1204 (2023).

Digital Discovery of a Scientific Concept at the Core of Experimental Quantum Optics
Sören Arlt, Carlos Ruiz-Gonzalez, Mario Krenn

Installation

The package can be installed with

pip install pytheusQ

NOTE: do not use pip install pytheus (it will install a different package)

Running PyTheus

To run one of the included examples, type e.g.

pytheus run --example ghz_346

Output of optimization is saved to a directory called output.

To list all examples, type

pytheus list

You can also run config json files by referring to them by their path.

pytheus run PATH_TO_YOUR_INPUT_FILE

Names of the subdirectories in output are specified by the name and content of the config file.

Analysing PyTheus results

To plot the graph corresponding to one result saved as a json file, execute

pytheus plot PATH_TO_RESULT_FILE

To get help, add the --help option to any command. For instance

> pytheus run --help

Usage: pytheus run [OPTIONS] FILENAME

  Run an input file.

Options:
  --example  Load input file from examples directory.
  --help     Show this message and exit.

Discovery for Diverse Experimental Resources

Our package allows for the discovery of quantum experiments for a range of experimental goals, constraints and resources. Experiments that can be produced include:

  • state creation (heralded or post-selected)
  • quantum gates (heralded or post-selected)
  • measurements of quantum states
  • entanglement swapping
  • (covered elsewhere: mixed state creation)

Sources for photons in these experiments can be SPDC sources, deterministic single-photon sources or a mix of the two.

Detectors can be photon-number-resolving or not.

Each of these experiments can be described with a graph. The interpretation of nodes and edges varies with the kind of experiment.

Rules for Loss Functions

With these varying interpretations (e.g. for single photon sources, input photons, entanglement swapping), different constraints apply on what kind of graph can correspond to an experiment (Topological Rules).

With the different ways of performing the experiments (heralded/post-selected & number-resolving/non-number-resolving), different events are selected out of all possibilities (post-selection rules).

Topological Rules

All experiments that our package is applied to can be described by a graph. When describing state creation using SPDC each edge can be interpreted as a pair-creation. In this case all edges of the complete graph can be considered physically legitimate. When describing other experiments edges can be interpreted differently. Not every edge will be physically meaningful. Consequentially there are constraints on which connections of the complete graph are used in the optimization.

(A) Single Photon Sources and Input Photons

Deterministic single photon sources and input photons (such as in gates) are described as (input) vertices in a graph. An edge connecting an input vertex to a detector describes a path in which a photon can travel from the input into the detector. This interpretation stems from the Klyshko picture. From this a constraint on the graph follows. Two input vertices can not be connected by an edge. It could not be interpreted physically.

(B) Entanglement Swapping and Teleportation

In entanglement swapping, photons are entangled that have not interacted before. If we want to design an entanglement swapping experiment of two photons, the target is to discover a graph that produces an entangled state between the two photons. However any edge between the corresponding vertices would translate into a common source crystal. A constraint that ensures legitimate entanglement swapping is to remove any edge between the two parties

Post-Selection Rules

The rules for post-selecting coincidence events have been described in the Theseus paper. Here, post-selection projects the space of possibilities containing arbitrary combinations of crystals firing into the space of possibilities where only crystals fire for which all detectors at the end of the experiment click. In the graph picture these combinations correspond to the perfect matchings. A state is produced with fidelity one in post-selection if all possibilities of coincidence events contribute to that state.

Other experimental settings (such as heralding) and additional experimental resources (such as number-resolving detectors) perform a different kind of projection on the space of possibilities by selecting for different events. This different selection is reflected in the fidelity of the state. The products of the edge weights belonging to each possibility contribute to the norm of the fidelity.

(A) Heralding

Heralding is a less strict form of selecting events. Instead of putting a detector in every path and selecting for coincidence, only a subset of the paths are detected heralding an output state in the unmeasured paths. This selection rule not only allows for possibilities where one photon is in every path (perfect matchings) but also for other possibilities (edge covers) as long as they cover the heralding detectors. This can lead to cross-terms that are not present when post-selecting for coincidence in all paths. Consequentially it is more difficult to find a graph with fidelity one, also requiring more experimental resources.

(B) Single Photon Sources and Input Photons

When describing heralded experiments (above) one has to consider edge covers instead of perfect matchings in the graph for possible events. These possibilities include one edge being included twice in an edge cover, corresponding to a crystal firing twice in an experiment. For single photon sources and other deterministic input photons such possibilities do not exist. Only edge covers that cover the input vertices exactly once are considered for the norm of the fidelity.

(C) Photon Number-Resolving Detectors

Photon number-resolving detectors are a valuable resource that can restrict the space of possibilities more than a regular detector. When one can be certain that exactly one photon, and not two, has entered a detector it reduces the number of events that could have led to this outcome, eliminating cross terms.

(D) States in Fock Basis

...

Loss Functions For Target State Optimization

As explained above, the loss function depend largely on the different experimental conditions. Independent of these conditions they fall into two categories.

  • Fidelity
  • Count Rate

A Fidelity of one ensures that an experiment has no unwanted cross terms. Every possibility that is selected for contributes directly to the target outcome.

However, we have come to find that optimizing exclusively for fidelity in some cases can lead the optimization to scale down the weights of the entire graph to minimize the contributions of crossterms. While the fidelity will be very close to one in those cases the generally low edge weights would lead to very low count rates of successful events in actual experiments.

To find solutions with higher weights we have introduced the simplified count rate as a loss function.

Config Examples

This section gives examples for config files showcasing the features for different kinds of experiments that can searched for. A complete list of the 100 config files in the PyTheus papers can be found here.

Target State Optimization

This is used when the in- and out-going states can be clearly defined by a state functions. For those, the loss functions cr and fid are used.

Below are some examples to give an idea of the scope.

For further details, refer to the definition of the function setup_for_target in main.py.

Post-selected State creation

Here is an example for a config file optimizing for a graph that creates a three particle four-dimensional GHZ state.

{
  "description": "Finding a setup for the creation of the three-particle four-dimensional GHZ state. It can be realized with three ancillary particles",
  "foldername": "ghz_346",
  "target_state": [
    "000",
    "111",
    "222",
    "333"
  ],
  "num_anc": 3,
  "loss_func": "cr",
  "thresholds": [
    0.25,
    0.1
  ],
  "samples": 10,
  "optimizer": "L-BFGS-B",
  "ftol": 1e-06,
  "edges_tried": 20,
  "tries_per_edge": 5
}

General info is given by description. With foldername one can give a custom name for the subfolder where solutions are saved.

In the simple case of post-selected state creation with SPDC crystals, target_state, num_anc and loss_func are all that are needed to define the objective of the optimization.

thresholds is necessary to decide whether a topological optimization step has been successful. In this case, when 1-countrate < 0.25 and 1-fidelity < 0.1.

Post-Selected Quantum Gates

For an example how topological constraints on the starting graph of the optimization are dealt with, consider the example of a post-selected CNOT(2,3) quantum gate.

{
  "description": "Postselected CNOT between a qubit (control) and a qutrit (target). Two ancillary photons from SPDC.",
  "foldername": "cnot_23",
  "target_state": [
    "0000",
    "0101",
    "0202",
    "1011",
    "1112",
    "1210"
  ],
  "in_nodes": [
    0,
    1
  ],
  "out_nodes": [
    2,
    3
  ],
  "num_anc": 2,
  "loss_func": "cr",
  "thresholds": [
    0.3,
    0.1
  ],
  "samples": 10,
  "optimizer": "L-BFGS-B",
  "ftol": 1e-06,
  "edges_tried": 30,
  "tries_per_edge": 5
}

Here, target_state defines a logic table. It is defined through in_nodes and out_nodes, which entries belong to incoming photons and which belong to outgoing photons. These definitions suffice to automatically put constraints on the starting graph.

Heralded Quantum Gates with Single Photon Sources

Two additional features are heralding and single photon sources. A simple example is a CNOT gate between two qubits heralding on two ancillary detectors.

{
  "description": "Heralded CNOT gate between two qubits with two single photon sources. Similar has been done: https://journals.aps.org/prl/pdf/10.1103/PhysRevLett.126.140501 could this have a better success probability?",
  "foldername": "cnot22sp",
  "target_state": [
    "0000",
    "0101",
    "1011",
    "1110"
  ],
  "num_anc": 2,
  "in_nodes": [
    0,
    1
  ],
  "out_nodes": [
    2,
    3
  ],
  "single_emitters": [
    4,
    5
  ],
  "heralding_out": true,
  "loss_func": "cr",
  "thresholds": [
    1,
    0.1
  ],
  "samples": 10,
  "optimizer": "L-BFGS-B",
  "ftol": 1e-06,
  "edges_tried": 30,
  "tries_per_edge": 5
}

Here, the two single photon sources given by single_emitters introduce further topological constraints on the starting graph. As they have the role of ancillary photons in this case, we need to set num_anc accordingly. The graph corresponding to this optimization will have a total of eight nodes. Two for incoming, two for outgoing, two for single photon sources and two for ancillary detectors.

If num_anc is larger than the sum of lengths of in_nodes and single_emitters, the necessary amount of particles is created through SPDC.

Additionaly heralding_out is set to true here. The photons corresponding to out_nodes will not be detected.

Measurement

{
  "description": "Measurement for three particle W state",
  "foldername": "W_measurement",
  "target_state": [
    "001",
    "010",
    "100"
  ],
  "in_nodes": [
    0,
    1,
    2
  ],
  "num_anc": 0,
  "loss_func": "cr",
  "samples": 10,
  "optimizer": "L-BFGS-B",
  "ftol": 1e-06,
  "thresholds": [
    0.3,
    0.1
  ],
  "tries_per_edge": 5,
  "edges_tried": 30
}

Entanglement Optimization

When loss_func is set to "ent", no target state is set. Instead the optimizer maximizes the entanglement that can be achieved by a graph with the local dimensions given by dim.

{
  "description": "Maximizing entanglement in k=2 bi-partitions for four qubits.",
  "K": 2,
  "dim": 2222,
  "ftol": 1e-07,
  "loss_func": "ent",
  "min_edge": 4,
  "num_pre": 5,
  "optimizer": "SLSQP",
  "imaginary": false,
  "samples": 10,
  "thresholds": [
    0.000001
  ],
  "tries_per_edge": 3,
  "var_factor": 0
}

Optimizing for Arbitrary Functions of the Graph

There is also the option to define an arbitrary loss function, which should be defined or imported in lossfunctions.py .

Here is an example for optimizing the assembly index of the graph.

{
  "foldername": "assembly",
  "loss_func": "lff",
  "lff_name": "top_n_assembly",
  "dimensions": [
    2,
    2,
    2,
    2
  ],
  "num_vertices": 4,
  "num_cols": 2,
  "size_of_graph": 8,
  "optimizer": "L-BFGS-B",
  "ftol": 1e-06,
  "samples": 1,
  "thresholds": [
    99999
  ],
  "topopt": false,
  "edges_tried": 30,
  "tries_per_edge": 5,
  "unicolor": false,
  "imaginary": false,
  "num_pre": 1,
  "save_history": true
}

To use a custom defined loss function loss_func should be set to "lff" (loss from function).

The name of the loss function is given as a string to lff_name. This function should be defined or imported in lossfunctions.py. It should take a Graph object and a cnfg dictionary as arguments and return a real number.

Development

Clone repository

git clone https://github.com/artificial-scientist-lab/PyTheus.git

Create virtual environment

From the project root directory, submit

python -m venv venv

This will create a subfolder with your virtual environment.

To activate, type

. venv/bin/activate

Note the leading point!

Local development installation

Submit

python setup.py develop

from the project root directory (where setup.py is located). Any changes in the code will now automatically be reflected in your local package installation.

Project details


Download files

Download the file for your platform. If you're not sure which to choose, learn more about installing packages.

Source Distribution

pytheusQ-1.2.8.tar.gz (6.7 MB view details)

Uploaded Source

Built Distribution

pytheusQ-1.2.8-py3-none-any.whl (7.2 MB view details)

Uploaded Python 3

File details

Details for the file pytheusQ-1.2.8.tar.gz.

File metadata

  • Download URL: pytheusQ-1.2.8.tar.gz
  • Upload date:
  • Size: 6.7 MB
  • Tags: Source
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.8.8

File hashes

Hashes for pytheusQ-1.2.8.tar.gz
Algorithm Hash digest
SHA256 54ced232fcb1fa53d098e9a952597b2bf5acea6af25c525a88ee6f51a196a342
MD5 8779098b772d4cc282ec8471ba636c55
BLAKE2b-256 cbddaeb37b6f62dadee8645e2541818c17146b69d889b4acdcb8de41f809108a

See more details on using hashes here.

File details

Details for the file pytheusQ-1.2.8-py3-none-any.whl.

File metadata

  • Download URL: pytheusQ-1.2.8-py3-none-any.whl
  • Upload date:
  • Size: 7.2 MB
  • Tags: Python 3
  • Uploaded using Trusted Publishing? No
  • Uploaded via: twine/4.0.2 CPython/3.8.8

File hashes

Hashes for pytheusQ-1.2.8-py3-none-any.whl
Algorithm Hash digest
SHA256 98f28f7580548006b20e89beecf89f83b930ce68b513ce4a01d1c2cd0747928a
MD5 29a56eee259c28fcc69fe6423d7d3de7
BLAKE2b-256 81abd927270685f4227e19ddb997452ad1beae8ac883490223e89501ba8ca3ff

See more details on using hashes here.

Supported by

AWS AWS Cloud computing and Security Sponsor Datadog Datadog Monitoring Fastly Fastly CDN Google Google Download Analytics Microsoft Microsoft PSF Sponsor Pingdom Pingdom Monitoring Sentry Sentry Error logging StatusPage StatusPage Status page