The NLTS (No Low-Energy Trivial State) conjecture [M. H. Freedman and M. B. Hastings, Quantum Inf. Comput. 14, 144 (2014)] posits that there exist families of Hamiltonians with all low energy states of high complexity (with complexity measured by the quantum circuit depth preparing the state). Here, we prove a weaker version called the combinatorial no low error trivial states (NLETS), where a quantum circuit lower bound is shown against states that violate a (small) constant fraction of local terms. This generalizes the prior NLETS results [L. Eldar and A. W. Harrow, in 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS) (IEEE, 2017), pp. 427–438] and [Nirkhe et al., in 45th International Colloquium on Automata, Languages, and Programming (ICALP 2018), Leibniz International Proceedings in Informatics (LIPIcs), edited by Chatzigiannakis et al. (Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 2018), Vol. 107, pp. 1–11]. Our construction is obtained by combining tensor networks with expander codes [M. Sipser and D. Spielman, IEEE Trans. Inf. Theory 42, 1710 (1996)]. The Hamiltonian is the parent Hamiltonian of a perturbed tensor network, inspired by the “uncle Hamiltonian” of Fernández-González et al. [Commun. Math. Phys. 333, 299 (2015)]. Thus, we deviate from the quantum Calderbank-Shor-Steane (CSS) code Hamiltonians considered in most prior works.
I. INTRODUCTION
The approximation of the ground energy of a local Hamiltonian continues to be a leading goal of quantum complexity theory and quantum many-body physics. While a generic, accurate, and efficient approximation method is unlikely, due to the seminal result of Kitaev,3 physically motivated Ansätze, such as tensor networks26 and low depth quantum circuits,6,18,30 continue to explore the low energy spectrum of many interesting Hamiltonians.
A fundamental question on the power of low-depth quantum circuits is the no low-energy trivial state (NLTS) conjecture,14 which posits the existence of local Hamiltonians with all low energy states having high quantum circuit complexity. This is a necessary consequence of the quantum probabilistically checkable proofs (PCP) conjecture1 under the reasonable assumption that QMA ≠ NP. We refer to the reader to existing works1,7,8,12,22 for a detailed discussion on the NLTS conjecture and its close connection with quantum error correction, robustness of entanglement, and the power of variational quantum circuits.
To formally define the NLTS conjecture, we introduce a n-qubit local Hamiltonian H as a sum of local terms [each is supported on O(1) qubits and each qubit participates in O(1) local terms] with m = Θ(n). The ground states of H are the eigenstates with eigenvalue λmin(H). An ɛ-energy state ψ satisfies .
(NLTS14 ). There exists a fixed constant ɛ > 0 and an explicit family of O(1)-local Hamiltonians such that for any family of ɛ-energy states {ψn}, the circuit complexity CC(ψn) grows faster than any constant.
Here, CC(ψ) is the quantum circuit depth, the depth of the smallest quantum circuit that prepares ψ. An interesting property of any (potential) NLTS Hamiltonian is that it must live on an expanding interaction graph, ruling out all the finite-dimensional lattice Hamiltonians that have been very well studied in quantum many-body physics. The same holds for (potential) Hamiltonians that may witness the quantum PCP conjecture.1
A weaker version of this conjecture is known, called the NLETS theorem. A local Hamiltonian H (as defined above) is frustration-free if λmin(H) = 0. A state ψ is called ɛ-error if there exists a set S of qubits of size at least (1 − ɛ)n such that ψS = ϕS, where ϕ is some ground state of H and the subscript S means that we take a partial trace over the qubits in [n]\S.
Note that the ɛ-energy states include the set of O(ɛ)-error states, but the reverse direction is not true. The NLETS theorem was first proved by Ref. 12, by considering the hypergraph product34 of two Tanner codes on expander graphs.32 In the follow-up work,22 the authors constructed an NLETS Hamiltonian that, in fact, lived on a one-dimensional lattice. In the recent work,7 super-constant circuit lower bounds were shown for o(1)-energy states [such as -energy] of all quantum code Hamiltonians that have near-linear rank or near-linear distance. Interestingly, such lower bounds are again possible with the two-dimensional, punctured toric code, showing that expansion of the underlying interaction graph is not needed for circuit lower bounds on “almost constant” energy states.
The authors of Refs. 12 and 22 identified the intermediate question of combinatorial NLTS (cNLTS), which aims at finding frustration-free Hamiltonians with super-constant circuit lower bounds for states ψ that satisfy at least 1 − ɛ fraction of local terms. The main interest in this question stems from the fact that any (potential) cNLTS Hamiltonian must also live on an expanding interaction hypergraph, hence exhibiting the geometric features of an NLTS Hamiltonian. Here, we provide the first construction of a cNLTS Hamiltonian.
The set of states that satisfy 1 − ɛ fraction of local terms also include O(ɛ)-error states. Thus, the above family of Hamiltonians is also NLETS.
A. Other related results
In Ref. 11, thermal states of certain quantum codes were shown to have circuit lower bounds. The authors of Ref. 8 showed circuit lower bounds for quantum states with a “Z2 symmetry.” It was shown in Ref. 12 that locally testable quantum Calderbank-Shor-Steane (CSS) codes2 of linear distance are NLTS. Such codes are not known to exist, with the best distance thus far being .19 However, the dramatic recent progress in quantum codes9,15,27,28 opens up the exciting possibility that such codes may exist.
1. New results
The follow-up work5 supersedes the main result here, as it shows the NLTS property for good quantum codes.19,28 It uses a different Hamiltonian family, but the underlying connection is that it proves a quantum analog of Theorem 9. We believe that the Hamiltonian family in this work are also NLTS when the parameter δ is set to a constant.
B. Outline of the construction
Our starting point is the NLETS theorem shown in Ref. 22. It is based on the observation that the CAT state is close to the unique ground state of Kitaev’s clock Hamiltonian. This clock Hamiltonian is obtained from the circuit preparing the CAT state and then padding with identity gates. We observe that yet another Hamiltonian can be constructed by viewing the CAT state as a Matrix Product State (MPS). The MPS representation of the CAT state is obtained by starting with Einstein−Podolsky−Rosen (EPR) pairs,
and then projecting qubits i, i + 1, for even i, with the projector . Most MPSs are the unique ground states of a parent Hamiltonian (such MPSs are called injective). However, the CAT state MPS clearly does not have this privilege, since M is not an invertible map. However, inspired by Ref. 13, we can perturb M to consider a state obtained by mapping qubits i, i + 1 with (for ). This is an invertible map, which makes the resulting MPS injective. Using the corresponding parent Hamiltonian, we obtain another construction of the NLETS Hamiltonian.23
Since any cNLTS Hamiltonian must be on an expanding interaction graph, an approach to construct the desired Hamiltonian is to write down a tensor network for the CAT state on an expanding graph, perturb the tensors, and then take the parent Hamiltonian. Unfortunately, this argument seems not to work, since the tensor network for the CAT state is extremely brittle. If we remove one EPR pair and allow arbitrary inputs to the tensors acting on this EPR pair, we can produce the states |00…0⟩ or |11…1⟩. This brittleness reflects in the nearby parent Hamiltonian, and there are product states that violate just one local term. Our second observation is that the CAT state tensor network can be viewed as a repetition Tanner code on an expanding graph. Thus, we can generalize the tensor network and look at Tanner codes defined on expander graphs, as proposed by Sipser–Spielman32 (Sec. III). The tensor network state is now a uniform superposition over all the codewords of this Tanner code. With (1) linear distance and (2) linear rank (and with a suitable choice of parameters), such a code protects us from two sources of brittleness:
Removing an ɛ fraction of EPR pairs (analogously, local terms of the Hamiltonian) weakens the expansion properties of the underlying graph. Linear distance ensures that the codewords, while no longer far away from each other, are partitioned into distant groups for a small constant ɛ.
Removing an ɛ fraction of EPR pairs (analogously, local terms of the Hamiltonian) can drastically reduce the number of strings appearing in the superposition. Linear rank ensures that the number of strings is large enough if ɛ is a small constant.
C. Local systems and non-isotropic Gauß’s laws
Tanner codes can be understood in terms of homology with local systems,33 where differentials take values in the space of local checks.21 A trivial example is the toric code, where the differential at each vertex detects violations of -flux conservation or, in other words, violations of a local parity-check code (this is, of course, nothing but the usual simplicial -homology). The family of Hamiltonians that we construct can be understood in terms of differentials defined from more complicated local codes. The Hamiltonians ensure that these differentials are zero for ground states, which means that they enforce a non-isotropic Gauß’s law that takes the directionality of the incoming fluxes into account. Together with the expansion of the underlying graph, this leads to the cNLTS property.
D. Tensor networks and quantum complexity
Kitaev’s clock construction is a powerful method to map quantum computations to the ground states of local Hamiltonians. It turns out that the tensor networks provide a similar mapping. As shown in Ref. 31, any measurement-based quantum computation can be mapped onto a tensor network. One could thus imagine a form of circuit-to-Hamiltonian mapping different from Kitaev’s: perturb the above tensor network and consider its parent Hamiltonian. A standard objection to this approach is that the mapping also works for post-selected quantum circuits, which is far more powerful than QMA. However, this objection is not expected to apply to our case, as injective tensors cannot post-select on events of very small probability. We leave an understanding of the promise gap of this mapping for future work.
II. TANNER CODE
In this section, we review a construction of linear codes from regular graphs called Tanner codes. A (classical) linear code C of length n and rank k is a subspace of dimension k of the vector space . A linear code C can be defined by specifying a parity check matrix such that ker H = C. We call the m rows of H checks of the code C.
Consider a regular graph G = (V, E) with degree d and n = |V| vertices. For S, S′ ⊂ V, we denote the number of edges between S and S′ as E(S, S′) (we count an edge {u, v} twice if u, v ∈ S ∩ S′). Let , where λ2, λn are the second largest and the smallest eigenvalues of the adjacency matrix, respectively.
A Tanner code T(C, G) ⊂ {0, 1}|E| is defined using the graph G and a classical linear code C ⊂ {0, 1}d of rank k0 and distance Δ0. We imagine bits on edges and checks on the vertices. Let the edges be numbered using the integers {1, 2, …|E|} in some arbitrary manner. Given a string x ∈ {0, 1}|E| and a vertex v, let xv ∈ {0, 1}d be the restriction of x to the edges incident to v, where the ith bit of xv is the value on the edge with the ith smallest number. Formally,
We will abbreviate T(C, G) as T for convenience. Since there are d − k0 independent checks in C, the number of independent checks in T is at most n(d − k0). Thus, the rank k of T is .
Suppose Δ0 ≥ 2λ. The distance of T is lower bounded by .
III. INJECTIVE TENSOR NETWORK FROM THE CODE T(C, G)
Let |EPR⟩ = |00⟩ + |11⟩ be an unnormalized EPR pair. Given G, we consider a Hilbert space consisting of nd qubits, with d qubits for each vertex v ∈ V. For a v ∈ V, we identify each qubit with a unique edge incident on v and label the qubit as ve. As a result, given an edge e = (v, v′), qubits come in pairs (Fig. 1). We will often denote the joint Hilbert space as and abbreviate as |0⟩e and as |1⟩e. Thus, will be referred to as |EPR⟩e. Define the unnormalized state
For each vertex v, define the projector that only accepts the codewords of the local code at v,
where ci is the ith bit of c and ei is the ith edge incident on v (in the ascending numbering specified on the edges). The tensor network state is obtained by projecting the d qubits on each vertex using these projectors,
Note that the normalization follows since there are 2k codewords in T. We can think of the string x as an edge assignment and |Φ⟩ as a uniform superposition over edge assignments from T. Now, we can make the tensor network “injective” by defining
(Left) A degree d = 4 graph with a Tanner code defined on it. (Right) The associated tensor network, where d qubits (red) are placed on each vertex (green circle) and qubits are connected according to the edge structure using EPR pairs (blue wavy lines). The qubits on each vertex are projected according to the local code.
(Left) A degree d = 4 graph with a Tanner code defined on it. (Right) The associated tensor network, where d qubits (red) are placed on each vertex (green circle) and qubits are connected according to the edge structure using EPR pairs (blue wavy lines). The qubits on each vertex are projected according to the local code.
The nice property of |Ψ⟩ is that it is the unique ground state of a local Hamiltonian. For e = (v, v′), define
where “span” means that he is the projector onto the image of ge. Since ge|Ψ⟩ = 0, we have he|Ψ⟩ = 0. Let
Then, |Ψ⟩ is a ground state of H with ground energy 0. In fact, we have the following claim, which is well known about injective tensor networks:
|Ψ⟩ is the unique ground state of H.
Suppose |Ψ′⟩ is a ground state of H. Then, it is also a ground state of ∑ege. Write |Ψ′⟩ = ⊗v∈VQv|Θ′⟩ for a (possibly unnormalized) quantum state |Θ′⟩. This is possible since ⊗v∈VQv is invertible. Observe that |Θ′⟩ is a ground state of . This is possible only if |Θ′⟩ = |Θ0⟩, which proves the claim.□
IV. THE HAMILTONIAN H IS cNLTS
Suppose ɛ|E| local terms from H are removed (see Fig. 2). Since each local term corresponds to an edge, let E1 be the remaining edges and let be the Hamiltonian that remains. We will show that any state |ψ⟩ that is a ground state of H1 has a large circuit complexity if ɛ is a sufficiently small constant.
(Left) The dashed edges have been removed. W denotes the set of yellow vertices. The remaining edges are E1. (Right) In the tensor network picture, some qubits are no longer required to be connected by an EPR pair. These qubits, called residuals, are shown as thick red dots inside yellow circles. Their set is R.
(Left) The dashed edges have been removed. W denotes the set of yellow vertices. The remaining edges are E1. (Right) In the tensor network picture, some qubits are no longer required to be connected by an EPR pair. These qubits, called residuals, are shown as thick red dots inside yellow circles. Their set is R.
A. Structure of the ground space of H1
Let W ⊂ V be the set vertices on which the removed edges were incident. Among the d|W| qubits in these vertices, some qubits were associated with the removed edges. We will call these qubits “residual” and denote their set by R = {1, 2, …, 2ɛ|E|}. We are free to choose any “assignment” |0⟩, |1⟩ to the residual qubits. Since we have been thinking of assignments as occurring on the edges, we will sometimes refer to R as a set of edges (Fig. 2). Thus, we will continue using the terminology of “edge assignment.” Note the following cardinality bounds:
Let
We have the following claim, which is analogous to Claim 6:
Consider the following basis within :
where each |Ψb⟩ is normalized as . Note that this is an orthonormal basis, as the residual qubits are fixed according to b (the operators Qv do not change any computational basis state). Along the lines of Claim 5, we would expect that this state is close to the following state (ignoring normalization):
However, we have to be careful: if for any v ∈ W,24 the above state is 0, whereas |Ψb⟩ is non-zero for all b. With this in mind, we let Wb ⊂ W denote all the vertices with which b is consistent [Fig. 3 (left)]. We observe that
since Qv acts as at any v ∈ W\Wb (above Zb is a normalization constant) and define
where kb will be determined shortly. Note that the states are mutually orthogonal. The following claim is analogous to Claim 5:
(Left) The residual qubits are no longer connected by EPR pairs. Thus, they can be assigned any computational-basis state |b⟩: b ∈ {0, 1}|R| (in fact, they can be assigned any quantum state on |R| qubits, but we focus on computational-basis states at the moment). A given assignment b may violate checks on some vertices in W (yellow circle). Here, we depict shaded yellow circles, where b does not cause any violated checks. This is the set Wb ⊂ W. (Right) Vertices in Wb are now depicted by yellow dots with shaded surrounding. In Claim 8, a set S ⊂ (V\W) ∪ Wb is considered. Equation (4) can be verified from here.
(Left) The residual qubits are no longer connected by EPR pairs. Thus, they can be assigned any computational-basis state |b⟩: b ∈ {0, 1}|R| (in fact, they can be assigned any quantum state on |R| qubits, but we focus on computational-basis states at the moment). A given assignment b may violate checks on some vertices in W (yellow circle). Here, we depict shaded yellow circles, where b does not cause any violated checks. This is the set Wb ⊂ W. (Right) Vertices in Wb are now depicted by yellow dots with shaded surrounding. In Claim 8, a set S ⊂ (V\W) ∪ Wb is considered. Equation (4) can be verified from here.
Thus, if δ is small enough, it suffices to understand the properties of the space,
From Claim 8, each |Φb⟩ is a superposition over edge assignments. Moreover, each such edge assignment satisfies all the checks in V′ ≔ V\W. Thus, let us understand the properties of edge assignments that satisfy such checks. Define a new Tanner code T′ ≔ T(C, G′), where G′ = (V′, E′ ∪ F), E′ is the set of edges in the subgraph induced by V′, and F is the set of edges that connected V′ with W. We will think of each edge in F as “free,” being incident to just one vertex in V′ (Fig. 4). Theorem 9 shows that the Hamming distance between the codewords of T′ is either small or large.
Any edge assignment appearing in |Φb⟩ still satisfies all the checks at the green vertices (V′). If we restrict to V′, the shaded edges have only one end-point in V′. We will call such edges F. I ⊂ V′ is the set of vertices on which the edges in F are incident. In Theorem 9, some care is needed in analyzing the Hamming weight of edge assignments satisfying checks on V′, as vertices in I are responsible for the breakdown of expansion in V′. While checks on I are satisfied, this may happen due to edges in F and may not contribute to expansion.
Any edge assignment appearing in |Φb⟩ still satisfies all the checks at the green vertices (V′). If we restrict to V′, the shaded edges have only one end-point in V′. We will call such edges F. I ⊂ V′ is the set of vertices on which the edges in F are incident. In Theorem 9, some care is needed in analyzing the Hamming weight of edge assignments satisfying checks on V′, as vertices in I are responsible for the breakdown of expansion in V′. While checks on I are satisfied, this may happen due to edges in F and may not contribute to expansion.
B. Properties of the Tanner code T′
Let I ⊂ V′ be the set of vertices on which an edge in F is incident (Fig. 4). From Eq. (2), note the following bounds:
Since G′ may no longer be an expander, we do not have any guarantees on the distance of T′. However, we can show some structure in the codewords of T′.
Suppose and Δ0 ≥ 4λ. The Hamming distance between the codewords of T′ is either or .
C. Structure of the states |Φb⟩
Recall that |Φb⟩ is a superposition over the edge assignments to E1 ∪ R. We now show that these edge assignments form distant clusters.
Suppose and Δ0 ≥ 4λ. There are disjoint sets such that for any x, y ∈ Bi, the Hamming distance between x and y is , and for any x ∈ Bi and y ∈ Bj with i ≠ j, the Hamming distance between x, y is . Furthermore, the states are uniform superpositions over some edge assignments in ∪iBi.
Let
be the projector onto the edge assignments in Bi. The following claim holds:
Let , , and k0 ≥ 0.55d. For any i and any b, b′ ∈ {0, 1}|R| (with b ≠ b′), and .
D. Circuit lower bound
We will assume that ; Δ0 ≥ 4λ; k0 ≥ 0.55d, and . Note that these conditions can be met with constant k0, Δ0, d, which ensures that ɛ is a constant (see Sec. V). Our main theorem is below, which proves that H is cNLTS. The argument is directly inspired by the quantum circuit lower bound argument in Ref. 12, based on the partitioning of quantum codewords. However, we consider a simpler argument based on the tight polynomial approximations to the AND function,4,10,16 inspired by Ref. 17.
V. EXPLICIT CONSTRUCTION OF THE TANNER CODE T(C, G)
In this section, we give an explicit construction of a suitable family of Tanner codes from which the family of cNLTS-Hamiltonians of Theorem 3 is obtained.
For the graphs Gi underlying the Tanner codes, we employ a construction of spectral Cayley-expanders due to Lubotzky, Phillips, and Sarnak.
(Ref. 20). Assume that p and q are distinct, odd primes such that and q is a square modulo p. Then, there exists a symmetric generating set Γ of such that the Cayley graph is a non-bipartite, p + 1-regular expander graph with .
By fixing a suitable prime p, we obtain a family of regular graphs Gi of degree d = p + 1 and order q(q2 − 1)/2 with spectral bound . We mention in passing that by a result due to Alon and Boppana, this is the best possible bound that any family of regular graphs can achieve and such families are called Ramanujan graphs.
Furthermore, we require a linear, binary code C. More specifically, for the construction of the cNLTS-Hamiltonians to go through, we require the existence of a classical linear binary code C of block size d encoding at least k0 ≥ 0.55d bits with distance Δ0 ≥ 4λ. As the degree d of the graphs is constant, it suffices to show that a suitable code C exist, as a brute-force search has time-complexity bounded by a constant O(1). The existence of a suitable code is guaranteed by the Gilbert–Varshamov bound [see, e.g., Ref. 36 (Chap. 5) for a proof].
(Gilbert–Varshamov). Let 0 ≤ μ ≤ 0.5 and let 0 ≤ R0 ≤ 1 − H2(μ), then there exists a binary, linear code of block size d, rank k0 = R0d, and distance Δ0 = μd.
We can now give an explicit construction of a suitable code family . By Theorem 14, there exists a code C encoding k0 ≥ 0.55d bits when μ ≤ 0.09. We further require that C has distance Δ0 = μd ≥ 4λ. This is the case via Theorem 13 by choosing, for example, μ = 0.09 and prime p = 7901.
ACKNOWLEDGMENTS
We thank Chinmay Nirkhe for helpful discussions. We also thank Robbie King and the anonymous referee for carefully reading our manuscript. A.A. acknowledges support through the NSF award QCIS-FF: Quantum Computing and Information Science Faculty Fellow at Harvard University (Grant No. NSF 2013303). N.P.B. acknowledges support through the EPSRC Prosperity Partnership in Quantum Software for Simulation and Modeling (Grant No. EP/S005021/1).
AUTHOR DECLARATIONS
Conflict of Interest
The authors have no conflicts to disclose.
Author Contributions
Anurag Anshu: Conceptualization (equal); Formal analysis (equal); Investigation (equal); Methodology (equal); Writing – original draft (equal); Writing – review & editing (equal). Nikolas P. Breuckmann: Conceptualization (equal); Formal analysis (equal); Investigation (equal); Methodology (equal); Writing – original draft (equal); Writing – review & editing (equal).
DATA AVAILABILITY
Data sharing is not applicable to this article as no new data were created or analyzed in this study.
REFERENCES
One may note that the local terms of the resulting parent Hamiltonian do not have norm and may scale as . However, we can fix this by the standard trick of replacing each local term by the projector onto its image. The frustration-free property of the parent Hamiltonian ensures that the ground state is unchanged.
This would happen iff the edge assignment b were simply inconsistent with the codewords allowed at v. For example, v may connect with d − 1 edges in R and b may assign Δ0 − 2 number of ‘1’s on those edges.
While may act on more qubits than included in V, we say that is a ground state of H1 if its reduced state on the qubits in V belongs to the ground space of H1.