The NLTS (No Low-Energy Trivial State) conjecture [M. H. Freedman and M. B. Hastings, Quantum Inf. Comput. 14, 144 (2014)] posits that there exist families of Hamiltonians with all low energy states of high complexity (with complexity measured by the quantum circuit depth preparing the state). Here, we prove a weaker version called the combinatorial no low error trivial states (NLETS), where a quantum circuit lower bound is shown against states that violate a (small) constant fraction of local terms. This generalizes the prior NLETS results [L. Eldar and A. W. Harrow, in 2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS) (IEEE, 2017), pp. 427–438] and [Nirkhe et al., in 45th International Colloquium on Automata, Languages, and Programming (ICALP 2018), Leibniz International Proceedings in Informatics (LIPIcs), edited by Chatzigiannakis et al. (Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik, Dagstuhl, Germany, 2018), Vol. 107, pp. 1–11]. Our construction is obtained by combining tensor networks with expander codes [M. Sipser and D. Spielman, IEEE Trans. Inf. Theory 42, 1710 (1996)]. The Hamiltonian is the parent Hamiltonian of a perturbed tensor network, inspired by the “uncle Hamiltonian” of Fernández-González et al. [Commun. Math. Phys. 333, 299 (2015)]. Thus, we deviate from the quantum Calderbank-Shor-Steane (CSS) code Hamiltonians considered in most prior works.

The approximation of the ground energy of a local Hamiltonian continues to be a leading goal of quantum complexity theory and quantum many-body physics. While a generic, accurate, and efficient approximation method is unlikely, due to the seminal result of Kitaev,3 physically motivated Ansätze, such as tensor networks26 and low depth quantum circuits,6,18,30 continue to explore the low energy spectrum of many interesting Hamiltonians.

A fundamental question on the power of low-depth quantum circuits is the no low-energy trivial state (NLTS) conjecture,14 which posits the existence of local Hamiltonians with all low energy states having high quantum circuit complexity. This is a necessary consequence of the quantum probabilistically checkable proofs (PCP) conjecture1 under the reasonable assumption that QMA ≠ NP. We refer to the reader to existing works1,7,8,12,22 for a detailed discussion on the NLTS conjecture and its close connection with quantum error correction, robustness of entanglement, and the power of variational quantum circuits.

To formally define the NLTS conjecture, we introduce a n-qubit local Hamiltonian H as a sum of local terms H=i=1mhi [each 0hiI is supported on O(1) qubits and each qubit participates in O(1) local terms] with m = Θ(n). The ground states of H are the eigenstates with eigenvalue λmin(H). An ɛ-energy state ψ satisfies TrHψεm+λmin(H).

Conjecture 1

(NLTS14 ). There exists a fixed constant ɛ > 0 and an explicit family of O(1)-local Hamiltonians {H(n)}n=1 such that for any family of ɛ-energy states {ψn}, the circuit complexity CC(ψn) grows faster than any constant.

Here, CC(ψ) is the quantum circuit depth, the depth of the smallest quantum circuit that prepares ψ. An interesting property of any (potential) NLTS Hamiltonian is that it must live on an expanding interaction graph, ruling out all the finite-dimensional lattice Hamiltonians that have been very well studied in quantum many-body physics. The same holds for (potential) Hamiltonians that may witness the quantum PCP conjecture.1 

A weaker version of this conjecture is known, called the NLETS theorem. A local Hamiltonian H (as defined above) is frustration-free if λmin(H) = 0. A state ψ is called ɛ-error if there exists a set S of qubits of size at least (1 − ɛ)n such that ψS = ϕS, where ϕ is some ground state of H and the subscript S means that we take a partial trace over the qubits in [n]\S.

Theorem 2

(Refs. 12 and 22). There exists a fixed constantɛ > 0 and an explicit family ofO(1)-local frustration-free Hamiltonians{H(n)}n=1such that for any family ofɛ-error states {ψn}, the circuit complexity CC(ψn) is Θ(log n).

Note that the ɛ-energy states include the set of O(ɛ)-error states, but the reverse direction is not true. The NLETS theorem was first proved by Ref. 12, by considering the hypergraph product34 of two Tanner codes on expander graphs.32 In the follow-up work,22 the authors constructed an NLETS Hamiltonian that, in fact, lived on a one-dimensional lattice. In the recent work,7 super-constant circuit lower bounds were shown for o(1)-energy states [such as O(1logn)-energy] of all quantum code Hamiltonians that have near-linear rank or near-linear distance. Interestingly, such lower bounds are again possible with the two-dimensional, punctured toric code, showing that expansion of the underlying interaction graph is not needed for circuit lower bounds on “almost constant” energy states.

The authors of Refs. 12 and 22 identified the intermediate question of combinatorial NLTS (cNLTS), which aims at finding frustration-free Hamiltonians with super-constant circuit lower bounds for states ψ that satisfy at least 1 − ɛ fraction of local terms. The main interest in this question stems from the fact that any (potential) cNLTS Hamiltonian must also live on an expanding interaction hypergraph, hence exhibiting the geometric features of an NLTS Hamiltonian. Here, we provide the first construction of a cNLTS Hamiltonian.

Theorem 3
(main result). There exists a fixed constantɛ > 0 and an explicit family ofO(1)-local frustration-free Hamiltonians{H(n)}n=1, whereH(n)=i=1mhi(n)acts onnparticles and consists ofm = Θ(n) local terms, such that for any family of states {ψn} satisfying
|i:Trhi(n)ψn>0|mε,
the circuit complexity CC(ψn) is Θ(log n).

The set of states that satisfy 1 − ɛ fraction of local terms also include O(ɛ)-error states. Thus, the above family of Hamiltonians is also NLETS.

In Ref. 11, thermal states of certain quantum codes were shown to have circuit lower bounds. The authors of Ref. 8 showed circuit lower bounds for quantum states with a “Z2 symmetry.” It was shown in Ref. 12 that locally testable quantum Calderbank-Shor-Steane (CSS) codes2 of linear distance are NLTS. Such codes are not known to exist, with the best distance thus far being n.19 However, the dramatic recent progress in quantum codes9,15,27,28 opens up the exciting possibility that such codes may exist.

1. New results

The follow-up work5 supersedes the main result here, as it shows the NLTS property for good quantum codes.19,28 It uses a different Hamiltonian family, but the underlying connection is that it proves a quantum analog of Theorem 9. We believe that the Hamiltonian family in this work are also NLTS when the parameter δ is set to a constant.

Our starting point is the NLETS theorem shown in Ref. 22. It is based on the observation that the CAT state 12|000+12|111 is close to the unique ground state of Kitaev’s clock Hamiltonian. This clock Hamiltonian is obtained from the circuit preparing the CAT state and then padding with identity gates. We observe that yet another Hamiltonian can be constructed by viewing the CAT state as a Matrix Product State (MPS). The MPS representation of the CAT state is obtained by starting with n2 Einstein−Podolsky−Rosen (EPR) pairs,

|00+|111,2|00+|113,4|00+|11n1,n,

and then projecting qubits i, i + 1, for even i, with the projector M=0000+1111. Most MPSs are the unique ground states of a parent Hamiltonian (such MPSs are called injective). However, the CAT state MPS clearly does not have this privilege, since M is not an invertible map. However, inspired by Ref. 13, we can perturb M to consider a state obtained by mapping qubits i, i + 1 with M+δI (for δ1n). This is an invertible map, which makes the resulting MPS injective. Using the corresponding parent Hamiltonian, we obtain another construction of the NLETS Hamiltonian.23 

Since any cNLTS Hamiltonian must be on an expanding interaction graph, an approach to construct the desired Hamiltonian is to write down a tensor network for the CAT state on an expanding graph, perturb the tensors, and then take the parent Hamiltonian. Unfortunately, this argument seems not to work, since the tensor network for the CAT state is extremely brittle. If we remove one EPR pair and allow arbitrary inputs to the tensors acting on this EPR pair, we can produce the states |00…0⟩ or |11…1⟩. This brittleness reflects in the nearby parent Hamiltonian, and there are product states that violate just one local term. Our second observation is that the CAT state tensor network can be viewed as a repetition Tanner code on an expanding graph. Thus, we can generalize the tensor network and look at Tanner codes defined on expander graphs, as proposed by Sipser–Spielman32 (Sec. III). The tensor network state is now a uniform superposition over all the codewords of this Tanner code. With (1) linear distance and (2) linear rank (and with a suitable choice of parameters), such a code protects us from two sources of brittleness:

  1. Removing an ɛ fraction of EPR pairs (analogously, local terms of the Hamiltonian) weakens the expansion properties of the underlying graph. Linear distance ensures that the codewords, while no longer far away from each other, are partitioned into distant groups for a small constant ɛ.

  2. Removing an ɛ fraction of EPR pairs (analogously, local terms of the Hamiltonian) can drastically reduce the number of strings appearing in the superposition. Linear rank ensures that the number of strings is large enough if ɛ is a small constant.

See Sec. IV for full details. We note that tensor networks have previously been combined with local (quantum) codes to obtain global properties.29 

Tanner codes can be understood in terms of homology with local systems,33 where differentials take values in the space of local checks.21 A trivial example is the toric code, where the differential at each vertex detects violations of Z2-flux conservation or, in other words, violations of a local parity-check code (this is, of course, nothing but the usual simplicial Z2-homology). The family of Hamiltonians that we construct can be understood in terms of differentials defined from more complicated local codes. The Hamiltonians ensure that these differentials are zero for ground states, which means that they enforce a non-isotropic Gauß’s law that takes the directionality of the incoming fluxes into account. Together with the expansion of the underlying graph, this leads to the cNLTS property.

Kitaev’s clock construction is a powerful method to map quantum computations to the ground states of local Hamiltonians. It turns out that the tensor networks provide a similar mapping. As shown in Ref. 31, any measurement-based quantum computation can be mapped onto a tensor network. One could thus imagine a form of circuit-to-Hamiltonian mapping different from Kitaev’s: perturb the above tensor network and consider its parent Hamiltonian. A standard objection to this approach is that the mapping also works for post-selected quantum circuits, which is far more powerful than QMA. However, this objection is not expected to apply to our case, as injective tensors cannot post-select on events of very small probability. We leave an understanding of the promise gap of this mapping for future work.

In this section, we review a construction of linear codes from regular graphs called Tanner codes. A (classical) linear code C of length n and rank k is a subspace of dimension k of the vector space F2n={0,1}n. A linear code C can be defined by specifying a parity check matrix HF2m×n such that ker H = C. We call the m rows of H checks of the code C.

Consider a regular graph G = (V, E) with degree d and n = |V| vertices. For S, S′ ⊂ V, we denote the number of edges between S and S′ as E(S, S′) (we count an edge {u, v} twice if u, vSS′). Let λ=max|λ2|,|λn|, where λ2, λn are the second largest and the smallest eigenvalues of the adjacency matrix, respectively.

A Tanner code T(C, G) ⊂ {0, 1}|E| is defined using the graph G and a classical linear code C ⊂ {0, 1}d of rank k0 and distance Δ0. We imagine bits on edges and checks on the vertices. Let the edges be numbered using the integers {1, 2, …|E|} in some arbitrary manner. Given a string x ∈ {0, 1}|E| and a vertex v, let xv ∈ {0, 1}d be the restriction of x to the edges incident to v, where the ith bit of xv is the value on the edge with the ith smallest number. Formally,

T(C,G)={x:xvCvV}.
(1)

We will abbreviate T(C, G) as T for convenience. Since there are dk0 independent checks in C, the number of independent checks in T is at most n(dk0). Thus, the rank k of T is knd2n(dk0)=nk0d2.

Lemma 4.

Suppose Δ0 ≥ 2λ. The distance ofTis lower bounded bynΔ024d=|E|Δ022d2.

Proof.
Let xT be the non-zero code-word of the smallest Hamming weight, and let Ex be the edges where x takes value 1. Let S be the set of all vertices on which at least one edge in Ex is incident. Since the distance of C is Δ0, at least Δ0 edges from any vertex in S stay within S (and those edges belong to Ex). Thus, |E(S, S)| ≥ |S0. However, the expander mixing lemma35 (Lemma 4.15) ensures that
|E(S,S)|d|S|2n+λ|S|.
Thus,
|S|Δ0|E(S,S)|d|S|2n+λ|S|d|S|2n+Δ0|S|2|S|nΔ02d.
Since |Ex||S|Δ02 (every vertex in S is associated with at least Δ0 edges in Ex and every edge in Ex is associated with two vertices in S), the lemma concludes.□

Let |EPR⟩ = |00⟩ + |11⟩ be an unnormalized EPR pair. Given G, we consider a Hilbert space consisting of nd qubits, with d qubits for each vertex vV. For a vV, we identify each qubit with a unique edge incident on v and label the qubit as ve. As a result, given an edge e = (v, v′), qubits ve,ve come in pairs (Fig. 1). We will often denote the joint Hilbert space HveHve as He and abbreviate |0ve|0ve as |0⟩e and |1ve|1ve as |1⟩e. Thus, |0ve|0ve+|1ve|1ve will be referred to as |EPR⟩e. Define the unnormalized state

|Θ0eE|EPRe.

For each vertex v, define the projector that only accepts the codewords of the local code at v,

PvcCc1c1ve1c2c2ve2cdcdved,

where ci is the ith bit of c and ei is the ith edge incident on v (in the ascending numbering specified on the edges). The tensor network state is obtained by projecting the d qubits on each vertex using these projectors,

|Φ12kvPv|Θ0=12kxTe=(v,v)|xee.

Note that the normalization follows since there are 2k codewords in T. We can think of the string x as an edge assignment and |Φ⟩ as a uniform superposition over edge assignments from T. Now, we can make the tensor network “injective” by defining

QvPv+δI=(1+δ)Pv+δ(IPv),|Ψ1ZvQv|Θ0.
FIG. 1.

(Left) A degree d = 4 graph with a Tanner code defined on it. (Right) The associated tensor network, where d qubits (red) are placed on each vertex (green circle) and qubits are connected according to the edge structure using EPR pairs (blue wavy lines). The qubits on each vertex are projected according to the local code.

FIG. 1.

(Left) A degree d = 4 graph with a Tanner code defined on it. (Right) The associated tensor network, where d qubits (red) are placed on each vertex (green circle) and qubits are connected according to the edge structure using EPR pairs (blue wavy lines). The qubits on each vertex are projected according to the local code.

Close modal

Claim 5.
It holds that
Z2k(1+2δ+δ22(dk0))n
and
|Ψ|Φ|(1+δ)n(1+2δ+δ22(dk0))n2.

Proof.
Consider
Z=Θ0|vQv2|Θ0=Θ0|v(1+2δ)Pv+δ2I|Θ0=SV(1+2δ)|S|δ2n2|S|Θ0|vSPv|Θ0.
Let us evaluate ⟨Θ0| ⊗ vSPv0⟩. This is essentially the number of codewords when parity checks only act on the vertices in S. If we were to include the parity checks in V\S as well, we would obtain the original code. Since there are at most (dk0)(n − |S|) independent checks, the following inequality holds:
Θ0|vSPv|Θ02(dk0)(n|S|)2kΘ0|vSPv|Θ02k2(dk0)(n|S|).
This shows that
Z2kSV(1+2δ)|S|δ2n2|S|2(dk0)(n|S|)=2kSV(1+2δ)|S|δ22(dk0)(n|S|)=2k(1+2δ+δ22(dk0))n.
Furthermore,
Ψ|Φ=12kZΘ0|vQvPv|Θ0=(1+δ)n2kZΘ0|vPv|Θ0=(1+δ)n2kZ(1+δ)n(1+2δ+δ22(dk0))n2.
This completes the proof.□

The nice property of |Ψ⟩ is that it is the unique ground state of a local Hamiltonian. For e = (v, v′), define

ge=QvQv1(IEPREPRe)QvQv1,he=spange,

where “span” means that he is the projector onto the image of ge. Since ge|Ψ⟩ = 0, we have he|Ψ⟩ = 0. Let

HeEhe.

Then, |Ψ⟩ is a ground state of H with ground energy 0. In fact, we have the following claim, which is well known about injective tensor networks:

Claim 6.

|Ψ⟩ is the unique ground state of H.

Proof.

Suppose |Ψ′⟩ is a ground state of H. Then, it is also a ground state of ege. Write |Ψ′⟩ = ⊗vVQv|Θ′⟩ for a (possibly unnormalized) quantum state |Θ′⟩. This is possible since ⊗vVQv is invertible. Observe that |Θ′⟩ is a ground state of e(IEPREPRe). This is possible only if |Θ′⟩ = |Θ0⟩, which proves the claim.□

Suppose ɛ|E| local terms from H are removed (see Fig. 2). Since each local term corresponds to an edge, let E1 be the remaining edges and let H1=eE1he be the Hamiltonian that remains. We will show that any state |ψ⟩ that is a ground state of H1 has a large circuit complexity if ɛ is a sufficiently small constant.

FIG. 2.

(Left) The dashed edges have been removed. W denotes the set of yellow vertices. The remaining edges are E1. (Right) In the tensor network picture, some qubits are no longer required to be connected by an EPR pair. These qubits, called residuals, are shown as thick red dots inside yellow circles. Their set is R.

FIG. 2.

(Left) The dashed edges have been removed. W denotes the set of yellow vertices. The remaining edges are E1. (Right) In the tensor network picture, some qubits are no longer required to be connected by an EPR pair. These qubits, called residuals, are shown as thick red dots inside yellow circles. Their set is R.

Close modal

Let WV be the set vertices on which the removed edges were incident. Among the d|W| qubits in these vertices, some qubits were associated with the removed edges. We will call these qubits “residual” and denote their set by R = {1, 2, …, 2ɛ|E|}. We are free to choose any “assignment” |0⟩, |1⟩ to the residual qubits. Since we have been thinking of assignments as occurring on the edges, we will sometimes refer to R as a set of edges (Fig. 2). Thus, we will continue using the terminology of “edge assignment.” Note the following cardinality bounds:

|W||R|=2ε|E|,|E1|=|E|(1ε)=d|V||R|2.
(2)

Let

|Θ1eE1|EPRe.

We have the following claim, which is analogous to Claim 6:

Claim 7.
The ground space of H1 is
GspanvVQv(|Θ1rR|brr) such that bb1,b|R|{0,1}|R|.

Proof.
Let |ω⟩ = ⊗vVQv|τ⟩ be a ground state of H1 for some |τ⟩, which is possible since ⊗vVQv is invertible. Note that
H1|ω=0eE1,he|ω=0eE1,ge|ω=0.
Thus, for all eE1, IEPREPRe|τ=0. This shows that |τ⟩ belongs to the space spanned by the vectors {|Θ1rR|brr, such thatbb1,b|R|{0,1}|R|}, as there are no constraints on the residual qubits. This completes the proof.□

Consider the following basis within G:

|ΨbvVQv(|Θ1rR|brr),b{0,1}|R|,

where each |Ψb⟩ is normalized as Ψb|Ψb=1. Note that this is an orthonormal basis, as the residual qubits are fixed according to b (the operators Qv do not change any computational basis state). Along the lines of Claim 5, we would expect that this state is close to the following state (ignoring normalization):

vVPv(|Θ1rR|brr),b{0,1}|R|.

However, we have to be careful: if PvrR|brr=0 for any vW,24 the above state is 0, whereas |Ψb⟩ is non-zero for all b. With this in mind, we let WbW denote all the vertices with which b is consistent [Fig. 3 (left)]. We observe that

|Ψb=1Zbv(V\W)WbQv(|Θ1rR|brr)

since Qv acts as δI at any vW\Wb (above Zb is a normalization constant) and define

|Φb=12kbv(V\W)WbPv(|Θ1rR|brr),

where kb will be determined shortly. Note that the states {|Φb}b{0,1}|R| are mutually orthogonal. The following claim is analogous to Claim 5:

FIG. 3.

(Left) The residual qubits are no longer connected by EPR pairs. Thus, they can be assigned any computational-basis state |b⟩: b ∈ {0, 1}|R| (in fact, they can be assigned any quantum state on |R| qubits, but we focus on computational-basis states at the moment). A given assignment b may violate checks on some vertices in W (yellow circle). Here, we depict shaded yellow circles, where b does not cause any violated checks. This is the set WbW. (Right) Vertices in Wb are now depicted by yellow dots with shaded surrounding. In Claim 8, a set S ⊂ (V\W) ∪ Wb is considered. Equation (4) can be verified from here.

FIG. 3.

(Left) The residual qubits are no longer connected by EPR pairs. Thus, they can be assigned any computational-basis state |b⟩: b ∈ {0, 1}|R| (in fact, they can be assigned any quantum state on |R| qubits, but we focus on computational-basis states at the moment). A given assignment b may violate checks on some vertices in W (yellow circle). Here, we depict shaded yellow circles, where b does not cause any violated checks. This is the set WbW. (Right) Vertices in Wb are now depicted by yellow dots with shaded surrounding. In Claim 8, a set S ⊂ (V\W) ∪ Wb is considered. Equation (4) can be verified from here.

Close modal

Claim 8.
It holds that
kb2k0d1|E||R|
and
|Φb|Ψb|(1+δ)n(1+2δ+δ22(dk0))n2.

Proof.
We write down an expression for kb. Note that |Φb⟩ is simply a superposition over edge assignments that satisfy the Tanner code with checks on (V\W) ∪ Wb, where we condition the edges in R to have fixed edge assignments according to b. Conditioning the edge assignments in R to be b leads to a set of parity check over edges in E1 (some of these checks may also impose a parity of 1 on the edge assignments in E1). Each vertex in V\W contributes to dk0 checks. Each vertex in Wb contributes to anywhere between 0 to dk0 independent checks. If we define cv as the number of independent checks due to vWb that involve edges in E1, we have
kb|E1|(dk0)(|V\W|)vWbcv.
(3)
Since cvdk0 and WbW, a lower bound on kb is
kb|E1|(dk0)(|V\W|+|Wb|)|E1|(dk0)|V|=Eq.(2)|E1|dk0d(2|E1|+|R|)=2k0d1|E1|dk0d|R|2k0d1|E1||R|.
Next,
Zb=Θ1|rRbr|rv(V\W)WbQv2|Θ1rR|brr=Θ1|rRbr|rv(V\W)Wb((1+2δ)Pv+δ2I)|Θ1rR|brr=S(V\W)Wb(1+2δ)|S|δ2(|(V\W)Wb||S|)Θ1|rRbr|rvSPv|Θ1rR|brr(1)2kbS(V\W)Wb(1+2δ)|S|δ2(|(V\W)Wb||S|)2(dk0)(|V\W||S\W|)+vWb\Scv2kbS(V\W)Wb(1+2δ)|S|δ2(|(V\W)Wb||S|)2(dk0)(|V\W||S\W|+|Wb\S|)=(2)2kbS(V\W)Wb(1+2δ)|S|δ22dk0(|(V\W)Wb||S|)=2kb(1+2δ+δ22dk0)(|(V\W)Wb|).
For (1), note that Θ1|rRbr|rvSPv|Θ1rR|brr is the number of edge assignments that satisfy parity checks in S (with the condition that edges in R are assigned b). If we were to add parity checks on remaining vertices in (V\W)\S and Wb\S, we would obtain the 2kb codewords accounted for in Eq. (3). The number of such linearly independent parity checks that are added is at most (dk0)(|V\W||S\W|)+vWb\Scv. This gives us the upper bound
Θ1|rRbr|rvSPv|Θ1rR|brr2(dk0)(|V\W||S\W|)vWb\Scv2kb,
and (2) uses [see Fig. 3 (right)]
|V\W||S\W|+|Wb\S|=|V\W|+|Wb||S|=|(V\W)Wb||S|,
(4)
where we repeatedly used the fact that S ⊂ (V\W) ∪ Wb. Thus,
|Φb|Ψb|=12kbZbΘ1|rRbr|rv(V\W)WbPvQv|Θ1rR|brr=(1+δ)|(V\W)Wb|2kbZbΘ1|rRbr|rv(V\W)WbPv|Θ1rR|brr=(1+δ)|(V\W)Wb|2kbZb2kb=(1+δ)|(V\W)Wb|2kbZb(1+δ)|(V\W)Wb|1(1+2δ+δ22dk0)(|(V\W)Wb|)(1+δ)n(1+2δ+δ22(dk0))n2.
In the above equation, the last inequality holds since |(V\W) ∪ Wb| ≤ n.□

Thus, if δ is small enough, it suffices to understand the properties of the space,

Gspan|Φb, such that b{0,1}|R|.

From Claim 8, each |Φb⟩ is a superposition over 2kb edge assignments. Moreover, each such edge assignment satisfies all the checks in V′ ≔ V\W. Thus, let us understand the properties of edge assignments that satisfy such checks. Define a new Tanner code T′ ≔ T(C, G′), where G′ = (V′, E′ ∪ F), E′ is the set of edges in the subgraph induced by V′, and F is the set of edges that connected V′ with W. We will think of each edge in F as “free,” being incident to just one vertex in V′ (Fig. 4). Theorem 9 shows that the Hamming distance between the codewords of T′ is either small or large.

FIG. 4.

Any edge assignment appearing in |Φb⟩ still satisfies all the checks at the green vertices (V′). If we restrict to V′, the shaded edges have only one end-point in V′. We will call such edges F. IV′ is the set of vertices on which the edges in F are incident. In Theorem 9, some care is needed in analyzing the Hamming weight of edge assignments satisfying checks on V′, as vertices in I are responsible for the breakdown of expansion in V′. While checks on I are satisfied, this may happen due to edges in F and may not contribute to expansion.

FIG. 4.

Any edge assignment appearing in |Φb⟩ still satisfies all the checks at the green vertices (V′). If we restrict to V′, the shaded edges have only one end-point in V′. We will call such edges F. IV′ is the set of vertices on which the edges in F are incident. In Theorem 9, some care is needed in analyzing the Hamming weight of edge assignments satisfying checks on V′, as vertices in I are responsible for the breakdown of expansion in V′. While checks on I are satisfied, this may happen due to edges in F and may not contribute to expansion.

Close modal

Let IV′ be the set of vertices on which an edge in F is incident (Fig. 4). From Eq. (2), note the following bounds:

|I||F|d|W|2dε|E| and |E||E||E1|d|W||E|13dε.
(5)

Since G′ may no longer be an expander, we do not have any guarantees on the distance of T′. However, we can show some structure in the codewords of T′.

Theorem 9.

Supposeε16dand Δ0 ≥ 4λ. The Hamming distance between the codewords ofTis either8d2ε|EF|orΔ024d2|EF|.

Proof.
Since T′ is a linear code, we show that the Hamming weight of a non-zero codeword x is either 8d2ε|EF| or Δ028d2|EF|. Let JxE′ ∪ F be the set of edges on which x assigns 1. If |Jx| ≤ 8d2ɛ|E′ ∪ F|, then we are done, or else
|Jx|8d2ε|EF|8d2ε|E|Eq.(5)8d2ε|E|13dε4d2ε|E|.
We consider this case and show that |Jx| must be significantly larger. Let SV′ be the vertices on which the edges in Jx are incident. We can apply the expander mixing lemma to the original graphG and obtain
|E(S,S)|d|S|2n+λ|S|.
On the other hand, we can lower bound |E(S, S)| as follows: Every vertex in S\I has degree at least Δ0 and each edge incident to such a vertex belongs to E(S, S) (since such an edge is not in F, both its endpoint are in S). Edges incident to vertices in SI may not belong to E(S, S), and thus, we will not count them (see Fig. 4). Overall, we have
|E(S,S)|Δ0|S\I|Eq.(5)Δ0(|S|2dε|E|)=Δ0|S|2+|S|22dε|E|.
(6)
Since |Jx| ≥ 4d2ɛ|E|, we can naively bound |S||Jx|d4dε|E|. Thus,
d|S|2n+λ|S||E(S,S)|Eq.(6)Δ02|S|λΔ4|S|nΔ04d.
From here, we obtain
|Jx|(1)Δ0|S|2nΔ028d=|E|Δ024d2|EF|Δ024d2.
Here, (1) follows since every vertex in S is associated with at least Δ0 edges in Jx and every edge in Jx is associated with at most 2 vertices in S. This completes the proof.□

Recall that |Φb⟩ is a superposition over the edge assignments to E1R. We now show that these edge assignments form distant clusters.

Theorem 10.

SupposeεΔ02300d4and Δ0 ≥ 4λ. There are disjoint setsB1,B2,{0,1}|E1R|such that for anyx, yBi, the Hamming distance betweenxandyis10d2ε|E1R|, and for anyxBiandyBjwithij, the Hamming distance betweenx, yisΔ0210d2|E1R|. Furthermore, the states{|Φb}b{0,1}|R|are uniform superpositions over some edge assignments iniBi.

Proof.
Any two edge assignments x, y appearing in |Φb⟩, when restricted to the edges in G′ (which we denote xG, yG), belong to T′. The edge assignment x is obtained from xG by appending assignments to the edges in (E1R)\(E′ ∪ F). There are at most d|W|Eq.(2)2dε|E| such edges. Thus, invoking Theorem 9, the Hamming distance between x, y is either at most
8d2ε|EF|+2dε|E|8d2ε|E1R|+2dε|E|Eq.(2)8d2ε|E1R|+2dε|E1R|10d2ε|E1R|
or at least
Δ024d2|EF|2dε|E|Δ024d2|E1R|Δ024d22dε|E|2dε|E|Eq.(2)Δ024d2|E1R|4dε|E1R|Δ0210d2|E1R|.
Next, consider a relation R between the edge assignments: x,yR if the Hamming distance between them is 10d2ε|E1R|. The relation is transitive: x,yR and y,zR imply that the Hamming distance between x, z is 20d2ε|E1R|<Δ0210d2|E1R|, which, in turn, requires that the Hamming distance between x, z is 10d2ε|E1R|. This forces x,zR. The sets B1, B2, … are the equivalence classes formed by this relation, which completes the proof.□

Let

ΠBixBieE1xexeerRxrxrr

be the projector onto the edge assignments in Bi. The following claim holds:

Claim 11.

Let δ22d10000n, ε120000d2, and k0 ≥ 0.55d. For any i and any b, b′ ∈ {0, 1}|R| (with bb′), Ψb|ΠBi|Ψb150 and Ψb|ΠBi|Ψb=0.

Proof.
Since |Φb⟩ is a uniform superposition over 2kb edge assignments and the size of each Bi is at most |E1R|10d2ε|E1R|22d10ε|E1R|28dε|E|, we have
Φb|ΠBi|Φb2kb28dε|E|ClaimEq.(2)28dε|E|0.1|E|+|R|Eq.(2)210dε|E|0.1|E|1100.
In the above equation, the last inequality assumes that |E| is larger than some constant. Now, Claim 8 ensures that
|Φb|Ψb|(1+δ)n(1+2δ+δ22(dk0))n211+2dδ2n2e1200001110000.
Thus, 12ΦbΦbΨbΨb11100, which ensures that
TrΠBiΨbΨbTrΠBiΦbΦb+1100150.
To argue that Ψb|ΠBi|Ψb=0, note that |Ψb⟩ is a superposition over edge assignments with the fixed b on the edges in R. That is, |Ψb=|rR|brr. Thus, ΠBi, being a projector onto computational basis states, satisfies ΠBi|Ψb=|rR|brr. Similarly, |Ψb=|rR|brr. Since bb′, the claim follows.□

We will assume that ε120000d2,Δ02300d4; Δ0 ≥ 4λ; k0 ≥ 0.55d, and δ22d10000n. Note that these conditions can be met with constant k0, Δ0, d, which ensures that ɛ is a constant (see Sec. V). Our main theorem is below, which proves that H is cNLTS. The argument is directly inspired by the quantum circuit lower bound argument in Ref. 12, based on the partitioning of quantum codewords. However, we consider a simpler argument based on the tight polynomial approximations to the AND function,4,10,16 inspired by Ref. 17.

Theorem 12.
Let |ρ⟩ = U|0⟩monmndqubits, whereUis a depthtquantum circuit, such that12ΓΓρρ10.1for some ground state25 |Γ⟩ ofH1. It holds that
t=ΩlognΔ04d3.

Proof.
Note that m ≤ 2tnd without loss of generality as H1 acts on nd qubits [see Ref. 7 (Sec. 2.3) for a justification based on the light cone argument]. We can expand
|Γ=b{0,1}|R||μb|Ψb
such that b{0,1}|R||μb2=1. The (possibly unnormalized) vectors |μb⟩ act on mnd qubits outside V. Using Claim 11, we find that for any i,
Γ|ΠBi|Γ=b,b{0,1}|R|μb|μbΨb|ΠBi|Ψb=b{0,1}|R||μb2Ψb|ΠBi|Ψb150.
(7)
On the other hand, all edge assignments over E1R appearing in |Γ⟩ belong to some Bi. In other words, iΓ|ΠBi|Γ=1. Thus, we can find two disjoint sets of indices M, M′ such that
iMΓ|ΠBi|Γ1215013,iMΓ|ΠBi|Γ1215013.
Define BM = ∪iMBi, BM = ∪iMBi, ΠM=iMΠBi, and ΠM=iMΠBi. From Theorem 10, the Hamming distance between the sets BM and BM is Δ0210d2|E1R|Δ0220d2nd. On the other hand, we just established that Γ|ΠM|Γ13 and Γ|ΠM|Γ13. From Refs. 4, 10, and 16, there exists a f · 2t-local operator L such that
ρρLef22t100nd.
Setting f2t=Δ02100d2nd, we obtain
ρρLenΔ0423t106d3.
Since ΠMLΠM = 0, we have
ΠMρρΠMenΔ0423t106d3.
However,
ΠMρρΠM=ρ|ΠM|ρρ|ΠM|ρΓ|ΠM|Γ0.1Γ|ΠM|Γ0.1e2.
Thus, 23tnΔ042106d3, which completes the proof.□

In this section, we give an explicit construction of a suitable family of Tanner codes {T(C,Gi)}i=1 from which the family of cNLTS-Hamiltonians {H(i)}i=1 of Theorem 3 is obtained.

For the graphs Gi underlying the Tanner codes, we employ a construction of spectral Cayley-expanders due to Lubotzky, Phillips, and Sarnak.

Theorem 13

(Ref. 20). Assume thatpandqare distinct, odd primes such thatq>2pandqis a square modulop. Then, there exists a symmetric generating set Γ ofPSL2(Fq)such that the Cayley graphCay(PSL2(Fq),Γ)is a non-bipartite,p + 1-regular expander graph withλ<2p.

By fixing a suitable prime p, we obtain a family of regular graphs Gi of degree d = p + 1 and order q(q2 − 1)/2 with spectral bound λ<2d1. We mention in passing that by a result due to Alon and Boppana, this is the best possible bound that any family of regular graphs can achieve and such families are called Ramanujan graphs.

Furthermore, we require a linear, binary code C. More specifically, for the construction of the cNLTS-Hamiltonians to go through, we require the existence of a classical linear binary code C of block size d encoding at least k0 ≥ 0.55d bits with distance Δ0 ≥ 4λ. As the degree d of the graphs is constant, it suffices to show that a suitable code C exist, as a brute-force search has time-complexity bounded by a constant O(1). The existence of a suitable code is guaranteed by the Gilbert–Varshamov bound [see, e.g., Ref. 36 (Chap. 5) for a proof].

Theorem 14

(Gilbert–Varshamov). Let 0 ≤ μ ≤ 0.5 and let 0 ≤ R0 ≤ 1 − H2(μ), then there exists a binary, linear code of block sized, rankk0 = R0d, and distance Δ0 = μd.

We can now give an explicit construction of a suitable code family {T(C,Gi)}i=1. By Theorem 14, there exists a code C encoding k0 ≥ 0.55d bits when μ ≤ 0.09. We further require that C has distance Δ0 = μd ≥ 4λ. This is the case via Theorem 13 by choosing, for example, μ = 0.09 and prime p = 7901.

We thank Chinmay Nirkhe for helpful discussions. We also thank Robbie King and the anonymous referee for carefully reading our manuscript. A.A. acknowledges support through the NSF award QCIS-FF: Quantum Computing and Information Science Faculty Fellow at Harvard University (Grant No. NSF 2013303). N.P.B. acknowledges support through the EPSRC Prosperity Partnership in Quantum Software for Simulation and Modeling (Grant No. EP/S005021/1).

The authors have no conflicts to disclose.

Anurag Anshu: Conceptualization (equal); Formal analysis (equal); Investigation (equal); Methodology (equal); Writing – original draft (equal); Writing – review & editing (equal). Nikolas P. Breuckmann: Conceptualization (equal); Formal analysis (equal); Investigation (equal); Methodology (equal); Writing – original draft (equal); Writing – review & editing (equal).

Data sharing is not applicable to this article as no new data were created or analyzed in this study.

1.
Aharonov
,
D.
,
Arad
,
I.
, and
Vidick
,
T.
,
ACM SIGACT News
44
,
47
79
(
2013
).
2.
Aharonov
,
D.
and
Eldar
,
L.
,
SIAM J. Comput.
44
,
1230
(
2015
).
3.
Aharonov
,
D.
and
Naveh
,
T.
, “
Quantum NP—A survey
,” arXiv:quant-ph/0210077 (
2002
).
4.
Anshu
,
A.
,
Arad
,
I.
, and
Gosset
,
D.
, in
Proceedings of the 54th Annual ACM SIGACT Symposium on Theory of Computing (STOC 2022)
(
Association for Computing Machinery
,
New York
,
2022
), pp.
12
18
.
5.
Anshu
,
A.
,
Breuckmann
,
N. P.
, and
Nirkhe
,
C.
, “
NLTS Hamiltonians from good quantum codes
,” arXiv:2206.13228v2 (
2022
).
6.
Anshu
,
A.
,
Gosset
,
D.
,
Morenz Korol
,
K. J.
, and
Soleimanifar
,
M.
,
Phys. Rev. Lett.
127
,
250502
(
2021
).
7.
Anshu
,
A.
and
Nirkhe
,
C.
, in
13th Innovations in Theoretical Computer Science Conference (ITCS 2022), Leibniz International Proceedings in Informatics (LIPIcs)
, edited by
Braverman
,
M.
(
Schloss Dagstuhl–Leibniz-Zentrum für Informatik
,
Dagstuhl, Germany
,
2022
), Vol. 215, pp.
1
22
.
8.
Bravyi
,
S.
,
Kliesch
,
A.
,
Koenig
,
R.
, and
Tang
,
E.
, “
Obstacles to variational quantum optimization from symmetry protection
,”
Phys. Rev. Lett.
125
,
260505
(
2020
).
9.
Breuckmann
,
N. P.
and
Eberhardt
,
J. N.
,
IEEE Trans. Inf. Theory
67
,
6653
(
2021
).
10.
Buhrman
,
H.
,
Cleve
,
R.
,
De Wolf
,
R.
, and
Zalka
,
C.
, in
Proceedings of FOCS’99
(
IEEE
,
1999
), p.
358
.
11.
Eldar
,
L.
, in
12th Innovations in Theoretical Computer Science Conference (ITCS 2021), Leibniz International Proceedings in Informatics (LIPIcs)
, edited by
Lee
,
J. R.
(
Schloss Dagstuhl–Leibniz-Zentrum für Informatik
,
Dagstuhl, Germany
,
2021
), Vol. 185, pp.
1
20
.
12.
Eldar
,
L.
and
Harrow
,
A. W.
, in
2017 IEEE 58th Annual Symposium on Foundations of Computer Science (FOCS)
(
IEEE
,
2017
), pp.
427
438
.
13.
Fernández-González
,
C.
,
Schuch
,
N.
,
Wolf
,
M. M.
,
Cirac
,
J. I.
, and
Pérez-García
,
D.
,
Commun. Math. Phys.
333
,
299
(
2015
).
14.
Freedman
,
M. H.
and
Hastings
,
M. B.
,
Quantum Inf. Comput.
14
,
144
180
(
2014
).
15.
Hastings
,
M. B.
,
Haah
,
J.
, and
O’Donnell
,
R.
, “
Fiber bundle codes: Breaking the npolylog(n) barrier for quantum LDPC codes
,” in
Proceedings of the 53rd Annual ACM SIGACT Symposium on Theory of Computing
(
Association for Computing Machinery
,
New York
,
2021
), pp.
1276
1288
.
16.
Kahn
,
J.
,
Linial
,
N.
, and
Samorodnitsky
,
A.
,
Combinatorica
16
,
465
(
1996
).
17.
Kuwahara
,
T.
,
Arad
,
I.
,
Amico
,
L.
, and
Vedral
,
V.
,
Quantum Sci. Technol.
2
,
015005
(
2017
).
18.
LaRose
,
R.
,
Tikku
,
A.
,
O’Neel-Judy
,
É.
,
Cincio
,
L.
, and
Coles
,
P. J.
,
npj Quantum Inf.
5
,
57
(
2019
).
19.
Leverrier
,
A.
,
Londe
,
V.
, and
Zémor
,
G.
,
Quantum
6
,
661
(
2022
).
20.
Lubotzky
,
A.
,
Phillips
,
R.
, and
Sarnak
,
P.
,
Combinatorica
8
,
261
(
1988
).
21.
Meshulam
,
R.
, arXiv:1803.05643 (
2018
).
22.
Nirkhe
,
C.
,
Vazirani
,
U.
, and
Yuen
,
H.
, in
45th International Colloquium on Automata, Languages, and Programming (ICALP 2018), Leibniz International Proceedings in Informatics (LIPIcs)
, edited by
Chatzigiannakis
,
I.
,
Kaklamanis
,
C.
,
Marx
,
D.
, and
Sannella
,
D.
(
Schloss Dagstuhl–Leibniz-Zentrum fuer Informatik
,
Dagstuhl, Germany
,
2018
), Vol. 107, pp.
1
11
.
23.

One may note that the local terms of the resulting parent Hamiltonian do not have norm 1 and may scale as 1δ. However, we can fix this by the standard trick of replacing each local term by the projector onto its image. The frustration-free property of the parent Hamiltonian ensures that the ground state is unchanged.

24.

This would happen iff the edge assignment b were simply inconsistent with the codewords allowed at v. For example, v may connect with d − 1 edges in R and b may assign Δ0 − 2 number of ‘1’s on those edges.

25.

While Γ may act on more qubits than included in V, we say that Γ is a ground state of H1 if its reduced state on the qubits in V belongs to the ground space of H1.

26.
Orús
,
R.
,
Ann. Phys.
349
,
117
(
2014
).
27.
Panteleev
,
P.
and
Kalachev
,
G.
, “
Quantum LDPC codes with almost linear minimum distance
,” arXiv:2012.04068 (
2020
).
28.
Panteleev
,
P.
and
Kalachev
,
G.
, “
Asymptotically good quantum and locally testable classical LDPC codes
” in (Association for Computing Machinery, New York, 2022), pp. 375–388.
29.
Pastawski
,
F.
,
Yoshida
,
B.
,
Harlow
,
D.
, and
Preskill
,
J.
,
J. High Energy Phys.
2015
,
149
.
30.
Peruzzo
,
A.
,
McClean
,
J.
,
Shadbolt
,
P.
,
Yung
,
M.-H.
,
Zhou
,
X.-Q.
,
Love
,
P. J.
,
Aspuru-Guzik
,
A.
, and
O’Brien
,
J. L.
,
Nat. Commun.
5
,
4213
(
2014
).
31.
Schuch
,
N.
,
Wolf
,
M. M.
,
Verstraete
,
F.
, and
Cirac
,
J. I.
,
Phys. Rev. Lett.
98
,
140506
(
2007
).
32.
Sipser
,
M.
and
Spielman
,
D. A.
,
IEEE Trans. Inf. Theory
42
,
1710
(
1996
).
33.
Steenrod
,
N. E.
,
Ann. Math.
44
,
610
(
1943
).
34.
Tillich
,
J.
and
Zemor
,
G.
, in
2009 IEEE International Symposium on Information Theory
(
IEEE
,
2009
), pp.
799
803
.
35.
Vadhan
,
S. P.
,
Found. Trends Theor. Comput. Sci.
7
,
1
(
2012
).
36.
Van Lint
,
J. H.
,
Introduction to Coding Theory
(
Springer Science & Business Media
,
2012
), Vol. 86.