<?xml-model href='http://www.tei-c.org/release/xml/tei/custom/schema/relaxng/tei_all.rng' schematypens='http://relaxng.org/ns/structure/1.0'?><TEI xmlns="http://www.tei-c.org/ns/1.0">
	<teiHeader>
		<fileDesc>
			<titleStmt><title level='a'>Leveraging Hamiltonian simulation techniques to compile operations on bosonic devices</title></titleStmt>
			<publicationStmt>
				<publisher>IOP</publisher>
				<date>04/28/2025</date>
			</publicationStmt>
			<sourceDesc>
				<bibl> 
					<idno type="par_id">10593225</idno>
					<idno type="doi">10.1088/1751-8121/adb5df</idno>
					<title level='j'>Journal of Physics A: Mathematical and Theoretical</title>
<idno>1751-8113</idno>
<biblScope unit="volume">58</biblScope>
<biblScope unit="issue">17</biblScope>					

					<author>Christopher Kang</author><author>Micheline B Soley</author><author>Eleanor Crane</author><author>Steven M Girvin</author><author>Nathan Wiebe</author>
				</bibl>
			</sourceDesc>
		</fileDesc>
		<profileDesc>
			<abstract><ab><![CDATA[<title>Abstract</title> <p>Circuit quantum electrodynamics enables the combined use of qubits and oscillator modes. Despite a variety of available gate sets, many hybrid qubit-boson (i.e. qubit-oscillator) operations are realizable only through optimal control theory, which is oftentimes intractable and uninterpretable. We introduce an analytic approach with rigorously proven error bounds for realizing specific classes of operations via two matrix product formulas commonly used in Hamiltonian simulation, the Lie–Trotter–Suzuki and Baker–Campbell–Hausdorff product formulas. We show how this technique can be used to realize a number of operations of interest, including polynomials of annihilation and creation operators, namely<inline-formula><tex-math><CDATA/></tex-math><math overflow='scroll'><mrow><mo stretchy='false'>(</mo><mi>a</mi><msup><mo stretchy='false'>)</mo><mi>p</mi></msup><mo stretchy='false'>(</mo><msup><mi>a</mi><mo>†</mo></msup><msup><mo stretchy='false'>)</mo><mi>q</mi></msup></mrow></math></inline-formula>for integer<inline-formula><tex-math><CDATA/></tex-math><math overflow='scroll'><mrow><mi>p</mi><mo>,</mo><mi>q</mi></mrow></math></inline-formula>. We show examples of this paradigm including obtaining universal control within a subspace of the entire Fock space of an oscillator, state preparation of a fixed photon number in the cavity, simulation of the Jaynes–Cummings Hamiltonian, and simulation of the Hong-Ou-Mandel effect. This work demonstrates how techniques from Hamiltonian simulation can be applied to better control hybrid qubit-boson devices.</p>]]></ab></abstract>
		</profileDesc>
	</teiHeader>
	<text><body xmlns="http://www.tei-c.org/ns/1.0" xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xlink="http://www.w3.org/1999/xlink">
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Today, many quantum computing architectures are homogeneous, with the same type of qubit used throughout the device. From devices made of superconducting qubits <ref type="bibr">[1]</ref><ref type="bibr">[2]</ref><ref type="bibr">[3]</ref> to ion trap qubits <ref type="bibr">[4]</ref>, prior work largely focuses on linking qubits of the same type together in faulttolerant ways. However, there is emerging work <ref type="bibr">[5]</ref><ref type="bibr">[6]</ref><ref type="bibr">[7]</ref><ref type="bibr">[8]</ref><ref type="bibr">[9]</ref> studying the use of heterogeneous quantum computers that leverage two or more types of quantum architectures (e.g. qubits and oscillator modes). Heterogeneous devices hold promise because they can be tailored for speci&#26112;&#26880;c physical simulation problems, which would be especially useful in applications like material discovery <ref type="bibr">[10]</ref>, molecular simulation <ref type="bibr">[11,</ref><ref type="bibr">12]</ref>, topological models <ref type="bibr">[13]</ref> or lattice gauge theories <ref type="bibr">[14]</ref>.</p><p>In particular, hybrid qumode-qubit models <ref type="bibr">[15]</ref> hold some advantages: for example, microwave qumodes have long lifetimes and large accessible Hilbert spaces, making them attractive targets for quantum error correction <ref type="bibr">[15]</ref>. Introducing qumodes also enables new physical gates, such as the M&#248;lmer-S&#248;rensen gate <ref type="bibr">[16]</ref> while at the same time enabling new forms of transduction between qubits and qumodes <ref type="bibr">[17]</ref>. Oscillator interactions have unique features, like nonlinearities, which are challenging to simulate even with homogeneous quantum architectures <ref type="bibr">[8]</ref>.</p><p>Ef&#26112;&#26880;ciently compiling logical operations to physical pulses is a critical, but computationally expensive task. In theory, pulse design techniques like optimal control theory (OCT) <ref type="bibr">[18]</ref><ref type="bibr">[19]</ref><ref type="bibr">[20]</ref> can produce pulses that implement arbitrary quantum transformations on a hybrid qumodequbit system. These techniques have been applied to a variety of physical systems, including NMR <ref type="bibr">[19]</ref>, superconducting transmon qubits <ref type="bibr">[20]</ref>, and qumodes <ref type="bibr">[21]</ref><ref type="bibr">[22]</ref><ref type="bibr">[23]</ref>. In practice, OCT is Table <ref type="table">1</ref>. Overview of techniques for synthesizing particular unitary transformations and the quantum gates needed. Our formulas allow the manipulations of broad classes of Hamiltonian block encodings, denoted B A , B B . Each row contains the formula used, the target to approximate, the preconditions, and a reference to the location of the precise statement of the performance of the method. Most formulas use 'conjugated' hamiltonians (UHU &#8224; ) which can be achieved via conjugation of the exponential. The formula provided denotes hybrid gates with &#963; i terms, and single-qubit gates are capitalized (e.g. S, X, H). The bounds on the number of gates depend on the accuracy required of the approximation and are given in the corresponding theorems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Formula</head><p>Target Preconditions Reference BCH(it&#963; i B, it&#963; i A) exp(t 2 [A, B])1 A, B Hermitian theorem 2.4 BCH(it&#963; j A, it&#963; k B) exp(-i t 2 &#963; i {A, B}) A, B Hermitian equation ( <ref type="formula">18</ref>)</p><p>[A, B] = 0, AB = (AB) &#8224; equation ( <ref type="formula">32</ref>)</p><p>computationally intensive and in&#26112;&#27648;exible, requiring pulses to be recompiled on a case-by-case basis. Furthermore, OCT is almost always uninterpretable, yielding only a pulse which performs the desired operation without providing any physical intuition. Experimentally, these limitations prevent the high-&#26112;&#26880;delity realization of quantum algorithms; theoretically, the complexity of our quantum circuits often inappropriately ignores the classical cost of required compilation.</p><p>Inspired by recent experimental progress <ref type="bibr">[24,</ref><ref type="bibr">25]</ref>, we introduce an extensible control scheme for a universal, hybrid qumode-qubit quantum computer (table <ref type="table">1</ref>). Speci&#26112;&#26880;cally, we show how block-encoded operators can be manipulated using the Lie-Trotter-Suzuki and Baker-Campbell-Hausdorff matrix product formulas. We thus enable the creation of instruction set architectures (ISAs) that can be analytically compiled to experimentally available gate sets. Prior art, namely Jacobs <ref type="bibr">[26]</ref>, has studied similar techniques to compile operations; we generalize these techniques to work in a variety of domains, including in settings with multiple qumodes and more exotic operators, and prove concrete error bounds on these techniques.</p><p>We develop two parallel approaches, one which primarily uses the creation and annihilation operators which we refer to as based on 'Fock methods,' and the other primarily relying on position and momentum operators which we refer to as based on 'phase-space methods. <ref type="bibr">'</ref> We demonstrate that both methods can be used to generate an ISA for qumode-qubit devices. Because our methods operate in both Fock and phase-space, we can achieve transformations that are natively described in either picture; for example, exponentials of polynomials of annihilation and creation operators for Hamiltonian simulation and state preparation in Fock space and controlled parity and beam splitter operators in phase space. Our methods obtain almostlinear asymptotic scaling.</p><p>Furthermore, we use the previously mentioned formulas to realize a number of operations of interest, including polynomials of annihilation and creation operators, namely a p a &#8224; q for integer p, q. These block-encoded operations are crucial for quantum signal processing (QSP) Figure <ref type="figure">1</ref>. A qubit-qumode Hilbert space. On the left, the qubit is a typical twodimensional Hilbert space. On the right, the qumode consists of Fock states of value at most &#923; = 4. and certain problems in quantum simulation. Finally, we give examples for the Hamiltonian of a nonlinear material and applications to key unsolved problems in quantum simulation such as the Fermi-Hubbard model. While these approaches are expensive in terms of raw gate counts, because they are analytic they provide intuition into synthesizing the gate robustly. Furthermore, these gate sequences can be used as a starting point for optimal control methods, helping to avoid cold start issues.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Preliminaries</head><p>In this section, we introduce the hybrid qumode-qubit architecture we operate on and the matrix product formulas we will use.</p><p>We aim to provide a generic toolbox to build unitary transformations on hybrid qumodequbit devices. Such devices are common in quantum systems, spanning circuit quantum electrodynamics (superconducting qubits coupled to microwave photons) to ion-trap quantum computing (for which the mechanical modes of oscillation are coupled to atomic qubits). The challenge is that fundamentally different insights are needed to compile unitaries in the hybrid setting over typical binary-based approaches.</p><p>We review the mathematical properties of qumode quantum mechanics that are needed to understand the basic operations considered for the ISA architecture that we consider. Speci&#26112;&#26880;cally, we present an analytic ISA based on the Lie-Trotter-Suzuki (Trotter) and Baker-Campbell-Hausdorff (BCH) decompositions for decomposition of gates of the form U = e i &#292;&#963; j , where &#292; is a Hermitian operator composed of phase-space operators and Pauli gates. Before jumping into the speci&#26112;&#26880;c details of our gate operations, we need to review the basics of qumode quantum mechanics as well as the mathematical results needed to use these qumode operations to compile a given unitary transformation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.">A hybrid qumode-qubit device</head><p>We &#26112;&#26880;rst produce a mathematical description of a qumode, then describe operations which can be performed on the qumode and qubit (&#26112;&#26880;gure 1). Qumodes store bosonic states. Bosons are are already commonplace in quantum computing experiments: photons (energy quanta of the electromagnetic &#26112;&#26880;eld) are used in photonic chips, cavity QED, and hybrid circuit QED, while phonons (quanta of mechanical vibrations) are used to couple ion-spin qubits in ion traps. However, we are interested in using the qumode as an explicit computational resource, rather than as a conduit for entangling operations or source of noise.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.1.1.">Representing the qumode.</head><p>There are two different bases that are commonly used to describe the state of the qumode:</p><p>1. Phase-space representation, where operators are written in terms of position (x) and momentum (p) operators 2. Fock-space representation, where operators are written in terms of qumode creation (a &#8224; ) and annihilation (a) operators.</p><p>In the phase-space representation, the computational basis corresponds to the strength of the electric &#26112;&#26880;eld in the case of photons (or equivalently the position of a mechanical oscillator for vibrational systems). We refer to this with the operator x and we have that for any x &#8712; R, x|x&#10217; = x|x&#10217;. We also use the corresponding operator for momentum p. This describes the magnetic &#26112;&#26880;eld for a photonic system. In practice, cutoffs are imposed on the values of the &#26112;&#26880;eld and further discretization error on the gates and the outputs prevents arbitrary precision readout; however, for simplicity we ignore the latter issue in order to provide a simpler if less realistic computational model and ignore the issue that even when cutoffs are imposed the vector space does not strictly form a Hilbert space without also including spatial discretization.</p><p>In the Fock-space representation, we track the number of bosons (number of photons or the energy level of the harmonic oscillator for the vibrational case) in the computational basis. In this representation the computational basis is de&#26112;&#26880;ned to be an eigenvector of the boson number operator n|n&#10217; = n|n&#10217;, where n = a &#8224; a is the number operator and a and a &#8224; add and remove a boson from the system, respectively. Formally this spectrum is countably in&#26112;&#26880;nite, but after truncation it forms a &#26112;&#26880;nite-dimensional Hilbert space and thus can be thought of as a qudit. For example, assuming a cutoff &#923; = 3 on the boson number n</p><p>Here P &#923; is the projector onto the subspace of the cavity containing at most &#923; photons</p><p>Observe that this Hilbert space has dimension &#915; + 1 corresponding to the Fock states from |0&#10217; to |&#915;&#10217;. Truncation of the Hilbert space is required to provide error bounds, otherwise the remainder terms become unde&#26112;&#26880;ned. Provided that an appropriate cutoff is picked for the system, the discrepancies between the truncated and untruncated systems will often be negligible. For notational clarity, we assume a cutoff of &#923; for all further equations and assume the annihilation and creation operators implicitly have the projectors P &#923; .</p><p>To incorporate the qubit's state, we take the tensor product of the qubit and qumode Hilbert spaces, so that the state space is H 2 &#8855; H &#923;+1 . This means that, for example, a computational basis state will be of the form |q&#10217; &#8855; |m&#10217; where the state |q&#10217; here can be thought of as the union of the qubits in the system, and |m&#10217; represents a qumode state where the system is either in position x = m for the phase-space encoding or has m photons if the Fock-space encoding is used.</p><p>2.1.2. Representing operations and measurements via block encodings.</p><p>Depending on whether the qumode is described in Fock or phase space, there exist two pairs of complementary qumode operators. In Fock space, the operators are creation and annihilation operators a &#8224; , a; in phase-space, the operators are position and momentum x, p.</p><p>Our techniques can be applied in both spaces because Fock and phase-space operators have the equivalencies</p><p>and commutation relations</p><p>To illustrate the qumode-qubit ISA, we de&#26112;&#26880;ne three types of operations with examples:</p><p>1. Qubit-exclusive: these include typical qubit gates like the Pauli (X, Y, Z) gates,</p><p>and Hadamard (H) and phase (S) gates</p><p>2. Qumode-exclusive: we assume that linear optical operations (which are at most quadratic in the &#26112;&#26880;eld operators) can be performed on the qumode. This includes the displacement operations e &#945;a &#8224; +&#945; * a for &#179; &#8712; C, phase delays (or phase-space rotations) e -i&#945;a &#8224; a , and squeezing operations e &#945;(a &#8224; ) 2 -&#945; * a 2 . Qumodes can also be entangled with other qumodes via beamsplitter operations e (&#945;a &#8224; b-&#945; * ab &#8224; ) where b is the creation operator acting on a different qumode. In this work, we primarily focus on the single-qumode case. The multi-mode case with beamsplitters is discussed in <ref type="bibr">[5,</ref><ref type="bibr">14]</ref> but without the rigorous convergence bounds provided in the present work. 3. Qumode-qubit entangling: there are several entangling operations between individual qumodes and qubits that widely appear in the circuit QED literature. Two common operations we consider are the conditional displacement operation <ref type="bibr">[25]</ref> e -i&#963; z &#8855;(&#945;a &#8224; +&#945;a) and the Selective Number-dependent Arbitrary Phase (SNAP) gate <ref type="bibr">[24]</ref> e -i&#963; z &#8855; &#8721; n &#945;n Pn , where Pn = |n&#10217;&#10216;n| is the projector onto the nth Fock state.</p><p>Note that, for clarity, we use uppercase letters for qubit-exclusive gates and lowercase letters for qumode-exclusive or qumode-qubit gates. For example, we use S, X, H for qubit-exclusive gates and &#963; i notation for Paulis in hybrid gates.</p><p>Our compilation strategy describes operations in terms of qubit-exclusive gates and the S 1 gate, a primitive qumode-qubit entangling gate (de&#26112;&#26880;nition 2.1). S 1 is a useful 'block-encoding' primitive to compose complex gates because it embeds a &#26112;&#26880;rst-order Fock operator in the offdiagonal blocks. 'Block-encoded' matrices refer to how 'blocks'/submatrices of a larger matrix can be expressed as an existing matrix. Block encodings are frequently used in quantum algorithm design <ref type="bibr">[27,</ref><ref type="bibr">28]</ref>. Definition 2.1 (S 1 primitive gate). For any t &gt; 0 and any positive integer cutoff &#923;, we de&#26112;&#26880;ne S 1 to be the unitary acting on the Hilbert space H 2 &#8855; H &#923;+1 that has the following representation as a block matrix</p><p>Note that S 1 can itself be decomposed into conditional displacements (see appendix A) or implemented directly via OCT <ref type="bibr">[29]</ref><ref type="bibr">[30]</ref><ref type="bibr">[31]</ref><ref type="bibr">[32]</ref>. Also note that the block encoding can also be expressed as the sum of qumode-qubit tensor products</p><p>We also consider the broader class of block-encoded Hamiltonians:</p><p>Definition 2.2 (Block encodings). For a qumode operator A acting upon H &#923;+1 , we denote the joint block-encoded Hamiltonian to be</p><p>so that the subscript is the upper right block and the lower left block is the transpose and complex conjugate to preserve Hermiticity. I.e., B A is Hermitian for any A, and thus is a suitable Hamiltonian. Note that B A can describe a qumode-qubit Hamiltonian acting on</p><p>In this block-encoding notation, observe that S 1 = exp itB a &#8224; . Throughout this work, we consider increasingly exotic A matrices that can be created via polynomials of qumode operators.</p><p>Finally, to simplify notation, we oftentimes write tensor products implicitly as follows</p><p>This notation is used extensively to abbreviate the action of &#963; i on H 2 and M (which is comprised of qumode operators) on H &#923;+1 . We further assume that the qubit can be measured directly, but the qumode can only be measured by entangling it with a qubit and reading out the state of the qubit to obtain a single classical bit of information about the qumode state <ref type="bibr">[5]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.2.">Matrix product formulas</head><p>Matrix product formulas describe the behavior of products of matrix exponentials (namely e A e B ). These formulas are well-known in Hamiltonian simulation <ref type="bibr">[33]</ref><ref type="bibr">[34]</ref><ref type="bibr">[35]</ref> and are used to approximate a discretized version of the time evolution operator e -iHt using the Trotter formula. Thus, they often have rigorous error bounds that describe how e -iHt can be approximated given constituent e -iHjt . In our setting, e -iHt will be the operation we seek to implement using the S 1 gate.</p><p>As stated above, we use two product formulas: the BCH formula and the Trotter formula (&#26112;&#26880;gure 2). The BCH formula is used to create a commutator (or anticommutator) of operators. The Trotter formula is used to add these commutators and anticommutators together. We introduce the informal theorems below: Theorem 2.3 (Informal Trotter theorem from <ref type="bibr">[34]</ref>). Suppose we may implement e M&#955; and e N&#955; for arbitrary &#955; &#8712; R and anti-Hermitian M, N. Then, a pth order Trotter formula has the error scaling</p><p>requiring no more than 4 &#8226; 5 p-1 exponentials.</p><p>Theorem 2.4 (Informal BCH theorem from <ref type="bibr">[36]</ref>). Suppose we can implement the operators e M&#955; , e N&#955; for &#955; &#8712; R and anti-Hermitian M, N. Then, a BCH formula of order p has the error scaling</p><p>requiring no more than 8 &#8226; 6 p-1 exponentials.</p><p>These product formulas are de&#26112;&#26880;ned recursively and are comprised of sequences of e M&#955; , e N&#955; gates evaluated at varying values of &#955;. While the sequences may be long, as there is an exponential dependence on p, it is important to note that these error bounds are known to be loose, so experimental implementations may bene&#26112;&#26880;t from improved accuracy.</p><p>Finally, note in our notation these formulas take the logarithm matrix and output sequences of matrix exponentials which approximate a desired exponential. Additionally, note that Hamiltonians can be 'conjugated', i.e. we can transform a Hamiltonian from H to UHU &#8224; for any unitary U via:</p><p>Conjugation, Trotter, and BCH give us immense &#26112;&#27648;exibility for the Hamiltonian manipulations which can be achieved (table <ref type="table">1</ref>).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Producing Anticommutators and Exponential Products</head><p>In this section, we formalize our technique to build polynomials of block encodings in both Fock and phase space. This is notable because it shows how Hermiticity is not a requirement for our compilation scheme: whereas phase-space operators x and p are Hermitian, Fock operators a, a &#8224; are decidedly non-Hermitian. We &#26112;&#26880;rst show how our hybrid qumode-qubit architecture allows for the synthesis of anticommutators of Hermitian operators and, by proxy, matrix products of phase-space operators. We then use similar techniques with non-Hermitian operators such as Fock-space operators to manipulate block encodings of matrices. Finally, we contextualize these methods with asymptotic error bounds, providing theoretical analyses of our proposed techniques.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.1.">Intuition of polynomial building via anticommutators in phase space</head><p>Our qumode-qubit architecture uses BCH to natively implement anticommutator-like exponentials by exploiting the qubit's Hilbert space. In conjunction with Trotter, these anticommutators are used to build larger block encodings; we generate nontrivial transformations like beamsplitters and the Hong-Ou-Mandel effect in section 4.</p><p>To begin, we recall the qumode-qubit commutators</p><p>where &#1013; ijk is the Levi-Civita symbol, and i, j, k &#8712; {x, y, z}. We use these relations, as well as the Pauli product identity</p><p>to decompose the anticommutator &#963; i {A, B} in terms of a qumode-qubit commutator</p><p>Note this assumes A, B &#8712; H &#923;+1 are Hermitian so that exp[i &#963; j A] is unitary and commutes with &#963; i , as is the case when A, B are mode-only operators. Thus, by using a hybrid qubit-cavity operation of the form exp i A&#963; j , exp i B&#963; k , the BCH formula can convert commutators into anticommutators.</p><p>Finally, because 1 2 [A, B] + 1 2 {A, B} = AB, we use the Trotter formula to produce</p><p>assuming we may implement exp 1 2 &#963; i [A, B] via a traditional BCH formula.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.2.">Polynomial building non-Hermitian block encodings in Fock space</head><p>In this section, we show how to achieve A q for an arbitrary qumode operator A. We also show that our techniques work in a multi-qumode setting. This extends the prior techniques, which require A to be Hermitian. When A is a Fock space operator, this corresponds to realizing arbitrary powers of a and a &#8224; , which is known to generate a universal set of operations on the qumode. This is useful for the simulation of nonlinear materials, which naturally lead to terms that are polynomial in a, a &#8224; , as well as QSP <ref type="bibr">[27]</ref>.</p><p>Our method again uses the qubit coupling to induce a phase in the compound qumodequbit system, similar to the previous section. We begin with block encodings as described in equation <ref type="bibr">(11)</ref>. To manipulate the block encodings, we begin by recognizing that qubit-only operations can modify the exponential via 'conjugation,' i.e.</p><p>Thus, given any block encoding, we can also create the auxiliaries</p><p>recalling that S is a qubit phase gate. Applying BCH yields the commutators</p><p>These commutators themselves can be conjugated. Recall that HZH = X and</p><p>Thus, using only B A (t) gates, we can approximate B A 2 . We now lift this procedure to produce exp itB AB given exp itB A , exp itB B for commuting A, B &#8712; H &#923;+1 . Observe the following commutators (whose exponentials we can implement via BCH)</p><p>Provided that [A, B] = 0 and via conjugation, the equality simpli&#26112;&#26880;es to</p><p>Via Trotter, we can directly implement the sum:</p><p>We select &#964; = t 2 to obtain the desired time and conjugate by &#963; x to produce the desired matrix. This procedure is described in algorithm 1 and thus allows us to approximate exp i tB AB . This process can be repeated iteratively, assuming AB commutes with B; for example, if A = B = a, then this process can be used to produce higher powers a k , (a &#8224; ) k .</p><p>Our formulas require [A, B] = 0 to build higher order polynomials. This requirement is tolerable, as we still may achieve a broad class of transformations, including homogeneous polynomials of a or a &#8224; . Our formulas can also be extended to more general cases where the operators commute, e.g. when the synthesized unitary operates on two different qumodes, as in the conditional beamsplitter (a gate that acts as a beamsplitter controlled on an ancillary qubit).</p><p>Algorithm 1 is an extension of the prior commutator approaches in phase space because the &#963; i = -i 2 [&#963; j , &#963; k ] relation is natively expressed in the algorithm; i.e. if we have B A = B B = B x = exp itx&#963; x , the 'Left' term vanishes and the'Right' term is the commutator we would apply.</p><p>Finally, in algorithm 2, we demonstrate how to implement AB if AB = (AB) &#8224; . This process places AB in the upper left block, which is useful to exactly execute exp itAB by preparing the qubit state to |0&#10217;, but it prevents the process from being executed recursively. Simplifying the commutator from equation ( <ref type="formula">29</ref>) &#26112;&#26880;nds</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.3.">Error analysis</head><p>The prior description of our algorithm assumes errorless product formulas. However, the BCH and Trotter formulas introduce errors which must be accounted for, especially when applying our algorithm recursively. In this section, we cite the error scaling of the general addition algorithm described in algorithm 1 and the multiplication algorithm described in algorithm 2.</p><p>The proofs and full results are included in appendix B.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Algorithm 1. ADD(B A (t), B B (t), p l , pr, t).</head><p>Input:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Suppose we have approximations B A (t), B B (t) with the error scaling</head><p>for some constant c and order p A , p B &#10878; 1 where [A, B] = 0. Then, the application of algorithm 1 will yield the scaling</p><p>with C TOTAL = max(&#8741;AB&#8741; , &#8741;BA&#8741; , C 2 BCH ) and C BCH = max(&#8741;A&#8741; , &#8741;B&#8741; , c), using no more than 1.07 &#8226; 30 q exponentials, where q = max(&#8968; min(p1,p2)-1 2 &#8969;, 1).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Theorem 3.2. Suppose we have approximate block encodings B A , B B with the error</head><p>for constant c and p A , p B &#10878; 1 where AB = (AB) &#8224; . Then, algorithm 2 has the error</p><p>with C = max(&#8741;A&#8741; , &#8741;B&#8741; , c), using no more than 8 &#8226; 6 q-1 exponentials where q = max(&#8968; min(pA,pB)-1 2 &#8969;, 1).</p><p>While the asymptotic error analysis suggests that the cost of this method is onerous, we note that the product formulas often have overly pessimistic error scaling and operation counts <ref type="bibr">[37]</ref>. In the applications below, we provide numerical simulations which suggest our technique is more readily implementable than theory suggests.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Applications</head><p>In this section, we show how our technique is a powerful tool for analytically realizing desired operations. This technique succeeds both for Hamiltonian simulation problems and general control problems. In particular, we show how the aforementioned physical intuition for a desired transformation is often suf&#26112;&#26880;cient to produce an approach to create desired operations.</p><p>We include applications in both phase and Fock space:</p><p>1. Phase-space techniques are demonstrated to be useful in the case where displacements (e (&#945;a &#8224; +&#945; * a) = e i &#945;x for &#179; real or e &#945;p for &#179; imaginary) are the only experimentally available gates. We produce the controlled parity operator e it&#963; z a &#8224; a (section 4.2); the beamsplitter e -it&#963; z (a &#8224; b+ab &#8224; ) (section 4.4); gates for two encodings of universal control of the restricted span{|0&#10217; , |1&#10217;} Hilbert space (appendix E); and gates for simulation of Fermi-Hubbard lattice dynamics using the two lowest Fock states of the cavity (appendix F), including samesite, hopping, controlled-beamsplitter (appendix C.2), and FSWAP gates. 2. Fock space techniques are shown to be useful assuming compilation to S 1 (de&#26112;&#26880;nition 2.1) and single-qubit operations to produce polynomials of annihilation and creation operators, (namely a p a &#8224; q for integer p, q). We demonstrate how polynomials of these operators can be used in Hamiltonian simulation (e.g. with &#967; (3) nonlinear materials, appendix D.2) and state preparation (appendix D.3).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.1.">Nonlinear Hamiltonian simulation</head><p>As a simple application, let us consider the case of simulating a &#967; (3) nonlinear material. These interactions commonly occur in nonlinear optics and appear when the index of refraction for a material varies linearly with the intensity of the electromagnetic &#26112;&#26880;eld. Such interactions can be modeled for a single qumode using the expression</p><p>Our goal here is to examine the cost of a simulation of such a Hamiltonian in our model for time t and error tolerance &#1013; and to determine the parameter regimes within which a hybrid simulation using our techniques could provide an advantage with respect to a conventional qubit-based simulation of the Hamiltonian.</p><p>Each of the terms can be approximated using formulas from table <ref type="table">1</ref>. The &#969;a &#8224; a term requires an embedding of Hermitian a &#8224; a, so that</p><p>The second order term is treated in the same way, noting that B (a &#8224; ) 2 can be produced via table <ref type="table">1</ref>, so that</p><p>Thus, via the BCH formula, we can block-encode the two Hamiltonian terms. Trotterizing allows us to block-encode the entire Hamiltonian into the upper-left quadrant. Thus, by setting the qubit to |0&#10217;, we can approximate the Hamiltonian. The error scaling is as follows and is proven in appendix D.2:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4">(Generating non-linear Hamiltonians). Let H be the following non-linear</head><p>Hamiltonian:</p><p>(i.e. a Hamiltonian with a Kerr non-linearity). Let t be the evolution time and &#1013; be the target error tolerance. For any positive integer q we can approximate an exponential of the blockencoded Hamiltonian with error at most &#1013; in the operator norm using re O(q) S 1 operations where r &#8712; &#8486; (&#923; 4 t) 1+1/(q-3 4 )</p><p>.</p><p>This shows that we can perform a simulation of the dynamics within error &#1013; using a number of operations within our instruction set that scales near-linearly with the evolution time and subpolynomially with &#1013;. Further, this approach requires no ancillary memory and can be done with a single qumode and a qubit. In contrast, a qubit-only device would require a polylogarithmic number of qubits in &#923;.</p><p>It is worth noting that in this case the ancillary qubit is not being used directly in the model. Instead it is being used to control the dynamics and generate the appropriate nonlinear interaction between the photons present in the model.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.2.">Nondestructive measurement of the qumode</head><p>We now demonstrate how the approach can extend beyond problems in Hamiltonian simulation. We begin with an example of the technique for control: In particular, we seek to perform a nondestructive measurement of the qumode in which we project the information into the qubit <ref type="bibr">[11,</ref><ref type="bibr">38]</ref>.</p><p>To construct such a nondestructive measurement, we seek to implement e itn&#963; z where n = a &#8224; a is the number operator. If we could implement this gate for arbitrary t, we could perform phase estimation on the qubit to nondestructively project the qumode into a &#26112;&#26880;xed number of bosons. This could be done by setting t suf&#26112;&#26880;ciently small so that t&#923; &#10877; 2&#960; is calculable with phase estimation. Alternatively, for t = &#960;, this operation checks the parity of the qumode and applies an RZ gate for odd parities. We employ the instruction set in the phase-space representation to synthesize the in&#26112;&#26880;nitesimal conditional rotation gate</p><p>for k = x, y, z. We rewrite n in terms of the phase-space operators by recognizing:</p><p>Applying equations ( <ref type="formula">3</ref>), (4), and (45) yields</p><p>such that the gate is expressed via the Trotter decomposition as the product of exp</p><p>Given the Pauli commutator relation, the &#26112;&#26880;rst commutator is</p><p>and the second commutator is</p><p>such that both terms are amenable to BCH decomposition, and the in&#26112;&#26880;nitesimal conditional rotation is composed with a gate-depth lower bound of nine. To perform an error analysis, we may directly apply the error scaling of BCH and Trotter to &#26112;&#26880;nd:</p><p>Theorem C.1. Suppose we can implement e itx&#963; i , e itp&#963; i without error. Then, we may approximate exp itB x2 +p 2 with arbitrary error scaling p as</p><p>where C = max( x2 + p2 , &#8741;x&#8741; 2 , &#8741;p&#8741; 2 ) and using no more than 4 &#8226; 5 p 2 -1 4 exponentials. We then provide numerics in &#26112;&#26880;gure 3. As expected, the wavefunction initialized in the second excited state of the cavity and the ground state of the associated qubit has an autocorrelation function that oscillates with phase exp(2it). Dynamics are well reproduced with 2000 time steps for a &#26112;&#26880;nal time of 20 with cutoff &#923; = 14. Note the units are arbitrary in the absence of de&#26112;&#26880;nition of the cavity frequency &#969;, with the only units de&#26112;&#26880;ned by setting the reduced Planck constant to unity &#8463; = 1arbitrary units. The close agreement between the BCH-synthesized and exact gates is supported by the error scaling after a single gate application computed for time step t, which features a power law scaling in agreement with the predicted error scaling for both BCH and Trotter decompositions. We can obtain a similar decomposition with Fock-space operators. Observe that the MULT subroutine applied to the exp itB a , exp itB a &#8224; using theorem 3.2 can also yield</p><p>when B a 's implementation is error-free. Note that aa &#8224; = a &#8224; a + 1, so the block encoding that is actually applied is</p><p>Thus, our Fock-space methods would also achieve the same transformation, albeit requiring a phase and RZ correction.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.3.">State preparation from the vacuum</head><p>Consider the case where we seek to prepare Fock state |k&#10217; b on the qumode. On qubit devices, preparing integer states is trivial, assuming the qubits represent logic in a binary fashion. However, hybrid boson-qubit devices natively implement exponentials of the phase-space or Fock-space operators. Thus, preparing |k&#10217; b directly can often be challenging. Existing work <ref type="bibr">[39]</ref> enables the preparation of states, but are less granular in their control of the qumodequbit state. We present a method that only swaps the |1&#10217;|0&#10217; &#8596; |0&#10217;|k&#10217; states for integer k, otherwise leaving the initial state intact.</p><p>To begin, we aim to implement (a &#8224; ) k on the vacuum. It is suf&#26112;&#26880;cient to approximate</p><p>which we call the 'unprotected' state preparation operator. Selecting appropriate t yields precisely the desired behavior, which gives the following result:</p><p>Theorem D.5 (Unprotected state preparation). For k &#10877; &#923;, we can take t = (2n + 1)</p><p>While T k (t) performs the desired transformation, it may incur unwanted side effects if the starting state is of the form |1&#10217; &#8855; |b&#10217; for b &gt; 0. We can use our same approach to produce the following operation: Theorem D.6. Consider the Fock preparation unitary P k with the form</p><p>When t = (2n + 1) &#960;</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4</head><p>&#8730; k! , we have that P k performs our desired state preparation</p><p>We claim that we can approximate this unitary with P k,p where</p><p>The proofs of theorems D.5 and D.6 are provided in appendix D.3. Though this subroutine appears expensive, numerical results suggest it is far more implementable than theory would suggest. In the following simulations, we apply the above technique but always use a second-order symmetrized BCH formula and second-order (symmetrized) Trotter formula. This amounts to 480 exponentials for the unprotected case and 960 exponentials for the protected case. The synthesized gates are provided in &#26112;&#26880;gures 4 and 5.</p><p>As can be seen in &#26112;&#26880;gure 6, the protected gate has higher compilation errors than the unprotected gate. This is likely due to the fact that the protected formula requires an additional application of the Trotter product formula. This will further incur commutator error over the unprotected gate.</p><p>We also analyze the error scaling as the order of the BCH formulas used increases. Figure <ref type="figure">7</ref> describes the error-resource tradeoff as the Trotter step within each BCH formula increases. Observe that the error decays as higher order formulas are used or Trotter step size is reduced, as expected. While modest depths have relatively high in&#26112;&#26880;delity, in theory our compilations can achieve arbitrary accuracy at the level of both entire gates and matrix individual elements. The operations we seek to realize need not act on a single qumode; in fact, our techniques are extensible to hybrid setups with multiple qumodes or qubits. Consider the conditional  (controlled-phase) beam splitter</p><p>This gate naturally pertains to certain lattice gauge theories <ref type="bibr">[14]</ref> and gives rise to exponential SWAP (eSWAP) <ref type="bibr">[40]</ref> and controlled-SWAP (cSWAP) gates for state puri&#26112;&#26880;cation and SWAP tests, when paired with an ordinary (uncontrolled) beam splitter <ref type="bibr">[41]</ref>. The argument in phasespace representation is</p><p>Figure <ref type="figure">6</ref>. Absolute element-wise error when compiling T 2 gate via scheme: left is when the compilation target is the unprotected gate, while right is when the target is the protected gate. The protected gate has higher synthesis errors. such that the gate is decomposed in terms of a Trotter expansion as the product of two exponential terms exp</p><p>According to the Pauli commutation relation, the &#26112;&#26880;rst commutator is</p><p>and the second is</p><p>with the following error scaling:</p><p>Theorem C.2. Assume we may implement e i txm&#963; j , e i tpm&#963; j for m &#8712; {1, 2}; i.e. we may implement the qubit-conditional position shifts and momentum boosts on either qumode without error. Then, we may approximate B x1 x2+ p1 p2 with arbitrary error scaling p as</p><p>2 ) and using no more than 4 &#8226; 5</p><p>p 2 -1 4 exponentials.</p><p>The two exponential terms are decomposed via the BCH formula for a lower-bound gate depth of eight. Results are shown in &#26112;&#26880;gure 8 for 15 states per cavity with a shared qubit over a &#26112;&#26880;nal time of &#960;/2 with 200 equal time steps, where the system is initially in the &#26112;&#26880;rst excited state of each cavity and the ground state of the shared qubit |11g&#10217;. As expected for the conditional beam splitter, the gate exhibits the Hong-Ou-Mandel effect, in which the occupation of cavity 1 oscillates between the &#26112;&#26880;rst excited mode and a superposition of the ground and the second excited states of the cavity. The BCH-synthesized results closely agree with that of the original gate, with no visible leakage beyond the physical states (the lowest three states of the cavity) into the working space under the time duration studied. As for the conditional rotation gate, the relative error of the BCH-synthesized gate computed for a single time step of length t was found to scale according to a power law with the time step, in accordance with the analytic result for Trotterization and BCH decomposition.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Discussion</head><p>Our main contribution in this paper is a systematic approach to synthesizing unitary dynamics on a hybrid quantum computer that has access to both qubit and qumode operations. Such gate sets naturally model systems such as cavity quantum electrodynamics systems and ion trap-based quantum computers. Our main innovation here is the development of high-order analytic formulas that can be used to place bounds on the complexity of implementing arbitrary unitary operations on such a hybrid device. Speci&#26112;&#26880;cally, we see that these methods are capable of achieving subpolynomial scaling with the inverse error tolerance (1/&#1013;) and allow us to implement arbitrary nonlinearities in the &#26112;&#26880;eld operators in the generator of the unitary that we wish to implement at low cost asymptotically. In particular, we focus on using a construct known as a block-encoded creation operator as our fundamental construct and show numerically highly accurate approximations to the exponential of a block encoding of the square of the creation operator. Further, we study the Hong-Ou-Mandel effect and observe that the synthesized operations used in our construction can have negligible error with respect to our target precision. Beyond compilation, our work thereby provides intuition when compiling a variety of gates. For example, our methods give mathematical understanding for the recent successes of echoed conditional displacement (ECD) gate sets for quantum computing <ref type="bibr">[25]</ref>.</p><p>While this work enables better analytic control of qubit-qumode systems, there remain many open questions. In particular, lowering the resource cost of these compilations, especially in noisy environments, is key to practical implementations. We note that for both the Hong-Ou-Mandel effect and the block encoding of (a &#8224; ) 2 that thousands of gate operations are needed to achieve in&#26112;&#26880;delities of 10 -3 or smaller. This makes such sequences impractical for near-term applications where the gate in&#26112;&#26880;delities are on the order of 1%. Ideally, these analytic sequences can be used as an initial sequence which can be further optimized via existing optimal control techniques. This would reduce warmstart challenges and potentially improve convergence.</p><p>Another concern arises from the nature of the qubit system, namely that creating qubitqumode interactions requires truncating the qubit system to a two-level system. For example, transmon qubits are typically truncated to two levels <ref type="bibr">[15,</ref><ref type="bibr">42,</ref><ref type="bibr">43]</ref>; in reality, these transmons can experience leakage to higher states, meaning that the qubit may itself exhibit qumodelike properties when poorly calibrated. While leakage is a practical concern, it can be somewhat avoided via well-de&#26112;&#26880;ned pulse shaping methods (e.g. DRAG <ref type="bibr">[44]</ref> pulses). These methods allow one to approach the control speed limit set by the anharmonicity of the level structure.</p><p>Several avenues of approach exist that could be used to improve upon these results: &#26112;&#26880;rst, note that our technique is connected to ideas from QSP <ref type="bibr">[27,</ref><ref type="bibr">45]</ref>. Thus, QSP could be applied to approximate polynomials of qumode operators; this could potentially improve the scaling with respect to the error tolerance from the subpolynomial scaling currently demonstrated to polylogarithmic scaling. Alternatively, our approach could seed gradient-descent optimization procedures for control such as GRAPE <ref type="bibr">[19]</ref> at the pulse level or numerical optimization of parameterized gates at the SNAP <ref type="bibr">[46]</ref> or ECD <ref type="bibr">[25]</ref> instruction level. These locally optimized sequences may then prove to be either better, or more understandable, than existing gradient-optimized pulse sequences for control of such systems. Designing pulses is, in practice, sensitive to device properties and noise environments, and presents a rich area for further research. </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Appendix A. Obtaining S 1</head><p>We demonstrate how to obtain the S 1 operator with the native gates present in the dispersive coupling regime of the Jaynes-Cummings model. Astute readers may recognize the S 1 operator as being a Jaynes-Cummings Hamiltonian when rewritten in the form</p><p>It is thus unsurprising that we may implement these types of operations on a circuit QED device that exhibits a similar native Hamiltonian.</p><p>The conditional displacement operator with magnitude &#179; is written:</p><p>For a Fock state |n&#10217;, a &#8224; a|n&#10217; = n|n&#10217;; therefore e ia &#8224; a&#952; a &#8224; e -ia &#8224; a&#952; = e i&#952; a &#8224; . Taking &#179; = &#179; * , we have</p><p>This operation can be built using single-qubit operations on a controlled displacement gate with additional phase delays on the oscillator. Both are linear optical operations or singlequbit operations, which we expect to be inexpensive in our computational model. Next, note that e i(&#945;(a &#8224; +a))</p><p>Thus to O(&#179; 2 ) the block-encoded creation operation can be constructed using single-qubit, controlled-displacement, and linear-optical operations through S 1 &#8776; e i(&#960;/2)a &#8224; a e i(&#945;(a &#8224; +a))&#8855;&#963; y e -i(&#960;/2)a &#8224; a e i(&#945;(a &#8224; +a))&#8855;&#963; x . (66)</p><p>Figure <ref type="figure">9</ref> describes the circuit.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Appendix B. Error analysis</head><p>To assess the error scaling of our approach, we must consider three sources of error: the underlying implementation error from using approximations of B A (t), the error from BCH, and the error from Trotter. In appendix B.1, we show that the BCH and Trotter formulas can still be applied on exponentials that have error. Then, we use these formulas in appendix B.2 to produce the error bounds for addition. Finally, in appendix B.3, we produce the error bounds for multiplication.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B.1. Product formulas with implementation error</head><p>We begin by formally stating the Trotter and BCH formulas when there is no implementation error:</p><p>Theorem B.1 (BCH Product Formula (Theorem 2 from [36])). Let A and B be bounded complex-valued matrices and assume without loss of generality t &#8712; R + is assumed for the purposes of asymptotic analysis to be in o <ref type="bibr">(1)</ref>. We then de&#26112;&#26880;ne</p><p>We further de&#26112;&#26880;ne BCH p,k recursively for p &#10878; 2 and odd k &#10878; 1:</p><p>with the constants</p><p>This recursive formula has the error scaling, where &#181; = max(&#8741;A&#8741; , &#8741;B&#8741;</p><p>and uses 8 &#8226; 6 p-1 exponentials when k = 1 and 4 &#8226; 6 p-1 exponentials otherwise.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Theorem B.2 (Trotter Formula (Lemma 1 from [34]))</head><p>. Let {H j : j = 1 . . . m} be a set of M bounded Hermitian operators acting on a Hilbert space of dimension 2 n and assume without loss of generality that t &#8805; 0. For H = H j , the error in the Trotter-Suzuki formulas of order k and timestep r obeys the error bound</p><p>where &#964; = &#8741;H&#8741; t and</p><p>using no more than 2m5 k-1 r exponentials. We de&#26112;&#26880;ne the kth order Trotter formula as</p><p>where p k = (4 -4 1/(2k-1) ) -1 and k &gt; 1. The relation has the base case</p><p>e Hj&#955;/2</p><p>This implies the following corollary:</p><p>Corollary B.1. If r = 1, i.e. there is no time stepping, the Trotter formula exhibits the error scaling</p><p>using no more than 2m5 k-1 exponentials.</p><p>Both of these formulas, however, assume that our implementation of exponentials occurs without error. However, if we would like to apply our technique recursively, our matrix product formulas must account for implementation error, i.e. be able to use primitives that themselves may have error. Thus, we restate both Trotter and BCH when the operators have asymptotic error:</p><p>Lemma B.1 (BCH under implementation error). Suppose there are some ideal operators U 1 (t), U 2 (t) that are exponentials of some anti-Hermitian matrix, i.e.:</p><p>We seek to build exp t 2 [A 1 , A 2 ], the exponential of the commutator of the matrices. Also suppose that may approximate U 1 (t), U 2 (t) with U 1,p1 (t), U 2,p2 (t) with the error scaling</p><p>for some p 1 , p 2 &#10878; 1. Call the logarithms of &#360;1,p1 , &#360;2,p2 to be &#195;1,p1 (t), &#195;2,p2 (t). Then, applying a qth-ordered BCH formula, where q = max(&#8968; min(p l ,p2)-1 2 &#8969;, 1) on the implementable U 1,p1 (t), U 2,p2 (t) can still approximate the commutator exponential by applying theorem B.1:</p><p>where C = max(&#8741;A 1 &#8741; , &#8741;A 2 &#8741; , c). This procedure uses 8 &#8226; 6 q-1 total exponentials.</p><p>Proof. Recognize that we may decompose the error involved in implementing the commutator exponential into two sources: the error incurred from the BCH formula intrinsically and the implementation error from the realizable terms. Thus, by the triangle inequality</p><p>We begin with the LHS term. By theorem B.1,</p><p>where C BCH = max(&#8741;A 1 &#8741; , &#8741;A 2 &#8741;). For the RHS, recall by Box 4.1 of Nielsen and Chuang <ref type="bibr">[47]</ref> that implementation errors accumulate at most linearly; thus, we can sum over the 8 &#8226; 6 q-1 operations used by BCH. By symmetry of the BCH formula, we apply the U 1,p1 (t), U 2,p2 (t) exponentials precisely 4 &#8226; 6 q-1 times. Thus,</p><p>Setting q = max{&#8968; min(p l ,pr)-1 2 &#8969;, 1} and recalling &#181; &#10878; 1, we observe</p><p>as desired.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Lemma B.2 (Trotter under implementation error).</head><p>Given lemma B.1's assumptions, theorem B.2's assumptions, and assuming &#8741;A 1 + A 2 &#8741; &#10878; 1, an operator can be constructed by applying a qth-ordered Trotter formula Trotter 2q by setting q = max(&#8968; min(p l ,p2)-1 2 &#8969;, 1) so that</p><p>where C = max(&#8741;A 1 + A 2 &#8741; , c) and using no more than 4 &#8226; 5 q-1 operator exponentials.</p><p>Proof. Similarly, we may apply the triangle inequality in order to determine a bound by separating the error accrued into the intrinsic Trotter error and the implementation error</p><p>To analyze the LHS, which represents the Trotter error, corollary B.1 provides a bound</p><p>To analyze the RHS, which represents the implementation error, recall by box 4.1 of Nielsen and Chuang <ref type="bibr">[47]</ref> that the error accrues linearly. Furthermore, the number of operations in Trotter is no more than 4 &#8226; 5 q-1 operations in total. Therefore, we only apply each constituent operation at most 2 &#8226; 5 q-1 times. Thus, a loose upper bound can be written as</p><p>It is suf&#26112;&#26880;cient to set q = max(&#8968; min(p1,p2)-1 2 &#8969;, 1) so that</p><p>as desired.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B.2. Scaling of the addition algorithm</head><p>We apply the above results to produce the error analysis of algorithm 1:</p><p>Theorem 3.1. Suppose we have approximations B A (t), B B (t) with the error scaling</p><p>for some constant c and order p A , p B &#10878; 1 where [A, B] = 0. Then, the application of algorithm 1 will yield the scaling</p><p>with C TOTAL = max(&#8741;AB&#8741; , &#8741;BA&#8741; , C 2 BCH ) and C BCH = max(&#8741;A&#8741; , &#8741;B&#8741; , c), using no more than 1.07 &#8226; 30 q exponentials, where q = max(&#8968; min(p1,p2)-1 2 &#8969;, 1).</p><p>Proof. Our proof proceeds by applying the above theorems upon our operations. By setting q = max(&#8968; min(p1,p2)-1 2 &#8969;, 1), lemma B.1 implies that:</p><p>where C BCH = max(&#8741;A&#8741; , &#8741;B&#8741; , c) and p BCH = min(p A , p B ). We'll need to set &#964; = t 2 to achieve the desired time evolution. Additionally, Pauli conjugation has no impact on the error scaling. We call these formulas 'Left' and 'Right'</p><p>where</p><p>Finally, we use lemma B.2, implying that a Trotter formula with order q has the error scaling</p><p>where</p><p>To bound the number of operations used, we recognize that the Trotter formula requires at most 4 &#8226; 5 q-1 commutators, each of which requires 8 &#8226; 6 q-1 constituent operators. Thus, the total number of operators required is bounded as</p><p>This implies the following corollary for the annihilation/creation operators:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Corollary B.2 (Algorithm 1 applied to polynomials of annihilation/creation operators).</head><p>Assume we can implement the following k l , k r th order approximations of S with error scaling p l , p r :</p><p>S kr,pr (t) -S kr (t</p><p>with c &#10878; &#923; max(k l ,kr)/2 . Then, we can implement higher-order operators with comparable t scaling</p><p>using no more than 1.07 &#8226; 30 q S k l , S kr operators.</p><p>Proof. To synthesize the block encoding of higher-order annihilation/creation operators, we directly apply theorem 3.1. We quantify the error by bounding the block-encoding norm. Note that:</p><p>A kth order block-encoded operator has a bounded norm</p><p>Thus, the constant C BCH is bounded, as C BCH &#10877; max(&#923; k l /2 , &#923; kr/2 , c) &#10877; max(&#923; max(k l ,kr)/2 , c) = c by hypothesis. Next, observe that &#8741;AB&#8741; , (AB) &#8224; &#10877; &#923; (k l +kr)/2 . Thus, C TOTAL &#10877; max(&#923; (k l +kr)/2 , c 2 ) = c 2 . Therefore, the &#26112;&#26880;nal error scaling will be upper bounded by O((c 2 t) min(p l ,pr)/2 ).</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>B.3. Scaling of the multiplication algorithm</head><p>Algorithm 2's error scaling follows directly from the BCH formula: Theorem 3.2. Suppose we have approximate block encodings B A , B B with the error</p><p>for constant c and p A , p B &#10878; 1 where AB = (AB) &#8224; . Then, algorithm 2 has the error</p><p>with C = max(&#8741;A&#8741; , &#8741;B&#8741; , c), using no more than 8 &#8226; 6 q-1 exponentials where q = max(&#8968; min(pA,pB)-1 2 &#8969;, 1).</p><p>Proof. We can directly apply lemma B.1 using the B A , B B operators. When applied, we &#26112;&#26880;nd that</p><p>where C = max(&#8741;A&#8741; , &#8741;B&#8741; , c) and q = max(&#8968; min(pA,pB)-1 2 &#8969;, 1). Then, by taking &#964; = t 2 , we yield</p><p>By counting the number of exponentials in the result via lemma B.1, we &#26112;&#26880;nally &#26112;&#26880;nd that the number of exponentials needed is at most 8 &#8226; 6 q-1 .</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Appendix C. Phase-Space Applications</head><p>In the following section, we derive error bounds for the two phase-space applications described: the conditional rotation gate and the controlled-phase beam splitter. Note that the cutoff approach we employ to bound &#8741;a&#8741; , a &#8224; is more complex for position and momentum operators.</p><p>To obtain error bounds, we leave all expressions in terms of &#8741;x&#8741; , &#8741;p&#8741;. We leave a more concrete bound that can be found by applying a cutoff upon both x, p simultaneously to future work.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>C.1. Conditional rotation gate</head><p>Theorem C.1. Suppose we can implement e itx&#963; i , e itp&#963; i without error. Then, we may approximate exp itB x2 +p 2 with arbitrary error scaling p as</p><p>where C = max( x2 + p2 , &#8741;x&#8741; 2 , &#8741;p&#8741; 2 ) and using no more than 4 &#8226; 5 p 2 -1 4 exponentials. Proof. Begin by directly applying theorem B.1 to identify the error scaling. This implies that</p><p>Without loss of generality, select &#963; i = &#963; y and &#963; j = &#963; z so that [&#963; i , &#963; j ] = 2i &#963; x . Then, by selecting &#964; = t 2 , the BCH formula is an approximation of exp itB x2 . Thus,</p><p>Similarly, for p2 ,</p><p>We apply lemma B.2 and observe</p><p>where C = max( x2 + p2 , &#8741;x&#8741; 2 , &#8741;p&#8741; 2 ) and q = &#8968; p 2 -1 4 &#8969;. This requires no more than 4 &#8226; 5 q-1 operator exponentials, thus implying</p><p>C.2. Controlled-phase beam splitter gate Theorem C.2. Assume we may implement e i txm&#963; j , e i tpm&#963; j for m &#8712; {1, 2}; i.e. we may implement the qubit-conditional position shifts and momentum boosts on either qumode without error. Then, we may approximate B x1 x2+ p1 p2 with arbitrary error scaling p as</p><p>2 ) and using no more than 4 &#8226; 5</p><p>p 2 -1 4 exponentials.</p><p>Proof. We may take a similar approach as above. Applying theorem B.1 yields</p><p>where we set &#8741;x&#8741; = max(&#8741;x 1 &#8741; , &#8741;x 2 &#8741;) and &#8741;p&#8741; = max(&#8741;p 1 &#8741; , &#8741;p 2 &#8741;). We again take &#964; = t 2 so that</p><p>Applying lemma B.2 gives</p><p>where</p><p>) and q = &#8968; p 2 -1 4 &#8969;. This requires no more than 4 &#8226; 5 q-1 operator exponentials, thus implying</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Appendix D. Fock-Space Applications</head><p>We now introduce a series of techniques that allow us to realize polynomials of Fock-space operators. We &#26112;&#26880;rst begin in appendix D.1 by identifying the error scaling of an arbitrary order Fock-space block encoding, i.e. B a k . In appendix D.2, we show how the techniques can be used to simulate the Jaynes-Cummings Hamiltonian, which itself is a polynomial of Fockspace operators. In appendix D.3, we demonstrate how this technique can be extended beyond simulation into realizing more general operators, such as a unitary for state preparation.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>D.1. Realizing block encodings of arbitrary order</head><p>We seek to demonstrate the following result:</p><p>Theorem D.1. For positive integer k &#10878; 1 and timestep t &#8712; R, we seek to implement the target block encoding T k (t) de&#26112;&#26880;ned as</p><p>For any &#1013; &gt; 0 and p &gt; 1 there exists an implementable unitary operation T k,p of order p such that</p><p>Algorithm 3. POWER(k, t, p) .</p><p>Input: k = 2 &#8467; for nonnegative integer &#8467;, timestep t &gt; 0, order p &gt; 1</p><p>and the number of applications of S 1 (t) needed to implement the operation scales in r &#8226; n 1.6 30 np 420 n 2 p/2 6 log 2 n+1 , (124</p><p>where r &#8712; &#920; (&#923; k/2 t) 1+1/(p-1)</p><p>.</p><p>Because we can add two lower-order block encodings via algorithm 1, we can exploit a binary expansion to achieve arbitrary orders (e.g. (a &#8224; ) 9 = (a &#8224; ) 2 3 a &#8224; ). Thus, our &#26112;&#26880;rst task is to demonstrate the implementation of these block encodings with orders that are a power of two. This is achievable through the recursive POWER algorithm:</p><p>This builds to the following result:</p><p>Theorem D.2. For any t &#10878; 0, p &#10878; 1, and &#26112;&#26880;xed k = 2 &#8467; for some &#8467; &#10878; 1 we have that the unitary implemented by algorithm 3, POWER acting on</p><p>using no more than 6 log 2 k &#8226; 420 kp/2 unitary S 1 operators.</p><p>To bound the error of this algorithm, we begin by identifying the implementation error of the second-order formula, i.e. S 2 , the &#26112;&#26880;rst operator with implementation error: Lemma D.1 (Implementing second-order block encodings). Suppose we can implement the following operation without error (as de&#26112;&#26880;ned in de&#26112;&#26880;nition 2.1 and subject to a bosonic cutoff)</p><p>Then, we can approximate S 2 (t) to the pth order, i.e. implement S 2 such that</p><p>using no more than 6 &#8226; 14 p S 1 (t) operations.</p><p>Proof. Note that, if S 1 (t) is errorless, then we only need to account for error incurred by the BCH and Trotter formulas. By employing a pth order BCH formula we can produce commutator exponentials with error O((&#923; 1/2 &#964; ) 2p+1 ) by theorem B.1 and fact B.1.</p><p>We again set &#964; = t 2 so that the error scales in at worst O((&#923;t) p+ 1 2 ). Then, we apply a Trotter formula lemma B.2 of order &#8968; p 2 &#8969; so that</p><p>with C &#10877; max(&#923;, &#923; 2/2 ) = &#923;. Our worst case error scaling is then O((&#923;t) p+ 1 2 ). This requires no more than 2 &#8226; 2 &#8226; 5 &#8968; p 2 &#8969;-1 of the commutators, each of which required 8 &#8226; 6 p-1 &#26112;&#26880;rst order operations. Thus, the cost scales in no more than</p><p>total number of S 1 operations.</p><p>This base case allows us to analyze the performance of algorithm 3:</p><p>Proof of theorem D.2. We demonstrate the bounds inductively. The base case (&#8467; = 1) holds via lemma D.1. For the inductive hypothesis, we assume that, for any p &#8242; &#10878; 1 and k = 2 &#8467; , we may implement POWER(k, t, p &#8242; ) as</p><p>To demonstrate the inductive step, we seek to apply corollary B.2 directly to the implementable operators from the inductive hypothesis. Thus, we set p &#8242; = 2p so that POWER (2k, t, p)</p><p>our desired error scaling. By corollary B.2, we require an adder of order max(&#8968; p &#8242; -1 2 &#8969;, 1) &#10877; p + 1 2 . Thus, the adder requires 1.07</p><p>Since COST(2, kp) &#10877; 6 &#8226; 14 kp by lemma D.1, the number of S 1 operations is upper bounded by COST (2k, p) &#10877; 6 log 2 k+1 &#8226; 420 kp =&#8658; COST (k, p) &#10877; 6 log 2 k &#8226; 420 kp/2 . (136) underlying operators. By assuming symmetry of the Trotter formula for ADD, each addition requires 1 2 1.07 &#8226; 30 q of the underlying operator. Thus, we can obtain a bound on the number of applications required of each fundamental POWER operator as log 2 n s=1 1 2 1.07 &#8226; 30 2 s-1 p+1/2 &#10877; 3 log 2 n 30 np &#10877; n 1.6 30 np (139)</p><p>because the sth layer of ADD requires constituent operators of order 2 s p, so q &#10877; 2 s-1 p + 1 2 . Finally, considering the total cost by adding up the cost of the individual POWER operators multiplied by the number of applications required yields</p><p>as desired. Now, we seek to &#26112;&#26880;nalize the number of operations required in terms of &#1013;. Recognize that we may use timeslicing to reduce the error arbitrarily. Note that: Lemma D.2. Suppose we may implement T k,p (t), an approximation of T k (t) with p &gt; 1 such that</p><p>Then, by timeslicing the approximation, we can produce T r k,p (t) where</p><p>where T r k (t) requires r &#8712; &#920; (&#923; k/2 t) 1+1/(p-1)</p><p>applications of the T k (t) operator.</p><p>Proof. We de&#26112;&#26880;ne the timeslicing of T k (t) as applying T k (t/r) operator r times</p><p>To &#26112;&#26880;nd a Taylor expansion for T k,p (t/r) r , note the explicit form for T k,p (t)</p><p>where &#8741;&#8710;(t)&#8741; &#8712; O(1). This allows us to express the re&#26112;&#26880;ned operator as</p><p>Thus, when we analyze the error,</p><p>To bound the implementation error by &#1013;, i.e. &#1013; &#8712; O (&#923; k/2 t) p r p-1</p><p>, we should select r as</p><p>as desired.</p><p>Finally, we demonstrate our original theorem statement, which allows us to create a bound on the number of S 1 operations necessary to achieve an arbitrarily ordered operator:</p><p>Proof of theorem D.1. By theorem D.3, we can perform a single Trotter step of timestep t r using n 1.6 30 np 420 n 2 p/2 6 log 2 n+1 S 1 operations. Thus, the total number of S 1 operations required scales in r &#8226; n 1.6 30 np 420 n 2 p/2 6 log 2 n+1 ,</p><p>where, by lemma D.2, it is suf&#26112;&#26880;cient to set r &#8712; &#920; (&#923; k/2 t) 1+1/(p-1)</p><p>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>D.2. Generation of nonlinear Hamiltonians</head></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Theorem D.4 (Generating non-linear Hamiltonians). Let H be the following non-linear</head><p>Hamiltonian:</p><p>(i.e. a Hamiltonian with a Kerr non-linearity). Let t be the evolution time and &#1013; be the target error tolerance. For any positive integer q we can approximate an exponential of the blockencoded Hamiltonian with error at most &#1013; in the operator norm using re O(q) S 1 operations where r &#8712; &#8486; (&#923; 4 t) 1+1/(q-3 4 )</p><p>&#1013; 1/(q-3 4 )</p><p>.</p><p>Proof. We &#26112;&#26880;rst show that the two Hamiltonian terms are implementable separately. Then, via Trotter, we combine them and perform an error analysis. In particular, we hope to embed the Hamiltonian such that we approximate the operator</p><p>i.e. where the Hamiltonian is embedded in the upper left hand block. Thus, when applied to a system with the |0&#10217; qubit, this amounts to implementing exp i tH on the mode.</p><p>We begin by embedding the a &#8224; a term. Notice that a &#8224; a Hermitian; thus, we can apply algorithm 2 on the a, a &#8224; block encodings. By the error analysis in theorem B.1 and the bound on the norm from fact B.1,</p><p>By setting &#964; = &#969;t 2 , we can achieve the a &#8224; a term:</p><p>requiring 8 &#8226; 6 q-1 total exp i tB a &#8224; operations (which can be reduced to S 1 operations via conjugation).</p><p>We now tackle the second order term. Recall that we can block-encode (a &#8224; ) 2 and (a) 2 via algorithm 3. We then apply algorithm 2 to (a &#8224; ) 2 , a 2 to yield the desired upper-left block encoding. Namely, we can implement exp i tB (a &#8224; ) 2 with the following error scaling:</p><p>using no more than 6 &#8226; 14 p S 1 operations, we can apply algorithm 2 to &#26112;&#26880;nd</p><p>by setting &#8467; = &#8968; p-1 2 2 &#8969; &#10877; p 2 + 1 and thus using 8 &#8226; 6 &#8467;-1 exponentials. When &#964; = &#954;t 4 , MULT i &#954;t 4 B (a &#8224; ) 2 , i &#954;t 4 B (a) 2 -exp i t &#954; 2 a &#8224; 2 (a) 2 0 0 (a) 2 a &#8224; 2 &#8712; O &#923; 4 &#954;t p 2 + 1 4 , (157) using no more than 8 &#8226; 6 &#8467;-1 &#8226; 6 &#8226; 14 p &#10877; 48 &#8226; 6 p/2 &#8226; 14 p &#10877; 48 &#8226; 35 p total S 1 operators. Then, we may set p = 2q so that, given no more than 48 &#8226; 35 2q total S 1 operations, we can implement the BCH formula with error scaling O((&#923; 4 &#954;t) q+ 1 4</p><p>). Finally, we apply the Trotter formula to the two subterms via lemma B.2. De&#26112;&#26880;ne the approximate matrix exponentials as follows:</p><p>so that,</p><p>where the constant factor can be obtained by observing the Hamiltonian norm is bounded via the triangle inequality. Now, by setting s = &#8968; 1 2 (q -3 4 )&#8969; &#10877; q 2 + 5 8 , we can obtain the desired error scaling. This formula requires no more than 4 &#8226; 5 s-1 total operations; by symmetry, we can assume each of the BCH formulas only must be applied 2 &#8226; 5 s-1 times. Thus, the total number of S 1 operations is no more than</p><p>To produce an &#1013; scaling, we apply lemma D.2 to the Trotterized operator, implying that we require the following r scaling for &#26112;&#26880;xed q:</p><p>where the total number of S 1 operations is no more than</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>D.3. Application to state preparation</head><p>We &#26112;&#26880;rst need to demonstrate the connection between block-encoded powers of annihilation/creation operators and state preparation. First, observe that the ideal block encoding would allow for initialization from the vacuum: </p><p>where the matrix products have well-de&#26112;&#26880;ned forms</p><p>When t &#8730; k! = (2n + 1) &#960; 2 for n &#8712; N, the |1&#10217; &#8855; |0&#10217; term vanishes and we are left with the |0&#10217; &#8855; |k&#10217; Fock state, as desired.</p><p>While this result allows us to prepare the |k&#10217; Fock state, it also will incur unwanted transformations on starting states other than the vacuum (|1&#10217; &#8855; |n&#10217;, n &#824; = 1). By applying the BCH formula, we can isolate this operation so that it only operates on the |1&#10217; &#8855; |0&#10217; term. In particular, we argue: Theorem D.6. Consider the Fock preparation unitary P k with the form</p><p>When t = (2n + 1) &#960;</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>4</head><p>&#8730; k! , we have that P k performs our desired state preparation</p><p>We claim that we can approximate this unitary with P k,p where</p><p>using no more than 4 &#8226; 5 q-1 T k,p subroutines.</p><p>Proof. The general construction of the operator emerges from the use of a Trotter formula in conjunction with a phase rotation gate. We begin by de&#26112;&#26880;ning the rotation operator:</p><p>Definition D.7. Call R Z0 the phase-&#26112;&#27648;ip operator acting on some set of modes B to be</p><p>i.e. only &#26112;&#27648;ip the phase for the vacuum. This operator is implementable using a 0-controlled cavity-conditioned qubit rotation gate.</p><p>Then, because R Z0 is self-adjoint, we can conjugate T k (-t) without error as</p><p>where speci&#26112;&#26880;c left-and right-hand (2|0&#10217;&#10216;0| -1) terms vanish given the annihilation/creation operators. We then apply the Trotter formula upon</p><p>as desired.</p><p>To compute the error scaling, recall our result from theorem D.3, which states the error scaling of T k,p (and, respectively,</p><p>so that, by lemma B.2,</p><p>when q = max(&#8968; p-1 2 &#8969;, 1) and using no more than 4 &#8226; 5 q-1 operator exponentials. Thus, we can set q = p+1 2 &#10878; max(&#8968; p-1 2 &#8969;, 1) so that we use no more than 4</p><p>Thus, our approximate operators can be applied to yield the same result with high probability:</p><p>Theorem D.8. We can prepare the |0&#10217; &#8855; |k&#10217; with probability at least 1 - &#182; using no more than r &#8712; &#920; (&#923; k/2 t) 1+1/(p-1)</p><p>(179) S 1 operators.</p><p>Proof. Begin by identifying the &#1013; precision necessary to yield a failure probability less than &#182;. A suf&#26112;&#26880;cient condition would be that</p><p>Observe that our idealized operator has a success probability; thus, we seek to demonstrate that</p><p>Because the probability of measuring |0&#10217; &#8855; |k&#10217; lies in [0, 1], the above inequality holds when</p><p>We recognize that we can lower bound the norm</p><p>by requiring P k -P k,p &#8734; &#10877; 1. This allows us to produce a lower bound on the original LHS</p><p>Thus, it is suf&#26112;&#26880;cient to hold</p><p>We apply lemma D.2 to theorem D.6 so that the time-sliced P r k,p has</p><p>applications of P k,p (t/r). The S 1 bound follows from a similar analysis to theorem D.1 applied to the result from theorem D.6.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Appendix E. Universal control of the span {|0&#10217; , |1&#10217;} fock space</head><p>To further demonstrate the ef&#26112;&#26880;cacy of the instruction set, we employ the approach to encode a qubit in a cavity either via generation of effective Pauli gates or imposition of an effective Hubbard interaction in the Jaynes-Cumming Hamiltonian. In this sense, the techniques presented here are analogous to those in <ref type="bibr">[48]</ref>, in that we use our results to effectively truncate the quantum information to a two-dimensional subspace despite the fact that the natural dynamics of the systems causes the quantum information to leak from this space into the larger Hilbert space of the cavity. Error bounds for these complex operations are considered outside of the scope of the present work and are left for future research.</p><p>For universal control in the restricted span {|0&#10217; , |1&#10217;} Hilbert space, we generate three effective Pauli operators &#963; x eff , &#963; y eff , and &#963; z eff that produce Pauli rotations in the lowest two modes of the cavity, with minimal leakage to higher energy states. The form of the effective Pauli operators is determined by expressing the standard Pauli operators</p><p>in terms of creation and annihilation operators truncated to the &#26112;&#26880;rst two Fock states</p><p>which yields</p><p>To reduce leakage into higher energy states, we ensure the creation operator &#226; &#8224; eff only acts on the ground state |0&#10217; and the annihilation operator &#226;eff only acts on the &#26112;&#26880;rst excited state |1&#10217; with the projector</p><p>where n is the number of photons in the cavity and where only the span {|0&#10217; , |1&#10217;} states are populated. Since the operator is a projector, it obeys the relation</p><p>such that the effective Pauli gates are</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>E.1. Pauli X Gate</head><p>Consider the in&#26112;&#26880;nitesimal &#963; x -rotation gate in the span {|0&#10217; , |1&#10217;} Fock space</p><p>Expression of the exponent in terms of phase-space operators equations (3), ( <ref type="formula">4</ref>) and <ref type="bibr">(45)</ref> gives</p><p>The gate is therefore given by Trotter for each of three terms: exp </p><p>where &#194;1 corresponds to a position displacement and B1 corresponds to the y-conditional rotation gate. The argument of the second term is already in the form of a commutator, such that</p><p>where &#194;2 corresponds to an unconditional momentum boost, and B2 corresponds to the zconditional rotation gate. Lastly, the third term already belongs to the ISA and needs no further decomposition.</p><p>The in&#26112;&#26880;nitesimal &#963; x -rotation gate in the span {|0&#10217; , |1&#10217;} Fock space is therefore composed of a product of nine rotation and displacement gates or 21 displacement gates.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>E.2. Pauli Y Gate</head><p>The in&#26112;&#26880;nitesimal &#963; y -rotation gate in the span {|0&#10217; , |1&#10217;} Fock space is determined analogously </p><p>where the exponent of &#194;2 corresponds to a conditional momentum shift and the exponent of B2 is a y-conditional rotation gate. The in&#26112;&#26880;nitesimal &#963; y -rotation gate in the span {|0&#10217; , |1&#10217;} Fock space therefore has a lower bound gate depth of nine displacement and rotation gates or 21 in displacement gates.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>E.3. Pauli Z Gate</head><p>The in&#26112;&#26880;nitesimal &#963; z -rotation gate in the span {|0&#10217; , |1&#10217;} Fock space is U span{0,1},z = e i&#955; 2 &#963; z eff &#963; z (224) = e -&#955; 2 (I-2&#226; &#8224; (I-n)&#226;)&#963; z , (</p><p>whose argument in terms of ladder operators is</p><p>Given the ladder operator commutator equation <ref type="bibr">(6)</ref>,</p><p>the relationship between the fourth-order ladder operator term and the number operator is</p><p>The argument of the exponential in terms of number operators is then</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Appendix F. Fermi-Hubbard Lattice Dynamics</head><p>To further demonstrate the power of our strategy, we employ the approach to simulate fermionic dynamics on qubit-qumode systems. We detail the required operations, with error estimates an area for future work. We consider the Fermi-Hubbard lattice Hamiltonian</p><p>The kinetic energy term TFH describes the nearest-neighbor interaction for hopping of a single spin between two sites with hopping parameter J and spin &#963; given annihilation operators {&#265; j,&#963; } and creation operators &#265; &#8224; j,&#963; for sites {j}. The potential energy term VFH describes the samesite interaction, which gives the energetic unfavorability of a spin up &#8593; and spin down &#8595; coexisting on the same site i, where nj,&#963; gives the number of spin &#963; particles on site j. According to fermion statistics, no more than a single particle of a given spin can exist on a single site.</p><p>Each individual set of qumodes represents either a spin up or spin down particle on a single lattice site, for direct comparison to the qubit-based schemes of <ref type="bibr">[49]</ref><ref type="bibr">[50]</ref><ref type="bibr">[51]</ref>. Each qmode set is connected to a qumode set that represents the same site of opposite spin to facilitate computation of the potential energy VFH , as well as to qumode sets of the same spin on neighboring sites to facilitate computation of the kinetic energy TFH . Qumode sets are also connected along Jordan-Wigner strings to take into account fermionic statistics.</p><p>The |0&#10217; qumode represents absence of a spin and the |1&#10217; qumode represents presence of a spin. Within each cavity, only the qumodes in span {|0&#10217;, |1&#10217;} are considered, as in section (E), which prevents leakage into unphysical high-energy qumodes. At the end of each operation, the qumode must be in either the |0&#10217; or |1&#10217; mode and the transmon state must also be in the ground state |g&#10217;, which provides an error syndrome and therefore a degree of error detection not employed in qubit-based representations of the Fermi-Hubbard lattice.</p><p>Propagation of any combination of up and down spins is simulated with three gates that operate on two sets of qumodes. The &#26112;&#26880;rst two gates-the same-site and hopping gates-are de&#26112;&#26880;ned as the propagator of the same-site and hopping Hamiltonians, respectively. The samesite term of the Hamiltonian for site i is (244)</p><p>The diagonal propagator is recognized as both the conditional cross-Kerr interaction and the controlled-phase (CPHASE) gate in the reduced subspace span {|0&#10217; , |1&#10217;}. The hopping term of the Hamiltonian for each &#963; spin in sites i, (i + 1) is</p><p>where the latter expression employs the commutator relationship of the annihilation and creation operators. The hopping Hamiltonian for the speci&#26112;&#26880;ed mapping is then the off-diagonal matrix</p><p>which gives the hopping propagator U hop = e -iH hop &#964; U hop = &#63726; &#63727; &#63727; &#63728; 1 0 0 0 0 cos (t&#964; ) i sin (t&#964; ) 0 0 i sin (t&#964; ) cos (t&#964; ) 0 0 0 0 1</p><p>which is recognized as a conditional controlled-phase beamsplitter restricted to span {|0&#10217; , |1&#10217;}, or equivalently a Givens/iSWAP-like gate in the reduced span {|0&#10217; , |1&#10217;} subspace <ref type="bibr">[50,</ref><ref type="bibr">51]</ref>. The &#26112;&#26880;nal gate of the three-gate set incorporates the fermionic statistics of the spins via the fermionic SWAP (FSWAP) gate <ref type="bibr">[49,</ref><ref type="bibr">51]</ref>. The state of each set of qumodes is swapped with one of its neighbors with inclusion of a phase where both spins are present in neighboring sets as</p><p>1 0 0 0 0 0 1 0 0 1 0 0 0 0 0 -1</p><p>which is recognized as the product of a conditional rotation gate and a beam-splitter on 3D cQED systems. Finally, initial states are prepared by the universal set of gates in span {|0&#10217; , |1&#10217;} detailed in section E.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>F.1. Conditional cross-Kerr (CPHASE) gate</head><p>We consider the in&#26112;&#26880;nitesimal conditional cross-Kerr gate</p><p>which is also employed in Gottesman-Kitaev-Preskill codes encoded in qubit-qumode systems <ref type="bibr">[52]</ref>.</p><p>The argument is expressed in terms of a commutator according to the Pauli commutation relation equation <ref type="bibr">(16)</ref> [A, B]&#955; 2 = i&#955; 2 n1 n2 &#963; z (251)</p></div><note xmlns="http://www.tei-c.org/ns/1.0" place="foot" n="2" xml:id="foot_0"><p>&#8969;, 1) and p l , p r are the orders of the</p></note>
		</body>
		</text>
</TEI>
