Abstract
This study demonstrates entanglement can be exclusively constituted by quantum Fourier transform (QFT) blocks. A bridge between entanglement and QFT will allow incorporating a spectral analysis to the already traditional temporal approach of entanglement, which will result in the development of new more performant, and fault-tolerant protocols to be used in quantum computing as well as quantum communication, with particular emphasis in the future quantum Internet.
Introduction
Jean-Baptiste Joseph Fourier (Auxerre, France, 21 March 1768, Paris, 16 May 1830) was a French mathematician and physicist, a disciple of Joseph-Louis Lagrange (Turin, Italy, 25 January 1736, Paris, 10 April 1813), known for his work on the decomposition of periodic functions into convergent trigonometric series called Fourier series, a method with which he managed to solve the heat equation. The projection of his work in the two centuries following his death on areas as diverse as electricity, optics, electronics, and so on, culminated during the twentieth century in the creation of the famous Discrete Fourier Transform1, Fast Fourier Transform2, and Quantum Fourier Transform3 (QFT), where the latter constitutes a key piece within Quantum Information Processing4 for the case of those quantum algorithms that require a phase estimation5, or phase estimation in qudit systems6, as well as, the presence of QFT in a d-level quantum system7.
On the other hand, entanglement8,9,10, so reviled by Albert Einstein, Boris Podolsky, and Nathan Rosen in their so famous 1935 paper11, has become the cornerstone of Quantum Computing4 and Quantum Communication12, in particular, in communications protocols such as quantum teleportation13, quantum secret sharing14, quantum key distribution15, quantum secure direct communication16, and quantum repeaters17, with a marked commitment to the future quantum Internet18,19,20,21,22.
The union of both entities, i.e. QFT, and entanglement, seems at first something quite strange, at least in the way it is presented in this work, where the first becomes a basal element for the creation of the second, however, the approach that will be presented then it will allow access to the hidden face of the entanglement, its spectral face.
QFT is constituted by an important family of quantum operations over the ring ℤ2n. The n-qubit QFT makes a coherent mapping from an input state or qubit string \(\left| x \right\rangle = \left| {x_{1} \ldots x_{n} } \right\rangle\) to an output state or qubit string \(\left| y \right\rangle = \left| {y_{1} \ldots y_{n} } \right\rangle\) in the computational basis23 as follows:
where \(\omega_{{2^{n} }} = e^{{i2\pi /2^{n} }}\) is the 2n root of unity, while the inverse QFT is:
The Hadamard matrix H is equivalent to the 1-qubit QFT and its inverse24,25,
That is, for the 1-qubit QFT all its components are equivalent. Instead, for the 2-qubit QFT, the same does not happen, since
and
are different: \(F_{{2^{2} }} \ne F_{{2^{2} }}^{ - 1}\), where \(F_{{2^{2} }} \wedge F_{{2^{2} }}^{ - 1} \in {\mathbb{C}}^{{2^{2} \times 2^{2} }}\). On the other hand, the Feynman’s gate4 (also known as Controlled-X, CNOT, or CX gate), as well as its flipped version are respectively:
and
where the difference between them consists in that in Eq. (5a) the upper qubit is the control qubit, while the lower qubit is the target qubit. Instead, in the version of Eq. (5b) it is exactly the opposite, being: \(CNOT_{flipped} = \left( {H \otimes H} \right) \times CNOT \times \left( {H \otimes H} \right)\), “×” the matrix product, and “⊗” the Kronecker product4.
Multiplying both \(F_{{2^{2} }}\) by itself and \(F_{{2^{2} }}^{ - 1}\) by itself, both multiplications result equal to the CNOTflipped gate of Eq. (5b): \(F_{{2^{2} }} \times F_{{2^{2} }} = F_{{2^{2} }}^{ - 1} \times F_{{2^{2} }}^{ - 1} = CNOT_{flipped}\). This can be easily verified by multiplying CNOTflipped by itself, and \(F_{{2^{2} }} \times F_{{2^{2} }}\) by \(F_{{2^{2} }}^{ - 1} \times F_{{2^{2} }}^{ - 1}\) and regrouping,
However,
and
Therefore, \(\sqrt {CNOT} \ne F_{{2^{2} }}\) and \(\sqrt {CNOT_{flipped} } \ne F_{{2^{2} }}\). Finally, the CNOT gate is equal to the flipped version of the multiplication of QFT \(F_{{2^{2} }}\) by itself,
Equation (8) is fundamental in the creation of the entanglement for two or more qubits, as well as in all the applications that require it, as is the case of quantum teleportation11.
Bell states
Pauli’s matrices4 can be expressed in terms of the so-named Hadamard rotation gates26 or the general unitary operator \(U\left( {\theta ,\varphi ,\lambda } \right) = \left[ {\begin{array}{*{20}l} {{\text{cos}}\left( {\theta /2} \right)} \hfill & { - {\text{e}}^{i\,\lambda } {\text{sin}}\left( {\theta /2} \right)} \hfill \\ {{\text{e}}^{i\varphi } {\text{sin}}\left( {\theta /2} \right)} \hfill & {{\text{e}}^{{i\left( {\lambda + \varphi } \right)}} {\text{cos}}\left( {\theta /2} \right)} \hfill \\ \end{array} } \right]\) as follows:
where I is a 2 × 2 identity matrix, \(i = \sqrt { - 1}\), \(H_{I} = H = U\left( {\pi /2,0,\pi } \right)\) of Eq. (3), while
The equivalence of Eq. (9b) can be used to represent the four Bell states:
with \(\left| 0 \right\rangle = \left[ {\begin{array}{*{20}c} 1 \\ 0 \\ \end{array} } \right]\), and \(\left| 1 \right\rangle = \left[ {\begin{array}{*{20}c} 0 \\ 1 \\ \end{array} } \right]\). That is, replacing in Eqs. (11a–11d) the equivalence corresponding to X of Eq. (9b),
H of Eq. (3), I of Eq. (9a), and CNOT of Eq. (8), it is possible to implement the four Bell states exclusively basing on QFT blocks. Without losing generality, Fig. 1a,c represents the implementation of the \(\left| {\beta_{00} } \right\rangle = \left| {\Phi^{ + } } \right\rangle\) Bell state in terms of its two original versions (direct and flipped), while Fig. 1c,d constitute their respective counterparts based exclusively on QFT blocks, confirming that these blocks are all that is needed to create entanglement while revealing its spectral nature.
Representation of the \(\left| {\beta_{00} } \right\rangle = \left| {\Phi^{ + } } \right\rangle\) Bell state in terms of QFT: (a) original version based on H and CNOT gates, (b) its representations in terms of one QFT21×21 and two flipped QFT22×22, (c) original version with one H and one flipped CNOT gates, and (d) its representations in terms of one QFT21×21 and two QFT22×22.
N-qubits Greenberger–Horne–Zeilinger (GHZN) states
This family of configurations is the most commonly used in practice when it comes to entanglement between three or more particles4,8,9,10, being its general form as follows:
Without loss of generality, in this study only \(\left| {GHZ_{3} } \right\rangle\) and \(\left| {GHZ_{4} } \right\rangle\) are implemented in terms of QFT blocks, where:
Equations (13) and (14) are graphically represented in Fig. 2a and d, respectively. Figure 2b shows \(\left| {GHZ_{3} } \right\rangle\) with one QFT21×21 and four flipped QFT22×22, while Fig. 2c represents it thanks to one QFT21×21 and two flipped QFT23×23. Finally, Fig. 2e shows \(\left| {GHZ_{4} } \right\rangle\) with one QFT21×21 and six flipped QFT22×22, while Fig. 2f represents it thanks to one QFT21×21 and two flipped QFT24×24.
Implementations of \(\left| {GHZ_{3} } \right\rangle\) and \(\left| {GHZ_{4} } \right\rangle\): (a) original version of \(\left| {GHZ_{3} } \right\rangle\) in terms of one H and two CNOT gates, (b) \(\left| {GHZ_{3} } \right\rangle\) thanks to one QFT21×21 and four flipped QFT22×22, (c) \(\left| {GHZ_{3} } \right\rangle\) based on one QFT21×21 and two flipped QFT23×23, (d) original version of \(\left| {GHZ_{4} } \right\rangle\) in terms of one H and three CNOT gates, (e) \(\left| {GHZ_{4} } \right\rangle\) thanks to one QFT21×21 and six flipped QFT22×22, (f) \(\left| {GHZ_{4} } \right\rangle\) based on one QFT21×21 and two flipped QFT24×24.
Equivalences between Fig. 2a–c as well as between Fig. 2d–f, show again the spectral nature of the entanglement even for the case of more than two particles entangled at the same time. In fact, the equivalences present in Fig. 2 between (N − 1) pairs of flipped QFT22×22 and two flipped QFT2N×2N, show that the equivalence of Fig. 1 is not a simple coincidence for a particular case like a Bell state, but actually, the entanglement in all its manifestations has a spectral nature, where the QFT is the essential instrument for a spectral tomography of it. It only remains to project this equivalence, in perhaps the most conspicuous application of entanglement, quantum teleportation13.
Teleportation
This protocol13 is implemented in three different ways in Fig. 3, where a qubit \(\left| \psi \right\rangle\) to be teleported is prepared and introduced in the upper qubit on the left of the protocol. A Bell state like that of Fig. 1 is distributed between Alice and Bob. Subsequently, a module applied in the two upper qubits and constituted by a CNOT gate, an H gate, and two quantum measurement blocks (QuMe) constitute what in practice is known as a Bell State Measurement (BSM) module4,8,9,10. The double lines at the output of each QuMe convey classical information from Alice to Bob in the form of two classical disambiguation or control bits. For this reason, this means of transport is known as a classic channel of disambiguation, control, or simply as an auxiliary channel.
Quantum teleportation protocol: (a) the original implementation, (b) Controlled-Z is replaced with its equivalent in terms of one CX and two H gates, and (c) a version based exclusively on QFT blocks, where QuMe means quantum measurement, and the double lines represent classical information obtained after each QuMe.
A 2-qubits Controlled-Z gate or simply CZ gate can be constructed from QFT blocks according to the equivalence of Eq. (9d), or in terms of two H and one CNOT (Controlled-X or CX) gates from the following identity:
As can be seen in Fig. 3c, except for the QuMe blocks, everything else in this protocol is representable using QFT blocks. This extends, with identical results, to all other protocols that are based on entanglement such as quantum secret sharing14, quantum key distribution15, quantum secure direct communication16, and quantum repeaters17, and that are used in quantum Internet18.
Quantum spectral analysis
A time decomposition, based on Fig. 4, is developed according to the intervention of each QFT block in the creation of the \(\left| {\beta_{00} } \right\rangle = \left| {\Phi^{ + } } \right\rangle\) Bell state. This analysis begins with the creation of a flipped QFT22×22 in terms of a QFT22×22 and four Hadamard (H) gates, where the last ones are used for flipping it as follows,
Timeline of the \(\left| {\beta_{00} } \right\rangle = \left| {\Phi^{ + } } \right\rangle\) Bell state of Fig. 1b based on QFT blocks.
Next, the complete timeline is developed according to Fig. 4, starting at t1, where \(\left| {\psi \left( {t_{1} } \right)} \right\rangle\) is the wave-function in that instant,
\(\left| {q_{u} \left( {t_{1} } \right)} \right\rangle = \left| 0 \right\rangle\) is the upper qubit in Fig. 4, and \(\left| {q_{l} \left( {t_{1} } \right)} \right\rangle = \left| 0 \right\rangle\) is the lower qubit in that figure. The qubits obtained \(\left| {q_{u} } \right\rangle\) and \(\left| {q_{l} } \right\rangle\) at time t1 are completely independents8, and are used as inputs to the next step, which is made up of an H gate in \(\left| {q_{u} } \right\rangle\) and an identity matrix in \(\left| {q_{l} } \right\rangle\),
where \(\left| + \right\rangle = \left[ {\begin{array}{*{20}c} {1/\sqrt 2 } \\ {1/\sqrt 2 } \\ \end{array} } \right]\), \(\left| {q_{u} \left( {t_{2} } \right)} \right\rangle = \left| + \right\rangle\), and \(\left| {q_{d} \left( {t_{2} } \right)} \right\rangle = \left| 0 \right\rangle\). As in the previous case, Eq. (18) shows us that both qubits obtained at time t2 are also completely independent8. Instead, in the next step yields,
where Eq. (19) indicates that \(\left| {q_{u} } \right\rangle\) and \(\left| {q_{l} } \right\rangle\) at time t3 are correlated8, i.e. although this case does not result in entanglement, \(\left| {\psi \left( {t_{3} } \right)} \right\rangle\) cannot be factored. In this intermediate instance, between both flipped QFT22×22, the impossibility of factoring can be observed, since there are no values of \(\left| {q_{u} \left( {t_{3} } \right)} \right\rangle\) and \(\left| {q_{l} \left( {t_{3} } \right)} \right\rangle\), such that \(\left| {\psi \left( {t_{3} } \right)} \right\rangle = \left| {q_{u} \left( {t_{3} } \right)} \right\rangle \otimes \left| {q_{l} \left( {t_{3} } \right)} \right\rangle\). Undoubtedly, this constitutes advance respect to the literature on the subject in force to date, which associated the aforementioned impossibility with the intervention of the CNOT gate, as a whole, in an exclusive way, or with an inappropriate coupling between the individual contributions of H and CNOT gates. In consequence, this analysis makes explicit an intermediate instance to the one already known for the non-separability and indistinguishability of the states during entanglement, which is exclusively the responsibility of a particular characteristic of the Discrete Fourier Transform1 (DFT) and that is inherited by the QFT3. This characteristic refers to the fact that the DFT is a dense matrix, i.e. all its elements are different from zero, since, they are the N roots of the unit or twiddle factors1, which when they are multiplied by the input vector produce an output vector where each of its elements represents a mixture or weighted sum of the incoming vector. Finally, the intervention of the second flipped QFT22×22 allows obtaining the wave-function at the time t4,
where, as in the previous case, it is impossible to decompose \(\left| {\psi \left( {t_{4} } \right)} \right\rangle\) into two independent states \(\left| {q_{u} } \right\rangle\) and \(\left| {q_{l} } \right\rangle\), that is, \(\left| {\psi \left( {t_{4} } \right)} \right\rangle\) is not factorable. This gives rise to a very particular state of null spin called entanglement8.
The four density matrices associated with every wave-function of Fig. 4 are the following:
where (•)* is the complex conjugate of (•),
The four density matrices can be seen in Table 1, where only \(\rho \left( {t_{3} } \right)\) has an imaginary part. On the other hand, comparing the 3D bars of the density matrices at t2 and t4, it can be seen that the consecutive action of both flipped QFT22×22 has a stretching effect as far as the locations of the bars are concerned. This shows that both flipped QFT22×22 are the architect of a bad copy of wave-function \(\left| {\psi \left( {t_{2} } \right)} \right\rangle\) of Eq. (18), that is to say,
where U = flipped QFT22×22 × flipped QFT22×22, being the true result generated by both,
This shows that entanglement is the result of an inadequate copy by a very inefficient copy machine embodied by both flipped QFT22×22. The aforementioned stretching effect added to the unification of the entanglement's own wave-function triggers its most conspicuous characteristic, that is to say, the impossibility of factoring the wave function of Eq. (20).
Moreover, given two subsystems (A, and B) that interact with each other, their density matrices treated individually are,
and their von Neumann entropies are,
where tr(•) is the trace of the square matrix (•), and log(•) is logarithm base 2 of (•). In the same way, for a composed system, the entropy is,
\(S^{A \cup B}\) depends on the degree of correlation (completely independent, correlated, and entangled) between both subsystems. Besides, in the classical and the quantum worlds, the correlations between the subsystems are those established by the additional information. In the case of composite quantum systems, the mutual information \(S^{A \cap B}\) is introduced to quantify that additional information, allowing us to obtain the degree of correlation between both subsystems8,
Therefore, the entropy of the composite system \(S^{A \cap B}\) indicates that the uncertainty of a state \(\rho^{A \cup B}\) is less than the two subsystems \(S^{A}\) and \(S^{B}\) added together.
Table 2 shows entropies in terms of the degree of correlations between both subsystems, in such a way that when \(S^{A \cup B} = 2\), the entropy of the composite system \(S^{A \cap B} = S^{A} + S^{B} - S^{A \cup B} = 1 + 1 - 2 = 0\), which means that both subsystems do not have mutual information, and this null degree of correlation corresponds to the case of Eq. (18) of Fig. 4 at time t2, where \(\left| {\psi \left( {t_{2} } \right)} \right\rangle\) is factored into \(\left| {q_{u} \left( {t_{2} } \right)} \right\rangle = \left| + \right\rangle\), and \(\left| {q_{l} \left( {t_{2} } \right)} \right\rangle = \left| 0 \right\rangle\), that is, both subsystems are completely independents. Instead, when \(S^{A \cup B} = 1\), the entropy of the composite system \(S^{A \cap B} = S^{A} + S^{B} - S^{A \cup B} = 1 + 1 - 1 = 1\), this case corresponds to Eq. (19) at time t3 of Fig. 4, where both subsystems are correlated, i.e., \(\left| {\psi \left( {t_{3} } \right)} \right\rangle\) cannot be factored in terms of \(\left| {q_{u} \left( {t_{3} } \right)} \right\rangle\) and \(\left| {q_{l} \left( {t_{3} } \right)} \right\rangle\). Although both subsystems (A, and B) share information and are not separable, they do not give rise to entanglement. Finally, if \(S^{A \cup B} = 0\), the entropy of the composite system \(S^{A \cap B} = S^{A} + S^{B} - S^{A \cup B} = 1 + 1 - 0 = 2\), that is to say, the mutual information between both subsystems is maxima. It is about the presence of entanglement corresponding to Eq. (20) at time t4 of Fig. 4, where, as in the previous case, it is impossible to decompose \(\left| {\psi \left( {t_{4} } \right)} \right\rangle\) into two independent states \(\left| {q_{u} } \right\rangle\) and \(\left| {q_{l} } \right\rangle\), that is, \(\left| {\psi \left( {t_{4} } \right)} \right\rangle\) is not factorable.
Conclusions
This study demonstrated the existing relationship between the Feynman4 gate, known as Controlled-X, CNOT, or CX, with a pair of flipped QFT22×22. This, added to the already known equivalence between the Hadamard gate (H), and one QFT21×21 matrix, gives rise to the creation of entanglement based exclusively on QFT blocks. This equivalence is extended to the creation of entanglement between more than two particles, as is the case of the states \(\left| {GHZ_{3} } \right\rangle\), and \(\left| {GHZ_{4} } \right\rangle\).
A representation of the famous quantum teleportation protocol11 based exclusively on QFT3,4 blocks is achieved, which highlights a clear projection of the study carried out here on the future quantum Internet18,19,20,21,22.
The decomposition of the configuration for the creation of the entanglement in QFT blocks allows, through the timeline of Fig. 4, to perform an internal tomography of the entanglement, revealing, for the first time in the literature, the three degrees of correlation between particles8, that is, completely independent, correlated, and entanglement, from a single configuration.
In the same process mentioned previously, it becomes evident as never before that entanglement arises from a defective copy starring both flipped QFT22×22.
Finally, the spectral analysis of all quantum computing and quantum communication protocols, added to the traditional temporal analysis present in the literature, will allow a better understanding of the inner nature of the entanglement, so that this new approach can help to create new and more efficient algorithms and fault tolerant protocols.
References
Briggs, W. L. & van Emden, H. The DFT: An Owner’s Manual for the Discrete Fourier Transform (SIAM, 1995).
Jain, A. K. Fundamentals of Digital Image Processing (Englewood Cliffs, 1989).
Weinstein, Y. S. et al. Implementation of the quantum Fourier transform. Phys Rev Lett. 86, 1889 (2001).
Nielsen, M. A. & Chuang, I. L. Quantum Computation and Quantum Information (Cambridge University Press, 2004).
Shor, P. W. Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer. SIAM J. Comput. 26(5), 1484–1509 (1997).
Cao, Y., Peng, S.-G., Zheng, C. & Long, G.-L. Quantum Fourier transform and phase estimation in qudit system. Commun. Theor. Phys. 55(5), 790–794 (2011).
Cao, Y., Peng, S.-G. & Long, G.-L. Quantum Fourier Transform in a d-level Quantum System, in Conference on Lasers and Electro-Optics/Pacific Rim 2007, (Optical Society of America, 2007), paper TuH3_4. https://www.osapublishing.org/abstract.cfm?URI=CLEOPR-2007-TuH3_4.
Audretsch, J. Entangled Systems: New Directions in Quantum Physics (Wiley-VCH Verlag GmbH & Co., 2007).
Jaeger, G. Entanglement, Information, and the Interpretation of Quantum Mechanics (Springer, 2009).
Horodecki, R. et al. Quantum entanglement. Rev. Mod. Phys. 81(2), 865–942 (2009).
Einstein, A., Podolsky, B. & Rosen, N. Can quantum-mechanical description of physical reality be considered complete?. Phys. Rev. 47(10), 777–780 (1935).
Cariolaro, G. Quantum Communications: Signals and Communication Technology (Springer, 2015).
Bennett, C. H. et al. Teleporting an unknown quantum state via dual classical and Einstein–Podolsky–Rosen channels. Phys. Rev. Lett. 70(13), 1895–1899 (1993).
Joy, D. et al. Implementation of quantum secret sharing and quantum binary voting protocol in the IBM quantum computer. Quantum Inf. Process. 19, 33 (2020).
Ekert, A. K. Quantum cryptography based on Bell’s theorem. Phys. Rev. Lett. 67(6), 661–663 (1991).
Zhou, Z. et al. Measurement-device-independent quantum secure direct communication. Sci. Chin. Phys. Mech. Astron. 63(3), 230362 (2020).
Ruihong, Q. & Ying, M. Research progress of quantum repeaters. IOP J. Phys. Conf. Ser. 1237, 052032 (2019).
Caleffi, M. et al. The rise of the quantum Internet. Computer 53(06), 67–72 (2020).
Cacciapuoti, A. S. et al. The quantum Internet: Networking challenges in distributed quantum computing. IEEE Netw. 34(1), 137–143 (2020).
Gyongyosi, L. & Imre, S. Entanglement accessibility measures for the quantum Internet. Quant. Inf. Proc. 19, 115 (2020).
Gyongyosi, L. & Imre, S. Entanglement Access Control for the Quantum Internet. http://arxiv.org/quant-ph/1905.00256 (2019).
Gyongyosi, L. & Imre, S. Opportunistic Entanglement Distribution for the Quantum Internet. http://arxiv.org/abs/quant-ph/1905.00258 (2019).
Browne, D. E. Efficient classical simulation of the quantum Fourier transform. New J. Phys. 9, 146 (2007).
Rieffel, E. & Polak, W. Quantum Computing: A Gentle Introduction (The MIT Press, 2011).
Fijany, A. & Williams, C. P. Quantum Wavelet Transforms: Fast Algorithms and Complete Circuits. http://arxiv.org/abs/quant-ph/9809004 (1998).
Gruska, J. Quantum Computing (McGraw-Hill, 1999–2005).
Acknowledgements
M.M. thanks the staff of the Knight Foundation School of Computing and Information Sciences at Florida International University for all their help and support.
Author information
Authors and Affiliations
Contributions
M.M. conceived the idea and fully developed the theory, wrote the complete manuscript, prepared figures, and reviewed the manuscript.
Corresponding author
Ethics declarations
Competing interests
The author declares no competing interests.
Additional information
Publisher's note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Mastriani, M. Quantum Fourier transform is the building block for creating entanglement. Sci Rep 11, 22210 (2021). https://doi.org/10.1038/s41598-021-01745-x
Received:
Accepted:
Published:
DOI: https://doi.org/10.1038/s41598-021-01745-x
Comments
By submitting a comment you agree to abide by our Terms and Community Guidelines. If you find something abusive or that does not comply with our terms or guidelines please flag it as inappropriate.



