This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Character randomized benchmarking for non-multiplicity-free groups with applications to subspace, leakage, and matchgate randomized benchmarking

Jahan Claes Quantum Artificial Intelligence Laboratory (QuAIL), NASA Ames Research Center, Moffett Field, CA 94035, USA USRA (RIACS), Mountain View CA 94043, USA Department of Physics and Institute for Condensed Matter Theory, University of Illinois at Urbana-Champaign, Urbana, IL 61801, USA    Eleanor Rieffel Quantum Artificial Intelligence Laboratory (QuAIL), NASA Ames Research Center, Moffett Field, CA 94035, USA    Zhihui Wang zhihui.wang@nasa.gov Quantum Artificial Intelligence Laboratory (QuAIL), NASA Ames Research Center, Moffett Field, CA 94035, USA USRA (RIACS), Mountain View CA 94043, USA
(June 21, 2025)
Abstract

Randomized benchmarking (RB) is a powerful method for determining the error rate of experimental quantum gates. Traditional RB, however, is restricted to gatesets, such as the Clifford group, that form a unitary 2-design. The recently introduced character RB can benchmark more general gates using techniques from representation theory; up to now, however, this method has only been applied to “multiplicity-free” groups, a mathematical restriction on these groups. In this paper, we extend the original character RB derivation to explicitly treat non-multiplicity-free groups, and derive several applications. First, we derive a rigorous version of the recently introduced subspace RB, which seeks to characterize a set of one- and two-qubit gates that are symmetric under SWAP. Second, we develop a new leakage RB protocol that applies to more general groups of gates. Finally, we derive a scalable RB protocol for the matchgate group, a group that like the Clifford group is non-universal but becomes universal with the addition of one additional gate. This example provides one of the few examples of a scalable non-Clifford RB protocol. In all three cases, compared to existing theories, our method requires similar resources, but either provides a more accurate estimate of gate fidelity, or applies to a more general group of gates. In conclusion, we discuss the potential, and challenges, of using non-multiplicity-free character RB to develop new classes of scalable RB protocols and methods of characterizing specific gates.

I Introduction

Advances in accurate and scalable methods for characterizing the performance of quantum gates are critical for the realization of large-scale reliable quantum computers. Quantum process tomography can, in theory, completely characterize an unknown quantum channel [1, 2, 3, 4], but requires resources that scale exponentially in the number of qubits [4]. In addition, any tomographic approach will also include the effect of state preparation and measurement (SPAM) errors, which may be of the same order as the gate error that is being characterized.

Randomized benchmarking (RB) [5, 6, 7, 8] provides a method to scalably characterize gates that form a group GG with the additional mathematical property of being a “unitary 2-design” [9], most frequently the Clifford group [10, 11, 12]. Rather than completely characterizing a noise channel, RB determines the average fidelity, a standard measure of gate quality that can be related to other common measures such as entanglement and process fidelity [13, 14] and used to bound the gate error rate [15]. RB works by experimentally measuring the overall fidelity of a random circuit as a function of the number of applied gates UGU\in G and fitting this to an exponential decay. The parameters of the decay then determine the average fidelity of a single gate. Unlike tomographic methods, RB provides an estimate for the average fidelity that is independent of SPAM errors.

Standard RB, however, is limited to groups that form a unitary 2-design and whose elements can be efficiently compiled (i.e. decomposed) into elementary gates. This limitation prevents standard RB from characterizing any set of quantum gates that are large enough to be universal for quantum computation [11, 12], and also prevents standard RB from characterizing smaller subgroups of 2-designs. There are ongoing efforts to extend RB to a larger class of gates. Interleaved RB was proposed to characterize individual Clifford group elements [16] as well as the TT-gates needed for universal quantum computation [17], but these methods are specific to the gates considered and only produce bounds on the fidelity. Ref. [18] developed a method to extract the fidelity of the dihedral group on one qubit, which is not a unitary 2-design and includes the TT gate, while [19] proposed a method of extending dihedral RB to an arbitrary number of qubits. Refs. [20, 21] extended this work by deriving decay formulas for the fidelity of random circuits of arbitrary groups, but these formulas involved fitting sums of multiple exponentials, and the decay parameters could not be related to the average fidelity. Ref. [22] introduced character RB to address these limitations, providing a method that only requires fitting a single exponential decay and directly predicts the average fidelity. However, this was only explored for “multiplicity-free” groups, a mathematical limitation on the group’s representations (see below).

In this work, we provide a generalization of character RB that applies to groups with multiplicity, which we underpin with rigorous derivations. This rigor enables us to provide conditions under which instantiations of the framework yield practical RB protocols. We illustrate our generalized approach with applications to three distinct situations of practical interest: benchmarking of gates with subspace preserving properties, characterization of leakage, and benchmarking of the matchgate group.

Our main contributions include:

  • We provide a derivation of character RB for non-multiplicity-free groups GG. This RB method allows us to directly predict the average fidelity of the gates in GG as in [22] but unlike [20, 21]. For non-multiplicity-free groups, our method potentially requires fitting a sum of multiple exponentials rather than a single exponential; however, the number of exponentials is significantly reduced compared to [20, 21].

  • As a primary motivation for this generalization, we improve the recently introduced subspace RB [23] designed to characterize gates that preserve a subspace of the full Hilbert space. Our generalization, and its rigorous derivations, has immediate application to near-term quantum processors, including to benchmarking the gates implemented on the ion-trap quantum processor benchmarked in [23]. Gates that preserve a proper subspace can never form a 2-design, and are never multiplicity-free, necessitating a generalized RB procedure. The original work on subspace RB established decay formulas for the fidelity of certain random circuits but could only give loose bounds on the average fidelity of the gates; our method, in contrast, allows us to directly estimate the average fidelity using a similar number of experiments as the original subspace RB. While we illustrate our approach for the UZZU_{ZZ} gate seen in [23], the method can be applied directly to other gates with the same SWAP symmetry as the UZZU_{ZZ} gate. It also provides grounding for benchmarking gates with other subspace-preserving symmetries, though creativity will be required to determine when and how these gates can be combined with single qubit gates to obtain a group with the properties that yield a practical character RB protocol. The rigorous derivations underlying our approach enables us to provide examples of noise under which the estimated fidelity yielded by [23] deviates substantially from the exact fidelity provided by our method.

  • We present a new protocol for leakage RB [24, 25, 26], a benchmarking protocol designed to characterize qubits that can “leak” into a non-computational section of the Hilbert space. Our approach reduces the assumptions on control in the leakage subspace required by the original leakage RB work [26]. Such control is frequently unrealistic for quantum hardware. Our approach can be applied immediately to determine certain leakage channel error rates in, for example, quantum dot architectures, though further research will need to be done to obtain a leakage RB protocol that enables the determination of more general parameters including the average fidelity on the computational subspace.

  • We introduce a new scalable RB procedure for the matchgate group [27], a class of quantum circuits that, like the Clifford group, is efficiently simulable [27, 28, 29, 30] but is very close to universal [30, 31, 32, 29, 33, 34, 35]. This procedure necessarily requires the full non-multiplicity-free character RB, and represents, along with the dihedral group [19, 22], one of the few non-Clifford groups that can be scalably benchmarked.

Non-multiplicity-free character RB is a general framework for benchmarking groups of quantum gates. It provides a method for characterizing individual gates when the gates can be combined into operations that form a group, as we illustrate in the case of subspace RB. This RB framework also expands the family of groups that can be scalably benchmarked, as we demonstrate with the matchgate group. Scalable benchmarking protocols are necessary to measure gate quality in large quantum processors, especially in the presence of non-local errors such as crosstalk. While we provide one new example of a scalable benchmarking protocol, we expect the framework of non-multiplicity-free character RB will lead researchers to develop further scalable examples. Benchmarking multiple overlapping groups (or subgroups of groups) may allow more accurate error characterization. While it remains an art to find the groups and constructions that yield practical character RB protocols, we expect the grounding that our work provides to support the discovery of practical protocols for various gate sets in a variety of quantum devices in the years to come.

Our paper is organized as follows. Section II provides mathematical background on the Liouville representation and the definition of average fidelity. Section III outlines the full non-multiplicity-free RB protocol, and proves that it correctly estimates the average fidelity of the gates. The next sections consist of applications. Section IV demonstrates how our method can be used to rigorously estimate the fidelity of gate sets that preserve subspaces, such as those studied in [23]. Section V applies our framework to formulate a leakage RB protocol with fewer assumptions than the current state-of-the-art [26]. Section VI reviews the matchgate group, and describes how our method can be used to derive a scalable RB protocol for this group. Each of our applications are accompanied by computer simulations of benchmarking experiments; all our computer simulations can be reproduced in under a day on a standard laptop. We conclude in Section VII with discussion of possible extensions of our work, including some of the challenges. We relegate technical details to appendices, including Appendix A which demonstrates that our method is robust to gate-dependent errors, and Appendix B which provides a self-contained and straightforward proof that generalizations of the Clifford group to qudits for dd prime form a unitary 22-design, which may be of independent interest.

II Mathematical Preliminaries

In this paper, we use the Liouville representation of quantum channels. In the Liouville representation, given some fixed basis {|i}\{|i\rangle\} of our Hilbert space \mathcal{H}, a density matrix ρ=ijρij|ij|\rho=\sum_{ij}\rho_{ij}|i\rangle\langle j| is represented by a column vector |ρ=ijρij|i|j|\rho\rangle\rangle=\sum_{ij}\rho_{ij}|i\rangle\otimes|j\rangle, where we use a double-bracket ||\cdot\rangle\rangle to distinguish elements of \mathcal{H}\otimes\mathcal{H} from elements of \mathcal{H}. In the case of a pure state ρ=|ψψ|\rho=|\psi\rangle\langle\psi| we will also sometimes write |ψ|\psi\rangle\rangle in place of |ρ|\rho\rangle\rangle. A quantum channel Λ(ρ)=iAiρAi\Lambda(\rho)=\sum_{i}A_{i}\rho A_{i}^{\dagger} is represented by a matrix Λ^=iAiAi\hat{\Lambda}=\sum_{i}A_{i}\otimes A_{i}^{*}. In this representation, matrix multiplication corresponds to composition

Λ1Λ2^=Λ^1Λ^2,\widehat{\Lambda_{1}\circ\Lambda_{2}}=\hat{\Lambda}_{1}\hat{\Lambda}_{2},

matrix-vector multiplication corresponds to applying a quantum channel

Λ^|ρ=|Λ(ρ),\hat{\Lambda}|\rho\rangle\rangle=|\Lambda(\rho)\rangle\rangle,

and the inner product of two vectors corresponds to the Hilbert-Schmidt inner product of the corresponding density matrices

σ|ρ=Tr(σρ).\langle\langle\sigma|\rho\rangle\rangle=\operatorname{Tr}(\sigma^{\dagger}\rho).

In particular, if MM is a projector into some measurement outcome, the overlap M|ρ\langle\langle M|\rho\rangle\rangle gives the probability of measuring MM from a state ρ\rho. For a more detailed treatment of the Liouville representation, see [36].

Given a unitary group GG acting on our Hilbert space \mathcal{H}, the natural action of UGU\in G on density matrices is given by U(ρ)=UρUU(\rho)=U\rho U^{\dagger}. In the Liouville representation, such an operator is represented by U^=UU\hat{U}=U\otimes U^{*}. The map ϕ:UUU\phi:U\mapsto U\otimes U^{*} forms a representation [37] of the group GG on \mathcal{H}\otimes\mathcal{H} that we will refer to as the natural representation of GG. We can also define the 𝑮\bm{G}-twirl of a quantum channel Λ\Lambda as

Λ^G=1|G|UGU^Λ^U^.\hat{\Lambda}_{G}=\frac{1}{|G|}\sum_{U\in G}\hat{U}^{\dagger}\hat{\Lambda}\hat{U}. (1)

where |G||G| is the order of the group. We can also define the GG-twirl by compact groups by replacing the discrete average by the integral over the Haar measure. As we will see, ΛG\Lambda_{G} has properties similar to the original channel Λ\Lambda, but it has a simpler structure that makes it more tractable to study.

If a noisy implementation of a gate UU results in applying the channel (ΛU)(\Lambda\circ U), we want to characterize how close the noise channel Λ\Lambda is to the identity. We will focus on one common measure of noise, the average fidelity FΛF_{\Lambda}, given by

FΛ:=𝑑ψψ|Λ^|ψ.F_{\Lambda}:=\int d\psi\langle\langle\psi|\hat{\Lambda}|\psi\rangle\rangle. (2)

Here, dψd\psi is the unitary-invariant Haar or Fubini-Study measure on \mathcal{H}. The integrand ψ|Λ^|ψ\langle\langle\psi|\hat{\Lambda}|\psi\rangle\rangle is the probability of preserving a state |ψ|\psi\rangle after the noise operator Λ\Lambda has been applied. The average fidelity is then simply the average of this probability over all possible input states.

III The generalized character randomized benchmarking procedure

Let GG be the unitary group on \mathcal{H} that we wish to benchmark. We will assume GG is either finite or compact, so that every unitary representation decomposes into irredicible representations. Let ϕ:G()\phi:G\rightarrow\mathcal{L}(\mathcal{H}\otimes\mathcal{H}) be the natural representation of GG, which decomposes into irreducible representations as ϕa1ϕ1aIϕI\phi\simeq a_{1}\phi_{1}\oplus\cdots\oplus a_{I}\phi_{I}, where ai+a_{i}\in\mathbb{Z}^{+} is the multiplicity of the irrep ϕi\phi_{i}. Let iaii\mathcal{H}\otimes\mathcal{H}\simeq\bigoplus_{i}\mathbbm{C}^{a_{i}}\otimes\mathcal{H}_{i} be the corresponding decomposition of Hilbert space, such that each ϕi\phi_{i} acts nontrivially only on a single copy of i\mathcal{H}_{i}. We will make the standard RB assumption that the gate error Λ\Lambda associated with UGU\in G is independent of UU, although this can be relaxed [38, 39, 40, 22](see Appendix A).

Let G¯G\overline{G}\subseteq G be a subgroup of our unitary group with natural representation ϕ¯a¯1ϕ¯1a¯I¯ϕ¯I¯\overline{\phi}\simeq\overline{a}_{1}\overline{\phi}_{1}\oplus\cdots\oplus\overline{a}_{\overline{I}}\overline{\phi}_{\overline{I}} and corresponding decomposition ia¯i¯¯i¯\mathcal{H}\otimes\mathcal{H}\simeq\bigoplus_{i}\mathbbm{C}^{\overline{a}_{\overline{i}}}\otimes\overline{\mathcal{H}}_{\overline{i}}. We choose G¯\overline{G} such that for every i{1,,I}i\in\{1,...,I\}, there exists a corresponding i¯{1,,I¯}\overline{i}\in\{1,...,\overline{I}\} such that a¯i¯¯i¯aii\mathbbm{C}^{\overline{a}_{\overline{i}}}\otimes\overline{\mathcal{H}}_{\overline{i}}\subseteq\mathbbm{C}^{a_{i}}\otimes\mathcal{H}_{i}. One may satisfy this condition by choosing G¯=G\overline{G}=G, but we will see below that for this procedure to scale with the number of qubits we must choose G¯G\overline{G}\subsetneq G. We denote the character of the irrep ϕ¯i¯\overline{\phi}_{\overline{i}} by χi¯(U):=Tr[ϕ¯i¯(U)]\chi_{\overline{i}}(U):=\text{Tr}\left[{\overline{\phi}}_{\overline{i}}(U)\right].

Our RB procedure consists of the following steps:

  1. 1.

    For each i{1,,I}i\in\{1,...,I\}, choose an initial state |ρi|\rho_{i}\rangle\rangle and measurement projector |Mi|M_{i}\rangle\rangle such that |Mi|P^i¯|ρi||\langle\langle M_{i}|\hat{P}_{\overline{i}}|\rho_{i}\rangle\rangle| is large as possible (see Section III.3 below), where P^i¯\hat{P}_{\overline{i}} is the projector onto ¯i¯\overline{\mathcal{H}}_{\overline{i}}.

  2. 2.

    For a given NN, choose unitaries U0G¯U_{0}\in\overline{G} and U1,,UNGU_{1},...,U_{N}\in G randomly and uniformly (note elements can be repeated). In the case of a compact group rather than a finite group, choose elements according to the Haar measure. Compute UN+1=U1UNU_{N+1}=U_{1}^{\dagger}\cdots U_{N}^{\dagger}.

  3. 3.

    Prepare the state |ρi|\rho_{i}\rangle\rangle. Apply the gates (U1U0),U2,,UN+1(U_{1}U_{0}),U_{2},...,U_{N+1} sequentially, where (U1U0)({U}_{1}{U}_{0}) is compiled as a single element of GG.

  4. 4.

    Perform a measurement of the observable MiM_{i}.

  5. 5.

    Repeat steps 2-4 many times, to estimate the character-weighted survival probability

    Si(N)=1|G|N+1U0G¯U1,,UNGχi¯(U0)PrU0,,UN+1S_{i}(N)=\frac{1}{|G|^{N+1}}\sum_{\begin{subarray}{c}U_{0}\in\overline{G}\\ U_{1},...,U_{N}\in G\end{subarray}}\chi^{*}_{\overline{i}}(U_{0})\text{Pr}_{U_{0},...,U_{N+1}} (3)

    for each ii, where PrU0,,UN+1\text{Pr}_{U_{0},...,U_{N+1}} is the probability of measuring |Mi|M_{i}\rangle\rangle after applying gates (U1U0),,UN+1(U_{1}U_{0}),...,U_{N+1} to |ρi|\rho_{i}\rangle\rangle, including the effect of gate and SPAM errors.

  6. 6.

    Repeat steps 2-5 for different values of NN.

  7. 7.

    Fit each character-weighted survival probability to a function of the form

    Si(N)=j=1aiCi,jλi,jNS_{i}(N)=\sum_{j=1}^{a_{i}}C_{i,j}\lambda_{i,j}^{N} (4)

    where the Ci,jC_{i,j} and λi,j\lambda_{i,j} are (possibly complex) fitting parameters independent of NN. Note that if χi¯\chi_{\overline{i}} is complex we may have SiS_{i} complex, but if χi¯\chi_{\overline{i}} is real the Ci,jC_{i,j} and λi,j\lambda_{i,j} are restricted to be real or come in complex-conjugate pairs.

  8. 8.

    Estimate the average fidelity of the gate error Λ\Lambda as

    FΛ=i=1I[dim(i)j=1aiλi,j]+dd2+dF_{\Lambda}=\frac{\sum_{i=1}^{I}\left[\text{dim}(\mathcal{H}_{i})\sum_{j=1}^{a_{i}}\lambda_{i,j}\right]+d}{d^{2}+d} (5)

    where d:=2nd:=2^{n} is the dimension of Hilbert space.

A similar RB procedure was first proposed in [22] for groups with all ai=1a_{i}=1, the so-called multiplicity-free groups. In this case, each character-weighted survival probability becomes a single exponential decay. Character RB had been previously proposed for the multiplicity-free dihedral group on one qubit [18], and a related approach has been used to simplify standard RB [41].

We note if we omit the initial gate U0U_{0} and the character-weighting χi¯(U0)\chi_{\overline{i}}^{*}(U_{0}), we get the method of [19, 20, 21]; in this case, we get a single survival probability S(N)S(N) that is given by S(N)=i,jCi,jλi,jNS(N)=\sum_{i,j}C_{i,j}\lambda_{i,j}^{N}. Determining the λi,j\lambda_{i,j} then requires fitting all the parameters Ci,jC_{i,j} and λi,j\lambda_{i,j} simultaneously, and quickly becomes infeasible for a modestly large number of parameters. We see that while both our method and the method of [19, 20, 21] involve simultaneously fitting multiple exponential decays, our method significantly reduces the number of parameters in each fit. For example, if ϕ2ϕ1ϕ2ϕ3\phi\simeq 2\phi_{1}\oplus\phi_{2}\oplus\phi_{3}, our method requires fitting three functions, corresponding to ϕ1\phi_{1}, ϕ2\phi_{2}, and ϕ3\phi_{3}, where the first function is a sum of two exponential decays and the latter two functions are single exponential decays. In contrast, [19, 20, 21] require fitting a single exponential function that is the sum of four exponential decays, one for each copy of each irrep. In addition, the method of [19, 20, 21] cannot determine FΛF_{\Lambda}, because it is not possible to match the observed parameters {λi,j}\{\lambda_{i,j}\} to their corresponding i\mathcal{H}_{i} in order to use Eq. 5.

The remainder of this section is devoted to deriving this procedure, for groups that are not necessarily multiplicity-free. Much of this is a straightforward extension of the derivation of [22], although the generalization to gate-dependent noise (Appendix A) is much less straightforward.

III.1 Deriving the decays

To derive the form of the character-weighted survival, Eq. 4, we will need two facts from representation theory.

Fact 1 (Schur’s Lemma).

Let ϕ:G(V)\phi:G\rightarrow\mathcal{L}(V) be a representation of a group GG on a vector space VV, which decomposes into irreducible representations as ϕa1ϕ1aIϕI\phi\simeq a_{1}\phi_{1}\oplus\cdots\oplus a_{I}\phi_{I}, where ai+a_{i}\in\mathbb{Z}^{+} are positive integers. The corresponding decomposition of VV is ViaiViV\simeq\bigoplus_{i}\mathbbm{C}^{a_{i}}\otimes V_{i}. In terms of this decomposition, any linear map η^(V)\hat{\eta}\in\mathcal{L}(V) satisfying η^ϕ(U)=ϕ(U)η^\hat{\eta}\phi(U)=\phi(U)\hat{\eta} for all UGU\in G is of the form

η^iQ^i𝟙^i\hat{\eta}\simeq\bigoplus_{i}\hat{Q}_{i}\otimes\hat{\mathbbm{1}}_{i} (6)

where Q^i\hat{Q}_{i} is some ai×aia_{i}\times a_{i} matrix for each ii.

Fact 2 (Projection formula).

Let ϕ\phi and VV be as above. Given an irrep ϕi:G(Vi)\phi_{i}:G\rightarrow\mathcal{L}(V_{i}), define the character χi:G\chi_{i}:G\rightarrow\mathbbm{C} of ϕi\phi_{i} as χi(U):=Tr(ϕi(U))\chi_{i}(U):=\operatorname{Tr}\left(\phi_{i}(U)\right). Then we can write the projector onto aiVi\mathbbm{C}^{a_{i}}\otimes V_{i} as

P^i=dim(Vi)|G|UGχi(U)ϕ(U).\hat{P}_{i}=\frac{\text{dim}(V_{i})}{|G|}\sum_{U\in G}\chi_{i}(U)^{*}\phi(U). (7)

For proofs of both facts, see [37].

Given these results, we can prove the key property of GG-twirls that allows us to compute the average fidelity.

Theorem 1 (Form of GG-twirls).

If GG is any unitary group acting on \mathcal{H}, let ϕa1ϕ1aIϕI\phi\simeq a_{1}\phi_{1}\oplus\cdots\oplus a_{I}\phi_{I} be the decomposition of the natural representation into irreps, and let iaii\mathcal{H}\otimes\mathcal{H}\simeq\bigoplus_{i}\mathbbm{C}^{a_{i}}\otimes\mathcal{H}_{i} be the corresponding decomposition of \mathcal{H}\otimes\mathcal{H}. If Λ\Lambda is any quantum channel, the GG-twirl of Λ\Lambda is of the form

Λ^GiQ^i𝟙^i,\hat{\Lambda}_{G}\simeq\bigoplus_{i}\hat{Q}_{i}\otimes\hat{\mathbbm{1}}_{i}\;, (8)

where QiQ_{i} is defined as in Fact. 6.

Proof.

We apply Eq. 1 to observe that

Λ^GU^\displaystyle\hat{\Lambda}_{G}\hat{U} =1|G|UGU^Λ^U^U^\displaystyle=\frac{1}{|G|}\sum_{U^{\prime}\in G}\hat{U}^{\prime\dagger}\hat{\Lambda}\hat{U}^{\prime}\hat{U}
=1|G|UGU^U^U^Λ^U^U^\displaystyle=\frac{1}{|G|}\sum_{U^{\prime}\in G}\hat{U}\hat{U}^{\dagger}\hat{U}^{\prime\dagger}\hat{\Lambda}\hat{U^{\prime}}\hat{U}
=U^1|G|(UU)G(U^U^)Λ^(U^U^)=U^Λ^G\displaystyle=\hat{U}\frac{1}{|G|}\sum_{(U^{\prime}U)\in G}(\hat{U}^{\prime}\hat{U})^{\dagger}\hat{\Lambda}(\hat{U}^{\prime}\hat{U})=\hat{U}\hat{\Lambda}_{G}

for any UGU\in G. We can then apply Fact 6. ∎

We are now ready to derive the formula for the character-weighted survival probability Si(N)S_{i}(N). This proof follows the logic of [22], adapted for non-multiplicity-free groups. Our notation assumes finite groups; for compact groups, one simply replaces the discrete average over the group with an integral over the Haar measure. Writing out Eq. 3 explicitly, including the effect of preparation and measurement errors ΛP\Lambda_{P} and ΛM\Lambda_{M}, we have

Si(N)\displaystyle{S}_{i}(N) =1|G|N|G¯|U0,,UNχi¯(U0)P^iMi|Λ^MΛ^U^N+1Λ^U^NΛ^U^2Λ^U^1U^0P^i¯Λ^P|ρi.\displaystyle=\frac{1}{|G|^{N}|\overline{G}|}\sum_{U_{0},...,U_{N}}\underbracket{\chi_{\overline{i}}^{*}(U_{0})}_{\hat{P}_{i}}\langle\langle M_{i}|\hat{\Lambda}_{M}\hat{\Lambda}\hat{U}_{N+1}\hat{\Lambda}\hat{U}_{N}\cdots\hat{\Lambda}\hat{U}_{2}\hat{\Lambda}\hat{U}_{1}\underbracket{\hat{U}_{0}}_{\hat{P}_{\overline{i}}}\hat{\Lambda}_{P}|\rho_{i}\rangle\rangle.

The sum over U0U_{0} gives the projection |G¯|P^i¯/dim(¯i¯)|\overline{G}|\hat{P}_{\overline{i}}/\text{dim}(\overline{\mathcal{H}}_{\overline{i}}) according to Eq. 7. To do the sum over U1,,UNU_{1},...,U_{N}, we can define new group elements D1,,DND_{1},...,D_{N} by Di=UiU1D_{i}=U_{i}\cdots U_{1}. In terms of the DiD_{i}, we then have Ui=DiDi1U_{i}=D_{i}D_{i-1}^{\dagger}, with the convention that DN+1=𝟙D_{N+1}=\mathbbm{1}. Note that summing over U1,,UNU_{1},...,U_{N} is the same as summing over D1,,DND_{1},...,D_{N}. We therefore may write

Si(N)\displaystyle{S}_{i}(N) =1dim(¯i¯)|G|ND1,,DNGMi|Λ^MΛ^D^NΛ^D^NΛ^GD^2Λ^D^2Λ^GD^1Λ^D^1Λ^GP^i¯Λ^P|ρi.\displaystyle=\frac{1}{\text{dim}(\overline{\mathcal{H}}_{\overline{i}})|G|^{N}}\sum_{D_{1},...,D_{N}\in G}\langle\langle M_{i}|\hat{\Lambda}_{M}\hat{\Lambda}\underbrace{\hat{D}_{N}^{\dagger}\hat{\Lambda}\hat{D}_{N}}_{\hat{\Lambda}_{G}}\cdots\underbrace{\hat{D}_{2}^{\dagger}\hat{\Lambda}\hat{D}_{2}}_{\hat{\Lambda}_{G}}\underbrace{\hat{D}_{1}^{\dagger}\hat{\Lambda}\hat{D}_{1}}_{\hat{\Lambda}_{G}}\hat{P}_{\overline{i}}\hat{\Lambda}_{P}|\rho_{i}\rangle\rangle.

We can now easily perform the sum over the DiD_{i}, since each sum just gives a GG-twirl according to Eq. 1. Performing this sum, and using Thm. 8, gives

Si(N)\displaystyle S_{i}(N) =1dim(¯i¯)Mi|Λ^MΛ^(Λ^G)NP^i¯Λ^P|ρi\displaystyle=\frac{1}{\text{dim}(\mathcal{\overline{H}}_{\overline{i}})}\langle\langle M_{i}|\hat{\Lambda}_{M}\hat{\Lambda}\left(\hat{\Lambda}_{G}\right)^{N}\hat{P}_{\overline{i}}\hat{\Lambda}_{P}|\rho_{i}\rangle\rangle
=1dim(¯i¯)Mi|Λ^MΛ^(iQ^i𝟙i)NP^i¯Λ^P|ρi\displaystyle=\frac{1}{\text{dim}(\mathcal{\overline{H}}_{\overline{i}})}\langle\langle M_{i}|\hat{\Lambda}_{M}\hat{\Lambda}\left(\bigoplus_{i^{\prime}}\hat{Q}_{i^{\prime}}\otimes\mathbbm{1}_{i^{\prime}}\right)^{N}\hat{P}_{\overline{i}}\hat{\Lambda}_{P}|\rho_{i}\rangle\rangle
=1dim(¯i¯)Mi|Λ^MΛ^(Q^iN𝟙i)P^i¯Λ^P|ρi\displaystyle=\frac{1}{\text{dim}(\mathcal{\overline{H}}_{\overline{i}})}\langle\langle M_{i}|\hat{\Lambda}_{M}\hat{\Lambda}\left(\hat{Q}_{i}^{N}\otimes\mathbbm{1}_{i}\right)\hat{P}_{\overline{i}}\hat{\Lambda}_{P}|\rho_{i}\rangle\rangle

where in the last line, we used the fact that the range of P^i¯\hat{P}_{\overline{i}} is included in aii\mathbbm{C}^{a_{i}}\otimes\mathcal{H}_{i}. We see that the effect of the character-weighting is to produce a projector that restricts our attention to a single ii. If we diagonalize Q^i\hat{Q}_{i} as Qi^=j=1ai|ei,jλi,je¯i,j|\hat{Q_{i}}=\sum_{j=1}^{a_{i}}|e_{i,j}\rangle\rangle\lambda_{i,j}\langle\langle\overline{e}_{i,j}| with e¯i,j|ei,j=δj,j\langle\langle\overline{e}_{i,j}|{e}_{i,j^{\prime}}\rangle\rangle=\delta_{j,j^{\prime}}, then Q^iN=j=1ai|ei,jλi,jNe¯i,j|\hat{Q}_{i}^{N}=\sum_{j=1}^{a_{i}}|e_{i,j}\rangle\rangle\lambda_{i,j}^{N}\langle\langle\overline{e}_{i,j}|, and we may write the final form of Si(N)S_{i}(N) as

Si(N)=j=1aiMi|Λ^MΛ^(|ei,je¯i,j|𝟙i)P^i¯Λ^P|ρidim(¯i¯)λi,jNS_{i}(N)=\sum_{j=1}^{a_{i}}\frac{\langle\langle M_{i}|\hat{\Lambda}_{M}\hat{\Lambda}\Big{(}|e_{i,j}\rangle\rangle\langle\langle\overline{e}_{i,j}|\otimes\mathbbm{1}_{i}\Big{)}\hat{P}_{\overline{i}}\hat{\Lambda}_{P}|\rho_{i}\rangle\rangle}{\text{dim}(\overline{\mathcal{H}}_{\overline{i}})}\lambda_{i,j}^{N}

which is precisely the form given in Eq. 4. Notice that the λi,j\lambda_{i,j} depend only on the gate error Λ\Lambda, and not the SPAM errors ΛP,ΛM\Lambda_{P},\Lambda_{M} which are absorbed into the constant prefactor.

III.2 Computing the fidelity

Finally, we prove the fidelity can be estimated according to Eq. 5. This was first derived in [21], although we will adopt a simpler proof here using techniques introduced in [13, 14]. The key realization is that both the fidelity and the trace of a channel are invariant under twirling by an arbitrary group: FΛ=FΛGF_{\Lambda}=F_{\Lambda_{G}} and Tr(Λ^)=Tr(Λ^G)\operatorname{Tr}(\hat{\Lambda})=\operatorname{Tr}(\hat{\Lambda}_{G}) (see Eq. 1). In particular, if we choose GG to be the full unitary group it is known that the full twirl of a channel is simply a depolarizing channel [14, 13]111In our notation, this can be seen by noting that the natural representation of the full unitary group decomposes into two irreps which act on |𝟙|\mathbbm{1}\rangle\rangle and the orthogonal complement of |𝟙|\mathbbm{1}\rangle\rangle, respectively, and then applying Fact 6.:

Λ^G:=dUU^Λ^U^=p𝟙+(1p)1d|𝟙𝟙|.\hat{\Lambda}_{G}:=\int dU\ \hat{U}^{\dagger}\hat{\Lambda}\hat{U}=p\mathbbm{1}+(1-p)\frac{1}{d}|\mathbbm{1}\rangle\rangle\langle\langle\mathbbm{1}|. (9)

In terms of the parameter pp, we can directly compute FΛG=p+1pdF_{\Lambda_{G}}=p+\frac{1-p}{d}. Similarly, we can also directly compute Tr(Λ^G)=pd2+(1p)\operatorname{Tr}(\hat{\Lambda}_{G})=pd^{2}+(1-p). Combining these equations gives

FΛ=Tr(Λ^)+dd2+d.F_{\Lambda}=\frac{\operatorname{Tr}(\hat{\Lambda})+d}{d^{2}+d}. (10)

To complete the proof, we note that Tr(Λ^)\operatorname{Tr}(\hat{\Lambda}) can be written in terms of the matrices Q^i\hat{Q}_{i} in Eq. 8 as

Tr(Λ^)=i=1I[dim(i)Tr(Q^i)]=i=1I[dim(i)j=1aiλi,j]\operatorname{Tr}(\hat{\Lambda})=\sum_{i=1}^{I}\left[\text{dim}(\mathcal{H}_{i})\operatorname{Tr}(\hat{Q}_{i})\right]=\sum_{i=1}^{I}\left[\text{dim}(\mathcal{H}_{i})\sum_{j=1}^{a_{i}}\lambda_{i,j}\right]

which, combined with Eq. 10, gives Eq. 5 as desired.

III.3 Scaling and Feasibility

We note that experimentally determining Si(N)S_{i}(N) requires Monte Carlo sampling of U0,U1,,UNU_{0},U_{1},...,U_{N}. Each term in this sample is bounded by maxU0G¯(|χi¯(U0)|)=dim(i¯)\max_{U_{0}\in\overline{G}}(|\chi_{\overline{i}}(U_{0})|)=\text{dim}({\mathcal{H}}_{\overline{i}}). Therefore, the standard deviation of the samples is bounded by dim(i¯)\text{dim}({\mathcal{H}}_{\overline{i}}), and the sample mean has uncertainty bounded by dim(i¯)/no. samples\text{dim}({\mathcal{H}}_{\overline{i}})/\sqrt{\text{no. samples}}. To determine the relative uncertainty, we consider Si(N)j=1aiCi,jS_{i}(N)\approx\sum_{j=1}^{a_{i}}C_{i,j} which is given by

j=1aiCi,j\displaystyle\sum_{j=1}^{a_{i}}C_{i,j} =j=1aiMi|Λ^MΛ^(|ei,je¯i,j|𝟙i)P^i¯Λ^P|ρidim(¯i¯)\displaystyle=\sum_{j=1}^{a_{i}}\frac{\langle\langle M_{i}|\hat{\Lambda}_{M}\hat{\Lambda}\Big{(}|e_{i,j}\rangle\rangle\langle\langle\overline{e}_{i,j}|\otimes\mathbbm{1}_{i}\Big{)}\hat{P}_{\overline{i}}\hat{\Lambda}_{P}|\rho_{i}\rangle\rangle}{\text{dim}(\mathcal{\overline{H}}_{\overline{i}})}
Mi|P^i¯|ρidim(¯i¯)\displaystyle\approx\frac{\langle\langle M_{i}|\hat{P}_{\overline{i}}|\rho_{i}\rangle\rangle}{\text{dim}(\mathcal{\overline{H}}_{\overline{i}})}

where we’ve approximated Λ,ΛM,ΛP𝟙\Lambda,\Lambda_{M},\Lambda_{P}\approx\mathbbm{1}. The relative uncertainty in Si(N)S_{i}(N) is therefore bounded by

σi|Si(N)|dim(¯i¯)2|Mi|P^i¯|ρi|no. samples\frac{\sigma_{i}}{|S_{i}(N)|}\lesssim\frac{\text{dim}(\overline{\mathcal{H}}_{\overline{i}})^{2}}{|\langle\langle M_{i}|\hat{P}_{\overline{i}}|\rho_{i}\rangle\rangle|\sqrt{\text{no. samples}}}

We see that to efficiently benchmarking a group GG, we must have II, aia_{i}, and dim(¯i¯)\dim(\overline{\mathcal{H}}_{\overline{i}}) all small. II must be small so that we only need to estimate a small number of character-weighted survival probabilities Si(N)S_{i}(N), aia_{i} must be small so that we may fit a function with a small number of parameters, and dim(¯i¯)\dim(\overline{\mathcal{H}}_{\overline{i}}) must be small for our Monte Carlo estimation of Si(N)S_{i}(N) to converge quickly. Note that for any GG the natural representation satisfies i=1Iaidim(i)=4n\sum_{i=1}^{I}a_{i}\dim(\mathcal{H}_{i})=4^{n} where nn is the number of qubits, so that choosing G¯=G\overline{G}=G will not suffice if the number of qubits is large. In particular, to scalably benchmark a group, we must choose GG so that the number of irreps II grows slowly with nn, the multiplicity aia_{i} of each irrep is bounded by a small constant, and G¯\overline{G} has corresponding irreps ¯i¯\overline{\mathcal{H}}_{\overline{i}} whose dimension grows slowly with nn. These scaling considerations are similar to those discussed in [22] for multiplicity-free RB, except in our case we allow aia_{i} to be bounded rather than strictly 11.

Note that the optimal |ρi|\rho_{i}\rangle\rangle with largest |Mi|P^i¯|ρi||\langle\langle M_{i}|\hat{P}_{\overline{i}}|\rho_{i}\rangle\rangle| is necessarily a pure state, since any mixed state |ρi=γpγ|ψγ|\rho_{i}\rangle\rangle=\sum_{\gamma}p_{\gamma}|\psi_{\gamma}\rangle\rangle has

|Mi|P^i¯|ρi|γpγ|Mi|P^i¯|ψγ|maxγ|Mi|P^i¯|ψγ|.|\langle\langle M_{i}|\hat{P}_{\overline{i}}|\rho_{i}\rangle\rangle|\leq\sum_{\gamma}p_{\gamma}|\langle\langle M_{i}|\hat{P}_{\overline{i}}|\psi_{\gamma}\rangle\rangle|\leq\max_{\gamma}|\langle\langle M_{i}|\hat{P}_{\overline{i}}|\psi_{\gamma}\rangle\rangle|.

Ref. [22] considered the case of mixed initial states, and included a protocol for sampling from a mixed state |ρi=γpγ|ψγ|\rho_{i}\rangle\rangle=\sum_{\gamma}p_{\gamma}|\psi_{\gamma}\rangle\rangle provided one can efficiently prepare the states {|ψγ}\{|\psi_{\gamma}\rangle\rangle\}. However, we see that it suffices to take the initial state to be one of the efficiently preparable |ψγ|\psi_{\gamma}\rangle\rangle, which simplifies initial state preparation.

Our scaling estimates are based on the typical case; however, there are a few worst-case failure modes. First, the noise may have some symmetry that restricts e¯i,j|P^i¯0\langle\langle\overline{e}_{i,j}|\hat{P}_{\bar{i}}\approx 0 for some (i,j)(i,j). In this case, the corresponding λi,j\lambda_{i,j} will not be accurately estimated by the fitting function. To remedy this, one may choose a set of projectors {P^i¯,1,,P^i¯,k}\left\{\hat{P}_{\overline{i},1},...,\hat{P}_{\overline{i},k}\right\} such that each e¯i,j|\langle\langle\overline{e}_{i,j}| has overlap with at least one P^i¯,α\hat{P}_{\overline{i},\alpha}. This requires at most aia_{i} projectors. We can then define

P^i¯=αP^i¯,αχi¯=αχi¯,α.\hat{P}_{\overline{i}}=\sum_{\alpha}\hat{P}_{\overline{i},\alpha}\quad\chi_{\overline{i}}=\sum_{\alpha}\chi_{\overline{i},\alpha}.

The modified character-weighted survival probability will require taking additional data to achieve the same relative uncertainty, since the corresponding dim(¯i¯)=αdim(¯i¯,α)\dim(\overline{\mathcal{H}}_{\overline{i}})=\sum_{\alpha}\dim(\overline{\mathcal{H}}_{\overline{i},\alpha}) will be larger, but is otherwise identical.

The fitting procedure may also have difficulty fitting multiple exponential decays [43, 44], especially if the decay rates are similar [44]. In the case of similar decays, the fit might have numerous local minima; worse, the fitting function might simply set the coefficient of one of the decays to zero and the corresponding decay rate to some arbitrary value, and fit the curve using fewer exponential decays. This can be detected during the fitting procedure, and corrected by either taking more data to more closely constrain the fit or by simply fitting fewer exponential decays. For a detailed discussion of methods used to fit multiexponential decays and their failure modes, we refer to [45, 46, 47].

IV Application: Subspace randomized benchmarking

As an application of the general character RB method, we can improve on the recently introduced subspace randomized benchmarking method [23]. Subspace RB characterizes the error associated with a group of gates GG that preserve a subspace of the Hilbert space. In [23], a benchmarking procedure is introduced that yields two decay parameters that are functions of the noise channel, but the procedure does not give an estimate for the average fidelity or other quantities with simple physical interpretations. The multiplicity-free character RB of [22] is not directly applicable to this situation, as we will see that any group that preserves subspaces necessarily decomposes into irreps with multiplicity. However, using our method we can easily characterize the average fidelity of such gates.

To simplify our discussion, we will focus on the particular case discussed in [23]. The system considered in [23] can implement arbitrary symmetric single qubit gates U1:=UUU_{1}:=U\otimes U as well as the two-qubit entangling gate UZZ:=exp{iπ4ZZ}U_{ZZ}:=\exp\{-i\frac{\pi}{4}Z\otimes Z\}. The symmetric single qubit gates have negligible error compared to the entangling gate, so the goal of the experiment is to characterize the fidelity of UZZU_{ZZ}. This is accomplished by combining the elementary gates into elements of a benchmarking group GG, using a fixed number of the relevant gate UZZU_{ZZ}, and then designing an RB procedure to benchmark elements of GG. It is straightforward to see that any UGU\in G made up of products of U1U_{1} and UZZU_{ZZ} operators preserves the triplet and singlet subspaces

T\displaystyle\mathcal{H}_{T} :=span{|00,|01+|102,|11}\displaystyle:=\text{span}\left\{|00\rangle,\frac{|01\rangle+|10\rangle}{\sqrt{2}},|11\rangle\right\}
S\displaystyle\mathcal{H}_{S} :=span{|01|102}.\displaystyle:=\text{span}\left\{\frac{|01\rangle-|10\rangle}{\sqrt{2}}\right\}.

This implies that every gate UGU\in G decomposes as U=UTUSU=U_{T}\oplus U_{S}, with UTU_{T} and USU_{S} acting on the triplet and singlet spaces, respectively.

Our method differs from the original in several ways. Most notably, we combine the elementary gates into elements UGU\in G such that GG forms a group. This requires a moderate increase in complexity of the combined gates; [23] combined their gates into unitaries involving three UZZU_{ZZ} gates, while our construction requires four. However, in return for this increased complexity, our method offers several advantages. Rather than estimate decay parameters with no clear physical interpretation, our method produces direct estimates of the average fidelity. In addition, the derivation of the form of the exponential decays in [23] required assumptions on the relative phases of UTU_{T} and USU_{S} that could not actually be realized on their experimental platform. In contrast, our method yields rigorous decays thanks to the underlying group structure of GG.

The original subspace RB can be extended to sets of gates GG that preserve some arbitrary splitting of \mathcal{H} into subspaces =12\mathcal{H}=\mathcal{H}_{1}\oplus\mathcal{H}_{2} provided the set GG can be written as

G={U1,b1σU2,b2:σ=±,(b1,b2)B1×B2}G=\{U_{1,b_{1}}\oplus\sigma U_{2,b_{2}}:\sigma=\pm,\ (b_{1},b_{2})\in B_{1}\times B_{2}\}

where G1:={U1,b1:b1B1}G_{1}:=\{U_{1,b_{1}}:b_{1}\in B_{1}\} and G2:={U2,b2:b2B2}G_{2}:=\{U_{2,b_{2}}:b_{2}\in B_{2}\} are groups and unitary 2-designs 222Ref. [23] claimed it was sufficient to require G2G_{2} to be a unitary 11-design, but this appears to be an error. A similar error was made in [26], from which much of [23] is derived. (see below for the definition of a 22-design) acting on 1\mathcal{H}_{1} and 2\mathcal{H}_{2} respectively (here, B1B_{1} and B2B_{2} are just index sets for the groups G1G_{1} and G2G_{2}). However, it is difficult to construct such a GG in a way that is experimentally relevant; indeed, [23] could not do this for the simple case of two qubits, and we avoid attempting such a construction here. A more useful approach, which mirrors our approach below, is to construct an arbitrary group out of the elementary gates and perform character RB on whatever irreps result. This method can likely be used to benchmark other two-qubit gates that are symmetric under SWAP besides UZZU_{ZZ}, and may also prove useful for gates that preserve other subspaces.

IV.1 Constructing the benchmarking group

Ref. [23] constructed their benchmarking set GG using a generalization of the Clifford group [11, 11, 12] to a dd-level system [49]. We will follow a similar procedure, modified to ensure GG forms a group. For a dd-level system, analogues of the XX and ZZ qubit operators are defined as [50]:

X|z=|z+1Z|z=ωz|zX|z\rangle=|z+1\rangle\qquad Z|z\rangle=\omega^{z}|z\rangle

where ω:=e2πid\omega:=e^{\frac{2\pi i}{d}} and addition is performed modulo dd. These generalized XX and ZZ operators are unitary but not Hermitian, and the set {XaZb:a,bd}\{X^{a}Z^{b}:a,b\in\mathbbm{Z}_{d}\} forms a (complex) orthogonal basis for the set of all d×dd\times d matrices. Note that for d=2d=2 we recover the usual Pauli matrices.

Specializing to d=3d=3, define the generalized Pauli group as 𝒫:={ωηXaZb:η,a,bd}\mathcal{P}:=\{\omega^{\eta}X^{a}Z^{b}:\eta,a,b\in\mathbbm{Z}_{d}\}. The fact that 𝒫\mathcal{P} is a group follows from the commutation relation ZX=ωXZZX=\omega XZ. The generalized Clifford group is defined to be the set of all unitaries that stabilize 𝒫\mathcal{P} [49]:

GT={U:U𝒫U=𝒫}.G_{T}=\{U:U\mathcal{P}U^{\dagger}=\mathcal{P}\}.

An element UGTU\in G_{T} is defined (up to a global phase) by its action on XX and ZZ. Defining UXU=ωηxXaxZbxUXU^{\dagger}=\omega^{\eta_{x}}X^{a_{x}}Z^{b_{x}} and UZU=ωηzXazZbzUZU^{\dagger}=\omega^{\eta_{z}}X^{a_{z}}Z^{b_{z}}, and noting

ZX\displaystyle ZX =ωXZ\displaystyle=\omega XZ
UZUUXU\displaystyle UZU^{\dagger}UXU^{\dagger} =ωUXUUZU\displaystyle=\omega UXU^{\dagger}UZU^{\dagger}
ωηx+ηzXazZbzXaxZbx\displaystyle\omega^{\eta_{x}+\eta_{z}}X^{a_{z}}Z^{b_{z}}X^{a_{x}}Z^{b_{x}} =ω1+ηx+ηzXaxZbxXazZbz\displaystyle=\omega^{1+\eta_{x}+\eta_{z}}X^{a_{x}}Z^{b_{x}}X^{a_{z}}Z^{b_{z}}
ωaxbzXax+azZbx+bz\displaystyle\omega^{a_{x}b_{z}}X^{a_{x}+a_{z}}Z^{b_{x}+b_{z}} =ω1+azbxXax+azZbx+bz\displaystyle=\omega^{1+a_{z}b_{x}}X^{a_{x}+a_{z}}Z^{b_{x}+b_{z}}

we see that we must have axbzazbx=31a_{x}b_{z}-a_{z}b_{x}=_{3}1, where =3=_{3} denotes equality mod 33. This is the only restriction on ηx,ηz,ax,az,bx,bz\eta_{x},\eta_{z},a_{x},a_{z},b_{x},b_{z} [49], leading to a total of 216 elements of GTG_{T}. We can find the action of UGTU\in G_{T} on a general element XaZbX^{a}Z^{b} by

UXaZbU=(UXU)a(UZU)b=ωPXaax+bazZabx+bbz\displaystyle\begin{split}UX^{a}Z^{b}U^{\dagger}=&\ (UXU^{\dagger})^{a}(UZU^{\dagger})^{b}\\ =&\ \omega^{P}X^{aa_{x}+ba_{z}}Z^{ab_{x}+bb_{z}}\end{split}

where

P:=ηxa+ηzb+2(a2a)axbx+2(b2b)azbz+abbxaz.P:=\eta_{x}a+\eta_{z}b+2(a^{2}-a)a_{x}b_{x}+2(b^{2}-b)a_{z}b_{z}+abb_{x}a_{z}.

The action of UU on a general density matrix then follows by linearity.

Our benchmarking group GG is constructed by combining the elementary symmetric gates to act as GTG_{T} on the triplet subspace, where the three levels |0,|1,|2|0\rangle,|1\rangle,|2\rangle correspond to the triplet basis |00,|01+|102,|11|00\rangle,\frac{|01\rangle+|10\rangle}{\sqrt{2}},|11\rangle. The most general composite gate is formed by alternatively applying U1U_{1} and UZZU_{ZZ} gates to our qubits. A straightforward calculation shows that if such a circuit applies an operator UTU_{T} to the triplet subspace, its action on the singlet subspace is necessarily given by (1)nzωηdet(UT)1/3(-1)^{n_{z}}\omega^{\eta}\det(U_{T})^{1/3}, where nzn_{z} is the number of entangling UZZU_{ZZ} gates. By varying the single-qubit unitaries U1U_{1}, we find computationally that all elements of GTG_{T} and all relative phases ωη\omega^{\eta} can be generated by circuits of exactly four UZZU_{ZZ} gates, as shown in Fig. 1 333Ref. [23] required a shorter circuit of only three entangling gates. However, this circuit cannot implement all relative phases between the subspaces and thus does not result in a group.. In total, then, the benchmarking group is given by

G:={UTωηdet(UT)1/3:UTGT,η=0,1,2}G:=\{U_{T}\oplus\omega^{\eta}\det(U_{T})^{1/3}:U_{T}\in G_{T},\eta=0,1,2\}

where the first summand acts on the triplet subspace and the second acts on the singlet subspace. Note that every group element contains exactly four entangling gates, so the average fidelity of GG gives a useful measure of the fidelity of the entangling gate.

Refer to caption
Figure 1: The elements of the benchmarking group GG are constructed by composing elementary gates as shown above to implement elements of GTG_{T} on the triplet subspace. Each group element contains exactly four entangling gates.
Subrep Projector χi(UTUS)\chi_{i}(U_{T}\oplus U_{S})
T0\mathcal{H}_{T0} P^T0=13|𝟙T𝟙T|\hat{P}_{T0}=\frac{1}{3}|\mathbbm{1}_{T}\rangle\rangle\langle\langle\mathbbm{1}_{T}| 11
S0\mathcal{H}_{S0} P^S0=|𝟙S𝟙S|\hat{P}_{S0}=|\mathbbm{1}_{S}\rangle\rangle\langle\langle\mathbbm{1}_{S}|
T\mathcal{H}_{T\perp} P^T=𝟙TP^T0\hat{P}_{T\perp}=\mathbbm{1}_{T}-\hat{P}_{T0} |Tr(UT)|21|\operatorname{Tr}(U_{T})|^{2}-1
TS\mathcal{H}_{TS} P^TS=Projector onto TS\hat{P}_{TS}=\text{Projector onto }\mathcal{H}_{T}\otimes\mathcal{H}_{S} Tr(UT)Tr(US)\operatorname{Tr}(U_{T})\operatorname{Tr}(U_{S})^{*}
ST\mathcal{H}_{ST} P^ST=Projector onto ST\hat{P}_{ST}=\text{Projector onto }\mathcal{H}_{S}\otimes\mathcal{H}_{T} Tr(UT)Tr(US)\operatorname{Tr}(U_{T})^{*}\operatorname{Tr}(U_{S})
Table 1: Subrepresentations of the standard representation for groups that preserve the triplet and singlet subspaces, and their corresponding projectors and characters.

IV.2 Irreps of the benchmarking group

For GG given above, the natural representation decomposes into the irreps T0\mathcal{H}_{T0}, S0\mathcal{H}_{S0}, T\mathcal{H}_{T\perp}, TS\mathcal{H}_{TS}, and ST\mathcal{H}_{ST}, which are described in Table 1. These are all clearly subrepresentations of the natural representation; for proof that they are in fact irreducible, we will use the concept of a unitary 𝐭\mathbf{t}-design [9].

Let SS be a set of unitaries acting on a space \mathcal{H}. A balanced polynomial of degree tt is a polynomial in the matrix elements of UU and UU^{*} where each term in the polynomial has degree d<td<t in the elements of UU and degree dd in the elements of UU^{*}. SS is a unitary tt-design if for balanced polynomial p(U,U)p(U,U^{*}) of degree tt, averaging p(U,U)p(U,U^{*}) over SS is the same as averaging over all unitaries on \mathcal{H} (weighted by the Haar measure)

1|S|USp(U,U)=𝑑Up(U,U).\frac{1}{|S|}\sum_{U\in S}p(U,U^{*})=\int dU\ p(U,U^{*}).

A classic example is the Clifford group, which forms a unitary 33-design [9, 52, 53].

The group GTG_{T} forms a unitary 2-design [54] (see Appendix B for a proof). This allows us to prove the representations in Table 1 are irreducible, using the following fact:

Fact 3 (Schur normalization).

Let χ\chi be the character of a representation. The representation is irreducible iff

1|G|UG|χ(U)|2=1.\frac{1}{|G|}\sum_{U\in G}|\chi(U)|^{2}=1.

For a proof, see [37].

The representations T0\mathcal{H}_{T0} and S0\mathcal{H}_{S0} are 1D, thus irreducible. For the representation T\mathcal{H}_{T\perp}, we have

1|G|UG|χT(U)|2\displaystyle\frac{1}{|G|}\sum_{U\in G}|\chi_{T\perp}(U)|^{2} =13|GT|UTGTη=0,1,2|χT(UT)|2\displaystyle=\frac{1}{3|G_{T}|}\sum_{\begin{subarray}{c}U_{T}\in G_{T}\\ \eta=0,1,2\end{subarray}}|\chi_{T\perp}(U_{T})|^{2}
=1|GT|GT(|Tr(UT)|21)2\displaystyle=\frac{1}{|G_{T}|}\sum_{G_{T}}\left(|\operatorname{Tr}(U_{T})|^{2}-1\right)^{2}
=𝑑Uα(|Tr(Uα)|21)2\displaystyle=\int dU_{\alpha}\ \left(|\operatorname{Tr}(U_{\alpha})|^{2}-1\right)^{2}
=1\displaystyle=1

where the second equality follows from the unitary 2-design property, and the third follows from the fact that T\mathcal{H}_{T\perp} is an irrep of the natural representation of the full unitary group on T\mathcal{H}_{T}. Finally, for TS\mathcal{H}_{TS} and ST\mathcal{H}_{ST} we have

1|G|UG|χST(U)|2\displaystyle\frac{1}{|G|}\sum_{U\in G}|\chi_{ST}(U)|^{2} =13|GT|UTGTη=0,1,2|Tr(UT)|2\displaystyle=\frac{1}{3|G_{T}|}\sum_{\begin{subarray}{c}U_{T}\in G_{T}\\ \eta=0,1,2\end{subarray}}|\operatorname{Tr}(U_{T})|^{2}
=𝑑UT|Tr(UT)|2\displaystyle=\int dU_{T}\ |\operatorname{Tr}(U_{T})|^{2}
=1\displaystyle=1

where the second equality follows from the unitary 2-design property and the third follows from the fact that the direct representation of the full unitary group on T\mathcal{H}_{T} is irreducible.

Note that T0\mathcal{H}_{T0} and S0\mathcal{H}_{S0} are two irreducible copies of the trivial representation, so that GG is necessarily non-multiplicity-free 444It follows that GG also cannot form a 2-design, as 2-designs are always multiplicity free; in particular, the natural representation of a 2-design decomposes into precisely two non-isomorphic irreps, acting on |𝟙|\mathbbm{1}\rangle\rangle and the orthogonal complement of |𝟙|\mathbbm{1}\rangle\rangle [9, 22].. The remaining irreps are all unique, since they have different character functions.

IV.3 Benchmarking GG

The form of the decay curves corresponding to each irrep is given by

S0(N)\displaystyle S_{0}(N) =C0λ0N+B\displaystyle=C_{0}\lambda_{0}^{N}+B (11)
STS(N)\displaystyle S_{TS}(N) =CTSλTSN\displaystyle=C_{TS}\lambda_{TS}^{N}
SST(N)\displaystyle S_{ST}(N) =CSTλSTN\displaystyle=C_{ST}\lambda_{ST}^{N}
ST(N)\displaystyle S_{T\perp}(N) =CTλTSN.\displaystyle=C_{T\perp}\lambda_{TS}^{N}.

Note that from our general form Eq. 4 we would expect that S0(N)S_{0}(N) is the sum of two exponential terms, with each λ0,j\lambda_{0,j} corresponding to an eigenvalue of Λ^G\hat{\Lambda}_{G} restricted to 0\mathcal{H}_{0}. However, we know that for trace-preserving noise 𝟙|Λ^G=𝟙|\langle\langle\mathbbm{1}|\hat{\Lambda}_{G}=\langle\langle\mathbbm{1}|, which implies that one of the eigenvalues is 11.

We define two different subgroups G¯1,G¯2G\overline{G}_{1},\overline{G}_{2}\subseteq G for our benchmarking procedure. We will use G¯1\overline{G}_{1} to construct S0(N)S_{0}(N) and ST(N)S_{T\perp}(N), and G¯2\overline{G}_{2} to construct STS(N)S_{TS}(N) and SST(N)S_{ST}(N). We define

G¯1\displaystyle\overline{G}_{1} :={XaZbωη:a,b,η=0,1,2}\displaystyle:=\{X^{a}Z^{b}\oplus\omega^{\eta}:a,b,\eta=0,1,2\}
G¯2\displaystyle\overline{G}_{2} :={Zbωη:b,η=0,1,2}.\displaystyle:=\{Z^{b}\oplus\omega^{\eta}:b,\eta=0,1,2\}.

For G¯1\overline{G}_{1}, we can define the following character functions and their corresponding projectors:

χ0¯(XaZbωη)\displaystyle\chi_{\overline{0}}(X^{a}Z^{b}\oplus\omega^{\eta}) =1\displaystyle=1
P^0¯\displaystyle\hat{P}_{\overline{0}} =13|𝟙T𝟙T|+|𝟙S𝟙S|\displaystyle=\frac{1}{3}|\mathbbm{1}_{T}\rangle\rangle\langle\langle\mathbbm{1}_{T}|+|\mathbbm{1}_{S}\rangle\rangle\langle\langle\mathbbm{1}_{S}|
χT¯(XaZbωη)\displaystyle\chi_{\overline{T\perp}}(X^{a}Z^{b}\oplus\omega^{\eta}) =ωa\displaystyle=\omega^{-a}
P^T¯\displaystyle\hat{P}_{\overline{T\perp}} =13|ZZ|\displaystyle=\frac{1}{3}|Z\rangle\rangle\langle\langle Z|

We see that P^0¯\hat{P}_{\overline{0}} projects into 2¯0¯202\overline{\mathcal{H}}_{\overline{0}}\subseteq 2\mathcal{H}_{0} and P^T¯\hat{P}_{\overline{T\perp}} projects into ¯T¯T\overline{\mathcal{H}}_{\overline{T\perp}}\subseteq\mathcal{H}_{T\perp}, as required. We also see that dim(¯T¯)=1\text{dim}(\overline{\mathcal{H}}_{\overline{T\perp}})=1, so that ST(N)S_{T\perp}(N) will have the best possible relative error (see Section III.3).

For G¯2\overline{G}_{2}, we can define the character functions and corresponding projectors

χTS¯(Zbωη)\displaystyle\chi_{\overline{TS}}(Z^{b}\oplus\omega^{\eta}) =ωbη\displaystyle=\omega^{b-\eta}
P^TS¯\displaystyle\hat{P}_{\overline{TS}} =|T|ST|S|\displaystyle=|T\rangle|S\rangle\langle T|\langle S|
χST¯(Zbωη)\displaystyle\chi_{\overline{ST}}(Z^{b}\oplus\omega^{\eta}) =ωb+η\displaystyle=\omega^{-b+\eta}
P^ST¯\displaystyle\hat{P}_{\overline{ST}} =|S|TS|T|\displaystyle=|S\rangle|T\rangle\langle S|\langle T|

where |T:=(|01+|10)/2|T\rangle:=(|01\rangle+|10\rangle)/\sqrt{2} is the triplet state satisfying Z|T=ω|TZ|T\rangle=\omega|T\rangle and |S:=(|01|10)/2|S\rangle:=(|01\rangle-|10\rangle)/\sqrt{2} is the singlet state. We again see that PTS¯P_{\overline{TS}} projects into ¯TS¯TS\overline{\mathcal{H}}_{\overline{TS}}\subseteq\mathcal{H}_{TS} and dim(¯TS¯)=1\text{dim}(\overline{\mathcal{H}}_{\overline{TS}})=1, so that STS(N)S_{TS}(N) will also have the best possible relative error.

As our initial states, we choose

|ρi={|00,i=0,T|01,i=TS,ST|\rho_{i}\rangle\rangle=\left\{\begin{array}[]{ll}|00\rangle\rangle,&i=0,T\!\!\perp\\ |01\rangle\rangle,&i=TS,ST\end{array}\right.

Here, we’ve restricted ourselves to initial states that are a mixture of ZZ-basis product states, for ease of preparation.

As our measurement projectors, we choose

|Mi={|00+|11,i=0,T|01,i=TS,ST|M_{i}\rangle\rangle=\left\{\begin{array}[]{ll}|00\rangle\rangle+|11\rangle\rangle,&i=0,T\!\!\perp\\ |01\rangle\rangle,&i=TS,ST\\ \end{array}\right.

Here, we’ve restricted our measurement projectors to correspond to ZZ measurements, for ease of measuring.

With these choices, the Si(N)S_{i}(N) are approximately

Si(N)\displaystyle S_{i}(N) Mi|P^i¯|ρidim(¯i¯)={23,i=0eiπ/33,i=T14,i=TS,ST\displaystyle\approx\frac{\langle\langle M_{i}|\hat{P}_{\overline{i}}|\rho_{i}\rangle\rangle}{\text{dim}(\mathcal{\overline{H}}_{\overline{i}})}=\left\{\begin{array}[]{ll}\frac{2}{3},&{i}={0}\\ \frac{e^{-i\pi/3}}{3},&{i}=T\!\!\perp\\ \frac{1}{4},&{i}=TS,ST\\ \end{array}\right.

Note that λST=λTS\lambda_{ST}=\lambda_{TS}^{*}, so it is unnecessary to compute both STS(N)S_{TS}(N) and SST(N)S_{ST}(N). Note also that λ0\lambda_{0} and λT\lambda_{T\perp} are both necessarily real, as are C0C_{0} and BB. The remaining parameters are complex. For convenience, we will rotate ST(N)S_{T\perp}(N) by eiπ/3e^{i\pi/3} so that ST(N)S_{T\perp}(N) is approximately real.

Refer to caption
Figure 2: The predicted and measured character-weighted survival probability for a random error channel. The exact decay (green) is an exponential decay given by Eq. 11. We estimate Si(N)S_{i}(N) by applying random gates and measuring the final state (blue points). The data is fit to an appropriate function (orange) from which we estimate the fidelity.

.

Refer to caption
Figure 3: The exact and estimated fidelity for a selection of randomly generated error channels. Each estimate was based on data taken over 15 different lengths NN. Each estimate was arrived at by applying a total of 150,000 benchmarking group elements. This is the same number of elements applied in the experiment described in [23]. The diagonal line denotes the points where the exact and estimated fidelities are equal. The data agree with the line with a reduced χ2\chi^{2} value of .9.9, indicating good agreement. Note that the error bars are derived from statistical uncertainty in the data, and vanish in the limit of an infinite number of data points
Refer to caption
Figure 4: (a) The extended sub-fidelity F~Λ\tilde{F}_{\Lambda} of [23] versus the exact fidelity FΛF_{\Lambda} that we can estimate in our paper, for a selection of error channels of varying strengths: intensity errors, which correspond to an overrotation eiϵZZe^{-i\epsilon ZZ}; optical pumping errors, which cause amplitude-damping on each qubit; inhomogeneous fields, which cause phase-damping on each qubit; and SWAP errors, which interchange the qubits. This plot corresponds to the exact value of both FΛF_{\Lambda} and F~Λ\tilde{F}_{\Lambda} that one estimates in an experiment. Note that while the F~Λ\tilde{F}_{\Lambda} agrees with FΛF_{\Lambda} in the limit FΛ1F_{\Lambda}\rightarrow 1, in general the two do not agree, and there exists worst-case errors such as SWAP that F~Λ\tilde{F}_{\Lambda} cannot detect. (b,c) Simulation of an experiment that estimates FΛF_{\Lambda} versus F~Λ\tilde{F}_{\Lambda} for a total of 300,000300,000 unitaries, in the case of (b) intensity and (c) SWAP errors of varying strengths. These plots correspond to experiments that estimate the exact values shown in (a). We see that the difference between FΛF_{\Lambda} and F~Λ\tilde{F}_{\Lambda} can be discerned in a realistic experiment.

We demonstrate our method by generating random error channels and simulating our RB procedure. To generate a random error channel Λ\Lambda on a dd-dimensional Hilbert space, we generate a random unitary on a (d2+d)(d^{2}+d) dimensional Hilbert space and trace out d2d^{2} auxiliary degrees of freedom; to adjust the fidelity, we take a convex combination of the resulting channel with the identity channel. All channels generated by this method are guaranteed to be completely positive trace-preserving (CPTP), thus valid error channels, and every CPTP channel can be generated via this method [36]. For each error channel, we take data at 15 different values of NN, and sample unitary operators at each value of NN until we have applied a total of 150,000150,000 unitary operators in total. For each string of unitary operators, we perform full state-vector simulation to apply the RB sequence of operators, and then generate a measurement outcome of 0 or 11 using the appropriate probability, and compute the character-weighted average. In Fig. 2, we show the exact value of Si(N)S_{i}(N), the data we take to estimate Si(N)S_{i}(N), and the fit to Si(N)S_{i}(N) according to Eq. 11 for a single random error channel Λ\Lambda.

From the fit data, we can estimate FΛF_{\Lambda} by applying Eq. 5:

FΛ=1+λ0+8λT+3λTS+3λST+420.F_{\Lambda}=\frac{1+\lambda_{0}+8\lambda_{T\perp}+3\lambda_{TS}+3\lambda_{ST}+4}{20}. (12)

Note that the imaginary parts of λTS\lambda_{TS} and λST\lambda_{ST} always cancel to give a real FΛF_{\Lambda} as expected. We use this formula to estimate the fidelity of our randomly generated error channels, and compare our estimate to the true fidelity in Fig. 3. We see that the true fidelity and the estimated fidelity agree within the error bars set by the uncertainty of our fits.

We can directly compare this with the original subspace RB method [23]. That method served to estimate only λ0\lambda_{0} and λT\lambda_{T\perp} (tt and rr in their notation), and they could only form a measure of gate fidelity using these quantities. They defined a so-called “extended sub-fidelity” F~Λ\tilde{F}_{\Lambda}, which they obtained by replacing λST\lambda_{ST} and λTS\lambda_{TS} with the weighted average of the other eigenvalues: λST+λTS21+λ0+8λT10\lambda_{ST}+\lambda_{TS}\approx 2\frac{1+\lambda_{0}+8\lambda_{T\perp}}{10}. Explicitly, the extended sub-fidelity is given by 555Our formula differs slightly from the corresponding formula in [23]. Ref. [23] considered approximating the process (also called entanglement) fidelity rather than the average fidelity; however, the average fidelity can be determined from the process fidelity[14, 13]. To be consistent with the rest of our paper, we have translated their approximation of the process fidelity into the corresponding approximation of the average fidelity.

F~λ=16λT+2λ0+725.\tilde{F}_{\lambda}=\frac{16\lambda_{T\perp}+2\lambda_{0}+7}{25}.

It is obvious that if FΛ1F_{\Lambda}\rightarrow 1, F~Λ1\tilde{F}_{\Lambda}\rightarrow 1 as well, but the reverse is not necessarily true. We can compare the extended sub-fidelity to the exact fidelity for the various noise sources explored in [23]. We consider intensity errors, which correspond to an overrotation eiϵZZe^{-i\epsilon ZZ}; optical pumping errors, which cause amplitude-damping on each qubit; inhomogenous fields, which cause phase-damping on each qubit; and SWAP errors, which interchange the qubits. The results are shown in Fig. 4. We see that while for most error sources FΛF~ΛF_{\Lambda}\approx\tilde{F}_{\Lambda}, there exist worse-case errors, such as SWAP, that cannot be detected by F~Λ\tilde{F}_{\Lambda}. This was also noted in [23] as a limitation of their method.

Our work also improves upon the original work in the mathematical assumptions needed to derive the benchmarking decays. Ref. [23] derived their decay formulas under the assumption that their benchmarking set was of the form {UTσϕUT:UTGT,σ=±}\{U_{T}\oplus\sigma\phi_{U_{T}}:U_{T}\in G_{T},\sigma=\pm\}, where ϕUT\phi_{U_{T}} is some uncontrolled phase that occurs on the singlet space and σ\sigma is a controllable phase between the singlet and triplet spaces. However, in practice they could not control σ\sigma using a constant number of UZZU_{ZZ} gates. Instead, they implemented only {UTϕUT:UTGT}\{U_{T}\oplus\phi_{U_{T}}:U_{T}\in G_{T}\} and assumed the form of the decay would not change. In our work, by contrast, we have rigorously derived decay formulas for a group of gates that can be directly compiled into elementary symmetric gates using a constant number of UZZU_{ZZ}.

We note that our method does require one additional capability that was not required in the original work: in order to estimate STS(N)S_{TS}(N), it is necessary to initialize and measure the |01|01\rangle state. This requires additional experimental overhead to individually address and measure each qubit at the beginning and end of the benchmarking procedure. However, such overhead only contributes to the SPAM errors ΛP,ΛM\Lambda_{P},\Lambda_{M}, and does not affect our estimates of the entangling error. In any case, our method to measure λ0\lambda_{0} and λT\lambda_{T\perp} does not require individual addressing, and can be viewed as a mathematically rigorous method to extract these parameters with no additional experimental requirements.

V Application: Leakage randomized benchmarking

We may also use our generalized character RB to improve the leakage RB introduced in [26]. In leakage RB, like subspace RB, one is given a group GG that preserves the splitting of the Hilbert space into subspaces =12\mathcal{H}=\mathcal{H}_{1}\oplus\mathcal{H}_{2}. In leakage RB, however, 12\mathcal{H}_{1}\oplus\mathcal{H}_{2} does not represent the computational Hilbert space, and the goal is not to compute the average fidelity of the group operations. Instead, 1\mathcal{H}_{1} represents the computational space of a quantum system (e.g. the two lowest-level states that encode a qubit), while 2\mathcal{H}_{2} represents the leakage space outside the computational space. Leakage RB determines the average probability of “leaking” from 1\mathcal{H}_{1} to 2\mathcal{H}_{2} or “seeping” from 2\mathcal{H}_{2} to 1\mathcal{H}_{1}. Noting that the probability of a state |ρ|\rho\rangle\rangle being in subspace α=1,2\alpha=1,2 is given by 𝟙α|ρ\langle\langle\mathbbm{1}_{\alpha}|\rho\rangle\rangle, define the leakage LL and seepage SS by

L:=𝑑ψ1𝟙2|Λ^|ψ1=1d1𝟙2|Λ^|𝟙1\displaystyle L:=\int d\psi_{1}\langle\langle\mathbbm{1}_{2}|\hat{\Lambda}|\psi_{1}\rangle\rangle=\frac{1}{d_{1}}\langle\langle\mathbbm{1}_{2}|\hat{\Lambda}|\mathbbm{1}_{1}\rangle\rangle (13)
S:=𝑑ψ2𝟙1|Λ^|ψ2=1d2𝟙1|Λ^|𝟙2.\displaystyle S:=\int d\psi_{2}\langle\langle\mathbbm{1}_{1}|\hat{\Lambda}|\psi_{2}\rangle\rangle=\frac{1}{d_{2}}\langle\langle\mathbbm{1}_{1}|\hat{\Lambda}|\mathbbm{1}_{2}\rangle\rangle. (14)

In addition, leakage RB determines the average fidelity restricted to the subspace 1\mathcal{H}_{1}

FΛ,1=𝑑ψ1ψ1|Λ^|ψ1.F_{\Lambda,1}=\int d\psi_{1}\langle\langle\psi_{1}|\hat{\Lambda}|\psi_{1}\rangle\rangle. (15)

which is the appropriate measure of gate quality, since all computations take place in 1\mathcal{H}_{1}. Leakage RB is relevant for any system in which qubits are encoded in the subspace of a larger Hilbert space, which includes superconducting qubits [57, 58], quantum dots, [59, 60, 61, 62, 63], and trapped ions [64, 65, 66].

The original leakage RB could only be applied to a group

G={U1,b1σU2,b2:(b1,b2)B1×B2,σ=±1}G=\{U_{1,b_{1}}\oplus\sigma U_{2,b_{2}}:(b_{1},b_{2})\in B_{1}\times B_{2},\ \sigma=\pm 1\} (16)

such that G1={U1,b1:b1B1}G_{1}=\{U_{1,b_{1}}:b_{1}\in B_{1}\} and G2={U2,b2:b2B2}G_{2}=\{U_{2,b_{2}}:b_{2}\in B_{2}\} form 22-designs on their respective subspaces 666Ref. [26] originally claimed it was sufficient for G2G_{2} to be a unitary 1-design, but this appears to be an error. This is a very stringent condition, as it requires being able to independently control the computational and leakage subspaces. In many experimental implementations such control is not realistic; an experimental implementation of a gate U1,bU_{1,b} on the computational subspace will naturally implement some U2,bU_{2,b} on the leakage subspace. It is therefore desirable to develop a leakage RB that can be applied to more general groups.

Using our method, we can derive a leakage RB procedure that is more general than the one described in [26]. Let GG be a group of unitary gates that preserve the subspaces of \mathcal{H}, and let Λ\Lambda be their shared error channel. To estimate LL and SS, we will require that the only trivial representations of GG are |𝟙1|\mathbbm{1}_{1}\rangle\rangle and |𝟙2|\mathbbm{1}_{2}\rangle\rangle, while to estimate FΛ,1F_{\Lambda,1} we additionally require that the subrepresentation 111\mathcal{H}_{1\perp}\subseteq\mathcal{H}_{1}\otimes\mathcal{H}_{1} orthogonal to |𝟙1|\mathbbm{1}_{1}\rangle\rangle is an irrep of multiplicity 11.

If we write our group GG as

G\displaystyle G ={Ub,σ:bB,σ=±1}\displaystyle=\{U_{b,\sigma}:b\in B,\ \sigma=\pm 1\}
={U1,bσU2,b:bB,σ=±1}.\displaystyle=\{U_{1,b}\oplus\sigma U_{2,b}:b\in B,\ \sigma=\pm 1\}.

then the first condition is satisfied provided {U1,b:bB}\{U_{1,b}:b\in B\} and {U2,b:bB}\{U_{2,b}:b\in B\} are unitary 11-designs, while the second condition is satisfied if provided these groups are unitary 22-designs with dimensions d1d2d_{1}\neq d_{2} (see Appendix C for proofs). Note that our requirements are significantly weaker than the original leakage RB, as we are only assuming the ability to implement an independent phase on the leakage space.

We outline our procedure for determining LL, SS, and FΛ,1F_{\Lambda,1} for such groups GG. Our procedure, like the original leakage RB, requires that SPAM errors do not mix the the subspaces 1\mathcal{H}_{1} and 2\mathcal{H}_{2}, or at least that such mixing is negligible compared to the gate errors. In our derivations we will assume Λ^M=Λ^P=𝟙^\hat{\Lambda}_{M}=\hat{\Lambda}_{P}=\hat{\mathbbm{1}}, although the generalization to errors that act only within the subspaces is trivial.

Our modified leakage RB procedure consists of the following steps:

  1. 1.

    Choose an initial state |ρ1|\rho\rangle\rangle\in\mathcal{H}_{1} and measurement projector |M=|𝟙1|M\rangle\rangle=|\mathbbm{1}_{1}\rangle.

  2. 2.

    For a given NN, choose unitaries U0,U1,,UNGU_{0},U_{1},...,U_{N}\in G randomly and uniformly. Compute UN+1=U1UNU_{N+1}=U_{1}^{\dagger}\cdots U_{N}^{\dagger}.

  3. 3.

    Prepare the state |ρ|\rho\rangle\rangle. Apply the gates (U1U0),U2,,UN+1(U_{1}U_{0}),U_{2},...,U_{N+1} sequentially, where (U1U0)({U}_{1}{U}_{0}) is compiled as a single element of GG.

  4. 4.

    Perform a measurement of the observable MM to determine if the state is still in 1\mathcal{H}_{1}.

  5. 5.

    Repeat steps 2-4 many times, to estimate the trivial character-weighted survival probability

    S0(N)=1|G|N+1U0,,UNGPrU0,,UNS_{0}(N)=\frac{1}{|G|^{N+1}}\sum_{U_{0},...,U_{N}\in G}\text{Pr}_{U_{0},...,U_{N}} (17)

    where PrU0,,UN+1\text{Pr}_{U_{0},...,U_{N+1}} is the probability of remaining in 1\mathcal{H}_{1} after applying gates (U1U0),,UN+1(U_{1}U_{0}),...,U_{N+1} to |ρ|\rho\rangle\rangle.

  6. 6.

    Repeat steps 2-5 for different values of NN.

  7. 7.

    Fit the survival probability to a function of the form

    S0(N)=AλN+BS_{0}(N)=A\lambda^{N}+B (18)

    where AA, BB, and λ\lambda are independent of NN.

  8. 8.

    Estimate LL and SS as

    L\displaystyle L =(1B)(1λ)\displaystyle=(1-B)(1-\lambda) (19)
    S\displaystyle S =B(1λ)\displaystyle=B(1-\lambda) (20)
  9. 9.

    Use the original character RB (section III) to measure the character-weighted survival probability S1S_{1\perp} associated to the irrep 1\mathcal{H}_{1\perp}. Fit

    S1(N)=Cλ1NS_{1\perp}(N)=C\lambda_{1\perp}^{N}

    to estimate λ1\lambda_{1\perp}.

  10. 10.

    Estimate FΛ,1F_{\Lambda,1} as

    FΛ,1=(d121)λ1+(d1+1)(1L)d12+d1.F_{\Lambda,1}=\frac{(d_{1}^{2}-1)\lambda_{1\perp}+(d_{1}+1)(1-L)}{d_{1}^{2}+d_{1}}. (21)

In the remainder of this section, we prove the correctness of this procedure and provide an example of such leakage RB.

V.1 Deriving LL and SS

Written out explicitly, the zeroth character-weighed survival probability is

S0(N)=𝟙1|Λ^Λ^GNP^0|ρ.S_{0}(N)=\langle\langle\mathbbm{1}_{1}|\hat{\Lambda}\hat{\Lambda}_{G}^{N}\hat{P}_{0}|\rho\rangle\rangle.

where P^0\hat{P}_{0} is the projector onto the trivial irrep, and we have made the same substitutions as in Section III.1 to reduce the sum over {U0,,UN}\{U_{0},...,U_{N}\} to GG-twirls and a projector. We know from Thm. 8 that Λ^G\hat{\Lambda}_{G} has a block-diagonal form Λ^G=iQ^i𝟙^i\hat{\Lambda}_{G}=\bigoplus_{i}\hat{Q}_{i}\otimes\hat{\mathbbm{1}}_{i}, where ii indexes the irreps. Because Λ^G\hat{\Lambda}_{G} is multiplied by the projector P^0\hat{P}_{0} in Eq. 17, we may ignore all terms except Q^0𝟙0\hat{Q}_{0}\otimes\mathbbm{1}_{0}. In terms of the eigendecomposition of Q^0\hat{Q}_{0}, we may write Q^0𝟙0=|e0e¯0|+λ|e1e¯1|\hat{Q}_{0}\otimes\mathbbm{1}_{0}=|e_{0}\rangle\rangle\langle\langle\overline{e}_{0}|+\lambda|e_{1}\rangle\rangle\langle\langle\overline{e}_{1}|, so that

S0(N)=𝟙1|Λ^|e0e¯0|ρ+𝟙1|Λ^|e1e¯1|ρλN{S}_{0}(N)=\langle\langle\mathbbm{1}_{1}|\hat{\Lambda}|e_{0}\rangle\rangle\langle\langle\overline{e}_{0}|\rho\rangle\rangle+\langle\langle\mathbbm{1}_{1}|\hat{\Lambda}|e_{1}\rangle\rangle\langle\langle\overline{e}_{1}|\rho\rangle\rangle\lambda^{N}

where we have used the fact, noted in Section IV, that one eigenvalue of Q^0\hat{Q}_{0} is always 11. This justifies the fit Eq. 18.

So far, we have simply repeated the steps in Section III.1 with slight modifications. However, in order to estimate LL and SS we will need to explicitly determine the eigendecomposition of Q^0𝟙0\hat{Q}_{0}\otimes\mathbbm{1}_{0}. We first note that the P^0\hat{P}_{0} subspace is spanned by the orthonormal vectors

1d1|𝟙1:=|𝟙^11d2|𝟙2:=|𝟙^2.\frac{1}{\sqrt{d_{1}}}|\mathbbm{1}_{1}\rangle\rangle:=|\hat{\mathbbm{1}}_{1}\rangle\rangle\qquad\frac{1}{\sqrt{d_{2}}}|\mathbbm{1}_{2}\rangle\rangle:=|\hat{\mathbbm{1}}_{2}\rangle\rangle.

Thus in terms of these basis vectors, we may write

Q^0𝟙0=|𝟙^αQαβ𝟙^β|\hat{Q}_{0}\otimes\mathbbm{1}_{0}=|\hat{\mathbbm{1}}_{\alpha}\rangle\rangle Q_{\alpha\beta}\langle\langle\hat{\mathbbm{1}}_{\beta}|

for some constants QαβQ_{\alpha\beta}. Noting that Mαβ=𝟙^α|Λ^G|𝟙^β=𝟙^α|Λ^|𝟙^βM_{\alpha\beta}=\langle\langle\hat{\mathbbm{1}}_{\alpha}|\hat{\Lambda}_{G}|\hat{\mathbbm{1}}_{\beta}\rangle\rangle=\langle\langle\hat{\mathbbm{1}}_{\alpha}|\hat{\Lambda}|\hat{\mathbbm{1}}_{\beta}\rangle\rangle, we can use the definitions of LL and SS, (Eqs. 13 and 14) to determine the constants QαβQ_{\alpha\beta}:

Qαβ=(1Ld2d1Sd1d2L1S)αβ.Q_{\alpha\beta}=\left(\begin{matrix}1-L&\sqrt{\frac{d_{2}}{d_{1}}}S\\ \sqrt{\frac{d_{1}}{d_{2}}}L&1-S\end{matrix}\right)_{\alpha\beta}.

From the explicit form of QαβQ_{\alpha\beta}, we can determine the eigendecomposition of Q^0𝟙0\hat{Q}_{0}\otimes\mathbbm{1}_{0} via straightforward algebra [26, 23]:

|e0\displaystyle|e_{0}\rangle\rangle =Sd1(L+S)|𝟙^1+Ld2(L+S)|𝟙^2\displaystyle=\frac{S}{\sqrt{d_{1}}(L+S)}|\hat{\mathbbm{1}}_{1}\rangle\rangle+\frac{L}{\sqrt{d_{2}}(L+S)}|\hat{\mathbbm{1}}_{2}\rangle\rangle
|e¯0\displaystyle|\overline{e}_{0}\rangle\rangle =d1|𝟙^1+d2|𝟙^2\displaystyle=\sqrt{d_{1}}|\hat{\mathbbm{1}}_{1}\rangle\rangle+\sqrt{d_{2}}|\hat{\mathbbm{1}}_{2}\rangle\rangle
|e1\displaystyle|e_{1}\rangle\rangle =d2|𝟙^1d1|𝟙^2\displaystyle=\sqrt{d_{2}}|\hat{\mathbbm{1}}_{1}\rangle\rangle-\sqrt{d_{1}}|\hat{\mathbbm{1}}_{2}\rangle\rangle
|e¯1\displaystyle|\overline{e}_{1}\rangle\rangle =Ld2(L+S)|𝟙^1Sd1(L+S)|𝟙^2\displaystyle=\frac{L}{\sqrt{d_{2}}(L+S)}|\hat{\mathbbm{1}}_{1}\rangle\rangle-\frac{S}{\sqrt{d_{1}}(L+S)}|\hat{\mathbbm{1}}_{2}\rangle\rangle
λ\displaystyle\lambda =1LS\displaystyle=1-L-S

Putting this together, we can evaluate the zeroth character-weighted survival probability as

S0(N)=SL+S+LL+S(1LS)N+1{S}_{0}(N)=\frac{S}{L+S}+\frac{L}{L+S}(1-L-S)^{N+1}

We then have that B=SL+SB=\frac{S}{L+S}, which can be combined with λ=1LS\lambda=1-L-S to immediately give Eqs. 19 and 20.

V.2 Deriving FΛ,1F_{\Lambda,1}

To establish Eq. 21, we first prove the following:

FΛ,1=Tr(Λ^P^11)+d1(1L)d12+d1F_{\Lambda,1}=\frac{\operatorname{Tr}(\hat{\Lambda}\hat{P}_{11})+d_{1}(1-L)}{d_{1}^{2}+d_{1}} (22)

where P^11\hat{P}_{11} is the projector onto 11\mathcal{H}_{1}\otimes\mathcal{H}_{1}. We use a similar method as in our proof of Eq. 10. We first note that the restricted average fidelities of Λ^\hat{\Lambda} and P^11Λ^P^11:=Λ^11\hat{P}_{11}\hat{\Lambda}\hat{P}_{11}:=\hat{\Lambda}_{11} are equal. Λ^11\hat{\Lambda}_{11} is an error channel restricted to the 1\mathcal{H}_{1} subspace. We can twirl Λ^11\hat{\Lambda}_{11} by the full unitary group on 1\mathcal{H}_{1} to get a depolarizing channel

(Λ11)G=p𝟙1+q1d1|𝟙1𝟙1|.(\Lambda_{11})_{G}=p\mathbbm{1}_{1}+q\frac{1}{d_{1}}|\mathbbm{1}_{1}\rangle\rangle\langle\langle\mathbbm{1}_{1}|.

Note that we have pp and qq rather than pp and (1p)(1-p) as in Eq. 9; this is because Λ^11\hat{\Lambda}_{11} is not necessarily trace-preserving. We can directly compute F(Λ11)G=p+qd1F_{(\Lambda_{11})_{G}}=p+\frac{q}{d_{1}}. Similarly, we can also directly compute Tr((Λ^11)G)=pd12+q\operatorname{Tr}\left((\hat{\Lambda}_{11})_{G}\right)=pd_{1}^{2}+q. Finally, we can directly compute p+q=1d1𝟙1|(Λ^11)G|𝟙1=1d1𝟙1|Λ^|𝟙1=1Lp+q=\frac{1}{d_{1}}\langle\langle\mathbbm{1}_{1}|(\hat{\Lambda}_{11})_{G}|\mathbbm{1}_{1}\rangle\rangle=\frac{1}{d_{1}}\langle\langle\mathbbm{1}_{1}|\hat{\Lambda}|\mathbbm{1}_{1}\rangle\rangle=1-L. Combining these three equations gives Eq. 22.

To estimate Tr(Λ^P^11)\operatorname{Tr}(\hat{\Lambda}\hat{P}_{11}), we can divide this trace up into two pieces:

Tr(Λ^P^11)=𝟙^1|Λ^|𝟙^1+Tr(Λ^P^1)=(1L)+Tr(Λ^P^1)\operatorname{Tr}(\hat{\Lambda}\hat{P}_{11})=\langle\langle\hat{\mathbbm{1}}_{1}|\hat{\Lambda}|\hat{\mathbbm{1}}_{1}\rangle\rangle+\operatorname{Tr}(\hat{\Lambda}\hat{P}_{1\perp})=(1-L)+\operatorname{Tr}(\hat{\Lambda}\hat{P}_{1\perp})

where P^1\hat{P}_{1\perp} is the projector onto 1\mathcal{H}_{1\perp}. The latter trace is simply (d121)λ1(d_{1}^{2}-1)\lambda_{1\perp}. Plugging this in to Eq. 22 gives Eq. 21 as desired.

V.3 Example: Two-qubit logical encodings

Here, we illustrate the advantages of our leakage RB over the original leakage RB of [26] via a single-qubit example where [26] is not applicable.. We consider an encoding of a single logical qubit into the Sz=0S_{z}=0 subspace of two physical qubits. This encoding is frequently used in quantum dot qubits [60, 61, 62]. The computational space 1\mathcal{H}_{1} is spanned by

|0:=|01|102,|1:=|01+|102|0\rangle:=\frac{|01\rangle-|10\rangle}{\sqrt{2}},\qquad|1\rangle:=\frac{|01\rangle+|10\rangle}{\sqrt{2}}

and the leakage space 2\mathcal{H}_{2} is spanned by

|2:=|00,|3:=|11.|2\rangle:=|00\rangle,\qquad|3\rangle:=|11\rangle.

Let’s assume we implement single-qubit rotations on our computational space by the operators

RX=XCZLRZ=ZCXL+ZL2,R_{X}=X_{C}\oplus Z_{L}\qquad R_{Z}=Z_{C}\oplus\frac{X_{L}+Z_{L}}{\sqrt{2}},

where implementing an XX or ZZ rotation on the computational space naturally induces a specific rotation on the leakage space.

Refer to caption
Figure 5: The predicted and measured S0(N)S_{0}(N) for a single randomly generated error channel. The actual decay (green) is an exponential decay given by Eq. 18. We estimate S0(N)S_{0}(N) by applying random gates and measuring the final state (blue points). The data is fit to a function of the form of Eq. 18, from which we estimate LL and SS.
Refer to caption
Figure 6: The exact and estimated leakage and seepage for a selection of randomly generated error channels. Each estimate was based on data taken over 15 different lengths NN. Each estimate was arrived at by applying a total of 300,000 unitary group elements. The diagonal line denotes the points where the exact and estimated fidelities are equal. The data agree with this line with a reduced χ2\chi^{2} value of 1.31.3, indicating good agreement.

We will take our benchmarking group to be the group generated by these two rotations, G=RX,RZG=\langle R_{X},R_{Z}\rangle. This group has a total of 16 elements. It cannot be written as direct sum of a group acting on 1\mathcal{H}_{1} and a group acting on 2\mathcal{H}_{2} as in Eq. 16, so the leakage RB of [26] does not apply. However, elementary calculation shows that the natural representation of this group contains exactly two trivial irreps, spanned by |𝟙1|\mathbbm{1}_{1}\rangle\rangle and |𝟙2|\mathbbm{1}_{2}\rangle\rangle, and we can therefore use our procedure to estimate LL and SS.

We illustrate this method by generating random error channels and simulating the RB procedure. In Figs. 5, we show the exact value of S0(N)S_{0}(N), the data we take to estimate S0(N)S_{0}(N), and the fit to S0(N)S_{0}(N) according to Eq. 18. In Fig. 6, we repeat the same fitting procedure for a set of randomly generated error channels, and estimate LL and SS using Eq. 19. We see that the true values of LL and SS and our estimate for LL and SS agree within the error bars set by the uncertainty in our fits.

We cannot apply our method to find FΛ,1F_{\Lambda,1} because in this example 2\mathcal{H}_{2\perp} and 1\mathcal{H}_{1\perp} share an irrep. This reflects the overall difficulty in applying leakage RB to physically realistic circumstances. While this work provides the most widely applicable method for leakage RB currently available, more work is needed to develop a truly general procedure.

VI Application: Matchgate RB

We can also use our method to introduce a new procedure for scalably benchmarking circuits made of matchgates. Matchgates are 2-qubit gates of the form

G(A,B)=(a1100a120b11b1200b21b220a2100a22)G(A,B)=\left(\begin{matrix}a_{11}&0&0&a_{12}\\ 0&b_{11}&b_{12}&0\\ 0&b_{21}&b_{22}&0\\ a_{21}&0&0&a_{22}\end{matrix}\right)

with det(A)=det(B)\det(A)=\det(B). In other words, a matchgate acts as AA on the even parity subspace spanned by {|00,|11}\{|00\rangle,|11\rangle\} and as BB on the odd parity subspace spanned by {|01,|10}\{|01\rangle,|10\rangle\}. Without loss of generality we may assume det(A)=det(B)=1\det(A)=\det(B)=1. The set of matchgates acting on a line of nearest neighbors is efficiently simulable [27, 29, 30, 28]. However matchgates acting on next-nearest-neighbors [30] or acting on any nontrivial connectivity graph [34, 31] are universal, as are matchgates plus arbitrary one-qubit gates [32, 29], matchgates plus a single G(A,B)G(A,B) with det(A)det(B)\det(A)\neq\det(B) [33], matchgates acting on entangled input states [35], and matchgates plus adaptive measurements [35]. Implementations of arbitrary matchgates have been proposed for trapped atom systems [68] and have been experimentally demonstrated in photonic systems [69].

We will derive a benchmarking procedure that determines the average fidelity of circuits composed of matchgates using a number of experiments that scales polynomially in the number of qubits. Our method is the matchgate equivalent of traditional Clifford RB, which characterizes the average fidelity of circuits composed of Hadamard, phase, and CNOT gates, and also requires a number of experiments that scales polynomially in the number of qubits. However, we will see that benchmarking matchgate circuits requires the full machinery of non-multiplicity-free character RB.

VI.1 The matchgate group

Consider a line of nn qubits with nearest-neighbor connectivity. Let GG be the matchgate group on nn qubits, the group of all unitaries generated from nearest-neighbor matchgates. Naively, GG could contain arbitrarily long circuits of matchgates. However, one can prove that every element of GG can be realized using circuits of at most 4n34n^{3} nearest-neighbor matchgates [30, Thm. 5]. We will provide a simplified proof of this fact below.

Following [29, 30], our primary tool to understand GG will be the Jordan-Wigner transformation [70]. Define 2n2n Majorana operators {ci}\{c_{i}\} as

c2k1\displaystyle c_{2k-1} =Z1Zk1Xk\displaystyle=Z_{1}\cdots Z_{k-1}X_{k}
c2k\displaystyle c_{2k} =Z1Zk1Yk\displaystyle=Z_{1}\cdots Z_{k-1}Y_{k}

for k=1,,nk=1,...,n. The {cm}\{c_{m}\} are Hermitian operators satisfying {c,cm}=2δm\{c_{\ell},c_{m}\}=2\delta_{\ell m}. Polynomials in the {cm}\{c_{m}\} form a Hermitian basis for the space of all density matrices, so a unitary UU is defined by its action on the {cm}\{c_{m}\} up to a potential phase. Because of our restriction det(A)=det(B)=1\det(A)=\det(B)=1, there is no phase freedom on the matchgates or any product of matchgates, so the action of UGU\in G is entirely determined by its action on the {cm}\{c_{m}\}. We make two claims [30]:

Claim 1.

Every UGU\in G in the matchgate group acts on the Majorana operators as a proper rotation. In other words, there exists some RSO(2n)R\in SO(2n) such that UcU=RmcmUc_{\ell}U^{\dagger}=R_{\ell m}c_{m}.

Claim 2.

Any unitary operator UU(2n)U\in U(2^{n}) that acts on the Majorana operators as a proper rotation is in the matchgate group GG. In particular, such a UU can be decomposed into a product of at most 2n32n^{3} nearest-neighbor matchgates.

These two claims together imply that the matchgate group is isomorphic to SO(2N)SO(2N), and that every element of the matchgate group can be efficiently implemented in a quantum circuit. In particular, this shows that the matchgate group is a compact group, thus we can apply character RB.

VI.1.1 Proof of claims

Proof of Claim 1.

We provide a simplification of the proof in [30]. We prove that a nearest-neighbor matchgate acting on qubits kk and k+1k+1 acts as a rotation mixing c2k1c_{2k-1}, c2kc_{2k}, c2k+1c_{2k+1}, and c2k+2c_{2k+2}, and that all such rotations are realized by matchgates. It then follows that all products of matchgates also act as rotations on the Majorana operators.

Without loss of generality, we can restrict ourselves to k=1k=1, so our Majorana operators are given by

c1\displaystyle c_{1} =X1\displaystyle=X_{1} c3\displaystyle c_{3} =Z1X2\displaystyle=Z_{1}X_{2}
c2\displaystyle c_{2} =Y2\displaystyle=Y_{2} c4\displaystyle c_{4} =Z1Y2.\displaystyle=Z_{1}Y_{2}.

We can write an infinitesimal matchgate as U=𝟙iϵMU=\mathbbm{1}-i\epsilon M, where MM must be of the form

α12Z1α13Y1X2α14Y1Y2+α23X1X2+α24X1Y2+α34Z2\alpha_{12}Z_{1}-\alpha_{13}Y_{1}X_{2}-\alpha_{14}Y_{1}Y_{2}+\alpha_{23}X_{1}X_{2}+\alpha_{24}X_{1}Y_{2}+\alpha_{34}Z_{2}

with αab\alpha_{ab}\in\mathbbm{R}. One can directly check that UU satisfies

Uc1U\displaystyle Uc_{1}U^{\dagger} =c1+2ϵα12c2+2ϵα13c3+2ϵα14c4\displaystyle=c_{1}+2\epsilon\alpha_{12}c_{2}+2\epsilon\alpha_{13}c_{3}+2\epsilon\alpha_{14}c_{4}
Uc2U\displaystyle Uc_{2}U^{\dagger} =2ϵα12c1+c2+2ϵα23c3+2ϵα24c4\displaystyle=-2\epsilon\alpha_{12}c_{1}+c_{2}+2\epsilon\alpha_{23}c_{3}+2\epsilon\alpha_{24}c_{4}
Uc3U\displaystyle Uc_{3}U^{\dagger} =2ϵα13c12ϵα23c2+c3+2ϵα34c4\displaystyle=-2\epsilon\alpha_{13}c_{1}-2\epsilon\alpha_{23}c_{2}+c_{3}+2\epsilon\alpha_{34}c_{4}
Uc4U\displaystyle Uc_{4}U^{\dagger} =2ϵα14c12ϵα24c22ϵα34c3+c4\displaystyle=-2\epsilon\alpha_{14}c_{1}-2\epsilon\alpha_{24}c_{2}-2\epsilon\alpha_{34}c_{3}+c_{4}

so that UciU=RijcjUc_{i}U^{\dagger}=R_{ij}c_{j} with

R=𝟙+2ϵ(0α12α13α14α120α23α24α13α230α34α14α24α340)R=\mathbbm{1}+2\epsilon\left(\begin{matrix}0&\alpha_{12}&\alpha_{13}&\alpha_{14}\\ -\alpha_{12}&0&\alpha_{23}&\alpha_{24}\\ -\alpha_{13}&-\alpha_{23}&0&\alpha_{34}\\ -\alpha_{14}&-\alpha_{24}&-\alpha_{34}&0\end{matrix}\right)

We therefore see that infinitesimal matchgates generate the whole Lie algebra 𝔰𝔬(4)\mathfrak{so}(4) of real antisymmetric matrices. By exponentiating the infinitesimal matchgates, we generate the full set of matchgates; in this process, we generate the full group SO(4)SO(4) as well. ∎

Proof of Claim 2.

We note, following [30], that every RSO(2n)R\in SO(2n) can be decomposed into n(2n1)n(2n-1) rotations that act as the identity on all but 22 basis elements c,cmc_{\ell},c_{m} by the Hoffman algorithm [71, 72]. In turn, a rotation mixing cc_{\ell} and cmc_{m} with <m\ell<m can be decomposed into a product of s:=(m221)s:=\left(\lceil\frac{m}{2}\rceil-\lceil\frac{\ell}{2}\rceil-1\right) rotations that exchange (cc+2)(c_{\ell}\leftrightarrow c_{\ell+2}), (c+2c+4)(c_{\ell+2}\leftrightarrow c_{\ell+4}), …, (c+2s2c+2s)(c_{\ell+2s-2}\leftrightarrow c_{\ell+2s}), followed by a rotation that mixes c+2sc_{\ell+2s} and cmc_{m}, followed by ss rotations that exchange (c+2sc+2s2)(c_{\ell+2s}\leftrightarrow c_{\ell+2s-2}), (c+2s2c+2n4)(c_{\ell+2s-2}\leftrightarrow c_{\ell+2n-4}), …, (c+2c)(c_{\ell+2}\leftrightarrow c_{\ell}). Each of these rotations only involve Majorana operators associated to neighboring qubits, and thus can be written as a matchgate. Thus, RR can be realized as the product of a total of n(2n1)(2s+1)<4n3n(2n-1)(2s+1)<4n^{3} matchgates, as claimed. ∎

We note that an arbitrary rotation between two Majorana operators

(ccm)(cos(θ)sin(θ)sin(θ)cos(θ))(ccm)\left(\begin{matrix}c_{\ell}\\ c_{m}\end{matrix}\right)\rightarrow\left(\begin{matrix}\cos(\theta)&\sin(\theta)\\ -\sin(\theta)&\cos(\theta)\end{matrix}\right)\left(\begin{matrix}c_{\ell}\\ c_{m}\end{matrix}\right)

is generated by the unitary U=eθ2ccmU=e^{\frac{\theta}{2}c_{\ell}c_{m}}. In the case where |m22|1\left|\lceil\frac{m}{2}\rceil-\lceil\frac{\ell}{2}\rceil\right|\leq 1, this UU is a nearest-neighbor matchgate. For example, if =3\ell=3, m=5m=5, then we have U=eiθ2Y2X3U=e^{-i\frac{\theta}{2}Y_{2}X_{3}}. Thus, the above decomposition of RR into <4n3<4n^{3} two-Majorana rotations gives an explicit formula for the matchgates needed to construct RR. We provide Python code to realize the Hoffman decomposition of RR into elementary rotations, as well as the reduction of RR to a matchgate circuit, at [73].

VI.2 Irreps of the matchgate group

We want to understand how the natural representation of GG decomposes into irreps. This is most convenient in the basis of polynomials of {cm}\{c_{m}\}. Note that cm2=1c_{m}^{2}=1, so our polynomials are at most degree 11 in any given cmc_{m} and there are 4N4^{N} such polynomials. Explicitly, an orthonormal basis of \mathcal{H}\otimes\mathcal{H} is given by

12N/2𝟙:=\displaystyle\frac{1}{2^{N/2}}\mathbbm{1}:= |𝟙^\displaystyle|\hat{\mathbbm{1}}\rangle\rangle
12N/2cm1:=\displaystyle\frac{1}{2^{N/2}}c_{m_{1}}:= |m1\displaystyle|m_{1}\rangle\rangle 1m12n\displaystyle 1\leq m_{1}\leq 2n
12N/2cm1cm2:=\displaystyle\frac{1}{2^{N/2}}c_{m_{1}}c_{m_{2}}:= |m1m2\displaystyle|m_{1}m_{2}\rangle\rangle 1m1<m22n\displaystyle 1\leq m_{1}<m_{2}\leq 2n
\displaystyle\vdots \displaystyle\vdots\qquad
|m1m2n1\displaystyle|m_{1}\cdots m_{2n-1}\rangle\rangle 1m1<2n\displaystyle 1\leq m_{1}<\cdots\leq 2n
|12n.\displaystyle|1\cdots 2n\rangle\rangle.

Define i:=span{|m1mi}\mathcal{H}_{i}:=\text{span}\{|m_{1}\cdots m_{i}\rangle\rangle\} to be the space spanned by degree-ii basis elements, for each i=0,,2ni=0,...,2n. Then ii2n\mathcal{H}_{i}\simeq\bigwedge^{i}\mathbbm{C}^{2n}, the ii-fold wedge product of 2n\mathbbm{C}^{2n}. It’s clear that U^\hat{U} preserves each i\mathcal{H}_{i}, so that each i\mathcal{H}_{i} is a subrepresentation. On 1\mathcal{H}_{1}, U^\hat{U} acts as the rotation operator RR associated to UU:

U^|i1=Ri1j1|j1.\hat{U}|i_{1}\rangle\rangle=R_{i_{1}j_{1}}|j_{1}\rangle\rangle.

On general i\mathcal{H}_{i}, U^\hat{U} acts as the wedge product of the rotation operator:

U^|1i=m1<<miσSi(1)σR1mσ1Rimσi|m1mi.\displaystyle\hat{U}|\ell_{1}\cdots\ell_{i}\rangle\rangle=\sum_{\mathclap{\begin{subarray}{c}m_{1}<\cdots<m_{i}\\ \sigma\in S^{i}\end{subarray}}}(-1)^{\sigma}R_{\ell_{1}m_{\sigma 1}}\cdots R_{\ell_{i}m_{\sigma i}}|m_{1}\cdots m_{i}\rangle\rangle.
Claim 3.

The natural representation of the matchgate group decomposes into the irreps

01n,1n,22n12n.\mathcal{H}_{0}\oplus\mathcal{H}_{1}\oplus\cdots\oplus\mathcal{H}_{n,1}\oplus\mathcal{H}_{n,2}\oplus\cdots\oplus\mathcal{H}_{2n-1}\oplus\mathcal{H}_{2n}.

where n=n,1n,2\mathcal{H}_{n}=\mathcal{H}_{n,1}\oplus\mathcal{H}_{n,2}. Explicitly, we have

n,1\displaystyle\mathcal{H}_{n,1} =span{|1n+in(1)σ(,m)|m1mn}\displaystyle=\text{span}\{|\ell_{1}\cdots\ell_{n}\rangle\rangle+i^{n}(-1)^{\sigma(\ell,m)}|m_{1}\cdots m_{n}\rangle\rangle\}
n,2\displaystyle\mathcal{H}_{n,2} =span{|1nin(1)σ(,m)|m1mn}\displaystyle=\text{span}\{|\ell_{1}\cdots\ell_{n}\rangle\rangle-i^{n}(-1)^{\sigma(\ell,m)}|m_{1}\cdots m_{n}\rangle\rangle\}

where {ma}\{m_{a}\} is the complement of {a}\{\ell_{a}\} and σ(,m)\sigma(\ell,m) is the permutation that takes (1,,n,m1,,mn)(1,,2n)(\ell_{1},...,\ell_{n},m_{1},...,m_{n})\mapsto(1,...,2n). Note that if nn is even these are real representations, while for nn odd these representations are complex conjugates of each other. The irreps i\mathcal{H}_{i} and 2ni\mathcal{H}_{2n-i} are isomorphic for ini\neq n, but no other irreps are isomorphic to each other.

Proof.

Define the Hodge star operator :i2ni*:\mathcal{H}_{i}\rightarrow\mathcal{H}_{2n-i} by

|1i=(1)σ(,m)|m1m2ni*|\ell_{1}\cdots\ell_{i}\rangle\rangle=(-1)^{\sigma(\ell,m)}|m_{1}\cdots m_{2n-i}\rangle\rangle

where {ma}\{m_{a}\} is the complement of {a}\{\ell_{a}\} and σ(,m)\sigma(\ell,m) is the permutation that takes (1,,i,m1,,m2ni)(1,,2n)(\ell_{1},...,\ell_{i},m_{1},...,m_{2n-i})\mapsto(1,...,2n). It is straightforward to show that * commutes with the action of UU, and thus provides the isomorphism of representations i2ni\mathcal{H}_{i}\simeq\mathcal{H}_{2n-i} when ini\neq n. We defer the proof that the i\mathcal{H}_{i}, n,1\mathcal{H}_{n,1}, and n,2\mathcal{H}_{n,2} are in fact irreducible to chapter 4 of [74]. ∎

VI.3 Benchmarking the matchgate group

Let G¯G\overline{G}\subset G be the subgroup of the matchgate group generated by RSO(2n)R\in SO(2n) with RR diagonal. Such an RR is always of the form R=diag{σ1,,σ2n}R=\text{diag}\{\sigma_{1},...,\sigma_{2n}\} with σ1σ2σ2n=1\sigma_{1}\sigma_{2}\cdots\sigma_{2n}=1. The action on a state |m1mii|m_{1}\cdots m_{i}\rangle\rangle\in\mathcal{H}_{i} is given by

U^|m1mi=σi1σim|m1mi\hat{U}|m_{1}\cdots m_{i}\rangle\rangle=\sigma_{i_{1}}\cdots\sigma_{i_{m}}|m_{1}\cdots m_{i}\rangle\rangle

and therefore the states |i1im|i_{1}\cdots i_{m}\rangle\rangle are the irreps of the natural representation of G¯\overline{G}. Because of the constraint σ1σ2σ2N=1\sigma_{1}\sigma_{2}\cdots\sigma_{2N}=1, each irrep has multiplicity 2, with the irrep spanned by |m1mi|m_{1}\cdots m_{i}\rangle\rangle isomorphic to the irrep spanned by |12ni|\ell_{1}\cdots\ell_{2n-i}\rangle\rangle with {a}\{\ell_{a}\} the complement of {ma}\{m_{a}\}. For each i=0,,ni=0,...,n, we can define a character function and corresponding projector

χi¯(R)=\displaystyle\chi_{\overline{i}}(R)= σ1σi\displaystyle\sigma_{1}\cdots\sigma_{i}
P^i¯=\displaystyle\hat{P}_{\overline{i}}= |1i1i|\displaystyle|1\cdots i\rangle\rangle\langle\langle 1\cdots i|
+|(i+1)2n(i+1)2n|.\displaystyle+|(i+1)\cdots 2n\rangle\rangle\langle\langle(i+1)\cdots 2n|.

These projectors project into the multiplicty-two irreps i2ni\mathcal{H}_{i}\oplus\mathcal{H}_{2n-i} for i¯=0,,(n1)\overline{i}=0,...,(n-1), and project into the two inequivalent irreps n,1n,2\mathcal{H}_{n,1}\oplus\mathcal{H}_{n,2} for i¯=n\overline{i}=n.

As our initial state, for each i=0,,ni=0,...,n we choose

|ρi={|0+0,i=2k1|00,i=2k.|\rho_{i}\rangle\rangle=\left\{\begin{array}[]{ll}|0\cdots+\cdots 0\rangle\rangle,&i=2k-1\\ |0\cdots 0\rangle\rangle,&i=2k.\end{array}\right.

where kkth qubit is in the ++ state of the XX operator for i=2k1i=2k-1. Provided we can prepare both XX-basis and ZZ-basis single qubit states, we can prepare |ρi|\rho_{i}\rangle\rangle.

As our measurement projector, for each i=0,,ni=0,...,n we choose

|Mi={12(Xk+𝟙),i=2k112(α>nkZα+𝟙),i=2k.|M_{i}\rangle\rangle=\left\{\begin{array}[]{ll}\frac{1}{2}(X_{k}+\mathbbm{1}),&i=2k-1\\ \frac{1}{2}\left(\prod_{\alpha>n-k}Z_{\alpha}+\mathbbm{1}\right),&i=2k.\end{array}\right.

For i=2k1i=2k-1, this corresponds to a measurement of the kkth qubit in the XX basis, while for i=2ki=2k this corresponds to a measurement of the product of the last kk qubits in the ZZ basis.

With these choices, the Si(N)S_{i}(N) are approximately

Si(N)Mi|P^i¯|ρidim(¯i¯)={1,i=012,1inS_{i}(N)\approx\frac{\langle\langle M_{i}|\hat{P}_{\overline{i}}|\rho_{i}\rangle\rangle}{\text{dim}(\mathcal{\overline{H}}_{\overline{i}})}=\left\{\begin{array}[]{ll}1,&i=0\\ \frac{1}{2},&1\leq i\leq n\end{array}\right.

and the relative uncertainty does not depend on the number of qubits. This is therefore a scalable method to benchmark the matchgate group.

The form of the decay is given by

Si(N)={C0λ0N+B,i=0Ci,1λi,1N+Ci,2λi,2N,1in.S_{i}(N)=\left\{\begin{array}[]{ll}C_{0}\lambda_{0}^{N}+B,&i=0\\ C_{i,1}\lambda_{i,1}^{N}+C_{i,2}\lambda_{i,2}^{N},&1\leq i\leq n.\end{array}\right. (23)

For each ii, either λi,1,λi,2,Ci,1,Ci,2\lambda_{i,1},\lambda_{i,2},C_{i,1},C_{i,2}\in\mathbbm{R} or λi,1=λi,2\lambda_{i,1}=\lambda_{i,2}^{*} and Ci,1=Ci,2C_{i,1}=C_{i,2}^{*}, since Si(N)S_{i}(N) is always real. For the case of i=ni=n, we know that the former case holds when nn is even and the latter when nn is odd, by Claim 3. For 1i<n1\leq i<n, one should assume whichever case gives the best fit. Note that in all cases, we fit at most 44 real parameters.

As an example, we simulate a noisy implementation of the matchgate group on n=3n=3 qubits. In Fig. 7, we show the exact value of Si(N)S_{i}(N), the data we take to estimate Si(N)S_{i}(N), and the fit to Si(N)S_{i}(N) according to Eq. 23 for a single random error channel Λ\Lambda. In Fig. 8, we do the same fitting procedure for a set of randomly generated error channels, and estimate their fidelity. We see that the true fidelity and the estimated fidelity agree within the error bars set by the uncertainty of our fits.

Refer to caption
Figure 7: The predicted and measured character-weighted survival probability for a random error channel. The exact decay (green) is an exponential decay given by one of Eq. 23. We estimate Si(N)S_{i}(N) by applying random gates and measuring the final state (blue points). The data is fit to an appropriate function (orange) from which we estimate the fidelity.
Refer to caption
Figure 8: The exact and estimated fidelity for a selection of random errors. Each estimate was based on data taken over 15 different lengths NN. Each estimate was arrived at by applying a total of 300,000 unitary group elements. The diagonal line denotes the points where the exact and estimated fidelities are equal. The data agree with the line with a reduced χ2\chi^{2} value of 1.01.0, indicating good agreement.

VII Conclusion and Discussions

In this work, we extended the recently introduced character RB of [22] to groups with multiplicity. Compared to earlier work on benchmarking arbitrary groups [20, 21], our method allows us to accurately determine the fidelity and fit fewer exponentials to experimental data. The generalization to non-multiplicity-free groups was essential to deriving a rigorous version of subspace RB and a scalable RB protocol for the matchgate group. This generalization also allowed us to develop an improved leakage RB protocol.

While we derived the character RB procedure in more generality than [22], our generalization still requires groups of small multiplicity, since the multiplicity of the group determines the number of exponential decays in our fit function. Robustly fitting a sum of many exponential decays is challenging, especially when the decay rates are roughly equal [43, 44]. It is likely straightforward to benchmark groups in which the trivial irrep has multiplicity three, as the corresponding decay S0(N)=A+Bλ0,1N+Cλ0,2NS_{0}(N)=A+B\lambda_{0,1}^{N}+C\lambda_{0,2}^{N} has only five real parameters. An irrep of multiplicity three with a real character function χ\chi has a decay with six parameters, which may be feasible with sufficient data. A general irrep of multiplicity three, however, requires fitting nine real parameters, which is likely unfeasible for realistic amounts of data. Higher-multiplicity irreps are correspondingly more difficult. All of the groups we considered in the examples in this paper decomposed into irreps with multiplicity at most 2.

All our applications involved a group that preserved some subspace of the Hilbert space. In the case of subspace RB, the group preserved the triplet and singlet subspaces; in the case of leakage RB, the computational and leakage subspaces; and in the case of matchgate RB, the even and odd parity subspaces. Any group that preserves subspaces necessarily has multiplicity, since there is always a copy of the trivial irrep in each subspace. It is an open question whether non-multiplicity-free character RB has useful applications to groups that do not preserve subspaces but nonetheless have multiplicity.

One group related to the matchgate group that would be of immediate experimental interest is the XY group, the subgroup of the matchgate group generated by only nearest-neighbor XY mixers UXY(θ)=exp{iθ(X1X2+Y1Y2)}U_{XY}(\theta)=\exp\left\{i\theta(X_{1}\otimes X_{2}+Y_{1}\otimes Y_{2})\right\}. Unlike general matchgates, XY mixers can be naturally realized on superconducting qubits [75, 76], and they are a necessary ingredient in extensions of the QAOA algorithm [77, 78, 79]. In addition, XY mixers are efficiently simulable on a line but become universal on nontrivial graphs, just like the full matchgate group[31]. However, XY mixers on NN qubits preserve the (N+1)(N+1) subspaces of definite Hamming weight; this implies that the trivial representation of the XY group must have multiplicity (N+1)(N+1). Thus, our method cannot be used to scalably benchmark the XY group; even N=2N=2 qubits is likely infeasible. On the other hand, [80] recently introduced a compilation of general two-qubit matchgates into products of four XY mixers and single-qubit gates. Using this decomposition, the average fidelity of the resulting two-qubit matchgates can be used as a proxy for the fidelity of the XY mixers. This method is similar to the benchmarking framework in our Sec IV, where we compile group elements into a fixed number of gates of interest (in our case, UZZU_{ZZ}), with the modification that [80] allows the gate of interest XY(θ)XY(\theta) to vary. It is an open question if there is a generalization of this compilation to the matchgate group on N>2N>2 qubits.

While our leakage RB necessitates the fewest assumptions to date, it is still too restrictive for many experimental implementations. Most notably, our RB requires the set of gates to be a group, which may be unrealistic; often, the gates will only form a group modulo rotations in the leakage space. In experimental implementations of leakage RB, this problem is usually simply ignored and an exponential decay is posited to exist with the usual relation to the leakage rate [58, 63]. It is worth exploring whether the methods used here can be further extended to such sets of gates that are only groups in the computational subspace, modulo rotations in the leakage subspace, to provide a more rigorous foundation for leakage RB experiments.

There are two obvious directions for further applications of character RB, with or without multiplicity. First, character RB has the potential to drastically expand the family of groups that can be scalably benchmarked. This requires both finding a group GG that can be efficiently compiled into elementary gates whose multiplicity is bounded as the number of qubits nn increases, as well as finding a subgroup G¯G\overline{G}\subseteq G whose irreps have slowly growing dimension. As a simple example, the subgroups of the Clifford group considered in [20] likely have a scalable protocol based on character RB, with G¯\overline{G} given by the Pauli group. Increasing the number of groups that can be scalably benchmarked gives new ways of characterizing compiled gates, especially non-Clifford gates.

Second, character RB can be used to characterize specific elementary gates by combining these gates into a group, as we did in Section IV for subspace RB. This requires finding a group that can be implemented by combining a fixed number of the gate to be characterized with known high-fidelity gates. Constructing these groups is a non-trivial task, as we have seen in the case of the UZZU_{ZZ} operator above. We leave the exploration of such applications to future work.

Note added. After the first version of this paper was posted, [80] was posted to the arXiv which also proposes a matchgate RB. Their method relies on enlarging the matchgate group with additional unitaries to avoid representations with multiplicity, but is otherwise similar to ours. As we mentioned in this paper, our character RB does not apply to the group generated by nearest-neighbor XY gates. While [80] does not propose a method to benchmark the group generated by nearest-neighbor XY mixers, they do demonstrate a method to compile two-qubit matchgate elements using a fixed number of XY mixers and additional single-qubit gates, allowing the matchgate RB to be used to characterize XY mixers, as discussed above.

Acknowledgements

JC thanks Alexandre Pyvovarov for useful discussions on representations of i2N\bigwedge^{i}\mathbbm{C}^{2N}. We are grateful for support from NASA Ames Research Center, the NASA Advanced Exploration systems (AES) program, and the NASA Transformative Aeronautic Concepts Program (TACP). We are also grateful for support from the AFRL Information Directorate under grant F4HBKC4162G001. JC was supported by the USRA Feynman Quantum Academy funded by the NAMS R&D Student Program at NASA Ames Research Center. JC and ZW are also supported by NASA Academic Mission Services, Contract No. NNA16BD14C.

References

  • O’Brien et al. [2004] J. L. O’Brien, G. J. Pryde, A. Gilchrist, D. F. V. James, N. K. Langford, T. C. Ralph, and A. G. White, Quantum process tomography of a controlled-NOT gate, Phys. Rev. Lett. 93, 080502 (2004).
  • Chuang and Nielsen [1997] I. L. Chuang and M. A. Nielsen, Prescription for experimental determination of the dynamics of a quantum black box, J. Mod. Opt 44, 2455 (1997).
  • Poyatos et al. [1997] J. F. Poyatos, J. I. Cirac, and P. Zoller, Complete characterization of a quantum process: the two-bit quantum gate, Phys. Rev. Lett. 78, 390 (1997).
  • Mohseni et al. [2008] M. Mohseni, A. T. Rezakhani, and D. Lidar, Quantum-process tomography: Resource analysis of different strategies, Phys. Rev. A 77, 032322 (2008).
  • Emerson et al. [2005] J. Emerson, R. Alicki, and K. Życzkowski, Scalable noise estimation with random unitary operators, J. Opt. B 7, S347 (2005).
  • Knill et al. [2008] E. Knill, D. Leibfried, R. Reichle, J. Britton, R. B. Blakestad, J. D. Jost, C. Langer, R. Ozeri, S. Seidelin, and D. J. Wineland, Randomized benchmarking of quantum gates, Phys. Rev. A 77, 012307 (2008).
  • Magesan et al. [2011] E. Magesan, J. M. Gambetta, and J. Emerson, Scalable and robust randomized benchmarking of quantum processes, Phys. Rev. Lett. 106, 180504 (2011).
  • Magesan et al. [2012a] E. Magesan, J. M. Gambetta, and J. Emerson, Characterizing quantum gates via randomized benchmarking, Phys. Rev. A 85, 042311 (2012a).
  • Dankert et al. [2009] C. Dankert, R. Cleve, J. Emerson, and E. Livine, Exact and approximate unitary 2-designs and their application to fidelity estimation, Phys. Rev. A 80, 012304 (2009).
  • Gottesman [1998a] D. Gottesman, Theory of fault-tolerant quantum computation, Phys. Rev. A 57, 127 (1998a).
  • Gottesman [1998b] D. Gottesman, The Heisenberg representation of quantum computers, quant-ph/9807006  (1998b).
  • Aaronson and Gottesman [2004] S. Aaronson and D. Gottesman, Improved simulation of stabilizer circuits, Phys. Rev. A 70, 052328 (2004).
  • Nielsen [2002] M. A. Nielsen, A simple formula for the average gate fidelity of a quantum dynamical operation, Phys. Lett. A 303, 249 (2002).
  • Horodecki et al. [1999] M. Horodecki, P. Horodecki, and R. Horodecki, General teleportation channel, singlet fraction, and quasidistillation, Phys. Rev. A 60, 1888 (1999).
  • Sanders et al. [2015] Y. R. Sanders, J. J. Wallman, and B. C. Sanders, Bounding quantum gate error rate based on reported average fidelity, New J. Phys. 18, 012002 (2015).
  • Magesan et al. [2012b] E. Magesan, J. M. Gambetta, B. R. Johnson, C. A. Ryan, J. M. Chow, S. T. Merkel, M. P. Da Silva, G. A. Keefe, M. B. Rothwell, T. A. Ohki, et al., Efficient measurement of quantum gate error by interleaved randomized benchmarking, Phys. Rev. Lett. 109, 080505 (2012b).
  • Harper and Flammia [2017] R. Harper and S. T. Flammia, Estimating the fidelity of T gates using standard interleaved randomized benchmarking, Quantum Sci. Technol. 2, 015008 (2017).
  • Carignan-Dugas et al. [2015] A. Carignan-Dugas, J. J. Wallman, and J. Emerson, Characterizing universal gate sets via dihedral benchmarking, Phys. Rev. A 92, 060302 (2015).
  • Cross et al. [2016] A. W. Cross, E. Magesan, L. S. Bishop, J. A. Smolin, and J. M. Gambetta, Scalable randomised benchmarking of non-Clifford gates, npj Quantum Inf. 2, 1 (2016).
  • Brown and Eastin [2018] W. G. Brown and B. Eastin, Randomized benchmarking with restricted gate sets, Phys. Rev. A 97, 062323 (2018).
  • França and Hashagen [2018] D. S. França and A. K. Hashagen, Approximate randomized benchmarking for finite groups, J. Phys. A 51, 395302 (2018).
  • Helsen et al. [2019] J. Helsen, X. Xue, L. M. K. Vandersypen, and S. Wehner, A new class of efficient randomized benchmarking protocols, npj Quantum Inf. 5, 1 (2019).
  • Baldwin et al. [2020] C. H. Baldwin, B. J. Bjork, J. P. Gaebler, D. Hayes, and D. Stack, Subspace benchmarking high-fidelity entangling operations with trapped ions, Phys. Rev. Res. 2, 013317 (2020).
  • Chasseur and Wilhelm [2015] T. Chasseur and F. K. Wilhelm, Complete randomized benchmarking protocol accounting for leakage errors, Phys. Rev. A 92, 042333 (2015).
  • Wallman et al. [2016] J. J. Wallman, M. Barnhill, and J. Emerson, Robust characterization of leakage errors, New J. Phys. 18, 043021 (2016).
  • Wood and Gambetta [2018] C. J. Wood and J. M. Gambetta, Quantification and characterization of leakage errors, Phys. Rev. A 97, 032306 (2018).
  • Valiant [2002] L. G. Valiant, Quantum circuits that can be simulated classically in polynomial time, SIAM J. Comput. 31, 1229 (2002).
  • Brod [2016] D. J. Brod, Efficient classical simulation of matchgate circuits with generalized inputs and measurements, Phys. Rev. A 93, 062332(R) (2016).
  • Terhal and DiVincenzo [2002] B. M. Terhal and D. P. DiVincenzo, Classical simulation of noninteracting-fermion quantum circuits, Phys. Rev. A 65, 032325 (2002).
  • Jozsa and Miyake [2008] R. Jozsa and A. Miyake, Matchgates and classical simulation of quantum circuits, Proc. Math. Phys. Eng. Sci. 464, 3089 (2008).
  • Brod and Childs [2014] D. J. Brod and A. M. Childs, The computational power of matchgates and the XY interaction on arbitrary graphs, Quantum Inf. Comput. 14, 901 (2014).
  • Imamoglu et al. [1999] A. Imamoglu, D. D. Awschalom, G. Burkard, D. P. DiVincenzo, D. Loss, M. Sherwin, A. Small, et al., Quantum information processing using quantum dot spins and cavity QED, Phys. Rev. Lett. 83, 4204 (1999).
  • Brod and Galvao [2011] D. J. Brod and E. F. Galvao, Extending matchgates into universal quantum computation, Phys. Rev. A 84, 022310 (2011).
  • Brod and Galvao [2012] D. J. Brod and E. F. Galvao, Geometries for universal quantum computation with matchgates, Phys. Rev. A 86, 052307 (2012).
  • Hebenstreit et al. [2020] M. Hebenstreit, R. Jozsa, B. Kraus, and S. Strelchuk, Computational power of matchgates with supplementary resources, arXiv:2007.08231  (2020).
  • Wood et al. [2015] C. J. Wood, J. D. Biamonte, and D. G. Cory, Tensor networks and graphical calculus for open quantum systems, Quantum Inf. Comput. 15, 759 (2015).
  • Fulton and Harris [2013] W. Fulton and J. Harris, Representation theory: a first course, Vol. 129 (Springer Science & Business Media, 2013).
  • Proctor et al. [2017] T. Proctor, K. Rudinger, K. Young, M. Sarovar, and R. Blume-Kohout, What randomized benchmarking actually measures, Phys. Rev. Lett. 119, 130502 (2017).
  • Wallman [2018] J. J. Wallman, Randomized benchmarking with gate-dependent noise, Quantum 2, 47 (2018).
  • Merkel et al. [2018] S. T. Merkel, E. J. Pritchett, and B. H. Fong, Randomized benchmarking as convolution: Fourier analysis of gate dependent errors, arXiv preprint arXiv:1804.05951  (2018).
  • Harper et al. [2019] R. Harper, I. Hincks, C. Ferrie, S. T. Flammia, and J. J. Wallman, Statistical analysis of randomized benchmarking, Phys. Rev. A 99, 052350 (2019).
  • Note [1] In our notation, this can be seen by noting that the natural representation of the full unitary group decomposes into two irreps which act on |𝟙|\mathbbm{1}\rangle\rangle and the orthogonal complement of |𝟙|\mathbbm{1}\rangle\rangle, respectively, and then applying Fact 6.
  • Bromage [1983] G. Bromage, A quantification of the hazards of fitting sums of exponentials to noisy data, Comput. Phys. Commun. 30, 229 (1983).
  • Clayden and Hesler [1992] N. Clayden and B. Hesler, Multiexponential analysis of relaxation decays, J. Magn. Reson. 98, 271 (1992).
  • Istratov and Vyvenko [1999] A. A. Istratov and O. F. Vyvenko, Exponential analysis in physical phenomena, Rev. Sci. Instrum. 70, 1233 (1999).
  • Holmström and Petersson [2002] K. Holmström and J. Petersson, A review of the parameter estimation problem of fitting positive exponential sums to empirical data, Appl. Math. Comput. 126, 31 (2002).
  • Hokanson [2013] J. Hokanson, Numerically stable and statistically efficient algorithms for large scale exponential fitting, Ph.D. thesis, Rice University (2013).
  • Note [2] Ref. [23] claimed it was sufficient to require G2G_{2} to be a unitary 11-design, but this appears to be an error. A similar error was made in [26], from which much of [23] is derived.
  • Hostens et al. [2005] E. Hostens, J. Dehaene, and B. De Moor, Stabilizer states and Clifford operations for systems of arbitrary dimensions and modular arithmetic, Phys. Rev. A 71, 042315 (2005).
  • Gottesman [1998c] D. Gottesman, Fault-tolerant quantum computation with higher-dimensional systems, in NASA International Conference on Quantum Computing and Quantum Communications (Springer, 1998) pp. 302–313.
  • Note [3] Ref. [23] required a shorter circuit of only three entangling gates. However, this circuit cannot implement all relative phases between the subspaces and thus does not result in a group.
  • Webb [2016] Z. Webb, The Clifford group forms a unitary 3-design, Quantum Inf. Comput. 16, 1379 (2016).
  • Zhu [2017] H. Zhu, Multiqubit Clifford groups are unitary 3-designs, Phys. Rev. A 96, 062336 (2017).
  • Chau [2005] H. F. Chau, Unconditionally secure key distribution in higher dimensions by depolarization, IEEE Trans. Inf. Theory 51, 1451 (2005).
  • Note [4] It follows that GG also cannot form a 2-design, as 2-designs are always multiplicity free; in particular, the natural representation of a 2-design decomposes into precisely two non-isomorphic irreps, acting on |𝟙|\mathbbm{1}\rangle\rangle and the orthogonal complement of |𝟙|\mathbbm{1}\rangle\rangle [9, 22].
  • Note [5] Our formula differs slightly from the corresponding formula in [23]. Ref. [23] considered approximating the process (also called entanglement) fidelity rather than the average fidelity; however, the average fidelity can be determined from the process fidelity[14, 13]. To be consistent with the rest of our paper, we have translated their approximation of the process fidelity into the corresponding approximation of the average fidelity.
  • Gambetta et al. [2017] J. M. Gambetta, J. M. Chow, and M. Steffen, Building logical qubits in a superconducting quantum computing system, npj Quantum Inf. 3, 1 (2017).
  • Chen et al. [2016] Z. Chen, J. Kelly, C. Quintana, R. Barends, B. Campbell, Y. Chen, B. Chiaro, A. Dunsworth, A. Fowler, E. Lucero, et al., Measuring and suppressing quantum state leakage in a superconducting qubit, Phys. Rev. Lett. 116, 020501 (2016).
  • DiVincenzo et al. [2000] D. P. DiVincenzo, D. Bacon, J. Kempe, G. Burkard, and K. B. Whaley, Universal quantum computation with the exchange interaction, Nature 408, 339 (2000).
  • Petta et al. [2005] J. R. Petta, A. C. Johnson, J. M. Taylor, E. A. Laird, A. Yacoby, M. D. Lukin, C. M. Marcus, M. P. Hanson, and A. C. Gossard, Coherent manipulation of coupled electron spins in semiconductor quantum dots, Science 309, 2180 (2005).
  • Hanson and Burkard [2007] R. Hanson and G. Burkard, Universal set of quantum gates for double-dot spin qubits with fixed interdot coupling, Phys. Rev. Lett. 98, 050502 (2007).
  • Levy [2002] J. Levy, Universal quantum computation with spin-1/2 pairs and Heisenberg exchange, Phys. Rev. Lett. 89, 147902 (2002).
  • Andrews et al. [2019] R. W. Andrews, C. Jones, M. D. Reed, A. M. Jones, S. D. Ha, M. P. Jura, J. Kerckhoff, M. Levendorf, S. Meenehan, S. T. Merkel, et al., Quantifying error and leakage in an encoded Si/SiGe triple-dot qubit, Nat. Nanotechnol. 14, 747 (2019).
  • Häffner et al. [2008] H. Häffner, C. F. Roos, and R. Blatt, Quantum computing with trapped ions, Phys. Rep. 469, 155 (2008).
  • Hayes et al. [2020] D. Hayes, D. Stack, B. Bjork, A. C. Potter, C. H. Baldwin, and R. P. Stutz, Eliminating leakage errors in hyperfine qubits, Phys. Rev. Lett. 124, 170501 (2020).
  • Stricker et al. [2020] R. Stricker, D. Vodola, A. Erhard, L. Postler, M. Meth, M. Ringbauer, P. Schindler, T. Monz, M. Müller, and R. Blatt, Experimental deterministic correction of qubit loss, Nature 585, 207 (2020).
  • Note [6] Ref. [26] originally claimed it was sufficient for G2G_{2} to be a unitary 1-design, but this appears to be an error.
  • Herrera et al. [2014] F. Herrera, Y. Cao, S. Kais, and K. B. Whaley, Infrared-dressed entanglement of cold open-shell polar molecules for universal matchgate quantum computing, New J. Phys. 16, 075001 (2014).
  • Ramelow et al. [2010] S. Ramelow, A. Fedrizzi, A. M. Steinberg, and A. G. White, Matchgate quantum computing and non-local process analysis, New J. Phys. 12, 083027 (2010).
  • Jordan and Wigner [1928] P. Jordan and E. Wigner, Über das paulische Äquivalenzverbot, Z. Physik 47, 631 (1928).
  • Raffenetti and Ruedenberg [1969] R. C. Raffenetti and K. Ruedenberg, Parametrization of an orthogonal matrix in terms of generalized Eulerian angles, Int. J. Quantum Chem. 4, 625 (1969).
  • Hoffman et al. [1972] D. K. Hoffman, R. C. Raffenetti, and K. Ruedenberg, Generalization of Euler angles to N-dimensional orthogonal matrices, J. Math. Phys. 13, 528 (1972).
  • Claes [2020] J. Claes, Hoffman decomposition and the matchgate group, https://github.com/jahanclaes/Hoffman-Decomposition-and-the-Matchgate-Group (2020).
  • Knapp [2001] A. W. Knapp, Representation theory of semisimple groups: an overview based on examples, Vol. 36 (Princeton university press, 2001).
  • Abrams et al. [2019] D. M. Abrams, N. Didier, B. R. Johnson, M. P. da Silva, and C. A. Ryan, Implementation of the XY interaction family with calibration of a single pulse, arXiv:1912.04424  (2019).
  • Foxen et al. [2020] B. Foxen, C. Neill, A. Dunsworth, P. Roushan, B. Chiaro, A. Megrant, J. Kelly, Z. Chen, K. Satzinger, R. Barends, et al., Demonstrating a continuous set of two-qubit gates for near-term quantum algorithms, Phys. Rev. Lett. 125, 120504 (2020).
  • Hadfield et al. [2019] S. Hadfield, Z. Wang, B. O’Gorman, E. G. Rieffel, D. Venturelli, and R. Biswas, From the quantum approximate optimization algorithm to a quantum alternating operator ansatz, Algorithms 12, 34 (2019).
  • Wang et al. [2020] Z. Wang, N. C. Rubin, J. M. Dominy, and E. G. Rieffel, XY mixers: Analytical and numerical results for the quantum alternating operator ansatz, Phys. Rev. A 101, 012320 (2020).
  • Cook et al. [2019] J. Cook, S. Eidenbenz, and A. Bärtschi, The quantum alternating operator ansatz on maximum k-vertex cover, arXiv:1910.13483  (2019).
  • Helsen et al. [2020] J. Helsen, S. Nezami, M. Reagor, and M. Walter, Matchgate benchmarking: Scalable benchmarking of a continuous family of many-qubit gates, arXiv preprint arXiv:2011.13048  (2020).
  • Moore and Russell [2015] C. Moore and A. Russell, Approximate representations, approximate homomorphisms, and low-dimensional embeddings of groups, SIAM J. Discrete Math. 29, 182 (2015).
  • Gowers and Hatami [2017] W. T. Gowers and O. Hatami, Inverse and stability theorems for approximate representations of finite groups, Sb. Math. 208, 1784 (2017).

Appendix A Gate-dependent errors

In this appendix, we extend the work of [39, 40, 22] on gate-dependent errors to the case of non-multiplicity-free character RB. Ref. [22] had previously generalized [39] to establish that multiplicity-free character RB is robust to gate-dependent errors. Rather than follow the method of [39, 22] we use the Fourier transform method of [40], which is more natural for groups with multiplicity. Our ultimate goal is the following theorem:

Theorem 2.

Let GG be a benchmarking group, and let ii be an irrep of the natural representation with multiplicity aia_{i}. Assume each gate UGU\in G is realized as a noisy operator η(U)\eta(U), but do not assume we can write η(U)=Λ^U^\eta(U)=\hat{\Lambda}\hat{U} for some UU-independent noise channel Λ\Lambda. Then the character-weighted survival probability is given by

Si(N)=j=1aiCi,jλi,jN+ϵNS_{i}(N)=\sum_{j=1}^{a_{i}}C_{i,j}\lambda_{i,j}^{N}+\epsilon_{N}

where ϵN\epsilon_{N} is an error term satisfying |ϵN|<δ1δ2N|\epsilon_{N}|<\delta_{1}\delta_{2}^{N} and δ1,δ2\delta_{1},\delta_{2} are both small for high-fidelity gates. Since we know that λi,j1\lambda_{i,j}\approx 1 for high-fidelity gates, ϵN\epsilon_{N} is negligible compared to Si(N)S_{i}(N) for moderately large NN.

This theorem implies we may safely use the RB protocols even in the presence of gate-dependent errors, although we will see the interpretation of the estimated fidelity is slightly modified.

In what follows, we will use the notation 𝔼[]\mathbbm{E}\left[\cdot\right] for the average 1|G|UG()\frac{1}{|G|}\sum_{U\in G}\left(\cdot\right) or G𝑑U()\int_{G}dU\left(\cdot\right) to make our equations cleaner. We will also use the shorthand did_{i} for dim(i)\dim(\mathcal{H}_{i}).

A.1 The generalized Fourier transform and its application to character RB

We first define a generalization of the Fourier transform to matrix-valued functions of a group GG[81, 82]. For any group GG we define G~\widetilde{G} to index the irreps of GG, and we assume WLOG that the irreps are unitary. Given a function η:G(D)\eta:G\rightarrow\mathcal{L}(\mathbbm{C}^{D}), for each iG~i\in\widetilde{G} we define the Fourier transform η~(i)(D)(i)\widetilde{\eta}(i)\in\mathcal{L}(\mathbbm{C}^{D})\otimes\mathcal{L}(\mathcal{H}_{i}) to be

η~(i)=𝔼[η(U)ϕi(U)].\widetilde{\eta}(i)=\mathbbm{E}\left[\eta(U)\otimes\phi_{i}^{*}(U)\right]. (24)

where ϕi:G(i)\phi_{i}:G\rightarrow\mathcal{L}(\mathcal{H}_{i}) is the iith irrep.

Given two matrix-valued functions η,ξ:G(D)\eta,\xi:G\rightarrow\mathcal{L}(\mathbbm{C}^{D}), we can also define the convolution (ηξ)(\eta*\xi) by

(ηξ)(U0)=𝔼[η(U)ξ(UU0)].(\eta*\xi)(U_{0})=\mathbbm{E}\left[\eta(U^{\dagger})\xi(UU_{0})\right]. (25)

The generalized Fourier transform shares many properties with the usual Fourier transform; in particular, we will use the following identities [82, 40]:

(ηξ~)(i)\displaystyle(\widetilde{\eta*\xi})(i) =η~(i)ξ~(i)\displaystyle=\widetilde{\eta}(i)\widetilde{\xi}(i) (26)
𝔼[Tr(η(U)ξ(U))]\displaystyle\mathbbm{E}\left[\text{Tr}\left(\eta(U)\xi^{\dagger}(U)\right)\right] =idiTr(η~(i)ξ~(i))\displaystyle=\sum_{i}d_{i}\text{Tr}\left(\widetilde{\eta}(i)\widetilde{\xi}^{\dagger}(i)\right) (27)
η(U)\displaystyle\eta(U) =idiTri([𝟙ϕiT(U)]η~(i))\displaystyle=\sum_{i}d_{i}\text{Tr}_{i}\left([\mathbbm{1}\otimes\phi_{i}^{T}(U)]\widetilde{\eta}(i)\right) (28)

where in the last line, Tri()\text{Tr}_{i}\left(\cdot\right) is the partial trace over i\mathcal{H}_{i}. Eq. 26 is the analogue of the usual convolution identity for Fourier transforms, Eq. 27 is the analogue of Parseval’s identity, and Eq. 28 gives the inverse Fourier transform.

The generalized Fourier transformation is useful because it allows us to express the result of a character RB experiment in a simpler form. A character RB experiment estimates a matrix element of the operator

O^i:=𝔼[η(U1UN)η(UN)η(U2)η(U1U0)χi¯(U0)]\hat{O}_{i}:=\mathbbm{E}\left[\eta(U_{1}^{\dagger}\cdots U_{N}^{\dagger})\eta(U_{N})\cdots\eta(U_{2})\eta(U_{1}U_{0})\chi_{\overline{i}}^{*}(U_{0})\right]

where the expectation value is over all U0G¯U_{0}\in\overline{G}, U1,,UNGU_{1},...,U_{N}\in G. Through the change of variables UiUiUi1U1U_{i}\rightarrow U_{i}U_{i-1}\cdots U_{1} for i=1,,Ni=1,...,N, we can rewrite this expression as a convolution:

O^i\displaystyle\hat{O}_{i} =𝔼[η(UN)η(UNUN1)η(U2U1)η(U1U0)χi¯(U0)]\displaystyle=\mathbbm{E}\left[\eta(U_{N}^{\dagger})\eta(U_{N}U_{N-1}^{\dagger})\cdots\eta(U_{2}U_{1}^{\dagger})\eta(U_{1}U_{0})\chi_{\overline{i}}^{*}(U_{0})\right]
=𝔼[(ηη)(N+1) times(U0)χi¯(U0)]\displaystyle=\mathbbm{E}\left[\underbrace{(\eta*\cdots*\eta)}_{(N+1)\text{ times}}(U_{0})\chi_{\overline{i}}^{*}(U_{0})\right]

Using the inverse Fourier transform (Eq. 28) we can write (ηη)(U0)(\eta*\cdots*\eta)(U_{0}) in terms of (ηη~)(i)(\widetilde{\eta*\cdots*\eta})(i^{\prime}), while the convolution identity (Eq. 26) allows us to simplify (ηη~)(i)=η~(i)N+1(\widetilde{\eta*\cdots*\eta})(i^{\prime})=\widetilde{\eta}(i^{\prime})^{N+1}. In total, we find

O^i\displaystyle\hat{O}_{i} =idiTri([𝟙𝔼[χi¯(U0)ϕi(U0)]T]η~(i)N+1).\displaystyle=\sum_{i^{\prime}}d_{i^{\prime}}\text{Tr}_{i^{\prime}}\left(\left[\mathbbm{1}\otimes\mathbbm{E}\left[\chi_{\overline{i}}^{*}(U_{0})\phi_{i^{\prime}}(U_{0})\right]^{T}\right]\widetilde{\eta}(i^{\prime})^{N+1}\right).

We now use the projection formula (Fact 7) to note that di¯𝔼[χi¯(U0)ϕi(U0)]d_{\overline{i}}\mathbbm{E}\left[\chi_{\overline{i}}^{*}(U_{0})\phi_{i^{\prime}}(U_{0})\right] is just the projection of ϕi\phi_{i^{\prime}} onto the irrep i¯\overline{i} of G¯\overline{G}. By assumption, the irrep ϕi¯\phi_{\overline{i}} is a subrepresentation of only ϕi\phi_{i}, and not a subrepresentation of any ϕi\phi_{i^{\prime}} with iii^{\prime}\neq i. Therefore,

O^i\displaystyle\hat{O}_{i} =didi¯Tri([𝟙P^i¯T]η~(i)N+1).\displaystyle=\frac{d_{i}}{d_{\overline{i}}}\text{Tr}_{i}\left(\left[\mathbbm{1}\otimes\hat{P}_{\overline{i}}^{T}\right]\widetilde{\eta}(i)^{N+1}\right).

We therefore see that the outcome of a character RB experiment, Si(N)S_{i}(N), can be described by the Fourier transform of η\eta via

Si(N)\displaystyle S_{i}(N) =Mi|Λ^MO^iΛ^P|ρi\displaystyle=\langle\langle M_{i}|\hat{\Lambda}_{M}\hat{O}_{i}\hat{\Lambda}_{P}|\rho_{i}\rangle\rangle (29)
=didi¯Mi|Λ^MTri([𝟙P^i¯T]η~(i)N+1)Λ^P|ρi\displaystyle=\frac{d_{i}}{d_{\overline{i}}}\langle\langle M_{i}|\hat{\Lambda}_{M}\text{Tr}_{i}\left(\left[\mathbbm{1}\otimes\hat{P}^{T}_{\overline{i}}\right]\widetilde{\eta}(i)^{N+1}\right)\hat{\Lambda}_{P}|\rho_{i}\rangle\rangle

and the decay of Si(N)S_{i}(N) is determined by the eigenvalues of η~(i)\widetilde{\eta}(i).

A.2 Simplifying the decay

In the case of ideal gates ηideal(U)=U^\eta_{\text{ideal}}(U)=\hat{U}, we have that η~ideal(i)\widetilde{\eta}_{\text{ideal}}(i) is given by

η~ideal(i)=𝔼[U^ϕi(U)]\widetilde{\eta}_{\text{ideal}}(i)=\mathbbm{E}\left[\hat{U}\otimes\phi_{i}(U)\right]

This can be simplified by noting that the map ηidealϕi:UU^ϕi(U)\eta_{\text{ideal}}\otimes\phi_{i}:U\mapsto\hat{U}\otimes\phi_{i}(U) is a representation of GG, and 𝔼[U^ϕi(U)]\mathbbm{E}\left[\hat{U}\otimes\phi_{i}(U)\right] is the projection of this representation onto the copies of the trivial irrep (Fact 7). We can count the multiplicity of the trivial irrep in (ηidealϕi)(\eta_{\text{ideal}}\otimes\phi_{i}) using the following fact:

Fact 4 (Schur orthonormality).

If χ\chi is the character of an arbitrary representation ϕ\phi, and χi\chi_{i} is the character of an irrep ϕi\phi_{i}, the multiplicity aia_{i} of ϕi\phi_{i} is

ai=1|G|UGχi(U)χ(U).a_{i}=\frac{1}{|G|}\sum_{U\in G}\chi_{i}^{*}(U)\chi(U).

For a proof, see [37].

Since the trivial irrep has χi(U)=1\chi_{i}(U)=1, we have that the multiplicity of the trivial irrep in (ηidealϕi)(\eta_{\text{ideal}}\otimes\phi_{i}) is given by

𝔼[Tr(U^ϕi(U))]=𝔼[χi(U)Tr(U^)]=ai.\mathbbm{E}\left[\text{Tr}\left(\hat{U}\otimes\phi_{i}^{*}(U)\right)\right]=\mathbbm{E}\left[\chi_{i}^{*}(U)\text{Tr}\left(\hat{U}\right)\right]=a_{i}.

In other words, η~ideal(i)\tilde{\eta}_{\text{ideal}}(i) is a rank-aia_{i} projector.

We can explicitly find the form of η~ideal(i)\tilde{\eta}_{\text{ideal}}(i) by constructing aia_{i} trivial irreps of (ηidealϕi)(\eta_{\text{ideal}}\otimes\phi_{i}). Let {|ψni}\{|\psi^{i}_{n}\rangle\rangle\} be an orthonormal basis for i\mathcal{H}_{i}, and let {|ψni,j}\{|\psi^{i,j}_{n}\rangle\rangle\} be the corresponding basis for the jjth copy of i\mathcal{H}_{i} inside \mathcal{H}\otimes\mathcal{H}. It is straightforward to show that

|Ψi,j:=1din=1di|ψni,j|ψni|\Psi^{i,j}\rangle\rangle:=\frac{1}{\sqrt{d_{i}}}\sum_{n=1}^{d_{i}}|\psi_{n}^{i,j}\rangle\rangle\otimes|\psi_{n}^{i}\rangle\rangle

spans an irrep for each j=1,,aij=1,...,a_{i}. Therefore,

η~ideal(i)=j=1ai|Ψi,jΨi,j|\tilde{\eta}_{\text{ideal}}(i)=\sum_{j=1}^{a_{i}}|\Psi^{i,j}\rangle\rangle\langle\langle\Psi^{i,j}| (30)

A realistic experiment will have gates described by a function η(U)\eta(U) that is some small perturbation from ηideal(U)\eta_{\text{ideal}}(U). Perturbing ηideal(U)\eta_{\text{ideal}}(U) by a small amount will perturb η~ideal(i)\tilde{\eta}_{\text{ideal}}(i) by a small amount, since the Fourier transform is a linear operation. Thus η~(i)\tilde{\eta}(i) is a perturbation of a rank-aia_{i} projector for high-fidelity gates, so that η~(i)\tilde{\eta}(i) has aia_{i} eigenvalues close to 11, which we will denote by λi,j\lambda_{i,j}, and the remaining eigenvalues close to 0. This is sufficient to make Si(N)S_{i}(N) dominanted by aia_{i} exponential decays, corresponding to the aia_{i} largest eigenvalues (see Eq. 29). This proves Thm. 2.

A.3 Computing the average fidelity

If we define η(U)=Λ^UU^\eta(U)=\hat{\Lambda}_{U}\hat{U}, with ΛU\Lambda_{U} the gate-dependent error channel, then we can define an average fidelity

Fav=𝔼[Tr(Λ^U)]+dd2+dF_{\text{av}}=\frac{\mathbbm{E}\left[\text{Tr}(\hat{\Lambda}_{U})\right]+d}{d^{2}+d} (31)

Comparing to Eq. 10, we see that this is simply the average of the individual fidelities FΛUF_{\Lambda_{U}}.

We can express FavF_{\text{av}} in terms of the aia_{i} largest eigenvalues of η~(i)\tilde{\eta}(i) as follows. We first note that we may write

𝔼[Tr(Λ^U)]\displaystyle\mathbbm{E}\left[\text{Tr}\left(\hat{\Lambda}_{U}\right)\right] =𝔼[Tr(η(U)ηideal(U))]\displaystyle=\mathbbm{E}\left[\text{Tr}\left(\eta(U)\eta^{\dagger}_{\text{ideal}}(U)\right)\right]
=idiTr(η~(i)η~ideal(i))\displaystyle=\sum_{i}d_{i}\text{Tr}\left(\tilde{\eta}(i)\tilde{\eta}^{\dagger}_{\text{ideal}}(i)\right)
=i=1Ij=1aidiΨi,j|η~(i)|Ψi,j\displaystyle=\sum_{i=1}^{I}\sum_{j=1}^{a_{i}}d_{i}\langle\langle\Psi^{i,j}|\tilde{\eta}(i)|\Psi^{i,j}\rangle\rangle

where in the second line we used the Parseval identity (Eq. 27) to move to Fourier space, and in the third line we used the explicit form of η~ideal(i)\tilde{\eta}_{\text{ideal}}(i) (Eq. 30). To first order in (η~(i)η~ideal(i))\left(\tilde{\eta}(i)-\tilde{\eta}_{\text{ideal}}(i)\right), we have that

j=1aiΨi,j|η~(i)|Ψi,jj=1aiλi,j\sum_{j=1}^{a_{i}}\langle\langle\Psi^{i,j}|\tilde{\eta}(i)|\Psi^{i,j}\rangle\rangle\approx\sum_{j=1}^{a_{i}}\lambda_{i,j}

Therefore, we can rewrite Eq. 31 as

Favi=1Idij=1aiλi,j+dd2+dF_{\text{av}}\approx\frac{\sum_{i=1}^{I}d_{i}\sum_{j=1}^{a_{i}}\lambda_{i,j}+d}{d^{2}+d}

which is the same form as Eq. 5 in the case of gate-independent noise.

Appendix B The generalized Clifford group is a unitary 2-design

In this Appendix, we prove the generalized Clifford group considered in Section IV.2 is a unitary 2-design. We will give a fully general treatment for arbitrary sets of nn qudits with d>2d>2 prime, although we need only the case of n=1n=1, d=3d=3 for our subspace benchmarking above. This result can be inferred from results proven in [54], but we give a direct proof below. We first review the construction of the generalized Clifford groups as introduced in [49].

For a dd-level system, define analogues of the XX and ZZ qubit operators [50]:

X|z=|z+1Z|z=ωz|zX|z\rangle=|z+1\rangle\qquad Z|z\rangle=\omega^{z}|z\rangle

where ω:=e2πi/d\omega:=e^{2\pi i/d} and addition is performed modulo dd. These generalized XX and ZZ operators are unitary and satisfy ZX=ωXZZX=\omega XZ.

For a set of nn qudits, define the dd-dimensional generalization of the Pauli group as (this only holds for dd odd; see [49] for the definition for dd even):

𝒫:={ωηX1a1Z1b1XnanZnbn:η,ai,bid}.\mathcal{P}:=\{\omega^{\eta}X_{1}^{a_{1}}Z_{1}^{b_{1}}\cdots X_{n}^{a_{n}}Z_{n}^{b_{n}}:\eta,a_{i},b_{i}\in\mathbbm{Z}_{d}\}.

We will write a general element of the Pauli group as

ωηX1a1Z1b1XnanZnbn:=ωηXZ(v),v:=(ab).\omega^{\eta}X_{1}^{a_{1}}Z_{1}^{b_{1}}\cdots X_{n}^{a_{n}}Z_{n}^{b_{n}}:=\omega^{\eta}X\!\!Z(\vec{v}),\quad\vec{v}:=\left(\begin{smallmatrix}\vec{a}\\ \vec{b}\end{smallmatrix}\right).

Multiplication of general elements of the Pauli group is given by

XZ(v)XZ(w)=ωvTQwXZ(v+w)X\!\!Z(\vec{v})X\!\!Z(\vec{w})=\omega^{\vec{v}^{T}Q\vec{w}}X\!\!Z(\vec{v}+\vec{w})

where QQ is defined by Q=(00𝟙0)Q=\left(\begin{smallmatrix}0&0\\ \mathbbm{1}&0\end{smallmatrix}\right). This demonstrates that 𝒫\mathcal{P} is indeed a group.

The generalized Clifford group is defined to be the set of all unitaries that stabilize 𝒫\mathcal{P}:

G={U:U𝒫U=𝒫}.G=\{U:U\mathcal{P}U^{\dagger}=\mathcal{P}\}.

An element UGU\in G is defined (up to a global phase) by its action on XiX_{i} and ZiZ_{i}. We define the matrix MM and vector h\vec{h} such that for each unit vector e^id2d\hat{e}_{i}\in\mathbbm{Z}_{d}^{2d} we have

UXZ(e^i)U=ωhiXZ(Me^i)UX\!\!Z(\hat{e}_{i})U^{\dagger}=\omega^{h_{i}}X\!\!Z(M\hat{e}_{i})

It then follows that a general element XZ(a)X\!\!Z(a) is transformed as

UXZ(v)U=ωηXZ(Mv)η:=(hdiag(MTQM)2)Tv+vT(MTQMQ)v2\begin{array}[]{c}UX\!\!Z(\vec{v})U^{\dagger}=\omega^{\eta}X\!\!Z(M\vec{v})\\ \eta:=\left(\vec{h}-\frac{\text{diag}(M^{T}QM)}{2}\right)^{T}\vec{v}+\vec{v}^{T}\left(M^{T}QM-Q\right)\frac{\vec{v}}{2}\end{array} (32)

Not every matrix MM can be realized by a unitary operator. To derive a restriction on MM, we consider the commutation relation (where we define P=QQTP=Q-Q^{T}):

XZ(v)XZ(w)\displaystyle X\!\!Z(\vec{v})X\!\!Z(\vec{w}) =ωvTPwXZ(w)XZ(v)\displaystyle=\omega^{\vec{v}^{T}P\vec{w}}X\!\!Z(\vec{w})X\!\!Z(\vec{v})
UXZ(v)XZ(w)U\displaystyle UX\!\!Z(\vec{v})X\!\!Z(\vec{w})U^{\dagger} =ωvTPwUXZ(w)XZ(v)U\displaystyle=\omega^{\vec{v}^{T}P\vec{w}}UX\!\!Z(\vec{w})X\!\!Z(\vec{v})U^{\dagger}
XZ(Mv)XZ(Mw)\displaystyle X\!\!Z(M\vec{v})X\!\!Z(M\vec{w}) =ωvTPwXZ(Mw)XZ(Mv)\displaystyle=\omega^{\vec{v}^{T}P\vec{w}}X\!\!Z(M\vec{w})X\!\!Z(M\vec{v})
ωvTMTPMwXZ(Mw)XZ(Mv)\displaystyle\omega^{\vec{v}^{T}M^{T}PM\vec{w}}X\!\!Z(M\vec{w})X\!\!Z(M\vec{v}) =ωvTPwXZ(Mw)XZ(Mv)\displaystyle=\omega^{\vec{v}^{T}P\vec{w}}X\!\!Z(M\vec{w})X\!\!Z(M\vec{v})

where we have ignored phase factors common to both sides. We see that we must have P=MTPMP=M^{T}PM; such an MM is called a symplectic matrix. This is the only restriction on M,hM,h, as [49] demonstrated how to explicitly construct unitaries to implement any M,hM,h provided MM is symplectic.

To prove GG forms a unitary 22-design, we need to show (see Section IV.2 of the main text)

1|G|UGp(U,U)=𝑑Up(U,U)\frac{1}{|G|}\sum_{U\in G}p(U,U^{*})=\int dU\ p(U,U^{*})

for any balanced polynomial p(U,U)p(U,U^{*}) of degree at most 22 in the elements of UU and UU^{*}. Any such p(U,U)p(U,U^{*}) can be written as a linear combination of terms of the form UAUBUCUUAU^{\dagger}BUCU^{\dagger} and UDUUDU^{\dagger}, where A,B,C,DA,B,C,D are matrices. We are thus reduced to proving

1|G|UGUAUBUCU=𝑑UUAUBUCU\frac{1}{|G|}\sum_{U\in G}UAU^{\dagger}BUCU^{\dagger}=\int dU\ UAU^{\dagger}BUCU^{\dagger} (33)
1|G|UGUDU=𝑑UUDU\frac{1}{|G|}\sum_{U\in G}UDU^{\dagger}=\int dU\ UDU^{\dagger} (34)

for arbitrary matrices A,B,C,DA,B,C,D.

In the following, we will make repeated use of an elementary identity of complex roots of unity.

Fact 5.

If wd2n{0}\vec{w}\in\mathbbm{Z}_{d}^{2n}\setminus\{0\} is any nonzero vector, then

vωvTw=0.\sum_{\vec{v}}\omega^{\vec{v}^{T}\vec{w}}=0.

B.1 Degree 1 polynomials

Let’s start by proving Eq. 34. Without loss of generality, we can assume D=XZ(v)D=X\!\!Z(\vec{v}), since such matrices form a basis. The RHS of this equation is invariant under conjugation by arbitrary unitaries; thus, it must be proportional to the identity matrix. Noting that Tr(RHS)=Tr(D)\operatorname{Tr}(\text{RHS})=\operatorname{Tr}(D) and that Tr[XZ(v)]=0\operatorname{Tr}\left[X\!\!Z(\vec{v})\right]=0 whenever v0\vec{v}\neq 0, we find

RHS ={𝟙,v=00,else.\displaystyle=\left\{\begin{array}[]{ll}\mathbbm{1},&\vec{v}=0\\ 0,&\text{else}.\end{array}\right.

We evaluate the LHS by using Eq. 32 for the conjugation of a general Pauli element:

LHS =1|G|UGUXZ(v)U\displaystyle=\frac{1}{|G|}\sum_{U\in G}UX\!\!Z(\vec{v})U^{\dagger}
=1|G|M,hMTPM=PωηXZ(Mv)\displaystyle=\frac{1}{|G|}\sum_{\begin{subarray}{c}M,\vec{h}\\ M^{T}PM=P\end{subarray}}\omega^{\eta}X\!\!Z(M\vec{v})

We note that η=hTv+()\eta=\vec{h}^{T}\vec{v}+(\cdots), where ()(\cdots) denotes terms that do not depend on h\vec{h}. We see by Fact 5 that for fixed MM the sum over h\vec{h} gives zero unless v=0\vec{v}=0, while when v=0\vec{v}=0 it is clear LHS=𝟙\text{LHS}=\mathbbm{1}. This proves Eq. 34.

B.2 Degree 2 polynomials

We now turn to Eq. 33. We prove this using methods from [9], who proved the case d=2d=2. First, we note that the RHS of Eq. 33 is covariant in BB: sending BUBUB\rightarrow UBU^{\dagger} sends RHSU(RHS)U\text{RHS}\rightarrow U(\text{RHS})U^{\dagger} for any unitary UU. The only covariant linear functions of BB are Tr(B)𝟙dn\frac{\operatorname{Tr}(B)\mathbbm{1}}{d^{n}} and [BTr(B)𝟙dn]\left[B-\frac{\operatorname{Tr}(B)\mathbbm{1}}{d^{n}}\right], so the RHS must be of the form [5]

RHS=q[BTr(B)𝟙dn]+pTr(B)𝟙dn.\text{RHS}=q\left[B-\frac{\operatorname{Tr}(B)\mathbbm{1}}{d^{n}}\right]+p\frac{\operatorname{Tr}(B)\mathbbm{1}}{d^{n}}. (35)

To determine pp we plug in B=𝟙B=\mathbbm{1} and note that

RHS=𝑑UUACU=Tr(AC)dn𝟙,\text{RHS}=\int dU\ UACU^{\dagger}=\frac{\operatorname{Tr}(AC)}{d^{n}}\mathbbm{1},

while simultaneously according to Eq. 35,

RHS=p𝟙\text{RHS}=p\mathbbm{1}

so p=Tr(AC)dnp=\frac{\operatorname{Tr}(AC)}{d^{n}}. To determine qq, we consider plugging in B=|ij|B=|i\rangle\langle j|. Denoting the result when plugging in B=|ij|B=|i\rangle\langle j| as (RHS)ij(\text{RHS})_{ij}, we can evaluate

i,ji|(RHS)ij|j\displaystyle\sum_{i,j}\langle i|(\text{RHS})_{ij}|j\rangle =i,j𝑑Ui|UAU|ij|UCU|j\displaystyle=\sum_{i,j}\int dU\ \langle i|UAU^{\dagger}|i\rangle\langle j|UCU^{\dagger}|j\rangle
=Tr(A)Tr(C).\displaystyle=\operatorname{Tr}(A)\operatorname{Tr}(C).

On the other hand, Eq. 35 gives

i,ji|(RHS)ij|j=(d2n1)q+p\sum_{i,j}\langle i|(\text{RHS})_{ij}|j\rangle=(d^{2n}-1)q+p

so q=dnTr(A)Tr(C)Tr(AC)dn(d2n1)q=\frac{d^{n}\operatorname{Tr}(A)\operatorname{Tr}(C)-\operatorname{Tr}(AC)}{d^{n}(d^{2n}-1)}. Thus in total, we have

RHS=dnTr(A)Tr(C)Tr(AC)dn(d2n1)[BTr(B)𝟙dn]+Tr(AC)Tr(B)𝟙d2n.\text{RHS}=\frac{d^{n}\operatorname{Tr}(A)\operatorname{Tr}(C)-\operatorname{Tr}(AC)}{d^{n}(d^{2n}-1)}\left[B-\frac{\operatorname{Tr}(B)\mathbbm{1}}{d^{n}}\right]\\ +\frac{\operatorname{Tr}(AC)\operatorname{Tr}(B)\mathbbm{1}}{d^{2n}}. (36)

Without loss of generality, we can specialize to the case where A=XZ(vA)A=X\!\!Z(\vec{v}_{A}), B=XZ(vB)B=X\!\!Z(\vec{v}_{B}), and C=XZ(vC)C=X\!\!Z(\vec{v}_{C}), whence Eq. 36 gives

RHS={XZ(vB),vA=vC=0ωvATQvA𝟙,vA=vC0,vB=0ωvATQvAd2n1XZ(vB),vA=vC0,vB00,else.\text{RHS}=\left\{\begin{array}[]{ll}X\!\!Z(\vec{v}_{B}),&\vec{v}_{A}=\vec{v}_{C}=0\\ \omega^{-\vec{v}_{A}^{T}Q\vec{v}_{A}}\mathbbm{1},&\vec{v}_{A}=-\vec{v}_{C}\neq 0,\ \vec{v}_{B}=0\\ -\frac{\omega^{-\vec{v}_{A}^{T}Q\vec{v}_{A}}}{d^{2n}-1}X\!\!Z(\vec{v}_{B}),&\vec{v}_{A}=-\vec{v}_{C}\neq 0,\ \vec{v}_{B}\neq 0\\ 0,&\text{else}.\end{array}\right.

We now need to evaluate the LHS of Eq. 33 for each of the four cases above. In the first case, we find

LHS=1|G|UGXZ(vB)=XZ(vB)\displaystyle\text{LHS}=\frac{1}{|G|}\sum_{U\in G}X\!\!Z(\vec{v}_{B})=X\!\!Z(\vec{v}_{B})

In the second case, we use Eq. 32 to simplify each summand in the LHS

U\displaystyle U XZ(vA)UUXZ(vC)U\displaystyle X\!\!Z(\vec{v}_{A})U^{\dagger}UX\!\!Z(\vec{v}_{C})U^{\dagger}
=ωηA+ηCXZ(MvA)XZ(MvC)\displaystyle=\omega^{\eta_{A}+\eta_{C}}X\!\!Z(M\vec{v}_{A})X\!\!Z(M\vec{v}_{C})
=ωηA+ηC+vATMTQMvC𝟙\displaystyle=\omega^{\eta_{A}+\eta_{C}+\vec{v}_{A}^{T}M^{T}QM\vec{v}_{C}}\mathbbm{1}
=ωvAT(MTQMQ)vAvATMTQMvA𝟙\displaystyle=\omega^{\vec{v}_{A}^{T}\left(M^{T}QM-Q\right)\vec{v}_{A}-\vec{v}_{A}^{T}M^{T}QM\vec{v}_{A}}\mathbbm{1}
=ωvATQvA𝟙.\displaystyle=\omega^{-\vec{v}_{A}^{T}Q\vec{v}_{A}}\mathbbm{1}.

Therefore, the average over the group GG gives ωvATQvA𝟙\omega^{-\vec{v}_{A}^{T}Q\vec{v}_{A}}\mathbbm{1}.

In the third case, we again simplify each summand using Eq. 32, but with an additional BB in between:

UXZ(vA)UXZ(vB)UXZ(vC)U\displaystyle UX\!\!Z(\vec{v}_{A})U^{\dagger}X\!\!Z(\vec{v}_{B})UX\!\!Z(\vec{v}_{C})U^{\dagger}
=ωηA+ηCXZ(MvA)XZ(vB)XZ(MvC)\displaystyle\ =\omega^{\eta_{A}+\eta_{C}}X\!\!Z(M\vec{v}_{A})X\!\!Z(\vec{v}_{B})X\!\!Z(M\vec{v}_{C})
=ωηA+ηC+vATMTQvBvBTQMvAvATMTQMvAXZ(vB)\displaystyle\ =\omega^{\eta_{A}+\eta_{C}+\vec{v}_{A}^{T}M^{T}Q\vec{v}_{B}-\vec{v}_{B}^{T}QM\vec{v}_{A}-\vec{v}_{A}^{T}M^{T}QM\vec{v}_{A}}X\!\!Z(\vec{v}_{B})
=ωvATMTPvBvATQvAXZ(vB).\displaystyle\ =\omega^{\vec{v}_{A}^{T}M^{T}P\vec{v}_{B}-\vec{v}_{A}^{T}Q\vec{v}_{A}}X\!\!Z(\vec{v}_{B}).

The average over h\vec{h} does not affect this sum, so we only need to consider the average over MM. We evaluate the average by realizing that if dd is prime, the Clifford group sends every non-identity Pauli string to every other non-identity Pauli string uniformly. Thus, letting MM run over all symplectic matrices makes MvAM\vec{v}_{A} run uniformly over all vectors MvAd2n{0}M\vec{v}_{A}\in\mathbbm{Z}_{d}^{2n}\setminus\{0\}. Therefore, the LHS is given by

LHS =1d2n1v0ωvTPvBvATQvAXZ(vB)\displaystyle=\frac{1}{d^{2n-1}}\sum_{\vec{v}\neq 0}\omega^{\vec{v}^{T}P\vec{v}_{B}-\vec{v}_{A}^{T}Q\vec{v}_{A}}X\!\!Z(\vec{v}_{B})
=ωvATQvAd2n1XZ(vB)[1vωvTPvB]\displaystyle=-\frac{\omega^{-\vec{v}_{A}^{T}Q\vec{v}_{A}}}{d^{2n-1}}X\!\!Z(\vec{v}_{B})\left[1-\sum_{\vec{v}}\omega^{\vec{v}^{T}P\vec{v}_{B}}\right]
=ωvATQvAd2n1XZ(vB)\displaystyle=-\frac{\omega^{-\vec{v}_{A}^{T}Q\vec{v}_{A}}}{d^{2n-1}}X\!\!Z(\vec{v}_{B})

where in the final step, we used Fact 5.

In the last case, we have that each summand is of the form

UXZ(vA)UXZ(vB)UXZ(vC)U\displaystyle UX\!\!Z(\vec{v}_{A})U^{\dagger}X\!\!Z(\vec{v}_{B})UX\!\!Z(\vec{v}_{C})U^{\dagger}
=ωηA+ηC+vATMTQvBvBTQMvAvATMTQMvAXZ(vB)\displaystyle\ =\omega^{\eta_{A}+\eta_{C}+\vec{v}_{A}^{T}M^{T}Q\vec{v}_{B}-\vec{v}_{B}^{T}QM\vec{v}_{A}-\vec{v}_{A}^{T}M^{T}QM\vec{v}_{A}}X\!\!Z(\vec{v}_{B})
=ωhT(vA+vC)+()XZ(vB)\displaystyle\ =\omega^{\vec{h}^{T}(\vec{v}_{A}+\vec{v}_{C})+(\cdots)}X\!\!Z(\vec{v}_{B})

where ()(\cdots) represents terms that are independent of h\vec{h}. We can again apply Fact 5 to find that the sum over h\vec{h} gives zero. We have thus proved LHS=RHS\text{LHS}=\text{RHS} for each of the four cases, which establishes Eq. 33.

Appendix C Leakage RB irreps

Let GG be a unitary group indexed by bBb\in B,

G\displaystyle G ={Ub,σ:bBσ=±1}\displaystyle=\{U_{b,\sigma}:b\in B\ \sigma=\pm 1\}
={U1,bσU2,b:bB,σ=±1},\displaystyle=\{U_{1,b}\oplus\sigma U_{2,b}:b\in B,\ \sigma=\pm 1\},

where G1={U1,b:bB}G_{1}=\{U_{1,b}:b\in B\} and G1={U2,b:bB}G_{1}=\{U_{2,b}:b\in B\} are each unitary 1-designs on their respective subspaces. First, we prove that |𝟙1|\mathbbm{1}_{1}\rangle\rangle and |𝟙2|\mathbbm{1}_{2}\rangle\rangle are the only trivial irreps of the natural representation of GG. Next, we prove that if G1G_{1} and G2G_{2} are in addition unitary 2-designs and d1d2d_{1}\neq d_{2} then 1\mathcal{H}_{1\perp} is irreducible and multiplicity-free.

We start with the trivial irreps. It is clear that both |𝟙1|\mathbbm{1}_{1}\rangle\rangle and |𝟙2|\mathbbm{1}_{2}\rangle\rangle are trivial irreps. The trivial irrep has χ0(U)=1\chi_{0}(U)=1, so Fact 4 gives

a0\displaystyle a_{0} =1|G|UGχ(U)\displaystyle=\frac{1}{|G|}\sum_{U\in G}\chi(U)
=12|B|bBσ=±Tr(Ub,σUb,σ)\displaystyle=\frac{1}{2|B|}\sum_{\begin{subarray}{c}b\in B\\ \sigma=\pm\end{subarray}}\operatorname{Tr}(U_{b,\sigma}\otimes U_{b,\sigma}^{*})
=12|B|bBσ=±[Tr(U1,bU1,b)+σTr(U1,bU2,b)+σTr(U2,bU1,b)+Tr(U2,bU2,b)]\displaystyle=\frac{1}{2|B|}\sum_{\begin{subarray}{c}b\in B\\ \sigma=\pm\end{subarray}}\left[\begin{array}[]{l}\operatorname{Tr}(U_{1,b}\otimes U_{1,b}^{*})+\sigma\operatorname{Tr}(U_{1,b}\otimes U_{2,b}^{*})\\ +\sigma\operatorname{Tr}(U_{2,b}\otimes U_{1,b}^{*})+\operatorname{Tr}(U_{2,b}\otimes U_{2,b}^{*})\end{array}\right]
=1|B|bB[Tr(U1,bU1,b)+Tr(U2,bU2,b)]\displaystyle=\frac{1}{|B|}\sum_{b\in B}\left[\operatorname{Tr}(U_{1,b}\otimes U_{1,b}^{*})+\operatorname{Tr}(U_{2,b}\otimes U_{2,b}^{*})\right]
=𝑑U1Tr(U1U1)+𝑑U2Tr(U2U2)\displaystyle=\int dU_{1}\operatorname{Tr}(U_{1}\otimes U_{1}^{*})+\int dU_{2}\operatorname{Tr}(U_{2}\otimes U_{2}^{*})

where in the last line we used the fact that G1G_{1} and G2G_{2} are unitary 1-designs. These integrals just give the number of trivial irreps of the full unitary group on 1\mathcal{H}_{1} and 2\mathcal{H}_{2}, respectively, which are known to be 11. Thus, there are only two trivial irreps of the full unitary group.

Now, we consider 1\mathcal{H}_{1\perp}. First, we show 1\mathcal{H}_{1\perp} is irreducible by using Fact 3. Noting χ1,(Ub,±)=(|Tr(U1,b)|21)\chi_{1,\perp}(U_{b,\pm})=\left(|\operatorname{Tr}(U_{1,b})|^{2}-1\right), we have

1|G|UG|χ1(U)|2\displaystyle\frac{1}{|G|}\sum_{U\in G}|\chi_{1\perp}(U)|^{2} =12|B|bBσ=±(|Tr(U1,b)|21)2\displaystyle=\frac{1}{2|B|}\sum_{\begin{subarray}{c}b\in B\\ \sigma=\pm\end{subarray}}\left(|\operatorname{Tr}(U_{1,b})|^{2}-1\right)^{2}
=1|B|bB(|Tr(U1,b)|21)2\displaystyle=\frac{1}{|B|}\sum_{b\in B}\left(|\operatorname{Tr}(U_{1,b})|^{2}-1\right)^{2}
=𝑑U1(|Tr(U1)|21)2\displaystyle=\int dU_{1}\ \left(|\operatorname{Tr}(U_{1})|^{2}-1\right)^{2}
=1\displaystyle=1

where the third equality follows from the unitary 2-design property, and the fourth follows from the fact that 1\mathcal{H}_{1\perp} is an irrep of the natural representation of the full unitary group on 11\mathcal{H}_{1}\otimes\mathcal{H}_{1}. Thus, we have 1\mathcal{H}_{1\perp} irreducible.

To finish, we must prove that no other irrep of the natural representation is isomorphic to 1\mathcal{H}_{1\perp}. Every irrep of the natural representation is a subrepresentation of 11\mathcal{H}_{1}\otimes\mathcal{H}_{1}, 12\mathcal{H}_{1}\otimes\mathcal{H}_{2}, 21\mathcal{H}_{2}\otimes\mathcal{H}_{1}, or 22\mathcal{H}_{2}\otimes\mathcal{H}_{2}, since these subspaces are all invariant under the action of GG. We know that the decomposition of 11\mathcal{H}_{1}\otimes\mathcal{H}_{1} into irreps is 11101\mathcal{H}_{1}\otimes\mathcal{H}_{1}\simeq\mathcal{H}_{10}\otimes\mathcal{H}_{1\perp}, by our work above, and thus no irreps in 11\mathcal{H}_{1}\otimes\mathcal{H}_{1} can be isomorphic to 1\mathcal{H}_{1\perp} besides 1\mathcal{H}_{1\perp} itself. Similarly, we know that the decomposition of 22\mathcal{H}_{2}\otimes\mathcal{H}_{2} into irreps is 22202\mathcal{H}_{2}\otimes\mathcal{H}_{2}\simeq\mathcal{H}_{20}\otimes\mathcal{H}_{2\perp}. We can ensure 1≄2\mathcal{H}_{1\perp}\not\simeq\mathcal{H}_{2\perp} by requiring d1d2d_{1}\neq d_{2}, as in the main text. We then have that no isomorphic representation exists in 22\mathcal{H}_{2}\otimes\mathcal{H}_{2}. For 12\mathcal{H}_{1}\otimes\mathcal{H}_{2}, and similarly for 21\mathcal{H}_{2}\otimes\mathcal{H}_{1}, we note that the character of the subrepresentation 12\mathcal{H}_{1}\otimes\mathcal{H}_{2} is given by χ12(Ub,σ)=σTr(U1,b)Tr(U2,b)\chi_{12}(U_{b,\sigma})=\sigma\operatorname{Tr}(U_{1,b})\operatorname{Tr}(U_{2,b})^{*}, and use Fact 4:

1|G|\displaystyle\frac{1}{|G|} UGχ1(U)χ12(U)\displaystyle\sum_{U\in G}\chi_{1\perp}^{*}(U)\chi_{12}(U)
=12|B|bBσ=±σ(|Tr(U1,b1)|21)Tr(U1,b)Tr(U2,b)\displaystyle=\frac{1}{2|B|}\sum_{\begin{subarray}{c}b\in B\\ \sigma=\pm\end{subarray}}\sigma(|\operatorname{Tr}(U_{1,b_{1}})|^{2}-1)\operatorname{Tr}(U_{1,b})\operatorname{Tr}(U_{2,b})^{*}
=0\displaystyle=0

which shows that 1\mathcal{H}_{1\perp} is an irrep with multiplicity 11.

Note that we could also consider a group

G={Ub,ϕ:bB}={U1,b(eiϕU2,b):bB}G^{\prime}=\{U_{b,\phi}:b\in B\}=\{U_{1,b}\oplus(e^{i\phi}U_{2,b}):b\in B\}

with an arbitrary phase between subspaces 11 and 22 rather than simply a ±1\pm 1 phase; the proof is identical. Many experimental platforms can easily implement a random phase between two subspaces, especially if the leakage subspace is at a different energy than the computational subspace, making this group potentially easier to sample from. We can also still compute FΛ,1F_{\Lambda,1} with {U2,a}\{U_{2,a}\} only a unitary 11-design, provided 22\mathcal{H}_{2}\otimes\mathcal{H}_{2} does not contain an irrep isomorphic to 1\mathcal{H}_{1\perp}. Finally, in the case that d1=d2d_{1}=d_{2}, we can instead simply require that there exists some bBb\in B such that |Tr(U1,b)|2|Tr(U2,b)|2|\operatorname{Tr}(U_{1,b})|^{2}\neq|\operatorname{Tr}(U_{2,b})|^{2}, a much weaker condition that still suffices to ensure 1≄2\mathcal{H}_{1\perp}\not\simeq\mathcal{H}_{2\perp}.