# Information transfer fidelity in spin networks and ring-based quantum routers

- 875 Downloads
- 5 Citations

## Abstract

Spin networks are endowed with an information transfer fidelity (ITF), which defines an absolute upper bound on the probability of transmission of an excitation from one spin to another. The ITF is easily computable, but the bound can be reached asymptotically in time only under certain conditions. General conditions for attainability of the bound are established, and the process of achieving the maximum transfer probability is given a dynamical model, the translation on the torus. The time to reach the maximum probability is estimated using the simultaneous Diophantine approximation, implemented using a variant of the Lenstra–Lenstra–Lovász (LLL) algorithm. For a ring with uniform couplings, the network can be made into a metric space by defining a distance (satisfying the triangle inequality) that quantifies the lack of transmission fidelity between two nodes. It is shown that transfer fidelities and transfer times can be improved significantly by means of simple controls taking the form of nondynamic, spatially localized bias fields, opening up the possibility for intelligent design of spin networks and dynamic routing of information encoded in them, while being more flexible than engineering fixed couplings to favor some transfers, and less demanding than control schemes requiring fast dynamic controls.

### Keywords

Spin networks Quantum ring routers Information transfer fidelity Simultaneous Diophantine approximation Lenstra–Lenstra–Lovász (LLL) lattice basis reduction Information geometry## 1 Introduction

Efficient and controllable transport of information is crucial for information processing, both classical and quantum. While bosonic channels [1] are the most attractive option for long-distance communication, efficient on-chip interconnectivity in a quantum processor based on atomic, ionic or quantum dot-based qubits, or quantum spintronic devices [2], will require direct information transport through networks of coupled solid-state qubits. Such networks can be modeled via interacting spins and are therefore generally referred to as spin networks. Initiated by Bose’s [3] seminal work, spin networks have received considerable attention in recent years (see review articles [4, 5] and references therein). Most of the work has focused on information transmission through linear chains as prototype quantum wires, starting with unmodulated chains [3] and later perfect state transfer in chains with fixed, engineered couplings [6, 7], and finally controlled state transfer in spin chains, e.g., via adiabatic passage [8], ac modulation to achieve renormalization of the couplings between adjacent qubits [9], single-node bang–bang controls [10] or global dynamic controls [11]. Perfect state transfer in more general networks has also been considered, and some interesting results for complete graphs were obtained in [12].

Nonetheless, the information-theoretic properties of spin networks are not fully understood. Information encoded in excitations of a network of coupled spins propagates, even under ideal conditions when quantum coherence is maintained, in a nonclassical way determined by the Schrödinger equation. Under the best possible circumstances, this propagation of excitations determines the information transfer fidelity (ITF) between various nodes of the network.^{1} Perfect state transfer between two nodes can only be achieved when the information transfer fidelity between the respective nodes is unity. However, this condition is not sufficient. For example, while it is satisfied for the end nodes of a chain with uniform couplings [13], such chains are usually *not* considered to admit perfect state transfer except for chains of length two or three.

This raises the question of the attainability of the upper bound given by the information transfer fidelity. Attainability in general also depends on time constraints, i.e., attainable in what time, and the margins of errors we are willing to accept. In practice, some margin of error is unavoidable, and the real question of interest is therefore not whether we can achieve, e.g., *perfect*, i.e., unit fidelity, state transfer in time \(t_f\), but rather whether we can achieve state transfer with a fidelity \(1-\epsilon \), where \(\epsilon \) is an acceptable margin of error, in a reasonable amount of time. We may be willing to accept a slightly increased margin of error for a significant reduction in the transfer time. In this work, we are interested in such fundamental questions for spin networks subject to coherent dynamics in general, and specifically simple configurations such as a circular arrangement of spins (or spin ring for short), which could serve as basic building blocks for more complex architectures.

After introducing some basic definitions and basic results in Sect. 2, the concept of asymptotic ITF, i.e., maximum information transfer fidelity attainable absent constraints on the transfer times, between nodes in a network of spins is introduced in Sect. 3. Conditions for attainability of the bounds are derived using dynamic flows on tori and the simultaneous Diophantine approximation, computationally implemented using the Lenstra-Lenstra-Lovász (LLL) algorithm. Under certain conditions, the information transfer infidelity induces a metric that captures how close two nodes in a spin network are from an information-theoretic point of view. This information transfer geometry is investigated in Sect. 4. Finally, in Sect. 5, we investigate how the information transfer geometry of a network can be changed by means of simple controls in the form of fixed biases applied to individual nodes and how this principle could be employed for dynamic routing in a spin network with ring topology without the requirement of fast-switching controls.

## 2 Basic definitions and results

*N*spins arranged in some regular pattern with either XX or Heisenberg interaction [14] specified by the Hamiltonian

*i*and spin

*j*. The factor \(\sigma ^{x,y,z}_i\) is the Pauli matrix along the

*x*,

*y*, or

*z*direction of spin

*i*, i.e.,

*i*th position among the

*N*factors and \(\sigma ^{x,y,z}\) is either of the single spin Pauli operators

*H*acts is conveniently taken as \(\mathbb {C}^{2^N}\). We can abstract the network of spins as a graph \(\mathcal {G}=(\mathcal {V},\mathcal {E})\), where the vertices represent the spins and the edges indicate the presence of couplings.

*spin rings*, i.e., spin networks defined by a circular arrangement of spins, described by a

*J*-coupling matrix that is

*circulant*with

*nearest-neighbor coupling*:

*N*, closing the ring. For networks with uniform couplings, i.e., all nonzero couplings have equal strength

*J*(in units of Hz), we can set \(J=1\) by choosing time in units of \(J^{-1}\).

### 2.1 Single excitation subspace

Although many of the results in the following sections are more widely applicable, we primarily concern ourselves here with the single excitation subspace of the network [5], spanned by the *N* single excitation quantum states \(\{| i \rangle : i=1, \ldots , N\}\), where \(| i \rangle =| \uparrow \uparrow \cdots \uparrow \downarrow \uparrow \cdots \uparrow \rangle \) with \(\downarrow \) in the *i*th position indicating that spin *i* carries the excitation. The natural coupling among the spins allows the excitation at *i* to drift toward an excitation at *j* with an *information transfer fidelity* (*ITF*) that can be quantified by the maximum transition probability \(p_{\max }(i,j)\). This concept will be precisely defined in the next section, but in this introductory exposition, we could think of “maximum” as the process of giving the transition from spin *i* to *j* the correct amount of time so that it is most likely to occur. The concepts behind these ideas are lying at the foundation of quantum mechanics as embodied in the Feynman path integral. These concepts reveal that contrary to classical least-cost-path routing that follows a *single* path from a source to a destination in a classical network, quantum networks follow *all possible* paths from the state \(| i \rangle \) to the state \(| j \rangle \).

### 2.2 Eigendecomposition of the Hamiltonian

Restricted to the single excitation subspace \(\bar{\mathcal {H}}\cong \mathbb {C}^N\), the eigen decomposition of the Hamiltonian reads \(\bar{H}=\sum _k \lambda _k \varPi _k\), where \(\lambda _k\) for \(k=1,\ldots ,\widetilde{N}\le N\) are the distinct real eigenvalues and \(\varPi _k\) are the projectors onto the corresponding eigenspaces.

*N*with uniform XX coupling between adjacent spins, \(J_{ij}=J\) for \(i=j\pm 1\), \((i,j)=(1,N)\), \((i,j)=(N,1)\), and \(J_{ij}=0\) otherwise. In this case, the single excitation subspace Hamiltonian in the basis \(| i \rangle =(0,0,\ldots ,0,1,0,\ldots , 0)^T\) becomes the circulant matrix

*N*is utilized to indicate that the system has

*N*spins. For uniform Heisenberg coupling, the Hamiltonian is the same except for the addition of a multiple of the identity, which simply shifts the eigenvalues by a constant and does not affect the eigenvector structure or differences between eigenvalues. The eigenvalues and eigenvectors of circulant matrices are well known and shown in Table 1. The

*N*single excitation eigenvalues are conveniently parameterized by an integer

*k*running from 0 to \(N-1\) or 1 to

*N*with the cyclic condition that \(\lambda _{0}=\lambda _{N}\).

Eigenvalues and eigenvectors of Hamiltonian \(\bar{H}\) over single excitation subspace [15] in the basis where \(| i \rangle =e_i:=\left( 0 \ldots 0 ~ 1 ~ 0 \ldots 0 \right) ^T\). \(\rho _N=\exp (2\pi \imath /N)\) and \(| v_k \rangle _j\) denotes the *j*th component of \(| v_k \rangle \)

\(\lambda _{k=0,...,N-1}\) | \(| v_k \rangle _{j=0,...,N-1}\) | |
---|---|---|

XX coupling (\(\eta =0\)) | \(2\cos \left( \frac{2\pi k}{N}\right) \) | \(\sqrt{\frac{1}{N}} \rho _N^{k(j-1)}\) |

Heisenberg coupling (\(\eta =1\)) | \( 2\cos \left( \frac{2\pi k}{N}\right) +1\) | \( \sqrt{\frac{1}{N}} \rho _N^{k(j-1)} \) |

The following lemma regarding the eigenvalues will be helpful later.

**Lemma 1**

*N*with uniform XX couplings, we have:

- For
*N*even, but not divisible by 4, then the spectrum of \(\bar{H}_N\) has mirror symmetry relative to the origin; precisely, we have \(\lambda _k=\lambda _{N-k}= -\lambda _{N/2-k}=-\lambda _{N/2+k} \ne 0\), i.e., there are \(\tfrac{1}{2}N-1\) distinct pairs of double eigenvalues, and two single eigenvalues \(\pm 2\), giving a total of \(\widetilde{N}=(N+2)/2\) pairwise distinct eigenvalues:If$$\begin{aligned} \{-2, \lambda _k, 2: k=1, \ldots , \tfrac{1}{2}N-1 \}. \end{aligned}$$*N*is divisible by 4, then the spectrum has a total of \(\widetilde{N}=(N+2)/2\) pairwise distinct eigenvalues and a double eigenvalue at 0 (for \(k=\tfrac{1}{4}N, \tfrac{3}{4}N\)). - For
*N*odd, we have \(\lambda _{N-k} = \lambda _k \ne 0\) and there are \((N-1)/2\) distinct pairs of double eigenvalues and a single eigenvalue \(+2\), giving a total of \(\widetilde{N}:=(N+1)/2\) distinct eigenvalues:$$\begin{aligned} \{\lambda _k , +2: k=1,\ldots ,\tfrac{1}{2}(N-1)\}. \end{aligned}$$ - In either case, the number of pairwise distinct eigenvalues is$$\begin{aligned} \widetilde{N}:=\left\lceil \frac{N-1}{2}\right\rceil +1=\left\lceil \frac{N+1}{2}\right\rceil . \end{aligned}$$

*Proof*

The listed items are trivial. The last claim is the Cauchy interlacing property [16].

*N*is even, the single eigenvalue \(\lambda _{N/2}=-2\) has its eigenprojection denoted as \(\varPi _{N/2}:=| v_{N/2} \rangle \langle v_{N/2} |\). If, in addition,

*N*is divisible by 4, denote the eigenprojection of the double eigenvalue \(\lambda _{N/4}=\lambda _{3N/4}=0\) as \(\varPi _{N/4}:=| v_{N/4} \rangle \langle v_{N/4} |+| v_{3N/4} \rangle \langle v_{3N/4} |\). With this notation, the Hamiltonian restricted to the single excitation subspace can be written as

## 3 Maximum transfer fidelity and attainability

*i*. The quantum mechanical probability of transition from state \(| i \rangle \) to state \(| j \rangle \) in an amount of time

*t*is given by

*maximum transition probability*\(p_{\max }(i,j)\) also referred to as

*information transfer fidelity*(

*ITF*):

### 3.1 Attainability of bounds

*k*’s. Eigenspaces with \(s_k=0\) (where the (

*i*,

*j*) dependency is suppressed to avoid the clutter) have no overlap with the initial and/or target state and do not contribute to the sum. We shall refer to them as

*dark-state*subspaces. They can be ignored, and we can restrict ourselves to the set \(K'\subseteq \{0,1,\ldots ,\widetilde{N}-1 \}\) of indices

*k*for which \(s_k\ne 0\). The physical interpretation of \(K'\) is the set of eigenspaces \(\varPi _k \bar{\mathcal {H}}\) that have nontrivial overlap with the initial and target states. Noting that \(s_k=\pm 1\) for \(k\in K'\), and \(\exp [-\imath \tfrac{\pi }{2}(s_k-1)]=1\) for \(s_k=1\) and \(\exp [-\imath \tfrac{\pi }{2}(s_k-1)]=-1\) for \(s_k=-1\), we can write

Observe that all of the equations are compatible. Indeed, adding Eq. (8) for \((k,\ell )\) and \((\ell ,m)\) yields (8) for (*k*, *m*). Naturally, these equations are redundant, but we obtain a set of linearly independent equations if we exclude the dark-state subspaces and restrict ourselves to a suitable subset of equations, e.g., \((k_{i-1},k_i)\) or \((k_0,k_i)\) for \(K' = \{k'_1,k'_2,\ldots ,K'_{\bar{N}}\}\).

*Example 1*

**(Dark States for Rings.)** For ring systems with uniform XX coupling, the distinct eigenvalues are \(\lambda _k=2\cos (2\pi k /N)\). For eigenvalues of multiplicity 1, which occur for \(k=0\), and \(k=\tfrac{1}{2}N\) if *N* is even, \(\langle i |\varPi _0| j \rangle =(1/N) \ne 0\) and \(\langle i |\varPi _{N/2}| j \rangle =(1/N)(-1)^{i-j} \ne 0\); therefore, there are no dark states associated with these eigenvalues. For eigenvalues with multiplicity 2, \(\langle i |\varPi _k| j \rangle =\tfrac{2}{N}\cos (\tfrac{\pi }{2}n)\) with \(n=4k(i-j)/N\) for \(k=0,\ldots ,\lceil (N-4)/2 \rceil \); therefore, there are dark states if and only if *n* is an odd integer. This can happen only if *N* is divisible by 4. The same holds of rings with uniform Heisenberg coupling as they have the same eigenspace structure and the differences between eigenvalues are the same.

### 3.2 Simultaneous attainability and flows on the torus

*flow on the torus*\(\dot{x}=\omega _{k\ell }\), with \(x(0)=0\). In this dynamic formulation, the question is whether the flow starting at \(x(0)=0\) passes through the point with coordinates 0 or 1, depending on whether \(s_k=s_\ell \) or \(s_k \ne s_\ell \), respectively. It is well known [19, Prop.1.5.1] that the flow starting at an

*arbitrary*

*x*(0) (which includes \(x(0)=0\)) passes arbitrarily close to an arbitrary point on the torus if and only if the \(\omega _{k,\ell }\)’s are linearly independent over the rationals \(\mathbb {Q}\). This property of the flow getting arbitrarily close to an arbitrary point from an arbitrary initial condition is very strong and referred to as

*minimality*. Observe that for the flow to be minimal it suffices that starting at \(x(0)=0\), it gets arbitrarily close to any point. Obviously, minimality is sufficient but not necessary for attainability, as the latter only requires the flow to pass arbitrarily close to a specific point on the torus, while minimality guarantees that the flow can get arbitrarily close to any point.

Recall that Eq. (8) refers to a specific but arbitrary transfer \(| i \rangle \rightarrow | j \rangle \), as the signs depend on *i*, *j*. We could consider all Eq. (8)’s for all \(i \ne j\) and ask the question as to whether there exists a unique *t* such that attainability holds for all \(i \ne j\). We refer to this stronger version of attainability as *simultaneous attainability*.

*i*,

*j*) there are at least three nondark eigenspaces corresponding to \(s_d,s_m,s_n \in \{\pm 1\}\), then there must exist a pair, say (

*m*,

*n*), with \(s_m-s_n=0\). In this case, setting \(t = 2\tau /\omega _{mn}\) for \(\tau \in \mathbb {N}\) ensures that the (

*m*,

*n*) Eq. (9) holds

*exactly*and the remaining attainability equations become

*translation on the torus*, that is, \(x(\tau +1)=x(\tau )+\theta _{k\ell } \mod 2\) with initial condition \(x(0)=0\). By [19, Prop.1.4.1], the translation on the torus can come arbitrarily close to any point iff the elements in the set \(\{1\} \cup \{\theta _{k\ell } : (k,\ell )\in \mathcal {S}_0\}\) are linearly independent over \(\mathbb {Q}\). As before, the linear independence is sufficient, but not necessary for attainability. Note that we can in principle always reorder the eigenvalues so that the reference transition is \((m,n)=(1,2)\).

It should be noted that the attainability criteria above apply to any spin network. For specific types of networks, we can derive more explicit criteria.

*Example 2*

**(Attainability Condition for Rings.)**Given the formula for the eigenvalues for homogeneous rings, \(\lambda _k = 2\cos (2\pi k/N)\), elementary trigonometry shows that

*k*. In this case, the problem can easily be rectified by reordering the eigenvalues, e.g., so that \(s_0' = s_1'\) with the new ordering.

*Example 3*

**(Rational Independence.)**Applying the previous results to a ring of \(N=5\) spins, the number of pairwise distinct eigenvalues of the single excitation Hamiltonian \(\bar{H}\) is \(\widetilde{N}=3\) and there are two linearly independent transition frequencies \(\omega _{01}=-\tfrac{4}{\pi }\sin (\tfrac{1}{5}\pi ) \sin (\tfrac{1}{5}\pi )\) and \(\omega _{12}=-\tfrac{4}{\pi } \sin (\tfrac{3}{5}\pi ) \sin (\pi \tfrac{1}{5})\). To verify linear independence of \(\left\{ \sin (\tfrac{1}{5}\pi ), \sin (\tfrac{3}{5}\pi )\right\} \) over \(\mathbb {Q}\), we must show that the equation

*i*,

*j*).

*Example 4*

**(Rational Dependence for Even Rings.)**For a ring with \(N=10\) spins, there are \(\widetilde{N}=6\) distinct eigenvalues and five primary transition frequencies \(\omega _{k,k+1}\) for \(k=0,\ldots ,4\). Noting that \(\sin \left( \tfrac{5\pi }{10}\right) = 1\), \(\sin \left( \tfrac{\pi }{10}\right) = \sin \left( \tfrac{9\pi }{10}\right) = \tfrac{1}{4}(-1+\sqrt{5})\) and \(\sin \left( \tfrac{3\pi }{10}\right) = \sin \left( \tfrac{7\pi }{10}\right) = \tfrac{1}{4}( 1+\sqrt{5})\). It is easily seen that \(\alpha =(2,-2,1)\) is a \(\mathbb {Q}\)-solution to the linear dependence equation

*i*,

*j*).

*N*even, there are \(\tfrac{1}{2}N\) transition frequencies

*Example 5*

**(Rational Dependence for Odd Rings.)** Similarly, we can easily verify that for a ring with \(N=9\) spins, the transition frequencies are *not* rationally independent, as we have, e.g., \(\sin (7\pi /9)-\sin (5\pi /9) + \sin (\pi /9) = 0\) and thus \(\omega _{3,4}-\omega _{2,3}+\omega _{0,1}=0\).

In general, rational independence of the transition frequencies for homogeneous rings does *not* hold when *N* is not prime.

### 3.3 Simultaneous Diophantine approximation

*simultaneous Diophantine approximation*[22, 23, 24, 25] by finding integers \(p_{k\ell }, q\) such that

*p*/

*q*, with errors bounded as \(|\theta q-p|\le 1/q\), which is optimal among all rational approximations of denominators less than or equal to

*q*. The major hurdle at extending this result to the multi-dimensional case is that there is an incompatibility between the unimodular property of the multi-dimensional continued fraction (MCF) solution and optimality.

Nevertheless, the celebrated Dirichlet box principle shows that there are multi-dimensional approximations with \(c=1\) and \(\epsilon = 1/\bar{N}\), where in the present context \(\bar{N}=|\mathcal {S}_0|\). Moreover, there are *infinitely many* integer solutions *q* to the simultaneous Diophantine approximation; in other words, as \(\tau \) is allowed to become arbitrarily large, the above error can be made arbitrarily small. The constant \(c= 1\) can hardly be improved as for \(c<1\) there are *“badly approximable vectors”*\(\theta \in \mathbb {R}^{\bar{N}}\) defined by \(\liminf _{q\rightarrow \infty }q^{1/\bar{N}}d(\theta q,\mathbb {Z}^{\bar{N}})>0\) such that the simultaneous Diophantine approximation has only *finitely* many solutions [22, 26, Sec. 5]. If, however, *c* is allowed to depend on \(\bar{N}\), refined bounds (\(c<1\)) can be derived on \(c(\bar{N})\) due to the existence of infinitely many solutions [23]. Specializing the approximation to \(\bar{N}=2\), it can be shown [27] that the bound can be improved down to \(c=8/13\), along with \(\epsilon =1/2\). In the one-dimensional case Hurwitz’s theorem says that one can take \(c=1/\sqrt{5}\) and \(\epsilon =1\). On a general tone, the Dirichlet approximation can only be improved slightly and at the expense of considerable extra difficulties; we will therefore work exclusively with the Dirichlet approximation in the following.

*Example 6*

**(Simultaneous Diophantine Approximation with Constraints.)**In Example 3, the flow on the torus for a ring with \(N=5\) was found to be minimal, implying that we can get arbitrarily close to an arbitrary point on the torus. By the preceding argument, this guarantees existence of simultaneous Diophantine approximations of arbitrary accuracies with prescribed even/odd numerators. Furthermore, it is readily found that

*optimal rational approximations*[28, Chap. 10]. It is known that quadratic irrationality leads to continued fractions that eventually stabilize. The first convergents are

*all of them*have

*odd*numerators, while the approximations we require must have

*even*numerators since for the \(N=5\) ring \(s_0=s_1=1\). This can be rectified by using the so-called semi-convergents [29, Sec. V.4], [21]. Given two convergents ordered as \(p_{n-1}/q_{n-1} < p_n/q_n\), one can easily squeeze a semi-convergent between them as follows:

*n*’s such that \(p_{n-1}/q_{n-1} < p_n/q_n\). This is a corollary of the unimodular property of continuous fractions, saying that \(p_{n-1}q_n-p_nq_{n-1}\) is alternately \(\pm 1\).

*c*is a constant independent of \(\bar{N}\) and

*q*. The idea is to iteratively scale \(\theta \) by (the inverse of) a diagonal matrix of positive rational numbers, \(\bar{\theta }=Y(n)^{-1}\theta \), compute a Dirichlet-good approximation of \(\bar{\theta }\) using, e.g., the Dirichlet box principle, or the LLL-algorithm, or Lagarias’ multi-dimensional continued fractions (MCFs), and then revise the scaling to meet the even/odd constraints, with the hope that the procedure will converge. Write the Dirichlet-good approximation \(\bar{\theta } \approx \bar{p}/q\) and manipulate it as follows:

*q*and \(\bar{N}\). Because the initial choice of

*Y*(

*n*) is arbitrary, it is not guaranteed that \(Y(n)\bar{p}\) has the correct even/odd property. Nevertheless, we could revise

*Y*(

*n*) to meet those properties. If a component \(\bar{p}_i\) comes out to be odd and needs to be even, we choose \(Y(n+1)_{ii}=2\). If the algorithm has converged, that is \(Y(n+1)=Y(n)\), then the bound becomes

*i*th component becomes

**Theorem 1**

Given \(\theta \in \mathbb {R}^{\bar{N}}\), assuming \(\{Y(n)\}\) converges, there exists a simultaneous Diophantine approximation \(\theta \approx p/q\) satisfying prescribed even/odd constraints on the numerators \(p_i\), \(i=1,\ldots ,\bar{N}\), with an error bound \(\Vert \theta q - p\Vert _\infty \le 2/q^{1/\bar{N}}\) that is off the usual Dirichlet bound by a factor not exceeding 2.

*Example 7*

**(Simultaneous Diophantine Approximation with Constraints.)**We consider the same situation as in Example 6, where all convergents of \( \theta _{12}\) have odd numerators while attainability calls for an even numerator. We initiate the algorithm with \(Y(0)=1\), that is, \(\bar{\theta }=\theta =1+\sqrt{5}\). Whatever convergent \(\bar{p}/q\) we pick, it has odd numerator, and hence we take \(Y(1)=2\). We hence rewrite the continued fraction decomposition with \(\bar{\theta }=(1/2)\theta =(1+\sqrt{5})/2\), which gives the convergents

### 3.4 (Weighted) LLL-algorithm

Even though Theorem 1 guarantees that under convergence conditions, Dirichlet-good simultaneous Diophantine approximations can be manipulated so as to yield numerators that have prescribed even/odd properties, we are still left with the problem of coming up with simultaneous Diophantine approximations in the first place.

*nonuniform*diagonal scaling and work on the lattice \(\varLambda (\mathsf {s},X)\) generated by the columns of

*shortest*(in the sense of the Euclidean norm) lattice vector is to be sought among all lattice vectors of the form \(\sum _i \beta _i b^*(\mathsf {s},X)_i\), \(\left| \beta _i\right| \le \left( 2/\sqrt{3}\right) ^{\bar{N}+1}\). Lagarias’ theorem [24, Lemma 5] then implies that a

*shortest*Euclidean norm vector of the lattice is a

*best*

*X*-weighted Diophantine approximation. Observing that

*short*vector in the lattice \(B(\mathsf {s},X)\mathbb {Z}^{\bar{N}+1}\) provides a

*good*

*X*-weighted Diophantine approximation:

*shortest*vector, we construct the

*best*approximation, that is, the approximation that minimizes

Before proceeding any further, we take care of a technicality: As one would expect, the simulations also suggest that *q* grows without bound as \(\mathsf {s}\) decreases to zero. For the weighted LLL-algorithm, we can prove the following:

**Theorem 2**

*X*and 1, we have \(\lim _{\mathsf {s}\downarrow 0} \hat{q}(\mathsf {s})=\infty \).

*Proof*

Note that the result *appears* trivial from Eq. (14) except that the behavior of the last component of the first vector of the reduced basis has not yet been explored in the weighted case.

For practical computation of the time steps \(\tau =q\), we must find numerators \(p_{k\ell }\) that fulfill the odd/even constraints using the LLL-algorithm. The nonuniform variant introduced above makes it simpler to find suitable parameters *X* and \(\mathsf {s}\), but a search is still required. To automate the search, we use a standard genetic algorithm to find weight vectors *X* with a user-defined \(\mathsf {s}\) that minimize the number of parity constraint violations of the \(p_{k\ell }\). This works well in most cases, requiring only a few iterations (typically up to 5) for reasonably sized populations (about 200). We suggest that the standard crossover and mutation operators could be adjusted to improve the performance of the search. In particular, increasing the likelihood of changing the *X* values corresponding to denominators \(p_{k\ell }\) that violate a constraint and increasing the likelihood of retaining *X* values for which the corresponding \(p_{k\ell }\) do not violate the constraints may improve performance.

*Example 8*

**(Weighted LLL-Algorithm.)**Consider a ring with \(N=7\) spins and \(p_{\max }(1,3)\). There are four eigenspaces with projectors \(\varPi _k\), and three rationally independent transition frequencies \(\omega _{k,k+1} = (-0.7530, -1.6920, -1.3569)/\pi \). Noting that \(s_k = {\text {Sgn}}\langle 3 |\varPi _k| 1 \rangle \) for \(k=0,\ldots ,3\) yielding \(\mathbf {s} = (s_0,s_1,s_2,s_3) = (1,-1,-1,1)\), we choose \(\omega _{12}\) as reference frequency and set

Applying the classical LLL-algorithm to solve the simultaneous Diophantine approximation for \(\theta \) yields rational approximations of very high accuracy, as shown in Fig. 1a. However, most of the resulting approximations \(p_k/q\) do not satisfy the parity constraints. Using the weighted LLL-algorithm and varying the diagonal scaling vector *X* enable us to find solutions of arbitrary accuracy, as shown in Fig. 1b, all of which satisfy the parity constraints for the numerators \(p_k\).

The previous example illustrates how we can use the weighted LLL-algorithm to find optimal transfer times that yield very high transfer fidelities, and how we can control the margins of error and ensure the parity constraints are satisfied by adjusting the scaling parameter and diagonal weights in the algorithm.

### 3.5 Estimate of time to attain maximum probability

Our objective is to find an upper bound on the amount of time *t* it takes to achieve \(p_t(i,j) \ge p_{\max }(i,j) - \epsilon _{\mathrm {prob}}\), i.e., \(p_{\max }(i,j)-p_t(i,j) \le \epsilon _{\mathrm {prob}}\). The approach is to translate the specification on the probability \(\epsilon _{\mathrm {prob}}\) to a specification on the infinity norm of the simultaneous Diophantine approximation \(\Vert \epsilon _{\mathrm {Da}}\Vert _{\infty }\), where \(\epsilon _{\mathrm {Da}}=\theta q-p\).

*k*has been replaced by a sum over \(k \in K'\) as states with \(\langle i |\varPi _k| j \rangle =0\) do not contribute to the sum. The third equality stems from the fact that for fixed \(\ell \), \(\hbox {e}^{\imath \frac{\pi }{2}(s_\ell -1)+2\pi \imath n_\ell }\) is a global phase factor that is absorbed by the absolute value.

*t*is constrained to emerge from the Diophantine approximation:

**Theorem 3**

For homogeneous rings, the ITF specification \(p_t(i,j) \ge p_{\max }(i,j) - \epsilon _{\mathrm {prob}}\) is achieved at time \(t=2q/\omega _{mn}\) (in 1 / *J* units) if *q* is chosen so that simultaneous Diophantine approximation error \(\epsilon _{\mathrm {Da}}(q) := \mathbf {p}-\mathbf {\theta } q\) has its infinity norm satisfying (20) and \(\omega _{mn}\) is the reference transition with respect to which \(\mathbf {\theta }=(\theta _{k\ell })\) was defined in (10).

*q*that guarantees \(\epsilon _{\mathrm {prob}}\) is easily extracted from the above inequality

*N*. Further improvement of the scaling behavior could be achieved by utilizing tighter simultaneous Diophantine approximations [13, Th.2], [23], but at the expense of significantly complicating the notation. The reward for the conservativeness of this bound is that it is

*quite general*for rings with uniform coupling and their ITF attainable by the algorithm of Sect. 3.3, as it depends on neither the eigenvalues nor the odd/even pattern. Furthermore, it becomes

*very general*for any network subject to the mild modification of replacing \(\bar{N}\) by

*N*and \(|K'|\) by

*N*.

*Example 9*

**(Transfer Times—simulation results vs bounds.)** For a ring with \(N=5\), we have \(\widetilde{N}=3\) independent eigenspaces with two rationally independent transition frequencies and there are no dark subspaces. Hence, \(|K'|=3\) and we have \(\bar{N}=1\) independent \(\theta \). In this case, our conservative bound implies that we can get within \(\epsilon _{\mathrm {prob}}\) of the maximum transition probability in time \(12\pi /\epsilon _{\mathrm {prob}}\).

In practice, simulations suggest that we can achieve very high fidelities in much shorter times. Figure 2 shows that we can achieve \(>99.99\)% of the maximum transfer fidelity for any two nodes with distance 1 in time \(t=77.28\), and transfer between two nodes with distance 2 in time \(t=125\) (in units of 1 / *J*). Notice that the maximum distance between any two nodes in a homogeneous ring of size \(N=5\) is 2, and hence any transfer can be achieved to within 0.01% of the maximum possible in time \(t\le 125\).

As observed before, for rings of size \(N=6\), the primary transition frequencies are *not* rationally independent, implying that we do not have simultaneous attainability. Indeed, Fig. 3 (left) shows that the bound \(p_{\max }(1,2)\) is not attainable. Lack of simultaneous attainability does not imply that all bounds are not attainable. Indeed Fig. 3 (right) suggests near-perfect transfer between nodes of distance \(n=2\).

### 3.6 Transfer time versus decoherence time

In general there is a trade-off between the error \(\epsilon _{\mathrm {prob}}\) and the transfer time \(t_f\) required to achieve \(p_{t_f}(i,j)=1-\epsilon _{\mathrm {prob}}\). For actual physical realizations of quantum networks, decoherence is generally a limiting factor. In this case, the relationship between the error probability and the expected transfer time can be useful in estimating what error probabilities can be achieved based on the coherence time of the network \(t_{\mathrm {coh}}\).

For instance, in example 9, we showed that for a ring of size \(N=5\), we would achieve 99% of the maximum transfer probability between any two nodes in time \(T\le 125\) in units of the inverse coupling rate \(J^{-1}\), and we could therefore expect to closely approximate these transfer fidelities, provided the coherence time of the system is \(\gg 100 J^{-1}\).

*J*units) , at least for certain types of networks such as rings. In this case for the algorithm to work, it is necessary that

## 4 Information transfer (in-)fidelity metric and geometry

In this section, we come back to an issue raised in Sect. 3—namely that the upper bound derived in Eq. (4) can be justified by the fact that it induces a metric on the set of vertices. Unlike the results in the previous sections, most of the results in this section apply specifically to rings, although numerical simulations suggest that similar results may hold for other homogeneous spin networks such as chains.

### 4.1 Definition and motivation of ITF prametric

To develop a geometric picture, we can view a spin network as a pre-metric or more precisely a *prametric space*^{2} endowed with the prametric that quantifies the *information transfer infidelity* (*ITI*). To fix terminology, recall that given a graph \(\mathcal {G}=(\mathcal {V},\mathcal {E})\), or any set of points \(\mathcal {V}\) for that matter, a *prametric* [33, p. 666], [32, p.23] is a function \(d: \mathcal {V} \times \mathcal {V} \rightarrow \mathbb {R}_{\ge 0}\) such that **(i)**\(d(i,j) \ge 0\) and **(ii)**\(d(i,i)=0\).

*Packet Reception Rate*\(\mathrm {PRR}(i,j)\) is defined as the probability of successful transmission of the packets from sensor

*i*to sensor

*j*. After symmetrization of the packet reception rate, a prametric (in fact, a semi-metric [35, 36, 37]) can be defined as \(d(i,j)=-\log \mathrm {PRR}(i,j)\). Should there be a violation of the triangle inequality, say, \(d(i,j) > d(i,k)+d(k,j)\), then the distance between

*i*and

*j*is redefined as \(d(i,k)+d(k,j)\). The importance of the metric is that it provides a notion of network curvature, which has a dramatic impact on the traffic flow [38, 39] in a paradigm that extends to quantum chains [14]. Following sensor network intuition[34], we define

We could define the time-stamped prametric by \(d_t(i,j)=-\log p_t\left( | i \rangle ,| j \rangle \right) \) except that in general \(d_t(i,i) \ne 0\). To remedy this situation, we could define \(d(i,j)=\inf _{t \ge 0} d_t(i,j)=- \log \sup _{t \ge 0} p_t(i,j)\). Since, by Cauchy–Schwarz, \(p_t(i,i) \le 1\) and \(p_{t=0}(i,i)=1\), we have \(\sup _{t \ge 0}p_{t}(i,i)=1\) and hence \(d(i,i)=0\). This alternate prametric definition is equivalent to the earlier one when \(p_{\mathrm {max}}\) is attainable, but it reveals that this prametric makes the network of finite diameter (\(\sup _{i,j}d(i,j) < \infty \)) as \(N \rightarrow \infty \) as Theorem 4 will show. This has the unfortunate consequence of preventing a genuine large-scale analysis. As Sect. 5 will show, a bias rectifies this problem (see also [14]).

Generally, this information transfer infidelity prametric is not a proper distance satisfying the triangle inequality, but for certain networks such as rings with uniform coupling this prametric will be shown to define a proper distance.

This quantum mechanical (pra)metric is quite different from the usual Euclidean distance \(d_{\mathbb {E}}\) of the spins in the spintronic device. In particular, two spins that are physically close in the medium may be far quantum mechanically, and conversely. If two spins are quantum mechanically far, control is necessary to enable transmissions that are too weak or forbidden by the natural quantum mechanical couplings. This control of information can be viewed as the problem of controlling the quantum mechanical geometry of the network.

### 4.2 ITF distance geometry of homogeneous spin rings

It could be argued that a prametric is sufficient if we are solely interested in assessing the difficulty of communication or fidelity of information transfer between nodes in a network. However, a proper metric allows us to investigate other geometric properties such as the curvature of the network with regard to the ITF.

A *prametric*\(d: \mathcal {V} \times \mathcal {V} \rightarrow \mathbb {R}_{\ge 0}\) is a *pseudo-metric* if in addition to (i) \(d(i,j)\ge 0\), \(d(i,i)=0\), it satisfies (ii) \(d(i,j)=d(j,i)\) and (iii) the triangle inequality (\(d(i,j) \le d(i,k)+d(k,j)\)) holds. A *metric* or *distance* is a pseudo-metric that has (iv) the separation property: \(d(i,j)=0\) if and only if \(i=j\).

**Theorem 4**

*N*uniformly distributed spins with XX or Heisenberg couplings, \(d_N(i,j):=-\log p_{\max }(i,j)\) has the following properties:

- 1.
For

*N*odd, \((\mathcal {V}_N,d_N)\) is a metric space. - 2.
For

*N*even, \((\mathcal {V}_N,d_N)\) is a pseudo-metric space that becomes metric after antipodal point identification. - 3.
If \(N=p\) or \(N=2p\), where

*p*is a prime number, then the distances on the space of equivalence classes of spins are uniform, i.e., \(d_N(i,j)=c_N\) for \(i\ne j\). Otherwise, the distances are nonuniform. - 4.
In all cases \(\lim _{N \rightarrow \infty } d_N(i,j)=2\log \tfrac{\pi }{2}\), \(i\not = j \mod (\tfrac{1}{2}N)\).

*Proof*

To show that \((\mathcal {V}_N,d_N)\) is a pseudo-metric space, we need to verify that (i) \(d_N(i,i)=0\), (ii) \(d_N(i,j)=d_N(j,i)\), and (iii) the triangle inequality holds. For a metric space, we must further have (iv) \(d_N(i,j)\ne 0\) unless \(i=j\).

(i) is clearly satisfied as the projectors onto the eigenspaces are a resolution of the identity, \(\sum _k\varPi _k = I\), and thus for any unit vector \(| i \rangle \), we have \(\sum _{k=1}^N |\langle i |\varPi _k| i \rangle |= \sum _{k=1}^N \Vert \varPi _k | i \rangle \Vert ^2 =1\). (ii) follows from \(|\langle i |\varPi _k| j \rangle |=|\langle j |\varPi _k| i \rangle |\). The proof of the remaining properties relies on the circulant matrix property of the Hamiltonian \(\bar{H}\) in the single excitation subspace \(\mathcal {\bar{H}}\), as shown in Eq. (3) and Table 1.

*N*even. From Table 1, each of these double eigenvalues has two general complex conjugate eigenvectors. These general eigenvectors need not be orthogonal, but observing that \(\langle v_k \vert v_\ell \rangle =\delta _{k\ell }\) and \(\langle v_k \vert v_k^* \rangle =0\), where \(v_k^*\) denotes the complex conjugate, it follows that

**(iv)**. For \(N=2N'+2\), on the other hand, we also have \(\left| \cos (\tfrac{2\pi k N/2}{N})\right| =|\cos (\pi k)|=1\), and thus \(d(i,j)=0\) for \(i-j=\tfrac{1}{2}N\), i.e., the distance vanishes for antipodal points, and thus

*d*(

*i*,

*j*) is at most a pseudo-metric. However, noting that we can identify antipodal points \(| j \rangle \) and \(| j+N'+1 \rangle \), let

*d*be defined on the set of equivalence classes \([| j \rangle ]\) for \(j=1,\ldots , N'+1\) instead. (The antipodal identification preserves the ring structure.) At this stage,

*d*is a

*semi-metric*[35, 36, 40], that is, it satisfies all axioms of a metric except the triangle inequality.

**(iii)**and hence parts (1) and (2) of the theorem.

*N*is not

*p*or 2

*p*, then

*N*and \((i-j)\) will have factors (which can be canceled) in common for some \((i-j)\) but not for others and hence we will obtain different distances.

*i*,

*j*is eliminated, provided \(i \not = j \mod (\tfrac{1}{2}N)\). Hence, taking the norm of the above and then \(-\log (\cdot )\), it follows that at the infinite ring limit, the distance is uniform for \(i \not = j + \mod (\tfrac{1}{2}N)\). Finally,

Case 3 of Theorem 4 allows for a very specific geometrization of the quantum ring in terms of constant curvature spaces. Define the *n*-sphere of curvature \(\kappa \) as \(\mathbb {S}^{n}_\kappa :=\{x \in \mathbb {R}^{n+1}:\Vert x\Vert ^2=1/\kappa \}\). We have the following corollary:

**Corollary 1**

*p*spins (\(p\ge 3 \) prime) arranged in a homogeneous ring with uniform ITI distance \(d_p(i,j)=c_p\), \(i \ne j\), is isometrically embeddable in \(\mathbb {S}^{p-1}_{\kappa }\) iff

*irreducibly*isometrically embeddable in \(\mathbb {S}^{p-2}_{\kappa }\) for

*Notes:* In the above, *“irreducibly* embeddable” means that the embedding cannot happen into a lower-dimensional constant curvature space. By convention, \(\cos ^{-1}\) takes values in \([\pi /2,\pi ]\).

Note that this corollary deals with embeddability *of the vertices only;* however, edges can be mapped isometrically as arcs of great circles on either the sphere of curvature (31) or that of curvature (32). Also note that the symmetry of the simple \(p=3\) case of the circle \(\mathbb {S}^1\) circumscribed to a equilateral triangle is misleading, as in very high dimension (\(p \rightarrow \infty \)), Eq. (32) yields \(1/\sqrt{\kappa }=:R \rightarrow \frac{c_p}{\pi /2}\), that is, all vertices are mapped to the half-sphere of radius *R*.

Regarding \(N=2p\) in Case 3, we could first do the antipodal identification on the *combinatorial* ring \((\mathcal {V}_{2p},\mathcal {E}_{2p})\), leading to a \((\mathcal {V}_p,\mathcal {E}_p)\) ring, and then embed \((\mathcal {V}_p,\mathcal {E}_p)\) as in the preceding corollary.

Regarding Case 4 when *N* is odd, define \(\epsilon :=\max _{i \ne j}|d_N(i,j)-2\log (\pi /2)|\). Then the metric space \((\mathcal {V}_N,d_N)\) can be mapped isometrically on the sphere \(\mathbb {S}^{N-2}_\kappa \) of radius \(d_\infty /\cos ^{-1}\left( -(N-1)^{-1}\right) \) up to an additive distortion not exceeding \(\epsilon \), that is, the embedding is quasi-isometric [42, 7.2.G]. The case of an even *N* is dealt with as before using antipodal identification. The geometry of a genuinely infinite ring (\(N=\infty \) rather than \(N \rightarrow \infty \)) is completely different and is left to future work.

The *N* even case can be dealt with in a different way. Rather than doing, first, a combinatorial antipodal identification (\(i=j\) if \(i-j=0 \mod (\tfrac{1}{2}N)\)) and, then, mapping the quotient space \(\mathcal {V}_N/\sim \) to the sphere, we could map the combinatorial antipodal points to geometrical antipodal points on the sphere \(\mathbb {S}^{N-2}_\kappa \) with the understanding that geometrical antipodal points on the sphere are identified to yield the real projective space \(\mathbb {RP}^{N-2}\). A slight generalization of (32) of Corollary 1 together with 4 of Theorem 4 yields an irreducible embedding of \((\mathcal {V}_N,d_N)\) into the sphere of curvature \(\kappa =\left( \left( \cos ^{-1}\left( -\frac{1}{N-1} \right) \right) /\left( 2\log \frac{\pi }{2}\right) \right) ^2\). On the other hand, \(\mathbb {RP}^{N-2}\) is usually endowed with the standard curvature 1 metric of diameter \(\pi /2\). To sum up:

**Corollary 2**

For *N* even, there is an embedding \(\mathcal {V}_N \hookrightarrow \mathbb {RP}^{N-2}\), which is quasi-isometric for the scaled distance \(d_N\cos ^{-1}\left( -\frac{1}{N-1} \right) /\left( 4 \log \frac{\pi }{2}\right) \) on \(\mathcal {V}_N\) and the curvature 1 distance on \(\mathbb {PR}^{N-2}\). Furthermore, for \(N \rightarrow \infty \) the distortion becomes vanishingly small.

## 5 Control of information transfer fidelity

To overcome intrinsic limitations on quantum state transfer or speed up transfer, one can either try to engineer spin chains or networks with nonuniform couplings [6, 7], or introduce dynamic control to change the network topology [9, 10, 11].

Our analysis above shows that engineering the couplings is not strictly necessary. For an XX or Heisenberg-type chain with uniform nearest-neighbor couplings, for example, it can easily be verified that the information transfer fidelity between the end spins is unity, and attainability of the bounds means that we can achieve arbitrarily high state transfer fidelities between the end spins if we wait long enough. Engineering the couplings, however, can speed up certain state transfer tasks such as state transfer between the end spins at the expense of others.

*control*to change the network geometry and hence speed up state transfer as well as enable some transfers that either were forbidden or had poor ITF. One way this can be achieved is to apply static electromagnetic bias fields to change the energy-level splittings between the spin-up and spin-down states for different nodes in the graph, as suggested e.g., in [12]. To see how the application of such bias fields can alter the transfer fidelities and network geometry, consider a simple, concrete example of a single bias field \(\zeta \) applied to node \(\ell \) in a spin ring with uniform coupling. First, due to translation invariance, we can always relabel the nodes so that the biased node is node

*N*. Then, assuming XX coupling, the Hamiltonian on the single excitation subspace becomes

*N*,

*N*).

Physically, applying a large bias field to the *N*th node in the ring results in a large detuning that effectively eliminates this node from the ring and breaks the ring open, leaving a chain of length \(N-1\). Hence, in the limit \(\zeta \rightarrow \infty \), we expect the transition fidelities for the first \(N-1\) nodes to approach those for a chain of length \(N-1\) while the transition fidelities between the first \(N-1\) nodes and the final (biased) node approach 0. We now reformulate this intuitively obvious result in precise mathematical language.

**Lemma 2**

The eigenvalues and eigenvectors of the \((N-1) \times (N-1)\) Toeplitz matrix \(T_{N-1}\) made up of ones on the super diagonal and subdiagonal and zeros everywhere else are given by \(\lambda _k=2\cos \left( \tfrac{\pi k}{N}\right) \) and \(| v_k \rangle _i=\sqrt{\tfrac{2}{N}}\sin \left( \tfrac{\pi k i}{N}\right) \); \(k=1,\ldots ,N-1\), \(i=1,\ldots ,N-1\). Furthermore, for *k* even, \(| v_k \rangle _1+| v_k \rangle _{N-1}=0\).

**Theorem 5**

*N*with bias \(\zeta \) on the

*N*th node. Then

*Proof*

*exactly one*eigenvalue \(\lambda _N(\zeta )\) goes to \(\infty \), while the remaining ones \(\lambda _1(\zeta ),..., \lambda _{N-1}(\zeta )\) converge to the roots of \(\det \left( \lambda I_{N-1}-T_{N-1}\right) =0\).

*unique*eigenvalue of \(T_{N-1}\), it follows that \(\lim _{\zeta \rightarrow \infty }| v_k(\zeta ) \rangle _{1:N-1}\) is the corresponding eigenvector of \(T_{N-1}\). It remains to show that with this \(| v_k \rangle _{1:N-1}\) the bottom eigenequation can be made to hold. This is easily achieved by defining

*k*even, we have \(\lim _{\zeta \rightarrow \infty } \zeta | v_k(\zeta ) \rangle _N =0\), and therefore the \(k<N\) eigenequation holds with \(| v_k(\zeta ) \rangle _N\) going to zero faster than \(1/\zeta \). For

*k*odd, \(| v_k(\zeta ) \rangle _N\) goes to zero as \(c/\zeta \), where \(c \ne 0\) is some constant.

The last \(k=N\) eigenequation easily implies that \(\zeta | v_N(\zeta ) \rangle _{1:N-1}\) remains bounded as \(\zeta \rightarrow \infty \). Therefore, \(\lim _{\zeta \rightarrow \infty } | v_N(\zeta ) \rangle _{1:N-1}=0\). To normalize the eigenvector, we take \(\lim _{\zeta \rightarrow \infty } | v_N(\zeta ) \rangle _N=1\). The latter together with (35) proves the theorem.

Thus, we have a systematic way to compute the asymptotic transfer probability of a ring with high bias from the transfer probability of a chain without bias.

*Example 10*

**(Dynamic Routing.)**As an illustration of how these results can be used, consider a ring of size \(N=9\). The maximum transfer fidelities between nodes \(i\ne j\) for this ring without bias are quite low, 0.4094 and 0.4444. However, applying a large bias to node 9 changes the maximum transfer fidelities. In particular, the maximum transfer fidelity between nodes 1 and 8, 2 and 7, 3 and 6 and 4 and 5 now approaches 1. Figure 6 shows a visual representation of the transfer fidelities for the ring without bias (left) and with bias (right). This result is consistent with Theorem 5, as using Lemma 2, it is easily verified that

*not*satisfy the parity constraints on the numerators, and to use the idea of combining approximations to satisfy the constraints. With this approach, we were able to find solutions satisfying all of the parity constraints on the numerators over a wide range of infidelities to estimate the transfer times required as a function of the tolerated infidelity. The results, shown in Fig. 7 (left), suggest that high fidelities are indeed attainable for modest biases, and the apparent linearity of the data in the bilogarithmic plot still suggests a polynomial scaling. However, the actual transfer times are significantly higher in this case than in previous examples. We point out here that our algorithm is not guaranteed to find the shortest possible time although Fig. 7 (right) shows that there is a good correlation between the Diophantine approximation error and the observed infidelity of the transfer, as already anticipated by Eq. (20). Furthermore, the algorithm enables us to estimate necessary transfer times far beyond the regime accessible by brute-force numerical simulations.

This example shows how a dynamic routing scheme can be implemented to transfer information from any node in a ring to any other node with fidelity approaching unity by simply applying bias fields to different nodes. For transfer between nodes 1 and 8, 2 and 7, 3 and 6, or 4 and 5, it suffices to apply a large bias to node 9. If we wish to transfer information from node 1 to 4, then translation invariance of the ring allows us to shift the labels by 2, so that node 1 becomes 3 and 4 becomes 6, and applying a bias to the new node 9 will enable the transfer.

Further reflection shows that we can achieve maximum transfer fidelities approaching unity for transfer between any pair of nodes in a ring of size *N*, provided *N* is odd by simply biasing the node in the middle between the pair of spins. This is because in this case \(N-2\) is odd, so there must be an odd number of spins along one path around the ring and an even number between the spins around the other. By applying the bias in the middle of the path with an odd number of spins, we asymptotically reach a chain with \(N-1\) (even) spins. In this chain, the transfer probability between spins mirrored at the center is 1, which is specifically true for the source and target spin with an even number of spins between them in the chain.

If *N* is even instead, then the situation is more complicated. If there is an odd number of spins between source and target along the ring, then applying a bias at the middle creates an odd chain where source and target are connected with probability 1 as they are at mirror-symmetric positions in the ring. If there is an even number of spins between source and target, then applying a single bias cannot achieve perfect information transfer as the spins can never be at mirrored positions in the odd chain (which are the only ones in the chain perfectly connected). There are, however, multiple solutions to apply a bias at two spins that can asymptotically generate a suitable chain.

In practice, it may be possible and even preferable to simultaneously apply biases to several nodes instead of a single node to shape the overall potential landscape. This case is more difficult to treat analytically, but preliminary results [43] suggest that numerical optimization can be used in this case to optimize the applied biases to achieve significant reductions in the transfer times and the magnitude of the required bias fields, as well as to deal with practical issues such as leakage of the bias fields, i.e., the tendency of a bias applied to one node to also affect nearby nodes.

## 6 Conclusion

The concept of maximum transfer fidelity for information transfer between nodes in a network of interacting spins was introduced, and criteria for attainability of the bounds in terms of the transition frequencies of the network were given. Attainability was shown to be related, theoretically, to minimality of a linear flow and, computationally, to a translation on a torus. This last connection enabled us to derive upper bounds on the time required to realize transfer fidelities within \(\epsilon _{\mathrm {prob}}\) of the maximum transfer fidelity, for arbitrary \(\epsilon _{\mathrm {prob}}>0\), via the simultaneous Diophantine approximation. Algorithms were discussed to find the required approximations.

The ultimate aim of this analysis is to understand the intrinsic limitations of information transfer in spin networks and utilize this understanding to engineer networks with favorable bounds on the information transfer fidelities and dynamic attainability properties, so that high spin transfer fidelities can be attained in short times, enabling fast transfer and minimizing the effects of noise and decoherence. An advantage of our approach of combining general ITF bounds and asymptotic attainability conditions with an algorithm to estimate the time required to achieve transfer within a set margin of error, compared to engineering the spectrum of the network Hamiltonian to admit perfect state transfer, for example, is that the latter condition is generally a too strong requirement, as in practice there are always margins of error. Therefore, it makes more sense to ask how much time is required to achieve a certain transfer fidelity for a given acceptable margin of error \(\epsilon \), and try to optimize the network topology, couplings or biases to achieve the best possible transfer times for the acceptable margins of error.

The general results were applied specifically to regular spin structures such as rings with uniform coupling. In this case, the information transfer infidelity prametric induced by maximum transfer fidelity takes on full significance as it can be shown to be a proper metric defining an information transfer infidelity geometry for the network, which is significantly different from the physical network geometry. The analysis shows that the intrinsic transfer fidelities for simple networks such as rings are often attainable asymptotically, but the times required to achieve high fidelities can be very long. The intrinsic bounds on the ITFs and transfer times can be favorably changed, however, by simple Hamiltonian engineering such as applying spatially distributed static bias fields. In particular, it was shown how such simple controls can be used to alter the information transfer fidelities and geometry of a network. It was demonstrated how this idea can be applied to enable or disable information transfer between a pair of nodes in the network. Simple bias controls are sufficient to direct information flow between nodes. By changing the biases, different transfers can be targeted, and thus a spin ring with fixed couplings can be turned into a simple quantum router for information encoded in excitations of a spin network.

Directions for future work include optimizing information transfer in spin networks via optimal control to achieve faster and more efficient dynamic routing in more complex spin networks. While this work focused on transfer of a single excitation, the concepts and analysis can also be applied to the case of encoding and simultaneous transfer of multiple excitations. This is interesting as it could increase the information transmission capacity of the network. Finally, although simulation results for similar spin systems suggest that some degree of intrinsic robustness of state transfer and the ability to mitigate the effects of noise, decoherence or fluctuations in the couplings via control [10, 11, 44], the sensitivity of transfer fidelities with regard to noise and deleterious effect of the environment need to be investigated for specific physical realizations of spin networks.

## Footnotes

## Notes

### Acknowledgments

E. A. Jonckheere was partially supported by the Army Research Office (ARO) Multi University Research Initiative (MURI) grant W911NF-11-1-0268. S. G. Schirmer and F. C. Langbein acknowledge support from the Ser Cymru National Research Network on Advanced Engineering. SGS also acknowledges funding from a Royal Society Leverhulme Trust Senior Fellowship.

### References

- 1.Caruso, F., Giovannetti, V., Lupo, C., Mancini, S.: Quantum channels and memory effects. Rev. Mod. Phys.
**86**, 1203–1259 (2014)CrossRefADSGoogle Scholar - 2.Awschalom, D.D., et al.: Quantum spintronics: engineering and manipulating atom-like spins in semiconductors. Science
**339**(6124), 1174–1179 (2013)CrossRefADSGoogle Scholar - 3.Bose, S.: Quantum communication through an unmodulated spin chain. Phys. Rev. Lett.
**91**, 07901 (2003)CrossRefADSGoogle Scholar - 4.Bose, S.: Quantum communication through spin chain dynamics: an introductory overview. Contemp. Phys.
**48**, 13–30 (2007)CrossRefADSGoogle Scholar - 5.Key, A.: A review of perfect, efficient, state transfer and its application as a constructive tool. Int. J. Quantum Inf.
**08**, 641 (2010)CrossRefGoogle Scholar - 6.Christandl, M., Datta, N., Ekert, A., Landahl, A.J.: Perfect state transfer in quantum spin networks. Phys. Rev. Lett.
**92**, 187902 (2004)CrossRefADSGoogle Scholar - 7.Christandl, M., Datta, N., Dorlas, T., Ekert, A., Kay, A., Landahl, A.: Perfect transfer of arbitrary states in quantum spin networks. Phys. Rev. A
**71**, 032312 (2005)CrossRefADSGoogle Scholar - 8.Greentree, A.D., Cole, J.H., Hamilton, A.R., Hollenberg, L.C.L.: Coherent electronic transfer in quantum dot systems using adiabatic passage. Phys. Rev. B
**70**, 235317 (2004)CrossRefADSGoogle Scholar - 9.Zueco, D., Galve, F., Kohler, S., Hänggi, P.: Quantum router based on ac control of qubit chains. Phys. Rev. A
**80**, 042303 (2009)CrossRefADSGoogle Scholar - 10.Schirmer, S.G., Pemberton-Ross, P.J.: Fast high-fidelity information transmission through spin-chain quantum wires. Phys. Rev. A
**80**, 030301 (2009)CrossRefADSGoogle Scholar - 11.Wang, X., Bayat, A., Bose, S., Schirmer, S.G.: Global control methods for Greenberger–Horne–Zeilinger-state generation on a one-dimensional ising chain. Phys. Rev. A
**82**, 012330 (2010)CrossRefADSGoogle Scholar - 12.Casaccino, A., Lloyd, S., Mancini, S., Severini, S.: Quantum state transfer through a qubit network with energy shifts and fluctuations. Int. J. Quantum Inf.
**7**(8), 1417–1427 (2009)CrossRefMATHGoogle Scholar - 13.Jonckheere, E., Schirmer, S., Langbein, F.: Geometry and curvature of spin networks. In: IEEE Multi-Conference on Systems and Control, pp. 786–791, Denver (2011). doi:10.1109/CCA.2011.6044395. arXiv:1102.3208v1 [quant-ph]
- 14.Jonckheere, E., Schirmer, S., Langbein, F.: Quantum networks: the anti-core of spin chains. Quantum Inf. Process.
**13**, 1607–1637 (2014)MathSciNetCrossRefADSMATHGoogle Scholar - 15.Wang, X., Pemberton-Ross, P., Schirmer, S.G.: Symmetry and controllability for spin networks with a single-node control. IEEE Trans. Autom. Control
**57**, 1945–1956 (2012)MathSciNetCrossRefGoogle Scholar - 16.Massey, A., Miller, S.J., Sinsheimer, J.: Distribution of eigenvalues of real symmetric palindromic Toeplitz matrices and circulant matrices. J. Theor. Probab.
**20**, 637–662 (2007)MathSciNetCrossRefMATHGoogle Scholar - 17.Kaku, M.: Introduction to Superstrings, ser. Graduate Texts in Contemporary Physics. Springer, New York (1998)Google Scholar
- 18.Prakash, N.: Mathematical Perspectives on Theoretical Physics: A Journey from Black Holes to Superstrings. Tata McGraw-Hill, New Delhi (2000)MATHGoogle Scholar
- 19.Katok, A., Hasselblatt, B.: Introduction to the Modern Theory of Dynamical Systems. Cambridge University Press, Cambridge (1997)MATHGoogle Scholar
- 20.Lagarias, J.C.: The computational complexity of simultaneous Diophantine approximation problems. In: 23rd Annual Symposium on Foundations of Computer Science, 1982. SFCS ’08, pp. 32–39 (1982)Google Scholar
- 21.Kovacs, A., Tihanyi, N.: Efficient computing of n-dimensional simultaneous Diophantine approximation problems. Acta Univ. Sapientiae Inform.
**5**(1), 16–34 (2013)MATHGoogle Scholar - 22.Simultaneous Diophantine approximation. http://www.math.tamu.edu/~Doug.Hensley/SimultaneousDiophantine (2005)
- 23.Nowak, W.G.: On simultaneous Diophantine approximation. Rendiconti del Circolo Matematico di Palermo
**XXXIII**, 456–460 (1984)CrossRefMathSciNetMATHGoogle Scholar - 24.Chevallier, N.: A Survey of Best Simultaneous Diophantine Approximations. http://www.math.uha.fr/chevallier/publication/meilleures3 (2011)
- 25.Bosma, W., Smeets I.: Finding simultaneous Diophantine approximations with prescribed quality. In: Howe, E.W., Kedlaya, K.S., (eds.) ANTS X: Tenth Algorithmic Number Theory Symposium 2012, UC San Diego, July 9–13 2012. PreprintarXiv:1001.4455v1
- 26.Lagarias, J.C.: Best simultaneous Diophantine approximations II. Behavior of consecutive best approximations. Pac. J. Math.
**102**(1), 61–88 (1982)MathSciNetCrossRefMATHGoogle Scholar - 27.Nowak, W.G.: A note on the simultaneous Diophantine approximation. Manuscr. Math.
**36**, 33–46 (1981)CrossRefMathSciNetMATHGoogle Scholar - 28.Keng, H.L.: Introduction to Number Theory. Springer, Berlin (1982)CrossRefMATHGoogle Scholar
- 29.Koblitz, N.: A course in Number Theory and Cryptography, ser. Graduate Texts in Mathematics. Springer, Berlin (1988)Google Scholar
- 30.Lenstra, K., Lenstra, H.W., Lovasz, L.: Factoring with rational coefficients. Math. Ann.
**261**(4), 515–534 (1982)MathSciNetCrossRefMATHGoogle Scholar - 31.Lagarias, J.C.: Geodesic multidimensional continued fractions. Proc. Lond. Math. Soc.
**3**(69), 464–488 (1994)MathSciNetCrossRefMATHGoogle Scholar - 32.Arkhangel’skii, A.V., Pontryagin, L.S.: General topology i; basic concepts and constructions; dimension theory. In: Gramkrelidze, R.V. (ed.) Encyclopedia of Mathematical Sciences. Springer, Berlin (1990)Google Scholar
- 33.Aldrovandi, R., Pereira, J.G.: An Introduction to Geometrical Physics. World Scientific, Singapore (1995)CrossRefMATHGoogle Scholar
- 34.Ariaei, F., Lou, M., Jonckheere, E., Krishnamachari, B., Zuniga, M.: Curvature of indoor sensor network: clustering coefficient. EURASIP J. Wirel. Commun. Netw.
**2008**, 20 (2008), article ID 213185. doi:10.1155/2008/2131185 - 35.Wilson, W.A.: On semi-metric spaces. Am. J. Math.
**53**(2), 361–373 (1931). http://www.jstor.org/stable/2370790 - 36.Shore, S.D.: Coherent distance functions. Topol. Proceed.
**6**, 405–422 (1981)MathSciNetMATHGoogle Scholar - 37.Blumenthal, L.M.: Some embedding theorems and characterization problems of distance geometry. Bull. Am. Math. Soc.
**40**, 321–338 (1943)MathSciNetCrossRefMATHGoogle Scholar - 38.Jonckheere, E., Lou, M., Bonahon, F., Baryshnikov, Y.: Euclidean versus hyperbolic congestion in idealized versus experimental networks. Internet Math.
**7**(1), 1–27 (2011)MathSciNetCrossRefMATHGoogle Scholar - 39.Wang, C., Jonckheere, E., Banirazi, R.: Wireless network capacity versus Ollivier–Ricci curvature under Heat Diffusion (HD) protocol. In: American Control Conference (ACC), pp. 3536–3541, Portland, June 04–06 2014. http://eudoxus2.usc.edu
- 40.Blumenthal, L.M.: Theory and Applications of Distance Geometry. Oxford at the Clarendon Press, London (1953)MATHGoogle Scholar
- 41.Jonckheere, E., Langbein, F.C., Schirmer, S.G.: Curvature of quantum rings. In: Proceedings of the 5th International Symposium on Communications, Control and Signal Processing (ISCCSP 2012), Rome, May 2–4 2012. doi:10.1109/ISCCSP.2012.6217863
- 42.Gromov, M.: Hyperbolic groups. In: Gersten, S.M. (ed.) Essays in Group Theory, ser. Mathematical Sciences, pp. 75–263. Springer, New York (1987)CrossRefGoogle Scholar
- 43.Langbein, F., Schirmer, S., Jonckheere, E.: Time-optimal information transfer in spintronic networks. to appear. In: Proceedings of IEEE CDC (2015), PreprintarXiv:1508.00928
- 44.Burgarth, D.: Quantum state transfer and time-dependent disorder in quantum chains. Eur. Phys. J. Special Top.
**151**(1), 147–155 (2007)CrossRefADSGoogle Scholar

## Copyright information

**Open Access**This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.